2014-04-29 12:26:51 +00:00
|
|
|
/*
|
|
|
|
* This file is part of the TREZOR project.
|
|
|
|
*
|
|
|
|
* Copyright (C) 2014 Pavol Rusnak <stick@satoshilabs.com>
|
|
|
|
*
|
|
|
|
* This library is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Lesser General Public License as published by
|
|
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Lesser General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Lesser General Public License
|
|
|
|
* along with this library. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <string.h>
|
|
|
|
#include <stdint.h>
|
|
|
|
|
2014-06-18 22:12:31 +00:00
|
|
|
#include <libopencm3/stm32/flash.h>
|
2014-04-29 12:26:51 +00:00
|
|
|
|
|
|
|
#include "messages.pb.h"
|
|
|
|
#include "storage.pb.h"
|
|
|
|
|
|
|
|
#include "trezor.h"
|
2014-06-07 12:21:59 +00:00
|
|
|
#include "sha2.h"
|
2014-04-29 12:26:51 +00:00
|
|
|
#include "aes.h"
|
2014-06-07 12:21:59 +00:00
|
|
|
#include "pbkdf2.h"
|
2014-04-29 12:26:51 +00:00
|
|
|
#include "bip32.h"
|
|
|
|
#include "bip39.h"
|
2016-04-22 15:49:00 +00:00
|
|
|
#include "curves.h"
|
2014-04-29 12:26:51 +00:00
|
|
|
#include "util.h"
|
|
|
|
#include "memory.h"
|
|
|
|
#include "rng.h"
|
|
|
|
#include "storage.h"
|
|
|
|
#include "debug.h"
|
|
|
|
#include "protect.h"
|
|
|
|
#include "layout2.h"
|
|
|
|
|
2015-09-06 18:14:23 +00:00
|
|
|
_Static_assert(sizeof(Storage) <= FLASH_STORAGE_LEN, "Storage struct is too large for TREZOR flash");
|
2014-04-29 12:26:51 +00:00
|
|
|
Storage storage;
|
|
|
|
|
|
|
|
uint8_t storage_uuid[12];
|
|
|
|
char storage_uuid_str[25];
|
|
|
|
|
2016-04-19 16:23:12 +00:00
|
|
|
static bool sessionSeedCached;
|
|
|
|
static uint8_t sessionSeed[64];
|
2014-04-29 12:26:51 +00:00
|
|
|
|
|
|
|
static bool sessionPinCached;
|
|
|
|
|
|
|
|
static bool sessionPassphraseCached;
|
|
|
|
static char sessionPassphrase[51];
|
|
|
|
|
|
|
|
/*
|
|
|
|
storage layout:
|
|
|
|
|
|
|
|
offset | type/length | description
|
|
|
|
--------+-------------+-------------------------------
|
|
|
|
0x0000 | 4 bytes | magic = 'stor'
|
|
|
|
0x0004 | 12 bytes | uuid
|
|
|
|
0x0010 | ? | Storage structure
|
|
|
|
*/
|
|
|
|
|
2015-04-01 17:43:36 +00:00
|
|
|
#define STORAGE_VERSION 5
|
2014-04-29 12:26:51 +00:00
|
|
|
|
|
|
|
void storage_from_flash(uint32_t version)
|
|
|
|
{
|
|
|
|
switch (version) {
|
2015-03-18 12:34:09 +00:00
|
|
|
case 1: // copy (since 1.0.0)
|
2014-07-30 18:34:28 +00:00
|
|
|
memcpy(&storage, (void *)(FLASH_STORAGE_START + 4 + sizeof(storage_uuid)), sizeof(Storage));
|
|
|
|
break;
|
2015-03-18 12:34:09 +00:00
|
|
|
case 2: // copy (since 1.2.1)
|
2014-04-29 12:26:51 +00:00
|
|
|
memcpy(&storage, (void *)(FLASH_STORAGE_START + 4 + sizeof(storage_uuid)), sizeof(Storage));
|
|
|
|
break;
|
2015-03-18 12:34:09 +00:00
|
|
|
case 3: // copy (since 1.3.1)
|
|
|
|
memcpy(&storage, (void *)(FLASH_STORAGE_START + 4 + sizeof(storage_uuid)), sizeof(Storage));
|
|
|
|
break;
|
|
|
|
case 4: // copy (since 1.3.2)
|
2015-02-16 12:48:24 +00:00
|
|
|
memcpy(&storage, (void *)(FLASH_STORAGE_START + 4 + sizeof(storage_uuid)), sizeof(Storage));
|
2015-04-01 17:43:36 +00:00
|
|
|
break;
|
|
|
|
case 5: // copy (since 1.3.3)
|
|
|
|
memcpy(&storage, (void *)(FLASH_STORAGE_START + 4 + sizeof(storage_uuid)), sizeof(Storage));
|
2015-02-16 12:48:24 +00:00
|
|
|
break;
|
2014-04-29 12:26:51 +00:00
|
|
|
}
|
|
|
|
storage.version = STORAGE_VERSION;
|
|
|
|
}
|
|
|
|
|
|
|
|
void storage_init(void)
|
|
|
|
{
|
|
|
|
storage_reset();
|
|
|
|
// if magic is ok
|
|
|
|
if (memcmp((void *)FLASH_STORAGE_START, "stor", 4) == 0) {
|
|
|
|
// load uuid
|
|
|
|
memcpy(storage_uuid, (void *)(FLASH_STORAGE_START + 4), sizeof(storage_uuid));
|
|
|
|
data2hex(storage_uuid, sizeof(storage_uuid), storage_uuid_str);
|
|
|
|
// load storage struct
|
|
|
|
uint32_t version = ((Storage *)(FLASH_STORAGE_START + 4 + sizeof(storage_uuid)))->version;
|
|
|
|
if (version && version <= STORAGE_VERSION) {
|
|
|
|
storage_from_flash(version);
|
|
|
|
}
|
|
|
|
if (version != STORAGE_VERSION) {
|
|
|
|
storage_commit();
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
storage_reset_uuid();
|
|
|
|
storage_commit();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void storage_reset_uuid(void)
|
|
|
|
{
|
|
|
|
// set random uuid
|
|
|
|
random_buffer(storage_uuid, sizeof(storage_uuid));
|
|
|
|
data2hex(storage_uuid, sizeof(storage_uuid), storage_uuid_str);
|
|
|
|
}
|
|
|
|
|
|
|
|
void storage_reset(void)
|
|
|
|
{
|
|
|
|
// reset storage struct
|
|
|
|
memset(&storage, 0, sizeof(storage));
|
|
|
|
storage.version = STORAGE_VERSION;
|
2015-03-31 14:31:29 +00:00
|
|
|
session_clear(true); // clear PIN as well
|
2014-06-17 14:03:07 +00:00
|
|
|
}
|
|
|
|
|
2015-03-31 14:31:29 +00:00
|
|
|
void session_clear(bool clear_pin)
|
2014-06-17 14:03:07 +00:00
|
|
|
{
|
2016-04-19 16:23:12 +00:00
|
|
|
sessionSeedCached = false;
|
|
|
|
memset(&sessionSeed, 0, sizeof(sessionSeed));
|
|
|
|
sessionPassphraseCached = false;
|
|
|
|
memset(&sessionPassphrase, 0, sizeof(sessionPassphrase));
|
2015-03-31 14:31:29 +00:00
|
|
|
if (clear_pin) {
|
|
|
|
sessionPinCached = false;
|
|
|
|
}
|
2014-04-29 12:26:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static uint8_t meta_backup[FLASH_META_LEN];
|
|
|
|
|
|
|
|
void storage_commit(void)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
uint32_t *w;
|
|
|
|
// backup meta
|
|
|
|
memcpy(meta_backup, (void *)FLASH_META_START, FLASH_META_LEN);
|
2015-01-26 20:10:51 +00:00
|
|
|
flash_clear_status_flags();
|
2014-04-29 12:26:51 +00:00
|
|
|
flash_unlock();
|
|
|
|
// erase storage
|
|
|
|
for (i = FLASH_META_SECTOR_FIRST; i <= FLASH_META_SECTOR_LAST; i++) {
|
|
|
|
flash_erase_sector(i, FLASH_CR_PROGRAM_X32);
|
|
|
|
}
|
|
|
|
// modify storage
|
|
|
|
memcpy(meta_backup + FLASH_META_DESC_LEN, "stor", 4);
|
|
|
|
memcpy(meta_backup + FLASH_META_DESC_LEN + 4, storage_uuid, sizeof(storage_uuid));
|
|
|
|
memcpy(meta_backup + FLASH_META_DESC_LEN + 4 + sizeof(storage_uuid), &storage, sizeof(Storage));
|
|
|
|
// copy it back
|
|
|
|
for (i = 0; i < FLASH_META_LEN / 4; i++) {
|
|
|
|
w = (uint32_t *)(meta_backup + i * 4);
|
|
|
|
flash_program_word(FLASH_META_START + i * 4, *w);
|
|
|
|
}
|
|
|
|
flash_lock();
|
2015-01-26 20:10:51 +00:00
|
|
|
// flash operation failed
|
|
|
|
if (FLASH_SR & (FLASH_SR_PGAERR | FLASH_SR_PGPERR | FLASH_SR_PGSERR | FLASH_SR_WRPERR)) {
|
|
|
|
layoutDialog(DIALOG_ICON_ERROR, NULL, NULL, NULL, "Storage failure", "detected.", NULL, "Please unplug", "the device.", NULL);
|
|
|
|
for (;;) { }
|
|
|
|
}
|
2014-04-29 12:26:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void storage_loadDevice(LoadDevice *msg)
|
|
|
|
{
|
|
|
|
storage_reset();
|
|
|
|
|
2014-05-25 22:58:17 +00:00
|
|
|
storage.has_imported = true;
|
|
|
|
storage.imported = true;
|
|
|
|
|
2014-04-29 12:26:51 +00:00
|
|
|
if (msg->has_pin > 0) {
|
|
|
|
storage_setPin(msg->pin);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (msg->has_passphrase_protection) {
|
|
|
|
storage.has_passphrase_protection = true;
|
|
|
|
storage.passphrase_protection = msg->passphrase_protection;
|
|
|
|
} else {
|
|
|
|
storage.has_passphrase_protection = false;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (msg->has_node) {
|
|
|
|
storage.has_node = true;
|
|
|
|
storage.has_mnemonic = false;
|
|
|
|
memcpy(&storage.node, &(msg->node), sizeof(HDNodeType));
|
2016-04-19 16:23:12 +00:00
|
|
|
sessionSeedCached = false;
|
|
|
|
memset(&sessionSeed, 0, sizeof(sessionSeed));
|
2014-04-29 12:26:51 +00:00
|
|
|
} else if (msg->has_mnemonic) {
|
|
|
|
storage.has_mnemonic = true;
|
|
|
|
storage.has_node = false;
|
|
|
|
strlcpy(storage.mnemonic, msg->mnemonic, sizeof(storage.mnemonic));
|
2016-04-19 16:23:12 +00:00
|
|
|
sessionSeedCached = false;
|
|
|
|
memset(&sessionSeed, 0, sizeof(sessionSeed));
|
2014-04-29 12:26:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if (msg->has_language) {
|
|
|
|
storage_setLanguage(msg->language);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (msg->has_label) {
|
|
|
|
storage_setLabel(msg->label);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void storage_setLabel(const char *label)
|
|
|
|
{
|
|
|
|
if (!label) return;
|
|
|
|
storage.has_label = true;
|
|
|
|
strlcpy(storage.label, label, sizeof(storage.label));
|
|
|
|
}
|
|
|
|
|
|
|
|
void storage_setLanguage(const char *lang)
|
|
|
|
{
|
|
|
|
if (!lang) return;
|
|
|
|
// sanity check
|
|
|
|
if (strcmp(lang, "english") == 0) {
|
|
|
|
storage.has_language = true;
|
|
|
|
strlcpy(storage.language, lang, sizeof(storage.language));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-12-13 18:29:27 +00:00
|
|
|
void storage_setPassphraseProtection(bool passphrase_protection)
|
|
|
|
{
|
2016-04-19 16:23:12 +00:00
|
|
|
sessionSeedCached = false;
|
2014-12-13 18:29:27 +00:00
|
|
|
sessionPassphraseCached = false;
|
|
|
|
|
|
|
|
storage.has_passphrase_protection = true;
|
|
|
|
storage.passphrase_protection = passphrase_protection;
|
|
|
|
}
|
|
|
|
|
2015-02-04 20:27:07 +00:00
|
|
|
void storage_setHomescreen(const uint8_t *data, uint32_t size)
|
|
|
|
{
|
|
|
|
if (data && size == 1024) {
|
|
|
|
storage.has_homescreen = true;
|
|
|
|
memcpy(storage.homescreen.bytes, data, size);
|
|
|
|
storage.homescreen.size = size;
|
|
|
|
} else {
|
|
|
|
storage.has_homescreen = false;
|
|
|
|
memset(storage.homescreen.bytes, 0, sizeof(storage.homescreen.bytes));
|
|
|
|
storage.homescreen.size = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-04-29 12:26:51 +00:00
|
|
|
void get_root_node_callback(uint32_t iter, uint32_t total)
|
|
|
|
{
|
2014-12-21 17:58:56 +00:00
|
|
|
layoutProgress("Waking up", 1000 * iter / total);
|
2014-04-29 12:26:51 +00:00
|
|
|
}
|
|
|
|
|
2016-04-19 16:23:12 +00:00
|
|
|
const uint8_t *storage_getSeed(void)
|
2014-04-29 12:26:51 +00:00
|
|
|
{
|
|
|
|
// root node is properly cached
|
2016-04-19 16:23:12 +00:00
|
|
|
if (sessionSeedCached) {
|
|
|
|
return sessionSeed;
|
|
|
|
}
|
|
|
|
|
|
|
|
// if storage has mnemonic, convert it to node and use it
|
|
|
|
if (storage.has_mnemonic) {
|
|
|
|
if (!protectPassphrase()) {
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
mnemonic_to_seed(storage.mnemonic, sessionPassphrase, sessionSeed, get_root_node_callback); // BIP-0039
|
|
|
|
sessionSeedCached = true;
|
|
|
|
return sessionSeed;
|
2014-04-29 12:26:51 +00:00
|
|
|
}
|
|
|
|
|
2016-04-19 16:23:12 +00:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool storage_getRootNode(HDNode *node, const char *curve)
|
|
|
|
{
|
2014-04-29 12:26:51 +00:00
|
|
|
// if storage has node, decrypt and use it
|
2016-04-20 13:39:15 +00:00
|
|
|
if (storage.has_node && strcmp(curve, SECP256K1_NAME) == 0) {
|
2014-04-29 12:26:51 +00:00
|
|
|
if (!protectPassphrase()) {
|
|
|
|
return false;
|
|
|
|
}
|
2016-04-19 16:23:12 +00:00
|
|
|
if (hdnode_from_xprv(storage.node.depth, storage.node.fingerprint, storage.node.child_num, storage.node.chain_code.bytes, storage.node.private_key.bytes, curve, node) == 0) {
|
2014-12-16 17:28:46 +00:00
|
|
|
return false;
|
|
|
|
}
|
2015-12-14 21:53:14 +00:00
|
|
|
if (storage.has_passphrase_protection && storage.passphrase_protection && sessionPassphraseCached && strlen(sessionPassphrase) > 0) {
|
2014-04-29 12:26:51 +00:00
|
|
|
// decrypt hd node
|
2014-06-07 12:21:59 +00:00
|
|
|
uint8_t secret[64];
|
2015-05-05 19:01:34 +00:00
|
|
|
uint8_t salt[12];
|
|
|
|
memcpy(salt, "TREZORHD", 8);
|
|
|
|
pbkdf2_hmac_sha512((const uint8_t *)sessionPassphrase, strlen(sessionPassphrase), salt, 8, BIP39_PBKDF2_ROUNDS, secret, 64, get_root_node_callback);
|
2014-06-07 12:21:59 +00:00
|
|
|
aes_decrypt_ctx ctx;
|
|
|
|
aes_decrypt_key256(secret, &ctx);
|
2016-04-19 16:23:12 +00:00
|
|
|
aes_cbc_decrypt(node->chain_code, node->chain_code, 32, secret + 32, &ctx);
|
|
|
|
aes_cbc_decrypt(node->private_key, node->private_key, 32, secret + 32, &ctx);
|
2014-04-29 12:26:51 +00:00
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2016-04-19 16:23:12 +00:00
|
|
|
const uint8_t *seed = storage_getSeed();
|
|
|
|
if (seed == NULL) {
|
|
|
|
return false;
|
2014-04-29 12:26:51 +00:00
|
|
|
}
|
2016-04-19 16:23:12 +00:00
|
|
|
|
|
|
|
return hdnode_from_seed(seed, 64, curve, node);
|
2014-04-29 12:26:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
const char *storage_getLabel(void)
|
|
|
|
{
|
|
|
|
return storage.has_label ? storage.label : 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
const char *storage_getLanguage(void)
|
|
|
|
{
|
|
|
|
return storage.has_language ? storage.language : 0;
|
|
|
|
}
|
|
|
|
|
2015-02-04 20:27:07 +00:00
|
|
|
const uint8_t *storage_getHomescreen(void)
|
|
|
|
{
|
|
|
|
return (storage.has_homescreen && storage.homescreen.size == 1024) ? storage.homescreen.bytes : 0;
|
|
|
|
}
|
|
|
|
|
2015-02-22 14:19:13 +00:00
|
|
|
/* Check whether pin matches storage. The pin must be a null-terminated
|
|
|
|
* string with at most 9 characters.
|
|
|
|
*/
|
2014-04-29 12:26:51 +00:00
|
|
|
bool storage_isPinCorrect(const char *pin)
|
|
|
|
{
|
2015-02-22 14:19:13 +00:00
|
|
|
/* The execution time of the following code only depends on the
|
|
|
|
* (public) input. This avoids timing attacks.
|
|
|
|
*/
|
|
|
|
char diff = 0;
|
|
|
|
uint32_t i = 0;
|
|
|
|
while (pin[i]) {
|
|
|
|
diff |= storage.pin[i] - pin[i];
|
|
|
|
i++;
|
|
|
|
}
|
|
|
|
diff |= storage.pin[i];
|
|
|
|
return diff == 0;
|
2014-04-29 12:26:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
bool storage_hasPin(void)
|
|
|
|
{
|
2015-02-22 14:19:13 +00:00
|
|
|
return storage.has_pin && storage.pin[0] != 0;
|
2014-04-29 12:26:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void storage_setPin(const char *pin)
|
|
|
|
{
|
|
|
|
if (pin && strlen(pin) > 0) {
|
|
|
|
storage.has_pin = true;
|
|
|
|
strlcpy(storage.pin, pin, sizeof(storage.pin));
|
|
|
|
} else {
|
|
|
|
storage.has_pin = false;
|
|
|
|
storage.pin[0] = 0;
|
|
|
|
}
|
|
|
|
storage_commit();
|
|
|
|
sessionPinCached = false;
|
|
|
|
}
|
|
|
|
|
|
|
|
void session_cachePassphrase(const char *passphrase)
|
|
|
|
{
|
|
|
|
strlcpy(sessionPassphrase, passphrase, sizeof(sessionPassphrase));
|
|
|
|
sessionPassphraseCached = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool session_isPassphraseCached(void)
|
|
|
|
{
|
|
|
|
return sessionPassphraseCached;
|
|
|
|
}
|
|
|
|
|
2015-02-22 14:19:13 +00:00
|
|
|
void session_cachePin(void)
|
2014-04-29 12:26:51 +00:00
|
|
|
{
|
|
|
|
sessionPinCached = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool session_isPinCached(void)
|
|
|
|
{
|
2015-02-22 14:19:13 +00:00
|
|
|
return sessionPinCached;
|
2014-04-29 12:26:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void storage_resetPinFails(void)
|
|
|
|
{
|
|
|
|
storage.has_pin_failed_attempts = true;
|
|
|
|
storage.pin_failed_attempts = 0;
|
|
|
|
storage_commit();
|
|
|
|
}
|
|
|
|
|
|
|
|
void storage_increasePinFails(void)
|
|
|
|
{
|
|
|
|
if (!storage.has_pin_failed_attempts) {
|
|
|
|
storage.has_pin_failed_attempts = true;
|
|
|
|
storage.pin_failed_attempts = 1;
|
|
|
|
} else {
|
|
|
|
storage.pin_failed_attempts++;
|
|
|
|
}
|
|
|
|
storage_commit();
|
|
|
|
}
|
|
|
|
|
|
|
|
uint32_t storage_getPinFails(void)
|
|
|
|
{
|
2015-01-26 21:03:33 +00:00
|
|
|
storage_from_flash(STORAGE_VERSION); // reload from flash
|
2014-04-29 12:26:51 +00:00
|
|
|
return storage.has_pin_failed_attempts ? storage.pin_failed_attempts : 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool storage_isInitialized(void)
|
|
|
|
{
|
|
|
|
return storage.has_node || storage.has_mnemonic;
|
|
|
|
}
|