diff --git a/CMakeLists.txt b/CMakeLists.txt index 39cdbe3..35864ad 100644 --- a/CMakeLists.txt +++ b/CMakeLists.txt @@ -65,6 +65,7 @@ target_sources(pico_fido PUBLIC ${CMAKE_CURRENT_LIST_DIR}/src/fido/cbor_config.c ${CMAKE_CURRENT_LIST_DIR}/src/fido/cbor_vendor.c ${CMAKE_CURRENT_LIST_DIR}/src/fido/cbor_large_blobs.c + ${CMAKE_CURRENT_LIST_DIR}/src/fido/oath.c ) set(HSM_DRIVER "hid") set(USB_ITF_HID 1) diff --git a/src/fido/files.h b/src/fido/files.h index 32fab52..3a459f2 100644 --- a/src/fido/files.h +++ b/src/fido/files.h @@ -32,6 +32,8 @@ #define EF_CRED 0xCF00 // Creds at 0xCF00 - 0xCFFF #define EF_RP 0xD000 // RPs at 0xD000 - 0xD0FF #define EF_LARGEBLOB 0x1101 // Large Blob Array +#define EF_OATH_CRED 0xBA00 // OATH Creds at 0xBA00 - 0xBAFE +#define EF_OATH_CODE 0xBAFF extern file_t *ef_keydev; extern file_t *ef_certdev; diff --git a/src/fido/oath.c b/src/fido/oath.c new file mode 100644 index 0000000..c2fa832 --- /dev/null +++ b/src/fido/oath.c @@ -0,0 +1,245 @@ +/* + * This file is part of the Pico FIDO distribution (https://github.com/polhenarejos/pico-fido). + * Copyright (c) 2022 Pol Henarejos. + * + * This program is free software: you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation, version 3. + * + * This program is distributed in the hope that it will be useful, but + * WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU + * General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program. If not, see . + */ + +#include "common.h" +#include "fido.h" +#include "hsm.h" +#include "apdu.h" +#include "ctap.h" +#include "files.h" +#include "file.h" +#include "usb.h" +#include "random.h" +#include "bsp/board.h" +#include "mbedtls/ecdsa.h" +#include "mbedtls/x509_crt.h" +#include "mbedtls/hkdf.h" +#include "pk_wrap.h" +#include "crypto_utils.h" +#include "ccid.h" +#include "version.h" +#include "asn1.h" +#include + +#define MAX_OATH_CRED 255 +#define CHALLENGE_LEN 8 + +#define TAG_NAME 0x71 +#define TAG_NAME_LIST 0x72 +#define TAG_KEY 0x73 +#define TAG_CHALLENGE 0x74 +#define TAG_RESPONSE 0x75 +#define TAG_T_RESPONSE 0x76 +#define TAG_NO_RESPONSE 0x77 +#define TAG_PROPERTY 0x78 +#define TAG_VERSION 0x79 +#define TAG_IMF 0x7a +#define TAG_ALGO 0x7b +#define TAG_TOUCH_RESPONSE 0x7c + +#define ALG_HMAC_SHA1 0x01 +#define ALG_HMAC_SHA256 0x02 +#define ALG_HMAC_SHA512 0x03 +#define ALG_MASK 0x0f + +#define OATH_TYPE_HOTP 0x10 +#define OATH_TYPE_TOTP 0x20 +#define OATH_TYPE_MASK 0xf0 + +#define PROP_INC 0x01 +#define PROP_TOUCH 0x02 + +int oath_process_apdu(); +int oath_unload(); + +static bool validated = true; +static uint8_t challenge[CHALLENGE_LEN] = {0}; + +const uint8_t oath_aid[] = { + 7, + 0xa0, 0x00, 0x00, 0x05, 0x27, 0x21, 0x01 +}; + +app_t *oath_select(app_t *a, const uint8_t *aid, uint8_t aid_len) { + if (!memcmp(aid, oath_aid+1, MIN(aid_len,oath_aid[0]))) { + a->aid = oath_aid; + a->process_apdu = oath_process_apdu; + a->unload = oath_unload; + res_APDU_size = 0; + res_APDU[res_APDU_size++] = TAG_VERSION; + res_APDU[res_APDU_size++] = 2; + res_APDU[res_APDU_size++] = PICO_FIDO_VERSION_MAJOR; + res_APDU[res_APDU_size++] = PICO_FIDO_VERSION_MINOR; + res_APDU[res_APDU_size++] = TAG_NAME; + res_APDU[res_APDU_size++] = 9; + memcpy(res_APDU+res_APDU_size, (const uint8_t *)"Pico Fido", 9); res_APDU_size += 9; + pico_get_unique_board_id((pico_unique_board_id_t *)(res_APDU+res_APDU_size)); res_APDU_size += 8; + if (file_has_data(search_dynamic_file(EF_OATH_CODE)) == true) { + res_APDU[res_APDU_size++] = TAG_CHALLENGE; + res_APDU[res_APDU_size++] = sizeof(challenge); + memcpy(res_APDU+res_APDU_size, challenge, sizeof(challenge)); res_APDU_size += sizeof(challenge); + } + return a; + } + return NULL; +} + +void __attribute__ ((constructor)) oath_ctor() { + register_app(oath_select); +} + +int oath_unload() { + return CCID_OK; +} + +int cmd_put() { + if (validated == false) + return SW_SECURITY_STATUS_NOT_SATISFIED(); + for (int i = 0; i < MAX_OATH_CRED; i++) { + file_t *ef = search_dynamic_file(EF_OATH_CRED + i); + if (!file_has_data(ef)) { + ef = file_new(EF_OATH_CRED + i); + flash_write_data_to_file(ef, apdu.data, apdu.nc); + low_flash_available(); + return SW_OK(); + } + } + return SW_FILE_FULL(); +} + +int cmd_delete() { + size_t tag_len = 0, ef_tag_len = 0; + uint8_t *tag_data = NULL, *ef_tag_data = NULL; + if (validated == false) + return SW_SECURITY_STATUS_NOT_SATISFIED(); + if (asn1_find_tag(apdu.data, apdu.nc, TAG_NAME, &tag_len, &tag_data) == true) { + for (int i = 0; i < MAX_OATH_CRED; i++) { + file_t *ef = search_dynamic_file(EF_OATH_CRED + i); + if (file_has_data(ef) && asn1_find_tag(file_get_data(ef), file_get_size(ef), TAG_NAME, &ef_tag_len, &ef_tag_data) == true && ef_tag_len == tag_len && memcmp(ef_tag_data, tag_data, tag_len) == 0) { + delete_file(ef); + return SW_OK(); + } + } + return SW_DATA_INVALID(); + } + return SW_INCORRECT_PARAMS(); +} + +int cmd_set_code() { + if (validated == false) + return SW_SECURITY_STATUS_NOT_SATISFIED(); + if (apdu.nc == 0) { + delete_file(search_dynamic_file(EF_OATH_CODE)); + validated = true; + return SW_OK(); + } + size_t key_len = 0, chal_len = 0, resp_len = 0; + uint8_t *key = NULL, *chal = NULL, *resp = NULL; + if (asn1_find_tag(apdu.data, apdu.nc, TAG_KEY, &key_len, &key) == false) + return SW_INCORRECT_PARAMS(); + if (key_len == 0) { + delete_file(search_dynamic_file(EF_OATH_CODE)); + validated = true; + return SW_OK(); + } + if (asn1_find_tag(apdu.data, apdu.nc, TAG_CHALLENGE, &chal_len, &chal) == false) + return SW_INCORRECT_PARAMS(); + if (asn1_find_tag(apdu.data, apdu.nc, TAG_RESPONSE, &resp_len, &resp) == false) + return SW_INCORRECT_PARAMS(); + const mbedtls_md_info_t *md_info = NULL; + if ((key[0] & ALG_MASK) == ALG_HMAC_SHA1) + md_info = mbedtls_md_info_from_type(MBEDTLS_MD_SHA1); + else if ((key[0] & ALG_MASK) == ALG_HMAC_SHA256) + md_info = mbedtls_md_info_from_type(MBEDTLS_MD_SHA256); + else if ((key[0] & ALG_MASK) == ALG_HMAC_SHA512) + md_info = mbedtls_md_info_from_type(MBEDTLS_MD_SHA512); + uint8_t hmac[64]; + int r = mbedtls_md_hmac(md_info, key+1, key_len-1, chal, chal_len, hmac); + if (r != 0) + return SW_EXEC_ERROR(); + if (memcmp(hmac, resp, resp_len) != 0) + return SW_DATA_INVALID(); + random_gen(NULL, challenge, sizeof(challenge)); + file_t *ef = file_new(EF_OATH_CODE); + flash_write_data_to_file(ef, key, key_len); + low_flash_available(); + validated = false; + return SW_OK(); +} + +int cmd_reset() { + for (int i = 0; i < MAX_OATH_CRED; i++) { + file_t *ef = search_dynamic_file(EF_OATH_CRED + i); + if (file_has_data(ef)) { + delete_file(ef); + } + } + delete_file(search_dynamic_file(EF_OATH_CODE)); + validated = true; + return SW_OK(); +} + +int cmd_list() { + size_t name_len = 0, key_len = 0; + uint8_t *name = NULL, *key = NULL; + for (int i = 0; i < MAX_OATH_CRED; i++) { + file_t *ef = search_dynamic_file(EF_OATH_CRED + i); + if (file_has_data(ef)) { + uint8_t *data = file_get_data(ef); + size_t data_len = file_get_size(ef); + if (asn1_find_tag(data, data_len, TAG_NAME, &name_len, &name) == true && asn1_find_tag(data, data_len, TAG_KEY, &key_len, &key) == true) { + res_APDU[res_APDU_size++] = TAG_NAME_LIST; + res_APDU[res_APDU_size++] = name_len + 1; + res_APDU[res_APDU_size++] = key[0]; + memcpy(res_APDU+res_APDU_size, name, name_len); + } + } + } + return SW_OK(); +} + +#define INS_PUT 0x01 +#define INS_DELETE 0x02 +#define INS_SET_CODE 0x03 +#define INS_RESET 0x04 +#define INS_LIST 0xa1 +#define INS_CALCULATE 0xa2 +#define INS_VALIDATE 0xa3 +#define INS_CALC_ALL 0xa4 +#define INS_SEND_REMAINING 0xa5 + +static const cmd_t cmds[] = { + { INS_PUT, cmd_put }, + { INS_DELETE, cmd_delete }, + { INS_SET_CODE, cmd_set_code }, + { INS_RESET, cmd_reset }, + { INS_LIST, cmd_list }, + { 0x00, 0x0} +}; + +int oath_process_apdu() { + if (CLA(apdu) != 0x00) + return SW_CLA_NOT_SUPPORTED(); + for (const cmd_t *cmd = cmds; cmd->ins != 0x00; cmd++) + { + if (cmd->ins == INS(apdu)) { + int r = cmd->cmd_handler(); + return r; + } + } + return SW_INS_NOT_SUPPORTED(); +}