#define TAG "cloudClient"
using namespace OC;
-#define DEFAULT_HOST "10.113.68.85"//"127.0.0.1"
+#define DEFAULT_HOST "127.0.0.1"
#define DEFAULT_PORT OC_MULTICAST_PORT
#define DEFAULT_DEVICEID "6A757374-776F-726B-4465-765575696430"
#define DEFAULT_USERID "6A757374-776F-726B-4465-765575696430"
ca_cond cond;
ca_mutex mutex;
-std::string ip("");
-OCCloudProvisioning g_cloudProv(ip, 0);
+std::string ip(DEFAULT_HOST);
+OCCloudProvisioning g_cloudProv(ip, (uint16_t)DEFAULT_PORT);
typedef enum {
SIGN_UP = 1,
void handleCB(void* ctx, OCStackResult result, void* data)
{
OC_UNUSED(ctx);
- OC_UNUSED(result);
OC_UNUSED(data);
+ printf("Cloud request Result is == %d", result);
ca_mutex_lock(mutex);
ca_cond_signal(cond);
ca_mutex_unlock(mutex);
void handleCB1(OCStackResult result, void *data)
{
- OC_UNUSED(result);
OC_UNUSED(data);
+ printf("Cloud request Result is == %d", result);
ca_mutex_lock(mutex);
ca_cond_signal(cond);
ca_mutex_unlock(mutex);
void handleCB2(OCStackResult result, std::string data)
{
- OC_UNUSED(result);
- OC_UNUSED(data);
+ printf("Cloud request Result is == %d", result);
+ printf("ACL ID for the device is == %s", data.c_str());
ca_mutex_lock(mutex);
ca_cond_signal(cond);
if (fp)
{
size_t fsize;
- if (fseeko(fp, 0, SEEK_END) == 0 && (fsize = ftello(fp)))
+ if (fseeko(fp, 0, SEEK_END) == 0 && (fsize = ftello(fp)) > 0)
{
- trustCertChainArray.data = (uint8_t*)OICCalloc(1, fsize+1);
- trustCertChainArray.len = fsize+1;
+ trustCertChainArray.data = (uint8_t*)OICCalloc(1, fsize);
+ trustCertChainArray.len = fsize;
if (NULL == trustCertChainArray.data)
{
- OIC_LOG(ERROR,TAG,"OICCalloc");
+ OIC_LOG(ERROR,TAG,"Failed to allocate memory");
fclose(fp);
return res;
}
rewind(fp);
- fsize = fread(trustCertChainArray.data, 1, fsize, fp);
+ if (fsize != fread(trustCertChainArray.data, 1, fsize, fp))
+ {
+ OIC_LOG(ERROR, TAG, "Certiface not read completely");
+ }
fclose(fp);
}
}
int request = 0;
scanf("%d", &request);
+ for( ; 0x20<=getchar(); );
switch (request)
{
res = OCWrapperCertificateIssueRequest( g_cloudProv, handleCB1);
break;
case USE_RSA:
-// CASelectCipherSuite(0x35, CA_ADAPTER_TCP);
+ res = CAManager::setCipherSuite(0x35, OC_ADAPTER_TCP);
break;
case SAVE_TRUST_CERT:
saveTrustCert();