mirror of
https://github.com/polhenarejos/pico-hsm.git
synced 2026-04-21 15:48:31 +00:00
This new system is more robust, with derived keys by context and safe in case of flash/ram dumps. Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
73 lines
2.6 KiB
C
73 lines
2.6 KiB
C
/*
|
|
* This file is part of the Pico HSM distribution (https://github.com/polhenarejos/pico-hsm).
|
|
* Copyright (c) 2022 Pol Henarejos.
|
|
*
|
|
* This program is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU Affero General Public License as published by
|
|
* the Free Software Foundation, version 3.
|
|
*
|
|
* This program is distributed in the hope that it will be useful, but
|
|
* WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Affero General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Affero General Public License
|
|
* along with this program. If not, see <https://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include "crypto_utils.h"
|
|
#include "sc_hsm.h"
|
|
#include "kek.h"
|
|
|
|
int cmd_change_pin(void) {
|
|
if (P1(apdu) == 0x0) {
|
|
if (P2(apdu) == 0x81 || P2(apdu) == 0x88) {
|
|
file_t *file_pin = NULL;
|
|
if (P2(apdu) == 0x81) {
|
|
file_pin = file_pin1;
|
|
}
|
|
else if (P2(apdu) == 0x88) {
|
|
file_pin = file_sopin;
|
|
}
|
|
if (!file_pin) {
|
|
return SW_FILE_NOT_FOUND();
|
|
}
|
|
if (!file_has_data(file_pin)) {
|
|
return SW_REFERENCE_NOT_FOUND();
|
|
}
|
|
uint8_t pin_len = file_read_uint8(file_pin);
|
|
int r = check_pin(file_pin, apdu.data, pin_len);
|
|
if (r != 0x9000) {
|
|
return r;
|
|
}
|
|
uint8_t mkek[MKEK_SIZE];
|
|
r = load_mkek(mkek); //loads the MKEK with old pin
|
|
if (r != PICOKEY_OK) {
|
|
return SW_EXEC_ERROR();
|
|
}
|
|
//encrypt MKEK with new pin
|
|
|
|
if (P2(apdu) == 0x81) {
|
|
pin_derive_session(apdu.data + pin_len, (uint16_t)(apdu.nc - pin_len), session_pin);
|
|
has_session_pin = true;
|
|
}
|
|
else if (P2(apdu) == 0x88) {
|
|
pin_derive_session(apdu.data + pin_len, (uint16_t)(apdu.nc - pin_len), session_sopin);
|
|
has_session_sopin = true;
|
|
}
|
|
r = store_mkek(mkek);
|
|
release_mkek(mkek);
|
|
if (r != PICOKEY_OK) {
|
|
return SW_EXEC_ERROR();
|
|
}
|
|
uint8_t dhash[34];
|
|
dhash[0] = (uint8_t)apdu.nc - pin_len;
|
|
dhash[1] = 1; // Format
|
|
pin_derive_verifier(apdu.data + pin_len, (uint16_t)(apdu.nc - pin_len), dhash + 2);
|
|
file_put_data(file_pin, dhash, sizeof(dhash));
|
|
low_flash_available();
|
|
return SW_OK();
|
|
}
|
|
}
|
|
return SW_WRONG_P1P2();
|
|
}
|