#!/usr/bin/env python3 # # SPDX-FileCopyrightText: © 2019 The usbmon-tools Authors # SPDX-FileCopyrightText: © 2020 The freestyle-hid Authors # # SPDX-License-Identifier: Apache-2.0 import logging import sys import textwrap from typing import BinaryIO import click import click_log import construct import usbmon import usbmon.chatter import usbmon.pcapng import usbmon.support.hid logger = logging.getLogger() click_log.basic_config(logger) _KEEPALIVE_TYPE = 0x22 _UNENCRYPTED_TYPES = ( 0x01, 0x04, 0x05, 0x06, 0x0C, 0x0D, 0x14, 0x15, 0x33, 0x34, 0x35, 0x71, _KEEPALIVE_TYPE, ) _ENCRYPTION_SETUP_TYPES = (0x14, 0x33) _START_AUTHORIZE_CMD = 0x11 _CHALLENGE_CMD = 0x16 _CHALLENGE_RESPONSE_CMD = 0x17 _CHALLENGE_ACCEPTED_CMD = 0x18 _ABBOTT_VENDOR_ID = 0x1A61 _LIBRE2_PRODUCT_ID = 0x3950 _ENCRYPTED_MESSAGE = construct.Struct( encrypted_message=construct.Bytes(64 - 1 - 4 - 4), sequence_number=construct.Int32ul, mac=construct.Int32ul, ) @click.command() @click_log.simple_verbosity_option(logger, "--vlog") @click.option( "--device-address", help=( "Device address (busnum.devnum) of the device to extract capture" " of. If none provided, device descriptors will be relied on." ), ) @click.option( "--encrypted-protocol / --no-encrypted-protocol", default=False, help=( "Whether to expect encrypted protocol in the capture." " Ignored if the device descriptors are present in the capture." ), ) @click.option( "--verbose-encryption-setup / --no-verbose-encryption-setup", default=False, help=( "Whether to parse encryption setup commands and printing their component" " together with the raw messsage." ), ) @click.option( "--print-keepalive / --no-print-keepalive", default=False, help=( "Whether to print the keepalive messages sent by the device. " "Keepalive messages are usually safely ignored." ), ) @click.argument( "pcap-file", type=click.File(mode="rb"), ) def main( *, device_address: str, encrypted_protocol: bool, verbose_encryption_setup: bool, print_keepalive: bool, pcap_file: BinaryIO, ) -> None: if sys.version_info < (3, 7): raise Exception("Unsupported Python version, please use at least Python 3.7.") session = usbmon.pcapng.parse_stream(pcap_file, retag_urbs=False) if not device_address: possible_addresses = list(session.find_devices_by_ids(_ABBOTT_VENDOR_ID, None)) if len(possible_addresses) > 1: raise click.UsageError( f"Multiple Abbott devices found, please select one of {','.join(possible_addresses)}" ) elif len(possible_addresses) == 0: raise click.UsageError("No Abbott devices found.") else: (device_address,) = possible_addresses if device_address not in session.device_descriptors: logging.warning( f"Unable to find device {device_address} in the capture's descriptors." " Assuming non-encrypted protocol.", ) else: descriptor = session.device_descriptors[device_address] assert descriptor.vendor_id == _ABBOTT_VENDOR_ID if descriptor.product_id == _LIBRE2_PRODUCT_ID: encrypted_protocol = True for packet in usbmon.support.hid.select(session, device_address=device_address): assert packet.report_content message_type = packet.report_id if message_type == _KEEPALIVE_TYPE and not print_keepalive: continue message_metadata = [] if encrypted_protocol and message_type not in _UNENCRYPTED_TYPES: # With encrypted communication, the length of the message is also encrypted, # and all the packets use the full 64 bytes. So instead, we extract what # metadata we can. parsed = _ENCRYPTED_MESSAGE.parse(packet.report_content) message_metadata.extend( [f"SEQUENCE_NUMBER={parsed.sequence_number}", f"MAC={parsed.mac:04x}"] ) message_type_str = f"x{message_type:02x}" message = parsed.encrypted_message elif verbose_encryption_setup and message_type in _ENCRYPTION_SETUP_TYPES: message_length = packet.report_content[0] message_end_idx = 1 + message_length message = packet.report_content[1:message_end_idx] if message[0] == _START_AUTHORIZE_CMD: message_metadata.append("START_AUTHORIZE") elif message[0] == _CHALLENGE_CMD: message_metadata.append("CHALLENGE") challenge = message[1:9] iv = message[9:16] message_metadata.append(f"CHALLENGE={challenge.hex()}") message_metadata.append(f"IV={iv.hex()}") elif message[0] == _CHALLENGE_RESPONSE_CMD: message_metadata.append("CHALLENGE_RESPONSE") encrypted_challenge = message[1:17] challenge_mac = message[18:26] message_metadata.append( f"ENCRYPTED_CHALLENGE={encrypted_challenge.hex()}" ) message_metadata.append(f"MAC={challenge_mac.hex()}") elif message[0] == _CHALLENGE_ACCEPTED_CMD: message_metadata.append("CHALLENGE_ACCEPTED") message_metadata.append(f"RAW_LENGTH={message_length}") message_type_str = f" {message_type:02x}" else: message_length = packet.report_content[0] message_metadata.append(f"LENGTH={message_length}") message_end_idx = 1 + message_length message_type_str = f" {message_type:02x}" message = packet.report_content[1:message_end_idx] if message_metadata: metadata_string = "\n".join( textwrap.wrap( " ".join(message_metadata), width=80, break_long_words=False ) ) print(metadata_string) print( usbmon.chatter.dump_bytes( packet.direction, message, prefix=f"[{message_type_str}]", print_empty=True, ), "\n", ) if __name__ == "__main__": main()