xref: /openbsd-src/lib/libfido2/src/hid_openbsd.c (revision c4a807ed13283181a6a84fdf571f4571a1b25eac)
1d75efeb7Sdjm /*
2d75efeb7Sdjm  * Copyright (c) 2019 Google LLC. All rights reserved.
3d75efeb7Sdjm  * Use of this source code is governed by a BSD-style
4d75efeb7Sdjm  * license that can be found in the LICENSE file.
5d75efeb7Sdjm  */
6d75efeb7Sdjm 
7d75efeb7Sdjm #include <sys/types.h>
8d75efeb7Sdjm 
9d75efeb7Sdjm #include <sys/ioctl.h>
10739189a3Sdjm #include <sys/time.h>
11d75efeb7Sdjm #include <dev/usb/usb.h>
12d75efeb7Sdjm #include <dev/usb/usbhid.h>
13d75efeb7Sdjm 
14d75efeb7Sdjm #include <errno.h>
15d75efeb7Sdjm #include <fcntl.h>
16*c4a807edSdjm #include <signal.h>
17d75efeb7Sdjm #include <string.h>
18d75efeb7Sdjm #include <unistd.h>
19d75efeb7Sdjm #include <usbhid.h>
20d75efeb7Sdjm #include <poll.h>
21d75efeb7Sdjm 
22d75efeb7Sdjm #include "fido.h"
23d75efeb7Sdjm 
24d75efeb7Sdjm #define MAX_UHID	64
251ba9f8e2Sreyk #define MAX_U2FHID_LEN	64
26d75efeb7Sdjm 
27d75efeb7Sdjm struct hid_openbsd {
28d75efeb7Sdjm 	int fd;
29d75efeb7Sdjm 	size_t report_in_len;
30d75efeb7Sdjm 	size_t report_out_len;
31*c4a807edSdjm 	sigset_t sigmask;
32*c4a807edSdjm 	const sigset_t *sigmaskp;
33d75efeb7Sdjm };
34d75efeb7Sdjm 
35d75efeb7Sdjm int
fido_hid_manifest(fido_dev_info_t * devlist,size_t ilen,size_t * olen)3632a20e26Sdjm fido_hid_manifest(fido_dev_info_t *devlist, size_t ilen, size_t *olen)
37d75efeb7Sdjm {
38d75efeb7Sdjm 	size_t i;
39d75efeb7Sdjm 	char path[64];
401ba9f8e2Sreyk 	int fd;
41d75efeb7Sdjm 	struct usb_device_info udi;
42d75efeb7Sdjm 	fido_dev_info_t *di;
43d75efeb7Sdjm 
44d75efeb7Sdjm 	if (ilen == 0)
45d75efeb7Sdjm 		return (FIDO_OK); /* nothing to do */
46d75efeb7Sdjm 
47d75efeb7Sdjm 	if (devlist == NULL || olen == NULL)
48d75efeb7Sdjm 		return (FIDO_ERR_INVALID_ARGUMENT);
49d75efeb7Sdjm 
50d75efeb7Sdjm 	for (i = *olen = 0; i < MAX_UHID && *olen < ilen; i++) {
511ba9f8e2Sreyk 		snprintf(path, sizeof(path), "/dev/fido/%zu", i);
52*c4a807edSdjm 		if ((fd = fido_hid_unix_open(path)) == -1)
53d75efeb7Sdjm 			continue;
54*c4a807edSdjm 		if (close(fd) == -1)
55*c4a807edSdjm 			fido_log_error(errno, "%s: close", __func__);
561ba9f8e2Sreyk 
57d75efeb7Sdjm 		memset(&udi, 0, sizeof(udi));
581ba9f8e2Sreyk 		strlcpy(udi.udi_vendor, "OpenBSD", sizeof(udi.udi_vendor));
591ba9f8e2Sreyk 		strlcpy(udi.udi_product, "fido(4)", sizeof(udi.udi_product));
601ba9f8e2Sreyk 		udi.udi_vendorNo = 0x0b5d; /* stolen from PCI_VENDOR_OPENBSD */
61d75efeb7Sdjm 
6232a20e26Sdjm 		fido_log_debug("%s: %s: vendor = \"%s\", product = \"%s\"",
63d75efeb7Sdjm 		    __func__, path, udi.udi_vendor, udi.udi_product);
64d75efeb7Sdjm 
65d75efeb7Sdjm 		di = &devlist[*olen];
66d75efeb7Sdjm 		memset(di, 0, sizeof(*di));
67*c4a807edSdjm 		di->io = (fido_dev_io_t) {
68*c4a807edSdjm 			fido_hid_open,
69*c4a807edSdjm 			fido_hid_close,
70*c4a807edSdjm 			fido_hid_read,
71*c4a807edSdjm 			fido_hid_write,
72*c4a807edSdjm 		};
73d75efeb7Sdjm 		if ((di->path = strdup(path)) == NULL ||
74d75efeb7Sdjm 		    (di->manufacturer = strdup(udi.udi_vendor)) == NULL ||
75d75efeb7Sdjm 		    (di->product = strdup(udi.udi_product)) == NULL) {
76d75efeb7Sdjm 			free(di->path);
77d75efeb7Sdjm 			free(di->manufacturer);
78d75efeb7Sdjm 			free(di->product);
79d75efeb7Sdjm 			explicit_bzero(di, sizeof(*di));
80d75efeb7Sdjm 			return FIDO_ERR_INTERNAL;
81d75efeb7Sdjm 		}
82*c4a807edSdjm 		di->vendor_id = (int16_t)udi.udi_vendorNo;
83*c4a807edSdjm 		di->product_id = (int16_t)udi.udi_productNo;
84d75efeb7Sdjm 		(*olen)++;
85d75efeb7Sdjm 	}
86d75efeb7Sdjm 
87d75efeb7Sdjm 	return FIDO_OK;
88d75efeb7Sdjm }
89d75efeb7Sdjm 
9065f50905Smglocker /*
9165f50905Smglocker  * Workaround for OpenBSD <=6.6-current (as of 201910) bug that loses
9265f50905Smglocker  * sync of DATA0/DATA1 sequence bit across uhid open/close.
9365f50905Smglocker  * Send pings until we get a response - early pings with incorrect
9465f50905Smglocker  * sequence bits will be ignored as duplicate packets by the device.
9565f50905Smglocker  */
9665f50905Smglocker static int
terrible_ping_kludge(struct hid_openbsd * ctx)9765f50905Smglocker terrible_ping_kludge(struct hid_openbsd *ctx)
9865f50905Smglocker {
9965f50905Smglocker 	u_char data[256];
10065f50905Smglocker 	int i, n;
10165f50905Smglocker 	struct pollfd pfd;
10265f50905Smglocker 
10365f50905Smglocker 	if (sizeof(data) < ctx->report_out_len + 1)
10465f50905Smglocker 		return -1;
10565f50905Smglocker 	for (i = 0; i < 4; i++) {
10665f50905Smglocker 		memset(data, 0, sizeof(data));
10765f50905Smglocker 		/* broadcast channel ID */
10865f50905Smglocker 		data[1] = 0xff;
10965f50905Smglocker 		data[2] = 0xff;
11065f50905Smglocker 		data[3] = 0xff;
11165f50905Smglocker 		data[4] = 0xff;
11265f50905Smglocker 		/* Ping command */
11365f50905Smglocker 		data[5] = 0x81;
11465f50905Smglocker 		/* One byte ping only, Vasili */
11565f50905Smglocker 		data[6] = 0;
11665f50905Smglocker 		data[7] = 1;
11765f50905Smglocker 		fido_log_debug("%s: send ping %d", __func__, i);
11865f50905Smglocker 		if (fido_hid_write(ctx, data, ctx->report_out_len + 1) == -1)
11965f50905Smglocker 			return -1;
12065f50905Smglocker 		fido_log_debug("%s: wait reply", __func__);
12165f50905Smglocker 		memset(&pfd, 0, sizeof(pfd));
12265f50905Smglocker 		pfd.fd = ctx->fd;
12365f50905Smglocker 		pfd.events = POLLIN;
12465f50905Smglocker 		if ((n = poll(&pfd, 1, 100)) == -1) {
12565f50905Smglocker 			fido_log_debug("%s: poll: %s", __func__, strerror(errno));
12665f50905Smglocker 			return -1;
12765f50905Smglocker 		} else if (n == 0) {
12865f50905Smglocker 			fido_log_debug("%s: timed out", __func__);
12965f50905Smglocker 			continue;
13065f50905Smglocker 		}
13165f50905Smglocker 		if (fido_hid_read(ctx, data, ctx->report_out_len, 250) == -1)
13265f50905Smglocker 			return -1;
13365f50905Smglocker 		/*
13465f50905Smglocker 		 * Ping isn't always supported on the broadcast channel,
13565f50905Smglocker 		 * so we might get an error, but we don't care - we're
13665f50905Smglocker 		 * synched now.
13765f50905Smglocker 		 */
13865f50905Smglocker 		fido_log_debug("%s: got reply", __func__);
139*c4a807edSdjm 		fido_log_xxd(data, ctx->report_out_len, "%s", __func__);
14065f50905Smglocker 		return 0;
14165f50905Smglocker 	}
14265f50905Smglocker 	fido_log_debug("%s: no response", __func__);
14365f50905Smglocker 	return -1;
14465f50905Smglocker }
14565f50905Smglocker 
146d75efeb7Sdjm void *
fido_hid_open(const char * path)14732a20e26Sdjm fido_hid_open(const char *path)
148d75efeb7Sdjm {
149d75efeb7Sdjm 	struct hid_openbsd *ret = NULL;
150d75efeb7Sdjm 
151d75efeb7Sdjm 	if ((ret = calloc(1, sizeof(*ret))) == NULL ||
152*c4a807edSdjm 	    (ret->fd = fido_hid_unix_open(path)) == -1) {
153d75efeb7Sdjm 		free(ret);
154d75efeb7Sdjm 		return (NULL);
155d75efeb7Sdjm 	}
156*c4a807edSdjm 	ret->report_in_len = ret->report_out_len = CTAP_MAX_REPORT_LEN;
15732a20e26Sdjm 	fido_log_debug("%s: inlen = %zu outlen = %zu", __func__,
1581ba9f8e2Sreyk 	    ret->report_in_len, ret->report_out_len);
159d75efeb7Sdjm 
16065f50905Smglocker 	/*
16165f50905Smglocker 	 * OpenBSD (as of 201910) has a bug that causes it to lose
16265f50905Smglocker 	 * track of the DATA0/DATA1 sequence toggle across uhid device
16365f50905Smglocker 	 * open and close. This is a terrible hack to work around it.
16465f50905Smglocker 	 */
16565f50905Smglocker 	if (terrible_ping_kludge(ret) != 0) {
16665f50905Smglocker 		fido_hid_close(ret);
16765f50905Smglocker 		return NULL;
16865f50905Smglocker 	}
16965f50905Smglocker 
170d75efeb7Sdjm 	return (ret);
171d75efeb7Sdjm }
172d75efeb7Sdjm 
173d75efeb7Sdjm void
fido_hid_close(void * handle)17432a20e26Sdjm fido_hid_close(void *handle)
175d75efeb7Sdjm {
176d75efeb7Sdjm 	struct hid_openbsd *ctx = (struct hid_openbsd *)handle;
177d75efeb7Sdjm 
178*c4a807edSdjm 	if (close(ctx->fd) == -1)
179*c4a807edSdjm 		fido_log_error(errno, "%s: close", __func__);
180*c4a807edSdjm 
181d75efeb7Sdjm 	free(ctx);
182d75efeb7Sdjm }
183d75efeb7Sdjm 
184d75efeb7Sdjm int
fido_hid_set_sigmask(void * handle,const fido_sigset_t * sigmask)185*c4a807edSdjm fido_hid_set_sigmask(void *handle, const fido_sigset_t *sigmask)
186739189a3Sdjm {
187*c4a807edSdjm 	struct hid_openbsd *ctx = handle;
188739189a3Sdjm 
189*c4a807edSdjm 	ctx->sigmask = *sigmask;
190*c4a807edSdjm 	ctx->sigmaskp = &ctx->sigmask;
191*c4a807edSdjm 
192*c4a807edSdjm 	return (FIDO_OK);
193739189a3Sdjm }
194739189a3Sdjm 
195739189a3Sdjm int
fido_hid_read(void * handle,unsigned char * buf,size_t len,int ms)19632a20e26Sdjm fido_hid_read(void *handle, unsigned char *buf, size_t len, int ms)
197d75efeb7Sdjm {
198d75efeb7Sdjm 	struct hid_openbsd *ctx = (struct hid_openbsd *)handle;
199d75efeb7Sdjm 	ssize_t r;
200d75efeb7Sdjm 
201d75efeb7Sdjm 	if (len != ctx->report_in_len) {
20232a20e26Sdjm 		fido_log_debug("%s: invalid len: got %zu, want %zu", __func__,
203d75efeb7Sdjm 		    len, ctx->report_in_len);
204d75efeb7Sdjm 		return (-1);
205d75efeb7Sdjm 	}
206*c4a807edSdjm 
207*c4a807edSdjm 	if (fido_hid_unix_wait(ctx->fd, ms, ctx->sigmaskp) < 0) {
208739189a3Sdjm 		fido_log_debug("%s: fd not ready", __func__);
209739189a3Sdjm 		return (-1);
210739189a3Sdjm 	}
211*c4a807edSdjm 
212*c4a807edSdjm 	if ((r = read(ctx->fd, buf, len)) == -1) {
213*c4a807edSdjm 		fido_log_error(errno, "%s: read", __func__);
214d75efeb7Sdjm 		return (-1);
215d75efeb7Sdjm 	}
216*c4a807edSdjm 
217*c4a807edSdjm 	if (r < 0 || (size_t)r != len) {
218*c4a807edSdjm 		fido_log_debug("%s: %zd != %zu", __func__, r, len);
219*c4a807edSdjm 		return (-1);
220*c4a807edSdjm 	}
221*c4a807edSdjm 
222d75efeb7Sdjm 	return ((int)len);
223d75efeb7Sdjm }
224d75efeb7Sdjm 
225d75efeb7Sdjm int
fido_hid_write(void * handle,const unsigned char * buf,size_t len)22632a20e26Sdjm fido_hid_write(void *handle, const unsigned char *buf, size_t len)
227d75efeb7Sdjm {
228d75efeb7Sdjm 	struct hid_openbsd *ctx = (struct hid_openbsd *)handle;
229d75efeb7Sdjm 	ssize_t r;
230d75efeb7Sdjm 
231d75efeb7Sdjm 	if (len != ctx->report_out_len + 1) {
23232a20e26Sdjm 		fido_log_debug("%s: invalid len: got %zu, want %zu", __func__,
233d75efeb7Sdjm 		    len, ctx->report_out_len);
234d75efeb7Sdjm 		return (-1);
235d75efeb7Sdjm 	}
236*c4a807edSdjm 
237*c4a807edSdjm 	if ((r = write(ctx->fd, buf + 1, len - 1)) == -1) {
238*c4a807edSdjm 		fido_log_error(errno, "%s: write", __func__);
239d75efeb7Sdjm 		return (-1);
240d75efeb7Sdjm 	}
241*c4a807edSdjm 
242*c4a807edSdjm 	if (r < 0 || (size_t)r != len - 1) {
243*c4a807edSdjm 		fido_log_debug("%s: %zd != %zu", __func__, r, len - 1);
244*c4a807edSdjm 		return (-1);
245*c4a807edSdjm 	}
246*c4a807edSdjm 
247d75efeb7Sdjm 	return ((int)len);
248d75efeb7Sdjm }
249739189a3Sdjm 
250739189a3Sdjm size_t
fido_hid_report_in_len(void * handle)251739189a3Sdjm fido_hid_report_in_len(void *handle)
252739189a3Sdjm {
253739189a3Sdjm 	struct hid_openbsd *ctx = handle;
254739189a3Sdjm 
255739189a3Sdjm 	return (ctx->report_in_len);
256739189a3Sdjm }
257739189a3Sdjm 
258739189a3Sdjm size_t
fido_hid_report_out_len(void * handle)259739189a3Sdjm fido_hid_report_out_len(void *handle)
260739189a3Sdjm {
261739189a3Sdjm 	struct hid_openbsd *ctx = handle;
262739189a3Sdjm 
263739189a3Sdjm 	return (ctx->report_out_len);
264739189a3Sdjm }
265