/* * Copyright (c) 2018-2020 Atmosphère-NX * * This program is free software; you can redistribute it and/or modify it * under the terms and conditions of the GNU General Public License, * version 2, as published by the Free Software Foundation. * * This program is distributed in the hope it will be useful, but WITHOUT * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for * more details. * * You should have received a copy of the GNU General Public License * along with this program. If not, see . */ #include namespace ams::fssystem { void AesCtrStorage::MakeIv(void *dst, size_t dst_size, u64 upper, s64 offset) { /* TODO: util::BytePtr? */ AMS_ASSERT(dst != nullptr); AMS_ASSERT(dst_size == IvSize); AMS_ASSERT(offset >= 0); const uintptr_t out_addr = reinterpret_cast(dst); util::StoreBigEndian(reinterpret_cast(out_addr + 0), upper); util::StoreBigEndian(reinterpret_cast(out_addr + sizeof(u64)), static_cast(offset / BlockSize)); } AesCtrStorage::AesCtrStorage(IStorage *base, const void *key, size_t key_size, const void *iv, size_t iv_size) : base_storage(base) { AMS_ASSERT(base != nullptr); AMS_ASSERT(key != nullptr); AMS_ASSERT(iv != nullptr); AMS_ASSERT(key_size == KeySize); AMS_ASSERT(iv_size == IvSize); std::memcpy(this->key, key, KeySize); std::memcpy(this->iv, iv, IvSize); } Result AesCtrStorage::Read(s64 offset, void *buffer, size_t size) { /* Allow zero-size writes. */ R_SUCCEED_IF(size == 0); /* Ensure buffer is valid. */ R_UNLESS(buffer != nullptr, fs::ResultNullptrArgument()); /* We can only read at block aligned offsets. */ R_UNLESS(util::IsAligned(offset, BlockSize), fs::ResultInvalidArgument()); R_UNLESS(util::IsAligned(size, BlockSize), fs::ResultInvalidArgument()); /* Read the data. */ R_TRY(this->base_storage->Read(offset, buffer, size)); /* Prepare to decrypt the data, with temporarily increased priority. */ ScopedThreadPriorityChanger cp(+1, ScopedThreadPriorityChanger::Mode::Relative); /* Setup the counter. */ char ctr[IvSize]; std::memcpy(ctr, this->iv, IvSize); AddCounter(ctr, IvSize, offset / BlockSize); /* Decrypt, ensure we decrypt correctly. */ auto dec_size = crypto::DecryptAes128Ctr(buffer, size, this->key, KeySize, ctr, IvSize, buffer, size); AMS_ABORT_UNLESS(size == dec_size); return ResultSuccess(); } Result AesCtrStorage::Write(s64 offset, const void *buffer, size_t size) { /* Allow zero-size writes. */ R_SUCCEED_IF(size == 0); /* Ensure buffer is valid. */ R_UNLESS(buffer != nullptr, fs::ResultNullptrArgument()); /* We can only write at block aligned offsets. */ R_UNLESS(util::IsAligned(offset, BlockSize), fs::ResultInvalidArgument()); R_UNLESS(util::IsAligned(size, BlockSize), fs::ResultInvalidArgument()); /* Get a pooled buffer. */ PooledBuffer pooled_buffer; const bool use_work_buffer = !IsDeviceAddress(buffer); if (use_work_buffer) { pooled_buffer.Allocate(size, BlockSize); } /* Setup the counter. */ char ctr[IvSize]; std::memcpy(ctr, this->iv, IvSize); AddCounter(ctr, IvSize, offset / BlockSize); /* Loop until all data is written. */ size_t remaining = size; s64 cur_offset = 0; while (remaining > 0) { /* Determine data we're writing and where. */ const size_t write_size = use_work_buffer ? std::min(pooled_buffer.GetSize(), remaining) : remaining; void *write_buf = use_work_buffer ? pooled_buffer.GetBuffer() : const_cast(buffer); /* Encrypt the data, with temporarily increased priority. */ { ScopedThreadPriorityChanger cp(+1, ScopedThreadPriorityChanger::Mode::Relative); auto enc_size = crypto::EncryptAes128Ctr(write_buf, write_size, this->key, KeySize, ctr, IvSize, reinterpret_cast(buffer) + cur_offset, write_size); AMS_ABORT_UNLESS(enc_size == write_size); } /* Write the encrypted data. */ R_TRY(this->base_storage->Write(offset + cur_offset, write_buf, write_size)); /* Advance. */ cur_offset += write_size; remaining -= write_size; if (remaining > 0) { AddCounter(ctr, IvSize, write_size / BlockSize); } } return ResultSuccess(); } Result AesCtrStorage::Flush() { return this->base_storage->Flush(); } Result AesCtrStorage::SetSize(s64 size) { return fs::ResultUnsupportedOperationInAesCtrStorageA(); } Result AesCtrStorage::GetSize(s64 *out) { return this->base_storage->GetSize(out); } Result AesCtrStorage::OperateRange(void *dst, size_t dst_size, fs::OperationId op_id, s64 offset, s64 size, const void *src, size_t src_size) { /* Handle the zero size case. */ if (size == 0) { if (op_id == fs::OperationId::QueryRange) { R_UNLESS(dst != nullptr, fs::ResultNullptrArgument()); R_UNLESS(dst_size == sizeof(fs::QueryRangeInfo), fs::ResultInvalidSize()); reinterpret_cast(dst)->Clear(); } return ResultSuccess(); } /* Ensure alignment. */ R_UNLESS(util::IsAligned(offset, BlockSize), fs::ResultInvalidArgument()); R_UNLESS(util::IsAligned(size, BlockSize), fs::ResultInvalidArgument()); switch (op_id) { case fs::OperationId::QueryRange: { R_UNLESS(dst != nullptr, fs::ResultNullptrArgument()); R_UNLESS(dst_size == sizeof(fs::QueryRangeInfo), fs::ResultInvalidSize()); R_TRY(this->base_storage->OperateRange(dst, dst_size, op_id, offset, size, src, src_size)); fs::QueryRangeInfo info; info.Clear(); info.aes_ctr_key_type = static_cast(fs::AesCtrKeyTypeFlag::InternalKeyForSoftwareAes); reinterpret_cast(dst)->Merge(info); } break; default: { R_TRY(this->base_storage->OperateRange(dst, dst_size, op_id, offset, size, src, src_size)); } break; } return ResultSuccess(); } }