accounts, core, internal, node: Add support for smartcard wallets
This commit is contained in:
		
				
					committed by
					
						
						Guillaume Ballet
					
				
			
			
				
	
			
			
			
						parent
						
							3996bc1ad9
						
					
				
				
					commit
					f7027dd68c
				
			@@ -17,6 +17,7 @@
 | 
			
		||||
package accounts
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"encoding/json"
 | 
			
		||||
	"errors"
 | 
			
		||||
	"fmt"
 | 
			
		||||
	"math"
 | 
			
		||||
@@ -133,3 +134,17 @@ func (path DerivationPath) String() string {
 | 
			
		||||
	}
 | 
			
		||||
	return result
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (path DerivationPath) MarshalJSON() ([]byte, error) {
 | 
			
		||||
	return []byte(fmt.Sprintf("\"%s\"", path.String())), nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (dp *DerivationPath) UnmarshalJSON(b []byte) error {
 | 
			
		||||
	var path string
 | 
			
		||||
	var err error
 | 
			
		||||
	if err = json.Unmarshal(b, &path); err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
	*dp, err = ParseDerivationPath(path)
 | 
			
		||||
	return err
 | 
			
		||||
}
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										96
									
								
								accounts/scwallet/apdu.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										96
									
								
								accounts/scwallet/apdu.go
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,96 @@
 | 
			
		||||
// Copyright 2018 The go-ethereum Authors
 | 
			
		||||
// This file is part of the go-ethereum library.
 | 
			
		||||
//
 | 
			
		||||
// The go-ethereum library is free software: you can redistribute it and/or modify
 | 
			
		||||
// it under the terms of the GNU Lesser General Public License as published by
 | 
			
		||||
// the Free Software Foundation, either version 3 of the License, or
 | 
			
		||||
// (at your option) any later version.
 | 
			
		||||
//
 | 
			
		||||
// The go-ethereum library is distributed in the hope that it will be useful,
 | 
			
		||||
// but WITHOUT ANY WARRANTY; without even the implied warranty of
 | 
			
		||||
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
 | 
			
		||||
// GNU Lesser General Public License for more details.
 | 
			
		||||
//
 | 
			
		||||
// You should have received a copy of the GNU Lesser General Public License
 | 
			
		||||
// along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
 | 
			
		||||
 | 
			
		||||
package scwallet
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"bytes"
 | 
			
		||||
	"encoding/binary"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
const (
 | 
			
		||||
	CLA_ISO7816 = 0
 | 
			
		||||
 | 
			
		||||
	INS_SELECT                = 0xA4
 | 
			
		||||
	INS_GET_RESPONSE          = 0xC0
 | 
			
		||||
	INS_PAIR                  = 0x12
 | 
			
		||||
	INS_UNPAIR                = 0x13
 | 
			
		||||
	INS_OPEN_SECURE_CHANNEL   = 0x10
 | 
			
		||||
	INS_MUTUALLY_AUTHENTICATE = 0x11
 | 
			
		||||
 | 
			
		||||
	SW1_GET_RESPONSE = 0x61
 | 
			
		||||
	SW1_OK           = 0x90
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
// CommandAPDU represents an application data unit sent to a smartcard
 | 
			
		||||
type CommandAPDU struct {
 | 
			
		||||
	Cla, Ins, P1, P2 uint8  // Class, Instruction, Parameter 1, Parameter 2
 | 
			
		||||
	Data             []byte // Command data
 | 
			
		||||
	Le               uint8  // Command data length
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// serialize serializes a command APDU.
 | 
			
		||||
func (ca CommandAPDU) serialize() ([]byte, error) {
 | 
			
		||||
	buf := new(bytes.Buffer)
 | 
			
		||||
 | 
			
		||||
	if err := binary.Write(buf, binary.BigEndian, ca.Cla); err != nil {
 | 
			
		||||
		return nil, err
 | 
			
		||||
	}
 | 
			
		||||
	if err := binary.Write(buf, binary.BigEndian, ca.Ins); err != nil {
 | 
			
		||||
		return nil, err
 | 
			
		||||
	}
 | 
			
		||||
	if err := binary.Write(buf, binary.BigEndian, ca.P1); err != nil {
 | 
			
		||||
		return nil, err
 | 
			
		||||
	}
 | 
			
		||||
	if err := binary.Write(buf, binary.BigEndian, ca.P2); err != nil {
 | 
			
		||||
		return nil, err
 | 
			
		||||
	}
 | 
			
		||||
	if len(ca.Data) > 0 {
 | 
			
		||||
		if err := binary.Write(buf, binary.BigEndian, uint8(len(ca.Data))); err != nil {
 | 
			
		||||
			return nil, err
 | 
			
		||||
		}
 | 
			
		||||
		if err := binary.Write(buf, binary.BigEndian, ca.Data); err != nil {
 | 
			
		||||
			return nil, err
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
	if err := binary.Write(buf, binary.BigEndian, ca.Le); err != nil {
 | 
			
		||||
		return nil, err
 | 
			
		||||
	}
 | 
			
		||||
	return buf.Bytes(), nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// ResponseAPDU represents an application data unit received from a smart card
 | 
			
		||||
type ResponseAPDU struct {
 | 
			
		||||
	Data     []byte // response data
 | 
			
		||||
	Sw1, Sw2 uint8  // status words 1 and 2
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// deserialize deserializes a response APDU
 | 
			
		||||
func (ra *ResponseAPDU) deserialize(data []byte) error {
 | 
			
		||||
	ra.Data = make([]byte, len(data)-2)
 | 
			
		||||
 | 
			
		||||
	buf := bytes.NewReader(data)
 | 
			
		||||
	if err := binary.Read(buf, binary.BigEndian, &ra.Data); err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
	if err := binary.Read(buf, binary.BigEndian, &ra.Sw1); err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
	if err := binary.Read(buf, binary.BigEndian, &ra.Sw2); err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										277
									
								
								accounts/scwallet/hub.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										277
									
								
								accounts/scwallet/hub.go
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,277 @@
 | 
			
		||||
// Copyright 2018 The go-ethereum Authors
 | 
			
		||||
// This file is part of the go-ethereum library.
 | 
			
		||||
//
 | 
			
		||||
// The go-ethereum library is free software: you can redistribute it and/or modify
 | 
			
		||||
// it under the terms of the GNU Lesser General Public License as published by
 | 
			
		||||
// the Free Software Foundation, either version 3 of the License, or
 | 
			
		||||
// (at your option) any later version.
 | 
			
		||||
//
 | 
			
		||||
// The go-ethereum library is distributed in the hope that it will be useful,
 | 
			
		||||
// but WITHOUT ANY WARRANTY; without even the implied warranty of
 | 
			
		||||
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
 | 
			
		||||
// GNU Lesser General Public License for more details.
 | 
			
		||||
//
 | 
			
		||||
// You should have received a copy of the GNU Lesser General Public License
 | 
			
		||||
// along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
 | 
			
		||||
 | 
			
		||||
package scwallet
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"encoding/json"
 | 
			
		||||
	"io/ioutil"
 | 
			
		||||
	"os"
 | 
			
		||||
	"reflect"
 | 
			
		||||
	"sync"
 | 
			
		||||
	"time"
 | 
			
		||||
 | 
			
		||||
	"github.com/ebfe/scard"
 | 
			
		||||
	"github.com/ethereum/go-ethereum/accounts"
 | 
			
		||||
	"github.com/ethereum/go-ethereum/common"
 | 
			
		||||
	"github.com/ethereum/go-ethereum/common/hexutil"
 | 
			
		||||
	"github.com/ethereum/go-ethereum/event"
 | 
			
		||||
	"github.com/ethereum/go-ethereum/log"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
const Scheme = "pcsc"
 | 
			
		||||
 | 
			
		||||
// refreshCycle is the maximum time between wallet refreshes (if USB hotplug
 | 
			
		||||
// notifications don't work).
 | 
			
		||||
const refreshCycle = 5 * time.Second
 | 
			
		||||
 | 
			
		||||
// refreshThrottling is the minimum time between wallet refreshes to avoid thrashing.
 | 
			
		||||
const refreshThrottling = 500 * time.Millisecond
 | 
			
		||||
 | 
			
		||||
// SmartcardPairing contains information about a smart card we have paired with
 | 
			
		||||
// or might pair withub.
 | 
			
		||||
type SmartcardPairing struct {
 | 
			
		||||
	PublicKey    []byte                                     `json:"publicKey"`
 | 
			
		||||
	PairingIndex uint8                                      `json:"pairingIndex"`
 | 
			
		||||
	PairingKey   []byte                                     `json:"pairingKey"`
 | 
			
		||||
	Accounts     map[common.Address]accounts.DerivationPath `json:"accounts"`
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// Hub is a accounts.Backend that can find and handle generic PC/SC hardware wallets.
 | 
			
		||||
type Hub struct {
 | 
			
		||||
	scheme string // Protocol scheme prefixing account and wallet URLs.
 | 
			
		||||
 | 
			
		||||
	context     *scard.Context
 | 
			
		||||
	datadir     string
 | 
			
		||||
	pairings    map[string]SmartcardPairing
 | 
			
		||||
	refreshed   time.Time               // Time instance when the list of wallets was last refreshed
 | 
			
		||||
	wallets     map[string]*Wallet      // Mapping from reader names to wallet instances
 | 
			
		||||
	updateFeed  event.Feed              // Event feed to notify wallet additions/removals
 | 
			
		||||
	updateScope event.SubscriptionScope // Subscription scope tracking current live listeners
 | 
			
		||||
	updating    bool                    // Whether the event notification loop is running
 | 
			
		||||
 | 
			
		||||
	quit chan chan error
 | 
			
		||||
 | 
			
		||||
	stateLock sync.Mutex // Protects the internals of the hub from racey access
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
var HubType = reflect.TypeOf(&Hub{})
 | 
			
		||||
 | 
			
		||||
func (hub *Hub) readPairings() error {
 | 
			
		||||
	hub.pairings = make(map[string]SmartcardPairing)
 | 
			
		||||
	pairingFile, err := os.Open(hub.datadir + "/smartcards.json")
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		if os.IsNotExist(err) {
 | 
			
		||||
			return nil
 | 
			
		||||
		}
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	pairingData, err := ioutil.ReadAll(pairingFile)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
	var pairings []SmartcardPairing
 | 
			
		||||
	if err := json.Unmarshal(pairingData, &pairings); err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	for _, pairing := range pairings {
 | 
			
		||||
		hub.pairings[string(pairing.PublicKey)] = pairing
 | 
			
		||||
	}
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (hub *Hub) writePairings() error {
 | 
			
		||||
	pairingFile, err := os.OpenFile(hub.datadir+"/smartcards.json", os.O_RDWR|os.O_CREATE, 0755)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	pairings := make([]SmartcardPairing, 0, len(hub.pairings))
 | 
			
		||||
	for _, pairing := range hub.pairings {
 | 
			
		||||
		pairings = append(pairings, pairing)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	pairingData, err := json.Marshal(pairings)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if _, err := pairingFile.Write(pairingData); err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return pairingFile.Close()
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (hub *Hub) getPairing(wallet *Wallet) *SmartcardPairing {
 | 
			
		||||
	pairing, ok := hub.pairings[string(wallet.PublicKey)]
 | 
			
		||||
	if ok {
 | 
			
		||||
		return &pairing
 | 
			
		||||
	}
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (hub *Hub) setPairing(wallet *Wallet, pairing *SmartcardPairing) error {
 | 
			
		||||
	if pairing == nil {
 | 
			
		||||
		delete(hub.pairings, string(wallet.PublicKey))
 | 
			
		||||
	} else {
 | 
			
		||||
		hub.pairings[string(wallet.PublicKey)] = *pairing
 | 
			
		||||
	}
 | 
			
		||||
	return hub.writePairings()
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// NewHub creates a new hardware wallet manager for smartcards.
 | 
			
		||||
func NewHub(scheme string, datadir string) (*Hub, error) {
 | 
			
		||||
	context, err := scard.EstablishContext()
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return nil, err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	hub := &Hub{
 | 
			
		||||
		scheme:  scheme,
 | 
			
		||||
		context: context,
 | 
			
		||||
		datadir: datadir,
 | 
			
		||||
		wallets: make(map[string]*Wallet),
 | 
			
		||||
		quit:    make(chan chan error),
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if err := hub.readPairings(); err != nil {
 | 
			
		||||
		return nil, err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	hub.refreshWallets()
 | 
			
		||||
	return hub, nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// Wallets implements accounts.Backend, returning all the currently tracked USB
 | 
			
		||||
// devices that appear to be hardware wallets.
 | 
			
		||||
func (hub *Hub) Wallets() []accounts.Wallet {
 | 
			
		||||
	// Make sure the list of wallets is up to date
 | 
			
		||||
	hub.stateLock.Lock()
 | 
			
		||||
	defer hub.stateLock.Unlock()
 | 
			
		||||
 | 
			
		||||
	hub.refreshWallets()
 | 
			
		||||
 | 
			
		||||
	cpy := make([]accounts.Wallet, 0, len(hub.wallets))
 | 
			
		||||
	for _, wallet := range hub.wallets {
 | 
			
		||||
		if wallet != nil {
 | 
			
		||||
			cpy = append(cpy, wallet)
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
	return cpy
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// refreshWallets scans the USB devices attached to the machine and updates the
 | 
			
		||||
// list of wallets based on the found devices.
 | 
			
		||||
func (hub *Hub) refreshWallets() {
 | 
			
		||||
	elapsed := time.Since(hub.refreshed)
 | 
			
		||||
	if elapsed < refreshThrottling {
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	readers, err := hub.context.ListReaders()
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		log.Error("Error listing readers", "err", err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	events := []accounts.WalletEvent{}
 | 
			
		||||
	seen := make(map[string]struct{})
 | 
			
		||||
	for _, reader := range readers {
 | 
			
		||||
		if wallet, ok := hub.wallets[reader]; ok {
 | 
			
		||||
			// We already know about this card; check it's still present
 | 
			
		||||
			if err := wallet.ping(); err != nil {
 | 
			
		||||
				log.Debug("Got error pinging wallet", "reader", reader, "err", err)
 | 
			
		||||
			} else {
 | 
			
		||||
				seen[reader] = struct{}{}
 | 
			
		||||
			}
 | 
			
		||||
			continue
 | 
			
		||||
		}
 | 
			
		||||
		seen[reader] = struct{}{}
 | 
			
		||||
 | 
			
		||||
		card, err := hub.context.Connect(reader, scard.ShareShared, scard.ProtocolAny)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			log.Debug("Error opening card", "reader", reader, "err", err)
 | 
			
		||||
			continue
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		wallet := NewWallet(hub, card)
 | 
			
		||||
		err = wallet.connect()
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			log.Debug("Error connecting to wallet", "reader", reader, "err", err)
 | 
			
		||||
			card.Disconnect(scard.LeaveCard)
 | 
			
		||||
			continue
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		hub.wallets[reader] = wallet
 | 
			
		||||
		events = append(events, accounts.WalletEvent{Wallet: wallet, Kind: accounts.WalletArrived})
 | 
			
		||||
		log.Info("Found new smartcard wallet", "reader", reader, "publicKey", hexutil.Encode(wallet.PublicKey[:4]))
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// Remove any wallets we no longer see
 | 
			
		||||
	for k, wallet := range hub.wallets {
 | 
			
		||||
		if _, ok := seen[k]; !ok {
 | 
			
		||||
			log.Info("Wallet disconnected", "pubkey", hexutil.Encode(wallet.PublicKey[:4]), "reader", k)
 | 
			
		||||
			wallet.Close()
 | 
			
		||||
			events = append(events, accounts.WalletEvent{Wallet: wallet, Kind: accounts.WalletDropped})
 | 
			
		||||
			delete(hub.wallets, k)
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	for _, event := range events {
 | 
			
		||||
		hub.updateFeed.Send(event)
 | 
			
		||||
	}
 | 
			
		||||
	hub.refreshed = time.Now()
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// Subscribe implements accounts.Backend, creating an async subscription to
 | 
			
		||||
// receive notifications on the addition or removal of wallets.
 | 
			
		||||
func (hub *Hub) Subscribe(sink chan<- accounts.WalletEvent) event.Subscription {
 | 
			
		||||
	// We need the mutex to reliably start/stop the update loop
 | 
			
		||||
	hub.stateLock.Lock()
 | 
			
		||||
	defer hub.stateLock.Unlock()
 | 
			
		||||
 | 
			
		||||
	// Subscribe the caller and track the subscriber count
 | 
			
		||||
	sub := hub.updateScope.Track(hub.updateFeed.Subscribe(sink))
 | 
			
		||||
 | 
			
		||||
	// Subscribers require an active notification loop, start it
 | 
			
		||||
	if !hub.updating {
 | 
			
		||||
		hub.updating = true
 | 
			
		||||
		go hub.updater()
 | 
			
		||||
	}
 | 
			
		||||
	return sub
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// updater is responsible for maintaining an up-to-date list of wallets managed
 | 
			
		||||
// by the hub, and for firing wallet addition/removal events.
 | 
			
		||||
func (hub *Hub) updater() {
 | 
			
		||||
	for {
 | 
			
		||||
		time.Sleep(refreshCycle)
 | 
			
		||||
 | 
			
		||||
		// Run the wallet refresher
 | 
			
		||||
		hub.stateLock.Lock()
 | 
			
		||||
		hub.refreshWallets()
 | 
			
		||||
 | 
			
		||||
		// If all our subscribers left, stop the updater
 | 
			
		||||
		if hub.updateScope.Count() == 0 {
 | 
			
		||||
			hub.updating = false
 | 
			
		||||
			hub.stateLock.Unlock()
 | 
			
		||||
			return
 | 
			
		||||
		}
 | 
			
		||||
		hub.stateLock.Unlock()
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										342
									
								
								accounts/scwallet/securechannel.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										342
									
								
								accounts/scwallet/securechannel.go
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,342 @@
 | 
			
		||||
// Copyright 2018 The go-ethereum Authors
 | 
			
		||||
// This file is part of the go-ethereum library.
 | 
			
		||||
//
 | 
			
		||||
// The go-ethereum library is free software: you can redistribute it and/or modify
 | 
			
		||||
// it under the terms of the GNU Lesser General Public License as published by
 | 
			
		||||
// the Free Software Foundation, either version 3 of the License, or
 | 
			
		||||
// (at your option) any later version.
 | 
			
		||||
//
 | 
			
		||||
// The go-ethereum library is distributed in the hope that it will be useful,
 | 
			
		||||
// but WITHOUT ANY WARRANTY; without even the implied warranty of
 | 
			
		||||
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
 | 
			
		||||
// GNU Lesser General Public License for more details.
 | 
			
		||||
//
 | 
			
		||||
// You should have received a copy of the GNU Lesser General Public License
 | 
			
		||||
// along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
 | 
			
		||||
 | 
			
		||||
package scwallet
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	//"crypto/ecdsa"
 | 
			
		||||
	"bytes"
 | 
			
		||||
	"crypto/aes"
 | 
			
		||||
	"crypto/cipher"
 | 
			
		||||
	"crypto/rand"
 | 
			
		||||
	"crypto/sha256"
 | 
			
		||||
	"crypto/sha512"
 | 
			
		||||
	"fmt"
 | 
			
		||||
	//"math/big"
 | 
			
		||||
	"github.com/ebfe/scard"
 | 
			
		||||
	"github.com/ethereum/go-ethereum/crypto"
 | 
			
		||||
	ecdh "github.com/wsddn/go-ecdh"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
const (
 | 
			
		||||
	MAX_PAYLOAD_SIZE   = 223
 | 
			
		||||
	PAIR_P1_FIRST_STEP = 0
 | 
			
		||||
	PAIR_P1_LAST_STEP  = 1
 | 
			
		||||
 | 
			
		||||
	SC_SECRET_LENGTH = 32
 | 
			
		||||
	SC_BLOCK_SIZE    = 16
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
// SecureChannelSession enables secure communication with a hardware wallet
 | 
			
		||||
type SecureChannelSession struct {
 | 
			
		||||
	card          *scard.Card // A handle to the smartcard for communication
 | 
			
		||||
	secret        []byte      // A shared secret generated from our ECDSA keys
 | 
			
		||||
	publicKey     []byte      // Our own ephemeral public key
 | 
			
		||||
	PairingKey    []byte      // A permanent shared secret for a pairing, if present
 | 
			
		||||
	sessionEncKey []byte      // The current session encryption key
 | 
			
		||||
	sessionMacKey []byte      // The current session MAC key
 | 
			
		||||
	iv            []byte      // The current IV
 | 
			
		||||
	PairingIndex  uint8       // The pairing index
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// NewSecureChannelSession creates a new secure channel for the given card and public key
 | 
			
		||||
func NewSecureChannelSession(card *scard.Card, keyData []byte) (*SecureChannelSession, error) {
 | 
			
		||||
	// Generate an ECDSA keypair for ourselves
 | 
			
		||||
	gen := ecdh.NewEllipticECDH(crypto.S256())
 | 
			
		||||
	private, public, err := gen.GenerateKey(rand.Reader)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return nil, err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	cardPublic, ok := gen.Unmarshal(keyData)
 | 
			
		||||
	if !ok {
 | 
			
		||||
		return nil, fmt.Errorf("Could not unmarshal public key from card")
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	secret, err := gen.GenerateSharedSecret(private, cardPublic)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return nil, err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return &SecureChannelSession{
 | 
			
		||||
		card:      card,
 | 
			
		||||
		secret:    secret,
 | 
			
		||||
		publicKey: gen.Marshal(public),
 | 
			
		||||
	}, nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// Pair establishes a new pairing with the smartcard
 | 
			
		||||
func (s *SecureChannelSession) Pair(sharedSecret []byte) error {
 | 
			
		||||
	secretHash := sha256.Sum256(sharedSecret)
 | 
			
		||||
 | 
			
		||||
	challenge := make([]byte, 32)
 | 
			
		||||
	if _, err := rand.Read(challenge); err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	response, err := s.pair(PAIR_P1_FIRST_STEP, challenge)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	md := sha256.New()
 | 
			
		||||
	md.Write(secretHash[:])
 | 
			
		||||
	md.Write(challenge)
 | 
			
		||||
 | 
			
		||||
	expectedCryptogram := md.Sum(nil)
 | 
			
		||||
	cardCryptogram := response.Data[:32]
 | 
			
		||||
	cardChallenge := response.Data[32:]
 | 
			
		||||
 | 
			
		||||
	if !bytes.Equal(expectedCryptogram, cardCryptogram) {
 | 
			
		||||
		return fmt.Errorf("Invalid card cryptogram")
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	md.Reset()
 | 
			
		||||
	md.Write(secretHash[:])
 | 
			
		||||
	md.Write(cardChallenge)
 | 
			
		||||
	response, err = s.pair(PAIR_P1_LAST_STEP, md.Sum(nil))
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	md.Reset()
 | 
			
		||||
	md.Write(secretHash[:])
 | 
			
		||||
	md.Write(response.Data[1:])
 | 
			
		||||
	s.PairingKey = md.Sum(nil)
 | 
			
		||||
	s.PairingIndex = response.Data[0]
 | 
			
		||||
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// Unpair disestablishes an existing pairing
 | 
			
		||||
func (s *SecureChannelSession) Unpair() error {
 | 
			
		||||
	if s.PairingKey == nil {
 | 
			
		||||
		return fmt.Errorf("Cannot unpair: not paired")
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	_, err := s.TransmitEncrypted(CLA_SCWALLET, INS_UNPAIR, s.PairingIndex, 0, []byte{})
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
	s.PairingKey = nil
 | 
			
		||||
	// Close channel
 | 
			
		||||
	s.iv = nil
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// Open initializes the secure channel
 | 
			
		||||
func (s *SecureChannelSession) Open() error {
 | 
			
		||||
	if s.iv != nil {
 | 
			
		||||
		return fmt.Errorf("Session already opened")
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	response, err := s.open()
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// Generate the encryption/mac key by hashing our shared secret,
 | 
			
		||||
	// pairing key, and the first bytes returned from the Open APDU.
 | 
			
		||||
	md := sha512.New()
 | 
			
		||||
	md.Write(s.secret)
 | 
			
		||||
	md.Write(s.PairingKey)
 | 
			
		||||
	md.Write(response.Data[:SC_SECRET_LENGTH])
 | 
			
		||||
	keyData := md.Sum(nil)
 | 
			
		||||
	s.sessionEncKey = keyData[:SC_SECRET_LENGTH]
 | 
			
		||||
	s.sessionMacKey = keyData[SC_SECRET_LENGTH : SC_SECRET_LENGTH*2]
 | 
			
		||||
 | 
			
		||||
	// The IV is the last bytes returned from the Open APDU.
 | 
			
		||||
	s.iv = response.Data[SC_SECRET_LENGTH:]
 | 
			
		||||
 | 
			
		||||
	if err := s.mutuallyAuthenticate(); err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// mutuallyAuthenticate is an internal method to authenticate both ends of the
 | 
			
		||||
// connection.
 | 
			
		||||
func (s *SecureChannelSession) mutuallyAuthenticate() error {
 | 
			
		||||
	data := make([]byte, SC_SECRET_LENGTH)
 | 
			
		||||
	if _, err := rand.Read(data); err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	response, err := s.TransmitEncrypted(CLA_SCWALLET, INS_MUTUALLY_AUTHENTICATE, 0, 0, data)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
	if response.Sw1 != 0x90 || response.Sw2 != 0x00 {
 | 
			
		||||
		return fmt.Errorf("Got unexpected response from MUTUALLY_AUTHENTICATE: 0x%x%x", response.Sw1, response.Sw2)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if len(response.Data) != SC_SECRET_LENGTH {
 | 
			
		||||
		return fmt.Errorf("Response from MUTUALLY_AUTHENTICATE was %d bytes, expected %d", len(response.Data), SC_SECRET_LENGTH)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// open is an internal method that sends an open APDU
 | 
			
		||||
func (s *SecureChannelSession) open() (*ResponseAPDU, error) {
 | 
			
		||||
	return transmit(s.card, &CommandAPDU{
 | 
			
		||||
		Cla:  CLA_SCWALLET,
 | 
			
		||||
		Ins:  INS_OPEN_SECURE_CHANNEL,
 | 
			
		||||
		P1:   s.PairingIndex,
 | 
			
		||||
		P2:   0,
 | 
			
		||||
		Data: s.publicKey,
 | 
			
		||||
		Le:   0,
 | 
			
		||||
	})
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// pair is an internal method that sends a pair APDU
 | 
			
		||||
func (s *SecureChannelSession) pair(p1 uint8, data []byte) (*ResponseAPDU, error) {
 | 
			
		||||
	return transmit(s.card, &CommandAPDU{
 | 
			
		||||
		Cla:  CLA_SCWALLET,
 | 
			
		||||
		Ins:  INS_PAIR,
 | 
			
		||||
		P1:   p1,
 | 
			
		||||
		P2:   0,
 | 
			
		||||
		Data: data,
 | 
			
		||||
		Le:   0,
 | 
			
		||||
	})
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// TransmitEncrypted sends an encrypted message, and decrypts and returns the response
 | 
			
		||||
func (s *SecureChannelSession) TransmitEncrypted(cla, ins, p1, p2 byte, data []byte) (*ResponseAPDU, error) {
 | 
			
		||||
	if s.iv == nil {
 | 
			
		||||
		return nil, fmt.Errorf("Channel not open")
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	data, err := s.encryptAPDU(data)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return nil, err
 | 
			
		||||
	}
 | 
			
		||||
	meta := []byte{cla, ins, p1, p2, byte(len(data) + SC_BLOCK_SIZE), 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}
 | 
			
		||||
	if err = s.updateIV(meta, data); err != nil {
 | 
			
		||||
		return nil, err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	fulldata := make([]byte, len(s.iv)+len(data))
 | 
			
		||||
	copy(fulldata, s.iv)
 | 
			
		||||
	copy(fulldata[len(s.iv):], data)
 | 
			
		||||
 | 
			
		||||
	response, err := transmit(s.card, &CommandAPDU{
 | 
			
		||||
		Cla:  cla,
 | 
			
		||||
		Ins:  ins,
 | 
			
		||||
		P1:   p1,
 | 
			
		||||
		P2:   p2,
 | 
			
		||||
		Data: fulldata,
 | 
			
		||||
	})
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return nil, err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	rmeta := []byte{byte(len(response.Data)), 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}
 | 
			
		||||
	rmac := response.Data[:len(s.iv)]
 | 
			
		||||
	rdata := response.Data[len(s.iv):]
 | 
			
		||||
	plainData, err := s.decryptAPDU(rdata)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return nil, err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if err = s.updateIV(rmeta, rdata); err != nil {
 | 
			
		||||
		return nil, err
 | 
			
		||||
	}
 | 
			
		||||
	if !bytes.Equal(s.iv, rmac) {
 | 
			
		||||
		return nil, fmt.Errorf("Invalid MAC in response")
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	rapdu := &ResponseAPDU{}
 | 
			
		||||
	rapdu.deserialize(plainData)
 | 
			
		||||
 | 
			
		||||
	if rapdu.Sw1 != SW1_OK {
 | 
			
		||||
		return nil, fmt.Errorf("Unexpected response status Cla=0x%x, Ins=0x%x, Sw=0x%x%x", cla, ins, rapdu.Sw1, rapdu.Sw2)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return rapdu, nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// encryptAPDU is an internal method that serializes and encrypts an APDU
 | 
			
		||||
func (s *SecureChannelSession) encryptAPDU(data []byte) ([]byte, error) {
 | 
			
		||||
	if len(data) > MAX_PAYLOAD_SIZE {
 | 
			
		||||
		return nil, fmt.Errorf("Payload of %d bytes exceeds maximum of %d", len(data), MAX_PAYLOAD_SIZE)
 | 
			
		||||
	}
 | 
			
		||||
	data = pad(data, 0x80)
 | 
			
		||||
 | 
			
		||||
	ret := make([]byte, len(data))
 | 
			
		||||
 | 
			
		||||
	a, err := aes.NewCipher(s.sessionEncKey)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return nil, err
 | 
			
		||||
	}
 | 
			
		||||
	crypter := cipher.NewCBCEncrypter(a, s.iv)
 | 
			
		||||
	crypter.CryptBlocks(ret, data)
 | 
			
		||||
	return ret, nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// pad applies message padding to a 16 byte boundary
 | 
			
		||||
func pad(data []byte, terminator byte) []byte {
 | 
			
		||||
	padded := make([]byte, (len(data)/16+1)*16)
 | 
			
		||||
	copy(padded, data)
 | 
			
		||||
	padded[len(data)] = terminator
 | 
			
		||||
	return padded
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// decryptAPDU is an internal method that decrypts and deserializes an APDU
 | 
			
		||||
func (s *SecureChannelSession) decryptAPDU(data []byte) ([]byte, error) {
 | 
			
		||||
	a, err := aes.NewCipher(s.sessionEncKey)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return nil, err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	ret := make([]byte, len(data))
 | 
			
		||||
 | 
			
		||||
	crypter := cipher.NewCBCDecrypter(a, s.iv)
 | 
			
		||||
	crypter.CryptBlocks(ret, data)
 | 
			
		||||
	return unpad(ret, 0x80)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// unpad strips padding from a message
 | 
			
		||||
func unpad(data []byte, terminator byte) ([]byte, error) {
 | 
			
		||||
	for i := 1; i <= 16; i++ {
 | 
			
		||||
		switch data[len(data)-i] {
 | 
			
		||||
		case 0:
 | 
			
		||||
			continue
 | 
			
		||||
		case terminator:
 | 
			
		||||
			return data[:len(data)-i], nil
 | 
			
		||||
		default:
 | 
			
		||||
			return nil, fmt.Errorf("Expected end of padding, got %d", data[len(data)-i])
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
	return nil, fmt.Errorf("Expected end of padding, got 0")
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// updateIV is an internal method that updates the initialization vector after
 | 
			
		||||
// each message exchanged.
 | 
			
		||||
func (s *SecureChannelSession) updateIV(meta, data []byte) error {
 | 
			
		||||
	data = pad(data, 0)
 | 
			
		||||
	a, err := aes.NewCipher(s.sessionMacKey)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
	crypter := cipher.NewCBCEncrypter(a, make([]byte, 16))
 | 
			
		||||
	crypter.CryptBlocks(meta, meta)
 | 
			
		||||
	crypter.CryptBlocks(data, data)
 | 
			
		||||
	// The first 16 bytes of the last block is the MAC
 | 
			
		||||
	s.iv = data[len(data)-32 : len(data)-16]
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										1011
									
								
								accounts/scwallet/wallet.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										1011
									
								
								accounts/scwallet/wallet.go
									
									
									
									
									
										Normal file
									
								
							
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							@@ -28,6 +28,7 @@ import (
 | 
			
		||||
	"github.com/davecgh/go-spew/spew"
 | 
			
		||||
	"github.com/ethereum/go-ethereum/accounts"
 | 
			
		||||
	"github.com/ethereum/go-ethereum/accounts/keystore"
 | 
			
		||||
	"github.com/ethereum/go-ethereum/accounts/scwallet"
 | 
			
		||||
	"github.com/ethereum/go-ethereum/common"
 | 
			
		||||
	"github.com/ethereum/go-ethereum/common/hexutil"
 | 
			
		||||
	"github.com/ethereum/go-ethereum/common/math"
 | 
			
		||||
@@ -44,6 +45,7 @@ import (
 | 
			
		||||
	"github.com/ethereum/go-ethereum/rlp"
 | 
			
		||||
	"github.com/ethereum/go-ethereum/rpc"
 | 
			
		||||
	"github.com/syndtr/goleveldb/leveldb"
 | 
			
		||||
	"github.com/tyler-smith/go-bip39"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
const (
 | 
			
		||||
@@ -471,6 +473,46 @@ func (s *PrivateAccountAPI) SignAndSendTransaction(ctx context.Context, args Sen
 | 
			
		||||
	return s.SendTransaction(ctx, args, passwd)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (s *PrivateAccountAPI) InitializeWallet(ctx context.Context, url string) (string, error) {
 | 
			
		||||
	wallet, err := s.am.Wallet(url)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return "", err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	entropy, err := bip39.NewEntropy(256)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return "", err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	mnemonic, err := bip39.NewMnemonic(entropy)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return "", err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	seed := bip39.NewSeed(mnemonic, "")
 | 
			
		||||
 | 
			
		||||
	switch wallet := wallet.(type) {
 | 
			
		||||
	case *scwallet.Wallet:
 | 
			
		||||
		return mnemonic, wallet.Initialize(seed)
 | 
			
		||||
	default:
 | 
			
		||||
		return "", fmt.Errorf("Specified wallet does not support initialization")
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (s *PrivateAccountAPI) Unpair(ctx context.Context, url string, pin string) error {
 | 
			
		||||
	wallet, err := s.am.Wallet(url)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	switch wallet := wallet.(type) {
 | 
			
		||||
	case *scwallet.Wallet:
 | 
			
		||||
		return wallet.Unpair([]byte(pin))
 | 
			
		||||
	default:
 | 
			
		||||
		return fmt.Errorf("Specified wallet does not support pairing")
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// PublicBlockChainAPI provides an API to access the Ethereum blockchain.
 | 
			
		||||
// It offers only methods that operate on public data that is freely available to anyone.
 | 
			
		||||
type PublicBlockChainAPI struct {
 | 
			
		||||
 
 | 
			
		||||
@@ -613,6 +613,16 @@ web3._extend({
 | 
			
		||||
			params: 2,
 | 
			
		||||
			inputFormatter: [web3._extend.formatters.inputTransactionFormatter, null]
 | 
			
		||||
		}),
 | 
			
		||||
		new web3._extend.Method({
 | 
			
		||||
			name: 'unpair',
 | 
			
		||||
			call: 'personal_unpair',
 | 
			
		||||
			params: 2
 | 
			
		||||
		}),
 | 
			
		||||
		new web3._extend.Method({
 | 
			
		||||
			name: 'initializeWallet',
 | 
			
		||||
			call: 'personal_initializeWallet',
 | 
			
		||||
			params: 1
 | 
			
		||||
		})
 | 
			
		||||
	],
 | 
			
		||||
	properties: [
 | 
			
		||||
		new web3._extend.Property({
 | 
			
		||||
 
 | 
			
		||||
@@ -29,6 +29,7 @@ import (
 | 
			
		||||
	"github.com/ethereum/go-ethereum/accounts"
 | 
			
		||||
	"github.com/ethereum/go-ethereum/accounts/external"
 | 
			
		||||
	"github.com/ethereum/go-ethereum/accounts/keystore"
 | 
			
		||||
	"github.com/ethereum/go-ethereum/accounts/scwallet"
 | 
			
		||||
	"github.com/ethereum/go-ethereum/accounts/usbwallet"
 | 
			
		||||
	"github.com/ethereum/go-ethereum/common"
 | 
			
		||||
	"github.com/ethereum/go-ethereum/crypto"
 | 
			
		||||
@@ -504,6 +505,12 @@ func makeAccountManager(conf *Config) (*accounts.Manager, string, error) {
 | 
			
		||||
				backends = append(backends, trezorhub)
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
		// Start a smart card hub
 | 
			
		||||
		if schub, err := scwallet.NewHub(scwallet.Scheme, keydir); err != nil {
 | 
			
		||||
			log.Warn(fmt.Sprintf("Failed to start smart card hub, disabling: %v", err))
 | 
			
		||||
		} else {
 | 
			
		||||
			backends = append(backends, schub)
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return accounts.NewManager(&accounts.Config{InsecureUnlockAllowed: conf.InsecureUnlockAllowed}, backends...), ephemeral, nil
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										23
									
								
								vendor/github.com/ebfe/scard/LICENSE
									
									
									
										generated
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										23
									
								
								vendor/github.com/ebfe/scard/LICENSE
									
									
									
										generated
									
									
										vendored
									
									
										Normal file
									
								
							@@ -0,0 +1,23 @@
 | 
			
		||||
Copyright (c) 2016, Michael Gehring <mg@ebfe.org>
 | 
			
		||||
All rights reserved.
 | 
			
		||||
 | 
			
		||||
Redistribution and use in source and binary forms, with or without modification,
 | 
			
		||||
are permitted provided that the following conditions are met:
 | 
			
		||||
 | 
			
		||||
* Redistributions of source code must retain the above copyright notice, this
 | 
			
		||||
  list of conditions and the following disclaimer.
 | 
			
		||||
 | 
			
		||||
* Redistributions in binary form must reproduce the above copyright notice, this
 | 
			
		||||
  list of conditions and the following disclaimer in the documentation and/or
 | 
			
		||||
  other materials provided with the distribution.
 | 
			
		||||
 | 
			
		||||
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
 | 
			
		||||
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
 | 
			
		||||
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
 | 
			
		||||
DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR
 | 
			
		||||
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
 | 
			
		||||
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
 | 
			
		||||
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
 | 
			
		||||
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
 | 
			
		||||
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
 | 
			
		||||
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 | 
			
		||||
							
								
								
									
										14
									
								
								vendor/github.com/ebfe/scard/README.md
									
									
									
										generated
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										14
									
								
								vendor/github.com/ebfe/scard/README.md
									
									
									
										generated
									
									
										vendored
									
									
										Normal file
									
								
							@@ -0,0 +1,14 @@
 | 
			
		||||
scard
 | 
			
		||||
=====
 | 
			
		||||
 | 
			
		||||
[](https://godoc.org/github.com/ebfe/scard)
 | 
			
		||||
 | 
			
		||||
Go bindings to the PC/SC API.
 | 
			
		||||
 | 
			
		||||
## Installation
 | 
			
		||||
 | 
			
		||||
	go get github.com/ebfe/scard
 | 
			
		||||
 | 
			
		||||
## Bugs
 | 
			
		||||
 | 
			
		||||
	- Memory layouts/GC needs a thorough review.
 | 
			
		||||
							
								
								
									
										283
									
								
								vendor/github.com/ebfe/scard/scard.go
									
									
									
										generated
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										283
									
								
								vendor/github.com/ebfe/scard/scard.go
									
									
									
										generated
									
									
										vendored
									
									
										Normal file
									
								
							@@ -0,0 +1,283 @@
 | 
			
		||||
// Package scard provides bindings to the PC/SC API.
 | 
			
		||||
package scard
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"time"
 | 
			
		||||
	"unsafe"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
type CardStatus struct {
 | 
			
		||||
	Reader         string
 | 
			
		||||
	State          State
 | 
			
		||||
	ActiveProtocol Protocol
 | 
			
		||||
	Atr            []byte
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
type ReaderState struct {
 | 
			
		||||
	Reader       string
 | 
			
		||||
	UserData     interface{}
 | 
			
		||||
	CurrentState StateFlag
 | 
			
		||||
	EventState   StateFlag
 | 
			
		||||
	Atr          []byte
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
type Context struct {
 | 
			
		||||
	ctx uintptr
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
type Card struct {
 | 
			
		||||
	handle         uintptr
 | 
			
		||||
	activeProtocol Protocol
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// wraps SCardEstablishContext
 | 
			
		||||
func EstablishContext() (*Context, error) {
 | 
			
		||||
	ctx, r := scardEstablishContext(ScopeSystem, 0, 0)
 | 
			
		||||
	if r != ErrSuccess {
 | 
			
		||||
		return nil, r
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return &Context{ctx: ctx}, nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// wraps SCardIsValidContext
 | 
			
		||||
func (ctx *Context) IsValid() (bool, error) {
 | 
			
		||||
	r := scardIsValidContext(ctx.ctx)
 | 
			
		||||
	switch r {
 | 
			
		||||
	case ErrSuccess:
 | 
			
		||||
		return true, nil
 | 
			
		||||
	case ErrInvalidHandle:
 | 
			
		||||
		return false, nil
 | 
			
		||||
	default:
 | 
			
		||||
		return false, r
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// wraps SCardCancel
 | 
			
		||||
func (ctx *Context) Cancel() error {
 | 
			
		||||
	r := scardCancel(ctx.ctx)
 | 
			
		||||
	if r != ErrSuccess {
 | 
			
		||||
		return r
 | 
			
		||||
	}
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// wraps SCardReleaseContext
 | 
			
		||||
func (ctx *Context) Release() error {
 | 
			
		||||
	r := scardReleaseContext(ctx.ctx)
 | 
			
		||||
	if r != ErrSuccess {
 | 
			
		||||
		return r
 | 
			
		||||
	}
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// wraps SCardListReaders
 | 
			
		||||
func (ctx *Context) ListReaders() ([]string, error) {
 | 
			
		||||
	needed, r := scardListReaders(ctx.ctx, nil, nil, 0)
 | 
			
		||||
	if r != ErrSuccess {
 | 
			
		||||
		return nil, r
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	buf := make(strbuf, needed)
 | 
			
		||||
	n, r := scardListReaders(ctx.ctx, nil, buf.ptr(), uint32(len(buf)))
 | 
			
		||||
	if r != ErrSuccess {
 | 
			
		||||
		return nil, r
 | 
			
		||||
	}
 | 
			
		||||
	return decodemstr(buf[:n]), nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// wraps SCardListReaderGroups
 | 
			
		||||
func (ctx *Context) ListReaderGroups() ([]string, error) {
 | 
			
		||||
	needed, r := scardListReaderGroups(ctx.ctx, nil, 0)
 | 
			
		||||
	if r != ErrSuccess {
 | 
			
		||||
		return nil, r
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	buf := make(strbuf, needed)
 | 
			
		||||
	n, r := scardListReaderGroups(ctx.ctx, buf.ptr(), uint32(len(buf)))
 | 
			
		||||
	if r != ErrSuccess {
 | 
			
		||||
		return nil, r
 | 
			
		||||
	}
 | 
			
		||||
	return decodemstr(buf[:n]), nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// wraps SCardGetStatusChange
 | 
			
		||||
func (ctx *Context) GetStatusChange(readerStates []ReaderState, timeout time.Duration) error {
 | 
			
		||||
 | 
			
		||||
	dwTimeout := durationToTimeout(timeout)
 | 
			
		||||
	states := make([]scardReaderState, len(readerStates))
 | 
			
		||||
 | 
			
		||||
	for i := range readerStates {
 | 
			
		||||
		var err error
 | 
			
		||||
		states[i], err = readerStates[i].toSys()
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			return err
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	r := scardGetStatusChange(ctx.ctx, dwTimeout, states)
 | 
			
		||||
	if r != ErrSuccess {
 | 
			
		||||
		return r
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	for i := range readerStates {
 | 
			
		||||
		(&readerStates[i]).update(&states[i])
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// wraps SCardConnect
 | 
			
		||||
func (ctx *Context) Connect(reader string, mode ShareMode, proto Protocol) (*Card, error) {
 | 
			
		||||
	creader, err := encodestr(reader)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return nil, err
 | 
			
		||||
	}
 | 
			
		||||
	handle, activeProtocol, r := scardConnect(ctx.ctx, creader.ptr(), mode, proto)
 | 
			
		||||
	if r != ErrSuccess {
 | 
			
		||||
		return nil, r
 | 
			
		||||
	}
 | 
			
		||||
	return &Card{handle: handle, activeProtocol: activeProtocol}, nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// wraps SCardDisconnect
 | 
			
		||||
func (card *Card) Disconnect(d Disposition) error {
 | 
			
		||||
	r := scardDisconnect(card.handle, d)
 | 
			
		||||
	if r != ErrSuccess {
 | 
			
		||||
		return r
 | 
			
		||||
	}
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// wraps SCardReconnect
 | 
			
		||||
func (card *Card) Reconnect(mode ShareMode, proto Protocol, disp Disposition) error {
 | 
			
		||||
	activeProtocol, r := scardReconnect(card.handle, mode, proto, disp)
 | 
			
		||||
	if r != ErrSuccess {
 | 
			
		||||
		return r
 | 
			
		||||
	}
 | 
			
		||||
	card.activeProtocol = activeProtocol
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// wraps SCardBeginTransaction
 | 
			
		||||
func (card *Card) BeginTransaction() error {
 | 
			
		||||
	r := scardBeginTransaction(card.handle)
 | 
			
		||||
	if r != ErrSuccess {
 | 
			
		||||
		return r
 | 
			
		||||
	}
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// wraps SCardEndTransaction
 | 
			
		||||
func (card *Card) EndTransaction(disp Disposition) error {
 | 
			
		||||
	r := scardEndTransaction(card.handle, disp)
 | 
			
		||||
	if r != ErrSuccess {
 | 
			
		||||
		return r
 | 
			
		||||
	}
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// wraps SCardStatus
 | 
			
		||||
func (card *Card) Status() (*CardStatus, error) {
 | 
			
		||||
	reader, state, proto, atr, err := scardCardStatus(card.handle)
 | 
			
		||||
	if err != ErrSuccess {
 | 
			
		||||
		return nil, err
 | 
			
		||||
	}
 | 
			
		||||
	return &CardStatus{Reader: reader, State: state, ActiveProtocol: proto, Atr: atr}, nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// wraps SCardTransmit
 | 
			
		||||
func (card *Card) Transmit(cmd []byte) ([]byte, error) {
 | 
			
		||||
	rsp := make([]byte, maxBufferSizeExtended)
 | 
			
		||||
	rspLen, err := scardTransmit(card.handle, card.activeProtocol, cmd, rsp)
 | 
			
		||||
	if err != ErrSuccess {
 | 
			
		||||
		return nil, err
 | 
			
		||||
	}
 | 
			
		||||
	return rsp[:rspLen], nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// wraps SCardControl
 | 
			
		||||
func (card *Card) Control(ioctl uint32, in []byte) ([]byte, error) {
 | 
			
		||||
	var out [0xffff]byte
 | 
			
		||||
	outLen, err := scardControl(card.handle, ioctl, in, out[:])
 | 
			
		||||
	if err != ErrSuccess {
 | 
			
		||||
		return nil, err
 | 
			
		||||
	}
 | 
			
		||||
	return out[:outLen], nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// wraps SCardGetAttrib
 | 
			
		||||
func (card *Card) GetAttrib(id Attrib) ([]byte, error) {
 | 
			
		||||
	needed, err := scardGetAttrib(card.handle, id, nil)
 | 
			
		||||
	if err != ErrSuccess {
 | 
			
		||||
		return nil, err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	var attrib = make([]byte, needed)
 | 
			
		||||
	n, err := scardGetAttrib(card.handle, id, attrib)
 | 
			
		||||
	if err != ErrSuccess {
 | 
			
		||||
		return nil, err
 | 
			
		||||
	}
 | 
			
		||||
	return attrib[:n], nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// wraps SCardSetAttrib
 | 
			
		||||
func (card *Card) SetAttrib(id Attrib, data []byte) error {
 | 
			
		||||
	err := scardSetAttrib(card.handle, id, data)
 | 
			
		||||
	if err != ErrSuccess {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func durationToTimeout(timeout time.Duration) uint32 {
 | 
			
		||||
	switch {
 | 
			
		||||
	case timeout < 0:
 | 
			
		||||
		return infiniteTimeout
 | 
			
		||||
	case timeout > time.Duration(infiniteTimeout)*time.Millisecond:
 | 
			
		||||
		return infiniteTimeout - 1
 | 
			
		||||
	default:
 | 
			
		||||
		return uint32(timeout / time.Millisecond)
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (buf strbuf) ptr() unsafe.Pointer {
 | 
			
		||||
	return unsafe.Pointer(&buf[0])
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (buf strbuf) split() []strbuf {
 | 
			
		||||
	var chunks []strbuf
 | 
			
		||||
	for len(buf) > 0 && buf[0] != 0 {
 | 
			
		||||
		i := 0
 | 
			
		||||
		for i = range buf {
 | 
			
		||||
			if buf[i] == 0 {
 | 
			
		||||
				break
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
		chunks = append(chunks, buf[:i+1])
 | 
			
		||||
		buf = buf[i+1:]
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return chunks
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func encodemstr(strings ...string) (strbuf, error) {
 | 
			
		||||
	var buf strbuf
 | 
			
		||||
	for _, s := range strings {
 | 
			
		||||
		utf16, err := encodestr(s)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			return nil, err
 | 
			
		||||
		}
 | 
			
		||||
		buf = append(buf, utf16...)
 | 
			
		||||
	}
 | 
			
		||||
	buf = append(buf, 0)
 | 
			
		||||
	return buf, nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func decodemstr(buf strbuf) []string {
 | 
			
		||||
	var strings []string
 | 
			
		||||
	for _, chunk := range buf.split() {
 | 
			
		||||
		strings = append(strings, decodestr(chunk))
 | 
			
		||||
	}
 | 
			
		||||
	return strings
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										219
									
								
								vendor/github.com/ebfe/scard/scard_darwin.go
									
									
									
										generated
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										219
									
								
								vendor/github.com/ebfe/scard/scard_darwin.go
									
									
									
										generated
									
									
										vendored
									
									
										Normal file
									
								
							@@ -0,0 +1,219 @@
 | 
			
		||||
// +build darwin
 | 
			
		||||
 | 
			
		||||
package scard
 | 
			
		||||
 | 
			
		||||
// #cgo LDFLAGS: -framework PCSC
 | 
			
		||||
// #cgo CFLAGS: -I /usr/include
 | 
			
		||||
// #include <stdlib.h>
 | 
			
		||||
// #include <PCSC/winscard.h>
 | 
			
		||||
// #include <PCSC/wintypes.h>
 | 
			
		||||
import "C"
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"unsafe"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
func (e Error) Error() string {
 | 
			
		||||
	return "scard: " + C.GoString(C.pcsc_stringify_error(C.int32_t(e)))
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// Version returns the libpcsclite version string
 | 
			
		||||
func Version() string {
 | 
			
		||||
	return C.PCSCLITE_VERSION_NUMBER
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardEstablishContext(scope Scope, reserved1, reserved2 uintptr) (uintptr, Error) {
 | 
			
		||||
	var ctx C.SCARDCONTEXT
 | 
			
		||||
	r := C.SCardEstablishContext(C.uint32_t(scope), unsafe.Pointer(reserved1), unsafe.Pointer(reserved2), &ctx)
 | 
			
		||||
	return uintptr(ctx), Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardIsValidContext(ctx uintptr) Error {
 | 
			
		||||
	r := C.SCardIsValidContext(C.SCARDCONTEXT(ctx))
 | 
			
		||||
	return Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardCancel(ctx uintptr) Error {
 | 
			
		||||
	r := C.SCardCancel(C.SCARDCONTEXT(ctx))
 | 
			
		||||
	return Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardReleaseContext(ctx uintptr) Error {
 | 
			
		||||
	r := C.SCardReleaseContext(C.SCARDCONTEXT(ctx))
 | 
			
		||||
	return Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardListReaders(ctx uintptr, groups, buf unsafe.Pointer, bufLen uint32) (uint32, Error) {
 | 
			
		||||
	dwBufLen := C.uint32_t(bufLen)
 | 
			
		||||
	r := C.SCardListReaders(C.SCARDCONTEXT(ctx), (C.LPCSTR)(groups), (C.LPSTR)(buf), &dwBufLen)
 | 
			
		||||
	return uint32(dwBufLen), Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardListReaderGroups(ctx uintptr, buf unsafe.Pointer, bufLen uint32) (uint32, Error) {
 | 
			
		||||
	dwBufLen := C.uint32_t(bufLen)
 | 
			
		||||
	r := C.SCardListReaderGroups(C.SCARDCONTEXT(ctx), (C.LPSTR)(buf), &dwBufLen)
 | 
			
		||||
	return uint32(dwBufLen), Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardGetStatusChange(ctx uintptr, timeout uint32, states []scardReaderState) Error {
 | 
			
		||||
	// In darwin, the LPSCARD_READERSTATE_A has 1 byte alignment and hence
 | 
			
		||||
	// has no trailing padding. Go does add 3 bytes of padding (on both 32
 | 
			
		||||
	// and 64 bits), so we pack an array manually instead.
 | 
			
		||||
	const size = int(unsafe.Sizeof(states[0])) - 3
 | 
			
		||||
	buf := make([]byte, size*len(states))
 | 
			
		||||
	for i, _ := range states {
 | 
			
		||||
		copy(buf[i*size:(i+1)*size], (*(*[size]byte)(unsafe.Pointer(&states[i])))[:])
 | 
			
		||||
	}
 | 
			
		||||
	r := C.SCardGetStatusChange(C.SCARDCONTEXT(ctx), C.uint32_t(timeout), (C.LPSCARD_READERSTATE_A)(unsafe.Pointer(&buf[0])), C.uint32_t(len(states)))
 | 
			
		||||
	for i, _ := range states {
 | 
			
		||||
		copy((*(*[size]byte)(unsafe.Pointer(&states[i])))[:], buf[i*size:(i+1)*size])
 | 
			
		||||
	}
 | 
			
		||||
	return Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardConnect(ctx uintptr, reader unsafe.Pointer, shareMode ShareMode, proto Protocol) (uintptr, Protocol, Error) {
 | 
			
		||||
	var handle C.SCARDHANDLE
 | 
			
		||||
	var activeProto C.uint32_t
 | 
			
		||||
 | 
			
		||||
	r := C.SCardConnect(C.SCARDCONTEXT(ctx), C.LPCSTR(reader), C.uint32_t(shareMode), C.uint32_t(proto), &handle, &activeProto)
 | 
			
		||||
 | 
			
		||||
	return uintptr(handle), Protocol(activeProto), Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardDisconnect(card uintptr, d Disposition) Error {
 | 
			
		||||
	r := C.SCardDisconnect(C.SCARDHANDLE(card), C.uint32_t(d))
 | 
			
		||||
	return Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardReconnect(card uintptr, mode ShareMode, proto Protocol, disp Disposition) (Protocol, Error) {
 | 
			
		||||
	var activeProtocol C.uint32_t
 | 
			
		||||
	r := C.SCardReconnect(C.SCARDHANDLE(card), C.uint32_t(mode), C.uint32_t(proto), C.uint32_t(disp), &activeProtocol)
 | 
			
		||||
	return Protocol(activeProtocol), Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardBeginTransaction(card uintptr) Error {
 | 
			
		||||
	r := C.SCardBeginTransaction(C.SCARDHANDLE(card))
 | 
			
		||||
	return Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardEndTransaction(card uintptr, disp Disposition) Error {
 | 
			
		||||
	r := C.SCardEndTransaction(C.SCARDHANDLE(card), C.uint32_t(disp))
 | 
			
		||||
	return Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardCardStatus(card uintptr) (string, State, Protocol, []byte, Error) {
 | 
			
		||||
	var readerBuf [C.MAX_READERNAME + 1]byte
 | 
			
		||||
	var readerLen = C.uint32_t(len(readerBuf))
 | 
			
		||||
	var state, proto C.uint32_t
 | 
			
		||||
	var atr [maxAtrSize]byte
 | 
			
		||||
	var atrLen = C.uint32_t(len(atr))
 | 
			
		||||
 | 
			
		||||
	r := C.SCardStatus(C.SCARDHANDLE(card), (C.LPSTR)(unsafe.Pointer(&readerBuf[0])), &readerLen, &state, &proto, (*C.uchar)(&atr[0]), &atrLen)
 | 
			
		||||
 | 
			
		||||
	return decodestr(readerBuf[:readerLen]), State(state), Protocol(proto), atr[:atrLen], Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardTransmit(card uintptr, proto Protocol, cmd []byte, rsp []byte) (uint32, Error) {
 | 
			
		||||
	var sendpci C.SCARD_IO_REQUEST
 | 
			
		||||
	var recvpci C.SCARD_IO_REQUEST
 | 
			
		||||
	var rspLen = C.uint32_t(len(rsp))
 | 
			
		||||
 | 
			
		||||
	switch proto {
 | 
			
		||||
	case ProtocolT0, ProtocolT1:
 | 
			
		||||
		sendpci.dwProtocol = C.uint32_t(proto)
 | 
			
		||||
	default:
 | 
			
		||||
		panic("unknown protocol")
 | 
			
		||||
	}
 | 
			
		||||
	sendpci.cbPciLength = C.sizeof_SCARD_IO_REQUEST
 | 
			
		||||
 | 
			
		||||
	r := C.SCardTransmit(C.SCARDHANDLE(card), &sendpci, (*C.uchar)(&cmd[0]), C.uint32_t(len(cmd)), &recvpci, (*C.uchar)(&rsp[0]), &rspLen)
 | 
			
		||||
 | 
			
		||||
	return uint32(rspLen), Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardControl(card uintptr, ioctl uint32, in, out []byte) (uint32, Error) {
 | 
			
		||||
	var ptrIn unsafe.Pointer
 | 
			
		||||
	var outLen = C.uint32_t(len(out))
 | 
			
		||||
 | 
			
		||||
	if len(in) != 0 {
 | 
			
		||||
		ptrIn = unsafe.Pointer(&in[0])
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	r := C.SCardControl(C.SCARDHANDLE(card), C.uint32_t(ioctl), ptrIn, C.uint32_t(len(in)), unsafe.Pointer(&out[0]), C.uint32_t(len(out)), &outLen)
 | 
			
		||||
	return uint32(outLen), Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardGetAttrib(card uintptr, id Attrib, buf []byte) (uint32, Error) {
 | 
			
		||||
	var ptr *C.uint8_t
 | 
			
		||||
 | 
			
		||||
	if len(buf) != 0 {
 | 
			
		||||
		ptr = (*C.uint8_t)(&buf[0])
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	bufLen := C.uint32_t(len(buf))
 | 
			
		||||
	r := C.SCardGetAttrib(C.SCARDHANDLE(card), C.uint32_t(id), ptr, &bufLen)
 | 
			
		||||
 | 
			
		||||
	return uint32(bufLen), Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardSetAttrib(card uintptr, id Attrib, buf []byte) Error {
 | 
			
		||||
	r := C.SCardSetAttrib(C.SCARDHANDLE(card), C.uint32_t(id), ((*C.uint8_t)(&buf[0])), C.uint32_t(len(buf)))
 | 
			
		||||
	return Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
type strbuf []byte
 | 
			
		||||
 | 
			
		||||
func encodestr(s string) (strbuf, error) {
 | 
			
		||||
	buf := strbuf(s + "\x00")
 | 
			
		||||
	return buf, nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func decodestr(buf strbuf) string {
 | 
			
		||||
	if len(buf) == 0 {
 | 
			
		||||
		return ""
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if buf[len(buf)-1] == 0 {
 | 
			
		||||
		buf = buf[:len(buf)-1]
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return string(buf)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
type scardReaderState struct {
 | 
			
		||||
	szReader       uintptr
 | 
			
		||||
	pvUserData     uintptr
 | 
			
		||||
	dwCurrentState uint32
 | 
			
		||||
	dwEventState   uint32
 | 
			
		||||
	cbAtr          uint32
 | 
			
		||||
	rgbAtr         [33]byte
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
var pinned = map[string]*strbuf{}
 | 
			
		||||
 | 
			
		||||
func (rs *ReaderState) toSys() (scardReaderState, error) {
 | 
			
		||||
	var sys scardReaderState
 | 
			
		||||
 | 
			
		||||
	creader, err := encodestr(rs.Reader)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return scardReaderState{}, err
 | 
			
		||||
	}
 | 
			
		||||
	pinned[rs.Reader] = &creader
 | 
			
		||||
	sys.szReader = uintptr(creader.ptr())
 | 
			
		||||
	sys.dwCurrentState = uint32(rs.CurrentState)
 | 
			
		||||
	sys.cbAtr = uint32(len(rs.Atr))
 | 
			
		||||
	for i, v := range rs.Atr {
 | 
			
		||||
		sys.rgbAtr[i] = byte(v)
 | 
			
		||||
	}
 | 
			
		||||
	return sys, nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (rs *ReaderState) update(sys *scardReaderState) {
 | 
			
		||||
	rs.EventState = StateFlag(sys.dwEventState)
 | 
			
		||||
	if sys.cbAtr > 0 {
 | 
			
		||||
		rs.Atr = make([]byte, int(sys.cbAtr))
 | 
			
		||||
		for i := 0; i < int(sys.cbAtr); i++ {
 | 
			
		||||
			rs.Atr[i] = byte(sys.rgbAtr[i])
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										206
									
								
								vendor/github.com/ebfe/scard/scard_unix.go
									
									
									
										generated
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										206
									
								
								vendor/github.com/ebfe/scard/scard_unix.go
									
									
									
										generated
									
									
										vendored
									
									
										Normal file
									
								
							@@ -0,0 +1,206 @@
 | 
			
		||||
// +build !windows,!darwin
 | 
			
		||||
 | 
			
		||||
package scard
 | 
			
		||||
 | 
			
		||||
// #cgo pkg-config: libpcsclite
 | 
			
		||||
// #include <stdlib.h>
 | 
			
		||||
// #include <winscard.h>
 | 
			
		||||
import "C"
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"unsafe"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
func (e Error) Error() string {
 | 
			
		||||
	return "scard: " + C.GoString(C.pcsc_stringify_error(C.LONG(e)))
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// Version returns the libpcsclite version string
 | 
			
		||||
func Version() string {
 | 
			
		||||
	return C.PCSCLITE_VERSION_NUMBER
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardEstablishContext(scope Scope, reserved1, reserved2 uintptr) (uintptr, Error) {
 | 
			
		||||
	var ctx C.SCARDCONTEXT
 | 
			
		||||
	r := C.SCardEstablishContext(C.DWORD(scope), C.LPCVOID(reserved1), C.LPCVOID(reserved2), &ctx)
 | 
			
		||||
	return uintptr(ctx), Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardIsValidContext(ctx uintptr) Error {
 | 
			
		||||
	r := C.SCardIsValidContext(C.SCARDCONTEXT(ctx))
 | 
			
		||||
	return Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardCancel(ctx uintptr) Error {
 | 
			
		||||
	r := C.SCardCancel(C.SCARDCONTEXT(ctx))
 | 
			
		||||
	return Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardReleaseContext(ctx uintptr) Error {
 | 
			
		||||
	r := C.SCardReleaseContext(C.SCARDCONTEXT(ctx))
 | 
			
		||||
	return Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardListReaders(ctx uintptr, groups, buf unsafe.Pointer, bufLen uint32) (uint32, Error) {
 | 
			
		||||
	dwBufLen := C.DWORD(bufLen)
 | 
			
		||||
	r := C.SCardListReaders(C.SCARDCONTEXT(ctx), (C.LPCSTR)(groups), (C.LPSTR)(buf), &dwBufLen)
 | 
			
		||||
	return uint32(dwBufLen), Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardListReaderGroups(ctx uintptr, buf unsafe.Pointer, bufLen uint32) (uint32, Error) {
 | 
			
		||||
	dwBufLen := C.DWORD(bufLen)
 | 
			
		||||
	r := C.SCardListReaderGroups(C.SCARDCONTEXT(ctx), (C.LPSTR)(buf), &dwBufLen)
 | 
			
		||||
	return uint32(dwBufLen), Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardGetStatusChange(ctx uintptr, timeout uint32, states []scardReaderState) Error {
 | 
			
		||||
	r := C.SCardGetStatusChange(C.SCARDCONTEXT(ctx), C.DWORD(timeout), (C.LPSCARD_READERSTATE)(unsafe.Pointer(&states[0])), C.DWORD(len(states)))
 | 
			
		||||
	return Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardConnect(ctx uintptr, reader unsafe.Pointer, shareMode ShareMode, proto Protocol) (uintptr, Protocol, Error) {
 | 
			
		||||
	var handle C.SCARDHANDLE
 | 
			
		||||
	var activeProto C.DWORD
 | 
			
		||||
 | 
			
		||||
	r := C.SCardConnect(C.SCARDCONTEXT(ctx), C.LPCSTR(reader), C.DWORD(shareMode), C.DWORD(proto), &handle, &activeProto)
 | 
			
		||||
 | 
			
		||||
	return uintptr(handle), Protocol(activeProto), Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardDisconnect(card uintptr, d Disposition) Error {
 | 
			
		||||
	r := C.SCardDisconnect(C.SCARDHANDLE(card), C.DWORD(d))
 | 
			
		||||
	return Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardReconnect(card uintptr, mode ShareMode, proto Protocol, disp Disposition) (Protocol, Error) {
 | 
			
		||||
	var activeProtocol C.DWORD
 | 
			
		||||
	r := C.SCardReconnect(C.SCARDHANDLE(card), C.DWORD(mode), C.DWORD(proto), C.DWORD(disp), &activeProtocol)
 | 
			
		||||
	return Protocol(activeProtocol), Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardBeginTransaction(card uintptr) Error {
 | 
			
		||||
	r := C.SCardBeginTransaction(C.SCARDHANDLE(card))
 | 
			
		||||
	return Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardEndTransaction(card uintptr, disp Disposition) Error {
 | 
			
		||||
	r := C.SCardEndTransaction(C.SCARDHANDLE(card), C.DWORD(disp))
 | 
			
		||||
	return Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardCardStatus(card uintptr) (string, State, Protocol, []byte, Error) {
 | 
			
		||||
	var readerBuf [C.MAX_READERNAME + 1]byte
 | 
			
		||||
	var readerLen = C.DWORD(len(readerBuf))
 | 
			
		||||
	var state, proto C.DWORD
 | 
			
		||||
	var atr [maxAtrSize]byte
 | 
			
		||||
	var atrLen = C.DWORD(len(atr))
 | 
			
		||||
 | 
			
		||||
	r := C.SCardStatus(C.SCARDHANDLE(card), (C.LPSTR)(unsafe.Pointer(&readerBuf[0])), &readerLen, &state, &proto, (*C.BYTE)(&atr[0]), &atrLen)
 | 
			
		||||
 | 
			
		||||
	return decodestr(readerBuf[:readerLen]), State(state), Protocol(proto), atr[:atrLen], Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardTransmit(card uintptr, proto Protocol, cmd []byte, rsp []byte) (uint32, Error) {
 | 
			
		||||
	var sendpci C.SCARD_IO_REQUEST
 | 
			
		||||
	var recvpci C.SCARD_IO_REQUEST
 | 
			
		||||
	var rspLen = C.DWORD(len(rsp))
 | 
			
		||||
 | 
			
		||||
	switch proto {
 | 
			
		||||
	case ProtocolT0, ProtocolT1:
 | 
			
		||||
		sendpci.dwProtocol = C.ulong(proto)
 | 
			
		||||
	default:
 | 
			
		||||
		panic("unknown protocol")
 | 
			
		||||
	}
 | 
			
		||||
	sendpci.cbPciLength = C.sizeof_SCARD_IO_REQUEST
 | 
			
		||||
 | 
			
		||||
	r := C.SCardTransmit(C.SCARDHANDLE(card), &sendpci, (*C.BYTE)(&cmd[0]), C.DWORD(len(cmd)), &recvpci, (*C.BYTE)(&rsp[0]), &rspLen)
 | 
			
		||||
 | 
			
		||||
	return uint32(rspLen), Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardControl(card uintptr, ioctl uint32, in, out []byte) (uint32, Error) {
 | 
			
		||||
	var ptrIn C.LPCVOID
 | 
			
		||||
	var outLen = C.DWORD(len(out))
 | 
			
		||||
 | 
			
		||||
	if len(in) != 0 {
 | 
			
		||||
		ptrIn = C.LPCVOID(unsafe.Pointer(&in[0]))
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	r := C.SCardControl(C.SCARDHANDLE(card), C.DWORD(ioctl), ptrIn, C.DWORD(len(in)), (C.LPVOID)(unsafe.Pointer(&out[0])), C.DWORD(len(out)), &outLen)
 | 
			
		||||
	return uint32(outLen), Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardGetAttrib(card uintptr, id Attrib, buf []byte) (uint32, Error) {
 | 
			
		||||
	var ptr C.LPBYTE
 | 
			
		||||
 | 
			
		||||
	if len(buf) != 0 {
 | 
			
		||||
		ptr = C.LPBYTE(unsafe.Pointer(&buf[0]))
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	bufLen := C.DWORD(len(buf))
 | 
			
		||||
	r := C.SCardGetAttrib(C.SCARDHANDLE(card), C.DWORD(id), ptr, &bufLen)
 | 
			
		||||
 | 
			
		||||
	return uint32(bufLen), Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardSetAttrib(card uintptr, id Attrib, buf []byte) Error {
 | 
			
		||||
	r := C.SCardSetAttrib(C.SCARDHANDLE(card), C.DWORD(id), (*C.BYTE)(unsafe.Pointer(&buf[0])), C.DWORD(len(buf)))
 | 
			
		||||
	return Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
type strbuf []byte
 | 
			
		||||
 | 
			
		||||
func encodestr(s string) (strbuf, error) {
 | 
			
		||||
	buf := strbuf(s + "\x00")
 | 
			
		||||
	return buf, nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func decodestr(buf strbuf) string {
 | 
			
		||||
	if len(buf) == 0 {
 | 
			
		||||
		return ""
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if buf[len(buf)-1] == 0 {
 | 
			
		||||
		buf = buf[:len(buf)-1]
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return string(buf)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
type scardReaderState struct {
 | 
			
		||||
	szReader       uintptr
 | 
			
		||||
	pvUserData     uintptr
 | 
			
		||||
	dwCurrentState uintptr
 | 
			
		||||
	dwEventState   uintptr
 | 
			
		||||
	cbAtr          uintptr
 | 
			
		||||
	rgbAtr         [33]byte
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
var pinned = map[string]*strbuf{}
 | 
			
		||||
 | 
			
		||||
func (rs *ReaderState) toSys() (scardReaderState, error) {
 | 
			
		||||
	var sys scardReaderState
 | 
			
		||||
 | 
			
		||||
	creader, err := encodestr(rs.Reader)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return scardReaderState{}, err
 | 
			
		||||
	}
 | 
			
		||||
	pinned[rs.Reader] = &creader
 | 
			
		||||
	sys.szReader = uintptr(creader.ptr())
 | 
			
		||||
	sys.dwCurrentState = uintptr(rs.CurrentState)
 | 
			
		||||
	sys.cbAtr = uintptr(len(rs.Atr))
 | 
			
		||||
	for i, v := range rs.Atr {
 | 
			
		||||
		sys.rgbAtr[i] = byte(v)
 | 
			
		||||
	}
 | 
			
		||||
	return sys, nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (rs *ReaderState) update(sys *scardReaderState) {
 | 
			
		||||
	rs.EventState = StateFlag(sys.dwEventState)
 | 
			
		||||
	if sys.cbAtr > 0 {
 | 
			
		||||
		rs.Atr = make([]byte, int(sys.cbAtr))
 | 
			
		||||
		for i := 0; i < int(sys.cbAtr); i++ {
 | 
			
		||||
			rs.Atr[i] = byte(sys.rgbAtr[i])
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										221
									
								
								vendor/github.com/ebfe/scard/scard_windows.go
									
									
									
										generated
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										221
									
								
								vendor/github.com/ebfe/scard/scard_windows.go
									
									
									
										generated
									
									
										vendored
									
									
										Normal file
									
								
							@@ -0,0 +1,221 @@
 | 
			
		||||
package scard
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"fmt"
 | 
			
		||||
	"syscall"
 | 
			
		||||
	"unsafe"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
var (
 | 
			
		||||
	modwinscard = syscall.NewLazyDLL("winscard.dll")
 | 
			
		||||
 | 
			
		||||
	procEstablishContext = modwinscard.NewProc("SCardEstablishContext")
 | 
			
		||||
	procReleaseContext   = modwinscard.NewProc("SCardReleaseContext")
 | 
			
		||||
	procIsValidContext   = modwinscard.NewProc("SCardIsValidContext")
 | 
			
		||||
	procCancel           = modwinscard.NewProc("SCardCancel")
 | 
			
		||||
	procListReaders      = modwinscard.NewProc("SCardListReadersW")
 | 
			
		||||
	procListReaderGroups = modwinscard.NewProc("SCardListReaderGroupsW")
 | 
			
		||||
	procGetStatusChange  = modwinscard.NewProc("SCardGetStatusChangeW")
 | 
			
		||||
	procConnect          = modwinscard.NewProc("SCardConnectW")
 | 
			
		||||
	procDisconnect       = modwinscard.NewProc("SCardDisconnect")
 | 
			
		||||
	procReconnect        = modwinscard.NewProc("SCardReconnect")
 | 
			
		||||
	procBeginTransaction = modwinscard.NewProc("SCardBeginTransaction")
 | 
			
		||||
	procEndTransaction   = modwinscard.NewProc("SCardEndTransaction")
 | 
			
		||||
	procStatus           = modwinscard.NewProc("SCardStatusW")
 | 
			
		||||
	procTransmit         = modwinscard.NewProc("SCardTransmit")
 | 
			
		||||
	procControl          = modwinscard.NewProc("SCardControl")
 | 
			
		||||
	procGetAttrib        = modwinscard.NewProc("SCardGetAttrib")
 | 
			
		||||
	procSetAttrib        = modwinscard.NewProc("SCardSetAttrib")
 | 
			
		||||
 | 
			
		||||
	dataT0Pci = modwinscard.NewProc("g_rgSCardT0Pci")
 | 
			
		||||
	dataT1Pci = modwinscard.NewProc("g_rgSCardT1Pci")
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
var scardIoReqT0 uintptr
 | 
			
		||||
var scardIoReqT1 uintptr
 | 
			
		||||
 | 
			
		||||
func init() {
 | 
			
		||||
	if err := dataT0Pci.Find(); err != nil {
 | 
			
		||||
		panic(err)
 | 
			
		||||
	}
 | 
			
		||||
	scardIoReqT0 = dataT0Pci.Addr()
 | 
			
		||||
	if err := dataT1Pci.Find(); err != nil {
 | 
			
		||||
		panic(err)
 | 
			
		||||
	}
 | 
			
		||||
	scardIoReqT1 = dataT1Pci.Addr()
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (e Error) Error() string {
 | 
			
		||||
	err := syscall.Errno(e)
 | 
			
		||||
	return fmt.Sprintf("scard: error(%x): %s", uintptr(e), err.Error())
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardEstablishContext(scope Scope, reserved1, reserved2 uintptr) (uintptr, Error) {
 | 
			
		||||
	var ctx uintptr
 | 
			
		||||
	r, _, _ := procEstablishContext.Call(uintptr(scope), reserved1, reserved2, uintptr(unsafe.Pointer(&ctx)))
 | 
			
		||||
	return ctx, Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardIsValidContext(ctx uintptr) Error {
 | 
			
		||||
	r, _, _ := procIsValidContext.Call(ctx)
 | 
			
		||||
	return Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardCancel(ctx uintptr) Error {
 | 
			
		||||
	r, _, _ := procCancel.Call(ctx)
 | 
			
		||||
	return Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardReleaseContext(ctx uintptr) Error {
 | 
			
		||||
	r, _, _ := procReleaseContext.Call(ctx)
 | 
			
		||||
	return Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardListReaders(ctx uintptr, groups, buf unsafe.Pointer, bufLen uint32) (uint32, Error) {
 | 
			
		||||
	dwBufLen := uint32(bufLen)
 | 
			
		||||
	r, _, _ := procListReaders.Call(ctx, uintptr(groups), uintptr(buf), uintptr(unsafe.Pointer(&dwBufLen)))
 | 
			
		||||
	return dwBufLen, Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardListReaderGroups(ctx uintptr, buf unsafe.Pointer, bufLen uint32) (uint32, Error) {
 | 
			
		||||
	dwBufLen := uint32(bufLen)
 | 
			
		||||
	r, _, _ := procListReaderGroups.Call(ctx, uintptr(buf), uintptr(unsafe.Pointer(&dwBufLen)))
 | 
			
		||||
	return dwBufLen, Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardGetStatusChange(ctx uintptr, timeout uint32, states []scardReaderState) Error {
 | 
			
		||||
	r, _, _ := procGetStatusChange.Call(ctx, uintptr(timeout), uintptr(unsafe.Pointer(&states[0])), uintptr(len(states)))
 | 
			
		||||
	return Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardConnect(ctx uintptr, reader unsafe.Pointer, shareMode ShareMode, proto Protocol) (uintptr, Protocol, Error) {
 | 
			
		||||
	var handle uintptr
 | 
			
		||||
	var activeProto uint32
 | 
			
		||||
 | 
			
		||||
	r, _, _ := procConnect.Call(ctx, uintptr(reader), uintptr(shareMode), uintptr(proto), uintptr(unsafe.Pointer(&handle)), uintptr(unsafe.Pointer(&activeProto)))
 | 
			
		||||
 | 
			
		||||
	return handle, Protocol(activeProto), Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardDisconnect(card uintptr, d Disposition) Error {
 | 
			
		||||
	r, _, _ := procDisconnect.Call(card, uintptr(d))
 | 
			
		||||
	return Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardReconnect(card uintptr, mode ShareMode, proto Protocol, disp Disposition) (Protocol, Error) {
 | 
			
		||||
	var activeProtocol uint32
 | 
			
		||||
	r, _, _ := procReconnect.Call(card, uintptr(mode), uintptr(proto), uintptr(disp), uintptr(unsafe.Pointer(&activeProtocol)))
 | 
			
		||||
	return Protocol(activeProtocol), Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardBeginTransaction(card uintptr) Error {
 | 
			
		||||
	r, _, _ := procBeginTransaction.Call(card)
 | 
			
		||||
	return Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardEndTransaction(card uintptr, disp Disposition) Error {
 | 
			
		||||
	r, _, _ := procEndTransaction.Call(card, uintptr(disp))
 | 
			
		||||
	return Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardCardStatus(card uintptr) (string, State, Protocol, []byte, Error) {
 | 
			
		||||
	var state, proto uint32
 | 
			
		||||
	var atr [maxAtrSize]byte
 | 
			
		||||
	var atrLen = uint32(len(atr))
 | 
			
		||||
 | 
			
		||||
	reader := make(strbuf, maxReadername+1)
 | 
			
		||||
	readerLen := uint32(len(reader))
 | 
			
		||||
 | 
			
		||||
	r, _, _ := procStatus.Call(card, uintptr(reader.ptr()), uintptr(unsafe.Pointer(&readerLen)), uintptr(unsafe.Pointer(&state)), uintptr(unsafe.Pointer(&proto)), uintptr(unsafe.Pointer(&atr[0])), uintptr(unsafe.Pointer(&atrLen)))
 | 
			
		||||
 | 
			
		||||
	return decodestr(reader[:readerLen]), State(state), Protocol(proto), atr[:atrLen], Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardTransmit(card uintptr, proto Protocol, cmd []byte, rsp []byte) (uint32, Error) {
 | 
			
		||||
	var sendpci uintptr
 | 
			
		||||
	var rspLen = uint32(len(rsp))
 | 
			
		||||
 | 
			
		||||
	switch proto {
 | 
			
		||||
	case ProtocolT0:
 | 
			
		||||
		sendpci = scardIoReqT0
 | 
			
		||||
	case ProtocolT1:
 | 
			
		||||
		sendpci = scardIoReqT1
 | 
			
		||||
	default:
 | 
			
		||||
		panic("unknown protocol")
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	r, _, _ := procTransmit.Call(card, sendpci, uintptr(unsafe.Pointer(&cmd[0])), uintptr(len(cmd)), uintptr(0), uintptr(unsafe.Pointer(&rsp[0])), uintptr(unsafe.Pointer(&rspLen)))
 | 
			
		||||
 | 
			
		||||
	return rspLen, Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardControl(card uintptr, ioctl uint32, in, out []byte) (uint32, Error) {
 | 
			
		||||
	var ptrIn uintptr
 | 
			
		||||
	var outLen = uint32(len(out))
 | 
			
		||||
 | 
			
		||||
	if len(in) != 0 {
 | 
			
		||||
		ptrIn = uintptr(unsafe.Pointer(&in[0]))
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	r, _, _ := procControl.Call(card, uintptr(ioctl), ptrIn, uintptr(len(in)), uintptr(unsafe.Pointer(&out[0])), uintptr(len(out)), uintptr(unsafe.Pointer(&outLen)))
 | 
			
		||||
	return outLen, Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardGetAttrib(card uintptr, id Attrib, buf []byte) (uint32, Error) {
 | 
			
		||||
	var ptr uintptr
 | 
			
		||||
 | 
			
		||||
	if len(buf) != 0 {
 | 
			
		||||
		ptr = uintptr(unsafe.Pointer(&buf[0]))
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	bufLen := uint32(len(buf))
 | 
			
		||||
	r, _, _ := procGetAttrib.Call(card, uintptr(id), ptr, uintptr(unsafe.Pointer(&bufLen)))
 | 
			
		||||
 | 
			
		||||
	return bufLen, Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func scardSetAttrib(card uintptr, id Attrib, buf []byte) Error {
 | 
			
		||||
	r, _, _ := procSetAttrib.Call(card, uintptr(id), uintptr(unsafe.Pointer(&buf[0])), uintptr(len(buf)))
 | 
			
		||||
	return Error(r)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
type scardReaderState struct {
 | 
			
		||||
	szReader       uintptr
 | 
			
		||||
	pvUserData     uintptr
 | 
			
		||||
	dwCurrentState uint32
 | 
			
		||||
	dwEventState   uint32
 | 
			
		||||
	cbAtr          uint32
 | 
			
		||||
	rgbAtr         [36]byte
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (rs *ReaderState) toSys() (scardReaderState, error) {
 | 
			
		||||
	var sys scardReaderState
 | 
			
		||||
	creader, err := encodestr(rs.Reader)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return scardReaderState{}, err
 | 
			
		||||
	}
 | 
			
		||||
	sys.szReader = uintptr(creader.ptr())
 | 
			
		||||
	sys.dwCurrentState = uint32(rs.CurrentState)
 | 
			
		||||
	sys.cbAtr = uint32(len(rs.Atr))
 | 
			
		||||
	copy(sys.rgbAtr[:], rs.Atr)
 | 
			
		||||
	return sys, nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (rs *ReaderState) update(sys *scardReaderState) {
 | 
			
		||||
	rs.EventState = StateFlag(sys.dwEventState)
 | 
			
		||||
	if sys.cbAtr > 0 {
 | 
			
		||||
		rs.Atr = make([]byte, int(sys.cbAtr))
 | 
			
		||||
		copy(rs.Atr, sys.rgbAtr[:])
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
type strbuf []uint16
 | 
			
		||||
 | 
			
		||||
func encodestr(s string) (strbuf, error) {
 | 
			
		||||
	utf16, err := syscall.UTF16FromString(s)
 | 
			
		||||
	return strbuf(utf16), err
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func decodestr(buf strbuf) string {
 | 
			
		||||
	return syscall.UTF16ToString(buf)
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										190
									
								
								vendor/github.com/ebfe/scard/zconst.go
									
									
									
										generated
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										190
									
								
								vendor/github.com/ebfe/scard/zconst.go
									
									
									
										generated
									
									
										vendored
									
									
										Normal file
									
								
							@@ -0,0 +1,190 @@
 | 
			
		||||
// Created by cgo -godefs - DO NOT EDIT
 | 
			
		||||
// cgo -godefs -- -I /usr/include/PCSC/ const.go
 | 
			
		||||
 | 
			
		||||
package scard
 | 
			
		||||
 | 
			
		||||
type Attrib uint32
 | 
			
		||||
 | 
			
		||||
const (
 | 
			
		||||
	AttrVendorName           Attrib = 0x10100
 | 
			
		||||
	AttrVendorIfdType        Attrib = 0x10101
 | 
			
		||||
	AttrVendorIfdVersion     Attrib = 0x10102
 | 
			
		||||
	AttrVendorIfdSerialNo    Attrib = 0x10103
 | 
			
		||||
	AttrChannelId            Attrib = 0x20110
 | 
			
		||||
	AttrAsyncProtocolTypes   Attrib = 0x30120
 | 
			
		||||
	AttrDefaultClk           Attrib = 0x30121
 | 
			
		||||
	AttrMaxClk               Attrib = 0x30122
 | 
			
		||||
	AttrDefaultDataRate      Attrib = 0x30123
 | 
			
		||||
	AttrMaxDataRate          Attrib = 0x30124
 | 
			
		||||
	AttrMaxIfsd              Attrib = 0x30125
 | 
			
		||||
	AttrSyncProtocolTypes    Attrib = 0x30126
 | 
			
		||||
	AttrPowerMgmtSupport     Attrib = 0x40131
 | 
			
		||||
	AttrUserToCardAuthDevice Attrib = 0x50140
 | 
			
		||||
	AttrUserAuthInputDevice  Attrib = 0x50142
 | 
			
		||||
	AttrCharacteristics      Attrib = 0x60150
 | 
			
		||||
	AttrCurrentProtocolType  Attrib = 0x80201
 | 
			
		||||
	AttrCurrentClk           Attrib = 0x80202
 | 
			
		||||
	AttrCurrentF             Attrib = 0x80203
 | 
			
		||||
	AttrCurrentD             Attrib = 0x80204
 | 
			
		||||
	AttrCurrentN             Attrib = 0x80205
 | 
			
		||||
	AttrCurrentW             Attrib = 0x80206
 | 
			
		||||
	AttrCurrentIfsc          Attrib = 0x80207
 | 
			
		||||
	AttrCurrentIfsd          Attrib = 0x80208
 | 
			
		||||
	AttrCurrentBwt           Attrib = 0x80209
 | 
			
		||||
	AttrCurrentCwt           Attrib = 0x8020a
 | 
			
		||||
	AttrCurrentEbcEncoding   Attrib = 0x8020b
 | 
			
		||||
	AttrExtendedBwt          Attrib = 0x8020c
 | 
			
		||||
	AttrIccPresence          Attrib = 0x90300
 | 
			
		||||
	AttrIccInterfaceStatus   Attrib = 0x90301
 | 
			
		||||
	AttrCurrentIoState       Attrib = 0x90302
 | 
			
		||||
	AttrAtrString            Attrib = 0x90303
 | 
			
		||||
	AttrIccTypePerAtr        Attrib = 0x90304
 | 
			
		||||
	AttrEscReset             Attrib = 0x7a000
 | 
			
		||||
	AttrEscCancel            Attrib = 0x7a003
 | 
			
		||||
	AttrEscAuthrequest       Attrib = 0x7a005
 | 
			
		||||
	AttrMaxinput             Attrib = 0x7a007
 | 
			
		||||
	AttrDeviceUnit           Attrib = 0x7fff0001
 | 
			
		||||
	AttrDeviceInUse          Attrib = 0x7fff0002
 | 
			
		||||
	AttrDeviceFriendlyName   Attrib = 0x7fff0003
 | 
			
		||||
	AttrDeviceSystemName     Attrib = 0x7fff0004
 | 
			
		||||
	AttrSupressT1IfsRequest  Attrib = 0x7fff0007
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
type Error uint32
 | 
			
		||||
 | 
			
		||||
const (
 | 
			
		||||
	ErrSuccess                Error = 0x0
 | 
			
		||||
	ErrInternalError          Error = 0x80100001
 | 
			
		||||
	ErrCancelled              Error = 0x80100002
 | 
			
		||||
	ErrInvalidHandle          Error = 0x80100003
 | 
			
		||||
	ErrInvalidParameter       Error = 0x80100004
 | 
			
		||||
	ErrInvalidTarget          Error = 0x80100005
 | 
			
		||||
	ErrNoMemory               Error = 0x80100006
 | 
			
		||||
	ErrWaitedTooLong          Error = 0x80100007
 | 
			
		||||
	ErrInsufficientBuffer     Error = 0x80100008
 | 
			
		||||
	ErrUnknownReader          Error = 0x80100009
 | 
			
		||||
	ErrTimeout                Error = 0x8010000a
 | 
			
		||||
	ErrSharingViolation       Error = 0x8010000b
 | 
			
		||||
	ErrNoSmartcard            Error = 0x8010000c
 | 
			
		||||
	ErrUnknownCard            Error = 0x8010000d
 | 
			
		||||
	ErrCantDispose            Error = 0x8010000e
 | 
			
		||||
	ErrProtoMismatch          Error = 0x8010000f
 | 
			
		||||
	ErrNotReady               Error = 0x80100010
 | 
			
		||||
	ErrInvalidValue           Error = 0x80100011
 | 
			
		||||
	ErrSystemCancelled        Error = 0x80100012
 | 
			
		||||
	ErrCommError              Error = 0x80100013
 | 
			
		||||
	ErrUnknownError           Error = 0x80100014
 | 
			
		||||
	ErrInvalidAtr             Error = 0x80100015
 | 
			
		||||
	ErrNotTransacted          Error = 0x80100016
 | 
			
		||||
	ErrReaderUnavailable      Error = 0x80100017
 | 
			
		||||
	ErrShutdown               Error = 0x80100018
 | 
			
		||||
	ErrPciTooSmall            Error = 0x80100019
 | 
			
		||||
	ErrReaderUnsupported      Error = 0x8010001a
 | 
			
		||||
	ErrDuplicateReader        Error = 0x8010001b
 | 
			
		||||
	ErrCardUnsupported        Error = 0x8010001c
 | 
			
		||||
	ErrNoService              Error = 0x8010001d
 | 
			
		||||
	ErrServiceStopped         Error = 0x8010001e
 | 
			
		||||
	ErrUnexpected             Error = 0x8010001f
 | 
			
		||||
	ErrUnsupportedFeature     Error = 0x8010001f
 | 
			
		||||
	ErrIccInstallation        Error = 0x80100020
 | 
			
		||||
	ErrIccCreateorder         Error = 0x80100021
 | 
			
		||||
	ErrFileNotFound           Error = 0x80100024
 | 
			
		||||
	ErrNoDir                  Error = 0x80100025
 | 
			
		||||
	ErrNoFile                 Error = 0x80100026
 | 
			
		||||
	ErrNoAccess               Error = 0x80100027
 | 
			
		||||
	ErrWriteTooMany           Error = 0x80100028
 | 
			
		||||
	ErrBadSeek                Error = 0x80100029
 | 
			
		||||
	ErrInvalidChv             Error = 0x8010002a
 | 
			
		||||
	ErrUnknownResMng          Error = 0x8010002b
 | 
			
		||||
	ErrNoSuchCertificate      Error = 0x8010002c
 | 
			
		||||
	ErrCertificateUnavailable Error = 0x8010002d
 | 
			
		||||
	ErrNoReadersAvailable     Error = 0x8010002e
 | 
			
		||||
	ErrCommDataLost           Error = 0x8010002f
 | 
			
		||||
	ErrNoKeyContainer         Error = 0x80100030
 | 
			
		||||
	ErrServerTooBusy          Error = 0x80100031
 | 
			
		||||
	ErrUnsupportedCard        Error = 0x80100065
 | 
			
		||||
	ErrUnresponsiveCard       Error = 0x80100066
 | 
			
		||||
	ErrUnpoweredCard          Error = 0x80100067
 | 
			
		||||
	ErrResetCard              Error = 0x80100068
 | 
			
		||||
	ErrRemovedCard            Error = 0x80100069
 | 
			
		||||
	ErrSecurityViolation      Error = 0x8010006a
 | 
			
		||||
	ErrWrongChv               Error = 0x8010006b
 | 
			
		||||
	ErrChvBlocked             Error = 0x8010006c
 | 
			
		||||
	ErrEof                    Error = 0x8010006d
 | 
			
		||||
	ErrCancelledByUser        Error = 0x8010006e
 | 
			
		||||
	ErrCardNotAuthenticated   Error = 0x8010006f
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
type Protocol uint32
 | 
			
		||||
 | 
			
		||||
const (
 | 
			
		||||
	ProtocolUndefined Protocol = 0x0
 | 
			
		||||
	ProtocolT0        Protocol = 0x1
 | 
			
		||||
	ProtocolT1        Protocol = 0x2
 | 
			
		||||
	ProtocolAny       Protocol = ProtocolT0 | ProtocolT1
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
type ShareMode uint32
 | 
			
		||||
 | 
			
		||||
const (
 | 
			
		||||
	ShareExclusive ShareMode = 0x1
 | 
			
		||||
	ShareShared    ShareMode = 0x2
 | 
			
		||||
	ShareDirect    ShareMode = 0x3
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
type Disposition uint32
 | 
			
		||||
 | 
			
		||||
const (
 | 
			
		||||
	LeaveCard   Disposition = 0x0
 | 
			
		||||
	ResetCard   Disposition = 0x1
 | 
			
		||||
	UnpowerCard Disposition = 0x2
 | 
			
		||||
	EjectCard   Disposition = 0x3
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
type Scope uint32
 | 
			
		||||
 | 
			
		||||
const (
 | 
			
		||||
	ScopeUser     Scope = 0x0
 | 
			
		||||
	ScopeTerminal Scope = 0x1
 | 
			
		||||
	ScopeSystem   Scope = 0x2
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
type State uint32
 | 
			
		||||
 | 
			
		||||
const (
 | 
			
		||||
	Unknown    State = 0x1
 | 
			
		||||
	Absent     State = 0x2
 | 
			
		||||
	Present    State = 0x4
 | 
			
		||||
	Swallowed  State = 0x8
 | 
			
		||||
	Powered    State = 0x10
 | 
			
		||||
	Negotiable State = 0x20
 | 
			
		||||
	Specific   State = 0x40
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
type StateFlag uint32
 | 
			
		||||
 | 
			
		||||
const (
 | 
			
		||||
	StateUnaware     StateFlag = 0x0
 | 
			
		||||
	StateIgnore      StateFlag = 0x1
 | 
			
		||||
	StateChanged     StateFlag = 0x2
 | 
			
		||||
	StateUnknown     StateFlag = 0x4
 | 
			
		||||
	StateUnavailable StateFlag = 0x8
 | 
			
		||||
	StateEmpty       StateFlag = 0x10
 | 
			
		||||
	StatePresent     StateFlag = 0x20
 | 
			
		||||
	StateAtrmatch    StateFlag = 0x40
 | 
			
		||||
	StateExclusive   StateFlag = 0x80
 | 
			
		||||
	StateInuse       StateFlag = 0x100
 | 
			
		||||
	StateMute        StateFlag = 0x200
 | 
			
		||||
	StateUnpowered   StateFlag = 0x400
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
const (
 | 
			
		||||
	maxBufferSize         = 0x108
 | 
			
		||||
	maxBufferSizeExtended = 0x1000c
 | 
			
		||||
	maxReadername         = 0x80
 | 
			
		||||
	maxAtrSize            = 0x21
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
const (
 | 
			
		||||
	infiniteTimeout = 0xffffffff
 | 
			
		||||
)
 | 
			
		||||
							
								
								
									
										21
									
								
								vendor/github.com/tyler-smith/go-bip39/LICENSE
									
									
									
										generated
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										21
									
								
								vendor/github.com/tyler-smith/go-bip39/LICENSE
									
									
									
										generated
									
									
										vendored
									
									
										Normal file
									
								
							@@ -0,0 +1,21 @@
 | 
			
		||||
The MIT License (MIT)
 | 
			
		||||
 | 
			
		||||
Copyright (c) 2014 Tyler Smith
 | 
			
		||||
 | 
			
		||||
Permission is hereby granted, free of charge, to any person obtaining a copy
 | 
			
		||||
of this software and associated documentation files (the "Software"), to deal
 | 
			
		||||
in the Software without restriction, including without limitation the rights
 | 
			
		||||
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
 | 
			
		||||
copies of the Software, and to permit persons to whom the Software is
 | 
			
		||||
furnished to do so, subject to the following conditions:
 | 
			
		||||
 | 
			
		||||
The above copyright notice and this permission notice shall be included in all
 | 
			
		||||
copies or substantial portions of the Software.
 | 
			
		||||
 | 
			
		||||
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
 | 
			
		||||
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
 | 
			
		||||
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
 | 
			
		||||
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
 | 
			
		||||
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
 | 
			
		||||
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
 | 
			
		||||
SOFTWARE.
 | 
			
		||||
							
								
								
									
										38
									
								
								vendor/github.com/tyler-smith/go-bip39/README.md
									
									
									
										generated
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										38
									
								
								vendor/github.com/tyler-smith/go-bip39/README.md
									
									
									
										generated
									
									
										vendored
									
									
										Normal file
									
								
							@@ -0,0 +1,38 @@
 | 
			
		||||
# go-bip39
 | 
			
		||||
 | 
			
		||||
A golang implementation of the BIP0039 spec for mnemonic seeds
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
## Credits
 | 
			
		||||
 | 
			
		||||
English wordlist and test vectors are from the standard Python BIP0039 implementation
 | 
			
		||||
from the Trezor guys: [https://github.com/trezor/python-mnemonic](https://github.com/trezor/python-mnemonic)
 | 
			
		||||
 | 
			
		||||
## Example
 | 
			
		||||
 | 
			
		||||
```go
 | 
			
		||||
package main
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
  "github.com/tyler-smith/go-bip39"
 | 
			
		||||
  "github.com/tyler-smith/go-bip32"
 | 
			
		||||
  "fmt"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
func main(){
 | 
			
		||||
  // Generate a mnemonic for memorization or user-friendly seeds
 | 
			
		||||
  entropy, _ := bip39.NewEntropy(256)
 | 
			
		||||
  mnemonic, _ := bip39.NewMnemonic(entropy)
 | 
			
		||||
 | 
			
		||||
  // Generate a Bip32 HD wallet for the mnemonic and a user supplied password
 | 
			
		||||
  seed := bip39.NewSeed(mnemonic, "Secret Passphrase")
 | 
			
		||||
 | 
			
		||||
  masterKey, _ := bip32.NewMasterKey(seed)
 | 
			
		||||
  publicKey := masterKey.PublicKey()
 | 
			
		||||
 | 
			
		||||
  // Display mnemonic and keys
 | 
			
		||||
  fmt.Println("Mnemonic: ", mnemonic)
 | 
			
		||||
  fmt.Println("Master private key: ", masterKey)
 | 
			
		||||
  fmt.Println("Master public key: ", publicKey)
 | 
			
		||||
}
 | 
			
		||||
```
 | 
			
		||||
							
								
								
									
										249
									
								
								vendor/github.com/tyler-smith/go-bip39/bip39.go
									
									
									
										generated
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										249
									
								
								vendor/github.com/tyler-smith/go-bip39/bip39.go
									
									
									
										generated
									
									
										vendored
									
									
										Normal file
									
								
							@@ -0,0 +1,249 @@
 | 
			
		||||
package bip39
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"crypto/rand"
 | 
			
		||||
	"crypto/sha256"
 | 
			
		||||
	"crypto/sha512"
 | 
			
		||||
	"encoding/binary"
 | 
			
		||||
	"errors"
 | 
			
		||||
	"fmt"
 | 
			
		||||
	"math/big"
 | 
			
		||||
	"strings"
 | 
			
		||||
 | 
			
		||||
	"golang.org/x/crypto/pbkdf2"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
// Some bitwise operands for working with big.Ints
 | 
			
		||||
var (
 | 
			
		||||
	Last11BitsMask          = big.NewInt(2047)
 | 
			
		||||
	RightShift11BitsDivider = big.NewInt(2048)
 | 
			
		||||
	BigOne                  = big.NewInt(1)
 | 
			
		||||
	BigTwo                  = big.NewInt(2)
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
// NewEntropy will create random entropy bytes
 | 
			
		||||
// so long as the requested size bitSize is an appropriate size.
 | 
			
		||||
func NewEntropy(bitSize int) ([]byte, error) {
 | 
			
		||||
	err := validateEntropyBitSize(bitSize)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return nil, err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	entropy := make([]byte, bitSize/8)
 | 
			
		||||
	_, err = rand.Read(entropy)
 | 
			
		||||
	return entropy, err
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// NewMnemonic will return a string consisting of the mnemonic words for
 | 
			
		||||
// the given entropy.
 | 
			
		||||
// If the provide entropy is invalid, an error will be returned.
 | 
			
		||||
func NewMnemonic(entropy []byte) (string, error) {
 | 
			
		||||
	// Compute some lengths for convenience
 | 
			
		||||
	entropyBitLength := len(entropy) * 8
 | 
			
		||||
	checksumBitLength := entropyBitLength / 32
 | 
			
		||||
	sentenceLength := (entropyBitLength + checksumBitLength) / 11
 | 
			
		||||
 | 
			
		||||
	err := validateEntropyBitSize(entropyBitLength)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return "", err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// Add checksum to entropy
 | 
			
		||||
	entropy = addChecksum(entropy)
 | 
			
		||||
 | 
			
		||||
	// Break entropy up into sentenceLength chunks of 11 bits
 | 
			
		||||
	// For each word AND mask the rightmost 11 bits and find the word at that index
 | 
			
		||||
	// Then bitshift entropy 11 bits right and repeat
 | 
			
		||||
	// Add to the last empty slot so we can work with LSBs instead of MSB
 | 
			
		||||
 | 
			
		||||
	// Entropy as an int so we can bitmask without worrying about bytes slices
 | 
			
		||||
	entropyInt := new(big.Int).SetBytes(entropy)
 | 
			
		||||
 | 
			
		||||
	// Slice to hold words in
 | 
			
		||||
	words := make([]string, sentenceLength)
 | 
			
		||||
 | 
			
		||||
	// Throw away big int for AND masking
 | 
			
		||||
	word := big.NewInt(0)
 | 
			
		||||
 | 
			
		||||
	for i := sentenceLength - 1; i >= 0; i-- {
 | 
			
		||||
		// Get 11 right most bits and bitshift 11 to the right for next time
 | 
			
		||||
		word.And(entropyInt, Last11BitsMask)
 | 
			
		||||
		entropyInt.Div(entropyInt, RightShift11BitsDivider)
 | 
			
		||||
 | 
			
		||||
		// Get the bytes representing the 11 bits as a 2 byte slice
 | 
			
		||||
		wordBytes := padByteSlice(word.Bytes(), 2)
 | 
			
		||||
 | 
			
		||||
		// Convert bytes to an index and add that word to the list
 | 
			
		||||
		words[i] = WordList[binary.BigEndian.Uint16(wordBytes)]
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return strings.Join(words, " "), nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// MnemonicToByteArray takes a mnemonic string and turns it into a byte array
 | 
			
		||||
// suitable for creating another mnemonic.
 | 
			
		||||
// An error is returned if the mnemonic is invalid.
 | 
			
		||||
// FIXME
 | 
			
		||||
// This does not work for all values in
 | 
			
		||||
// the test vectors.  Namely
 | 
			
		||||
// Vectors 0, 4, and 8.
 | 
			
		||||
// This is not really important because BIP39 doesnt really define a conversion
 | 
			
		||||
// from string to bytes.
 | 
			
		||||
func MnemonicToByteArray(mnemonic string) ([]byte, error) {
 | 
			
		||||
	if IsMnemonicValid(mnemonic) == false {
 | 
			
		||||
		return nil, fmt.Errorf("Invalid mnemonic")
 | 
			
		||||
	}
 | 
			
		||||
	mnemonicSlice := strings.Split(mnemonic, " ")
 | 
			
		||||
 | 
			
		||||
	bitSize := len(mnemonicSlice) * 11
 | 
			
		||||
	err := validateEntropyWithChecksumBitSize(bitSize)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return nil, err
 | 
			
		||||
	}
 | 
			
		||||
	checksumSize := bitSize % 32
 | 
			
		||||
 | 
			
		||||
	b := big.NewInt(0)
 | 
			
		||||
	modulo := big.NewInt(2048)
 | 
			
		||||
	for _, v := range mnemonicSlice {
 | 
			
		||||
		index, found := ReverseWordMap[v]
 | 
			
		||||
		if found == false {
 | 
			
		||||
			return nil, fmt.Errorf("Word `%v` not found in reverse map", v)
 | 
			
		||||
		}
 | 
			
		||||
		add := big.NewInt(int64(index))
 | 
			
		||||
		b = b.Mul(b, modulo)
 | 
			
		||||
		b = b.Add(b, add)
 | 
			
		||||
	}
 | 
			
		||||
	hex := b.Bytes()
 | 
			
		||||
	checksumModulo := big.NewInt(0).Exp(big.NewInt(2), big.NewInt(int64(checksumSize)), nil)
 | 
			
		||||
	entropy, _ := big.NewInt(0).DivMod(b, checksumModulo, big.NewInt(0))
 | 
			
		||||
 | 
			
		||||
	entropyHex := entropy.Bytes()
 | 
			
		||||
 | 
			
		||||
	byteSize := bitSize/8 + 1
 | 
			
		||||
	if len(hex) != byteSize {
 | 
			
		||||
		tmp := make([]byte, byteSize)
 | 
			
		||||
		diff := byteSize - len(hex)
 | 
			
		||||
		for i := 0; i < len(hex); i++ {
 | 
			
		||||
			tmp[i+diff] = hex[i]
 | 
			
		||||
		}
 | 
			
		||||
		hex = tmp
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	validationHex := addChecksum(entropyHex)
 | 
			
		||||
	if len(validationHex) != byteSize {
 | 
			
		||||
		tmp2 := make([]byte, byteSize)
 | 
			
		||||
		diff2 := byteSize - len(validationHex)
 | 
			
		||||
		for i := 0; i < len(validationHex); i++ {
 | 
			
		||||
			tmp2[i+diff2] = validationHex[i]
 | 
			
		||||
		}
 | 
			
		||||
		validationHex = tmp2
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if len(hex) != len(validationHex) {
 | 
			
		||||
		panic("[]byte len mismatch - it shouldn't happen")
 | 
			
		||||
	}
 | 
			
		||||
	for i := range validationHex {
 | 
			
		||||
		if hex[i] != validationHex[i] {
 | 
			
		||||
			return nil, fmt.Errorf("Invalid byte at position %v", i)
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
	return hex, nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// NewSeedWithErrorChecking creates a hashed seed output given the mnemonic string and a password.
 | 
			
		||||
// An error is returned if the mnemonic is not convertible to a byte array.
 | 
			
		||||
func NewSeedWithErrorChecking(mnemonic string, password string) ([]byte, error) {
 | 
			
		||||
	_, err := MnemonicToByteArray(mnemonic)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return nil, err
 | 
			
		||||
	}
 | 
			
		||||
	return NewSeed(mnemonic, password), nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// NewSeed creates a hashed seed output given a provided string and password.
 | 
			
		||||
// No checking is performed to validate that the string provided is a valid mnemonic.
 | 
			
		||||
func NewSeed(mnemonic string, password string) []byte {
 | 
			
		||||
	return pbkdf2.Key([]byte(mnemonic), []byte("mnemonic"+password), 2048, 64, sha512.New)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// Appends to data the first (len(data) / 32)bits of the result of sha256(data)
 | 
			
		||||
// Currently only supports data up to 32 bytes
 | 
			
		||||
func addChecksum(data []byte) []byte {
 | 
			
		||||
	// Get first byte of sha256
 | 
			
		||||
	hasher := sha256.New()
 | 
			
		||||
	hasher.Write(data)
 | 
			
		||||
	hash := hasher.Sum(nil)
 | 
			
		||||
	firstChecksumByte := hash[0]
 | 
			
		||||
 | 
			
		||||
	// len() is in bytes so we divide by 4
 | 
			
		||||
	checksumBitLength := uint(len(data) / 4)
 | 
			
		||||
 | 
			
		||||
	// For each bit of check sum we want we shift the data one the left
 | 
			
		||||
	// and then set the (new) right most bit equal to checksum bit at that index
 | 
			
		||||
	// staring from the left
 | 
			
		||||
	dataBigInt := new(big.Int).SetBytes(data)
 | 
			
		||||
	for i := uint(0); i < checksumBitLength; i++ {
 | 
			
		||||
		// Bitshift 1 left
 | 
			
		||||
		dataBigInt.Mul(dataBigInt, BigTwo)
 | 
			
		||||
 | 
			
		||||
		// Set rightmost bit if leftmost checksum bit is set
 | 
			
		||||
		if uint8(firstChecksumByte&(1<<(7-i))) > 0 {
 | 
			
		||||
			dataBigInt.Or(dataBigInt, BigOne)
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return dataBigInt.Bytes()
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func padByteSlice(slice []byte, length int) []byte {
 | 
			
		||||
	newSlice := make([]byte, length-len(slice))
 | 
			
		||||
	return append(newSlice, slice...)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func validateEntropyBitSize(bitSize int) error {
 | 
			
		||||
	if (bitSize%32) != 0 || bitSize < 128 || bitSize > 256 {
 | 
			
		||||
		return errors.New("Entropy length must be [128, 256] and a multiple of 32")
 | 
			
		||||
	}
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func validateEntropyWithChecksumBitSize(bitSize int) error {
 | 
			
		||||
	if (bitSize != 128+4) && (bitSize != 160+5) && (bitSize != 192+6) && (bitSize != 224+7) && (bitSize != 256+8) {
 | 
			
		||||
		return fmt.Errorf("Wrong entropy + checksum size - expected %v, got %v", int((bitSize-bitSize%32)+(bitSize-bitSize%32)/32), bitSize)
 | 
			
		||||
	}
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// IsMnemonicValid attempts to verify that the provided mnemonic is valid.
 | 
			
		||||
// Validity is determined by both the number of words being appropriate,
 | 
			
		||||
// and that all the words in the mnemonic are present in the word list.
 | 
			
		||||
func IsMnemonicValid(mnemonic string) bool {
 | 
			
		||||
	// Create a list of all the words in the mnemonic sentence
 | 
			
		||||
	words := strings.Fields(mnemonic)
 | 
			
		||||
 | 
			
		||||
	//Get num of words
 | 
			
		||||
	numOfWords := len(words)
 | 
			
		||||
 | 
			
		||||
	// The number of words should be 12, 15, 18, 21 or 24
 | 
			
		||||
	if numOfWords%3 != 0 || numOfWords < 12 || numOfWords > 24 {
 | 
			
		||||
		return false
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// Check if all words belong in the wordlist
 | 
			
		||||
	for i := 0; i < numOfWords; i++ {
 | 
			
		||||
		if !contains(WordList, words[i]) {
 | 
			
		||||
			return false
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return true
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func contains(s []string, e string) bool {
 | 
			
		||||
	for _, a := range s {
 | 
			
		||||
		if a == e {
 | 
			
		||||
			return true
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
	return false
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										15
									
								
								vendor/github.com/tyler-smith/go-bip39/coverage.txt
									
									
									
										generated
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										15
									
								
								vendor/github.com/tyler-smith/go-bip39/coverage.txt
									
									
									
										generated
									
									
										vendored
									
									
										Normal file
									
								
							@@ -0,0 +1,15 @@
 | 
			
		||||
 | 
			
		||||
github.com/CrowBits/go-bip39/bip39.go	 addChecksum				 100.00% (11/11)
 | 
			
		||||
github.com/CrowBits/go-bip39/bip39.go	 IsMnemonicValid			 100.00% (8/8)
 | 
			
		||||
github.com/CrowBits/go-bip39/bip39.go	 NewEntropy				 100.00% (6/6)
 | 
			
		||||
github.com/CrowBits/go-bip39/bip39.go	 contains				 100.00% (4/4)
 | 
			
		||||
github.com/CrowBits/go-bip39/bip39.go	 NewSeedWithErrorChecking		 100.00% (4/4)
 | 
			
		||||
github.com/CrowBits/go-bip39/bip39.go	 validateEntropyBitSize			 100.00% (3/3)
 | 
			
		||||
github.com/CrowBits/go-bip39/bip39.go	 validateEntropyWithChecksumBitSize	 100.00% (3/3)
 | 
			
		||||
github.com/CrowBits/go-bip39/bip39.go	 padByteSlice				 100.00% (2/2)
 | 
			
		||||
github.com/CrowBits/go-bip39/wordlist.go init					 100.00% (2/2)
 | 
			
		||||
github.com/CrowBits/go-bip39/bip39.go	 NewSeed				 100.00% (1/1)
 | 
			
		||||
github.com/CrowBits/go-bip39/bip39.go	 NewMnemonic				 93.75% (15/16)
 | 
			
		||||
github.com/CrowBits/go-bip39/bip39.go	 MnemonicToByteArray			 90.24% (37/41)
 | 
			
		||||
github.com/CrowBits/go-bip39		 ----------------------------------	 95.05% (96/101)
 | 
			
		||||
 | 
			
		||||
							
								
								
									
										2067
									
								
								vendor/github.com/tyler-smith/go-bip39/wordlist.go
									
									
									
										generated
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										2067
									
								
								vendor/github.com/tyler-smith/go-bip39/wordlist.go
									
									
									
										generated
									
									
										vendored
									
									
										Normal file
									
								
							
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							
							
								
								
									
										18
									
								
								vendor/vendor.json
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										18
									
								
								vendor/vendor.json
									
									
									
									
										vendored
									
									
								
							@@ -103,6 +103,12 @@
 | 
			
		||||
			"revision": "8e610b2b55bfd1bfa9436ab110d311f5e8a74dcb",
 | 
			
		||||
			"revisionTime": "2018-06-25T18:44:42Z"
 | 
			
		||||
		},
 | 
			
		||||
		{
 | 
			
		||||
			"checksumSHA1": "B1sVd5XOmjuSFYivGhBd+vPlc1w=",
 | 
			
		||||
			"path": "github.com/ebfe/scard",
 | 
			
		||||
			"revision": "0147d7ead790ac8a5ecc91ee6de68beb7b17c4e9",
 | 
			
		||||
			"revisionTime": "2017-12-31T19:32:11Z"
 | 
			
		||||
		},
 | 
			
		||||
		{
 | 
			
		||||
			"checksumSHA1": "zYnPsNAVm1/ViwCkN++dX2JQhBo=",
 | 
			
		||||
			"path": "github.com/edsrzf/mmap-go",
 | 
			
		||||
@@ -615,6 +621,18 @@
 | 
			
		||||
			"revision": "a51202d6f4a7e5a219e3841a43614ff7187ae7f1",
 | 
			
		||||
			"revisionTime": "2018-06-15T20:27:29Z"
 | 
			
		||||
		},
 | 
			
		||||
		{
 | 
			
		||||
			"checksumSHA1": "vW7IiPtoA4hQQ/ScHlbmRktY89U=",
 | 
			
		||||
			"path": "github.com/tyler-smith/go-bip39",
 | 
			
		||||
			"revision": "8e7a99b3e716f36d3b080a9a70f9eb45abe4edcc",
 | 
			
		||||
			"revisionTime": "2016-06-29T16:38:56Z"
 | 
			
		||||
		},
 | 
			
		||||
		{
 | 
			
		||||
			"checksumSHA1": "GLCPuvePAkWT+opcWq3mNdhOfGM=",
 | 
			
		||||
			"path": "github.com/wsddn/go-ecdh",
 | 
			
		||||
			"revision": "48726bab92085232373de4ec5c51ce7b441c63a0",
 | 
			
		||||
			"revisionTime": "2016-12-11T03:23:59Z"
 | 
			
		||||
		},
 | 
			
		||||
		{
 | 
			
		||||
			"checksumSHA1": "TT1rac6kpQp2vz24m5yDGUNQ/QQ=",
 | 
			
		||||
			"path": "golang.org/x/crypto/cast5",
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user