X-Git-Url: http://review.tizen.org/git/?a=blobdiff_plain;f=resource%2Fcsdk%2Fsecurity%2Fprovisioning%2Fsrc%2Foxmjustworks.c;h=a0f1e96aa88f32db76d3ce4b6d3a458d2b9ff15b;hb=390866079e285d2c74918432c0d597d5da52f8a0;hp=7a0d561329e4fa3067f858662d7c5026e039ab47;hpb=3e9402ad71cb3e93266a77796f44d17bab9853fd;p=platform%2Fupstream%2Fiotivity.git diff --git a/resource/csdk/security/provisioning/src/oxmjustworks.c b/resource/csdk/security/provisioning/src/oxmjustworks.c index 7a0d561..a0f1e96 100644 --- a/resource/csdk/security/provisioning/src/oxmjustworks.c +++ b/resource/csdk/security/provisioning/src/oxmjustworks.c @@ -32,35 +32,40 @@ #define TAG "OXM_JustWorks" -char* CreateJustWorksSelectOxmPayload(OTMContext_t* otmCtx) +OCStackResult CreateJustWorksSelectOxmPayload(OTMContext_t *otmCtx, uint8_t **payload, size_t *size) { - if(!otmCtx || !otmCtx->selectedDeviceInfo) + if (!otmCtx || !otmCtx->selectedDeviceInfo || !payload || *payload || !size) { - return NULL; + return OC_STACK_INVALID_PARAM; } otmCtx->selectedDeviceInfo->doxm->oxmSel = OIC_JUST_WORKS; - return BinToDoxmJSON(otmCtx->selectedDeviceInfo->doxm); + *payload = NULL; + *size = 0; + + return DoxmToCBORPayload(otmCtx->selectedDeviceInfo->doxm, payload, size); } -char* CreateJustWorksOwnerTransferPayload(OTMContext_t* otmCtx) +OCStackResult CreateJustWorksOwnerTransferPayload(OTMContext_t* otmCtx, uint8_t **payload, size_t *size) { - if(!otmCtx || !otmCtx->selectedDeviceInfo) + if (!otmCtx || !otmCtx->selectedDeviceInfo || !payload || *payload || !size) { - return NULL; + return OC_STACK_INVALID_PARAM; } OicUuid_t uuidPT = {.id={0}}; if (OC_STACK_OK != GetDoxmDeviceID(&uuidPT)) { - OC_LOG(ERROR, TAG, "Error while retrieving provisioning tool's device ID"); - return NULL; + OIC_LOG(ERROR, TAG, "Error while retrieving provisioning tool's device ID"); + return OC_STACK_ERROR; } memcpy(otmCtx->selectedDeviceInfo->doxm->owner.id, uuidPT.id , UUID_LENGTH); - otmCtx->selectedDeviceInfo->doxm->owned = true; - return BinToDoxmJSON(otmCtx->selectedDeviceInfo->doxm); + *payload = NULL; + *size = 0; + + return DoxmToCBORPayload(otmCtx->selectedDeviceInfo->doxm, payload, size); } OCStackResult LoadSecretJustWorksCallback(OTMContext_t* UNUSED_PARAM) @@ -72,8 +77,8 @@ OCStackResult LoadSecretJustWorksCallback(OTMContext_t* UNUSED_PARAM) OCStackResult CreateSecureSessionJustWorksCallback(OTMContext_t* otmCtx) { - OC_LOG(INFO, TAG, "IN CreateSecureSessionJustWorksCallback"); - if(!otmCtx || !otmCtx->selectedDeviceInfo) + OIC_LOG(INFO, TAG, "IN CreateSecureSessionJustWorksCallback"); + if (!otmCtx || !otmCtx->selectedDeviceInfo) { return OC_STACK_INVALID_PARAM; } @@ -81,45 +86,45 @@ OCStackResult CreateSecureSessionJustWorksCallback(OTMContext_t* otmCtx) CAResult_t caresult = CAEnableAnonECDHCipherSuite(true); if (CA_STATUS_OK != caresult) { - OC_LOG_V(ERROR, TAG, "Unable to enable anon cipher suite"); + OIC_LOG_V(ERROR, TAG, "Unable to enable anon cipher suite"); return OC_STACK_ERROR; } - OC_LOG(INFO, TAG, "Anonymous cipher suite Enabled."); + OIC_LOG(INFO, TAG, "Anonymous cipher suite Enabled."); caresult = CASelectCipherSuite(TLS_ECDH_anon_WITH_AES_128_CBC_SHA_256); if (CA_STATUS_OK != caresult) { - OC_LOG_V(ERROR, TAG, "Failed to select TLS_ECDH_anon_WITH_AES_128_CBC_SHA_256"); + OIC_LOG_V(ERROR, TAG, "Failed to select TLS_ECDH_anon_WITH_AES_128_CBC_SHA_256"); caresult = CAEnableAnonECDHCipherSuite(false); if (CA_STATUS_OK != caresult) { - OC_LOG_V(ERROR, TAG, "Unable to enable anon cipher suite"); + OIC_LOG_V(ERROR, TAG, "Unable to enable anon cipher suite"); } else { - OC_LOG(INFO, TAG, "Anonymous cipher suite Disabled."); + OIC_LOG(INFO, TAG, "Anonymous cipher suite Disabled."); } return OC_STACK_ERROR; } - OC_LOG(INFO, TAG, "TLS_ECDH_anon_WITH_AES_128_CBC_SHA_256 cipher suite selected."); + OIC_LOG(INFO, TAG, "TLS_ECDH_anon_WITH_AES_128_CBC_SHA_256 cipher suite selected."); - OCProvisionDev_t* selDevInfo = otmCtx->selectedDeviceInfo; + OCProvisionDev_t *selDevInfo = otmCtx->selectedDeviceInfo; CAEndpoint_t *endpoint = (CAEndpoint_t *)OICCalloc(1, sizeof (CAEndpoint_t)); if(NULL == endpoint) { return OC_STACK_NO_MEMORY; } - memcpy(endpoint,&selDevInfo->endpoint,sizeof(CAEndpoint_t)); + memcpy(endpoint, &selDevInfo->endpoint, sizeof(CAEndpoint_t)); endpoint->port = selDevInfo->securePort; caresult = CAInitiateHandshake(endpoint); OICFree(endpoint); if (CA_STATUS_OK != caresult) { - OC_LOG_V(ERROR, TAG, "DTLS handshake failure."); + OIC_LOG_V(ERROR, TAG, "DTLS handshake failure."); return OC_STACK_ERROR; } - OC_LOG(INFO, TAG, "OUT CreateSecureSessionJustWorksCallback"); + OIC_LOG(INFO, TAG, "OUT CreateSecureSessionJustWorksCallback"); return OC_STACK_OK; }