run python black
This commit is contained in:
@@ -24,7 +24,7 @@ from sign_firmware import *
|
||||
httpport = 8080
|
||||
udpport = 8111
|
||||
|
||||
HEX_FILE = '../efm32/GNU ARM v7.2.1 - Debug/EFM32.hex'
|
||||
HEX_FILE = "../efm32/GNU ARM v7.2.1 - Debug/EFM32.hex"
|
||||
|
||||
|
||||
def ForceU2F(client, device):
|
||||
@@ -34,13 +34,13 @@ def ForceU2F(client, device):
|
||||
client._do_get_assertion = client._ctap1_get_assertion
|
||||
|
||||
|
||||
if __name__ == '__main__':
|
||||
if __name__ == "__main__":
|
||||
try:
|
||||
dev = next(CtapHidDevice.list_devices(), None)
|
||||
print(dev)
|
||||
if not dev:
|
||||
raise RuntimeError('No FIDO device found')
|
||||
client = Fido2Client(dev, 'https://example.com')
|
||||
raise RuntimeError("No FIDO device found")
|
||||
client = Fido2Client(dev, "https://example.com")
|
||||
ForceU2F(client, dev)
|
||||
ctap = client.ctap
|
||||
except Exception as e:
|
||||
@@ -50,8 +50,8 @@ if __name__ == '__main__':
|
||||
def write(data):
|
||||
msg = from_websafe(data)
|
||||
msg = base64.b64decode(msg)
|
||||
chal = b'A' * 32
|
||||
appid = b'A' * 32
|
||||
chal = b"A" * 32
|
||||
appid = b"A" * 32
|
||||
# print (msg)
|
||||
# print (msg.decode())
|
||||
# print (str(msg))
|
||||
@@ -80,40 +80,40 @@ def read():
|
||||
|
||||
class UDPBridge(BaseHTTPRequestHandler):
|
||||
def end_headers(self):
|
||||
self.send_header('Access-Control-Allow-Origin', '*')
|
||||
self.send_header("Access-Control-Allow-Origin", "*")
|
||||
BaseHTTPRequestHandler.end_headers(self)
|
||||
|
||||
def do_POST(self):
|
||||
content_len = int(self.headers.get('Content-Length', 0))
|
||||
content_len = int(self.headers.get("Content-Length", 0))
|
||||
post_body = self.rfile.read(content_len)
|
||||
data = json.loads(post_body)['data']
|
||||
data = json.loads(post_body)["data"]
|
||||
|
||||
print(data)
|
||||
msg = from_websafe(data)
|
||||
msg = base64.b64decode(msg)
|
||||
chal = b"\xf6\xa2\x3c\xa4\x0a\xf9\xda\xd4\x5f\xdc\xba\x7d\xc9\xde\xcb\xed\xb5\x84\x64\x3a\x4c\x9f\x44\xc2\x04\xb0\x17\xd7\xf4\x3e\xe0\x3f"
|
||||
appid = b'A' * 32
|
||||
appid = b"A" * 32
|
||||
|
||||
s = ctap.authenticate(chal, appid, msg)
|
||||
|
||||
data = (
|
||||
struct.pack('B', s.user_presence)
|
||||
+ struct.pack('>L', s.counter)
|
||||
struct.pack("B", s.user_presence)
|
||||
+ struct.pack(">L", s.counter)
|
||||
+ s.signature
|
||||
)
|
||||
data = base64.b64encode(data).decode('ascii')
|
||||
data = base64.b64encode(data).decode("ascii")
|
||||
data = to_websafe(data)
|
||||
data = json.dumps({'data': data})
|
||||
data = data.encode('ascii')
|
||||
data = json.dumps({"data": data})
|
||||
data = data.encode("ascii")
|
||||
|
||||
self.send_response(200)
|
||||
self.send_header('Content-type', 'text/json')
|
||||
self.send_header("Content-type", "text/json")
|
||||
self.end_headers()
|
||||
self.wfile.write(data)
|
||||
|
||||
def do_GET(self):
|
||||
self.send_response(200)
|
||||
self.send_header('Content-type', 'text/json')
|
||||
self.send_header("Content-type", "text/json")
|
||||
|
||||
msg = get_firmware_object("signing_key.pem", HEX_FILE)
|
||||
|
||||
@@ -123,19 +123,19 @@ class UDPBridge(BaseHTTPRequestHandler):
|
||||
|
||||
|
||||
try:
|
||||
server = HTTPServer(('', httpport), UDPBridge)
|
||||
print('Started httpserver on port ', httpport)
|
||||
server = HTTPServer(("", httpport), UDPBridge)
|
||||
print("Started httpserver on port ", httpport)
|
||||
|
||||
server.socket = ssl.wrap_socket(
|
||||
server.socket,
|
||||
keyfile="../web/localhost.key",
|
||||
certfile='../web/localhost.crt',
|
||||
certfile="../web/localhost.crt",
|
||||
server_side=True,
|
||||
)
|
||||
|
||||
print('Saving signed firmware to firmware.json')
|
||||
print("Saving signed firmware to firmware.json")
|
||||
msg = get_firmware_object("signing_key.pem", HEX_FILE)
|
||||
wfile = open('firmware.json', 'wb+')
|
||||
wfile = open("firmware.json", "wb+")
|
||||
wfile.write(json.dumps(msg).encode())
|
||||
wfile.close()
|
||||
|
||||
|
Reference in New Issue
Block a user