X-Git-Url: http://review.tizen.org/git/?a=blobdiff_plain;f=resource%2Fcsdk%2Fsecurity%2Fprovisioning%2Fsample%2Fsampleserver_mfg.cpp;h=a1923fea31945318c1c4603bc919cbd038f146bf;hb=847996e6e5e387e38b7f56814016632d62f0cfe7;hp=90ed672af75e59c2a8f4661f0c1321fe7b8c819e;hpb=7e5046079bc8c38470e79aa686091ec18b9c0dd8;p=platform%2Fupstream%2Fiotivity.git diff --git a/resource/csdk/security/provisioning/sample/sampleserver_mfg.cpp b/resource/csdk/security/provisioning/sample/sampleserver_mfg.cpp index 90ed672..a1923fe 100644 --- a/resource/csdk/security/provisioning/sample/sampleserver_mfg.cpp +++ b/resource/csdk/security/provisioning/sample/sampleserver_mfg.cpp @@ -46,6 +46,7 @@ #include "pkix_interface.h" #include "hw_emul/hw_interface.h" #include "oxmverifycommon.h" +#include "casecurityinterface.h" #define TAG "SAMPLE_MANUFACTURER_CERT" @@ -434,6 +435,28 @@ OCStackResult confirmCB(void * ctx) return OC_STACK_OK; } +void confirmNoCertCB(CACertificateVerificationStatus_t status) +{ + if (CA_CERTIFICATE_VERIFY_SUCCESS_MUTUAL == status) + { + printf(" > Peer certificate verification successful"); + } + else if (CA_CERTIFICATE_VERIFY_NO_CERT == status) + { + printf(" > Peer has not provided certificate\n"); + } + else if (CA_CERTIFICATE_VERIFY_FAILED == status) + { + printf(" > Peer certificate verification failed\n"); + } + return; +} + +void informOxmSelCB(OicSecOxm_t oxmSel) +{ + printf(" > OXM selected: 0x%x\n", oxmSel); +} + FILE* server_fopen(const char *path, const char *mode) { (void)path; @@ -477,6 +500,8 @@ int main(int argc, char **argv) OCPersistentStorage ps = {server_fopen, fread, fwrite, fclose, unlink, NULL, NULL}; SetUserConfirmCB(NULL, confirmCB); + SetInformOxmSelCB(informOxmSelCB); + CAsetCertificateVerificationCallback(confirmNoCertCB); OCRegisterPersistentStorageHandler(&ps);