| /* |
| * mainSecSm.c |
| * |
| * Copyright(c) 1998 - 2009 Texas Instruments. All rights reserved. |
| * All rights reserved. |
| * |
| * Redistribution and use in source and binary forms, with or without |
| * modification, are permitted provided that the following conditions |
| * are met: |
| * |
| * * Redistributions of source code must retain the above copyright |
| * notice, this list of conditions and the following disclaimer. |
| * * Redistributions in binary form must reproduce the above copyright |
| * notice, this list of conditions and the following disclaimer in |
| * the documentation and/or other materials provided with the |
| * distribution. |
| * * Neither the name Texas Instruments nor the names of its |
| * contributors may be used to endorse or promote products derived |
| * from this software without specific prior written permission. |
| * |
| * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS |
| * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT |
| * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR |
| * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT |
| * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
| * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT |
| * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
| * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
| * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
| * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE |
| * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
| */ |
| |
| /** \file mainSecSm.c |
| * \brief 802.1X finite state machine header file |
| * |
| * \see mainSecSm.h |
| */ |
| |
| |
| /***************************************************************************/ |
| /* */ |
| /* MODULE: mainSecSm.c */ |
| /* PURPOSE: Main Security State Machine API */ |
| /* */ |
| /***************************************************************************/ |
| |
| #define __FILE_ID__ FILE_ID_39 |
| #include "osApi.h" |
| #include "paramOut.h" |
| #include "report.h" |
| #include "DataCtrl_Api.h" |
| #include "smeApi.h" |
| #include "rsn.h" |
| #include "rsnApi.h" |
| #include "mainSecSm.h" |
| #include "mainSecNull.h" |
| #include "mainSecKeysOnly.h" |
| #include "mainKeysSm.h" |
| #include "externalSec.h" |
| |
| /* Constants */ |
| |
| /** number of events in the state machine */ |
| #define MAIN_SEC_MAX_NUM_EVENTS 7 |
| |
| /** number of states in the state machine */ |
| #define MAIN_SEC_MAX_NUM_STATES 6 |
| |
| /* Enumerations */ |
| |
| /* Typedefs */ |
| |
| /* Structures */ |
| |
| /* External data definitions */ |
| |
| /* External functions definitions */ |
| |
| /* Global variables */ |
| |
| /* Local function prototypes */ |
| |
| TI_STATUS mainSec_setKey(struct _mainSec_t *pMainSec, TSecurityKeys *pKey); |
| TI_STATUS mainSec_removeKey(struct _mainSec_t *pMainSec, TSecurityKeys *pKey); |
| TI_STATUS mainSec_setDefaultKeyId(struct _mainSec_t *pMainSec, TI_UINT8 keyId); |
| |
| /* functions */ |
| |
| /** |
| * |
| * mainSec_create |
| * |
| * \b Description: |
| * |
| * Allocate memory for the main security context, and create all the rest of the needed contexts. |
| * |
| * \b ARGS: |
| * |
| * I - hOs - OS handle for OS operations. |
| * |
| * \b RETURNS: |
| * |
| * pointer to main security context. If failed, returns NULL. |
| * |
| * \sa |
| */ |
| mainSec_t* mainSec_create(TI_HANDLE hOs) |
| { |
| mainSec_t *pHandle; |
| TI_STATUS status; |
| |
| /* allocate association context memory */ |
| pHandle = (mainSec_t*)os_memoryAlloc(hOs, sizeof(mainSec_t)); |
| if (pHandle == NULL) |
| { |
| return NULL; |
| } |
| |
| os_memoryZero(hOs, pHandle, sizeof(mainSec_t)); |
| |
| /* allocate memory for association state machine */ |
| status = fsm_Create(hOs, &pHandle->pMainSecSm, MAIN_SEC_MAX_NUM_STATES, MAIN_SEC_MAX_NUM_EVENTS); |
| if (status != TI_OK) |
| { |
| os_memoryFree(hOs, pHandle, sizeof(mainSec_t)); |
| return NULL; |
| } |
| |
| pHandle->pMainKeys = mainKeys_create(hOs); |
| if (pHandle->pMainKeys == NULL) |
| { |
| fsm_Unload(hOs, pHandle->pMainSecSm); |
| os_memoryFree(hOs, pHandle, sizeof(mainSec_t)); |
| return NULL; |
| } |
| |
| pHandle->pKeyParser = pHandle->pMainKeys->pKeyParser; |
| pHandle->hOs = hOs; |
| |
| /* created only for external security mode */ |
| pHandle->pExternalSec = externalSec_create(hOs); |
| |
| if (pHandle->pExternalSec == NULL) |
| { |
| fsm_Unload(hOs, pHandle->pMainSecSm); |
| mainKeys_unload(pHandle->pMainKeys); |
| os_memoryFree(hOs, pHandle, sizeof(mainSec_t)); |
| return NULL; |
| } |
| |
| return pHandle; |
| } |
| |
| /** |
| * |
| * mainSec_config |
| * |
| * \b Description: |
| * |
| * Init main security state machine state machine |
| * |
| * \b ARGS: |
| * |
| * none |
| * |
| * \b RETURNS: |
| * |
| * TI_OK on success, TI_NOK otherwise. |
| * |
| * \sa |
| */ |
| TI_STATUS mainSec_config (mainSec_t *pMainSec, |
| mainSecInitData_t *pInitData, |
| void *pParent, |
| TI_HANDLE hReport, |
| TI_HANDLE hOs, |
| TI_HANDLE hCtrlData, |
| TI_HANDLE hEvHandler, |
| TI_HANDLE hConn, |
| TI_HANDLE hTimer) |
| { |
| TI_STATUS status; |
| |
| pMainSec->setKey = mainSec_setKey; |
| pMainSec->removeKey = mainSec_removeKey; |
| pMainSec->setDefaultKeyId = mainSec_setDefaultKeyId; |
| |
| pMainSec->pParent = pParent; |
| pMainSec->hReport = hReport; |
| pMainSec->hOs = hOs; |
| |
| TRACE4(pMainSec->hReport, REPORT_SEVERITY_SM, "MainSec SM: config, authProtocol = %d, keyExchangeProtocol=%d, unicastSuite=%d, broadcastSuite=%d\n", pInitData->pPaeConfig->authProtocol, pInitData->pPaeConfig->keyExchangeProtocol, pInitData->pPaeConfig->unicastSuite, pInitData->pPaeConfig->broadcastSuite); |
| |
| if (TI_TRUE == pMainSec->pParent->bRsnExternalMode) |
| { |
| status = externalSec_config(pMainSec); |
| } |
| else |
| { |
| switch (pInitData->pPaeConfig->keyExchangeProtocol) |
| { |
| case RSN_KEY_MNG_NONE: |
| status = mainSecSmNull_config(pMainSec, pInitData->pPaeConfig); |
| break; |
| case RSN_KEY_MNG_802_1X: |
| status = mainSecKeysOnly_config(pMainSec, pInitData->pPaeConfig); |
| break; |
| default: |
| status = mainSecSmNull_config(pMainSec, pInitData->pPaeConfig); |
| break; |
| } |
| } |
| |
| status = mainKeys_config (pMainSec->pMainKeys, |
| pInitData->pPaeConfig, |
| pMainSec, |
| pMainSec->hReport, |
| pMainSec->hOs, |
| hCtrlData, |
| hEvHandler, |
| hConn, |
| pMainSec->pParent, |
| hTimer); |
| if (status != TI_OK) |
| { |
| TRACE0(pMainSec->hReport, REPORT_SEVERITY_ERROR, "MAIN_SEC_SM: error in configuring mainKeys SM\n"); |
| return status; |
| } |
| |
| TRACE0(pMainSec->hReport, REPORT_SEVERITY_SM, "MAIN_SEC_SM: successful configuration SM\n"); |
| |
| return status; |
| } |
| |
| /** |
| * |
| * mainSec_config |
| * |
| * \b Description: |
| * |
| * Init main security state machine state machine |
| * |
| * \b ARGS: |
| * |
| * none |
| * |
| * \b RETURNS: |
| * |
| * TI_OK on success, TI_NOK otherwise. |
| * |
| * \sa |
| */ |
| TI_STATUS mainSec_unload(mainSec_t *pMainSec) |
| { |
| TI_STATUS status; |
| |
| if (pMainSec == NULL) |
| { |
| return TI_NOK; |
| } |
| |
| status = mainKeys_unload(pMainSec->pMainKeys); |
| if (status != TI_OK) |
| { |
| /* report failure but don't stop... */ |
| TRACE0(pMainSec->hReport, REPORT_SEVERITY_ERROR, "MAIN_SEC_SM: Error releasing Main Keys SM memory \n"); |
| } |
| |
| status = fsm_Unload(pMainSec->hOs, pMainSec->pMainSecSm); |
| if (status != TI_OK) |
| { |
| /* report failure but don't stop... */ |
| TRACE0(pMainSec->hReport, REPORT_SEVERITY_ERROR, "MAIN_SEC_SM: Error releasing FSM memory \n"); |
| } |
| |
| status = externalSec_Destroy (pMainSec->pExternalSec); |
| if (status != TI_OK) |
| { |
| /* report failure but don't stop... */ |
| TRACE0(pMainSec->hReport, REPORT_SEVERITY_ERROR, "MAIN_SEC_SM: Error releasing External Security SM memory \n"); |
| } |
| |
| os_memoryFree(pMainSec->hOs, pMainSec, sizeof(mainSec_t)); |
| |
| return TI_OK; |
| } |
| |
| /** |
| * |
| * mainSec_setKey |
| * |
| * \b Description: |
| * |
| * Start the NULL main security SM. Reports success to the rsn module immediately. |
| * |
| * \b ARGS: |
| * |
| * none |
| * |
| * \b RETURNS: |
| * |
| * TI_OK on success, TI_NOK otherwise. |
| * |
| * \sa |
| */ |
| TI_STATUS mainSec_setKey(struct _mainSec_t *pMainSec, TSecurityKeys *pKey) |
| { |
| TI_STATUS status = TI_OK; |
| |
| if ((pMainSec == NULL) || (pKey == NULL)) |
| { |
| return TI_NOK; |
| } |
| |
| if (pKey->keyType != KEY_NULL) |
| { |
| TRACE6(pMainSec->hReport, REPORT_SEVERITY_INFORMATION, "MAIN_SEC_SM: setting key #%d, value = 0x%X 0x%X 0x%X 0x%X 0x%X\n", pKey->keyIndex, (TI_UINT8)pKey->encKey[0], (TI_UINT8)pKey->encKey[1], (TI_UINT8)pKey->encKey[2], (TI_UINT8)pKey->encKey[3], (TI_UINT8)pKey->encKey[4]); |
| |
| status = pMainSec->pParent->setKey(pMainSec->pParent, pKey); |
| } |
| |
| return status; |
| } |
| |
| /** |
| * |
| * mainSec_removeKey |
| * |
| * \b Description: |
| * |
| * Start the NULL main security SM. Reports success to the rsn module immediately. |
| * |
| * \b ARGS: |
| * |
| * none |
| * |
| * \b RETURNS: |
| * |
| * TI_OK on success, TI_NOK otherwise. |
| * |
| * \sa |
| */ |
| TI_STATUS mainSec_removeKey(struct _mainSec_t *pMainSec, TSecurityKeys *pKey) |
| { |
| TI_STATUS status = TI_OK; |
| |
| if ((pMainSec == NULL) || (pKey == NULL)) |
| { |
| return TI_NOK; |
| } |
| |
| if (pKey->keyType != KEY_NULL) |
| { |
| TRACE1(pMainSec->hReport, REPORT_SEVERITY_INFORMATION, "MAIN_SEC_SM: removing key #%d, \n", pKey->keyIndex); |
| |
| status = pMainSec->pParent->removeKey(pMainSec->pParent, pKey); |
| } |
| |
| return status; |
| } |
| |
| /** |
| * |
| * mainSec_setDefaultKeyId |
| * |
| * \b Description: |
| * |
| * Start the NULL main security SM. Reports success to the rsn module immediately. |
| * |
| * \b ARGS: |
| * |
| * none |
| * |
| * \b RETURNS: |
| * |
| * TI_OK on success, TI_NOK otherwise. |
| * |
| * \sa |
| */ |
| TI_STATUS mainSec_setDefaultKeyId(struct _mainSec_t *pMainSec, TI_UINT8 keyId) |
| { |
| TI_STATUS status = TI_OK; |
| |
| if (pMainSec == NULL) |
| { |
| return TI_NOK; |
| } |
| |
| status = pMainSec->pParent->setDefaultKeyId(pMainSec->pParent, keyId); |
| |
| return status; |
| } |
| |
| |