-
-
Notifications
You must be signed in to change notification settings - Fork 39.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Enhancement and fixes of "Secure" feature #16958
Changes from 16 commits
139a53a
f3eae10
b5a1d9f
a3da2ca
bc3773b
efbbc13
b93392c
813c0c7
1d6fc0a
41659c3
78f884a
ebacefe
c14cdb3
c91a0f3
b03eecc
ea31998
671b3f9
ff4e05d
68c04ee
aa26b27
91a360d
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -29,18 +29,21 @@ secure_status_t secure_get_status(void) { | |
|
||
void secure_lock(void) { | ||
secure_status = SECURE_LOCKED; | ||
secure_hook_quantum(secure_status); | ||
} | ||
|
||
void secure_unlock(void) { | ||
secure_status = SECURE_UNLOCKED; | ||
idle_time = timer_read32(); | ||
secure_hook_quantum(secure_status); | ||
} | ||
|
||
void secure_request_unlock(void) { | ||
if (secure_status == SECURE_LOCKED) { | ||
secure_status = SECURE_PENDING; | ||
unlock_time = timer_read32(); | ||
} | ||
secure_hook_quantum(secure_status); | ||
} | ||
|
||
void secure_activity_event(void) { | ||
|
@@ -85,3 +88,16 @@ void secure_task(void) { | |
} | ||
#endif | ||
} | ||
|
||
#if defined(SECURE_ENABLE) | ||
drashna marked this conversation as resolved.
Show resolved
Hide resolved
|
||
__attribute__((weak)) bool secure_hook_user(secure_status_t secure_status) { | ||
return true; | ||
} | ||
__attribute__((weak)) bool secure_hook_kb(secure_status_t secure_status) { | ||
return secure_hook_user(secure_status); | ||
} | ||
|
||
__attribute__((weak)) void secure_hook_quantum(secure_status_t secure_status) { | ||
secure_hook_kb(secure_status); | ||
} | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. This still feels somewhat wrong, as it would contain the XAP activity hooks? Or if the plan is to add a non weak version in Though at this point it might be better if its reworked as part of XAP. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Would it make sense/be best to Eg, throw this in quantum.c (and only this) void secure_hook_quantum(secure_status_t secure_status) {
if (secure_status == SECURE_PENDING) {
clear_keyboard();
layer_clear();
}
secure_hook_kb(secure_status);
} That would handle the keyboard clearing only when an unlock request is sent, and xap could be added here, as well. Edit: yeah, I think that's probably the best way. Will add. |
||
#endif |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,32 @@ | ||
/* Copyright 2021 Stefan Kerkmann | ||
* | ||
* This program is free software: you can redistribute it and/or modify | ||
* it under the terms of the GNU General Public License as published by | ||
* the Free Software Foundation, either version 2 of the License, or | ||
* (at your option) any later version. | ||
* | ||
* This program is distributed in the hope that it will be useful, | ||
* but WITHOUT ANY WARRANTY; without even the implied warranty of | ||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | ||
* GNU General Public License for more details. | ||
* | ||
* You should have received a copy of the GNU General Public License | ||
* along with this program. If not, see <http://www.gnu.org/licenses/>. | ||
*/ | ||
|
||
#pragma once | ||
|
||
#include "test_common.h" | ||
|
||
// clang-format off | ||
#define SECURE_UNLOCK_SEQUENCE \ | ||
{ \ | ||
{0, 1}, \ | ||
{0, 2}, \ | ||
{0, 3}, \ | ||
{0, 4} \ | ||
} | ||
// clang-format on | ||
|
||
#define SECURE_UNLOCK_TIMEOUT 20 | ||
#define SECURE_IDLE_TIMEOUT 50 |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,20 @@ | ||
# Copyright 2021 Stefan Kerkmann | ||
# | ||
# This program is free software: you can redistribute it and/or modify | ||
# it under the terms of the GNU General Public License as published by | ||
# the Free Software Foundation, either version 2 of the License, or | ||
# (at your option) any later version. | ||
# | ||
# This program is distributed in the hope that it will be useful, | ||
# but WITHOUT ANY WARRANTY; without even the implied warranty of | ||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | ||
# GNU General Public License for more details. | ||
# | ||
# You should have received a copy of the GNU General Public License | ||
# along with this program. If not, see <http://www.gnu.org/licenses/>. | ||
|
||
# -------------------------------------------------------------------------------- | ||
# Keep this file, even if it is empty, as a marker that this folder contains tests | ||
# -------------------------------------------------------------------------------- | ||
|
||
SECURE_ENABLE = yes |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This happens on every keypress, rather than the transition from inscure -> unlocking.
I somewhat prefer the addition of a "request unlock" keycode, or just letting the caller handle the case if they manually call
secure_request_unlock
.There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can do that.