Skip to content

Commit

Permalink
authz: configure logs
Browse files Browse the repository at this point in the history
  • Loading branch information
geonnave committed Aug 30, 2024
1 parent 3f047fb commit a422f72
Show file tree
Hide file tree
Showing 4 changed files with 17 additions and 0 deletions.
3 changes: 3 additions & 0 deletions ead/lakers-ead-authz/Cargo.toml
Original file line number Diff line number Diff line change
Expand Up @@ -9,6 +9,9 @@ repository.workspace = true

[dependencies]
lakers-shared.workspace = true
defmt-or-log = { version = "0.2.1", default-features = false }
log = { version = "0.4", optional = true }
defmt = { version = "0.3", optional = true }

[dev-dependencies]
lakers-crypto.workspace = true
Expand Down
3 changes: 3 additions & 0 deletions ead/lakers-ead-authz/src/authenticator.rs
Original file line number Diff line number Diff line change
@@ -1,5 +1,6 @@
use crate::consts::*;
use crate::shared::*;
use defmt_or_log::trace;
use lakers_shared::*;

#[derive(Debug, Default)]
Expand All @@ -20,6 +21,7 @@ impl ZeroTouchAuthenticator {
),
EDHOCError,
> {
trace!("Enter process_ead_1");
let opaque_state: Option<EdhocMessageBuffer> = None; // TODO: receive as parameter

if ead_1.label != EAD_AUTHZ_LABEL || ead_1.value.is_none() {
Expand All @@ -42,6 +44,7 @@ impl ZeroTouchAuthenticatorWaitVoucherResp {
&self,
voucher_response: &EdhocMessageBuffer,
) -> Result<EADItem, EDHOCError> {
trace!("Enter prepare_ead_2");
let (_message_1, voucher, _opaque_state) = parse_voucher_response(&voucher_response)?;

Ok(EADItem {
Expand Down
5 changes: 5 additions & 0 deletions ead/lakers-ead-authz/src/device.rs
Original file line number Diff line number Diff line change
@@ -1,6 +1,7 @@
use crate::consts::*;
use crate::shared::*;
use crate::ZeroTouchError;
use defmt_or_log::trace;
use lakers_shared::{Crypto as CryptoTrait, *};

#[derive(Default, Debug)]
Expand All @@ -26,6 +27,7 @@ pub struct ZeroTouchDeviceDone {

impl ZeroTouchDevice {
pub fn new(id_u: EdhocMessageBuffer, g_w: BytesP256ElemLen, loc_w: EdhocMessageBuffer) -> Self {
trace!("Initializing ZeroTouchDevice");
ZeroTouchDevice { id_u, g_w, loc_w }
}

Expand All @@ -35,6 +37,7 @@ impl ZeroTouchDevice {
secret: BytesP256ElemLen,
ss: u8,
) -> (ZeroTouchDeviceWaitEAD2, EADItem) {
trace!("Enter prepare_ead_1");
// PRK = EDHOC-Extract(salt, IKM)
let prk = compute_prk_from_secret(crypto, &secret);

Expand All @@ -61,6 +64,7 @@ impl ZeroTouchDevice {

impl ZeroTouchDeviceWaitEAD2 {
pub fn set_h_message_1(&mut self, h_message_1: BytesHashLen) {
trace!("Enter set_h_message_1");
self.h_message_1 = h_message_1;
}

Expand All @@ -70,6 +74,7 @@ impl ZeroTouchDeviceWaitEAD2 {
ead_2: EADItem,
cred_v: &[u8],
) -> Result<ZeroTouchDeviceDone, ZeroTouchError> {
trace!("Enter process_ead_2");
if ead_2.label != EAD_AUTHZ_LABEL {
return Err(ZeroTouchError::InvalidEADLabel);
}
Expand Down
6 changes: 6 additions & 0 deletions ead/lakers-ead-authz/src/server.rs
Original file line number Diff line number Diff line change
@@ -1,4 +1,5 @@
use crate::shared::*;
use defmt_or_log::trace;
use lakers_shared::{Crypto as CryptoTrait, *};

/// This server also stores an ACL
Expand All @@ -12,6 +13,7 @@ pub struct ZeroTouchServer {

impl ZeroTouchServer {
pub fn new(w: BytesP256ElemLen, cred_v: &[u8], acl: Option<EdhocMessageBuffer>) -> Self {
trace!("Initializing ZeroTouchServer");
let cred_v: EdhocMessageBuffer = cred_v.try_into().unwrap();
ZeroTouchServer { w, cred_v, acl }
}
Expand All @@ -30,6 +32,7 @@ impl ZeroTouchServer {
crypto: &mut Crypto,
vreq: &EdhocMessageBuffer,
) -> Result<EdhocMessageBuffer, EDHOCError> {
trace!("Enter handle_voucher_request");
let (message_1, opaque_state) = parse_voucher_request(vreq)?;
let (_method, _suites_i, g_x, _c_i, ead_1) = parse_message_1(&message_1)?;
let prk = compute_prk(crypto, &self.w, &g_x);
Expand Down Expand Up @@ -62,6 +65,7 @@ pub struct ZeroTouchServerUserAcl {

impl ZeroTouchServerUserAcl {
pub fn new(w: BytesP256ElemLen, cred_v: &[u8]) -> Self {
trace!("Initializing ZeroTouchServerUserAcl");
let cred_v: EdhocMessageBuffer = cred_v.try_into().unwrap();
Self { w, cred_v }
}
Expand All @@ -71,6 +75,7 @@ impl ZeroTouchServerUserAcl {
crypto: &mut Crypto,
vreq: &EdhocMessageBuffer,
) -> Result<EdhocMessageBuffer, EDHOCError> {
trace!("Enter decode_voucher_request");
let (message_1, _opaque_state) = parse_voucher_request(vreq)?;
let (_method, _suites_i, g_x, _c_i, ead_1) = parse_message_1(&message_1)?;
let prk = compute_prk(crypto, &self.w, &g_x);
Expand All @@ -86,6 +91,7 @@ impl ZeroTouchServerUserAcl {
crypto: &mut Crypto,
vreq: &EdhocMessageBuffer,
) -> Result<EdhocMessageBuffer, EDHOCError> {
trace!("Enter prepare_voucher");
let (message_1, opaque_state) = parse_voucher_request(vreq)?;
let (_method, _suites_i, g_x, _c_i, _ead_1) = parse_message_1(&message_1)?;
let prk = compute_prk(crypto, &self.w, &g_x);
Expand Down

0 comments on commit a422f72

Please sign in to comment.