mirror of
https://github.com/Atmosphere-NX/Atmosphere.git
synced 2025-05-31 23:08:22 -04:00
spl: implement CryptoService.
This commit is contained in:
parent
ccbab35deb
commit
bfa84e27c1
12 changed files with 558 additions and 102 deletions
|
@ -24,29 +24,66 @@
|
|||
/* Convenient. */
|
||||
constexpr size_t DeviceAddressSpaceAlignSize = 0x400000;
|
||||
constexpr size_t DeviceAddressSpaceAlignMask = DeviceAddressSpaceAlignSize - 1;
|
||||
constexpr u32 DeviceMapBase = 0x80000000u;
|
||||
constexpr u32 WorkBufferMapBase = 0x80000000u;
|
||||
constexpr u32 CryptAesInMapBase = 0x90000000u;
|
||||
constexpr u32 CryptAesOutMapBase = 0xC0000000u;
|
||||
constexpr size_t CryptAesSizeMax = static_cast<size_t>(CryptAesOutMapBase - CryptAesInMapBase);
|
||||
|
||||
/* Types. */
|
||||
struct SeLinkedListEntry {
|
||||
u32 num_entries;
|
||||
u32 address;
|
||||
u32 size;
|
||||
};
|
||||
|
||||
struct SeCryptContext {
|
||||
SeLinkedListEntry in;
|
||||
SeLinkedListEntry out;
|
||||
};
|
||||
|
||||
class DeviceAddressSpaceMapHelper {
|
||||
private:
|
||||
Handle das_hnd;
|
||||
u64 dst_addr;
|
||||
u64 src_addr;
|
||||
size_t size;
|
||||
u32 perm;
|
||||
public:
|
||||
DeviceAddressSpaceMapHelper(Handle h, u64 dst, u64 src, size_t sz, u32 p) : das_hnd(h), dst_addr(dst), src_addr(src), size(sz), perm(p) {
|
||||
if (R_FAILED(svcMapDeviceAddressSpaceAligned(this->das_hnd, CUR_PROCESS_HANDLE, this->src_addr, this->size, this->dst_addr, this->perm))) {
|
||||
std::abort();
|
||||
}
|
||||
}
|
||||
~DeviceAddressSpaceMapHelper() {
|
||||
if (R_FAILED(svcUnmapDeviceAddressSpace(this->das_hnd, CUR_PROCESS_HANDLE, this->src_addr, this->size, this->dst_addr))) {
|
||||
std::abort();
|
||||
}
|
||||
}
|
||||
};
|
||||
|
||||
/* Globals. */
|
||||
static CtrDrbg g_drbg;
|
||||
static Event g_se_event;
|
||||
static IEvent *g_se_keyslot_available_event = nullptr;
|
||||
|
||||
static Handle g_se_das_hnd;
|
||||
static u32 g_se_mapped_work_buffer_addr;
|
||||
static __attribute__((aligned(0x1000))) u8 g_work_buffer[0x1000];
|
||||
constexpr size_t MaxWorkBufferSize = sizeof(g_work_buffer) / 2;
|
||||
|
||||
static HosMutex g_se_lock;
|
||||
static HosMutex g_async_op_lock;
|
||||
|
||||
void SecureMonitorWrapper::InitializeCtrDrbg() {
|
||||
u8 seed[CtrDrbg::SeedSize];
|
||||
|
||||
|
||||
if (SmcWrapper::GenerateRandomBytes(seed, sizeof(seed)) != SmcResult_Success) {
|
||||
std::abort();
|
||||
}
|
||||
|
||||
|
||||
g_drbg.Initialize(seed);
|
||||
}
|
||||
|
||||
void SecureMonitorWrapper::InitializeSeInterruptEvent() {
|
||||
void SecureMonitorWrapper::InitializeSeEvents() {
|
||||
u64 irq_num;
|
||||
SmcWrapper::GetConfig(&irq_num, 1, SplConfigItem_SecurityEngineIrqNumber);
|
||||
Handle hnd;
|
||||
|
@ -54,6 +91,9 @@ void SecureMonitorWrapper::InitializeSeInterruptEvent() {
|
|||
std::abort();
|
||||
}
|
||||
eventLoadRemote(&g_se_event, hnd, true);
|
||||
|
||||
g_se_keyslot_available_event = CreateWriteOnlySystemEvent();
|
||||
g_se_keyslot_available_event->Signal();
|
||||
}
|
||||
|
||||
void SecureMonitorWrapper::InitializeDeviceAddressSpace() {
|
||||
|
@ -67,10 +107,10 @@ void SecureMonitorWrapper::InitializeDeviceAddressSpace() {
|
|||
if (R_FAILED(svcAttachDeviceAddressSpace(DeviceName_SE, g_se_das_hnd))) {
|
||||
std::abort();
|
||||
}
|
||||
|
||||
|
||||
const u64 work_buffer_addr = reinterpret_cast<u64>(g_work_buffer);
|
||||
g_se_mapped_work_buffer_addr = 0x80000000u + (work_buffer_addr & DeviceAddressSpaceAlignMask);
|
||||
|
||||
g_se_mapped_work_buffer_addr = WorkBufferMapBase + (work_buffer_addr & DeviceAddressSpaceAlignMask);
|
||||
|
||||
/* Map the work buffer for the SE. */
|
||||
if (R_FAILED(svcMapDeviceAddressSpaceAligned(g_se_das_hnd, CUR_PROCESS_HANDLE, work_buffer_addr, sizeof(g_work_buffer), g_se_mapped_work_buffer_addr, 3))) {
|
||||
std::abort();
|
||||
|
@ -80,8 +120,8 @@ void SecureMonitorWrapper::InitializeDeviceAddressSpace() {
|
|||
void SecureMonitorWrapper::Initialize() {
|
||||
/* Initialize the Drbg. */
|
||||
InitializeCtrDrbg();
|
||||
/* Initialize SE interrupt event. */
|
||||
InitializeSeInterruptEvent();
|
||||
/* Initialize SE interrupt + keyslot events. */
|
||||
InitializeSeEvents();
|
||||
/* Initialize DAS for the SE. */
|
||||
InitializeDeviceAddressSpace();
|
||||
}
|
||||
|
@ -102,37 +142,78 @@ Result SecureMonitorWrapper::ConvertToSplResult(SmcResult result) {
|
|||
|
||||
SmcResult SecureMonitorWrapper::WaitCheckStatus(AsyncOperationKey op_key) {
|
||||
WaitSeOperationComplete();
|
||||
|
||||
|
||||
SmcResult op_res;
|
||||
SmcResult res = SmcWrapper::CheckStatus(&op_res, op_key);
|
||||
if (res != SmcResult_Success) {
|
||||
return res;
|
||||
}
|
||||
|
||||
|
||||
return op_res;
|
||||
}
|
||||
|
||||
SmcResult SecureMonitorWrapper::WaitGetResult(void *out_buf, size_t out_buf_size, AsyncOperationKey op_key) {
|
||||
WaitSeOperationComplete();
|
||||
|
||||
|
||||
SmcResult op_res;
|
||||
SmcResult res = SmcWrapper::GetResult(&op_res, out_buf, out_buf_size, op_key);
|
||||
if (res != SmcResult_Success) {
|
||||
return res;
|
||||
}
|
||||
|
||||
|
||||
return op_res;
|
||||
}
|
||||
|
||||
SmcResult SecureMonitorWrapper::DecryptAesBlock(u32 keyslot, void *dst, const void *src) {
|
||||
struct DecryptAesBlockLayout {
|
||||
SeCryptContext crypt_ctx;
|
||||
u8 in_block[AES_BLOCK_SIZE] __attribute__((aligned(AES_BLOCK_SIZE)));
|
||||
u8 out_block[AES_BLOCK_SIZE] __attribute__((aligned(AES_BLOCK_SIZE)));
|
||||
};
|
||||
DecryptAesBlockLayout *layout = reinterpret_cast<DecryptAesBlockLayout *>(g_work_buffer);
|
||||
|
||||
layout->crypt_ctx.in.num_entries = 0;
|
||||
layout->crypt_ctx.in.address = g_se_mapped_work_buffer_addr + offsetof(DecryptAesBlockLayout, in_block);
|
||||
layout->crypt_ctx.in.size = sizeof(layout->in_block);
|
||||
layout->crypt_ctx.out.num_entries = 0;
|
||||
layout->crypt_ctx.out.address = g_se_mapped_work_buffer_addr + offsetof(DecryptAesBlockLayout, out_block);
|
||||
layout->crypt_ctx.out.size = sizeof(layout->out_block);
|
||||
|
||||
std::memcpy(layout->in_block, src, sizeof(layout->in_block));
|
||||
|
||||
armDCacheFlush(layout, sizeof(*layout));
|
||||
{
|
||||
std::scoped_lock<HosMutex> lk(g_async_op_lock);
|
||||
AsyncOperationKey op_key;
|
||||
const IvCtr iv_ctr = {};
|
||||
const u32 mode = SmcWrapper::GetCryptAesMode(SmcCipherMode_CbcDecrypt, keyslot);
|
||||
const u32 dst_ll_addr = g_se_mapped_work_buffer_addr + offsetof(DecryptAesBlockLayout, crypt_ctx.out);
|
||||
const u32 src_ll_addr = g_se_mapped_work_buffer_addr + offsetof(DecryptAesBlockLayout, crypt_ctx.in);
|
||||
|
||||
SmcResult res = SmcWrapper::CryptAes(&op_key, mode, iv_ctr, dst_ll_addr, src_ll_addr, sizeof(layout->in_block));
|
||||
if (res != SmcResult_Success) {
|
||||
return res;
|
||||
}
|
||||
|
||||
if ((res = WaitCheckStatus(op_key)) != SmcResult_Success) {
|
||||
return res;
|
||||
}
|
||||
}
|
||||
armDCacheFlush(layout, sizeof(*layout));
|
||||
|
||||
std::memcpy(dst, layout->out_block, sizeof(layout->out_block));
|
||||
return SmcResult_Success;
|
||||
}
|
||||
|
||||
Result SecureMonitorWrapper::GetConfig(u64 *out, SplConfigItem which) {
|
||||
/* Nintendo explicitly blacklists package2 hash here, amusingly. */
|
||||
/* This is not blacklisted in safemode, but we're never in safe mode... */
|
||||
if (which == SplConfigItem_Package2Hash) {
|
||||
return ResultSplInvalidArgument;
|
||||
}
|
||||
|
||||
|
||||
SmcResult res = SmcWrapper::GetConfig(out, 1, which);
|
||||
|
||||
|
||||
/* Nintendo has some special handling here for hardware type/is_retail. */
|
||||
if (which == SplConfigItem_HardwareType && res == SmcResult_InvalidArgument) {
|
||||
*out = 0;
|
||||
|
@ -142,7 +223,7 @@ Result SecureMonitorWrapper::GetConfig(u64 *out, SplConfigItem which) {
|
|||
*out = 0;
|
||||
res = SmcResult_Success;
|
||||
}
|
||||
|
||||
|
||||
return ConvertToSplResult(res);
|
||||
}
|
||||
|
||||
|
@ -153,7 +234,7 @@ Result SecureMonitorWrapper::ExpMod(void *out, size_t out_size, const void *base
|
|||
u8 mod[0x100];
|
||||
};
|
||||
ExpModLayout *layout = reinterpret_cast<ExpModLayout *>(g_work_buffer);
|
||||
|
||||
|
||||
/* Validate sizes. */
|
||||
if (base_size > sizeof(layout->base)) {
|
||||
return ResultSplInvalidSize;
|
||||
|
@ -164,10 +245,10 @@ Result SecureMonitorWrapper::ExpMod(void *out, size_t out_size, const void *base
|
|||
if (mod_size > sizeof(layout->mod)) {
|
||||
return ResultSplInvalidSize;
|
||||
}
|
||||
if (out_size > sizeof(g_work_buffer) / 2) {
|
||||
if (out_size > MaxWorkBufferSize) {
|
||||
return ResultSplInvalidSize;
|
||||
}
|
||||
|
||||
|
||||
/* Copy data into work buffer. */
|
||||
const size_t base_ofs = sizeof(layout->base) - base_size;
|
||||
const size_t mod_ofs = sizeof(layout->mod) - mod_size;
|
||||
|
@ -175,22 +256,24 @@ Result SecureMonitorWrapper::ExpMod(void *out, size_t out_size, const void *base
|
|||
std::memcpy(layout->base + base_ofs, base, base_size);
|
||||
std::memcpy(layout->exp, exp, exp_size);
|
||||
std::memcpy(layout->mod + mod_ofs, mod, mod_size);
|
||||
|
||||
|
||||
/* Do exp mod operation. */
|
||||
armDCacheFlush(layout, sizeof(*layout));
|
||||
{
|
||||
std::scoped_lock<HosMutex> lk(g_se_lock);
|
||||
std::scoped_lock<HosMutex> lk(g_async_op_lock);
|
||||
AsyncOperationKey op_key;
|
||||
|
||||
|
||||
SmcResult res = SmcWrapper::ExpMod(&op_key, layout->base, layout->exp, exp_size, layout->mod);
|
||||
if (res != SmcResult_Success) {
|
||||
return ConvertToSplResult(res);
|
||||
}
|
||||
|
||||
|
||||
if ((res = WaitGetResult(g_work_buffer, out_size, op_key)) != SmcResult_Success) {
|
||||
return ConvertToSplResult(res);
|
||||
}
|
||||
}
|
||||
|
||||
armDCacheFlush(g_work_buffer, sizeof(out_size));
|
||||
|
||||
std::memcpy(out, g_work_buffer, out_size);
|
||||
return ResultSuccess;
|
||||
}
|
||||
|
@ -204,17 +287,17 @@ Result SecureMonitorWrapper::GenerateRandomBytesInternal(void *out, size_t size)
|
|||
/* We need to reseed. */
|
||||
{
|
||||
u8 seed[CtrDrbg::SeedSize];
|
||||
|
||||
|
||||
SmcResult res = SmcWrapper::GenerateRandomBytes(seed, sizeof(seed));
|
||||
if (res != SmcResult_Success) {
|
||||
return ConvertToSplResult(res);
|
||||
}
|
||||
|
||||
|
||||
g_drbg.Reseed(seed);
|
||||
g_drbg.GenerateRandomBytes(out, size);
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
return ResultSuccess;
|
||||
}
|
||||
|
||||
|
@ -223,7 +306,7 @@ Result SecureMonitorWrapper::GenerateRandomBytes(void *out, size_t size) {
|
|||
|
||||
for (size_t ofs = 0; ofs < size; ofs += CtrDrbg::MaxRequestSize) {
|
||||
const size_t cur_size = std::min(size - ofs, CtrDrbg::MaxRequestSize);
|
||||
|
||||
|
||||
Result rc = GenerateRandomBytesInternal(cur_dst, size);
|
||||
if (R_FAILED(rc)) {
|
||||
return rc;
|
||||
|
@ -262,4 +345,190 @@ Result SecureMonitorWrapper::GetBootReason(BootReasonValue *out) {
|
|||
|
||||
*out = GetBootReason();
|
||||
return ResultSuccess;
|
||||
}
|
||||
|
||||
Result SecureMonitorWrapper::GenerateAesKek(AccessKey *out_access_key, const KeySource &key_source, u32 generation, u32 option) {
|
||||
return ConvertToSplResult(SmcWrapper::GenerateAesKek(out_access_key, key_source, generation, option));
|
||||
}
|
||||
|
||||
Result SecureMonitorWrapper::LoadAesKey(u32 keyslot, const void *owner, const AccessKey &access_key, const KeySource &key_source) {
|
||||
Result rc = ValidateAesKeyslot(keyslot, owner);
|
||||
if (R_FAILED(rc)) {
|
||||
return rc;
|
||||
}
|
||||
return ConvertToSplResult(SmcWrapper::LoadAesKey(keyslot, access_key, key_source));
|
||||
}
|
||||
|
||||
Result SecureMonitorWrapper::GenerateAesKey(AesKey *out_key, const AccessKey &access_key, const KeySource &key_source) {
|
||||
Result rc;
|
||||
SmcResult smc_rc;
|
||||
|
||||
static const KeySource s_generate_aes_key_source = {
|
||||
.data = {0x89, 0x61, 0x5E, 0xE0, 0x5C, 0x31, 0xB6, 0x80, 0x5F, 0xE5, 0x8F, 0x3D, 0xA2, 0x4F, 0x7A, 0xA8}
|
||||
};
|
||||
|
||||
ScopedAesKeyslot keyslot_holder(this);
|
||||
if (R_FAILED((rc = keyslot_holder.Allocate()))) {
|
||||
return rc;
|
||||
}
|
||||
|
||||
smc_rc = SmcWrapper::LoadAesKey(keyslot_holder.GetKeyslot(), access_key, s_generate_aes_key_source);
|
||||
if (smc_rc == SmcResult_Success) {
|
||||
smc_rc = DecryptAesBlock(keyslot_holder.GetKeyslot(), out_key, &key_source);
|
||||
}
|
||||
|
||||
return ConvertToSplResult(smc_rc);
|
||||
}
|
||||
|
||||
Result SecureMonitorWrapper::DecryptAesKey(AesKey *out_key, const KeySource &key_source, u32 generation, u32 option) {
|
||||
Result rc;
|
||||
|
||||
static const KeySource s_decrypt_aes_key_source = {
|
||||
.data = {0x11, 0x70, 0x24, 0x2B, 0x48, 0x69, 0x11, 0xF1, 0x11, 0xB0, 0x0C, 0x47, 0x7C, 0xC3, 0xEF, 0x7E}
|
||||
};
|
||||
|
||||
AccessKey access_key;
|
||||
if (R_FAILED((rc = GenerateAesKek(&access_key, s_decrypt_aes_key_source, generation, option)))) {
|
||||
return rc;
|
||||
}
|
||||
|
||||
return GenerateAesKey(out_key, access_key, key_source);
|
||||
}
|
||||
|
||||
Result SecureMonitorWrapper::CryptAesCtr(void *dst, size_t dst_size, u32 keyslot, const void *owner, const void *src, size_t src_size, const IvCtr &iv_ctr) {
|
||||
Result rc = ValidateAesKeyslot(keyslot, owner);
|
||||
if (R_FAILED(rc)) {
|
||||
return rc;
|
||||
}
|
||||
|
||||
/* Succeed immediately if there's nothing to crypt. */
|
||||
if (src_size == 0) {
|
||||
return ResultSuccess;
|
||||
}
|
||||
|
||||
/* Validate sizes. */
|
||||
if (src_size > dst_size || src_size % AES_BLOCK_SIZE != 0) {
|
||||
return ResultSplInvalidSize;
|
||||
}
|
||||
|
||||
/* We can only map 0x400000 aligned buffers for the SE. With that in mind, we have some math to do. */
|
||||
const uintptr_t src_addr = reinterpret_cast<uintptr_t>(src);
|
||||
const uintptr_t dst_addr = reinterpret_cast<uintptr_t>(dst);
|
||||
const uintptr_t src_addr_page_aligned = src_addr & ~0xFFFul;
|
||||
const uintptr_t dst_addr_page_aligned = dst_addr & ~0xFFFul;
|
||||
const size_t src_size_page_aligned = ((src_addr + src_size + 0xFFFul) & ~0xFFFul) - src_addr_page_aligned;
|
||||
const size_t dst_size_page_aligned = ((dst_addr + dst_size + 0xFFFul) & ~0xFFFul) - dst_addr_page_aligned;
|
||||
const u32 src_se_map_addr = CryptAesInMapBase + (src_addr_page_aligned & DeviceAddressSpaceAlignMask);
|
||||
const u32 dst_se_map_addr = CryptAesOutMapBase + (dst_addr_page_aligned & DeviceAddressSpaceAlignMask);
|
||||
const u32 src_se_addr = CryptAesInMapBase + (src_addr & DeviceAddressSpaceAlignMask);
|
||||
const u32 dst_se_addr = CryptAesInMapBase + (dst_addr & DeviceAddressSpaceAlignMask);
|
||||
|
||||
/* Validate aligned sizes. */
|
||||
if (src_size_page_aligned > CryptAesSizeMax || dst_size_page_aligned > CryptAesSizeMax) {
|
||||
return ResultSplInvalidSize;
|
||||
}
|
||||
|
||||
/* Helpers for mapping/unmapping. */
|
||||
DeviceAddressSpaceMapHelper in_mapper(g_se_das_hnd, src_se_map_addr, src_addr_page_aligned, src_size_page_aligned, 1);
|
||||
DeviceAddressSpaceMapHelper out_mapper(g_se_das_hnd, dst_se_map_addr, dst_addr_page_aligned, dst_size_page_aligned, 2);
|
||||
|
||||
/* Setup SE linked list entries. */
|
||||
SeCryptContext *crypt_ctx = reinterpret_cast<SeCryptContext *>(g_work_buffer);
|
||||
crypt_ctx->in.num_entries = 0;
|
||||
crypt_ctx->in.address = src_se_addr;
|
||||
crypt_ctx->in.size = src_size;
|
||||
crypt_ctx->out.num_entries = 0;
|
||||
crypt_ctx->out.address = dst_se_addr;
|
||||
crypt_ctx->out.size = dst_size;
|
||||
|
||||
armDCacheFlush(crypt_ctx, sizeof(*crypt_ctx));
|
||||
armDCacheFlush(const_cast<void *>(src), src_size);
|
||||
armDCacheFlush(dst, dst_size);
|
||||
{
|
||||
std::scoped_lock<HosMutex> lk(g_async_op_lock);
|
||||
AsyncOperationKey op_key;
|
||||
const u32 mode = SmcWrapper::GetCryptAesMode(SmcCipherMode_Ctr, keyslot);
|
||||
const u32 dst_ll_addr = g_se_mapped_work_buffer_addr + offsetof(SeCryptContext, out);
|
||||
const u32 src_ll_addr = g_se_mapped_work_buffer_addr + offsetof(SeCryptContext, in);
|
||||
|
||||
SmcResult res = SmcWrapper::CryptAes(&op_key, mode, iv_ctr, dst_ll_addr, src_ll_addr, src_size);
|
||||
if (res != SmcResult_Success) {
|
||||
return ConvertToSplResult(res);
|
||||
}
|
||||
|
||||
if ((res = WaitCheckStatus(op_key)) != SmcResult_Success) {
|
||||
return ConvertToSplResult(res);
|
||||
}
|
||||
}
|
||||
armDCacheFlush(dst, dst_size);
|
||||
|
||||
return ResultSuccess;
|
||||
}
|
||||
|
||||
Result SecureMonitorWrapper::ComputeCmac(Cmac *out_cmac, u32 keyslot, const void *owner, const void *data, size_t size) {
|
||||
Result rc = ValidateAesKeyslot(keyslot, owner);
|
||||
if (R_FAILED(rc)) {
|
||||
return rc;
|
||||
}
|
||||
|
||||
if (size > MaxWorkBufferSize) {
|
||||
return ResultSplInvalidSize;
|
||||
}
|
||||
|
||||
std::memcpy(g_work_buffer, data, size);
|
||||
return ConvertToSplResult(SmcWrapper::ComputeCmac(out_cmac, keyslot, g_work_buffer, size));
|
||||
}
|
||||
|
||||
Result SecureMonitorWrapper::AllocateAesKeyslot(u32 *out_keyslot, const void *owner) {
|
||||
for (size_t i = 0; i < GetMaxKeyslots(); i++) {
|
||||
if (this->keyslot_owners[i] == 0) {
|
||||
this->keyslot_owners[i] = owner;
|
||||
*out_keyslot = static_cast<u32>(i);
|
||||
return ResultSuccess;
|
||||
}
|
||||
}
|
||||
|
||||
g_se_keyslot_available_event->Clear();
|
||||
return ResultSplOutOfKeyslots;
|
||||
}
|
||||
|
||||
Result SecureMonitorWrapper::ValidateAesKeyslot(u32 keyslot, const void *owner) {
|
||||
if (keyslot >= GetMaxKeyslots()) {
|
||||
return ResultSplInvalidKeyslot;
|
||||
}
|
||||
if (this->keyslot_owners[keyslot] != owner) {
|
||||
return ResultSplInvalidKeyslot;
|
||||
}
|
||||
return ResultSuccess;
|
||||
}
|
||||
|
||||
Result SecureMonitorWrapper::FreeAesKeyslot(u32 keyslot, const void *owner) {
|
||||
Result rc = ValidateAesKeyslot(keyslot, owner);
|
||||
if (R_FAILED(rc)) {
|
||||
return rc;
|
||||
}
|
||||
|
||||
/* Clear the keyslot. */
|
||||
{
|
||||
AccessKey access_key = {};
|
||||
KeySource key_source = {};
|
||||
|
||||
SmcWrapper::LoadAesKey(keyslot, access_key, key_source);
|
||||
}
|
||||
this->keyslot_owners[keyslot] = nullptr;
|
||||
g_se_keyslot_available_event->Signal();
|
||||
return ResultSuccess;
|
||||
}
|
||||
|
||||
Result SecureMonitorWrapper::FreeAesKeyslots(const void *owner) {
|
||||
for (size_t i = 0; i < GetMaxKeyslots(); i++) {
|
||||
if (this->keyslot_owners[i] == owner) {
|
||||
FreeAesKeyslot(i, owner);
|
||||
}
|
||||
}
|
||||
return ResultSuccess;
|
||||
}
|
||||
|
||||
Handle SecureMonitorWrapper::GetAesKeyslotAvailableEventHandle() {
|
||||
return g_se_keyslot_available_event->GetHandle();
|
||||
}
|
Loading…
Add table
Add a link
Reference in a new issue