Skip to content

Commit 4ac4621

Browse files
committedAug 9, 2024
Implement setting key persitence for ICD server
1 parent 6a646e7 commit 4ac4621

File tree

3 files changed

+23
-5
lines changed

3 files changed

+23
-5
lines changed
 

‎src/app/clusters/icd-management-server/icd-management-server.cpp

+1-1
Original file line numberDiff line numberDiff line change
@@ -312,7 +312,7 @@ Status ICDManagementServer::RegisterClient(CommandHandler * commandObj, const Co
312312
entry.DeleteKey();
313313
}
314314

315-
err = entry.SetKey(key);
315+
err = entry.SetKey(key, true);
316316
VerifyOrReturnError(CHIP_ERROR_INVALID_ARGUMENT != err, Status::ConstraintError);
317317
VerifyOrReturnError(CHIP_NO_ERROR == err, Status::Failure);
318318
err = table.Set(entry.index, entry);

‎src/app/icd/server/ICDMonitoringTable.cpp

+19-2
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,10 @@
1919

2020
#include <crypto/RandUtils.h>
2121

22+
#ifdef CONFIG_CHIP_CRYPTO_PSA
23+
#include <crypto/CHIPCryptoPALPSA.h>
24+
#endif
25+
2226
namespace chip {
2327

2428
enum class Fields : uint8_t
@@ -131,7 +135,7 @@ void ICDMonitoringEntry::Clear()
131135
this->clientType = app::Clusters::IcdManagement::ClientTypeEnum::kPermanent;
132136
}
133137

134-
CHIP_ERROR ICDMonitoringEntry::SetKey(ByteSpan keyData)
138+
CHIP_ERROR ICDMonitoringEntry::SetKey(ByteSpan keyData, bool persistent)
135139
{
136140
VerifyOrReturnError(keyData.size() == sizeof(Crypto::Symmetric128BitsKeyByteArray), CHIP_ERROR_INVALID_ARGUMENT);
137141
VerifyOrReturnError(symmetricKeystore != nullptr, CHIP_ERROR_INTERNAL);
@@ -140,7 +144,20 @@ CHIP_ERROR ICDMonitoringEntry::SetKey(ByteSpan keyData)
140144
Crypto::Symmetric128BitsKeyByteArray keyMaterial;
141145
memcpy(keyMaterial, keyData.data(), sizeof(Crypto::Symmetric128BitsKeyByteArray));
142146

143-
// TODO - Add function to set PSA key lifetime
147+
#ifdef CONFIG_CHIP_CRYPTO_PSA
148+
if (persistent)
149+
{
150+
ReturnErrorOnFailure(Crypto::FindFreeKeySlotInRange(aesKeyHandle.AsMutable<psa_key_id_t>(),
151+
to_underlying(Crypto::KeyIdBase::ICDAesKeyRangeStart),
152+
Crypto::kMaxICDClientKeys));
153+
ReturnErrorOnFailure(Crypto::FindFreeKeySlotInRange(hmacKeyHandle.AsMutable<psa_key_id_t>(),
154+
to_underlying(Crypto::KeyIdBase::ICDHmacKeyRangeStart),
155+
Crypto::kMaxICDClientKeys));
156+
}
157+
#else
158+
IgnoreUnusedVariable(persistent);
159+
#endif // CONFIG_CHIP_CRYPTO_PSA
160+
144161
ReturnErrorOnFailure(symmetricKeystore->CreateKey(keyMaterial, aesKeyHandle));
145162
CHIP_ERROR error = symmetricKeystore->CreateKey(keyMaterial, hmacKeyHandle);
146163

‎src/app/icd/server/ICDMonitoringTable.h

+3-2
Original file line numberDiff line numberDiff line change
@@ -69,13 +69,14 @@ struct ICDMonitoringEntry : public PersistentData<kICDMonitoringBufferSize>
6969
* A new entry object should be used for each key when adding entries to the ICDMonitoring
7070
* table.
7171
*
72-
* @param keyData A byte span containing the raw key
72+
* @param keyData A byte span containing the raw key
73+
* @param persistent Persistence of the key to be set (optional, needed only when setting persistent key with PSA Crypto API)
7374
* @return CHIP_ERROR CHIP_NO_ERROR success
7475
* CHIP_ERROR_INVALID_ARGUMENT wrong size of the raw key
7576
* CHIP_ERROR_INTERNAL No KeyStore for the entry or Key Handle already present
7677
* CHIP_ERROR_XXX Crypto API related failure
7778
*/
78-
CHIP_ERROR SetKey(ByteSpan keyData);
79+
CHIP_ERROR SetKey(ByteSpan keyData, bool persistent = false);
7980
CHIP_ERROR DeleteKey(void);
8081
inline bool IsValid()
8182
{

0 commit comments

Comments
 (0)