2020-05-07 04:36:54 +02:00
|
|
|
// Copyright (c) 2017-2020, The Monero Project
|
2018-02-20 17:01:27 +01:00
|
|
|
//
|
|
|
|
// All rights reserved.
|
|
|
|
//
|
|
|
|
// Redistribution and use in source and binary forms, with or without modification, are
|
|
|
|
// permitted provided that the following conditions are met:
|
|
|
|
//
|
|
|
|
// 1. Redistributions of source code must retain the above copyright notice, this list of
|
|
|
|
// conditions and the following disclaimer.
|
|
|
|
//
|
|
|
|
// 2. Redistributions in binary form must reproduce the above copyright notice, this list
|
|
|
|
// of conditions and the following disclaimer in the documentation and/or other
|
|
|
|
// materials provided with the distribution.
|
|
|
|
//
|
|
|
|
// 3. Neither the name of the copyright holder nor the names of its contributors may be
|
|
|
|
// used to endorse or promote products derived from this software without specific
|
|
|
|
// prior written permission.
|
|
|
|
//
|
|
|
|
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY
|
|
|
|
// EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
|
|
|
// MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
|
|
|
|
// THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
|
|
// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
|
|
|
|
// PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
|
|
// INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
|
|
// STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
|
|
|
|
// THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
//
|
|
|
|
|
|
|
|
|
|
|
|
#pragma once
|
|
|
|
|
|
|
|
#include <cstddef>
|
|
|
|
#include <string>
|
|
|
|
#include "device.hpp"
|
2019-03-21 17:22:43 +01:00
|
|
|
#include "log.hpp"
|
2018-08-01 09:24:53 +02:00
|
|
|
#include "device_io_hid.hpp"
|
2018-03-26 12:38:38 +02:00
|
|
|
#include <boost/thread/mutex.hpp>
|
|
|
|
#include <boost/thread/recursive_mutex.hpp>
|
2018-02-20 17:01:27 +01:00
|
|
|
|
|
|
|
namespace hw {
|
|
|
|
|
|
|
|
namespace ledger {
|
|
|
|
|
2019-03-07 23:34:53 +01:00
|
|
|
/* Minimal supported version */
|
|
|
|
#define MINIMAL_APP_VERSION_MAJOR 1
|
2020-08-28 12:00:25 +02:00
|
|
|
#define MINIMAL_APP_VERSION_MINOR 6
|
|
|
|
#define MINIMAL_APP_VERSION_MICRO 0
|
2019-03-07 23:34:53 +01:00
|
|
|
|
|
|
|
#define VERSION(M,m,u) ((M)<<16|(m)<<8|(u))
|
|
|
|
#define VERSION_MAJOR(v) (((v)>>16)&0xFF)
|
|
|
|
#define VERSION_MINOR(v) (((v)>>8)&0xFF)
|
|
|
|
#define VERSION_MICRO(v) (((v)>>0)&0xFF)
|
|
|
|
|
|
|
|
#define MINIMAL_APP_VERSION VERSION(MINIMAL_APP_VERSION_MAJOR, MINIMAL_APP_VERSION_MINOR, MINIMAL_APP_VERSION_MICRO)
|
|
|
|
|
2018-02-20 17:01:27 +01:00
|
|
|
void register_all(std::map<std::string, std::unique_ptr<device>> ®istry);
|
|
|
|
|
|
|
|
#ifdef WITH_DEVICE_LEDGER
|
|
|
|
|
2020-02-07 15:20:38 +01:00
|
|
|
// Origin: https://github.com/LedgerHQ/ledger-app-monero/blob/master/src/monero_types.h
|
|
|
|
#define SW_BYTES_REMAINING_00 0x6100
|
|
|
|
#define SW_WARNING_STATE_UNCHANGED 0x6200
|
|
|
|
#define SW_STATE_TERMINATED 0x6285
|
|
|
|
#define SW_MORE_DATA_AVAILABLE 0x6310
|
|
|
|
#define SW_WRONG_LENGTH 0x6700
|
|
|
|
#define SW_LOGICAL_CHANNEL_NOT_SUPPORTED 0x6881
|
|
|
|
#define SW_SECURE_MESSAGING_NOT_SUPPORTED 0x6882
|
|
|
|
#define SW_LAST_COMMAND_EXPECTED 0x6883
|
|
|
|
#define SW_COMMAND_CHAINING_NOT_SUPPORTED 0x6884
|
|
|
|
#define SW_SECURITY_LOAD_KEY 0x6900
|
|
|
|
#define SW_SECURITY_COMMITMENT_CONTROL 0x6911
|
|
|
|
#define SW_SECURITY_AMOUNT_CHAIN_CONTROL 0x6912
|
|
|
|
#define SW_SECURITY_COMMITMENT_CHAIN_CONTROL 0x6913
|
|
|
|
#define SW_SECURITY_OUTKEYS_CHAIN_CONTROL 0x6914
|
|
|
|
#define SW_SECURITY_MAXOUTPUT_REACHED 0x6915
|
|
|
|
#define SW_SECURITY_TRUSTED_INPUT 0x6916
|
|
|
|
#define SW_CLIENT_NOT_SUPPORTED 0x6930
|
|
|
|
#define SW_SECURITY_STATUS_NOT_SATISFIED 0x6982
|
|
|
|
#define SW_FILE_INVALID 0x6983
|
|
|
|
#define SW_PIN_BLOCKED 0x6983
|
|
|
|
#define SW_DATA_INVALID 0x6984
|
|
|
|
#define SW_CONDITIONS_NOT_SATISFIED 0x6985
|
|
|
|
#define SW_COMMAND_NOT_ALLOWED 0x6986
|
|
|
|
#define SW_APPLET_SELECT_FAILED 0x6999
|
|
|
|
#define SW_WRONG_DATA 0x6a80
|
|
|
|
#define SW_FUNC_NOT_SUPPORTED 0x6a81
|
|
|
|
#define SW_FILE_NOT_FOUND 0x6a82
|
|
|
|
#define SW_RECORD_NOT_FOUND 0x6a83
|
|
|
|
#define SW_FILE_FULL 0x6a84
|
|
|
|
#define SW_INCORRECT_P1P2 0x6a86
|
|
|
|
#define SW_REFERENCED_DATA_NOT_FOUND 0x6a88
|
|
|
|
#define SW_WRONG_P1P2 0x6b00
|
|
|
|
#define SW_CORRECT_LENGTH_00 0x6c00
|
|
|
|
#define SW_INS_NOT_SUPPORTED 0x6d00
|
|
|
|
#define SW_CLA_NOT_SUPPORTED 0x6e00
|
|
|
|
#define SW_UNKNOWN 0x6f00
|
|
|
|
#define SW_OK 0x9000
|
|
|
|
#define SW_ALGORITHM_UNSUPPORTED 0x9484
|
|
|
|
|
2018-02-20 17:01:27 +01:00
|
|
|
namespace {
|
|
|
|
bool apdu_verbose =true;
|
|
|
|
}
|
|
|
|
|
|
|
|
void set_apdu_verbose(bool verbose);
|
|
|
|
|
|
|
|
class ABPkeys {
|
|
|
|
public:
|
|
|
|
rct::key Aout;
|
|
|
|
rct::key Bout;
|
2018-03-05 14:46:15 +01:00
|
|
|
bool is_subaddress;
|
2018-12-11 10:20:21 +01:00
|
|
|
bool is_change_address;
|
|
|
|
bool additional_key ;
|
2018-02-20 17:01:27 +01:00
|
|
|
size_t index;
|
|
|
|
rct::key Pout;
|
|
|
|
rct::key AKout;
|
2018-12-11 10:20:21 +01:00
|
|
|
ABPkeys(const rct::key& A, const rct::key& B, const bool is_subaddr, bool is_subaddress, bool is_change_address, size_t index, const rct::key& P,const rct::key& AK);
|
2018-02-20 17:01:27 +01:00
|
|
|
ABPkeys(const ABPkeys& keys) ;
|
2019-07-03 15:52:40 +02:00
|
|
|
ABPkeys() {index=0;is_subaddress=false;is_change_address=false;additional_key=false;}
|
2019-06-08 17:58:33 +02:00
|
|
|
ABPkeys &operator=(const ABPkeys &keys);
|
2018-02-20 17:01:27 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
class Keymap {
|
|
|
|
public:
|
|
|
|
std::vector<ABPkeys> ABP;
|
|
|
|
|
|
|
|
bool find(const rct::key& P, ABPkeys& keys) const;
|
|
|
|
void add(const ABPkeys& keys);
|
|
|
|
void clear();
|
|
|
|
void log();
|
|
|
|
};
|
|
|
|
|
2019-09-25 14:31:14 +02:00
|
|
|
class SecHMAC {
|
|
|
|
public:
|
|
|
|
uint32_t sec[32];
|
|
|
|
uint32_t hmac[32];
|
|
|
|
|
|
|
|
SecHMAC(const uint8_t s[32], const uint8_t m[32]);
|
|
|
|
|
|
|
|
};
|
|
|
|
|
|
|
|
class HMACmap {
|
|
|
|
public:
|
|
|
|
std::vector<SecHMAC> hmacs;
|
|
|
|
|
|
|
|
void find_mac(const uint8_t sec[32], uint8_t hmac[32]) ;
|
|
|
|
void add_mac(const uint8_t sec[32], const uint8_t hmac[32]) ;
|
|
|
|
void clear() ;
|
|
|
|
};
|
|
|
|
|
|
|
|
|
2018-02-20 17:01:27 +01:00
|
|
|
#define BUFFER_SEND_SIZE 262
|
|
|
|
#define BUFFER_RECV_SIZE 262
|
|
|
|
|
|
|
|
class device_ledger : public hw::device {
|
|
|
|
private:
|
2018-03-26 12:38:38 +02:00
|
|
|
// Locker for concurrent access
|
|
|
|
mutable boost::recursive_mutex device_locker;
|
|
|
|
mutable boost::mutex command_locker;
|
|
|
|
|
2018-08-01 09:24:53 +02:00
|
|
|
//IO
|
|
|
|
hw::io::device_io_hid hw_device;
|
|
|
|
unsigned int length_send;
|
|
|
|
unsigned char buffer_send[BUFFER_SEND_SIZE];
|
|
|
|
unsigned int length_recv;
|
|
|
|
unsigned char buffer_recv[BUFFER_RECV_SIZE];
|
|
|
|
unsigned int sw;
|
|
|
|
unsigned int id;
|
2018-02-20 17:01:27 +01:00
|
|
|
void logCMD(void);
|
|
|
|
void logRESP(void);
|
2020-02-07 15:20:38 +01:00
|
|
|
unsigned int exchange(unsigned int ok=SW_OK, unsigned int mask=0xFFFF);
|
|
|
|
unsigned int exchange_wait_on_input(unsigned int ok=SW_OK, unsigned int mask=0xFFFF);
|
2018-02-20 17:01:27 +01:00
|
|
|
void reset_buffer(void);
|
2018-08-01 09:24:53 +02:00
|
|
|
int set_command_header(unsigned char ins, unsigned char p1 = 0x00, unsigned char p2 = 0x00);
|
|
|
|
int set_command_header_noopt(unsigned char ins, unsigned char p1 = 0x00, unsigned char p2 = 0x00);
|
|
|
|
void send_simple(unsigned char ins, unsigned char p1 = 0x00);
|
2019-09-25 14:31:14 +02:00
|
|
|
void send_secret(const unsigned char sec[32], int &offset);
|
|
|
|
void receive_secret(unsigned char sec[32], int &offset);
|
2018-02-20 17:01:27 +01:00
|
|
|
|
2018-03-26 12:55:48 +02:00
|
|
|
// hw running mode
|
|
|
|
device_mode mode;
|
2019-09-25 14:31:14 +02:00
|
|
|
bool tx_in_progress;
|
|
|
|
|
2018-03-26 12:55:48 +02:00
|
|
|
// map public destination key to ephemeral destination key
|
|
|
|
Keymap key_map;
|
2018-12-11 10:20:21 +01:00
|
|
|
bool add_output_key_mapping(const crypto::public_key &Aout, const crypto::public_key &Bout, const bool is_subaddress, const bool is_change,
|
|
|
|
const bool need_additional, const size_t real_output_index,
|
|
|
|
const rct::key &amount_key, const crypto::public_key &out_eph_public_key);
|
2019-09-25 14:31:14 +02:00
|
|
|
//hmac for some encrypted value
|
|
|
|
HMACmap hmac_map;
|
|
|
|
|
2018-03-26 12:55:48 +02:00
|
|
|
// To speed up blockchain parsing the view key maybe handle here.
|
|
|
|
crypto::secret_key viewkey;
|
|
|
|
bool has_view_key;
|
|
|
|
|
|
|
|
//extra debug
|
2018-03-05 14:46:15 +01:00
|
|
|
#ifdef DEBUG_HWDEVICE
|
|
|
|
device *controle_device;
|
2018-02-20 17:01:27 +01:00
|
|
|
#endif
|
|
|
|
|
|
|
|
public:
|
|
|
|
device_ledger();
|
|
|
|
~device_ledger();
|
|
|
|
|
|
|
|
device_ledger(const device_ledger &device) = delete ;
|
|
|
|
device_ledger& operator=(const device_ledger &device) = delete;
|
|
|
|
|
2018-08-01 09:24:53 +02:00
|
|
|
explicit operator bool() const override {return this->connected(); }
|
2018-02-20 17:01:27 +01:00
|
|
|
|
|
|
|
bool reset(void);
|
|
|
|
|
|
|
|
/* ======================================================================= */
|
|
|
|
/* SETUP/TEARDOWN */
|
|
|
|
/* ======================================================================= */
|
|
|
|
bool set_name(const std::string &name) override;
|
|
|
|
|
|
|
|
const std::string get_name() const override;
|
|
|
|
bool init(void) override;
|
|
|
|
bool release() override;
|
|
|
|
bool connect(void) override;
|
|
|
|
bool disconnect() override;
|
2018-08-01 09:24:53 +02:00
|
|
|
bool connected(void) const;
|
2018-02-20 17:01:27 +01:00
|
|
|
|
2018-08-16 10:31:48 +02:00
|
|
|
bool set_mode(device_mode mode) override;
|
|
|
|
|
2018-09-21 21:32:47 +02:00
|
|
|
device_type get_type() const override {return device_type::LEDGER;};
|
2018-08-23 23:50:53 +02:00
|
|
|
device_protocol_t device_protocol() const override { return PROTOCOL_PROXY; };
|
2018-03-26 12:38:38 +02:00
|
|
|
|
|
|
|
/* ======================================================================= */
|
|
|
|
/* LOCKER */
|
|
|
|
/* ======================================================================= */
|
|
|
|
void lock(void) override;
|
|
|
|
void unlock(void) override;
|
|
|
|
bool try_lock(void) override;
|
|
|
|
|
2018-02-20 17:01:27 +01:00
|
|
|
/* ======================================================================= */
|
|
|
|
/* WALLET & ADDRESS */
|
|
|
|
/* ======================================================================= */
|
|
|
|
bool get_public_address(cryptonote::account_public_address &pubkey) override;
|
|
|
|
bool get_secret_keys(crypto::secret_key &viewkey , crypto::secret_key &spendkey) override;
|
2018-07-06 08:42:08 +02:00
|
|
|
bool generate_chacha_key(const cryptonote::account_keys &keys, crypto::chacha_key &key, uint64_t kdf_rounds) override;
|
2019-09-28 14:03:51 +02:00
|
|
|
void display_address(const cryptonote::subaddress_index& index, const boost::optional<crypto::hash8> &payment_id) override;
|
2018-02-20 17:01:27 +01:00
|
|
|
|
|
|
|
/* ======================================================================= */
|
|
|
|
/* SUB ADDRESS */
|
|
|
|
/* ======================================================================= */
|
|
|
|
bool derive_subaddress_public_key(const crypto::public_key &pub, const crypto::key_derivation &derivation, const std::size_t output_index, crypto::public_key &derived_pub) override;
|
2018-03-05 06:24:48 +01:00
|
|
|
crypto::public_key get_subaddress_spend_public_key(const cryptonote::account_keys& keys, const cryptonote::subaddress_index& index) override;
|
|
|
|
std::vector<crypto::public_key> get_subaddress_spend_public_keys(const cryptonote::account_keys &keys, uint32_t account, uint32_t begin, uint32_t end) override;
|
|
|
|
cryptonote::account_public_address get_subaddress(const cryptonote::account_keys& keys, const cryptonote::subaddress_index &index) override;
|
|
|
|
crypto::secret_key get_subaddress_secret_key(const crypto::secret_key &sec, const cryptonote::subaddress_index &index) override;
|
2018-02-20 17:01:27 +01:00
|
|
|
|
|
|
|
/* ======================================================================= */
|
|
|
|
/* DERIVATION & KEY */
|
|
|
|
/* ======================================================================= */
|
|
|
|
bool verify_keys(const crypto::secret_key &secret_key, const crypto::public_key &public_key) override;
|
|
|
|
bool scalarmultKey(rct::key & aP, const rct::key &P, const rct::key &a) override;
|
|
|
|
bool scalarmultBase(rct::key &aG, const rct::key &a) override;
|
|
|
|
bool sc_secret_add(crypto::secret_key &r, const crypto::secret_key &a, const crypto::secret_key &b) override;
|
2018-03-05 06:24:48 +01:00
|
|
|
crypto::secret_key generate_keys(crypto::public_key &pub, crypto::secret_key &sec, const crypto::secret_key& recovery_key = crypto::secret_key(), bool recover = false) override;
|
2018-02-20 17:01:27 +01:00
|
|
|
bool generate_key_derivation(const crypto::public_key &pub, const crypto::secret_key &sec, crypto::key_derivation &derivation) override;
|
2018-04-13 23:21:43 +02:00
|
|
|
bool conceal_derivation(crypto::key_derivation &derivation, const crypto::public_key &tx_pub_key, const std::vector<crypto::public_key> &additional_tx_pub_keys, const crypto::key_derivation &main_derivation, const std::vector<crypto::key_derivation> &additional_derivations) override;
|
2018-02-20 17:01:27 +01:00
|
|
|
bool derivation_to_scalar(const crypto::key_derivation &derivation, const size_t output_index, crypto::ec_scalar &res) override;
|
|
|
|
bool derive_secret_key(const crypto::key_derivation &derivation, const std::size_t output_index, const crypto::secret_key &sec, crypto::secret_key &derived_sec) override;
|
|
|
|
bool derive_public_key(const crypto::key_derivation &derivation, const std::size_t output_index, const crypto::public_key &pub, crypto::public_key &derived_pub) override;
|
|
|
|
bool secret_key_to_public_key(const crypto::secret_key &sec, crypto::public_key &pub) override;
|
|
|
|
bool generate_key_image(const crypto::public_key &pub, const crypto::secret_key &sec, crypto::key_image &image) override;
|
|
|
|
|
|
|
|
/* ======================================================================= */
|
|
|
|
/* TRANSACTION */
|
|
|
|
/* ======================================================================= */
|
2019-03-21 17:22:43 +01:00
|
|
|
void generate_tx_proof(const crypto::hash &prefix_hash,
|
|
|
|
const crypto::public_key &R, const crypto::public_key &A, const boost::optional<crypto::public_key> &B, const crypto::public_key &D, const crypto::secret_key &r,
|
|
|
|
crypto::signature &sig) override;
|
|
|
|
|
2018-02-20 17:01:27 +01:00
|
|
|
bool open_tx(crypto::secret_key &tx_key) override;
|
|
|
|
|
2020-04-03 22:56:55 +02:00
|
|
|
void get_transaction_prefix_hash(const cryptonote::transaction_prefix& tx, crypto::hash& h) override;
|
|
|
|
|
2018-03-05 06:24:48 +01:00
|
|
|
bool encrypt_payment_id(crypto::hash8 &payment_id, const crypto::public_key &public_key, const crypto::secret_key &secret_key) override;
|
2018-02-20 17:01:27 +01:00
|
|
|
|
2018-12-11 10:20:21 +01:00
|
|
|
rct::key genCommitmentMask(const rct::key &amount_key) override;
|
|
|
|
|
2019-01-06 20:49:52 +01:00
|
|
|
bool ecdhEncode(rct::ecdhTuple & unmasked, const rct::key & sharedSec, bool short_format) override;
|
|
|
|
bool ecdhDecode(rct::ecdhTuple & masked, const rct::key & sharedSec, bool short_format) override;
|
2018-02-20 17:01:27 +01:00
|
|
|
|
2018-12-11 10:20:21 +01:00
|
|
|
bool generate_output_ephemeral_keys(const size_t tx_version, const cryptonote::account_keys &sender_account_keys, const crypto::public_key &txkey_pub, const crypto::secret_key &tx_key,
|
|
|
|
const cryptonote::tx_destination_entry &dst_entr, const boost::optional<cryptonote::account_public_address> &change_addr, const size_t output_index,
|
|
|
|
const bool &need_additional_txkeys, const std::vector<crypto::secret_key> &additional_tx_keys,
|
|
|
|
std::vector<crypto::public_key> &additional_tx_public_keys,
|
|
|
|
std::vector<rct::key> &amount_keys,
|
|
|
|
crypto::public_key &out_eph_public_key) override;
|
2018-02-20 17:01:27 +01:00
|
|
|
|
|
|
|
bool mlsag_prehash(const std::string &blob, size_t inputs_size, size_t outputs_size, const rct::keyV &hashes, const rct::ctkeyV &outPk, rct::key &prehash) override;
|
|
|
|
bool mlsag_prepare(const rct::key &H, const rct::key &xx, rct::key &a, rct::key &aG, rct::key &aHP, rct::key &rvII) override;
|
|
|
|
bool mlsag_prepare(rct::key &a, rct::key &aG) override;
|
|
|
|
bool mlsag_hash(const rct::keyV &long_message, rct::key &c) override;
|
|
|
|
bool mlsag_sign( const rct::key &c, const rct::keyV &xx, const rct::keyV &alpha, const size_t rows, const size_t dsRows, rct::keyV &ss) override;
|
|
|
|
|
2020-03-31 17:11:51 +02:00
|
|
|
bool clsag_prepare(const rct::key &p, const rct::key &z, rct::key &I, rct::key &D, const rct::key &H, rct::key &a, rct::key &aG, rct::key &aH) override;
|
|
|
|
bool clsag_hash(const rct::keyV &data, rct::key &hash) override;
|
|
|
|
bool clsag_sign(const rct::key &c, const rct::key &a, const rct::key &p, const rct::key &z, const rct::key &mu_P, const rct::key &mu_C, rct::key &s) override;
|
|
|
|
|
|
|
|
|
2018-02-20 17:01:27 +01:00
|
|
|
bool close_tx(void) override;
|
|
|
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
2018-03-05 14:46:15 +01:00
|
|
|
#ifdef DEBUG_HWDEVICE
|
2018-03-26 12:55:48 +02:00
|
|
|
extern crypto::secret_key dbg_viewkey;
|
|
|
|
extern crypto::secret_key dbg_spendkey;
|
2018-02-20 17:01:27 +01:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#endif //WITH_DEVICE_LEDGER
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|