2022-01-11 09:22:20 +01:00
using Microsoft.IdentityModel.Tokens ;
using Ryujinx.Common.Logging ;
2020-08-18 21:24:54 +02:00
using Ryujinx.HLE.HOS.Kernel.Threading ;
using Ryujinx.HLE.HOS.Services.Account.Acc.AsyncContext ;
2022-01-11 09:22:20 +01:00
using System ;
using System.IdentityModel.Tokens.Jwt ;
using System.Security.Cryptography ;
using System.Text ;
2020-08-18 21:24:54 +02:00
using System.Threading ;
using System.Threading.Tasks ;
2018-02-10 01:14:55 +01:00
2021-01-02 23:34:28 +01:00
namespace Ryujinx.HLE.HOS.Services.Account.Acc.AccountService
2018-02-10 01:14:55 +01:00
{
2021-01-02 23:34:28 +01:00
class ManagerServer
2018-02-10 01:14:55 +01:00
{
2020-08-18 21:24:54 +02:00
// TODO: Determine where and how NetworkServiceAccountId is set.
private const long NetworkServiceAccountId = 0xcafe ;
2021-01-02 23:34:28 +01:00
private UserId _userId ;
2018-10-14 01:16:02 +02:00
2021-01-02 23:34:28 +01:00
public ManagerServer ( UserId userId )
2018-02-10 01:14:55 +01:00
{
2021-01-02 23:34:28 +01:00
_userId = userId ;
2018-02-10 01:14:55 +01:00
}
2022-01-11 09:22:20 +01:00
private static string GenerateIdToken ( )
{
using RSA provider = RSA . Create ( 2048 ) ;
RSAParameters parameters = provider . ExportParameters ( true ) ;
RsaSecurityKey secKey = new RsaSecurityKey ( parameters ) ;
SigningCredentials credentials = new SigningCredentials ( secKey , "RS256" ) ;
credentials . Key . KeyId = parameters . ToString ( ) ;
var header = new JwtHeader ( credentials )
{
{ "jku" , "https://e0d67c509fb203858ebcb2fe3f88c2aa.baas.nintendo.com/1.0.0/certificates" }
} ;
byte [ ] rawUserId = new byte [ 0x10 ] ;
RandomNumberGenerator . Fill ( rawUserId ) ;
byte [ ] deviceId = new byte [ 0x10 ] ;
RandomNumberGenerator . Fill ( deviceId ) ;
byte [ ] deviceAccountId = new byte [ 0x10 ] ;
RandomNumberGenerator . Fill ( deviceId ) ;
var payload = new JwtPayload
{
{ "sub" , BitConverter . ToString ( rawUserId ) . Replace ( "-" , "" ) . ToLower ( ) } ,
{ "aud" , "ed9e2f05d286f7b8" } ,
{ "di" , BitConverter . ToString ( deviceId ) . Replace ( "-" , "" ) . ToLower ( ) } ,
{ "sn" , "XAW10000000000" } ,
{ "bs:did" , BitConverter . ToString ( deviceAccountId ) . Replace ( "-" , "" ) . ToLower ( ) } ,
{ "iss" , "https://e0d67c509fb203858ebcb2fe3f88c2aa.baas.nintendo.com" } ,
{ "typ" , "id_token" } ,
{ "iat" , DateTimeOffset . UtcNow . ToUnixTimeSeconds ( ) } ,
{ "jti" , Guid . NewGuid ( ) . ToString ( ) } ,
{ "exp" , ( DateTimeOffset . UtcNow + TimeSpan . FromHours ( 3 ) ) . ToUnixTimeSeconds ( ) }
} ;
JwtSecurityToken securityToken = new JwtSecurityToken ( header , payload ) ;
return new JwtSecurityTokenHandler ( ) . WriteToken ( securityToken ) ;
}
2019-07-14 21:04:38 +02:00
public ResultCode CheckAvailability ( ServiceCtx context )
2018-04-17 02:24:42 +02:00
{
2020-08-18 21:24:54 +02:00
// NOTE: This opens the file at "su/baas/USERID_IN_UUID_STRING.dat" where USERID_IN_UUID_STRING is formatted as "%08x-%04x-%04x-%02x%02x-%08x%04x".
// Then it searches the Availability of Online Services related to the UserId in this file and returns it.
2020-08-04 01:32:53 +02:00
Logger . Stub ? . PrintStub ( LogClass . ServiceAcc ) ;
2018-04-17 02:24:42 +02:00
2020-08-18 21:24:54 +02:00
// NOTE: Even if we try to return different error codes here, the guest still needs other calls.
2019-07-14 21:04:38 +02:00
return ResultCode . Success ;
2018-02-10 01:14:55 +01:00
}
2019-07-14 21:04:38 +02:00
public ResultCode GetAccountId ( ServiceCtx context )
2018-02-10 01:14:55 +01:00
{
2020-12-12 04:06:20 +01:00
// NOTE: This opens the file at "su/baas/USERID_IN_UUID_STRING.dat" (where USERID_IN_UUID_STRING is formatted
2020-08-18 21:24:54 +02:00
// as "%08x-%04x-%04x-%02x%02x-%08x%04x") in the account:/ savedata.
// Then it searches the NetworkServiceAccountId related to the UserId in this file and returns it.
2020-08-04 01:32:53 +02:00
Logger . Stub ? . PrintStub ( LogClass . ServiceAcc , new { NetworkServiceAccountId } ) ;
2020-03-02 15:07:27 +01:00
context . ResponseData . Write ( NetworkServiceAccountId ) ;
return ResultCode . Success ;
}
2021-01-02 23:34:28 +01:00
public ResultCode EnsureIdTokenCacheAsync ( ServiceCtx context , out IAsyncContext asyncContext )
2020-08-18 21:24:54 +02:00
{
KEvent asyncEvent = new KEvent ( context . Device . System . KernelContext ) ;
AsyncExecution asyncExecution = new AsyncExecution ( asyncEvent ) ;
asyncExecution . Initialize ( 1000 , EnsureIdTokenCacheAsyncImpl ) ;
2021-01-02 23:34:28 +01:00
asyncContext = new IAsyncContext ( asyncExecution ) ;
2020-08-18 21:24:54 +02:00
// return ResultCode.NullObject if the IAsyncContext pointer is null. Doesn't occur in our case.
return ResultCode . Success ;
}
private async Task EnsureIdTokenCacheAsyncImpl ( CancellationToken token )
{
// NOTE: This open the file at "su/baas/USERID_IN_UUID_STRING.dat" (where USERID_IN_UUID_STRING is formatted as "%08x-%04x-%04x-%02x%02x-%08x%04x")
// in the "account:/" savedata.
// Then its read data, use dauth API with this data to get the Token Id and probably store the dauth response
// in "su/cache/USERID_IN_UUID_STRING.dat" (where USERID_IN_UUID_STRING is formatted as "%08x-%04x-%04x-%02x%02x-%08x%04x") in the "account:/" savedata.
// Since we don't support online services, we can stub it.
Logger . Stub ? . PrintStub ( LogClass . ServiceAcc ) ;
// TODO: Use a real function instead, with the CancellationToken.
await Task . CompletedTask ;
}
public ResultCode LoadIdTokenCache ( ServiceCtx context )
{
2021-04-24 12:16:01 +02:00
ulong bufferPosition = context . Request . ReceiveBuff [ 0 ] . Position ;
ulong bufferSize = context . Request . ReceiveBuff [ 0 ] . Size ;
2020-08-18 21:24:54 +02:00
// NOTE: This opens the file at "su/cache/USERID_IN_UUID_STRING.dat" (where USERID_IN_UUID_STRING is formatted as "%08x-%04x-%04x-%02x%02x-%08x%04x")
// in the "account:/" savedata and writes some data in the buffer.
// Since we don't support online services, we can stub it.
Logger . Stub ? . PrintStub ( LogClass . ServiceAcc ) ;
/ *
if ( internal_object ! = null )
{
if ( bufferSize > 0xC00 )
{
return ResultCode . InvalidIdTokenCacheBufferSize ;
}
}
* /
2022-01-11 09:22:20 +01:00
byte [ ] tokenData = Encoding . ASCII . GetBytes ( GenerateIdToken ( ) ) ;
2020-08-18 21:24:54 +02:00
2022-01-11 09:22:20 +01:00
context . Memory . Write ( bufferPosition , tokenData ) ;
context . ResponseData . Write ( tokenData . Length ) ;
2020-08-18 21:24:54 +02:00
return ResultCode . Success ;
}
2020-03-02 15:07:27 +01:00
public ResultCode GetNintendoAccountUserResourceCacheForApplication ( ServiceCtx context )
{
2020-08-04 01:32:53 +02:00
Logger . Stub ? . PrintStub ( LogClass . ServiceAcc , new { NetworkServiceAccountId } ) ;
2018-10-14 01:16:02 +02:00
2020-03-02 15:07:27 +01:00
context . ResponseData . Write ( NetworkServiceAccountId ) ;
2018-04-17 02:24:42 +02:00
2020-12-12 12:10:12 +01:00
// TODO: determine and fill the output IPC buffer.
2018-02-10 01:14:55 +01:00
2019-07-14 21:04:38 +02:00
return ResultCode . Success ;
2018-02-10 01:14:55 +01:00
}
2020-09-21 05:45:30 +02:00
public ResultCode StoreOpenContext ( ServiceCtx context )
{
2022-09-28 02:24:52 +02:00
context . Device . System . AccountManager . StoreOpenedUsers ( ) ;
2020-09-21 05:45:30 +02:00
return ResultCode . Success ;
}
2022-08-30 20:52:45 +02:00
public ResultCode LoadNetworkServiceLicenseKindAsync ( ServiceCtx context , out IAsyncNetworkServiceLicenseKindContext asyncContext )
{
KEvent asyncEvent = new KEvent ( context . Device . System . KernelContext ) ;
AsyncExecution asyncExecution = new AsyncExecution ( asyncEvent ) ;
Logger . Stub ? . PrintStub ( LogClass . ServiceAcc ) ;
// NOTE: This is an extension of the data retrieved from the id token cache.
asyncExecution . Initialize ( 1000 , EnsureIdTokenCacheAsyncImpl ) ;
asyncContext = new IAsyncNetworkServiceLicenseKindContext ( asyncExecution , NetworkServiceLicenseKind . Subscribed ) ;
// return ResultCode.NullObject if the IAsyncNetworkServiceLicenseKindContext pointer is null. Doesn't occur in our case.
return ResultCode . Success ;
}
2018-02-10 01:14:55 +01:00
}
}