2016-11-25 21:53:55 +00:00
|
|
|
# This file is part of the TREZOR project.
|
|
|
|
#
|
|
|
|
# Copyright (C) 2012-2016 Marek Palatinus <slush@satoshilabs.com>
|
|
|
|
# Copyright (C) 2012-2016 Pavol Rusnak <stick@satoshilabs.com>
|
|
|
|
# Copyright (C) 2016 Jochen Hoenicke <hoenicke@gmail.com>
|
|
|
|
#
|
|
|
|
# This library is free software: you can redistribute it and/or modify
|
|
|
|
# it under the terms of the GNU Lesser General Public License as published by
|
|
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
|
|
# (at your option) any later version.
|
|
|
|
#
|
|
|
|
# This library is distributed in the hope that it will be useful,
|
|
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
# GNU Lesser General Public License for more details.
|
|
|
|
#
|
|
|
|
# You should have received a copy of the GNU Lesser General Public License
|
|
|
|
# along with this library. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
2016-09-27 20:49:51 +00:00
|
|
|
from __future__ import print_function, absolute_import
|
2016-05-20 20:27:20 +00:00
|
|
|
|
2013-09-13 03:31:24 +00:00
|
|
|
import os
|
2014-06-12 11:26:24 +00:00
|
|
|
import sys
|
2014-04-09 19:42:30 +00:00
|
|
|
import time
|
2014-01-06 00:54:53 +00:00
|
|
|
import binascii
|
2014-01-08 14:59:18 +00:00
|
|
|
import hashlib
|
2014-02-21 01:30:10 +00:00
|
|
|
import unicodedata
|
2017-07-01 13:43:33 +00:00
|
|
|
import json
|
2014-11-07 00:09:53 +00:00
|
|
|
import getpass
|
2013-09-13 03:31:24 +00:00
|
|
|
|
2014-02-21 00:48:11 +00:00
|
|
|
from mnemonic import Mnemonic
|
2013-09-13 03:31:24 +00:00
|
|
|
|
2016-05-05 02:57:14 +00:00
|
|
|
from . import tools
|
2017-06-23 19:31:42 +00:00
|
|
|
# from . import mapping
|
2016-05-05 02:57:14 +00:00
|
|
|
from . import messages_pb2 as proto
|
|
|
|
from . import types_pb2 as types
|
2017-09-15 15:05:47 +00:00
|
|
|
from .coins import coins_slip44
|
2016-05-05 02:57:14 +00:00
|
|
|
from .debuglink import DebugLink
|
|
|
|
|
2017-06-23 19:31:42 +00:00
|
|
|
# Python2 vs Python3
|
|
|
|
try:
|
|
|
|
input = raw_input
|
|
|
|
except NameError:
|
|
|
|
pass
|
|
|
|
|
|
|
|
|
2014-11-07 00:58:20 +00:00
|
|
|
# try:
|
|
|
|
# from PIL import Image
|
|
|
|
# SCREENSHOT = True
|
|
|
|
# except:
|
|
|
|
# SCREENSHOT = False
|
|
|
|
|
|
|
|
SCREENSHOT = False
|
|
|
|
|
2015-06-23 14:26:31 +00:00
|
|
|
DEFAULT_CURVE = 'secp256k1'
|
|
|
|
|
2014-02-01 10:29:44 +00:00
|
|
|
# monkeypatching: text formatting of protobuf messages
|
|
|
|
tools.monkeypatch_google_protobuf_text_format()
|
2014-01-31 20:21:19 +00:00
|
|
|
|
2016-06-29 20:40:37 +00:00
|
|
|
|
|
|
|
def getch():
|
|
|
|
try:
|
|
|
|
import termios
|
|
|
|
except ImportError:
|
|
|
|
# Non-POSIX. Return msvcrt's (Windows') getch.
|
|
|
|
import msvcrt
|
|
|
|
return msvcrt.getch()
|
|
|
|
|
|
|
|
# POSIX system. Create and return a getch that manipulates the tty.
|
2017-06-23 19:31:42 +00:00
|
|
|
import sys
|
|
|
|
import tty
|
|
|
|
|
2016-06-29 20:40:37 +00:00
|
|
|
def _getch():
|
|
|
|
fd = sys.stdin.fileno()
|
|
|
|
old_settings = termios.tcgetattr(fd)
|
|
|
|
try:
|
|
|
|
tty.setraw(fd)
|
|
|
|
ch = sys.stdin.read(1)
|
|
|
|
finally:
|
|
|
|
termios.tcsetattr(fd, termios.TCSADRAIN, old_settings)
|
|
|
|
return ch
|
|
|
|
|
|
|
|
return _getch()
|
|
|
|
|
2017-06-23 19:31:42 +00:00
|
|
|
|
2014-02-13 15:46:21 +00:00
|
|
|
def get_buttonrequest_value(code):
|
|
|
|
# Converts integer code to its string representation of ButtonRequestType
|
2017-06-23 19:31:42 +00:00
|
|
|
return [k for k, v in types.ButtonRequestType.items() if v == code][0]
|
|
|
|
|
2014-02-02 17:27:44 +00:00
|
|
|
|
2014-02-13 16:20:40 +00:00
|
|
|
def pprint(msg):
|
2014-06-27 15:02:44 +00:00
|
|
|
msg_class = msg.__class__.__name__
|
|
|
|
msg_size = msg.ByteSize()
|
|
|
|
"""
|
|
|
|
msg_ser = msg.SerializeToString()
|
|
|
|
msg_id = mapping.get_type(msg)
|
2017-07-10 13:36:44 +00:00
|
|
|
msg_json = json_format.MessageToDict(msg, preserving_proto_field_name=True)
|
2014-06-27 15:02:44 +00:00
|
|
|
"""
|
2017-07-10 15:40:13 +00:00
|
|
|
if isinstance(msg, proto.FirmwareUpload) or isinstance(msg, proto.SelfTest):
|
2014-06-27 15:02:44 +00:00
|
|
|
return "<%s> (%d bytes):\n" % (msg_class, msg_size)
|
2014-02-21 18:13:14 +00:00
|
|
|
else:
|
2016-05-20 11:55:43 +00:00
|
|
|
return "<%s> (%d bytes):\n%s" % (msg_class, msg_size, msg)
|
2014-02-13 16:20:40 +00:00
|
|
|
|
2017-06-23 19:31:42 +00:00
|
|
|
|
2014-06-12 11:26:24 +00:00
|
|
|
def log(msg):
|
2017-06-20 14:36:40 +00:00
|
|
|
sys.stderr.write(str(msg))
|
2017-06-05 19:28:41 +00:00
|
|
|
sys.stderr.write('\n')
|
2014-06-12 11:26:24 +00:00
|
|
|
sys.stderr.flush()
|
|
|
|
|
2017-06-23 19:31:42 +00:00
|
|
|
|
2013-09-13 03:31:24 +00:00
|
|
|
class CallException(Exception):
|
2014-02-08 23:12:22 +00:00
|
|
|
def __init__(self, code, message):
|
|
|
|
super(CallException, self).__init__()
|
|
|
|
self.args = [code, message]
|
2013-09-13 03:31:24 +00:00
|
|
|
|
2017-06-23 19:31:42 +00:00
|
|
|
|
2013-09-13 03:31:24 +00:00
|
|
|
class PinException(CallException):
|
|
|
|
pass
|
|
|
|
|
2017-06-23 19:31:42 +00:00
|
|
|
|
2014-02-13 15:46:21 +00:00
|
|
|
class field(object):
|
|
|
|
# Decorator extracts single value from
|
|
|
|
# protobuf object. If the field is not
|
|
|
|
# present, raises an exception.
|
|
|
|
def __init__(self, field):
|
|
|
|
self.field = field
|
|
|
|
|
|
|
|
def __call__(self, f):
|
|
|
|
def wrapped_f(*args, **kwargs):
|
|
|
|
ret = f(*args, **kwargs)
|
|
|
|
ret.HasField(self.field)
|
|
|
|
return getattr(ret, self.field)
|
|
|
|
return wrapped_f
|
|
|
|
|
2017-06-23 19:31:42 +00:00
|
|
|
|
2014-02-13 15:46:21 +00:00
|
|
|
class expect(object):
|
|
|
|
# Decorator checks if the method
|
|
|
|
# returned one of expected protobuf messages
|
|
|
|
# or raises an exception
|
|
|
|
def __init__(self, *expected):
|
|
|
|
self.expected = expected
|
2016-01-12 23:17:38 +00:00
|
|
|
|
2014-02-13 15:46:21 +00:00
|
|
|
def __call__(self, f):
|
|
|
|
def wrapped_f(*args, **kwargs):
|
|
|
|
ret = f(*args, **kwargs)
|
|
|
|
if not isinstance(ret, self.expected):
|
2017-11-06 10:09:54 +00:00
|
|
|
raise RuntimeError("Got %s, expected %s" % (ret.__class__, self.expected))
|
2014-02-13 15:46:21 +00:00
|
|
|
return ret
|
|
|
|
return wrapped_f
|
|
|
|
|
2017-06-23 19:31:42 +00:00
|
|
|
|
2016-09-13 10:25:06 +00:00
|
|
|
def session(f):
|
|
|
|
# Decorator wraps a BaseClient method
|
|
|
|
# with session activation / deactivation
|
|
|
|
def wrapped_f(*args, **kwargs):
|
|
|
|
client = args[0]
|
2017-09-04 11:36:08 +00:00
|
|
|
client.transport.session_begin()
|
2016-09-13 10:25:06 +00:00
|
|
|
try:
|
|
|
|
return f(*args, **kwargs)
|
|
|
|
finally:
|
2017-09-04 11:36:08 +00:00
|
|
|
client.transport.session_end()
|
2016-09-13 10:25:06 +00:00
|
|
|
return wrapped_f
|
|
|
|
|
2017-06-23 19:31:42 +00:00
|
|
|
|
2014-02-21 01:30:10 +00:00
|
|
|
def normalize_nfc(txt):
|
2016-05-20 17:18:33 +00:00
|
|
|
if sys.version_info[0] < 3:
|
|
|
|
if isinstance(txt, unicode):
|
2016-06-26 16:44:24 +00:00
|
|
|
return unicodedata.normalize('NFC', txt)
|
2016-05-20 17:18:33 +00:00
|
|
|
if isinstance(txt, str):
|
2016-06-26 16:44:24 +00:00
|
|
|
return unicodedata.normalize('NFC', txt.decode('utf-8'))
|
2014-02-21 01:30:10 +00:00
|
|
|
else:
|
2016-05-20 17:18:33 +00:00
|
|
|
if isinstance(txt, bytes):
|
2016-06-26 16:44:24 +00:00
|
|
|
return unicodedata.normalize('NFC', txt.decode('utf-8'))
|
2016-05-20 17:18:33 +00:00
|
|
|
if isinstance(txt, str):
|
2016-06-26 16:44:24 +00:00
|
|
|
return unicodedata.normalize('NFC', txt)
|
2017-11-06 10:09:54 +00:00
|
|
|
raise ValueError('unicode/str or bytes/str expected')
|
2014-02-21 01:30:10 +00:00
|
|
|
|
2017-06-23 19:31:42 +00:00
|
|
|
|
2014-02-13 15:46:21 +00:00
|
|
|
class BaseClient(object):
|
|
|
|
# Implements very basic layer of sending raw protobuf
|
|
|
|
# messages to device and getting its response back.
|
2017-09-04 11:36:08 +00:00
|
|
|
def __init__(self, transport, **kwargs):
|
|
|
|
self.transport = transport
|
2014-02-13 16:20:40 +00:00
|
|
|
super(BaseClient, self).__init__() # *args, **kwargs)
|
2013-12-30 22:35:20 +00:00
|
|
|
|
2017-09-04 09:30:34 +00:00
|
|
|
def close(self):
|
|
|
|
pass
|
|
|
|
|
2016-02-10 15:46:58 +00:00
|
|
|
def cancel(self):
|
2017-09-04 11:36:08 +00:00
|
|
|
self.transport.write(proto.Cancel())
|
2016-02-10 15:46:58 +00:00
|
|
|
|
2016-09-13 10:25:06 +00:00
|
|
|
@session
|
2014-02-15 19:30:39 +00:00
|
|
|
def call_raw(self, msg):
|
2017-09-04 11:36:08 +00:00
|
|
|
self.transport.write(msg)
|
|
|
|
return self.transport.read()
|
2014-02-15 19:30:39 +00:00
|
|
|
|
2016-09-13 10:25:06 +00:00
|
|
|
@session
|
2014-02-15 19:30:39 +00:00
|
|
|
def call(self, msg):
|
2016-09-13 10:25:06 +00:00
|
|
|
resp = self.call_raw(msg)
|
|
|
|
handler_name = "callback_%s" % resp.__class__.__name__
|
|
|
|
handler = getattr(self, handler_name, None)
|
2014-01-13 03:44:57 +00:00
|
|
|
|
2017-06-23 19:31:42 +00:00
|
|
|
if handler is not None:
|
2016-09-13 10:25:06 +00:00
|
|
|
msg = handler(resp)
|
2017-06-23 19:31:42 +00:00
|
|
|
if msg is None:
|
2017-11-06 10:09:54 +00:00
|
|
|
raise ValueError("Callback %s must return protobuf message, not None" % handler)
|
2016-09-13 10:25:06 +00:00
|
|
|
resp = self.call(msg)
|
2014-02-13 15:46:21 +00:00
|
|
|
|
|
|
|
return resp
|
|
|
|
|
|
|
|
def callback_Failure(self, msg):
|
|
|
|
if msg.code in (types.Failure_PinInvalid,
|
2017-06-23 19:31:42 +00:00
|
|
|
types.Failure_PinCancelled, types.Failure_PinExpected):
|
2014-02-13 15:46:21 +00:00
|
|
|
raise PinException(msg.code, msg.message)
|
|
|
|
|
|
|
|
raise CallException(msg.code, msg.message)
|
|
|
|
|
2017-06-23 19:31:42 +00:00
|
|
|
|
2017-07-01 15:59:11 +00:00
|
|
|
class VerboseWireMixin(object):
|
2014-02-20 15:09:58 +00:00
|
|
|
def call_raw(self, msg):
|
2014-06-12 11:26:24 +00:00
|
|
|
log("SENDING " + pprint(msg))
|
2017-07-01 15:59:11 +00:00
|
|
|
resp = super(VerboseWireMixin, self).call_raw(msg)
|
2014-06-16 15:16:15 +00:00
|
|
|
log("RECEIVED " + pprint(resp))
|
2014-02-20 15:09:58 +00:00
|
|
|
return resp
|
|
|
|
|
2017-06-23 19:31:42 +00:00
|
|
|
|
2014-02-13 15:46:21 +00:00
|
|
|
class TextUIMixin(object):
|
|
|
|
# This class demonstrates easy test-based UI
|
|
|
|
# integration between the device and wallet.
|
|
|
|
# You can implement similar functionality
|
|
|
|
# by implementing your own GuiMixin with
|
|
|
|
# graphical widgets for every type of these callbacks.
|
|
|
|
|
2014-02-13 16:20:40 +00:00
|
|
|
def __init__(self, *args, **kwargs):
|
|
|
|
super(TextUIMixin, self).__init__(*args, **kwargs)
|
|
|
|
|
2014-02-13 15:46:21 +00:00
|
|
|
def callback_ButtonRequest(self, msg):
|
2014-06-12 15:22:22 +00:00
|
|
|
# log("Sending ButtonAck for %s " % get_buttonrequest_value(msg.code))
|
2014-02-13 15:46:21 +00:00
|
|
|
return proto.ButtonAck()
|
|
|
|
|
2016-06-29 20:40:37 +00:00
|
|
|
def callback_RecoveryMatrix(self, msg):
|
|
|
|
if self.recovery_matrix_first_pass:
|
|
|
|
self.recovery_matrix_first_pass = False
|
2017-09-13 08:13:21 +00:00
|
|
|
log("Use the numeric keypad to describe positions. For the word list use only left and right keys.")
|
|
|
|
log("Use backspace to correct an entry. The keypad layout is:")
|
2016-06-29 20:40:37 +00:00
|
|
|
log(" 7 8 9 7 | 9")
|
|
|
|
log(" 4 5 6 4 | 6")
|
|
|
|
log(" 1 2 3 1 | 3")
|
|
|
|
while True:
|
|
|
|
character = getch()
|
|
|
|
if character in ('\x03', '\x04'):
|
|
|
|
return proto.Cancel()
|
|
|
|
|
|
|
|
if character in ('\x08', '\x7f'):
|
|
|
|
return proto.WordAck(word='\x08')
|
|
|
|
|
|
|
|
# ignore middle column if only 6 keys requested.
|
2017-07-31 11:35:31 +00:00
|
|
|
if msg.type == types.WordRequestType_Matrix6 and character in ('2', '5', '8'):
|
2016-06-29 20:40:37 +00:00
|
|
|
continue
|
|
|
|
|
2017-07-31 11:35:31 +00:00
|
|
|
if character.isdigit():
|
2016-06-29 20:40:37 +00:00
|
|
|
return proto.WordAck(word=character)
|
|
|
|
|
2014-02-13 15:46:21 +00:00
|
|
|
def callback_PinMatrixRequest(self, msg):
|
2017-07-31 11:35:31 +00:00
|
|
|
if msg.type == types.PinMatrixRequestType_Current:
|
2015-02-28 13:06:23 +00:00
|
|
|
desc = 'current PIN'
|
2017-07-31 11:35:31 +00:00
|
|
|
elif msg.type == types.PinMatrixRequestType_NewFirst:
|
2014-04-02 18:06:54 +00:00
|
|
|
desc = 'new PIN'
|
2017-07-31 11:35:31 +00:00
|
|
|
elif msg.type == types.PinMatrixRequestType_NewSecond:
|
2014-04-02 18:06:54 +00:00
|
|
|
desc = 'new PIN again'
|
2014-03-28 15:26:48 +00:00
|
|
|
else:
|
2014-04-02 18:06:54 +00:00
|
|
|
desc = 'PIN'
|
2014-06-12 15:22:22 +00:00
|
|
|
|
2015-08-21 13:16:27 +00:00
|
|
|
log("Use the numeric keypad to describe number positions. The layout is:")
|
|
|
|
log(" 7 8 9")
|
|
|
|
log(" 4 5 6")
|
|
|
|
log(" 1 2 3")
|
2014-06-12 15:22:22 +00:00
|
|
|
log("Please enter %s: " % desc)
|
2014-11-07 00:09:53 +00:00
|
|
|
pin = getpass.getpass('')
|
2017-11-28 18:59:06 +00:00
|
|
|
if not pin.isdigit():
|
|
|
|
raise ValueError('Non-numerical PIN provided')
|
2014-02-13 15:46:21 +00:00
|
|
|
return proto.PinMatrixAck(pin=pin)
|
|
|
|
|
|
|
|
def callback_PassphraseRequest(self, msg):
|
2014-06-12 15:22:22 +00:00
|
|
|
log("Passphrase required: ")
|
2014-11-07 00:09:53 +00:00
|
|
|
passphrase = getpass.getpass('')
|
|
|
|
log("Confirm your Passphrase: ")
|
2014-11-23 12:28:09 +00:00
|
|
|
if passphrase == getpass.getpass(''):
|
2017-11-13 21:13:11 +00:00
|
|
|
passphrase = Mnemonic.normalize_string(passphrase)
|
2014-11-07 00:09:53 +00:00
|
|
|
return proto.PassphraseAck(passphrase=passphrase)
|
|
|
|
else:
|
|
|
|
log("Passphrase did not match! ")
|
|
|
|
exit()
|
2014-02-13 15:46:21 +00:00
|
|
|
|
|
|
|
def callback_WordRequest(self, msg):
|
2016-06-29 20:40:37 +00:00
|
|
|
if msg.type in (types.WordRequestType_Matrix9,
|
|
|
|
types.WordRequestType_Matrix6):
|
|
|
|
return self.callback_RecoveryMatrix(msg)
|
2014-06-12 15:22:22 +00:00
|
|
|
log("Enter one word of mnemonic: ")
|
2017-06-23 19:31:42 +00:00
|
|
|
word = input()
|
2017-02-11 19:15:09 +00:00
|
|
|
if self.expand:
|
|
|
|
word = self.mnemonic_wordlist.expand_word(word)
|
2014-02-13 15:46:21 +00:00
|
|
|
return proto.WordAck(word=word)
|
2014-02-21 06:28:10 +00:00
|
|
|
|
2017-06-23 19:31:42 +00:00
|
|
|
|
2014-02-13 15:46:21 +00:00
|
|
|
class DebugLinkMixin(object):
|
|
|
|
# This class implements automatic responses
|
|
|
|
# and other functionality for unit tests
|
|
|
|
# for various callbacks, created in order
|
|
|
|
# to automatically pass unit tests.
|
|
|
|
#
|
|
|
|
# This mixing should be used only for purposes
|
|
|
|
# of unit testing, because it will fail to work
|
|
|
|
# without special DebugLink interface provided
|
|
|
|
# by the device.
|
|
|
|
|
|
|
|
def __init__(self, *args, **kwargs):
|
|
|
|
super(DebugLinkMixin, self).__init__(*args, **kwargs)
|
|
|
|
self.debug = None
|
2014-02-21 06:28:10 +00:00
|
|
|
self.in_with_statement = 0
|
2014-12-10 14:26:18 +00:00
|
|
|
self.button_wait = 0
|
2014-11-07 00:58:20 +00:00
|
|
|
self.screenshot_id = 0
|
2014-02-13 15:46:21 +00:00
|
|
|
|
|
|
|
# Always press Yes and provide correct pin
|
|
|
|
self.setup_debuglink(True, True)
|
2016-01-12 23:17:38 +00:00
|
|
|
|
2014-02-15 19:30:39 +00:00
|
|
|
# Do not expect any specific response from device
|
2014-02-21 06:28:10 +00:00
|
|
|
self.expected_responses = None
|
2014-02-15 19:30:39 +00:00
|
|
|
|
|
|
|
# Use blank passphrase
|
|
|
|
self.set_passphrase('')
|
2014-02-13 15:46:21 +00:00
|
|
|
|
|
|
|
def close(self):
|
|
|
|
super(DebugLinkMixin, self).close()
|
|
|
|
if self.debug:
|
|
|
|
self.debug.close()
|
|
|
|
|
|
|
|
def set_debuglink(self, debug_transport):
|
|
|
|
self.debug = DebugLink(debug_transport)
|
|
|
|
|
2014-12-10 14:26:18 +00:00
|
|
|
def set_buttonwait(self, secs):
|
|
|
|
self.button_wait = secs
|
|
|
|
|
2014-02-21 06:28:10 +00:00
|
|
|
def __enter__(self):
|
|
|
|
# For usage in with/expected_responses
|
|
|
|
self.in_with_statement += 1
|
|
|
|
return self
|
|
|
|
|
2014-02-21 20:00:56 +00:00
|
|
|
def __exit__(self, _type, value, traceback):
|
2014-02-21 06:28:10 +00:00
|
|
|
self.in_with_statement -= 1
|
|
|
|
|
2017-06-23 19:31:42 +00:00
|
|
|
if _type is not None:
|
2014-02-21 20:00:56 +00:00
|
|
|
# Another exception raised
|
|
|
|
return False
|
|
|
|
|
|
|
|
# return isinstance(value, TypeError)
|
2014-02-21 06:28:10 +00:00
|
|
|
# Evaluate missed responses in 'with' statement
|
2017-06-23 19:31:42 +00:00
|
|
|
if self.expected_responses is not None and len(self.expected_responses):
|
2017-11-06 10:09:54 +00:00
|
|
|
raise RuntimeError("Some of expected responses didn't come from device: %s" %
|
2017-11-08 20:25:15 +00:00
|
|
|
[pprint(x) for x in self.expected_responses])
|
2014-02-21 06:28:10 +00:00
|
|
|
|
|
|
|
# Cleanup
|
|
|
|
self.expected_responses = None
|
|
|
|
return False
|
|
|
|
|
2014-02-15 19:30:39 +00:00
|
|
|
def set_expected_responses(self, expected):
|
2014-02-21 06:28:10 +00:00
|
|
|
if not self.in_with_statement:
|
2017-11-06 10:09:54 +00:00
|
|
|
raise RuntimeError("Must be called inside 'with' statement")
|
2014-02-15 19:30:39 +00:00
|
|
|
self.expected_responses = expected
|
2014-02-13 15:46:21 +00:00
|
|
|
|
|
|
|
def setup_debuglink(self, button, pin_correct):
|
|
|
|
self.button = button # True -> YES button, False -> NO button
|
|
|
|
self.pin_correct = pin_correct
|
2014-02-13 16:20:40 +00:00
|
|
|
|
2014-02-15 19:30:39 +00:00
|
|
|
def set_passphrase(self, passphrase):
|
2017-11-13 21:13:11 +00:00
|
|
|
self.passphrase = Mnemonic.normalize_string(passphrase)
|
2014-02-21 20:00:56 +00:00
|
|
|
|
|
|
|
def set_mnemonic(self, mnemonic):
|
2017-11-13 21:13:11 +00:00
|
|
|
self.mnemonic = Mnemonic.normalize_string(mnemonic).split(' ')
|
2014-02-15 19:30:39 +00:00
|
|
|
|
|
|
|
def call_raw(self, msg):
|
2014-11-07 00:58:20 +00:00
|
|
|
|
|
|
|
if SCREENSHOT and self.debug:
|
|
|
|
layout = self.debug.read_layout()
|
|
|
|
im = Image.new("RGB", (128, 64))
|
|
|
|
pix = im.load()
|
|
|
|
for x in range(128):
|
|
|
|
for y in range(64):
|
|
|
|
rx, ry = 127 - x, 63 - y
|
|
|
|
if (ord(layout[rx + (ry / 8) * 128]) & (1 << (ry % 8))) > 0:
|
|
|
|
pix[x, y] = (255, 255, 255)
|
|
|
|
im.save('scr%05d.png' % self.screenshot_id)
|
|
|
|
self.screenshot_id += 1
|
|
|
|
|
2014-02-15 19:30:39 +00:00
|
|
|
resp = super(DebugLinkMixin, self).call_raw(msg)
|
|
|
|
self._check_request(resp)
|
|
|
|
return resp
|
2016-01-12 23:17:38 +00:00
|
|
|
|
2014-02-15 19:30:39 +00:00
|
|
|
def _check_request(self, msg):
|
2017-06-23 19:31:42 +00:00
|
|
|
if self.expected_responses is not None:
|
2014-02-13 15:46:21 +00:00
|
|
|
try:
|
2014-02-15 19:30:39 +00:00
|
|
|
expected = self.expected_responses.pop(0)
|
2014-02-13 15:46:21 +00:00
|
|
|
except IndexError:
|
2017-06-18 21:14:28 +00:00
|
|
|
raise CallException(types.Failure_UnexpectedMessage,
|
2017-06-23 19:31:42 +00:00
|
|
|
"Got %s, but no message has been expected" % pprint(msg))
|
2014-02-13 15:46:21 +00:00
|
|
|
|
2014-02-15 19:30:39 +00:00
|
|
|
if msg.__class__ != expected.__class__:
|
2017-06-18 21:14:28 +00:00
|
|
|
raise CallException(types.Failure_UnexpectedMessage,
|
2017-06-23 19:31:42 +00:00
|
|
|
"Expected %s, got %s" % (pprint(expected), pprint(msg)))
|
2014-02-15 19:30:39 +00:00
|
|
|
|
|
|
|
fields = expected.ListFields() # only filled (including extensions)
|
|
|
|
for field, value in fields:
|
|
|
|
if not msg.HasField(field.name) or getattr(msg, field.name) != value:
|
2017-06-18 21:14:28 +00:00
|
|
|
raise CallException(types.Failure_UnexpectedMessage,
|
2017-06-23 19:31:42 +00:00
|
|
|
"Expected %s, got %s" % (pprint(expected), pprint(msg)))
|
2016-01-12 23:17:38 +00:00
|
|
|
|
2014-02-15 19:30:39 +00:00
|
|
|
def callback_ButtonRequest(self, msg):
|
2014-06-12 11:26:24 +00:00
|
|
|
log("ButtonRequest code: " + get_buttonrequest_value(msg.code))
|
2014-02-13 15:46:21 +00:00
|
|
|
|
2014-06-13 17:24:53 +00:00
|
|
|
log("Pressing button " + str(self.button))
|
2014-12-10 14:26:18 +00:00
|
|
|
if self.button_wait:
|
|
|
|
log("Waiting %d seconds " % self.button_wait)
|
|
|
|
time.sleep(self.button_wait)
|
2014-02-13 15:46:21 +00:00
|
|
|
self.debug.press_button(self.button)
|
|
|
|
return proto.ButtonAck()
|
|
|
|
|
|
|
|
def callback_PinMatrixRequest(self, msg):
|
|
|
|
if self.pin_correct:
|
|
|
|
pin = self.debug.read_pin_encoded()
|
2014-01-13 03:44:57 +00:00
|
|
|
else:
|
2014-02-13 15:46:21 +00:00
|
|
|
pin = '444222'
|
|
|
|
return proto.PinMatrixAck(pin=pin)
|
|
|
|
|
|
|
|
def callback_PassphraseRequest(self, msg):
|
2014-06-12 11:26:24 +00:00
|
|
|
log("Provided passphrase: '%s'" % self.passphrase)
|
2014-02-15 19:30:39 +00:00
|
|
|
return proto.PassphraseAck(passphrase=self.passphrase)
|
2014-01-13 03:44:57 +00:00
|
|
|
|
2014-02-13 15:46:21 +00:00
|
|
|
def callback_WordRequest(self, msg):
|
2014-03-07 16:25:55 +00:00
|
|
|
(word, pos) = self.debug.read_recovery_word()
|
2014-02-21 20:00:56 +00:00
|
|
|
if word != '':
|
|
|
|
return proto.WordAck(word=word)
|
|
|
|
if pos != 0:
|
|
|
|
return proto.WordAck(word=self.mnemonic[pos - 1])
|
|
|
|
|
2017-11-06 10:09:54 +00:00
|
|
|
raise RuntimeError("Unexpected call")
|
2014-02-13 15:46:21 +00:00
|
|
|
|
2017-06-23 19:31:42 +00:00
|
|
|
|
2014-02-13 15:46:21 +00:00
|
|
|
class ProtocolMixin(object):
|
|
|
|
PRIME_DERIVATION_FLAG = 0x80000000
|
2017-01-17 13:13:02 +00:00
|
|
|
VENDORS = ('bitcointrezor.com', 'trezor.io')
|
2014-02-13 15:46:21 +00:00
|
|
|
|
|
|
|
def __init__(self, *args, **kwargs):
|
2014-02-13 16:20:40 +00:00
|
|
|
super(ProtocolMixin, self).__init__(*args, **kwargs)
|
2013-09-13 03:31:24 +00:00
|
|
|
self.init_device()
|
2014-03-28 18:47:53 +00:00
|
|
|
self.tx_api = None
|
2014-02-13 15:46:21 +00:00
|
|
|
|
2014-03-28 18:47:53 +00:00
|
|
|
def set_tx_api(self, tx_api):
|
|
|
|
self.tx_api = tx_api
|
2014-02-13 15:46:21 +00:00
|
|
|
|
|
|
|
def init_device(self):
|
|
|
|
self.features = expect(proto.Features)(self.call)(proto.Initialize())
|
2015-01-28 04:31:30 +00:00
|
|
|
if str(self.features.vendor) not in self.VENDORS:
|
2017-11-06 10:09:54 +00:00
|
|
|
raise RuntimeError("Unsupported device")
|
2014-01-27 10:25:27 +00:00
|
|
|
|
2013-09-13 03:31:24 +00:00
|
|
|
def _get_local_entropy(self):
|
|
|
|
return os.urandom(32)
|
2013-12-30 22:35:20 +00:00
|
|
|
|
|
|
|
def _convert_prime(self, n):
|
|
|
|
# Convert minus signs to uint32 with flag
|
2017-06-23 19:31:42 +00:00
|
|
|
return [int(abs(x) | self.PRIME_DERIVATION_FLAG) if x < 0 else x for x in n]
|
2014-01-27 10:25:27 +00:00
|
|
|
|
2016-02-10 14:53:14 +00:00
|
|
|
@staticmethod
|
|
|
|
def expand_path(n):
|
2014-01-09 16:34:29 +00:00
|
|
|
# Convert string of bip32 path to list of uint32 integers with prime flags
|
|
|
|
# 0/-1/1' -> [0, 0x80000001, 0x80000001]
|
2014-01-09 23:11:03 +00:00
|
|
|
if not n:
|
|
|
|
return []
|
|
|
|
|
2014-01-09 16:34:29 +00:00
|
|
|
n = n.split('/')
|
2016-10-29 12:59:57 +00:00
|
|
|
|
|
|
|
# m/a/b/c => a/b/c
|
|
|
|
if n[0] == 'm':
|
|
|
|
n = n[1:]
|
|
|
|
|
2016-10-29 13:11:56 +00:00
|
|
|
# coin_name/a/b/c => 44'/SLIP44_constant'/a/b/c
|
2017-09-15 15:05:47 +00:00
|
|
|
if n[0] in coins_slip44:
|
|
|
|
n = ["44'", "%d'" % coins_slip44[n[0]]] + n[1:]
|
2016-10-29 13:11:56 +00:00
|
|
|
|
2014-01-09 16:34:29 +00:00
|
|
|
path = []
|
|
|
|
for x in n:
|
|
|
|
prime = False
|
2014-01-09 23:11:03 +00:00
|
|
|
if x.endswith("'"):
|
2014-01-09 16:34:29 +00:00
|
|
|
x = x.replace('\'', '')
|
|
|
|
prime = True
|
2014-01-09 23:11:03 +00:00
|
|
|
if x.startswith('-'):
|
2014-01-09 16:34:29 +00:00
|
|
|
prime = True
|
2014-01-09 23:11:03 +00:00
|
|
|
|
|
|
|
x = abs(int(x))
|
2014-01-27 10:25:27 +00:00
|
|
|
|
2014-01-09 16:34:29 +00:00
|
|
|
if prime:
|
2016-02-10 14:53:14 +00:00
|
|
|
x |= ProtocolMixin.PRIME_DERIVATION_FLAG
|
2014-01-09 23:11:03 +00:00
|
|
|
|
|
|
|
path.append(x)
|
2014-01-09 16:34:29 +00:00
|
|
|
|
|
|
|
return path
|
|
|
|
|
2014-02-13 15:46:21 +00:00
|
|
|
@expect(proto.PublicKey)
|
2017-04-21 17:14:15 +00:00
|
|
|
def get_public_node(self, n, ecdsa_curve_name=DEFAULT_CURVE, show_display=False, coin_name=None):
|
2014-02-21 17:56:51 +00:00
|
|
|
n = self._convert_prime(n)
|
2015-11-19 10:47:19 +00:00
|
|
|
if not ecdsa_curve_name:
|
2017-06-23 19:31:42 +00:00
|
|
|
ecdsa_curve_name = DEFAULT_CURVE
|
2017-04-21 17:14:15 +00:00
|
|
|
return self.call(proto.GetPublicKey(address_n=n, ecdsa_curve_name=ecdsa_curve_name, show_display=show_display, coin_name=coin_name))
|
2014-01-27 10:25:27 +00:00
|
|
|
|
2014-02-13 15:46:21 +00:00
|
|
|
@field('address')
|
|
|
|
@expect(proto.Address)
|
2017-01-02 20:25:07 +00:00
|
|
|
def get_address(self, coin_name, n, show_display=False, multisig=None, script_type=types.SPENDADDRESS):
|
2014-01-13 03:44:57 +00:00
|
|
|
n = self._convert_prime(n)
|
2014-12-10 17:03:54 +00:00
|
|
|
if multisig:
|
2017-01-02 20:25:07 +00:00
|
|
|
return self.call(proto.GetAddress(address_n=n, coin_name=coin_name, show_display=show_display, multisig=multisig, script_type=script_type))
|
2014-12-10 17:03:54 +00:00
|
|
|
else:
|
2017-01-02 20:25:07 +00:00
|
|
|
return self.call(proto.GetAddress(address_n=n, coin_name=coin_name, show_display=show_display, script_type=script_type))
|
2014-01-27 10:25:27 +00:00
|
|
|
|
2016-05-24 19:32:58 +00:00
|
|
|
@field('address')
|
|
|
|
@expect(proto.EthereumAddress)
|
2016-05-26 06:47:04 +00:00
|
|
|
def ethereum_get_address(self, n, show_display=False, multisig=None):
|
2016-05-24 19:32:58 +00:00
|
|
|
n = self._convert_prime(n)
|
|
|
|
return self.call(proto.EthereumGetAddress(address_n=n, show_display=show_display))
|
|
|
|
|
2016-09-13 10:25:06 +00:00
|
|
|
@session
|
2017-01-22 12:51:07 +00:00
|
|
|
def ethereum_sign_tx(self, n, nonce, gas_price, gas_limit, to, value, data=None, chain_id=None):
|
2016-08-19 21:05:54 +00:00
|
|
|
def int_to_big_endian(value):
|
|
|
|
import rlp.utils
|
|
|
|
if value == 0:
|
|
|
|
return b''
|
|
|
|
return rlp.utils.int_to_big_endian(value)
|
2016-05-27 06:13:23 +00:00
|
|
|
|
|
|
|
n = self._convert_prime(n)
|
|
|
|
|
2016-09-13 10:25:06 +00:00
|
|
|
msg = proto.EthereumSignTx(
|
|
|
|
address_n=n,
|
|
|
|
nonce=int_to_big_endian(nonce),
|
|
|
|
gas_price=int_to_big_endian(gas_price),
|
|
|
|
gas_limit=int_to_big_endian(gas_limit),
|
|
|
|
value=int_to_big_endian(value))
|
2016-08-10 16:13:05 +00:00
|
|
|
|
2016-09-13 10:25:06 +00:00
|
|
|
if to:
|
|
|
|
msg.to = to
|
2016-08-22 23:14:23 +00:00
|
|
|
|
2016-09-13 10:25:06 +00:00
|
|
|
if data:
|
|
|
|
msg.data_length = len(data)
|
|
|
|
data, chunk = data[1024:], data[:1024]
|
|
|
|
msg.data_initial_chunk = chunk
|
2016-08-10 16:13:05 +00:00
|
|
|
|
2017-01-22 12:51:07 +00:00
|
|
|
if chain_id:
|
|
|
|
msg.chain_id = chain_id
|
|
|
|
|
2016-09-13 10:25:06 +00:00
|
|
|
response = self.call(msg)
|
2016-05-27 06:13:23 +00:00
|
|
|
|
2016-09-13 10:25:06 +00:00
|
|
|
while response.HasField('data_length'):
|
|
|
|
data_length = response.data_length
|
|
|
|
data, chunk = data[data_length:], data[:data_length]
|
|
|
|
response = self.call(proto.EthereumTxAck(data_chunk=chunk))
|
2016-05-27 06:13:23 +00:00
|
|
|
|
2016-09-13 10:25:06 +00:00
|
|
|
return response.signature_v, response.signature_r, response.signature_s
|
2016-08-10 16:13:05 +00:00
|
|
|
|
2017-07-12 16:35:54 +00:00
|
|
|
@expect(proto.EthereumMessageSignature)
|
|
|
|
def ethereum_sign_message(self, n, message):
|
|
|
|
n = self._convert_prime(n)
|
|
|
|
# Convert message to UTF8 NFC (seems to be a bitcoin-qt standard)
|
|
|
|
message = normalize_nfc(message).encode('utf-8')
|
|
|
|
return self.call(proto.EthereumSignMessage(address_n=n, message=message))
|
|
|
|
|
|
|
|
def ethereum_verify_message(self, address, signature, message):
|
|
|
|
# Convert message to UTF8 NFC (seems to be a bitcoin-qt standard)
|
|
|
|
message = normalize_nfc(message).encode('utf-8')
|
|
|
|
try:
|
|
|
|
resp = self.call(proto.EthereumVerifyMessage(address=address, signature=signature, message=message))
|
|
|
|
except CallException as e:
|
|
|
|
resp = e
|
|
|
|
if isinstance(resp, proto.Success):
|
|
|
|
return True
|
|
|
|
return False
|
|
|
|
|
2014-02-13 15:46:21 +00:00
|
|
|
@field('entropy')
|
|
|
|
@expect(proto.Entropy)
|
2013-09-13 03:31:24 +00:00
|
|
|
def get_entropy(self, size):
|
2014-02-13 15:46:21 +00:00
|
|
|
return self.call(proto.GetEntropy(size=size))
|
2013-09-13 03:31:24 +00:00
|
|
|
|
2014-02-13 15:46:21 +00:00
|
|
|
@field('message')
|
|
|
|
@expect(proto.Success)
|
2014-02-07 10:31:12 +00:00
|
|
|
def ping(self, msg, button_protection=False, pin_protection=False, passphrase_protection=False):
|
2014-02-03 23:31:44 +00:00
|
|
|
msg = proto.Ping(message=msg,
|
2014-02-04 00:02:16 +00:00
|
|
|
button_protection=button_protection,
|
|
|
|
pin_protection=pin_protection,
|
|
|
|
passphrase_protection=passphrase_protection)
|
2014-02-13 15:46:21 +00:00
|
|
|
return self.call(msg)
|
2013-09-13 03:31:24 +00:00
|
|
|
|
2013-10-08 18:33:39 +00:00
|
|
|
def get_device_id(self):
|
|
|
|
return self.features.device_id
|
2013-09-13 03:31:24 +00:00
|
|
|
|
2014-02-13 15:46:21 +00:00
|
|
|
@field('message')
|
|
|
|
@expect(proto.Success)
|
2015-02-04 19:53:22 +00:00
|
|
|
def apply_settings(self, label=None, language=None, use_passphrase=None, homescreen=None):
|
2013-09-13 03:31:24 +00:00
|
|
|
settings = proto.ApplySettings()
|
2017-06-23 19:31:42 +00:00
|
|
|
if label is not None:
|
2013-09-13 03:31:24 +00:00
|
|
|
settings.label = label
|
|
|
|
if language:
|
|
|
|
settings.language = language
|
2017-06-23 19:31:42 +00:00
|
|
|
if use_passphrase is not None:
|
2014-12-13 18:07:30 +00:00
|
|
|
settings.use_passphrase = use_passphrase
|
2017-06-23 19:31:42 +00:00
|
|
|
if homescreen is not None:
|
2015-02-04 19:53:22 +00:00
|
|
|
settings.homescreen = homescreen
|
2013-09-13 03:31:24 +00:00
|
|
|
|
2014-02-13 15:46:21 +00:00
|
|
|
out = self.call(settings)
|
|
|
|
self.init_device() # Reload Features
|
2013-09-13 03:31:24 +00:00
|
|
|
return out
|
|
|
|
|
2017-07-17 16:36:53 +00:00
|
|
|
@field('message')
|
|
|
|
@expect(proto.Success)
|
|
|
|
def apply_flags(self, flags):
|
|
|
|
out = self.call(proto.ApplyFlags(flags=flags))
|
|
|
|
self.init_device() # Reload Features
|
|
|
|
return out
|
|
|
|
|
2014-06-17 13:31:10 +00:00
|
|
|
@field('message')
|
|
|
|
@expect(proto.Success)
|
|
|
|
def clear_session(self):
|
|
|
|
return self.call(proto.ClearSession())
|
|
|
|
|
2014-02-13 15:46:21 +00:00
|
|
|
@field('message')
|
|
|
|
@expect(proto.Success)
|
2014-01-31 18:48:19 +00:00
|
|
|
def change_pin(self, remove=False):
|
|
|
|
ret = self.call(proto.ChangePin(remove=remove))
|
|
|
|
self.init_device() # Re-read features
|
|
|
|
return ret
|
|
|
|
|
2014-02-13 15:46:21 +00:00
|
|
|
@expect(proto.MessageSignature)
|
2017-07-24 14:11:38 +00:00
|
|
|
def sign_message(self, coin_name, n, message, script_type=types.SPENDADDRESS):
|
2014-02-13 15:46:21 +00:00
|
|
|
n = self._convert_prime(n)
|
2016-05-20 17:18:33 +00:00
|
|
|
# Convert message to UTF8 NFC (seems to be a bitcoin-qt standard)
|
2016-06-27 21:17:20 +00:00
|
|
|
message = normalize_nfc(message).encode("utf-8")
|
2017-07-24 14:11:38 +00:00
|
|
|
return self.call(proto.SignMessage(coin_name=coin_name, address_n=n, message=message, script_type=script_type))
|
2014-02-13 15:46:21 +00:00
|
|
|
|
2015-02-20 17:50:53 +00:00
|
|
|
@expect(proto.SignedIdentity)
|
2015-06-23 14:26:31 +00:00
|
|
|
def sign_identity(self, identity, challenge_hidden, challenge_visual, ecdsa_curve_name=DEFAULT_CURVE):
|
|
|
|
return self.call(proto.SignIdentity(identity=identity, challenge_hidden=challenge_hidden, challenge_visual=challenge_visual, ecdsa_curve_name=ecdsa_curve_name))
|
2015-02-20 17:50:53 +00:00
|
|
|
|
2016-06-12 12:39:04 +00:00
|
|
|
@expect(proto.ECDHSessionKey)
|
|
|
|
def get_ecdh_session_key(self, identity, peer_public_key, ecdsa_curve_name=DEFAULT_CURVE):
|
|
|
|
return self.call(proto.GetECDHSessionKey(identity=identity, peer_public_key=peer_public_key, ecdsa_curve_name=ecdsa_curve_name))
|
|
|
|
|
2017-10-03 14:45:42 +00:00
|
|
|
@expect(proto.CosiCommitment)
|
|
|
|
def cosi_commit(self, n, data):
|
|
|
|
n = self._convert_prime(n)
|
|
|
|
return self.call(proto.CosiCommit(address_n=n, data=data))
|
|
|
|
|
|
|
|
@expect(proto.CosiSignature)
|
|
|
|
def cosi_sign(self, n, data, global_commitment, global_pubkey):
|
|
|
|
n = self._convert_prime(n)
|
|
|
|
return self.call(proto.CosiSign(address_n=n, data=data, global_commitment=global_commitment, global_pubkey=global_pubkey))
|
|
|
|
|
2016-06-12 21:49:52 +00:00
|
|
|
@field('message')
|
|
|
|
@expect(proto.Success)
|
|
|
|
def set_u2f_counter(self, u2f_counter):
|
2017-06-23 19:31:42 +00:00
|
|
|
ret = self.call(proto.SetU2FCounter(u2f_counter=u2f_counter))
|
2016-06-12 21:49:52 +00:00
|
|
|
return ret
|
|
|
|
|
2017-09-03 13:35:22 +00:00
|
|
|
@field("address")
|
|
|
|
@expect(proto.NEMAddress)
|
|
|
|
def nem_get_address(self, n, network, show_display=False):
|
|
|
|
n = self._convert_prime(n)
|
|
|
|
return self.call(proto.NEMGetAddress(address_n=n, network=network, show_display=show_display))
|
|
|
|
|
2017-07-01 13:43:33 +00:00
|
|
|
@expect(proto.NEMSignedTx)
|
|
|
|
def nem_sign_tx(self, n, transaction):
|
|
|
|
n = self._convert_prime(n)
|
|
|
|
|
|
|
|
def common_to_proto(common, msg):
|
|
|
|
msg.network = (common["version"] >> 24) & 0xFF
|
|
|
|
msg.timestamp = common["timeStamp"]
|
|
|
|
msg.fee = common["fee"]
|
|
|
|
msg.deadline = common["deadline"]
|
|
|
|
|
|
|
|
if "signer" in common:
|
|
|
|
msg.signer = binascii.unhexlify(common["signer"])
|
|
|
|
|
|
|
|
def transfer_to_proto(transfer, msg):
|
|
|
|
msg.recipient = transfer["recipient"]
|
|
|
|
msg.amount = transfer["amount"]
|
|
|
|
|
|
|
|
if "payload" in transfer["message"]:
|
|
|
|
msg.payload = binascii.unhexlify(transfer["message"]["payload"])
|
|
|
|
|
|
|
|
if transfer["message"]["type"] == 0x02:
|
|
|
|
msg.public_key = binascii.unhexlify(transfer["message"]["publicKey"])
|
|
|
|
|
|
|
|
if "mosaics" in transfer:
|
|
|
|
msg.mosaics.extend(types.NEMMosaic(
|
|
|
|
namespace=mosaic["mosaicId"]["namespaceId"],
|
|
|
|
mosaic=mosaic["mosaicId"]["name"],
|
|
|
|
quantity=mosaic["quantity"],
|
|
|
|
) for mosaic in transfer["mosaics"])
|
|
|
|
|
|
|
|
def aggregate_modification_to_proto(aggregate_modification, msg):
|
|
|
|
msg.modifications.extend(types.NEMCosignatoryModification(
|
|
|
|
type=modification["modificationType"],
|
|
|
|
public_key=binascii.unhexlify(modification["cosignatoryAccount"]),
|
|
|
|
) for modification in aggregate_modification["modifications"])
|
|
|
|
|
|
|
|
if "minCosignatories" in aggregate_modification:
|
|
|
|
msg.relative_change = aggregate_modification["minCosignatories"]["relativeChange"]
|
|
|
|
|
|
|
|
def provision_namespace_to_proto(provision_namespace, msg):
|
|
|
|
msg.namespace = provision_namespace["newPart"]
|
|
|
|
|
|
|
|
if provision_namespace["parent"]:
|
|
|
|
msg.parent = provision_namespace["parent"]
|
|
|
|
|
|
|
|
msg.sink = provision_namespace["rentalFeeSink"]
|
|
|
|
msg.fee = provision_namespace["rentalFee"]
|
|
|
|
|
|
|
|
def mosaic_creation_to_proto(mosaic_creation, msg):
|
|
|
|
msg.definition.namespace = mosaic_creation["mosaicDefinition"]["id"]["namespaceId"]
|
|
|
|
msg.definition.mosaic = mosaic_creation["mosaicDefinition"]["id"]["name"]
|
|
|
|
|
|
|
|
if mosaic_creation["mosaicDefinition"]["levy"]:
|
|
|
|
msg.definition.levy = mosaic_creation["mosaicDefinition"]["levy"]["type"]
|
|
|
|
msg.definition.fee = mosaic_creation["mosaicDefinition"]["levy"]["fee"]
|
|
|
|
msg.definition.levy_address = mosaic_creation["mosaicDefinition"]["levy"]["recipient"]
|
|
|
|
msg.definition.levy_namespace = mosaic_creation["mosaicDefinition"]["levy"]["mosaicId"]["namespaceId"]
|
|
|
|
msg.definition.levy_mosaic = mosaic_creation["mosaicDefinition"]["levy"]["mosaicId"]["name"]
|
|
|
|
|
|
|
|
msg.definition.description = mosaic_creation["mosaicDefinition"]["description"]
|
|
|
|
|
|
|
|
for property in mosaic_creation["mosaicDefinition"]["properties"]:
|
|
|
|
name = property["name"]
|
|
|
|
value = json.loads(property["value"])
|
|
|
|
|
|
|
|
if name == "divisibility":
|
|
|
|
msg.definition.divisibility = value
|
|
|
|
elif name == "initialSupply":
|
|
|
|
msg.definition.supply = value
|
|
|
|
elif name == "supplyMutable":
|
|
|
|
msg.definition.mutable_supply = value
|
|
|
|
elif name == "transferable":
|
|
|
|
msg.definition.transferable = value
|
|
|
|
|
|
|
|
msg.sink = mosaic_creation["creationFeeSink"]
|
|
|
|
msg.fee = mosaic_creation["creationFee"]
|
|
|
|
|
|
|
|
def mosaic_supply_change_to_proto(mosaic_supply_change, msg):
|
|
|
|
msg.namespace = mosaic_supply_change["mosaicId"]["namespaceId"]
|
|
|
|
msg.mosaic = mosaic_supply_change["mosaicId"]["name"]
|
|
|
|
msg.type = mosaic_supply_change["supplyType"]
|
|
|
|
msg.delta = mosaic_supply_change["delta"]
|
|
|
|
|
|
|
|
msg = proto.NEMSignTx()
|
|
|
|
|
|
|
|
common_to_proto(transaction, msg.transaction)
|
|
|
|
msg.transaction.address_n.extend(n)
|
|
|
|
|
|
|
|
msg.cosigning = (transaction["type"] == 0x1002)
|
|
|
|
|
|
|
|
if msg.cosigning or transaction["type"] == 0x1004:
|
|
|
|
transaction = transaction["otherTrans"]
|
|
|
|
common_to_proto(transaction, msg.multisig)
|
|
|
|
elif "otherTrans" in transaction:
|
|
|
|
raise CallException("Transaction does not support inner transaction")
|
|
|
|
|
|
|
|
if transaction["type"] == 0x0101:
|
|
|
|
transfer_to_proto(transaction, msg.transfer)
|
|
|
|
elif transaction["type"] == 0x1001:
|
|
|
|
aggregate_modification_to_proto(transaction, msg.aggregate_modification)
|
|
|
|
elif transaction["type"] == 0x2001:
|
|
|
|
provision_namespace_to_proto(transaction, msg.provision_namespace)
|
|
|
|
elif transaction["type"] == 0x4001:
|
|
|
|
mosaic_creation_to_proto(transaction, msg.mosaic_creation)
|
|
|
|
elif transaction["type"] == 0x4002:
|
|
|
|
mosaic_supply_change_to_proto(transaction, msg.mosaic_supply_change)
|
|
|
|
else:
|
|
|
|
raise CallException("Unknown transaction type")
|
|
|
|
|
|
|
|
return self.call(msg)
|
|
|
|
|
2016-10-10 09:01:40 +00:00
|
|
|
def verify_message(self, coin_name, address, signature, message):
|
2016-05-20 17:18:33 +00:00
|
|
|
# Convert message to UTF8 NFC (seems to be a bitcoin-qt standard)
|
2016-06-27 21:17:20 +00:00
|
|
|
message = normalize_nfc(message).encode("utf-8")
|
2014-02-13 15:46:21 +00:00
|
|
|
try:
|
2016-10-10 09:01:40 +00:00
|
|
|
resp = self.call(proto.VerifyMessage(address=address, signature=signature, message=message, coin_name=coin_name))
|
2014-02-13 15:46:21 +00:00
|
|
|
except CallException as e:
|
|
|
|
resp = e
|
|
|
|
if isinstance(resp, proto.Success):
|
|
|
|
return True
|
|
|
|
return False
|
|
|
|
|
2014-11-03 18:42:22 +00:00
|
|
|
@expect(proto.EncryptedMessage)
|
2014-10-29 23:48:06 +00:00
|
|
|
def encrypt_message(self, pubkey, message, display_only, coin_name, n):
|
2014-11-26 17:49:22 +00:00
|
|
|
if coin_name and n:
|
|
|
|
n = self._convert_prime(n)
|
|
|
|
return self.call(proto.EncryptMessage(pubkey=pubkey, message=message, display_only=display_only, coin_name=coin_name, address_n=n))
|
|
|
|
else:
|
|
|
|
return self.call(proto.EncryptMessage(pubkey=pubkey, message=message, display_only=display_only))
|
2014-06-12 15:02:46 +00:00
|
|
|
|
2014-11-03 18:42:22 +00:00
|
|
|
@expect(proto.DecryptedMessage)
|
|
|
|
def decrypt_message(self, n, nonce, message, msg_hmac):
|
2014-06-12 15:02:46 +00:00
|
|
|
n = self._convert_prime(n)
|
2014-11-03 18:42:22 +00:00
|
|
|
return self.call(proto.DecryptMessage(address_n=n, nonce=nonce, message=message, hmac=msg_hmac))
|
2014-06-12 15:02:46 +00:00
|
|
|
|
2014-11-03 18:42:22 +00:00
|
|
|
@field('value')
|
|
|
|
@expect(proto.CipheredKeyValue)
|
2016-06-27 21:17:20 +00:00
|
|
|
def encrypt_keyvalue(self, n, key, value, ask_on_encrypt=True, ask_on_decrypt=True, iv=b''):
|
2014-06-06 12:40:07 +00:00
|
|
|
n = self._convert_prime(n)
|
|
|
|
return self.call(proto.CipherKeyValue(address_n=n,
|
|
|
|
key=key,
|
|
|
|
value=value,
|
|
|
|
encrypt=True,
|
|
|
|
ask_on_encrypt=ask_on_encrypt,
|
2015-12-24 16:31:09 +00:00
|
|
|
ask_on_decrypt=ask_on_decrypt,
|
2016-06-27 21:17:20 +00:00
|
|
|
iv=iv))
|
2014-06-06 12:40:07 +00:00
|
|
|
|
2014-11-03 18:42:22 +00:00
|
|
|
@field('value')
|
|
|
|
@expect(proto.CipheredKeyValue)
|
2016-06-27 21:17:20 +00:00
|
|
|
def decrypt_keyvalue(self, n, key, value, ask_on_encrypt=True, ask_on_decrypt=True, iv=b''):
|
2014-06-06 12:40:07 +00:00
|
|
|
n = self._convert_prime(n)
|
|
|
|
return self.call(proto.CipherKeyValue(address_n=n,
|
|
|
|
key=key,
|
|
|
|
value=value,
|
|
|
|
encrypt=False,
|
|
|
|
ask_on_encrypt=ask_on_encrypt,
|
2015-12-24 16:31:09 +00:00
|
|
|
ask_on_decrypt=ask_on_decrypt,
|
2016-06-27 21:17:20 +00:00
|
|
|
iv=iv))
|
2014-06-06 12:40:07 +00:00
|
|
|
|
2014-02-13 15:46:21 +00:00
|
|
|
def _prepare_simple_sign_tx(self, coin_name, inputs, outputs):
|
|
|
|
msg = proto.SimpleSignTx()
|
|
|
|
msg.coin_name = coin_name
|
|
|
|
msg.inputs.extend(inputs)
|
|
|
|
msg.outputs.extend(outputs)
|
|
|
|
|
|
|
|
known_hashes = []
|
|
|
|
for inp in inputs:
|
|
|
|
if inp.prev_hash in known_hashes:
|
|
|
|
continue
|
|
|
|
|
|
|
|
tx = msg.transactions.add()
|
2015-06-03 12:53:53 +00:00
|
|
|
if self.tx_api:
|
2017-06-18 22:00:26 +00:00
|
|
|
tx.CopyFrom(self.tx_api.get_tx(binascii.hexlify(inp.prev_hash).decode('utf-8')))
|
2015-06-03 12:53:53 +00:00
|
|
|
else:
|
2017-11-06 10:09:54 +00:00
|
|
|
raise RuntimeError('TX_API not defined')
|
2014-02-13 15:46:21 +00:00
|
|
|
known_hashes.append(inp.prev_hash)
|
|
|
|
|
|
|
|
return msg
|
|
|
|
|
|
|
|
def simple_sign_tx(self, coin_name, inputs, outputs):
|
|
|
|
msg = self._prepare_simple_sign_tx(coin_name, inputs, outputs)
|
2014-04-17 14:27:00 +00:00
|
|
|
return self.call(msg).serialized.serialized_tx
|
2014-04-09 19:42:30 +00:00
|
|
|
|
|
|
|
def _prepare_sign_tx(self, coin_name, inputs, outputs):
|
|
|
|
tx = types.TransactionType()
|
|
|
|
tx.inputs.extend(inputs)
|
2014-04-17 06:30:34 +00:00
|
|
|
tx.outputs.extend(outputs)
|
2014-04-09 19:42:30 +00:00
|
|
|
|
|
|
|
txes = {}
|
2016-06-27 21:17:20 +00:00
|
|
|
txes[b''] = tx
|
2014-04-09 19:42:30 +00:00
|
|
|
|
|
|
|
known_hashes = []
|
|
|
|
for inp in inputs:
|
|
|
|
if inp.prev_hash in known_hashes:
|
|
|
|
continue
|
|
|
|
|
2015-06-03 12:53:53 +00:00
|
|
|
if self.tx_api:
|
2017-06-18 22:00:26 +00:00
|
|
|
txes[inp.prev_hash] = self.tx_api.get_tx(binascii.hexlify(inp.prev_hash).decode('utf-8'))
|
2015-06-03 12:53:53 +00:00
|
|
|
else:
|
2017-11-06 10:09:54 +00:00
|
|
|
raise RuntimeError('TX_API not defined')
|
2014-04-09 19:42:30 +00:00
|
|
|
known_hashes.append(inp.prev_hash)
|
|
|
|
|
|
|
|
return txes
|
2014-02-13 15:46:21 +00:00
|
|
|
|
2016-09-13 10:25:06 +00:00
|
|
|
@session
|
2017-04-19 12:19:26 +00:00
|
|
|
def sign_tx(self, coin_name, inputs, outputs, version=None, lock_time=None, debug_processor=None):
|
2014-04-09 19:42:30 +00:00
|
|
|
|
|
|
|
start = time.time()
|
|
|
|
txes = self._prepare_sign_tx(coin_name, inputs, outputs)
|
|
|
|
|
2016-09-13 10:25:06 +00:00
|
|
|
# Prepare and send initial message
|
|
|
|
tx = proto.SignTx()
|
|
|
|
tx.inputs_count = len(inputs)
|
|
|
|
tx.outputs_count = len(outputs)
|
|
|
|
tx.coin_name = coin_name
|
2017-04-19 12:19:26 +00:00
|
|
|
if version is not None:
|
|
|
|
tx.version = version
|
|
|
|
if lock_time is not None:
|
|
|
|
tx.lock_time = lock_time
|
2016-09-13 10:25:06 +00:00
|
|
|
res = self.call(tx)
|
|
|
|
|
|
|
|
# Prepare structure for signatures
|
|
|
|
signatures = [None] * len(inputs)
|
|
|
|
serialized_tx = b''
|
|
|
|
|
|
|
|
counter = 0
|
|
|
|
while True:
|
|
|
|
counter += 1
|
|
|
|
|
|
|
|
if isinstance(res, proto.Failure):
|
|
|
|
raise CallException("Signing failed")
|
|
|
|
|
|
|
|
if not isinstance(res, proto.TxRequest):
|
|
|
|
raise CallException("Unexpected message")
|
|
|
|
|
|
|
|
# If there's some part of signed transaction, let's add it
|
|
|
|
if res.HasField('serialized') and res.serialized.HasField('serialized_tx'):
|
|
|
|
log("RECEIVED PART OF SERIALIZED TX (%d BYTES)" % len(res.serialized.serialized_tx))
|
|
|
|
serialized_tx += res.serialized.serialized_tx
|
|
|
|
|
|
|
|
if res.HasField('serialized') and res.serialized.HasField('signature_index'):
|
2017-06-23 19:31:42 +00:00
|
|
|
if signatures[res.serialized.signature_index] is not None:
|
2017-11-06 10:09:54 +00:00
|
|
|
raise ValueError("Signature for index %d already filled" % res.serialized.signature_index)
|
2016-09-13 10:25:06 +00:00
|
|
|
signatures[res.serialized.signature_index] = res.serialized.signature
|
|
|
|
|
|
|
|
if res.request_type == types.TXFINISHED:
|
|
|
|
# Device didn't ask for more information, finish workflow
|
|
|
|
break
|
|
|
|
|
|
|
|
# Device asked for one more information, let's process it.
|
|
|
|
current_tx = txes[res.details.tx_hash]
|
|
|
|
|
|
|
|
if res.request_type == types.TXMETA:
|
|
|
|
msg = types.TransactionType()
|
|
|
|
msg.version = current_tx.version
|
|
|
|
msg.lock_time = current_tx.lock_time
|
|
|
|
msg.inputs_cnt = len(current_tx.inputs)
|
|
|
|
if res.details.tx_hash:
|
|
|
|
msg.outputs_cnt = len(current_tx.bin_outputs)
|
|
|
|
else:
|
|
|
|
msg.outputs_cnt = len(current_tx.outputs)
|
2016-10-21 13:24:30 +00:00
|
|
|
msg.extra_data_len = len(current_tx.extra_data)
|
2016-09-13 10:25:06 +00:00
|
|
|
res = self.call(proto.TxAck(tx=msg))
|
|
|
|
continue
|
2014-04-09 19:42:30 +00:00
|
|
|
|
2016-09-13 10:25:06 +00:00
|
|
|
elif res.request_type == types.TXINPUT:
|
|
|
|
msg = types.TransactionType()
|
|
|
|
msg.inputs.extend([current_tx.inputs[res.details.request_index], ])
|
2017-07-27 19:50:12 +00:00
|
|
|
if debug_processor is not None:
|
|
|
|
# If debug_processor function is provided,
|
|
|
|
# pass thru it the request and prepared response.
|
|
|
|
# This is useful for unit tests, see test_msg_signtx
|
|
|
|
msg = debug_processor(res, msg)
|
|
|
|
|
2016-09-13 10:25:06 +00:00
|
|
|
res = self.call(proto.TxAck(tx=msg))
|
|
|
|
continue
|
|
|
|
|
|
|
|
elif res.request_type == types.TXOUTPUT:
|
|
|
|
msg = types.TransactionType()
|
|
|
|
if res.details.tx_hash:
|
|
|
|
msg.bin_outputs.extend([current_tx.bin_outputs[res.details.request_index], ])
|
|
|
|
else:
|
|
|
|
msg.outputs.extend([current_tx.outputs[res.details.request_index], ])
|
|
|
|
|
2017-06-23 19:31:42 +00:00
|
|
|
if debug_processor is not None:
|
2016-09-13 10:25:06 +00:00
|
|
|
# If debug_processor function is provided,
|
|
|
|
# pass thru it the request and prepared response.
|
|
|
|
# This is useful for unit tests, see test_msg_signtx
|
|
|
|
msg = debug_processor(res, msg)
|
|
|
|
|
|
|
|
res = self.call(proto.TxAck(tx=msg))
|
|
|
|
continue
|
2014-04-09 19:42:30 +00:00
|
|
|
|
2016-10-21 13:24:30 +00:00
|
|
|
elif res.request_type == types.TXEXTRADATA:
|
|
|
|
o, l = res.details.extra_data_offset, res.details.extra_data_len
|
|
|
|
msg = types.TransactionType()
|
|
|
|
msg.extra_data = current_tx.extra_data[o:o + l]
|
|
|
|
res = self.call(proto.TxAck(tx=msg))
|
|
|
|
continue
|
|
|
|
|
2014-04-18 16:09:39 +00:00
|
|
|
if None in signatures:
|
2017-11-06 10:09:54 +00:00
|
|
|
raise RuntimeError("Some signatures are missing!")
|
2014-04-18 16:09:39 +00:00
|
|
|
|
2017-06-23 19:31:42 +00:00
|
|
|
log("SIGNED IN %.03f SECONDS, CALLED %d MESSAGES, %d BYTES" %
|
|
|
|
(time.time() - start, counter, len(serialized_tx)))
|
2014-04-09 19:42:30 +00:00
|
|
|
|
|
|
|
return (signatures, serialized_tx)
|
2014-02-13 15:46:21 +00:00
|
|
|
|
|
|
|
@field('message')
|
|
|
|
@expect(proto.Success)
|
|
|
|
def wipe_device(self):
|
|
|
|
ret = self.call(proto.WipeDevice())
|
|
|
|
self.init_device()
|
|
|
|
return ret
|
|
|
|
|
|
|
|
@field('message')
|
|
|
|
@expect(proto.Success)
|
2017-06-21 14:29:49 +00:00
|
|
|
def recovery_device(self, word_count, passphrase_protection, pin_protection, label, language, type=types.RecoveryDeviceType_ScrambledWords, expand=False, dry_run=False):
|
|
|
|
if self.features.initialized and not dry_run:
|
2017-11-06 10:09:54 +00:00
|
|
|
raise RuntimeError("Device is initialized already. Call wipe_device() and try again.")
|
2014-02-13 15:46:21 +00:00
|
|
|
|
|
|
|
if word_count not in (12, 18, 24):
|
2017-11-06 10:09:54 +00:00
|
|
|
raise ValueError("Invalid word count. Use 12/18/24")
|
2014-02-13 15:46:21 +00:00
|
|
|
|
2016-06-29 20:40:37 +00:00
|
|
|
self.recovery_matrix_first_pass = True
|
2017-02-11 19:15:09 +00:00
|
|
|
|
|
|
|
self.expand = expand
|
|
|
|
if self.expand:
|
|
|
|
# optimization to load the wordlist once, instead of for each recovery word
|
|
|
|
self.mnemonic_wordlist = Mnemonic('english')
|
|
|
|
|
2017-06-23 19:31:42 +00:00
|
|
|
res = self.call(proto.RecoveryDevice(
|
|
|
|
word_count=int(word_count),
|
|
|
|
passphrase_protection=bool(passphrase_protection),
|
|
|
|
pin_protection=bool(pin_protection),
|
|
|
|
label=label,
|
|
|
|
language=language,
|
|
|
|
enforce_wordlist=True,
|
|
|
|
type=type,
|
|
|
|
dry_run=dry_run))
|
2014-02-13 15:46:21 +00:00
|
|
|
|
|
|
|
self.init_device()
|
|
|
|
return res
|
|
|
|
|
|
|
|
@field('message')
|
|
|
|
@expect(proto.Success)
|
2016-09-13 10:25:06 +00:00
|
|
|
@session
|
2017-07-28 16:07:20 +00:00
|
|
|
def reset_device(self, display_random, strength, passphrase_protection, pin_protection, label, language, u2f_counter=0, skip_backup=False):
|
2014-02-13 15:46:21 +00:00
|
|
|
if self.features.initialized:
|
2017-11-06 10:09:54 +00:00
|
|
|
raise RuntimeError("Device is initialized already. Call wipe_device() and try again.")
|
2014-02-13 15:46:21 +00:00
|
|
|
|
|
|
|
# Begin with device reset workflow
|
|
|
|
msg = proto.ResetDevice(display_random=display_random,
|
|
|
|
strength=strength,
|
|
|
|
passphrase_protection=bool(passphrase_protection),
|
|
|
|
pin_protection=bool(pin_protection),
|
2017-06-23 17:23:08 +00:00
|
|
|
language=language,
|
|
|
|
label=label,
|
|
|
|
u2f_counter=u2f_counter,
|
|
|
|
skip_backup=bool(skip_backup))
|
2014-02-13 15:46:21 +00:00
|
|
|
|
|
|
|
resp = self.call(msg)
|
|
|
|
if not isinstance(resp, proto.EntropyRequest):
|
2017-11-06 10:09:54 +00:00
|
|
|
raise RuntimeError("Invalid response, expected EntropyRequest")
|
2014-02-13 15:46:21 +00:00
|
|
|
|
|
|
|
external_entropy = self._get_local_entropy()
|
2017-11-13 21:13:11 +00:00
|
|
|
log("Computer generated entropy: " + binascii.hexlify(external_entropy).decode())
|
2014-02-21 20:00:56 +00:00
|
|
|
ret = self.call(proto.EntropyAck(entropy=external_entropy))
|
|
|
|
self.init_device()
|
|
|
|
return ret
|
2014-02-13 15:46:21 +00:00
|
|
|
|
2017-06-23 17:23:08 +00:00
|
|
|
@field('message')
|
|
|
|
@expect(proto.Success)
|
|
|
|
def backup_device(self):
|
|
|
|
ret = self.call(proto.BackupDevice())
|
|
|
|
return ret
|
|
|
|
|
2014-02-13 15:46:21 +00:00
|
|
|
@field('message')
|
|
|
|
@expect(proto.Success)
|
2017-07-16 12:53:28 +00:00
|
|
|
def load_device_by_mnemonic(self, mnemonic, pin, passphrase_protection, label, language='english', skip_checksum=False, expand=False):
|
2014-02-21 00:48:11 +00:00
|
|
|
# Convert mnemonic to UTF8 NKFD
|
|
|
|
mnemonic = Mnemonic.normalize_string(mnemonic)
|
|
|
|
|
|
|
|
# Convert mnemonic to ASCII stream
|
2017-11-15 12:33:21 +00:00
|
|
|
mnemonic = mnemonic.encode()
|
2014-02-21 00:48:11 +00:00
|
|
|
|
2017-02-09 13:25:32 +00:00
|
|
|
m = Mnemonic('english')
|
2017-02-11 19:15:09 +00:00
|
|
|
|
|
|
|
if expand:
|
|
|
|
mnemonic = m.expand(mnemonic)
|
|
|
|
|
2017-02-09 13:25:32 +00:00
|
|
|
if not skip_checksum and not m.check(mnemonic):
|
2017-11-06 10:09:54 +00:00
|
|
|
raise ValueError("Invalid mnemonic checksum")
|
2017-02-09 13:25:32 +00:00
|
|
|
|
2014-02-13 15:46:21 +00:00
|
|
|
if self.features.initialized:
|
2017-11-06 10:09:54 +00:00
|
|
|
raise RuntimeError("Device is initialized already. Call wipe_device() and try again.")
|
2014-02-13 15:46:21 +00:00
|
|
|
|
|
|
|
resp = self.call(proto.LoadDevice(mnemonic=mnemonic, pin=pin,
|
|
|
|
passphrase_protection=passphrase_protection,
|
|
|
|
language=language,
|
2014-02-21 00:48:11 +00:00
|
|
|
label=label,
|
|
|
|
skip_checksum=skip_checksum))
|
2014-02-13 15:46:21 +00:00
|
|
|
self.init_device()
|
|
|
|
return resp
|
|
|
|
|
|
|
|
@field('message')
|
|
|
|
@expect(proto.Success)
|
2014-03-07 20:44:06 +00:00
|
|
|
def load_device_by_xprv(self, xprv, pin, passphrase_protection, label, language):
|
2014-02-13 15:46:21 +00:00
|
|
|
if self.features.initialized:
|
2017-11-06 10:09:54 +00:00
|
|
|
raise RuntimeError("Device is initialized already. Call wipe_device() and try again.")
|
2014-02-13 15:46:21 +00:00
|
|
|
|
|
|
|
if xprv[0:4] not in ('xprv', 'tprv'):
|
2017-11-06 10:09:54 +00:00
|
|
|
raise ValueError("Unknown type of xprv")
|
2014-02-13 15:46:21 +00:00
|
|
|
|
|
|
|
if len(xprv) < 100 and len(xprv) > 112:
|
2017-11-06 10:09:54 +00:00
|
|
|
raise ValueError("Invalid length of xprv")
|
2014-02-13 15:46:21 +00:00
|
|
|
|
|
|
|
node = types.HDNodeType()
|
2016-05-20 17:18:33 +00:00
|
|
|
data = binascii.hexlify(tools.b58decode(xprv, None))
|
2014-02-13 15:46:21 +00:00
|
|
|
|
2016-06-27 21:17:20 +00:00
|
|
|
if data[90:92] != b'00':
|
2017-11-06 10:09:54 +00:00
|
|
|
raise ValueError("Contain invalid private key")
|
2014-02-13 15:46:21 +00:00
|
|
|
|
2016-06-27 21:17:20 +00:00
|
|
|
checksum = binascii.hexlify(hashlib.sha256(hashlib.sha256(binascii.unhexlify(data[:156])).digest()).digest()[:4])
|
2014-02-13 15:46:21 +00:00
|
|
|
if checksum != data[156:]:
|
2017-11-06 10:09:54 +00:00
|
|
|
raise ValueError("Checksum doesn't match")
|
2014-02-13 15:46:21 +00:00
|
|
|
|
|
|
|
# version 0488ade4
|
|
|
|
# depth 00
|
|
|
|
# fingerprint 00000000
|
|
|
|
# child_num 00000000
|
|
|
|
# chaincode 873dff81c02f525623fd1fe5167eac3a55a049de3d314bb42ee227ffed37d508
|
|
|
|
# privkey 00e8f32e723decf4051aefac8e2c93c9c5b214313817cdb01a1494b917c8436b35
|
|
|
|
# checksum e77e9d71
|
|
|
|
|
|
|
|
node.depth = int(data[8:10], 16)
|
|
|
|
node.fingerprint = int(data[10:18], 16)
|
|
|
|
node.child_num = int(data[18:26], 16)
|
2016-06-27 21:17:20 +00:00
|
|
|
node.chain_code = binascii.unhexlify(data[26:90])
|
|
|
|
node.private_key = binascii.unhexlify(data[92:156]) # skip 0x00 indicating privkey
|
2014-02-13 15:46:21 +00:00
|
|
|
|
|
|
|
resp = self.call(proto.LoadDevice(node=node,
|
|
|
|
pin=pin,
|
|
|
|
passphrase_protection=passphrase_protection,
|
2014-03-07 20:44:06 +00:00
|
|
|
language=language,
|
2014-02-13 15:46:21 +00:00
|
|
|
label=label))
|
|
|
|
self.init_device()
|
|
|
|
return resp
|
|
|
|
|
2016-09-13 10:25:06 +00:00
|
|
|
@session
|
2014-02-13 15:46:21 +00:00
|
|
|
def firmware_update(self, fp):
|
2017-06-23 19:31:42 +00:00
|
|
|
if self.features.bootloader_mode is False:
|
2017-11-06 10:09:54 +00:00
|
|
|
raise RuntimeError("Device must be in bootloader mode")
|
2014-02-13 15:46:21 +00:00
|
|
|
|
2017-06-20 14:32:54 +00:00
|
|
|
data = fp.read()
|
|
|
|
|
|
|
|
resp = self.call(proto.FirmwareErase(length=len(data)))
|
2014-02-13 15:46:21 +00:00
|
|
|
if isinstance(resp, proto.Failure) and resp.code == types.Failure_FirmwareError:
|
|
|
|
return False
|
|
|
|
|
2017-04-12 12:11:42 +00:00
|
|
|
# TREZORv1 method
|
2014-02-13 15:46:21 +00:00
|
|
|
if isinstance(resp, proto.Success):
|
2017-04-12 12:11:42 +00:00
|
|
|
fingerprint = hashlib.sha256(data[256:]).hexdigest()
|
|
|
|
log("Firmware fingerprint: " + fingerprint)
|
|
|
|
resp = self.call(proto.FirmwareUpload(payload=data))
|
|
|
|
if isinstance(resp, proto.Success):
|
|
|
|
return True
|
|
|
|
elif isinstance(resp, proto.Failure) and resp.code == types.Failure_FirmwareError:
|
|
|
|
return False
|
2017-11-06 10:09:54 +00:00
|
|
|
raise RuntimeError("Unexpected result %s" % resp)
|
2017-04-12 12:11:42 +00:00
|
|
|
|
|
|
|
# TREZORv2 method
|
|
|
|
if isinstance(resp, proto.FirmwareRequest):
|
|
|
|
import pyblake2
|
|
|
|
while True:
|
|
|
|
payload = data[resp.offset:resp.offset + resp.length]
|
|
|
|
digest = pyblake2.blake2s(payload).digest()
|
|
|
|
resp = self.call(proto.FirmwareUpload(payload=payload, hash=digest))
|
|
|
|
if isinstance(resp, proto.FirmwareRequest):
|
|
|
|
continue
|
|
|
|
elif isinstance(resp, proto.Success):
|
|
|
|
return True
|
|
|
|
elif isinstance(resp, proto.Failure) and resp.code == types.Failure_FirmwareError:
|
|
|
|
return False
|
2017-11-06 10:09:54 +00:00
|
|
|
raise RuntimeError("Unexpected result %s" % resp)
|
2017-04-12 12:11:42 +00:00
|
|
|
|
2017-11-06 10:09:54 +00:00
|
|
|
raise RuntimeError("Unexpected message %s" % resp)
|
2014-02-13 15:46:21 +00:00
|
|
|
|
2017-07-03 16:49:03 +00:00
|
|
|
@field('message')
|
|
|
|
@expect(proto.Success)
|
|
|
|
def self_test(self):
|
|
|
|
if self.features.bootloader_mode is False:
|
2017-11-06 10:09:54 +00:00
|
|
|
raise RuntimeError("Device must be in bootloader mode")
|
2017-07-03 16:49:03 +00:00
|
|
|
|
2017-07-10 17:01:14 +00:00
|
|
|
return self.call(proto.SelfTest(payload=b'\x00\xFF\x55\xAA\x66\x99\x33\xCCABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789!\x00\xFF\x55\xAA\x66\x99\x33\xCC'))
|
2017-07-03 16:49:03 +00:00
|
|
|
|
2017-06-23 19:31:42 +00:00
|
|
|
|
2014-02-13 16:20:40 +00:00
|
|
|
class TrezorClient(ProtocolMixin, TextUIMixin, BaseClient):
|
2014-02-13 15:46:21 +00:00
|
|
|
pass
|
|
|
|
|
2017-06-23 19:31:42 +00:00
|
|
|
|
2017-07-01 15:59:11 +00:00
|
|
|
class TrezorClientVerbose(ProtocolMixin, TextUIMixin, VerboseWireMixin, BaseClient):
|
2014-02-20 15:09:58 +00:00
|
|
|
pass
|
|
|
|
|
2017-06-23 19:31:42 +00:00
|
|
|
|
2017-07-01 15:59:11 +00:00
|
|
|
class TrezorClientDebugLink(ProtocolMixin, DebugLinkMixin, VerboseWireMixin, BaseClient):
|
2014-02-13 15:46:21 +00:00
|
|
|
pass
|