/* * This file is part of the Trezor project, https://trezor.io/ * * Copyright (C) 2018 Pavol Rusnak * * This library is free software: you can redistribute it and/or modify * it under the terms of the GNU Lesser General Public License as published by * the Free Software Foundation, either version 3 of the License, or * (at your option) any later version. * * This library is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public License * along with this library. If not, see . */ bool get_features(Features *resp) { resp->has_fw_vendor = true; const image_header *hdr = (const image_header *)FLASH_PTR(FLASH_FWHEADER_START); if (SIG_OK == signatures_new_ok(hdr, NULL)) { strlcpy(resp->fw_vendor, "SatoshiLabs", sizeof(resp->fw_vendor)); } else { strlcpy(resp->fw_vendor, "UNSAFE, DO NOT USE!", sizeof(resp->fw_vendor)); } resp->has_vendor = true; strlcpy(resp->vendor, "trezor.io", sizeof(resp->vendor)); resp->major_version = VERSION_MAJOR; resp->minor_version = VERSION_MINOR; resp->patch_version = VERSION_PATCH; resp->has_device_id = true; strlcpy(resp->device_id, config_uuid_str, sizeof(resp->device_id)); resp->has_pin_protection = true; resp->pin_protection = config_hasPin(); resp->has_passphrase_protection = true; config_getPassphraseProtection(&(resp->passphrase_protection)); #ifdef SCM_REVISION int len = sizeof(SCM_REVISION) - 1; resp->has_revision = true; memcpy(resp->revision.bytes, SCM_REVISION, len); resp->revision.size = len; #endif resp->has_bootloader_hash = true; resp->bootloader_hash.size = memory_bootloader_hash(resp->bootloader_hash.bytes); resp->has_language = config_getLanguage(resp->language, sizeof(resp->language)); resp->has_label = config_getLabel(resp->label, sizeof(resp->label)); resp->has_initialized = true; resp->initialized = config_isInitialized(); resp->has_imported = config_getImported(&(resp->imported)); resp->has_unlocked = true; resp->unlocked = session_isUnlocked(); resp->has_needs_backup = true; config_getNeedsBackup(&(resp->needs_backup)); resp->has_unfinished_backup = true; config_getUnfinishedBackup(&(resp->unfinished_backup)); resp->has_no_backup = true; config_getNoBackup(&(resp->no_backup)); resp->has_flags = config_getFlags(&(resp->flags)); resp->has_model = true; strlcpy(resp->model, "1", sizeof(resp->model)); resp->has_safety_checks = true; resp->safety_checks = config_getSafetyCheckLevel(); if (session_isUnlocked()) { resp->has_wipe_code_protection = true; resp->wipe_code_protection = config_hasWipeCode(); resp->has_auto_lock_delay_ms = true; resp->auto_lock_delay_ms = config_getAutoLockDelayMs(); } #if BITCOIN_ONLY resp->capabilities_count = 2; resp->capabilities[0] = Capability_Capability_Bitcoin; resp->capabilities[1] = Capability_Capability_Crypto; #else resp->capabilities_count = 7; resp->capabilities[0] = Capability_Capability_Bitcoin; resp->capabilities[1] = Capability_Capability_Bitcoin_like; resp->capabilities[2] = Capability_Capability_Crypto; resp->capabilities[3] = Capability_Capability_Ethereum; resp->capabilities[4] = Capability_Capability_NEM; resp->capabilities[5] = Capability_Capability_Stellar; resp->capabilities[6] = Capability_Capability_U2F; #endif return resp; } void fsm_msgInitialize(const Initialize *msg) { recovery_abort(); signing_abort(); uint8_t *session_id; if (msg && msg->has_session_id) { session_id = session_startSession(msg->session_id.bytes); } else { session_id = session_startSession(NULL); } RESP_INIT(Features); get_features(resp); resp->has_session_id = true; memcpy(resp->session_id.bytes, session_id, sizeof(resp->session_id.bytes)); resp->session_id.size = sizeof(resp->session_id.bytes); layoutHome(); msg_write(MessageType_MessageType_Features, resp); } void fsm_msgGetFeatures(const GetFeatures *msg) { (void)msg; RESP_INIT(Features); get_features(resp); msg_write(MessageType_MessageType_Features, resp); } void fsm_msgPing(const Ping *msg) { RESP_INIT(Success); if (msg->has_button_protection && msg->button_protection) { layoutDialogSwipe(&bmp_icon_question, _("Cancel"), _("Confirm"), NULL, _("Do you really want to"), _("answer to ping?"), NULL, NULL, NULL, NULL); if (!protectButton(ButtonRequestType_ButtonRequest_ProtectCall, false)) { fsm_sendFailure(FailureType_Failure_ActionCancelled, NULL); layoutHome(); return; } } if (msg->has_message) { resp->has_message = true; memcpy(&(resp->message), &(msg->message), sizeof(resp->message)); } msg_write(MessageType_MessageType_Success, resp); layoutHome(); } void fsm_msgChangePin(const ChangePin *msg) { CHECK_INITIALIZED bool removal = msg->has_remove && msg->remove; if (removal) { if (config_hasPin()) { layoutDialogSwipe(&bmp_icon_question, _("Cancel"), _("Confirm"), NULL, _("Do you really want to"), _("remove current PIN?"), NULL, NULL, NULL, NULL); } else { fsm_sendSuccess(_("PIN removed")); return; } } else { if (config_hasPin()) { layoutDialogSwipe(&bmp_icon_question, _("Cancel"), _("Confirm"), NULL, _("Do you really want to"), _("change current PIN?"), NULL, NULL, NULL, NULL); } else { layoutDialogSwipe(&bmp_icon_question, _("Cancel"), _("Confirm"), NULL, _("Do you really want to"), _("set new PIN?"), NULL, NULL, NULL, NULL); } } if (!protectButton(ButtonRequestType_ButtonRequest_ProtectCall, false)) { fsm_sendFailure(FailureType_Failure_ActionCancelled, NULL); layoutHome(); return; } if (protectChangePin(removal)) { if (removal) { fsm_sendSuccess(_("PIN removed")); } else { fsm_sendSuccess(_("PIN changed")); } } layoutHome(); } void fsm_msgChangeWipeCode(const ChangeWipeCode *msg) { CHECK_INITIALIZED bool removal = msg->has_remove && msg->remove; bool has_wipe_code = config_hasWipeCode(); if (removal) { // Note that if storage is locked, then config_hasWipeCode() returns false. if (has_wipe_code || !session_isUnlocked()) { layoutDialogSwipe(&bmp_icon_question, _("Cancel"), _("Confirm"), NULL, _("Do you really want to"), _("disable wipe code"), _("protection?"), NULL, NULL, NULL); } else { fsm_sendSuccess(_("Wipe code removed")); return; } } else { if (has_wipe_code) { layoutDialogSwipe(&bmp_icon_question, _("Cancel"), _("Confirm"), NULL, _("Do you really want to"), _("change the current"), _("wipe code?"), NULL, NULL, NULL); } else { layoutDialogSwipe(&bmp_icon_question, _("Cancel"), _("Confirm"), NULL, _("Do you really want to"), _("set a new wipe code?"), NULL, NULL, NULL, NULL); } } if (!protectButton(ButtonRequestType_ButtonRequest_ProtectCall, false)) { fsm_sendFailure(FailureType_Failure_ActionCancelled, NULL); layoutHome(); return; } if (protectChangeWipeCode(removal)) { if (removal) { fsm_sendSuccess(_("Wipe code removed")); } else if (has_wipe_code) { fsm_sendSuccess(_("Wipe code changed")); } else { fsm_sendSuccess(_("Wipe code set")); } } layoutHome(); } void fsm_msgWipeDevice(const WipeDevice *msg) { (void)msg; layoutDialogSwipe(&bmp_icon_question, _("Cancel"), _("Confirm"), NULL, _("Do you really want to"), _("wipe the device?"), NULL, _("All data will be lost."), NULL, NULL); if (!protectButton(ButtonRequestType_ButtonRequest_WipeDevice, false)) { fsm_sendFailure(FailureType_Failure_ActionCancelled, NULL); layoutHome(); return; } config_wipe(); // the following does not work on Mac anyway :-/ Linux/Windows are fine, so it // is not needed usbReconnect(); // force re-enumeration because of the serial // number change fsm_sendSuccess(_("Device wiped")); layoutHome(); } void fsm_msgGetEntropy(const GetEntropy *msg) { #if !DEBUG_RNG layoutDialogSwipe(&bmp_icon_question, _("Cancel"), _("Confirm"), NULL, _("Do you really want to"), _("send entropy?"), NULL, NULL, NULL, NULL); if (!protectButton(ButtonRequestType_ButtonRequest_ProtectCall, false)) { fsm_sendFailure(FailureType_Failure_ActionCancelled, NULL); layoutHome(); return; } #endif RESP_INIT(Entropy); uint32_t len = msg->size; if (len > 1024) { len = 1024; } resp->entropy.size = len; random_buffer(resp->entropy.bytes, len); msg_write(MessageType_MessageType_Entropy, resp); layoutHome(); } #if DEBUG_LINK void fsm_msgLoadDevice(const LoadDevice *msg) { CHECK_PIN CHECK_NOT_INITIALIZED layoutDialogSwipe(&bmp_icon_question, _("Cancel"), _("I take the risk"), NULL, _("Loading private seed"), _("is not recommended."), _("Continue only if you"), _("know what you are"), _("doing!"), NULL); if (!protectButton(ButtonRequestType_ButtonRequest_ProtectCall, false)) { fsm_sendFailure(FailureType_Failure_ActionCancelled, NULL); layoutHome(); return; } if (msg->mnemonics_count && !(msg->has_skip_checksum && msg->skip_checksum)) { if (!mnemonic_check(msg->mnemonics[0])) { fsm_sendFailure(FailureType_Failure_DataError, _("Mnemonic with wrong checksum provided")); layoutHome(); return; } } config_loadDevice(msg); fsm_sendSuccess(_("Device loaded")); layoutHome(); } #endif void fsm_msgResetDevice(const ResetDevice *msg) { CHECK_PIN CHECK_NOT_INITIALIZED CHECK_PARAM(!msg->has_strength || msg->strength == 128 || msg->strength == 192 || msg->strength == 256, _("Invalid seed strength")); reset_init(msg->has_display_random && msg->display_random, msg->has_strength ? msg->strength : 128, msg->has_passphrase_protection && msg->passphrase_protection, msg->has_pin_protection && msg->pin_protection, msg->has_language ? msg->language : 0, msg->has_label ? msg->label : 0, msg->has_u2f_counter ? msg->u2f_counter : 0, msg->has_skip_backup ? msg->skip_backup : false, msg->has_no_backup ? msg->no_backup : false); } void fsm_msgEntropyAck(const EntropyAck *msg) { reset_entropy(msg->entropy.bytes, msg->entropy.size); } void fsm_msgBackupDevice(const BackupDevice *msg) { (void)msg; CHECK_INITIALIZED CHECK_PIN_UNCACHED char mnemonic[MAX_MNEMONIC_LEN + 1]; if (config_getMnemonic(mnemonic, sizeof(mnemonic))) { reset_backup(true, mnemonic); } memzero(mnemonic, sizeof(mnemonic)); } void fsm_msgCancel(const Cancel *msg) { (void)msg; recovery_abort(); signing_abort(); #if !BITCOIN_ONLY ethereum_signing_abort(); #endif fsm_sendFailure(FailureType_Failure_ActionCancelled, NULL); } void fsm_msgLockDevice(const LockDevice *msg) { (void)msg; config_lockDevice(); layoutScreensaver(); fsm_sendSuccess(_("Session cleared")); } void fsm_msgEndSession(const EndSession *msg) { (void)msg; session_endCurrentSession(); fsm_sendSuccess(_("Session ended")); } void fsm_msgApplySettings(const ApplySettings *msg) { CHECK_PARAM( !msg->has_passphrase_always_on_device, _("This firmware is incapable of passphrase entry on the device.")); CHECK_PARAM(msg->has_label || msg->has_language || msg->has_use_passphrase || msg->has_homescreen || msg->has_auto_lock_delay_ms || msg->has_safety_checks, _("No setting provided")); CHECK_PIN if (msg->has_label) { layoutDialogSwipe(&bmp_icon_question, _("Cancel"), _("Confirm"), NULL, _("Do you really want to"), _("change name to"), msg->label, "?", NULL, NULL); if (!protectButton(ButtonRequestType_ButtonRequest_ProtectCall, false)) { fsm_sendFailure(FailureType_Failure_ActionCancelled, NULL); layoutHome(); return; } } if (msg->has_language) { layoutDialogSwipe(&bmp_icon_question, _("Cancel"), _("Confirm"), NULL, _("Do you really want to"), _("change language to"), msg->language, "?", NULL, NULL); if (!protectButton(ButtonRequestType_ButtonRequest_ProtectCall, false)) { fsm_sendFailure(FailureType_Failure_ActionCancelled, NULL); layoutHome(); return; } } if (msg->has_use_passphrase) { layoutDialogSwipe( &bmp_icon_question, _("Cancel"), _("Confirm"), NULL, _("Do you really want to"), msg->use_passphrase ? _("enable passphrase") : _("disable passphrase"), _("protection?"), NULL, NULL, NULL); if (!protectButton(ButtonRequestType_ButtonRequest_ProtectCall, false)) { fsm_sendFailure(FailureType_Failure_ActionCancelled, NULL); layoutHome(); return; } } if (msg->has_homescreen) { layoutDialogSwipe(&bmp_icon_question, _("Cancel"), _("Confirm"), NULL, _("Do you really want to"), _("change the home"), _("screen?"), NULL, NULL, NULL); if (!protectButton(ButtonRequestType_ButtonRequest_ProtectCall, false)) { fsm_sendFailure(FailureType_Failure_ActionCancelled, NULL); layoutHome(); return; } } if (msg->has_auto_lock_delay_ms) { if (msg->auto_lock_delay_ms < MIN_AUTOLOCK_DELAY_MS) { fsm_sendFailure(FailureType_Failure_ProcessError, _("Auto-lock delay too short")); layoutHome(); return; } if (msg->auto_lock_delay_ms > MAX_AUTOLOCK_DELAY_MS) { fsm_sendFailure(FailureType_Failure_ProcessError, _("Auto-lock delay too long")); layoutHome(); return; } layoutConfirmAutoLockDelay(msg->auto_lock_delay_ms); if (!protectButton(ButtonRequestType_ButtonRequest_ProtectCall, false)) { fsm_sendFailure(FailureType_Failure_ActionCancelled, NULL); layoutHome(); return; } } if (msg->has_safety_checks) { if (msg->safety_checks == SafetyCheckLevel_Strict || msg->safety_checks == SafetyCheckLevel_PromptTemporarily) { layoutConfirmSafetyChecks(msg->safety_checks); if (!protectButton(ButtonRequestType_ButtonRequest_ProtectCall, false)) { fsm_sendFailure(FailureType_Failure_ActionCancelled, NULL); layoutHome(); return; } } else { fsm_sendFailure(FailureType_Failure_ProcessError, _("Unsupported safety-checks setting")); layoutHome(); return; } } if (msg->has_label) { config_setLabel(msg->label); } if (msg->has_language) { config_setLanguage(msg->language); } if (msg->has_use_passphrase) { config_setPassphraseProtection(msg->use_passphrase); } if (msg->has_homescreen) { config_setHomescreen(msg->homescreen.bytes, msg->homescreen.size); } if (msg->has_auto_lock_delay_ms) { config_setAutoLockDelayMs(msg->auto_lock_delay_ms); } if (msg->has_safety_checks) { config_setSafetyCheckLevel(msg->safety_checks); } fsm_sendSuccess(_("Settings applied")); layoutHome(); } void fsm_msgApplyFlags(const ApplyFlags *msg) { CHECK_PIN config_applyFlags(msg->flags); fsm_sendSuccess(_("Flags applied")); } void fsm_msgRecoveryDevice(const RecoveryDevice *msg) { CHECK_PIN_UNCACHED const bool dry_run = msg->has_dry_run ? msg->dry_run : false; if (!dry_run) { CHECK_NOT_INITIALIZED } else { CHECK_INITIALIZED CHECK_PARAM(!msg->has_passphrase_protection && !msg->has_pin_protection && !msg->has_language && !msg->has_label && !msg->has_u2f_counter, _("Forbidden field set in dry-run")) } CHECK_PARAM(!msg->has_word_count || msg->word_count == 12 || msg->word_count == 18 || msg->word_count == 24, _("Invalid word count")); recovery_init(msg->has_word_count ? msg->word_count : 12, msg->has_passphrase_protection && msg->passphrase_protection, msg->has_pin_protection && msg->pin_protection, msg->has_language ? msg->language : 0, msg->has_label ? msg->label : 0, msg->has_enforce_wordlist && msg->enforce_wordlist, msg->has_type ? msg->type : 0, msg->has_u2f_counter ? msg->u2f_counter : 0, dry_run); } void fsm_msgWordAck(const WordAck *msg) { recovery_word(msg->word); } void fsm_msgSetU2FCounter(const SetU2FCounter *msg) { layoutDialogSwipe(&bmp_icon_question, _("Cancel"), _("Confirm"), NULL, _("Do you want to set"), _("the U2F counter?"), NULL, NULL, NULL, NULL); if (!protectButton(ButtonRequestType_ButtonRequest_ProtectCall, false)) { fsm_sendFailure(FailureType_Failure_ActionCancelled, NULL); layoutHome(); return; } config_setU2FCounter(msg->u2f_counter); fsm_sendSuccess(_("U2F counter set")); layoutHome(); } void fsm_msgGetNextU2FCounter() { layoutDialogSwipe(&bmp_icon_question, _("Cancel"), _("Confirm"), NULL, _("Do you want to"), _("increase and retrieve"), _("the U2F counter?"), NULL, NULL, NULL); if (!protectButton(ButtonRequestType_ButtonRequest_ProtectCall, false)) { fsm_sendFailure(FailureType_Failure_ActionCancelled, NULL); layoutHome(); return; } uint32_t counter = config_nextU2FCounter(); RESP_INIT(NextU2FCounter); resp->u2f_counter = counter; msg_write(MessageType_MessageType_NextU2FCounter, resp); layoutHome(); } static void progress_callback(uint32_t iter, uint32_t total) { layoutProgress(_("Please wait"), 1000 * iter / total); } void fsm_msgGetFirmwareHash(const GetFirmwareHash *msg) { RESP_INIT(FirmwareHash); layoutProgressSwipe(_("Please wait"), 0); if (memory_firmware_hash(msg->challenge.bytes, msg->challenge.size, progress_callback, resp->hash.bytes) != 0) { fsm_sendFailure(FailureType_Failure_FirmwareError, NULL); return; } resp->hash.size = sizeof(resp->hash.bytes); msg_write(MessageType_MessageType_FirmwareHash, resp); layoutHome(); }