mirror of
https://github.com/Atmosphere-NX/Atmosphere.git
synced 2024-11-26 22:02:15 +00:00
spl: Implement RsaService
This commit is contained in:
parent
bfa84e27c1
commit
9ea1a2a941
5 changed files with 133 additions and 0 deletions
24
stratosphere/spl/source/spl_rsa_service.cpp
Normal file
24
stratosphere/spl/source/spl_rsa_service.cpp
Normal file
|
@ -0,0 +1,24 @@
|
||||||
|
/*
|
||||||
|
* Copyright (c) 2018-2019 Atmosphère-NX
|
||||||
|
*
|
||||||
|
* This program is free software; you can redistribute it and/or modify it
|
||||||
|
* under the terms and conditions of the GNU General Public License,
|
||||||
|
* version 2, as published by the Free Software Foundation.
|
||||||
|
*
|
||||||
|
* This program is distributed in the hope it will be useful, but WITHOUT
|
||||||
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
||||||
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
|
||||||
|
* more details.
|
||||||
|
*
|
||||||
|
* You should have received a copy of the GNU General Public License
|
||||||
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include <switch.h>
|
||||||
|
#include <stratosphere.hpp>
|
||||||
|
|
||||||
|
#include "spl_rsa_service.hpp"
|
||||||
|
|
||||||
|
Result RsaService::DecryptRsaPrivateKey(OutPointerWithClientSize<u8> dst, InPointer<u8> src, AccessKey access_key, KeySource key_source, u32 option) {
|
||||||
|
return this->GetSecureMonitorWrapper()->DecryptRsaPrivateKey(dst.pointer, dst.num_elements, src.pointer, src.num_elements, access_key, key_source, option);
|
||||||
|
}
|
57
stratosphere/spl/source/spl_rsa_service.hpp
Normal file
57
stratosphere/spl/source/spl_rsa_service.hpp
Normal file
|
@ -0,0 +1,57 @@
|
||||||
|
/*
|
||||||
|
* Copyright (c) 2018-2019 Atmosphère-NX
|
||||||
|
*
|
||||||
|
* This program is free software; you can redistribute it and/or modify it
|
||||||
|
* under the terms and conditions of the GNU General Public License,
|
||||||
|
* version 2, as published by the Free Software Foundation.
|
||||||
|
*
|
||||||
|
* This program is distributed in the hope it will be useful, but WITHOUT
|
||||||
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
||||||
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
|
||||||
|
* more details.
|
||||||
|
*
|
||||||
|
* You should have received a copy of the GNU General Public License
|
||||||
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#pragma once
|
||||||
|
#include <switch.h>
|
||||||
|
#include <stratosphere.hpp>
|
||||||
|
|
||||||
|
#include "spl_types.hpp"
|
||||||
|
#include "spl_crypto_service.hpp"
|
||||||
|
|
||||||
|
class RsaService : public CryptoService {
|
||||||
|
public:
|
||||||
|
RsaService(SecureMonitorWrapper *sw) : CryptoService(sw) {
|
||||||
|
/* ... */
|
||||||
|
}
|
||||||
|
|
||||||
|
virtual ~RsaService() {
|
||||||
|
/* ... */
|
||||||
|
}
|
||||||
|
protected:
|
||||||
|
/* Actual commands. */
|
||||||
|
virtual Result DecryptRsaPrivateKey(OutPointerWithClientSize<u8> dst, InPointer<u8> src, AccessKey access_key, KeySource key_source, u32 option);
|
||||||
|
public:
|
||||||
|
DEFINE_SERVICE_DISPATCH_TABLE {
|
||||||
|
MakeServiceCommandMeta<Spl_Cmd_GetConfig, &RsaService::GetConfig>(),
|
||||||
|
MakeServiceCommandMeta<Spl_Cmd_ExpMod, &RsaService::ExpMod>(),
|
||||||
|
MakeServiceCommandMeta<Spl_Cmd_SetConfig, &RsaService::SetConfig>(),
|
||||||
|
MakeServiceCommandMeta<Spl_Cmd_GenerateRandomBytes, &RsaService::GenerateRandomBytes>(),
|
||||||
|
MakeServiceCommandMeta<Spl_Cmd_IsDevelopment, &RsaService::IsDevelopment>(),
|
||||||
|
MakeServiceCommandMeta<Spl_Cmd_SetBootReason, &RsaService::SetBootReason, FirmwareVersion_300>(),
|
||||||
|
MakeServiceCommandMeta<Spl_Cmd_GetBootReason, &RsaService::GetBootReason, FirmwareVersion_300>(),
|
||||||
|
MakeServiceCommandMeta<Spl_Cmd_GenerateAesKek, &RsaService::GenerateAesKek>(),
|
||||||
|
MakeServiceCommandMeta<Spl_Cmd_LoadAesKey, &RsaService::LoadAesKey>(),
|
||||||
|
MakeServiceCommandMeta<Spl_Cmd_GenerateAesKey, &RsaService::GenerateAesKey>(),
|
||||||
|
MakeServiceCommandMeta<Spl_Cmd_DecryptAesKey, &RsaService::DecryptAesKey>(),
|
||||||
|
MakeServiceCommandMeta<Spl_Cmd_CryptAesCtr, &RsaService::CryptAesCtr>(),
|
||||||
|
MakeServiceCommandMeta<Spl_Cmd_ComputeCmac, &RsaService::ComputeCmac>(),
|
||||||
|
MakeServiceCommandMeta<Spl_Cmd_AllocateAesKeyslot, &RsaService::AllocateAesKeyslot, FirmwareVersion_200>(),
|
||||||
|
MakeServiceCommandMeta<Spl_Cmd_FreeAesKeyslot, &RsaService::FreeAesKeyslot, FirmwareVersion_200>(),
|
||||||
|
MakeServiceCommandMeta<Spl_Cmd_GetAesKeyslotAvailableEvent, &RsaService::GetAesKeyslotAvailableEvent, FirmwareVersion_200>(),
|
||||||
|
MakeServiceCommandMeta<Spl_Cmd_DecryptRsaPrivateKey, &RsaService::DecryptRsaPrivateKey>(),
|
||||||
|
|
||||||
|
};
|
||||||
|
};
|
|
@ -29,6 +29,9 @@ constexpr u32 CryptAesInMapBase = 0x90000000u;
|
||||||
constexpr u32 CryptAesOutMapBase = 0xC0000000u;
|
constexpr u32 CryptAesOutMapBase = 0xC0000000u;
|
||||||
constexpr size_t CryptAesSizeMax = static_cast<size_t>(CryptAesOutMapBase - CryptAesInMapBase);
|
constexpr size_t CryptAesSizeMax = static_cast<size_t>(CryptAesOutMapBase - CryptAesInMapBase);
|
||||||
|
|
||||||
|
constexpr size_t RsaPrivateKeySize = 0x100;
|
||||||
|
constexpr size_t RsaPrivateKeyMetaSize = 0x30;
|
||||||
|
|
||||||
/* Types. */
|
/* Types. */
|
||||||
struct SeLinkedListEntry {
|
struct SeLinkedListEntry {
|
||||||
u32 num_entries;
|
u32 num_entries;
|
||||||
|
@ -520,6 +523,38 @@ Result SecureMonitorWrapper::FreeAesKeyslot(u32 keyslot, const void *owner) {
|
||||||
return ResultSuccess;
|
return ResultSuccess;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Result SecureMonitorWrapper::DecryptRsaPrivateKey(void *dst, size_t dst_size, const void *src, size_t src_size, const AccessKey &access_key, const KeySource &key_source, u32 option) {
|
||||||
|
struct DecryptRsaPrivateKeyLayout {
|
||||||
|
u8 data[RsaPrivateKeySize + RsaPrivateKeyMetaSize];
|
||||||
|
};
|
||||||
|
DecryptRsaPrivateKeyLayout *layout = reinterpret_cast<DecryptRsaPrivateKeyLayout *>(g_work_buffer);
|
||||||
|
|
||||||
|
/* Validate size. */
|
||||||
|
if (src_size < RsaPrivateKeyMetaSize || src_size > sizeof(DecryptRsaPrivateKeyLayout)) {
|
||||||
|
return ResultSplInvalidSize;
|
||||||
|
}
|
||||||
|
|
||||||
|
std::memcpy(layout->data, src, src_size);
|
||||||
|
armDCacheFlush(layout, sizeof(*layout));
|
||||||
|
|
||||||
|
SmcResult smc_res;
|
||||||
|
size_t copy_size = 0;
|
||||||
|
if (GetRuntimeFirmwareVersion() >= FirmwareVersion_500) {
|
||||||
|
copy_size = std::min(dst_size, src_size - RsaPrivateKeyMetaSize);
|
||||||
|
smc_res = SmcWrapper::DecryptOrImportRsaPrivateKey(layout->data, src_size, access_key, key_source, SmcDecryptOrImportMode_DecryptRsaPrivateKey);
|
||||||
|
} else {
|
||||||
|
smc_res = SmcWrapper::DecryptRsaPrivateKey(©_size, layout->data, src_size, access_key, key_source, option);
|
||||||
|
copy_size = std::min(dst_size, copy_size);
|
||||||
|
}
|
||||||
|
|
||||||
|
armDCacheFlush(layout, sizeof(*layout));
|
||||||
|
if (smc_res == SmcResult_Success) {
|
||||||
|
std::memcpy(dst, layout->data, copy_size);
|
||||||
|
}
|
||||||
|
|
||||||
|
return ConvertToSplResult(smc_res);
|
||||||
|
}
|
||||||
|
|
||||||
Result SecureMonitorWrapper::FreeAesKeyslots(const void *owner) {
|
Result SecureMonitorWrapper::FreeAesKeyslots(const void *owner) {
|
||||||
for (size_t i = 0; i < GetMaxKeyslots(); i++) {
|
for (size_t i = 0; i < GetMaxKeyslots(); i++) {
|
||||||
if (this->keyslot_owners[i] == owner) {
|
if (this->keyslot_owners[i] == owner) {
|
||||||
|
|
|
@ -73,6 +73,9 @@ class SecureMonitorWrapper {
|
||||||
Result AllocateAesKeyslot(u32 *out_keyslot, const void *owner);
|
Result AllocateAesKeyslot(u32 *out_keyslot, const void *owner);
|
||||||
Result FreeAesKeyslot(u32 keyslot, const void *owner);
|
Result FreeAesKeyslot(u32 keyslot, const void *owner);
|
||||||
|
|
||||||
|
/* RSA. */
|
||||||
|
Result DecryptRsaPrivateKey(void *dst, size_t dst_size, const void *src, size_t src_size, const AccessKey &access_key, const KeySource &key_source, u32 option);
|
||||||
|
|
||||||
/* Helper. */
|
/* Helper. */
|
||||||
Result FreeAesKeyslots(const void *owner);
|
Result FreeAesKeyslots(const void *owner);
|
||||||
Handle GetAesKeyslotAvailableEventHandle();
|
Handle GetAesKeyslotAvailableEventHandle();
|
||||||
|
|
|
@ -39,6 +39,20 @@ enum SmcCipherMode : u32 {
|
||||||
SmcCipherMode_Ctr = 2,
|
SmcCipherMode_Ctr = 2,
|
||||||
};
|
};
|
||||||
|
|
||||||
|
enum SmcDecryptOrImportMode : u32 {
|
||||||
|
SmcDecryptOrImportMode_DecryptRsaPrivateKey = 0,
|
||||||
|
SmcDecryptOrImportMode_ImportLotusKey = 1,
|
||||||
|
SmcDecryptOrImportMode_ImportEsKey = 2,
|
||||||
|
SmcDecryptOrImportMode_ImportSslKey = 3,
|
||||||
|
SmcDecryptOrImportMode_ImportDrmKey = 4,
|
||||||
|
};
|
||||||
|
|
||||||
|
enum SmcSecureExpModMode : u32 {
|
||||||
|
SmcSecureExpModMode_Lotus = 0,
|
||||||
|
SmcSecureExpModMode_Ssl = 1,
|
||||||
|
SmcSecureExpModMode_Drm = 2,
|
||||||
|
};
|
||||||
|
|
||||||
enum EsKeyType : u32 {
|
enum EsKeyType : u32 {
|
||||||
EsKeyType_TitleKey = 0,
|
EsKeyType_TitleKey = 0,
|
||||||
EsKeyType_ElicenseKey = 1,
|
EsKeyType_ElicenseKey = 1,
|
||||||
|
|
Loading…
Reference in a new issue