Skip to content

Commit ba4cf9b

Browse files
committedAug 13, 2024
wip
1 parent aec217f commit ba4cf9b

File tree

3 files changed

+69
-12
lines changed

3 files changed

+69
-12
lines changed
 

‎src/crypto/CHIPCryptoPALPSA.h

+57-9
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ namespace Crypto {
4040
* @def CHIP_CONFIG_CRYPTO_PSA_KEY_ID_BASE
4141
*
4242
* @brief
43-
* Base of the PSA key identifier range used by Matter.
43+
* Start of the mandatory PSA key identifier range used by Matter.
4444
*
4545
* Cryptographic keys stored in the PSA Internal Trusted Storage must have
4646
* a user-assigned identifer from the range PSA_KEY_ID_USER_MIN to
@@ -56,31 +56,79 @@ namespace Crypto {
5656
#define CHIP_CONFIG_CRYPTO_PSA_KEY_ID_BASE 0x30000
5757
#endif // CHIP_CONFIG_CRYPTO_PSA_KEY_ID_BASE
5858

59-
#if CHIP_CONFIG_ENABLE_ICD_CIP
60-
static constexpr uint32_t kMaxICDClientKeys = CHIP_CONFIG_ICD_CLIENTS_SUPPORTED_PER_FABRIC * CHIP_CONFIG_MAX_FABRICS;
61-
#endif // CHIP_CONFIG_ENABLE_ICD_CIP
59+
/**
60+
* @def CHIP_CONFIG_CRYPTO_PSA_KEY_ID_OPTIONAL
61+
*
62+
* @brief
63+
* Start of the optional PSA key identifier range used by Matter.
64+
*
65+
* Optional cryptographic keys (like ICD specific key) should be defined in
66+
* a different range than the mandatory ones. This approach helps to prevent any mix-up between
67+
* keys that are always active and those that are dependent on extra configurations.
68+
* Moreover, if there's a need to activate a previously disabled range, it only necessitates the
69+
* migration of other optional key ranges.
70+
*/
71+
#ifndef CHIP_CONFIG_CRYPTO_PSA_KEY_ID_OPTIONAL
72+
#define CHIP_CONFIG_CRYPTO_PSA_KEY_ID_OPTIONAL 0x38000
73+
#endif // CHIP_CONFIG_CRYPTO_PSA_KEY_ID_OPTIONAL
74+
75+
/**
76+
* @def CHIP_CONFIG_CRYPTO_PSA_KEY_ID_END
77+
*
78+
* @brief
79+
* End of the PSA key identifier range used by Matter.
80+
*
81+
* This setting establishes the maximum limit for the key range specific to Matter, in order to
82+
* prevent any overlap with other firmware components that also employ the PSA crypto API.
83+
*/
84+
#ifndef CHIP_CONFIG_CRYPTO_PSA_KEY_ID_END
85+
#define CHIP_CONFIG_CRYPTO_PSA_KEY_ID_END 0x3FFFF
86+
#endif // CHIP_CONFIG_CRYPTO_PSA_KEY_ID_END
87+
88+
static_assert(CHIP_CONFIG_CRYPTO_PSA_KEY_ID_BASE < CHIP_CONFIG_CRYPTO_PSA_KEY_ID_OPTIONAL &&
89+
CHIP_CONFIG_CRYPTO_PSA_KEY_ID_OPTIONAL < CHIP_CONFIG_CRYPTO_PSA_KEY_ID_END,
90+
"Incorrect Matter specific PSA key range");
91+
92+
static_assert(PSA_KEY_ID_USER_MIN <= CHIP_CONFIG_CRYPTO_PSA_KEY_ID_BASE && CHIP_CONFIG_CRYPTO_PSA_KEY_ID_END <= PSA_KEY_ID_USER_MAX,
93+
"Matter specific PSA key range doesn't fit within PSA allowed range")
6294

6395
/**
64-
* @brief Defines subranges of the PSA key identifier space used by Matter.
96+
* @brief Defines mandatory subranges of the PSA key identifier space used by Matter.
6597
*/
6698
enum class KeyIdBase : psa_key_id_t
6799
{
68100
Minimum = CHIP_CONFIG_CRYPTO_PSA_KEY_ID_BASE,
69101
Operational = Minimum, ///< Base of the PSA key ID range for Node Operational Certificate private keys
70102
DACPrivKey = Operational + kMaxValidFabricIndex + 1,
103+
Maximum = DACPrivKey,
104+
};
105+
106+
static_assert(to_underlying(KeyIdBase::Minimum) >= CHIP_CONFIG_CRYPTO_PSA_KEY_ID_BASE && to_underlying(KeyIdBase::Maximum) < CHIP_CONFIG_CRYPTO_PSA_KEY_ID_OPTIONAL,
107+
"PSA key ID base out of allowed range");
108+
109+
#if CHIP_CONFIG_ENABLE_ICD_CIP
110+
static constexpr uint32_t kMaxICDClientKeys = CHIP_CONFIG_ICD_CLIENTS_SUPPORTED_PER_FABRIC * CHIP_CONFIG_MAX_FABRICS;
111+
#endif // CHIP_CONFIG_ENABLE_ICD_CIP
112+
113+
/**
114+
* @brief Defines optional subranges of the PSA key identifier space used by Matter.
115+
*/
116+
enum class KeyIdOptional : psa_key_id_t
117+
{
118+
Minimum = CHIP_CONFIG_CRYPTO_PSA_KEY_ID_OPTIONAL,
71119
#if CHIP_CONFIG_ENABLE_ICD_CIP
72-
ICDHmacKeyRangeStart = DACPrivKey + 1,
120+
ICDHmacKeyRangeStart = Minimum,
73121
ICDAesKeyRangeStart = ICDHmacKeyRangeStart + kMaxICDClientKeys,
74122
ICDKeysRangeEnd = ICDAesKeyRangeStart + kMaxICDClientKeys,
75123
#else
76124
// If Check-In Protocol is disabled, set ICDKeysRangeEnd to previous key, to allow setting next key ID to `ICDKeysRangeEnd + 1`
77-
ICDKeysRangeEnd = DACPrivKey,
125+
ICDKeysRangeEnd = Minimum,
78126
#endif // CHIP_CONFIG_ENABLE_ICD_CIP
79127
Maximum = ICDKeysRangeEnd,
80128
};
81129

82-
static_assert(to_underlying(KeyIdBase::Minimum) >= PSA_KEY_ID_USER_MIN && to_underlying(KeyIdBase::Maximum) <= PSA_KEY_ID_USER_MAX,
83-
"PSA key ID base out of allowed range");
130+
static_assert(to_underlying(KeyIdOptional::Minimum) >= CHIP_CONFIG_CRYPTO_PSA_KEY_ID_OPTIONAL && to_underlying(KeyIdOptional::Maximum) <= CHIP_CONFIG_CRYPTO_PSA_KEY_ID_END,
131+
"PSA key ID optional out of allowed range");
84132

85133
/**
86134
* @brief Finds first free persistent Key slot ID within range.

‎src/crypto/PSASessionKeystore.cpp

+4-3
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,8 @@ class KeyAttributesBase
3737

3838
CHIP_ERROR SetKeyPersistence(psa_key_id_t keyId)
3939
{
40-
VerifyOrReturnError(to_underlying(KeyIdBase::Maximum) >= keyId && keyId >= to_underlying(KeyIdBase::Minimum),
40+
VerifyOrReturnError((to_underlying(KeyIdBase::Maximum) >= keyId && keyId >= to_underlying(KeyIdBase::Minimum)) ||
41+
(to_underlying(KeyIdOptional::Maximum) >= keyId && keyId >= to_underlying(KeyIdOptional::Minimum)),
4142
CHIP_ERROR_INVALID_ARGUMENT);
4243

4344
psa_set_key_lifetime(&mAttrs, PSA_KEY_LIFETIME_PERSISTENT);
@@ -196,7 +197,7 @@ CHIP_ERROR PSASessionKeystore::PersistICDKey(Aes128KeyHandle & key)
196197
AesKeyAttributes attrs;
197198
psa_key_id_t previousKeyId = key.As<psa_key_id_t>();
198199

199-
SuccessOrExit(err = Crypto::FindFreeKeySlotInRange(key.AsMutable<psa_key_id_t>(), to_underlying(KeyIdBase::ICDAesKeyRangeStart),
200+
SuccessOrExit(err = Crypto::FindFreeKeySlotInRange(key.AsMutable<psa_key_id_t>(), to_underlying(KeyIdOptional::ICDAesKeyRangeStart),
200201
kMaxICDClientKeys));
201202

202203
SuccessOrExit(err = attrs.SetKeyPersistence(key.As<psa_key_id_t>()));
@@ -222,7 +223,7 @@ CHIP_ERROR PSASessionKeystore::PersistICDKey(Hmac128KeyHandle & key)
222223
psa_key_id_t previousKeyId = key.As<psa_key_id_t>();
223224

224225
SuccessOrExit(err = Crypto::FindFreeKeySlotInRange(key.AsMutable<psa_key_id_t>(),
225-
to_underlying(KeyIdBase::ICDHmacKeyRangeStart), kMaxICDClientKeys));
226+
to_underlying(KeyIdOptional::ICDHmacKeyRangeStart), kMaxICDClientKeys));
226227
SuccessOrExit(err = attrs.SetKeyPersistence(key.As<psa_key_id_t>()));
227228
VerifyOrExit(psa_copy_key(previousKeyId, &attrs.Get(), &key.AsMutable<psa_key_id_t>()) == PSA_SUCCESS,
228229
err = CHIP_ERROR_INTERNAL);

‎src/platform/nrfconnect/CHIPPlatformConfig.h

+8
Original file line numberDiff line numberDiff line change
@@ -59,6 +59,14 @@
5959
#define CHIP_CONFIG_CRYPTO_PSA_KEY_ID_BASE 0x30000
6060
#endif // CHIP_CONFIG_CRYPTO_PSA_KEY_ID_BASE
6161

62+
#ifndef CHIP_CONFIG_CRYPTO_PSA_KEY_ID_OPTIONAL
63+
#define CHIP_CONFIG_CRYPTO_PSA_KEY_ID_OPTIONAL 0x38000
64+
#endif // CHIP_CONFIG_CRYPTO_PSA_KEY_ID_OPTIONAL
65+
66+
#ifndef CHIP_CONFIG_CRYPTO_PSA_KEY_ID_END
67+
#define CHIP_CONFIG_CRYPTO_PSA_KEY_ID_END 0x3FFFF
68+
#endif // CHIP_CONFIG_CRYPTO_PSA_KEY_ID_END
69+
6270
// ==================== General Configuration Overrides ====================
6371

6472
#ifndef CHIP_CONFIG_MAX_UNSOLICITED_MESSAGE_HANDLERS

0 commit comments

Comments
 (0)