mirror of
https://github.com/trezor/trezor-firmware.git
synced 2024-11-25 00:48:19 +00:00
feat(python): implement firmware dumping
This commit is contained in:
parent
64df33d8d8
commit
ee694f36cf
@ -599,3 +599,19 @@ def get_hash(client: "TrezorClient", hex_challenge: Optional[str]) -> str:
|
|||||||
"""Get a hash of the installed firmware combined with the optional challenge."""
|
"""Get a hash of the installed firmware combined with the optional challenge."""
|
||||||
challenge = bytes.fromhex(hex_challenge) if hex_challenge else None
|
challenge = bytes.fromhex(hex_challenge) if hex_challenge else None
|
||||||
return firmware.get_hash(client, challenge).hex()
|
return firmware.get_hash(client, challenge).hex()
|
||||||
|
|
||||||
|
|
||||||
|
@cli.command()
|
||||||
|
@click.argument("file", type=click.File("wb"))
|
||||||
|
@with_client
|
||||||
|
def extract(client: "TrezorClient", file: BinaryIO) -> None:
|
||||||
|
"""Extract the firmware from the device."""
|
||||||
|
if client.features.model == "T":
|
||||||
|
firmware_size = 13 * 128 * 1024
|
||||||
|
elif client.features.model == "1":
|
||||||
|
firmware_size = 7 * 128 * 1024 + 64 * 1024
|
||||||
|
else:
|
||||||
|
firmware_size = None
|
||||||
|
|
||||||
|
with click.progressbar(length=firmware_size) as bar:
|
||||||
|
file.write(firmware.get_firmware(client, bar.update))
|
||||||
|
@ -22,7 +22,7 @@ from typing import TYPE_CHECKING, Any, Callable, List, Optional, Tuple
|
|||||||
import construct as c
|
import construct as c
|
||||||
import ecdsa
|
import ecdsa
|
||||||
|
|
||||||
from . import cosi, messages
|
from . import cosi, exceptions, messages
|
||||||
from .tools import expect, session
|
from .tools import expect, session
|
||||||
|
|
||||||
if TYPE_CHECKING:
|
if TYPE_CHECKING:
|
||||||
@ -523,3 +523,19 @@ def update(
|
|||||||
@expect(messages.FirmwareHash, field="hash", ret_type=bytes)
|
@expect(messages.FirmwareHash, field="hash", ret_type=bytes)
|
||||||
def get_hash(client: "TrezorClient", challenge: Optional[bytes]):
|
def get_hash(client: "TrezorClient", challenge: Optional[bytes]):
|
||||||
return client.call(messages.GetFirmwareHash(challenge=challenge))
|
return client.call(messages.GetFirmwareHash(challenge=challenge))
|
||||||
|
|
||||||
|
|
||||||
|
@session
|
||||||
|
def get_firmware(
|
||||||
|
client: "TrezorClient", progress_update: Callable[[int], Any] = lambda _: None
|
||||||
|
) -> bytes:
|
||||||
|
resp = client.call(messages.GetFirmware())
|
||||||
|
result = bytearray()
|
||||||
|
while isinstance(resp, messages.FirmwareChunk):
|
||||||
|
result.extend(resp.chunk)
|
||||||
|
progress_update(len(resp.chunk))
|
||||||
|
resp = client.call(messages.FirmwareChunkAck())
|
||||||
|
|
||||||
|
if not isinstance(resp, messages.Success):
|
||||||
|
raise exceptions.TrezorException(f"Unexpected message {resp}")
|
||||||
|
return bytes(result)
|
||||||
|
Loading…
Reference in New Issue
Block a user