mirror of
https://github.com/yellows8/dsi.git
synced 2025-06-19 03:35:34 -04:00
291 lines
7.8 KiB
C
291 lines
7.8 KiB
C
#include <stdio.h>
|
|
#include <string.h>
|
|
#include <malloc.h>
|
|
#include <sys/stat.h>
|
|
#include <stdlib.h>
|
|
#include "dsi.h"
|
|
#include "sha1.h"
|
|
|
|
//********************************CRC 16**************************************************
|
|
//CRC code written by Frz. CRC32 code at least. CRC16 code is based on the CRC32 code.
|
|
|
|
const unsigned short crc16tab[] = /* CRC lookup table */
|
|
{
|
|
0x0000, 0xC0C1, 0xC181, 0x0140, 0xC301, 0x03C0, 0x0280, 0xC241,
|
|
0xC601, 0x06C0, 0x0780, 0xC741, 0x0500, 0xC5C1, 0xC481, 0x0440,
|
|
0xCC01, 0x0CC0, 0x0D80, 0xCD41, 0x0F00, 0xCFC1, 0xCE81, 0x0E40,
|
|
0x0A00, 0xCAC1, 0xCB81, 0x0B40, 0xC901, 0x09C0, 0x0880, 0xC841,
|
|
0xD801, 0x18C0, 0x1980, 0xD941, 0x1B00, 0xDBC1, 0xDA81, 0x1A40,
|
|
0x1E00, 0xDEC1, 0xDF81, 0x1F40, 0xDD01, 0x1DC0, 0x1C80, 0xDC41,
|
|
0x1400, 0xD4C1, 0xD581, 0x1540, 0xD701, 0x17C0, 0x1680, 0xD641,
|
|
0xD201, 0x12C0, 0x1380, 0xD341, 0x1100, 0xD1C1, 0xD081, 0x1040,
|
|
0xF001, 0x30C0, 0x3180, 0xF141, 0x3300, 0xF3C1, 0xF281, 0x3240,
|
|
0x3600, 0xF6C1, 0xF781, 0x3740, 0xF501, 0x35C0, 0x3480, 0xF441,
|
|
0x3C00, 0xFCC1, 0xFD81, 0x3D40, 0xFF01, 0x3FC0, 0x3E80, 0xFE41,
|
|
0xFA01, 0x3AC0, 0x3B80, 0xFB41, 0x3900, 0xF9C1, 0xF881, 0x3840,
|
|
0x2800, 0xE8C1, 0xE981, 0x2940, 0xEB01, 0x2BC0, 0x2A80, 0xEA41,
|
|
0xEE01, 0x2EC0, 0x2F80, 0xEF41, 0x2D00, 0xEDC1, 0xEC81, 0x2C40,
|
|
0xE401, 0x24C0, 0x2580, 0xE541, 0x2700, 0xE7C1, 0xE681, 0x2640,
|
|
0x2200, 0xE2C1, 0xE381, 0x2340, 0xE101, 0x21C0, 0x2080, 0xE041,
|
|
0xA001, 0x60C0, 0x6180, 0xA141, 0x6300, 0xA3C1, 0xA281, 0x6240,
|
|
0x6600, 0xA6C1, 0xA781, 0x6740, 0xA501, 0x65C0, 0x6480, 0xA441,
|
|
0x6C00, 0xACC1, 0xAD81, 0x6D40, 0xAF01, 0x6FC0, 0x6E80, 0xAE41,
|
|
0xAA01, 0x6AC0, 0x6B80, 0xAB41, 0x6900, 0xA9C1, 0xA881, 0x6840,
|
|
0x7800, 0xB8C1, 0xB981, 0x7940, 0xBB01, 0x7BC0, 0x7A80, 0xBA41,
|
|
0xBE01, 0x7EC0, 0x7F80, 0xBF41, 0x7D00, 0xBDC1, 0xBC81, 0x7C40,
|
|
0xB401, 0x74C0, 0x7580, 0xB541, 0x7700, 0xB7C1, 0xB681, 0x7640,
|
|
0x7200, 0xB2C1, 0xB381, 0x7340, 0xB101, 0x71C0, 0x7080, 0xB041,
|
|
0x5000, 0x90C1, 0x9181, 0x5140, 0x9301, 0x53C0, 0x5280, 0x9241,
|
|
0x9601, 0x56C0, 0x5780, 0x9741, 0x5500, 0x95C1, 0x9481, 0x5440,
|
|
0x9C01, 0x5CC0, 0x5D80, 0x9D41, 0x5F00, 0x9FC1, 0x9E81, 0x5E40,
|
|
0x5A00, 0x9AC1, 0x9B81, 0x5B40, 0x9901, 0x59C0, 0x5880, 0x9841,
|
|
0x8801, 0x48C0, 0x4980, 0x8941, 0x4B00, 0x8BC1, 0x8A81, 0x4A40,
|
|
0x4E00, 0x8EC1, 0x8F81, 0x4F40, 0x8D01, 0x4DC0, 0x4C80, 0x8C41,
|
|
0x4400, 0x84C1, 0x8581, 0x4540, 0x8701, 0x47C0, 0x4680, 0x8641,
|
|
0x8201, 0x42C0, 0x4380, 0x8341, 0x4100, 0x81C1, 0x8081, 0x4040
|
|
};
|
|
|
|
void crc16_init(unsigned short *uCrc16)
|
|
{
|
|
*uCrc16 = 0xFFFF;
|
|
}
|
|
|
|
void crc16_update(unsigned short *uCrc16, const unsigned char *pBuffer, unsigned long uBufSize)
|
|
{
|
|
unsigned long i = 0;
|
|
|
|
for(i = 0; i < uBufSize; i++)
|
|
*uCrc16 = (*uCrc16 >> 8) ^ crc16tab[(*uCrc16 ^ *pBuffer++) & 0xFF];
|
|
|
|
}
|
|
|
|
void crc16_final(unsigned short *uCrc16)
|
|
{
|
|
*uCrc16 = ~(*uCrc16);
|
|
}
|
|
|
|
/*
|
|
* CalcCRC
|
|
*/
|
|
unsigned short CalcCRC16(unsigned char *data, unsigned int length)
|
|
{
|
|
unsigned short crc = 0xFFFF;
|
|
unsigned int i;
|
|
for (i=0; i<length; i++)
|
|
{
|
|
crc = (crc >> 8) ^ crc16tab[(crc ^ data[i]) & 0xFF];
|
|
}
|
|
|
|
return crc;
|
|
}
|
|
|
|
int main(int argc, char* argv[])
|
|
{
|
|
FILE *fnds, *fkey = NULL;
|
|
struct stat nds_stat;
|
|
dsi_es_context ctx;
|
|
unsigned char metablock[0x20];
|
|
unsigned char *inbuf, *outbuf;
|
|
unsigned char key[16];
|
|
char str[256];
|
|
int argi, cryptmode = 0;
|
|
int oldcrypt = 0;
|
|
int tempsz, sz;
|
|
int input_pos = 0, output_pos = 0;
|
|
unsigned int *serial_buf;
|
|
unsigned int serial_offset;
|
|
char cryptserial[13];
|
|
char tempserial[13];
|
|
unsigned char hash[20];
|
|
unsigned char hashbuf[0x1c];
|
|
|
|
if(argc<3)
|
|
{
|
|
printf("hbcryptnds v1.0 by yellows8\n");
|
|
printf("En/(de)crypt nds bins with custom crypto for loading via dsiwarehax.\n");
|
|
printf("Usage:\n");
|
|
printf("hbcryptnds <input.nds> <crypt.nds> <options>\nOptions:\n");
|
|
printf("--encrypt Encrypt the nds(default)\n");
|
|
printf("--decrypt Decrypt the nds\n");
|
|
printf("--serial=<SERIAL> Add SERIAL to the serial number list, only DSis with that serial would run the bin.\n");
|
|
printf("--cryptserial=<SERIAL> Hash the key with this serial for the final crypto key.\n");
|
|
printf("--oldcrypt Use the old sudokuhax v1.0 crypto.\n");
|
|
return 0;
|
|
}
|
|
|
|
serial_buf = (unsigned int*)malloc(0x200);
|
|
if(serial_buf==NULL)
|
|
{
|
|
printf("mem alloc fail.\n");
|
|
return 0;
|
|
}
|
|
memset(serial_buf, 0, 0x200);
|
|
memset(cryptserial, 0, 13);
|
|
|
|
for(argi=3; argi<argc; argi++)
|
|
{
|
|
if(strncmp(argv[argi], "--encrypt", 9)==0)cryptmode = 0;
|
|
if(strncmp(argv[argi], "--decrypt", 9)==0)cryptmode = 1;
|
|
if(strncmp(argv[argi], "--oldcrypt", 10)==0)oldcrypt = 1;
|
|
if(strncmp(argv[argi], "--serial=", 9)==0 && strlen(argv[argi])>=9+0xb)
|
|
{
|
|
if((serial_buf[0]*0x14) + 0x4 >= 0x200)
|
|
{
|
|
printf("Too many input serials.\n");
|
|
}
|
|
else
|
|
{
|
|
memset(tempserial, 0, 13);
|
|
strncpy(tempserial, &argv[argi][9], 12);
|
|
SHA1((unsigned char*)tempserial, 12, (unsigned char*)&serial_buf[1 + (serial_buf[0]*5)]);
|
|
serial_buf[0]+=1;
|
|
}
|
|
}
|
|
if(strncmp(argv[argi], "--cryptserial=", 14)==0 && strlen(argv[argi])>=14+0xb)
|
|
{
|
|
memset(cryptserial, 0, 13);
|
|
strncpy(cryptserial, &argv[argi][14], 12);
|
|
}
|
|
}
|
|
|
|
if(getenv("HOME"))
|
|
{
|
|
memset(str, 0, 256);
|
|
snprintf(str, 255, "%s/.dsi/twlhbkey.bin", getenv("HOME"));
|
|
fkey = fopen(str, "rb");
|
|
}
|
|
|
|
if(fkey==NULL)
|
|
{
|
|
memset(str, 0, 256);
|
|
snprintf(str, 255, "twlhbkey.bin");
|
|
fkey = fopen(str, "rb");
|
|
}
|
|
|
|
if(fkey==NULL)
|
|
{
|
|
printf("Failed to open $HOME/.dsi/twlhbkey.bin and twlhbkey.bin.\n");
|
|
free(serial_buf);
|
|
return 1;
|
|
}
|
|
fread(key, 1, 16, fkey);
|
|
fclose(fkey);
|
|
if(cryptserial[0])
|
|
{
|
|
memset(hashbuf, 0, 0x1c);
|
|
memcpy(hashbuf, key, 0x10);
|
|
memcpy(&hashbuf[0x10], cryptserial, 0xc);
|
|
SHA1(hashbuf, 0x1c, hash);
|
|
memcpy(key, hash, 0x10);
|
|
}
|
|
|
|
dsi_es_init(&ctx, key);
|
|
|
|
if(stat(argv[1], &nds_stat)<0)
|
|
{
|
|
printf("Failed to stat input.\n");
|
|
free(serial_buf);
|
|
return 2;
|
|
}
|
|
sz = nds_stat.st_size;
|
|
if(cryptmode==0 && serial_buf[0])
|
|
{
|
|
if(sz&3)sz+= 4-(sz&3);
|
|
serial_offset = sz;
|
|
sz+= (serial_buf[0]*0x14) + 0x4;
|
|
}
|
|
|
|
inbuf = (unsigned char*)malloc(sz);
|
|
if(inbuf==NULL)
|
|
{
|
|
printf("Failed to allocate mem.\n");
|
|
free(serial_buf);
|
|
return 3;
|
|
}
|
|
memset(inbuf, 0, sz);
|
|
|
|
tempsz = 0x200;
|
|
if(cryptmode==0)
|
|
{
|
|
while(input_pos<sz)
|
|
{
|
|
input_pos+= tempsz;
|
|
output_pos+= tempsz;
|
|
if(cryptmode==0)output_pos+= 0x20;
|
|
if(sz-input_pos < tempsz)
|
|
{
|
|
tempsz = sz-input_pos;
|
|
if(cryptmode==1)tempsz-= 0x20;
|
|
}
|
|
}
|
|
}
|
|
input_pos = 0;
|
|
|
|
if(cryptmode==0)outbuf = (unsigned char*)malloc(output_pos);
|
|
if(cryptmode==1)outbuf = (unsigned char*)malloc(sz);
|
|
if(outbuf==NULL)
|
|
{
|
|
printf("Failed to allocate mem.\n");
|
|
free(serial_buf);
|
|
free(inbuf);
|
|
return 3;
|
|
}
|
|
if(cryptmode==1)memset(outbuf, 0, sz);
|
|
if(cryptmode==0)memset(outbuf, 0, output_pos);
|
|
output_pos = 0;
|
|
|
|
fnds = fopen(argv[1], "rb");
|
|
fread(inbuf, 1, nds_stat.st_size, fnds);
|
|
fclose(fnds);
|
|
if(cryptmode==0 && serial_buf[0])
|
|
{
|
|
*((unsigned int*)&inbuf[0x88]) = serial_offset;
|
|
*((unsigned short*)&inbuf[0x15e]) = CalcCRC16(inbuf, 0x15e);
|
|
memcpy(&inbuf[serial_offset], serial_buf, (serial_buf[0]*0x14) + 0x4);
|
|
}
|
|
|
|
tempsz = 0x200;
|
|
while(input_pos<sz)
|
|
{
|
|
if(cryptmode==0)
|
|
{
|
|
dsi_es_encrypt(&ctx, &inbuf[input_pos], metablock, tempsz);
|
|
memcpy(&outbuf[output_pos], &inbuf[input_pos], tempsz);
|
|
memcpy(&outbuf[output_pos+tempsz], metablock, 0x20);
|
|
}
|
|
else if(cryptmode==1)
|
|
{
|
|
memcpy(metablock, &inbuf[input_pos+tempsz], 0x20);
|
|
if (dsi_es_decrypt(&ctx, &inbuf[input_pos], metablock, tempsz) < 0)
|
|
{
|
|
printf("Failed to crypt.\n");
|
|
free(inbuf);
|
|
free(outbuf);
|
|
free(serial_buf);
|
|
return 4;
|
|
}
|
|
memcpy(&outbuf[output_pos], &inbuf[input_pos], tempsz);
|
|
}
|
|
input_pos+= tempsz;
|
|
output_pos+= tempsz;
|
|
if(cryptmode==0)output_pos+= 0x20;
|
|
if(cryptmode==1)input_pos+= 0x20;
|
|
if(oldcrypt && tempsz==0x200)tempsz = 0x20000;
|
|
if(sz-input_pos < tempsz)
|
|
{
|
|
tempsz = sz-input_pos;
|
|
if(cryptmode==1)tempsz-= 0x20;
|
|
}
|
|
}
|
|
|
|
fnds = fopen(argv[2], "wb");
|
|
fwrite(outbuf, 1, output_pos, fnds);
|
|
fclose(fnds);
|
|
free(inbuf);
|
|
free(outbuf);
|
|
free(serial_buf);
|
|
|
|
return 0;
|
|
}
|
|
|