Skip to content

Commit

Permalink
Pull request project-chip#52: Added example of credentials injection.
Browse files Browse the repository at this point in the history
Merge in WMN_TOOLS/matter from credentials_example to silabs

Squashed commit of the following:

commit c90ed96cefc627f8e85584b587d06cf9f0e3210c
Author: Rehan Rasool <[email protected]>
Date:   Fri Sep 2 14:07:04 2022 -0400

    Fix numbers sequence

commit de19989a9006d55fb102154dfc51ba6ac8ea24e5
Author: Sergei Lissianoi <[email protected]>
Date:   Fri Sep 2 13:53:22 2022 -0400

    Fix formatting

commit 574f7a95c4d2c2c03a4a944f86b79a69763aa396
Author: Sergei Lissianoi <[email protected]>
Date:   Fri Sep 2 13:51:09 2022 -0400

    Address review comments

commit b91a03a3da9a870736f96be9cc8af11ddb58eeef
Author: Sergei Lissianoi <[email protected]>
Date:   Fri Sep 2 13:15:49 2022 -0400

    Fix typo and update README

commit 8cfe380f59ce4c0dff769ae4e7ff614bcf64113a
Author: Ezra Hale <[email protected]>
Date:   Wed Aug 31 10:09:56 2022 -0400

    added rest of information from confluence page to flush out credentials example README.md

commit df1d5c8129d3999a83ba64edf4341757a9ef09dc
Author: Ricardo Casallas <[email protected]>
Date:   Fri Aug 26 13:42:32 2022 -0400

    Added example of credentials' injection.
  • Loading branch information
rcasallas-silabs authored and jmartinez-silabs committed Oct 7, 2022
1 parent eb0acc6 commit 6be3e93
Show file tree
Hide file tree
Showing 433 changed files with 120,543 additions and 0 deletions.
239 changes: 239 additions & 0 deletions silabs_examples/credentials/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,239 @@
# Matter Attestation Credentials for EFR32

Attestation credentials are composed of:

- Firmware information
- Product Attestation Intermediate (PAI) Certificate
- Device Attestation Certificate (DAC)
- Certification Declaration (CD)

The firmware information, the Intermediate Authority Certificate, known in
Matter as Product Attestation Intermediate (PAI), and the Device Attestation
Certificate(DAC) are immutable. These shall be installed in factory, and shall
never be modified. The Certification Declaration (CD) is provided by the CSA to
assert protocol compliance of the firmware, and may apply to multiple devices. A
new CD may be installed for each firmware version.

DAC, PAI, and CD are public, and may be stored as plain-text in non-volatile
memory, protected only against modification, however the private-key associated
with the DAC shall remain secret, and its value should never be exposed. In
order to generate the DAC without exposing its private-key, the following
procedure may be used:

1. In factory, the private key may be generate on-device, directly in the
secured zone, and used to generate a Certificate Signing Request (CSR)
1. The CSR is sent to the Certificate Authority (CA), which generates and
returns the Device Attestation Certificate (DAC).
1. The CA's certificate (PAI), and the DAC are stored in non-volatile memory.
1. The private-key used to generate (and sign) the CSR now may be used to sign
outgoing messages.

## EFR32 Example

In Matter, device attestation credentials are obtained through the
[DeviceAttestationCredsProvider](https://github.com/project-chip/connectedhomeip/blob/master/src/credentials/DeviceAttestationCredsProvider.h)
interface. The
[EFR32DeviceAttestationCreds](https://github.com/project-chip/connectedhomeip/blob/master/examples/platform/efr32/EFR32DeviceAttestationCreds.h)
is an example implementation for the EFR32 platform. In this implementation,
PAI, DAC, and CD are all stored in the last page of main flash, which has been
reserved for this purpose. The exact offsets, and file sizes are defined in the
[efr32_creds.h](https://github.com/project-chip/connectedhomeip/blob/master/examples/platform/efr32/efr32_creds.h)
header.

> WARNING: Applications are expected to overwrite the sizes and offsets defined
> by efr32_creds.h. These definitions must match exactly the actual size and
> offsets of the PAI, DAC, and CD files, which may be different from the default
> values found in efr32_creds.h
## Certificate Injection

The following examples illustrate the process of creating the CSR, generating
the DAC, and storing the files in flash, so they may be used by the example
[EFR32DeviceAttestationCreds](https://github.com/project-chip/connectedhomeip/blob/master/examples/platform/efr32/EFR32DeviceAttestationCreds.h)
provider. The source code for these examples can be found in this repository
under `./silabs_examples/credentials`.

The directory structure is as follows:

- credentials
- common
- device
- brd4164a
- brd4166a
- brd4186a
- host
- app
- creds.py

The app folder (under host), contains the source code used to read the CSR from
the device, while the folders named brdXXXXy contains the source code of the
device application that generates the CSR, and returned to the host. The
creds.py script completes the process, generating the DAC, and storing the
credential files (PAI, DAC, and CD) into flash. The actual certificate
generation is done using OpenSSL, and the flash writing is performed using
Simplicity Commander.

## Device Setup

1. Enter the creds.py directory:

> `cd silabs_examples/credentials`
2. Set the environment:

> `export BASE_SDK_PATH=<Gecko SDK path>`<br>
> `export ARM_GCC_DIR=<ARM GNU toolchain path>`<br>
Example:
> `export BASE_SDK_PATH=/home/myUserName/matter/third_party/silabs/gecko_sdk/`<br>
> `export ARM_GCC_DIR=/usr`<br>
3. Execute the setup script

> `python3 ./creds.py -p /dev/tty.usbmodem0004402663301 -S 440266330 -B brd4186c -C pai_cert.pem -K pai_priv.pem -D cd.bin`
This script:

- Compiles both host, and device setup applications
- Flash the device setup app into the target device
- Format the input PEM files into DER format
- Get the CSR file from the target device
- Generates the DAC using OpenSSL
- Calculate offsets for DAC, PAI, and DC files
- Writes DAC, PAI, and DC into the target device's flash using Simplicity
Commander
- Generates a efr32_creds.h  header file with the correct offsets and sizes

The parameters are as follows:

> -p, --port Serial port used to connect to the target device<br> -S, --serial
> Serial number of the connected device<br> -B, --board Target board, currently
> brd4164a, brd4166a, brd4186a, or brd4186c<br> -C, --pai_cert PAI certificate
> file in PEM format<br> -K, --pai_key PAI private key file in PEM format<br>
> -D, --cd CD file (binary)<br>
4. Copy the generated header into the Matter code:

> `cp ./temp/efr32_creds.h ${MATTER_HOME}/examples/platform/efr32/`
5. Rebuild the example app with the new credentials enabled, for instance:

> `./scripts/examples/gn_efr32_example.sh ./examples/lighting-app/efr32/ ./out/lighting-app BRD4186C chip_build_platform_attestation_credentials_provider=true`
## Validation

If the certificate injection is successful, the commissioning process should
complete normally. In order to verify that the new certificates are actually
being used, first check the last page of the flash using Commander. The content
of the flash must then be compared with the credentials received by the
commissioner, which may be done using a debugger.

### Flash Dump

On MG12, the last page starts at address 0x000FF800, in MG24, the last page is
located at 0x0817E000. These addresses can be found in the memory map of the
board's datasheet. For instance, for a MG24 board:

> `commander readmem --range 0x0817E000:+2048 --serialno 440266330`
The output should look something like:

Reading 2048 bytes from 0x0817e000...
{address: 0 1 2 3 4 5 6 7 8 9 A B C D E F}
0817e000: 30 82 01 CB 30 82 01 71 A0 03 02 01 02 02 08 56
0817e010: AD 82 22 AD 94 5B 64 30 0A 06 08 2A 86 48 CE 3D
0817e020: 04 03 02 30 30 31 18 30 16 06 03 55 04 03 0C 0F
...
0817e1a0: 9C 6C B8 8F AC E5 29 36 8D 12 05 4C 0C 02 20 65
0817e1b0: 5D C9 2B 86 BD 90 98 82 A6 C6 21 77 B8 25 D7 D0
0817e1c0: 5E DB E7 C2 2F 9F EA 71 22 0E 7E A7 03 F8 91 FF
0817e1d0: FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF
0817e1e0: 30 82 01 E4 30 82 01 8A A0 03 02 01 02 02 04 1A
0817e1f0: 3D EE 5A 30 0A 06 08 2A 86 48 CE 3D 04 03 02 30
0817e200: 3D 31 25 30 23 06 03 55 04 03 0C 1C 4D 61 74 74
...
0817e3a0: 17 32 7A 56 CB 20 02 20 59 7B 5C 8D DB 89 5D FC
0817e3b0: B6 4B 6A 12 29 27 84 3D 2C 17 69 33 3E 6F BA 14
0817e3c0: FA 3E 07 CF 0C 25 92 D1 FF FF FF FF FF FF FF FF
0817e3d0: FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF
0817e3e0: 30 82 02 19 06 09 2A 86 48 86 F7 0D 01 07 02 A0
0817e3f0: 82 02 0A 30 82 02 06 02 01 03 31 0D 30 0B 06 09
0817e400: 60 86 48 01 65 03 04 02 01 30 82 01 71 06 09 2A
...
0817e5d0: DE 31 92 E6 78 C7 45 E7 F6 0C 02 21 00 F8 AA 2F
0817e5e0: A7 11 FC B7 9B 97 E3 97 CE DA 66 7B AE 46 4E 2B
0817e5f0: D3 FF DF C3 CC ED 7A A8 CA 5F 4C 1A 7C FF FF FF
0817e600: FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF`

Compare this output with the generated efr32_creds.h header:

#define EFR32_CREDENTIALS_PAI_OFFSET 0x0
#define EFR32_CREDENTIALS_PAI_SIZE 463

#define EFR32_CREDENTIALS_DAC_OFFSET 0x1e0
#define EFR32_CREDENTIALS_DAC_SIZE 488

#define EFR32_CREDENTIALS_CD_OFFSET 0x3e0
#define EFR32_CREDENTIALS_CD_SIZE 541

The PAI certificate is located at offset 0 (address 0x0817e000), and has a size
of 463 octets:

0817e000: 30 82 01 CB 30 82 01 71 A0 03 02 01 02 02 08 56
0817e010: AD 82 22 AD 94 5B 64 30 0A 06 08 2A 86 48 CE 3D
...
0817e1b0: 5D C9 2B 86 BD 90 98 82 A6 C6 21 77 B8 25 D7 D0
0817e1c0: 5E DB E7 C2 2F 9F EA 71 22 0E 7E A7 03 F8 91

This should match the contents of the DER-formatted PAI certificate, which is
stored by the setup script as ./temp/pai_cert.der :

> `$ xxd ./temp/pai_cert.der`
00000000: 3082 01cb 3082 0171 a003 0201 0202 0856 0...0..q.......V
00000010: ad82 22ad 945b 6430 0a06 082a 8648 ce3d .."..[d0...*.H.=
...
000001b0: 5dc9 2b86 bd90 9882 a6c6 2177 b825 d7d0 ].+.......!w.%..
000001c0: 5edb e7c2 2f9f ea71 220e 7ea7 03f8 91 ^.../..q".~....

On this example, the DAC is located at offset 0x1e0 (address 0817e1e0), and has
a size of 488 octets:

0817e1e0: 30 82 01 E4 30 82 01 8A A0 03 02 01 02 02 04 1A
0817e1f0: 3D EE 5A 30 0A 06 08 2A 86 48 CE 3D 04 03 02 30
...
0817e3b0: B6 4B 6A 12 29 27 84 3D 2C 17 69 33 3E 6F BA 14
0817e3c0: FA 3E 07 CF 0C 25 92 D1

This should match the contents of the DER-formatted DAC certificate, which is
stored by the setup script as ./temp/dac_cert.der :

> `$ xxd ./temp/dac_cert.der`
00000000: 3082 01e4 3082 018a a003 0201 0202 041a 0...0...........
00000010: 3dee 5a30 0a06 082a 8648 ce3d 0403 0230 =.Z0...*.H.=...0
...
000001d0: b64b 6a12 2927 843d 2c17 6933 3e6f ba14 .Kj.)'.=,.i3>o..
000001e0: fa3e 07cf 0c25 92d1 .>...%..

Finally, on this example the CD is located at offset 0x3e0 (address 0x0817e3e0),
with a size of 541 octets.

0817e3e0: 30 82 02 19 06 09 2A 86 48 86 F7 0D 01 07 02 A0
0817e3f0: 82 02 0A 30 82 02 06 02 01 03 31 0D 30 0B 06 09
...
0817e5f0: D3 FF DF C3 CC ED 7A A8 CA 5F 4C 1A 7C FF FF FF
0817e600: FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF

The CD is a binary file, and is neither modified, nor validated by the setup
script, it is simply stored in flash after the DAC:

> `$ xxd cd.bin`
00000000: 3082 0219 0609 2a86 4886 f70d 0107 02a0 0.....*.H.......
00000010: 8202 0a30 8202 0602 0103 310d 300b 0609 ...0......1.0...
...
00000210: d3ff dfc3 cced 7aa8 ca5f 4c1a 7c ......z.._L.|

The 0xff octets between the files, and at the end of the flash are unmodified
sections of the flash storage.
11 changes: 11 additions & 0 deletions silabs_examples/credentials/common/creds.c
Original file line number Diff line number Diff line change
@@ -0,0 +1,11 @@
#include "creds.h"
#include <string.h>
#include <stdlib.h>

int creds_file_init(creds_file_t *file, uint8_t *buffer, size_t buffer_max)
{
memset(file, 0x00, sizeof(creds_file_t));
file->data = buffer;
file->max = buffer_max;
return 0;
}
44 changes: 44 additions & 0 deletions silabs_examples/credentials/common/creds.h
Original file line number Diff line number Diff line change
@@ -0,0 +1,44 @@
#ifndef MATTER_CREDS_H
#define MATTER_CREDS_H

#include <stdint.h>
#include <stddef.h>
#include <stdio.h>

#define ASSERT(cond, action, message, ...) \
do \
{ \
if (!(cond)) \
{ \
fprintf(stderr, "%s:%d:%s ", __FILE__, __LINE__, __func__); \
fprintf(stderr, message, ##__VA_ARGS__); \
printf("\n"); \
action; \
} \
} while (0)

#define CREDS_PROTOCOL_FRAME_SIZE_MAX 64

typedef enum creds_command_
{
CREDS_COMMAND_CSR_GENERATE = 0x00,
CREDS_COMMAND_CSR_READ = 0x01,

} creds_command_t;


typedef struct creds_file_
{
size_t max;
size_t size;
size_t offset;
uint8_t *data;

} creds_file_t;

#define CREDS_FRAME_LENGTH_MAX 64
#define CREDS_CSR_LENGTH_MAX 512

int creds_file_init(creds_file_t *file, uint8_t *buffer, size_t buffer_max);

#endif // MATTER_CREDS_H
Loading

0 comments on commit 6be3e93

Please sign in to comment.