support aliyun sdk on TencentOS tiny
sample: examples\aliyun_iotkit_csdk_mqtt project: board\TencentOS_tiny_EVB_MX_Plus\KEIL\aliyun_iotkit_csdk_mqtt
This commit is contained in:
10
components/connectivity/iotkit-embedded-3.0.1/3rdparty/src/dev_sign/dev_sign_api.h
vendored
Normal file
10
components/connectivity/iotkit-embedded-3.0.1/3rdparty/src/dev_sign/dev_sign_api.h
vendored
Normal file
@@ -0,0 +1,10 @@
|
||||
#ifndef _DEV_SIGN_H_
|
||||
#define _DEV_SIGN_H_
|
||||
|
||||
#include "dev_sign_internal.h"
|
||||
|
||||
int32_t IOT_Sign_MQTT(iotx_mqtt_region_types_t region, iotx_dev_meta_info_t *meta, iotx_sign_mqtt_t *signout);
|
||||
|
||||
#endif
|
||||
|
||||
|
12
components/connectivity/iotkit-embedded-3.0.1/3rdparty/src/dev_sign/dev_sign_internal.h
vendored
Normal file
12
components/connectivity/iotkit-embedded-3.0.1/3rdparty/src/dev_sign/dev_sign_internal.h
vendored
Normal file
@@ -0,0 +1,12 @@
|
||||
#ifndef _DEV_SIGN_INTERNAL_H_
|
||||
#define _DEV_SIGN_INTERNAL_H_
|
||||
|
||||
#include <stdio.h>
|
||||
#include <string.h>
|
||||
#include "infra_config.h"
|
||||
#include "infra_defs.h"
|
||||
#include "dev_sign_api.h"
|
||||
#include "dev_sign_wrapper.h"
|
||||
|
||||
#endif
|
||||
|
220
components/connectivity/iotkit-embedded-3.0.1/3rdparty/src/dev_sign/dev_sign_mqtt.c
vendored
Normal file
220
components/connectivity/iotkit-embedded-3.0.1/3rdparty/src/dev_sign/dev_sign_mqtt.c
vendored
Normal file
@@ -0,0 +1,220 @@
|
||||
#include <stdio.h>
|
||||
#include <string.h>
|
||||
#include "infra_defs.h"
|
||||
#include "infra_config.h"
|
||||
#include "infra_sha256.h"
|
||||
|
||||
#include "dev_sign_api.h"
|
||||
#include "dev_sign_wrapper.h"
|
||||
|
||||
|
||||
#define SIGN_MQTT_PORT (1883)
|
||||
|
||||
/* all secure mode define */
|
||||
#define MODE_TLS_GUIDER "-1"
|
||||
#define MODE_TLS_DIRECT "2"
|
||||
#define MODE_TCP_DIRECT_PLAIN "3"
|
||||
#define MODE_ITLS_DNS_ID2 "8"
|
||||
|
||||
#ifdef MQTT_PRE_AUTH
|
||||
#define SECURE_MODE MODE_TLS_GUIDER
|
||||
#else
|
||||
#ifdef SUPPORT_TLS
|
||||
#define SECURE_MODE MODE_TLS_DIRECT
|
||||
#else
|
||||
#define SECURE_MODE MODE_TCP_DIRECT_PLAIN
|
||||
#endif
|
||||
#endif
|
||||
|
||||
/* use fixed timestamp */
|
||||
#define TIMESTAMP_VALUE "2524608000000"
|
||||
|
||||
/* clientid key value pair define */
|
||||
const char *clientid_kv[][2] = {
|
||||
{
|
||||
"timestamp", TIMESTAMP_VALUE
|
||||
},
|
||||
{
|
||||
"_v", "sdk-c-"IOTX_SDK_VERSION
|
||||
},
|
||||
{
|
||||
"securemode", SECURE_MODE
|
||||
},
|
||||
{
|
||||
"signmethod", "hmacsha256"
|
||||
},
|
||||
{
|
||||
"lan", "C"
|
||||
},
|
||||
#if defined(DEVICE_MODEL_ENABLED) && !defined(DEVICE_MODEL_CLASSIC)
|
||||
{
|
||||
"v", IOTX_ALINK_VERSION
|
||||
},
|
||||
#else
|
||||
{
|
||||
"gw", "0"
|
||||
},
|
||||
{
|
||||
"ext", "0"
|
||||
},
|
||||
#endif
|
||||
};
|
||||
|
||||
static void _hex2str(uint8_t *input, uint16_t input_len, char *output)
|
||||
{
|
||||
char *zEncode = "0123456789ABCDEF";
|
||||
int i = 0, j = 0;
|
||||
|
||||
for (i = 0; i < input_len; i++) {
|
||||
output[j++] = zEncode[(input[i] >> 4) & 0xf];
|
||||
output[j++] = zEncode[(input[i]) & 0xf];
|
||||
}
|
||||
}
|
||||
|
||||
int _sign_get_clientid(char *clientid_string, const char *device_id, const char *custom_kv, uint8_t enable_itls)
|
||||
{
|
||||
uint8_t i;
|
||||
|
||||
if (clientid_string == NULL || device_id == NULL) {
|
||||
return FAIL_RETURN;
|
||||
}
|
||||
|
||||
memset(clientid_string, 0, DEV_SIGN_CLIENT_ID_MAXLEN);
|
||||
memcpy(clientid_string, device_id, strlen(device_id));
|
||||
memcpy(clientid_string + strlen(clientid_string), "|", 1);
|
||||
|
||||
if (enable_itls > 0) {
|
||||
clientid_kv[2][1] = MODE_ITLS_DNS_ID2;
|
||||
}
|
||||
else {
|
||||
clientid_kv[2][1] = SECURE_MODE;
|
||||
}
|
||||
|
||||
for (i = 0; i < (sizeof(clientid_kv) / (sizeof(clientid_kv[0]))); i++) {
|
||||
if ((strlen(clientid_string) + strlen(clientid_kv[i][0]) + strlen(clientid_kv[i][1]) + 2) >=
|
||||
DEV_SIGN_CLIENT_ID_MAXLEN) {
|
||||
return FAIL_RETURN;
|
||||
}
|
||||
|
||||
memcpy(clientid_string + strlen(clientid_string), clientid_kv[i][0], strlen(clientid_kv[i][0]));
|
||||
memcpy(clientid_string + strlen(clientid_string), "=", 1);
|
||||
memcpy(clientid_string + strlen(clientid_string), clientid_kv[i][1], strlen(clientid_kv[i][1]));
|
||||
memcpy(clientid_string + strlen(clientid_string), ",", 1);
|
||||
}
|
||||
|
||||
if (custom_kv != NULL) {
|
||||
if ((strlen(clientid_string) + strlen(custom_kv) + 1) >= DEV_SIGN_CLIENT_ID_MAXLEN) {
|
||||
return FAIL_RETURN;
|
||||
}
|
||||
memcpy(clientid_string + strlen(clientid_string), custom_kv, strlen(custom_kv));
|
||||
memcpy(clientid_string + strlen(clientid_string), ",", 1);
|
||||
}
|
||||
|
||||
memcpy(clientid_string + strlen(clientid_string) - 1, "|", 1);
|
||||
|
||||
return SUCCESS_RETURN;
|
||||
}
|
||||
|
||||
int _iotx_generate_sign_string(const char *device_id, const char *device_name, const char *product_key, const char *device_secret, char *sign_string)
|
||||
{
|
||||
char signsource[DEV_SIGN_SOURCE_MAXLEN] = {0};
|
||||
uint16_t signsource_len = 0;
|
||||
const char sign_fmt[] = "clientId%sdeviceName%sproductKey%stimestamp%s";
|
||||
uint8_t sign_hex[32] = {0};
|
||||
|
||||
signsource_len = sizeof(sign_fmt) + strlen(device_id) + strlen(device_name) + strlen(product_key) + strlen(TIMESTAMP_VALUE);
|
||||
if (signsource_len >= DEV_SIGN_SOURCE_MAXLEN) {
|
||||
return ERROR_DEV_SIGN_SOURCE_TOO_SHORT;
|
||||
}
|
||||
|
||||
memset(signsource, 0, DEV_SIGN_SOURCE_MAXLEN);
|
||||
memcpy(signsource, "clientId", strlen("clientId"));
|
||||
memcpy(signsource + strlen(signsource), device_id, strlen(device_id));
|
||||
memcpy(signsource + strlen(signsource), "deviceName", strlen("deviceName"));
|
||||
memcpy(signsource + strlen(signsource), device_name, strlen(device_name));
|
||||
memcpy(signsource + strlen(signsource), "productKey", strlen("productKey"));
|
||||
memcpy(signsource + strlen(signsource), product_key, strlen(product_key));
|
||||
memcpy(signsource + strlen(signsource), "timestamp", strlen("timestamp"));
|
||||
memcpy(signsource + strlen(signsource), TIMESTAMP_VALUE, strlen(TIMESTAMP_VALUE));
|
||||
|
||||
utils_hmac_sha256((uint8_t *)signsource, strlen(signsource), (uint8_t *)device_secret,
|
||||
strlen(device_secret), sign_hex);
|
||||
|
||||
_hex2str(sign_hex, 32, sign_string);
|
||||
|
||||
return SUCCESS_RETURN;
|
||||
}
|
||||
|
||||
int32_t IOT_Sign_MQTT(iotx_mqtt_region_types_t region, iotx_dev_meta_info_t *meta, iotx_sign_mqtt_t *signout)
|
||||
{
|
||||
uint16_t length = 0;
|
||||
char device_id[IOTX_PRODUCT_KEY_LEN + IOTX_DEVICE_NAME_LEN + 1] = {0};
|
||||
int res;
|
||||
|
||||
if (region >= IOTX_MQTT_DOMAIN_NUMBER || meta == NULL) {
|
||||
return -1;
|
||||
}
|
||||
|
||||
memset(signout, 0, sizeof(iotx_sign_mqtt_t));
|
||||
|
||||
memcpy(device_id, meta->product_key, strlen(meta->product_key));
|
||||
memcpy(device_id + strlen(device_id), ".", strlen("."));
|
||||
memcpy(device_id + strlen(device_id), meta->device_name, strlen(meta->device_name));
|
||||
|
||||
/* setup clientid */
|
||||
if (_sign_get_clientid(signout->clientid, device_id, NULL, 0) != SUCCESS_RETURN) {
|
||||
return ERROR_DEV_SIGN_CLIENT_ID_TOO_SHORT;
|
||||
}
|
||||
|
||||
/* setup password */
|
||||
memset(signout->password, 0, DEV_SIGN_PASSWORD_MAXLEN);
|
||||
res = _iotx_generate_sign_string(device_id, meta->device_name, meta->product_key, meta->device_secret, signout->password);
|
||||
if (res < SUCCESS_RETURN) {
|
||||
return res;
|
||||
}
|
||||
|
||||
/* setup hostname */
|
||||
if (IOTX_CLOUD_REGION_CUSTOM == region) {
|
||||
if (g_infra_mqtt_domain[region] == NULL) {
|
||||
return ERROR_DEV_SIGN_CUSTOM_DOMAIN_IS_NULL;
|
||||
}
|
||||
|
||||
length = strlen(g_infra_mqtt_domain[region]) + 1;
|
||||
if (length >= DEV_SIGN_HOSTNAME_MAXLEN) {
|
||||
return ERROR_DEV_SIGN_HOST_NAME_TOO_SHORT;
|
||||
}
|
||||
|
||||
memset(signout->hostname, 0, DEV_SIGN_HOSTNAME_MAXLEN);
|
||||
memcpy(signout->hostname, g_infra_mqtt_domain[region], strlen(g_infra_mqtt_domain[region]));
|
||||
}
|
||||
else {
|
||||
length = strlen(meta->product_key) + strlen(g_infra_mqtt_domain[region]) + 2;
|
||||
if (length >= DEV_SIGN_HOSTNAME_MAXLEN) {
|
||||
return ERROR_DEV_SIGN_HOST_NAME_TOO_SHORT;
|
||||
}
|
||||
memset(signout->hostname, 0, DEV_SIGN_HOSTNAME_MAXLEN);
|
||||
memcpy(signout->hostname, meta->product_key, strlen(meta->product_key));
|
||||
memcpy(signout->hostname + strlen(signout->hostname), ".", strlen("."));
|
||||
memcpy(signout->hostname + strlen(signout->hostname), g_infra_mqtt_domain[region],
|
||||
strlen(g_infra_mqtt_domain[region]));
|
||||
}
|
||||
|
||||
/* setup username */
|
||||
length = strlen(meta->device_name) + strlen(meta->product_key) + 2;
|
||||
if (length >= DEV_SIGN_USERNAME_MAXLEN) {
|
||||
return ERROR_DEV_SIGN_USERNAME_TOO_SHORT;
|
||||
}
|
||||
memset(signout->username, 0, DEV_SIGN_USERNAME_MAXLEN);
|
||||
memcpy(signout->username, meta->device_name, strlen(meta->device_name));
|
||||
memcpy(signout->username + strlen(signout->username), "&", strlen("&"));
|
||||
memcpy(signout->username + strlen(signout->username), meta->product_key, strlen(meta->product_key));
|
||||
|
||||
/* setup port */
|
||||
#ifdef SUPPORT_TLS
|
||||
signout->port = 443;
|
||||
#else
|
||||
signout->port = 1883;
|
||||
#endif /* #ifdef SUPPORT_TLS */
|
||||
return SUCCESS_RETURN;
|
||||
}
|
||||
|
4
components/connectivity/iotkit-embedded-3.0.1/3rdparty/src/dev_sign/dev_sign_wrapper.h
vendored
Normal file
4
components/connectivity/iotkit-embedded-3.0.1/3rdparty/src/dev_sign/dev_sign_wrapper.h
vendored
Normal file
@@ -0,0 +1,4 @@
|
||||
|
||||
|
||||
#include "infra_types.h"
|
||||
#include "infra_defs.h"
|
63
components/connectivity/iotkit-embedded-3.0.1/3rdparty/src/dev_sign/examples/dev_sign_example.c
vendored
Normal file
63
components/connectivity/iotkit-embedded-3.0.1/3rdparty/src/dev_sign/examples/dev_sign_example.c
vendored
Normal file
@@ -0,0 +1,63 @@
|
||||
#include "dev_sign_api.h"
|
||||
|
||||
#define EXAMPLE_PRODUCT_KEY "a1X2bEnP82z"
|
||||
#define EXAMPLE_PRODUCT_SECRET "7jluWm1zql7bt8qK"
|
||||
#define EXAMPLE_DEVICE_NAME "example1"
|
||||
#define EXAMPLE_DEVICE_SECRET "ga7XA6KdlEeiPXQPpRbAjOZXwG8ydgSe"
|
||||
|
||||
/* Implenment this HAL or using "printf" of your own system if you want to print something in example*/
|
||||
void HAL_Printf(const char *fmt, ...);
|
||||
|
||||
int main(int argc, char *argv[])
|
||||
{
|
||||
iotx_mqtt_region_types_t region = IOTX_CLOUD_REGION_SHANGHAI;
|
||||
iotx_dev_meta_info_t meta;
|
||||
iotx_sign_mqtt_t sign_mqtt;
|
||||
|
||||
memset(&meta, 0, sizeof(iotx_dev_meta_info_t));
|
||||
memcpy(meta.product_key, EXAMPLE_PRODUCT_KEY, strlen(EXAMPLE_PRODUCT_KEY));
|
||||
memcpy(meta.product_secret, EXAMPLE_PRODUCT_SECRET, strlen(EXAMPLE_PRODUCT_SECRET));
|
||||
memcpy(meta.device_name, EXAMPLE_DEVICE_NAME, strlen(EXAMPLE_DEVICE_NAME));
|
||||
memcpy(meta.device_secret, EXAMPLE_DEVICE_SECRET, strlen(EXAMPLE_DEVICE_SECRET));
|
||||
|
||||
if (IOT_Sign_MQTT(region, &meta, &sign_mqtt) < 0) {
|
||||
return -1;
|
||||
}
|
||||
|
||||
#if 1 /* Uncomment this if you want to show more information */
|
||||
HAL_Printf("sign_mqtt.hostname: %s\n", sign_mqtt.hostname);
|
||||
HAL_Printf("sign_mqtt.port : %d\n", sign_mqtt.port);
|
||||
HAL_Printf("sign_mqtt.username: %s\n", sign_mqtt.username);
|
||||
HAL_Printf("sign_mqtt.password: %s\n", sign_mqtt.password);
|
||||
HAL_Printf("sign_mqtt.clientid: %s\n", sign_mqtt.clientid);
|
||||
#endif
|
||||
|
||||
/*
|
||||
* Then you can pass this output parameter to MQTT connect APIs to establish connection
|
||||
*
|
||||
* e.g.
|
||||
*
|
||||
* memset(&mqtt_params, 0x0, sizeof(mqtt_params));
|
||||
*
|
||||
* mqtt_params.port = sign_mqtt.port;
|
||||
* mqtt_params.host = sign_mqtt.hostname;
|
||||
* mqtt_params.client_id = sign_mqtt.clientid;
|
||||
* mqtt_params.username = sign_mqtt.username;
|
||||
* mqtt_params.password = sign_mqtt.password;
|
||||
*
|
||||
* mqtt_params.request_timeout_ms = 2000;
|
||||
* mqtt_params.clean_session = 0;
|
||||
* mqtt_params.keepalive_interval_ms = 60000;
|
||||
* mqtt_params.read_buf_size = 1024;
|
||||
* mqtt_params.write_buf_size = 1024;
|
||||
*
|
||||
* mqtt_params.handle_event.h_fp = example_event_handle;
|
||||
* mqtt_params.handle_event.pcontext = NULL;
|
||||
*
|
||||
* pclient = IOT_MQTT_Construct(&mqtt_params);
|
||||
*
|
||||
*/
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
14
components/connectivity/iotkit-embedded-3.0.1/3rdparty/src/dev_sign/iot.mk
vendored
Normal file
14
components/connectivity/iotkit-embedded-3.0.1/3rdparty/src/dev_sign/iot.mk
vendored
Normal file
@@ -0,0 +1,14 @@
|
||||
LIBA_TARGET := libiot_sign.a
|
||||
|
||||
HDR_REFS := src/infra
|
||||
|
||||
DEPENDS += wrappers
|
||||
LDFLAGS += -liot_sdk -liot_hal -liot_tls
|
||||
|
||||
DEPENDS += external_libs/mbedtls
|
||||
|
||||
LIB_SRCS_EXCLUDE := examples/dev_sign_example.c
|
||||
SRCS_dev-sign-example += examples/dev_sign_example.c
|
||||
|
||||
$(call Append_Conditional, TARGET, dev-sign-example, DEV_SIGN, BUILD_AOS NO_EXECUTABLES)
|
||||
|
Reference in New Issue
Block a user