blob: c8079f665b982fe5b1527c15dc386952aa92fc22 [file] [log] [blame]
Sylvain Munaute7c15cd2010-12-07 10:01:55 +01001# -*- coding: utf-8 -*-
2
3""" pySim: PCSC reader transport link base
4"""
5
Vadim Yanitskiye8c34ca2021-05-02 02:29:52 +02006import abc
Harald Welte28c24312021-04-11 12:19:36 +02007import argparse
Vadim Yanitskiye8c34ca2021-05-02 02:29:52 +02008from typing import Optional, Tuple
Harald Welteab6897c2023-07-09 16:21:23 +02009from construct import Construct
Harald Welte6e0458d2021-04-03 11:52:37 +020010
Harald Weltee79cc802021-01-21 14:10:43 +010011from pySim.exceptions import *
Harald Weltee0f9ef12021-04-10 17:22:35 +020012from pySim.construct import filter_dict
Harald Weltef9f8d7a2023-07-09 17:06:16 +020013from pySim.utils import sw_match, b2h, h2b, i2h, Hexstr, SwHexstr, SwMatchstr, ResTuple
Christian Amsüss59f3b112022-08-12 15:46:52 +020014from pySim.cat import ProactiveCommand, CommandDetails, DeviceIdentities, Result
Harald Weltee79cc802021-01-21 14:10:43 +010015
Sylvain Munaute7c15cd2010-12-07 10:01:55 +010016#
17# Copyright (C) 2009-2010 Sylvain Munaut <tnt@246tNt.com>
Harald Weltef9f8d7a2023-07-09 17:06:16 +020018# Copyright (C) 2021-2023 Harald Welte <laforge@osmocom.org>
Sylvain Munaute7c15cd2010-12-07 10:01:55 +010019#
20# This program is free software: you can redistribute it and/or modify
21# it under the terms of the GNU General Public License as published by
22# the Free Software Foundation, either version 2 of the License, or
23# (at your option) any later version.
24#
25# This program is distributed in the hope that it will be useful,
26# but WITHOUT ANY WARRANTY; without even the implied warranty of
27# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
28# GNU General Public License for more details.
29#
30# You should have received a copy of the GNU General Public License
31# along with this program. If not, see <http://www.gnu.org/licenses/>.
32#
33
Harald Welte7829d8a2021-04-10 11:28:53 +020034
Harald Weltec91085e2022-02-10 18:05:45 +010035class ApduTracer:
36 def trace_command(self, cmd):
37 pass
38
39 def trace_response(self, cmd, sw, resp):
40 pass
Harald Welte7829d8a2021-04-10 11:28:53 +020041
Harald Weltefd476b42022-08-06 14:01:26 +020042class ProactiveHandler(abc.ABC):
43 """Abstract base class representing the interface of some code that handles
44 the proactive commands, as returned by the card in responses to the FETCH
45 command."""
Christian Amsüss59f3b112022-08-12 15:46:52 +020046 def receive_fetch_raw(self, pcmd: ProactiveCommand, parsed: Hexstr):
Harald Weltefd476b42022-08-06 14:01:26 +020047 # try to find a generic handler like handle_SendShortMessage
48 handle_name = 'handle_%s' % type(parsed).__name__
49 if hasattr(self, handle_name):
50 handler = getattr(self, handle_name)
51 return handler(pcmd.decoded)
52 # fall back to common handler
53 return self.receive_fetch(pcmd)
54
55 def receive_fetch(self, pcmd: ProactiveCommand):
56 """Default handler for not otherwise handled proactive commands."""
57 raise NotImplementedError('No handler method for %s' % pcmd.decoded)
58
59
Harald Welte7829d8a2021-04-10 11:28:53 +020060
Vadim Yanitskiye8c34ca2021-05-02 02:29:52 +020061class LinkBase(abc.ABC):
Harald Weltec91085e2022-02-10 18:05:45 +010062 """Base class for link/transport to card."""
Sylvain Munaute7c15cd2010-12-07 10:01:55 +010063
Harald Welteab6897c2023-07-09 16:21:23 +020064 def __init__(self, sw_interpreter=None, apdu_tracer: Optional[ApduTracer]=None,
Harald Weltefd476b42022-08-06 14:01:26 +020065 proactive_handler: Optional[ProactiveHandler]=None):
Harald Weltec91085e2022-02-10 18:05:45 +010066 self.sw_interpreter = sw_interpreter
67 self.apdu_tracer = apdu_tracer
Harald Weltefd476b42022-08-06 14:01:26 +020068 self.proactive_handler = proactive_handler
Harald Welte4f2c5462021-04-03 11:48:22 +020069
Harald Weltec91085e2022-02-10 18:05:45 +010070 @abc.abstractmethod
Harald Weltef9f8d7a2023-07-09 17:06:16 +020071 def _send_apdu_raw(self, pdu: Hexstr) -> ResTuple:
Harald Weltec91085e2022-02-10 18:05:45 +010072 """Implementation specific method for sending the PDU."""
Vadim Yanitskiye8c34ca2021-05-02 02:29:52 +020073
Harald Weltec91085e2022-02-10 18:05:45 +010074 def set_sw_interpreter(self, interp):
75 """Set an (optional) status word interpreter."""
76 self.sw_interpreter = interp
Harald Welte4f2c5462021-04-03 11:48:22 +020077
Harald Weltec91085e2022-02-10 18:05:45 +010078 @abc.abstractmethod
Harald Welteab6897c2023-07-09 16:21:23 +020079 def wait_for_card(self, timeout: Optional[int] = None, newcardonly: bool = False):
Harald Weltec91085e2022-02-10 18:05:45 +010080 """Wait for a card and connect to it
Sylvain Munautbdca2522010-12-09 13:31:58 +010081
Harald Weltec91085e2022-02-10 18:05:45 +010082 Args:
83 timeout : Maximum wait time in seconds (None=no timeout)
84 newcardonly : Should we wait for a new card, or an already inserted one ?
85 """
Sylvain Munautbdca2522010-12-09 13:31:58 +010086
Harald Weltec91085e2022-02-10 18:05:45 +010087 @abc.abstractmethod
88 def connect(self):
89 """Connect to a card immediately
90 """
Sylvain Munautbdca2522010-12-09 13:31:58 +010091
Harald Weltec91085e2022-02-10 18:05:45 +010092 @abc.abstractmethod
93 def disconnect(self):
94 """Disconnect from card
95 """
Sylvain Munautbdca2522010-12-09 13:31:58 +010096
Harald Weltec91085e2022-02-10 18:05:45 +010097 @abc.abstractmethod
98 def reset_card(self):
99 """Resets the card (power down/up)
100 """
Sylvain Munaute7c15cd2010-12-07 10:01:55 +0100101
Harald Weltef9f8d7a2023-07-09 17:06:16 +0200102 def send_apdu_raw(self, pdu: Hexstr) -> ResTuple:
Harald Weltec91085e2022-02-10 18:05:45 +0100103 """Sends an APDU with minimal processing
Sylvain Munaute7c15cd2010-12-07 10:01:55 +0100104
Harald Weltec91085e2022-02-10 18:05:45 +0100105 Args:
106 pdu : string of hexadecimal characters (ex. "A0A40000023F00")
107 Returns:
108 tuple(data, sw), where
109 data : string (in hex) of returned data (ex. "074F4EFFFF")
110 sw : string (in hex) of status word (ex. "9000")
111 """
112 if self.apdu_tracer:
113 self.apdu_tracer.trace_command(pdu)
114 (data, sw) = self._send_apdu_raw(pdu)
115 if self.apdu_tracer:
116 self.apdu_tracer.trace_response(pdu, sw, data)
117 return (data, sw)
Sylvain Munaute7c15cd2010-12-07 10:01:55 +0100118
Harald Weltef9f8d7a2023-07-09 17:06:16 +0200119 def send_apdu(self, pdu: Hexstr) -> ResTuple:
Harald Weltec91085e2022-02-10 18:05:45 +0100120 """Sends an APDU and auto fetch response data
Sylvain Munaute7c15cd2010-12-07 10:01:55 +0100121
Harald Weltec91085e2022-02-10 18:05:45 +0100122 Args:
123 pdu : string of hexadecimal characters (ex. "A0A40000023F00")
124 Returns:
125 tuple(data, sw), where
126 data : string (in hex) of returned data (ex. "074F4EFFFF")
127 sw : string (in hex) of status word (ex. "9000")
128 """
129 data, sw = self.send_apdu_raw(pdu)
Sylvain Munaute7c15cd2010-12-07 10:01:55 +0100130
Harald Weltec91085e2022-02-10 18:05:45 +0100131 # When we have sent the first APDU, the SW may indicate that there are response bytes
132 # available. There are two SWs commonly used for this 9fxx (sim) and 61xx (usim), where
133 # xx is the number of response bytes available.
134 # See also:
135 if (sw is not None):
136 if ((sw[0:2] == '9f') or (sw[0:2] == '61')):
137 # SW1=9F: 3GPP TS 51.011 9.4.1, Responses to commands which are correctly executed
138 # SW1=61: ISO/IEC 7816-4, Table 5 — General meaning of the interindustry values of SW1-SW2
139 pdu_gr = pdu[0:2] + 'c00000' + sw[2:4]
140 data, sw = self.send_apdu_raw(pdu_gr)
141 if sw[0:2] == '6c':
142 # SW1=6C: ETSI TS 102 221 Table 7.1: Procedure byte coding
143 pdu_gr = pdu[0:8] + sw[2:4]
144 data, sw = self.send_apdu_raw(pdu_gr)
Sylvain Munaute7c15cd2010-12-07 10:01:55 +0100145
Harald Weltec91085e2022-02-10 18:05:45 +0100146 return data, sw
Sylvain Munaute7c15cd2010-12-07 10:01:55 +0100147
Harald Weltef9f8d7a2023-07-09 17:06:16 +0200148 def send_apdu_checksw(self, pdu: Hexstr, sw: SwMatchstr = "9000") -> ResTuple:
Harald Weltec91085e2022-02-10 18:05:45 +0100149 """Sends an APDU and check returned SW
Sylvain Munaute7c15cd2010-12-07 10:01:55 +0100150
Harald Weltec91085e2022-02-10 18:05:45 +0100151 Args:
152 pdu : string of hexadecimal characters (ex. "A0A40000023F00")
153 sw : string of 4 hexadecimal characters (ex. "9000"). The user may mask out certain
154 digits using a '?' to add some ambiguity if needed.
155 Returns:
156 tuple(data, sw), where
157 data : string (in hex) of returned data (ex. "074F4EFFFF")
158 sw : string (in hex) of status word (ex. "9000")
159 """
160 rv = self.send_apdu(pdu)
Christian Amsüss98552ef2022-08-11 19:29:37 +0200161 last_sw = rv[1]
Philipp Maierd4ebb6f2018-06-12 17:56:07 +0200162
Christian Amsüss98552ef2022-08-11 19:29:37 +0200163 while sw == '9000' and sw_match(last_sw, '91xx'):
164 # It *was* successful after all -- the extra pieces FETCH handled
165 # need not concern the caller.
166 rv = (rv[0], '9000')
Harald Weltec91085e2022-02-10 18:05:45 +0100167 # proactive sim as per TS 102 221 Setion 7.4.2
Christian Amsüss59f3b112022-08-12 15:46:52 +0200168 # TODO: Check SW manually to avoid recursing on the stack (provided this piece of code stays in this place)
Christian Amsüss98552ef2022-08-11 19:29:37 +0200169 fetch_rv = self.send_apdu_checksw('80120000' + last_sw[2:], sw)
Christian Amsüss59f3b112022-08-12 15:46:52 +0200170 # Setting this in case we later decide not to send a terminal
171 # response immediately unconditionally -- the card may still have
172 # something pending even though the last command was not processed
173 # yet.
Christian Amsüss98552ef2022-08-11 19:29:37 +0200174 last_sw = fetch_rv[1]
Christian Amsüss59f3b112022-08-12 15:46:52 +0200175 # parse the proactive command
176 pcmd = ProactiveCommand()
177 parsed = pcmd.from_tlv(h2b(fetch_rv[0]))
178 print("FETCH: %s (%s)" % (fetch_rv[0], type(parsed).__name__))
179 result = Result()
Harald Weltefd476b42022-08-06 14:01:26 +0200180 if self.proactive_handler:
Christian Amsüss59f3b112022-08-12 15:46:52 +0200181 # Extension point: If this does return a list of TLV objects,
182 # they could be appended after the Result; if the first is a
183 # Result, that cuold replace the one built here.
184 self.proactive_handler.receive_fetch_raw(pcmd, parsed)
185 result.from_dict({'general_result': 'performed_successfully', 'additional_information': ''})
186 else:
187 result.from_dict({'general_result': 'command_beyond_terminal_capability', 'additional_information': ''})
188
189 # Send response immediately, thus also flushing out any further
190 # proactive commands that the card already wants to send
191 #
192 # Structure as per TS 102 223 V4.4.0 Section 6.8
193
194 # The Command Details are echoed from the command that has been processed.
195 (command_details,) = [c for c in pcmd.decoded.children if isinstance(c, CommandDetails)]
196 # The Device Identities are fixed. (TS 102 223 V4.0.0 Section 6.8.2)
197 device_identities = DeviceIdentities()
198 device_identities.from_dict({'source_dev_id': 'terminal', 'dest_dev_id': 'uicc'})
199
200 # Testing hint: The value of tail does not influence the behavior
201 # of an SJA2 that sent ans SMS, so this is implemented only
202 # following TS 102 223, and not fully tested.
203 tail = command_details.to_tlv() + device_identities.to_tlv() + result.to_tlv()
204 # Testing hint: In contrast to the above, this part is positively
205 # essential to get the SJA2 to provide the later parts of a
206 # multipart SMS in response to an OTA RFM command.
207 terminal_response = '80140000' + b2h(len(tail).to_bytes(1, 'big') + tail)
208
209 terminal_response_rv = self.send_apdu(terminal_response)
210 last_sw = terminal_response_rv[1]
211
Harald Weltec91085e2022-02-10 18:05:45 +0100212 if not sw_match(rv[1], sw):
213 raise SwMatchError(rv[1], sw.lower(), self.sw_interpreter)
214 return rv
Harald Welte6e0458d2021-04-03 11:52:37 +0200215
Harald Welteab6897c2023-07-09 16:21:23 +0200216 def send_apdu_constr(self, cla: Hexstr, ins: Hexstr, p1: Hexstr, p2: Hexstr, cmd_constr: Construct,
217 cmd_data: Hexstr, resp_constr: Construct) -> Tuple[dict, SwHexstr]:
Harald Weltec91085e2022-02-10 18:05:45 +0100218 """Build and sends an APDU using a 'construct' definition; parses response.
Harald Weltee0f9ef12021-04-10 17:22:35 +0200219
Harald Weltec91085e2022-02-10 18:05:45 +0100220 Args:
221 cla : string (in hex) ISO 7816 class byte
222 ins : string (in hex) ISO 7816 instruction byte
223 p1 : string (in hex) ISO 7116 Parameter 1 byte
224 p2 : string (in hex) ISO 7116 Parameter 2 byte
225 cmd_cosntr : defining how to generate binary APDU command data
226 cmd_data : command data passed to cmd_constr
227 resp_cosntr : defining how to decode binary APDU response data
228 Returns:
229 Tuple of (decoded_data, sw)
230 """
231 cmd = cmd_constr.build(cmd_data) if cmd_data else ''
232 p3 = i2h([len(cmd)])
233 pdu = ''.join([cla, ins, p1, p2, p3, b2h(cmd)])
234 (data, sw) = self.send_apdu(pdu)
235 if data:
236 # filter the resulting dict to avoid '_io' members inside
237 rsp = filter_dict(resp_constr.parse(h2b(data)))
238 else:
239 rsp = None
240 return (rsp, sw)
Harald Weltee0f9ef12021-04-10 17:22:35 +0200241
Harald Welteab6897c2023-07-09 16:21:23 +0200242 def send_apdu_constr_checksw(self, cla: Hexstr, ins: Hexstr, p1: Hexstr, p2: Hexstr,
243 cmd_constr: Construct, cmd_data: Hexstr, resp_constr: Construct,
244 sw_exp: SwMatchstr="9000") -> Tuple[dict, SwHexstr]:
Harald Weltec91085e2022-02-10 18:05:45 +0100245 """Build and sends an APDU using a 'construct' definition; parses response.
Harald Weltee0f9ef12021-04-10 17:22:35 +0200246
Harald Weltec91085e2022-02-10 18:05:45 +0100247 Args:
248 cla : string (in hex) ISO 7816 class byte
249 ins : string (in hex) ISO 7816 instruction byte
250 p1 : string (in hex) ISO 7116 Parameter 1 byte
251 p2 : string (in hex) ISO 7116 Parameter 2 byte
252 cmd_cosntr : defining how to generate binary APDU command data
253 cmd_data : command data passed to cmd_constr
254 resp_cosntr : defining how to decode binary APDU response data
255 exp_sw : string (in hex) of status word (ex. "9000")
256 Returns:
257 Tuple of (decoded_data, sw)
258 """
259 (rsp, sw) = self.send_apdu_constr(cla, ins,
260 p1, p2, cmd_constr, cmd_data, resp_constr)
261 if not sw_match(sw, sw_exp):
262 raise SwMatchError(sw, sw_exp.lower(), self.sw_interpreter)
263 return (rsp, sw)
264
Harald Weltee0f9ef12021-04-10 17:22:35 +0200265
Harald Welte28c24312021-04-11 12:19:36 +0200266def argparse_add_reader_args(arg_parser):
Harald Weltec91085e2022-02-10 18:05:45 +0100267 """Add all reader related arguments to the given argparse.Argumentparser instance."""
268 serial_group = arg_parser.add_argument_group('Serial Reader')
269 serial_group.add_argument('-d', '--device', metavar='DEV', default='/dev/ttyUSB0',
270 help='Serial Device for SIM access')
271 serial_group.add_argument('-b', '--baud', dest='baudrate', type=int, metavar='BAUD', default=9600,
272 help='Baud rate used for SIM access')
Harald Welte28c24312021-04-11 12:19:36 +0200273
Harald Weltec91085e2022-02-10 18:05:45 +0100274 pcsc_group = arg_parser.add_argument_group('PC/SC Reader')
275 pcsc_group.add_argument('-p', '--pcsc-device', type=int, dest='pcsc_dev', metavar='PCSC', default=None,
276 help='PC/SC reader number to use for SIM access')
Harald Welte28c24312021-04-11 12:19:36 +0200277
Harald Weltec91085e2022-02-10 18:05:45 +0100278 modem_group = arg_parser.add_argument_group('AT Command Modem Reader')
279 modem_group.add_argument('--modem-device', dest='modem_dev', metavar='DEV', default=None,
280 help='Serial port of modem for Generic SIM Access (3GPP TS 27.007)')
281 modem_group.add_argument('--modem-baud', type=int, metavar='BAUD', default=115200,
282 help='Baud rate used for modem port')
Harald Welte28c24312021-04-11 12:19:36 +0200283
Harald Weltec91085e2022-02-10 18:05:45 +0100284 osmobb_group = arg_parser.add_argument_group('OsmocomBB Reader')
285 osmobb_group.add_argument('--osmocon', dest='osmocon_sock', metavar='PATH', default=None,
286 help='Socket path for Calypso (e.g. Motorola C1XX) based reader (via OsmocomBB)')
Harald Welte28c24312021-04-11 12:19:36 +0200287
Harald Weltec91085e2022-02-10 18:05:45 +0100288 return arg_parser
289
Harald Welte28c24312021-04-11 12:19:36 +0200290
Harald Welteeb05b2f2021-04-10 11:01:56 +0200291def init_reader(opts, **kwargs) -> Optional[LinkBase]:
Harald Weltec91085e2022-02-10 18:05:45 +0100292 """
293 Init card reader driver
294 """
295 sl = None # type : :Optional[LinkBase]
296 try:
297 if opts.pcsc_dev is not None:
298 print("Using PC/SC reader interface")
299 from pySim.transport.pcsc import PcscSimLink
300 sl = PcscSimLink(opts.pcsc_dev, **kwargs)
301 elif opts.osmocon_sock is not None:
302 print("Using Calypso-based (OsmocomBB) reader interface")
303 from pySim.transport.calypso import CalypsoSimLink
304 sl = CalypsoSimLink(sock_path=opts.osmocon_sock, **kwargs)
305 elif opts.modem_dev is not None:
306 print("Using modem for Generic SIM Access (3GPP TS 27.007)")
307 from pySim.transport.modem_atcmd import ModemATCommandLink
308 sl = ModemATCommandLink(
309 device=opts.modem_dev, baudrate=opts.modem_baud, **kwargs)
310 else: # Serial reader is default
311 print("Using serial reader interface")
312 from pySim.transport.serial import SerialSimLink
313 sl = SerialSimLink(device=opts.device,
314 baudrate=opts.baudrate, **kwargs)
315 return sl
316 except Exception as e:
317 if str(e):
318 print("Card reader initialization failed with exception:\n" + str(e))
319 else:
320 print(
321 "Card reader initialization failed with an exception of type:\n" + str(type(e)))
322 return None