Line | Count | Source |
1 | | /* |
2 | | * Copyright (c) 2018 Yubico AB. All rights reserved. |
3 | | * Use of this source code is governed by a BSD-style |
4 | | * license that can be found in the LICENSE file. |
5 | | */ |
6 | | |
7 | | #include "fido.h" |
8 | | |
9 | | static int |
10 | | parse_authkey(const cbor_item_t *key, const cbor_item_t *val, void *arg) |
11 | 5.14k | { |
12 | 5.14k | es256_pk_t *authkey = arg; |
13 | | |
14 | 5.14k | if (cbor_isa_uint(key) == false || |
15 | 5.14k | cbor_int_get_width(key) != CBOR_INT_8 || |
16 | 5.14k | cbor_get_uint8(key) != 1) { |
17 | 511 | fido_log_debug("%s: cbor type", __func__); |
18 | 511 | return (0); /* ignore */ |
19 | 511 | } |
20 | | |
21 | 4.63k | return (es256_pk_decode(val, authkey)); |
22 | 4.63k | } |
23 | | |
24 | | static int |
25 | | fido_dev_authkey_tx(fido_dev_t *dev, int *ms) |
26 | 8.13k | { |
27 | 8.13k | fido_blob_t f; |
28 | 8.13k | cbor_item_t *argv[2]; |
29 | 8.13k | int r; |
30 | | |
31 | 8.13k | fido_log_debug("%s: dev=%p", __func__, (void *)dev); |
32 | | |
33 | 8.13k | memset(&f, 0, sizeof(f)); |
34 | 8.13k | memset(argv, 0, sizeof(argv)); |
35 | | |
36 | | /* add command parameters */ |
37 | 8.13k | if ((argv[0] = cbor_encode_pin_opt(dev)) == NULL || |
38 | 8.13k | (argv[1] = cbor_build_uint8(2)) == NULL) { |
39 | 2.44k | fido_log_debug("%s: cbor_build", __func__); |
40 | 2.44k | r = FIDO_ERR_INTERNAL; |
41 | 2.44k | goto fail; |
42 | 2.44k | } |
43 | | |
44 | | /* frame and transmit */ |
45 | 5.69k | if (cbor_build_frame(CTAP_CBOR_CLIENT_PIN, argv, nitems(argv), |
46 | 5.69k | &f) < 0 || fido_tx(dev, CTAP_CMD_CBOR, f.ptr, f.len, ms) < 0) { |
47 | 84 | fido_log_debug("%s: fido_tx", __func__); |
48 | 84 | r = FIDO_ERR_TX; |
49 | 84 | goto fail; |
50 | 84 | } |
51 | | |
52 | 5.60k | r = FIDO_OK; |
53 | 8.13k | fail: |
54 | 8.13k | cbor_vector_free(argv, nitems(argv)); |
55 | 8.13k | free(f.ptr); |
56 | | |
57 | 8.13k | return (r); |
58 | 5.60k | } |
59 | | |
60 | | static int |
61 | | fido_dev_authkey_rx(fido_dev_t *dev, es256_pk_t *authkey, int *ms) |
62 | 5.60k | { |
63 | 5.60k | unsigned char reply[FIDO_MAXMSG]; |
64 | 5.60k | int reply_len; |
65 | | |
66 | 5.60k | fido_log_debug("%s: dev=%p, authkey=%p, ms=%d", __func__, (void *)dev, |
67 | 5.60k | (void *)authkey, *ms); |
68 | | |
69 | 5.60k | memset(authkey, 0, sizeof(*authkey)); |
70 | | |
71 | 5.60k | if ((reply_len = fido_rx(dev, CTAP_CMD_CBOR, &reply, sizeof(reply), |
72 | 5.60k | ms)) < 0) { |
73 | 732 | fido_log_debug("%s: fido_rx", __func__); |
74 | 732 | return (FIDO_ERR_RX); |
75 | 732 | } |
76 | | |
77 | 4.87k | return (cbor_parse_reply(reply, (size_t)reply_len, authkey, |
78 | 4.87k | parse_authkey)); |
79 | 4.87k | } |
80 | | |
81 | | static int |
82 | | fido_dev_authkey_wait(fido_dev_t *dev, es256_pk_t *authkey, int *ms) |
83 | 8.13k | { |
84 | 8.13k | int r; |
85 | | |
86 | 8.13k | if ((r = fido_dev_authkey_tx(dev, ms)) != FIDO_OK || |
87 | 8.13k | (r = fido_dev_authkey_rx(dev, authkey, ms)) != FIDO_OK) |
88 | 8.13k | return (r); |
89 | | |
90 | 4.58k | return (FIDO_OK); |
91 | 4.58k | } |
92 | | |
93 | | int |
94 | | fido_dev_authkey(fido_dev_t *dev, es256_pk_t *authkey, int *ms) |
95 | 8.13k | { |
96 | 8.13k | return (fido_dev_authkey_wait(dev, authkey, ms)); |
97 | 8.13k | } |