mirror of
https://github.com/trezor/trezor-firmware.git
synced 2024-12-28 17:18:29 +00:00
267 lines
8.1 KiB
C
267 lines
8.1 KiB
C
#include STM32_HAL_H
|
|
|
|
#include <string.h>
|
|
#include <sys/types.h>
|
|
#include <assert.h>
|
|
|
|
#include "common.h"
|
|
#include "display.h"
|
|
#include "image.h"
|
|
#include "flash.h"
|
|
#include "touch.h"
|
|
#include "usb.h"
|
|
#include "version.h"
|
|
#include "mini_printf.h"
|
|
|
|
#include "messages.h"
|
|
#include "protobuf.h"
|
|
|
|
#define IMAGE_MAGIC 0x465A5254 // TRZF
|
|
#define IMAGE_MAXSIZE (7 * 128 * 1024)
|
|
|
|
void pendsv_isr_handler(void) {
|
|
__fatal_error("pendsv", __FILE__, __LINE__, __FUNCTION__);
|
|
}
|
|
|
|
void display_vendor(const uint8_t *vimg, const char *vstr, uint32_t vstr_len, uint32_t fw_version)
|
|
{
|
|
display_clear();
|
|
if (memcmp(vimg, "TOIf", 4) != 0) {
|
|
return;
|
|
}
|
|
uint16_t w = *(uint16_t *)(vimg + 4);
|
|
uint16_t h = *(uint16_t *)(vimg + 6);
|
|
if (w != 120 || h != 120) {
|
|
return;
|
|
}
|
|
uint32_t datalen = *(uint32_t *)(vimg + 8);
|
|
display_image(60, 32, w, h, vimg + 12, datalen);
|
|
display_text_center(120, 192, vstr, vstr_len, FONT_BOLD, COLOR_WHITE, COLOR_BLACK);
|
|
char ver_str[32];
|
|
mini_snprintf(ver_str, sizeof(ver_str), "%d.%d.%d.%d",
|
|
(int)(fw_version & 0xFF),
|
|
(int)((fw_version >> 8) & 0xFF),
|
|
(int)((fw_version >> 16) & 0xFF),
|
|
(int)((fw_version >> 24) & 0xFF)
|
|
);
|
|
display_text_center(120, 215, ver_str, -1, FONT_BOLD, COLOR_GRAY64, COLOR_BLACK);
|
|
display_refresh();
|
|
}
|
|
|
|
void check_and_jump(void)
|
|
{
|
|
display_printf("checking vendor header\n");
|
|
|
|
vendor_header vhdr;
|
|
if (vendor_parse_header((const uint8_t *)FIRMWARE_START, &vhdr)) {
|
|
display_printf("valid vendor header\n");
|
|
} else {
|
|
display_printf("invalid vendor header\n");
|
|
return;
|
|
}
|
|
|
|
if (vendor_check_signature((const uint8_t *)FIRMWARE_START, &vhdr)) {
|
|
display_printf("valid vendor header signature\n");
|
|
} else {
|
|
display_printf("invalid vendor header signature\n");
|
|
return;
|
|
}
|
|
|
|
display_printf("checking firmware header\n");
|
|
|
|
image_header hdr;
|
|
if (image_parse_header((const uint8_t *)(FIRMWARE_START + vhdr.hdrlen), IMAGE_MAGIC, IMAGE_MAXSIZE, &hdr)) {
|
|
display_printf("valid firmware header\n");
|
|
} else {
|
|
display_printf("invalid firmware header\n");
|
|
return;
|
|
}
|
|
|
|
if (image_check_signature((const uint8_t *)(FIRMWARE_START + vhdr.hdrlen), &hdr, &vhdr)) {
|
|
display_printf("valid firmware signature\n");
|
|
|
|
display_vendor(vhdr.vimg, (const char *)vhdr.vstr, vhdr.vstr_len, hdr.version);
|
|
HAL_Delay(1000); // TODO: remove?
|
|
display_printf("JUMP!\n");
|
|
jump_to(FIRMWARE_START + vhdr.hdrlen + HEADER_SIZE);
|
|
|
|
} else {
|
|
display_printf("invalid firmware signature\n");
|
|
}
|
|
}
|
|
|
|
int usb_init_all(void) {
|
|
static const usb_dev_info_t dev_info = {
|
|
.vendor_id = 0x1209,
|
|
.product_id = 0x53C0,
|
|
.release_num = 0x0002,
|
|
.manufacturer_str = (const uint8_t *)"SatoshiLabs",
|
|
.product_str = (const uint8_t *)"TREZOR Bootloader",
|
|
.serial_number_str = (const uint8_t *)"",
|
|
.configuration_str = (const uint8_t *)"",
|
|
.interface_str = (const uint8_t *)"",
|
|
};
|
|
static uint8_t hid_rx_buffer[64];
|
|
static const uint8_t hid_report_desc[] = {
|
|
0x06, 0x00, 0xff, // USAGE_PAGE (Vendor Defined)
|
|
0x09, 0x01, // USAGE (1)
|
|
0xa1, 0x01, // COLLECTION (Application)
|
|
0x09, 0x20, // USAGE (Input Report Data)
|
|
0x15, 0x00, // LOGICAL_MINIMUM (0)
|
|
0x26, 0xff, 0x00, // LOGICAL_MAXIMUM (255)
|
|
0x75, 0x08, // REPORT_SIZE (8)
|
|
0x95, 0x40, // REPORT_COUNT (64)
|
|
0x81, 0x02, // INPUT (Data,Var,Abs)
|
|
0x09, 0x21, // USAGE (Output Report Data)
|
|
0x15, 0x00, // LOGICAL_MINIMUM (0)
|
|
0x26, 0xff, 0x00, // LOGICAL_MAXIMUM (255)
|
|
0x75, 0x08, // REPORT_SIZE (8)
|
|
0x95, 0x40, // REPORT_COUNT (64)
|
|
0x91, 0x02, // OUTPUT (Data,Var,Abs)
|
|
0xc0 // END_COLLECTION
|
|
};
|
|
static const usb_hid_info_t hid_info = {
|
|
.iface_num = 0,
|
|
.ep_in = USB_EP_DIR_IN | 0x01,
|
|
.ep_out = USB_EP_DIR_OUT | 0x01,
|
|
.subclass = 0,
|
|
.protocol = 0,
|
|
.max_packet_len = sizeof(hid_rx_buffer),
|
|
.rx_buffer = hid_rx_buffer,
|
|
.polling_interval = 1,
|
|
.report_desc_len = sizeof(hid_report_desc),
|
|
.report_desc = hid_report_desc,
|
|
};
|
|
|
|
if (0 != usb_init(&dev_info)) {
|
|
__fatal_error("usb_init", __FILE__, __LINE__, __FUNCTION__);
|
|
}
|
|
if (0 != usb_hid_add(&hid_info)) {
|
|
__fatal_error("usb_hid_add", __FILE__, __LINE__, __FUNCTION__);
|
|
}
|
|
if (0 != usb_start()) {
|
|
__fatal_error("usb_start", __FILE__, __LINE__, __FUNCTION__);
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
#define UPLOAD_CHUNK_SIZE (128*1024)
|
|
#define USB_PACKET_SIZE 64
|
|
#define USB_IFACE_NUM 0
|
|
|
|
void process_upload_chunk(const uint8_t *buf, uint32_t len)
|
|
{
|
|
// TODO: write to flash
|
|
}
|
|
|
|
uint32_t process_upload_message(uint32_t msg_size, const uint8_t *initbuf, uint32_t initlen)
|
|
{
|
|
int remains = msg_size - initlen;
|
|
// TODO: process initbuf
|
|
|
|
if (initbuf[0] != 0x0A) {
|
|
return 0; // ERROR - payload field not found
|
|
}
|
|
uint32_t payload_len;
|
|
uint32_t p = pb_read_varint(initbuf, &payload_len);
|
|
process_upload_chunk(initbuf + p, initlen - p);
|
|
|
|
uint8_t buf[USB_PACKET_SIZE];
|
|
while (remains > 0) {
|
|
int r = usb_hid_read_blocking(USB_IFACE_NUM, buf, USB_PACKET_SIZE, 100);
|
|
if (r <= 0) {
|
|
continue;
|
|
}
|
|
assert(r == USB_PACKET_SIZE);
|
|
process_upload_chunk(buf, 63);
|
|
remains -= USB_PACKET_SIZE;
|
|
}
|
|
display_printf("done\n");
|
|
return 0; // should return >0 if more data required
|
|
}
|
|
|
|
void mainloop(void)
|
|
{
|
|
if (0 != flash_init()) {
|
|
__fatal_error("flash_init", __FILE__, __LINE__, __FUNCTION__);
|
|
}
|
|
|
|
if (0 != usb_init_all()) {
|
|
__fatal_error("usb_init_all", __FILE__, __LINE__, __FUNCTION__);
|
|
}
|
|
|
|
uint8_t buf[USB_PACKET_SIZE];
|
|
|
|
for (;;) {
|
|
int r = usb_hid_read_blocking(USB_IFACE_NUM, buf, USB_PACKET_SIZE, 100);
|
|
if (r <= 0) {
|
|
continue;
|
|
}
|
|
assert(r == USB_PACKET_SIZE);
|
|
uint16_t msg_id;
|
|
uint32_t msg_size;
|
|
// invalid header
|
|
if (!pb_parse_header(buf, &msg_id, &msg_size)) {
|
|
continue;
|
|
}
|
|
switch (msg_id) {
|
|
case 0: // Initialize
|
|
display_printf("received Initialize\n");
|
|
send_msg_Features(USB_IFACE_NUM, false);
|
|
break;
|
|
case 1: // Ping
|
|
display_printf("received Ping\n");
|
|
send_msg_Success(USB_IFACE_NUM);
|
|
break;
|
|
case 6: // FirmwareErase
|
|
display_printf("received FirmwareErase\n");
|
|
send_msg_FirmwareRequest(USB_IFACE_NUM, 0, UPLOAD_CHUNK_SIZE);
|
|
break;
|
|
case 7: // FirmwareUpload
|
|
display_printf("received FirmwareUpload\n");
|
|
uint32_t req_offset = process_upload_message(msg_size, buf + PB_HEADER_LEN, USB_PACKET_SIZE - PB_HEADER_LEN);
|
|
if (req_offset > 0) {
|
|
send_msg_FirmwareRequest(USB_IFACE_NUM, req_offset, UPLOAD_CHUNK_SIZE);
|
|
} else {
|
|
send_msg_Success(USB_IFACE_NUM);
|
|
}
|
|
break;
|
|
default:
|
|
display_printf("received unknown message\n");
|
|
send_msg_Failure(USB_IFACE_NUM);
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
int main(void)
|
|
{
|
|
periph_init();
|
|
|
|
if (0 != display_init()) {
|
|
__fatal_error("display_init", __FILE__, __LINE__, __FUNCTION__);
|
|
}
|
|
|
|
if (0 != touch_init()) {
|
|
__fatal_error("touch_init", __FILE__, __LINE__, __FUNCTION__);
|
|
}
|
|
|
|
display_clear();
|
|
display_backlight(255);
|
|
|
|
display_printf("TREZOR Bootloader %d.%d.%d.%d\n", VERSION_MAJOR, VERSION_MINOR, VERSION_PATCH, VERSION_BUILD);
|
|
display_printf("=================\n");
|
|
display_printf("starting bootloader\n");
|
|
|
|
if (touch_read() != 0) {
|
|
mainloop();
|
|
} else {
|
|
check_and_jump();
|
|
}
|
|
|
|
__fatal_error("HALT", __FILE__, __LINE__, __FUNCTION__);
|
|
|
|
return 0;
|
|
}
|