1
0
mirror of https://github.com/trezor/trezor-firmware.git synced 2024-12-29 09:38:08 +00:00
trezor-firmware/core/tools/keyctl-proxy

130 lines
3.9 KiB
Plaintext
Raw Normal View History

#!/usr/bin/env python3
import sys
2019-02-21 15:18:49 +00:00
import traceback
import click
import Pyro4
from trezorlib import cosi
from trezorlib.client import get_default_client
from trezorlib.tools import parse_path
from trezorlib._internal.firmware_headers import (
parse_image,
VendorHeader,
BootloaderImage,
FirmwareImage,
)
from typing import Tuple
Pyro4.config.SERIALIZER = "marshal"
PORT = 5001
indexmap = {
"bootloader": BootloaderImage,
"vendorheader": VendorHeader,
"firmware": FirmwareImage,
}
PATH = "10018h/{}h"
2018-07-31 09:35:09 +00:00
def make_commit(index, digest):
path = PATH.format(index)
address_n = parse_path(path)
first_pass = True
while True:
try:
t = get_default_client()
if first_pass:
t.clear_session()
first_pass = False
click.echo(f"\n\n\nCommiting to hash {digest.hex()} with path {path}")
commit = cosi.commit(t, address_n, digest)
return commit.pubkey, commit.commitment
except Exception as e:
print(e)
traceback.print_exc()
print("Trying again ...")
@Pyro4.expose
class KeyctlProxy:
def __init__(self, image_type, digest: bytes, commit: Tuple[bytes, bytes]) -> None:
self.name = image_type.NAME
self.address_n = parse_path(PATH.format(image_type.BIP32_INDEX))
self.digest = digest
self.commit = commit
def _check_name_digest(self, name, digest):
if name != self.name or digest != self.digest:
print(f"ERROR! Remote wants to sign {name} with digest {digest.hex()}")
print(f"Expected: {self.name} with digest {self.digest.hex()}")
raise ValueError("Unexpected index/digest")
def get_commit(self, name, digest):
self._check_name_digest(name, digest)
print("Sending commitment!")
return self.commit
def get_signature(self, name, digest, global_R, global_pk):
self._check_name_digest(name, digest)
while True:
2018-01-29 14:28:17 +00:00
try:
t = get_default_client()
print("\n\n\nSigning...")
signature = cosi.sign(t, self.address_n, digest, global_R, global_pk)
print("Sending signature!")
return signature.signature
2018-01-29 14:28:17 +00:00
except Exception as e:
print(e)
2019-02-21 15:18:49 +00:00
traceback.print_exc()
2018-07-31 09:35:09 +00:00
print("Trying again ...")
@click.command()
@click.option(
"-l", "--listen", "ipaddr", default="0.0.0.0", help="Bind to particular ip address"
)
@click.option("-t", "--header-type", type=click.Choice(indexmap.keys()))
@click.option("-d", "--digest")
@click.argument("fw_file", type=click.File("rb"), required=False)
def cli(ipaddr, fw_file, header_type, digest):
"""Participate in signing of firmware.
Specify either fw_file to auto-detect type and digest, or use -t and -d to specify
the type and digest manually.
"""
public_keys = None
if fw_file:
if header_type or digest:
raise click.ClickException("Do not specify fw_file together with -t/-d")
fw = parse_image(fw_file.read())
digest = fw.digest()
public_keys = fw.public_keys
click.echo(fw.format())
if not fw_file and (not header_type or not digest):
raise click.ClickException("Please specify either fw_file or -t and -h")
while True:
pubkey, R = make_commit(header_type.BIP32_INDEX, digest)
if public_keys is not None and pubkey not in public_keys:
click.echo(f"\n\nPublic key {pubkey.hex()} is unknown.")
if click.confirm("Retry with a different passphrase?"):
continue
break
daemon = Pyro4.Daemon(host=ipaddr, port=PORT)
proxy = KeyctlProxy(header_type, digest, (pubkey, R))
2018-07-31 09:35:09 +00:00
uri = daemon.register(proxy, "keyctl")
click.echo(f"keyctl-proxy running at URI: {uri}")
click.echo("Press Ctrl+C to abort.")
daemon.requestLoop()
if __name__ == "__main__":
cli()