2018-01-07 12:38:11 -06:00
|
|
|
// Copyright 2018 The go-ethereum Authors
|
|
|
|
// This file is part of the go-ethereum library.
|
|
|
|
//
|
|
|
|
// The go-ethereum library is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU Lesser General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// The go-ethereum library is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU Lesser General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Lesser General Public License
|
|
|
|
// along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
|
|
|
package scwallet
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"context"
|
|
|
|
"crypto/hmac"
|
|
|
|
"crypto/sha256"
|
|
|
|
"crypto/sha512"
|
|
|
|
"encoding/asn1"
|
|
|
|
"encoding/binary"
|
|
|
|
"errors"
|
|
|
|
"fmt"
|
|
|
|
"math/big"
|
2019-05-03 10:17:45 -05:00
|
|
|
"regexp"
|
2018-04-20 02:37:45 -05:00
|
|
|
"sort"
|
2018-01-07 12:38:11 -06:00
|
|
|
"strings"
|
|
|
|
"sync"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
ethereum "github.com/ethereum/go-ethereum"
|
|
|
|
"github.com/ethereum/go-ethereum/accounts"
|
|
|
|
"github.com/ethereum/go-ethereum/common"
|
|
|
|
"github.com/ethereum/go-ethereum/core/types"
|
|
|
|
"github.com/ethereum/go-ethereum/crypto"
|
|
|
|
"github.com/ethereum/go-ethereum/log"
|
2019-03-14 17:03:13 -05:00
|
|
|
pcsc "github.com/gballet/go-libpcsclite"
|
2019-03-20 09:30:15 -05:00
|
|
|
"github.com/status-im/keycard-go/derivationpath"
|
2018-01-07 12:38:11 -06:00
|
|
|
)
|
|
|
|
|
2019-03-14 17:03:13 -05:00
|
|
|
// ErrPairingPasswordNeeded is returned if opening the smart card requires pairing with a pairing
|
|
|
|
// password. In this case, the calling application should request user input to enter
|
|
|
|
// the pairing password and send it back.
|
|
|
|
var ErrPairingPasswordNeeded = errors.New("smartcard: pairing password needed")
|
2018-04-18 05:59:32 -05:00
|
|
|
|
|
|
|
// ErrPINNeeded is returned if opening the smart card requires a PIN code. In
|
|
|
|
// this case, the calling application should request user input to enter the PIN
|
|
|
|
// and send it back.
|
|
|
|
var ErrPINNeeded = errors.New("smartcard: pin needed")
|
|
|
|
|
2018-04-20 02:37:45 -05:00
|
|
|
// ErrPINUnblockNeeded is returned if opening the smart card requires a PIN code,
|
|
|
|
// but all PIN attempts have already been exhausted. In this case the calling
|
|
|
|
// application should request user input for the PUK and a new PIN code to set
|
|
|
|
// fo the card.
|
|
|
|
var ErrPINUnblockNeeded = errors.New("smartcard: pin unblock needed")
|
|
|
|
|
2018-04-18 05:59:32 -05:00
|
|
|
// ErrAlreadyOpen is returned if the smart card is attempted to be opened, but
|
|
|
|
// there is already a paired and unlocked session.
|
|
|
|
var ErrAlreadyOpen = errors.New("smartcard: already open")
|
|
|
|
|
|
|
|
// ErrPubkeyMismatch is returned if the public key recovered from a signature
|
|
|
|
// does not match the one expected by the user.
|
|
|
|
var ErrPubkeyMismatch = errors.New("smartcard: recovered public key mismatch")
|
|
|
|
|
2018-01-07 12:38:11 -06:00
|
|
|
var (
|
2019-03-20 09:30:15 -05:00
|
|
|
appletAID = []byte{0xA0, 0x00, 0x00, 0x08, 0x04, 0x00, 0x01, 0x01, 0x01}
|
|
|
|
// DerivationSignatureHash is used to derive the public key from the signature of this hash
|
|
|
|
DerivationSignatureHash = sha256.Sum256(common.Hash{}.Bytes())
|
2018-01-07 12:38:11 -06:00
|
|
|
)
|
|
|
|
|
2019-03-20 13:21:36 -05:00
|
|
|
// List of APDU command-related constants
|
2018-01-07 12:38:11 -06:00
|
|
|
const (
|
2018-04-20 02:37:45 -05:00
|
|
|
claISO7816 = 0
|
|
|
|
claSCWallet = 0x80
|
|
|
|
|
|
|
|
insSelect = 0xA4
|
|
|
|
insGetResponse = 0xC0
|
|
|
|
sw1GetResponse = 0x61
|
|
|
|
sw1Ok = 0x90
|
|
|
|
|
2019-03-20 13:21:36 -05:00
|
|
|
insVerifyPin = 0x20
|
|
|
|
insUnblockPin = 0x22
|
|
|
|
insExportKey = 0xC2
|
|
|
|
insSign = 0xC0
|
|
|
|
insLoadKey = 0xD0
|
|
|
|
insDeriveKey = 0xD1
|
|
|
|
insStatus = 0xF2
|
|
|
|
)
|
|
|
|
|
|
|
|
// List of ADPU command parameters
|
|
|
|
const (
|
2019-03-19 17:14:31 -05:00
|
|
|
P1DeriveKeyFromMaster = uint8(0x00)
|
|
|
|
P1DeriveKeyFromParent = uint8(0x01)
|
|
|
|
P1DeriveKeyFromCurrent = uint8(0x10)
|
|
|
|
statusP1WalletStatus = uint8(0x00)
|
|
|
|
statusP1Path = uint8(0x01)
|
|
|
|
signP1PrecomputedHash = uint8(0x01)
|
|
|
|
signP2OnlyBlock = uint8(0x81)
|
|
|
|
exportP1Any = uint8(0x00)
|
|
|
|
exportP2Pubkey = uint8(0x01)
|
2018-01-07 12:38:11 -06:00
|
|
|
)
|
|
|
|
|
2019-03-20 13:21:36 -05:00
|
|
|
// Minimum time to wait between self derivation attempts, even it the user is
|
|
|
|
// requesting accounts like crazy.
|
|
|
|
const selfDeriveThrottling = time.Second
|
|
|
|
|
2018-01-07 12:38:11 -06:00
|
|
|
// Wallet represents a smartcard wallet instance.
|
|
|
|
type Wallet struct {
|
|
|
|
Hub *Hub // A handle to the Hub that instantiated this wallet.
|
|
|
|
PublicKey []byte // The wallet's public key (used for communication and identification, not signing!)
|
|
|
|
|
2019-03-14 17:03:13 -05:00
|
|
|
lock sync.Mutex // Lock that gates access to struct fields and communication with the card
|
|
|
|
card *pcsc.Card // A handle to the smartcard interface for the wallet.
|
|
|
|
session *Session // The secure communication session with the card
|
|
|
|
log log.Logger // Contextual logger to tag the base with its id
|
2018-04-19 05:39:33 -05:00
|
|
|
|
2019-04-10 05:09:08 -05:00
|
|
|
deriveNextPaths []accounts.DerivationPath // Next derivation paths for account auto-discovery (multiple bases supported)
|
|
|
|
deriveNextAddrs []common.Address // Next derived account addresses for auto-discovery (multiple bases supported)
|
|
|
|
deriveChain ethereum.ChainStateReader // Blockchain state reader to discover used account with
|
|
|
|
deriveReq chan chan struct{} // Channel to request a self-derivation on
|
|
|
|
deriveQuit chan chan error // Channel to terminate the self-deriver with
|
2018-01-07 12:38:11 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
// NewWallet constructs and returns a new Wallet instance.
|
2019-03-14 17:03:13 -05:00
|
|
|
func NewWallet(hub *Hub, card *pcsc.Card) *Wallet {
|
2018-01-07 12:38:11 -06:00
|
|
|
wallet := &Wallet{
|
|
|
|
Hub: hub,
|
|
|
|
card: card,
|
|
|
|
}
|
|
|
|
return wallet
|
|
|
|
}
|
|
|
|
|
|
|
|
// transmit sends an APDU to the smartcard and receives and decodes the response.
|
|
|
|
// It automatically handles requests by the card to fetch the return data separately,
|
|
|
|
// and returns an error if the response status code is not success.
|
2019-03-14 17:03:13 -05:00
|
|
|
func transmit(card *pcsc.Card, command *commandAPDU) (*responseAPDU, error) {
|
2018-01-07 12:38:11 -06:00
|
|
|
data, err := command.serialize()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2019-03-14 17:03:13 -05:00
|
|
|
responseData, _, err := card.Transmit(data)
|
2018-01-07 12:38:11 -06:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2018-04-20 02:37:45 -05:00
|
|
|
response := new(responseAPDU)
|
2018-01-07 12:38:11 -06:00
|
|
|
if err = response.deserialize(responseData); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Are we being asked to fetch the response separately?
|
2018-02-22 07:27:41 -06:00
|
|
|
if response.Sw1 == sw1GetResponse && (command.Cla != claISO7816 || command.Ins != insGetResponse) {
|
2018-04-20 02:37:45 -05:00
|
|
|
return transmit(card, &commandAPDU{
|
2018-02-22 07:27:41 -06:00
|
|
|
Cla: claISO7816,
|
|
|
|
Ins: insGetResponse,
|
2018-01-07 12:38:11 -06:00
|
|
|
P1: 0,
|
|
|
|
P2: 0,
|
|
|
|
Data: nil,
|
|
|
|
Le: response.Sw2,
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2018-02-22 07:27:41 -06:00
|
|
|
if response.Sw1 != sw1Ok {
|
2019-11-29 04:42:53 -06:00
|
|
|
return nil, fmt.Errorf("unexpected insecure response status Cla=0x%x, Ins=0x%x, Sw=0x%x%x", command.Cla, command.Ins, response.Sw1, response.Sw2)
|
2018-01-07 12:38:11 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
return response, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// applicationInfo encodes information about the smartcard application - its
|
|
|
|
// instance UID and public key.
|
|
|
|
type applicationInfo struct {
|
|
|
|
InstanceUID []byte `asn1:"tag:15"`
|
|
|
|
PublicKey []byte `asn1:"tag:0"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// connect connects to the wallet application and establishes a secure channel with it.
|
|
|
|
// must be called before any other interaction with the wallet.
|
|
|
|
func (w *Wallet) connect() error {
|
|
|
|
w.lock.Lock()
|
|
|
|
defer w.lock.Unlock()
|
|
|
|
|
|
|
|
appinfo, err := w.doselect()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
channel, err := NewSecureChannelSession(w.card, appinfo.PublicKey)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
w.PublicKey = appinfo.PublicKey
|
|
|
|
w.log = log.New("url", w.URL())
|
|
|
|
w.session = &Session{
|
|
|
|
Wallet: w,
|
|
|
|
Channel: channel,
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// doselect is an internal (unlocked) function to send a SELECT APDU to the card.
|
|
|
|
func (w *Wallet) doselect() (*applicationInfo, error) {
|
2018-04-20 02:37:45 -05:00
|
|
|
response, err := transmit(w.card, &commandAPDU{
|
2018-02-22 07:27:41 -06:00
|
|
|
Cla: claISO7816,
|
|
|
|
Ins: insSelect,
|
2018-01-07 12:38:11 -06:00
|
|
|
P1: 4,
|
|
|
|
P2: 0,
|
2018-02-22 07:27:41 -06:00
|
|
|
Data: appletAID,
|
2018-01-07 12:38:11 -06:00
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
appinfo := new(applicationInfo)
|
|
|
|
if _, err := asn1.UnmarshalWithParams(response.Data, appinfo, "tag:4"); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return appinfo, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// ping checks the card's status and returns an error if unsuccessful.
|
|
|
|
func (w *Wallet) ping() error {
|
|
|
|
w.lock.Lock()
|
|
|
|
defer w.lock.Unlock()
|
|
|
|
|
2018-04-20 02:37:45 -05:00
|
|
|
// We can't ping if not paired
|
2018-01-07 12:38:11 -06:00
|
|
|
if !w.session.paired() {
|
|
|
|
return nil
|
|
|
|
}
|
2018-04-20 02:37:45 -05:00
|
|
|
if _, err := w.session.walletStatus(); err != nil {
|
2018-01-07 12:38:11 -06:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// release releases any resources held by an open wallet instance.
|
|
|
|
func (w *Wallet) release() error {
|
|
|
|
if w.session != nil {
|
|
|
|
return w.session.release()
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// pair is an internal (unlocked) function for establishing a new pairing
|
|
|
|
// with the wallet.
|
|
|
|
func (w *Wallet) pair(puk []byte) error {
|
|
|
|
if w.session.paired() {
|
2019-11-29 04:42:53 -06:00
|
|
|
return fmt.Errorf("wallet already paired")
|
2018-01-07 12:38:11 -06:00
|
|
|
}
|
|
|
|
pairing, err := w.session.pair(puk)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err = w.Hub.setPairing(w, &pairing); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return w.session.authenticate(pairing)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Unpair deletes an existing wallet pairing.
|
|
|
|
func (w *Wallet) Unpair(pin []byte) error {
|
|
|
|
w.lock.Lock()
|
|
|
|
defer w.lock.Unlock()
|
|
|
|
|
|
|
|
if !w.session.paired() {
|
2018-04-18 05:59:32 -05:00
|
|
|
return fmt.Errorf("wallet %x not paired", w.PublicKey)
|
2018-01-07 12:38:11 -06:00
|
|
|
}
|
|
|
|
if err := w.session.verifyPin(pin); err != nil {
|
2018-04-18 05:59:32 -05:00
|
|
|
return fmt.Errorf("failed to verify pin: %s", err)
|
2018-01-07 12:38:11 -06:00
|
|
|
}
|
|
|
|
if err := w.session.unpair(); err != nil {
|
2018-04-18 05:59:32 -05:00
|
|
|
return fmt.Errorf("failed to unpair: %s", err)
|
2018-01-07 12:38:11 -06:00
|
|
|
}
|
|
|
|
if err := w.Hub.setPairing(w, nil); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// URL retrieves the canonical path under which this wallet is reachable. It is
|
|
|
|
// user by upper layers to define a sorting order over all wallets from multiple
|
|
|
|
// backends.
|
|
|
|
func (w *Wallet) URL() accounts.URL {
|
|
|
|
return accounts.URL{
|
|
|
|
Scheme: w.Hub.scheme,
|
2018-04-19 05:39:33 -05:00
|
|
|
Path: fmt.Sprintf("%x", w.PublicKey[1:5]), // Byte #0 isn't unique; 1:5 covers << 64K cards, bump to 1:9 for << 4M
|
2018-01-07 12:38:11 -06:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Status returns a textual status to aid the user in the current state of the
|
|
|
|
// wallet. It also returns an error indicating any failure the wallet might have
|
|
|
|
// encountered.
|
|
|
|
func (w *Wallet) Status() (string, error) {
|
|
|
|
w.lock.Lock()
|
|
|
|
defer w.lock.Unlock()
|
|
|
|
|
2018-04-20 02:37:45 -05:00
|
|
|
// If the card is not paired, we can only wait
|
2018-01-07 12:38:11 -06:00
|
|
|
if !w.session.paired() {
|
2019-04-10 05:46:35 -05:00
|
|
|
return "Unpaired, waiting for pairing password", nil
|
2018-01-07 12:38:11 -06:00
|
|
|
}
|
2018-04-20 02:37:45 -05:00
|
|
|
// Yay, we have an encrypted session, retrieve the actual status
|
|
|
|
status, err := w.session.walletStatus()
|
2018-01-07 12:38:11 -06:00
|
|
|
if err != nil {
|
2018-04-20 02:37:45 -05:00
|
|
|
return fmt.Sprintf("Failed: %v", err), err
|
|
|
|
}
|
|
|
|
switch {
|
2019-05-03 10:17:45 -05:00
|
|
|
case !w.session.verified && status.PinRetryCount == 0 && status.PukRetryCount == 0:
|
2020-04-08 03:07:29 -05:00
|
|
|
return "Bricked, waiting for full wipe", nil
|
2018-04-20 02:37:45 -05:00
|
|
|
case !w.session.verified && status.PinRetryCount == 0:
|
2019-05-03 10:17:45 -05:00
|
|
|
return fmt.Sprintf("Blocked, waiting for PUK (%d attempts left) and new PIN", status.PukRetryCount), nil
|
2018-04-20 02:37:45 -05:00
|
|
|
case !w.session.verified:
|
|
|
|
return fmt.Sprintf("Locked, waiting for PIN (%d attempts left)", status.PinRetryCount), nil
|
|
|
|
case !status.Initialized:
|
2020-04-08 03:07:29 -05:00
|
|
|
return "Empty, waiting for initialization", nil
|
2018-04-20 02:37:45 -05:00
|
|
|
default:
|
2020-04-08 03:07:29 -05:00
|
|
|
return "Online", nil
|
2018-01-07 12:38:11 -06:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Open initializes access to a wallet instance. It is not meant to unlock or
|
|
|
|
// decrypt account keys, rather simply to establish a connection to hardware
|
|
|
|
// wallets and/or to access derivation seeds.
|
|
|
|
//
|
|
|
|
// The passphrase parameter may or may not be used by the implementation of a
|
|
|
|
// particular wallet instance. The reason there is no passwordless open method
|
|
|
|
// is to strive towards a uniform wallet handling, oblivious to the different
|
|
|
|
// backend providers.
|
|
|
|
//
|
|
|
|
// Please note, if you open a wallet, you must close it to release any allocated
|
|
|
|
// resources (especially important when working with hardware wallets).
|
|
|
|
func (w *Wallet) Open(passphrase string) error {
|
|
|
|
w.lock.Lock()
|
|
|
|
defer w.lock.Unlock()
|
|
|
|
|
2018-04-18 05:59:32 -05:00
|
|
|
// If the session is already open, bail out
|
2018-01-07 12:38:11 -06:00
|
|
|
if w.session.verified {
|
2018-04-18 05:59:32 -05:00
|
|
|
return ErrAlreadyOpen
|
2018-01-07 12:38:11 -06:00
|
|
|
}
|
2018-04-18 05:59:32 -05:00
|
|
|
// If the smart card is not yet paired, attempt to do so either from a previous
|
|
|
|
// pairing key or form the supplied PUK code.
|
2018-01-07 12:38:11 -06:00
|
|
|
if !w.session.paired() {
|
2018-04-18 05:59:32 -05:00
|
|
|
// If a previous pairing exists, only ever try to use that
|
2018-04-20 02:37:45 -05:00
|
|
|
if pairing := w.Hub.pairing(w); pairing != nil {
|
2018-01-07 12:38:11 -06:00
|
|
|
if err := w.session.authenticate(*pairing); err != nil {
|
2018-04-18 05:59:32 -05:00
|
|
|
return fmt.Errorf("failed to authenticate card %x: %s", w.PublicKey[:4], err)
|
2018-01-07 12:38:11 -06:00
|
|
|
}
|
2018-04-20 02:37:45 -05:00
|
|
|
// Pairing still ok, fall through to PIN checks
|
|
|
|
} else {
|
|
|
|
// If no passphrase was supplied, request the PUK from the user
|
|
|
|
if passphrase == "" {
|
2019-03-14 17:03:13 -05:00
|
|
|
return ErrPairingPasswordNeeded
|
2018-04-20 02:37:45 -05:00
|
|
|
}
|
|
|
|
// Attempt to pair the smart card with the user supplied PUK
|
|
|
|
if err := w.pair([]byte(passphrase)); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
// Pairing succeeded, fall through to PIN checks. This will of course fail,
|
2020-05-25 03:21:28 -05:00
|
|
|
// but we can't return ErrPINNeeded directly here because we don't know whether
|
2018-04-20 02:37:45 -05:00
|
|
|
// a PIN check or a PIN reset is needed.
|
|
|
|
passphrase = ""
|
2018-04-18 05:59:32 -05:00
|
|
|
}
|
2018-04-20 02:37:45 -05:00
|
|
|
}
|
|
|
|
// The smart card was successfully paired, retrieve its status to check whether
|
|
|
|
// PIN verification or unblocking is needed.
|
|
|
|
status, err := w.session.walletStatus()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
// Request the appropriate next authentication data, or use the one supplied
|
|
|
|
switch {
|
|
|
|
case passphrase == "" && status.PinRetryCount > 0:
|
|
|
|
return ErrPINNeeded
|
|
|
|
case passphrase == "":
|
|
|
|
return ErrPINUnblockNeeded
|
|
|
|
case status.PinRetryCount > 0:
|
2019-05-03 10:17:45 -05:00
|
|
|
if !regexp.MustCompile(`^[0-9]{6,}$`).MatchString(passphrase) {
|
|
|
|
w.log.Error("PIN needs to be at least 6 digits")
|
|
|
|
return ErrPINNeeded
|
|
|
|
}
|
2018-04-20 02:37:45 -05:00
|
|
|
if err := w.session.verifyPin([]byte(passphrase)); err != nil {
|
|
|
|
return err
|
2018-01-07 12:38:11 -06:00
|
|
|
}
|
2018-04-20 02:37:45 -05:00
|
|
|
default:
|
2019-05-03 10:17:45 -05:00
|
|
|
if !regexp.MustCompile(`^[0-9]{12,}$`).MatchString(passphrase) {
|
|
|
|
w.log.Error("PUK needs to be at least 12 digits")
|
|
|
|
return ErrPINUnblockNeeded
|
|
|
|
}
|
2018-04-20 02:37:45 -05:00
|
|
|
if err := w.session.unblockPin([]byte(passphrase)); err != nil {
|
2018-04-18 05:59:32 -05:00
|
|
|
return err
|
|
|
|
}
|
2018-01-07 12:38:11 -06:00
|
|
|
}
|
2018-04-18 05:59:32 -05:00
|
|
|
// Smart card paired and unlocked, initialize and register
|
2018-01-07 12:38:11 -06:00
|
|
|
w.deriveReq = make(chan chan struct{})
|
|
|
|
w.deriveQuit = make(chan chan error)
|
|
|
|
|
2019-04-10 04:51:22 -05:00
|
|
|
go w.selfDerive()
|
2018-01-07 12:38:11 -06:00
|
|
|
|
|
|
|
// Notify anyone listening for wallet events that a new device is accessible
|
|
|
|
go w.Hub.updateFeed.Send(accounts.WalletEvent{Wallet: w, Kind: accounts.WalletOpened})
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Close stops and closes the wallet, freeing any resources.
|
|
|
|
func (w *Wallet) Close() error {
|
|
|
|
// Ensure the wallet was opened
|
|
|
|
w.lock.Lock()
|
|
|
|
dQuit := w.deriveQuit
|
|
|
|
w.lock.Unlock()
|
|
|
|
|
|
|
|
// Terminate the self-derivations
|
|
|
|
var derr error
|
|
|
|
if dQuit != nil {
|
|
|
|
errc := make(chan error)
|
|
|
|
dQuit <- errc
|
|
|
|
derr = <-errc // Save for later, we *must* close the USB
|
|
|
|
}
|
|
|
|
// Terminate the device connection
|
|
|
|
w.lock.Lock()
|
|
|
|
defer w.lock.Unlock()
|
|
|
|
|
|
|
|
w.deriveQuit = nil
|
|
|
|
w.deriveReq = nil
|
|
|
|
|
|
|
|
if err := w.release(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return derr
|
|
|
|
}
|
|
|
|
|
|
|
|
// selfDerive is an account derivation loop that upon request attempts to find
|
2019-04-10 04:51:22 -05:00
|
|
|
// new non-zero accounts.
|
|
|
|
func (w *Wallet) selfDerive() {
|
2018-04-19 05:39:33 -05:00
|
|
|
w.log.Debug("Smart card wallet self-derivation started")
|
|
|
|
defer w.log.Debug("Smart card wallet self-derivation stopped")
|
2018-01-07 12:38:11 -06:00
|
|
|
|
|
|
|
// Execute self-derivations until termination or error
|
|
|
|
var (
|
|
|
|
reqc chan struct{}
|
|
|
|
errc chan error
|
|
|
|
err error
|
|
|
|
)
|
|
|
|
for errc == nil && err == nil {
|
|
|
|
// Wait until either derivation or termination is requested
|
|
|
|
select {
|
|
|
|
case errc = <-w.deriveQuit:
|
|
|
|
// Termination requested
|
|
|
|
continue
|
|
|
|
case reqc = <-w.deriveReq:
|
|
|
|
// Account discovery requested
|
|
|
|
}
|
|
|
|
// Derivation needs a chain and device access, skip if either unavailable
|
|
|
|
w.lock.Lock()
|
|
|
|
if w.session == nil || w.deriveChain == nil {
|
|
|
|
w.lock.Unlock()
|
|
|
|
reqc <- struct{}{}
|
|
|
|
continue
|
|
|
|
}
|
2018-04-20 02:37:45 -05:00
|
|
|
pairing := w.Hub.pairing(w)
|
2018-01-07 12:38:11 -06:00
|
|
|
|
|
|
|
// Device lock obtained, derive the next batch of accounts
|
|
|
|
var (
|
2018-04-19 05:39:33 -05:00
|
|
|
paths []accounts.DerivationPath
|
|
|
|
nextAcc accounts.Account
|
|
|
|
|
2019-04-10 05:09:08 -05:00
|
|
|
nextPaths = append([]accounts.DerivationPath{}, w.deriveNextPaths...)
|
|
|
|
nextAddrs = append([]common.Address{}, w.deriveNextAddrs...)
|
2018-01-07 12:38:11 -06:00
|
|
|
|
|
|
|
context = context.Background()
|
|
|
|
)
|
2019-04-10 05:09:08 -05:00
|
|
|
for i := 0; i < len(nextAddrs); i++ {
|
|
|
|
for empty := false; !empty; {
|
|
|
|
// Retrieve the next derived Ethereum account
|
|
|
|
if nextAddrs[i] == (common.Address{}) {
|
|
|
|
if nextAcc, err = w.session.derive(nextPaths[i]); err != nil {
|
|
|
|
w.log.Warn("Smartcard wallet account derivation failed", "err", err)
|
|
|
|
break
|
|
|
|
}
|
|
|
|
nextAddrs[i] = nextAcc.Address
|
|
|
|
}
|
|
|
|
// Check the account's status against the current chain state
|
|
|
|
var (
|
|
|
|
balance *big.Int
|
|
|
|
nonce uint64
|
|
|
|
)
|
|
|
|
balance, err = w.deriveChain.BalanceAt(context, nextAddrs[i], nil)
|
|
|
|
if err != nil {
|
|
|
|
w.log.Warn("Smartcard wallet balance retrieval failed", "err", err)
|
2018-01-07 12:38:11 -06:00
|
|
|
break
|
|
|
|
}
|
2019-04-10 05:09:08 -05:00
|
|
|
nonce, err = w.deriveChain.NonceAt(context, nextAddrs[i], nil)
|
|
|
|
if err != nil {
|
|
|
|
w.log.Warn("Smartcard wallet nonce retrieval failed", "err", err)
|
|
|
|
break
|
|
|
|
}
|
|
|
|
// If the next account is empty, stop self-derivation, but add for the last base path
|
|
|
|
if balance.Sign() == 0 && nonce == 0 {
|
|
|
|
empty = true
|
|
|
|
if i < len(nextAddrs)-1 {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// We've just self-derived a new account, start tracking it locally
|
|
|
|
path := make(accounts.DerivationPath, len(nextPaths[i]))
|
|
|
|
copy(path[:], nextPaths[i][:])
|
|
|
|
paths = append(paths, path)
|
|
|
|
|
|
|
|
// Display a log message to the user for new (or previously empty accounts)
|
|
|
|
if _, known := pairing.Accounts[nextAddrs[i]]; !known || !empty || nextAddrs[i] != w.deriveNextAddrs[i] {
|
|
|
|
w.log.Info("Smartcard wallet discovered new account", "address", nextAddrs[i], "path", path, "balance", balance, "nonce", nonce)
|
|
|
|
}
|
|
|
|
pairing.Accounts[nextAddrs[i]] = path
|
2018-01-07 12:38:11 -06:00
|
|
|
|
2019-04-10 05:09:08 -05:00
|
|
|
// Fetch the next potential account
|
|
|
|
if !empty {
|
|
|
|
nextAddrs[i] = common.Address{}
|
|
|
|
nextPaths[i][len(nextPaths[i])-1]++
|
|
|
|
}
|
2018-01-07 12:38:11 -06:00
|
|
|
}
|
|
|
|
}
|
|
|
|
// If there are new accounts, write them out
|
|
|
|
if len(paths) > 0 {
|
|
|
|
err = w.Hub.setPairing(w, pairing)
|
|
|
|
}
|
|
|
|
// Shift the self-derivation forward
|
2019-04-10 05:09:08 -05:00
|
|
|
w.deriveNextAddrs = nextAddrs
|
|
|
|
w.deriveNextPaths = nextPaths
|
2018-01-07 12:38:11 -06:00
|
|
|
|
|
|
|
// Self derivation complete, release device lock
|
|
|
|
w.lock.Unlock()
|
|
|
|
|
|
|
|
// Notify the user of termination and loop after a bit of time (to avoid trashing)
|
|
|
|
reqc <- struct{}{}
|
|
|
|
if err == nil {
|
|
|
|
select {
|
|
|
|
case errc = <-w.deriveQuit:
|
|
|
|
// Termination requested, abort
|
|
|
|
case <-time.After(selfDeriveThrottling):
|
|
|
|
// Waited enough, willing to self-derive again
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// In case of error, wait for termination
|
|
|
|
if err != nil {
|
|
|
|
w.log.Debug("Smartcard wallet self-derivation failed", "err", err)
|
|
|
|
errc = <-w.deriveQuit
|
|
|
|
}
|
|
|
|
errc <- err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Accounts retrieves the list of signing accounts the wallet is currently aware
|
|
|
|
// of. For hierarchical deterministic wallets, the list will not be exhaustive,
|
|
|
|
// rather only contain the accounts explicitly pinned during account derivation.
|
|
|
|
func (w *Wallet) Accounts() []accounts.Account {
|
|
|
|
// Attempt self-derivation if it's running
|
|
|
|
reqc := make(chan struct{}, 1)
|
|
|
|
select {
|
|
|
|
case w.deriveReq <- reqc:
|
|
|
|
// Self-derivation request accepted, wait for it
|
|
|
|
<-reqc
|
|
|
|
default:
|
|
|
|
// Self-derivation offline, throttled or busy, skip
|
|
|
|
}
|
|
|
|
|
|
|
|
w.lock.Lock()
|
|
|
|
defer w.lock.Unlock()
|
|
|
|
|
2018-04-20 02:37:45 -05:00
|
|
|
if pairing := w.Hub.pairing(w); pairing != nil {
|
2018-01-07 12:38:11 -06:00
|
|
|
ret := make([]accounts.Account, 0, len(pairing.Accounts))
|
|
|
|
for address, path := range pairing.Accounts {
|
|
|
|
ret = append(ret, w.makeAccount(address, path))
|
|
|
|
}
|
2018-04-20 02:37:45 -05:00
|
|
|
sort.Sort(accounts.AccountsByURL(ret))
|
2018-01-07 12:38:11 -06:00
|
|
|
return ret
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (w *Wallet) makeAccount(address common.Address, path accounts.DerivationPath) accounts.Account {
|
|
|
|
return accounts.Account{
|
|
|
|
Address: address,
|
|
|
|
URL: accounts.URL{
|
|
|
|
Scheme: w.Hub.scheme,
|
|
|
|
Path: fmt.Sprintf("%x/%s", w.PublicKey[1:3], path.String()),
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Contains returns whether an account is part of this particular wallet or not.
|
|
|
|
func (w *Wallet) Contains(account accounts.Account) bool {
|
2018-04-20 02:37:45 -05:00
|
|
|
if pairing := w.Hub.pairing(w); pairing != nil {
|
2018-01-07 12:38:11 -06:00
|
|
|
_, ok := pairing.Accounts[account.Address]
|
|
|
|
return ok
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
// Initialize installs a keypair generated from the provided key into the wallet.
|
|
|
|
func (w *Wallet) Initialize(seed []byte) error {
|
2019-04-10 04:51:22 -05:00
|
|
|
go w.selfDerive()
|
2019-04-02 12:28:24 -05:00
|
|
|
// DO NOT lock at this stage, as the initialize
|
|
|
|
// function relies on Status()
|
2018-01-07 12:38:11 -06:00
|
|
|
return w.session.initialize(seed)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Derive attempts to explicitly derive a hierarchical deterministic account at
|
|
|
|
// the specified derivation path. If requested, the derived account will be added
|
|
|
|
// to the wallet's tracked account list.
|
|
|
|
func (w *Wallet) Derive(path accounts.DerivationPath, pin bool) (accounts.Account, error) {
|
|
|
|
w.lock.Lock()
|
|
|
|
defer w.lock.Unlock()
|
|
|
|
|
|
|
|
account, err := w.session.derive(path)
|
|
|
|
if err != nil {
|
|
|
|
return accounts.Account{}, err
|
|
|
|
}
|
|
|
|
|
|
|
|
if pin {
|
2018-04-20 02:37:45 -05:00
|
|
|
pairing := w.Hub.pairing(w)
|
2018-01-07 12:38:11 -06:00
|
|
|
pairing.Accounts[account.Address] = path
|
|
|
|
if err := w.Hub.setPairing(w, pairing); err != nil {
|
|
|
|
return accounts.Account{}, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return account, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// SelfDerive sets a base account derivation path from which the wallet attempts
|
|
|
|
// to discover non zero accounts and automatically add them to list of tracked
|
|
|
|
// accounts.
|
|
|
|
//
|
2020-10-12 08:02:38 -05:00
|
|
|
// Note, self derivation will increment the last component of the specified path
|
2018-01-07 12:38:11 -06:00
|
|
|
// opposed to decending into a child path to allow discovering accounts starting
|
|
|
|
// from non zero components.
|
|
|
|
//
|
2019-04-10 05:09:08 -05:00
|
|
|
// Some hardware wallets switched derivation paths through their evolution, so
|
|
|
|
// this method supports providing multiple bases to discover old user accounts
|
|
|
|
// too. Only the last base will be used to derive the next empty account.
|
|
|
|
//
|
2018-01-07 12:38:11 -06:00
|
|
|
// You can disable automatic account discovery by calling SelfDerive with a nil
|
|
|
|
// chain state reader.
|
2019-04-10 05:09:08 -05:00
|
|
|
func (w *Wallet) SelfDerive(bases []accounts.DerivationPath, chain ethereum.ChainStateReader) {
|
2018-01-07 12:38:11 -06:00
|
|
|
w.lock.Lock()
|
|
|
|
defer w.lock.Unlock()
|
|
|
|
|
2019-04-10 05:09:08 -05:00
|
|
|
w.deriveNextPaths = make([]accounts.DerivationPath, len(bases))
|
|
|
|
for i, base := range bases {
|
|
|
|
w.deriveNextPaths[i] = make(accounts.DerivationPath, len(base))
|
|
|
|
copy(w.deriveNextPaths[i][:], base[:])
|
|
|
|
}
|
|
|
|
w.deriveNextAddrs = make([]common.Address, len(bases))
|
2018-01-07 12:38:11 -06:00
|
|
|
w.deriveChain = chain
|
|
|
|
}
|
|
|
|
|
2019-02-18 12:59:12 -06:00
|
|
|
// SignData requests the wallet to sign the hash of the given data.
|
2018-01-07 12:38:11 -06:00
|
|
|
//
|
|
|
|
// It looks up the account specified either solely via its address contained within,
|
|
|
|
// or optionally with the aid of any location metadata from the embedded URL field.
|
|
|
|
//
|
|
|
|
// If the wallet requires additional authentication to sign the request (e.g.
|
|
|
|
// a password to decrypt the account, or a PIN code o verify the transaction),
|
|
|
|
// an AuthNeededError instance will be returned, containing infos for the user
|
|
|
|
// about which fields or actions are needed. The user may retry by providing
|
2019-02-18 12:59:12 -06:00
|
|
|
// the needed details via SignDataWithPassphrase, or by other means (e.g. unlock
|
2018-01-07 12:38:11 -06:00
|
|
|
// the account in a keystore).
|
2019-02-18 12:59:12 -06:00
|
|
|
func (w *Wallet) SignData(account accounts.Account, mimeType string, data []byte) ([]byte, error) {
|
|
|
|
return w.signHash(account, crypto.Keccak256(data))
|
|
|
|
}
|
|
|
|
|
|
|
|
func (w *Wallet) signHash(account accounts.Account, hash []byte) ([]byte, error) {
|
2018-01-07 12:38:11 -06:00
|
|
|
w.lock.Lock()
|
|
|
|
defer w.lock.Unlock()
|
|
|
|
|
|
|
|
path, err := w.findAccountPath(account)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return w.session.sign(path, hash)
|
|
|
|
}
|
|
|
|
|
|
|
|
// SignTx requests the wallet to sign the given transaction.
|
|
|
|
//
|
|
|
|
// It looks up the account specified either solely via its address contained within,
|
|
|
|
// or optionally with the aid of any location metadata from the embedded URL field.
|
|
|
|
//
|
|
|
|
// If the wallet requires additional authentication to sign the request (e.g.
|
|
|
|
// a password to decrypt the account, or a PIN code o verify the transaction),
|
|
|
|
// an AuthNeededError instance will be returned, containing infos for the user
|
|
|
|
// about which fields or actions are needed. The user may retry by providing
|
|
|
|
// the needed details via SignTxWithPassphrase, or by other means (e.g. unlock
|
|
|
|
// the account in a keystore).
|
|
|
|
func (w *Wallet) SignTx(account accounts.Account, tx *types.Transaction, chainID *big.Int) (*types.Transaction, error) {
|
|
|
|
signer := types.NewEIP155Signer(chainID)
|
|
|
|
hash := signer.Hash(tx)
|
2019-02-18 12:59:12 -06:00
|
|
|
sig, err := w.signHash(account, hash[:])
|
2018-01-07 12:38:11 -06:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return tx.WithSignature(signer, sig)
|
|
|
|
}
|
|
|
|
|
2019-02-18 12:59:12 -06:00
|
|
|
// SignDataWithPassphrase requests the wallet to sign the given hash with the
|
2018-01-07 12:38:11 -06:00
|
|
|
// given passphrase as extra authentication information.
|
|
|
|
//
|
|
|
|
// It looks up the account specified either solely via its address contained within,
|
|
|
|
// or optionally with the aid of any location metadata from the embedded URL field.
|
2019-02-18 12:59:12 -06:00
|
|
|
func (w *Wallet) SignDataWithPassphrase(account accounts.Account, passphrase, mimeType string, data []byte) ([]byte, error) {
|
|
|
|
return w.signHashWithPassphrase(account, passphrase, crypto.Keccak256(data))
|
|
|
|
}
|
|
|
|
|
|
|
|
func (w *Wallet) signHashWithPassphrase(account accounts.Account, passphrase string, hash []byte) ([]byte, error) {
|
2018-01-07 12:38:11 -06:00
|
|
|
if !w.session.verified {
|
|
|
|
if err := w.Open(passphrase); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-02-18 12:59:12 -06:00
|
|
|
return w.signHash(account, hash)
|
|
|
|
}
|
|
|
|
|
|
|
|
// SignText requests the wallet to sign the hash of a given piece of data, prefixed
|
|
|
|
// by the Ethereum prefix scheme
|
|
|
|
// It looks up the account specified either solely via its address contained within,
|
|
|
|
// or optionally with the aid of any location metadata from the embedded URL field.
|
|
|
|
//
|
|
|
|
// If the wallet requires additional authentication to sign the request (e.g.
|
|
|
|
// a password to decrypt the account, or a PIN code o verify the transaction),
|
|
|
|
// an AuthNeededError instance will be returned, containing infos for the user
|
|
|
|
// about which fields or actions are needed. The user may retry by providing
|
|
|
|
// the needed details via SignHashWithPassphrase, or by other means (e.g. unlock
|
|
|
|
// the account in a keystore).
|
|
|
|
func (w *Wallet) SignText(account accounts.Account, text []byte) ([]byte, error) {
|
|
|
|
return w.signHash(account, accounts.TextHash(text))
|
|
|
|
}
|
|
|
|
|
|
|
|
// SignTextWithPassphrase implements accounts.Wallet, attempting to sign the
|
|
|
|
// given hash with the given account using passphrase as extra authentication
|
|
|
|
func (w *Wallet) SignTextWithPassphrase(account accounts.Account, passphrase string, text []byte) ([]byte, error) {
|
|
|
|
return w.signHashWithPassphrase(account, passphrase, crypto.Keccak256(accounts.TextHash(text)))
|
2018-01-07 12:38:11 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
// SignTxWithPassphrase requests the wallet to sign the given transaction, with the
|
|
|
|
// given passphrase as extra authentication information.
|
|
|
|
//
|
|
|
|
// It looks up the account specified either solely via its address contained within,
|
|
|
|
// or optionally with the aid of any location metadata from the embedded URL field.
|
|
|
|
func (w *Wallet) SignTxWithPassphrase(account accounts.Account, passphrase string, tx *types.Transaction, chainID *big.Int) (*types.Transaction, error) {
|
|
|
|
if !w.session.verified {
|
|
|
|
if err := w.Open(passphrase); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return w.SignTx(account, tx, chainID)
|
|
|
|
}
|
|
|
|
|
|
|
|
// findAccountPath returns the derivation path for the provided account.
|
|
|
|
// It first checks for the address in the list of pinned accounts, and if it is
|
|
|
|
// not found, attempts to parse the derivation path from the account's URL.
|
|
|
|
func (w *Wallet) findAccountPath(account accounts.Account) (accounts.DerivationPath, error) {
|
2018-04-20 02:37:45 -05:00
|
|
|
pairing := w.Hub.pairing(w)
|
2018-01-07 12:38:11 -06:00
|
|
|
if path, ok := pairing.Accounts[account.Address]; ok {
|
|
|
|
return path, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Look for the path in the URL
|
|
|
|
if account.URL.Scheme != w.Hub.scheme {
|
2019-11-29 04:42:53 -06:00
|
|
|
return nil, fmt.Errorf("scheme %s does not match wallet scheme %s", account.URL.Scheme, w.Hub.scheme)
|
2018-01-07 12:38:11 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
parts := strings.SplitN(account.URL.Path, "/", 2)
|
|
|
|
if len(parts) != 2 {
|
2019-11-29 04:42:53 -06:00
|
|
|
return nil, fmt.Errorf("invalid URL format: %s", account.URL)
|
2018-01-07 12:38:11 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
if parts[0] != fmt.Sprintf("%x", w.PublicKey[1:3]) {
|
|
|
|
return nil, fmt.Errorf("URL %s is not for this wallet", account.URL)
|
|
|
|
}
|
|
|
|
|
|
|
|
return accounts.ParseDerivationPath(parts[1])
|
|
|
|
}
|
|
|
|
|
2018-02-22 07:27:41 -06:00
|
|
|
// Session represents a secured communication session with the wallet.
|
2018-01-07 12:38:11 -06:00
|
|
|
type Session struct {
|
|
|
|
Wallet *Wallet // A handle to the wallet that opened the session
|
|
|
|
Channel *SecureChannelSession // A secure channel for encrypted messages
|
|
|
|
verified bool // Whether the pin has been verified in this session.
|
|
|
|
}
|
|
|
|
|
|
|
|
// pair establishes a new pairing over this channel, using the provided secret.
|
2018-02-22 07:27:41 -06:00
|
|
|
func (s *Session) pair(secret []byte) (smartcardPairing, error) {
|
2018-01-07 12:38:11 -06:00
|
|
|
err := s.Channel.Pair(secret)
|
|
|
|
if err != nil {
|
2018-02-22 07:27:41 -06:00
|
|
|
return smartcardPairing{}, err
|
2018-01-07 12:38:11 -06:00
|
|
|
}
|
|
|
|
|
2018-02-22 07:27:41 -06:00
|
|
|
return smartcardPairing{
|
2018-01-07 12:38:11 -06:00
|
|
|
PublicKey: s.Wallet.PublicKey,
|
|
|
|
PairingIndex: s.Channel.PairingIndex,
|
|
|
|
PairingKey: s.Channel.PairingKey,
|
|
|
|
Accounts: make(map[common.Address]accounts.DerivationPath),
|
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
2018-02-22 07:27:41 -06:00
|
|
|
// unpair deletes an existing pairing.
|
2018-01-07 12:38:11 -06:00
|
|
|
func (s *Session) unpair() error {
|
|
|
|
if !s.verified {
|
2019-11-29 04:42:53 -06:00
|
|
|
return fmt.Errorf("unpair requires that the PIN be verified")
|
2018-01-07 12:38:11 -06:00
|
|
|
}
|
|
|
|
return s.Channel.Unpair()
|
|
|
|
}
|
|
|
|
|
2018-02-22 07:27:41 -06:00
|
|
|
// verifyPin unlocks a wallet with the provided pin.
|
2018-01-07 12:38:11 -06:00
|
|
|
func (s *Session) verifyPin(pin []byte) error {
|
2019-03-23 02:45:08 -05:00
|
|
|
if _, err := s.Channel.transmitEncrypted(claSCWallet, insVerifyPin, 0, 0, pin); err != nil {
|
2018-01-07 12:38:11 -06:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
s.verified = true
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2018-04-20 02:37:45 -05:00
|
|
|
// unblockPin unblocks a wallet with the provided puk and resets the pin to the
|
|
|
|
// new one specified.
|
|
|
|
func (s *Session) unblockPin(pukpin []byte) error {
|
2019-03-23 02:45:08 -05:00
|
|
|
if _, err := s.Channel.transmitEncrypted(claSCWallet, insUnblockPin, 0, 0, pukpin); err != nil {
|
2018-04-20 02:37:45 -05:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
s.verified = true
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2018-02-22 07:27:41 -06:00
|
|
|
// release releases resources associated with the channel.
|
2018-01-07 12:38:11 -06:00
|
|
|
func (s *Session) release() error {
|
2019-03-14 17:03:13 -05:00
|
|
|
return s.Wallet.card.Disconnect(pcsc.LeaveCard)
|
2018-01-07 12:38:11 -06:00
|
|
|
}
|
|
|
|
|
2018-02-22 07:27:41 -06:00
|
|
|
// paired returns true if a valid pairing exists.
|
2018-01-07 12:38:11 -06:00
|
|
|
func (s *Session) paired() bool {
|
|
|
|
return s.Channel.PairingKey != nil
|
|
|
|
}
|
|
|
|
|
2018-02-22 07:27:41 -06:00
|
|
|
// authenticate uses an existing pairing to establish a secure channel.
|
|
|
|
func (s *Session) authenticate(pairing smartcardPairing) error {
|
2018-01-07 12:38:11 -06:00
|
|
|
if !bytes.Equal(s.Wallet.PublicKey, pairing.PublicKey) {
|
2019-11-29 04:42:53 -06:00
|
|
|
return fmt.Errorf("cannot pair using another wallet's pairing; %x != %x", s.Wallet.PublicKey, pairing.PublicKey)
|
2018-01-07 12:38:11 -06:00
|
|
|
}
|
|
|
|
s.Channel.PairingKey = pairing.PairingKey
|
|
|
|
s.Channel.PairingIndex = pairing.PairingIndex
|
|
|
|
return s.Channel.Open()
|
|
|
|
}
|
|
|
|
|
2018-02-22 07:27:41 -06:00
|
|
|
// walletStatus describes a smartcard wallet's status information.
|
2018-01-07 12:38:11 -06:00
|
|
|
type walletStatus struct {
|
2019-03-22 13:52:23 -05:00
|
|
|
PinRetryCount int // Number of remaining PIN retries
|
|
|
|
PukRetryCount int // Number of remaining PUK retries
|
|
|
|
Initialized bool // Whether the card has been initialized with a private key
|
2018-01-07 12:38:11 -06:00
|
|
|
}
|
|
|
|
|
2018-04-20 02:37:45 -05:00
|
|
|
// walletStatus fetches the wallet's status from the card.
|
|
|
|
func (s *Session) walletStatus() (*walletStatus, error) {
|
2019-03-23 02:45:08 -05:00
|
|
|
response, err := s.Channel.transmitEncrypted(claSCWallet, insStatus, statusP1WalletStatus, 0, nil)
|
2018-01-07 12:38:11 -06:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2019-03-15 13:04:10 -05:00
|
|
|
|
2019-03-23 11:13:02 -05:00
|
|
|
status := new(walletStatus)
|
|
|
|
if _, err := asn1.UnmarshalWithParams(response.Data, status, "tag:3"); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2018-01-07 12:38:11 -06:00
|
|
|
return status, nil
|
|
|
|
}
|
|
|
|
|
2018-04-20 02:37:45 -05:00
|
|
|
// derivationPath fetches the wallet's current derivation path from the card.
|
2019-11-29 04:42:53 -06:00
|
|
|
//lint:ignore U1000 needs to be added to the console interface
|
2018-04-20 02:37:45 -05:00
|
|
|
func (s *Session) derivationPath() (accounts.DerivationPath, error) {
|
2019-03-23 02:45:08 -05:00
|
|
|
response, err := s.Channel.transmitEncrypted(claSCWallet, insStatus, statusP1Path, 0, nil)
|
2018-01-07 12:38:11 -06:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
buf := bytes.NewReader(response.Data)
|
|
|
|
path := make(accounts.DerivationPath, len(response.Data)/4)
|
|
|
|
return path, binary.Read(buf, binary.BigEndian, &path)
|
|
|
|
}
|
|
|
|
|
2018-02-22 07:27:41 -06:00
|
|
|
// initializeData contains data needed to initialize the smartcard wallet.
|
2018-01-07 12:38:11 -06:00
|
|
|
type initializeData struct {
|
|
|
|
PublicKey []byte `asn1:"tag:0"`
|
|
|
|
PrivateKey []byte `asn1:"tag:1"`
|
|
|
|
ChainCode []byte `asn1:"tag:2"`
|
|
|
|
}
|
|
|
|
|
2018-02-22 07:27:41 -06:00
|
|
|
// initialize initializes the card with new key data.
|
2018-01-07 12:38:11 -06:00
|
|
|
func (s *Session) initialize(seed []byte) error {
|
2019-04-02 12:28:24 -05:00
|
|
|
// Check that the wallet isn't currently initialized,
|
|
|
|
// otherwise the key would be overwritten.
|
|
|
|
status, err := s.Wallet.Status()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if status == "Online" {
|
|
|
|
return fmt.Errorf("card is already initialized, cowardly refusing to proceed")
|
|
|
|
}
|
|
|
|
|
|
|
|
s.Wallet.lock.Lock()
|
|
|
|
defer s.Wallet.lock.Unlock()
|
|
|
|
|
2018-01-07 12:38:11 -06:00
|
|
|
// HMAC the seed to produce the private key and chain code
|
|
|
|
mac := hmac.New(sha512.New, []byte("Bitcoin seed"))
|
|
|
|
mac.Write(seed)
|
|
|
|
seed = mac.Sum(nil)
|
|
|
|
|
|
|
|
key, err := crypto.ToECDSA(seed[:32])
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
id := initializeData{}
|
|
|
|
id.PublicKey = crypto.FromECDSAPub(&key.PublicKey)
|
|
|
|
id.PrivateKey = seed[:32]
|
|
|
|
id.ChainCode = seed[32:]
|
|
|
|
data, err := asn1.Marshal(id)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Nasty hack to force the top-level struct tag to be context-specific
|
|
|
|
data[0] = 0xA1
|
|
|
|
|
2019-03-23 02:45:08 -05:00
|
|
|
_, err = s.Channel.transmitEncrypted(claSCWallet, insLoadKey, 0x02, 0, data)
|
2018-01-07 12:38:11 -06:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2018-02-22 07:27:41 -06:00
|
|
|
// derive derives a new HD key path on the card.
|
2018-01-07 12:38:11 -06:00
|
|
|
func (s *Session) derive(path accounts.DerivationPath) (accounts.Account, error) {
|
2019-03-20 09:30:15 -05:00
|
|
|
startingPoint, path, err := derivationpath.Decode(path.String())
|
2018-01-07 12:38:11 -06:00
|
|
|
if err != nil {
|
|
|
|
return accounts.Account{}, err
|
|
|
|
}
|
|
|
|
|
2019-03-20 09:30:15 -05:00
|
|
|
var p1 uint8
|
|
|
|
switch startingPoint {
|
|
|
|
case derivationpath.StartingPointMaster:
|
|
|
|
p1 = P1DeriveKeyFromMaster
|
|
|
|
case derivationpath.StartingPointParent:
|
|
|
|
p1 = P1DeriveKeyFromParent
|
|
|
|
case derivationpath.StartingPointCurrent:
|
|
|
|
p1 = P1DeriveKeyFromCurrent
|
|
|
|
default:
|
|
|
|
return accounts.Account{}, fmt.Errorf("invalid startingPoint %d", startingPoint)
|
2018-01-07 12:38:11 -06:00
|
|
|
}
|
|
|
|
|
2019-03-20 09:30:15 -05:00
|
|
|
data := new(bytes.Buffer)
|
|
|
|
for _, segment := range path {
|
|
|
|
if err := binary.Write(data, binary.BigEndian, segment); err != nil {
|
2018-01-07 12:38:11 -06:00
|
|
|
return accounts.Account{}, err
|
|
|
|
}
|
|
|
|
}
|
2019-03-20 09:30:15 -05:00
|
|
|
|
2019-03-23 02:45:08 -05:00
|
|
|
_, err = s.Channel.transmitEncrypted(claSCWallet, insDeriveKey, p1, 0, data.Bytes())
|
2018-06-16 12:49:45 -05:00
|
|
|
if err != nil {
|
|
|
|
return accounts.Account{}, err
|
|
|
|
}
|
2018-01-07 12:38:11 -06:00
|
|
|
|
2019-03-23 02:45:08 -05:00
|
|
|
response, err := s.Channel.transmitEncrypted(claSCWallet, insSign, 0, 0, DerivationSignatureHash[:])
|
2018-01-07 12:38:11 -06:00
|
|
|
if err != nil {
|
2019-03-20 09:30:15 -05:00
|
|
|
return accounts.Account{}, err
|
2018-01-07 12:38:11 -06:00
|
|
|
}
|
|
|
|
|
2019-03-20 09:30:15 -05:00
|
|
|
sigdata := new(signatureData)
|
|
|
|
if _, err := asn1.UnmarshalWithParams(response.Data, sigdata, "tag:0"); err != nil {
|
|
|
|
return accounts.Account{}, err
|
2018-01-07 12:38:11 -06:00
|
|
|
}
|
2019-03-20 09:30:15 -05:00
|
|
|
rbytes, sbytes := sigdata.Signature.R.Bytes(), sigdata.Signature.S.Bytes()
|
2018-01-07 12:38:11 -06:00
|
|
|
sig := make([]byte, 65)
|
|
|
|
copy(sig[32-len(rbytes):32], rbytes)
|
|
|
|
copy(sig[64-len(sbytes):64], sbytes)
|
|
|
|
|
2019-05-27 09:27:18 -05:00
|
|
|
if err := confirmPublicKey(sig, sigdata.PublicKey); err != nil {
|
2019-03-20 09:30:15 -05:00
|
|
|
return accounts.Account{}, err
|
2018-01-07 12:38:11 -06:00
|
|
|
}
|
2019-05-27 09:27:18 -05:00
|
|
|
pub, err := crypto.UnmarshalPubkey(sigdata.PublicKey)
|
2018-01-07 12:38:11 -06:00
|
|
|
if err != nil {
|
2019-03-20 09:30:15 -05:00
|
|
|
return accounts.Account{}, err
|
2018-01-07 12:38:11 -06:00
|
|
|
}
|
2019-03-20 09:30:15 -05:00
|
|
|
return s.Wallet.makeAccount(crypto.PubkeyToAddress(*pub), path), nil
|
2018-01-07 12:38:11 -06:00
|
|
|
}
|
|
|
|
|
2018-02-22 07:27:41 -06:00
|
|
|
// keyExport contains information on an exported keypair.
|
2019-11-29 04:42:53 -06:00
|
|
|
//lint:ignore U1000 needs to be added to the console interface
|
2018-01-07 12:38:11 -06:00
|
|
|
type keyExport struct {
|
|
|
|
PublicKey []byte `asn1:"tag:0"`
|
|
|
|
PrivateKey []byte `asn1:"tag:1,optional"`
|
|
|
|
}
|
|
|
|
|
2018-04-20 02:37:45 -05:00
|
|
|
// publicKey returns the public key for the current derivation path.
|
2019-11-29 04:42:53 -06:00
|
|
|
//lint:ignore U1000 needs to be added to the console interface
|
2018-04-20 02:37:45 -05:00
|
|
|
func (s *Session) publicKey() ([]byte, error) {
|
2019-03-23 02:45:08 -05:00
|
|
|
response, err := s.Channel.transmitEncrypted(claSCWallet, insExportKey, exportP1Any, exportP2Pubkey, nil)
|
2018-01-07 12:38:11 -06:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
keys := new(keyExport)
|
|
|
|
if _, err := asn1.UnmarshalWithParams(response.Data, keys, "tag:1"); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return keys.PublicKey, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// signatureData contains information on a signature - the signature itself and
|
2018-02-22 07:27:41 -06:00
|
|
|
// the corresponding public key.
|
2018-01-07 12:38:11 -06:00
|
|
|
type signatureData struct {
|
|
|
|
PublicKey []byte `asn1:"tag:0"`
|
|
|
|
Signature struct {
|
|
|
|
R *big.Int
|
|
|
|
S *big.Int
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// sign asks the card to sign a message, and returns a valid signature after
|
|
|
|
// recovering the v value.
|
|
|
|
func (s *Session) sign(path accounts.DerivationPath, hash []byte) ([]byte, error) {
|
|
|
|
startTime := time.Now()
|
|
|
|
_, err := s.derive(path)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
deriveTime := time.Now()
|
|
|
|
|
2019-03-23 02:45:08 -05:00
|
|
|
response, err := s.Channel.transmitEncrypted(claSCWallet, insSign, signP1PrecomputedHash, signP2OnlyBlock, hash)
|
2018-01-07 12:38:11 -06:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
sigdata := new(signatureData)
|
|
|
|
if _, err := asn1.UnmarshalWithParams(response.Data, sigdata, "tag:0"); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
// Serialize the signature
|
|
|
|
rbytes, sbytes := sigdata.Signature.R.Bytes(), sigdata.Signature.S.Bytes()
|
|
|
|
sig := make([]byte, 65)
|
|
|
|
copy(sig[32-len(rbytes):32], rbytes)
|
|
|
|
copy(sig[64-len(sbytes):64], sbytes)
|
|
|
|
|
|
|
|
// Recover the V value.
|
|
|
|
sig, err = makeRecoverableSignature(hash, sig, sigdata.PublicKey)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
log.Debug("Signed using smartcard", "deriveTime", deriveTime.Sub(startTime), "signingTime", time.Since(deriveTime))
|
|
|
|
|
|
|
|
return sig, nil
|
|
|
|
}
|
|
|
|
|
2019-05-27 09:27:18 -05:00
|
|
|
// confirmPublicKey confirms that the given signature belongs to the specified key.
|
|
|
|
func confirmPublicKey(sig, pubkey []byte) error {
|
|
|
|
_, err := makeRecoverableSignature(DerivationSignatureHash[:], sig, pubkey)
|
|
|
|
return err
|
2018-01-07 12:38:11 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
// makeRecoverableSignature uses a signature and an expected public key to
|
|
|
|
// recover the v value and produce a recoverable signature.
|
|
|
|
func makeRecoverableSignature(hash, sig, expectedPubkey []byte) ([]byte, error) {
|
2019-05-25 17:07:10 -05:00
|
|
|
var libraryError error
|
2018-01-07 12:38:11 -06:00
|
|
|
for v := 0; v < 2; v++ {
|
|
|
|
sig[64] = byte(v)
|
2019-05-25 17:07:10 -05:00
|
|
|
if pubkey, err := crypto.Ecrecover(hash, sig); err == nil {
|
2019-02-21 12:43:14 -06:00
|
|
|
if bytes.Equal(pubkey, expectedPubkey) {
|
2018-01-07 12:38:11 -06:00
|
|
|
return sig, nil
|
|
|
|
}
|
2019-05-25 17:07:10 -05:00
|
|
|
} else {
|
|
|
|
libraryError = err
|
2018-01-07 12:38:11 -06:00
|
|
|
}
|
|
|
|
}
|
2019-05-25 17:07:10 -05:00
|
|
|
if libraryError != nil {
|
|
|
|
return nil, libraryError
|
|
|
|
}
|
2018-04-18 05:59:32 -05:00
|
|
|
return nil, ErrPubkeyMismatch
|
2018-01-07 12:38:11 -06:00
|
|
|
}
|