summaryrefslogtreecommitdiff
path: root/CommandTerminal/CmdNetworkSessionKey.cpp
blob: 4d42505d8641b767bd25c43cef52eaa0310453bd (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
#include "CmdNetworkSessionKey.h"

CmdNetworkSessionKey::CmdNetworkSessionKey(mDot* dot, mts::MTSSerial& serial) :
    Command(dot, "Network Session Key", "AT+NSK", "Network session encryption key (16 bytes)"), _serial(serial)
{
    _help = std::string(text()) + ": " + std::string(desc());
    _usage = "(hex:16)";
    _queryable = true;
}

uint32_t CmdNetworkSessionKey::action(std::vector<std::string> args)
{
    if (args.size() == 1)
    {
        if (_dot->getVerbose())
            _serial.writef("Network Session Key: ");

        _serial.writef("%s\r\n", mts::Text::bin2hexString(_dot->getNetworkSessionKey(), ".").c_str());
    }
    else if (args.size() == 2)
    {
        int32_t code;
        std::vector<uint8_t> NewKey;

        // Read in the key components...
        readByteArray(args[1], NewKey, KEY_LENGTH);

        if ((code = _dot->setNetworkSessionKey(NewKey)) == mDot::MDOT_OK) {
            _serial.writef("Set Network Session Key: ");
            _serial.writef("%s\r\n", mts::Text::bin2hexString(NewKey, ".").c_str());
        } else {
            std::string error = mDot::getReturnCodeString(code) + " - " + _dot->getLastError();
            setErrorMessage(error);
            return 1;
        }
    }

    return 0;
}

bool CmdNetworkSessionKey::verify(std::vector<std::string> args)
{
    if (args.size() == 1)
        return true;

    if (args.size() == 2) {
        if (!isHexString(args[1], 16)) {
            setErrorMessage("Invalid key, expects (hex:16)");
            return false;
        }

        return true;
    }

    setErrorMessage("Invalid arguments");
    return false;
}