tiagotrs
6 years ago
53 changed files with 1881 additions and 309 deletions
@ -0,0 +1,8 @@ |
|||||
|
from electrum.i18n import _ |
||||
|
|
||||
|
fullname = 'Safe-T mini Wallet' |
||||
|
description = _('Provides support for Safe-T mini hardware wallet') |
||||
|
requires = [('safetlib','github.com/archos-safe-t/python-safet')] |
||||
|
registers_keystore = ('hardware', 'safe_t', _("Safe-T mini wallet")) |
||||
|
available_for = ['qt', 'cmdline'] |
||||
|
|
@ -0,0 +1,11 @@ |
|||||
|
from safetlib.client import proto, BaseClient, ProtocolMixin |
||||
|
from .clientbase import SafeTClientBase |
||||
|
|
||||
|
class SafeTClient(SafeTClientBase, ProtocolMixin, BaseClient): |
||||
|
def __init__(self, transport, handler, plugin): |
||||
|
BaseClient.__init__(self, transport=transport) |
||||
|
ProtocolMixin.__init__(self, transport=transport) |
||||
|
SafeTClientBase.__init__(self, handler, plugin, proto) |
||||
|
|
||||
|
|
||||
|
SafeTClientBase.wrap_methods(SafeTClient) |
@ -0,0 +1,252 @@ |
|||||
|
import time |
||||
|
from struct import pack |
||||
|
|
||||
|
from electrum.i18n import _ |
||||
|
from electrum.util import PrintError, UserCancelled |
||||
|
from electrum.keystore import bip39_normalize_passphrase |
||||
|
from electrum.bitcoin import serialize_xpub |
||||
|
|
||||
|
|
||||
|
class GuiMixin(object): |
||||
|
# Requires: self.proto, self.device |
||||
|
|
||||
|
# ref: https://github.com/trezor/trezor-common/blob/44dfb07cfaafffada4b2ce0d15ba1d90d17cf35e/protob/types.proto#L89 |
||||
|
messages = { |
||||
|
3: _("Confirm the transaction output on your {} device"), |
||||
|
4: _("Confirm internal entropy on your {} device to begin"), |
||||
|
5: _("Write down the seed word shown on your {}"), |
||||
|
6: _("Confirm on your {} that you want to wipe it clean"), |
||||
|
7: _("Confirm on your {} device the message to sign"), |
||||
|
8: _("Confirm the total amount spent and the transaction fee on your " |
||||
|
"{} device"), |
||||
|
10: _("Confirm wallet address on your {} device"), |
||||
|
14: _("Choose on your {} device where to enter your passphrase"), |
||||
|
'default': _("Check your {} device to continue"), |
||||
|
} |
||||
|
|
||||
|
def callback_Failure(self, msg): |
||||
|
# BaseClient's unfortunate call() implementation forces us to |
||||
|
# raise exceptions on failure in order to unwind the stack. |
||||
|
# However, making the user acknowledge they cancelled |
||||
|
# gets old very quickly, so we suppress those. The NotInitialized |
||||
|
# one is misnamed and indicates a passphrase request was cancelled. |
||||
|
if msg.code in (self.types.FailureType.PinCancelled, |
||||
|
self.types.FailureType.ActionCancelled, |
||||
|
self.types.FailureType.NotInitialized): |
||||
|
raise UserCancelled() |
||||
|
raise RuntimeError(msg.message) |
||||
|
|
||||
|
def callback_ButtonRequest(self, msg): |
||||
|
message = self.msg |
||||
|
if not message: |
||||
|
message = self.messages.get(msg.code, self.messages['default']) |
||||
|
self.handler.show_message(message.format(self.device), self.cancel) |
||||
|
return self.proto.ButtonAck() |
||||
|
|
||||
|
def callback_PinMatrixRequest(self, msg): |
||||
|
if msg.type == 2: |
||||
|
msg = _("Enter a new PIN for your {}:") |
||||
|
elif msg.type == 3: |
||||
|
msg = (_("Re-enter the new PIN for your {}.\n\n" |
||||
|
"NOTE: the positions of the numbers have changed!")) |
||||
|
else: |
||||
|
msg = _("Enter your current {} PIN:") |
||||
|
pin = self.handler.get_pin(msg.format(self.device)) |
||||
|
if len(pin) > 9: |
||||
|
self.handler.show_error(_('The PIN cannot be longer than 9 characters.')) |
||||
|
pin = '' # to cancel below |
||||
|
if not pin: |
||||
|
return self.proto.Cancel() |
||||
|
return self.proto.PinMatrixAck(pin=pin) |
||||
|
|
||||
|
def callback_PassphraseRequest(self, req): |
||||
|
if req and hasattr(req, 'on_device') and req.on_device is True: |
||||
|
return self.proto.PassphraseAck() |
||||
|
|
||||
|
if self.creating_wallet: |
||||
|
msg = _("Enter a passphrase to generate this wallet. Each time " |
||||
|
"you use this wallet your {} will prompt you for the " |
||||
|
"passphrase. If you forget the passphrase you cannot " |
||||
|
"access the bitcoins in the wallet.").format(self.device) |
||||
|
else: |
||||
|
msg = _("Enter the passphrase to unlock this wallet:") |
||||
|
passphrase = self.handler.get_passphrase(msg, self.creating_wallet) |
||||
|
if passphrase is None: |
||||
|
return self.proto.Cancel() |
||||
|
passphrase = bip39_normalize_passphrase(passphrase) |
||||
|
|
||||
|
ack = self.proto.PassphraseAck(passphrase=passphrase) |
||||
|
length = len(ack.passphrase) |
||||
|
if length > 50: |
||||
|
self.handler.show_error(_("Too long passphrase ({} > 50 chars).").format(length)) |
||||
|
return self.proto.Cancel() |
||||
|
return ack |
||||
|
|
||||
|
def callback_PassphraseStateRequest(self, msg): |
||||
|
return self.proto.PassphraseStateAck() |
||||
|
|
||||
|
def callback_WordRequest(self, msg): |
||||
|
self.step += 1 |
||||
|
msg = _("Step {}/24. Enter seed word as explained on " |
||||
|
"your {}:").format(self.step, self.device) |
||||
|
word = self.handler.get_word(msg) |
||||
|
# Unfortunately the device can't handle self.proto.Cancel() |
||||
|
return self.proto.WordAck(word=word) |
||||
|
|
||||
|
|
||||
|
class SafeTClientBase(GuiMixin, PrintError): |
||||
|
|
||||
|
def __init__(self, handler, plugin, proto): |
||||
|
assert hasattr(self, 'tx_api') # ProtocolMixin already constructed? |
||||
|
self.proto = proto |
||||
|
self.device = plugin.device |
||||
|
self.handler = handler |
||||
|
self.tx_api = plugin |
||||
|
self.types = plugin.types |
||||
|
self.msg = None |
||||
|
self.creating_wallet = False |
||||
|
self.used() |
||||
|
|
||||
|
def __str__(self): |
||||
|
return "%s/%s" % (self.label(), self.features.device_id) |
||||
|
|
||||
|
def label(self): |
||||
|
'''The name given by the user to the device.''' |
||||
|
return self.features.label |
||||
|
|
||||
|
def is_initialized(self): |
||||
|
'''True if initialized, False if wiped.''' |
||||
|
return self.features.initialized |
||||
|
|
||||
|
def is_pairable(self): |
||||
|
return not self.features.bootloader_mode |
||||
|
|
||||
|
def has_usable_connection_with_device(self): |
||||
|
try: |
||||
|
res = self.ping("electrum pinging device") |
||||
|
assert res == "electrum pinging device" |
||||
|
except BaseException: |
||||
|
return False |
||||
|
return True |
||||
|
|
||||
|
def used(self): |
||||
|
self.last_operation = time.time() |
||||
|
|
||||
|
def prevent_timeouts(self): |
||||
|
self.last_operation = float('inf') |
||||
|
|
||||
|
def timeout(self, cutoff): |
||||
|
'''Time out the client if the last operation was before cutoff.''' |
||||
|
if self.last_operation < cutoff: |
||||
|
self.print_error("timed out") |
||||
|
self.clear_session() |
||||
|
|
||||
|
@staticmethod |
||||
|
def expand_path(n): |
||||
|
'''Convert bip32 path to list of uint32 integers with prime flags |
||||
|
0/-1/1' -> [0, 0x80000001, 0x80000001]''' |
||||
|
# This code is similar to code in safetlib where it unfortunately |
||||
|
# is not declared as a staticmethod. Our n has an extra element. |
||||
|
PRIME_DERIVATION_FLAG = 0x80000000 |
||||
|
path = [] |
||||
|
for x in n.split('/')[1:]: |
||||
|
prime = 0 |
||||
|
if x.endswith("'"): |
||||
|
x = x.replace('\'', '') |
||||
|
prime = PRIME_DERIVATION_FLAG |
||||
|
if x.startswith('-'): |
||||
|
prime = PRIME_DERIVATION_FLAG |
||||
|
path.append(abs(int(x)) | prime) |
||||
|
return path |
||||
|
|
||||
|
def cancel(self): |
||||
|
'''Provided here as in keepkeylib but not safetlib.''' |
||||
|
self.transport.write(self.proto.Cancel()) |
||||
|
|
||||
|
def i4b(self, x): |
||||
|
return pack('>I', x) |
||||
|
|
||||
|
def get_xpub(self, bip32_path, xtype): |
||||
|
address_n = self.expand_path(bip32_path) |
||||
|
creating = False |
||||
|
node = self.get_public_node(address_n, creating).node |
||||
|
return serialize_xpub(xtype, node.chain_code, node.public_key, node.depth, self.i4b(node.fingerprint), self.i4b(node.child_num)) |
||||
|
|
||||
|
def toggle_passphrase(self): |
||||
|
if self.features.passphrase_protection: |
||||
|
self.msg = _("Confirm on your {} device to disable passphrases") |
||||
|
else: |
||||
|
self.msg = _("Confirm on your {} device to enable passphrases") |
||||
|
enabled = not self.features.passphrase_protection |
||||
|
self.apply_settings(use_passphrase=enabled) |
||||
|
|
||||
|
def change_label(self, label): |
||||
|
self.msg = _("Confirm the new label on your {} device") |
||||
|
self.apply_settings(label=label) |
||||
|
|
||||
|
def change_homescreen(self, homescreen): |
||||
|
self.msg = _("Confirm on your {} device to change your home screen") |
||||
|
self.apply_settings(homescreen=homescreen) |
||||
|
|
||||
|
def set_pin(self, remove): |
||||
|
if remove: |
||||
|
self.msg = _("Confirm on your {} device to disable PIN protection") |
||||
|
elif self.features.pin_protection: |
||||
|
self.msg = _("Confirm on your {} device to change your PIN") |
||||
|
else: |
||||
|
self.msg = _("Confirm on your {} device to set a PIN") |
||||
|
self.change_pin(remove) |
||||
|
|
||||
|
def clear_session(self): |
||||
|
'''Clear the session to force pin (and passphrase if enabled) |
||||
|
re-entry. Does not leak exceptions.''' |
||||
|
self.print_error("clear session:", self) |
||||
|
self.prevent_timeouts() |
||||
|
try: |
||||
|
super(SafeTClientBase, self).clear_session() |
||||
|
except BaseException as e: |
||||
|
# If the device was removed it has the same effect... |
||||
|
self.print_error("clear_session: ignoring error", str(e)) |
||||
|
|
||||
|
def get_public_node(self, address_n, creating): |
||||
|
self.creating_wallet = creating |
||||
|
return super(SafeTClientBase, self).get_public_node(address_n) |
||||
|
|
||||
|
def close(self): |
||||
|
'''Called when Our wallet was closed or the device removed.''' |
||||
|
self.print_error("closing client") |
||||
|
self.clear_session() |
||||
|
# Release the device |
||||
|
self.transport.close() |
||||
|
|
||||
|
def firmware_version(self): |
||||
|
f = self.features |
||||
|
return (f.major_version, f.minor_version, f.patch_version) |
||||
|
|
||||
|
def atleast_version(self, major, minor=0, patch=0): |
||||
|
return self.firmware_version() >= (major, minor, patch) |
||||
|
|
||||
|
@staticmethod |
||||
|
def wrapper(func): |
||||
|
'''Wrap methods to clear any message box they opened.''' |
||||
|
|
||||
|
def wrapped(self, *args, **kwargs): |
||||
|
try: |
||||
|
self.prevent_timeouts() |
||||
|
return func(self, *args, **kwargs) |
||||
|
finally: |
||||
|
self.used() |
||||
|
self.handler.finished() |
||||
|
self.creating_wallet = False |
||||
|
self.msg = None |
||||
|
|
||||
|
return wrapped |
||||
|
|
||||
|
@staticmethod |
||||
|
def wrap_methods(cls): |
||||
|
for method in ['apply_settings', 'change_pin', |
||||
|
'get_address', 'get_public_node', |
||||
|
'load_device_by_mnemonic', 'load_device_by_xprv', |
||||
|
'recovery_device', 'reset_device', 'sign_message', |
||||
|
'sign_tx', 'wipe_device']: |
||||
|
setattr(cls, method, cls.wrapper(getattr(cls, method))) |
@ -0,0 +1,14 @@ |
|||||
|
from electrum.plugin import hook |
||||
|
from .safe_t import SafeTPlugin |
||||
|
from ..hw_wallet import CmdLineHandler |
||||
|
|
||||
|
class Plugin(SafeTPlugin): |
||||
|
handler = CmdLineHandler() |
||||
|
@hook |
||||
|
def init_keystore(self, keystore): |
||||
|
if not isinstance(keystore, self.keystore_class): |
||||
|
return |
||||
|
keystore.handler = self.handler |
||||
|
|
||||
|
def create_handler(self, window): |
||||
|
return self.handler |
@ -0,0 +1,492 @@ |
|||||
|
from functools import partial |
||||
|
import threading |
||||
|
|
||||
|
from PyQt5.Qt import Qt |
||||
|
from PyQt5.Qt import QGridLayout, QInputDialog, QPushButton |
||||
|
from PyQt5.Qt import QVBoxLayout, QLabel |
||||
|
|
||||
|
from electrum.gui.qt.util import * |
||||
|
from electrum.i18n import _ |
||||
|
from electrum.plugin import hook, DeviceMgr |
||||
|
from electrum.util import PrintError, UserCancelled, bh2u |
||||
|
from electrum.wallet import Wallet, Standard_Wallet |
||||
|
|
||||
|
from ..hw_wallet.qt import QtHandlerBase, QtPluginBase |
||||
|
from .safe_t import SafeTPlugin, TIM_NEW, TIM_RECOVER, TIM_MNEMONIC |
||||
|
|
||||
|
|
||||
|
PASSPHRASE_HELP_SHORT =_( |
||||
|
"Passphrases allow you to access new wallets, each " |
||||
|
"hidden behind a particular case-sensitive passphrase.") |
||||
|
PASSPHRASE_HELP = PASSPHRASE_HELP_SHORT + " " + _( |
||||
|
"You need to create a separate Electrum wallet for each passphrase " |
||||
|
"you use as they each generate different addresses. Changing " |
||||
|
"your passphrase does not lose other wallets, each is still " |
||||
|
"accessible behind its own passphrase.") |
||||
|
RECOMMEND_PIN = _( |
||||
|
"You should enable PIN protection. Your PIN is the only protection " |
||||
|
"for your bitcoins if your device is lost or stolen.") |
||||
|
PASSPHRASE_NOT_PIN = _( |
||||
|
"If you forget a passphrase you will be unable to access any " |
||||
|
"bitcoins in the wallet behind it. A passphrase is not a PIN. " |
||||
|
"Only change this if you are sure you understand it.") |
||||
|
|
||||
|
|
||||
|
class QtHandler(QtHandlerBase): |
||||
|
|
||||
|
pin_signal = pyqtSignal(object) |
||||
|
|
||||
|
def __init__(self, win, pin_matrix_widget_class, device): |
||||
|
super(QtHandler, self).__init__(win, device) |
||||
|
self.pin_signal.connect(self.pin_dialog) |
||||
|
self.pin_matrix_widget_class = pin_matrix_widget_class |
||||
|
|
||||
|
def get_pin(self, msg): |
||||
|
self.done.clear() |
||||
|
self.pin_signal.emit(msg) |
||||
|
self.done.wait() |
||||
|
return self.response |
||||
|
|
||||
|
def pin_dialog(self, msg): |
||||
|
# Needed e.g. when resetting a device |
||||
|
self.clear_dialog() |
||||
|
dialog = WindowModalDialog(self.top_level_window(), _("Enter PIN")) |
||||
|
matrix = self.pin_matrix_widget_class() |
||||
|
vbox = QVBoxLayout() |
||||
|
vbox.addWidget(QLabel(msg)) |
||||
|
vbox.addWidget(matrix) |
||||
|
vbox.addLayout(Buttons(CancelButton(dialog), OkButton(dialog))) |
||||
|
dialog.setLayout(vbox) |
||||
|
dialog.exec_() |
||||
|
self.response = str(matrix.get_value()) |
||||
|
self.done.set() |
||||
|
|
||||
|
|
||||
|
class QtPlugin(QtPluginBase): |
||||
|
# Derived classes must provide the following class-static variables: |
||||
|
# icon_file |
||||
|
# pin_matrix_widget_class |
||||
|
|
||||
|
def create_handler(self, window): |
||||
|
return QtHandler(window, self.pin_matrix_widget_class(), self.device) |
||||
|
|
||||
|
@hook |
||||
|
def receive_menu(self, menu, addrs, wallet): |
||||
|
if len(addrs) != 1: |
||||
|
return |
||||
|
for keystore in wallet.get_keystores(): |
||||
|
if type(keystore) == self.keystore_class: |
||||
|
def show_address(): |
||||
|
keystore.thread.add(partial(self.show_address, wallet, addrs[0], keystore)) |
||||
|
menu.addAction(_("Show on {}").format(self.device), show_address) |
||||
|
break |
||||
|
|
||||
|
def show_settings_dialog(self, window, keystore): |
||||
|
device_id = self.choose_device(window, keystore) |
||||
|
if device_id: |
||||
|
SettingsDialog(window, self, keystore, device_id).exec_() |
||||
|
|
||||
|
def request_safe_t_init_settings(self, wizard, method, device): |
||||
|
vbox = QVBoxLayout() |
||||
|
next_enabled = True |
||||
|
label = QLabel(_("Enter a label to name your device:")) |
||||
|
name = QLineEdit() |
||||
|
hl = QHBoxLayout() |
||||
|
hl.addWidget(label) |
||||
|
hl.addWidget(name) |
||||
|
hl.addStretch(1) |
||||
|
vbox.addLayout(hl) |
||||
|
|
||||
|
def clean_text(widget): |
||||
|
text = widget.toPlainText().strip() |
||||
|
return ' '.join(text.split()) |
||||
|
|
||||
|
if method in [TIM_NEW, TIM_RECOVER]: |
||||
|
gb = QGroupBox() |
||||
|
hbox1 = QHBoxLayout() |
||||
|
gb.setLayout(hbox1) |
||||
|
vbox.addWidget(gb) |
||||
|
gb.setTitle(_("Select your seed length:")) |
||||
|
bg = QButtonGroup() |
||||
|
for i, count in enumerate([12, 18, 24]): |
||||
|
rb = QRadioButton(gb) |
||||
|
rb.setText(_("%d words") % count) |
||||
|
bg.addButton(rb) |
||||
|
bg.setId(rb, i) |
||||
|
hbox1.addWidget(rb) |
||||
|
rb.setChecked(True) |
||||
|
cb_pin = QCheckBox(_('Enable PIN protection')) |
||||
|
cb_pin.setChecked(True) |
||||
|
else: |
||||
|
text = QTextEdit() |
||||
|
text.setMaximumHeight(60) |
||||
|
if method == TIM_MNEMONIC: |
||||
|
msg = _("Enter your BIP39 mnemonic:") |
||||
|
else: |
||||
|
msg = _("Enter the master private key beginning with xprv:") |
||||
|
def set_enabled(): |
||||
|
from electrum.keystore import is_xprv |
||||
|
wizard.next_button.setEnabled(is_xprv(clean_text(text))) |
||||
|
text.textChanged.connect(set_enabled) |
||||
|
next_enabled = False |
||||
|
|
||||
|
vbox.addWidget(QLabel(msg)) |
||||
|
vbox.addWidget(text) |
||||
|
pin = QLineEdit() |
||||
|
pin.setValidator(QRegExpValidator(QRegExp('[1-9]{0,9}'))) |
||||
|
pin.setMaximumWidth(100) |
||||
|
hbox_pin = QHBoxLayout() |
||||
|
hbox_pin.addWidget(QLabel(_("Enter your PIN (digits 1-9):"))) |
||||
|
hbox_pin.addWidget(pin) |
||||
|
hbox_pin.addStretch(1) |
||||
|
|
||||
|
if method in [TIM_NEW, TIM_RECOVER]: |
||||
|
vbox.addWidget(WWLabel(RECOMMEND_PIN)) |
||||
|
vbox.addWidget(cb_pin) |
||||
|
else: |
||||
|
vbox.addLayout(hbox_pin) |
||||
|
|
||||
|
passphrase_msg = WWLabel(PASSPHRASE_HELP_SHORT) |
||||
|
passphrase_warning = WWLabel(PASSPHRASE_NOT_PIN) |
||||
|
passphrase_warning.setStyleSheet("color: red") |
||||
|
cb_phrase = QCheckBox(_('Enable passphrases')) |
||||
|
cb_phrase.setChecked(False) |
||||
|
vbox.addWidget(passphrase_msg) |
||||
|
vbox.addWidget(passphrase_warning) |
||||
|
vbox.addWidget(cb_phrase) |
||||
|
|
||||
|
wizard.exec_layout(vbox, next_enabled=next_enabled) |
||||
|
|
||||
|
if method in [TIM_NEW, TIM_RECOVER]: |
||||
|
item = bg.checkedId() |
||||
|
pin = cb_pin.isChecked() |
||||
|
else: |
||||
|
item = ' '.join(str(clean_text(text)).split()) |
||||
|
pin = str(pin.text()) |
||||
|
|
||||
|
return (item, name.text(), pin, cb_phrase.isChecked()) |
||||
|
|
||||
|
|
||||
|
class Plugin(SafeTPlugin, QtPlugin): |
||||
|
icon_unpaired = ":icons/safe-t_unpaired.png" |
||||
|
icon_paired = ":icons/safe-t.png" |
||||
|
|
||||
|
@classmethod |
||||
|
def pin_matrix_widget_class(self): |
||||
|
from safetlib.qt.pinmatrix import PinMatrixWidget |
||||
|
return PinMatrixWidget |
||||
|
|
||||
|
|
||||
|
class SettingsDialog(WindowModalDialog): |
||||
|
'''This dialog doesn't require a device be paired with a wallet. |
||||
|
We want users to be able to wipe a device even if they've forgotten |
||||
|
their PIN.''' |
||||
|
|
||||
|
def __init__(self, window, plugin, keystore, device_id): |
||||
|
title = _("{} Settings").format(plugin.device) |
||||
|
super(SettingsDialog, self).__init__(window, title) |
||||
|
self.setMaximumWidth(540) |
||||
|
|
||||
|
devmgr = plugin.device_manager() |
||||
|
config = devmgr.config |
||||
|
handler = keystore.handler |
||||
|
thread = keystore.thread |
||||
|
hs_rows, hs_cols = (64, 128) |
||||
|
|
||||
|
def invoke_client(method, *args, **kw_args): |
||||
|
unpair_after = kw_args.pop('unpair_after', False) |
||||
|
|
||||
|
def task(): |
||||
|
client = devmgr.client_by_id(device_id) |
||||
|
if not client: |
||||
|
raise RuntimeError("Device not connected") |
||||
|
if method: |
||||
|
getattr(client, method)(*args, **kw_args) |
||||
|
if unpair_after: |
||||
|
devmgr.unpair_id(device_id) |
||||
|
return client.features |
||||
|
|
||||
|
thread.add(task, on_success=update) |
||||
|
|
||||
|
def update(features): |
||||
|
self.features = features |
||||
|
set_label_enabled() |
||||
|
if features.bootloader_hash: |
||||
|
bl_hash = bh2u(features.bootloader_hash) |
||||
|
bl_hash = "\n".join([bl_hash[:32], bl_hash[32:]]) |
||||
|
else: |
||||
|
bl_hash = "N/A" |
||||
|
noyes = [_("No"), _("Yes")] |
||||
|
endis = [_("Enable Passphrases"), _("Disable Passphrases")] |
||||
|
disen = [_("Disabled"), _("Enabled")] |
||||
|
setchange = [_("Set a PIN"), _("Change PIN")] |
||||
|
|
||||
|
version = "%d.%d.%d" % (features.major_version, |
||||
|
features.minor_version, |
||||
|
features.patch_version) |
||||
|
|
||||
|
device_label.setText(features.label) |
||||
|
pin_set_label.setText(noyes[features.pin_protection]) |
||||
|
passphrases_label.setText(disen[features.passphrase_protection]) |
||||
|
bl_hash_label.setText(bl_hash) |
||||
|
label_edit.setText(features.label) |
||||
|
device_id_label.setText(features.device_id) |
||||
|
initialized_label.setText(noyes[features.initialized]) |
||||
|
version_label.setText(version) |
||||
|
clear_pin_button.setVisible(features.pin_protection) |
||||
|
clear_pin_warning.setVisible(features.pin_protection) |
||||
|
pin_button.setText(setchange[features.pin_protection]) |
||||
|
pin_msg.setVisible(not features.pin_protection) |
||||
|
passphrase_button.setText(endis[features.passphrase_protection]) |
||||
|
language_label.setText(features.language) |
||||
|
|
||||
|
def set_label_enabled(): |
||||
|
label_apply.setEnabled(label_edit.text() != self.features.label) |
||||
|
|
||||
|
def rename(): |
||||
|
invoke_client('change_label', label_edit.text()) |
||||
|
|
||||
|
def toggle_passphrase(): |
||||
|
title = _("Confirm Toggle Passphrase Protection") |
||||
|
currently_enabled = self.features.passphrase_protection |
||||
|
if currently_enabled: |
||||
|
msg = _("After disabling passphrases, you can only pair this " |
||||
|
"Electrum wallet if it had an empty passphrase. " |
||||
|
"If its passphrase was not empty, you will need to " |
||||
|
"create a new wallet with the install wizard. You " |
||||
|
"can use this wallet again at any time by re-enabling " |
||||
|
"passphrases and entering its passphrase.") |
||||
|
else: |
||||
|
msg = _("Your current Electrum wallet can only be used with " |
||||
|
"an empty passphrase. You must create a separate " |
||||
|
"wallet with the install wizard for other passphrases " |
||||
|
"as each one generates a new set of addresses.") |
||||
|
msg += "\n\n" + _("Are you sure you want to proceed?") |
||||
|
if not self.question(msg, title=title): |
||||
|
return |
||||
|
invoke_client('toggle_passphrase', unpair_after=currently_enabled) |
||||
|
|
||||
|
def change_homescreen(): |
||||
|
dialog = QFileDialog(self, _("Choose Homescreen")) |
||||
|
filename, __ = dialog.getOpenFileName() |
||||
|
if not filename: |
||||
|
return # user cancelled |
||||
|
|
||||
|
if filename.endswith('.toif'): |
||||
|
img = open(filename, 'rb').read() |
||||
|
if img[:8] != b'TOIf\x90\x00\x90\x00': |
||||
|
handler.show_error('File is not a TOIF file with size of 144x144') |
||||
|
return |
||||
|
else: |
||||
|
from PIL import Image # FIXME |
||||
|
im = Image.open(filename) |
||||
|
if im.size != (128, 64): |
||||
|
handler.show_error('Image must be 128 x 64 pixels') |
||||
|
return |
||||
|
im = im.convert('1') |
||||
|
pix = im.load() |
||||
|
img = bytearray(1024) |
||||
|
for j in range(64): |
||||
|
for i in range(128): |
||||
|
if pix[i, j]: |
||||
|
o = (i + j * 128) |
||||
|
img[o // 8] |= (1 << (7 - o % 8)) |
||||
|
img = bytes(img) |
||||
|
invoke_client('change_homescreen', img) |
||||
|
|
||||
|
def clear_homescreen(): |
||||
|
invoke_client('change_homescreen', b'\x00') |
||||
|
|
||||
|
def set_pin(): |
||||
|
invoke_client('set_pin', remove=False) |
||||
|
|
||||
|
def clear_pin(): |
||||
|
invoke_client('set_pin', remove=True) |
||||
|
|
||||
|
def wipe_device(): |
||||
|
wallet = window.wallet |
||||
|
if wallet and sum(wallet.get_balance()): |
||||
|
title = _("Confirm Device Wipe") |
||||
|
msg = _("Are you SURE you want to wipe the device?\n" |
||||
|
"Your wallet still has bitcoins in it!") |
||||
|
if not self.question(msg, title=title, |
||||
|
icon=QMessageBox.Critical): |
||||
|
return |
||||
|
invoke_client('wipe_device', unpair_after=True) |
||||
|
|
||||
|
def slider_moved(): |
||||
|
mins = timeout_slider.sliderPosition() |
||||
|
timeout_minutes.setText(_("%2d minutes") % mins) |
||||
|
|
||||
|
def slider_released(): |
||||
|
config.set_session_timeout(timeout_slider.sliderPosition() * 60) |
||||
|
|
||||
|
# Information tab |
||||
|
info_tab = QWidget() |
||||
|
info_layout = QVBoxLayout(info_tab) |
||||
|
info_glayout = QGridLayout() |
||||
|
info_glayout.setColumnStretch(2, 1) |
||||
|
device_label = QLabel() |
||||
|
pin_set_label = QLabel() |
||||
|
passphrases_label = QLabel() |
||||
|
version_label = QLabel() |
||||
|
device_id_label = QLabel() |
||||
|
bl_hash_label = QLabel() |
||||
|
bl_hash_label.setWordWrap(True) |
||||
|
language_label = QLabel() |
||||
|
initialized_label = QLabel() |
||||
|
rows = [ |
||||
|
(_("Device Label"), device_label), |
||||
|
(_("PIN set"), pin_set_label), |
||||
|
(_("Passphrases"), passphrases_label), |
||||
|
(_("Firmware Version"), version_label), |
||||
|
(_("Device ID"), device_id_label), |
||||
|
(_("Bootloader Hash"), bl_hash_label), |
||||
|
(_("Language"), language_label), |
||||
|
(_("Initialized"), initialized_label), |
||||
|
] |
||||
|
for row_num, (label, widget) in enumerate(rows): |
||||
|
info_glayout.addWidget(QLabel(label), row_num, 0) |
||||
|
info_glayout.addWidget(widget, row_num, 1) |
||||
|
info_layout.addLayout(info_glayout) |
||||
|
|
||||
|
# Settings tab |
||||
|
settings_tab = QWidget() |
||||
|
settings_layout = QVBoxLayout(settings_tab) |
||||
|
settings_glayout = QGridLayout() |
||||
|
|
||||
|
# Settings tab - Label |
||||
|
label_msg = QLabel(_("Name this {}. If you have multiple devices " |
||||
|
"their labels help distinguish them.") |
||||
|
.format(plugin.device)) |
||||
|
label_msg.setWordWrap(True) |
||||
|
label_label = QLabel(_("Device Label")) |
||||
|
label_edit = QLineEdit() |
||||
|
label_edit.setMinimumWidth(150) |
||||
|
label_edit.setMaxLength(plugin.MAX_LABEL_LEN) |
||||
|
label_apply = QPushButton(_("Apply")) |
||||
|
label_apply.clicked.connect(rename) |
||||
|
label_edit.textChanged.connect(set_label_enabled) |
||||
|
settings_glayout.addWidget(label_label, 0, 0) |
||||
|
settings_glayout.addWidget(label_edit, 0, 1, 1, 2) |
||||
|
settings_glayout.addWidget(label_apply, 0, 3) |
||||
|
settings_glayout.addWidget(label_msg, 1, 1, 1, -1) |
||||
|
|
||||
|
# Settings tab - PIN |
||||
|
pin_label = QLabel(_("PIN Protection")) |
||||
|
pin_button = QPushButton() |
||||
|
pin_button.clicked.connect(set_pin) |
||||
|
settings_glayout.addWidget(pin_label, 2, 0) |
||||
|
settings_glayout.addWidget(pin_button, 2, 1) |
||||
|
pin_msg = QLabel(_("PIN protection is strongly recommended. " |
||||
|
"A PIN is your only protection against someone " |
||||
|
"stealing your bitcoins if they obtain physical " |
||||
|
"access to your {}.").format(plugin.device)) |
||||
|
pin_msg.setWordWrap(True) |
||||
|
pin_msg.setStyleSheet("color: red") |
||||
|
settings_glayout.addWidget(pin_msg, 3, 1, 1, -1) |
||||
|
|
||||
|
# Settings tab - Homescreen |
||||
|
homescreen_label = QLabel(_("Homescreen")) |
||||
|
homescreen_change_button = QPushButton(_("Change...")) |
||||
|
homescreen_clear_button = QPushButton(_("Reset")) |
||||
|
homescreen_change_button.clicked.connect(change_homescreen) |
||||
|
try: |
||||
|
import PIL |
||||
|
except ImportError: |
||||
|
homescreen_change_button.setDisabled(True) |
||||
|
homescreen_change_button.setToolTip( |
||||
|
_("Required package 'PIL' is not available - Please install it.") |
||||
|
) |
||||
|
homescreen_clear_button.clicked.connect(clear_homescreen) |
||||
|
homescreen_msg = QLabel(_("You can set the homescreen on your " |
||||
|
"device to personalize it. You must " |
||||
|
"choose a {} x {} monochrome black and " |
||||
|
"white image.").format(hs_rows, hs_cols)) |
||||
|
homescreen_msg.setWordWrap(True) |
||||
|
settings_glayout.addWidget(homescreen_label, 4, 0) |
||||
|
settings_glayout.addWidget(homescreen_change_button, 4, 1) |
||||
|
settings_glayout.addWidget(homescreen_clear_button, 4, 2) |
||||
|
settings_glayout.addWidget(homescreen_msg, 5, 1, 1, -1) |
||||
|
|
||||
|
# Settings tab - Session Timeout |
||||
|
timeout_label = QLabel(_("Session Timeout")) |
||||
|
timeout_minutes = QLabel() |
||||
|
timeout_slider = QSlider(Qt.Horizontal) |
||||
|
timeout_slider.setRange(1, 60) |
||||
|
timeout_slider.setSingleStep(1) |
||||
|
timeout_slider.setTickInterval(5) |
||||
|
timeout_slider.setTickPosition(QSlider.TicksBelow) |
||||
|
timeout_slider.setTracking(True) |
||||
|
timeout_msg = QLabel( |
||||
|
_("Clear the session after the specified period " |
||||
|
"of inactivity. Once a session has timed out, " |
||||
|
"your PIN and passphrase (if enabled) must be " |
||||
|
"re-entered to use the device.")) |
||||
|
timeout_msg.setWordWrap(True) |
||||
|
timeout_slider.setSliderPosition(config.get_session_timeout() // 60) |
||||
|
slider_moved() |
||||
|
timeout_slider.valueChanged.connect(slider_moved) |
||||
|
timeout_slider.sliderReleased.connect(slider_released) |
||||
|
settings_glayout.addWidget(timeout_label, 6, 0) |
||||
|
settings_glayout.addWidget(timeout_slider, 6, 1, 1, 3) |
||||
|
settings_glayout.addWidget(timeout_minutes, 6, 4) |
||||
|
settings_glayout.addWidget(timeout_msg, 7, 1, 1, -1) |
||||
|
settings_layout.addLayout(settings_glayout) |
||||
|
settings_layout.addStretch(1) |
||||
|
|
||||
|
# Advanced tab |
||||
|
advanced_tab = QWidget() |
||||
|
advanced_layout = QVBoxLayout(advanced_tab) |
||||
|
advanced_glayout = QGridLayout() |
||||
|
|
||||
|
# Advanced tab - clear PIN |
||||
|
clear_pin_button = QPushButton(_("Disable PIN")) |
||||
|
clear_pin_button.clicked.connect(clear_pin) |
||||
|
clear_pin_warning = QLabel( |
||||
|
_("If you disable your PIN, anyone with physical access to your " |
||||
|
"{} device can spend your bitcoins.").format(plugin.device)) |
||||
|
clear_pin_warning.setWordWrap(True) |
||||
|
clear_pin_warning.setStyleSheet("color: red") |
||||
|
advanced_glayout.addWidget(clear_pin_button, 0, 2) |
||||
|
advanced_glayout.addWidget(clear_pin_warning, 1, 0, 1, 5) |
||||
|
|
||||
|
# Advanced tab - toggle passphrase protection |
||||
|
passphrase_button = QPushButton() |
||||
|
passphrase_button.clicked.connect(toggle_passphrase) |
||||
|
passphrase_msg = WWLabel(PASSPHRASE_HELP) |
||||
|
passphrase_warning = WWLabel(PASSPHRASE_NOT_PIN) |
||||
|
passphrase_warning.setStyleSheet("color: red") |
||||
|
advanced_glayout.addWidget(passphrase_button, 3, 2) |
||||
|
advanced_glayout.addWidget(passphrase_msg, 4, 0, 1, 5) |
||||
|
advanced_glayout.addWidget(passphrase_warning, 5, 0, 1, 5) |
||||
|
|
||||
|
# Advanced tab - wipe device |
||||
|
wipe_device_button = QPushButton(_("Wipe Device")) |
||||
|
wipe_device_button.clicked.connect(wipe_device) |
||||
|
wipe_device_msg = QLabel( |
||||
|
_("Wipe the device, removing all data from it. The firmware " |
||||
|
"is left unchanged.")) |
||||
|
wipe_device_msg.setWordWrap(True) |
||||
|
wipe_device_warning = QLabel( |
||||
|
_("Only wipe a device if you have the recovery seed written down " |
||||
|
"and the device wallet(s) are empty, otherwise the bitcoins " |
||||
|
"will be lost forever.")) |
||||
|
wipe_device_warning.setWordWrap(True) |
||||
|
wipe_device_warning.setStyleSheet("color: red") |
||||
|
advanced_glayout.addWidget(wipe_device_button, 6, 2) |
||||
|
advanced_glayout.addWidget(wipe_device_msg, 7, 0, 1, 5) |
||||
|
advanced_glayout.addWidget(wipe_device_warning, 8, 0, 1, 5) |
||||
|
advanced_layout.addLayout(advanced_glayout) |
||||
|
advanced_layout.addStretch(1) |
||||
|
|
||||
|
tabs = QTabWidget(self) |
||||
|
tabs.addTab(info_tab, _("Information")) |
||||
|
tabs.addTab(settings_tab, _("Settings")) |
||||
|
tabs.addTab(advanced_tab, _("Advanced")) |
||||
|
dialog_vbox = QVBoxLayout(self) |
||||
|
dialog_vbox.addWidget(tabs) |
||||
|
dialog_vbox.addLayout(Buttons(CloseButton(self))) |
||||
|
|
||||
|
# Update information |
||||
|
invoke_client(None) |
@ -0,0 +1,509 @@ |
|||||
|
from binascii import hexlify, unhexlify |
||||
|
import traceback |
||||
|
import sys |
||||
|
|
||||
|
from electrum.util import bfh, bh2u, versiontuple, UserCancelled |
||||
|
from electrum.bitcoin import (b58_address_to_hash160, xpub_from_pubkey, deserialize_xpub, |
||||
|
TYPE_ADDRESS, TYPE_SCRIPT, is_address) |
||||
|
from electrum import constants |
||||
|
from electrum.i18n import _ |
||||
|
from electrum.plugin import BasePlugin, Device |
||||
|
from electrum.transaction import deserialize, Transaction |
||||
|
from electrum.keystore import Hardware_KeyStore, is_xpubkey, parse_xpubkey, xtype_from_derivation |
||||
|
from electrum.base_wizard import ScriptTypeNotSupported |
||||
|
|
||||
|
from ..hw_wallet import HW_PluginBase |
||||
|
from ..hw_wallet.plugin import is_any_tx_output_on_change_branch, trezor_validate_op_return_output_and_get_data |
||||
|
|
||||
|
|
||||
|
# Safe-T mini initialization methods |
||||
|
TIM_NEW, TIM_RECOVER, TIM_MNEMONIC, TIM_PRIVKEY = range(0, 4) |
||||
|
|
||||
|
# script "generation" |
||||
|
SCRIPT_GEN_LEGACY, SCRIPT_GEN_P2SH_SEGWIT, SCRIPT_GEN_NATIVE_SEGWIT = range(0, 3) |
||||
|
|
||||
|
|
||||
|
class SafeTKeyStore(Hardware_KeyStore): |
||||
|
hw_type = 'safe_t' |
||||
|
device = 'Safe-T mini' |
||||
|
|
||||
|
def get_derivation(self): |
||||
|
return self.derivation |
||||
|
|
||||
|
def get_script_gen(self): |
||||
|
xtype = xtype_from_derivation(self.derivation) |
||||
|
if xtype in ('p2wpkh', 'p2wsh'): |
||||
|
return SCRIPT_GEN_NATIVE_SEGWIT |
||||
|
elif xtype in ('p2wpkh-p2sh', 'p2wsh-p2sh'): |
||||
|
return SCRIPT_GEN_P2SH_SEGWIT |
||||
|
else: |
||||
|
return SCRIPT_GEN_LEGACY |
||||
|
|
||||
|
def get_client(self, force_pair=True): |
||||
|
return self.plugin.get_client(self, force_pair) |
||||
|
|
||||
|
def decrypt_message(self, sequence, message, password): |
||||
|
raise RuntimeError(_('Encryption and decryption are not implemented by {}').format(self.device)) |
||||
|
|
||||
|
def sign_message(self, sequence, message, password): |
||||
|
client = self.get_client() |
||||
|
address_path = self.get_derivation() + "/%d/%d"%sequence |
||||
|
address_n = client.expand_path(address_path) |
||||
|
msg_sig = client.sign_message(self.plugin.get_coin_name(), address_n, message) |
||||
|
return msg_sig.signature |
||||
|
|
||||
|
def sign_transaction(self, tx, password): |
||||
|
if tx.is_complete(): |
||||
|
return |
||||
|
# previous transactions used as inputs |
||||
|
prev_tx = {} |
||||
|
# path of the xpubs that are involved |
||||
|
xpub_path = {} |
||||
|
for txin in tx.inputs(): |
||||
|
pubkeys, x_pubkeys = tx.get_sorted_pubkeys(txin) |
||||
|
tx_hash = txin['prevout_hash'] |
||||
|
if txin.get('prev_tx') is None and not Transaction.is_segwit_input(txin): |
||||
|
raise Exception(_('Offline signing with {} is not supported for legacy inputs.').format(self.device)) |
||||
|
prev_tx[tx_hash] = txin['prev_tx'] |
||||
|
for x_pubkey in x_pubkeys: |
||||
|
if not is_xpubkey(x_pubkey): |
||||
|
continue |
||||
|
xpub, s = parse_xpubkey(x_pubkey) |
||||
|
if xpub == self.get_master_public_key(): |
||||
|
xpub_path[xpub] = self.get_derivation() |
||||
|
|
||||
|
self.plugin.sign_transaction(self, tx, prev_tx, xpub_path) |
||||
|
|
||||
|
|
||||
|
class SafeTPlugin(HW_PluginBase): |
||||
|
# Derived classes provide: |
||||
|
# |
||||
|
# class-static variables: client_class, firmware_URL, handler_class, |
||||
|
# libraries_available, libraries_URL, minimum_firmware, |
||||
|
# wallet_class, types |
||||
|
|
||||
|
firmware_URL = 'https://safe-t.io' |
||||
|
libraries_URL = 'https://github.com/archos-safe-t/python-safet' |
||||
|
minimum_firmware = (1, 0, 5) |
||||
|
keystore_class = SafeTKeyStore |
||||
|
minimum_library = (0, 1, 0) |
||||
|
SUPPORTED_XTYPES = ('standard', 'p2wpkh-p2sh', 'p2wpkh', 'p2wsh-p2sh', 'p2wsh') |
||||
|
|
||||
|
MAX_LABEL_LEN = 32 |
||||
|
|
||||
|
def __init__(self, parent, config, name): |
||||
|
HW_PluginBase.__init__(self, parent, config, name) |
||||
|
|
||||
|
try: |
||||
|
# Minimal test if python-safet is installed |
||||
|
import safetlib |
||||
|
try: |
||||
|
library_version = safetlib.__version__ |
||||
|
except AttributeError: |
||||
|
# python-safet only introduced __version__ in 0.1.0 |
||||
|
library_version = 'unknown' |
||||
|
if library_version == 'unknown' or \ |
||||
|
versiontuple(library_version) < self.minimum_library: |
||||
|
self.libraries_available_message = ( |
||||
|
_("Library version for '{}' is too old.").format(name) |
||||
|
+ '\nInstalled: {}, Needed: {}' |
||||
|
.format(library_version, self.minimum_library)) |
||||
|
self.print_stderr(self.libraries_available_message) |
||||
|
raise ImportError() |
||||
|
self.libraries_available = True |
||||
|
except ImportError: |
||||
|
self.libraries_available = False |
||||
|
return |
||||
|
|
||||
|
from . import client |
||||
|
from . import transport |
||||
|
import safetlib.messages |
||||
|
self.client_class = client.SafeTClient |
||||
|
self.types = safetlib.messages |
||||
|
self.DEVICE_IDS = ('Safe-T mini',) |
||||
|
|
||||
|
self.transport_handler = transport.SafeTTransport() |
||||
|
self.device_manager().register_enumerate_func(self.enumerate) |
||||
|
|
||||
|
def enumerate(self): |
||||
|
devices = self.transport_handler.enumerate_devices() |
||||
|
return [Device(d.get_path(), -1, d.get_path(), 'Safe-T mini', 0) for d in devices] |
||||
|
|
||||
|
def create_client(self, device, handler): |
||||
|
try: |
||||
|
self.print_error("connecting to device at", device.path) |
||||
|
transport = self.transport_handler.get_transport(device.path) |
||||
|
except BaseException as e: |
||||
|
self.print_error("cannot connect at", device.path, str(e)) |
||||
|
return None |
||||
|
|
||||
|
if not transport: |
||||
|
self.print_error("cannot connect at", device.path) |
||||
|
return |
||||
|
|
||||
|
self.print_error("connected to device at", device.path) |
||||
|
client = self.client_class(transport, handler, self) |
||||
|
|
||||
|
# Try a ping for device sanity |
||||
|
try: |
||||
|
client.ping('t') |
||||
|
except BaseException as e: |
||||
|
self.print_error("ping failed", str(e)) |
||||
|
return None |
||||
|
|
||||
|
if not client.atleast_version(*self.minimum_firmware): |
||||
|
msg = (_('Outdated {} firmware for device labelled {}. Please ' |
||||
|
'download the updated firmware from {}') |
||||
|
.format(self.device, client.label(), self.firmware_URL)) |
||||
|
self.print_error(msg) |
||||
|
if handler: |
||||
|
handler.show_error(msg) |
||||
|
else: |
||||
|
raise Exception(msg) |
||||
|
return None |
||||
|
|
||||
|
return client |
||||
|
|
||||
|
def get_client(self, keystore, force_pair=True): |
||||
|
devmgr = self.device_manager() |
||||
|
handler = keystore.handler |
||||
|
with devmgr.hid_lock: |
||||
|
client = devmgr.client_for_keystore(self, handler, keystore, force_pair) |
||||
|
# returns the client for a given keystore. can use xpub |
||||
|
if client: |
||||
|
client.used() |
||||
|
return client |
||||
|
|
||||
|
def get_coin_name(self): |
||||
|
return "Testnet" if constants.net.TESTNET else "Bitcoin" |
||||
|
|
||||
|
def initialize_device(self, device_id, wizard, handler): |
||||
|
# Initialization method |
||||
|
msg = _("Choose how you want to initialize your {}.\n\n" |
||||
|
"The first two methods are secure as no secret information " |
||||
|
"is entered into your computer.\n\n" |
||||
|
"For the last two methods you input secrets on your keyboard " |
||||
|
"and upload them to your {}, and so you should " |
||||
|
"only do those on a computer you know to be trustworthy " |
||||
|
"and free of malware." |
||||
|
).format(self.device, self.device) |
||||
|
choices = [ |
||||
|
# Must be short as QT doesn't word-wrap radio button text |
||||
|
(TIM_NEW, _("Let the device generate a completely new seed randomly")), |
||||
|
(TIM_RECOVER, _("Recover from a seed you have previously written down")), |
||||
|
(TIM_MNEMONIC, _("Upload a BIP39 mnemonic to generate the seed")), |
||||
|
(TIM_PRIVKEY, _("Upload a master private key")) |
||||
|
] |
||||
|
def f(method): |
||||
|
import threading |
||||
|
settings = self.request_safe_t_init_settings(wizard, method, self.device) |
||||
|
t = threading.Thread(target=self._initialize_device_safe, args=(settings, method, device_id, wizard, handler)) |
||||
|
t.setDaemon(True) |
||||
|
t.start() |
||||
|
exit_code = wizard.loop.exec_() |
||||
|
if exit_code != 0: |
||||
|
# this method (initialize_device) was called with the expectation |
||||
|
# of leaving the device in an initialized state when finishing. |
||||
|
# signal that this is not the case: |
||||
|
raise UserCancelled() |
||||
|
wizard.choice_dialog(title=_('Initialize Device'), message=msg, choices=choices, run_next=f) |
||||
|
|
||||
|
def _initialize_device_safe(self, settings, method, device_id, wizard, handler): |
||||
|
exit_code = 0 |
||||
|
try: |
||||
|
self._initialize_device(settings, method, device_id, wizard, handler) |
||||
|
except UserCancelled: |
||||
|
exit_code = 1 |
||||
|
except BaseException as e: |
||||
|
traceback.print_exc(file=sys.stderr) |
||||
|
handler.show_error(str(e)) |
||||
|
exit_code = 1 |
||||
|
finally: |
||||
|
wizard.loop.exit(exit_code) |
||||
|
|
||||
|
def _initialize_device(self, settings, method, device_id, wizard, handler): |
||||
|
item, label, pin_protection, passphrase_protection = settings |
||||
|
|
||||
|
if method == TIM_RECOVER: |
||||
|
handler.show_error(_( |
||||
|
"You will be asked to enter 24 words regardless of your " |
||||
|
"seed's actual length. If you enter a word incorrectly or " |
||||
|
"misspell it, you cannot change it or go back - you will need " |
||||
|
"to start again from the beginning.\n\nSo please enter " |
||||
|
"the words carefully!"), |
||||
|
blocking=True) |
||||
|
|
||||
|
language = 'english' |
||||
|
devmgr = self.device_manager() |
||||
|
client = devmgr.client_by_id(device_id) |
||||
|
|
||||
|
if method == TIM_NEW: |
||||
|
strength = 64 * (item + 2) # 128, 192 or 256 |
||||
|
u2f_counter = 0 |
||||
|
skip_backup = False |
||||
|
client.reset_device(True, strength, passphrase_protection, |
||||
|
pin_protection, label, language, |
||||
|
u2f_counter, skip_backup) |
||||
|
elif method == TIM_RECOVER: |
||||
|
word_count = 6 * (item + 2) # 12, 18 or 24 |
||||
|
client.step = 0 |
||||
|
client.recovery_device(word_count, passphrase_protection, |
||||
|
pin_protection, label, language) |
||||
|
elif method == TIM_MNEMONIC: |
||||
|
pin = pin_protection # It's the pin, not a boolean |
||||
|
client.load_device_by_mnemonic(str(item), pin, |
||||
|
passphrase_protection, |
||||
|
label, language) |
||||
|
else: |
||||
|
pin = pin_protection # It's the pin, not a boolean |
||||
|
client.load_device_by_xprv(item, pin, passphrase_protection, |
||||
|
label, language) |
||||
|
|
||||
|
def _make_node_path(self, xpub, address_n): |
||||
|
_, depth, fingerprint, child_num, chain_code, key = deserialize_xpub(xpub) |
||||
|
node = self.types.HDNodeType( |
||||
|
depth=depth, |
||||
|
fingerprint=int.from_bytes(fingerprint, 'big'), |
||||
|
child_num=int.from_bytes(child_num, 'big'), |
||||
|
chain_code=chain_code, |
||||
|
public_key=key, |
||||
|
) |
||||
|
return self.types.HDNodePathType(node=node, address_n=address_n) |
||||
|
|
||||
|
def setup_device(self, device_info, wizard, purpose): |
||||
|
devmgr = self.device_manager() |
||||
|
device_id = device_info.device.id_ |
||||
|
client = devmgr.client_by_id(device_id) |
||||
|
if client is None: |
||||
|
raise Exception(_('Failed to create a client for this device.') + '\n' + |
||||
|
_('Make sure it is in the correct state.')) |
||||
|
# fixme: we should use: client.handler = wizard |
||||
|
client.handler = self.create_handler(wizard) |
||||
|
if not device_info.initialized: |
||||
|
self.initialize_device(device_id, wizard, client.handler) |
||||
|
client.get_xpub('m', 'standard') |
||||
|
client.used() |
||||
|
|
||||
|
def get_xpub(self, device_id, derivation, xtype, wizard): |
||||
|
if xtype not in self.SUPPORTED_XTYPES: |
||||
|
raise ScriptTypeNotSupported(_('This type of script is not supported with {}.').format(self.device)) |
||||
|
devmgr = self.device_manager() |
||||
|
client = devmgr.client_by_id(device_id) |
||||
|
client.handler = wizard |
||||
|
xpub = client.get_xpub(derivation, xtype) |
||||
|
client.used() |
||||
|
return xpub |
||||
|
|
||||
|
def get_safet_input_script_type(self, script_gen, is_multisig): |
||||
|
if script_gen == SCRIPT_GEN_NATIVE_SEGWIT: |
||||
|
return self.types.InputScriptType.SPENDWITNESS |
||||
|
elif script_gen == SCRIPT_GEN_P2SH_SEGWIT: |
||||
|
return self.types.InputScriptType.SPENDP2SHWITNESS |
||||
|
else: |
||||
|
if is_multisig: |
||||
|
return self.types.InputScriptType.SPENDMULTISIG |
||||
|
else: |
||||
|
return self.types.InputScriptType.SPENDADDRESS |
||||
|
|
||||
|
def sign_transaction(self, keystore, tx, prev_tx, xpub_path): |
||||
|
self.prev_tx = prev_tx |
||||
|
self.xpub_path = xpub_path |
||||
|
client = self.get_client(keystore) |
||||
|
inputs = self.tx_inputs(tx, True, keystore.get_script_gen()) |
||||
|
outputs = self.tx_outputs(keystore.get_derivation(), tx, keystore.get_script_gen()) |
||||
|
signatures = client.sign_tx(self.get_coin_name(), inputs, outputs, lock_time=tx.locktime)[0] |
||||
|
signatures = [(bh2u(x) + '01') for x in signatures] |
||||
|
tx.update_signatures(signatures) |
||||
|
|
||||
|
def show_address(self, wallet, address, keystore=None): |
||||
|
if keystore is None: |
||||
|
keystore = wallet.get_keystore() |
||||
|
if not self.show_address_helper(wallet, address, keystore): |
||||
|
return |
||||
|
client = self.get_client(keystore) |
||||
|
if not client.atleast_version(1, 0): |
||||
|
keystore.handler.show_error(_("Your device firmware is too old")) |
||||
|
return |
||||
|
change, index = wallet.get_address_index(address) |
||||
|
derivation = keystore.derivation |
||||
|
address_path = "%s/%d/%d"%(derivation, change, index) |
||||
|
address_n = client.expand_path(address_path) |
||||
|
xpubs = wallet.get_master_public_keys() |
||||
|
if len(xpubs) == 1: |
||||
|
script_gen = keystore.get_script_gen() |
||||
|
script_type = self.get_safet_input_script_type(script_gen, is_multisig=False) |
||||
|
client.get_address(self.get_coin_name(), address_n, True, script_type=script_type) |
||||
|
else: |
||||
|
def f(xpub): |
||||
|
return self._make_node_path(xpub, [change, index]) |
||||
|
pubkeys = wallet.get_public_keys(address) |
||||
|
# sort xpubs using the order of pubkeys |
||||
|
sorted_pubkeys, sorted_xpubs = zip(*sorted(zip(pubkeys, xpubs))) |
||||
|
pubkeys = list(map(f, sorted_xpubs)) |
||||
|
multisig = self.types.MultisigRedeemScriptType( |
||||
|
pubkeys=pubkeys, |
||||
|
signatures=[b''] * wallet.n, |
||||
|
m=wallet.m, |
||||
|
) |
||||
|
script_gen = keystore.get_script_gen() |
||||
|
script_type = self.get_safet_input_script_type(script_gen, is_multisig=True) |
||||
|
client.get_address(self.get_coin_name(), address_n, True, multisig=multisig, script_type=script_type) |
||||
|
|
||||
|
def tx_inputs(self, tx, for_sig=False, script_gen=SCRIPT_GEN_LEGACY): |
||||
|
inputs = [] |
||||
|
for txin in tx.inputs(): |
||||
|
txinputtype = self.types.TxInputType() |
||||
|
if txin['type'] == 'coinbase': |
||||
|
prev_hash = b"\x00"*32 |
||||
|
prev_index = 0xffffffff # signed int -1 |
||||
|
else: |
||||
|
if for_sig: |
||||
|
x_pubkeys = txin['x_pubkeys'] |
||||
|
if len(x_pubkeys) == 1: |
||||
|
x_pubkey = x_pubkeys[0] |
||||
|
xpub, s = parse_xpubkey(x_pubkey) |
||||
|
xpub_n = self.client_class.expand_path(self.xpub_path[xpub]) |
||||
|
txinputtype._extend_address_n(xpub_n + s) |
||||
|
txinputtype.script_type = self.get_safet_input_script_type(script_gen, is_multisig=False) |
||||
|
else: |
||||
|
def f(x_pubkey): |
||||
|
if is_xpubkey(x_pubkey): |
||||
|
xpub, s = parse_xpubkey(x_pubkey) |
||||
|
else: |
||||
|
xpub = xpub_from_pubkey(0, bfh(x_pubkey)) |
||||
|
s = [] |
||||
|
return self._make_node_path(xpub, s) |
||||
|
pubkeys = list(map(f, x_pubkeys)) |
||||
|
multisig = self.types.MultisigRedeemScriptType( |
||||
|
pubkeys=pubkeys, |
||||
|
signatures=list(map(lambda x: bfh(x)[:-1] if x else b'', txin.get('signatures'))), |
||||
|
m=txin.get('num_sig'), |
||||
|
) |
||||
|
script_type = self.get_safet_input_script_type(script_gen, is_multisig=True) |
||||
|
txinputtype = self.types.TxInputType( |
||||
|
script_type=script_type, |
||||
|
multisig=multisig |
||||
|
) |
||||
|
# find which key is mine |
||||
|
for x_pubkey in x_pubkeys: |
||||
|
if is_xpubkey(x_pubkey): |
||||
|
xpub, s = parse_xpubkey(x_pubkey) |
||||
|
if xpub in self.xpub_path: |
||||
|
xpub_n = self.client_class.expand_path(self.xpub_path[xpub]) |
||||
|
txinputtype._extend_address_n(xpub_n + s) |
||||
|
break |
||||
|
|
||||
|
prev_hash = unhexlify(txin['prevout_hash']) |
||||
|
prev_index = txin['prevout_n'] |
||||
|
|
||||
|
if 'value' in txin: |
||||
|
txinputtype.amount = txin['value'] |
||||
|
txinputtype.prev_hash = prev_hash |
||||
|
txinputtype.prev_index = prev_index |
||||
|
|
||||
|
if txin.get('scriptSig') is not None: |
||||
|
script_sig = bfh(txin['scriptSig']) |
||||
|
txinputtype.script_sig = script_sig |
||||
|
|
||||
|
txinputtype.sequence = txin.get('sequence', 0xffffffff - 1) |
||||
|
|
||||
|
inputs.append(txinputtype) |
||||
|
|
||||
|
return inputs |
||||
|
|
||||
|
def tx_outputs(self, derivation, tx, script_gen=SCRIPT_GEN_LEGACY): |
||||
|
|
||||
|
def create_output_by_derivation(info): |
||||
|
index, xpubs, m = info |
||||
|
if len(xpubs) == 1: |
||||
|
if script_gen == SCRIPT_GEN_NATIVE_SEGWIT: |
||||
|
script_type = self.types.OutputScriptType.PAYTOWITNESS |
||||
|
elif script_gen == SCRIPT_GEN_P2SH_SEGWIT: |
||||
|
script_type = self.types.OutputScriptType.PAYTOP2SHWITNESS |
||||
|
else: |
||||
|
script_type = self.types.OutputScriptType.PAYTOADDRESS |
||||
|
address_n = self.client_class.expand_path(derivation + "/%d/%d" % index) |
||||
|
txoutputtype = self.types.TxOutputType( |
||||
|
amount=amount, |
||||
|
script_type=script_type, |
||||
|
address_n=address_n, |
||||
|
) |
||||
|
else: |
||||
|
if script_gen == SCRIPT_GEN_NATIVE_SEGWIT: |
||||
|
script_type = self.types.OutputScriptType.PAYTOWITNESS |
||||
|
elif script_gen == SCRIPT_GEN_P2SH_SEGWIT: |
||||
|
script_type = self.types.OutputScriptType.PAYTOP2SHWITNESS |
||||
|
else: |
||||
|
script_type = self.types.OutputScriptType.PAYTOMULTISIG |
||||
|
address_n = self.client_class.expand_path("/%d/%d" % index) |
||||
|
pubkeys = [self._make_node_path(xpub, address_n) for xpub in xpubs] |
||||
|
multisig = self.types.MultisigRedeemScriptType( |
||||
|
pubkeys=pubkeys, |
||||
|
signatures=[b''] * len(pubkeys), |
||||
|
m=m) |
||||
|
txoutputtype = self.types.TxOutputType( |
||||
|
multisig=multisig, |
||||
|
amount=amount, |
||||
|
address_n=self.client_class.expand_path(derivation + "/%d/%d" % index), |
||||
|
script_type=script_type) |
||||
|
return txoutputtype |
||||
|
|
||||
|
def create_output_by_address(): |
||||
|
txoutputtype = self.types.TxOutputType() |
||||
|
txoutputtype.amount = amount |
||||
|
if _type == TYPE_SCRIPT: |
||||
|
txoutputtype.script_type = self.types.OutputScriptType.PAYTOOPRETURN |
||||
|
txoutputtype.op_return_data = trezor_validate_op_return_output_and_get_data(o) |
||||
|
elif _type == TYPE_ADDRESS: |
||||
|
txoutputtype.script_type = self.types.OutputScriptType.PAYTOADDRESS |
||||
|
txoutputtype.address = address |
||||
|
return txoutputtype |
||||
|
|
||||
|
outputs = [] |
||||
|
has_change = False |
||||
|
any_output_on_change_branch = is_any_tx_output_on_change_branch(tx) |
||||
|
|
||||
|
for o in tx.outputs(): |
||||
|
_type, address, amount = o.type, o.address, o.value |
||||
|
use_create_by_derivation = False |
||||
|
|
||||
|
info = tx.output_info.get(address) |
||||
|
if info is not None and not has_change: |
||||
|
index, xpubs, m = info |
||||
|
on_change_branch = index[0] == 1 |
||||
|
# prioritise hiding outputs on the 'change' branch from user |
||||
|
# because no more than one change address allowed |
||||
|
# note: ^ restriction can be removed once we require fw |
||||
|
# that has https://github.com/trezor/trezor-mcu/pull/306 |
||||
|
if on_change_branch == any_output_on_change_branch: |
||||
|
use_create_by_derivation = True |
||||
|
has_change = True |
||||
|
|
||||
|
if use_create_by_derivation: |
||||
|
txoutputtype = create_output_by_derivation(info) |
||||
|
else: |
||||
|
txoutputtype = create_output_by_address() |
||||
|
outputs.append(txoutputtype) |
||||
|
|
||||
|
return outputs |
||||
|
|
||||
|
def electrum_tx_to_txtype(self, tx): |
||||
|
t = self.types.TransactionType() |
||||
|
if tx is None: |
||||
|
# probably for segwit input and we don't need this prev txn |
||||
|
return t |
||||
|
d = deserialize(tx.raw) |
||||
|
t.version = d['version'] |
||||
|
t.lock_time = d['lockTime'] |
||||
|
inputs = self.tx_inputs(tx) |
||||
|
t._extend_inputs(inputs) |
||||
|
for vout in d['outputs']: |
||||
|
o = t._add_bin_outputs() |
||||
|
o.amount = vout['value'] |
||||
|
o.script_pubkey = bfh(vout['scriptPubKey']) |
||||
|
return t |
||||
|
|
||||
|
# This function is called from the TREZOR libraries (via tx_api) |
||||
|
def get_tx(self, tx_hash): |
||||
|
tx = self.prev_tx[tx_hash] |
||||
|
return self.electrum_tx_to_txtype(tx) |
@ -0,0 +1,95 @@ |
|||||
|
from electrum.util import PrintError |
||||
|
|
||||
|
|
||||
|
class SafeTTransport(PrintError): |
||||
|
|
||||
|
@staticmethod |
||||
|
def all_transports(): |
||||
|
"""Reimplemented safetlib.transport.all_transports so that we can |
||||
|
enable/disable specific transports. |
||||
|
""" |
||||
|
try: |
||||
|
# only to detect safetlib version |
||||
|
from safetlib.transport import all_transports |
||||
|
except ImportError: |
||||
|
# old safetlib. compat for safetlib < 0.9.2 |
||||
|
transports = [] |
||||
|
#try: |
||||
|
# from safetlib.transport_bridge import BridgeTransport |
||||
|
# transports.append(BridgeTransport) |
||||
|
#except BaseException: |
||||
|
# pass |
||||
|
try: |
||||
|
from safetlib.transport_hid import HidTransport |
||||
|
transports.append(HidTransport) |
||||
|
except BaseException: |
||||
|
pass |
||||
|
try: |
||||
|
from safetlib.transport_udp import UdpTransport |
||||
|
transports.append(UdpTransport) |
||||
|
except BaseException: |
||||
|
pass |
||||
|
try: |
||||
|
from safetlib.transport_webusb import WebUsbTransport |
||||
|
transports.append(WebUsbTransport) |
||||
|
except BaseException: |
||||
|
pass |
||||
|
else: |
||||
|
# new safetlib. |
||||
|
transports = [] |
||||
|
#try: |
||||
|
# from safetlib.transport.bridge import BridgeTransport |
||||
|
# transports.append(BridgeTransport) |
||||
|
#except BaseException: |
||||
|
# pass |
||||
|
try: |
||||
|
from safetlib.transport.hid import HidTransport |
||||
|
transports.append(HidTransport) |
||||
|
except BaseException: |
||||
|
pass |
||||
|
try: |
||||
|
from safetlib.transport.udp import UdpTransport |
||||
|
transports.append(UdpTransport) |
||||
|
except BaseException: |
||||
|
pass |
||||
|
try: |
||||
|
from safetlib.transport.webusb import WebUsbTransport |
||||
|
transports.append(WebUsbTransport) |
||||
|
except BaseException: |
||||
|
pass |
||||
|
return transports |
||||
|
return transports |
||||
|
|
||||
|
def enumerate_devices(self): |
||||
|
"""Just like safetlib.transport.enumerate_devices, |
||||
|
but with exception catching, so that transports can fail separately. |
||||
|
""" |
||||
|
devices = [] |
||||
|
for transport in self.all_transports(): |
||||
|
try: |
||||
|
new_devices = transport.enumerate() |
||||
|
except BaseException as e: |
||||
|
self.print_error('enumerate failed for {}. error {}' |
||||
|
.format(transport.__name__, str(e))) |
||||
|
else: |
||||
|
devices.extend(new_devices) |
||||
|
return devices |
||||
|
|
||||
|
def get_transport(self, path=None): |
||||
|
"""Reimplemented safetlib.transport.get_transport, |
||||
|
(1) for old safetlib |
||||
|
(2) to be able to disable specific transports |
||||
|
(3) to call our own enumerate_devices that catches exceptions |
||||
|
""" |
||||
|
if path is None: |
||||
|
try: |
||||
|
return self.enumerate_devices()[0] |
||||
|
except IndexError: |
||||
|
raise Exception("No Safe-T mini found") from None |
||||
|
|
||||
|
def match_prefix(a, b): |
||||
|
return a.startswith(b) or b.startswith(a) |
||||
|
transports = [t for t in self.all_transports() if match_prefix(path, t.PATH_PREFIX)] |
||||
|
if transports: |
||||
|
return transports[0].find_by_path(path) |
||||
|
raise Exception("Unknown path prefix '%s'" % path) |
After Width: | Height: | Size: 3.8 KiB |
After Width: | Height: | Size: 3.6 KiB |
Loading…
Reference in new issue