u2f_data.c 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456
  1. #include <furi.h>
  2. #include "u2f_hid.h"
  3. #include <furi_hal.h>
  4. #include <storage/storage.h>
  5. #include <furi_hal_random.h>
  6. #include <flipper_format/flipper_format.h>
  7. #define TAG "U2F"
  8. #define U2F_DATA_FOLDER "/any/u2f/"
  9. #define U2F_CERT_FILE U2F_DATA_FOLDER "assets/cert.der"
  10. #define U2F_CERT_KEY_FILE U2F_DATA_FOLDER "assets/cert_key.u2f"
  11. #define U2F_KEY_FILE U2F_DATA_FOLDER "key.u2f"
  12. #define U2F_CNT_FILE U2F_DATA_FOLDER "cnt.u2f"
  13. #define U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_FACTORY 2
  14. #define U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE 11
  15. #define U2F_CERT_STOCK 0 // Stock certificate, private key is encrypted with factory key
  16. #define U2F_CERT_USER 1 // User certificate, private key is encrypted with unique key
  17. #define U2F_CERT_USER_UNENCRYPTED \
  18. 2 // Unencrypted user certificate, will be encrypted after first load
  19. #define U2F_CERT_KEY_FILE_TYPE "Flipper U2F Certificate Key File"
  20. #define U2F_CERT_KEY_VERSION 1
  21. #define U2F_DEVICE_KEY_FILE_TYPE "Flipper U2F Device Key File"
  22. #define U2F_DEVICE_KEY_VERSION 1
  23. #define U2F_COUNTER_FILE_TYPE "Flipper U2F Counter File"
  24. #define U2F_COUNTER_VERSION 1
  25. #define U2F_COUNTER_CONTROL_VAL 0xAA5500FF
  26. typedef struct {
  27. uint32_t counter;
  28. uint8_t random_salt[24];
  29. uint32_t control;
  30. } __attribute__((packed)) U2fCounterData;
  31. bool u2f_data_check(bool cert_only) {
  32. bool state = false;
  33. Storage* fs_api = furi_record_open("storage");
  34. File* file = storage_file_alloc(fs_api);
  35. do {
  36. if(!storage_file_open(file, U2F_CERT_FILE, FSAM_READ, FSOM_OPEN_EXISTING)) break;
  37. storage_file_close(file);
  38. if(!storage_file_open(file, U2F_CERT_KEY_FILE, FSAM_READ, FSOM_OPEN_EXISTING)) break;
  39. if(cert_only) {
  40. state = true;
  41. break;
  42. }
  43. storage_file_close(file);
  44. if(!storage_file_open(file, U2F_KEY_FILE, FSAM_READ, FSOM_OPEN_EXISTING)) break;
  45. storage_file_close(file);
  46. if(!storage_file_open(file, U2F_CNT_FILE, FSAM_READ, FSOM_OPEN_EXISTING)) break;
  47. state = true;
  48. } while(0);
  49. storage_file_close(file);
  50. storage_file_free(file);
  51. furi_record_close("storage");
  52. return state;
  53. }
  54. bool u2f_data_cert_check() {
  55. bool state = false;
  56. Storage* fs_api = furi_record_open("storage");
  57. File* file = storage_file_alloc(fs_api);
  58. uint8_t file_buf[8];
  59. if(storage_file_open(file, U2F_CERT_FILE, FSAM_READ, FSOM_OPEN_EXISTING)) {
  60. do {
  61. // Read header to check certificate size
  62. size_t file_size = storage_file_size(file);
  63. size_t len_cur = storage_file_read(file, file_buf, 4);
  64. if(len_cur != 4) break;
  65. if(file_buf[0] != 0x30) {
  66. FURI_LOG_E(TAG, "Wrong certificate header");
  67. break;
  68. }
  69. size_t temp_len = ((file_buf[2] << 8) | (file_buf[3])) + 4;
  70. if(temp_len != file_size) {
  71. FURI_LOG_E(TAG, "Wrong certificate length");
  72. break;
  73. }
  74. state = true;
  75. } while(0);
  76. }
  77. storage_file_close(file);
  78. storage_file_free(file);
  79. furi_record_close("storage");
  80. return state;
  81. }
  82. uint32_t u2f_data_cert_load(uint8_t* cert) {
  83. furi_assert(cert);
  84. Storage* fs_api = furi_record_open("storage");
  85. File* file = storage_file_alloc(fs_api);
  86. uint32_t file_size = 0;
  87. uint32_t len_cur = 0;
  88. if(storage_file_open(file, U2F_CERT_FILE, FSAM_READ, FSOM_OPEN_EXISTING)) {
  89. file_size = storage_file_size(file);
  90. len_cur = storage_file_read(file, cert, file_size);
  91. if(len_cur != file_size) len_cur = 0;
  92. }
  93. storage_file_close(file);
  94. storage_file_free(file);
  95. furi_record_close("storage");
  96. return len_cur;
  97. }
  98. static bool u2f_data_cert_key_encrypt(uint8_t* cert_key) {
  99. furi_assert(cert_key);
  100. bool state = false;
  101. uint8_t iv[16];
  102. uint8_t key[48];
  103. uint32_t cert_type = U2F_CERT_USER;
  104. FURI_LOG_I(TAG, "Encrypting user cert key");
  105. // Generate random IV
  106. furi_hal_random_fill_buf(iv, 16);
  107. if(!furi_hal_crypto_store_load_key(U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE, iv)) {
  108. FURI_LOG_E(TAG, "Unable to load encryption key");
  109. return false;
  110. }
  111. if(!furi_hal_crypto_encrypt(cert_key, key, 32)) {
  112. FURI_LOG_E(TAG, "Encryption failed");
  113. return false;
  114. }
  115. furi_hal_crypto_store_unload_key(U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE);
  116. Storage* storage = furi_record_open("storage");
  117. FlipperFormat* flipper_format = flipper_format_file_alloc(storage);
  118. if(flipper_format_file_open_always(flipper_format, U2F_CERT_KEY_FILE)) {
  119. do {
  120. if(!flipper_format_write_header_cstr(
  121. flipper_format, U2F_CERT_KEY_FILE_TYPE, U2F_CERT_KEY_VERSION))
  122. break;
  123. if(!flipper_format_write_uint32(flipper_format, "Type", &cert_type, 1)) break;
  124. if(!flipper_format_write_hex(flipper_format, "IV", iv, 16)) break;
  125. if(!flipper_format_write_hex(flipper_format, "Data", key, 48)) break;
  126. state = true;
  127. } while(0);
  128. }
  129. flipper_format_free(flipper_format);
  130. furi_record_close("storage");
  131. return state;
  132. }
  133. bool u2f_data_cert_key_load(uint8_t* cert_key) {
  134. furi_assert(cert_key);
  135. bool state = false;
  136. uint8_t iv[16];
  137. uint8_t key[48];
  138. uint32_t cert_type = 0;
  139. uint8_t key_slot = 0;
  140. uint32_t version = 0;
  141. // Check if unique key exists in secure eclave and generate it if missing
  142. if(!furi_hal_crypto_verify_key(U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE)) return false;
  143. string_t filetype;
  144. string_init(filetype);
  145. Storage* storage = furi_record_open("storage");
  146. FlipperFormat* flipper_format = flipper_format_file_alloc(storage);
  147. if(flipper_format_file_open_existing(flipper_format, U2F_CERT_KEY_FILE)) {
  148. do {
  149. if(!flipper_format_read_header(flipper_format, filetype, &version)) {
  150. FURI_LOG_E(TAG, "Missing or incorrect header");
  151. break;
  152. }
  153. if(strcmp(string_get_cstr(filetype), U2F_CERT_KEY_FILE_TYPE) != 0 ||
  154. version != U2F_CERT_KEY_VERSION) {
  155. FURI_LOG_E(TAG, "Type or version mismatch");
  156. break;
  157. }
  158. if(!flipper_format_read_uint32(flipper_format, "Type", &cert_type, 1)) {
  159. FURI_LOG_E(TAG, "Missing cert type");
  160. break;
  161. }
  162. if(cert_type == U2F_CERT_STOCK) {
  163. key_slot = U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_FACTORY;
  164. } else if(cert_type == U2F_CERT_USER) {
  165. key_slot = U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE;
  166. } else if(cert_type == U2F_CERT_USER_UNENCRYPTED) {
  167. key_slot = 0;
  168. } else {
  169. FURI_LOG_E(TAG, "Unknown cert type");
  170. break;
  171. }
  172. if(key_slot != 0) {
  173. if(!flipper_format_read_hex(flipper_format, "IV", iv, 16)) {
  174. FURI_LOG_E(TAG, "Missing IV");
  175. break;
  176. }
  177. if(!flipper_format_read_hex(flipper_format, "Data", key, 48)) {
  178. FURI_LOG_E(TAG, "Missing data");
  179. break;
  180. }
  181. if(!furi_hal_crypto_store_load_key(key_slot, iv)) {
  182. FURI_LOG_E(TAG, "Unable to load encryption key");
  183. break;
  184. }
  185. memset(cert_key, 0, 32);
  186. if(!furi_hal_crypto_decrypt(key, cert_key, 32)) {
  187. memset(cert_key, 0, 32);
  188. FURI_LOG_E(TAG, "Decryption failed");
  189. break;
  190. }
  191. furi_hal_crypto_store_unload_key(key_slot);
  192. } else {
  193. if(!flipper_format_read_hex(flipper_format, "Data", cert_key, 32)) {
  194. FURI_LOG_E(TAG, "Missing data");
  195. break;
  196. }
  197. }
  198. state = true;
  199. } while(0);
  200. }
  201. flipper_format_free(flipper_format);
  202. furi_record_close("storage");
  203. string_clear(filetype);
  204. if(cert_type == U2F_CERT_USER_UNENCRYPTED) {
  205. return u2f_data_cert_key_encrypt(cert_key);
  206. }
  207. return state;
  208. }
  209. bool u2f_data_key_load(uint8_t* device_key) {
  210. furi_assert(device_key);
  211. bool state = false;
  212. uint8_t iv[16];
  213. uint8_t key[48];
  214. uint32_t version = 0;
  215. string_t filetype;
  216. string_init(filetype);
  217. Storage* storage = furi_record_open("storage");
  218. FlipperFormat* flipper_format = flipper_format_file_alloc(storage);
  219. if(flipper_format_file_open_existing(flipper_format, U2F_KEY_FILE)) {
  220. do {
  221. if(!flipper_format_read_header(flipper_format, filetype, &version)) {
  222. FURI_LOG_E(TAG, "Missing or incorrect header");
  223. break;
  224. }
  225. if(strcmp(string_get_cstr(filetype), U2F_DEVICE_KEY_FILE_TYPE) != 0 ||
  226. version != U2F_DEVICE_KEY_VERSION) {
  227. FURI_LOG_E(TAG, "Type or version mismatch");
  228. break;
  229. }
  230. if(!flipper_format_read_hex(flipper_format, "IV", iv, 16)) {
  231. FURI_LOG_E(TAG, "Missing IV");
  232. break;
  233. }
  234. if(!flipper_format_read_hex(flipper_format, "Data", key, 48)) {
  235. FURI_LOG_E(TAG, "Missing data");
  236. break;
  237. }
  238. if(!furi_hal_crypto_store_load_key(U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE, iv)) {
  239. FURI_LOG_E(TAG, "Unable to load encryption key");
  240. break;
  241. }
  242. memset(device_key, 0, 32);
  243. if(!furi_hal_crypto_decrypt(key, device_key, 32)) {
  244. memset(device_key, 0, 32);
  245. FURI_LOG_E(TAG, "Decryption failed");
  246. break;
  247. }
  248. furi_hal_crypto_store_unload_key(U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE);
  249. state = true;
  250. } while(0);
  251. }
  252. flipper_format_free(flipper_format);
  253. furi_record_close("storage");
  254. string_clear(filetype);
  255. return state;
  256. }
  257. bool u2f_data_key_generate(uint8_t* device_key) {
  258. furi_assert(device_key);
  259. bool state = false;
  260. uint8_t iv[16];
  261. uint8_t key[32];
  262. uint8_t key_encrypted[48];
  263. // Generate random IV and key
  264. furi_hal_random_fill_buf(iv, 16);
  265. furi_hal_random_fill_buf(key, 32);
  266. if(!furi_hal_crypto_store_load_key(U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE, iv)) {
  267. FURI_LOG_E(TAG, "Unable to load encryption key");
  268. return false;
  269. }
  270. if(!furi_hal_crypto_encrypt(key, key_encrypted, 32)) {
  271. FURI_LOG_E(TAG, "Encryption failed");
  272. return false;
  273. }
  274. furi_hal_crypto_store_unload_key(U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE);
  275. Storage* storage = furi_record_open("storage");
  276. FlipperFormat* flipper_format = flipper_format_file_alloc(storage);
  277. if(flipper_format_file_open_always(flipper_format, U2F_KEY_FILE)) {
  278. do {
  279. if(!flipper_format_write_header_cstr(
  280. flipper_format, U2F_DEVICE_KEY_FILE_TYPE, U2F_DEVICE_KEY_VERSION))
  281. break;
  282. if(!flipper_format_write_hex(flipper_format, "IV", iv, 16)) break;
  283. if(!flipper_format_write_hex(flipper_format, "Data", key_encrypted, 48)) break;
  284. state = true;
  285. memcpy(device_key, key, 32);
  286. } while(0);
  287. }
  288. flipper_format_free(flipper_format);
  289. furi_record_close("storage");
  290. return state;
  291. }
  292. bool u2f_data_cnt_read(uint32_t* cnt_val) {
  293. furi_assert(cnt_val);
  294. bool state = false;
  295. uint8_t iv[16];
  296. U2fCounterData cnt;
  297. uint8_t cnt_encr[48];
  298. uint32_t version = 0;
  299. string_t filetype;
  300. string_init(filetype);
  301. Storage* storage = furi_record_open("storage");
  302. FlipperFormat* flipper_format = flipper_format_file_alloc(storage);
  303. if(flipper_format_file_open_existing(flipper_format, U2F_CNT_FILE)) {
  304. do {
  305. if(!flipper_format_read_header(flipper_format, filetype, &version)) {
  306. FURI_LOG_E(TAG, "Missing or incorrect header");
  307. break;
  308. }
  309. if(strcmp(string_get_cstr(filetype), U2F_COUNTER_FILE_TYPE) != 0 ||
  310. version != U2F_COUNTER_VERSION) {
  311. FURI_LOG_E(TAG, "Type or version mismatch");
  312. break;
  313. }
  314. if(!flipper_format_read_hex(flipper_format, "IV", iv, 16)) {
  315. FURI_LOG_E(TAG, "Missing IV");
  316. break;
  317. }
  318. if(!flipper_format_read_hex(flipper_format, "Data", cnt_encr, 48)) {
  319. FURI_LOG_E(TAG, "Missing data");
  320. break;
  321. }
  322. if(!furi_hal_crypto_store_load_key(U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE, iv)) {
  323. FURI_LOG_E(TAG, "Unable to load encryption key");
  324. break;
  325. }
  326. memset(&cnt, 0, 32);
  327. if(!furi_hal_crypto_decrypt(cnt_encr, (uint8_t*)&cnt, 32)) {
  328. memset(&cnt, 0, 32);
  329. FURI_LOG_E(TAG, "Decryption failed");
  330. break;
  331. }
  332. furi_hal_crypto_store_unload_key(U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE);
  333. if(cnt.control == U2F_COUNTER_CONTROL_VAL) {
  334. *cnt_val = cnt.counter;
  335. state = true;
  336. }
  337. } while(0);
  338. }
  339. flipper_format_free(flipper_format);
  340. furi_record_close("storage");
  341. string_clear(filetype);
  342. return state;
  343. }
  344. bool u2f_data_cnt_write(uint32_t cnt_val) {
  345. bool state = false;
  346. uint8_t iv[16];
  347. U2fCounterData cnt;
  348. uint8_t cnt_encr[48];
  349. // Generate random IV and key
  350. furi_hal_random_fill_buf(iv, 16);
  351. furi_hal_random_fill_buf(cnt.random_salt, 24);
  352. cnt.control = U2F_COUNTER_CONTROL_VAL;
  353. cnt.counter = cnt_val;
  354. if(!furi_hal_crypto_store_load_key(U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE, iv)) {
  355. FURI_LOG_E(TAG, "Unable to load encryption key");
  356. return false;
  357. }
  358. if(!furi_hal_crypto_encrypt((uint8_t*)&cnt, cnt_encr, 32)) {
  359. FURI_LOG_E(TAG, "Encryption failed");
  360. return false;
  361. }
  362. furi_hal_crypto_store_unload_key(U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE);
  363. Storage* storage = furi_record_open("storage");
  364. FlipperFormat* flipper_format = flipper_format_file_alloc(storage);
  365. if(flipper_format_file_open_always(flipper_format, U2F_CNT_FILE)) {
  366. do {
  367. if(!flipper_format_write_header_cstr(
  368. flipper_format, U2F_COUNTER_FILE_TYPE, U2F_COUNTER_VERSION))
  369. break;
  370. if(!flipper_format_write_hex(flipper_format, "IV", iv, 16)) break;
  371. if(!flipper_format_write_hex(flipper_format, "Data", cnt_encr, 48)) break;
  372. state = true;
  373. } while(0);
  374. }
  375. flipper_format_free(flipper_format);
  376. furi_record_close("storage");
  377. return state;
  378. }