diff --git a/src/app/server/CommissioningWindowManager.cpp b/src/app/server/CommissioningWindowManager.cpp index 52ad2406c1f466..dc0bed95144e18 100644 --- a/src/app/server/CommissioningWindowManager.cpp +++ b/src/app/server/CommissioningWindowManager.cpp @@ -229,7 +229,7 @@ CHIP_ERROR CommissioningWindowManager::OpenBasicCommissioningWindow(uint16_t com CHIP_ERROR CommissioningWindowManager::OpenEnhancedCommissioningWindow(uint16_t commissioningTimeoutSeconds, uint16_t discriminator, PASEVerifier & verifier, uint32_t iterations, ByteSpan salt, - uint16_t passcodeID) + PasscodeId passcodeID) { // Once a device is operational, it shall be commissioned into subsequent fabrics using // the operational network only. diff --git a/src/app/server/CommissioningWindowManager.h b/src/app/server/CommissioningWindowManager.h index 1361a488669869..5ea69702a1e547 100644 --- a/src/app/server/CommissioningWindowManager.h +++ b/src/app/server/CommissioningWindowManager.h @@ -1,6 +1,6 @@ /* * - * Copyright (c) 2021 Project CHIP Authors + * Copyright (c) 2021-2022 Project CHIP Authors * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. @@ -55,7 +55,7 @@ class CommissioningWindowManager : public SessionEstablishmentDelegate CHIP_ERROR OpenEnhancedCommissioningWindow(uint16_t commissioningTimeoutSeconds, uint16_t discriminator, PASEVerifier & verifier, uint32_t iterations, chip::ByteSpan salt, - uint16_t passcodeID); + PasscodeId passcodeID); void CloseCommissioningWindow(); @@ -108,7 +108,7 @@ class CommissioningWindowManager : public SessionEstablishmentDelegate bool mUseECM = false; PASEVerifier mECMPASEVerifier; uint16_t mECMDiscriminator = 0; - uint16_t mECMPasscodeID = 0; + PasscodeId mECMPasscodeID = kDefaultCommissioningPasscodeId; uint32_t mECMIterations = 0; uint32_t mECMSaltLength = 0; uint8_t mECMSalt[kPBKDFMaximumSaltLen]; diff --git a/src/app/tests/TestCommissionManager.cpp b/src/app/tests/TestCommissionManager.cpp index f63c1d16239da0..ea337a779b06b2 100644 --- a/src/app/tests/TestCommissionManager.cpp +++ b/src/app/tests/TestCommissionManager.cpp @@ -1,6 +1,6 @@ /* * - * Copyright (c) 2021 Project CHIP Authors + * Copyright (c) 2021-2022 Project CHIP Authors * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. @@ -121,7 +121,7 @@ void CheckCommissioningWindowManagerEnhancedWindowTask(intptr_t context) constexpr uint32_t kIterations = chip::kPBKDFMinimumIterations; uint8_t salt[chip::kPBKDFMinimumSaltLen]; chip::ByteSpan saltData(salt); - constexpr uint16_t kPasscodeID = 1; + constexpr chip::PasscodeId kPasscodeID = 1; uint16_t currentDiscriminator; err = commissionMgr.OpenEnhancedCommissioningWindow(kNoCommissioningTimeout, newDiscriminator, verifier, kIterations, saltData, diff --git a/src/controller/CHIPDeviceController.cpp b/src/controller/CHIPDeviceController.cpp index cdb3a482bf74b8..0d011f363d8f3d 100644 --- a/src/controller/CHIPDeviceController.cpp +++ b/src/controller/CHIPDeviceController.cpp @@ -434,7 +434,7 @@ void DeviceController::OnOpenPairingWindowFailureResponse(void * context, CHIP_E } CHIP_ERROR DeviceController::ComputePASEVerifier(uint32_t iterations, uint32_t setupPincode, const ByteSpan & salt, - PASEVerifier & outVerifier, uint32_t & outPasscodeId) + PASEVerifier & outVerifier, PasscodeId & outPasscodeId) { ReturnErrorOnFailure(PASESession::GeneratePASEVerifier(outVerifier, iterations, salt, /* useRandomPIN= */ false, setupPincode)); diff --git a/src/controller/CHIPDeviceController.h b/src/controller/CHIPDeviceController.h index ec8af2a956585d..0797f733d48173 100644 --- a/src/controller/CHIPDeviceController.h +++ b/src/controller/CHIPDeviceController.h @@ -248,7 +248,7 @@ class DLL_EXPORT DeviceController : public SessionRecoveryDelegate * @return CHIP_ERROR CHIP_NO_ERROR on success, or corresponding error */ CHIP_ERROR ComputePASEVerifier(uint32_t iterations, uint32_t setupPincode, const ByteSpan & salt, PASEVerifier & outVerifier, - uint32_t & outPasscodeId); + PasscodeId & outPasscodeId); /** * @brief @@ -434,7 +434,7 @@ class DLL_EXPORT DeviceController : public SessionRecoveryDelegate static void OnOpenPairingWindowFailureResponse(void * context, CHIP_ERROR error); CHIP_ERROR ProcessControllerNOCChain(const ControllerInitParams & params); - uint16_t mPAKEVerifierID = 1; + PasscodeId mPAKEVerifierID = 1; }; /** diff --git a/src/controller/java/CHIPDeviceController-JNI.cpp b/src/controller/java/CHIPDeviceController-JNI.cpp index 6ddafa5993cb1a..d30304401d25d5 100644 --- a/src/controller/java/CHIPDeviceController-JNI.cpp +++ b/src/controller/java/CHIPDeviceController-JNI.cpp @@ -581,7 +581,7 @@ JNI_METHOD(jobject, computePaseVerifier) CHIP_ERROR err = CHIP_NO_ERROR; jobject params; jbyteArray verifierBytes; - uint32_t passcodeId; + PasscodeId passcodeId; PASEVerifier verifier; JniByteArray jniSalt(env, salt); diff --git a/src/protocols/secure_channel/PASESession.cpp b/src/protocols/secure_channel/PASESession.cpp index 9d46995548e165..9a2420caa05775 100644 --- a/src/protocols/secure_channel/PASESession.cpp +++ b/src/protocols/secure_channel/PASESession.cpp @@ -294,7 +294,7 @@ CHIP_ERROR PASESession::WaitForPairing(uint32_t mySetUpPINCode, uint32_t pbkdf2I mNextExpectedMsg = MsgType::PBKDFParamRequest; mPairingComplete = false; - mPasscodeID = 0; + mPasscodeID = kDefaultCommissioningPasscodeId; mLocalMRPConfig = mrpConfig; SetPeerNodeId(NodeIdFromPAKEKeyId(mPasscodeID)); @@ -310,8 +310,8 @@ CHIP_ERROR PASESession::WaitForPairing(uint32_t mySetUpPINCode, uint32_t pbkdf2I } CHIP_ERROR PASESession::WaitForPairing(const PASEVerifier & verifier, uint32_t pbkdf2IterCount, const ByteSpan & salt, - uint16_t passcodeID, uint16_t mySessionId, Optional mrpConfig, - SessionEstablishmentDelegate * delegate) + PasscodeId passcodeID, uint16_t mySessionId, + Optional mrpConfig, SessionEstablishmentDelegate * delegate) { ReturnErrorCodeIf(passcodeID == 0, CHIP_ERROR_INVALID_ARGUMENT); ReturnErrorOnFailure(WaitForPairing(0, pbkdf2IterCount, salt, mySessionId, mrpConfig, delegate)); @@ -386,7 +386,7 @@ CHIP_ERROR PASESession::SendPBKDFParamRequest() const size_t mrpParamsSize = mLocalMRPConfig.HasValue() ? TLV::EstimateStructOverhead(sizeof(uint16_t), sizeof(uint16_t)) : 0; const size_t max_msg_len = TLV::EstimateStructOverhead(kPBKDFParamRandomNumberSize, // initiatorRandom, sizeof(uint16_t), // initiatorSessionId - sizeof(uint16_t), // passcodeId, + sizeof(PasscodeId), // passcodeId, sizeof(uint8_t), // hasPBKDFParameters mrpParamsSize // MRP Parameters ); diff --git a/src/protocols/secure_channel/PASESession.h b/src/protocols/secure_channel/PASESession.h index f8229bd6bb2ad4..29cd1dfbd74c4f 100644 --- a/src/protocols/secure_channel/PASESession.h +++ b/src/protocols/secure_channel/PASESession.h @@ -123,7 +123,7 @@ class DLL_EXPORT PASESession : public Messaging::ExchangeDelegate, public Pairin * * @return CHIP_ERROR The result of initialization */ - CHIP_ERROR WaitForPairing(const PASEVerifier & verifier, uint32_t pbkdf2IterCount, const ByteSpan & salt, uint16_t passcodeID, + CHIP_ERROR WaitForPairing(const PASEVerifier & verifier, uint32_t pbkdf2IterCount, const ByteSpan & salt, PasscodeId passcodeID, uint16_t mySessionId, Optional mrpConfig, SessionEstablishmentDelegate * delegate); @@ -284,7 +284,7 @@ class DLL_EXPORT PASESession : public Messaging::ExchangeDelegate, public Pairin /* w0s and w1s */ PASEVerifier mPASEVerifier; - uint16_t mPasscodeID = 0; + PasscodeId mPasscodeID = kDefaultCommissioningPasscodeId; uint32_t mSetupPINCode;