| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472 |
- #include <furi.h>
- #include "u2f_data.h"
- #include <furi_hal.h>
- #include <storage/storage.h>
- #include <furi_hal_random.h>
- #include <flipper_format/flipper_format.h>
- #define TAG "U2F"
- #define U2F_DATA_FOLDER ANY_PATH("u2f/")
- #define U2F_CERT_FILE U2F_DATA_FOLDER "assets/cert.der"
- #define U2F_CERT_KEY_FILE U2F_DATA_FOLDER "assets/cert_key.u2f"
- #define U2F_KEY_FILE U2F_DATA_FOLDER "key.u2f"
- #define U2F_CNT_FILE U2F_DATA_FOLDER "cnt.u2f"
- #define U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_FACTORY 2
- #define U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE 11
- #define U2F_CERT_STOCK 0 // Stock certificate, private key is encrypted with factory key
- #define U2F_CERT_USER 1 // User certificate, private key is encrypted with unique key
- #define U2F_CERT_USER_UNENCRYPTED \
- 2 // Unencrypted user certificate, will be encrypted after first load
- #define U2F_CERT_KEY_FILE_TYPE "Flipper U2F Certificate Key File"
- #define U2F_CERT_KEY_VERSION 1
- #define U2F_DEVICE_KEY_FILE_TYPE "Flipper U2F Device Key File"
- #define U2F_DEVICE_KEY_VERSION 1
- #define U2F_COUNTER_FILE_TYPE "Flipper U2F Counter File"
- #define U2F_COUNTER_VERSION 2
- #define U2F_COUNTER_VERSION_OLD 1
- #define U2F_COUNTER_CONTROL_VAL 0xAA5500FF
- typedef struct {
- uint32_t counter;
- uint8_t random_salt[24];
- uint32_t control;
- } __attribute__((packed)) U2fCounterData;
- bool u2f_data_check(bool cert_only) {
- bool state = false;
- Storage* fs_api = furi_record_open(RECORD_STORAGE);
- File* file = storage_file_alloc(fs_api);
- do {
- if(!storage_file_open(file, U2F_CERT_FILE, FSAM_READ, FSOM_OPEN_EXISTING)) break;
- storage_file_close(file);
- if(!storage_file_open(file, U2F_CERT_KEY_FILE, FSAM_READ, FSOM_OPEN_EXISTING)) break;
- if(cert_only) {
- state = true;
- break;
- }
- storage_file_close(file);
- if(!storage_file_open(file, U2F_KEY_FILE, FSAM_READ, FSOM_OPEN_EXISTING)) break;
- storage_file_close(file);
- if(!storage_file_open(file, U2F_CNT_FILE, FSAM_READ, FSOM_OPEN_EXISTING)) break;
- state = true;
- } while(0);
- storage_file_close(file);
- storage_file_free(file);
- furi_record_close(RECORD_STORAGE);
- return state;
- }
- bool u2f_data_cert_check() {
- bool state = false;
- Storage* fs_api = furi_record_open(RECORD_STORAGE);
- File* file = storage_file_alloc(fs_api);
- uint8_t file_buf[8];
- if(storage_file_open(file, U2F_CERT_FILE, FSAM_READ, FSOM_OPEN_EXISTING)) {
- do {
- // Read header to check certificate size
- size_t file_size = storage_file_size(file);
- size_t len_cur = storage_file_read(file, file_buf, 4);
- if(len_cur != 4) break;
- if(file_buf[0] != 0x30) {
- FURI_LOG_E(TAG, "Wrong certificate header");
- break;
- }
- size_t temp_len = ((file_buf[2] << 8) | (file_buf[3])) + 4;
- if(temp_len != file_size) {
- FURI_LOG_E(TAG, "Wrong certificate length");
- break;
- }
- state = true;
- } while(0);
- }
- storage_file_close(file);
- storage_file_free(file);
- furi_record_close(RECORD_STORAGE);
- return state;
- }
- uint32_t u2f_data_cert_load(uint8_t* cert) {
- furi_assert(cert);
- Storage* fs_api = furi_record_open(RECORD_STORAGE);
- File* file = storage_file_alloc(fs_api);
- uint32_t file_size = 0;
- uint32_t len_cur = 0;
- if(storage_file_open(file, U2F_CERT_FILE, FSAM_READ, FSOM_OPEN_EXISTING)) {
- file_size = storage_file_size(file);
- len_cur = storage_file_read(file, cert, file_size);
- if(len_cur != file_size) len_cur = 0;
- }
- storage_file_close(file);
- storage_file_free(file);
- furi_record_close(RECORD_STORAGE);
- return len_cur;
- }
- static bool u2f_data_cert_key_encrypt(uint8_t* cert_key) {
- furi_assert(cert_key);
- bool state = false;
- uint8_t iv[16];
- uint8_t key[48];
- uint32_t cert_type = U2F_CERT_USER;
- FURI_LOG_I(TAG, "Encrypting user cert key");
- // Generate random IV
- furi_hal_random_fill_buf(iv, 16);
- if(!furi_hal_crypto_store_load_key(U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE, iv)) {
- FURI_LOG_E(TAG, "Unable to load encryption key");
- return false;
- }
- if(!furi_hal_crypto_encrypt(cert_key, key, 32)) {
- FURI_LOG_E(TAG, "Encryption failed");
- return false;
- }
- furi_hal_crypto_store_unload_key(U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE);
- Storage* storage = furi_record_open(RECORD_STORAGE);
- FlipperFormat* flipper_format = flipper_format_file_alloc(storage);
- if(flipper_format_file_open_always(flipper_format, U2F_CERT_KEY_FILE)) {
- do {
- if(!flipper_format_write_header_cstr(
- flipper_format, U2F_CERT_KEY_FILE_TYPE, U2F_CERT_KEY_VERSION))
- break;
- if(!flipper_format_write_uint32(flipper_format, "Type", &cert_type, 1)) break;
- if(!flipper_format_write_hex(flipper_format, "IV", iv, 16)) break;
- if(!flipper_format_write_hex(flipper_format, "Data", key, 48)) break;
- state = true;
- } while(0);
- }
- flipper_format_free(flipper_format);
- furi_record_close(RECORD_STORAGE);
- return state;
- }
- bool u2f_data_cert_key_load(uint8_t* cert_key) {
- furi_assert(cert_key);
- bool state = false;
- uint8_t iv[16];
- uint8_t key[48];
- uint32_t cert_type = 0;
- uint8_t key_slot = 0;
- uint32_t version = 0;
- // Check if unique key exists in secure eclave and generate it if missing
- if(!furi_hal_crypto_verify_key(U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE)) return false;
- FuriString* filetype;
- filetype = furi_string_alloc();
- Storage* storage = furi_record_open(RECORD_STORAGE);
- FlipperFormat* flipper_format = flipper_format_file_alloc(storage);
- if(flipper_format_file_open_existing(flipper_format, U2F_CERT_KEY_FILE)) {
- do {
- if(!flipper_format_read_header(flipper_format, filetype, &version)) {
- FURI_LOG_E(TAG, "Missing or incorrect header");
- break;
- }
- if(strcmp(furi_string_get_cstr(filetype), U2F_CERT_KEY_FILE_TYPE) != 0 ||
- version != U2F_CERT_KEY_VERSION) {
- FURI_LOG_E(TAG, "Type or version mismatch");
- break;
- }
- if(!flipper_format_read_uint32(flipper_format, "Type", &cert_type, 1)) {
- FURI_LOG_E(TAG, "Missing cert type");
- break;
- }
- if(cert_type == U2F_CERT_STOCK) {
- key_slot = U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_FACTORY;
- } else if(cert_type == U2F_CERT_USER) {
- key_slot = U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE;
- } else if(cert_type == U2F_CERT_USER_UNENCRYPTED) {
- key_slot = 0;
- } else {
- FURI_LOG_E(TAG, "Unknown cert type");
- break;
- }
- if(key_slot != 0) {
- if(!flipper_format_read_hex(flipper_format, "IV", iv, 16)) {
- FURI_LOG_E(TAG, "Missing IV");
- break;
- }
- if(!flipper_format_read_hex(flipper_format, "Data", key, 48)) {
- FURI_LOG_E(TAG, "Missing data");
- break;
- }
- if(!furi_hal_crypto_store_load_key(key_slot, iv)) {
- FURI_LOG_E(TAG, "Unable to load encryption key");
- break;
- }
- memset(cert_key, 0, 32);
- if(!furi_hal_crypto_decrypt(key, cert_key, 32)) {
- memset(cert_key, 0, 32);
- FURI_LOG_E(TAG, "Decryption failed");
- break;
- }
- furi_hal_crypto_store_unload_key(key_slot);
- } else {
- if(!flipper_format_read_hex(flipper_format, "Data", cert_key, 32)) {
- FURI_LOG_E(TAG, "Missing data");
- break;
- }
- }
- state = true;
- } while(0);
- }
- flipper_format_free(flipper_format);
- furi_record_close(RECORD_STORAGE);
- furi_string_free(filetype);
- if(cert_type == U2F_CERT_USER_UNENCRYPTED) {
- return u2f_data_cert_key_encrypt(cert_key);
- }
- return state;
- }
- bool u2f_data_key_load(uint8_t* device_key) {
- furi_assert(device_key);
- bool state = false;
- uint8_t iv[16];
- uint8_t key[48];
- uint32_t version = 0;
- FuriString* filetype;
- filetype = furi_string_alloc();
- Storage* storage = furi_record_open(RECORD_STORAGE);
- FlipperFormat* flipper_format = flipper_format_file_alloc(storage);
- if(flipper_format_file_open_existing(flipper_format, U2F_KEY_FILE)) {
- do {
- if(!flipper_format_read_header(flipper_format, filetype, &version)) {
- FURI_LOG_E(TAG, "Missing or incorrect header");
- break;
- }
- if(strcmp(furi_string_get_cstr(filetype), U2F_DEVICE_KEY_FILE_TYPE) != 0 ||
- version != U2F_DEVICE_KEY_VERSION) {
- FURI_LOG_E(TAG, "Type or version mismatch");
- break;
- }
- if(!flipper_format_read_hex(flipper_format, "IV", iv, 16)) {
- FURI_LOG_E(TAG, "Missing IV");
- break;
- }
- if(!flipper_format_read_hex(flipper_format, "Data", key, 48)) {
- FURI_LOG_E(TAG, "Missing data");
- break;
- }
- if(!furi_hal_crypto_store_load_key(U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE, iv)) {
- FURI_LOG_E(TAG, "Unable to load encryption key");
- break;
- }
- memset(device_key, 0, 32);
- if(!furi_hal_crypto_decrypt(key, device_key, 32)) {
- memset(device_key, 0, 32);
- FURI_LOG_E(TAG, "Decryption failed");
- break;
- }
- furi_hal_crypto_store_unload_key(U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE);
- state = true;
- } while(0);
- }
- flipper_format_free(flipper_format);
- furi_record_close(RECORD_STORAGE);
- furi_string_free(filetype);
- return state;
- }
- bool u2f_data_key_generate(uint8_t* device_key) {
- furi_assert(device_key);
- bool state = false;
- uint8_t iv[16];
- uint8_t key[32];
- uint8_t key_encrypted[48];
- // Generate random IV and key
- furi_hal_random_fill_buf(iv, 16);
- furi_hal_random_fill_buf(key, 32);
- if(!furi_hal_crypto_store_load_key(U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE, iv)) {
- FURI_LOG_E(TAG, "Unable to load encryption key");
- return false;
- }
- if(!furi_hal_crypto_encrypt(key, key_encrypted, 32)) {
- FURI_LOG_E(TAG, "Encryption failed");
- return false;
- }
- furi_hal_crypto_store_unload_key(U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE);
- Storage* storage = furi_record_open(RECORD_STORAGE);
- FlipperFormat* flipper_format = flipper_format_file_alloc(storage);
- if(flipper_format_file_open_always(flipper_format, U2F_KEY_FILE)) {
- do {
- if(!flipper_format_write_header_cstr(
- flipper_format, U2F_DEVICE_KEY_FILE_TYPE, U2F_DEVICE_KEY_VERSION))
- break;
- if(!flipper_format_write_hex(flipper_format, "IV", iv, 16)) break;
- if(!flipper_format_write_hex(flipper_format, "Data", key_encrypted, 48)) break;
- state = true;
- memcpy(device_key, key, 32);
- } while(0);
- }
- flipper_format_free(flipper_format);
- furi_record_close(RECORD_STORAGE);
- return state;
- }
- bool u2f_data_cnt_read(uint32_t* cnt_val) {
- furi_assert(cnt_val);
- bool state = false;
- bool old_counter = false;
- uint8_t iv[16];
- U2fCounterData cnt;
- uint8_t cnt_encr[48];
- uint32_t version = 0;
- FuriString* filetype;
- filetype = furi_string_alloc();
- Storage* storage = furi_record_open(RECORD_STORAGE);
- FlipperFormat* flipper_format = flipper_format_file_alloc(storage);
- if(flipper_format_file_open_existing(flipper_format, U2F_CNT_FILE)) {
- do {
- if(!flipper_format_read_header(flipper_format, filetype, &version)) {
- FURI_LOG_E(TAG, "Missing or incorrect header");
- break;
- }
- if(strcmp(furi_string_get_cstr(filetype), U2F_COUNTER_FILE_TYPE) != 0) {
- FURI_LOG_E(TAG, "Type mismatch");
- break;
- }
- if(version == U2F_COUNTER_VERSION_OLD) {
- // Counter is from previous U2F app version with endianness bug
- FURI_LOG_W(TAG, "Counter from old version");
- old_counter = true;
- } else if(version != U2F_COUNTER_VERSION) {
- FURI_LOG_E(TAG, "Version mismatch");
- break;
- }
- if(!flipper_format_read_hex(flipper_format, "IV", iv, 16)) {
- FURI_LOG_E(TAG, "Missing IV");
- break;
- }
- if(!flipper_format_read_hex(flipper_format, "Data", cnt_encr, 48)) {
- FURI_LOG_E(TAG, "Missing data");
- break;
- }
- if(!furi_hal_crypto_store_load_key(U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE, iv)) {
- FURI_LOG_E(TAG, "Unable to load encryption key");
- break;
- }
- memset(&cnt, 0, 32);
- if(!furi_hal_crypto_decrypt(cnt_encr, (uint8_t*)&cnt, 32)) {
- memset(&cnt, 0, 32);
- FURI_LOG_E(TAG, "Decryption failed");
- break;
- }
- furi_hal_crypto_store_unload_key(U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE);
- if(cnt.control == U2F_COUNTER_CONTROL_VAL) {
- *cnt_val = cnt.counter;
- state = true;
- }
- } while(0);
- }
- flipper_format_free(flipper_format);
- furi_record_close(RECORD_STORAGE);
- furi_string_free(filetype);
- if(old_counter && state) {
- // Change counter endianness and rewrite counter file
- *cnt_val = __REV(cnt.counter);
- state = u2f_data_cnt_write(*cnt_val);
- }
- return state;
- }
- bool u2f_data_cnt_write(uint32_t cnt_val) {
- bool state = false;
- uint8_t iv[16];
- U2fCounterData cnt;
- uint8_t cnt_encr[48];
- // Generate random IV and key
- furi_hal_random_fill_buf(iv, 16);
- furi_hal_random_fill_buf(cnt.random_salt, 24);
- cnt.control = U2F_COUNTER_CONTROL_VAL;
- cnt.counter = cnt_val;
- if(!furi_hal_crypto_store_load_key(U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE, iv)) {
- FURI_LOG_E(TAG, "Unable to load encryption key");
- return false;
- }
- if(!furi_hal_crypto_encrypt((uint8_t*)&cnt, cnt_encr, 32)) {
- FURI_LOG_E(TAG, "Encryption failed");
- return false;
- }
- furi_hal_crypto_store_unload_key(U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE);
- Storage* storage = furi_record_open(RECORD_STORAGE);
- FlipperFormat* flipper_format = flipper_format_file_alloc(storage);
- if(flipper_format_file_open_always(flipper_format, U2F_CNT_FILE)) {
- do {
- if(!flipper_format_write_header_cstr(
- flipper_format, U2F_COUNTER_FILE_TYPE, U2F_COUNTER_VERSION))
- break;
- if(!flipper_format_write_hex(flipper_format, "IV", iv, 16)) break;
- if(!flipper_format_write_hex(flipper_format, "Data", cnt_encr, 48)) break;
- state = true;
- } while(0);
- }
- flipper_format_free(flipper_format);
- furi_record_close(RECORD_STORAGE);
- return state;
- }
|