You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
218 lines
7.3 KiB
218 lines
7.3 KiB
/*
|
|
* This file is part of the Trezor project, https://trezor.io/
|
|
*
|
|
* Copyright (c) SatoshiLabs
|
|
*
|
|
* This program is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#if !BITCOIN_ONLY
|
|
|
|
#include "py/objstr.h"
|
|
|
|
#include "embed/extmod/trezorobj.h"
|
|
#include "hdnode.h"
|
|
|
|
#include "bip39.h"
|
|
#include "cardano.h"
|
|
#include "curves.h"
|
|
#include "memzero.h"
|
|
|
|
/// package: trezorcrypto.cardano
|
|
/// from trezorcrypto.bip32 import HDNode
|
|
|
|
/// def derive_icarus(
|
|
/// mnemonic: str,
|
|
/// passphrase: str,
|
|
/// trezor_derivation: bool,
|
|
/// callback: Callable[[int, int], None] | None = None,
|
|
/// ) -> bytes:
|
|
/// """
|
|
/// Derives a Cardano master secret from a mnemonic and passphrase using the
|
|
/// Icarus derivation scheme.
|
|
/// If `trezor_derivation` is True, the Icarus-Trezor variant is used (see
|
|
/// CIP-3).
|
|
/// """
|
|
STATIC mp_obj_t mod_trezorcrypto_cardano_derive_icarus(size_t n_args,
|
|
const mp_obj_t *args) {
|
|
mp_buffer_info_t mnemo = {0}, phrase = {0};
|
|
mp_get_buffer_raise(args[0], &mnemo, MP_BUFFER_READ);
|
|
mp_get_buffer_raise(args[1], &phrase, MP_BUFFER_READ);
|
|
const char *pmnemonic = mnemo.len > 0 ? mnemo.buf : "";
|
|
const char *ppassphrase = phrase.len > 0 ? phrase.buf : "";
|
|
|
|
bool trezor_derivation = mp_obj_is_true(args[2]);
|
|
|
|
uint8_t mnemonic_bits[64] = {0};
|
|
int mnemonic_bits_len = mnemonic_to_bits(pmnemonic, mnemonic_bits);
|
|
if (mnemonic_bits_len == 0 || mnemonic_bits_len % 33 != 0) {
|
|
mp_raise_ValueError("Invalid mnemonic");
|
|
}
|
|
|
|
vstr_t vstr = {0};
|
|
vstr_init_len(&vstr, CARDANO_SECRET_LENGTH);
|
|
|
|
void (*callback)(uint32_t current, uint32_t total) = NULL;
|
|
if (n_args > 3) {
|
|
// generate with a progress callback
|
|
ui_wait_callback = args[3];
|
|
callback = wrapped_ui_wait_callback;
|
|
}
|
|
|
|
int entropy_len = mnemonic_bits_len - mnemonic_bits_len / 33;
|
|
int mnemonic_bytes_used = 0;
|
|
if (!trezor_derivation) {
|
|
// Exclude checksum (original Icarus spec)
|
|
mnemonic_bytes_used = entropy_len / 8;
|
|
} else {
|
|
// Include checksum if it is a full byte (Trezor bug)
|
|
// see also https://github.com/trezor/trezor-firmware/issues/1387 and CIP-3
|
|
mnemonic_bytes_used = mnemonic_bits_len / 8;
|
|
}
|
|
const int res = secret_from_entropy_cardano_icarus(
|
|
(const uint8_t *)ppassphrase, phrase.len, mnemonic_bits,
|
|
mnemonic_bytes_used, (uint8_t *)vstr.buf, callback);
|
|
|
|
ui_wait_callback = mp_const_none;
|
|
|
|
if (res != 1) {
|
|
mp_raise_msg(&mp_type_RuntimeError,
|
|
"Unexpected failure in Icarus derivation.");
|
|
}
|
|
|
|
return mp_obj_new_str_from_vstr(&mp_type_bytes, &vstr);
|
|
}
|
|
|
|
STATIC MP_DEFINE_CONST_FUN_OBJ_VAR_BETWEEN(
|
|
mod_trezorcrypto_cardano_derive_icarus_obj, 3, 4,
|
|
mod_trezorcrypto_cardano_derive_icarus);
|
|
|
|
/// def from_secret(secret: bytes) -> HDNode:
|
|
/// """
|
|
/// Creates a Cardano HD node from a master secret.
|
|
/// """
|
|
STATIC mp_obj_t mod_trezorcrypto_from_secret(mp_obj_t secret) {
|
|
mp_buffer_info_t bufinfo;
|
|
mp_get_buffer_raise(secret, &bufinfo, MP_BUFFER_READ);
|
|
if (bufinfo.len != CARDANO_SECRET_LENGTH) {
|
|
mp_raise_ValueError("Invalid secret length");
|
|
}
|
|
|
|
mp_obj_HDNode_t *o = m_new_obj_with_finaliser(mp_obj_HDNode_t);
|
|
o->base.type = &mod_trezorcrypto_HDNode_type;
|
|
const int res = hdnode_from_secret_cardano(bufinfo.buf, &o->hdnode);
|
|
if (res != 1) {
|
|
mp_raise_msg(&mp_type_RuntimeError,
|
|
"Unexpected failure in constructing Cardano node.");
|
|
}
|
|
o->fingerprint = hdnode_fingerprint(&o->hdnode);
|
|
return MP_OBJ_FROM_PTR(o);
|
|
}
|
|
|
|
STATIC MP_DEFINE_CONST_FUN_OBJ_1(mod_trezorcrypto_from_secret_obj,
|
|
mod_trezorcrypto_from_secret);
|
|
|
|
/// def from_seed_slip23(seed: bytes) -> HDNode:
|
|
/// """
|
|
/// Creates a Cardano HD node from a seed via SLIP-23 derivation.
|
|
/// """
|
|
STATIC mp_obj_t mod_trezorcrypto_from_seed_slip23(mp_obj_t seed) {
|
|
mp_buffer_info_t bufinfo;
|
|
mp_get_buffer_raise(seed, &bufinfo, MP_BUFFER_READ);
|
|
if (bufinfo.len == 0) {
|
|
mp_raise_ValueError("Invalid seed");
|
|
}
|
|
|
|
uint8_t secret[CARDANO_SECRET_LENGTH] = {0};
|
|
HDNode hdnode = {0};
|
|
int res = 0;
|
|
|
|
res = secret_from_seed_cardano_slip23(bufinfo.buf, bufinfo.len, secret);
|
|
if (res != 1) {
|
|
mp_raise_msg(&mp_type_RuntimeError,
|
|
"Unexpected failure in SLIP-23 derivation.");
|
|
}
|
|
res = hdnode_from_secret_cardano(secret, &hdnode);
|
|
if (res != 1) {
|
|
mp_raise_msg(&mp_type_RuntimeError,
|
|
"Unexpected failure in constructing Cardano node.");
|
|
}
|
|
|
|
mp_obj_HDNode_t *o = m_new_obj_with_finaliser(mp_obj_HDNode_t);
|
|
o->base.type = &mod_trezorcrypto_HDNode_type;
|
|
o->hdnode = hdnode;
|
|
o->fingerprint = hdnode_fingerprint(&o->hdnode);
|
|
return MP_OBJ_FROM_PTR(o);
|
|
}
|
|
|
|
STATIC MP_DEFINE_CONST_FUN_OBJ_1(mod_trezorcrypto_from_seed_slip23_obj,
|
|
mod_trezorcrypto_from_seed_slip23);
|
|
|
|
/// def from_seed_ledger(seed: bytes) -> HDNode:
|
|
/// """
|
|
/// Creates a Cardano HD node from a seed via Ledger derivation.
|
|
/// """
|
|
STATIC mp_obj_t mod_trezorcrypto_from_seed_ledger(mp_obj_t seed) {
|
|
mp_buffer_info_t bufinfo;
|
|
mp_get_buffer_raise(seed, &bufinfo, MP_BUFFER_READ);
|
|
if (bufinfo.len == 0) {
|
|
mp_raise_ValueError("Invalid seed");
|
|
}
|
|
|
|
uint8_t secret[CARDANO_SECRET_LENGTH] = {0};
|
|
HDNode hdnode = {0};
|
|
int res = 0;
|
|
|
|
res = secret_from_seed_cardano_ledger(bufinfo.buf, bufinfo.len, secret);
|
|
if (res != 1) {
|
|
mp_raise_msg(&mp_type_RuntimeError,
|
|
"Unexpected failure in Ledger derivation.");
|
|
}
|
|
res = hdnode_from_secret_cardano(secret, &hdnode);
|
|
if (res != 1) {
|
|
mp_raise_msg(&mp_type_RuntimeError,
|
|
"Unexpected failure in constructing Cardano node.");
|
|
}
|
|
|
|
mp_obj_HDNode_t *o = m_new_obj_with_finaliser(mp_obj_HDNode_t);
|
|
o->base.type = &mod_trezorcrypto_HDNode_type;
|
|
o->hdnode = hdnode;
|
|
o->fingerprint = hdnode_fingerprint(&o->hdnode);
|
|
return MP_OBJ_FROM_PTR(o);
|
|
}
|
|
|
|
STATIC MP_DEFINE_CONST_FUN_OBJ_1(mod_trezorcrypto_from_seed_ledger_obj,
|
|
mod_trezorcrypto_from_seed_ledger);
|
|
|
|
STATIC const mp_rom_map_elem_t mod_trezorcrypto_cardano_globals_table[] = {
|
|
{MP_ROM_QSTR(MP_QSTR___name__), MP_ROM_QSTR(MP_QSTR_cardano)},
|
|
{MP_ROM_QSTR(MP_QSTR_derive_icarus),
|
|
MP_ROM_PTR(&mod_trezorcrypto_cardano_derive_icarus_obj)},
|
|
{MP_ROM_QSTR(MP_QSTR_from_secret),
|
|
MP_ROM_PTR(&mod_trezorcrypto_from_secret_obj)},
|
|
{MP_ROM_QSTR(MP_QSTR_from_seed_slip23),
|
|
MP_ROM_PTR(&mod_trezorcrypto_from_seed_slip23_obj)},
|
|
{MP_ROM_QSTR(MP_QSTR_from_seed_ledger),
|
|
MP_ROM_PTR(&mod_trezorcrypto_from_seed_ledger_obj)},
|
|
};
|
|
STATIC MP_DEFINE_CONST_DICT(mod_trezorcrypto_cardano_globals,
|
|
mod_trezorcrypto_cardano_globals_table);
|
|
|
|
STATIC const mp_obj_module_t mod_trezorcrypto_cardano_module = {
|
|
.base = {&mp_type_module},
|
|
.globals = (mp_obj_dict_t *)&mod_trezorcrypto_cardano_globals,
|
|
};
|
|
|
|
#endif // !BITCOIN_ONLY
|