mirror of
https://github.com/trezor/trezor-firmware.git
synced 2025-07-01 20:32:35 +00:00
91 lines
3.0 KiB
Python
91 lines
3.0 KiB
Python
from storage import cache, device
|
|
from trezor import wire
|
|
from trezor.crypto import bip32
|
|
|
|
from apps.common import mnemonic
|
|
from apps.common.passphrase import get as get_passphrase
|
|
from apps.common.seed import get_seed
|
|
|
|
from .helpers import seed_namespaces
|
|
|
|
if False:
|
|
from apps.common.paths import Bip32Path
|
|
from apps.common.keychain import MsgIn, MsgOut, Handler, HandlerWithKeychain
|
|
|
|
|
|
class Keychain:
|
|
"""Cardano keychain hard-coded to Byron and Shelley seed namespaces."""
|
|
|
|
def __init__(self, root: bip32.HDNode) -> None:
|
|
self.byron_root = derive_path_cardano(root, seed_namespaces.BYRON)
|
|
self.shelley_root = derive_path_cardano(root, seed_namespaces.SHELLEY)
|
|
root.__del__()
|
|
|
|
def verify_path(self, path: Bip32Path) -> None:
|
|
if not is_byron_path(path) and not is_shelley_path(path):
|
|
raise wire.DataError("Forbidden key path")
|
|
|
|
def _get_path_root(self, path: list):
|
|
if is_byron_path(path):
|
|
return self.byron_root
|
|
elif is_shelley_path(path):
|
|
return self.shelley_root
|
|
else:
|
|
raise wire.DataError("Forbidden key path")
|
|
|
|
def derive(self, node_path: Bip32Path) -> bip32.HDNode:
|
|
self.verify_path(node_path)
|
|
path_root = self._get_path_root(node_path)
|
|
|
|
# this is true now, so for simplicity we don't branch on path type
|
|
assert len(seed_namespaces.BYRON) == len(seed_namespaces.SHELLEY)
|
|
suffix = node_path[len(seed_namespaces.SHELLEY) :]
|
|
|
|
# derive child node from the root
|
|
return derive_path_cardano(path_root, suffix)
|
|
|
|
# XXX the root node remains in session cache so we should not delete it
|
|
# def __del__(self) -> None:
|
|
# self.root.__del__()
|
|
|
|
|
|
def is_byron_path(path: Bip32Path):
|
|
return path[: len(seed_namespaces.BYRON)] == seed_namespaces.BYRON
|
|
|
|
|
|
def is_shelley_path(path: Bip32Path):
|
|
return path[: len(seed_namespaces.SHELLEY)] == seed_namespaces.SHELLEY
|
|
|
|
|
|
def derive_path_cardano(root: bip32.HDNode, path: Bip32Path) -> bip32.HDNode:
|
|
node = root.clone()
|
|
for i in path:
|
|
node.derive_cardano(i)
|
|
return node
|
|
|
|
|
|
@cache.stored_async(cache.APP_CARDANO_ROOT)
|
|
async def get_keychain(ctx: wire.Context) -> Keychain:
|
|
if not device.is_initialized():
|
|
raise wire.NotInitialized("Device is not initialized")
|
|
|
|
if mnemonic.is_bip39():
|
|
passphrase = await get_passphrase(ctx)
|
|
# derive the root node from mnemonic and passphrase via Cardano Icarus algorithm
|
|
root = bip32.from_mnemonic_cardano(mnemonic.get_secret().decode(), passphrase)
|
|
else:
|
|
# derive the root node via SLIP-0023
|
|
seed = await get_seed(ctx)
|
|
root = bip32.from_seed(seed, "ed25519 cardano seed")
|
|
|
|
keychain = Keychain(root)
|
|
return keychain
|
|
|
|
|
|
def with_keychain(func: HandlerWithKeychain[MsgIn, MsgOut]) -> Handler[MsgIn, MsgOut]:
|
|
async def wrapper(ctx: wire.Context, msg: MsgIn) -> MsgOut:
|
|
keychain = await get_keychain(ctx)
|
|
return await func(ctx, msg, keychain)
|
|
|
|
return wrapper
|