eapol/eapol_framework/eapol_common/type/tls_peap/tls/src/tls_change_cipher_spec_message.cpp
changeset 0 c8830336c852
child 2 1c7bc153c08e
equal deleted inserted replaced
-1:000000000000 0:c8830336c852
       
     1 /*
       
     2 * Copyright (c) 2001-2006 Nokia Corporation and/or its subsidiary(-ies).
       
     3 * All rights reserved.
       
     4 * This component and the accompanying materials are made available
       
     5 * under the terms of the License "Eclipse Public License v1.0"
       
     6 * which accompanies this distribution, and is available
       
     7 * at the URL "http://www.eclipse.org/legal/epl-v10.html".
       
     8 *
       
     9 * Initial Contributors:
       
    10 * Nokia Corporation - initial contribution.
       
    11 *
       
    12 * Contributors:
       
    13 *
       
    14 * Description:  EAP and WLAN authentication protocols.
       
    15 *
       
    16 */
       
    17 
       
    18 
       
    19 // This is enumeration of EAPOL source code.
       
    20 #if defined(USE_EAP_MINIMUM_RELEASE_TRACES)
       
    21 	#undef EAP_FILE_NUMBER_ENUM
       
    22 	#define EAP_FILE_NUMBER_ENUM 127 
       
    23 	#undef EAP_FILE_NUMBER_DATE 
       
    24 	#define EAP_FILE_NUMBER_DATE 1127594498 
       
    25 #endif //#if defined(USE_EAP_MINIMUM_RELEASE_TRACES)
       
    26 
       
    27 
       
    28 
       
    29 #include "eap_tools.h"
       
    30 #include "eap_array.h"
       
    31 #include "eap_array_algorithms.h"
       
    32 #include "tls_change_cipher_spec_message.h"
       
    33 #include "tls_record_header.h"
       
    34 #include "tls_peap_types.h"
       
    35 
       
    36 
       
    37 /** @file */
       
    38 
       
    39 //--------------------------------------------------
       
    40 
       
    41 EAP_FUNC_EXPORT tls_change_cipher_spec_message_c::~tls_change_cipher_spec_message_c()
       
    42 {
       
    43 	EAP_TRACE_BEGIN(m_am_tools, TRACE_FLAGS_DEFAULT);
       
    44 
       
    45 	EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT);
       
    46 }
       
    47 
       
    48 //--------------------------------------------------
       
    49 
       
    50 EAP_FUNC_EXPORT tls_change_cipher_spec_message_c::tls_change_cipher_spec_message_c(
       
    51 	abs_eap_am_tools_c * const tools,
       
    52 	abs_tls_change_cipher_spec_c * const change_cipher_spec,
       
    53 	const bool is_client)
       
    54 : m_am_tools(tools)
       
    55 , m_change_cipher_spec(change_cipher_spec)
       
    56 , m_tls_change_cipher_spec_message_buffer(tools)
       
    57 , m_type(tls_change_cipher_spec_type_none)
       
    58 , m_is_client(is_client)
       
    59 , m_is_valid(false)
       
    60 {
       
    61 	EAP_TRACE_BEGIN(m_am_tools, TRACE_FLAGS_DEFAULT);
       
    62 
       
    63 	set_is_valid();
       
    64 
       
    65 	EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT);
       
    66 }
       
    67 
       
    68 //--------------------------------------------------
       
    69 
       
    70 EAP_FUNC_EXPORT void tls_change_cipher_spec_message_c::set_is_valid()
       
    71 {
       
    72 	EAP_TRACE_BEGIN(m_am_tools, TRACE_FLAGS_DEFAULT);
       
    73 
       
    74 	m_is_valid = true;
       
    75 
       
    76 	EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT);
       
    77 }
       
    78 
       
    79 //--------------------------------------------------
       
    80 
       
    81 EAP_FUNC_EXPORT bool tls_change_cipher_spec_message_c::get_is_valid()
       
    82 {
       
    83 	EAP_TRACE_BEGIN(m_am_tools, TRACE_FLAGS_DEFAULT);
       
    84 	EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT);
       
    85 	return m_is_valid;
       
    86 }
       
    87 
       
    88 //--------------------------------------------------
       
    89 
       
    90 EAP_FUNC_EXPORT eap_status_e tls_change_cipher_spec_message_c::set_change_cipher_spec_type(
       
    91 	const tls_change_cipher_spec_type_e type)
       
    92 {
       
    93 	EAP_TRACE_BEGIN(m_am_tools, TRACE_FLAGS_DEFAULT);
       
    94 
       
    95 	m_type = type;
       
    96 
       
    97 	EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT);
       
    98 	return EAP_STATUS_RETURN(m_am_tools, eap_status_ok);
       
    99 }
       
   100 
       
   101 //--------------------------------------------------
       
   102 
       
   103 EAP_FUNC_EXPORT tls_change_cipher_spec_type_e tls_change_cipher_spec_message_c::get_change_cipher_spec_type() const
       
   104 {
       
   105 	EAP_TRACE_BEGIN(m_am_tools, TRACE_FLAGS_DEFAULT);
       
   106 	EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT);
       
   107 	return m_type;
       
   108 }
       
   109 
       
   110 //--------------------------------------------------
       
   111 
       
   112 EAP_FUNC_EXPORT eap_status_e tls_change_cipher_spec_message_c::create_message_data()
       
   113 {
       
   114 	EAP_TRACE_BEGIN(m_am_tools, TRACE_FLAGS_DEFAULT);
       
   115 
       
   116 	EAP_TRACE_DEBUG(m_am_tools, TRACE_FLAGS_DEFAULT, (EAPL("\n")));
       
   117 	EAP_TRACE_DEBUG(
       
   118 		m_am_tools,
       
   119 		TRACE_FLAGS_DEFAULT,
       
   120 		(EAPL("TLS: %s: data_function: tls_change_cipher_spec_message_c::create_message_data(): tls_change_cipher_spec_type_change_cipher_spec\n"),
       
   121 		 (m_is_client == true ? "client": "server")));
       
   122 
       
   123 	eap_status_e status = eap_status_not_supported;
       
   124 
       
   125 	m_tls_change_cipher_spec_message_buffer.reset();
       
   126 	status = m_tls_change_cipher_spec_message_buffer.set_buffer_length(TLS_PEAP_DEFAULT_RECORD_LENGTH);
       
   127 	if (status != eap_status_ok)
       
   128 	{
       
   129 		EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT);
       
   130 		return EAP_STATUS_RETURN(m_am_tools, status);
       
   131 	}
       
   132 
       
   133 	u32_t change_cipher_spec_data_length_start = m_tls_change_cipher_spec_message_buffer.get_data_length();
       
   134 
       
   135 	// - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
       
   136 
       
   137 	u8_t type = static_cast<u8_t>(m_type);
       
   138 
       
   139 	status = m_tls_change_cipher_spec_message_buffer.add_data(
       
   140 		&type,
       
   141 		sizeof(type));
       
   142 	if (status != eap_status_ok)
       
   143 	{
       
   144 		EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT);
       
   145 		return EAP_STATUS_RETURN(m_am_tools, status);
       
   146 	}
       
   147 	
       
   148 	EAP_TRACE_DATA_DEBUG(m_am_tools, TRACE_FLAGS_DEFAULT, (EAPL("TLS-change_cipher_spec type"),
       
   149 														   &type,
       
   150 														   sizeof(type)));
       
   151 
       
   152 	// - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
       
   153 
       
   154 	if (status == eap_status_ok)
       
   155 	{
       
   156 		u32_t change_cipher_spec_data_length
       
   157 			= m_tls_change_cipher_spec_message_buffer.get_data_length()
       
   158 			- change_cipher_spec_data_length_start;
       
   159 
       
   160 		EAP_UNREFERENCED_PARAMETER(change_cipher_spec_data_length); // in release
       
   161 
       
   162 		EAP_TRACE_DEBUG(
       
   163 			m_am_tools,
       
   164 			TRACE_FLAGS_DEFAULT,
       
   165 			(EAPL("change_cipher_spec length %d bytes.\n"),
       
   166 			 change_cipher_spec_data_length));
       
   167 	}
       
   168 
       
   169 	EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT);
       
   170 	return EAP_STATUS_RETURN(m_am_tools, status);
       
   171 }
       
   172 
       
   173 //--------------------------------------------------
       
   174 
       
   175 EAP_FUNC_EXPORT eap_status_e tls_change_cipher_spec_message_c::add_message_data(
       
   176 	eap_variable_data_c * const tls_message_buffer)
       
   177 {
       
   178 	EAP_TRACE_BEGIN(m_am_tools, TRACE_FLAGS_DEFAULT);
       
   179 
       
   180 	EAP_TRACE_DEBUG(m_am_tools, TRACE_FLAGS_DEFAULT, (EAPL("\n")));
       
   181 	EAP_TRACE_DEBUG(
       
   182 		m_am_tools,
       
   183 		TRACE_FLAGS_DEFAULT,
       
   184 		(EAPL("TLS: %s: data_function: tls_change_cipher_spec_message_c::add_message_data(): tls_change_cipher_spec_type_change_cipher_spec\n"),
       
   185 		 (m_is_client == true ? "client": "server")));
       
   186 
       
   187 	eap_status_e status = eap_status_not_supported;
       
   188 
       
   189 	if (m_tls_change_cipher_spec_message_buffer.get_is_valid() == false)
       
   190 	{
       
   191 		EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT);
       
   192 		return EAP_STATUS_RETURN(m_am_tools, eap_status_illegal_payload);
       
   193 	}
       
   194 
       
   195 	status = tls_message_buffer->add_data(
       
   196 		m_tls_change_cipher_spec_message_buffer.get_data(m_tls_change_cipher_spec_message_buffer.get_data_length()),
       
   197 		m_tls_change_cipher_spec_message_buffer.get_data_length());
       
   198 	if (status != eap_status_ok)
       
   199 	{
       
   200 		EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT);
       
   201 		return EAP_STATUS_RETURN(m_am_tools, status);
       
   202 	}
       
   203 
       
   204 	EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT);
       
   205 	return EAP_STATUS_RETURN(m_am_tools, status);
       
   206 }
       
   207 
       
   208 //--------------------------------------------------
       
   209 
       
   210 
       
   211 
       
   212 // End.