Line | Count | Source (jump to first uncovered line) |
1 | | /* |
2 | | * Copyright (c) 2018-2022 Yubico AB. All rights reserved. |
3 | | * Use of this source code is governed by a BSD-style |
4 | | * license that can be found in the LICENSE file. |
5 | | * SPDX-License-Identifier: BSD-2-Clause |
6 | | */ |
7 | | |
8 | | #include <openssl/sha.h> |
9 | | #include "fido.h" |
10 | | |
11 | | int |
12 | | fido_dev_get_touch_begin(fido_dev_t *dev) |
13 | 1.98k | { |
14 | 1.98k | fido_blob_t f; |
15 | 1.98k | cbor_item_t *argv[9]; |
16 | 1.98k | const char *clientdata = FIDO_DUMMY_CLIENTDATA; |
17 | 1.98k | const uint8_t user_id = FIDO_DUMMY_USER_ID; |
18 | 1.98k | unsigned char cdh[SHA256_DIGEST_LENGTH]; |
19 | 1.98k | fido_rp_t rp; |
20 | 1.98k | fido_user_t user; |
21 | 1.98k | int ms = dev->timeout_ms; |
22 | 1.98k | int r = FIDO_ERR_INTERNAL; |
23 | | |
24 | 1.98k | memset(&f, 0, sizeof(f)); |
25 | 1.98k | memset(argv, 0, sizeof(argv)); |
26 | 1.98k | memset(cdh, 0, sizeof(cdh)); |
27 | 1.98k | memset(&rp, 0, sizeof(rp)); |
28 | 1.98k | memset(&user, 0, sizeof(user)); |
29 | | |
30 | 1.98k | if (fido_dev_is_fido2(dev) == false) |
31 | 1.77k | return (u2f_get_touch_begin(dev, &ms)); |
32 | | |
33 | 213 | if (SHA256((const void *)clientdata, strlen(clientdata), cdh) != cdh) { |
34 | 1 | fido_log_debug("%s: sha256", __func__); |
35 | 1 | return (FIDO_ERR_INTERNAL); |
36 | 1 | } |
37 | | |
38 | 212 | if ((rp.id = strdup(FIDO_DUMMY_RP_ID)) == NULL || |
39 | 212 | (user.name = strdup(FIDO_DUMMY_USER_NAME)) == NULL) { |
40 | 8 | fido_log_debug("%s: strdup", __func__); |
41 | 8 | goto fail; |
42 | 8 | } |
43 | | |
44 | 204 | if (fido_blob_set(&user.id, &user_id, sizeof(user_id)) < 0) { |
45 | 2 | fido_log_debug("%s: fido_blob_set", __func__); |
46 | 2 | goto fail; |
47 | 2 | } |
48 | | |
49 | 202 | if ((argv[0] = cbor_build_bytestring(cdh, sizeof(cdh))) == NULL || |
50 | 202 | (argv[1] = cbor_encode_rp_entity(&rp)) == NULL || |
51 | 202 | (argv[2] = cbor_encode_user_entity(&user)) == NULL || |
52 | 202 | (argv[3] = cbor_encode_pubkey_param(COSE_ES256)) == NULL) { |
53 | 58 | fido_log_debug("%s: cbor encode", __func__); |
54 | 58 | goto fail; |
55 | 58 | } |
56 | | |
57 | 144 | if (fido_dev_supports_pin(dev)) { |
58 | 94 | if ((argv[7] = cbor_new_definite_bytestring()) == NULL || |
59 | 94 | (argv[8] = cbor_encode_pin_opt(dev)) == NULL) { |
60 | 7 | fido_log_debug("%s: cbor encode", __func__); |
61 | 7 | goto fail; |
62 | 7 | } |
63 | 94 | } |
64 | | |
65 | 137 | if (cbor_build_frame(CTAP_CBOR_MAKECRED, argv, nitems(argv), &f) < 0 || |
66 | 137 | fido_tx(dev, CTAP_CMD_CBOR, f.ptr, f.len, &ms) < 0) { |
67 | 23 | fido_log_debug("%s: fido_tx", __func__); |
68 | 23 | r = FIDO_ERR_TX; |
69 | 23 | goto fail; |
70 | 23 | } |
71 | | |
72 | 114 | r = FIDO_OK; |
73 | 212 | fail: |
74 | 212 | cbor_vector_free(argv, nitems(argv)); |
75 | 212 | free(f.ptr); |
76 | 212 | free(rp.id); |
77 | 212 | free(user.name); |
78 | 212 | free(user.id.ptr); |
79 | | |
80 | 212 | return (r); |
81 | 114 | } |
82 | | |
83 | | int |
84 | | fido_dev_get_touch_status(fido_dev_t *dev, int *touched, int ms) |
85 | 1.98k | { |
86 | 1.98k | int r; |
87 | | |
88 | 1.98k | *touched = 0; |
89 | | |
90 | 1.98k | if (fido_dev_is_fido2(dev) == false) |
91 | 1.77k | return (u2f_get_touch_status(dev, touched, &ms)); |
92 | | |
93 | 213 | switch ((r = fido_rx_cbor_status(dev, &ms))) { |
94 | 1 | case FIDO_ERR_PIN_AUTH_INVALID: |
95 | 2 | case FIDO_ERR_PIN_INVALID: |
96 | 3 | case FIDO_ERR_PIN_NOT_SET: |
97 | 40 | case FIDO_ERR_SUCCESS: |
98 | 40 | *touched = 1; |
99 | 40 | break; |
100 | 117 | case FIDO_ERR_RX: |
101 | | /* ignore */ |
102 | 117 | break; |
103 | 56 | default: |
104 | 56 | fido_log_debug("%s: fido_rx_cbor_status", __func__); |
105 | 56 | return (r); |
106 | 213 | } |
107 | | |
108 | 157 | return (FIDO_OK); |
109 | 213 | } |