Merge pull request #12232 from Dentomologist/convert_objectsubtype_to_enum_class
IOSC: Convert ObjectSubType to enum class
This commit is contained in:
commit
47396650bf
|
@ -937,7 +937,7 @@ ReturnCode ESCore::SetUpStreamKey(const u32 uid, const u8* ticket_view, const ES
|
||||||
std::array<u8, 16> iv{};
|
std::array<u8, 16> iv{};
|
||||||
std::memcpy(iv.data(), &title_id, sizeof(title_id));
|
std::memcpy(iv.data(), &title_id, sizeof(title_id));
|
||||||
ret = m_ios.GetIOSC().CreateObject(handle, IOSC::ObjectType::TYPE_SECRET_KEY,
|
ret = m_ios.GetIOSC().CreateObject(handle, IOSC::ObjectType::TYPE_SECRET_KEY,
|
||||||
IOSC::ObjectSubType::SUBTYPE_AES128, PID_ES);
|
IOSC::ObjectSubType::AES128, PID_ES);
|
||||||
if (ret != IPC_SUCCESS)
|
if (ret != IPC_SUCCESS)
|
||||||
return ret;
|
return ret;
|
||||||
|
|
||||||
|
@ -1094,7 +1094,7 @@ ReturnCode ESCore::VerifyContainer(VerifyContainerType type, VerifyMode mode,
|
||||||
|
|
||||||
// Create and initialise a handle for the CA cert and the issuer cert.
|
// Create and initialise a handle for the CA cert and the issuer cert.
|
||||||
ReturnCode ret =
|
ReturnCode ret =
|
||||||
iosc.CreateObject(&ca_handle, IOSC::TYPE_PUBLIC_KEY, IOSC::SUBTYPE_RSA2048, PID_ES);
|
iosc.CreateObject(&ca_handle, IOSC::TYPE_PUBLIC_KEY, IOSC::ObjectSubType::RSA2048, PID_ES);
|
||||||
if (ret != IPC_SUCCESS)
|
if (ret != IPC_SUCCESS)
|
||||||
return ret;
|
return ret;
|
||||||
Common::ScopeGuard ca_guard{[&] { iosc.DeleteObject(ca_handle, PID_ES); }};
|
Common::ScopeGuard ca_guard{[&] { iosc.DeleteObject(ca_handle, PID_ES); }};
|
||||||
|
@ -1107,8 +1107,9 @@ ReturnCode ESCore::VerifyContainer(VerifyContainerType type, VerifyMode mode,
|
||||||
}
|
}
|
||||||
|
|
||||||
IOSC::Handle issuer_handle;
|
IOSC::Handle issuer_handle;
|
||||||
const IOSC::ObjectSubType subtype =
|
const IOSC::ObjectSubType subtype = type == VerifyContainerType::Device ?
|
||||||
type == VerifyContainerType::Device ? IOSC::SUBTYPE_ECC233 : IOSC::SUBTYPE_RSA2048;
|
IOSC::ObjectSubType::ECC233 :
|
||||||
|
IOSC::ObjectSubType::RSA2048;
|
||||||
ret = iosc.CreateObject(&issuer_handle, IOSC::TYPE_PUBLIC_KEY, subtype, PID_ES);
|
ret = iosc.CreateObject(&issuer_handle, IOSC::TYPE_PUBLIC_KEY, subtype, PID_ES);
|
||||||
if (ret != IPC_SUCCESS)
|
if (ret != IPC_SUCCESS)
|
||||||
return ret;
|
return ret;
|
||||||
|
|
|
@ -509,7 +509,7 @@ HLE::ReturnCode TicketReader::Unpersonalise(HLE::IOSC& iosc)
|
||||||
using namespace HLE;
|
using namespace HLE;
|
||||||
IOSC::Handle public_handle;
|
IOSC::Handle public_handle;
|
||||||
ReturnCode ret =
|
ReturnCode ret =
|
||||||
iosc.CreateObject(&public_handle, IOSC::TYPE_PUBLIC_KEY, IOSC::SUBTYPE_ECC233, PID_ES);
|
iosc.CreateObject(&public_handle, IOSC::TYPE_PUBLIC_KEY, IOSC::ObjectSubType::ECC233, PID_ES);
|
||||||
if (ret != IPC_SUCCESS)
|
if (ret != IPC_SUCCESS)
|
||||||
return ret;
|
return ret;
|
||||||
|
|
||||||
|
@ -519,7 +519,7 @@ HLE::ReturnCode TicketReader::Unpersonalise(HLE::IOSC& iosc)
|
||||||
return ret;
|
return ret;
|
||||||
|
|
||||||
IOSC::Handle key_handle;
|
IOSC::Handle key_handle;
|
||||||
ret = iosc.CreateObject(&key_handle, IOSC::TYPE_SECRET_KEY, IOSC::SUBTYPE_AES128, PID_ES);
|
ret = iosc.CreateObject(&key_handle, IOSC::TYPE_SECRET_KEY, IOSC::ObjectSubType::AES128, PID_ES);
|
||||||
if (ret != IPC_SUCCESS)
|
if (ret != IPC_SUCCESS)
|
||||||
return ret;
|
return ret;
|
||||||
|
|
||||||
|
|
|
@ -153,7 +153,8 @@ ReturnCode ESCore::VerifySign(const std::vector<u8>& hash, const std::vector<u8>
|
||||||
|
|
||||||
IOSC& iosc = m_ios.GetIOSC();
|
IOSC& iosc = m_ios.GetIOSC();
|
||||||
IOSC::Handle ng_cert;
|
IOSC::Handle ng_cert;
|
||||||
ReturnCode ret = iosc.CreateObject(&ng_cert, IOSC::TYPE_PUBLIC_KEY, IOSC::SUBTYPE_ECC233, PID_ES);
|
ReturnCode ret =
|
||||||
|
iosc.CreateObject(&ng_cert, IOSC::TYPE_PUBLIC_KEY, IOSC::ObjectSubType::ECC233, PID_ES);
|
||||||
if (ret != IPC_SUCCESS)
|
if (ret != IPC_SUCCESS)
|
||||||
return ret;
|
return ret;
|
||||||
Common::ScopeGuard handle_guard{[&] { iosc.DeleteObject(ng_cert, PID_ES); }};
|
Common::ScopeGuard handle_guard{[&] { iosc.DeleteObject(ng_cert, PID_ES); }};
|
||||||
|
@ -176,7 +177,7 @@ ReturnCode ESCore::VerifySign(const std::vector<u8>& hash, const std::vector<u8>
|
||||||
}
|
}
|
||||||
|
|
||||||
IOSC::Handle ap_cert;
|
IOSC::Handle ap_cert;
|
||||||
ret = iosc.CreateObject(&ap_cert, IOSC::TYPE_PUBLIC_KEY, IOSC::SUBTYPE_ECC233, PID_ES);
|
ret = iosc.CreateObject(&ap_cert, IOSC::TYPE_PUBLIC_KEY, IOSC::ObjectSubType::ECC233, PID_ES);
|
||||||
if (ret != IPC_SUCCESS)
|
if (ret != IPC_SUCCESS)
|
||||||
return ret;
|
return ret;
|
||||||
Common::ScopeGuard handle2_guard{[&] { iosc.DeleteObject(ap_cert, PID_ES); }};
|
Common::ScopeGuard handle2_guard{[&] { iosc.DeleteObject(ap_cert, PID_ES); }};
|
||||||
|
|
|
@ -129,7 +129,8 @@ static ReturnCode InitBackupKey(u64 tid, u32 title_flags, IOSC& iosc, IOSC::Hand
|
||||||
}
|
}
|
||||||
|
|
||||||
// Otherwise, use a null key.
|
// Otherwise, use a null key.
|
||||||
ReturnCode ret = iosc.CreateObject(key, IOSC::TYPE_SECRET_KEY, IOSC::SUBTYPE_AES128, PID_ES);
|
ReturnCode ret =
|
||||||
|
iosc.CreateObject(key, IOSC::TYPE_SECRET_KEY, IOSC::ObjectSubType::AES128, PID_ES);
|
||||||
return ret == IPC_SUCCESS ? iosc.ImportSecretKey(*key, NULL_KEY.data(), PID_ES) : ret;
|
return ret == IPC_SUCCESS ? iosc.ImportSecretKey(*key, NULL_KEY.data(), PID_ES) : ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -206,7 +207,8 @@ IPCReply ESDevice::ImportTmd(Context& context, const IOCtlVRequest& request)
|
||||||
static ReturnCode InitTitleImportKey(const std::vector<u8>& ticket_bytes, IOSC& iosc,
|
static ReturnCode InitTitleImportKey(const std::vector<u8>& ticket_bytes, IOSC& iosc,
|
||||||
IOSC::Handle* handle)
|
IOSC::Handle* handle)
|
||||||
{
|
{
|
||||||
ReturnCode ret = iosc.CreateObject(handle, IOSC::TYPE_SECRET_KEY, IOSC::SUBTYPE_AES128, PID_ES);
|
ReturnCode ret =
|
||||||
|
iosc.CreateObject(handle, IOSC::TYPE_SECRET_KEY, IOSC::ObjectSubType::AES128, PID_ES);
|
||||||
if (ret != IPC_SUCCESS)
|
if (ret != IPC_SUCCESS)
|
||||||
return ret;
|
return ret;
|
||||||
|
|
||||||
|
|
|
@ -189,14 +189,14 @@ constexpr Common::ec::Signature DEFAULT_SIGNATURE = {{
|
||||||
// clang-format on
|
// clang-format on
|
||||||
|
|
||||||
const std::map<std::pair<IOSC::ObjectType, IOSC::ObjectSubType>, size_t> s_type_to_size_map = {{
|
const std::map<std::pair<IOSC::ObjectType, IOSC::ObjectSubType>, size_t> s_type_to_size_map = {{
|
||||||
{{IOSC::TYPE_SECRET_KEY, IOSC::SUBTYPE_AES128}, 16},
|
{{IOSC::TYPE_SECRET_KEY, IOSC::ObjectSubType::AES128}, 16},
|
||||||
{{IOSC::TYPE_SECRET_KEY, IOSC::SUBTYPE_MAC}, 20},
|
{{IOSC::TYPE_SECRET_KEY, IOSC::ObjectSubType::MAC}, 20},
|
||||||
{{IOSC::TYPE_SECRET_KEY, IOSC::SUBTYPE_ECC233}, 30},
|
{{IOSC::TYPE_SECRET_KEY, IOSC::ObjectSubType::ECC233}, 30},
|
||||||
{{IOSC::TYPE_PUBLIC_KEY, IOSC::SUBTYPE_RSA2048}, 256},
|
{{IOSC::TYPE_PUBLIC_KEY, IOSC::ObjectSubType::RSA2048}, 256},
|
||||||
{{IOSC::TYPE_PUBLIC_KEY, IOSC::SUBTYPE_RSA4096}, 512},
|
{{IOSC::TYPE_PUBLIC_KEY, IOSC::ObjectSubType::RSA4096}, 512},
|
||||||
{{IOSC::TYPE_PUBLIC_KEY, IOSC::SUBTYPE_ECC233}, 60},
|
{{IOSC::TYPE_PUBLIC_KEY, IOSC::ObjectSubType::ECC233}, 60},
|
||||||
{{IOSC::TYPE_DATA, IOSC::SUBTYPE_DATA}, 0},
|
{{IOSC::TYPE_DATA, IOSC::ObjectSubType::Data}, 0},
|
||||||
{{IOSC::TYPE_DATA, IOSC::SUBTYPE_VERSION}, 0},
|
{{IOSC::TYPE_DATA, IOSC::ObjectSubType::Version}, 0},
|
||||||
}};
|
}};
|
||||||
|
|
||||||
static size_t GetSizeForType(IOSC::ObjectType type, IOSC::ObjectSubType subtype)
|
static size_t GetSizeForType(IOSC::ObjectType type, IOSC::ObjectSubType subtype)
|
||||||
|
@ -264,7 +264,7 @@ ReturnCode IOSC::ImportSecretKey(Handle dest_handle, const u8* decrypted_key, u3
|
||||||
return IOSC_EINVAL;
|
return IOSC_EINVAL;
|
||||||
|
|
||||||
// TODO: allow other secret key subtypes
|
// TODO: allow other secret key subtypes
|
||||||
if (dest_entry->type != TYPE_SECRET_KEY || dest_entry->subtype != SUBTYPE_AES128)
|
if (dest_entry->type != TYPE_SECRET_KEY || dest_entry->subtype != ObjectSubType::AES128)
|
||||||
return IOSC_INVALID_OBJTYPE;
|
return IOSC_INVALID_OBJTYPE;
|
||||||
|
|
||||||
dest_entry->data = std::vector<u8>(decrypted_key, decrypted_key + AES128_KEY_SIZE);
|
dest_entry->data = std::vector<u8>(decrypted_key, decrypted_key + AES128_KEY_SIZE);
|
||||||
|
@ -290,7 +290,8 @@ ReturnCode IOSC::ImportPublicKey(Handle dest_handle, const u8* public_key,
|
||||||
|
|
||||||
dest_entry->data.assign(public_key, public_key + size);
|
dest_entry->data.assign(public_key, public_key + size);
|
||||||
|
|
||||||
if (dest_entry->subtype == SUBTYPE_RSA2048 || dest_entry->subtype == SUBTYPE_RSA4096)
|
if (dest_entry->subtype == ObjectSubType::RSA2048 ||
|
||||||
|
dest_entry->subtype == ObjectSubType::RSA4096)
|
||||||
{
|
{
|
||||||
ASSERT(public_key_exponent);
|
ASSERT(public_key_exponent);
|
||||||
std::memcpy(&dest_entry->misc_data, public_key_exponent, 4);
|
std::memcpy(&dest_entry->misc_data, public_key_exponent, 4);
|
||||||
|
@ -312,9 +313,9 @@ ReturnCode IOSC::ComputeSharedKey(Handle dest_handle, Handle private_handle, Han
|
||||||
const KeyEntry* public_entry = FindEntry(public_handle);
|
const KeyEntry* public_entry = FindEntry(public_handle);
|
||||||
if (!dest_entry || !private_entry || !public_entry)
|
if (!dest_entry || !private_entry || !public_entry)
|
||||||
return IOSC_EINVAL;
|
return IOSC_EINVAL;
|
||||||
if (dest_entry->type != TYPE_SECRET_KEY || dest_entry->subtype != SUBTYPE_AES128 ||
|
if (dest_entry->type != TYPE_SECRET_KEY || dest_entry->subtype != ObjectSubType::AES128 ||
|
||||||
private_entry->type != TYPE_SECRET_KEY || private_entry->subtype != SUBTYPE_ECC233 ||
|
private_entry->type != TYPE_SECRET_KEY || private_entry->subtype != ObjectSubType::ECC233 ||
|
||||||
public_entry->type != TYPE_PUBLIC_KEY || public_entry->subtype != SUBTYPE_ECC233)
|
public_entry->type != TYPE_PUBLIC_KEY || public_entry->subtype != ObjectSubType::ECC233)
|
||||||
{
|
{
|
||||||
return IOSC_INVALID_OBJTYPE;
|
return IOSC_INVALID_OBJTYPE;
|
||||||
}
|
}
|
||||||
|
@ -339,7 +340,7 @@ ReturnCode IOSC::DecryptEncrypt(Common::AES::Mode mode, Handle key_handle, u8* i
|
||||||
const KeyEntry* entry = FindEntry(key_handle);
|
const KeyEntry* entry = FindEntry(key_handle);
|
||||||
if (!entry)
|
if (!entry)
|
||||||
return IOSC_EINVAL;
|
return IOSC_EINVAL;
|
||||||
if (entry->type != TYPE_SECRET_KEY || entry->subtype != SUBTYPE_AES128)
|
if (entry->type != TYPE_SECRET_KEY || entry->subtype != ObjectSubType::AES128)
|
||||||
return IOSC_INVALID_OBJTYPE;
|
return IOSC_INVALID_OBJTYPE;
|
||||||
|
|
||||||
if (entry->data.size() != AES128_KEY_SIZE)
|
if (entry->data.size() != AES128_KEY_SIZE)
|
||||||
|
@ -386,10 +387,10 @@ ReturnCode IOSC::VerifyPublicKeySign(const std::array<u8, 20>& sha1, Handle sign
|
||||||
|
|
||||||
switch (entry->subtype)
|
switch (entry->subtype)
|
||||||
{
|
{
|
||||||
case SUBTYPE_RSA2048:
|
case ObjectSubType::RSA2048:
|
||||||
case SUBTYPE_RSA4096:
|
case ObjectSubType::RSA4096:
|
||||||
{
|
{
|
||||||
const size_t expected_key_size = entry->subtype == SUBTYPE_RSA2048 ? 0x100 : 0x200;
|
const size_t expected_key_size = entry->subtype == ObjectSubType::RSA2048 ? 0x100 : 0x200;
|
||||||
ASSERT(entry->data.size() == expected_key_size);
|
ASSERT(entry->data.size() == expected_key_size);
|
||||||
ASSERT(signature.size() == expected_key_size);
|
ASSERT(signature.size() == expected_key_size);
|
||||||
|
|
||||||
|
@ -423,7 +424,7 @@ ReturnCode IOSC::VerifyPublicKeySign(const std::array<u8, 20>& sha1, Handle sign
|
||||||
|
|
||||||
return IPC_SUCCESS;
|
return IPC_SUCCESS;
|
||||||
}
|
}
|
||||||
case SUBTYPE_ECC233:
|
case ObjectSubType::ECC233:
|
||||||
{
|
{
|
||||||
ASSERT(entry->data.size() == sizeof(CertECC::public_key));
|
ASSERT(entry->data.size() == sizeof(CertECC::public_key));
|
||||||
|
|
||||||
|
@ -560,24 +561,27 @@ void IOSC::LoadDefaultEntries()
|
||||||
// Dolphin does not use the same "default" values as IOS does, as we do not emulate unblown
|
// Dolphin does not use the same "default" values as IOS does, as we do not emulate unblown
|
||||||
// scenario.
|
// scenario.
|
||||||
|
|
||||||
m_key_entries[HANDLE_CONSOLE_KEY] = {
|
m_key_entries[HANDLE_CONSOLE_KEY] = {TYPE_SECRET_KEY,
|
||||||
TYPE_SECRET_KEY, SUBTYPE_ECC233, {DEFAULT_PRIVATE_KEY.begin(), DEFAULT_PRIVATE_KEY.end()}, 3};
|
ObjectSubType::ECC233,
|
||||||
|
{DEFAULT_PRIVATE_KEY.begin(), DEFAULT_PRIVATE_KEY.end()},
|
||||||
|
3};
|
||||||
m_console_signature = DEFAULT_SIGNATURE;
|
m_console_signature = DEFAULT_SIGNATURE;
|
||||||
m_console_key_id = DEFAULT_KEY_ID;
|
m_console_key_id = DEFAULT_KEY_ID;
|
||||||
m_key_entries[HANDLE_CONSOLE_ID] = {TYPE_DATA, SUBTYPE_DATA, {}, DEFAULT_DEVICE_ID, 0xFFFFFFF};
|
m_key_entries[HANDLE_CONSOLE_ID] = {
|
||||||
m_key_entries[HANDLE_FS_KEY] = {TYPE_SECRET_KEY, SUBTYPE_AES128, std::vector<u8>(AES128_KEY_SIZE),
|
TYPE_DATA, ObjectSubType::Data, {}, DEFAULT_DEVICE_ID, 0xFFFFFFF};
|
||||||
5};
|
m_key_entries[HANDLE_FS_KEY] = {TYPE_SECRET_KEY, ObjectSubType::AES128,
|
||||||
m_key_entries[HANDLE_FS_MAC] = {TYPE_SECRET_KEY, SUBTYPE_MAC, std::vector<u8>(20), 5};
|
std::vector<u8>(AES128_KEY_SIZE), 5};
|
||||||
|
m_key_entries[HANDLE_FS_MAC] = {TYPE_SECRET_KEY, ObjectSubType::MAC, std::vector<u8>(20), 5};
|
||||||
|
|
||||||
switch (m_console_type)
|
switch (m_console_type)
|
||||||
{
|
{
|
||||||
case ConsoleType::Retail:
|
case ConsoleType::Retail:
|
||||||
m_key_entries[HANDLE_COMMON_KEY] = {TYPE_SECRET_KEY,
|
m_key_entries[HANDLE_COMMON_KEY] = {TYPE_SECRET_KEY,
|
||||||
SUBTYPE_AES128,
|
ObjectSubType::AES128,
|
||||||
{{0xeb, 0xe4, 0x2a, 0x22, 0x5e, 0x85, 0x93, 0xe4, 0x48,
|
{{0xeb, 0xe4, 0x2a, 0x22, 0x5e, 0x85, 0x93, 0xe4, 0x48,
|
||||||
0xd9, 0xc5, 0x45, 0x73, 0x81, 0xaa, 0xf7}},
|
0xd9, 0xc5, 0x45, 0x73, 0x81, 0xaa, 0xf7}},
|
||||||
3};
|
3};
|
||||||
m_root_key_entry = {TYPE_PUBLIC_KEY, SUBTYPE_RSA4096,
|
m_root_key_entry = {TYPE_PUBLIC_KEY, ObjectSubType::RSA4096,
|
||||||
std::vector<u8>(ROOT_PUBLIC_KEY.begin(), ROOT_PUBLIC_KEY.end()),
|
std::vector<u8>(ROOT_PUBLIC_KEY.begin(), ROOT_PUBLIC_KEY.end()),
|
||||||
Common::swap32(0x00010001), 0};
|
Common::swap32(0x00010001), 0};
|
||||||
// Retail keyblob are issued by CA00000001. Default to 1 even though IOSC actually defaults
|
// Retail keyblob are issued by CA00000001. Default to 1 even though IOSC actually defaults
|
||||||
|
@ -587,11 +591,11 @@ void IOSC::LoadDefaultEntries()
|
||||||
break;
|
break;
|
||||||
case ConsoleType::RVT:
|
case ConsoleType::RVT:
|
||||||
m_key_entries[HANDLE_COMMON_KEY] = {TYPE_SECRET_KEY,
|
m_key_entries[HANDLE_COMMON_KEY] = {TYPE_SECRET_KEY,
|
||||||
SUBTYPE_AES128,
|
ObjectSubType::AES128,
|
||||||
{{0xa1, 0x60, 0x4a, 0x6a, 0x71, 0x23, 0xb5, 0x29, 0xae,
|
{{0xa1, 0x60, 0x4a, 0x6a, 0x71, 0x23, 0xb5, 0x29, 0xae,
|
||||||
0x8b, 0xec, 0x32, 0xc8, 0x16, 0xfc, 0xaa}},
|
0x8b, 0xec, 0x32, 0xc8, 0x16, 0xfc, 0xaa}},
|
||||||
3};
|
3};
|
||||||
m_root_key_entry = {TYPE_PUBLIC_KEY, SUBTYPE_RSA4096,
|
m_root_key_entry = {TYPE_PUBLIC_KEY, ObjectSubType::RSA4096,
|
||||||
std::vector<u8>(ROOT_PUBLIC_KEY_DEV.begin(), ROOT_PUBLIC_KEY_DEV.end()),
|
std::vector<u8>(ROOT_PUBLIC_KEY_DEV.begin(), ROOT_PUBLIC_KEY_DEV.end()),
|
||||||
Common::swap32(0x00010001), 0};
|
Common::swap32(0x00010001), 0};
|
||||||
m_ms_id = 3;
|
m_ms_id = 3;
|
||||||
|
@ -599,22 +603,22 @@ void IOSC::LoadDefaultEntries()
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
|
|
||||||
m_key_entries[HANDLE_PRNG_KEY] = {TYPE_SECRET_KEY, SUBTYPE_AES128,
|
m_key_entries[HANDLE_PRNG_KEY] = {TYPE_SECRET_KEY, ObjectSubType::AES128,
|
||||||
std::vector<u8>(AES128_KEY_SIZE), 3};
|
std::vector<u8>(AES128_KEY_SIZE), 3};
|
||||||
|
|
||||||
m_key_entries[HANDLE_SD_KEY] = {TYPE_SECRET_KEY,
|
m_key_entries[HANDLE_SD_KEY] = {TYPE_SECRET_KEY,
|
||||||
SUBTYPE_AES128,
|
ObjectSubType::AES128,
|
||||||
{{0xab, 0x01, 0xb9, 0xd8, 0xe1, 0x62, 0x2b, 0x08, 0xaf, 0xba,
|
{{0xab, 0x01, 0xb9, 0xd8, 0xe1, 0x62, 0x2b, 0x08, 0xaf, 0xba,
|
||||||
0xd8, 0x4d, 0xbf, 0xc2, 0xa5, 0x5d}},
|
0xd8, 0x4d, 0xbf, 0xc2, 0xa5, 0x5d}},
|
||||||
3};
|
3};
|
||||||
|
|
||||||
m_key_entries[HANDLE_BOOT2_VERSION] = {TYPE_DATA, SUBTYPE_VERSION, {}, 3};
|
m_key_entries[HANDLE_BOOT2_VERSION] = {TYPE_DATA, ObjectSubType::Version, {}, 3};
|
||||||
m_key_entries[HANDLE_UNKNOWN_8] = {TYPE_DATA, SUBTYPE_VERSION, {}, 3};
|
m_key_entries[HANDLE_UNKNOWN_8] = {TYPE_DATA, ObjectSubType::Version, {}, 3};
|
||||||
m_key_entries[HANDLE_UNKNOWN_9] = {TYPE_DATA, SUBTYPE_VERSION, {}, 3};
|
m_key_entries[HANDLE_UNKNOWN_9] = {TYPE_DATA, ObjectSubType::Version, {}, 3};
|
||||||
m_key_entries[HANDLE_FS_VERSION] = {TYPE_DATA, SUBTYPE_VERSION, {}, 3};
|
m_key_entries[HANDLE_FS_VERSION] = {TYPE_DATA, ObjectSubType::Version, {}, 3};
|
||||||
|
|
||||||
m_key_entries[HANDLE_NEW_COMMON_KEY] = {TYPE_SECRET_KEY,
|
m_key_entries[HANDLE_NEW_COMMON_KEY] = {TYPE_SECRET_KEY,
|
||||||
SUBTYPE_AES128,
|
ObjectSubType::AES128,
|
||||||
{{0x63, 0xb8, 0x2b, 0xb4, 0xf4, 0x61, 0x4e, 0x2e, 0x13,
|
{{0x63, 0xb8, 0x2b, 0xb4, 0xf4, 0x61, 0x4e, 0x2e, 0x13,
|
||||||
0xf2, 0xfe, 0xfb, 0xba, 0x4c, 0x9b, 0x7e}},
|
0xf2, 0xfe, 0xfb, 0xba, 0x4c, 0x9b, 0x7e}},
|
||||||
3};
|
3};
|
||||||
|
|
|
@ -174,15 +174,15 @@ public:
|
||||||
TYPE_DATA = 3,
|
TYPE_DATA = 3,
|
||||||
};
|
};
|
||||||
|
|
||||||
enum ObjectSubType : u8
|
enum class ObjectSubType : u8
|
||||||
{
|
{
|
||||||
SUBTYPE_AES128 = 0,
|
AES128 = 0,
|
||||||
SUBTYPE_MAC = 1,
|
MAC = 1,
|
||||||
SUBTYPE_RSA2048 = 2,
|
RSA2048 = 2,
|
||||||
SUBTYPE_RSA4096 = 3,
|
RSA4096 = 3,
|
||||||
SUBTYPE_ECC233 = 4,
|
ECC233 = 4,
|
||||||
SUBTYPE_DATA = 5,
|
Data = 5,
|
||||||
SUBTYPE_VERSION = 6
|
Version = 6
|
||||||
};
|
};
|
||||||
|
|
||||||
IOSC(ConsoleType console_type = ConsoleType::Retail);
|
IOSC(ConsoleType console_type = ConsoleType::Retail);
|
||||||
|
|
Loading…
Reference in New Issue