Add cloud provisioning feature & modify mediator C++ class in easy setup
[platform/upstream/iotivity.git] / service / easy-setup / mediator / richsdk / src / EnrolleeSecurity.cpp
1 //******************************************************************
2 //
3 // Copyright 2015 Samsung Electronics All Rights Reserved.
4 //
5 //-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
6 //
7 // Licensed under the Apache License, Version 2.0 (the "License");
8 // you may not use this file except in compliance with the License.
9 // You may obtain a copy of the License at
10 //
11 //      http://www.apache.org/licenses/LICENSE-2.0
12 //
13 // Unless required by applicable law or agreed to in writing, software
14 // distributed under the License is distributed on an "AS IS" BASIS,
15 // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16 // See the License for the specific language governing permissions and
17 // limitations under the License.
18 //
19 //-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
20
21 #include "base64.h"
22
23 #include "EnrolleeSecurity.h"
24 #include "oxmjustworks.h"
25 #include "oxmrandompin.h"
26 #include "EnrolleeResource.h"
27 #include "logger.h"
28 #include "ESException.h"
29 #include "oic_malloc.h"
30 #include "oic_string.h"
31
32 namespace OIC
33 {
34     namespace Service
35     {
36         #define MAX_PERMISSION_LENGTH (5)
37         #define CREATE (1)
38         #define READ (2)
39         #define UPDATE (4)
40         #define DELETE (8)
41         #define NOTIFY (16)
42         #define DASH '-'
43
44         //TODO : Currently discovery timeout for owned and unowned devices is fixed as 5
45         // The value should be accepted from the application as a parameter during ocplatform
46         // config call
47 #define ES_SEC_DISCOVERY_TIMEOUT 5
48
49         EnrolleeSecurity::EnrolleeSecurity(
50         std::shared_ptr< EnrolleeResource > EnrolleeResource,
51         std::string secDbPath)
52         {
53             m_enrolleeSecState = EnrolleeSecState::ES_SEC_UNKNOWN;
54             m_EnrolleeResource = EnrolleeResource;
55         }
56
57         ESResult EnrolleeSecurity::registerCallbackHandler(EnrolleeSecStatusCb enrolleeSecStatusCb,
58                 SecurityPinCb securityPinCb, SecProvisioningDbPathCb secProvisioningDbPathCb)
59
60         {
61             m_enrolleeSecStatusCb = enrolleeSecStatusCb;
62             m_securityPinCb = securityPinCb;
63             m_secProvisioningDbPathCb = secProvisioningDbPathCb;
64
65             return ES_ERROR;
66         }
67
68         std::shared_ptr< OC::OCSecureResource > EnrolleeSecurity::getEnrollee(DeviceList_t &list)
69         {
70             for (unsigned int i = 0; i < list.size(); i++)
71             {
72                 OIC_LOG_V(DEBUG, ENROLEE_SECURITY_TAG, "Device %d ID %s ", i + 1,
73                         list[i]->getDeviceID().c_str());
74                 OIC_LOG_V(DEBUG, ENROLEE_SECURITY_TAG, "From IP :%s", list[i]->getDevAddr().c_str());
75
76                 //Always return the first element of the unOwned devices. This is considering that Mediator is
77                 // always connected with only one Enrollee for which ownership transfer is being performed.
78                 // Incase of multiple Enrollee devices connected to the Mediator via any OnBoarding method (SoftAp
79                 // for example), the Enrollee devices will be provisioned in the first come first serve basis in the order
80                 // returned by the security layer.
81                 return list[i];
82             }
83             OIC_LOG(ERROR, ENROLEE_SECURITY_TAG,"Error!!! DeviceList_t is NULL");
84             return NULL;
85         }
86
87         void EnrolleeSecurity::convertUUIDToString(OicUuid_t uuid, std::string& uuidString)
88         {
89             char base64Buff[B64ENCODE_OUT_SAFESIZE(sizeof(((OicUuid_t*) 0)->id)) + 1] =
90             { 0, };
91             uint32_t outLen = 0;
92             B64Result b64Ret = B64_OK;
93             std::ostringstream deviceId("");
94
95             b64Ret = b64Encode(uuid.id, sizeof(uuid.id),
96                     base64Buff, sizeof(base64Buff), &outLen);
97
98             if (B64_OK == b64Ret)
99             {
100                 deviceId << base64Buff;
101             }
102             uuidString =  deviceId.str();
103         }
104
105         void EnrolleeSecurity::ownershipTransferCb(OC::PMResultList_t *result, int hasError)
106         {
107             if (hasError)
108             {
109                 OIC_LOG(ERROR, ENROLEE_SECURITY_TAG,"Error!!! in OwnershipTransfer");
110
111                 std::shared_ptr< SecProvisioningStatus > securityProvisioningStatus = nullptr;
112                 std::string uuid;
113                 convertUUIDToString(result->at(0).deviceId, uuid);
114                 securityProvisioningStatus = std::make_shared< SecProvisioningStatus >(uuid,
115                         ES_ERROR);
116
117                 m_enrolleeSecStatusCb(securityProvisioningStatus);
118                 return;
119             }
120             else
121             {
122                 OIC_LOG(DEBUG, ENROLEE_SECURITY_TAG, "ownershipTransferCb : Received provisioning results: ");
123                 for (unsigned int i = 0; i < result->size(); i++)
124                 {
125                     OIC_LOG_V(DEBUG, ENROLEE_SECURITY_TAG, "Result is = %d for device",result->at(i).res);
126                     std::string uuid;
127                     convertUUIDToString(result->at(0).deviceId, uuid);
128
129                     OIC_LOG_V(DEBUG, ENROLEE_SECURITY_TAG, "UUID : %s",uuid.c_str());
130                     std::shared_ptr< SecProvisioningStatus > securityProvisioningStatus = nullptr;
131                     securityProvisioningStatus = std::make_shared< SecProvisioningStatus >(uuid,
132                             ES_OK);
133
134                     m_enrolleeSecStatusCb(securityProvisioningStatus);
135                     return;
136                 }
137
138                 delete result;
139             }
140         }
141
142         bool EnrolleeSecurity::performOwnershipTransfer()
143         {
144             OC::DeviceList_t pUnownedDevList, pOwnedDevList;
145
146             pOwnedDevList.clear();
147             pUnownedDevList.clear();
148
149             OCStackResult result;
150
151             //Developer note : Always test the mediator and enrollee applications on different devices. Running
152             // Mediator and Enrollee in same device will result in returning the same device as already owned.
153             /*result = OCSecure::discoverOwnedDevices(ES_SEC_DISCOVERY_TIMEOUT,
154                     pOwnedDevList);
155             if (result != OC_STACK_OK)
156             {
157                 OIC_LOG(ERROR, ENROLEE_SECURITY_TAG, "Owned Discovery failed.");
158                 ownershipStatus = DEVICE_NOT_OWNED;
159                 //Throw exception
160                 throw ESPlatformException(result);
161                 return ownershipStatus;
162             }
163             else if (pOwnedDevList.size())
164             {
165                 OIC_LOG_V(DEBUG, ENROLEE_SECURITY_TAG, "Found owned devices. Count =%d",
166                         pOwnedDevList.size());
167                 std::shared_ptr< OC::OCSecureResource > ownedDevice = getEnrollee(pOwnedDevList);
168                 if (ownedDevice)
169                 {
170                     ownershipStatus = DEVICE_OWNED;
171                     return ownershipStatus;
172                 }
173             }
174             else
175             {
176                 OIC_LOG(ERROR, ENROLEE_SECURITY_TAG, "No owned devices found.");
177                 ownershipStatus = DEVICE_NOT_OWNED;
178             }*/
179
180             result = OCSecure::discoverUnownedDevices(ES_SEC_DISCOVERY_TIMEOUT, pUnownedDevList);
181             if (result != OC_STACK_OK)
182             {
183                 OIC_LOG(ERROR, ENROLEE_SECURITY_TAG, "UnOwned Discovery failed.");
184                 //Throw exception
185                 throw ESPlatformException(result);
186             }
187             else if (pUnownedDevList.size())
188             {
189                 OIC_LOG_V(DEBUG, ENROLEE_SECURITY_TAG, "Found Unowned devices. Count =%d",
190                         pUnownedDevList.size());
191
192                 m_unownedDevice = getEnrollee(pUnownedDevList);
193                 if (m_unownedDevice)
194                 {
195                     OTMCallbackData_t justWorksCBData;
196                     justWorksCBData.loadSecretCB = LoadSecretJustWorksCallback;
197                     justWorksCBData.createSecureSessionCB = CreateSecureSessionJustWorksCallback;
198                     justWorksCBData.createSelectOxmPayloadCB = CreateJustWorksSelectOxmPayload;
199                     justWorksCBData.createOwnerTransferPayloadCB =
200                             CreateJustWorksOwnerTransferPayload;
201                     OCSecure::setOwnerTransferCallbackData(OIC_JUST_WORKS, &justWorksCBData, NULL);
202
203                     OIC_LOG_V(DEBUG, ENROLEE_SECURITY_TAG, "Transfering ownership for : %s ",
204                             m_unownedDevice->getDeviceID().c_str());
205
206                     OC::ResultCallBack ownershipTransferCb = std::bind(
207                             &EnrolleeSecurity::ownershipTransferCb, this, std::placeholders::_1,
208                             std::placeholders::_2);
209
210                     if (m_unownedDevice->doOwnershipTransfer(ownershipTransferCb) != OC_STACK_OK)
211                     {
212                         OIC_LOG(ERROR, ENROLEE_SECURITY_TAG, "OwnershipTransferCallback is failed");
213                         return false;
214                     }
215                 }
216             }
217             else
218             {
219                 OIC_LOG(ERROR, ENROLEE_SECURITY_TAG, "No unOwned devices found.");
220                 return false;
221             }
222
223             return true;
224         }
225     }
226 }