Skip to content

Commit 012eddc

Browse files
[nrf noup] Spake2+ alignments regarding the newest Oberon version
Aligned Spake2+ algorithm to the Oberon PSA core v1.2.1.1
1 parent e3dd453 commit 012eddc

File tree

7 files changed

+63
-122
lines changed

7 files changed

+63
-122
lines changed

config/nrfconnect/chip-module/Kconfig.defaults

+1-6
Original file line numberDiff line numberDiff line change
@@ -297,9 +297,7 @@ config MBEDTLS_HEAP_SIZE
297297

298298
config CHIP_CRYPTO_PSA
299299
default y if !CHIP_WIFI
300-
imply PSA_WANT_ALG_SPAKE2P
301-
# Set SPAKE2P to version 4 to be compatible with Matter specification.
302-
imply PSA_CRYPTO_SPAKE2P_USE_VERSION_04
300+
imply PSA_WANT_ALG_SPAKE2P_MATTER
303301

304302
if CHIP_CRYPTO_PSA
305303

@@ -309,9 +307,6 @@ config PSA_CRYPTO_DRIVER_CC3XX
309307
config PSA_WANT_ALG_SHA_224
310308
default n
311309

312-
config PSA_WANT_ALG_SPAKE2P
313-
default y
314-
315310
# Extend the maximum number of PSA key slots to fit Matter requirements
316311
config MBEDTLS_PSA_KEY_SLOT_COUNT
317312
default 64

src/crypto/CHIPCryptoPALPSA.cpp

+14-33
Original file line numberDiff line numberDiff line change
@@ -284,58 +284,39 @@ CHIP_ERROR PsaKdf::Init(const ByteSpan & secret, const ByteSpan & salt, const By
284284
psa_reset_key_attributes(&attrs);
285285
VerifyOrReturnError(status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
286286

287-
PsaHkdfKeyHandle hkdfKeyHandle = { .mKeyId = mSecretKeyId, .mIsKeyId = true };
288-
289-
return InitOperation(hkdfKeyHandle, salt, info);
287+
return InitOperation(mSecretKeyId, salt, info);
290288
}
291289

292290
CHIP_ERROR PsaKdf::Init(const HkdfKeyHandle & hkdfKey, const ByteSpan & salt, const ByteSpan & info)
293291
{
294-
return InitOperation(hkdfKey.As<PsaHkdfKeyHandle>(), salt, info);
292+
return InitOperation(hkdfKey.As<psa_key_id_t>(), salt, info);
295293
}
296294

297-
CHIP_ERROR PsaKdf::InitOperation(PsaHkdfKeyHandle hkdfKey, const ByteSpan & salt, const ByteSpan & info)
295+
CHIP_ERROR PsaKdf::InitOperation(psa_key_id_t hkdfKey, const ByteSpan & salt, const ByteSpan & info)
298296
{
299297
psa_status_t status;
300-
if (hkdfKey.mIsKeyId)
301-
{
302-
status = psa_key_derivation_setup(&mOperation, PSA_ALG_HKDF(PSA_ALG_SHA_256));
303-
VerifyOrReturnError(status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
304298

305-
if (salt.size() > 0)
306-
{
307-
status = psa_key_derivation_input_bytes(&mOperation, PSA_KEY_DERIVATION_INPUT_SALT, salt.data(), salt.size());
308-
VerifyOrReturnError(status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
309-
}
310-
311-
status = psa_key_derivation_input_key(&mOperation, PSA_KEY_DERIVATION_INPUT_SECRET, hkdfKey.mKeyId);
312-
VerifyOrReturnError(status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
299+
status = psa_key_derivation_setup(&mOperation, PSA_ALG_HKDF(PSA_ALG_SHA_256));
300+
VerifyOrReturnError(status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
313301

314-
status = psa_key_derivation_input_bytes(&mOperation, PSA_KEY_DERIVATION_INPUT_INFO, info.data(), info.size());
302+
if (salt.size() > 0)
303+
{
304+
status = psa_key_derivation_input_bytes(&mOperation, PSA_KEY_DERIVATION_INPUT_SALT, salt.data(), salt.size());
315305
VerifyOrReturnError(status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
316-
317-
mDerivationOperation = &mOperation;
318306
}
319-
else
320-
{
321-
mDerivationOperation = hkdfKey.mKeyDerivationOp;
322307

323-
if (salt.size() > 0)
324-
{
325-
status = psa_key_derivation_input_bytes(mDerivationOperation, PSA_KEY_DERIVATION_INPUT_SALT, salt.data(), salt.size());
326-
VerifyOrReturnError(status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
327-
}
308+
status = psa_key_derivation_input_key(&mOperation, PSA_KEY_DERIVATION_INPUT_SECRET, hkdfKey);
309+
VerifyOrReturnError(status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
328310

329-
status = psa_key_derivation_input_bytes(mDerivationOperation, PSA_KEY_DERIVATION_INPUT_INFO, info.data(), info.size());
330-
VerifyOrReturnError(status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
331-
}
311+
status = psa_key_derivation_input_bytes(&mOperation, PSA_KEY_DERIVATION_INPUT_INFO, info.data(), info.size());
312+
VerifyOrReturnError(status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
332313

333314
return CHIP_NO_ERROR;
334315
}
335316

336317
CHIP_ERROR PsaKdf::DeriveBytes(const MutableByteSpan & output)
337318
{
338-
psa_status_t status = psa_key_derivation_output_bytes(mDerivationOperation, output.data(), output.size());
319+
psa_status_t status = psa_key_derivation_output_bytes(&mOperation, output.data(), output.size());
339320

340321
VerifyOrReturnError(status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
341322

@@ -344,7 +325,7 @@ CHIP_ERROR PsaKdf::DeriveBytes(const MutableByteSpan & output)
344325

345326
CHIP_ERROR PsaKdf::DeriveKey(const psa_key_attributes_t & attributes, psa_key_id_t & keyId)
346327
{
347-
psa_status_t status = psa_key_derivation_output_key(&attributes, mDerivationOperation, &keyId);
328+
psa_status_t status = psa_key_derivation_output_key(&attributes, &mOperation, &keyId);
348329

349330
VerifyOrReturnError(status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
350331

src/crypto/CHIPCryptoPALPSA.h

+3-15
Original file line numberDiff line numberDiff line change
@@ -95,17 +95,6 @@ inline const PsaP256KeypairContext & ToConstPsaContext(const P256KeypairContext
9595
return *SafePointerCast<const PsaP256KeypairContext *>(&context);
9696
}
9797

98-
struct PsaHkdfKeyHandle
99-
{
100-
union
101-
{
102-
psa_key_id_t mKeyId;
103-
psa_key_derivation_operation_t * mKeyDerivationOp;
104-
};
105-
106-
bool mIsKeyId = true;
107-
};
108-
10998
/**
11099
* @brief Wrapper for PSA key derivation API.
111100
*/
@@ -156,11 +145,10 @@ class PsaKdf
156145
CHIP_ERROR DeriveKey(const psa_key_attributes_t & attributes, psa_key_id_t & keyId);
157146

158147
private:
159-
CHIP_ERROR InitOperation(PsaHkdfKeyHandle hkdfKey, const ByteSpan & salt, const ByteSpan & info);
148+
CHIP_ERROR InitOperation(psa_key_id_t hkdfKey, const ByteSpan & salt, const ByteSpan & info);
160149

161-
psa_key_id_t mSecretKeyId = PSA_KEY_ID_NULL;
162-
psa_key_derivation_operation_t mOperation = PSA_KEY_DERIVATION_OPERATION_INIT;
163-
psa_key_derivation_operation_t * mDerivationOperation = nullptr;
150+
psa_key_id_t mSecretKeyId = PSA_KEY_ID_NULL;
151+
psa_key_derivation_operation_t mOperation = PSA_KEY_DERIVATION_OPERATION_INIT;
164152
};
165153
} // namespace Crypto
166154
} // namespace chip

src/crypto/PSASessionKeystore.cpp

+3-11
Original file line numberDiff line numberDiff line change
@@ -186,18 +186,10 @@ void PSASessionKeystore::DestroyKey(Symmetric128BitsKeyHandle & key)
186186

187187
void PSASessionKeystore::DestroyKey(HkdfKeyHandle & key)
188188
{
189-
auto & keyHandle = key.AsMutable<PsaHkdfKeyHandle>();
189+
auto & keyId = key.AsMutable<psa_key_id_t>();
190190

191-
if (keyHandle.mIsKeyId)
192-
{
193-
psa_destroy_key(keyHandle.mKeyId);
194-
keyHandle.mKeyId = 0;
195-
}
196-
else
197-
{
198-
Platform::Delete(keyHandle.mKeyDerivationOp);
199-
keyHandle.mKeyDerivationOp = nullptr;
200-
}
191+
psa_destroy_key(keyId);
192+
keyId = PSA_KEY_ID_NULL;
201193
}
202194

203195
} // namespace Crypto

src/crypto/PSASpake2p.cpp

+40-55
Original file line numberDiff line numberDiff line change
@@ -33,13 +33,8 @@ CHIP_ERROR PSASpake2p_P256_SHA256_HKDF_HMAC::Init(const uint8_t * context, size_
3333

3434
VerifyOrReturnError(context_len <= sizeof(mContext), CHIP_ERROR_BUFFER_TOO_SMALL);
3535

36-
psa_pake_cipher_suite_t cs = PSA_PAKE_CIPHER_SUITE_INIT;
37-
psa_pake_cs_set_algorithm(&cs, PSA_ALG_SPAKE2P);
38-
psa_pake_cs_set_primitive(&cs, PSA_PAKE_PRIMITIVE(PSA_PAKE_PRIMITIVE_TYPE_ECC, PSA_ECC_FAMILY_SECP_R1, 256));
39-
psa_pake_cs_set_hash(&cs, PSA_ALG_SHA_256);
40-
41-
psa_status_t status = psa_pake_setup(&mOperation, &cs);
42-
VerifyOrReturnError(status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
36+
psa_pake_cs_set_algorithm(&mCipherSuite, PSA_ALG_SPAKE2P_MATTER);
37+
psa_pake_cs_set_primitive(&mCipherSuite, PSA_PAKE_PRIMITIVE(PSA_PAKE_PRIMITIVE_TYPE_ECC, PSA_ECC_FAMILY_SECP_R1, 256));
4338

4439
memcpy(mContext, context, context_len);
4540
mContextLen = context_len;
@@ -64,33 +59,34 @@ CHIP_ERROR PSASpake2p_P256_SHA256_HKDF_HMAC::BeginVerifier(const uint8_t * my_id
6459
VerifyOrReturnError(w0in_len <= kSpake2p_WS_Length, CHIP_ERROR_INVALID_ARGUMENT);
6560
VerifyOrReturnError(Lin_len == kP256_Point_Length, CHIP_ERROR_INVALID_ARGUMENT);
6661

67-
mRole = PSA_PAKE_ROLE_SERVER;
68-
psa_status_t status = psa_pake_set_role(&mOperation, PSA_PAKE_ROLE_SERVER);
69-
VerifyOrReturnError(status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
70-
71-
status = psa_pake_set_peer(&mOperation, peer_identity, peer_identity_len);
72-
VerifyOrReturnError(status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
73-
74-
status = psa_pake_set_user(&mOperation, my_identity, my_identity_len);
75-
VerifyOrReturnError(status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
76-
7762
uint8_t password[kSpake2p_WS_Length + kP256_Point_Length];
7863
psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT;
7964

8065
memcpy(password + 0, w0in, w0in_len);
8166
memcpy(password + w0in_len, Lin, Lin_len);
8267
psa_set_key_usage_flags(&attributes, PSA_KEY_USAGE_DERIVE);
83-
psa_set_key_algorithm(&attributes, PSA_ALG_SPAKE2P);
84-
psa_set_key_type(&attributes, PSA_KEY_TYPE_PASSWORD);
68+
psa_set_key_algorithm(&attributes, PSA_ALG_SPAKE2P_MATTER);
69+
psa_set_key_type(&attributes, PSA_KEY_TYPE_SPAKE2P_PUBLIC_KEY(PSA_ECC_FAMILY_SECP_R1));
70+
71+
psa_status_t status = psa_import_key(&attributes, password, w0in_len + Lin_len, &mKey);
8572

86-
status = psa_import_key(&attributes, password, w0in_len + Lin_len, &mKey);
8773
psa_reset_key_attributes(&attributes);
8874
VerifyOrReturnError(status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
8975

90-
status = psa_pake_set_password_key(&mOperation, mKey);
76+
status = psa_pake_setup(&mOperation, mKey, &mCipherSuite);
9177
VerifyOrReturnError(status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
9278

93-
status = psa_pake_input(&mOperation, PSA_PAKE_STEP_CONTEXT, mContext, mContextLen);
79+
mRole = PSA_PAKE_ROLE_SERVER;
80+
status = psa_pake_set_role(&mOperation, PSA_PAKE_ROLE_SERVER);
81+
VerifyOrReturnError(status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
82+
83+
status = psa_pake_set_peer(&mOperation, peer_identity, peer_identity_len);
84+
VerifyOrReturnError(status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
85+
86+
status = psa_pake_set_user(&mOperation, my_identity, my_identity_len);
87+
VerifyOrReturnError(status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
88+
89+
status = psa_pake_set_context(&mOperation, mContext, mContextLen);
9490
VerifyOrReturnError(status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
9591

9692
return CHIP_NO_ERROR;
@@ -104,33 +100,34 @@ CHIP_ERROR PSASpake2p_P256_SHA256_HKDF_HMAC::BeginProver(const uint8_t * my_iden
104100
VerifyOrReturnError(w0in_len <= kSpake2p_WS_Length, CHIP_ERROR_INVALID_ARGUMENT);
105101
VerifyOrReturnError(w1in_len <= kSpake2p_WS_Length, CHIP_ERROR_INVALID_ARGUMENT);
106102

107-
mRole = PSA_PAKE_ROLE_CLIENT;
108-
psa_status_t status = psa_pake_set_role(&mOperation, PSA_PAKE_ROLE_CLIENT);
109-
VerifyOrReturnError(status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
110-
111-
status = psa_pake_set_user(&mOperation, my_identity, my_identity_len);
112-
VerifyOrReturnError(status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
113-
114-
status = psa_pake_set_peer(&mOperation, peer_identity, peer_identity_len);
115-
VerifyOrReturnError(status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
116-
117103
uint8_t password[kSpake2p_WS_Length * 2];
118104
psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT;
119105

120106
memcpy(password + 0, w0in, w0in_len);
121107
memcpy(password + w0in_len, w1in, w1in_len);
122108
psa_set_key_usage_flags(&attributes, PSA_KEY_USAGE_DERIVE);
123-
psa_set_key_algorithm(&attributes, PSA_ALG_SPAKE2P);
124-
psa_set_key_type(&attributes, PSA_KEY_TYPE_PASSWORD);
109+
psa_set_key_algorithm(&attributes, PSA_ALG_SPAKE2P_MATTER);
110+
psa_set_key_type(&attributes, PSA_KEY_TYPE_SPAKE2P_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1));
111+
112+
psa_status_t status = psa_import_key(&attributes, password, w0in_len + w1in_len, &mKey);
125113

126-
status = psa_import_key(&attributes, password, w0in_len + w1in_len, &mKey);
127114
psa_reset_key_attributes(&attributes);
128115
VerifyOrReturnError(status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
129116

130-
status = psa_pake_set_password_key(&mOperation, mKey);
117+
status = psa_pake_setup(&mOperation, mKey, &mCipherSuite);
131118
VerifyOrReturnError(status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
132119

133-
status = psa_pake_input(&mOperation, PSA_PAKE_STEP_CONTEXT, mContext, mContextLen);
120+
mRole = PSA_PAKE_ROLE_CLIENT;
121+
status = psa_pake_set_role(&mOperation, PSA_PAKE_ROLE_CLIENT);
122+
VerifyOrReturnError(status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
123+
124+
status = psa_pake_set_user(&mOperation, my_identity, my_identity_len);
125+
VerifyOrReturnError(status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
126+
127+
status = psa_pake_set_peer(&mOperation, peer_identity, peer_identity_len);
128+
VerifyOrReturnError(status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
129+
130+
status = psa_pake_set_context(&mOperation, mContext, mContextLen);
134131
VerifyOrReturnError(status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
135132

136133
return CHIP_NO_ERROR;
@@ -182,29 +179,17 @@ CHIP_ERROR PSASpake2p_P256_SHA256_HKDF_HMAC::KeyConfirm(const uint8_t * in, size
182179

183180
CHIP_ERROR PSASpake2p_P256_SHA256_HKDF_HMAC::GetKeys(SessionKeystore & keystore, HkdfKeyHandle & key)
184181
{
185-
/*
186-
* TODO: use psa_pake_shared_secret() proposed in https://github.com/ARM-software/psa-api/issues/86
187-
*/
188-
189-
psa_key_derivation_operation_t * kdf = Platform::New<psa_key_derivation_operation_t>();
190-
Platform::UniquePtr<psa_key_derivation_operation_t> kdfPtr(kdf);
191-
192-
VerifyOrReturnError(kdfPtr, CHIP_ERROR_NO_MEMORY);
182+
auto & keyId = key.AsMutable<psa_key_id_t>();
193183

194-
*kdfPtr = PSA_KEY_DERIVATION_OPERATION_INIT;
184+
psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT;
195185

196-
psa_status_t status = psa_key_derivation_setup(kdfPtr.get(), PSA_ALG_HKDF(PSA_ALG_SHA_256));
197-
VerifyOrReturnError(status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
186+
psa_set_key_type(&attributes, PSA_KEY_TYPE_DERIVE);
187+
psa_set_key_usage_flags(&attributes, PSA_KEY_USAGE_DERIVE);
188+
psa_set_key_algorithm(&attributes, PSA_ALG_HKDF(PSA_ALG_SHA_256));
198189

199-
status = psa_pake_get_implicit_key(&mOperation, kdfPtr.get());
190+
psa_status_t status = psa_pake_get_shared_key(&mOperation, &attributes, &keyId);
200191
VerifyOrReturnError(status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
201192

202-
auto & hkdfKeyHandle = key.AsMutable<PsaHkdfKeyHandle>();
203-
hkdfKeyHandle.mKeyDerivationOp = kdfPtr.get();
204-
hkdfKeyHandle.mIsKeyId = false;
205-
206-
kdfPtr.release();
207-
208193
return CHIP_NO_ERROR;
209194
}
210195

src/crypto/PSASpake2p.h

+1
Original file line numberDiff line numberDiff line change
@@ -155,6 +155,7 @@ class PSASpake2p_P256_SHA256_HKDF_HMAC
155155
CHIP_ERROR GetKeys(SessionKeystore & keystore, HkdfKeyHandle & key);
156156

157157
private:
158+
psa_pake_cipher_suite_t mCipherSuite = PSA_PAKE_CIPHER_SUITE_INIT;
158159
psa_pake_operation_t mOperation = PSA_PAKE_OPERATION_INIT;
159160
psa_key_id_t mKey = PSA_KEY_ID_NULL;
160161

src/platform/nrfconnect/CHIPPlatformConfig.h

+1-2
Original file line numberDiff line numberDiff line change
@@ -40,8 +40,7 @@
4040

4141
#ifdef CONFIG_CHIP_CRYPTO_PSA
4242
#define CHIP_CONFIG_SHA256_CONTEXT_SIZE sizeof(psa_hash_operation_t)
43-
// Alignment to sizeof(PsaHkdfKeyHandle) from crypto/CHIPCryptoPALPSA.h.
44-
#define CHIP_CONFIG_HKDF_KEY_HANDLE_CONTEXT_SIZE (sizeof(psa_key_id_t) + sizeof(bool))
43+
#define CHIP_CONFIG_HKDF_KEY_HANDLE_CONTEXT_SIZE sizeof(psa_key_id_t)
4544
#elif defined(CONFIG_CC3XX_BACKEND)
4645
// Size of the statically allocated context for SHA256 operations in CryptoPAL
4746
// determined empirically.

0 commit comments

Comments
 (0)