Coverage Report

Created: 2026-04-08 06:32

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/libfido2/src/assert.c
Line
Count
Source
1
/*
2
 * Copyright (c) 2018-2026 Yubico AB. All rights reserved.
3
 * Use of this source code is governed by a BSD-style
4
 * license that can be found in the LICENSE file.
5
 * SPDX-License-Identifier: BSD-2-Clause
6
 */
7
8
#include <openssl/sha.h>
9
10
#include "fido.h"
11
#include "fido/es256.h"
12
#include "fido/rs256.h"
13
#include "fido/eddsa.h"
14
15
static int
16
adjust_assert_count(const cbor_item_t *key, const cbor_item_t *val, void *arg)
17
6.64k
{
18
6.64k
        fido_assert_t   *assert = arg;
19
6.64k
        uint64_t         n;
20
21
        /* numberOfCredentials; see section 6.2 */
22
6.64k
        if (cbor_isa_uint(key) == false ||
23
6.64k
            cbor_int_get_width(key) != CBOR_INT_8 ||
24
6.64k
            cbor_get_uint8(key) != 5) {
25
6.02k
                fido_log_debug("%s: cbor_type", __func__);
26
6.02k
                return (0); /* ignore */
27
6.02k
        }
28
29
617
        if (cbor_decode_uint64(val, &n) < 0 || n > SIZE_MAX) {
30
4
                fido_log_debug("%s: cbor_decode_uint64", __func__);
31
4
                return (-1);
32
4
        }
33
34
613
        if (assert->stmt_len != 0 || assert->stmt_cnt != 1 ||
35
613
            (size_t)n < assert->stmt_cnt) {
36
4
                fido_log_debug("%s: stmt_len=%zu, stmt_cnt=%zu, n=%zu",
37
4
                    __func__, assert->stmt_len, assert->stmt_cnt, (size_t)n);
38
4
                return (-1);
39
4
        }
40
41
609
        if (fido_assert_set_count(assert, (size_t)n) != FIDO_OK) {
42
100
                fido_log_debug("%s: fido_assert_set_count", __func__);
43
100
                return (-1);
44
100
        }
45
46
509
        assert->stmt_len = 0; /* XXX */
47
48
509
        return (0);
49
609
}
50
51
static int
52
parse_assert_reply(const cbor_item_t *key, const cbor_item_t *val, void *arg)
53
11.8k
{
54
11.8k
        fido_assert_stmt *stmt = arg;
55
56
11.8k
        if (cbor_isa_uint(key) == false ||
57
11.8k
            cbor_int_get_width(key) != CBOR_INT_8) {
58
260
                fido_log_debug("%s: cbor type", __func__);
59
260
                return (0); /* ignore */
60
260
        }
61
62
11.5k
        switch (cbor_get_uint8(key)) {
63
3.12k
        case 1: /* credential id */
64
3.12k
                return (cbor_decode_cred_id(val, &stmt->id));
65
2.88k
        case 2: /* authdata */
66
2.88k
                if (fido_blob_decode(val, &stmt->authdata_raw) < 0) {
67
11
                        fido_log_debug("%s: fido_blob_decode", __func__);
68
11
                        return (-1);
69
11
                }
70
2.87k
                return (cbor_decode_assert_authdata(val, &stmt->authdata_cbor,
71
2.87k
                    &stmt->authdata, &stmt->authdata_ext));
72
2.60k
        case 3: /* signature */
73
2.60k
                return (fido_blob_decode(val, &stmt->sig));
74
2.23k
        case 4: /* user attributes */
75
2.23k
                return (cbor_decode_user(val, &stmt->user));
76
3
        case 7: /* large blob key */
77
3
                return (fido_blob_decode(val, &stmt->largeblob_key));
78
716
        default: /* ignore */
79
716
                fido_log_debug("%s: cbor type", __func__);
80
716
                return (0);
81
11.5k
        }
82
11.5k
}
83
84
static int
85
fido_dev_get_assert_tx(fido_dev_t *dev, fido_assert_t *assert,
86
    const es256_pk_t *pk, const fido_blob_t *ecdh, const char *pin, int *ms)
87
5.78k
{
88
5.78k
        fido_blob_t      f;
89
5.78k
        fido_opt_t       uv = assert->uv;
90
5.78k
        cbor_item_t     *argv[7];
91
5.78k
        const uint8_t    cmd = CTAP_CBOR_ASSERT;
92
5.78k
        int              r;
93
94
5.78k
        memset(argv, 0, sizeof(argv));
95
5.78k
        memset(&f, 0, sizeof(f));
96
97
        /* do we have everything we need? */
98
5.78k
        if (assert->rp_id == NULL || assert->cdh.ptr == NULL) {
99
0
                fido_log_debug("%s: rp_id=%p, cdh.ptr=%p", __func__,
100
0
                    (void *)assert->rp_id, (void *)assert->cdh.ptr);
101
0
                r = FIDO_ERR_INVALID_ARGUMENT;
102
0
                goto fail;
103
0
        }
104
105
5.78k
        if ((argv[0] = cbor_build_string(assert->rp_id)) == NULL ||
106
5.78k
            (argv[1] = fido_blob_encode(&assert->cdh)) == NULL) {
107
21
                fido_log_debug("%s: cbor encode", __func__);
108
21
                r = FIDO_ERR_INTERNAL;
109
21
                goto fail;
110
21
        }
111
112
        /* allowed credentials */
113
5.76k
        if (assert->allow_list.len) {
114
3.47k
                const fido_blob_array_t *cl = &assert->allow_list;
115
3.47k
                if ((argv[2] = cbor_encode_pubkey_list(cl)) == NULL) {
116
827
                        fido_log_debug("%s: cbor_encode_pubkey_list", __func__);
117
827
                        r = FIDO_ERR_INTERNAL;
118
827
                        goto fail;
119
827
                }
120
3.47k
        }
121
122
4.94k
        if (assert->ext.mask)
123
3.07k
                if ((argv[3] = cbor_encode_assert_ext(dev, &assert->ext, ecdh,
124
3.07k
                    pk)) == NULL) {
125
435
                        fido_log_debug("%s: cbor_encode_assert_ext", __func__);
126
435
                        r = FIDO_ERR_INTERNAL;
127
435
                        goto fail;
128
435
                }
129
130
        /* user verification */
131
4.50k
        if (pin != NULL || fido_dev_puat_blob(dev) != NULL ||
132
4.50k
            (uv == FIDO_OPT_TRUE && fido_dev_supports_permissions(dev))) {
133
2.29k
                if ((r = cbor_add_uv_params(dev, cmd, &assert->cdh, pk, ecdh,
134
2.29k
                    pin, assert->rp_id, &argv[5], &argv[6], ms)) != FIDO_OK) {
135
1.55k
                        fido_log_debug("%s: cbor_add_uv_params", __func__);
136
1.55k
                        goto fail;
137
1.55k
                }
138
734
                uv = FIDO_OPT_OMIT;
139
734
        }
140
141
        /* options */
142
2.94k
        if (assert->up != FIDO_OPT_OMIT || uv != FIDO_OPT_OMIT)
143
1.17k
                if ((argv[4] = cbor_encode_assert_opt(assert->up, uv)) == NULL) {
144
12
                        fido_log_debug("%s: cbor_encode_assert_opt", __func__);
145
12
                        r = FIDO_ERR_INTERNAL;
146
12
                        goto fail;
147
12
                }
148
149
        /* frame and transmit */
150
2.93k
        if (cbor_build_frame(cmd, argv, nitems(argv), &f) < 0 ||
151
2.93k
            fido_tx(dev, CTAP_CMD_CBOR, f.ptr, f.len, ms) < 0) {
152
514
                fido_log_debug("%s: fido_tx", __func__);
153
514
                r = FIDO_ERR_TX;
154
514
                goto fail;
155
514
        }
156
157
2.42k
        r = FIDO_OK;
158
5.78k
fail:
159
5.78k
        cbor_vector_free(argv, nitems(argv));
160
5.78k
        free(f.ptr);
161
162
5.78k
        return (r);
163
2.42k
}
164
165
static int
166
fido_dev_get_assert_rx(fido_dev_t *dev, fido_assert_t *assert, int *ms)
167
2.42k
{
168
2.42k
        unsigned char   *msg;
169
2.42k
        int              msglen;
170
2.42k
        int              r;
171
172
2.42k
        fido_assert_reset_rx(assert);
173
174
2.42k
        if ((msg = malloc(FIDO_MAXMSG)) == NULL) {
175
5
                r = FIDO_ERR_INTERNAL;
176
5
                goto out;
177
5
        }
178
179
2.41k
        if ((msglen = fido_rx(dev, CTAP_CMD_CBOR, msg, FIDO_MAXMSG, ms)) < 0) {
180
221
                fido_log_debug("%s: fido_rx", __func__);
181
221
                r = FIDO_ERR_RX;
182
221
                goto out;
183
221
        }
184
185
        /* start with room for a single assertion */
186
2.19k
        if ((assert->stmt = calloc(1, sizeof(fido_assert_stmt))) == NULL) {
187
5
                r = FIDO_ERR_INTERNAL;
188
5
                goto out;
189
5
        }
190
2.18k
        assert->stmt_len = 0;
191
2.18k
        assert->stmt_cnt = 1;
192
193
        /* adjust as needed */
194
2.18k
        if ((r = cbor_parse_reply(msg, (size_t)msglen, assert,
195
2.18k
            adjust_assert_count)) != FIDO_OK) {
196
212
                fido_log_debug("%s: adjust_assert_count", __func__);
197
212
                goto out;
198
212
        }
199
200
        /* parse the first assertion */
201
1.97k
        if ((r = cbor_parse_reply(msg, (size_t)msglen, &assert->stmt[0],
202
1.97k
            parse_assert_reply)) != FIDO_OK) {
203
249
                fido_log_debug("%s: parse_assert_reply", __func__);
204
249
                goto out;
205
249
        }
206
1.72k
        assert->stmt_len = 1;
207
208
1.72k
        r = FIDO_OK;
209
2.42k
out:
210
2.42k
        freezero(msg, FIDO_MAXMSG);
211
212
2.42k
        return (r);
213
1.72k
}
214
215
static int
216
fido_get_next_assert_tx(fido_dev_t *dev, int *ms)
217
1.56k
{
218
1.56k
        const unsigned char cbor[] = { CTAP_CBOR_NEXT_ASSERT };
219
220
1.56k
        if (fido_tx(dev, CTAP_CMD_CBOR, cbor, sizeof(cbor), ms) < 0) {
221
10
                fido_log_debug("%s: fido_tx", __func__);
222
10
                return (FIDO_ERR_TX);
223
10
        }
224
225
1.55k
        return (FIDO_OK);
226
1.56k
}
227
228
static int
229
fido_get_next_assert_rx(fido_dev_t *dev, fido_assert_t *assert, int *ms)
230
1.55k
{
231
1.55k
        unsigned char   *msg;
232
1.55k
        int              msglen;
233
1.55k
        int              r;
234
235
1.55k
        if ((msg = malloc(FIDO_MAXMSG)) == NULL) {
236
6
                r = FIDO_ERR_INTERNAL;
237
6
                goto out;
238
6
        }
239
240
1.54k
        if ((msglen = fido_rx(dev, CTAP_CMD_CBOR, msg, FIDO_MAXMSG, ms)) < 0) {
241
60
                fido_log_debug("%s: fido_rx", __func__);
242
60
                r = FIDO_ERR_RX;
243
60
                goto out;
244
60
        }
245
246
        /* sanity check */
247
1.48k
        if (assert->stmt_len >= assert->stmt_cnt) {
248
0
                fido_log_debug("%s: stmt_len=%zu, stmt_cnt=%zu", __func__,
249
0
                    assert->stmt_len, assert->stmt_cnt);
250
0
                r = FIDO_ERR_INTERNAL;
251
0
                goto out;
252
0
        }
253
254
1.48k
        if ((r = cbor_parse_reply(msg, (size_t)msglen,
255
1.48k
            &assert->stmt[assert->stmt_len], parse_assert_reply)) != FIDO_OK) {
256
113
                fido_log_debug("%s: parse_assert_reply", __func__);
257
113
                goto out;
258
113
        }
259
260
1.37k
        r = FIDO_OK;
261
1.55k
out:
262
1.55k
        freezero(msg, FIDO_MAXMSG);
263
264
1.55k
        return (r);
265
1.37k
}
266
267
static int
268
fido_dev_get_assert_wait(fido_dev_t *dev, fido_assert_t *assert,
269
    const es256_pk_t *pk, const fido_blob_t *ecdh, const char *pin, int *ms)
270
5.78k
{
271
5.78k
        int r;
272
273
5.78k
        if ((r = fido_dev_get_assert_tx(dev, assert, pk, ecdh, pin,
274
5.78k
            ms)) != FIDO_OK ||
275
5.78k
            (r = fido_dev_get_assert_rx(dev, assert, ms)) != FIDO_OK)
276
4.06k
                return (r);
277
278
3.10k
        while (assert->stmt_len < assert->stmt_cnt) {
279
1.56k
                if ((r = fido_get_next_assert_tx(dev, ms)) != FIDO_OK ||
280
1.56k
                    (r = fido_get_next_assert_rx(dev, assert, ms)) != FIDO_OK)
281
189
                        return (r);
282
1.37k
                assert->stmt_len++;
283
1.37k
        }
284
285
1.53k
        return (FIDO_OK);
286
1.72k
}
287
288
static int
289
decrypt_hmac_secrets(const fido_dev_t *dev, fido_assert_t *assert,
290
    const fido_blob_t *key)
291
183
{
292
627
        for (size_t i = 0; i < assert->stmt_cnt; i++) {
293
515
                fido_assert_stmt *stmt = &assert->stmt[i];
294
515
                if (stmt->authdata_ext.hmac_secret_enc.ptr != NULL) {
295
266
                        if (aes256_cbc_dec(dev, key,
296
266
                            &stmt->authdata_ext.hmac_secret_enc,
297
266
                            &stmt->hmac_secret) < 0) {
298
71
                                fido_log_debug("%s: aes256_cbc_dec %zu",
299
71
                                    __func__, i);
300
71
                                return (-1);
301
71
                        }
302
266
                }
303
515
        }
304
305
112
        return (0);
306
183
}
307
308
static bool
309
need_ecdh(const fido_dev_t *dev, const fido_assert_t *assert, const char *pin)
310
8.75k
{
311
8.75k
        if (assert->ext.mask & FIDO_EXT_HMAC_SECRET)
312
2.52k
                return true;
313
314
        /* If available, prefer cached PUAT */
315
6.22k
        if (fido_dev_puat_blob(dev) != NULL)
316
265
                return false;
317
318
5.96k
        if (pin != NULL)
319
3.42k
                return true;
320
321
2.53k
        return assert->uv == FIDO_OPT_TRUE &&
322
2.53k
            fido_dev_supports_permissions(dev);
323
5.96k
}
324
325
int
326
fido_dev_get_assert(fido_dev_t *dev, fido_assert_t *assert, const char *pin)
327
18.2k
{
328
18.2k
        fido_blob_t     *ecdh = NULL;
329
18.2k
        es256_pk_t      *pk = NULL;
330
18.2k
        int              ms = dev->timeout_ms;
331
18.2k
        int              r;
332
333
#ifdef USE_WINHELLO
334
        if (dev->flags & FIDO_DEV_WINHELLO)
335
                return (fido_winhello_get_assert(dev, assert, pin, ms));
336
#endif
337
338
18.2k
        if (assert->rp_id == NULL || assert->cdh.ptr == NULL) {
339
60
                fido_log_debug("%s: rp_id=%p, cdh.ptr=%p", __func__,
340
60
                    (void *)assert->rp_id, (void *)assert->cdh.ptr);
341
60
                return (FIDO_ERR_INVALID_ARGUMENT);
342
60
        }
343
344
18.1k
        if (fido_dev_is_fido2(dev) == false) {
345
9.40k
                if (pin != NULL || assert->ext.mask != 0)
346
4.53k
                        return (FIDO_ERR_UNSUPPORTED_OPTION);
347
4.87k
                return (u2f_authenticate(dev, assert, &ms));
348
9.40k
        }
349
350
8.75k
        if (need_ecdh(dev, assert, pin) && (r = fido_do_ecdh(dev, &pk, &ecdh,
351
6.34k
            &ms)) != FIDO_OK) {
352
2.96k
                fido_log_debug("%s: fido_do_ecdh", __func__);
353
2.96k
                goto fail;
354
2.96k
        }
355
356
5.78k
        r = fido_dev_get_assert_wait(dev, assert, pk, ecdh, pin, &ms);
357
5.78k
        if (r == FIDO_OK && (assert->ext.mask & FIDO_EXT_HMAC_SECRET))
358
183
                if (decrypt_hmac_secrets(dev, assert, ecdh) < 0) {
359
71
                        fido_log_debug("%s: decrypt_hmac_secrets", __func__);
360
71
                        r = FIDO_ERR_INTERNAL;
361
71
                        goto fail;
362
71
                }
363
364
8.75k
fail:
365
8.75k
        es256_pk_free(&pk);
366
8.75k
        fido_blob_free(&ecdh);
367
368
8.75k
        return (r);
369
5.78k
}
370
371
int
372
fido_check_flags(uint8_t flags, fido_opt_t up, fido_opt_t uv)
373
10.7k
{
374
10.7k
        fido_log_debug("%s: flags=%02x", __func__, flags);
375
10.7k
        fido_log_debug("%s: up=%d, uv=%d", __func__, up, uv);
376
377
10.7k
        if (up == FIDO_OPT_TRUE &&
378
10.7k
            (flags & CTAP_AUTHDATA_USER_PRESENT) == 0) {
379
87
                fido_log_debug("%s: CTAP_AUTHDATA_USER_PRESENT", __func__);
380
87
                return (-1); /* user not present */
381
87
        }
382
383
10.6k
        if (uv == FIDO_OPT_TRUE &&
384
10.6k
            (flags & CTAP_AUTHDATA_USER_VERIFIED) == 0) {
385
210
                fido_log_debug("%s: CTAP_AUTHDATA_USER_VERIFIED", __func__);
386
210
                return (-1); /* user not verified */
387
210
        }
388
389
10.4k
        return (0);
390
10.6k
}
391
392
static int
393
check_extensions(int authdata_ext, int ext)
394
1.69k
{
395
        /* XXX: largeBlobKey is not part of extensions map */
396
1.69k
        ext &= ~FIDO_EXT_LARGEBLOB_KEY;
397
1.69k
        if (authdata_ext != ext) {
398
245
                fido_log_debug("%s: authdata_ext=0x%x != ext=0x%x", __func__,
399
245
                    authdata_ext, ext);
400
245
                return (-1);
401
245
        }
402
403
1.45k
        return (0);
404
1.69k
}
405
406
static int
407
get_es256_hash(fido_blob_t *dgst, const fido_blob_t *clientdata,
408
    const fido_blob_t *authdata)
409
7.53k
{
410
7.53k
        const EVP_MD    *md;
411
7.53k
        EVP_MD_CTX      *ctx = NULL;
412
413
7.53k
        if (dgst->len < SHA256_DIGEST_LENGTH ||
414
7.53k
            (md = EVP_sha256()) == NULL ||
415
7.53k
            (ctx = EVP_MD_CTX_new()) == NULL ||
416
7.53k
            EVP_DigestInit_ex(ctx, md, NULL) != 1 ||
417
7.53k
            EVP_DigestUpdate(ctx, authdata->ptr, authdata->len) != 1 ||
418
7.53k
            EVP_DigestUpdate(ctx, clientdata->ptr, clientdata->len) != 1 ||
419
7.53k
            EVP_DigestFinal_ex(ctx, dgst->ptr, NULL) != 1) {
420
159
                EVP_MD_CTX_free(ctx);
421
159
                return (-1);
422
159
        }
423
7.37k
        dgst->len = SHA256_DIGEST_LENGTH;
424
425
7.37k
        EVP_MD_CTX_free(ctx);
426
427
7.37k
        return (0);
428
7.53k
}
429
430
static int
431
get_es384_hash(fido_blob_t *dgst, const fido_blob_t *clientdata,
432
    const fido_blob_t *authdata)
433
274
{
434
274
        const EVP_MD    *md;
435
274
        EVP_MD_CTX      *ctx = NULL;
436
437
274
        if (dgst->len < SHA384_DIGEST_LENGTH ||
438
274
            (md = EVP_sha384()) == NULL ||
439
274
            (ctx = EVP_MD_CTX_new()) == NULL ||
440
274
            EVP_DigestInit_ex(ctx, md, NULL) != 1 ||
441
274
            EVP_DigestUpdate(ctx, authdata->ptr, authdata->len) != 1 ||
442
274
            EVP_DigestUpdate(ctx, clientdata->ptr, clientdata->len) != 1 ||
443
274
            EVP_DigestFinal_ex(ctx, dgst->ptr, NULL) != 1) {
444
18
                EVP_MD_CTX_free(ctx);
445
18
                return (-1);
446
18
        }
447
256
        dgst->len = SHA384_DIGEST_LENGTH;
448
449
256
        EVP_MD_CTX_free(ctx);
450
451
256
        return (0);
452
274
}
453
454
static int
455
get_eddsa_hash(fido_blob_t *dgst, const fido_blob_t *clientdata,
456
    const fido_blob_t *authdata)
457
621
{
458
621
        if (SIZE_MAX - authdata->len < clientdata->len ||
459
621
            dgst->len < authdata->len + clientdata->len)
460
41
                return (-1);
461
462
580
        memcpy(dgst->ptr, authdata->ptr, authdata->len);
463
580
        memcpy(dgst->ptr + authdata->len, clientdata->ptr, clientdata->len);
464
580
        dgst->len = authdata->len + clientdata->len;
465
466
580
        return (0);
467
621
}
468
469
int
470
fido_get_signed_hash(int cose_alg, fido_blob_t *dgst,
471
    const fido_blob_t *clientdata, const fido_blob_t *authdata_cbor)
472
8.44k
{
473
8.44k
        cbor_item_t             *item = NULL;
474
8.44k
        fido_blob_t              authdata;
475
8.44k
        struct cbor_load_result  cbor;
476
8.44k
        int                      ok = -1;
477
478
8.44k
        fido_log_debug("%s: cose_alg=%d", __func__, cose_alg);
479
480
8.44k
        if ((item = cbor_load(authdata_cbor->ptr, authdata_cbor->len,
481
8.44k
            &cbor)) == NULL || cbor_isa_bytestring(item) == false ||
482
8.44k
            cbor_bytestring_is_definite(item) == false) {
483
14
                fido_log_debug("%s: authdata", __func__);
484
14
                goto fail;
485
14
        }
486
8.43k
        authdata.ptr = cbor_bytestring_handle(item);
487
8.43k
        authdata.len = cbor_bytestring_length(item);
488
489
8.43k
        switch (cose_alg) {
490
7.19k
        case COSE_ES256:
491
7.53k
        case COSE_RS256:
492
7.53k
                ok = get_es256_hash(dgst, clientdata, &authdata);
493
7.53k
                break;
494
274
        case COSE_ES384:
495
274
                ok = get_es384_hash(dgst, clientdata, &authdata);
496
274
                break;
497
621
        case COSE_EDDSA:
498
621
                ok = get_eddsa_hash(dgst, clientdata, &authdata);
499
621
                break;
500
0
        default:
501
0
                fido_log_debug("%s: unknown cose_alg", __func__);
502
0
                break;
503
8.43k
        }
504
8.44k
fail:
505
8.44k
        if (item != NULL)
506
8.43k
                cbor_decref(&item);
507
508
8.44k
        return (ok);
509
8.43k
}
510
511
int
512
fido_assert_verify(const fido_assert_t *assert, size_t idx, int cose_alg,
513
    const void *pk)
514
301k
{
515
301k
        unsigned char            buf[1024]; /* XXX */
516
301k
        fido_blob_t              dgst;
517
301k
        const fido_assert_stmt  *stmt = NULL;
518
301k
        int                      ok = -1;
519
301k
        int                      r;
520
521
301k
        dgst.ptr = buf;
522
301k
        dgst.len = sizeof(buf);
523
524
301k
        if (idx >= assert->stmt_len || pk == NULL) {
525
877
                r = FIDO_ERR_INVALID_ARGUMENT;
526
877
                goto out;
527
877
        }
528
529
300k
        stmt = &assert->stmt[idx];
530
531
        /* do we have everything we need? */
532
300k
        if (assert->cdh.ptr == NULL || assert->rp_id == NULL ||
533
300k
            stmt->authdata_cbor.ptr == NULL || stmt->sig.ptr == NULL) {
534
298k
                fido_log_debug("%s: cdh=%p, rp_id=%s, authdata=%p, sig=%p",
535
298k
                    __func__, (void *)assert->cdh.ptr, assert->rp_id,
536
298k
                    (void *)stmt->authdata_cbor.ptr, (void *)stmt->sig.ptr);
537
298k
                r = FIDO_ERR_INVALID_ARGUMENT;
538
298k
                goto out;
539
298k
        }
540
541
1.97k
        if (fido_check_flags(stmt->authdata.flags, assert->up,
542
1.97k
            assert->uv) < 0) {
543
277
                fido_log_debug("%s: fido_check_flags", __func__);
544
277
                r = FIDO_ERR_INVALID_PARAM;
545
277
                goto out;
546
277
        }
547
548
1.69k
        if (check_extensions(stmt->authdata_ext.mask, assert->ext.mask) < 0) {
549
245
                fido_log_debug("%s: check_extensions", __func__);
550
245
                r = FIDO_ERR_INVALID_PARAM;
551
245
                goto out;
552
245
        }
553
554
1.45k
        if (fido_check_rp_id(assert->rp_id, stmt->authdata.rp_id_hash) != 0) {
555
516
                fido_log_debug("%s: fido_check_rp_id", __func__);
556
516
                r = FIDO_ERR_INVALID_PARAM;
557
516
                goto out;
558
516
        }
559
560
934
        if (fido_get_signed_hash(cose_alg, &dgst, &assert->cdh,
561
934
            &stmt->authdata_cbor) < 0) {
562
77
                fido_log_debug("%s: fido_get_signed_hash", __func__);
563
77
                r = FIDO_ERR_INTERNAL;
564
77
                goto out;
565
77
        }
566
567
857
        switch (cose_alg) {
568
265
        case COSE_ES256:
569
265
                ok = es256_pk_verify_sig(&dgst, pk, &stmt->sig);
570
265
                break;
571
110
        case COSE_ES384:
572
110
                ok = es384_pk_verify_sig(&dgst, pk, &stmt->sig);
573
110
                break;
574
270
        case COSE_RS256:
575
270
                ok = rs256_pk_verify_sig(&dgst, pk, &stmt->sig);
576
270
                break;
577
212
        case COSE_EDDSA:
578
212
                ok = eddsa_pk_verify_sig(&dgst, pk, &stmt->sig);
579
212
                break;
580
0
        default:
581
0
                fido_log_debug("%s: unsupported cose_alg %d", __func__,
582
0
                    cose_alg);
583
0
                r = FIDO_ERR_UNSUPPORTED_OPTION;
584
0
                goto out;
585
857
        }
586
587
857
        if (ok < 0)
588
857
                r = FIDO_ERR_INVALID_SIG;
589
0
        else
590
0
                r = FIDO_OK;
591
301k
out:
592
301k
        explicit_bzero(buf, sizeof(buf));
593
594
301k
        return (r);
595
857
}
596
597
int
598
fido_assert_set_clientdata(fido_assert_t *assert, const unsigned char *data,
599
    size_t data_len)
600
0
{
601
0
        if (!fido_blob_is_empty(&assert->cdh) ||
602
0
            fido_blob_set(&assert->cd, data, data_len) < 0) {
603
0
                return (FIDO_ERR_INVALID_ARGUMENT);
604
0
        }
605
0
        if (fido_sha256(&assert->cdh, data, data_len) < 0) {
606
0
                fido_blob_reset(&assert->cd);
607
0
                return (FIDO_ERR_INTERNAL);
608
0
        }
609
610
0
        return (FIDO_OK);
611
0
}
612
613
int
614
fido_assert_set_clientdata_hash(fido_assert_t *assert,
615
    const unsigned char *hash, size_t hash_len)
616
337k
{
617
337k
        if (!fido_blob_is_empty(&assert->cd) ||
618
337k
            fido_blob_set(&assert->cdh, hash, hash_len) < 0)
619
5.90k
                return (FIDO_ERR_INVALID_ARGUMENT);
620
621
331k
        return (FIDO_OK);
622
337k
}
623
624
int
625
fido_assert_set_hmac_salt(fido_assert_t *assert, const unsigned char *salt,
626
    size_t salt_len)
627
36.4k
{
628
36.4k
        if ((salt_len != 32 && salt_len != 64) ||
629
36.4k
            fido_blob_set(&assert->ext.hmac_salt, salt, salt_len) < 0)
630
34.4k
                return (FIDO_ERR_INVALID_ARGUMENT);
631
632
1.96k
        return (FIDO_OK);
633
36.4k
}
634
635
int
636
fido_assert_set_hmac_secret(fido_assert_t *assert, size_t idx,
637
    const unsigned char *secret, size_t secret_len)
638
0
{
639
0
        if (idx >= assert->stmt_len || (secret_len != 32 && secret_len != 64) ||
640
0
            fido_blob_set(&assert->stmt[idx].hmac_secret, secret,
641
0
            secret_len) < 0)
642
0
                return (FIDO_ERR_INVALID_ARGUMENT);
643
644
0
        return (FIDO_OK);
645
0
}
646
647
int
648
fido_assert_set_rp(fido_assert_t *assert, const char *id)
649
337k
{
650
337k
        if (assert->rp_id != NULL) {
651
18.1k
                free(assert->rp_id);
652
18.1k
                assert->rp_id = NULL;
653
18.1k
        }
654
655
337k
        if (id == NULL)
656
5.12k
                return (FIDO_ERR_INVALID_ARGUMENT);
657
658
332k
        if ((assert->rp_id = strdup(id)) == NULL)
659
878
                return (FIDO_ERR_INTERNAL);
660
661
331k
        return (FIDO_OK);
662
332k
}
663
664
#ifdef USE_WINHELLO
665
int
666
fido_assert_set_winhello_appid(fido_assert_t *assert, const char *id)
667
{
668
        if (assert->appid != NULL) {
669
                free(assert->appid);
670
                assert->appid = NULL;
671
        }
672
673
        if (id == NULL)
674
                return (FIDO_ERR_INVALID_ARGUMENT);
675
676
        if ((assert->appid = strdup(id)) == NULL)
677
                return (FIDO_ERR_INTERNAL);
678
679
        return (FIDO_OK);
680
}
681
#else
682
int
683
fido_assert_set_winhello_appid(fido_assert_t *assert, const char *id)
684
0
{
685
0
        (void)assert;
686
0
        (void)id;
687
688
0
        return (FIDO_ERR_UNSUPPORTED_EXTENSION);
689
0
}
690
#endif /* USE_WINHELLO */
691
692
int
693
fido_assert_allow_cred(fido_assert_t *assert, const unsigned char *ptr,
694
    size_t len)
695
1.00M
{
696
1.00M
        fido_blob_t      id;
697
1.00M
        fido_blob_t     *list_ptr;
698
1.00M
        int              r;
699
700
1.00M
        memset(&id, 0, sizeof(id));
701
702
1.00M
        if (assert->allow_list.len == SIZE_MAX) {
703
0
                r = FIDO_ERR_INVALID_ARGUMENT;
704
0
                goto fail;
705
0
        }
706
707
1.00M
        if (fido_blob_set(&id, ptr, len) < 0 || (list_ptr =
708
999k
            recallocarray(assert->allow_list.ptr, assert->allow_list.len,
709
999k
            assert->allow_list.len + 1, sizeof(fido_blob_t))) == NULL) {
710
6.40k
                r = FIDO_ERR_INVALID_ARGUMENT;
711
6.40k
                goto fail;
712
6.40k
        }
713
714
996k
        list_ptr[assert->allow_list.len++] = id;
715
996k
        assert->allow_list.ptr = list_ptr;
716
717
996k
        return (FIDO_OK);
718
6.40k
fail:
719
6.40k
        free(id.ptr);
720
721
6.40k
        return (r);
722
1.00M
}
723
724
int
725
fido_assert_empty_allow_list(fido_assert_t *assert)
726
324k
{
727
324k
        fido_free_blob_array(&assert->allow_list);
728
324k
        memset(&assert->allow_list, 0, sizeof(assert->allow_list));
729
730
324k
        return (FIDO_OK);
731
324k
}
732
733
int
734
fido_assert_set_extensions(fido_assert_t *assert, int ext)
735
321k
{
736
321k
        if (ext == 0)
737
18.9k
                assert->ext.mask = 0;
738
302k
        else {
739
302k
                if ((ext & FIDO_EXT_ASSERT_MASK) != ext)
740
281k
                        return (FIDO_ERR_INVALID_ARGUMENT);
741
20.4k
                assert->ext.mask |= ext;
742
20.4k
        }
743
744
39.4k
        return (FIDO_OK);
745
321k
}
746
747
int
748
fido_assert_set_options(fido_assert_t *assert, bool up, bool uv)
749
0
{
750
0
        assert->up = up ? FIDO_OPT_TRUE : FIDO_OPT_FALSE;
751
0
        assert->uv = uv ? FIDO_OPT_TRUE : FIDO_OPT_FALSE;
752
753
0
        return (FIDO_OK);
754
0
}
755
756
int
757
fido_assert_set_up(fido_assert_t *assert, fido_opt_t up)
758
154k
{
759
154k
        assert->up = up;
760
761
154k
        return (FIDO_OK);
762
154k
}
763
764
int
765
fido_assert_set_uv(fido_assert_t *assert, fido_opt_t uv)
766
15.4k
{
767
15.4k
        assert->uv = uv;
768
769
15.4k
        return (FIDO_OK);
770
15.4k
}
771
772
const unsigned char *
773
fido_assert_clientdata_hash_ptr(const fido_assert_t *assert)
774
302k
{
775
302k
        return (assert->cdh.ptr);
776
302k
}
777
778
size_t
779
fido_assert_clientdata_hash_len(const fido_assert_t *assert)
780
302k
{
781
302k
        return (assert->cdh.len);
782
302k
}
783
784
fido_assert_t *
785
fido_assert_new(void)
786
325k
{
787
325k
        return (calloc(1, sizeof(fido_assert_t)));
788
325k
}
789
790
void
791
fido_assert_reset_tx(fido_assert_t *assert)
792
324k
{
793
324k
        free(assert->rp_id);
794
324k
        free(assert->appid);
795
324k
        fido_blob_reset(&assert->cd);
796
324k
        fido_blob_reset(&assert->cdh);
797
324k
        fido_blob_reset(&assert->ext.hmac_salt);
798
324k
        fido_assert_empty_allow_list(assert);
799
324k
        memset(&assert->ext, 0, sizeof(assert->ext));
800
324k
        assert->rp_id = NULL;
801
324k
        assert->appid = NULL;
802
324k
        assert->up = FIDO_OPT_OMIT;
803
324k
        assert->uv = FIDO_OPT_OMIT;
804
324k
}
805
806
static void
807
fido_assert_reset_extattr(fido_assert_extattr_t *ext)
808
587k
{
809
587k
        fido_blob_reset(&ext->hmac_secret_enc);
810
587k
        fido_blob_reset(&ext->blob);
811
587k
        memset(ext, 0, sizeof(*ext));
812
587k
}
813
814
void
815
fido_assert_reset_rx(fido_assert_t *assert)
816
327k
{
817
907k
        for (size_t i = 0; i < assert->stmt_cnt; i++) {
818
580k
                free(assert->stmt[i].user.icon);
819
580k
                free(assert->stmt[i].user.name);
820
580k
                free(assert->stmt[i].user.display_name);
821
580k
                fido_blob_reset(&assert->stmt[i].user.id);
822
580k
                fido_blob_reset(&assert->stmt[i].id);
823
580k
                fido_blob_reset(&assert->stmt[i].hmac_secret);
824
580k
                fido_blob_reset(&assert->stmt[i].authdata_cbor);
825
580k
                fido_blob_reset(&assert->stmt[i].authdata_raw);
826
580k
                fido_blob_reset(&assert->stmt[i].largeblob_key);
827
580k
                fido_blob_reset(&assert->stmt[i].sig);
828
580k
                fido_assert_reset_extattr(&assert->stmt[i].authdata_ext);
829
580k
                memset(&assert->stmt[i], 0, sizeof(assert->stmt[i]));
830
580k
        }
831
327k
        free(assert->stmt);
832
327k
        assert->stmt = NULL;
833
327k
        assert->stmt_len = 0;
834
327k
        assert->stmt_cnt = 0;
835
327k
}
836
837
void
838
fido_assert_free(fido_assert_t **assert_p)
839
324k
{
840
324k
        fido_assert_t *assert;
841
842
324k
        if (assert_p == NULL || (assert = *assert_p) == NULL)
843
73
                return;
844
324k
        fido_assert_reset_tx(assert);
845
324k
        fido_assert_reset_rx(assert);
846
324k
        free(assert);
847
324k
        *assert_p = NULL;
848
324k
}
849
850
size_t
851
fido_assert_count(const fido_assert_t *assert)
852
325k
{
853
325k
        return (assert->stmt_len);
854
325k
}
855
856
const char *
857
fido_assert_rp_id(const fido_assert_t *assert)
858
302k
{
859
302k
        return (assert->rp_id);
860
302k
}
861
862
uint8_t
863
fido_assert_flags(const fido_assert_t *assert, size_t idx)
864
302k
{
865
302k
        if (idx >= assert->stmt_len)
866
23.3k
                return (0);
867
868
278k
        return (assert->stmt[idx].authdata.flags);
869
302k
}
870
871
uint32_t
872
fido_assert_sigcount(const fido_assert_t *assert, size_t idx)
873
302k
{
874
302k
        if (idx >= assert->stmt_len)
875
23.3k
                return (0);
876
877
278k
        return (assert->stmt[idx].authdata.sigcount);
878
302k
}
879
880
const unsigned char *
881
fido_assert_authdata_ptr(const fido_assert_t *assert, size_t idx)
882
302k
{
883
302k
        if (idx >= assert->stmt_len)
884
23.3k
                return (NULL);
885
886
278k
        return (assert->stmt[idx].authdata_cbor.ptr);
887
302k
}
888
889
size_t
890
fido_assert_authdata_len(const fido_assert_t *assert, size_t idx)
891
302k
{
892
302k
        if (idx >= assert->stmt_len)
893
23.3k
                return (0);
894
895
278k
        return (assert->stmt[idx].authdata_cbor.len);
896
302k
}
897
898
const unsigned char *
899
fido_assert_authdata_raw_ptr(const fido_assert_t *assert, size_t idx)
900
302k
{
901
302k
        if (idx >= assert->stmt_len)
902
23.3k
                return (NULL);
903
904
278k
        return (assert->stmt[idx].authdata_raw.ptr);
905
302k
}
906
907
size_t
908
fido_assert_authdata_raw_len(const fido_assert_t *assert, size_t idx)
909
302k
{
910
302k
        if (idx >= assert->stmt_len)
911
23.3k
                return (0);
912
913
278k
        return (assert->stmt[idx].authdata_raw.len);
914
302k
}
915
916
const unsigned char *
917
fido_assert_sig_ptr(const fido_assert_t *assert, size_t idx)
918
302k
{
919
302k
        if (idx >= assert->stmt_len)
920
23.3k
                return (NULL);
921
922
278k
        return (assert->stmt[idx].sig.ptr);
923
302k
}
924
925
size_t
926
fido_assert_sig_len(const fido_assert_t *assert, size_t idx)
927
302k
{
928
302k
        if (idx >= assert->stmt_len)
929
23.3k
                return (0);
930
931
278k
        return (assert->stmt[idx].sig.len);
932
302k
}
933
934
const unsigned char *
935
fido_assert_id_ptr(const fido_assert_t *assert, size_t idx)
936
302k
{
937
302k
        if (idx >= assert->stmt_len)
938
23.3k
                return (NULL);
939
940
278k
        return (assert->stmt[idx].id.ptr);
941
302k
}
942
943
size_t
944
fido_assert_id_len(const fido_assert_t *assert, size_t idx)
945
302k
{
946
302k
        if (idx >= assert->stmt_len)
947
23.3k
                return (0);
948
949
278k
        return (assert->stmt[idx].id.len);
950
302k
}
951
952
const unsigned char *
953
fido_assert_user_id_ptr(const fido_assert_t *assert, size_t idx)
954
302k
{
955
302k
        if (idx >= assert->stmt_len)
956
23.3k
                return (NULL);
957
958
278k
        return (assert->stmt[idx].user.id.ptr);
959
302k
}
960
961
size_t
962
fido_assert_user_id_len(const fido_assert_t *assert, size_t idx)
963
302k
{
964
302k
        if (idx >= assert->stmt_len)
965
23.3k
                return (0);
966
967
278k
        return (assert->stmt[idx].user.id.len);
968
302k
}
969
970
const char *
971
fido_assert_user_icon(const fido_assert_t *assert, size_t idx)
972
302k
{
973
302k
        if (idx >= assert->stmt_len)
974
23.3k
                return (NULL);
975
976
278k
        return (assert->stmt[idx].user.icon);
977
302k
}
978
979
const char *
980
fido_assert_user_name(const fido_assert_t *assert, size_t idx)
981
302k
{
982
302k
        if (idx >= assert->stmt_len)
983
23.3k
                return (NULL);
984
985
278k
        return (assert->stmt[idx].user.name);
986
302k
}
987
988
const char *
989
fido_assert_user_display_name(const fido_assert_t *assert, size_t idx)
990
302k
{
991
302k
        if (idx >= assert->stmt_len)
992
23.3k
                return (NULL);
993
994
278k
        return (assert->stmt[idx].user.display_name);
995
302k
}
996
997
const unsigned char *
998
fido_assert_hmac_secret_ptr(const fido_assert_t *assert, size_t idx)
999
302k
{
1000
302k
        if (idx >= assert->stmt_len)
1001
23.3k
                return (NULL);
1002
1003
278k
        return (assert->stmt[idx].hmac_secret.ptr);
1004
302k
}
1005
1006
size_t
1007
fido_assert_hmac_secret_len(const fido_assert_t *assert, size_t idx)
1008
302k
{
1009
302k
        if (idx >= assert->stmt_len)
1010
23.3k
                return (0);
1011
1012
278k
        return (assert->stmt[idx].hmac_secret.len);
1013
302k
}
1014
1015
const unsigned char *
1016
fido_assert_largeblob_key_ptr(const fido_assert_t *assert, size_t idx)
1017
302k
{
1018
302k
        if (idx >= assert->stmt_len)
1019
23.3k
                return (NULL);
1020
1021
278k
        return (assert->stmt[idx].largeblob_key.ptr);
1022
302k
}
1023
1024
size_t
1025
fido_assert_largeblob_key_len(const fido_assert_t *assert, size_t idx)
1026
302k
{
1027
302k
        if (idx >= assert->stmt_len)
1028
23.3k
                return (0);
1029
1030
278k
        return (assert->stmt[idx].largeblob_key.len);
1031
302k
}
1032
1033
const unsigned char *
1034
fido_assert_blob_ptr(const fido_assert_t *assert, size_t idx)
1035
302k
{
1036
302k
        if (idx >= assert->stmt_len)
1037
23.3k
                return (NULL);
1038
1039
278k
        return (assert->stmt[idx].authdata_ext.blob.ptr);
1040
302k
}
1041
1042
size_t
1043
fido_assert_blob_len(const fido_assert_t *assert, size_t idx)
1044
302k
{
1045
302k
        if (idx >= assert->stmt_len)
1046
23.3k
                return (0);
1047
1048
278k
        return (assert->stmt[idx].authdata_ext.blob.len);
1049
302k
}
1050
1051
static void
1052
fido_assert_clean_authdata(fido_assert_stmt *stmt)
1053
7.66k
{
1054
7.66k
        fido_blob_reset(&stmt->authdata_cbor);
1055
7.66k
        fido_blob_reset(&stmt->authdata_raw);
1056
7.66k
        fido_assert_reset_extattr(&stmt->authdata_ext);
1057
7.66k
        memset(&stmt->authdata, 0, sizeof(stmt->authdata));
1058
7.66k
}
1059
1060
int
1061
fido_assert_set_authdata(fido_assert_t *assert, size_t idx,
1062
    const unsigned char *ptr, size_t len)
1063
602k
{
1064
602k
        cbor_item_t             *item = NULL;
1065
602k
        fido_assert_stmt        *stmt = NULL;
1066
602k
        struct cbor_load_result  cbor;
1067
602k
        int                      r;
1068
1069
602k
        if (idx >= assert->stmt_len || ptr == NULL || len == 0)
1070
597k
                return (FIDO_ERR_INVALID_ARGUMENT);
1071
1072
5.17k
        stmt = &assert->stmt[idx];
1073
5.17k
        fido_assert_clean_authdata(stmt);
1074
1075
5.17k
        if ((item = cbor_load(ptr, len, &cbor)) == NULL) {
1076
64
                fido_log_debug("%s: cbor_load", __func__);
1077
64
                r = FIDO_ERR_INVALID_ARGUMENT;
1078
64
                goto fail;
1079
64
        }
1080
1081
5.11k
        if (fido_blob_decode(item, &stmt->authdata_raw) < 0) {
1082
47
            fido_log_debug("%s: fido_blob_decode", __func__);
1083
47
            r = FIDO_ERR_INTERNAL;
1084
47
            goto fail;
1085
47
        }
1086
1087
5.06k
        if (cbor_decode_assert_authdata(item, &stmt->authdata_cbor,
1088
5.06k
            &stmt->authdata, &stmt->authdata_ext) < 0) {
1089
728
                fido_log_debug("%s: cbor_decode_assert_authdata", __func__);
1090
728
                r = FIDO_ERR_INVALID_ARGUMENT;
1091
728
                goto fail;
1092
728
        }
1093
1094
4.33k
        r = FIDO_OK;
1095
5.17k
fail:
1096
5.17k
        if (item != NULL)
1097
5.11k
                cbor_decref(&item);
1098
1099
5.17k
        if (r != FIDO_OK)
1100
839
                fido_assert_clean_authdata(stmt);
1101
1102
5.17k
        return (r);
1103
4.33k
}
1104
1105
int
1106
fido_assert_set_authdata_raw(fido_assert_t *assert, size_t idx,
1107
    const unsigned char *ptr, size_t len)
1108
598k
{
1109
598k
        cbor_item_t             *item = NULL;
1110
598k
        fido_assert_stmt        *stmt = NULL;
1111
598k
        int                      r;
1112
1113
598k
        if (idx >= assert->stmt_len || ptr == NULL || len == 0)
1114
597k
                return (FIDO_ERR_INVALID_ARGUMENT);
1115
1116
839
        stmt = &assert->stmt[idx];
1117
839
        fido_assert_clean_authdata(stmt);
1118
1119
839
        if (fido_blob_set(&stmt->authdata_raw, ptr, len) < 0) {
1120
0
                fido_log_debug("%s: fido_blob_set", __func__);
1121
0
                r = FIDO_ERR_INTERNAL;
1122
0
                goto fail;
1123
0
        }
1124
1125
839
        if ((item = cbor_build_bytestring(ptr, len)) == NULL) {
1126
0
                fido_log_debug("%s: cbor_build_bytestring", __func__);
1127
0
                r = FIDO_ERR_INTERNAL;
1128
0
                goto fail;
1129
0
        }
1130
1131
839
        if (cbor_decode_assert_authdata(item, &stmt->authdata_cbor,
1132
839
            &stmt->authdata, &stmt->authdata_ext) < 0) {
1133
815
                fido_log_debug("%s: cbor_decode_assert_authdata", __func__);
1134
815
                r = FIDO_ERR_INVALID_ARGUMENT;
1135
815
                goto fail;
1136
815
        }
1137
1138
24
        r = FIDO_OK;
1139
839
fail:
1140
839
        if (item != NULL)
1141
839
                cbor_decref(&item);
1142
1143
839
        if (r != FIDO_OK)
1144
815
                fido_assert_clean_authdata(stmt);
1145
1146
839
        return (r);
1147
24
}
1148
1149
int
1150
fido_assert_set_sig(fido_assert_t *a, size_t idx, const unsigned char *ptr,
1151
    size_t len)
1152
602k
{
1153
602k
        if (idx >= a->stmt_len || ptr == NULL || len == 0)
1154
597k
                return (FIDO_ERR_INVALID_ARGUMENT);
1155
4.96k
        if (fido_blob_set(&a->stmt[idx].sig, ptr, len) < 0)
1156
46
                return (FIDO_ERR_INTERNAL);
1157
1158
4.91k
        return (FIDO_OK);
1159
4.96k
}
1160
1161
/* XXX shrinking leaks memory; fortunately that shouldn't happen */
1162
int
1163
fido_assert_set_count(fido_assert_t *assert, size_t n)
1164
306k
{
1165
306k
        void *new_stmt;
1166
1167
306k
#ifdef FIDO_FUZZ
1168
306k
        if (n > UINT8_MAX) {
1169
100
                fido_log_debug("%s: n > UINT8_MAX", __func__);
1170
100
                return (FIDO_ERR_INTERNAL);
1171
100
        }
1172
306k
#endif
1173
1174
306k
        new_stmt = recallocarray(assert->stmt, assert->stmt_cnt, n,
1175
306k
            sizeof(fido_assert_stmt));
1176
306k
        if (new_stmt == NULL)
1177
883
                return (FIDO_ERR_INTERNAL);
1178
1179
305k
        assert->stmt = new_stmt;
1180
305k
        assert->stmt_cnt = n;
1181
305k
        assert->stmt_len = n;
1182
1183
305k
        return (FIDO_OK);
1184
306k
}