mirror of
https://github.com/Atmosphere-NX/Atmosphere.git
synced 2024-11-05 19:51:45 +00:00
334 lines
11 KiB
C++
334 lines
11 KiB
C++
/*
|
|
* Copyright (c) 2018-2019 Atmosphère-NX
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify it
|
|
* under the terms and conditions of the GNU General Public License,
|
|
* version 2, as published by the Free Software Foundation.
|
|
*
|
|
* This program is distributed in the hope it will be useful, but WITHOUT
|
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
|
|
* more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include <switch.h>
|
|
#include <stratosphere.hpp>
|
|
|
|
#include "spl_smc_wrapper.hpp"
|
|
|
|
enum SmcFunctionId : u32 {
|
|
SmcFunctionId_SetConfig = 0xC3000401,
|
|
SmcFunctionId_GetConfig = 0xC3000002,
|
|
SmcFunctionId_CheckStatus = 0xC3000003,
|
|
SmcFunctionId_GetResult = 0xC3000404,
|
|
SmcFunctionId_ExpMod = 0xC3000E05,
|
|
SmcFunctionId_GenerateRandomBytes = 0xC3000006,
|
|
SmcFunctionId_GenerateAesKek = 0xC3000007,
|
|
SmcFunctionId_LoadAesKey = 0xC3000008,
|
|
SmcFunctionId_CryptAes = 0xC3000009,
|
|
SmcFunctionId_GenerateSpecificAesKey = 0xC300000A,
|
|
SmcFunctionId_ComputeCmac = 0xC300040B,
|
|
SmcFunctionId_ReEncryptRsaPrivateKey = 0xC300D60C,
|
|
SmcFunctionId_DecryptOrImportRsaPrivateKey = 0xC300100D,
|
|
|
|
SmcFunctionId_SecureExpMod = 0xC300060F,
|
|
SmcFunctionId_UnwrapTitleKey = 0xC3000610,
|
|
SmcFunctionId_LoadTitleKey = 0xC3000011,
|
|
SmcFunctionId_UnwrapCommonTitleKey = 0xC3000012,
|
|
|
|
/* Deprecated functions. */
|
|
SmcFunctionId_ImportEsKey = 0xC300100C,
|
|
SmcFunctionId_DecryptRsaPrivateKey = 0xC300100D,
|
|
SmcFunctionId_ImportSecureExpModKey = 0xC300100E,
|
|
};
|
|
|
|
SmcResult SmcWrapper::SetConfig(SplConfigItem which, const u64 *value, size_t num_qwords) {
|
|
SecmonArgs args;
|
|
|
|
args.X[0] = SmcFunctionId_SetConfig;
|
|
args.X[1] = which;
|
|
args.X[2] = 0;
|
|
for (size_t i = 0; i < std::min(size_t(4), num_qwords); i++) {
|
|
args.X[3 + i] = value[i];
|
|
}
|
|
svcCallSecureMonitor(&args);
|
|
|
|
return static_cast<SmcResult>(args.X[0]);
|
|
}
|
|
|
|
SmcResult SmcWrapper::GetConfig(u64 *out, size_t num_qwords, SplConfigItem which) {
|
|
SecmonArgs args;
|
|
|
|
args.X[0] = SmcFunctionId_GetConfig;
|
|
args.X[1] = which;
|
|
svcCallSecureMonitor(&args);
|
|
|
|
for (size_t i = 0; i < std::min(size_t(4), num_qwords); i++) {
|
|
out[i] = args.X[1 + i];
|
|
}
|
|
return static_cast<SmcResult>(args.X[0]);
|
|
}
|
|
|
|
SmcResult SmcWrapper::CheckStatus(SmcResult *out, AsyncOperationKey op) {
|
|
SecmonArgs args;
|
|
|
|
args.X[0] = SmcFunctionId_CheckStatus;
|
|
args.X[1] = op.value;
|
|
svcCallSecureMonitor(&args);
|
|
|
|
*out = static_cast<SmcResult>(args.X[1]);
|
|
return static_cast<SmcResult>(args.X[0]);
|
|
}
|
|
|
|
SmcResult SmcWrapper::GetResult(SmcResult *out, void *out_buf, size_t out_buf_size, AsyncOperationKey op) {
|
|
SecmonArgs args;
|
|
|
|
args.X[0] = SmcFunctionId_GetResult;
|
|
args.X[1] = op.value;
|
|
args.X[2] = reinterpret_cast<u64>(out_buf);
|
|
args.X[3] = out_buf_size;
|
|
svcCallSecureMonitor(&args);
|
|
|
|
*out = static_cast<SmcResult>(args.X[1]);
|
|
return static_cast<SmcResult>(args.X[0]);
|
|
}
|
|
|
|
SmcResult SmcWrapper::ExpMod(AsyncOperationKey *out_op, const void *base, const void *exp, size_t exp_size, const void *mod) {
|
|
SecmonArgs args;
|
|
|
|
args.X[0] = SmcFunctionId_ExpMod;
|
|
args.X[1] = reinterpret_cast<u64>(base);
|
|
args.X[2] = reinterpret_cast<u64>(exp);
|
|
args.X[3] = reinterpret_cast<u64>(mod);
|
|
args.X[4] = exp_size;
|
|
svcCallSecureMonitor(&args);
|
|
|
|
out_op->value = args.X[1];
|
|
return static_cast<SmcResult>(args.X[0]);
|
|
}
|
|
|
|
SmcResult SmcWrapper::GenerateRandomBytes(void *out, size_t size) {
|
|
SecmonArgs args;
|
|
|
|
args.X[0] = SmcFunctionId_GenerateRandomBytes;
|
|
args.X[1] = size;
|
|
svcCallSecureMonitor(&args);
|
|
|
|
if (args.X[0] == SmcResult_Success && (size <= sizeof(args) - sizeof(args.X[0]))) {
|
|
std::memcpy(out, &args.X[1], size);
|
|
}
|
|
return static_cast<SmcResult>(args.X[0]);
|
|
}
|
|
|
|
SmcResult SmcWrapper::GenerateAesKek(AccessKey *out, const KeySource &source, u32 generation, u32 option) {
|
|
SecmonArgs args;
|
|
|
|
args.X[0] = SmcFunctionId_GenerateAesKek;
|
|
args.X[1] = source.data64[0];
|
|
args.X[2] = source.data64[1];
|
|
args.X[3] = generation;
|
|
args.X[4] = option;
|
|
svcCallSecureMonitor(&args);
|
|
|
|
out->data64[0] = args.X[1];
|
|
out->data64[1] = args.X[2];
|
|
return static_cast<SmcResult>(args.X[0]);
|
|
}
|
|
|
|
SmcResult SmcWrapper::LoadAesKey(u32 keyslot, const AccessKey &access_key, const KeySource &source) {
|
|
SecmonArgs args;
|
|
|
|
args.X[0] = SmcFunctionId_LoadAesKey;
|
|
args.X[1] = keyslot;
|
|
args.X[2] = access_key.data64[0];
|
|
args.X[3] = access_key.data64[1];
|
|
args.X[4] = source.data64[0];
|
|
args.X[5] = source.data64[1];
|
|
svcCallSecureMonitor(&args);
|
|
|
|
return static_cast<SmcResult>(args.X[0]);
|
|
}
|
|
|
|
SmcResult SmcWrapper::CryptAes(AsyncOperationKey *out_op, u32 mode, const IvCtr &iv_ctr, u32 dst_addr, u32 src_addr, size_t size) {
|
|
SecmonArgs args;
|
|
|
|
args.X[0] = SmcFunctionId_CryptAes;
|
|
args.X[1] = mode;
|
|
args.X[2] = iv_ctr.data64[0];
|
|
args.X[3] = iv_ctr.data64[1];
|
|
args.X[4] = src_addr;
|
|
args.X[5] = dst_addr;
|
|
args.X[6] = size;
|
|
svcCallSecureMonitor(&args);
|
|
|
|
out_op->value = args.X[1];
|
|
return static_cast<SmcResult>(args.X[0]);
|
|
}
|
|
|
|
SmcResult SmcWrapper::GenerateSpecificAesKey(u64 *out, const KeySource &source, u32 generation, u32 which) {
|
|
SecmonArgs args;
|
|
|
|
args.X[0] = SmcFunctionId_GenerateSpecificAesKey;
|
|
args.X[1] = source.data64[0];
|
|
args.X[2] = source.data64[1];
|
|
args.X[3] = generation;
|
|
args.X[4] = which;
|
|
svcCallSecureMonitor(&args);
|
|
|
|
return static_cast<SmcResult>(args.X[0]);
|
|
}
|
|
|
|
SmcResult SmcWrapper::ComputeCmac(Cmac *out_mac, u32 keyslot, const void *data, size_t size) {
|
|
SecmonArgs args;
|
|
|
|
args.X[0] = SmcFunctionId_ComputeCmac;
|
|
args.X[1] = keyslot;
|
|
args.X[2] = reinterpret_cast<u64>(data);
|
|
args.X[3] = size;
|
|
svcCallSecureMonitor(&args);
|
|
|
|
out_mac->data64[0] = args.X[1];
|
|
out_mac->data64[1] = args.X[2];
|
|
return static_cast<SmcResult>(args.X[0]);
|
|
}
|
|
|
|
SmcResult SmcWrapper::ReEncryptRsaPrivateKey(void *data, size_t size, const AccessKey &access_key_dec, const KeySource &source_dec, const AccessKey &access_key_enc, const KeySource &source_enc, u32 option) {
|
|
SecmonArgs args;
|
|
|
|
args.X[0] = SmcFunctionId_ReEncryptRsaPrivateKey;
|
|
args.X[1] = reinterpret_cast<u64>(&access_key_dec);
|
|
args.X[2] = reinterpret_cast<u64>(&access_key_enc);
|
|
args.X[3] = option;
|
|
args.X[4] = reinterpret_cast<u64>(data);
|
|
args.X[5] = size;
|
|
args.X[6] = reinterpret_cast<u64>(&source_dec);
|
|
args.X[7] = reinterpret_cast<u64>(&source_enc);
|
|
svcCallSecureMonitor(&args);
|
|
|
|
return static_cast<SmcResult>(args.X[0]);
|
|
}
|
|
|
|
SmcResult SmcWrapper::DecryptOrImportRsaPrivateKey(void *data, size_t size, const AccessKey &access_key, const KeySource &source, u32 option) {
|
|
SecmonArgs args;
|
|
|
|
args.X[0] = SmcFunctionId_DecryptOrImportRsaPrivateKey;
|
|
args.X[1] = access_key.data64[0];
|
|
args.X[2] = access_key.data64[1];
|
|
args.X[3] = option;
|
|
args.X[4] = reinterpret_cast<u64>(data);
|
|
args.X[5] = size;
|
|
args.X[6] = source.data64[0];
|
|
args.X[7] = source.data64[1];
|
|
svcCallSecureMonitor(&args);
|
|
|
|
return static_cast<SmcResult>(args.X[0]);
|
|
}
|
|
|
|
SmcResult SmcWrapper::SecureExpMod(AsyncOperationKey *out_op, const void *base, const void *mod, u32 option) {
|
|
SecmonArgs args;
|
|
|
|
args.X[0] = SmcFunctionId_SecureExpMod;
|
|
args.X[1] = reinterpret_cast<u64>(base);
|
|
args.X[2] = reinterpret_cast<u64>(mod);
|
|
args.X[3] = option;
|
|
svcCallSecureMonitor(&args);
|
|
|
|
out_op->value = args.X[1];
|
|
return static_cast<SmcResult>(args.X[0]);
|
|
}
|
|
|
|
SmcResult SmcWrapper::UnwrapTitleKey(AsyncOperationKey *out_op, const void *base, const void *mod, const void *label_digest, size_t label_digest_size, u32 option) {
|
|
SecmonArgs args;
|
|
|
|
args.X[0] = SmcFunctionId_UnwrapTitleKey;
|
|
args.X[1] = reinterpret_cast<u64>(base);
|
|
args.X[2] = reinterpret_cast<u64>(mod);
|
|
std::memset(&args.X[3], 0, 4 * sizeof(args.X[3]));
|
|
std::memcpy(&args.X[3], label_digest, std::min(size_t(4 * sizeof(args.X[3])), label_digest_size));
|
|
args.X[7] = option;
|
|
svcCallSecureMonitor(&args);
|
|
|
|
out_op->value = args.X[1];
|
|
return static_cast<SmcResult>(args.X[0]);
|
|
}
|
|
|
|
SmcResult SmcWrapper::LoadTitleKey(u32 keyslot, const AccessKey &access_key) {
|
|
SecmonArgs args;
|
|
|
|
args.X[0] = SmcFunctionId_LoadTitleKey;
|
|
args.X[1] = keyslot;
|
|
args.X[2] = access_key.data64[0];
|
|
args.X[3] = access_key.data64[1];
|
|
svcCallSecureMonitor(&args);
|
|
|
|
return static_cast<SmcResult>(args.X[0]);
|
|
}
|
|
|
|
SmcResult SmcWrapper::UnwrapCommonTitleKey(AccessKey *out, const KeySource &source, u32 generation) {
|
|
SecmonArgs args;
|
|
|
|
args.X[0] = SmcFunctionId_UnwrapCommonTitleKey;
|
|
args.X[1] = source.data64[0];
|
|
args.X[2] = source.data64[1];
|
|
args.X[3] = generation;
|
|
svcCallSecureMonitor(&args);
|
|
|
|
out->data64[0] = args.X[1];
|
|
out->data64[1] = args.X[2];
|
|
return static_cast<SmcResult>(args.X[0]);
|
|
}
|
|
|
|
|
|
/* Deprecated functions. */
|
|
SmcResult SmcWrapper::ImportEsKey(const void *data, size_t size, const AccessKey &access_key, const KeySource &source, u32 option) {
|
|
SecmonArgs args;
|
|
|
|
args.X[0] = SmcFunctionId_ImportEsKey;
|
|
args.X[1] = access_key.data64[0];
|
|
args.X[2] = access_key.data64[1];
|
|
args.X[3] = option;
|
|
args.X[4] = reinterpret_cast<u64>(data);
|
|
args.X[5] = size;
|
|
args.X[6] = source.data64[0];
|
|
args.X[7] = source.data64[1];
|
|
svcCallSecureMonitor(&args);
|
|
|
|
return static_cast<SmcResult>(args.X[0]);
|
|
}
|
|
|
|
SmcResult SmcWrapper::DecryptRsaPrivateKey(size_t *out_size, void *data, size_t size, const AccessKey &access_key, const KeySource &source, u32 option) {
|
|
SecmonArgs args;
|
|
|
|
args.X[0] = SmcFunctionId_DecryptRsaPrivateKey;
|
|
args.X[1] = access_key.data64[0];
|
|
args.X[2] = access_key.data64[1];
|
|
args.X[3] = option;
|
|
args.X[4] = reinterpret_cast<u64>(data);
|
|
args.X[5] = size;
|
|
args.X[6] = source.data64[0];
|
|
args.X[7] = source.data64[1];
|
|
svcCallSecureMonitor(&args);
|
|
|
|
*out_size = static_cast<size_t>(args.X[1]);
|
|
return static_cast<SmcResult>(args.X[0]);
|
|
}
|
|
|
|
SmcResult SmcWrapper::ImportSecureExpModKey(const void *data, size_t size, const AccessKey &access_key, const KeySource &source, u32 option) {
|
|
SecmonArgs args;
|
|
|
|
args.X[0] = SmcFunctionId_ImportSecureExpModKey;
|
|
args.X[1] = access_key.data64[0];
|
|
args.X[2] = access_key.data64[1];
|
|
args.X[3] = option;
|
|
args.X[4] = reinterpret_cast<u64>(data);
|
|
args.X[5] = size;
|
|
args.X[6] = source.data64[0];
|
|
args.X[7] = source.data64[1];
|
|
svcCallSecureMonitor(&args);
|
|
|
|
return static_cast<SmcResult>(args.X[0]);
|
|
}
|
|
|