1 /******************************************************************
3 * Copyright 2014 Samsung Electronics All Rights Reserved.
7 * Licensed under the Apache License, Version 2.0 (the "License");
8 * you may not use this file except in compliance with the License.
9 * You may obtain a copy of the License at
11 * http://www.apache.org/licenses/LICENSE-2.0
13 * Unless required by applicable law or agreed to in writing, software
14 * distributed under the License is distributed on an "AS IS" BASIS,
15 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16 * See the License for the specific language governing permissions and
17 * limitations under the License.
19 ******************************************************************/
27 #include "cainterface.h"
28 #include "caremotehandler.h"
29 #include "camessagehandler.h"
30 #include "caprotocolmessage.h"
31 #include "canetworkconfigurator.h"
32 #include "cainterfacecontroller.h"
34 #if defined(__WITH_DTLS__) || defined(__WITH_TLS__)
35 #include "ca_adapter_net_ssl.h"
36 #endif // __WITH_DTLS__ or __WITH_TLS__
39 #include "catcpadapter.h"
42 CAGlobals_t caglobals = { .clientFlags = 0,
45 #define TAG "OIC_CA_CONN_MGR"
47 static bool g_isInitialized = false;
49 #if defined(__WITH_DTLS__) || defined(__WITH_TLS__)
50 // Taking callback all the way through adapters not the right approach, hence calling here.
51 extern void CAsetPkixInfoCallback(CAgetPkixInfoHandler infCallback);
52 extern void CAsetPskCredentialsCallback(CAgetPskCredentialsHandler credCallback);
53 extern void CAsetCredentialTypesCallback(CAgetCredentialTypesHandler credCallback);
54 #endif // __WITH_DTLS__ or __WITH_TLS__
57 CAResult_t CAInitialize()
59 OIC_LOG_V(DEBUG, TAG, "IoTivity version is v%s", IOTIVITY_VERSION);
60 OIC_LOG(DEBUG, TAG, "CAInitialize");
64 if (0 != OCSeedRandom())
66 OIC_LOG(ERROR, TAG, "Seed Random Failed");
69 CAResult_t res = CAInitializeMessageHandler();
70 if (res != CA_STATUS_OK)
72 OIC_LOG(ERROR, TAG, "CAInitialize has failed");
75 g_isInitialized = true;
83 OIC_LOG(DEBUG, TAG, "CATerminate");
87 CATerminateMessageHandler();
88 CATerminateNetworkType();
90 g_isInitialized = false;
94 CAResult_t CAStartListeningServer()
96 OIC_LOG(DEBUG, TAG, "CAStartListeningServer");
100 return CA_STATUS_NOT_INITIALIZED;
103 return CAStartListeningServerAdapters();
106 CAResult_t CAStopListeningServer()
108 OIC_LOG(DEBUG, TAG, "CAStopListeningServer");
110 if (!g_isInitialized)
112 return CA_STATUS_NOT_INITIALIZED;
115 return CAStopListeningServerAdapters();
118 CAResult_t CAStartDiscoveryServer()
120 OIC_LOG(DEBUG, TAG, "CAStartDiscoveryServer");
122 if (!g_isInitialized)
124 return CA_STATUS_NOT_INITIALIZED;
127 return CAStartDiscoveryServerAdapters();
130 void CARegisterHandler(CARequestCallback ReqHandler, CAResponseCallback RespHandler,
131 CAErrorCallback ErrorHandler)
133 OIC_LOG(DEBUG, TAG, "CARegisterHandler");
135 if (!g_isInitialized)
137 OIC_LOG(DEBUG, TAG, "CA is not initialized");
141 CASetInterfaceCallbacks(ReqHandler, RespHandler, ErrorHandler);
143 #if defined(__WITH_DTLS__) || defined(__WITH_TLS__)
144 CAResult_t CAregisterSslHandshakeCallback(CAErrorCallback tlsHandshakeCallback)
146 OIC_LOG(DEBUG, TAG, "CAregisterSslHandshakeCallback");
150 return CA_STATUS_NOT_INITIALIZED;
153 CAsetSslHandshakeCallback(tlsHandshakeCallback);
157 CAResult_t CAregisterPskCredentialsHandler(CAgetPskCredentialsHandler getTlsCredentialsHandler)
159 OIC_LOG_V(DEBUG, TAG, "In %s", __func__);
161 if (!g_isInitialized)
163 return CA_STATUS_NOT_INITIALIZED;
165 CAsetPskCredentialsCallback(getTlsCredentialsHandler);
166 OIC_LOG_V(DEBUG, TAG, "Out %s", __func__);
170 CAResult_t CAregisterPkixInfoHandler(CAgetPkixInfoHandler getPkixInfoHandler)
172 OIC_LOG_V(DEBUG, TAG, "In %s", __func__);
174 if (!g_isInitialized)
176 return CA_STATUS_NOT_INITIALIZED;
178 CAsetPkixInfoCallback(getPkixInfoHandler);
179 OIC_LOG_V(DEBUG, TAG, "Out %s", __func__);
183 CAResult_t CAregisterGetCredentialTypesHandler(CAgetCredentialTypesHandler getCredTypesHandler)
185 OIC_LOG_V(DEBUG, TAG, "In %s", __func__);
187 if (!g_isInitialized)
189 return CA_STATUS_NOT_INITIALIZED;
191 CAsetCredentialTypesCallback(getCredTypesHandler);
192 OIC_LOG_V(DEBUG, TAG, "Out %s", __func__);
195 #endif // __WITH_DTLS__ or __WITH_TLS__
197 CAResult_t CACreateEndpoint(CATransportFlags_t flags,
198 CATransportAdapter_t adapter,
201 CAEndpoint_t **object)
205 OIC_LOG(ERROR, TAG, "Invalid Parameter");
206 return CA_STATUS_INVALID_PARAM;
209 CAEndpoint_t *endpoint = CACreateEndpointObject(flags, adapter, addr, port);
212 return CA_STATUS_FAILED;
218 void CADestroyEndpoint(CAEndpoint_t *rep)
220 OIC_LOG(DEBUG, TAG, "CADestroyEndpoint");
225 CAResult_t CAGenerateToken(CAToken_t *token, uint8_t tokenLength)
227 OIC_LOG(DEBUG, TAG, "CAGenerateToken");
229 return CAGenerateTokenInternal(token, tokenLength);
232 void CADestroyToken(CAToken_t token)
234 OIC_LOG(DEBUG, TAG, "CADestroyToken");
236 CADestroyTokenInternal(token);
238 OIC_LOG(DEBUG, TAG, "OUT");
241 CAResult_t CAGetNetworkInformation(CAEndpoint_t **info, uint32_t *size)
243 OIC_LOG(DEBUG, TAG, "CAGetNetworkInformation");
245 if (!g_isInitialized)
247 return CA_STATUS_NOT_INITIALIZED;
250 return CAGetNetworkInformationInternal(info, size);
253 static CAResult_t CASendMessageMultiAdapter(const CAEndpoint_t *object, const void *sendMsg,
254 CADataType_t dataType)
256 OIC_LOG(DEBUG, TAG, "CASendMessageMultipleAdapter");
258 CATransportAdapter_t connTypes[] = {
261 ,CA_ADAPTER_GATT_BTLE
264 ,CA_ADAPTER_RFCOMM_BTEDR
270 ,CA_ADAPTER_REMOTE_ACCESS
277 CAEndpoint_t *cloneEp = CACloneEndpoint(object);
280 OIC_LOG(ERROR, TAG, "Failed to clone CAEndpoint");
281 return CA_MEMORY_ALLOC_FAILED;
284 CAResult_t ret = CA_STATUS_OK;
285 size_t numConnTypes = sizeof(connTypes) / sizeof(connTypes[0]);
287 for (size_t i = 0; i < numConnTypes && ret == CA_STATUS_OK; i++)
289 cloneEp->adapter = connTypes[i];
290 ret = CADetachSendMessage(cloneEp, sendMsg, dataType);
292 CAFreeEndpoint(cloneEp);
296 CAResult_t CASendRequest(const CAEndpoint_t *object, const CARequestInfo_t *requestInfo)
298 OIC_LOG(DEBUG, TAG, "CASendRequest");
300 if (!g_isInitialized)
302 return CA_STATUS_NOT_INITIALIZED;
305 if (requestInfo && requestInfo->isMulticast &&
306 (object->adapter == CA_DEFAULT_ADAPTER || object->adapter == CA_ALL_ADAPTERS))
308 return CASendMessageMultiAdapter(object, requestInfo, CA_REQUEST_DATA);
312 return CADetachSendMessage(object, requestInfo, CA_REQUEST_DATA);
316 CAResult_t CASendResponse(const CAEndpoint_t *object, const CAResponseInfo_t *responseInfo)
318 OIC_LOG(DEBUG, TAG, "CASendResponse");
320 if (!g_isInitialized)
322 return CA_STATUS_NOT_INITIALIZED;
325 if (!responseInfo || !object)
327 return CA_STATUS_INVALID_PARAM;
330 if (responseInfo->isMulticast &&
331 (object->adapter == CA_DEFAULT_ADAPTER || object->adapter == CA_ALL_ADAPTERS))
333 return CASendMessageMultiAdapter(object, responseInfo, responseInfo->info.dataType);
337 return CADetachSendMessage(object, responseInfo, responseInfo->info.dataType);
341 CAResult_t CASelectNetwork(CATransportAdapter_t interestedNetwork)
343 OIC_LOG_V(DEBUG, TAG, "Selected network : %d", interestedNetwork);
345 if (!g_isInitialized)
347 return CA_STATUS_NOT_INITIALIZED;
350 CAResult_t res = CA_STATUS_OK;
352 if (interestedNetwork & CA_ADAPTER_IP)
354 res = CAAddNetworkType(CA_ADAPTER_IP);
355 OIC_LOG_V(DEBUG, TAG, "CAAddNetworkType(CA_IP_ADAPTER) function returns result: %d", res);
357 else if (interestedNetwork & CA_ADAPTER_RFCOMM_BTEDR)
359 res = CAAddNetworkType(CA_ADAPTER_RFCOMM_BTEDR);
360 OIC_LOG_V(DEBUG, TAG, "CAAddNetworkType(CA_RFCOMM_ADAPTER) function returns result : %d", res);
362 else if (interestedNetwork & CA_ADAPTER_GATT_BTLE)
364 res = CAAddNetworkType(CA_ADAPTER_GATT_BTLE);
365 OIC_LOG_V(DEBUG, TAG, "CAAddNetworkType(CA_GATT_ADAPTER) function returns result : %d", res);
369 else if (interestedNetwork & CA_ADAPTER_REMOTE_ACCESS)
371 res = CAAddNetworkType(CA_ADAPTER_REMOTE_ACCESS);
372 OIC_LOG_V(DEBUG, TAG,
373 "CAAddNetworkType(CA_ADAPTER_REMOTE_ACCESS) function returns result : %d", res);
378 else if (interestedNetwork & CA_ADAPTER_TCP)
380 res = CAAddNetworkType(CA_ADAPTER_TCP);
381 OIC_LOG_V(DEBUG, TAG,
382 "CAAddNetworkType(CA_ADAPTER_TCP) function returns result : %d", res);
385 else if (interestedNetwork & CA_ADAPTER_NFC)
387 res = CAAddNetworkType(CA_ADAPTER_NFC);
388 OIC_LOG_V(DEBUG, TAG, "CAAddNetworkType(CA_ADAPTER_NFC) function returns result : %d", res);
392 res = CA_NOT_SUPPORTED;
397 CAResult_t CAUnSelectNetwork(CATransportAdapter_t nonInterestedNetwork)
399 OIC_LOG_V(DEBUG, TAG, "unselected network : %d", nonInterestedNetwork);
401 if (!g_isInitialized)
403 return CA_STATUS_NOT_INITIALIZED;
406 CAResult_t res = CA_STATUS_OK;
408 if (nonInterestedNetwork & CA_ADAPTER_IP)
410 res = CARemoveNetworkType(CA_ADAPTER_IP);
411 OIC_LOG_V(DEBUG, TAG, "CARemoveNetworkType(CA_IP_ADAPTER) function returns result : %d", res);
413 else if (nonInterestedNetwork & CA_ADAPTER_RFCOMM_BTEDR)
415 res = CARemoveNetworkType(CA_ADAPTER_RFCOMM_BTEDR);
416 OIC_LOG_V(DEBUG, TAG, "CARemoveNetworkType(CA_RFCOMM_ADAPTER) function returns result : %d", res);
418 else if (nonInterestedNetwork & CA_ADAPTER_GATT_BTLE)
420 res = CARemoveNetworkType(CA_ADAPTER_GATT_BTLE);
421 OIC_LOG_V(DEBUG, TAG, "CARemoveNetworkType(CA_GATT_ADAPTER) function returns result : %d", res);
424 else if (nonInterestedNetwork & CA_ADAPTER_REMOTE_ACCESS)
426 res = CARemoveNetworkType(CA_ADAPTER_REMOTE_ACCESS);
427 OIC_LOG_V(DEBUG, TAG, "CARemoveNetworkType(CA_ADAPTER_REMOTE_ACCESS) function returns result : %d",
434 else if (nonInterestedNetwork & CA_ADAPTER_TCP)
436 res = CARemoveNetworkType(CA_ADAPTER_TCP);
437 OIC_LOG_V(DEBUG, TAG, "CARemoveNetworkType(CA_ADAPTER_TCP) function returns result : %d",
444 res = CA_STATUS_FAILED;
449 CAResult_t CAHandleRequestResponse()
451 if (!g_isInitialized)
453 OIC_LOG(ERROR, TAG, "not initialized");
454 return CA_STATUS_NOT_INITIALIZED;
457 CAHandleRequestResponseCallbacks();
462 #if defined (__WITH_DTLS__) || defined(__WITH_TLS__)
463 CAResult_t CASelectCipherSuite(const uint16_t cipher, CATransportAdapter_t adapter)
465 OIC_LOG_V(DEBUG, TAG, "IN %s", __func__);
466 OIC_LOG_V(DEBUG, TAG, "cipher : %d , CATransportAdapter : %d", cipher, adapter);
467 if (CA_STATUS_OK != CAsetTlsCipherSuite(cipher))
469 OIC_LOG_V(ERROR, TAG, "Out %s", __func__);
470 return CA_STATUS_FAILED;
472 OIC_LOG_V(DEBUG, TAG, "Out %s", __func__);
476 CAResult_t CAEnableAnonECDHCipherSuite(const bool enable)
478 OIC_LOG_V(DEBUG, TAG, "CAEnableAnonECDHCipherSuite");
480 #if defined(__WITH_DTLS__) || defined(__WITH_TLS__)
481 // TLS_ECDH_ANON_WITH_AES_128_CBC_SHA256 0xFF00 replaces 0xC018
482 // TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256 0xC037
483 if (CA_STATUS_OK != CAsetTlsCipherSuite(enable ? 0xFF00 : 0xC037))
485 return CA_STATUS_FAILED;
491 CAResult_t CAGenerateOwnerPSK(const CAEndpoint_t* endpoint,
492 const uint8_t* label, const size_t labelLen,
493 const uint8_t* rsrcServerDeviceID, const size_t rsrcServerDeviceIDLen,
494 const uint8_t* provServerDeviceID, const size_t provServerDeviceIDLen,
495 uint8_t* ownerPSK, const size_t ownerPskSize)
497 OIC_LOG_V(DEBUG, TAG, "IN : CAGenerateOwnerPSK");
499 CAResult_t res = CA_STATUS_OK;
501 //newOwnerLabel and prevOwnerLabe can be NULL
502 if (!endpoint || !label || 0 == labelLen || !ownerPSK || 0 == ownerPskSize)
504 return CA_STATUS_INVALID_PARAM;
507 res = CAsslGenerateOwnerPsk(endpoint, label, labelLen,
508 rsrcServerDeviceID, rsrcServerDeviceIDLen,
509 provServerDeviceID, provServerDeviceIDLen,
510 ownerPSK, ownerPskSize);
512 if (CA_STATUS_OK != res)
514 OIC_LOG_V(ERROR, TAG, "Failed to CAGenerateOwnerPSK : %d", res);
517 OIC_LOG_V(DEBUG, TAG, "OUT : CAGenerateOwnerPSK");
522 CAResult_t CAInitiateHandshake(const CAEndpoint_t *endpoint)
524 OIC_LOG_V(DEBUG, TAG, "IN : CAInitiateHandshake");
525 CAResult_t res = CA_STATUS_OK;
529 return CA_STATUS_INVALID_PARAM;
532 res = CAinitiateSslHandshake(endpoint);
533 if (CA_STATUS_OK != res)
535 OIC_LOG_V(ERROR, TAG, "Failed to CAinitiateSslHandshake : %d", res);
538 OIC_LOG_V(DEBUG, TAG, "OUT : CAInitiateHandshake");
543 CAResult_t CAcloseSslSession(const CAEndpoint_t *endpoint)
545 OIC_LOG_V(DEBUG, TAG, "IN : CAcloseSslSession");
546 CAResult_t res = CA_STATUS_OK;
550 return CA_STATUS_INVALID_PARAM;
553 res = CAcloseSslConnection(endpoint);
554 if (CA_STATUS_OK != res)
556 OIC_LOG_V(ERROR, TAG, "Failed to CAsslClose : %d", res);
559 OIC_LOG_V(DEBUG, TAG, "OUT : CAcloseSslSession");
564 #endif /* __WITH_DTLS__ */
567 void CARegisterKeepAliveHandler(CAKeepAliveConnectionCallback ConnHandler)
569 CATCPSetKeepAliveCallbacks(ConnHandler);