mirror of
https://github.com/trezor/trezor-firmware.git
synced 2025-03-07 10:46:06 +00:00
commit
4c46a055ff
@ -422,7 +422,16 @@ STATIC mp_obj_t mod_trezorcrypto_HDNode_ethereum_pubkeyhash(mp_obj_t self) {
|
|||||||
}
|
}
|
||||||
STATIC MP_DEFINE_CONST_FUN_OBJ_1(mod_trezorcrypto_HDNode_ethereum_pubkeyhash_obj, mod_trezorcrypto_HDNode_ethereum_pubkeyhash);
|
STATIC MP_DEFINE_CONST_FUN_OBJ_1(mod_trezorcrypto_HDNode_ethereum_pubkeyhash_obj, mod_trezorcrypto_HDNode_ethereum_pubkeyhash);
|
||||||
|
|
||||||
|
STATIC mp_obj_t mod_trezorcrypto_HDNode___del__(mp_obj_t self) {
|
||||||
|
mp_obj_HDNode_t *o = MP_OBJ_TO_PTR(self);
|
||||||
|
o->fingerprint = 0;
|
||||||
|
memzero(&o->hdnode, sizeof(o->hdnode));
|
||||||
|
return mp_const_none;
|
||||||
|
}
|
||||||
|
STATIC MP_DEFINE_CONST_FUN_OBJ_1(mod_trezorcrypto_HDNode___del___obj, mod_trezorcrypto_HDNode___del__);
|
||||||
|
|
||||||
STATIC const mp_rom_map_elem_t mod_trezorcrypto_HDNode_locals_dict_table[] = {
|
STATIC const mp_rom_map_elem_t mod_trezorcrypto_HDNode_locals_dict_table[] = {
|
||||||
|
{ MP_ROM_QSTR(MP_QSTR___del__), MP_ROM_PTR(&mod_trezorcrypto_HDNode___del___obj) },
|
||||||
{ MP_ROM_QSTR(MP_QSTR_derive), MP_ROM_PTR(&mod_trezorcrypto_HDNode_derive_obj) },
|
{ MP_ROM_QSTR(MP_QSTR_derive), MP_ROM_PTR(&mod_trezorcrypto_HDNode_derive_obj) },
|
||||||
{ MP_ROM_QSTR(MP_QSTR_derive_cardano), MP_ROM_PTR(&mod_trezorcrypto_HDNode_derive_cardano_obj) },
|
{ MP_ROM_QSTR(MP_QSTR_derive_cardano), MP_ROM_PTR(&mod_trezorcrypto_HDNode_derive_cardano_obj) },
|
||||||
{ MP_ROM_QSTR(MP_QSTR_derive_path), MP_ROM_PTR(&mod_trezorcrypto_HDNode_derive_path_obj) },
|
{ MP_ROM_QSTR(MP_QSTR_derive_path), MP_ROM_PTR(&mod_trezorcrypto_HDNode_derive_path_obj) },
|
||||||
@ -539,9 +548,7 @@ STATIC mp_obj_t mod_trezorcrypto_bip32_from_mnemonic_cardano(mp_obj_t mnemonic,
|
|||||||
return MP_OBJ_FROM_PTR(o);
|
return MP_OBJ_FROM_PTR(o);
|
||||||
}
|
}
|
||||||
|
|
||||||
STATIC MP_DEFINE_CONST_FUN_OBJ_2(mod_trezorcrypto_bip32_from_mnemonic_cardano_obj,
|
STATIC MP_DEFINE_CONST_FUN_OBJ_2(mod_trezorcrypto_bip32_from_mnemonic_cardano_obj, mod_trezorcrypto_bip32_from_mnemonic_cardano);
|
||||||
mod_trezorcrypto_bip32_from_mnemonic_cardano);
|
|
||||||
|
|
||||||
|
|
||||||
STATIC const mp_rom_map_elem_t mod_trezorcrypto_bip32_globals_table[] = {
|
STATIC const mp_rom_map_elem_t mod_trezorcrypto_bip32_globals_table[] = {
|
||||||
{ MP_ROM_QSTR(MP_QSTR___name__), MP_ROM_QSTR(MP_QSTR_bip32) },
|
{ MP_ROM_QSTR(MP_QSTR___name__), MP_ROM_QSTR(MP_QSTR_bip32) },
|
||||||
|
@ -1,6 +1,10 @@
|
|||||||
from trezor import wire
|
from trezor import wire
|
||||||
from trezor.messages import MessageType
|
from trezor.messages import MessageType
|
||||||
|
|
||||||
|
from apps.common import HARDENED
|
||||||
|
|
||||||
|
SEED_NAMESPACE = [[HARDENED | 44, HARDENED | 1815]]
|
||||||
|
|
||||||
|
|
||||||
def boot():
|
def boot():
|
||||||
wire.add(MessageType.CardanoGetAddress, __name__, "get_address")
|
wire.add(MessageType.CardanoGetAddress, __name__, "get_address")
|
||||||
|
@ -1,8 +1,27 @@
|
|||||||
from trezor.crypto import base58, crc, hashlib
|
from trezor.crypto import base58, crc, hashlib
|
||||||
|
|
||||||
from . import cbor
|
from apps.cardano import cbor
|
||||||
|
from apps.common import HARDENED
|
||||||
|
from apps.common.seed import remove_ed25519_prefix
|
||||||
|
|
||||||
from apps.common import HARDENED, seed
|
|
||||||
|
def derive_address_and_node(keychain, path: list):
|
||||||
|
node = keychain.derive(path)
|
||||||
|
|
||||||
|
address_payload = None
|
||||||
|
address_attributes = {}
|
||||||
|
|
||||||
|
address_root = _get_address_root(node, address_payload)
|
||||||
|
address_type = 0
|
||||||
|
address_data = [address_root, address_attributes, address_type]
|
||||||
|
address_data_encoded = cbor.encode(address_data)
|
||||||
|
|
||||||
|
address = base58.encode(
|
||||||
|
cbor.encode(
|
||||||
|
[cbor.Tagged(24, address_data_encoded), crc.crc32(address_data_encoded)]
|
||||||
|
)
|
||||||
|
)
|
||||||
|
return (address, node)
|
||||||
|
|
||||||
|
|
||||||
def validate_full_path(path: list) -> bool:
|
def validate_full_path(path: list) -> bool:
|
||||||
@ -36,31 +55,9 @@ def _address_hash(data) -> bytes:
|
|||||||
|
|
||||||
|
|
||||||
def _get_address_root(node, payload):
|
def _get_address_root(node, payload):
|
||||||
extpubkey = seed.remove_ed25519_prefix(node.public_key()) + node.chain_code()
|
extpubkey = remove_ed25519_prefix(node.public_key()) + node.chain_code()
|
||||||
if payload:
|
if payload:
|
||||||
payload = {1: cbor.encode(payload)}
|
payload = {1: cbor.encode(payload)}
|
||||||
else:
|
else:
|
||||||
payload = {}
|
payload = {}
|
||||||
return _address_hash([0, [0, extpubkey], payload])
|
return _address_hash([0, [0, extpubkey], payload])
|
||||||
|
|
||||||
|
|
||||||
def derive_address_and_node(root_node, path: list):
|
|
||||||
derived_node = root_node.clone()
|
|
||||||
|
|
||||||
address_payload = None
|
|
||||||
address_attributes = {}
|
|
||||||
|
|
||||||
for indice in path:
|
|
||||||
derived_node.derive_cardano(indice)
|
|
||||||
|
|
||||||
address_root = _get_address_root(derived_node, address_payload)
|
|
||||||
address_type = 0
|
|
||||||
address_data = [address_root, address_attributes, address_type]
|
|
||||||
address_data_encoded = cbor.encode(address_data)
|
|
||||||
|
|
||||||
address = base58.encode(
|
|
||||||
cbor.encode(
|
|
||||||
[cbor.Tagged(24, address_data_encoded), crc.crc32(address_data_encoded)]
|
|
||||||
)
|
|
||||||
)
|
|
||||||
return (address, derived_node)
|
|
||||||
|
@ -1,28 +1,23 @@
|
|||||||
from trezor import log, ui, wire
|
from trezor import log, ui, wire
|
||||||
from trezor.crypto import bip32
|
|
||||||
from trezor.messages.CardanoAddress import CardanoAddress
|
from trezor.messages.CardanoAddress import CardanoAddress
|
||||||
|
|
||||||
from .address import derive_address_and_node, validate_full_path
|
from apps.cardano import seed
|
||||||
from .layout import confirm_with_pagination
|
from apps.cardano.address import derive_address_and_node, validate_full_path
|
||||||
|
from apps.cardano.layout import confirm_with_pagination
|
||||||
from apps.common import paths, seed, storage
|
from apps.common import paths
|
||||||
|
|
||||||
|
|
||||||
async def get_address(ctx, msg):
|
async def get_address(ctx, msg):
|
||||||
|
keychain = await seed.get_keychain(ctx)
|
||||||
|
|
||||||
await paths.validate_path(ctx, validate_full_path, path=msg.address_n)
|
await paths.validate_path(ctx, validate_full_path, path=msg.address_n)
|
||||||
|
|
||||||
mnemonic = storage.get_mnemonic()
|
|
||||||
passphrase = await seed._get_cached_passphrase(ctx)
|
|
||||||
root_node = bip32.from_mnemonic_cardano(mnemonic, passphrase)
|
|
||||||
|
|
||||||
try:
|
try:
|
||||||
address, _ = derive_address_and_node(root_node, msg.address_n)
|
address, _ = derive_address_and_node(keychain, msg.address_n)
|
||||||
except ValueError as e:
|
except ValueError as e:
|
||||||
if __debug__:
|
if __debug__:
|
||||||
log.exception(__name__, e)
|
log.exception(__name__, e)
|
||||||
raise wire.ProcessError("Deriving address failed")
|
raise wire.ProcessError("Deriving address failed")
|
||||||
mnemonic = None
|
|
||||||
root_node = None
|
|
||||||
|
|
||||||
if msg.show_display:
|
if msg.show_display:
|
||||||
if not await confirm_with_pagination(
|
if not await confirm_with_pagination(
|
||||||
|
@ -1,42 +1,38 @@
|
|||||||
from ubinascii import hexlify
|
from ubinascii import hexlify
|
||||||
|
|
||||||
from trezor import log, wire
|
from trezor import log, wire
|
||||||
from trezor.crypto import bip32
|
|
||||||
from trezor.messages.CardanoPublicKey import CardanoPublicKey
|
from trezor.messages.CardanoPublicKey import CardanoPublicKey
|
||||||
from trezor.messages.HDNodeType import HDNodeType
|
from trezor.messages.HDNodeType import HDNodeType
|
||||||
|
|
||||||
from .address import derive_address_and_node
|
from apps.cardano import seed
|
||||||
|
from apps.cardano.address import derive_address_and_node
|
||||||
from apps.common import layout, paths, seed, storage
|
from apps.common import layout, paths
|
||||||
|
from apps.common.seed import remove_ed25519_prefix
|
||||||
|
|
||||||
|
|
||||||
async def get_public_key(ctx, msg):
|
async def get_public_key(ctx, msg):
|
||||||
|
keychain = await seed.get_keychain(ctx)
|
||||||
|
|
||||||
await paths.validate_path(
|
await paths.validate_path(
|
||||||
ctx, paths.validate_path_for_get_public_key, path=msg.address_n, slip44_id=1815
|
ctx, paths.validate_path_for_get_public_key, path=msg.address_n, slip44_id=1815
|
||||||
)
|
)
|
||||||
|
|
||||||
mnemonic = storage.get_mnemonic()
|
|
||||||
passphrase = await seed._get_cached_passphrase(ctx)
|
|
||||||
root_node = bip32.from_mnemonic_cardano(mnemonic, passphrase)
|
|
||||||
|
|
||||||
try:
|
try:
|
||||||
key = _get_public_key(root_node, msg.address_n)
|
key = _get_public_key(keychain, msg.address_n)
|
||||||
except ValueError as e:
|
except ValueError as e:
|
||||||
if __debug__:
|
if __debug__:
|
||||||
log.exception(__name__, e)
|
log.exception(__name__, e)
|
||||||
raise wire.ProcessError("Deriving public key failed")
|
raise wire.ProcessError("Deriving public key failed")
|
||||||
mnemonic = None
|
|
||||||
root_node = None
|
|
||||||
|
|
||||||
if msg.show_display:
|
if msg.show_display:
|
||||||
await layout.show_pubkey(ctx, key.node.public_key)
|
await layout.show_pubkey(ctx, key.node.public_key)
|
||||||
return key
|
return key
|
||||||
|
|
||||||
|
|
||||||
def _get_public_key(root_node, derivation_path: list):
|
def _get_public_key(keychain, derivation_path: list):
|
||||||
_, node = derive_address_and_node(root_node, derivation_path)
|
_, node = derive_address_and_node(keychain, derivation_path)
|
||||||
|
|
||||||
public_key = hexlify(seed.remove_ed25519_prefix(node.public_key())).decode()
|
public_key = hexlify(remove_ed25519_prefix(node.public_key())).decode()
|
||||||
chain_code = hexlify(node.chain_code()).decode()
|
chain_code = hexlify(node.chain_code()).decode()
|
||||||
xpub_key = public_key + chain_code
|
xpub_key = public_key + chain_code
|
||||||
|
|
||||||
@ -45,7 +41,7 @@ def _get_public_key(root_node, derivation_path: list):
|
|||||||
child_num=node.child_num(),
|
child_num=node.child_num(),
|
||||||
fingerprint=node.fingerprint(),
|
fingerprint=node.fingerprint(),
|
||||||
chain_code=node.chain_code(),
|
chain_code=node.chain_code(),
|
||||||
public_key=seed.remove_ed25519_prefix(node.public_key()),
|
public_key=remove_ed25519_prefix(node.public_key()),
|
||||||
)
|
)
|
||||||
|
|
||||||
return CardanoPublicKey(node=node_type, xpub=xpub_key)
|
return CardanoPublicKey(node=node_type, xpub=xpub_key)
|
||||||
|
43
src/apps/cardano/seed.py
Normal file
43
src/apps/cardano/seed.py
Normal file
@ -0,0 +1,43 @@
|
|||||||
|
from trezor import wire
|
||||||
|
from trezor.crypto import bip32
|
||||||
|
|
||||||
|
from apps.cardano import SEED_NAMESPACE
|
||||||
|
from apps.common import cache, storage
|
||||||
|
from apps.common.request_passphrase import protect_by_passphrase
|
||||||
|
|
||||||
|
|
||||||
|
class Keychain:
|
||||||
|
def __init__(self, path: list, root: bip32.HDNode):
|
||||||
|
self.path = path
|
||||||
|
self.root = root
|
||||||
|
|
||||||
|
def derive(self, node_path: list) -> bip32.HDNode:
|
||||||
|
# check we are in the cardano namespace
|
||||||
|
prefix = node_path[: len(self.path)]
|
||||||
|
suffix = node_path[len(self.path) :]
|
||||||
|
if prefix != self.path:
|
||||||
|
raise wire.DataError("Forbidden key path")
|
||||||
|
# derive child node from the root
|
||||||
|
node = self.root.clone()
|
||||||
|
for i in suffix:
|
||||||
|
node.derive_cardano(i)
|
||||||
|
return node
|
||||||
|
|
||||||
|
|
||||||
|
async def get_keychain(ctx: wire.Context) -> Keychain:
|
||||||
|
if not storage.is_initialized():
|
||||||
|
raise wire.ProcessError("Device is not initialized")
|
||||||
|
|
||||||
|
# derive the root node from mnemonic and passphrase
|
||||||
|
passphrase = cache.get_passphrase()
|
||||||
|
if passphrase is None:
|
||||||
|
passphrase = await protect_by_passphrase(ctx)
|
||||||
|
cache.set_passphrase(passphrase)
|
||||||
|
root = bip32.from_mnemonic_cardano(storage.get_mnemonic(), passphrase)
|
||||||
|
|
||||||
|
# derive the namespaced root node
|
||||||
|
for i in SEED_NAMESPACE[0]:
|
||||||
|
root.derive_cardano(i)
|
||||||
|
|
||||||
|
keychain = Keychain(SEED_NAMESPACE[0], root)
|
||||||
|
return keychain
|
@ -1,18 +1,17 @@
|
|||||||
from trezor import log, ui, wire
|
from trezor import log, ui, wire
|
||||||
from trezor.crypto import base58, bip32, hashlib
|
from trezor.crypto import base58, hashlib
|
||||||
from trezor.crypto.curve import ed25519
|
from trezor.crypto.curve import ed25519
|
||||||
from trezor.messages.CardanoSignedTx import CardanoSignedTx
|
from trezor.messages.CardanoSignedTx import CardanoSignedTx
|
||||||
from trezor.messages.CardanoTxRequest import CardanoTxRequest
|
from trezor.messages.CardanoTxRequest import CardanoTxRequest
|
||||||
from trezor.messages.MessageType import CardanoTxAck
|
from trezor.messages.MessageType import CardanoTxAck
|
||||||
from trezor.ui.text import BR
|
from trezor.ui.text import BR
|
||||||
|
|
||||||
from .address import derive_address_and_node, validate_full_path
|
from apps.cardano import cbor, seed
|
||||||
from .layout import confirm_with_pagination, progress
|
from apps.cardano.address import derive_address_and_node, validate_full_path
|
||||||
|
from apps.cardano.layout import confirm_with_pagination, progress
|
||||||
from apps.cardano import cbor
|
|
||||||
from apps.common import seed, storage
|
|
||||||
from apps.common.layout import address_n_to_str, split_address
|
from apps.common.layout import address_n_to_str, split_address
|
||||||
from apps.common.paths import validate_path
|
from apps.common.paths import validate_path
|
||||||
|
from apps.common.seed import remove_ed25519_prefix
|
||||||
from apps.homescreen.homescreen import display_homescreen
|
from apps.homescreen.homescreen import display_homescreen
|
||||||
|
|
||||||
|
|
||||||
@ -80,9 +79,7 @@ async def request_transaction(ctx, tx_req: CardanoTxRequest, index: int):
|
|||||||
|
|
||||||
|
|
||||||
async def sign_tx(ctx, msg):
|
async def sign_tx(ctx, msg):
|
||||||
mnemonic = storage.get_mnemonic()
|
keychain = await seed.get_keychain(ctx)
|
||||||
passphrase = await seed._get_cached_passphrase(ctx)
|
|
||||||
root_node = bip32.from_mnemonic_cardano(mnemonic, passphrase)
|
|
||||||
|
|
||||||
progress.init(msg.transactions_count, "Loading data")
|
progress.init(msg.transactions_count, "Loading data")
|
||||||
|
|
||||||
@ -103,7 +100,7 @@ async def sign_tx(ctx, msg):
|
|||||||
|
|
||||||
# sign the transaction bundle and prepare the result
|
# sign the transaction bundle and prepare the result
|
||||||
transaction = Transaction(
|
transaction = Transaction(
|
||||||
msg.inputs, msg.outputs, transactions, root_node, msg.network
|
msg.inputs, msg.outputs, transactions, keychain, msg.network
|
||||||
)
|
)
|
||||||
tx_body, tx_hash = transaction.serialise_tx()
|
tx_body, tx_hash = transaction.serialise_tx()
|
||||||
tx = CardanoSignedTx(tx_body=tx_body, tx_hash=tx_hash)
|
tx = CardanoSignedTx(tx_body=tx_body, tx_hash=tx_hash)
|
||||||
@ -135,12 +132,12 @@ def _micro_ada_to_ada(amount: float) -> float:
|
|||||||
|
|
||||||
class Transaction:
|
class Transaction:
|
||||||
def __init__(
|
def __init__(
|
||||||
self, inputs: list, outputs: list, transactions: list, root_node, network: int
|
self, inputs: list, outputs: list, transactions: list, keychain, network: int
|
||||||
):
|
):
|
||||||
self.inputs = inputs
|
self.inputs = inputs
|
||||||
self.outputs = outputs
|
self.outputs = outputs
|
||||||
self.transactions = transactions
|
self.transactions = transactions
|
||||||
self.root_node = root_node
|
self.keychain = keychain
|
||||||
# attributes have to be always empty in current Cardano
|
# attributes have to be always empty in current Cardano
|
||||||
self.attributes = {}
|
self.attributes = {}
|
||||||
if network == 1:
|
if network == 1:
|
||||||
@ -170,7 +167,7 @@ class Transaction:
|
|||||||
|
|
||||||
nodes = []
|
nodes = []
|
||||||
for input in self.inputs:
|
for input in self.inputs:
|
||||||
_, node = derive_address_and_node(self.root_node, input.address_n)
|
_, node = derive_address_and_node(self.keychain, input.address_n)
|
||||||
nodes.append(node)
|
nodes.append(node)
|
||||||
|
|
||||||
for index, output_index in enumerate(output_indexes):
|
for index, output_index in enumerate(output_indexes):
|
||||||
@ -198,7 +195,7 @@ class Transaction:
|
|||||||
|
|
||||||
for output in self.outputs:
|
for output in self.outputs:
|
||||||
if output.address_n:
|
if output.address_n:
|
||||||
address, _ = derive_address_and_node(self.root_node, output.address_n)
|
address, _ = derive_address_and_node(self.keychain, output.address_n)
|
||||||
change_addresses.append(address)
|
change_addresses.append(address)
|
||||||
change_derivation_paths.append(output.address_n)
|
change_derivation_paths.append(output.address_n)
|
||||||
change_coins.append(output.amount)
|
change_coins.append(output.amount)
|
||||||
@ -225,7 +222,7 @@ class Transaction:
|
|||||||
node.private_key(), node.private_key_ext(), message
|
node.private_key(), node.private_key_ext(), message
|
||||||
)
|
)
|
||||||
extended_public_key = (
|
extended_public_key = (
|
||||||
seed.remove_ed25519_prefix(node.public_key()) + node.chain_code()
|
remove_ed25519_prefix(node.public_key()) + node.chain_code()
|
||||||
)
|
)
|
||||||
witnesses.append(
|
witnesses.append(
|
||||||
[
|
[
|
||||||
|
@ -4,41 +4,75 @@ from trezor.crypto import bip32, bip39
|
|||||||
from apps.common import cache, storage
|
from apps.common import cache, storage
|
||||||
from apps.common.request_passphrase import protect_by_passphrase
|
from apps.common.request_passphrase import protect_by_passphrase
|
||||||
|
|
||||||
_DEFAULT_CURVE = "secp256k1"
|
allow = list
|
||||||
|
|
||||||
|
|
||||||
async def derive_node(
|
class Keychain:
|
||||||
ctx: wire.Context, path: list, curve_name: str = _DEFAULT_CURVE
|
"""
|
||||||
) -> bip32.HDNode:
|
Keychain provides an API for deriving HD keys from previously allowed
|
||||||
seed = await _get_cached_seed(ctx)
|
key-spaces.
|
||||||
node = bip32.from_seed(seed, curve_name)
|
"""
|
||||||
node.derive_path(path)
|
|
||||||
return node
|
def __init__(self, seed: bytes, namespaces: list):
|
||||||
|
self.seed = seed
|
||||||
|
self.namespaces = namespaces
|
||||||
|
self.roots = [None] * len(namespaces)
|
||||||
|
|
||||||
|
def __del__(self):
|
||||||
|
for root in self.roots:
|
||||||
|
if root is not None:
|
||||||
|
root.__del__()
|
||||||
|
del self.roots
|
||||||
|
del self.seed
|
||||||
|
|
||||||
|
def derive(self, node_path: list, curve_name: str = "secp256k1") -> bip32.HDNode:
|
||||||
|
# find the root node index
|
||||||
|
root_index = 0
|
||||||
|
for curve, *path in self.namespaces:
|
||||||
|
prefix = node_path[: len(path)]
|
||||||
|
suffix = node_path[len(path) :]
|
||||||
|
if curve == curve_name and path == prefix:
|
||||||
|
break
|
||||||
|
root_index += 1
|
||||||
|
else:
|
||||||
|
raise wire.DataError("Forbidden key path")
|
||||||
|
|
||||||
|
# create the root node if not cached
|
||||||
|
root = self.roots[root_index]
|
||||||
|
if root is None:
|
||||||
|
root = bip32.from_seed(self.seed, curve_name)
|
||||||
|
root.derive_path(path)
|
||||||
|
self.roots[root_index] = root
|
||||||
|
|
||||||
|
# derive child node from the root
|
||||||
|
node = root.clone()
|
||||||
|
node.derive_path(suffix)
|
||||||
|
return node
|
||||||
|
|
||||||
|
|
||||||
async def _get_cached_seed(ctx: wire.Context) -> bytes:
|
async def get_keychain(ctx: wire.Context, namespaces: list) -> Keychain:
|
||||||
if not storage.is_initialized():
|
if not storage.is_initialized():
|
||||||
raise wire.ProcessError("Device is not initialized")
|
raise wire.ProcessError("Device is not initialized")
|
||||||
if cache.get_seed() is None:
|
|
||||||
passphrase = await _get_cached_passphrase(ctx)
|
seed = cache.get_seed()
|
||||||
|
if seed is None:
|
||||||
|
# derive seed from mnemonic and passphrase
|
||||||
|
passphrase = cache.get_passphrase()
|
||||||
|
if passphrase is None:
|
||||||
|
passphrase = await protect_by_passphrase(ctx)
|
||||||
|
cache.set_passphrase(passphrase)
|
||||||
seed = bip39.seed(storage.get_mnemonic(), passphrase)
|
seed = bip39.seed(storage.get_mnemonic(), passphrase)
|
||||||
cache.set_seed(seed)
|
cache.set_seed(seed)
|
||||||
return cache.get_seed()
|
|
||||||
|
|
||||||
|
keychain = Keychain(seed, namespaces)
|
||||||
async def _get_cached_passphrase(ctx: wire.Context) -> str:
|
return keychain
|
||||||
if cache.get_passphrase() is None:
|
|
||||||
passphrase = await protect_by_passphrase(ctx)
|
|
||||||
cache.set_passphrase(passphrase)
|
|
||||||
return cache.get_passphrase()
|
|
||||||
|
|
||||||
|
|
||||||
def derive_node_without_passphrase(
|
def derive_node_without_passphrase(
|
||||||
path: list, curve_name: str = _DEFAULT_CURVE
|
path: list, curve_name: str = "secp256k1"
|
||||||
) -> bip32.HDNode:
|
) -> bip32.HDNode:
|
||||||
if not storage.is_initialized():
|
if not storage.is_initialized():
|
||||||
raise Exception("Device is not initialized")
|
raise Exception("Device is not initialized")
|
||||||
|
|
||||||
seed = bip39.seed(storage.get_mnemonic(), "")
|
seed = bip39.seed(storage.get_mnemonic(), "")
|
||||||
node = bip32.from_seed(seed, curve_name)
|
node = bip32.from_seed(seed, curve_name)
|
||||||
node.derive_path(path)
|
node.derive_path(path)
|
||||||
|
@ -3,7 +3,7 @@ from ubinascii import hexlify
|
|||||||
from trezor.crypto.hashlib import blake256, sha256
|
from trezor.crypto.hashlib import blake256, sha256
|
||||||
from trezor.utils import HashWriter
|
from trezor.utils import HashWriter
|
||||||
|
|
||||||
from apps.wallet.sign_tx.signing import write_varint
|
from apps.wallet.sign_tx.writers import write_varint
|
||||||
|
|
||||||
|
|
||||||
def message_digest(coin, message):
|
def message_digest(coin, message):
|
||||||
|
@ -1,9 +1,12 @@
|
|||||||
from trezor import wire
|
from trezor import wire
|
||||||
from trezor.messages import MessageType
|
from trezor.messages import MessageType
|
||||||
|
|
||||||
|
from apps.common import HARDENED
|
||||||
|
|
||||||
|
|
||||||
def boot():
|
def boot():
|
||||||
wire.add(MessageType.EthereumGetAddress, __name__, "get_address")
|
ns = [["secp256k1", HARDENED | 44, HARDENED | 60]]
|
||||||
wire.add(MessageType.EthereumSignTx, __name__, "sign_tx")
|
wire.add(MessageType.EthereumGetAddress, __name__, "get_address", ns)
|
||||||
wire.add(MessageType.EthereumSignMessage, __name__, "sign_message")
|
wire.add(MessageType.EthereumSignTx, __name__, "sign_tx", ns)
|
||||||
|
wire.add(MessageType.EthereumSignMessage, __name__, "sign_message", ns)
|
||||||
wire.add(MessageType.EthereumVerifyMessage, __name__, "verify_message")
|
wire.add(MessageType.EthereumVerifyMessage, __name__, "verify_message")
|
||||||
|
@ -1,20 +1,17 @@
|
|||||||
from .address import ethereum_address_hex, validate_full_path
|
from trezor.crypto.curve import secp256k1
|
||||||
|
from trezor.crypto.hashlib import sha3_256
|
||||||
|
from trezor.messages.EthereumAddress import EthereumAddress
|
||||||
|
|
||||||
from apps.common import paths
|
from apps.common import paths
|
||||||
from apps.common.layout import address_n_to_str, show_address, show_qr
|
from apps.common.layout import address_n_to_str, show_address, show_qr
|
||||||
from apps.ethereum import networks
|
from apps.ethereum import networks
|
||||||
|
from apps.ethereum.address import ethereum_address_hex, validate_full_path
|
||||||
|
|
||||||
|
|
||||||
async def get_address(ctx, msg):
|
async def get_address(ctx, msg, keychain):
|
||||||
from trezor.messages.EthereumAddress import EthereumAddress
|
|
||||||
from trezor.crypto.curve import secp256k1
|
|
||||||
from trezor.crypto.hashlib import sha3_256
|
|
||||||
from apps.common import seed
|
|
||||||
|
|
||||||
await paths.validate_path(ctx, validate_full_path, path=msg.address_n)
|
await paths.validate_path(ctx, validate_full_path, path=msg.address_n)
|
||||||
|
|
||||||
node = await seed.derive_node(ctx, msg.address_n)
|
node = keychain.derive(msg.address_n)
|
||||||
|
|
||||||
seckey = node.private_key()
|
seckey = node.private_key()
|
||||||
public_key = secp256k1.publickey(seckey, False) # uncompressed
|
public_key = secp256k1.publickey(seckey, False) # uncompressed
|
||||||
address = sha3_256(public_key[1:], keccak=True).digest()[12:]
|
address = sha3_256(public_key[1:], keccak=True).digest()[12:]
|
||||||
|
@ -82,14 +82,14 @@ NETWORKS = [
|
|||||||
NetworkInfo(
|
NetworkInfo(
|
||||||
chain_id=30,
|
chain_id=30,
|
||||||
slip44=137,
|
slip44=137,
|
||||||
shortcut="RSK",
|
shortcut="RBTC",
|
||||||
name="RSK",
|
name="RSK",
|
||||||
rskip60=True,
|
rskip60=True,
|
||||||
),
|
),
|
||||||
NetworkInfo(
|
NetworkInfo(
|
||||||
chain_id=31,
|
chain_id=31,
|
||||||
slip44=37310,
|
slip44=37310,
|
||||||
shortcut="tRSK",
|
shortcut="tRBTC",
|
||||||
name="RSK Testnet",
|
name="RSK Testnet",
|
||||||
rskip60=True,
|
rskip60=True,
|
||||||
),
|
),
|
||||||
|
@ -4,11 +4,10 @@ from trezor.messages.EthereumMessageSignature import EthereumMessageSignature
|
|||||||
from trezor.ui.text import Text
|
from trezor.ui.text import Text
|
||||||
from trezor.utils import HashWriter
|
from trezor.utils import HashWriter
|
||||||
|
|
||||||
from .address import validate_full_path
|
from apps.common import paths
|
||||||
|
|
||||||
from apps.common import paths, seed
|
|
||||||
from apps.common.confirm import require_confirm
|
from apps.common.confirm import require_confirm
|
||||||
from apps.common.signverify import split_message
|
from apps.common.signverify import split_message
|
||||||
|
from apps.ethereum.address import validate_full_path
|
||||||
|
|
||||||
|
|
||||||
def message_digest(message):
|
def message_digest(message):
|
||||||
@ -20,12 +19,11 @@ def message_digest(message):
|
|||||||
return h.get_digest()
|
return h.get_digest()
|
||||||
|
|
||||||
|
|
||||||
async def sign_message(ctx, msg):
|
async def sign_message(ctx, msg, keychain):
|
||||||
await paths.validate_path(ctx, validate_full_path, path=msg.address_n)
|
await paths.validate_path(ctx, validate_full_path, path=msg.address_n)
|
||||||
await require_confirm_sign_message(ctx, msg.message)
|
await require_confirm_sign_message(ctx, msg.message)
|
||||||
|
|
||||||
node = await seed.derive_node(ctx, msg.address_n)
|
node = keychain.derive(msg.address_n)
|
||||||
|
|
||||||
signature = secp256k1.sign(
|
signature = secp256k1.sign(
|
||||||
node.private_key(),
|
node.private_key(),
|
||||||
message_digest(msg.message),
|
message_digest(msg.message),
|
||||||
|
@ -7,10 +7,9 @@ from trezor.messages.EthereumTxRequest import EthereumTxRequest
|
|||||||
from trezor.messages.MessageType import EthereumTxAck
|
from trezor.messages.MessageType import EthereumTxAck
|
||||||
from trezor.utils import HashWriter
|
from trezor.utils import HashWriter
|
||||||
|
|
||||||
from .address import validate_full_path
|
from apps.common import paths
|
||||||
|
|
||||||
from apps.common import paths, seed
|
|
||||||
from apps.ethereum import tokens
|
from apps.ethereum import tokens
|
||||||
|
from apps.ethereum.address import validate_full_path
|
||||||
from apps.ethereum.layout import (
|
from apps.ethereum.layout import (
|
||||||
require_confirm_data,
|
require_confirm_data,
|
||||||
require_confirm_fee,
|
require_confirm_fee,
|
||||||
@ -21,7 +20,7 @@ from apps.ethereum.layout import (
|
|||||||
MAX_CHAIN_ID = 2147483629
|
MAX_CHAIN_ID = 2147483629
|
||||||
|
|
||||||
|
|
||||||
async def sign_tx(ctx, msg):
|
async def sign_tx(ctx, msg, keychain):
|
||||||
msg = sanitize(msg)
|
msg = sanitize(msg)
|
||||||
check(msg)
|
check(msg)
|
||||||
await paths.validate_path(ctx, validate_full_path, path=msg.address_n)
|
await paths.validate_path(ctx, validate_full_path, path=msg.address_n)
|
||||||
@ -91,7 +90,9 @@ async def sign_tx(ctx, msg):
|
|||||||
sha.extend(rlp.encode(0))
|
sha.extend(rlp.encode(0))
|
||||||
|
|
||||||
digest = sha.get_digest()
|
digest = sha.get_digest()
|
||||||
return await send_signature(ctx, msg, digest)
|
result = sign_digest(msg, keychain, digest)
|
||||||
|
|
||||||
|
return result
|
||||||
|
|
||||||
|
|
||||||
def get_total_length(msg: EthereumSignTx, data_total: int) -> int:
|
def get_total_length(msg: EthereumSignTx, data_total: int) -> int:
|
||||||
@ -130,9 +131,8 @@ async def send_request_chunk(ctx, data_left: int):
|
|||||||
return await ctx.call(req, EthereumTxAck)
|
return await ctx.call(req, EthereumTxAck)
|
||||||
|
|
||||||
|
|
||||||
async def send_signature(ctx, msg: EthereumSignTx, digest):
|
def sign_digest(msg: EthereumSignTx, keychain, digest):
|
||||||
node = await seed.derive_node(ctx, msg.address_n)
|
node = keychain.derive(msg.address_n)
|
||||||
|
|
||||||
signature = secp256k1.sign(
|
signature = secp256k1.sign(
|
||||||
node.private_key(), digest, False, secp256k1.CANONICAL_SIG_ETHEREUM
|
node.private_key(), digest, False, secp256k1.CANONICAL_SIG_ETHEREUM
|
||||||
)
|
)
|
||||||
|
@ -1,10 +1,13 @@
|
|||||||
from trezor import wire
|
from trezor import wire
|
||||||
from trezor.messages import MessageType
|
from trezor.messages import MessageType
|
||||||
|
|
||||||
|
from apps.common import HARDENED
|
||||||
|
|
||||||
|
|
||||||
def boot():
|
def boot():
|
||||||
wire.add(MessageType.LiskGetPublicKey, __name__, "get_public_key")
|
ns = [["ed25519", HARDENED | 44, HARDENED | 134]]
|
||||||
wire.add(MessageType.LiskGetAddress, __name__, "get_address")
|
wire.add(MessageType.LiskGetPublicKey, __name__, "get_public_key", ns)
|
||||||
wire.add(MessageType.LiskSignMessage, __name__, "sign_message")
|
wire.add(MessageType.LiskGetAddress, __name__, "get_address", ns)
|
||||||
|
wire.add(MessageType.LiskSignTx, __name__, "sign_tx", ns)
|
||||||
|
wire.add(MessageType.LiskSignMessage, __name__, "sign_message", ns)
|
||||||
wire.add(MessageType.LiskVerifyMessage, __name__, "verify_message")
|
wire.add(MessageType.LiskVerifyMessage, __name__, "verify_message")
|
||||||
wire.add(MessageType.LiskSignTx, __name__, "sign_tx")
|
|
||||||
|
@ -2,14 +2,14 @@ from trezor.messages.LiskAddress import LiskAddress
|
|||||||
|
|
||||||
from .helpers import LISK_CURVE, get_address_from_public_key, validate_full_path
|
from .helpers import LISK_CURVE, get_address_from_public_key, validate_full_path
|
||||||
|
|
||||||
from apps.common import paths, seed
|
from apps.common import paths
|
||||||
from apps.common.layout import address_n_to_str, show_address, show_qr
|
from apps.common.layout import address_n_to_str, show_address, show_qr
|
||||||
|
|
||||||
|
|
||||||
async def get_address(ctx, msg):
|
async def get_address(ctx, msg, keychain):
|
||||||
await paths.validate_path(ctx, validate_full_path, path=msg.address_n)
|
await paths.validate_path(ctx, validate_full_path, path=msg.address_n)
|
||||||
|
|
||||||
node = await seed.derive_node(ctx, msg.address_n, LISK_CURVE)
|
node = keychain.derive(msg.address_n, LISK_CURVE)
|
||||||
pubkey = node.public_key()
|
pubkey = node.public_key()
|
||||||
pubkey = pubkey[1:] # skip ed25519 pubkey marker
|
pubkey = pubkey[1:] # skip ed25519 pubkey marker
|
||||||
address = get_address_from_public_key(pubkey)
|
address = get_address_from_public_key(pubkey)
|
||||||
|
@ -2,13 +2,13 @@ from trezor.messages.LiskPublicKey import LiskPublicKey
|
|||||||
|
|
||||||
from .helpers import LISK_CURVE, validate_full_path
|
from .helpers import LISK_CURVE, validate_full_path
|
||||||
|
|
||||||
from apps.common import layout, paths, seed
|
from apps.common import layout, paths
|
||||||
|
|
||||||
|
|
||||||
async def get_public_key(ctx, msg):
|
async def get_public_key(ctx, msg, keychain):
|
||||||
await paths.validate_path(ctx, validate_full_path, path=msg.address_n)
|
await paths.validate_path(ctx, validate_full_path, path=msg.address_n)
|
||||||
|
|
||||||
node = await seed.derive_node(ctx, msg.address_n, LISK_CURVE)
|
node = keychain.derive(msg.address_n, LISK_CURVE)
|
||||||
pubkey = node.public_key()
|
pubkey = node.public_key()
|
||||||
pubkey = pubkey[1:] # skip ed25519 pubkey marker
|
pubkey = pubkey[1:] # skip ed25519 pubkey marker
|
||||||
|
|
||||||
|
@ -6,10 +6,10 @@ from trezor.utils import HashWriter
|
|||||||
|
|
||||||
from .helpers import LISK_CURVE, validate_full_path
|
from .helpers import LISK_CURVE, validate_full_path
|
||||||
|
|
||||||
from apps.common import paths, seed
|
from apps.common import paths
|
||||||
from apps.common.confirm import require_confirm
|
from apps.common.confirm import require_confirm
|
||||||
from apps.common.signverify import split_message
|
from apps.common.signverify import split_message
|
||||||
from apps.wallet.sign_tx.signing import write_varint
|
from apps.wallet.sign_tx.writers import write_varint
|
||||||
|
|
||||||
|
|
||||||
def message_digest(message):
|
def message_digest(message):
|
||||||
@ -22,11 +22,11 @@ def message_digest(message):
|
|||||||
return sha256(h.get_digest()).digest()
|
return sha256(h.get_digest()).digest()
|
||||||
|
|
||||||
|
|
||||||
async def sign_message(ctx, msg):
|
async def sign_message(ctx, msg, keychain):
|
||||||
await paths.validate_path(ctx, validate_full_path, path=msg.address_n)
|
await paths.validate_path(ctx, validate_full_path, path=msg.address_n)
|
||||||
await require_confirm_sign_message(ctx, msg.message)
|
await require_confirm_sign_message(ctx, msg.message)
|
||||||
|
|
||||||
node = await seed.derive_node(ctx, msg.address_n, LISK_CURVE)
|
node = keychain.derive(msg.address_n, LISK_CURVE)
|
||||||
seckey = node.private_key()
|
seckey = node.private_key()
|
||||||
pubkey = node.public_key()
|
pubkey = node.public_key()
|
||||||
pubkey = pubkey[1:] # skip ed25519 pubkey marker
|
pubkey = pubkey[1:] # skip ed25519 pubkey marker
|
||||||
|
@ -7,16 +7,19 @@ from trezor.messages import LiskTransactionType
|
|||||||
from trezor.messages.LiskSignedTx import LiskSignedTx
|
from trezor.messages.LiskSignedTx import LiskSignedTx
|
||||||
from trezor.utils import HashWriter
|
from trezor.utils import HashWriter
|
||||||
|
|
||||||
from . import layout
|
from apps.common import paths
|
||||||
from .helpers import LISK_CURVE, get_address_from_public_key, validate_full_path
|
from apps.lisk import layout
|
||||||
|
from apps.lisk.helpers import (
|
||||||
from apps.common import paths, seed
|
LISK_CURVE,
|
||||||
|
get_address_from_public_key,
|
||||||
|
validate_full_path,
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
async def sign_tx(ctx, msg):
|
async def sign_tx(ctx, msg, keychain):
|
||||||
await paths.validate_path(ctx, validate_full_path, path=msg.address_n)
|
await paths.validate_path(ctx, validate_full_path, path=msg.address_n)
|
||||||
|
|
||||||
pubkey, seckey = await _get_keys(ctx, msg)
|
pubkey, seckey = _get_keys(keychain, msg)
|
||||||
transaction = _update_raw_tx(msg.transaction, pubkey)
|
transaction = _update_raw_tx(msg.transaction, pubkey)
|
||||||
|
|
||||||
try:
|
try:
|
||||||
@ -37,8 +40,8 @@ async def sign_tx(ctx, msg):
|
|||||||
return LiskSignedTx(signature=signature)
|
return LiskSignedTx(signature=signature)
|
||||||
|
|
||||||
|
|
||||||
async def _get_keys(ctx, msg):
|
def _get_keys(keychain, msg):
|
||||||
node = await seed.derive_node(ctx, msg.address_n, LISK_CURVE)
|
node = keychain.derive(msg.address_n, LISK_CURVE)
|
||||||
|
|
||||||
seckey = node.private_key()
|
seckey = node.private_key()
|
||||||
pubkey = node.public_key()
|
pubkey = node.public_key()
|
||||||
|
@ -1,12 +1,20 @@
|
|||||||
from trezor import wire
|
from trezor import wire
|
||||||
from trezor.messages import MessageType
|
from trezor.messages import MessageType
|
||||||
|
|
||||||
|
from apps.common import HARDENED
|
||||||
|
|
||||||
|
|
||||||
def boot():
|
def boot():
|
||||||
wire.add(MessageType.MoneroGetAddress, __name__, "get_address")
|
ns = [
|
||||||
wire.add(MessageType.MoneroGetWatchKey, __name__, "get_watch_only")
|
["secp256k1", HARDENED | 44, HARDENED | 128],
|
||||||
wire.add(MessageType.MoneroTransactionInitRequest, __name__, "sign_tx")
|
["ed25519", HARDENED | 44, HARDENED | 128],
|
||||||
wire.add(MessageType.MoneroKeyImageExportInitRequest, __name__, "key_image_sync")
|
]
|
||||||
|
wire.add(MessageType.MoneroGetAddress, __name__, "get_address", ns)
|
||||||
|
wire.add(MessageType.MoneroGetWatchKey, __name__, "get_watch_only", ns)
|
||||||
|
wire.add(MessageType.MoneroTransactionInitRequest, __name__, "sign_tx", ns)
|
||||||
|
wire.add(
|
||||||
|
MessageType.MoneroKeyImageExportInitRequest, __name__, "key_image_sync", ns
|
||||||
|
)
|
||||||
|
|
||||||
if __debug__ and hasattr(MessageType, "DebugMoneroDiagRequest"):
|
if __debug__ and hasattr(MessageType, "DebugMoneroDiagRequest"):
|
||||||
wire.add(MessageType.DebugMoneroDiagRequest, __name__, "diag")
|
wire.add(MessageType.DebugMoneroDiagRequest, __name__, "diag")
|
||||||
|
@ -5,10 +5,10 @@ from apps.common.layout import address_n_to_str, show_address, show_qr
|
|||||||
from apps.monero import misc
|
from apps.monero import misc
|
||||||
|
|
||||||
|
|
||||||
async def get_address(ctx, msg):
|
async def get_address(ctx, msg, keychain):
|
||||||
await paths.validate_path(ctx, misc.validate_full_path, path=msg.address_n)
|
await paths.validate_path(ctx, misc.validate_full_path, path=msg.address_n)
|
||||||
|
|
||||||
creds = await misc.get_creds(ctx, msg.address_n, msg.network_type)
|
creds = misc.get_creds(keychain, msg.address_n, msg.network_type)
|
||||||
|
|
||||||
if msg.show_display:
|
if msg.show_display:
|
||||||
desc = address_n_to_str(msg.address_n)
|
desc = address_n_to_str(msg.address_n)
|
||||||
|
@ -7,12 +7,12 @@ from apps.monero.layout import confirms
|
|||||||
from apps.monero.xmr import crypto
|
from apps.monero.xmr import crypto
|
||||||
|
|
||||||
|
|
||||||
async def get_watch_only(ctx, msg: MoneroGetWatchKey):
|
async def get_watch_only(ctx, msg: MoneroGetWatchKey, keychain):
|
||||||
await paths.validate_path(ctx, misc.validate_full_path, path=msg.address_n)
|
await paths.validate_path(ctx, misc.validate_full_path, path=msg.address_n)
|
||||||
|
|
||||||
await confirms.require_confirm_watchkey(ctx)
|
await confirms.require_confirm_watchkey(ctx)
|
||||||
|
|
||||||
creds = await misc.get_creds(ctx, msg.address_n, msg.network_type)
|
creds = misc.get_creds(keychain, msg.address_n, msg.network_type)
|
||||||
address = creds.address
|
address = creds.address
|
||||||
watch_key = crypto.encodeint(creds.view_key_private)
|
watch_key = crypto.encodeint(creds.view_key_private)
|
||||||
|
|
||||||
|
@ -14,10 +14,10 @@ from apps.monero.xmr import crypto, key_image, monero
|
|||||||
from apps.monero.xmr.crypto import chacha_poly
|
from apps.monero.xmr.crypto import chacha_poly
|
||||||
|
|
||||||
|
|
||||||
async def key_image_sync(ctx, msg):
|
async def key_image_sync(ctx, msg, keychain):
|
||||||
state = KeyImageSync()
|
state = KeyImageSync()
|
||||||
|
|
||||||
res = await _init_step(state, ctx, msg)
|
res = await _init_step(state, ctx, msg, keychain)
|
||||||
while True:
|
while True:
|
||||||
msg = await ctx.call(
|
msg = await ctx.call(
|
||||||
res,
|
res,
|
||||||
@ -46,10 +46,10 @@ class KeyImageSync:
|
|||||||
self.hasher = crypto.get_keccak()
|
self.hasher = crypto.get_keccak()
|
||||||
|
|
||||||
|
|
||||||
async def _init_step(s, ctx, msg):
|
async def _init_step(s, ctx, msg, keychain):
|
||||||
await paths.validate_path(ctx, misc.validate_full_path, path=msg.address_n)
|
await paths.validate_path(ctx, misc.validate_full_path, path=msg.address_n)
|
||||||
|
|
||||||
s.creds = await misc.get_creds(ctx, msg.address_n, msg.network_type)
|
s.creds = misc.get_creds(keychain, msg.address_n, msg.network_type)
|
||||||
|
|
||||||
await confirms.require_confirm_keyimage_sync(ctx)
|
await confirms.require_confirm_keyimage_sync(ctx)
|
||||||
|
|
||||||
|
@ -1,8 +1,7 @@
|
|||||||
from apps.common import HARDENED
|
from apps.common import HARDENED
|
||||||
|
|
||||||
|
|
||||||
async def get_creds(ctx, address_n=None, network_type=None):
|
def get_creds(keychain, address_n=None, network_type=None):
|
||||||
from apps.common import seed
|
|
||||||
from apps.monero.xmr import crypto, monero
|
from apps.monero.xmr import crypto, monero
|
||||||
from apps.monero.xmr.credentials import AccountCreds
|
from apps.monero.xmr.credentials import AccountCreds
|
||||||
|
|
||||||
@ -12,7 +11,7 @@ async def get_creds(ctx, address_n=None, network_type=None):
|
|||||||
curve = "ed25519"
|
curve = "ed25519"
|
||||||
else:
|
else:
|
||||||
curve = "secp256k1"
|
curve = "secp256k1"
|
||||||
node = await seed.derive_node(ctx, address_n, curve)
|
node = keychain.derive(address_n, curve)
|
||||||
|
|
||||||
if use_slip0010:
|
if use_slip0010:
|
||||||
key_seed = node.private_key()
|
key_seed = node.private_key()
|
||||||
|
@ -6,7 +6,7 @@ from trezor.messages import MessageType
|
|||||||
from apps.monero.signing.state import State
|
from apps.monero.signing.state import State
|
||||||
|
|
||||||
|
|
||||||
async def sign_tx(ctx, received_msg):
|
async def sign_tx(ctx, received_msg, keychain):
|
||||||
state = State(ctx)
|
state = State(ctx)
|
||||||
mods = utils.unimport_begin()
|
mods = utils.unimport_begin()
|
||||||
|
|
||||||
@ -18,7 +18,7 @@ async def sign_tx(ctx, received_msg):
|
|||||||
gc.collect()
|
gc.collect()
|
||||||
gc.threshold(gc.mem_free() // 4 + gc.mem_alloc())
|
gc.threshold(gc.mem_free() // 4 + gc.mem_alloc())
|
||||||
|
|
||||||
result_msg, accept_msgs = await sign_tx_dispatch(state, received_msg)
|
result_msg, accept_msgs = await sign_tx_dispatch(state, received_msg, keychain)
|
||||||
if accept_msgs is None:
|
if accept_msgs is None:
|
||||||
break
|
break
|
||||||
|
|
||||||
@ -32,13 +32,13 @@ async def sign_tx(ctx, received_msg):
|
|||||||
return result_msg
|
return result_msg
|
||||||
|
|
||||||
|
|
||||||
async def sign_tx_dispatch(state, msg):
|
async def sign_tx_dispatch(state, msg, keychain):
|
||||||
if msg.MESSAGE_WIRE_TYPE == MessageType.MoneroTransactionInitRequest:
|
if msg.MESSAGE_WIRE_TYPE == MessageType.MoneroTransactionInitRequest:
|
||||||
from apps.monero.signing import step_01_init_transaction
|
from apps.monero.signing import step_01_init_transaction
|
||||||
|
|
||||||
return (
|
return (
|
||||||
await step_01_init_transaction.init_transaction(
|
await step_01_init_transaction.init_transaction(
|
||||||
state, msg.address_n, msg.network_type, msg.tsx_data
|
state, msg.address_n, msg.network_type, msg.tsx_data, keychain
|
||||||
),
|
),
|
||||||
(MessageType.MoneroTransactionSetInputRequest,),
|
(MessageType.MoneroTransactionSetInputRequest,),
|
||||||
)
|
)
|
||||||
|
@ -16,14 +16,18 @@ if False:
|
|||||||
|
|
||||||
|
|
||||||
async def init_transaction(
|
async def init_transaction(
|
||||||
state: State, address_n: list, network_type: int, tsx_data: MoneroTransactionData
|
state: State,
|
||||||
|
address_n: list,
|
||||||
|
network_type: int,
|
||||||
|
tsx_data: MoneroTransactionData,
|
||||||
|
keychain,
|
||||||
):
|
):
|
||||||
from apps.monero.signing import offloading_keys
|
from apps.monero.signing import offloading_keys
|
||||||
from apps.common import paths
|
from apps.common import paths
|
||||||
|
|
||||||
await paths.validate_path(state.ctx, misc.validate_full_path, path=address_n)
|
await paths.validate_path(state.ctx, misc.validate_full_path, path=address_n)
|
||||||
|
|
||||||
state.creds = await misc.get_creds(state.ctx, address_n, network_type)
|
state.creds = misc.get_creds(keychain, address_n, network_type)
|
||||||
state.fee = state.fee if state.fee > 0 else 0
|
state.fee = state.fee if state.fee > 0 else 0
|
||||||
state.tx_priv = crypto.random_scalar()
|
state.tx_priv = crypto.random_scalar()
|
||||||
state.tx_pub = crypto.scalarmult_base(state.tx_priv)
|
state.tx_pub = crypto.scalarmult_base(state.tx_priv)
|
||||||
|
@ -1,7 +1,13 @@
|
|||||||
from trezor import wire
|
from trezor import wire
|
||||||
from trezor.messages import MessageType
|
from trezor.messages import MessageType
|
||||||
|
|
||||||
|
from apps.common import HARDENED
|
||||||
|
|
||||||
|
|
||||||
def boot():
|
def boot():
|
||||||
wire.add(MessageType.NEMGetAddress, __name__, "get_address")
|
ns = [
|
||||||
wire.add(MessageType.NEMSignTx, __name__, "sign_tx")
|
["ed25519-keccak", HARDENED | 44, HARDENED | 43],
|
||||||
|
["ed25519-keccak", HARDENED | 44, HARDENED | 1],
|
||||||
|
]
|
||||||
|
wire.add(MessageType.NEMGetAddress, __name__, "get_address", ns)
|
||||||
|
wire.add(MessageType.NEMSignTx, __name__, "sign_tx", ns)
|
||||||
|
@ -3,16 +3,15 @@ from trezor.messages.NEMAddress import NEMAddress
|
|||||||
from .helpers import NEM_CURVE, check_path, get_network_str
|
from .helpers import NEM_CURVE, check_path, get_network_str
|
||||||
from .validators import validate_network
|
from .validators import validate_network
|
||||||
|
|
||||||
from apps.common import seed
|
|
||||||
from apps.common.layout import address_n_to_str, show_address, show_qr
|
from apps.common.layout import address_n_to_str, show_address, show_qr
|
||||||
from apps.common.paths import validate_path
|
from apps.common.paths import validate_path
|
||||||
|
|
||||||
|
|
||||||
async def get_address(ctx, msg):
|
async def get_address(ctx, msg, keychain):
|
||||||
network = validate_network(msg.network)
|
network = validate_network(msg.network)
|
||||||
await validate_path(ctx, check_path, path=msg.address_n, network=msg.network)
|
await validate_path(ctx, check_path, path=msg.address_n, network=network)
|
||||||
|
|
||||||
node = await seed.derive_node(ctx, msg.address_n, NEM_CURVE)
|
node = keychain.derive(msg.address_n, NEM_CURVE)
|
||||||
address = node.nem_address(network)
|
address = node.nem_address(network)
|
||||||
|
|
||||||
if msg.show_display:
|
if msg.show_display:
|
||||||
|
@ -2,21 +2,21 @@ from trezor.crypto.curve import ed25519
|
|||||||
from trezor.messages.NEMSignedTx import NEMSignedTx
|
from trezor.messages.NEMSignedTx import NEMSignedTx
|
||||||
from trezor.messages.NEMSignTx import NEMSignTx
|
from trezor.messages.NEMSignTx import NEMSignTx
|
||||||
|
|
||||||
from . import mosaic, multisig, namespace, transfer
|
|
||||||
from .helpers import NEM_CURVE, NEM_HASH_ALG, check_path
|
|
||||||
from .validators import validate
|
|
||||||
|
|
||||||
from apps.common import seed
|
from apps.common import seed
|
||||||
from apps.common.paths import validate_path
|
from apps.common.paths import validate_path
|
||||||
|
from apps.nem import mosaic, multisig, namespace, transfer
|
||||||
|
from apps.nem.helpers import NEM_CURVE, NEM_HASH_ALG, check_path
|
||||||
|
from apps.nem.validators import validate
|
||||||
|
|
||||||
|
|
||||||
async def sign_tx(ctx, msg: NEMSignTx):
|
async def sign_tx(ctx, msg: NEMSignTx, keychain):
|
||||||
validate(msg)
|
validate(msg)
|
||||||
|
|
||||||
await validate_path(
|
await validate_path(
|
||||||
ctx, check_path, path=msg.transaction.address_n, network=msg.transaction.network
|
ctx, check_path, path=msg.transaction.address_n, network=msg.transaction.network
|
||||||
)
|
)
|
||||||
|
|
||||||
node = await seed.derive_node(ctx, msg.transaction.address_n, NEM_CURVE)
|
node = keychain.derive(msg.transaction.address_n, NEM_CURVE)
|
||||||
|
|
||||||
if msg.multisig:
|
if msg.multisig:
|
||||||
public_key = msg.multisig.signer
|
public_key = msg.multisig.signer
|
||||||
|
@ -1,7 +1,10 @@
|
|||||||
from trezor import wire
|
from trezor import wire
|
||||||
from trezor.messages import MessageType
|
from trezor.messages import MessageType
|
||||||
|
|
||||||
|
from apps.common import HARDENED
|
||||||
|
|
||||||
|
|
||||||
def boot():
|
def boot():
|
||||||
wire.add(MessageType.RippleGetAddress, __name__, "get_address")
|
ns = [["secp256k1", HARDENED | 44, HARDENED | 144]]
|
||||||
wire.add(MessageType.RippleSignTx, __name__, "sign_tx")
|
wire.add(MessageType.RippleGetAddress, __name__, "get_address", ns)
|
||||||
|
wire.add(MessageType.RippleSignTx, __name__, "sign_tx", ns)
|
||||||
|
@ -1,16 +1,15 @@
|
|||||||
from trezor.messages.RippleAddress import RippleAddress
|
from trezor.messages.RippleAddress import RippleAddress
|
||||||
from trezor.messages.RippleGetAddress import RippleGetAddress
|
from trezor.messages.RippleGetAddress import RippleGetAddress
|
||||||
|
|
||||||
from . import helpers
|
from apps.common import paths
|
||||||
|
|
||||||
from apps.common import paths, seed
|
|
||||||
from apps.common.layout import address_n_to_str, show_address, show_qr
|
from apps.common.layout import address_n_to_str, show_address, show_qr
|
||||||
|
from apps.ripple import helpers
|
||||||
|
|
||||||
|
|
||||||
async def get_address(ctx, msg: RippleGetAddress):
|
async def get_address(ctx, msg: RippleGetAddress, keychain):
|
||||||
await paths.validate_path(ctx, helpers.validate_full_path, path=msg.address_n)
|
await paths.validate_path(ctx, helpers.validate_full_path, path=msg.address_n)
|
||||||
|
|
||||||
node = await seed.derive_node(ctx, msg.address_n)
|
node = keychain.derive(msg.address_n)
|
||||||
pubkey = node.public_key()
|
pubkey = node.public_key()
|
||||||
address = helpers.address_from_public_key(pubkey)
|
address = helpers.address_from_public_key(pubkey)
|
||||||
|
|
||||||
|
@ -5,17 +5,17 @@ from trezor.messages.RippleSignedTx import RippleSignedTx
|
|||||||
from trezor.messages.RippleSignTx import RippleSignTx
|
from trezor.messages.RippleSignTx import RippleSignTx
|
||||||
from trezor.wire import ProcessError
|
from trezor.wire import ProcessError
|
||||||
|
|
||||||
from . import helpers, layout
|
from apps.common import paths
|
||||||
from .serialize import serialize
|
from apps.ripple import helpers, layout
|
||||||
|
from apps.ripple.serialize import serialize
|
||||||
from apps.common import paths, seed
|
|
||||||
|
|
||||||
|
|
||||||
async def sign_tx(ctx, msg: RippleSignTx):
|
async def sign_tx(ctx, msg: RippleSignTx, keychain):
|
||||||
validate(msg)
|
validate(msg)
|
||||||
|
|
||||||
await paths.validate_path(ctx, helpers.validate_full_path, path=msg.address_n)
|
await paths.validate_path(ctx, helpers.validate_full_path, path=msg.address_n)
|
||||||
|
|
||||||
node = await seed.derive_node(ctx, msg.address_n)
|
node = keychain.derive(msg.address_n)
|
||||||
source_address = helpers.address_from_public_key(node.public_key())
|
source_address = helpers.address_from_public_key(node.public_key())
|
||||||
|
|
||||||
set_canonical_flag(msg)
|
set_canonical_flag(msg)
|
||||||
|
@ -1,7 +1,10 @@
|
|||||||
from trezor import wire
|
from trezor import wire
|
||||||
from trezor.messages import MessageType
|
from trezor.messages import MessageType
|
||||||
|
|
||||||
|
from apps.common import HARDENED
|
||||||
|
|
||||||
|
|
||||||
def boot():
|
def boot():
|
||||||
wire.add(MessageType.StellarGetAddress, __name__, "get_address")
|
ns = [["ed25519", HARDENED | 44, HARDENED | 148]]
|
||||||
wire.add(MessageType.StellarSignTx, __name__, "sign_tx")
|
wire.add(MessageType.StellarGetAddress, __name__, "get_address", ns)
|
||||||
|
wire.add(MessageType.StellarSignTx, __name__, "sign_tx", ns)
|
||||||
|
@ -6,10 +6,10 @@ from apps.common.layout import address_n_to_str, show_address, show_qr
|
|||||||
from apps.stellar import helpers
|
from apps.stellar import helpers
|
||||||
|
|
||||||
|
|
||||||
async def get_address(ctx, msg: StellarGetAddress):
|
async def get_address(ctx, msg: StellarGetAddress, keychain):
|
||||||
await paths.validate_path(ctx, helpers.validate_full_path, path=msg.address_n)
|
await paths.validate_path(ctx, helpers.validate_full_path, path=msg.address_n)
|
||||||
|
|
||||||
node = await seed.derive_node(ctx, msg.address_n, helpers.STELLAR_CURVE)
|
node = keychain.derive(msg.address_n, helpers.STELLAR_CURVE)
|
||||||
pubkey = seed.remove_ed25519_prefix(node.public_key())
|
pubkey = seed.remove_ed25519_prefix(node.public_key())
|
||||||
address = helpers.address_from_public_key(pubkey)
|
address = helpers.address_from_public_key(pubkey)
|
||||||
|
|
||||||
|
@ -12,15 +12,15 @@ from apps.stellar import consts, helpers, layout, writers
|
|||||||
from apps.stellar.operations import process_operation
|
from apps.stellar.operations import process_operation
|
||||||
|
|
||||||
|
|
||||||
async def sign_tx(ctx, msg: StellarSignTx):
|
async def sign_tx(ctx, msg: StellarSignTx, keychain):
|
||||||
if msg.num_operations == 0:
|
|
||||||
raise ProcessError("Stellar: At least one operation is required")
|
|
||||||
|
|
||||||
await paths.validate_path(ctx, helpers.validate_full_path, path=msg.address_n)
|
await paths.validate_path(ctx, helpers.validate_full_path, path=msg.address_n)
|
||||||
|
|
||||||
node = await seed.derive_node(ctx, msg.address_n, consts.STELLAR_CURVE)
|
node = keychain.derive(msg.address_n, consts.STELLAR_CURVE)
|
||||||
pubkey = seed.remove_ed25519_prefix(node.public_key())
|
pubkey = seed.remove_ed25519_prefix(node.public_key())
|
||||||
|
|
||||||
|
if msg.num_operations == 0:
|
||||||
|
raise ProcessError("Stellar: At least one operation is required")
|
||||||
|
|
||||||
w = bytearray()
|
w = bytearray()
|
||||||
await _init(ctx, w, pubkey, msg)
|
await _init(ctx, w, pubkey, msg)
|
||||||
_timebounds(w, msg.timebounds_start, msg.timebounds_end)
|
_timebounds(w, msg.timebounds_start, msg.timebounds_end)
|
||||||
|
@ -1,8 +1,11 @@
|
|||||||
from trezor import wire
|
from trezor import wire
|
||||||
from trezor.messages import MessageType
|
from trezor.messages import MessageType
|
||||||
|
|
||||||
|
from apps.common import HARDENED
|
||||||
|
|
||||||
|
|
||||||
def boot():
|
def boot():
|
||||||
wire.add(MessageType.TezosGetAddress, __name__, "get_address")
|
ns = [["ed25519", HARDENED | 44, HARDENED | 1729]]
|
||||||
wire.add(MessageType.TezosSignTx, __name__, "sign_tx")
|
wire.add(MessageType.TezosGetAddress, __name__, "get_address", ns)
|
||||||
wire.add(MessageType.TezosGetPublicKey, __name__, "get_public_key")
|
wire.add(MessageType.TezosSignTx, __name__, "sign_tx", ns)
|
||||||
|
wire.add(MessageType.TezosGetPublicKey, __name__, "get_public_key", ns)
|
||||||
|
@ -6,9 +6,10 @@ from apps.common.layout import address_n_to_str, show_address, show_qr
|
|||||||
from apps.tezos import helpers
|
from apps.tezos import helpers
|
||||||
|
|
||||||
|
|
||||||
async def get_address(ctx, msg):
|
async def get_address(ctx, msg, keychain):
|
||||||
await paths.validate_path(ctx, helpers.validate_full_path, path=msg.address_n)
|
await paths.validate_path(ctx, helpers.validate_full_path, path=msg.address_n)
|
||||||
node = await seed.derive_node(ctx, msg.address_n, helpers.TEZOS_CURVE)
|
|
||||||
|
node = keychain.derive(msg.address_n, helpers.TEZOS_CURVE)
|
||||||
|
|
||||||
pk = seed.remove_ed25519_prefix(node.public_key())
|
pk = seed.remove_ed25519_prefix(node.public_key())
|
||||||
pkh = hashlib.blake2b(pk, outlen=20).digest()
|
pkh = hashlib.blake2b(pk, outlen=20).digest()
|
||||||
|
@ -9,10 +9,10 @@ from apps.common.confirm import require_confirm
|
|||||||
from apps.tezos import helpers
|
from apps.tezos import helpers
|
||||||
|
|
||||||
|
|
||||||
async def get_public_key(ctx, msg):
|
async def get_public_key(ctx, msg, keychain):
|
||||||
await paths.validate_path(ctx, helpers.validate_full_path, path=msg.address_n)
|
await paths.validate_path(ctx, helpers.validate_full_path, path=msg.address_n)
|
||||||
node = await seed.derive_node(ctx, msg.address_n, helpers.TEZOS_CURVE)
|
|
||||||
|
|
||||||
|
node = keychain.derive(msg.address_n, helpers.TEZOS_CURVE)
|
||||||
pk = seed.remove_ed25519_prefix(node.public_key())
|
pk = seed.remove_ed25519_prefix(node.public_key())
|
||||||
pk_prefixed = helpers.base58_encode_check(pk, prefix=helpers.TEZOS_PUBLICKEY_PREFIX)
|
pk_prefixed = helpers.base58_encode_check(pk, prefix=helpers.TEZOS_PUBLICKEY_PREFIX)
|
||||||
|
|
||||||
|
@ -4,14 +4,15 @@ from trezor.crypto.curve import ed25519
|
|||||||
from trezor.messages import TezosContractType
|
from trezor.messages import TezosContractType
|
||||||
from trezor.messages.TezosSignedTx import TezosSignedTx
|
from trezor.messages.TezosSignedTx import TezosSignedTx
|
||||||
|
|
||||||
from apps.common import paths, seed
|
from apps.common import paths
|
||||||
from apps.common.writers import write_bytes, write_uint8
|
from apps.common.writers import write_bytes, write_uint8
|
||||||
from apps.tezos import helpers, layout
|
from apps.tezos import helpers, layout
|
||||||
|
|
||||||
|
|
||||||
async def sign_tx(ctx, msg):
|
async def sign_tx(ctx, msg, keychain):
|
||||||
await paths.validate_path(ctx, helpers.validate_full_path, path=msg.address_n)
|
await paths.validate_path(ctx, helpers.validate_full_path, path=msg.address_n)
|
||||||
node = await seed.derive_node(ctx, msg.address_n, helpers.TEZOS_CURVE)
|
|
||||||
|
node = keychain.derive(msg.address_n, helpers.TEZOS_CURVE)
|
||||||
|
|
||||||
if msg.transaction is not None:
|
if msg.transaction is not None:
|
||||||
to = _get_address_from_contract(msg.transaction.destination)
|
to = _get_address_from_contract(msg.transaction.destination)
|
||||||
|
@ -3,12 +3,22 @@ from trezor.messages import MessageType
|
|||||||
|
|
||||||
|
|
||||||
def boot():
|
def boot():
|
||||||
wire.add(MessageType.GetPublicKey, __name__, "get_public_key")
|
ns = [
|
||||||
wire.add(MessageType.GetAddress, __name__, "get_address")
|
["curve25519"],
|
||||||
|
["ed25519"],
|
||||||
|
["ed25519-keccak"],
|
||||||
|
["nist256p1"],
|
||||||
|
["secp256k1"],
|
||||||
|
["secp256k1-decred"],
|
||||||
|
["secp256k1-groestl"],
|
||||||
|
["secp256k1-smart"],
|
||||||
|
]
|
||||||
|
wire.add(MessageType.GetPublicKey, __name__, "get_public_key", ns)
|
||||||
|
wire.add(MessageType.GetAddress, __name__, "get_address", ns)
|
||||||
wire.add(MessageType.GetEntropy, __name__, "get_entropy")
|
wire.add(MessageType.GetEntropy, __name__, "get_entropy")
|
||||||
wire.add(MessageType.SignTx, __name__, "sign_tx")
|
wire.add(MessageType.SignTx, __name__, "sign_tx", ns)
|
||||||
wire.add(MessageType.SignMessage, __name__, "sign_message")
|
wire.add(MessageType.SignMessage, __name__, "sign_message", ns)
|
||||||
wire.add(MessageType.VerifyMessage, __name__, "verify_message")
|
wire.add(MessageType.VerifyMessage, __name__, "verify_message")
|
||||||
wire.add(MessageType.SignIdentity, __name__, "sign_identity")
|
wire.add(MessageType.SignIdentity, __name__, "sign_identity", ns)
|
||||||
wire.add(MessageType.GetECDHSessionKey, __name__, "get_ecdh_session_key")
|
wire.add(MessageType.GetECDHSessionKey, __name__, "get_ecdh_session_key", ns)
|
||||||
wire.add(MessageType.CipherKeyValue, __name__, "cipher_key_value")
|
wire.add(MessageType.CipherKeyValue, __name__, "cipher_key_value", ns)
|
||||||
|
@ -4,11 +4,10 @@ from trezor.crypto.hashlib import sha512
|
|||||||
from trezor.messages.CipheredKeyValue import CipheredKeyValue
|
from trezor.messages.CipheredKeyValue import CipheredKeyValue
|
||||||
from trezor.ui.text import Text
|
from trezor.ui.text import Text
|
||||||
|
|
||||||
from apps.common import seed
|
|
||||||
from apps.common.confirm import require_confirm
|
from apps.common.confirm import require_confirm
|
||||||
|
|
||||||
|
|
||||||
async def cipher_key_value(ctx, msg):
|
async def cipher_key_value(ctx, msg, keychain):
|
||||||
if len(msg.value) % 16 > 0:
|
if len(msg.value) % 16 > 0:
|
||||||
raise wire.DataError("Value length must be a multiple of 16")
|
raise wire.DataError("Value length must be a multiple of 16")
|
||||||
|
|
||||||
@ -23,7 +22,7 @@ async def cipher_key_value(ctx, msg):
|
|||||||
text.normal(msg.key)
|
text.normal(msg.key)
|
||||||
await require_confirm(ctx, text)
|
await require_confirm(ctx, text)
|
||||||
|
|
||||||
node = await seed.derive_node(ctx, msg.address_n)
|
node = keychain.derive(msg.address_n)
|
||||||
value = compute_cipher_key_value(msg, node.private_key())
|
value = compute_cipher_key_value(msg, node.private_key())
|
||||||
return CipheredKeyValue(value=value)
|
return CipheredKeyValue(value=value)
|
||||||
|
|
||||||
|
@ -1,13 +1,13 @@
|
|||||||
from trezor.messages import InputScriptType
|
from trezor.messages import InputScriptType
|
||||||
from trezor.messages.Address import Address
|
from trezor.messages.Address import Address
|
||||||
|
|
||||||
from apps.common import coins, seed
|
from apps.common import coins
|
||||||
from apps.common.layout import address_n_to_str, show_address, show_qr
|
from apps.common.layout import address_n_to_str, show_address, show_qr
|
||||||
from apps.common.paths import validate_path
|
from apps.common.paths import validate_path
|
||||||
from apps.wallet.sign_tx import addresses
|
from apps.wallet.sign_tx import addresses
|
||||||
|
|
||||||
|
|
||||||
async def get_address(ctx, msg):
|
async def get_address(ctx, msg, keychain):
|
||||||
coin_name = msg.coin_name or "Bitcoin"
|
coin_name = msg.coin_name or "Bitcoin"
|
||||||
coin = coins.by_name(coin_name)
|
coin = coins.by_name(coin_name)
|
||||||
|
|
||||||
@ -19,7 +19,7 @@ async def get_address(ctx, msg):
|
|||||||
script_type=msg.script_type,
|
script_type=msg.script_type,
|
||||||
)
|
)
|
||||||
|
|
||||||
node = await seed.derive_node(ctx, msg.address_n, curve_name=coin.curve_name)
|
node = keychain.derive(msg.address_n, coin.curve_name)
|
||||||
address = addresses.get_address(msg.script_type, coin, node, msg.multisig)
|
address = addresses.get_address(msg.script_type, coin, node, msg.multisig)
|
||||||
address_short = addresses.address_short(coin, address)
|
address_short = addresses.address_short(coin, address)
|
||||||
|
|
||||||
|
@ -5,7 +5,7 @@ from trezor.messages.ECDHSessionKey import ECDHSessionKey
|
|||||||
from trezor.ui.text import Text
|
from trezor.ui.text import Text
|
||||||
from trezor.utils import chunks
|
from trezor.utils import chunks
|
||||||
|
|
||||||
from apps.common import HARDENED, seed
|
from apps.common import HARDENED
|
||||||
from apps.common.confirm import require_confirm
|
from apps.common.confirm import require_confirm
|
||||||
from apps.wallet.sign_identity import (
|
from apps.wallet.sign_identity import (
|
||||||
serialize_identity,
|
serialize_identity,
|
||||||
@ -13,7 +13,7 @@ from apps.wallet.sign_identity import (
|
|||||||
)
|
)
|
||||||
|
|
||||||
|
|
||||||
async def get_ecdh_session_key(ctx, msg):
|
async def get_ecdh_session_key(ctx, msg, keychain):
|
||||||
if msg.ecdsa_curve_name is None:
|
if msg.ecdsa_curve_name is None:
|
||||||
msg.ecdsa_curve_name = "secp256k1"
|
msg.ecdsa_curve_name = "secp256k1"
|
||||||
|
|
||||||
@ -22,7 +22,7 @@ async def get_ecdh_session_key(ctx, msg):
|
|||||||
await require_confirm_ecdh_session_key(ctx, msg.identity)
|
await require_confirm_ecdh_session_key(ctx, msg.identity)
|
||||||
|
|
||||||
address_n = get_ecdh_path(identity, msg.identity.index or 0)
|
address_n = get_ecdh_path(identity, msg.identity.index or 0)
|
||||||
node = await seed.derive_node(ctx, address_n, msg.ecdsa_curve_name)
|
node = keychain.derive(address_n, msg.ecdsa_curve_name)
|
||||||
|
|
||||||
session_key = ecdh(
|
session_key = ecdh(
|
||||||
seckey=node.private_key(),
|
seckey=node.private_key(),
|
||||||
|
@ -7,7 +7,6 @@ from apps.common.confirm import require_confirm
|
|||||||
|
|
||||||
|
|
||||||
async def get_entropy(ctx, msg):
|
async def get_entropy(ctx, msg):
|
||||||
|
|
||||||
text = Text("Confirm entropy")
|
text = Text("Confirm entropy")
|
||||||
text.bold("Do you really want", "to send entropy?")
|
text.bold("Do you really want", "to send entropy?")
|
||||||
text.normal("Continue only if you", "know what you are doing!")
|
text.normal("Continue only if you", "know what you are doing!")
|
||||||
|
@ -3,18 +3,16 @@ from trezor.messages import InputScriptType
|
|||||||
from trezor.messages.HDNodeType import HDNodeType
|
from trezor.messages.HDNodeType import HDNodeType
|
||||||
from trezor.messages.PublicKey import PublicKey
|
from trezor.messages.PublicKey import PublicKey
|
||||||
|
|
||||||
from apps.common import coins, layout, seed
|
from apps.common import coins, layout
|
||||||
|
|
||||||
|
|
||||||
async def get_public_key(ctx, msg):
|
async def get_public_key(ctx, msg, keychain):
|
||||||
coin_name = msg.coin_name or "Bitcoin"
|
coin_name = msg.coin_name or "Bitcoin"
|
||||||
coin = coins.by_name(coin_name)
|
coin = coins.by_name(coin_name)
|
||||||
|
curve_name = msg.ecdsa_curve_name or coin.curve_name
|
||||||
script_type = msg.script_type or InputScriptType.SPENDADDRESS
|
script_type = msg.script_type or InputScriptType.SPENDADDRESS
|
||||||
|
|
||||||
curve_name = msg.ecdsa_curve_name
|
node = keychain.derive(msg.address_n, curve_name=curve_name)
|
||||||
if not curve_name:
|
|
||||||
curve_name = coin.curve_name
|
|
||||||
node = await seed.derive_node(ctx, msg.address_n, curve_name=curve_name)
|
|
||||||
|
|
||||||
if (
|
if (
|
||||||
script_type in [InputScriptType.SPENDADDRESS, InputScriptType.SPENDMULTISIG]
|
script_type in [InputScriptType.SPENDADDRESS, InputScriptType.SPENDMULTISIG]
|
||||||
|
@ -6,11 +6,11 @@ from trezor.messages.SignedIdentity import SignedIdentity
|
|||||||
from trezor.ui.text import Text
|
from trezor.ui.text import Text
|
||||||
from trezor.utils import chunks
|
from trezor.utils import chunks
|
||||||
|
|
||||||
from apps.common import HARDENED, coins, seed
|
from apps.common import HARDENED, coins
|
||||||
from apps.common.confirm import require_confirm
|
from apps.common.confirm import require_confirm
|
||||||
|
|
||||||
|
|
||||||
async def sign_identity(ctx, msg):
|
async def sign_identity(ctx, msg, keychain):
|
||||||
if msg.ecdsa_curve_name is None:
|
if msg.ecdsa_curve_name is None:
|
||||||
msg.ecdsa_curve_name = "secp256k1"
|
msg.ecdsa_curve_name = "secp256k1"
|
||||||
|
|
||||||
@ -19,7 +19,7 @@ async def sign_identity(ctx, msg):
|
|||||||
await require_confirm_sign_identity(ctx, msg.identity, msg.challenge_visual)
|
await require_confirm_sign_identity(ctx, msg.identity, msg.challenge_visual)
|
||||||
|
|
||||||
address_n = get_identity_path(identity, msg.identity.index or 0)
|
address_n = get_identity_path(identity, msg.identity.index or 0)
|
||||||
node = await seed.derive_node(ctx, address_n, msg.ecdsa_curve_name)
|
node = keychain.derive(address_n, msg.ecdsa_curve_name)
|
||||||
|
|
||||||
coin = coins.by_name("Bitcoin")
|
coin = coins.by_name("Bitcoin")
|
||||||
if msg.ecdsa_curve_name == "secp256k1":
|
if msg.ecdsa_curve_name == "secp256k1":
|
||||||
|
@ -4,14 +4,14 @@ from trezor.messages.InputScriptType import SPENDADDRESS, SPENDP2SHWITNESS, SPEN
|
|||||||
from trezor.messages.MessageSignature import MessageSignature
|
from trezor.messages.MessageSignature import MessageSignature
|
||||||
from trezor.ui.text import Text
|
from trezor.ui.text import Text
|
||||||
|
|
||||||
from apps.common import coins, seed
|
from apps.common import coins
|
||||||
from apps.common.confirm import require_confirm
|
from apps.common.confirm import require_confirm
|
||||||
from apps.common.paths import validate_path
|
from apps.common.paths import validate_path
|
||||||
from apps.common.signverify import message_digest, split_message
|
from apps.common.signverify import message_digest, split_message
|
||||||
from apps.wallet.sign_tx.addresses import get_address, validate_full_path
|
from apps.wallet.sign_tx.addresses import get_address, validate_full_path
|
||||||
|
|
||||||
|
|
||||||
async def sign_message(ctx, msg):
|
async def sign_message(ctx, msg, keychain):
|
||||||
message = msg.message
|
message = msg.message
|
||||||
address_n = msg.address_n
|
address_n = msg.address_n
|
||||||
coin_name = msg.coin_name or "Bitcoin"
|
coin_name = msg.coin_name or "Bitcoin"
|
||||||
@ -19,7 +19,6 @@ async def sign_message(ctx, msg):
|
|||||||
coin = coins.by_name(coin_name)
|
coin = coins.by_name(coin_name)
|
||||||
|
|
||||||
await require_confirm_sign_message(ctx, message)
|
await require_confirm_sign_message(ctx, message)
|
||||||
|
|
||||||
await validate_path(
|
await validate_path(
|
||||||
ctx,
|
ctx,
|
||||||
validate_full_path,
|
validate_full_path,
|
||||||
@ -29,7 +28,7 @@ async def sign_message(ctx, msg):
|
|||||||
validate_script_type=False,
|
validate_script_type=False,
|
||||||
)
|
)
|
||||||
|
|
||||||
node = await seed.derive_node(ctx, address_n, curve_name=coin.curve_name)
|
node = keychain.derive(address_n, coin.curve_name)
|
||||||
seckey = node.private_key()
|
seckey = node.private_key()
|
||||||
|
|
||||||
address = get_address(script_type, coin, node)
|
address = get_address(script_type, coin, node)
|
||||||
|
@ -3,53 +3,51 @@ from trezor.messages.MessageType import TxAck
|
|||||||
from trezor.messages.RequestType import TXFINISHED
|
from trezor.messages.RequestType import TXFINISHED
|
||||||
from trezor.messages.TxRequest import TxRequest
|
from trezor.messages.TxRequest import TxRequest
|
||||||
|
|
||||||
from apps.common import coins, paths, seed
|
from apps.common import paths
|
||||||
from apps.wallet.sign_tx.helpers import (
|
from apps.wallet.sign_tx import (
|
||||||
UiConfirmFeeOverThreshold,
|
addresses,
|
||||||
UiConfirmForeignAddress,
|
helpers,
|
||||||
UiConfirmOutput,
|
layout,
|
||||||
UiConfirmTotal,
|
multisig,
|
||||||
|
progress,
|
||||||
|
scripts,
|
||||||
|
segwit_bip143,
|
||||||
|
signing,
|
||||||
)
|
)
|
||||||
|
|
||||||
|
|
||||||
@ui.layout
|
@ui.layout
|
||||||
async def sign_tx(ctx, msg):
|
async def sign_tx(ctx, msg, keychain):
|
||||||
from apps.wallet.sign_tx import layout, progress, signing
|
signer = signing.sign_tx(msg, keychain)
|
||||||
|
|
||||||
coin_name = msg.coin_name or "Bitcoin"
|
|
||||||
coin = coins.by_name(coin_name)
|
|
||||||
# TODO: rework this so we don't have to pass root to signing.sign_tx
|
|
||||||
root = await seed.derive_node(ctx, [], curve_name=coin.curve_name)
|
|
||||||
|
|
||||||
signer = signing.sign_tx(msg, root)
|
|
||||||
res = None
|
res = None
|
||||||
while True:
|
while True:
|
||||||
try:
|
try:
|
||||||
req = signer.send(res)
|
req = signer.send(res)
|
||||||
except signing.SigningError as e:
|
except signing.SigningError as e:
|
||||||
raise wire.Error(*e.args)
|
raise wire.Error(*e.args)
|
||||||
except signing.MultisigError as e:
|
except multisig.MultisigError as e:
|
||||||
raise wire.Error(*e.args)
|
raise wire.Error(*e.args)
|
||||||
except signing.AddressError as e:
|
except addresses.AddressError as e:
|
||||||
raise wire.Error(*e.args)
|
raise wire.Error(*e.args)
|
||||||
except signing.ScriptsError as e:
|
except scripts.ScriptsError as e:
|
||||||
raise wire.Error(*e.args)
|
raise wire.Error(*e.args)
|
||||||
except signing.Bip143Error as e:
|
except segwit_bip143.Bip143Error as e:
|
||||||
raise wire.Error(*e.args)
|
raise wire.Error(*e.args)
|
||||||
if isinstance(req, TxRequest):
|
if isinstance(req, TxRequest):
|
||||||
if req.request_type == TXFINISHED:
|
if req.request_type == TXFINISHED:
|
||||||
break
|
break
|
||||||
res = await ctx.call(req, TxAck)
|
res = await ctx.call(req, TxAck)
|
||||||
elif isinstance(req, UiConfirmOutput):
|
elif isinstance(req, helpers.UiConfirmOutput):
|
||||||
res = await layout.confirm_output(ctx, req.output, req.coin)
|
res = await layout.confirm_output(ctx, req.output, req.coin)
|
||||||
progress.report_init()
|
progress.report_init()
|
||||||
elif isinstance(req, UiConfirmTotal):
|
elif isinstance(req, helpers.UiConfirmTotal):
|
||||||
res = await layout.confirm_total(ctx, req.spending, req.fee, req.coin)
|
res = await layout.confirm_total(ctx, req.spending, req.fee, req.coin)
|
||||||
progress.report_init()
|
progress.report_init()
|
||||||
elif isinstance(req, UiConfirmFeeOverThreshold):
|
elif isinstance(req, helpers.UiConfirmFeeOverThreshold):
|
||||||
res = await layout.confirm_feeoverthreshold(ctx, req.fee, req.coin)
|
res = await layout.confirm_feeoverthreshold(ctx, req.fee, req.coin)
|
||||||
progress.report_init()
|
progress.report_init()
|
||||||
elif isinstance(req, UiConfirmForeignAddress):
|
elif isinstance(req, helpers.UiConfirmForeignAddress):
|
||||||
res = await paths.show_path_warning(ctx, req.address_n)
|
res = await paths.show_path_warning(ctx, req.address_n)
|
||||||
else:
|
else:
|
||||||
raise TypeError("Invalid signing instruction")
|
raise TypeError("Invalid signing instruction")
|
||||||
|
@ -12,6 +12,7 @@ from trezor.messages.TxInputType import TxInputType
|
|||||||
from trezor.messages.TxOutputBinType import TxOutputBinType
|
from trezor.messages.TxOutputBinType import TxOutputBinType
|
||||||
from trezor.messages.TxOutputType import TxOutputType
|
from trezor.messages.TxOutputType import TxOutputType
|
||||||
from trezor.messages.TxRequest import TxRequest
|
from trezor.messages.TxRequest import TxRequest
|
||||||
|
from trezor.utils import obj_eq
|
||||||
|
|
||||||
from apps.common.coininfo import CoinInfo
|
from apps.common.coininfo import CoinInfo
|
||||||
|
|
||||||
@ -24,6 +25,8 @@ class UiConfirmOutput:
|
|||||||
self.output = output
|
self.output = output
|
||||||
self.coin = coin
|
self.coin = coin
|
||||||
|
|
||||||
|
__eq__ = obj_eq
|
||||||
|
|
||||||
|
|
||||||
class UiConfirmTotal:
|
class UiConfirmTotal:
|
||||||
def __init__(self, spending: int, fee: int, coin: CoinInfo):
|
def __init__(self, spending: int, fee: int, coin: CoinInfo):
|
||||||
@ -31,17 +34,23 @@ class UiConfirmTotal:
|
|||||||
self.fee = fee
|
self.fee = fee
|
||||||
self.coin = coin
|
self.coin = coin
|
||||||
|
|
||||||
|
__eq__ = obj_eq
|
||||||
|
|
||||||
|
|
||||||
class UiConfirmFeeOverThreshold:
|
class UiConfirmFeeOverThreshold:
|
||||||
def __init__(self, fee: int, coin: CoinInfo):
|
def __init__(self, fee: int, coin: CoinInfo):
|
||||||
self.fee = fee
|
self.fee = fee
|
||||||
self.coin = coin
|
self.coin = coin
|
||||||
|
|
||||||
|
__eq__ = obj_eq
|
||||||
|
|
||||||
|
|
||||||
class UiConfirmForeignAddress:
|
class UiConfirmForeignAddress:
|
||||||
def __init__(self, address_n: list):
|
def __init__(self, address_n: list):
|
||||||
self.address_n = address_n
|
self.address_n = address_n
|
||||||
|
|
||||||
|
__eq__ = obj_eq
|
||||||
|
|
||||||
|
|
||||||
def confirm_output(output: TxOutputType, coin: CoinInfo):
|
def confirm_output(output: TxOutputType, coin: CoinInfo):
|
||||||
return (yield UiConfirmOutput(output, coin))
|
return (yield UiConfirmOutput(output, coin))
|
||||||
|
@ -1,35 +1,30 @@
|
|||||||
from micropython import const
|
from micropython import const
|
||||||
|
|
||||||
|
from trezor import utils
|
||||||
from trezor.crypto import base58, bip32, cashaddr, der
|
from trezor.crypto import base58, bip32, cashaddr, der
|
||||||
from trezor.crypto.curve import secp256k1
|
from trezor.crypto.curve import secp256k1
|
||||||
from trezor.crypto.hashlib import blake256, sha256
|
from trezor.crypto.hashlib import blake256, sha256
|
||||||
from trezor.messages import OutputScriptType
|
from trezor.messages import FailureType, InputScriptType, OutputScriptType
|
||||||
|
from trezor.messages.SignTx import SignTx
|
||||||
|
from trezor.messages.TxInputType import TxInputType
|
||||||
|
from trezor.messages.TxOutputBinType import TxOutputBinType
|
||||||
|
from trezor.messages.TxOutputType import TxOutputType
|
||||||
|
from trezor.messages.TxRequest import TxRequest
|
||||||
from trezor.messages.TxRequestDetailsType import TxRequestDetailsType
|
from trezor.messages.TxRequestDetailsType import TxRequestDetailsType
|
||||||
from trezor.messages.TxRequestSerializedType import TxRequestSerializedType
|
from trezor.messages.TxRequestSerializedType import TxRequestSerializedType
|
||||||
from trezor.utils import HashWriter
|
|
||||||
|
|
||||||
from apps.common import address_type, coins
|
from apps.common import address_type, coininfo, coins, seed
|
||||||
from apps.common.coininfo import CoinInfo
|
from apps.wallet.sign_tx import (
|
||||||
from apps.common.writers import empty_bytearray
|
addresses,
|
||||||
from apps.wallet.sign_tx import progress
|
decred,
|
||||||
from apps.wallet.sign_tx.addresses import *
|
helpers,
|
||||||
from apps.wallet.sign_tx.decred_prefix_hasher import (
|
multisig,
|
||||||
DECRED_SERIALIZE_NO_WITNESS,
|
progress,
|
||||||
DECRED_SERIALIZE_WITNESS_SIGNING,
|
scripts,
|
||||||
DECRED_SIGHASHALL,
|
segwit_bip143,
|
||||||
DecredPrefixHasher,
|
tx_weight,
|
||||||
)
|
writers,
|
||||||
from apps.wallet.sign_tx.helpers import *
|
zcash,
|
||||||
from apps.wallet.sign_tx.multisig import *
|
|
||||||
from apps.wallet.sign_tx.scripts import *
|
|
||||||
from apps.wallet.sign_tx.segwit_bip143 import Bip143, Bip143Error # noqa:F401
|
|
||||||
from apps.wallet.sign_tx.tx_weight_calculator import *
|
|
||||||
from apps.wallet.sign_tx.writers import *
|
|
||||||
from apps.wallet.sign_tx.zcash import ( # noqa:F401
|
|
||||||
OVERWINTERED,
|
|
||||||
ZcashError,
|
|
||||||
Zip143,
|
|
||||||
Zip243,
|
|
||||||
)
|
)
|
||||||
|
|
||||||
# the number of bip32 levels used in a wallet (chain and address)
|
# the number of bip32 levels used in a wallet (chain and address)
|
||||||
@ -58,32 +53,32 @@ class SigningError(ValueError):
|
|||||||
# - check inputs, previous transactions, and outputs
|
# - check inputs, previous transactions, and outputs
|
||||||
# - ask for confirmations
|
# - ask for confirmations
|
||||||
# - check fee
|
# - check fee
|
||||||
async def check_tx_fee(tx: SignTx, root: bip32.HDNode):
|
async def check_tx_fee(tx: SignTx, keychain: seed.Keychain):
|
||||||
coin = coins.by_name(tx.coin_name)
|
coin = coins.by_name(tx.coin_name)
|
||||||
|
|
||||||
# h_first is used to make sure the inputs and outputs streamed in Phase 1
|
# h_first is used to make sure the inputs and outputs streamed in Phase 1
|
||||||
# are the same as in Phase 2. it is thus not required to fully hash the
|
# are the same as in Phase 2. it is thus not required to fully hash the
|
||||||
# tx, as the SignTx info is streamed only once
|
# tx, as the SignTx info is streamed only once
|
||||||
h_first = HashWriter(sha256()) # not a real tx hash
|
h_first = utils.HashWriter(sha256()) # not a real tx hash
|
||||||
|
|
||||||
if coin.decred:
|
if coin.decred:
|
||||||
hash143 = DecredPrefixHasher(tx) # pseudo bip143 prefix hashing
|
hash143 = decred.DecredPrefixHasher(tx) # pseudo BIP-0143 prefix hashing
|
||||||
tx_ser = TxRequestSerializedType()
|
tx_ser = TxRequestSerializedType()
|
||||||
elif tx.overwintered:
|
elif tx.overwintered:
|
||||||
if tx.version == 3:
|
if tx.version == 3:
|
||||||
hash143 = Zip143() # ZIP-0143 transaction hashing
|
hash143 = zcash.Zip143() # ZIP-0143 transaction hashing
|
||||||
elif tx.version == 4:
|
elif tx.version == 4:
|
||||||
hash143 = Zip243() # ZIP-0243 transaction hashing
|
hash143 = zcash.Zip243() # ZIP-0243 transaction hashing
|
||||||
else:
|
else:
|
||||||
raise SigningError(
|
raise SigningError(
|
||||||
FailureType.DataError,
|
FailureType.DataError,
|
||||||
"Unsupported version for overwintered transaction",
|
"Unsupported version for overwintered transaction",
|
||||||
)
|
)
|
||||||
else:
|
else:
|
||||||
hash143 = Bip143() # BIP-0143 transaction hashing
|
hash143 = segwit_bip143.Bip143() # BIP-0143 transaction hashing
|
||||||
|
|
||||||
multifp = MultisigFingerprint() # control checksum of multisig inputs
|
multifp = multisig.MultisigFingerprint() # control checksum of multisig inputs
|
||||||
weight = TxWeightCalculator(tx.inputs_count, tx.outputs_count)
|
weight = tx_weight.TxWeightCalculator(tx.inputs_count, tx.outputs_count)
|
||||||
|
|
||||||
total_in = 0 # sum of input amounts
|
total_in = 0 # sum of input amounts
|
||||||
segwit_in = 0 # sum of segwit input amounts
|
segwit_in = 0 # sum of segwit input amounts
|
||||||
@ -100,15 +95,15 @@ async def check_tx_fee(tx: SignTx, root: bip32.HDNode):
|
|||||||
for i in range(tx.inputs_count):
|
for i in range(tx.inputs_count):
|
||||||
progress.advance()
|
progress.advance()
|
||||||
# STAGE_REQUEST_1_INPUT
|
# STAGE_REQUEST_1_INPUT
|
||||||
txi = await request_tx_input(tx_req, i)
|
txi = await helpers.request_tx_input(tx_req, i)
|
||||||
wallet_path = input_extract_wallet_path(txi, wallet_path)
|
wallet_path = input_extract_wallet_path(txi, wallet_path)
|
||||||
write_tx_input_check(h_first, txi)
|
writers.write_tx_input_check(h_first, txi)
|
||||||
weight.add_input(txi)
|
weight.add_input(txi)
|
||||||
hash143.add_prevouts(txi) # all inputs are included (non-segwit as well)
|
hash143.add_prevouts(txi) # all inputs are included (non-segwit as well)
|
||||||
hash143.add_sequence(txi)
|
hash143.add_sequence(txi)
|
||||||
|
|
||||||
if not validate_full_path(txi.address_n, coin, txi.script_type):
|
if not addresses.validate_full_path(txi.address_n, coin, txi.script_type):
|
||||||
await confirm_foreign_address(txi.address_n)
|
await helpers.confirm_foreign_address(txi.address_n)
|
||||||
|
|
||||||
if txi.multisig:
|
if txi.multisig:
|
||||||
multifp.add(txi.multisig)
|
multifp.add(txi.multisig)
|
||||||
@ -149,10 +144,10 @@ async def check_tx_fee(tx: SignTx, root: bip32.HDNode):
|
|||||||
raise SigningError(FailureType.DataError, "Wrong input script type")
|
raise SigningError(FailureType.DataError, "Wrong input script type")
|
||||||
|
|
||||||
if coin.decred:
|
if coin.decred:
|
||||||
w_txi = empty_bytearray(8 if i == 0 else 0 + 9 + len(txi.prev_hash))
|
w_txi = writers.empty_bytearray(8 if i == 0 else 0 + 9 + len(txi.prev_hash))
|
||||||
if i == 0: # serializing first input => prepend headers
|
if i == 0: # serializing first input => prepend headers
|
||||||
write_bytes(w_txi, get_tx_header(coin, tx))
|
writers.write_bytes(w_txi, get_tx_header(coin, tx))
|
||||||
write_tx_input_decred(w_txi, txi)
|
writers.write_tx_input_decred(w_txi, txi)
|
||||||
tx_ser.serialized_tx = w_txi
|
tx_ser.serialized_tx = w_txi
|
||||||
tx_req.serialized = tx_ser
|
tx_req.serialized = tx_ser
|
||||||
|
|
||||||
@ -161,15 +156,15 @@ async def check_tx_fee(tx: SignTx, root: bip32.HDNode):
|
|||||||
|
|
||||||
for o in range(tx.outputs_count):
|
for o in range(tx.outputs_count):
|
||||||
# STAGE_REQUEST_3_OUTPUT
|
# STAGE_REQUEST_3_OUTPUT
|
||||||
txo = await request_tx_output(tx_req, o)
|
txo = await helpers.request_tx_output(tx_req, o)
|
||||||
txo_bin.amount = txo.amount
|
txo_bin.amount = txo.amount
|
||||||
txo_bin.script_pubkey = output_derive_script(txo, coin, root)
|
txo_bin.script_pubkey = output_derive_script(txo, coin, keychain)
|
||||||
weight.add_output(txo_bin.script_pubkey)
|
weight.add_output(txo_bin.script_pubkey)
|
||||||
|
|
||||||
if change_out == 0 and is_change(txo, wallet_path, segwit_in, multifp):
|
if change_out == 0 and output_is_change(txo, wallet_path, segwit_in, multifp):
|
||||||
# output is change and does not need confirmation
|
# output is change and does not need confirmation
|
||||||
change_out = txo.amount
|
change_out = txo.amount
|
||||||
elif not await confirm_output(txo, coin):
|
elif not await helpers.confirm_output(txo, coin):
|
||||||
raise SigningError(FailureType.ActionCancelled, "Output cancelled")
|
raise SigningError(FailureType.ActionCancelled, "Output cancelled")
|
||||||
|
|
||||||
if coin.decred:
|
if coin.decred:
|
||||||
@ -180,15 +175,17 @@ async def check_tx_fee(tx: SignTx, root: bip32.HDNode):
|
|||||||
)
|
)
|
||||||
txo_bin.decred_script_version = txo.decred_script_version
|
txo_bin.decred_script_version = txo.decred_script_version
|
||||||
|
|
||||||
w_txo_bin = empty_bytearray(4 + 8 + 2 + 4 + len(txo_bin.script_pubkey))
|
w_txo_bin = writers.empty_bytearray(
|
||||||
|
4 + 8 + 2 + 4 + len(txo_bin.script_pubkey)
|
||||||
|
)
|
||||||
if o == 0: # serializing first output => prepend outputs count
|
if o == 0: # serializing first output => prepend outputs count
|
||||||
write_varint(w_txo_bin, tx.outputs_count)
|
writers.write_varint(w_txo_bin, tx.outputs_count)
|
||||||
write_tx_output(w_txo_bin, txo_bin)
|
writers.write_tx_output(w_txo_bin, txo_bin)
|
||||||
tx_ser.serialized_tx = w_txo_bin
|
tx_ser.serialized_tx = w_txo_bin
|
||||||
tx_req.serialized = tx_ser
|
tx_req.serialized = tx_ser
|
||||||
hash143.set_last_output_bytes(w_txo_bin)
|
hash143.set_last_output_bytes(w_txo_bin)
|
||||||
|
|
||||||
write_tx_output(h_first, txo_bin)
|
writers.write_tx_output(h_first, txo_bin)
|
||||||
hash143.add_output(txo_bin)
|
hash143.add_output(txo_bin)
|
||||||
total_out += txo_bin.amount
|
total_out += txo_bin.amount
|
||||||
|
|
||||||
@ -198,10 +195,10 @@ async def check_tx_fee(tx: SignTx, root: bip32.HDNode):
|
|||||||
|
|
||||||
# fee > (coin.maxfee per byte * tx size)
|
# fee > (coin.maxfee per byte * tx size)
|
||||||
if fee > (coin.maxfee_kb / 1000) * (weight.get_total() / 4):
|
if fee > (coin.maxfee_kb / 1000) * (weight.get_total() / 4):
|
||||||
if not await confirm_feeoverthreshold(fee, coin):
|
if not await helpers.confirm_feeoverthreshold(fee, coin):
|
||||||
raise SigningError(FailureType.ActionCancelled, "Signing cancelled")
|
raise SigningError(FailureType.ActionCancelled, "Signing cancelled")
|
||||||
|
|
||||||
if not await confirm_total(total_in - change_out, fee, coin):
|
if not await helpers.confirm_total(total_in - change_out, fee, coin):
|
||||||
raise SigningError(FailureType.ActionCancelled, "Total cancelled")
|
raise SigningError(FailureType.ActionCancelled, "Total cancelled")
|
||||||
|
|
||||||
if coin.decred:
|
if coin.decred:
|
||||||
@ -210,14 +207,16 @@ async def check_tx_fee(tx: SignTx, root: bip32.HDNode):
|
|||||||
return h_first, hash143, segwit, total_in, wallet_path
|
return h_first, hash143, segwit, total_in, wallet_path
|
||||||
|
|
||||||
|
|
||||||
async def sign_tx(tx: SignTx, root: bip32.HDNode):
|
async def sign_tx(tx: SignTx, keychain: seed.Keychain):
|
||||||
tx = sanitize_sign_tx(tx)
|
tx = helpers.sanitize_sign_tx(tx)
|
||||||
|
|
||||||
progress.init(tx.inputs_count, tx.outputs_count)
|
progress.init(tx.inputs_count, tx.outputs_count)
|
||||||
|
|
||||||
# Phase 1
|
# Phase 1
|
||||||
|
|
||||||
h_first, hash143, segwit, authorized_in, wallet_path = await check_tx_fee(tx, root)
|
h_first, hash143, segwit, authorized_in, wallet_path = await check_tx_fee(
|
||||||
|
tx, keychain
|
||||||
|
)
|
||||||
|
|
||||||
# Phase 2
|
# Phase 2
|
||||||
# - sign inputs
|
# - sign inputs
|
||||||
@ -242,34 +241,30 @@ async def sign_tx(tx: SignTx, root: bip32.HDNode):
|
|||||||
|
|
||||||
if segwit[i_sign]:
|
if segwit[i_sign]:
|
||||||
# STAGE_REQUEST_SEGWIT_INPUT
|
# STAGE_REQUEST_SEGWIT_INPUT
|
||||||
txi_sign = await request_tx_input(tx_req, i_sign)
|
txi_sign = await helpers.request_tx_input(tx_req, i_sign)
|
||||||
|
|
||||||
is_segwit = (
|
if not input_is_segwit(txi_sign):
|
||||||
txi_sign.script_type == InputScriptType.SPENDWITNESS
|
|
||||||
or txi_sign.script_type == InputScriptType.SPENDP2SHWITNESS
|
|
||||||
)
|
|
||||||
if not is_segwit:
|
|
||||||
raise SigningError(
|
raise SigningError(
|
||||||
FailureType.ProcessError, "Transaction has changed during signing"
|
FailureType.ProcessError, "Transaction has changed during signing"
|
||||||
)
|
)
|
||||||
input_check_wallet_path(txi_sign, wallet_path)
|
input_check_wallet_path(txi_sign, wallet_path)
|
||||||
|
|
||||||
key_sign = node_derive(root, txi_sign.address_n)
|
key_sign = keychain.derive(txi_sign.address_n, coin.curve_name)
|
||||||
key_sign_pub = key_sign.public_key()
|
key_sign_pub = key_sign.public_key()
|
||||||
txi_sign.script_sig = input_derive_script(coin, txi_sign, key_sign_pub)
|
txi_sign.script_sig = input_derive_script(coin, txi_sign, key_sign_pub)
|
||||||
|
|
||||||
w_txi = empty_bytearray(
|
w_txi = writers.empty_bytearray(
|
||||||
7 + len(txi_sign.prev_hash) + 4 + len(txi_sign.script_sig) + 4
|
7 + len(txi_sign.prev_hash) + 4 + len(txi_sign.script_sig) + 4
|
||||||
)
|
)
|
||||||
if i_sign == 0: # serializing first input => prepend headers
|
if i_sign == 0: # serializing first input => prepend headers
|
||||||
write_bytes(w_txi, get_tx_header(coin, tx, True))
|
writers.write_bytes(w_txi, get_tx_header(coin, tx, True))
|
||||||
write_tx_input(w_txi, txi_sign)
|
writers.write_tx_input(w_txi, txi_sign)
|
||||||
tx_ser.serialized_tx = w_txi
|
tx_ser.serialized_tx = w_txi
|
||||||
tx_req.serialized = tx_ser
|
tx_req.serialized = tx_ser
|
||||||
|
|
||||||
elif coin.force_bip143 or tx.overwintered:
|
elif coin.force_bip143 or tx.overwintered:
|
||||||
# STAGE_REQUEST_SEGWIT_INPUT
|
# STAGE_REQUEST_SEGWIT_INPUT
|
||||||
txi_sign = await request_tx_input(tx_req, i_sign)
|
txi_sign = await helpers.request_tx_input(tx_req, i_sign)
|
||||||
input_check_wallet_path(txi_sign, wallet_path)
|
input_check_wallet_path(txi_sign, wallet_path)
|
||||||
|
|
||||||
is_bip143 = (
|
is_bip143 = (
|
||||||
@ -282,19 +277,19 @@ async def sign_tx(tx: SignTx, root: bip32.HDNode):
|
|||||||
)
|
)
|
||||||
authorized_in -= txi_sign.amount
|
authorized_in -= txi_sign.amount
|
||||||
|
|
||||||
key_sign = node_derive(root, txi_sign.address_n)
|
key_sign = keychain.derive(txi_sign.address_n, coin.curve_name)
|
||||||
key_sign_pub = key_sign.public_key()
|
key_sign_pub = key_sign.public_key()
|
||||||
hash143_hash = hash143.preimage_hash(
|
hash143_hash = hash143.preimage_hash(
|
||||||
coin,
|
coin,
|
||||||
tx,
|
tx,
|
||||||
txi_sign,
|
txi_sign,
|
||||||
ecdsa_hash_pubkey(key_sign_pub, coin),
|
addresses.ecdsa_hash_pubkey(key_sign_pub, coin),
|
||||||
get_hash_type(coin),
|
get_hash_type(coin),
|
||||||
)
|
)
|
||||||
|
|
||||||
# if multisig, check if singing with a key that is included in multisig
|
# if multisig, check if signing with a key that is included in multisig
|
||||||
if txi_sign.multisig:
|
if txi_sign.multisig:
|
||||||
multisig_pubkey_index(txi_sign.multisig, key_sign_pub)
|
multisig.multisig_pubkey_index(txi_sign.multisig, key_sign_pub)
|
||||||
|
|
||||||
signature = ecdsa_sign(key_sign, hash143_hash)
|
signature = ecdsa_sign(key_sign, hash143_hash)
|
||||||
tx_ser.signature_index = i_sign
|
tx_ser.signature_index = i_sign
|
||||||
@ -304,56 +299,59 @@ async def sign_tx(tx: SignTx, root: bip32.HDNode):
|
|||||||
txi_sign.script_sig = input_derive_script(
|
txi_sign.script_sig = input_derive_script(
|
||||||
coin, txi_sign, key_sign_pub, signature
|
coin, txi_sign, key_sign_pub, signature
|
||||||
)
|
)
|
||||||
w_txi_sign = empty_bytearray(
|
w_txi_sign = writers.empty_bytearray(
|
||||||
5 + len(txi_sign.prev_hash) + 4 + len(txi_sign.script_sig) + 4
|
5 + len(txi_sign.prev_hash) + 4 + len(txi_sign.script_sig) + 4
|
||||||
)
|
)
|
||||||
if i_sign == 0: # serializing first input => prepend headers
|
if i_sign == 0: # serializing first input => prepend headers
|
||||||
write_bytes(w_txi_sign, get_tx_header(coin, tx))
|
writers.write_bytes(w_txi_sign, get_tx_header(coin, tx))
|
||||||
write_tx_input(w_txi_sign, txi_sign)
|
writers.write_tx_input(w_txi_sign, txi_sign)
|
||||||
tx_ser.serialized_tx = w_txi_sign
|
tx_ser.serialized_tx = w_txi_sign
|
||||||
|
|
||||||
tx_req.serialized = tx_ser
|
tx_req.serialized = tx_ser
|
||||||
|
|
||||||
elif coin.decred:
|
elif coin.decred:
|
||||||
txi_sign = await request_tx_input(tx_req, i_sign)
|
txi_sign = await helpers.request_tx_input(tx_req, i_sign)
|
||||||
|
|
||||||
input_check_wallet_path(txi_sign, wallet_path)
|
input_check_wallet_path(txi_sign, wallet_path)
|
||||||
|
|
||||||
key_sign = node_derive(root, txi_sign.address_n)
|
key_sign = keychain.derive(txi_sign.address_n, coin.curve_name)
|
||||||
key_sign_pub = key_sign.public_key()
|
key_sign_pub = key_sign.public_key()
|
||||||
|
|
||||||
if txi_sign.script_type == InputScriptType.SPENDMULTISIG:
|
if txi_sign.script_type == InputScriptType.SPENDMULTISIG:
|
||||||
prev_pkscript = output_script_multisig(
|
prev_pkscript = scripts.output_script_multisig(
|
||||||
multisig_get_pubkeys(txi_sign.multisig), txi_sign.multisig.m
|
multisig.multisig_get_pubkeys(txi_sign.multisig),
|
||||||
|
txi_sign.multisig.m,
|
||||||
)
|
)
|
||||||
elif txi_sign.script_type == InputScriptType.SPENDADDRESS:
|
elif txi_sign.script_type == InputScriptType.SPENDADDRESS:
|
||||||
prev_pkscript = output_script_p2pkh(
|
prev_pkscript = scripts.output_script_p2pkh(
|
||||||
ecdsa_hash_pubkey(key_sign_pub, coin)
|
addresses.ecdsa_hash_pubkey(key_sign_pub, coin)
|
||||||
)
|
)
|
||||||
else:
|
else:
|
||||||
raise ValueError("Unknown input script type")
|
raise ValueError("Unknown input script type")
|
||||||
|
|
||||||
h_witness = HashWriter(blake256())
|
h_witness = utils.HashWriter(blake256())
|
||||||
write_uint32(h_witness, tx.version | DECRED_SERIALIZE_WITNESS_SIGNING)
|
writers.write_uint32(
|
||||||
write_varint(h_witness, tx.inputs_count)
|
h_witness, tx.version | decred.DECRED_SERIALIZE_WITNESS_SIGNING
|
||||||
|
)
|
||||||
|
writers.write_varint(h_witness, tx.inputs_count)
|
||||||
|
|
||||||
for ii in range(tx.inputs_count):
|
for ii in range(tx.inputs_count):
|
||||||
if ii == i_sign:
|
if ii == i_sign:
|
||||||
write_varint(h_witness, len(prev_pkscript))
|
writers.write_varint(h_witness, len(prev_pkscript))
|
||||||
write_bytes(h_witness, prev_pkscript)
|
writers.write_bytes(h_witness, prev_pkscript)
|
||||||
else:
|
else:
|
||||||
write_varint(h_witness, 0)
|
writers.write_varint(h_witness, 0)
|
||||||
|
|
||||||
witness_hash = get_tx_hash(
|
witness_hash = writers.get_tx_hash(
|
||||||
h_witness, double=coin.sign_hash_double, reverse=False
|
h_witness, double=coin.sign_hash_double, reverse=False
|
||||||
)
|
)
|
||||||
|
|
||||||
h_sign = HashWriter(blake256())
|
h_sign = utils.HashWriter(blake256())
|
||||||
write_uint32(h_sign, DECRED_SIGHASHALL)
|
writers.write_uint32(h_sign, decred.DECRED_SIGHASHALL)
|
||||||
write_bytes(h_sign, prefix_hash)
|
writers.write_bytes(h_sign, prefix_hash)
|
||||||
write_bytes(h_sign, witness_hash)
|
writers.write_bytes(h_sign, witness_hash)
|
||||||
|
|
||||||
sig_hash = get_tx_hash(h_sign, double=coin.sign_hash_double)
|
sig_hash = writers.get_tx_hash(h_sign, double=coin.sign_hash_double)
|
||||||
signature = ecdsa_sign(key_sign, sig_hash)
|
signature = ecdsa_sign(key_sign, sig_hash)
|
||||||
tx_ser.signature_index = i_sign
|
tx_ser.signature_index = i_sign
|
||||||
tx_ser.signature = signature
|
tx_ser.signature = signature
|
||||||
@ -362,61 +360,62 @@ async def sign_tx(tx: SignTx, root: bip32.HDNode):
|
|||||||
txi_sign.script_sig = input_derive_script(
|
txi_sign.script_sig = input_derive_script(
|
||||||
coin, txi_sign, key_sign_pub, signature
|
coin, txi_sign, key_sign_pub, signature
|
||||||
)
|
)
|
||||||
w_txi_sign = empty_bytearray(
|
w_txi_sign = writers.empty_bytearray(
|
||||||
8 + 4 + len(hash143.get_last_output_bytes())
|
8 + 4 + len(hash143.get_last_output_bytes())
|
||||||
if i_sign == 0
|
if i_sign == 0
|
||||||
else 0 + 16 + 4 + len(txi_sign.script_sig)
|
else 0 + 16 + 4 + len(txi_sign.script_sig)
|
||||||
)
|
)
|
||||||
|
|
||||||
if i_sign == 0:
|
if i_sign == 0:
|
||||||
write_bytes(w_txi_sign, hash143.get_last_output_bytes())
|
writers.write_bytes(w_txi_sign, hash143.get_last_output_bytes())
|
||||||
write_uint32(w_txi_sign, tx.lock_time)
|
writers.write_uint32(w_txi_sign, tx.lock_time)
|
||||||
write_uint32(w_txi_sign, tx.expiry)
|
writers.write_uint32(w_txi_sign, tx.expiry)
|
||||||
write_varint(w_txi_sign, tx.inputs_count)
|
writers.write_varint(w_txi_sign, tx.inputs_count)
|
||||||
|
|
||||||
write_tx_input_decred_witness(w_txi_sign, txi_sign)
|
writers.write_tx_input_decred_witness(w_txi_sign, txi_sign)
|
||||||
tx_ser.serialized_tx = w_txi_sign
|
tx_ser.serialized_tx = w_txi_sign
|
||||||
tx_req.serialized = tx_ser
|
tx_req.serialized = tx_ser
|
||||||
|
|
||||||
else:
|
else:
|
||||||
# hash of what we are signing with this input
|
# hash of what we are signing with this input
|
||||||
h_sign = HashWriter(sha256())
|
h_sign = utils.HashWriter(sha256())
|
||||||
# same as h_first, checked before signing the digest
|
# same as h_first, checked before signing the digest
|
||||||
h_second = HashWriter(sha256())
|
h_second = utils.HashWriter(sha256())
|
||||||
|
|
||||||
if tx.overwintered:
|
if tx.overwintered:
|
||||||
write_uint32(
|
writers.write_uint32(
|
||||||
h_sign, tx.version | OVERWINTERED
|
h_sign, tx.version | zcash.OVERWINTERED
|
||||||
) # nVersion | fOverwintered
|
) # nVersion | fOverwintered
|
||||||
write_uint32(h_sign, tx.version_group_id) # nVersionGroupId
|
writers.write_uint32(h_sign, tx.version_group_id) # nVersionGroupId
|
||||||
else:
|
else:
|
||||||
write_uint32(h_sign, tx.version) # nVersion
|
writers.write_uint32(h_sign, tx.version) # nVersion
|
||||||
if tx.timestamp:
|
if tx.timestamp:
|
||||||
write_uint32(h_sign, tx.timestamp)
|
writers.write_uint32(h_sign, tx.timestamp)
|
||||||
|
|
||||||
write_varint(h_sign, tx.inputs_count)
|
writers.write_varint(h_sign, tx.inputs_count)
|
||||||
|
|
||||||
for i in range(tx.inputs_count):
|
for i in range(tx.inputs_count):
|
||||||
# STAGE_REQUEST_4_INPUT
|
# STAGE_REQUEST_4_INPUT
|
||||||
txi = await request_tx_input(tx_req, i)
|
txi = await helpers.request_tx_input(tx_req, i)
|
||||||
input_check_wallet_path(txi, wallet_path)
|
input_check_wallet_path(txi, wallet_path)
|
||||||
write_tx_input_check(h_second, txi)
|
writers.write_tx_input_check(h_second, txi)
|
||||||
if i == i_sign:
|
if i == i_sign:
|
||||||
txi_sign = txi
|
txi_sign = txi
|
||||||
key_sign = node_derive(root, txi.address_n)
|
key_sign = keychain.derive(txi.address_n, coin.curve_name)
|
||||||
key_sign_pub = key_sign.public_key()
|
key_sign_pub = key_sign.public_key()
|
||||||
# for the signing process the script_sig is equal
|
# for the signing process the script_sig is equal
|
||||||
# to the previous tx's scriptPubKey (P2PKH) or a redeem script (P2SH)
|
# to the previous tx's scriptPubKey (P2PKH) or a redeem script (P2SH)
|
||||||
if txi_sign.script_type == InputScriptType.SPENDMULTISIG:
|
if txi_sign.script_type == InputScriptType.SPENDMULTISIG:
|
||||||
txi_sign.script_sig = output_script_multisig(
|
txi_sign.script_sig = scripts.output_script_multisig(
|
||||||
multisig_get_pubkeys(txi_sign.multisig), txi_sign.multisig.m
|
multisig.multisig_get_pubkeys(txi_sign.multisig),
|
||||||
|
txi_sign.multisig.m,
|
||||||
)
|
)
|
||||||
elif txi_sign.script_type == InputScriptType.SPENDADDRESS:
|
elif txi_sign.script_type == InputScriptType.SPENDADDRESS:
|
||||||
txi_sign.script_sig = output_script_p2pkh(
|
txi_sign.script_sig = scripts.output_script_p2pkh(
|
||||||
ecdsa_hash_pubkey(key_sign_pub, coin)
|
addresses.ecdsa_hash_pubkey(key_sign_pub, coin)
|
||||||
)
|
)
|
||||||
if coin.bip115:
|
if coin.bip115:
|
||||||
txi_sign.script_sig += script_replay_protection_bip115(
|
txi_sign.script_sig += scripts.script_replay_protection_bip115(
|
||||||
txi_sign.prev_block_hash_bip115,
|
txi_sign.prev_block_hash_bip115,
|
||||||
txi_sign.prev_block_height_bip115,
|
txi_sign.prev_block_height_bip115,
|
||||||
)
|
)
|
||||||
@ -426,38 +425,38 @@ async def sign_tx(tx: SignTx, root: bip32.HDNode):
|
|||||||
)
|
)
|
||||||
else:
|
else:
|
||||||
txi.script_sig = bytes()
|
txi.script_sig = bytes()
|
||||||
write_tx_input(h_sign, txi)
|
writers.write_tx_input(h_sign, txi)
|
||||||
|
|
||||||
write_varint(h_sign, tx.outputs_count)
|
writers.write_varint(h_sign, tx.outputs_count)
|
||||||
|
|
||||||
for o in range(tx.outputs_count):
|
for o in range(tx.outputs_count):
|
||||||
# STAGE_REQUEST_4_OUTPUT
|
# STAGE_REQUEST_4_OUTPUT
|
||||||
txo = await request_tx_output(tx_req, o)
|
txo = await helpers.request_tx_output(tx_req, o)
|
||||||
txo_bin.amount = txo.amount
|
txo_bin.amount = txo.amount
|
||||||
txo_bin.script_pubkey = output_derive_script(txo, coin, root)
|
txo_bin.script_pubkey = output_derive_script(txo, coin, keychain)
|
||||||
write_tx_output(h_second, txo_bin)
|
writers.write_tx_output(h_second, txo_bin)
|
||||||
write_tx_output(h_sign, txo_bin)
|
writers.write_tx_output(h_sign, txo_bin)
|
||||||
|
|
||||||
write_uint32(h_sign, tx.lock_time)
|
writers.write_uint32(h_sign, tx.lock_time)
|
||||||
if tx.overwintered:
|
if tx.overwintered:
|
||||||
write_uint32(h_sign, tx.expiry) # expiryHeight
|
writers.write_uint32(h_sign, tx.expiry) # expiryHeight
|
||||||
write_varint(h_sign, 0) # nJoinSplit
|
writers.write_varint(h_sign, 0) # nJoinSplit
|
||||||
|
|
||||||
write_uint32(h_sign, get_hash_type(coin))
|
writers.write_uint32(h_sign, get_hash_type(coin))
|
||||||
|
|
||||||
# check the control digests
|
# check the control digests
|
||||||
if get_tx_hash(h_first, False) != get_tx_hash(h_second):
|
if writers.get_tx_hash(h_first, False) != writers.get_tx_hash(h_second):
|
||||||
raise SigningError(
|
raise SigningError(
|
||||||
FailureType.ProcessError, "Transaction has changed during signing"
|
FailureType.ProcessError, "Transaction has changed during signing"
|
||||||
)
|
)
|
||||||
|
|
||||||
# if multisig, check if singing with a key that is included in multisig
|
# if multisig, check if signing with a key that is included in multisig
|
||||||
if txi_sign.multisig:
|
if txi_sign.multisig:
|
||||||
multisig_pubkey_index(txi_sign.multisig, key_sign_pub)
|
multisig.multisig_pubkey_index(txi_sign.multisig, key_sign_pub)
|
||||||
|
|
||||||
# compute the signature from the tx digest
|
# compute the signature from the tx digest
|
||||||
signature = ecdsa_sign(
|
signature = ecdsa_sign(
|
||||||
key_sign, get_tx_hash(h_sign, double=coin.sign_hash_double)
|
key_sign, writers.get_tx_hash(h_sign, double=coin.sign_hash_double)
|
||||||
)
|
)
|
||||||
tx_ser.signature_index = i_sign
|
tx_ser.signature_index = i_sign
|
||||||
tx_ser.signature = signature
|
tx_ser.signature = signature
|
||||||
@ -466,31 +465,31 @@ async def sign_tx(tx: SignTx, root: bip32.HDNode):
|
|||||||
txi_sign.script_sig = input_derive_script(
|
txi_sign.script_sig = input_derive_script(
|
||||||
coin, txi_sign, key_sign_pub, signature
|
coin, txi_sign, key_sign_pub, signature
|
||||||
)
|
)
|
||||||
w_txi_sign = empty_bytearray(
|
w_txi_sign = writers.empty_bytearray(
|
||||||
5 + len(txi_sign.prev_hash) + 4 + len(txi_sign.script_sig) + 4
|
5 + len(txi_sign.prev_hash) + 4 + len(txi_sign.script_sig) + 4
|
||||||
)
|
)
|
||||||
if i_sign == 0: # serializing first input => prepend headers
|
if i_sign == 0: # serializing first input => prepend headers
|
||||||
write_bytes(w_txi_sign, get_tx_header(coin, tx))
|
writers.write_bytes(w_txi_sign, get_tx_header(coin, tx))
|
||||||
write_tx_input(w_txi_sign, txi_sign)
|
writers.write_tx_input(w_txi_sign, txi_sign)
|
||||||
tx_ser.serialized_tx = w_txi_sign
|
tx_ser.serialized_tx = w_txi_sign
|
||||||
|
|
||||||
tx_req.serialized = tx_ser
|
tx_req.serialized = tx_ser
|
||||||
|
|
||||||
if coin.decred:
|
if coin.decred:
|
||||||
return await request_tx_finish(tx_req)
|
return await helpers.request_tx_finish(tx_req)
|
||||||
|
|
||||||
for o in range(tx.outputs_count):
|
for o in range(tx.outputs_count):
|
||||||
progress.advance()
|
progress.advance()
|
||||||
# STAGE_REQUEST_5_OUTPUT
|
# STAGE_REQUEST_5_OUTPUT
|
||||||
txo = await request_tx_output(tx_req, o)
|
txo = await helpers.request_tx_output(tx_req, o)
|
||||||
txo_bin.amount = txo.amount
|
txo_bin.amount = txo.amount
|
||||||
txo_bin.script_pubkey = output_derive_script(txo, coin, root)
|
txo_bin.script_pubkey = output_derive_script(txo, coin, keychain)
|
||||||
|
|
||||||
# serialize output
|
# serialize output
|
||||||
w_txo_bin = empty_bytearray(5 + 8 + 5 + len(txo_bin.script_pubkey) + 4)
|
w_txo_bin = writers.empty_bytearray(5 + 8 + 5 + len(txo_bin.script_pubkey) + 4)
|
||||||
if o == 0: # serializing first output => prepend outputs count
|
if o == 0: # serializing first output => prepend outputs count
|
||||||
write_varint(w_txo_bin, tx.outputs_count)
|
writers.write_varint(w_txo_bin, tx.outputs_count)
|
||||||
write_tx_output(w_txo_bin, txo_bin)
|
writers.write_tx_output(w_txo_bin, txo_bin)
|
||||||
|
|
||||||
tx_ser.signature_index = None
|
tx_ser.signature_index = None
|
||||||
tx_ser.signature = None
|
tx_ser.signature = None
|
||||||
@ -504,38 +503,38 @@ async def sign_tx(tx: SignTx, root: bip32.HDNode):
|
|||||||
progress.advance()
|
progress.advance()
|
||||||
if segwit[i]:
|
if segwit[i]:
|
||||||
# STAGE_REQUEST_SEGWIT_WITNESS
|
# STAGE_REQUEST_SEGWIT_WITNESS
|
||||||
txi = await request_tx_input(tx_req, i)
|
txi = await helpers.request_tx_input(tx_req, i)
|
||||||
input_check_wallet_path(txi, wallet_path)
|
input_check_wallet_path(txi, wallet_path)
|
||||||
|
|
||||||
is_segwit = (
|
if not input_is_segwit(txi) or txi.amount > authorized_in:
|
||||||
txi.script_type == InputScriptType.SPENDWITNESS
|
|
||||||
or txi.script_type == InputScriptType.SPENDP2SHWITNESS
|
|
||||||
)
|
|
||||||
if not is_segwit or txi.amount > authorized_in:
|
|
||||||
raise SigningError(
|
raise SigningError(
|
||||||
FailureType.ProcessError, "Transaction has changed during signing"
|
FailureType.ProcessError, "Transaction has changed during signing"
|
||||||
)
|
)
|
||||||
authorized_in -= txi.amount
|
authorized_in -= txi.amount
|
||||||
|
|
||||||
key_sign = node_derive(root, txi.address_n)
|
key_sign = keychain.derive(txi.address_n, coin.curve_name)
|
||||||
key_sign_pub = key_sign.public_key()
|
key_sign_pub = key_sign.public_key()
|
||||||
hash143_hash = hash143.preimage_hash(
|
hash143_hash = hash143.preimage_hash(
|
||||||
coin,
|
coin,
|
||||||
tx,
|
tx,
|
||||||
txi,
|
txi,
|
||||||
ecdsa_hash_pubkey(key_sign_pub, coin),
|
addresses.ecdsa_hash_pubkey(key_sign_pub, coin),
|
||||||
get_hash_type(coin),
|
get_hash_type(coin),
|
||||||
)
|
)
|
||||||
|
|
||||||
signature = ecdsa_sign(key_sign, hash143_hash)
|
signature = ecdsa_sign(key_sign, hash143_hash)
|
||||||
if txi.multisig:
|
if txi.multisig:
|
||||||
# find out place of our signature based on the pubkey
|
# find out place of our signature based on the pubkey
|
||||||
signature_index = multisig_pubkey_index(txi.multisig, key_sign_pub)
|
signature_index = multisig.multisig_pubkey_index(
|
||||||
witness = witness_p2wsh(
|
txi.multisig, key_sign_pub
|
||||||
|
)
|
||||||
|
witness = scripts.witness_p2wsh(
|
||||||
txi.multisig, signature, signature_index, get_hash_type(coin)
|
txi.multisig, signature, signature_index, get_hash_type(coin)
|
||||||
)
|
)
|
||||||
else:
|
else:
|
||||||
witness = witness_p2wpkh(signature, key_sign_pub, get_hash_type(coin))
|
witness = scripts.witness_p2wpkh(
|
||||||
|
signature, key_sign_pub, get_hash_type(coin)
|
||||||
|
)
|
||||||
|
|
||||||
tx_ser.serialized_tx = witness
|
tx_ser.serialized_tx = witness
|
||||||
tx_ser.signature_index = i
|
tx_ser.signature_index = i
|
||||||
@ -547,66 +546,68 @@ async def sign_tx(tx: SignTx, root: bip32.HDNode):
|
|||||||
|
|
||||||
tx_req.serialized = tx_ser
|
tx_req.serialized = tx_ser
|
||||||
|
|
||||||
write_uint32(tx_ser.serialized_tx, tx.lock_time)
|
writers.write_uint32(tx_ser.serialized_tx, tx.lock_time)
|
||||||
|
|
||||||
if tx.overwintered:
|
if tx.overwintered:
|
||||||
if tx.version == 3:
|
if tx.version == 3:
|
||||||
write_uint32(tx_ser.serialized_tx, tx.expiry) # expiryHeight
|
writers.write_uint32(tx_ser.serialized_tx, tx.expiry) # expiryHeight
|
||||||
write_varint(tx_ser.serialized_tx, 0) # nJoinSplit
|
writers.write_varint(tx_ser.serialized_tx, 0) # nJoinSplit
|
||||||
elif tx.version == 4:
|
elif tx.version == 4:
|
||||||
write_uint32(tx_ser.serialized_tx, tx.expiry) # expiryHeight
|
writers.write_uint32(tx_ser.serialized_tx, tx.expiry) # expiryHeight
|
||||||
write_uint64(tx_ser.serialized_tx, 0) # valueBalance
|
writers.write_uint64(tx_ser.serialized_tx, 0) # valueBalance
|
||||||
write_varint(tx_ser.serialized_tx, 0) # nShieldedSpend
|
writers.write_varint(tx_ser.serialized_tx, 0) # nShieldedSpend
|
||||||
write_varint(tx_ser.serialized_tx, 0) # nShieldedOutput
|
writers.write_varint(tx_ser.serialized_tx, 0) # nShieldedOutput
|
||||||
write_varint(tx_ser.serialized_tx, 0) # nJoinSplit
|
writers.write_varint(tx_ser.serialized_tx, 0) # nJoinSplit
|
||||||
else:
|
else:
|
||||||
raise SigningError(
|
raise SigningError(
|
||||||
FailureType.DataError,
|
FailureType.DataError,
|
||||||
"Unsupported version for overwintered transaction",
|
"Unsupported version for overwintered transaction",
|
||||||
)
|
)
|
||||||
|
|
||||||
await request_tx_finish(tx_req)
|
await helpers.request_tx_finish(tx_req)
|
||||||
|
|
||||||
|
|
||||||
async def get_prevtx_output_value(
|
async def get_prevtx_output_value(
|
||||||
coin: CoinInfo, tx_req: TxRequest, prev_hash: bytes, prev_index: int
|
coin: coininfo.CoinInfo, tx_req: TxRequest, prev_hash: bytes, prev_index: int
|
||||||
) -> int:
|
) -> int:
|
||||||
total_out = 0 # sum of output amounts
|
total_out = 0 # sum of output amounts
|
||||||
|
|
||||||
# STAGE_REQUEST_2_PREV_META
|
# STAGE_REQUEST_2_PREV_META
|
||||||
tx = await request_tx_meta(tx_req, prev_hash)
|
tx = await helpers.request_tx_meta(tx_req, prev_hash)
|
||||||
|
|
||||||
if coin.decred:
|
if coin.decred:
|
||||||
txh = HashWriter(blake256())
|
txh = utils.HashWriter(blake256())
|
||||||
else:
|
else:
|
||||||
txh = HashWriter(sha256())
|
txh = utils.HashWriter(sha256())
|
||||||
|
|
||||||
if tx.overwintered:
|
if tx.overwintered:
|
||||||
write_uint32(txh, tx.version | OVERWINTERED) # nVersion | fOverwintered
|
writers.write_uint32(
|
||||||
write_uint32(txh, tx.version_group_id) # nVersionGroupId
|
txh, tx.version | zcash.OVERWINTERED
|
||||||
|
) # nVersion | fOverwintered
|
||||||
|
writers.write_uint32(txh, tx.version_group_id) # nVersionGroupId
|
||||||
elif coin.decred:
|
elif coin.decred:
|
||||||
write_uint32(txh, tx.version | DECRED_SERIALIZE_NO_WITNESS)
|
writers.write_uint32(txh, tx.version | decred.DECRED_SERIALIZE_NO_WITNESS)
|
||||||
else:
|
else:
|
||||||
write_uint32(txh, tx.version) # nVersion
|
writers.write_uint32(txh, tx.version) # nVersion
|
||||||
if tx.timestamp:
|
if tx.timestamp:
|
||||||
write_uint32(txh, tx.timestamp)
|
writers.write_uint32(txh, tx.timestamp)
|
||||||
|
|
||||||
write_varint(txh, tx.inputs_cnt)
|
writers.write_varint(txh, tx.inputs_cnt)
|
||||||
|
|
||||||
for i in range(tx.inputs_cnt):
|
for i in range(tx.inputs_cnt):
|
||||||
# STAGE_REQUEST_2_PREV_INPUT
|
# STAGE_REQUEST_2_PREV_INPUT
|
||||||
txi = await request_tx_input(tx_req, i, prev_hash)
|
txi = await helpers.request_tx_input(tx_req, i, prev_hash)
|
||||||
if coin.decred:
|
if coin.decred:
|
||||||
write_tx_input_decred(txh, txi)
|
writers.write_tx_input_decred(txh, txi)
|
||||||
else:
|
else:
|
||||||
write_tx_input(txh, txi)
|
writers.write_tx_input(txh, txi)
|
||||||
|
|
||||||
write_varint(txh, tx.outputs_cnt)
|
writers.write_varint(txh, tx.outputs_cnt)
|
||||||
|
|
||||||
for o in range(tx.outputs_cnt):
|
for o in range(tx.outputs_cnt):
|
||||||
# STAGE_REQUEST_2_PREV_OUTPUT
|
# STAGE_REQUEST_2_PREV_OUTPUT
|
||||||
txo_bin = await request_tx_output(tx_req, o, prev_hash)
|
txo_bin = await helpers.request_tx_output(tx_req, o, prev_hash)
|
||||||
write_tx_output(txh, txo_bin)
|
writers.write_tx_output(txh, txo_bin)
|
||||||
if o == prev_index:
|
if o == prev_index:
|
||||||
total_out += txo_bin.amount
|
total_out += txo_bin.amount
|
||||||
if (
|
if (
|
||||||
@ -619,19 +620,22 @@ async def get_prevtx_output_value(
|
|||||||
"Cannot use utxo that has script_version != 0",
|
"Cannot use utxo that has script_version != 0",
|
||||||
)
|
)
|
||||||
|
|
||||||
write_uint32(txh, tx.lock_time)
|
writers.write_uint32(txh, tx.lock_time)
|
||||||
|
|
||||||
if tx.overwintered or coin.decred:
|
if tx.overwintered or coin.decred:
|
||||||
write_uint32(txh, tx.expiry)
|
writers.write_uint32(txh, tx.expiry)
|
||||||
|
|
||||||
ofs = 0
|
ofs = 0
|
||||||
while ofs < tx.extra_data_len:
|
while ofs < tx.extra_data_len:
|
||||||
size = min(1024, tx.extra_data_len - ofs)
|
size = min(1024, tx.extra_data_len - ofs)
|
||||||
data = await request_tx_extra_data(tx_req, ofs, size, prev_hash)
|
data = await helpers.request_tx_extra_data(tx_req, ofs, size, prev_hash)
|
||||||
write_bytes(txh, data)
|
writers.write_bytes(txh, data)
|
||||||
ofs += len(data)
|
ofs += len(data)
|
||||||
|
|
||||||
if get_tx_hash(txh, double=coin.sign_hash_double, reverse=True) != prev_hash:
|
if (
|
||||||
|
writers.get_tx_hash(txh, double=coin.sign_hash_double, reverse=True)
|
||||||
|
!= prev_hash
|
||||||
|
):
|
||||||
raise SigningError(FailureType.ProcessError, "Encountered invalid prev_hash")
|
raise SigningError(FailureType.ProcessError, "Encountered invalid prev_hash")
|
||||||
|
|
||||||
return total_out
|
return total_out
|
||||||
@ -641,7 +645,7 @@ async def get_prevtx_output_value(
|
|||||||
# ===
|
# ===
|
||||||
|
|
||||||
|
|
||||||
def get_hash_type(coin: CoinInfo) -> int:
|
def get_hash_type(coin: coininfo.CoinInfo) -> int:
|
||||||
SIGHASH_FORKID = const(0x40)
|
SIGHASH_FORKID = const(0x40)
|
||||||
SIGHASH_ALL = const(0x01)
|
SIGHASH_ALL = const(0x01)
|
||||||
hashtype = SIGHASH_ALL
|
hashtype = SIGHASH_ALL
|
||||||
@ -650,19 +654,21 @@ def get_hash_type(coin: CoinInfo) -> int:
|
|||||||
return hashtype
|
return hashtype
|
||||||
|
|
||||||
|
|
||||||
def get_tx_header(coin: CoinInfo, tx: SignTx, segwit: bool = False):
|
def get_tx_header(coin: coininfo.CoinInfo, tx: SignTx, segwit: bool = False):
|
||||||
w_txi = bytearray()
|
w_txi = bytearray()
|
||||||
if tx.overwintered:
|
if tx.overwintered:
|
||||||
write_uint32(w_txi, tx.version | OVERWINTERED) # nVersion | fOverwintered
|
writers.write_uint32(
|
||||||
write_uint32(w_txi, tx.version_group_id) # nVersionGroupId
|
w_txi, tx.version | zcash.OVERWINTERED
|
||||||
|
) # nVersion | fOverwintered
|
||||||
|
writers.write_uint32(w_txi, tx.version_group_id) # nVersionGroupId
|
||||||
else:
|
else:
|
||||||
write_uint32(w_txi, tx.version) # nVersion
|
writers.write_uint32(w_txi, tx.version) # nVersion
|
||||||
if tx.timestamp:
|
if tx.timestamp:
|
||||||
write_uint32(w_txi, tx.timestamp)
|
writers.write_uint32(w_txi, tx.timestamp)
|
||||||
if segwit:
|
if segwit:
|
||||||
write_varint(w_txi, 0x00) # segwit witness marker
|
writers.write_varint(w_txi, 0x00) # segwit witness marker
|
||||||
write_varint(w_txi, 0x01) # segwit witness flag
|
writers.write_varint(w_txi, 0x01) # segwit witness flag
|
||||||
write_varint(w_txi, tx.inputs_count)
|
writers.write_varint(w_txi, tx.inputs_count)
|
||||||
return w_txi
|
return w_txi
|
||||||
|
|
||||||
|
|
||||||
@ -670,7 +676,9 @@ def get_tx_header(coin: CoinInfo, tx: SignTx, segwit: bool = False):
|
|||||||
# ===
|
# ===
|
||||||
|
|
||||||
|
|
||||||
def output_derive_script(o: TxOutputType, coin: CoinInfo, root: bip32.HDNode) -> bytes:
|
def output_derive_script(
|
||||||
|
o: TxOutputType, coin: coininfo.CoinInfo, keychain: seed.Keychain
|
||||||
|
) -> bytes:
|
||||||
|
|
||||||
if o.script_type == OutputScriptType.PAYTOOPRETURN:
|
if o.script_type == OutputScriptType.PAYTOOPRETURN:
|
||||||
# op_return output
|
# op_return output
|
||||||
@ -678,21 +686,21 @@ def output_derive_script(o: TxOutputType, coin: CoinInfo, root: bip32.HDNode) ->
|
|||||||
raise SigningError(
|
raise SigningError(
|
||||||
FailureType.DataError, "OP_RETURN output with non-zero amount"
|
FailureType.DataError, "OP_RETURN output with non-zero amount"
|
||||||
)
|
)
|
||||||
return output_script_paytoopreturn(o.op_return_data)
|
return scripts.output_script_paytoopreturn(o.op_return_data)
|
||||||
|
|
||||||
if o.address_n:
|
if o.address_n:
|
||||||
# change output
|
# change output
|
||||||
if o.address:
|
if o.address:
|
||||||
raise SigningError(FailureType.DataError, "Address in change output")
|
raise SigningError(FailureType.DataError, "Address in change output")
|
||||||
o.address = get_address_for_change(o, coin, root)
|
o.address = get_address_for_change(o, coin, keychain)
|
||||||
else:
|
else:
|
||||||
if not o.address:
|
if not o.address:
|
||||||
raise SigningError(FailureType.DataError, "Missing address")
|
raise SigningError(FailureType.DataError, "Missing address")
|
||||||
|
|
||||||
if coin.bech32_prefix and o.address.startswith(coin.bech32_prefix):
|
if coin.bech32_prefix and o.address.startswith(coin.bech32_prefix):
|
||||||
# p2wpkh or p2wsh
|
# p2wpkh or p2wsh
|
||||||
witprog = decode_bech32_address(coin.bech32_prefix, o.address)
|
witprog = addresses.decode_bech32_address(coin.bech32_prefix, o.address)
|
||||||
return output_script_native_p2wpkh_or_p2wsh(witprog)
|
return scripts.output_script_native_p2wpkh_or_p2wsh(witprog)
|
||||||
|
|
||||||
if coin.cashaddr_prefix is not None and o.address.startswith(
|
if coin.cashaddr_prefix is not None and o.address.startswith(
|
||||||
coin.cashaddr_prefix + ":"
|
coin.cashaddr_prefix + ":"
|
||||||
@ -712,9 +720,9 @@ def output_derive_script(o: TxOutputType, coin: CoinInfo, root: bip32.HDNode) ->
|
|||||||
if address_type.check(coin.address_type, raw_address):
|
if address_type.check(coin.address_type, raw_address):
|
||||||
# p2pkh
|
# p2pkh
|
||||||
pubkeyhash = address_type.strip(coin.address_type, raw_address)
|
pubkeyhash = address_type.strip(coin.address_type, raw_address)
|
||||||
script = output_script_p2pkh(pubkeyhash)
|
script = scripts.output_script_p2pkh(pubkeyhash)
|
||||||
if coin.bip115:
|
if coin.bip115:
|
||||||
script += script_replay_protection_bip115(
|
script += scripts.script_replay_protection_bip115(
|
||||||
o.block_hash_bip115, o.block_height_bip115
|
o.block_hash_bip115, o.block_height_bip115
|
||||||
)
|
)
|
||||||
return script
|
return script
|
||||||
@ -722,9 +730,9 @@ def output_derive_script(o: TxOutputType, coin: CoinInfo, root: bip32.HDNode) ->
|
|||||||
elif address_type.check(coin.address_type_p2sh, raw_address):
|
elif address_type.check(coin.address_type_p2sh, raw_address):
|
||||||
# p2sh
|
# p2sh
|
||||||
scripthash = address_type.strip(coin.address_type_p2sh, raw_address)
|
scripthash = address_type.strip(coin.address_type_p2sh, raw_address)
|
||||||
script = output_script_p2sh(scripthash)
|
script = scripts.output_script_p2sh(scripthash)
|
||||||
if coin.bip115:
|
if coin.bip115:
|
||||||
script += script_replay_protection_bip115(
|
script += scripts.script_replay_protection_bip115(
|
||||||
o.block_hash_bip115, o.block_height_bip115
|
o.block_hash_bip115, o.block_height_bip115
|
||||||
)
|
)
|
||||||
return script
|
return script
|
||||||
@ -732,7 +740,9 @@ def output_derive_script(o: TxOutputType, coin: CoinInfo, root: bip32.HDNode) ->
|
|||||||
raise SigningError(FailureType.DataError, "Invalid address type")
|
raise SigningError(FailureType.DataError, "Invalid address type")
|
||||||
|
|
||||||
|
|
||||||
def get_address_for_change(o: TxOutputType, coin: CoinInfo, root: bip32.HDNode):
|
def get_address_for_change(
|
||||||
|
o: TxOutputType, coin: coininfo.CoinInfo, keychain: seed.Keychain
|
||||||
|
):
|
||||||
if o.script_type == OutputScriptType.PAYTOADDRESS:
|
if o.script_type == OutputScriptType.PAYTOADDRESS:
|
||||||
input_script_type = InputScriptType.SPENDADDRESS
|
input_script_type = InputScriptType.SPENDADDRESS
|
||||||
elif o.script_type == OutputScriptType.PAYTOMULTISIG:
|
elif o.script_type == OutputScriptType.PAYTOMULTISIG:
|
||||||
@ -743,17 +753,19 @@ def get_address_for_change(o: TxOutputType, coin: CoinInfo, root: bip32.HDNode):
|
|||||||
input_script_type = InputScriptType.SPENDP2SHWITNESS
|
input_script_type = InputScriptType.SPENDP2SHWITNESS
|
||||||
else:
|
else:
|
||||||
raise SigningError(FailureType.DataError, "Invalid script type")
|
raise SigningError(FailureType.DataError, "Invalid script type")
|
||||||
return get_address(
|
node = keychain.derive(o.address_n, coin.curve_name)
|
||||||
input_script_type, coin, node_derive(root, o.address_n), o.multisig
|
return addresses.get_address(input_script_type, coin, node, o.multisig)
|
||||||
)
|
|
||||||
|
|
||||||
|
|
||||||
def output_is_change(o: TxOutputType, wallet_path: list, segwit_in: int) -> bool:
|
def output_is_change(
|
||||||
is_segwit = (
|
o: TxOutputType,
|
||||||
o.script_type == OutputScriptType.PAYTOWITNESS
|
wallet_path: list,
|
||||||
or o.script_type == OutputScriptType.PAYTOP2SHWITNESS
|
segwit_in: int,
|
||||||
)
|
multifp: multisig.MultisigFingerprint,
|
||||||
if is_segwit and o.amount > segwit_in:
|
) -> bool:
|
||||||
|
if o.multisig and not multifp.matches(o.multisig):
|
||||||
|
return False
|
||||||
|
if output_is_segwit(o) and o.amount > segwit_in:
|
||||||
# if the output is segwit, make sure it doesn't spend more than what the
|
# if the output is segwit, make sure it doesn't spend more than what the
|
||||||
# segwit inputs paid. this is to prevent user being tricked into
|
# segwit inputs paid. this is to prevent user being tricked into
|
||||||
# creating ANYONECANSPEND outputs before full segwit activation.
|
# creating ANYONECANSPEND outputs before full segwit activation.
|
||||||
@ -766,38 +778,49 @@ def output_is_change(o: TxOutputType, wallet_path: list, segwit_in: int) -> bool
|
|||||||
)
|
)
|
||||||
|
|
||||||
|
|
||||||
|
def output_is_segwit(o: TxOutputType) -> bool:
|
||||||
|
return (
|
||||||
|
o.script_type == OutputScriptType.PAYTOWITNESS
|
||||||
|
or o.script_type == OutputScriptType.PAYTOP2SHWITNESS
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
# Tx Inputs
|
# Tx Inputs
|
||||||
# ===
|
# ===
|
||||||
|
|
||||||
|
|
||||||
def input_derive_script(
|
def input_derive_script(
|
||||||
coin: CoinInfo, i: TxInputType, pubkey: bytes, signature: bytes = None
|
coin: coininfo.CoinInfo, i: TxInputType, pubkey: bytes, signature: bytes = None
|
||||||
) -> bytes:
|
) -> bytes:
|
||||||
if i.script_type == InputScriptType.SPENDADDRESS:
|
if i.script_type == InputScriptType.SPENDADDRESS:
|
||||||
# p2pkh or p2sh
|
# p2pkh or p2sh
|
||||||
return input_script_p2pkh_or_p2sh(pubkey, signature, get_hash_type(coin))
|
return scripts.input_script_p2pkh_or_p2sh(
|
||||||
|
pubkey, signature, get_hash_type(coin)
|
||||||
|
)
|
||||||
|
|
||||||
if i.script_type == InputScriptType.SPENDP2SHWITNESS:
|
if i.script_type == InputScriptType.SPENDP2SHWITNESS:
|
||||||
# p2wpkh or p2wsh using p2sh
|
# p2wpkh or p2wsh using p2sh
|
||||||
|
|
||||||
if i.multisig:
|
if i.multisig:
|
||||||
# p2wsh in p2sh
|
# p2wsh in p2sh
|
||||||
pubkeys = multisig_get_pubkeys(i.multisig)
|
pubkeys = multisig.multisig_get_pubkeys(i.multisig)
|
||||||
witness_script = output_script_multisig(pubkeys, i.multisig.m)
|
witness_script = scripts.output_script_multisig(pubkeys, i.multisig.m)
|
||||||
witness_script_hash = sha256(witness_script).digest()
|
witness_script_hash = sha256(witness_script).digest()
|
||||||
return input_script_p2wsh_in_p2sh(witness_script_hash)
|
return scripts.input_script_p2wsh_in_p2sh(witness_script_hash)
|
||||||
|
|
||||||
# p2wpkh in p2sh
|
# p2wpkh in p2sh
|
||||||
return input_script_p2wpkh_in_p2sh(ecdsa_hash_pubkey(pubkey, coin))
|
return scripts.input_script_p2wpkh_in_p2sh(
|
||||||
|
addresses.ecdsa_hash_pubkey(pubkey, coin)
|
||||||
|
)
|
||||||
|
|
||||||
elif i.script_type == InputScriptType.SPENDWITNESS:
|
elif i.script_type == InputScriptType.SPENDWITNESS:
|
||||||
# native p2wpkh or p2wsh
|
# native p2wpkh or p2wsh
|
||||||
return input_script_native_p2wpkh_or_p2wsh()
|
return scripts.input_script_native_p2wpkh_or_p2wsh()
|
||||||
|
|
||||||
elif i.script_type == InputScriptType.SPENDMULTISIG:
|
elif i.script_type == InputScriptType.SPENDMULTISIG:
|
||||||
# p2sh multisig
|
# p2sh multisig
|
||||||
signature_index = multisig_pubkey_index(i.multisig, pubkey)
|
signature_index = multisig.multisig_pubkey_index(i.multisig, pubkey)
|
||||||
return input_script_multisig(
|
return scripts.input_script_multisig(
|
||||||
i.multisig, signature, signature_index, get_hash_type(coin), coin
|
i.multisig, signature, signature_index, get_hash_type(coin), coin
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -805,6 +828,13 @@ def input_derive_script(
|
|||||||
raise SigningError(FailureType.ProcessError, "Invalid script type")
|
raise SigningError(FailureType.ProcessError, "Invalid script type")
|
||||||
|
|
||||||
|
|
||||||
|
def input_is_segwit(i: TxInputType) -> bool:
|
||||||
|
return (
|
||||||
|
i.script_type == InputScriptType.SPENDWITNESS
|
||||||
|
or i.script_type == InputScriptType.SPENDP2SHWITNESS
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
def input_extract_wallet_path(txi: TxInputType, wallet_path: list) -> list:
|
def input_extract_wallet_path(txi: TxInputType, wallet_path: list) -> list:
|
||||||
if wallet_path is None:
|
if wallet_path is None:
|
||||||
return None # there was a mismatch in previous inputs
|
return None # there was a mismatch in previous inputs
|
||||||
@ -828,22 +858,7 @@ def input_check_wallet_path(txi: TxInputType, wallet_path: list) -> list:
|
|||||||
)
|
)
|
||||||
|
|
||||||
|
|
||||||
def node_derive(root: bip32.HDNode, address_n: list) -> bip32.HDNode:
|
|
||||||
node = root.clone()
|
|
||||||
node.derive_path(address_n)
|
|
||||||
return node
|
|
||||||
|
|
||||||
|
|
||||||
def ecdsa_sign(node: bip32.HDNode, digest: bytes) -> bytes:
|
def ecdsa_sign(node: bip32.HDNode, digest: bytes) -> bytes:
|
||||||
sig = secp256k1.sign(node.private_key(), digest)
|
sig = secp256k1.sign(node.private_key(), digest)
|
||||||
sigder = der.encode_seq((sig[1:33], sig[33:65]))
|
sigder = der.encode_seq((sig[1:33], sig[33:65]))
|
||||||
return sigder
|
return sigder
|
||||||
|
|
||||||
|
|
||||||
def is_change(
|
|
||||||
txo: TxOutputType, wallet_path: list, segwit_in: int, multifp: MultisigFingerprint
|
|
||||||
) -> bool:
|
|
||||||
if txo.multisig:
|
|
||||||
if not multifp.matches(txo.multisig):
|
|
||||||
return False
|
|
||||||
return output_is_change(txo, wallet_path, segwit_in)
|
|
||||||
|
@ -3,7 +3,8 @@ from trezor.messages.TxInputType import TxInputType
|
|||||||
from trezor.messages.TxOutputBinType import TxOutputBinType
|
from trezor.messages.TxOutputBinType import TxOutputBinType
|
||||||
from trezor.utils import ensure
|
from trezor.utils import ensure
|
||||||
|
|
||||||
from apps.common.writers import (
|
from apps.common.writers import ( # noqa: F401
|
||||||
|
empty_bytearray,
|
||||||
write_bytes,
|
write_bytes,
|
||||||
write_bytes_reversed,
|
write_bytes_reversed,
|
||||||
write_uint8,
|
write_uint8,
|
||||||
|
@ -3,12 +3,25 @@ from trezor import log, loop, messages, utils, workflow
|
|||||||
from trezor.wire import codec_v1
|
from trezor.wire import codec_v1
|
||||||
from trezor.wire.errors import *
|
from trezor.wire.errors import *
|
||||||
|
|
||||||
|
from apps.common import seed
|
||||||
|
|
||||||
workflow_handlers = {}
|
workflow_handlers = {}
|
||||||
|
|
||||||
|
|
||||||
def add(mtype, pkgname, modname, *args):
|
def add(mtype, pkgname, modname, namespace=None):
|
||||||
"""Shortcut for registering a dynamically-imported Protobuf workflow."""
|
"""Shortcut for registering a dynamically-imported Protobuf workflow."""
|
||||||
register(mtype, protobuf_workflow, import_workflow, pkgname, modname, *args)
|
if namespace is not None:
|
||||||
|
register(
|
||||||
|
mtype,
|
||||||
|
protobuf_workflow,
|
||||||
|
keychain_workflow,
|
||||||
|
namespace,
|
||||||
|
import_workflow,
|
||||||
|
pkgname,
|
||||||
|
modname,
|
||||||
|
)
|
||||||
|
else:
|
||||||
|
register(mtype, protobuf_workflow, import_workflow, pkgname, modname)
|
||||||
|
|
||||||
|
|
||||||
def register(mtype, handler, *args):
|
def register(mtype, handler, *args):
|
||||||
@ -133,10 +146,12 @@ async def session_handler(iface, sid):
|
|||||||
continue
|
continue
|
||||||
except Error as exc:
|
except Error as exc:
|
||||||
# we log wire.Error as warning, not as exception
|
# we log wire.Error as warning, not as exception
|
||||||
log.warning(__name__, "failure: %s", exc.message)
|
if __debug__:
|
||||||
|
log.warning(__name__, "failure: %s", exc.message)
|
||||||
except Exception as exc:
|
except Exception as exc:
|
||||||
# sessions are never closed by raised exceptions
|
# sessions are never closed by raised exceptions
|
||||||
log.exception(__name__, exc)
|
if __debug__:
|
||||||
|
log.exception(__name__, exc)
|
||||||
|
|
||||||
# read new message in next iteration
|
# read new message in next iteration
|
||||||
reader = None
|
reader = None
|
||||||
@ -155,7 +170,7 @@ async def protobuf_workflow(ctx, reader, handler, *args):
|
|||||||
# respond with specific code and message
|
# respond with specific code and message
|
||||||
await ctx.write(Failure(code=exc.code, message=exc.message))
|
await ctx.write(Failure(code=exc.code, message=exc.message))
|
||||||
raise
|
raise
|
||||||
except Exception: # as exc:
|
except Exception:
|
||||||
# respond with a generic code and message
|
# respond with a generic code and message
|
||||||
await ctx.write(
|
await ctx.write(
|
||||||
Failure(code=FailureType.FirmwareError, message="Firmware error")
|
Failure(code=FailureType.FirmwareError, message="Firmware error")
|
||||||
@ -166,6 +181,15 @@ async def protobuf_workflow(ctx, reader, handler, *args):
|
|||||||
await ctx.write(res)
|
await ctx.write(res)
|
||||||
|
|
||||||
|
|
||||||
|
async def keychain_workflow(ctx, req, namespace, handler, *args):
|
||||||
|
keychain = await seed.get_keychain(ctx, namespace)
|
||||||
|
args += (keychain,)
|
||||||
|
try:
|
||||||
|
return await handler(ctx, req, *args)
|
||||||
|
finally:
|
||||||
|
keychain.__del__()
|
||||||
|
|
||||||
|
|
||||||
def import_workflow(ctx, req, pkgname, modname, *args):
|
def import_workflow(ctx, req, pkgname, modname, *args):
|
||||||
modpath = "%s.%s" % (pkgname, modname)
|
modpath = "%s.%s" % (pkgname, modname)
|
||||||
module = __import__(modpath, None, None, (modname,), 0)
|
module = __import__(modpath, None, None, (modname,), 0)
|
||||||
|
@ -8,6 +8,7 @@ from apps.cardano.address import (
|
|||||||
validate_full_path,
|
validate_full_path,
|
||||||
derive_address_and_node
|
derive_address_and_node
|
||||||
)
|
)
|
||||||
|
from apps.cardano.seed import Keychain
|
||||||
from trezor.crypto import bip32
|
from trezor.crypto import bip32
|
||||||
|
|
||||||
|
|
||||||
@ -16,6 +17,9 @@ class TestCardanoAddress(unittest.TestCase):
|
|||||||
mnemonic = "all all all all all all all all all all all all"
|
mnemonic = "all all all all all all all all all all all all"
|
||||||
passphrase = ""
|
passphrase = ""
|
||||||
node = bip32.from_mnemonic_cardano(mnemonic, passphrase)
|
node = bip32.from_mnemonic_cardano(mnemonic, passphrase)
|
||||||
|
node.derive_cardano(0x80000000 | 44)
|
||||||
|
node.derive_cardano(0x80000000 | 1815)
|
||||||
|
keychain = Keychain([0x80000000 | 44, 0x80000000 | 1815], node)
|
||||||
|
|
||||||
addresses = [
|
addresses = [
|
||||||
"Ae2tdPwUPEZ98eHFwxSsPBDz73amioKpr58Vw85mP1tMkzq8siaftiejJ3j",
|
"Ae2tdPwUPEZ98eHFwxSsPBDz73amioKpr58Vw85mP1tMkzq8siaftiejJ3j",
|
||||||
@ -25,7 +29,7 @@ class TestCardanoAddress(unittest.TestCase):
|
|||||||
|
|
||||||
for i, expected in enumerate(addresses):
|
for i, expected in enumerate(addresses):
|
||||||
# 44'/1815'/0'/0/i'
|
# 44'/1815'/0'/0/i'
|
||||||
address, _ = derive_address_and_node(node, [0x80000000 | 44, 0x80000000 | 1815, 0x80000000, 0, 0x80000000 + i])
|
address, _ = derive_address_and_node(keychain, [0x80000000 | 44, 0x80000000 | 1815, 0x80000000, 0, 0x80000000 + i])
|
||||||
self.assertEqual(expected, address)
|
self.assertEqual(expected, address)
|
||||||
|
|
||||||
nodes = [
|
nodes = [
|
||||||
@ -50,7 +54,7 @@ class TestCardanoAddress(unittest.TestCase):
|
|||||||
]
|
]
|
||||||
|
|
||||||
for i, (priv, ext, pub, chain) in enumerate(nodes):
|
for i, (priv, ext, pub, chain) in enumerate(nodes):
|
||||||
_, n = derive_address_and_node(node, [0x80000000 | 44, 0x80000000 | 1815, 0x80000000, 0, 0x80000000 + i])
|
_, n = derive_address_and_node(keychain, [0x80000000 | 44, 0x80000000 | 1815, 0x80000000, 0, 0x80000000 + i])
|
||||||
self.assertEqual(hexlify(n.private_key()), priv)
|
self.assertEqual(hexlify(n.private_key()), priv)
|
||||||
self.assertEqual(hexlify(n.private_key_ext()), ext)
|
self.assertEqual(hexlify(n.private_key_ext()), ext)
|
||||||
self.assertEqual(hexlify(seed.remove_ed25519_prefix(n.public_key())), pub)
|
self.assertEqual(hexlify(seed.remove_ed25519_prefix(n.public_key())), pub)
|
||||||
@ -60,6 +64,9 @@ class TestCardanoAddress(unittest.TestCase):
|
|||||||
mnemonic = "all all all all all all all all all all all all"
|
mnemonic = "all all all all all all all all all all all all"
|
||||||
passphrase = ""
|
passphrase = ""
|
||||||
node = bip32.from_mnemonic_cardano(mnemonic, passphrase)
|
node = bip32.from_mnemonic_cardano(mnemonic, passphrase)
|
||||||
|
node.derive_cardano(0x80000000 | 44)
|
||||||
|
node.derive_cardano(0x80000000 | 1815)
|
||||||
|
keychain = Keychain([0x80000000 | 44, 0x80000000 | 1815], node)
|
||||||
|
|
||||||
addresses = [
|
addresses = [
|
||||||
"Ae2tdPwUPEZ5YUb8sM3eS8JqKgrRLzhiu71crfuH2MFtqaYr5ACNRdsswsZ",
|
"Ae2tdPwUPEZ5YUb8sM3eS8JqKgrRLzhiu71crfuH2MFtqaYr5ACNRdsswsZ",
|
||||||
@ -69,7 +76,7 @@ class TestCardanoAddress(unittest.TestCase):
|
|||||||
|
|
||||||
for i, expected in enumerate(addresses):
|
for i, expected in enumerate(addresses):
|
||||||
# 44'/1815'/0'/0/i
|
# 44'/1815'/0'/0/i
|
||||||
address, _ = derive_address_and_node(node, [0x80000000 | 44, 0x80000000 | 1815, 0x80000000, 0, i])
|
address, _ = derive_address_and_node(keychain, [0x80000000 | 44, 0x80000000 | 1815, 0x80000000, 0, i])
|
||||||
self.assertEqual(address, expected)
|
self.assertEqual(address, expected)
|
||||||
|
|
||||||
nodes = [
|
nodes = [
|
||||||
@ -94,7 +101,7 @@ class TestCardanoAddress(unittest.TestCase):
|
|||||||
]
|
]
|
||||||
|
|
||||||
for i, (priv, ext, pub, chain) in enumerate(nodes):
|
for i, (priv, ext, pub, chain) in enumerate(nodes):
|
||||||
_, n = derive_address_and_node(node, [0x80000000 | 44, 0x80000000 | 1815, 0x80000000, 0, i])
|
_, n = derive_address_and_node(keychain, [0x80000000 | 44, 0x80000000 | 1815, 0x80000000, 0, i])
|
||||||
self.assertEqual(hexlify(n.private_key()), priv)
|
self.assertEqual(hexlify(n.private_key()), priv)
|
||||||
self.assertEqual(hexlify(n.private_key_ext()), ext)
|
self.assertEqual(hexlify(n.private_key_ext()), ext)
|
||||||
self.assertEqual(hexlify(seed.remove_ed25519_prefix(n.public_key())), pub)
|
self.assertEqual(hexlify(seed.remove_ed25519_prefix(n.public_key())), pub)
|
||||||
@ -105,9 +112,12 @@ class TestCardanoAddress(unittest.TestCase):
|
|||||||
mnemonic = "all all all all all all all all all all all all"
|
mnemonic = "all all all all all all all all all all all all"
|
||||||
passphrase = ""
|
passphrase = ""
|
||||||
node = bip32.from_mnemonic_cardano(mnemonic, passphrase)
|
node = bip32.from_mnemonic_cardano(mnemonic, passphrase)
|
||||||
|
node.derive_cardano(0x80000000 | 44)
|
||||||
|
node.derive_cardano(0x80000000 | 1815)
|
||||||
|
keychain = Keychain([0x80000000 | 44, 0x80000000 | 1815], node)
|
||||||
|
|
||||||
# 44'/1815'
|
# 44'/1815'
|
||||||
address, _ = derive_address_and_node(node, [0x80000000 | 44, 0x80000000 | 1815])
|
address, _ = derive_address_and_node(keychain, [0x80000000 | 44, 0x80000000 | 1815])
|
||||||
self.assertEqual(address, "Ae2tdPwUPEZ2FGHX3yCKPSbSgyuuTYgMxNq652zKopxT4TuWvEd8Utd92w3")
|
self.assertEqual(address, "Ae2tdPwUPEZ2FGHX3yCKPSbSgyuuTYgMxNq652zKopxT4TuWvEd8Utd92w3")
|
||||||
|
|
||||||
priv, ext, pub, chain = (
|
priv, ext, pub, chain = (
|
||||||
@ -117,7 +127,7 @@ class TestCardanoAddress(unittest.TestCase):
|
|||||||
b"02ac67c59a8b0264724a635774ca2c242afa10d7ab70e2bf0a8f7d4bb10f1f7a"
|
b"02ac67c59a8b0264724a635774ca2c242afa10d7ab70e2bf0a8f7d4bb10f1f7a"
|
||||||
)
|
)
|
||||||
|
|
||||||
_, n = derive_address_and_node(node, [0x80000000 | 44, 0x80000000 | 1815])
|
_, n = derive_address_and_node(keychain, [0x80000000 | 44, 0x80000000 | 1815])
|
||||||
self.assertEqual(hexlify(n.private_key()), priv)
|
self.assertEqual(hexlify(n.private_key()), priv)
|
||||||
self.assertEqual(hexlify(n.private_key_ext()), ext)
|
self.assertEqual(hexlify(n.private_key_ext()), ext)
|
||||||
self.assertEqual(hexlify(seed.remove_ed25519_prefix(n.public_key())), pub)
|
self.assertEqual(hexlify(seed.remove_ed25519_prefix(n.public_key())), pub)
|
||||||
|
@ -1,5 +1,6 @@
|
|||||||
from common import *
|
from common import *
|
||||||
|
|
||||||
|
from apps.cardano.seed import Keychain
|
||||||
from apps.cardano.get_public_key import _get_public_key
|
from apps.cardano.get_public_key import _get_public_key
|
||||||
from trezor.crypto import bip32
|
from trezor.crypto import bip32
|
||||||
from ubinascii import hexlify
|
from ubinascii import hexlify
|
||||||
@ -10,6 +11,9 @@ class TestCardanoGetPublicKey(unittest.TestCase):
|
|||||||
mnemonic = "all all all all all all all all all all all all"
|
mnemonic = "all all all all all all all all all all all all"
|
||||||
passphrase = ""
|
passphrase = ""
|
||||||
node = bip32.from_mnemonic_cardano(mnemonic, passphrase)
|
node = bip32.from_mnemonic_cardano(mnemonic, passphrase)
|
||||||
|
node.derive_cardano(0x80000000 | 44)
|
||||||
|
node.derive_cardano(0x80000000 | 1815)
|
||||||
|
keychain = Keychain([0x80000000 | 44, 0x80000000 | 1815], node)
|
||||||
|
|
||||||
derivation_paths = [
|
derivation_paths = [
|
||||||
[0x80000000 | 44, 0x80000000 | 1815, 0x80000000, 0, 0x80000000],
|
[0x80000000 | 44, 0x80000000 | 1815, 0x80000000, 0, 0x80000000],
|
||||||
@ -40,7 +44,7 @@ class TestCardanoGetPublicKey(unittest.TestCase):
|
|||||||
]
|
]
|
||||||
|
|
||||||
for index, derivation_path in enumerate(derivation_paths):
|
for index, derivation_path in enumerate(derivation_paths):
|
||||||
key = _get_public_key(node, derivation_path)
|
key = _get_public_key(keychain, derivation_path)
|
||||||
|
|
||||||
self.assertEqual(hexlify(key.node.public_key), public_keys[index])
|
self.assertEqual(hexlify(key.node.public_key), public_keys[index])
|
||||||
self.assertEqual(hexlify(key.node.chain_code), chain_codes[index])
|
self.assertEqual(hexlify(key.node.chain_code), chain_codes[index])
|
||||||
|
@ -45,7 +45,7 @@ class TestEthereumLayout(unittest.TestCase):
|
|||||||
text = format_ethereum_amount(1000000000000000000, None, 61)
|
text = format_ethereum_amount(1000000000000000000, None, 61)
|
||||||
self.assertEqual(text, '1 ETC')
|
self.assertEqual(text, '1 ETC')
|
||||||
text = format_ethereum_amount(1000000000000000000, None, 31)
|
text = format_ethereum_amount(1000000000000000000, None, 31)
|
||||||
self.assertEqual(text, '1 tRSK')
|
self.assertEqual(text, '1 tRBTC')
|
||||||
|
|
||||||
text = format_ethereum_amount(1000000000000000001, None, 1)
|
text = format_ethereum_amount(1000000000000000001, None, 1)
|
||||||
self.assertEqual(text, '1.000000000000000001 ETH')
|
self.assertEqual(text, '1.000000000000000001 ETH')
|
||||||
@ -54,7 +54,7 @@ class TestEthereumLayout(unittest.TestCase):
|
|||||||
text = format_ethereum_amount(10000000000000000001, None, 61)
|
text = format_ethereum_amount(10000000000000000001, None, 61)
|
||||||
self.assertEqual(text, '10.000000000000000001 ETC')
|
self.assertEqual(text, '10.000000000000000001 ETC')
|
||||||
text = format_ethereum_amount(1000000000000000001, None, 31)
|
text = format_ethereum_amount(1000000000000000001, None, 31)
|
||||||
self.assertEqual(text, '1.000000000000000001 tRSK')
|
self.assertEqual(text, '1.000000000000000001 tRBTC')
|
||||||
|
|
||||||
# unknown chain
|
# unknown chain
|
||||||
text = format_ethereum_amount(1, None, 9999)
|
text = format_ethereum_amount(1, None, 9999)
|
||||||
|
@ -1,10 +1,19 @@
|
|||||||
from common import *
|
from common import *
|
||||||
from trezor.crypto import bip32, bip39
|
from trezor.crypto import bip32, bip39
|
||||||
|
from trezor.utils import HashWriter
|
||||||
|
|
||||||
from apps.wallet.sign_tx.addresses import validate_full_path, validate_path_for_bitcoin_public_key
|
from apps.wallet.sign_tx.addresses import validate_full_path, validate_path_for_bitcoin_public_key
|
||||||
from apps.common.paths import HARDENED
|
from apps.common.paths import HARDENED
|
||||||
from apps.common import coins
|
from apps.common import coins
|
||||||
|
from apps.wallet.sign_tx.addresses import *
|
||||||
from apps.wallet.sign_tx.signing import *
|
from apps.wallet.sign_tx.signing import *
|
||||||
|
from apps.wallet.sign_tx.writers import *
|
||||||
|
|
||||||
|
|
||||||
|
def node_derive(root, path):
|
||||||
|
node = root.clone()
|
||||||
|
node.derive_path(path)
|
||||||
|
return node
|
||||||
|
|
||||||
|
|
||||||
class TestAddress(unittest.TestCase):
|
class TestAddress(unittest.TestCase):
|
||||||
|
@ -1,10 +1,17 @@
|
|||||||
from common import *
|
from common import *
|
||||||
|
|
||||||
from apps.wallet.sign_tx.signing import *
|
from apps.wallet.sign_tx.signing import *
|
||||||
|
from apps.wallet.sign_tx.addresses import *
|
||||||
from apps.common import coins
|
from apps.common import coins
|
||||||
from trezor.crypto import bip32, bip39
|
from trezor.crypto import bip32, bip39
|
||||||
|
|
||||||
|
|
||||||
|
def node_derive(root, path):
|
||||||
|
node = root.clone()
|
||||||
|
node.derive_path(path)
|
||||||
|
return node
|
||||||
|
|
||||||
|
|
||||||
class TestAddressGRS(unittest.TestCase):
|
class TestAddressGRS(unittest.TestCase):
|
||||||
# pylint: disable=C0301
|
# pylint: disable=C0301
|
||||||
|
|
||||||
|
@ -1,6 +1,7 @@
|
|||||||
from common import *
|
from common import *
|
||||||
|
|
||||||
from apps.wallet.sign_tx.signing import *
|
from apps.wallet.sign_tx.signing import *
|
||||||
|
from apps.wallet.sign_tx.segwit_bip143 import *
|
||||||
from apps.common import coins
|
from apps.common import coins
|
||||||
from trezor.messages.SignTx import SignTx
|
from trezor.messages.SignTx import SignTx
|
||||||
from trezor.messages.TxInputType import TxInputType
|
from trezor.messages.TxInputType import TxInputType
|
||||||
|
@ -1,6 +1,7 @@
|
|||||||
from common import *
|
from common import *
|
||||||
|
|
||||||
from apps.wallet.sign_tx.signing import *
|
from apps.wallet.sign_tx.signing import *
|
||||||
|
from apps.wallet.sign_tx.segwit_bip143 import *
|
||||||
from apps.common import coins
|
from apps.common import coins
|
||||||
from trezor.messages.SignTx import SignTx
|
from trezor.messages.SignTx import SignTx
|
||||||
from trezor.messages.TxInputType import TxInputType
|
from trezor.messages.TxInputType import TxInputType
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
from common import *
|
from common import *
|
||||||
|
|
||||||
from trezor.utils import chunks
|
from trezor.utils import chunks
|
||||||
from trezor.crypto import bip32, bip39
|
from trezor.crypto import bip39
|
||||||
from trezor.messages.SignTx import SignTx
|
from trezor.messages.SignTx import SignTx
|
||||||
from trezor.messages.TxInputType import TxInputType
|
from trezor.messages.TxInputType import TxInputType
|
||||||
from trezor.messages.TxOutputType import TxOutputType
|
from trezor.messages.TxOutputType import TxOutputType
|
||||||
@ -15,7 +15,8 @@ from trezor.messages import InputScriptType
|
|||||||
from trezor.messages import OutputScriptType
|
from trezor.messages import OutputScriptType
|
||||||
|
|
||||||
from apps.common import coins
|
from apps.common import coins
|
||||||
from apps.wallet.sign_tx import signing
|
from apps.common.seed import Keychain
|
||||||
|
from apps.wallet.sign_tx import helpers, signing
|
||||||
|
|
||||||
|
|
||||||
class TestSignSegwitTxNativeP2WPKH(unittest.TestCase):
|
class TestSignSegwitTxNativeP2WPKH(unittest.TestCase):
|
||||||
@ -24,9 +25,7 @@ class TestSignSegwitTxNativeP2WPKH(unittest.TestCase):
|
|||||||
def test_send_native_p2wpkh(self):
|
def test_send_native_p2wpkh(self):
|
||||||
|
|
||||||
coin = coins.by_name('Testnet')
|
coin = coins.by_name('Testnet')
|
||||||
|
|
||||||
seed = bip39.seed(' '.join(['all'] * 12), '')
|
seed = bip39.seed(' '.join(['all'] * 12), '')
|
||||||
root = bip32.from_seed(seed, 'secp256k1')
|
|
||||||
|
|
||||||
inp1 = TxInputType(
|
inp1 = TxInputType(
|
||||||
# 49'/1'/0'/0/0" - tb1qqzv60m9ajw8drqulta4ld4gfx0rdh82un5s65s
|
# 49'/1'/0'/0/0" - tb1qqzv60m9ajw8drqulta4ld4gfx0rdh82un5s65s
|
||||||
@ -61,22 +60,22 @@ class TestSignSegwitTxNativeP2WPKH(unittest.TestCase):
|
|||||||
TxRequest(request_type=TXINPUT, details=TxRequestDetailsType(request_index=0, tx_hash=None)),
|
TxRequest(request_type=TXINPUT, details=TxRequestDetailsType(request_index=0, tx_hash=None)),
|
||||||
TxAck(tx=TransactionType(inputs=[inp1])),
|
TxAck(tx=TransactionType(inputs=[inp1])),
|
||||||
|
|
||||||
signing.UiConfirmForeignAddress(address_n=inp1.address_n),
|
helpers.UiConfirmForeignAddress(address_n=inp1.address_n),
|
||||||
True,
|
True,
|
||||||
|
|
||||||
TxRequest(request_type=TXOUTPUT, details=TxRequestDetailsType(request_index=0, tx_hash=None), serialized=None),
|
TxRequest(request_type=TXOUTPUT, details=TxRequestDetailsType(request_index=0, tx_hash=None), serialized=None),
|
||||||
TxAck(tx=TransactionType(outputs=[out1])),
|
TxAck(tx=TransactionType(outputs=[out1])),
|
||||||
|
|
||||||
signing.UiConfirmOutput(out1, coin),
|
helpers.UiConfirmOutput(out1, coin),
|
||||||
True,
|
True,
|
||||||
|
|
||||||
TxRequest(request_type=TXOUTPUT, details=TxRequestDetailsType(request_index=1, tx_hash=None), serialized=None),
|
TxRequest(request_type=TXOUTPUT, details=TxRequestDetailsType(request_index=1, tx_hash=None), serialized=None),
|
||||||
TxAck(tx=TransactionType(outputs=[out2])),
|
TxAck(tx=TransactionType(outputs=[out2])),
|
||||||
|
|
||||||
signing.UiConfirmOutput(out2, coin),
|
helpers.UiConfirmOutput(out2, coin),
|
||||||
True,
|
True,
|
||||||
|
|
||||||
signing.UiConfirmTotal(12300000, 11000, coin),
|
helpers.UiConfirmTotal(12300000, 11000, coin),
|
||||||
True,
|
True,
|
||||||
|
|
||||||
# sign tx
|
# sign tx
|
||||||
@ -113,18 +112,17 @@ class TestSignSegwitTxNativeP2WPKH(unittest.TestCase):
|
|||||||
)),
|
)),
|
||||||
]
|
]
|
||||||
|
|
||||||
signer = signing.sign_tx(tx, root)
|
keychain = Keychain(seed, [[coin.curve_name]])
|
||||||
|
signer = signing.sign_tx(tx, keychain)
|
||||||
for request, response in chunks(messages, 2):
|
for request, response in chunks(messages, 2):
|
||||||
self.assertEqualEx(signer.send(request), response)
|
self.assertEqual(signer.send(request), response)
|
||||||
with self.assertRaises(StopIteration):
|
with self.assertRaises(StopIteration):
|
||||||
signer.send(None)
|
signer.send(None)
|
||||||
|
|
||||||
def test_send_native_p2wpkh_change(self):
|
def test_send_native_p2wpkh_change(self):
|
||||||
|
|
||||||
coin = coins.by_name('Testnet')
|
coin = coins.by_name('Testnet')
|
||||||
|
|
||||||
seed = bip39.seed(' '.join(['all'] * 12), '')
|
seed = bip39.seed(' '.join(['all'] * 12), '')
|
||||||
root = bip32.from_seed(seed, 'secp256k1')
|
|
||||||
|
|
||||||
inp1 = TxInputType(
|
inp1 = TxInputType(
|
||||||
# 49'/1'/0'/0/0" - tb1qqzv60m9ajw8drqulta4ld4gfx0rdh82un5s65s
|
# 49'/1'/0'/0/0" - tb1qqzv60m9ajw8drqulta4ld4gfx0rdh82un5s65s
|
||||||
@ -159,19 +157,19 @@ class TestSignSegwitTxNativeP2WPKH(unittest.TestCase):
|
|||||||
TxRequest(request_type=TXINPUT, details=TxRequestDetailsType(request_index=0, tx_hash=None)),
|
TxRequest(request_type=TXINPUT, details=TxRequestDetailsType(request_index=0, tx_hash=None)),
|
||||||
TxAck(tx=TransactionType(inputs=[inp1])),
|
TxAck(tx=TransactionType(inputs=[inp1])),
|
||||||
|
|
||||||
signing.UiConfirmForeignAddress(address_n=inp1.address_n),
|
helpers.UiConfirmForeignAddress(address_n=inp1.address_n),
|
||||||
True,
|
True,
|
||||||
|
|
||||||
TxRequest(request_type=TXOUTPUT, details=TxRequestDetailsType(request_index=0, tx_hash=None), serialized=None),
|
TxRequest(request_type=TXOUTPUT, details=TxRequestDetailsType(request_index=0, tx_hash=None), serialized=None),
|
||||||
TxAck(tx=TransactionType(outputs=[out1])),
|
TxAck(tx=TransactionType(outputs=[out1])),
|
||||||
|
|
||||||
signing.UiConfirmOutput(out1, coin),
|
helpers.UiConfirmOutput(out1, coin),
|
||||||
True,
|
True,
|
||||||
|
|
||||||
TxRequest(request_type=TXOUTPUT, details=TxRequestDetailsType(request_index=1, tx_hash=None), serialized=None),
|
TxRequest(request_type=TXOUTPUT, details=TxRequestDetailsType(request_index=1, tx_hash=None), serialized=None),
|
||||||
TxAck(tx=TransactionType(outputs=[out2])),
|
TxAck(tx=TransactionType(outputs=[out2])),
|
||||||
|
|
||||||
signing.UiConfirmTotal(5000000 + 11000, 11000, coin),
|
helpers.UiConfirmTotal(5000000 + 11000, 11000, coin),
|
||||||
True,
|
True,
|
||||||
|
|
||||||
# sign tx
|
# sign tx
|
||||||
@ -209,21 +207,13 @@ class TestSignSegwitTxNativeP2WPKH(unittest.TestCase):
|
|||||||
)),
|
)),
|
||||||
]
|
]
|
||||||
|
|
||||||
signer = signing.sign_tx(tx, root)
|
keychain = Keychain(seed, [[coin.curve_name]])
|
||||||
|
signer = signing.sign_tx(tx, keychain)
|
||||||
for request, response in chunks(messages, 2):
|
for request, response in chunks(messages, 2):
|
||||||
self.assertEqualEx(signer.send(request), response)
|
self.assertEqual(signer.send(request), response)
|
||||||
with self.assertRaises(StopIteration):
|
with self.assertRaises(StopIteration):
|
||||||
signer.send(None)
|
signer.send(None)
|
||||||
|
|
||||||
def assertEqualEx(self, a, b):
|
|
||||||
# hack to avoid adding __eq__ to signing.Ui* classes
|
|
||||||
if ((isinstance(a, signing.UiConfirmOutput) and isinstance(b, signing.UiConfirmOutput)) or
|
|
||||||
(isinstance(a, signing.UiConfirmTotal) and isinstance(b, signing.UiConfirmTotal)) or
|
|
||||||
(isinstance(a, signing.UiConfirmForeignAddress) and isinstance(b, signing.UiConfirmForeignAddress))):
|
|
||||||
return self.assertEqual(a.__dict__, b.__dict__)
|
|
||||||
else:
|
|
||||||
return self.assertEqual(a, b)
|
|
||||||
|
|
||||||
|
|
||||||
if __name__ == '__main__':
|
if __name__ == '__main__':
|
||||||
unittest.main()
|
unittest.main()
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
from common import *
|
from common import *
|
||||||
|
|
||||||
from trezor.utils import chunks
|
from trezor.utils import chunks
|
||||||
from trezor.crypto import bip32, bip39
|
from trezor.crypto import bip39
|
||||||
from trezor.messages.SignTx import SignTx
|
from trezor.messages.SignTx import SignTx
|
||||||
from trezor.messages.TxInputType import TxInputType
|
from trezor.messages.TxInputType import TxInputType
|
||||||
from trezor.messages.TxOutputType import TxOutputType
|
from trezor.messages.TxOutputType import TxOutputType
|
||||||
@ -15,7 +15,8 @@ from trezor.messages import InputScriptType
|
|||||||
from trezor.messages import OutputScriptType
|
from trezor.messages import OutputScriptType
|
||||||
|
|
||||||
from apps.common import coins
|
from apps.common import coins
|
||||||
from apps.wallet.sign_tx import signing
|
from apps.common.seed import Keychain
|
||||||
|
from apps.wallet.sign_tx import helpers, signing
|
||||||
|
|
||||||
# https://groestlsight-test.groestlcoin.org/api/tx/9b5c4859a8a31e69788cb4402812bb28f14ad71cbd8c60b09903478bc56f79a3
|
# https://groestlsight-test.groestlcoin.org/api/tx/9b5c4859a8a31e69788cb4402812bb28f14ad71cbd8c60b09903478bc56f79a3
|
||||||
class TestSignSegwitTxNativeP2WPKH_GRS(unittest.TestCase):
|
class TestSignSegwitTxNativeP2WPKH_GRS(unittest.TestCase):
|
||||||
@ -24,9 +25,7 @@ class TestSignSegwitTxNativeP2WPKH_GRS(unittest.TestCase):
|
|||||||
def test_send_native_p2wpkh(self):
|
def test_send_native_p2wpkh(self):
|
||||||
|
|
||||||
coin = coins.by_name('Groestlcoin Testnet')
|
coin = coins.by_name('Groestlcoin Testnet')
|
||||||
|
|
||||||
seed = bip39.seed(' '.join(['all'] * 12), '')
|
seed = bip39.seed(' '.join(['all'] * 12), '')
|
||||||
root = bip32.from_seed(seed, coin.curve_name)
|
|
||||||
|
|
||||||
inp1 = TxInputType(
|
inp1 = TxInputType(
|
||||||
# 84'/1'/0'/0/0" - tgrs1qkvwu9g3k2pdxewfqr7syz89r3gj557l3ued7ja
|
# 84'/1'/0'/0/0" - tgrs1qkvwu9g3k2pdxewfqr7syz89r3gj557l3ued7ja
|
||||||
@ -64,16 +63,16 @@ class TestSignSegwitTxNativeP2WPKH_GRS(unittest.TestCase):
|
|||||||
TxRequest(request_type=TXOUTPUT, details=TxRequestDetailsType(request_index=0, tx_hash=None), serialized=None),
|
TxRequest(request_type=TXOUTPUT, details=TxRequestDetailsType(request_index=0, tx_hash=None), serialized=None),
|
||||||
TxAck(tx=TransactionType(outputs=[out1])),
|
TxAck(tx=TransactionType(outputs=[out1])),
|
||||||
|
|
||||||
signing.UiConfirmOutput(out1, coin),
|
helpers.UiConfirmOutput(out1, coin),
|
||||||
True,
|
True,
|
||||||
|
|
||||||
TxRequest(request_type=TXOUTPUT, details=TxRequestDetailsType(request_index=1, tx_hash=None), serialized=None),
|
TxRequest(request_type=TXOUTPUT, details=TxRequestDetailsType(request_index=1, tx_hash=None), serialized=None),
|
||||||
TxAck(tx=TransactionType(outputs=[out2])),
|
TxAck(tx=TransactionType(outputs=[out2])),
|
||||||
|
|
||||||
signing.UiConfirmOutput(out2, coin),
|
helpers.UiConfirmOutput(out2, coin),
|
||||||
True,
|
True,
|
||||||
|
|
||||||
signing.UiConfirmTotal(12300000, 11000, coin),
|
helpers.UiConfirmTotal(12300000, 11000, coin),
|
||||||
True,
|
True,
|
||||||
|
|
||||||
# sign tx
|
# sign tx
|
||||||
@ -110,18 +109,17 @@ class TestSignSegwitTxNativeP2WPKH_GRS(unittest.TestCase):
|
|||||||
)),
|
)),
|
||||||
]
|
]
|
||||||
|
|
||||||
signer = signing.sign_tx(tx, root)
|
keychain = Keychain(seed, [[coin.curve_name]])
|
||||||
|
signer = signing.sign_tx(tx, keychain)
|
||||||
for request, response in chunks(messages, 2):
|
for request, response in chunks(messages, 2):
|
||||||
self.assertEqualEx(signer.send(request), response)
|
self.assertEqual(signer.send(request), response)
|
||||||
with self.assertRaises(StopIteration):
|
with self.assertRaises(StopIteration):
|
||||||
signer.send(None)
|
signer.send(None)
|
||||||
|
|
||||||
def test_send_native_p2wpkh_change(self):
|
def test_send_native_p2wpkh_change(self):
|
||||||
|
|
||||||
coin = coins.by_name('Groestlcoin Testnet')
|
coin = coins.by_name('Groestlcoin Testnet')
|
||||||
|
|
||||||
seed = bip39.seed(' '.join(['all'] * 12), '')
|
seed = bip39.seed(' '.join(['all'] * 12), '')
|
||||||
root = bip32.from_seed(seed, coin.curve_name)
|
|
||||||
|
|
||||||
inp1 = TxInputType(
|
inp1 = TxInputType(
|
||||||
# 84'/1'/0'/0/0" - tgrs1qkvwu9g3k2pdxewfqr7syz89r3gj557l3ued7ja
|
# 84'/1'/0'/0/0" - tgrs1qkvwu9g3k2pdxewfqr7syz89r3gj557l3ued7ja
|
||||||
@ -159,13 +157,13 @@ class TestSignSegwitTxNativeP2WPKH_GRS(unittest.TestCase):
|
|||||||
TxRequest(request_type=TXOUTPUT, details=TxRequestDetailsType(request_index=0, tx_hash=None), serialized=None),
|
TxRequest(request_type=TXOUTPUT, details=TxRequestDetailsType(request_index=0, tx_hash=None), serialized=None),
|
||||||
TxAck(tx=TransactionType(outputs=[out1])),
|
TxAck(tx=TransactionType(outputs=[out1])),
|
||||||
|
|
||||||
signing.UiConfirmOutput(out1, coin),
|
helpers.UiConfirmOutput(out1, coin),
|
||||||
True,
|
True,
|
||||||
|
|
||||||
TxRequest(request_type=TXOUTPUT, details=TxRequestDetailsType(request_index=1, tx_hash=None), serialized=None),
|
TxRequest(request_type=TXOUTPUT, details=TxRequestDetailsType(request_index=1, tx_hash=None), serialized=None),
|
||||||
TxAck(tx=TransactionType(outputs=[out2])),
|
TxAck(tx=TransactionType(outputs=[out2])),
|
||||||
|
|
||||||
signing.UiConfirmTotal(5000000 + 11000, 11000, coin),
|
helpers.UiConfirmTotal(5000000 + 11000, 11000, coin),
|
||||||
True,
|
True,
|
||||||
|
|
||||||
# sign tx
|
# sign tx
|
||||||
@ -203,20 +201,13 @@ class TestSignSegwitTxNativeP2WPKH_GRS(unittest.TestCase):
|
|||||||
)),
|
)),
|
||||||
]
|
]
|
||||||
|
|
||||||
signer = signing.sign_tx(tx, root)
|
keychain = Keychain(seed, [[coin.curve_name]])
|
||||||
|
signer = signing.sign_tx(tx, keychain)
|
||||||
for request, response in chunks(messages, 2):
|
for request, response in chunks(messages, 2):
|
||||||
self.assertEqualEx(signer.send(request), response)
|
self.assertEqual(signer.send(request), response)
|
||||||
with self.assertRaises(StopIteration):
|
with self.assertRaises(StopIteration):
|
||||||
signer.send(None)
|
signer.send(None)
|
||||||
|
|
||||||
def assertEqualEx(self, a, b):
|
|
||||||
# hack to avoid adding __eq__ to signing.Ui* classes
|
|
||||||
if ((isinstance(a, signing.UiConfirmOutput) and isinstance(b, signing.UiConfirmOutput)) or
|
|
||||||
(isinstance(a, signing.UiConfirmTotal) and isinstance(b, signing.UiConfirmTotal))):
|
|
||||||
return self.assertEqual(a.__dict__, b.__dict__)
|
|
||||||
else:
|
|
||||||
return self.assertEqual(a, b)
|
|
||||||
|
|
||||||
|
|
||||||
if __name__ == '__main__':
|
if __name__ == '__main__':
|
||||||
unittest.main()
|
unittest.main()
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
from common import *
|
from common import *
|
||||||
|
|
||||||
from trezor.utils import chunks
|
from trezor.utils import chunks
|
||||||
from trezor.crypto import bip32, bip39
|
from trezor.crypto import bip39
|
||||||
from trezor.messages.SignTx import SignTx
|
from trezor.messages.SignTx import SignTx
|
||||||
from trezor.messages.TxInputType import TxInputType
|
from trezor.messages.TxInputType import TxInputType
|
||||||
from trezor.messages.TxOutputType import TxOutputType
|
from trezor.messages.TxOutputType import TxOutputType
|
||||||
@ -15,7 +15,8 @@ from trezor.messages import InputScriptType
|
|||||||
from trezor.messages import OutputScriptType
|
from trezor.messages import OutputScriptType
|
||||||
|
|
||||||
from apps.common import coins
|
from apps.common import coins
|
||||||
from apps.wallet.sign_tx import signing
|
from apps.common.seed import Keychain
|
||||||
|
from apps.wallet.sign_tx import helpers, signing
|
||||||
|
|
||||||
|
|
||||||
class TestSignSegwitTxP2WPKHInP2SH(unittest.TestCase):
|
class TestSignSegwitTxP2WPKHInP2SH(unittest.TestCase):
|
||||||
@ -24,9 +25,7 @@ class TestSignSegwitTxP2WPKHInP2SH(unittest.TestCase):
|
|||||||
def test_send_p2wpkh_in_p2sh(self):
|
def test_send_p2wpkh_in_p2sh(self):
|
||||||
|
|
||||||
coin = coins.by_name('Testnet')
|
coin = coins.by_name('Testnet')
|
||||||
|
|
||||||
seed = bip39.seed(' '.join(['all'] * 12), '')
|
seed = bip39.seed(' '.join(['all'] * 12), '')
|
||||||
root = bip32.from_seed(seed, 'secp256k1')
|
|
||||||
|
|
||||||
inp1 = TxInputType(
|
inp1 = TxInputType(
|
||||||
# 49'/1'/0'/1/0" - 2N1LGaGg836mqSQqiuUBLfcyGBhyZbremDX
|
# 49'/1'/0'/1/0" - 2N1LGaGg836mqSQqiuUBLfcyGBhyZbremDX
|
||||||
@ -64,16 +63,16 @@ class TestSignSegwitTxP2WPKHInP2SH(unittest.TestCase):
|
|||||||
TxRequest(request_type=TXOUTPUT, details=TxRequestDetailsType(request_index=0, tx_hash=None), serialized=None),
|
TxRequest(request_type=TXOUTPUT, details=TxRequestDetailsType(request_index=0, tx_hash=None), serialized=None),
|
||||||
TxAck(tx=TransactionType(outputs=[out1])),
|
TxAck(tx=TransactionType(outputs=[out1])),
|
||||||
|
|
||||||
signing.UiConfirmOutput(out1, coin),
|
helpers.UiConfirmOutput(out1, coin),
|
||||||
True,
|
True,
|
||||||
|
|
||||||
TxRequest(request_type=TXOUTPUT, details=TxRequestDetailsType(request_index=1, tx_hash=None), serialized=None),
|
TxRequest(request_type=TXOUTPUT, details=TxRequestDetailsType(request_index=1, tx_hash=None), serialized=None),
|
||||||
TxAck(tx=TransactionType(outputs=[out2])),
|
TxAck(tx=TransactionType(outputs=[out2])),
|
||||||
|
|
||||||
signing.UiConfirmOutput(out2, coin),
|
helpers.UiConfirmOutput(out2, coin),
|
||||||
True,
|
True,
|
||||||
|
|
||||||
signing.UiConfirmTotal(123445789 + 11000, 11000, coin),
|
helpers.UiConfirmTotal(123445789 + 11000, 11000, coin),
|
||||||
True,
|
True,
|
||||||
|
|
||||||
# sign tx
|
# sign tx
|
||||||
@ -110,18 +109,17 @@ class TestSignSegwitTxP2WPKHInP2SH(unittest.TestCase):
|
|||||||
)),
|
)),
|
||||||
]
|
]
|
||||||
|
|
||||||
signer = signing.sign_tx(tx, root)
|
keychain = Keychain(seed, [[coin.curve_name]])
|
||||||
|
signer = signing.sign_tx(tx, keychain)
|
||||||
for request, response in chunks(messages, 2):
|
for request, response in chunks(messages, 2):
|
||||||
self.assertEqualEx(signer.send(request), response)
|
self.assertEqual(signer.send(request), response)
|
||||||
with self.assertRaises(StopIteration):
|
with self.assertRaises(StopIteration):
|
||||||
signer.send(None)
|
signer.send(None)
|
||||||
|
|
||||||
def test_send_p2wpkh_in_p2sh_change(self):
|
def test_send_p2wpkh_in_p2sh_change(self):
|
||||||
|
|
||||||
coin = coins.by_name('Testnet')
|
coin = coins.by_name('Testnet')
|
||||||
|
|
||||||
seed = bip39.seed(' '.join(['all'] * 12), '')
|
seed = bip39.seed(' '.join(['all'] * 12), '')
|
||||||
root = bip32.from_seed(seed, 'secp256k1')
|
|
||||||
|
|
||||||
inp1 = TxInputType(
|
inp1 = TxInputType(
|
||||||
# 49'/1'/0'/1/0" - 2N1LGaGg836mqSQqiuUBLfcyGBhyZbremDX
|
# 49'/1'/0'/1/0" - 2N1LGaGg836mqSQqiuUBLfcyGBhyZbremDX
|
||||||
@ -160,14 +158,14 @@ class TestSignSegwitTxP2WPKHInP2SH(unittest.TestCase):
|
|||||||
serialized=None),
|
serialized=None),
|
||||||
TxAck(tx=TransactionType(outputs=[out1])),
|
TxAck(tx=TransactionType(outputs=[out1])),
|
||||||
|
|
||||||
signing.UiConfirmOutput(out1, coin),
|
helpers.UiConfirmOutput(out1, coin),
|
||||||
True,
|
True,
|
||||||
|
|
||||||
TxRequest(request_type=TXOUTPUT, details=TxRequestDetailsType(request_index=1, tx_hash=None),
|
TxRequest(request_type=TXOUTPUT, details=TxRequestDetailsType(request_index=1, tx_hash=None),
|
||||||
serialized=None),
|
serialized=None),
|
||||||
TxAck(tx=TransactionType(outputs=[out2])),
|
TxAck(tx=TransactionType(outputs=[out2])),
|
||||||
|
|
||||||
signing.UiConfirmTotal(12300000 + 11000, 11000, coin),
|
helpers.UiConfirmTotal(12300000 + 11000, 11000, coin),
|
||||||
True,
|
True,
|
||||||
|
|
||||||
# sign tx
|
# sign tx
|
||||||
@ -213,9 +211,10 @@ class TestSignSegwitTxP2WPKHInP2SH(unittest.TestCase):
|
|||||||
)),
|
)),
|
||||||
]
|
]
|
||||||
|
|
||||||
signer = signing.sign_tx(tx, root)
|
keychain = Keychain(seed, [[coin.curve_name]])
|
||||||
|
signer = signing.sign_tx(tx, keychain)
|
||||||
for request, response in chunks(messages, 2):
|
for request, response in chunks(messages, 2):
|
||||||
self.assertEqualEx(signer.send(request), response)
|
self.assertEqual(signer.send(request), response)
|
||||||
with self.assertRaises(StopIteration):
|
with self.assertRaises(StopIteration):
|
||||||
signer.send(None)
|
signer.send(None)
|
||||||
|
|
||||||
@ -224,9 +223,7 @@ class TestSignSegwitTxP2WPKHInP2SH(unittest.TestCase):
|
|||||||
def test_send_p2wpkh_in_p2sh_attack_amount(self):
|
def test_send_p2wpkh_in_p2sh_attack_amount(self):
|
||||||
|
|
||||||
coin = coins.by_name('Testnet')
|
coin = coins.by_name('Testnet')
|
||||||
|
|
||||||
seed = bip39.seed(' '.join(['all'] * 12), '')
|
seed = bip39.seed(' '.join(['all'] * 12), '')
|
||||||
root = bip32.from_seed(seed, 'secp256k1')
|
|
||||||
|
|
||||||
inp1 = TxInputType(
|
inp1 = TxInputType(
|
||||||
# 49'/1'/0'/1/0" - 2N1LGaGg836mqSQqiuUBLfcyGBhyZbremDX
|
# 49'/1'/0'/1/0" - 2N1LGaGg836mqSQqiuUBLfcyGBhyZbremDX
|
||||||
@ -275,14 +272,14 @@ class TestSignSegwitTxP2WPKHInP2SH(unittest.TestCase):
|
|||||||
serialized=None),
|
serialized=None),
|
||||||
TxAck(tx=TransactionType(outputs=[out1])),
|
TxAck(tx=TransactionType(outputs=[out1])),
|
||||||
|
|
||||||
signing.UiConfirmOutput(out1, coin),
|
helpers.UiConfirmOutput(out1, coin),
|
||||||
True,
|
True,
|
||||||
|
|
||||||
TxRequest(request_type=TXOUTPUT, details=TxRequestDetailsType(request_index=1, tx_hash=None),
|
TxRequest(request_type=TXOUTPUT, details=TxRequestDetailsType(request_index=1, tx_hash=None),
|
||||||
serialized=None),
|
serialized=None),
|
||||||
TxAck(tx=TransactionType(outputs=[out2])),
|
TxAck(tx=TransactionType(outputs=[out2])),
|
||||||
|
|
||||||
signing.UiConfirmTotal(8, 0, coin),
|
helpers.UiConfirmTotal(8, 0, coin),
|
||||||
True,
|
True,
|
||||||
|
|
||||||
TxRequest(request_type=TXINPUT, details=TxRequestDetailsType(request_index=0, tx_hash=None),
|
TxRequest(request_type=TXINPUT, details=TxRequestDetailsType(request_index=0, tx_hash=None),
|
||||||
@ -322,26 +319,19 @@ class TestSignSegwitTxP2WPKHInP2SH(unittest.TestCase):
|
|||||||
TxRequest(request_type=TXFINISHED, details=None)
|
TxRequest(request_type=TXFINISHED, details=None)
|
||||||
]
|
]
|
||||||
|
|
||||||
signer = signing.sign_tx(tx, root)
|
keychain = Keychain(seed, [[coin.curve_name]])
|
||||||
|
signer = signing.sign_tx(tx, keychain)
|
||||||
i = 0
|
i = 0
|
||||||
messages_count = int(len(messages) / 2)
|
messages_count = int(len(messages) / 2)
|
||||||
for request, response in chunks(messages, 2):
|
for request, response in chunks(messages, 2):
|
||||||
if i == messages_count - 1: # last message should throw SigningError
|
if i == messages_count - 1: # last message should throw SigningError
|
||||||
self.assertRaises(signing.SigningError, signer.send, request)
|
self.assertRaises(signing.SigningError, signer.send, request)
|
||||||
else:
|
else:
|
||||||
self.assertEqualEx(signer.send(request), response)
|
self.assertEqual(signer.send(request), response)
|
||||||
i += 1
|
i += 1
|
||||||
with self.assertRaises(StopIteration):
|
with self.assertRaises(StopIteration):
|
||||||
signer.send(None)
|
signer.send(None)
|
||||||
|
|
||||||
def assertEqualEx(self, a, b):
|
|
||||||
# hack to avoid adding __eq__ to signing.Ui* classes
|
|
||||||
if ((isinstance(a, signing.UiConfirmOutput) and isinstance(b, signing.UiConfirmOutput)) or
|
|
||||||
(isinstance(a, signing.UiConfirmTotal) and isinstance(b, signing.UiConfirmTotal))):
|
|
||||||
return self.assertEqual(a.__dict__, b.__dict__)
|
|
||||||
else:
|
|
||||||
return self.assertEqual(a, b)
|
|
||||||
|
|
||||||
|
|
||||||
if __name__ == '__main__':
|
if __name__ == '__main__':
|
||||||
unittest.main()
|
unittest.main()
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
from common import *
|
from common import *
|
||||||
|
|
||||||
from trezor.utils import chunks
|
from trezor.utils import chunks
|
||||||
from trezor.crypto import bip32, bip39
|
from trezor.crypto import bip39
|
||||||
from trezor.messages.SignTx import SignTx
|
from trezor.messages.SignTx import SignTx
|
||||||
from trezor.messages.TxInputType import TxInputType
|
from trezor.messages.TxInputType import TxInputType
|
||||||
from trezor.messages.TxOutputType import TxOutputType
|
from trezor.messages.TxOutputType import TxOutputType
|
||||||
@ -15,7 +15,8 @@ from trezor.messages import InputScriptType
|
|||||||
from trezor.messages import OutputScriptType
|
from trezor.messages import OutputScriptType
|
||||||
|
|
||||||
from apps.common import coins
|
from apps.common import coins
|
||||||
from apps.wallet.sign_tx import signing
|
from apps.common.seed import Keychain
|
||||||
|
from apps.wallet.sign_tx import helpers, signing
|
||||||
|
|
||||||
# https://groestlsight-test.groestlcoin.org/api/tx/4ce0220004bdfe14e3dd49fd8636bcb770a400c0c9e9bff670b6a13bb8f15c72
|
# https://groestlsight-test.groestlcoin.org/api/tx/4ce0220004bdfe14e3dd49fd8636bcb770a400c0c9e9bff670b6a13bb8f15c72
|
||||||
class TestSignSegwitTxP2WPKHInP2SH_GRS(unittest.TestCase):
|
class TestSignSegwitTxP2WPKHInP2SH_GRS(unittest.TestCase):
|
||||||
@ -24,9 +25,7 @@ class TestSignSegwitTxP2WPKHInP2SH_GRS(unittest.TestCase):
|
|||||||
def test_send_p2wpkh_in_p2sh(self):
|
def test_send_p2wpkh_in_p2sh(self):
|
||||||
|
|
||||||
coin = coins.by_name('Groestlcoin Testnet')
|
coin = coins.by_name('Groestlcoin Testnet')
|
||||||
|
|
||||||
seed = bip39.seed(' '.join(['all'] * 12), '')
|
seed = bip39.seed(' '.join(['all'] * 12), '')
|
||||||
root = bip32.from_seed(seed, coin.curve_name)
|
|
||||||
|
|
||||||
inp1 = TxInputType(
|
inp1 = TxInputType(
|
||||||
# 49'/1'/0'/1/0" - 2N1LGaGg836mqSQqiuUBLfcyGBhyZYBtBZ7
|
# 49'/1'/0'/1/0" - 2N1LGaGg836mqSQqiuUBLfcyGBhyZYBtBZ7
|
||||||
@ -64,16 +63,16 @@ class TestSignSegwitTxP2WPKHInP2SH_GRS(unittest.TestCase):
|
|||||||
TxRequest(request_type=TXOUTPUT, details=TxRequestDetailsType(request_index=0, tx_hash=None), serialized=None),
|
TxRequest(request_type=TXOUTPUT, details=TxRequestDetailsType(request_index=0, tx_hash=None), serialized=None),
|
||||||
TxAck(tx=TransactionType(outputs=[out1])),
|
TxAck(tx=TransactionType(outputs=[out1])),
|
||||||
|
|
||||||
signing.UiConfirmOutput(out1, coin),
|
helpers.UiConfirmOutput(out1, coin),
|
||||||
True,
|
True,
|
||||||
|
|
||||||
TxRequest(request_type=TXOUTPUT, details=TxRequestDetailsType(request_index=1, tx_hash=None), serialized=None),
|
TxRequest(request_type=TXOUTPUT, details=TxRequestDetailsType(request_index=1, tx_hash=None), serialized=None),
|
||||||
TxAck(tx=TransactionType(outputs=[out2])),
|
TxAck(tx=TransactionType(outputs=[out2])),
|
||||||
|
|
||||||
signing.UiConfirmOutput(out2, coin),
|
helpers.UiConfirmOutput(out2, coin),
|
||||||
True,
|
True,
|
||||||
|
|
||||||
signing.UiConfirmTotal(123445789 + 11000, 11000, coin),
|
helpers.UiConfirmTotal(123445789 + 11000, 11000, coin),
|
||||||
True,
|
True,
|
||||||
|
|
||||||
# sign tx
|
# sign tx
|
||||||
@ -110,18 +109,17 @@ class TestSignSegwitTxP2WPKHInP2SH_GRS(unittest.TestCase):
|
|||||||
)),
|
)),
|
||||||
]
|
]
|
||||||
|
|
||||||
signer = signing.sign_tx(tx, root)
|
keychain = Keychain(seed, [[coin.curve_name]])
|
||||||
|
signer = signing.sign_tx(tx, keychain)
|
||||||
for request, response in chunks(messages, 2):
|
for request, response in chunks(messages, 2):
|
||||||
self.assertEqualEx(signer.send(request), response)
|
self.assertEqual(signer.send(request), response)
|
||||||
with self.assertRaises(StopIteration):
|
with self.assertRaises(StopIteration):
|
||||||
signer.send(None)
|
signer.send(None)
|
||||||
|
|
||||||
def test_send_p2wpkh_in_p2sh_change(self):
|
def test_send_p2wpkh_in_p2sh_change(self):
|
||||||
|
|
||||||
coin = coins.by_name('Groestlcoin Testnet')
|
coin = coins.by_name('Groestlcoin Testnet')
|
||||||
|
|
||||||
seed = bip39.seed(' '.join(['all'] * 12), '')
|
seed = bip39.seed(' '.join(['all'] * 12), '')
|
||||||
root = bip32.from_seed(seed, coin.curve_name)
|
|
||||||
|
|
||||||
inp1 = TxInputType(
|
inp1 = TxInputType(
|
||||||
# 49'/1'/0'/1/0" - 2N1LGaGg836mqSQqiuUBLfcyGBhyZYBtBZ7
|
# 49'/1'/0'/1/0" - 2N1LGaGg836mqSQqiuUBLfcyGBhyZYBtBZ7
|
||||||
@ -160,14 +158,14 @@ class TestSignSegwitTxP2WPKHInP2SH_GRS(unittest.TestCase):
|
|||||||
serialized=None),
|
serialized=None),
|
||||||
TxAck(tx=TransactionType(outputs=[out1])),
|
TxAck(tx=TransactionType(outputs=[out1])),
|
||||||
|
|
||||||
signing.UiConfirmOutput(out1, coin),
|
helpers.UiConfirmOutput(out1, coin),
|
||||||
True,
|
True,
|
||||||
|
|
||||||
TxRequest(request_type=TXOUTPUT, details=TxRequestDetailsType(request_index=1, tx_hash=None),
|
TxRequest(request_type=TXOUTPUT, details=TxRequestDetailsType(request_index=1, tx_hash=None),
|
||||||
serialized=None),
|
serialized=None),
|
||||||
TxAck(tx=TransactionType(outputs=[out2])),
|
TxAck(tx=TransactionType(outputs=[out2])),
|
||||||
|
|
||||||
signing.UiConfirmTotal(12300000 + 11000, 11000, coin),
|
helpers.UiConfirmTotal(12300000 + 11000, 11000, coin),
|
||||||
True,
|
True,
|
||||||
|
|
||||||
# sign tx
|
# sign tx
|
||||||
@ -212,20 +210,13 @@ class TestSignSegwitTxP2WPKHInP2SH_GRS(unittest.TestCase):
|
|||||||
)),
|
)),
|
||||||
]
|
]
|
||||||
|
|
||||||
signer = signing.sign_tx(tx, root)
|
keychain = Keychain(seed, [[coin.curve_name]])
|
||||||
|
signer = signing.sign_tx(tx, keychain)
|
||||||
for request, response in chunks(messages, 2):
|
for request, response in chunks(messages, 2):
|
||||||
self.assertEqualEx(signer.send(request), response)
|
self.assertEqual(signer.send(request), response)
|
||||||
with self.assertRaises(StopIteration):
|
with self.assertRaises(StopIteration):
|
||||||
signer.send(None)
|
signer.send(None)
|
||||||
|
|
||||||
def assertEqualEx(self, a, b):
|
|
||||||
# hack to avoid adding __eq__ to signing.Ui* classes
|
|
||||||
if ((isinstance(a, signing.UiConfirmOutput) and isinstance(b, signing.UiConfirmOutput)) or
|
|
||||||
(isinstance(a, signing.UiConfirmTotal) and isinstance(b, signing.UiConfirmTotal))):
|
|
||||||
return self.assertEqual(a.__dict__, b.__dict__)
|
|
||||||
else:
|
|
||||||
return self.assertEqual(a, b)
|
|
||||||
|
|
||||||
|
|
||||||
if __name__ == '__main__':
|
if __name__ == '__main__':
|
||||||
unittest.main()
|
unittest.main()
|
||||||
|
@ -14,7 +14,8 @@ from trezor.messages.TxRequestDetailsType import TxRequestDetailsType
|
|||||||
from trezor.messages import OutputScriptType
|
from trezor.messages import OutputScriptType
|
||||||
|
|
||||||
from apps.common import coins
|
from apps.common import coins
|
||||||
from apps.wallet.sign_tx import signing
|
from apps.common.seed import Keychain
|
||||||
|
from apps.wallet.sign_tx import helpers, signing
|
||||||
|
|
||||||
|
|
||||||
class TestSignTxFeeThreshold(unittest.TestCase):
|
class TestSignTxFeeThreshold(unittest.TestCase):
|
||||||
@ -60,7 +61,7 @@ class TestSignTxFeeThreshold(unittest.TestCase):
|
|||||||
|
|
||||||
TxRequest(request_type=TXINPUT, details=TxRequestDetailsType(request_index=0, tx_hash=None)),
|
TxRequest(request_type=TXINPUT, details=TxRequestDetailsType(request_index=0, tx_hash=None)),
|
||||||
TxAck(tx=TransactionType(inputs=[inp1])),
|
TxAck(tx=TransactionType(inputs=[inp1])),
|
||||||
signing.UiConfirmForeignAddress(address_n=inp1.address_n),
|
helpers.UiConfirmForeignAddress(address_n=inp1.address_n),
|
||||||
True,
|
True,
|
||||||
TxRequest(request_type=TXMETA, details=TxRequestDetailsType(request_index=None, tx_hash=unhexlify('d5f65ee80147b4bcc70b75e4bbf2d7382021b871bd8867ef8fa525ef50864882')), serialized=None),
|
TxRequest(request_type=TXMETA, details=TxRequestDetailsType(request_index=None, tx_hash=unhexlify('d5f65ee80147b4bcc70b75e4bbf2d7382021b871bd8867ef8fa525ef50864882')), serialized=None),
|
||||||
TxAck(tx=ptx1),
|
TxAck(tx=ptx1),
|
||||||
@ -72,11 +73,11 @@ class TestSignTxFeeThreshold(unittest.TestCase):
|
|||||||
TxAck(tx=TransactionType(bin_outputs=[pout1])),
|
TxAck(tx=TransactionType(bin_outputs=[pout1])),
|
||||||
TxRequest(request_type=TXOUTPUT, details=TxRequestDetailsType(request_index=0, tx_hash=None), serialized=None),
|
TxRequest(request_type=TXOUTPUT, details=TxRequestDetailsType(request_index=0, tx_hash=None), serialized=None),
|
||||||
TxAck(tx=TransactionType(outputs=[out1])),
|
TxAck(tx=TransactionType(outputs=[out1])),
|
||||||
signing.UiConfirmOutput(out1, coin_bitcoin),
|
helpers.UiConfirmOutput(out1, coin_bitcoin),
|
||||||
True,
|
True,
|
||||||
signing.UiConfirmFeeOverThreshold(100000, coin_bitcoin),
|
helpers.UiConfirmFeeOverThreshold(100000, coin_bitcoin),
|
||||||
True,
|
True,
|
||||||
signing.UiConfirmTotal(290000 + 100000, 100000, coin_bitcoin),
|
helpers.UiConfirmTotal(290000 + 100000, 100000, coin_bitcoin),
|
||||||
True,
|
True,
|
||||||
TxRequest(request_type=TXINPUT, details=TxRequestDetailsType(request_index=0, tx_hash=None), serialized=None),
|
TxRequest(request_type=TXINPUT, details=TxRequestDetailsType(request_index=0, tx_hash=None), serialized=None),
|
||||||
]
|
]
|
||||||
@ -84,9 +85,10 @@ class TestSignTxFeeThreshold(unittest.TestCase):
|
|||||||
seed = bip39.seed('alcohol woman abuse must during monitor noble actual mixed trade anger aisle', '')
|
seed = bip39.seed('alcohol woman abuse must during monitor noble actual mixed trade anger aisle', '')
|
||||||
root = bip32.from_seed(seed, 'secp256k1')
|
root = bip32.from_seed(seed, 'secp256k1')
|
||||||
|
|
||||||
signer = signing.sign_tx(tx, root)
|
keychain = Keychain([[coin_bitcoin.curve_name]], [root])
|
||||||
|
signer = signing.sign_tx(tx, keychain)
|
||||||
for request, response in chunks(messages, 2):
|
for request, response in chunks(messages, 2):
|
||||||
self.assertEqualEx(signer.send(request), response)
|
self.assertEqual(signer.send(request), response)
|
||||||
|
|
||||||
def test_under_threshold(self):
|
def test_under_threshold(self):
|
||||||
coin_bitcoin = coins.by_name('Bitcoin')
|
coin_bitcoin = coins.by_name('Bitcoin')
|
||||||
@ -127,7 +129,7 @@ class TestSignTxFeeThreshold(unittest.TestCase):
|
|||||||
|
|
||||||
TxRequest(request_type=TXINPUT, details=TxRequestDetailsType(request_index=0, tx_hash=None)),
|
TxRequest(request_type=TXINPUT, details=TxRequestDetailsType(request_index=0, tx_hash=None)),
|
||||||
TxAck(tx=TransactionType(inputs=[inp1])),
|
TxAck(tx=TransactionType(inputs=[inp1])),
|
||||||
signing.UiConfirmForeignAddress(address_n=inp1.address_n),
|
helpers.UiConfirmForeignAddress(address_n=inp1.address_n),
|
||||||
True,
|
True,
|
||||||
TxRequest(request_type=TXMETA, details=TxRequestDetailsType(request_index=None, tx_hash=unhexlify('d5f65ee80147b4bcc70b75e4bbf2d7382021b871bd8867ef8fa525ef50864882')), serialized=None),
|
TxRequest(request_type=TXMETA, details=TxRequestDetailsType(request_index=None, tx_hash=unhexlify('d5f65ee80147b4bcc70b75e4bbf2d7382021b871bd8867ef8fa525ef50864882')), serialized=None),
|
||||||
TxAck(tx=ptx1),
|
TxAck(tx=ptx1),
|
||||||
@ -139,9 +141,9 @@ class TestSignTxFeeThreshold(unittest.TestCase):
|
|||||||
TxAck(tx=TransactionType(bin_outputs=[pout1])),
|
TxAck(tx=TransactionType(bin_outputs=[pout1])),
|
||||||
TxRequest(request_type=TXOUTPUT, details=TxRequestDetailsType(request_index=0, tx_hash=None), serialized=None),
|
TxRequest(request_type=TXOUTPUT, details=TxRequestDetailsType(request_index=0, tx_hash=None), serialized=None),
|
||||||
TxAck(tx=TransactionType(outputs=[out1])),
|
TxAck(tx=TransactionType(outputs=[out1])),
|
||||||
signing.UiConfirmOutput(out1, coin_bitcoin),
|
helpers.UiConfirmOutput(out1, coin_bitcoin),
|
||||||
True,
|
True,
|
||||||
signing.UiConfirmTotal(300000 + 90000, 90000, coin_bitcoin),
|
helpers.UiConfirmTotal(300000 + 90000, 90000, coin_bitcoin),
|
||||||
True,
|
True,
|
||||||
TxRequest(request_type=TXINPUT, details=TxRequestDetailsType(request_index=0, tx_hash=None), serialized=None),
|
TxRequest(request_type=TXINPUT, details=TxRequestDetailsType(request_index=0, tx_hash=None), serialized=None),
|
||||||
]
|
]
|
||||||
@ -149,19 +151,10 @@ class TestSignTxFeeThreshold(unittest.TestCase):
|
|||||||
seed = bip39.seed('alcohol woman abuse must during monitor noble actual mixed trade anger aisle', '')
|
seed = bip39.seed('alcohol woman abuse must during monitor noble actual mixed trade anger aisle', '')
|
||||||
root = bip32.from_seed(seed, 'secp256k1')
|
root = bip32.from_seed(seed, 'secp256k1')
|
||||||
|
|
||||||
signer = signing.sign_tx(tx, root)
|
keychain = Keychain([[coin_bitcoin.curve_name]], [root])
|
||||||
|
signer = signing.sign_tx(tx, keychain)
|
||||||
for request, response in chunks(messages, 2):
|
for request, response in chunks(messages, 2):
|
||||||
self.assertEqualEx(signer.send(request), response)
|
self.assertEqual(signer.send(request), response)
|
||||||
|
|
||||||
def assertEqualEx(self, a, b):
|
|
||||||
# hack to avoid adding __eq__ to signing.Ui* classes
|
|
||||||
if ((isinstance(a, signing.UiConfirmOutput) and isinstance(b, signing.UiConfirmOutput)) or
|
|
||||||
(isinstance(a, signing.UiConfirmTotal) and isinstance(b, signing.UiConfirmTotal)) or
|
|
||||||
(isinstance(a, signing.UiConfirmForeignAddress) and isinstance(b, signing.UiConfirmForeignAddress)) or
|
|
||||||
(isinstance(a, signing.UiConfirmFeeOverThreshold) and isinstance(b, signing.UiConfirmFeeOverThreshold))):
|
|
||||||
return self.assertEqual(a.__dict__, b.__dict__)
|
|
||||||
else:
|
|
||||||
return self.assertEqual(a, b)
|
|
||||||
|
|
||||||
|
|
||||||
if __name__ == '__main__':
|
if __name__ == '__main__':
|
||||||
|
@ -15,7 +15,8 @@ from trezor.messages.TxRequestSerializedType import TxRequestSerializedType
|
|||||||
from trezor.messages import OutputScriptType
|
from trezor.messages import OutputScriptType
|
||||||
|
|
||||||
from apps.common import coins
|
from apps.common import coins
|
||||||
from apps.wallet.sign_tx import signing
|
from apps.common.seed import Keychain
|
||||||
|
from apps.wallet.sign_tx import helpers, signing
|
||||||
|
|
||||||
|
|
||||||
class TestSignTx(unittest.TestCase):
|
class TestSignTx(unittest.TestCase):
|
||||||
@ -61,7 +62,7 @@ class TestSignTx(unittest.TestCase):
|
|||||||
|
|
||||||
TxRequest(request_type=TXINPUT, details=TxRequestDetailsType(request_index=0, tx_hash=None)),
|
TxRequest(request_type=TXINPUT, details=TxRequestDetailsType(request_index=0, tx_hash=None)),
|
||||||
TxAck(tx=TransactionType(inputs=[inp1])),
|
TxAck(tx=TransactionType(inputs=[inp1])),
|
||||||
signing.UiConfirmForeignAddress(address_n=inp1.address_n),
|
helpers.UiConfirmForeignAddress(address_n=inp1.address_n),
|
||||||
True,
|
True,
|
||||||
TxRequest(request_type=TXMETA, details=TxRequestDetailsType(request_index=None, tx_hash=unhexlify('d5f65ee80147b4bcc70b75e4bbf2d7382021b871bd8867ef8fa525ef50864882')), serialized=None),
|
TxRequest(request_type=TXMETA, details=TxRequestDetailsType(request_index=None, tx_hash=unhexlify('d5f65ee80147b4bcc70b75e4bbf2d7382021b871bd8867ef8fa525ef50864882')), serialized=None),
|
||||||
TxAck(tx=ptx1),
|
TxAck(tx=ptx1),
|
||||||
@ -73,9 +74,9 @@ class TestSignTx(unittest.TestCase):
|
|||||||
TxAck(tx=TransactionType(bin_outputs=[pout1])),
|
TxAck(tx=TransactionType(bin_outputs=[pout1])),
|
||||||
TxRequest(request_type=TXOUTPUT, details=TxRequestDetailsType(request_index=0, tx_hash=None), serialized=None),
|
TxRequest(request_type=TXOUTPUT, details=TxRequestDetailsType(request_index=0, tx_hash=None), serialized=None),
|
||||||
TxAck(tx=TransactionType(outputs=[out1])),
|
TxAck(tx=TransactionType(outputs=[out1])),
|
||||||
signing.UiConfirmOutput(out1, coin_bitcoin),
|
helpers.UiConfirmOutput(out1, coin_bitcoin),
|
||||||
True,
|
True,
|
||||||
signing.UiConfirmTotal(380000 + 10000, 10000, coin_bitcoin),
|
helpers.UiConfirmTotal(380000 + 10000, 10000, coin_bitcoin),
|
||||||
True,
|
True,
|
||||||
# ButtonRequest(code=ButtonRequest_ConfirmOutput),
|
# ButtonRequest(code=ButtonRequest_ConfirmOutput),
|
||||||
# ButtonRequest(code=ButtonRequest_SignTx),
|
# ButtonRequest(code=ButtonRequest_SignTx),
|
||||||
@ -96,26 +97,16 @@ class TestSignTx(unittest.TestCase):
|
|||||||
]
|
]
|
||||||
|
|
||||||
seed = bip39.seed('alcohol woman abuse must during monitor noble actual mixed trade anger aisle', '')
|
seed = bip39.seed('alcohol woman abuse must during monitor noble actual mixed trade anger aisle', '')
|
||||||
root = bip32.from_seed(seed, 'secp256k1')
|
keychain = Keychain(seed, [[coin_bitcoin.curve_name]])
|
||||||
|
signer = signing.sign_tx(tx, keychain)
|
||||||
signer = signing.sign_tx(tx, root)
|
|
||||||
|
|
||||||
for request, response in chunks(messages, 2):
|
for request, response in chunks(messages, 2):
|
||||||
res = signer.send(request)
|
res = signer.send(request)
|
||||||
self.assertEqualEx(res, response)
|
self.assertEqual(res, response)
|
||||||
|
|
||||||
with self.assertRaises(StopIteration):
|
with self.assertRaises(StopIteration):
|
||||||
signer.send(None)
|
signer.send(None)
|
||||||
|
|
||||||
def assertEqualEx(self, a, b):
|
|
||||||
# hack to avoid adding __eq__ to signing.Ui* classes
|
|
||||||
if ((isinstance(a, signing.UiConfirmOutput) and isinstance(b, signing.UiConfirmOutput)) or
|
|
||||||
(isinstance(a, signing.UiConfirmForeignAddress) and isinstance(b, signing.UiConfirmForeignAddress)) or
|
|
||||||
(isinstance(a, signing.UiConfirmTotal) and isinstance(b, signing.UiConfirmTotal))):
|
|
||||||
return self.assertEqual(a.__dict__, b.__dict__)
|
|
||||||
else:
|
|
||||||
return self.assertEqual(a, b)
|
|
||||||
|
|
||||||
|
|
||||||
if __name__ == '__main__':
|
if __name__ == '__main__':
|
||||||
unittest.main()
|
unittest.main()
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
from common import *
|
from common import *
|
||||||
|
|
||||||
from trezor.utils import chunks
|
from trezor.utils import chunks
|
||||||
from trezor.crypto import bip32, bip39
|
from trezor.crypto import bip39
|
||||||
from trezor.messages.SignTx import SignTx
|
from trezor.messages.SignTx import SignTx
|
||||||
from trezor.messages.TxInputType import TxInputType
|
from trezor.messages.TxInputType import TxInputType
|
||||||
from trezor.messages.TxOutputType import TxOutputType
|
from trezor.messages.TxOutputType import TxOutputType
|
||||||
@ -15,7 +15,8 @@ from trezor.messages.TxRequestSerializedType import TxRequestSerializedType
|
|||||||
from trezor.messages import OutputScriptType
|
from trezor.messages import OutputScriptType
|
||||||
|
|
||||||
from apps.common import coins
|
from apps.common import coins
|
||||||
from apps.wallet.sign_tx import signing
|
from apps.common.seed import Keychain
|
||||||
|
from apps.wallet.sign_tx import helpers, signing
|
||||||
|
|
||||||
|
|
||||||
class TestSignTx_GRS(unittest.TestCase):
|
class TestSignTx_GRS(unittest.TestCase):
|
||||||
@ -62,9 +63,9 @@ class TestSignTx_GRS(unittest.TestCase):
|
|||||||
TxAck(tx=TransactionType(bin_outputs=[pout1])),
|
TxAck(tx=TransactionType(bin_outputs=[pout1])),
|
||||||
TxRequest(request_type=TXOUTPUT, details=TxRequestDetailsType(request_index=0, tx_hash=None), serialized=None),
|
TxRequest(request_type=TXOUTPUT, details=TxRequestDetailsType(request_index=0, tx_hash=None), serialized=None),
|
||||||
TxAck(tx=TransactionType(outputs=[out1])),
|
TxAck(tx=TransactionType(outputs=[out1])),
|
||||||
signing.UiConfirmOutput(out1, coin),
|
helpers.UiConfirmOutput(out1, coin),
|
||||||
True,
|
True,
|
||||||
signing.UiConfirmTotal(210016, 192, coin),
|
helpers.UiConfirmTotal(210016, 192, coin),
|
||||||
True,
|
True,
|
||||||
# ButtonRequest(code=ButtonRequest_ConfirmOutput),
|
# ButtonRequest(code=ButtonRequest_ConfirmOutput),
|
||||||
# ButtonRequest(code=ButtonRequest_SignTx),
|
# ButtonRequest(code=ButtonRequest_SignTx),
|
||||||
@ -85,22 +86,13 @@ class TestSignTx_GRS(unittest.TestCase):
|
|||||||
]
|
]
|
||||||
|
|
||||||
seed = bip39.seed(' '.join(['all'] * 12), '')
|
seed = bip39.seed(' '.join(['all'] * 12), '')
|
||||||
root = bip32.from_seed(seed, coin.curve_name)
|
keychain = Keychain(seed, [[coin.curve_name]])
|
||||||
|
signer = signing.sign_tx(tx, keychain)
|
||||||
signer = signing.sign_tx(tx, root)
|
|
||||||
for request, response in chunks(messages, 2):
|
for request, response in chunks(messages, 2):
|
||||||
self.assertEqualEx(signer.send(request), response)
|
self.assertEqual(signer.send(request), response)
|
||||||
with self.assertRaises(StopIteration):
|
with self.assertRaises(StopIteration):
|
||||||
signer.send(None)
|
signer.send(None)
|
||||||
|
|
||||||
def assertEqualEx(self, a, b):
|
|
||||||
# hack to avoid adding __eq__ to signing.Ui* classes
|
|
||||||
if ((isinstance(a, signing.UiConfirmOutput) and isinstance(b, signing.UiConfirmOutput)) or
|
|
||||||
(isinstance(a, signing.UiConfirmTotal) and isinstance(b, signing.UiConfirmTotal))):
|
|
||||||
return self.assertEqual(a.__dict__, b.__dict__)
|
|
||||||
else:
|
|
||||||
return self.assertEqual(a, b)
|
|
||||||
|
|
||||||
|
|
||||||
if __name__ == '__main__':
|
if __name__ == '__main__':
|
||||||
unittest.main()
|
unittest.main()
|
||||||
|
@ -5,7 +5,7 @@ from trezor.messages import OutputScriptType
|
|||||||
from trezor.crypto import bip32, bip39
|
from trezor.crypto import bip32, bip39
|
||||||
|
|
||||||
from apps.common import coins
|
from apps.common import coins
|
||||||
from apps.wallet.sign_tx.tx_weight_calculator import *
|
from apps.wallet.sign_tx.tx_weight import *
|
||||||
from apps.wallet.sign_tx import signing
|
from apps.wallet.sign_tx import signing
|
||||||
|
|
||||||
|
|
||||||
|
2
vendor/trezor-common
vendored
2
vendor/trezor-common
vendored
@ -1 +1 @@
|
|||||||
Subproject commit 71528b526020b5c6a95261b07336cff5d68ea66e
|
Subproject commit 8906ebf92cf754554f231d4341976c2cf5da9a22
|
Loading…
Reference in New Issue
Block a user