Coverage Report

Created: 2022-07-22 12:05

/libfido2/src/touch.c
Line
Count
Source (jump to first uncovered line)
1
/*
2
 * Copyright (c) 2018-2022 Yubico AB. All rights reserved.
3
 * Use of this source code is governed by a BSD-style
4
 * license that can be found in the LICENSE file.
5
 */
6
7
#include <openssl/sha.h>
8
#include "fido.h"
9
10
int
11
fido_dev_get_touch_begin(fido_dev_t *dev)
12
1.51k
{
13
1.51k
        fido_blob_t      f;
14
1.51k
        cbor_item_t     *argv[9];
15
1.51k
        const char      *clientdata = FIDO_DUMMY_CLIENTDATA;
16
1.51k
        const uint8_t    user_id = FIDO_DUMMY_USER_ID;
17
1.51k
        unsigned char    cdh[SHA256_DIGEST_LENGTH];
18
1.51k
        fido_rp_t        rp;
19
1.51k
        fido_user_t      user;
20
1.51k
        int              ms = dev->timeout_ms;
21
1.51k
        int              r = FIDO_ERR_INTERNAL;
22
23
1.51k
        memset(&f, 0, sizeof(f));
24
1.51k
        memset(argv, 0, sizeof(argv));
25
1.51k
        memset(cdh, 0, sizeof(cdh));
26
1.51k
        memset(&rp, 0, sizeof(rp));
27
1.51k
        memset(&user, 0, sizeof(user));
28
29
1.51k
        if (fido_dev_is_fido2(dev) == false)
30
1.42k
                return (u2f_get_touch_begin(dev, &ms));
31
32
93
        if (SHA256((const void *)clientdata, strlen(clientdata), cdh) != cdh) {
33
2
                fido_log_debug("%s: sha256", __func__);
34
2
                return (FIDO_ERR_INTERNAL);
35
2
        }
36
37
91
        if ((rp.id = strdup(FIDO_DUMMY_RP_ID)) == NULL ||
38
91
            (user.name = strdup(FIDO_DUMMY_USER_NAME)) == NULL) {
39
5
                fido_log_debug("%s: strdup", __func__);
40
5
                goto fail;
41
5
        }
42
43
86
        if (fido_blob_set(&user.id, &user_id, sizeof(user_id)) < 0) {
44
2
                fido_log_debug("%s: fido_blob_set", __func__);
45
2
                goto fail;
46
2
        }
47
48
84
        if ((argv[0] = cbor_build_bytestring(cdh, sizeof(cdh))) == NULL ||
49
84
            (argv[1] = cbor_encode_rp_entity(&rp)) == NULL ||
50
84
            (argv[2] = cbor_encode_user_entity(&user)) == NULL ||
51
84
            (argv[3] = cbor_encode_pubkey_param(COSE_ES256)) == NULL) {
52
20
                fido_log_debug("%s: cbor encode", __func__);
53
20
                goto fail;
54
20
        }
55
56
64
        if (fido_dev_supports_pin(dev)) {
57
63
                if ((argv[7] = cbor_new_definite_bytestring()) == NULL ||
58
63
                    (argv[8] = cbor_encode_pin_opt(dev)) == NULL) {
59
8
                        fido_log_debug("%s: cbor encode", __func__);
60
8
                        goto fail;
61
8
                }
62
63
        }
63
64
56
        if (cbor_build_frame(CTAP_CBOR_MAKECRED, argv, nitems(argv), &f) < 0 ||
65
56
            fido_tx(dev, CTAP_CMD_CBOR, f.ptr, f.len, &ms) < 0) {
66
16
                fido_log_debug("%s: fido_tx", __func__);
67
16
                r = FIDO_ERR_TX;
68
16
                goto fail;
69
16
        }
70
71
40
        r = FIDO_OK;
72
91
fail:
73
91
        cbor_vector_free(argv, nitems(argv));
74
91
        free(f.ptr);
75
91
        free(rp.id);
76
91
        free(user.name);
77
91
        free(user.id.ptr);
78
79
91
        return (r);
80
40
}
81
82
int
83
fido_dev_get_touch_status(fido_dev_t *dev, int *touched, int ms)
84
1.51k
{
85
1.51k
        int r;
86
87
1.51k
        *touched = 0;
88
89
1.51k
        if (fido_dev_is_fido2(dev) == false)
90
1.42k
                return (u2f_get_touch_status(dev, touched, &ms));
91
92
93
        switch ((r = fido_rx_cbor_status(dev, &ms))) {
93
1
        case FIDO_ERR_PIN_AUTH_INVALID:
94
2
        case FIDO_ERR_PIN_INVALID:
95
2
        case FIDO_ERR_PIN_NOT_SET:
96
41
        case FIDO_ERR_SUCCESS:
97
41
                *touched = 1;
98
41
                break;
99
37
        case FIDO_ERR_RX:
100
                /* ignore */
101
37
                break;
102
15
        default:
103
15
                fido_log_debug("%s: fido_rx_cbor_status", __func__);
104
15
                return (r);
105
93
        }
106
107
78
        return (FIDO_OK);
108
93
}