|
1 /* |
|
2 * Copyright (c) 2001-2006 Nokia Corporation and/or its subsidiary(-ies). |
|
3 * All rights reserved. |
|
4 * This component and the accompanying materials are made available |
|
5 * under the terms of the License "Eclipse Public License v1.0" |
|
6 * which accompanies this distribution, and is available |
|
7 * at the URL "http://www.eclipse.org/legal/epl-v10.html". |
|
8 * |
|
9 * Initial Contributors: |
|
10 * Nokia Corporation - initial contribution. |
|
11 * |
|
12 * Contributors: |
|
13 * |
|
14 * Description: EAP and WLAN authentication protocols. |
|
15 * |
|
16 */ |
|
17 |
|
18 |
|
19 // This is enumeration of EAPOL source code. |
|
20 #if defined(USE_EAP_MINIMUM_RELEASE_TRACES) |
|
21 #undef EAP_FILE_NUMBER_ENUM |
|
22 #define EAP_FILE_NUMBER_ENUM 127 |
|
23 #undef EAP_FILE_NUMBER_DATE |
|
24 #define EAP_FILE_NUMBER_DATE 1127594498 |
|
25 #endif //#if defined(USE_EAP_MINIMUM_RELEASE_TRACES) |
|
26 |
|
27 |
|
28 |
|
29 #include "eap_tools.h" |
|
30 #include "eap_array.h" |
|
31 #include "eap_array_algorithms.h" |
|
32 #include "tls_change_cipher_spec_message.h" |
|
33 #include "tls_record_header.h" |
|
34 #include "tls_peap_types.h" |
|
35 |
|
36 |
|
37 /** @file */ |
|
38 |
|
39 //-------------------------------------------------- |
|
40 |
|
41 EAP_FUNC_EXPORT tls_change_cipher_spec_message_c::~tls_change_cipher_spec_message_c() |
|
42 { |
|
43 EAP_TRACE_BEGIN(m_am_tools, TRACE_FLAGS_DEFAULT); |
|
44 |
|
45 EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT); |
|
46 } |
|
47 |
|
48 //-------------------------------------------------- |
|
49 |
|
50 EAP_FUNC_EXPORT tls_change_cipher_spec_message_c::tls_change_cipher_spec_message_c( |
|
51 abs_eap_am_tools_c * const tools, |
|
52 abs_tls_change_cipher_spec_c * const change_cipher_spec, |
|
53 const bool is_client) |
|
54 : m_am_tools(tools) |
|
55 , m_change_cipher_spec(change_cipher_spec) |
|
56 , m_tls_change_cipher_spec_message_buffer(tools) |
|
57 , m_type(tls_change_cipher_spec_type_none) |
|
58 , m_is_client(is_client) |
|
59 , m_is_valid(false) |
|
60 { |
|
61 EAP_TRACE_BEGIN(m_am_tools, TRACE_FLAGS_DEFAULT); |
|
62 |
|
63 set_is_valid(); |
|
64 |
|
65 EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT); |
|
66 } |
|
67 |
|
68 //-------------------------------------------------- |
|
69 |
|
70 EAP_FUNC_EXPORT void tls_change_cipher_spec_message_c::set_is_valid() |
|
71 { |
|
72 EAP_TRACE_BEGIN(m_am_tools, TRACE_FLAGS_DEFAULT); |
|
73 |
|
74 m_is_valid = true; |
|
75 |
|
76 EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT); |
|
77 } |
|
78 |
|
79 //-------------------------------------------------- |
|
80 |
|
81 EAP_FUNC_EXPORT bool tls_change_cipher_spec_message_c::get_is_valid() |
|
82 { |
|
83 EAP_TRACE_BEGIN(m_am_tools, TRACE_FLAGS_DEFAULT); |
|
84 EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT); |
|
85 return m_is_valid; |
|
86 } |
|
87 |
|
88 //-------------------------------------------------- |
|
89 |
|
90 EAP_FUNC_EXPORT eap_status_e tls_change_cipher_spec_message_c::set_change_cipher_spec_type( |
|
91 const tls_change_cipher_spec_type_e type) |
|
92 { |
|
93 EAP_TRACE_BEGIN(m_am_tools, TRACE_FLAGS_DEFAULT); |
|
94 |
|
95 m_type = type; |
|
96 |
|
97 EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT); |
|
98 return EAP_STATUS_RETURN(m_am_tools, eap_status_ok); |
|
99 } |
|
100 |
|
101 //-------------------------------------------------- |
|
102 |
|
103 EAP_FUNC_EXPORT tls_change_cipher_spec_type_e tls_change_cipher_spec_message_c::get_change_cipher_spec_type() const |
|
104 { |
|
105 EAP_TRACE_BEGIN(m_am_tools, TRACE_FLAGS_DEFAULT); |
|
106 EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT); |
|
107 return m_type; |
|
108 } |
|
109 |
|
110 //-------------------------------------------------- |
|
111 |
|
112 EAP_FUNC_EXPORT eap_status_e tls_change_cipher_spec_message_c::create_message_data() |
|
113 { |
|
114 EAP_TRACE_BEGIN(m_am_tools, TRACE_FLAGS_DEFAULT); |
|
115 |
|
116 EAP_TRACE_DEBUG(m_am_tools, TRACE_FLAGS_DEFAULT, (EAPL("\n"))); |
|
117 EAP_TRACE_DEBUG( |
|
118 m_am_tools, |
|
119 TRACE_FLAGS_DEFAULT, |
|
120 (EAPL("TLS: %s: data_function: tls_change_cipher_spec_message_c::create_message_data(): tls_change_cipher_spec_type_change_cipher_spec\n"), |
|
121 (m_is_client == true ? "client": "server"))); |
|
122 |
|
123 eap_status_e status = eap_status_not_supported; |
|
124 |
|
125 m_tls_change_cipher_spec_message_buffer.reset(); |
|
126 status = m_tls_change_cipher_spec_message_buffer.set_buffer_length(TLS_PEAP_DEFAULT_RECORD_LENGTH); |
|
127 if (status != eap_status_ok) |
|
128 { |
|
129 EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT); |
|
130 return EAP_STATUS_RETURN(m_am_tools, status); |
|
131 } |
|
132 |
|
133 u32_t change_cipher_spec_data_length_start = m_tls_change_cipher_spec_message_buffer.get_data_length(); |
|
134 |
|
135 // - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
136 |
|
137 u8_t type = static_cast<u8_t>(m_type); |
|
138 |
|
139 status = m_tls_change_cipher_spec_message_buffer.add_data( |
|
140 &type, |
|
141 sizeof(type)); |
|
142 if (status != eap_status_ok) |
|
143 { |
|
144 EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT); |
|
145 return EAP_STATUS_RETURN(m_am_tools, status); |
|
146 } |
|
147 |
|
148 EAP_TRACE_DATA_DEBUG(m_am_tools, TRACE_FLAGS_DEFAULT, (EAPL("TLS-change_cipher_spec type"), |
|
149 &type, |
|
150 sizeof(type))); |
|
151 |
|
152 // - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
153 |
|
154 if (status == eap_status_ok) |
|
155 { |
|
156 u32_t change_cipher_spec_data_length |
|
157 = m_tls_change_cipher_spec_message_buffer.get_data_length() |
|
158 - change_cipher_spec_data_length_start; |
|
159 |
|
160 EAP_UNREFERENCED_PARAMETER(change_cipher_spec_data_length); // in release |
|
161 |
|
162 EAP_TRACE_DEBUG( |
|
163 m_am_tools, |
|
164 TRACE_FLAGS_DEFAULT, |
|
165 (EAPL("change_cipher_spec length %d bytes.\n"), |
|
166 change_cipher_spec_data_length)); |
|
167 } |
|
168 |
|
169 EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT); |
|
170 return EAP_STATUS_RETURN(m_am_tools, status); |
|
171 } |
|
172 |
|
173 //-------------------------------------------------- |
|
174 |
|
175 EAP_FUNC_EXPORT eap_status_e tls_change_cipher_spec_message_c::add_message_data( |
|
176 eap_variable_data_c * const tls_message_buffer) |
|
177 { |
|
178 EAP_TRACE_BEGIN(m_am_tools, TRACE_FLAGS_DEFAULT); |
|
179 |
|
180 EAP_TRACE_DEBUG(m_am_tools, TRACE_FLAGS_DEFAULT, (EAPL("\n"))); |
|
181 EAP_TRACE_DEBUG( |
|
182 m_am_tools, |
|
183 TRACE_FLAGS_DEFAULT, |
|
184 (EAPL("TLS: %s: data_function: tls_change_cipher_spec_message_c::add_message_data(): tls_change_cipher_spec_type_change_cipher_spec\n"), |
|
185 (m_is_client == true ? "client": "server"))); |
|
186 |
|
187 eap_status_e status = eap_status_not_supported; |
|
188 |
|
189 if (m_tls_change_cipher_spec_message_buffer.get_is_valid() == false) |
|
190 { |
|
191 EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT); |
|
192 return EAP_STATUS_RETURN(m_am_tools, eap_status_illegal_payload); |
|
193 } |
|
194 |
|
195 status = tls_message_buffer->add_data( |
|
196 m_tls_change_cipher_spec_message_buffer.get_data(m_tls_change_cipher_spec_message_buffer.get_data_length()), |
|
197 m_tls_change_cipher_spec_message_buffer.get_data_length()); |
|
198 if (status != eap_status_ok) |
|
199 { |
|
200 EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT); |
|
201 return EAP_STATUS_RETURN(m_am_tools, status); |
|
202 } |
|
203 |
|
204 EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT); |
|
205 return EAP_STATUS_RETURN(m_am_tools, status); |
|
206 } |
|
207 |
|
208 //-------------------------------------------------- |
|
209 |
|
210 |
|
211 |
|
212 // End. |