mirror of
https://github.com/malmeloo/FindMy.py.git
synced 2026-04-18 05:53:59 +02:00
336 lines
12 KiB
Python
336 lines
12 KiB
Python
"""Module providing functionality to look up location reports."""
|
|
|
|
from __future__ import annotations
|
|
|
|
import base64
|
|
import hashlib
|
|
import logging
|
|
import struct
|
|
from datetime import datetime, timedelta, timezone
|
|
from typing import TYPE_CHECKING, Sequence, overload
|
|
|
|
from cryptography.hazmat.backends import default_backend
|
|
from cryptography.hazmat.primitives.asymmetric import ec
|
|
from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes
|
|
from typing_extensions import override
|
|
|
|
from findmy.accessory import RollingKeyPairSource
|
|
from findmy.keys import HasHashedPublicKey, KeyPair
|
|
|
|
if TYPE_CHECKING:
|
|
from .account import AsyncAppleAccount
|
|
|
|
logging.getLogger(__name__)
|
|
|
|
|
|
class LocationReport(HasHashedPublicKey):
|
|
"""Location report corresponding to a certain `HasHashedPublicKey`."""
|
|
|
|
def __init__(
|
|
self,
|
|
payload: bytes,
|
|
hashed_adv_key: bytes,
|
|
published_at: datetime,
|
|
description: str = "",
|
|
) -> None:
|
|
"""Initialize a `KeyReport`. You should probably use `KeyReport.from_payload` instead."""
|
|
self._payload: bytes = payload
|
|
self._hashed_adv_key: bytes = hashed_adv_key
|
|
self._published_at: datetime = published_at
|
|
self._description: str = description
|
|
|
|
self._decrypted_data: tuple[KeyPair, bytes] | None = None
|
|
|
|
@property
|
|
@override
|
|
def hashed_adv_key_bytes(self) -> bytes:
|
|
"""See `HasHashedPublicKey.hashed_adv_key_bytes`."""
|
|
return self._hashed_adv_key
|
|
|
|
@property
|
|
def key(self) -> KeyPair:
|
|
"""`KeyPair` using which this report was decrypted."""
|
|
if not self.is_decrypted:
|
|
msg = "Full key is unavailable while the report is encrypted."
|
|
raise RuntimeError(msg)
|
|
assert self._decrypted_data is not None
|
|
|
|
return self._decrypted_data[0]
|
|
|
|
@property
|
|
def payload(self) -> bytes:
|
|
"""Full (partially encrypted) payload of the report, as retrieved from Apple."""
|
|
return self._payload
|
|
|
|
@property
|
|
def is_decrypted(self) -> bool:
|
|
"""Whether the report is currently decrypted."""
|
|
return self._decrypted_data is not None
|
|
|
|
def decrypt(self, key: KeyPair) -> None:
|
|
"""Decrypt the report using its corresponding `KeyPair`."""
|
|
if key.hashed_adv_key_bytes != self._hashed_adv_key:
|
|
msg = "Cannot decrypt with this key!"
|
|
raise ValueError(msg)
|
|
|
|
if self.is_decrypted:
|
|
return
|
|
|
|
encrypted_data = self._payload[4:]
|
|
|
|
# Fix decryption for new report format via MacOS 14+
|
|
# See: https://github.com/MatthewKuKanich/FindMyFlipper/issues/61#issuecomment-2065003410
|
|
if len(encrypted_data) == 85:
|
|
encrypted_data = encrypted_data[1:]
|
|
|
|
eph_key = ec.EllipticCurvePublicKey.from_encoded_point(
|
|
ec.SECP224R1(),
|
|
encrypted_data[1:58],
|
|
)
|
|
shared_key = key.dh_exchange(eph_key)
|
|
symmetric_key = hashlib.sha256(
|
|
shared_key + b"\x00\x00\x00\x01" + encrypted_data[1:58],
|
|
).digest()
|
|
|
|
decryption_key = symmetric_key[:16]
|
|
iv = symmetric_key[16:]
|
|
enc_data = encrypted_data[58:68]
|
|
tag = encrypted_data[68:]
|
|
|
|
decryptor = Cipher(
|
|
algorithms.AES(decryption_key),
|
|
modes.GCM(iv, tag),
|
|
default_backend(),
|
|
).decryptor()
|
|
decrypted_payload = decryptor.update(enc_data) + decryptor.finalize()
|
|
|
|
self._decrypted_data = (key, decrypted_payload)
|
|
|
|
@property
|
|
def published_at(self) -> datetime:
|
|
"""The `datetime` when this report was published by a device."""
|
|
return self._published_at
|
|
|
|
@property
|
|
def description(self) -> str:
|
|
"""Description of the location report as published by Apple."""
|
|
return self._description
|
|
|
|
@property
|
|
def timestamp(self) -> datetime:
|
|
"""The `datetime` when this report was recorded by a device."""
|
|
timestamp_int = int.from_bytes(self._payload[0:4], "big") + (60 * 60 * 24 * 11323)
|
|
return datetime.fromtimestamp(timestamp_int, tz=timezone.utc).astimezone()
|
|
|
|
@property
|
|
def latitude(self) -> float:
|
|
"""Latitude of the location of this report."""
|
|
if not self.is_decrypted:
|
|
msg = "Latitude is unavailable while the report is encrypted."
|
|
raise RuntimeError(msg)
|
|
assert self._decrypted_data is not None
|
|
|
|
lat_bytes = self._decrypted_data[1][:4]
|
|
return struct.unpack(">i", lat_bytes)[0] / 10000000
|
|
|
|
@property
|
|
def longitude(self) -> float:
|
|
"""Longitude of the location of this report."""
|
|
if not self.is_decrypted:
|
|
msg = "Longitude is unavailable while the report is encrypted."
|
|
raise RuntimeError(msg)
|
|
assert self._decrypted_data is not None
|
|
|
|
lon_bytes = self._decrypted_data[1][4:8]
|
|
return struct.unpack(">i", lon_bytes)[0] / 10000000
|
|
|
|
@property
|
|
def confidence(self) -> int:
|
|
"""Confidence of the location of this report."""
|
|
if not self.is_decrypted:
|
|
msg = "Confidence is unavailable while the report is encrypted."
|
|
raise RuntimeError(msg)
|
|
assert self._decrypted_data is not None
|
|
|
|
conf_bytes = self._decrypted_data[1][8:9]
|
|
return int.from_bytes(conf_bytes, "big")
|
|
|
|
@property
|
|
def status(self) -> int:
|
|
"""Status byte of the accessory as recorded by a device, as an integer."""
|
|
if not self.is_decrypted:
|
|
msg = "Status byte is unavailable while the report is encrypted."
|
|
raise RuntimeError(msg)
|
|
assert self._decrypted_data is not None
|
|
|
|
status_bytes = self._decrypted_data[1][9:10]
|
|
return int.from_bytes(status_bytes, "big")
|
|
|
|
@override
|
|
def __eq__(self, other: object) -> bool:
|
|
"""
|
|
Compare two report instances.
|
|
|
|
Two reports are considered equal iff they correspond to the same key,
|
|
were reported at the same timestamp and represent the same physical location.
|
|
"""
|
|
if not isinstance(other, LocationReport):
|
|
return NotImplemented
|
|
|
|
return (
|
|
super().__eq__(other)
|
|
and self.timestamp == other.timestamp
|
|
and self.latitude == other.latitude
|
|
and self.longitude == other.longitude
|
|
)
|
|
|
|
@override
|
|
def __hash__(self) -> int:
|
|
"""
|
|
Get the hash of this instance.
|
|
|
|
Two instances will have the same hash iff they correspond to the same key,
|
|
were reported at the same timestamp and represent the same physical location.
|
|
"""
|
|
return hash((self.hashed_adv_key_bytes, self.timestamp, self.latitude, self.longitude))
|
|
|
|
def __lt__(self, other: LocationReport) -> bool:
|
|
"""
|
|
Compare against another `KeyReport`.
|
|
|
|
A `KeyReport` is said to be "less than" another `KeyReport` iff its recorded
|
|
timestamp is strictly less than the other report.
|
|
"""
|
|
if isinstance(other, LocationReport):
|
|
return self.timestamp < other.timestamp
|
|
return NotImplemented
|
|
|
|
@override
|
|
def __repr__(self) -> str:
|
|
"""Human-readable string representation of the location report."""
|
|
msg = f"KeyReport(hashed_adv_key={self.hashed_adv_key_b64}, timestamp={self.timestamp}"
|
|
if self.is_decrypted:
|
|
msg += f", lat={self.latitude}, lon={self.longitude}"
|
|
msg += ")"
|
|
return msg
|
|
|
|
|
|
class LocationReportsFetcher:
|
|
"""Fetcher class to retrieve location reports."""
|
|
|
|
def __init__(self, account: AsyncAppleAccount) -> None:
|
|
"""
|
|
Initialize the fetcher.
|
|
|
|
:param account: Apple account.
|
|
"""
|
|
self._account: AsyncAppleAccount = account
|
|
|
|
@overload
|
|
async def fetch_reports(
|
|
self,
|
|
date_from: datetime,
|
|
date_to: datetime,
|
|
device: HasHashedPublicKey,
|
|
) -> list[LocationReport]: ...
|
|
|
|
@overload
|
|
async def fetch_reports(
|
|
self,
|
|
date_from: datetime,
|
|
date_to: datetime,
|
|
device: Sequence[HasHashedPublicKey],
|
|
) -> dict[HasHashedPublicKey, list[LocationReport]]: ...
|
|
|
|
@overload
|
|
async def fetch_reports(
|
|
self,
|
|
date_from: datetime,
|
|
date_to: datetime,
|
|
device: RollingKeyPairSource,
|
|
) -> list[LocationReport]: ...
|
|
|
|
async def fetch_reports(
|
|
self,
|
|
date_from: datetime,
|
|
date_to: datetime,
|
|
device: HasHashedPublicKey | Sequence[HasHashedPublicKey] | RollingKeyPairSource,
|
|
) -> list[LocationReport] | dict[HasHashedPublicKey, list[LocationReport]]:
|
|
"""
|
|
Fetch location reports for a certain device.
|
|
|
|
When ``device`` is a single :class:`.HasHashedPublicKey`, this method will return
|
|
a list of location reports corresponding to that key.
|
|
When ``device`` is a sequence of :class:`.HasHashedPublicKey`s, it will return a dictionary
|
|
with the :class:`.HasHashedPublicKey` as key, and a list of location reports as value.
|
|
When ``device`` is a :class:`.RollingKeyPairSource`, it will return a list of
|
|
location reports corresponding to that source.
|
|
"""
|
|
# single key
|
|
if isinstance(device, HasHashedPublicKey):
|
|
return await self._fetch_reports(date_from, date_to, [device])
|
|
|
|
# key generator
|
|
# add 12h margin to the generator
|
|
if isinstance(device, RollingKeyPairSource):
|
|
keys = list(
|
|
device.keys_between(
|
|
date_from - timedelta(hours=12),
|
|
date_to + timedelta(hours=12),
|
|
),
|
|
)
|
|
else:
|
|
keys = device
|
|
|
|
# sequence of keys (fetch 256 max at a time)
|
|
reports: list[LocationReport] = []
|
|
for key_offset in range(0, len(keys), 256):
|
|
chunk = keys[key_offset : key_offset + 256]
|
|
reports.extend(await self._fetch_reports(date_from, date_to, chunk))
|
|
|
|
if isinstance(device, RollingKeyPairSource):
|
|
return reports
|
|
|
|
res: dict[HasHashedPublicKey, list[LocationReport]] = {key: [] for key in keys}
|
|
for report in reports:
|
|
for key in res:
|
|
if key.hashed_adv_key_bytes == report.hashed_adv_key_bytes:
|
|
res[key].append(report)
|
|
break
|
|
return res
|
|
|
|
async def _fetch_reports(
|
|
self,
|
|
date_from: datetime,
|
|
date_to: datetime,
|
|
keys: Sequence[HasHashedPublicKey],
|
|
) -> list[LocationReport]:
|
|
logging.debug("Fetching reports for %s keys", len(keys))
|
|
|
|
start_date = int(date_from.timestamp() * 1000)
|
|
end_date = int(date_to.timestamp() * 1000)
|
|
ids = [key.hashed_adv_key_b64 for key in keys]
|
|
data = await self._account.fetch_raw_reports(start_date, end_date, ids)
|
|
|
|
id_to_key: dict[bytes, HasHashedPublicKey] = {key.hashed_adv_key_bytes: key for key in keys}
|
|
reports: list[LocationReport] = []
|
|
for report in data.get("results", []):
|
|
payload = base64.b64decode(report["payload"])
|
|
hashed_adv_key = base64.b64decode(report["id"])
|
|
date_published = datetime.fromtimestamp(
|
|
report.get("datePublished", 0) / 1000,
|
|
tz=timezone.utc,
|
|
).astimezone()
|
|
description = report.get("description", "")
|
|
|
|
loc_report = LocationReport(payload, hashed_adv_key, date_published, description)
|
|
|
|
# pre-decrypt if possible
|
|
key = id_to_key[hashed_adv_key]
|
|
if isinstance(key, KeyPair):
|
|
loc_report.decrypt(key)
|
|
|
|
reports.append(loc_report)
|
|
|
|
return reports
|