1
0
mirror of https://github.com/trezor/trezor-firmware.git synced 2024-11-27 09:58:27 +00:00
This commit is contained in:
slush0 2016-06-26 21:29:29 +02:00
parent b0e39b571a
commit e8f76ebd03
3 changed files with 198 additions and 142 deletions

View File

@ -9,34 +9,12 @@ class ConnectionError(Exception):
class Transport(object): class Transport(object):
def __init__(self, device, *args, **kwargs): def __init__(self, device, *args, **kwargs):
print("Transport constructor")
self.device = device self.device = device
self.session_id = 0
self.session_depth = 0 self.session_depth = 0
self._open() self._open()
def _open(self):
raise NotImplementedException("Not implemented")
def _close(self):
raise NotImplementedException("Not implemented")
def _write(self, msg, protobuf_msg):
raise NotImplementedException("Not implemented")
def _read(self):
raise NotImplementedException("Not implemented")
def _session_begin(self):
pass
def _session_end(self):
pass
def ready_to_read(self):
"""
Returns True if there is data to be read from the transport. Otherwise, False.
"""
raise NotImplementedException("Not implemented")
def session_begin(self): def session_begin(self):
""" """
Apply a lock to the device in order to preform synchronous multistep "conversations" with the device. For example, before entering the transaction signing workflow, one begins a session. After the transaction is complete, the session may be ended. Apply a lock to the device in order to preform synchronous multistep "conversations" with the device. For example, before entering the transaction signing workflow, one begins a session. After the transaction is complete, the session may be ended.
@ -64,16 +42,14 @@ class Transport(object):
""" """
Write mesage to tansport. msg should be a member of a valid `protobuf class <https://developers.google.com/protocol-buffers/docs/pythontutorial>`_ with a SerializeToString() method. Write mesage to tansport. msg should be a member of a valid `protobuf class <https://developers.google.com/protocol-buffers/docs/pythontutorial>`_ with a SerializeToString() method.
""" """
ser = msg.SerializeToString() raise NotImplementedException("Not implemented")
header = struct.pack(">HL", mapping.get_type(msg), len(ser))
self._write(b"##" + header + ser, msg)
def read(self): def read(self):
""" """
If there is data available to be read from the transport, reads the data and tries to parse it as a protobuf message. If the parsing succeeds, return a protobuf object. If there is data available to be read from the transport, reads the data and tries to parse it as a protobuf message. If the parsing succeeds, return a protobuf object.
Otherwise, returns None. Otherwise, returns None.
""" """
if not self.ready_to_read(): if not self._ready_to_read():
return None return None
data = self._read() data = self._read()
@ -84,7 +60,7 @@ class Transport(object):
def read_blocking(self): def read_blocking(self):
""" """
Same as read, except blocks untill data is available to be read. Same as read, except blocks until data is available to be read.
""" """
while True: while True:
data = self._read() data = self._read()
@ -94,39 +70,115 @@ class Transport(object):
return self._parse_message(data) return self._parse_message(data)
def _parse_message(self, data): def _parse_message(self, data):
(msg_type, data) = data (session_id, msg_type, data) = data
# Raise exception if we get the response with
# unexpected session ID
self._check_session_id(session_id)
if msg_type == 'protobuf': if msg_type == 'protobuf':
return data return data
else: else:
print mapping.get_class(msg_type)
inst = mapping.get_class(msg_type)() inst = mapping.get_class(msg_type)()
inst.ParseFromString(data) print inst, data
inst.ParseFromString(bytes(data))
return inst return inst
def _read_headers(self, read_f): def _check_session_id(self, session_id):
# Try to read headers until some sane value are detected if self.session_id == 0:
is_ok = False # Let the device set the session ID
while not is_ok: self.session_id = session_id
elif session_id != self.session_id:
# Session ID has been already set, but it differs from response
raise Exception("Session ID mismatch. Have %d, got %d" % (self.session_id, session_id))
# Align cursor to the beginning of the header ("##") # Functions to be implemented in specific transports:
c = read_f.read(1) def _open(self):
i = 0 raise NotImplementedException("Not implemented")
while c != b"#":
i += 1
if i >= 64:
# timeout
raise Exception("Timed out while waiting for the magic character")
c = read_f.read(1)
if read_f.read(1) != b"#": def _close(self):
# Second character must be # to be valid header raise NotImplementedException("Not implemented")
raise Exception("Second magic character is broken")
def _write_chunk(self, chunk):
raise NotImplementedException("Not implemented")
def _read_chunk(self):
raise NotImplementedException("Not implemented")
def _ready_to_read(self):
"""
Returns True if there is data to be read from the transport. Otherwise, False.
"""
raise NotImplementedException("Not implemented")
def _session_begin(self):
pass
def _session_end(self):
pass
class TransportV1(Transport):
def write(self, msg):
ser = msg.SerializeToString()
header = struct.pack(">HL", mapping.get_type(msg), len(ser))
data = bytearray(b"##" + header + ser)
while len(data):
# Report ID, data padded to 63 bytes
chunk = b'?' + data[:63] + b'\0' * (63 - len(data[:63]))
self._write_chunk(chunk)
data = data[63:]
def _read(self):
chunk = self._read_chunk()
(msg_type, datalen, data) = self.parse_first(chunk)
while len(data) < datalen:
chunk = self._read_chunk()
data.extend(self.parse_next(chunk))
# Strip padding zeros
data = data[:datalen]
return (0, msg_type, data)
def parse_first(self, chunk):
if chunk[:3] != b"?##":
raise Exception("Unexpected magic characters")
# Now we're most likely on the beginning of the header
try: try:
headerlen = struct.calcsize(">HL") headerlen = struct.calcsize(">HL")
(msg_type, datalen) = struct.unpack(">HL", read_f.read(headerlen)) (msg_type, datalen) = struct.unpack(">HL", chunk[3:3 + headerlen])
break
except: except:
raise Exception("Cannot parse header length") raise Exception("Cannot parse header length")
return (msg_type, datalen) data = chunk[3 + headerlen:]
return (msg_type, datalen, data)
def parse_next(self, chunk):
if chunk[0:1] != b"?":
raise Exception("Unexpected magic characters")
return chunk[1:]
class TransportV2(Transport):
def write(self, msg):
ser = msg.SerializeToString()
raise NotImplemented()
def _read(self):
pass
def read_headers(self, read_f):
c = read_f.read(2)
if c != b"?!":
raise Exception("Unexpected magic characters")
try:
headerlen = struct.calcsize(">HL")
(session_id, msg_type, datalen) = struct.unpack(">LLL", read_f.read(headerlen))
except:
raise Exception("Cannot parse header length")
print datalen
return (0, msg_type, datalen)

View File

@ -2,31 +2,9 @@
import hid import hid
import time import time
from .transport import Transport, ConnectionError from .transport import TransportV1, TransportV2, ConnectionError
DEVICE_IDS = [ def enumerate():
(0x534c, 0x0001), # TREZOR
]
class FakeRead(object):
# Let's pretend we have a file-like interface
def __init__(self, func):
self.func = func
def read(self, size):
return self.func(size)
class HidTransport(Transport):
def __init__(self, device, *args, **kwargs):
self.hid = None
self.hid_version = None
self.buffer = ''
# self.read_timeout = kwargs.get('read_timeout')
device = device[int(bool(kwargs.get('debug_link')))]
super(HidTransport, self).__init__(device, *args, **kwargs)
@classmethod
def enumerate(cls):
""" """
Return a list of available TREZOR devices. Return a list of available TREZOR devices.
""" """
@ -43,7 +21,7 @@ class HidTransport(Transport):
if devices.get(serial_number) != None and devices[serial_number][0] == path: if devices.get(serial_number) != None and devices[serial_number][0] == path:
raise Exception("Two devices with the same path and S/N found. This is Mac, right? :-/") raise Exception("Two devices with the same path and S/N found. This is Mac, right? :-/")
if (vendor_id, product_id) in DEVICE_IDS: if (vendor_id, product_id) in [ x[0:2] for x in DEVICE_IDS]:
devices.setdefault(serial_number, [None, None]) devices.setdefault(serial_number, [None, None])
if interface_number == 0 or interface_number == -1: # normal link if interface_number == 0 or interface_number == -1: # normal link
devices[serial_number][0] = path devices[serial_number][0] = path
@ -53,6 +31,29 @@ class HidTransport(Transport):
# List of two-tuples (path_normal, path_debuglink) # List of two-tuples (path_normal, path_debuglink)
return list(devices.values()) return list(devices.values())
def path_to_transport(path):
try:
device = [ d for d in hid.enumerate(0, 0) if d['path'] == path ][0]
except IndexError:
raise ConnectionError("Connection failed")
# VID/PID found, let's find proper transport
vid, pid = device['vendor_id'], device['product_id']
try:
transport = [ transport for (_vid, _pid, transport) in DEVICE_IDS if _vid == vid and _pid == pid ][0]
except IndexError:
raise Exception("Unknown transport for VID:PID %04x:%04x" % (vid, pid))
return transport
class _HidTransport(object):
def __init__(self, device, *args, **kwargs):
self.hid = None
self.hid_version = None
device = device[int(bool(kwargs.get('debug_link')))]
super(_HidTransport, self).__init__(device, *args, **kwargs)
def is_connected(self): def is_connected(self):
""" """
Check if the device is still connected. Check if the device is still connected.
@ -63,10 +64,10 @@ class HidTransport(Transport):
return False return False
def _open(self): def _open(self):
self.buffer = bytearray()
self.hid = hid.device() self.hid = hid.device()
self.hid.open_path(self.device) self.hid.open_path(self.device)
self.hid.set_nonblocking(True) self.hid.set_nonblocking(True)
# determine hid_version # determine hid_version
r = self.hid.write([0, 63, ] + [0xFF] * 63) r = self.hid.write([0, 63, ] + [0xFF] * 63)
if r == 65: if r == 65:
@ -80,28 +81,21 @@ class HidTransport(Transport):
def _close(self): def _close(self):
self.hid.close() self.hid.close()
self.buffer = bytearray()
self.hid = None self.hid = None
def ready_to_read(self): def _write_chunk(self, chunk):
return False if len(chunk) != 64:
raise Exception("Unexpected data length")
def _write(self, msg, protobuf_msg):
msg = bytearray(msg)
while len(msg):
if self.hid_version == 2: if self.hid_version == 2:
self.hid.write([0, 63, ] + list(msg[:63]) + [0] * (63 - len(msg[:63]))) self.hid.write([0,] + chunk)
else: else:
self.hid.write([63, ] + list(msg[:63]) + [0] * (63 - len(msg[:63]))) self.hid.write(chunk)
msg = msg[63:]
def _read(self): def _read_chunk(self):
(msg_type, datalen) = self._read_headers(FakeRead(self._raw_read))
return (msg_type, self._raw_read(datalen))
def _raw_read(self, length):
start = time.time() start = time.time()
while len(self.buffer) < length:
while True:
data = self.hid.read(64) data = self.hid.read(64)
if not len(data): if not len(data):
if time.time() - start > 10: if time.time() - start > 10:
@ -109,22 +103,37 @@ class HidTransport(Transport):
# device is still alive # device is still alive
if not self.is_connected(): if not self.is_connected():
raise ConnectionError("Connection failed") raise ConnectionError("Connection failed")
else:
# Restart timer # Restart timer
start = time.time() start = time.time()
time.sleep(0.001) time.sleep(0.001)
continue continue
report_id = data[0] break
if report_id > 63: if len(data) != 64:
# Command report raise Exception("Unexpected chunk size: %d" % len(data))
raise Exception("Not implemented")
# Payload received, skip the report ID return bytearray(data)
self.buffer.extend(bytearray(data[1:]))
ret = self.buffer[:length] class HidTransportV1(_HidTransport, TransportV1):
self.buffer = self.buffer[length:] pass
return bytes(ret)
class HidTransportV2(_HidTransport, TransportV2):
pass
DEVICE_IDS = [
(0x534c, 0x0001, HidTransportV1), # TREZOR
(0x1209, 0x53C0, HidTransportV2), # TREZORv2 Bootloader
(0x1209, 0x53C1, HidTransportV2), # TREZORv2
]
# Backward compatible wrapper, decides for proper transport
# based on VID/PID of given path
def HidTransport(device, *args, **kwargs):
transport = path_to_transport(device[0])
return transport(device, *args, **kwargs)
# Backward compatibility hack; HidTransport is a function, not a class like before
HidTransport.enumerate = enumerate

View File

@ -43,16 +43,18 @@ class UdpTransport(Transport):
rlist, _, _ = select([self.socket], [], [], 0) rlist, _, _ = select([self.socket], [], [], 0)
return len(rlist) > 0 return len(rlist) > 0
def _write_chunk(self, chunk):
if len(chunk) != 64:
raise Exception("Unexpected data length")
self.socket.sendall(chunk)
def _write(self, msg, protobuf_msg): def _write(self, msg, protobuf_msg):
msg = bytearray(msg) raise NotImplemented()
while len(msg):
# Report ID, data padded to 63 bytes
self.socket.sendall(chr(63) + msg[:63] + b'\0' * (63 - len(msg[:63])))
msg = msg[63:]
def _read(self): def _read(self):
(msg_type, datalen) = self._read_headers(FakeRead(self._raw_read)) (session_id, msg_type, datalen) = self._read_headers(FakeRead(self._raw_read))
return (msg_type, self._raw_read(datalen)) return (session_id, msg_type, self._raw_read(datalen))
def _raw_read(self, length): def _raw_read(self, length):
start = time.time() start = time.time()
@ -71,14 +73,7 @@ class UdpTransport(Transport):
time.sleep(0.001) time.sleep(0.001)
continue continue
report_id = ord(data[0]) self.buffer += data
if report_id > 63:
# Command report
raise Exception("Not implemented")
# Payload received, skip the report ID
self.buffer += str(bytearray(data[1:]))
ret = self.buffer[:length] ret = self.buffer[:length]
self.buffer = self.buffer[length:] self.buffer = self.buffer[length:]