ctap/examples/hmac.rs
2020-01-08 22:12:23 +01:00

75 lines
2.3 KiB
Rust

extern crate ctap_hmac as ctap;
use crypto::digest::Digest;
use crypto::sha2::Sha256;
use ctap::extensions::hmac::{FidoHmacCredential, HmacExtension};
use ctap_hmac::{AuthenticatorOptions, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity};
use hex;
use std::env::args;
use std::io::prelude::*;
use std::io::stdin;
use std::io::stdout;
const RP_ID: &str = "ctap_demo";
fn main() -> ctap::FidoResult<()> {
let mut devices = ctap::get_devices()?;
let device_info = &mut devices.next().expect("No authenicator found");
let mut device = ctap::FidoDevice::new(device_info)?;
let options = || {
Some(AuthenticatorOptions {
uv: false,
rk: true,
})
};
let mut credential = match args().skip(1).next().map(|h| FidoHmacCredential {
id: hex::decode(&h).expect("Invalid credential"),
rp_id: RP_ID.into(),
}) {
Some(cred) => cred,
_ => {
let rp = PublicKeyCredentialRpEntity {
id: RP_ID,
name: Some("ctap_hmac crate"),
icon: None,
};
let user = PublicKeyCredentialUserEntity {
id: &[0u8],
name: "commandline",
icon: None,
display_name: None,
};
println!("Authorize using your device");
let credential: FidoHmacCredential = device
.make_hmac_credential_full(rp, user, &[0u8; 32], &[], options())
.map(|cred| cred.into())?;
println!("Credential: {}\nNote: You can pass this credential as first argument in order to reproduce results", hex::encode(&credential.id));
credential
}
};
let credential = credential;
print!("Type in your message: ");
stdout().flush();
let mut message = String::new();
stdin()
.read_line(&mut message)
.expect("Couldn't get your message\nNote: this demo does not accept binary data");
println!("Authorize using your device");
let mut salt = [0u8; 32];
let mut digest = Sha256::new();
digest.input(&message.as_bytes());
digest.result(&mut salt);
let hash = device
.get_hmac_assertion(
&credential,
&salt,
None,
None,
)?
.0;
println!("Hash: {}", hex::encode(&hash));
Ok(())
}