Preliminary main mbed library for nexpaq development
Diff: features/FEATURE_CLIENT/mbed-client/source/m2msecurity.cpp
- Revision:
- 0:6c56fb4bc5f0
diff -r 000000000000 -r 6c56fb4bc5f0 features/FEATURE_CLIENT/mbed-client/source/m2msecurity.cpp --- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/features/FEATURE_CLIENT/mbed-client/source/m2msecurity.cpp Fri Nov 04 20:27:58 2016 +0000 @@ -0,0 +1,369 @@ +/* + * Copyright (c) 2015 ARM Limited. All rights reserved. + * SPDX-License-Identifier: Apache-2.0 + * Licensed under the Apache License, Version 2.0 (the License); you may + * not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an AS IS BASIS, WITHOUT + * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +#include <cstdio> +#include "mbed-client/m2msecurity.h" +#include "mbed-client/m2mconstants.h" +#include "mbed-client/m2mobject.h" +#include "mbed-client/m2mobjectinstance.h" +#include "mbed-client/m2mresource.h" +#include "mbed-client/m2mstring.h" +#include "mbed-trace/mbed_trace.h" +#define TRACE_GROUP "mClt" + +#define BUFFER_SIZE 21 + +M2MSecurity::M2MSecurity(ServerType ser_type) +: M2MObject(M2M_SECURITY_ID), + _server_instance(NULL), + _server_type(ser_type) +{ + _server_instance = M2MObject::create_object_instance(); + + if(_server_instance) { + M2MResource* res = _server_instance->create_dynamic_resource(SECURITY_M2M_SERVER_URI, + OMA_RESOURCE_TYPE, + M2MResourceInstance::STRING, + false); + if(res) { + res->set_operation(M2MBase::NOT_ALLOWED); + } + res = _server_instance->create_dynamic_resource(SECURITY_BOOTSTRAP_SERVER, + OMA_RESOURCE_TYPE, + M2MResourceInstance::BOOLEAN, + false); + if(res) { + res->set_operation(M2MBase::NOT_ALLOWED); + } + res = _server_instance->create_dynamic_resource(SECURITY_SECURITY_MODE, + OMA_RESOURCE_TYPE, + M2MResourceInstance::INTEGER, + false); + if(res) { + res->set_operation(M2MBase::NOT_ALLOWED); + } + res = _server_instance->create_dynamic_resource(SECURITY_PUBLIC_KEY, + OMA_RESOURCE_TYPE, + M2MResourceInstance::OPAQUE, + false); + if(res) { + res->set_operation(M2MBase::NOT_ALLOWED); + } + res = _server_instance->create_dynamic_resource(SECURITY_SERVER_PUBLIC_KEY, + OMA_RESOURCE_TYPE, + M2MResourceInstance::OPAQUE, + false); + if(res) { + res->set_operation(M2MBase::NOT_ALLOWED); + } + res = _server_instance->create_dynamic_resource(SECURITY_SECRET_KEY, + OMA_RESOURCE_TYPE, + M2MResourceInstance::OPAQUE, + false); + if(res) { + res->set_operation(M2MBase::NOT_ALLOWED); + } + if(M2MSecurity::M2MServer == ser_type) { + res = _server_instance->create_dynamic_resource(SECURITY_SHORT_SERVER_ID, + OMA_RESOURCE_TYPE, + M2MResourceInstance::INTEGER, + false); + if(res) { + res->set_operation(M2MBase::NOT_ALLOWED); + } + } + } +} + +M2MSecurity::~M2MSecurity() +{ +} + +M2MResource* M2MSecurity::create_resource(SecurityResource resource, uint32_t value) +{ + M2MResource* res = NULL; + const char* security_id_ptr = ""; + if(!is_resource_present(resource)) { + switch(resource) { + case SMSSecurityMode: + security_id_ptr = SECURITY_SMS_SECURITY_MODE; + break; + case M2MServerSMSNumber: + security_id_ptr = SECURITY_M2M_SERVER_SMS_NUMBER; + break; + case ShortServerID: + security_id_ptr = SECURITY_SHORT_SERVER_ID; + break; + case ClientHoldOffTime: + security_id_ptr = SECURITY_CLIENT_HOLD_OFF_TIME; + break; + default: + break; + } + } + + const String security_id(security_id_ptr); + + if(!security_id.empty()) { + if(_server_instance) { + res = _server_instance->create_dynamic_resource(security_id,OMA_RESOURCE_TYPE, + M2MResourceInstance::INTEGER, + false); + + if(res) { + res->set_operation(M2MBase::NOT_ALLOWED); + res->set_value(value); + } + } + } + return res; +} + +bool M2MSecurity::delete_resource(SecurityResource resource) +{ + bool success = false; + const char* security_id_ptr = ""; + switch(resource) { + case SMSSecurityMode: + security_id_ptr = SECURITY_SMS_SECURITY_MODE; + break; + case M2MServerSMSNumber: + security_id_ptr = SECURITY_M2M_SERVER_SMS_NUMBER; + break; + case ShortServerID: + if(M2MSecurity::Bootstrap == _server_type) { + security_id_ptr = SECURITY_SHORT_SERVER_ID; + } + break; + case ClientHoldOffTime: + security_id_ptr = SECURITY_CLIENT_HOLD_OFF_TIME; + break; + default: + // Others are mandatory resources hence cannot be deleted. + break; + } + + const String security_id(security_id_ptr); + + if(!security_id.empty()) { + if(_server_instance) { + success = _server_instance->remove_resource(security_id); + } + } + return success; +} + +bool M2MSecurity::set_resource_value(SecurityResource resource, + const String &value) +{ + bool success = false; + if(M2MSecurity::M2MServerUri == resource) { + M2MResource* res = get_resource(resource); + if(res) { + success = res->set_value((const uint8_t*)value.c_str(),(uint32_t)value.length()); + } + } + return success; +} + +bool M2MSecurity::set_resource_value(SecurityResource resource, + uint32_t value) +{ + bool success = false; + M2MResource* res = get_resource(resource); + if(res) { + if(M2MSecurity::SecurityMode == resource || + M2MSecurity::SMSSecurityMode == resource || + M2MSecurity::M2MServerSMSNumber == resource || + M2MSecurity::ShortServerID == resource || + M2MSecurity::ClientHoldOffTime == resource) { + // If it is any of the above resource + // set the value of the resource. + uint8_t size = 0; + uint8_t *buffer = String::convert_integer_to_array(value, size); + success = res->set_value(buffer,size); + free(buffer); + } + } + return success; +} + +bool M2MSecurity::set_resource_value(SecurityResource resource, + const uint8_t *value, + const uint16_t length) +{ + bool success = false; + M2MResource* res = get_resource(resource); + if(res) { + if(M2MSecurity::PublicKey == resource || + M2MSecurity::ServerPublicKey == resource || + M2MSecurity::Secretkey == resource) { + success = res->set_value(value,length); + } + } + return success; +} + +String M2MSecurity::resource_value_string(SecurityResource resource) const +{ + String value = ""; + M2MResource* res = get_resource(resource); + if(res) { + if(M2MSecurity::M2MServerUri == resource) { + value = res->get_value_string(); + } + } + return value; +} + +uint32_t M2MSecurity::resource_value_buffer(SecurityResource resource, + uint8_t *&data) const +{ + uint32_t size = 0; + M2MResource* res = get_resource(resource); + if(res) { + if(M2MSecurity::PublicKey == resource || + M2MSecurity::ServerPublicKey == resource || + M2MSecurity::Secretkey == resource) { + res->get_value(data,size); + } + } + return size; +} + +uint32_t M2MSecurity::resource_value_buffer(SecurityResource resource, + const uint8_t *&data) const +{ + uint32_t size = 0; + M2MResource* res = get_resource(resource); + if(res) { + if(M2MSecurity::PublicKey == resource || + M2MSecurity::ServerPublicKey == resource || + M2MSecurity::Secretkey == resource) { + data = res->value(); + size = res->value_length(); + } + } + return size; +} + + +uint32_t M2MSecurity::resource_value_int(SecurityResource resource) const +{ + uint32_t value = 0; + M2MResource* res = get_resource(resource); + if(res) { + if(M2MSecurity::SecurityMode == resource || + M2MSecurity::SMSSecurityMode == resource || + M2MSecurity::M2MServerSMSNumber == resource || + M2MSecurity::ShortServerID == resource || + M2MSecurity::ClientHoldOffTime == resource) { + // Get the value and convert it into integer. This is not the most + // efficient way, as it takes pointless heap copy to get the zero termination. + uint8_t* buffer = NULL; + uint32_t length = 0; + res->get_value(buffer,length); + if(buffer) { + value = String::convert_array_to_integer(buffer,length); + free(buffer); + } + } + } + return value; +} + +bool M2MSecurity::is_resource_present(SecurityResource resource) const +{ + bool success = false; + M2MResource *res = get_resource(resource); + if(res) { + success = true; + } + return success; +} + +uint16_t M2MSecurity::total_resource_count() const +{ + uint16_t count = 0; + if(_server_instance) { + count = _server_instance->resources().size(); + } + return count; +} + +M2MSecurity::ServerType M2MSecurity::server_type() const +{ + return _server_type; +} + +M2MResource* M2MSecurity::get_resource(SecurityResource res) const +{ + M2MResource* res_object = NULL; + if(_server_instance) { + const char* res_name_ptr = ""; + switch(res) { + case M2MServerUri: + res_name_ptr = SECURITY_M2M_SERVER_URI; + break; + case BootstrapServer: + res_name_ptr = SECURITY_BOOTSTRAP_SERVER; + break; + case SecurityMode: + res_name_ptr = SECURITY_SECURITY_MODE; + break; + case PublicKey: + res_name_ptr = SECURITY_PUBLIC_KEY; + break; + case ServerPublicKey: + res_name_ptr = SECURITY_SERVER_PUBLIC_KEY; + break; + case Secretkey: + res_name_ptr = SECURITY_SECRET_KEY; + break; + case SMSSecurityMode: + res_name_ptr = SECURITY_SMS_SECURITY_MODE; + break; + case SMSBindingKey: + res_name_ptr = SECURITY_SMS_BINDING_KEY; + break; + case SMSBindingSecretKey: + res_name_ptr = SECURITY_SMS_BINDING_SECRET_KEY; + break; + case M2MServerSMSNumber: + res_name_ptr = SECURITY_M2M_SERVER_SMS_NUMBER; + break; + case ShortServerID: + res_name_ptr = SECURITY_SHORT_SERVER_ID; + break; + case ClientHoldOffTime: + res_name_ptr = SECURITY_CLIENT_HOLD_OFF_TIME; + break; + } + const String res_name(res_name_ptr); + + res_object = _server_instance->resource(res_name); + } + return res_object; +} + +void M2MSecurity::clear_resources() +{ + for(int i = 0; i <= M2MSecurity::ClientHoldOffTime; i++) { + M2MResource *res = get_resource((SecurityResource) i); + if (res) { + res->clear_value(); + } + } +}