142 lines
4.1 KiB
C
142 lines
4.1 KiB
C
/*
|
|
Copyright 2018 Conor Patrick
|
|
|
|
Permission is hereby granted, free of charge, to any person obtaining a copy of
|
|
this software and associated documentation files (the "Software"), to deal in
|
|
the Software without restriction, including without limitation the rights to
|
|
use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies
|
|
of the Software, and to permit persons to whom the Software is furnished to do
|
|
so, subject to the following conditions:
|
|
|
|
The above copyright notice and this permission notice shall be included in all
|
|
copies or substantial portions of the Software.
|
|
|
|
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
|
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
|
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
|
SOFTWARE.
|
|
*/
|
|
#include <stdint.h>
|
|
#include "extensions.h"
|
|
#include "u2f.h"
|
|
#include "wallet.h"
|
|
#include "device.h"
|
|
|
|
#include "log.h"
|
|
|
|
#define htonl(x) (((x & 0xff) << 24) | ((x & 0xff00) << 8) \
|
|
| ((x & 0xff0000) >> 8) | ((x & 0xff000000) >> 24) )
|
|
|
|
int is_extension_request(uint8_t * kh, int len)
|
|
{
|
|
wallet_request * req = (wallet_request *) kh;
|
|
|
|
if (len < WALLET_MIN_LENGTH)
|
|
return 0;
|
|
|
|
return memcmp(req->tag, WALLET_TAG, sizeof(WALLET_TAG)-1) == 0;
|
|
}
|
|
|
|
|
|
int extension_needs_atomic_count(uint8_t klen, uint8_t * keyh)
|
|
{
|
|
return ((wallet_request *) keyh)->operation == WalletRegister
|
|
|| ((wallet_request *) keyh)->operation == WalletSign;
|
|
}
|
|
|
|
int16_t bridge_u2f_to_extensions(uint8_t * _chal, uint8_t * _appid, uint8_t klen, uint8_t * keyh)
|
|
{
|
|
int8_t ret = 0;
|
|
uint32_t count;
|
|
uint8_t up = 1;
|
|
uint8_t sig[72];
|
|
if (extension_needs_atomic_count(klen, keyh))
|
|
{
|
|
count = htonl(ctap_atomic_count(0));
|
|
}
|
|
else
|
|
{
|
|
count = htonl(10);
|
|
}
|
|
|
|
u2f_response_writeback(&up,1);
|
|
u2f_response_writeback((uint8_t *)&count,4);
|
|
u2f_response_writeback((uint8_t *)&ret,1);
|
|
#ifdef IS_BOOTLOADER
|
|
ret = bootloader_bridge(klen, keyh);
|
|
#elif defined(WALLET_EXTENSION)
|
|
ret = bridge_u2f_to_wallet(_chal, _appid, klen, keyh);
|
|
#endif
|
|
|
|
if (ret != 0)
|
|
{
|
|
u2f_reset_response();
|
|
u2f_response_writeback(&up,1);
|
|
u2f_response_writeback((uint8_t *)&count,4);
|
|
|
|
memset(sig,0,sizeof(sig));
|
|
sig[0] = ret;
|
|
u2f_response_writeback(sig,72);
|
|
}
|
|
|
|
return U2F_SW_NO_ERROR;
|
|
}
|
|
|
|
int16_t extend_u2f(struct u2f_request_apdu* req, uint32_t len)
|
|
{
|
|
|
|
struct u2f_authenticate_request * auth = (struct u2f_authenticate_request *) req->payload;
|
|
uint16_t rcode;
|
|
|
|
if (req->ins == U2F_AUTHENTICATE)
|
|
{
|
|
if (req->p1 == U2F_AUTHENTICATE_CHECK)
|
|
{
|
|
|
|
if (is_extension_request((uint8_t *) &auth->kh, auth->khl)) // Pin requests
|
|
{
|
|
rcode = U2F_SW_CONDITIONS_NOT_SATISFIED;
|
|
}
|
|
else
|
|
{
|
|
rcode = U2F_SW_WRONG_DATA;
|
|
}
|
|
printf1(TAG_EXT,"Ignoring U2F request\n");
|
|
dump_hex1(TAG_EXT, (uint8_t *) &auth->kh, auth->khl);
|
|
goto end;
|
|
}
|
|
else
|
|
{
|
|
if ( ! is_extension_request((uint8_t *) &auth->kh, auth->khl)) // Pin requests
|
|
{
|
|
rcode = U2F_SW_WRONG_PAYLOAD;
|
|
printf1(TAG_EXT, "Ignoring U2F request\n");
|
|
dump_hex1(TAG_EXT, (uint8_t *) &auth->kh, auth->khl);
|
|
goto end;
|
|
}
|
|
rcode = bridge_u2f_to_extensions(auth->chal, auth->app, auth->khl, (uint8_t*)&auth->kh);
|
|
}
|
|
}
|
|
else if (req->ins == U2F_VERSION)
|
|
{
|
|
printf1(TAG_EXT, "U2F_VERSION\n");
|
|
if (len)
|
|
{
|
|
rcode = U2F_SW_WRONG_LENGTH;
|
|
}
|
|
else
|
|
{
|
|
rcode = u2f_version();
|
|
}
|
|
}
|
|
else
|
|
{
|
|
rcode = U2F_SW_INS_NOT_SUPPORTED;
|
|
}
|
|
end:
|
|
return rcode;
|
|
}
|