Line | Count | Source (jump to first uncovered line) |
1 | | /* |
2 | | * Copyright (c) 2018-2022 Yubico AB. All rights reserved. |
3 | | * Use of this source code is governed by a BSD-style |
4 | | * license that can be found in the LICENSE file. |
5 | | */ |
6 | | |
7 | | #include <openssl/sha.h> |
8 | | #include "fido.h" |
9 | | |
10 | | int |
11 | | fido_dev_get_touch_begin(fido_dev_t *dev) |
12 | 2.25k | { |
13 | 2.25k | fido_blob_t f; |
14 | 2.25k | cbor_item_t *argv[9]; |
15 | 2.25k | const char *clientdata = FIDO_DUMMY_CLIENTDATA; |
16 | 2.25k | const uint8_t user_id = FIDO_DUMMY_USER_ID; |
17 | 2.25k | unsigned char cdh[SHA256_DIGEST_LENGTH]; |
18 | 2.25k | fido_rp_t rp; |
19 | 2.25k | fido_user_t user; |
20 | 2.25k | int ms = dev->timeout_ms; |
21 | 2.25k | int r = FIDO_ERR_INTERNAL; |
22 | | |
23 | 2.25k | memset(&f, 0, sizeof(f)); |
24 | 2.25k | memset(argv, 0, sizeof(argv)); |
25 | 2.25k | memset(cdh, 0, sizeof(cdh)); |
26 | 2.25k | memset(&rp, 0, sizeof(rp)); |
27 | 2.25k | memset(&user, 0, sizeof(user)); |
28 | | |
29 | 2.25k | if (fido_dev_is_fido2(dev) == false) |
30 | 2.06k | return (u2f_get_touch_begin(dev, &ms)); |
31 | | |
32 | 190 | if (SHA256((const void *)clientdata, strlen(clientdata), cdh) != cdh) { |
33 | 1 | fido_log_debug("%s: sha256", __func__); |
34 | 1 | return (FIDO_ERR_INTERNAL); |
35 | 1 | } |
36 | | |
37 | 189 | if ((rp.id = strdup(FIDO_DUMMY_RP_ID)) == NULL || |
38 | 189 | (user.name = strdup(FIDO_DUMMY_USER_NAME)) == NULL) { |
39 | 4 | fido_log_debug("%s: strdup", __func__); |
40 | 4 | goto fail; |
41 | 4 | } |
42 | | |
43 | 185 | if (fido_blob_set(&user.id, &user_id, sizeof(user_id)) < 0) { |
44 | 2 | fido_log_debug("%s: fido_blob_set", __func__); |
45 | 2 | goto fail; |
46 | 2 | } |
47 | | |
48 | 183 | if ((argv[0] = cbor_build_bytestring(cdh, sizeof(cdh))) == NULL || |
49 | 183 | (argv[1] = cbor_encode_rp_entity(&rp)) == NULL || |
50 | 183 | (argv[2] = cbor_encode_user_entity(&user)) == NULL || |
51 | 183 | (argv[3] = cbor_encode_pubkey_param(COSE_ES256)) == NULL) { |
52 | 34 | fido_log_debug("%s: cbor encode", __func__); |
53 | 34 | goto fail; |
54 | 34 | } |
55 | | |
56 | 149 | if (fido_dev_supports_pin(dev)) { |
57 | 134 | if ((argv[7] = cbor_new_definite_bytestring()) == NULL || |
58 | 134 | (argv[8] = cbor_encode_pin_opt(dev)) == NULL) { |
59 | 4 | fido_log_debug("%s: cbor encode", __func__); |
60 | 4 | goto fail; |
61 | 4 | } |
62 | 134 | } |
63 | | |
64 | 145 | if (cbor_build_frame(CTAP_CBOR_MAKECRED, argv, nitems(argv), &f) < 0 || |
65 | 145 | fido_tx(dev, CTAP_CMD_CBOR, f.ptr, f.len, &ms) < 0) { |
66 | 23 | fido_log_debug("%s: fido_tx", __func__); |
67 | 23 | r = FIDO_ERR_TX; |
68 | 23 | goto fail; |
69 | 23 | } |
70 | | |
71 | 122 | r = FIDO_OK; |
72 | 189 | fail: |
73 | 189 | cbor_vector_free(argv, nitems(argv)); |
74 | 189 | free(f.ptr); |
75 | 189 | free(rp.id); |
76 | 189 | free(user.name); |
77 | 189 | free(user.id.ptr); |
78 | | |
79 | 189 | return (r); |
80 | 122 | } |
81 | | |
82 | | int |
83 | | fido_dev_get_touch_status(fido_dev_t *dev, int *touched, int ms) |
84 | 2.25k | { |
85 | 2.25k | int r; |
86 | | |
87 | 2.25k | *touched = 0; |
88 | | |
89 | 2.25k | if (fido_dev_is_fido2(dev) == false) |
90 | 2.06k | return (u2f_get_touch_status(dev, touched, &ms)); |
91 | | |
92 | 190 | switch ((r = fido_rx_cbor_status(dev, &ms))) { |
93 | 1 | case FIDO_ERR_PIN_AUTH_INVALID: |
94 | 2 | case FIDO_ERR_PIN_INVALID: |
95 | 3 | case FIDO_ERR_PIN_NOT_SET: |
96 | 71 | case FIDO_ERR_SUCCESS: |
97 | 71 | *touched = 1; |
98 | 71 | break; |
99 | 70 | case FIDO_ERR_RX: |
100 | | /* ignore */ |
101 | 70 | break; |
102 | 49 | default: |
103 | 49 | fido_log_debug("%s: fido_rx_cbor_status", __func__); |
104 | 49 | return (r); |
105 | 190 | } |
106 | | |
107 | 141 | return (FIDO_OK); |
108 | 190 | } |