| /* |
| * |
| * Copyright (c) 2021-2022 Project CHIP Authors |
| * All rights reserved. |
| * |
| * Licensed under the Apache License, Version 2.0 (the "License"); |
| * you may not use this file except in compliance with the License. |
| * You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| |
| /** |
| * @file |
| * This file contains class definition of an example operational certificate |
| * issuer for CHIP devices. The class can be used as a guideline on how to |
| * construct your own certificate issuer. It can also be used in tests and tools |
| * if a specific signing authority is not required. |
| * |
| * NOTE: This class stores the encryption key in clear storage. This is not suited |
| * for production use. This should only be used in test tools. |
| */ |
| |
| #pragma once |
| |
| #include <controller/OperationalCredentialsDelegate.h> |
| #include <crypto/CHIPCryptoPAL.h> |
| #include <lib/core/CASEAuthTag.h> |
| #include <lib/core/CHIPError.h> |
| #include <lib/core/CHIPPersistentStorageDelegate.h> |
| #include <lib/support/CodeUtils.h> |
| #include <lib/support/Span.h> |
| |
| namespace chip { |
| namespace Controller { |
| |
| class DLL_EXPORT ExampleOperationalCredentialsIssuer : public OperationalCredentialsDelegate |
| { |
| public: |
| // |
| // Constructor to create an instance of this object that vends out operational credentials for a given fabric. |
| // |
| // An index should be provided to numerically identify this instance relative to others in a multi-fabric deployment. This is |
| // needed given the interactions of this object with persistent storage. Consequently, the index is used to scope the entries |
| // read/written to/from storage. |
| // |
| // It is recommended that this index track the fabric index within which this issuer is operating. |
| // |
| ExampleOperationalCredentialsIssuer(uint32_t index = 0) { mIndex = index; } |
| ~ExampleOperationalCredentialsIssuer() override {} |
| |
| CHIP_ERROR GenerateNOCChain(const ByteSpan & csrElements, const ByteSpan & csrNonce, const ByteSpan & attestationSignature, |
| const ByteSpan & attestationChallenge, const ByteSpan & DAC, const ByteSpan & PAI, |
| Callback::Callback<OnNOCChainGeneration> * onCompletion) override; |
| |
| void SetNodeIdForNextNOCRequest(NodeId nodeId) override |
| { |
| mNextRequestedNodeId = nodeId; |
| mNodeIdRequested = true; |
| } |
| |
| void SetMaximallyLargeCertsUsed(bool areMaximallyLargeCertsUsed) { mUseMaximallySizedCerts = areMaximallyLargeCertsUsed; } |
| |
| void SetFabricIdForNextNOCRequest(FabricId fabricId) override { mNextFabricId = fabricId; } |
| |
| void SetCATValuesForNextNOCRequest(CATValues cats) { mNextCATs = cats; } |
| |
| /** |
| * @brief Initialize the issuer with the keypair in the storage. |
| * If the storage doesn't have one, it'll create one, and it to the storage. |
| * |
| * @param[in] storage A reference to the storage, where the keypair is stored. |
| * The object of ExampleOperationalCredentialsIssuer doesn't hold |
| * on the reference of storage. |
| * |
| * @return Returns a CHIP_ERROR on error, CHIP_NO_ERROR otherwise |
| **/ |
| [[deprecated("This class stores the encryption key in clear storage. Don't use it for production code.")]] CHIP_ERROR |
| Initialize(PersistentStorageDelegate & storage); |
| |
| void SetIssuerId(uint32_t id) { mIssuerId = id; } |
| |
| void SetCurrentEpoch(uint32_t epoch) { mNow = epoch; } |
| |
| void SetCertificateValidityPeriod(uint32_t validity) { mValidity = validity; } |
| |
| /** |
| * Generate a random operational node id. |
| * |
| * @param[out] aNodeId where to place the generated id. |
| * |
| * On error no guarantees are made about the state of aNodeId. |
| */ |
| static CHIP_ERROR GetRandomOperationalNodeId(NodeId * aNodeId); |
| |
| /** |
| * This is a utility method that generates a operational certificate chain for the given public key. |
| * This method is expected to be called once all the checks (e.g. device attestation, CSR verification etc) |
| * have been completed, or not required (e.g. for self trusted devices such as commissioner apps). |
| */ |
| CHIP_ERROR GenerateNOCChainAfterValidation(NodeId nodeId, FabricId fabricId, const CATValues & cats, |
| const Crypto::P256PublicKey & pubkey, MutableByteSpan & rcac, MutableByteSpan & icac, |
| MutableByteSpan & noc); |
| |
| private: |
| Crypto::P256Keypair mIssuer; |
| Crypto::P256Keypair mIntermediateIssuer; |
| bool mInitialized = false; |
| uint32_t mIssuerId = 1; |
| uint32_t mIntermediateIssuerId = 2; |
| uint32_t mNow = 0; |
| |
| // By default, let's set validity to 10 years |
| uint32_t mValidity = 365 * 24 * 60 * 60 * 10; |
| |
| NodeId mNextAvailableNodeId = 1; |
| PersistentStorageDelegate * mStorage = nullptr; |
| bool mUseMaximallySizedCerts = false; |
| |
| NodeId mNextRequestedNodeId = 1; |
| FabricId mNextFabricId = 1; |
| CATValues mNextCATs = kUndefinedCATs; |
| bool mNodeIdRequested = false; |
| uint64_t mIndex = 0; |
| }; |
| |
| } // namespace Controller |
| } // namespace chip |