1
0
mirror of https://github.com/trezor/trezor-firmware.git synced 2024-12-22 22:38:08 +00:00
trezor-firmware/legacy/firmware/trezor.c

191 lines
4.8 KiB
C
Raw Normal View History

2014-04-29 12:26:51 +00:00
/*
* This file is part of the Trezor project, https://trezor.io/
2014-04-29 12:26:51 +00:00
*
* Copyright (C) 2014 Pavol Rusnak <stick@satoshilabs.com>
*
* This library is free software: you can redistribute it and/or modify
* it under the terms of the GNU Lesser General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This library is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public License
* along with this library. If not, see <http://www.gnu.org/licenses/>.
*/
#include "trezor.h"
#include "bitmaps.h"
#include "bl_check.h"
#include "buttons.h"
#include "common.h"
#include "compiler_traits.h"
2019-01-25 10:58:23 +00:00
#include "config.h"
#include "gettext.h"
2014-07-30 18:34:28 +00:00
#include "layout.h"
2014-04-29 12:26:51 +00:00
#include "layout2.h"
#include "memzero.h"
#include "oled.h"
2014-07-30 18:34:28 +00:00
#include "rng.h"
#include "setup.h"
#include "timer.h"
#include "usb.h"
#include "util.h"
#if !EMULATOR
#include <libopencm3/stm32/desig.h>
#include "otp.h"
#endif
#ifdef USE_SECP256K1_ZKP
#include "zkp_context.h"
#endif
#ifdef USE_SECP256K1_ZKP
void secp256k1_default_illegal_callback_fn(const char *str, void *data) {
(void)data;
__fatal_error(NULL, str, __FILE__, __LINE__, __func__);
return;
}
void secp256k1_default_error_callback_fn(const char *str, void *data) {
(void)data;
__fatal_error(NULL, str, __FILE__, __LINE__, __func__);
return;
}
#endif
2014-07-30 18:34:28 +00:00
2017-12-13 18:38:51 +00:00
/* Screen timeout */
uint32_t system_millis_lock_start = 0;
2017-12-13 18:38:51 +00:00
void check_lock_screen(void) {
buttonUpdate();
// wake from screensaver on any button
if (layoutLast == layoutScreensaver && (button.NoUp || button.YesUp)) {
layoutHome();
return;
}
// button held for long enough (5 seconds)
if (layoutLast == layoutHome && button.NoDown >= 114000 * 5) {
layoutDialog(&bmp_icon_question, _("Cancel"), _("Lock Device"), NULL,
_("Do you really want to"), _("lock your Trezor?"), NULL, NULL,
NULL, NULL);
// wait until NoButton is released
usbTiny(1);
do {
waitAndProcessUSBRequests(5);
buttonUpdate();
} while (!button.NoUp);
// wait for confirmation/cancellation of the dialog
do {
waitAndProcessUSBRequests(5);
buttonUpdate();
} while (!button.YesUp && !button.NoUp);
usbTiny(0);
if (button.YesUp) {
// lock the screen
config_lockDevice();
layoutScreensaver();
} else {
// resume homescreen
layoutHome();
}
}
// if homescreen is shown for too long
if (layoutLast == layoutHome) {
if ((timer_ms() - system_millis_lock_start) >=
config_getAutoLockDelayMs()) {
// lock the screen
config_lockDevice();
layoutScreensaver();
}
}
}
static void collect_hw_entropy(bool privileged) {
#if EMULATOR
(void)privileged;
memzero(HW_ENTROPY_DATA, HW_ENTROPY_LEN);
#else
if (privileged) {
desig_get_unique_id((uint32_t *)HW_ENTROPY_DATA);
// set entropy in the OTP randomness block
if (!flash_otp_is_locked(FLASH_OTP_BLOCK_RANDOMNESS)) {
uint8_t entropy[FLASH_OTP_BLOCK_SIZE] = {0};
random_buffer(entropy, FLASH_OTP_BLOCK_SIZE);
flash_otp_write(FLASH_OTP_BLOCK_RANDOMNESS, 0, entropy,
FLASH_OTP_BLOCK_SIZE);
flash_otp_lock(FLASH_OTP_BLOCK_RANDOMNESS);
}
// collect entropy from OTP randomness block
flash_otp_read(FLASH_OTP_BLOCK_RANDOMNESS, 0, HW_ENTROPY_DATA + 12,
FLASH_OTP_BLOCK_SIZE);
} else {
// unprivileged mode => use fixed HW_ENTROPY
memset(HW_ENTROPY_DATA, 0x3C, HW_ENTROPY_LEN);
}
#endif
}
int main(void) {
#ifndef APPVER
setup();
__stack_chk_guard = random32(); // this supports compiler provided
// unpredictable stack protection checks
oledInit();
#else
check_and_replace_bootloader(true);
setupApp();
__stack_chk_guard = random32(); // this supports compiler provided
// unpredictable stack protection checks
#endif
drbg_init();
if (!is_mode_unprivileged()) {
collect_hw_entropy(true);
timer_init();
#ifdef APPVER
// enable MPU (Memory Protection Unit)
mpu_config_firmware();
#endif
} else {
collect_hw_entropy(false);
}
#ifdef USE_SECP256K1_ZKP
ensure(sectrue * (zkp_context_init() == 0), NULL);
#endif
#if DEBUG_LINK
#if !EMULATOR
config_wipe();
#endif
2014-04-29 12:26:51 +00:00
#endif
oledDrawBitmap(40, 0, &bmp_logo64_half);
oledDrawBitmapFlip(40 + 24, 0, &bmp_logo64_half);
oledRefresh();
2014-04-29 12:26:51 +00:00
config_init();
layoutHome();
usbInit();
for (;;) {
#if EMULATOR
waitAndProcessUSBRequests(10);
#else
usbPoll();
#endif
check_lock_screen();
}
2014-04-29 12:26:51 +00:00
return 0;
2014-04-29 12:26:51 +00:00
}