1
0
mirror of https://github.com/trezor/trezor-firmware.git synced 2024-11-16 04:29:08 +00:00
trezor-firmware/src/apps/common/seed.py

98 lines
2.8 KiB
Python
Raw Normal View History

from trezor import ui, wire
2018-02-27 15:35:21 +00:00
from trezor.crypto import bip32, bip39
2018-07-03 14:20:26 +00:00
2018-02-27 15:35:21 +00:00
from apps.common import cache, storage
from apps.common.request_passphrase import protect_by_passphrase
2018-11-14 18:58:07 +00:00
allow = list
2018-11-13 16:09:52 +00:00
class Keychain:
2018-11-14 18:58:07 +00:00
"""
Keychain provides an API for deriving HD keys from previously allowed
key-spaces.
"""
2018-11-13 16:09:52 +00:00
def __init__(self, seed: bytes, namespaces: list):
self.seed = seed
self.namespaces = namespaces
self.roots = [None] * len(namespaces)
def __del__(self):
for root in self.roots:
if root is not None:
root.__del__()
del self.roots
del self.seed
2018-11-14 18:58:07 +00:00
def derive(self, node_path: list, curve_name: str = "secp256k1") -> bip32.HDNode:
# find the root node index
2018-11-14 18:58:07 +00:00
root_index = 0
for curve, *path in self.namespaces:
2018-11-14 18:58:07 +00:00
prefix = node_path[: len(path)]
suffix = node_path[len(path) :]
if curve == curve_name and path == prefix:
break
root_index += 1
else:
raise wire.DataError("Forbidden key path")
# create the root node if not cached
root = self.roots[root_index]
if root is None:
root = bip32.from_seed(self.seed, curve_name)
root.derive_path(path)
self.roots[root_index] = root
2018-11-14 18:58:07 +00:00
# derive child node from the root
node = root.clone()
2018-11-14 18:58:07 +00:00
node.derive_path(suffix)
2018-11-13 16:09:52 +00:00
return node
async def get_keychain(ctx: wire.Context, namespaces: list) -> Keychain:
if not storage.is_initialized():
2018-07-03 14:20:58 +00:00
raise wire.ProcessError("Device is not initialized")
2018-11-13 16:09:52 +00:00
seed = cache.get_seed()
if seed is None:
2018-11-14 18:58:07 +00:00
# derive seed from mnemonic and passphrase
2018-11-13 16:09:52 +00:00
passphrase = cache.get_passphrase()
if passphrase is None:
passphrase = await protect_by_passphrase(ctx)
cache.set_passphrase(passphrase)
_start_bip39_progress()
seed = bip39.seed(storage.get_mnemonic(), passphrase, _render_bip39_progress)
cache.set_seed(seed)
keychain = Keychain(seed, namespaces)
2018-11-13 16:09:52 +00:00
return keychain
def _start_bip39_progress():
ui.display.clear()
ui.header("Please wait")
ui.display.refresh()
def _render_bip39_progress(progress: int, total: int):
p = int(1000 * progress / total)
ui.display.loader(p, 18, ui.WHITE, ui.BG)
ui.display.refresh()
2018-07-03 14:20:58 +00:00
def derive_node_without_passphrase(
2018-11-14 18:58:07 +00:00
path: list, curve_name: str = "secp256k1"
2018-07-03 14:20:58 +00:00
) -> bip32.HDNode:
if not storage.is_initialized():
2018-07-03 14:20:58 +00:00
raise Exception("Device is not initialized")
seed = bip39.seed(storage.get_mnemonic(), "")
node = bip32.from_seed(seed, curve_name)
node.derive_path(path)
return node
2018-05-11 13:31:53 +00:00
def remove_ed25519_prefix(pubkey: bytes) -> bytes:
2018-05-11 13:31:53 +00:00
# 0x01 prefix is not part of the actual public key, hence removed
return pubkey[1:]