mirror of
				https://github.com/Atmosphere-NX/Atmosphere-libs.git
				synced 2025-10-31 03:25:47 +01:00 
			
		
		
		
	
		
			
				
	
	
		
			299 lines
		
	
	
		
			10 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
			
		
		
	
	
			299 lines
		
	
	
		
			10 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
| /*
 | |
|  * Copyright (c) Atmosphère-NX
 | |
|  *
 | |
|  * This program is free software; you can redistribute it and/or modify it
 | |
|  * under the terms and conditions of the GNU General Public License,
 | |
|  * version 2, as published by the Free Software Foundation.
 | |
|  *
 | |
|  * This program is distributed in the hope it will be useful, but WITHOUT
 | |
|  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
 | |
|  * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License for
 | |
|  * more details.
 | |
|  *
 | |
|  * You should have received a copy of the GNU General Public License
 | |
|  * along with this program.  If not, see <http://www.gnu.org/licenses/>.
 | |
|  */
 | |
| #include <stratosphere.hpp>
 | |
| 
 | |
| namespace ams::spl {
 | |
| 
 | |
|     namespace {
 | |
| 
 | |
|         enum class InitializeMode {
 | |
|             None,
 | |
|             General,
 | |
|             Crypto,
 | |
|             Ssl,
 | |
|             Es,
 | |
|             Fs,
 | |
|             Manu
 | |
|         };
 | |
| 
 | |
|         constinit os::SdkMutex g_mutex;
 | |
|         constinit s32 g_initialize_count = 0;
 | |
|         constinit InitializeMode g_initialize_mode = InitializeMode::None;
 | |
| 
 | |
|         Result AllocateAesKeySlotImpl(s32 *out) {
 | |
|             R_RETURN(serviceDispatchOut(splCryptoGetServiceSession(), 21, *out));
 | |
|         }
 | |
| 
 | |
|         Result DeallocateAesKeySlotImpl(s32 slot) {
 | |
|             R_RETURN(serviceDispatchIn(splCryptoGetServiceSession(), 22, slot));
 | |
|         }
 | |
| 
 | |
|         Result GetAesKeySlotAvailableEventImpl(os::NativeHandle *out) {
 | |
|             R_RETURN(serviceDispatch(splCryptoGetServiceSession(), 23,
 | |
|                 .out_handle_attrs = { SfOutHandleAttr_HipcCopy },
 | |
|                 .out_handles = out,
 | |
|             ));
 | |
|         }
 | |
| 
 | |
|         void GetAesKeySlotAvailableEvent(os::SystemEvent *out) {
 | |
|             /* Get event handle. */
 | |
|             os::NativeHandle handle;
 | |
|             R_ABORT_UNLESS(GetAesKeySlotAvailableEventImpl(std::addressof(handle)));
 | |
| 
 | |
|             /* Attach to event. */
 | |
|             out->AttachReadableHandle(handle, true, os::EventClearMode_ManualClear);
 | |
|         }
 | |
| 
 | |
|         template<typename F>
 | |
|         Result WaitAvailableKeySlotAndExecute(F f) {
 | |
|             os::SystemEvent event;
 | |
|             auto is_event_initialized = false;
 | |
|             while (true) {
 | |
|                 R_TRY_CATCH(static_cast<::ams::Result>(f())) {
 | |
|                     R_CATCH(spl::ResultNoAvailableKeySlot) {
 | |
|                         if (!is_event_initialized) {
 | |
|                             GetAesKeySlotAvailableEvent(std::addressof(event));
 | |
|                             is_event_initialized = true;
 | |
|                         }
 | |
|                         event.Wait();
 | |
|                         continue;
 | |
|                     }
 | |
|                 } R_END_TRY_CATCH;
 | |
| 
 | |
|                 R_SUCCEED();
 | |
|             }
 | |
|         }
 | |
| 
 | |
|         template<typename F>
 | |
|         void Initialize(InitializeMode mode, F f) {
 | |
|             std::scoped_lock lk(g_mutex);
 | |
| 
 | |
|             AMS_ASSERT(g_initialize_count >= 0);
 | |
|             AMS_ABORT_UNLESS(mode != InitializeMode::None);
 | |
| 
 | |
|             if (g_initialize_count == 0) {
 | |
|                 AMS_ABORT_UNLESS(g_initialize_mode == InitializeMode::None);
 | |
|                 f();
 | |
|                 g_initialize_mode = mode;
 | |
|             } else {
 | |
|                 AMS_ABORT_UNLESS(g_initialize_mode == mode);
 | |
|             }
 | |
| 
 | |
|             ++g_initialize_count;
 | |
|         }
 | |
| 
 | |
|     }
 | |
| 
 | |
|     void Initialize() {
 | |
|         return Initialize(InitializeMode::General, [&]() {
 | |
|             R_ABORT_UNLESS(splInitialize());
 | |
|         });
 | |
|     }
 | |
| 
 | |
|     void InitializeForCrypto() {
 | |
|         return Initialize(InitializeMode::Crypto, [&]() {
 | |
|             R_ABORT_UNLESS(splCryptoInitialize());
 | |
|         });
 | |
|     }
 | |
| 
 | |
|     void InitializeForSsl() {
 | |
|         return Initialize(InitializeMode::Ssl, [&]() {
 | |
|             R_ABORT_UNLESS(splSslInitialize());
 | |
|         });
 | |
|     }
 | |
| 
 | |
|     void InitializeForEs() {
 | |
|         return Initialize(InitializeMode::Es, [&]() {
 | |
|             R_ABORT_UNLESS(splEsInitialize());
 | |
|         });
 | |
|     }
 | |
| 
 | |
|     void InitializeForFs() {
 | |
|         return Initialize(InitializeMode::Fs, [&]() {
 | |
|             R_ABORT_UNLESS(splFsInitialize());
 | |
|         });
 | |
|     }
 | |
| 
 | |
|     void InitializeForManu() {
 | |
|         return Initialize(InitializeMode::Manu, [&]() {
 | |
|             R_ABORT_UNLESS(splManuInitialize());
 | |
|         });
 | |
|     }
 | |
| 
 | |
|     void Finalize() {
 | |
|         std::scoped_lock lk(g_mutex);
 | |
|         AMS_ASSERT(g_initialize_count > 0);
 | |
|         AMS_ABORT_UNLESS(g_initialize_mode != InitializeMode::None);
 | |
| 
 | |
|         if ((--g_initialize_count) == 0) {
 | |
|             switch (g_initialize_mode) {
 | |
|                 case InitializeMode::General: splExit();       break;
 | |
|                 case InitializeMode::Crypto:  splCryptoExit(); break;
 | |
|                 case InitializeMode::Ssl:     splSslExit();    break;
 | |
|                 case InitializeMode::Es:      splEsExit();     break;
 | |
|                 case InitializeMode::Fs:      splFsExit();     break;
 | |
|                 case InitializeMode::Manu:    splManuExit();   break;
 | |
|                 AMS_UNREACHABLE_DEFAULT_CASE();
 | |
|             }
 | |
|             g_initialize_mode = InitializeMode::None;
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     Result AllocateAesKeySlot(s32 *out_slot) {
 | |
|         R_RETURN(WaitAvailableKeySlotAndExecute([&]() -> Result {
 | |
|             R_RETURN(AllocateAesKeySlotImpl(out_slot));
 | |
|         }));
 | |
|     }
 | |
| 
 | |
|     Result DeallocateAesKeySlot(s32 slot) {
 | |
|         R_RETURN(DeallocateAesKeySlotImpl(slot));
 | |
|     }
 | |
| 
 | |
|     Result GenerateAesKek(AccessKey *access_key, const void *key_source, size_t key_source_size, s32 generation, u32 option) {
 | |
|         AMS_ASSERT(key_source_size == sizeof(KeySource));
 | |
|         AMS_UNUSED(key_source_size);
 | |
| 
 | |
|         R_RETURN(splCryptoGenerateAesKek(key_source, generation, option, static_cast<void *>(access_key)));
 | |
|     }
 | |
| 
 | |
|     Result LoadAesKey(s32 slot, const AccessKey &access_key, const void *key_source, size_t key_source_size) {
 | |
|         AMS_ASSERT(key_source_size == sizeof(KeySource));
 | |
|         AMS_UNUSED(key_source_size);
 | |
| 
 | |
|         R_RETURN(splCryptoLoadAesKey(std::addressof(access_key), key_source, static_cast<u32>(slot)));
 | |
|     }
 | |
| 
 | |
|     Result GenerateAesKey(void *dst, size_t dst_size, const AccessKey &access_key, const void *key_source, size_t key_source_size) {
 | |
|         AMS_ASSERT(dst_size >= crypto::AesEncryptor128::KeySize);
 | |
|         AMS_ASSERT(key_source_size == sizeof(KeySource));
 | |
|         AMS_UNUSED(dst_size, key_source_size);
 | |
| 
 | |
|         R_RETURN(WaitAvailableKeySlotAndExecute([&]() -> Result {
 | |
|             R_RETURN(splCryptoGenerateAesKey(std::addressof(access_key), key_source, dst));
 | |
|         }));
 | |
|     }
 | |
| 
 | |
|     Result GenerateSpecificAesKey(void *dst, size_t dst_size, const void *key_source, size_t key_source_size, s32 generation, u32 option) {
 | |
|         AMS_ASSERT(dst_size >= crypto::AesEncryptor128::KeySize);
 | |
|         AMS_ASSERT(key_source_size == sizeof(KeySource));
 | |
|         AMS_UNUSED(dst_size, key_source_size);
 | |
| 
 | |
|         R_RETURN(splFsGenerateSpecificAesKey(key_source, static_cast<u32>(generation), option, dst));
 | |
|     }
 | |
| 
 | |
|     Result ComputeCtr(void *dst, size_t dst_size, s32 slot, const void *src, size_t src_size, const void *iv, size_t iv_size) {
 | |
|         AMS_ASSERT(iv_size >= 0x10);
 | |
|         AMS_ASSERT(dst_size >= src_size);
 | |
|         AMS_UNUSED(dst_size, iv_size);
 | |
| 
 | |
|         R_RETURN(splCryptoCryptAesCtr(src, dst, src_size, static_cast<s32>(slot), iv));
 | |
|     }
 | |
| 
 | |
|     Result DecryptAesKey(void *dst, size_t dst_size, const void *key_source, size_t key_source_size, s32 generation, u32 option) {
 | |
|         AMS_ASSERT(dst_size >= crypto::AesEncryptor128::KeySize);
 | |
|         AMS_ASSERT(key_source_size == sizeof(KeySource));
 | |
|         AMS_UNUSED(dst_size, key_source_size);
 | |
| 
 | |
|         R_RETURN(WaitAvailableKeySlotAndExecute([&]() -> Result {
 | |
|             R_RETURN(splCryptoDecryptAesKey(key_source, static_cast<u32>(generation), option, dst));
 | |
|         }));
 | |
|     }
 | |
| 
 | |
|     Result GetConfig(u64 *out, ConfigItem item) {
 | |
|         R_RETURN(splGetConfig(static_cast<::SplConfigItem>(item), out));
 | |
|     }
 | |
| 
 | |
|     Result SetConfig(ConfigItem item, u64 v) {
 | |
|         R_RETURN(splSetConfig(static_cast<::SplConfigItem>(item), v));
 | |
|     }
 | |
| 
 | |
|     bool IsDevelopment() {
 | |
|         bool is_dev;
 | |
|         R_ABORT_UNLESS(splIsDevelopment(std::addressof(is_dev)));
 | |
|         return is_dev;
 | |
|     }
 | |
| 
 | |
|     MemoryArrangement GetMemoryArrangement() {
 | |
|         u64 mode = 0;
 | |
|         R_ABORT_UNLESS(spl::GetConfig(std::addressof(mode), spl::ConfigItem::MemoryMode));
 | |
|         switch (mode & 0x3F) {
 | |
|             case 2:
 | |
|                 return MemoryArrangement_StandardForAppletDev;
 | |
|             case 3:
 | |
|                 return MemoryArrangement_StandardForSystemDev;
 | |
|             case 17:
 | |
|                 return MemoryArrangement_Expanded;
 | |
|             case 18:
 | |
|                 return MemoryArrangement_ExpandedForAppletDev;
 | |
|             default:
 | |
|                 return MemoryArrangement_Standard;
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     Result SetBootReason(BootReasonValue boot_reason) {
 | |
|         static_assert(sizeof(boot_reason) == sizeof(u32));
 | |
| 
 | |
|         u32 v;
 | |
|         std::memcpy(std::addressof(v), std::addressof(boot_reason), sizeof(v));
 | |
| 
 | |
|         R_RETURN(splSetBootReason(v));
 | |
|     }
 | |
| 
 | |
|     Result GetBootReason(BootReasonValue *out) {
 | |
|         static_assert(sizeof(*out) == sizeof(u32));
 | |
| 
 | |
|         u32 v;
 | |
|         R_TRY(splGetBootReason(std::addressof(v)));
 | |
| 
 | |
|         std::memcpy(out, std::addressof(v), sizeof(*out));
 | |
|         R_SUCCEED();
 | |
|     }
 | |
| 
 | |
|     SocType GetSocType() {
 | |
|         switch (GetHardwareType()) {
 | |
|             case HardwareType::Icosa:
 | |
|             case HardwareType::Copper:
 | |
|                 return SocType_Erista;
 | |
|             case HardwareType::Hoag:
 | |
|             case HardwareType::Iowa:
 | |
|             case HardwareType::Aula:
 | |
|                 return SocType_Mariko;
 | |
|             AMS_UNREACHABLE_DEFAULT_CASE();
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     Result GetPackage2Hash(void *dst, size_t dst_size) {
 | |
|         AMS_ASSERT(dst_size >= crypto::Sha256Generator::HashSize);
 | |
|         AMS_UNUSED(dst_size);
 | |
|         R_RETURN(splFsGetPackage2Hash(dst));
 | |
|     }
 | |
| 
 | |
|     Result GenerateRandomBytes(void *out, size_t buffer_size) {
 | |
|         R_RETURN(splGetRandomBytes(out, buffer_size));
 | |
|     }
 | |
| 
 | |
|     Result LoadPreparedAesKey(s32 slot, const AccessKey &access_key) {
 | |
|         if (g_initialize_mode == InitializeMode::Fs) {
 | |
|             R_RETURN(splFsLoadTitlekey(std::addressof(access_key), static_cast<u32>(slot)));
 | |
|         } else {
 | |
|             /* TODO: libnx binding not available. */
 | |
|             /* R_RETURN(splEsLoadTitlekey(std::addressof(access_key), static_cast<u32>(slot))); */
 | |
|             AMS_ABORT_UNLESS(false);
 | |
|         }
 | |
|     }
 | |
| 
 | |
| }
 |