// Copyright 2018 The go-ethereum Authors // This file is part of the go-ethereum library. // // The go-ethereum library is free software: you can redistribute it and/or modify // it under the terms of the GNU Lesser General Public License as published by // the Free Software Foundation, either version 3 of the License, or // (at your option) any later version. // // The go-ethereum library is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU Lesser General Public License for more details. // // You should have received a copy of the GNU Lesser General Public License // along with the go-ethereum library. If not, see . package scwallet import ( "bytes" "context" "crypto/hmac" "crypto/sha256" "crypto/sha512" "encoding/asn1" "encoding/binary" "errors" "fmt" "math/big" "sort" "strings" "sync" "time" ethereum "github.com/ethereum/go-ethereum" "github.com/ethereum/go-ethereum/accounts" "github.com/ethereum/go-ethereum/common" "github.com/ethereum/go-ethereum/core/types" "github.com/ethereum/go-ethereum/crypto" "github.com/ethereum/go-ethereum/crypto/secp256k1" "github.com/ethereum/go-ethereum/log" pcsc "github.com/gballet/go-libpcsclite" "github.com/status-im/keycard-go/derivationpath" ) // ErrPairingPasswordNeeded is returned if opening the smart card requires pairing with a pairing // password. In this case, the calling application should request user input to enter // the pairing password and send it back. var ErrPairingPasswordNeeded = errors.New("smartcard: pairing password needed") // ErrPINNeeded is returned if opening the smart card requires a PIN code. In // this case, the calling application should request user input to enter the PIN // and send it back. var ErrPINNeeded = errors.New("smartcard: pin needed") // ErrPINUnblockNeeded is returned if opening the smart card requires a PIN code, // but all PIN attempts have already been exhausted. In this case the calling // application should request user input for the PUK and a new PIN code to set // fo the card. var ErrPINUnblockNeeded = errors.New("smartcard: pin unblock needed") // ErrAlreadyOpen is returned if the smart card is attempted to be opened, but // there is already a paired and unlocked session. var ErrAlreadyOpen = errors.New("smartcard: already open") // ErrPubkeyMismatch is returned if the public key recovered from a signature // does not match the one expected by the user. var ErrPubkeyMismatch = errors.New("smartcard: recovered public key mismatch") var ( appletAID = []byte{0xA0, 0x00, 0x00, 0x08, 0x04, 0x00, 0x01, 0x01, 0x01} // DerivationSignatureHash is used to derive the public key from the signature of this hash DerivationSignatureHash = sha256.Sum256(common.Hash{}.Bytes()) ) // List of APDU command-related constants const ( claISO7816 = 0 claSCWallet = 0x80 insSelect = 0xA4 insGetResponse = 0xC0 sw1GetResponse = 0x61 sw1Ok = 0x90 insVerifyPin = 0x20 insUnblockPin = 0x22 insExportKey = 0xC2 insSign = 0xC0 insLoadKey = 0xD0 insDeriveKey = 0xD1 insStatus = 0xF2 ) // List of ADPU command parameters const ( P1DeriveKeyFromMaster = uint8(0x00) P1DeriveKeyFromParent = uint8(0x01) P1DeriveKeyFromCurrent = uint8(0x10) statusP1WalletStatus = uint8(0x00) statusP1Path = uint8(0x01) signP1PrecomputedHash = uint8(0x01) signP2OnlyBlock = uint8(0x81) exportP1Any = uint8(0x00) exportP2Pubkey = uint8(0x01) ) // Minimum time to wait between self derivation attempts, even it the user is // requesting accounts like crazy. const selfDeriveThrottling = time.Second // Wallet represents a smartcard wallet instance. type Wallet struct { Hub *Hub // A handle to the Hub that instantiated this wallet. PublicKey []byte // The wallet's public key (used for communication and identification, not signing!) lock sync.Mutex // Lock that gates access to struct fields and communication with the card card *pcsc.Card // A handle to the smartcard interface for the wallet. session *Session // The secure communication session with the card log log.Logger // Contextual logger to tag the base with its id deriveNextPath accounts.DerivationPath // Next derivation path for account auto-discovery deriveNextAddr common.Address // Next derived account address for auto-discovery deriveChain ethereum.ChainStateReader // Blockchain state reader to discover used account with deriveReq chan chan struct{} // Channel to request a self-derivation on deriveQuit chan chan error // Channel to terminate the self-deriver with } // NewWallet constructs and returns a new Wallet instance. func NewWallet(hub *Hub, card *pcsc.Card) *Wallet { wallet := &Wallet{ Hub: hub, card: card, } return wallet } // transmit sends an APDU to the smartcard and receives and decodes the response. // It automatically handles requests by the card to fetch the return data separately, // and returns an error if the response status code is not success. func transmit(card *pcsc.Card, command *commandAPDU) (*responseAPDU, error) { data, err := command.serialize() if err != nil { return nil, err } responseData, _, err := card.Transmit(data) if err != nil { return nil, err } response := new(responseAPDU) if err = response.deserialize(responseData); err != nil { return nil, err } // Are we being asked to fetch the response separately? if response.Sw1 == sw1GetResponse && (command.Cla != claISO7816 || command.Ins != insGetResponse) { return transmit(card, &commandAPDU{ Cla: claISO7816, Ins: insGetResponse, P1: 0, P2: 0, Data: nil, Le: response.Sw2, }) } if response.Sw1 != sw1Ok { return nil, fmt.Errorf("Unexpected insecure response status Cla=0x%x, Ins=0x%x, Sw=0x%x%x", command.Cla, command.Ins, response.Sw1, response.Sw2) } return response, nil } // applicationInfo encodes information about the smartcard application - its // instance UID and public key. type applicationInfo struct { InstanceUID []byte `asn1:"tag:15"` PublicKey []byte `asn1:"tag:0"` } // connect connects to the wallet application and establishes a secure channel with it. // must be called before any other interaction with the wallet. func (w *Wallet) connect() error { w.lock.Lock() defer w.lock.Unlock() appinfo, err := w.doselect() if err != nil { return err } channel, err := NewSecureChannelSession(w.card, appinfo.PublicKey) if err != nil { return err } w.PublicKey = appinfo.PublicKey w.log = log.New("url", w.URL()) w.session = &Session{ Wallet: w, Channel: channel, } return nil } // doselect is an internal (unlocked) function to send a SELECT APDU to the card. func (w *Wallet) doselect() (*applicationInfo, error) { response, err := transmit(w.card, &commandAPDU{ Cla: claISO7816, Ins: insSelect, P1: 4, P2: 0, Data: appletAID, }) if err != nil { return nil, err } appinfo := new(applicationInfo) if _, err := asn1.UnmarshalWithParams(response.Data, appinfo, "tag:4"); err != nil { return nil, err } return appinfo, nil } // ping checks the card's status and returns an error if unsuccessful. func (w *Wallet) ping() error { w.lock.Lock() defer w.lock.Unlock() // We can't ping if not paired if !w.session.paired() { return nil } if _, err := w.session.walletStatus(); err != nil { return err } return nil } // release releases any resources held by an open wallet instance. func (w *Wallet) release() error { if w.session != nil { return w.session.release() } return nil } // pair is an internal (unlocked) function for establishing a new pairing // with the wallet. func (w *Wallet) pair(puk []byte) error { if w.session.paired() { return fmt.Errorf("Wallet already paired") } pairing, err := w.session.pair(puk) if err != nil { return err } if err = w.Hub.setPairing(w, &pairing); err != nil { return err } return w.session.authenticate(pairing) } // Unpair deletes an existing wallet pairing. func (w *Wallet) Unpair(pin []byte) error { w.lock.Lock() defer w.lock.Unlock() if !w.session.paired() { return fmt.Errorf("wallet %x not paired", w.PublicKey) } if err := w.session.verifyPin(pin); err != nil { return fmt.Errorf("failed to verify pin: %s", err) } if err := w.session.unpair(); err != nil { return fmt.Errorf("failed to unpair: %s", err) } if err := w.Hub.setPairing(w, nil); err != nil { return err } return nil } // URL retrieves the canonical path under which this wallet is reachable. It is // user by upper layers to define a sorting order over all wallets from multiple // backends. func (w *Wallet) URL() accounts.URL { return accounts.URL{ Scheme: w.Hub.scheme, Path: fmt.Sprintf("%x", w.PublicKey[1:5]), // Byte #0 isn't unique; 1:5 covers << 64K cards, bump to 1:9 for << 4M } } // Status returns a textual status to aid the user in the current state of the // wallet. It also returns an error indicating any failure the wallet might have // encountered. func (w *Wallet) Status() (string, error) { w.lock.Lock() defer w.lock.Unlock() // If the card is not paired, we can only wait if !w.session.paired() { return "Unpaired, waiting for PUK", nil } // Yay, we have an encrypted session, retrieve the actual status status, err := w.session.walletStatus() if err != nil { return fmt.Sprintf("Failed: %v", err), err } switch { case !w.session.verified && status.PinRetryCount == 0: return fmt.Sprintf("Blocked, waiting for PUK and new PIN"), nil case !w.session.verified: return fmt.Sprintf("Locked, waiting for PIN (%d attempts left)", status.PinRetryCount), nil case !status.Initialized: return fmt.Sprintf("Empty, waiting for initialization"), nil default: return fmt.Sprintf("Online"), nil } } // Open initializes access to a wallet instance. It is not meant to unlock or // decrypt account keys, rather simply to establish a connection to hardware // wallets and/or to access derivation seeds. // // The passphrase parameter may or may not be used by the implementation of a // particular wallet instance. The reason there is no passwordless open method // is to strive towards a uniform wallet handling, oblivious to the different // backend providers. // // Please note, if you open a wallet, you must close it to release any allocated // resources (especially important when working with hardware wallets). func (w *Wallet) Open(passphrase string) error { w.lock.Lock() defer w.lock.Unlock() // If the session is already open, bail out if w.session.verified { return ErrAlreadyOpen } // If the smart card is not yet paired, attempt to do so either from a previous // pairing key or form the supplied PUK code. if !w.session.paired() { // If a previous pairing exists, only ever try to use that if pairing := w.Hub.pairing(w); pairing != nil { if err := w.session.authenticate(*pairing); err != nil { return fmt.Errorf("failed to authenticate card %x: %s", w.PublicKey[:4], err) } // Pairing still ok, fall through to PIN checks } else { // If no passphrase was supplied, request the PUK from the user if passphrase == "" { return ErrPairingPasswordNeeded } // Attempt to pair the smart card with the user supplied PUK if err := w.pair([]byte(passphrase)); err != nil { return err } // Pairing succeeded, fall through to PIN checks. This will of course fail, // but we can't return ErrPINNeeded directly here becase we don't know whether // a PIN check or a PIN reset is needed. passphrase = "" } } // The smart card was successfully paired, retrieve its status to check whether // PIN verification or unblocking is needed. status, err := w.session.walletStatus() if err != nil { return err } // Request the appropriate next authentication data, or use the one supplied switch { case passphrase == "" && status.PinRetryCount > 0: return ErrPINNeeded case passphrase == "": return ErrPINUnblockNeeded case status.PinRetryCount > 0: if err := w.session.verifyPin([]byte(passphrase)); err != nil { return err } default: if err := w.session.unblockPin([]byte(passphrase)); err != nil { return err } } // Smart card paired and unlocked, initialize and register w.deriveReq = make(chan chan struct{}) w.deriveQuit = make(chan chan error) go w.selfDerive() // Notify anyone listening for wallet events that a new device is accessible go w.Hub.updateFeed.Send(accounts.WalletEvent{Wallet: w, Kind: accounts.WalletOpened}) return nil } // Close stops and closes the wallet, freeing any resources. func (w *Wallet) Close() error { // Ensure the wallet was opened w.lock.Lock() dQuit := w.deriveQuit w.lock.Unlock() // Terminate the self-derivations var derr error if dQuit != nil { errc := make(chan error) dQuit <- errc derr = <-errc // Save for later, we *must* close the USB } // Terminate the device connection w.lock.Lock() defer w.lock.Unlock() w.deriveQuit = nil w.deriveReq = nil if err := w.release(); err != nil { return err } return derr } // selfDerive is an account derivation loop that upon request attempts to find // new non-zero accounts. func (w *Wallet) selfDerive() { w.log.Debug("Smart card wallet self-derivation started") defer w.log.Debug("Smart card wallet self-derivation stopped") // Execute self-derivations until termination or error var ( reqc chan struct{} errc chan error err error ) for errc == nil && err == nil { // Wait until either derivation or termination is requested select { case errc = <-w.deriveQuit: // Termination requested continue case reqc = <-w.deriveReq: // Account discovery requested } // Derivation needs a chain and device access, skip if either unavailable w.lock.Lock() if w.session == nil || w.deriveChain == nil { w.lock.Unlock() reqc <- struct{}{} continue } pairing := w.Hub.pairing(w) // Device lock obtained, derive the next batch of accounts var ( paths []accounts.DerivationPath nextAcc accounts.Account nextAddr = w.deriveNextAddr nextPath = w.deriveNextPath context = context.Background() ) for empty := false; !empty; { // Retrieve the next derived Ethereum account if nextAddr == (common.Address{}) { if nextAcc, err = w.session.derive(nextPath); err != nil { w.log.Warn("Smartcard wallet account derivation failed", "err", err) break } nextAddr = nextAcc.Address } // Check the account's status against the current chain state var ( balance *big.Int nonce uint64 ) balance, err = w.deriveChain.BalanceAt(context, nextAddr, nil) if err != nil { w.log.Warn("Smartcard wallet balance retrieval failed", "err", err) break } nonce, err = w.deriveChain.NonceAt(context, nextAddr, nil) if err != nil { w.log.Warn("Smartcard wallet nonce retrieval failed", "err", err) break } // If the next account is empty, stop self-derivation, but add it nonetheless if balance.Sign() == 0 && nonce == 0 { empty = true } // We've just self-derived a new account, start tracking it locally path := make(accounts.DerivationPath, len(nextPath)) copy(path[:], nextPath[:]) paths = append(paths, path) // Display a log message to the user for new (or previously empty accounts) if _, known := pairing.Accounts[nextAddr]; !known || !empty || nextAddr != w.deriveNextAddr { w.log.Info("Smartcard wallet discovered new account", "address", nextAddr, "path", path, "balance", balance, "nonce", nonce) } pairing.Accounts[nextAddr] = path // Fetch the next potential account if !empty { nextAddr = common.Address{} nextPath[len(nextPath)-1]++ } } // If there are new accounts, write them out if len(paths) > 0 { err = w.Hub.setPairing(w, pairing) } // Shift the self-derivation forward w.deriveNextAddr = nextAddr w.deriveNextPath = nextPath // Self derivation complete, release device lock w.lock.Unlock() // Notify the user of termination and loop after a bit of time (to avoid trashing) reqc <- struct{}{} if err == nil { select { case errc = <-w.deriveQuit: // Termination requested, abort case <-time.After(selfDeriveThrottling): // Waited enough, willing to self-derive again } } } // In case of error, wait for termination if err != nil { w.log.Debug("Smartcard wallet self-derivation failed", "err", err) errc = <-w.deriveQuit } errc <- err } // Accounts retrieves the list of signing accounts the wallet is currently aware // of. For hierarchical deterministic wallets, the list will not be exhaustive, // rather only contain the accounts explicitly pinned during account derivation. func (w *Wallet) Accounts() []accounts.Account { // Attempt self-derivation if it's running reqc := make(chan struct{}, 1) select { case w.deriveReq <- reqc: // Self-derivation request accepted, wait for it <-reqc default: // Self-derivation offline, throttled or busy, skip } w.lock.Lock() defer w.lock.Unlock() if pairing := w.Hub.pairing(w); pairing != nil { ret := make([]accounts.Account, 0, len(pairing.Accounts)) for address, path := range pairing.Accounts { ret = append(ret, w.makeAccount(address, path)) } sort.Sort(accounts.AccountsByURL(ret)) return ret } return nil } func (w *Wallet) makeAccount(address common.Address, path accounts.DerivationPath) accounts.Account { return accounts.Account{ Address: address, URL: accounts.URL{ Scheme: w.Hub.scheme, Path: fmt.Sprintf("%x/%s", w.PublicKey[1:3], path.String()), }, } } // Contains returns whether an account is part of this particular wallet or not. func (w *Wallet) Contains(account accounts.Account) bool { if pairing := w.Hub.pairing(w); pairing != nil { _, ok := pairing.Accounts[account.Address] return ok } return false } // Initialize installs a keypair generated from the provided key into the wallet. func (w *Wallet) Initialize(seed []byte) error { w.lock.Lock() defer w.lock.Unlock() return w.session.initialize(seed) } // Derive attempts to explicitly derive a hierarchical deterministic account at // the specified derivation path. If requested, the derived account will be added // to the wallet's tracked account list. func (w *Wallet) Derive(path accounts.DerivationPath, pin bool) (accounts.Account, error) { w.lock.Lock() defer w.lock.Unlock() account, err := w.session.derive(path) if err != nil { return accounts.Account{}, err } if pin { pairing := w.Hub.pairing(w) pairing.Accounts[account.Address] = path if err := w.Hub.setPairing(w, pairing); err != nil { return accounts.Account{}, err } } return account, nil } // SelfDerive sets a base account derivation path from which the wallet attempts // to discover non zero accounts and automatically add them to list of tracked // accounts. // // Note, self derivaton will increment the last component of the specified path // opposed to decending into a child path to allow discovering accounts starting // from non zero components. // // You can disable automatic account discovery by calling SelfDerive with a nil // chain state reader. func (w *Wallet) SelfDerive(base accounts.DerivationPath, chain ethereum.ChainStateReader) { w.lock.Lock() defer w.lock.Unlock() w.deriveNextPath = make(accounts.DerivationPath, len(base)) copy(w.deriveNextPath[:], base[:]) w.deriveNextAddr = common.Address{} w.deriveChain = chain } // SignData requests the wallet to sign the hash of the given data. // // It looks up the account specified either solely via its address contained within, // or optionally with the aid of any location metadata from the embedded URL field. // // If the wallet requires additional authentication to sign the request (e.g. // a password to decrypt the account, or a PIN code o verify the transaction), // an AuthNeededError instance will be returned, containing infos for the user // about which fields or actions are needed. The user may retry by providing // the needed details via SignDataWithPassphrase, or by other means (e.g. unlock // the account in a keystore). func (w *Wallet) SignData(account accounts.Account, mimeType string, data []byte) ([]byte, error) { return w.signHash(account, crypto.Keccak256(data)) } func (w *Wallet) signHash(account accounts.Account, hash []byte) ([]byte, error) { w.lock.Lock() defer w.lock.Unlock() path, err := w.findAccountPath(account) if err != nil { return nil, err } return w.session.sign(path, hash) } // SignTx requests the wallet to sign the given transaction. // // It looks up the account specified either solely via its address contained within, // or optionally with the aid of any location metadata from the embedded URL field. // // If the wallet requires additional authentication to sign the request (e.g. // a password to decrypt the account, or a PIN code o verify the transaction), // an AuthNeededError instance will be returned, containing infos for the user // about which fields or actions are needed. The user may retry by providing // the needed details via SignTxWithPassphrase, or by other means (e.g. unlock // the account in a keystore). func (w *Wallet) SignTx(account accounts.Account, tx *types.Transaction, chainID *big.Int) (*types.Transaction, error) { signer := types.NewEIP155Signer(chainID) hash := signer.Hash(tx) sig, err := w.signHash(account, hash[:]) if err != nil { return nil, err } return tx.WithSignature(signer, sig) } // SignDataWithPassphrase requests the wallet to sign the given hash with the // given passphrase as extra authentication information. // // It looks up the account specified either solely via its address contained within, // or optionally with the aid of any location metadata from the embedded URL field. func (w *Wallet) SignDataWithPassphrase(account accounts.Account, passphrase, mimeType string, data []byte) ([]byte, error) { return w.signHashWithPassphrase(account, passphrase, crypto.Keccak256(data)) } func (w *Wallet) signHashWithPassphrase(account accounts.Account, passphrase string, hash []byte) ([]byte, error) { if !w.session.verified { if err := w.Open(passphrase); err != nil { return nil, err } } return w.signHash(account, hash) } // SignText requests the wallet to sign the hash of a given piece of data, prefixed // by the Ethereum prefix scheme // It looks up the account specified either solely via its address contained within, // or optionally with the aid of any location metadata from the embedded URL field. // // If the wallet requires additional authentication to sign the request (e.g. // a password to decrypt the account, or a PIN code o verify the transaction), // an AuthNeededError instance will be returned, containing infos for the user // about which fields or actions are needed. The user may retry by providing // the needed details via SignHashWithPassphrase, or by other means (e.g. unlock // the account in a keystore). func (w *Wallet) SignText(account accounts.Account, text []byte) ([]byte, error) { return w.signHash(account, accounts.TextHash(text)) } // SignTextWithPassphrase implements accounts.Wallet, attempting to sign the // given hash with the given account using passphrase as extra authentication func (w *Wallet) SignTextWithPassphrase(account accounts.Account, passphrase string, text []byte) ([]byte, error) { return w.signHashWithPassphrase(account, passphrase, crypto.Keccak256(accounts.TextHash(text))) } // SignTxWithPassphrase requests the wallet to sign the given transaction, with the // given passphrase as extra authentication information. // // It looks up the account specified either solely via its address contained within, // or optionally with the aid of any location metadata from the embedded URL field. func (w *Wallet) SignTxWithPassphrase(account accounts.Account, passphrase string, tx *types.Transaction, chainID *big.Int) (*types.Transaction, error) { if !w.session.verified { if err := w.Open(passphrase); err != nil { return nil, err } } return w.SignTx(account, tx, chainID) } // findAccountPath returns the derivation path for the provided account. // It first checks for the address in the list of pinned accounts, and if it is // not found, attempts to parse the derivation path from the account's URL. func (w *Wallet) findAccountPath(account accounts.Account) (accounts.DerivationPath, error) { pairing := w.Hub.pairing(w) if path, ok := pairing.Accounts[account.Address]; ok { return path, nil } // Look for the path in the URL if account.URL.Scheme != w.Hub.scheme { return nil, fmt.Errorf("Scheme %s does not match wallet scheme %s", account.URL.Scheme, w.Hub.scheme) } parts := strings.SplitN(account.URL.Path, "/", 2) if len(parts) != 2 { return nil, fmt.Errorf("Invalid URL format: %s", account.URL) } if parts[0] != fmt.Sprintf("%x", w.PublicKey[1:3]) { return nil, fmt.Errorf("URL %s is not for this wallet", account.URL) } return accounts.ParseDerivationPath(parts[1]) } // Session represents a secured communication session with the wallet. type Session struct { Wallet *Wallet // A handle to the wallet that opened the session Channel *SecureChannelSession // A secure channel for encrypted messages verified bool // Whether the pin has been verified in this session. } // pair establishes a new pairing over this channel, using the provided secret. func (s *Session) pair(secret []byte) (smartcardPairing, error) { err := s.Channel.Pair(secret) if err != nil { return smartcardPairing{}, err } return smartcardPairing{ PublicKey: s.Wallet.PublicKey, PairingIndex: s.Channel.PairingIndex, PairingKey: s.Channel.PairingKey, Accounts: make(map[common.Address]accounts.DerivationPath), }, nil } // unpair deletes an existing pairing. func (s *Session) unpair() error { if !s.verified { return fmt.Errorf("Unpair requires that the PIN be verified") } return s.Channel.Unpair() } // verifyPin unlocks a wallet with the provided pin. func (s *Session) verifyPin(pin []byte) error { if _, err := s.Channel.transmitEncrypted(claSCWallet, insVerifyPin, 0, 0, pin); err != nil { return err } s.verified = true return nil } // unblockPin unblocks a wallet with the provided puk and resets the pin to the // new one specified. func (s *Session) unblockPin(pukpin []byte) error { if _, err := s.Channel.transmitEncrypted(claSCWallet, insUnblockPin, 0, 0, pukpin); err != nil { return err } s.verified = true return nil } // release releases resources associated with the channel. func (s *Session) release() error { return s.Wallet.card.Disconnect(pcsc.LeaveCard) } // paired returns true if a valid pairing exists. func (s *Session) paired() bool { return s.Channel.PairingKey != nil } // authenticate uses an existing pairing to establish a secure channel. func (s *Session) authenticate(pairing smartcardPairing) error { if !bytes.Equal(s.Wallet.PublicKey, pairing.PublicKey) { return fmt.Errorf("Cannot pair using another wallet's pairing; %x != %x", s.Wallet.PublicKey, pairing.PublicKey) } s.Channel.PairingKey = pairing.PairingKey s.Channel.PairingIndex = pairing.PairingIndex return s.Channel.Open() } // walletStatus describes a smartcard wallet's status information. type walletStatus struct { PinRetryCount int // Number of remaining PIN retries PukRetryCount int // Number of remaining PUK retries Initialized bool // Whether the card has been initialized with a private key } // walletStatus fetches the wallet's status from the card. func (s *Session) walletStatus() (*walletStatus, error) { response, err := s.Channel.transmitEncrypted(claSCWallet, insStatus, statusP1WalletStatus, 0, nil) if err != nil { return nil, err } // There is an issue with ASN1 decoding that I am struggling with, // so I unpack it manually, like is being done in the status-im // card management code. if len(response.Data) != int(response.Data[1])-1 { return nil, fmt.Errorf("invalid response length %d", len(response.Data)) } if response.Data[0] != 0xA3 { return nil, fmt.Errorf("invalid tag %v, expected 0xA3", response.Data[0]) } if response.Data[2] != 2 || response.Data[3] != 1 || response.Data[5] != 2 || response.Data[6] != 1 || response.Data[8] != 1 || response.Data[9] != 1 { return nil, fmt.Errorf("invalid response tag format") } status := &walletStatus{ PinRetryCount: int(response.Data[4]), PukRetryCount: int(response.Data[7]), Initialized: (response.Data[10] == 0xff), } /* if _, err := asn1.Unmarshal(response.Data, status); err != nil { //if _, err := asn1.UnmarshalWithParams(response.Data, status, "tag:3"); err != nil { fmt.Println("###### asn1 err", err) return nil, err }*/ return status, nil } // derivationPath fetches the wallet's current derivation path from the card. func (s *Session) derivationPath() (accounts.DerivationPath, error) { response, err := s.Channel.transmitEncrypted(claSCWallet, insStatus, statusP1Path, 0, nil) if err != nil { return nil, err } buf := bytes.NewReader(response.Data) path := make(accounts.DerivationPath, len(response.Data)/4) return path, binary.Read(buf, binary.BigEndian, &path) } // initializeData contains data needed to initialize the smartcard wallet. type initializeData struct { PublicKey []byte `asn1:"tag:0"` PrivateKey []byte `asn1:"tag:1"` ChainCode []byte `asn1:"tag:2"` } // initialize initializes the card with new key data. func (s *Session) initialize(seed []byte) error { // HMAC the seed to produce the private key and chain code mac := hmac.New(sha512.New, []byte("Bitcoin seed")) mac.Write(seed) seed = mac.Sum(nil) key, err := crypto.ToECDSA(seed[:32]) if err != nil { return err } id := initializeData{} id.PublicKey = crypto.FromECDSAPub(&key.PublicKey) id.PrivateKey = seed[:32] id.ChainCode = seed[32:] data, err := asn1.Marshal(id) if err != nil { return err } // Nasty hack to force the top-level struct tag to be context-specific data[0] = 0xA1 _, err = s.Channel.transmitEncrypted(claSCWallet, insLoadKey, 0x02, 0, data) return err } // derive derives a new HD key path on the card. func (s *Session) derive(path accounts.DerivationPath) (accounts.Account, error) { startingPoint, path, err := derivationpath.Decode(path.String()) if err != nil { return accounts.Account{}, err } var p1 uint8 switch startingPoint { case derivationpath.StartingPointMaster: p1 = P1DeriveKeyFromMaster case derivationpath.StartingPointParent: p1 = P1DeriveKeyFromParent case derivationpath.StartingPointCurrent: p1 = P1DeriveKeyFromCurrent default: return accounts.Account{}, fmt.Errorf("invalid startingPoint %d", startingPoint) } data := new(bytes.Buffer) for _, segment := range path { if err := binary.Write(data, binary.BigEndian, segment); err != nil { return accounts.Account{}, err } } _, err = s.Channel.transmitEncrypted(claSCWallet, insDeriveKey, p1, 0, data.Bytes()) if err != nil { return accounts.Account{}, err } response, err := s.Channel.transmitEncrypted(claSCWallet, insSign, 0, 0, DerivationSignatureHash[:]) if err != nil { return accounts.Account{}, err } sigdata := new(signatureData) if _, err := asn1.UnmarshalWithParams(response.Data, sigdata, "tag:0"); err != nil { return accounts.Account{}, err } rbytes, sbytes := sigdata.Signature.R.Bytes(), sigdata.Signature.S.Bytes() sig := make([]byte, 65) copy(sig[32-len(rbytes):32], rbytes) copy(sig[64-len(sbytes):64], sbytes) pubkey, err := determinePublicKey(sig, sigdata.PublicKey) if err != nil { return accounts.Account{}, err } pub, err := crypto.UnmarshalPubkey(pubkey) if err != nil { return accounts.Account{}, err } return s.Wallet.makeAccount(crypto.PubkeyToAddress(*pub), path), nil } // keyExport contains information on an exported keypair. type keyExport struct { PublicKey []byte `asn1:"tag:0"` PrivateKey []byte `asn1:"tag:1,optional"` } // publicKey returns the public key for the current derivation path. func (s *Session) publicKey() ([]byte, error) { response, err := s.Channel.transmitEncrypted(claSCWallet, insExportKey, exportP1Any, exportP2Pubkey, nil) if err != nil { return nil, err } keys := new(keyExport) if _, err := asn1.UnmarshalWithParams(response.Data, keys, "tag:1"); err != nil { return nil, err } return keys.PublicKey, nil } // signatureData contains information on a signature - the signature itself and // the corresponding public key. type signatureData struct { PublicKey []byte `asn1:"tag:0"` Signature struct { R *big.Int S *big.Int } } // sign asks the card to sign a message, and returns a valid signature after // recovering the v value. func (s *Session) sign(path accounts.DerivationPath, hash []byte) ([]byte, error) { startTime := time.Now() _, err := s.derive(path) if err != nil { return nil, err } deriveTime := time.Now() response, err := s.Channel.transmitEncrypted(claSCWallet, insSign, signP1PrecomputedHash, signP2OnlyBlock, hash) if err != nil { return nil, err } sigdata := new(signatureData) if _, err := asn1.UnmarshalWithParams(response.Data, sigdata, "tag:0"); err != nil { return nil, err } // Serialize the signature rbytes, sbytes := sigdata.Signature.R.Bytes(), sigdata.Signature.S.Bytes() sig := make([]byte, 65) copy(sig[32-len(rbytes):32], rbytes) copy(sig[64-len(sbytes):64], sbytes) // Recover the V value. sig, err = makeRecoverableSignature(hash, sig, sigdata.PublicKey) if err != nil { return nil, err } log.Debug("Signed using smartcard", "deriveTime", deriveTime.Sub(startTime), "signingTime", time.Since(deriveTime)) return sig, nil } // determinePublicKey uses a signature and the X component of a public key to // recover the entire public key. func determinePublicKey(sig, pubkeyX []byte) ([]byte, error) { for v := 0; v < 2; v++ { sig[64] = byte(v) pubkey, err := crypto.Ecrecover(DerivationSignatureHash[:], sig) if err == nil { if bytes.Equal(pubkey, pubkeyX) { return pubkey, nil } } else if v == 1 || err != secp256k1.ErrRecoverFailed { return nil, err } } return nil, ErrPubkeyMismatch } // makeRecoverableSignature uses a signature and an expected public key to // recover the v value and produce a recoverable signature. func makeRecoverableSignature(hash, sig, expectedPubkey []byte) ([]byte, error) { for v := 0; v < 2; v++ { sig[64] = byte(v) pubkey, err := crypto.Ecrecover(hash, sig) if err == nil { if bytes.Equal(pubkey, expectedPubkey) { return sig, nil } } else if v == 1 || err != secp256k1.ErrRecoverFailed { return nil, err } } return nil, ErrPubkeyMismatch }