mbed client lightswitch demo
Dependencies: mbed Socket lwip-eth lwip-sys lwip
Fork of mbed-client-classic-example-lwip by
Diff: mbed-client/source/m2msecurity.cpp
- Revision:
- 11:cada08fc8a70
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/mbed-client/source/m2msecurity.cpp Thu Jun 09 17:08:36 2016 +0000
@@ -0,0 +1,358 @@
+/*
+ * Copyright (c) 2015 ARM Limited. All rights reserved.
+ * SPDX-License-Identifier: Apache-2.0
+ * Licensed under the Apache License, Version 2.0 (the License); you may
+ * not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an AS IS BASIS, WITHOUT
+ * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+#include <cstdio>
+#include "mbed-client/m2msecurity.h"
+#include "mbed-client/m2mconstants.h"
+#include "mbed-client/m2mobject.h"
+#include "mbed-client/m2mobjectinstance.h"
+#include "mbed-client/m2mresource.h"
+
+
+M2MSecurity::M2MSecurity(ServerType ser_type)
+: M2MObject(M2M_SECURITY_ID),
+ _server_type(ser_type),
+ _server_instance(NULL)
+{
+ _server_instance = M2MObject::create_object_instance();
+
+ if(_server_instance) {
+
+ M2MResource* res = _server_instance->create_dynamic_resource(SECURITY_M2M_SERVER_URI,
+ OMA_RESOURCE_TYPE,
+ M2MResourceInstance::STRING,
+ false);
+ if(res) {
+ res->set_operation(M2MBase::NOT_ALLOWED);
+ }
+ res = _server_instance->create_dynamic_resource(SECURITY_BOOTSTRAP_SERVER,
+ OMA_RESOURCE_TYPE,
+ M2MResourceInstance::BOOLEAN,
+ false);
+ if(res) {
+ res->set_operation(M2MBase::NOT_ALLOWED);
+ }
+ res = _server_instance->create_dynamic_resource(SECURITY_SECURITY_MODE,
+ OMA_RESOURCE_TYPE,
+ M2MResourceInstance::INTEGER,
+ false);
+ if(res) {
+ res->set_operation(M2MBase::NOT_ALLOWED);
+ }
+ res = _server_instance->create_dynamic_resource(SECURITY_PUBLIC_KEY,
+ OMA_RESOURCE_TYPE,
+ M2MResourceInstance::OPAQUE,
+ false);
+ if(res) {
+ res->set_operation(M2MBase::NOT_ALLOWED);
+ }
+ res = _server_instance->create_dynamic_resource(SECURITY_SERVER_PUBLIC_KEY,
+ OMA_RESOURCE_TYPE,
+ M2MResourceInstance::OPAQUE,
+ false);
+ if(res) {
+ res->set_operation(M2MBase::NOT_ALLOWED);
+ }
+ res = _server_instance->create_dynamic_resource(SECURITY_SECRET_KEY,
+ OMA_RESOURCE_TYPE,
+ M2MResourceInstance::OPAQUE,
+ false);
+ if(res) {
+ res->set_operation(M2MBase::NOT_ALLOWED);
+ }
+ if(M2MSecurity::M2MServer == ser_type) {
+ res = _server_instance->create_dynamic_resource(SECURITY_SHORT_SERVER_ID,
+ OMA_RESOURCE_TYPE,
+ M2MResourceInstance::INTEGER,
+ false);
+ if(res) {
+ res->set_operation(M2MBase::NOT_ALLOWED);
+ }
+ }
+ }
+}
+
+M2MSecurity::~M2MSecurity()
+{
+ _server_instance = NULL;
+}
+
+M2MResource* M2MSecurity::create_resource(SecurityResource resource, uint32_t value)
+{
+ M2MResource* res = NULL;
+ String security_id = "";
+ if(!is_resource_present(resource)) {
+ switch(resource) {
+ case SMSSecurityMode:
+ security_id = SECURITY_SMS_SECURITY_MODE;
+ break;
+ case M2MServerSMSNumber:
+ security_id = SECURITY_M2M_SERVER_SMS_NUMBER;
+ break;
+ case ShortServerID:
+ security_id = SECURITY_SHORT_SERVER_ID;
+ break;
+ case ClientHoldOffTime:
+ security_id = SECURITY_CLIENT_HOLD_OFF_TIME;
+ break;
+ default:
+ break;
+ }
+ }
+ if(!security_id.empty()) {
+ if(_server_instance) {
+
+ res = _server_instance->create_dynamic_resource(security_id,OMA_RESOURCE_TYPE,
+ M2MResourceInstance::INTEGER,
+ false);
+
+ if(res) {
+ char *buffer = (char*)malloc(20);
+ if(buffer) {
+ int size = snprintf(buffer, 20,"%ld",(long int)value);
+ res->set_operation(M2MBase::NOT_ALLOWED);
+ res->set_value((const uint8_t*)buffer,
+ (uint32_t)size);
+ free(buffer);
+ }
+ }
+ }
+ }
+ return res;
+}
+
+bool M2MSecurity::delete_resource(SecurityResource resource)
+{
+ bool success = false;
+ String security_id = "";
+ switch(resource) {
+ case SMSSecurityMode:
+ security_id = SECURITY_SMS_SECURITY_MODE;
+ break;
+ case M2MServerSMSNumber:
+ security_id = SECURITY_M2M_SERVER_SMS_NUMBER;
+ break;
+ case ShortServerID:
+ if(M2MSecurity::Bootstrap == _server_type) {
+ security_id = SECURITY_SHORT_SERVER_ID;
+ }
+ break;
+ case ClientHoldOffTime:
+ security_id = SECURITY_CLIENT_HOLD_OFF_TIME;
+ break;
+ default:
+ // Others are mandatory resources hence cannot be deleted.
+ break;
+ }
+ if(!security_id.empty()) {
+ if(_server_instance) {
+ success = _server_instance->remove_resource(security_id);
+ }
+ }
+ return success;
+}
+
+bool M2MSecurity::set_resource_value(SecurityResource resource,
+ const String &value)
+{
+ bool success = false;
+ if(M2MSecurity::M2MServerUri == resource) {
+ M2MResource* res = get_resource(resource);
+ if(res) {
+ success = res->set_value((const uint8_t*)value.c_str(),(uint32_t)value.length());
+ }
+ }
+ return success;
+}
+
+bool M2MSecurity::set_resource_value(SecurityResource resource,
+ uint32_t value)
+{
+ bool success = false;
+ M2MResource* res = get_resource(resource);
+ if(res) {
+ if(M2MSecurity::SecurityMode == resource ||
+ M2MSecurity::SMSSecurityMode == resource ||
+ M2MSecurity::M2MServerSMSNumber == resource ||
+ M2MSecurity::ShortServerID == resource ||
+ M2MSecurity::ClientHoldOffTime == resource) {
+ // If it is any of the above resource
+ // set the value of the resource.
+ char *buffer = (char*)malloc(20);
+ if(buffer) {
+ int size = snprintf(buffer, 20,"%ld",(long int)value);
+ success = res->set_value((const uint8_t*)buffer,
+ (uint32_t)size);
+ free(buffer);
+ }
+ }
+ }
+ return success;
+}
+
+bool M2MSecurity::set_resource_value(SecurityResource resource,
+ const uint8_t *value,
+ const uint16_t length)
+{
+ bool success = false;
+ M2MResource* res = get_resource(resource);
+ if(res) {
+ if(M2MSecurity::PublicKey == resource ||
+ M2MSecurity::ServerPublicKey == resource ||
+ M2MSecurity::Secretkey == resource) {
+ success = res->set_value(value,length);
+ }
+ }
+ return success;
+}
+
+String M2MSecurity::resource_value_string(SecurityResource resource) const
+{
+ String value = "";
+ M2MResource* res = get_resource(resource);
+ if(res) {
+ if(M2MSecurity::M2MServerUri == resource) {
+ uint8_t* buffer = NULL;
+ uint32_t length = 0;
+ res->get_value(buffer,length);
+
+ char *char_buffer = (char*)malloc(length+1);
+ if(char_buffer) {
+ memset(char_buffer,0,length+1);
+ if(buffer) {
+ memcpy(char_buffer,(char*)buffer,length);
+ }
+ String s_name(char_buffer);
+ value = s_name;
+ free(char_buffer);
+ }
+ if(buffer) {
+ free(buffer);
+ }
+ }
+ }
+ return value;
+}
+
+uint32_t M2MSecurity::resource_value_buffer(SecurityResource resource,
+ uint8_t *&data) const
+{
+ uint32_t size = 0;
+ M2MResource* res = get_resource(resource);
+ if(res) {
+ if(M2MSecurity::PublicKey == resource ||
+ M2MSecurity::ServerPublicKey == resource ||
+ M2MSecurity::Secretkey == resource) {
+ res->get_value(data,size);
+ }
+ }
+ return size;
+}
+
+
+uint32_t M2MSecurity::resource_value_int(SecurityResource resource) const
+{
+ uint32_t value = 0;
+ M2MResource* res = get_resource(resource);
+ if(res) {
+ if(M2MSecurity::SecurityMode == resource ||
+ M2MSecurity::SMSSecurityMode == resource ||
+ M2MSecurity::M2MServerSMSNumber == resource ||
+ M2MSecurity::ShortServerID == resource ||
+ M2MSecurity::ClientHoldOffTime == resource) {
+ // Get the value and convert it into integer
+ uint8_t* buffer = NULL;
+ uint32_t length = 0;
+ res->get_value(buffer,length);
+ if(buffer) {
+ value = atoi((const char*)buffer);
+ free(buffer);
+ }
+ }
+ }
+ return value;
+}
+
+bool M2MSecurity::is_resource_present(SecurityResource resource) const
+{
+ bool success = false;
+ M2MResource *res = get_resource(resource);
+ if(res) {
+ success = true;
+ }
+ return success;
+}
+
+uint16_t M2MSecurity::total_resource_count() const
+{
+ uint16_t count = 0;
+ if(_server_instance) {
+ count = _server_instance->resources().size();
+ }
+ return count;
+}
+
+M2MSecurity::ServerType M2MSecurity::server_type() const
+{
+ return _server_type;
+}
+
+M2MResource* M2MSecurity::get_resource(SecurityResource res) const
+{
+ M2MResource* res_object = NULL;
+ if(_server_instance) {
+ String res_name = "";
+ switch(res) {
+ case M2MServerUri:
+ res_name = SECURITY_M2M_SERVER_URI;
+ break;
+ case BootstrapServer:
+ res_name = SECURITY_BOOTSTRAP_SERVER;
+ break;
+ case SecurityMode:
+ res_name = SECURITY_SECURITY_MODE;
+ break;
+ case PublicKey:
+ res_name = SECURITY_PUBLIC_KEY;
+ break;
+ case ServerPublicKey:
+ res_name = SECURITY_SERVER_PUBLIC_KEY;
+ break;
+ case Secretkey:
+ res_name = SECURITY_SECRET_KEY;
+ break;
+ case SMSSecurityMode:
+ res_name = SECURITY_SMS_SECURITY_MODE;
+ break;
+ case SMSBindingKey:
+ res_name = SECURITY_SMS_BINDING_KEY;
+ break;
+ case SMSBindingSecretKey:
+ res_name = SECURITY_SMS_BINDING_SECRET_KEY;
+ break;
+ case M2MServerSMSNumber:
+ res_name = SECURITY_M2M_SERVER_SMS_NUMBER;
+ break;
+ case ShortServerID:
+ res_name = SECURITY_SHORT_SERVER_ID;
+ break;
+ case ClientHoldOffTime:
+ res_name = SECURITY_CLIENT_HOLD_OFF_TIME;
+ break;
+ }
+ res_object = _server_instance->resource(res_name);
+ }
+ return res_object;
+}
Austin Blackstone
