diff main.c @ 46:b1c27f1d6289

bootid hmac challenge prog hmac
author Matt Johnston <matt@ucc.asn.au>
date Sun, 30 Jun 2013 23:34:24 +0800
parents a0f2fcc6d9dd
children 747695bd4e0d
line wrap: on
line diff
--- a/main.c	Sat Jun 29 23:46:39 2013 +0800
+++ b/main.c	Sun Jun 30 23:34:24 2013 +0800
@@ -766,6 +766,13 @@
 {
     uint8_t hmac[HMACLEN];
     uint8_t input[CHALLEN+sizeof(boot_id)];
+    
+    if (!boot_id_set)
+    {
+        _Static_assert(sizeof(boot_id) == HMACLEN, "boot_id size correct");
+        get_random(boot_id);
+        boot_id_set = 1;
+    }
 
     if (strlen(arg) != CHALLEN*2)
     {
@@ -777,12 +784,6 @@
     }
     memcpy(&input[CHALLEN], boot_id, sizeof(boot_id));
 
-    if (!boot_id_set)
-    {
-        _Static_assert(sizeof(boot_id) == HMACLEN, "boot_id size correct");
-        get_random(boot_id);
-        boot_id_set = 1;
-    }
     hmac_sha1(hmac, avr_keys[0], KEYLEN*8, input, sizeof(input)*8);
     printf_P(PSTR("bootid: "));
     printhex(boot_id, sizeof(boot_id), stdout);
@@ -793,14 +794,19 @@
 
 void(*bootloader)() __attribute__ ((noreturn)) = (void*)0x7800;
 
-#ifndef PROG_PASSWORD
-#define PROG_PASSWORD "Y2vvjxO5"
-#endif
-
 static void
 cmd_prog(const char* arg)
 {
-    if (!safe_str_eq(arg, PROG_PASSWORD))
+    uint8_t pw_hmac[HMACLEN];
+    uint8_t good_hmac[HMACLEN];
+
+    const static char prog_hmac[HMACLEN] PROGMEM = {
+        0x73, 0x4d, 0xa6, 0x3f, 0x3b, 0x7e, 0x4d, 0xa4, 0x65, 0xae, 0xea, 0xf9, 0x19, 0xbc, 0x4f, 0x45, 0xa7, 0x8d, 0x5a, 0xce, 
+    };
+
+    memcpy_P(good_hmac, prog_hmac, HMACLEN);
+    hmac_sha1(pw_hmac, arg, strlen(arg)*8, "pihelp", strlen("pihelp")*8);
+    if (!safe_mem_eq(pw_hmac, good_hmac, HMACLEN))
     {
         printf_P(PSTR("Bad prog password\n"));
         return;