diff options
| -rw-r--r-- | src/core/CMakeLists.txt | 2 | ||||
| -rw-r--r-- | src/core/hle/service/nwm/nwm_uds.cpp | 77 | ||||
| -rw-r--r-- | src/core/hle/service/nwm/uds_data.cpp | 278 | ||||
| -rw-r--r-- | src/core/hle/service/nwm/uds_data.h | 78 | ||||
| -rw-r--r-- | src/core/hw/aes/key.h | 2 | 
5 files changed, 436 insertions, 1 deletions
diff --git a/src/core/CMakeLists.txt b/src/core/CMakeLists.txt index b16a89990..ea09819e5 100644 --- a/src/core/CMakeLists.txt +++ b/src/core/CMakeLists.txt @@ -144,6 +144,7 @@ set(SRCS              hle/service/nwm/nwm_tst.cpp              hle/service/nwm/nwm_uds.cpp              hle/service/nwm/uds_beacon.cpp +            hle/service/nwm/uds_data.cpp              hle/service/pm_app.cpp              hle/service/ptm/ptm.cpp              hle/service/ptm/ptm_gets.cpp @@ -341,6 +342,7 @@ set(HEADERS              hle/service/nwm/nwm_tst.h              hle/service/nwm/nwm_uds.h              hle/service/nwm/uds_beacon.h +            hle/service/nwm/uds_data.h              hle/service/pm_app.h              hle/service/ptm/ptm.h              hle/service/ptm/ptm_gets.h diff --git a/src/core/hle/service/nwm/nwm_uds.cpp b/src/core/hle/service/nwm/nwm_uds.cpp index a7149c9e8..6dbdff044 100644 --- a/src/core/hle/service/nwm/nwm_uds.cpp +++ b/src/core/hle/service/nwm/nwm_uds.cpp @@ -15,6 +15,7 @@  #include "core/hle/result.h"  #include "core/hle/service/nwm/nwm_uds.h"  #include "core/hle/service/nwm/uds_beacon.h" +#include "core/hle/service/nwm/uds_data.h"  #include "core/memory.h"  namespace Service { @@ -373,6 +374,80 @@ static void DestroyNetwork(Interface* self) {  }  /** + * NWM_UDS::SendTo service function. + * Sends a data frame to the UDS network we're connected to. + *  Inputs: + *      0 : Command header. + *      1 : Unknown. + *      2 : u16 Destination network node id. + *      3 : u8 Data channel. + *      4 : Buffer size >> 2 + *      5 : Data size + *      6 : Flags + *      7 : Input buffer descriptor + *      8 : Input buffer address + *  Outputs: + *      0 : Return header + *      1 : Result of function, 0 on success, otherwise error code + */ +static void SendTo(Interface* self) { +    IPC::RequestParser rp(Kernel::GetCommandBuffer(), 0x17, 6, 2); + +    rp.Skip(1, false); +    u16 dest_node_id = rp.Pop<u16>(); +    u8 data_channel = rp.Pop<u8>(); +    rp.Skip(1, false); +    u32 data_size = rp.Pop<u32>(); +    u32 flags = rp.Pop<u32>(); + +    size_t desc_size; +    const VAddr input_address = rp.PopStaticBuffer(&desc_size, false); +    ASSERT(desc_size == data_size); + +    IPC::RequestBuilder rb = rp.MakeBuilder(1, 0); + +    if (connection_status.status != static_cast<u32>(NetworkStatus::ConnectedAsClient) && +        connection_status.status != static_cast<u32>(NetworkStatus::ConnectedAsHost)) { +        rb.Push(ResultCode(ErrorDescription::NotAuthorized, ErrorModule::UDS, +                           ErrorSummary::InvalidState, ErrorLevel::Status)); +        return; +    } + +    if (dest_node_id == connection_status.network_node_id) { +        rb.Push(ResultCode(ErrorDescription::NotFound, ErrorModule::UDS, +                           ErrorSummary::WrongArgument, ErrorLevel::Status)); +        return; +    } + +    // TODO(Subv): Do something with the flags. + +    constexpr size_t MaxSize = 0x5C6; +    if (data_size > MaxSize) { +        rb.Push(ResultCode(ErrorDescription::TooLarge, ErrorModule::UDS, +                           ErrorSummary::WrongArgument, ErrorLevel::Usage)); +        return; +    } + +    std::vector<u8> data(data_size); +    Memory::ReadBlock(input_address, data.data(), data.size()); + +    // TODO(Subv): Increment the sequence number after each sent packet. +    u16 sequence_number = 0; +    std::vector<u8> data_payload = GenerateDataPayload( +        data, data_channel, dest_node_id, connection_status.network_node_id, sequence_number); + +    // TODO(Subv): Retrieve the MAC address of the dest_node_id and our own to encrypt +    // and encapsulate the payload. + +    // TODO(Subv): Send the frame. + +    rb.Push(RESULT_SUCCESS); + +    LOG_WARNING(Service_NWM, "(STUB) called dest_node_id=%u size=%u flags=%u channel=%u", +                static_cast<u32>(dest_node_id), data_size, flags, static_cast<u32>(data_channel)); +} + +/**   * NWM_UDS::GetChannel service function.   * Returns the WiFi channel in which the network we're connected to is transmitting.   *  Inputs: @@ -600,7 +675,7 @@ const Interface::FunctionInfo FunctionTable[] = {      {0x00130040, nullptr, "Unbind"},      {0x001400C0, nullptr, "PullPacket"},      {0x00150080, nullptr, "SetMaxSendDelay"}, -    {0x00170182, nullptr, "SendTo"}, +    {0x00170182, SendTo, "SendTo"},      {0x001A0000, GetChannel, "GetChannel"},      {0x001B0302, InitializeWithVersion, "InitializeWithVersion"},      {0x001D0044, BeginHostingNetwork, "BeginHostingNetwork"}, diff --git a/src/core/hle/service/nwm/uds_data.cpp b/src/core/hle/service/nwm/uds_data.cpp new file mode 100644 index 000000000..8c6742dba --- /dev/null +++ b/src/core/hle/service/nwm/uds_data.cpp @@ -0,0 +1,278 @@ +// Copyright 2017 Citra Emulator Project +// Licensed under GPLv2 or any later version +// Refer to the license.txt file included. + +#include <cstring> +#include <cryptopp/aes.h> +#include <cryptopp/ccm.h> +#include <cryptopp/filters.h> +#include <cryptopp/md5.h> +#include <cryptopp/modes.h> +#include "core/hle/service/nwm/nwm_uds.h" +#include "core/hle/service/nwm/uds_data.h" +#include "core/hw/aes/key.h" + +namespace Service { +namespace NWM { + +using MacAddress = std::array<u8, 6>; + +/* + * Generates a SNAP-enabled 802.2 LLC header for the specified protocol. + * @returns a buffer with the bytes of the generated header. + */ +static std::vector<u8> GenerateLLCHeader(EtherType protocol) { +    LLCHeader header{}; +    header.protocol = static_cast<u16>(protocol); + +    std::vector<u8> buffer(sizeof(header)); +    memcpy(buffer.data(), &header, sizeof(header)); + +    return buffer; +} + +/* + * Generates a Nintendo UDS SecureData header with the specified parameters. + * @returns a buffer with the bytes of the generated header. + */ +static std::vector<u8> GenerateSecureDataHeader(u16 data_size, u8 channel, u16 dest_node_id, +                                                u16 src_node_id, u16 sequence_number) { +    SecureDataHeader header{}; +    header.protocol_size = data_size + sizeof(SecureDataHeader); +    // Note: This size includes everything except the first 4 bytes of the structure, +    // reinforcing the hypotheses that the first 4 bytes are actually the header of +    // another container protocol. +    header.securedata_size = data_size + sizeof(SecureDataHeader) - 4; +    // Frames sent by the emulated application are never UDS management frames +    header.is_management = 0; +    header.data_channel = channel; +    header.sequence_number = sequence_number; +    header.dest_node_id = dest_node_id; +    header.src_node_id = src_node_id; + +    std::vector<u8> buffer(sizeof(header)); +    memcpy(buffer.data(), &header, sizeof(header)); + +    return buffer; +} + +/* + * Calculates the CTR used for the AES-CTR process that calculates + * the CCMP crypto key for data frames. + * @returns The CTR used for data frames crypto key generation. + */ +static std::array<u8, CryptoPP::MD5::DIGESTSIZE> GetDataCryptoCTR(const NetworkInfo& network_info) { +    DataFrameCryptoCTR data{}; + +    data.host_mac = network_info.host_mac_address; +    data.wlan_comm_id = network_info.wlan_comm_id; +    data.id = network_info.id; +    data.network_id = network_info.network_id; + +    std::array<u8, CryptoPP::MD5::DIGESTSIZE> hash; +    CryptoPP::MD5().CalculateDigest(hash.data(), reinterpret_cast<u8*>(&data), sizeof(data)); + +    return hash; +} + +/* + * Generates the key used for encrypting the 802.11 data frames generated by UDS. + * @returns The key used for data frames crypto. + */ +static std::array<u8, CryptoPP::AES::BLOCKSIZE> GenerateDataCCMPKey( +    const std::vector<u8>& passphrase, const NetworkInfo& network_info) { +    // Calculate the MD5 hash of the input passphrase. +    std::array<u8, CryptoPP::MD5::DIGESTSIZE> passphrase_hash; +    CryptoPP::MD5().CalculateDigest(passphrase_hash.data(), passphrase.data(), passphrase.size()); + +    std::array<u8, CryptoPP::AES::BLOCKSIZE> ccmp_key; + +    // The CCMP key is the result of encrypting the MD5 hash of the passphrase with AES-CTR using +    // keyslot 0x2D. +    using CryptoPP::AES; +    std::array<u8, CryptoPP::MD5::DIGESTSIZE> counter = GetDataCryptoCTR(network_info); +    std::array<u8, AES::BLOCKSIZE> key = HW::AES::GetNormalKey(HW::AES::KeySlotID::UDSDataKey); +    CryptoPP::CTR_Mode<AES>::Encryption aes; +    aes.SetKeyWithIV(key.data(), AES::BLOCKSIZE, counter.data()); +    aes.ProcessData(ccmp_key.data(), passphrase_hash.data(), passphrase_hash.size()); + +    return ccmp_key; +} + +/* + * Generates the Additional Authenticated Data (AAD) for an UDS 802.11 encrypted data frame. + * @returns a buffer with the bytes of the AAD. + */ +static std::vector<u8> GenerateCCMPAAD(const MacAddress& sender, const MacAddress& receiver, +                                       const MacAddress& bssid, u16 frame_control) { +    // Reference: IEEE 802.11-2007 + +    // 8.3.3.3.2 Construct AAD (22-30 bytes) +    // The AAD is constructed from the MPDU header. The AAD does not include the header Duration +    // field, because the Duration field value can change due to normal IEEE 802.11 operation (e.g., +    // a rate change during retransmission). For similar reasons, several subfields in the Frame +    // Control field are masked to 0. +    struct { +        u16_be FC; // MPDU Frame Control field +        MacAddress A1; +        MacAddress A2; +        MacAddress A3; +        u16_be SC; // MPDU Sequence Control field +    } aad_struct{}; + +    constexpr u16 AADFrameControlMask = 0x8FC7; +    aad_struct.FC = frame_control & AADFrameControlMask; +    aad_struct.SC = 0; + +    bool to_ds = (frame_control & (1 << 0)) != 0; +    bool from_ds = (frame_control & (1 << 1)) != 0; +    // In the 802.11 standard, ToDS = 1 and FromDS = 1 is a valid configuration, +    // however, the 3DS doesn't seem to transmit frames with such combination. +    ASSERT_MSG(to_ds != from_ds, "Invalid combination"); + +    // The meaning of the address fields depends on the ToDS and FromDS fields. +    if (from_ds) { +        aad_struct.A1 = receiver; +        aad_struct.A2 = bssid; +        aad_struct.A3 = sender; +    } + +    if (to_ds) { +        aad_struct.A1 = bssid; +        aad_struct.A2 = sender; +        aad_struct.A3 = receiver; +    } + +    std::vector<u8> aad(sizeof(aad_struct)); +    std::memcpy(aad.data(), &aad_struct, sizeof(aad_struct)); + +    return aad; +} + +/* + * Decrypts the payload of an encrypted 802.11 data frame using the specified key. + * @returns The decrypted payload. + */ +static std::vector<u8> DecryptDataFrame(const std::vector<u8>& encrypted_payload, +                                        const std::array<u8, CryptoPP::AES::BLOCKSIZE>& ccmp_key, +                                        const MacAddress& sender, const MacAddress& receiver, +                                        const MacAddress& bssid, u16 sequence_number, +                                        u16 frame_control) { + +    // Reference: IEEE 802.11-2007 + +    std::vector<u8> aad = GenerateCCMPAAD(sender, receiver, bssid, frame_control); + +    std::vector<u8> packet_number{0, +                                  0, +                                  0, +                                  0, +                                  static_cast<u8>((sequence_number >> 8) & 0xFF), +                                  static_cast<u8>(sequence_number & 0xFF)}; + +    // 8.3.3.3.3 Construct CCM nonce (13 bytes) +    std::vector<u8> nonce; +    nonce.push_back(0);                                                    // priority +    nonce.insert(nonce.end(), sender.begin(), sender.end());               // Address 2 +    nonce.insert(nonce.end(), packet_number.begin(), packet_number.end()); // PN + +    try { +        CryptoPP::CCM<CryptoPP::AES, 8>::Decryption d; +        d.SetKeyWithIV(ccmp_key.data(), ccmp_key.size(), nonce.data(), nonce.size()); +        d.SpecifyDataLengths(aad.size(), encrypted_payload.size() - 8, 0); + +        CryptoPP::AuthenticatedDecryptionFilter df( +            d, nullptr, CryptoPP::AuthenticatedDecryptionFilter::MAC_AT_END | +                            CryptoPP::AuthenticatedDecryptionFilter::THROW_EXCEPTION); +        // put aad +        df.ChannelPut(CryptoPP::AAD_CHANNEL, aad.data(), aad.size()); + +        // put cipher with mac +        df.ChannelPut(CryptoPP::DEFAULT_CHANNEL, encrypted_payload.data(), +                      encrypted_payload.size() - 8); +        df.ChannelPut(CryptoPP::DEFAULT_CHANNEL, +                      encrypted_payload.data() + encrypted_payload.size() - 8, 8); + +        df.ChannelMessageEnd(CryptoPP::AAD_CHANNEL); +        df.ChannelMessageEnd(CryptoPP::DEFAULT_CHANNEL); +        df.SetRetrievalChannel(CryptoPP::DEFAULT_CHANNEL); + +        int size = df.MaxRetrievable(); + +        std::vector<u8> pdata(size); +        df.Get(pdata.data(), size); +        return pdata; +    } catch (CryptoPP::Exception&) { +        LOG_ERROR(Service_NWM, "failed to decrypt"); +    } + +    return {}; +} + +/* + * Encrypts the payload of an 802.11 data frame using the specified key. + * @returns The encrypted payload. + */ +static std::vector<u8> EncryptDataFrame(const std::vector<u8>& payload, +                                        const std::array<u8, CryptoPP::AES::BLOCKSIZE>& ccmp_key, +                                        const MacAddress& sender, const MacAddress& receiver, +                                        const MacAddress& bssid, u16 sequence_number, +                                        u16 frame_control) { +    // Reference: IEEE 802.11-2007 + +    std::vector<u8> aad = GenerateCCMPAAD(sender, receiver, bssid, frame_control); + +    std::vector<u8> packet_number{0, +                                  0, +                                  0, +                                  0, +                                  static_cast<u8>((sequence_number >> 8) & 0xFF), +                                  static_cast<u8>(sequence_number & 0xFF)}; + +    // 8.3.3.3.3 Construct CCM nonce (13 bytes) +    std::vector<u8> nonce; +    nonce.push_back(0);                                                    // priority +    nonce.insert(nonce.end(), sender.begin(), sender.end());               // Address 2 +    nonce.insert(nonce.end(), packet_number.begin(), packet_number.end()); // PN + +    try { +        CryptoPP::CCM<CryptoPP::AES, 8>::Encryption d; +        d.SetKeyWithIV(ccmp_key.data(), ccmp_key.size(), nonce.data(), nonce.size()); +        d.SpecifyDataLengths(aad.size(), payload.size(), 0); + +        CryptoPP::AuthenticatedEncryptionFilter df(d); +        // put aad +        df.ChannelPut(CryptoPP::AAD_CHANNEL, aad.data(), aad.size()); +        df.ChannelMessageEnd(CryptoPP::AAD_CHANNEL); + +        // put plaintext +        df.ChannelPut(CryptoPP::DEFAULT_CHANNEL, payload.data(), payload.size()); +        df.ChannelMessageEnd(CryptoPP::DEFAULT_CHANNEL); + +        df.SetRetrievalChannel(CryptoPP::DEFAULT_CHANNEL); + +        int size = df.MaxRetrievable(); + +        std::vector<u8> cipher(size); +        df.Get(cipher.data(), size); +        return cipher; +    } catch (CryptoPP::Exception&) { +        LOG_ERROR(Service_NWM, "failed to encrypt"); +    } + +    return {}; +} + +std::vector<u8> GenerateDataPayload(const std::vector<u8>& data, u8 channel, u16 dest_node, +                                    u16 src_node, u16 sequence_number) { +    std::vector<u8> buffer = GenerateLLCHeader(EtherType::SecureData); +    std::vector<u8> securedata_header = +        GenerateSecureDataHeader(data.size(), channel, dest_node, src_node, sequence_number); + +    buffer.insert(buffer.end(), securedata_header.begin(), securedata_header.end()); +    buffer.insert(buffer.end(), data.begin(), data.end()); +    return buffer; +} + +} // namespace NWM +} // namespace Service diff --git a/src/core/hle/service/nwm/uds_data.h b/src/core/hle/service/nwm/uds_data.h new file mode 100644 index 000000000..a23520a41 --- /dev/null +++ b/src/core/hle/service/nwm/uds_data.h @@ -0,0 +1,78 @@ +// Copyright 2017 Citra Emulator Project +// Licensed under GPLv2 or any later version +// Refer to the license.txt file included. + +#pragma once + +#include <array> +#include <vector> +#include "common/common_types.h" +#include "common/swap.h" +#include "core/hle/service/service.h" + +namespace Service { +namespace NWM { + +enum class SAP : u8 { SNAPExtensionUsed = 0xAA }; + +enum class PDUControl : u8 { UnnumberedInformation = 3 }; + +enum class EtherType : u16 { SecureData = 0x876D, EAPoL = 0x888E }; + +/* + * 802.2 header, UDS packets always use SNAP for these headers, + * which means the dsap and ssap are always SNAPExtensionUsed (0xAA) + * and the OUI is always 0. + */ +struct LLCHeader { +    u8 dsap = static_cast<u8>(SAP::SNAPExtensionUsed); +    u8 ssap = static_cast<u8>(SAP::SNAPExtensionUsed); +    u8 control = static_cast<u8>(PDUControl::UnnumberedInformation); +    std::array<u8, 3> OUI = {}; +    u16_be protocol; +}; + +static_assert(sizeof(LLCHeader) == 8, "LLCHeader has the wrong size"); + +/* + * Nintendo SecureData header, every UDS packet contains one, + * it is used to store metadata about the transmission such as + * the source and destination network node ids. + */ +struct SecureDataHeader { +    // TODO(Subv): It is likely that the first 4 bytes of this header are +    // actually part of another container protocol. +    u16_be protocol_size; +    INSERT_PADDING_BYTES(2); +    u16_be securedata_size; +    u8 is_management; +    u8 data_channel; +    u16_be sequence_number; +    u16_be dest_node_id; +    u16_be src_node_id; +}; + +static_assert(sizeof(SecureDataHeader) == 14, "SecureDataHeader has the wrong size"); + +/* + * The raw bytes of this structure are the CTR used in the encryption (AES-CTR) + * process used to generate the CCMP key for data frame encryption. + */ +struct DataFrameCryptoCTR { +    u32_le wlan_comm_id; +    u32_le network_id; +    std::array<u8, 6> host_mac; +    u16_le id; +}; + +static_assert(sizeof(DataFrameCryptoCTR) == 16, "DataFrameCryptoCTR has the wrong size"); + +/** + * Generates an unencrypted 802.11 data payload. + * @returns The generated frame payload. + */ +std::vector<u8> GenerateDataPayload(const std::vector<u8>& data, u8 channel, u16 dest_node, +                                    u16 src_node, u16 sequence_number); + +} // namespace NWM +} // namespace Service diff --git a/src/core/hw/aes/key.h b/src/core/hw/aes/key.h index b01d04f13..c9f1342f4 100644 --- a/src/core/hw/aes/key.h +++ b/src/core/hw/aes/key.h @@ -12,6 +12,8 @@ namespace HW {  namespace AES {  enum KeySlotID : size_t { +    // AES Keyslot used to generate the UDS data frame CCMP key. +    UDSDataKey = 0x2D,      APTWrap = 0x31,      MaxKeySlotID = 0x40,  | 
