1
0
mirror of https://github.com/trezor/trezor-firmware.git synced 2024-12-22 22:38:08 +00:00
trezor-firmware/trezorlib/tools.py

253 lines
6.4 KiB
Python
Raw Normal View History

# This file is part of the Trezor project.
2016-11-25 21:53:55 +00:00
#
# Copyright (C) 2012-2018 SatoshiLabs and contributors
2016-11-25 21:53:55 +00:00
#
# This library is free software: you can redistribute it and/or modify
# it under the terms of the GNU Lesser General Public License version 3
# as published by the Free Software Foundation.
2016-11-25 21:53:55 +00:00
#
# This library is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU Lesser General Public License for more details.
#
# You should have received a copy of the License along with this library.
# If not, see <https://www.gnu.org/licenses/lgpl-3.0.html>.
2016-11-25 21:53:55 +00:00
2018-08-06 14:15:44 +00:00
import functools
2014-01-14 13:29:18 +00:00
import hashlib
import re
import struct
import unicodedata
2018-08-13 16:21:24 +00:00
from typing import List, NewType
from .coins import slip44
HARDENED_FLAG = 1 << 31
2018-08-13 16:21:24 +00:00
Address = NewType("Address", List[int])
def H_(x: int) -> int:
"""
Shortcut function that "hardens" a number in a BIP44 path.
"""
return x | HARDENED_FLAG
2014-01-14 13:29:18 +00:00
2017-06-23 19:31:42 +00:00
def btc_hash(data):
"""
Double-SHA256 hash as used in BTC
"""
2017-06-23 19:31:42 +00:00
return hashlib.sha256(hashlib.sha256(data).digest()).digest()
2014-01-14 13:29:18 +00:00
def hash_160(public_key):
2018-08-13 16:21:24 +00:00
md = hashlib.new("ripemd160")
2014-01-14 13:29:18 +00:00
md.update(hashlib.sha256(public_key).digest())
return md.digest()
def hash_160_to_bc_address(h160, address_type):
2018-08-13 16:21:24 +00:00
vh160 = struct.pack("<B", address_type) + h160
h = btc_hash(vh160)
2014-01-14 13:29:18 +00:00
addr = vh160 + h[0:4]
return b58encode(addr)
2017-06-23 19:31:42 +00:00
2014-01-14 13:29:18 +00:00
def compress_pubkey(public_key):
2018-02-27 15:30:32 +00:00
if public_key[0] == 4:
return bytes((public_key[64] & 1) + 2) + public_key[1:33]
raise ValueError("Pubkey is already compressed")
2014-01-14 13:29:18 +00:00
2017-06-23 19:31:42 +00:00
2014-01-14 13:29:18 +00:00
def public_key_to_bc_address(public_key, address_type, compress=True):
2018-08-13 16:21:24 +00:00
if public_key[0] == "\x04" and compress:
2014-01-14 13:29:18 +00:00
public_key = compress_pubkey(public_key)
h160 = hash_160(public_key)
return hash_160_to_bc_address(h160, address_type)
2017-06-23 19:31:42 +00:00
2018-08-13 16:21:24 +00:00
__b58chars = "123456789ABCDEFGHJKLMNPQRSTUVWXYZabcdefghijkmnopqrstuvwxyz"
2013-12-30 22:34:56 +00:00
__b58base = len(__b58chars)
2017-06-23 19:31:42 +00:00
2013-12-30 22:34:56 +00:00
def b58encode(v):
""" encode v, which is a string of bytes, to base58."""
long_value = 0
for c in v:
long_value = long_value * 256 + c
2013-12-30 22:34:56 +00:00
2018-08-13 16:21:24 +00:00
result = ""
2013-12-30 22:34:56 +00:00
while long_value >= __b58base:
div, mod = divmod(long_value, __b58base)
result = __b58chars[mod] + result
long_value = div
result = __b58chars[long_value] + result
# Bitcoin does a little leading-zero-compression:
# leading 0-bytes in the input become leading-1s
nPad = 0
for c in v:
if c == 0:
2013-12-30 22:34:56 +00:00
nPad += 1
else:
break
return (__b58chars[0] * nPad) + result
2017-06-23 19:31:42 +00:00
2013-12-30 22:34:56 +00:00
def b58decode(v, length):
""" decode v into a string of len bytes."""
long_value = 0
2013-12-30 22:34:56 +00:00
for (i, c) in enumerate(v[::-1]):
long_value += __b58chars.find(c) * (__b58base ** i)
2018-08-13 16:21:24 +00:00
result = b""
2013-12-30 22:34:56 +00:00
while long_value >= 256:
div, mod = divmod(long_value, 256)
2018-08-13 16:21:24 +00:00
result = struct.pack("B", mod) + result
2013-12-30 22:34:56 +00:00
long_value = div
2018-08-13 16:21:24 +00:00
result = struct.pack("B", long_value) + result
2013-12-30 22:34:56 +00:00
nPad = 0
for c in v:
if c == __b58chars[0]:
nPad += 1
else:
break
2018-08-13 16:21:24 +00:00
result = b"\x00" * nPad + result
2013-12-30 22:34:56 +00:00
if length is not None and len(result) != length:
return None
return result
def parse_path(nstr: str) -> Address:
"""
Convert BIP32 path string to list of uint32 integers with hardened flags.
Several conventions are supported to set the hardened flag: -1, 1', 1h
e.g.: "0/1h/1" -> [0, 0x80000001, 1]
:param nstr: path string
:return: list of integers
"""
if not nstr:
return []
2018-08-13 16:21:24 +00:00
n = nstr.split("/")
# m/a/b/c => a/b/c
2018-08-13 16:21:24 +00:00
if n[0] == "m":
n = n[1:]
# coin_name/a/b/c => 44'/SLIP44_constant'/a/b/c
if n[0] in slip44:
coin_id = slip44[n[0]]
2018-08-13 16:21:24 +00:00
n[0:1] = ["44h", "{}h".format(coin_id)]
def str_to_harden(x: str) -> int:
2018-08-13 16:21:24 +00:00
if x.startswith("-"):
return H_(abs(int(x)))
2018-08-13 16:21:24 +00:00
elif x.endswith(("h", "'")):
return H_(int(x[:-1]))
else:
return int(x)
try:
return [str_to_harden(x) for x in n]
except Exception:
2018-08-13 16:21:24 +00:00
raise ValueError("Invalid BIP32 path", nstr)
def normalize_nfc(txt):
2018-08-13 16:21:24 +00:00
"""
Normalize message to NFC and return bytes suitable for protobuf.
This seems to be bitcoin-qt standard of doing things.
2018-08-13 16:21:24 +00:00
"""
if isinstance(txt, bytes):
2018-08-13 16:21:24 +00:00
txt = txt.decode("utf-8")
return unicodedata.normalize("NFC", txt).encode("utf-8")
class CallException(Exception):
pass
class expect:
# Decorator checks if the method
# returned one of expected protobuf messages
# or raises an exception
def __init__(self, expected, field=None):
self.expected = expected
self.field = field
def __call__(self, f):
@functools.wraps(f)
def wrapped_f(*args, **kwargs):
ret = f(*args, **kwargs)
if not isinstance(ret, self.expected):
2018-08-13 16:21:24 +00:00
raise RuntimeError(
"Got %s, expected %s" % (ret.__class__, self.expected)
)
if self.field is not None:
return getattr(ret, self.field)
else:
return ret
return wrapped_f
def session(f):
# Decorator wraps a BaseClient method
# with session activation / deactivation
@functools.wraps(f)
def wrapped_f(*args, **kwargs):
2018-08-13 16:21:24 +00:00
__tracebackhide__ = True # for pytest # pylint: disable=W0612
client = args[0]
client.transport.session_begin()
try:
return f(*args, **kwargs)
finally:
client.transport.session_end()
2018-08-13 16:21:24 +00:00
return wrapped_f
# de-camelcasifier
# https://stackoverflow.com/a/1176023/222189
FIRST_CAP_RE = re.compile("(.)([A-Z][a-z]+)")
ALL_CAP_RE = re.compile("([a-z0-9])([A-Z])")
def from_camelcase(s):
s = FIRST_CAP_RE.sub(r"\1_\2", s)
return ALL_CAP_RE.sub(r"\1_\2", s).lower()
def dict_from_camelcase(d, renames=None):
if not isinstance(d, dict):
return d
if renames is None:
renames = {}
res = {}
for key, value in d.items():
newkey = from_camelcase(key)
renamed_key = renames.get(newkey) or renames.get(key)
if renamed_key:
newkey = renamed_key
if isinstance(value, list):
res[newkey] = [dict_from_camelcase(v, renames) for v in value]
else:
res[newkey] = dict_from_camelcase(value, renames)
return res