mirror of
https://github.com/polhenarejos/pico-hsm.git
synced 2026-01-17 09:28:05 +00:00
A python script gets the public key of the device (EF_EE_DEV) and requests to our PKI for a CVC. Once got, it is updated to EF_TERMCA (0x2f02). termca_pk is now on EF_KEY_DEV and termca is on EF_TERMCA (concat with DICA). Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
194 lines
7.5 KiB
C
194 lines
7.5 KiB
C
/*
|
|
* This file is part of the Pico HSM distribution (https://github.com/polhenarejos/pico-hsm).
|
|
* Copyright (c) 2022 Pol Henarejos.
|
|
*
|
|
* This program is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation, version 3.
|
|
*
|
|
* This program is distributed in the hope that it will be useful, but
|
|
* WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include "crypto_utils.h"
|
|
#include "sc_hsm.h"
|
|
#include "files.h"
|
|
#include "random.h"
|
|
#include "kek.h"
|
|
#include "version.h"
|
|
#include "asn1.h"
|
|
#include "cvc.h"
|
|
|
|
extern void scan_all();
|
|
|
|
extern char __StackLimit;
|
|
int heapLeft() {
|
|
char *p = malloc(256); // try to avoid undue fragmentation
|
|
int left = &__StackLimit - p;
|
|
free(p);
|
|
return left;
|
|
}
|
|
|
|
int cmd_initialize() {
|
|
if (apdu.nc > 0) {
|
|
initialize_flash(true);
|
|
scan_all();
|
|
has_session_pin = has_session_sopin = false;
|
|
uint16_t tag = 0x0;
|
|
uint8_t *tag_data = NULL, *p = NULL, *kds = NULL, *dkeks = NULL;
|
|
size_t tag_len = 0;
|
|
while (walk_tlv(apdu.data, apdu.nc, &p, &tag, &tag_len, &tag_data)) {
|
|
if (tag == 0x80) { //options
|
|
file_t *tf = search_by_fid(EF_DEVOPS, NULL, SPECIFY_EF);
|
|
flash_write_data_to_file(tf, tag_data, tag_len);
|
|
}
|
|
else if (tag == 0x81) { //user pin
|
|
if (file_pin1 && file_pin1->data) {
|
|
uint8_t dhash[33];
|
|
dhash[0] = tag_len;
|
|
double_hash_pin(tag_data, tag_len, dhash+1);
|
|
flash_write_data_to_file(file_pin1, dhash, sizeof(dhash));
|
|
hash_multi(tag_data, tag_len, session_pin);
|
|
has_session_pin = true;
|
|
}
|
|
}
|
|
else if (tag == 0x82) { //sopin pin
|
|
if (file_sopin && file_sopin->data) {
|
|
uint8_t dhash[33];
|
|
dhash[0] = tag_len;
|
|
double_hash_pin(tag_data, tag_len, dhash+1);
|
|
flash_write_data_to_file(file_sopin, dhash, sizeof(dhash));
|
|
hash_multi(tag_data, tag_len, session_sopin);
|
|
has_session_sopin = true;
|
|
}
|
|
}
|
|
else if (tag == 0x91) { //retries user pin
|
|
file_t *tf = search_by_fid(0x1082, NULL, SPECIFY_EF);
|
|
if (tf && tf->data) {
|
|
flash_write_data_to_file(tf, tag_data, tag_len);
|
|
}
|
|
if (file_retries_pin1 && file_retries_pin1->data) {
|
|
flash_write_data_to_file(file_retries_pin1, tag_data, tag_len);
|
|
}
|
|
}
|
|
else if (tag == 0x92) {
|
|
dkeks = tag_data;
|
|
file_t *tf = file_new(EF_DKEK);
|
|
if (!tf)
|
|
return SW_MEMORY_FAILURE();
|
|
flash_write_data_to_file(tf, NULL, 0);
|
|
}
|
|
else if (tag == 0x93) {
|
|
file_t *ef_puk = search_by_fid(EF_PUKAUT, NULL, SPECIFY_EF);
|
|
if (!ef_puk)
|
|
return SW_MEMORY_FAILURE();
|
|
uint8_t pk_status[4], puks = MIN(tag_data[0],MAX_PUK);
|
|
memset(pk_status, 0, sizeof(pk_status));
|
|
pk_status[0] = puks;
|
|
pk_status[1] = puks;
|
|
pk_status[2] = tag_data[1];
|
|
flash_write_data_to_file(ef_puk, pk_status, sizeof(pk_status));
|
|
for (int i = 0; i < puks; i++) {
|
|
file_t *tf = file_new(EF_PUK+i);
|
|
if (!tf)
|
|
return SW_MEMORY_FAILURE();
|
|
flash_write_data_to_file(tf, NULL, 0);
|
|
}
|
|
}
|
|
else if (tag == 0x97) {
|
|
kds = tag_data;
|
|
/*
|
|
for (int i = 0; i < MIN(*kds,MAX_KEY_DOMAINS); i++) {
|
|
file_t *tf = file_new(EF_DKEK+i);
|
|
if (!tf)
|
|
return SW_MEMORY_FAILURE();
|
|
flash_write_data_to_file(tf, NULL, 0);
|
|
}
|
|
*/
|
|
}
|
|
}
|
|
file_t *tf_kd = search_by_fid(EF_KEY_DOMAIN, NULL, SPECIFY_EF);
|
|
if (!tf_kd)
|
|
return SW_EXEC_ERROR();
|
|
if (store_mkek(NULL) != CCID_OK)
|
|
return SW_EXEC_ERROR();
|
|
if (dkeks) {
|
|
if (*dkeks > 0) {
|
|
uint16_t d = *dkeks;
|
|
if (flash_write_data_to_file(tf_kd, (const uint8_t *)&d, sizeof(d)) != CCID_OK)
|
|
return SW_EXEC_ERROR();
|
|
}
|
|
else {
|
|
int r = save_dkek_key(0, random_bytes_get(32));
|
|
if (r != CCID_OK)
|
|
return SW_EXEC_ERROR();
|
|
uint16_t d = 0x0101;
|
|
if (flash_write_data_to_file(tf_kd, (const uint8_t *)&d, sizeof(d)) != CCID_OK)
|
|
return SW_EXEC_ERROR();
|
|
}
|
|
}
|
|
else {
|
|
uint16_t d = 0x0000;
|
|
if (flash_write_data_to_file(tf_kd, (const uint8_t *)&d, sizeof(d)) != CCID_OK)
|
|
return SW_EXEC_ERROR();
|
|
}
|
|
if (kds) {
|
|
uint8_t t[MAX_KEY_DOMAINS*2], k = MIN(*kds,MAX_KEY_DOMAINS);
|
|
memset(t, 0xff, 2*k);
|
|
if (flash_write_data_to_file(tf_kd, t, 2*k) != CCID_OK)
|
|
return SW_EXEC_ERROR();
|
|
}
|
|
/* When initialized, it has all credentials */
|
|
isUserAuthenticated = true;
|
|
/* Create terminal private key */
|
|
mbedtls_ecdsa_context ecdsa;
|
|
mbedtls_ecdsa_init(&ecdsa);
|
|
mbedtls_ecp_group_id ec_id = MBEDTLS_ECP_DP_SECP192R1;
|
|
uint8_t index = 0, key_id = 0;
|
|
int ret = mbedtls_ecdsa_genkey(&ecdsa, ec_id, random_gen, &index);
|
|
if (ret != 0) {
|
|
mbedtls_ecdsa_free(&ecdsa);
|
|
return SW_EXEC_ERROR();
|
|
}
|
|
ret = store_keys(&ecdsa, HSM_KEY_EC, key_id);
|
|
if (ret != CCID_OK) {
|
|
mbedtls_ecdsa_free(&ecdsa);
|
|
return SW_EXEC_ERROR();
|
|
}
|
|
size_t cvc_len = 0;
|
|
if ((cvc_len = asn1_cvc_aut(&ecdsa, HSM_KEY_EC, res_APDU, 4096, NULL, 0)) == 0) {
|
|
return SW_EXEC_ERROR();
|
|
}
|
|
mbedtls_ecdsa_free(&ecdsa);
|
|
|
|
file_t *fpk = search_by_fid(EF_EE_DEV, NULL, SPECIFY_EF);
|
|
ret = flash_write_data_to_file(fpk, res_APDU, cvc_len);
|
|
if (ret != 0)
|
|
return SW_EXEC_ERROR();
|
|
|
|
const uint8_t *keyid = (const uint8_t *)"\x0\x0\x0\x0\x0\x0\x0\x0\x0\x0\x0\x0\x0\x0\x0\x0\x0\x0\x0\x0", *label = (const uint8_t *)"ESTERMHSM";
|
|
size_t prkd_len = asn1_build_prkd_ecc(label, strlen((const char *)label), keyid, 20, 192, res_APDU, 4096);
|
|
fpk = search_by_fid(EF_PRKD_DEV, NULL, SPECIFY_EF);
|
|
ret = flash_write_data_to_file(fpk, res_APDU, prkd_len);
|
|
if (ret != 0)
|
|
return SW_EXEC_ERROR();
|
|
low_flash_available();
|
|
}
|
|
else { //free memory bytes request
|
|
int heap_left = heapLeft();
|
|
res_APDU[0] = ((heap_left >> 24) & 0xff);
|
|
res_APDU[1] = ((heap_left >> 16) & 0xff);
|
|
res_APDU[2] = ((heap_left >> 8) & 0xff);
|
|
res_APDU[3] = ((heap_left >> 0) & 0xff);
|
|
res_APDU[4] = 0;
|
|
res_APDU[5] = HSM_VERSION_MAJOR;
|
|
res_APDU[6] = HSM_VERSION_MINOR;
|
|
res_APDU_size = 7;
|
|
}
|
|
return SW_OK();
|
|
}
|