/* * Copyright (c) 2023, The OpenThread Authors. * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. Neither the name of the copyright holder nor the * names of its contributors may be used to endorse or promote products * derived from this software without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE * POSSIBILITY OF SUCH DAMAGE. */ #include "openthread-core-config.h" #include "cli/cli_utils.hpp" #include "cli/cli_tcat.hpp" #include "common/code_utils.hpp" #include "common/error.hpp" #include <openthread/ble_secure.h> #include <mbedtls/oid.h> #include <openthread/error.h> #include <openthread/tcat.h> #include <openthread/platform/ble.h> #if OPENTHREAD_CONFIG_BLE_TCAT_ENABLE && OPENTHREAD_CONFIG_CLI_BLE_SECURE_ENABLE // DeviceCert1 default identity for TCAT certification testing. // WARNING: storage of private keys in code or program memory MUST NOT be used in production. // The below code is for testing purposes only. For production, secure key storage must be // used to store private keys. #define OT_CLI_TCAT_X509_CERT \ "-----BEGIN CERTIFICATE-----\n" \ "MIIB6TCCAZCgAwIBAgICNekwCgYIKoZIzj0EAwIwcTEmMCQGA1UEAwwdVGhyZWFk\n" \ "IENlcnRpZmljYXRpb24gRGV2aWNlQ0ExGTAXBgNVBAoMEFRocmVhZCBHcm91cCBJ\n" \ "bmMxEjAQBgNVBAcMCVNhbiBSYW1vbjELMAkGA1UECAwCQ0ExCzAJBgNVBAYTAlVT\n" \ "MCAXDTI0MDUwNzA5Mzk0NVoYDzI5OTkxMjMxMDkzOTQ1WjA8MSEwHwYDVQQDDBhU\n" \ "Q0FUIEV4YW1wbGUgRGV2aWNlQ2VydDExFzAVBgNVBAUTDjQ3MjMtOTgzMy0wMDAx\n" \ "MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE11h/4vKZXVXv+1GDZo066spItloT\n" \ "dpCi0bux0jvpQSHLdQBIc+40zVCxMDRUvbX//vJKGsSJKOVUlCojQ2wIdqNLMEkw\n" \ "HwYDVR0jBBgwFoAUX6sbKWiIodS0MaiGYefnZlnt+BkwEAYJKwYBBAGC3yoCBAMC\n" \ "AQUwFAYJKwYBBAGC3yoDBAcEBSABAQEBMAoGCCqGSM49BAMCA0cAMEQCIHWu+Rd1\n" \ "VRlzrD8KbuyJcJFTXh2sQ9UIrFIA7+4e/GVcAiAVBdGqTxbt3TGkBBllpafAUB2/\n" \ "s0GJj7E33oblqy5eHQ==\n" \ "-----END CERTIFICATE-----\n" #define OT_CLI_TCAT_PRIV_KEY \ "-----BEGIN EC PRIVATE KEY-----\n" \ "MHcCAQEEIIqKM1QTlNaquV74W6Viz/ggXoLqlPOP6LagSyaFO3oUoAoGCCqGSM49\n" \ "AwEHoUQDQgAE11h/4vKZXVXv+1GDZo066spItloTdpCi0bux0jvpQSHLdQBIc+40\n" \ "zVCxMDRUvbX//vJKGsSJKOVUlCojQ2wIdg==\n" \ "-----END EC PRIVATE KEY-----\n" #define OT_CLI_TCAT_TRUSTED_ROOT_CERTIFICATE \ "-----BEGIN CERTIFICATE-----\n" \ "MIICOzCCAeGgAwIBAgIJAKOc2hehOGoBMAoGCCqGSM49BAMCMHExJjAkBgNVBAMM\n" \ "HVRocmVhZCBDZXJ0aWZpY2F0aW9uIERldmljZUNBMRkwFwYDVQQKDBBUaHJlYWQg\n" \ "R3JvdXAgSW5jMRIwEAYDVQQHDAlTYW4gUmFtb24xCzAJBgNVBAgMAkNBMQswCQYD\n" \ "VQQGEwJVUzAeFw0yNDA1MDMyMDAyMThaFw00NDA0MjgyMDAyMThaMHExJjAkBgNV\n" \ "BAMMHVRocmVhZCBDZXJ0aWZpY2F0aW9uIERldmljZUNBMRkwFwYDVQQKDBBUaHJl\n" \ "YWQgR3JvdXAgSW5jMRIwEAYDVQQHDAlTYW4gUmFtb24xCzAJBgNVBAgMAkNBMQsw\n" \ "CQYDVQQGEwJVUzBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGy850VBIPTkN3oL\n" \ "x++zIUsZk2k26w4fuieFz9oNvjdb5W14+Yf3mvGWsl4NHyLxqhmamVAR4h7zWRlZ\n" \ "0XyMVpKjYjBgMB4GA1UdEQQXMBWBE3RvbUB0aHJlYWRncm91cC5vcmcwDgYDVR0P\n" \ "AQH/BAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFF+rGyloiKHUtDGo\n" \ "hmHn52ZZ7fgZMAoGCCqGSM49BAMCA0gAMEUCIQCTq1qjPZs9fAJB6ppTXs588Pnu\n" \ "eVFOwC8bd//D99KiHAIgU84kwFHIyDvFqu6y+u1hFqBGsiuTmKwZ2PHhVe/xK1k=\n" \ "-----END CERTIFICATE-----\n" namespace ot { namespace Cli { otTcatAdvertisedDeviceId sAdvertisedDeviceIds[OT_TCAT_DEVICE_ID_MAX]; otTcatGeneralDeviceId sGeneralDeviceId; const char kPskdVendor[] = "JJJJJJ"; const char kUrl[] = "dummy_url"; static bool IsDeviceIdSet(void) { bool ret = false; for (const otTcatAdvertisedDeviceId &vendorDeviceId : sAdvertisedDeviceIds) { if (vendorDeviceId.mDeviceIdType != OT_TCAT_DEVICE_ID_EMPTY) { ExitNow(ret = true); } } exit: return ret; } static void HandleBleSecureReceive(otInstance *aInstance, const otMessage *aMessage, int32_t aOffset, otTcatApplicationProtocol aTcatApplicationProtocol, const char *aServiceName, void *aContext) { OT_UNUSED_VARIABLE(aContext); OT_UNUSED_VARIABLE(aTcatApplicationProtocol); OT_UNUSED_VARIABLE(aServiceName); static constexpr int kTextMaxLen = 100; static constexpr uint8_t kBufPrefixLen = 5; uint16_t nLen; uint8_t buf[kTextMaxLen]; nLen = otMessageRead(aMessage, static_cast<uint16_t>(aOffset), buf + kBufPrefixLen, sizeof(buf) - kBufPrefixLen - 1); memcpy(buf, "RECV:", kBufPrefixLen); buf[nLen + kBufPrefixLen] = 0; IgnoreReturnValue(otBleSecureSendApplicationTlv(aInstance, buf, (uint16_t)strlen((char *)buf))); IgnoreReturnValue(otBleSecureFlush(aInstance)); } template <> otError Tcat::Process<Cmd("advid")>(Arg aArgs[]) { otError error = OT_ERROR_NONE; otTcatAdvertisedDeviceId devId; static const char *const kVendorIdTypes[] = {"clear", "oui24", "oui36", "discriminator", "ianapen"}; mVendorInfo.mAdvertisedDeviceIds = sAdvertisedDeviceIds; if (aArgs[0].IsEmpty()) { if (mVendorInfo.mAdvertisedDeviceIds[0].mDeviceIdType != OT_TCAT_DEVICE_ID_EMPTY) { OutputLine("Set advertisedIds:"); for (size_t i = 0; mVendorInfo.mAdvertisedDeviceIds[i].mDeviceIdType != OT_TCAT_DEVICE_ID_EMPTY; i++) { OutputFormat("type %s, value: ", kVendorIdTypes[mVendorInfo.mAdvertisedDeviceIds[i].mDeviceIdType]); OutputBytesLine(const_cast<uint8_t *>(mVendorInfo.mAdvertisedDeviceIds[i].mDeviceId), mVendorInfo.mAdvertisedDeviceIds[i].mDeviceIdLen); } } ExitNow(); } if (aArgs[0] == kVendorIdTypes[OT_TCAT_DEVICE_ID_OUI24]) { devId.mDeviceIdType = OT_TCAT_DEVICE_ID_OUI24; } else if (aArgs[0] == kVendorIdTypes[OT_TCAT_DEVICE_ID_OUI36]) { devId.mDeviceIdType = OT_TCAT_DEVICE_ID_OUI36; } else if (aArgs[0] == kVendorIdTypes[OT_TCAT_DEVICE_ID_DISCRIMINATOR]) { devId.mDeviceIdType = OT_TCAT_DEVICE_ID_DISCRIMINATOR; } else if (aArgs[0] == kVendorIdTypes[OT_TCAT_DEVICE_ID_IANAPEN]) { devId.mDeviceIdType = OT_TCAT_DEVICE_ID_IANAPEN; } else if (aArgs[0] == kVendorIdTypes[OT_TCAT_DEVICE_ID_EMPTY]) { for (otTcatAdvertisedDeviceId &vendorDeviceId : sAdvertisedDeviceIds) { vendorDeviceId.mDeviceIdType = OT_TCAT_DEVICE_ID_EMPTY; vendorDeviceId.mDeviceIdLen = 0; } ExitNow(); } else { ExitNow(error = OT_ERROR_INVALID_ARGS); } if (!aArgs[1].IsEmpty() && aArgs[1].GetLength() < (OT_TCAT_MAX_ADVERTISED_DEVICEID_SIZE * 2 + 1)) { devId.mDeviceIdLen = OT_TCAT_MAX_ADVERTISED_DEVICEID_SIZE; SuccessOrExit(error = aArgs[1].ParseAsHexString(devId.mDeviceIdLen, devId.mDeviceId)); for (otTcatAdvertisedDeviceId &vendorDeviceId : sAdvertisedDeviceIds) { if (vendorDeviceId.mDeviceIdType == devId.mDeviceIdType || vendorDeviceId.mDeviceIdType == OT_TCAT_DEVICE_ID_EMPTY) { vendorDeviceId = devId; break; } } } else { ExitNow(error = OT_ERROR_INVALID_ARGS); } exit: return error; } template <> otError Tcat::Process<Cmd("devid")>(Arg aArgs[]) { otError error = OT_ERROR_NONE; if (aArgs[0].IsEmpty()) { if (sGeneralDeviceId.mDeviceIdLen != 0) { OutputLine("TCAT DeviceId:"); OutputBytesLine(sGeneralDeviceId.mDeviceId, sGeneralDeviceId.mDeviceIdLen); } ExitNow(); } if (aArgs[0] == "clear") { ClearAllBytes(sGeneralDeviceId); } else { VerifyOrExit(aArgs[0].GetLength() < (OT_TCAT_MAX_DEVICEID_SIZE * 2 + 1), error = OT_ERROR_INVALID_ARGS); sGeneralDeviceId.mDeviceIdLen = OT_TCAT_MAX_DEVICEID_SIZE; SuccessOrExit(error = aArgs[0].ParseAsHexString(sGeneralDeviceId.mDeviceIdLen, sGeneralDeviceId.mDeviceId)); } exit: return error; } template <> otError Tcat::Process<Cmd("start")>(Arg aArgs[]) { OT_UNUSED_VARIABLE(aArgs); otError error = OT_ERROR_NONE; ClearAllBytes(mVendorInfo); mVendorInfo.mPskdString = kPskdVendor; mVendorInfo.mProvisioningUrl = kUrl; if (IsDeviceIdSet()) { mVendorInfo.mAdvertisedDeviceIds = sAdvertisedDeviceIds; } if (sGeneralDeviceId.mDeviceIdLen != 0) { mVendorInfo.mGeneralDeviceId = &sGeneralDeviceId; } otBleSecureSetCertificate(GetInstancePtr(), reinterpret_cast<const uint8_t *>(OT_CLI_TCAT_X509_CERT), sizeof(OT_CLI_TCAT_X509_CERT), reinterpret_cast<const uint8_t *>(OT_CLI_TCAT_PRIV_KEY), sizeof(OT_CLI_TCAT_PRIV_KEY)); otBleSecureSetCaCertificateChain(GetInstancePtr(), reinterpret_cast<const uint8_t *>(OT_CLI_TCAT_TRUSTED_ROOT_CERTIFICATE), sizeof(OT_CLI_TCAT_TRUSTED_ROOT_CERTIFICATE)); otBleSecureSetSslAuthMode(GetInstancePtr(), true); SuccessOrExit(error = otBleSecureSetTcatVendorInfo(GetInstancePtr(), &mVendorInfo)); SuccessOrExit(error = otBleSecureStart(GetInstancePtr(), nullptr, HandleBleSecureReceive, true, nullptr)); SuccessOrExit(error = otBleSecureTcatStart(GetInstancePtr(), nullptr)); exit: return error; } template <> otError Tcat::Process<Cmd("stop")>(Arg aArgs[]) { OT_UNUSED_VARIABLE(aArgs); otBleSecureStop(GetInstancePtr()); return OT_ERROR_NONE; } otError Tcat::Process(Arg aArgs[]) { #define CmdEntry(aCommandString) \ { \ aCommandString, &Tcat::Process<Cmd(aCommandString)> \ } static constexpr Command kCommands[] = {CmdEntry("advid"), CmdEntry("devid"), CmdEntry("start"), CmdEntry("stop")}; static_assert(BinarySearch::IsSorted(kCommands), "kCommands is not sorted"); #undef CmdEntry otError error = OT_ERROR_NONE; const Command *command; if (aArgs[0].IsEmpty() || (aArgs[0] == "help")) { OutputCommandTable(kCommands); ExitNow(error = aArgs[0].IsEmpty() ? error : OT_ERROR_NONE); } command = BinarySearch::Find(aArgs[0].GetCString(), kCommands); VerifyOrExit(command != nullptr); error = (this->*command->mHandler)(aArgs + 1); exit: return error; } } // namespace Cli } // namespace ot #endif // OPENTHREAD_CONFIG_BLE_TCAT_ENABLE && OPENTHREAD_CONFIG_CLI_BLE_SECURE_ENABLE