/* * * Copyright (c) 2022 Project CHIP Authors * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #pragma once #include #include namespace chip { // The largest value of the 12-bit Payload discriminator inline constexpr uint16_t kMaxDiscriminatorValue = 0xFFF; inline constexpr uint32_t kMinSetupPasscode = 1; inline constexpr uint32_t kMaxSetupPasscode = 0x5F5E0FE; namespace DeviceLayer { class CommissionableDataProvider { public: CommissionableDataProvider() = default; virtual ~CommissionableDataProvider() = default; // Not copyable CommissionableDataProvider(const CommissionableDataProvider &) = delete; CommissionableDataProvider & operator=(const CommissionableDataProvider &) = delete; /** * @brief Obtain the default setup discriminator for the device used for commissionable advertising * * @param[in,out] setupDiscriminator Reference to location where discriminator will be copied * @returns CHIP_NO_ERROR on success, or another CHIP_ERROR from the underlying implementation * if access fails. */ virtual CHIP_ERROR GetSetupDiscriminator(uint16_t & setupDiscriminator) = 0; /** * @brief Set the setup discriminator *if supported*. * * This API is optional to support, but present to support integration with some examples * which use a common test PAKE verifier but want to disambiguate multiple instances at * runtime. This is generally not applicable to production usecases of commissionable * devices with nominal random discriminator. There are no guarantees that this API, * in general, will persist the discriminator across restarts. * * If not supported, return CHIP_ERROR_NOT_IMPLEMENTED. * * @param[in] setupDiscriminator Setup discriminator to set. * @returns CHIP_NO_ERROR on success, CHIP_ERROR_INVALID_ARGUMENT if discriminator is out of range, * CHIP_ERROR_NOT_IMPLEMENTED if not implemented, or another CHIP_ERROR from the underlying * implementation if storage fails. */ virtual CHIP_ERROR SetSetupDiscriminator(uint16_t setupDiscriminator) = 0; /** * @brief Obtain the default PAKE verifier's PBKDF2 iteration count * * @param[in,out] iterationCount Reference to location where the iteration count will be stored * @returns CHIP_NO_ERROR on success, or another CHIP_ERROR from the underlying implementation * if access fails. */ virtual CHIP_ERROR GetSpake2pIterationCount(uint32_t & iterationCount) = 0; /** * @brief Obtain the default PAKE verifier's PBKDF2 salt in the provided `saltBuf` * * The `saltBuf` must be large enough to contain the salt. It will be resized on success to * reflect the actual size of the salt. * * @param[in,out] saltBuf Reference to buffer where the salt value will be copied. * * @returns CHIP_NO_ERROR on success, CHIP_ERROR_BUFFER_TOO_SMALL if saltBuf was too small, or another * CHIP_ERROR from the underlying implementation if access fails. */ virtual CHIP_ERROR GetSpake2pSalt(MutableByteSpan & saltBuf) = 0; /** * @brief Obtain the default PAKE verifier in the provided `verifierBuf` * * The `verifierBuf` must be large enough to contain the verifier. It will be resized on * success to reflect the actual size of the verifier and match the value in verifierLen. * * @param[in,out] verifierBuf Reference to buffer where the verifier value will be copied. * @param[out] outVerifierLen Reference to location where the length of the verifier will be stored, * including if the buffer provided is too small. This value is valid * if the return value is either CHIP_NO_ERROR or CHIP_ERROR_BUFFER_TOO_SMALL. * * @returns CHIP_NO_ERROR on success, CHIP_ERROR_BUFFER_TOO_SMALL if verifierBuf was too small, or another * CHIP_ERROR from the underlying implementation if access fails. */ virtual CHIP_ERROR GetSpake2pVerifier(MutableByteSpan & verifierBuf, size_t & outVerifierLen) = 0; /** * @brief Obtain the default setup passcode for the device *if supported* * * This API is optional to support, but present to support integration with some examples * which allow runtime setting of a passcode to generate onboarding payloads and QR codes * as well as PAKE verifier. This is generally not applicable to production usecases of * commissionable devices with nominal random verifier/passcode and with usage of verifier * rather than passcode (which safeguards the passcode from ever leaking). There are no * guarantees that this API, in general, will persist the passcode across restarts. * * If not supported, return CHIP_ERROR_NOT_IMPLEMENTED. * * @param[in,out] setupPasscode Reference to location where passcode will be copied * @returns CHIP_NO_ERROR on success, CHIP_ERROR_NOT_IMPLEMENTED if not implemented * or not available, or another CHIP_ERROR from the underlying implementation * if access fails. */ virtual CHIP_ERROR GetSetupPasscode(uint32_t & setupPasscode) = 0; /** * @brief Set the setup discriminator *if supported*. * * This API is optional to support, but present to support integration with some examples * which allow runtime setting of a passcode to generate onboarding payloads and QR codes * as well as PAKE verifier. This is generally not applicable to production usecases of * commissionable devices with nominal random verifier/passcode and with usage of verifier * rather than passcode (which safeguards the passcode from ever leaking). There are no * guarantees that this API, in general, will persist the passcode across restarts. * * If not supported, return CHIP_ERROR_NOT_IMPLEMENTED. * * @param[in] setupPasscode Setup passcode to set * @returns CHIP_NO_ERROR on success, CHIP_ERROR_INVALID_ARGUMENT if discriminator is invalid * according to spec (out of range or forbidden value), CHIP_ERROR_NOT_IMPLEMENTED * if not implemented, or another CHIP_ERROR from the underlying implementation if * storage fails. */ virtual CHIP_ERROR SetSetupPasscode(uint32_t setupPasscode) = 0; }; /** * Instance getter for the global CommissionableDataProvider. * * Callers have to externally synchronize usage of this function. * * @return The global device attestation credentials provider. Assume never null. */ CommissionableDataProvider * GetCommissionableDataProvider(); /** * Instance setter for the global CommissionableDataProvider. * * Callers have to externally synchronize usage of this function. * * If the `provider` is nullptr, no change is done. * * @param[in] provider the CommissionableDataProvider to start returning with the getter */ void SetCommissionableDataProvider(CommissionableDataProvider * provider); } // namespace DeviceLayer } // namespace chip