dolphin/Source/Core/DiscIO/NANDImporter.cpp

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

260 lines
8.3 KiB
C++
Raw Normal View History

2017-03-19 07:00:49 +00:00
// Copyright 2017 Dolphin Emulator Project
// SPDX-License-Identifier: GPL-2.0-or-later
2017-03-19 07:00:49 +00:00
#include "DiscIO/NANDImporter.h"
#include <algorithm>
2017-03-19 07:00:49 +00:00
#include <array>
#include <cstring>
#include "Common/Crypto/AES.h"
#include "Common/FileUtil.h"
2020-09-15 10:29:41 +00:00
#include "Common/IOFile.h"
2017-05-15 00:47:02 +00:00
#include "Common/Logging/Log.h"
2017-03-19 07:00:49 +00:00
#include "Common/MsgHandler.h"
#include "Core/IOS/ES/Formats.h"
2017-03-19 07:00:49 +00:00
namespace DiscIO
{
constexpr size_t NAND_SIZE = 0x20000000;
constexpr size_t NAND_KEYS_SIZE = 0x400;
NANDImporter::NANDImporter() : m_nand_root(File::GetUserPath(D_WIIROOT_IDX))
{
}
2017-03-19 07:00:49 +00:00
NANDImporter::~NANDImporter() = default;
void NANDImporter::ImportNANDBin(const std::string& path_to_bin,
std::function<void()> update_callback,
std::function<std::string()> get_otp_dump_path)
2017-03-19 07:00:49 +00:00
{
m_update_callback = std::move(update_callback);
if (!ReadNANDBin(path_to_bin, get_otp_dump_path))
2017-03-19 07:00:49 +00:00
return;
FindSuperblock();
ProcessEntry(0, "");
ExportKeys();
ExtractCertificates();
2017-03-19 07:00:49 +00:00
}
bool NANDImporter::ReadNANDBin(const std::string& path_to_bin,
std::function<std::string()> get_otp_dump_path)
2017-03-19 07:00:49 +00:00
{
constexpr size_t NAND_TOTAL_BLOCKS = 0x40000;
constexpr size_t NAND_BLOCK_SIZE = 0x800;
constexpr size_t NAND_ECC_BLOCK_SIZE = 0x40;
constexpr size_t NAND_BIN_SIZE =
(NAND_BLOCK_SIZE + NAND_ECC_BLOCK_SIZE) * NAND_TOTAL_BLOCKS; // 0x21000000
2017-03-19 07:00:49 +00:00
File::IOFile file(path_to_bin, "rb");
const u64 image_size = file.GetSize();
if (image_size != NAND_BIN_SIZE + NAND_KEYS_SIZE && image_size != NAND_BIN_SIZE)
2017-03-19 07:00:49 +00:00
{
PanicAlertFmtT("This file does not look like a BootMii NAND backup.");
2017-03-19 07:00:49 +00:00
return false;
}
m_nand.resize(NAND_SIZE);
for (size_t i = 0; i < NAND_TOTAL_BLOCKS; i++)
{
// Instead of updating on every cycle, we only update every 1000 cycles for a balance between
// not updating fast enough vs updating too fast
if (i % 1000 == 0)
m_update_callback();
2017-03-19 07:00:49 +00:00
file.ReadBytes(&m_nand[i * NAND_BLOCK_SIZE], NAND_BLOCK_SIZE);
// We don't care about the ECC blocks
file.Seek(NAND_ECC_BLOCK_SIZE, File::SeekOrigin::Current);
2017-03-19 07:00:49 +00:00
}
m_nand_keys.resize(NAND_KEYS_SIZE);
// Read the OTP/SEEPROM dump.
// If it is not included in the NAND image, get a path to the dump and read key data from it.
if (image_size == NAND_BIN_SIZE)
{
const std::string otp_dump_path = get_otp_dump_path();
if (otp_dump_path.empty())
return false;
File::IOFile keys_file{otp_dump_path, "rb"};
return keys_file.ReadBytes(m_nand_keys.data(), NAND_KEYS_SIZE);
}
// Otherwise, just read the key data from the NAND image.
return file.ReadBytes(m_nand_keys.data(), NAND_KEYS_SIZE);
2017-03-19 07:00:49 +00:00
}
void NANDImporter::FindSuperblock()
{
constexpr size_t NAND_SUPERBLOCK_START = 0x1fc00000;
constexpr size_t NAND_SUPERBLOCK_SIZE = 0x40000;
size_t superblock = 0;
u32 newest_version = 0;
for (size_t pos = NAND_SUPERBLOCK_START; pos < NAND_SIZE; pos += NAND_SUPERBLOCK_SIZE)
{
if (!memcmp(m_nand.data() + pos, "SFFS", 4))
{
const u32 version = Common::swap32(&m_nand[pos + 4]);
INFO_LOG_FMT(DISCIO, "Found superblock at {:#x} with version {:#x}", pos, version);
2017-03-19 07:00:49 +00:00
if (superblock == 0 || version > newest_version)
{
superblock = pos;
newest_version = version;
}
}
}
m_nand_fat_offset = superblock + 0xC;
m_nand_fst_offset = m_nand_fat_offset + 0x10000;
INFO_LOG_FMT(DISCIO,
"Using superblock version {:#x} at position {:#x}. FAT/FST offset: {:#x}/{:#x}",
newest_version, superblock, m_nand_fat_offset, m_nand_fst_offset);
2017-03-19 07:00:49 +00:00
}
std::string NANDImporter::GetPath(const NANDFSTEntry& entry, const std::string& parent_path)
{
std::string name(entry.name, strnlen(entry.name, sizeof(NANDFSTEntry::name)));
2017-03-19 07:00:49 +00:00
if (name.front() == '/' || parent_path.back() == '/')
return parent_path + name;
return parent_path + '/' + name;
}
void NANDImporter::ProcessEntry(u16 entry_number, const std::string& parent_path)
{
NANDFSTEntry entry;
while (entry_number != 0xffff)
{
memcpy(&entry, &m_nand[m_nand_fst_offset + sizeof(NANDFSTEntry) * entry_number],
sizeof(NANDFSTEntry));
const std::string path = GetPath(entry, parent_path);
INFO_LOG_FMT(DISCIO, "Entry: {} Path: {}", entry, path);
m_update_callback();
Type type = static_cast<Type>(entry.mode & 3);
if (type == Type::File)
ProcessFile(entry, path);
else if (type == Type::Directory)
ProcessDirectory(entry, path);
else
ERROR_LOG_FMT(DISCIO, "Ignoring unknown entry type for {}", entry);
entry_number = entry.sib;
}
2017-03-19 07:00:49 +00:00
}
void NANDImporter::ProcessDirectory(const NANDFSTEntry& entry, const std::string& path)
2017-03-19 07:00:49 +00:00
{
File::CreateDir(m_nand_root + path);
ProcessEntry(entry.sub, path);
2017-03-19 07:00:49 +00:00
}
void NANDImporter::ProcessFile(const NANDFSTEntry& entry, const std::string& path)
2017-03-19 07:00:49 +00:00
{
constexpr size_t NAND_AES_KEY_OFFSET = 0x158;
constexpr size_t NAND_FAT_BLOCK_SIZE = 0x4000;
File::IOFile file(m_nand_root + path, "wb");
2017-03-19 07:00:49 +00:00
std::array<u8, 16> key{};
std::copy(&m_nand_keys[NAND_AES_KEY_OFFSET], &m_nand_keys[NAND_AES_KEY_OFFSET + key.size()],
key.begin());
u16 sub = entry.sub;
u32 remaining_bytes = entry.size;
2017-03-19 07:00:49 +00:00
while (remaining_bytes > 0)
{
std::array<u8, 16> iv{};
std::vector<u8> block = Common::AES::Decrypt(
key.data(), iv.data(), &m_nand[NAND_FAT_BLOCK_SIZE * sub], NAND_FAT_BLOCK_SIZE);
u32 size = remaining_bytes < NAND_FAT_BLOCK_SIZE ? remaining_bytes : NAND_FAT_BLOCK_SIZE;
file.WriteBytes(block.data(), size);
remaining_bytes -= size;
sub = Common::swap16(&m_nand[m_nand_fat_offset + 2 * sub]);
}
}
bool NANDImporter::ExtractCertificates()
2017-03-19 07:00:49 +00:00
{
const std::string content_dir = m_nand_root + "/title/00000001/0000000d/content/";
File::IOFile tmd_file(content_dir + "title.tmd", "rb");
std::vector<u8> tmd_bytes(tmd_file.GetSize());
if (!tmd_file.ReadBytes(tmd_bytes.data(), tmd_bytes.size()))
2017-03-19 07:00:49 +00:00
{
ERROR_LOG_FMT(DISCIO, "ExtractCertificates: Could not read IOS13 TMD");
return false;
}
IOS::ES::TMDReader tmd(std::move(tmd_bytes));
IOS::ES::Content content_metadata;
if (!tmd.GetContent(tmd.GetBootIndex(), &content_metadata))
{
ERROR_LOG_FMT(DISCIO, "ExtractCertificates: Could not get content ID from TMD");
return false;
}
File::IOFile content_file(content_dir + fmt::format("{:08x}.app", content_metadata.id), "rb");
std::vector<u8> content_bytes(content_file.GetSize());
if (!content_file.ReadBytes(content_bytes.data(), content_bytes.size()))
{
ERROR_LOG_FMT(DISCIO, "ExtractCertificates: Could not read IOS13 contents");
return false;
2017-03-19 07:00:49 +00:00
}
struct PEMCertificate
2017-03-19 07:00:49 +00:00
{
std::string_view filename;
std::array<u8, 4> search_bytes;
2017-03-19 07:00:49 +00:00
};
static constexpr std::array<PEMCertificate, 3> certificates{{
{"/clientca.pem", {{0x30, 0x82, 0x03, 0xE9}}},
{"/clientcakey.pem", {{0x30, 0x82, 0x02, 0x5D}}},
{"/rootca.pem", {{0x30, 0x82, 0x03, 0x7D}}},
}};
for (const PEMCertificate& certificate : certificates)
2017-03-19 07:00:49 +00:00
{
const auto search_result =
std::search(content_bytes.begin(), content_bytes.end(), certificate.search_bytes.begin(),
certificate.search_bytes.end());
if (search_result == content_bytes.end())
{
ERROR_LOG_FMT(DISCIO, "ExtractCertificates: Could not find offset for certficate '{}'",
certificate.filename);
return false;
}
const std::string pem_file_path = m_nand_root + std::string(certificate.filename);
const ptrdiff_t certificate_offset = std::distance(content_bytes.begin(), search_result);
const u16 certificate_size = Common::swap16(&content_bytes[certificate_offset - 2]);
INFO_LOG_FMT(DISCIO, "ExtractCertificates: '{}' offset: {:#x} size: {:#x}",
certificate.filename, certificate_offset, certificate_size);
2017-03-19 07:00:49 +00:00
File::IOFile pem_file(pem_file_path, "wb");
if (!pem_file.WriteBytes(&content_bytes[certificate_offset], certificate_size))
{
ERROR_LOG_FMT(DISCIO, "ExtractCertificates: Unable to write to file {}", pem_file_path);
return false;
}
2017-03-19 07:00:49 +00:00
}
return true;
2017-03-19 07:00:49 +00:00
}
void NANDImporter::ExportKeys()
2017-03-19 07:00:49 +00:00
{
const std::string file_path = m_nand_root + "/keys.bin";
2017-03-19 07:00:49 +00:00
File::IOFile file(file_path, "wb");
if (!file.WriteBytes(m_nand_keys.data(), NAND_KEYS_SIZE))
PanicAlertFmtT("Unable to write to file {0}", file_path);
2017-03-19 07:00:49 +00:00
}
} // namespace DiscIO