@@ -99,8 +99,6 @@ def gen_test_certs(chip_cert_exe: str,
99
99
vendor_id : int ,
100
100
product_id : int ,
101
101
device_name : str ,
102
- generate_cd : bool = False ,
103
- cd_type : int = 1 ,
104
102
paa_cert_path : str = None ,
105
103
paa_key_path : str = None ):
106
104
"""
@@ -115,7 +113,6 @@ def gen_test_certs(chip_cert_exe: str,
115
113
vendor_id (int): an identification number specific to Vendor
116
114
product_id (int): an identification number specific to Product
117
115
device_name (str): human-readable device name
118
- generate_cd (bool, optional): Generate Certificate Declaration and store it in thee output directory. Defaults to False.
119
116
paa_cert_path (str, optional): provide PAA certification path. Defaults to None - a path will be set to
120
117
/credentials/test/attestation directory.
121
118
paa_key_path (str, optional): provide PAA key path. Defaults to None - a path will be set to
@@ -127,8 +124,6 @@ def gen_test_certs(chip_cert_exe: str,
127
124
"DAC_KEY": (str)<path to DAC key .der file>]
128
125
"""
129
126
130
- CD_PATH = MATTER_ROOT + "/credentials/test/certification-declaration/Chip-Test-CD-Signing-Cert.pem"
131
- CD_KEY_PATH = MATTER_ROOT + "/credentials/test/certification-declaration/Chip-Test-CD-Signing-Key.pem"
132
127
PAA_PATH = paa_cert_path if paa_cert_path is not None else (MATTER_ROOT +
133
128
"/credentials/test/attestation/Chip-Test-PAA-NoVID-Cert.pem" )
134
129
PAA_KEY_PATH = paa_key_path if paa_key_path is not None else (MATTER_ROOT +
@@ -138,23 +133,6 @@ def gen_test_certs(chip_cert_exe: str,
138
133
139
134
log .info ("Generating new certificates using chip-cert..." )
140
135
141
- if generate_cd :
142
- # generate Certification Declaration
143
- cmd = [chip_cert_exe , "gen-cd" ,
144
- "--key" , CD_KEY_PATH ,
145
- "--cert" , CD_PATH ,
146
- "--out" , output + "/CD.der" ,
147
- "--format-version" , "1" ,
148
- "--vendor-id" , hex (vendor_id ),
149
- "--product-id" , hex (product_id ),
150
- "--device-type-id" , "0" ,
151
- "--certificate-id" , "FFFFFFFFFFFFFFFFFFF" ,
152
- "--security-level" , "0" ,
153
- "--security-info" , "0" ,
154
- "--certification-type" , str (cd_type ),
155
- "--version-number" , "0xFFFF" ,
156
- ]
157
- subprocess .run (cmd )
158
136
159
137
new_certificates = {"PAI_CERT" : output + "/PAI_cert" ,
160
138
"PAI_KEY" : output + "/PAI_key" ,
@@ -232,8 +210,8 @@ def _validate_args(self):
232
210
self ._user_data = json .loads (self ._args .user )
233
211
except json .decoder .JSONDecodeError as e :
234
212
raise AssertionError ("Provided wrong user data, this is not a JSON format! {}" .format (e ))
235
- assert self ._args .spake2_verifier or self . _args . passcode , \
236
- "Cannot find Spake2+ verifier , to generate a new one please provide passcode (--passcode)"
213
+ assert self ._args .passcode , \
214
+ "Cannot find passcode , to generate spake2 verifier. Please provide passcode (--passcode)"
237
215
assert (self ._args .chip_cert_path or (self ._args .dac_cert and self ._args .pai_cert and self ._args .dac_key )), \
238
216
"Cannot find paths to DAC or PAI certificates .der files. To generate a new ones please provide a path to chip-cert executable (--chip_cert_path)"
239
217
assert self ._args .output .endswith (".json" ), \
@@ -247,11 +225,10 @@ def generate_json(self):
247
225
248
226
To validate generated JSON data a scheme must be provided within script's arguments.
249
227
250
- - In the first part, if the rotating device id unique id has been not provided
251
- as an argument, it will be created.
252
- - If user-provided passcode and Spake2+ verifier have been not provided
253
- as an argument, it will be created using an external script
254
- - Passcode is not stored in JSON by default. To store it for debugging purposes, add --include_passcode argument.
228
+ - if the rotating device id unique id has been not provided and the generate boolean
229
+ has been set then rotating device id will be generated.
230
+ - based on provided passcode, the spake2 verifier will be generated
231
+ - Passcode is not stored in JSON.
255
232
- Validating output JSON is not mandatory, but highly recommended.
256
233
257
234
"""
@@ -265,10 +242,10 @@ def generate_json(self):
265
242
else :
266
243
rd_uid = HEX_PREFIX + self ._args .rd_uid
267
244
268
- if not self ._args .spake2_verifier :
245
+ if self ._args .passcode :
269
246
spake_2_verifier = self ._generate_spake2_verifier ()
270
247
else :
271
- spake_2_verifier = self . _args . spake2_verifier
248
+ raise RuntimeError ( "Provide passcode." )
272
249
273
250
# convert salt to bytestring to be coherent with Spake2+ verifier type
274
251
spake_2_salt = self ._args .spake2_salt
@@ -319,8 +296,6 @@ def generate_json(self):
319
296
self ._add_entry ("dac_cert" , self ._process_der (dac_cert ))
320
297
self ._add_entry ("dac_key" , dac_priv_key )
321
298
self ._add_entry ("pai_cert" , self ._process_der (pai_cert ))
322
- if self ._args .include_passcode :
323
- self ._add_entry ("passcode" , self ._args .passcode )
324
299
self ._add_entry ("spake2_it" , self ._args .spake2_it )
325
300
self ._add_entry ("spake2_salt" , spake_2_salt )
326
301
self ._add_entry ("spake2_verifier" , spake_2_verifier )
@@ -431,8 +406,6 @@ def base64_str(s): return base64.b64decode(s)
431
406
help = "Output path to store .json file, e.g. my_dir/output.json" )
432
407
parser .add_argument ("-v" , "--verbose" , action = "store_true" ,
433
408
help = "Run this script with DEBUG logging level" )
434
- parser .add_argument ("--include_passcode" , action = "store_true" ,
435
- help = "Include passcode in factory data. By default, it is used only for generating Spake2+ verifier." )
436
409
parser .add_argument ("--overwrite" , action = "store_true" ,
437
410
help = "If output JSON file exist this argument allows to generate new factory data and overwrite it." )
438
411
# Json known-keys values
@@ -497,8 +470,6 @@ def base64_str(s): return base64.b64decode(s)
497
470
optional_arguments .add_argument ("--passcode" , type = allow_any_int ,
498
471
help = ("[int | hex] Default PASE session passcode. "
499
472
"(This is mandatory to generate Spake2+ verifier)." ))
500
- optional_arguments .add_argument ("--spake2_verifier" , type = base64_str ,
501
- help = "[base64 string] Provide Spake2+ verifier without generating it." )
502
473
optional_arguments .add_argument ("--enable_key" , type = str ,
503
474
help = ("[hex string] [128-bit hex-encoded] The Enable Key is a 128-bit value that "
504
475
"triggers manufacturer-specific action while invoking the TestEventTrigger Command."
0 commit comments