You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
trezor-firmware/bitkeylib/client.py

163 lines
6.1 KiB

import os
import bitkey_pb2 as proto
import random
def show_message(message):
print "MESSAGE FROM DEVICE:", message
def show_input(input_text, message=None):
if message:
print "QUESTION FROM DEVICE:", message
return raw_input(input_text)
class BitkeyClient(object):
def __init__(self, transport, debuglink=None,
algo=proto.BIP32,
message_func=show_message, input_func=show_input, debug=False):
self.transport = transport
self.debuglink = debuglink
self.algo = algo
self.message_func = message_func
self.input_func = input_func
self.debug = debug
self.setup_debuglink()
self.init_device()
def init_device(self):
self.master_public_key = None
self.session_id = ''.join([ chr(random.randrange(0, 255, 1)) for _ in xrange(0, 16) ])
self.features = self.call(proto.Initialize(session_id=self.session_id))
self.UUID = self.call(proto.GetUUID())
def get_master_public_key(self):
if self.master_public_key:
return self.master_public_key
self.master_public_key = self.call(proto.GetMasterPublicKey(algo=self.algo))
return self.master_public_key
def get_entropy(self, size):
return self.call(proto.GetEntropy(size=size)).entropy
def _pprint(self, msg):
return "<%s>:\n%s" % (msg.__class__.__name__, msg)
def setup_debuglink(self, pin_correct=False, otp_correct=False):
self.debug_pin = pin_correct
self.debug_otp = otp_correct
def call(self, msg, button=None, tries=1):
if self.debug:
print '----------------------'
print "Sending", self._pprint(msg)
self.transport.write(msg)
if self.debuglink and button != None:
self.debuglink.press_button(button)
resp = self.transport.read()
if isinstance(resp, proto.OtpRequest):
if self.debuglink:
otp = self.debuglink.read_otp()
if self.debug_otp:
self.transport.write(otp)
else:
self.transport.write(proto.OtpAck(otp='__42__'))
else:
otp = self.input_func("OTP required: ", resp.message)
self.transport.write(proto.OtpAck(otp=otp))
resp = self.transport.read()
if isinstance(resp, proto.PinRequest):
if self.debuglink:
pin = self.debuglink.read_pin()
if self.debug_pin:
self.transport.write(pin)
else:
self.transport.write(proto.PinAck(pin='__42__'))
else:
pin = self.input_func("PIN required: ", resp.message)
self.transport.write(proto.PinAck(pin=pin))
resp = self.transport.read()
if isinstance(resp, proto.Failure):
self.message_func(resp.message)
if resp.code == 3:
if tries <= 1:
raise Exception("OTP is invalid, too many retries")
self.message_func("OTP is invalid, let's try again...")
elif resp.code == 4:
raise Exception("Action cancelled by user")
elif resp.code == 6:
if tries <= 1:
raise Exception("PIN is invalid, too many retries")
self.message_func("PIN is invalid, let's try again...")
return self.call(msg, button, tries-1)
if isinstance(resp, proto.Failure):
raise Exception(resp.code, resp.message)
if self.debug:
print "Received", self._pprint(resp)
return resp
def get_uuid(self):
return self.call(proto.GetUUID())
def sign_tx(self, inputs, outputs):
'''
inputs: list of TxInput
outputs: list of TxOutput
'''
tx = proto.SignTx()
tx.algo = self.algo # Choose BIP32 or ELECTRUM way for deterministic keys
tx.random = os.urandom(256) # Provide additional entropy to the device
tx.outputs.extend(outputs)
return self.call(tx)
#print "PBDATA", tx.SerializeToString().encode('hex')
#################
#################
#################
'''
signatures = [('add550d6ba9ab7e01d37e17658f98b6e901208d241f24b08197b5e20dfa7f29f095ae01acbfa5c4281704a64053dcb80e9b089ecbe09f5871d67725803e36edd', '3045022100dced96eeb43836bc95676879eac303eabf39802e513f4379a517475c259da12502201fd36c90ecd91a32b2ca8fed2e1755a7f2a89c2d520eb0da10147802bc7ca217')]
s_inputs = []
for i in range(len(inputs)):
addr, v, p_hash, p_pos, p_scriptPubKey, _, _ = inputs[i]
pubkey = signatures[i][0].decode('hex')
sig = signatures[i][1].decode('hex')
s_inputs.append((addr, v, p_hash, p_pos, p_scriptPubKey, pubkey, sig))
return s_inputs
s_inputs = []
for i in range(len(inputs)):
addr, v, p_hash, p_pos, p_scriptPubKey, _, _ = inputs[i]
private_key = ecdsa.SigningKey.from_string( self.get_private_key(addr, password), curve = SECP256k1 )
public_key = private_key.get_verifying_key()
pubkey = public_key.to_string()
tx = filter( raw_tx( inputs, outputs, for_sig = i ) )
sig = private_key.sign_digest( Hash( tx.decode('hex') ), sigencode = ecdsa.util.sigencode_der )
assert public_key.verify_digest( sig, Hash( tx.decode('hex') ), sigdecode = ecdsa.util.sigdecode_der)
s_inputs.append( (addr, v, p_hash, p_pos, p_scriptPubKey, pubkey, sig) )
return s_inputs
'''
def load_device(self, seed, otp, pin, spv, button=None):
self.call(proto.LoadDevice(seed=seed, otp=otp, pin=pin, spv=spv), button=button)
self.init_device()