mirror of
https://github.com/trezor/trezor-firmware.git
synced 2025-07-31 19:08:28 +00:00
refactor(common/protob): make some THP fields required
[no changelog] Co-authored-by: M1nd3r <petrsedlacek.km@seznam.cz>
This commit is contained in:
parent
0584bf9ac5
commit
f849bb952c
@ -25,10 +25,10 @@ enum ThpPairingMethod {
|
|||||||
* @embed
|
* @embed
|
||||||
*/
|
*/
|
||||||
message ThpDeviceProperties {
|
message ThpDeviceProperties {
|
||||||
optional string internal_model = 1; // Internal model name e.g. "T2B1".
|
required string internal_model = 1; // Internal model name e.g. "T2B1".
|
||||||
optional uint32 model_variant = 2; // Encodes the device properties such as color.
|
optional uint32 model_variant = 2 [default=0]; // Encodes the device properties such as color.
|
||||||
optional uint32 protocol_version_major = 3; // The major version of the communication protocol used by the firmware.
|
required uint32 protocol_version_major = 3; // The major version of the communication protocol used by the firmware.
|
||||||
optional uint32 protocol_version_minor = 4; // The minor version of the communication protocol used by the firmware.
|
required uint32 protocol_version_minor = 4; // The minor version of the communication protocol used by the firmware.
|
||||||
repeated ThpPairingMethod pairing_methods = 5; // The pairing methods supported by the Trezor.
|
repeated ThpPairingMethod pairing_methods = 5; // The pairing methods supported by the Trezor.
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -46,8 +46,8 @@ message ThpHandshakeCompletionReqNoisePayload {
|
|||||||
*/
|
*/
|
||||||
message ThpCreateNewSession{
|
message ThpCreateNewSession{
|
||||||
optional string passphrase = 1;
|
optional string passphrase = 1;
|
||||||
optional bool on_device = 2; // User wants to enter passphrase on the device
|
optional bool on_device = 2 [default=false]; // User wants to enter passphrase on the device
|
||||||
optional bool derive_cardano = 3; // If True, Cardano keys will be derived. Ignored with BTC-only
|
optional bool derive_cardano = 3 [default=false]; // If True, Cardano keys will be derived. Ignored with BTC-only
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
@ -75,7 +75,7 @@ message ThpPairingRequestApproved{
|
|||||||
* @next ThpCodeEntryCommitment
|
* @next ThpCodeEntryCommitment
|
||||||
*/
|
*/
|
||||||
message ThpSelectMethod {
|
message ThpSelectMethod {
|
||||||
optional ThpPairingMethod selected_pairing_method = 1;
|
required ThpPairingMethod selected_pairing_method = 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -92,7 +92,7 @@ message ThpPairingPreparationsFinished{
|
|||||||
* @next ThpCodeEntryChallenge
|
* @next ThpCodeEntryChallenge
|
||||||
*/
|
*/
|
||||||
message ThpCodeEntryCommitment {
|
message ThpCodeEntryCommitment {
|
||||||
optional bytes commitment = 1; // SHA-256 of Trezor's random 32-byte secret
|
required bytes commitment = 1; // SHA-256 of Trezor's random 32-byte secret
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -100,7 +100,7 @@ message ThpCodeEntryCommitment {
|
|||||||
* @next ThpCodeEntryCpaceTrezor
|
* @next ThpCodeEntryCpaceTrezor
|
||||||
*/
|
*/
|
||||||
message ThpCodeEntryChallenge {
|
message ThpCodeEntryChallenge {
|
||||||
optional bytes challenge = 1; // Host's random 32-byte challenge
|
required bytes challenge = 1; // Host's random 32-byte challenge
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -108,7 +108,7 @@ message ThpCodeEntryChallenge {
|
|||||||
* @next ThpCodeEntryCpaceHostTag
|
* @next ThpCodeEntryCpaceHostTag
|
||||||
*/
|
*/
|
||||||
message ThpCodeEntryCpaceTrezor {
|
message ThpCodeEntryCpaceTrezor {
|
||||||
optional bytes cpace_trezor_public_key = 1; // Trezor's ephemeral CPace public key
|
required bytes cpace_trezor_public_key = 1; // Trezor's ephemeral CPace public key
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -116,8 +116,8 @@ message ThpCodeEntryCpaceTrezor {
|
|||||||
* @next ThpCodeEntrySecret
|
* @next ThpCodeEntrySecret
|
||||||
*/
|
*/
|
||||||
message ThpCodeEntryCpaceHostTag {
|
message ThpCodeEntryCpaceHostTag {
|
||||||
optional bytes cpace_host_public_key = 1; // Host's ephemeral CPace public key
|
required bytes cpace_host_public_key = 1; // Host's ephemeral CPace public key
|
||||||
optional bytes tag = 2; // SHA-256 of shared secret
|
required bytes tag = 2; // SHA-256 of shared secret
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -127,7 +127,7 @@ message ThpCodeEntryCpaceTrezor {
|
|||||||
* @next ThpEndRequest
|
* @next ThpEndRequest
|
||||||
*/
|
*/
|
||||||
message ThpCodeEntrySecret {
|
message ThpCodeEntrySecret {
|
||||||
optional bytes secret = 1; // Trezor's secret
|
required bytes secret = 1; // Trezor's secret
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -135,7 +135,7 @@ message ThpCodeEntrySecret {
|
|||||||
* @next ThpQrCodeSecret
|
* @next ThpQrCodeSecret
|
||||||
*/
|
*/
|
||||||
message ThpQrCodeTag {
|
message ThpQrCodeTag {
|
||||||
optional bytes tag = 1; // SHA-256 of shared secret
|
required bytes tag = 1; // SHA-256 of shared secret
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -144,7 +144,7 @@ message ThpQrCodeTag {
|
|||||||
* @next ThpEndRequest
|
* @next ThpEndRequest
|
||||||
*/
|
*/
|
||||||
message ThpQrCodeSecret {
|
message ThpQrCodeSecret {
|
||||||
optional bytes secret = 1; // Trezor's secret
|
required bytes secret = 1; // Trezor's secret
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -152,7 +152,7 @@ message ThpQrCodeSecret {
|
|||||||
* @next ThpNfcTagTrezor
|
* @next ThpNfcTagTrezor
|
||||||
*/
|
*/
|
||||||
message ThpNfcTagHost {
|
message ThpNfcTagHost {
|
||||||
optional bytes tag = 1; // Host's tag
|
required bytes tag = 1; // Host's tag
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -161,7 +161,7 @@ message ThpNfcTagHost {
|
|||||||
* @next ThpEndRequest
|
* @next ThpEndRequest
|
||||||
*/
|
*/
|
||||||
message ThpNfcTagTrezor {
|
message ThpNfcTagTrezor {
|
||||||
optional bytes tag = 1; // Trezor's tag
|
required bytes tag = 1; // Trezor's tag
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -170,9 +170,9 @@ message ThpNfcTagTrezor {
|
|||||||
* @next ThpCredentialResponse
|
* @next ThpCredentialResponse
|
||||||
*/
|
*/
|
||||||
message ThpCredentialRequest {
|
message ThpCredentialRequest {
|
||||||
optional bytes host_static_pubkey = 1; // Host's static public key identifying the credential.
|
required bytes host_static_pubkey = 1; // Host's static public key identifying the credential.
|
||||||
optional bool autoconnect = 2; // Whether host wants to autoconnect without user confirmation
|
optional bool autoconnect = 2 [default=false]; // Whether host wants to autoconnect without user confirmation
|
||||||
optional bytes credential = 3; // Host's previous credential
|
optional bytes credential = 3; // Host's previous credential
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -181,8 +181,8 @@ message ThpCredentialRequest {
|
|||||||
* @next ThpEndRequest
|
* @next ThpEndRequest
|
||||||
*/
|
*/
|
||||||
message ThpCredentialResponse {
|
message ThpCredentialResponse {
|
||||||
optional bytes trezor_static_pubkey = 1; // Trezor's static public key used in the handshake.
|
required bytes trezor_static_pubkey = 1; // Trezor's static public key used in the handshake.
|
||||||
optional bytes credential = 2; // The pairing credential issued by the Trezor to the host.
|
required bytes credential = 2; // The pairing credential issued by the Trezor to the host.
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -214,8 +214,8 @@ message ThpEndResponse {}
|
|||||||
*/
|
*/
|
||||||
message ThpPairingCredential {
|
message ThpPairingCredential {
|
||||||
option (internal_only) = true;
|
option (internal_only) = true;
|
||||||
optional ThpCredentialMetadata cred_metadata = 1; // Credential metadata
|
required ThpCredentialMetadata cred_metadata = 1; // Credential metadata
|
||||||
optional bytes mac = 2; // Message authentication code generated by the Trezor
|
required bytes mac = 2; // Message authentication code generated by the Trezor
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -224,6 +224,6 @@ message ThpEndResponse {}
|
|||||||
*/
|
*/
|
||||||
message ThpAuthenticatedCredentialData {
|
message ThpAuthenticatedCredentialData {
|
||||||
option (internal_only) = true;
|
option (internal_only) = true;
|
||||||
optional bytes host_static_pubkey = 1; // Host's static public key used in the handshake
|
required bytes host_static_pubkey = 1; // Host's static public key used in the handshake
|
||||||
optional ThpCredentialMetadata cred_metadata = 2; // Credential metadata
|
required ThpCredentialMetadata cred_metadata = 2; // Credential metadata
|
||||||
}
|
}
|
||||||
|
92
core/src/trezor/messages.py
generated
92
core/src/trezor/messages.py
generated
@ -6153,20 +6153,20 @@ if TYPE_CHECKING:
|
|||||||
return isinstance(msg, cls)
|
return isinstance(msg, cls)
|
||||||
|
|
||||||
class ThpDeviceProperties(protobuf.MessageType):
|
class ThpDeviceProperties(protobuf.MessageType):
|
||||||
internal_model: "str | None"
|
internal_model: "str"
|
||||||
model_variant: "int | None"
|
model_variant: "int"
|
||||||
protocol_version_major: "int | None"
|
protocol_version_major: "int"
|
||||||
protocol_version_minor: "int | None"
|
protocol_version_minor: "int"
|
||||||
pairing_methods: "list[ThpPairingMethod]"
|
pairing_methods: "list[ThpPairingMethod]"
|
||||||
|
|
||||||
def __init__(
|
def __init__(
|
||||||
self,
|
self,
|
||||||
*,
|
*,
|
||||||
|
internal_model: "str",
|
||||||
|
protocol_version_major: "int",
|
||||||
|
protocol_version_minor: "int",
|
||||||
pairing_methods: "list[ThpPairingMethod] | None" = None,
|
pairing_methods: "list[ThpPairingMethod] | None" = None,
|
||||||
internal_model: "str | None" = None,
|
|
||||||
model_variant: "int | None" = None,
|
model_variant: "int | None" = None,
|
||||||
protocol_version_major: "int | None" = None,
|
|
||||||
protocol_version_minor: "int | None" = None,
|
|
||||||
) -> None:
|
) -> None:
|
||||||
pass
|
pass
|
||||||
|
|
||||||
@ -6190,8 +6190,8 @@ if TYPE_CHECKING:
|
|||||||
|
|
||||||
class ThpCreateNewSession(protobuf.MessageType):
|
class ThpCreateNewSession(protobuf.MessageType):
|
||||||
passphrase: "str | None"
|
passphrase: "str | None"
|
||||||
on_device: "bool | None"
|
on_device: "bool"
|
||||||
derive_cardano: "bool | None"
|
derive_cardano: "bool"
|
||||||
|
|
||||||
def __init__(
|
def __init__(
|
||||||
self,
|
self,
|
||||||
@ -6227,12 +6227,12 @@ if TYPE_CHECKING:
|
|||||||
return isinstance(msg, cls)
|
return isinstance(msg, cls)
|
||||||
|
|
||||||
class ThpSelectMethod(protobuf.MessageType):
|
class ThpSelectMethod(protobuf.MessageType):
|
||||||
selected_pairing_method: "ThpPairingMethod | None"
|
selected_pairing_method: "ThpPairingMethod"
|
||||||
|
|
||||||
def __init__(
|
def __init__(
|
||||||
self,
|
self,
|
||||||
*,
|
*,
|
||||||
selected_pairing_method: "ThpPairingMethod | None" = None,
|
selected_pairing_method: "ThpPairingMethod",
|
||||||
) -> None:
|
) -> None:
|
||||||
pass
|
pass
|
||||||
|
|
||||||
@ -6247,12 +6247,12 @@ if TYPE_CHECKING:
|
|||||||
return isinstance(msg, cls)
|
return isinstance(msg, cls)
|
||||||
|
|
||||||
class ThpCodeEntryCommitment(protobuf.MessageType):
|
class ThpCodeEntryCommitment(protobuf.MessageType):
|
||||||
commitment: "bytes | None"
|
commitment: "bytes"
|
||||||
|
|
||||||
def __init__(
|
def __init__(
|
||||||
self,
|
self,
|
||||||
*,
|
*,
|
||||||
commitment: "bytes | None" = None,
|
commitment: "bytes",
|
||||||
) -> None:
|
) -> None:
|
||||||
pass
|
pass
|
||||||
|
|
||||||
@ -6261,12 +6261,12 @@ if TYPE_CHECKING:
|
|||||||
return isinstance(msg, cls)
|
return isinstance(msg, cls)
|
||||||
|
|
||||||
class ThpCodeEntryChallenge(protobuf.MessageType):
|
class ThpCodeEntryChallenge(protobuf.MessageType):
|
||||||
challenge: "bytes | None"
|
challenge: "bytes"
|
||||||
|
|
||||||
def __init__(
|
def __init__(
|
||||||
self,
|
self,
|
||||||
*,
|
*,
|
||||||
challenge: "bytes | None" = None,
|
challenge: "bytes",
|
||||||
) -> None:
|
) -> None:
|
||||||
pass
|
pass
|
||||||
|
|
||||||
@ -6275,12 +6275,12 @@ if TYPE_CHECKING:
|
|||||||
return isinstance(msg, cls)
|
return isinstance(msg, cls)
|
||||||
|
|
||||||
class ThpCodeEntryCpaceTrezor(protobuf.MessageType):
|
class ThpCodeEntryCpaceTrezor(protobuf.MessageType):
|
||||||
cpace_trezor_public_key: "bytes | None"
|
cpace_trezor_public_key: "bytes"
|
||||||
|
|
||||||
def __init__(
|
def __init__(
|
||||||
self,
|
self,
|
||||||
*,
|
*,
|
||||||
cpace_trezor_public_key: "bytes | None" = None,
|
cpace_trezor_public_key: "bytes",
|
||||||
) -> None:
|
) -> None:
|
||||||
pass
|
pass
|
||||||
|
|
||||||
@ -6289,14 +6289,14 @@ if TYPE_CHECKING:
|
|||||||
return isinstance(msg, cls)
|
return isinstance(msg, cls)
|
||||||
|
|
||||||
class ThpCodeEntryCpaceHostTag(protobuf.MessageType):
|
class ThpCodeEntryCpaceHostTag(protobuf.MessageType):
|
||||||
cpace_host_public_key: "bytes | None"
|
cpace_host_public_key: "bytes"
|
||||||
tag: "bytes | None"
|
tag: "bytes"
|
||||||
|
|
||||||
def __init__(
|
def __init__(
|
||||||
self,
|
self,
|
||||||
*,
|
*,
|
||||||
cpace_host_public_key: "bytes | None" = None,
|
cpace_host_public_key: "bytes",
|
||||||
tag: "bytes | None" = None,
|
tag: "bytes",
|
||||||
) -> None:
|
) -> None:
|
||||||
pass
|
pass
|
||||||
|
|
||||||
@ -6305,12 +6305,12 @@ if TYPE_CHECKING:
|
|||||||
return isinstance(msg, cls)
|
return isinstance(msg, cls)
|
||||||
|
|
||||||
class ThpCodeEntrySecret(protobuf.MessageType):
|
class ThpCodeEntrySecret(protobuf.MessageType):
|
||||||
secret: "bytes | None"
|
secret: "bytes"
|
||||||
|
|
||||||
def __init__(
|
def __init__(
|
||||||
self,
|
self,
|
||||||
*,
|
*,
|
||||||
secret: "bytes | None" = None,
|
secret: "bytes",
|
||||||
) -> None:
|
) -> None:
|
||||||
pass
|
pass
|
||||||
|
|
||||||
@ -6319,12 +6319,12 @@ if TYPE_CHECKING:
|
|||||||
return isinstance(msg, cls)
|
return isinstance(msg, cls)
|
||||||
|
|
||||||
class ThpQrCodeTag(protobuf.MessageType):
|
class ThpQrCodeTag(protobuf.MessageType):
|
||||||
tag: "bytes | None"
|
tag: "bytes"
|
||||||
|
|
||||||
def __init__(
|
def __init__(
|
||||||
self,
|
self,
|
||||||
*,
|
*,
|
||||||
tag: "bytes | None" = None,
|
tag: "bytes",
|
||||||
) -> None:
|
) -> None:
|
||||||
pass
|
pass
|
||||||
|
|
||||||
@ -6333,12 +6333,12 @@ if TYPE_CHECKING:
|
|||||||
return isinstance(msg, cls)
|
return isinstance(msg, cls)
|
||||||
|
|
||||||
class ThpQrCodeSecret(protobuf.MessageType):
|
class ThpQrCodeSecret(protobuf.MessageType):
|
||||||
secret: "bytes | None"
|
secret: "bytes"
|
||||||
|
|
||||||
def __init__(
|
def __init__(
|
||||||
self,
|
self,
|
||||||
*,
|
*,
|
||||||
secret: "bytes | None" = None,
|
secret: "bytes",
|
||||||
) -> None:
|
) -> None:
|
||||||
pass
|
pass
|
||||||
|
|
||||||
@ -6347,12 +6347,12 @@ if TYPE_CHECKING:
|
|||||||
return isinstance(msg, cls)
|
return isinstance(msg, cls)
|
||||||
|
|
||||||
class ThpNfcTagHost(protobuf.MessageType):
|
class ThpNfcTagHost(protobuf.MessageType):
|
||||||
tag: "bytes | None"
|
tag: "bytes"
|
||||||
|
|
||||||
def __init__(
|
def __init__(
|
||||||
self,
|
self,
|
||||||
*,
|
*,
|
||||||
tag: "bytes | None" = None,
|
tag: "bytes",
|
||||||
) -> None:
|
) -> None:
|
||||||
pass
|
pass
|
||||||
|
|
||||||
@ -6361,12 +6361,12 @@ if TYPE_CHECKING:
|
|||||||
return isinstance(msg, cls)
|
return isinstance(msg, cls)
|
||||||
|
|
||||||
class ThpNfcTagTrezor(protobuf.MessageType):
|
class ThpNfcTagTrezor(protobuf.MessageType):
|
||||||
tag: "bytes | None"
|
tag: "bytes"
|
||||||
|
|
||||||
def __init__(
|
def __init__(
|
||||||
self,
|
self,
|
||||||
*,
|
*,
|
||||||
tag: "bytes | None" = None,
|
tag: "bytes",
|
||||||
) -> None:
|
) -> None:
|
||||||
pass
|
pass
|
||||||
|
|
||||||
@ -6375,14 +6375,14 @@ if TYPE_CHECKING:
|
|||||||
return isinstance(msg, cls)
|
return isinstance(msg, cls)
|
||||||
|
|
||||||
class ThpCredentialRequest(protobuf.MessageType):
|
class ThpCredentialRequest(protobuf.MessageType):
|
||||||
host_static_pubkey: "bytes | None"
|
host_static_pubkey: "bytes"
|
||||||
autoconnect: "bool | None"
|
autoconnect: "bool"
|
||||||
credential: "bytes | None"
|
credential: "bytes | None"
|
||||||
|
|
||||||
def __init__(
|
def __init__(
|
||||||
self,
|
self,
|
||||||
*,
|
*,
|
||||||
host_static_pubkey: "bytes | None" = None,
|
host_static_pubkey: "bytes",
|
||||||
autoconnect: "bool | None" = None,
|
autoconnect: "bool | None" = None,
|
||||||
credential: "bytes | None" = None,
|
credential: "bytes | None" = None,
|
||||||
) -> None:
|
) -> None:
|
||||||
@ -6393,14 +6393,14 @@ if TYPE_CHECKING:
|
|||||||
return isinstance(msg, cls)
|
return isinstance(msg, cls)
|
||||||
|
|
||||||
class ThpCredentialResponse(protobuf.MessageType):
|
class ThpCredentialResponse(protobuf.MessageType):
|
||||||
trezor_static_pubkey: "bytes | None"
|
trezor_static_pubkey: "bytes"
|
||||||
credential: "bytes | None"
|
credential: "bytes"
|
||||||
|
|
||||||
def __init__(
|
def __init__(
|
||||||
self,
|
self,
|
||||||
*,
|
*,
|
||||||
trezor_static_pubkey: "bytes | None" = None,
|
trezor_static_pubkey: "bytes",
|
||||||
credential: "bytes | None" = None,
|
credential: "bytes",
|
||||||
) -> None:
|
) -> None:
|
||||||
pass
|
pass
|
||||||
|
|
||||||
@ -6437,14 +6437,14 @@ if TYPE_CHECKING:
|
|||||||
return isinstance(msg, cls)
|
return isinstance(msg, cls)
|
||||||
|
|
||||||
class ThpPairingCredential(protobuf.MessageType):
|
class ThpPairingCredential(protobuf.MessageType):
|
||||||
cred_metadata: "ThpCredentialMetadata | None"
|
cred_metadata: "ThpCredentialMetadata"
|
||||||
mac: "bytes | None"
|
mac: "bytes"
|
||||||
|
|
||||||
def __init__(
|
def __init__(
|
||||||
self,
|
self,
|
||||||
*,
|
*,
|
||||||
cred_metadata: "ThpCredentialMetadata | None" = None,
|
cred_metadata: "ThpCredentialMetadata",
|
||||||
mac: "bytes | None" = None,
|
mac: "bytes",
|
||||||
) -> None:
|
) -> None:
|
||||||
pass
|
pass
|
||||||
|
|
||||||
@ -6453,14 +6453,14 @@ if TYPE_CHECKING:
|
|||||||
return isinstance(msg, cls)
|
return isinstance(msg, cls)
|
||||||
|
|
||||||
class ThpAuthenticatedCredentialData(protobuf.MessageType):
|
class ThpAuthenticatedCredentialData(protobuf.MessageType):
|
||||||
host_static_pubkey: "bytes | None"
|
host_static_pubkey: "bytes"
|
||||||
cred_metadata: "ThpCredentialMetadata | None"
|
cred_metadata: "ThpCredentialMetadata"
|
||||||
|
|
||||||
def __init__(
|
def __init__(
|
||||||
self,
|
self,
|
||||||
*,
|
*,
|
||||||
host_static_pubkey: "bytes | None" = None,
|
host_static_pubkey: "bytes",
|
||||||
cred_metadata: "ThpCredentialMetadata | None" = None,
|
cred_metadata: "ThpCredentialMetadata",
|
||||||
) -> None:
|
) -> None:
|
||||||
pass
|
pass
|
||||||
|
|
||||||
|
102
python/src/trezorlib/messages.py
generated
102
python/src/trezorlib/messages.py
generated
@ -7862,27 +7862,27 @@ class TezosManagerTransfer(protobuf.MessageType):
|
|||||||
class ThpDeviceProperties(protobuf.MessageType):
|
class ThpDeviceProperties(protobuf.MessageType):
|
||||||
MESSAGE_WIRE_TYPE = None
|
MESSAGE_WIRE_TYPE = None
|
||||||
FIELDS = {
|
FIELDS = {
|
||||||
1: protobuf.Field("internal_model", "string", repeated=False, required=False, default=None),
|
1: protobuf.Field("internal_model", "string", repeated=False, required=True),
|
||||||
2: protobuf.Field("model_variant", "uint32", repeated=False, required=False, default=None),
|
2: protobuf.Field("model_variant", "uint32", repeated=False, required=False, default=0),
|
||||||
3: protobuf.Field("protocol_version_major", "uint32", repeated=False, required=False, default=None),
|
3: protobuf.Field("protocol_version_major", "uint32", repeated=False, required=True),
|
||||||
4: protobuf.Field("protocol_version_minor", "uint32", repeated=False, required=False, default=None),
|
4: protobuf.Field("protocol_version_minor", "uint32", repeated=False, required=True),
|
||||||
5: protobuf.Field("pairing_methods", "ThpPairingMethod", repeated=True, required=False, default=None),
|
5: protobuf.Field("pairing_methods", "ThpPairingMethod", repeated=True, required=False, default=None),
|
||||||
}
|
}
|
||||||
|
|
||||||
def __init__(
|
def __init__(
|
||||||
self,
|
self,
|
||||||
*,
|
*,
|
||||||
|
internal_model: "str",
|
||||||
|
protocol_version_major: "int",
|
||||||
|
protocol_version_minor: "int",
|
||||||
pairing_methods: Optional[Sequence["ThpPairingMethod"]] = None,
|
pairing_methods: Optional[Sequence["ThpPairingMethod"]] = None,
|
||||||
internal_model: Optional["str"] = None,
|
model_variant: Optional["int"] = 0,
|
||||||
model_variant: Optional["int"] = None,
|
|
||||||
protocol_version_major: Optional["int"] = None,
|
|
||||||
protocol_version_minor: Optional["int"] = None,
|
|
||||||
) -> None:
|
) -> None:
|
||||||
self.pairing_methods: Sequence["ThpPairingMethod"] = pairing_methods if pairing_methods is not None else []
|
self.pairing_methods: Sequence["ThpPairingMethod"] = pairing_methods if pairing_methods is not None else []
|
||||||
self.internal_model = internal_model
|
self.internal_model = internal_model
|
||||||
self.model_variant = model_variant
|
|
||||||
self.protocol_version_major = protocol_version_major
|
self.protocol_version_major = protocol_version_major
|
||||||
self.protocol_version_minor = protocol_version_minor
|
self.protocol_version_minor = protocol_version_minor
|
||||||
|
self.model_variant = model_variant
|
||||||
|
|
||||||
|
|
||||||
class ThpHandshakeCompletionReqNoisePayload(protobuf.MessageType):
|
class ThpHandshakeCompletionReqNoisePayload(protobuf.MessageType):
|
||||||
@ -7903,16 +7903,16 @@ class ThpCreateNewSession(protobuf.MessageType):
|
|||||||
MESSAGE_WIRE_TYPE = 1000
|
MESSAGE_WIRE_TYPE = 1000
|
||||||
FIELDS = {
|
FIELDS = {
|
||||||
1: protobuf.Field("passphrase", "string", repeated=False, required=False, default=None),
|
1: protobuf.Field("passphrase", "string", repeated=False, required=False, default=None),
|
||||||
2: protobuf.Field("on_device", "bool", repeated=False, required=False, default=None),
|
2: protobuf.Field("on_device", "bool", repeated=False, required=False, default=False),
|
||||||
3: protobuf.Field("derive_cardano", "bool", repeated=False, required=False, default=None),
|
3: protobuf.Field("derive_cardano", "bool", repeated=False, required=False, default=False),
|
||||||
}
|
}
|
||||||
|
|
||||||
def __init__(
|
def __init__(
|
||||||
self,
|
self,
|
||||||
*,
|
*,
|
||||||
passphrase: Optional["str"] = None,
|
passphrase: Optional["str"] = None,
|
||||||
on_device: Optional["bool"] = None,
|
on_device: Optional["bool"] = False,
|
||||||
derive_cardano: Optional["bool"] = None,
|
derive_cardano: Optional["bool"] = False,
|
||||||
) -> None:
|
) -> None:
|
||||||
self.passphrase = passphrase
|
self.passphrase = passphrase
|
||||||
self.on_device = on_device
|
self.on_device = on_device
|
||||||
@ -7940,13 +7940,13 @@ class ThpPairingRequestApproved(protobuf.MessageType):
|
|||||||
class ThpSelectMethod(protobuf.MessageType):
|
class ThpSelectMethod(protobuf.MessageType):
|
||||||
MESSAGE_WIRE_TYPE = 1008
|
MESSAGE_WIRE_TYPE = 1008
|
||||||
FIELDS = {
|
FIELDS = {
|
||||||
1: protobuf.Field("selected_pairing_method", "ThpPairingMethod", repeated=False, required=False, default=None),
|
1: protobuf.Field("selected_pairing_method", "ThpPairingMethod", repeated=False, required=True),
|
||||||
}
|
}
|
||||||
|
|
||||||
def __init__(
|
def __init__(
|
||||||
self,
|
self,
|
||||||
*,
|
*,
|
||||||
selected_pairing_method: Optional["ThpPairingMethod"] = None,
|
selected_pairing_method: "ThpPairingMethod",
|
||||||
) -> None:
|
) -> None:
|
||||||
self.selected_pairing_method = selected_pairing_method
|
self.selected_pairing_method = selected_pairing_method
|
||||||
|
|
||||||
@ -7958,13 +7958,13 @@ class ThpPairingPreparationsFinished(protobuf.MessageType):
|
|||||||
class ThpCodeEntryCommitment(protobuf.MessageType):
|
class ThpCodeEntryCommitment(protobuf.MessageType):
|
||||||
MESSAGE_WIRE_TYPE = 1016
|
MESSAGE_WIRE_TYPE = 1016
|
||||||
FIELDS = {
|
FIELDS = {
|
||||||
1: protobuf.Field("commitment", "bytes", repeated=False, required=False, default=None),
|
1: protobuf.Field("commitment", "bytes", repeated=False, required=True),
|
||||||
}
|
}
|
||||||
|
|
||||||
def __init__(
|
def __init__(
|
||||||
self,
|
self,
|
||||||
*,
|
*,
|
||||||
commitment: Optional["bytes"] = None,
|
commitment: "bytes",
|
||||||
) -> None:
|
) -> None:
|
||||||
self.commitment = commitment
|
self.commitment = commitment
|
||||||
|
|
||||||
@ -7972,13 +7972,13 @@ class ThpCodeEntryCommitment(protobuf.MessageType):
|
|||||||
class ThpCodeEntryChallenge(protobuf.MessageType):
|
class ThpCodeEntryChallenge(protobuf.MessageType):
|
||||||
MESSAGE_WIRE_TYPE = 1017
|
MESSAGE_WIRE_TYPE = 1017
|
||||||
FIELDS = {
|
FIELDS = {
|
||||||
1: protobuf.Field("challenge", "bytes", repeated=False, required=False, default=None),
|
1: protobuf.Field("challenge", "bytes", repeated=False, required=True),
|
||||||
}
|
}
|
||||||
|
|
||||||
def __init__(
|
def __init__(
|
||||||
self,
|
self,
|
||||||
*,
|
*,
|
||||||
challenge: Optional["bytes"] = None,
|
challenge: "bytes",
|
||||||
) -> None:
|
) -> None:
|
||||||
self.challenge = challenge
|
self.challenge = challenge
|
||||||
|
|
||||||
@ -7986,13 +7986,13 @@ class ThpCodeEntryChallenge(protobuf.MessageType):
|
|||||||
class ThpCodeEntryCpaceTrezor(protobuf.MessageType):
|
class ThpCodeEntryCpaceTrezor(protobuf.MessageType):
|
||||||
MESSAGE_WIRE_TYPE = 1018
|
MESSAGE_WIRE_TYPE = 1018
|
||||||
FIELDS = {
|
FIELDS = {
|
||||||
1: protobuf.Field("cpace_trezor_public_key", "bytes", repeated=False, required=False, default=None),
|
1: protobuf.Field("cpace_trezor_public_key", "bytes", repeated=False, required=True),
|
||||||
}
|
}
|
||||||
|
|
||||||
def __init__(
|
def __init__(
|
||||||
self,
|
self,
|
||||||
*,
|
*,
|
||||||
cpace_trezor_public_key: Optional["bytes"] = None,
|
cpace_trezor_public_key: "bytes",
|
||||||
) -> None:
|
) -> None:
|
||||||
self.cpace_trezor_public_key = cpace_trezor_public_key
|
self.cpace_trezor_public_key = cpace_trezor_public_key
|
||||||
|
|
||||||
@ -8000,15 +8000,15 @@ class ThpCodeEntryCpaceTrezor(protobuf.MessageType):
|
|||||||
class ThpCodeEntryCpaceHostTag(protobuf.MessageType):
|
class ThpCodeEntryCpaceHostTag(protobuf.MessageType):
|
||||||
MESSAGE_WIRE_TYPE = 1019
|
MESSAGE_WIRE_TYPE = 1019
|
||||||
FIELDS = {
|
FIELDS = {
|
||||||
1: protobuf.Field("cpace_host_public_key", "bytes", repeated=False, required=False, default=None),
|
1: protobuf.Field("cpace_host_public_key", "bytes", repeated=False, required=True),
|
||||||
2: protobuf.Field("tag", "bytes", repeated=False, required=False, default=None),
|
2: protobuf.Field("tag", "bytes", repeated=False, required=True),
|
||||||
}
|
}
|
||||||
|
|
||||||
def __init__(
|
def __init__(
|
||||||
self,
|
self,
|
||||||
*,
|
*,
|
||||||
cpace_host_public_key: Optional["bytes"] = None,
|
cpace_host_public_key: "bytes",
|
||||||
tag: Optional["bytes"] = None,
|
tag: "bytes",
|
||||||
) -> None:
|
) -> None:
|
||||||
self.cpace_host_public_key = cpace_host_public_key
|
self.cpace_host_public_key = cpace_host_public_key
|
||||||
self.tag = tag
|
self.tag = tag
|
||||||
@ -8017,13 +8017,13 @@ class ThpCodeEntryCpaceHostTag(protobuf.MessageType):
|
|||||||
class ThpCodeEntrySecret(protobuf.MessageType):
|
class ThpCodeEntrySecret(protobuf.MessageType):
|
||||||
MESSAGE_WIRE_TYPE = 1020
|
MESSAGE_WIRE_TYPE = 1020
|
||||||
FIELDS = {
|
FIELDS = {
|
||||||
1: protobuf.Field("secret", "bytes", repeated=False, required=False, default=None),
|
1: protobuf.Field("secret", "bytes", repeated=False, required=True),
|
||||||
}
|
}
|
||||||
|
|
||||||
def __init__(
|
def __init__(
|
||||||
self,
|
self,
|
||||||
*,
|
*,
|
||||||
secret: Optional["bytes"] = None,
|
secret: "bytes",
|
||||||
) -> None:
|
) -> None:
|
||||||
self.secret = secret
|
self.secret = secret
|
||||||
|
|
||||||
@ -8031,13 +8031,13 @@ class ThpCodeEntrySecret(protobuf.MessageType):
|
|||||||
class ThpQrCodeTag(protobuf.MessageType):
|
class ThpQrCodeTag(protobuf.MessageType):
|
||||||
MESSAGE_WIRE_TYPE = 1024
|
MESSAGE_WIRE_TYPE = 1024
|
||||||
FIELDS = {
|
FIELDS = {
|
||||||
1: protobuf.Field("tag", "bytes", repeated=False, required=False, default=None),
|
1: protobuf.Field("tag", "bytes", repeated=False, required=True),
|
||||||
}
|
}
|
||||||
|
|
||||||
def __init__(
|
def __init__(
|
||||||
self,
|
self,
|
||||||
*,
|
*,
|
||||||
tag: Optional["bytes"] = None,
|
tag: "bytes",
|
||||||
) -> None:
|
) -> None:
|
||||||
self.tag = tag
|
self.tag = tag
|
||||||
|
|
||||||
@ -8045,13 +8045,13 @@ class ThpQrCodeTag(protobuf.MessageType):
|
|||||||
class ThpQrCodeSecret(protobuf.MessageType):
|
class ThpQrCodeSecret(protobuf.MessageType):
|
||||||
MESSAGE_WIRE_TYPE = 1025
|
MESSAGE_WIRE_TYPE = 1025
|
||||||
FIELDS = {
|
FIELDS = {
|
||||||
1: protobuf.Field("secret", "bytes", repeated=False, required=False, default=None),
|
1: protobuf.Field("secret", "bytes", repeated=False, required=True),
|
||||||
}
|
}
|
||||||
|
|
||||||
def __init__(
|
def __init__(
|
||||||
self,
|
self,
|
||||||
*,
|
*,
|
||||||
secret: Optional["bytes"] = None,
|
secret: "bytes",
|
||||||
) -> None:
|
) -> None:
|
||||||
self.secret = secret
|
self.secret = secret
|
||||||
|
|
||||||
@ -8059,13 +8059,13 @@ class ThpQrCodeSecret(protobuf.MessageType):
|
|||||||
class ThpNfcTagHost(protobuf.MessageType):
|
class ThpNfcTagHost(protobuf.MessageType):
|
||||||
MESSAGE_WIRE_TYPE = 1032
|
MESSAGE_WIRE_TYPE = 1032
|
||||||
FIELDS = {
|
FIELDS = {
|
||||||
1: protobuf.Field("tag", "bytes", repeated=False, required=False, default=None),
|
1: protobuf.Field("tag", "bytes", repeated=False, required=True),
|
||||||
}
|
}
|
||||||
|
|
||||||
def __init__(
|
def __init__(
|
||||||
self,
|
self,
|
||||||
*,
|
*,
|
||||||
tag: Optional["bytes"] = None,
|
tag: "bytes",
|
||||||
) -> None:
|
) -> None:
|
||||||
self.tag = tag
|
self.tag = tag
|
||||||
|
|
||||||
@ -8073,13 +8073,13 @@ class ThpNfcTagHost(protobuf.MessageType):
|
|||||||
class ThpNfcTagTrezor(protobuf.MessageType):
|
class ThpNfcTagTrezor(protobuf.MessageType):
|
||||||
MESSAGE_WIRE_TYPE = 1033
|
MESSAGE_WIRE_TYPE = 1033
|
||||||
FIELDS = {
|
FIELDS = {
|
||||||
1: protobuf.Field("tag", "bytes", repeated=False, required=False, default=None),
|
1: protobuf.Field("tag", "bytes", repeated=False, required=True),
|
||||||
}
|
}
|
||||||
|
|
||||||
def __init__(
|
def __init__(
|
||||||
self,
|
self,
|
||||||
*,
|
*,
|
||||||
tag: Optional["bytes"] = None,
|
tag: "bytes",
|
||||||
) -> None:
|
) -> None:
|
||||||
self.tag = tag
|
self.tag = tag
|
||||||
|
|
||||||
@ -8087,16 +8087,16 @@ class ThpNfcTagTrezor(protobuf.MessageType):
|
|||||||
class ThpCredentialRequest(protobuf.MessageType):
|
class ThpCredentialRequest(protobuf.MessageType):
|
||||||
MESSAGE_WIRE_TYPE = 1010
|
MESSAGE_WIRE_TYPE = 1010
|
||||||
FIELDS = {
|
FIELDS = {
|
||||||
1: protobuf.Field("host_static_pubkey", "bytes", repeated=False, required=False, default=None),
|
1: protobuf.Field("host_static_pubkey", "bytes", repeated=False, required=True),
|
||||||
2: protobuf.Field("autoconnect", "bool", repeated=False, required=False, default=None),
|
2: protobuf.Field("autoconnect", "bool", repeated=False, required=False, default=False),
|
||||||
3: protobuf.Field("credential", "bytes", repeated=False, required=False, default=None),
|
3: protobuf.Field("credential", "bytes", repeated=False, required=False, default=None),
|
||||||
}
|
}
|
||||||
|
|
||||||
def __init__(
|
def __init__(
|
||||||
self,
|
self,
|
||||||
*,
|
*,
|
||||||
host_static_pubkey: Optional["bytes"] = None,
|
host_static_pubkey: "bytes",
|
||||||
autoconnect: Optional["bool"] = None,
|
autoconnect: Optional["bool"] = False,
|
||||||
credential: Optional["bytes"] = None,
|
credential: Optional["bytes"] = None,
|
||||||
) -> None:
|
) -> None:
|
||||||
self.host_static_pubkey = host_static_pubkey
|
self.host_static_pubkey = host_static_pubkey
|
||||||
@ -8107,15 +8107,15 @@ class ThpCredentialRequest(protobuf.MessageType):
|
|||||||
class ThpCredentialResponse(protobuf.MessageType):
|
class ThpCredentialResponse(protobuf.MessageType):
|
||||||
MESSAGE_WIRE_TYPE = 1011
|
MESSAGE_WIRE_TYPE = 1011
|
||||||
FIELDS = {
|
FIELDS = {
|
||||||
1: protobuf.Field("trezor_static_pubkey", "bytes", repeated=False, required=False, default=None),
|
1: protobuf.Field("trezor_static_pubkey", "bytes", repeated=False, required=True),
|
||||||
2: protobuf.Field("credential", "bytes", repeated=False, required=False, default=None),
|
2: protobuf.Field("credential", "bytes", repeated=False, required=True),
|
||||||
}
|
}
|
||||||
|
|
||||||
def __init__(
|
def __init__(
|
||||||
self,
|
self,
|
||||||
*,
|
*,
|
||||||
trezor_static_pubkey: Optional["bytes"] = None,
|
trezor_static_pubkey: "bytes",
|
||||||
credential: Optional["bytes"] = None,
|
credential: "bytes",
|
||||||
) -> None:
|
) -> None:
|
||||||
self.trezor_static_pubkey = trezor_static_pubkey
|
self.trezor_static_pubkey = trezor_static_pubkey
|
||||||
self.credential = credential
|
self.credential = credential
|
||||||
@ -8149,15 +8149,15 @@ class ThpCredentialMetadata(protobuf.MessageType):
|
|||||||
class ThpPairingCredential(protobuf.MessageType):
|
class ThpPairingCredential(protobuf.MessageType):
|
||||||
MESSAGE_WIRE_TYPE = None
|
MESSAGE_WIRE_TYPE = None
|
||||||
FIELDS = {
|
FIELDS = {
|
||||||
1: protobuf.Field("cred_metadata", "ThpCredentialMetadata", repeated=False, required=False, default=None),
|
1: protobuf.Field("cred_metadata", "ThpCredentialMetadata", repeated=False, required=True),
|
||||||
2: protobuf.Field("mac", "bytes", repeated=False, required=False, default=None),
|
2: protobuf.Field("mac", "bytes", repeated=False, required=True),
|
||||||
}
|
}
|
||||||
|
|
||||||
def __init__(
|
def __init__(
|
||||||
self,
|
self,
|
||||||
*,
|
*,
|
||||||
cred_metadata: Optional["ThpCredentialMetadata"] = None,
|
cred_metadata: "ThpCredentialMetadata",
|
||||||
mac: Optional["bytes"] = None,
|
mac: "bytes",
|
||||||
) -> None:
|
) -> None:
|
||||||
self.cred_metadata = cred_metadata
|
self.cred_metadata = cred_metadata
|
||||||
self.mac = mac
|
self.mac = mac
|
||||||
@ -8166,15 +8166,15 @@ class ThpPairingCredential(protobuf.MessageType):
|
|||||||
class ThpAuthenticatedCredentialData(protobuf.MessageType):
|
class ThpAuthenticatedCredentialData(protobuf.MessageType):
|
||||||
MESSAGE_WIRE_TYPE = None
|
MESSAGE_WIRE_TYPE = None
|
||||||
FIELDS = {
|
FIELDS = {
|
||||||
1: protobuf.Field("host_static_pubkey", "bytes", repeated=False, required=False, default=None),
|
1: protobuf.Field("host_static_pubkey", "bytes", repeated=False, required=True),
|
||||||
2: protobuf.Field("cred_metadata", "ThpCredentialMetadata", repeated=False, required=False, default=None),
|
2: protobuf.Field("cred_metadata", "ThpCredentialMetadata", repeated=False, required=True),
|
||||||
}
|
}
|
||||||
|
|
||||||
def __init__(
|
def __init__(
|
||||||
self,
|
self,
|
||||||
*,
|
*,
|
||||||
host_static_pubkey: Optional["bytes"] = None,
|
host_static_pubkey: "bytes",
|
||||||
cred_metadata: Optional["ThpCredentialMetadata"] = None,
|
cred_metadata: "ThpCredentialMetadata",
|
||||||
) -> None:
|
) -> None:
|
||||||
self.host_static_pubkey = host_static_pubkey
|
self.host_static_pubkey = host_static_pubkey
|
||||||
self.cred_metadata = cred_metadata
|
self.cred_metadata = cred_metadata
|
||||||
|
198
rust/trezor-client/src/protos/generated/messages_thp.rs
generated
198
rust/trezor-client/src/protos/generated/messages_thp.rs
generated
@ -54,7 +54,7 @@ impl ThpDeviceProperties {
|
|||||||
::std::default::Default::default()
|
::std::default::Default::default()
|
||||||
}
|
}
|
||||||
|
|
||||||
// optional string internal_model = 1;
|
// required string internal_model = 1;
|
||||||
|
|
||||||
pub fn internal_model(&self) -> &str {
|
pub fn internal_model(&self) -> &str {
|
||||||
match self.internal_model.as_ref() {
|
match self.internal_model.as_ref() {
|
||||||
@ -93,7 +93,7 @@ impl ThpDeviceProperties {
|
|||||||
// optional uint32 model_variant = 2;
|
// optional uint32 model_variant = 2;
|
||||||
|
|
||||||
pub fn model_variant(&self) -> u32 {
|
pub fn model_variant(&self) -> u32 {
|
||||||
self.model_variant.unwrap_or(0)
|
self.model_variant.unwrap_or(0u32)
|
||||||
}
|
}
|
||||||
|
|
||||||
pub fn clear_model_variant(&mut self) {
|
pub fn clear_model_variant(&mut self) {
|
||||||
@ -109,7 +109,7 @@ impl ThpDeviceProperties {
|
|||||||
self.model_variant = ::std::option::Option::Some(v);
|
self.model_variant = ::std::option::Option::Some(v);
|
||||||
}
|
}
|
||||||
|
|
||||||
// optional uint32 protocol_version_major = 3;
|
// required uint32 protocol_version_major = 3;
|
||||||
|
|
||||||
pub fn protocol_version_major(&self) -> u32 {
|
pub fn protocol_version_major(&self) -> u32 {
|
||||||
self.protocol_version_major.unwrap_or(0)
|
self.protocol_version_major.unwrap_or(0)
|
||||||
@ -128,7 +128,7 @@ impl ThpDeviceProperties {
|
|||||||
self.protocol_version_major = ::std::option::Option::Some(v);
|
self.protocol_version_major = ::std::option::Option::Some(v);
|
||||||
}
|
}
|
||||||
|
|
||||||
// optional uint32 protocol_version_minor = 4;
|
// required uint32 protocol_version_minor = 4;
|
||||||
|
|
||||||
pub fn protocol_version_minor(&self) -> u32 {
|
pub fn protocol_version_minor(&self) -> u32 {
|
||||||
self.protocol_version_minor.unwrap_or(0)
|
self.protocol_version_minor.unwrap_or(0)
|
||||||
@ -187,6 +187,15 @@ impl ::protobuf::Message for ThpDeviceProperties {
|
|||||||
const NAME: &'static str = "ThpDeviceProperties";
|
const NAME: &'static str = "ThpDeviceProperties";
|
||||||
|
|
||||||
fn is_initialized(&self) -> bool {
|
fn is_initialized(&self) -> bool {
|
||||||
|
if self.internal_model.is_none() {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
if self.protocol_version_major.is_none() {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
if self.protocol_version_minor.is_none() {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
true
|
true
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -987,7 +996,7 @@ impl ThpSelectMethod {
|
|||||||
::std::default::Default::default()
|
::std::default::Default::default()
|
||||||
}
|
}
|
||||||
|
|
||||||
// optional .hw.trezor.messages.thp.ThpPairingMethod selected_pairing_method = 1;
|
// required .hw.trezor.messages.thp.ThpPairingMethod selected_pairing_method = 1;
|
||||||
|
|
||||||
pub fn selected_pairing_method(&self) -> ThpPairingMethod {
|
pub fn selected_pairing_method(&self) -> ThpPairingMethod {
|
||||||
match self.selected_pairing_method {
|
match self.selected_pairing_method {
|
||||||
@ -1029,6 +1038,9 @@ impl ::protobuf::Message for ThpSelectMethod {
|
|||||||
const NAME: &'static str = "ThpSelectMethod";
|
const NAME: &'static str = "ThpSelectMethod";
|
||||||
|
|
||||||
fn is_initialized(&self) -> bool {
|
fn is_initialized(&self) -> bool {
|
||||||
|
if self.selected_pairing_method.is_none() {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
true
|
true
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -1234,7 +1246,7 @@ impl ThpCodeEntryCommitment {
|
|||||||
::std::default::Default::default()
|
::std::default::Default::default()
|
||||||
}
|
}
|
||||||
|
|
||||||
// optional bytes commitment = 1;
|
// required bytes commitment = 1;
|
||||||
|
|
||||||
pub fn commitment(&self) -> &[u8] {
|
pub fn commitment(&self) -> &[u8] {
|
||||||
match self.commitment.as_ref() {
|
match self.commitment.as_ref() {
|
||||||
@ -1290,6 +1302,9 @@ impl ::protobuf::Message for ThpCodeEntryCommitment {
|
|||||||
const NAME: &'static str = "ThpCodeEntryCommitment";
|
const NAME: &'static str = "ThpCodeEntryCommitment";
|
||||||
|
|
||||||
fn is_initialized(&self) -> bool {
|
fn is_initialized(&self) -> bool {
|
||||||
|
if self.commitment.is_none() {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
true
|
true
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -1392,7 +1407,7 @@ impl ThpCodeEntryChallenge {
|
|||||||
::std::default::Default::default()
|
::std::default::Default::default()
|
||||||
}
|
}
|
||||||
|
|
||||||
// optional bytes challenge = 1;
|
// required bytes challenge = 1;
|
||||||
|
|
||||||
pub fn challenge(&self) -> &[u8] {
|
pub fn challenge(&self) -> &[u8] {
|
||||||
match self.challenge.as_ref() {
|
match self.challenge.as_ref() {
|
||||||
@ -1448,6 +1463,9 @@ impl ::protobuf::Message for ThpCodeEntryChallenge {
|
|||||||
const NAME: &'static str = "ThpCodeEntryChallenge";
|
const NAME: &'static str = "ThpCodeEntryChallenge";
|
||||||
|
|
||||||
fn is_initialized(&self) -> bool {
|
fn is_initialized(&self) -> bool {
|
||||||
|
if self.challenge.is_none() {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
true
|
true
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -1550,7 +1568,7 @@ impl ThpCodeEntryCpaceTrezor {
|
|||||||
::std::default::Default::default()
|
::std::default::Default::default()
|
||||||
}
|
}
|
||||||
|
|
||||||
// optional bytes cpace_trezor_public_key = 1;
|
// required bytes cpace_trezor_public_key = 1;
|
||||||
|
|
||||||
pub fn cpace_trezor_public_key(&self) -> &[u8] {
|
pub fn cpace_trezor_public_key(&self) -> &[u8] {
|
||||||
match self.cpace_trezor_public_key.as_ref() {
|
match self.cpace_trezor_public_key.as_ref() {
|
||||||
@ -1606,6 +1624,9 @@ impl ::protobuf::Message for ThpCodeEntryCpaceTrezor {
|
|||||||
const NAME: &'static str = "ThpCodeEntryCpaceTrezor";
|
const NAME: &'static str = "ThpCodeEntryCpaceTrezor";
|
||||||
|
|
||||||
fn is_initialized(&self) -> bool {
|
fn is_initialized(&self) -> bool {
|
||||||
|
if self.cpace_trezor_public_key.is_none() {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
true
|
true
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -1710,7 +1731,7 @@ impl ThpCodeEntryCpaceHostTag {
|
|||||||
::std::default::Default::default()
|
::std::default::Default::default()
|
||||||
}
|
}
|
||||||
|
|
||||||
// optional bytes cpace_host_public_key = 1;
|
// required bytes cpace_host_public_key = 1;
|
||||||
|
|
||||||
pub fn cpace_host_public_key(&self) -> &[u8] {
|
pub fn cpace_host_public_key(&self) -> &[u8] {
|
||||||
match self.cpace_host_public_key.as_ref() {
|
match self.cpace_host_public_key.as_ref() {
|
||||||
@ -1746,7 +1767,7 @@ impl ThpCodeEntryCpaceHostTag {
|
|||||||
self.cpace_host_public_key.take().unwrap_or_else(|| ::std::vec::Vec::new())
|
self.cpace_host_public_key.take().unwrap_or_else(|| ::std::vec::Vec::new())
|
||||||
}
|
}
|
||||||
|
|
||||||
// optional bytes tag = 2;
|
// required bytes tag = 2;
|
||||||
|
|
||||||
pub fn tag(&self) -> &[u8] {
|
pub fn tag(&self) -> &[u8] {
|
||||||
match self.tag.as_ref() {
|
match self.tag.as_ref() {
|
||||||
@ -1807,6 +1828,12 @@ impl ::protobuf::Message for ThpCodeEntryCpaceHostTag {
|
|||||||
const NAME: &'static str = "ThpCodeEntryCpaceHostTag";
|
const NAME: &'static str = "ThpCodeEntryCpaceHostTag";
|
||||||
|
|
||||||
fn is_initialized(&self) -> bool {
|
fn is_initialized(&self) -> bool {
|
||||||
|
if self.cpace_host_public_key.is_none() {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
if self.tag.is_none() {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
true
|
true
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -1920,7 +1947,7 @@ impl ThpCodeEntrySecret {
|
|||||||
::std::default::Default::default()
|
::std::default::Default::default()
|
||||||
}
|
}
|
||||||
|
|
||||||
// optional bytes secret = 1;
|
// required bytes secret = 1;
|
||||||
|
|
||||||
pub fn secret(&self) -> &[u8] {
|
pub fn secret(&self) -> &[u8] {
|
||||||
match self.secret.as_ref() {
|
match self.secret.as_ref() {
|
||||||
@ -1976,6 +2003,9 @@ impl ::protobuf::Message for ThpCodeEntrySecret {
|
|||||||
const NAME: &'static str = "ThpCodeEntrySecret";
|
const NAME: &'static str = "ThpCodeEntrySecret";
|
||||||
|
|
||||||
fn is_initialized(&self) -> bool {
|
fn is_initialized(&self) -> bool {
|
||||||
|
if self.secret.is_none() {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
true
|
true
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -2078,7 +2108,7 @@ impl ThpQrCodeTag {
|
|||||||
::std::default::Default::default()
|
::std::default::Default::default()
|
||||||
}
|
}
|
||||||
|
|
||||||
// optional bytes tag = 1;
|
// required bytes tag = 1;
|
||||||
|
|
||||||
pub fn tag(&self) -> &[u8] {
|
pub fn tag(&self) -> &[u8] {
|
||||||
match self.tag.as_ref() {
|
match self.tag.as_ref() {
|
||||||
@ -2134,6 +2164,9 @@ impl ::protobuf::Message for ThpQrCodeTag {
|
|||||||
const NAME: &'static str = "ThpQrCodeTag";
|
const NAME: &'static str = "ThpQrCodeTag";
|
||||||
|
|
||||||
fn is_initialized(&self) -> bool {
|
fn is_initialized(&self) -> bool {
|
||||||
|
if self.tag.is_none() {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
true
|
true
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -2236,7 +2269,7 @@ impl ThpQrCodeSecret {
|
|||||||
::std::default::Default::default()
|
::std::default::Default::default()
|
||||||
}
|
}
|
||||||
|
|
||||||
// optional bytes secret = 1;
|
// required bytes secret = 1;
|
||||||
|
|
||||||
pub fn secret(&self) -> &[u8] {
|
pub fn secret(&self) -> &[u8] {
|
||||||
match self.secret.as_ref() {
|
match self.secret.as_ref() {
|
||||||
@ -2292,6 +2325,9 @@ impl ::protobuf::Message for ThpQrCodeSecret {
|
|||||||
const NAME: &'static str = "ThpQrCodeSecret";
|
const NAME: &'static str = "ThpQrCodeSecret";
|
||||||
|
|
||||||
fn is_initialized(&self) -> bool {
|
fn is_initialized(&self) -> bool {
|
||||||
|
if self.secret.is_none() {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
true
|
true
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -2394,7 +2430,7 @@ impl ThpNfcTagHost {
|
|||||||
::std::default::Default::default()
|
::std::default::Default::default()
|
||||||
}
|
}
|
||||||
|
|
||||||
// optional bytes tag = 1;
|
// required bytes tag = 1;
|
||||||
|
|
||||||
pub fn tag(&self) -> &[u8] {
|
pub fn tag(&self) -> &[u8] {
|
||||||
match self.tag.as_ref() {
|
match self.tag.as_ref() {
|
||||||
@ -2450,6 +2486,9 @@ impl ::protobuf::Message for ThpNfcTagHost {
|
|||||||
const NAME: &'static str = "ThpNfcTagHost";
|
const NAME: &'static str = "ThpNfcTagHost";
|
||||||
|
|
||||||
fn is_initialized(&self) -> bool {
|
fn is_initialized(&self) -> bool {
|
||||||
|
if self.tag.is_none() {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
true
|
true
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -2552,7 +2591,7 @@ impl ThpNfcTagTrezor {
|
|||||||
::std::default::Default::default()
|
::std::default::Default::default()
|
||||||
}
|
}
|
||||||
|
|
||||||
// optional bytes tag = 1;
|
// required bytes tag = 1;
|
||||||
|
|
||||||
pub fn tag(&self) -> &[u8] {
|
pub fn tag(&self) -> &[u8] {
|
||||||
match self.tag.as_ref() {
|
match self.tag.as_ref() {
|
||||||
@ -2608,6 +2647,9 @@ impl ::protobuf::Message for ThpNfcTagTrezor {
|
|||||||
const NAME: &'static str = "ThpNfcTagTrezor";
|
const NAME: &'static str = "ThpNfcTagTrezor";
|
||||||
|
|
||||||
fn is_initialized(&self) -> bool {
|
fn is_initialized(&self) -> bool {
|
||||||
|
if self.tag.is_none() {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
true
|
true
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -2714,7 +2756,7 @@ impl ThpCredentialRequest {
|
|||||||
::std::default::Default::default()
|
::std::default::Default::default()
|
||||||
}
|
}
|
||||||
|
|
||||||
// optional bytes host_static_pubkey = 1;
|
// required bytes host_static_pubkey = 1;
|
||||||
|
|
||||||
pub fn host_static_pubkey(&self) -> &[u8] {
|
pub fn host_static_pubkey(&self) -> &[u8] {
|
||||||
match self.host_static_pubkey.as_ref() {
|
match self.host_static_pubkey.as_ref() {
|
||||||
@ -2835,6 +2877,9 @@ impl ::protobuf::Message for ThpCredentialRequest {
|
|||||||
const NAME: &'static str = "ThpCredentialRequest";
|
const NAME: &'static str = "ThpCredentialRequest";
|
||||||
|
|
||||||
fn is_initialized(&self) -> bool {
|
fn is_initialized(&self) -> bool {
|
||||||
|
if self.host_static_pubkey.is_none() {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
true
|
true
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -2961,7 +3006,7 @@ impl ThpCredentialResponse {
|
|||||||
::std::default::Default::default()
|
::std::default::Default::default()
|
||||||
}
|
}
|
||||||
|
|
||||||
// optional bytes trezor_static_pubkey = 1;
|
// required bytes trezor_static_pubkey = 1;
|
||||||
|
|
||||||
pub fn trezor_static_pubkey(&self) -> &[u8] {
|
pub fn trezor_static_pubkey(&self) -> &[u8] {
|
||||||
match self.trezor_static_pubkey.as_ref() {
|
match self.trezor_static_pubkey.as_ref() {
|
||||||
@ -2997,7 +3042,7 @@ impl ThpCredentialResponse {
|
|||||||
self.trezor_static_pubkey.take().unwrap_or_else(|| ::std::vec::Vec::new())
|
self.trezor_static_pubkey.take().unwrap_or_else(|| ::std::vec::Vec::new())
|
||||||
}
|
}
|
||||||
|
|
||||||
// optional bytes credential = 2;
|
// required bytes credential = 2;
|
||||||
|
|
||||||
pub fn credential(&self) -> &[u8] {
|
pub fn credential(&self) -> &[u8] {
|
||||||
match self.credential.as_ref() {
|
match self.credential.as_ref() {
|
||||||
@ -3058,6 +3103,12 @@ impl ::protobuf::Message for ThpCredentialResponse {
|
|||||||
const NAME: &'static str = "ThpCredentialResponse";
|
const NAME: &'static str = "ThpCredentialResponse";
|
||||||
|
|
||||||
fn is_initialized(&self) -> bool {
|
fn is_initialized(&self) -> bool {
|
||||||
|
if self.trezor_static_pubkey.is_none() {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
if self.credential.is_none() {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
true
|
true
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -3574,7 +3625,7 @@ impl ThpPairingCredential {
|
|||||||
::std::default::Default::default()
|
::std::default::Default::default()
|
||||||
}
|
}
|
||||||
|
|
||||||
// optional bytes mac = 2;
|
// required bytes mac = 2;
|
||||||
|
|
||||||
pub fn mac(&self) -> &[u8] {
|
pub fn mac(&self) -> &[u8] {
|
||||||
match self.mac.as_ref() {
|
match self.mac.as_ref() {
|
||||||
@ -3635,6 +3686,17 @@ impl ::protobuf::Message for ThpPairingCredential {
|
|||||||
const NAME: &'static str = "ThpPairingCredential";
|
const NAME: &'static str = "ThpPairingCredential";
|
||||||
|
|
||||||
fn is_initialized(&self) -> bool {
|
fn is_initialized(&self) -> bool {
|
||||||
|
if self.cred_metadata.is_none() {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
if self.mac.is_none() {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
for v in &self.cred_metadata {
|
||||||
|
if !v.is_initialized() {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
};
|
||||||
true
|
true
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -3751,7 +3813,7 @@ impl ThpAuthenticatedCredentialData {
|
|||||||
::std::default::Default::default()
|
::std::default::Default::default()
|
||||||
}
|
}
|
||||||
|
|
||||||
// optional bytes host_static_pubkey = 1;
|
// required bytes host_static_pubkey = 1;
|
||||||
|
|
||||||
pub fn host_static_pubkey(&self) -> &[u8] {
|
pub fn host_static_pubkey(&self) -> &[u8] {
|
||||||
match self.host_static_pubkey.as_ref() {
|
match self.host_static_pubkey.as_ref() {
|
||||||
@ -3812,6 +3874,17 @@ impl ::protobuf::Message for ThpAuthenticatedCredentialData {
|
|||||||
const NAME: &'static str = "ThpAuthenticatedCredentialData";
|
const NAME: &'static str = "ThpAuthenticatedCredentialData";
|
||||||
|
|
||||||
fn is_initialized(&self) -> bool {
|
fn is_initialized(&self) -> bool {
|
||||||
|
if self.host_static_pubkey.is_none() {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
if self.cred_metadata.is_none() {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
for v in &self.cred_metadata {
|
||||||
|
if !v.is_initialized() {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
};
|
||||||
true
|
true
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -3984,50 +4057,51 @@ impl ThpPairingMethod {
|
|||||||
|
|
||||||
static file_descriptor_proto_data: &'static [u8] = b"\
|
static file_descriptor_proto_data: &'static [u8] = b"\
|
||||||
\n\x12messages-thp.proto\x12\x16hw.trezor.messages.thp\x1a\roptions.prot\
|
\n\x12messages-thp.proto\x12\x16hw.trezor.messages.thp\x1a\roptions.prot\
|
||||||
o\"\xa0\x02\n\x13ThpDeviceProperties\x12%\n\x0einternal_model\x18\x01\
|
o\"\xa3\x02\n\x13ThpDeviceProperties\x12%\n\x0einternal_model\x18\x01\
|
||||||
\x20\x01(\tR\rinternalModel\x12#\n\rmodel_variant\x18\x02\x20\x01(\rR\
|
\x20\x02(\tR\rinternalModel\x12&\n\rmodel_variant\x18\x02\x20\x01(\r:\
|
||||||
\x0cmodelVariant\x124\n\x16protocol_version_major\x18\x03\x20\x01(\rR\
|
\x010R\x0cmodelVariant\x124\n\x16protocol_version_major\x18\x03\x20\x02(\
|
||||||
\x14protocolVersionMajor\x124\n\x16protocol_version_minor\x18\x04\x20\
|
\rR\x14protocolVersionMajor\x124\n\x16protocol_version_minor\x18\x04\x20\
|
||||||
\x01(\rR\x14protocolVersionMinor\x12Q\n\x0fpairing_methods\x18\x05\x20\
|
\x02(\rR\x14protocolVersionMinor\x12Q\n\x0fpairing_methods\x18\x05\x20\
|
||||||
\x03(\x0e2(.hw.trezor.messages.thp.ThpPairingMethodR\x0epairingMethods\"\
|
\x03(\x0e2(.hw.trezor.messages.thp.ThpPairingMethodR\x0epairingMethods\"\
|
||||||
_\n%ThpHandshakeCompletionReqNoisePayload\x126\n\x17host_pairing_credent\
|
_\n%ThpHandshakeCompletionReqNoisePayload\x126\n\x17host_pairing_credent\
|
||||||
ial\x18\x01\x20\x01(\x0cR\x15hostPairingCredential\"y\n\x13ThpCreateNewS\
|
ial\x18\x01\x20\x01(\x0cR\x15hostPairingCredential\"\x87\x01\n\x13ThpCre\
|
||||||
ession\x12\x1e\n\npassphrase\x18\x01\x20\x01(\tR\npassphrase\x12\x1b\n\t\
|
ateNewSession\x12\x1e\n\npassphrase\x18\x01\x20\x01(\tR\npassphrase\x12\
|
||||||
on_device\x18\x02\x20\x01(\x08R\x08onDevice\x12%\n\x0ederive_cardano\x18\
|
\"\n\ton_device\x18\x02\x20\x01(\x08:\x05falseR\x08onDevice\x12,\n\x0ede\
|
||||||
\x03\x20\x01(\x08R\rderiveCardano\"0\n\x11ThpPairingRequest\x12\x1b\n\th\
|
rive_cardano\x18\x03\x20\x01(\x08:\x05falseR\rderiveCardano\"0\n\x11ThpP\
|
||||||
ost_name\x18\x01\x20\x01(\tR\x08hostName\"\x1b\n\x19ThpPairingRequestApp\
|
airingRequest\x12\x1b\n\thost_name\x18\x01\x20\x01(\tR\x08hostName\"\x1b\
|
||||||
roved\"s\n\x0fThpSelectMethod\x12`\n\x17selected_pairing_method\x18\x01\
|
\n\x19ThpPairingRequestApproved\"s\n\x0fThpSelectMethod\x12`\n\x17select\
|
||||||
\x20\x01(\x0e2(.hw.trezor.messages.thp.ThpPairingMethodR\x15selectedPair\
|
ed_pairing_method\x18\x01\x20\x02(\x0e2(.hw.trezor.messages.thp.ThpPairi\
|
||||||
ingMethod\"\x20\n\x1eThpPairingPreparationsFinished\"8\n\x16ThpCodeEntry\
|
ngMethodR\x15selectedPairingMethod\"\x20\n\x1eThpPairingPreparationsFini\
|
||||||
Commitment\x12\x1e\n\ncommitment\x18\x01\x20\x01(\x0cR\ncommitment\"5\n\
|
shed\"8\n\x16ThpCodeEntryCommitment\x12\x1e\n\ncommitment\x18\x01\x20\
|
||||||
\x15ThpCodeEntryChallenge\x12\x1c\n\tchallenge\x18\x01\x20\x01(\x0cR\tch\
|
\x02(\x0cR\ncommitment\"5\n\x15ThpCodeEntryChallenge\x12\x1c\n\tchalleng\
|
||||||
allenge\"P\n\x17ThpCodeEntryCpaceTrezor\x125\n\x17cpace_trezor_public_ke\
|
e\x18\x01\x20\x02(\x0cR\tchallenge\"P\n\x17ThpCodeEntryCpaceTrezor\x125\
|
||||||
y\x18\x01\x20\x01(\x0cR\x14cpaceTrezorPublicKey\"_\n\x18ThpCodeEntryCpac\
|
\n\x17cpace_trezor_public_key\x18\x01\x20\x02(\x0cR\x14cpaceTrezorPublic\
|
||||||
eHostTag\x121\n\x15cpace_host_public_key\x18\x01\x20\x01(\x0cR\x12cpaceH\
|
Key\"_\n\x18ThpCodeEntryCpaceHostTag\x121\n\x15cpace_host_public_key\x18\
|
||||||
ostPublicKey\x12\x10\n\x03tag\x18\x02\x20\x01(\x0cR\x03tag\",\n\x12ThpCo\
|
\x01\x20\x02(\x0cR\x12cpaceHostPublicKey\x12\x10\n\x03tag\x18\x02\x20\
|
||||||
deEntrySecret\x12\x16\n\x06secret\x18\x01\x20\x01(\x0cR\x06secret\"\x20\
|
\x02(\x0cR\x03tag\",\n\x12ThpCodeEntrySecret\x12\x16\n\x06secret\x18\x01\
|
||||||
\n\x0cThpQrCodeTag\x12\x10\n\x03tag\x18\x01\x20\x01(\x0cR\x03tag\")\n\
|
\x20\x02(\x0cR\x06secret\"\x20\n\x0cThpQrCodeTag\x12\x10\n\x03tag\x18\
|
||||||
\x0fThpQrCodeSecret\x12\x16\n\x06secret\x18\x01\x20\x01(\x0cR\x06secret\
|
\x01\x20\x02(\x0cR\x03tag\")\n\x0fThpQrCodeSecret\x12\x16\n\x06secret\
|
||||||
\"!\n\rThpNfcTagHost\x12\x10\n\x03tag\x18\x01\x20\x01(\x0cR\x03tag\"#\n\
|
\x18\x01\x20\x02(\x0cR\x06secret\"!\n\rThpNfcTagHost\x12\x10\n\x03tag\
|
||||||
\x0fThpNfcTagTrezor\x12\x10\n\x03tag\x18\x01\x20\x01(\x0cR\x03tag\"\x86\
|
\x18\x01\x20\x02(\x0cR\x03tag\"#\n\x0fThpNfcTagTrezor\x12\x10\n\x03tag\
|
||||||
\x01\n\x14ThpCredentialRequest\x12,\n\x12host_static_pubkey\x18\x01\x20\
|
\x18\x01\x20\x02(\x0cR\x03tag\"\x8d\x01\n\x14ThpCredentialRequest\x12,\n\
|
||||||
\x01(\x0cR\x10hostStaticPubkey\x12\x20\n\x0bautoconnect\x18\x02\x20\x01(\
|
\x12host_static_pubkey\x18\x01\x20\x02(\x0cR\x10hostStaticPubkey\x12'\n\
|
||||||
\x08R\x0bautoconnect\x12\x1e\n\ncredential\x18\x03\x20\x01(\x0cR\ncreden\
|
\x0bautoconnect\x18\x02\x20\x01(\x08:\x05falseR\x0bautoconnect\x12\x1e\n\
|
||||||
tial\"i\n\x15ThpCredentialResponse\x120\n\x14trezor_static_pubkey\x18\
|
\ncredential\x18\x03\x20\x01(\x0cR\ncredential\"i\n\x15ThpCredentialResp\
|
||||||
\x01\x20\x01(\x0cR\x12trezorStaticPubkey\x12\x1e\n\ncredential\x18\x02\
|
onse\x120\n\x14trezor_static_pubkey\x18\x01\x20\x02(\x0cR\x12trezorStati\
|
||||||
\x20\x01(\x0cR\ncredential\"\x0f\n\rThpEndRequest\"\x10\n\x0eThpEndRespo\
|
cPubkey\x12\x1e\n\ncredential\x18\x02\x20\x02(\x0cR\ncredential\"\x0f\n\
|
||||||
nse\"\\\n\x15ThpCredentialMetadata\x12\x1b\n\thost_name\x18\x01\x20\x01(\
|
\rThpEndRequest\"\x10\n\x0eThpEndResponse\"\\\n\x15ThpCredentialMetadata\
|
||||||
\tR\x08hostName\x12\x20\n\x0bautoconnect\x18\x02\x20\x01(\x08R\x0bautoco\
|
\x12\x1b\n\thost_name\x18\x01\x20\x01(\tR\x08hostName\x12\x20\n\x0bautoc\
|
||||||
nnect:\x04\x98\xb2\x19\x01\"\x82\x01\n\x14ThpPairingCredential\x12R\n\rc\
|
onnect\x18\x02\x20\x01(\x08R\x0bautoconnect:\x04\x98\xb2\x19\x01\"\x82\
|
||||||
red_metadata\x18\x01\x20\x01(\x0b2-.hw.trezor.messages.thp.ThpCredential\
|
\x01\n\x14ThpPairingCredential\x12R\n\rcred_metadata\x18\x01\x20\x02(\
|
||||||
MetadataR\x0ccredMetadata\x12\x10\n\x03mac\x18\x02\x20\x01(\x0cR\x03mac:\
|
\x0b2-.hw.trezor.messages.thp.ThpCredentialMetadataR\x0ccredMetadata\x12\
|
||||||
\x04\x98\xb2\x19\x01\"\xa8\x01\n\x1eThpAuthenticatedCredentialData\x12,\
|
\x10\n\x03mac\x18\x02\x20\x02(\x0cR\x03mac:\x04\x98\xb2\x19\x01\"\xa8\
|
||||||
\n\x12host_static_pubkey\x18\x01\x20\x01(\x0cR\x10hostStaticPubkey\x12R\
|
\x01\n\x1eThpAuthenticatedCredentialData\x12,\n\x12host_static_pubkey\
|
||||||
\n\rcred_metadata\x18\x02\x20\x01(\x0b2-.hw.trezor.messages.thp.ThpCrede\
|
\x18\x01\x20\x02(\x0cR\x10hostStaticPubkey\x12R\n\rcred_metadata\x18\x02\
|
||||||
ntialMetadataR\x0ccredMetadata:\x04\x98\xb2\x19\x01*G\n\x10ThpPairingMet\
|
\x20\x02(\x0b2-.hw.trezor.messages.thp.ThpCredentialMetadataR\x0ccredMet\
|
||||||
hod\x12\x0f\n\x0bSkipPairing\x10\x01\x12\r\n\tCodeEntry\x10\x02\x12\n\n\
|
adata:\x04\x98\xb2\x19\x01*G\n\x10ThpPairingMethod\x12\x0f\n\x0bSkipPair\
|
||||||
\x06QrCode\x10\x03\x12\x07\n\x03NFC\x10\x04B;\n#com.satoshilabs.trezor.l\
|
ing\x10\x01\x12\r\n\tCodeEntry\x10\x02\x12\n\n\x06QrCode\x10\x03\x12\x07\
|
||||||
ib.protobufB\x10TrezorMessageThp\x80\xa6\x1d\x01\
|
\n\x03NFC\x10\x04B;\n#com.satoshilabs.trezor.lib.protobufB\x10TrezorMess\
|
||||||
|
ageThp\x80\xa6\x1d\x01\
|
||||||
";
|
";
|
||||||
|
|
||||||
/// `FileDescriptorProto` object which was a source for this generated file
|
/// `FileDescriptorProto` object which was a source for this generated file
|
||||||
|
Loading…
Reference in New Issue
Block a user