19#include <winpr/sysinfo.h>
21#include <freerdp/config.h>
27#include <fido/credman.h>
30#include <winpr/assert.h>
31#include <winpr/endian.h>
32#include <winpr/wlog.h>
34#include <freerdp/channels/log.h>
35#include <freerdp/channels/rdpewa.h>
36#include <freerdp/event.h>
38#include "rdpewa_cbor.h"
39#include "rdpewa_fido.h"
40#include <rdpewa-common.h>
42#include <winpr/thread.h>
43#include <winpr/synch.h>
45#define TAG CHANNELS_TAG("rdpewa.client")
48#define RDPEWA_MAX_DEVICES 64
55 fido_assert_t* assert;
60static void zfree(
char* str)
69static DWORD WINAPI rdpewa_fido_makecred_thread(LPVOID arg)
71 RDPEWA_FIDO_ASYNC* a = (RDPEWA_FIDO_ASYNC*)arg;
72 a->result = fido_dev_make_cred(a->dev, a->cred, a->pin);
76static DWORD WINAPI rdpewa_fido_getassert_thread(LPVOID arg)
78 RDPEWA_FIDO_ASYNC* a = (RDPEWA_FIDO_ASYNC*)arg;
79 a->result = fido_dev_get_assert(a->dev, a->assert, a->pin);
83static bool notify(rdpContext* context, UINT64
id,
bool cancel)
86 UserNotificationEventArgs e = WINPR_C_ARRAY_INIT;
87 EventArgsInit(&e, RDPEWA_CHANNEL_NAME);
91 e.message =
"Touch the security key";
93 e.cancelPreviousNotification = cancel;
96 const int rc = PubSub_OnUserNotification(context->pubSub, context, &e);
100static bool notifyWait(rdpContext* context, HANDLE ft, fido_dev_t* dev)
105 HANDLE hdl[] = { ft, freerdp_abort_event(context) };
106 const UINT64
id = winpr_GetTickCount64NS();
107 (void)notify(context,
id,
false);
108 const DWORD status = WaitForMultipleObjects(ARRAYSIZE(hdl), hdl, FALSE, INFINITE);
110 (void)notify(context,
id,
true);
112 const bool rc = (status == WAIT_OBJECT_0);
114 fido_dev_cancel(dev);
122static int rdpewa_fido_select_device(rdpContext* context, fido_dev_t** devs,
size_t ndevs,
129 for (
size_t i = 0; i < ndevs; i++)
133 int r = fido_dev_get_touch_begin(devs[i]);
135 WLog_DBG(TAG,
"Device %" PRIuz
": fido_dev_get_touch_begin: %s", i, fido_strerr(r));
139 const UINT64
id = winpr_GetTickCount64NS();
140 (void)notify(context,
id,
false);
144 int iterations = timeout_sec * 5;
145 for (
int iter = 0; iter < iterations && selected < 0; iter++)
147 for (
size_t i = 0; i < ndevs; i++)
153 int r = fido_dev_get_touch_status(devs[i], &touched, 200);
154 if (r == FIDO_OK && touched)
156 WLog_DBG(TAG,
"Device %" PRIuz
" was touched", i);
157 selected = WINPR_ASSERTING_INT_CAST(
int, i);
163 (void)notify(context,
id,
true);
170static void rdpewa_fido_fill_device_info(fido_dev_t* dev,
const char* path,
171 const char* manufacturer,
const char* product,
178 .maxSerializedLargeBlobArray = 1024,
179 .providerType =
"Hid",
180 .providerName =
"FreeRDPFidoProvider",
181 .uvStatus = fido_dev_has_pin(dev) ? 1 : 0,
185 strncpy(info->devicePath, path,
sizeof(info->devicePath) - 1);
186 if (manufacturer && manufacturer[0])
187 strncpy(info->manufacturer, manufacturer,
sizeof(info->manufacturer) - 1);
188 if (product && product[0])
189 strncpy(info->product, product,
sizeof(info->product) - 1);
191 fido_cbor_info_t* ci = fido_cbor_info_new();
192 if (ci && fido_dev_get_cbor_info(dev, ci) == FIDO_OK)
194 uint64_t msgsz = fido_cbor_info_maxmsgsiz(ci);
195 if (msgsz > 0 && msgsz <= UINT32_MAX)
196 info->maxMsgSize = (UINT32)msgsz;
198 uint64_t lblob = fido_cbor_info_maxlargeblob(ci);
199 if (lblob > 0 && lblob <= UINT32_MAX)
200 info->maxSerializedLargeBlobArray = (UINT32)lblob;
202 const unsigned char* aaguid = fido_cbor_info_aaguid_ptr(ci);
203 size_t aaguidLen = fido_cbor_info_aaguid_len(ci);
204 if (aaguid && aaguidLen == 16)
205 memcpy(info->aaGuid, aaguid, 16);
207 size_t ntransports = fido_cbor_info_transports_len(ci);
208 char** transports = fido_cbor_info_transports_ptr(ci);
209 for (
size_t i = 0; i < ntransports; i++)
214 if (strcmp(transports[i],
"usb") == 0)
215 info->transports |= 1;
216 else if (strcmp(transports[i],
"nfc") == 0)
217 info->transports |= 2;
218 else if (strcmp(transports[i],
"ble") == 0)
219 info->transports |= 4;
223 fido_cbor_info_free(&ci);
235 WLog_DBG(TAG,
"Enumerating FIDO2 devices...");
237 fido_dev_t* dev =
nullptr;
238 fido_dev_info_t* devlist = fido_dev_info_new(RDPEWA_MAX_DEVICES);
243 int r = fido_dev_info_manifest(devlist, RDPEWA_MAX_DEVICES, &ndevs);
244 if (r != FIDO_OK || ndevs == 0)
246 WLog_WARN(TAG,
"No FIDO2 authenticators found (r=%d, ndevs=%" PRIuz
")", r, ndevs);
247 fido_dev_info_free(&devlist, RDPEWA_MAX_DEVICES);
254 size_t idx = (devIndex >= 0 && (size_t)devIndex < ndevs) ? (size_t)devIndex : 0;
255 const fido_dev_info_t* di = fido_dev_info_ptr(devlist, idx);
256 const char* path = fido_dev_info_path(di);
258 WLog_DBG(TAG,
"Found %" PRIuz
" FIDO2 device(s), opening device %" PRIuz
": '%s'", ndevs, idx,
262 const char* mfr = fido_dev_info_manufacturer_string(di);
263 const char* prod = fido_dev_info_product_string(di);
265 dev = fido_dev_new();
268 fido_dev_info_free(&devlist, RDPEWA_MAX_DEVICES);
272 r = fido_dev_open(dev, path);
275 WLog_ERR(TAG,
"Failed to open FIDO2 device '%s': %s", path, fido_strerr(r));
277 fido_dev_info_free(&devlist, RDPEWA_MAX_DEVICES);
282 rdpewa_fido_fill_device_info(dev, path, mfr, prod, devInfo);
284 fido_dev_info_free(&devlist, RDPEWA_MAX_DEVICES);
293WINPR_ATTR_MALLOC(Stream_Free, 1)
294static
wStream* rdpewa_fido_make_credential(rdpContext* context, const BYTE* ctapData,
295 size_t ctapLen, WINPR_ATTR_UNUSED UINT32 flags)
297 fido_dev_t* dev =
nullptr;
299 fido_cred_t* cred =
nullptr;
302 WINPR_ASSERT(ctapData);
304 struct cbor_load_result result = WINPR_C_ARRAY_INIT;
305 cbor_item_t* root = cbor_load(ctapData, ctapLen, &result);
306 if (!root || !cbor_isa_map(root))
308 WLog_ERR(TAG,
"Invalid CTAP MakeCredential CBOR data");
312 cred = fido_cred_new();
317 fido_cred_set_type(cred, COSE_ES256);
319 const size_t mapSize = cbor_map_size(root);
320 struct cbor_pair* pairs = cbor_map_handle(root);
322 for (
size_t i = 0; i < mapSize; i++)
324 if (!cbor_isa_uint(pairs[i].key))
327 uint64_t k = cbor_get_int(pairs[i].key);
328 cbor_item_t* v = pairs[i].value;
332 case CTAP_MAKECRED_CLIENT_DATA_HASH:
333 if (cbor_isa_bytestring(v))
334 fido_cred_set_clientdata_hash(cred, cbor_bytestring_handle(v),
335 cbor_bytestring_length(v));
338 case CTAP_MAKECRED_RP:
341 char* rpId =
nullptr;
342 char* rpName =
nullptr;
343 const size_t rpSize = cbor_map_size(v);
344 struct cbor_pair* rpPairs = cbor_map_handle(v);
346 for (
size_t j = 0; j < rpSize; j++)
348 if (!cbor_isa_string(rpPairs[j].key))
351 const char* rk = (
const char*)cbor_string_handle(rpPairs[j].key);
352 size_t rkl = cbor_string_length(rpPairs[j].key);
353 if (rkl == 2 && memcmp(rk,
"id", 2) == 0 &&
354 cbor_isa_string(rpPairs[j].value))
357 rpId = strndup((
const char*)cbor_string_handle(rpPairs[j].value),
358 cbor_string_length(rpPairs[j].value));
360 else if (rkl == 4 && memcmp(rk,
"name", 4) == 0 &&
361 cbor_isa_string(rpPairs[j].value))
364 rpName = strndup((
const char*)cbor_string_handle(rpPairs[j].value),
365 cbor_string_length(rpPairs[j].value));
370 fido_cred_set_rp(cred, rpId, rpName);
377 case CTAP_MAKECRED_USER:
380 const unsigned char* userId =
nullptr;
381 size_t userIdLen = 0;
382 char* userName =
nullptr;
383 char* userDisplayName =
nullptr;
384 const size_t uSize = cbor_map_size(v);
385 struct cbor_pair* uPairs = cbor_map_handle(v);
387 for (
size_t j = 0; j < uSize; j++)
389 if (!cbor_isa_string(uPairs[j].key))
392 const char* uk = (
const char*)cbor_string_handle(uPairs[j].key);
393 size_t ukl = cbor_string_length(uPairs[j].key);
394 if (ukl == 2 && memcmp(uk,
"id", 2) == 0 &&
395 cbor_isa_bytestring(uPairs[j].value))
397 userId = cbor_bytestring_handle(uPairs[j].value);
398 userIdLen = cbor_bytestring_length(uPairs[j].value);
400 else if (ukl == 4 && memcmp(uk,
"name", 4) == 0 &&
401 cbor_isa_string(uPairs[j].value))
404 userName = strndup((
const char*)cbor_string_handle(uPairs[j].value),
405 cbor_string_length(uPairs[j].value));
407 else if (ukl == 11 && memcmp(uk,
"displayName", 11) == 0 &&
408 cbor_isa_string(uPairs[j].value))
410 free(userDisplayName);
412 strndup((
const char*)cbor_string_handle(uPairs[j].value),
413 cbor_string_length(uPairs[j].value));
417 if (userId && userIdLen > 0)
418 fido_cred_set_user(cred, userId, userIdLen, userName, userDisplayName,
422 free(userDisplayName);
426 case CTAP_MAKECRED_PUB_KEY_CRED_PARAMS:
427 if (cbor_isa_array(v) && cbor_array_size(v) > 0)
429 cbor_item_t* first = cbor_array_get(v, 0);
431 if (first && cbor_isa_map(first))
433 const size_t pSize = cbor_map_size(first);
434 struct cbor_pair* pPairs = cbor_map_handle(first);
436 for (
size_t j = 0; j < pSize; j++)
438 if (!cbor_isa_string(pPairs[j].key))
441 const char* pk = (
const char*)cbor_string_handle(pPairs[j].key);
442 if (cbor_string_length(pPairs[j].key) == 3 &&
443 memcmp(pk,
"alg", 3) == 0 && cbor_is_int(pPairs[j].value))
446 WINPR_ASSERTING_INT_CAST(
int, cbor_get_int(pPairs[j].value));
447 if (cbor_isa_negint(pPairs[j].value))
449 fido_cred_set_type(cred, alg);
459 case CTAP_MAKECRED_EXCLUDE_LIST:
460 if (cbor_isa_array(v))
462 for (
size_t j = 0; j < cbor_array_size(v); j++)
464 cbor_item_t* credDesc = cbor_array_get(v, j);
465 if (credDesc && cbor_isa_map(credDesc))
467 const size_t cdSize = cbor_map_size(credDesc);
468 struct cbor_pair* cdPairs = cbor_map_handle(credDesc);
470 for (
size_t m = 0; m < cdSize; m++)
472 if (!cbor_isa_string(cdPairs[m].key))
475 const char* ck = (
const char*)cbor_string_handle(cdPairs[m].key);
476 if (cbor_string_length(cdPairs[m].key) == 2 &&
477 memcmp(ck,
"id", 2) == 0 &&
478 cbor_isa_bytestring(cdPairs[m].value))
480 fido_cred_exclude(cred,
481 cbor_bytestring_handle(cdPairs[m].value),
482 cbor_bytestring_length(cdPairs[m].value));
488 cbor_decref(&credDesc);
493 case CTAP_MAKECRED_OPTIONS:
496 const size_t oSize = cbor_map_size(v);
497 struct cbor_pair* oPairs = cbor_map_handle(v);
499 for (
size_t j = 0; j < oSize; j++)
501 if (!cbor_isa_string(oPairs[j].key))
504 const char* ok = (
const char*)cbor_string_handle(oPairs[j].key);
505 size_t okl = cbor_string_length(oPairs[j].key);
506 if (okl == 2 && memcmp(ok,
"rk", 2) == 0 &&
507 cbor_isa_float_ctrl(oPairs[j].value))
509 if (cbor_get_bool(oPairs[j].value))
510 fido_cred_set_rk(cred, FIDO_OPT_TRUE);
523 dev = rdpewa_fido_open_device(&devInfo, 0, &ndevs);
526 ret = rdpewa_cbor_encode_webauthn_response(E_FAIL, 0x01,
nullptr, 0, &devInfo);
530 int r = FIDO_ERR_INTERNAL;
534 fido_dev_t** devs = (fido_dev_t**)calloc(ndevs,
sizeof(*devs));
536 if (!devs || !devInfos)
540 ret = rdpewa_cbor_encode_webauthn_response(E_FAIL, 0x01,
nullptr, 0, &devInfo);
544 devInfos[0] = devInfo;
546 for (
size_t i = 1; i < ndevs; i++)
547 devs[i] = rdpewa_fido_open_device(&devInfos[i], (
int)i,
nullptr);
549 int sel = rdpewa_fido_select_device(context, devs, ndevs, 30);
553 devInfo = devInfos[sel];
559 for (
size_t i = 0; i < ndevs; i++)
561 if (devs[i] && (
int)i != sel)
563 fido_dev_cancel(devs[i]);
564 fido_dev_close(devs[i]);
565 fido_dev_free(&devs[i]);
574 ret = rdpewa_cbor_encode_webauthn_response(E_FAIL, 0x01,
nullptr, 0, &devInfo);
581 if (fido_dev_has_pin(dev))
583 freerdp* instance = context->instance;
587 if (!instance || !instance->AuthenticateEx ||
588 !instance->AuthenticateEx(instance, &u, &p, &d, AUTH_FIDO_PIN) || !p)
593 ret = rdpewa_cbor_encode_webauthn_response(E_FAIL, 0x01,
nullptr, 0, &devInfo);
602 RDPEWA_FIDO_ASYNC fta = { dev, cred,
nullptr, pin, FIDO_ERR_INTERNAL };
603 HANDLE ft = CreateThread(
nullptr, 0, rdpewa_fido_makecred_thread, &fta, 0,
nullptr);
604 if (!notifyWait(context, ft, dev))
616 WLog_ERR(TAG,
"fido_dev_make_cred failed: %s", fido_strerr(r));
617 ret = rdpewa_cbor_encode_webauthn_response(E_FAIL, 0x01,
nullptr, 0, &devInfo);
623 cbor_item_t* respMap = cbor_new_definite_map(3);
628 cbor_item_t* fmtKey = cbor_build_uint8(1);
629 const char* fmt = fido_cred_fmt(cred);
630 cbor_item_t* fmtVal = cbor_build_string(fmt ? fmt :
"none");
631 if (!cbor_map_add(respMap, (
struct cbor_pair){ .key = fmtKey, .value = fmtVal }))
633 cbor_decref(&fmtKey);
634 cbor_decref(&fmtVal);
635 cbor_decref(&respMap);
638 cbor_decref(&fmtKey);
639 cbor_decref(&fmtVal);
642 cbor_item_t* adKey = cbor_build_uint8(2);
644 cbor_build_bytestring(fido_cred_authdata_raw_ptr(cred), fido_cred_authdata_raw_len(cred));
645 if (!cbor_map_add(respMap, (
struct cbor_pair){ .key = adKey, .value = adVal }))
649 cbor_decref(&respMap);
657 const unsigned char* rawAttStmt = fido_cred_attstmt_ptr(cred);
658 size_t rawAttStmtLen = fido_cred_attstmt_len(cred);
659 if (rawAttStmt && rawAttStmtLen > 0)
662 struct cbor_load_result attResult = WINPR_C_ARRAY_INIT;
663 cbor_item_t* asKey = cbor_build_uint8(3);
664 cbor_item_t* asVal = cbor_load(rawAttStmt, rawAttStmtLen, &attResult);
665 if (!asVal || attResult.error.code != CBOR_ERR_NONE)
667 WLog_ERR(TAG,
"Failed to parse raw attStmt CBOR");
671 cbor_decref(&respMap);
675 if (!cbor_map_add(respMap, (
struct cbor_pair){ .key = asKey, .value = asVal }))
679 cbor_decref(&respMap);
689 cbor_item_t* asKey = cbor_build_uint8(3);
690 cbor_item_t* asVal = cbor_new_definite_map(0);
691 if (!cbor_map_add(respMap, (
struct cbor_pair){ .key = asKey, .value = asVal }))
695 cbor_decref(&respMap);
703 unsigned char* ctapBuf =
nullptr;
704 size_t ctapBufLen = 0;
705 ctapBufLen = cbor_serialize_alloc(respMap, &ctapBuf, &ctapBufLen);
706 cbor_decref(&respMap);
708 if (ctapBufLen == 0 || !ctapBuf)
711 ret = rdpewa_cbor_encode_webauthn_response(S_OK, 0x00, ctapBuf, ctapBufLen, &devInfo);
718 fido_cred_free(&cred);
730WINPR_ATTR_MALLOC(Stream_Free, 1)
731static
wStream* rdpewa_fido_get_assertion(rdpContext* context, const BYTE* ctapData,
size_t ctapLen,
732 WINPR_ATTR_UNUSED UINT32 flags)
734 fido_dev_t* dev =
nullptr;
736 fido_assert_t* assert =
nullptr;
739 WINPR_ASSERT(ctapData);
741 struct cbor_load_result result = WINPR_C_ARRAY_INIT;
742 cbor_item_t* root = cbor_load(ctapData, ctapLen, &result);
743 if (!root || !cbor_isa_map(root))
745 WLog_ERR(TAG,
"Invalid CTAP GetAssertion CBOR data");
749 assert = fido_assert_new();
753 const size_t mapSize = cbor_map_size(root);
754 struct cbor_pair* pairs = cbor_map_handle(root);
756 for (
size_t i = 0; i < mapSize; i++)
758 if (!cbor_isa_uint(pairs[i].key))
761 uint64_t k = cbor_get_int(pairs[i].key);
762 cbor_item_t* v = pairs[i].value;
766 case CTAP_GETASSERT_RP_ID:
767 if (cbor_isa_string(v))
769 char* rpId = strndup((
const char*)cbor_string_handle(v), cbor_string_length(v));
772 fido_assert_set_rp(assert, rpId);
778 case CTAP_GETASSERT_CLIENT_DATA_HASH:
779 if (cbor_isa_bytestring(v))
780 fido_assert_set_clientdata_hash(assert, cbor_bytestring_handle(v),
781 cbor_bytestring_length(v));
784 case CTAP_GETASSERT_ALLOW_LIST:
785 if (cbor_isa_array(v))
787 for (
size_t j = 0; j < cbor_array_size(v); j++)
789 cbor_item_t* credDesc = cbor_array_get(v, j);
790 if (credDesc && cbor_isa_map(credDesc))
792 const size_t cdSize = cbor_map_size(credDesc);
793 struct cbor_pair* cdPairs = cbor_map_handle(credDesc);
795 for (
size_t m = 0; m < cdSize; m++)
797 if (!cbor_isa_string(cdPairs[m].key))
800 const char* ck = (
const char*)cbor_string_handle(cdPairs[m].key);
801 if (cbor_string_length(cdPairs[m].key) == 2 &&
802 memcmp(ck,
"id", 2) == 0 &&
803 cbor_isa_bytestring(cdPairs[m].value))
805 fido_assert_allow_cred(
806 assert, cbor_bytestring_handle(cdPairs[m].value),
807 cbor_bytestring_length(cdPairs[m].value));
813 cbor_decref(&credDesc);
818 case CTAP_GETASSERT_OPTIONS:
821 const size_t oSize = cbor_map_size(v);
822 struct cbor_pair* oPairs = cbor_map_handle(v);
824 for (
size_t j = 0; j < oSize; j++)
826 if (!cbor_isa_string(oPairs[j].key))
829 const char* ok = (
const char*)cbor_string_handle(oPairs[j].key);
830 size_t okl = cbor_string_length(oPairs[j].key);
831 if (okl == 2 && memcmp(ok,
"up", 2) == 0 &&
832 cbor_isa_float_ctrl(oPairs[j].value))
834 fido_assert_set_up(assert, cbor_get_bool(oPairs[j].value)
849 int r = FIDO_ERR_NO_CREDENTIALS;
850 dev = rdpewa_fido_open_device(&devInfo, 0, &ndevs);
853 ret = rdpewa_cbor_encode_webauthn_response(E_FAIL, 0x01,
nullptr, 0, &devInfo);
859 fido_dev_t** devs = (fido_dev_t**)calloc(ndevs,
sizeof(*devs));
861 if (!devs || !devInfos)
865 ret = rdpewa_cbor_encode_webauthn_response(E_FAIL, 0x01,
nullptr, 0, &devInfo);
870 devInfos[0] = devInfo;
871 for (
size_t i = 1; i < ndevs; i++)
872 devs[i] = rdpewa_fido_open_device(&devInfos[i], (
int)i,
nullptr);
874 int sel = rdpewa_fido_select_device(context, devs, ndevs, 30);
878 devInfo = devInfos[sel];
884 for (
size_t i = 0; i < ndevs; i++)
886 if (devs[i] && (
int)i != sel)
888 fido_dev_cancel(devs[i]);
889 fido_dev_close(devs[i]);
890 fido_dev_free(&devs[i]);
899 ret = rdpewa_cbor_encode_webauthn_response(E_FAIL, 0x01,
nullptr, 0, &devInfo);
906 if (fido_dev_has_pin(dev))
908 freerdp* instance = context->instance;
912 if (!instance || !instance->AuthenticateEx ||
913 !instance->AuthenticateEx(instance, &u, &p, &d, AUTH_FIDO_PIN) || !p)
918 ret = rdpewa_cbor_encode_webauthn_response(E_FAIL, 0x01,
nullptr, 0, &devInfo);
927 RDPEWA_FIDO_ASYNC fta = { dev,
nullptr, assert, pin, FIDO_ERR_INTERNAL };
928 HANDLE ft = CreateThread(
nullptr, 0, rdpewa_fido_getassert_thread, &fta, 0,
nullptr);
929 if (!notifyWait(context, ft, dev))
941 WLog_ERR(TAG,
"fido_dev_get_assert failed: %s", fido_strerr(r));
942 ret = rdpewa_cbor_encode_webauthn_response(E_FAIL, 0x01,
nullptr, 0, &devInfo);
946 if (fido_assert_count(assert) == 0)
948 ret = rdpewa_cbor_encode_webauthn_response(E_FAIL, 0x01,
nullptr, 0, &devInfo);
954 if (fido_assert_user_id_len(assert, 0) > 0)
956 cbor_item_t* respMap = cbor_new_definite_map(nkeys);
961 if (fido_assert_id_len(assert, 0) > 0)
963 cbor_item_t* credKey = cbor_build_uint8(1);
964 cbor_item_t* credMap = cbor_new_definite_map(2);
965 cbor_item_t* cidKey = cbor_build_string(
"id");
966 cbor_item_t* cidVal =
967 cbor_build_bytestring(fido_assert_id_ptr(assert, 0), fido_assert_id_len(assert, 0));
968 cbor_item_t* ctypeKey = cbor_build_string(
"type");
969 cbor_item_t* ctypeVal = cbor_build_string(
"public-key");
971 if (!cbor_map_add(credMap, (
struct cbor_pair){ .key = cidKey, .value = cidVal }) ||
972 !cbor_map_add(credMap, (
struct cbor_pair){ .key = ctypeKey, .value = ctypeVal }) ||
973 !cbor_map_add(respMap, (
struct cbor_pair){ .key = credKey, .value = credMap }))
975 cbor_decref(&cidKey);
976 cbor_decref(&cidVal);
977 cbor_decref(&ctypeKey);
978 cbor_decref(&ctypeVal);
979 cbor_decref(&credKey);
980 cbor_decref(&credMap);
981 cbor_decref(&respMap);
985 cbor_decref(&cidKey);
986 cbor_decref(&cidVal);
987 cbor_decref(&ctypeKey);
988 cbor_decref(&ctypeVal);
989 cbor_decref(&credKey);
990 cbor_decref(&credMap);
994 cbor_item_t* adKey = cbor_build_uint8(2);
995 cbor_item_t* adVal = cbor_build_bytestring(fido_assert_authdata_raw_ptr(assert, 0),
996 fido_assert_authdata_raw_len(assert, 0));
997 if (!cbor_map_add(respMap, (
struct cbor_pair){ .key = adKey, .value = adVal }))
1000 cbor_decref(&adVal);
1001 cbor_decref(&respMap);
1004 cbor_decref(&adKey);
1005 cbor_decref(&adVal);
1008 cbor_item_t* sigKey = cbor_build_uint8(3);
1009 cbor_item_t* sigVal =
1010 cbor_build_bytestring(fido_assert_sig_ptr(assert, 0), fido_assert_sig_len(assert, 0));
1011 if (!cbor_map_add(respMap, (
struct cbor_pair){ .key = sigKey, .value = sigVal }))
1013 cbor_decref(&sigKey);
1014 cbor_decref(&sigVal);
1015 cbor_decref(&respMap);
1018 cbor_decref(&sigKey);
1019 cbor_decref(&sigVal);
1022 if (fido_assert_user_id_len(assert, 0) > 0)
1024 cbor_item_t* uKey = cbor_build_uint8(4);
1025 cbor_item_t* uMap = cbor_new_definite_map(1);
1026 cbor_item_t* uidKey = cbor_build_string(
"id");
1027 cbor_item_t* uidVal = cbor_build_bytestring(fido_assert_user_id_ptr(assert, 0),
1028 fido_assert_user_id_len(assert, 0));
1030 if (!cbor_map_add(uMap, (
struct cbor_pair){ .key = uidKey, .value = uidVal }))
1032 cbor_decref(&uidKey);
1033 cbor_decref(&uidVal);
1036 cbor_decref(&respMap);
1039 cbor_decref(&uidKey);
1040 cbor_decref(&uidVal);
1042 if (!cbor_map_add(respMap, (
struct cbor_pair){ .key = uKey, .value = uMap }))
1046 cbor_decref(&respMap);
1053 unsigned char* ctapBuf =
nullptr;
1054 size_t ctapBufLen = 0;
1055 ctapBufLen = cbor_serialize_alloc(respMap, &ctapBuf, &ctapBufLen);
1056 cbor_decref(&respMap);
1058 if (ctapBufLen == 0 || !ctapBuf)
1061 ret = rdpewa_cbor_encode_webauthn_response(S_OK, 0x00, ctapBuf, ctapBufLen, &devInfo);
1068 fido_assert_free(&assert);
1071 fido_dev_close(dev);
1072 fido_dev_free(&dev);
1079 WINPR_ASSERT(request);
1081 if (!request->request || request->requestLen < 1)
1083 WLog_ERR(TAG,
"Empty request payload for WEB_AUTHN command");
1087 BYTE subCommand = request->request[0];
1088 const BYTE* ctapData = request->request + 1;
1089 size_t ctapLen = request->requestLen - 1;
1091 WLog_DBG(TAG,
"WebAuthn sub-command 0x%02" PRIx8
" ctapLen=%" PRIuz, subCommand, ctapLen);
1095 case CTAPCBOR_CMD_MAKE_CREDENTIAL:
1096 return rdpewa_fido_make_credential(context, ctapData, ctapLen, request->flags);
1098 case CTAPCBOR_CMD_GET_ASSERTION:
1099 return rdpewa_fido_get_assertion(context, ctapData, ctapLen, request->flags);
1102 WLog_ERR(TAG,
"Unknown WebAuthn sub-command 0x%02" PRIx8, subCommand);
1107wStream* rdpewa_fido_is_uvpaa(
void)
1109 WLog_DBG(TAG,
"IUVPAA: checking for platform authenticators");
1111 fido_dev_info_t* devlist = fido_dev_info_new(RDPEWA_MAX_DEVICES);
1113 return rdpewa_cbor_encode_simple_response(S_OK, 0);
1116 int r = fido_dev_info_manifest(devlist, RDPEWA_MAX_DEVICES, &ndevs);
1117 fido_dev_info_free(&devlist, RDPEWA_MAX_DEVICES);
1120 UINT32 available = (r == FIDO_OK && ndevs > 0) ? 1 : 0;
1121 WLog_DBG(TAG,
"IUVPAA: ndevs=%" PRIuz
" available=%" PRIu32, ndevs, available);
1122 return rdpewa_cbor_encode_simple_response(S_OK, available);
1125wStream* rdpewa_fido_api_version(
void)
1127 WLog_DBG(TAG,
"API_VERSION: reporting version 4");
1130 return rdpewa_cbor_encode_simple_response(S_OK, 4);
1133wStream* rdpewa_fido_get_authenticator_list(
void)
1135 WLog_DBG(TAG,
"GET_AUTHENTICATOR_LIST: enumerating authenticators");
1137 fido_dev_info_t* devlist = fido_dev_info_new(RDPEWA_MAX_DEVICES);
1139 return rdpewa_cbor_encode_hresult_response(S_OK);
1142 int r = fido_dev_info_manifest(devlist, RDPEWA_MAX_DEVICES, &ndevs);
1143 if (r != FIDO_OK || ndevs == 0)
1145 fido_dev_info_free(&devlist, RDPEWA_MAX_DEVICES);
1146 return rdpewa_cbor_encode_hresult_response(S_OK);
1150 cbor_item_t* arr = cbor_new_definite_array(ndevs);
1153 fido_dev_info_free(&devlist, RDPEWA_MAX_DEVICES);
1157 for (
size_t i = 0; i < ndevs; i++)
1159 const fido_dev_info_t* di = fido_dev_info_ptr(devlist, i);
1160 cbor_item_t* entry = cbor_new_definite_map(4);
1165 cbor_item_t* k1 = cbor_build_uint8(1);
1166 cbor_item_t* v1 = cbor_build_uint8(1);
1167 if (!cbor_map_add(entry, (
struct cbor_pair){ .key = k1, .value = v1 }))
1171 cbor_decref(&entry);
1178 const char* prod = fido_dev_info_product_string(di);
1179 cbor_item_t* k3 = cbor_build_uint8(3);
1180 cbor_item_t* v3 = cbor_build_string(prod ? prod :
"FIDO2 Key");
1181 if (!cbor_map_add(entry, (
struct cbor_pair){ .key = k3, .value = v3 }))
1185 cbor_decref(&entry);
1192 cbor_item_t* k4 = cbor_build_uint8(4);
1193 cbor_item_t* v4 = cbor_build_bytestring(
nullptr, 0);
1194 if (!cbor_map_add(entry, (
struct cbor_pair){ .key = k4, .value = v4 }))
1198 cbor_decref(&entry);
1205 cbor_item_t* k5 = cbor_build_uint8(5);
1206 cbor_item_t* v5 = cbor_build_bool(
false);
1207 if (!cbor_map_add(entry, (
struct cbor_pair){ .key = k5, .value = v5 }))
1211 cbor_decref(&entry);
1217 if (!cbor_array_push(arr, entry))
1219 cbor_decref(&entry);
1222 cbor_decref(&entry);
1225 fido_dev_info_free(&devlist, RDPEWA_MAX_DEVICES);
1227 size_t cborLen = cbor_serialized_size(arr);
1235 wStream* s = Stream_New(
nullptr, 4 + cborLen);
1242 Stream_Write_UINT32(s, (UINT32)S_OK);
1243 if (cbor_serialize(arr, Stream_Pointer(s), cborLen) == 0)
1246 Stream_Free(s, TRUE);
1249 Stream_Seek(s, cborLen);
1254wStream* rdpewa_fido_get_credentials(rdpContext* context,
const char* rpId)
1256 WINPR_UNUSED(context);
1258 if (!rpId || !rpId[0])
1260 WLog_WARN(TAG,
"GET_CREDENTIALS: no rpId provided");
1261 return rdpewa_cbor_encode_hresult_response(S_OK);
1264 WLog_DBG(TAG,
"GET_CREDENTIALS: querying credentials for rpId '%s'", rpId);
1269 fido_dev_t* dev = rdpewa_fido_open_device(&devInfo, 0, &ndevs);
1271 return rdpewa_cbor_encode_hresult_response(S_OK);
1273 cbor_item_t* arr = cbor_new_definite_array(0);
1276 fido_dev_close(dev);
1277 fido_dev_free(&dev);
1281 for (
size_t devIdx = 0; devIdx < ndevs; devIdx++)
1285 fido_dev_close(dev);
1286 fido_dev_free(&dev);
1287 dev = rdpewa_fido_open_device(&devInfo, (
int)devIdx,
nullptr);
1292 if (!fido_dev_supports_credman(dev))
1295 "GET_CREDENTIALS: device %" PRIuz
" does not support credential management",
1305 if (fido_dev_has_pin(dev))
1307 WLog_DBG(TAG,
"GET_CREDENTIALS: device %" PRIuz
" requires PIN, skipping", devIdx);
1311 const char* pin =
nullptr;
1313 fido_credman_rk_t* rk = fido_credman_rk_new();
1317 int r = fido_credman_get_dev_rk(dev, rpId, rk, pin);
1320 WLog_DBG(TAG,
"GET_CREDENTIALS: device %" PRIuz
": %s", devIdx, fido_strerr(r));
1321 fido_credman_rk_free(&rk);
1325 size_t ncreds = fido_credman_rk_count(rk);
1326 WLog_DBG(TAG,
"GET_CREDENTIALS: device %" PRIuz
": found %" PRIuz
" credentials", devIdx,
1329 for (
size_t i = 0; i < ncreds; i++)
1331 const fido_cred_t* cred = fido_credman_rk(rk, i);
1335 cbor_item_t* entry = cbor_new_definite_map(4);
1339 cbor_item_t* k0 = cbor_build_uint8(0);
1340 cbor_item_t* v0 = cbor_build_uint8(4);
1341 if (!cbor_map_add(entry, (
struct cbor_pair){ .key = k0, .value = v0 }))
1345 cbor_decref(&entry);
1351 cbor_item_t* k1 = cbor_build_uint8(1);
1352 cbor_item_t* v1 = cbor_build_bytestring(fido_cred_id_ptr(cred), fido_cred_id_len(cred));
1353 if (!cbor_map_add(entry, (
struct cbor_pair){ .key = k1, .value = v1 }))
1357 cbor_decref(&entry);
1363 cbor_item_t* k2 = cbor_build_uint8(2);
1364 cbor_item_t* rpMap = cbor_new_definite_map(1);
1366 cbor_item_t* rk2 = cbor_build_string(
"id");
1367 cbor_item_t* rv2 = cbor_build_string(rpId);
1368 if (!cbor_map_add(rpMap, (
struct cbor_pair){ .key = rk2, .value = rv2 }))
1373 cbor_decref(&rpMap);
1374 cbor_decref(&entry);
1381 if (!cbor_map_add(entry, (
struct cbor_pair){ .key = k2, .value = rpMap }))
1384 cbor_decref(&rpMap);
1385 cbor_decref(&entry);
1389 cbor_decref(&rpMap);
1391 cbor_item_t* k3 = cbor_build_uint8(3);
1392 cbor_item_t* userMap = cbor_new_definite_map(2);
1394 cbor_item_t* uk = cbor_build_string(
"id");
1396 cbor_build_bytestring(fido_cred_user_id_ptr(cred), fido_cred_user_id_len(cred));
1397 if (!cbor_map_add(userMap, (
struct cbor_pair){ .key = uk, .value = uv }))
1402 cbor_decref(&userMap);
1403 cbor_decref(&entry);
1409 const char* uname = fido_cred_user_name(cred);
1412 cbor_item_t* unk = cbor_build_string(
"name");
1413 cbor_item_t* unv = cbor_build_string(uname);
1414 if (!cbor_map_add(userMap, (
struct cbor_pair){ .key = unk, .value = unv }))
1419 cbor_decref(&userMap);
1420 cbor_decref(&entry);
1428 if (!cbor_map_add(entry, (
struct cbor_pair){ .key = k3, .value = userMap }))
1431 cbor_decref(&userMap);
1432 cbor_decref(&entry);
1436 cbor_decref(&userMap);
1438 if (!cbor_array_push(arr, entry))
1440 cbor_decref(&entry);
1443 cbor_decref(&entry);
1446 fido_credman_rk_free(&rk);
1451 fido_dev_close(dev);
1452 fido_dev_free(&dev);
1455 size_t cborLen = cbor_serialized_size(arr);
1462 wStream* s = Stream_New(
nullptr, 4 + cborLen);
1469 Stream_Write_UINT32(s, (UINT32)S_OK);
1470 if (cbor_serialize(arr, Stream_Pointer(s), cborLen) == 0)
1473 Stream_Free(s, TRUE);
1476 Stream_Seek(s, cborLen);
Device info for the response map.
Decoded MS-RDPEWA request message.