gecko-dev/dom/webauthn/u2f-hid-rs
J.C. Jones 45039bb033 Bug 1494386 - Uplift u2f-hid-rs 0.2.2, Windows aarch64 fix r=keeler
See https://github.com/jcjones/u2f-hid-rs/pull/67

Differential Revision: https://phabricator.services.mozilla.com/D7795

--HG--
extra : moz-landing-system : lando
2018-10-05 00:05:04 +00:00
..
examples
fuzz
src Bug 1494386 - Uplift u2f-hid-rs 0.2.2, Windows aarch64 fix r=keeler 2018-10-05 00:05:04 +00:00
.gitignore
.travis.yml
Cargo.toml Bug 1494386 - Uplift u2f-hid-rs 0.2.2, Windows aarch64 fix r=keeler 2018-10-05 00:05:04 +00:00
LICENSE
README.md
rustfmt.toml

README.md

A Rust HID library for interacting with U2F Security Keys

Build Status Maturity Level

This is a cross-platform library for interacting with U2F Security Key-type devices via Rust.

  • Supported Platforms: Windows, Linux, FreeBSD, and macOS.
  • Supported HID Transports: USB.
  • Supported Protocols: FIDO U2F over USB.

This library currently focuses on U2F security keys, but is expected to be extended to support additional protocols and transports.

Usage

There's only a simple example function that tries to register and sign right now. It uses env_logger for logging, which you configure with the RUST_LOG environment variable:

cargo build --example main
RUST_LOG=debug cargo run --example main

Proper usage should be to call into this library from something else - e.g., Firefox. There are some C headers exposed for the purpose.

Tests

There are some tests of the cross-platform runloop logic and the protocol decoder:

cargo test

Fuzzing

There are fuzzers for the USB protocol reader, basically fuzzing inputs from the HID layer. There are not (yet) fuzzers for the C API used by callers (such as Gecko).

To fuzz, you will need cargo-fuzz (the latest version from GitHub) as well as Rust Nightly.

rustup install nightly
cargo install --git https://github.com/rust-fuzz/cargo-fuzz/

cargo +nightly fuzz run u2f_read -- -max_len=512
cargo +nightly fuzz run u2f_read_write -- -max_len=512