dsi/exploits/hbcryptnds/main.c
2016-10-29 15:09:25 -04:00

291 lines
7.8 KiB
C

#include <stdio.h>
#include <string.h>
#include <malloc.h>
#include <sys/stat.h>
#include <stdlib.h>
#include "dsi.h"
#include "sha1.h"
//********************************CRC 16**************************************************
//CRC code written by Frz. CRC32 code at least. CRC16 code is based on the CRC32 code.
const unsigned short crc16tab[] = /* CRC lookup table */
{
0x0000, 0xC0C1, 0xC181, 0x0140, 0xC301, 0x03C0, 0x0280, 0xC241,
0xC601, 0x06C0, 0x0780, 0xC741, 0x0500, 0xC5C1, 0xC481, 0x0440,
0xCC01, 0x0CC0, 0x0D80, 0xCD41, 0x0F00, 0xCFC1, 0xCE81, 0x0E40,
0x0A00, 0xCAC1, 0xCB81, 0x0B40, 0xC901, 0x09C0, 0x0880, 0xC841,
0xD801, 0x18C0, 0x1980, 0xD941, 0x1B00, 0xDBC1, 0xDA81, 0x1A40,
0x1E00, 0xDEC1, 0xDF81, 0x1F40, 0xDD01, 0x1DC0, 0x1C80, 0xDC41,
0x1400, 0xD4C1, 0xD581, 0x1540, 0xD701, 0x17C0, 0x1680, 0xD641,
0xD201, 0x12C0, 0x1380, 0xD341, 0x1100, 0xD1C1, 0xD081, 0x1040,
0xF001, 0x30C0, 0x3180, 0xF141, 0x3300, 0xF3C1, 0xF281, 0x3240,
0x3600, 0xF6C1, 0xF781, 0x3740, 0xF501, 0x35C0, 0x3480, 0xF441,
0x3C00, 0xFCC1, 0xFD81, 0x3D40, 0xFF01, 0x3FC0, 0x3E80, 0xFE41,
0xFA01, 0x3AC0, 0x3B80, 0xFB41, 0x3900, 0xF9C1, 0xF881, 0x3840,
0x2800, 0xE8C1, 0xE981, 0x2940, 0xEB01, 0x2BC0, 0x2A80, 0xEA41,
0xEE01, 0x2EC0, 0x2F80, 0xEF41, 0x2D00, 0xEDC1, 0xEC81, 0x2C40,
0xE401, 0x24C0, 0x2580, 0xE541, 0x2700, 0xE7C1, 0xE681, 0x2640,
0x2200, 0xE2C1, 0xE381, 0x2340, 0xE101, 0x21C0, 0x2080, 0xE041,
0xA001, 0x60C0, 0x6180, 0xA141, 0x6300, 0xA3C1, 0xA281, 0x6240,
0x6600, 0xA6C1, 0xA781, 0x6740, 0xA501, 0x65C0, 0x6480, 0xA441,
0x6C00, 0xACC1, 0xAD81, 0x6D40, 0xAF01, 0x6FC0, 0x6E80, 0xAE41,
0xAA01, 0x6AC0, 0x6B80, 0xAB41, 0x6900, 0xA9C1, 0xA881, 0x6840,
0x7800, 0xB8C1, 0xB981, 0x7940, 0xBB01, 0x7BC0, 0x7A80, 0xBA41,
0xBE01, 0x7EC0, 0x7F80, 0xBF41, 0x7D00, 0xBDC1, 0xBC81, 0x7C40,
0xB401, 0x74C0, 0x7580, 0xB541, 0x7700, 0xB7C1, 0xB681, 0x7640,
0x7200, 0xB2C1, 0xB381, 0x7340, 0xB101, 0x71C0, 0x7080, 0xB041,
0x5000, 0x90C1, 0x9181, 0x5140, 0x9301, 0x53C0, 0x5280, 0x9241,
0x9601, 0x56C0, 0x5780, 0x9741, 0x5500, 0x95C1, 0x9481, 0x5440,
0x9C01, 0x5CC0, 0x5D80, 0x9D41, 0x5F00, 0x9FC1, 0x9E81, 0x5E40,
0x5A00, 0x9AC1, 0x9B81, 0x5B40, 0x9901, 0x59C0, 0x5880, 0x9841,
0x8801, 0x48C0, 0x4980, 0x8941, 0x4B00, 0x8BC1, 0x8A81, 0x4A40,
0x4E00, 0x8EC1, 0x8F81, 0x4F40, 0x8D01, 0x4DC0, 0x4C80, 0x8C41,
0x4400, 0x84C1, 0x8581, 0x4540, 0x8701, 0x47C0, 0x4680, 0x8641,
0x8201, 0x42C0, 0x4380, 0x8341, 0x4100, 0x81C1, 0x8081, 0x4040
};
void crc16_init(unsigned short *uCrc16)
{
*uCrc16 = 0xFFFF;
}
void crc16_update(unsigned short *uCrc16, const unsigned char *pBuffer, unsigned long uBufSize)
{
unsigned long i = 0;
for(i = 0; i < uBufSize; i++)
*uCrc16 = (*uCrc16 >> 8) ^ crc16tab[(*uCrc16 ^ *pBuffer++) & 0xFF];
}
void crc16_final(unsigned short *uCrc16)
{
*uCrc16 = ~(*uCrc16);
}
/*
* CalcCRC
*/
unsigned short CalcCRC16(unsigned char *data, unsigned int length)
{
unsigned short crc = 0xFFFF;
unsigned int i;
for (i=0; i<length; i++)
{
crc = (crc >> 8) ^ crc16tab[(crc ^ data[i]) & 0xFF];
}
return crc;
}
int main(int argc, char* argv[])
{
FILE *fnds, *fkey = NULL;
struct stat nds_stat;
dsi_es_context ctx;
unsigned char metablock[0x20];
unsigned char *inbuf, *outbuf;
unsigned char key[16];
char str[256];
int argi, cryptmode = 0;
int oldcrypt = 0;
int tempsz, sz;
int input_pos = 0, output_pos = 0;
unsigned int *serial_buf;
unsigned int serial_offset;
char cryptserial[13];
char tempserial[13];
unsigned char hash[20];
unsigned char hashbuf[0x1c];
if(argc<3)
{
printf("hbcryptnds v1.0 by yellows8\n");
printf("En/(de)crypt nds bins with custom crypto for loading via dsiwarehax.\n");
printf("Usage:\n");
printf("hbcryptnds <input.nds> <crypt.nds> <options>\nOptions:\n");
printf("--encrypt Encrypt the nds(default)\n");
printf("--decrypt Decrypt the nds\n");
printf("--serial=<SERIAL> Add SERIAL to the serial number list, only DSis with that serial would run the bin.\n");
printf("--cryptserial=<SERIAL> Hash the key with this serial for the final crypto key.\n");
printf("--oldcrypt Use the old sudokuhax v1.0 crypto.\n");
return 0;
}
serial_buf = (unsigned int*)malloc(0x200);
if(serial_buf==NULL)
{
printf("mem alloc fail.\n");
return 0;
}
memset(serial_buf, 0, 0x200);
memset(cryptserial, 0, 13);
for(argi=3; argi<argc; argi++)
{
if(strncmp(argv[argi], "--encrypt", 9)==0)cryptmode = 0;
if(strncmp(argv[argi], "--decrypt", 9)==0)cryptmode = 1;
if(strncmp(argv[argi], "--oldcrypt", 10)==0)oldcrypt = 1;
if(strncmp(argv[argi], "--serial=", 9)==0 && strlen(argv[argi])>=9+0xb)
{
if((serial_buf[0]*0x14) + 0x4 >= 0x200)
{
printf("Too many input serials.\n");
}
else
{
memset(tempserial, 0, 13);
strncpy(tempserial, &argv[argi][9], 12);
SHA1((unsigned char*)tempserial, 12, (unsigned char*)&serial_buf[1 + (serial_buf[0]*5)]);
serial_buf[0]+=1;
}
}
if(strncmp(argv[argi], "--cryptserial=", 14)==0 && strlen(argv[argi])>=14+0xb)
{
memset(cryptserial, 0, 13);
strncpy(cryptserial, &argv[argi][14], 12);
}
}
if(getenv("HOME"))
{
memset(str, 0, 256);
snprintf(str, 255, "%s/.dsi/twlhbkey.bin", getenv("HOME"));
fkey = fopen(str, "rb");
}
if(fkey==NULL)
{
memset(str, 0, 256);
snprintf(str, 255, "twlhbkey.bin");
fkey = fopen(str, "rb");
}
if(fkey==NULL)
{
printf("Failed to open $HOME/.dsi/twlhbkey.bin and twlhbkey.bin.\n");
free(serial_buf);
return 1;
}
fread(key, 1, 16, fkey);
fclose(fkey);
if(cryptserial[0])
{
memset(hashbuf, 0, 0x1c);
memcpy(hashbuf, key, 0x10);
memcpy(&hashbuf[0x10], cryptserial, 0xc);
SHA1(hashbuf, 0x1c, hash);
memcpy(key, hash, 0x10);
}
dsi_es_init(&ctx, key);
if(stat(argv[1], &nds_stat)<0)
{
printf("Failed to stat input.\n");
free(serial_buf);
return 2;
}
sz = nds_stat.st_size;
if(cryptmode==0 && serial_buf[0])
{
if(sz&3)sz+= 4-(sz&3);
serial_offset = sz;
sz+= (serial_buf[0]*0x14) + 0x4;
}
inbuf = (unsigned char*)malloc(sz);
if(inbuf==NULL)
{
printf("Failed to allocate mem.\n");
free(serial_buf);
return 3;
}
memset(inbuf, 0, sz);
tempsz = 0x200;
if(cryptmode==0)
{
while(input_pos<sz)
{
input_pos+= tempsz;
output_pos+= tempsz;
if(cryptmode==0)output_pos+= 0x20;
if(sz-input_pos < tempsz)
{
tempsz = sz-input_pos;
if(cryptmode==1)tempsz-= 0x20;
}
}
}
input_pos = 0;
if(cryptmode==0)outbuf = (unsigned char*)malloc(output_pos);
if(cryptmode==1)outbuf = (unsigned char*)malloc(sz);
if(outbuf==NULL)
{
printf("Failed to allocate mem.\n");
free(serial_buf);
free(inbuf);
return 3;
}
if(cryptmode==1)memset(outbuf, 0, sz);
if(cryptmode==0)memset(outbuf, 0, output_pos);
output_pos = 0;
fnds = fopen(argv[1], "rb");
fread(inbuf, 1, nds_stat.st_size, fnds);
fclose(fnds);
if(cryptmode==0 && serial_buf[0])
{
*((unsigned int*)&inbuf[0x88]) = serial_offset;
*((unsigned short*)&inbuf[0x15e]) = CalcCRC16(inbuf, 0x15e);
memcpy(&inbuf[serial_offset], serial_buf, (serial_buf[0]*0x14) + 0x4);
}
tempsz = 0x200;
while(input_pos<sz)
{
if(cryptmode==0)
{
dsi_es_encrypt(&ctx, &inbuf[input_pos], metablock, tempsz);
memcpy(&outbuf[output_pos], &inbuf[input_pos], tempsz);
memcpy(&outbuf[output_pos+tempsz], metablock, 0x20);
}
else if(cryptmode==1)
{
memcpy(metablock, &inbuf[input_pos+tempsz], 0x20);
if (dsi_es_decrypt(&ctx, &inbuf[input_pos], metablock, tempsz) < 0)
{
printf("Failed to crypt.\n");
free(inbuf);
free(outbuf);
free(serial_buf);
return 4;
}
memcpy(&outbuf[output_pos], &inbuf[input_pos], tempsz);
}
input_pos+= tempsz;
output_pos+= tempsz;
if(cryptmode==0)output_pos+= 0x20;
if(cryptmode==1)input_pos+= 0x20;
if(oldcrypt && tempsz==0x200)tempsz = 0x20000;
if(sz-input_pos < tempsz)
{
tempsz = sz-input_pos;
if(cryptmode==1)tempsz-= 0x20;
}
}
fnds = fopen(argv[2], "wb");
fwrite(outbuf, 1, output_pos, fnds);
fclose(fnds);
free(inbuf);
free(outbuf);
free(serial_buf);
return 0;
}