diff --git a/RELEASE.md b/RELEASE.md index 026c9f5..e07118a 100644 --- a/RELEASE.md +++ b/RELEASE.md @@ -1,5 +1,12 @@ # RELEASE NOTES +## v1.13.1 - Cryptography Version + +* PyPI 1.13.1 +* Require pyca/cryptography>=3.1 or fallback to PyCryptodome +* Add `tools/fake-v35-device.py` script to tools +* Allow pyca/cryptography to GCM decrypt without the tag (makes it match PyCryptodome) by @uzlonewolf in https://github.com/jasonacox/tinytuya/pull/424 + ## v1.13.0 - Crypto Library Update * PyPI 1.13.0 diff --git a/requirements.txt b/requirements.txt index 25f395c..aec1561 100644 --- a/requirements.txt +++ b/requirements.txt @@ -1,4 +1,4 @@ # -cryptography # Encryption - AES can also be provided via PyCryptodome or pyaes or pyca/cryptography +cryptography>=3.1 # Encryption - AES can also be provided via PyCryptodome or pyaes or pyca/cryptography requests # Used for Setup Wizard - Tuya IoT Platform calls colorama # Makes ANSI escape character sequences work under MS Windows. diff --git a/tinytuya/core.py b/tinytuya/core.py index 6637152..586b45b 100644 --- a/tinytuya/core.py +++ b/tinytuya/core.py @@ -92,10 +92,13 @@ Crypto = AES = CRYPTOLIB = None try: if clib == 'pyca/cryptography': # https://cryptography.io/en/latest/ + from cryptography import __version__ as Crypto_version + if (Crypto_version[:2] in ('0.', '1.', '2.')) or (Crypto_version == '3.0'): + # cryptography <= 3.0 requires a backend= parameter + continue from cryptography.hazmat.primitives.ciphers import Cipher as Crypto from cryptography.hazmat.primitives.ciphers import modes as Crypto_modes from cryptography.hazmat.primitives.ciphers.algorithms import AES - from cryptography import __version__ as Crypto_version elif clib == 'PyCryptodomex': # https://pycryptodome.readthedocs.io/en/latest/ # PyCryptodome is installed as "Cryptodome" when installed by # `apt install python3-pycryptodome` or `pip install pycryptodomex` @@ -120,7 +123,7 @@ # Colorama terminal color capability for all platforms init() -version_tuple = (1, 13, 0) +version_tuple = (1, 13, 1) version = __version__ = "%d.%d.%d" % version_tuple __author__ = "jasonacox" @@ -309,12 +312,12 @@ def decrypt(self, enc, use_base64=True, decode_text=True, verify_padding=False, raise ValueError("invalid length") if iv: iv, enc = self.get_decryption_iv( iv, enc ) - decryptor = Crypto( AES(self.key), Crypto_modes.GCM(iv, tag) ).decryptor() - if header: + if tag is None: + decryptor = Crypto( AES(self.key), Crypto_modes.CTR(iv + b'\x00\x00\x00\x02') ).decryptor() + else: + decryptor = Crypto( AES(self.key), Crypto_modes.GCM(iv, tag) ).decryptor() + if header and (tag is not None): decryptor.authenticate_additional_data( header ) - #if tag is None: - # raw = decryptor.update( enc ) - #else: raw = decryptor.update( enc ) + decryptor.finalize() else: decryptor = Crypto( AES(self.key), Crypto_modes.ECB() ).decryptor() diff --git a/tools/fake-v35-device.py b/tools/fake-v35-device.py new file mode 100644 index 0000000..e85a5ed --- /dev/null +++ b/tools/fake-v35-device.py @@ -0,0 +1,117 @@ + +import ttcorefunc as tinytuya +import socket +import select +import time +import json +from hashlib import md5, sha256 +import hmac + +bind_host = '' +bind_port = 6668 + +# can also be set to the address of a hub/gateway device or phone running SmartLife +bcast_to = '127.0.0.1' + +bcast_data = b'{"ip":"127.0.0.1","gwId":"eb0123456789abcdefghij","active":2,"ablilty":0,"encrypt":true,"productKey":"keydeadbeef12345","version":"3.5","token":true,"wf_cfg":true}' +real_key = b'thisisarealkey00' +local_nonce = str(time.time() * 1000000)[:16].encode('utf8') #b'0123456789abcdef' + +msg = tinytuya.TuyaMessage(1, tinytuya.UDP_NEW, 0, bcast_data, 0, True, tinytuya.PREFIX_6699_VALUE, True) +bcast_data = tinytuya.pack_message(msg,hmac_key=tinytuya.udpkey) +print("broadcast encrypted=%r" % bcast_data.hex() ) + + +srv = socket.socket( socket.AF_INET6, socket.SOCK_STREAM ) +srv.setsockopt( socket.SOL_SOCKET, socket.SO_REUSEADDR, 1 ) +srv.bind( (bind_host, bind_port) ) +srv.listen( 1 ) + +bsock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM) # UDP +bsock.setsockopt(socket.SOL_SOCKET, socket.SO_BROADCAST, 1) + +client = None + +bcast_time = 0 + +while True: + r = [srv] + if client: r.append( client ) + w = [] + x = [] + + r, w, x = select.select( r, w, x, 1 ) + #print('select') + + if( bcast_time < time.time() ): + bcast_time = time.time() + 8 + #print( 'bcast' ) + bsock.sendto( bcast_data, (bcast_to, 6667) ) + + for sock in r: + if sock is srv: + if client: + client.close() + client = None + client, addr = sock.accept() + client.setblocking( False ) + tmp_key = real_key + seqno = 1 + print( 'new client connected:', addr ) + continue + + if sock is not client: + print('not:', sock) + continue + + data = sock.recv( 4096 ) + #print( 'client data: %r' % data ) + if not data: + client.close() + client = None + continue + + print('') + print('client sent:', data) + #print(data.hex()) + m = tinytuya.unpack_message(data,hmac_key=tmp_key, no_retcode=True) + #print('payload len:', len(m.payload), 'tuya message:', m) + print('decoded message:', m) + + if m.cmd == tinytuya.SESS_KEY_NEG_START: + tmp_key = real_key + payload = m.payload + remote_nonce = payload + miv = remote_nonce[:12] + hmac_check = hmac.new(real_key, remote_nonce, sha256).digest() + msg = tinytuya.TuyaMessage(seqno, tinytuya.SESS_KEY_NEG_RESP, 0, local_nonce+hmac_check, 0, True, tinytuya.PREFIX_6699_VALUE, True) + seqno += 1 + data = tinytuya.pack_message(msg, hmac_key=tmp_key) + print( 'session neg start:', msg ) + client.sendall( data ) + elif m.cmd == tinytuya.SESS_KEY_NEG_FINISH: + rkey_hmac = hmac.new(real_key, local_nonce, sha256).digest() + print('neg fin. success:', rkey_hmac == m.payload) + print('want hmac:', rkey_hmac.hex()) + print('got hmac: ', m.payload.hex()) + tmp_key = bytes( [ a^b for (a,b) in zip(remote_nonce,local_nonce) ] ) + print( 'sess nonce:', tmp_key.hex() ) + cipher = tinytuya.AESCipher( real_key ) + print( 'sess iv:', m.iv.hex() ) + tmp_key = cipher.encrypt( tmp_key, use_base64=False, pad=False, iv=miv )[12:28] + print( 'sess key:', tmp_key.hex(), tmp_key) + elif m.cmd == tinytuya.DP_QUERY_NEW: + print('got status request') + resp = {'protocol': 4, 't': int(time.time()), 'data': {'dps': {'20': True, '21': 'white', '22': 946, '23': 3, '24': '014a03e803a9', '25': '04464602007803e803e800000000464602007803e8000a00000000', '26': 0, '34': False}} } + msg = tinytuya.TuyaMessage(seqno, 16, 0, json.dumps(resp).encode('ascii'), 0, True, tinytuya.PREFIX_6699_VALUE, True) + seqno += 1 + data = tinytuya.pack_message(msg, hmac_key=tmp_key) + client.sendall( data ) + else: + print('unhandled command', m.cmd) + msg = tinytuya.TuyaMessage(seqno, 16, 0, b'json obj data unvalid', 0, True, tinytuya.PREFIX_6699_VALUE, True) + seqno += 1 + data = tinytuya.pack_message(msg, hmac_key=tmp_key) + client.sendall( data ) + + diff --git a/tools/ttcorefunc.py b/tools/ttcorefunc.py new file mode 100644 index 0000000..031e39f --- /dev/null +++ b/tools/ttcorefunc.py @@ -0,0 +1,450 @@ +# Copy of TinyTuya core Module +# -*- coding: utf-8 -*- + +# Modules +from __future__ import print_function # python 2.7 support +import binascii +from collections import namedtuple +import base64 +from hashlib import md5,sha256 +import hmac +import json +import logging +import socket +import select +import struct +import sys +import time +from colorama import init + +# Required module: pycryptodome +import Cryptodome as Crypto +from Cryptodome.Cipher import AES # PyCrypto + +# Colorama terminal color capability for all platforms +init() + +log = logging.getLogger(__name__) + +# Globals Network Settings +MAXCOUNT = 15 # How many tries before stopping +SCANTIME = 18 # How many seconds to wait before stopping device discovery +UDPPORT = 6666 # Tuya 3.1 UDP Port +UDPPORTS = 6667 # Tuya 3.3 encrypted UDP Port +UDPPORTAPP = 7000 # Tuya app encrypted UDP Port +TCPPORT = 6668 # Tuya TCP Local Port +TIMEOUT = 3.0 # Seconds to wait for a broadcast +TCPTIMEOUT = 0.4 # Seconds to wait for socket open for scanning +DEFAULT_NETWORK = '192.168.0.0/24' + +# Configuration Files +CONFIGFILE = 'tinytuya.json' +DEVICEFILE = 'devices.json' +RAWFILE = 'tuya-raw.json' +SNAPSHOTFILE = 'snapshot.json' + +DEVICEFILE_SAVE_VALUES = ('category', 'product_name', 'product_id', 'biz_type', 'model', 'sub', 'icon', 'version', 'last_ip', 'uuid', 'node_id', 'sn', 'mapping') + +# Tuya Command Types +# Reference: https://github.com/tuya/tuya-iotos-embeded-sdk-wifi-ble-bk7231n/blob/master/sdk/include/lan_protocol.h +AP_CONFIG = 1 # FRM_TP_CFG_WF # only used for ap 3.0 network config +ACTIVE = 2 # FRM_TP_ACTV (discard) # WORK_MODE_CMD +SESS_KEY_NEG_START = 3 # FRM_SECURITY_TYPE3 # negotiate session key +SESS_KEY_NEG_RESP = 4 # FRM_SECURITY_TYPE4 # negotiate session key response +SESS_KEY_NEG_FINISH = 5 # FRM_SECURITY_TYPE5 # finalize session key negotiation +UNBIND = 6 # FRM_TP_UNBIND_DEV # DATA_QUERT_CMD - issue command +CONTROL = 7 # FRM_TP_CMD # STATE_UPLOAD_CMD +STATUS = 8 # FRM_TP_STAT_REPORT # STATE_QUERY_CMD +HEART_BEAT = 9 # FRM_TP_HB +DP_QUERY = 0x0a # 10 # FRM_QUERY_STAT # UPDATE_START_CMD - get data points +QUERY_WIFI = 0x0b # 11 # FRM_SSID_QUERY (discard) # UPDATE_TRANS_CMD +TOKEN_BIND = 0x0c # 12 # FRM_USER_BIND_REQ # GET_ONLINE_TIME_CMD - system time (GMT) +CONTROL_NEW = 0x0d # 13 # FRM_TP_NEW_CMD # FACTORY_MODE_CMD +ENABLE_WIFI = 0x0e # 14 # FRM_ADD_SUB_DEV_CMD # WIFI_TEST_CMD +WIFI_INFO = 0x0f # 15 # FRM_CFG_WIFI_INFO +DP_QUERY_NEW = 0x10 # 16 # FRM_QUERY_STAT_NEW +SCENE_EXECUTE = 0x11 # 17 # FRM_SCENE_EXEC +UPDATEDPS = 0x12 # 18 # FRM_LAN_QUERY_DP # Request refresh of DPS +UDP_NEW = 0x13 # 19 # FR_TYPE_ENCRYPTION +AP_CONFIG_NEW = 0x14 # 20 # FRM_AP_CFG_WF_V40 +BOARDCAST_LPV34 = 0x23 # 35 # FR_TYPE_BOARDCAST_LPV34 +LAN_EXT_STREAM = 0x40 # 64 # FRM_LAN_EXT_STREAM + +# Protocol Versions and Headers +PROTOCOL_VERSION_BYTES_31 = b"3.1" +PROTOCOL_VERSION_BYTES_33 = b"3.3" +PROTOCOL_VERSION_BYTES_34 = b"3.4" +PROTOCOL_VERSION_BYTES_35 = b"3.5" +PROTOCOL_3x_HEADER = 12 * b"\x00" +PROTOCOL_33_HEADER = PROTOCOL_VERSION_BYTES_33 + PROTOCOL_3x_HEADER +PROTOCOL_34_HEADER = PROTOCOL_VERSION_BYTES_34 + PROTOCOL_3x_HEADER +PROTOCOL_35_HEADER = PROTOCOL_VERSION_BYTES_35 + PROTOCOL_3x_HEADER +MESSAGE_HEADER_FMT = MESSAGE_HEADER_FMT_55AA = ">4I" # 4*uint32: prefix, seqno, cmd, length [, retcode] +MESSAGE_HEADER_FMT_6699 = ">IHIII" # 4*uint32: prefix, unknown, seqno, cmd, length +MESSAGE_RETCODE_FMT = ">I" # retcode for received messages +MESSAGE_END_FMT = MESSAGE_END_FMT_55AA = ">2I" # 2*uint32: crc, suffix +MESSAGE_END_FMT_HMAC = ">32sI" # 32s:hmac, uint32:suffix +MESSAGE_END_FMT_6699 = ">16sI" # 16s:tag, suffix +PREFIX_VALUE = PREFIX_55AA_VALUE = 0x000055AA +PREFIX_BIN = PREFIX_55AA_BIN = b"\x00\x00U\xaa" +SUFFIX_VALUE = SUFFIX_55AA_VALUE = 0x0000AA55 +SUFFIX_BIN = SUFFIX_55AA_BIN = b"\x00\x00\xaaU" +PREFIX_6699_VALUE = 0x00006699 +PREFIX_6699_BIN = b"\x00\x00\x66\x99" +SUFFIX_6699_VALUE = 0x00009966 +SUFFIX_6699_BIN = b"\x00\x00\x99\x66" + +NO_PROTOCOL_HEADER_CMDS = [DP_QUERY, DP_QUERY_NEW, UPDATEDPS, HEART_BEAT, SESS_KEY_NEG_START, SESS_KEY_NEG_RESP, SESS_KEY_NEG_FINISH, LAN_EXT_STREAM ] + +# Python 2 Support +IS_PY2 = sys.version_info[0] == 2 + +# Tuya Packet Format +TuyaHeader = namedtuple('TuyaHeader', 'prefix seqno cmd length total_length') +MessagePayload = namedtuple("MessagePayload", "cmd payload") +try: + TuyaMessage = namedtuple("TuyaMessage", "seqno cmd retcode payload crc crc_good prefix iv", defaults=(True,0x55AA,None)) +except: + TuyaMessage = namedtuple("TuyaMessage", "seqno cmd retcode payload crc crc_good prefix iv") + +# TinyTuya Error Response Codes +ERR_JSON = 900 +ERR_CONNECT = 901 +ERR_TIMEOUT = 902 +ERR_RANGE = 903 +ERR_PAYLOAD = 904 +ERR_OFFLINE = 905 +ERR_STATE = 906 +ERR_FUNCTION = 907 +ERR_DEVTYPE = 908 +ERR_CLOUDKEY = 909 +ERR_CLOUDRESP = 910 +ERR_CLOUDTOKEN = 911 +ERR_PARAMS = 912 +ERR_CLOUD = 913 +ERR_KEY_OR_VER = 914 + +error_codes = { + ERR_JSON: "Invalid JSON Response from Device", + ERR_CONNECT: "Network Error: Unable to Connect", + ERR_TIMEOUT: "Timeout Waiting for Device", + ERR_RANGE: "Specified Value Out of Range", + ERR_PAYLOAD: "Unexpected Payload from Device", + ERR_OFFLINE: "Network Error: Device Unreachable", + ERR_STATE: "Device in Unknown State", + ERR_FUNCTION: "Function Not Supported by Device", + ERR_DEVTYPE: "Device22 Detected: Retry Command", + ERR_CLOUDKEY: "Missing Tuya Cloud Key and Secret", + ERR_CLOUDRESP: "Invalid JSON Response from Cloud", + ERR_CLOUDTOKEN: "Unable to Get Cloud Token", + ERR_PARAMS: "Missing Function Parameters", + ERR_CLOUD: "Error Response from Tuya Cloud", + ERR_KEY_OR_VER: "Check device key or version", + None: "Unknown Error", +} + +class DecodeError(Exception): + pass + +# Cryptography Helpers +class AESCipher(object): + def __init__(self, key): + self.bs = 16 + self.key = key + + def encrypt(self, raw, use_base64=True, pad=True, iv=False, header=None): # pylint: disable=W0621 + if Crypto: + if iv: # initialization vector or nonce (number used once) + if iv is True: + if log.isEnabledFor( logging.DEBUG ): + iv = b'0123456789ab' + else: + iv = str(time.time() * 10)[:12].encode('utf8') + cipher = AES.new(self.key, mode=AES.MODE_GCM, nonce=iv) + if header: + cipher.update(header) + crypted_text, tag = cipher.encrypt_and_digest(raw) + crypted_text = cipher.nonce + crypted_text + tag + else: + if pad: raw = self._pad(raw) + cipher = AES.new(self.key, mode=AES.MODE_ECB) + crypted_text = cipher.encrypt(raw) + else: + if iv: + # GCM required for 3.5 devices + raise NotImplementedError( 'pyaes does not support GCM, please install PyCryptodome' ) + + _ = self._pad(raw) + # pylint: disable-next=used-before-assignment + cipher = pyaes.blockfeeder.Encrypter( + pyaes.AESModeOfOperationECB(self.key), + pyaes.PADDING_DEFAULT if pad else pyaes.PADDING_NONE + ) # no IV, auto pads to 16 + crypted_text = cipher.feed(raw) + crypted_text += cipher.feed() # flush final block + + if use_base64: + return base64.b64encode(crypted_text) + else: + return crypted_text + + def decrypt(self, enc, use_base64=True, decode_text=True, verify_padding=False, iv=False, header=None, tag=None): + if not iv: + if use_base64: + enc = base64.b64decode(enc) + + if len(enc) % 16 != 0: + raise ValueError("invalid length") + + if Crypto: + if iv: + if iv is True: + iv = enc[:12] + enc = enc[12:] + cipher = AES.new(self.key, AES.MODE_GCM, nonce=iv) + if header: + cipher.update(header) + if tag: + raw = cipher.decrypt_and_verify(enc, tag) + else: + raw = cipher.decrypt(enc) + else: + cipher = AES.new(self.key, AES.MODE_ECB) + raw = cipher.decrypt(enc) + raw = self._unpad(raw, verify_padding) + return raw.decode("utf-8") if decode_text else raw + else: + if iv: + # GCM required for 3.5 devices + raise NotImplementedError( 'pyaes does not support GCM, please install PyCryptodome' ) + cipher = pyaes.blockfeeder.Decrypter( + pyaes.AESModeOfOperationECB(self.key), + pyaes.PADDING_NONE if verify_padding else pyaes.PADDING_DEFAULT + ) # no IV, auto pads to 16 + raw = cipher.feed(enc) + raw += cipher.feed() # flush final block + if verify_padding: raw = self._unpad(raw, verify_padding) + return raw.decode("utf-8") if decode_text else raw + + def _pad(self, s): + padnum = self.bs - len(s) % self.bs + return s + padnum * chr(padnum).encode() + + @staticmethod + def _unpad(s, verify_padding=False): + padlen = ord(s[-1:]) + if padlen < 1 or padlen > 16: + raise ValueError("invalid padding length byte") + if verify_padding and s[-padlen:] != (padlen * chr(padlen).encode()): + raise ValueError("invalid padding data") + return s[:-padlen] + +# Misc Helpers +def bin2hex(x, pretty=False): + if pretty: + space = " " + else: + space = "" + if IS_PY2: + result = "".join("%02X%s" % (ord(y), space) for y in x) + else: + result = "".join("%02X%s" % (y, space) for y in x) + return result + +def hex2bin(x): + if IS_PY2: + return x.decode("hex") + else: + return bytes.fromhex(x) + +def set_debug(toggle=True, color=True): + """Enable tinytuya verbose logging""" + if toggle: + if color: + logging.basicConfig( + format="\x1b[31;1m%(levelname)s:%(message)s\x1b[0m", level=logging.DEBUG + ) + else: + logging.basicConfig(format="%(levelname)s:%(message)s", level=logging.DEBUG) + log.setLevel(logging.DEBUG) + log.debug("TinyTuya [%s]\n", __version__) + log.debug("Python %s on %s", sys.version, sys.platform) + if Crypto is None: + # pylint: disable-next=used-before-assignment + log.debug("Using pyaes version %r", pyaes.VERSION) + else: + log.debug("Using PyCrypto %r", Crypto.version_info) + else: + log.setLevel(logging.NOTSET) + +def pack_message(msg, hmac_key=None): + """Pack a TuyaMessage into bytes.""" + if msg.prefix == PREFIX_55AA_VALUE: + header_fmt = MESSAGE_HEADER_FMT_55AA + end_fmt = MESSAGE_END_FMT_HMAC if hmac_key else MESSAGE_END_FMT_55AA + msg_len = len(msg.payload) + struct.calcsize(end_fmt) + header_data = ( msg.prefix, msg.seqno, msg.cmd, msg_len ) + elif msg.prefix == PREFIX_6699_VALUE: + if not hmac_key: + raise TypeError( 'key must be provided to pack 6699-format messages' ) + header_fmt = MESSAGE_HEADER_FMT_6699 + end_fmt = MESSAGE_END_FMT_6699 + msg_len = len(msg.payload) + (struct.calcsize(end_fmt) - 4) + 12 + if type(msg.retcode) == int: + msg_len += struct.calcsize(MESSAGE_RETCODE_FMT) + header_data = ( msg.prefix, 0, msg.seqno, msg.cmd, msg_len ) + else: + raise ValueError( 'pack_message() cannot handle message format %08X' % msg.prefix ) + + # Create full message excluding CRC and suffix + data = struct.pack( header_fmt, *header_data ) + + if msg.prefix == PREFIX_6699_VALUE: + cipher = AESCipher( hmac_key ) + if type(msg.retcode) == int: + raw = struct.pack( MESSAGE_RETCODE_FMT, msg.retcode ) + msg.payload + else: + raw = msg.payload + data2 = cipher.encrypt( raw, use_base64=False, pad=False, iv=True if not msg.iv else msg.iv, header=data[4:]) + data += data2 + SUFFIX_6699_BIN + else: + data += msg.payload + if hmac_key: + crc = hmac.new(hmac_key, data, sha256).digest() + else: + crc = binascii.crc32(data) & 0xFFFFFFFF + # Calculate CRC, add it together with suffix + data += struct.pack( end_fmt, crc, SUFFIX_VALUE ) + + return data + +def unpack_message(data, hmac_key=None, header=None, no_retcode=False): + """Unpack bytes into a TuyaMessage.""" + if header is None: + header = parse_header(data) + + if header.prefix == PREFIX_55AA_VALUE: + # 4-word header plus return code + header_len = struct.calcsize(MESSAGE_HEADER_FMT_55AA) + end_fmt = MESSAGE_END_FMT_HMAC if hmac_key else MESSAGE_END_FMT_55AA + retcode_len = 0 if no_retcode else struct.calcsize(MESSAGE_RETCODE_FMT) + msg_len = header_len + header.length + elif header.prefix == PREFIX_6699_VALUE: + if not hmac_key: + raise TypeError( 'key must be provided to unpack 6699-format messages' ) + header_len = struct.calcsize(MESSAGE_HEADER_FMT_6699) + end_fmt = MESSAGE_END_FMT_6699 + retcode_len = 0 + msg_len = header_len + header.length + 4 + else: + raise ValueError( 'unpack_message() cannot handle message format %08X' % header.prefix ) + + if len(data) < msg_len: + log.debug('unpack_message(): not enough data to unpack payload! need %d but only have %d', header_len+header.length, len(data)) + raise DecodeError('Not enough data to unpack payload') + + end_len = struct.calcsize(end_fmt) + # the retcode is technically part of the payload, but strip it as we do not want it here + retcode = 0 if not retcode_len else struct.unpack(MESSAGE_RETCODE_FMT, data[header_len:header_len+retcode_len])[0] + payload = data[header_len+retcode_len:msg_len] + crc, suffix = struct.unpack(end_fmt, payload[-end_len:]) + payload = payload[:-end_len] + + if header.prefix == PREFIX_55AA_VALUE: + if hmac_key: + have_crc = hmac.new(hmac_key, data[:(header_len+header.length)-end_len], sha256).digest() + else: + have_crc = binascii.crc32(data[:(header_len+header.length)-end_len]) & 0xFFFFFFFF + + if suffix != SUFFIX_VALUE: + log.debug('Suffix prefix wrong! %08X != %08X', suffix, SUFFIX_VALUE) + + if crc != have_crc: + if hmac_key: + log.debug('HMAC checksum wrong! %r != %r', binascii.hexlify(have_crc), binascii.hexlify(crc)) + else: + log.debug('CRC wrong! %08X != %08X', have_crc, crc) + crc_good = crc == have_crc + iv = None + elif header.prefix == PREFIX_6699_VALUE: + iv = payload[:12] + payload = payload[12:] + try: + cipher = AESCipher( hmac_key ) + payload = cipher.decrypt( payload, use_base64=False, decode_text=False, verify_padding=False, iv=iv, header=data[4:header_len], tag=crc) + crc_good = True + except: + crc_good = False + + retcode_len = struct.calcsize(MESSAGE_RETCODE_FMT) + if no_retcode is False: + pass + elif no_retcode is None and payload[0:1] != b'{' and payload[retcode_len:retcode_len+1] == b'{': + retcode_len = struct.calcsize(MESSAGE_RETCODE_FMT) + else: + retcode_len = 0 + if retcode_len: + retcode = struct.unpack(MESSAGE_RETCODE_FMT, payload[:retcode_len])[0] + payload = payload[retcode_len:] + + return TuyaMessage(header.seqno, header.cmd, retcode, payload, crc, crc_good, header.prefix, iv) + +def parse_header(data): + if( data[:4] == PREFIX_6699_BIN ): + fmt = MESSAGE_HEADER_FMT_6699 + else: + fmt = MESSAGE_HEADER_FMT_55AA + + header_len = struct.calcsize(fmt) + + if len(data) < header_len: + raise DecodeError('Not enough data to unpack header') + + unpacked = struct.unpack( fmt, data[:header_len] ) + prefix = unpacked[0] + + if prefix == PREFIX_55AA_VALUE: + prefix, seqno, cmd, payload_len = unpacked + total_length = payload_len + header_len + elif prefix == PREFIX_6699_VALUE: + prefix, unknown, seqno, cmd, payload_len = unpacked + #seqno |= unknown << 32 + total_length = payload_len + header_len + len(SUFFIX_6699_BIN) + else: + #log.debug('Header prefix wrong! %08X != %08X', prefix, PREFIX_VALUE) + raise DecodeError('Header prefix wrong! %08X is not %08X or %08X' % (prefix, PREFIX_55AA_VALUE, PREFIX_6699_VALUE)) + + # sanity check. currently the max payload length is somewhere around 300 bytes + if payload_len > 1000: + raise DecodeError('Header claims the packet size is over 1000 bytes! It is most likely corrupt. Claimed size: %d bytes. fmt:%s unpacked:%r' % (payload_len,fmt,unpacked)) + + return TuyaHeader(prefix, seqno, cmd, payload_len, total_length) + +def has_suffix(payload): + """Check to see if payload has valid Tuya suffix""" + if len(payload) < 4: + return False + log.debug("buffer %r = %r", payload[-4:], SUFFIX_BIN) + return payload[-4:] == SUFFIX_BIN + +def error_json(number=None, payload=None): + """Return error details in JSON""" + try: + spayload = json.dumps(payload) + # spayload = payload.replace('\"','').replace('\'','') + except: + spayload = '""' + + vals = (error_codes[number], str(number), spayload) + log.debug("ERROR %s - %s - payload: %s", *vals) + + return json.loads('{ "Error":"%s", "Err":"%s", "Payload":%s }' % vals) + +def encrypt(msg, key): + return AESCipher( key ).encrypt( msg, use_base64=False, pad=True ) + +def decrypt(msg, key): + return AESCipher( key ).decrypt( msg, use_base64=False, decode_text=True ) + +# UDP packet payload decryption - credit to tuya-convert +udpkey = md5(b"yGAdlopoPVldABfn").digest()