Skip to content

Commit 56d5a9c

Browse files
committed
Fix the way of providing data to generate factory data
Update the generation of factory data for nrfconnect platform. No more possible to provide spake2 verifier, always generated by provided passcode. Signed-off-by: Michał Szablowski <michal.szablowski@nordicsemi.no>
1 parent 1a15f4c commit 56d5a9c

File tree

3 files changed

+8
-48
lines changed

3 files changed

+8
-48
lines changed

config/nrfconnect/chip-module/generate_factory_data.cmake

-10
Original file line numberDiff line numberDiff line change
@@ -77,18 +77,13 @@ elseif(CONFIG_CHIP_FACTORY_DATA_CERT_SOURCE_USER)
7777
string(APPEND script_args "--dac_cert \"${CONFIG_CHIP_FACTORY_DATA_USER_CERTS_DAC_CERT}\"\n")
7878
string(APPEND script_args "--dac_key \"${CONFIG_CHIP_FACTORY_DATA_USER_CERTS_DAC_KEY}\"\n")
7979
string(APPEND script_args "--pai_cert \"${CONFIG_CHIP_FACTORY_DATA_USER_CERTS_PAI_CERT}\"\n")
80-
else()
81-
find_program(chip_cert_exe NAMES chip-cert REQUIRED)
82-
string(APPEND script_args "--gen_cd\n")
83-
string(APPEND script_args "--chip_cert_path ${chip_cert_exe}\n")
8480
endif()
8581

8682
# add Password-Authenticated Key Exchange parameters
8783
string(APPEND script_args "--spake2_it \"${CONFIG_CHIP_DEVICE_SPAKE2_IT}\"\n")
8884
string(APPEND script_args "--spake2_salt \"${CONFIG_CHIP_DEVICE_SPAKE2_SALT}\"\n")
8985
string(APPEND script_args "--discriminator ${CONFIG_CHIP_DEVICE_DISCRIMINATOR}\n")
9086
string(APPEND script_args "--passcode ${CONFIG_CHIP_DEVICE_SPAKE2_PASSCODE}\n")
91-
string(APPEND script_args "--include_passcode\n")
9287
string(APPEND script_args "--overwrite\n")
9388
string(APPEND script_args "--product_finish ${CONFIG_CHIP_DEVICE_PRODUCT_FINISH}\n")
9489

@@ -100,11 +95,6 @@ if(CONFIG_CHIP_FACTORY_DATA_GENERATE_ONBOARDING_CODES)
10095
string(APPEND script_args "--generate_onboarding\n")
10196
endif()
10297

103-
# check if spake2 verifier should be generated using script
104-
if(NOT CONFIG_CHIP_FACTORY_DATA_GENERATE_SPAKE2_VERIFIER)
105-
# Spake2 verifier should be provided using kConfig
106-
string(APPEND script_args "--spake2_verifier \"${CONFIG_CHIP_DEVICE_SPAKE2_TEST_VERIFIER}\"\n")
107-
endif()
10898

10999
if(CONFIG_CHIP_DEVICE_ENABLE_KEY)
110100
# Add optional EnableKey that triggers user-specific action.

scripts/tools/nrfconnect/generate_nrfconnect_chip_factory_data.py

+8-37
Original file line numberDiff line numberDiff line change
@@ -99,8 +99,6 @@ def gen_test_certs(chip_cert_exe: str,
9999
vendor_id: int,
100100
product_id: int,
101101
device_name: str,
102-
generate_cd: bool = False,
103-
cd_type: int = 1,
104102
paa_cert_path: str = None,
105103
paa_key_path: str = None):
106104
"""
@@ -115,7 +113,6 @@ def gen_test_certs(chip_cert_exe: str,
115113
vendor_id (int): an identification number specific to Vendor
116114
product_id (int): an identification number specific to Product
117115
device_name (str): human-readable device name
118-
generate_cd (bool, optional): Generate Certificate Declaration and store it in thee output directory. Defaults to False.
119116
paa_cert_path (str, optional): provide PAA certification path. Defaults to None - a path will be set to
120117
/credentials/test/attestation directory.
121118
paa_key_path (str, optional): provide PAA key path. Defaults to None - a path will be set to
@@ -127,8 +124,6 @@ def gen_test_certs(chip_cert_exe: str,
127124
"DAC_KEY": (str)<path to DAC key .der file>]
128125
"""
129126

130-
CD_PATH = MATTER_ROOT + "/credentials/test/certification-declaration/Chip-Test-CD-Signing-Cert.pem"
131-
CD_KEY_PATH = MATTER_ROOT + "/credentials/test/certification-declaration/Chip-Test-CD-Signing-Key.pem"
132127
PAA_PATH = paa_cert_path if paa_cert_path is not None else (MATTER_ROOT +
133128
"/credentials/test/attestation/Chip-Test-PAA-NoVID-Cert.pem")
134129
PAA_KEY_PATH = paa_key_path if paa_key_path is not None else (MATTER_ROOT +
@@ -138,23 +133,6 @@ def gen_test_certs(chip_cert_exe: str,
138133

139134
log.info("Generating new certificates using chip-cert...")
140135

141-
if generate_cd:
142-
# generate Certification Declaration
143-
cmd = [chip_cert_exe, "gen-cd",
144-
"--key", CD_KEY_PATH,
145-
"--cert", CD_PATH,
146-
"--out", output + "/CD.der",
147-
"--format-version", "1",
148-
"--vendor-id", hex(vendor_id),
149-
"--product-id", hex(product_id),
150-
"--device-type-id", "0",
151-
"--certificate-id", "FFFFFFFFFFFFFFFFFFF",
152-
"--security-level", "0",
153-
"--security-info", "0",
154-
"--certification-type", str(cd_type),
155-
"--version-number", "0xFFFF",
156-
]
157-
subprocess.run(cmd)
158136

159137
new_certificates = {"PAI_CERT": output + "/PAI_cert",
160138
"PAI_KEY": output + "/PAI_key",
@@ -232,8 +210,8 @@ def _validate_args(self):
232210
self._user_data = json.loads(self._args.user)
233211
except json.decoder.JSONDecodeError as e:
234212
raise AssertionError("Provided wrong user data, this is not a JSON format! {}".format(e))
235-
assert self._args.spake2_verifier or self._args.passcode, \
236-
"Cannot find Spake2+ verifier, to generate a new one please provide passcode (--passcode)"
213+
assert self._args.passcode, \
214+
"Cannot find passcode, to generate spake2 verifier. Please provide passcode (--passcode)"
237215
assert (self._args.chip_cert_path or (self._args.dac_cert and self._args.pai_cert and self._args.dac_key)), \
238216
"Cannot find paths to DAC or PAI certificates .der files. To generate a new ones please provide a path to chip-cert executable (--chip_cert_path)"
239217
assert self._args.output.endswith(".json"), \
@@ -247,11 +225,10 @@ def generate_json(self):
247225
248226
To validate generated JSON data a scheme must be provided within script's arguments.
249227
250-
- In the first part, if the rotating device id unique id has been not provided
251-
as an argument, it will be created.
252-
- If user-provided passcode and Spake2+ verifier have been not provided
253-
as an argument, it will be created using an external script
254-
- Passcode is not stored in JSON by default. To store it for debugging purposes, add --include_passcode argument.
228+
- if the rotating device id unique id has been not provided and the generate boolean
229+
has been set then rotating device id will be generated.
230+
- based on provided passcode, the spake2 verifier will be generated
231+
- Passcode is not stored in JSON.
255232
- Validating output JSON is not mandatory, but highly recommended.
256233
257234
"""
@@ -265,10 +242,10 @@ def generate_json(self):
265242
else:
266243
rd_uid = HEX_PREFIX + self._args.rd_uid
267244

268-
if not self._args.spake2_verifier:
245+
if self._args.passcode:
269246
spake_2_verifier = self._generate_spake2_verifier()
270247
else:
271-
spake_2_verifier = self._args.spake2_verifier
248+
raise RuntimeError("Provide passcode.")
272249

273250
# convert salt to bytestring to be coherent with Spake2+ verifier type
274251
spake_2_salt = self._args.spake2_salt
@@ -319,8 +296,6 @@ def generate_json(self):
319296
self._add_entry("dac_cert", self._process_der(dac_cert))
320297
self._add_entry("dac_key", dac_priv_key)
321298
self._add_entry("pai_cert", self._process_der(pai_cert))
322-
if self._args.include_passcode:
323-
self._add_entry("passcode", self._args.passcode)
324299
self._add_entry("spake2_it", self._args.spake2_it)
325300
self._add_entry("spake2_salt", spake_2_salt)
326301
self._add_entry("spake2_verifier", spake_2_verifier)
@@ -431,8 +406,6 @@ def base64_str(s): return base64.b64decode(s)
431406
help="Output path to store .json file, e.g. my_dir/output.json")
432407
parser.add_argument("-v", "--verbose", action="store_true",
433408
help="Run this script with DEBUG logging level")
434-
parser.add_argument("--include_passcode", action="store_true",
435-
help="Include passcode in factory data. By default, it is used only for generating Spake2+ verifier.")
436409
parser.add_argument("--overwrite", action="store_true",
437410
help="If output JSON file exist this argument allows to generate new factory data and overwrite it.")
438411
# Json known-keys values
@@ -497,8 +470,6 @@ def base64_str(s): return base64.b64decode(s)
497470
optional_arguments.add_argument("--passcode", type=allow_any_int,
498471
help=("[int | hex] Default PASE session passcode. "
499472
"(This is mandatory to generate Spake2+ verifier)."))
500-
optional_arguments.add_argument("--spake2_verifier", type=base64_str,
501-
help="[base64 string] Provide Spake2+ verifier without generating it.")
502473
optional_arguments.add_argument("--enable_key", type=str,
503474
help=("[hex string] [128-bit hex-encoded] The Enable Key is a 128-bit value that "
504475
"triggers manufacturer-specific action while invoking the TestEventTrigger Command."

scripts/tools/spake2p/spake2p.py

-1
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,6 @@ def generate_verifier(passcode: int, salt: bytes, iterations: int) -> bytes:
4747
w0 = int.from_bytes(ws[:WS_LENGTH], byteorder='big') % NIST256p.order
4848
w1 = int.from_bytes(ws[WS_LENGTH:], byteorder='big') % NIST256p.order
4949
L = NIST256p.generator * w1
50-
5150
return w0.to_bytes(NIST256p.baselen, byteorder='big') + L.to_bytes('uncompressed')
5251

5352

0 commit comments

Comments
 (0)