# This file is part of the Trezor project. # # Copyright (C) 2012-2022 SatoshiLabs and contributors # # This library is free software: you can redistribute it and/or modify # it under the terms of the GNU Lesser General Public License version 3 # as published by the Free Software Foundation. # # This library is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU Lesser General Public License for more details. # # You should have received a copy of the License along with this library. # If not, see . from typing import TYPE_CHECKING, Optional from . import messages from .tools import expect if TYPE_CHECKING: from .protobuf import MessageType from .tools import Address from .transport.session import Session @expect(messages.Entropy, field="entropy", ret_type=bytes) def get_entropy(session: "Session", size: int) -> "MessageType": return session.call(messages.GetEntropy(size=size)) @expect(messages.SignedIdentity) def sign_identity( session: "Session", identity: messages.IdentityType, challenge_hidden: bytes, challenge_visual: str, ecdsa_curve_name: Optional[str] = None, ) -> "MessageType": return session.call( messages.SignIdentity( identity=identity, challenge_hidden=challenge_hidden, challenge_visual=challenge_visual, ecdsa_curve_name=ecdsa_curve_name, ) ) @expect(messages.ECDHSessionKey) def get_ecdh_session_key( session: "Session", identity: messages.IdentityType, peer_public_key: bytes, ecdsa_curve_name: Optional[str] = None, ) -> "MessageType": return session.call( messages.GetECDHSessionKey( identity=identity, peer_public_key=peer_public_key, ecdsa_curve_name=ecdsa_curve_name, ) ) @expect(messages.CipheredKeyValue, field="value", ret_type=bytes) def encrypt_keyvalue( session: "Session", n: "Address", key: str, value: bytes, ask_on_encrypt: bool = True, ask_on_decrypt: bool = True, iv: bytes = b"", ) -> "MessageType": return session.call( messages.CipherKeyValue( address_n=n, key=key, value=value, encrypt=True, ask_on_encrypt=ask_on_encrypt, ask_on_decrypt=ask_on_decrypt, iv=iv, ) ) @expect(messages.CipheredKeyValue, field="value", ret_type=bytes) def decrypt_keyvalue( session: "Session", n: "Address", key: str, value: bytes, ask_on_encrypt: bool = True, ask_on_decrypt: bool = True, iv: bytes = b"", ) -> "MessageType": return session.call( messages.CipherKeyValue( address_n=n, key=key, value=value, encrypt=False, ask_on_encrypt=ask_on_encrypt, ask_on_decrypt=ask_on_decrypt, iv=iv, ) ) @expect(messages.Nonce, field="nonce", ret_type=bytes) def get_nonce(session: "Session"): return session.call(messages.GetNonce())