forked from OpenMiHome/mihome-binary-protocol
-
Notifications
You must be signed in to change notification settings - Fork 0
/
miio.py
145 lines (116 loc) · 4.56 KB
/
miio.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
#!/usr/bin/env python3
"""Xiaomi MiHome Binary protocol.
This module supports the encrypted Xiaomi MiHome protocol.
https://github.com/ximihobi
(c) 2016-2017 Wolfgang Frisch
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.
"""
import struct
import hashlib
# https://cryptography.io/
from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes
from cryptography.hazmat.backends import default_backend
from cryptography.hazmat.primitives import padding
_backend = default_backend()
def md5(inp: bytes) -> bytes:
m = hashlib.md5()
m.update(inp)
return m.digest()
def key_iv(token: bytes) -> (bytes, bytes):
"""Derive (Key, IV) from a Xiaomi MiHome device token (128 bits)."""
key = md5(token)
iv = md5(key + token)
return (key, iv)
def AES_cbc_encrypt(token: bytes, plaintext: bytes) -> bytes:
"""Encrypt plain text with device token."""
key, iv = key_iv(token)
padder = padding.PKCS7(128).padder()
padded_plaintext = padder.update(plaintext)
padded_plaintext += padder.finalize()
cipher = Cipher(algorithms.AES(key), modes.CBC(iv), backend=_backend)
encryptor = cipher.encryptor()
return encryptor.update(padded_plaintext) + encryptor.finalize()
def AES_cbc_decrypt(token: bytes, ciphertext: bytes) -> bytes:
"""Decrypt cipher text with device token."""
key, iv = key_iv(token)
cipher = Cipher(algorithms.AES(key), modes.CBC(iv), backend=_backend)
decryptor = cipher.decryptor()
padded_plaintext = decryptor.update(bytes(ciphertext)) \
+ decryptor.finalize()
unpadder = padding.PKCS7(128).unpadder()
unpadded_plaintext = unpadder.update(padded_plaintext)
unpadded_plaintext += unpadder.finalize()
return unpadded_plaintext
def print_head(raw_packet: bytes):
"""Print the header fields of a MiHome packet."""
head = raw_packet[:32]
magic, packet_len, unknown1, unknown2, stamp, md5 = \
struct.unpack('!2sHIII16s', head)
print(" magic: %8s" % magic.hex())
print(" packet_len: %8x" % packet_len)
print(" unknown1: %8x" % unknown1)
print(" unknown2: %8x" % unknown2)
print(" stamp: %8x" % stamp)
print(" md5 checksum: %s" % md5.hex())
def encrypt(stamp: int, token: bytes, plaindata: bytes) -> bytes:
"""Generate an encrypted packet from plain data.
Args:
stamp: incrementing counter
token: 128 bit device token
plaindata: plain data
"""
def init_msg_head(stamp: int, token: bytes, packet_len: int) -> bytes:
head = struct.pack(
'!BBHIII16s',
0x21, 0x31, # const magic value
packet_len,
0, # unknown const
0x02af3988, # unknown const
stamp,
token # overwritten by the MD5 checksum later
)
return head
payload = AES_cbc_encrypt(token, plaindata)
packet_len = len(payload) + 32
packet = bytearray(init_msg_head(stamp, token, packet_len) + payload)
checksum = md5(packet)
for i in range(0, 16):
packet[i+16] = checksum[i]
return packet
def decrypt(token: bytes, cipherpacket: bytes) -> bytes:
"""Decrypt a packet.
Args:
token: 128 bit device token
cipherpacket: packet data
"""
ciphertext = cipherpacket[32:]
plaindata = AES_cbc_decrypt(token, ciphertext)
return plaindata
class MiioPacket():
def __init__(self):
self.magic = (0x21, 0x31)
self.length = None
self.unknown1 = 0
self.unknown2 = 0x02af3988
self.stamp = 0
self.data = None
self.md5 = None
def read(self, raw: bytes):
"""Parse the payload of a UDP packet."""
head = raw[:32]
self.magic, self.length, self.unknown1, \
self.unknown2, self.stamp, self.md5 = \
struct.unpack('!2sHIII16s', head)
self.data = raw[32:]
def generate(self, token: bytes) -> bytes:
"""Generate an encrypted packet."""
return encrypt(self.stamp, token, self.data)
# vim:set expandtab tabstop=4 shiftwidth=4 softtabstop=4 nowrap: