commit 08bf966f32219bfec94d3ba942ac921b35053efd
parent aaa0ee75b7603043dd96e352ee07d01e0f315b48
Author: ThomasV <thomasv@electrum.org>
Date: Wed, 7 Feb 2018 17:03:23 +0100
Merge pull request #3863 from slush0/master
trezor: Add support for non-HID devices
Diffstat:
4 files changed, 431 insertions(+), 444 deletions(-)
diff --git a/lib/plugins.py b/lib/plugins.py
@@ -312,6 +312,8 @@ class DeviceMgr(ThreadJob, PrintError):
# What we recognise. Each entry is a (vendor_id, product_id)
# pair.
self.recognised_hardware = set()
+ # Custom enumerate functions for devices we don't know about.
+ self.enumerate_func = set()
# For synchronization
self.lock = threading.RLock()
self.hid_lock = threading.RLock()
@@ -334,6 +336,9 @@ class DeviceMgr(ThreadJob, PrintError):
for pair in device_pairs:
self.recognised_hardware.add(pair)
+ def register_enumerate_func(self, func):
+ self.enumerate_func.add(func)
+
def create_client(self, device, handler, plugin):
# Get from cache first
client = self.client_lookup(device.id_)
@@ -509,6 +514,7 @@ class DeviceMgr(ThreadJob, PrintError):
self.print_error("scanning devices...")
with self.hid_lock:
hid_list = hid.enumerate(0, 0)
+
# First see what's connected that we know about
devices = []
for d in hid_list:
@@ -524,6 +530,10 @@ class DeviceMgr(ThreadJob, PrintError):
devices.append(Device(d['path'], interface_number,
id_, product_key, usage_page))
+ # Let plugin handlers enumerate devices we don't know about
+ for f in self.enumerate_func:
+ devices.extend(f())
+
# Now find out what was disconnected
pairs = [(dev.path, dev.id_) for dev in devices]
disconnected_ids = []
diff --git a/plugins/trezor/plugin.py b/plugins/trezor/plugin.py
@@ -1,424 +0,0 @@
-import threading
-
-from binascii import hexlify, unhexlify
-
-from electrum.util import bfh, bh2u
-from electrum.bitcoin import (b58_address_to_hash160, xpub_from_pubkey,
- TYPE_ADDRESS, TYPE_SCRIPT, NetworkConstants)
-from electrum.i18n import _
-from electrum.plugins import BasePlugin
-from electrum.transaction import deserialize
-from electrum.keystore import Hardware_KeyStore, is_xpubkey, parse_xpubkey
-
-from ..hw_wallet import HW_PluginBase
-
-
-# TREZOR initialization methods
-TIM_NEW, TIM_RECOVER, TIM_MNEMONIC, TIM_PRIVKEY = range(0, 4)
-
-# script "generation"
-SCRIPT_GEN_LEGACY, SCRIPT_GEN_P2SH_SEGWIT, SCRIPT_GEN_NATIVE_SEGWIT = range(0, 3)
-
-class TrezorCompatibleKeyStore(Hardware_KeyStore):
-
- def get_derivation(self):
- return self.derivation
-
- def get_script_gen(self):
- def is_p2sh_segwit():
- return self.derivation.startswith("m/49'/")
-
- def is_native_segwit():
- return self.derivation.startswith("m/84'/")
-
- if is_native_segwit():
- return SCRIPT_GEN_NATIVE_SEGWIT
- elif is_p2sh_segwit():
- return SCRIPT_GEN_P2SH_SEGWIT
- else:
- return SCRIPT_GEN_LEGACY
-
- def get_client(self, force_pair=True):
- return self.plugin.get_client(self, force_pair)
-
- def decrypt_message(self, sequence, message, password):
- raise RuntimeError(_('Encryption and decryption are not implemented by {}').format(self.device))
-
- def sign_message(self, sequence, message, password):
- client = self.get_client()
- address_path = self.get_derivation() + "/%d/%d"%sequence
- address_n = client.expand_path(address_path)
- msg_sig = client.sign_message(self.plugin.get_coin_name(), address_n, message)
- return msg_sig.signature
-
- def sign_transaction(self, tx, password):
- if tx.is_complete():
- return
- # previous transactions used as inputs
- prev_tx = {}
- # path of the xpubs that are involved
- xpub_path = {}
- for txin in tx.inputs():
- pubkeys, x_pubkeys = tx.get_sorted_pubkeys(txin)
- tx_hash = txin['prevout_hash']
- prev_tx[tx_hash] = txin['prev_tx']
- for x_pubkey in x_pubkeys:
- if not is_xpubkey(x_pubkey):
- continue
- xpub, s = parse_xpubkey(x_pubkey)
- if xpub == self.get_master_public_key():
- xpub_path[xpub] = self.get_derivation()
-
- self.plugin.sign_transaction(self, tx, prev_tx, xpub_path)
-
-
-class TrezorCompatiblePlugin(HW_PluginBase):
- # Derived classes provide:
- #
- # class-static variables: client_class, firmware_URL, handler_class,
- # libraries_available, libraries_URL, minimum_firmware,
- # wallet_class, ckd_public, types, HidTransport
-
- MAX_LABEL_LEN = 32
-
- def __init__(self, parent, config, name):
- HW_PluginBase.__init__(self, parent, config, name)
- self.main_thread = threading.current_thread()
- # FIXME: move to base class when Ledger is fixed
- if self.libraries_available:
- self.device_manager().register_devices(self.DEVICE_IDS)
-
- def _try_hid(self, device):
- self.print_error("Trying to connect over USB...")
- try:
- return self.hid_transport(device)
- except BaseException as e:
- # see fdb810ba622dc7dbe1259cbafb5b28e19d2ab114
- # raise
- self.print_error("cannot connect at", device.path, str(e))
- return None
-
- def _try_bridge(self, device):
- self.print_error("Trying to connect over Trezor Bridge...")
- try:
- return self.bridge_transport({'path': hexlify(device.path)})
- except BaseException as e:
- self.print_error("cannot connect to bridge", str(e))
- return None
-
- def create_client(self, device, handler):
- # disable bridge because it seems to never returns if keepkey is plugged
- #transport = self._try_bridge(device) or self._try_hid(device)
- transport = self._try_hid(device)
- if not transport:
- self.print_error("cannot connect to device")
- return
-
- self.print_error("connected to device at", device.path)
-
- client = self.client_class(transport, handler, self)
-
- # Try a ping for device sanity
- try:
- client.ping('t')
- except BaseException as e:
- self.print_error("ping failed", str(e))
- return None
-
- if not client.atleast_version(*self.minimum_firmware):
- msg = (_('Outdated {} firmware for device labelled {}. Please '
- 'download the updated firmware from {}')
- .format(self.device, client.label(), self.firmware_URL))
- self.print_error(msg)
- handler.show_error(msg)
- return None
-
- return client
-
- def get_client(self, keystore, force_pair=True):
- devmgr = self.device_manager()
- handler = keystore.handler
- with devmgr.hid_lock:
- client = devmgr.client_for_keystore(self, handler, keystore, force_pair)
- # returns the client for a given keystore. can use xpub
- if client:
- client.used()
- return client
-
- def get_coin_name(self):
- return "Testnet" if NetworkConstants.TESTNET else "Bitcoin"
-
- def initialize_device(self, device_id, wizard, handler):
- # Initialization method
- msg = _("Choose how you want to initialize your {}.\n\n"
- "The first two methods are secure as no secret information "
- "is entered into your computer.\n\n"
- "For the last two methods you input secrets on your keyboard "
- "and upload them to your {}, and so you should "
- "only do those on a computer you know to be trustworthy "
- "and free of malware."
- ).format(self.device, self.device)
- choices = [
- # Must be short as QT doesn't word-wrap radio button text
- (TIM_NEW, _("Let the device generate a completely new seed randomly")),
- (TIM_RECOVER, _("Recover from a seed you have previously written down")),
- (TIM_MNEMONIC, _("Upload a BIP39 mnemonic to generate the seed")),
- (TIM_PRIVKEY, _("Upload a master private key"))
- ]
- def f(method):
- import threading
- settings = self.request_trezor_init_settings(wizard, method, self.device)
- t = threading.Thread(target = self._initialize_device, args=(settings, method, device_id, wizard, handler))
- t.setDaemon(True)
- t.start()
- wizard.loop.exec_()
- wizard.choice_dialog(title=_('Initialize Device'), message=msg, choices=choices, run_next=f)
-
- def _initialize_device(self, settings, method, device_id, wizard, handler):
- item, label, pin_protection, passphrase_protection = settings
-
- if method == TIM_RECOVER:
- # FIXME the PIN prompt will appear over this message
- # which makes this unreadable
- handler.show_error(_(
- "You will be asked to enter 24 words regardless of your "
- "seed's actual length. If you enter a word incorrectly or "
- "misspell it, you cannot change it or go back - you will need "
- "to start again from the beginning.\n\nSo please enter "
- "the words carefully!"))
-
- language = 'english'
- devmgr = self.device_manager()
- client = devmgr.client_by_id(device_id)
-
- if method == TIM_NEW:
- strength = 64 * (item + 2) # 128, 192 or 256
- u2f_counter = 0
- skip_backup = False
- client.reset_device(True, strength, passphrase_protection,
- pin_protection, label, language,
- u2f_counter, skip_backup)
- elif method == TIM_RECOVER:
- word_count = 6 * (item + 2) # 12, 18 or 24
- client.step = 0
- client.recovery_device(word_count, passphrase_protection,
- pin_protection, label, language)
- elif method == TIM_MNEMONIC:
- pin = pin_protection # It's the pin, not a boolean
- client.load_device_by_mnemonic(str(item), pin,
- passphrase_protection,
- label, language)
- else:
- pin = pin_protection # It's the pin, not a boolean
- client.load_device_by_xprv(item, pin, passphrase_protection,
- label, language)
- wizard.loop.exit(0)
-
- def setup_device(self, device_info, wizard, purpose):
- devmgr = self.device_manager()
- device_id = device_info.device.id_
- client = devmgr.client_by_id(device_id)
- # fixme: we should use: client.handler = wizard
- client.handler = self.create_handler(wizard)
- if not device_info.initialized:
- self.initialize_device(device_id, wizard, client.handler)
- client.get_xpub('m', 'standard')
- client.used()
-
- def get_xpub(self, device_id, derivation, xtype, wizard):
- devmgr = self.device_manager()
- client = devmgr.client_by_id(device_id)
- client.handler = wizard
- xpub = client.get_xpub(derivation, xtype)
- client.used()
- return xpub
-
- def sign_transaction(self, keystore, tx, prev_tx, xpub_path):
- self.prev_tx = prev_tx
- self.xpub_path = xpub_path
- client = self.get_client(keystore)
- inputs = self.tx_inputs(tx, True, keystore.get_script_gen())
- outputs = self.tx_outputs(keystore.get_derivation(), tx, keystore.get_script_gen())
- signed_tx = client.sign_tx(self.get_coin_name(), inputs, outputs, lock_time=tx.locktime)[1]
- raw = bh2u(signed_tx)
- tx.update_signatures(raw)
-
- def show_address(self, wallet, keystore, address):
- client = self.get_client(keystore)
- if not client.atleast_version(1, 3):
- keystore.handler.show_error(_("Your device firmware is too old"))
- return
- change, index = wallet.get_address_index(address)
- derivation = keystore.derivation
- address_path = "%s/%d/%d"%(derivation, change, index)
- address_n = client.expand_path(address_path)
- xpubs = wallet.get_master_public_keys()
- if len(xpubs) == 1:
- script_gen = keystore.get_script_gen()
- if script_gen == SCRIPT_GEN_NATIVE_SEGWIT:
- script_type = self.types.InputScriptType.SPENDWITNESS
- elif script_gen == SCRIPT_GEN_P2SH_SEGWIT:
- script_type = self.types.InputScriptType.SPENDP2SHWITNESS
- else:
- script_type = self.types.InputScriptType.SPENDADDRESS
- client.get_address(self.get_coin_name(), address_n, True, script_type=script_type)
- else:
- def f(xpub):
- node = self.ckd_public.deserialize(xpub)
- return self.types.HDNodePathType(node=node, address_n=[change, index])
- pubkeys = wallet.get_public_keys(address)
- # sort xpubs using the order of pubkeys
- sorted_pubkeys, sorted_xpubs = zip(*sorted(zip(pubkeys, xpubs)))
- pubkeys = list(map(f, sorted_xpubs))
- multisig = self.types.MultisigRedeemScriptType(
- pubkeys=pubkeys,
- signatures=[b''] * wallet.n,
- m=wallet.m,
- )
- client.get_address(self.get_coin_name(), address_n, True, multisig=multisig)
-
- def tx_inputs(self, tx, for_sig=False, script_gen=SCRIPT_GEN_LEGACY):
- inputs = []
- for txin in tx.inputs():
- txinputtype = self.types.TxInputType()
- if txin['type'] == 'coinbase':
- prev_hash = "\0"*32
- prev_index = 0xffffffff # signed int -1
- else:
- if for_sig:
- x_pubkeys = txin['x_pubkeys']
- if len(x_pubkeys) == 1:
- x_pubkey = x_pubkeys[0]
- xpub, s = parse_xpubkey(x_pubkey)
- xpub_n = self.client_class.expand_path(self.xpub_path[xpub])
- txinputtype._extend_address_n(xpub_n + s)
- if script_gen == SCRIPT_GEN_NATIVE_SEGWIT:
- txinputtype.script_type = self.types.InputScriptType.SPENDWITNESS
- elif script_gen == SCRIPT_GEN_P2SH_SEGWIT:
- txinputtype.script_type = self.types.InputScriptType.SPENDP2SHWITNESS
- else:
- txinputtype.script_type = self.types.InputScriptType.SPENDADDRESS
- else:
- def f(x_pubkey):
- if is_xpubkey(x_pubkey):
- xpub, s = parse_xpubkey(x_pubkey)
- else:
- xpub = xpub_from_pubkey(0, bfh(x_pubkey))
- s = []
- node = self.ckd_public.deserialize(xpub)
- return self.types.HDNodePathType(node=node, address_n=s)
- pubkeys = list(map(f, x_pubkeys))
- multisig = self.types.MultisigRedeemScriptType(
- pubkeys=pubkeys,
- signatures=list(map(lambda x: bfh(x)[:-1] if x else b'', txin.get('signatures'))),
- m=txin.get('num_sig'),
- )
- if script_gen == SCRIPT_GEN_NATIVE_SEGWIT:
- script_type = self.types.InputScriptType.SPENDWITNESS
- elif script_gen == SCRIPT_GEN_P2SH_SEGWIT:
- script_type = self.types.InputScriptType.SPENDP2SHWITNESS
- else:
- script_type = self.types.InputScriptType.SPENDMULTISIG
- txinputtype = self.types.TxInputType(
- script_type=script_type,
- multisig=multisig
- )
- # find which key is mine
- for x_pubkey in x_pubkeys:
- if is_xpubkey(x_pubkey):
- xpub, s = parse_xpubkey(x_pubkey)
- if xpub in self.xpub_path:
- xpub_n = self.client_class.expand_path(self.xpub_path[xpub])
- txinputtype._extend_address_n(xpub_n + s)
- break
-
- prev_hash = unhexlify(txin['prevout_hash'])
- prev_index = txin['prevout_n']
-
- if 'value' in txin:
- txinputtype.amount = txin['value']
- txinputtype.prev_hash = prev_hash
- txinputtype.prev_index = prev_index
-
- if 'scriptSig' in txin:
- script_sig = bfh(txin['scriptSig'])
- txinputtype.script_sig = script_sig
-
- txinputtype.sequence = txin.get('sequence', 0xffffffff - 1)
-
- inputs.append(txinputtype)
-
- return inputs
-
- def tx_outputs(self, derivation, tx, script_gen=SCRIPT_GEN_LEGACY):
- outputs = []
- has_change = False
-
- for _type, address, amount in tx.outputs():
- info = tx.output_info.get(address)
- if info is not None and not has_change:
- has_change = True # no more than one change address
- index, xpubs, m = info
- if len(xpubs) == 1:
- if script_gen == SCRIPT_GEN_NATIVE_SEGWIT:
- script_type = self.types.OutputScriptType.PAYTOWITNESS
- elif script_gen == SCRIPT_GEN_P2SH_SEGWIT:
- script_type = self.types.OutputScriptType.PAYTOP2SHWITNESS
- else:
- script_type = self.types.OutputScriptType.PAYTOADDRESS
- address_n = self.client_class.expand_path(derivation + "/%d/%d"%index)
- txoutputtype = self.types.TxOutputType(
- amount = amount,
- script_type = script_type,
- address_n = address_n,
- )
- else:
- if script_gen == SCRIPT_GEN_NATIVE_SEGWIT:
- script_type = self.types.OutputScriptType.PAYTOWITNESS
- elif script_gen == SCRIPT_GEN_P2SH_SEGWIT:
- script_type = self.types.OutputScriptType.PAYTOP2SHWITNESS
- else:
- script_type = self.types.OutputScriptType.PAYTOMULTISIG
- address_n = self.client_class.expand_path("/%d/%d"%index)
- nodes = map(self.ckd_public.deserialize, xpubs)
- pubkeys = [ self.types.HDNodePathType(node=node, address_n=address_n) for node in nodes]
- multisig = self.types.MultisigRedeemScriptType(
- pubkeys = pubkeys,
- signatures = [b''] * len(pubkeys),
- m = m)
- txoutputtype = self.types.TxOutputType(
- multisig = multisig,
- amount = amount,
- address_n = self.client_class.expand_path(derivation + "/%d/%d"%index),
- script_type = script_type)
- else:
- txoutputtype = self.types.TxOutputType()
- txoutputtype.amount = amount
- if _type == TYPE_SCRIPT:
- txoutputtype.script_type = self.types.OutputScriptType.PAYTOOPRETURN
- txoutputtype.op_return_data = address[2:]
- elif _type == TYPE_ADDRESS:
- txoutputtype.script_type = self.types.OutputScriptType.PAYTOADDRESS
- txoutputtype.address = address
-
- outputs.append(txoutputtype)
-
- return outputs
-
- def electrum_tx_to_txtype(self, tx):
- t = self.types.TransactionType()
- d = deserialize(tx.raw)
- t.version = d['version']
- t.lock_time = d['lockTime']
- inputs = self.tx_inputs(tx)
- t._extend_inputs(inputs)
- for vout in d['outputs']:
- o = t._add_bin_outputs()
- o.amount = vout['value']
- o.script_pubkey = bfh(vout['scriptPubKey'])
- return t
-
- # This function is called from the trezor libraries (via tx_api)
- def get_tx(self, tx_hash):
- tx = self.prev_tx[tx_hash]
- return self.electrum_tx_to_txtype(tx)
diff --git a/plugins/trezor/qt_generic.py b/plugins/trezor/qt_generic.py
@@ -5,7 +5,7 @@ from PyQt5.Qt import Qt
from PyQt5.Qt import QGridLayout, QInputDialog, QPushButton
from PyQt5.Qt import QVBoxLayout, QLabel
from electrum_gui.qt.util import *
-from .plugin import TIM_NEW, TIM_RECOVER, TIM_MNEMONIC
+from .trezor import TIM_NEW, TIM_RECOVER, TIM_MNEMONIC
from ..hw_wallet.qt import QtHandlerBase, QtPluginBase
from electrum.i18n import _
diff --git a/plugins/trezor/trezor.py b/plugins/trezor/trezor.py
@@ -1,36 +1,437 @@
-from .plugin import TrezorCompatiblePlugin, TrezorCompatibleKeyStore
+import threading
+from binascii import hexlify, unhexlify
-class TrezorKeyStore(TrezorCompatibleKeyStore):
+from electrum.util import bfh, bh2u
+from electrum.bitcoin import (b58_address_to_hash160, xpub_from_pubkey,
+ TYPE_ADDRESS, TYPE_SCRIPT, NetworkConstants)
+from electrum.i18n import _
+from electrum.plugins import BasePlugin, Device
+from electrum.transaction import deserialize
+from electrum.keystore import Hardware_KeyStore, is_xpubkey, parse_xpubkey
+
+from ..hw_wallet import HW_PluginBase
+
+
+# TREZOR initialization methods
+TIM_NEW, TIM_RECOVER, TIM_MNEMONIC, TIM_PRIVKEY = range(0, 4)
+
+# script "generation"
+SCRIPT_GEN_LEGACY, SCRIPT_GEN_P2SH_SEGWIT, SCRIPT_GEN_NATIVE_SEGWIT = range(0, 3)
+
+
+class TrezorKeyStore(Hardware_KeyStore):
hw_type = 'trezor'
device = 'TREZOR'
-class TrezorPlugin(TrezorCompatiblePlugin):
+ def get_derivation(self):
+ return self.derivation
+
+ def get_script_gen(self):
+ def is_p2sh_segwit():
+ return self.derivation.startswith("m/49'/")
+
+ def is_native_segwit():
+ return self.derivation.startswith("m/84'/")
+
+ if is_native_segwit():
+ return SCRIPT_GEN_NATIVE_SEGWIT
+ elif is_p2sh_segwit():
+ return SCRIPT_GEN_P2SH_SEGWIT
+ else:
+ return SCRIPT_GEN_LEGACY
+
+ def get_client(self, force_pair=True):
+ return self.plugin.get_client(self, force_pair)
+
+ def decrypt_message(self, sequence, message, password):
+ raise RuntimeError(_('Encryption and decryption are not implemented by {}').format(self.device))
+
+ def sign_message(self, sequence, message, password):
+ client = self.get_client()
+ address_path = self.get_derivation() + "/%d/%d"%sequence
+ address_n = client.expand_path(address_path)
+ msg_sig = client.sign_message(self.plugin.get_coin_name(), address_n, message)
+ return msg_sig.signature
+
+ def sign_transaction(self, tx, password):
+ if tx.is_complete():
+ return
+ # previous transactions used as inputs
+ prev_tx = {}
+ # path of the xpubs that are involved
+ xpub_path = {}
+ for txin in tx.inputs():
+ pubkeys, x_pubkeys = tx.get_sorted_pubkeys(txin)
+ tx_hash = txin['prevout_hash']
+ prev_tx[tx_hash] = txin['prev_tx']
+ for x_pubkey in x_pubkeys:
+ if not is_xpubkey(x_pubkey):
+ continue
+ xpub, s = parse_xpubkey(x_pubkey)
+ if xpub == self.get_master_public_key():
+ xpub_path[xpub] = self.get_derivation()
+
+ self.plugin.sign_transaction(self, tx, prev_tx, xpub_path)
+
+
+class TrezorPlugin(HW_PluginBase):
+ # Derived classes provide:
+ #
+ # class-static variables: client_class, firmware_URL, handler_class,
+ # libraries_available, libraries_URL, minimum_firmware,
+ # wallet_class, ckd_public, types
+
firmware_URL = 'https://wallet.trezor.io'
libraries_URL = 'https://github.com/trezor/python-trezor'
minimum_firmware = (1, 5, 2)
keystore_class = TrezorKeyStore
- def __init__(self, *args):
+ MAX_LABEL_LEN = 32
+
+ def __init__(self, parent, config, name):
+ HW_PluginBase.__init__(self, parent, config, name)
+ self.main_thread = threading.current_thread()
+
try:
- from . import client
+ # Minimal test if python-trezor is installed
import trezorlib
- import trezorlib.ckd_public
- import trezorlib.transport_hid
- import trezorlib.messages
- self.client_class = client.TrezorClient
- self.ckd_public = trezorlib.ckd_public
- self.types = trezorlib.messages
- self.DEVICE_IDS = (trezorlib.transport_hid.DEV_TREZOR1, trezorlib.transport_hid.DEV_TREZOR2)
self.libraries_available = True
except ImportError:
self.libraries_available = False
- TrezorCompatiblePlugin.__init__(self, *args)
+ return
+
+ from . import client
+ import trezorlib.ckd_public
+ import trezorlib.messages
+ self.client_class = client.TrezorClient
+ self.ckd_public = trezorlib.ckd_public
+ self.types = trezorlib.messages
+ self.DEVICE_IDS = ('TREZOR',)
+
+ self.device_manager().register_enumerate_func(self.enumerate)
+
+ def enumerate(self):
+ from trezorlib.device import TrezorDevice
+ return [Device(d.get_path(), -1, d.get_path(), 'TREZOR', 0) for d in TrezorDevice.enumerate()]
+
+ def create_client(self, device, handler):
+ from trezorlib.device import TrezorDevice
+ try:
+ self.print_error("connecting to device at", device.path)
+ transport = TrezorDevice.find_by_path(device.path)
+ except BaseException as e:
+ self.print_error("cannot connect at", device.path, str(e))
+ return None
+
+ if not transport:
+ self.print_error("cannot connect at", device.path)
+ return
+
+ self.print_error("connected to device at", device.path)
+ client = self.client_class(transport, handler, self)
+
+ # Try a ping for device sanity
+ try:
+ client.ping('t')
+ except BaseException as e:
+ self.print_error("ping failed", str(e))
+ return None
+
+ if not client.atleast_version(*self.minimum_firmware):
+ msg = (_('Outdated {} firmware for device labelled {}. Please '
+ 'download the updated firmware from {}')
+ .format(self.device, client.label(), self.firmware_URL))
+ self.print_error(msg)
+ handler.show_error(msg)
+ return None
+
+ return client
+
+ def get_client(self, keystore, force_pair=True):
+ devmgr = self.device_manager()
+ handler = keystore.handler
+ with devmgr.hid_lock:
+ client = devmgr.client_for_keystore(self, handler, keystore, force_pair)
+ # returns the client for a given keystore. can use xpub
+ if client:
+ client.used()
+ return client
+
+ def get_coin_name(self):
+ return "Testnet" if NetworkConstants.TESTNET else "Bitcoin"
+
+ def initialize_device(self, device_id, wizard, handler):
+ # Initialization method
+ msg = _("Choose how you want to initialize your {}.\n\n"
+ "The first two methods are secure as no secret information "
+ "is entered into your computer.\n\n"
+ "For the last two methods you input secrets on your keyboard "
+ "and upload them to your {}, and so you should "
+ "only do those on a computer you know to be trustworthy "
+ "and free of malware."
+ ).format(self.device, self.device)
+ choices = [
+ # Must be short as QT doesn't word-wrap radio button text
+ (TIM_NEW, _("Let the device generate a completely new seed randomly")),
+ (TIM_RECOVER, _("Recover from a seed you have previously written down")),
+ (TIM_MNEMONIC, _("Upload a BIP39 mnemonic to generate the seed")),
+ (TIM_PRIVKEY, _("Upload a master private key"))
+ ]
+ def f(method):
+ import threading
+ settings = self.request_trezor_init_settings(wizard, method, self.device)
+ t = threading.Thread(target = self._initialize_device, args=(settings, method, device_id, wizard, handler))
+ t.setDaemon(True)
+ t.start()
+ wizard.loop.exec_()
+ wizard.choice_dialog(title=_('Initialize Device'), message=msg, choices=choices, run_next=f)
+
+ def _initialize_device(self, settings, method, device_id, wizard, handler):
+ item, label, pin_protection, passphrase_protection = settings
+
+ if method == TIM_RECOVER:
+ # FIXME the PIN prompt will appear over this message
+ # which makes this unreadable
+ handler.show_error(_(
+ "You will be asked to enter 24 words regardless of your "
+ "seed's actual length. If you enter a word incorrectly or "
+ "misspell it, you cannot change it or go back - you will need "
+ "to start again from the beginning.\n\nSo please enter "
+ "the words carefully!"))
+
+ language = 'english'
+ devmgr = self.device_manager()
+ client = devmgr.client_by_id(device_id)
+
+ if method == TIM_NEW:
+ strength = 64 * (item + 2) # 128, 192 or 256
+ u2f_counter = 0
+ skip_backup = False
+ client.reset_device(True, strength, passphrase_protection,
+ pin_protection, label, language,
+ u2f_counter, skip_backup)
+ elif method == TIM_RECOVER:
+ word_count = 6 * (item + 2) # 12, 18 or 24
+ client.step = 0
+ client.recovery_device(word_count, passphrase_protection,
+ pin_protection, label, language)
+ elif method == TIM_MNEMONIC:
+ pin = pin_protection # It's the pin, not a boolean
+ client.load_device_by_mnemonic(str(item), pin,
+ passphrase_protection,
+ label, language)
+ else:
+ pin = pin_protection # It's the pin, not a boolean
+ client.load_device_by_xprv(item, pin, passphrase_protection,
+ label, language)
+ wizard.loop.exit(0)
+
+ def setup_device(self, device_info, wizard, purpose):
+ devmgr = self.device_manager()
+ device_id = device_info.device.id_
+ client = devmgr.client_by_id(device_id)
+ # fixme: we should use: client.handler = wizard
+ client.handler = self.create_handler(wizard)
+ if not device_info.initialized:
+ self.initialize_device(device_id, wizard, client.handler)
+ client.get_xpub('m', 'standard')
+ client.used()
+
+ def get_xpub(self, device_id, derivation, xtype, wizard):
+ devmgr = self.device_manager()
+ client = devmgr.client_by_id(device_id)
+ client.handler = wizard
+ xpub = client.get_xpub(derivation, xtype)
+ client.used()
+ return xpub
+
+ def sign_transaction(self, keystore, tx, prev_tx, xpub_path):
+ self.prev_tx = prev_tx
+ self.xpub_path = xpub_path
+ client = self.get_client(keystore)
+ inputs = self.tx_inputs(tx, True, keystore.get_script_gen())
+ outputs = self.tx_outputs(keystore.get_derivation(), tx, keystore.get_script_gen())
+ signed_tx = client.sign_tx(self.get_coin_name(), inputs, outputs, lock_time=tx.locktime)[1]
+ raw = bh2u(signed_tx)
+ tx.update_signatures(raw)
+
+ def show_address(self, wallet, keystore, address):
+ client = self.get_client(keystore)
+ if not client.atleast_version(1, 3):
+ keystore.handler.show_error(_("Your device firmware is too old"))
+ return
+ change, index = wallet.get_address_index(address)
+ derivation = keystore.derivation
+ address_path = "%s/%d/%d"%(derivation, change, index)
+ address_n = client.expand_path(address_path)
+ xpubs = wallet.get_master_public_keys()
+ if len(xpubs) == 1:
+ script_gen = keystore.get_script_gen()
+ if script_gen == SCRIPT_GEN_NATIVE_SEGWIT:
+ script_type = self.types.InputScriptType.SPENDWITNESS
+ elif script_gen == SCRIPT_GEN_P2SH_SEGWIT:
+ script_type = self.types.InputScriptType.SPENDP2SHWITNESS
+ else:
+ script_type = self.types.InputScriptType.SPENDADDRESS
+ client.get_address(self.get_coin_name(), address_n, True, script_type=script_type)
+ else:
+ def f(xpub):
+ node = self.ckd_public.deserialize(xpub)
+ return self.types.HDNodePathType(node=node, address_n=[change, index])
+ pubkeys = wallet.get_public_keys(address)
+ # sort xpubs using the order of pubkeys
+ sorted_pubkeys, sorted_xpubs = zip(*sorted(zip(pubkeys, xpubs)))
+ pubkeys = list(map(f, sorted_xpubs))
+ multisig = self.types.MultisigRedeemScriptType(
+ pubkeys=pubkeys,
+ signatures=[b''] * wallet.n,
+ m=wallet.m,
+ )
+ client.get_address(self.get_coin_name(), address_n, True, multisig=multisig)
+
+ def tx_inputs(self, tx, for_sig=False, script_gen=SCRIPT_GEN_LEGACY):
+ inputs = []
+ for txin in tx.inputs():
+ txinputtype = self.types.TxInputType()
+ if txin['type'] == 'coinbase':
+ prev_hash = "\0"*32
+ prev_index = 0xffffffff # signed int -1
+ else:
+ if for_sig:
+ x_pubkeys = txin['x_pubkeys']
+ if len(x_pubkeys) == 1:
+ x_pubkey = x_pubkeys[0]
+ xpub, s = parse_xpubkey(x_pubkey)
+ xpub_n = self.client_class.expand_path(self.xpub_path[xpub])
+ txinputtype._extend_address_n(xpub_n + s)
+ if script_gen == SCRIPT_GEN_NATIVE_SEGWIT:
+ txinputtype.script_type = self.types.InputScriptType.SPENDWITNESS
+ elif script_gen == SCRIPT_GEN_P2SH_SEGWIT:
+ txinputtype.script_type = self.types.InputScriptType.SPENDP2SHWITNESS
+ else:
+ txinputtype.script_type = self.types.InputScriptType.SPENDADDRESS
+ else:
+ def f(x_pubkey):
+ if is_xpubkey(x_pubkey):
+ xpub, s = parse_xpubkey(x_pubkey)
+ else:
+ xpub = xpub_from_pubkey(0, bfh(x_pubkey))
+ s = []
+ node = self.ckd_public.deserialize(xpub)
+ return self.types.HDNodePathType(node=node, address_n=s)
+ pubkeys = list(map(f, x_pubkeys))
+ multisig = self.types.MultisigRedeemScriptType(
+ pubkeys=pubkeys,
+ signatures=list(map(lambda x: bfh(x)[:-1] if x else b'', txin.get('signatures'))),
+ m=txin.get('num_sig'),
+ )
+ if script_gen == SCRIPT_GEN_NATIVE_SEGWIT:
+ script_type = self.types.InputScriptType.SPENDWITNESS
+ elif script_gen == SCRIPT_GEN_P2SH_SEGWIT:
+ script_type = self.types.InputScriptType.SPENDP2SHWITNESS
+ else:
+ script_type = self.types.InputScriptType.SPENDMULTISIG
+ txinputtype = self.types.TxInputType(
+ script_type=script_type,
+ multisig=multisig
+ )
+ # find which key is mine
+ for x_pubkey in x_pubkeys:
+ if is_xpubkey(x_pubkey):
+ xpub, s = parse_xpubkey(x_pubkey)
+ if xpub in self.xpub_path:
+ xpub_n = self.client_class.expand_path(self.xpub_path[xpub])
+ txinputtype._extend_address_n(xpub_n + s)
+ break
+
+ prev_hash = unhexlify(txin['prevout_hash'])
+ prev_index = txin['prevout_n']
+
+ if 'value' in txin:
+ txinputtype.amount = txin['value']
+ txinputtype.prev_hash = prev_hash
+ txinputtype.prev_index = prev_index
+
+ if 'scriptSig' in txin:
+ script_sig = bfh(txin['scriptSig'])
+ txinputtype.script_sig = script_sig
+
+ txinputtype.sequence = txin.get('sequence', 0xffffffff - 1)
+
+ inputs.append(txinputtype)
+
+ return inputs
+
+ def tx_outputs(self, derivation, tx, script_gen=SCRIPT_GEN_LEGACY):
+ outputs = []
+ has_change = False
+
+ for _type, address, amount in tx.outputs():
+ info = tx.output_info.get(address)
+ if info is not None and not has_change:
+ has_change = True # no more than one change address
+ index, xpubs, m = info
+ if len(xpubs) == 1:
+ if script_gen == SCRIPT_GEN_NATIVE_SEGWIT:
+ script_type = self.types.OutputScriptType.PAYTOWITNESS
+ elif script_gen == SCRIPT_GEN_P2SH_SEGWIT:
+ script_type = self.types.OutputScriptType.PAYTOP2SHWITNESS
+ else:
+ script_type = self.types.OutputScriptType.PAYTOADDRESS
+ address_n = self.client_class.expand_path(derivation + "/%d/%d"%index)
+ txoutputtype = self.types.TxOutputType(
+ amount = amount,
+ script_type = script_type,
+ address_n = address_n,
+ )
+ else:
+ if script_gen == SCRIPT_GEN_NATIVE_SEGWIT:
+ script_type = self.types.OutputScriptType.PAYTOWITNESS
+ elif script_gen == SCRIPT_GEN_P2SH_SEGWIT:
+ script_type = self.types.OutputScriptType.PAYTOP2SHWITNESS
+ else:
+ script_type = self.types.OutputScriptType.PAYTOMULTISIG
+ address_n = self.client_class.expand_path("/%d/%d"%index)
+ nodes = map(self.ckd_public.deserialize, xpubs)
+ pubkeys = [ self.types.HDNodePathType(node=node, address_n=address_n) for node in nodes]
+ multisig = self.types.MultisigRedeemScriptType(
+ pubkeys = pubkeys,
+ signatures = [b''] * len(pubkeys),
+ m = m)
+ txoutputtype = self.types.TxOutputType(
+ multisig = multisig,
+ amount = amount,
+ address_n = self.client_class.expand_path(derivation + "/%d/%d"%index),
+ script_type = script_type)
+ else:
+ txoutputtype = self.types.TxOutputType()
+ txoutputtype.amount = amount
+ if _type == TYPE_SCRIPT:
+ txoutputtype.script_type = self.types.OutputScriptType.PAYTOOPRETURN
+ txoutputtype.op_return_data = address[2:]
+ elif _type == TYPE_ADDRESS:
+ txoutputtype.script_type = self.types.OutputScriptType.PAYTOADDRESS
+ txoutputtype.address = address
+
+ outputs.append(txoutputtype)
+
+ return outputs
- def hid_transport(self, device):
- from trezorlib.transport_hid import HidTransport
- return HidTransport.find_by_path(device.path)
+ def electrum_tx_to_txtype(self, tx):
+ t = self.types.TransactionType()
+ d = deserialize(tx.raw)
+ t.version = d['version']
+ t.lock_time = d['lockTime']
+ inputs = self.tx_inputs(tx)
+ t._extend_inputs(inputs)
+ for vout in d['outputs']:
+ o = t._add_bin_outputs()
+ o.amount = vout['value']
+ o.script_pubkey = bfh(vout['scriptPubKey'])
+ return t
- def bridge_transport(self, d):
- from trezorlib.transport_bridge import BridgeTransport
- return BridgeTransport(d)
+ # This function is called from the trezor libraries (via tx_api)
+ def get_tx(self, tx_hash):
+ tx = self.prev_tx[tx_hash]
+ return self.electrum_tx_to_txtype(tx)