|
1 /* |
|
2 * Copyright (c) 2001-2006 Nokia Corporation and/or its subsidiary(-ies). |
|
3 * All rights reserved. |
|
4 * This component and the accompanying materials are made available |
|
5 * under the terms of the License "Eclipse Public License v1.0" |
|
6 * which accompanies this distribution, and is available |
|
7 * at the URL "http://www.eclipse.org/legal/epl-v10.html". |
|
8 * |
|
9 * Initial Contributors: |
|
10 * Nokia Corporation - initial contribution. |
|
11 * |
|
12 * Contributors: |
|
13 * |
|
14 * Description: EAP and WLAN authentication protocols. |
|
15 * |
|
16 */ |
|
17 |
|
18 |
|
19 // This is enumeration of EAPOL source code. |
|
20 #if defined(USE_EAP_MINIMUM_RELEASE_TRACES) |
|
21 #undef EAP_FILE_NUMBER_ENUM |
|
22 #define EAP_FILE_NUMBER_ENUM 123 |
|
23 #undef EAP_FILE_NUMBER_DATE |
|
24 #define EAP_FILE_NUMBER_DATE 1127594498 |
|
25 #endif //#if defined(USE_EAP_MINIMUM_RELEASE_TRACES) |
|
26 |
|
27 |
|
28 |
|
29 #include "eap_tools.h" |
|
30 #include "eap_array.h" |
|
31 #include "eap_array_algorithms.h" |
|
32 #include "tls_application_data_message.h" |
|
33 #include "tls_record_header.h" |
|
34 #include "eap_buffer.h" |
|
35 #include "tls_peap_types.h" |
|
36 |
|
37 |
|
38 /** @file */ |
|
39 |
|
40 //-------------------------------------------------- |
|
41 |
|
42 EAP_FUNC_EXPORT tls_application_data_message_c::~tls_application_data_message_c() |
|
43 { |
|
44 EAP_TRACE_BEGIN(m_am_tools, TRACE_FLAGS_DEFAULT); |
|
45 |
|
46 EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT); |
|
47 } |
|
48 |
|
49 //-------------------------------------------------- |
|
50 |
|
51 EAP_FUNC_EXPORT tls_application_data_message_c::tls_application_data_message_c( |
|
52 abs_eap_am_tools_c * const tools, |
|
53 const bool is_client) |
|
54 : m_am_tools(tools) |
|
55 , m_application_data(tools) |
|
56 , m_is_client(is_client) |
|
57 , m_is_analysed(false) |
|
58 , m_is_valid(false) |
|
59 { |
|
60 EAP_TRACE_BEGIN(m_am_tools, TRACE_FLAGS_DEFAULT); |
|
61 |
|
62 set_is_valid(); |
|
63 |
|
64 EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT); |
|
65 } |
|
66 |
|
67 //-------------------------------------------------- |
|
68 |
|
69 EAP_FUNC_EXPORT void tls_application_data_message_c::set_is_valid() |
|
70 { |
|
71 EAP_TRACE_BEGIN(m_am_tools, TRACE_FLAGS_DEFAULT); |
|
72 |
|
73 m_is_valid = true; |
|
74 |
|
75 EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT); |
|
76 } |
|
77 |
|
78 //-------------------------------------------------- |
|
79 |
|
80 EAP_FUNC_EXPORT bool tls_application_data_message_c::get_is_valid() |
|
81 { |
|
82 EAP_TRACE_BEGIN(m_am_tools, TRACE_FLAGS_DEFAULT); |
|
83 EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT); |
|
84 return m_is_valid; |
|
85 } |
|
86 |
|
87 //-------------------------------------------------- |
|
88 |
|
89 EAP_FUNC_EXPORT void tls_application_data_message_c::set_is_analysed() |
|
90 { |
|
91 EAP_TRACE_BEGIN(m_am_tools, TRACE_FLAGS_DEFAULT); |
|
92 |
|
93 m_is_analysed = true; |
|
94 |
|
95 EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT); |
|
96 } |
|
97 |
|
98 //-------------------------------------------------- |
|
99 |
|
100 EAP_FUNC_EXPORT bool tls_application_data_message_c::get_is_analysed() |
|
101 { |
|
102 EAP_TRACE_BEGIN(m_am_tools, TRACE_FLAGS_DEFAULT); |
|
103 EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT); |
|
104 return m_is_analysed; |
|
105 } |
|
106 |
|
107 //-------------------------------------------------- |
|
108 |
|
109 EAP_FUNC_EXPORT eap_status_e tls_application_data_message_c::set_application_data( |
|
110 const u8_t * const packet, |
|
111 const u32_t packet_length) |
|
112 { |
|
113 EAP_TRACE_BEGIN(m_am_tools, TRACE_FLAGS_DEFAULT); |
|
114 |
|
115 EAP_TRACE_DEBUG(m_am_tools, TRACE_FLAGS_DEFAULT, (EAPL("\n"))); |
|
116 EAP_TRACE_DEBUG( |
|
117 m_am_tools, |
|
118 TRACE_FLAGS_DEFAULT, |
|
119 (EAPL("TLS: data_function: tls_application_data_message_c::set_application_data()\n"))); |
|
120 |
|
121 eap_status_e status = eap_status_not_supported; |
|
122 |
|
123 m_application_data.reset(); |
|
124 |
|
125 if (m_application_data.get_is_valid() == false) |
|
126 { |
|
127 EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT); |
|
128 return EAP_STATUS_RETURN(m_am_tools, eap_status_allocation_error); |
|
129 } |
|
130 |
|
131 status = m_application_data.add_data( |
|
132 packet, |
|
133 packet_length); |
|
134 if (status != eap_status_ok) |
|
135 { |
|
136 EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT); |
|
137 return EAP_STATUS_RETURN(m_am_tools, status); |
|
138 } |
|
139 |
|
140 EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT); |
|
141 return EAP_STATUS_RETURN(m_am_tools, status); |
|
142 } |
|
143 |
|
144 //-------------------------------------------------- |
|
145 |
|
146 EAP_FUNC_EXPORT eap_variable_data_c * tls_application_data_message_c::get_application_data() |
|
147 { |
|
148 EAP_TRACE_BEGIN(m_am_tools, TRACE_FLAGS_DEFAULT); |
|
149 EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT); |
|
150 return &m_application_data; |
|
151 } |
|
152 |
|
153 //-------------------------------------------------- |
|
154 |
|
155 EAP_FUNC_EXPORT eap_status_e tls_application_data_message_c::add_message_data( |
|
156 eap_variable_data_c * const tls_message_buffer) |
|
157 { |
|
158 EAP_TRACE_BEGIN(m_am_tools, TRACE_FLAGS_DEFAULT); |
|
159 |
|
160 EAP_TRACE_DEBUG(m_am_tools, TRACE_FLAGS_DEFAULT, (EAPL("\n"))); |
|
161 EAP_TRACE_DEBUG( |
|
162 m_am_tools, |
|
163 TRACE_FLAGS_DEFAULT, |
|
164 (EAPL("TLS: %s: data_function: tls_application_data_message_c::add_message_data()\n"), |
|
165 (m_is_client == true ? "client": "server"))); |
|
166 |
|
167 eap_status_e status = eap_status_not_supported; |
|
168 |
|
169 u32_t data_length_start = tls_message_buffer->get_data_length(); |
|
170 |
|
171 // - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
172 |
|
173 { |
|
174 status = tls_message_buffer->add_data( |
|
175 m_application_data.get_data(m_application_data.get_data_length()), |
|
176 m_application_data.get_data_length()); |
|
177 if (status != eap_status_ok) |
|
178 { |
|
179 EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT); |
|
180 return EAP_STATUS_RETURN(m_am_tools, status); |
|
181 } |
|
182 } |
|
183 |
|
184 // - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
185 |
|
186 if (status == eap_status_ok) |
|
187 { |
|
188 u32_t application_data_length = tls_message_buffer->get_data_length() - data_length_start; |
|
189 EAP_UNREFERENCED_PARAMETER(application_data_length); // in release |
|
190 |
|
191 EAP_TRACE_DEBUG( |
|
192 m_am_tools, |
|
193 TRACE_FLAGS_DEFAULT, |
|
194 (EAPL("application data length %d bytes.\n"), |
|
195 application_data_length)); |
|
196 |
|
197 EAP_TRACE_DATA_DEBUG( |
|
198 m_am_tools, |
|
199 TRACE_FLAGS_DEFAULT, |
|
200 (EAPL("TLS-application data"), |
|
201 tls_message_buffer->get_data_offset(data_length_start, application_data_length), |
|
202 application_data_length)); |
|
203 } |
|
204 |
|
205 EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT); |
|
206 return EAP_STATUS_RETURN(m_am_tools, status); |
|
207 } |
|
208 |
|
209 //-------------------------------------------------- |
|
210 |
|
211 |
|
212 |
|
213 // End. |