eapol/eapol_framework/eapol_symbian/am/type/tls_peap/symbian/eap_am_type_tls_peap_symbian.cpp
equal
deleted
inserted
replaced
14 * Description: EAP and WLAN authentication protocols. |
14 * Description: EAP and WLAN authentication protocols. |
15 * |
15 * |
16 */ |
16 */ |
17 |
17 |
18 /* |
18 /* |
19 * %version: 247.2.68 % |
19 * %version: 256 % |
20 */ |
20 */ |
21 |
21 |
22 // This is enumeration of EAPOL source code. |
22 // This is enumeration of EAPOL source code. |
23 #if defined(USE_EAP_MINIMUM_RELEASE_TRACES) |
23 #if defined(USE_EAP_MINIMUM_RELEASE_TRACES) |
24 #undef EAP_FILE_NUMBER_ENUM |
24 #undef EAP_FILE_NUMBER_ENUM |
247 m_db_user_cert_table_name = KPeapAllowedUserCertsDatabaseTableName; |
247 m_db_user_cert_table_name = KPeapAllowedUserCertsDatabaseTableName; |
248 m_db_ca_cert_table_name = KPeapAllowedCACertsDatabaseTableName; |
248 m_db_ca_cert_table_name = KPeapAllowedCACertsDatabaseTableName; |
249 m_db_cipher_suite_table_name = KPeapAllowedCipherSuitesDatabaseTableName; |
249 m_db_cipher_suite_table_name = KPeapAllowedCipherSuitesDatabaseTableName; |
250 m_db_name = KPeapDatabaseName; |
250 m_db_name = KPeapDatabaseName; |
251 } |
251 } |
252 else if (m_current_eap_type == eap_type_ttls_plain_pap |
252 else if (m_current_eap_type == eap_expanded_type_ttls_plain_pap.get_type() |
253 || m_current_eap_type == eap_type_ttls) |
253 || m_current_eap_type == eap_type_ttls) |
254 { |
254 { |
255 m_db_table_name = KTtlsDatabaseTableName; |
255 m_db_table_name = KTtlsDatabaseTableName; |
256 m_db_user_cert_table_name = KTtlsAllowedUserCertsDatabaseTableName; |
256 m_db_user_cert_table_name = KTtlsAllowedUserCertsDatabaseTableName; |
257 m_db_ca_cert_table_name = KTtlsAllowedCACertsDatabaseTableName; |
257 m_db_ca_cert_table_name = KTtlsAllowedCACertsDatabaseTableName; |
318 && aEapType != eap_type_peap |
318 && aEapType != eap_type_peap |
319 #if defined(USE_TTLS_EAP_TYPE) |
319 #if defined(USE_TTLS_EAP_TYPE) |
320 && aEapType != eap_type_ttls |
320 && aEapType != eap_type_ttls |
321 #endif // #if defined(USE_TTLS_EAP_TYPE) |
321 #endif // #if defined(USE_TTLS_EAP_TYPE) |
322 |
322 |
323 && aEapType != eap_type_ttls_plain_pap |
323 && aEapType != eap_expanded_type_ttls_plain_pap.get_type() |
324 |
324 |
325 #if defined (USE_FAST_EAP_TYPE) |
325 #if defined (USE_FAST_EAP_TYPE) |
326 && aEapType != eap_type_fast |
326 && aEapType != eap_type_fast |
327 #endif // #if defined (USE_FAST_EAP_TYPE) |
327 #endif // #if defined (USE_FAST_EAP_TYPE) |
328 ) |
328 ) |
1769 { |
1769 { |
1770 status = type_configure_read( |
1770 status = type_configure_read( |
1771 cf_str_EAP_TTLS_max_session_validity_time.get_field(), |
1771 cf_str_EAP_TTLS_max_session_validity_time.get_field(), |
1772 &sessionTimeFromFile); |
1772 &sessionTimeFromFile); |
1773 } |
1773 } |
1774 else if (m_current_eap_type == eap_type_ttls_plain_pap) |
1774 else if (m_current_eap_type == eap_expanded_type_ttls_plain_pap.get_type()) |
1775 { |
1775 { |
1776 // read PAP session time |
1776 // read PAP session time |
1777 status = type_configure_read( |
1777 status = type_configure_read( |
1778 cf_str_EAP_TLS_PEAP_ttls_pap_max_session_validity_time.get_field(), |
1778 cf_str_EAP_TLS_PEAP_ttls_pap_max_session_validity_time.get_field(), |
1779 &sessionTimeFromFile ); |
1779 &sessionTimeFromFile ); |
3358 #endif // #if defined(USE_TTLS_EAP_TYPE) |
3358 #endif // #if defined(USE_TTLS_EAP_TYPE) |
3359 #if defined(USE_FAST_EAP_TYPE) |
3359 #if defined(USE_FAST_EAP_TYPE) |
3360 || m_current_eap_type == eap_type_fast |
3360 || m_current_eap_type == eap_type_fast |
3361 #endif |
3361 #endif |
3362 |
3362 |
3363 || m_current_eap_type == eap_type_ttls_plain_pap |
3363 || m_current_eap_type == eap_expanded_type_ttls_plain_pap.get_type() |
3364 |
3364 |
3365 ) |
3365 ) |
3366 { |
3366 { |
3367 // Check if the wanted parameter is default type |
3367 // Check if the wanted parameter is default type |
3368 eap_variable_data_c wanted_field(m_am_tools); |
3368 eap_variable_data_c wanted_field(m_am_tools); |
5315 0); |
5315 0); |
5316 EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT); |
5316 EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT); |
5317 return; |
5317 return; |
5318 } |
5318 } |
5319 |
5319 |
5320 TInt error = m_allowed_user_certs.Append(entry->Copy()); |
5320 TInt error = m_allowed_user_certs.Append(entry); |
5321 if (error != KErrNone) |
5321 if (error != KErrNone) |
5322 { |
5322 { |
5323 EAP_TRACE_DEBUG( |
5323 EAP_TRACE_DEBUG( |
5324 m_am_tools, |
5324 m_am_tools, |
5325 TRACE_FLAGS_DEFAULT, |
5325 TRACE_FLAGS_DEFAULT, |
5333 eap_status_allocation_error, |
5333 eap_status_allocation_error, |
5334 false, |
5334 false, |
5335 0, |
5335 0, |
5336 false, |
5336 false, |
5337 0); |
5337 0); |
|
5338 |
|
5339 delete entry; |
5338 |
5340 |
5339 EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT); |
5341 EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT); |
5340 return; |
5342 return; |
5341 } |
5343 } |
5342 } |
5344 } |
6812 { |
6814 { |
6813 maxSessionTimeString.Set(cf_str_EAP_FAST_max_session_validity_time_literal); |
6815 maxSessionTimeString.Set(cf_str_EAP_FAST_max_session_validity_time_literal); |
6814 lastFullAuthTimeString.Set(KFASTLastFullAuthTime); |
6816 lastFullAuthTimeString.Set(KFASTLastFullAuthTime); |
6815 } |
6817 } |
6816 #endif |
6818 #endif |
6817 else if (m_current_eap_type == eap_type_ttls_plain_pap) |
6819 else if (m_current_eap_type == eap_expanded_type_ttls_plain_pap.get_type()) |
6818 { |
6820 { |
6819 // we should not come here, ttls pap has its own |
6821 // we should not come here, ttls pap has its own |
6820 // method for checking session validity |
6822 // method for checking session validity |
6821 EAP_TRACE_ERROR( m_am_tools, TRACE_FLAGS_DEFAULT, ( |
6823 EAP_TRACE_ERROR( m_am_tools, TRACE_FLAGS_DEFAULT, ( |
6822 EAPL( "ERROR: wrong eap type.\n" ) ) ); |
6824 EAPL( "ERROR: wrong eap type.\n" ) ) ); |
6984 } |
6986 } |
6985 else if (m_current_eap_type == eap_type_ttls) |
6987 else if (m_current_eap_type == eap_type_ttls) |
6986 { |
6988 { |
6987 lastFullAuthTimeString.Set(KTTLSLastFullAuthTime); |
6989 lastFullAuthTimeString.Set(KTTLSLastFullAuthTime); |
6988 } |
6990 } |
6989 else if (m_current_eap_type == eap_type_ttls_plain_pap) |
6991 else if (m_current_eap_type == eap_expanded_type_ttls_plain_pap.get_type()) |
6990 { |
6992 { |
6991 lastFullAuthTimeString.Set( KTTLSPAPLastFullAuthTime ); |
6993 lastFullAuthTimeString.Set( KTTLSPAPLastFullAuthTime ); |
6992 } |
6994 } |
6993 #if defined(USE_FAST_EAP_TYPE) |
6995 #if defined(USE_FAST_EAP_TYPE) |
6994 else if (m_current_eap_type == eap_type_fast) |
6996 else if (m_current_eap_type == eap_type_fast) |