Compare commits

..

3 Commits

Author SHA1 Message Date
1b85b2f433 docs: update .all-contributorsrc 2019-10-08 17:24:30 +00:00
43e778ae53 docs: update README.md 2019-10-08 17:24:29 +00:00
5168afa16e Code cosmetics, added missing void statement to empty parameter of
functions
2019-10-08 12:31:08 -04:00
21 changed files with 182 additions and 208 deletions

View File

@ -187,6 +187,16 @@
"contributions": [ "contributions": [
"bug" "bug"
] ]
},
{
"login": "jolo1581",
"name": "Jan A.",
"avatar_url": "https://avatars1.githubusercontent.com/u/53423977?v=4",
"profile": "https://github.com/jolo1581",
"contributions": [
"code",
"doc"
]
} }
], ],
"contributorsPerLine": 7, "contributorsPerLine": 7,

View File

@ -39,7 +39,7 @@ INCLUDES += -I./crypto/cifra/src
CFLAGS += $(INCLUDES) CFLAGS += $(INCLUDES)
# for crypto/tiny-AES-c # for crypto/tiny-AES-c
CFLAGS += -DAES256=1 -DAPP_CONFIG=\"app.h\" -DSOLO_EXPERIMENTAL=1 CFLAGS += -DAES256=1 -DAPP_CONFIG=\"app.h\"
name = main name = main

View File

@ -136,6 +136,7 @@ Thanks goes to these wonderful people ([emoji key](https://allcontributors.org/d
<td align="center"><a href="http://blogs.gnome.org/hughsie/"><img src="https://avatars0.githubusercontent.com/u/151380?v=4" width="100px;" alt="Richard Hughes"/><br /><sub><b>Richard Hughes</b></sub></a><br /><a href="#ideas-hughsie" title="Ideas, Planning, & Feedback">🤔</a> <a href="https://github.com/solokeys/solo/commits?author=hughsie" title="Code">💻</a> <a href="#infra-hughsie" title="Infrastructure (Hosting, Build-Tools, etc)">🚇</a> <a href="#tool-hughsie" title="Tools">🔧</a></td> <td align="center"><a href="http://blogs.gnome.org/hughsie/"><img src="https://avatars0.githubusercontent.com/u/151380?v=4" width="100px;" alt="Richard Hughes"/><br /><sub><b>Richard Hughes</b></sub></a><br /><a href="#ideas-hughsie" title="Ideas, Planning, & Feedback">🤔</a> <a href="https://github.com/solokeys/solo/commits?author=hughsie" title="Code">💻</a> <a href="#infra-hughsie" title="Infrastructure (Hosting, Build-Tools, etc)">🚇</a> <a href="#tool-hughsie" title="Tools">🔧</a></td>
<td align="center"><a href="http://www.schulz.dk"><img src="https://avatars1.githubusercontent.com/u/1150049?v=4" width="100px;" alt="Kim Schulz"/><br /><sub><b>Kim Schulz</b></sub></a><br /><a href="#business-kimusan" title="Business development">💼</a> <a href="#ideas-kimusan" title="Ideas, Planning, & Feedback">🤔</a></td> <td align="center"><a href="http://www.schulz.dk"><img src="https://avatars1.githubusercontent.com/u/1150049?v=4" width="100px;" alt="Kim Schulz"/><br /><sub><b>Kim Schulz</b></sub></a><br /><a href="#business-kimusan" title="Business development">💼</a> <a href="#ideas-kimusan" title="Ideas, Planning, & Feedback">🤔</a></td>
<td align="center"><a href="https://github.com/oplik0"><img src="https://avatars2.githubusercontent.com/u/25460763?v=4" width="100px;" alt="Jakub"/><br /><sub><b>Jakub</b></sub></a><br /><a href="https://github.com/solokeys/solo/issues?q=author%3Aoplik0" title="Bug reports">🐛</a></td> <td align="center"><a href="https://github.com/oplik0"><img src="https://avatars2.githubusercontent.com/u/25460763?v=4" width="100px;" alt="Jakub"/><br /><sub><b>Jakub</b></sub></a><br /><a href="https://github.com/solokeys/solo/issues?q=author%3Aoplik0" title="Bug reports">🐛</a></td>
<td align="center"><a href="https://github.com/jolo1581"><img src="https://avatars1.githubusercontent.com/u/53423977?v=4" width="100px;" alt="Jan A."/><br /><sub><b>Jan A.</b></sub></a><br /><a href="https://github.com/solokeys/solo/commits?author=jolo1581" title="Code">💻</a> <a href="https://github.com/solokeys/solo/commits?author=jolo1581" title="Documentation">📖</a></td>
</tr> </tr>
</table> </table>
@ -169,7 +170,7 @@ You can buy Solo, Solo Tap, and Solo for Hackers at [solokeys.com](https://solok
<br/> <br/>
[![License](https://img.shields.io/github/license/solokeys/solo.svg)](https://github.com/solokeys/solo/blob/master/LICENSE) [![License](https://img.shields.io/github/license/solokeys/solo.svg)](https://github.com/solokeys/solo/blob/master/LICENSE)
[![All Contributors](https://img.shields.io/badge/all_contributors-19-orange.svg?style=flat-square)](#contributors) [![All Contributors](https://img.shields.io/badge/all_contributors-20-orange.svg?style=flat-square)](#contributors)
[![Build Status](https://travis-ci.com/solokeys/solo.svg?branch=master)](https://travis-ci.com/solokeys/solo) [![Build Status](https://travis-ci.com/solokeys/solo.svg?branch=master)](https://travis-ci.com/solokeys/solo)
[![Discourse Users](https://img.shields.io/discourse/https/discourse.solokeys.com/users.svg)](https://discourse.solokeys.com) [![Discourse Users](https://img.shields.io/discourse/https/discourse.solokeys.com/users.svg)](https://discourse.solokeys.com)
[![Keybase Chat](https://img.shields.io/badge/chat-on%20keybase-brightgreen.svg)](https://keybase.io/team/solokeys.public) [![Keybase Chat](https://img.shields.io/badge/chat-on%20keybase-brightgreen.svg)](https://keybase.io/team/solokeys.public)

View File

@ -1761,18 +1761,7 @@ static void ctap_state_init()
printf1(TAG_STOR, "Generated PIN SALT: "); printf1(TAG_STOR, "Generated PIN SALT: ");
dump_hex1(TAG_STOR, STATE.PIN_SALT, sizeof STATE.PIN_SALT); dump_hex1(TAG_STOR, STATE.PIN_SALT, sizeof STATE.PIN_SALT);
}
/** Overwrite master secret from external source.
* @param keybytes an array of KEY_SPACE_BYTES length.
*
* This function should only be called from a privilege mode.
*/
void ctap_load_external_keys(uint8_t * keybytes){
memmove(STATE.key_space, keybytes, KEY_SPACE_BYTES);
authenticator_write_state(&STATE, 0);
authenticator_write_state(&STATE, 1);
crypto_load_master_secret(STATE.key_space);
} }
void ctap_init() void ctap_init()

View File

@ -361,6 +361,4 @@ extern uint8_t KEY_AGREEMENT_PUB[64];
void lock_device_permanently(); void lock_device_permanently();
void ctap_load_external_keys(uint8_t * keybytes);
#endif #endif

View File

@ -539,14 +539,11 @@ extern void _check_ret(CborError ret, int line, const char * filename);
#define check_hardcore(r) _check_ret(r,__LINE__, __FILE__);\ #define check_hardcore(r) _check_ret(r,__LINE__, __FILE__);\
if ((r) != CborNoError) exit(1); if ((r) != CborNoError) exit(1);
uint8_t ctaphid_custom_command(int len, CTAP_RESPONSE * ctap_resp, CTAPHID_WRITE_BUFFER * wb);
uint8_t ctaphid_handle_packet(uint8_t * pkt_raw) uint8_t ctaphid_handle_packet(uint8_t * pkt_raw)
{ {
uint8_t cmd = 0; uint8_t cmd;
uint32_t cid; uint32_t cid;
int len = 0; int len;
#ifndef DISABLE_CTAPHID_CBOR #ifndef DISABLE_CTAPHID_CBOR
int status; int status;
#endif #endif
@ -556,10 +553,6 @@ uint8_t ctaphid_handle_packet(uint8_t * pkt_raw)
CTAP_RESPONSE ctap_resp; CTAP_RESPONSE ctap_resp;
int bufstatus = ctaphid_buffer_packet(pkt_raw, &cmd, &cid, &len); int bufstatus = ctaphid_buffer_packet(pkt_raw, &cmd, &cid, &len);
ctaphid_write_buffer_init(&wb);
wb.cid = cid;
wb.cmd = cmd;
if (bufstatus == HID_IGNORE) if (bufstatus == HID_IGNORE)
{ {
@ -595,6 +588,9 @@ uint8_t ctaphid_handle_packet(uint8_t * pkt_raw)
case CTAPHID_PING: case CTAPHID_PING:
printf1(TAG_HID,"CTAPHID_PING\n"); printf1(TAG_HID,"CTAPHID_PING\n");
ctaphid_write_buffer_init(&wb);
wb.cid = cid;
wb.cmd = CTAPHID_PING;
wb.bcnt = len; wb.bcnt = len;
timestamp(); timestamp();
ctaphid_write(&wb, ctap_buffer, len); ctaphid_write(&wb, ctap_buffer, len);
@ -607,9 +603,13 @@ uint8_t ctaphid_handle_packet(uint8_t * pkt_raw)
case CTAPHID_WINK: case CTAPHID_WINK:
printf1(TAG_HID,"CTAPHID_WINK\n"); printf1(TAG_HID,"CTAPHID_WINK\n");
ctaphid_write_buffer_init(&wb);
device_wink(); device_wink();
wb.cid = cid;
wb.cmd = CTAPHID_WINK;
ctaphid_write(&wb,NULL,0); ctaphid_write(&wb,NULL,0);
break; break;
@ -634,6 +634,9 @@ uint8_t ctaphid_handle_packet(uint8_t * pkt_raw)
ctap_response_init(&ctap_resp); ctap_response_init(&ctap_resp);
status = ctap_request(ctap_buffer, len, &ctap_resp); status = ctap_request(ctap_buffer, len, &ctap_resp);
ctaphid_write_buffer_init(&wb);
wb.cid = cid;
wb.cmd = CTAPHID_CBOR;
wb.bcnt = (ctap_resp.length+1); wb.bcnt = (ctap_resp.length+1);
@ -664,6 +667,9 @@ uint8_t ctaphid_handle_packet(uint8_t * pkt_raw)
ctap_response_init(&ctap_resp); ctap_response_init(&ctap_resp);
u2f_request((struct u2f_request_apdu*)ctap_buffer, &ctap_resp); u2f_request((struct u2f_request_apdu*)ctap_buffer, &ctap_resp);
ctaphid_write_buffer_init(&wb);
wb.cid = cid;
wb.cmd = CTAPHID_MSG;
wb.bcnt = (ctap_resp.length); wb.bcnt = (ctap_resp.length);
ctaphid_write(&wb, ctap_resp.data, ctap_resp.length); ctaphid_write(&wb, ctap_resp.data, ctap_resp.length);
@ -674,14 +680,76 @@ uint8_t ctaphid_handle_packet(uint8_t * pkt_raw)
printf1(TAG_HID,"CTAPHID_CANCEL\n"); printf1(TAG_HID,"CTAPHID_CANCEL\n");
is_busy = 0; is_busy = 0;
break; break;
#if defined(IS_BOOTLOADER)
case CTAPHID_BOOT:
printf1(TAG_HID,"CTAPHID_BOOT\n");
ctap_response_init(&ctap_resp);
u2f_set_writeback_buffer(&ctap_resp);
is_busy = bootloader_bridge(len, ctap_buffer);
ctaphid_write_buffer_init(&wb);
wb.cid = cid;
wb.cmd = CTAPHID_BOOT;
wb.bcnt = (ctap_resp.length + 1);
ctaphid_write(&wb, &is_busy, 1);
ctaphid_write(&wb, ctap_resp.data, ctap_resp.length);
ctaphid_write(&wb, NULL, 0);
is_busy = 0;
break;
#endif
#if defined(SOLO_HACKER)
case CTAPHID_ENTERBOOT:
printf1(TAG_HID,"CTAPHID_ENTERBOOT\n");
boot_solo_bootloader();
ctaphid_write_buffer_init(&wb);
wb.cid = cid;
wb.cmd = CTAPHID_ENTERBOOT;
wb.bcnt = 0;
ctaphid_write(&wb, NULL, 0);
is_busy = 0;
break;
case CTAPHID_ENTERSTBOOT:
printf1(TAG_HID,"CTAPHID_ENTERBOOT\n");
boot_st_bootloader();
break;
#endif
#if !defined(IS_BOOTLOADER)
case CTAPHID_GETRNG:
printf1(TAG_HID,"CTAPHID_GETRNG\n");
ctap_response_init(&ctap_resp);
ctaphid_write_buffer_init(&wb);
wb.cid = cid;
wb.cmd = CTAPHID_GETRNG;
wb.bcnt = ctap_buffer[0];
if (!wb.bcnt)
wb.bcnt = 57;
memset(ctap_buffer,0,wb.bcnt);
ctap_generate_rng(ctap_buffer, wb.bcnt);
ctaphid_write(&wb, &ctap_buffer, wb.bcnt);
ctaphid_write(&wb, NULL, 0);
is_busy = 0;
break;
#endif
case CTAPHID_GETVERSION:
printf1(TAG_HID,"CTAPHID_GETVERSION\n");
ctap_response_init(&ctap_resp);
ctaphid_write_buffer_init(&wb);
wb.cid = cid;
wb.cmd = CTAPHID_GETVERSION;
wb.bcnt = 3;
ctap_buffer[0] = SOLO_VERSION_MAJ;
ctap_buffer[1] = SOLO_VERSION_MIN;
ctap_buffer[2] = SOLO_VERSION_PATCH;
ctaphid_write(&wb, &ctap_buffer, 3);
ctaphid_write(&wb, NULL, 0);
is_busy = 0;
break;
default: default:
if (ctaphid_custom_command(len, &ctap_resp, &wb) != 0){ printf2(TAG_ERR,"error, unimplemented HID cmd: %02x\r\n", buffer_cmd());
is_busy = 0; ctaphid_send_error(cid, CTAP1_ERR_INVALID_COMMAND);
}else{ break;
printf2(TAG_ERR, "error, unimplemented HID cmd: %02x\r\n", buffer_cmd());
ctaphid_send_error(cid, CTAP1_ERR_INVALID_COMMAND);
}
} }
cid_del(cid); cid_del(cid);
buffer_reset(); buffer_reset();
@ -691,112 +759,3 @@ uint8_t ctaphid_handle_packet(uint8_t * pkt_raw)
else return 0; else return 0;
} }
uint8_t ctaphid_custom_command(int len, CTAP_RESPONSE * ctap_resp, CTAPHID_WRITE_BUFFER * wb)
{
ctap_response_init(ctap_resp);
#if !defined(IS_BOOTLOADER) && (defined(SOLO_HACKER) || defined(SOLO_EXPERIMENTAL))
uint32_t param;
#endif
#if defined(IS_BOOTLOADER)
uint8_t is_busy;
#endif
switch(wb->cmd)
{
#if defined(IS_BOOTLOADER)
case CTAPHID_BOOT:
printf1(TAG_HID,"CTAPHID_BOOT\n");
u2f_set_writeback_buffer(ctap_resp);
is_busy = bootloader_bridge(len, ctap_buffer);
ctaphid_write(wb, &is_busy, 1);
ctaphid_write(wb, ctap_resp->data, ctap_resp->length);
ctaphid_write(wb, NULL, 0);
return 1;
#endif
#if defined(SOLO_HACKER)
case CTAPHID_ENTERBOOT:
printf1(TAG_HID,"CTAPHID_ENTERBOOT\n");
boot_solo_bootloader();
wb->bcnt = 0;
ctaphid_write(wb, NULL, 0);
return 1;
case CTAPHID_ENTERSTBOOT:
printf1(TAG_HID,"CTAPHID_ENTERBOOT\n");
boot_st_bootloader();
return 1;
#endif
#if !defined(IS_BOOTLOADER)
case CTAPHID_GETRNG:
printf1(TAG_HID,"CTAPHID_GETRNG\n");
wb->bcnt = ctap_buffer[0];
if (!wb->bcnt)
wb->bcnt = 57;
memset(ctap_buffer,0,wb->bcnt);
ctap_generate_rng(ctap_buffer, wb->bcnt);
ctaphid_write(wb, ctap_buffer, wb->bcnt);
ctaphid_write(wb, NULL, 0);
return 1;
break;
#endif
case CTAPHID_GETVERSION:
printf1(TAG_HID,"CTAPHID_GETVERSION\n");
wb->bcnt = 3;
ctap_buffer[0] = SOLO_VERSION_MAJ;
ctap_buffer[1] = SOLO_VERSION_MIN;
ctap_buffer[2] = SOLO_VERSION_PATCH;
ctaphid_write(wb, ctap_buffer, 3);
ctaphid_write(wb, NULL, 0);
return 1;
break;
#if !defined(IS_BOOTLOADER) && (defined(SOLO_HACKER) || defined(SOLO_EXPERIMENTAL))
case CTAPHID_LOADKEY:
/**
* Load external key. Useful for enabling backups.
* bytes: 4 96
* payload: | counter_increase (BE) | master_key |
*
* Counter should be increased by a large amount, e.g. (0x10000000)
* to outdo any previously lost/broken keys.
*/
printf1(TAG_HID,"CTAPHID_LOADKEY\n");
if (len != 100)
{
printf2(TAG_ERR,"Error, invalid length.\n");
ctaphid_send_error(wb->cid, CTAP1_ERR_INVALID_LENGTH);
return 1;
}
// Ask for THREE button presses
if (ctap_user_presence_test(8000) > 0)
if (ctap_user_presence_test(8000) > 0)
if (ctap_user_presence_test(8000) > 0)
{
ctap_load_external_keys(ctap_buffer + 4);
param = ctap_buffer[3];
param |= ctap_buffer[2] << 8;
param |= ctap_buffer[1] << 16;
param |= ctap_buffer[0] << 24;
ctap_atomic_count(param);
wb->bcnt = 0;
ctaphid_write(wb, NULL, 0);
return 1;
}
printf2(TAG_ERR, "Error, invalid length.\n");
ctaphid_send_error(wb->cid, CTAP2_ERR_OPERATION_DENIED);
return 1;
#endif
}
return 0;
}

View File

@ -29,7 +29,6 @@
#define CTAPHID_ENTERSTBOOT (TYPE_INIT | 0x52) #define CTAPHID_ENTERSTBOOT (TYPE_INIT | 0x52)
#define CTAPHID_GETRNG (TYPE_INIT | 0x60) #define CTAPHID_GETRNG (TYPE_INIT | 0x60)
#define CTAPHID_GETVERSION (TYPE_INIT | 0x61) #define CTAPHID_GETVERSION (TYPE_INIT | 0x61)
#define CTAPHID_LOADKEY (TYPE_INIT | 0x62)
// reserved for debug, not implemented except for HACKER and DEBUG_LEVEl > 0 // reserved for debug, not implemented except for HACKER and DEBUG_LEVEl > 0
#define CTAPHID_PROBE (TYPE_INIT | 0x70) #define CTAPHID_PROBE (TYPE_INIT | 0x70)

View File

@ -61,8 +61,8 @@ int ctap_user_presence_test(uint32_t delay);
int ctap_generate_rng(uint8_t * dst, size_t num); int ctap_generate_rng(uint8_t * dst, size_t num);
// Increment atomic counter and return it. // Increment atomic counter and return it.
// @param amount the amount to increase the counter by. // Must support two counters, @sel selects counter0 or counter1.
uint32_t ctap_atomic_count(uint32_t amount); uint32_t ctap_atomic_count(int sel);
// Verify the user // Verify the user
// return 1 if user is verified, 0 if not // return 1 if user is verified, 0 if not

View File

@ -313,11 +313,20 @@ int ctap_user_verification(uint8_t arg)
} }
uint32_t ctap_atomic_count(uint32_t amount) uint32_t ctap_atomic_count(int sel)
{ {
static uint32_t counter1 = 25; static uint32_t counter1 = 25;
counter1 += amount; /*return 713;*/
return counter1; if (sel == 0)
{
printf1(TAG_RED,"counter1: %d\n", counter1);
return counter1++;
}
else
{
printf2(TAG_ERR,"counter2 not imple\n");
exit(1);
}
} }
int ctap_generate_rng(uint8_t * dst, size_t num) int ctap_generate_rng(uint8_t * dst, size_t num)

View File

@ -8,21 +8,25 @@
#include "device.h" #include "device.h"
#include "nfc.h" #include "nfc.h"
static void flush_rx() static void flush_rx(void)
{ {
while(LL_SPI_IsActiveFlag_RXNE(SPI1) != 0) while(LL_SPI_IsActiveFlag_RXNE(SPI1) != 0)
{ {
LL_SPI_ReceiveData8(SPI1); LL_SPI_ReceiveData8(SPI1);
} }
} }
static void wait_for_tx()
static void wait_for_tx(void)
{ {
// while (LL_SPI_IsActiveFlag_BSY(SPI1) == 1) // while (LL_SPI_IsActiveFlag_BSY(SPI1) == 1)
// ; // ;
while(LL_SPI_GetTxFIFOLevel(SPI1) != LL_SPI_TX_FIFO_EMPTY) while(LL_SPI_GetTxFIFOLevel(SPI1) != LL_SPI_TX_FIFO_EMPTY)
; ;
} }
static void wait_for_rx()
static void wait_for_rx(void)
{ {
while(LL_SPI_IsActiveFlag_RXNE(SPI1) == 0) while(LL_SPI_IsActiveFlag_RXNE(SPI1) == 0)
; ;
@ -270,7 +274,7 @@ void ams_print_int1(uint8_t int0)
#endif #endif
} }
int ams_init() int ams_init(void)
{ {
LL_GPIO_SetPinMode(SOLO_AMS_CS_PORT,SOLO_AMS_CS_PIN,LL_GPIO_MODE_OUTPUT); LL_GPIO_SetPinMode(SOLO_AMS_CS_PORT,SOLO_AMS_CS_PIN,LL_GPIO_MODE_OUTPUT);
LL_GPIO_SetOutputPin(SOLO_AMS_CS_PORT,SOLO_AMS_CS_PIN); LL_GPIO_SetOutputPin(SOLO_AMS_CS_PORT,SOLO_AMS_CS_PIN);
@ -292,7 +296,7 @@ int ams_init()
return 0; return 0;
} }
void ams_configure() void ams_configure(void)
{ {
// Should not be used during passive operation. // Should not be used during passive operation.
uint8_t block[4]; uint8_t block[4];

View File

@ -39,8 +39,8 @@ typedef union
#define SELECT() LL_GPIO_ResetOutputPin(SOLO_AMS_CS_PORT,SOLO_AMS_CS_PIN) #define SELECT() LL_GPIO_ResetOutputPin(SOLO_AMS_CS_PORT,SOLO_AMS_CS_PIN)
#define UNSELECT() LL_GPIO_SetOutputPin(SOLO_AMS_CS_PORT,SOLO_AMS_CS_PIN) #define UNSELECT() LL_GPIO_SetOutputPin(SOLO_AMS_CS_PORT,SOLO_AMS_CS_PIN)
int ams_init(); int ams_init(void);
void ams_configure(); void ams_configure(void);
void ams_read_buffer(uint8_t * data, int len); void ams_read_buffer(uint8_t * data, int len);
void ams_write_buffer(uint8_t * data, int len); void ams_write_buffer(uint8_t * data, int len);

View File

@ -61,12 +61,13 @@ static uint8_t master_secret[64];
static uint8_t transport_secret[32]; static uint8_t transport_secret[32];
void crypto_sha256_init() void crypto_sha256_init(void)
{ {
sha256_init(&sha256_ctx); sha256_init(&sha256_ctx);
} }
void crypto_sha512_init() { void crypto_sha512_init(void)
{
cf_sha512_init(&sha512_ctx); cf_sha512_init(&sha512_ctx);
} }
@ -79,7 +80,7 @@ void crypto_load_master_secret(uint8_t * key)
memmove(transport_secret, key+64, 32); memmove(transport_secret, key+64, 32);
} }
void crypto_reset_master_secret() void crypto_reset_master_secret(void)
{ {
memset(master_secret, 0, 64); memset(master_secret, 0, 64);
memset(transport_secret, 0, 32); memset(transport_secret, 0, 32);
@ -107,7 +108,8 @@ void crypto_sha256_final(uint8_t * hash)
sha256_final(&sha256_ctx, hash); sha256_final(&sha256_ctx, hash);
} }
void crypto_sha512_final(uint8_t * hash) { void crypto_sha512_final(uint8_t * hash)
{
// NB: there is also cf_sha512_digest // NB: there is also cf_sha512_digest
cf_sha512_digest_final(&sha512_ctx, hash); cf_sha512_digest_final(&sha512_ctx, hash);
} }
@ -183,14 +185,14 @@ void crypto_sha256_hmac_final(uint8_t * key, uint32_t klen, uint8_t * hmac)
} }
void crypto_ecc256_init() void crypto_ecc256_init(void)
{ {
uECC_set_rng((uECC_RNG_Function)ctap_generate_rng); uECC_set_rng((uECC_RNG_Function)ctap_generate_rng);
_es256_curve = uECC_secp256r1(); _es256_curve = uECC_secp256r1();
} }
void crypto_ecc256_load_attestation_key() void crypto_ecc256_load_attestation_key(void)
{ {
static uint8_t _key [32]; static uint8_t _key [32];
memmove(_key, (uint8_t*)ATTESTATION_KEY_ADDR, 32); memmove(_key, (uint8_t*)ATTESTATION_KEY_ADDR, 32);

View File

@ -34,7 +34,7 @@
#define LOW_FREQUENCY 1 #define LOW_FREQUENCY 1
#define HIGH_FREQUENCY 0 #define HIGH_FREQUENCY 0
void wait_for_usb_tether(); void wait_for_usb_tether(void);
uint32_t __90_ms = 0; uint32_t __90_ms = 0;
@ -48,12 +48,12 @@ static bool isLowFreq = 0;
static bool _up_disabled = false; static bool _up_disabled = false;
// #define IS_BUTTON_PRESSED() (0 == (LL_GPIO_ReadInputPort(SOLO_BUTTON_PORT) & SOLO_BUTTON_PIN)) // #define IS_BUTTON_PRESSED() (0 == (LL_GPIO_ReadInputPort(SOLO_BUTTON_PORT) & SOLO_BUTTON_PIN))
static int is_physical_button_pressed() static int is_physical_button_pressed(void)
{ {
return (0 == (LL_GPIO_ReadInputPort(SOLO_BUTTON_PORT) & SOLO_BUTTON_PIN)); return (0 == (LL_GPIO_ReadInputPort(SOLO_BUTTON_PORT) & SOLO_BUTTON_PIN));
} }
static int is_touch_button_pressed() static int is_touch_button_pressed(void)
{ {
int is_pressed = (tsc_read_button(0) || tsc_read_button(1)); int is_pressed = (tsc_read_button(0) || tsc_read_button(1));
#ifndef IS_BOOTLOADER #ifndef IS_BOOTLOADER
@ -69,7 +69,7 @@ static int is_touch_button_pressed()
int (*IS_BUTTON_PRESSED)() = is_physical_button_pressed; int (*IS_BUTTON_PRESSED)() = is_physical_button_pressed;
static void edge_detect_touch_button() static void edge_detect_touch_button(void)
{ {
static uint8_t last_touch = 0; static uint8_t last_touch = 0;
uint8_t current_touch = 0; uint8_t current_touch = 0;
@ -92,12 +92,13 @@ static void edge_detect_touch_button()
} }
void device_disable_up(bool disable) { void device_disable_up(bool disable)
{
_up_disabled = disable; _up_disabled = disable;
} }
// Timer6 overflow handler. happens every ~90ms. // Timer6 overflow handler. happens every ~90ms.
void TIM6_DAC_IRQHandler() void TIM6_DAC_IRQHandler(void)
{ {
// timer is only 16 bits, so roll it over here // timer is only 16 bits, so roll it over here
TIM6->SR = 0; TIM6->SR = 0;
@ -142,7 +143,7 @@ void USB_IRQHandler(void)
HAL_PCD_IRQHandler(&hpcd); HAL_PCD_IRQHandler(&hpcd);
} }
uint32_t millis() uint32_t millis(void)
{ {
return (((uint32_t)TIM6->CNT) + (__90_ms * 90)); return (((uint32_t)TIM6->CNT) + (__90_ms * 90));
} }
@ -160,7 +161,7 @@ void device_set_status(uint32_t status)
__device_status = status; __device_status = status;
} }
int device_is_button_pressed() int device_is_button_pressed(void)
{ {
return IS_BUTTON_PRESSED(); return IS_BUTTON_PRESSED();
} }
@ -171,12 +172,13 @@ void delay(uint32_t ms)
while ((millis() - time) < ms) while ((millis() - time) < ms)
; ;
} }
void device_reboot()
void device_reboot(void)
{ {
NVIC_SystemReset(); NVIC_SystemReset();
} }
void device_init_button() void device_init_button(void)
{ {
if (tsc_sensor_exists()) if (tsc_sensor_exists())
{ {
@ -226,12 +228,12 @@ void device_init(int argc, char *argv[])
} }
int device_is_nfc() int device_is_nfc(void)
{ {
return _NFC_status; return _NFC_status;
} }
void wait_for_usb_tether() void wait_for_usb_tether(void)
{ {
while (USBD_OK != CDC_Transmit_FS((uint8_t*)"tethered\r\n", 10) ) while (USBD_OK != CDC_Transmit_FS((uint8_t*)"tethered\r\n", 10) )
; ;
@ -242,7 +244,7 @@ void wait_for_usb_tether()
; ;
} }
void usbhid_init() void usbhid_init(void)
{ {
if (!isLowFreq) if (!isLowFreq)
{ {
@ -292,12 +294,12 @@ void ctaphid_write_block(uint8_t * data)
} }
void usbhid_close() void usbhid_close(void)
{ {
} }
void main_loop_delay() void main_loop_delay(void)
{ {
} }
@ -307,13 +309,14 @@ static uint32_t winkt1 = 0;
#ifdef LED_WINK_VALUE #ifdef LED_WINK_VALUE
static uint32_t winkt2 = 0; static uint32_t winkt2 = 0;
#endif #endif
void device_wink()
void device_wink(void)
{ {
wink_time = 10; wink_time = 10;
winkt1 = 0; winkt1 = 0;
} }
void heartbeat() void heartbeat(void)
{ {
static int state = 0; static int state = 0;
static uint32_t val = (LED_MAX_SCALER - LED_MIN_SCALER)/2; static uint32_t val = (LED_MAX_SCALER - LED_MIN_SCALER)/2;
@ -382,7 +385,7 @@ void authenticator_read_backup_state(AuthenticatorState * a)
} }
// Return 1 yes backup is init'd, else 0 // Return 1 yes backup is init'd, else 0
int authenticator_is_backup_initialized() int authenticator_is_backup_initialized(void)
{ {
uint8_t header[16]; uint8_t header[16];
uint32_t * ptr = (uint32_t *)flash_addr(STATE2_PAGE); uint32_t * ptr = (uint32_t *)flash_addr(STATE2_PAGE);
@ -407,7 +410,7 @@ void authenticator_write_state(AuthenticatorState * a, int backup)
} }
} }
uint32_t ctap_atomic_count(uint32_t amount) uint32_t ctap_atomic_count(int sel)
{ {
int offset = 0; int offset = 0;
uint32_t * ptr = (uint32_t *)flash_addr(COUNTER1_PAGE); uint32_t * ptr = (uint32_t *)flash_addr(COUNTER1_PAGE);
@ -422,12 +425,10 @@ uint32_t ctap_atomic_count(uint32_t amount)
uint32_t lastc = 0; uint32_t lastc = 0;
if (amount == 0) if (sel != 0)
{ {
// Use a random count [1-16]. printf2(TAG_ERR,"counter2 not imple\n");
uint8_t rng[1]; exit(1);
ctap_generate_rng(rng, 1);
amount = (rng[0] & 0x0f) + 1;
} }
for (offset = 0; offset < PAGE_SIZE/4; offset += 2) // wear-level the flash for (offset = 0; offset < PAGE_SIZE/4; offset += 2) // wear-level the flash
@ -460,7 +461,7 @@ uint32_t ctap_atomic_count(uint32_t amount)
return lastc; return lastc;
} }
lastc += amount; lastc++;
if (lastc/256 > erases) if (lastc/256 > erases)
{ {
@ -501,7 +502,7 @@ uint32_t ctap_atomic_count(uint32_t amount)
void device_manage() void device_manage(void)
{ {
#if NON_BLOCK_PRINTING #if NON_BLOCK_PRINTING
int i = 10; int i = 10;
@ -527,7 +528,7 @@ void device_manage()
#endif #endif
} }
static int handle_packets() static int handle_packets(void)
{ {
static uint8_t hidmsg[HID_PACKET_SIZE]; static uint8_t hidmsg[HID_PACKET_SIZE];
memset(hidmsg,0, sizeof(hidmsg)); memset(hidmsg,0, sizeof(hidmsg));
@ -563,6 +564,7 @@ static int wait_for_button_activate(uint32_t wait)
} while (!IS_BUTTON_PRESSED()); } while (!IS_BUTTON_PRESSED());
return 0; return 0;
} }
static int wait_for_button_release(uint32_t wait) static int wait_for_button_release(uint32_t wait)
{ {
int ret; int ret;
@ -656,7 +658,7 @@ int ctap_user_verification(uint8_t arg)
return 1; return 1;
} }
void ctap_reset_rk() void ctap_reset_rk(void)
{ {
int i; int i;
printf1(TAG_GREEN, "resetting RK \r\n"); printf1(TAG_GREEN, "resetting RK \r\n");
@ -666,7 +668,7 @@ void ctap_reset_rk()
} }
} }
uint32_t ctap_rk_size() uint32_t ctap_rk_size(void)
{ {
return RK_NUM_PAGES * (PAGE_SIZE / sizeof(CTAP_residentKey)); return RK_NUM_PAGES * (PAGE_SIZE / sizeof(CTAP_residentKey));
} }
@ -728,7 +730,7 @@ void ctap_overwrite_rk(int index,CTAP_residentKey * rk)
} }
} }
void boot_st_bootloader() void boot_st_bootloader(void)
{ {
__disable_irq(); __disable_irq();
@ -740,7 +742,7 @@ void boot_st_bootloader()
; ;
} }
void boot_solo_bootloader() void boot_solo_bootloader(void)
{ {
LL_IWDG_Enable(IWDG); LL_IWDG_Enable(IWDG);

View File

@ -14,12 +14,12 @@
#include "log.h" #include "log.h"
#include "device.h" #include "device.h"
static void flash_lock() static void flash_lock(void)
{ {
FLASH->CR |= (1U<<31); FLASH->CR |= (1U<<31);
} }
static void flash_unlock() static void flash_unlock(void)
{ {
if (FLASH->CR & FLASH_CR_LOCK) if (FLASH->CR & FLASH_CR_LOCK)
{ {

View File

@ -699,7 +699,7 @@ void SystemClock_Config_LF20(void)
SET_BIT(RCC->APB1ENR1, RCC_APB1ENR1_PWREN); SET_BIT(RCC->APB1ENR1, RCC_APB1ENR1_PWREN);
} }
void init_usb() void init_usb(void)
{ {
// enable USB power // enable USB power
SET_BIT(PWR->CR2, PWR_CR2_USV); SET_BIT(PWR->CR2, PWR_CR2_USV);

View File

@ -22,7 +22,7 @@
#ifndef _INIT_H_ #ifndef _INIT_H_
#define _INIT_H_ #define _INIT_H_
void init_usb(); void init_usb(void);
void init_gpio(void); void init_gpio(void);
void init_debug_uart(void); void init_debug_uart(void);
void init_pwm(void); void init_pwm(void);

View File

@ -57,10 +57,11 @@ void TIM6_DAC_IRQHandler()
__90_ms += 1; __90_ms += 1;
} }
uint32_t millis() uint32_t millis(void)
{ {
return (((uint32_t)TIM6->CNT) + (__90_ms * 90)); return (((uint32_t)TIM6->CNT) + (__90_ms * 90));
} }
void _Error_Handler(char *file, int line) void _Error_Handler(char *file, int line)
{ {
while(1) while(1)

View File

@ -359,7 +359,7 @@ static uint32_t WTX_timer;
bool WTX_process(int read_timeout); bool WTX_process(int read_timeout);
void WTX_clear() void WTX_clear(void)
{ {
WTX_sent = false; WTX_sent = false;
WTX_fail = false; WTX_fail = false;
@ -374,7 +374,7 @@ bool WTX_on(int WTX_time)
return true; return true;
} }
bool WTX_off() bool WTX_off(void)
{ {
WTX_timer = 0; WTX_timer = 0;
@ -398,7 +398,7 @@ bool WTX_off()
return true; return true;
} }
void WTX_timer_exec() void WTX_timer_exec(void)
{ {
// condition: (timer on) or (not expired[300ms]) // condition: (timer on) or (not expired[300ms])
if ((WTX_timer == 0) || WTX_timer + 300 > millis()) if ((WTX_timer == 0) || WTX_timer + 300 > millis())
@ -856,7 +856,7 @@ void nfc_process_iblock(uint8_t * buf, int len)
static uint8_t ibuf[1024]; static uint8_t ibuf[1024];
static int ibuflen = 0; static int ibuflen = 0;
void clear_ibuf() void clear_ibuf(void)
{ {
ibuflen = 0; ibuflen = 0;
memset(ibuf, 0, sizeof(ibuf)); memset(ibuf, 0, sizeof(ibuf));
@ -969,7 +969,7 @@ void nfc_process_block(uint8_t * buf, unsigned int len)
} }
} }
int nfc_loop() int nfc_loop(void)
{ {
uint8_t buf[32]; uint8_t buf[32];
AMS_DEVICE ams; AMS_DEVICE ams;

View File

@ -6,9 +6,9 @@
#include "apdu.h" #include "apdu.h"
// Return number of bytes read if any. // Return number of bytes read if any.
int nfc_loop(); int nfc_loop(void);
int nfc_init(); int nfc_init(void);
typedef struct typedef struct
{ {
@ -61,6 +61,6 @@ typedef enum
APP_FIDO, APP_FIDO,
} APPLETS; } APPLETS;
void WTX_timer_exec(); void WTX_timer_exec(void);
#endif #endif

View File

@ -8,7 +8,7 @@
#define ELECTRODE_0 TSC_GROUP2_IO1 #define ELECTRODE_0 TSC_GROUP2_IO1
#define ELECTRODE_1 TSC_GROUP2_IO2 #define ELECTRODE_1 TSC_GROUP2_IO2
void tsc_init() void tsc_init(void)
{ {
LL_GPIO_InitTypeDef GPIO_InitStruct; LL_GPIO_InitTypeDef GPIO_InitStruct;
// Enable TSC clock // Enable TSC clock
@ -74,7 +74,7 @@ void tsc_set_electrode(uint32_t channel_ids)
TSC->IOCCR = (channel_ids); TSC->IOCCR = (channel_ids);
} }
void tsc_start_acq() void tsc_start_acq(void)
{ {
TSC->CR &= ~(TSC_CR_START); TSC->CR &= ~(TSC_CR_START);
@ -86,7 +86,7 @@ void tsc_start_acq()
TSC->CR |= TSC_CR_START; TSC->CR |= TSC_CR_START;
} }
void tsc_wait_on_acq() void tsc_wait_on_acq(void)
{ {
while ( ! (TSC->ISR & TSC_FLAG_EOA) ) while ( ! (TSC->ISR & TSC_FLAG_EOA) )
; ;
@ -117,7 +117,7 @@ uint32_t tsc_read_button(uint32_t index)
return tsc_read(1) < 45; return tsc_read(1) < 45;
} }
int tsc_sensor_exists() int tsc_sensor_exists(void)
{ {
static uint8_t does = 0; static uint8_t does = 0;
if (does) return 1; if (does) return 1;

View File

@ -3,9 +3,9 @@
#include <stdint.h> #include <stdint.h>
void tsc_init(); void tsc_init(void);
int tsc_sensor_exists(); int tsc_sensor_exists(void);
// Read button0 or button1 // Read button0 or button1
// Returns 1 if pressed, 0 if not. // Returns 1 if pressed, 0 if not.