pkgsrc-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[pkgsrc/trunk]: pkgsrc/security/libfido2 security/libfido2: Restore NetBSD su...
details: https://anonhg.NetBSD.org/pkgsrc/rev/2da4e8c82413
branches: trunk
changeset: 442187:2da4e8c82413
user: riastradh <riastradh%pkgsrc.org@localhost>
date: Fri Nov 20 05:55:02 2020 +0000
description:
security/libfido2: Restore NetBSD support.
diffstat:
security/libfido2/Makefile | 3 +-
security/libfido2/distinfo | 5 +-
security/libfido2/patches/patch-src_CMakeLists.txt | 4 +-
security/libfido2/patches/patch-src_hid__netbsd.c | 430 +++++++++++++++++++++
4 files changed, 437 insertions(+), 5 deletions(-)
diffs (truncated from 478 to 300 lines):
diff -r c82fc5cfd1c4 -r 2da4e8c82413 security/libfido2/Makefile
--- a/security/libfido2/Makefile Thu Nov 19 20:19:56 2020 +0000
+++ b/security/libfido2/Makefile Fri Nov 20 05:55:02 2020 +0000
@@ -1,6 +1,7 @@
-# $NetBSD: Makefile,v 1.2 2020/10/22 20:29:44 tnn Exp $
+# $NetBSD: Makefile,v 1.3 2020/11/20 05:55:02 riastradh Exp $
DISTNAME= libfido2-1.5.0
+PKGREVISION= 1
CATEGORIES= security devel
MASTER_SITES= ${MASTER_SITE_GITHUB:=Yubico/}
GITHUB_PROJECT= ${PKGBASE}
diff -r c82fc5cfd1c4 -r 2da4e8c82413 security/libfido2/distinfo
--- a/security/libfido2/distinfo Thu Nov 19 20:19:56 2020 +0000
+++ b/security/libfido2/distinfo Fri Nov 20 05:55:02 2020 +0000
@@ -1,7 +1,8 @@
-$NetBSD: distinfo,v 1.2 2020/10/22 20:29:44 tnn Exp $
+$NetBSD: distinfo,v 1.3 2020/11/20 05:55:02 riastradh Exp $
SHA1 (libfido2-1.5.0.tar.gz) = 555893f22e3031cd766058767c17c725350c814c
RMD160 (libfido2-1.5.0.tar.gz) = f7f714ed5899c6bf764e172f3c62d0a7f0134059
SHA512 (libfido2-1.5.0.tar.gz) = 240e2368e43846fddf5e98bbcc247468833565bcde4ec27976b88c814d787f1a477241a82b064818aa0eb0a98ff46a65d80b8243f4d0bbd763270e42492354e2
Size (libfido2-1.5.0.tar.gz) = 407259 bytes
-SHA1 (patch-src_CMakeLists.txt) = 071e20b297758b34ab0785fa8ccfabe354c37281
+SHA1 (patch-src_CMakeLists.txt) = ebc7243648b1026f01b4d8ba3572425d7f75264c
+SHA1 (patch-src_hid__netbsd.c) = 7bfc4d66d3046e5fea591a9d79516eb72b479625
diff -r c82fc5cfd1c4 -r 2da4e8c82413 security/libfido2/patches/patch-src_CMakeLists.txt
--- a/security/libfido2/patches/patch-src_CMakeLists.txt Thu Nov 19 20:19:56 2020 +0000
+++ b/security/libfido2/patches/patch-src_CMakeLists.txt Fri Nov 20 05:55:02 2020 +0000
@@ -1,4 +1,4 @@
-$NetBSD: patch-src_CMakeLists.txt,v 1.2 2020/10/22 20:29:44 tnn Exp $
+$NetBSD: patch-src_CMakeLists.txt,v 1.3 2020/11/20 05:55:02 riastradh Exp $
Add NetBSD support -- same USB HID API as OpenBSD.
@@ -9,7 +9,7 @@
elseif(CMAKE_SYSTEM_NAME STREQUAL "Linux")
list(APPEND FIDO_SOURCES hid_linux.c)
+elseif(CMAKE_SYSTEM_NAME STREQUAL "NetBSD")
-+ list(APPEND FIDO_SOURCES hid_openbsd.c)
++ list(APPEND FIDO_SOURCES hid_netbsd.c)
elseif(CMAKE_SYSTEM_NAME STREQUAL "OpenBSD")
list(APPEND FIDO_SOURCES hid_openbsd.c)
else()
diff -r c82fc5cfd1c4 -r 2da4e8c82413 security/libfido2/patches/patch-src_hid__netbsd.c
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/security/libfido2/patches/patch-src_hid__netbsd.c Fri Nov 20 05:55:02 2020 +0000
@@ -0,0 +1,430 @@
+$NetBSD: patch-src_hid__netbsd.c,v 1.1 2020/11/20 05:55:02 riastradh Exp $
+
+Add NetBSD support.
+
+--- src/hid_netbsd.c.orig 2020-11-20 05:15:48.453959989 +0000
++++ src/hid_netbsd.c
+@@ -0,0 +1,423 @@
++/*
++ * Copyright (c) 2020 Yubico AB. All rights reserved.
++ * Use of this source code is governed by a BSD-style
++ * license that can be found in the LICENSE file.
++ */
++
++#include <sys/types.h>
++#include <sys/ioctl.h>
++
++#include <dev/usb/usb.h>
++#include <dev/usb/usbhid.h>
++
++#include <errno.h>
++#include <fcntl.h>
++#include <poll.h>
++#include <stdbool.h>
++#include <stdio.h>
++#include <stdlib.h>
++#include <string.h>
++#include <unistd.h>
++#include <usbhid.h>
++
++#include "fido.h"
++
++#define MAX_UHID 64
++
++struct hid_netbsd {
++ int fd;
++ size_t report_in_len;
++ size_t report_out_len;
++};
++
++/* Hack to make this work with newer kernels even if /usr/include is old. */
++#if __NetBSD_Version__ < 901000000 /* 9.1 */
++#define USB_HID_GET_RAW _IOR('h', 1, int)
++#define USB_HID_SET_RAW _IOW('h', 2, int)
++#endif
++
++static bool
++is_fido(int fd)
++{
++ report_desc_t rdesc;
++ hid_data_t hdata;
++ hid_item_t hitem;
++ bool isfido;
++ int raw = 1;
++
++ if ((rdesc = hid_get_report_desc(fd)) == NULL) {
++ fido_log_debug("%s: failed to get report descriptor",
++ __func__);
++ return (false);
++ }
++ if ((hdata = hid_start_parse(rdesc, 1 << hid_collection, -1))
++ == NULL) {
++ fido_log_debug("%s: failed to parse report descriptor",
++ __func__);
++ hid_dispose_report_desc(rdesc);
++ return (false);
++ }
++ isfido = false;
++ while ((hid_get_item(hdata, &hitem)) > 0) {
++ if (HID_PAGE(hitem.usage) == 0xf1d0) {
++ isfido = true;
++ break;
++ }
++ }
++ hid_end_parse(hdata);
++ hid_dispose_report_desc(rdesc);
++ if (!isfido)
++ return (false);
++
++ /*
++ * This step is not strictly necessary -- NetBSD puts fido
++ * devices into raw mode automatically by default, but in
++ * principle that might change, and this serves as a test to
++ * verify that we're running on a kernel with support for raw
++ * mode at all so we don't get confused issuing writes that try
++ * to set the report descriptor rather than transfer data on
++ * the output interrupt pipe as we need.
++ */
++ if (ioctl(fd, USB_HID_SET_RAW, &raw) == -1) {
++ fido_log_debug("%s: unable to set raw", __func__);
++ return (false);
++ }
++
++ return (true);
++}
++
++static int
++copy_info(fido_dev_info_t *di, const char *path)
++{
++ int fd = -1;
++ int ok = -1;
++ struct usb_device_info udi;
++
++ memset(di, 0, sizeof(*di));
++ memset(&udi, 0, sizeof(udi));
++
++ if ((fd = open(path, O_RDWR)) == -1) {
++ if (errno != EBUSY && errno != ENOENT)
++ fido_log_debug("%s: open %s: %s", __func__, path,
++ strerror(errno));
++ goto fail;
++ }
++ if (!is_fido(fd))
++ goto fail;
++
++ if (ioctl(fd, USB_GET_DEVICEINFO, &udi) == -1)
++ goto fail;
++
++ if ((di->path = strdup(path)) == NULL ||
++ (di->manufacturer = strdup(udi.udi_vendor)) == NULL ||
++ (di->product = strdup(udi.udi_product)) == NULL)
++ goto fail;
++
++ di->vendor_id = (int16_t)udi.udi_vendorNo;
++ di->product_id = (int16_t)udi.udi_productNo;
++
++ ok = 0;
++fail:
++ if (fd != -1)
++ close(fd);
++
++ if (ok < 0) {
++ free(di->path);
++ free(di->manufacturer);
++ free(di->product);
++ explicit_bzero(di, sizeof(*di));
++ }
++
++ return (ok);
++}
++
++int
++fido_hid_manifest(fido_dev_info_t *devlist, size_t ilen, size_t *olen)
++{
++ char path[64];
++ size_t i;
++
++ *olen = 0;
++
++ if (ilen == 0)
++ return (FIDO_OK); /* nothing to do */
++
++ if (devlist == NULL || olen == NULL)
++ return (FIDO_ERR_INVALID_ARGUMENT);
++
++ for (i = *olen = 0; i < MAX_UHID && *olen < ilen; i++) {
++ snprintf(path, sizeof(path), "/dev/uhid%zu", i);
++ if (copy_info(&devlist[*olen], path) == 0) {
++ devlist[*olen].io = (fido_dev_io_t) {
++ fido_hid_open,
++ fido_hid_close,
++ fido_hid_read,
++ fido_hid_write,
++ };
++ ++(*olen);
++ }
++ }
++
++ return (FIDO_OK);
++}
++
++/*
++ * Workaround for NetBSD (as of 201910) bug that loses
++ * sync of DATA0/DATA1 sequence bit across uhid open/close.
++ * Send pings until we get a response - early pings with incorrect
++ * sequence bits will be ignored as duplicate packets by the device.
++ */
++static int
++terrible_ping_kludge(struct hid_netbsd *ctx)
++{
++ u_char data[256];
++ int i, n;
++ struct pollfd pfd;
++
++ if (sizeof(data) < ctx->report_out_len + 1)
++ return -1;
++ for (i = 0; i < 4; i++) {
++ memset(data, 0, sizeof(data));
++ /* broadcast channel ID */
++ data[1] = 0xff;
++ data[2] = 0xff;
++ data[3] = 0xff;
++ data[4] = 0xff;
++ /* Ping command */
++ data[5] = 0x81;
++ /* One byte ping only, Vasili */
++ data[6] = 0;
++ data[7] = 1;
++ fido_log_debug("%s: send ping %d", __func__, i);
++ if (fido_hid_write(ctx, data, ctx->report_out_len + 1) == -1)
++ return -1;
++ fido_log_debug("%s: wait reply", __func__);
++ memset(&pfd, 0, sizeof(pfd));
++ pfd.fd = ctx->fd;
++ pfd.events = POLLIN;
++ if ((n = poll(&pfd, 1, 100)) == -1) {
++ fido_log_debug("%s: poll: %d", __func__, errno);
++ return -1;
++ } else if (n == 0) {
++ fido_log_debug("%s: timed out", __func__);
++ continue;
++ }
++ if (fido_hid_read(ctx, data, ctx->report_out_len, 250) == -1)
++ return -1;
++ /*
++ * Ping isn't always supported on the broadcast channel,
++ * so we might get an error, but we don't care - we're
++ * synched now.
++ */
++ fido_log_debug("%s: got reply", __func__);
++ fido_log_xxd(data, ctx->report_out_len);
++ return 0;
++ }
++ fido_log_debug("%s: no response", __func__);
++ return -1;
++}
++
++void *
++fido_hid_open(const char *path)
++{
++ struct hid_netbsd *ctx;
++ report_desc_t rdesc = NULL;
++ hid_data_t hdata;
++ int len, report_id = 0;
++
++ if ((ctx = calloc(1, sizeof(*ctx))) == NULL)
++ goto fail0;
++ if ((ctx->fd = open(path, O_RDWR)) == -1)
++ goto fail1;
++ if (ioctl(ctx->fd, USB_GET_REPORT_ID, &report_id) == -1) {
++ fido_log_debug("%s: failed to get report ID: %s", __func__,
++ strerror(errno));
++ goto fail2;
++ }
++ if ((rdesc = hid_get_report_desc(ctx->fd)) == NULL) {
++ fido_log_debug("%s: failed to get report descriptor",
++ __func__);
++ goto fail2;
++ }
++ if ((hdata = hid_start_parse(rdesc, 1 << hid_collection, -1))
++ == NULL) {
++ fido_log_debug("%s: failed to parse report descriptor",
++ __func__);
Home |
Main Index |
Thread Index |
Old Index