]> git.zerfleddert.de Git - proxmark3-svn/blob - client/cmdhffido.c
fix "hf mf chk" <t|d|s|ss> flags (based on PR #700) (#718)
[proxmark3-svn] / client / cmdhffido.c
1 //-----------------------------------------------------------------------------
2 // Copyright (C) 2018 Merlok
3 //
4 // This code is licensed to you under the terms of the GNU GPL, version 2 or,
5 // at your option, any later version. See the LICENSE.txt file for the text of
6 // the license.
7 //-----------------------------------------------------------------------------
8 // High frequency MIFARE Plus commands
9 //-----------------------------------------------------------------------------
10 //
11 // Documentation here:
12 //
13 // FIDO Alliance specifications
14 // https://fidoalliance.org/download/
15 // FIDO NFC Protocol Specification v1.0
16 // https://fidoalliance.org/specs/fido-u2f-v1.2-ps-20170411/fido-u2f-nfc-protocol-v1.2-ps-20170411.html
17 // FIDO U2F Raw Message Formats
18 // https://fidoalliance.org/specs/fido-u2f-v1.2-ps-20170411/fido-u2f-raw-message-formats-v1.2-ps-20170411.html
19 //-----------------------------------------------------------------------------
20
21
22 #include "cmdhffido.h"
23
24 #include <inttypes.h>
25 #include <string.h>
26 #include <stdio.h>
27 #include <stdlib.h>
28 #include <ctype.h>
29 #include <unistd.h>
30 #include <jansson.h>
31 #include "comms.h"
32 #include "cmdmain.h"
33 #include "util.h"
34 #include "ui.h"
35 #include "proxmark3.h"
36 #include "cmdhf14a.h"
37 #include "mifare.h"
38 #include "emv/emvcore.h"
39 #include "emv/emvjson.h"
40 #include "emv/dump.h"
41 #include "cliparser/cliparser.h"
42 #include "crypto/asn1utils.h"
43 #include "crypto/libpcrypto.h"
44 #include "fido/additional_ca.h"
45 #include "mbedtls/x509_crt.h"
46 #include "mbedtls/x509.h"
47 #include "mbedtls/pk.h"
48
49 static int CmdHelp(const char *Cmd);
50
51 int FIDOSelect(bool ActivateField, bool LeaveFieldON, uint8_t *Result, size_t MaxResultLen, size_t *ResultLen, uint16_t *sw) {
52 uint8_t data[] = {0xA0, 0x00, 0x00, 0x06, 0x47, 0x2F, 0x00, 0x01};
53
54 return EMVSelect(ActivateField, LeaveFieldON, data, sizeof(data), Result, MaxResultLen, ResultLen, sw, NULL);
55 }
56
57 int FIDOExchange(sAPDU apdu, uint8_t *Result, size_t MaxResultLen, size_t *ResultLen, uint16_t *sw) {
58 int res = EMVExchange(true, apdu, Result, MaxResultLen, ResultLen, sw, NULL);
59 if (res == 5) // apdu result (sw) not a 0x9000
60 res = 0;
61 // software chaining
62 while (!res && (*sw >> 8) == 0x61) {
63 size_t oldlen = *ResultLen;
64 res = EMVExchange(true, (sAPDU){0x00, 0xC0, 0x00, 0x00, 0x00, NULL}, &Result[oldlen], MaxResultLen - oldlen, ResultLen, sw, NULL);
65 if (res == 5) // apdu result (sw) not a 0x9000
66 res = 0;
67
68 *ResultLen += oldlen;
69 if (*ResultLen > MaxResultLen)
70 return 100;
71 }
72 return res;
73 }
74
75 int FIDORegister(uint8_t *params, uint8_t *Result, size_t MaxResultLen, size_t *ResultLen, uint16_t *sw) {
76 return FIDOExchange((sAPDU){0x00, 0x01, 0x03, 0x00, 64, params}, Result, MaxResultLen, ResultLen, sw);
77 }
78
79 int FIDOAuthentication(uint8_t *params, uint8_t paramslen, uint8_t controlb, uint8_t *Result, size_t MaxResultLen, size_t *ResultLen, uint16_t *sw) {
80 return FIDOExchange((sAPDU){0x00, 0x02, controlb, 0x00, paramslen, params}, Result, MaxResultLen, ResultLen, sw);
81 }
82
83 int FIDO2GetInfo(uint8_t *Result, size_t MaxResultLen, size_t *ResultLen, uint16_t *sw) {
84 uint8_t data[] = {0x04};
85 return FIDOExchange((sAPDU){0x80, 0x10, 0x00, 0x00, sizeof(data), data}, Result, MaxResultLen, ResultLen, sw);
86 }
87
88 int CmdHFFidoInfo(const char *cmd) {
89
90 if (cmd && strlen(cmd) > 0)
91 PrintAndLog("WARNING: command don't have any parameters.\n");
92
93 // info about 14a part
94 CmdHF14AInfo("");
95
96 // FIDO info
97 PrintAndLog("--------------------------------------------");
98 SetAPDULogging(false);
99
100 uint8_t buf[APDU_RES_LEN] = {0};
101 size_t len = 0;
102 uint16_t sw = 0;
103 int res = FIDOSelect(true, true, buf, sizeof(buf), &len, &sw);
104
105 if (res) {
106 DropField();
107 return res;
108 }
109
110 if (sw != 0x9000) {
111 if (sw)
112 PrintAndLog("Not a FIDO card! APDU response: %04x - %s", sw, GetAPDUCodeDescription(sw >> 8, sw & 0xff));
113 else
114 PrintAndLog("APDU exchange error. Card returns 0x0000.");
115
116 DropField();
117 return 0;
118 }
119
120 if (!strncmp((char *)buf, "U2F_V2", 7)) {
121 if (!strncmp((char *)buf, "FIDO_2_0", 8)) {
122 PrintAndLog("FIDO2 authenricator detected. Version: %.*s", len, buf);
123 } else {
124 PrintAndLog("FIDO authenricator detected (not standard U2F).");
125 PrintAndLog("Non U2F authenticator version:");
126 dump_buffer((const unsigned char *)buf, len, NULL, 0);
127 }
128 } else {
129 PrintAndLog("FIDO U2F authenricator detected. Version: %.*s", len, buf);
130 }
131
132 res = FIDO2GetInfo(buf, sizeof(buf), &len, &sw);
133 DropField();
134 if (res) {
135 return res;
136 }
137 if (sw != 0x9000) {
138 PrintAndLog("FIDO2 version not exists (%04x - %s).", sw, GetAPDUCodeDescription(sw >> 8, sw & 0xff));
139
140 return 0;
141 }
142
143 PrintAndLog("FIDO2 version: (%d)", len);
144 dump_buffer((const unsigned char *)buf, len, NULL, 0);
145
146 return 0;
147 }
148
149 json_t *OpenJson(int paramnum, char *fname, void* argtable[], bool *err) {
150 json_t *root = NULL;
151 json_error_t error;
152 *err = false;
153
154 uint8_t jsonname[250] ={0};
155 char *cjsonname = (char *)jsonname;
156 int jsonnamelen = 0;
157
158 // CLIGetStrWithReturn(paramnum, jsonname, &jsonnamelen);
159 if (CLIParamStrToBuf(arg_get_str(paramnum), jsonname, sizeof(jsonname), &jsonnamelen)) {
160 CLIParserFree();
161 return NULL;
162 }
163
164 // current path + file name
165 if (!strstr(cjsonname, ".json"))
166 strcat(cjsonname, ".json");
167
168 if (jsonnamelen) {
169 strcpy(fname, get_my_executable_directory());
170 strcat(fname, cjsonname);
171 if (access(fname, F_OK) != -1) {
172 root = json_load_file(fname, 0, &error);
173 if (!root) {
174 PrintAndLog("ERROR: json error on line %d: %s", error.line, error.text);
175 *err = true;
176 return NULL;
177 }
178
179 if (!json_is_object(root)) {
180 PrintAndLog("ERROR: Invalid json format. root must be an object.");
181 json_decref(root);
182 *err = true;
183 return NULL;
184 }
185
186 } else {
187 root = json_object();
188 }
189 }
190 return root;
191 }
192
193 int CmdHFFidoRegister(const char *cmd) {
194 uint8_t data[64] = {0};
195 int chlen = 0;
196 uint8_t cdata[250] = {0};
197 int applen = 0;
198 uint8_t adata[250] = {0};
199 json_t *root = NULL;
200
201 CLIParserInit("hf fido reg",
202 "Initiate a U2F token registration. Needs two 32-byte hash number. \nchallenge parameter (32b) and application parameter (32b).",
203 "Usage:\n\thf fido reg -> execute command with 2 parameters, filled 0x00\n"
204 "\thf fido reg 000102030405060708090a0b0c0d0e0f000102030405060708090a0b0c0d0e0f 000102030405060708090a0b0c0d0e0f000102030405060708090a0b0c0d0e0f -> execute command with parameters"
205 "\thf fido reg -p s0 s1 -> execute command with plain parameters");
206
207 void* argtable[] = {
208 arg_param_begin,
209 arg_lit0("aA", "apdu", "show APDU reqests and responses"),
210 arg_litn("vV", "verbose", 0, 2, "show technical data. vv - show full certificates data"),
211 arg_lit0("pP", "plain", "send plain ASCII to challenge and application parameters instead of HEX"),
212 arg_lit0("tT", "tlv", "Show DER certificate contents in TLV representation"),
213 arg_str0("jJ", "json", "fido.json", "JSON input / output file name for parameters."),
214 arg_str0(NULL, NULL, "<HEX/ASCII challenge parameter (32b HEX/1..16 chars)>", NULL),
215 arg_str0(NULL, NULL, "<HEX/ASCII application parameter (32b HEX/1..16 chars)>", NULL),
216 arg_param_end
217 };
218 CLIExecWithReturn(cmd, argtable, true);
219
220 bool APDULogging = arg_get_lit(1);
221 bool verbose = arg_get_lit(2);
222 bool verbose2 = arg_get_lit(2) > 1;
223 bool paramsPlain = arg_get_lit(3);
224 bool showDERTLV = arg_get_lit(4);
225
226 char fname[250] = {0};
227 bool err;
228 root = OpenJson(5, fname, argtable, &err);
229 if(err)
230 return 1;
231 if (root) {
232 size_t jlen;
233 JsonLoadBufAsHex(root, "$.ChallengeParam", data, 32, &jlen);
234 JsonLoadBufAsHex(root, "$.ApplicationParam", &data[32], 32, &jlen);
235 }
236
237 if (paramsPlain) {
238 memset(cdata, 0x00, 32);
239 CLIGetStrWithReturn(6, cdata, &chlen);
240 if (chlen && chlen > 16) {
241 PrintAndLog("ERROR: challenge parameter length in ASCII mode must be less than 16 chars instead of: %d", chlen);
242 return 1;
243 }
244 } else {
245 CLIGetHexWithReturn(6, cdata, &chlen);
246 if (chlen && chlen != 32) {
247 PrintAndLog("ERROR: challenge parameter length must be 32 bytes only.");
248 return 1;
249 }
250 }
251 if (chlen)
252 memmove(data, cdata, 32);
253
254
255 if (paramsPlain) {
256 memset(adata, 0x00, 32);
257 CLIGetStrWithReturn(7, adata, &applen);
258 if (applen && applen > 16) {
259 PrintAndLog("ERROR: application parameter length in ASCII mode must be less than 16 chars instead of: %d", applen);
260 return 1;
261 }
262 } else {
263 CLIGetHexWithReturn(7, adata, &applen);
264 if (applen && applen != 32) {
265 PrintAndLog("ERROR: application parameter length must be 32 bytes only.");
266 return 1;
267 }
268 }
269 if (applen)
270 memmove(&data[32], adata, 32);
271
272 CLIParserFree();
273
274 SetAPDULogging(APDULogging);
275
276 // challenge parameter [32 bytes] - The challenge parameter is the SHA-256 hash of the Client Data, a stringified JSON data structure that the FIDO Client prepares
277 // application parameter [32 bytes] - The application parameter is the SHA-256 hash of the UTF-8 encoding of the application identity
278
279 uint8_t buf[2048] = {0};
280 size_t len = 0;
281 uint16_t sw = 0;
282
283 DropField();
284 int res = FIDOSelect(true, true, buf, sizeof(buf), &len, &sw);
285
286 if (res) {
287 PrintAndLog("Can't select authenticator. res=%x. Exit...", res);
288 DropField();
289 return res;
290 }
291
292 if (sw != 0x9000) {
293 PrintAndLog("Can't select FIDO application. APDU response status: %04x - %s", sw, GetAPDUCodeDescription(sw >> 8, sw & 0xff));
294 DropField();
295 return 2;
296 }
297
298 res = FIDORegister(data, buf, sizeof(buf), &len, &sw);
299 DropField();
300 if (res) {
301 PrintAndLog("Can't execute register command. res=%x. Exit...", res);
302 return res;
303 }
304
305 if (sw != 0x9000) {
306 PrintAndLog("ERROR execute register command. APDU response status: %04x - %s", sw, GetAPDUCodeDescription(sw >> 8, sw & 0xff));
307 return 3;
308 }
309
310 PrintAndLog("");
311 if (APDULogging)
312 PrintAndLog("---------------------------------------------------------------");
313 PrintAndLog("data len: %d", len);
314 if (verbose2) {
315 PrintAndLog("--------------data----------------------");
316 dump_buffer((const unsigned char *)buf, len, NULL, 0);
317 PrintAndLog("--------------data----------------------");
318 }
319
320 if (buf[0] != 0x05) {
321 PrintAndLog("ERROR: First byte must be 0x05, but it %2x", buf[0]);
322 return 5;
323 }
324 PrintAndLog("User public key: %s", sprint_hex(&buf[1], 65));
325
326 uint8_t keyHandleLen = buf[66];
327 PrintAndLog("Key handle[%d]: %s", keyHandleLen, sprint_hex(&buf[67], keyHandleLen));
328
329 int derp = 67 + keyHandleLen;
330 int derLen = (buf[derp + 2] << 8) + buf[derp + 3] + 4;
331 if (verbose2) {
332 PrintAndLog("DER certificate[%d]:\n------------------DER-------------------", derLen);
333 dump_buffer_simple((const unsigned char *)&buf[derp], derLen, NULL);
334 PrintAndLog("\n----------------DER---------------------");
335 } else {
336 if (verbose)
337 PrintAndLog("------------------DER-------------------");
338 PrintAndLog("DER certificate[%d]: %s...", derLen, sprint_hex(&buf[derp], 20));
339 }
340
341 // check and print DER certificate
342 uint8_t public_key[65] = {0};
343
344 // print DER certificate in TLV view
345 if (showDERTLV) {
346 PrintAndLog("----------------DER TLV-----------------");
347 asn1_print(&buf[derp], derLen, " ");
348 PrintAndLog("----------------DER TLV-----------------");
349 }
350
351 // load CA's
352 mbedtls_x509_crt cacert;
353 mbedtls_x509_crt_init(&cacert);
354 res = mbedtls_x509_crt_parse(&cacert, (const unsigned char *) additional_ca_pem, additional_ca_pem_len);
355 if (res < 0) {
356 PrintAndLog("ERROR: CA parse certificate returned -0x%x - %s", -res, ecdsa_get_error(res));
357 }
358 if (verbose)
359 PrintAndLog("CA load OK. %d skipped", res);
360
361 // load DER certificate from authenticator's data
362 mbedtls_x509_crt cert;
363 mbedtls_x509_crt_init(&cert);
364 res = mbedtls_x509_crt_parse_der(&cert, &buf[derp], derLen);
365 if (res) {
366 PrintAndLog("ERROR: DER parse returned 0x%x - %s", (res<0)?-res:res, ecdsa_get_error(res));
367 }
368
369 // get certificate info
370 char linfo[300] = {0};
371 if (verbose) {
372 mbedtls_x509_crt_info(linfo, sizeof(linfo), " ", &cert);
373 PrintAndLog("DER certificate info:\n%s", linfo);
374 }
375
376 // verify certificate
377 uint32_t verifyflags = 0;
378 res = mbedtls_x509_crt_verify(&cert, &cacert, NULL, NULL, &verifyflags, NULL, NULL);
379 if (res) {
380 PrintAndLog("ERROR: DER verify returned 0x%x - %s", (res<0)?-res:res, ecdsa_get_error(res));
381 } else {
382 PrintAndLog("Certificate OK.");
383 }
384
385 if (verbose) {
386 memset(linfo, 0x00, sizeof(linfo));
387 mbedtls_x509_crt_verify_info(linfo, sizeof(linfo), " ", verifyflags);
388 PrintAndLog("Verification info:\n%s", linfo);
389 }
390
391 // get public key
392 res = ecdsa_public_key_from_pk(&cert.pk, public_key, sizeof(public_key));
393 if (res) {
394 PrintAndLog("ERROR: getting public key from certificate 0x%x - %s", (res<0)?-res:res, ecdsa_get_error(res));
395 } else {
396 if (verbose)
397 PrintAndLog("Got a public key from certificate:\n%s", sprint_hex_inrow(public_key, 65));
398 }
399
400 if (verbose)
401 PrintAndLog("------------------DER-------------------");
402
403 mbedtls_x509_crt_free(&cert);
404 mbedtls_x509_crt_free(&cacert);
405
406 // get hash
407 int hashp = 1 + 65 + 1 + keyHandleLen + derLen;
408 PrintAndLog("Hash[%d]: %s", len - hashp, sprint_hex(&buf[hashp], len - hashp));
409
410 // check ANSI X9.62 format ECDSA signature (on P-256)
411 uint8_t rval[300] = {0};
412 uint8_t sval[300] = {0};
413 res = ecdsa_asn1_get_signature(&buf[hashp], len - hashp, rval, sval);
414 if (!res) {
415 if (verbose) {
416 PrintAndLog(" r: %s", sprint_hex(rval, 32));
417 PrintAndLog(" s: %s", sprint_hex(sval, 32));
418 }
419
420 uint8_t xbuf[4096] = {0};
421 size_t xbuflen = 0;
422 res = FillBuffer(xbuf, sizeof(xbuf), &xbuflen,
423 "\x00", 1,
424 &data[32], 32, // application parameter
425 &data[0], 32, // challenge parameter
426 &buf[67], keyHandleLen, // keyHandle
427 &buf[1], 65, // user public key
428 NULL, 0);
429 //PrintAndLog("--xbuf(%d)[%d]: %s", res, xbuflen, sprint_hex(xbuf, xbuflen));
430 res = ecdsa_signature_verify(public_key, xbuf, xbuflen, &buf[hashp], len - hashp);
431 if (res) {
432 if (res == -0x4e00) {
433 PrintAndLog("Signature is NOT VALID.");
434 } else {
435 PrintAndLog("Other signature check error: %x %s", (res<0)?-res:res, ecdsa_get_error(res));
436 }
437 } else {
438 PrintAndLog("Signature is OK.");
439 }
440
441 } else {
442 PrintAndLog("Invalid signature. res=%d.", res);
443 }
444
445 PrintAndLog("\nauth command: ");
446 printf("hf fido auth %s%s", paramsPlain?"-p ":"", sprint_hex_inrow(&buf[67], keyHandleLen));
447 if(chlen || applen)
448 printf(" %s", paramsPlain?(char *)cdata:sprint_hex_inrow(cdata, 32));
449 if(applen)
450 printf(" %s", paramsPlain?(char *)adata:sprint_hex_inrow(adata, 32));
451 printf("\n");
452
453 if (root) {
454 JsonSaveBufAsHex(root, "ChallengeParam", data, 32);
455 JsonSaveBufAsHex(root, "ApplicationParam", &data[32], 32);
456 JsonSaveBufAsHexCompact(root, "PublicKey", &buf[1], 65);
457 JsonSaveInt(root, "KeyHandleLen", keyHandleLen);
458 JsonSaveBufAsHexCompact(root, "KeyHandle", &buf[67], keyHandleLen);
459 JsonSaveBufAsHexCompact(root, "DER", &buf[67 + keyHandleLen], derLen);
460
461 res = json_dump_file(root, fname, JSON_INDENT(2));
462 if (res) {
463 PrintAndLog("ERROR: can't save the file: %s", fname);
464 return 200;
465 }
466 PrintAndLog("File `%s` saved.", fname);
467
468 // free json object
469 json_decref(root);
470 }
471
472 return 0;
473 };
474
475 int CmdHFFidoAuthenticate(const char *cmd) {
476 uint8_t data[512] = {0};
477 uint8_t hdata[250] = {0};
478 bool public_key_loaded = false;
479 uint8_t public_key[65] = {0};
480 int hdatalen = 0;
481 uint8_t keyHandleLen = 0;
482 json_t *root = NULL;
483
484 CLIParserInit("hf fido auth",
485 "Initiate a U2F token authentication. Needs key handle and two 32-byte hash number. \nkey handle(var 0..255), challenge parameter (32b) and application parameter (32b).",
486 "Usage:\n\thf fido auth 000102030405060708090a0b0c0d0e0f000102030405060708090a0b0c0d0e0f -> execute command with 2 parameters, filled 0x00 and key handle\n"
487 "\thf fido auth 000102030405060708090a0b0c0d0e0f000102030405060708090a0b0c0d0e0f000102030405060708090a0b0c0d0e0f000102030405060708090a0b0c0d0e0f "
488 "000102030405060708090a0b0c0d0e0f000102030405060708090a0b0c0d0e0f 000102030405060708090a0b0c0d0e0f000102030405060708090a0b0c0d0e0f -> execute command with parameters");
489
490 void* argtable[] = {
491 arg_param_begin,
492 arg_lit0("aA", "apdu", "show APDU reqests and responses"),
493 arg_lit0("vV", "verbose", "show technical data"),
494 arg_lit0("pP", "plain", "send plain ASCII to challenge and application parameters instead of HEX"),
495 arg_rem("default mode:", "dont-enforce-user-presence-and-sign"),
496 arg_lit0("uU", "user", "mode: enforce-user-presence-and-sign"),
497 arg_lit0("cC", "check", "mode: check-only"),
498 arg_str0("jJ", "json", "fido.json", "JSON input / output file name for parameters."),
499 arg_str0("kK", "key", "public key to verify signature", NULL),
500 arg_str0(NULL, NULL, "<HEX key handle (var 0..255b)>", NULL),
501 arg_str0(NULL, NULL, "<HEX/ASCII challenge parameter (32b HEX/1..16 chars)>", NULL),
502 arg_str0(NULL, NULL, "<HEX/ASCII application parameter (32b HEX/1..16 chars)>", NULL),
503 arg_param_end
504 };
505 CLIExecWithReturn(cmd, argtable, true);
506
507 bool APDULogging = arg_get_lit(1);
508 bool verbose = arg_get_lit(2);
509 bool paramsPlain = arg_get_lit(3);
510 uint8_t controlByte = 0x08;
511 if (arg_get_lit(5))
512 controlByte = 0x03;
513 if (arg_get_lit(6))
514 controlByte = 0x07;
515
516 char fname[250] = {0};
517 bool err;
518 root = OpenJson(7, fname, argtable, &err);
519 if(err)
520 return 1;
521 if (root) {
522 size_t jlen;
523 JsonLoadBufAsHex(root, "$.ChallengeParam", data, 32, &jlen);
524 JsonLoadBufAsHex(root, "$.ApplicationParam", &data[32], 32, &jlen);
525 JsonLoadBufAsHex(root, "$.KeyHandle", &data[65], 512 - 67, &jlen);
526 keyHandleLen = jlen & 0xff;
527 data[64] = keyHandleLen;
528 JsonLoadBufAsHex(root, "$.PublicKey", public_key, 65, &jlen);
529 public_key_loaded = (jlen > 0);
530 }
531
532 // public key
533 CLIGetHexWithReturn(8, hdata, &hdatalen);
534 if (hdatalen && hdatalen != 130) {
535 PrintAndLog("ERROR: public key length must be 65 bytes only.");
536 return 1;
537 }
538 if (hdatalen) {
539 memmove(public_key, hdata, hdatalen);
540 public_key_loaded = true;
541 }
542
543 CLIGetHexWithReturn(9, hdata, &hdatalen);
544 if (hdatalen > 255) {
545 PrintAndLog("ERROR: application parameter length must be less than 255.");
546 return 1;
547 }
548 if (hdatalen) {
549 keyHandleLen = hdatalen;
550 data[64] = keyHandleLen;
551 memmove(&data[65], hdata, keyHandleLen);
552 }
553
554 if (paramsPlain) {
555 memset(hdata, 0x00, 32);
556 CLIGetStrWithReturn(9, hdata, &hdatalen);
557 if (hdatalen && hdatalen > 16) {
558 PrintAndLog("ERROR: challenge parameter length in ASCII mode must be less than 16 chars instead of: %d", hdatalen);
559 return 1;
560 }
561 } else {
562 CLIGetHexWithReturn(10, hdata, &hdatalen);
563 if (hdatalen && hdatalen != 32) {
564 PrintAndLog("ERROR: challenge parameter length must be 32 bytes only.");
565 return 1;
566 }
567 }
568 if (hdatalen)
569 memmove(data, hdata, 32);
570
571 if (paramsPlain) {
572 memset(hdata, 0x00, 32);
573 CLIGetStrWithReturn(11, hdata, &hdatalen);
574 if (hdatalen && hdatalen > 16) {
575 PrintAndLog("ERROR: application parameter length in ASCII mode must be less than 16 chars instead of: %d", hdatalen);
576 return 1;
577 }
578 } else {
579 CLIGetHexWithReturn(10, hdata, &hdatalen);
580 if (hdatalen && hdatalen != 32) {
581 PrintAndLog("ERROR: application parameter length must be 32 bytes only.");
582 return 1;
583 }
584 }
585 if (hdatalen)
586 memmove(&data[32], hdata, 32);
587
588 CLIParserFree();
589
590 SetAPDULogging(APDULogging);
591
592 // (in parameter) conrtol byte 0x07 - check only, 0x03 - user presense + cign. 0x08 - sign only
593 // challenge parameter [32 bytes]
594 // application parameter [32 bytes]
595 // key handle length [1b] = N
596 // key handle [N]
597
598 uint8_t datalen = 32 + 32 + 1 + keyHandleLen;
599
600 uint8_t buf[2048] = {0};
601 size_t len = 0;
602 uint16_t sw = 0;
603
604 DropField();
605 int res = FIDOSelect(true, true, buf, sizeof(buf), &len, &sw);
606
607 if (res) {
608 PrintAndLog("Can't select authenticator. res=%x. Exit...", res);
609 DropField();
610 return res;
611 }
612
613 if (sw != 0x9000) {
614 PrintAndLog("Can't select FIDO application. APDU response status: %04x - %s", sw, GetAPDUCodeDescription(sw >> 8, sw & 0xff));
615 DropField();
616 return 2;
617 }
618
619 res = FIDOAuthentication(data, datalen, controlByte, buf, sizeof(buf), &len, &sw);
620 DropField();
621 if (res) {
622 PrintAndLog("Can't execute authentication command. res=%x. Exit...", res);
623 return res;
624 }
625
626 if (sw != 0x9000) {
627 PrintAndLog("ERROR execute authentication command. APDU response status: %04x - %s", sw, GetAPDUCodeDescription(sw >> 8, sw & 0xff));
628 return 3;
629 }
630
631 PrintAndLog("---------------------------------------------------------------");
632 PrintAndLog("User presence: %s", (buf[0]?"verified":"not verified"));
633 uint32_t cntr = (uint32_t)bytes_to_num(&buf[1], 4);
634 PrintAndLog("Counter: %d", cntr);
635 PrintAndLog("Hash[%d]: %s", len - 5, sprint_hex(&buf[5], len - 5));
636
637 // check ANSI X9.62 format ECDSA signature (on P-256)
638 uint8_t rval[300] = {0};
639 uint8_t sval[300] = {0};
640 res = ecdsa_asn1_get_signature(&buf[5], len - 5, rval, sval);
641 if (!res) {
642 if (verbose) {
643 PrintAndLog(" r: %s", sprint_hex(rval, 32));
644 PrintAndLog(" s: %s", sprint_hex(sval, 32));
645 }
646 if (public_key_loaded) {
647 uint8_t xbuf[4096] = {0};
648 size_t xbuflen = 0;
649 res = FillBuffer(xbuf, sizeof(xbuf), &xbuflen,
650 &data[32], 32, // application parameter
651 &buf[0], 1, // user presence
652 &buf[1], 4, // counter
653 data, 32, // challenge parameter
654 NULL, 0);
655 //PrintAndLog("--xbuf(%d)[%d]: %s", res, xbuflen, sprint_hex(xbuf, xbuflen));
656 res = ecdsa_signature_verify(public_key, xbuf, xbuflen, &buf[5], len - 5);
657 if (res) {
658 if (res == -0x4e00) {
659 PrintAndLog("Signature is NOT VALID.");
660 } else {
661 PrintAndLog("Other signature check error: %x %s", (res<0)?-res:res, ecdsa_get_error(res));
662 }
663 } else {
664 PrintAndLog("Signature is OK.");
665 }
666 } else {
667 PrintAndLog("No public key provided. can't check signature.");
668 }
669 } else {
670 PrintAndLog("Invalid signature. res=%d.", res);
671 }
672
673 if (root) {
674 JsonSaveBufAsHex(root, "ChallengeParam", data, 32);
675 JsonSaveBufAsHex(root, "ApplicationParam", &data[32], 32);
676 JsonSaveInt(root, "KeyHandleLen", keyHandleLen);
677 JsonSaveBufAsHexCompact(root, "KeyHandle", &data[65], keyHandleLen);
678 JsonSaveInt(root, "Counter", cntr);
679
680 res = json_dump_file(root, fname, JSON_INDENT(2));
681 if (res) {
682 PrintAndLog("ERROR: can't save the file: %s", fname);
683 return 200;
684 }
685 PrintAndLog("File `%s` saved.", fname);
686
687 // free json object
688 json_decref(root);
689 }
690 return 0;
691 };
692
693 static command_t CommandTable[] =
694 {
695 {"help", CmdHelp, 1, "This help."},
696 {"info", CmdHFFidoInfo, 0, "Info about FIDO tag."},
697 {"reg", CmdHFFidoRegister, 0, "FIDO U2F Registration Message."},
698 {"auth", CmdHFFidoAuthenticate, 0, "FIDO U2F Authentication Message."},
699 {NULL, NULL, 0, NULL}
700 };
701
702 int CmdHFFido(const char *Cmd) {
703 (void)WaitForResponseTimeout(CMD_ACK,NULL,100);
704 CmdsParse(CommandTable, Cmd);
705 return 0;
706 }
707
708 int CmdHelp(const char *Cmd) {
709 CmdsHelp(CommandTable);
710 return 0;
711 }
Impressum, Datenschutz