mirror of
https://github.com/trezor/trezor-firmware.git
synced 2024-11-22 07:28:10 +00:00
0f1cac9695
[no changelog]
205 lines
5.1 KiB
C
205 lines
5.1 KiB
C
/*
|
|
* This file is part of the Trezor project, https://trezor.io/
|
|
*
|
|
* Copyright (C) 2014 Pavol Rusnak <stick@satoshilabs.com>
|
|
*
|
|
* This library is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU Lesser General Public License as published by
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This library is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public License
|
|
* along with this library. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include "trezor.h"
|
|
#include "bitmaps.h"
|
|
#include "bl_check.h"
|
|
#include "buttons.h"
|
|
#include "common.h"
|
|
#include "compiler_traits.h"
|
|
#include "config.h"
|
|
#include "gettext.h"
|
|
#include "layout.h"
|
|
#include "layout2.h"
|
|
#include "memzero.h"
|
|
#include "oled.h"
|
|
#include "rng.h"
|
|
#include "setup.h"
|
|
#include "timer.h"
|
|
#include "usb.h"
|
|
#include "util.h"
|
|
#if !EMULATOR
|
|
#include <libopencm3/stm32/desig.h>
|
|
#include "otp.h"
|
|
#endif
|
|
#ifdef USE_SECP256K1_ZKP
|
|
#include "zkp_context.h"
|
|
#endif
|
|
|
|
#ifdef USE_SECP256K1_ZKP
|
|
void secp256k1_default_illegal_callback_fn(const char *str, void *data) {
|
|
(void)data;
|
|
__fatal_error(str, __FILE__, __LINE__);
|
|
return;
|
|
}
|
|
|
|
void secp256k1_default_error_callback_fn(const char *str, void *data) {
|
|
(void)data;
|
|
__fatal_error(str, __FILE__, __LINE__);
|
|
return;
|
|
}
|
|
#endif
|
|
|
|
/* Screen timeout */
|
|
uint32_t system_millis_lock_start = 0;
|
|
|
|
/* Busyscreen timeout */
|
|
uint32_t system_millis_busy_deadline = 0;
|
|
|
|
void check_lock_screen(void) {
|
|
buttonUpdate();
|
|
|
|
// wake from screensaver on any button
|
|
if (layoutLast == layoutScreensaver && (button.NoUp || button.YesUp)) {
|
|
layoutHome();
|
|
return;
|
|
}
|
|
|
|
// button held for long enough (5 seconds)
|
|
if ((layoutLast == layoutHomescreen || layoutLast == layoutBusyscreen) &&
|
|
button.NoDown >= 114000 * 5) {
|
|
layoutDialog(&bmp_icon_question, _("Cancel"), _("Lock Device"), NULL,
|
|
_("Do you really want to"), _("lock your Trezor?"), NULL, NULL,
|
|
NULL, NULL);
|
|
|
|
// wait until NoButton is released
|
|
usbTiny(1);
|
|
do {
|
|
waitAndProcessUSBRequests(5);
|
|
buttonUpdate();
|
|
} while (!button.NoUp);
|
|
|
|
// wait for confirmation/cancellation of the dialog
|
|
do {
|
|
waitAndProcessUSBRequests(5);
|
|
buttonUpdate();
|
|
} while (!button.YesUp && !button.NoUp);
|
|
usbTiny(0);
|
|
|
|
if (button.YesUp) {
|
|
// lock the screen
|
|
config_lockDevice();
|
|
layoutScreensaver();
|
|
} else {
|
|
// resume homescreen
|
|
layoutHome();
|
|
}
|
|
}
|
|
|
|
// if homescreen is shown for too long
|
|
if (layoutLast == layoutHomescreen) {
|
|
if ((timer_ms() - system_millis_lock_start) >=
|
|
config_getAutoLockDelayMs()) {
|
|
// lock the screen
|
|
config_lockDevice();
|
|
layoutScreensaver();
|
|
}
|
|
}
|
|
}
|
|
|
|
void check_busy_screen(void) {
|
|
// Clear the busy screen once it expires.
|
|
if (system_millis_busy_deadline != 0 &&
|
|
system_millis_busy_deadline < timer_ms()) {
|
|
system_millis_busy_deadline = 0;
|
|
layoutHome();
|
|
}
|
|
}
|
|
|
|
static void collect_hw_entropy(bool privileged) {
|
|
#if EMULATOR
|
|
(void)privileged;
|
|
memzero(HW_ENTROPY_DATA, HW_ENTROPY_LEN);
|
|
#else
|
|
if (privileged) {
|
|
desig_get_unique_id((uint32_t *)HW_ENTROPY_DATA);
|
|
// set entropy in the OTP randomness block
|
|
if (!flash_otp_is_locked(FLASH_OTP_BLOCK_RANDOMNESS)) {
|
|
uint8_t entropy[FLASH_OTP_BLOCK_SIZE] = {0};
|
|
random_buffer(entropy, FLASH_OTP_BLOCK_SIZE);
|
|
flash_otp_write(FLASH_OTP_BLOCK_RANDOMNESS, 0, entropy,
|
|
FLASH_OTP_BLOCK_SIZE);
|
|
flash_otp_lock(FLASH_OTP_BLOCK_RANDOMNESS);
|
|
}
|
|
// collect entropy from OTP randomness block
|
|
flash_otp_read(FLASH_OTP_BLOCK_RANDOMNESS, 0, HW_ENTROPY_DATA + 12,
|
|
FLASH_OTP_BLOCK_SIZE);
|
|
} else {
|
|
// unprivileged mode => use fixed HW_ENTROPY
|
|
memset(HW_ENTROPY_DATA, 0x3C, HW_ENTROPY_LEN);
|
|
}
|
|
#endif
|
|
}
|
|
|
|
int main(void) {
|
|
#ifndef APPVER
|
|
setup();
|
|
__stack_chk_guard = random32(); // this supports compiler provided
|
|
// unpredictable stack protection checks
|
|
oledInit();
|
|
#else
|
|
check_and_replace_bootloader(true);
|
|
setupApp();
|
|
__stack_chk_guard = random32(); // this supports compiler provided
|
|
// unpredictable stack protection checks
|
|
#endif
|
|
|
|
drbg_init();
|
|
|
|
if (!is_mode_unprivileged()) {
|
|
collect_hw_entropy(true);
|
|
timer_init();
|
|
#ifdef APPVER
|
|
// enable MPU (Memory Protection Unit)
|
|
mpu_config_firmware();
|
|
#endif
|
|
} else {
|
|
collect_hw_entropy(false);
|
|
}
|
|
|
|
#ifdef USE_SECP256K1_ZKP
|
|
ensure(sectrue * (zkp_context_init() == 0), NULL);
|
|
#endif
|
|
|
|
#if DEBUG_LINK
|
|
#if !EMULATOR
|
|
config_wipe();
|
|
#endif
|
|
#endif
|
|
|
|
oledDrawBitmap(40, 0, &bmp_logo64_half);
|
|
oledDrawBitmapFlip(40 + 24, 0, &bmp_logo64_half);
|
|
oledRefresh();
|
|
|
|
config_init();
|
|
layoutHome();
|
|
usbInit();
|
|
for (;;) {
|
|
#if EMULATOR
|
|
waitAndProcessUSBRequests(10);
|
|
#else
|
|
usbPoll();
|
|
#endif
|
|
check_lock_screen();
|
|
check_busy_screen();
|
|
}
|
|
|
|
return 0;
|
|
}
|