You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
423 lines
16 KiB
423 lines
16 KiB
import re |
|
import time |
|
|
|
from binascii import unhexlify |
|
from struct import pack |
|
|
|
from electrum.account import BIP32_Account |
|
from electrum.bitcoin import (bc_address_to_hash_160, xpub_from_pubkey, |
|
EncodeBase58Check) |
|
from electrum.i18n import _ |
|
from electrum.plugins import BasePlugin, hook |
|
from electrum.transaction import (deserialize, is_extended_pubkey, |
|
Transaction, x_to_xpub) |
|
from electrum.wallet import BIP32_HD_Wallet, BIP44_Wallet |
|
from electrum.util import ThreadJob |
|
from electrum.plugins import DeviceMgr |
|
|
|
class DeviceDisconnectedError(Exception): |
|
pass |
|
|
|
class OutdatedFirmwareError(Exception): |
|
pass |
|
|
|
class TrezorCompatibleWallet(BIP44_Wallet): |
|
# Extend BIP44 Wallet as required by hardware implementation. |
|
# Derived classes must set: |
|
# - device |
|
# - DEVICE_IDS |
|
# - wallet_type |
|
|
|
restore_wallet_class = BIP44_Wallet |
|
|
|
def __init__(self, storage): |
|
BIP44_Wallet.__init__(self, storage) |
|
# This is set when paired with a device, and used to re-pair |
|
# a device that is disconnected and re-connected |
|
self.device_id = None |
|
# After timeout seconds we clear the device session |
|
self.session_timeout = storage.get('session_timeout', 180) |
|
# Errors and other user interaction is done through the wallet's |
|
# handler. The handler is per-window and preserved across |
|
# device reconnects |
|
self.handler = None |
|
|
|
def set_session_timeout(self, seconds): |
|
self.print_error("setting session timeout to %d seconds" % seconds) |
|
self.session_timeout = seconds |
|
self.storage.put('session_timeout', seconds) |
|
|
|
def disconnected(self): |
|
'''A device paired with the wallet was diconnected. Note this is |
|
called in the context of the Plugins thread.''' |
|
self.print_error("disconnected") |
|
self.handler.watching_only_changed() |
|
|
|
def connected(self): |
|
'''A device paired with the wallet was (re-)connected. Note this |
|
is called in the context of the Plugins thread.''' |
|
self.print_error("connected") |
|
self.handler.watching_only_changed() |
|
|
|
def wiped(self): |
|
self.print_error("wiped") |
|
self.handler.watching_only_changed() |
|
|
|
def timeout(self): |
|
'''Informs the wallet it timed out. Note this is called from |
|
the Plugins thread.''' |
|
self.print_error("timed out") |
|
|
|
def get_action(self): |
|
pass |
|
|
|
def can_create_accounts(self): |
|
return True |
|
|
|
def can_export(self): |
|
return False |
|
|
|
def is_watching_only(self): |
|
'''The wallet is watching-only if its trezor device is not connected, |
|
or if it is connected but uninitialized.''' |
|
assert not self.has_seed() |
|
client = self.get_client(DeviceMgr.CACHED) |
|
return not (client and client.is_initialized()) |
|
|
|
def can_change_password(self): |
|
return False |
|
|
|
def get_client(self, lookup=DeviceMgr.PAIRED): |
|
return self.plugin.get_client(self, lookup) |
|
|
|
def first_address(self): |
|
'''Used to check a hardware wallet matches a software wallet''' |
|
account = self.accounts.get('0') |
|
derivation = self.address_derivation('0', 0, 0) |
|
return (account.first_address()[0] if account else None, derivation) |
|
|
|
def derive_xkeys(self, root, derivation, password): |
|
if self.master_public_keys.get(root): |
|
return BIP44_wallet.derive_xkeys(self, root, derivation, password) |
|
|
|
# When creating a wallet we need to ask the device for the |
|
# master public key |
|
derivation = derivation.replace(self.root_name, self.prefix() + "/") |
|
xpub = self.get_public_key(derivation) |
|
return xpub, None |
|
|
|
def get_public_key(self, bip32_path): |
|
client = self.get_client() |
|
address_n = client.expand_path(bip32_path) |
|
node = client.get_public_node(address_n).node |
|
xpub = ("0488B21E".decode('hex') + chr(node.depth) |
|
+ self.i4b(node.fingerprint) + self.i4b(node.child_num) |
|
+ node.chain_code + node.public_key) |
|
return EncodeBase58Check(xpub) |
|
|
|
def i4b(self, x): |
|
return pack('>I', x) |
|
|
|
def decrypt_message(self, pubkey, message, password): |
|
raise RuntimeError(_('Decrypt method is not implemented')) |
|
|
|
def sign_message(self, address, message, password): |
|
client = self.get_client() |
|
address_path = self.address_id(address) |
|
address_n = client.expand_path(address_path) |
|
msg_sig = client.sign_message('Bitcoin', address_n, message) |
|
return msg_sig.signature |
|
|
|
def sign_transaction(self, tx, password): |
|
if tx.is_complete() or self.is_watching_only(): |
|
return |
|
# previous transactions used as inputs |
|
prev_tx = {} |
|
# path of the xpubs that are involved |
|
xpub_path = {} |
|
for txin in tx.inputs: |
|
tx_hash = txin['prevout_hash'] |
|
|
|
ptx = self.transactions.get(tx_hash) |
|
if ptx is None: |
|
ptx = self.network.synchronous_get(('blockchain.transaction.get', [tx_hash])) |
|
ptx = Transaction(ptx) |
|
prev_tx[tx_hash] = ptx |
|
|
|
for x_pubkey in txin['x_pubkeys']: |
|
if not is_extended_pubkey(x_pubkey): |
|
continue |
|
xpub = x_to_xpub(x_pubkey) |
|
for k, v in self.master_public_keys.items(): |
|
if v == xpub: |
|
acc_id = re.match("x/(\d+)'", k).group(1) |
|
xpub_path[xpub] = self.account_derivation(acc_id) |
|
|
|
self.plugin.sign_transaction(self, tx, prev_tx, xpub_path) |
|
|
|
|
|
class TrezorCompatiblePlugin(BasePlugin, ThreadJob): |
|
# Derived classes provide: |
|
# |
|
# class-static variables: client_class, firmware_URL, handler_class, |
|
# libraries_available, libraries_URL, minimum_firmware, |
|
# wallet_class, ckd_public, types, HidTransport |
|
|
|
def __init__(self, parent, config, name): |
|
BasePlugin.__init__(self, parent, config, name) |
|
self.device = self.wallet_class.device |
|
self.wallet_class.plugin = self |
|
self.prevent_timeout = time.time() + 3600 * 24 * 365 |
|
self.device_manager().register_devices(self, self.DEVICE_IDS) |
|
|
|
def is_enabled(self): |
|
return self.libraries_available |
|
|
|
def device_manager(self): |
|
return self.parent.device_manager |
|
|
|
def thread_jobs(self): |
|
# Thread job to handle device timeouts |
|
return [self] if self.libraries_available else [] |
|
|
|
def run(self): |
|
'''Handle device timeouts. Runs in the context of the Plugins |
|
thread.''' |
|
now = time.time() |
|
for wallet in self.device_manager().paired_wallets(): |
|
if (isinstance(wallet, self.wallet_class) |
|
and hasattr(wallet, 'last_operation') |
|
and now > wallet.last_operation + wallet.session_timeout): |
|
client = self.get_client(wallet, DeviceMgr.CACHED) |
|
if client: |
|
wallet.last_operation = self.prevent_timeout |
|
client.clear_session() |
|
wallet.timeout() |
|
|
|
def create_client(self, path, product_key): |
|
pair = ((None, path) if self.HidTransport._detect_debuglink(path) |
|
else (path, None)) |
|
try: |
|
transport = self.HidTransport(pair) |
|
except BaseException as e: |
|
# We were probably just disconnected; never mind |
|
self.print_error("cannot connect at", path, str(e)) |
|
return None |
|
self.print_error("connected to device at", path) |
|
return self.client_class(transport, path, self) |
|
|
|
def get_client(self, wallet, lookup=DeviceMgr.PAIRED, check_firmware=True): |
|
'''check_firmware is ignored unless doing a PAIRED lookup.''' |
|
client = self.device_manager().get_client(wallet, lookup) |
|
|
|
# Try a ping if doing at least a PRESENT lookup |
|
if client and lookup != DeviceMgr.CACHED: |
|
self.print_error("set last_operation") |
|
wallet.last_operation = time.time() |
|
try: |
|
client.ping('t') |
|
except BaseException as e: |
|
self.print_error("ping failed", str(e)) |
|
# Remove it from the manager's cache |
|
self.device_manager().close_client(client) |
|
client = None |
|
|
|
if lookup == DeviceMgr.PAIRED: |
|
assert wallet.handler |
|
if not client: |
|
msg = (_('Could not connect to your %s. Verify the ' |
|
'cable is connected and that no other app is ' |
|
'using it.\nContinuing in watching-only mode ' |
|
'until the device is re-connected.') % self.device) |
|
wallet.handler.show_error(msg) |
|
raise DeviceDisconnectedError(msg) |
|
|
|
if (check_firmware and not |
|
client.atleast_version(*self.minimum_firmware)): |
|
msg = (_('Outdated %s firmware for device labelled %s. Please ' |
|
'download the updated firmware from %s') % |
|
(self.device, client.label(), self.firmware_URL)) |
|
wallet.handler.show_error(msg) |
|
raise OutdatedFirmwareError(msg) |
|
|
|
return client |
|
|
|
@hook |
|
def close_wallet(self, wallet): |
|
if isinstance(wallet, self.wallet_class): |
|
self.device_manager().close_wallet(wallet) |
|
|
|
def initialize_device(self, wallet, wizard): |
|
# Prevent timeouts during initialization |
|
wallet.last_operation = self.prevent_timeout |
|
|
|
(strength, label, pin_protection, passphrase_protection) \ |
|
= wizard.request_trezor_reset_settings(self.device) |
|
|
|
assert strength in range(0, 3) |
|
strength = 64 * (strength + 2) # 128, 192 or 256 |
|
language = '' |
|
|
|
client = self.get_client(wallet) |
|
client.reset_device(True, strength, passphrase_protection, |
|
pin_protection, label, language) |
|
|
|
def select_device(self, wallet, wizard): |
|
'''Called when creating a new wallet. Select the device to use. If |
|
the device is uninitialized, go through the intialization |
|
process.''' |
|
self.device_manager().scan_devices() |
|
clients = self.device_manager().clients_of_type(self.client_class) |
|
suffixes = [_("An unnamed device (wiped)"), _(" (initialized)")] |
|
labels = [client.label() + suffixes[client.is_initialized()] |
|
for client in clients] |
|
msg = _("Please select which %s device to use:") % self.device |
|
client = clients[wizard.query_choice(msg, labels)] |
|
self.device_manager().pair_wallet(wallet, client) |
|
if not client.is_initialized(): |
|
self.initialize_device(wallet, wizard) |
|
|
|
def on_restore_wallet(self, wallet, wizard): |
|
assert isinstance(wallet, self.wallet_class) |
|
|
|
msg = _("Enter the seed for your %s wallet:" % self.device) |
|
seed = wizard.request_seed(msg, is_valid = self.is_valid_seed) |
|
|
|
# Restored wallets are not hardware wallets |
|
wallet_class = self.wallet_class.restore_wallet_class |
|
wallet.storage.put('wallet_type', wallet_class.wallet_type) |
|
wallet = wallet_class(wallet.storage) |
|
|
|
passphrase = wizard.request_passphrase(self.device, restore=True) |
|
password = wizard.request_password() |
|
wallet.add_seed(seed, password) |
|
wallet.add_cosigner_seed(seed, 'x/', password, passphrase) |
|
wallet.create_main_account(password) |
|
return wallet |
|
|
|
def sign_transaction(self, wallet, tx, prev_tx, xpub_path): |
|
self.prev_tx = prev_tx |
|
self.xpub_path = xpub_path |
|
client = self.get_client(wallet) |
|
inputs = self.tx_inputs(tx, True) |
|
outputs = self.tx_outputs(wallet, tx) |
|
signed_tx = client.sign_tx('Bitcoin', inputs, outputs)[1] |
|
raw = signed_tx.encode('hex') |
|
tx.update_signatures(raw) |
|
|
|
def show_address(self, wallet, address): |
|
client = self.get_client(wallet) |
|
if not client.atleast_version(1, 3): |
|
wallet.handler.show_error(_("Your device firmware is too old")) |
|
return |
|
address_path = wallet.address_id(address) |
|
address_n = client.expand_path(address_path) |
|
client.get_address('Bitcoin', address_n, True) |
|
|
|
def tx_inputs(self, tx, for_sig=False): |
|
inputs = [] |
|
for txin in tx.inputs: |
|
txinputtype = self.types.TxInputType() |
|
if txin.get('is_coinbase'): |
|
prev_hash = "\0"*32 |
|
prev_index = 0xffffffff # signed int -1 |
|
else: |
|
if for_sig: |
|
x_pubkeys = txin['x_pubkeys'] |
|
if len(x_pubkeys) == 1: |
|
x_pubkey = x_pubkeys[0] |
|
xpub, s = BIP32_Account.parse_xpubkey(x_pubkey) |
|
xpub_n = self.client_class.expand_path(self.xpub_path[xpub]) |
|
txinputtype.address_n.extend(xpub_n + s) |
|
else: |
|
def f(x_pubkey): |
|
if is_extended_pubkey(x_pubkey): |
|
xpub, s = BIP32_Account.parse_xpubkey(x_pubkey) |
|
else: |
|
xpub = xpub_from_pubkey(x_pubkey.decode('hex')) |
|
s = [] |
|
node = ckd_public.deserialize(xpub) |
|
return self.types.HDNodePathType(node=node, address_n=s) |
|
pubkeys = map(f, x_pubkeys) |
|
multisig = self.types.MultisigRedeemScriptType( |
|
pubkeys=pubkeys, |
|
signatures=map(lambda x: x.decode('hex') if x else '', txin.get('signatures')), |
|
m=txin.get('num_sig'), |
|
) |
|
txinputtype = self.types.TxInputType( |
|
script_type=self.types.SPENDMULTISIG, |
|
multisig=multisig |
|
) |
|
# find which key is mine |
|
for x_pubkey in x_pubkeys: |
|
if is_extended_pubkey(x_pubkey): |
|
xpub, s = BIP32_Account.parse_xpubkey(x_pubkey) |
|
if xpub in self.xpub_path: |
|
xpub_n = self.client_class.expand_path(self.xpub_path[xpub]) |
|
txinputtype.address_n.extend(xpub_n + s) |
|
break |
|
|
|
prev_hash = unhexlify(txin['prevout_hash']) |
|
prev_index = txin['prevout_n'] |
|
|
|
txinputtype.prev_hash = prev_hash |
|
txinputtype.prev_index = prev_index |
|
|
|
if 'scriptSig' in txin: |
|
script_sig = txin['scriptSig'].decode('hex') |
|
txinputtype.script_sig = script_sig |
|
|
|
if 'sequence' in txin: |
|
sequence = txin['sequence'] |
|
txinputtype.sequence = sequence |
|
|
|
inputs.append(txinputtype) |
|
|
|
return inputs |
|
|
|
def tx_outputs(self, wallet, tx): |
|
outputs = [] |
|
|
|
for type, address, amount in tx.outputs: |
|
assert type == 'address' |
|
txoutputtype = self.types.TxOutputType() |
|
if wallet.is_change(address): |
|
address_path = wallet.address_id(address) |
|
address_n = self.client_class.expand_path(address_path) |
|
txoutputtype.address_n.extend(address_n) |
|
else: |
|
txoutputtype.address = address |
|
txoutputtype.amount = amount |
|
addrtype, hash_160 = bc_address_to_hash_160(address) |
|
if addrtype == 0: |
|
txoutputtype.script_type = self.types.PAYTOADDRESS |
|
elif addrtype == 5: |
|
txoutputtype.script_type = self.types.PAYTOSCRIPTHASH |
|
else: |
|
raise BaseException('addrtype') |
|
outputs.append(txoutputtype) |
|
|
|
return outputs |
|
|
|
def electrum_tx_to_txtype(self, tx): |
|
t = self.types.TransactionType() |
|
d = deserialize(tx.raw) |
|
t.version = d['version'] |
|
t.lock_time = d['lockTime'] |
|
inputs = self.tx_inputs(tx) |
|
t.inputs.extend(inputs) |
|
for vout in d['outputs']: |
|
o = t.bin_outputs.add() |
|
o.amount = vout['value'] |
|
o.script_pubkey = vout['scriptPubKey'].decode('hex') |
|
return t |
|
|
|
# This function is called from the trezor libraries (via tx_api) |
|
def get_tx(self, tx_hash): |
|
tx = self.prev_tx[tx_hash] |
|
tx.deserialize() |
|
return self.electrum_tx_to_txtype(tx) |
|
|
|
@staticmethod |
|
def is_valid_seed(seed): |
|
return True
|
|
|