proto_lc.py 3.1 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495
  1. # SPDX-FileCopyrightText: 2018-2022 Espressif Systems (Shanghai) CO LTD
  2. # SPDX-License-Identifier: Apache-2.0
  3. #
  4. import importlib.util
  5. import os
  6. import sys
  7. from importlib.abc import Loader
  8. from typing import Any
  9. def _load_source(name: str, path: str) -> Any:
  10. spec = importlib.util.spec_from_file_location(name, path)
  11. if not spec:
  12. return None
  13. module = importlib.util.module_from_spec(spec)
  14. sys.modules[spec.name] = module
  15. assert isinstance(spec.loader, Loader)
  16. spec.loader.exec_module(module)
  17. return module
  18. idf_path = os.environ['IDF_PATH']
  19. constants_pb2 = _load_source('constants_pb2', idf_path + '/components/protocomm/python/constants_pb2.py')
  20. local_ctrl_pb2 = _load_source('esp_local_ctrl_pb2', idf_path + '/components/esp_local_ctrl/python/esp_local_ctrl_pb2.py')
  21. def to_bytes(s: str) -> bytes:
  22. return bytes(s, encoding='latin-1')
  23. def get_prop_count_request(security_ctx):
  24. req = local_ctrl_pb2.LocalCtrlMessage()
  25. req.msg = local_ctrl_pb2.TypeCmdGetPropertyCount
  26. payload = local_ctrl_pb2.CmdGetPropertyCount()
  27. req.cmd_get_prop_count.MergeFrom(payload)
  28. enc_cmd = security_ctx.encrypt_data(req.SerializeToString())
  29. return enc_cmd
  30. def get_prop_count_response(security_ctx, response_data):
  31. decrypt = security_ctx.decrypt_data(to_bytes(response_data))
  32. resp = local_ctrl_pb2.LocalCtrlMessage()
  33. resp.ParseFromString(decrypt)
  34. if (resp.resp_get_prop_count.status == 0):
  35. return resp.resp_get_prop_count.count
  36. else:
  37. return 0
  38. def get_prop_vals_request(security_ctx, indices):
  39. req = local_ctrl_pb2.LocalCtrlMessage()
  40. req.msg = local_ctrl_pb2.TypeCmdGetPropertyValues
  41. payload = local_ctrl_pb2.CmdGetPropertyValues()
  42. payload.indices.extend(indices)
  43. req.cmd_get_prop_vals.MergeFrom(payload)
  44. enc_cmd = security_ctx.encrypt_data(req.SerializeToString())
  45. return enc_cmd
  46. def get_prop_vals_response(security_ctx, response_data):
  47. decrypt = security_ctx.decrypt_data(to_bytes(response_data))
  48. resp = local_ctrl_pb2.LocalCtrlMessage()
  49. resp.ParseFromString(decrypt)
  50. results = []
  51. if (resp.resp_get_prop_vals.status == 0):
  52. for prop in resp.resp_get_prop_vals.props:
  53. results += [{
  54. 'name': prop.name,
  55. 'type': prop.type,
  56. 'flags': prop.flags,
  57. 'value': prop.value
  58. }]
  59. return results
  60. def set_prop_vals_request(security_ctx, indices, values):
  61. req = local_ctrl_pb2.LocalCtrlMessage()
  62. req.msg = local_ctrl_pb2.TypeCmdSetPropertyValues
  63. payload = local_ctrl_pb2.CmdSetPropertyValues()
  64. for i, v in zip(indices, values):
  65. prop = payload.props.add()
  66. prop.index = i
  67. prop.value = v
  68. req.cmd_set_prop_vals.MergeFrom(payload)
  69. enc_cmd = security_ctx.encrypt_data(req.SerializeToString())
  70. return enc_cmd
  71. def set_prop_vals_response(security_ctx, response_data):
  72. decrypt = security_ctx.decrypt_data(to_bytes(response_data))
  73. resp = local_ctrl_pb2.LocalCtrlMessage()
  74. resp.ParseFromString(decrypt)
  75. return (resp.resp_set_prop_vals.status == 0)