mirror of
				https://github.com/Atmosphere-NX/Atmosphere.git
				synced 2025-10-31 19:25:46 +01:00 
			
		
		
		
	
		
			
				
	
	
		
			520 lines
		
	
	
		
			18 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
			
		
		
	
	
			520 lines
		
	
	
		
			18 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
| /*
 | |
|  * Copyright (c) 2018 Atmosphère-NX
 | |
|  *
 | |
|  * This program is free software; you can redistribute it and/or modify it
 | |
|  * under the terms and conditions of the GNU General Public License,
 | |
|  * version 2, as published by the Free Software Foundation.
 | |
|  *
 | |
|  * This program is distributed in the hope it will be useful, but WITHOUT
 | |
|  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
 | |
|  * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License for
 | |
|  * more details.
 | |
|  *
 | |
|  * You should have received a copy of the GNU General Public License
 | |
|  * along with this program.  If not, see <http://www.gnu.org/licenses/>.
 | |
|  */
 | |
|  
 | |
| #include <switch.h>
 | |
| #include <stratosphere.hpp>
 | |
| #include <atomic>
 | |
| #include <algorithm>
 | |
| #include <strings.h>
 | |
| 
 | |
| #include "debug.hpp"
 | |
| #include "fsmitm_utils.hpp"
 | |
| #include "ini.h"
 | |
| #include "sha256.h"
 | |
| 
 | |
| static FsFileSystem g_sd_filesystem = {0};
 | |
| static std::vector<u64> g_mitm_flagged_tids;
 | |
| static std::vector<u64> g_disable_mitm_flagged_tids;
 | |
| static std::atomic_bool g_has_initialized = false;
 | |
| static std::atomic_bool g_has_hid_session = false;
 | |
| 
 | |
| static u64 g_override_key_combination = KEY_R;
 | |
| static u64 g_override_hbl_tid = 0x010000000000100DULL;
 | |
| static bool g_override_by_default = true;
 | |
| 
 | |
| /* Static buffer for loader.ini contents at runtime. */
 | |
| static char g_config_ini_data[0x800];
 | |
| 
 | |
| /* Backup file for CAL0 partition. */
 | |
| static constexpr size_t ProdinfoSize = 0x8000;
 | |
| static FsFile g_cal0_file = {0};
 | |
| static u8 g_cal0_storage_backup[ProdinfoSize];
 | |
| static u8 g_cal0_backup[ProdinfoSize];
 | |
| 
 | |
| static bool IsHexadecimal(const char *str) {
 | |
|     while (*str) {
 | |
|         if (isxdigit(*str)) {
 | |
|             str++;
 | |
|         } else {
 | |
|             return false;
 | |
|         }
 | |
|     }
 | |
|     return true;
 | |
| }
 | |
| 
 | |
| void Utils::InitializeSdThreadFunc(void *args) {
 | |
|     /* Get required services. */
 | |
|     Handle tmp_hnd = 0;
 | |
|     static const char * const required_active_services[] = {"pcv", "gpio", "pinmux", "psc:c"};
 | |
|     for (unsigned int i = 0; i < sizeof(required_active_services) / sizeof(required_active_services[0]); i++) {
 | |
|         if (R_FAILED(smGetServiceOriginal(&tmp_hnd, smEncodeName(required_active_services[i])))) {
 | |
|             /* TODO: Panic */
 | |
|         } else {
 | |
|             svcCloseHandle(tmp_hnd);   
 | |
|         }
 | |
|     }
 | |
|     
 | |
|     /* Mount SD. */
 | |
|     while (R_FAILED(fsMountSdcard(&g_sd_filesystem))) {
 | |
|         svcSleepThread(1000000ULL);
 | |
|     }
 | |
|     
 | |
|     /* Back up CAL0, if it's not backed up already. */
 | |
|     fsFsCreateDirectory(&g_sd_filesystem, "/atmosphere/automatic_backups");
 | |
|     {
 | |
|         FsStorage cal0_storage;
 | |
|         if (R_FAILED(fsOpenBisStorage(&cal0_storage, BisStorageId_Prodinfo)) || R_FAILED(fsStorageRead(&cal0_storage, 0, g_cal0_storage_backup, ProdinfoSize))) {
 | |
|             std::abort();
 | |
|         }
 | |
|         fsStorageClose(&cal0_storage);
 | |
|         
 | |
|         char serial_number[0x40] = {0};
 | |
|         memcpy(serial_number, g_cal0_storage_backup + 0x250, 0x18);
 | |
|         
 | |
|         
 | |
|         char prodinfo_backup_path[FS_MAX_PATH] = {0};
 | |
|         if (strlen(serial_number) > 0) {
 | |
|             snprintf(prodinfo_backup_path, sizeof(prodinfo_backup_path) - 1, "/atmosphere/automatic_backups/%s_PRODINFO.bin", serial_number);
 | |
|         } else {
 | |
|             snprintf(prodinfo_backup_path, sizeof(prodinfo_backup_path) - 1, "/atmosphere/automatic_backups/PRODINFO.bin");
 | |
|         }
 | |
|         
 | |
|         fsFsCreateFile(&g_sd_filesystem, prodinfo_backup_path, ProdinfoSize, 0);
 | |
|         if (R_SUCCEEDED(fsFsOpenFile(&g_sd_filesystem, prodinfo_backup_path, FS_OPEN_READ | FS_OPEN_WRITE, &g_cal0_file))) {
 | |
|             bool has_auto_backup = false;
 | |
|             size_t read = 0;
 | |
|             if (R_SUCCEEDED(fsFileRead(&g_cal0_file, 0, g_cal0_backup, sizeof(g_cal0_backup), &read)) && read == sizeof(g_cal0_backup)) {
 | |
|                 bool is_cal0_valid = true;
 | |
|                 is_cal0_valid &= memcmp(g_cal0_backup, "CAL0", 4) == 0;
 | |
|                 is_cal0_valid &= memcmp(g_cal0_backup + 0x250, serial_number, 0x18) == 0;
 | |
|                 u32 cal0_size = ((u32 *)g_cal0_backup)[2];
 | |
|                 is_cal0_valid &= cal0_size + 0x40 <= ProdinfoSize;
 | |
|                 if (is_cal0_valid) {
 | |
|                     struct sha256_state sha_ctx;
 | |
|                     u8 calc_hash[0x20];
 | |
|                     sha256_init(&sha_ctx);
 | |
|                     sha256_update(&sha_ctx, g_cal0_backup + 0x40, cal0_size);
 | |
|                     sha256_finalize(&sha_ctx);
 | |
|                     sha256_finish(&sha_ctx, calc_hash);
 | |
|                     is_cal0_valid &= memcmp(calc_hash, g_cal0_backup + 0x20, sizeof(calc_hash)) == 0;
 | |
|                 }
 | |
|                 has_auto_backup = is_cal0_valid;
 | |
|             }
 | |
|             
 | |
|             if (!has_auto_backup) {
 | |
|                 fsFileSetSize(&g_cal0_file, ProdinfoSize);
 | |
|                 fsFileWrite(&g_cal0_file, 0, g_cal0_backup, ProdinfoSize);
 | |
|                 fsFileFlush(&g_cal0_file);
 | |
|             }
 | |
|             
 | |
|             /* NOTE: g_cal0_file is intentionally not closed here. This prevents any other process from opening it. */
 | |
|             memset(g_cal0_storage_backup, 0, sizeof(g_cal0_storage_backup));
 | |
|             memset(g_cal0_backup, 0, sizeof(g_cal0_backup));
 | |
|         }
 | |
|     }
 | |
|     
 | |
|     /* Check for MitM flags. */
 | |
|     FsDir titles_dir;
 | |
|     if (R_SUCCEEDED(fsFsOpenDirectory(&g_sd_filesystem, "/atmosphere/titles", FS_DIROPEN_DIRECTORY, &titles_dir))) {
 | |
|         FsDirectoryEntry dir_entry;
 | |
|         FsFile f;
 | |
|         u64 read_entries;
 | |
|         while (R_SUCCEEDED((fsDirRead(&titles_dir, 0, &read_entries, 1, &dir_entry))) && read_entries == 1) {
 | |
|             if (strlen(dir_entry.name) == 0x10 && IsHexadecimal(dir_entry.name)) {
 | |
|                 u64 title_id = strtoul(dir_entry.name, NULL, 16);
 | |
|                 char title_path[FS_MAX_PATH] = {0};
 | |
|                 strcpy(title_path, "/atmosphere/titles/");
 | |
|                 strcat(title_path, dir_entry.name);
 | |
|                 strcat(title_path, "/flags/fsmitm.flag");
 | |
|                 if (R_SUCCEEDED(fsFsOpenFile(&g_sd_filesystem, title_path, FS_OPEN_READ, &f))) {
 | |
|                     g_mitm_flagged_tids.push_back(title_id);
 | |
|                     fsFileClose(&f);
 | |
|                 } else {
 | |
|                     /* TODO: Deprecate. */
 | |
|                     memset(title_path, 0, sizeof(title_path));
 | |
|                     strcpy(title_path, "/atmosphere/titles/");
 | |
|                     strcat(title_path, dir_entry.name);
 | |
|                     strcat(title_path, "/fsmitm.flag");
 | |
|                     if (R_SUCCEEDED(fsFsOpenFile(&g_sd_filesystem, title_path, FS_OPEN_READ, &f))) {
 | |
|                         g_mitm_flagged_tids.push_back(title_id);
 | |
|                         fsFileClose(&f);
 | |
|                     }
 | |
|                 }
 | |
|                 
 | |
|                 memset(title_path, 0, sizeof(title_path));
 | |
|                 strcpy(title_path, "/atmosphere/titles/");
 | |
|                 strcat(title_path, dir_entry.name);
 | |
|                 strcat(title_path, "/flags/fsmitm_disable.flag");
 | |
|                 if (R_SUCCEEDED(fsFsOpenFile(&g_sd_filesystem, title_path, FS_OPEN_READ, &f))) {
 | |
|                     g_disable_mitm_flagged_tids.push_back(title_id);
 | |
|                     fsFileClose(&f);
 | |
|                 } else {
 | |
|                     /* TODO: Deprecate. */
 | |
|                     memset(title_path, 0, sizeof(title_path));
 | |
|                     strcpy(title_path, "/atmosphere/titles/");
 | |
|                     strcat(title_path, dir_entry.name);
 | |
|                     strcat(title_path, "/fsmitm_disable.flag");
 | |
|                     if (R_SUCCEEDED(fsFsOpenFile(&g_sd_filesystem, title_path, FS_OPEN_READ, &f))) {
 | |
|                         g_disable_mitm_flagged_tids.push_back(title_id);
 | |
|                         fsFileClose(&f);
 | |
|                     }
 | |
|                 }
 | |
|             }
 | |
|         }
 | |
|         fsDirClose(&titles_dir);
 | |
|     }
 | |
|     
 | |
|     Utils::RefreshConfiguration();
 | |
|     
 | |
|     g_has_initialized = true;
 | |
|     
 | |
|     svcExitThread();
 | |
| }
 | |
| 
 | |
| void Utils::InitializeHidThreadFunc(void *args) {
 | |
|     while (R_FAILED(hidInitialize())) {
 | |
|         svcSleepThread(1000ULL);
 | |
|     }
 | |
|     
 | |
|     g_has_hid_session = true;
 | |
|     
 | |
|     svcExitThread();
 | |
| }
 | |
| 
 | |
| bool Utils::IsSdInitialized() {
 | |
|     return g_has_initialized;
 | |
| }
 | |
| 
 | |
| bool Utils::IsHidInitialized() {
 | |
|     return g_has_hid_session;
 | |
| }
 | |
| 
 | |
| Result Utils::OpenSdFile(const char *fn, int flags, FsFile *out) {
 | |
|     if (!IsSdInitialized()) {
 | |
|         return 0xFA202;
 | |
|     }
 | |
|     
 | |
|     return fsFsOpenFile(&g_sd_filesystem, fn, flags, out);
 | |
| }
 | |
| 
 | |
| Result Utils::OpenSdFileForAtmosphere(u64 title_id, const char *fn, int flags, FsFile *out) {
 | |
|     if (!IsSdInitialized()) {
 | |
|         return 0xFA202;
 | |
|     }
 | |
|     
 | |
|     char path[FS_MAX_PATH];
 | |
|     if (*fn == '/') {
 | |
|         snprintf(path, sizeof(path), "/atmosphere/titles/%016lx%s", title_id, fn);
 | |
|     } else {
 | |
|         snprintf(path, sizeof(path), "/atmosphere/titles/%016lx/%s", title_id, fn);
 | |
|     }
 | |
|     return fsFsOpenFile(&g_sd_filesystem, path, flags, out);
 | |
| }
 | |
| 
 | |
| Result Utils::OpenRomFSSdFile(u64 title_id, const char *fn, int flags, FsFile *out) {
 | |
|     if (!IsSdInitialized()) {
 | |
|         return 0xFA202;
 | |
|     }
 | |
|     
 | |
|     return OpenRomFSFile(&g_sd_filesystem, title_id, fn, flags, out);
 | |
| }
 | |
| 
 | |
| Result Utils::OpenSdDir(const char *path, FsDir *out) {
 | |
|     if (!IsSdInitialized()) {
 | |
|         return 0xFA202;
 | |
|     }
 | |
|     
 | |
|     return fsFsOpenDirectory(&g_sd_filesystem, path, FS_DIROPEN_DIRECTORY | FS_DIROPEN_FILE, out);
 | |
| }
 | |
| 
 | |
| Result Utils::OpenSdDirForAtmosphere(u64 title_id, const char *path, FsDir *out) {
 | |
|     if (!IsSdInitialized()) {
 | |
|         return 0xFA202;
 | |
|     }
 | |
|     
 | |
|     char safe_path[FS_MAX_PATH];
 | |
|     if (*path == '/') {
 | |
|         snprintf(safe_path, sizeof(safe_path), "/atmosphere/titles/%016lx%s", title_id, path);
 | |
|     } else {
 | |
|         snprintf(safe_path, sizeof(safe_path), "/atmosphere/titles/%016lx/%s", title_id, path);
 | |
|     }
 | |
|     return fsFsOpenDirectory(&g_sd_filesystem, safe_path, FS_DIROPEN_DIRECTORY | FS_DIROPEN_FILE, out);
 | |
| }
 | |
| 
 | |
| Result Utils::OpenRomFSSdDir(u64 title_id, const char *path, FsDir *out) {
 | |
|     if (!IsSdInitialized()) {
 | |
|         return 0xFA202;
 | |
|     }
 | |
|     
 | |
|     return OpenRomFSDir(&g_sd_filesystem, title_id, path, out);
 | |
| }
 | |
| 
 | |
| 
 | |
| Result Utils::OpenRomFSFile(FsFileSystem *fs, u64 title_id, const char *fn, int flags, FsFile *out) {
 | |
|     char path[FS_MAX_PATH];
 | |
|     if (*fn == '/') {
 | |
|         snprintf(path, sizeof(path), "/atmosphere/titles/%016lx/romfs%s", title_id, fn);
 | |
|     } else {
 | |
|         snprintf(path, sizeof(path), "/atmosphere/titles/%016lx/romfs/%s", title_id, fn);
 | |
|     }
 | |
|     return fsFsOpenFile(fs, path, flags, out);
 | |
| }
 | |
| 
 | |
| Result Utils::OpenRomFSDir(FsFileSystem *fs, u64 title_id, const char *path, FsDir *out) {
 | |
|     char safe_path[FS_MAX_PATH];
 | |
|     if (*path == '/') {
 | |
|         snprintf(safe_path, sizeof(safe_path), "/atmosphere/titles/%016lx/romfs%s", title_id, path);
 | |
|     } else {
 | |
|         snprintf(safe_path, sizeof(safe_path), "/atmosphere/titles/%016lx/romfs/%s", title_id, path);
 | |
|     }
 | |
|     return fsFsOpenDirectory(fs, safe_path, FS_DIROPEN_DIRECTORY | FS_DIROPEN_FILE, out);
 | |
| }
 | |
| 
 | |
| bool Utils::HasSdRomfsContent(u64 title_id) {
 | |
|     /* Check for romfs.bin. */
 | |
|     FsFile data_file;
 | |
|     if (R_SUCCEEDED(Utils::OpenSdFileForAtmosphere(title_id, "romfs.bin", FS_OPEN_READ, &data_file))) {
 | |
|         fsFileClose(&data_file);
 | |
|         return true;
 | |
|     }
 | |
|     
 | |
|     /* Check for romfs folder with non-zero content. */
 | |
|     FsDir dir;
 | |
|     if (R_FAILED(Utils::OpenRomFSSdDir(title_id, "", &dir))) {
 | |
|         return false;
 | |
|     }
 | |
|     ON_SCOPE_EXIT {
 | |
|         fsDirClose(&dir);
 | |
|     };
 | |
|     
 | |
|     FsDirectoryEntry dir_entry;
 | |
|     u64 read_entries;
 | |
|     return R_SUCCEEDED(fsDirRead(&dir, 0, &read_entries, 1, &dir_entry)) && read_entries == 1;
 | |
| }
 | |
| 
 | |
| Result Utils::SaveSdFileForAtmosphere(u64 title_id, const char *fn, void *data, size_t size) {
 | |
|     if (!IsSdInitialized()) {
 | |
|         return 0xFA202;
 | |
|     }
 | |
|     
 | |
|     Result rc = 0;
 | |
|     
 | |
|     char path[FS_MAX_PATH];
 | |
|     if (*fn == '/') {
 | |
|         snprintf(path, sizeof(path), "/atmosphere/titles/%016lx%s", title_id, fn);
 | |
|     } else {
 | |
|         snprintf(path, sizeof(path), "/atmosphere/titles/%016lx/%s", title_id, fn);
 | |
|     }
 | |
|     
 | |
|     /* Unconditionally create. */
 | |
|     FsFile f;
 | |
|     fsFsCreateFile(&g_sd_filesystem, path, size, 0);
 | |
|     
 | |
|     /* Try to open. */
 | |
|     rc = fsFsOpenFile(&g_sd_filesystem, path, FS_OPEN_READ | FS_OPEN_WRITE, &f);
 | |
|     if (R_FAILED(rc)) {
 | |
|         return rc;
 | |
|     }
 | |
|     
 | |
|     /* Always close, if we opened. */
 | |
|     ON_SCOPE_EXIT {
 | |
|         fsFileClose(&f);
 | |
|     };
 | |
|     
 | |
|     /* Try to make it big enough. */
 | |
|     rc = fsFileSetSize(&f, size);
 | |
|     if (R_FAILED(rc)) {
 | |
|         return rc;
 | |
|     }
 | |
|     
 | |
|     /* Try to write the data. */
 | |
|     rc = fsFileWrite(&f, 0, data, size);
 | |
|     
 | |
|     return rc;
 | |
| }
 | |
| 
 | |
| bool Utils::HasTitleFlag(u64 tid, const char *flag) {
 | |
|     if (IsSdInitialized()) {
 | |
|         FsFile f;
 | |
|         char flag_path[FS_MAX_PATH];
 | |
|         
 | |
|         memset(flag_path, 0, sizeof(flag_path));
 | |
|         snprintf(flag_path, sizeof(flag_path) - 1, "flags/%s.flag", flag);
 | |
|         if (OpenSdFileForAtmosphere(tid, flag_path, FS_OPEN_READ, &f)) {
 | |
|             fsFileClose(&f);
 | |
|             return true;
 | |
|         }
 | |
|         
 | |
|         /* TODO: Deprecate. */
 | |
|         snprintf(flag_path, sizeof(flag_path) - 1, "%s.flag", flag);
 | |
|         if (OpenSdFileForAtmosphere(tid, flag_path, FS_OPEN_READ, &f)) {
 | |
|             fsFileClose(&f);
 | |
|             return true;
 | |
|         }
 | |
|     }
 | |
|     return false;
 | |
| }
 | |
| 
 | |
| bool Utils::HasGlobalFlag(const char *flag) {
 | |
|     if (IsSdInitialized()) {
 | |
|         FsFile f;
 | |
|         char flag_path[FS_MAX_PATH] = {0};
 | |
|         snprintf(flag_path, sizeof(flag_path), "/atmosphere/flags/%s.flag", flag);
 | |
|         if (fsFsOpenFile(&g_sd_filesystem, flag_path, FS_OPEN_READ, &f)) {
 | |
|             fsFileClose(&f);
 | |
|             return true;
 | |
|         }
 | |
|     }
 | |
|     return false;
 | |
| }
 | |
| 
 | |
| bool Utils::HasHblFlag(const char *flag) {
 | |
|     char hbl_flag[FS_MAX_PATH] = {0};
 | |
|     snprintf(hbl_flag, sizeof(hbl_flag), "hbl_%s", flag);
 | |
|     return HasGlobalFlag(hbl_flag);
 | |
| }
 | |
| 
 | |
| bool Utils::HasFlag(u64 tid, const char *flag) {
 | |
|     return HasTitleFlag(tid, flag) || (tid == g_override_hbl_tid && HasHblFlag(flag));
 | |
| }
 | |
| 
 | |
| bool Utils::HasSdMitMFlag(u64 tid) {
 | |
|     if (tid == g_override_hbl_tid) {
 | |
|         return true;
 | |
|     }
 | |
|     
 | |
|     if (IsSdInitialized()) {
 | |
|         return std::find(g_mitm_flagged_tids.begin(), g_mitm_flagged_tids.end(), tid) != g_mitm_flagged_tids.end();
 | |
|     }
 | |
|     return false;
 | |
| }
 | |
| 
 | |
| bool Utils::HasSdDisableMitMFlag(u64 tid) {
 | |
|     if (IsSdInitialized()) {
 | |
|         return std::find(g_disable_mitm_flagged_tids.begin(), g_disable_mitm_flagged_tids.end(), tid) != g_disable_mitm_flagged_tids.end();
 | |
|     }
 | |
|     return false;
 | |
| }
 | |
| 
 | |
| Result Utils::GetKeysDown(u64 *keys) {
 | |
|     if (!Utils::IsHidInitialized()) {
 | |
|         return MAKERESULT(Module_Libnx, LibnxError_InitFail_HID);
 | |
|     }
 | |
|     
 | |
|     hidScanInput();
 | |
|     *keys = hidKeysDown(CONTROLLER_P1_AUTO);
 | |
|     
 | |
|     return 0x0;
 | |
| }
 | |
| 
 | |
| bool Utils::HasOverrideButton(u64 tid) {
 | |
|     if (tid < 0x0100000000010000ULL || !IsSdInitialized()) {
 | |
|         /* Disable button override disable for non-applications. */
 | |
|         return true;
 | |
|     }
 | |
|     
 | |
|     /* Unconditionally refresh loader.ini contents. */
 | |
|     RefreshConfiguration();
 | |
|     
 | |
|     u64 kDown = 0;
 | |
|     bool keys_triggered = (R_SUCCEEDED(GetKeysDown(&kDown)) && ((kDown & g_override_key_combination) != 0));
 | |
|     return IsSdInitialized() && (g_override_by_default ^ keys_triggered);
 | |
| }
 | |
| 
 | |
| static int FsMitMIniHandler(void *user, const char *section, const char *name, const char *value) {
 | |
|     /* Taken and modified, with love, from Rajkosto's implementation. */
 | |
|     if (strcasecmp(section, "config") == 0) {
 | |
|         if (strcasecmp(name, "hbl_tid") == 0) {
 | |
|             u64 override_tid = strtoul(value, NULL, 16);
 | |
|             if (override_tid != 0) {
 | |
|                 g_override_hbl_tid = override_tid;
 | |
|             }
 | |
|         } else if (strcasecmp(name, "override_key") == 0) {
 | |
|             if (value[0] == '!') {
 | |
|                 g_override_by_default = true;
 | |
|                 value++;
 | |
|             } else {
 | |
|                 g_override_by_default = false;
 | |
|             }
 | |
|             
 | |
|             if (strcasecmp(value, "A") == 0) {
 | |
|                 g_override_key_combination = KEY_A;
 | |
|             } else if (strcasecmp(value, "B") == 0) {
 | |
|                 g_override_key_combination = KEY_B;
 | |
|             } else if (strcasecmp(value, "X") == 0) {
 | |
|                 g_override_key_combination = KEY_X;
 | |
|             } else if (strcasecmp(value, "Y") == 0) {
 | |
|                 g_override_key_combination = KEY_Y;
 | |
|             } else if (strcasecmp(value, "LS") == 0) {
 | |
|                 g_override_key_combination = KEY_LSTICK;
 | |
|             } else if (strcasecmp(value, "RS") == 0) {
 | |
|                 g_override_key_combination = KEY_RSTICK;
 | |
|             } else if (strcasecmp(value, "L") == 0) {
 | |
|                 g_override_key_combination = KEY_L;
 | |
|             } else if (strcasecmp(value, "R") == 0) {
 | |
|                 g_override_key_combination = KEY_R;
 | |
|             } else if (strcasecmp(value, "ZL") == 0) {
 | |
|                 g_override_key_combination = KEY_ZL;
 | |
|             } else if (strcasecmp(value, "ZR") == 0) {
 | |
|                 g_override_key_combination = KEY_ZR;
 | |
|             } else if (strcasecmp(value, "PLUS") == 0) {
 | |
|                 g_override_key_combination = KEY_PLUS;
 | |
|             } else if (strcasecmp(value, "MINUS") == 0) {
 | |
|                 g_override_key_combination = KEY_MINUS;
 | |
|             } else if (strcasecmp(value, "DLEFT") == 0) {
 | |
|                 g_override_key_combination = KEY_DLEFT;
 | |
|             } else if (strcasecmp(value, "DUP") == 0) {
 | |
|                 g_override_key_combination = KEY_DUP;
 | |
|             } else if (strcasecmp(value, "DRIGHT") == 0) {
 | |
|                 g_override_key_combination = KEY_DRIGHT;
 | |
|             } else if (strcasecmp(value, "DDOWN") == 0) {
 | |
|                 g_override_key_combination = KEY_DDOWN;
 | |
|             } else if (strcasecmp(value, "SL") == 0) {
 | |
|                 g_override_key_combination = KEY_SL;
 | |
|             } else if (strcasecmp(value, "SR") == 0) {
 | |
|                 g_override_key_combination = KEY_SR;
 | |
|             } else {
 | |
|                 g_override_key_combination = 0;
 | |
|             }
 | |
|         }
 | |
|     } else {
 | |
|         return 0;
 | |
|     }
 | |
|     return 1;
 | |
| }
 | |
| 
 | |
| 
 | |
| void Utils::RefreshConfiguration() {
 | |
|     FsFile config_file;
 | |
|     if (R_FAILED(fsFsOpenFile(&g_sd_filesystem, "/atmosphere/loader.ini", FS_OPEN_READ, &config_file))) {
 | |
|         return;
 | |
|     }
 | |
|     
 | |
|     u64 size;
 | |
|     if (R_FAILED(fsFileGetSize(&config_file, &size))) {
 | |
|         return;
 | |
|     }
 | |
|     
 | |
|     size = std::min(size, (decltype(size))0x7FF);
 | |
|     
 | |
|     /* Read in string. */
 | |
|     std::fill(g_config_ini_data, g_config_ini_data + 0x800, 0);
 | |
|     size_t r_s;
 | |
|     fsFileRead(&config_file, 0, g_config_ini_data, size, &r_s);
 | |
|     fsFileClose(&config_file);
 | |
|     
 | |
|     ini_parse_string(g_config_ini_data, FsMitMIniHandler, NULL);
 | |
| } |