/* * This file is part of the Trezor project, https://trezor.io/ * * Copyright (C) 2014 Pavol Rusnak * * This library is free software: you can redistribute it and/or modify * it under the terms of the GNU Lesser General Public License as published by * the Free Software Foundation, either version 3 of the License, or * (at your option) any later version. * * This library is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public License * along with this library. If not, see . */ #include #include "debug.h" #include "fsm.h" #include "gettext.h" #include "memzero.h" #include "messages.h" #include "trezor.h" #include "util.h" #include "messages.pb.h" #include "pb_decode.h" #include "pb_encode.h" struct MessagesMap_t { char type; // n = normal, d = debug char dir; // i = in, o = out uint16_t msg_id; const pb_msgdesc_t *fields; void (*process_func)(const void *ptr); }; static const struct MessagesMap_t MessagesMap[] = { #include "messages_map.h" // end {0, 0, 0, 0, 0}}; #include "messages_map_limits.h" const pb_msgdesc_t *MessageFields(char type, char dir, uint16_t msg_id) { const struct MessagesMap_t *m = MessagesMap; while (m->type) { if (type == m->type && dir == m->dir && msg_id == m->msg_id) { return m->fields; } m++; } return 0; } void MessageProcessFunc(char type, char dir, uint16_t msg_id, void *ptr) { const struct MessagesMap_t *m = MessagesMap; while (m->type) { if (type == m->type && dir == m->dir && msg_id == m->msg_id) { m->process_func(ptr); return; } m++; } } // Buffer for outgoing USB packets. static uint32_t msg_out_start = 0; static uint32_t msg_out_end = 0; static uint32_t msg_out_cur = 0; static uint8_t msg_out[MSG_OUT_BUFFER_SIZE]; _Static_assert(MSG_OUT_BUFFER_SIZE % USB_PACKET_SIZE == 0, "MSG_OUT_BUFFER_SIZE"); #if DEBUG_LINK static uint32_t msg_debug_out_start = 0; static uint32_t msg_debug_out_end = 0; static uint32_t msg_debug_out_cur = 0; static uint8_t msg_debug_out[MSG_DEBUG_OUT_BUFFER_SIZE]; _Static_assert(MSG_DEBUG_OUT_BUFFER_SIZE % USB_PACKET_SIZE == 0, "MSG_DEBUG_OUT_BUFFER_SIZE"); #endif static inline void msg_out_append(uint8_t c) { if (msg_out_cur == 0) { msg_out[msg_out_end * USB_PACKET_SIZE] = '?'; msg_out_cur = 1; } msg_out[msg_out_end * USB_PACKET_SIZE + msg_out_cur] = c; msg_out_cur++; if (msg_out_cur == USB_PACKET_SIZE) { msg_out_cur = 0; msg_out_end = (msg_out_end + 1) % (MSG_OUT_BUFFER_SIZE / USB_PACKET_SIZE); } } #if DEBUG_LINK static inline void msg_debug_out_append(uint8_t c) { if (msg_debug_out_cur == 0) { msg_debug_out[msg_debug_out_end * USB_PACKET_SIZE] = '?'; msg_debug_out_cur = 1; } msg_debug_out[msg_debug_out_end * USB_PACKET_SIZE + msg_debug_out_cur] = c; msg_debug_out_cur++; if (msg_debug_out_cur == USB_PACKET_SIZE) { msg_debug_out_cur = 0; msg_debug_out_end = (msg_debug_out_end + 1) % (MSG_DEBUG_OUT_BUFFER_SIZE / USB_PACKET_SIZE); } } #endif static inline void msg_out_pad(void) { if (msg_out_cur == 0) return; while (msg_out_cur < USB_PACKET_SIZE) { msg_out[msg_out_end * USB_PACKET_SIZE + msg_out_cur] = 0; msg_out_cur++; } msg_out_cur = 0; msg_out_end = (msg_out_end + 1) % (MSG_OUT_BUFFER_SIZE / USB_PACKET_SIZE); } #if DEBUG_LINK static inline void msg_debug_out_pad(void) { if (msg_debug_out_cur == 0) return; while (msg_debug_out_cur < USB_PACKET_SIZE) { msg_debug_out[msg_debug_out_end * USB_PACKET_SIZE + msg_debug_out_cur] = 0; msg_debug_out_cur++; } msg_debug_out_cur = 0; msg_debug_out_end = (msg_debug_out_end + 1) % (MSG_DEBUG_OUT_BUFFER_SIZE / USB_PACKET_SIZE); } #endif static bool pb_callback_out(pb_ostream_t *stream, const uint8_t *buf, size_t count) { (void)stream; for (size_t i = 0; i < count; i++) { msg_out_append(buf[i]); } return true; } #if DEBUG_LINK static bool pb_debug_callback_out(pb_ostream_t *stream, const uint8_t *buf, size_t count) { (void)stream; for (size_t i = 0; i < count; i++) { msg_debug_out_append(buf[i]); } return true; } #endif bool msg_write_common(char type, uint16_t msg_id, const void *msg_ptr) { const pb_msgdesc_t *fields = MessageFields(type, 'o', msg_id); if (!fields) { // unknown message return false; } size_t len = 0; if (!pb_get_encoded_size(&len, fields, msg_ptr)) { return false; } void (*append)(uint8_t) = NULL; bool (*pb_callback)(pb_ostream_t *, const uint8_t *, size_t); if (type == 'n') { append = msg_out_append; pb_callback = pb_callback_out; } else #if DEBUG_LINK if (type == 'd') { append = msg_debug_out_append; pb_callback = pb_debug_callback_out; } else #endif { return false; } append('#'); append('#'); append((msg_id >> 8) & 0xFF); append(msg_id & 0xFF); append((len >> 24) & 0xFF); append((len >> 16) & 0xFF); append((len >> 8) & 0xFF); append(len & 0xFF); pb_ostream_t stream = {pb_callback, 0, SIZE_MAX, 0, 0}; bool status = pb_encode(&stream, fields, msg_ptr); if (type == 'n') { msg_out_pad(); } #if DEBUG_LINK else if (type == 'd') { msg_debug_out_pad(); } #endif return status; } enum { READSTATE_IDLE, READSTATE_READING, }; void msg_process(char type, uint16_t msg_id, const pb_msgdesc_t *fields, uint8_t *msg_encoded, uint32_t msg_encoded_size) { static uint8_t msg_decoded[MSG_IN_DECODED_SIZE]; memzero(msg_decoded, sizeof(msg_decoded)); pb_istream_t stream = pb_istream_from_buffer(msg_encoded, msg_encoded_size); bool status = pb_decode(&stream, fields, msg_decoded); if (status) { MessageProcessFunc(type, 'i', msg_id, msg_decoded); } else { fsm_sendFailure(FailureType_Failure_DataError, stream.errmsg); } } void msg_read_common(char type, const uint8_t *buf, uint32_t len) { static char read_state = READSTATE_IDLE; static uint8_t msg_encoded[MSG_IN_ENCODED_SIZE]; static uint16_t msg_id = 0xFFFF; static uint32_t msg_encoded_size = 0; static uint32_t msg_pos = 0; static const pb_msgdesc_t *fields = 0; if (len != USB_PACKET_SIZE) return; if (read_state == READSTATE_IDLE) { if (buf[0] != '?' || buf[1] != '#' || buf[2] != '#') { // invalid start - discard return; } msg_id = (buf[3] << 8) + buf[4]; msg_encoded_size = ((uint32_t)buf[5] << 24) + (buf[6] << 16) + (buf[7] << 8) + buf[8]; fields = MessageFields(type, 'i', msg_id); if (!fields) { // unknown message fsm_sendFailure(FailureType_Failure_UnexpectedMessage, _("Unknown message")); return; } if (msg_encoded_size > MSG_IN_ENCODED_SIZE) { // message is too big :( fsm_sendFailure(FailureType_Failure_DataError, _("Message too big")); return; } read_state = READSTATE_READING; memcpy(msg_encoded, buf + MSG_HEADER_SIZE, len - MSG_HEADER_SIZE); msg_pos = len - MSG_HEADER_SIZE; } else if (read_state == READSTATE_READING) { if (buf[0] != '?') { // invalid contents read_state = READSTATE_IDLE; return; } /* raw data starts at buf + 1 with len - 1 bytes */ buf++; len = MIN(len - 1, MSG_IN_ENCODED_SIZE - msg_pos); memcpy(msg_encoded + msg_pos, buf, len); msg_pos += len; } if (msg_pos >= msg_encoded_size) { msg_process(type, msg_id, fields, msg_encoded, msg_encoded_size); msg_pos = 0; read_state = READSTATE_IDLE; } } const uint8_t *msg_out_data(void) { if (msg_out_start == msg_out_end) return 0; uint8_t *data = msg_out + (msg_out_start * USB_PACKET_SIZE); msg_out_start = (msg_out_start + 1) % (MSG_OUT_BUFFER_SIZE / USB_PACKET_SIZE); debugLog(0, "", "msg_out_data"); return data; } #if DEBUG_LINK const uint8_t *msg_debug_out_data(void) { if (msg_debug_out_start == msg_debug_out_end) return 0; uint8_t *data = msg_debug_out + (msg_debug_out_start * USB_PACKET_SIZE); msg_debug_out_start = (msg_debug_out_start + 1) % (MSG_DEBUG_OUT_BUFFER_SIZE / USB_PACKET_SIZE); debugLog(0, "", "msg_debug_out_data"); return data; } #endif // msg_tiny needs to be large enough to hold the C struct decoded from a single // 64 byte USB packet. The decoded struct can be larger than the encoded // protobuf message. However, 128 bytes should be more than enough. CONFIDENTIAL uint8_t msg_tiny[128]; _Static_assert(sizeof(msg_tiny) >= sizeof(Cancel), "msg_tiny too tiny"); _Static_assert(USB_PACKET_SIZE >= MSG_HEADER_SIZE + Cancel_size, "msg_tiny too tiny"); _Static_assert(sizeof(msg_tiny) >= sizeof(Initialize), "msg_tiny too tiny"); _Static_assert(USB_PACKET_SIZE >= MSG_HEADER_SIZE + Initialize_size, "msg_tiny too tiny"); _Static_assert(sizeof(msg_tiny) >= sizeof(PassphraseAck), "msg_tiny too tiny"); _Static_assert(USB_PACKET_SIZE >= MSG_HEADER_SIZE + PassphraseAck_size, "msg_tiny too tiny"); _Static_assert(sizeof(msg_tiny) >= sizeof(ButtonAck), "msg_tiny too tiny"); _Static_assert(USB_PACKET_SIZE >= MSG_HEADER_SIZE + ButtonAck_size, "msg_tiny too tiny"); _Static_assert(sizeof(msg_tiny) >= sizeof(PinMatrixAck), "msg_tiny too tiny"); _Static_assert(USB_PACKET_SIZE >= MSG_HEADER_SIZE + PinMatrixAck_size, "msg_tiny too tiny"); #if DEBUG_LINK _Static_assert(sizeof(msg_tiny) >= sizeof(DebugLinkDecision), "msg_tiny too tiny"); _Static_assert(USB_PACKET_SIZE >= MSG_HEADER_SIZE + DebugLinkDecision_size, "msg_tiny too tiny"); _Static_assert(sizeof(msg_tiny) >= sizeof(DebugLinkGetState), "msg_tiny too tiny"); _Static_assert(USB_PACKET_SIZE >= MSG_HEADER_SIZE + DebugLinkGetState_size, "msg_tiny too tiny"); #endif uint16_t msg_tiny_id = 0xFFFF; void msg_read_tiny(const uint8_t *buf, int len) { if (len != USB_PACKET_SIZE || buf[0] != '?' || buf[1] != '#' || buf[2] != '#') { // Ignore unexpected packets. This is helpful when two applications are // attempting to communicate with Trezor at the same time. return; } const pb_msgdesc_t *fields = NULL; uint16_t msg_id = (buf[3] << 8) + buf[4]; switch (msg_id) { case MessageType_MessageType_PinMatrixAck: fields = PinMatrixAck_fields; break; case MessageType_MessageType_ButtonAck: fields = ButtonAck_fields; break; case MessageType_MessageType_PassphraseAck: fields = PassphraseAck_fields; break; case MessageType_MessageType_Cancel: fields = Cancel_fields; break; case MessageType_MessageType_Initialize: fields = Initialize_fields; break; #if DEBUG_LINK case MessageType_MessageType_DebugLinkDecision: fields = DebugLinkDecision_fields; break; case MessageType_MessageType_DebugLinkGetState: fields = DebugLinkGetState_fields; break; #endif default: // Ignore unexpected messages. return; } uint32_t msg_size = ((uint32_t)buf[5] << 24) + (buf[6] << 16) + (buf[7] << 8) + buf[8]; if (msg_size > sizeof(msg_tiny) / 2 || msg_size > (uint32_t)len - MSG_HEADER_SIZE) { // There is a risk that the struct decoded from the message won't fit into // msg_tiny or the encoded message does not fit into the buffer. The first // is a fail-safe in case of a forgotten _Static_assert above. fsm_sendFailure(FailureType_Failure_DataError, _("Message too big")); msg_tiny_id = 0xFFFF; return; } pb_istream_t stream = pb_istream_from_buffer(buf + MSG_HEADER_SIZE, msg_size); bool status = pb_decode(&stream, fields, msg_tiny); if (status) { msg_tiny_id = msg_id; } else { fsm_sendFailure(FailureType_Failure_DataError, stream.errmsg); msg_tiny_id = 0xFFFF; } }