svace fixes
[platform/upstream/iotivity.git] / resource / csdk / security / provisioning / src / ownershiptransfermanager.c
index eec02f3..4a9021a 100644 (file)
@@ -42,6 +42,8 @@
 #endif
 #include <stdbool.h>
 #include <string.h>
+#include <stdlib.h>
+#include <pthread.h>
 
 #include "logger.h"
 #include "oic_malloc.h"
 #include "cacommon.h"
 #include "cainterface.h"
 #include "base64.h"
+#if defined (__TIZENRT__)
+#include <apps/netutils/cJSON.h>
+#else
 #include "cJSON.h"
-#include "global.h"
-
+#endif
+#include "utlist.h"
 #include "srmresourcestrings.h"
 #include "doxmresource.h"
 #include "pstatresource.h"
 #include "ownershiptransfermanager.h"
 #include "securevirtualresourcetypes.h"
 #include "oxmjustworks.h"
+#include "oxmrandompin.h"
+#include "oxmrawpublickey.h"
+#include "oxmmanufacturercert.h"
+#include "secureresourceprovider.h"
+
+#ifdef MULTIPLE_OWNER
+#include "oxmpreconfpin.h"
+#endif //MULTIPLE_OWNER
+#include "otmcontextlist.h"
 #include "pmtypes.h"
 #include "pmutility.h"
 #include "srmutility.h"
 #include "provisioningdatabasemanager.h"
-#include "oxmrandompin.h"
 #include "ocpayload.h"
 #include "payload_logging.h"
+#include "pkix_interface.h"
+#include "oxmverifycommon.h"
+#include "psinterface.h"
 
-#define TAG "OTM"
+#define TAG "OIC_OTM"
+
+
+#define ALLOWED_OXM         1
+#define NOT_ALLOWED_OXM     0
 
 /**
- * Array to store the callbacks for each owner transfer method.
+ * List of allowed oxm list.
+ * All oxm methods are allowed as default.
  */
-static OTMCallbackData_t g_OTMDatas[OIC_OXM_COUNT];
+#ifdef MULTIPLE_OWNER
+static uint8_t g_OxmAllowStatus[OXM_IDX_COUNT] = {ALLOWED_OXM, ALLOWED_OXM, ALLOWED_OXM,
+                                                  ALLOWED_OXM, ALLOWED_OXM, ALLOWED_OXM,
+                                                  ALLOWED_OXM, NOT_ALLOWED_OXM};
+#else
+static uint8_t g_OxmAllowStatus[OXM_IDX_COUNT] = {ALLOWED_OXM, ALLOWED_OXM, ALLOWED_OXM,
+                                                  ALLOWED_OXM, ALLOWED_OXM, ALLOWED_OXM,
+                                                  NOT_ALLOWED_OXM};
+#endif
+
+static OicSecOxm_t selectOTMcb_default(const OicSecOxm_t* otmList, const uint32_t len);
+static OTMSelectMethodCallback g_selectOTMCB = selectOTMcb_default;
+
+OCStackResult OTMSetOTCallback(OicSecOxm_t oxm, OTMCallbackData_t* callbacks)
+{
+    OCStackResult res = OC_STACK_INVALID_PARAM;
+
+    OIC_LOG(INFO, TAG, "IN OTMSetOTCallback");
+
+    VERIFY_NON_NULL(TAG, callbacks, ERROR);
+
+#ifdef MULTIPLE_OWNER
+    VERIFY_SUCCESS(TAG, (OIC_OXM_COUNT > oxm || OIC_PRECONFIG_PIN == oxm || OIC_MV_JUST_WORKS == oxm
+                    || OIC_CON_MFG_CERT == oxm || OIC_RAW_PUB_KEY == oxm), ERROR);
+#else
+    VERIFY_SUCCESS(TAG, (OIC_OXM_COUNT > oxm || OIC_MV_JUST_WORKS == oxm || OIC_CON_MFG_CERT == oxm || OIC_RAW_PUB_KEY == oxm), ERROR);
+#endif // MULTIPLE_OWNER
+
+    switch(oxm)
+    {
+    case OIC_JUST_WORKS:
+        callbacks->loadSecretCB = LoadSecretJustWorksCallback;
+        callbacks->createSecureSessionCB = CreateSecureSessionJustWorksCallback;
+        callbacks->createSelectOxmPayloadCB = CreateJustWorksSelectOxmPayload;
+        callbacks->createOwnerTransferPayloadCB = CreateJustWorksOwnerTransferPayload;
+        break;
+    case OIC_RANDOM_DEVICE_PIN:
+        callbacks->loadSecretCB = InputPinCodeCallback;
+        callbacks->createSecureSessionCB = CreateSecureSessionRandomPinCallback;
+        callbacks->createSelectOxmPayloadCB = CreatePinBasedSelectOxmPayload;
+        callbacks->createOwnerTransferPayloadCB = CreatePinBasedOwnerTransferPayload;
+        break;
+    case OIC_MANUFACTURER_CERTIFICATE:
+        callbacks->loadSecretCB = PrepareMCertificateCallback;
+        callbacks->createSecureSessionCB = CreateSecureSessionMCertificateCallback;
+        callbacks->createSelectOxmPayloadCB = CreateMCertificateBasedSelectOxmPayload;
+        callbacks->createOwnerTransferPayloadCB = CreateMCertificateBasedOwnerTransferPayload;
+        break;
+    case OIC_DECENTRALIZED_PUBLIC_KEY:
+        OIC_LOG(ERROR, TAG, "OIC_DECENTRALIZED_PUBLIC_KEY not supported yet.");
+        return OC_STACK_INVALID_METHOD;
+#ifdef MULTIPLE_OWNER
+    case OIC_PRECONFIG_PIN:
+        callbacks->loadSecretCB = LoadPreconfigPinCodeCallback;
+        callbacks->createSecureSessionCB = CreateSecureSessionPreconfigPinCallback;
+        callbacks->createSelectOxmPayloadCB = CreatePreconfigPinBasedSelectOxmPayload;
+        callbacks->createOwnerTransferPayloadCB = CreatePreconfigPinBasedOwnerTransferPayload;
+        break;
+#endif //MULTIPLE_OWNER
+    case OIC_MV_JUST_WORKS:
+        callbacks->loadSecretCB = LoadSecretJustWorksCallback;
+        callbacks->createSecureSessionCB = CreateSecureSessionJustWorksCallback;
+        callbacks->createSelectOxmPayloadCB = CreateMVJustWorksSelectOxmPayload;
+        callbacks->createOwnerTransferPayloadCB = CreateJustWorksOwnerTransferPayload;
+        break;
+    case OIC_CON_MFG_CERT:
+        callbacks->loadSecretCB = PrepareMCertificateCallback;
+        callbacks->createSecureSessionCB = CreateSecureSessionMCertificateCallback;
+        callbacks->createSelectOxmPayloadCB = CreateConMCertificateBasedSelectOxmPayload;
+        callbacks->createOwnerTransferPayloadCB = CreateMCertificateBasedOwnerTransferPayload;
+        break;
+    case OIC_RAW_PUB_KEY:
+        callbacks->loadSecretCB = GetMasterRPKCallback;
+        callbacks->createSecureSessionCB = CreateSecureSessionRPKCallback;
+        callbacks->createSelectOxmPayloadCB = CreateRPKBasedSelectOxmPayload;
+        callbacks->createOwnerTransferPayloadCB = CreateRPKBasedOwnerTransferPayload;
+        break;
+    default:
+        OIC_LOG_V(ERROR, TAG, "Unknown OxM : %d", (int)oxm);
+        return OC_STACK_INVALID_PARAM;
+        break;
+    }
+
+    res = OC_STACK_OK;
+exit:
+    OIC_LOG(INFO, TAG, "OUT OTMSetOTCallback");
+    return res;
+}
+
+void SetSelectOTMCB(OTMSelectMethodCallback selectOTMcb)
+{
+    g_selectOTMCB = selectOTMcb;
+    return;
+}
+
+void UnsetSelectOTMCB()
+{
+    g_selectOTMCB = NULL;
+    return;
+}
 
 /**
- * Variables for pointing the OTMContext to be used in the DTLS handshake result callback.
+ * Internal API to convert OxM value to index of oxm allow table.
  */
-static OTMContext_t* g_otmCtx = NULL;
+static OxmAllowTableIdx_t GetOxmAllowTableIdx(OicSecOxm_t oxm)
+{
+    switch(oxm)
+    {
+        case OIC_JUST_WORKS:
+            return OXM_IDX_JUST_WORKS;
+        case OIC_RANDOM_DEVICE_PIN:
+            return OXM_IDX_RANDOM_DEVICE_PIN;
+        case OIC_MANUFACTURER_CERTIFICATE:
+            return OXM_IDX_MANUFACTURER_CERTIFICATE;
+        case OIC_DECENTRALIZED_PUBLIC_KEY:
+            return OXM_IDX_DECENTRALIZED_PUBLIC_KEY;
+        case OIC_MV_JUST_WORKS:
+            return OXM_IDX_MV_JUST_WORKS;
+        case OIC_RAW_PUB_KEY:
+            return OXM_IDX_RAW_PUBLIC_KEY;
+        case OIC_CON_MFG_CERT:
+            return OXM_IDX_CON_MFG_CERT;
+#ifdef MULTIPLE_OWNER
+        case OIC_PRECONFIG_PIN:
+            return OXM_IDX_PRECONFIG_PIN;
+#endif
+        default:
+            return OXM_IDX_UNKNOWN;
+    }
+}
+
+OicSecOxm_t selectOTMcb_default(const OicSecOxm_t* otmList, const uint32_t len)
+{
+    OIC_LOG(INFO, TAG, "IN selectOTMcb_default");
+    OicSecOxm_t ret = -1;
+    VERIFY_NON_NULL(TAG, otmList, ERROR);
+    VERIFY_SUCCESS(TAG, (len > 0), ERROR);
+
+    ret = otmList[len-1];
+
+    for (size_t i = 0; i < len; i++)
+    {
+        if (OIC_RANDOM_DEVICE_PIN == otmList[i])
+        {
+            ret = OIC_RANDOM_DEVICE_PIN;
+            break;
+        }
+    }
+
+exit:
+    OIC_LOG(INFO, TAG, "OUT selectOTMcb_default");
+    return ret;
+}
 
 /**
  * Function to select appropriate  provisioning method.
@@ -86,28 +254,119 @@ static OTMContext_t* g_otmCtx = NULL;
  * @param[in] supportedMethods   Array of supported methods
  * @param[in] numberOfMethods   number of supported methods
  * @param[out]  selectedMethod         Selected methods
+ * @param[in] ownerType type of owner device (SUPER_OWNER or SUB_OWNER)
  * @return  OC_STACK_OK on success
  */
-static OCStackResult SelectProvisioningMethod(const OicSecOxm_t *supportedMethods,
-        size_t numberOfMethods, OicSecOxm_t *selectedMethod)
+OCStackResult OTMSelectOwnershipTransferMethod(const OicSecOxm_t *supportedMethods,
+        size_t numberOfMethods, OicSecOxm_t *selectedMethod, OwnerType_t ownerType)
 {
+    bool isOxmSelected = false;
+    OxmAllowTableIdx_t selectedOxmIdx = OXM_IDX_UNKNOWN;
+
     OIC_LOG(DEBUG, TAG, "IN SelectProvisioningMethod");
 
-    if(numberOfMethods == 0 || !supportedMethods)
+    if (numberOfMethods == 0 || !supportedMethods)
     {
         OIC_LOG(WARNING, TAG, "Could not find a supported OxM.");
         return OC_STACK_ERROR;
     }
 
-    *selectedMethod  = supportedMethods[0];
-    for(size_t i = 0; i < numberOfMethods; i++)
+    switch(ownerType)
     {
-        if(*selectedMethod < supportedMethods[i])
+        case SUPER_OWNER:
+        {
+            if (g_selectOTMCB)
+            {
+                uint32_t methNum = 0;
+                OicSecOxm_t list[10] = {0};
+
+            for (size_t i = 0; i < numberOfMethods; i++)
+            {
+                selectedOxmIdx = GetOxmAllowTableIdx(supportedMethods[i]);
+                if (OXM_IDX_COUNT <= selectedOxmIdx)
+                {
+                    OIC_LOG(WARNING, TAG, "Invalid oxm index to access OxM allow table");
+                    continue;
+                }
+    #ifdef MULTIPLE_OWNER
+                    if (ALLOWED_OXM == g_OxmAllowStatus[selectedOxmIdx] &&
+                       OXM_IDX_PRECONFIG_PIN != selectedOxmIdx)
+    #else
+
+                    if (ALLOWED_OXM == g_OxmAllowStatus[selectedOxmIdx])
+    #endif //MULTIPLE_OWNER
+                    {
+                        list[methNum] = supportedMethods[i];
+                        methNum++;
+                    }
+                }
+                *selectedMethod = g_selectOTMCB(list, methNum);
+                isOxmSelected = true;
+            }
+            else
+            {
+                for (size_t i = 0; i < numberOfMethods; i++)
+                {
+                    selectedOxmIdx = GetOxmAllowTableIdx(supportedMethods[i]);
+                    if (OXM_IDX_COUNT <= selectedOxmIdx)
+                    {
+                        OIC_LOG(WARNING, TAG, "Invalid oxm index to access OxM allow table");
+                        continue;
+                    }
+    #ifdef MULTIPLE_OWNER
+                if (ALLOWED_OXM == g_OxmAllowStatus[selectedOxmIdx] &&
+                   OXM_IDX_PRECONFIG_PIN != selectedOxmIdx)
+    #else
+
+                if (ALLOWED_OXM == g_OxmAllowStatus[selectedOxmIdx])
+    #endif //MULTIPLE_OWNER
+                {
+                    *selectedMethod  = supportedMethods[i];
+                    isOxmSelected = true;
+                }
+            }
+        }
+        }
+        break;
+#ifdef MULTIPLE_OWNER
+        case SUB_OWNER:
+        {
+            for (size_t i = 0; i < numberOfMethods; i++)
+            {
+                selectedOxmIdx = GetOxmAllowTableIdx(supportedMethods[i]);
+                if (OXM_IDX_COUNT <= selectedOxmIdx)
+                {
+                    OIC_LOG(WARNING, TAG, "Invalid oxm index to access OxM allow table");
+                    continue;
+                }
+
+                //in case of MOT, only Random PIN & Preconfigured PIN based OxM is allowed
+                if (ALLOWED_OXM == g_OxmAllowStatus[selectedOxmIdx] &&
+                    (OXM_IDX_RANDOM_DEVICE_PIN == selectedOxmIdx ||
+                     OXM_IDX_PRECONFIG_PIN == selectedOxmIdx))
+                {
+                    *selectedMethod  = supportedMethods[i];
+                    isOxmSelected = true;
+                }
+            }
+        }
+        break;
+#endif
+        default:
         {
-            *selectedMethod =  supportedMethods[i];
+            OIC_LOG_V(ERROR, TAG, "Unknown owner type or Not supported owner type : %d", ownerType);
+            return OC_STACK_INVALID_PARAM;
         }
     }
 
+    if (!isOxmSelected)
+    {
+        OIC_LOG(ERROR, TAG, "Can not find the allowed OxM.");
+        return OC_STACK_NOT_ALLOWED_OXM;
+    }
+
+    OIC_LOG(DEBUG, TAG, "OUT SelectProvisioningMethod");
+
     return OC_STACK_OK;
 }
 
@@ -137,6 +396,14 @@ static void SelectOperationMode(const OCProvisionDev_t *selectedDeviceInfo,
  */
 static OCStackResult StartOwnershipTransfer(void* ctx, OCProvisionDev_t* selectedDevice);
 
+/*
+ * Internal function to setup & cleanup PDM to performing provisioning.
+ *
+ * @param[in] selectedDevice   selected device information to performing provisioning.
+ * @return  OC_STACK_OK on success
+ */
+static OCStackResult SetupPDM(const OCProvisionDev_t* selectedDevice);
+
 /**
  * Function to update owner transfer mode
  *
@@ -182,6 +449,14 @@ static OCStackResult PostUpdateOperationMode(OTMContext_t* otmCtx);
 static OCStackResult PostOwnerCredential(OTMContext_t* otmCtx);
 
 /**
+ * Function to update the owner ACL to new device.
+ *
+ * @param[in]  otmCtx  Context value of ownership transfer.
+ * @return  OC_STACK_OK on success
+ */
+static OCStackResult PostOwnerAcl(OTMContext_t* otmCtx);
+
+/**
  * Function to send ownerShip info.
  * This function would update 'owned of doxm' as true.
  *
@@ -229,66 +504,128 @@ static bool IsComplete(OTMContext_t* otmCtx)
  * @param[in,out] otmCtx   Context value of ownership transfer.
  * @param[in] res   result of provisioning
  */
-static void SetResult(OTMContext_t* otmCtx, const OCStackResult res)
+void SetResult(OTMContext_t* otmCtx, const OCStackResult res)
 {
     OIC_LOG_V(DEBUG, TAG, "IN SetResult : %d ", res);
 
-    if(!otmCtx)
+    if(NULL == otmCtx || NULL == otmCtx->selectedDeviceInfo
+            || NULL == otmCtx->selectedDeviceInfo->doxm)
     {
         OIC_LOG(WARNING, TAG, "OTMContext is NULL");
         return;
     }
 
-    if(otmCtx->selectedDeviceInfo)
+    //If OTM Context was removed from previous response handler, just exit the current OTM process.
+    if(NULL == GetOTMContext(otmCtx->selectedDeviceInfo->endpoint.addr,
+                             otmCtx->selectedDeviceInfo->securePort))
+    {
+        OIC_LOG(WARNING, TAG, "Current OTM Process has already ended.");
+    }
+
+    //Revert psk_info callback and new deivce uuid in case of random PIN OxM
+    if(OIC_RANDOM_DEVICE_PIN == otmCtx->selectedDeviceInfo->doxm->oxmSel)
     {
-        //Revert psk_info callback and new deivce uuid in case of random PIN OxM
-        if(OIC_RANDOM_DEVICE_PIN == otmCtx->selectedDeviceInfo->doxm->oxmSel)
+        if(CA_STATUS_OK != CAregisterPskCredentialsHandler(GetDtlsPskCredentials))
         {
-#ifdef __WITH_TLS__
-            if(CA_STATUS_OK != CAregisterTlsCredentialsHandler(GetDtlsPskCredentials))
-            {
-                OIC_LOG(WARNING, TAG, "Failed to revert  is TLS credential handler.");
-            }
-#endif
-            if(CA_STATUS_OK != CARegisterDTLSCredentialsHandler(GetDtlsPskCredentials))
-            {
-                OIC_LOG(WARNING, TAG, "Failed to revert  is DTLS credential handler.");
-            }
-            OicUuid_t emptyUuid = { .id={0}};
-            SetUuidForRandomPinOxm(&emptyUuid);
+            OIC_LOG(WARNING, TAG, "Failed to revert  is DTLS credential handler.");
         }
+        OicUuid_t emptyUuid = { .id={0}};
+        SetUuidForPinBasedOxm(&emptyUuid);
+    }
+    else if(OIC_MANUFACTURER_CERTIFICATE == otmCtx->selectedDeviceInfo->doxm->oxmSel ||
+                        OIC_CON_MFG_CERT == otmCtx->selectedDeviceInfo->doxm->oxmSel)
+    {
+        //Revert back certificate related callbacks.
+        if(CA_STATUS_OK != CAregisterPkixInfoHandler(GetPkixInfo))
+        {
+            OIC_LOG(WARNING, TAG, "Failed to revert PkixInfoHandler.");
+        }
+        if(CA_STATUS_OK != CAregisterGetCredentialTypesHandler(InitCipherSuiteList))
+        {
+            OIC_LOG(WARNING, TAG, "Failed to revert CredentialTypesHandler.");
+        }
+    }
 
-        for(size_t i = 0; i < otmCtx->ctxResultArraySize; i++)
+    for(size_t i = 0; i < otmCtx->ctxResultArraySize; i++)
+    {
+        if(memcmp(otmCtx->selectedDeviceInfo->doxm->deviceID.id,
+                  otmCtx->ctxResultArray[i].deviceId.id, UUID_LENGTH) == 0)
         {
-            if(memcmp(otmCtx->selectedDeviceInfo->doxm->deviceID.id,
-                      otmCtx->ctxResultArray[i].deviceId.id, UUID_LENGTH) == 0)
+            otmCtx->ctxResultArray[i].res = res;
+            if(OC_STACK_OK != res && OC_STACK_CONTINUE != res && OC_STACK_DUPLICATE_REQUEST != res)
             {
-                otmCtx->ctxResultArray[i].res = res;
-                if(OC_STACK_OK != res)
+                otmCtx->ctxHasError = true;
+                if (OC_STACK_OK != PDMDeleteDevice(&otmCtx->ctxResultArray[i].deviceId))
+                {
+                    OIC_LOG(WARNING, TAG, "Internal error in PDMDeleteDevice");
+                }
+                CAEndpoint_t endpoint;
+                memcpy(&endpoint, &(otmCtx->selectedDeviceInfo->endpoint), sizeof(CAEndpoint_t));
+                endpoint.port = otmCtx->selectedDeviceInfo->securePort;
+                if (CA_STATUS_OK != CAcloseSslConnection(&endpoint))
                 {
-                    otmCtx->ctxHasError = true;
+                    OIC_LOG(WARNING, TAG, "Failed to close Secure session");
                 }
             }
         }
+    }
 
-        g_otmCtx = NULL;
+    //In case of duplicated OTM process, OTMContext and OCDoHandle should not be removed.
+    if(OC_STACK_DUPLICATE_REQUEST != res)
+    {
+        //Remove the current OTM Context from OTM queue
+        RemoveOTMContext(otmCtx->selectedDeviceInfo->endpoint.addr,
+                         otmCtx->selectedDeviceInfo->securePort);
 
-        //If all request is completed, invoke the user callback.
-        if(IsComplete(otmCtx))
+        //If there is a request being performed, cancel it to prevent retransmission.
+        if(otmCtx->ocDoHandle)
         {
-            otmCtx->ctxResultCallback(otmCtx->userCtx, otmCtx->ctxResultArraySize,
-                                       otmCtx->ctxResultArray, otmCtx->ctxHasError);
-            OICFree(otmCtx->ctxResultArray);
-            OICFree(otmCtx);
+            OIC_LOG_V(DEBUG, TAG, "OCCancel - %s : %d",
+                    otmCtx->selectedDeviceInfo->endpoint.addr,
+                    otmCtx->selectedDeviceInfo->securePort);
+            if(OC_STACK_OK != OCCancel(otmCtx->ocDoHandle, OC_HIGH_QOS, NULL, 0))
+            {
+                OIC_LOG(WARNING, TAG, "Failed to remove registered callback");
+            }
+            else
+            {
+                otmCtx->ocDoHandle = NULL;
+            }
         }
-        else
+    }
+
+    //If all OTM process is complete, invoke the user callback.
+    if(IsComplete(otmCtx))
+    {
+        if(OC_STACK_OK != res && OC_STACK_CONTINUE != res && OC_STACK_DUPLICATE_REQUEST != res)
         {
-            if(OC_STACK_OK != StartOwnershipTransfer(otmCtx,
-                                                     otmCtx->selectedDeviceInfo->next))
+            // Reset doxm and pstat properties to pre-Ownership Transfer state
+            OIC_LOG(DEBUG, TAG, "Resetting doxm and pstat properties");
+            if(otmCtx->selectedDeviceInfo->doxm)
+            {
+                OicUuid_t emptyUuid = {.id = {0}};
+                memcpy(&(otmCtx->selectedDeviceInfo->doxm->owner), &emptyUuid, sizeof(OicUuid_t));
+                otmCtx->selectedDeviceInfo->doxm->owned = false;
+            }
+            if(otmCtx->selectedDeviceInfo->pstat)
             {
-                OIC_LOG(ERROR, TAG, "Failed to StartOwnershipTransfer");
+                otmCtx->selectedDeviceInfo->pstat->isOp = false;
+                otmCtx->selectedDeviceInfo->pstat->cm |= TAKE_OWNER;
             }
         }
+
+        otmCtx->ctxResultCallback(otmCtx->userCtx, otmCtx->ctxResultArraySize,
+                                   otmCtx->ctxResultArray, otmCtx->ctxHasError);
+        OICFree(otmCtx->ctxResultArray);
+        OICFree(otmCtx);
+    }
+    else
+    {
+        if(OC_STACK_OK != StartOwnershipTransfer(otmCtx,
+                                                 otmCtx->selectedDeviceInfo->next))
+        {
+            OIC_LOG(ERROR, TAG, "Failed to StartOwnershipTransfer");
+        }
     }
 
     OIC_LOG(DEBUG, TAG, "OUT SetResult");
@@ -303,91 +640,165 @@ static void SetResult(OTMContext_t* otmCtx, const OCStackResult res)
  */
 void DTLSHandshakeCB(const CAEndpoint_t *endpoint, const CAErrorInfo_t *info)
 {
-    if(NULL != g_otmCtx && NULL != g_otmCtx->selectedDeviceInfo &&
-       NULL != endpoint && NULL != info)
+    OIC_LOG(DEBUG, TAG, "IN DTLSHandshakeCB");
+    if(NULL != endpoint && NULL != info)
     {
         OIC_LOG_V(INFO, TAG, "Received status from remote device(%s:%d) : %d",
                  endpoint->addr, endpoint->port, info->result);
 
-        OicSecDoxm_t* newDevDoxm = g_otmCtx->selectedDeviceInfo->doxm;
-
-        if(NULL != newDevDoxm)
+        OTMContext_t* otmCtx = GetOTMContext(endpoint->addr, endpoint->port);
+        if(otmCtx)
         {
-            OicUuid_t emptyUuid = {.id={0}};
-
-            //Make sure the address matches.
-            if(strncmp(g_otmCtx->selectedDeviceInfo->endpoint.addr,
-               endpoint->addr,
-               sizeof(endpoint->addr)) == 0 &&
-               g_otmCtx->selectedDeviceInfo->securePort == endpoint->port)
+            OicSecDoxm_t* newDevDoxm = otmCtx->selectedDeviceInfo->doxm;
+            if(NULL != newDevDoxm)
             {
-                OCStackResult res = OC_STACK_ERROR;
+                OicUuid_t emptyUuid = {.id={0}};
 
-                //If temporal secure sesstion established successfully
-                if(CA_STATUS_OK == info->result &&
-                   false == newDevDoxm->owned &&
-                   memcmp(&(newDevDoxm->owner), &emptyUuid, sizeof(OicUuid_t)) == 0)
-                {
-                    //Send request : POST /oic/sec/doxm [{... , "devowner":"PT's UUID"}]
-                    res = PostOwnerUuid(g_otmCtx);
-                    if(OC_STACK_OK != res)
-                    {
-                        OIC_LOG(ERROR, TAG, "OperationModeUpdate : Failed to send owner information");
-                        SetResult(g_otmCtx, res);
-                    }
-                }
-                //In case of authentication failure
-                else if(CA_DTLS_AUTHENTICATION_FAILURE == info->result)
+                //Make sure the address matches.
+                if(strncmp(otmCtx->selectedDeviceInfo->endpoint.addr,
+                   endpoint->addr,
+                   sizeof(endpoint->addr)) == 0 &&
+                   otmCtx->selectedDeviceInfo->securePort == endpoint->port)
                 {
-                    //in case of error from owner credential
-                    if(memcmp(&(newDevDoxm->owner), &emptyUuid, sizeof(OicUuid_t)) != 0 &&
-                        true == newDevDoxm->owned)
+                    OCStackResult res = OC_STACK_ERROR;
+
+                    //If temporal secure sesstion established successfully
+                    if(CA_STATUS_OK == info->result &&
+                       false == newDevDoxm->owned &&
+                       memcmp(&(newDevDoxm->owner), &emptyUuid, sizeof(OicUuid_t)) == 0)
                     {
-                        OIC_LOG(ERROR, TAG, "The owner credential may incorrect.");
+                        //In case of Mutual Verified Just-Works, display mutualVerifNum
+                        if (OIC_MV_JUST_WORKS == newDevDoxm->oxmSel)
+                        {
+                            uint8_t preMutualVerifNum[OWNER_PSK_LENGTH_128] = {0};
+                            uint8_t mutualVerifNum[MUTUAL_VERIF_NUM_LEN] = {0};
+                            OicUuid_t deviceID = {.id = {0}};
+
+                            //Generate mutualVerifNum
+                            char label[LABEL_LEN] = {0};
+                            snprintf(label, LABEL_LEN, "%s%s", MUTUAL_VERIF_NUM, OXM_MV_JUST_WORKS);
+                            res = GetDoxmDeviceID(&deviceID);
+                            if (OC_STACK_OK != res)
+                            {
+                                OIC_LOG(ERROR, TAG, "Error while retrieving Owner's device ID");
+                                SetResult(otmCtx, res);
+                                return;
+                            }
+
+                            CAResult_t pskRet = CAGenerateOwnerPSK(endpoint,
+                                    (uint8_t *)label,
+                                    strlen(label),
+                                    deviceID.id, sizeof(deviceID.id),
+                                    newDevDoxm->deviceID.id, sizeof(newDevDoxm->deviceID.id),
+                                    preMutualVerifNum, OWNER_PSK_LENGTH_128);
+                            if (CA_STATUS_OK != pskRet)
+                            {
+                                OIC_LOG(WARNING, TAG, "Failed to remove the invaild owner credential");
+                                SetResult(otmCtx, OC_STACK_ERROR);
+                                return;
+                            }
+
+                            memcpy(mutualVerifNum, preMutualVerifNum + OWNER_PSK_LENGTH_128 - sizeof(mutualVerifNum),
+                                    sizeof(mutualVerifNum));
+                            res = VerifyOwnershipTransfer(mutualVerifNum, DISPLAY_NUM);
+                            if (OC_STACK_OK != res)
+                            {
+                                OIC_LOG(ERROR, TAG, "Error while displaying mutualVerifNum");
+                                SetResult(otmCtx, res);
+                                return;
+                            }
+                        }
+                        //In case of confirmed manufacturer cert, display message
+                        else if (OIC_MANUFACTURER_CERTIFICATE == newDevDoxm->oxmSel || OIC_CON_MFG_CERT == newDevDoxm->oxmSel)
+                        {
+                            res = VerifyOwnershipTransfer(NULL, DISPLAY_NUM);
+                            if (OC_STACK_OK != res)
+                            {
+                                OIC_LOG(ERROR, TAG, "Error while displaying message");
+                                SetResult(otmCtx, res);
+                                return;
+                            }
+                        }
 
-                        if(OC_STACK_OK != RemoveCredential(&(newDevDoxm->deviceID)))
+                        //Send request : POST /oic/sec/doxm [{... , "devowner":"PT's UUID"}]
+                        res = PostOwnerUuid(otmCtx);
+                        if(OC_STACK_OK != res)
                         {
-                            OIC_LOG(WARNING, TAG, "Failed to remove the invaild owner credential");
+                            OIC_LOG(ERROR, TAG, "OperationModeUpdate : Failed to send owner information");
+                            SetResult(otmCtx, res);
                         }
-                        SetResult(g_otmCtx, OC_STACK_AUTHENTICATION_FAILURE);
                     }
-                    //in case of error from wrong PIN, re-start the ownership transfer
-                    else if(OIC_RANDOM_DEVICE_PIN == newDevDoxm->oxmSel)
+                    //In case of authentication failure
+                    else if(CA_DTLS_AUTHENTICATION_FAILURE == info->result)
                     {
-                        OIC_LOG(ERROR, TAG, "The PIN number may incorrect.");
-
-                        memcpy(&(newDevDoxm->owner), &emptyUuid, sizeof(OicUuid_t));
-                        newDevDoxm->owned = false;
-                        g_otmCtx->attemptCnt++;
+                        //in case of error from owner credential
+                        if(memcmp(&(newDevDoxm->owner), &emptyUuid, sizeof(OicUuid_t)) != 0 &&
+                            true == newDevDoxm->owned)
+                        {
+                            OIC_LOG(ERROR, TAG, "The owner credential may incorrect.");
 
-                        if(WRONG_PIN_MAX_ATTEMP > g_otmCtx->attemptCnt)
+                            if(OC_STACK_OK != RemoveCredential(&(newDevDoxm->deviceID)))
+                            {
+                                OIC_LOG(WARNING, TAG, "Failed to remove the invaild owner credential");
+                            }
+                            SetResult(otmCtx, OC_STACK_AUTHENTICATION_FAILURE);
+                        }
+                        //in case of error from wrong PIN, re-start the ownership transfer
+                        else if(OIC_RANDOM_DEVICE_PIN == newDevDoxm->oxmSel)
                         {
-                            res = StartOwnershipTransfer(g_otmCtx, g_otmCtx->selectedDeviceInfo);
-                            if(OC_STACK_OK != res)
+                            OIC_LOG(ERROR, TAG, "The PIN number may incorrect.");
+
+                            memcpy(&(newDevDoxm->owner), &emptyUuid, sizeof(OicUuid_t));
+                            newDevDoxm->owned = false;
+                            otmCtx->attemptCnt++;
+
+                            RemoveOTMContext(otmCtx->selectedDeviceInfo->endpoint.addr,
+                                             otmCtx->selectedDeviceInfo->securePort);
+
+                            // In order to re-start ownership transfer, device information should be deleted from PDM.
+                            res = PDMDeleteDevice(&(otmCtx->selectedDeviceInfo->doxm->deviceID));
+                            if (OC_STACK_OK != res)
+                            {
+                                SetResult(otmCtx, res);
+                                OIC_LOG(ERROR, TAG, "Failed to PDMDeleteDevice");
+                            }
+                            else
                             {
-                                SetResult(g_otmCtx, res);
-                                OIC_LOG(ERROR, TAG, "Failed to Re-StartOwnershipTransfer");
+                                if(WRONG_PIN_MAX_ATTEMP > otmCtx->attemptCnt)
+                                {
+                                    res = StartOwnershipTransfer(otmCtx, otmCtx->selectedDeviceInfo);
+                                    if(OC_STACK_OK != res)
+                                    {
+                                        SetResult(otmCtx, res);
+                                        OIC_LOG(ERROR, TAG, "Failed to Re-StartOwnershipTransfer");
+                                    }
+                                }
+                                else
+                                {
+                                    OIC_LOG(ERROR, TAG, "User has exceeded the number of authentication attempts.");
+                                    SetResult(otmCtx, OC_STACK_AUTHENTICATION_FAILURE);
+                                }
                             }
                         }
                         else
                         {
-                            OIC_LOG(ERROR, TAG, "User has exceeded the number of authentication attempts.");
-                            SetResult(g_otmCtx, OC_STACK_AUTHENTICATION_FAILURE);
+                            OIC_LOG(ERROR, TAG, "Failed to establish secure session.");
+                            SetResult(otmCtx, OC_STACK_AUTHENTICATION_FAILURE);
                         }
                     }
-                    else
-                    {
-                        OIC_LOG(ERROR, TAG, "Failed to establish secure session.");
-                        SetResult(g_otmCtx, OC_STACK_AUTHENTICATION_FAILURE);
-                    }
                 }
             }
         }
+        else
+        {
+            OIC_LOG(ERROR, TAG, "Can not find the OTM Context.");
+        }
     }
+    OIC_LOG(DEBUG, TAG, "OUT DTLSHandshakeCB");
 }
 
 /**
- * Function to save ownerPSK at provisioning tool end.
+ * Function to save the Owner/SubOwner PSK.
  *
  * @param[in] selectedDeviceInfo   selected device information to performing provisioning.
  * @return  OC_STACK_OK on success
@@ -405,55 +816,90 @@ static OCStackResult SaveOwnerPSK(OCProvisionDev_t *selectedDeviceInfo)
     endpoint.port = selectedDeviceInfo->securePort;
     endpoint.adapter = selectedDeviceInfo->endpoint.adapter;
 
-    OicUuid_t ptDeviceID = {.id={0}};
-    if (OC_STACK_OK != GetDoxmDeviceID(&ptDeviceID))
+    OicUuid_t ownerDeviceID = {.id={0}};
+    if (OC_STACK_OK != GetDoxmDeviceID(&ownerDeviceID))
     {
-        OIC_LOG(ERROR, TAG, "Error while retrieving provisioning tool's device ID");
+        OIC_LOG(ERROR, TAG, "Error while retrieving Owner's device ID");
         return res;
     }
 
     uint8_t ownerPSK[OWNER_PSK_LENGTH_128] = {0};
-    OicSecKey_t ownerKey = {ownerPSK, OWNER_PSK_LENGTH_128};
+    OicSecKey_t ownerKey = {.data=ownerPSK, .len=OWNER_PSK_LENGTH_128, .encoding=OIC_ENCODING_RAW};
 
     //Generating OwnerPSK
     CAResult_t pskRet = CAGenerateOwnerPSK(&endpoint,
             (uint8_t *)GetOxmString(selectedDeviceInfo->doxm->oxmSel),
             strlen(GetOxmString(selectedDeviceInfo->doxm->oxmSel)),
-            ptDeviceID.id, sizeof(ptDeviceID.id),
+            ownerDeviceID.id, sizeof(ownerDeviceID.id),
             selectedDeviceInfo->doxm->deviceID.id, sizeof(selectedDeviceInfo->doxm->deviceID.id),
             ownerPSK, OWNER_PSK_LENGTH_128);
 
     if (CA_STATUS_OK == pskRet)
     {
-        OIC_LOG(INFO, TAG,"ownerPSK dump:\n");
-        OIC_LOG_BUFFER(INFO, TAG,ownerPSK, OWNER_PSK_LENGTH_128);
+        OIC_LOG(DEBUG, TAG,"Owner PSK dump:\n");
+        OIC_LOG_BUFFER(DEBUG, TAG,ownerPSK, OWNER_PSK_LENGTH_128);
         //Generating new credential for provisioning tool
         OicSecCred_t *cred = GenerateCredential(&selectedDeviceInfo->doxm->deviceID,
-                SYMMETRIC_PAIR_WISE_KEY, NULL,
-                &ownerKey, &ptDeviceID);
+                                  SYMMETRIC_PAIR_WISE_KEY, NULL,
+                                  &ownerKey, &ownerDeviceID, NULL);
+        OICClearMemory(ownerPSK, sizeof(ownerPSK));
         VERIFY_NON_NULL(TAG, cred, ERROR);
 
-        // TODO: Added as workaround. Will be replaced soon.
-        cred->privateData.encoding = OIC_ENCODING_RAW;
-
-#if 1
-        // NOTE: Test codes to use BASE64 encoded owner PSK.
         uint32_t outSize = 0;
         size_t b64BufSize = B64ENCODE_OUT_SAFESIZE((OWNER_PSK_LENGTH_128 + 1));
-        char* b64Buf = (uint8_t *)OICCalloc(1, b64BufSize);
+        char* b64Buf = (char *)OICCalloc(1, b64BufSize);
         VERIFY_NON_NULL(TAG, b64Buf, ERROR);
         b64Encode(cred->privateData.data, cred->privateData.len, b64Buf, b64BufSize, &outSize);
 
         OICFree( cred->privateData.data );
         cred->privateData.data = (uint8_t *)OICCalloc(1, outSize + 1);
-        VERIFY_NON_NULL(TAG, cred->privateData.data, ERROR);
+        if (cred->privateData.data == NULL)
+            {
+                OICFree(b64Buf);
+                res = OC_STACK_ERROR;
+                goto exit;
+            }
 
-        strncpy(cred->privateData.data, b64Buf, outSize);
+        strncpy((char*)(cred->privateData.data), b64Buf, outSize);
         cred->privateData.data[outSize] = '\0';
         cred->privateData.encoding = OIC_ENCODING_BASE64;
         cred->privateData.len = outSize;
         OICFree(b64Buf);
-#endif //End of Test codes
+
+        //Finding previous ownerPSK.
+        const OicSecCred_t* credList = GetCredList();
+        const OicSecCred_t* prevCred = NULL;
+        uint16_t credId = 0;
+        LL_FOREACH(credList, prevCred)
+        {
+            //OwnerPSK's type is SYMMETRIC_PAIR_WISE_KEY
+            if (SYMMETRIC_PAIR_WISE_KEY == prevCred->credType &&
+                0 == memcmp(prevCred->subject.id, cred->subject.id, sizeof(cred->subject.id)))
+            {
+                credId = prevCred->credId;
+                break;
+            }
+        }
+
+        //If duplicate owner PSK is exists, remove it.
+        if(0 < credId)
+        {
+            OIC_LOG(WARNING, TAG, "Duplicate OwnerPSK was detected.");
+            OIC_LOG(WARNING, TAG, "[Subject] : ");
+            OIC_LOG_BUFFER(WARNING, TAG, prevCred->subject.id, sizeof(prevCred->subject.id));
+            OIC_LOG_V(WARNING, TAG, "[Encoding Type] : %d", prevCred->privateData.encoding);
+            OIC_LOG(DEBUG, TAG, "[Private Data] : ");
+            OIC_LOG_BUFFER(DEBUG, TAG, prevCred->privateData.data, prevCred->privateData.len);
+            OIC_LOG(WARNING, TAG, "Previous OwnerPSK will be removed.");
+
+            res = RemoveCredentialByCredId(credId);
+            if(OC_STACK_RESOURCE_DELETED != res)
+            {
+                OIC_LOG(ERROR, TAG, "Failed to remove the previous OwnerPSK");
+                DeleteCredList(cred);
+                goto exit;
+            }
+        }
 
         res = AddCredential(cred);
         if(res != OC_STACK_OK)
@@ -490,6 +936,7 @@ static OCStackApplicationResult OwnerTransferModeHandler(void *ctx, OCDoHandle U
     VERIFY_NON_NULL(TAG, ctx, WARNING);
 
     OTMContext_t* otmCtx = (OTMContext_t*)ctx;
+    otmCtx->ocDoHandle = NULL;
     (void)UNUSED;
     if (OC_STACK_RESOURCE_CHANGED == clientResponse->result)
     {
@@ -533,6 +980,7 @@ static OCStackApplicationResult ListMethodsHandler(void *ctx, OCDoHandle UNUSED,
     VERIFY_NON_NULL(TAG, ctx, WARNING);
 
     OTMContext_t* otmCtx = (OTMContext_t*)ctx;
+    otmCtx->ocDoHandle = NULL;
     (void)UNUSED;
     if  (OC_STACK_OK == clientResponse->result)
     {
@@ -591,6 +1039,13 @@ exit:
     return  OC_STACK_DELETE_TRANSACTION;
 }
 
+static void deleteCallback(void *ctx)
+{
+    OC_UNUSED(ctx);
+    OIC_LOG_V(DEBUG, TAG, "%s: otm context deleted", __func__);
+}
+
+
 /**
  * Response handler for update owner uuid request.
  *
@@ -610,11 +1065,28 @@ static OCStackApplicationResult OwnerUuidUpdateHandler(void *ctx, OCDoHandle UNU
     (void)UNUSED;
     OCStackResult res = OC_STACK_OK;
     OTMContext_t* otmCtx = (OTMContext_t*)ctx;
+    otmCtx->ocDoHandle = NULL;
 
     if(OC_STACK_RESOURCE_CHANGED == clientResponse->result)
     {
         if(otmCtx && otmCtx->selectedDeviceInfo)
         {
+            //In case of Mutual Verified Just-Works, wait for user confirmation
+            if (OIC_MV_JUST_WORKS == otmCtx->selectedDeviceInfo->doxm->oxmSel)
+            {
+                res = VerifyOwnershipTransfer(NULL, USER_CONFIRM);
+                if (OC_STACK_OK != res)
+                {
+                    if (OC_STACK_OK != SRPResetDevice(otmCtx->selectedDeviceInfo, deleteCallback))
+                    {
+                        OIC_LOG(WARNING, TAG, "OwnerUuidUpdateHandler : SRPResetDevice error");
+                    }
+                    OIC_LOG(ERROR, TAG, "OwnerUuidUpdateHandler:Failed to verify user confirm");
+                    SetResult(otmCtx, res);
+                    return OC_STACK_DELETE_TRANSACTION;
+                }
+            }
+
             res = SaveOwnerPSK(otmCtx->selectedDeviceInfo);
             if(OC_STACK_OK != res)
             {
@@ -636,8 +1108,25 @@ static OCStackApplicationResult OwnerUuidUpdateHandler(void *ctx, OCDoHandle UNU
     }
     else
     {
-        res = clientResponse->result;
-        OIC_LOG_V(ERROR, TAG, "OwnerUuidHandler : Unexpected result %d", res);
+        if (((OIC_MANUFACTURER_CERTIFICATE == otmCtx->selectedDeviceInfo->doxm->oxmSel) ||
+            (OIC_CON_MFG_CERT == otmCtx->selectedDeviceInfo->doxm->oxmSel)) &&
+                    OC_STACK_NOT_ACCEPTABLE == clientResponse->result)
+        {
+            res = OC_STACK_USER_DENIED_REQ;
+            OIC_LOG_V(ERROR, TAG,
+                    "OwnerUuidUpdateHandler : Denied Request(%d)", res);
+        }
+        else if (OC_STACK_GATEWAY_TIMEOUT == clientResponse->result)
+        {
+            res = clientResponse->result;
+            OIC_LOG_V(ERROR, TAG,
+                    "OwnerUuidUpdateHandler : Timeout:No Response Received(%d)", res);
+        }
+        else
+        {
+            res = clientResponse->result;
+            OIC_LOG_V(ERROR, TAG, "OwnerUuidUpdateHandler : Unexpected result(%d)", res);
+        }
         SetResult(otmCtx, res);
     }
 
@@ -647,6 +1136,49 @@ exit:
     return  OC_STACK_DELETE_TRANSACTION;
 }
 
+/*
+ * Invokes Callback to load Random PIN
+ */
+void *LoadRandomPin(void *ctx)
+{
+    OIC_LOG_V(DEBUG, TAG, "IN %s", __func__);
+    OTMContext_t* otmCtx = (OTMContext_t*)ctx;
+    OCStackResult res = OC_STACK_ERROR;
+    res = otmCtx->otmCallback.loadSecretCB(otmCtx);
+
+    if(OC_STACK_OK != res)
+    {
+        OIC_LOG_V(ERROR, TAG, "%s : Failed to load secret", __func__);
+        SetResult(otmCtx, res);
+        OIC_LOG_V(DEBUG, TAG, "OUT %s", __func__);
+        return NULL;
+    }
+
+    //Save the current context instance to use on the dtls handshake callback
+    if(OC_STACK_OK != AddOTMContext(otmCtx,
+                                     otmCtx->selectedDeviceInfo->endpoint.addr,
+                                     otmCtx->selectedDeviceInfo->securePort))
+    {
+        OIC_LOG_V(ERROR, TAG, "%s : Failed to add OTM Context into OTM List.", __func__);
+        SetResult(otmCtx, res);
+        OIC_LOG_V(DEBUG, TAG, "OUT %s", __func__);
+        return NULL;
+    }
+
+    //Try DTLS handshake to generate secure session
+    if(otmCtx->otmCallback.createSecureSessionCB)
+    {
+        res = otmCtx->otmCallback.createSecureSessionCB(otmCtx);
+        if(OC_STACK_OK != res)
+        {
+            OIC_LOG_V(ERROR, TAG, "%s : Failed to create DTLS session", __func__);
+            SetResult(otmCtx, res);
+        }
+    }
+    OIC_LOG_V(DEBUG, TAG, "OUT %s", __func__);
+    return NULL;
+}
+
 /**
  * Response handler for update operation mode.
  *
@@ -665,36 +1197,60 @@ static OCStackApplicationResult OperationModeUpdateHandler(void *ctx, OCDoHandle
     VERIFY_NON_NULL(TAG, ctx, WARNING);
 
     OTMContext_t* otmCtx = (OTMContext_t*)ctx;
+    otmCtx->ocDoHandle = NULL;
     (void) UNUSED;
     if  (OC_STACK_RESOURCE_CHANGED == clientResponse->result)
     {
         OCStackResult res = OC_STACK_ERROR;
-        OicSecOxm_t selOxm = otmCtx->selectedDeviceInfo->doxm->oxmSel;
+
         //DTLS Handshake
         //Load secret for temporal secure session.
-        if(g_OTMDatas[selOxm].loadSecretCB)
+        if(otmCtx->otmCallback.loadSecretCB)
         {
-            res = g_OTMDatas[selOxm].loadSecretCB(otmCtx);
-            if(OC_STACK_OK != res)
+            if (OIC_RANDOM_DEVICE_PIN == otmCtx->selectedDeviceInfo->doxm->oxmSel)
             {
-                OIC_LOG(ERROR, TAG, "OperationModeUpdate : Failed to load secret");
-                SetResult(otmCtx, res);
-                return  OC_STACK_DELETE_TRANSACTION;
+                pthread_t p_thread;
+                int thr_result;
+                thr_result = pthread_create(&p_thread, NULL, LoadRandomPin, (void *) otmCtx);
+                if (0 != thr_result)
+                {
+                    OIC_LOG_V(ERROR, TAG, "pthread_create Error with code %d", thr_result);
+                    SetResult(otmCtx, res);
+                    return  OC_STACK_DELETE_TRANSACTION;
+                }
+                OIC_LOG(INFO, TAG, "Random Pin loadSecretCB Thread Created");
             }
-        }
+            else
+            {
+                res = otmCtx->otmCallback.loadSecretCB(otmCtx);
+                if(OC_STACK_OK != res)
+                {
+                    OIC_LOG(ERROR, TAG, "OperationModeUpdate : Failed to load secret");
+                    SetResult(otmCtx, res);
+                    return  OC_STACK_DELETE_TRANSACTION;
+                }
 
-        //It will be used in handshake event handler
-        g_otmCtx = otmCtx;
+                //Save the current context instance to use on the dtls handshake callback
+                if(OC_STACK_OK != AddOTMContext(otmCtx,
+                                                 otmCtx->selectedDeviceInfo->endpoint.addr,
+                                                 otmCtx->selectedDeviceInfo->securePort))
+                {
+                    OIC_LOG(ERROR, TAG, "OperationModeUpdate : Failed to add OTM Context into OTM List.");
+                    SetResult(otmCtx, res);
+                    return OC_STACK_DELETE_TRANSACTION;
+                }
 
-        //Try DTLS handshake to generate secure session
-        if(g_OTMDatas[selOxm].createSecureSessionCB)
-        {
-            res = g_OTMDatas[selOxm].createSecureSessionCB(otmCtx);
-            if(OC_STACK_OK != res)
-            {
-                OIC_LOG(ERROR, TAG, "OperationModeUpdate : Failed to create DTLS session");
-                SetResult(otmCtx, res);
-                return OC_STACK_DELETE_TRANSACTION;
+                //Try DTLS handshake to generate secure session
+                if(otmCtx->otmCallback.createSecureSessionCB)
+                {
+                    res = otmCtx->otmCallback.createSecureSessionCB(otmCtx);
+                    if(OC_STACK_OK != res)
+                    {
+                        OIC_LOG(ERROR, TAG, "OperationModeUpdate : Failed to create DTLS session");
+                        SetResult(otmCtx, res);
+                        return OC_STACK_DELETE_TRANSACTION;
+                    }
+                }
             }
         }
     }
@@ -729,6 +1285,7 @@ static OCStackApplicationResult OwnerCredentialHandler(void *ctx, OCDoHandle UNU
     (void)UNUSED;
     OCStackResult res = OC_STACK_OK;
     OTMContext_t* otmCtx = (OTMContext_t*)ctx;
+    otmCtx->ocDoHandle = NULL;
 
     if(OC_STACK_RESOURCE_CHANGED == clientResponse->result)
     {
@@ -738,16 +1295,8 @@ static OCStackApplicationResult OwnerCredentialHandler(void *ctx, OCDoHandle UNU
             CAEndpoint_t* endpoint = (CAEndpoint_t *)&otmCtx->selectedDeviceInfo->endpoint;
             endpoint->port = otmCtx->selectedDeviceInfo->securePort;
             CAResult_t caResult = CA_STATUS_OK;
-            if(CA_ADAPTER_IP == endpoint->adapter)
-            {
-                caResult = CACloseDtlsSession(endpoint);
-            }
-#ifdef __WITH_TLS__
-            else
-            {
-                caResult = CAcloseTlsConnection(endpoint);
-            }
-#endif
+            caResult = CAcloseSslConnection(endpoint);
+
             if(CA_STATUS_OK != caResult)
             {
                 OIC_LOG(ERROR, TAG, "Failed to close DTLS session");
@@ -759,21 +1308,13 @@ static OCStackApplicationResult OwnerCredentialHandler(void *ctx, OCDoHandle UNU
              * If we select NULL cipher,
              * client will select appropriate cipher suite according to server's cipher-suite list.
              */
-            if(CA_ADAPTER_IP == endpoint->adapter)
+            // TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA_256 = 0xC037, /**< see RFC 5489 */
+            caResult = CASelectCipherSuite(0xC037, endpoint->adapter);
+            if(CA_STATUS_OK != caResult)
             {
-                caResult = CASelectCipherSuite(TLS_NULL_WITH_NULL_NULL, endpoint->adapter);
-            }
-            else
-            {
-                // TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA_256 = 0xC037, /**< see RFC 5489 */
-                caResult = CASelectCipherSuite(0xC037, endpoint->adapter);
-            }
-
-            if(CA_STATUS_OK != caResult)
-            {
-                OIC_LOG(ERROR, TAG, "Failed to select TLS_NULL_WITH_NULL_NULL");
-                SetResult(otmCtx, caResult);
-                return OC_STACK_DELETE_TRANSACTION;
+                OIC_LOG(ERROR, TAG, "Failed to select TLS_NULL_WITH_NULL_NULL");
+                SetResult(otmCtx, caResult);
+                return OC_STACK_DELETE_TRANSACTION;
             }
 
             /**
@@ -783,18 +1324,9 @@ static OCStackApplicationResult OwnerCredentialHandler(void *ctx, OCDoHandle UNU
             if(OIC_RANDOM_DEVICE_PIN == otmCtx->selectedDeviceInfo->doxm->oxmSel)
             {
                 OicUuid_t emptyUuid = { .id={0}};
-                SetUuidForRandomPinOxm(&emptyUuid);
+                SetUuidForPinBasedOxm(&emptyUuid);
 
-                if(CA_ADAPTER_IP == endpoint->adapter)
-                {
-                    caResult = CARegisterDTLSCredentialsHandler(GetDtlsPskCredentials);
-                }
-#ifdef __WITH_TLS__
-                else
-                {
-                    caResult = CAregisterTlsCredentialsHandler(GetDtlsPskCredentials);
-                }
-#endif
+                caResult = CAregisterPskCredentialsHandler(GetDtlsPskCredentials);
 
                 if(CA_STATUS_OK != caResult)
                 {
@@ -806,11 +1338,10 @@ static OCStackApplicationResult OwnerCredentialHandler(void *ctx, OCDoHandle UNU
 #ifdef __WITH_TLS__
            otmCtx->selectedDeviceInfo->connType |= CT_FLAG_SECURE;
 #endif
-            //POST /oic/sec/doxm [{ ..., "owned":"TRUE" }]
-            res = PostOwnershipInformation(otmCtx);
+            res = PostOwnerAcl(otmCtx);
             if(OC_STACK_OK != res)
             {
-                OIC_LOG(ERROR, TAG, "Failed to post ownership information to new device");
+                OIC_LOG(ERROR, TAG, "Failed to update owner ACL to new device");
                 SetResult(otmCtx, res);
                 return OC_STACK_DELETE_TRANSACTION;
             }
@@ -829,6 +1360,53 @@ exit:
     return  OC_STACK_DELETE_TRANSACTION;
 }
 
+/**
+ * Response handler for update owner ACL request.
+ *
+ * @param[in] ctx             ctx value passed to callback from calling function.
+ * @param[in] UNUSED          handle to an invocation
+ * @param[in] clientResponse  Response from queries to remote servers.
+ * @return  OC_STACK_DELETE_TRANSACTION to delete the transaction
+ *          and  OC_STACK_KEEP_TRANSACTION to keep it.
+ */
+static OCStackApplicationResult OwnerAclHandler(void *ctx, OCDoHandle UNUSED,
+                                OCClientResponse *clientResponse)
+{
+    VERIFY_NON_NULL(TAG, clientResponse, WARNING);
+    VERIFY_NON_NULL(TAG, ctx, WARNING);
+
+    OIC_LOG(DEBUG, TAG, "IN OwnerAclHandler");
+    (void)UNUSED;
+    OCStackResult res = OC_STACK_OK;
+    OTMContext_t* otmCtx = (OTMContext_t*)ctx;
+    otmCtx->ocDoHandle = NULL;
+
+    if(OC_STACK_RESOURCE_CHANGED == clientResponse->result)
+    {
+        if(otmCtx && otmCtx->selectedDeviceInfo)
+        {
+            //POST /oic/sec/doxm [{ ..., "owned":"TRUE" }]
+            res = PostOwnershipInformation(otmCtx);
+            if(OC_STACK_OK != res)
+            {
+                OIC_LOG(ERROR, TAG, "Failed to update ownership information to new device");
+                SetResult(otmCtx, res);
+            }
+        }
+    }
+    else
+    {
+        res = clientResponse->result;
+        OIC_LOG_V(ERROR, TAG, "OwnerAclHandler : Unexpected result %d", res);
+        SetResult(otmCtx, res);
+    }
+
+    OIC_LOG(DEBUG, TAG, "OUT OwnerAclHandler");
+
+exit:
+    return  OC_STACK_DELETE_TRANSACTION;
+}
+
 
 /**
  * Response handler for update owner information request.
@@ -849,6 +1427,7 @@ static OCStackApplicationResult OwnershipInformationHandler(void *ctx, OCDoHandl
     (void)UNUSED;
     OCStackResult res = OC_STACK_OK;
     OTMContext_t* otmCtx = (OTMContext_t*)ctx;
+    otmCtx->ocDoHandle = NULL;
 
     if(OC_STACK_RESOURCE_CHANGED == clientResponse->result)
     {
@@ -896,6 +1475,7 @@ static OCStackApplicationResult ProvisioningStatusHandler(void *ctx, OCDoHandle
     VERIFY_NON_NULL(TAG, ctx, ERROR);
 
     OTMContext_t* otmCtx = (OTMContext_t*) ctx;
+    otmCtx->ocDoHandle = NULL;
     (void)UNUSED;
     OCStackResult res = OC_STACK_OK;
 
@@ -943,12 +1523,15 @@ static OCStackApplicationResult ReadyForNomalStatusHandler(void *ctx, OCDoHandle
     VERIFY_NON_NULL(TAG, ctx, ERROR);
 
     OTMContext_t* otmCtx = (OTMContext_t*) ctx;
+    otmCtx->ocDoHandle = NULL;
     (void)UNUSED;
 
     if (OC_STACK_RESOURCE_CHANGED == clientResponse->result)
     {
         OIC_LOG(INFO, TAG, "Device state is in Ready for Normal Operation.");
-        OCStackResult res = PDMAddDevice(&otmCtx->selectedDeviceInfo->doxm->deviceID);
+        OTMStop(&otmCtx->selectedDeviceInfo->doxm->deviceID);
+        OCStackResult res = PDMSetDeviceState(&otmCtx->selectedDeviceInfo->doxm->deviceID,
+                                              PDM_DEVICE_ACTIVE);
          if (OC_STACK_OK == res)
          {
                 OIC_LOG_V(INFO, TAG, "Add device's UUID in PDM_DB");
@@ -1007,6 +1590,7 @@ static OCStackResult PostOwnerCredential(OTMContext_t* otmCtx)
     if(!ownerCredential)
     {
         OIC_LOG(ERROR, TAG, "Can not find OwnerPSK.");
+        OICFree(secPayload);
         return OC_STACK_NO_RESOURCE;
     }
 
@@ -1021,13 +1605,14 @@ static OCStackResult PostOwnerCredential(OTMContext_t* otmCtx)
         memcpy(&(newCredential.subject), &credSubjectId, sizeof(OicUuid_t));
 
         //Fill private data as empty string
-        newCredential.privateData.data = "";
+        newCredential.privateData.data = (uint8_t*)"";
         newCredential.privateData.len = 0;
         newCredential.privateData.encoding = ownerCredential->privateData.encoding;
-#ifdef __WITH_X509__
+
         newCredential.publicData.data = NULL;
         newCredential.publicData.len = 0;
-#endif
+        newCredential.publicData.encoding = ownerCredential->publicData.encoding;
+
         int secureFlag = 0;
         //Send owner credential to new device : POST /oic/sec/cred [ owner credential ]
         if (OC_STACK_OK != CredToCBORPayload(&newCredential, &secPayload->securityData,
@@ -1044,7 +1629,7 @@ static OCStackResult PostOwnerCredential(OTMContext_t* otmCtx)
         cbData.cb = &OwnerCredentialHandler;
         cbData.context = (void *)otmCtx;
         cbData.cd = NULL;
-        OCStackResult res = OCDoResource(NULL, OC_REST_POST, query,
+        OCStackResult res = OCDoResource(&otmCtx->ocDoHandle, OC_REST_POST, query,
                                          &deviceInfo->endpoint, (OCPayload*)secPayload,
                                          deviceInfo->connType, OC_HIGH_QOS, &cbData, NULL, 0);
         if (res != OC_STACK_OK)
@@ -1063,6 +1648,166 @@ static OCStackResult PostOwnerCredential(OTMContext_t* otmCtx)
     return OC_STACK_OK;
 }
 
+static OicSecAcl_t* GenerateOwnerAcl(const OicUuid_t* owner)
+{
+    OicSecAcl_t* ownerAcl = (OicSecAcl_t*)OICCalloc(1, sizeof(OicSecAcl_t));
+    OicSecAce_t* ownerAce = (OicSecAce_t*)OICCalloc(1, sizeof(OicSecAce_t));
+    OicSecRsrc_t* wildcardRsrc = (OicSecRsrc_t*)OICCalloc(1, sizeof(OicSecRsrc_t));
+    if(NULL == ownerAcl || NULL == ownerAce || NULL == wildcardRsrc)
+    {
+        OIC_LOG(ERROR, TAG, "Failed to memory allocation");
+        goto error;
+    }
+    LL_APPEND(ownerAcl->aces, ownerAce);
+    LL_APPEND(ownerAce->resources, wildcardRsrc);
+
+    //Set resource owner as PT
+    memcpy(ownerAcl->rownerID.id, owner->id, sizeof(owner->id));
+
+    //PT has full permission.
+    ownerAce->permission = PERMISSION_FULL_CONTROL;
+
+    //Set subject as PT's UUID
+    memcpy(ownerAce->subjectuuid.id, owner->id, sizeof(owner->id));
+
+    wildcardRsrc->href = OICStrdup(WILDCARD_RESOURCE_URI);
+    if(NULL == wildcardRsrc->href)
+    {
+        goto error;
+    }
+
+    wildcardRsrc->interfaceLen = 1;
+    wildcardRsrc->interfaces = (char**)OICMalloc(wildcardRsrc->interfaceLen * sizeof(char*));
+    if(NULL == wildcardRsrc->interfaces)
+    {
+        goto error;
+    }
+    wildcardRsrc->interfaces[0] = OICStrdup(WILDCARD_RESOURCE_URI);
+    if(NULL == wildcardRsrc->interfaces[0])
+    {
+        goto error;
+    }
+
+    wildcardRsrc->typeLen = 1;
+    wildcardRsrc->types = (char**)OICMalloc(wildcardRsrc->typeLen * sizeof(char*));
+    if(NULL == wildcardRsrc->types)
+    {
+        goto error;
+    }
+    wildcardRsrc->types[0] = OICStrdup(WILDCARD_RESOURCE_URI);
+    if(NULL == wildcardRsrc->types[0])
+    {
+        goto error;
+    }
+
+    return ownerAcl;
+
+error:
+    //in case of memory allocation failed, each resource should be removed individually.
+    if(NULL == ownerAcl || NULL == ownerAce || NULL == wildcardRsrc)
+    {
+        OICFree(ownerAcl);
+        OICFree(ownerAce);
+        OICFree(wildcardRsrc);
+    }
+    else
+    {
+        DeleteACLList(ownerAcl);
+    }
+    return NULL;
+}
+
+/**
+ * Function to update the owner ACL to new device.
+ *
+ * @param[in]  otmCtx  Context value of ownership transfer.
+ * @return  OC_STACK_OK on success
+ */
+static OCStackResult PostOwnerAcl(OTMContext_t* otmCtx)
+{
+    OCStackResult res = OC_STACK_ERROR;
+
+    OIC_LOG(DEBUG, TAG, "IN PostOwnerAcl");
+
+    if(!otmCtx || !otmCtx->selectedDeviceInfo)
+    {
+        OIC_LOG(ERROR, TAG, "Invalid parameters");
+        return OC_STACK_INVALID_PARAM;
+    }
+
+    OCProvisionDev_t* deviceInfo = otmCtx->selectedDeviceInfo;
+    char query[MAX_URI_LENGTH + MAX_QUERY_LENGTH] = {0};
+    OicSecAcl_t* ownerAcl = NULL;
+
+    if(!PMGenerateQuery(true,
+                        deviceInfo->endpoint.addr, deviceInfo->securePort,
+                        deviceInfo->connType,
+                        query, sizeof(query), OIC_RSRC_ACL_URI))
+    {
+        OIC_LOG(ERROR, TAG, "Failed to generate query");
+        return OC_STACK_ERROR;
+    }
+    OIC_LOG_V(DEBUG, TAG, "Query=%s", query);
+
+    OicUuid_t ownerID;
+    res = GetDoxmDeviceID(&ownerID);
+    if(OC_STACK_OK != res)
+    {
+        OIC_LOG(ERROR, TAG, "Failed to generate owner ACL");
+        return res;
+    }
+
+    //Generate owner ACL for new device
+    ownerAcl = GenerateOwnerAcl(&ownerID);
+    if(NULL == ownerAcl)
+    {
+        OIC_LOG(ERROR, TAG, "Failed to generate owner ACL");
+        return OC_STACK_NO_MEMORY;
+    }
+
+    //Generate ACL payload
+    OCSecurityPayload* secPayload = (OCSecurityPayload*)OICCalloc(1, sizeof(OCSecurityPayload));
+    if(!secPayload)
+    {
+        OIC_LOG(ERROR, TAG, "Failed to memory allocation");
+        res = OC_STACK_NO_MEMORY;
+        goto error;
+    }
+
+    res = AclToCBORPayload(ownerAcl, &secPayload->securityData, &secPayload->payloadSize);
+    if (OC_STACK_OK != res)
+    {
+        OICFree(secPayload);
+        OIC_LOG(ERROR, TAG, "Error while converting bin to cbor.");
+        goto error;
+    }
+    secPayload->base.type = PAYLOAD_TYPE_SECURITY;
+
+    OIC_LOG(DEBUG, TAG, "Owner ACL Payload:");
+    OIC_LOG_BUFFER(DEBUG, TAG, secPayload->securityData, secPayload->payloadSize);
+
+    //Send owner ACL to new device : POST /oic/sec/cred [ owner credential ]
+    OCCallbackData cbData;
+    cbData.cb = &OwnerAclHandler;
+    cbData.context = (void *)otmCtx;
+    cbData.cd = NULL;
+    res = OCDoResource(&otmCtx->ocDoHandle, OC_REST_POST, query,
+                                     &deviceInfo->endpoint, (OCPayload*)secPayload,
+                                     deviceInfo->connType, OC_HIGH_QOS, &cbData, NULL, 0);
+    if (res != OC_STACK_OK)
+    {
+        OIC_LOG(ERROR, TAG, "OCStack resource error");
+        goto error;
+    }
+
+    OIC_LOG(DEBUG, TAG, "OUT PostOwnerAcl");
+
+error:
+    DeleteACLList(ownerAcl);
+
+    return OC_STACK_OK;
+}
+
 static OCStackResult PostOwnerTransferModeToResource(OTMContext_t* otmCtx)
 {
     OIC_LOG(DEBUG, TAG, "IN PostOwnerTransferModeToResource");
@@ -1074,7 +1819,6 @@ static OCStackResult PostOwnerTransferModeToResource(OTMContext_t* otmCtx)
     }
 
     OCProvisionDev_t* deviceInfo = otmCtx->selectedDeviceInfo;
-    OicSecOxm_t selectedOxm = deviceInfo->doxm->oxmSel;
     char query[MAX_URI_LENGTH + MAX_QUERY_LENGTH] = {0};
 
     if(!PMGenerateQuery(false,
@@ -1086,14 +1830,16 @@ static OCStackResult PostOwnerTransferModeToResource(OTMContext_t* otmCtx)
         return OC_STACK_ERROR;
     }
     OIC_LOG_V(DEBUG, TAG, "Query=%s", query);
+
     OCSecurityPayload* secPayload = (OCSecurityPayload*)OICCalloc(1, sizeof(OCSecurityPayload));
     if(!secPayload)
     {
         OIC_LOG(ERROR, TAG, "Failed to memory allocation");
         return OC_STACK_NO_MEMORY;
     }
+
     secPayload->base.type = PAYLOAD_TYPE_SECURITY;
-    OCStackResult res = g_OTMDatas[selectedOxm].createSelectOxmPayloadCB(otmCtx,
+    OCStackResult res = otmCtx->otmCallback.createSelectOxmPayloadCB(otmCtx,
             &secPayload->securityData, &secPayload->payloadSize);
     if (OC_STACK_OK != res && NULL == secPayload->securityData)
     {
@@ -1106,7 +1852,7 @@ static OCStackResult PostOwnerTransferModeToResource(OTMContext_t* otmCtx)
     cbData.cb = &OwnerTransferModeHandler;
     cbData.context = (void *)otmCtx;
     cbData.cd = NULL;
-    res = OCDoResource(NULL, OC_REST_POST, query,
+    res = OCDoResource(&otmCtx->ocDoHandle, OC_REST_POST, query,
                        &deviceInfo->endpoint, (OCPayload *)secPayload,
                        deviceInfo->connType, OC_HIGH_QOS, &cbData, NULL, 0);
     if (res != OC_STACK_OK)
@@ -1145,7 +1891,7 @@ static OCStackResult GetProvisioningStatusResource(OTMContext_t* otmCtx)
     cbData.cb = &ListMethodsHandler;
     cbData.context = (void *)otmCtx;
     cbData.cd = NULL;
-    OCStackResult res = OCDoResource(NULL, OC_REST_GET, query, NULL, NULL,
+    OCStackResult res = OCDoResource(&otmCtx->ocDoHandle, OC_REST_GET, query, NULL, NULL,
                                      deviceInfo->connType, OC_HIGH_QOS, &cbData, NULL, 0);
     if (res != OC_STACK_OK)
     {
@@ -1187,7 +1933,7 @@ static OCStackResult PostOwnerUuid(OTMContext_t* otmCtx)
         return OC_STACK_NO_MEMORY;
     }
     secPayload->base.type = PAYLOAD_TYPE_SECURITY;
-    OCStackResult res =  g_OTMDatas[deviceInfo->doxm->oxmSel].createOwnerTransferPayloadCB(
+    OCStackResult res = otmCtx->otmCallback.createOwnerTransferPayloadCB(
             otmCtx, &secPayload->securityData, &secPayload->payloadSize);
     if (OC_STACK_OK != res && NULL == secPayload->securityData)
     {
@@ -1202,7 +1948,7 @@ static OCStackResult PostOwnerUuid(OTMContext_t* otmCtx)
     cbData.context = (void *)otmCtx;
     cbData.cd = NULL;
 
-    res = OCDoResource(NULL, OC_REST_POST, query, 0, (OCPayload *)secPayload,
+    res = OCDoResource(&otmCtx->ocDoHandle, OC_REST_POST, query, 0, (OCPayload *)secPayload,
             deviceInfo->connType, OC_HIGH_QOS, &cbData, NULL, 0);
     if (res != OC_STACK_OK)
     {
@@ -1261,7 +2007,7 @@ static OCStackResult PostOwnershipInformation(OTMContext_t* otmCtx)
     cbData.context = (void *)otmCtx;
     cbData.cd = NULL;
 
-    res = OCDoResource(NULL, OC_REST_POST, query, 0, (OCPayload*)secPayload,
+    res = OCDoResource(&otmCtx->ocDoHandle, OC_REST_POST, query, 0, (OCPayload*)secPayload,
                        deviceInfo->connType, OC_HIGH_QOS, &cbData, NULL, 0);
     if (res != OC_STACK_OK)
     {
@@ -1314,7 +2060,7 @@ static OCStackResult PostUpdateOperationMode(OTMContext_t* otmCtx)
     cbData.cb = &OperationModeUpdateHandler;
     cbData.context = (void *)otmCtx;
     cbData.cd = NULL;
-    res = OCDoResource(NULL, OC_REST_POST, query, 0, (OCPayload *)secPayload,
+    res = OCDoResource(&otmCtx->ocDoHandle, OC_REST_POST, query, 0, (OCPayload *)secPayload,
                        deviceInfo->connType, OC_HIGH_QOS, &cbData, NULL, 0);
     if (res != OC_STACK_OK)
     {
@@ -1326,49 +2072,263 @@ static OCStackResult PostUpdateOperationMode(OTMContext_t* otmCtx)
     return res;
 }
 
+static OCStackResult SetupPDM(const OCProvisionDev_t* selectedDevice)
+{
+    OIC_LOG_V(DEBUG, TAG, "IN %s", __func__);
+
+    PdmDeviceState_t pdmState = PDM_DEVICE_UNKNOWN;
+    OCStackResult res = PDMGetDeviceState(&selectedDevice->doxm->deviceID, &pdmState);
+    if (OC_STACK_OK != res)
+    {
+        OIC_LOG_V(ERROR, TAG, "Internal error in PDMGetDeviceState : %d", res);
+        return res;
+    }
+
+    char* strUuid = NULL;
+    bool removeCredReq = false;
+    if (OC_STACK_OK != ConvertUuidToStr(&selectedDevice->doxm->deviceID, &strUuid))
+    {
+        OIC_LOG(WARNING, TAG, "Failed to covert uuid to string");
+        return OC_STACK_NO_MEMORY;
+    }
+
+    if (PDM_DEVICE_UNKNOWN == pdmState && !selectedDevice->doxm->owned)
+    {
+        removeCredReq = true;
+    }
+    else if (PDM_DEVICE_ACTIVE == pdmState && !selectedDevice->doxm->owned)
+    {
+        OIC_LOG_V(WARNING, TAG, "Unowned device[%s] dectected from PDM.", strUuid);
+        OIC_LOG_V(WARNING, TAG, "[%s] will be removed from PDM.", strUuid);
+        res = PDMDeleteDevice(&selectedDevice->doxm->deviceID);
+        if(OC_STACK_OK != res)
+        {
+            OIC_LOG_V(ERROR, TAG, "Failed to remove [%s] information from PDM.", strUuid);
+            goto exit;
+        }
+
+        removeCredReq = true;
+    }
+
+    if (removeCredReq)
+    {
+        OIC_LOG_V(WARNING, TAG, "[%s]'s credential will be removed.", strUuid);
+        res = RemoveCredential(&selectedDevice->doxm->deviceID);
+        if (OC_STACK_RESOURCE_DELETED != res)
+        {
+            OIC_LOG_V(WARNING, TAG, "Can not find [%s]'s credential.", strUuid);
+        }
+    }
+
+    //Checking duplication of Device ID.
+    bool isDuplicate = true;
+    res = PDMIsDuplicateDevice(&selectedDevice->doxm->deviceID, &isDuplicate);
+    if (OC_STACK_OK != res)
+    {
+        OIC_LOG_V(ERROR, TAG, "Internal error in PDMIsDuplicateDevice : %d", res);
+        goto exit;
+    }
+
+    if (isDuplicate)
+    {
+        char* strUuid = NULL;
+        res = ConvertUuidToStr(&selectedDevice->doxm->deviceID, &strUuid);
+        if (OC_STACK_OK != res)
+        {
+            OIC_LOG_V(ERROR, TAG, "Failed to convert UUID to str : %d", res);
+            goto exit;
+        }
+
+        if (PDM_DEVICE_STALE == pdmState)
+        {
+            OIC_LOG(INFO, TAG, "Detected duplicated UUID in stale status, "
+                               "device status will revert back to initial status.");
+            res = PDMSetDeviceState(&selectedDevice->doxm->deviceID, PDM_DEVICE_INIT);
+            if (OC_STACK_OK != res)
+            {
+                OIC_LOG_V(ERROR, TAG, "Internal error in PDMSetDeviceState : %d", res);
+                goto exit;
+            }
+        }
+        else if (PDM_DEVICE_INIT == pdmState)
+        {
+            OIC_LOG_V(ERROR, TAG, "[%s]'s ownership transfer process is already started.", strUuid);
+            OICFree(strUuid);
+            res = OC_STACK_DUPLICATE_REQUEST;
+            goto exit;
+        }
+        else
+        {
+            OIC_LOG(ERROR, TAG, "Unknow device status while OTM.");
+            OICFree(strUuid);
+            res = OC_STACK_ERROR;
+            goto exit;
+        }
+    }
+    else
+    {
+        res = PDMAddDevice(&selectedDevice->doxm->deviceID);
+        if (OC_STACK_OK != res)
+        {
+            OIC_LOG_V(ERROR, TAG, "Internal error in PDMAddDevice : %d", res);
+            goto exit;
+        }
+    }
+
+exit:
+    OICFree(strUuid);
+    OIC_LOG_V(DEBUG, TAG, "OUT %s", __func__);
+    return res;
+}
+
 static OCStackResult StartOwnershipTransfer(void* ctx, OCProvisionDev_t* selectedDevice)
 {
     OIC_LOG(INFO, TAG, "IN StartOwnershipTransfer");
+    OCStackResult res = OC_STACK_INVALID_PARAM;
+    OicUuid_t emptyOwner = {.id = {0} };
+
+    VERIFY_NON_NULL(TAG, selectedDevice, ERROR);
+    VERIFY_NON_NULL(TAG, selectedDevice->doxm, ERROR);
+
     OTMContext_t* otmCtx = (OTMContext_t*)ctx;
     otmCtx->selectedDeviceInfo = selectedDevice;
 
-    //Set to the lowest level OxM, and then find more higher level OxM.
-    OCStackResult res = SelectProvisioningMethod(selectedDevice->doxm->oxm,
-                                                 selectedDevice->doxm->oxmLen,
-                                                 &selectedDevice->doxm->oxmSel);
+    //If devowneruuid of selectedDevice is not emtry, PostOwnerUuid does not triggered in DTLSHandshakeCB
+    if (memcmp(&(selectedDevice->doxm->owner), &emptyOwner, sizeof(OicUuid_t)) != 0)
+    {
+        OIC_LOG(DEBUG, TAG, "Set devowneruuid of selectedDevice to empty for OwnershipTransfer");
+        memcpy(&(selectedDevice->doxm->owner), &emptyOwner, sizeof(OicUuid_t));
+    }
+
+    OicUuid_t ownerUuid = {0};
+    GetDoxmDevOwnerId(&ownerUuid);
+
+    res = OTMStart(&selectedDevice->doxm->deviceID, &ownerUuid);
+    if(OC_STACK_OK != res)
+    {
+        if(OC_STACK_DUPLICATE_UUID == res)
+        {
+            return res;
+        }
+        OIC_LOG_V(ERROR, TAG, "%s OTMStart error : %d", __func__, res);
+    }
+
+    //Setup PDM to perform the OTM, PDM will be cleanup if necessary.
+    res = SetupPDM(selectedDevice);
     if(OC_STACK_OK != res)
     {
-        OIC_LOG(ERROR, TAG, "Failed to select the provisioning method");
+        OIC_LOG_V(ERROR, TAG, "SetupPDM error : %d", res);
         SetResult(otmCtx, res);
         return res;
     }
-    OIC_LOG_V(DEBUG, TAG, "Selected provisoning method = %d", selectedDevice->doxm->oxmSel);
 
-    //Send Req: POST /oic/sec/doxm [{..."OxmSel" :g_OTMDatas[Index of Selected OxM].OXMString,...}]
-    res = PostOwnerTransferModeToResource(otmCtx);
+    //Select the OxM to performing ownership transfer
+    res = OTMSelectOwnershipTransferMethod(selectedDevice->doxm->oxm,
+                                          selectedDevice->doxm->oxmLen,
+                                          &selectedDevice->doxm->oxmSel,
+                                          SUPER_OWNER);
     if(OC_STACK_OK != res)
     {
-        OIC_LOG(WARNING, TAG, "Failed to select the provisioning method");
+        OIC_LOG_V(ERROR, TAG, "Failed to select the provisioning method : %d", res);
         SetResult(otmCtx, res);
         return res;
     }
+    OIC_LOG_V(DEBUG, TAG, "Selected provisioning method = %d", selectedDevice->doxm->oxmSel);
 
-    //Register DTLS event handler to catch the dtls event while handshake
-    if(CA_STATUS_OK != CARegisterDTLSHandshakeCallback(DTLSHandshakeCB))
+    res = OTMSetOTCallback(selectedDevice->doxm->oxmSel, &otmCtx->otmCallback);
+    if(OC_STACK_OK != res)
     {
-        OIC_LOG(WARNING, TAG, "StartOwnershipTransfer : Failed to register DTLS handshake callback.");
+        OIC_LOG_V(ERROR, TAG, "Error in OTMSetOTCallback : %d", res);
+        return res;
     }
-#ifdef __WITH_TLS__
+
+    //Send Req: POST /oic/sec/doxm [{..."OxmSel" :g_OTMCbDatas[Index of Selected OxM].OXMString,...}]
+    res = PostOwnerTransferModeToResource(otmCtx);
+    if(OC_STACK_OK != res)
+    {
+        OIC_LOG_V(WARNING, TAG, "Failed to select the provisioning method : %d", res);
+        SetResult(otmCtx, res);
+        return res;
+    }
+
+#if defined(__WITH_DTLS__) || defined(__WITH_TLS__)
     //Register TLS event handler to catch the tls event while handshake
-    if(CA_STATUS_OK != CAregisterTlsHandshakeCallback(DTLSHandshakeCB))
+    if(CA_STATUS_OK != CAregisterSslHandshakeCallback(DTLSHandshakeCB))
     {
         OIC_LOG(WARNING, TAG, "StartOwnershipTransfer : Failed to register TLS handshake callback.");
     }
-#endif
+#endif // __WITH_DTLS__ or __WITH_TLS__
     OIC_LOG(INFO, TAG, "OUT StartOwnershipTransfer");
 
+exit:
     return res;
+}
+
+static OCStackResult StartCustomOwnershipTransfer(void* ctx, OCProvisionDev_t* selectedDevice,const OicSecOxm_t method)
+{
+    OIC_LOG(INFO, TAG, "IN StartOwnershipTransfer");
+    OCStackResult res = OC_STACK_INVALID_PARAM;
+
+    VERIFY_NON_NULL(TAG, selectedDevice, ERROR);
+    VERIFY_NON_NULL(TAG, selectedDevice->doxm, ERROR);
+
+    OTMContext_t* otmCtx = (OTMContext_t*)ctx;
+    otmCtx->selectedDeviceInfo = selectedDevice;
+
+    OicUuid_t ownerUuid = {0};
+    GetDoxmDevOwnerId(&ownerUuid);
+
+    res = OTMStart(&selectedDevice->doxm->deviceID, &ownerUuid);
+    if(OC_STACK_OK != res)
+    {
+        if(OC_STACK_DUPLICATE_UUID == res)
+        {
+            return res;
+        }
+        OIC_LOG_V(ERROR, TAG, "%s OTMStart error : %d", __func__, res);
+    }
+
+    //Setup PDM to perform the OTM, PDM will be cleanup if necessary.
+    res = SetupPDM(selectedDevice);
+    if(OC_STACK_OK != res)
+    {
+        OIC_LOG_V(ERROR, TAG, "SetupPDM error : %d", res);
+        SetResult(otmCtx, res);
+        return res;
+    }
+
+    //Select the OxM to performing ownership transfer
+    selectedDevice->doxm->oxmSel = method;
+    OIC_LOG_V(DEBUG, TAG, "Selected provisioning method = %d", selectedDevice->doxm->oxmSel);
 
+    res = OTMSetOTCallback(selectedDevice->doxm->oxmSel, &otmCtx->otmCallback);
+    if(OC_STACK_OK != res)
+    {
+        OIC_LOG_V(ERROR, TAG, "Error in OTMSetOTCallback : %d", res);
+        return res;
+    }
+
+#if defined(__WITH_DTLS__) || defined(__WITH_TLS__)
+    //Register TLS event handler, to catch the TLS handshake event
+    if(CA_STATUS_OK != CAregisterSslHandshakeCallback(DTLSHandshakeCB))
+    {
+        OIC_LOG(WARNING, TAG, "StartOwnershipTransfer : Failed to register TLS handshake callback.");
+    }
+#endif // __WITH_DTLS__ or __WITH_TLS__
+
+    //Send Req: POST /oic/sec/doxm [{..."OxmSel" :g_OTMCbDatas[Index of Selected OxM].OXMString,...}]
+    res = PostOwnerTransferModeToResource(otmCtx);
+    if(OC_STACK_OK != res)
+    {
+        OIC_LOG_V(WARNING, TAG, "Failed to select the provisioning method : %d", res);
+        SetResult(otmCtx, res);
+        return res;
+    }
+
+    OIC_LOG(INFO, TAG, "OUT StartOwnershipTransfer");
+
+exit:
+    return res;
 }
 
 OCStackResult OTMSetOwnershipTransferCallbackData(OicSecOxm_t oxmType, OTMCallbackData_t* data)
@@ -1386,16 +2346,65 @@ OCStackResult OTMSetOwnershipTransferCallbackData(OicSecOxm_t oxmType, OTMCallba
         return OC_STACK_INVALID_PARAM;
     }
 
-    g_OTMDatas[oxmType].loadSecretCB= data->loadSecretCB;
-    g_OTMDatas[oxmType].createSecureSessionCB = data->createSecureSessionCB;
-    g_OTMDatas[oxmType].createSelectOxmPayloadCB = data->createSelectOxmPayloadCB;
-    g_OTMDatas[oxmType].createOwnerTransferPayloadCB = data->createOwnerTransferPayloadCB;
+    // TODO: Remove this API, Please see the jira ticket IOT-1484
 
     OIC_LOG(DEBUG, TAG, "OUT OTMSetOwnerTransferCallbackData");
 
     return OC_STACK_OK;
 }
 
+OCStackResult OTMDoCustomOwnershipTransfer(void* ctx,
+                                     OCProvisionDev_t *selectedDevice,
+                                     OCProvisionResultCB resultCallback,
+                                     const OicSecOxm_t method)
+{
+    OIC_LOG(DEBUG, TAG, "IN OTMDoCustomOwnershipTransfer");
+
+    if (NULL == selectedDevice)
+    {
+        return OC_STACK_INVALID_PARAM;
+    }
+    if (NULL == resultCallback)
+    {
+        return OC_STACK_INVALID_CALLBACK;
+    }
+
+    OTMContext_t* otmCtx = (OTMContext_t*)OICCalloc(1,sizeof(OTMContext_t));
+    if(!otmCtx)
+    {
+        OIC_LOG(ERROR, TAG, "Failed to create OTM Context");
+        return OC_STACK_NO_MEMORY;
+    }
+
+    otmCtx->ctxResultCallback = resultCallback;
+    otmCtx->ctxHasError = false;
+    otmCtx->userCtx = ctx;
+
+    //Setting number of selected device.
+    otmCtx->ctxResultArraySize = 1;
+
+    otmCtx->ctxResultArray =
+        (OCProvisionResult_t*)OICCalloc(otmCtx->ctxResultArraySize, sizeof(OCProvisionResult_t));
+    if(NULL == otmCtx->ctxResultArray)
+    {
+        OIC_LOG(ERROR, TAG, "OTMDoOwnershipTransfer : Failed to memory allocation");
+        OICFree(otmCtx);
+        return OC_STACK_NO_MEMORY;
+    }
+
+    //Fill the device UUID for result array.
+        memcpy(otmCtx->ctxResultArray[0].deviceId.id,
+               selectedDevice->doxm->deviceID.id,
+               UUID_LENGTH);
+        otmCtx->ctxResultArray[0].res = OC_STACK_CONTINUE;
+
+    OCStackResult res = StartCustomOwnershipTransfer(otmCtx, selectedDevice, method);
+
+    OIC_LOG(DEBUG, TAG, "OUT OTMDoCustomOwnershipTransfer");
+
+    return res;
+}
+
 /**
  * NOTE : Unowned discovery should be done before performing OTMDoOwnershipTransfer
  */
@@ -1443,45 +2452,9 @@ OCStackResult OTMDoOwnershipTransfer(void* ctx,
     }
     pCurDev = selectedDevicelist;
 
-    OCStackResult res = OC_STACK_OK;
     //Fill the device UUID for result array.
     for(size_t devIdx = 0; devIdx < otmCtx->ctxResultArraySize; devIdx++)
     {
-        //Checking duplication of Device ID.
-        bool isDuplicate = true;
-        res = PDMIsDuplicateDevice(&pCurDev->doxm->deviceID, &isDuplicate);
-        if (OC_STACK_OK != res)
-        {
-            goto error;
-        }
-        if (isDuplicate)
-        {
-            bool isStale = false;
-            res = PDMIsDeviceStale(&pCurDev->doxm->deviceID, &isStale);
-            if(OC_STACK_OK != res)
-            {
-                OIC_LOG(ERROR, TAG, "Internal error in PDMIsDeviceStale");
-                goto error;
-            }
-            if(isStale)
-            {
-                OIC_LOG(INFO, TAG, "Detected duplicated UUID in stale status, "\
-                                   "this UUID will be removed from PDM");
-
-                res = PDMDeleteDevice(&pCurDev->doxm->deviceID);
-                if(OC_STACK_OK != res)
-                {
-                    OIC_LOG(ERROR, TAG, "Internal error in PDMDeleteDevice");
-                    goto error;
-                }
-            }
-            else
-            {
-                OIC_LOG(ERROR, TAG, "OTMDoOwnershipTransfer : Device UUID is duplicated");
-                res = OC_STACK_INVALID_PARAM;
-                goto error;
-            }
-        }
         memcpy(otmCtx->ctxResultArray[devIdx].deviceId.id,
                pCurDev->doxm->deviceID.id,
                UUID_LENGTH);
@@ -1489,17 +2462,40 @@ OCStackResult OTMDoOwnershipTransfer(void* ctx,
         pCurDev = pCurDev->next;
     }
 
-    StartOwnershipTransfer(otmCtx, selectedDevicelist);
+    OCStackResult res = StartOwnershipTransfer(otmCtx, selectedDevicelist);
 
     OIC_LOG(DEBUG, TAG, "OUT OTMDoOwnershipTransfer");
-    return OC_STACK_OK;
 
-error:
-    OICFree(otmCtx->ctxResultArray);
-    OICFree(otmCtx);
     return res;
 }
 
+OCStackResult OTMSetOxmAllowStatus(const OicSecOxm_t oxm, const bool allowStatus)
+{
+    OIC_LOG_V(INFO, TAG, "IN %s : oxm=%d, allow status=%s",
+              __func__, oxm, (allowStatus ? "true" : "false"));
+
+#ifdef MULTIPLE_OWNER
+    if(OIC_OXM_COUNT <= oxm && OIC_MV_JUST_WORKS != oxm && OIC_PRECONFIG_PIN != oxm && OIC_CON_MFG_CERT != oxm)
+#else
+    if(OIC_OXM_COUNT <= oxm && OIC_MV_JUST_WORKS != oxm && OIC_CON_MFG_CERT != oxm)
+#endif
+    {
+        return OC_STACK_INVALID_PARAM;
+    }
+
+    OxmAllowTableIdx_t oxmIdx = GetOxmAllowTableIdx(oxm);
+    if(OXM_IDX_COUNT <= oxmIdx)
+    {
+        OIC_LOG(ERROR, TAG, "Invalid oxm index to access oxm allow table.");
+        return OC_STACK_ERROR;
+    }
+    g_OxmAllowStatus[oxmIdx] = (allowStatus ? ALLOWED_OXM : NOT_ALLOWED_OXM);
+
+    OIC_LOG_V(INFO, TAG, "OUT %s", __func__);
+
+    return OC_STACK_OK;
+}
+
 OCStackResult PostProvisioningStatus(OTMContext_t* otmCtx)
 {
     OIC_LOG(INFO, TAG, "IN PostProvisioningStatus");
@@ -1545,7 +2541,7 @@ OCStackResult PostProvisioningStatus(OTMContext_t* otmCtx)
     cbData.cb = &ProvisioningStatusHandler;
     cbData.context = (void*)otmCtx;
     cbData.cd = NULL;
-    OCStackResult ret = OCDoResource(NULL, OC_REST_POST, query, 0, (OCPayload*)secPayload,
+    OCStackResult ret = OCDoResource(&otmCtx->ocDoHandle, OC_REST_POST, query, 0, (OCPayload*)secPayload,
             otmCtx->selectedDeviceInfo->connType, OC_HIGH_QOS, &cbData, NULL, 0);
     OIC_LOG_V(INFO, TAG, "OCDoResource returned: %d",ret);
     if (ret != OC_STACK_OK)
@@ -1603,7 +2599,7 @@ OCStackResult PostNormalOperationStatus(OTMContext_t* otmCtx)
     cbData.cb = &ReadyForNomalStatusHandler;
     cbData.context = (void*)otmCtx;
     cbData.cd = NULL;
-    OCStackResult ret = OCDoResource(NULL, OC_REST_POST, query, 0, (OCPayload*)secPayload,
+    OCStackResult ret = OCDoResource(&otmCtx->ocDoHandle, OC_REST_POST, query, 0, (OCPayload*)secPayload,
             otmCtx->selectedDeviceInfo->connType, OC_HIGH_QOS, &cbData, NULL, 0);
     OIC_LOG_V(INFO, TAG, "OCDoResource returned: %d",ret);
     if (ret != OC_STACK_OK)
@@ -1615,3 +2611,97 @@ OCStackResult PostNormalOperationStatus(OTMContext_t* otmCtx)
 
     return ret;
 }
+
+OCStackResult ConfigSelfOwnership(void)
+{
+    OIC_LOG(INFO, TAG, "IN ConfigSelfOwnership");
+
+    bool isDeviceOwned = true;
+    if (OC_STACK_OK != GetDoxmIsOwned(&isDeviceOwned))
+    {
+        OIC_LOG (ERROR, TAG, "Unable to retrieve doxm owned state");
+        return OC_STACK_ERROR;
+    }
+    if( (true == isDeviceOwned) ||(true == GetPstatIsop()) )
+    {
+        OIC_LOG(ERROR, TAG, "The state of device is not Ready for Ownership transfer.");
+        return OC_STACK_ERROR;
+    }
+    OicUuid_t deviceID = {.id={0}};
+    if ( OC_STACK_OK != GetDoxmDeviceID(&deviceID) )
+    {
+        OIC_LOG (ERROR, TAG, "Unable to retrieve doxm Device ID");
+        return OC_STACK_ERROR;
+    }
+
+    OCStackResult ret = OC_STACK_OK;
+    //Update the pstat resource as Normal Operation.
+    ret = SetPstatSelfOwnership(&deviceID);
+    if(OC_STACK_OK != ret)
+    {
+        OIC_LOG (ERROR, TAG, "Unable to update pstat resource as Normal Operation");
+        goto exit;
+    }
+    //Update the doxm resource as Normal Operation.
+    ret = SetDoxmSelfOwnership(&deviceID);
+    if(OC_STACK_OK != ret)
+    {
+        OIC_LOG (ERROR, TAG, "Unable to update doxm resource as Normal Operation");
+        goto exit;
+    }
+    //Update default ACE of security resource to prevent anonymous user access.
+    ret = UpdateDefaultSecProvACE();
+    if(OC_STACK_OK != ret)
+    {
+        OIC_LOG (ERROR, TAG, "Unable to update default ace in ConfigSelfOwnership");
+        goto exit;
+    }
+    //Update the acl resource owner as owner device.
+    ret = SetAclRownerId(&deviceID);
+    if(OC_STACK_OK != ret)
+    {
+        OIC_LOG (ERROR, TAG, "Unable to update acl resource in ConfigSelfOwnership");
+        goto exit;
+    }
+    //Update the cred resource owner as owner device.
+    ret = SetCredRownerId(&deviceID);
+    if(OC_STACK_OK != ret)
+    {
+        // Cred resouce may be empty in Ready for Ownership transfer state.
+        if (OC_STACK_NO_RESOURCE == ret)
+        {
+            OIC_LOG (INFO, TAG, "Cred resource is empty");
+            ret = OC_STACK_OK;
+            goto exit;
+        }
+        OIC_LOG (ERROR, TAG, "Unable to update cred resource in ConfigSelfOwnership");
+    }
+
+exit:
+    if(OC_STACK_OK != ret)
+    {
+        /*
+         * If some error is occured while configure self-ownership,
+         * ownership related resource should be revert back to initial status.
+        */
+        ResetSecureResourceInPS();
+    }
+
+    return ret;
+}
+
+
+void OTMTerminate()
+{
+    OIC_LOG_V(DEBUG, TAG, "In %s", __func__);
+    DeleteOTMContextList();
+
+#if defined(__WITH_DTLS__) || defined(__WITH_TLS__)
+    if(CA_STATUS_OK != CAregisterSslHandshakeCallback(NULL))
+    {
+        OIC_LOG(WARNING, TAG, "Failed to register (D)TLS handshake callback.");
+    }
+#endif // __WITH_DTLS__ or __WITH_TLS__
+
+    OIC_LOG_V(DEBUG, TAG, "Out %s", __func__);
+}