2019-03-05 22:05:34 +01:00
|
|
|
// Copyright (c) 2017-2019, The Monero Project
|
2018-02-20 17:01:27 +01:00
|
|
|
//
|
|
|
|
// All rights reserved.
|
|
|
|
//
|
|
|
|
// Redistribution and use in source and binary forms, with or without modification, are
|
|
|
|
// permitted provided that the following conditions are met:
|
|
|
|
//
|
|
|
|
// 1. Redistributions of source code must retain the above copyright notice, this list of
|
|
|
|
// conditions and the following disclaimer.
|
|
|
|
//
|
|
|
|
// 2. Redistributions in binary form must reproduce the above copyright notice, this list
|
|
|
|
// of conditions and the following disclaimer in the documentation and/or other
|
|
|
|
// materials provided with the distribution.
|
|
|
|
//
|
|
|
|
// 3. Neither the name of the copyright holder nor the names of its contributors may be
|
|
|
|
// used to endorse or promote products derived from this software without specific
|
|
|
|
// prior written permission.
|
|
|
|
//
|
|
|
|
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY
|
|
|
|
// EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
|
|
|
// MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
|
|
|
|
// THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
|
|
// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
|
|
|
|
// PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
|
|
// INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
|
|
// STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
|
|
|
|
// THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
//
|
|
|
|
|
|
|
|
#pragma once
|
|
|
|
|
2018-03-05 08:16:30 +01:00
|
|
|
#include "crypto/crypto.h"
|
|
|
|
#include "crypto/chacha.h"
|
|
|
|
#include "ringct/rctTypes.h"
|
2018-08-23 23:50:53 +02:00
|
|
|
#include "cryptonote_config.h"
|
2018-02-20 17:01:27 +01:00
|
|
|
|
2018-08-01 09:24:53 +02:00
|
|
|
|
2018-02-20 17:01:27 +01:00
|
|
|
#ifndef USE_DEVICE_LEDGER
|
|
|
|
#define USE_DEVICE_LEDGER 1
|
|
|
|
#endif
|
|
|
|
|
2018-08-01 09:24:53 +02:00
|
|
|
#if !defined(HAVE_HIDAPI)
|
2018-02-20 17:01:27 +01:00
|
|
|
#undef USE_DEVICE_LEDGER
|
|
|
|
#define USE_DEVICE_LEDGER 0
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if USE_DEVICE_LEDGER
|
|
|
|
#define WITH_DEVICE_LEDGER
|
|
|
|
#endif
|
|
|
|
|
2018-03-05 08:16:30 +01:00
|
|
|
// forward declaration needed because this header is included by headers in libcryptonote_basic which depends on libdevice
|
|
|
|
namespace cryptonote
|
|
|
|
{
|
|
|
|
struct account_public_address;
|
|
|
|
struct account_keys;
|
|
|
|
struct subaddress_index;
|
2018-12-11 10:20:21 +01:00
|
|
|
struct tx_destination_entry;
|
2019-02-23 15:28:18 +01:00
|
|
|
struct keypair;
|
2018-03-05 08:16:30 +01:00
|
|
|
}
|
|
|
|
|
2018-02-20 17:01:27 +01:00
|
|
|
namespace hw {
|
|
|
|
namespace {
|
|
|
|
//device funcion not supported
|
|
|
|
#define dfns() \
|
|
|
|
throw std::runtime_error(std::string("device function not supported: ")+ std::string(__FUNCTION__) + \
|
|
|
|
std::string(" (device.hpp line ")+std::to_string(__LINE__)+std::string(").")); \
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2019-02-23 15:28:18 +01:00
|
|
|
class device_progress {
|
|
|
|
public:
|
|
|
|
virtual double progress() const { return 0; }
|
|
|
|
virtual bool indeterminate() const { return false; }
|
|
|
|
};
|
|
|
|
|
2018-11-11 20:07:25 +01:00
|
|
|
class i_device_callback {
|
|
|
|
public:
|
2019-02-23 15:28:18 +01:00
|
|
|
virtual void on_button_request(uint64_t code=0) {}
|
2019-04-05 21:47:24 +02:00
|
|
|
virtual void on_button_pressed() {}
|
2019-02-23 15:28:18 +01:00
|
|
|
virtual boost::optional<epee::wipeable_string> on_pin_request() { return boost::none; }
|
|
|
|
virtual boost::optional<epee::wipeable_string> on_passphrase_request(bool on_device) { return boost::none; }
|
|
|
|
virtual void on_progress(const device_progress& event) {}
|
2018-11-11 20:07:25 +01:00
|
|
|
virtual ~i_device_callback() = default;
|
|
|
|
};
|
|
|
|
|
2018-02-20 17:01:27 +01:00
|
|
|
class device {
|
2018-03-26 12:38:38 +02:00
|
|
|
protected:
|
|
|
|
std::string name;
|
|
|
|
|
2018-02-20 17:01:27 +01:00
|
|
|
public:
|
|
|
|
|
2018-10-19 13:15:31 +02:00
|
|
|
device(): mode(NONE) {}
|
2018-02-20 17:01:27 +01:00
|
|
|
device(const device &hwdev) {}
|
|
|
|
virtual ~device() {}
|
|
|
|
|
|
|
|
explicit virtual operator bool() const = 0;
|
2018-03-26 12:55:48 +02:00
|
|
|
enum device_mode {
|
|
|
|
NONE,
|
|
|
|
TRANSACTION_CREATE_REAL,
|
|
|
|
TRANSACTION_CREATE_FAKE,
|
|
|
|
TRANSACTION_PARSE
|
|
|
|
};
|
2018-08-16 10:31:48 +02:00
|
|
|
enum device_type
|
|
|
|
{
|
|
|
|
SOFTWARE = 0,
|
2018-08-23 23:50:53 +02:00
|
|
|
LEDGER = 1,
|
|
|
|
TREZOR = 2
|
2018-08-16 10:31:48 +02:00
|
|
|
};
|
|
|
|
|
2018-02-20 17:01:27 +01:00
|
|
|
|
2018-08-23 23:50:53 +02:00
|
|
|
enum device_protocol_t {
|
|
|
|
PROTOCOL_DEFAULT,
|
|
|
|
PROTOCOL_PROXY, // Originally defined by Ledger
|
|
|
|
PROTOCOL_COLD, // Originally defined by Trezor
|
|
|
|
};
|
|
|
|
|
2018-02-20 17:01:27 +01:00
|
|
|
/* ======================================================================= */
|
|
|
|
/* SETUP/TEARDOWN */
|
|
|
|
/* ======================================================================= */
|
|
|
|
virtual bool set_name(const std::string &name) = 0;
|
|
|
|
virtual const std::string get_name() const = 0;
|
|
|
|
|
|
|
|
virtual bool init(void) = 0;
|
|
|
|
virtual bool release() = 0;
|
|
|
|
|
|
|
|
virtual bool connect(void) = 0;
|
2018-03-26 12:38:38 +02:00
|
|
|
virtual bool disconnect(void) = 0;
|
|
|
|
|
2018-10-19 13:15:31 +02:00
|
|
|
virtual bool set_mode(device_mode mode) { this->mode = mode; return true; }
|
|
|
|
virtual device_mode get_mode() const { return mode; }
|
2018-08-16 10:31:48 +02:00
|
|
|
|
|
|
|
virtual device_type get_type() const = 0;
|
2018-03-26 12:55:48 +02:00
|
|
|
|
2018-08-23 23:50:53 +02:00
|
|
|
virtual device_protocol_t device_protocol() const { return PROTOCOL_DEFAULT; };
|
2018-11-11 20:07:25 +01:00
|
|
|
virtual void set_callback(i_device_callback * callback) {};
|
2018-11-12 00:07:25 +01:00
|
|
|
virtual void set_derivation_path(const std::string &derivation_path) {};
|
2018-03-26 12:55:48 +02:00
|
|
|
|
2019-02-23 15:28:18 +01:00
|
|
|
virtual void set_pin(const epee::wipeable_string & pin) {}
|
|
|
|
virtual void set_passphrase(const epee::wipeable_string & passphrase) {}
|
|
|
|
|
2018-03-26 12:38:38 +02:00
|
|
|
/* ======================================================================= */
|
|
|
|
/* LOCKER */
|
|
|
|
/* ======================================================================= */
|
|
|
|
virtual void lock(void) = 0;
|
|
|
|
virtual void unlock(void) = 0;
|
|
|
|
virtual bool try_lock(void) = 0;
|
|
|
|
|
2018-02-20 17:01:27 +01:00
|
|
|
|
|
|
|
/* ======================================================================= */
|
|
|
|
/* WALLET & ADDRESS */
|
|
|
|
/* ======================================================================= */
|
|
|
|
virtual bool get_public_address(cryptonote::account_public_address &pubkey) = 0;
|
|
|
|
virtual bool get_secret_keys(crypto::secret_key &viewkey , crypto::secret_key &spendkey) = 0;
|
2018-07-06 08:42:08 +02:00
|
|
|
virtual bool generate_chacha_key(const cryptonote::account_keys &keys, crypto::chacha_key &key, uint64_t kdf_rounds) = 0;
|
2018-02-20 17:01:27 +01:00
|
|
|
|
|
|
|
/* ======================================================================= */
|
|
|
|
/* SUB ADDRESS */
|
|
|
|
/* ======================================================================= */
|
|
|
|
virtual bool derive_subaddress_public_key(const crypto::public_key &pub, const crypto::key_derivation &derivation, const std::size_t output_index, crypto::public_key &derived_pub) = 0;
|
2018-03-05 06:24:48 +01:00
|
|
|
virtual crypto::public_key get_subaddress_spend_public_key(const cryptonote::account_keys& keys, const cryptonote::subaddress_index& index) = 0;
|
|
|
|
virtual std::vector<crypto::public_key> get_subaddress_spend_public_keys(const cryptonote::account_keys &keys, uint32_t account, uint32_t begin, uint32_t end) = 0;
|
|
|
|
virtual cryptonote::account_public_address get_subaddress(const cryptonote::account_keys& keys, const cryptonote::subaddress_index &index) = 0;
|
|
|
|
virtual crypto::secret_key get_subaddress_secret_key(const crypto::secret_key &sec, const cryptonote::subaddress_index &index) = 0;
|
2018-02-20 17:01:27 +01:00
|
|
|
|
|
|
|
/* ======================================================================= */
|
|
|
|
/* DERIVATION & KEY */
|
|
|
|
/* ======================================================================= */
|
|
|
|
virtual bool verify_keys(const crypto::secret_key &secret_key, const crypto::public_key &public_key) = 0;
|
|
|
|
virtual bool scalarmultKey(rct::key & aP, const rct::key &P, const rct::key &a) = 0;
|
|
|
|
virtual bool scalarmultBase(rct::key &aG, const rct::key &a) = 0;
|
|
|
|
virtual bool sc_secret_add( crypto::secret_key &r, const crypto::secret_key &a, const crypto::secret_key &b) = 0;
|
2018-03-05 06:24:48 +01:00
|
|
|
virtual crypto::secret_key generate_keys(crypto::public_key &pub, crypto::secret_key &sec, const crypto::secret_key& recovery_key = crypto::secret_key(), bool recover = false) = 0;
|
2018-02-20 17:01:27 +01:00
|
|
|
virtual bool generate_key_derivation(const crypto::public_key &pub, const crypto::secret_key &sec, crypto::key_derivation &derivation) = 0;
|
2018-04-09 16:07:11 +02:00
|
|
|
virtual bool conceal_derivation(crypto::key_derivation &derivation, const crypto::public_key &tx_pub_key, const std::vector<crypto::public_key> &additional_tx_pub_keys, const crypto::key_derivation &main_derivation, const std::vector<crypto::key_derivation> &additional_derivations) = 0;
|
2018-02-20 17:01:27 +01:00
|
|
|
virtual bool derivation_to_scalar(const crypto::key_derivation &derivation, const size_t output_index, crypto::ec_scalar &res) = 0;
|
|
|
|
virtual bool derive_secret_key(const crypto::key_derivation &derivation, const std::size_t output_index, const crypto::secret_key &sec, crypto::secret_key &derived_sec) = 0;
|
|
|
|
virtual bool derive_public_key(const crypto::key_derivation &derivation, const std::size_t output_index, const crypto::public_key &pub, crypto::public_key &derived_pub) = 0;
|
|
|
|
virtual bool secret_key_to_public_key(const crypto::secret_key &sec, crypto::public_key &pub) = 0;
|
|
|
|
virtual bool generate_key_image(const crypto::public_key &pub, const crypto::secret_key &sec, crypto::key_image &image) = 0;
|
|
|
|
|
2018-03-05 06:24:48 +01:00
|
|
|
// alternative prototypes available in libringct
|
|
|
|
rct::key scalarmultKey(const rct::key &P, const rct::key &a)
|
|
|
|
{
|
|
|
|
rct::key aP;
|
|
|
|
scalarmultKey(aP, P, a);
|
|
|
|
return aP;
|
|
|
|
}
|
|
|
|
|
|
|
|
rct::key scalarmultBase(const rct::key &a)
|
|
|
|
{
|
|
|
|
rct::key aG;
|
|
|
|
scalarmultBase(aG, a);
|
|
|
|
return aG;
|
|
|
|
}
|
|
|
|
|
2018-02-20 17:01:27 +01:00
|
|
|
/* ======================================================================= */
|
|
|
|
/* TRANSACTION */
|
|
|
|
/* ======================================================================= */
|
|
|
|
|
2019-03-21 17:22:43 +01:00
|
|
|
virtual void generate_tx_proof(const crypto::hash &prefix_hash,
|
|
|
|
const crypto::public_key &R, const crypto::public_key &A, const boost::optional<crypto::public_key> &B, const crypto::public_key &D, const crypto::secret_key &r,
|
|
|
|
crypto::signature &sig) = 0;
|
|
|
|
|
2018-02-20 17:01:27 +01:00
|
|
|
virtual bool open_tx(crypto::secret_key &tx_key) = 0;
|
|
|
|
|
2018-03-05 06:24:48 +01:00
|
|
|
virtual bool encrypt_payment_id(crypto::hash8 &payment_id, const crypto::public_key &public_key, const crypto::secret_key &secret_key) = 0;
|
|
|
|
bool decrypt_payment_id(crypto::hash8 &payment_id, const crypto::public_key &public_key, const crypto::secret_key &secret_key)
|
|
|
|
{
|
|
|
|
// Encryption and decryption are the same operation (xor with a key)
|
|
|
|
return encrypt_payment_id(payment_id, public_key, secret_key);
|
|
|
|
}
|
2018-02-20 17:01:27 +01:00
|
|
|
|
2018-12-11 10:20:21 +01:00
|
|
|
virtual rct::key genCommitmentMask(const rct::key &amount_key) = 0;
|
|
|
|
|
2019-01-06 20:49:52 +01:00
|
|
|
virtual bool ecdhEncode(rct::ecdhTuple & unmasked, const rct::key & sharedSec, bool short_amount) = 0;
|
|
|
|
virtual bool ecdhDecode(rct::ecdhTuple & masked, const rct::key & sharedSec, bool short_amount) = 0;
|
2018-02-20 17:01:27 +01:00
|
|
|
|
2018-12-11 10:20:21 +01:00
|
|
|
virtual bool generate_output_ephemeral_keys(const size_t tx_version, const cryptonote::account_keys &sender_account_keys, const crypto::public_key &txkey_pub, const crypto::secret_key &tx_key,
|
|
|
|
const cryptonote::tx_destination_entry &dst_entr, const boost::optional<cryptonote::account_public_address> &change_addr, const size_t output_index,
|
|
|
|
const bool &need_additional_txkeys, const std::vector<crypto::secret_key> &additional_tx_keys,
|
|
|
|
std::vector<crypto::public_key> &additional_tx_public_keys,
|
|
|
|
std::vector<rct::key> &amount_keys,
|
|
|
|
crypto::public_key &out_eph_public_key) = 0;
|
2018-02-20 17:01:27 +01:00
|
|
|
|
|
|
|
virtual bool mlsag_prehash(const std::string &blob, size_t inputs_size, size_t outputs_size, const rct::keyV &hashes, const rct::ctkeyV &outPk, rct::key &prehash) = 0;
|
|
|
|
virtual bool mlsag_prepare(const rct::key &H, const rct::key &xx, rct::key &a, rct::key &aG, rct::key &aHP, rct::key &rvII) = 0;
|
|
|
|
virtual bool mlsag_prepare(rct::key &a, rct::key &aG) = 0;
|
|
|
|
virtual bool mlsag_hash(const rct::keyV &long_message, rct::key &c) = 0;
|
|
|
|
virtual bool mlsag_sign(const rct::key &c, const rct::keyV &xx, const rct::keyV &alpha, const size_t rows, const size_t dsRows, rct::keyV &ss) = 0;
|
|
|
|
|
|
|
|
virtual bool close_tx(void) = 0;
|
2018-10-19 13:15:31 +02:00
|
|
|
|
2018-08-23 23:50:53 +02:00
|
|
|
virtual bool has_ki_cold_sync(void) const { return false; }
|
|
|
|
virtual bool has_tx_cold_sign(void) const { return false; }
|
2019-02-23 15:28:18 +01:00
|
|
|
virtual bool has_ki_live_refresh(void) const { return true; }
|
|
|
|
virtual bool compute_key_image(const cryptonote::account_keys& ack, const crypto::public_key& out_key, const crypto::key_derivation& recv_derivation, size_t real_output_index, const cryptonote::subaddress_index& received_index, cryptonote::keypair& in_ephemeral, crypto::key_image& ki) { return false; }
|
|
|
|
virtual void computing_key_images(bool started) {};
|
2018-08-23 23:50:53 +02:00
|
|
|
virtual void set_network_type(cryptonote::network_type network_type) { }
|
2019-05-31 10:41:52 +02:00
|
|
|
virtual void display_address(const cryptonote::subaddress_index& index, const boost::optional<crypto::hash8> &payment_id) {}
|
2018-08-23 23:50:53 +02:00
|
|
|
|
2018-10-19 13:15:31 +02:00
|
|
|
protected:
|
|
|
|
device_mode mode;
|
2018-02-20 17:01:27 +01:00
|
|
|
} ;
|
|
|
|
|
2018-03-26 12:55:48 +02:00
|
|
|
struct reset_mode {
|
|
|
|
device& hwref;
|
|
|
|
reset_mode(hw::device& dev) : hwref(dev) { }
|
|
|
|
~reset_mode() { hwref.set_mode(hw::device::NONE);}
|
|
|
|
};
|
|
|
|
|
2018-08-24 00:50:31 +02:00
|
|
|
class device_registry {
|
|
|
|
private:
|
|
|
|
std::map<std::string, std::unique_ptr<device>> registry;
|
|
|
|
|
|
|
|
public:
|
|
|
|
device_registry();
|
|
|
|
bool register_device(const std::string & device_name, device * hw_device);
|
|
|
|
device& get_device(const std::string & device_descriptor);
|
|
|
|
};
|
|
|
|
|
|
|
|
device& get_device(const std::string & device_descriptor);
|
|
|
|
bool register_device(const std::string & device_name, device * hw_device);
|
2018-02-20 17:01:27 +01:00
|
|
|
}
|
|
|
|
|