u2f_data.c 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472
  1. #include <furi.h>
  2. #include "u2f_data.h"
  3. #include <furi_hal.h>
  4. #include <storage/storage.h>
  5. #include <furi_hal_random.h>
  6. #include <flipper_format/flipper_format.h>
  7. #define TAG "U2F"
  8. #define U2F_DATA_FOLDER ANY_PATH("u2f/")
  9. #define U2F_CERT_FILE U2F_DATA_FOLDER "assets/cert.der"
  10. #define U2F_CERT_KEY_FILE U2F_DATA_FOLDER "assets/cert_key.u2f"
  11. #define U2F_KEY_FILE U2F_DATA_FOLDER "key.u2f"
  12. #define U2F_CNT_FILE U2F_DATA_FOLDER "cnt.u2f"
  13. #define U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_FACTORY 2
  14. #define U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE 11
  15. #define U2F_CERT_STOCK 0 // Stock certificate, private key is encrypted with factory key
  16. #define U2F_CERT_USER 1 // User certificate, private key is encrypted with unique key
  17. #define U2F_CERT_USER_UNENCRYPTED \
  18. 2 // Unencrypted user certificate, will be encrypted after first load
  19. #define U2F_CERT_KEY_FILE_TYPE "Flipper U2F Certificate Key File"
  20. #define U2F_CERT_KEY_VERSION 1
  21. #define U2F_DEVICE_KEY_FILE_TYPE "Flipper U2F Device Key File"
  22. #define U2F_DEVICE_KEY_VERSION 1
  23. #define U2F_COUNTER_FILE_TYPE "Flipper U2F Counter File"
  24. #define U2F_COUNTER_VERSION 2
  25. #define U2F_COUNTER_VERSION_OLD 1
  26. #define U2F_COUNTER_CONTROL_VAL 0xAA5500FF
  27. typedef struct {
  28. uint32_t counter;
  29. uint8_t random_salt[24];
  30. uint32_t control;
  31. } __attribute__((packed)) U2fCounterData;
  32. bool u2f_data_check(bool cert_only) {
  33. bool state = false;
  34. Storage* fs_api = furi_record_open(RECORD_STORAGE);
  35. File* file = storage_file_alloc(fs_api);
  36. do {
  37. if(!storage_file_open(file, U2F_CERT_FILE, FSAM_READ, FSOM_OPEN_EXISTING)) break;
  38. storage_file_close(file);
  39. if(!storage_file_open(file, U2F_CERT_KEY_FILE, FSAM_READ, FSOM_OPEN_EXISTING)) break;
  40. if(cert_only) {
  41. state = true;
  42. break;
  43. }
  44. storage_file_close(file);
  45. if(!storage_file_open(file, U2F_KEY_FILE, FSAM_READ, FSOM_OPEN_EXISTING)) break;
  46. storage_file_close(file);
  47. if(!storage_file_open(file, U2F_CNT_FILE, FSAM_READ, FSOM_OPEN_EXISTING)) break;
  48. state = true;
  49. } while(0);
  50. storage_file_close(file);
  51. storage_file_free(file);
  52. furi_record_close(RECORD_STORAGE);
  53. return state;
  54. }
  55. bool u2f_data_cert_check() {
  56. bool state = false;
  57. Storage* fs_api = furi_record_open(RECORD_STORAGE);
  58. File* file = storage_file_alloc(fs_api);
  59. uint8_t file_buf[8];
  60. if(storage_file_open(file, U2F_CERT_FILE, FSAM_READ, FSOM_OPEN_EXISTING)) {
  61. do {
  62. // Read header to check certificate size
  63. size_t file_size = storage_file_size(file);
  64. size_t len_cur = storage_file_read(file, file_buf, 4);
  65. if(len_cur != 4) break;
  66. if(file_buf[0] != 0x30) {
  67. FURI_LOG_E(TAG, "Wrong certificate header");
  68. break;
  69. }
  70. size_t temp_len = ((file_buf[2] << 8) | (file_buf[3])) + 4;
  71. if(temp_len != file_size) {
  72. FURI_LOG_E(TAG, "Wrong certificate length");
  73. break;
  74. }
  75. state = true;
  76. } while(0);
  77. }
  78. storage_file_close(file);
  79. storage_file_free(file);
  80. furi_record_close(RECORD_STORAGE);
  81. return state;
  82. }
  83. uint32_t u2f_data_cert_load(uint8_t* cert) {
  84. furi_assert(cert);
  85. Storage* fs_api = furi_record_open(RECORD_STORAGE);
  86. File* file = storage_file_alloc(fs_api);
  87. uint32_t file_size = 0;
  88. uint32_t len_cur = 0;
  89. if(storage_file_open(file, U2F_CERT_FILE, FSAM_READ, FSOM_OPEN_EXISTING)) {
  90. file_size = storage_file_size(file);
  91. len_cur = storage_file_read(file, cert, file_size);
  92. if(len_cur != file_size) len_cur = 0;
  93. }
  94. storage_file_close(file);
  95. storage_file_free(file);
  96. furi_record_close(RECORD_STORAGE);
  97. return len_cur;
  98. }
  99. static bool u2f_data_cert_key_encrypt(uint8_t* cert_key) {
  100. furi_assert(cert_key);
  101. bool state = false;
  102. uint8_t iv[16];
  103. uint8_t key[48];
  104. uint32_t cert_type = U2F_CERT_USER;
  105. FURI_LOG_I(TAG, "Encrypting user cert key");
  106. // Generate random IV
  107. furi_hal_random_fill_buf(iv, 16);
  108. if(!furi_hal_crypto_store_load_key(U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE, iv)) {
  109. FURI_LOG_E(TAG, "Unable to load encryption key");
  110. return false;
  111. }
  112. if(!furi_hal_crypto_encrypt(cert_key, key, 32)) {
  113. FURI_LOG_E(TAG, "Encryption failed");
  114. return false;
  115. }
  116. furi_hal_crypto_store_unload_key(U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE);
  117. Storage* storage = furi_record_open(RECORD_STORAGE);
  118. FlipperFormat* flipper_format = flipper_format_file_alloc(storage);
  119. if(flipper_format_file_open_always(flipper_format, U2F_CERT_KEY_FILE)) {
  120. do {
  121. if(!flipper_format_write_header_cstr(
  122. flipper_format, U2F_CERT_KEY_FILE_TYPE, U2F_CERT_KEY_VERSION))
  123. break;
  124. if(!flipper_format_write_uint32(flipper_format, "Type", &cert_type, 1)) break;
  125. if(!flipper_format_write_hex(flipper_format, "IV", iv, 16)) break;
  126. if(!flipper_format_write_hex(flipper_format, "Data", key, 48)) break;
  127. state = true;
  128. } while(0);
  129. }
  130. flipper_format_free(flipper_format);
  131. furi_record_close(RECORD_STORAGE);
  132. return state;
  133. }
  134. bool u2f_data_cert_key_load(uint8_t* cert_key) {
  135. furi_assert(cert_key);
  136. bool state = false;
  137. uint8_t iv[16];
  138. uint8_t key[48];
  139. uint32_t cert_type = 0;
  140. uint8_t key_slot = 0;
  141. uint32_t version = 0;
  142. // Check if unique key exists in secure eclave and generate it if missing
  143. if(!furi_hal_crypto_verify_key(U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE)) return false;
  144. FuriString* filetype;
  145. filetype = furi_string_alloc();
  146. Storage* storage = furi_record_open(RECORD_STORAGE);
  147. FlipperFormat* flipper_format = flipper_format_file_alloc(storage);
  148. if(flipper_format_file_open_existing(flipper_format, U2F_CERT_KEY_FILE)) {
  149. do {
  150. if(!flipper_format_read_header(flipper_format, filetype, &version)) {
  151. FURI_LOG_E(TAG, "Missing or incorrect header");
  152. break;
  153. }
  154. if(strcmp(furi_string_get_cstr(filetype), U2F_CERT_KEY_FILE_TYPE) != 0 ||
  155. version != U2F_CERT_KEY_VERSION) {
  156. FURI_LOG_E(TAG, "Type or version mismatch");
  157. break;
  158. }
  159. if(!flipper_format_read_uint32(flipper_format, "Type", &cert_type, 1)) {
  160. FURI_LOG_E(TAG, "Missing cert type");
  161. break;
  162. }
  163. if(cert_type == U2F_CERT_STOCK) {
  164. key_slot = U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_FACTORY;
  165. } else if(cert_type == U2F_CERT_USER) {
  166. key_slot = U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE;
  167. } else if(cert_type == U2F_CERT_USER_UNENCRYPTED) {
  168. key_slot = 0;
  169. } else {
  170. FURI_LOG_E(TAG, "Unknown cert type");
  171. break;
  172. }
  173. if(key_slot != 0) {
  174. if(!flipper_format_read_hex(flipper_format, "IV", iv, 16)) {
  175. FURI_LOG_E(TAG, "Missing IV");
  176. break;
  177. }
  178. if(!flipper_format_read_hex(flipper_format, "Data", key, 48)) {
  179. FURI_LOG_E(TAG, "Missing data");
  180. break;
  181. }
  182. if(!furi_hal_crypto_store_load_key(key_slot, iv)) {
  183. FURI_LOG_E(TAG, "Unable to load encryption key");
  184. break;
  185. }
  186. memset(cert_key, 0, 32);
  187. if(!furi_hal_crypto_decrypt(key, cert_key, 32)) {
  188. memset(cert_key, 0, 32);
  189. FURI_LOG_E(TAG, "Decryption failed");
  190. break;
  191. }
  192. furi_hal_crypto_store_unload_key(key_slot);
  193. } else {
  194. if(!flipper_format_read_hex(flipper_format, "Data", cert_key, 32)) {
  195. FURI_LOG_E(TAG, "Missing data");
  196. break;
  197. }
  198. }
  199. state = true;
  200. } while(0);
  201. }
  202. flipper_format_free(flipper_format);
  203. furi_record_close(RECORD_STORAGE);
  204. furi_string_free(filetype);
  205. if(cert_type == U2F_CERT_USER_UNENCRYPTED) {
  206. return u2f_data_cert_key_encrypt(cert_key);
  207. }
  208. return state;
  209. }
  210. bool u2f_data_key_load(uint8_t* device_key) {
  211. furi_assert(device_key);
  212. bool state = false;
  213. uint8_t iv[16];
  214. uint8_t key[48];
  215. uint32_t version = 0;
  216. FuriString* filetype;
  217. filetype = furi_string_alloc();
  218. Storage* storage = furi_record_open(RECORD_STORAGE);
  219. FlipperFormat* flipper_format = flipper_format_file_alloc(storage);
  220. if(flipper_format_file_open_existing(flipper_format, U2F_KEY_FILE)) {
  221. do {
  222. if(!flipper_format_read_header(flipper_format, filetype, &version)) {
  223. FURI_LOG_E(TAG, "Missing or incorrect header");
  224. break;
  225. }
  226. if(strcmp(furi_string_get_cstr(filetype), U2F_DEVICE_KEY_FILE_TYPE) != 0 ||
  227. version != U2F_DEVICE_KEY_VERSION) {
  228. FURI_LOG_E(TAG, "Type or version mismatch");
  229. break;
  230. }
  231. if(!flipper_format_read_hex(flipper_format, "IV", iv, 16)) {
  232. FURI_LOG_E(TAG, "Missing IV");
  233. break;
  234. }
  235. if(!flipper_format_read_hex(flipper_format, "Data", key, 48)) {
  236. FURI_LOG_E(TAG, "Missing data");
  237. break;
  238. }
  239. if(!furi_hal_crypto_store_load_key(U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE, iv)) {
  240. FURI_LOG_E(TAG, "Unable to load encryption key");
  241. break;
  242. }
  243. memset(device_key, 0, 32);
  244. if(!furi_hal_crypto_decrypt(key, device_key, 32)) {
  245. memset(device_key, 0, 32);
  246. FURI_LOG_E(TAG, "Decryption failed");
  247. break;
  248. }
  249. furi_hal_crypto_store_unload_key(U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE);
  250. state = true;
  251. } while(0);
  252. }
  253. flipper_format_free(flipper_format);
  254. furi_record_close(RECORD_STORAGE);
  255. furi_string_free(filetype);
  256. return state;
  257. }
  258. bool u2f_data_key_generate(uint8_t* device_key) {
  259. furi_assert(device_key);
  260. bool state = false;
  261. uint8_t iv[16];
  262. uint8_t key[32];
  263. uint8_t key_encrypted[48];
  264. // Generate random IV and key
  265. furi_hal_random_fill_buf(iv, 16);
  266. furi_hal_random_fill_buf(key, 32);
  267. if(!furi_hal_crypto_store_load_key(U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE, iv)) {
  268. FURI_LOG_E(TAG, "Unable to load encryption key");
  269. return false;
  270. }
  271. if(!furi_hal_crypto_encrypt(key, key_encrypted, 32)) {
  272. FURI_LOG_E(TAG, "Encryption failed");
  273. return false;
  274. }
  275. furi_hal_crypto_store_unload_key(U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE);
  276. Storage* storage = furi_record_open(RECORD_STORAGE);
  277. FlipperFormat* flipper_format = flipper_format_file_alloc(storage);
  278. if(flipper_format_file_open_always(flipper_format, U2F_KEY_FILE)) {
  279. do {
  280. if(!flipper_format_write_header_cstr(
  281. flipper_format, U2F_DEVICE_KEY_FILE_TYPE, U2F_DEVICE_KEY_VERSION))
  282. break;
  283. if(!flipper_format_write_hex(flipper_format, "IV", iv, 16)) break;
  284. if(!flipper_format_write_hex(flipper_format, "Data", key_encrypted, 48)) break;
  285. state = true;
  286. memcpy(device_key, key, 32);
  287. } while(0);
  288. }
  289. flipper_format_free(flipper_format);
  290. furi_record_close(RECORD_STORAGE);
  291. return state;
  292. }
  293. bool u2f_data_cnt_read(uint32_t* cnt_val) {
  294. furi_assert(cnt_val);
  295. bool state = false;
  296. bool old_counter = false;
  297. uint8_t iv[16];
  298. U2fCounterData cnt;
  299. uint8_t cnt_encr[48];
  300. uint32_t version = 0;
  301. FuriString* filetype;
  302. filetype = furi_string_alloc();
  303. Storage* storage = furi_record_open(RECORD_STORAGE);
  304. FlipperFormat* flipper_format = flipper_format_file_alloc(storage);
  305. if(flipper_format_file_open_existing(flipper_format, U2F_CNT_FILE)) {
  306. do {
  307. if(!flipper_format_read_header(flipper_format, filetype, &version)) {
  308. FURI_LOG_E(TAG, "Missing or incorrect header");
  309. break;
  310. }
  311. if(strcmp(furi_string_get_cstr(filetype), U2F_COUNTER_FILE_TYPE) != 0) {
  312. FURI_LOG_E(TAG, "Type mismatch");
  313. break;
  314. }
  315. if(version == U2F_COUNTER_VERSION_OLD) {
  316. // Counter is from previous U2F app version with endianness bug
  317. FURI_LOG_W(TAG, "Counter from old version");
  318. old_counter = true;
  319. } else if(version != U2F_COUNTER_VERSION) {
  320. FURI_LOG_E(TAG, "Version mismatch");
  321. break;
  322. }
  323. if(!flipper_format_read_hex(flipper_format, "IV", iv, 16)) {
  324. FURI_LOG_E(TAG, "Missing IV");
  325. break;
  326. }
  327. if(!flipper_format_read_hex(flipper_format, "Data", cnt_encr, 48)) {
  328. FURI_LOG_E(TAG, "Missing data");
  329. break;
  330. }
  331. if(!furi_hal_crypto_store_load_key(U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE, iv)) {
  332. FURI_LOG_E(TAG, "Unable to load encryption key");
  333. break;
  334. }
  335. memset(&cnt, 0, 32);
  336. if(!furi_hal_crypto_decrypt(cnt_encr, (uint8_t*)&cnt, 32)) {
  337. memset(&cnt, 0, 32);
  338. FURI_LOG_E(TAG, "Decryption failed");
  339. break;
  340. }
  341. furi_hal_crypto_store_unload_key(U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE);
  342. if(cnt.control == U2F_COUNTER_CONTROL_VAL) {
  343. *cnt_val = cnt.counter;
  344. state = true;
  345. }
  346. } while(0);
  347. }
  348. flipper_format_free(flipper_format);
  349. furi_record_close(RECORD_STORAGE);
  350. furi_string_free(filetype);
  351. if(old_counter && state) {
  352. // Change counter endianness and rewrite counter file
  353. *cnt_val = __REV(cnt.counter);
  354. state = u2f_data_cnt_write(*cnt_val);
  355. }
  356. return state;
  357. }
  358. bool u2f_data_cnt_write(uint32_t cnt_val) {
  359. bool state = false;
  360. uint8_t iv[16];
  361. U2fCounterData cnt;
  362. uint8_t cnt_encr[48];
  363. // Generate random IV and key
  364. furi_hal_random_fill_buf(iv, 16);
  365. furi_hal_random_fill_buf(cnt.random_salt, 24);
  366. cnt.control = U2F_COUNTER_CONTROL_VAL;
  367. cnt.counter = cnt_val;
  368. if(!furi_hal_crypto_store_load_key(U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE, iv)) {
  369. FURI_LOG_E(TAG, "Unable to load encryption key");
  370. return false;
  371. }
  372. if(!furi_hal_crypto_encrypt((uint8_t*)&cnt, cnt_encr, 32)) {
  373. FURI_LOG_E(TAG, "Encryption failed");
  374. return false;
  375. }
  376. furi_hal_crypto_store_unload_key(U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE);
  377. Storage* storage = furi_record_open(RECORD_STORAGE);
  378. FlipperFormat* flipper_format = flipper_format_file_alloc(storage);
  379. if(flipper_format_file_open_always(flipper_format, U2F_CNT_FILE)) {
  380. do {
  381. if(!flipper_format_write_header_cstr(
  382. flipper_format, U2F_COUNTER_FILE_TYPE, U2F_COUNTER_VERSION))
  383. break;
  384. if(!flipper_format_write_hex(flipper_format, "IV", iv, 16)) break;
  385. if(!flipper_format_write_hex(flipper_format, "Data", cnt_encr, 48)) break;
  386. state = true;
  387. } while(0);
  388. }
  389. flipper_format_free(flipper_format);
  390. furi_record_close(RECORD_STORAGE);
  391. return state;
  392. }