eapol/eapol_framework/eapol_common/type/tls_peap/tls/src/tls_application_data_message.cpp
changeset 0 c8830336c852
child 2 1c7bc153c08e
equal deleted inserted replaced
-1:000000000000 0:c8830336c852
       
     1 /*
       
     2 * Copyright (c) 2001-2006 Nokia Corporation and/or its subsidiary(-ies).
       
     3 * All rights reserved.
       
     4 * This component and the accompanying materials are made available
       
     5 * under the terms of the License "Eclipse Public License v1.0"
       
     6 * which accompanies this distribution, and is available
       
     7 * at the URL "http://www.eclipse.org/legal/epl-v10.html".
       
     8 *
       
     9 * Initial Contributors:
       
    10 * Nokia Corporation - initial contribution.
       
    11 *
       
    12 * Contributors:
       
    13 *
       
    14 * Description:  EAP and WLAN authentication protocols.
       
    15 *
       
    16 */
       
    17 
       
    18 
       
    19 // This is enumeration of EAPOL source code.
       
    20 #if defined(USE_EAP_MINIMUM_RELEASE_TRACES)
       
    21 	#undef EAP_FILE_NUMBER_ENUM
       
    22 	#define EAP_FILE_NUMBER_ENUM 123 
       
    23 	#undef EAP_FILE_NUMBER_DATE 
       
    24 	#define EAP_FILE_NUMBER_DATE 1127594498 
       
    25 #endif //#if defined(USE_EAP_MINIMUM_RELEASE_TRACES)
       
    26 
       
    27 
       
    28 
       
    29 #include "eap_tools.h"
       
    30 #include "eap_array.h"
       
    31 #include "eap_array_algorithms.h"
       
    32 #include "tls_application_data_message.h"
       
    33 #include "tls_record_header.h"
       
    34 #include "eap_buffer.h"
       
    35 #include "tls_peap_types.h"
       
    36 
       
    37 
       
    38 /** @file */
       
    39 
       
    40 //--------------------------------------------------
       
    41 
       
    42 EAP_FUNC_EXPORT tls_application_data_message_c::~tls_application_data_message_c()
       
    43 {
       
    44 	EAP_TRACE_BEGIN(m_am_tools, TRACE_FLAGS_DEFAULT);
       
    45 
       
    46 	EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT);
       
    47 }
       
    48 
       
    49 //--------------------------------------------------
       
    50 
       
    51 EAP_FUNC_EXPORT tls_application_data_message_c::tls_application_data_message_c(
       
    52 	abs_eap_am_tools_c * const tools,
       
    53 	const bool is_client)
       
    54 : m_am_tools(tools)
       
    55 , m_application_data(tools)
       
    56 , m_is_client(is_client)
       
    57 , m_is_analysed(false)
       
    58 , m_is_valid(false)
       
    59 {
       
    60 	EAP_TRACE_BEGIN(m_am_tools, TRACE_FLAGS_DEFAULT);
       
    61 
       
    62 	set_is_valid();
       
    63 
       
    64 	EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT);
       
    65 }
       
    66 
       
    67 //--------------------------------------------------
       
    68 
       
    69 EAP_FUNC_EXPORT void tls_application_data_message_c::set_is_valid()
       
    70 {
       
    71 	EAP_TRACE_BEGIN(m_am_tools, TRACE_FLAGS_DEFAULT);
       
    72 
       
    73 	m_is_valid = true;
       
    74 
       
    75 	EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT);
       
    76 }
       
    77 
       
    78 //--------------------------------------------------
       
    79 
       
    80 EAP_FUNC_EXPORT bool tls_application_data_message_c::get_is_valid()
       
    81 {
       
    82 	EAP_TRACE_BEGIN(m_am_tools, TRACE_FLAGS_DEFAULT);
       
    83 	EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT);
       
    84 	return m_is_valid;
       
    85 }
       
    86 
       
    87 //--------------------------------------------------
       
    88 
       
    89 EAP_FUNC_EXPORT void tls_application_data_message_c::set_is_analysed()
       
    90 {
       
    91 	EAP_TRACE_BEGIN(m_am_tools, TRACE_FLAGS_DEFAULT);
       
    92 
       
    93 	m_is_analysed = true;
       
    94 
       
    95 	EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT);
       
    96 }
       
    97 
       
    98 //--------------------------------------------------
       
    99 
       
   100 EAP_FUNC_EXPORT bool tls_application_data_message_c::get_is_analysed()
       
   101 {
       
   102 	EAP_TRACE_BEGIN(m_am_tools, TRACE_FLAGS_DEFAULT);
       
   103 	EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT);
       
   104 	return m_is_analysed;
       
   105 }
       
   106 
       
   107 //--------------------------------------------------
       
   108 
       
   109 EAP_FUNC_EXPORT eap_status_e tls_application_data_message_c::set_application_data(
       
   110 	const u8_t * const packet,
       
   111 	const u32_t packet_length)
       
   112 {
       
   113 	EAP_TRACE_BEGIN(m_am_tools, TRACE_FLAGS_DEFAULT);
       
   114 
       
   115 	EAP_TRACE_DEBUG(m_am_tools, TRACE_FLAGS_DEFAULT, (EAPL("\n")));
       
   116 	EAP_TRACE_DEBUG(
       
   117 		m_am_tools,
       
   118 		TRACE_FLAGS_DEFAULT,
       
   119 		(EAPL("TLS: data_function: tls_application_data_message_c::set_application_data()\n")));
       
   120 
       
   121 	eap_status_e status = eap_status_not_supported;
       
   122 
       
   123 	m_application_data.reset();
       
   124 
       
   125 	if (m_application_data.get_is_valid() == false)
       
   126 	{
       
   127 		EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT);
       
   128 		return EAP_STATUS_RETURN(m_am_tools, eap_status_allocation_error);
       
   129 	}
       
   130 
       
   131 	status = m_application_data.add_data(
       
   132 		packet,
       
   133 		packet_length);
       
   134 	if (status != eap_status_ok)
       
   135 	{
       
   136 		EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT);
       
   137 		return EAP_STATUS_RETURN(m_am_tools, status);
       
   138 	}
       
   139 	
       
   140 	EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT);
       
   141 	return EAP_STATUS_RETURN(m_am_tools, status);
       
   142 }
       
   143 
       
   144 //--------------------------------------------------
       
   145 
       
   146 EAP_FUNC_EXPORT eap_variable_data_c * tls_application_data_message_c::get_application_data()
       
   147 {
       
   148 	EAP_TRACE_BEGIN(m_am_tools, TRACE_FLAGS_DEFAULT);
       
   149 	EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT);
       
   150 	return &m_application_data;
       
   151 }
       
   152 
       
   153 //--------------------------------------------------
       
   154 
       
   155 EAP_FUNC_EXPORT eap_status_e tls_application_data_message_c::add_message_data(
       
   156 	eap_variable_data_c * const tls_message_buffer)
       
   157 {
       
   158 	EAP_TRACE_BEGIN(m_am_tools, TRACE_FLAGS_DEFAULT);
       
   159 
       
   160 	EAP_TRACE_DEBUG(m_am_tools, TRACE_FLAGS_DEFAULT, (EAPL("\n")));
       
   161 	EAP_TRACE_DEBUG(
       
   162 		m_am_tools,
       
   163 		TRACE_FLAGS_DEFAULT,
       
   164 		(EAPL("TLS: %s: data_function: tls_application_data_message_c::add_message_data()\n"),
       
   165 		(m_is_client == true ? "client": "server")));
       
   166 
       
   167 	eap_status_e status = eap_status_not_supported;
       
   168 
       
   169 	u32_t data_length_start = tls_message_buffer->get_data_length();
       
   170 
       
   171 	// - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
       
   172 
       
   173 	{
       
   174 		status = tls_message_buffer->add_data(
       
   175 			m_application_data.get_data(m_application_data.get_data_length()),
       
   176 			m_application_data.get_data_length());
       
   177 		if (status != eap_status_ok)
       
   178 		{
       
   179 			EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT);
       
   180 			return EAP_STATUS_RETURN(m_am_tools, status);
       
   181 		}
       
   182 	}
       
   183 
       
   184 	// - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
       
   185 
       
   186 	if (status == eap_status_ok)
       
   187 	{
       
   188 		u32_t application_data_length = tls_message_buffer->get_data_length() - data_length_start;
       
   189 		EAP_UNREFERENCED_PARAMETER(application_data_length); // in release
       
   190 
       
   191 		EAP_TRACE_DEBUG(
       
   192 			m_am_tools,
       
   193 			TRACE_FLAGS_DEFAULT,
       
   194 			(EAPL("application data length %d bytes.\n"),
       
   195 			 application_data_length));
       
   196 
       
   197 		EAP_TRACE_DATA_DEBUG(
       
   198 			m_am_tools,
       
   199 			TRACE_FLAGS_DEFAULT,
       
   200 			(EAPL("TLS-application data"),
       
   201 			 tls_message_buffer->get_data_offset(data_length_start, application_data_length),
       
   202 			 application_data_length));
       
   203 	}
       
   204 
       
   205 	EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT);
       
   206 	return EAP_STATUS_RETURN(m_am_tools, status);
       
   207 }
       
   208 
       
   209 //--------------------------------------------------
       
   210 
       
   211 
       
   212 
       
   213 // End.