|
46 | 46 | #include <credentials/FabricTable.h>
|
47 | 47 | #include <credentials/attestation_verifier/DeviceAttestationDelegate.h>
|
48 | 48 | #include <credentials/attestation_verifier/DeviceAttestationVerifier.h>
|
| 49 | +#include <crypto/CHIPCryptoPAL.h> |
49 | 50 | #include <inet/InetInterface.h>
|
50 | 51 | #include <lib/core/CHIPConfig.h>
|
51 | 52 | #include <lib/core/CHIPCore.h>
|
@@ -79,8 +80,6 @@ namespace chip {
|
79 | 80 |
|
80 | 81 | namespace Controller {
|
81 | 82 |
|
82 |
| -using namespace chip::Protocols::UserDirectedCommissioning; |
83 |
| - |
84 | 83 | inline constexpr uint16_t kNumMaxActiveDevices = CHIP_CONFIG_CONTROLLER_MAX_ACTIVE_DEVICES;
|
85 | 84 |
|
86 | 85 | struct ControllerInitParams
|
@@ -272,7 +271,7 @@ class DLL_EXPORT DeviceController : public AbstractDnssdDiscoveryController
|
272 | 271 | * @return CHIP_ERROR CHIP_NO_ERROR on success, or corresponding error
|
273 | 272 | */
|
274 | 273 | CHIP_ERROR ComputePASEVerifier(uint32_t iterations, uint32_t setupPincode, const ByteSpan & salt,
|
275 |
| - Spake2pVerifier & outVerifier); |
| 274 | + Crypto::Spake2pVerifier & outVerifier); |
276 | 275 |
|
277 | 276 | void RegisterDeviceDiscoveryDelegate(DeviceDiscoveryDelegate * delegate) { mDeviceDiscoveryDelegate = delegate; }
|
278 | 277 |
|
@@ -821,7 +820,7 @@ class DLL_EXPORT DeviceCommissioner : public DeviceController,
|
821 | 820 | The function does not hold a reference to the device object.
|
822 | 821 | */
|
823 | 822 | CHIP_ERROR SendOperationalCertificate(DeviceProxy * device, const ByteSpan & nocCertBuf, const Optional<ByteSpan> & icaCertBuf,
|
824 |
| - IdentityProtectionKeySpan ipk, NodeId adminSubject, |
| 823 | + Crypto::IdentityProtectionKeySpan ipk, NodeId adminSubject, |
825 | 824 | Optional<System::Clock::Timeout> timeout);
|
826 | 825 | /* This function sends the trusted root certificate to the device.
|
827 | 826 | The function does not hold a reference to the device object.
|
@@ -886,7 +885,7 @@ class DLL_EXPORT DeviceCommissioner : public DeviceController,
|
886 | 885 | Credentials::AttestationVerificationResult result);
|
887 | 886 |
|
888 | 887 | static void OnDeviceNOCChainGeneration(void * context, CHIP_ERROR status, const ByteSpan & noc, const ByteSpan & icac,
|
889 |
| - const ByteSpan & rcac, Optional<IdentityProtectionKeySpan> ipk, |
| 888 | + const ByteSpan & rcac, Optional<Crypto::IdentityProtectionKeySpan> ipk, |
890 | 889 | Optional<NodeId> adminSubject);
|
891 | 890 | static void OnArmFailSafe(void * context,
|
892 | 891 | const chip::app::Clusters::GeneralCommissioning::Commands::ArmFailSafeResponse::DecodableType & data);
|
|
0 commit comments