summaryrefslogtreecommitdiff
path: root/CommandTerminal/CmdDataSessionKey.cpp
diff options
context:
space:
mode:
Diffstat (limited to 'CommandTerminal/CmdDataSessionKey.cpp')
-rw-r--r--CommandTerminal/CmdDataSessionKey.cpp56
1 files changed, 56 insertions, 0 deletions
diff --git a/CommandTerminal/CmdDataSessionKey.cpp b/CommandTerminal/CmdDataSessionKey.cpp
new file mode 100644
index 0000000..d663406
--- /dev/null
+++ b/CommandTerminal/CmdDataSessionKey.cpp
@@ -0,0 +1,56 @@
+#include "CmdDataSessionKey.h"
+
+CmdDataSessionKey::CmdDataSessionKey(mDot* dot, mts::MTSSerial& serial) :
+ Command(dot, "Data Session Key", "AT+DSK", "Data session encryption key (16 bytes)"), _serial(serial)
+{
+ _help = std::string(text()) + ": " + std::string(desc());
+ _usage = "(hex:16)";
+ _queryable = true;
+}
+
+uint32_t CmdDataSessionKey::action(std::vector<std::string> args)
+{
+ if (args.size() == 1)
+ {
+ if (_dot->getVerbose())
+ _serial.writef("Data Session Key: ");
+ _serial.writef("%s\r\n", mts::Text::bin2hexString(_dot->getDataSessionKey(), ".").c_str());
+ }
+ else if (args.size() == 2)
+ {
+ int32_t code;
+ std::vector<uint8_t> NewKey;
+
+ // Read in the key components...
+ readByteArray(args[1], NewKey, KEY_LENGTH);
+
+ if ((code = _dot->setDataSessionKey(NewKey)) == mDot::MDOT_OK) {
+ _serial.writef("Set Data Session Key: ");
+ _serial.writef("%s\r\n", mts::Text::bin2hexString(NewKey, ".").c_str());
+ } else {
+ std::string error = mDot::getReturnCodeString(code) + " - " + _dot->getLastError();
+ setErrorMessage(error);
+ return 1;
+ }
+ }
+
+ return 0;
+}
+
+bool CmdDataSessionKey::verify(std::vector<std::string> args)
+{
+ if (args.size() == 1)
+ return true;
+
+ if (args.size() == 2) {
+ if (!isHexString(args[1], 16)) {
+ setErrorMessage("Invalid key, expects (hex:16)");
+ return false;
+ }
+
+ return true;
+ }
+
+ setErrorMessage("Invalid arguments");
+ return false;
+}