2019-01-25 10:58:23 +00:00
|
|
|
/*
|
2019-06-17 18:27:55 +00:00
|
|
|
* This file is part of the Trezor project, https://trezor.io/
|
2019-01-25 10:58:23 +00:00
|
|
|
*
|
|
|
|
* Copyright (C) 2014 Pavol Rusnak <stick@satoshilabs.com>
|
|
|
|
*
|
|
|
|
* This library is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Lesser General Public License as published by
|
|
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Lesser General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Lesser General Public License
|
|
|
|
* along with this library. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <libopencm3/stm32/flash.h>
|
2019-03-29 16:10:31 +00:00
|
|
|
#include <stdint.h>
|
|
|
|
#include <string.h>
|
2019-01-25 10:58:23 +00:00
|
|
|
|
2019-10-17 11:25:47 +00:00
|
|
|
#include "messages-common.pb.h"
|
2019-01-25 10:58:23 +00:00
|
|
|
#include "messages.pb.h"
|
|
|
|
|
|
|
|
#include "aes/aes.h"
|
|
|
|
#include "bip32.h"
|
|
|
|
#include "bip39.h"
|
2019-03-29 16:10:31 +00:00
|
|
|
#include "common.h"
|
2019-01-25 10:58:23 +00:00
|
|
|
#include "config.h"
|
2019-03-29 16:10:31 +00:00
|
|
|
#include "curves.h"
|
2019-01-25 10:58:23 +00:00
|
|
|
#include "debug.h"
|
2020-01-28 14:18:00 +00:00
|
|
|
#include "fsm.h"
|
2019-01-25 10:58:23 +00:00
|
|
|
#include "gettext.h"
|
2019-03-29 16:10:31 +00:00
|
|
|
#include "hmac.h"
|
|
|
|
#include "layout2.h"
|
|
|
|
#include "memory.h"
|
2019-01-25 10:58:23 +00:00
|
|
|
#include "memzero.h"
|
2019-03-29 16:10:31 +00:00
|
|
|
#include "pbkdf2.h"
|
|
|
|
#include "protect.h"
|
|
|
|
#include "rng.h"
|
|
|
|
#include "sha2.h"
|
2019-01-25 10:58:23 +00:00
|
|
|
#include "storage.h"
|
2019-03-29 16:10:31 +00:00
|
|
|
#include "supervise.h"
|
|
|
|
#include "trezor.h"
|
|
|
|
#include "u2f.h"
|
|
|
|
#include "usb.h"
|
|
|
|
#include "util.h"
|
2019-01-25 10:58:23 +00:00
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
/* Magic constants to check validity of storage block for storage versions 1
|
|
|
|
* to 10. */
|
|
|
|
static const uint32_t CONFIG_MAGIC_V10 = 0x726f7473; // 'stor' as uint32_t
|
2019-02-14 15:28:29 +00:00
|
|
|
|
|
|
|
#if !EMULATOR
|
2019-03-29 16:10:31 +00:00
|
|
|
static const uint32_t META_MAGIC_V10 = 0x525a5254; // 'TRZR' as uint32_t
|
2019-02-14 15:28:29 +00:00
|
|
|
#else
|
2019-03-29 16:10:31 +00:00
|
|
|
static const uint32_t META_MAGIC_V10 = 0xFFFFFFFF;
|
2019-02-14 15:28:29 +00:00
|
|
|
#endif
|
2019-01-25 10:58:23 +00:00
|
|
|
|
2019-11-09 11:25:17 +00:00
|
|
|
#define APP (0x01 << 8)
|
|
|
|
#define FLAG_PUBLIC_SHIFTED (FLAG_PUBLIC << 8)
|
|
|
|
#define FLAGS_WRITE_SHIFTED (FLAGS_WRITE << 8)
|
2019-01-25 10:58:23 +00:00
|
|
|
|
2019-11-09 11:25:17 +00:00
|
|
|
#define KEY_UUID (0 | APP | FLAG_PUBLIC_SHIFTED) // bytes(12)
|
|
|
|
#define KEY_VERSION (1 | APP) // uint32
|
|
|
|
#define KEY_MNEMONIC (2 | APP) // string(241)
|
|
|
|
#define KEY_LANGUAGE (3 | APP | FLAG_PUBLIC_SHIFTED) // string(17)
|
|
|
|
#define KEY_LABEL (4 | APP | FLAG_PUBLIC_SHIFTED) // string(33)
|
|
|
|
#define KEY_PASSPHRASE_PROTECTION (5 | APP | FLAG_PUBLIC_SHIFTED) // bool
|
|
|
|
#define KEY_HOMESCREEN (6 | APP | FLAG_PUBLIC_SHIFTED) // bytes(1024)
|
|
|
|
#define KEY_NEEDS_BACKUP (7 | APP) // bool
|
|
|
|
#define KEY_FLAGS (8 | APP) // uint32
|
|
|
|
#define KEY_U2F_COUNTER (9 | APP | FLAGS_WRITE_SHIFTED) // uint32
|
|
|
|
#define KEY_UNFINISHED_BACKUP (11 | APP) // bool
|
|
|
|
#define KEY_AUTO_LOCK_DELAY_MS (12 | APP) // uint32
|
|
|
|
#define KEY_NO_BACKUP (13 | APP) // bool
|
|
|
|
#define KEY_INITIALIZED (14 | APP | FLAG_PUBLIC_SHIFTED) // uint32
|
|
|
|
#define KEY_NODE (15 | APP) // node
|
|
|
|
#define KEY_IMPORTED (16 | APP) // bool
|
|
|
|
#define KEY_U2F_ROOT (17 | APP | FLAG_PUBLIC_SHIFTED) // node
|
|
|
|
#define KEY_DEBUG_LINK_PIN (255 | APP | FLAG_PUBLIC_SHIFTED) // string(10)
|
2019-01-25 10:58:23 +00:00
|
|
|
|
2020-02-13 09:39:24 +00:00
|
|
|
#define MAX_SESSIONS_COUNT 10
|
|
|
|
|
2019-01-25 10:58:23 +00:00
|
|
|
// The PIN value corresponding to an empty PIN.
|
|
|
|
static const uint32_t PIN_EMPTY = 1;
|
|
|
|
|
|
|
|
static uint32_t config_uuid[UUID_SIZE / sizeof(uint32_t)];
|
|
|
|
_Static_assert(sizeof(config_uuid) == UUID_SIZE, "config_uuid has wrong size");
|
|
|
|
|
2019-09-30 15:34:38 +00:00
|
|
|
char config_uuid_str[2 * UUID_SIZE + 1] = {0};
|
2019-01-25 10:58:23 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
Old storage layout:
|
|
|
|
|
|
|
|
offset | type/length | description
|
|
|
|
--------+--------------+-------------------------------
|
|
|
|
0x0000 | 4 bytes | magic = 'stor'
|
|
|
|
0x0004 | 12 bytes | uuid
|
|
|
|
0x0010 | ? bytes | Storage structure
|
|
|
|
--------+--------------+-------------------------------
|
|
|
|
0x4000 | 4 kbytes | area for pin failures
|
|
|
|
0x5000 | 256 bytes | area for u2f counter updates
|
|
|
|
0x5100 | 11.75 kbytes | reserved
|
|
|
|
|
|
|
|
The area for pin failures looks like this:
|
|
|
|
0 ... 0 pinfail 0xffffffff .. 0xffffffff
|
|
|
|
The pinfail is a binary number of the form 1...10...0,
|
|
|
|
the number of zeros is the number of pin failures.
|
2019-03-29 16:10:31 +00:00
|
|
|
This layout is used because we can only clear bits without
|
2019-01-25 10:58:23 +00:00
|
|
|
erasing the flash.
|
|
|
|
|
|
|
|
The area for u2f counter updates is just a sequence of zero-bits
|
|
|
|
followed by a sequence of one-bits. The bits in a byte are numbered
|
|
|
|
from LSB to MSB. The number of zero bits is the offset that should
|
|
|
|
be added to the storage u2f_counter to get the real counter value.
|
|
|
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
/* Current u2f offset, i.e. u2f counter is
|
|
|
|
* storage.u2f_counter + config_u2f_offset.
|
|
|
|
* This corresponds to the number of cleared bits in the U2FAREA.
|
|
|
|
*/
|
|
|
|
|
2020-02-13 09:39:24 +00:00
|
|
|
// Session management
|
|
|
|
typedef struct {
|
|
|
|
uint8_t id[32];
|
|
|
|
uint32_t last_use;
|
|
|
|
uint8_t seed[64];
|
|
|
|
secbool seedCached;
|
|
|
|
} Session;
|
|
|
|
|
|
|
|
static void session_clearCache(Session *session);
|
|
|
|
static uint8_t session_findLeastRecent(void);
|
|
|
|
static uint8_t session_findSession(const uint8_t *sessionId);
|
|
|
|
|
|
|
|
static CONFIDENTIAL Session sessionsCache[MAX_SESSIONS_COUNT];
|
|
|
|
static Session *activeSessionCache;
|
|
|
|
|
|
|
|
static uint32_t sessionUseCounter = 0;
|
2020-01-19 10:08:53 +00:00
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
#define autoLockDelayMsDefault (10 * 60 * 1000U) // 10 minutes
|
2019-02-12 16:56:33 +00:00
|
|
|
static secbool autoLockDelayMsCached = secfalse;
|
|
|
|
static uint32_t autoLockDelayMs = autoLockDelayMsDefault;
|
|
|
|
|
2019-02-14 15:28:29 +00:00
|
|
|
static const uint32_t CONFIG_VERSION = 11;
|
2019-01-25 10:58:23 +00:00
|
|
|
|
|
|
|
static const uint8_t FALSE_BYTE = '\x00';
|
|
|
|
static const uint8_t TRUE_BYTE = '\x01';
|
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
static uint32_t pin_to_int(const char *pin) {
|
|
|
|
uint32_t val = 1;
|
|
|
|
size_t i = 0;
|
|
|
|
for (i = 0; i < MAX_PIN_LEN && pin[i] != '\0'; ++i) {
|
|
|
|
if (pin[i] < '0' || pin[i] > '9') {
|
|
|
|
return 0;
|
2019-01-25 10:58:23 +00:00
|
|
|
}
|
2019-03-29 16:10:31 +00:00
|
|
|
val = 10 * val + pin[i] - '0';
|
|
|
|
}
|
2019-01-25 10:58:23 +00:00
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
if (pin[i] != '\0') {
|
|
|
|
return 0;
|
|
|
|
}
|
2019-03-12 13:52:55 +00:00
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
return val;
|
2019-03-12 13:52:55 +00:00
|
|
|
}
|
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
static secbool config_set_bool(uint16_t key, bool value) {
|
|
|
|
if (value) {
|
|
|
|
return storage_set(key, &TRUE_BYTE, sizeof(TRUE_BYTE));
|
|
|
|
} else {
|
|
|
|
return storage_set(key, &FALSE_BYTE, sizeof(FALSE_BYTE));
|
|
|
|
}
|
2019-01-25 10:58:23 +00:00
|
|
|
}
|
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
static secbool config_get_bool(uint16_t key, bool *value) {
|
|
|
|
uint8_t val = 0;
|
|
|
|
uint16_t len = 0;
|
|
|
|
if (sectrue == storage_get(key, &val, sizeof(val), &len) &&
|
|
|
|
len == sizeof(TRUE_BYTE)) {
|
|
|
|
*value = (val == TRUE_BYTE);
|
2019-02-13 14:53:27 +00:00
|
|
|
return sectrue;
|
2019-03-29 16:10:31 +00:00
|
|
|
} else {
|
|
|
|
*value = false;
|
|
|
|
return secfalse;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static secbool config_get_bytes(uint16_t key, uint8_t *dest, uint16_t dest_size,
|
|
|
|
uint16_t *real_size) {
|
|
|
|
if (dest_size == 0) {
|
|
|
|
return secfalse;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (sectrue != storage_get(key, dest, dest_size, real_size)) {
|
|
|
|
return secfalse;
|
|
|
|
}
|
|
|
|
return sectrue;
|
|
|
|
}
|
|
|
|
|
|
|
|
static secbool config_get_string(uint16_t key, char *dest, uint16_t dest_size) {
|
|
|
|
if (dest_size == 0) {
|
|
|
|
return secfalse;
|
|
|
|
}
|
|
|
|
|
|
|
|
uint16_t len = 0;
|
|
|
|
if (sectrue != storage_get(key, dest, dest_size - 1, &len)) {
|
|
|
|
dest[0] = '\0';
|
|
|
|
return secfalse;
|
|
|
|
}
|
|
|
|
dest[len] = '\0';
|
|
|
|
return sectrue;
|
|
|
|
}
|
|
|
|
|
|
|
|
static secbool config_get_uint32(uint16_t key, uint32_t *value) {
|
|
|
|
uint16_t len = 0;
|
|
|
|
if (sectrue != storage_get(key, value, sizeof(uint32_t), &len) ||
|
|
|
|
len != sizeof(uint32_t)) {
|
|
|
|
*value = 0;
|
|
|
|
return secfalse;
|
|
|
|
}
|
|
|
|
return sectrue;
|
|
|
|
}
|
|
|
|
|
|
|
|
#define FLASH_META_START 0x08008000
|
|
|
|
#define FLASH_META_LEN 0x100
|
|
|
|
|
|
|
|
static secbool config_upgrade_v10(void) {
|
|
|
|
#define OLD_STORAGE_SIZE(last_member) \
|
|
|
|
(((offsetof(Storage, last_member) + pb_membersize(Storage, last_member)) + \
|
|
|
|
3) & \
|
|
|
|
~3)
|
|
|
|
|
|
|
|
if (memcmp(FLASH_PTR(FLASH_META_START), &META_MAGIC_V10,
|
|
|
|
sizeof(META_MAGIC_V10)) != 0 ||
|
|
|
|
memcmp(FLASH_PTR(FLASH_META_START + FLASH_META_LEN), &CONFIG_MAGIC_V10,
|
|
|
|
sizeof(CONFIG_MAGIC_V10)) != 0) {
|
|
|
|
// wrong magic
|
|
|
|
return secfalse;
|
|
|
|
}
|
|
|
|
|
|
|
|
Storage config __attribute__((aligned(4)));
|
|
|
|
_Static_assert((sizeof(config) & 3) == 0, "storage unaligned");
|
|
|
|
|
|
|
|
memcpy(
|
|
|
|
config_uuid,
|
|
|
|
FLASH_PTR(FLASH_META_START + FLASH_META_LEN + sizeof(CONFIG_MAGIC_V10)),
|
|
|
|
sizeof(config_uuid));
|
|
|
|
memcpy(&config,
|
|
|
|
FLASH_PTR(FLASH_META_START + FLASH_META_LEN +
|
|
|
|
sizeof(CONFIG_MAGIC_V10) + sizeof(config_uuid)),
|
|
|
|
sizeof(config));
|
|
|
|
|
|
|
|
// version 1: since 1.0.0
|
|
|
|
// version 2: since 1.2.1
|
|
|
|
// version 3: since 1.3.1
|
|
|
|
// version 4: since 1.3.2
|
|
|
|
// version 5: since 1.3.3
|
|
|
|
// version 6: since 1.3.6
|
|
|
|
// version 7: since 1.5.1
|
|
|
|
// version 8: since 1.5.2
|
|
|
|
// version 9: since 1.6.1
|
|
|
|
// version 10: since 1.7.2
|
|
|
|
if (config.version > CONFIG_VERSION) {
|
|
|
|
// downgrade -> clear storage
|
|
|
|
config_wipe();
|
|
|
|
return secfalse;
|
|
|
|
}
|
|
|
|
|
|
|
|
size_t old_config_size = 0;
|
|
|
|
if (config.version == 0) {
|
|
|
|
} else if (config.version <= 2) {
|
|
|
|
old_config_size = OLD_STORAGE_SIZE(imported);
|
|
|
|
} else if (config.version <= 5) {
|
|
|
|
// added homescreen
|
|
|
|
old_config_size = OLD_STORAGE_SIZE(homescreen);
|
|
|
|
} else if (config.version <= 7) {
|
|
|
|
// added u2fcounter
|
|
|
|
old_config_size = OLD_STORAGE_SIZE(u2f_counter);
|
|
|
|
} else if (config.version <= 8) {
|
|
|
|
// added flags and needsBackup
|
|
|
|
old_config_size = OLD_STORAGE_SIZE(flags);
|
|
|
|
} else if (config.version <= 9) {
|
|
|
|
// added u2froot, unfinished_backup and auto_lock_delay_ms
|
|
|
|
old_config_size = OLD_STORAGE_SIZE(auto_lock_delay_ms);
|
|
|
|
} else if (config.version <= 10) {
|
|
|
|
// added no_backup
|
|
|
|
old_config_size = OLD_STORAGE_SIZE(no_backup);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Erase newly added fields.
|
|
|
|
if (old_config_size != sizeof(Storage)) {
|
|
|
|
memzero((char *)&config + old_config_size,
|
|
|
|
sizeof(Storage) - old_config_size);
|
|
|
|
}
|
|
|
|
|
|
|
|
const uint32_t FLASH_STORAGE_PINAREA = FLASH_META_START + 0x4000;
|
|
|
|
uint32_t pin_wait = 0;
|
|
|
|
if (config.version <= 5) {
|
|
|
|
// Get PIN failure counter from version 5 format.
|
|
|
|
uint32_t pinctr =
|
|
|
|
config.has_pin_failed_attempts ? config.pin_failed_attempts : 0;
|
|
|
|
if (pinctr > 31) {
|
|
|
|
pinctr = 31;
|
|
|
|
}
|
|
|
|
|
|
|
|
pin_wait = (1 << pinctr) - 1;
|
|
|
|
} else {
|
|
|
|
// Get PIN failure counter from version 10 format.
|
|
|
|
uint32_t flash_pinfails = FLASH_STORAGE_PINAREA;
|
|
|
|
while (*(const uint32_t *)FLASH_PTR(flash_pinfails) == 0) {
|
|
|
|
flash_pinfails += sizeof(uint32_t);
|
|
|
|
}
|
|
|
|
pin_wait = ~*(const uint32_t *)FLASH_PTR(flash_pinfails);
|
|
|
|
}
|
|
|
|
|
|
|
|
uint32_t u2f_offset = 0;
|
|
|
|
if (config.has_u2f_counter) {
|
|
|
|
const uint32_t FLASH_STORAGE_U2FAREA = FLASH_STORAGE_PINAREA + 0x1000;
|
|
|
|
const uint32_t *u2fptr = (const uint32_t *)FLASH_PTR(FLASH_STORAGE_U2FAREA);
|
|
|
|
while (*u2fptr == 0) {
|
|
|
|
u2fptr++;
|
|
|
|
}
|
|
|
|
u2f_offset =
|
|
|
|
32 * (u2fptr - (const uint32_t *)FLASH_PTR(FLASH_STORAGE_U2FAREA));
|
|
|
|
uint32_t u2fword = *u2fptr;
|
|
|
|
while ((u2fword & 1) == 0) {
|
|
|
|
u2f_offset++;
|
|
|
|
u2fword >>= 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
storage_init(NULL, HW_ENTROPY_DATA, HW_ENTROPY_LEN);
|
2019-08-09 20:52:09 +00:00
|
|
|
storage_unlock(PIN_EMPTY, NULL);
|
2019-03-29 16:10:31 +00:00
|
|
|
if (config.has_pin) {
|
2019-08-09 20:52:09 +00:00
|
|
|
storage_change_pin(PIN_EMPTY, pin_to_int(config.pin), NULL, NULL);
|
2019-03-29 16:10:31 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
while (pin_wait != 0) {
|
|
|
|
storage_pin_fails_increase();
|
|
|
|
pin_wait >>= 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
storage_set(KEY_UUID, config_uuid, sizeof(config_uuid));
|
|
|
|
storage_set(KEY_VERSION, &CONFIG_VERSION, sizeof(CONFIG_VERSION));
|
|
|
|
if (config.has_node) {
|
|
|
|
if (sectrue == storage_set(KEY_NODE, &config.node, sizeof(config.node))) {
|
|
|
|
config_set_bool(KEY_INITIALIZED, true);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (config.has_mnemonic) {
|
|
|
|
config_setMnemonic(config.mnemonic);
|
|
|
|
}
|
|
|
|
if (config.has_passphrase_protection) {
|
|
|
|
config_setPassphraseProtection(config.passphrase_protection);
|
|
|
|
}
|
|
|
|
if (config.has_language) {
|
|
|
|
config_setLanguage(config.language);
|
|
|
|
}
|
|
|
|
if (config.has_label) {
|
|
|
|
config_setLabel(config.label);
|
|
|
|
}
|
|
|
|
if (config.has_imported) {
|
|
|
|
config_setImported(config.imported);
|
|
|
|
}
|
|
|
|
if (config.has_homescreen) {
|
|
|
|
config_setHomescreen(config.homescreen.bytes, config.homescreen.size);
|
|
|
|
}
|
|
|
|
if (config.has_u2f_counter) {
|
|
|
|
config_setU2FCounter(config.u2f_counter + u2f_offset);
|
|
|
|
}
|
|
|
|
if (config.has_needs_backup) {
|
|
|
|
config_setNeedsBackup(config.needs_backup);
|
|
|
|
}
|
|
|
|
if (config.has_flags) {
|
|
|
|
config_applyFlags(config.flags);
|
|
|
|
}
|
|
|
|
if (config.has_unfinished_backup) {
|
|
|
|
config_setUnfinishedBackup(config.unfinished_backup);
|
|
|
|
}
|
|
|
|
if (config.has_auto_lock_delay_ms) {
|
|
|
|
config_setAutoLockDelayMs(config.auto_lock_delay_ms);
|
|
|
|
}
|
|
|
|
if (config.has_no_backup && config.no_backup) {
|
|
|
|
config_setNoBackup();
|
|
|
|
}
|
|
|
|
memzero(&config, sizeof(config));
|
|
|
|
|
|
|
|
session_clear(true);
|
|
|
|
|
|
|
|
return sectrue;
|
|
|
|
}
|
|
|
|
|
|
|
|
void config_init(void) {
|
|
|
|
char oldTiny = usbTiny(1);
|
|
|
|
|
|
|
|
config_upgrade_v10();
|
|
|
|
|
|
|
|
storage_init(&protectPinUiCallback, HW_ENTROPY_DATA, HW_ENTROPY_LEN);
|
|
|
|
memzero(HW_ENTROPY_DATA, sizeof(HW_ENTROPY_DATA));
|
|
|
|
|
2020-06-18 18:13:56 +00:00
|
|
|
// imported xprv is not supported anymore so we set initialized to false
|
|
|
|
// if no mnemonic is present
|
|
|
|
if (config_isInitialized() && !config_hasMnemonic()) {
|
|
|
|
config_set_bool(KEY_INITIALIZED, false);
|
|
|
|
}
|
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
// Auto-unlock storage if no PIN is set.
|
|
|
|
if (storage_is_unlocked() == secfalse && storage_has_pin() == secfalse) {
|
2019-08-09 20:52:09 +00:00
|
|
|
storage_unlock(PIN_EMPTY, NULL);
|
2019-03-29 16:10:31 +00:00
|
|
|
}
|
2019-01-25 10:58:23 +00:00
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
uint16_t len = 0;
|
|
|
|
// If UUID is not set, then the config is uninitialized.
|
|
|
|
if (sectrue !=
|
|
|
|
storage_get(KEY_UUID, config_uuid, sizeof(config_uuid), &len) ||
|
|
|
|
len != sizeof(config_uuid)) {
|
|
|
|
random_buffer((uint8_t *)config_uuid, sizeof(config_uuid));
|
2019-01-25 10:58:23 +00:00
|
|
|
storage_set(KEY_UUID, config_uuid, sizeof(config_uuid));
|
|
|
|
storage_set(KEY_VERSION, &CONFIG_VERSION, sizeof(CONFIG_VERSION));
|
2019-03-29 16:10:31 +00:00
|
|
|
}
|
|
|
|
data2hex(config_uuid, sizeof(config_uuid), config_uuid_str);
|
|
|
|
|
2020-02-13 09:39:24 +00:00
|
|
|
session_clear(false);
|
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
usbTiny(oldTiny);
|
|
|
|
}
|
|
|
|
|
|
|
|
void session_clear(bool lock) {
|
2020-02-13 09:39:24 +00:00
|
|
|
for (uint8_t i = 0; i < MAX_SESSIONS_COUNT; i++) {
|
|
|
|
session_clearCache(sessionsCache + i);
|
|
|
|
}
|
|
|
|
activeSessionCache = NULL;
|
2019-03-29 16:10:31 +00:00
|
|
|
if (lock) {
|
2020-02-13 09:39:24 +00:00
|
|
|
config_lockDevice();
|
2019-03-29 16:10:31 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-02-13 09:39:24 +00:00
|
|
|
void session_clearCache(Session *session) {
|
|
|
|
session->last_use = 0;
|
|
|
|
memzero(session->id, sizeof(session->id));
|
|
|
|
memzero(session->seed, sizeof(session->seed));
|
|
|
|
session->seedCached = false;
|
|
|
|
}
|
|
|
|
|
|
|
|
void config_lockDevice(void) { storage_lock(); }
|
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
static void get_u2froot_callback(uint32_t iter, uint32_t total) {
|
|
|
|
layoutProgress(_("Updating"), 1000 * iter / total);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void config_compute_u2froot(const char *mnemonic,
|
|
|
|
StorageHDNode *u2froot) {
|
|
|
|
static CONFIDENTIAL HDNode node;
|
2020-02-13 09:39:24 +00:00
|
|
|
static CONFIDENTIAL uint8_t seed[64];
|
2019-03-29 16:10:31 +00:00
|
|
|
char oldTiny = usbTiny(1);
|
2020-02-13 09:39:24 +00:00
|
|
|
mnemonic_to_seed(mnemonic, "", seed, get_u2froot_callback); // BIP-0039
|
2019-03-29 16:10:31 +00:00
|
|
|
usbTiny(oldTiny);
|
2020-02-13 09:39:24 +00:00
|
|
|
hdnode_from_seed(seed, 64, NIST256P1_NAME, &node);
|
2019-03-29 16:10:31 +00:00
|
|
|
hdnode_private_ckd(&node, U2F_KEY_PATH);
|
|
|
|
u2froot->depth = node.depth;
|
|
|
|
u2froot->child_num = U2F_KEY_PATH;
|
|
|
|
u2froot->chain_code.size = sizeof(node.chain_code);
|
|
|
|
memcpy(u2froot->chain_code.bytes, node.chain_code, sizeof(node.chain_code));
|
|
|
|
u2froot->has_private_key = true;
|
|
|
|
u2froot->private_key.size = sizeof(node.private_key);
|
|
|
|
memcpy(u2froot->private_key.bytes, node.private_key,
|
|
|
|
sizeof(node.private_key));
|
|
|
|
memzero(&node, sizeof(node));
|
2020-02-13 09:39:24 +00:00
|
|
|
memzero(&seed, sizeof(seed));
|
2019-03-29 16:10:31 +00:00
|
|
|
session_clear(false); // invalidate seed cache
|
2019-01-25 10:58:23 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#if DEBUG_LINK
|
2019-10-03 13:41:45 +00:00
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
bool config_dumpNode(HDNodeType *node) {
|
|
|
|
memzero(node, sizeof(HDNodeType));
|
|
|
|
|
2019-09-30 15:34:38 +00:00
|
|
|
StorageHDNode storageNode = {0};
|
2019-03-29 16:10:31 +00:00
|
|
|
uint16_t len = 0;
|
|
|
|
if (sectrue !=
|
|
|
|
storage_get(KEY_NODE, &storageNode, sizeof(storageNode), &len) ||
|
|
|
|
len != sizeof(StorageHDNode)) {
|
|
|
|
memzero(&storageNode, sizeof(storageNode));
|
|
|
|
return false;
|
|
|
|
}
|
2019-01-25 10:58:23 +00:00
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
node->depth = storageNode.depth;
|
|
|
|
node->fingerprint = storageNode.fingerprint;
|
|
|
|
node->child_num = storageNode.child_num;
|
2019-01-25 10:58:23 +00:00
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
node->chain_code.size = 32;
|
|
|
|
memcpy(node->chain_code.bytes, storageNode.chain_code.bytes, 32);
|
2019-01-25 10:58:23 +00:00
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
if (storageNode.has_private_key) {
|
|
|
|
node->has_private_key = true;
|
|
|
|
node->private_key.size = 32;
|
|
|
|
memcpy(node->private_key.bytes, storageNode.private_key.bytes, 32);
|
|
|
|
}
|
2019-01-25 10:58:23 +00:00
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
memzero(&storageNode, sizeof(storageNode));
|
|
|
|
return true;
|
2019-01-25 10:58:23 +00:00
|
|
|
}
|
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
void config_loadDevice(const LoadDevice *msg) {
|
|
|
|
session_clear(false);
|
|
|
|
config_set_bool(KEY_IMPORTED, true);
|
|
|
|
config_setPassphraseProtection(msg->has_passphrase_protection &&
|
|
|
|
msg->passphrase_protection);
|
2019-01-25 10:58:23 +00:00
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
if (msg->has_pin) {
|
|
|
|
config_changePin("", msg->pin);
|
|
|
|
}
|
2019-01-25 10:58:23 +00:00
|
|
|
|
2019-10-17 11:25:47 +00:00
|
|
|
if (msg->mnemonics_count) {
|
2019-03-29 16:10:31 +00:00
|
|
|
storage_delete(KEY_NODE);
|
2019-07-24 11:51:49 +00:00
|
|
|
config_setMnemonic(msg->mnemonics[0]);
|
2019-03-29 16:10:31 +00:00
|
|
|
}
|
2019-01-25 10:58:23 +00:00
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
if (msg->has_language) {
|
|
|
|
config_setLanguage(msg->language);
|
|
|
|
}
|
2019-01-25 10:58:23 +00:00
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
config_setLabel(msg->has_label ? msg->label : "");
|
2019-01-25 10:58:23 +00:00
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
if (msg->has_u2f_counter) {
|
|
|
|
config_setU2FCounter(msg->u2f_counter);
|
|
|
|
}
|
2019-10-03 13:41:45 +00:00
|
|
|
|
|
|
|
if (msg->has_needs_backup) {
|
|
|
|
config_setNeedsBackup(msg->needs_backup);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (msg->has_no_backup && msg->no_backup) {
|
|
|
|
config_setNoBackup();
|
|
|
|
}
|
2019-01-25 10:58:23 +00:00
|
|
|
}
|
|
|
|
|
2019-10-03 13:41:45 +00:00
|
|
|
#endif
|
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
void config_setLabel(const char *label) {
|
|
|
|
if (label == NULL || label[0] == '\0') {
|
|
|
|
storage_delete(KEY_LABEL);
|
|
|
|
} else {
|
|
|
|
storage_set(KEY_LABEL, label, strnlen(label, MAX_LABEL_LEN));
|
|
|
|
}
|
2019-01-25 10:58:23 +00:00
|
|
|
}
|
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
void config_setLanguage(const char *lang) {
|
|
|
|
if (lang == NULL) {
|
|
|
|
return;
|
|
|
|
}
|
2019-01-25 10:58:23 +00:00
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
// Sanity check.
|
2019-12-07 11:11:51 +00:00
|
|
|
if (strcmp(lang, "en-US") != 0) {
|
2019-03-29 16:10:31 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
storage_set(KEY_LANGUAGE, lang, strnlen(lang, MAX_LANGUAGE_LEN));
|
2019-01-25 10:58:23 +00:00
|
|
|
}
|
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
void config_setPassphraseProtection(bool passphrase_protection) {
|
|
|
|
config_set_bool(KEY_PASSPHRASE_PROTECTION, passphrase_protection);
|
2019-01-25 10:58:23 +00:00
|
|
|
}
|
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
bool config_getPassphraseProtection(bool *passphrase_protection) {
|
|
|
|
return sectrue ==
|
|
|
|
config_get_bool(KEY_PASSPHRASE_PROTECTION, passphrase_protection);
|
2019-01-25 10:58:23 +00:00
|
|
|
}
|
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
void config_setHomescreen(const uint8_t *data, uint32_t size) {
|
|
|
|
if (data != NULL && size == HOMESCREEN_SIZE) {
|
|
|
|
storage_set(KEY_HOMESCREEN, data, size);
|
|
|
|
} else {
|
|
|
|
storage_delete(KEY_HOMESCREEN);
|
|
|
|
}
|
2019-01-25 10:58:23 +00:00
|
|
|
}
|
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
static void get_root_node_callback(uint32_t iter, uint32_t total) {
|
|
|
|
usbSleep(1);
|
|
|
|
layoutProgress(_("Waking up"), 1000 * iter / total);
|
2019-01-25 10:58:23 +00:00
|
|
|
}
|
|
|
|
|
2020-01-20 14:00:07 +00:00
|
|
|
const uint8_t *config_getSeed(void) {
|
2019-03-29 16:10:31 +00:00
|
|
|
// root node is properly cached
|
2020-02-13 09:39:24 +00:00
|
|
|
if ((activeSessionCache != NULL) &&
|
|
|
|
(activeSessionCache->seedCached == sectrue)) {
|
|
|
|
return activeSessionCache->seed;
|
2019-03-29 16:10:31 +00:00
|
|
|
}
|
2019-01-25 10:58:23 +00:00
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
// if storage has mnemonic, convert it to node and use it
|
2019-09-30 15:34:38 +00:00
|
|
|
char mnemonic[MAX_MNEMONIC_LEN + 1] = {0};
|
2019-03-29 16:10:31 +00:00
|
|
|
if (config_getMnemonic(mnemonic, sizeof(mnemonic))) {
|
2020-02-03 17:38:03 +00:00
|
|
|
char passphrase[MAX_PASSPHRASE_LEN + 1] = {0};
|
2020-01-20 14:00:07 +00:00
|
|
|
if (!protectPassphrase(passphrase)) {
|
2019-03-29 16:10:31 +00:00
|
|
|
memzero(mnemonic, sizeof(mnemonic));
|
2020-01-20 14:00:07 +00:00
|
|
|
memzero(passphrase, sizeof(passphrase));
|
2019-03-29 16:10:31 +00:00
|
|
|
return NULL;
|
|
|
|
}
|
2020-07-10 13:24:17 +00:00
|
|
|
// passphrase is used - confirm on the display
|
|
|
|
if (passphrase[0] != 0) {
|
|
|
|
layoutDialogSwipe(&bmp_icon_question, _("Cancel"), _("Confirm"), NULL,
|
|
|
|
_("Access hidden wallet?"), NULL,
|
|
|
|
_("Next screen will show"), _("the passphrase!"), NULL,
|
|
|
|
NULL);
|
|
|
|
if (!protectButton(ButtonRequestType_ButtonRequest_Other, false)) {
|
|
|
|
memzero(mnemonic, sizeof(mnemonic));
|
|
|
|
memzero(passphrase, sizeof(passphrase));
|
|
|
|
fsm_sendFailure(FailureType_Failure_ActionCancelled,
|
|
|
|
_("Passphrase dismissed"));
|
|
|
|
layoutHome();
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
layoutShowPassphrase(passphrase);
|
|
|
|
if (!protectButton(ButtonRequestType_ButtonRequest_Other, false)) {
|
|
|
|
memzero(mnemonic, sizeof(mnemonic));
|
|
|
|
memzero(passphrase, sizeof(passphrase));
|
|
|
|
fsm_sendFailure(FailureType_Failure_ActionCancelled,
|
|
|
|
_("Passphrase dismissed"));
|
|
|
|
layoutHome();
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
}
|
2019-03-29 16:10:31 +00:00
|
|
|
// if storage was not imported (i.e. it was properly generated or recovered)
|
|
|
|
bool imported = false;
|
|
|
|
config_get_bool(KEY_IMPORTED, &imported);
|
|
|
|
if (!imported) {
|
|
|
|
// test whether mnemonic is a valid BIP-0039 mnemonic
|
|
|
|
if (!mnemonic_check(mnemonic)) {
|
|
|
|
// and if not then halt the device
|
|
|
|
error_shutdown(_("Storage failure"), _("detected."), NULL, NULL);
|
|
|
|
}
|
2019-01-25 10:58:23 +00:00
|
|
|
}
|
2019-03-29 16:10:31 +00:00
|
|
|
char oldTiny = usbTiny(1);
|
2020-02-13 09:39:24 +00:00
|
|
|
if (activeSessionCache == NULL) {
|
|
|
|
// this should not happen if the Host behaves and sends Initialize first
|
|
|
|
session_startSession(NULL);
|
|
|
|
}
|
|
|
|
mnemonic_to_seed(mnemonic, passphrase, activeSessionCache->seed,
|
2020-01-20 14:00:07 +00:00
|
|
|
get_root_node_callback); // BIP-0039
|
2019-03-29 16:10:31 +00:00
|
|
|
memzero(mnemonic, sizeof(mnemonic));
|
2020-01-20 14:00:07 +00:00
|
|
|
memzero(passphrase, sizeof(passphrase));
|
2019-03-29 16:10:31 +00:00
|
|
|
usbTiny(oldTiny);
|
2020-02-13 09:39:24 +00:00
|
|
|
activeSessionCache->seedCached = sectrue;
|
|
|
|
return activeSessionCache->seed;
|
2020-01-28 14:18:00 +00:00
|
|
|
} else {
|
|
|
|
fsm_sendFailure(FailureType_Failure_NotInitialized,
|
|
|
|
_("Device not initialized"));
|
2019-03-29 16:10:31 +00:00
|
|
|
}
|
2019-01-25 10:58:23 +00:00
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
return NULL;
|
2019-01-25 10:58:23 +00:00
|
|
|
}
|
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
static bool config_loadNode(const StorageHDNode *node, const char *curve,
|
|
|
|
HDNode *out) {
|
|
|
|
return hdnode_from_xprv(node->depth, node->child_num, node->chain_code.bytes,
|
|
|
|
node->private_key.bytes, curve, out);
|
2019-01-25 10:58:23 +00:00
|
|
|
}
|
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
bool config_getU2FRoot(HDNode *node) {
|
2019-09-30 15:34:38 +00:00
|
|
|
StorageHDNode u2fNode = {0};
|
2019-03-29 16:10:31 +00:00
|
|
|
uint16_t len = 0;
|
|
|
|
if (sectrue != storage_get(KEY_U2F_ROOT, &u2fNode, sizeof(u2fNode), &len) ||
|
|
|
|
len != sizeof(StorageHDNode)) {
|
2019-01-25 10:58:23 +00:00
|
|
|
memzero(&u2fNode, sizeof(u2fNode));
|
2019-03-29 16:10:31 +00:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
bool ret = config_loadNode(&u2fNode, NIST256P1_NAME, node);
|
|
|
|
memzero(&u2fNode, sizeof(u2fNode));
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2020-01-20 14:00:07 +00:00
|
|
|
bool config_getRootNode(HDNode *node, const char *curve) {
|
|
|
|
const uint8_t *seed = config_getSeed();
|
2019-03-29 16:10:31 +00:00
|
|
|
if (seed == NULL) {
|
|
|
|
return false;
|
|
|
|
}
|
2020-02-03 17:38:03 +00:00
|
|
|
int result = hdnode_from_seed(seed, 64, curve, node);
|
2020-01-28 14:18:00 +00:00
|
|
|
if (result == 0) {
|
|
|
|
fsm_sendFailure(FailureType_Failure_NotInitialized, _("Unsupported curve"));
|
|
|
|
}
|
|
|
|
return result;
|
2019-01-25 10:58:23 +00:00
|
|
|
}
|
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
bool config_getLabel(char *dest, uint16_t dest_size) {
|
|
|
|
return sectrue == config_get_string(KEY_LABEL, dest, dest_size);
|
2019-01-25 10:58:23 +00:00
|
|
|
}
|
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
bool config_getLanguage(char *dest, uint16_t dest_size) {
|
2019-12-07 11:11:51 +00:00
|
|
|
if (sectrue == config_get_string(KEY_LANGUAGE, dest, dest_size)) {
|
|
|
|
if (dest_size == 7 && (strcmp(dest, "english") != 0)) {
|
|
|
|
// fallthrough -> return "en-US"
|
|
|
|
} else {
|
|
|
|
// other language -> return the value
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
strcpy(dest, "en-US");
|
|
|
|
dest_size = 5;
|
|
|
|
return true;
|
2019-01-25 10:58:23 +00:00
|
|
|
}
|
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
bool config_getHomescreen(uint8_t *dest, uint16_t dest_size) {
|
|
|
|
uint16_t len = 0;
|
|
|
|
secbool ret = storage_get(KEY_HOMESCREEN, dest, dest_size, &len);
|
|
|
|
if (sectrue != ret || len != HOMESCREEN_SIZE) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return true;
|
2019-01-25 10:58:23 +00:00
|
|
|
}
|
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
bool config_setMnemonic(const char *mnemonic) {
|
|
|
|
if (mnemonic == NULL) {
|
|
|
|
return false;
|
|
|
|
}
|
2019-01-25 10:58:23 +00:00
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
if (sectrue != storage_set(KEY_MNEMONIC, mnemonic,
|
|
|
|
strnlen(mnemonic, MAX_MNEMONIC_LEN))) {
|
|
|
|
return false;
|
|
|
|
}
|
2019-02-05 19:40:58 +00:00
|
|
|
|
2019-09-30 15:34:38 +00:00
|
|
|
StorageHDNode u2fNode = {0};
|
2019-03-29 16:10:31 +00:00
|
|
|
memzero(&u2fNode, sizeof(u2fNode));
|
|
|
|
config_compute_u2froot(mnemonic, &u2fNode);
|
|
|
|
secbool ret = storage_set(KEY_U2F_ROOT, &u2fNode, sizeof(u2fNode));
|
|
|
|
memzero(&u2fNode, sizeof(u2fNode));
|
2019-02-05 19:40:58 +00:00
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
if (sectrue != ret) {
|
|
|
|
storage_delete(KEY_MNEMONIC);
|
|
|
|
return false;
|
|
|
|
}
|
2019-01-25 10:58:23 +00:00
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
config_set_bool(KEY_INITIALIZED, true);
|
2019-01-25 10:58:23 +00:00
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
return true;
|
2019-01-25 10:58:23 +00:00
|
|
|
}
|
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
bool config_getMnemonicBytes(uint8_t *dest, uint16_t dest_size,
|
|
|
|
uint16_t *real_size) {
|
|
|
|
return sectrue == config_get_bytes(KEY_MNEMONIC, dest, dest_size, real_size);
|
2019-03-12 13:52:55 +00:00
|
|
|
}
|
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
bool config_getMnemonic(char *dest, uint16_t dest_size) {
|
|
|
|
return sectrue == config_get_string(KEY_MNEMONIC, dest, dest_size);
|
2019-01-25 10:58:23 +00:00
|
|
|
}
|
|
|
|
|
2020-04-28 07:23:51 +00:00
|
|
|
bool config_hasMnemonic(void) { return sectrue == storage_has(KEY_MNEMONIC); }
|
|
|
|
|
2019-01-25 10:58:23 +00:00
|
|
|
/* Check whether mnemonic matches storage. The mnemonic must be
|
|
|
|
* a null-terminated string.
|
|
|
|
*/
|
2019-03-29 16:10:31 +00:00
|
|
|
bool config_containsMnemonic(const char *mnemonic) {
|
|
|
|
uint16_t len = 0;
|
2019-09-30 15:34:38 +00:00
|
|
|
uint8_t stored_mnemonic[MAX_MNEMONIC_LEN] = {0};
|
2019-03-29 16:10:31 +00:00
|
|
|
if (sectrue != storage_get(KEY_MNEMONIC, stored_mnemonic,
|
|
|
|
sizeof(stored_mnemonic), &len)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Compare the digests to mitigate side-channel attacks.
|
2019-09-30 15:34:38 +00:00
|
|
|
uint8_t digest_stored[SHA256_DIGEST_LENGTH] = {0};
|
2019-03-29 16:10:31 +00:00
|
|
|
sha256_Raw(stored_mnemonic, len, digest_stored);
|
|
|
|
memzero(stored_mnemonic, sizeof(stored_mnemonic));
|
|
|
|
|
2019-09-30 15:34:38 +00:00
|
|
|
uint8_t digest_input[SHA256_DIGEST_LENGTH] = {0};
|
2019-03-29 16:10:31 +00:00
|
|
|
sha256_Raw((const uint8_t *)mnemonic, strnlen(mnemonic, MAX_MNEMONIC_LEN),
|
|
|
|
digest_input);
|
|
|
|
|
|
|
|
uint8_t diff = 0;
|
|
|
|
for (size_t i = 0; i < sizeof(digest_input); i++) {
|
|
|
|
diff |= (digest_stored[i] - digest_input[i]);
|
|
|
|
}
|
|
|
|
memzero(digest_stored, sizeof(digest_stored));
|
|
|
|
memzero(digest_input, sizeof(digest_input));
|
|
|
|
return diff == 0;
|
2019-01-25 10:58:23 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Check whether pin matches storage. The pin must be
|
|
|
|
* a null-terminated string with at most 9 characters.
|
|
|
|
*/
|
2019-03-29 16:10:31 +00:00
|
|
|
bool config_unlock(const char *pin) {
|
|
|
|
char oldTiny = usbTiny(1);
|
2019-08-09 20:52:09 +00:00
|
|
|
secbool ret = storage_unlock(pin_to_int(pin), NULL);
|
2019-03-29 16:10:31 +00:00
|
|
|
usbTiny(oldTiny);
|
|
|
|
return sectrue == ret;
|
2019-01-25 10:58:23 +00:00
|
|
|
}
|
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
bool config_hasPin(void) { return sectrue == storage_has_pin(); }
|
2019-01-25 10:58:23 +00:00
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
bool config_changePin(const char *old_pin, const char *new_pin) {
|
|
|
|
uint32_t new_pin_int = pin_to_int(new_pin);
|
|
|
|
if (new_pin_int == 0) {
|
|
|
|
return false;
|
|
|
|
}
|
2019-01-25 10:58:23 +00:00
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
char oldTiny = usbTiny(1);
|
2019-08-09 20:52:09 +00:00
|
|
|
secbool ret =
|
|
|
|
storage_change_pin(pin_to_int(old_pin), new_pin_int, NULL, NULL);
|
2019-03-29 16:10:31 +00:00
|
|
|
usbTiny(oldTiny);
|
2019-02-14 14:13:47 +00:00
|
|
|
|
|
|
|
#if DEBUG_LINK
|
2019-03-29 16:10:31 +00:00
|
|
|
if (sectrue == ret) {
|
|
|
|
if (new_pin_int != PIN_EMPTY) {
|
|
|
|
storage_set(KEY_DEBUG_LINK_PIN, new_pin, strnlen(new_pin, MAX_PIN_LEN));
|
|
|
|
} else {
|
|
|
|
storage_delete(KEY_DEBUG_LINK_PIN);
|
2019-01-25 10:58:23 +00:00
|
|
|
}
|
2019-03-29 16:10:31 +00:00
|
|
|
}
|
2019-02-14 14:13:47 +00:00
|
|
|
#endif
|
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
memzero(&new_pin_int, sizeof(new_pin_int));
|
2019-02-14 14:13:47 +00:00
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
return sectrue == ret;
|
2019-01-25 10:58:23 +00:00
|
|
|
}
|
|
|
|
|
2019-02-14 14:13:47 +00:00
|
|
|
#if DEBUG_LINK
|
2019-03-29 16:10:31 +00:00
|
|
|
bool config_getPin(char *dest, uint16_t dest_size) {
|
|
|
|
return sectrue == config_get_string(KEY_DEBUG_LINK_PIN, dest, dest_size);
|
2019-02-14 14:13:47 +00:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2019-10-23 17:20:08 +00:00
|
|
|
bool config_hasWipeCode(void) { return sectrue == storage_has_wipe_code(); }
|
|
|
|
|
|
|
|
bool config_changeWipeCode(const char *pin, const char *wipe_code) {
|
|
|
|
uint32_t wipe_code_int = pin_to_int(wipe_code);
|
|
|
|
if (wipe_code_int == 0) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
char oldTiny = usbTiny(1);
|
|
|
|
secbool ret = storage_change_wipe_code(pin_to_int(pin), NULL, wipe_code_int);
|
|
|
|
usbTiny(oldTiny);
|
|
|
|
|
|
|
|
memzero(&wipe_code_int, sizeof(wipe_code_int));
|
|
|
|
return sectrue == ret;
|
|
|
|
}
|
|
|
|
|
2020-02-13 09:39:24 +00:00
|
|
|
uint8_t session_findLeastRecent(void) {
|
|
|
|
uint8_t least_recent_index = MAX_SESSIONS_COUNT;
|
|
|
|
uint32_t least_recent_use = sessionUseCounter;
|
|
|
|
for (uint8_t i = 0; i < MAX_SESSIONS_COUNT; i++) {
|
|
|
|
if (sessionsCache[i].last_use == 0) {
|
|
|
|
return i;
|
|
|
|
}
|
|
|
|
if (sessionsCache[i].last_use <= least_recent_use) {
|
|
|
|
least_recent_use = sessionsCache[i].last_use;
|
|
|
|
least_recent_index = i;
|
|
|
|
}
|
2019-03-29 16:10:31 +00:00
|
|
|
}
|
2020-02-13 09:39:24 +00:00
|
|
|
ensure(sectrue * (least_recent_index < MAX_SESSIONS_COUNT), NULL);
|
|
|
|
return least_recent_index;
|
|
|
|
}
|
|
|
|
|
|
|
|
uint8_t session_findSession(const uint8_t *sessionId) {
|
|
|
|
for (uint8_t i = 0; i < MAX_SESSIONS_COUNT; i++) {
|
|
|
|
if (sessionsCache[i].last_use != 0) {
|
|
|
|
if (memcmp(sessionsCache[i].id, sessionId, 32) == 0) { // session found
|
|
|
|
return i;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return MAX_SESSIONS_COUNT;
|
|
|
|
}
|
|
|
|
|
|
|
|
uint8_t *session_startSession(const uint8_t *received_session_id) {
|
|
|
|
int session_index = MAX_SESSIONS_COUNT;
|
|
|
|
|
|
|
|
if (received_session_id != NULL) {
|
|
|
|
session_index = session_findSession(received_session_id);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (session_index == MAX_SESSIONS_COUNT) {
|
|
|
|
// Session not found in cache. Use an empty one or the least recently used.
|
|
|
|
session_index = session_findLeastRecent();
|
|
|
|
session_clearCache(sessionsCache + session_index);
|
|
|
|
random_buffer(sessionsCache[session_index].id, 32);
|
|
|
|
}
|
|
|
|
|
|
|
|
sessionUseCounter++;
|
|
|
|
sessionsCache[session_index].last_use = sessionUseCounter;
|
|
|
|
activeSessionCache = sessionsCache + session_index;
|
|
|
|
return activeSessionCache->id;
|
2019-01-25 10:58:23 +00:00
|
|
|
}
|
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
bool session_isUnlocked(void) { return sectrue == storage_is_unlocked(); }
|
2019-01-25 10:58:23 +00:00
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
bool config_isInitialized(void) {
|
|
|
|
bool initialized = false;
|
|
|
|
config_get_bool(KEY_INITIALIZED, &initialized);
|
|
|
|
return initialized;
|
2019-01-25 10:58:23 +00:00
|
|
|
}
|
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
bool config_getImported(bool *imported) {
|
|
|
|
return sectrue == config_get_bool(KEY_IMPORTED, imported);
|
2019-01-25 10:58:23 +00:00
|
|
|
}
|
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
void config_setImported(bool imported) {
|
|
|
|
config_set_bool(KEY_IMPORTED, imported);
|
2019-01-25 10:58:23 +00:00
|
|
|
}
|
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
bool config_getNeedsBackup(bool *needs_backup) {
|
|
|
|
return sectrue == config_get_bool(KEY_NEEDS_BACKUP, needs_backup);
|
2019-01-25 10:58:23 +00:00
|
|
|
}
|
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
void config_setNeedsBackup(bool needs_backup) {
|
|
|
|
config_set_bool(KEY_NEEDS_BACKUP, needs_backup);
|
2019-01-25 10:58:23 +00:00
|
|
|
}
|
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
bool config_getUnfinishedBackup(bool *unfinished_backup) {
|
|
|
|
return sectrue == config_get_bool(KEY_UNFINISHED_BACKUP, unfinished_backup);
|
2019-01-25 10:58:23 +00:00
|
|
|
}
|
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
void config_setUnfinishedBackup(bool unfinished_backup) {
|
|
|
|
config_set_bool(KEY_UNFINISHED_BACKUP, unfinished_backup);
|
2019-01-25 10:58:23 +00:00
|
|
|
}
|
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
bool config_getNoBackup(bool *no_backup) {
|
|
|
|
return sectrue == config_get_bool(KEY_NO_BACKUP, no_backup);
|
2019-01-25 10:58:23 +00:00
|
|
|
}
|
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
void config_setNoBackup(void) { config_set_bool(KEY_NO_BACKUP, true); }
|
2019-01-25 10:58:23 +00:00
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
void config_applyFlags(uint32_t flags) {
|
|
|
|
uint32_t old_flags = 0;
|
|
|
|
config_get_uint32(KEY_FLAGS, &old_flags);
|
|
|
|
flags |= old_flags;
|
|
|
|
if (flags == old_flags) {
|
|
|
|
return; // no new flags
|
|
|
|
}
|
|
|
|
storage_set(KEY_FLAGS, &flags, sizeof(flags));
|
2019-01-25 10:58:23 +00:00
|
|
|
}
|
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
bool config_getFlags(uint32_t *flags) {
|
|
|
|
return sectrue == config_get_uint32(KEY_FLAGS, flags);
|
2019-01-25 10:58:23 +00:00
|
|
|
}
|
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
uint32_t config_nextU2FCounter(void) {
|
|
|
|
uint32_t u2fcounter = 0;
|
|
|
|
storage_next_counter(KEY_U2F_COUNTER, &u2fcounter);
|
|
|
|
return u2fcounter;
|
2019-01-25 10:58:23 +00:00
|
|
|
}
|
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
void config_setU2FCounter(uint32_t u2fcounter) {
|
|
|
|
storage_set_counter(KEY_U2F_COUNTER, u2fcounter);
|
2019-01-25 10:58:23 +00:00
|
|
|
}
|
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
uint32_t config_getAutoLockDelayMs() {
|
|
|
|
if (sectrue == autoLockDelayMsCached) {
|
|
|
|
return autoLockDelayMs;
|
|
|
|
}
|
2019-02-12 16:56:33 +00:00
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
if (sectrue != storage_is_unlocked()) {
|
|
|
|
return autoLockDelayMsDefault;
|
|
|
|
}
|
2019-02-12 16:56:33 +00:00
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
if (sectrue != config_get_uint32(KEY_AUTO_LOCK_DELAY_MS, &autoLockDelayMs)) {
|
|
|
|
autoLockDelayMs = autoLockDelayMsDefault;
|
|
|
|
}
|
|
|
|
autoLockDelayMsCached = sectrue;
|
|
|
|
return autoLockDelayMs;
|
2019-01-25 10:58:23 +00:00
|
|
|
}
|
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
void config_setAutoLockDelayMs(uint32_t auto_lock_delay_ms) {
|
2020-07-21 14:41:04 +00:00
|
|
|
auto_lock_delay_ms = MAX(auto_lock_delay_ms, MIN_AUTOLOCK_DELAY_MS);
|
2019-03-29 16:10:31 +00:00
|
|
|
if (sectrue == storage_set(KEY_AUTO_LOCK_DELAY_MS, &auto_lock_delay_ms,
|
|
|
|
sizeof(auto_lock_delay_ms))) {
|
|
|
|
autoLockDelayMs = auto_lock_delay_ms;
|
|
|
|
autoLockDelayMsCached = sectrue;
|
|
|
|
}
|
2019-01-25 10:58:23 +00:00
|
|
|
}
|
|
|
|
|
2019-03-29 16:10:31 +00:00
|
|
|
void config_wipe(void) {
|
|
|
|
char oldTiny = usbTiny(1);
|
|
|
|
storage_wipe();
|
|
|
|
if (storage_is_unlocked() != sectrue) {
|
2019-08-09 20:52:09 +00:00
|
|
|
storage_unlock(PIN_EMPTY, NULL);
|
2019-03-29 16:10:31 +00:00
|
|
|
}
|
|
|
|
usbTiny(oldTiny);
|
|
|
|
random_buffer((uint8_t *)config_uuid, sizeof(config_uuid));
|
|
|
|
data2hex(config_uuid, sizeof(config_uuid), config_uuid_str);
|
|
|
|
autoLockDelayMsCached = secfalse;
|
|
|
|
storage_set(KEY_UUID, config_uuid, sizeof(config_uuid));
|
|
|
|
storage_set(KEY_VERSION, &CONFIG_VERSION, sizeof(CONFIG_VERSION));
|
|
|
|
session_clear(false);
|
2019-01-25 10:58:23 +00:00
|
|
|
}
|