mirror of
https://github.com/DarkMatterCore/nxdumptool.git
synced 2024-11-26 20:22:17 +00:00
99429fd7b4
* Updated disclaimer in all source files. * Improved signed payload (certificate, ticket) handling. * Prefer strlen + strcmp over strncmp whenever possible. * Simplify header file inclusions in source files. * Simplify background gamecard thread logic. * Properly close keys file handle if there's a key parse error. * Update NcaKeyGeneration enum. * Small changes to save.c/h. Will probably have to revert some USB changes...
103 lines
3.9 KiB
C
103 lines
3.9 KiB
C
/*
|
|
* signature.h
|
|
*
|
|
* Copyright (c) 2020, DarkMatterCore <pabloacurielz@gmail.com>.
|
|
*
|
|
* This file is part of nxdumptool (https://github.com/DarkMatterCore/nxdumptool).
|
|
*
|
|
* nxdumptool is free software; you can redistribute it and/or modify it
|
|
* under the terms and conditions of the GNU General Public License,
|
|
* version 2, as published by the Free Software Foundation.
|
|
*
|
|
* nxdumptool is distributed in the hope it will be useful, but WITHOUT
|
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
|
|
* more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#pragma once
|
|
|
|
#ifndef __SIGNATURE_H__
|
|
#define __SIGNATURE_H__
|
|
|
|
typedef enum {
|
|
SignatureType_Rsa4096Sha1 = 0x10000,
|
|
SignatureType_Rsa2048Sha1 = 0x10001,
|
|
SignatureType_Ecc480Sha1 = 0x10002,
|
|
SignatureType_Rsa4096Sha256 = 0x10003,
|
|
SignatureType_Rsa2048Sha256 = 0x10004,
|
|
SignatureType_Ecc480Sha256 = 0x10005,
|
|
SignatureType_Hmac160Sha1 = 0x10006
|
|
} SignatureType;
|
|
|
|
typedef struct {
|
|
u32 sig_type; ///< SignatureType_Rsa4096Sha1, SignatureType_Rsa4096Sha256.
|
|
u8 signature[0x200];
|
|
u8 padding[0x3C];
|
|
} SignatureBlockRsa4096;
|
|
|
|
typedef struct {
|
|
u32 sig_type; ///< SignatureType_Rsa2048Sha1, SignatureType_Rsa2048Sha256.
|
|
u8 signature[0x100];
|
|
u8 padding[0x3C];
|
|
} SignatureBlockRsa2048;
|
|
|
|
typedef struct {
|
|
u32 sig_type; ///< SignatureType_Ecc480Sha1, SignatureType_Ecc480Sha256.
|
|
u8 signature[0x3C];
|
|
u8 padding[0x40];
|
|
} SignatureBlockEcc480;
|
|
|
|
typedef struct {
|
|
u32 sig_type; ///< SignatureType_Hmac160Sha1.
|
|
u8 signature[0x14];
|
|
u8 padding[0x28];
|
|
} SignatureBlockHmac160;
|
|
|
|
/// Helper inline functions.
|
|
|
|
NX_INLINE u32 signatureGetSigType(void *buf, bool byteswap)
|
|
{
|
|
if (!buf) return 0;
|
|
return (byteswap ? __builtin_bswap32(*((u32*)buf)) : *((u32*)buf));
|
|
}
|
|
|
|
NX_INLINE bool signatureIsValidSigType(u32 type)
|
|
{
|
|
return (type == SignatureType_Rsa4096Sha1 || type == SignatureType_Rsa2048Sha1 || type == SignatureType_Ecc480Sha1 || \
|
|
type == SignatureType_Rsa4096Sha256 || type == SignatureType_Rsa2048Sha256 || type == SignatureType_Ecc480Sha256 || \
|
|
type == SignatureType_Hmac160Sha1);
|
|
}
|
|
|
|
NX_INLINE u8 *signatureGetSig(void *buf)
|
|
{
|
|
return (buf ? ((u8*)buf + 4) : NULL);
|
|
}
|
|
|
|
NX_INLINE u64 signatureGetSigSize(u32 type)
|
|
{
|
|
return (u64)((type == SignatureType_Rsa4096Sha1 || type == SignatureType_Rsa4096Sha256) ? MEMBER_SIZE(SignatureBlockRsa4096, signature) : \
|
|
((type == SignatureType_Rsa2048Sha1 || type == SignatureType_Rsa2048Sha256) ? MEMBER_SIZE(SignatureBlockRsa2048, signature) : \
|
|
((type == SignatureType_Ecc480Sha1 || type == SignatureType_Ecc480Sha256) ? MEMBER_SIZE(SignatureBlockEcc480, signature) : \
|
|
(type == SignatureType_Hmac160Sha1 ? MEMBER_SIZE(SignatureBlockHmac160, signature) : 0))));
|
|
}
|
|
|
|
NX_INLINE u64 signatureGetBlockSize(u32 type)
|
|
{
|
|
return (u64)((type == SignatureType_Rsa4096Sha1 || type == SignatureType_Rsa4096Sha256) ? sizeof(SignatureBlockRsa4096) : \
|
|
((type == SignatureType_Rsa2048Sha1 || type == SignatureType_Rsa2048Sha256) ? sizeof(SignatureBlockRsa2048) : \
|
|
((type == SignatureType_Ecc480Sha1 || type == SignatureType_Ecc480Sha256) ? sizeof(SignatureBlockEcc480) : \
|
|
(type == SignatureType_Hmac160Sha1 ? sizeof(SignatureBlockHmac160) : 0))));
|
|
}
|
|
|
|
NX_INLINE void *signatureGetPayload(void *buf, bool big_endian_sig_type)
|
|
{
|
|
if (!buf) return NULL;
|
|
u32 sig_type = signatureGetSigType(buf, big_endian_sig_type);
|
|
return (signatureIsValidSigType(sig_type) ? (void*)((u8*)buf + signatureGetBlockSize(sig_type)) : NULL);
|
|
}
|
|
|
|
#endif /* __SIGNATURE_H__ */
|