/* * sharedKeyAuthSm.c * * Copyright(c) 1998 - 2009 Texas Instruments. All rights reserved. * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * * * Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * * Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in * the documentation and/or other materials provided with the * distribution. * * Neither the name Texas Instruments nor the names of its * contributors may be used to endorse or promote products derived * from this software without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ /** \file sharedKeyAuthSm.c * \brief shared key 802.11 authentication SM source * * \see sharedKeyAuthSm.h */ /***************************************************************************/ /* */ /* MODULE: sharedKeyAuthSm.c */ /* PURPOSE: shared key 802.11 authentication SM source */ /* */ /***************************************************************************/ #define __FILE_ID__ FILE_ID_83 #include "osApi.h" #include "paramOut.h" #include "timer.h" #include "fsm.h" #include "report.h" #include "mlmeApi.h" #include "authSm.h" #include "sharedKeyAuthSm.h" /* Constants */ /** number of states in the state machine */ #define SHARED_KEY_AUTH_SM_NUM_STATES 4 /** number of events in the state machine */ #define SHARED_KEY_AUTH_SM_NUM_EVENTS 8 /* Enumerations */ /* Typedefs */ /* Structures */ /* External data definitions */ /* External functions definitions */ /* Global variables */ /* Local function prototypes */ /* functions */ /** * * sharedKeyAuth_smConfig - configure a new authentication SM * * \b Description: * * Configure a new authentication SM. * * \b ARGS: * * I - hAuth - Association SM context \n * I - hMlme - MLME SM context \n * I - hSiteMgr - Site manager context \n * I - hCtrlData - Control data context \n * I - hTxData - TX data context \n * I - hHalCtrl - Hal control context \n * I - hReport - Report context \n * I - hOs - OS context \n * I - authTimeout - Association SM timeout \n * I - authMaxCount - Max number of authentication requests to send \n * * \b RETURNS: * * TI_OK if successful, TI_NOK otherwise. * * \sa sharedKeyAuth_Create, sharedKeyAuth_Unload */ TI_STATUS sharedKeyAuth_Config(TI_HANDLE hAuth, TI_HANDLE hOs) { auth_t *pHandle; TI_STATUS status; /** Main 802.1X State Machine matrix */ fsm_actionCell_t sharedKeyAuth_smMatrix[SHARED_KEY_AUTH_SM_NUM_STATES][SHARED_KEY_AUTH_SM_NUM_EVENTS] = { /* next state and actions for IDLE state */ {{SHARED_KEY_AUTH_SM_STATE_WAIT_1, (fsm_Action_t)sharedKeyAuth_smStartIdle}, {SHARED_KEY_AUTH_SM_STATE_IDLE, (fsm_Action_t)sharedKeyAuth_smActionUnexpected}, {SHARED_KEY_AUTH_SM_STATE_IDLE, (fsm_Action_t)sharedKeyAuth_smActionUnexpected}, {SHARED_KEY_AUTH_SM_STATE_IDLE, (fsm_Action_t)sharedKeyAuth_smActionUnexpected}, {SHARED_KEY_AUTH_SM_STATE_IDLE, (fsm_Action_t)sharedKeyAuth_smActionUnexpected}, {SHARED_KEY_AUTH_SM_STATE_IDLE, (fsm_Action_t)sharedKeyAuth_smActionUnexpected}, {SHARED_KEY_AUTH_SM_STATE_IDLE, (fsm_Action_t)sharedKeyAuth_smActionUnexpected}, {SHARED_KEY_AUTH_SM_STATE_IDLE, (fsm_Action_t)sharedKeyAuth_smActionUnexpected} }, /* next state and actions for WAIT_1 state */ {{SHARED_KEY_AUTH_SM_STATE_WAIT_1, (fsm_Action_t)sharedKeyAuth_smActionUnexpected}, {SHARED_KEY_AUTH_SM_STATE_IDLE, (fsm_Action_t)sharedKeyAuth_smStopWait}, {SHARED_KEY_AUTH_SM_STATE_WAIT_2, (fsm_Action_t)sharedKeyAuth_smSuccess1Wait1}, {SHARED_KEY_AUTH_SM_STATE_IDLE, (fsm_Action_t)sharedKeyAuth_smFailure1Wait1}, {SHARED_KEY_AUTH_SM_STATE_WAIT_1, (fsm_Action_t)sharedKeyAuth_smActionUnexpected}, {SHARED_KEY_AUTH_SM_STATE_WAIT_1, (fsm_Action_t)sharedKeyAuth_smActionUnexpected}, {SHARED_KEY_AUTH_SM_STATE_WAIT_1, (fsm_Action_t)sharedKeyAuth_smTimeoutWait1}, {SHARED_KEY_AUTH_SM_STATE_IDLE, (fsm_Action_t)sharedKeyAuth_smMaxRetryWait} }, /* next state and actions for WAIT_2 state */ {{SHARED_KEY_AUTH_SM_STATE_WAIT_2, (fsm_Action_t)sharedKeyAuth_smActionUnexpected}, {SHARED_KEY_AUTH_SM_STATE_IDLE, (fsm_Action_t)sharedKeyAuth_smStopWait}, {SHARED_KEY_AUTH_SM_STATE_WAIT_2, (fsm_Action_t)sharedKeyAuth_smActionUnexpected}, {SHARED_KEY_AUTH_SM_STATE_WAIT_2, (fsm_Action_t)sharedKeyAuth_smActionUnexpected}, {SHARED_KEY_AUTH_SM_STATE_AUTH, (fsm_Action_t)sharedKeyAuth_smSuccess2Wait2}, {SHARED_KEY_AUTH_SM_STATE_IDLE, (fsm_Action_t)sharedKeyAuth_smFailure2Wait2}, {SHARED_KEY_AUTH_SM_STATE_WAIT_2, (fsm_Action_t)sharedKeyAuth_smTimeoutWait2}, {SHARED_KEY_AUTH_SM_STATE_IDLE, (fsm_Action_t)sharedKeyAuth_smMaxRetryWait} }, /* next state and actions for AUTH state */ {{SHARED_KEY_AUTH_SM_STATE_AUTH, (fsm_Action_t)sharedKeyAuth_smActionUnexpected}, {SHARED_KEY_AUTH_SM_STATE_IDLE, (fsm_Action_t)sharedKeyAuth_smStopAuth}, {SHARED_KEY_AUTH_SM_STATE_AUTH, (fsm_Action_t)sharedKeyAuth_smActionUnexpected}, {SHARED_KEY_AUTH_SM_STATE_AUTH, (fsm_Action_t)sharedKeyAuth_smActionUnexpected}, {SHARED_KEY_AUTH_SM_STATE_AUTH, (fsm_Action_t)sharedKeyAuth_smActionUnexpected}, {SHARED_KEY_AUTH_SM_STATE_AUTH, (fsm_Action_t)sharedKeyAuth_smActionUnexpected}, {SHARED_KEY_AUTH_SM_STATE_AUTH, (fsm_Action_t)sharedKeyAuth_smActionUnexpected}, {SHARED_KEY_AUTH_SM_STATE_AUTH, (fsm_Action_t)sharedKeyAuth_smActionUnexpected} }}; if (hAuth == NULL) { return TI_NOK; } pHandle = (auth_t*)hAuth; status = fsm_Config(pHandle->pAuthSm, &sharedKeyAuth_smMatrix[0][0], SHARED_KEY_AUTH_SM_NUM_STATES, SHARED_KEY_AUTH_SM_NUM_EVENTS, auth_skSMEvent, hOs); if (status != TI_OK) { return TI_NOK; } pHandle->currentState = SHARED_KEY_AUTH_SM_STATE_IDLE; return TI_OK; } TI_STATUS auth_skSMEvent(TI_UINT8 *currentState, TI_UINT8 event, TI_HANDLE hAuth) { auth_t *pAuth = (auth_t *)hAuth; TI_STATUS status; TI_UINT8 nextState; status = fsm_GetNextState(pAuth->pAuthSm, *currentState, event, &nextState); if (status != TI_OK) { TRACE0(pAuth->hReport, REPORT_SEVERITY_SM, "State machine error, failed getting next state\n"); return(TI_NOK); } TRACE3(pAuth->hReport, REPORT_SEVERITY_INFORMATION, "auth_skSMEvent: <currentState = %d, event = %d> --> nextState = %d\n", *currentState, event, nextState); status = fsm_Event(pAuth->pAuthSm, currentState, event, (void *)pAuth); return status; } /** * * sharedKeyAuth_Recv - Recive a message from the AP * * \b Description: * * Parse a message form the AP and perform the appropriate event. * * \b ARGS: * * I - hAuth - Association SM context \n * * \b RETURNS: * * TI_OK if successful, TI_NOK otherwise. * * \sa sharedKeyAuth_Start, sharedKeyAuth_Stop */ TI_STATUS sharedKeyAuth_Recv(TI_HANDLE hAuth, mlmeFrameInfo_t *pFrame) { TI_STATUS status = TI_NOK; auth_t *pHandle; TI_UINT16 authAlgo; TI_UINT16 rspSeq; pHandle = (auth_t*)hAuth; if (pHandle == NULL) { return TI_NOK; } /* check response status */ authAlgo = ENDIAN_HANDLE_WORD(pFrame->content.auth.authAlgo); if (authAlgo != AUTH_LEGACY_SHARED_KEY) { TRACE0(pHandle->hReport, REPORT_SEVERITY_SM, "SHARED_KEY_AUTH_SM: DEBUG recieved authentication message with wrong algorithm \n"); return TI_NOK; } /* check response status */ rspSeq = pFrame->content.auth.seqNum; pHandle->authData.status = pFrame->content.auth.status; pHandle->authData.pChalange = (char *)(pFrame->content.auth.pChallenge->text); pHandle->authData.challangeLen = pFrame->content.auth.pChallenge->hdr[1]; if (pHandle->authData.status == STATUS_SUCCESSFUL) { switch (rspSeq) { case 2: TRACE0(pHandle->hReport, REPORT_SEVERITY_SM, "SHARED_KEY_AUTH_SM: DEBUG Success authenticating to AP stage 1\n"); if (pFrame->content.auth.pChallenge->hdr[0] != CHALLANGE_TEXT_IE_ID) { TRACE0(pHandle->hReport, REPORT_SEVERITY_ERROR, "SHARED_KEY_AUTH_SM: Wrong element ID for challange \n"); status = TI_NOK; break; } status = auth_skSMEvent(&pHandle->currentState, SHARED_KEY_AUTH_SM_EVENT_SUCCESS_1, hAuth); break; case 4: TRACE0(pHandle->hReport, REPORT_SEVERITY_SM, "SHARED_KEY_AUTH_SM: DEBUG Success authenticating to AP stage 2\n"); status = auth_skSMEvent(&pHandle->currentState, SHARED_KEY_AUTH_SM_EVENT_SUCCESS_2, hAuth); break; default: TRACE0(pHandle->hReport, REPORT_SEVERITY_ERROR, "SHARED_KEY_AUTH_SM: Wrong sequence number \n"); status = TI_NOK; break; } } else { switch (rspSeq) { case 2: status = auth_skSMEvent(&pHandle->currentState, SHARED_KEY_AUTH_SM_EVENT_FAIL_1, hAuth); break; case 4: status = auth_skSMEvent(&pHandle->currentState, SHARED_KEY_AUTH_SM_EVENT_FAIL_2, hAuth); break; default: status = TI_NOK; break; } } return status; } /* state machine functions */ TI_STATUS sharedKeyAuth_smStartIdle(auth_t *hAuth) { TI_STATUS status; status = sharedKeyAuth_smResetRetry(hAuth); status = sharedKeyAuth_smSendAuth1(hAuth); status = sharedKeyAuth_smStartTimer(hAuth); status = sharedKeyAuth_smIncRetry(hAuth); return status; } TI_STATUS sharedKeyAuth_smStopWait(auth_t *hAuth) { TI_STATUS status; status = sharedKeyAuth_smStopTimer(hAuth); return status; } TI_STATUS sharedKeyAuth_smSuccess1Wait1(auth_t *hAuth) { TI_STATUS status; status = sharedKeyAuth_smResetRetry(hAuth); if (status != TI_OK) return status; status = sharedKeyAuth_smStopTimer(hAuth); if (status != TI_OK) return status; status = sharedKeyAuth_smSendAuth2(hAuth); if (status != TI_OK) return status; status = sharedKeyAuth_smStartTimer(hAuth); if (status != TI_OK) return status; status = sharedKeyAuth_smIncRetry(hAuth); return status; } TI_STATUS sharedKeyAuth_smFailure1Wait1(auth_t *hAuth) { TI_STATUS status; status = sharedKeyAuth_smStopTimer(hAuth); status = sharedKeyAuth_smReportFailure(hAuth); return status; } TI_STATUS sharedKeyAuth_smTimeoutWait1(auth_t *hAuth) { TI_STATUS status; status = sharedKeyAuth_smSendAuth1(hAuth); status = sharedKeyAuth_smStartTimer(hAuth); status = sharedKeyAuth_smIncRetry(hAuth); return status; } TI_STATUS sharedKeyAuth_smMaxRetryWait(auth_t *hAuth) { TI_STATUS status; status = sharedKeyAuth_smReportFailure(hAuth); return status; } TI_STATUS sharedKeyAuth_smSuccess2Wait2(auth_t *hAuth) { TI_STATUS status; status = sharedKeyAuth_smStopTimer(hAuth); status = sharedKeyAuth_smReportSuccess(hAuth); return status; } TI_STATUS sharedKeyAuth_smFailure2Wait2(auth_t *hAuth) { TI_STATUS status; status = sharedKeyAuth_smStopTimer(hAuth); status = sharedKeyAuth_smReportFailure(hAuth); return status; } TI_STATUS sharedKeyAuth_smTimeoutWait2(auth_t *hAuth) { TI_STATUS status; status = sharedKeyAuth_smSendAuth2(hAuth); status = sharedKeyAuth_smStartTimer(hAuth); status = sharedKeyAuth_smIncRetry(hAuth); return status; } /* action routines for authentication SM */ TI_STATUS sharedKeyAuth_smSendAuth1(auth_t *hAuth) { TI_STATUS status; status = auth_smMsgBuild(hAuth, 1, 0, NULL, 0); return status; } TI_STATUS sharedKeyAuth_smSendAuth2(auth_t *hAuth) { TI_STATUS status; /* GET SECRET */ /* ENCRYPT CHALLANGE WITH SECRET */ status = auth_smMsgBuild(hAuth, 3, 0, (TI_UINT8 *)(hAuth->authData.pChalange), hAuth->authData.challangeLen); return status; } TI_STATUS sharedKeyAuth_smStopAuth(auth_t *hAuth) { return TI_OK; } TI_STATUS sharedKeyAuth_smActionUnexpected(auth_t *hAuth) { return TI_OK; } /* local functions */ TI_STATUS sharedKeyAuth_smResetRetry(auth_t *hAuth) { if (hAuth == NULL) { return TI_NOK; } hAuth->retryCount = 0; return TI_OK; } TI_STATUS sharedKeyAuth_smIncRetry(auth_t *hAuth) { if (hAuth == NULL) { return TI_NOK; } hAuth->retryCount++; return TI_OK; } TI_STATUS sharedKeyAuth_smReportSuccess(auth_t *hAuth) { TI_STATUS status; if (hAuth == NULL) { return TI_NOK; } status = mlme_reportAuthStatus(hAuth->hMlme, hAuth->authData.status); return status; } TI_STATUS sharedKeyAuth_smReportFailure(auth_t *hAuth) { TI_STATUS status; if (hAuth == NULL) { return TI_NOK; } status = mlme_reportAuthStatus(hAuth->hMlme, hAuth->authData.status); return status; } TI_STATUS sharedKeyAuth_smStartTimer(auth_t *hAuth) { if (hAuth == NULL) { return TI_NOK; } tmr_StartTimer (hAuth->hAuthSmTimer, auth_smTimeout, (TI_HANDLE)hAuth, hAuth->timeout, TI_FALSE); return TI_OK; } TI_STATUS sharedKeyAuth_smStopTimer(auth_t *hAuth) { if (hAuth == NULL) { return TI_NOK; } tmr_StopTimer (hAuth->hAuthSmTimer); return TI_OK; } TI_STATUS sharedKey_Timeout(auth_t *pAuth) { if (pAuth->retryCount >= pAuth->maxCount) { pAuth->authData.status = STATUS_PACKET_REJ_TIMEOUT; return auth_skSMEvent(&pAuth->currentState, SHARED_KEY_AUTH_SM_EVENT_MAX_RETRY, pAuth); } return auth_skSMEvent(&pAuth->currentState, SHARED_KEY_AUTH_SM_EVENT_TIMEOUT, pAuth); }