Hi,
I?m having difficulty with getting Just-Works Owner Transfer to work on iOS and
looking for assistance. I?m using the OCF Certification Tool and trying to run
test CT 1.1.1. Here?s a couple of excerpts from the test results:
1.762s 18:19:32 INFO:?Sending unicast CON UPDATE request with query:
/oic/sec/doxm
1.762s 18:19:32 DEBUG:?CON UPDATE request body: {"owned": false,
"devowneruuid": "", "oxmsel": 0}
1.762s 18:19:32 INFO:?Prompting "Waiting for CoAP response... "
1.762s 18:19:32 VERBOSE:?-> 192.168.90.52:49196->192.168.90.53:61002 CON-POST
ID=367, Token=5B1C74B7, Options=[URI-Port=61002, URI-Path=oic, sec, doxm,
Content-Type=application/cbor, Accept=application/cbor],
1.762s 18:19:32 VERBOSE:?-> {"owned":false,"devowneruuid":"","oxmsel":0}
1.825s 18:19:32 VERBOSE:?<- 192.168.90.53:61002->192.168.90.52:49196 ACK-4.00
Bad Request ID=367, Token=5B1C74B7, Options=[URI-Path=oic, sec, doxm],
1.825s 18:19:32 DEBUG:?AgentBase multiple action complete
?
2.043s 18:19:32 VERBOSE:?-> 192.168.90.52:49196->192.168.90.53:61002 ACK-Empty
Message ID=369, Token=, Options=[],
2.059s 18:19:32 DEBUG:?AgentBase multiple action complete
2.059s 18:19:32 DEBUG:?Starting verification with ID:"CT_Precondition"...
2.059s 18:19:32 INFO:?CT_Precondition: IUT respond to /oic/sec/pstat (CON-POST
ID:369)
2.059s 18:19:32 DEBUG:?Verification with ID:"CT_Precondition" ended with
result: PASSED
2.059s 18:19:32 DEBUG:?DTLS Just Works Client: Initializing session. Advertised
cipher suites: FF00
2.137s 18:19:32 DEBUG:?DTLS Just Works Client: Alert handshake_failure(40) was
received
2.137s 18:19:32 DEBUG:?DTLS Just Works Client: Alert handshake_failure(40) was
raised
2.137s 18:19:32 INFO:?Sending unicast CON UPDATE request with query:
/oic/sec/doxm
2.137s 18:19:32 DEBUG:?CON UPDATE request body: {"owned": false,
"devowneruuid": "11111111-2222-3333-4444-555555555555", "oxmsel": 0,
"rowneruuid": "11111111-2222-3333-4444-555555555555"}
2.137s 18:19:32 VERBOSE:?-> 192.168.90.52:49197->192.168.90.53:49720 CON-POST
ID=370, Token=5E37BF5A, Options=[URI-Port=49720, URI-Path=oic, sec, doxm,
Content-Type=application/cbor, Accept=application/cbor], Secured=true
2.137s 18:19:32 VERBOSE:?->
{"owned":false,"devowneruuid":"11111111-2222-3333-4444-555555555555","oxmsel":0,"rowneruuid":"11111111-2222-3333-4444-555555555555"}
2.137s 18:19:32 DEBUG:?DTLS Just Works Client: Initializing session. Advertised
cipher suites: FF00
2.137s 18:19:32 INFO:?Prompting "Waiting for CoAP response... "
3.822s 18:19:34 DEBUG:?DTLS Just Works Client: Alert handshake_failure(40) was
received
3.822s 18:19:34 DEBUG:?DTLS Just Works Client: Alert handshake_failure(40) was
raised
4.290s 18:19:34 VERBOSE:?-> 192.168.90.52:49197->192.168.90.53:49720 CON-POST
ID=370, Token=5E37BF5A, Options=[URI-Port=49720, URI-Path=oic, sec, doxm,
Content-Type=application/cbor, Accept=application/cbor], Secured=true
4.290s 18:19:34 VERBOSE:?->
{"owned":false,"devowneruuid":"11111111-2222-3333-4444-555555555555","oxmsel":0,"rowneruuid":"11111111-2222-3333-4444-555555555555"}
Also, here are some logs from the iOS App:
9:35.924133000 DEBUG: MBED_TLS: client hello v3, handshake type: 1
19:35.924175000 DEBUG: MBED_TLS: client hello v3, handshake len.: 100
19:35.924234000 DEBUG: MBED_TLS: dumping 'client hello, version' (2 bytes)
19:35.924269000 DEBUG: MBED_TLS: 0000: fe fd
..
19:35.924276000 DEBUG: MBED_TLS: dumping 'client hello, random bytes' (32 bytes)
19:35.924286000 DEBUG: MBED_TLS: 0000: d1 97 24 ab 95 55 b3 6b b1 4b 00 a2 bb
c7 0e 6e ..$..U.k.K.....n
19:35.924485000 DEBUG: MBED_TLS: 0010: 47 38 a0 f7 b5 36 03 fc 5f b3 87 d5 eb
3d 0d 43 G8...6.._....=.C
19:35.924494000 DEBUG: MBED_TLS: dumping 'client hello, session id' (0 bytes)
19:35.924500000 DEBUG: MBED_TLS: dumping 'client hello, cookie' (0 bytes)
19:35.924505000 DEBUG: MBED_TLS: cookie verification failed
19:35.924511000 DEBUG: MBED_TLS: dumping 'client hello, ciphersuitelist' (4
bytes)
19:35.924521000 DEBUG: MBED_TLS: 0000: ff 00 00 ff
....
19:35.924526000 DEBUG: MBED_TLS: dumping 'client hello, compression' (1 bytes)
19:35.924534000 DEBUG: MBED_TLS: 0000: 00
.
19:35.924540000 DEBUG: MBED_TLS: dumping 'client hello extensions' (54 bytes)
19:35.924550000 DEBUG: MBED_TLS: 0000: 00 0d 00 20 00 1e 02 01 03 01 04 01 05
01 06 01 ... ............
19:35.924560000 DEBUG: MBED_TLS: 0010: 02 02 03 02 04 02 05 02 06 02 02 03 03
03 04 03 ................
19:35.924761000 DEBUG: MBED_TLS: 0020: 05 03 06 03 00 0b 00 04 03 00 01 02 00
0a 00 06 ................
19:35.924773000 DEBUG: MBED_TLS: 0030: 00 04 00 17 00 18
......
19:35.924778000 DEBUG: MBED_TLS: found signature_algorithms extension
19:35.924875000 DEBUG: MBED_TLS: client hello v3, signature_algorithm ext: 6
19:35.924903000 DEBUG: MBED_TLS: found supported point formats extension
19:35.924911000 DEBUG: MBED_TLS: point format selected: 0
19:35.924916000 DEBUG: MBED_TLS: found supported elliptic curves extension
19:35.924926000 DEBUG: MBED_TLS: received TLS_EMPTY_RENEGOTIATION_INFO
19:35.924931000 DEBUG: MBED_TLS: got no ciphersuites in common
19:35.924936000 DEBUG: MBED_TLS: => send alert message
19:35.924941000 DEBUG: MBED_TLS: => write record
I am building with SECURED=1. Is there any other build configuration settings
for IoTivity specific to iOS in order to get this to work?
Any help that can be provided would be greatly appreciated.
Thanks,
Jonny
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
<http://lists.iotivity.org/pipermail/iotivity-dev/attachments/20170710/a676f211/attachment.html>