1
0
mirror of https://github.com/trezor/trezor-firmware.git synced 2025-05-29 20:28:45 +00:00

fixup! TEMP logging

This commit is contained in:
M1nd3r 2025-05-06 14:29:33 +02:00
parent 879d7cb8dd
commit d2a2c972e5

View File

@ -284,7 +284,6 @@ if utils.USE_THP:
async def handle_ThpCredentialRequest(
message: ThpCredentialRequest,
) -> ThpCredentialResponse | Failure:
from storage.cache_common import CHANNEL_HOST_STATIC_PUBKEY
from trezor.messages import ThpCredentialMetadata, ThpCredentialResponse
from trezor.wire.context import get_context
from trezor.wire.thp import crypto
@ -301,31 +300,22 @@ if utils.USE_THP:
# Assert that context `ctx` is `GenericSessionContext`
assert isinstance(ctx, GenericSessionContext)
host_static_pubkey = ctx.channel.channel_cache.get(CHANNEL_HOST_STATIC_PUBKEY)
assert host_static_pubkey is not None
# Check that request contains a host static pubkey
if message.host_static_pubkey is None:
return _get_autoconnect_failure(
"Credential request must contain a host static pubkey."
)
# Check that request contains valid credential
if message.credential is None:
return _get_autoconnect_failure()
return _get_autoconnect_failure(
"Credential request must contain a previously issued pairing credential."
)
credential = decode_credential(message.credential)
if __debug__:
from trezor import log
from trezor.utils import get_bytes_as_str
log.warning(
__name__,
"Host key in message %s",
get_bytes_as_str(message.host_static_pubkey),
if not validate_credential(credential, message.host_static_pubkey):
return _get_autoconnect_failure(
"Credential request contains an invalid pairing credential."
)
log.warning(
__name__,
"Host key in channel cache (from handshake) %s",
get_bytes_as_str(host_static_pubkey),
)
if not validate_credential(credential, host_static_pubkey):
return _get_autoconnect_failure()
autoconnect = False
if message.autoconnect is not None:
@ -342,7 +332,7 @@ if utils.USE_THP:
ctx, cred_metadata.host_name
)
new_cred = issue_credential(
host_static_pubkey=host_static_pubkey,
host_static_pubkey=message.host_static_pubkey,
credential_metadata=cred_metadata,
)
trezor_static_pubkey = crypto.get_trezor_static_pubkey()
@ -351,15 +341,16 @@ if utils.USE_THP:
trezor_static_pubkey=trezor_static_pubkey, credential=new_cred
)
def _get_autoconnect_failure() -> Failure:
def _get_autoconnect_failure(msg: str) -> Failure:
from trezor.enums import FailureType
from trezor.messages import Failure
return Failure(
code=FailureType.DataError,
message="Credential request must contain a valid credential (previously issued).",
message=msg,
)
else:
async def handle_Initialize(msg: Initialize) -> Features: