|
1 /* |
|
2 * Copyright (c) 2001-2006 Nokia Corporation and/or its subsidiary(-ies). |
|
3 * All rights reserved. |
|
4 * This component and the accompanying materials are made available |
|
5 * under the terms of the License "Eclipse Public License v1.0" |
|
6 * which accompanies this distribution, and is available |
|
7 * at the URL "http://www.eclipse.org/legal/epl-v10.html". |
|
8 * |
|
9 * Initial Contributors: |
|
10 * Nokia Corporation - initial contribution. |
|
11 * |
|
12 * Contributors: |
|
13 * |
|
14 * Description: EAP and WLAN authentication protocols. |
|
15 * |
|
16 */ |
|
17 |
|
18 |
|
19 // This is enumeration of EAPOL source code. |
|
20 #if defined(USE_EAP_MINIMUM_RELEASE_TRACES) |
|
21 #undef EAP_FILE_NUMBER_ENUM |
|
22 #define EAP_FILE_NUMBER_ENUM 583 |
|
23 #undef EAP_FILE_NUMBER_DATE |
|
24 #define EAP_FILE_NUMBER_DATE 1127594498 |
|
25 #endif //#if defined(USE_EAP_MINIMUM_RELEASE_TRACES) |
|
26 |
|
27 |
|
28 |
|
29 #include "eap_am_memory.h" |
|
30 #include "eapol_key_state.h" |
|
31 #include "eapol_key_header.h" |
|
32 #include "eap_crypto_api.h" |
|
33 #include "abs_eap_am_mutex.h" |
|
34 #include "eap_state_notification.h" |
|
35 #include "eap_automatic_variable.h" |
|
36 #include "eapol_rsna_key_data_gtk_header.h" |
|
37 #include "abs_eapol_core.h" |
|
38 #include "abs_eapol_key_state.h" |
|
39 #include "eap_core_retransmission.h" |
|
40 #include "eapol_rsna_key_data_payloads.h" |
|
41 #include "eap_buffer.h" |
|
42 #include "eapol_session_key.h" |
|
43 |
|
44 //-------------------------------------------------- |
|
45 |
|
46 EAP_FUNC_EXPORT eap_status_e eapol_key_state_c::set_WPXM_parameters( |
|
47 const eap_am_network_id_c * const /* receive_network_id */) |
|
48 { |
|
49 return EAP_STATUS_RETURN(m_am_tools, eap_status_not_supported); |
|
50 } |
|
51 |
|
52 //-------------------------------------------------- |
|
53 |
|
54 // |
|
55 EAP_FUNC_EXPORT eap_status_e eapol_key_state_c::start_WPXM_reassociation( |
|
56 const eap_am_network_id_c * const /*receive_network_id*/, |
|
57 const eapol_key_authentication_type_e /*authentication_type*/, |
|
58 eap_variable_data_c * const /* send_reassociation_request_ie */) |
|
59 { |
|
60 return EAP_STATUS_RETURN(m_am_tools, eap_status_not_supported); |
|
61 } |
|
62 |
|
63 //-------------------------------------------------- |
|
64 |
|
65 // |
|
66 EAP_FUNC_EXPORT eap_status_e eapol_key_state_c::complete_WPXM_reassociation( |
|
67 const eapol_wlan_authentication_state_e /*reassociation_result*/, |
|
68 const eap_am_network_id_c * const /*receive_network_id*/, |
|
69 const eapol_key_authentication_type_e /*authentication_type*/, |
|
70 const eap_variable_data_c * const /* received_reassociation_ie */) |
|
71 { |
|
72 return EAP_STATUS_RETURN(m_am_tools, eap_status_not_supported); |
|
73 } |
|
74 |
|
75 //-------------------------------------------------- |
|
76 |
|
77 // |
|
78 EAP_FUNC_EXPORT bool eapol_key_state_c::get_is_WPXM() |
|
79 { |
|
80 return false; |
|
81 } |
|
82 |
|
83 //-------------------------------------------------- |
|
84 |
|
85 // |
|
86 EAP_FUNC_EXPORT eap_status_e eapol_key_state_c::derive_WPXM_WPXK1_WPXK2() |
|
87 { |
|
88 return EAP_STATUS_RETURN(m_am_tools, eap_status_not_supported); |
|
89 } |
|
90 |
|
91 //-------------------------------------------------- |
|
92 |
|
93 // |
|
94 eap_status_e eapol_key_state_c::save_keys_for_test_use( |
|
95 const eap_variable_data_c * const /* confirmation_KCK */, |
|
96 const eap_variable_data_c * const /* encryption_KEK */, |
|
97 const eap_variable_data_c * const /* temporal_TK */, |
|
98 const u32_t /* WPXM_WPXC */) |
|
99 { |
|
100 return EAP_STATUS_RETURN(m_am_tools, eap_status_not_supported); |
|
101 } |
|
102 |
|
103 //-------------------------------------------------- |
|
104 |
|
105 // |
|
106 EAP_FUNC_EXPORT eap_status_e eapol_key_state_c::derive_WPXM_PTK(const u32_t /* WPXM_WPXC */) |
|
107 { |
|
108 return EAP_STATUS_RETURN(m_am_tools, eap_status_not_supported); |
|
109 } |
|
110 |
|
111 //-------------------------------------------------- |
|
112 |
|
113 // End. |