mirror of
https://github.com/trezor/trezor-firmware.git
synced 2024-12-27 00:28:10 +00:00
upgrade black to 19.10b0
This commit is contained in:
parent
e25a7ebb7f
commit
1f6cc77dec
6
Pipfile.lock
generated
6
Pipfile.lock
generated
@ -45,11 +45,11 @@
|
|||||||
},
|
},
|
||||||
"black": {
|
"black": {
|
||||||
"hashes": [
|
"hashes": [
|
||||||
"sha256:09a9dcb7c46ed496a9850b76e4e825d6049ecd38b611f1224857a79bd985a8cf",
|
"sha256:1b30e59be925fafc1ee4565e5e08abef6b03fe455102883820fe5ee2e4734e0b",
|
||||||
"sha256:68950ffd4d9169716bcb8719a56c07a2f4485354fec061cdd5910aa07369731c"
|
"sha256:c2edb73a08e9e0e6f65a0e6af18b059b8b1cdd5bef997d7a0b181df93dc81539"
|
||||||
],
|
],
|
||||||
"index": "pypi",
|
"index": "pypi",
|
||||||
"version": "==19.3b0"
|
"version": "==19.10b0"
|
||||||
},
|
},
|
||||||
"certifi": {
|
"certifi": {
|
||||||
"hashes": [
|
"hashes": [
|
||||||
|
@ -59,7 +59,7 @@ async def ensure_sd_card(ctx: wire.GenericContext) -> None:
|
|||||||
|
|
||||||
|
|
||||||
async def request_sd_salt(
|
async def request_sd_salt(
|
||||||
ctx: wire.GenericContext = wire.DUMMY_CONTEXT
|
ctx: wire.GenericContext = wire.DUMMY_CONTEXT,
|
||||||
) -> Optional[bytearray]:
|
) -> Optional[bytearray]:
|
||||||
if not storage.sd_salt.is_enabled():
|
if not storage.sd_salt.is_enabled():
|
||||||
return None
|
return None
|
||||||
|
@ -176,9 +176,7 @@ _U2F_REGISTER_ID = const(0x05) # version 2 registration identifier
|
|||||||
_U2F_ATT_PRIV_KEY = b"q&\xac+\xf6D\xdca\x86\xad\x83\xef\x1f\xcd\xf1*W\xb5\xcf\xa2\x00\x0b\x8a\xd0'\xe9V\xe8T\xc5\n\x8b"
|
_U2F_ATT_PRIV_KEY = b"q&\xac+\xf6D\xdca\x86\xad\x83\xef\x1f\xcd\xf1*W\xb5\xcf\xa2\x00\x0b\x8a\xd0'\xe9V\xe8T\xc5\n\x8b"
|
||||||
_U2F_ATT_CERT = b"0\x82\x01\x180\x81\xc0\x02\t\x00\xb1\xd9\x8fBdr\xd3,0\n\x06\x08*\x86H\xce=\x04\x03\x020\x151\x130\x11\x06\x03U\x04\x03\x0c\nTrezor U2F0\x1e\x17\r160429133153Z\x17\r260427133153Z0\x151\x130\x11\x06\x03U\x04\x03\x0c\nTrezor U2F0Y0\x13\x06\x07*\x86H\xce=\x02\x01\x06\x08*\x86H\xce=\x03\x01\x07\x03B\x00\x04\xd9\x18\xbd\xfa\x8aT\xac\x92\xe9\r\xa9\x1f\xcaz\xa2dT\xc0\xd1s61M\xde\x83\xa5K\x86\xb5\xdfN\xf0Re\x9a\x1do\xfc\xb7F\x7f\x1a\xcd\xdb\x8a3\x08\x0b^\xed\x91\x89\x13\xf4C\xa5&\x1b\xc7{h`o\xc10\n\x06\x08*\x86H\xce=\x04\x03\x02\x03G\x000D\x02 $\x1e\x81\xff\xd2\xe5\xe6\x156\x94\xc3U.\x8f\xeb\xd7\x1e\x895\x92\x1c\xb4\x83ACq\x1cv\xea\xee\xf3\x95\x02 _\x80\xeb\x10\xf2\\\xcc9\x8b<\xa8\xa9\xad\xa4\x02\x7f\x93\x13 w\xb7\xab\xcewFZ'\xf5=3\xa1\x1d"
|
_U2F_ATT_CERT = b"0\x82\x01\x180\x81\xc0\x02\t\x00\xb1\xd9\x8fBdr\xd3,0\n\x06\x08*\x86H\xce=\x04\x03\x020\x151\x130\x11\x06\x03U\x04\x03\x0c\nTrezor U2F0\x1e\x17\r160429133153Z\x17\r260427133153Z0\x151\x130\x11\x06\x03U\x04\x03\x0c\nTrezor U2F0Y0\x13\x06\x07*\x86H\xce=\x02\x01\x06\x08*\x86H\xce=\x03\x01\x07\x03B\x00\x04\xd9\x18\xbd\xfa\x8aT\xac\x92\xe9\r\xa9\x1f\xcaz\xa2dT\xc0\xd1s61M\xde\x83\xa5K\x86\xb5\xdfN\xf0Re\x9a\x1do\xfc\xb7F\x7f\x1a\xcd\xdb\x8a3\x08\x0b^\xed\x91\x89\x13\xf4C\xa5&\x1b\xc7{h`o\xc10\n\x06\x08*\x86H\xce=\x04\x03\x02\x03G\x000D\x02 $\x1e\x81\xff\xd2\xe5\xe6\x156\x94\xc3U.\x8f\xeb\xd7\x1e\x895\x92\x1c\xb4\x83ACq\x1cv\xea\xee\xf3\x95\x02 _\x80\xeb\x10\xf2\\\xcc9\x8b<\xa8\xa9\xad\xa4\x02\x7f\x93\x13 w\xb7\xab\xcewFZ'\xf5=3\xa1\x1d"
|
||||||
_BOGUS_APPID = b"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"
|
_BOGUS_APPID = b"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"
|
||||||
_AAGUID = (
|
_AAGUID = b"\xd6\xd0\xbd\xc3b\xee\xc4\xdb\xde\x8dzenJD\x87" # First 16 bytes of SHA-256("TREZOR 2")
|
||||||
b"\xd6\xd0\xbd\xc3b\xee\xc4\xdb\xde\x8dzenJD\x87"
|
|
||||||
) # First 16 bytes of SHA-256("TREZOR 2")
|
|
||||||
_BOGUS_PRIV_KEY = b"\xAA" * 32
|
_BOGUS_PRIV_KEY = b"\xAA" * 32
|
||||||
|
|
||||||
# authentication control byte
|
# authentication control byte
|
||||||
|
@ -263,9 +263,13 @@ def combine_mnemonics(mnemonics: List[str]) -> Tuple[int, int, bytes, int]:
|
|||||||
if not mnemonics:
|
if not mnemonics:
|
||||||
raise MnemonicError("The list of mnemonics is empty.")
|
raise MnemonicError("The list of mnemonics is empty.")
|
||||||
|
|
||||||
identifier, iteration_exponent, group_threshold, group_count, groups = _decode_mnemonics(
|
(
|
||||||
mnemonics
|
identifier,
|
||||||
)
|
iteration_exponent,
|
||||||
|
group_threshold,
|
||||||
|
group_count,
|
||||||
|
groups,
|
||||||
|
) = _decode_mnemonics(mnemonics)
|
||||||
|
|
||||||
if len(groups) != group_threshold:
|
if len(groups) != group_threshold:
|
||||||
raise MnemonicError(
|
raise MnemonicError(
|
||||||
@ -316,9 +320,13 @@ def decode_mnemonic(mnemonic: str) -> Share:
|
|||||||
tmp = _int_from_indices(
|
tmp = _int_from_indices(
|
||||||
mnemonic_data[_ID_EXP_LENGTH_WORDS : _ID_EXP_LENGTH_WORDS + 2]
|
mnemonic_data[_ID_EXP_LENGTH_WORDS : _ID_EXP_LENGTH_WORDS + 2]
|
||||||
)
|
)
|
||||||
group_index, group_threshold, group_count, member_index, member_threshold = _int_to_indices(
|
(
|
||||||
tmp, 5, 4
|
group_index,
|
||||||
)
|
group_threshold,
|
||||||
|
group_count,
|
||||||
|
member_index,
|
||||||
|
member_threshold,
|
||||||
|
) = _int_to_indices(tmp, 5, 4)
|
||||||
value_data = mnemonic_data[_ID_EXP_LENGTH_WORDS + 2 : -_CHECKSUM_LENGTH_WORDS]
|
value_data = mnemonic_data[_ID_EXP_LENGTH_WORDS + 2 : -_CHECKSUM_LENGTH_WORDS]
|
||||||
|
|
||||||
if group_count < group_threshold:
|
if group_count < group_threshold:
|
||||||
@ -585,7 +593,7 @@ def _encode_mnemonic(
|
|||||||
|
|
||||||
|
|
||||||
def _decode_mnemonics(
|
def _decode_mnemonics(
|
||||||
mnemonics: List[str]
|
mnemonics: List[str],
|
||||||
) -> Tuple[int, int, int, int, MnemonicGroups]:
|
) -> Tuple[int, int, int, int, MnemonicGroups]:
|
||||||
identifiers = set()
|
identifiers = set()
|
||||||
iteration_exponents = set()
|
iteration_exponents = set()
|
||||||
|
Loading…
Reference in New Issue
Block a user