1
0
Fork 0
mirror of https://github.com/CTCaer/hekate.git synced 2024-11-26 19:52:11 +00:00
hekate/bootloader/hos/hos.h

136 lines
2.9 KiB
C
Raw Normal View History

2018-03-27 00:04:16 +01:00
/*
2018-08-05 12:40:32 +01:00
* Copyright (c) 2018 naehrwert
* Copyright (c) 2018-2021 CTCaer
2018-08-05 12:40:32 +01:00
*
* This program is free software; you can redistribute it and/or modify it
* under the terms and conditions of the GNU General Public License,
* version 2, as published by the Free Software Foundation.
*
* This program is distributed in the hope it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
* more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
2018-03-27 00:04:16 +01:00
2018-05-01 06:15:48 +01:00
#ifndef _HOS_H_
#define _HOS_H_
2018-11-28 19:26:16 +00:00
#include "pkg1.h"
#include "pkg2.h"
#include <sec/se_t210.h>
#include <utils/types.h>
#include <utils/ini.h>
#include <sec/tsec.h>
2020-04-30 01:43:29 +01:00
#include <assert.h>
#define KB_FIRMWARE_VERSION_100_200 0
#define KB_FIRMWARE_VERSION_300 1
#define KB_FIRMWARE_VERSION_301 2
#define KB_FIRMWARE_VERSION_400 3
#define KB_FIRMWARE_VERSION_500 4
#define KB_FIRMWARE_VERSION_600 5
#define KB_FIRMWARE_VERSION_620 6
2019-02-24 00:58:15 +00:00
#define KB_FIRMWARE_VERSION_700 7
2019-06-30 01:29:46 +01:00
#define KB_FIRMWARE_VERSION_810 8
2019-09-12 21:41:08 +01:00
#define KB_FIRMWARE_VERSION_900 9
2019-12-08 01:01:21 +00:00
#define KB_FIRMWARE_VERSION_910 10
#define KB_FIRMWARE_VERSION_MAX KB_FIRMWARE_VERSION_910
#define HOS_PKG11_MAGIC 0x31314B50
2020-04-30 01:43:29 +01:00
#define HOS_EKS_MAGIC 0x30534B45
// Use official Mariko secmon when in stock.
//#define HOS_MARIKO_STOCK_SECMON
2020-04-30 01:43:29 +01:00
typedef struct _exo_ctxt_t
{
2020-06-14 11:58:03 +01:00
bool fs_is_510;
2020-04-30 01:43:29 +01:00
bool no_user_exceptions;
bool user_pmu;
bool *cal0_blank;
bool *cal0_allow_writes_sys;
} exo_ctxt_t;
typedef struct _hos_eks_keys_t
{
u8 mkk[SE_KEY_128_SIZE];
u8 fdk[SE_KEY_128_SIZE];
2020-04-30 01:43:29 +01:00
} hos_eks_keys_t;
typedef struct _hos_eks_bis_keys_t
{
u8 crypt[SE_KEY_128_SIZE];
u8 tweak[SE_KEY_128_SIZE];
} hos_eks_bis_keys_t;
2020-04-30 01:43:29 +01:00
typedef struct _hos_eks_mbr_t
{
u32 magic;
2020-07-17 16:00:32 +01:00
u8 enabled[5];
u8 enabled_bis;
2020-07-17 16:00:32 +01:00
u8 rsvd[2];
2020-11-15 11:43:22 +00:00
u32 lot0;
u8 dkg[SE_KEY_128_SIZE];
u8 dkk[SE_KEY_128_SIZE];
2020-07-17 16:00:32 +01:00
hos_eks_keys_t keys[5];
hos_eks_bis_keys_t bis_keys[3];
2020-04-30 01:43:29 +01:00
} hos_eks_mbr_t;
2020-07-17 16:00:32 +01:00
static_assert(sizeof(hos_eks_mbr_t) == 304, "HOS EKS size is wrong!");
2018-11-28 19:26:16 +00:00
typedef struct _launch_ctxt_t
{
void *keyblob;
void *pkg1;
const pkg1_id_t *pkg1_id;
const pkg2_kernel_id_t *pkg2_kernel_id;
void *warmboot;
u32 warmboot_size;
void *secmon;
u32 secmon_size;
void *exofatal;
u32 exofatal_size;
2018-11-28 19:26:16 +00:00
void *pkg2;
u32 pkg2_size;
2020-01-19 13:22:59 +00:00
bool new_pkg2;
2018-11-28 19:26:16 +00:00
void *kernel;
u32 kernel_size;
2020-10-17 21:16:16 +01:00
2018-11-28 19:26:16 +00:00
link_t kip1_list;
char* kip1_patches;
2020-01-19 13:22:59 +00:00
u32 fss0_hosver;
2018-11-28 19:26:16 +00:00
bool svcperm;
bool debugmode;
bool stock;
2018-11-28 19:26:16 +00:00
bool atmosphere;
2020-10-17 21:16:16 +01:00
bool fss0_experimental;
2020-04-30 02:25:51 +01:00
bool emummc_forced;
exo_ctxt_t exo_ctx;
ini_sec_t *cfg;
2018-11-28 19:26:16 +00:00
} launch_ctxt_t;
typedef struct _merge_kip_t
{
void *kip1;
link_t link;
} merge_kip_t;
2020-04-30 01:43:29 +01:00
void hos_eks_get();
void hos_eks_save(u32 kb);
void hos_eks_clear(u32 kb);
int hos_launch(ini_sec_t *cfg);
int hos_keygen(void *keyblob, u32 kb, tsec_ctxt_t *tsec_ctxt, launch_ctxt_t *hos_ctxt);
#endif