Roman Zeyde
eb525e1b62
gpg: simplify Python entry point and refactor Bash scripts a bit
...
Now there is a single 'trezor-gpg' tool, with various subcommands.
2017-04-26 23:12:09 +03:00
Roman Zeyde
02c8e729b7
ssh: retrieve all keys using a single device session
2017-04-25 20:43:19 +03:00
Roman Zeyde
12359938ad
keepkey: fix transport import
2017-04-23 21:27:02 +03:00
Tomás Rojas
26d7dd3124
Cache public keys for the duration of the agent
...
This saves a lot of time when connecting to multiple hosts
simultaneously (e.g., during a deploy) as every time we are asked to sign a
challenge, all public keys are iterated to find the correct one. This
can become especially slow when using the Bridge transport and/or many
identities are defined.
2017-04-22 14:47:30 +03:00
Tomás Rojas
0d5c3a9ca7
Allow using TREZOR bridge (instead of HID transport)
2017-04-22 11:16:30 +03:00
Roman Zeyde
8ba9be1780
fix pylint warnings
2017-04-21 22:56:50 +03:00
Roman Zeyde
b2bc87c0c7
fix pydocstyle warnings
2017-04-21 22:51:11 +03:00
Timothy Hobbs
d522d148ef
Connection error is confusing ( #105 )
...
Hi,
I ran into this connection error:
````
> trezor-agent timothy@localhost
2017-04-10 00:22:01,818 ERROR Connection error: open failed [__main__.py:130]
````
I didn't know what was going on, whether there was a problem connecting to localhost or what. I eventually logged into trezor wallet and found that there too, my device was not recognized (probably because I did not unplug it/replug it after updating the HID settings.) Unplugging it and replugging it fixed everything.
2017-04-10 10:40:27 +03:00
Nubis
9a271d115b
Allow contents in buffer when using _legacy_pubs
2017-03-09 20:13:23 +02:00
Roman Zeyde
6a7165298f
decode: skip invalid pubkeys (instead of crashing)
2017-03-07 21:43:32 +02:00
Roman Zeyde
c4f3fa6e04
agent: reply correctly to HAVEKEY requests
2017-02-21 13:12:02 +02:00
Roman Zeyde
8a77fa519f
decode: raise an error when keygrip is missing
2017-02-21 13:12:00 +02:00
Roman Zeyde
59560ec0b0
util: add simple memoization decorator
2017-02-21 13:05:48 +02:00
Roman Zeyde
7a91196dd5
agent: add link to HAVEKEY implementation
2017-02-21 11:48:22 +02:00
Roman Zeyde
43c424a402
ssh: allow "just-in-time" connection for agent-like behaviour
...
This would allow launching trezor-agent into the background
during the system startup, and the connecting the device
when the cryptographic operations are required.
2017-01-07 18:29:12 +02:00
Roman Zeyde
6672ea9bc4
device: set passphrase from environment
2017-01-06 12:52:45 +02:00
Roman Zeyde
002dc2a0e0
tox: order imports
2017-01-06 12:37:14 +02:00
Roman Zeyde
61ced2808f
device: allow non-empty passphrases
2017-01-06 11:59:57 +02:00
Roman Zeyde
74e8f21a22
gpg: export secret subkey
2017-01-01 18:14:52 +02:00
Roman Zeyde
897236d556
gpg: allow decoding secret keys
2017-01-01 18:14:28 +02:00
Roman Zeyde
3cb7f6fd21
gpg: export secret primary key
2016-12-30 18:55:18 +02:00
Roman Zeyde
cad2ec1239
device: import device-specific defs module lazily
...
It may fail on unsupported platforms (e.g. keepkeylib does not supoprt Python 3)
2016-12-27 12:34:07 +02:00
Roman Zeyde
604b2b7e99
gpg: allow GPG 2.1.11+ (to support Ubuntu 16.04 & Mint 18)
2016-12-27 10:12:34 +02:00
Andrew LeCody
109bb3b47f
Mosh doesn't support "-l" for user, only user@host for args
2016-12-14 23:59:45 -06:00
Roman Zeyde
9fe1a235c1
gpg: check that the configuration is in place
2016-12-02 13:10:33 +02:00
Roman Zeyde
188b74b327
gpg: use explicit '--subkey' flag for adding a subkey to an existing GPG key
2016-11-25 19:35:40 +02:00
Roman Zeyde
fc31847f8e
decode: add test for custom markers
2016-11-19 20:06:29 +02:00
Roman Zeyde
6b82f8b9b7
keyring: add test for get_agent_sock_path()
2016-11-12 20:51:35 +02:00
Roman Zeyde
fabfcaaae2
keyring: fix test case for iterlines()
2016-11-12 20:51:14 +02:00
Roman Zeyde
f0f89310ac
main: add '--mosh' for better SSH client
2016-11-11 22:26:22 +02:00
Roman Zeyde
0440025083
gpg: use explicit function to check for custom subpacket marker
2016-11-11 13:02:02 +02:00
Roman Zeyde
c49fe97f63
gpg: remove unused parser for literal packets
2016-11-11 13:01:54 +02:00
Roman Zeyde
7f8abcb5c5
client: remove unused code
2016-11-11 13:01:47 +02:00
Roman Zeyde
e13039e52d
gpg: remove property method and unused member variable from PublicKey
2016-11-11 13:01:33 +02:00
Roman Zeyde
c420571eb8
gpg: import test coverage for protocol
2016-11-11 09:14:33 +02:00
Roman Zeyde
827119a18d
gpg: handle KILLAGENT command
...
so `gpg-connect-agent KILLAGENT` should stop the running agent
2016-11-10 23:29:47 +02:00
Roman Zeyde
9be6504658
util: import test coverage
2016-11-10 14:33:41 +02:00
Roman Zeyde
07cbe65875
formats: improve test coverage
2016-11-10 14:33:27 +02:00
Roman Zeyde
83f17704cb
server: remove 'SSH_AUTH_SOCK=' from logging
2016-11-06 22:02:35 +02:00
Roman Zeyde
2eab2a152c
device: verify keepkey constraints
2016-11-04 19:31:54 +02:00
Roman Zeyde
5e93d97be3
Merge branch 'ssh-ids'
2016-11-04 16:07:29 +02:00
Roman Zeyde
4c8fcd6714
ssh: use special UNIX socket name
2016-11-04 10:36:53 +02:00
Roman Zeyde
ee593bc66e
gpg: show user ID on a single line
2016-11-03 23:36:11 +02:00
Roman Zeyde
dbed773e54
fix pylint and tests
2016-11-03 23:29:45 +02:00
Roman Zeyde
ac4a86d312
ssh: remove git utility
2016-11-03 23:12:59 +02:00
Roman Zeyde
021831073e
ssh: simple support for multiple public keys loading
2016-11-03 23:05:27 +02:00
Roman Zeyde
6a5acba0b0
gpg: decouple identity from device
2016-11-03 22:00:56 +02:00
Roman Zeyde
9123cef810
ssh: decouple identity from device
2016-11-03 22:00:43 +02:00
Roman Zeyde
6f6e7c0bcc
device: allow loading identities from a file (instead of argument)
2016-11-03 22:00:22 +02:00
Roman Zeyde
75405b4944
gpg: allow PIN entry before starting GPG shell
2016-10-30 22:03:39 +02:00