|
46 | 46 | #include <credentials/FabricTable.h>
|
47 | 47 | #include <credentials/attestation_verifier/DeviceAttestationDelegate.h>
|
48 | 48 | #include <credentials/attestation_verifier/DeviceAttestationVerifier.h>
|
| 49 | +#include <crypto/CHIPCryptoPAL.h> |
49 | 50 | #include <inet/InetInterface.h>
|
50 | 51 | #include <lib/core/CHIPConfig.h>
|
51 | 52 | #include <lib/core/CHIPCore.h>
|
@@ -79,8 +80,6 @@ namespace chip {
|
79 | 80 |
|
80 | 81 | namespace Controller {
|
81 | 82 |
|
82 |
| -using namespace chip::Protocols::UserDirectedCommissioning; |
83 |
| - |
84 | 83 | inline constexpr uint16_t kNumMaxActiveDevices = CHIP_CONFIG_CONTROLLER_MAX_ACTIVE_DEVICES;
|
85 | 84 |
|
86 | 85 | struct ControllerInitParams
|
@@ -272,7 +271,7 @@ class DLL_EXPORT DeviceController : public AbstractDnssdDiscoveryController
|
272 | 271 | * @return CHIP_ERROR CHIP_NO_ERROR on success, or corresponding error
|
273 | 272 | */
|
274 | 273 | CHIP_ERROR ComputePASEVerifier(uint32_t iterations, uint32_t setupPincode, const ByteSpan & salt,
|
275 |
| - Spake2pVerifier & outVerifier); |
| 274 | + Crypto::Spake2pVerifier & outVerifier); |
276 | 275 |
|
277 | 276 | void RegisterDeviceDiscoveryDelegate(DeviceDiscoveryDelegate * delegate) { mDeviceDiscoveryDelegate = delegate; }
|
278 | 277 |
|
@@ -720,7 +719,10 @@ class DLL_EXPORT DeviceCommissioner : public DeviceController,
|
720 | 719 | * Return the UDC Server instance
|
721 | 720 | *
|
722 | 721 | */
|
723 |
| - UserDirectedCommissioningServer * GetUserDirectedCommissioningServer() { return mUdcServer; } |
| 722 | + Protocols::UserDirectedCommissioning::UserDirectedCommissioningServer * GetUserDirectedCommissioningServer() |
| 723 | + { |
| 724 | + return mUdcServer; |
| 725 | + } |
724 | 726 | #endif // CHIP_DEVICE_CONFIG_ENABLE_COMMISSIONER_DISCOVERY
|
725 | 727 |
|
726 | 728 | /**
|
@@ -785,7 +787,7 @@ class DLL_EXPORT DeviceCommissioner : public DeviceController,
|
785 | 787 | ObjectPool<CommissioneeDeviceProxy, kNumMaxActiveDevices> mCommissioneeDevicePool;
|
786 | 788 |
|
787 | 789 | #if CHIP_DEVICE_CONFIG_ENABLE_COMMISSIONER_DISCOVERY // make this commissioner discoverable
|
788 |
| - UserDirectedCommissioningServer * mUdcServer = nullptr; |
| 790 | + Protocols::UserDirectedCommissioning::UserDirectedCommissioningServer * mUdcServer = nullptr; |
789 | 791 | // mUdcTransportMgr is for insecure communication (ex. user directed commissioning)
|
790 | 792 | UdcTransportMgr * mUdcTransportMgr = nullptr;
|
791 | 793 | uint16_t mUdcListenPort = CHIP_UDC_PORT;
|
@@ -821,7 +823,7 @@ class DLL_EXPORT DeviceCommissioner : public DeviceController,
|
821 | 823 | The function does not hold a reference to the device object.
|
822 | 824 | */
|
823 | 825 | CHIP_ERROR SendOperationalCertificate(DeviceProxy * device, const ByteSpan & nocCertBuf, const Optional<ByteSpan> & icaCertBuf,
|
824 |
| - IdentityProtectionKeySpan ipk, NodeId adminSubject, |
| 826 | + Crypto::IdentityProtectionKeySpan ipk, NodeId adminSubject, |
825 | 827 | Optional<System::Clock::Timeout> timeout);
|
826 | 828 | /* This function sends the trusted root certificate to the device.
|
827 | 829 | The function does not hold a reference to the device object.
|
@@ -886,7 +888,7 @@ class DLL_EXPORT DeviceCommissioner : public DeviceController,
|
886 | 888 | Credentials::AttestationVerificationResult result);
|
887 | 889 |
|
888 | 890 | static void OnDeviceNOCChainGeneration(void * context, CHIP_ERROR status, const ByteSpan & noc, const ByteSpan & icac,
|
889 |
| - const ByteSpan & rcac, Optional<IdentityProtectionKeySpan> ipk, |
| 891 | + const ByteSpan & rcac, Optional<Crypto::IdentityProtectionKeySpan> ipk, |
890 | 892 | Optional<NodeId> adminSubject);
|
891 | 893 | static void OnArmFailSafe(void * context,
|
892 | 894 | const chip::app::Clusters::GeneralCommissioning::Commands::ArmFailSafeResponse::DecodableType & data);
|
|
0 commit comments