summaryrefslogtreecommitdiff
path: root/wl1271/stad/src/Sta_Management/openAuthSm.c
diff options
context:
space:
mode:
Diffstat (limited to 'wl1271/stad/src/Sta_Management/openAuthSm.c')
-rw-r--r--wl1271/stad/src/Sta_Management/openAuthSm.c443
1 files changed, 0 insertions, 443 deletions
diff --git a/wl1271/stad/src/Sta_Management/openAuthSm.c b/wl1271/stad/src/Sta_Management/openAuthSm.c
deleted file mode 100644
index b57645b..0000000
--- a/wl1271/stad/src/Sta_Management/openAuthSm.c
+++ /dev/null
@@ -1,443 +0,0 @@
-/*
- * openAuthSm.c
- *
- * Copyright(c) 1998 - 2009 Texas Instruments. All rights reserved.
- * All rights reserved.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- *
- * * Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- * * Redistributions in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in
- * the documentation and/or other materials provided with the
- * distribution.
- * * Neither the name Texas Instruments nor the names of its
- * contributors may be used to endorse or promote products derived
- * from this software without specific prior written permission.
- *
- * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
- * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
- * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
- * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
- * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
- * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
- * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
- * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
- * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
- * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
- * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
- */
-
-/** \file authSM.c
- * \brief 802.11 authentication SM source
- *
- * \see authSM.h
- */
-
-
-/***************************************************************************/
-/* */
-/* MODULE: authSM.c */
-/* PURPOSE: 802.11 authentication SM source */
-/* */
-/***************************************************************************/
-
-#define __FILE_ID__ FILE_ID_70
-#include "osApi.h"
-
-#include "paramOut.h"
-#include "timer.h"
-#include "fsm.h"
-#include "report.h"
-#include "mlmeApi.h"
-#include "authSm.h"
-#include "openAuthSm.h"
-#include "rsnApi.h"
-
-/* Constants */
-
-/** number of states in the state machine */
-#define OPEN_AUTH_SM_NUM_STATES 3
-
-/** number of events in the state machine */
-#define OPEN_AUTH_SM_NUM_EVENTS 6
-
-/* Enumerations */
-
-/* Typedefs */
-
-/* Structures */
-
-/* External data definitions */
-
-/* External functions definitions */
-
-/* Global variables */
-
-/* Local function prototypes */
-
-/* functions */
-
-/**
-*
-* openAuth_smConfig - configure a new authentication SM
-*
-* \b Description:
-*
-* Configure a new authentication SM.
-*
-* \b ARGS:
-*
-* I - hAuth - Association SM context \n
-* I - hMlme - MLME SM context \n
-* I - hSiteMgr - Site manager context \n
-* I - hCtrlData - Control data context \n
-* I - hTxData - TX data context \n
-* I - hHalCtrl - Hal control context \n
-* I - hReport - Report context \n
-* I - hOs - OS context \n
-* I - authTimeout - Association SM timeout \n
-* I - authMaxCount - Max number of authentication requests to send \n
-*
-* \b RETURNS:
-*
-* TI_OK if successful, TI_NOK otherwise.
-*
-* \sa openAuth_Create, openAuth_Unload
-*/
-TI_STATUS openAuth_Config(TI_HANDLE hAuth, TI_HANDLE hOs)
-{
- auth_t *pHandle;
- TI_STATUS status;
- /** Main 802.1X State Machine matrix */
- fsm_actionCell_t openAuth_smMatrix[OPEN_AUTH_SM_NUM_STATES][OPEN_AUTH_SM_NUM_EVENTS] =
- {
- /* next state and actions for IDLE state */
- {{OPEN_AUTH_SM_STATE_WAIT, (fsm_Action_t)openAuth_smStartIdle},
- {OPEN_AUTH_SM_STATE_IDLE, (fsm_Action_t)openAuth_smActionUnexpected},
- {OPEN_AUTH_SM_STATE_IDLE, (fsm_Action_t)openAuth_smActionUnexpected},
- {OPEN_AUTH_SM_STATE_IDLE, (fsm_Action_t)openAuth_smActionUnexpected},
- {OPEN_AUTH_SM_STATE_IDLE, (fsm_Action_t)openAuth_smActionUnexpected},
- {OPEN_AUTH_SM_STATE_IDLE, (fsm_Action_t)openAuth_smActionUnexpected}
- },
- /* next state and actions for WAIT state */
- {{OPEN_AUTH_SM_STATE_WAIT, (fsm_Action_t)openAuth_smActionUnexpected},
- {OPEN_AUTH_SM_STATE_IDLE, (fsm_Action_t)openAuth_smStopWait},
- {OPEN_AUTH_SM_STATE_AUTH, (fsm_Action_t)openAuth_smSuccessWait},
- {OPEN_AUTH_SM_STATE_IDLE, (fsm_Action_t)openAuth_smFailureWait},
- {OPEN_AUTH_SM_STATE_WAIT, (fsm_Action_t)openAuth_smTimeoutWait},
- {OPEN_AUTH_SM_STATE_IDLE, (fsm_Action_t)openAuth_smMaxRetryWait}
- },
- /* next state and actions for AUTH state */
- {{OPEN_AUTH_SM_STATE_AUTH, (fsm_Action_t)openAuth_smActionUnexpected},
- {OPEN_AUTH_SM_STATE_IDLE, (fsm_Action_t)openAuth_smStopAuth},
- {OPEN_AUTH_SM_STATE_AUTH, (fsm_Action_t)openAuth_smActionUnexpected},
- {OPEN_AUTH_SM_STATE_AUTH, (fsm_Action_t)openAuth_smActionUnexpected},
- {OPEN_AUTH_SM_STATE_AUTH, (fsm_Action_t)openAuth_smActionUnexpected},
- {OPEN_AUTH_SM_STATE_AUTH, (fsm_Action_t)openAuth_smActionUnexpected}
- }};
-
-
- if (hAuth == NULL)
- {
- return TI_NOK;
- }
-
- pHandle = (auth_t*)hAuth;
-
- status = fsm_Config(pHandle->pAuthSm, &openAuth_smMatrix[0][0],
- OPEN_AUTH_SM_NUM_STATES, OPEN_AUTH_SM_NUM_EVENTS, auth_osSMEvent, hOs);
- if (status != TI_OK)
- {
- return TI_NOK;
- }
-
- pHandle->currentState = OPEN_AUTH_SM_STATE_IDLE;
-
- return TI_OK;
-}
-
-
-TI_STATUS auth_osSMEvent(TI_UINT8 *currentState, TI_UINT8 event, TI_HANDLE hAuth)
-{
- auth_t *pAuth = (auth_t *)hAuth;
- TI_STATUS status;
- TI_UINT8 nextState;
-
- status = fsm_GetNextState(pAuth->pAuthSm, *currentState, event, &nextState);
- if (status != TI_OK)
- {
- TRACE0(pAuth->hReport, REPORT_SEVERITY_SM, "State machine error, failed getting next state\n");
- return(TI_NOK);
- }
-
- TRACE3( pAuth->hReport, REPORT_SEVERITY_INFORMATION, "auth_osSMEvent: <currentState = %d, event = %d> --> nextState = %d\n", *currentState, event, nextState);
-
- status = fsm_Event(pAuth->pAuthSm, currentState, event, (void *)pAuth);
-
- return status;
-}
-
-/**
-*
-* openAuth_Recv - Recive a message from the AP
-*
-* \b Description:
-*
-* Parse a message form the AP and perform the appropriate event.
-*
-* \b ARGS:
-*
-* I - hAuth - Association SM context \n
-*
-* \b RETURNS:
-*
-* TI_OK if successful, TI_NOK otherwise.
-*
-* \sa openAuth_Start, openAuth_Stop
-*/
-TI_STATUS openAuth_Recv(TI_HANDLE hAuth, mlmeFrameInfo_t *pFrame)
-{
- TI_STATUS status;
- auth_t *pHandle;
- TI_UINT16 authAlgo;
-
- pHandle = (auth_t*)hAuth;
-
- if (pHandle == NULL)
- {
- return TI_NOK;
- }
-
- /* check response status */
- authAlgo = ENDIAN_HANDLE_WORD(pFrame->content.auth.authAlgo);
- if ((authAlgo != AUTH_LEGACY_OPEN_SYSTEM) &&
- (authAlgo != AUTH_LEGACY_RESERVED1))
- {
-TRACE0(pHandle->hReport, REPORT_SEVERITY_SM, "OPEN_AUTH_SM: DEBUG recieved authentication message with wrong algorithm \n");
- rsn_reportAuthFailure(pHandle->hRsn, RSN_AUTH_STATUS_INVALID_TYPE);
- return TI_NOK;
- }
-
- if ((pHandle->authType==AUTH_LEGACY_RESERVED1) && (authAlgo !=AUTH_LEGACY_RESERVED1))
- {
- rsn_reportAuthFailure(pHandle->hRsn, RSN_AUTH_STATUS_INVALID_TYPE);
- }
- TRACE1(pHandle->hReport, REPORT_SEVERITY_SM, "OPEN_AUTH_SM: DEBUG Authentication status is %d \n", pFrame->content.auth.status);
-
- pHandle->authData.status = pFrame->content.auth.status;
-
- if (pHandle->authData.status == STATUS_SUCCESSFUL)
- {
- status = auth_osSMEvent(&pHandle->currentState, OPEN_AUTH_SM_EVENT_SUCCESS, pHandle);
- } else {
- rsn_reportAuthFailure(pHandle->hRsn, RSN_AUTH_STATUS_INVALID_TYPE);
- status = auth_osSMEvent(&pHandle->currentState, OPEN_AUTH_SM_EVENT_FAIL, pHandle);
- }
-
- return status;
-}
-
-/* state machine functions */
-
-TI_STATUS openAuth_smStartIdle(auth_t *pAuth)
-{
- TI_STATUS status;
-
- status = openAuth_smResetRetry(pAuth);
- if (TI_OK != status)
- {
- TRACE0(pAuth->hReport, REPORT_SEVERITY_ERROR, "openAuth_smStartIdle: openAuth_smResetRetry return\n");
- return status;
- }
-
- status = openAuth_smSendAuthReq(pAuth);
- if (TI_OK != status)
- {
- TRACE0(pAuth->hReport, REPORT_SEVERITY_ERROR, "openAuth_smStartIdle: openAuth_smSendAuthReq return\n");
- return status;
- }
-
- status = openAuth_smStartTimer(pAuth);
- if (TI_OK != status)
- {
- TRACE0(pAuth->hReport, REPORT_SEVERITY_ERROR, "openAuth_smStartIdle: openAuth_smStartTimer return\n");
- return status;
- }
-
- status = openAuth_smIncRetry(pAuth);
- if (TI_OK != status)
- {
- TRACE0(pAuth->hReport, REPORT_SEVERITY_ERROR, "openAuth_smStartIdle: openAuth_smIncRetry return\n");
- return status;
- }
-
- return status;
-}
-
-TI_STATUS openAuth_smStopWait(auth_t *hAuth)
-{
- TI_STATUS status;
-
- status = openAuth_smStopTimer(hAuth);
-
- return status;
-}
-
-TI_STATUS openAuth_smSuccessWait(auth_t *hAuth)
-{
- TI_STATUS status;
-
- status = openAuth_smStopTimer(hAuth);
- status = openAuth_smReportSuccess(hAuth);
-
- return status;
-}
-
-TI_STATUS openAuth_smFailureWait(auth_t *hAuth)
-{
- TI_STATUS status;
-
- status = openAuth_smStopTimer(hAuth);
- status = openAuth_smReportFailure(hAuth);
-
- return status;
-}
-
-TI_STATUS openAuth_smTimeoutWait(auth_t *hAuth)
-{
- TI_STATUS status;
-
- status = openAuth_smSendAuthReq(hAuth);
- status = openAuth_smStartTimer(hAuth);
- status = openAuth_smIncRetry(hAuth);
-
- return status;
-}
-
-TI_STATUS openAuth_smMaxRetryWait(auth_t *hAuth)
-{
- TI_STATUS status;
-
- rsn_reportAuthFailure(hAuth->hRsn, RSN_AUTH_STATUS_TIMEOUT);
- status = openAuth_smReportFailure(hAuth);
-
- return status;
-}
-
-TI_STATUS openAuth_smSendAuthReq(auth_t *hAuth)
-{
- TI_STATUS status;
-
- status = auth_smMsgBuild(hAuth, 1, 0, NULL, 0);
-
- return status;
-}
-
-TI_STATUS openAuth_smStopAuth(auth_t *hAuth)
-{
- return TI_OK;
-}
-
-TI_STATUS openAuth_smActionUnexpected(auth_t *hAuth)
-{
- return TI_OK;
-}
-
-/* local functions */
-
-
-TI_STATUS openAuth_smResetRetry(auth_t *hAuth)
-{
- if (hAuth == NULL)
- {
- return TI_NOK;
- }
-
- hAuth->retryCount = 0;
-
- return TI_OK;
-}
-
-TI_STATUS openAuth_smIncRetry(auth_t *hAuth)
-{
- if (hAuth == NULL)
- {
- return TI_NOK;
- }
-
- hAuth->retryCount++;
-
- return TI_OK;
-}
-
-TI_STATUS openAuth_smReportSuccess(auth_t *hAuth)
-{
- TI_STATUS status;
-
- if (hAuth == NULL)
- {
- return TI_NOK;
- }
- status = mlme_reportAuthStatus(hAuth->hMlme, hAuth->authData.status);
-
- return status;
-}
-
-TI_STATUS openAuth_smReportFailure(auth_t *hAuth)
-{
- TI_STATUS status;
-
- if (hAuth == NULL)
- {
- return TI_NOK;
- }
-
- status = mlme_reportAuthStatus(hAuth->hMlme, hAuth->authData.status);
-
- return status;
-}
-
-TI_STATUS openAuth_smStartTimer(auth_t *hAuth)
-{
- if (hAuth == NULL)
- {
- return TI_NOK;
- }
-
- tmr_StartTimer (hAuth->hAuthSmTimer,
- auth_smTimeout,
- (TI_HANDLE)hAuth,
- hAuth->timeout,
- TI_FALSE);
-
- return TI_OK;
-}
-
-TI_STATUS openAuth_smStopTimer(auth_t *hAuth)
-{
- if (hAuth == NULL)
- {
- return TI_NOK;
- }
-
- tmr_StopTimer (hAuth->hAuthSmTimer);
-
- return TI_OK;
-}
-
-TI_STATUS openAuth_Timeout(auth_t *pAuth)
-{
- if (pAuth->retryCount >= pAuth->maxCount)
- {
- pAuth->authData.status = STATUS_PACKET_REJ_TIMEOUT;
- return auth_osSMEvent(&pAuth->currentState, OPEN_AUTH_SM_EVENT_MAX_RETRY, pAuth);
- }
-
- return auth_osSMEvent(&pAuth->currentState, OPEN_AUTH_SM_EVENT_TIMEOUT, pAuth);
-}
-
-