summaryrefslogtreecommitdiff
path: root/CommandTerminal/CmdDataSessionKey.cpp
blob: d663406a45c1752ee191727572b814207f3be68b (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
#include "CmdDataSessionKey.h"

CmdDataSessionKey::CmdDataSessionKey(mDot* dot, mts::MTSSerial& serial) :
    Command(dot, "Data Session Key", "AT+DSK", "Data session encryption key (16 bytes)"), _serial(serial)
{
    _help = std::string(text()) + ": " + std::string(desc());
    _usage = "(hex:16)";
    _queryable = true;
}

uint32_t CmdDataSessionKey::action(std::vector<std::string> args)
{
    if (args.size() == 1)
    {
        if (_dot->getVerbose())
            _serial.writef("Data Session Key: ");
        _serial.writef("%s\r\n", mts::Text::bin2hexString(_dot->getDataSessionKey(), ".").c_str());
    }
    else if (args.size() == 2)
    {
        int32_t code;
        std::vector<uint8_t> NewKey;

        // Read in the key components...
        readByteArray(args[1], NewKey, KEY_LENGTH);

        if ((code = _dot->setDataSessionKey(NewKey)) == mDot::MDOT_OK) {
            _serial.writef("Set Data Session Key: ");
            _serial.writef("%s\r\n", mts::Text::bin2hexString(NewKey, ".").c_str());
        } else {
            std::string error = mDot::getReturnCodeString(code) + " - " + _dot->getLastError();
            setErrorMessage(error);
            return 1;
        }
    }

    return 0;
}

bool CmdDataSessionKey::verify(std::vector<std::string> args)
{
    if (args.size() == 1)
        return true;

    if (args.size() == 2) {
        if (!isHexString(args[1], 16)) {
            setErrorMessage("Invalid key, expects (hex:16)");
            return false;
        }

        return true;
    }

    setErrorMessage("Invalid arguments");
    return false;
}