#include #include "u2f_hid.h" #include #include #include #include #define TAG "U2F" #define U2F_DATA_FOLDER "/any/u2f/" #define U2F_CERT_FILE U2F_DATA_FOLDER "cert.der" #define U2F_CERT_KEY_FILE U2F_DATA_FOLDER "cert_key.u2f" #define U2F_KEY_FILE U2F_DATA_FOLDER "key.u2f" #define U2F_CNT_FILE U2F_DATA_FOLDER "cnt.u2f" #define U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_FACTORY 2 #define U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE 11 #define U2F_CERT_STOCK 0 // Stock certificate, private key is encrypted with factory key #define U2F_CERT_USER 1 // User certificate, private key is encrypted with unique key #define U2F_CERT_KEY_FILE_TYPE "Flipper U2F Certificate Key File" #define U2F_CERT_KEY_VERSION 1 #define U2F_DEVICE_KEY_FILE_TYPE "Flipper U2F Device Key File" #define U2F_DEVICE_KEY_VERSION 1 #define U2F_COUNTER_FILE_TYPE "Flipper U2F Counter File" #define U2F_COUNTER_VERSION 1 #define U2F_COUNTER_CONTROL_VAL 0xAA5500FF typedef struct { uint32_t counter; uint8_t random_salt[24]; uint32_t control; } __attribute__((packed)) U2fCounterData; bool u2f_data_cert_check() { bool state = false; Storage* fs_api = furi_record_open("storage"); File* file = storage_file_alloc(fs_api); uint8_t file_buf[8]; if(storage_file_open(file, U2F_CERT_FILE, FSAM_READ, FSOM_OPEN_EXISTING)) { do { // Read header to check certificate size size_t file_size = storage_file_size(file); size_t len_cur = storage_file_read(file, file_buf, 4); if(len_cur != 4) break; if(file_buf[0] != 0x30) { FURI_LOG_E(TAG, "Wrong certificate header"); break; } size_t temp_len = ((file_buf[2] << 8) | (file_buf[3])) + 4; if(temp_len != file_size) { FURI_LOG_E(TAG, "Wrong certificate length"); break; } state = true; } while(0); } storage_file_close(file); storage_file_free(file); furi_record_close("storage"); return state; } uint32_t u2f_data_cert_load(uint8_t* cert) { furi_assert(cert); Storage* fs_api = furi_record_open("storage"); File* file = storage_file_alloc(fs_api); uint32_t file_size = 0; uint32_t len_cur = 0; if(storage_file_open(file, U2F_CERT_FILE, FSAM_READ, FSOM_OPEN_EXISTING)) { file_size = storage_file_size(file); len_cur = storage_file_read(file, cert, file_size); if(len_cur != file_size) len_cur = 0; } storage_file_close(file); storage_file_free(file); furi_record_close("storage"); return len_cur; } bool u2f_data_cert_key_load(uint8_t* cert_key) { furi_assert(cert_key); bool state = false; uint8_t iv[16]; uint8_t key[48]; uint32_t cert_type = 0; uint8_t key_slot = 0; uint32_t version = 0; // Check if unique key exists in secure eclave and generate it if missing if(!furi_hal_crypto_verify_key(U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE)) return false; string_t filetype; string_init(filetype); Storage* storage = furi_record_open("storage"); FlipperFile* flipper_file = flipper_file_alloc(storage); if(flipper_file_open_existing(flipper_file, U2F_CERT_KEY_FILE)) { do { if(!flipper_file_read_header(flipper_file, filetype, &version)) { FURI_LOG_E(TAG, "Missing or incorrect header"); break; } if(strcmp(string_get_cstr(filetype), U2F_CERT_KEY_FILE_TYPE) != 0 || version != U2F_CERT_KEY_VERSION) { FURI_LOG_E(TAG, "Type or version mismatch"); break; } if(!flipper_file_read_uint32(flipper_file, "Type", &cert_type, 1)) { FURI_LOG_E(TAG, "Missing cert type"); break; } if(cert_type == U2F_CERT_STOCK) { key_slot = U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_FACTORY; } else if(cert_type == U2F_CERT_USER) { key_slot = U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE; } else { FURI_LOG_E(TAG, "Unknown cert type"); break; } if(!flipper_file_read_hex(flipper_file, "IV", iv, 16)) { FURI_LOG_E(TAG, "Missing IV"); break; } if(!flipper_file_read_hex(flipper_file, "Data", key, 48)) { FURI_LOG_E(TAG, "Missing data"); break; } if(!furi_hal_crypto_store_load_key(key_slot, iv)) { FURI_LOG_E(TAG, "Unable to load encryption key"); break; } memset(cert_key, 0, 32); if(!furi_hal_crypto_decrypt(key, cert_key, 32)) { memset(cert_key, 0, 32); FURI_LOG_E(TAG, "Decryption failed"); break; } furi_hal_crypto_store_unload_key(key_slot); state = true; } while(0); } flipper_file_close(flipper_file); flipper_file_free(flipper_file); furi_record_close("storage"); string_clear(filetype); return state; } bool u2f_data_key_load(uint8_t* device_key) { furi_assert(device_key); bool state = false; uint8_t iv[16]; uint8_t key[48]; uint32_t version = 0; string_t filetype; string_init(filetype); Storage* storage = furi_record_open("storage"); FlipperFile* flipper_file = flipper_file_alloc(storage); if(flipper_file_open_existing(flipper_file, U2F_KEY_FILE)) { do { if(!flipper_file_read_header(flipper_file, filetype, &version)) { FURI_LOG_E(TAG, "Missing or incorrect header"); break; } if(strcmp(string_get_cstr(filetype), U2F_DEVICE_KEY_FILE_TYPE) != 0 || version != U2F_DEVICE_KEY_VERSION) { FURI_LOG_E(TAG, "Type or version mismatch"); break; } if(!flipper_file_read_hex(flipper_file, "IV", iv, 16)) { FURI_LOG_E(TAG, "Missing IV"); break; } if(!flipper_file_read_hex(flipper_file, "Data", key, 48)) { FURI_LOG_E(TAG, "Missing data"); break; } if(!furi_hal_crypto_store_load_key(U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE, iv)) { FURI_LOG_E(TAG, "Unable to load encryption key"); break; } memset(device_key, 0, 32); if(!furi_hal_crypto_decrypt(key, device_key, 32)) { memset(device_key, 0, 32); FURI_LOG_E(TAG, "Decryption failed"); break; } furi_hal_crypto_store_unload_key(U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE); state = true; } while(0); } flipper_file_close(flipper_file); flipper_file_free(flipper_file); furi_record_close("storage"); string_clear(filetype); return state; } bool u2f_data_key_generate(uint8_t* device_key) { furi_assert(device_key); bool state = false; uint8_t iv[16]; uint8_t key[32]; uint8_t key_encrypted[48]; // Generate random IV and key furi_hal_random_fill_buf(iv, 16); furi_hal_random_fill_buf(key, 32); if(!furi_hal_crypto_store_load_key(U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE, iv)) { FURI_LOG_E(TAG, "Unable to load encryption key"); return false; } if(!furi_hal_crypto_encrypt(key, key_encrypted, 32)) { FURI_LOG_E(TAG, "Encryption failed"); return false; } furi_hal_crypto_store_unload_key(U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE); string_t filetype; string_init(filetype); Storage* storage = furi_record_open("storage"); FlipperFile* flipper_file = flipper_file_alloc(storage); if(flipper_file_open_always(flipper_file, U2F_KEY_FILE)) { do { if(!flipper_file_write_header_cstr( flipper_file, U2F_DEVICE_KEY_FILE_TYPE, U2F_DEVICE_KEY_VERSION)) break; if(!flipper_file_write_hex(flipper_file, "IV", iv, 16)) break; if(!flipper_file_write_hex(flipper_file, "Data", key_encrypted, 48)) break; state = true; memcpy(device_key, key, 32); } while(0); } flipper_file_close(flipper_file); flipper_file_free(flipper_file); furi_record_close("storage"); string_clear(filetype); return state; } bool u2f_data_cnt_read(uint32_t* cnt_val) { furi_assert(cnt_val); bool state = false; uint8_t iv[16]; U2fCounterData cnt; uint8_t cnt_encr[48]; uint32_t version = 0; string_t filetype; string_init(filetype); Storage* storage = furi_record_open("storage"); FlipperFile* flipper_file = flipper_file_alloc(storage); if(flipper_file_open_existing(flipper_file, U2F_CNT_FILE)) { do { if(!flipper_file_read_header(flipper_file, filetype, &version)) { FURI_LOG_E(TAG, "Missing or incorrect header"); break; } if(strcmp(string_get_cstr(filetype), U2F_COUNTER_FILE_TYPE) != 0 || version != U2F_COUNTER_VERSION) { FURI_LOG_E(TAG, "Type or version mismatch"); break; } if(!flipper_file_read_hex(flipper_file, "IV", iv, 16)) { FURI_LOG_E(TAG, "Missing IV"); break; } if(!flipper_file_read_hex(flipper_file, "Data", cnt_encr, 48)) { FURI_LOG_E(TAG, "Missing data"); break; } if(!furi_hal_crypto_store_load_key(U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE, iv)) { FURI_LOG_E(TAG, "Unable to load encryption key"); break; } memset(&cnt, 0, 32); if(!furi_hal_crypto_decrypt(cnt_encr, (uint8_t*)&cnt, 32)) { memset(&cnt, 0, 32); FURI_LOG_E(TAG, "Decryption failed"); break; } furi_hal_crypto_store_unload_key(U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE); if(cnt.control == U2F_COUNTER_CONTROL_VAL) { *cnt_val = cnt.counter; state = true; } } while(0); } flipper_file_close(flipper_file); flipper_file_free(flipper_file); furi_record_close("storage"); string_clear(filetype); return state; } bool u2f_data_cnt_write(uint32_t cnt_val) { bool state = false; uint8_t iv[16]; U2fCounterData cnt; uint8_t cnt_encr[48]; // Generate random IV and key furi_hal_random_fill_buf(iv, 16); furi_hal_random_fill_buf(cnt.random_salt, 24); cnt.control = U2F_COUNTER_CONTROL_VAL; cnt.counter = cnt_val; if(!furi_hal_crypto_store_load_key(U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE, iv)) { FURI_LOG_E(TAG, "Unable to load encryption key"); return false; } if(!furi_hal_crypto_encrypt((uint8_t*)&cnt, cnt_encr, 32)) { FURI_LOG_E(TAG, "Encryption failed"); return false; } furi_hal_crypto_store_unload_key(U2F_DATA_FILE_ENCRYPTION_KEY_SLOT_UNIQUE); string_t filetype; string_init(filetype); Storage* storage = furi_record_open("storage"); FlipperFile* flipper_file = flipper_file_alloc(storage); if(flipper_file_open_always(flipper_file, U2F_CNT_FILE)) { do { if(!flipper_file_write_header_cstr( flipper_file, U2F_COUNTER_FILE_TYPE, U2F_COUNTER_VERSION)) break; if(!flipper_file_write_hex(flipper_file, "IV", iv, 16)) break; if(!flipper_file_write_hex(flipper_file, "Data", cnt_encr, 48)) break; state = true; } while(0); } flipper_file_close(flipper_file); flipper_file_free(flipper_file); furi_record_close("storage"); string_clear(filetype); return state; }