24
24
25
25
#include < psa/crypto.h>
26
26
27
+ #include < lib/support/logging/CHIPLogging.h>
28
+
27
29
namespace chip {
28
30
namespace Crypto {
29
31
@@ -33,13 +35,8 @@ CHIP_ERROR PSASpake2p_P256_SHA256_HKDF_HMAC::Init(const uint8_t * context, size_
33
35
34
36
VerifyOrReturnError (context_len <= sizeof (mContext ), CHIP_ERROR_BUFFER_TOO_SMALL);
35
37
36
- psa_pake_cipher_suite_t cs = PSA_PAKE_CIPHER_SUITE_INIT;
37
- psa_pake_cs_set_algorithm (&cs, PSA_ALG_SPAKE2P);
38
- psa_pake_cs_set_primitive (&cs, PSA_PAKE_PRIMITIVE (PSA_PAKE_PRIMITIVE_TYPE_ECC, PSA_ECC_FAMILY_SECP_R1, 256 ));
39
- psa_pake_cs_set_hash (&cs, PSA_ALG_SHA_256);
40
-
41
- psa_status_t status = psa_pake_setup (&mOperation , &cs);
42
- VerifyOrReturnError (status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
38
+ psa_pake_cs_set_algorithm (&mCipherSuite , PSA_ALG_SPAKE2P_MATTER);
39
+ psa_pake_cs_set_primitive (&mCipherSuite , PSA_PAKE_PRIMITIVE (PSA_PAKE_PRIMITIVE_TYPE_ECC, PSA_ECC_FAMILY_SECP_R1, 256 ));
43
40
44
41
memcpy (mContext , context, context_len);
45
42
mContextLen = context_len;
@@ -64,33 +61,34 @@ CHIP_ERROR PSASpake2p_P256_SHA256_HKDF_HMAC::BeginVerifier(const uint8_t * my_id
64
61
VerifyOrReturnError (w0in_len <= kSpake2p_WS_Length , CHIP_ERROR_INVALID_ARGUMENT);
65
62
VerifyOrReturnError (Lin_len == kP256_Point_Length , CHIP_ERROR_INVALID_ARGUMENT);
66
63
67
- mRole = PSA_PAKE_ROLE_SERVER;
68
- psa_status_t status = psa_pake_set_role (&mOperation , PSA_PAKE_ROLE_SERVER);
69
- VerifyOrReturnError (status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
70
-
71
- status = psa_pake_set_peer (&mOperation , peer_identity, peer_identity_len);
72
- VerifyOrReturnError (status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
73
-
74
- status = psa_pake_set_user (&mOperation , my_identity, my_identity_len);
75
- VerifyOrReturnError (status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
76
-
77
64
uint8_t password[kSpake2p_WS_Length + kP256_Point_Length ];
78
65
psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT;
79
66
80
67
memcpy (password + 0 , w0in, w0in_len);
81
68
memcpy (password + w0in_len, Lin, Lin_len);
82
69
psa_set_key_usage_flags (&attributes, PSA_KEY_USAGE_DERIVE);
83
- psa_set_key_algorithm (&attributes, PSA_ALG_SPAKE2P);
84
- psa_set_key_type (&attributes, PSA_KEY_TYPE_PASSWORD);
70
+ psa_set_key_algorithm (&attributes, PSA_ALG_SPAKE2P_MATTER);
71
+ psa_set_key_type (&attributes, PSA_KEY_TYPE_SPAKE2P_PUBLIC_KEY (PSA_ECC_FAMILY_SECP_R1));
72
+
73
+ psa_status_t status = psa_import_key (&attributes, password, w0in_len + Lin_len, &mKey );
85
74
86
- status = psa_import_key (&attributes, password, w0in_len + Lin_len, &mKey );
87
75
psa_reset_key_attributes (&attributes);
88
76
VerifyOrReturnError (status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
89
77
90
- status = psa_pake_set_password_key (&mOperation , mKey );
78
+ status = psa_pake_setup (&mOperation , mKey , &mCipherSuite );
79
+ VerifyOrReturnError (status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
80
+
81
+ mRole = PSA_PAKE_ROLE_SERVER;
82
+ status = psa_pake_set_role (&mOperation , PSA_PAKE_ROLE_SERVER);
91
83
VerifyOrReturnError (status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
92
84
93
- status = psa_pake_input (&mOperation , PSA_PAKE_STEP_CONTEXT, mContext , mContextLen );
85
+ status = psa_pake_set_peer (&mOperation , peer_identity, peer_identity_len);
86
+ VerifyOrReturnError (status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
87
+
88
+ status = psa_pake_set_user (&mOperation , my_identity, my_identity_len);
89
+ VerifyOrReturnError (status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
90
+
91
+ status = psa_pake_set_context (&mOperation , mContext , mContextLen );
94
92
VerifyOrReturnError (status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
95
93
96
94
return CHIP_NO_ERROR;
@@ -104,33 +102,34 @@ CHIP_ERROR PSASpake2p_P256_SHA256_HKDF_HMAC::BeginProver(const uint8_t * my_iden
104
102
VerifyOrReturnError (w0in_len <= kSpake2p_WS_Length , CHIP_ERROR_INVALID_ARGUMENT);
105
103
VerifyOrReturnError (w1in_len <= kSpake2p_WS_Length , CHIP_ERROR_INVALID_ARGUMENT);
106
104
107
- mRole = PSA_PAKE_ROLE_CLIENT;
108
- psa_status_t status = psa_pake_set_role (&mOperation , PSA_PAKE_ROLE_CLIENT);
109
- VerifyOrReturnError (status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
110
-
111
- status = psa_pake_set_user (&mOperation , my_identity, my_identity_len);
112
- VerifyOrReturnError (status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
113
-
114
- status = psa_pake_set_peer (&mOperation , peer_identity, peer_identity_len);
115
- VerifyOrReturnError (status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
116
-
117
105
uint8_t password[kSpake2p_WS_Length * 2 ];
118
106
psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT;
119
107
120
108
memcpy (password + 0 , w0in, w0in_len);
121
109
memcpy (password + w0in_len, w1in, w1in_len);
122
110
psa_set_key_usage_flags (&attributes, PSA_KEY_USAGE_DERIVE);
123
- psa_set_key_algorithm (&attributes, PSA_ALG_SPAKE2P);
124
- psa_set_key_type (&attributes, PSA_KEY_TYPE_PASSWORD);
111
+ psa_set_key_algorithm (&attributes, PSA_ALG_SPAKE2P_MATTER);
112
+ psa_set_key_type (&attributes, PSA_KEY_TYPE_SPAKE2P_KEY_PAIR (PSA_ECC_FAMILY_SECP_R1));
113
+
114
+ psa_status_t status = psa_import_key (&attributes, password, w0in_len + w1in_len, &mKey );
125
115
126
- status = psa_import_key (&attributes, password, w0in_len + w1in_len, &mKey );
127
116
psa_reset_key_attributes (&attributes);
128
117
VerifyOrReturnError (status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
129
118
130
- status = psa_pake_set_password_key (&mOperation , mKey );
119
+ status = psa_pake_setup (&mOperation , mKey , &mCipherSuite );
120
+ VerifyOrReturnError (status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
121
+
122
+ mRole = PSA_PAKE_ROLE_CLIENT;
123
+ status = psa_pake_set_role (&mOperation , PSA_PAKE_ROLE_CLIENT);
124
+ VerifyOrReturnError (status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
125
+
126
+ status = psa_pake_set_user (&mOperation , my_identity, my_identity_len);
127
+ VerifyOrReturnError (status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
128
+
129
+ status = psa_pake_set_peer (&mOperation , peer_identity, peer_identity_len);
131
130
VerifyOrReturnError (status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
132
131
133
- status = psa_pake_input (&mOperation , PSA_PAKE_STEP_CONTEXT , mContext , mContextLen );
132
+ status = psa_pake_set_context (&mOperation , mContext , mContextLen );
134
133
VerifyOrReturnError (status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
135
134
136
135
return CHIP_NO_ERROR;
@@ -182,29 +181,17 @@ CHIP_ERROR PSASpake2p_P256_SHA256_HKDF_HMAC::KeyConfirm(const uint8_t * in, size
182
181
183
182
CHIP_ERROR PSASpake2p_P256_SHA256_HKDF_HMAC::GetKeys (SessionKeystore & keystore, HkdfKeyHandle & key)
184
183
{
185
- /*
186
- * TODO: use psa_pake_shared_secret() proposed in https://github.com/ARM-software/psa-api/issues/86
187
- */
188
-
189
- psa_key_derivation_operation_t * kdf = Platform::New<psa_key_derivation_operation_t >();
190
- Platform::UniquePtr<psa_key_derivation_operation_t > kdfPtr (kdf);
191
-
192
- VerifyOrReturnError (kdfPtr, CHIP_ERROR_NO_MEMORY);
184
+ auto & keyId = key.AsMutable <psa_key_id_t >();
193
185
194
- *kdfPtr = PSA_KEY_DERIVATION_OPERATION_INIT ;
186
+ psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT ;
195
187
196
- psa_status_t status = psa_key_derivation_setup (kdfPtr.get (), PSA_ALG_HKDF (PSA_ALG_SHA_256));
197
- VerifyOrReturnError (status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
188
+ psa_set_key_type (&attributes, PSA_KEY_TYPE_DERIVE);
189
+ psa_set_key_usage_flags (&attributes, PSA_KEY_USAGE_DERIVE);
190
+ psa_set_key_algorithm (&attributes, PSA_ALG_HKDF (PSA_ALG_SHA_256));
198
191
199
- status = psa_pake_get_implicit_key (&mOperation , kdfPtr. get () );
192
+ psa_status_t status = psa_pake_get_shared_key (&mOperation , &attributes, &keyId );
200
193
VerifyOrReturnError (status == PSA_SUCCESS, CHIP_ERROR_INTERNAL);
201
194
202
- auto & hkdfKeyHandle = key.AsMutable <PsaHkdfKeyHandle>();
203
- hkdfKeyHandle.mKeyDerivationOp = kdfPtr.get ();
204
- hkdfKeyHandle.mIsKeyId = false ;
205
-
206
- kdfPtr.release ();
207
-
208
195
return CHIP_NO_ERROR;
209
196
}
210
197
0 commit comments