@@ -40,7 +40,7 @@ namespace Crypto {
40
40
* @def CHIP_CONFIG_CRYPTO_PSA_KEY_ID_BASE
41
41
*
42
42
* @brief
43
- * Base of the PSA key identifier range used by Matter.
43
+ * Start of the mandatory PSA key identifier range used by Matter.
44
44
*
45
45
* Cryptographic keys stored in the PSA Internal Trusted Storage must have
46
46
* a user-assigned identifer from the range PSA_KEY_ID_USER_MIN to
@@ -56,31 +56,79 @@ namespace Crypto {
56
56
#define CHIP_CONFIG_CRYPTO_PSA_KEY_ID_BASE 0x30000
57
57
#endif // CHIP_CONFIG_CRYPTO_PSA_KEY_ID_BASE
58
58
59
- #if CHIP_CONFIG_ENABLE_ICD_CIP
60
- static constexpr uint32_t kMaxICDClientKeys = CHIP_CONFIG_ICD_CLIENTS_SUPPORTED_PER_FABRIC * CHIP_CONFIG_MAX_FABRICS;
61
- #endif // CHIP_CONFIG_ENABLE_ICD_CIP
59
+ /* *
60
+ * @def CHIP_CONFIG_CRYPTO_PSA_KEY_ID_OPTIONAL
61
+ *
62
+ * @brief
63
+ * Start of the optional PSA key identifier range used by Matter.
64
+ *
65
+ * Optional cryptographic keys (like ICD specific key) should be defined in
66
+ * a different range than the mandatory ones. This approach helps to prevent any mix-up between
67
+ * keys that are always active and those that are dependent on extra configurations.
68
+ * Moreover, if there's a need to activate a previously disabled range, it only necessitates the
69
+ * migration of other optional key ranges.
70
+ */
71
+ #ifndef CHIP_CONFIG_CRYPTO_PSA_KEY_ID_OPTIONAL
72
+ #define CHIP_CONFIG_CRYPTO_PSA_KEY_ID_OPTIONAL 0x38000
73
+ #endif // CHIP_CONFIG_CRYPTO_PSA_KEY_ID_OPTIONAL
74
+
75
+ /* *
76
+ * @def CHIP_CONFIG_CRYPTO_PSA_KEY_ID_END
77
+ *
78
+ * @brief
79
+ * End of the PSA key identifier range used by Matter.
80
+ *
81
+ * This setting establishes the maximum limit for the key range specific to Matter, in order to
82
+ * prevent any overlap with other firmware components that also employ the PSA crypto API.
83
+ */
84
+ #ifndef CHIP_CONFIG_CRYPTO_PSA_KEY_ID_END
85
+ #define CHIP_CONFIG_CRYPTO_PSA_KEY_ID_END 0x3FFFF
86
+ #endif // CHIP_CONFIG_CRYPTO_PSA_KEY_ID_END
87
+
88
+ static_assert (CHIP_CONFIG_CRYPTO_PSA_KEY_ID_BASE < CHIP_CONFIG_CRYPTO_PSA_KEY_ID_OPTIONAL &&
89
+ CHIP_CONFIG_CRYPTO_PSA_KEY_ID_OPTIONAL < CHIP_CONFIG_CRYPTO_PSA_KEY_ID_END,
90
+ " Incorrect Matter specific PSA key range" );
91
+
92
+ static_assert (PSA_KEY_ID_USER_MIN <= CHIP_CONFIG_CRYPTO_PSA_KEY_ID_BASE && CHIP_CONFIG_CRYPTO_PSA_KEY_ID_END <= PSA_KEY_ID_USER_MAX,
93
+ " Matter specific PSA key range doesn't fit within PSA allowed range" )
62
94
63
95
/* *
64
- * @brief Defines subranges of the PSA key identifier space used by Matter.
96
+ * @brief Defines mandatory subranges of the PSA key identifier space used by Matter.
65
97
*/
66
98
enum class KeyIdBase : psa_key_id_t
67
99
{
68
100
Minimum = CHIP_CONFIG_CRYPTO_PSA_KEY_ID_BASE,
69
101
Operational = Minimum, // /< Base of the PSA key ID range for Node Operational Certificate private keys
70
102
DACPrivKey = Operational + kMaxValidFabricIndex + 1 ,
103
+ Maximum = DACPrivKey,
104
+ };
105
+
106
+ static_assert (to_underlying(KeyIdBase::Minimum) >= CHIP_CONFIG_CRYPTO_PSA_KEY_ID_BASE && to_underlying(KeyIdBase::Maximum) < CHIP_CONFIG_CRYPTO_PSA_KEY_ID_OPTIONAL,
107
+ " PSA key ID base out of allowed range" );
108
+
109
+ #if CHIP_CONFIG_ENABLE_ICD_CIP
110
+ static constexpr uint32_t kMaxICDClientKeys = CHIP_CONFIG_ICD_CLIENTS_SUPPORTED_PER_FABRIC * CHIP_CONFIG_MAX_FABRICS;
111
+ #endif // CHIP_CONFIG_ENABLE_ICD_CIP
112
+
113
+ /* *
114
+ * @brief Defines optional subranges of the PSA key identifier space used by Matter.
115
+ */
116
+ enum class KeyIdOptional : psa_key_id_t
117
+ {
118
+ Minimum = CHIP_CONFIG_CRYPTO_PSA_KEY_ID_OPTIONAL,
71
119
#if CHIP_CONFIG_ENABLE_ICD_CIP
72
- ICDHmacKeyRangeStart = DACPrivKey + 1 ,
120
+ ICDHmacKeyRangeStart = Minimum ,
73
121
ICDAesKeyRangeStart = ICDHmacKeyRangeStart + kMaxICDClientKeys ,
74
122
ICDKeysRangeEnd = ICDAesKeyRangeStart + kMaxICDClientKeys ,
75
123
#else
76
124
// If Check-In Protocol is disabled, set ICDKeysRangeEnd to previous key, to allow setting next key ID to `ICDKeysRangeEnd + 1`
77
- ICDKeysRangeEnd = DACPrivKey ,
125
+ ICDKeysRangeEnd = Minimum ,
78
126
#endif // CHIP_CONFIG_ENABLE_ICD_CIP
79
127
Maximum = ICDKeysRangeEnd,
80
128
};
81
129
82
- static_assert (to_underlying(KeyIdBase ::Minimum) >= PSA_KEY_ID_USER_MIN && to_underlying(KeyIdBase ::Maximum) <= PSA_KEY_ID_USER_MAX ,
83
- " PSA key ID base out of allowed range" );
130
+ static_assert (to_underlying(KeyIdOptional ::Minimum) >= CHIP_CONFIG_CRYPTO_PSA_KEY_ID_OPTIONAL && to_underlying(KeyIdOptional ::Maximum) <= CHIP_CONFIG_CRYPTO_PSA_KEY_ID_END ,
131
+ " PSA key ID optional out of allowed range" );
84
132
85
133
/* *
86
134
* @brief Finds first free persistent Key slot ID within range.
0 commit comments