feat: add yubikey-rs-demo
This commit is contained in:
1410
__crypto/yubikey-rs-demo/Cargo.lock
generated
Normal file
1410
__crypto/yubikey-rs-demo/Cargo.lock
generated
Normal file
File diff suppressed because it is too large
Load Diff
15
__crypto/yubikey-rs-demo/Cargo.toml
Normal file
15
__crypto/yubikey-rs-demo/Cargo.toml
Normal file
@@ -0,0 +1,15 @@
|
||||
[package]
|
||||
name = "yubikey-rs-demo"
|
||||
version = "0.1.0"
|
||||
edition = "2021"
|
||||
|
||||
# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html
|
||||
|
||||
[dependencies]
|
||||
elliptic-curve = { version = "0.13.2", features = ["sec1"] }
|
||||
hex = "0.4.3"
|
||||
p256 = { version = "0.13.0", features = ["ecdh"] }
|
||||
rand = "0.8.5"
|
||||
rust_util = "0.6.41"
|
||||
sha2 = "0.10.6"
|
||||
yubikey = { version = "0.7.0", features = ["untested"] }
|
||||
72
__crypto/yubikey-rs-demo/src/main.rs
Normal file
72
__crypto/yubikey-rs-demo/src/main.rs
Normal file
@@ -0,0 +1,72 @@
|
||||
use p256::{ecdh::EphemeralSecret, EncodedPoint, PublicKey};
|
||||
use p256::elliptic_curve::sec1::{FromEncodedPoint, ToEncodedPoint};
|
||||
use rand::rngs::OsRng;
|
||||
use rust_util::{failure_and_exit, information, XResult};
|
||||
use yubikey::Context;
|
||||
use yubikey::piv::{AlgorithmId, decrypt_data, RetiredSlotId, SlotId};
|
||||
|
||||
// const EPK_BYTES: usize = 33;
|
||||
|
||||
#[derive(Debug)]
|
||||
pub(crate) struct EphemeralKeyBytes(p256::EncodedPoint);
|
||||
|
||||
impl EphemeralKeyBytes {
|
||||
// fn from_bytes(bytes: [u8; EPK_BYTES]) -> Option<Self> {
|
||||
// let encoded = p256::EncodedPoint::from_bytes(&bytes).ok()?;
|
||||
// if encoded.is_compressed()
|
||||
// && p256::PublicKey::from_encoded_point(&encoded)
|
||||
// .is_some()
|
||||
// .into()
|
||||
// {
|
||||
// Some(EphemeralKeyBytes(encoded))
|
||||
// } else {
|
||||
// None
|
||||
// }
|
||||
// }
|
||||
|
||||
fn from_public_key(epk: &p256::PublicKey) -> Self {
|
||||
EphemeralKeyBytes(epk.to_encoded_point(true))
|
||||
}
|
||||
|
||||
// pub(crate) fn as_bytes(&self) -> &[u8] {
|
||||
// self.0.as_bytes()
|
||||
// }
|
||||
|
||||
pub(crate) fn decompress(&self) -> p256::EncodedPoint {
|
||||
// EphemeralKeyBytes is a valid compressed encoding by construction.
|
||||
let p = p256::PublicKey::from_encoded_point(&self.0).unwrap();
|
||||
p.to_encoded_point(false)
|
||||
}
|
||||
}
|
||||
|
||||
fn main() -> XResult<()> {
|
||||
let mut readers = Context::open()?;
|
||||
let reader = readers.iter()?.next().unwrap_or_else(|| failure_and_exit!("No reader!"));
|
||||
let mut yubikey = reader.open()?;
|
||||
|
||||
let esk = EphemeralSecret::random(&mut OsRng);
|
||||
let epk = esk.public_key();
|
||||
let epk_bytes = EphemeralKeyBytes::from_public_key(&epk);
|
||||
|
||||
let encoded_point = EncodedPoint::from_bytes(&hex::decode(
|
||||
"04dd3eebd906c9cf00b08ec29f7ed61804d1cc1d1352d9257b628191e08fc3717c4fae3298cd5c4829cec8bf3a946e7db60b7857e1287f6a0bae6b3f2342f007d0"
|
||||
)?)?;
|
||||
|
||||
let public_key = PublicKey::from_encoded_point(&encoded_point).unwrap();
|
||||
|
||||
let shared_secret = esk.diffie_hellman(&public_key);
|
||||
information!("Shared secret: {}", hex::encode(shared_secret.raw_secret_bytes()));
|
||||
|
||||
// yubikey.verify_pin(b"123456").expect("Verify pin!");
|
||||
let decrypted_shared_secret = decrypt_data(
|
||||
&mut yubikey,
|
||||
epk_bytes.decompress().as_bytes(),
|
||||
AlgorithmId::EccP256,
|
||||
SlotId::Retired(RetiredSlotId::R1),
|
||||
)?;
|
||||
|
||||
information!("Decrypted shared secret: {}", hex::encode(&decrypted_shared_secret.to_vec()));
|
||||
|
||||
Ok(())
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user