1
0
mirror of https://github.com/trezor/trezor-firmware.git synced 2024-12-16 03:18:09 +00:00
trezor-firmware/protob/messages.proto

617 lines
18 KiB
Protocol Buffer
Raw Normal View History

/**
* Messages for TREZOR communication
*
* @author Marek Palatinus <slush@satoshilabs.com>
* @version 1.2
*/
// Sugar for easier handling in Java
option java_package = "com.satoshilabs.trezor.protobuf";
option java_outer_classname = "TrezorMessage";
import "types.proto";
2013-11-22 16:27:47 +00:00
/**
* Mapping between Trezor wire identifier (uint) and a protobuf message
*/
2013-11-22 16:27:47 +00:00
enum MessageType {
MessageType_Initialize = 0 [(wire_in) = true];
MessageType_Ping = 1 [(wire_in) = true];
MessageType_Success = 2 [(wire_out) = true];
MessageType_Failure = 3 [(wire_out) = true];
MessageType_ChangePin = 4 [(wire_in) = true];
MessageType_WipeDevice = 5 [(wire_in) = true];
MessageType_FirmwareErase = 6 [(wire_in) = true];
MessageType_FirmwareUpload = 7 [(wire_in) = true];
MessageType_GetEntropy = 9 [(wire_in) = true];
MessageType_Entropy = 10 [(wire_out) = true];
MessageType_GetPublicKey = 11 [(wire_in) = true];
MessageType_PublicKey = 12 [(wire_out) = true];
MessageType_LoadDevice = 13 [(wire_in) = true];
MessageType_ResetDevice = 14 [(wire_in) = true];
MessageType_SignTx = 15 [(wire_in) = true];
MessageType_SimpleSignTx = 16 [(wire_in) = true];
MessageType_Features = 17 [(wire_out) = true];
MessageType_PinMatrixRequest = 18 [(wire_out) = true];
MessageType_PinMatrixAck = 19 [(wire_in) = true];
MessageType_Cancel = 20 [(wire_in) = true];
2013-11-22 16:27:47 +00:00
MessageType_TxRequest = 21 [(wire_out) = true];
MessageType_TxAck = 22 [(wire_in) = true];
MessageType_CipherKeyValue = 23 [(wire_in) = true];
2014-11-03 18:43:11 +00:00
MessageType_CipheredKeyValue = 48 [(wire_out) = true];
2014-06-17 11:32:42 +00:00
MessageType_ClearSession = 24 [(wire_in) = true];
2013-11-22 16:27:47 +00:00
MessageType_ApplySettings = 25 [(wire_in) = true];
MessageType_ButtonRequest = 26 [(wire_out) = true];
MessageType_ButtonAck = 27 [(wire_in) = true];
MessageType_GetAddress = 29 [(wire_in) = true];
MessageType_Address = 30 [(wire_out) = true];
MessageType_EntropyRequest = 35 [(wire_out) = true];
MessageType_EntropyAck = 36 [(wire_in) = true];
2013-11-26 03:34:48 +00:00
MessageType_SignMessage = 38 [(wire_in) = true];
MessageType_VerifyMessage = 39 [(wire_in) = true];
MessageType_MessageSignature = 40 [(wire_out) = true];
2014-11-03 18:43:11 +00:00
MessageType_EncryptMessage = 49 [(wire_in) = true];
MessageType_EncryptedMessage = 50 [(wire_out) = true];
MessageType_DecryptMessage = 51 [(wire_in) = true];
MessageType_DecryptedMessage = 52 [(wire_out) = true];
2013-11-26 03:34:48 +00:00
MessageType_PassphraseRequest = 41 [(wire_out) = true];
MessageType_PassphraseAck = 42 [(wire_in) = true];
2014-01-18 04:13:47 +00:00
MessageType_EstimateTxSize = 43 [(wire_in) = true];
MessageType_TxSize = 44 [(wire_out) = true];
MessageType_RecoveryDevice = 45 [(wire_in) = true];
MessageType_WordRequest = 46 [(wire_out) = true];
MessageType_WordAck = 47 [(wire_in) = true];
2013-11-22 16:27:47 +00:00
MessageType_DebugLinkDecision = 100 [(wire_debug_in) = true];
MessageType_DebugLinkGetState = 101 [(wire_debug_in) = true];
MessageType_DebugLinkState = 102 [(wire_debug_out) = true];
MessageType_DebugLinkStop = 103 [(wire_debug_in) = true];
2014-01-09 13:15:53 +00:00
MessageType_DebugLinkLog = 104 [(wire_debug_out) = true];
2013-11-22 16:27:47 +00:00
}
////////////////////
// Basic messages //
////////////////////
2013-11-22 16:27:47 +00:00
/**
* Request: Reset device to default state and ask for device details
* @next Features
*/
2013-11-22 16:27:47 +00:00
message Initialize {
}
/**
* Response: Reports various information about the device
* @prev Initialize
*/
2013-11-22 16:27:47 +00:00
message Features {
optional string vendor = 1; // name of the manufacturer, e.g. "bitcointrezor.com"
optional uint32 major_version = 2; // major version of the device, e.g. 1
optional uint32 minor_version = 3; // minor version of the device, e.g. 0
optional uint32 patch_version = 4; // patch version of the device, e.g. 0
optional bool bootloader_mode = 5; // is device in bootloader mode?
optional string device_id = 6; // device's unique identifier
optional bool pin_protection = 7; // is device protected by PIN?
optional bool passphrase_protection = 8; // is node/mnemonic encrypted using passphrase?
optional string language = 9; // device language
optional string label = 10; // device description label
repeated CoinType coins = 11; // supported coins
optional bool initialized = 12; // does device contain seed?
optional bytes revision = 13; // SCM revision of firmware
optional bytes bootloader_hash = 14; // hash of the bootloader
optional bool imported = 15; // was storage imported from an external source?
}
2014-06-17 11:32:42 +00:00
/**
* Request: clear session (removes cached PIN, passphrase, etc).
* @next Success
*/
message ClearSession {
}
/**
* Request: change language and/or label of the device
* @next Success
* @next Failure
* @next ButtonRequest
* @next PinMatrixRequest
*/
2013-11-22 16:27:47 +00:00
message ApplySettings {
2014-03-01 10:17:06 +00:00
optional string language = 1;
optional string label = 2;
2014-12-13 15:13:46 +00:00
optional bool use_passphrase = 3;
2013-11-22 16:27:47 +00:00
}
/**
* Request: Starts workflow for setting/changing/removing the PIN
* @next ButtonRequest
* @next PinMatrixRequest
*/
2013-11-22 16:27:47 +00:00
message ChangePin {
optional bool remove = 1; // is PIN removal requested?
2013-11-22 16:27:47 +00:00
}
/**
* Request: Test if the device is alive, device sends back the message in Success response
* @next Success
*/
2013-11-22 16:27:47 +00:00
message Ping {
optional string message = 1; // message to send back in Success message
optional bool button_protection = 2; // ask for button press
optional bool pin_protection = 3; // ask for PIN if set in device
optional bool passphrase_protection = 4; // ask for passphrase if set in device
2013-11-22 16:27:47 +00:00
}
/**
* Response: Success of the previous request
*/
2013-11-22 16:27:47 +00:00
message Success {
optional string message = 1; // human readable description of action or request-specific payload
2013-11-22 16:27:47 +00:00
}
/**
* Response: Failure of the previous request
*/
2013-11-22 16:27:47 +00:00
message Failure {
optional FailureType code = 1; // computer-readable definition of the error state
optional string message = 2; // human-readable message of the error state
2013-11-22 16:27:47 +00:00
}
/**
* Response: Device is waiting for HW button press.
* @next ButtonAck
* @next Cancel
*/
2013-11-22 16:27:47 +00:00
message ButtonRequest {
2014-02-04 16:47:29 +00:00
optional ButtonRequestType code = 1;
2014-03-01 10:17:06 +00:00
optional string data = 2;
2013-11-22 16:27:47 +00:00
}
/**
* Request: Computer agrees to wait for HW button press
* @prev ButtonRequest
*/
2013-11-22 16:27:47 +00:00
message ButtonAck {
}
/**
* Response: Device is asking computer to show PIN matrix and awaits PIN encoded using this matrix scheme
* @next PinMatrixAck
* @next Cancel
*/
2013-11-22 16:27:47 +00:00
message PinMatrixRequest {
optional PinMatrixRequestType type = 1;
2013-11-22 16:27:47 +00:00
}
/**
* Request: Computer responds with encoded PIN
* @prev PinMatrixRequest
*/
2013-11-22 16:27:47 +00:00
message PinMatrixAck {
required string pin = 1; // matrix encoded PIN entered by user
2013-11-22 16:27:47 +00:00
}
/**
* Request: Abort last operation that required user interaction
* @prev ButtonRequest
* @prev PinMatrixRequest
* @prev PassphraseRequest
*/
message Cancel {
2013-11-22 16:27:47 +00:00
}
/**
* Response: Device awaits encryption passphrase
* @next PassphraseAck
* @next Cancel
*/
2013-11-26 03:34:48 +00:00
message PassphraseRequest {
}
/**
* Request: Send passphrase back
* @prev PassphraseRequest
*/
2013-11-26 03:34:48 +00:00
message PassphraseAck {
2014-03-01 10:17:06 +00:00
required string passphrase = 1;
2013-11-26 03:34:48 +00:00
}
/**
* Request: Request a sample of random data generated by hardware RNG. May be used for testing.
* @next ButtonRequest
* @next Entropy
* @next Failure
*/
2013-11-22 16:27:47 +00:00
message GetEntropy {
required uint32 size = 1; // size of requested entropy
2013-11-22 16:27:47 +00:00
}
/**
* Response: Reply with random data generated by internal RNG
* @prev GetEntropy
*/
2013-11-22 16:27:47 +00:00
message Entropy {
required bytes entropy = 1; // stream of random generated bytes
2013-11-22 16:27:47 +00:00
}
/**
* Request: Ask device for public key corresponding to address_n path
* @next PassphraseRequest
* @next PublicKey
* @next Failure
*/
2013-11-22 16:27:47 +00:00
message GetPublicKey {
repeated uint32 address_n = 1; // BIP-32 path to derive the key from master node
2013-11-22 16:27:47 +00:00
}
/**
* Response: Contains public key derived from device private seed
* @prev GetPublicKey
*/
2013-11-22 16:27:47 +00:00
message PublicKey {
required HDNodeType node = 1; // BIP32 public node
2014-08-07 19:03:26 +00:00
optional string xpub = 2; // serialized form of public node
2013-11-22 16:27:47 +00:00
}
/**
* Request: Ask device for address corresponding to address_n path
* @next PassphraseRequest
* @next Address
* @next Failure
*/
2013-11-22 16:27:47 +00:00
message GetAddress {
2014-12-10 14:37:58 +00:00
repeated uint32 address_n = 1; // BIP-32 path to derive the key from master node
2014-03-01 10:17:06 +00:00
optional string coin_name = 2 [default='Bitcoin'];
optional bool show_display = 3;
2014-12-10 14:37:58 +00:00
optional MultisigRedeemScriptType multisig = 4; // Filled if we are showing a multisig address
2013-11-22 16:27:47 +00:00
}
/**
* Response: Contains address derived from device private seed
* @prev GetAddress
*/
2013-11-22 16:27:47 +00:00
message Address {
required string address = 1; // Coin address in Base58 encoding
2013-11-22 16:27:47 +00:00
}
/**
* Request: Request device to wipe all sensitive data and settings
* @next ButtonRequest
*/
2013-11-22 16:27:47 +00:00
message WipeDevice {
}
/**
* Request: Load seed and related internal settings from the computer
* @next ButtonRequest
* @next Success
* @next Failure
*/
2013-11-22 16:27:47 +00:00
message LoadDevice {
optional string mnemonic = 1; // seed encoded as BIP-39 mnemonic (12, 18 or 24 words)
optional HDNodeType node = 2; // BIP-32 node
optional string pin = 3; // set PIN protection
optional bool passphrase_protection = 4; // enable master node encryption using passphrase
optional string language = 5 [default='english']; // device language
optional string label = 6; // device label
optional bool skip_checksum = 7; // do not test mnemonic for valid BIP-39 checksum
}
/**
* Request: Ask device to do initialization involving user interaction
* @next EntropyRequest
* @next Failure
*/
2013-11-22 16:27:47 +00:00
message ResetDevice {
optional bool display_random = 1; // display entropy generated by the device before asking for additional entropy
optional uint32 strength = 2 [default=128]; // strength of seed in bits
optional bool passphrase_protection = 3; // enable master node encryption using passphrase
optional bool pin_protection = 4; // enable PIN protection
optional string language = 5 [default='english']; // device language
optional string label = 6; // device label
}
/**
* Response: Ask for additional entropy from host computer
* @prev ResetDevice
* @next EntropyAck
*/
2013-11-22 16:27:47 +00:00
message EntropyRequest {
}
/**
* Request: Provide additional entropy for seed generation function
* @prev EntropyRequest
* @next ButtonRequest
*/
2013-11-22 16:27:47 +00:00
message EntropyAck {
optional bytes entropy = 1; // 256 bits (32 bytes) of random data
2013-11-22 16:27:47 +00:00
}
/**
* Request: Start recovery workflow asking user for specific words of mnemonic
* Used to recovery device safely even on untrusted computer.
* @next WordRequest
*/
message RecoveryDevice {
optional uint32 word_count = 1; // number of words in BIP-39 mnemonic
optional bool passphrase_protection = 2; // enable master node encryption using passphrase
optional bool pin_protection = 3; // enable PIN protection
optional string language = 4 [default='english']; // device language
optional string label = 5; // device label
optional bool enforce_wordlist = 6; // enforce BIP-39 wordlist during the process
}
/**
* Response: Device is waiting for user to enter word of the mnemonic
* Its position is shown only on device's internal display.
* @prev RecoveryDevice
* @prev WordAck
*/
message WordRequest {
}
/**
* Request: Computer replies with word from the mnemonic
* @prev WordRequest
* @next WordRequest
* @next Success
* @next Failure
*/
message WordAck {
required string word = 1; // one word of mnemonic on asked position
}
//////////////////////////////
// Message signing messages //
//////////////////////////////
2013-11-22 16:27:47 +00:00
/**
* Request: Ask device to sign message
* @next MessageSignature
* @next Failure
*/
2013-11-26 03:34:48 +00:00
message SignMessage {
repeated uint32 address_n = 1; // BIP-32 path to derive the key from master node
required bytes message = 2; // message to be signed
optional string coin_name = 3 [default='Bitcoin']; // coin to use for signing
2013-11-26 03:34:48 +00:00
}
/**
* Request: Ask device to verify message
* @next Success
* @next Failure
*/
2013-11-26 03:34:48 +00:00
message VerifyMessage {
optional string address = 1; // address to verify
optional bytes signature = 2; // signature to verify
optional bytes message = 3; // message to verify
2013-11-26 03:34:48 +00:00
}
/**
* Response: Signed message
* @prev SignMessage
*/
2013-11-26 03:34:48 +00:00
message MessageSignature {
optional string address = 1; // address used to sign the message
optional bytes signature = 2; // signature of the message
}
///////////////////////////
// Encryption/decryption //
///////////////////////////
2014-06-12 14:01:31 +00:00
/**
* Request: Ask device to encrypt message
2014-11-03 18:43:11 +00:00
* @next EncryptedMessage
2014-06-12 14:01:31 +00:00
* @next Failure
*/
message EncryptMessage {
optional bytes pubkey = 1; // public key
optional bytes message = 2; // message to encrypt
optional bool display_only = 3; // show just on display? (don't send back via wire)
2014-10-22 15:39:05 +00:00
repeated uint32 address_n = 4; // BIP-32 path to derive the signing key from master node
2014-10-29 23:23:32 +00:00
optional string coin_name = 5 [default='Bitcoin']; // coin to use for signing
2014-06-12 14:01:31 +00:00
}
2014-11-03 18:43:11 +00:00
/**
* Response: Encrypted message
* @prev EncryptMessage
*/
message EncryptedMessage {
optional bytes nonce = 1; // nonce used during encryption
optional bytes message = 2; // encrypted message
optional bytes hmac = 3; // message hmac
}
2014-06-12 14:01:31 +00:00
/**
* Request: Ask device to decrypt message
* @next Success
* @next Failure
*/
message DecryptMessage {
2014-10-22 15:39:05 +00:00
repeated uint32 address_n = 1; // BIP-32 path to derive the decryption key from master node
2014-11-03 18:43:11 +00:00
optional bytes nonce = 2; // nonce used during encryption
optional bytes message = 3; // message to decrypt
optional bytes hmac = 4; // message hmac
}
/**
* Response: Decrypted message
* @prev DecryptedMessage
*/
message DecryptedMessage {
optional bytes message = 1; // decrypted message
optional string address = 2; // address used to sign the message (if used)
2014-06-12 14:01:31 +00:00
}
/**
* Request: Ask device to encrypt or decrypt value of given key
2014-11-03 18:43:11 +00:00
* @next CipheredKeyValue
* @next Failure
*/
message CipherKeyValue {
2014-06-12 14:01:31 +00:00
repeated uint32 address_n = 1; // BIP-32 path to derive the key from master node
optional string key = 2; // key component of key:value
optional bytes value = 3; // value component of key:value
optional bool encrypt = 4; // are we encrypting (True) or decrypting (False)?
optional bool ask_on_encrypt = 5; // should we ask on encrypt operation?
optional bool ask_on_decrypt = 6; // should we ask on decrypt operation?
}
2014-11-03 18:43:11 +00:00
/**
* Response: Return ciphered/deciphered value
* @prev CipherKeyValue
*/
message CipheredKeyValue {
optional bytes value = 1; // ciphered/deciphered value
}
//////////////////////////////////
// Transaction signing messages //
//////////////////////////////////
/**
* Request: Estimated size of the transaction
* This behaves exactly like SignTx, which means that it can ask using TxRequest
* This call is non-blocking (except possible PassphraseRequest to unlock the seed)
* @next TxSize
* @next Failure
*/
2014-01-18 04:13:47 +00:00
message EstimateTxSize {
required uint32 outputs_count = 1; // number of transaction outputs
required uint32 inputs_count = 2; // number of transaction inputs
optional string coin_name = 3 [default='Bitcoin']; // coin to use
2014-01-18 04:13:47 +00:00
}
/**
* Response: Estimated size of the transaction
* @prev EstimateTxSize
*/
2014-01-18 04:13:47 +00:00
message TxSize {
optional uint32 tx_size = 1; // estimated size of transaction in bytes
2014-01-18 04:13:47 +00:00
}
/**
* Request: Ask device to sign transaction
2014-04-09 17:56:47 +00:00
* @next PassphraseRequest
* @next PinMatrixRequest
* @next TxRequest
* @next Failure
*/
2013-11-22 16:27:47 +00:00
message SignTx {
required uint32 outputs_count = 1; // number of transaction outputs
required uint32 inputs_count = 2; // number of transaction inputs
optional string coin_name = 3 [default='Bitcoin']; // coin to use
}
/**
* Request: Simplified transaction signing
* This method doesn't support streaming, so there are hardware limits in number of inputs and outputs.
* In case of success, the result is returned using TxRequest message.
2014-04-09 17:56:47 +00:00
* @next PassphraseRequest
* @next PinMatrixRequest
* @next TxRequest
* @next Failure
*/
2013-11-22 16:27:47 +00:00
message SimpleSignTx {
repeated TxInputType inputs = 1; // transaction inputs
repeated TxOutputType outputs = 2; // transaction outputs
repeated TransactionType transactions = 3; // transactions whose outputs are used to build current inputs
optional string coin_name = 4 [default='Bitcoin']; // coin to use
}
/**
* Response: Device asks for information for signing transaction or returns the last result
* If request_index is set, device awaits TxAck message (with fields filled in according to request_type)
* If signature_index is set, 'signature' contains signed input of signature_index's input
* @prev SignTx
* @prev SimpleSignTx
* @prev TxAck
*/
2013-11-22 16:27:47 +00:00
message TxRequest {
optional RequestType request_type = 1; // what should be filled in TxAck message?
2014-04-10 12:42:50 +00:00
optional TxRequestDetailsType details = 2; // request for tx details
optional TxRequestSerializedType serialized = 3; // serialized data and request for next
}
/**
* Request: Reported transaction data
* @prev TxRequest
* @next TxRequest
*/
message TxAck {
optional TransactionType tx = 1;
}
/////////////////////////
// Bootloader messages //
/////////////////////////
/**
* Request: Ask device to erase its firmware
* @next Success
* @next Failure
*/
2013-11-22 16:27:47 +00:00
message FirmwareErase {
}
/**
* Request: Send firmware in binary form to the device
* @next Success
* @next Failure
*/
2013-11-22 16:27:47 +00:00
message FirmwareUpload {
required bytes payload = 1; // firmware to be loaded into device
2013-11-22 16:27:47 +00:00
}
/////////////////////////////////////////////////////////////
// Debug messages (only available if DebugLink is enabled) //
/////////////////////////////////////////////////////////////
2013-11-22 16:27:47 +00:00
/**
* Request: "Press" the button on the device
* @next Success
*/
2013-11-22 16:27:47 +00:00
message DebugLinkDecision {
required bool yes_no = 1; // true for "Confirm", false for "Cancel"
2013-11-22 16:27:47 +00:00
}
/**
* Request: Computer asks for device state
* @next DebugLinkState
*/
2013-11-22 16:27:47 +00:00
message DebugLinkGetState {
}
/**
* Response: Device current state
* @prev DebugLinkGetState
*/
2013-11-22 16:27:47 +00:00
message DebugLinkState {
optional bytes layout = 1; // raw buffer of display
optional string pin = 2; // current PIN, blank if PIN is not set/enabled
optional string matrix = 3; // current PIN matrix
optional string mnemonic = 4; // current BIP-39 mnemonic
optional HDNodeType node = 5; // current BIP-32 node
optional bool passphrase_protection = 6; // is node/mnemonic encrypted using passphrase?
optional string reset_word = 7; // word on device display during ResetDevice workflow
optional bytes reset_entropy = 8; // current entropy during ResetDevice workflow
optional string recovery_fake_word = 9; // (fake) word on display during RecoveryDevice workflow
optional uint32 recovery_word_pos = 10; // index of mnemonic word the device is expecting during RecoveryDevice workflow
}
/**
* Request: Ask device to restart
*/
2013-11-22 16:27:47 +00:00
message DebugLinkStop {
}
2014-01-09 13:15:53 +00:00
/**
* Response: Device wants host to log event
*/
2014-01-09 13:15:53 +00:00
message DebugLinkLog {
optional uint32 level = 1;
2014-03-01 10:17:06 +00:00
optional string bucket = 2;
optional string text = 3;
2014-01-09 13:15:53 +00:00
}