19
19
20
20
#include < crypto/RandUtils.h>
21
21
22
+ #ifdef CONFIG_CHIP_CRYPTO_PSA
23
+ #include < crypto/CHIPCryptoPALPSA.h>
24
+ #endif
25
+
22
26
namespace chip {
23
27
24
28
enum class Fields : uint8_t
@@ -131,7 +135,7 @@ void ICDMonitoringEntry::Clear()
131
135
this ->clientType = app::Clusters::IcdManagement::ClientTypeEnum::kPermanent ;
132
136
}
133
137
134
- CHIP_ERROR ICDMonitoringEntry::SetKey (ByteSpan keyData)
138
+ CHIP_ERROR ICDMonitoringEntry::SetKey (ByteSpan keyData, bool persistent )
135
139
{
136
140
VerifyOrReturnError (keyData.size () == sizeof (Crypto::Symmetric128BitsKeyByteArray), CHIP_ERROR_INVALID_ARGUMENT);
137
141
VerifyOrReturnError (symmetricKeystore != nullptr , CHIP_ERROR_INTERNAL);
@@ -140,7 +144,20 @@ CHIP_ERROR ICDMonitoringEntry::SetKey(ByteSpan keyData)
140
144
Crypto::Symmetric128BitsKeyByteArray keyMaterial;
141
145
memcpy (keyMaterial, keyData.data (), sizeof (Crypto::Symmetric128BitsKeyByteArray));
142
146
143
- // TODO - Add function to set PSA key lifetime
147
+ #ifdef CONFIG_CHIP_CRYPTO_PSA
148
+ if (persistent)
149
+ {
150
+ ReturnErrorOnFailure (Crypto::FindFreeKeySlotInRange (aesKeyHandle.AsMutable <psa_key_id_t >(),
151
+ to_underlying (Crypto::KeyIdBase::ICDAesKeyRangeStart),
152
+ Crypto::kMaxICDClientKeys ));
153
+ ReturnErrorOnFailure (Crypto::FindFreeKeySlotInRange (hmacKeyHandle.AsMutable <psa_key_id_t >(),
154
+ to_underlying (Crypto::KeyIdBase::ICDHmacKeyRangeStart),
155
+ Crypto::kMaxICDClientKeys ));
156
+ }
157
+ #else
158
+ IgnoreUnusedVariable (persistent);
159
+ #endif // CONFIG_CHIP_CRYPTO_PSA
160
+
144
161
ReturnErrorOnFailure (symmetricKeystore->CreateKey (keyMaterial, aesKeyHandle));
145
162
CHIP_ERROR error = symmetricKeystore->CreateKey (keyMaterial, hmacKeyHandle);
146
163
0 commit comments