/* * Copyright (c) 2018-2019 Atmosphère-NX * * This program is free software; you can redistribute it and/or modify it * under the terms and conditions of the GNU General Public License, * version 2, as published by the Free Software Foundation. * * This program is distributed in the hope it will be useful, but WITHOUT * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for * more details. * * You should have received a copy of the GNU General Public License * along with this program. If not, see . */ #include #include #include "spl_smc_wrapper.hpp" enum SmcFunctionId : u32 { SmcFunctionId_SetConfig = 0xC3000401, SmcFunctionId_GetConfig = 0xC3000002, SmcFunctionId_CheckStatus = 0xC3000003, SmcFunctionId_GetResult = 0xC3000404, SmcFunctionId_ExpMod = 0xC3000E05, SmcFunctionId_GenerateRandomBytes = 0xC3000006, SmcFunctionId_GenerateAesKek = 0xC3000007, SmcFunctionId_LoadAesKey = 0xC3000008, SmcFunctionId_CryptAes = 0xC3000009, SmcFunctionId_GenerateSpecificAesKey = 0xC300000A, SmcFunctionId_ComputeCmac = 0xC300040B, SmcFunctionId_ReEncryptRsaPrivateKey = 0xC300D60C, SmcFunctionId_DecryptOrImportRsaPrivateKey = 0xC300100D, SmcFunctionId_SecureExpMod = 0xC300060F, SmcFunctionId_UnwrapTitleKey = 0xC3000610, SmcFunctionId_LoadTitleKey = 0xC3000011, SmcFunctionId_UnwrapCommonTitleKey = 0xC3000012, /* Deprecated functions. */ SmcFunctionId_ImportEsKey = 0xC300100C, SmcFunctionId_DecryptRsaPrivateKey = 0xC300100D, SmcFunctionId_ImportSecureExpModKey = 0xC300100E, }; SmcResult SmcWrapper::SetConfig(SplConfigItem which, const u64 *value, size_t num_qwords) { SecmonArgs args; args.X[0] = SmcFunctionId_SetConfig; args.X[1] = which; args.X[2] = 0; for (size_t i = 0; i < std::min(size_t(4), num_qwords); i++) { args.X[3 + i] = value[i]; } svcCallSecureMonitor(&args); return static_cast(args.X[0]); } SmcResult SmcWrapper::GetConfig(u64 *out, size_t num_qwords, SplConfigItem which) { SecmonArgs args; args.X[0] = SmcFunctionId_GetConfig; args.X[1] = which; svcCallSecureMonitor(&args); for (size_t i = 0; i < std::min(size_t(4), num_qwords); i++) { out[i] = args.X[1 + i]; } return static_cast(args.X[0]); } SmcResult SmcWrapper::CheckStatus(SmcResult *out, AsyncOperationKey op) { SecmonArgs args; args.X[0] = SmcFunctionId_CheckStatus; args.X[1] = op.value; svcCallSecureMonitor(&args); *out = static_cast(args.X[1]); return static_cast(args.X[0]); } SmcResult SmcWrapper::GetResult(SmcResult *out, void *out_buf, size_t out_buf_size, AsyncOperationKey op) { SecmonArgs args; args.X[0] = SmcFunctionId_GetResult; args.X[1] = op.value; args.X[2] = reinterpret_cast(out_buf); args.X[3] = out_buf_size; svcCallSecureMonitor(&args); *out = static_cast(args.X[1]); return static_cast(args.X[0]); } SmcResult SmcWrapper::ExpMod(AsyncOperationKey *out_op, const void *base, const void *exp, size_t exp_size, const void *mod) { SecmonArgs args; args.X[0] = SmcFunctionId_ExpMod; args.X[1] = reinterpret_cast(base); args.X[2] = reinterpret_cast(exp); args.X[3] = reinterpret_cast(mod); args.X[4] = exp_size; svcCallSecureMonitor(&args); out_op->value = args.X[1]; return static_cast(args.X[0]); } SmcResult SmcWrapper::GenerateRandomBytes(void *out, size_t size) { SecmonArgs args; args.X[0] = SmcFunctionId_GenerateRandomBytes; args.X[1] = size; svcCallSecureMonitor(&args); if (args.X[0] == SmcResult_Success && (size <= sizeof(args) - sizeof(args.X[0]))) { std::memcpy(out, &args.X[1], size); } return static_cast(args.X[0]); } SmcResult SmcWrapper::GenerateAesKek(AccessKey *out, const KeySource &source, u32 generation, u32 option) { SecmonArgs args; args.X[0] = SmcFunctionId_GenerateAesKek; args.X[1] = source.data64[0]; args.X[2] = source.data64[1]; args.X[3] = generation; args.X[4] = option; svcCallSecureMonitor(&args); out->data64[0] = args.X[1]; out->data64[1] = args.X[2]; return static_cast(args.X[0]); } SmcResult SmcWrapper::LoadAesKey(u32 keyslot, const AccessKey &access_key, const KeySource &source) { SecmonArgs args; args.X[0] = SmcFunctionId_LoadAesKey; args.X[1] = keyslot; args.X[2] = access_key.data64[0]; args.X[3] = access_key.data64[1]; args.X[4] = source.data64[0]; args.X[5] = source.data64[1]; svcCallSecureMonitor(&args); return static_cast(args.X[0]); } SmcResult SmcWrapper::CryptAes(AsyncOperationKey *out_op, u32 mode, const IvCtr &iv_ctr, u32 dst_addr, u32 src_addr, size_t size) { SecmonArgs args; args.X[0] = SmcFunctionId_CryptAes; args.X[1] = mode; args.X[2] = iv_ctr.data64[0]; args.X[3] = iv_ctr.data64[1]; args.X[4] = src_addr; args.X[5] = dst_addr; args.X[6] = size; svcCallSecureMonitor(&args); out_op->value = args.X[1]; return static_cast(args.X[0]); } SmcResult SmcWrapper::GenerateSpecificAesKey(AesKey *out_key, const KeySource &source, u32 generation, u32 which) { SecmonArgs args; args.X[0] = SmcFunctionId_GenerateSpecificAesKey; args.X[1] = source.data64[0]; args.X[2] = source.data64[1]; args.X[3] = generation; args.X[4] = which; svcCallSecureMonitor(&args); out_key->data64[0] = args.X[1]; out_key->data64[1] = args.X[2]; return static_cast(args.X[0]); } SmcResult SmcWrapper::ComputeCmac(Cmac *out_mac, u32 keyslot, const void *data, size_t size) { SecmonArgs args; args.X[0] = SmcFunctionId_ComputeCmac; args.X[1] = keyslot; args.X[2] = reinterpret_cast(data); args.X[3] = size; svcCallSecureMonitor(&args); out_mac->data64[0] = args.X[1]; out_mac->data64[1] = args.X[2]; return static_cast(args.X[0]); } SmcResult SmcWrapper::ReEncryptRsaPrivateKey(void *data, size_t size, const AccessKey &access_key_dec, const KeySource &source_dec, const AccessKey &access_key_enc, const KeySource &source_enc, u32 option) { SecmonArgs args; args.X[0] = SmcFunctionId_ReEncryptRsaPrivateKey; args.X[1] = reinterpret_cast(&access_key_dec); args.X[2] = reinterpret_cast(&access_key_enc); args.X[3] = option; args.X[4] = reinterpret_cast(data); args.X[5] = size; args.X[6] = reinterpret_cast(&source_dec); args.X[7] = reinterpret_cast(&source_enc); svcCallSecureMonitor(&args); return static_cast(args.X[0]); } SmcResult SmcWrapper::DecryptOrImportRsaPrivateKey(void *data, size_t size, const AccessKey &access_key, const KeySource &source, u32 option) { SecmonArgs args; args.X[0] = SmcFunctionId_DecryptOrImportRsaPrivateKey; args.X[1] = access_key.data64[0]; args.X[2] = access_key.data64[1]; args.X[3] = option; args.X[4] = reinterpret_cast(data); args.X[5] = size; args.X[6] = source.data64[0]; args.X[7] = source.data64[1]; svcCallSecureMonitor(&args); return static_cast(args.X[0]); } SmcResult SmcWrapper::SecureExpMod(AsyncOperationKey *out_op, const void *base, const void *mod, u32 option) { SecmonArgs args; args.X[0] = SmcFunctionId_SecureExpMod; args.X[1] = reinterpret_cast(base); args.X[2] = reinterpret_cast(mod); args.X[3] = option; svcCallSecureMonitor(&args); out_op->value = args.X[1]; return static_cast(args.X[0]); } SmcResult SmcWrapper::UnwrapTitleKey(AsyncOperationKey *out_op, const void *base, const void *mod, const void *label_digest, size_t label_digest_size, u32 option) { SecmonArgs args; args.X[0] = SmcFunctionId_UnwrapTitleKey; args.X[1] = reinterpret_cast(base); args.X[2] = reinterpret_cast(mod); std::memset(&args.X[3], 0, 4 * sizeof(args.X[3])); std::memcpy(&args.X[3], label_digest, std::min(size_t(4 * sizeof(args.X[3])), label_digest_size)); args.X[7] = option; svcCallSecureMonitor(&args); out_op->value = args.X[1]; return static_cast(args.X[0]); } SmcResult SmcWrapper::LoadTitleKey(u32 keyslot, const AccessKey &access_key) { SecmonArgs args; args.X[0] = SmcFunctionId_LoadTitleKey; args.X[1] = keyslot; args.X[2] = access_key.data64[0]; args.X[3] = access_key.data64[1]; svcCallSecureMonitor(&args); return static_cast(args.X[0]); } SmcResult SmcWrapper::UnwrapCommonTitleKey(AccessKey *out, const KeySource &source, u32 generation) { SecmonArgs args; args.X[0] = SmcFunctionId_UnwrapCommonTitleKey; args.X[1] = source.data64[0]; args.X[2] = source.data64[1]; args.X[3] = generation; svcCallSecureMonitor(&args); out->data64[0] = args.X[1]; out->data64[1] = args.X[2]; return static_cast(args.X[0]); } /* Deprecated functions. */ SmcResult SmcWrapper::ImportEsKey(const void *data, size_t size, const AccessKey &access_key, const KeySource &source, u32 option) { SecmonArgs args; args.X[0] = SmcFunctionId_ImportEsKey; args.X[1] = access_key.data64[0]; args.X[2] = access_key.data64[1]; args.X[3] = option; args.X[4] = reinterpret_cast(data); args.X[5] = size; args.X[6] = source.data64[0]; args.X[7] = source.data64[1]; svcCallSecureMonitor(&args); return static_cast(args.X[0]); } SmcResult SmcWrapper::DecryptRsaPrivateKey(size_t *out_size, void *data, size_t size, const AccessKey &access_key, const KeySource &source, u32 option) { SecmonArgs args; args.X[0] = SmcFunctionId_DecryptRsaPrivateKey; args.X[1] = access_key.data64[0]; args.X[2] = access_key.data64[1]; args.X[3] = option; args.X[4] = reinterpret_cast(data); args.X[5] = size; args.X[6] = source.data64[0]; args.X[7] = source.data64[1]; svcCallSecureMonitor(&args); *out_size = static_cast(args.X[1]); return static_cast(args.X[0]); } SmcResult SmcWrapper::ImportSecureExpModKey(const void *data, size_t size, const AccessKey &access_key, const KeySource &source, u32 option) { SecmonArgs args; args.X[0] = SmcFunctionId_ImportSecureExpModKey; args.X[1] = access_key.data64[0]; args.X[2] = access_key.data64[1]; args.X[3] = option; args.X[4] = reinterpret_cast(data); args.X[5] = size; args.X[6] = source.data64[0]; args.X[7] = source.data64[1]; svcCallSecureMonitor(&args); return static_cast(args.X[0]); }