92 lines
3.1 KiB
C
92 lines
3.1 KiB
C
/*
|
|
* This file is part of the Pico OpenPGP distribution (https://github.com/polhenarejos/pico-openpgp).
|
|
* Copyright (c) 2022 Pol Henarejos.
|
|
*
|
|
* This program is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU Affero General Public License as published by
|
|
* the Free Software Foundation, version 3.
|
|
*
|
|
* This program is distributed in the hope that it will be useful, but
|
|
* WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Affero General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Affero General Public License
|
|
* along with this program. If not, see <https://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include "openpgp.h"
|
|
#include "otp.h"
|
|
|
|
int cmd_reset_retry() {
|
|
if (P2(apdu) != 0x81) {
|
|
return SW_REFERENCE_NOT_FOUND();
|
|
}
|
|
if (P1(apdu) == 0x0 || P1(apdu) == 0x2) {
|
|
int newpin_len = 0;
|
|
file_t *pw = NULL;
|
|
has_pw1 = false;
|
|
if (!(pw = search_by_fid(EF_PW1, NULL, SPECIFY_EF))) {
|
|
return SW_REFERENCE_NOT_FOUND();
|
|
}
|
|
if (P1(apdu) == 0x0) {
|
|
file_t *rc;
|
|
if (!(rc = search_by_fid(EF_RC, NULL, SPECIFY_EF))) {
|
|
return SW_REFERENCE_NOT_FOUND();
|
|
}
|
|
uint8_t pin_len = file_get_data(rc)[0];
|
|
if (apdu.nc <= pin_len) {
|
|
return SW_WRONG_LENGTH();
|
|
}
|
|
uint16_t r = check_pin(rc, apdu.data, pin_len);
|
|
if (r != 0x9000) {
|
|
return r;
|
|
}
|
|
newpin_len = apdu.nc - pin_len;
|
|
has_rc = true;
|
|
hash_multi(apdu.data, pin_len, session_rc);
|
|
has_pw1 = has_pw3 = false;
|
|
isUserAuthenticated = false;
|
|
}
|
|
else if (P1(apdu) == 0x2) {
|
|
if (!has_pw3) {
|
|
return SW_CONDITIONS_NOT_SATISFIED();
|
|
}
|
|
newpin_len = apdu.nc;
|
|
}
|
|
int r = 0;
|
|
if ((r = load_dek()) != PICOKEY_OK) {
|
|
return SW_EXEC_ERROR();
|
|
}
|
|
file_t *tf = search_by_fid(EF_DEK, NULL, SPECIFY_EF);
|
|
if (!tf) {
|
|
return SW_REFERENCE_NOT_FOUND();
|
|
}
|
|
if (otp_key_1) {
|
|
for (int i = 0; i < 32; i++) {
|
|
dek[IV_SIZE + i] ^= otp_key_1[i];
|
|
}
|
|
}
|
|
uint8_t def[IV_SIZE + 32 + 32 + 32 + 32];
|
|
memcpy(def, file_get_data(tf), file_get_size(tf));
|
|
hash_multi(apdu.data + (apdu.nc - newpin_len), newpin_len, session_pw1);
|
|
memcpy(def + IV_SIZE, dek + IV_SIZE, 32);
|
|
aes_encrypt_cfb_256(session_pw1, def, def + IV_SIZE, 32);
|
|
r = file_put_data(tf, def, sizeof(def));
|
|
|
|
uint8_t dhash[33];
|
|
dhash[0] = newpin_len;
|
|
double_hash_pin(apdu.data + (apdu.nc - newpin_len), newpin_len, dhash + 1);
|
|
file_put_data(pw, dhash, sizeof(dhash));
|
|
if (pin_reset_retries(pw, true) != PICOKEY_OK) {
|
|
return SW_MEMORY_FAILURE();
|
|
}
|
|
low_flash_available();
|
|
if ((r = load_dek()) != PICOKEY_OK) {
|
|
return SW_EXEC_ERROR();
|
|
}
|
|
return SW_OK();
|
|
}
|
|
return SW_INCORRECT_P1P2();
|
|
}
|