mirror of
https://github.com/trezor/trezor-firmware.git
synced 2024-11-18 05:28:40 +00:00
1a0b590914
WIP - typing the trezorctl apps typing functions trezorlib/cli addressing most of mypy issue for trezorlib apps and _internal folder fixing broken device tests by changing asserts in debuglink.py addressing most of mypy issues in trezorlib/cli folder adding types to some untyped functions, mypy section in setup.cfg typing what can be typed, some mypy fixes, resolving circular import issues importing type objects in "if TYPE_CHECKING:" branch fixing CI by removing assert in emulator, better ignore comments CI assert fix, style fixes, new config options fixup! CI assert fix, style fixes, new config options type fixes after rebasing on master fixing python3.6 and 3.7 unittests by importing Literal from typing_extensions couple mypy and style fixes fixes and improvements from code review silencing all but one mypy issues trial of typing the tools.expect function fixup! trial of typing the tools.expect function @expect and @session decorators correctly type-checked Optional args in CLI where relevant, not using general list/tuple/dict where possible python/Makefile commands, adding them into CI, ignoring last mypy issue documenting overload for expect decorator, two mypy fixes coming from that black style fix improved typing of decorators, pyright config file addressing or ignoring pyright errors, replacing mypy in CI by pyright fixing incomplete assert causing device tests to fail pyright issue that showed in CI but not locally, printing pyright version in CI fixup! pyright issue that showed in CI but not locally, printing pyright version in CI unifying type:ignore statements for pyright usage resolving PIL.Image issues, pyrightconfig not excluding anything replacing couple asserts with TypeGuard on safe_issubclass better error handling of usb1 import for webusb better error handling of hid import small typing details found out by strict pyright mode improvements from code review chore(python): changing List to Sequence for protobuf messages small code changes to reflect the protobuf change to Sequence importing TypedDict from typing_extensions to support 3.6 and 3.7 simplify _format_access_list function fixup! simplify _format_access_list function typing tools folder typing helper-scripts folder some click typing enforcing all functions to have typed arguments reverting the changed argument name in tools replacing TransportType with Transport making PinMatrixRequest.type protobuf attribute required reverting the protobuf change, making argument into get_pin Optional small fixes in asserts solving the session decorator type issues fixup! solving the session decorator type issues improvements from code review fixing new pyright errors introduced after version increase changing -> Iterable to -> Sequence in enumerate_devices, change in wait_for_devices style change in debuglink.py chore(python): adding type annotation to Sequences in messages.py better "self and cls" types on Transport fixup! better "self and cls" types on Transport fixing some easy things from strict pyright run
143 lines
3.8 KiB
Python
Executable File
143 lines
3.8 KiB
Python
Executable File
#!/usr/bin/env python3
|
|
"""
|
|
Use Trezor as a hardware key for opening EncFS filesystem!
|
|
|
|
Usage:
|
|
|
|
encfs --standard --extpass=./encfs_aes_getpass.py ~/.crypt ~/crypt
|
|
"""
|
|
|
|
import hashlib
|
|
import json
|
|
import os
|
|
import sys
|
|
from typing import TYPE_CHECKING, Sequence
|
|
|
|
import trezorlib
|
|
import trezorlib.misc
|
|
from trezorlib.client import TrezorClient
|
|
from trezorlib.tools import Address
|
|
from trezorlib.transport import enumerate_devices
|
|
from trezorlib.ui import ClickUI
|
|
|
|
version_tuple = tuple(map(int, trezorlib.__version__.split(".")))
|
|
if not (0, 11) <= version_tuple < (0, 12):
|
|
raise RuntimeError("trezorlib version mismatch (0.11.x is required)")
|
|
|
|
|
|
if TYPE_CHECKING:
|
|
from trezorlib.transport import Transport
|
|
|
|
|
|
def wait_for_devices() -> Sequence["Transport"]:
|
|
devices = enumerate_devices()
|
|
while not len(devices):
|
|
sys.stderr.write("Please connect Trezor to computer and press Enter...")
|
|
input()
|
|
devices = enumerate_devices()
|
|
|
|
return devices
|
|
|
|
|
|
def choose_device(devices: Sequence["Transport"]) -> "Transport":
|
|
if not len(devices):
|
|
raise RuntimeError("No Trezor connected!")
|
|
|
|
if len(devices) == 1:
|
|
try:
|
|
return devices[0]
|
|
except IOError:
|
|
raise RuntimeError("Device is currently in use")
|
|
|
|
i = 0
|
|
sys.stderr.write("----------------------------\n")
|
|
sys.stderr.write("Available devices:\n")
|
|
for d in devices:
|
|
try:
|
|
client = TrezorClient(d, ui=ClickUI())
|
|
except IOError:
|
|
sys.stderr.write("[-] <device is currently in use>\n")
|
|
continue
|
|
|
|
if client.features.label:
|
|
sys.stderr.write(f"[{i}] {client.features.label}\n")
|
|
else:
|
|
sys.stderr.write(f"[{i}] <no label>\n")
|
|
client.close()
|
|
i += 1
|
|
|
|
sys.stderr.write("----------------------------\n")
|
|
sys.stderr.write("Please choose device to use:")
|
|
|
|
try:
|
|
device_id = int(input())
|
|
return devices[device_id]
|
|
except Exception:
|
|
raise ValueError("Invalid choice, exiting...")
|
|
|
|
|
|
def main() -> None:
|
|
|
|
if "encfs_root" not in os.environ:
|
|
sys.stderr.write(
|
|
"\nThis is not a standalone script and is not meant to be run independently.\n"
|
|
)
|
|
sys.stderr.write(
|
|
"\nUsage: encfs --standard --extpass=./encfs_aes_getpass.py ~/.crypt ~/crypt\n"
|
|
)
|
|
sys.exit(1)
|
|
|
|
devices = wait_for_devices()
|
|
transport = choose_device(devices)
|
|
client = TrezorClient(transport, ui=ClickUI())
|
|
|
|
rootdir = os.environ["encfs_root"] # Read "man encfs" for more
|
|
passw_file = os.path.join(rootdir, "password.dat")
|
|
|
|
if not os.path.exists(passw_file):
|
|
# New encfs drive, let's generate password
|
|
|
|
sys.stderr.write("Please provide label for new drive: ")
|
|
label = input()
|
|
|
|
sys.stderr.write("Computer asked Trezor for new strong password.\n")
|
|
|
|
# 32 bytes, good for AES
|
|
trezor_entropy = trezorlib.misc.get_entropy(client, 32)
|
|
urandom_entropy = os.urandom(32)
|
|
passw = hashlib.sha256(trezor_entropy + urandom_entropy).digest()
|
|
|
|
if len(passw) != 32:
|
|
raise ValueError("32 bytes password expected")
|
|
|
|
bip32_path = Address([10, 0])
|
|
passw_encrypted = trezorlib.misc.encrypt_keyvalue(
|
|
client, bip32_path, label, passw, False, True
|
|
)
|
|
|
|
data = {
|
|
"label": label,
|
|
"bip32_path": bip32_path,
|
|
"password_encrypted_hex": passw_encrypted.hex(),
|
|
}
|
|
|
|
json.dump(data, open(passw_file, "w"))
|
|
|
|
# Let's load password
|
|
data = json.load(open(passw_file, "r"))
|
|
|
|
passw = trezorlib.misc.decrypt_keyvalue(
|
|
client,
|
|
data["bip32_path"],
|
|
data["label"],
|
|
bytes.fromhex(data["password_encrypted_hex"]),
|
|
False,
|
|
True,
|
|
)
|
|
|
|
print(passw)
|
|
|
|
|
|
if __name__ == "__main__":
|
|
main()
|