| /* |
| * Copyright (c) 2023 Project CHIP Authors |
| * All rights reserved. |
| * |
| * Licensed under the Apache License, Version 2.0 (the "License"); |
| * you may not use this file except in compliance with the License. |
| * You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| |
| #pragma once |
| |
| #include <crypto/CHIPCryptoPAL.h> |
| #include <lib/support/Span.h> |
| |
| namespace chip { |
| namespace Crypto { |
| |
| /** |
| * @brief Interface for deriving session keys and managing their lifetime. |
| * |
| * The session keystore interface provides an abstraction that allows the application to store |
| * session keys in a secure environment. It uses the concept of key handles that isolate the |
| * application from the actual key material. |
| * |
| * @note Refactor has begun to refactor this API into two disctinct APIs : SymmetrycKeyStore & SessionKeyDerivation |
| * Work has not been completed so the SessionKeystore has APIs that shouldn't go together for the time being |
| * The SessionKeystore APIs are split into two sections, one for each futur API. |
| */ |
| class SessionKeystore |
| { |
| public: |
| virtual ~SessionKeystore() {} |
| |
| /**************************** |
| * SymmetricKeyStore APIs |
| *****************************/ |
| |
| /** |
| * @brief Import raw key material and return a key handle for a key that be used to do AES 128 encryption. |
| * |
| * @note This method should only be used when using the raw key material in the Matter stack |
| * cannot be avoided. Ideally, crypto interfaces should allow platforms to perform all the |
| * cryptographic operations in a secure environment. |
| * |
| * If the method returns no error, the application is responsible for destroying the handle |
| * using the DestroyKey() method when the key is no longer needed. |
| */ |
| virtual CHIP_ERROR CreateKey(const Symmetric128BitsKeyByteArray & keyMaterial, Aes128KeyHandle & key) = 0; |
| |
| /** |
| * @brief Import raw key material and return a key handle for a key that can be used to do 128-bit HMAC. |
| * |
| * @note This method should only be used when using the raw key material in the Matter stack |
| * cannot be avoided. Ideally, crypto interfaces should allow platforms to perform all the |
| * cryptographic operations in a secure environment. |
| * |
| * If the method returns no error, the application is responsible for destroying the handle |
| * using the DestroyKey() method when the key is no longer needed. |
| */ |
| virtual CHIP_ERROR CreateKey(const Symmetric128BitsKeyByteArray & keyMaterial, Hmac128KeyHandle & key) = 0; |
| |
| /** |
| * @brief Import raw key material and return a key handle for an HKDF key. |
| * |
| * @note This method should only be used when using the raw key material in the Matter stack |
| * cannot be avoided. Ideally, crypto interfaces should allow platforms to perform all the |
| * cryptographic operations in a secure environment. |
| * |
| * If the method returns no error, the application is responsible for destroying the handle |
| * using the DestroyKey() method when the key is no longer needed. |
| */ |
| virtual CHIP_ERROR CreateKey(const ByteSpan & keyMaterial, HkdfKeyHandle & key) = 0; |
| |
| /** |
| * @brief Destroy key. |
| * |
| * The method can take an uninitialized handle in which case it is a no-op. |
| * As a result of calling this method, the handle is put in the uninitialized state. |
| */ |
| virtual void DestroyKey(Symmetric128BitsKeyHandle & key) = 0; |
| |
| /** |
| * @brief Destroy key. |
| * |
| * The method can take an uninitialized handle in which case it is a no-op. |
| * As a result of calling this method, the handle is put in the uninitialized state. |
| */ |
| virtual void DestroyKey(HkdfKeyHandle & key) = 0; |
| |
| /**************************** |
| * SessionKeyDerivation APIs |
| *****************************/ |
| |
| /** |
| * @brief Derive key from a session establishment's `SharedSecret`. |
| * |
| * Use `Crypto_KDF` (HKDF) primitive as defined in the Matter specification to derive |
| * a symmetric (AES) key from the session establishment's `SharedSecret`. |
| * |
| * If the method returns no error, the caller is responsible for destroying the symmetric key |
| * using the DestroyKey() method when the key is no longer needed. |
| */ |
| virtual CHIP_ERROR DeriveKey(const P256ECDHDerivedSecret & secret, const ByteSpan & salt, const ByteSpan & info, |
| Aes128KeyHandle & key) = 0; |
| |
| /** |
| * @brief Derive session keys from a session establishment's `SharedSecret`. |
| * |
| * Use `Crypto_KDF` (HKDF) primitive as defined in the Matter specification to derive symmetric |
| * (AES) session keys for both directions, and the attestation challenge from the session |
| * establishment's `SharedSecret`. |
| * |
| * If the method returns no error, the caller is responsible for destroying the symmetric keys |
| * using the DestroyKey() method when the keys are no longer needed. On failure, the method is |
| * responsible for releasing all keys that it allocated so far. |
| */ |
| virtual CHIP_ERROR DeriveSessionKeys(const ByteSpan & secret, const ByteSpan & salt, const ByteSpan & info, |
| Aes128KeyHandle & i2rKey, Aes128KeyHandle & r2iKey, |
| AttestationChallenge & attestationChallenge) = 0; |
| |
| /** |
| * @brief Derive session keys from a session establishment's `SharedSecret`. |
| * |
| * Use Crypto_KDF (HKDF) primitive as defined in the Matter specification to derive symmetric |
| * (AES) session keys for both directions, and the attestation challenge from the session |
| * establishment's `SharedSecret`, represented as the key handle. |
| * |
| * If the method returns no error, the caller is responsible for destroying the symmetric keys |
| * using the DestroyKey() method when the keys are no longer needed. On failure, the method is |
| * responsible for releasing all keys that it allocated so far. |
| */ |
| virtual CHIP_ERROR DeriveSessionKeys(const HkdfKeyHandle & secretKey, const ByteSpan & salt, const ByteSpan & info, |
| Aes128KeyHandle & i2rKey, Aes128KeyHandle & r2iKey, |
| AttestationChallenge & attestationChallenge) = 0; |
| |
| /** |
| * @brief Persistently store an ICD key. |
| * |
| * If input is already a persistent key handle, the function is a no-op and the original handle is returned. |
| * If input is a volatile key handle, key is persisted and the handle may be updated. |
| * |
| * If the method returns no error, the application is responsible for destroying the handle |
| * using the DestroyKey() method when the key is no longer needed. |
| */ |
| virtual CHIP_ERROR PersistICDKey(Symmetric128BitsKeyHandle & key) { return CHIP_NO_ERROR; } |
| }; |
| |
| /** |
| * @brief RAII class to hold a temporary key handle that is destroyed on scope exit. |
| */ |
| template <class KeyHandleType> |
| class AutoReleaseSymmetricKey |
| { |
| public: |
| explicit AutoReleaseSymmetricKey(SessionKeystore & keystore) : mKeystore(keystore) {} |
| ~AutoReleaseSymmetricKey() { mKeystore.DestroyKey(mKeyHandle); } |
| |
| KeyHandleType & KeyHandle() { return mKeyHandle; } |
| |
| private: |
| SessionKeystore & mKeystore; |
| KeyHandleType mKeyHandle; |
| }; |
| |
| } // namespace Crypto |
| } // namespace chip |