2018-09-07 16:00:13 +01:00
|
|
|
/*
|
|
|
|
* Copyright (c) 2018 Atmosphère-NX
|
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify it
|
|
|
|
* under the terms and conditions of the GNU General Public License,
|
|
|
|
* version 2, as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope it will be useful, but WITHOUT
|
|
|
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
|
|
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
|
|
|
|
* more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
|
|
|
|
2018-02-20 09:49:10 +00:00
|
|
|
#include <stdint.h>
|
2018-02-22 23:32:47 +00:00
|
|
|
#include <string.h>
|
2018-02-20 09:49:10 +00:00
|
|
|
|
|
|
|
#include "utils.h"
|
2018-02-27 21:29:47 +00:00
|
|
|
#include "arm.h"
|
2018-09-09 07:51:52 +01:00
|
|
|
#include "exocfg.h"
|
2018-02-20 09:49:10 +00:00
|
|
|
|
|
|
|
#include "titlekey.h"
|
|
|
|
#include "masterkey.h"
|
|
|
|
#include "se.h"
|
|
|
|
|
2018-02-26 08:42:21 +00:00
|
|
|
static uint64_t g_tkey_expected_label_hash[4];
|
|
|
|
static unsigned int g_tkey_master_key_rev = MASTERKEY_REVISION_MAX;
|
2018-09-09 07:51:52 +01:00
|
|
|
static unsigned int g_tkey_type = 0;
|
2018-02-20 09:49:10 +00:00
|
|
|
|
|
|
|
/* Set the expected db prefix. */
|
2018-02-21 02:47:58 +00:00
|
|
|
void tkey_set_expected_label_hash(uint64_t *label_hash) {
|
2018-02-20 09:49:10 +00:00
|
|
|
for (unsigned int i = 0; i < 4; i++) {
|
2018-02-21 02:47:58 +00:00
|
|
|
g_tkey_expected_label_hash[i] = label_hash[i];
|
2018-02-20 09:49:10 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void tkey_set_master_key_rev(unsigned int master_key_rev) {
|
|
|
|
if (master_key_rev >= MASTERKEY_REVISION_MAX) {
|
2018-02-24 14:20:45 +00:00
|
|
|
generic_panic();
|
2018-02-20 09:49:10 +00:00
|
|
|
}
|
2018-02-27 23:14:23 +00:00
|
|
|
g_tkey_master_key_rev = master_key_rev;
|
2018-02-20 09:49:10 +00:00
|
|
|
}
|
|
|
|
|
2018-09-09 07:51:52 +01:00
|
|
|
static void tkey_validate_type(unsigned int type) {
|
2018-12-17 20:39:35 +00:00
|
|
|
if (type > TITLEKEY_TYPE_MAX || (type > 0 && exosphere_get_target_firmware() < ATMOSPHERE_TARGET_FIRMWARE_600)) {
|
2018-09-09 07:51:52 +01:00
|
|
|
generic_panic();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void tkey_set_type(unsigned int type) {
|
|
|
|
tkey_validate_type(type);
|
|
|
|
g_tkey_type = type;
|
|
|
|
}
|
|
|
|
|
2018-02-20 09:49:10 +00:00
|
|
|
/* Reference for MGF1 can be found here: https://en.wikipedia.org/wiki/Mask_generation_function#MGF1 */
|
|
|
|
void calculate_mgf1_and_xor(void *masked, size_t masked_size, const void *seed, size_t seed_size) {
|
|
|
|
uint8_t cur_hash[0x20];
|
|
|
|
uint8_t hash_buf[0xE4];
|
|
|
|
if (seed_size >= 0xE0) {
|
2018-02-24 14:20:45 +00:00
|
|
|
generic_panic();
|
2018-02-20 09:49:10 +00:00
|
|
|
}
|
2018-03-07 14:11:53 +00:00
|
|
|
|
2018-02-20 09:49:10 +00:00
|
|
|
size_t hash_buf_size = seed_size + 4;
|
2018-03-08 10:17:46 +00:00
|
|
|
if (seed_size != 0) {
|
|
|
|
memcpy(hash_buf, seed, seed_size);
|
|
|
|
}
|
2018-03-07 14:11:53 +00:00
|
|
|
uint32_t round_num = 0;
|
|
|
|
|
2018-02-20 09:49:10 +00:00
|
|
|
uint8_t *p_out = (uint8_t *)masked;
|
|
|
|
|
|
|
|
while (masked_size) {
|
|
|
|
size_t cur_size = masked_size;
|
|
|
|
if (cur_size > 0x20) {
|
|
|
|
cur_size = 0x20;
|
|
|
|
}
|
2018-03-07 14:11:53 +00:00
|
|
|
|
|
|
|
write32be(hash_buf, seed_size, round_num++);
|
2018-02-25 19:00:50 +00:00
|
|
|
|
|
|
|
flush_dcache_range(hash_buf, hash_buf + hash_buf_size);
|
2018-02-20 09:49:10 +00:00
|
|
|
se_calculate_sha256(cur_hash, hash_buf, hash_buf_size);
|
2018-03-07 14:11:53 +00:00
|
|
|
|
2018-02-20 09:49:10 +00:00
|
|
|
for (unsigned int i = 0; i < cur_size; i++) {
|
|
|
|
*p_out ^= cur_hash[i];
|
|
|
|
p_out++;
|
|
|
|
}
|
2018-03-07 14:11:53 +00:00
|
|
|
|
2018-02-20 09:49:10 +00:00
|
|
|
masked_size -= cur_size;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-02-21 02:47:58 +00:00
|
|
|
size_t tkey_rsa_oaep_unwrap(void *dst, size_t dst_size, void *src, size_t src_size) {
|
2018-02-20 09:49:10 +00:00
|
|
|
if (src_size != 0x100) {
|
2018-02-24 14:20:45 +00:00
|
|
|
generic_panic();
|
2018-02-20 09:49:10 +00:00
|
|
|
}
|
2018-03-07 14:11:53 +00:00
|
|
|
|
2018-02-21 02:47:58 +00:00
|
|
|
/* RSA Wrapped titlekeys use RSA-OAEP. */
|
2018-02-20 09:49:10 +00:00
|
|
|
/* Message is of the form prefix || maskedSalt || maskedDB. */
|
|
|
|
/* maskedSalt = salt ^ MGF1(maskedDB) */
|
|
|
|
/* maskedDB = DB ^ MGF1(salt) */
|
|
|
|
/* Salt is random and not validated in any way. */
|
2018-02-21 02:47:58 +00:00
|
|
|
/* DB is of the form label_hash || 00....01 || wrapped_titlekey. */
|
|
|
|
/* label_hash is, in practice, a constant in es .rodata. */
|
2018-02-20 09:49:10 +00:00
|
|
|
/* I have no idea why Nintendo did this, it should be either nonconstant (in tik) or in tz .rodata. */
|
2018-03-07 14:11:53 +00:00
|
|
|
|
2018-02-20 09:49:10 +00:00
|
|
|
uint8_t *message = (uint8_t *)src;
|
2018-03-07 14:11:53 +00:00
|
|
|
|
2018-02-20 09:49:10 +00:00
|
|
|
/* Prefix should always be zero. */
|
|
|
|
if (*message != 0) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2018-03-07 14:11:53 +00:00
|
|
|
|
2018-02-20 09:49:10 +00:00
|
|
|
uint8_t *salt = message + 1;
|
|
|
|
uint8_t *db = message + 0x21;
|
2018-03-07 14:11:53 +00:00
|
|
|
|
2018-02-21 02:47:58 +00:00
|
|
|
/* This will be passed to smc_unwrap_rsa_oaep_wrapped_titlekey. */
|
|
|
|
uint8_t *expected_label_hash = (uint8_t *)(&g_tkey_expected_label_hash[0]);
|
2018-03-07 14:11:53 +00:00
|
|
|
|
2018-02-20 09:49:10 +00:00
|
|
|
/* Unmask the salt. */
|
|
|
|
calculate_mgf1_and_xor(salt, 0x20, db, 0xDF);
|
|
|
|
/* Unmask the DB. */
|
|
|
|
calculate_mgf1_and_xor(db, 0xDF, salt, 0x20);
|
2018-03-07 14:11:53 +00:00
|
|
|
|
2018-02-20 09:49:10 +00:00
|
|
|
/* Validate expected salt. */
|
|
|
|
for (unsigned int i = 0; i < 0x20; i++) {
|
2018-02-21 02:47:58 +00:00
|
|
|
if (expected_label_hash[i] != db[i]) {
|
2018-02-20 09:49:10 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
2018-03-07 14:11:53 +00:00
|
|
|
|
2018-02-20 09:49:10 +00:00
|
|
|
/* Don't validate salt from message[1:0x21] at all. */
|
2018-03-07 14:11:53 +00:00
|
|
|
|
2018-02-20 09:49:10 +00:00
|
|
|
/* Advance pointer to DB, since we've validated the salt prefix. */
|
|
|
|
db += 0x20;
|
2018-03-07 14:11:53 +00:00
|
|
|
|
2018-02-20 09:49:10 +00:00
|
|
|
/* DB must be of the form 0000...01 || wrapped_titlekey */
|
|
|
|
if (*db != 0) {
|
|
|
|
return 0;
|
|
|
|
}
|
2018-03-07 14:11:53 +00:00
|
|
|
|
2018-02-20 09:49:10 +00:00
|
|
|
/* Locate wrapped_titlekey inside DB. */
|
|
|
|
size_t wrapped_key_offset_in_db = 0;
|
|
|
|
while (wrapped_key_offset_in_db < 0xBF) {
|
|
|
|
if (db[wrapped_key_offset_in_db] == 0) {
|
|
|
|
wrapped_key_offset_in_db++;
|
|
|
|
} else if (db[wrapped_key_offset_in_db] == 1) {
|
|
|
|
wrapped_key_offset_in_db++;
|
|
|
|
break;
|
|
|
|
} else {
|
|
|
|
/* Invalid wrapped titlekey prefix. */
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
2018-03-07 14:11:53 +00:00
|
|
|
|
2018-02-20 09:49:10 +00:00
|
|
|
/* Validate size... */
|
|
|
|
size_t wrapped_titlekey_size = 0xBF - wrapped_key_offset_in_db;
|
|
|
|
if (wrapped_titlekey_size > dst_size || wrapped_titlekey_size == 0) {
|
|
|
|
return 0;
|
|
|
|
}
|
2018-03-07 14:11:53 +00:00
|
|
|
|
2018-02-20 09:49:10 +00:00
|
|
|
/* Extract the wrapped key. */
|
|
|
|
memcpy(dst, &db[wrapped_key_offset_in_db], wrapped_titlekey_size);
|
2018-06-02 05:20:04 +01:00
|
|
|
return wrapped_titlekey_size;
|
2018-02-20 09:49:10 +00:00
|
|
|
}
|
|
|
|
|
2018-09-09 07:51:52 +01:00
|
|
|
static const uint8_t titlekek_sources[TITLEKEY_TYPE_MAX+1][0x10] = {
|
|
|
|
{0x1E, 0xDC, 0x7B, 0x3B, 0x60, 0xE6, 0xB4, 0xD8, 0x78, 0xB8, 0x17, 0x15, 0x98, 0x5E, 0x62, 0x9B},
|
|
|
|
{0x3B, 0x78, 0xF2, 0x61, 0x0F, 0x9D, 0x5A, 0xE2, 0x7B, 0x4E, 0x45, 0xAF, 0xCB, 0x0B, 0x67, 0x4D}
|
|
|
|
};
|
|
|
|
|
2018-02-20 09:49:10 +00:00
|
|
|
void tkey_aes_unwrap(void *dst, size_t dst_size, const void *src, size_t src_size) {
|
|
|
|
if (g_tkey_master_key_rev >= MASTERKEY_REVISION_MAX || dst_size != 0x10 || src_size != 0x10) {
|
2018-02-24 14:20:45 +00:00
|
|
|
generic_panic();
|
2018-02-20 09:49:10 +00:00
|
|
|
}
|
2018-09-09 07:51:52 +01:00
|
|
|
|
2018-02-20 09:49:10 +00:00
|
|
|
/* Generate the appropriate titlekek into keyslot 9. */
|
|
|
|
unsigned int master_keyslot = mkey_get_keyslot(g_tkey_master_key_rev);
|
2018-09-09 07:51:52 +01:00
|
|
|
decrypt_data_into_keyslot(KEYSLOT_SWITCH_TEMPKEY, master_keyslot, titlekek_sources[g_tkey_type], 0x10);
|
2018-03-07 14:11:53 +00:00
|
|
|
|
2018-02-20 09:49:10 +00:00
|
|
|
/* Unwrap the titlekey using the titlekek. */
|
|
|
|
se_aes_ecb_decrypt_block(KEYSLOT_SWITCH_TEMPKEY, dst, 0x10, src, 0x10);
|
|
|
|
}
|