@@ -169,7 +169,7 @@ CommissioningParameters PairingCommand::GetCommissioningParameters()
169
169
170
170
if (!mICDSymmetricKey .HasValue ())
171
171
{
172
- chip:: Crypto::DRBG_get_bytes (mRandomGeneratedICDSymmetricKey , sizeof (mRandomGeneratedICDSymmetricKey ));
172
+ Crypto::DRBG_get_bytes (mRandomGeneratedICDSymmetricKey , sizeof (mRandomGeneratedICDSymmetricKey ));
173
173
mICDSymmetricKey .SetValue (ByteSpan (mRandomGeneratedICDSymmetricKey ));
174
174
}
175
175
if (!mICDCheckInNodeId .HasValue ())
@@ -296,7 +296,7 @@ CHIP_ERROR PairingCommand::PairWithMdnsOrBleByIndexWithCode(NodeId remoteId, uin
296
296
// There is no device with this index that has some resolution data. This could simply
297
297
// be because the device is a ble device. In this case let's fall back to looking for
298
298
// a device with this index and some RendezvousParameters.
299
- chip:: SetupPayload payload;
299
+ SetupPayload payload;
300
300
bool isQRCode = strncmp (mOnboardingPayload , kQRCodePrefix , strlen (kQRCodePrefix )) == 0 ;
301
301
if (isQRCode)
302
302
{
@@ -336,21 +336,21 @@ CHIP_ERROR PairingCommand::PairWithMdns(NodeId remoteId)
336
336
Dnssd::DiscoveryFilter filter (mFilterType );
337
337
switch (mFilterType )
338
338
{
339
- case chip:: Dnssd::DiscoveryFilterType::kNone :
339
+ case Dnssd::DiscoveryFilterType::kNone :
340
340
break ;
341
- case chip:: Dnssd::DiscoveryFilterType::kShortDiscriminator :
342
- case chip:: Dnssd::DiscoveryFilterType::kLongDiscriminator :
343
- case chip:: Dnssd::DiscoveryFilterType::kCompressedFabricId :
344
- case chip:: Dnssd::DiscoveryFilterType::kVendorId :
345
- case chip:: Dnssd::DiscoveryFilterType::kDeviceType :
341
+ case Dnssd::DiscoveryFilterType::kShortDiscriminator :
342
+ case Dnssd::DiscoveryFilterType::kLongDiscriminator :
343
+ case Dnssd::DiscoveryFilterType::kCompressedFabricId :
344
+ case Dnssd::DiscoveryFilterType::kVendorId :
345
+ case Dnssd::DiscoveryFilterType::kDeviceType :
346
346
filter.code = mDiscoveryFilterCode ;
347
347
break ;
348
- case chip:: Dnssd::DiscoveryFilterType::kCommissioningMode :
348
+ case Dnssd::DiscoveryFilterType::kCommissioningMode :
349
349
break ;
350
- case chip:: Dnssd::DiscoveryFilterType::kCommissioner :
350
+ case Dnssd::DiscoveryFilterType::kCommissioner :
351
351
filter.code = 1 ;
352
352
break ;
353
- case chip:: Dnssd::DiscoveryFilterType::kInstanceName :
353
+ case Dnssd::DiscoveryFilterType::kInstanceName :
354
354
filter.code = 0 ;
355
355
filter.instanceName = mDiscoveryFilterInstanceName ;
356
356
break ;
@@ -480,10 +480,10 @@ void PairingCommand::OnReadCommissioningInfo(const Controller::ReadCommissioning
480
480
481
481
void PairingCommand::OnICDRegistrationComplete (ScopedNodeId nodeId, uint32_t icdCounter)
482
482
{
483
- char icdSymmetricKeyHex[chip:: Crypto::kAES_CCM128_Key_Length * 2 + 1 ];
483
+ char icdSymmetricKeyHex[Crypto::kAES_CCM128_Key_Length * 2 + 1 ];
484
484
485
- chip:: Encoding::BytesToHex (mICDSymmetricKey .Value ().data (), mICDSymmetricKey .Value ().size (), icdSymmetricKeyHex,
486
- sizeof (icdSymmetricKeyHex), chip:: Encoding::HexFlags::kNullTerminate );
485
+ Encoding::BytesToHex (mICDSymmetricKey .Value ().data (), mICDSymmetricKey .Value ().size (), icdSymmetricKeyHex,
486
+ sizeof (icdSymmetricKeyHex), Encoding::HexFlags::kNullTerminate );
487
487
488
488
app::ICDClientInfo clientInfo;
489
489
clientInfo.peer_node = nodeId;
@@ -521,15 +521,15 @@ void PairingCommand::OnICDStayActiveComplete(ScopedNodeId deviceId, uint32_t pro
521
521
ChipLogValueX64 (deviceId.GetNodeId ()), promisedActiveDuration);
522
522
}
523
523
524
- void PairingCommand::OnDiscoveredDevice (const chip:: Dnssd::CommissionNodeData & nodeData)
524
+ void PairingCommand::OnDiscoveredDevice (const Dnssd::CommissionNodeData & nodeData)
525
525
{
526
526
// Ignore nodes with closed commissioning window
527
527
VerifyOrReturn (nodeData.commissioningMode != 0 );
528
528
529
529
auto & resolutionData = nodeData;
530
530
531
531
const uint16_t port = resolutionData.port ;
532
- char buf[chip:: Inet::IPAddress::kMaxStringLength ];
532
+ char buf[Inet::IPAddress::kMaxStringLength ];
533
533
resolutionData.ipAddress [0 ].ToString (buf);
534
534
ChipLogProgress (NotSpecified, " Discovered Device: %s:%u" , buf, port);
535
535
@@ -566,8 +566,7 @@ void PairingCommand::OnCurrentFabricRemove(void * context, NodeId nodeId, CHIP_E
566
566
fprintf (stderr, " Device with Node ID: 0x%lx has been successfully removed.\n " , nodeId);
567
567
568
568
#if defined(PW_RPC_ENABLED)
569
- chip::app::InteractionModelEngine::GetInstance ()->ShutdownSubscriptions (command->CurrentCommissioner ().GetFabricIndex (),
570
- nodeId);
569
+ app::InteractionModelEngine::GetInstance ()->ShutdownSubscriptions (command->CurrentCommissioner ().GetFabricIndex (), nodeId);
571
570
RemoveSynchronizedDevice (nodeId);
572
571
#endif
573
572
}
@@ -586,10 +585,10 @@ void PairingCommand::OnCurrentFabricRemove(void * context, NodeId nodeId, CHIP_E
586
585
command->SetCommandExitStatus (err);
587
586
}
588
587
589
- chip:: Optional<uint16_t > PairingCommand::FailSafeExpiryTimeoutSecs () const
588
+ Optional<uint16_t > PairingCommand::FailSafeExpiryTimeoutSecs () const
590
589
{
591
590
// No manual input, so do not need to extend.
592
- return chip:: Optional<uint16_t >();
591
+ return Optional<uint16_t >();
593
592
}
594
593
595
594
bool PairingCommand::ShouldWaitAfterDeviceAttestation ()
@@ -603,10 +602,9 @@ bool PairingCommand::ShouldWaitAfterDeviceAttestation()
603
602
return err == CHIP_NO_ERROR && (payload.vendorID != 0 || payload.productID != 0 );
604
603
}
605
604
606
- void PairingCommand::OnDeviceAttestationCompleted (chip::Controller::DeviceCommissioner * deviceCommissioner,
607
- chip::DeviceProxy * device,
608
- const chip::Credentials::DeviceAttestationVerifier::AttestationDeviceInfo & info,
609
- chip::Credentials::AttestationVerificationResult attestationResult)
605
+ void PairingCommand::OnDeviceAttestationCompleted (Controller::DeviceCommissioner * deviceCommissioner, DeviceProxy * device,
606
+ const Credentials::DeviceAttestationVerifier::AttestationDeviceInfo & info,
607
+ Credentials::AttestationVerificationResult attestationResult)
610
608
{
611
609
SetupPayload payload;
612
610
CHIP_ERROR parse_error = GetPayload (mOnboardingPayload , payload);
@@ -619,7 +617,7 @@ void PairingCommand::OnDeviceAttestationCompleted(chip::Controller::DeviceCommis
619
617
" Requested VID: %u, Requested PID: %u." ,
620
618
payload.vendorID , payload.productID );
621
619
deviceCommissioner->ContinueCommissioningAfterDeviceAttestation (
622
- device, chip:: Credentials::AttestationVerificationResult::kInvalidArgument );
620
+ device, Credentials::AttestationVerificationResult::kInvalidArgument );
623
621
return ;
624
622
}
625
623
@@ -633,8 +631,8 @@ void PairingCommand::OnDeviceAttestationCompleted(chip::Controller::DeviceCommis
633
631
deviceCommissioner->ContinueCommissioningAfterDeviceAttestation (
634
632
device,
635
633
payload.vendorID == info.BasicInformationVendorId ()
636
- ? chip:: Credentials::AttestationVerificationResult::kDacProductIdMismatch
637
- : chip:: Credentials::AttestationVerificationResult::kDacVendorIdMismatch );
634
+ ? Credentials::AttestationVerificationResult::kDacProductIdMismatch
635
+ : Credentials::AttestationVerificationResult::kDacVendorIdMismatch );
638
636
return ;
639
637
}
640
638
@@ -654,7 +652,7 @@ void PairingCommand::OnDeviceAttestationCompleted(chip::Controller::DeviceCommis
654
652
{
655
653
// Bypass attestation verification, continue with success
656
654
auto err = deviceCommissioner->ContinueCommissioningAfterDeviceAttestation (
657
- device, chip:: Credentials::AttestationVerificationResult::kSuccess );
655
+ device, Credentials::AttestationVerificationResult::kSuccess );
658
656
if (CHIP_NO_ERROR != err)
659
657
{
660
658
SetCommandExitStatus (err);
0 commit comments