mirror of
https://github.com/trezor/trezor-firmware.git
synced 2024-12-21 05:48:23 +00:00
a36439a57f
Distinguish between the maximum size of a protobuf-encoded message and the maximum size of a C struct containing a decoded message.
402 lines
12 KiB
C
402 lines
12 KiB
C
/*
|
|
* This file is part of the Trezor project, https://trezor.io/
|
|
*
|
|
* Copyright (C) 2014 Pavol Rusnak <stick@satoshilabs.com>
|
|
*
|
|
* This library is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU Lesser General Public License as published by
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This library is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public License
|
|
* along with this library. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include <string.h>
|
|
|
|
#include "debug.h"
|
|
#include "fsm.h"
|
|
#include "gettext.h"
|
|
#include "memzero.h"
|
|
#include "messages.h"
|
|
#include "trezor.h"
|
|
#include "util.h"
|
|
|
|
#include "messages.pb.h"
|
|
#include "pb_decode.h"
|
|
#include "pb_encode.h"
|
|
|
|
struct MessagesMap_t {
|
|
char type; // n = normal, d = debug
|
|
char dir; // i = in, o = out
|
|
uint16_t msg_id;
|
|
const pb_msgdesc_t *fields;
|
|
void (*process_func)(const void *ptr);
|
|
};
|
|
|
|
static const struct MessagesMap_t MessagesMap[] = {
|
|
#include "messages_map.h"
|
|
// end
|
|
{0, 0, 0, 0, 0}};
|
|
|
|
#include "messages_map_limits.h"
|
|
|
|
const pb_msgdesc_t *MessageFields(char type, char dir, uint16_t msg_id) {
|
|
const struct MessagesMap_t *m = MessagesMap;
|
|
while (m->type) {
|
|
if (type == m->type && dir == m->dir && msg_id == m->msg_id) {
|
|
return m->fields;
|
|
}
|
|
m++;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
void MessageProcessFunc(char type, char dir, uint16_t msg_id, void *ptr) {
|
|
const struct MessagesMap_t *m = MessagesMap;
|
|
while (m->type) {
|
|
if (type == m->type && dir == m->dir && msg_id == m->msg_id) {
|
|
m->process_func(ptr);
|
|
return;
|
|
}
|
|
m++;
|
|
}
|
|
}
|
|
|
|
// Buffer for outgoing USB packets.
|
|
static uint32_t msg_out_start = 0;
|
|
static uint32_t msg_out_end = 0;
|
|
static uint32_t msg_out_cur = 0;
|
|
static uint8_t msg_out[MSG_OUT_BUFFER_SIZE];
|
|
_Static_assert(MSG_OUT_BUFFER_SIZE % USB_PACKET_SIZE == 0,
|
|
"MSG_OUT_BUFFER_SIZE");
|
|
|
|
#if DEBUG_LINK
|
|
|
|
static uint32_t msg_debug_out_start = 0;
|
|
static uint32_t msg_debug_out_end = 0;
|
|
static uint32_t msg_debug_out_cur = 0;
|
|
static uint8_t msg_debug_out[MSG_DEBUG_OUT_BUFFER_SIZE];
|
|
_Static_assert(MSG_DEBUG_OUT_BUFFER_SIZE % USB_PACKET_SIZE == 0,
|
|
"MSG_DEBUG_OUT_BUFFER_SIZE");
|
|
|
|
#endif
|
|
|
|
static inline void msg_out_append(uint8_t c) {
|
|
if (msg_out_cur == 0) {
|
|
msg_out[msg_out_end * USB_PACKET_SIZE] = '?';
|
|
msg_out_cur = 1;
|
|
}
|
|
msg_out[msg_out_end * USB_PACKET_SIZE + msg_out_cur] = c;
|
|
msg_out_cur++;
|
|
if (msg_out_cur == USB_PACKET_SIZE) {
|
|
msg_out_cur = 0;
|
|
msg_out_end = (msg_out_end + 1) % (MSG_OUT_BUFFER_SIZE / USB_PACKET_SIZE);
|
|
}
|
|
}
|
|
|
|
#if DEBUG_LINK
|
|
|
|
static inline void msg_debug_out_append(uint8_t c) {
|
|
if (msg_debug_out_cur == 0) {
|
|
msg_debug_out[msg_debug_out_end * USB_PACKET_SIZE] = '?';
|
|
msg_debug_out_cur = 1;
|
|
}
|
|
msg_debug_out[msg_debug_out_end * USB_PACKET_SIZE + msg_debug_out_cur] = c;
|
|
msg_debug_out_cur++;
|
|
if (msg_debug_out_cur == USB_PACKET_SIZE) {
|
|
msg_debug_out_cur = 0;
|
|
msg_debug_out_end =
|
|
(msg_debug_out_end + 1) % (MSG_DEBUG_OUT_BUFFER_SIZE / USB_PACKET_SIZE);
|
|
}
|
|
}
|
|
|
|
#endif
|
|
|
|
static inline void msg_out_pad(void) {
|
|
if (msg_out_cur == 0) return;
|
|
while (msg_out_cur < USB_PACKET_SIZE) {
|
|
msg_out[msg_out_end * USB_PACKET_SIZE + msg_out_cur] = 0;
|
|
msg_out_cur++;
|
|
}
|
|
msg_out_cur = 0;
|
|
msg_out_end = (msg_out_end + 1) % (MSG_OUT_BUFFER_SIZE / USB_PACKET_SIZE);
|
|
}
|
|
|
|
#if DEBUG_LINK
|
|
|
|
static inline void msg_debug_out_pad(void) {
|
|
if (msg_debug_out_cur == 0) return;
|
|
while (msg_debug_out_cur < USB_PACKET_SIZE) {
|
|
msg_debug_out[msg_debug_out_end * USB_PACKET_SIZE + msg_debug_out_cur] = 0;
|
|
msg_debug_out_cur++;
|
|
}
|
|
msg_debug_out_cur = 0;
|
|
msg_debug_out_end =
|
|
(msg_debug_out_end + 1) % (MSG_DEBUG_OUT_BUFFER_SIZE / USB_PACKET_SIZE);
|
|
}
|
|
|
|
#endif
|
|
|
|
static bool pb_callback_out(pb_ostream_t *stream, const uint8_t *buf,
|
|
size_t count) {
|
|
(void)stream;
|
|
for (size_t i = 0; i < count; i++) {
|
|
msg_out_append(buf[i]);
|
|
}
|
|
return true;
|
|
}
|
|
|
|
#if DEBUG_LINK
|
|
|
|
static bool pb_debug_callback_out(pb_ostream_t *stream, const uint8_t *buf,
|
|
size_t count) {
|
|
(void)stream;
|
|
for (size_t i = 0; i < count; i++) {
|
|
msg_debug_out_append(buf[i]);
|
|
}
|
|
return true;
|
|
}
|
|
|
|
#endif
|
|
|
|
bool msg_write_common(char type, uint16_t msg_id, const void *msg_ptr) {
|
|
const pb_msgdesc_t *fields = MessageFields(type, 'o', msg_id);
|
|
if (!fields) { // unknown message
|
|
return false;
|
|
}
|
|
|
|
size_t len = 0;
|
|
if (!pb_get_encoded_size(&len, fields, msg_ptr)) {
|
|
return false;
|
|
}
|
|
|
|
void (*append)(uint8_t) = NULL;
|
|
bool (*pb_callback)(pb_ostream_t *, const uint8_t *, size_t);
|
|
|
|
if (type == 'n') {
|
|
append = msg_out_append;
|
|
pb_callback = pb_callback_out;
|
|
} else
|
|
#if DEBUG_LINK
|
|
if (type == 'd') {
|
|
append = msg_debug_out_append;
|
|
pb_callback = pb_debug_callback_out;
|
|
} else
|
|
#endif
|
|
{
|
|
return false;
|
|
}
|
|
|
|
append('#');
|
|
append('#');
|
|
append((msg_id >> 8) & 0xFF);
|
|
append(msg_id & 0xFF);
|
|
append((len >> 24) & 0xFF);
|
|
append((len >> 16) & 0xFF);
|
|
append((len >> 8) & 0xFF);
|
|
append(len & 0xFF);
|
|
pb_ostream_t stream = {pb_callback, 0, SIZE_MAX, 0, 0};
|
|
bool status = pb_encode(&stream, fields, msg_ptr);
|
|
if (type == 'n') {
|
|
msg_out_pad();
|
|
}
|
|
#if DEBUG_LINK
|
|
else if (type == 'd') {
|
|
msg_debug_out_pad();
|
|
}
|
|
#endif
|
|
return status;
|
|
}
|
|
|
|
enum {
|
|
READSTATE_IDLE,
|
|
READSTATE_READING,
|
|
};
|
|
|
|
void msg_process(char type, uint16_t msg_id, const pb_msgdesc_t *fields,
|
|
uint8_t *msg_encoded, uint32_t msg_encoded_size) {
|
|
static uint8_t msg_decoded[MSG_IN_DECODED_SIZE];
|
|
memzero(msg_decoded, sizeof(msg_decoded));
|
|
pb_istream_t stream = pb_istream_from_buffer(msg_encoded, msg_encoded_size);
|
|
bool status = pb_decode(&stream, fields, msg_decoded);
|
|
if (status) {
|
|
MessageProcessFunc(type, 'i', msg_id, msg_decoded);
|
|
} else {
|
|
fsm_sendFailure(FailureType_Failure_DataError, stream.errmsg);
|
|
}
|
|
}
|
|
|
|
void msg_read_common(char type, const uint8_t *buf, uint32_t len) {
|
|
static char read_state = READSTATE_IDLE;
|
|
static uint8_t msg_encoded[MSG_IN_ENCODED_SIZE];
|
|
static uint16_t msg_id = 0xFFFF;
|
|
static uint32_t msg_encoded_size = 0;
|
|
static uint32_t msg_pos = 0;
|
|
static const pb_msgdesc_t *fields = 0;
|
|
|
|
if (len != USB_PACKET_SIZE) return;
|
|
|
|
if (read_state == READSTATE_IDLE) {
|
|
if (buf[0] != '?' || buf[1] != '#' ||
|
|
buf[2] != '#') { // invalid start - discard
|
|
return;
|
|
}
|
|
msg_id = (buf[3] << 8) + buf[4];
|
|
msg_encoded_size =
|
|
((uint32_t)buf[5] << 24) + (buf[6] << 16) + (buf[7] << 8) + buf[8];
|
|
|
|
fields = MessageFields(type, 'i', msg_id);
|
|
if (!fields) { // unknown message
|
|
fsm_sendFailure(FailureType_Failure_UnexpectedMessage,
|
|
_("Unknown message"));
|
|
return;
|
|
}
|
|
if (msg_encoded_size > MSG_IN_ENCODED_SIZE) { // message is too big :(
|
|
fsm_sendFailure(FailureType_Failure_DataError, _("Message too big"));
|
|
return;
|
|
}
|
|
|
|
read_state = READSTATE_READING;
|
|
|
|
memcpy(msg_encoded, buf + MSG_HEADER_SIZE, len - MSG_HEADER_SIZE);
|
|
msg_pos = len - MSG_HEADER_SIZE;
|
|
} else if (read_state == READSTATE_READING) {
|
|
if (buf[0] != '?') { // invalid contents
|
|
read_state = READSTATE_IDLE;
|
|
return;
|
|
}
|
|
/* raw data starts at buf + 1 with len - 1 bytes */
|
|
buf++;
|
|
len = MIN(len - 1, MSG_IN_ENCODED_SIZE - msg_pos);
|
|
|
|
memcpy(msg_encoded + msg_pos, buf, len);
|
|
msg_pos += len;
|
|
}
|
|
|
|
if (msg_pos >= msg_encoded_size) {
|
|
msg_process(type, msg_id, fields, msg_encoded, msg_encoded_size);
|
|
msg_pos = 0;
|
|
read_state = READSTATE_IDLE;
|
|
}
|
|
}
|
|
|
|
const uint8_t *msg_out_data(void) {
|
|
if (msg_out_start == msg_out_end) return 0;
|
|
uint8_t *data = msg_out + (msg_out_start * USB_PACKET_SIZE);
|
|
msg_out_start = (msg_out_start + 1) % (MSG_OUT_BUFFER_SIZE / USB_PACKET_SIZE);
|
|
debugLog(0, "", "msg_out_data");
|
|
return data;
|
|
}
|
|
|
|
#if DEBUG_LINK
|
|
|
|
const uint8_t *msg_debug_out_data(void) {
|
|
if (msg_debug_out_start == msg_debug_out_end) return 0;
|
|
uint8_t *data = msg_debug_out + (msg_debug_out_start * USB_PACKET_SIZE);
|
|
msg_debug_out_start =
|
|
(msg_debug_out_start + 1) % (MSG_DEBUG_OUT_BUFFER_SIZE / USB_PACKET_SIZE);
|
|
debugLog(0, "", "msg_debug_out_data");
|
|
return data;
|
|
}
|
|
|
|
#endif
|
|
|
|
// msg_tiny needs to be large enough to hold the C struct decoded from a single
|
|
// 64 byte USB packet. The decoded struct can be larger than the encoded
|
|
// protobuf message. However, 128 bytes should be more than enough.
|
|
CONFIDENTIAL uint8_t msg_tiny[128];
|
|
_Static_assert(sizeof(msg_tiny) >= sizeof(Cancel), "msg_tiny too tiny");
|
|
_Static_assert(USB_PACKET_SIZE >= MSG_HEADER_SIZE + Cancel_size,
|
|
"msg_tiny too tiny");
|
|
_Static_assert(sizeof(msg_tiny) >= sizeof(Initialize), "msg_tiny too tiny");
|
|
_Static_assert(USB_PACKET_SIZE >= MSG_HEADER_SIZE + Initialize_size,
|
|
"msg_tiny too tiny");
|
|
_Static_assert(sizeof(msg_tiny) >= sizeof(PassphraseAck), "msg_tiny too tiny");
|
|
_Static_assert(USB_PACKET_SIZE >= MSG_HEADER_SIZE + PassphraseAck_size,
|
|
"msg_tiny too tiny");
|
|
_Static_assert(sizeof(msg_tiny) >= sizeof(ButtonAck), "msg_tiny too tiny");
|
|
_Static_assert(USB_PACKET_SIZE >= MSG_HEADER_SIZE + ButtonAck_size,
|
|
"msg_tiny too tiny");
|
|
_Static_assert(sizeof(msg_tiny) >= sizeof(PinMatrixAck), "msg_tiny too tiny");
|
|
_Static_assert(USB_PACKET_SIZE >= MSG_HEADER_SIZE + PinMatrixAck_size,
|
|
"msg_tiny too tiny");
|
|
#if DEBUG_LINK
|
|
_Static_assert(sizeof(msg_tiny) >= sizeof(DebugLinkDecision),
|
|
"msg_tiny too tiny");
|
|
_Static_assert(USB_PACKET_SIZE >= MSG_HEADER_SIZE + DebugLinkDecision_size,
|
|
"msg_tiny too tiny");
|
|
_Static_assert(sizeof(msg_tiny) >= sizeof(DebugLinkGetState),
|
|
"msg_tiny too tiny");
|
|
_Static_assert(USB_PACKET_SIZE >= MSG_HEADER_SIZE + DebugLinkGetState_size,
|
|
"msg_tiny too tiny");
|
|
#endif
|
|
uint16_t msg_tiny_id = 0xFFFF;
|
|
|
|
void msg_read_tiny(const uint8_t *buf, int len) {
|
|
if (len != USB_PACKET_SIZE || buf[0] != '?' || buf[1] != '#' ||
|
|
buf[2] != '#') {
|
|
// Ignore unexpected packets. This is helpful when two applications are
|
|
// attempting to communicate with Trezor at the same time.
|
|
return;
|
|
}
|
|
|
|
const pb_msgdesc_t *fields = NULL;
|
|
uint16_t msg_id = (buf[3] << 8) + buf[4];
|
|
switch (msg_id) {
|
|
case MessageType_MessageType_PinMatrixAck:
|
|
fields = PinMatrixAck_fields;
|
|
break;
|
|
case MessageType_MessageType_ButtonAck:
|
|
fields = ButtonAck_fields;
|
|
break;
|
|
case MessageType_MessageType_PassphraseAck:
|
|
fields = PassphraseAck_fields;
|
|
break;
|
|
case MessageType_MessageType_Cancel:
|
|
fields = Cancel_fields;
|
|
break;
|
|
case MessageType_MessageType_Initialize:
|
|
fields = Initialize_fields;
|
|
break;
|
|
#if DEBUG_LINK
|
|
case MessageType_MessageType_DebugLinkDecision:
|
|
fields = DebugLinkDecision_fields;
|
|
break;
|
|
case MessageType_MessageType_DebugLinkGetState:
|
|
fields = DebugLinkGetState_fields;
|
|
break;
|
|
#endif
|
|
default:
|
|
// Ignore unexpected messages.
|
|
return;
|
|
}
|
|
|
|
uint32_t msg_size =
|
|
((uint32_t)buf[5] << 24) + (buf[6] << 16) + (buf[7] << 8) + buf[8];
|
|
|
|
if (msg_size > sizeof(msg_tiny) / 2 ||
|
|
msg_size > (uint32_t)len - MSG_HEADER_SIZE) {
|
|
// There is a risk that the struct decoded from the message won't fit into
|
|
// msg_tiny or the encoded message does not fit into the buffer. The first
|
|
// is a fail-safe in case of a forgotten _Static_assert above.
|
|
fsm_sendFailure(FailureType_Failure_DataError, _("Message too big"));
|
|
msg_tiny_id = 0xFFFF;
|
|
return;
|
|
}
|
|
|
|
pb_istream_t stream = pb_istream_from_buffer(buf + MSG_HEADER_SIZE, msg_size);
|
|
bool status = pb_decode(&stream, fields, msg_tiny);
|
|
if (status) {
|
|
msg_tiny_id = msg_id;
|
|
} else {
|
|
fsm_sendFailure(FailureType_Failure_DataError, stream.errmsg);
|
|
msg_tiny_id = 0xFFFF;
|
|
}
|
|
}
|