General structure
The general structure of commands and responses is as follows:
Commands
Field | Type | Content | Note |
---|
CLA | byte (1) | Application Identifier | 0x57 |
INS | byte (1) | Instruction ID | |
P1 | byte (1) | Parameter 1 | |
P2 | byte (1) | Parameter 2 | |
L | byte (1) | Bytes in payload | |
PAYLOAD | byte (L) | Payload | |
Response
Field | Type | Content | Note |
---|
ANSWER | byte (?) | Answer | depends on the command |
SW1-SW2 | byte (2) | Return code | see list of return codes |
Return codes
Return code | Description |
---|
0x6400 | Execution Error |
0x6700 | Wrong buffer length |
0x6982 | Empty buffer |
0x6983 | Output buffer too small |
0x6984 | Data is invalid |
0x6986 | Command not allowed |
0x6987 | Tx is not initialized |
0x6B00 | P1/P2 are invalid |
0x6D00 | INS not supported |
0x6E00 | CLA not supported |
0x6F00 | Unknown |
0x6F01 | Sign / verify error |
0x9000 | Success |
GET_DEVICE_INFO
Command
Field | Type | Content | Expected |
---|
CLA | byte (1) | Application Identifier | 0xE0 |
INS | byte (1) | Instruction ID | 0x01 |
P1 | byte (1) | Parameter 1 | 0x00 |
P2 | byte (1) | Parameter 2 | 0x00 |
L | byte (1) | Bytes in payload | 0x00 |
Response
Field | Type | Content | Note |
---|
TARGET_ID | byte (4) | Target Id | |
OS_LEN | byte (1) | OS version length | 0..64 |
OS | byte (?) | OS version | Non terminated string |
FLAGS_LEN | byte (1) | Flags length | 0 |
MCU_LEN | byte (1) | MCU version length | 0..64 |
MCU | byte (?) | MCU version | Non terminated string |
SW1-SW2 | byte (2) | Return code | see list of return codes |
GET_VERSION
Command
Field | Type | Content | Expected |
---|
CLA | byte (1) | Application Identifier | 0x57 |
INS | byte (1) | Instruction ID | 0x00 |
P1 | byte (1) | Parameter 1 | ignored |
P2 | byte (1) | Parameter 2 | ignored |
L | byte (1) | Bytes in payload | 0 |
Response
Field | Type | Content | Note |
---|
TEST | byte (1) | Test Mode | 0x01 means test mode is enabled |
MAJOR | byte (2) | Version Major | 0..65535 |
MINOR | byte (2) | Version Minor | 0..65535 |
PATCH | byte (2) | Version Patch | 0..65535 |
LOCKED | byte (1) | Device is locked | It'll always be 0 |
TARGET_ID | byte (4) | Target Id | |
SW1-SW2 | byte (2) | Return code | see list of return codes |
INS_GET_ADDR
Gets the ED25519 public key and corresponding address
Command
Field | Type | Content | Expected |
---|
CLA | byte (1) | Application Identifier | 0x57 |
INS | byte (1) | Instruction ID | 0x01 |
P1 | byte (1) | Request User confirmation | No = 0 |
P2 | byte (1) | Parameter ignored | |
L | byte (1) | Bytes in payload | 21 bytes |
PathLength | byte (1) | Path length | 5 |
Path[0] | byte (4) | Derivation Path Data | 0x80000000 | 44 |
Path[1] | byte (4) | Derivation Path Data | 0x80000000 | 877* |
Path[2] | byte (4) | Derivation Path Data | ? |
Path[3] | byte (4) | Derivation Path Data | ? |
Path[4] | byte (4) | Derivation Path Data | ? |
*Use 877 for Mainnet and 1 for Testnet
Response
Field | Type | Content | Note |
---|
PK | byte (32) | Public Key | |
Field | Type | Content | Note |
---|
Raw Pubkey | byte (33) | Public key | prefix* + pubkey (32) |
Encoded Pubkey | byte (?) | Encoded pubkey | |
ADDR | byte (45) | Address | |
SW1-SW2 | byte (2) | Return code | see list of return codes |
*prefix is ED25519: 0 | SECP256K1: 1
INS_SIGN
Sign transaction with Ed25519
Command
Field | Type | Content | Expected |
---|
CLA | byte (1) | Application Identifier | 0x57 |
INS | byte (1) | Instruction ID | 0x02 |
P1 | byte (1) | Payload desc | 0 = init |
| | | 1 = add |
| | | 2 = last |
P2 | byte (1) | ---- | not used |
L | byte (1) | Bytes in payload | (depends) |
The first packet/chunk includes the derivation path and size for Code and Data fields
All other packets/chunks contain data chunks that are described below
First Packet
Field | Type | Content | Expected |
---|
PathLength | byte (1) | Path length | 5 |
Path[0] | byte (4) | Derivation Path Data | 0x80000000 | 44 |
Path[1] | byte (4) | Derivation Path Data | 0x80000000 | 877* |
Path[2] | byte (4) | Derivation Path Data | ? |
Path[3] | byte (4) | Derivation Path Data | ? |
Path[4] | byte (4) | Derivation Path Data | ? |
*Use 877 for Mainnet and 1 for Testnet
Other Chunks/Packets
Field | Type | Content | Expected |
---|
Message | bytes... | Message to Sign | |
Response
Field | Type | Content | Note |
---|
Pubkey | byte (33) | Public key | prefix* + pubkey (32) |
RawSalt | byte (8) | raw salt | |
RawSignature | byte (65) | Raw signature | prefix* + signature(64) |
WrapperSalt | byte (8) | raw salt | |
WrapperSignature | byte (65) | Raw signature | prefix* + signature(64) |
RawIndices | variable | indices for verify raw signature | |
WrapperIndices | variable | indices for verify wrapper signature | |
SW1-SW2 | byte (2) | Return code | see list of return codes |
*prefix is ED25519: 0 | SECP256K1: 1
MASP Transaction Instructions
INS_GET_KEYS
Gets the view key, ivk, ovk, dk for the given address.
Field | Type | Content | Expected |
---|
CLA | byte (1) | Application Identifier | 0x57 |
INS | byte (1) | Instruction ID | 0x03 |
P1 | byte (1) | Request User confirmation | No = 0 |
P2 | byte (1) | Keys to retreive | 0x0 - public address, 0x1 - view key, 0x2 - proof generation key |
L | byte (1) | Bytes in payload | 21 bytes |
PathLength | byte (1) | Path length | 5 |
Path[0] | byte (4) | Derivation Path Data | 0x80000000 | 44 |
Path[1] | byte (4) | Derivation Path Data | 0x80000000 | 877 |
Path[2] | byte (4) | Derivation Path Data | ? |
Path[3] | byte (4) | Derivation Path Data | ? |
Path[4] | byte (4) | Derivation Path Data | ? |
Response
Public Address (P2=0)
Field | Type | Content | Note |
---|
Address | byte (32) | Address | |
SW1-SW2 | byte (2) | Return code | see list of return codes |
View Key (P2=1)
Field | Type | Content | Note |
---|
ViewKey | byte (64) | View key | |
OVK | byte (32) | OVK | |
IVK | byte (32) | IVK | |
DK | byte (32) | DK | |
SW1-SW2 | byte (2) | Return code | see list of return codes |
Proof Generation Key (P2=2)
Field | Type | Content | Note |
---|
AK | byte (32) | AK | |
NSK | byte (32) | NSK | |
SW1-SW2 | byte (2) | Return code | see list of return codes |
*prefix is ED25519: 0 | SECP256K1: 1
INS_GET_SPEND_RAND
Get spend randomness values to be used in transation creation.
Command
Field | Type | Content | Expected |
---|
CLA | byte (1) | Application Identifier | 0x57 |
INS | byte (1) | Instruction ID | 0x04 |
P1 | byte (1) | Request User confirmation | No = 0 |
P2 | byte (1) | Parameter ignored | |
L | byte (1) | Bytes in payload | 0 bytes |
Response
Field | Type | Content | Note |
---|
Rcv | byte (32) | Rcv | |
Alpha | byte (32) | Alpha | |
SW1-SW2 | byte (2) | Return code | see list of return codes |
INS_GET_OUTPUT_RAND
Get output randomness values to be used in transation creation.
Command
Field | Type | Content | Expected |
---|
CLA | byte (1) | Application Identifier | 0x57 |
INS | byte (1) | Instruction ID | 0x05 |
P1 | byte (1) | Request User confirmation | No = 0 |
P2 | byte (1) | Parameter ignored | |
L | byte (1) | Bytes in payload | 0 bytes |
Response
Field | Type | Content | Note |
---|
Rcv | byte (32) | Rcv | |
Rcm | byte (32) | Rcm | |
SW1-SW2 | byte (2) | Return code | see list of return codes |
INS_GET_CONVERT_RAND
Get convert randomness values to be used in transation creation.
Command
Field | Type | Content | Expected |
---|
CLA | byte (1) | Application Identifier | 0x57 |
INS | byte (1) | Instruction ID | 0x06 |
P1 | byte (1) | Request User confirmation | No = 0 |
P2 | byte (1) | Parameter ignored | |
L | byte (1) | Bytes in payload | 0 bytes |
Response
Field | Type | Content | Note |
---|
Rcv | byte (32) | Rcv | |
SW1-SW2 | byte (2) | Return code | see list of return codes |
INS_SIGN_MASP_SPENDS
Sign MASP spends.
Command
Field | Type | Content | Expected |
---|
CLA | byte (1) | Application Identifier | 0x57 |
INS | byte (1) | Instruction ID | 0x07 |
P1 | byte (1) | Payload desc | 0 = init |
| | | 1 = add |
| | | 2 = last |
P2 | byte (1) | ---- | not used |
L | byte (1) | Bytes in payload | (depends) |
The first packet/chunk includes the derivation path and size for Code and Data fields
All other packets/chunks contain data chunks that are described below
First Packet
Field | Type | Content | Expected |
---|
PathLength | byte (1) | Path length | 5 |
Path[0] | byte (4) | Derivation Path Data | 0x80000000 | 44 |
Path[1] | byte (4) | Derivation Path Data | 0x80000000 | 877 |
Path[2] | byte (4) | Derivation Path Data | ? |
Path[3] | byte (4) | Derivation Path Data | ? |
Path[4] | byte (4) | Derivation Path Data | ? |
Other Chunks/Packets
Field | Type | Content | Expected |
---|
Message | bytes... | Message to Sign | |
Response
Field | Type | Content | Note |
---|
hash | byte (32) | transaction hash | |
SW1-SW2 | byte (2) | Return code | see list of return codes |
Extract the spend signatures computed in INS_SIGN_MASP_SPENDS.
Command
Field | Type | Content | Expected |
---|
CLA | byte (1) | Application Identifier | 0x57 |
INS | byte (1) | Instruction ID | 0x08 |
P1 | byte (1) | Parameter ignored | |
P2 | byte (1) | Parameter ignored | |
L | byte (1) | Bytes in payload | 0 bytes |
Response
Field | Type | Content | Note |
---|
rbar | byte (32) | rbar | |
sbar | byte (32) | sbar | |
SW1-SW2 | byte (2) | Return code | see list of return codes |
INS_CLEAN_RANDOMNESS_BUFFERS
Clean the randomness buffers.
Command
Field | Type | Content | Expected |
---|
CLA | byte (1) | Application Identifier | 0x57 |
INS | byte (1) | Instruction ID | 0x09 |
P1 | byte (1) | Parameter ignored | No = 0 |
P2 | byte (1) | Parameter ignored | |
L | byte (1) | Bytes in payload | 0 bytes |
Response
Field | Type | Content | Note |
---|
SW1-SW2 | byte (2) | Return code | see list of return codes |