/* * Copyright (c) 2021-2022 Project CHIP Authors * All rights reserved. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. * */ #pragma once #include #include #include #include #include #include namespace chip { namespace Controller { struct SetupParams; class OperationalCredentialsDelegate; } // namespace Controller } // namespace chip class CredentialIssuerCommands { public: virtual ~CredentialIssuerCommands() {} /** * @brief * This function is used to initialize the Credentials Issuer, if needed. * * @param[in] storage A reference to the storage, where the Credentials Issuer can optionally use to access the keypair in * storage. * * @return CHIP_ERROR CHIP_NO_ERROR on success, or corresponding error code. */ virtual CHIP_ERROR InitializeCredentialsIssuer(chip::PersistentStorageDelegate & storage) = 0; /** * @brief * This function is used to setup Device Attestation Singletons and intialize Setup/Commissioning Parameters with a custom * Device Attestation Verifier object. * * @param[in] setupParams A reference to the Setup/Commissioning Parameters, to be initialized with custom Device Attestation * Verifier. * @param[in] trustStore A pointer to the PAA trust store to use to find valid PAA roots. * * @param[in] revocationDelegate A pointer to the Device Attestation Revocation Delegate for checking revoked DACs and PAIs. * * @return CHIP_ERROR CHIP_NO_ERROR on success, or corresponding error code. */ virtual CHIP_ERROR SetupDeviceAttestation(chip::Controller::SetupParams & setupParams, const chip::Credentials::AttestationTrustStore * trustStore, chip::Credentials::DeviceAttestationRevocationDelegate * revocationDelegate) = 0; /** * @brief Add a list of additional non-default CD verifying keys (by certificate) * * Must be called AFTER SetupDeviceAttestation. * * @param additionalCdCerts - vector of X.509 DER verifying cert bodies * @return CHIP_NO_ERROR on succes, another CHIP_ERROR on internal failures. */ virtual CHIP_ERROR AddAdditionalCDVerifyingCerts(const std::vector> & additionalCdCerts) = 0; virtual chip::Controller::OperationalCredentialsDelegate * GetCredentialIssuer() = 0; virtual void SetCredentialIssuerCATValues(chip::CATValues cats) = 0; /** * @brief * This function is used to Generate NOC Chain for the Controller/Commissioner. Parameters follow the example implementation, * so some parameters may not translate to the real remote Credentials Issuer policy. * * @param[in] nodeId The desired NodeId for the generated NOC Chain - May be optional/unused in some implementations. * @param[in] fabricId The desired FabricId for the generated NOC Chain - May be optional/unused in some implementations. * @param[in] cats The desired CATs for the generated NOC Chain - May be optional/unused in some implementations. * @param[in] keypair The desired Keypair for the generated NOC Chain - May be optional/unused in some implementations. * @param[in,out] rcac Buffer to hold the Root Certificate of the generated NOC Chain. * @param[in,out] icac Buffer to hold the Intermediate Certificate of the generated NOC Chain. * @param[in,out] noc Buffer to hold the Leaf Certificate of the generated NOC Chain. * * @return CHIP_ERROR CHIP_NO_ERROR on success, or corresponding error code. */ virtual CHIP_ERROR GenerateControllerNOCChain(chip::NodeId nodeId, chip::FabricId fabricId, const chip::CATValues & cats, chip::Crypto::P256Keypair & keypair, chip::MutableByteSpan & rcac, chip::MutableByteSpan & icac, chip::MutableByteSpan & noc) = 0; // All options must start false enum CredentialIssuerOptions : uint8_t { kMaximizeCertificateSizes = 0, // If set, certificate chains will be maximized for testing via padding kAllowTestCdSigningKey = 1, // If set, allow development/test SDK CD verifying key to be used }; virtual void SetCredentialIssuerOption(CredentialIssuerOptions option, bool isEnabled) { // Do nothing (void) option; (void) isEnabled; } virtual bool GetCredentialIssuerOption(CredentialIssuerOptions option) { // All options always start false return false; } };