2014-03-03 05:48:07 +01:00
|
|
|
#include "stdafx.h"
|
2015-04-23 18:58:37 +02:00
|
|
|
#include "Utilities/Log.h"
|
2015-04-24 23:38:11 +02:00
|
|
|
#include "Utilities/File.h"
|
2014-08-23 16:51:51 +02:00
|
|
|
#include "utils.h"
|
|
|
|
|
#include "aes.h"
|
|
|
|
|
#include "sha1.h"
|
|
|
|
|
#include "key_vault.h"
|
2014-03-03 05:48:07 +01:00
|
|
|
#include "unpkg.h"
|
2014-09-07 09:49:25 +02:00
|
|
|
#include "restore_new.h"
|
2015-04-23 18:58:37 +02:00
|
|
|
#pragma warning(push)
|
|
|
|
|
#pragma message("TODO: remove wx dependency: <wx/progdlg.h>")
|
2015-01-25 17:23:24 +01:00
|
|
|
#pragma warning(disable : 4996)
|
2014-03-03 05:48:07 +01:00
|
|
|
#include <wx/progdlg.h>
|
2015-04-23 18:58:37 +02:00
|
|
|
#pragma warning(pop)
|
2014-09-07 09:49:25 +02:00
|
|
|
#include "define_new_memleakdetect.h"
|
2014-03-03 05:48:07 +01:00
|
|
|
|
|
|
|
|
// Decryption.
|
2015-04-24 23:38:11 +02:00
|
|
|
bool CheckHeader(const fs::file& pkg_f, PKGHeader* m_header)
|
2014-03-03 05:48:07 +01:00
|
|
|
{
|
2015-04-19 15:19:24 +02:00
|
|
|
if (m_header->pkg_magic != 0x7F504B47)
|
|
|
|
|
{
|
2014-06-17 17:44:03 +02:00
|
|
|
LOG_ERROR(LOADER, "PKG: Not a package file!");
|
2014-03-03 05:48:07 +01:00
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
2015-04-19 15:19:24 +02:00
|
|
|
switch (const u16 type = m_header->pkg_type)
|
2014-03-03 05:48:07 +01:00
|
|
|
{
|
|
|
|
|
case PKG_RELEASE_TYPE_DEBUG: break;
|
|
|
|
|
case PKG_RELEASE_TYPE_RELEASE: break;
|
|
|
|
|
default:
|
2015-04-19 15:19:24 +02:00
|
|
|
{
|
|
|
|
|
LOG_ERROR(LOADER, "PKG: Unknown PKG type (0x%x)", type);
|
2014-03-03 05:48:07 +01:00
|
|
|
return false;
|
|
|
|
|
}
|
2015-04-19 15:19:24 +02:00
|
|
|
}
|
2014-03-03 05:48:07 +01:00
|
|
|
|
2015-04-19 15:19:24 +02:00
|
|
|
switch (const u16 platform = m_header->pkg_platform)
|
2014-03-03 05:48:07 +01:00
|
|
|
{
|
|
|
|
|
case PKG_PLATFORM_TYPE_PS3: break;
|
|
|
|
|
case PKG_PLATFORM_TYPE_PSP: break;
|
|
|
|
|
default:
|
2015-04-19 15:19:24 +02:00
|
|
|
{
|
|
|
|
|
LOG_ERROR(LOADER, "PKG: Unknown PKG platform (0x%x)", platform);
|
2014-03-03 05:48:07 +01:00
|
|
|
return false;
|
|
|
|
|
}
|
2015-04-19 15:19:24 +02:00
|
|
|
}
|
2014-03-03 05:48:07 +01:00
|
|
|
|
2015-08-06 01:59:41 +02:00
|
|
|
if (m_header->header_size != PKG_HEADER_SIZE && m_header->header_size != PKG_HEADER_SIZE2)
|
2015-04-19 15:19:24 +02:00
|
|
|
{
|
|
|
|
|
LOG_ERROR(LOADER, "PKG: Wrong header size (0x%x)", m_header->header_size);
|
2014-03-03 05:48:07 +01:00
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
2015-04-19 15:19:24 +02:00
|
|
|
if (m_header->pkg_size != pkg_f.size())
|
|
|
|
|
{
|
2015-08-06 01:59:41 +02:00
|
|
|
LOG_ERROR(LOADER, "PKG: File size mismatch (pkg_size=0x%llx)", m_header->pkg_size);
|
2014-12-21 21:42:15 +01:00
|
|
|
//return false;
|
2014-03-03 05:48:07 +01:00
|
|
|
}
|
|
|
|
|
|
2015-08-06 01:59:41 +02:00
|
|
|
if (m_header->data_size + m_header->data_offset > m_header->pkg_size)
|
2015-04-19 15:19:24 +02:00
|
|
|
{
|
2015-08-06 01:59:41 +02:00
|
|
|
LOG_ERROR(LOADER, "PKG: Data size mismatch (data_size=0x%llx, data_offset=0x%llx, file_size=0x%llx)", m_header->data_size, m_header->data_offset, m_header->pkg_size);
|
2014-12-21 21:42:15 +01:00
|
|
|
//return false;
|
2014-03-03 05:48:07 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
|
2015-04-24 23:38:11 +02:00
|
|
|
bool LoadHeader(const fs::file& pkg_f, PKGHeader* m_header)
|
2014-03-03 05:48:07 +01:00
|
|
|
{
|
2015-04-19 15:19:24 +02:00
|
|
|
pkg_f.seek(0);
|
2014-03-03 05:48:07 +01:00
|
|
|
|
2015-04-19 15:19:24 +02:00
|
|
|
if (pkg_f.read(m_header, sizeof(PKGHeader)) != sizeof(PKGHeader))
|
|
|
|
|
{
|
2014-06-17 17:44:03 +02:00
|
|
|
LOG_ERROR(LOADER, "PKG: Package file is too short!");
|
2014-03-03 05:48:07 +01:00
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!CheckHeader(pkg_f, m_header))
|
|
|
|
|
return false;
|
|
|
|
|
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
|
2015-08-06 01:59:41 +02:00
|
|
|
bool Decrypt(const fs::file& pkg_f, const fs::file& dec_pkg_f, PKGHeader* m_header, std::vector<PKGEntry>& entries)
|
2014-03-03 05:48:07 +01:00
|
|
|
{
|
|
|
|
|
if (!LoadHeader(pkg_f, m_header))
|
2015-04-19 15:19:24 +02:00
|
|
|
{
|
2015-08-06 01:59:41 +02:00
|
|
|
return false;
|
2015-04-19 15:19:24 +02:00
|
|
|
}
|
2014-03-03 05:48:07 +01:00
|
|
|
|
|
|
|
|
aes_context c;
|
2015-08-06 01:59:41 +02:00
|
|
|
|
2014-03-03 05:48:07 +01:00
|
|
|
u8 iv[HASH_LEN];
|
2015-08-06 01:59:41 +02:00
|
|
|
be_t<u64>& hi = (be_t<u64>&)iv[0];
|
|
|
|
|
be_t<u64>& lo = (be_t<u64>&)iv[8];
|
|
|
|
|
|
|
|
|
|
auto buf = std::make_unique<u8[]>(BUF_SIZE);
|
|
|
|
|
auto ctr = std::make_unique<u8[]>(BUF_SIZE);
|
|
|
|
|
|
|
|
|
|
dec_pkg_f.trunc(pkg_f.size());
|
2014-03-03 05:48:07 +01:00
|
|
|
|
|
|
|
|
// Debug key
|
2015-08-06 01:59:41 +02:00
|
|
|
u8 key[0x40] = {};
|
2014-03-03 05:48:07 +01:00
|
|
|
memcpy(key+0x00, &m_header->qa_digest[0], 8); // &data[0x60]
|
|
|
|
|
memcpy(key+0x08, &m_header->qa_digest[0], 8); // &data[0x60]
|
|
|
|
|
memcpy(key+0x10, &m_header->qa_digest[8], 8); // &data[0x68]
|
|
|
|
|
memcpy(key+0x18, &m_header->qa_digest[8], 8); // &data[0x68]
|
|
|
|
|
|
2015-08-06 01:59:41 +02:00
|
|
|
auto decrypt = [&](std::size_t offset, std::size_t size, bool psp)
|
|
|
|
|
{
|
|
|
|
|
if (size > BUF_SIZE)
|
|
|
|
|
{
|
|
|
|
|
buf = std::make_unique<u8[]>(size);
|
|
|
|
|
ctr = std::make_unique<u8[]>(size);
|
|
|
|
|
}
|
2014-03-03 05:48:07 +01:00
|
|
|
|
2015-08-06 01:59:41 +02:00
|
|
|
std::memset(buf.get(), 0, size);
|
|
|
|
|
|
|
|
|
|
pkg_f.seek(m_header->data_offset + offset);
|
|
|
|
|
size = pkg_f.read(buf.get(), size);
|
|
|
|
|
const u32 bits = (size + HASH_LEN - 1) / HASH_LEN;
|
2014-03-03 05:48:07 +01:00
|
|
|
|
|
|
|
|
if (m_header->pkg_type == PKG_RELEASE_TYPE_DEBUG)
|
|
|
|
|
{
|
2015-07-26 10:14:56 +02:00
|
|
|
for (u32 j = 0; j < bits; j++)
|
2014-03-03 05:48:07 +01:00
|
|
|
{
|
|
|
|
|
u8 hash[0x14];
|
|
|
|
|
sha1(key, 0x40, hash);
|
2015-07-26 10:14:56 +02:00
|
|
|
*(u64*)&buf[j * HASH_LEN + 0] ^= *(u64*)&hash[0];
|
|
|
|
|
*(u64*)&buf[j * HASH_LEN + 8] ^= *(u64*)&hash[8];
|
2014-03-03 05:48:07 +01:00
|
|
|
*(be_t<u64>*)&key[0x38] += 1;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (m_header->pkg_type == PKG_RELEASE_TYPE_RELEASE)
|
|
|
|
|
{
|
2015-08-06 01:59:41 +02:00
|
|
|
aes_setkey_enc(&c, psp ? PKG_AES_KEY2 : PKG_AES_KEY, 128);
|
2014-03-03 05:48:07 +01:00
|
|
|
|
2015-08-06 01:59:41 +02:00
|
|
|
memcpy(iv, m_header->klicensee, sizeof(iv));
|
|
|
|
|
if (lo + offset / HASH_LEN < lo) hi++;
|
|
|
|
|
lo += offset / HASH_LEN;
|
2014-03-03 05:48:07 +01:00
|
|
|
|
2015-08-06 01:59:41 +02:00
|
|
|
for (u32 j = 0; j < bits; j++)
|
|
|
|
|
{
|
|
|
|
|
aes_crypt_ecb(&c, AES_ENCRYPT, iv, ctr.get() + j * HASH_LEN);
|
2014-03-03 05:48:07 +01:00
|
|
|
|
2015-08-06 01:59:41 +02:00
|
|
|
if (!++lo)
|
|
|
|
|
{
|
|
|
|
|
hi++;
|
|
|
|
|
}
|
2014-03-03 05:48:07 +01:00
|
|
|
}
|
2015-08-06 01:59:41 +02:00
|
|
|
|
|
|
|
|
for (u32 j = 0; j < size; j++)
|
2015-07-26 10:14:56 +02:00
|
|
|
{
|
2014-03-03 05:48:07 +01:00
|
|
|
buf[j] ^= ctr[j];
|
|
|
|
|
}
|
2015-08-06 01:59:41 +02:00
|
|
|
}
|
2014-03-03 05:48:07 +01:00
|
|
|
|
2015-08-06 01:59:41 +02:00
|
|
|
dec_pkg_f.seek(offset);
|
|
|
|
|
dec_pkg_f.write(buf.get(), size);
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
wxProgressDialog pdlg("PKG Decrypter / Installer", "Please wait, decrypting...", m_header->file_count, 0, wxPD_AUTO_HIDE | wxPD_APP_MODAL);
|
|
|
|
|
|
|
|
|
|
decrypt(0, m_header->file_count * sizeof(PKGEntry), m_header->pkg_platform == PKG_PLATFORM_TYPE_PSP);
|
|
|
|
|
|
|
|
|
|
entries.resize(m_header->file_count);
|
2015-04-19 15:19:24 +02:00
|
|
|
dec_pkg_f.seek(0);
|
2015-08-06 01:59:41 +02:00
|
|
|
dec_pkg_f.read(entries.data(), m_header->file_count * sizeof(PKGEntry));
|
2014-03-03 05:48:07 +01:00
|
|
|
|
2015-08-06 01:59:41 +02:00
|
|
|
for (s32 i = 0; i < entries.size(); i++)
|
2015-04-19 15:19:24 +02:00
|
|
|
{
|
2015-08-06 01:59:41 +02:00
|
|
|
const bool is_psp = (entries[i].type & PKG_FILE_ENTRY_PSP) != 0;
|
|
|
|
|
|
|
|
|
|
decrypt(entries[i].name_offset, entries[i].name_size, is_psp);
|
|
|
|
|
|
|
|
|
|
for (u64 j = 0; j < entries[i].file_size; j += BUF_SIZE)
|
|
|
|
|
{
|
|
|
|
|
decrypt(entries[i].file_offset + j, std::min<u64>(entries[i].file_size - j, BUF_SIZE), is_psp);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pdlg.Update(i + 1);
|
2014-03-03 05:48:07 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
|
2015-08-06 01:59:41 +02:00
|
|
|
// Unpacking.
|
2015-04-24 23:38:11 +02:00
|
|
|
bool UnpackEntry(const fs::file& dec_pkg_f, const PKGEntry& entry, std::string dir)
|
2014-03-03 05:48:07 +01:00
|
|
|
{
|
2015-08-06 01:59:41 +02:00
|
|
|
auto buf = std::make_unique<char[]>(BUF_SIZE);
|
2014-03-03 05:48:07 +01:00
|
|
|
|
2015-04-19 15:19:24 +02:00
|
|
|
dec_pkg_f.seek(entry.name_offset);
|
2015-08-06 01:59:41 +02:00
|
|
|
dec_pkg_f.read(buf.get(), entry.name_size);
|
2014-03-03 05:48:07 +01:00
|
|
|
buf[entry.name_size] = 0;
|
|
|
|
|
|
2015-06-24 18:25:37 +02:00
|
|
|
switch (entry.type & 0xff)
|
2015-01-04 17:44:54 +01:00
|
|
|
{
|
2015-01-13 18:38:32 +01:00
|
|
|
case PKG_FILE_ENTRY_NPDRM:
|
|
|
|
|
case PKG_FILE_ENTRY_NPDRMEDAT:
|
|
|
|
|
case PKG_FILE_ENTRY_SDAT:
|
|
|
|
|
case PKG_FILE_ENTRY_REGULAR:
|
2015-08-06 01:59:41 +02:00
|
|
|
case PKG_FILE_ENTRY_UNK1:
|
2014-03-03 05:48:07 +01:00
|
|
|
{
|
2015-08-06 01:59:41 +02:00
|
|
|
const std::string path = dir + std::string(buf.get(), entry.name_size);
|
2015-04-19 15:19:24 +02:00
|
|
|
|
2015-04-24 23:38:11 +02:00
|
|
|
if (fs::is_file(path))
|
2015-01-04 17:44:54 +01:00
|
|
|
{
|
2015-04-19 15:19:24 +02:00
|
|
|
LOG_WARNING(LOADER, "PKG Loader: '%s' is overwritten", path);
|
2015-01-04 17:44:54 +01:00
|
|
|
}
|
|
|
|
|
|
2015-04-24 23:38:11 +02:00
|
|
|
fs::file out(path, o_write | o_create | o_trunc);
|
2015-04-19 15:19:24 +02:00
|
|
|
|
2015-04-24 23:38:11 +02:00
|
|
|
if (out)
|
2014-03-03 05:48:07 +01:00
|
|
|
{
|
2015-04-19 15:19:24 +02:00
|
|
|
dec_pkg_f.seek(entry.file_offset);
|
2014-03-03 05:48:07 +01:00
|
|
|
|
2015-08-06 01:59:41 +02:00
|
|
|
for (u64 i = 0; i < entry.file_size; i += BUF_SIZE)
|
2015-04-19 15:19:24 +02:00
|
|
|
{
|
2015-08-06 01:59:41 +02:00
|
|
|
const u64 size = std::min<u64>(BUF_SIZE, entry.file_size - i);
|
2015-04-24 23:38:11 +02:00
|
|
|
|
2015-08-06 01:59:41 +02:00
|
|
|
dec_pkg_f.read(buf.get(), size);
|
|
|
|
|
out.write(buf.get(), size);
|
2014-03-03 05:48:07 +01:00
|
|
|
}
|
2015-04-19 15:19:24 +02:00
|
|
|
|
2015-01-04 17:44:54 +01:00
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
2015-04-19 15:19:24 +02:00
|
|
|
LOG_ERROR(LOADER, "PKG Loader: Could not create file '%s'", path);
|
2015-01-04 17:44:54 +01:00
|
|
|
return false;
|
2014-03-03 05:48:07 +01:00
|
|
|
}
|
|
|
|
|
}
|
2015-01-04 17:44:54 +01:00
|
|
|
|
2015-01-13 18:38:32 +01:00
|
|
|
case PKG_FILE_ENTRY_FOLDER:
|
2015-01-04 17:44:54 +01:00
|
|
|
{
|
2015-08-06 01:59:41 +02:00
|
|
|
const std::string path = dir + std::string(buf.get(), entry.name_size);
|
2015-04-24 23:38:11 +02:00
|
|
|
|
|
|
|
|
if (!fs::is_dir(path) && !fs::create_dir(path))
|
2015-01-04 17:44:54 +01:00
|
|
|
{
|
2015-04-24 23:38:11 +02:00
|
|
|
LOG_ERROR(LOADER, "PKG Loader: Could not create directory: %s", path);
|
2015-01-04 17:44:54 +01:00
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
default:
|
|
|
|
|
{
|
2015-01-13 01:10:39 +01:00
|
|
|
LOG_ERROR(LOADER, "PKG Loader: unknown PKG file entry: 0x%x", entry.type);
|
2015-01-04 17:44:54 +01:00
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
}
|
2014-03-03 05:48:07 +01:00
|
|
|
}
|
|
|
|
|
|
2015-08-06 01:59:41 +02:00
|
|
|
bool Unpack(const fs::file& pkg_f, std::string src, std::string dst)
|
2014-03-03 05:48:07 +01:00
|
|
|
{
|
|
|
|
|
PKGHeader* m_header = (PKGHeader*) malloc (sizeof(PKGHeader));
|
|
|
|
|
|
2014-07-31 20:20:00 +02:00
|
|
|
// TODO: This shouldn't use current dir
|
|
|
|
|
std::string decryptedFile = "./dev_hdd1/" + src + ".dec";
|
2014-03-03 05:48:07 +01:00
|
|
|
|
2015-04-24 23:38:11 +02:00
|
|
|
fs::file dec_pkg_f(decryptedFile, o_read | o_write | o_create | o_trunc);
|
2014-03-03 05:48:07 +01:00
|
|
|
|
|
|
|
|
std::vector<PKGEntry> m_entries;
|
2015-04-19 15:19:24 +02:00
|
|
|
|
2015-08-06 01:59:41 +02:00
|
|
|
if (!Decrypt(pkg_f, dec_pkg_f, m_header, m_entries))
|
2015-04-19 15:19:24 +02:00
|
|
|
{
|
2015-08-06 01:59:41 +02:00
|
|
|
return false;
|
2015-04-19 15:19:24 +02:00
|
|
|
}
|
2014-03-03 05:48:07 +01:00
|
|
|
|
|
|
|
|
wxProgressDialog pdlg("PKG Decrypter / Installer", "Please wait, unpacking...", m_entries.size(), 0, wxPD_AUTO_HIDE | wxPD_APP_MODAL);
|
|
|
|
|
|
2015-04-19 15:19:24 +02:00
|
|
|
for (const auto& entry : m_entries)
|
2014-03-03 05:48:07 +01:00
|
|
|
{
|
2015-04-19 15:19:24 +02:00
|
|
|
UnpackEntry(dec_pkg_f, entry, dst + src + "/");
|
2014-03-03 05:48:07 +01:00
|
|
|
pdlg.Update(pdlg.GetValue() + 1);
|
|
|
|
|
}
|
2015-04-19 15:19:24 +02:00
|
|
|
|
2014-03-03 05:48:07 +01:00
|
|
|
pdlg.Update(m_entries.size());
|
|
|
|
|
|
2015-04-19 15:19:24 +02:00
|
|
|
dec_pkg_f.close();
|
2015-04-24 23:38:11 +02:00
|
|
|
fs::remove_file(decryptedFile);
|
2014-03-03 05:48:07 +01:00
|
|
|
|
2015-08-06 01:59:41 +02:00
|
|
|
return true;
|
2014-03-04 09:37:28 +01:00
|
|
|
}
|