blob: d663406a45c1752ee191727572b814207f3be68b (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
|
#include "CmdDataSessionKey.h"
CmdDataSessionKey::CmdDataSessionKey(mDot* dot, mts::MTSSerial& serial) :
Command(dot, "Data Session Key", "AT+DSK", "Data session encryption key (16 bytes)"), _serial(serial)
{
_help = std::string(text()) + ": " + std::string(desc());
_usage = "(hex:16)";
_queryable = true;
}
uint32_t CmdDataSessionKey::action(std::vector<std::string> args)
{
if (args.size() == 1)
{
if (_dot->getVerbose())
_serial.writef("Data Session Key: ");
_serial.writef("%s\r\n", mts::Text::bin2hexString(_dot->getDataSessionKey(), ".").c_str());
}
else if (args.size() == 2)
{
int32_t code;
std::vector<uint8_t> NewKey;
// Read in the key components...
readByteArray(args[1], NewKey, KEY_LENGTH);
if ((code = _dot->setDataSessionKey(NewKey)) == mDot::MDOT_OK) {
_serial.writef("Set Data Session Key: ");
_serial.writef("%s\r\n", mts::Text::bin2hexString(NewKey, ".").c_str());
} else {
std::string error = mDot::getReturnCodeString(code) + " - " + _dot->getLastError();
setErrorMessage(error);
return 1;
}
}
return 0;
}
bool CmdDataSessionKey::verify(std::vector<std::string> args)
{
if (args.size() == 1)
return true;
if (args.size() == 2) {
if (!isHexString(args[1], 16)) {
setErrorMessage("Invalid key, expects (hex:16)");
return false;
}
return true;
}
setErrorMessage("Invalid arguments");
return false;
}
|