1 /* *****************************************************************
3 * Copyright 2016 Samsung Electronics All Rights Reserved.
7 * Licensed under the Apache License, Version 2.0 (the "License");
8 * you may not use this file except in compliance with the License.
9 * You may obtain a copy of the License at
11 * http://www.apache.org/licenses/LICENSE-2.0
13 * Unless required by applicable law or agreed to in writing, software
14 * distributed under the License is distributed on an "AS IS" BASIS,
15 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16 * See the License for the specific language governing permissions and
17 * limitations under the License.
19 * *****************************************************************/
21 #include "iotivity_config.h"
26 #include "oic_malloc.h"
27 #include "oic_string.h"
28 #if defined (__TIZENRT__)
29 #include <apps/netutils/cJSON.h>
34 #include "resourcemanager.h"
35 #include "dpairingresource.h"
36 #include "psinterface.h"
38 #include "srmresourcestrings.h"
39 #include "cainterface.h"
40 #include "doxmresource.h"
41 #include "pconfresource.h"
42 #include "credresource.h"
43 #include "aclresource.h"
44 #include "srmutility.h"
45 #include "ocserverrequest.h"
46 #include "ocpayload.h"
47 #include "ocpayloadcbor.h"
48 #include "payload_logging.h"
54 #define TAG "OIC_SRM_DPAIRING"
56 /** Default cbor payload size. This value is increased in case of CborErrorOutOfMemory.
57 * The value of payload size is increased until reaching belox max cbor size. */
58 static const uint16_t CBOR_SIZE = 1024;
60 /** Max cbor size payload. */
61 static const uint16_t CBOR_MAX_SIZE = 4400;
63 /** DOXM Map size - Number of mandatory items. */
64 static const uint8_t DPAIR_MAP_SIZE = 3;
66 static OicSecDpairing_t *gDpair = NULL;
67 static OCResourceHandle gDpairHandle = NULL;
68 static OicSecDpairing_t gDefaultDpair =
70 PRM_NOT_ALLOWED, /* OicSecPrm_t spm */
71 {.id = {0}}, /* OicUuid_t pdeviceID */
72 {.id = {0}}, /* OicUuid_t rowner */
75 void DeleteDpairingBinData(OicSecDpairing_t* dpair)
79 //Clean dpairing itself
85 * Get the default value.
86 * @retval the gDefaultDpair pointer;
88 static OicSecDpairing_t* GetDpairingDefault()
90 OIC_LOG (DEBUG, TAG, "GetDpairingDefault");
92 return &gDefaultDpair;
96 * This method is used by SRM to retrieve Dpairing resource data..
98 void SetDpairingResourceOwner(OicUuid_t *rowner)
100 OIC_LOG (DEBUG, TAG, "SetDpairingResourceOwner");
103 memcpy(&gDpair->rownerID, rowner, sizeof(OicUuid_t));
107 #if defined(__WITH_DTLS__) || defined(__WITH_TLS__)
109 * Function to save PairingPSK.
111 * @param[in] endpoint current endpoint.
112 * @param[in] peerDevID peer device indentitiy.
113 * @param[in] isPairingServer indicate if it generates PairingPSK for server or client.
115 * @return OC_STACK_OK on success
117 OCStackResult SavePairingPSK(OCDevAddr *endpoint,
118 OicUuid_t *peerDevID, OicUuid_t *owner, bool isPairingServer)
120 OIC_LOG(DEBUG, TAG, "IN SavePairingPSK");
122 if(NULL == endpoint || NULL == peerDevID || NULL == owner)
124 OIC_LOG_V(ERROR, TAG, "Invalid Input parameters in [%s]\n", __FUNCTION__);
125 return OC_STACK_INVALID_PARAM;
128 OCStackResult res = OC_STACK_ERROR;
130 OicUuid_t ptDeviceID = {.id={0}};
131 if (OC_STACK_OK != GetDoxmDeviceID(&ptDeviceID))
133 OIC_LOG(ERROR, TAG, "Error while retrieving provisioning tool's device ID");
137 uint8_t pairingPSK[OWNER_PSK_LENGTH_128] = {0};
138 OicSecKey_t pairingKey = {pairingPSK, OWNER_PSK_LENGTH_128, OIC_ENCODING_RAW};
140 //Generating PairingPSK using OwnerPSK scheme
141 CAResult_t pskRet = CAGenerateOwnerPSK((const CAEndpoint_t *)endpoint,
142 (uint8_t *)OIC_RSRC_TYPE_SEC_DPAIRING,
143 strlen(OIC_RSRC_TYPE_SEC_DPAIRING),
144 (isPairingServer ? ptDeviceID.id : peerDevID->id), sizeof(OicUuid_t), // server
145 (isPairingServer ? peerDevID->id : ptDeviceID.id), sizeof(OicUuid_t), // client
146 pairingPSK, OWNER_PSK_LENGTH_128);
148 if (CA_STATUS_OK == pskRet)
150 OIC_LOG(DEBUG, TAG, "pairingPSK dump:\n");
151 OIC_LOG_BUFFER(DEBUG, TAG, pairingPSK, OWNER_PSK_LENGTH_128);
152 //Generating new credential for direct-pairing client
154 OicSecCred_t *cred = GenerateCredential(peerDevID,
155 SYMMETRIC_PAIR_WISE_KEY, NULL,
156 &pairingKey, owner, NULL);
157 OICClearMemory(pairingPSK, sizeof(pairingPSK));
158 VERIFY_NON_NULL(TAG, cred, ERROR);
160 res = AddCredential(cred);
161 if(res != OC_STACK_OK)
163 DeleteCredList(cred);
169 OIC_LOG(ERROR, TAG, "CAGenerateOwnerPSK failed");
172 OIC_LOG(DEBUG, TAG, "OUT SavePairingPSK");
176 #endif // __WITH_DTLS__ or __WITH_TLS__
178 OCStackResult DpairingToCBORPayload(const OicSecDpairing_t *dpair, uint8_t **payload, size_t *size)
180 if (NULL == dpair || NULL == payload || NULL != *payload || NULL == size)
182 return OC_STACK_INVALID_PARAM;
185 size_t cborLen = *size;
194 OCStackResult ret = OC_STACK_ERROR;
197 CborEncoder dpairMap;
199 int64_t cborEncoderResult = CborNoError;
200 uint8_t mapSize = DPAIR_MAP_SIZE;
202 uint8_t *outPayload = (uint8_t *)OICCalloc(1, cborLen);
203 VERIFY_NON_NULL(TAG, outPayload, ERROR);
204 cbor_encoder_init(&encoder, outPayload, cborLen, 0);
206 cborEncoderResult = cbor_encoder_create_map(&encoder, &dpairMap, mapSize);
207 VERIFY_CBOR_SUCCESS(TAG, cborEncoderResult, "Failed Creating DPAIRING Map");
210 cborEncoderResult = cbor_encode_text_string(&dpairMap, OIC_JSON_SPM_NAME,
211 strlen(OIC_JSON_SPM_NAME));
212 VERIFY_CBOR_SUCCESS(TAG, cborEncoderResult, "Failed Adding SPM name tag");
213 cborEncoderResult = cbor_encode_int(&dpairMap, dpair->spm);
214 VERIFY_CBOR_SUCCESS(TAG, cborEncoderResult, "Failed Adding SPM value");
216 //PDEVICEID -- Mandatory
217 cborEncoderResult = cbor_encode_text_string(&dpairMap, OIC_JSON_PDEVICE_ID_NAME,
218 strlen(OIC_JSON_PDEVICE_ID_NAME));
219 VERIFY_CBOR_SUCCESS(TAG, cborEncoderResult, "Failed Adding PDeviceID tag");
221 char *deviceId = NULL;
222 ret = ConvertUuidToStr(&dpair->pdeviceID, &deviceId);
223 VERIFY_SUCCESS(TAG, ret == OC_STACK_OK, ERROR);
224 cborEncoderResult = cbor_encode_text_string(&dpairMap, deviceId, strlen(deviceId));
225 VERIFY_CBOR_SUCCESS(TAG, cborEncoderResult, "Failed to encode PDeviceID value");
229 //ROWNER -- Mandatory
232 cborEncoderResult = cbor_encode_text_string(&dpairMap, OIC_JSON_ROWNERID_NAME,
233 strlen(OIC_JSON_ROWNERID_NAME));
234 VERIFY_CBOR_SUCCESS(TAG, cborEncoderResult, "Failed Adding ROWNER tag");
235 ret = ConvertUuidToStr(&dpair->rownerID, &rowner);
236 VERIFY_SUCCESS(TAG, ret == OC_STACK_OK, ERROR);
237 cborEncoderResult = cbor_encode_text_string(&dpairMap, rowner, strlen(rowner));
238 VERIFY_CBOR_SUCCESS(TAG, cborEncoderResult, "Failed Adding Rowner ID value");
242 cborEncoderResult = cbor_encoder_close_container(&encoder, &dpairMap);
243 VERIFY_CBOR_SUCCESS(TAG, cborEncoderResult, "Failed to close dpairMap");
245 if (CborNoError == cborEncoderResult)
247 *size = cbor_encoder_get_buffer_size(&encoder, outPayload);
248 *payload = outPayload;
253 if ((CborErrorOutOfMemory == cborEncoderResult) && (cborLen < CBOR_MAX_SIZE))
255 // reallocate and try again!
258 // Since the allocated initial memory failed, double the memory.
259 cborLen += cbor_encoder_get_buffer_size(&encoder, encoder.end);
260 cborEncoderResult = CborNoError;
261 ret = DpairingToCBORPayload(dpair, payload, &cborLen);
265 if ((CborNoError != cborEncoderResult) || (OC_STACK_OK != ret))
271 ret = OC_STACK_ERROR;
277 OCStackResult CBORPayloadToDpair(const uint8_t *cborPayload, size_t size,
278 OicSecDpairing_t **secDpair)
280 if (NULL == cborPayload || NULL == secDpair || NULL != *secDpair || 0 == size)
282 return OC_STACK_INVALID_PARAM;
285 OCStackResult ret = OC_STACK_ERROR;
288 CborValue dpairCbor = { .parser = NULL };
289 CborParser parser = { .end = NULL };
290 CborError cborFindResult = CborNoError;
292 cbor_parser_init(cborPayload, size, 0, &parser, &dpairCbor);
293 CborValue dpairMap = { .parser = NULL };
294 OicSecDpairing_t *dpair = NULL;
295 cborFindResult = cbor_value_enter_container(&dpairCbor, &dpairMap);
296 VERIFY_CBOR_SUCCESS(TAG, cborFindResult, "Failed Entering DPairing Map");
298 dpair = (OicSecDpairing_t *)OICCalloc(1, sizeof(*dpair));
299 VERIFY_NON_NULL(TAG, dpair, ERROR);
301 while (cbor_value_is_valid(&dpairMap) && cbor_value_is_text_string(&dpairMap))
305 CborType type = CborInvalidType;
306 cborFindResult = cbor_value_dup_text_string(&dpairMap, &name, &len, NULL);
307 VERIFY_CBOR_SUCCESS(TAG, cborFindResult, "Failed Finding tag name");
308 cborFindResult = cbor_value_advance(&dpairMap);
309 VERIFY_CBOR_SUCCESS(TAG, cborFindResult, "Failed Advancing a value in DPair map");
311 type = cbor_value_get_type(&dpairMap);
312 if (0 == strcmp(OIC_JSON_SPM_NAME, name) && cbor_value_is_integer(&dpairMap))
316 cborFindResult = cbor_value_get_int(&dpairMap, &spm);
317 VERIFY_CBOR_SUCCESS(TAG, cborFindResult, "Failed Finding SPM Value");
318 dpair->spm = (OicSecPrm_t)spm;
321 if (0 == strcmp(OIC_JSON_PDEVICE_ID_NAME, name))
324 cborFindResult = cbor_value_dup_text_string(&dpairMap, &id, &len, NULL);
325 VERIFY_CBOR_SUCCESS(TAG, cborFindResult, "Failed Finding PDeviceID value");
326 ret = ConvertStrToUuid(id, &dpair->pdeviceID);
327 VERIFY_SUCCESS(TAG, ret == OC_STACK_OK, ERROR);
331 if (0 == strcmp(OIC_JSON_ROWNERID_NAME, name))
334 cborFindResult = cbor_value_dup_text_string(&dpairMap, &id, &len, NULL);
335 VERIFY_CBOR_SUCCESS(TAG, cborFindResult, "Failed Finding RownerID value");
336 ret = ConvertStrToUuid(id, &dpair->rownerID);
337 VERIFY_SUCCESS(TAG, ret == OC_STACK_OK, ERROR);
341 if (CborMapType != type && cbor_value_is_valid(&dpairMap))
343 cborFindResult = cbor_value_advance(&dpairMap);
344 VERIFY_CBOR_SUCCESS(TAG, cborFindResult, "Failed Advancing the Dpair Map");
353 if (CborNoError != cborFindResult)
355 OIC_LOG (ERROR, TAG, "CBORPayloadToDoxm failed");
356 DeleteDpairingBinData(dpair);
359 ret = OC_STACK_ERROR;
364 * Function to handle the handshake result in Direct-Pairing.
365 * This function will be invoked after DTLS handshake
366 * @param endPoint [IN] The remote endpoint.
367 * @param errorInfo [IN] Error information from the endpoint.
370 void DPairingDTLSHandshakeCB(const CAEndpoint_t *endpoint, const CAErrorInfo_t *info)
372 OIC_LOG_V(INFO, TAG, "IN DPairingDTLSHandshakeCB");
374 if(gDpair && endpoint && info)
376 OIC_LOG_V(INFO, TAG, "Received status from remote device(%s:%d) : %d",
377 endpoint->addr, endpoint->port, info->result);
379 if(CA_STATUS_OK == info->result)
381 OIC_LOG(INFO, TAG, "DPairingDTLSHandshakeCB - Connection success.");
383 else if(CA_DTLS_AUTHENTICATION_FAILURE == info->result)
385 OIC_LOG(INFO, TAG, "DPairingDTLSHandshakeCB - Authentication failed");
389 #if defined(__WITH_DTLS__) || defined(__WITH_TLS__)
390 CAregisterSslHandshakeCallback(NULL);
391 #endif // __WITH_DTLS__ or __WITH_TLS__
393 // delete temporary key
394 RemoveCredential(&gDpair->pdeviceID);
397 OIC_LOG_V(INFO, TAG, "OUT DPairingDTLSHandshakeCB");
400 static OCEntityHandlerResult HandleDpairingPostRequest (const OCEntityHandlerRequest * ehRequest)
402 OIC_LOG (DEBUG, TAG, "Dpairing EntityHandle processing POST request");
403 OCEntityHandlerResult ehRet = OC_EH_ERROR;
404 OicSecDpairing_t* newDpair = NULL;
405 OCStackResult res = OC_STACK_OK;
407 const OicSecPconf_t *pconf = GetPconfResourceData();
408 if (true == pconf->edp)
410 uint8_t *payload = ((OCSecurityPayload*)ehRequest->payload)->securityData;
411 size_t size = ((OCSecurityPayload*)ehRequest->payload)->payloadSize;
414 res = CBORPayloadToDpair(payload, size, &newDpair);
419 OIC_LOG (DEBUG, TAG, "EDP == false : Direct-Pairing Disabled");
423 if (OC_STACK_OK == res && newDpair && false == IsPairedDevice(&newDpair->pdeviceID))
425 // Check if valid Post request
426 bool prmMached = false;
427 for (size_t i=0; i<pconf->prmLen; i++)
429 if (newDpair->spm == pconf->prm[i])
435 OIC_LOG_V(DEBUG, TAG, "Parsed spm is %s", prmMached ? "valid" :
436 "invalid, send error response");
438 // Update local Dpairing with new Dpairing & prepare dtls session
439 if (prmMached && '\0' != (char)newDpair->pdeviceID.id[0])
443 gDpair = GetDpairingDefault();
445 gDpair->spm = newDpair->spm;
446 memcpy(&gDpair->pdeviceID, &newDpair->pdeviceID, sizeof(OicUuid_t));
447 memcpy(&gDpair->rownerID, &pconf->rownerID, sizeof(OicUuid_t));
449 #if defined(__WITH_DTLS__) || defined(__WITH_TLS__)
452 OicUuid_t subjectId = {.id={0}};
453 res = AddTmpPskWithPIN(&gDpair->pdeviceID,
454 SYMMETRIC_PAIR_WISE_KEY,
455 (char*)pconf->pin.val, DP_PIN_LENGTH,
456 &gDpair->rownerID, &subjectId);
457 if(res != OC_STACK_OK ||
458 memcmp(&gDpair->pdeviceID, &subjectId, sizeof(OicUuid_t)))
460 OIC_LOG_V(ERROR, TAG, "Failed to save the temporal PSK : %d", res);
464 // Prepare to establish a secure channel with Pin-based PSK cipher suite
465 if (CA_STATUS_OK != CAEnableAnonECDHCipherSuite(false) ||
466 CA_STATUS_OK != CASelectCipherSuite(MBEDTLS_TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256, CA_ADAPTER_IP))
468 OIC_LOG_V(ERROR, TAG, "Failed to select TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA_256");
472 if(CA_STATUS_OK != CAregisterSslHandshakeCallback(DPairingDTLSHandshakeCB))
474 OIC_LOG(WARNING, TAG, "DirectPairingHandler : Failed to register"
475 " DTLS handshake callback.");
478 #endif // __WITH_DTLS__ or __WITH_TLS__
480 // should be lock /oic/sec/dpairing resource if Direct-Pairing starts normally ?
481 OIC_LOG (DEBUG, TAG, "/oic/sec/dpairing resource created");
483 ehRet = OC_EH_RESOURCE_CREATED;
487 OIC_LOG(ERROR, TAG, "Error in request check");
492 #if defined(__WITH_DTLS__) || defined(__WITH_TLS__)
494 #endif // __WITH_DTLS__ or __WITH_TLS__
496 // Send payload to request originator
497 if(OC_STACK_OK != SendSRMResponse(ehRequest, ehRet, NULL, 0))
500 OIC_LOG (ERROR, TAG, "SendSRMResponse failed in HandleDpairingPostRequest");
503 if (OC_EH_ERROR == ehRet && gDpair)
505 RemoveCredential(&gDpair->pdeviceID);
509 DeleteDpairingBinData(newDpair);
510 OIC_LOG_V (DEBUG, TAG, "%s RetVal %d", __func__ , ehRet);
514 static OCEntityHandlerResult HandleDpairingPutRequest (const OCEntityHandlerRequest * ehRequest)
516 OIC_LOG (DEBUG, TAG, "Dpairing EntityHandle processing PUT request (Comfirmation)");
518 OCEntityHandlerResult ehRet = OC_EH_ERROR;
519 OicSecDpairing_t* newDpair = NULL;
520 OCStackResult res = OC_STACK_OK;
522 const OicSecPconf_t *pconf = GetPconfResourceData();
523 if (true == pconf->edp)
525 uint8_t *payload = ((OCSecurityPayload*)ehRequest->payload)->securityData;
526 size_t size = ((OCSecurityPayload*)ehRequest->payload)->payloadSize;
529 res = CBORPayloadToDpair(payload, size, &newDpair);
535 OIC_LOG (DEBUG, TAG, "EDP == false : Direct-Pairing Disabled");
540 if ((OC_STACK_OK == res) && gDpair && newDpair)
542 OIC_LOG(DEBUG, TAG, "Received direct-pairing finalization request");
544 // Check if valid Put request
545 VERIFY_SUCCESS(TAG, PRM_NOT_ALLOWED == newDpair->spm, ERROR);
547 const OicSecPconf_t *pconf = GetPconfResourceData();
548 VERIFY_NON_NULL(TAG, pconf, ERROR);
550 #if defined(__WITH_DTLS__) || defined(__WITH_TLS__)
551 OCServerRequest *request = GetServerRequestUsingHandle(ehRequest->requestHandle);
552 VERIFY_NON_NULL(TAG, request, ERROR);
553 VERIFY_SUCCESS(TAG, (request->devAddr.flags | OC_FLAG_SECURE), ERROR);
555 //Generate new credential
556 OIC_LOG_V(INFO, TAG, "SavePairingPSK for %s(%d)", request->devAddr.addr,
557 request->devAddr.port);
558 OCStackResult res = SavePairingPSK(&request->devAddr, &newDpair->pdeviceID,
559 (OicUuid_t *)&pconf->rownerID, true);
560 VERIFY_SUCCESS(TAG, OC_STACK_OK == res, ERROR);
561 #endif // __WITH_DTLS__ or __WITH_TLS__
564 OicSecPdAcl_t *pdAcl;
565 LL_FOREACH(pconf->pdacls, pdAcl)
567 OicSecAcl_t* acl = (OicSecAcl_t*)OICCalloc(1, sizeof(OicSecAcl_t));
568 VERIFY_NON_NULL(TAG, acl, ERROR);
570 OicSecAce_t* ace = (OicSecAce_t*)OICCalloc(1, sizeof(OicSecAce_t));
571 VERIFY_NON_NULL(TAG, ace, ERROR);
573 LL_APPEND(acl->aces, ace);
575 memcpy(&ace->subjectuuid, &gDpair->pdeviceID, sizeof(OicUuid_t));
577 for(size_t i = 0; i < pdAcl->resourcesLen; i++)
579 OicSecRsrc_t* rsrc = (OicSecRsrc_t*)OICCalloc(1, sizeof(OicSecRsrc_t));
580 VERIFY_NON_NULL(TAG, rsrc, ERROR);
581 LL_APPEND(ace->resources, rsrc);
584 rsrc->href = OICStrdup(pdAcl->resources[i]);
586 // TODO: Append 'if' and 'rt' as workaround
588 rsrc->interfaceLen = 1;
589 rsrc->interfaces = (char**)OICCalloc(rsrc->interfaceLen, sizeof(char*));
590 VERIFY_NON_NULL(TAG, (rsrc->interfaces), ERROR);
591 rsrc->interfaces[0] = OICStrdup(OC_RSRVD_INTERFACE_DEFAULT);
592 VERIFY_NON_NULL(TAG, (rsrc->interfaces[0]), ERROR);
596 rsrc->types = (char**)OICCalloc(rsrc->typeLen, sizeof(char*));
597 VERIFY_NON_NULL(TAG, (rsrc->types), ERROR);
598 rsrc->types[0] = OICStrdup("oic.core");
599 VERIFY_NON_NULL(TAG, (rsrc->types[0]), ERROR);
602 ace->permission = pdAcl->permission;
605 if(pdAcl->periods || pdAcl->recurrences)
607 OicSecValidity_t* validity = (OicSecValidity_t*)OICCalloc(1, sizeof(OicSecValidity_t));
608 VERIFY_NON_NULL(TAG, validity, ERROR);
610 if(pdAcl->periods && pdAcl->periods[0])
612 size_t periodLen = strlen(pdAcl->periods[0]) + 1;
613 validity->period = (char*)OICMalloc(periodLen * sizeof(char));
614 VERIFY_NON_NULL(TAG, (validity->period), ERROR);
615 OICStrcpy(validity->period, periodLen, pdAcl->periods[0]);
618 if(pdAcl->recurrences && 0 < pdAcl->prdRecrLen)
620 validity->recurrenceLen = pdAcl->prdRecrLen;
621 validity->recurrences = (char**)OICMalloc(sizeof(char*) * pdAcl->prdRecrLen);
622 VERIFY_NON_NULL(TAG, (validity->recurrences), ERROR);
624 for(size_t i = 0; i < pdAcl->prdRecrLen; i++)
626 size_t recurrenceLen = strlen(pdAcl->recurrences[i]) + 1;
627 validity->recurrences[i] = (char*)OICMalloc(recurrenceLen * sizeof(char));
628 VERIFY_NON_NULL(TAG, (validity->recurrences[i]), ERROR);
630 OICStrcpy(validity->recurrences[i], recurrenceLen, pdAcl->recurrences[i]);
634 LL_APPEND(ace->validities, validity);
638 uint8_t *payload = NULL;
639 if (OC_STACK_OK == AclToCBORPayload(acl, &payload, &size))
641 AppendACL(payload, size);
647 //update pconf device list
648 AddPairedDevice(&newDpair->pdeviceID);
650 //Initialize dpairing resource
653 OIC_LOG (DEBUG, TAG, "/oic/sec/dpairing resource updated,"
654 "direct-pairing finalization success");
660 //Send payload to request originator
661 if(OC_STACK_OK != SendSRMResponse(ehRequest, ehRet, NULL, 0))
664 OIC_LOG (ERROR, TAG, "SendSRMResponse failed in HandleDpairingPutRequest");
667 DeleteDpairingBinData(newDpair);
668 OIC_LOG_V (DEBUG, TAG, "%s RetVal %d", __func__ , ehRet);
672 * This internal method is the entity handler for Dpairing resources and
673 * will handle REST request (GET/POST) for them.
675 OCEntityHandlerResult DpairingEntityHandler (OCEntityHandlerFlag flag,
676 OCEntityHandlerRequest * ehRequest,
677 void* callbackParameter)
679 OIC_LOG(DEBUG, TAG, "Received request DpairingEntityHandler");
680 (void)callbackParameter;
681 OCEntityHandlerResult ehRet = OC_EH_ERROR;
688 if (flag & OC_REQUEST_FLAG)
690 OIC_LOG (DEBUG, TAG, "Flag includes OC_REQUEST_FLAG");
691 switch (ehRequest->method)
697 ehRet = HandleDpairingPostRequest(ehRequest);
701 ehRet = HandleDpairingPutRequest(ehRequest);
709 SendSRMResponse(ehRequest, ehRet, NULL, 0);
717 * This internal method is used to create '/oic/sec/dpairing' resource.
719 OCStackResult CreateDpairingResource()
723 ret = OCCreateResource(&gDpairHandle,
724 OIC_RSRC_TYPE_SEC_DPAIRING,
725 OC_RSRVD_INTERFACE_DEFAULT,
726 OIC_RSRC_DPAIRING_URI,
727 DpairingEntityHandler,
729 OC_SECURE | OC_EXPLICIT_DISCOVERABLE);
731 if (OC_STACK_OK != ret)
733 OIC_LOG (ERROR, TAG, "Unable to instantiate Dpairing resource");
734 DeInitDpairingResource();
740 * Initialize Dpairing resource by loading data from persistent storage.
742 * @retval OC_STACK_OK for Success, otherwise some error value
744 OCStackResult InitDpairingResource()
746 OCStackResult ret = OC_STACK_ERROR;
748 // Instantiate 'oic.sec.dpairing'
749 ret = CreateDpairingResource();
750 if (OC_STACK_OK != ret)
752 DeInitDpairingResource();
758 * Perform cleanup for Dpairing resources.
761 * OC_STACK_OK - no error
762 * OC_STACK_ERROR - stack process error
765 OCStackResult DeInitDpairingResource()
767 OCStackResult ret = OCDeleteResource(gDpairHandle);
770 if(OC_STACK_OK == ret)
776 return OC_STACK_ERROR;
780 OCStackResult SetDpairingRownerId(const OicUuid_t* newROwner)
782 OCStackResult ret = OC_STACK_ERROR;
783 uint8_t *cborPayload = NULL;
785 OicUuid_t prevId = {.id={0}};
787 if(NULL == newROwner)
789 ret = OC_STACK_INVALID_PARAM;
793 ret = OC_STACK_NO_RESOURCE;
796 if(newROwner && gDpair)
798 memcpy(prevId.id, gDpair->rownerID.id, sizeof(prevId.id));
799 memcpy(gDpair->rownerID.id, newROwner->id, sizeof(newROwner->id));
801 ret = DpairingToCBORPayload(gDpair, &cborPayload, &size);
802 VERIFY_SUCCESS(TAG, OC_STACK_OK == ret, ERROR);
804 ret = UpdateSecureResourceInPS(OIC_JSON_DPAIRING_NAME, cborPayload, size);
805 VERIFY_SUCCESS(TAG, OC_STACK_OK == ret, ERROR);
807 OICFree(cborPayload);
813 OICFree(cborPayload);
814 memcpy(gDpair->rownerID.id, prevId.id, sizeof(prevId.id));
818 OCStackResult GetDpairingRownerId(OicUuid_t *rowneruuid)
820 OCStackResult retVal = OC_STACK_ERROR;
823 *rowneruuid = gDpair->rownerID;
824 retVal = OC_STACK_OK;