1 /******************************************************************
3 * Copyright 2014 Samsung Electronics All Rights Reserved.
7 * Licensed under the Apache License, Version 2.0 (the "License");
8 * you may not use this file except in compliance with the License.
9 * You may obtain a copy of the License at
11 * http://www.apache.org/licenses/LICENSE-2.0
13 * Unless required by applicable law or agreed to in writing, software
14 * distributed under the License is distributed on an "AS IS" BASIS,
15 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16 * See the License for the specific language governing permissions and
17 * limitations under the License.
19 ******************************************************************/
27 #include "cainterface.h"
28 #include "caremotehandler.h"
29 #include "camessagehandler.h"
30 #include "caprotocolmessage.h"
31 #include "canetworkconfigurator.h"
32 #include "cainterfacecontroller.h"
34 #if defined(__WITH_DTLS__) || defined(__WITH_TLS__)
35 #include "ca_adapter_net_ssl.h"
36 #endif // __WITH_DTLS__ or __WITH_TLS__
39 #include "catcpadapter.h"
42 CAGlobals_t caglobals = { .clientFlags = 0,
45 #define TAG "OIC_CA_CONN_MGR"
47 static bool g_isInitialized = false;
49 #if defined(__WITH_DTLS__) || defined(__WITH_TLS__)
50 // Taking callback all the way through adapters not the right approach, hence calling here.
51 extern void CAsetPkixInfoCallback(CAgetPkixInfoHandler infCallback);
52 extern void CAsetPskCredentialsCallback(CAgetPskCredentialsHandler credCallback);
53 extern void CAsetCredentialTypesCallback(CAgetCredentialTypesHandler credCallback);
54 #endif // __WITH_DTLS__ or __WITH_TLS__
57 CAResult_t CAInitialize()
59 OIC_LOG_V(DEBUG, TAG, "IoTivity version is v%s", IOTIVITY_VERSION);
60 OIC_LOG(DEBUG, TAG, "CAInitialize");
64 if (0 != OCSeedRandom())
66 OIC_LOG(ERROR, TAG, "Seed Random Failed");
69 CAResult_t res = CAInitializeMessageHandler();
70 if (res != CA_STATUS_OK)
72 OIC_LOG(ERROR, TAG, "CAInitialize has failed");
75 g_isInitialized = true;
83 OIC_LOG(DEBUG, TAG, "CATerminate");
87 CATerminateMessageHandler();
88 CATerminateNetworkType();
90 g_isInitialized = false;
94 CAResult_t CAStartListeningServer()
96 OIC_LOG(DEBUG, TAG, "CAStartListeningServer");
100 return CA_STATUS_NOT_INITIALIZED;
103 return CAStartListeningServerAdapters();
106 CAResult_t CAStopListeningServer()
108 OIC_LOG(DEBUG, TAG, "CAStopListeningServer");
110 if (!g_isInitialized)
112 return CA_STATUS_NOT_INITIALIZED;
115 return CAStopListeningServerAdapters();
118 CAResult_t CAStartDiscoveryServer()
120 OIC_LOG(DEBUG, TAG, "CAStartDiscoveryServer");
122 if (!g_isInitialized)
124 return CA_STATUS_NOT_INITIALIZED;
127 return CAStartDiscoveryServerAdapters();
130 void CARegisterHandler(CARequestCallback ReqHandler, CAResponseCallback RespHandler,
131 CAErrorCallback ErrorHandler)
133 OIC_LOG(DEBUG, TAG, "CARegisterHandler");
135 if (!g_isInitialized)
137 OIC_LOG(DEBUG, TAG, "CA is not initialized");
141 CASetInterfaceCallbacks(ReqHandler, RespHandler, ErrorHandler);
144 #if defined(__WITH_DTLS__) || defined(__WITH_TLS__)
145 #ifdef _ENABLE_MULTIPLE_OWNER_
146 const CASecureEndpoint_t *CAGetSecureEndpointData(const CAEndpoint_t *peer)
148 OIC_LOG(DEBUG, TAG, "IN CAGetSecurePeerInfo");
150 if (!g_isInitialized)
152 OIC_LOG(DEBUG, TAG, "CA is not initialized");
156 OIC_LOG(DEBUG, TAG, "OUT CAGetSecurePeerInfo");
157 return GetCASecureEndpointData(peer);
159 #endif //_ENABLE_MULTIPLE_OWNER_
161 CAResult_t CAregisterSslHandshakeCallback(CAErrorCallback tlsHandshakeCallback)
163 OIC_LOG(DEBUG, TAG, "CAregisterSslHandshakeCallback");
167 return CA_STATUS_NOT_INITIALIZED;
170 CAsetSslHandshakeCallback(tlsHandshakeCallback);
174 CAResult_t CAregisterPskCredentialsHandler(CAgetPskCredentialsHandler getTlsCredentialsHandler)
176 OIC_LOG_V(DEBUG, TAG, "In %s", __func__);
178 if (!g_isInitialized)
180 return CA_STATUS_NOT_INITIALIZED;
182 CAsetPskCredentialsCallback(getTlsCredentialsHandler);
183 OIC_LOG_V(DEBUG, TAG, "Out %s", __func__);
187 CAResult_t CAregisterPkixInfoHandler(CAgetPkixInfoHandler getPkixInfoHandler)
189 OIC_LOG_V(DEBUG, TAG, "In %s", __func__);
191 if (!g_isInitialized)
193 return CA_STATUS_NOT_INITIALIZED;
195 CAsetPkixInfoCallback(getPkixInfoHandler);
196 OIC_LOG_V(DEBUG, TAG, "Out %s", __func__);
200 CAResult_t CAregisterGetCredentialTypesHandler(CAgetCredentialTypesHandler getCredTypesHandler)
202 OIC_LOG_V(DEBUG, TAG, "In %s", __func__);
204 if (!g_isInitialized)
206 return CA_STATUS_NOT_INITIALIZED;
208 CAsetCredentialTypesCallback(getCredTypesHandler);
209 OIC_LOG_V(DEBUG, TAG, "Out %s", __func__);
212 #endif // __WITH_DTLS__ or __WITH_TLS__
214 CAResult_t CACreateEndpoint(CATransportFlags_t flags,
215 CATransportAdapter_t adapter,
218 CAEndpoint_t **object)
222 OIC_LOG(ERROR, TAG, "Invalid Parameter");
223 return CA_STATUS_INVALID_PARAM;
226 CAEndpoint_t *endpoint = CACreateEndpointObject(flags, adapter, addr, port);
229 return CA_STATUS_FAILED;
235 void CADestroyEndpoint(CAEndpoint_t *rep)
237 OIC_LOG(DEBUG, TAG, "CADestroyEndpoint");
242 CAResult_t CAGenerateToken(CAToken_t *token, uint8_t tokenLength)
244 OIC_LOG(DEBUG, TAG, "CAGenerateToken");
246 return CAGenerateTokenInternal(token, tokenLength);
249 void CADestroyToken(CAToken_t token)
251 OIC_LOG(DEBUG, TAG, "CADestroyToken");
253 CADestroyTokenInternal(token);
255 OIC_LOG(DEBUG, TAG, "OUT");
258 CAResult_t CAGetNetworkInformation(CAEndpoint_t **info, uint32_t *size)
260 OIC_LOG(DEBUG, TAG, "CAGetNetworkInformation");
262 if (!g_isInitialized)
264 return CA_STATUS_NOT_INITIALIZED;
267 return CAGetNetworkInformationInternal(info, size);
270 static CAResult_t CASendMessageMultiAdapter(const CAEndpoint_t *object, const void *sendMsg,
271 CADataType_t dataType)
273 OIC_LOG(DEBUG, TAG, "CASendMessageMultipleAdapter");
275 CATransportAdapter_t connTypes[] = {
278 ,CA_ADAPTER_GATT_BTLE
281 ,CA_ADAPTER_RFCOMM_BTEDR
287 ,CA_ADAPTER_REMOTE_ACCESS
294 CAEndpoint_t *cloneEp = CACloneEndpoint(object);
297 OIC_LOG(ERROR, TAG, "Failed to clone CAEndpoint");
298 return CA_MEMORY_ALLOC_FAILED;
301 CAResult_t ret = CA_STATUS_OK;
302 size_t numConnTypes = sizeof(connTypes) / sizeof(connTypes[0]);
304 for (size_t i = 0; i < numConnTypes && ret == CA_STATUS_OK; i++)
306 cloneEp->adapter = connTypes[i];
307 ret = CADetachSendMessage(cloneEp, sendMsg, dataType);
309 CAFreeEndpoint(cloneEp);
313 CAResult_t CASendRequest(const CAEndpoint_t *object, const CARequestInfo_t *requestInfo)
315 OIC_LOG(DEBUG, TAG, "CASendRequest");
317 if (!g_isInitialized)
319 return CA_STATUS_NOT_INITIALIZED;
322 if (requestInfo && requestInfo->isMulticast &&
323 (object->adapter == CA_DEFAULT_ADAPTER || object->adapter == CA_ALL_ADAPTERS))
325 return CASendMessageMultiAdapter(object, requestInfo, CA_REQUEST_DATA);
329 return CADetachSendMessage(object, requestInfo, CA_REQUEST_DATA);
333 CAResult_t CASendResponse(const CAEndpoint_t *object, const CAResponseInfo_t *responseInfo)
335 OIC_LOG(DEBUG, TAG, "CASendResponse");
337 if (!g_isInitialized)
339 return CA_STATUS_NOT_INITIALIZED;
342 if (!responseInfo || !object)
344 return CA_STATUS_INVALID_PARAM;
347 if (responseInfo->isMulticast &&
348 (object->adapter == CA_DEFAULT_ADAPTER || object->adapter == CA_ALL_ADAPTERS))
350 return CASendMessageMultiAdapter(object, responseInfo, responseInfo->info.dataType);
354 return CADetachSendMessage(object, responseInfo, responseInfo->info.dataType);
358 CAResult_t CASelectNetwork(CATransportAdapter_t interestedNetwork)
360 OIC_LOG_V(DEBUG, TAG, "Selected network : %d", interestedNetwork);
362 if (!g_isInitialized)
364 return CA_STATUS_NOT_INITIALIZED;
367 CAResult_t res = CA_STATUS_OK;
369 if (interestedNetwork & CA_ADAPTER_IP)
371 res = CAAddNetworkType(CA_ADAPTER_IP);
372 OIC_LOG_V(DEBUG, TAG, "CAAddNetworkType(CA_IP_ADAPTER) function returns result: %d", res);
374 else if (interestedNetwork & CA_ADAPTER_RFCOMM_BTEDR)
376 res = CAAddNetworkType(CA_ADAPTER_RFCOMM_BTEDR);
377 OIC_LOG_V(DEBUG, TAG, "CAAddNetworkType(CA_RFCOMM_ADAPTER) function returns result : %d", res);
379 else if (interestedNetwork & CA_ADAPTER_GATT_BTLE)
381 res = CAAddNetworkType(CA_ADAPTER_GATT_BTLE);
382 OIC_LOG_V(DEBUG, TAG, "CAAddNetworkType(CA_GATT_ADAPTER) function returns result : %d", res);
386 else if (interestedNetwork & CA_ADAPTER_REMOTE_ACCESS)
388 res = CAAddNetworkType(CA_ADAPTER_REMOTE_ACCESS);
389 OIC_LOG_V(DEBUG, TAG,
390 "CAAddNetworkType(CA_ADAPTER_REMOTE_ACCESS) function returns result : %d", res);
395 else if (interestedNetwork & CA_ADAPTER_TCP)
397 res = CAAddNetworkType(CA_ADAPTER_TCP);
398 OIC_LOG_V(DEBUG, TAG,
399 "CAAddNetworkType(CA_ADAPTER_TCP) function returns result : %d", res);
402 else if (interestedNetwork & CA_ADAPTER_NFC)
404 res = CAAddNetworkType(CA_ADAPTER_NFC);
405 OIC_LOG_V(DEBUG, TAG, "CAAddNetworkType(CA_ADAPTER_NFC) function returns result : %d", res);
409 res = CA_NOT_SUPPORTED;
414 CAResult_t CAUnSelectNetwork(CATransportAdapter_t nonInterestedNetwork)
416 OIC_LOG_V(DEBUG, TAG, "unselected network : %d", nonInterestedNetwork);
418 if (!g_isInitialized)
420 return CA_STATUS_NOT_INITIALIZED;
423 CAResult_t res = CA_STATUS_OK;
425 if (nonInterestedNetwork & CA_ADAPTER_IP)
427 res = CARemoveNetworkType(CA_ADAPTER_IP);
428 OIC_LOG_V(DEBUG, TAG, "CARemoveNetworkType(CA_IP_ADAPTER) function returns result : %d", res);
430 else if (nonInterestedNetwork & CA_ADAPTER_RFCOMM_BTEDR)
432 res = CARemoveNetworkType(CA_ADAPTER_RFCOMM_BTEDR);
433 OIC_LOG_V(DEBUG, TAG, "CARemoveNetworkType(CA_RFCOMM_ADAPTER) function returns result : %d", res);
435 else if (nonInterestedNetwork & CA_ADAPTER_GATT_BTLE)
437 res = CARemoveNetworkType(CA_ADAPTER_GATT_BTLE);
438 OIC_LOG_V(DEBUG, TAG, "CARemoveNetworkType(CA_GATT_ADAPTER) function returns result : %d", res);
441 else if (nonInterestedNetwork & CA_ADAPTER_REMOTE_ACCESS)
443 res = CARemoveNetworkType(CA_ADAPTER_REMOTE_ACCESS);
444 OIC_LOG_V(DEBUG, TAG, "CARemoveNetworkType(CA_ADAPTER_REMOTE_ACCESS) function returns result : %d",
451 else if (nonInterestedNetwork & CA_ADAPTER_TCP)
453 res = CARemoveNetworkType(CA_ADAPTER_TCP);
454 OIC_LOG_V(DEBUG, TAG, "CARemoveNetworkType(CA_ADAPTER_TCP) function returns result : %d",
461 res = CA_STATUS_FAILED;
466 CAResult_t CAHandleRequestResponse()
468 if (!g_isInitialized)
470 OIC_LOG(ERROR, TAG, "not initialized");
471 return CA_STATUS_NOT_INITIALIZED;
474 CAHandleRequestResponseCallbacks();
479 #if defined (__WITH_DTLS__) || defined(__WITH_TLS__)
480 CAResult_t CASelectCipherSuite(const uint16_t cipher, CATransportAdapter_t adapter)
482 OIC_LOG_V(DEBUG, TAG, "IN %s", __func__);
483 OIC_LOG_V(DEBUG, TAG, "cipher : %d , CATransportAdapter : %d", cipher, adapter);
484 if (CA_STATUS_OK != CAsetTlsCipherSuite(cipher))
486 OIC_LOG_V(ERROR, TAG, "Out %s", __func__);
487 return CA_STATUS_FAILED;
489 OIC_LOG_V(DEBUG, TAG, "Out %s", __func__);
493 CAResult_t CAEnableAnonECDHCipherSuite(const bool enable)
495 OIC_LOG_V(DEBUG, TAG, "CAEnableAnonECDHCipherSuite");
497 #if defined(__WITH_DTLS__) || defined(__WITH_TLS__)
498 // TLS_ECDH_ANON_WITH_AES_128_CBC_SHA256 0xFF00 replaces 0xC018
499 // TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256 0xC037
500 if (CA_STATUS_OK != CAsetTlsCipherSuite(enable ? 0xFF00 : 0xC037))
502 return CA_STATUS_FAILED;
508 CAResult_t CAGenerateOwnerPSK(const CAEndpoint_t* endpoint,
509 const uint8_t* label, const size_t labelLen,
510 const uint8_t* rsrcServerDeviceID, const size_t rsrcServerDeviceIDLen,
511 const uint8_t* provServerDeviceID, const size_t provServerDeviceIDLen,
512 uint8_t* ownerPSK, const size_t ownerPskSize)
514 OIC_LOG_V(DEBUG, TAG, "IN : CAGenerateOwnerPSK");
516 CAResult_t res = CA_STATUS_OK;
518 //newOwnerLabel and prevOwnerLabe can be NULL
519 if (!endpoint || !label || 0 == labelLen || !ownerPSK || 0 == ownerPskSize)
521 return CA_STATUS_INVALID_PARAM;
524 res = CAsslGenerateOwnerPsk(endpoint, label, labelLen,
525 rsrcServerDeviceID, rsrcServerDeviceIDLen,
526 provServerDeviceID, provServerDeviceIDLen,
527 ownerPSK, ownerPskSize);
529 if (CA_STATUS_OK != res)
531 OIC_LOG_V(ERROR, TAG, "Failed to CAGenerateOwnerPSK : %d", res);
534 OIC_LOG_V(DEBUG, TAG, "OUT : CAGenerateOwnerPSK");
539 CAResult_t CAInitiateHandshake(const CAEndpoint_t *endpoint)
541 OIC_LOG_V(DEBUG, TAG, "IN : CAInitiateHandshake");
542 CAResult_t res = CA_STATUS_OK;
546 return CA_STATUS_INVALID_PARAM;
549 res = CAinitiateSslHandshake(endpoint);
550 if (CA_STATUS_OK != res)
552 OIC_LOG_V(ERROR, TAG, "Failed to CAinitiateSslHandshake : %d", res);
555 OIC_LOG_V(DEBUG, TAG, "OUT : CAInitiateHandshake");
560 CAResult_t CAcloseSslSession(const CAEndpoint_t *endpoint)
562 OIC_LOG_V(DEBUG, TAG, "IN : CAcloseSslSession");
563 CAResult_t res = CA_STATUS_OK;
567 return CA_STATUS_INVALID_PARAM;
570 res = CAcloseSslConnection(endpoint);
571 if (CA_STATUS_OK != res)
573 OIC_LOG_V(ERROR, TAG, "Failed to CAsslClose : %d", res);
576 OIC_LOG_V(DEBUG, TAG, "OUT : CAcloseSslSession");
581 #endif /* __WITH_DTLS__ */
584 void CARegisterKeepAliveHandler(CAKeepAliveConnectionCallback ConnHandler)
586 CATCPSetKeepAliveCallbacks(ConnHandler);