mirror of
https://github.com/trezor/trezor-firmware.git
synced 2025-08-01 19:38:33 +00:00
refactor(core): separate Cardano cryptography into its own module
This commit is contained in:
parent
eacaffd079
commit
387466e073
@ -104,6 +104,7 @@ SOURCE_MOD += [
|
|||||||
]
|
]
|
||||||
if EVERYTHING:
|
if EVERYTHING:
|
||||||
SOURCE_MOD += [
|
SOURCE_MOD += [
|
||||||
|
'vendor/trezor-crypto/cardano.c',
|
||||||
'vendor/trezor-crypto/monero/base58.c',
|
'vendor/trezor-crypto/monero/base58.c',
|
||||||
'vendor/trezor-crypto/monero/serialize.c',
|
'vendor/trezor-crypto/monero/serialize.c',
|
||||||
'vendor/trezor-crypto/monero/xmr.c',
|
'vendor/trezor-crypto/monero/xmr.c',
|
||||||
|
@ -102,6 +102,7 @@ SOURCE_MOD += [
|
|||||||
]
|
]
|
||||||
if EVERYTHING:
|
if EVERYTHING:
|
||||||
SOURCE_MOD += [
|
SOURCE_MOD += [
|
||||||
|
'vendor/trezor-crypto/cardano.c',
|
||||||
'vendor/trezor-crypto/monero/base58.c',
|
'vendor/trezor-crypto/monero/base58.c',
|
||||||
'vendor/trezor-crypto/monero/serialize.c',
|
'vendor/trezor-crypto/monero/serialize.c',
|
||||||
'vendor/trezor-crypto/monero/xmr.c',
|
'vendor/trezor-crypto/monero/xmr.c',
|
||||||
|
35
core/embed/extmod/modtrezorcrypto/hdnode.h
Normal file
35
core/embed/extmod/modtrezorcrypto/hdnode.h
Normal file
@ -0,0 +1,35 @@
|
|||||||
|
/*
|
||||||
|
* This file is part of the Trezor project, https://trezor.io/
|
||||||
|
*
|
||||||
|
* Copyright (c) SatoshiLabs
|
||||||
|
*
|
||||||
|
* This program is free software: you can redistribute it and/or modify
|
||||||
|
* it under the terms of the GNU General Public License as published by
|
||||||
|
* the Free Software Foundation, either version 3 of the License, or
|
||||||
|
* (at your option) any later version.
|
||||||
|
*
|
||||||
|
* This program is distributed in the hope that it will be useful,
|
||||||
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
* GNU General Public License for more details.
|
||||||
|
*
|
||||||
|
* You should have received a copy of the GNU General Public License
|
||||||
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#ifndef __HDNODE_H__
|
||||||
|
#define __HDNODE_H__
|
||||||
|
|
||||||
|
#include "py/obj.h"
|
||||||
|
|
||||||
|
#include "bip32.h"
|
||||||
|
|
||||||
|
typedef struct _mp_obj_HDNode_t {
|
||||||
|
mp_obj_base_t base;
|
||||||
|
uint32_t fingerprint;
|
||||||
|
HDNode hdnode;
|
||||||
|
} mp_obj_HDNode_t;
|
||||||
|
|
||||||
|
extern const mp_obj_type_t mod_trezorcrypto_HDNode_type;
|
||||||
|
|
||||||
|
#endif
|
@ -20,6 +20,7 @@
|
|||||||
#include "py/objstr.h"
|
#include "py/objstr.h"
|
||||||
|
|
||||||
#include "embed/extmod/trezorobj.h"
|
#include "embed/extmod/trezorobj.h"
|
||||||
|
#include "hdnode.h"
|
||||||
|
|
||||||
#include "bip32.h"
|
#include "bip32.h"
|
||||||
#include "bip39.h"
|
#include "bip39.h"
|
||||||
@ -35,13 +36,6 @@
|
|||||||
/// """
|
/// """
|
||||||
/// BIP0032 HD node structure.
|
/// BIP0032 HD node structure.
|
||||||
/// """
|
/// """
|
||||||
typedef struct _mp_obj_HDNode_t {
|
|
||||||
mp_obj_base_t base;
|
|
||||||
uint32_t fingerprint;
|
|
||||||
HDNode hdnode;
|
|
||||||
} mp_obj_HDNode_t;
|
|
||||||
|
|
||||||
STATIC const mp_obj_type_t mod_trezorcrypto_HDNode_type;
|
|
||||||
|
|
||||||
/// def __init__(
|
/// def __init__(
|
||||||
/// self,
|
/// self,
|
||||||
@ -183,43 +177,6 @@ STATIC MP_DEFINE_CONST_FUN_OBJ_VAR_BETWEEN(mod_trezorcrypto_HDNode_derive_obj,
|
|||||||
2, 3,
|
2, 3,
|
||||||
mod_trezorcrypto_HDNode_derive);
|
mod_trezorcrypto_HDNode_derive);
|
||||||
|
|
||||||
#if !BITCOIN_ONLY
|
|
||||||
|
|
||||||
/// def derive_cardano(self, index: int) -> None:
|
|
||||||
/// """
|
|
||||||
/// Derive a BIP0032 child node in place using Cardano algorithm.
|
|
||||||
/// """
|
|
||||||
STATIC mp_obj_t mod_trezorcrypto_HDNode_derive_cardano(mp_obj_t self,
|
|
||||||
mp_obj_t index) {
|
|
||||||
mp_obj_HDNode_t *o = MP_OBJ_TO_PTR(self);
|
|
||||||
uint32_t i = mp_obj_get_int_truncated(index);
|
|
||||||
uint32_t fp = hdnode_fingerprint(&o->hdnode);
|
|
||||||
|
|
||||||
int res = 0;
|
|
||||||
// same as in derive
|
|
||||||
if (0 ==
|
|
||||||
memcmp(o->hdnode.private_key,
|
|
||||||
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
|
|
||||||
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
|
|
||||||
32)) {
|
|
||||||
memzero(&o->hdnode, sizeof(o->hdnode));
|
|
||||||
mp_raise_ValueError("Failed to derive, private key not set");
|
|
||||||
}
|
|
||||||
// special for cardano
|
|
||||||
res = hdnode_private_ckd_cardano(&o->hdnode, i);
|
|
||||||
if (!res) {
|
|
||||||
memzero(&o->hdnode, sizeof(o->hdnode));
|
|
||||||
mp_raise_ValueError("Failed to derive");
|
|
||||||
}
|
|
||||||
o->fingerprint = fp;
|
|
||||||
|
|
||||||
return mp_const_none;
|
|
||||||
}
|
|
||||||
STATIC MP_DEFINE_CONST_FUN_OBJ_2(mod_trezorcrypto_HDNode_derive_cardano_obj,
|
|
||||||
mod_trezorcrypto_HDNode_derive_cardano);
|
|
||||||
|
|
||||||
#endif
|
|
||||||
|
|
||||||
/// def derive_path(self, path: Sequence[int]) -> None:
|
/// def derive_path(self, path: Sequence[int]) -> None:
|
||||||
/// """
|
/// """
|
||||||
/// Go through a list of indexes and iteratively derive a child node in
|
/// Go through a list of indexes and iteratively derive a child node in
|
||||||
@ -504,10 +461,6 @@ STATIC const mp_rom_map_elem_t mod_trezorcrypto_HDNode_locals_dict_table[] = {
|
|||||||
MP_ROM_PTR(&mod_trezorcrypto_HDNode___del___obj)},
|
MP_ROM_PTR(&mod_trezorcrypto_HDNode___del___obj)},
|
||||||
{MP_ROM_QSTR(MP_QSTR_derive),
|
{MP_ROM_QSTR(MP_QSTR_derive),
|
||||||
MP_ROM_PTR(&mod_trezorcrypto_HDNode_derive_obj)},
|
MP_ROM_PTR(&mod_trezorcrypto_HDNode_derive_obj)},
|
||||||
#if !BITCOIN_ONLY
|
|
||||||
{MP_ROM_QSTR(MP_QSTR_derive_cardano),
|
|
||||||
MP_ROM_PTR(&mod_trezorcrypto_HDNode_derive_cardano_obj)},
|
|
||||||
#endif
|
|
||||||
{MP_ROM_QSTR(MP_QSTR_derive_path),
|
{MP_ROM_QSTR(MP_QSTR_derive_path),
|
||||||
MP_ROM_PTR(&mod_trezorcrypto_HDNode_derive_path_obj)},
|
MP_ROM_PTR(&mod_trezorcrypto_HDNode_derive_path_obj)},
|
||||||
{MP_ROM_QSTR(MP_QSTR_serialize_public),
|
{MP_ROM_QSTR(MP_QSTR_serialize_public),
|
||||||
@ -542,7 +495,7 @@ STATIC const mp_rom_map_elem_t mod_trezorcrypto_HDNode_locals_dict_table[] = {
|
|||||||
STATIC MP_DEFINE_CONST_DICT(mod_trezorcrypto_HDNode_locals_dict,
|
STATIC MP_DEFINE_CONST_DICT(mod_trezorcrypto_HDNode_locals_dict,
|
||||||
mod_trezorcrypto_HDNode_locals_dict_table);
|
mod_trezorcrypto_HDNode_locals_dict_table);
|
||||||
|
|
||||||
STATIC const mp_obj_type_t mod_trezorcrypto_HDNode_type = {
|
const mp_obj_type_t mod_trezorcrypto_HDNode_type = {
|
||||||
{&mp_type_type},
|
{&mp_type_type},
|
||||||
.name = MP_QSTR_HDNode,
|
.name = MP_QSTR_HDNode,
|
||||||
.make_new = mod_trezorcrypto_HDNode_make_new,
|
.make_new = mod_trezorcrypto_HDNode_make_new,
|
||||||
@ -569,14 +522,7 @@ STATIC mp_obj_t mod_trezorcrypto_bip32_from_seed(mp_obj_t seed,
|
|||||||
}
|
}
|
||||||
|
|
||||||
HDNode hdnode = {0};
|
HDNode hdnode = {0};
|
||||||
int res = 0;
|
int res = hdnode_from_seed(seedb.buf, seedb.len, curveb.buf, &hdnode);
|
||||||
if (strcmp(curveb.buf, ED25519_CARDANO_NAME) != 0) {
|
|
||||||
res = hdnode_from_seed(seedb.buf, seedb.len, curveb.buf, &hdnode);
|
|
||||||
#if !BITCOIN_ONLY
|
|
||||||
} else {
|
|
||||||
res = hdnode_from_seed_cardano(seedb.buf, seedb.len, &hdnode);
|
|
||||||
#endif
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!res) {
|
if (!res) {
|
||||||
mp_raise_ValueError("Failed to derive the root node");
|
mp_raise_ValueError("Failed to derive the root node");
|
||||||
@ -591,67 +537,11 @@ STATIC mp_obj_t mod_trezorcrypto_bip32_from_seed(mp_obj_t seed,
|
|||||||
STATIC MP_DEFINE_CONST_FUN_OBJ_2(mod_trezorcrypto_bip32_from_seed_obj,
|
STATIC MP_DEFINE_CONST_FUN_OBJ_2(mod_trezorcrypto_bip32_from_seed_obj,
|
||||||
mod_trezorcrypto_bip32_from_seed);
|
mod_trezorcrypto_bip32_from_seed);
|
||||||
|
|
||||||
#if !BITCOIN_ONLY
|
|
||||||
|
|
||||||
/// def from_mnemonic_cardano(mnemonic: str, passphrase: str) -> HDNode:
|
|
||||||
/// """
|
|
||||||
/// Construct a HD node from a BIP-0039 mnemonic using the Icarus derivation
|
|
||||||
/// scheme, aka v2 derivation scheme.
|
|
||||||
/// """
|
|
||||||
STATIC mp_obj_t mod_trezorcrypto_bip32_from_mnemonic_cardano(
|
|
||||||
mp_obj_t mnemonic, mp_obj_t passphrase) {
|
|
||||||
mp_buffer_info_t mnemo = {0}, phrase = {0};
|
|
||||||
mp_get_buffer_raise(mnemonic, &mnemo, MP_BUFFER_READ);
|
|
||||||
mp_get_buffer_raise(passphrase, &phrase, MP_BUFFER_READ);
|
|
||||||
HDNode hdnode = {0};
|
|
||||||
const char *pmnemonic = mnemo.len > 0 ? mnemo.buf : "";
|
|
||||||
const char *ppassphrase = phrase.len > 0 ? phrase.buf : "";
|
|
||||||
|
|
||||||
uint8_t mnemonic_bits[64] = {0};
|
|
||||||
int mnemonic_bits_len = mnemonic_to_bits(pmnemonic, mnemonic_bits);
|
|
||||||
|
|
||||||
if (mnemonic_bits_len == 0) {
|
|
||||||
mp_raise_ValueError("Invalid mnemonic");
|
|
||||||
}
|
|
||||||
|
|
||||||
// BEWARE: passing of mnemonic_bits (i.e. entropy + checksum bits) into
|
|
||||||
// hdnode_from_entropy_cardano_icarus() is actually not correct and we should
|
|
||||||
// be passing the entropy alone. However, the bug is there since Cardano
|
|
||||||
// support has been launched for Trezor and its reversal would result in
|
|
||||||
// people with a 24-word mnemonic on Trezor losing access to their Cardano
|
|
||||||
// funds. More info at https://github.com/trezor/trezor-firmware/issues/1387
|
|
||||||
const int res = hdnode_from_entropy_cardano_icarus(
|
|
||||||
(const uint8_t *)ppassphrase, phrase.len, mnemonic_bits,
|
|
||||||
mnemonic_bits_len / 8, &hdnode);
|
|
||||||
|
|
||||||
if (!res) {
|
|
||||||
mp_raise_ValueError(
|
|
||||||
"Secret key generation from mnemonic is looping forever");
|
|
||||||
} else if (res == -1) {
|
|
||||||
mp_raise_ValueError("Invalid mnemonic");
|
|
||||||
}
|
|
||||||
|
|
||||||
mp_obj_HDNode_t *o = m_new_obj_with_finaliser(mp_obj_HDNode_t);
|
|
||||||
o->base.type = &mod_trezorcrypto_HDNode_type;
|
|
||||||
o->hdnode = hdnode;
|
|
||||||
o->fingerprint = 0;
|
|
||||||
return MP_OBJ_FROM_PTR(o);
|
|
||||||
}
|
|
||||||
STATIC MP_DEFINE_CONST_FUN_OBJ_2(
|
|
||||||
mod_trezorcrypto_bip32_from_mnemonic_cardano_obj,
|
|
||||||
mod_trezorcrypto_bip32_from_mnemonic_cardano);
|
|
||||||
|
|
||||||
#endif
|
|
||||||
|
|
||||||
STATIC const mp_rom_map_elem_t mod_trezorcrypto_bip32_globals_table[] = {
|
STATIC const mp_rom_map_elem_t mod_trezorcrypto_bip32_globals_table[] = {
|
||||||
{MP_ROM_QSTR(MP_QSTR___name__), MP_ROM_QSTR(MP_QSTR_bip32)},
|
{MP_ROM_QSTR(MP_QSTR___name__), MP_ROM_QSTR(MP_QSTR_bip32)},
|
||||||
{MP_ROM_QSTR(MP_QSTR_HDNode), MP_ROM_PTR(&mod_trezorcrypto_HDNode_type)},
|
{MP_ROM_QSTR(MP_QSTR_HDNode), MP_ROM_PTR(&mod_trezorcrypto_HDNode_type)},
|
||||||
{MP_ROM_QSTR(MP_QSTR_from_seed),
|
{MP_ROM_QSTR(MP_QSTR_from_seed),
|
||||||
MP_ROM_PTR(&mod_trezorcrypto_bip32_from_seed_obj)},
|
MP_ROM_PTR(&mod_trezorcrypto_bip32_from_seed_obj)},
|
||||||
#if !BITCOIN_ONLY
|
|
||||||
{MP_ROM_QSTR(MP_QSTR_from_mnemonic_cardano),
|
|
||||||
MP_ROM_PTR(&mod_trezorcrypto_bip32_from_mnemonic_cardano_obj)},
|
|
||||||
#endif
|
|
||||||
};
|
};
|
||||||
STATIC MP_DEFINE_CONST_DICT(mod_trezorcrypto_bip32_globals,
|
STATIC MP_DEFINE_CONST_DICT(mod_trezorcrypto_bip32_globals,
|
||||||
mod_trezorcrypto_bip32_globals_table);
|
mod_trezorcrypto_bip32_globals_table);
|
||||||
|
@ -113,15 +113,6 @@ STATIC mp_obj_t mod_trezorcrypto_bip39_check(mp_obj_t mnemonic) {
|
|||||||
STATIC MP_DEFINE_CONST_FUN_OBJ_1(mod_trezorcrypto_bip39_check_obj,
|
STATIC MP_DEFINE_CONST_FUN_OBJ_1(mod_trezorcrypto_bip39_check_obj,
|
||||||
mod_trezorcrypto_bip39_check);
|
mod_trezorcrypto_bip39_check);
|
||||||
|
|
||||||
static mp_obj_t ui_wait_callback = mp_const_none;
|
|
||||||
|
|
||||||
static void wrapped_ui_wait_callback(uint32_t current, uint32_t total) {
|
|
||||||
if (mp_obj_is_callable(ui_wait_callback)) {
|
|
||||||
mp_call_function_2_protected(ui_wait_callback, mp_obj_new_int(current),
|
|
||||||
mp_obj_new_int(total));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/// def seed(
|
/// def seed(
|
||||||
/// mnemonic: str,
|
/// mnemonic: str,
|
||||||
/// passphrase: str,
|
/// passphrase: str,
|
||||||
|
168
core/embed/extmod/modtrezorcrypto/modtrezorcrypto-cardano.h
Normal file
168
core/embed/extmod/modtrezorcrypto/modtrezorcrypto-cardano.h
Normal file
@ -0,0 +1,168 @@
|
|||||||
|
/*
|
||||||
|
* This file is part of the Trezor project, https://trezor.io/
|
||||||
|
*
|
||||||
|
* Copyright (c) SatoshiLabs
|
||||||
|
*
|
||||||
|
* This program is free software: you can redistribute it and/or modify
|
||||||
|
* it under the terms of the GNU General Public License as published by
|
||||||
|
* the Free Software Foundation, either version 3 of the License, or
|
||||||
|
* (at your option) any later version.
|
||||||
|
*
|
||||||
|
* This program is distributed in the hope that it will be useful,
|
||||||
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
* GNU General Public License for more details.
|
||||||
|
*
|
||||||
|
* You should have received a copy of the GNU General Public License
|
||||||
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#if !BITCOIN_ONLY
|
||||||
|
|
||||||
|
#include "py/objstr.h"
|
||||||
|
|
||||||
|
#include "embed/extmod/trezorobj.h"
|
||||||
|
#include "hdnode.h"
|
||||||
|
|
||||||
|
#include "bip39.h"
|
||||||
|
#include "cardano.h"
|
||||||
|
#include "curves.h"
|
||||||
|
#include "memzero.h"
|
||||||
|
|
||||||
|
/// package: trezorcrypto.cardano
|
||||||
|
|
||||||
|
/// def derive_icarus_trezor(
|
||||||
|
/// mnemonic: str,
|
||||||
|
/// passphrase: str,
|
||||||
|
/// callback: Callable[[int, int], None] | None = None,
|
||||||
|
/// ) -> bytes:
|
||||||
|
/// """
|
||||||
|
/// Derives a Cardano master secret from a mnemonic and passphrase using the
|
||||||
|
/// Icarus-Trezor derivation scheme. This differs from the Icarus scheme by
|
||||||
|
/// including checksum if the mnemonic is 24 words.
|
||||||
|
/// """
|
||||||
|
STATIC mp_obj_t mod_trezorcrypto_cardano_derive_icarus_trezor(
|
||||||
|
size_t n_args, const mp_obj_t *args) {
|
||||||
|
mp_buffer_info_t mnemo = {0}, phrase = {0};
|
||||||
|
mp_get_buffer_raise(args[0], &mnemo, MP_BUFFER_READ);
|
||||||
|
mp_get_buffer_raise(args[1], &phrase, MP_BUFFER_READ);
|
||||||
|
const char *pmnemonic = mnemo.len > 0 ? mnemo.buf : "";
|
||||||
|
const char *ppassphrase = phrase.len > 0 ? phrase.buf : "";
|
||||||
|
|
||||||
|
uint8_t mnemonic_bits[64] = {0};
|
||||||
|
int mnemonic_bits_len = mnemonic_to_bits(pmnemonic, mnemonic_bits);
|
||||||
|
|
||||||
|
if (mnemonic_bits_len == 0) {
|
||||||
|
mp_raise_ValueError("Invalid mnemonic");
|
||||||
|
}
|
||||||
|
|
||||||
|
vstr_t vstr = {0};
|
||||||
|
vstr_init_len(&vstr, CARDANO_SECRET_LENGTH);
|
||||||
|
|
||||||
|
void (*callback)(uint32_t current, uint32_t total) = NULL;
|
||||||
|
if (n_args > 2) {
|
||||||
|
// generate with a progress callback
|
||||||
|
ui_wait_callback = args[2];
|
||||||
|
callback = wrapped_ui_wait_callback;
|
||||||
|
}
|
||||||
|
|
||||||
|
// BEWARE: unlike `derive_icarus`, we are passing the raw result of
|
||||||
|
// `mnemonic_bits`, i.e., entropy + checksum bits. More info at
|
||||||
|
// https://github.com/trezor/trezor-firmware/issues/1387 and CIP-3
|
||||||
|
const int res = secret_from_entropy_cardano_icarus(
|
||||||
|
(const uint8_t *)ppassphrase, phrase.len, mnemonic_bits,
|
||||||
|
mnemonic_bits_len / 8, (uint8_t *)vstr.buf, callback);
|
||||||
|
|
||||||
|
ui_wait_callback = mp_const_none;
|
||||||
|
|
||||||
|
if (res != 1) {
|
||||||
|
mp_raise_msg(&mp_type_RuntimeError,
|
||||||
|
"Unexpected failure in Icarus derivation.");
|
||||||
|
}
|
||||||
|
|
||||||
|
return mp_obj_new_str_from_vstr(&mp_type_bytes, &vstr);
|
||||||
|
}
|
||||||
|
|
||||||
|
STATIC MP_DEFINE_CONST_FUN_OBJ_VAR_BETWEEN(
|
||||||
|
mod_trezorcrypto_cardano_derive_icarus_trezor_obj, 2, 3,
|
||||||
|
mod_trezorcrypto_cardano_derive_icarus_trezor);
|
||||||
|
|
||||||
|
/// def from_secret(secret: bytes) -> HDNode:
|
||||||
|
/// """
|
||||||
|
/// Creates a Cardano HD node from a master secret.
|
||||||
|
/// """
|
||||||
|
STATIC mp_obj_t mod_trezorcrypto_from_secret(mp_obj_t secret) {
|
||||||
|
mp_buffer_info_t bufinfo;
|
||||||
|
mp_get_buffer_raise(secret, &bufinfo, MP_BUFFER_READ);
|
||||||
|
if (bufinfo.len != CARDANO_SECRET_LENGTH) {
|
||||||
|
mp_raise_ValueError("Invalid secret length");
|
||||||
|
}
|
||||||
|
|
||||||
|
mp_obj_HDNode_t *o = m_new_obj_with_finaliser(mp_obj_HDNode_t);
|
||||||
|
o->base.type = &mod_trezorcrypto_HDNode_type;
|
||||||
|
const int res = hdnode_from_secret_cardano(bufinfo.buf, &o->hdnode);
|
||||||
|
if (res != 1) {
|
||||||
|
mp_raise_msg(&mp_type_RuntimeError,
|
||||||
|
"Unexpected failure in constructing Cardano node.");
|
||||||
|
}
|
||||||
|
o->fingerprint = hdnode_fingerprint(&o->hdnode);
|
||||||
|
return MP_OBJ_FROM_PTR(o);
|
||||||
|
}
|
||||||
|
|
||||||
|
STATIC MP_DEFINE_CONST_FUN_OBJ_1(mod_trezorcrypto_from_secret_obj,
|
||||||
|
mod_trezorcrypto_from_secret);
|
||||||
|
|
||||||
|
/// def from_seed_slip23(seed: bytes) -> HDNode:
|
||||||
|
/// """
|
||||||
|
/// Creates a Cardano HD node from a seed via SLIP-23 derivation.
|
||||||
|
/// """
|
||||||
|
STATIC mp_obj_t mod_trezorcrypto_from_seed_slip23(mp_obj_t seed) {
|
||||||
|
mp_buffer_info_t bufinfo;
|
||||||
|
mp_get_buffer_raise(seed, &bufinfo, MP_BUFFER_READ);
|
||||||
|
if (bufinfo.len == 0) {
|
||||||
|
mp_raise_ValueError("Invalid seed");
|
||||||
|
}
|
||||||
|
|
||||||
|
uint8_t secret[CARDANO_SECRET_LENGTH] = {0};
|
||||||
|
HDNode hdnode = {0};
|
||||||
|
int res = 0;
|
||||||
|
|
||||||
|
res = secret_from_seed_cardano_slip23(bufinfo.buf, bufinfo.len, secret);
|
||||||
|
if (res != 1) {
|
||||||
|
mp_raise_msg(&mp_type_RuntimeError,
|
||||||
|
"Unexpected failure in SLIP-23 derivation.");
|
||||||
|
}
|
||||||
|
res = hdnode_from_secret_cardano(secret, &hdnode);
|
||||||
|
if (res != 1) {
|
||||||
|
mp_raise_msg(&mp_type_RuntimeError,
|
||||||
|
"Unexpected failure in constructing Cardano node.");
|
||||||
|
}
|
||||||
|
|
||||||
|
mp_obj_HDNode_t *o = m_new_obj_with_finaliser(mp_obj_HDNode_t);
|
||||||
|
o->base.type = &mod_trezorcrypto_HDNode_type;
|
||||||
|
o->hdnode = hdnode;
|
||||||
|
o->fingerprint = hdnode_fingerprint(&o->hdnode);
|
||||||
|
return MP_OBJ_FROM_PTR(o);
|
||||||
|
}
|
||||||
|
|
||||||
|
STATIC MP_DEFINE_CONST_FUN_OBJ_1(mod_trezorcrypto_from_seed_slip23_obj,
|
||||||
|
mod_trezorcrypto_from_seed_slip23);
|
||||||
|
|
||||||
|
STATIC const mp_rom_map_elem_t mod_trezorcrypto_cardano_globals_table[] = {
|
||||||
|
{MP_ROM_QSTR(MP_QSTR___name__), MP_ROM_QSTR(MP_QSTR_cardano)},
|
||||||
|
{MP_ROM_QSTR(MP_QSTR_derive_icarus_trezor),
|
||||||
|
MP_ROM_PTR(&mod_trezorcrypto_cardano_derive_icarus_trezor_obj)},
|
||||||
|
{MP_ROM_QSTR(MP_QSTR_from_secret),
|
||||||
|
MP_ROM_PTR(&mod_trezorcrypto_from_secret_obj)},
|
||||||
|
{MP_ROM_QSTR(MP_QSTR_from_seed_slip23),
|
||||||
|
MP_ROM_PTR(&mod_trezorcrypto_from_seed_slip23_obj)},
|
||||||
|
};
|
||||||
|
STATIC MP_DEFINE_CONST_DICT(mod_trezorcrypto_cardano_globals,
|
||||||
|
mod_trezorcrypto_cardano_globals_table);
|
||||||
|
|
||||||
|
STATIC const mp_obj_module_t mod_trezorcrypto_cardano_module = {
|
||||||
|
.base = {&mp_type_module},
|
||||||
|
.globals = (mp_obj_dict_t *)&mod_trezorcrypto_cardano_globals,
|
||||||
|
};
|
||||||
|
|
||||||
|
#endif // !BITCOIN_ONLY
|
@ -27,6 +27,15 @@
|
|||||||
|
|
||||||
#if MICROPY_PY_TREZORCRYPTO
|
#if MICROPY_PY_TREZORCRYPTO
|
||||||
|
|
||||||
|
static mp_obj_t ui_wait_callback = mp_const_none;
|
||||||
|
|
||||||
|
static void wrapped_ui_wait_callback(uint32_t current, uint32_t total) {
|
||||||
|
if (mp_obj_is_callable(ui_wait_callback)) {
|
||||||
|
mp_call_function_2_protected(ui_wait_callback, mp_obj_new_int(current),
|
||||||
|
mp_obj_new_int(total));
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
#include "modtrezorcrypto-aes.h"
|
#include "modtrezorcrypto-aes.h"
|
||||||
#include "modtrezorcrypto-bip32.h"
|
#include "modtrezorcrypto-bip32.h"
|
||||||
#include "modtrezorcrypto-bip39.h"
|
#include "modtrezorcrypto-bip39.h"
|
||||||
@ -55,6 +64,7 @@
|
|||||||
#include "modtrezorcrypto-shamir.h"
|
#include "modtrezorcrypto-shamir.h"
|
||||||
#include "modtrezorcrypto-slip39.h"
|
#include "modtrezorcrypto-slip39.h"
|
||||||
#if !BITCOIN_ONLY
|
#if !BITCOIN_ONLY
|
||||||
|
#include "modtrezorcrypto-cardano.h"
|
||||||
#include "modtrezorcrypto-monero.h"
|
#include "modtrezorcrypto-monero.h"
|
||||||
#include "modtrezorcrypto-nem.h"
|
#include "modtrezorcrypto-nem.h"
|
||||||
#endif
|
#endif
|
||||||
@ -68,6 +78,10 @@ STATIC const mp_rom_map_elem_t mp_module_trezorcrypto_globals_table[] = {
|
|||||||
MP_ROM_PTR(&mod_trezorcrypto_Blake256_type)},
|
MP_ROM_PTR(&mod_trezorcrypto_Blake256_type)},
|
||||||
{MP_ROM_QSTR(MP_QSTR_blake2b), MP_ROM_PTR(&mod_trezorcrypto_Blake2b_type)},
|
{MP_ROM_QSTR(MP_QSTR_blake2b), MP_ROM_PTR(&mod_trezorcrypto_Blake2b_type)},
|
||||||
{MP_ROM_QSTR(MP_QSTR_blake2s), MP_ROM_PTR(&mod_trezorcrypto_Blake2s_type)},
|
{MP_ROM_QSTR(MP_QSTR_blake2s), MP_ROM_PTR(&mod_trezorcrypto_Blake2s_type)},
|
||||||
|
#if !BITCOIN_ONLY
|
||||||
|
{MP_ROM_QSTR(MP_QSTR_cardano),
|
||||||
|
MP_ROM_PTR(&mod_trezorcrypto_cardano_module)},
|
||||||
|
#endif
|
||||||
{MP_ROM_QSTR(MP_QSTR_chacha20poly1305),
|
{MP_ROM_QSTR(MP_QSTR_chacha20poly1305),
|
||||||
MP_ROM_PTR(&mod_trezorcrypto_ChaCha20Poly1305_type)},
|
MP_ROM_PTR(&mod_trezorcrypto_ChaCha20Poly1305_type)},
|
||||||
{MP_ROM_QSTR(MP_QSTR_crc), MP_ROM_PTR(&mod_trezorcrypto_crc_module)},
|
{MP_ROM_QSTR(MP_QSTR_crc), MP_ROM_PTR(&mod_trezorcrypto_crc_module)},
|
||||||
|
@ -25,11 +25,6 @@ class HDNode:
|
|||||||
Derive a BIP0032 child node in place.
|
Derive a BIP0032 child node in place.
|
||||||
"""
|
"""
|
||||||
|
|
||||||
def derive_cardano(self, index: int) -> None:
|
|
||||||
"""
|
|
||||||
Derive a BIP0032 child node in place using Cardano algorithm.
|
|
||||||
"""
|
|
||||||
|
|
||||||
def derive_path(self, path: Sequence[int]) -> None:
|
def derive_path(self, path: Sequence[int]) -> None:
|
||||||
"""
|
"""
|
||||||
Go through a list of indexes and iteratively derive a child node in
|
Go through a list of indexes and iteratively derive a child node in
|
||||||
@ -114,11 +109,3 @@ def from_seed(seed: bytes, curve_name: str) -> HDNode:
|
|||||||
"""
|
"""
|
||||||
Construct a BIP0032 HD node from a BIP0039 seed value.
|
Construct a BIP0032 HD node from a BIP0039 seed value.
|
||||||
"""
|
"""
|
||||||
|
|
||||||
|
|
||||||
# extmod/modtrezorcrypto/modtrezorcrypto-bip32.h
|
|
||||||
def from_mnemonic_cardano(mnemonic: str, passphrase: str) -> HDNode:
|
|
||||||
"""
|
|
||||||
Construct a HD node from a BIP-0039 mnemonic using the Icarus derivation
|
|
||||||
scheme, aka v2 derivation scheme.
|
|
||||||
"""
|
|
||||||
|
28
core/mocks/generated/trezorcrypto/cardano.pyi
Normal file
28
core/mocks/generated/trezorcrypto/cardano.pyi
Normal file
@ -0,0 +1,28 @@
|
|||||||
|
from typing import *
|
||||||
|
|
||||||
|
|
||||||
|
# extmod/modtrezorcrypto/modtrezorcrypto-cardano.h
|
||||||
|
def derive_icarus_trezor(
|
||||||
|
mnemonic: str,
|
||||||
|
passphrase: str,
|
||||||
|
callback: Callable[[int, int], None] | None = None,
|
||||||
|
) -> bytes:
|
||||||
|
"""
|
||||||
|
Derives a Cardano master secret from a mnemonic and passphrase using the
|
||||||
|
Icarus-Trezor derivation scheme. This differs from the Icarus scheme by
|
||||||
|
including checksum if the mnemonic is 24 words.
|
||||||
|
"""
|
||||||
|
|
||||||
|
|
||||||
|
# extmod/modtrezorcrypto/modtrezorcrypto-cardano.h
|
||||||
|
def from_secret(secret: bytes) -> HDNode:
|
||||||
|
"""
|
||||||
|
Creates a Cardano HD node from a master secret.
|
||||||
|
"""
|
||||||
|
|
||||||
|
|
||||||
|
# extmod/modtrezorcrypto/modtrezorcrypto-cardano.h
|
||||||
|
def from_seed_slip23(seed: bytes) -> HDNode:
|
||||||
|
"""
|
||||||
|
Creates a Cardano HD node from a seed via SLIP-23 derivation.
|
||||||
|
"""
|
@ -2,6 +2,7 @@ from trezorcrypto import ( # noqa: F401
|
|||||||
aes,
|
aes,
|
||||||
bip32,
|
bip32,
|
||||||
bip39,
|
bip39,
|
||||||
|
cardano,
|
||||||
chacha20poly1305,
|
chacha20poly1305,
|
||||||
crc,
|
crc,
|
||||||
hmac,
|
hmac,
|
||||||
|
Loading…
Reference in New Issue
Block a user