1
0
mirror of https://github.com/trezor/trezor-firmware.git synced 2024-11-30 11:28:21 +00:00
trezor-firmware/core/src/usb.py
matejcik 391976bcda refactor(core/usb): do not require serial number on instantiaton of USB
On a cleanly wiped device, storage must be unlocked in order to create
and retrieve the serial number. However, storage unlocking happens in
boot.py, which is imported _after_ usb.py

We must therefore sidestep asking for the serial number.
2021-05-06 13:14:21 +02:00

111 lines
3.6 KiB
Python

from micropython import const
from trezor import io, utils
UDP_PORT = 0
WIRE_PORT_OFFSET = const(0)
DEBUGLINK_PORT_OFFSET = const(1)
WEBAUTHN_PORT_OFFSET = const(2)
VCP_PORT_OFFSET = const(3)
if utils.EMULATOR:
import uos
UDP_PORT = int(uos.getenv("TREZOR_UDP_PORT") or "21324")
_iface_iter = iter(range(5))
ENABLE_IFACE_DEBUG = __debug__
ENABLE_IFACE_WEBAUTHN = not utils.BITCOIN_ONLY
ENABLE_IFACE_VCP = __debug__
# interface used for trezor wire protocol
id_wire = next(_iface_iter)
iface_wire = io.WebUSB(
iface_num=id_wire,
ep_in=0x81 + id_wire,
ep_out=0x01 + id_wire,
emu_port=UDP_PORT + WIRE_PORT_OFFSET,
)
# XXXXXXXXXXXXXXXXXXX
#
# We want the following branches present only in their respective firmwares. To achieve
# that, we are taking advantage of the upy compiler static optimization: when an
# if-expression statically evaluates to False, the branch is excluded from the bytecode.
# This works magically for the __debug__ builtin, and `utils.BITCOIN_ONLY` is replaced
# by a literal True/False by us in the build step.
#
# Therefore, each of the following needs to include the respective static expression
# so that it can be correctly excluded from the resulting build.
if __debug__ and ENABLE_IFACE_DEBUG:
# interface used for debug messages with trezor wire protocol
id_debug = next(_iface_iter)
iface_debug = io.WebUSB(
iface_num=id_debug,
ep_in=0x81 + id_debug,
ep_out=0x01 + id_debug,
emu_port=UDP_PORT + DEBUGLINK_PORT_OFFSET,
)
if not utils.BITCOIN_ONLY and ENABLE_IFACE_WEBAUTHN:
# interface used for FIDO/U2F and FIDO2/WebAuthn HID transport
id_webauthn = next(_iface_iter)
iface_webauthn = io.HID(
iface_num=id_webauthn,
ep_in=0x81 + id_webauthn,
ep_out=0x01 + id_webauthn,
emu_port=UDP_PORT + WEBAUTHN_PORT_OFFSET,
# fmt: off
report_desc=bytes([
0x06, 0xd0, 0xf1, # USAGE_PAGE (FIDO Alliance)
0x09, 0x01, # USAGE (U2F HID Authenticator Device)
0xa1, 0x01, # COLLECTION (Application)
0x09, 0x20, # USAGE (Input Report Data)
0x15, 0x00, # LOGICAL_MINIMUM (0)
0x26, 0xff, 0x00, # LOGICAL_MAXIMUM (255)
0x75, 0x08, # REPORT_SIZE (8)
0x95, 0x40, # REPORT_COUNT (64)
0x81, 0x02, # INPUT (Data,Var,Abs)
0x09, 0x21, # USAGE (Output Report Data)
0x15, 0x00, # LOGICAL_MINIMUM (0)
0x26, 0xff, 0x00, # LOGICAL_MAXIMUM (255)
0x75, 0x08, # REPORT_SIZE (8)
0x95, 0x40, # REPORT_COUNT (64)
0x91, 0x02, # OUTPUT (Data,Var,Abs)
0xc0, # END_COLLECTION
]),
# fmt: on
)
if __debug__ and ENABLE_IFACE_VCP:
# interface used for cdc/vcp console emulation (debug messages)
id_vcp = next(_iface_iter)
id_vcp_data = next(_iface_iter)
iface_vcp = io.VCP(
iface_num=id_vcp,
data_iface_num=id_vcp_data,
ep_in=0x81 + id_vcp,
ep_out=0x01 + id_vcp,
ep_cmd=0x81 + id_vcp_data,
emu_port=UDP_PORT + VCP_PORT_OFFSET,
)
bus = io.USB(
vendor_id=0x1209,
product_id=0x53C1,
release_num=0x0200,
manufacturer="SatoshiLabs",
product="TREZOR",
interface="TREZOR Interface",
usb21_landing=False,
)
bus.add(iface_wire)
if __debug__ and ENABLE_IFACE_DEBUG:
bus.add(iface_debug)
if not utils.BITCOIN_ONLY and ENABLE_IFACE_WEBAUTHN:
bus.add(iface_webauthn)
if __debug__ and ENABLE_IFACE_VCP:
bus.add(iface_vcp)