github.com/ApeGame/aac@v1.9.7/accounts/scwallet/securechannel.go (about) 1 // Copyright 2018 The go-ethereum Authors 2 // This file is part of the go-ethereum library. 3 // 4 // The go-ethereum library is free software: you can redistribute it and/or modify 5 // it under the terms of the GNU Lesser General Public License as published by 6 // the Free Software Foundation, either version 3 of the License, or 7 // (at your option) any later version. 8 // 9 // The go-ethereum library is distributed in the hope that it will be useful, 10 // but WITHOUT ANY WARRANTY; without even the implied warranty of 11 // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 12 // GNU Lesser General Public License for more details. 13 // 14 // You should have received a copy of the GNU Lesser General Public License 15 // along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>. 16 17 package scwallet 18 19 import ( 20 "bytes" 21 "crypto/aes" 22 "crypto/cipher" 23 "crypto/rand" 24 "crypto/sha256" 25 "crypto/sha512" 26 "fmt" 27 28 "github.com/ethereum/go-ethereum/crypto" 29 pcsc "github.com/gballet/go-libpcsclite" 30 "github.com/wsddn/go-ecdh" 31 "golang.org/x/crypto/pbkdf2" 32 "golang.org/x/text/unicode/norm" 33 ) 34 35 const ( 36 maxPayloadSize = 223 37 pairP1FirstStep = 0 38 pairP1LastStep = 1 39 40 scSecretLength = 32 41 scBlockSize = 16 42 43 insOpenSecureChannel = 0x10 44 insMutuallyAuthenticate = 0x11 45 insPair = 0x12 46 insUnpair = 0x13 47 48 pairingSalt = "Keycard Pairing Password Salt" 49 ) 50 51 // SecureChannelSession enables secure communication with a hardware wallet. 52 type SecureChannelSession struct { 53 card *pcsc.Card // A handle to the smartcard for communication 54 secret []byte // A shared secret generated from our ECDSA keys 55 publicKey []byte // Our own ephemeral public key 56 PairingKey []byte // A permanent shared secret for a pairing, if present 57 sessionEncKey []byte // The current session encryption key 58 sessionMacKey []byte // The current session MAC key 59 iv []byte // The current IV 60 PairingIndex uint8 // The pairing index 61 } 62 63 // NewSecureChannelSession creates a new secure channel for the given card and public key. 64 func NewSecureChannelSession(card *pcsc.Card, keyData []byte) (*SecureChannelSession, error) { 65 // Generate an ECDSA keypair for ourselves 66 gen := ecdh.NewEllipticECDH(crypto.S256()) 67 private, public, err := gen.GenerateKey(rand.Reader) 68 if err != nil { 69 return nil, err 70 } 71 72 cardPublic, ok := gen.Unmarshal(keyData) 73 if !ok { 74 return nil, fmt.Errorf("Could not unmarshal public key from card") 75 } 76 77 secret, err := gen.GenerateSharedSecret(private, cardPublic) 78 if err != nil { 79 return nil, err 80 } 81 82 return &SecureChannelSession{ 83 card: card, 84 secret: secret, 85 publicKey: gen.Marshal(public), 86 }, nil 87 } 88 89 // Pair establishes a new pairing with the smartcard. 90 func (s *SecureChannelSession) Pair(pairingPassword []byte) error { 91 secretHash := pbkdf2.Key(norm.NFKD.Bytes(pairingPassword), norm.NFKD.Bytes([]byte(pairingSalt)), 50000, 32, sha256.New) 92 93 challenge := make([]byte, 32) 94 if _, err := rand.Read(challenge); err != nil { 95 return err 96 } 97 98 response, err := s.pair(pairP1FirstStep, challenge) 99 if err != nil { 100 return err 101 } 102 103 md := sha256.New() 104 md.Write(secretHash[:]) 105 md.Write(challenge) 106 107 expectedCryptogram := md.Sum(nil) 108 cardCryptogram := response.Data[:32] 109 cardChallenge := response.Data[32:64] 110 111 if !bytes.Equal(expectedCryptogram, cardCryptogram) { 112 return fmt.Errorf("Invalid card cryptogram %v != %v", expectedCryptogram, cardCryptogram) 113 } 114 115 md.Reset() 116 md.Write(secretHash[:]) 117 md.Write(cardChallenge) 118 response, err = s.pair(pairP1LastStep, md.Sum(nil)) 119 if err != nil { 120 return err 121 } 122 123 md.Reset() 124 md.Write(secretHash[:]) 125 md.Write(response.Data[1:]) 126 s.PairingKey = md.Sum(nil) 127 s.PairingIndex = response.Data[0] 128 129 return nil 130 } 131 132 // Unpair disestablishes an existing pairing. 133 func (s *SecureChannelSession) Unpair() error { 134 if s.PairingKey == nil { 135 return fmt.Errorf("Cannot unpair: not paired") 136 } 137 138 _, err := s.transmitEncrypted(claSCWallet, insUnpair, s.PairingIndex, 0, []byte{}) 139 if err != nil { 140 return err 141 } 142 s.PairingKey = nil 143 // Close channel 144 s.iv = nil 145 return nil 146 } 147 148 // Open initializes the secure channel. 149 func (s *SecureChannelSession) Open() error { 150 if s.iv != nil { 151 return fmt.Errorf("Session already opened") 152 } 153 154 response, err := s.open() 155 if err != nil { 156 return err 157 } 158 159 // Generate the encryption/mac key by hashing our shared secret, 160 // pairing key, and the first bytes returned from the Open APDU. 161 md := sha512.New() 162 md.Write(s.secret) 163 md.Write(s.PairingKey) 164 md.Write(response.Data[:scSecretLength]) 165 keyData := md.Sum(nil) 166 s.sessionEncKey = keyData[:scSecretLength] 167 s.sessionMacKey = keyData[scSecretLength : scSecretLength*2] 168 169 // The IV is the last bytes returned from the Open APDU. 170 s.iv = response.Data[scSecretLength:] 171 172 return s.mutuallyAuthenticate() 173 } 174 175 // mutuallyAuthenticate is an internal method to authenticate both ends of the 176 // connection. 177 func (s *SecureChannelSession) mutuallyAuthenticate() error { 178 data := make([]byte, scSecretLength) 179 if _, err := rand.Read(data); err != nil { 180 return err 181 } 182 183 response, err := s.transmitEncrypted(claSCWallet, insMutuallyAuthenticate, 0, 0, data) 184 if err != nil { 185 return err 186 } 187 if response.Sw1 != 0x90 || response.Sw2 != 0x00 { 188 return fmt.Errorf("Got unexpected response from MUTUALLY_AUTHENTICATE: 0x%x%x", response.Sw1, response.Sw2) 189 } 190 191 if len(response.Data) != scSecretLength { 192 return fmt.Errorf("Response from MUTUALLY_AUTHENTICATE was %d bytes, expected %d", len(response.Data), scSecretLength) 193 } 194 195 return nil 196 } 197 198 // open is an internal method that sends an open APDU. 199 func (s *SecureChannelSession) open() (*responseAPDU, error) { 200 return transmit(s.card, &commandAPDU{ 201 Cla: claSCWallet, 202 Ins: insOpenSecureChannel, 203 P1: s.PairingIndex, 204 P2: 0, 205 Data: s.publicKey, 206 Le: 0, 207 }) 208 } 209 210 // pair is an internal method that sends a pair APDU. 211 func (s *SecureChannelSession) pair(p1 uint8, data []byte) (*responseAPDU, error) { 212 return transmit(s.card, &commandAPDU{ 213 Cla: claSCWallet, 214 Ins: insPair, 215 P1: p1, 216 P2: 0, 217 Data: data, 218 Le: 0, 219 }) 220 } 221 222 // transmitEncrypted sends an encrypted message, and decrypts and returns the response. 223 func (s *SecureChannelSession) transmitEncrypted(cla, ins, p1, p2 byte, data []byte) (*responseAPDU, error) { 224 if s.iv == nil { 225 return nil, fmt.Errorf("Channel not open") 226 } 227 228 data, err := s.encryptAPDU(data) 229 if err != nil { 230 return nil, err 231 } 232 meta := [16]byte{cla, ins, p1, p2, byte(len(data) + scBlockSize)} 233 if err = s.updateIV(meta[:], data); err != nil { 234 return nil, err 235 } 236 237 fulldata := make([]byte, len(s.iv)+len(data)) 238 copy(fulldata, s.iv) 239 copy(fulldata[len(s.iv):], data) 240 241 response, err := transmit(s.card, &commandAPDU{ 242 Cla: cla, 243 Ins: ins, 244 P1: p1, 245 P2: p2, 246 Data: fulldata, 247 }) 248 if err != nil { 249 return nil, err 250 } 251 252 rmeta := [16]byte{byte(len(response.Data))} 253 rmac := response.Data[:len(s.iv)] 254 rdata := response.Data[len(s.iv):] 255 plainData, err := s.decryptAPDU(rdata) 256 if err != nil { 257 return nil, err 258 } 259 260 if err = s.updateIV(rmeta[:], rdata); err != nil { 261 return nil, err 262 } 263 if !bytes.Equal(s.iv, rmac) { 264 return nil, fmt.Errorf("Invalid MAC in response") 265 } 266 267 rapdu := &responseAPDU{} 268 rapdu.deserialize(plainData) 269 270 if rapdu.Sw1 != sw1Ok { 271 return nil, fmt.Errorf("Unexpected response status Cla=0x%x, Ins=0x%x, Sw=0x%x%x", cla, ins, rapdu.Sw1, rapdu.Sw2) 272 } 273 274 return rapdu, nil 275 } 276 277 // encryptAPDU is an internal method that serializes and encrypts an APDU. 278 func (s *SecureChannelSession) encryptAPDU(data []byte) ([]byte, error) { 279 if len(data) > maxPayloadSize { 280 return nil, fmt.Errorf("Payload of %d bytes exceeds maximum of %d", len(data), maxPayloadSize) 281 } 282 data = pad(data, 0x80) 283 284 ret := make([]byte, len(data)) 285 286 a, err := aes.NewCipher(s.sessionEncKey) 287 if err != nil { 288 return nil, err 289 } 290 crypter := cipher.NewCBCEncrypter(a, s.iv) 291 crypter.CryptBlocks(ret, data) 292 return ret, nil 293 } 294 295 // pad applies message padding to a 16 byte boundary. 296 func pad(data []byte, terminator byte) []byte { 297 padded := make([]byte, (len(data)/16+1)*16) 298 copy(padded, data) 299 padded[len(data)] = terminator 300 return padded 301 } 302 303 // decryptAPDU is an internal method that decrypts and deserializes an APDU. 304 func (s *SecureChannelSession) decryptAPDU(data []byte) ([]byte, error) { 305 a, err := aes.NewCipher(s.sessionEncKey) 306 if err != nil { 307 return nil, err 308 } 309 310 ret := make([]byte, len(data)) 311 312 crypter := cipher.NewCBCDecrypter(a, s.iv) 313 crypter.CryptBlocks(ret, data) 314 return unpad(ret, 0x80) 315 } 316 317 // unpad strips padding from a message. 318 func unpad(data []byte, terminator byte) ([]byte, error) { 319 for i := 1; i <= 16; i++ { 320 switch data[len(data)-i] { 321 case 0: 322 continue 323 case terminator: 324 return data[:len(data)-i], nil 325 default: 326 return nil, fmt.Errorf("Expected end of padding, got %d", data[len(data)-i]) 327 } 328 } 329 return nil, fmt.Errorf("Expected end of padding, got 0") 330 } 331 332 // updateIV is an internal method that updates the initialization vector after 333 // each message exchanged. 334 func (s *SecureChannelSession) updateIV(meta, data []byte) error { 335 data = pad(data, 0) 336 a, err := aes.NewCipher(s.sessionMacKey) 337 if err != nil { 338 return err 339 } 340 crypter := cipher.NewCBCEncrypter(a, make([]byte, 16)) 341 crypter.CryptBlocks(meta, meta) 342 crypter.CryptBlocks(data, data) 343 // The first 16 bytes of the last block is the MAC 344 s.iv = data[len(data)-32 : len(data)-16] 345 return nil 346 }