2018-09-07 16:00:13 +01:00
|
|
|
/*
|
2019-04-08 03:00:49 +01:00
|
|
|
* Copyright (c) 2018-2019 Atmosphère-NX
|
2018-09-07 16:00:13 +01:00
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify it
|
|
|
|
* under the terms and conditions of the GNU General Public License,
|
|
|
|
* version 2, as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope it will be useful, but WITHOUT
|
|
|
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
|
|
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
|
|
|
|
* more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
2019-04-09 19:32:18 +01:00
|
|
|
|
2019-04-13 18:28:54 +01:00
|
|
|
#include <stdio.h>
|
2018-05-13 18:53:55 +01:00
|
|
|
#include <string.h>
|
|
|
|
#include "device_partition.h"
|
|
|
|
|
2018-07-19 21:07:53 +01:00
|
|
|
int device_partition_read_data(device_partition_t *devpart, void *dst, uint64_t sector, uint64_t num_sectors)
|
|
|
|
{
|
2018-05-13 18:53:55 +01:00
|
|
|
int rc;
|
|
|
|
if (!devpart->initialized) {
|
|
|
|
rc = devpart->initializer(devpart);
|
|
|
|
if (rc != 0) {
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
}
|
2019-04-13 18:28:54 +01:00
|
|
|
if ((devpart->read_cipher != NULL) && (devpart->crypto_mode != DevicePartitionCryptoMode_None)) {
|
2018-05-13 18:53:55 +01:00
|
|
|
for (uint64_t i = 0; i < num_sectors; i += devpart->crypto_work_buffer_num_sectors) {
|
|
|
|
uint64_t n = (i + devpart->crypto_work_buffer_num_sectors > num_sectors) ? (num_sectors - i) : devpart->crypto_work_buffer_num_sectors;
|
|
|
|
rc = devpart->reader(devpart, devpart->crypto_work_buffer, sector + i, n);
|
|
|
|
if (rc != 0) {
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
rc = devpart->read_cipher(devpart, sector + i, n);
|
|
|
|
if (rc != 0) {
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
memcpy(dst + (size_t)(devpart->sector_size * i), devpart->crypto_work_buffer, (size_t)(devpart->sector_size * n));
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
} else {
|
|
|
|
return devpart->reader(devpart, dst, sector, num_sectors);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-07-19 21:07:53 +01:00
|
|
|
int device_partition_write_data(device_partition_t *devpart, const void *src, uint64_t sector, uint64_t num_sectors)
|
|
|
|
{
|
2018-05-13 18:53:55 +01:00
|
|
|
int rc;
|
|
|
|
if (!devpart->initialized) {
|
|
|
|
rc = devpart->initializer(devpart);
|
|
|
|
if (rc != 0) {
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
}
|
2019-04-13 18:28:54 +01:00
|
|
|
if ((devpart->write_cipher != NULL) && (devpart->crypto_mode != DevicePartitionCryptoMode_None)) {
|
2018-05-13 18:53:55 +01:00
|
|
|
for (uint64_t i = 0; i < num_sectors; i += devpart->crypto_work_buffer_num_sectors) {
|
|
|
|
uint64_t n = (i + devpart->crypto_work_buffer_num_sectors > num_sectors) ? (num_sectors - i) : devpart->crypto_work_buffer_num_sectors;
|
|
|
|
memcpy(devpart->crypto_work_buffer, src + (size_t)(devpart->sector_size * i), (size_t)(devpart->sector_size * n));
|
|
|
|
rc = devpart->write_cipher(devpart, sector + i, n);
|
|
|
|
if (rc != 0) {
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
rc = devpart->writer(devpart, devpart->crypto_work_buffer, sector + i, n);
|
|
|
|
if (rc != 0) {
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
} else {
|
|
|
|
return devpart->writer(devpart, src, sector, num_sectors);
|
|
|
|
}
|
|
|
|
}
|
2019-04-09 19:32:18 +01:00
|
|
|
|
2019-04-13 18:28:54 +01:00
|
|
|
int emu_device_partition_read_data(device_partition_t *devpart, void *dst, uint64_t sector, uint64_t num_sectors, const char *origin_path, int num_parts, uint64_t part_limit)
|
2019-04-09 19:32:18 +01:00
|
|
|
{
|
|
|
|
int rc = 0;
|
2019-04-13 18:28:54 +01:00
|
|
|
uint64_t target_sector = 0;
|
|
|
|
char target_path[0x300 + 1] = {0};
|
2019-04-09 19:32:18 +01:00
|
|
|
|
2019-04-13 18:28:54 +01:00
|
|
|
/* Perform initialization steps, if necessary. */
|
|
|
|
if (!devpart->initialized) {
|
|
|
|
rc = devpart->initializer(devpart);
|
|
|
|
if (rc != 0) {
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Handle data in multiple parts, if necessary. */
|
|
|
|
if (num_parts > 0) {
|
|
|
|
int target_part = 0;
|
|
|
|
uint64_t data_offset = sector * devpart->sector_size;
|
|
|
|
|
|
|
|
if (data_offset >= part_limit) {
|
|
|
|
uint64_t data_offset_aligned = (data_offset + (part_limit - 1)) & ~(part_limit - 1);
|
|
|
|
target_part = (data_offset_aligned == data_offset) ? (data_offset / part_limit) : (data_offset_aligned / part_limit) - 1;
|
|
|
|
target_sector = (data_offset - (target_part * part_limit)) / devpart->sector_size;
|
|
|
|
|
|
|
|
/* Target part is invalid. */
|
|
|
|
if (target_part > num_parts) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
snprintf(target_path, sizeof(target_path) - 1, "%s%02d", origin_path, target_part);
|
|
|
|
} else {
|
|
|
|
target_sector = sector;
|
|
|
|
strcpy(target_path, origin_path);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Read the partition data. */
|
|
|
|
if ((devpart->read_cipher != NULL) && (devpart->crypto_mode != DevicePartitionCryptoMode_None)) {
|
|
|
|
for (uint64_t i = 0; i < num_sectors; i += devpart->crypto_work_buffer_num_sectors) {
|
|
|
|
uint64_t n = (i + devpart->crypto_work_buffer_num_sectors > num_sectors) ? (num_sectors - i) : devpart->crypto_work_buffer_num_sectors;
|
|
|
|
|
|
|
|
/* Read partition data using our backing file. */
|
|
|
|
FILE *origin = fopen(target_path, "rb");
|
|
|
|
fseek(origin, (target_sector + i) * devpart->sector_size, SEEK_CUR);
|
|
|
|
rc = (fread(dst, devpart->sector_size, n, origin) > 0) ? 0 : -1;
|
|
|
|
fclose(origin);
|
|
|
|
|
|
|
|
if (rc != 0) {
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Decrypt partition data. */
|
|
|
|
rc = devpart->read_cipher(devpart, target_sector + i, n);
|
|
|
|
|
|
|
|
if (rc != 0) {
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Copy partition data to destination. */
|
|
|
|
memcpy(dst + (size_t)(devpart->sector_size * i), devpart->crypto_work_buffer, (size_t)(devpart->sector_size * n));
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
/* Read partition data using our backing file. */
|
|
|
|
FILE *origin = fopen(target_path, "rb");
|
|
|
|
fseek(origin, target_sector * devpart->sector_size, SEEK_CUR);
|
|
|
|
rc = (fread(dst, devpart->sector_size, num_sectors, origin) > 0) ? 0 : -1;
|
|
|
|
fclose(origin);
|
|
|
|
}
|
2019-04-09 19:32:18 +01:00
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2019-04-13 18:28:54 +01:00
|
|
|
int emu_device_partition_write_data(device_partition_t *devpart, const void *src, uint64_t sector, uint64_t num_sectors, const char *origin_path, int num_parts, uint64_t part_limit)
|
2019-04-09 19:32:18 +01:00
|
|
|
{
|
|
|
|
int rc = 0;
|
2019-04-13 18:28:54 +01:00
|
|
|
uint64_t target_sector = 0;
|
|
|
|
char target_path[0x300 + 1] = {0};
|
2019-04-09 19:32:18 +01:00
|
|
|
|
2019-04-13 18:28:54 +01:00
|
|
|
/* Perform initialization steps, if necessary. */
|
|
|
|
if (!devpart->initialized) {
|
|
|
|
rc = devpart->initializer(devpart);
|
|
|
|
if (rc != 0) {
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Handle data in multiple parts, if necessary. */
|
|
|
|
if (num_parts > 0) {
|
|
|
|
int target_part = 0;
|
|
|
|
uint64_t data_offset = sector * devpart->sector_size;
|
|
|
|
|
|
|
|
if (data_offset >= part_limit) {
|
|
|
|
uint64_t data_offset_aligned = (data_offset + (part_limit - 1)) & ~(part_limit - 1);
|
|
|
|
target_part = (data_offset_aligned == data_offset) ? (data_offset / part_limit) : (data_offset_aligned / part_limit) - 1;
|
|
|
|
target_sector = (data_offset - (target_part * part_limit)) / devpart->sector_size;
|
|
|
|
|
|
|
|
/* Target part is invalid. */
|
|
|
|
if (target_part > num_parts) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
snprintf(target_path, sizeof(target_path) - 1, "%s%02d", origin_path, target_part);
|
|
|
|
} else {
|
|
|
|
target_sector = sector;
|
|
|
|
strcpy(target_path, origin_path);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Write the partition data. */
|
|
|
|
if ((devpart->write_cipher != NULL) && (devpart->crypto_mode != DevicePartitionCryptoMode_None)) {
|
|
|
|
for (uint64_t i = 0; i < num_sectors; i += devpart->crypto_work_buffer_num_sectors) {
|
|
|
|
uint64_t n = (i + devpart->crypto_work_buffer_num_sectors > num_sectors) ? (num_sectors - i) : devpart->crypto_work_buffer_num_sectors;
|
|
|
|
|
|
|
|
/* Copy partition data from source. */
|
|
|
|
memcpy(devpart->crypto_work_buffer, src + (size_t)(devpart->sector_size * i), (size_t)(devpart->sector_size * n));
|
|
|
|
|
|
|
|
/* Encrypt data. */
|
|
|
|
rc = devpart->write_cipher(devpart, target_sector + i, n);
|
|
|
|
|
|
|
|
if (rc != 0) {
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Write partition data using our backing file. */
|
|
|
|
FILE *origin = fopen(target_path, "wb");
|
|
|
|
fseek(origin, (target_sector + i) * devpart->sector_size, SEEK_CUR);
|
|
|
|
rc = (fwrite(src, devpart->sector_size, n, origin) > 0) ? 0 : -1;
|
|
|
|
fclose(origin);
|
|
|
|
|
|
|
|
if (rc != 0) {
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
/* Write partition data using our backing file. */
|
|
|
|
FILE *origin = fopen(target_path, "wb");
|
|
|
|
fseek(origin, sector * devpart->sector_size, SEEK_CUR);
|
|
|
|
rc = (fwrite(src, devpart->sector_size, num_sectors, origin) > 0) ? 0 : -1;
|
|
|
|
fclose(origin);
|
|
|
|
}
|
2019-04-09 19:32:18 +01:00
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|