Skip to content

Commit

Permalink
Code review
Browse files Browse the repository at this point in the history
  • Loading branch information
Damian-Nordic committed Feb 5, 2024
1 parent 09c9fb1 commit b8c5761
Show file tree
Hide file tree
Showing 2 changed files with 22 additions and 18 deletions.
3 changes: 2 additions & 1 deletion src/crypto/RawKeySessionKeystore.cpp
Original file line number Diff line number Diff line change
Expand Up @@ -29,7 +29,8 @@ struct RawHkdfKeyHandle
{
ByteSpan Span() const { return ByteSpan(data, size); }

static constexpr size_t kMaxDataSize = std::min(CHIP_CONFIG_HKDF_KEY_HANDLE_CONTEXT_SIZE - 1, UINT8_MAX);
// Cap the data size so that the entire structure fits in the opaque context of the HKDF key handle.
static constexpr size_t kMaxDataSize = std::min<size_t>(CHIP_CONFIG_HKDF_KEY_HANDLE_CONTEXT_SIZE - sizeof(uint8_t), UINT8_MAX);

uint8_t data[kMaxDataSize];
uint8_t size;
Expand Down
37 changes: 20 additions & 17 deletions src/crypto/SessionKeystore.h
Original file line number Diff line number Diff line change
Expand Up @@ -100,41 +100,44 @@ class SessionKeystore
*****************************/

/**
* @brief Derive key from a shared secret.
* @brief Derive key from a session establishment's `SharedSecret`.
*
* Use HKDF as defined in the Matter specification to derive an AES key from the shared secret.
* Use `Crypto_KDF` (HKDF) primitive as defined in the Matter specification to derive
* a symmetric (AES) key from the session establishment's `SharedSecret`.
*
* If the method returns no error, the application is responsible for destroying the handle
* using DestroyKey() method when the key is no longer needed.
* If the method returns no error, the caller is responsible for destroying the symmetric key
* using the DestroyKey() method when the key is no longer needed.
*/
virtual CHIP_ERROR DeriveKey(const P256ECDHDerivedSecret & secret, const ByteSpan & salt, const ByteSpan & info,
Aes128KeyHandle & key) = 0;

/**
* @brief Derive session keys from a shared secret.
* @brief Derive session keys from a session establishment's `SharedSecret`.
*
* Use HKDF as defined in the Matter specification to derive AES keys for both directions, and
* the attestation challenge from the shared secret.
* Use `Crypto_KDF` (HKDF) primitive as defined in the Matter specification to derive symmetric
* (AES) session keys for both directions, and the attestation challenge from the session
* establishment's `SharedSecret`.
*
* If the method returns no error, the application is responsible for destroying the AES keys
* using DestroyKey() method when the keys are no longer needed. On failure, the method must
* release all handles that it allocated so far.
* If the method returns no error, the caller is responsible for destroying the symmetric keys
* using the DestroyKey() method when the keys are no longer needed. On failure, the method is
* responsible for releasing all keys that it allocated so far.
*/
virtual CHIP_ERROR DeriveSessionKeys(const ByteSpan & secret, const ByteSpan & salt, const ByteSpan & info,
Aes128KeyHandle & i2rKey, Aes128KeyHandle & r2iKey,
AttestationChallenge & attestationChallenge) = 0;

/**
* @brief Derive session keys from the HKDF key
* @brief Derive session keys from a session establishment's `SharedSecret`.
*
* Use HKDF as defined in the Matter specification to derive AES keys for both directions, and
* the attestation challenge from the HKDF key.
* Use Crypto_KDF (HKDF) primitive as defined in the Matter specification to derive symmetric
* (AES) session keys for both directions, and the attestation challenge from the session
* establishment's `SharedSecret`, represented as the key handle.
*
* If the method returns no error, the application is responsible for destroying the AES keys
* using DestroyKey() method when the keys are no longer needed. On failure, the method must
* release all handles that it allocated so far.
* If the method returns no error, the caller is responsible for destroying the symmetric keys
* using the DestroyKey() method when the keys are no longer needed. On failure, the method is
* responsible for releasing all keys that it allocated so far.
*/
virtual CHIP_ERROR DeriveSessionKeys(const HkdfKeyHandle & hkdfKey, const ByteSpan & salt, const ByteSpan & info,
virtual CHIP_ERROR DeriveSessionKeys(const HkdfKeyHandle & secretKey, const ByteSpan & salt, const ByteSpan & info,
Aes128KeyHandle & i2rKey, Aes128KeyHandle & r2iKey,
AttestationChallenge & attestationChallenge) = 0;
};
Expand Down

0 comments on commit b8c5761

Please sign in to comment.