@@ -33,13 +33,8 @@ CHIP_ERROR PSASpake2p_P256_SHA256_HKDF_HMAC::Init(const uint8_t * context, size_
33
33
34
34
VerifyOrReturnError (context_len <= sizeof (mContext ), CHIP_ERROR_BUFFER_TOO_SMALL);
35
35
36
- psa_pake_cipher_suite_t cs = PSA_PAKE_CIPHER_SUITE_INIT;
37
- psa_pake_cs_set_algorithm (&cs, PSA_ALG_SPAKE2P);
38
- psa_pake_cs_set_primitive (&cs, PSA_PAKE_PRIMITIVE (PSA_PAKE_PRIMITIVE_TYPE_ECC, PSA_ECC_FAMILY_SECP_R1, 256 ));
39
- psa_pake_cs_set_hash (&cs, PSA_ALG_SHA_256);
40
-
41
- psa_status_t status = psa_pake_setup (&mOperation , &cs);
42
- VerifyOrReturnError (status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
36
+ psa_pake_cs_set_algorithm (&mCipherSuite , PSA_ALG_SPAKE2P_MATTER);
37
+ psa_pake_cs_set_primitive (&mCipherSuite , PSA_PAKE_PRIMITIVE (PSA_PAKE_PRIMITIVE_TYPE_ECC, PSA_ECC_FAMILY_SECP_R1, 256 ));
43
38
44
39
memcpy (mContext , context, context_len);
45
40
mContextLen = context_len;
@@ -64,33 +59,34 @@ CHIP_ERROR PSASpake2p_P256_SHA256_HKDF_HMAC::BeginVerifier(const uint8_t * my_id
64
59
VerifyOrReturnError (w0in_len <= kSpake2p_WS_Length , CHIP_ERROR_INVALID_ARGUMENT);
65
60
VerifyOrReturnError (Lin_len == kP256_Point_Length , CHIP_ERROR_INVALID_ARGUMENT);
66
61
67
- mRole = PSA_PAKE_ROLE_SERVER;
68
- psa_status_t status = psa_pake_set_role (&mOperation , PSA_PAKE_ROLE_SERVER);
69
- VerifyOrReturnError (status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
70
-
71
- status = psa_pake_set_peer (&mOperation , peer_identity, peer_identity_len);
72
- VerifyOrReturnError (status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
73
-
74
- status = psa_pake_set_user (&mOperation , my_identity, my_identity_len);
75
- VerifyOrReturnError (status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
76
-
77
62
uint8_t password[kSpake2p_WS_Length + kP256_Point_Length ];
78
63
psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT;
79
64
80
65
memcpy (password + 0 , w0in, w0in_len);
81
66
memcpy (password + w0in_len, Lin, Lin_len);
82
67
psa_set_key_usage_flags (&attributes, PSA_KEY_USAGE_DERIVE);
83
- psa_set_key_algorithm (&attributes, PSA_ALG_SPAKE2P);
84
- psa_set_key_type (&attributes, PSA_KEY_TYPE_PASSWORD);
68
+ psa_set_key_algorithm (&attributes, PSA_ALG_SPAKE2P_MATTER);
69
+ psa_set_key_type (&attributes, PSA_KEY_TYPE_SPAKE2P_PUBLIC_KEY (PSA_ECC_FAMILY_SECP_R1));
70
+
71
+ psa_status_t status = psa_import_key (&attributes, password, w0in_len + Lin_len, &mKey );
85
72
86
- status = psa_import_key (&attributes, password, w0in_len + Lin_len, &mKey );
87
73
psa_reset_key_attributes (&attributes);
88
74
VerifyOrReturnError (status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
89
75
90
- status = psa_pake_set_password_key (&mOperation , mKey );
76
+ status = psa_pake_setup (&mOperation , mKey , & mCipherSuite );
91
77
VerifyOrReturnError (status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
92
78
93
- status = psa_pake_input (&mOperation , PSA_PAKE_STEP_CONTEXT, mContext , mContextLen );
79
+ mRole = PSA_PAKE_ROLE_SERVER;
80
+ status = psa_pake_set_role (&mOperation , PSA_PAKE_ROLE_SERVER);
81
+ VerifyOrReturnError (status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
82
+
83
+ status = psa_pake_set_peer (&mOperation , peer_identity, peer_identity_len);
84
+ VerifyOrReturnError (status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
85
+
86
+ status = psa_pake_set_user (&mOperation , my_identity, my_identity_len);
87
+ VerifyOrReturnError (status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
88
+
89
+ status = psa_pake_set_context (&mOperation , mContext , mContextLen );
94
90
VerifyOrReturnError (status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
95
91
96
92
return CHIP_NO_ERROR;
@@ -104,33 +100,34 @@ CHIP_ERROR PSASpake2p_P256_SHA256_HKDF_HMAC::BeginProver(const uint8_t * my_iden
104
100
VerifyOrReturnError (w0in_len <= kSpake2p_WS_Length , CHIP_ERROR_INVALID_ARGUMENT);
105
101
VerifyOrReturnError (w1in_len <= kSpake2p_WS_Length , CHIP_ERROR_INVALID_ARGUMENT);
106
102
107
- mRole = PSA_PAKE_ROLE_CLIENT;
108
- psa_status_t status = psa_pake_set_role (&mOperation , PSA_PAKE_ROLE_CLIENT);
109
- VerifyOrReturnError (status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
110
-
111
- status = psa_pake_set_user (&mOperation , my_identity, my_identity_len);
112
- VerifyOrReturnError (status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
113
-
114
- status = psa_pake_set_peer (&mOperation , peer_identity, peer_identity_len);
115
- VerifyOrReturnError (status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
116
-
117
103
uint8_t password[kSpake2p_WS_Length * 2 ];
118
104
psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT;
119
105
120
106
memcpy (password + 0 , w0in, w0in_len);
121
107
memcpy (password + w0in_len, w1in, w1in_len);
122
108
psa_set_key_usage_flags (&attributes, PSA_KEY_USAGE_DERIVE);
123
- psa_set_key_algorithm (&attributes, PSA_ALG_SPAKE2P);
124
- psa_set_key_type (&attributes, PSA_KEY_TYPE_PASSWORD);
109
+ psa_set_key_algorithm (&attributes, PSA_ALG_SPAKE2P_MATTER);
110
+ psa_set_key_type (&attributes, PSA_KEY_TYPE_SPAKE2P_KEY_PAIR (PSA_ECC_FAMILY_SECP_R1));
111
+
112
+ psa_status_t status = psa_import_key (&attributes, password, w0in_len + w1in_len, &mKey );
125
113
126
- status = psa_import_key (&attributes, password, w0in_len + w1in_len, &mKey );
127
114
psa_reset_key_attributes (&attributes);
128
115
VerifyOrReturnError (status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
129
116
130
- status = psa_pake_set_password_key (&mOperation , mKey );
117
+ status = psa_pake_setup (&mOperation , mKey , & mCipherSuite );
131
118
VerifyOrReturnError (status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
132
119
133
- status = psa_pake_input (&mOperation , PSA_PAKE_STEP_CONTEXT, mContext , mContextLen );
120
+ mRole = PSA_PAKE_ROLE_CLIENT;
121
+ status = psa_pake_set_role (&mOperation , PSA_PAKE_ROLE_CLIENT);
122
+ VerifyOrReturnError (status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
123
+
124
+ status = psa_pake_set_user (&mOperation , my_identity, my_identity_len);
125
+ VerifyOrReturnError (status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
126
+
127
+ status = psa_pake_set_peer (&mOperation , peer_identity, peer_identity_len);
128
+ VerifyOrReturnError (status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
129
+
130
+ status = psa_pake_set_context (&mOperation , mContext , mContextLen );
134
131
VerifyOrReturnError (status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
135
132
136
133
return CHIP_NO_ERROR;
@@ -182,29 +179,17 @@ CHIP_ERROR PSASpake2p_P256_SHA256_HKDF_HMAC::KeyConfirm(const uint8_t * in, size
182
179
183
180
CHIP_ERROR PSASpake2p_P256_SHA256_HKDF_HMAC::GetKeys (SessionKeystore & keystore, HkdfKeyHandle & key)
184
181
{
185
- /*
186
- * TODO: use psa_pake_shared_secret() proposed in https://github.com/ARM-software/psa-api/issues/86
187
- */
188
-
189
- psa_key_derivation_operation_t * kdf = Platform::New<psa_key_derivation_operation_t >();
190
- Platform::UniquePtr<psa_key_derivation_operation_t > kdfPtr (kdf);
191
-
192
- VerifyOrReturnError (kdfPtr, CHIP_ERROR_NO_MEMORY);
182
+ auto & keyId = key.AsMutable <psa_key_id_t >();
193
183
194
- *kdfPtr = PSA_KEY_DERIVATION_OPERATION_INIT ;
184
+ psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT ;
195
185
196
- psa_status_t status = psa_key_derivation_setup (kdfPtr.get (), PSA_ALG_HKDF (PSA_ALG_SHA_256));
197
- VerifyOrReturnError (status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
186
+ psa_set_key_type (&attributes, PSA_KEY_TYPE_DERIVE);
187
+ psa_set_key_usage_flags (&attributes, PSA_KEY_USAGE_DERIVE);
188
+ psa_set_key_algorithm (&attributes, PSA_ALG_HKDF (PSA_ALG_SHA_256));
198
189
199
- status = psa_pake_get_implicit_key (&mOperation , kdfPtr. get () );
190
+ psa_status_t status = psa_pake_get_shared_key (&mOperation , &attributes, &keyId );
200
191
VerifyOrReturnError (status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
201
192
202
- auto & hkdfKeyHandle = key.AsMutable <PsaHkdfKeyHandle>();
203
- hkdfKeyHandle.mKeyDerivationOp = kdfPtr.get ();
204
- hkdfKeyHandle.mIsKeyId = false ;
205
-
206
- kdfPtr.release ();
207
-
208
193
return CHIP_NO_ERROR;
209
194
}
210
195
0 commit comments