Compare commits
No commits in common. "ea5fc357da2d6bf1f1a35cc89af26d281f5c6521" and "71e9fe4ed22b4709ec3bcf9bc6029d3fbd97a51c" have entirely different histories.
ea5fc357da
...
71e9fe4ed2
6 changed files with 68 additions and 121 deletions
|
@ -1,8 +1,3 @@
|
||||||
## v0.2.0 (2024-09-13)
|
|
||||||
|
|
||||||
* Update to `mirage-crypto*>=1.0.0` and get rid of cstruct dependency
|
|
||||||
* Demo application is updated to dream.1.0.0~alpha7
|
|
||||||
|
|
||||||
## v0.1.0 (2021-11-18)
|
## v0.1.0 (2021-11-18)
|
||||||
|
|
||||||
* Initial release, sponsored by skolem.tech
|
* Initial release, sponsored by skolem.tech
|
||||||
|
|
|
@ -1,20 +1,5 @@
|
||||||
open Lwt.Infix
|
open Lwt.Infix
|
||||||
|
|
||||||
let pp_cert =
|
|
||||||
let pp_extensions ppf (oid, data) =
|
|
||||||
let fido_u2f_transport_oid_name = "id-fido-u2f-ce-transports" in
|
|
||||||
if Asn.OID.equal oid Webauthn.fido_u2f_transport_oid then
|
|
||||||
match Webauthn.decode_transport data with
|
|
||||||
| Error `Msg _ ->
|
|
||||||
Fmt.pf ppf "%s invalid-data %a" fido_u2f_transport_oid_name (Ohex.pp_hexdump ()) data
|
|
||||||
| Ok transports ->
|
|
||||||
Fmt.pf ppf "%s %a" fido_u2f_transport_oid_name
|
|
||||||
Fmt.(list ~sep:(any ",") Webauthn.pp_transport) transports
|
|
||||||
else
|
|
||||||
Fmt.pf ppf "unsupported %a: %a" Asn.OID.pp oid (Ohex.pp_hexdump ()) data
|
|
||||||
in
|
|
||||||
X509.Certificate.pp' pp_extensions
|
|
||||||
|
|
||||||
let users : (string, string * (Mirage_crypto_ec.P256.Dsa.pub * string * X509.Certificate.t option) list) Hashtbl.t = Hashtbl.create 7
|
let users : (string, string * (Mirage_crypto_ec.P256.Dsa.pub * string * X509.Certificate.t option) list) Hashtbl.t = Hashtbl.create 7
|
||||||
|
|
||||||
let find_username username =
|
let find_username username =
|
||||||
|
@ -24,10 +9,10 @@ let find_username username =
|
||||||
|
|
||||||
module KhPubHashtbl = Hashtbl.Make(struct
|
module KhPubHashtbl = Hashtbl.Make(struct
|
||||||
type t = Webauthn.credential_id * Mirage_crypto_ec.P256.Dsa.pub
|
type t = Webauthn.credential_id * Mirage_crypto_ec.P256.Dsa.pub
|
||||||
let string_of_pub = Mirage_crypto_ec.P256.Dsa.pub_to_octets
|
let cs_of_pub = Mirage_crypto_ec.P256.Dsa.pub_to_cstruct
|
||||||
let equal (kh, pub) (kh', pub') =
|
let equal (kh, pub) (kh', pub') =
|
||||||
String.equal kh kh' && String.equal (string_of_pub pub) (string_of_pub pub')
|
String.equal kh kh' && Cstruct.equal (cs_of_pub pub) (cs_of_pub pub')
|
||||||
let hash (kh, pub) = Hashtbl.hash (kh, string_of_pub pub )
|
let hash (kh, pub) = Hashtbl.hash (kh, Cstruct.to_string (cs_of_pub pub ))
|
||||||
end)
|
end)
|
||||||
|
|
||||||
let counters = KhPubHashtbl.create 7
|
let counters = KhPubHashtbl.create 7
|
||||||
|
@ -70,18 +55,18 @@ let to_string err = Format.asprintf "%a" Webauthn.pp_error err
|
||||||
|
|
||||||
let gen_data ?(pad = false) ?alphabet length =
|
let gen_data ?(pad = false) ?alphabet length =
|
||||||
Base64.encode_string ~pad ?alphabet
|
Base64.encode_string ~pad ?alphabet
|
||||||
(Mirage_crypto_rng.generate length)
|
(Cstruct.to_string (Mirage_crypto_rng.generate length))
|
||||||
|
|
||||||
let add_routes t =
|
let add_routes t =
|
||||||
let main req =
|
let main req =
|
||||||
let authenticated_as = Dream.session_field req "authenticated_as" in
|
let authenticated_as = Dream.session "authenticated_as" req in
|
||||||
let flash = Flash_message.get_flash req |> List.map snd in
|
let flash = Flash_message.get_flash req |> List.map snd in
|
||||||
Dream.html (Template.overview flash authenticated_as users)
|
Dream.html (Template.overview flash authenticated_as users)
|
||||||
in
|
in
|
||||||
|
|
||||||
let register req =
|
let register req =
|
||||||
let user =
|
let user =
|
||||||
match Dream.session_field req "authenticated_as" with
|
match Dream.session "authenticated_as" req with
|
||||||
| None -> gen_data ~alphabet:Base64.uri_safe_alphabet 8
|
| None -> gen_data ~alphabet:Base64.uri_safe_alphabet 8
|
||||||
| Some username -> username
|
| Some username -> username
|
||||||
in
|
in
|
||||||
|
@ -154,8 +139,8 @@ let add_routes t =
|
||||||
let cert_pem, cert_string, transports =
|
let cert_pem, cert_string, transports =
|
||||||
Option.fold ~none:("No certificate", "No certificate", Ok [])
|
Option.fold ~none:("No certificate", "No certificate", Ok [])
|
||||||
~some:(fun c ->
|
~some:(fun c ->
|
||||||
X509.Certificate.encode_pem c,
|
X509.Certificate.encode_pem c |> Cstruct.to_string,
|
||||||
Fmt.to_to_string pp_cert c,
|
Fmt.to_to_string X509.Certificate.pp c,
|
||||||
Webauthn.transports_of_cert c)
|
Webauthn.transports_of_cert c)
|
||||||
certificate
|
certificate
|
||||||
in
|
in
|
||||||
|
@ -168,7 +153,7 @@ let add_routes t =
|
||||||
req;
|
req;
|
||||||
Dream.json "true"
|
Dream.json "true"
|
||||||
in
|
in
|
||||||
match Dream.session_field req "authenticated_as", Hashtbl.find_opt users userid with
|
match Dream.session "authenticated_as" req, Hashtbl.find_opt users userid with
|
||||||
| _, None -> registered []
|
| _, None -> registered []
|
||||||
| Some session_user, Some (username', keys) ->
|
| Some session_user, Some (username', keys) ->
|
||||||
if String.equal username session_user && String.equal username username' then begin
|
if String.equal username session_user && String.equal username username' then begin
|
||||||
|
@ -238,7 +223,7 @@ let add_routes t =
|
||||||
if check_counter (credential_id, pubkey) sign_count
|
if check_counter (credential_id, pubkey) sign_count
|
||||||
then begin
|
then begin
|
||||||
Flash_message.put_flash "" "Successfully authenticated" req;
|
Flash_message.put_flash "" "Successfully authenticated" req;
|
||||||
Dream.set_session_field req "authenticated_as" username >>= fun () ->
|
Dream.put_session "authenticated_as" username req >>= fun () ->
|
||||||
Dream.json "true"
|
Dream.json "true"
|
||||||
end else begin
|
end else begin
|
||||||
Logs.warn (fun m -> m "credential %S for user %S: counter not strictly increasing! \
|
Logs.warn (fun m -> m "credential %S for user %S: counter not strictly increasing! \
|
||||||
|
|
|
@ -1,23 +0,0 @@
|
||||||
#!/bin/sh
|
|
||||||
|
|
||||||
. /etc/rc.subr
|
|
||||||
|
|
||||||
name="webauthn_demo"
|
|
||||||
title="webauthn-demo"
|
|
||||||
rcvar="${name}_enable"
|
|
||||||
|
|
||||||
pidfile="/var/run/${name}.pid"
|
|
||||||
# Change this if you place the demo binary elsewhere
|
|
||||||
exec_path="/home/builder/webauthn/${name}.exe"
|
|
||||||
|
|
||||||
load_rc_config "$name"
|
|
||||||
|
|
||||||
: ${webauthn_demo_enable:="NO"}
|
|
||||||
# We can't use $webauthn_demo_user as otherwise daemon(8) will run unprivileged
|
|
||||||
# and can't create the pidfile and drop privileges
|
|
||||||
: ${webauthn_demo_runas:="builder"}
|
|
||||||
|
|
||||||
command="/usr/sbin/daemon"
|
|
||||||
command_args="-r -S -t ${title} -P ${pidfile} -u ${webauthn_demo_runas} ${exec_path}"
|
|
||||||
|
|
||||||
run_rc_command "$1"
|
|
103
src/webauthn.ml
103
src/webauthn.ml
|
@ -7,7 +7,7 @@ type decoding_error = [
|
||||||
| `Base64_decoding of string * string * string
|
| `Base64_decoding of string * string * string
|
||||||
| `CBOR_decoding of string * string * string
|
| `CBOR_decoding of string * string * string
|
||||||
| `Unexpected_CBOR of string * string * CBOR.Simple.t
|
| `Unexpected_CBOR of string * string * CBOR.Simple.t
|
||||||
| `Binary_decoding of string * string * string
|
| `Binary_decoding of string * string * Cstruct.t
|
||||||
| `Attestation_object_decoding of string * string * string
|
| `Attestation_object_decoding of string * string * string
|
||||||
]
|
]
|
||||||
|
|
||||||
|
@ -35,7 +35,7 @@ let pp_error ppf = function
|
||||||
| `Unexpected_CBOR (ctx, msg, data) ->
|
| `Unexpected_CBOR (ctx, msg, data) ->
|
||||||
Fmt.pf ppf "unexpected cbor in %s: %s (data: %s)" ctx msg (CBOR.Simple.to_diagnostic data)
|
Fmt.pf ppf "unexpected cbor in %s: %s (data: %s)" ctx msg (CBOR.Simple.to_diagnostic data)
|
||||||
| `Binary_decoding (ctx, msg, data) ->
|
| `Binary_decoding (ctx, msg, data) ->
|
||||||
Fmt.pf ppf "binary decoding error in %s: %s (data: %a)" ctx msg (Ohex.pp_hexdump ()) data
|
Fmt.pf ppf "binary decoding error in %s: %s (data: %a)" ctx msg Cstruct.hexdump_pp data
|
||||||
| `Attestation_object_decoding (ctx, msg, data) ->
|
| `Attestation_object_decoding (ctx, msg, data) ->
|
||||||
Fmt.pf ppf "attestation object decoding error in %s: %s (data: %s)" ctx msg data
|
Fmt.pf ppf "attestation object decoding error in %s: %s (data: %s)" ctx msg data
|
||||||
| `Unsupported_key_type i ->
|
| `Unsupported_key_type i ->
|
||||||
|
@ -67,7 +67,7 @@ type challenge = string
|
||||||
|
|
||||||
let generate_challenge ?(size = 32) () =
|
let generate_challenge ?(size = 32) () =
|
||||||
if size < 16 then invalid_arg "size must be at least 16 bytes";
|
if size < 16 then invalid_arg "size must be at least 16 bytes";
|
||||||
let ch = Mirage_crypto_rng.generate size in
|
let ch = Mirage_crypto_rng.generate size |> Cstruct.to_string in
|
||||||
ch, Base64.encode_string ch
|
ch, Base64.encode_string ch
|
||||||
|
|
||||||
let challenge_to_string c = c
|
let challenge_to_string c = c
|
||||||
|
@ -131,10 +131,11 @@ let cose_pubkey cbor_data =
|
||||||
guard (crv = 1) (`Unsupported_elliptic_curve crv) >>= fun () ->
|
guard (crv = 1) (`Unsupported_elliptic_curve crv) >>= fun () ->
|
||||||
extract_k_i "cose pubkey x" kv (-2) >>= extract_bytes "cose pubkey x" >>= fun x ->
|
extract_k_i "cose pubkey x" kv (-2) >>= extract_bytes "cose pubkey x" >>= fun x ->
|
||||||
extract_k_i "cose pubkey y" kv (-3) >>= extract_bytes "cose pubkey y" >>= fun y ->
|
extract_k_i "cose pubkey y" kv (-3) >>= extract_bytes "cose pubkey y" >>= fun y ->
|
||||||
let str = String.concat "" [ "\004" ; x ; y ] in
|
let four = Cstruct.create 1 in Cstruct.set_uint8 four 0 4;
|
||||||
|
let cs = Cstruct.concat [ four ; Cstruct.of_string x ; Cstruct.of_string y ] in
|
||||||
Result.map_error
|
Result.map_error
|
||||||
(fun e -> `Invalid_public_key (Fmt.to_to_string Mirage_crypto_ec.pp_error e))
|
(fun e -> `Invalid_public_key (Fmt.to_to_string Mirage_crypto_ec.pp_error e))
|
||||||
(Mirage_crypto_ec.P256.Dsa.pub_of_octets str)
|
(Mirage_crypto_ec.P256.Dsa.pub_of_cstruct cs)
|
||||||
|
|
||||||
let decode_partial_cbor ctx data =
|
let decode_partial_cbor ctx data =
|
||||||
try Ok (CBOR.Simple.decode_partial data)
|
try Ok (CBOR.Simple.decode_partial data)
|
||||||
|
@ -144,23 +145,20 @@ let decode_cbor ctx data =
|
||||||
try Ok (CBOR.Simple.decode data)
|
try Ok (CBOR.Simple.decode data)
|
||||||
with CBOR.Error m -> Error (`CBOR_decoding (ctx, "failed to decode CBOR " ^ m, data))
|
with CBOR.Error m -> Error (`CBOR_decoding (ctx, "failed to decode CBOR " ^ m, data))
|
||||||
|
|
||||||
let guard_length ctx len str =
|
let guard_length ctx len cs =
|
||||||
guard (String.length str >= len)
|
guard (Cstruct.length cs >= len)
|
||||||
(`Binary_decoding (ctx, "too short (< " ^ string_of_int len ^ ")", str))
|
(`Binary_decoding (ctx, "too short (< " ^ string_of_int len ^ ")", cs))
|
||||||
|
|
||||||
let parse_attested_credential_data data =
|
let parse_attested_credential_data data =
|
||||||
guard_length "attested credential data" 18 data >>= fun () ->
|
guard_length "attested credential data" 18 data >>= fun () ->
|
||||||
let aaguid = String.sub data 0 16 in
|
let aaguid = Cstruct.sub data 0 16 in
|
||||||
let cid_len = String.get_uint16_be data 16 in
|
let cid_len = Cstruct.BE.get_uint16 data 16 in
|
||||||
let rest = String.sub data 18 (String.length data - 18) in
|
let rest = Cstruct.shift data 18 in
|
||||||
guard_length "attested credential data" cid_len rest >>= fun () ->
|
guard_length "attested credential data" cid_len rest >>= fun () ->
|
||||||
let cid, pubkey =
|
let cid, pubkey = Cstruct.split rest cid_len in
|
||||||
String.sub rest 0 cid_len,
|
decode_partial_cbor "public key" (Cstruct.to_string pubkey) >>= fun (pubkey, rest) ->
|
||||||
String.sub rest cid_len (String.length rest - cid_len)
|
|
||||||
in
|
|
||||||
decode_partial_cbor "public key" pubkey >>= fun (pubkey, rest) ->
|
|
||||||
cose_pubkey pubkey >>= fun pubkey ->
|
cose_pubkey pubkey >>= fun pubkey ->
|
||||||
Ok ((aaguid, cid, pubkey), rest)
|
Ok ((aaguid, cid, pubkey), Cstruct.of_string rest)
|
||||||
|
|
||||||
let string_keys ctx kv =
|
let string_keys ctx kv =
|
||||||
List.fold_right (fun (k, v) acc ->
|
List.fold_right (fun (k, v) acc ->
|
||||||
|
@ -171,17 +169,17 @@ let string_keys ctx kv =
|
||||||
kv (Ok [])
|
kv (Ok [])
|
||||||
|
|
||||||
let parse_extension_data data =
|
let parse_extension_data data =
|
||||||
decode_partial_cbor "extension data" data >>= fun (data, rest) ->
|
decode_partial_cbor "extension data" (Cstruct.to_string data) >>= fun (data, rest) ->
|
||||||
extract_map "extension data" data >>= fun kv ->
|
extract_map "extension data" data >>= fun kv ->
|
||||||
string_keys "extension data" kv >>= fun kv ->
|
string_keys "extension data" kv >>= fun kv ->
|
||||||
Ok (kv, rest)
|
Ok (kv, Cstruct.of_string rest)
|
||||||
|
|
||||||
type auth_data = {
|
type auth_data = {
|
||||||
rpid_hash : string ;
|
rpid_hash : Cstruct.t ;
|
||||||
user_present : bool ;
|
user_present : bool ;
|
||||||
user_verified : bool ;
|
user_verified : bool ;
|
||||||
sign_count : Int32.t ;
|
sign_count : Int32.t ;
|
||||||
attested_credential_data : (string * string * Mirage_crypto_ec.P256.Dsa.pub) option ;
|
attested_credential_data : (Cstruct.t * Cstruct.t * Mirage_crypto_ec.P256.Dsa.pub) option ;
|
||||||
extension_data : (string * CBOR.Simple.t) list option ;
|
extension_data : (string * CBOR.Simple.t) list option ;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -190,20 +188,21 @@ let flags byte =
|
||||||
b 0, b 2, b 6, b 7
|
b 0, b 2, b 6, b 7
|
||||||
|
|
||||||
let parse_auth_data data =
|
let parse_auth_data data =
|
||||||
|
let data = Cstruct.of_string data in
|
||||||
guard_length "authenticator data" 37 data >>= fun () ->
|
guard_length "authenticator data" 37 data >>= fun () ->
|
||||||
let rpid_hash = String.sub data 0 32 in
|
let rpid_hash = Cstruct.sub data 0 32 in
|
||||||
let user_present, user_verified, attested_data_included, extension_data_included =
|
let user_present, user_verified, attested_data_included, extension_data_included =
|
||||||
flags (String.get_uint8 data 32)
|
flags (Cstruct.get_uint8 data 32)
|
||||||
in
|
in
|
||||||
let sign_count = String.get_int32_be data 33 in
|
let sign_count = Cstruct.BE.get_uint32 data 33 in
|
||||||
let rest = String.sub data 37 (String.length data - 37) in
|
let rest = Cstruct.shift data 37 in
|
||||||
(if attested_data_included then
|
(if attested_data_included then
|
||||||
Result.map (fun (d, r) -> Some d, r) (parse_attested_credential_data rest)
|
Result.map (fun (d, r) -> Some d, r) (parse_attested_credential_data rest)
|
||||||
else Ok (None, rest)) >>= fun (attested_credential_data, rest) ->
|
else Ok (None, rest)) >>= fun (attested_credential_data, rest) ->
|
||||||
(if extension_data_included then
|
(if extension_data_included then
|
||||||
Result.map (fun (d, r) -> Some d, r) (parse_extension_data rest)
|
Result.map (fun (d, r) -> Some d, r) (parse_extension_data rest)
|
||||||
else Ok (None, rest)) >>= fun (extension_data, rest) ->
|
else Ok (None, rest)) >>= fun (extension_data, rest) ->
|
||||||
guard (String.length rest = 0) (`Binary_decoding ("authenticator data", "leftover", rest)) >>= fun () ->
|
guard (Cstruct.length rest = 0) (`Binary_decoding ("authenticator data", "leftover", rest)) >>= fun () ->
|
||||||
Ok { rpid_hash ; user_present ; user_verified ; sign_count ; attested_credential_data ; extension_data }
|
Ok { rpid_hash ; user_present ; user_verified ; sign_count ; attested_credential_data ; extension_data }
|
||||||
|
|
||||||
let parse_attestation_statement fmt data =
|
let parse_attestation_statement fmt data =
|
||||||
|
@ -218,7 +217,7 @@ let parse_attestation_statement fmt data =
|
||||||
extract_bytes "attestation statement x5c" c >>= fun c ->
|
extract_bytes "attestation statement x5c" c >>= fun c ->
|
||||||
Result.map_error
|
Result.map_error
|
||||||
(function `Msg m -> `Attestation_object_decoding ("attestation statement x5c", m, String.escaped c))
|
(function `Msg m -> `Attestation_object_decoding ("attestation statement x5c", m, String.escaped c))
|
||||||
(X509.Certificate.decode_der c)
|
(X509.Certificate.decode_der (Cstruct.of_string c))
|
||||||
| cs -> Error (`Attestation_object_decoding ("attestation statement x5c", "expected single certificate", String.concat "," (List.map CBOR.Simple.to_diagnostic cs)))
|
| cs -> Error (`Attestation_object_decoding ("attestation statement x5c", "expected single certificate", String.concat "," (List.map CBOR.Simple.to_diagnostic cs)))
|
||||||
end >>= fun cert ->
|
end >>= fun cert ->
|
||||||
Ok (Some (cert, signature))
|
Ok (Some (cert, signature))
|
||||||
|
@ -312,9 +311,8 @@ let register_response_of_string =
|
||||||
|
|
||||||
let register t response =
|
let register t response =
|
||||||
(* XXX: credential.getClientExtensionResults() *)
|
(* XXX: credential.getClientExtensionResults() *)
|
||||||
let client_data_hash =
|
let client_data_hash = Mirage_crypto.Hash.SHA256.digest
|
||||||
Digestif.SHA256.(to_raw_string (digest_string response.client_data_json))
|
(Cstruct.of_string response.client_data_json) in
|
||||||
in
|
|
||||||
begin try Ok (Yojson.Safe.from_string response.client_data_json)
|
begin try Ok (Yojson.Safe.from_string response.client_data_json)
|
||||||
with Yojson.Json_error msg ->
|
with Yojson.Json_error msg ->
|
||||||
Error (`Json_decoding ("clientDataJSON", msg, response.client_data_json))
|
Error (`Json_decoding ("clientDataJSON", msg, response.client_data_json))
|
||||||
|
@ -337,21 +335,22 @@ let register t response =
|
||||||
Ok None
|
Ok None
|
||||||
end >>= fun client_extensions ->
|
end >>= fun client_extensions ->
|
||||||
parse_attestation_object response.attestation_object >>= fun (auth_data, attestation_statement) ->
|
parse_attestation_object response.attestation_object >>= fun (auth_data, attestation_statement) ->
|
||||||
let rpid_hash =
|
let rpid_hash = Mirage_crypto.Hash.SHA256.digest (Cstruct.of_string (rpid t)) in
|
||||||
Digestif.SHA256.(to_raw_string (digest_string (rpid t))) in
|
guard (Cstruct.equal auth_data.rpid_hash rpid_hash)
|
||||||
guard (String.equal auth_data.rpid_hash rpid_hash)
|
(`Rpid_hash_mismatch (Cstruct.to_string rpid_hash, Cstruct.to_string auth_data.rpid_hash)) >>= fun () ->
|
||||||
(`Rpid_hash_mismatch (rpid_hash, auth_data.rpid_hash)) >>= fun () ->
|
|
||||||
(* verify user present, user verified flags in auth_data.flags *)
|
(* verify user present, user verified flags in auth_data.flags *)
|
||||||
Option.to_result ~none:`Missing_credential_data
|
Option.to_result ~none:`Missing_credential_data
|
||||||
auth_data.attested_credential_data >>= fun (aaguid, credential_id, public_key) ->
|
auth_data.attested_credential_data >>= fun (aaguid, credential_id, public_key) ->
|
||||||
begin match attestation_statement with
|
begin match attestation_statement with
|
||||||
| None -> Ok None
|
| None -> Ok None
|
||||||
| Some (cert, signature) ->
|
| Some (cert, signature) ->
|
||||||
let pub_cs = Mirage_crypto_ec.P256.Dsa.pub_to_octets public_key in
|
let pub_cs = Mirage_crypto_ec.P256.Dsa.pub_to_cstruct public_key in
|
||||||
let sigdata = String.concat "" [
|
let sigdata = Cstruct.concat [
|
||||||
"\000" ; rpid_hash ; client_data_hash ; credential_id ; pub_cs
|
Cstruct.create 1 ; rpid_hash ; client_data_hash ; credential_id ; pub_cs
|
||||||
] in
|
] in
|
||||||
let pk = X509.Certificate.public_key cert in
|
let pk = X509.Certificate.public_key cert
|
||||||
|
and signature = Cstruct.of_string signature
|
||||||
|
in
|
||||||
Result.map_error (function `Msg m -> `Signature_verification m)
|
Result.map_error (function `Msg m -> `Signature_verification m)
|
||||||
(X509.Public_key.verify `SHA256 ~signature pk (`Message sigdata)) >>= fun () ->
|
(X509.Public_key.verify `SHA256 ~signature pk (`Message sigdata)) >>= fun () ->
|
||||||
Ok (Some cert)
|
Ok (Some cert)
|
||||||
|
@ -360,8 +359,8 @@ let register t response =
|
||||||
(* check auth_data.attested_credential_data.credential_id is not registered ? *)
|
(* check auth_data.attested_credential_data.credential_id is not registered ? *)
|
||||||
let registration =
|
let registration =
|
||||||
let attested_credential_data = {
|
let attested_credential_data = {
|
||||||
aaguid ;
|
aaguid = Cstruct.to_string aaguid ;
|
||||||
credential_id ;
|
credential_id = Cstruct.to_string credential_id ;
|
||||||
public_key
|
public_key
|
||||||
} in
|
} in
|
||||||
{
|
{
|
||||||
|
@ -395,9 +394,8 @@ let authenticate_response_of_string =
|
||||||
of_json "authenticate response" authenticate_response_of_yojson
|
of_json "authenticate response" authenticate_response_of_yojson
|
||||||
|
|
||||||
let authenticate t public_key response =
|
let authenticate t public_key response =
|
||||||
let client_data_hash =
|
let client_data_hash = Mirage_crypto.Hash.SHA256.digest
|
||||||
Digestif.SHA256.(to_raw_string (digest_string response.client_data_json))
|
(Cstruct.of_string response.client_data_json) in
|
||||||
in
|
|
||||||
begin try Ok (Yojson.Safe.from_string response.client_data_json)
|
begin try Ok (Yojson.Safe.from_string response.client_data_json)
|
||||||
with Yojson.Json_error msg ->
|
with Yojson.Json_error msg ->
|
||||||
Error (`Json_decoding ("clientDataJSON", msg, response.client_data_json))
|
Error (`Json_decoding ("clientDataJSON", msg, response.client_data_json))
|
||||||
|
@ -420,11 +418,12 @@ let authenticate t public_key response =
|
||||||
Ok None
|
Ok None
|
||||||
end >>= fun client_extensions ->
|
end >>= fun client_extensions ->
|
||||||
parse_auth_data response.authenticator_data >>= fun auth_data ->
|
parse_auth_data response.authenticator_data >>= fun auth_data ->
|
||||||
let rpid_hash = Digestif.SHA256.(to_raw_string (digest_string (rpid t))) in
|
let rpid_hash = Mirage_crypto.Hash.SHA256.digest (Cstruct.of_string (rpid t)) in
|
||||||
guard (String.equal auth_data.rpid_hash rpid_hash)
|
guard (Cstruct.equal auth_data.rpid_hash rpid_hash)
|
||||||
(`Rpid_hash_mismatch (rpid_hash, auth_data.rpid_hash)) >>= fun () ->
|
(`Rpid_hash_mismatch (Cstruct.to_string rpid_hash, Cstruct.to_string auth_data.rpid_hash)) >>= fun () ->
|
||||||
let sigdata = response.authenticator_data ^ client_data_hash
|
let sigdata = Cstruct.concat [ Cstruct.of_string response.authenticator_data ; client_data_hash ]
|
||||||
and signature = response.signature in
|
and signature = Cstruct.of_string response.signature
|
||||||
|
in
|
||||||
Result.map_error (function `Msg m -> `Signature_verification m)
|
Result.map_error (function `Msg m -> `Signature_verification m)
|
||||||
(X509.Public_key.verify `SHA256 ~signature (`P256 public_key) (`Message sigdata)) >>= fun () ->
|
(X509.Public_key.verify `SHA256 ~signature (`P256 public_key) (`Message sigdata)) >>= fun () ->
|
||||||
let authentication = {
|
let authentication = {
|
||||||
|
@ -448,11 +447,11 @@ type transport = [
|
||||||
]
|
]
|
||||||
|
|
||||||
let pp_transport ppf = function
|
let pp_transport ppf = function
|
||||||
| `Bluetooth_classic -> Fmt.string ppf "BluetoothClassic"
|
| `Bluetooth_classic -> Fmt.string ppf "Bluetooth classic"
|
||||||
| `Bluetooth_low_energy -> Fmt.string ppf "BluetoothLowEnergy"
|
| `Bluetooth_low_energy -> Fmt.string ppf "Bluetooth low energy"
|
||||||
| `Usb -> Fmt.string ppf "USB"
|
| `Usb -> Fmt.string ppf "USB"
|
||||||
| `Nfc -> Fmt.string ppf "NFC"
|
| `Nfc -> Fmt.string ppf "NFC"
|
||||||
| `Usb_internal -> Fmt.string ppf "USBInternal"
|
| `Usb_internal -> Fmt.string ppf "USB internal"
|
||||||
|
|
||||||
let transports =
|
let transports =
|
||||||
let opts = [
|
let opts = [
|
||||||
|
@ -467,7 +466,7 @@ let transports =
|
||||||
let decode_strict codec cs =
|
let decode_strict codec cs =
|
||||||
match Asn.decode codec cs with
|
match Asn.decode codec cs with
|
||||||
| Ok (a, cs) ->
|
| Ok (a, cs) ->
|
||||||
guard (String.length cs = 0) (`Msg "trailing bytes") >>= fun () ->
|
guard (Cstruct.length cs = 0) (`Msg "trailing bytes") >>= fun () ->
|
||||||
Ok a
|
Ok a
|
||||||
| Error (`Parse msg) -> Error (`Msg msg)
|
| Error (`Parse msg) -> Error (`Msg msg)
|
||||||
|
|
||||||
|
|
|
@ -48,7 +48,7 @@ type decoding_error = [
|
||||||
| `Base64_decoding of string * string * string
|
| `Base64_decoding of string * string * string
|
||||||
| `CBOR_decoding of string * string * string
|
| `CBOR_decoding of string * string * string
|
||||||
| `Unexpected_CBOR of string * string * CBOR.Simple.t
|
| `Unexpected_CBOR of string * string * CBOR.Simple.t
|
||||||
| `Binary_decoding of string * string * string
|
| `Binary_decoding of string * string * Cstruct.t
|
||||||
| `Attestation_object_decoding of string * string * string
|
| `Attestation_object_decoding of string * string * string
|
||||||
]
|
]
|
||||||
|
|
||||||
|
@ -168,14 +168,6 @@ type transport = [
|
||||||
(** [pp_transport ppf tranport] pretty-prints the [transport] on [ppf]. *)
|
(** [pp_transport ppf tranport] pretty-prints the [transport] on [ppf]. *)
|
||||||
val pp_transport : Format.formatter -> transport -> unit
|
val pp_transport : Format.formatter -> transport -> unit
|
||||||
|
|
||||||
(** [fido_u2f_transport_oid] is the OID 1.3.6.1.4.1.45724.2.1.1 for
|
|
||||||
certificate authenticator transports extensions. *)
|
|
||||||
val fido_u2f_transport_oid : Asn.oid
|
|
||||||
|
|
||||||
(** [decode_transport data] decodes the [fido_u2f_transport_oid] certificate
|
|
||||||
extension data. *)
|
|
||||||
val decode_transport : string -> (transport list, [> `Msg of string ]) result
|
|
||||||
|
|
||||||
(** [transports_of_cert certficate] attempts to extract the FIDO U2F
|
(** [transports_of_cert certficate] attempts to extract the FIDO U2F
|
||||||
authenticator transports extension (OID 1.3.6.1.4.1.45724.2.1.1) from the
|
authenticator transports extension (OID 1.3.6.1.4.1.45724.2.1.1) from the
|
||||||
[certificate]. *)
|
[certificate]. *)
|
||||||
|
|
|
@ -16,21 +16,20 @@ build: [
|
||||||
depends: [
|
depends: [
|
||||||
"ocaml" {>= "4.08.0"}
|
"ocaml" {>= "4.08.0"}
|
||||||
"dune" {>= "2.7"}
|
"dune" {>= "2.7"}
|
||||||
"dream" {dev & >= "1.0.0~alpha7"}
|
"dream" {dev & >= "1.0.0~alpha4"}
|
||||||
"ppx_blob" {dev & >= "0.9.0"}
|
"ppx_blob" {dev}
|
||||||
"cmdliner" {dev & >= "1.1.0"}
|
"cmdliner" {dev & >= "1.1.0"}
|
||||||
"logs" {dev}
|
"logs" {dev}
|
||||||
"lwt" {dev}
|
"lwt" {dev}
|
||||||
"yojson"
|
"yojson"
|
||||||
"ppx_deriving_yojson"
|
"ppx_deriving_yojson"
|
||||||
"digestif"
|
"mirage-crypto-ec"
|
||||||
"mirage-crypto-ec" {>= "1.1.0"}
|
"mirage-crypto-rng"
|
||||||
"mirage-crypto-rng" {>= "1.1.0"}
|
|
||||||
"ocplib-endian"
|
"ocplib-endian"
|
||||||
"x509" {>= "1.0.4"}
|
"x509" {>= "0.13.0"}
|
||||||
"base64" {>= "3.1.0"}
|
"base64" {>= "3.1.0"}
|
||||||
|
"cstruct" {>= "6.0.0"}
|
||||||
"cbor" {>= "0.5"}
|
"cbor" {>= "0.5"}
|
||||||
"ohex" {>= "0.2.0"}
|
|
||||||
]
|
]
|
||||||
|
|
||||||
conflicts: [
|
conflicts: [
|
||||||
|
|
Loading…
Reference in a new issue