| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | // Copyright 2018 The go-ethereum Authors | 
					
						
							|  |  |  | // This file is part of the go-ethereum library. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // The go-ethereum library is free software: you can redistribute it and/or modify | 
					
						
							|  |  |  | // it under the terms of the GNU Lesser General Public License as published by | 
					
						
							|  |  |  | // the Free Software Foundation, either version 3 of the License, or | 
					
						
							|  |  |  | // (at your option) any later version. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // The go-ethereum library is distributed in the hope that it will be useful, | 
					
						
							|  |  |  | // but WITHOUT ANY WARRANTY; without even the implied warranty of | 
					
						
							|  |  |  | // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | 
					
						
							|  |  |  | // GNU Lesser General Public License for more details. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // You should have received a copy of the GNU Lesser General Public License | 
					
						
							|  |  |  | // along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | package scwallet | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | import ( | 
					
						
							|  |  |  | 	"bytes" | 
					
						
							|  |  |  | 	"context" | 
					
						
							|  |  |  | 	"crypto/hmac" | 
					
						
							|  |  |  | 	"crypto/sha256" | 
					
						
							|  |  |  | 	"crypto/sha512" | 
					
						
							|  |  |  | 	"encoding/asn1" | 
					
						
							|  |  |  | 	"encoding/binary" | 
					
						
							|  |  |  | 	"errors" | 
					
						
							|  |  |  | 	"fmt" | 
					
						
							|  |  |  | 	"math/big" | 
					
						
							| 
									
										
										
										
											2019-05-03 17:17:45 +02:00
										 |  |  | 	"regexp" | 
					
						
							| 
									
										
										
										
											2018-04-20 10:37:45 +03:00
										 |  |  | 	"sort" | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	"strings" | 
					
						
							|  |  |  | 	"sync" | 
					
						
							|  |  |  | 	"time" | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	ethereum "github.com/ethereum/go-ethereum" | 
					
						
							|  |  |  | 	"github.com/ethereum/go-ethereum/accounts" | 
					
						
							|  |  |  | 	"github.com/ethereum/go-ethereum/common" | 
					
						
							|  |  |  | 	"github.com/ethereum/go-ethereum/core/types" | 
					
						
							|  |  |  | 	"github.com/ethereum/go-ethereum/crypto" | 
					
						
							|  |  |  | 	"github.com/ethereum/go-ethereum/log" | 
					
						
							| 
									
										
										
										
											2019-03-14 23:03:13 +01:00
										 |  |  | 	pcsc "github.com/gballet/go-libpcsclite" | 
					
						
							| 
									
										
										
										
											2019-03-20 15:30:15 +01:00
										 |  |  | 	"github.com/status-im/keycard-go/derivationpath" | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | ) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-03-14 23:03:13 +01:00
										 |  |  | // ErrPairingPasswordNeeded is returned if opening the smart card requires pairing with a pairing | 
					
						
							|  |  |  | // password. In this case, the calling application should request user input to enter | 
					
						
							|  |  |  | // the pairing password and send it back. | 
					
						
							|  |  |  | var ErrPairingPasswordNeeded = errors.New("smartcard: pairing password needed") | 
					
						
							| 
									
										
										
										
											2018-04-18 13:59:32 +03:00
										 |  |  | 
 | 
					
						
							|  |  |  | // ErrPINNeeded is returned if opening the smart card requires a PIN code. In | 
					
						
							|  |  |  | // this case, the calling application should request user input to enter the PIN | 
					
						
							|  |  |  | // and send it back. | 
					
						
							|  |  |  | var ErrPINNeeded = errors.New("smartcard: pin needed") | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-04-20 10:37:45 +03:00
										 |  |  | // ErrPINUnblockNeeded is returned if opening the smart card requires a PIN code, | 
					
						
							|  |  |  | // but all PIN attempts have already been exhausted. In this case the calling | 
					
						
							|  |  |  | // application should request user input for the PUK and a new PIN code to set | 
					
						
							|  |  |  | // fo the card. | 
					
						
							|  |  |  | var ErrPINUnblockNeeded = errors.New("smartcard: pin unblock needed") | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-04-18 13:59:32 +03:00
										 |  |  | // ErrAlreadyOpen is returned if the smart card is attempted to be opened, but | 
					
						
							|  |  |  | // there is already a paired and unlocked session. | 
					
						
							|  |  |  | var ErrAlreadyOpen = errors.New("smartcard: already open") | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // ErrPubkeyMismatch is returned if the public key recovered from a signature | 
					
						
							|  |  |  | // does not match the one expected by the user. | 
					
						
							|  |  |  | var ErrPubkeyMismatch = errors.New("smartcard: recovered public key mismatch") | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | var ( | 
					
						
							| 
									
										
										
										
											2019-03-20 15:30:15 +01:00
										 |  |  | 	appletAID = []byte{0xA0, 0x00, 0x00, 0x08, 0x04, 0x00, 0x01, 0x01, 0x01} | 
					
						
							|  |  |  | 	// DerivationSignatureHash is used to derive the public key from the signature of this hash | 
					
						
							|  |  |  | 	DerivationSignatureHash = sha256.Sum256(common.Hash{}.Bytes()) | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | ) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-03-20 19:21:36 +01:00
										 |  |  | // List of APDU command-related constants | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | const ( | 
					
						
							| 
									
										
										
										
											2018-04-20 10:37:45 +03:00
										 |  |  | 	claISO7816  = 0 | 
					
						
							|  |  |  | 	claSCWallet = 0x80 | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	insSelect      = 0xA4 | 
					
						
							|  |  |  | 	insGetResponse = 0xC0 | 
					
						
							|  |  |  | 	sw1GetResponse = 0x61 | 
					
						
							|  |  |  | 	sw1Ok          = 0x90 | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-03-20 19:21:36 +01:00
										 |  |  | 	insVerifyPin  = 0x20 | 
					
						
							|  |  |  | 	insUnblockPin = 0x22 | 
					
						
							|  |  |  | 	insExportKey  = 0xC2 | 
					
						
							|  |  |  | 	insSign       = 0xC0 | 
					
						
							|  |  |  | 	insLoadKey    = 0xD0 | 
					
						
							|  |  |  | 	insDeriveKey  = 0xD1 | 
					
						
							|  |  |  | 	insStatus     = 0xF2 | 
					
						
							|  |  |  | ) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // List of ADPU command parameters | 
					
						
							|  |  |  | const ( | 
					
						
							| 
									
										
										
										
											2019-03-19 23:14:31 +01:00
										 |  |  | 	P1DeriveKeyFromMaster  = uint8(0x00) | 
					
						
							|  |  |  | 	P1DeriveKeyFromParent  = uint8(0x01) | 
					
						
							|  |  |  | 	P1DeriveKeyFromCurrent = uint8(0x10) | 
					
						
							|  |  |  | 	statusP1WalletStatus   = uint8(0x00) | 
					
						
							|  |  |  | 	statusP1Path           = uint8(0x01) | 
					
						
							|  |  |  | 	signP1PrecomputedHash  = uint8(0x01) | 
					
						
							|  |  |  | 	signP2OnlyBlock        = uint8(0x81) | 
					
						
							|  |  |  | 	exportP1Any            = uint8(0x00) | 
					
						
							|  |  |  | 	exportP2Pubkey         = uint8(0x01) | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | ) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-03-20 19:21:36 +01:00
										 |  |  | // Minimum time to wait between self derivation attempts, even it the user is | 
					
						
							|  |  |  | // requesting accounts like crazy. | 
					
						
							|  |  |  | const selfDeriveThrottling = time.Second | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | // Wallet represents a smartcard wallet instance. | 
					
						
							|  |  |  | type Wallet struct { | 
					
						
							|  |  |  | 	Hub       *Hub   // A handle to the Hub that instantiated this wallet. | 
					
						
							|  |  |  | 	PublicKey []byte // The wallet's public key (used for communication and identification, not signing!) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-03-14 23:03:13 +01:00
										 |  |  | 	lock    sync.Mutex // Lock that gates access to struct fields and communication with the card | 
					
						
							|  |  |  | 	card    *pcsc.Card // A handle to the smartcard interface for the wallet. | 
					
						
							|  |  |  | 	session *Session   // The secure communication session with the card | 
					
						
							|  |  |  | 	log     log.Logger // Contextual logger to tag the base with its id | 
					
						
							| 
									
										
										
										
											2018-04-19 13:39:33 +03:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-04-10 13:09:08 +03:00
										 |  |  | 	deriveNextPaths []accounts.DerivationPath // Next derivation paths for account auto-discovery (multiple bases supported) | 
					
						
							|  |  |  | 	deriveNextAddrs []common.Address          // Next derived account addresses for auto-discovery (multiple bases supported) | 
					
						
							|  |  |  | 	deriveChain     ethereum.ChainStateReader // Blockchain state reader to discover used account with | 
					
						
							|  |  |  | 	deriveReq       chan chan struct{}        // Channel to request a self-derivation on | 
					
						
							|  |  |  | 	deriveQuit      chan chan error           // Channel to terminate the self-deriver with | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // NewWallet constructs and returns a new Wallet instance. | 
					
						
							| 
									
										
										
										
											2019-03-14 23:03:13 +01:00
										 |  |  | func NewWallet(hub *Hub, card *pcsc.Card) *Wallet { | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	wallet := &Wallet{ | 
					
						
							|  |  |  | 		Hub:  hub, | 
					
						
							|  |  |  | 		card: card, | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	return wallet | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // transmit sends an APDU to the smartcard and receives and decodes the response. | 
					
						
							|  |  |  | // It automatically handles requests by the card to fetch the return data separately, | 
					
						
							|  |  |  | // and returns an error if the response status code is not success. | 
					
						
							| 
									
										
										
										
											2019-03-14 23:03:13 +01:00
										 |  |  | func transmit(card *pcsc.Card, command *commandAPDU) (*responseAPDU, error) { | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	data, err := command.serialize() | 
					
						
							|  |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		return nil, err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-03-14 23:03:13 +01:00
										 |  |  | 	responseData, _, err := card.Transmit(data) | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		return nil, err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-04-20 10:37:45 +03:00
										 |  |  | 	response := new(responseAPDU) | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	if err = response.deserialize(responseData); err != nil { | 
					
						
							|  |  |  | 		return nil, err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Are we being asked to fetch the response separately? | 
					
						
							| 
									
										
										
										
											2018-02-22 13:27:41 +00:00
										 |  |  | 	if response.Sw1 == sw1GetResponse && (command.Cla != claISO7816 || command.Ins != insGetResponse) { | 
					
						
							| 
									
										
										
										
											2018-04-20 10:37:45 +03:00
										 |  |  | 		return transmit(card, &commandAPDU{ | 
					
						
							| 
									
										
										
										
											2018-02-22 13:27:41 +00:00
										 |  |  | 			Cla:  claISO7816, | 
					
						
							|  |  |  | 			Ins:  insGetResponse, | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 			P1:   0, | 
					
						
							|  |  |  | 			P2:   0, | 
					
						
							|  |  |  | 			Data: nil, | 
					
						
							|  |  |  | 			Le:   response.Sw2, | 
					
						
							|  |  |  | 		}) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-02-22 13:27:41 +00:00
										 |  |  | 	if response.Sw1 != sw1Ok { | 
					
						
							| 
									
										
										
										
											2019-11-29 11:42:53 +01:00
										 |  |  | 		return nil, fmt.Errorf("unexpected insecure response status Cla=0x%x, Ins=0x%x, Sw=0x%x%x", command.Cla, command.Ins, response.Sw1, response.Sw2) | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	return response, nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // applicationInfo encodes information about the smartcard application - its | 
					
						
							|  |  |  | // instance UID and public key. | 
					
						
							|  |  |  | type applicationInfo struct { | 
					
						
							|  |  |  | 	InstanceUID []byte `asn1:"tag:15"` | 
					
						
							|  |  |  | 	PublicKey   []byte `asn1:"tag:0"` | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // connect connects to the wallet application and establishes a secure channel with it. | 
					
						
							|  |  |  | // must be called before any other interaction with the wallet. | 
					
						
							|  |  |  | func (w *Wallet) connect() error { | 
					
						
							|  |  |  | 	w.lock.Lock() | 
					
						
							|  |  |  | 	defer w.lock.Unlock() | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	appinfo, err := w.doselect() | 
					
						
							|  |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		return err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	channel, err := NewSecureChannelSession(w.card, appinfo.PublicKey) | 
					
						
							|  |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		return err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	w.PublicKey = appinfo.PublicKey | 
					
						
							|  |  |  | 	w.log = log.New("url", w.URL()) | 
					
						
							|  |  |  | 	w.session = &Session{ | 
					
						
							|  |  |  | 		Wallet:  w, | 
					
						
							|  |  |  | 		Channel: channel, | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	return nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // doselect is an internal (unlocked) function to send a SELECT APDU to the card. | 
					
						
							|  |  |  | func (w *Wallet) doselect() (*applicationInfo, error) { | 
					
						
							| 
									
										
										
										
											2018-04-20 10:37:45 +03:00
										 |  |  | 	response, err := transmit(w.card, &commandAPDU{ | 
					
						
							| 
									
										
										
										
											2018-02-22 13:27:41 +00:00
										 |  |  | 		Cla:  claISO7816, | 
					
						
							|  |  |  | 		Ins:  insSelect, | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 		P1:   4, | 
					
						
							|  |  |  | 		P2:   0, | 
					
						
							| 
									
										
										
										
											2018-02-22 13:27:41 +00:00
										 |  |  | 		Data: appletAID, | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	}) | 
					
						
							|  |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		return nil, err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	appinfo := new(applicationInfo) | 
					
						
							|  |  |  | 	if _, err := asn1.UnmarshalWithParams(response.Data, appinfo, "tag:4"); err != nil { | 
					
						
							|  |  |  | 		return nil, err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	return appinfo, nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // ping checks the card's status and returns an error if unsuccessful. | 
					
						
							|  |  |  | func (w *Wallet) ping() error { | 
					
						
							|  |  |  | 	w.lock.Lock() | 
					
						
							|  |  |  | 	defer w.lock.Unlock() | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-04-20 10:37:45 +03:00
										 |  |  | 	// We can't ping if not paired | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	if !w.session.paired() { | 
					
						
							|  |  |  | 		return nil | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2018-04-20 10:37:45 +03:00
										 |  |  | 	if _, err := w.session.walletStatus(); err != nil { | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 		return err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	return nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // release releases any resources held by an open wallet instance. | 
					
						
							|  |  |  | func (w *Wallet) release() error { | 
					
						
							|  |  |  | 	if w.session != nil { | 
					
						
							|  |  |  | 		return w.session.release() | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	return nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // pair is an internal (unlocked) function for establishing a new pairing | 
					
						
							|  |  |  | // with the wallet. | 
					
						
							|  |  |  | func (w *Wallet) pair(puk []byte) error { | 
					
						
							|  |  |  | 	if w.session.paired() { | 
					
						
							| 
									
										
										
										
											2019-11-29 11:42:53 +01:00
										 |  |  | 		return fmt.Errorf("wallet already paired") | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	} | 
					
						
							|  |  |  | 	pairing, err := w.session.pair(puk) | 
					
						
							|  |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		return err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	if err = w.Hub.setPairing(w, &pairing); err != nil { | 
					
						
							|  |  |  | 		return err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	return w.session.authenticate(pairing) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // Unpair deletes an existing wallet pairing. | 
					
						
							|  |  |  | func (w *Wallet) Unpair(pin []byte) error { | 
					
						
							|  |  |  | 	w.lock.Lock() | 
					
						
							|  |  |  | 	defer w.lock.Unlock() | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	if !w.session.paired() { | 
					
						
							| 
									
										
										
										
											2018-04-18 13:59:32 +03:00
										 |  |  | 		return fmt.Errorf("wallet %x not paired", w.PublicKey) | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	} | 
					
						
							|  |  |  | 	if err := w.session.verifyPin(pin); err != nil { | 
					
						
							| 
									
										
										
										
											2018-04-18 13:59:32 +03:00
										 |  |  | 		return fmt.Errorf("failed to verify pin: %s", err) | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	} | 
					
						
							|  |  |  | 	if err := w.session.unpair(); err != nil { | 
					
						
							| 
									
										
										
										
											2018-04-18 13:59:32 +03:00
										 |  |  | 		return fmt.Errorf("failed to unpair: %s", err) | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	} | 
					
						
							|  |  |  | 	if err := w.Hub.setPairing(w, nil); err != nil { | 
					
						
							|  |  |  | 		return err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	return nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // URL retrieves the canonical path under which this wallet is reachable. It is | 
					
						
							|  |  |  | // user by upper layers to define a sorting order over all wallets from multiple | 
					
						
							|  |  |  | // backends. | 
					
						
							|  |  |  | func (w *Wallet) URL() accounts.URL { | 
					
						
							|  |  |  | 	return accounts.URL{ | 
					
						
							|  |  |  | 		Scheme: w.Hub.scheme, | 
					
						
							| 
									
										
										
										
											2018-04-19 13:39:33 +03:00
										 |  |  | 		Path:   fmt.Sprintf("%x", w.PublicKey[1:5]), // Byte #0 isn't unique; 1:5 covers << 64K cards, bump to 1:9 for << 4M | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	} | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // Status returns a textual status to aid the user in the current state of the | 
					
						
							|  |  |  | // wallet. It also returns an error indicating any failure the wallet might have | 
					
						
							|  |  |  | // encountered. | 
					
						
							|  |  |  | func (w *Wallet) Status() (string, error) { | 
					
						
							|  |  |  | 	w.lock.Lock() | 
					
						
							|  |  |  | 	defer w.lock.Unlock() | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-04-20 10:37:45 +03:00
										 |  |  | 	// If the card is not paired, we can only wait | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	if !w.session.paired() { | 
					
						
							| 
									
										
										
										
											2019-04-10 12:46:35 +02:00
										 |  |  | 		return "Unpaired, waiting for pairing password", nil | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2018-04-20 10:37:45 +03:00
										 |  |  | 	// Yay, we have an encrypted session, retrieve the actual status | 
					
						
							|  |  |  | 	status, err := w.session.walletStatus() | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	if err != nil { | 
					
						
							| 
									
										
										
										
											2018-04-20 10:37:45 +03:00
										 |  |  | 		return fmt.Sprintf("Failed: %v", err), err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	switch { | 
					
						
							| 
									
										
										
										
											2019-05-03 17:17:45 +02:00
										 |  |  | 	case !w.session.verified && status.PinRetryCount == 0 && status.PukRetryCount == 0: | 
					
						
							|  |  |  | 		return fmt.Sprintf("Bricked, waiting for full wipe"), nil | 
					
						
							| 
									
										
										
										
											2018-04-20 10:37:45 +03:00
										 |  |  | 	case !w.session.verified && status.PinRetryCount == 0: | 
					
						
							| 
									
										
										
										
											2019-05-03 17:17:45 +02:00
										 |  |  | 		return fmt.Sprintf("Blocked, waiting for PUK (%d attempts left) and new PIN", status.PukRetryCount), nil | 
					
						
							| 
									
										
										
										
											2018-04-20 10:37:45 +03:00
										 |  |  | 	case !w.session.verified: | 
					
						
							|  |  |  | 		return fmt.Sprintf("Locked, waiting for PIN (%d attempts left)", status.PinRetryCount), nil | 
					
						
							|  |  |  | 	case !status.Initialized: | 
					
						
							|  |  |  | 		return fmt.Sprintf("Empty, waiting for initialization"), nil | 
					
						
							|  |  |  | 	default: | 
					
						
							| 
									
										
										
										
											2019-03-22 19:52:23 +01:00
										 |  |  | 		return fmt.Sprintf("Online"), nil | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	} | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // Open initializes access to a wallet instance. It is not meant to unlock or | 
					
						
							|  |  |  | // decrypt account keys, rather simply to establish a connection to hardware | 
					
						
							|  |  |  | // wallets and/or to access derivation seeds. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // The passphrase parameter may or may not be used by the implementation of a | 
					
						
							|  |  |  | // particular wallet instance. The reason there is no passwordless open method | 
					
						
							|  |  |  | // is to strive towards a uniform wallet handling, oblivious to the different | 
					
						
							|  |  |  | // backend providers. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // Please note, if you open a wallet, you must close it to release any allocated | 
					
						
							|  |  |  | // resources (especially important when working with hardware wallets). | 
					
						
							|  |  |  | func (w *Wallet) Open(passphrase string) error { | 
					
						
							|  |  |  | 	w.lock.Lock() | 
					
						
							|  |  |  | 	defer w.lock.Unlock() | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-04-18 13:59:32 +03:00
										 |  |  | 	// If the session is already open, bail out | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	if w.session.verified { | 
					
						
							| 
									
										
										
										
											2018-04-18 13:59:32 +03:00
										 |  |  | 		return ErrAlreadyOpen | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2018-04-18 13:59:32 +03:00
										 |  |  | 	// If the smart card is not yet paired, attempt to do so either from a previous | 
					
						
							|  |  |  | 	// pairing key or form the supplied PUK code. | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	if !w.session.paired() { | 
					
						
							| 
									
										
										
										
											2018-04-18 13:59:32 +03:00
										 |  |  | 		// If a previous pairing exists, only ever try to use that | 
					
						
							| 
									
										
										
										
											2018-04-20 10:37:45 +03:00
										 |  |  | 		if pairing := w.Hub.pairing(w); pairing != nil { | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 			if err := w.session.authenticate(*pairing); err != nil { | 
					
						
							| 
									
										
										
										
											2018-04-18 13:59:32 +03:00
										 |  |  | 				return fmt.Errorf("failed to authenticate card %x: %s", w.PublicKey[:4], err) | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 			} | 
					
						
							| 
									
										
										
										
											2018-04-20 10:37:45 +03:00
										 |  |  | 			// Pairing still ok, fall through to PIN checks | 
					
						
							|  |  |  | 		} else { | 
					
						
							|  |  |  | 			// If no passphrase was supplied, request the PUK from the user | 
					
						
							|  |  |  | 			if passphrase == "" { | 
					
						
							| 
									
										
										
										
											2019-03-14 23:03:13 +01:00
										 |  |  | 				return ErrPairingPasswordNeeded | 
					
						
							| 
									
										
										
										
											2018-04-20 10:37:45 +03:00
										 |  |  | 			} | 
					
						
							|  |  |  | 			// Attempt to pair the smart card with the user supplied PUK | 
					
						
							|  |  |  | 			if err := w.pair([]byte(passphrase)); err != nil { | 
					
						
							|  |  |  | 				return err | 
					
						
							|  |  |  | 			} | 
					
						
							|  |  |  | 			// Pairing succeeded, fall through to PIN checks. This will of course fail, | 
					
						
							|  |  |  | 			// but we can't return ErrPINNeeded directly here becase we don't know whether | 
					
						
							|  |  |  | 			// a PIN check or a PIN reset is needed. | 
					
						
							|  |  |  | 			passphrase = "" | 
					
						
							| 
									
										
										
										
											2018-04-18 13:59:32 +03:00
										 |  |  | 		} | 
					
						
							| 
									
										
										
										
											2018-04-20 10:37:45 +03:00
										 |  |  | 	} | 
					
						
							|  |  |  | 	// The smart card was successfully paired, retrieve its status to check whether | 
					
						
							|  |  |  | 	// PIN verification or unblocking is needed. | 
					
						
							|  |  |  | 	status, err := w.session.walletStatus() | 
					
						
							|  |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		return err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	// Request the appropriate next authentication data, or use the one supplied | 
					
						
							|  |  |  | 	switch { | 
					
						
							|  |  |  | 	case passphrase == "" && status.PinRetryCount > 0: | 
					
						
							|  |  |  | 		return ErrPINNeeded | 
					
						
							|  |  |  | 	case passphrase == "": | 
					
						
							|  |  |  | 		return ErrPINUnblockNeeded | 
					
						
							|  |  |  | 	case status.PinRetryCount > 0: | 
					
						
							| 
									
										
										
										
											2019-05-03 17:17:45 +02:00
										 |  |  | 		if !regexp.MustCompile(`^[0-9]{6,}$`).MatchString(passphrase) { | 
					
						
							|  |  |  | 			w.log.Error("PIN needs to be at least 6 digits") | 
					
						
							|  |  |  | 			return ErrPINNeeded | 
					
						
							|  |  |  | 		} | 
					
						
							| 
									
										
										
										
											2018-04-20 10:37:45 +03:00
										 |  |  | 		if err := w.session.verifyPin([]byte(passphrase)); err != nil { | 
					
						
							|  |  |  | 			return err | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 		} | 
					
						
							| 
									
										
										
										
											2018-04-20 10:37:45 +03:00
										 |  |  | 	default: | 
					
						
							| 
									
										
										
										
											2019-05-03 17:17:45 +02:00
										 |  |  | 		if !regexp.MustCompile(`^[0-9]{12,}$`).MatchString(passphrase) { | 
					
						
							|  |  |  | 			w.log.Error("PUK needs to be at least 12 digits") | 
					
						
							|  |  |  | 			return ErrPINUnblockNeeded | 
					
						
							|  |  |  | 		} | 
					
						
							| 
									
										
										
										
											2018-04-20 10:37:45 +03:00
										 |  |  | 		if err := w.session.unblockPin([]byte(passphrase)); err != nil { | 
					
						
							| 
									
										
										
										
											2018-04-18 13:59:32 +03:00
										 |  |  | 			return err | 
					
						
							|  |  |  | 		} | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2018-04-18 13:59:32 +03:00
										 |  |  | 	// Smart card paired and unlocked, initialize and register | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	w.deriveReq = make(chan chan struct{}) | 
					
						
							|  |  |  | 	w.deriveQuit = make(chan chan error) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-04-10 12:51:22 +03:00
										 |  |  | 	go w.selfDerive() | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	// Notify anyone listening for wallet events that a new device is accessible | 
					
						
							|  |  |  | 	go w.Hub.updateFeed.Send(accounts.WalletEvent{Wallet: w, Kind: accounts.WalletOpened}) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	return nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // Close stops and closes the wallet, freeing any resources. | 
					
						
							|  |  |  | func (w *Wallet) Close() error { | 
					
						
							|  |  |  | 	// Ensure the wallet was opened | 
					
						
							|  |  |  | 	w.lock.Lock() | 
					
						
							|  |  |  | 	dQuit := w.deriveQuit | 
					
						
							|  |  |  | 	w.lock.Unlock() | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Terminate the self-derivations | 
					
						
							|  |  |  | 	var derr error | 
					
						
							|  |  |  | 	if dQuit != nil { | 
					
						
							|  |  |  | 		errc := make(chan error) | 
					
						
							|  |  |  | 		dQuit <- errc | 
					
						
							|  |  |  | 		derr = <-errc // Save for later, we *must* close the USB | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	// Terminate the device connection | 
					
						
							|  |  |  | 	w.lock.Lock() | 
					
						
							|  |  |  | 	defer w.lock.Unlock() | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	w.deriveQuit = nil | 
					
						
							|  |  |  | 	w.deriveReq = nil | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	if err := w.release(); err != nil { | 
					
						
							|  |  |  | 		return err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	return derr | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // selfDerive is an account derivation loop that upon request attempts to find | 
					
						
							| 
									
										
										
										
											2019-04-10 12:51:22 +03:00
										 |  |  | // new non-zero accounts. | 
					
						
							|  |  |  | func (w *Wallet) selfDerive() { | 
					
						
							| 
									
										
										
										
											2018-04-19 13:39:33 +03:00
										 |  |  | 	w.log.Debug("Smart card wallet self-derivation started") | 
					
						
							|  |  |  | 	defer w.log.Debug("Smart card wallet self-derivation stopped") | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	// Execute self-derivations until termination or error | 
					
						
							|  |  |  | 	var ( | 
					
						
							|  |  |  | 		reqc chan struct{} | 
					
						
							|  |  |  | 		errc chan error | 
					
						
							|  |  |  | 		err  error | 
					
						
							|  |  |  | 	) | 
					
						
							|  |  |  | 	for errc == nil && err == nil { | 
					
						
							|  |  |  | 		// Wait until either derivation or termination is requested | 
					
						
							|  |  |  | 		select { | 
					
						
							|  |  |  | 		case errc = <-w.deriveQuit: | 
					
						
							|  |  |  | 			// Termination requested | 
					
						
							|  |  |  | 			continue | 
					
						
							|  |  |  | 		case reqc = <-w.deriveReq: | 
					
						
							|  |  |  | 			// Account discovery requested | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 		// Derivation needs a chain and device access, skip if either unavailable | 
					
						
							|  |  |  | 		w.lock.Lock() | 
					
						
							|  |  |  | 		if w.session == nil || w.deriveChain == nil { | 
					
						
							|  |  |  | 			w.lock.Unlock() | 
					
						
							|  |  |  | 			reqc <- struct{}{} | 
					
						
							|  |  |  | 			continue | 
					
						
							|  |  |  | 		} | 
					
						
							| 
									
										
										
										
											2018-04-20 10:37:45 +03:00
										 |  |  | 		pairing := w.Hub.pairing(w) | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 
 | 
					
						
							|  |  |  | 		// Device lock obtained, derive the next batch of accounts | 
					
						
							|  |  |  | 		var ( | 
					
						
							| 
									
										
										
										
											2018-04-19 13:39:33 +03:00
										 |  |  | 			paths   []accounts.DerivationPath | 
					
						
							|  |  |  | 			nextAcc accounts.Account | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-04-10 13:09:08 +03:00
										 |  |  | 			nextPaths = append([]accounts.DerivationPath{}, w.deriveNextPaths...) | 
					
						
							|  |  |  | 			nextAddrs = append([]common.Address{}, w.deriveNextAddrs...) | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 
 | 
					
						
							|  |  |  | 			context = context.Background() | 
					
						
							|  |  |  | 		) | 
					
						
							| 
									
										
										
										
											2019-04-10 13:09:08 +03:00
										 |  |  | 		for i := 0; i < len(nextAddrs); i++ { | 
					
						
							|  |  |  | 			for empty := false; !empty; { | 
					
						
							|  |  |  | 				// Retrieve the next derived Ethereum account | 
					
						
							|  |  |  | 				if nextAddrs[i] == (common.Address{}) { | 
					
						
							|  |  |  | 					if nextAcc, err = w.session.derive(nextPaths[i]); err != nil { | 
					
						
							|  |  |  | 						w.log.Warn("Smartcard wallet account derivation failed", "err", err) | 
					
						
							|  |  |  | 						break | 
					
						
							|  |  |  | 					} | 
					
						
							|  |  |  | 					nextAddrs[i] = nextAcc.Address | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				// Check the account's status against the current chain state | 
					
						
							|  |  |  | 				var ( | 
					
						
							|  |  |  | 					balance *big.Int | 
					
						
							|  |  |  | 					nonce   uint64 | 
					
						
							|  |  |  | 				) | 
					
						
							|  |  |  | 				balance, err = w.deriveChain.BalanceAt(context, nextAddrs[i], nil) | 
					
						
							|  |  |  | 				if err != nil { | 
					
						
							|  |  |  | 					w.log.Warn("Smartcard wallet balance retrieval failed", "err", err) | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 					break | 
					
						
							|  |  |  | 				} | 
					
						
							| 
									
										
										
										
											2019-04-10 13:09:08 +03:00
										 |  |  | 				nonce, err = w.deriveChain.NonceAt(context, nextAddrs[i], nil) | 
					
						
							|  |  |  | 				if err != nil { | 
					
						
							|  |  |  | 					w.log.Warn("Smartcard wallet nonce retrieval failed", "err", err) | 
					
						
							|  |  |  | 					break | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				// If the next account is empty, stop self-derivation, but add for the last base path | 
					
						
							|  |  |  | 				if balance.Sign() == 0 && nonce == 0 { | 
					
						
							|  |  |  | 					empty = true | 
					
						
							|  |  |  | 					if i < len(nextAddrs)-1 { | 
					
						
							|  |  |  | 						break | 
					
						
							|  |  |  | 					} | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				// We've just self-derived a new account, start tracking it locally | 
					
						
							|  |  |  | 				path := make(accounts.DerivationPath, len(nextPaths[i])) | 
					
						
							|  |  |  | 				copy(path[:], nextPaths[i][:]) | 
					
						
							|  |  |  | 				paths = append(paths, path) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 				// Display a log message to the user for new (or previously empty accounts) | 
					
						
							|  |  |  | 				if _, known := pairing.Accounts[nextAddrs[i]]; !known || !empty || nextAddrs[i] != w.deriveNextAddrs[i] { | 
					
						
							|  |  |  | 					w.log.Info("Smartcard wallet discovered new account", "address", nextAddrs[i], "path", path, "balance", balance, "nonce", nonce) | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				pairing.Accounts[nextAddrs[i]] = path | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-04-10 13:09:08 +03:00
										 |  |  | 				// Fetch the next potential account | 
					
						
							|  |  |  | 				if !empty { | 
					
						
							|  |  |  | 					nextAddrs[i] = common.Address{} | 
					
						
							|  |  |  | 					nextPaths[i][len(nextPaths[i])-1]++ | 
					
						
							|  |  |  | 				} | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 			} | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 		// If there are new accounts, write them out | 
					
						
							|  |  |  | 		if len(paths) > 0 { | 
					
						
							|  |  |  | 			err = w.Hub.setPairing(w, pairing) | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 		// Shift the self-derivation forward | 
					
						
							| 
									
										
										
										
											2019-04-10 13:09:08 +03:00
										 |  |  | 		w.deriveNextAddrs = nextAddrs | 
					
						
							|  |  |  | 		w.deriveNextPaths = nextPaths | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 
 | 
					
						
							|  |  |  | 		// Self derivation complete, release device lock | 
					
						
							|  |  |  | 		w.lock.Unlock() | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		// Notify the user of termination and loop after a bit of time (to avoid trashing) | 
					
						
							|  |  |  | 		reqc <- struct{}{} | 
					
						
							|  |  |  | 		if err == nil { | 
					
						
							|  |  |  | 			select { | 
					
						
							|  |  |  | 			case errc = <-w.deriveQuit: | 
					
						
							|  |  |  | 				// Termination requested, abort | 
					
						
							|  |  |  | 			case <-time.After(selfDeriveThrottling): | 
					
						
							|  |  |  | 				// Waited enough, willing to self-derive again | 
					
						
							|  |  |  | 			} | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	// In case of error, wait for termination | 
					
						
							|  |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		w.log.Debug("Smartcard wallet self-derivation failed", "err", err) | 
					
						
							|  |  |  | 		errc = <-w.deriveQuit | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	errc <- err | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // Accounts retrieves the list of signing accounts the wallet is currently aware | 
					
						
							|  |  |  | // of. For hierarchical deterministic wallets, the list will not be exhaustive, | 
					
						
							|  |  |  | // rather only contain the accounts explicitly pinned during account derivation. | 
					
						
							|  |  |  | func (w *Wallet) Accounts() []accounts.Account { | 
					
						
							|  |  |  | 	// Attempt self-derivation if it's running | 
					
						
							|  |  |  | 	reqc := make(chan struct{}, 1) | 
					
						
							|  |  |  | 	select { | 
					
						
							|  |  |  | 	case w.deriveReq <- reqc: | 
					
						
							|  |  |  | 		// Self-derivation request accepted, wait for it | 
					
						
							|  |  |  | 		<-reqc | 
					
						
							|  |  |  | 	default: | 
					
						
							|  |  |  | 		// Self-derivation offline, throttled or busy, skip | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	w.lock.Lock() | 
					
						
							|  |  |  | 	defer w.lock.Unlock() | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-04-20 10:37:45 +03:00
										 |  |  | 	if pairing := w.Hub.pairing(w); pairing != nil { | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 		ret := make([]accounts.Account, 0, len(pairing.Accounts)) | 
					
						
							|  |  |  | 		for address, path := range pairing.Accounts { | 
					
						
							|  |  |  | 			ret = append(ret, w.makeAccount(address, path)) | 
					
						
							|  |  |  | 		} | 
					
						
							| 
									
										
										
										
											2018-04-20 10:37:45 +03:00
										 |  |  | 		sort.Sort(accounts.AccountsByURL(ret)) | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 		return ret | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	return nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | func (w *Wallet) makeAccount(address common.Address, path accounts.DerivationPath) accounts.Account { | 
					
						
							|  |  |  | 	return accounts.Account{ | 
					
						
							|  |  |  | 		Address: address, | 
					
						
							|  |  |  | 		URL: accounts.URL{ | 
					
						
							|  |  |  | 			Scheme: w.Hub.scheme, | 
					
						
							|  |  |  | 			Path:   fmt.Sprintf("%x/%s", w.PublicKey[1:3], path.String()), | 
					
						
							|  |  |  | 		}, | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // Contains returns whether an account is part of this particular wallet or not. | 
					
						
							|  |  |  | func (w *Wallet) Contains(account accounts.Account) bool { | 
					
						
							| 
									
										
										
										
											2018-04-20 10:37:45 +03:00
										 |  |  | 	if pairing := w.Hub.pairing(w); pairing != nil { | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 		_, ok := pairing.Accounts[account.Address] | 
					
						
							|  |  |  | 		return ok | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	return false | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // Initialize installs a keypair generated from the provided key into the wallet. | 
					
						
							|  |  |  | func (w *Wallet) Initialize(seed []byte) error { | 
					
						
							| 
									
										
										
										
											2019-04-10 12:51:22 +03:00
										 |  |  | 	go w.selfDerive() | 
					
						
							| 
									
										
										
										
											2019-04-02 19:28:24 +02:00
										 |  |  | 	// DO NOT lock at this stage, as the initialize | 
					
						
							|  |  |  | 	// function relies on Status() | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	return w.session.initialize(seed) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // Derive attempts to explicitly derive a hierarchical deterministic account at | 
					
						
							|  |  |  | // the specified derivation path. If requested, the derived account will be added | 
					
						
							|  |  |  | // to the wallet's tracked account list. | 
					
						
							|  |  |  | func (w *Wallet) Derive(path accounts.DerivationPath, pin bool) (accounts.Account, error) { | 
					
						
							|  |  |  | 	w.lock.Lock() | 
					
						
							|  |  |  | 	defer w.lock.Unlock() | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	account, err := w.session.derive(path) | 
					
						
							|  |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		return accounts.Account{}, err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	if pin { | 
					
						
							| 
									
										
										
										
											2018-04-20 10:37:45 +03:00
										 |  |  | 		pairing := w.Hub.pairing(w) | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 		pairing.Accounts[account.Address] = path | 
					
						
							|  |  |  | 		if err := w.Hub.setPairing(w, pairing); err != nil { | 
					
						
							|  |  |  | 			return accounts.Account{}, err | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	return account, nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // SelfDerive sets a base account derivation path from which the wallet attempts | 
					
						
							|  |  |  | // to discover non zero accounts and automatically add them to list of tracked | 
					
						
							|  |  |  | // accounts. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // Note, self derivaton will increment the last component of the specified path | 
					
						
							|  |  |  | // opposed to decending into a child path to allow discovering accounts starting | 
					
						
							|  |  |  | // from non zero components. | 
					
						
							|  |  |  | // | 
					
						
							| 
									
										
										
										
											2019-04-10 13:09:08 +03:00
										 |  |  | // Some hardware wallets switched derivation paths through their evolution, so | 
					
						
							|  |  |  | // this method supports providing multiple bases to discover old user accounts | 
					
						
							|  |  |  | // too. Only the last base will be used to derive the next empty account. | 
					
						
							|  |  |  | // | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | // You can disable automatic account discovery by calling SelfDerive with a nil | 
					
						
							|  |  |  | // chain state reader. | 
					
						
							| 
									
										
										
										
											2019-04-10 13:09:08 +03:00
										 |  |  | func (w *Wallet) SelfDerive(bases []accounts.DerivationPath, chain ethereum.ChainStateReader) { | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	w.lock.Lock() | 
					
						
							|  |  |  | 	defer w.lock.Unlock() | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-04-10 13:09:08 +03:00
										 |  |  | 	w.deriveNextPaths = make([]accounts.DerivationPath, len(bases)) | 
					
						
							|  |  |  | 	for i, base := range bases { | 
					
						
							|  |  |  | 		w.deriveNextPaths[i] = make(accounts.DerivationPath, len(base)) | 
					
						
							|  |  |  | 		copy(w.deriveNextPaths[i][:], base[:]) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	w.deriveNextAddrs = make([]common.Address, len(bases)) | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	w.deriveChain = chain | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-02-18 19:59:12 +01:00
										 |  |  | // SignData requests the wallet to sign the hash of the given data. | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | // | 
					
						
							|  |  |  | // It looks up the account specified either solely via its address contained within, | 
					
						
							|  |  |  | // or optionally with the aid of any location metadata from the embedded URL field. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // If the wallet requires additional authentication to sign the request (e.g. | 
					
						
							|  |  |  | // a password to decrypt the account, or a PIN code o verify the transaction), | 
					
						
							|  |  |  | // an AuthNeededError instance will be returned, containing infos for the user | 
					
						
							|  |  |  | // about which fields or actions are needed. The user may retry by providing | 
					
						
							| 
									
										
										
										
											2019-02-18 19:59:12 +01:00
										 |  |  | // the needed details via SignDataWithPassphrase, or by other means (e.g. unlock | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | // the account in a keystore). | 
					
						
							| 
									
										
										
										
											2019-02-18 19:59:12 +01:00
										 |  |  | func (w *Wallet) SignData(account accounts.Account, mimeType string, data []byte) ([]byte, error) { | 
					
						
							|  |  |  | 	return w.signHash(account, crypto.Keccak256(data)) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | func (w *Wallet) signHash(account accounts.Account, hash []byte) ([]byte, error) { | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	w.lock.Lock() | 
					
						
							|  |  |  | 	defer w.lock.Unlock() | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	path, err := w.findAccountPath(account) | 
					
						
							|  |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		return nil, err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	return w.session.sign(path, hash) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // SignTx requests the wallet to sign the given transaction. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // It looks up the account specified either solely via its address contained within, | 
					
						
							|  |  |  | // or optionally with the aid of any location metadata from the embedded URL field. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // If the wallet requires additional authentication to sign the request (e.g. | 
					
						
							|  |  |  | // a password to decrypt the account, or a PIN code o verify the transaction), | 
					
						
							|  |  |  | // an AuthNeededError instance will be returned, containing infos for the user | 
					
						
							|  |  |  | // about which fields or actions are needed. The user may retry by providing | 
					
						
							|  |  |  | // the needed details via SignTxWithPassphrase, or by other means (e.g. unlock | 
					
						
							|  |  |  | // the account in a keystore). | 
					
						
							|  |  |  | func (w *Wallet) SignTx(account accounts.Account, tx *types.Transaction, chainID *big.Int) (*types.Transaction, error) { | 
					
						
							|  |  |  | 	signer := types.NewEIP155Signer(chainID) | 
					
						
							|  |  |  | 	hash := signer.Hash(tx) | 
					
						
							| 
									
										
										
										
											2019-02-18 19:59:12 +01:00
										 |  |  | 	sig, err := w.signHash(account, hash[:]) | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		return nil, err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	return tx.WithSignature(signer, sig) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-02-18 19:59:12 +01:00
										 |  |  | // SignDataWithPassphrase requests the wallet to sign the given hash with the | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | // given passphrase as extra authentication information. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // It looks up the account specified either solely via its address contained within, | 
					
						
							|  |  |  | // or optionally with the aid of any location metadata from the embedded URL field. | 
					
						
							| 
									
										
										
										
											2019-02-18 19:59:12 +01:00
										 |  |  | func (w *Wallet) SignDataWithPassphrase(account accounts.Account, passphrase, mimeType string, data []byte) ([]byte, error) { | 
					
						
							|  |  |  | 	return w.signHashWithPassphrase(account, passphrase, crypto.Keccak256(data)) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | func (w *Wallet) signHashWithPassphrase(account accounts.Account, passphrase string, hash []byte) ([]byte, error) { | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	if !w.session.verified { | 
					
						
							|  |  |  | 		if err := w.Open(passphrase); err != nil { | 
					
						
							|  |  |  | 			return nil, err | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-02-18 19:59:12 +01:00
										 |  |  | 	return w.signHash(account, hash) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // SignText requests the wallet to sign the hash of a given piece of data, prefixed | 
					
						
							|  |  |  | // by the Ethereum prefix scheme | 
					
						
							|  |  |  | // It looks up the account specified either solely via its address contained within, | 
					
						
							|  |  |  | // or optionally with the aid of any location metadata from the embedded URL field. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // If the wallet requires additional authentication to sign the request (e.g. | 
					
						
							|  |  |  | // a password to decrypt the account, or a PIN code o verify the transaction), | 
					
						
							|  |  |  | // an AuthNeededError instance will be returned, containing infos for the user | 
					
						
							|  |  |  | // about which fields or actions are needed. The user may retry by providing | 
					
						
							|  |  |  | // the needed details via SignHashWithPassphrase, or by other means (e.g. unlock | 
					
						
							|  |  |  | // the account in a keystore). | 
					
						
							|  |  |  | func (w *Wallet) SignText(account accounts.Account, text []byte) ([]byte, error) { | 
					
						
							|  |  |  | 	return w.signHash(account, accounts.TextHash(text)) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // SignTextWithPassphrase implements accounts.Wallet, attempting to sign the | 
					
						
							|  |  |  | // given hash with the given account using passphrase as extra authentication | 
					
						
							|  |  |  | func (w *Wallet) SignTextWithPassphrase(account accounts.Account, passphrase string, text []byte) ([]byte, error) { | 
					
						
							|  |  |  | 	return w.signHashWithPassphrase(account, passphrase, crypto.Keccak256(accounts.TextHash(text))) | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // SignTxWithPassphrase requests the wallet to sign the given transaction, with the | 
					
						
							|  |  |  | // given passphrase as extra authentication information. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // It looks up the account specified either solely via its address contained within, | 
					
						
							|  |  |  | // or optionally with the aid of any location metadata from the embedded URL field. | 
					
						
							|  |  |  | func (w *Wallet) SignTxWithPassphrase(account accounts.Account, passphrase string, tx *types.Transaction, chainID *big.Int) (*types.Transaction, error) { | 
					
						
							|  |  |  | 	if !w.session.verified { | 
					
						
							|  |  |  | 		if err := w.Open(passphrase); err != nil { | 
					
						
							|  |  |  | 			return nil, err | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	return w.SignTx(account, tx, chainID) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // findAccountPath returns the derivation path for the provided account. | 
					
						
							|  |  |  | // It first checks for the address in the list of pinned accounts, and if it is | 
					
						
							|  |  |  | // not found, attempts to parse the derivation path from the account's URL. | 
					
						
							|  |  |  | func (w *Wallet) findAccountPath(account accounts.Account) (accounts.DerivationPath, error) { | 
					
						
							| 
									
										
										
										
											2018-04-20 10:37:45 +03:00
										 |  |  | 	pairing := w.Hub.pairing(w) | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	if path, ok := pairing.Accounts[account.Address]; ok { | 
					
						
							|  |  |  | 		return path, nil | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Look for the path in the URL | 
					
						
							|  |  |  | 	if account.URL.Scheme != w.Hub.scheme { | 
					
						
							| 
									
										
										
										
											2019-11-29 11:42:53 +01:00
										 |  |  | 		return nil, fmt.Errorf("scheme %s does not match wallet scheme %s", account.URL.Scheme, w.Hub.scheme) | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	parts := strings.SplitN(account.URL.Path, "/", 2) | 
					
						
							|  |  |  | 	if len(parts) != 2 { | 
					
						
							| 
									
										
										
										
											2019-11-29 11:42:53 +01:00
										 |  |  | 		return nil, fmt.Errorf("invalid URL format: %s", account.URL) | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	if parts[0] != fmt.Sprintf("%x", w.PublicKey[1:3]) { | 
					
						
							|  |  |  | 		return nil, fmt.Errorf("URL %s is not for this wallet", account.URL) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	return accounts.ParseDerivationPath(parts[1]) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-02-22 13:27:41 +00:00
										 |  |  | // Session represents a secured communication session with the wallet. | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | type Session struct { | 
					
						
							|  |  |  | 	Wallet   *Wallet               // A handle to the wallet that opened the session | 
					
						
							|  |  |  | 	Channel  *SecureChannelSession // A secure channel for encrypted messages | 
					
						
							|  |  |  | 	verified bool                  // Whether the pin has been verified in this session. | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // pair establishes a new pairing over this channel, using the provided secret. | 
					
						
							| 
									
										
										
										
											2018-02-22 13:27:41 +00:00
										 |  |  | func (s *Session) pair(secret []byte) (smartcardPairing, error) { | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	err := s.Channel.Pair(secret) | 
					
						
							|  |  |  | 	if err != nil { | 
					
						
							| 
									
										
										
										
											2018-02-22 13:27:41 +00:00
										 |  |  | 		return smartcardPairing{}, err | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-02-22 13:27:41 +00:00
										 |  |  | 	return smartcardPairing{ | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 		PublicKey:    s.Wallet.PublicKey, | 
					
						
							|  |  |  | 		PairingIndex: s.Channel.PairingIndex, | 
					
						
							|  |  |  | 		PairingKey:   s.Channel.PairingKey, | 
					
						
							|  |  |  | 		Accounts:     make(map[common.Address]accounts.DerivationPath), | 
					
						
							|  |  |  | 	}, nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-02-22 13:27:41 +00:00
										 |  |  | // unpair deletes an existing pairing. | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | func (s *Session) unpair() error { | 
					
						
							|  |  |  | 	if !s.verified { | 
					
						
							| 
									
										
										
										
											2019-11-29 11:42:53 +01:00
										 |  |  | 		return fmt.Errorf("unpair requires that the PIN be verified") | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	} | 
					
						
							|  |  |  | 	return s.Channel.Unpair() | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-02-22 13:27:41 +00:00
										 |  |  | // verifyPin unlocks a wallet with the provided pin. | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | func (s *Session) verifyPin(pin []byte) error { | 
					
						
							| 
									
										
										
										
											2019-03-23 08:45:08 +01:00
										 |  |  | 	if _, err := s.Channel.transmitEncrypted(claSCWallet, insVerifyPin, 0, 0, pin); err != nil { | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 		return err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	s.verified = true | 
					
						
							|  |  |  | 	return nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-04-20 10:37:45 +03:00
										 |  |  | // unblockPin unblocks a wallet with the provided puk and resets the pin to the | 
					
						
							|  |  |  | // new one specified. | 
					
						
							|  |  |  | func (s *Session) unblockPin(pukpin []byte) error { | 
					
						
							| 
									
										
										
										
											2019-03-23 08:45:08 +01:00
										 |  |  | 	if _, err := s.Channel.transmitEncrypted(claSCWallet, insUnblockPin, 0, 0, pukpin); err != nil { | 
					
						
							| 
									
										
										
										
											2018-04-20 10:37:45 +03:00
										 |  |  | 		return err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	s.verified = true | 
					
						
							|  |  |  | 	return nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-02-22 13:27:41 +00:00
										 |  |  | // release releases resources associated with the channel. | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | func (s *Session) release() error { | 
					
						
							| 
									
										
										
										
											2019-03-14 23:03:13 +01:00
										 |  |  | 	return s.Wallet.card.Disconnect(pcsc.LeaveCard) | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-02-22 13:27:41 +00:00
										 |  |  | // paired returns true if a valid pairing exists. | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | func (s *Session) paired() bool { | 
					
						
							|  |  |  | 	return s.Channel.PairingKey != nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-02-22 13:27:41 +00:00
										 |  |  | // authenticate uses an existing pairing to establish a secure channel. | 
					
						
							|  |  |  | func (s *Session) authenticate(pairing smartcardPairing) error { | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	if !bytes.Equal(s.Wallet.PublicKey, pairing.PublicKey) { | 
					
						
							| 
									
										
										
										
											2019-11-29 11:42:53 +01:00
										 |  |  | 		return fmt.Errorf("cannot pair using another wallet's pairing; %x != %x", s.Wallet.PublicKey, pairing.PublicKey) | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	} | 
					
						
							|  |  |  | 	s.Channel.PairingKey = pairing.PairingKey | 
					
						
							|  |  |  | 	s.Channel.PairingIndex = pairing.PairingIndex | 
					
						
							|  |  |  | 	return s.Channel.Open() | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-02-22 13:27:41 +00:00
										 |  |  | // walletStatus describes a smartcard wallet's status information. | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | type walletStatus struct { | 
					
						
							| 
									
										
										
										
											2019-03-22 19:52:23 +01:00
										 |  |  | 	PinRetryCount int  // Number of remaining PIN retries | 
					
						
							|  |  |  | 	PukRetryCount int  // Number of remaining PUK retries | 
					
						
							|  |  |  | 	Initialized   bool // Whether the card has been initialized with a private key | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-04-20 10:37:45 +03:00
										 |  |  | // walletStatus fetches the wallet's status from the card. | 
					
						
							|  |  |  | func (s *Session) walletStatus() (*walletStatus, error) { | 
					
						
							| 
									
										
										
										
											2019-03-23 08:45:08 +01:00
										 |  |  | 	response, err := s.Channel.transmitEncrypted(claSCWallet, insStatus, statusP1WalletStatus, 0, nil) | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		return nil, err | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2019-03-15 19:04:10 +01:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-03-23 17:13:02 +01:00
										 |  |  | 	status := new(walletStatus) | 
					
						
							|  |  |  | 	if _, err := asn1.UnmarshalWithParams(response.Data, status, "tag:3"); err != nil { | 
					
						
							|  |  |  | 		return nil, err | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	return status, nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-04-20 10:37:45 +03:00
										 |  |  | // derivationPath fetches the wallet's current derivation path from the card. | 
					
						
							| 
									
										
										
										
											2019-11-29 11:42:53 +01:00
										 |  |  | //lint:ignore U1000 needs to be added to the console interface | 
					
						
							| 
									
										
										
										
											2018-04-20 10:37:45 +03:00
										 |  |  | func (s *Session) derivationPath() (accounts.DerivationPath, error) { | 
					
						
							| 
									
										
										
										
											2019-03-23 08:45:08 +01:00
										 |  |  | 	response, err := s.Channel.transmitEncrypted(claSCWallet, insStatus, statusP1Path, 0, nil) | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		return nil, err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	buf := bytes.NewReader(response.Data) | 
					
						
							|  |  |  | 	path := make(accounts.DerivationPath, len(response.Data)/4) | 
					
						
							|  |  |  | 	return path, binary.Read(buf, binary.BigEndian, &path) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-02-22 13:27:41 +00:00
										 |  |  | // initializeData contains data needed to initialize the smartcard wallet. | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | type initializeData struct { | 
					
						
							|  |  |  | 	PublicKey  []byte `asn1:"tag:0"` | 
					
						
							|  |  |  | 	PrivateKey []byte `asn1:"tag:1"` | 
					
						
							|  |  |  | 	ChainCode  []byte `asn1:"tag:2"` | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-02-22 13:27:41 +00:00
										 |  |  | // initialize initializes the card with new key data. | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | func (s *Session) initialize(seed []byte) error { | 
					
						
							| 
									
										
										
										
											2019-04-02 19:28:24 +02:00
										 |  |  | 	// Check that the wallet isn't currently initialized, | 
					
						
							|  |  |  | 	// otherwise the key would be overwritten. | 
					
						
							|  |  |  | 	status, err := s.Wallet.Status() | 
					
						
							|  |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		return err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	if status == "Online" { | 
					
						
							|  |  |  | 		return fmt.Errorf("card is already initialized, cowardly refusing to proceed") | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	s.Wallet.lock.Lock() | 
					
						
							|  |  |  | 	defer s.Wallet.lock.Unlock() | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	// HMAC the seed to produce the private key and chain code | 
					
						
							|  |  |  | 	mac := hmac.New(sha512.New, []byte("Bitcoin seed")) | 
					
						
							|  |  |  | 	mac.Write(seed) | 
					
						
							|  |  |  | 	seed = mac.Sum(nil) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	key, err := crypto.ToECDSA(seed[:32]) | 
					
						
							|  |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		return err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	id := initializeData{} | 
					
						
							|  |  |  | 	id.PublicKey = crypto.FromECDSAPub(&key.PublicKey) | 
					
						
							|  |  |  | 	id.PrivateKey = seed[:32] | 
					
						
							|  |  |  | 	id.ChainCode = seed[32:] | 
					
						
							|  |  |  | 	data, err := asn1.Marshal(id) | 
					
						
							|  |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		return err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Nasty hack to force the top-level struct tag to be context-specific | 
					
						
							|  |  |  | 	data[0] = 0xA1 | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-03-23 08:45:08 +01:00
										 |  |  | 	_, err = s.Channel.transmitEncrypted(claSCWallet, insLoadKey, 0x02, 0, data) | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	return err | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-02-22 13:27:41 +00:00
										 |  |  | // derive derives a new HD key path on the card. | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | func (s *Session) derive(path accounts.DerivationPath) (accounts.Account, error) { | 
					
						
							| 
									
										
										
										
											2019-03-20 15:30:15 +01:00
										 |  |  | 	startingPoint, path, err := derivationpath.Decode(path.String()) | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		return accounts.Account{}, err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-03-20 15:30:15 +01:00
										 |  |  | 	var p1 uint8 | 
					
						
							|  |  |  | 	switch startingPoint { | 
					
						
							|  |  |  | 	case derivationpath.StartingPointMaster: | 
					
						
							|  |  |  | 		p1 = P1DeriveKeyFromMaster | 
					
						
							|  |  |  | 	case derivationpath.StartingPointParent: | 
					
						
							|  |  |  | 		p1 = P1DeriveKeyFromParent | 
					
						
							|  |  |  | 	case derivationpath.StartingPointCurrent: | 
					
						
							|  |  |  | 		p1 = P1DeriveKeyFromCurrent | 
					
						
							|  |  |  | 	default: | 
					
						
							|  |  |  | 		return accounts.Account{}, fmt.Errorf("invalid startingPoint %d", startingPoint) | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-03-20 15:30:15 +01:00
										 |  |  | 	data := new(bytes.Buffer) | 
					
						
							|  |  |  | 	for _, segment := range path { | 
					
						
							|  |  |  | 		if err := binary.Write(data, binary.BigEndian, segment); err != nil { | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 			return accounts.Account{}, err | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2019-03-20 15:30:15 +01:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-03-23 08:45:08 +01:00
										 |  |  | 	_, err = s.Channel.transmitEncrypted(claSCWallet, insDeriveKey, p1, 0, data.Bytes()) | 
					
						
							| 
									
										
										
										
											2018-06-16 20:49:45 +03:00
										 |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		return accounts.Account{}, err | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-03-23 08:45:08 +01:00
										 |  |  | 	response, err := s.Channel.transmitEncrypted(claSCWallet, insSign, 0, 0, DerivationSignatureHash[:]) | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	if err != nil { | 
					
						
							| 
									
										
										
										
											2019-03-20 15:30:15 +01:00
										 |  |  | 		return accounts.Account{}, err | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-03-20 15:30:15 +01:00
										 |  |  | 	sigdata := new(signatureData) | 
					
						
							|  |  |  | 	if _, err := asn1.UnmarshalWithParams(response.Data, sigdata, "tag:0"); err != nil { | 
					
						
							|  |  |  | 		return accounts.Account{}, err | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2019-03-20 15:30:15 +01:00
										 |  |  | 	rbytes, sbytes := sigdata.Signature.R.Bytes(), sigdata.Signature.S.Bytes() | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	sig := make([]byte, 65) | 
					
						
							|  |  |  | 	copy(sig[32-len(rbytes):32], rbytes) | 
					
						
							|  |  |  | 	copy(sig[64-len(sbytes):64], sbytes) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-05-27 17:27:18 +03:00
										 |  |  | 	if err := confirmPublicKey(sig, sigdata.PublicKey); err != nil { | 
					
						
							| 
									
										
										
										
											2019-03-20 15:30:15 +01:00
										 |  |  | 		return accounts.Account{}, err | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2019-05-27 17:27:18 +03:00
										 |  |  | 	pub, err := crypto.UnmarshalPubkey(sigdata.PublicKey) | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	if err != nil { | 
					
						
							| 
									
										
										
										
											2019-03-20 15:30:15 +01:00
										 |  |  | 		return accounts.Account{}, err | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2019-03-20 15:30:15 +01:00
										 |  |  | 	return s.Wallet.makeAccount(crypto.PubkeyToAddress(*pub), path), nil | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-02-22 13:27:41 +00:00
										 |  |  | // keyExport contains information on an exported keypair. | 
					
						
							| 
									
										
										
										
											2019-11-29 11:42:53 +01:00
										 |  |  | //lint:ignore U1000 needs to be added to the console interface | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | type keyExport struct { | 
					
						
							|  |  |  | 	PublicKey  []byte `asn1:"tag:0"` | 
					
						
							|  |  |  | 	PrivateKey []byte `asn1:"tag:1,optional"` | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-04-20 10:37:45 +03:00
										 |  |  | // publicKey returns the public key for the current derivation path. | 
					
						
							| 
									
										
										
										
											2019-11-29 11:42:53 +01:00
										 |  |  | //lint:ignore U1000 needs to be added to the console interface | 
					
						
							| 
									
										
										
										
											2018-04-20 10:37:45 +03:00
										 |  |  | func (s *Session) publicKey() ([]byte, error) { | 
					
						
							| 
									
										
										
										
											2019-03-23 08:45:08 +01:00
										 |  |  | 	response, err := s.Channel.transmitEncrypted(claSCWallet, insExportKey, exportP1Any, exportP2Pubkey, nil) | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		return nil, err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	keys := new(keyExport) | 
					
						
							|  |  |  | 	if _, err := asn1.UnmarshalWithParams(response.Data, keys, "tag:1"); err != nil { | 
					
						
							|  |  |  | 		return nil, err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	return keys.PublicKey, nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // signatureData contains information on a signature - the signature itself and | 
					
						
							| 
									
										
										
										
											2018-02-22 13:27:41 +00:00
										 |  |  | // the corresponding public key. | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | type signatureData struct { | 
					
						
							|  |  |  | 	PublicKey []byte `asn1:"tag:0"` | 
					
						
							|  |  |  | 	Signature struct { | 
					
						
							|  |  |  | 		R *big.Int | 
					
						
							|  |  |  | 		S *big.Int | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // sign asks the card to sign a message, and returns a valid signature after | 
					
						
							|  |  |  | // recovering the v value. | 
					
						
							|  |  |  | func (s *Session) sign(path accounts.DerivationPath, hash []byte) ([]byte, error) { | 
					
						
							|  |  |  | 	startTime := time.Now() | 
					
						
							|  |  |  | 	_, err := s.derive(path) | 
					
						
							|  |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		return nil, err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	deriveTime := time.Now() | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-03-23 08:45:08 +01:00
										 |  |  | 	response, err := s.Channel.transmitEncrypted(claSCWallet, insSign, signP1PrecomputedHash, signP2OnlyBlock, hash) | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		return nil, err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	sigdata := new(signatureData) | 
					
						
							|  |  |  | 	if _, err := asn1.UnmarshalWithParams(response.Data, sigdata, "tag:0"); err != nil { | 
					
						
							|  |  |  | 		return nil, err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	// Serialize the signature | 
					
						
							|  |  |  | 	rbytes, sbytes := sigdata.Signature.R.Bytes(), sigdata.Signature.S.Bytes() | 
					
						
							|  |  |  | 	sig := make([]byte, 65) | 
					
						
							|  |  |  | 	copy(sig[32-len(rbytes):32], rbytes) | 
					
						
							|  |  |  | 	copy(sig[64-len(sbytes):64], sbytes) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Recover the V value. | 
					
						
							|  |  |  | 	sig, err = makeRecoverableSignature(hash, sig, sigdata.PublicKey) | 
					
						
							|  |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		return nil, err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	log.Debug("Signed using smartcard", "deriveTime", deriveTime.Sub(startTime), "signingTime", time.Since(deriveTime)) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	return sig, nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-05-27 17:27:18 +03:00
										 |  |  | // confirmPublicKey confirms that the given signature belongs to the specified key. | 
					
						
							|  |  |  | func confirmPublicKey(sig, pubkey []byte) error { | 
					
						
							|  |  |  | 	_, err := makeRecoverableSignature(DerivationSignatureHash[:], sig, pubkey) | 
					
						
							|  |  |  | 	return err | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // makeRecoverableSignature uses a signature and an expected public key to | 
					
						
							|  |  |  | // recover the v value and produce a recoverable signature. | 
					
						
							|  |  |  | func makeRecoverableSignature(hash, sig, expectedPubkey []byte) ([]byte, error) { | 
					
						
							| 
									
										
										
										
											2019-05-26 00:07:10 +02:00
										 |  |  | 	var libraryError error | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 	for v := 0; v < 2; v++ { | 
					
						
							|  |  |  | 		sig[64] = byte(v) | 
					
						
							| 
									
										
										
										
											2019-05-26 00:07:10 +02:00
										 |  |  | 		if pubkey, err := crypto.Ecrecover(hash, sig); err == nil { | 
					
						
							| 
									
										
										
										
											2019-02-21 19:43:14 +01:00
										 |  |  | 			if bytes.Equal(pubkey, expectedPubkey) { | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 				return sig, nil | 
					
						
							|  |  |  | 			} | 
					
						
							| 
									
										
										
										
											2019-05-26 00:07:10 +02:00
										 |  |  | 		} else { | 
					
						
							|  |  |  | 			libraryError = err | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | 		} | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2019-05-26 00:07:10 +02:00
										 |  |  | 	if libraryError != nil { | 
					
						
							|  |  |  | 		return nil, libraryError | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2018-04-18 13:59:32 +03:00
										 |  |  | 	return nil, ErrPubkeyMismatch | 
					
						
							| 
									
										
										
										
											2018-01-07 18:38:11 +00:00
										 |  |  | } |