/* U2FDevice - A program to allow Raspberry Pi Zeros to act as U2F tokens Copyright (C) 2018 Michael Kuc This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see . */ #include "U2F_Authenticate_APDU.hpp" #include "APDU.hpp" #include "Field.hpp" #include "Field.tpp" #include "Signature.hpp" #include "U2FMessage.hpp" #include "micro-ecc/uECC.h" #include "u2f.hpp" #include #include using namespace std; U2F_Authenticate_APDU::U2F_Authenticate_APDU(const U2F_Msg_CMD& msg, const vector& data) : U2F_Msg_CMD{ msg } { if (p2 != 0) { // Invalid U2F (APDU) parameter detected throw APDU_STATUS::SW_CONDITIONS_NOT_SATISFIED; } else if (data.size() < 66) { // Invalid authentication request throw APDU_STATUS::SW_WRONG_LENGTH; } copy(data.begin() + 0, data.begin() + 32, challengeP.begin()); copy(data.begin() + 32, data.begin() + 64, appParam.begin()); uint8_t keyHLen = data[64]; copy(data.begin() + 65, data.begin() + 65 + keyHLen, back_inserter(keyH)); } void U2F_Authenticate_APDU::respond(const uint32_t channelID) const { if (keyH.size() != sizeof(Storage::KeyHandle)) { // Respond with error code - key handle is of wrong size cerr << "Invalid key handle length" << endl; this->error(channelID, APDU_STATUS::SW_WRONG_DATA); return; } auto keyHB = *reinterpret_cast(keyH.data()); if (Storage::appParams.find(keyHB) == Storage::appParams.end()) { // Respond with error code - key handle doesn't exist in storage cerr << "Invalid key handle" << endl; this->error(channelID, APDU_STATUS::SW_WRONG_DATA); return; } auto appMatches = (Storage::appParams.at(keyHB) == appParam); if (!appMatches) { this->error(channelID, APDU_STATUS::SW_WRONG_DATA); return; } switch (p1) { case ControlCode::CheckOnly: this->error(channelID, APDU_STATUS::SW_CONDITIONS_NOT_SATISFIED); return; case ControlCode::EnforcePresenceSign: // Continue processing case ControlCode::DontEnforcePresenceSign: // Continue processing break; default: cerr << "Unknown APDU authentication command" << endl; this->error(channelID, APDU_STATUS::SW_INS_NOT_SUPPORTED); return; } U2FMessage msg{}; msg.cid = channelID; msg.cmd = U2FHID_MSG; auto& response = msg.data; APDU_STATUS statusCode = APDU_STATUS::SW_NO_ERROR; const auto& privKey = Storage::privKeys[keyHB]; auto& keyCount = Storage::keyCounts[keyHB]; keyCount++; response.push_back(0x01); response.insert(response.end(), FIELD_BE(keyCount)); Digest digest; { mbedtls_sha256_context shaContext; mbedtls_sha256_init(&shaContext); mbedtls_sha256_starts(&shaContext, 0); mbedtls_sha256_update(&shaContext, reinterpret_cast(appParam.data()), sizeof(appParam)); uint8_t userPresence{ 1u }; mbedtls_sha256_update(&shaContext, &userPresence, 1); const auto beCounter = beEncode(keyCount); mbedtls_sha256_update(&shaContext, beCounter.data(), beCounter.size()); mbedtls_sha256_update(&shaContext, challengeP.data(), challengeP.size()); mbedtls_sha256_finish(&shaContext, digest.data()); mbedtls_sha256_free(&shaContext); } Signature signature{}; uECC_sign(privKey.data(), digest.data(), digest.size(), signature.data(), uECC_secp256r1()); appendSignatureAsDER(response, signature); response.insert(response.end(), FIELD_BE(statusCode)); msg.write(); }