2016-01-21 08:08:05 +03:00
|
|
|
package uspv
|
|
|
|
|
|
|
|
import (
|
|
|
|
"crypto/rand"
|
|
|
|
"encoding/hex"
|
|
|
|
"fmt"
|
|
|
|
"io/ioutil"
|
|
|
|
"os"
|
|
|
|
"strings"
|
|
|
|
|
|
|
|
"github.com/howeyc/gopass"
|
2016-05-15 17:17:44 +03:00
|
|
|
"github.com/roasbeef/btcd/chaincfg"
|
|
|
|
"github.com/roasbeef/btcutil/hdkeychain"
|
2016-01-21 08:08:05 +03:00
|
|
|
"golang.org/x/crypto/nacl/secretbox"
|
|
|
|
"golang.org/x/crypto/scrypt"
|
|
|
|
)
|
|
|
|
|
|
|
|
// warning! look at those imports! crypto! hopefully this works!
|
|
|
|
|
|
|
|
/* on-disk stored keys are 32bytes. This is good for ed25519 private keys,
|
|
|
|
for seeds for bip32, for individual secp256k1 priv keys, and so on.
|
|
|
|
32 bytes is enough for anyone.
|
|
|
|
If you want fewer bytes, put some zeroes at the end */
|
|
|
|
|
|
|
|
// LoadKeyFromFileInteractive opens the file 'filename' and presents a
|
|
|
|
// keyboard prompt for the passphrase to decrypt it. It returns the
|
|
|
|
// key if decryption works, or errors out.
|
|
|
|
func LoadKeyFromFileInteractive(filename string) (*[32]byte, error) {
|
|
|
|
a, err := os.Stat(filename)
|
|
|
|
if err != nil {
|
2016-02-04 03:47:29 +03:00
|
|
|
return nil, err
|
2016-01-21 08:08:05 +03:00
|
|
|
}
|
|
|
|
if a.Size() < 80 { // there can't be a password...
|
|
|
|
return LoadKeyFromFileArg(filename, nil)
|
|
|
|
}
|
|
|
|
fmt.Printf("passphrase: ")
|
2016-02-04 03:47:29 +03:00
|
|
|
pass, err := gopass.GetPasswd()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2016-01-21 08:08:05 +03:00
|
|
|
fmt.Printf("\n")
|
|
|
|
return LoadKeyFromFileArg(filename, pass)
|
|
|
|
}
|
|
|
|
|
|
|
|
// LoadKeyFromFileArg opens the file and returns the key. If the key is
|
|
|
|
// unencrypted it will ignore the password argument.
|
|
|
|
func LoadKeyFromFileArg(filename string, pass []byte) (*[32]byte, error) {
|
|
|
|
priv32 := new([32]byte)
|
|
|
|
keyhex, err := ioutil.ReadFile(filename)
|
|
|
|
if err != nil {
|
|
|
|
return priv32, err
|
|
|
|
}
|
|
|
|
keyhex = []byte(strings.TrimSpace(string(keyhex)))
|
|
|
|
enckey, err := hex.DecodeString(string(keyhex))
|
|
|
|
if err != nil {
|
|
|
|
return priv32, err
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(enckey) == 32 { // UNencrypted key, length 32
|
|
|
|
fmt.Printf("WARNING!! Key file not encrypted!!\n")
|
|
|
|
fmt.Printf("Anyone who can read the key file can take everything!\n")
|
|
|
|
fmt.Printf("You should start over and use a good passphrase!\n")
|
|
|
|
copy(priv32[:], enckey[:])
|
|
|
|
return priv32, nil
|
|
|
|
}
|
|
|
|
// enckey should be 72 bytes. 24 for scrypt salt/box nonce,
|
|
|
|
// 16 for box auth
|
|
|
|
if len(enckey) != 72 {
|
|
|
|
return priv32, fmt.Errorf("Key length error for %s ", filename)
|
|
|
|
}
|
|
|
|
// enckey is actually encrypted, get derived key from pass and salt
|
|
|
|
// first extract salt
|
|
|
|
salt := new([24]byte) // salt (also nonce for secretbox)
|
|
|
|
dk32 := new([32]byte) // derived key array
|
|
|
|
copy(salt[:], enckey[:24]) // first 24 bytes are scrypt salt/box nonce
|
|
|
|
|
|
|
|
dk, err := scrypt.Key(pass, salt[:], 16384, 8, 1, 32) // derive key
|
|
|
|
if err != nil {
|
|
|
|
return priv32, err
|
|
|
|
}
|
|
|
|
copy(dk32[:], dk[:]) // copy into fixed size array
|
|
|
|
|
|
|
|
// nonce for secretbox is the same as scrypt salt. Seems fine. Really.
|
|
|
|
priv, worked := secretbox.Open(nil, enckey[24:], salt, dk32)
|
|
|
|
if worked != true {
|
|
|
|
return priv32, fmt.Errorf("Decryption failed for %s ", filename)
|
|
|
|
}
|
|
|
|
copy(priv32[:], priv[:]) //copy decrypted private key into array
|
|
|
|
|
|
|
|
priv = nil // this probably doesn't do anything but... eh why not
|
|
|
|
return priv32, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// saves a 32 byte key to file, prompting for passphrase.
|
|
|
|
// if user enters empty passphrase (hits enter twice), will be saved
|
|
|
|
// in the clear.
|
|
|
|
func SaveKeyToFileInteractive(filename string, priv32 *[32]byte) error {
|
|
|
|
var match bool
|
2016-02-04 03:47:29 +03:00
|
|
|
var err error
|
2016-01-21 08:08:05 +03:00
|
|
|
var pass1, pass2 []byte
|
|
|
|
for match != true {
|
|
|
|
fmt.Printf("passphrase: ")
|
2016-02-04 03:47:29 +03:00
|
|
|
pass1, err = gopass.GetPasswd()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2016-01-21 08:08:05 +03:00
|
|
|
fmt.Printf("repeat passphrase: ")
|
2016-02-04 03:47:29 +03:00
|
|
|
pass2, err = gopass.GetPasswd()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2016-01-21 08:08:05 +03:00
|
|
|
if string(pass1) == string(pass2) {
|
|
|
|
match = true
|
|
|
|
} else {
|
|
|
|
fmt.Printf("user input error. Try again gl hf dd.\n")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
fmt.Printf("\n")
|
|
|
|
return SaveKeyToFileArg(filename, priv32, pass1)
|
|
|
|
}
|
|
|
|
|
|
|
|
// saves a 32 byte key to a file, encrypting with pass.
|
|
|
|
// if pass is nil or zero length, doesn't encrypt and just saves in hex.
|
|
|
|
func SaveKeyToFileArg(filename string, priv32 *[32]byte, pass []byte) error {
|
|
|
|
if len(pass) == 0 { // zero-length pass, save unencrypted
|
|
|
|
keyhex := fmt.Sprintf("%x\n", priv32[:])
|
|
|
|
err := ioutil.WriteFile(filename, []byte(keyhex), 0600)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
fmt.Printf("WARNING!! Key file not encrypted!!\n")
|
|
|
|
fmt.Printf("Anyone who can read the key file can take everything!\n")
|
|
|
|
fmt.Printf("You should start over and use a good passphrase!\n")
|
|
|
|
fmt.Printf("Saved unencrypted key at %s\n", filename)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
salt := new([24]byte) // salt for scrypt / nonce for secretbox
|
|
|
|
dk32 := new([32]byte) // derived key from scrypt
|
|
|
|
|
|
|
|
//get 24 random bytes for scrypt salt (and secretbox nonce)
|
|
|
|
_, err := rand.Read(salt[:])
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
// next use the pass and salt to make a 32-byte derived key
|
|
|
|
dk, err := scrypt.Key(pass, salt[:], 16384, 8, 1, 32)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
copy(dk32[:], dk[:])
|
|
|
|
|
|
|
|
enckey := append(salt[:], secretbox.Seal(nil, priv32[:], salt, dk32)...)
|
|
|
|
// enckey = append(salt, enckey...)
|
|
|
|
keyhex := fmt.Sprintf("%x\n", enckey)
|
|
|
|
|
|
|
|
err = ioutil.WriteFile(filename, []byte(keyhex), 0600)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
fmt.Printf("Wrote encrypted key to %s\n", filename)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// ReadKeyFileToECPriv returns an extendedkey from a file.
|
|
|
|
// If there's no file there, it'll make one. If there's a password needed,
|
|
|
|
// it'll prompt for one. One stop function.
|
2016-01-21 08:27:58 +03:00
|
|
|
func ReadKeyFileToECPriv(
|
|
|
|
filename string, p *chaincfg.Params) (*hdkeychain.ExtendedKey, error) {
|
2016-01-21 08:08:05 +03:00
|
|
|
key32 := new([32]byte)
|
|
|
|
_, err := os.Stat(filename)
|
|
|
|
if err != nil {
|
|
|
|
if os.IsNotExist(err) {
|
|
|
|
// no key found, generate and save one
|
|
|
|
fmt.Printf("No file %s, generating.\n", filename)
|
|
|
|
rn, err := hdkeychain.GenerateSeed(32)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
copy(key32[:], rn[:])
|
|
|
|
err = SaveKeyToFileInteractive(filename, key32)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
// unknown error, crash
|
|
|
|
fmt.Printf("unknown\n")
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
key, err := LoadKeyFromFileInteractive(filename)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2016-01-21 08:27:58 +03:00
|
|
|
rootpriv, err := hdkeychain.NewMaster(key[:], p)
|
2016-01-21 08:08:05 +03:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return rootpriv, nil
|
|
|
|
}
|