| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134 |
- #include "crypto.h"
- #include <furi.h>
- #include <furi_hal.h>
- #include "../config/config.h"
- #include "../../types/common.h"
- #define CRYPTO_KEY_SLOT 2
- #define CRYPTO_VERIFY_KEY "FFF_Crypto_pass"
- #define CRYPTO_VERIFY_KEY_LENGTH 16
- #define CRYPTO_ALIGNMENT_FACTOR 16
- uint8_t* totp_crypto_encrypt(
- const uint8_t* plain_data,
- const uint8_t plain_data_length,
- const uint8_t* iv,
- uint8_t* encrypted_data_length) {
- uint8_t* encrypted_data;
- size_t remain = plain_data_length % CRYPTO_ALIGNMENT_FACTOR;
- if(remain) {
- uint8_t plain_data_aligned_length = plain_data_length - remain + CRYPTO_ALIGNMENT_FACTOR;
- uint8_t* plain_data_aligned = malloc(plain_data_aligned_length);
- memset(plain_data_aligned, 0, plain_data_aligned_length);
- memcpy(plain_data_aligned, plain_data, plain_data_length);
- encrypted_data = malloc(plain_data_aligned_length);
- *encrypted_data_length = plain_data_aligned_length;
- furi_hal_crypto_store_load_key(CRYPTO_KEY_SLOT, iv);
- furi_hal_crypto_encrypt(plain_data_aligned, encrypted_data, plain_data_aligned_length);
- furi_hal_crypto_store_unload_key(CRYPTO_KEY_SLOT);
- memset(plain_data_aligned, 0, plain_data_aligned_length);
- free(plain_data_aligned);
- } else {
- encrypted_data = malloc(plain_data_length);
- *encrypted_data_length = plain_data_length;
- furi_hal_crypto_store_load_key(CRYPTO_KEY_SLOT, iv);
- furi_hal_crypto_encrypt(plain_data, encrypted_data, plain_data_length);
- furi_hal_crypto_store_unload_key(CRYPTO_KEY_SLOT);
- }
- return encrypted_data;
- }
- uint8_t* totp_crypto_decrypt(
- const uint8_t* encrypted_data,
- const uint8_t encrypted_data_length,
- const uint8_t* iv,
- uint8_t* decrypted_data_length) {
- *decrypted_data_length = encrypted_data_length;
- uint8_t* decrypted_data = malloc(*decrypted_data_length);
- furi_hal_crypto_store_load_key(CRYPTO_KEY_SLOT, iv);
- furi_hal_crypto_decrypt(encrypted_data, decrypted_data, encrypted_data_length);
- furi_hal_crypto_store_unload_key(CRYPTO_KEY_SLOT);
- return decrypted_data;
- }
- void totp_crypto_seed_iv(PluginState* plugin_state, uint8_t* pin, uint8_t pin_length) {
- if(plugin_state->crypto_verify_data == NULL) {
- FURI_LOG_D(LOGGING_TAG, "Generating new IV");
- furi_hal_random_fill_buf(&plugin_state->base_iv[0], TOTP_IV_SIZE);
- }
- memcpy(&plugin_state->iv[0], &plugin_state->base_iv[0], TOTP_IV_SIZE);
- if(pin != NULL && pin_length > 0) {
- uint8_t max_i;
- if(pin_length > TOTP_IV_SIZE) {
- max_i = TOTP_IV_SIZE;
- } else {
- max_i = pin_length;
- }
- for(uint8_t i = 0; i < max_i; i++) {
- plugin_state->iv[i] = plugin_state->iv[i] ^ (uint8_t)(pin[i] * (i + 1));
- }
- } else {
- uint8_t max_i;
- size_t uid_size = furi_hal_version_uid_size();
- if(uid_size > TOTP_IV_SIZE) {
- max_i = TOTP_IV_SIZE;
- } else {
- max_i = uid_size;
- }
- const uint8_t* uid = furi_hal_version_uid();
- for(uint8_t i = 0; i < max_i; i++) {
- plugin_state->iv[i] = plugin_state->iv[i] ^ uid[i];
- }
- }
- if(plugin_state->crypto_verify_data == NULL) {
- FURI_LOG_D(LOGGING_TAG, "Generating crypto verify data");
- plugin_state->crypto_verify_data = malloc(CRYPTO_VERIFY_KEY_LENGTH);
- plugin_state->crypto_verify_data_length = CRYPTO_VERIFY_KEY_LENGTH;
- Storage* storage = totp_open_storage();
- FlipperFormat* config_file = totp_open_config_file(storage);
- plugin_state->crypto_verify_data = totp_crypto_encrypt(
- (uint8_t*)CRYPTO_VERIFY_KEY,
- CRYPTO_VERIFY_KEY_LENGTH,
- &plugin_state->iv[0],
- &plugin_state->crypto_verify_data_length);
- flipper_format_insert_or_update_hex(
- config_file, TOTP_CONFIG_KEY_BASE_IV, plugin_state->base_iv, TOTP_IV_SIZE);
- flipper_format_insert_or_update_hex(
- config_file,
- TOTP_CONFIG_KEY_CRYPTO_VERIFY,
- plugin_state->crypto_verify_data,
- CRYPTO_VERIFY_KEY_LENGTH);
- plugin_state->pin_set = pin != NULL && pin_length > 0;
- flipper_format_insert_or_update_bool(
- config_file, TOTP_CONFIG_KEY_PINSET, &plugin_state->pin_set, 1);
- totp_close_config_file(config_file);
- totp_close_storage();
- }
- }
- bool totp_crypto_verify_key(const PluginState* plugin_state) {
- uint8_t decrypted_key_length;
- uint8_t* decrypted_key = totp_crypto_decrypt(
- plugin_state->crypto_verify_data,
- plugin_state->crypto_verify_data_length,
- &plugin_state->iv[0],
- &decrypted_key_length);
- bool key_valid = true;
- for(uint8_t i = 0; i < CRYPTO_VERIFY_KEY_LENGTH && key_valid; i++) {
- if(decrypted_key[i] != CRYPTO_VERIFY_KEY[i]) key_valid = false;
- }
- return key_valid;
- }
|