mirror of
https://github.com/trezor/trezor-firmware.git
synced 2024-12-16 19:38:09 +00:00
5f016a896a
black 24.2.0 flake8 7.0.0 some neat improvements for if-else statements there
112 lines
3.5 KiB
Python
112 lines
3.5 KiB
Python
# This file is part of the Trezor project.
|
|
#
|
|
# Copyright (C) 2012-2022 SatoshiLabs and contributors
|
|
#
|
|
# This library is free software: you can redistribute it and/or modify
|
|
# it under the terms of the GNU Lesser General Public License version 3
|
|
# as published by the Free Software Foundation.
|
|
#
|
|
# This library is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU Lesser General Public License for more details.
|
|
#
|
|
# You should have received a copy of the License along with this library.
|
|
# If not, see <https://www.gnu.org/licenses/lgpl-3.0.html>.
|
|
|
|
import typing as t
|
|
from hashlib import blake2s
|
|
|
|
from typing_extensions import Protocol, TypeGuard
|
|
|
|
from .. import messages
|
|
from ..tools import expect, session
|
|
from .core import VendorFirmware
|
|
from .legacy import LegacyFirmware, LegacyV2Firmware
|
|
|
|
# re-exports:
|
|
if True:
|
|
# indented block prevents isort from messing with these until we upgrade to 5.x
|
|
from .consts import * # noqa: F401, F403
|
|
from .core import * # noqa: F401, F403
|
|
from .legacy import * # noqa: F401, F403
|
|
from .util import ( # noqa: F401
|
|
FirmwareIntegrityError,
|
|
InvalidSignatureError,
|
|
Unsigned,
|
|
)
|
|
from .vendor import * # noqa: F401, F403
|
|
|
|
if t.TYPE_CHECKING:
|
|
from ..client import TrezorClient
|
|
|
|
T = t.TypeVar("T", bound="FirmwareType")
|
|
|
|
class FirmwareType(Protocol):
|
|
@classmethod
|
|
def parse(cls: t.Type[T], data: bytes) -> T: ...
|
|
|
|
def verify(self, dev_keys: bool = False) -> None: ...
|
|
|
|
def digest(self) -> bytes: ...
|
|
|
|
|
|
def parse(data: bytes) -> "FirmwareType":
|
|
try:
|
|
if data[:4] == b"TRZR":
|
|
return LegacyFirmware.parse(data)
|
|
elif data[:4] == b"TRZV":
|
|
return VendorFirmware.parse(data)
|
|
elif data[:4] == b"TRZF":
|
|
return LegacyV2Firmware.parse(data)
|
|
else:
|
|
raise ValueError("Unrecognized firmware image type")
|
|
except Exception as e:
|
|
raise FirmwareIntegrityError("Invalid firmware image") from e
|
|
|
|
|
|
def is_onev2(fw: "FirmwareType") -> TypeGuard[LegacyFirmware]:
|
|
return isinstance(fw, LegacyFirmware) and fw.embedded_v2 is not None
|
|
|
|
|
|
# ====== Client functions ====== #
|
|
|
|
|
|
@session
|
|
def update(
|
|
client: "TrezorClient",
|
|
data: bytes,
|
|
progress_update: t.Callable[[int], t.Any] = lambda _: None,
|
|
):
|
|
if client.features.bootloader_mode is False:
|
|
raise RuntimeError("Device must be in bootloader mode")
|
|
|
|
resp = client.call(messages.FirmwareErase(length=len(data)))
|
|
|
|
# TREZORv1 method
|
|
if isinstance(resp, messages.Success):
|
|
resp = client.call(messages.FirmwareUpload(payload=data))
|
|
progress_update(len(data))
|
|
if isinstance(resp, messages.Success):
|
|
return
|
|
else:
|
|
raise RuntimeError(f"Unexpected result {resp}")
|
|
|
|
# TREZORv2 method
|
|
while isinstance(resp, messages.FirmwareRequest):
|
|
length = resp.length
|
|
payload = data[resp.offset : resp.offset + length]
|
|
digest = blake2s(payload).digest()
|
|
resp = client.call(messages.FirmwareUpload(payload=payload, hash=digest))
|
|
progress_update(length)
|
|
|
|
if isinstance(resp, messages.Success):
|
|
return
|
|
else:
|
|
raise RuntimeError(f"Unexpected message {resp}")
|
|
|
|
|
|
@expect(messages.FirmwareHash, field="hash", ret_type=bytes)
|
|
def get_hash(client: "TrezorClient", challenge: t.Optional[bytes]):
|
|
return client.call(messages.GetFirmwareHash(challenge=challenge))
|