1
0
mirror of https://github.com/trezor/trezor-firmware.git synced 2024-11-18 21:48:13 +00:00
trezor-firmware/micropython/bootloader/main.c

265 lines
7.9 KiB
C
Raw Normal View History

2017-03-20 14:41:21 +00:00
#include STM32_HAL_H
#include <string.h>
#include <sys/types.h>
2017-04-27 17:18:57 +00:00
#include <assert.h>
#include "common.h"
2017-03-20 14:41:21 +00:00
#include "display.h"
#include "image.h"
2017-03-28 11:04:54 +00:00
#include "flash.h"
#include "touch.h"
2017-03-28 11:04:54 +00:00
#include "usb.h"
#include "version.h"
2017-03-20 14:41:21 +00:00
#include "messages.h"
#include "protobuf.h"
#define IMAGE_MAGIC 0x465A5254 // TRZF
#define IMAGE_MAXSIZE (7 * 128 * 1024)
void pendsv_isr_handler(void) {
__fatal_error("pendsv", __FILE__, __LINE__, __FUNCTION__);
2017-03-20 14:41:21 +00:00
}
void display_vendor(const uint8_t *vimg, const char *vstr, uint32_t vstr_len, uint32_t fw_version)
{
display_clear();
if (memcmp(vimg, "TOIf", 4) != 0) {
return;
}
uint16_t w = *(uint16_t *)(vimg + 4);
uint16_t h = *(uint16_t *)(vimg + 6);
if (w != 120 || h != 120) {
return;
}
uint32_t datalen = *(uint32_t *)(vimg + 8);
display_image(60, 32, w, h, vimg + 12, datalen);
display_text_center(120, 192, vstr, vstr_len, FONT_BOLD, 0xFFFF, 0x0000);
char ver_str[] = "v0.0.0.0";
// TODO: fixme - the following does not work for values >= 10
ver_str[1] += fw_version & 0xFF;
ver_str[3] += (fw_version >> 8) & 0xFF;
ver_str[5] += (fw_version >> 16) & 0xFF;
ver_str[7] += (fw_version >> 24) & 0xFF;
display_text_center(120, 215, ver_str, -1, FONT_BOLD, 0x7BEF, 0x0000);
display_refresh();
}
void check_and_jump(void)
{
DPRINTLN("checking vendor header");
2017-04-01 17:24:41 +00:00
vendor_header vhdr;
if (vendor_parse_header((const uint8_t *)FIRMWARE_START, &vhdr)) {
DPRINTLN("valid vendor header");
} else {
DPRINTLN("invalid vendor header");
2017-04-01 17:24:41 +00:00
return;
}
if (vendor_check_signature((const uint8_t *)FIRMWARE_START, &vhdr)) {
DPRINTLN("valid vendor header signature");
} else {
DPRINTLN("invalid vendor header signature");
2017-04-01 17:24:41 +00:00
return;
}
DPRINTLN("checking firmware header");
image_header hdr;
if (image_parse_header((const uint8_t *)(FIRMWARE_START + vhdr.hdrlen), IMAGE_MAGIC, IMAGE_MAXSIZE, &hdr)) {
DPRINTLN("valid firmware header");
} else {
DPRINTLN("invalid firmware header");
return;
}
if (image_check_signature((const uint8_t *)(FIRMWARE_START + vhdr.hdrlen), &hdr, &vhdr)) {
DPRINTLN("valid firmware signature");
display_vendor(vhdr.vimg, (const char *)vhdr.vstr, vhdr.vstr_len, hdr.version);
HAL_Delay(1000); // TODO: remove?
DPRINTLN("JUMP!");
2017-04-01 17:24:41 +00:00
jump_to(FIRMWARE_START + vhdr.hdrlen + HEADER_SIZE);
} else {
DPRINTLN("invalid firmware signature");
}
}
2017-03-28 11:04:54 +00:00
int usb_init_all(void) {
static const usb_dev_info_t dev_info = {
.vendor_id = 0x1209,
.product_id = 0x53C0,
.release_num = 0x0002,
.manufacturer_str = (const uint8_t *)"SatoshiLabs",
.product_str = (const uint8_t *)"TREZOR Bootloader",
.serial_number_str = (const uint8_t *)"",
.configuration_str = (const uint8_t *)"",
.interface_str = (const uint8_t *)"",
2017-03-28 11:04:54 +00:00
};
static uint8_t hid_rx_buffer[64];
static const uint8_t hid_report_desc[] = {
0x06, 0x00, 0xff, // USAGE_PAGE (Vendor Defined)
0x09, 0x01, // USAGE (1)
0xa1, 0x01, // COLLECTION (Application)
0x09, 0x20, // USAGE (Input Report Data)
0x15, 0x00, // LOGICAL_MINIMUM (0)
0x26, 0xff, 0x00, // LOGICAL_MAXIMUM (255)
0x75, 0x08, // REPORT_SIZE (8)
0x95, 0x40, // REPORT_COUNT (64)
0x81, 0x02, // INPUT (Data,Var,Abs)
0x09, 0x21, // USAGE (Output Report Data)
0x15, 0x00, // LOGICAL_MINIMUM (0)
0x26, 0xff, 0x00, // LOGICAL_MAXIMUM (255)
0x75, 0x08, // REPORT_SIZE (8)
0x95, 0x40, // REPORT_COUNT (64)
0x91, 0x02, // OUTPUT (Data,Var,Abs)
0xc0 // END_COLLECTION
};
2017-03-28 11:04:54 +00:00
static const usb_hid_info_t hid_info = {
2017-04-27 17:18:57 +00:00
.iface_num = 0,
2017-03-28 11:04:54 +00:00
.ep_in = USB_EP_DIR_IN | 0x01,
.ep_out = USB_EP_DIR_OUT | 0x01,
.subclass = 0,
.protocol = 0,
.max_packet_len = sizeof(hid_rx_buffer),
.rx_buffer = hid_rx_buffer,
2017-03-28 11:04:54 +00:00
.polling_interval = 1,
.report_desc_len = sizeof(hid_report_desc),
.report_desc = hid_report_desc,
2017-03-28 11:04:54 +00:00
};
if (0 != usb_init(&dev_info)) {
__fatal_error("usb_init", __FILE__, __LINE__, __FUNCTION__);
2017-03-28 11:04:54 +00:00
}
if (0 != usb_hid_add(&hid_info)) {
__fatal_error("usb_hid_add", __FILE__, __LINE__, __FUNCTION__);
2017-03-28 11:04:54 +00:00
}
if (0 != usb_start()) {
__fatal_error("usb_start", __FILE__, __LINE__, __FUNCTION__);
2017-03-28 11:04:54 +00:00
}
return 0;
}
2017-04-27 17:18:57 +00:00
#define UPLOAD_CHUNK_SIZE (128*1024)
#define USB_PACKET_SIZE 64
#define USB_IFACE_NUM 0
void process_upload_chunk(const uint8_t *buf, uint32_t len)
{
// TODO: write to flash
}
uint32_t process_upload_message(uint32_t msg_size, const uint8_t *initbuf, uint32_t initlen)
{
int remains = msg_size - initlen;
// TODO: process initbuf
if (initbuf[0] != 0x0A) {
return 0; // ERROR - payload field not found
}
uint32_t payload_len;
uint32_t p = pb_read_varint(initbuf, &payload_len);
process_upload_chunk(initbuf + p, initlen - p);
uint8_t buf[USB_PACKET_SIZE];
while (remains > 0) {
int r = usb_hid_read_blocking(USB_IFACE_NUM, buf, USB_PACKET_SIZE, 100);
if (r <= 0) {
continue;
}
assert(r == USB_PACKET_SIZE);
process_upload_chunk(buf, 63);
remains -= USB_PACKET_SIZE;
}
DPRINTLN("done");
return 0; // should return >0 if more data required
}
2017-04-06 13:53:47 +00:00
void mainloop(void)
{
if (0 != flash_init()) {
__fatal_error("flash_init", __FILE__, __LINE__, __FUNCTION__);
}
if (0 != usb_init_all()) {
__fatal_error("usb_init_all", __FILE__, __LINE__, __FUNCTION__);
}
2017-04-27 17:18:57 +00:00
uint8_t buf[USB_PACKET_SIZE];
for (;;) {
2017-04-27 17:18:57 +00:00
int r = usb_hid_read_blocking(USB_IFACE_NUM, buf, USB_PACKET_SIZE, 100);
if (r <= 0) {
continue;
}
2017-04-27 17:18:57 +00:00
assert(r == USB_PACKET_SIZE);
uint16_t msg_id;
uint32_t msg_size;
// invalid header
if (!pb_parse_header(buf, &msg_id, &msg_size)) {
continue;
}
switch (msg_id) {
case 0: // Initialize
DPRINTLN("received Initialize");
2017-04-27 17:18:57 +00:00
send_msg_Features(USB_IFACE_NUM, false);
break;
case 1: // Ping
DPRINTLN("received Ping");
2017-04-27 17:18:57 +00:00
send_msg_Success(USB_IFACE_NUM);
break;
case 6: // FirmwareErase
DPRINTLN("received FirmwareErase");
2017-04-27 17:18:57 +00:00
send_msg_FirmwareRequest(USB_IFACE_NUM, 0, UPLOAD_CHUNK_SIZE);
break;
case 7: // FirmwareUpload
DPRINTLN("received FirmwareUpload");
2017-04-27 17:18:57 +00:00
uint32_t req_offset = process_upload_message(msg_size, buf + PB_HEADER_LEN, USB_PACKET_SIZE - PB_HEADER_LEN);
if (req_offset > 0) {
send_msg_FirmwareRequest(USB_IFACE_NUM, req_offset, UPLOAD_CHUNK_SIZE);
} else {
2017-04-27 17:18:57 +00:00
send_msg_Success(USB_IFACE_NUM);
}
break;
default:
DPRINTLN("received unknown message");
2017-04-27 17:18:57 +00:00
send_msg_Failure(USB_IFACE_NUM);
break;
}
}
2017-04-06 13:53:47 +00:00
}
int main(void)
2017-03-20 14:41:21 +00:00
{
periph_init();
2017-03-20 14:41:21 +00:00
2017-03-28 11:04:54 +00:00
if (0 != display_init()) {
__fatal_error("display_init", __FILE__, __LINE__, __FUNCTION__);
2017-03-28 11:04:54 +00:00
}
if (0 != touch_init()) {
__fatal_error("touch_init", __FILE__, __LINE__, __FUNCTION__);
2017-03-28 11:04:54 +00:00
}
2017-03-20 14:41:21 +00:00
display_clear();
display_backlight(255);
2017-04-10 17:24:21 +00:00
DPRINTLN("TREZOR Bootloader " VERSION_STR);
DPRINTLN("=================");
DPRINTLN("starting bootloader");
if (touch_read() != 0) {
mainloop();
} else {
check_and_jump();
}
2017-03-29 18:50:45 +00:00
__fatal_error("HALT", __FILE__, __LINE__, __FUNCTION__);
2017-03-20 14:41:21 +00:00
return 0;
}