mirror of
https://github.com/trezor/trezor-firmware.git
synced 2024-11-24 08:28:12 +00:00
ead61d1e90
[no changelog]
261 lines
7.7 KiB
C
261 lines
7.7 KiB
C
/*
|
|
* This file is part of the Trezor project, https://trezor.io/
|
|
*
|
|
* Copyright (c) SatoshiLabs
|
|
*
|
|
* This program is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include <arpa/inet.h>
|
|
#include <assert.h>
|
|
#include <fcntl.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <sys/poll.h>
|
|
#include <sys/socket.h>
|
|
#include <time.h>
|
|
#include <unistd.h>
|
|
|
|
#include "profile.h"
|
|
#include "usb.h"
|
|
|
|
#include "memzero.h"
|
|
|
|
void __attribute__((noreturn))
|
|
__fatal_error(const char *expr, const char *msg, const char *file, int line,
|
|
const char *func);
|
|
|
|
#define ensure(expr, msg) \
|
|
(((expr) == sectrue) \
|
|
? (void)0 \
|
|
: __fatal_error(#expr, msg, __FILE__, __LINE__, __func__))
|
|
|
|
// emulator opens UDP server and emulates HID/WebUSB interfaces
|
|
// gracefully ignores all other USB interfaces
|
|
|
|
#define USBD_MAX_NUM_INTERFACES 8
|
|
|
|
static struct {
|
|
usb_iface_type_t type;
|
|
uint16_t port;
|
|
int sock;
|
|
struct sockaddr_in si_me, si_other;
|
|
socklen_t slen;
|
|
} usb_ifaces[USBD_MAX_NUM_INTERFACES];
|
|
|
|
void usb_init(const usb_dev_info_t *dev_info) {
|
|
(void)dev_info;
|
|
for (int i = 0; i < USBD_MAX_NUM_INTERFACES; i++) {
|
|
usb_ifaces[i].type = USB_IFACE_TYPE_DISABLED;
|
|
usb_ifaces[i].port = 0;
|
|
usb_ifaces[i].sock = -1;
|
|
memzero(&usb_ifaces[i].si_me, sizeof(struct sockaddr_in));
|
|
memzero(&usb_ifaces[i].si_other, sizeof(struct sockaddr_in));
|
|
usb_ifaces[i].slen = 0;
|
|
}
|
|
}
|
|
|
|
void usb_deinit(void) {}
|
|
|
|
void usb_start(void) {
|
|
const char *ip = getenv("TREZOR_UDP_IP");
|
|
|
|
// iterate interfaces
|
|
for (int i = 0; i < USBD_MAX_NUM_INTERFACES; i++) {
|
|
// skip if not HID or WebUSB interface
|
|
if (usb_ifaces[i].type != USB_IFACE_TYPE_HID &&
|
|
usb_ifaces[i].type != USB_IFACE_TYPE_WEBUSB) {
|
|
continue;
|
|
}
|
|
|
|
usb_ifaces[i].sock = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
|
|
ensure(sectrue * (usb_ifaces[i].sock >= 0), NULL);
|
|
|
|
fcntl(usb_ifaces[i].sock, F_SETFL, O_NONBLOCK);
|
|
|
|
usb_ifaces[i].si_me.sin_family = AF_INET;
|
|
if (ip) {
|
|
usb_ifaces[i].si_me.sin_addr.s_addr = inet_addr(ip);
|
|
} else {
|
|
usb_ifaces[i].si_me.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
|
|
}
|
|
usb_ifaces[i].si_me.sin_port = htons(usb_ifaces[i].port);
|
|
|
|
ensure(sectrue * (0 == bind(usb_ifaces[i].sock,
|
|
(struct sockaddr *)&usb_ifaces[i].si_me,
|
|
sizeof(struct sockaddr_in))),
|
|
NULL);
|
|
}
|
|
}
|
|
|
|
void usb_stop(void) {}
|
|
|
|
secbool usb_hid_add(const usb_hid_info_t *info) {
|
|
if (info->iface_num < USBD_MAX_NUM_INTERFACES &&
|
|
usb_ifaces[info->iface_num].type == USB_IFACE_TYPE_DISABLED) {
|
|
usb_ifaces[info->iface_num].type = USB_IFACE_TYPE_HID;
|
|
usb_ifaces[info->iface_num].port = info->emu_port;
|
|
}
|
|
return sectrue;
|
|
}
|
|
|
|
secbool usb_webusb_add(const usb_webusb_info_t *info) {
|
|
if (info->iface_num < USBD_MAX_NUM_INTERFACES &&
|
|
usb_ifaces[info->iface_num].type == USB_IFACE_TYPE_DISABLED) {
|
|
usb_ifaces[info->iface_num].type = USB_IFACE_TYPE_WEBUSB;
|
|
usb_ifaces[info->iface_num].port = info->emu_port;
|
|
}
|
|
return sectrue;
|
|
}
|
|
|
|
secbool usb_vcp_add(const usb_vcp_info_t *info) {
|
|
if (info->iface_num < USBD_MAX_NUM_INTERFACES &&
|
|
usb_ifaces[info->iface_num].type == USB_IFACE_TYPE_DISABLED) {
|
|
usb_ifaces[info->iface_num].type = USB_IFACE_TYPE_VCP;
|
|
usb_ifaces[info->iface_num].port = info->emu_port;
|
|
}
|
|
return sectrue;
|
|
}
|
|
|
|
static secbool usb_emulated_poll(uint8_t iface_num, short dir) {
|
|
struct pollfd fds[] = {
|
|
{usb_ifaces[iface_num].sock, dir, 0},
|
|
};
|
|
int r = poll(fds, 1, 0);
|
|
return sectrue * (r > 0);
|
|
}
|
|
|
|
static int usb_emulated_read(uint8_t iface_num, uint8_t *buf, uint32_t len) {
|
|
struct sockaddr_in si;
|
|
socklen_t sl = sizeof(si);
|
|
ssize_t r = recvfrom(usb_ifaces[iface_num].sock, buf, len, MSG_DONTWAIT,
|
|
(struct sockaddr *)&si, &sl);
|
|
if (r < 0) {
|
|
return r;
|
|
}
|
|
usb_ifaces[iface_num].si_other = si;
|
|
usb_ifaces[iface_num].slen = sl;
|
|
static const char *ping_req = "PINGPING";
|
|
static const char *ping_resp = "PONGPONG";
|
|
if (r == strlen(ping_req) && 0 == memcmp(ping_req, buf, strlen(ping_req))) {
|
|
if (usb_ifaces[iface_num].slen > 0) {
|
|
sendto(usb_ifaces[iface_num].sock, ping_resp, strlen(ping_resp),
|
|
MSG_DONTWAIT,
|
|
(const struct sockaddr *)&usb_ifaces[iface_num].si_other,
|
|
usb_ifaces[iface_num].slen);
|
|
}
|
|
return 0;
|
|
}
|
|
return r;
|
|
}
|
|
|
|
static int usb_emulated_write(uint8_t iface_num, const uint8_t *buf,
|
|
uint32_t len) {
|
|
ssize_t r = len;
|
|
if (usb_ifaces[iface_num].slen > 0) {
|
|
r = sendto(usb_ifaces[iface_num].sock, buf, len, MSG_DONTWAIT,
|
|
(const struct sockaddr *)&usb_ifaces[iface_num].si_other,
|
|
usb_ifaces[iface_num].slen);
|
|
}
|
|
return r;
|
|
}
|
|
|
|
secbool usb_hid_can_read(uint8_t iface_num) {
|
|
if (iface_num >= USBD_MAX_NUM_INTERFACES ||
|
|
usb_ifaces[iface_num].type != USB_IFACE_TYPE_HID) {
|
|
return secfalse;
|
|
}
|
|
return usb_emulated_poll(iface_num, POLLIN);
|
|
}
|
|
|
|
secbool usb_webusb_can_read(uint8_t iface_num) {
|
|
if (iface_num >= USBD_MAX_NUM_INTERFACES ||
|
|
usb_ifaces[iface_num].type != USB_IFACE_TYPE_WEBUSB) {
|
|
return secfalse;
|
|
}
|
|
return usb_emulated_poll(iface_num, POLLIN);
|
|
}
|
|
|
|
secbool usb_hid_can_write(uint8_t iface_num) {
|
|
if (iface_num >= USBD_MAX_NUM_INTERFACES ||
|
|
usb_ifaces[iface_num].type != USB_IFACE_TYPE_HID) {
|
|
return secfalse;
|
|
}
|
|
return usb_emulated_poll(iface_num, POLLOUT);
|
|
}
|
|
|
|
secbool usb_webusb_can_write(uint8_t iface_num) {
|
|
if (iface_num >= USBD_MAX_NUM_INTERFACES ||
|
|
usb_ifaces[iface_num].type != USB_IFACE_TYPE_WEBUSB) {
|
|
return secfalse;
|
|
}
|
|
return usb_emulated_poll(iface_num, POLLOUT);
|
|
}
|
|
|
|
int usb_hid_read(uint8_t iface_num, uint8_t *buf, uint32_t len) {
|
|
if (iface_num >= USBD_MAX_NUM_INTERFACES ||
|
|
usb_ifaces[iface_num].type != USB_IFACE_TYPE_HID) {
|
|
return 0;
|
|
}
|
|
return usb_emulated_read(iface_num, buf, len);
|
|
}
|
|
|
|
int usb_webusb_read(uint8_t iface_num, uint8_t *buf, uint32_t len) {
|
|
if (iface_num >= USBD_MAX_NUM_INTERFACES ||
|
|
usb_ifaces[iface_num].type != USB_IFACE_TYPE_WEBUSB) {
|
|
return 0;
|
|
}
|
|
return usb_emulated_read(iface_num, buf, len);
|
|
}
|
|
|
|
int usb_hid_write(uint8_t iface_num, const uint8_t *buf, uint32_t len) {
|
|
if (iface_num >= USBD_MAX_NUM_INTERFACES ||
|
|
usb_ifaces[iface_num].type != USB_IFACE_TYPE_HID) {
|
|
return 0;
|
|
}
|
|
return usb_emulated_write(iface_num, buf, len);
|
|
}
|
|
|
|
int usb_hid_write_blocking(uint8_t iface_num, const uint8_t *buf, uint32_t len,
|
|
int timeout) {
|
|
const uint32_t start = clock();
|
|
while (sectrue != usb_hid_can_write(iface_num)) {
|
|
if (timeout >= 0 &&
|
|
(1000 * (clock() - start)) / CLOCKS_PER_SEC >= timeout) {
|
|
return 0; // Timeout
|
|
}
|
|
}
|
|
return usb_hid_write(iface_num, buf, len);
|
|
}
|
|
|
|
int usb_webusb_write(uint8_t iface_num, const uint8_t *buf, uint32_t len) {
|
|
if (iface_num >= USBD_MAX_NUM_INTERFACES ||
|
|
usb_ifaces[iface_num].type != USB_IFACE_TYPE_WEBUSB) {
|
|
return 0;
|
|
}
|
|
return usb_emulated_write(iface_num, buf, len);
|
|
}
|
|
|
|
void pendsv_kbd_intr(void) {}
|
|
|
|
void mp_hal_set_vcp_iface(int iface_num) {}
|
|
|
|
secbool usb_configured(void) {
|
|
if (access(profile_usb_disconnect_path(), F_OK) == 0) {
|
|
return secfalse;
|
|
}
|
|
|
|
return sectrue;
|
|
}
|