1
0
mirror of https://github.com/trezor/trezor-firmware.git synced 2024-11-13 11:09:01 +00:00

determine hid version

This commit is contained in:
Pavol Rusnak 2016-06-23 18:38:34 +02:00
parent d2b8f51a07
commit 73864e2979
No known key found for this signature in database
GPG Key ID: 91F3B339B9A02A3D

View File

@ -5,7 +5,6 @@ import time
from .transport import Transport, ConnectionError
DEVICE_IDS = [
# (0x10c4, 0xea80), # TREZOR Shield
(0x534c, 0x0001), # TREZOR
]
@ -20,6 +19,7 @@ class FakeRead(object):
class HidTransport(Transport):
def __init__(self, device, *args, **kwargs):
self.hid = None
self.hid_version = None
self.buffer = ''
# self.read_timeout = kwargs.get('read_timeout')
device = device[int(bool(kwargs.get('debug_link')))]
@ -69,9 +69,16 @@ class HidTransport(Transport):
self.hid = hid.device()
self.hid.open_path(self.device)
self.hid.set_nonblocking(True)
# the following was needed just for TREZOR Shield
# self.hid.send_feature_report([0x41, 0x01]) # enable UART
# self.hid.send_feature_report([0x43, 0x03]) # purge TX/RX FIFOs
# determine hid_version
r = self.hid.write([0, 63, ] + [0xFF] * 63)
if r == 65:
self.hid_version = 2
return
r = self.hid.write([63, ] + [0xFF] * 63)
if r == 64:
self.hid_version = 1
return
raise ConnectionError("Unknown HID version")
def _close(self):
self.hid.close()
@ -84,8 +91,10 @@ class HidTransport(Transport):
def _write(self, msg, protobuf_msg):
msg = bytearray(msg)
while len(msg):
# Report ID, data padded to 63 bytes
self.hid.write([63, ] + list(msg[:63]) + [0] * (63 - len(msg[:63])))
if self.hid_version == 2:
self.hid.write([0, 63, ] + list(msg[:63]) + [0] * (63 - len(msg[:63])))
else:
self.hid.write([63, ] + list(msg[:63]) + [0] * (63 - len(msg[:63])))
msg = msg[63:]
def _read(self):