mirror of
https://github.com/dolphin-emu/dolphin.git
synced 2024-11-15 13:57:57 -07:00
bb93336ecf
This is intended to make decryption look less implicit in the code.
253 lines
6.4 KiB
C++
253 lines
6.4 KiB
C++
// Copyright 2013 Dolphin Emulator Project
|
|
// Licensed under GPLv2
|
|
// Refer to the license.txt file included.
|
|
|
|
#include <cstddef>
|
|
#include <cstring>
|
|
#include <string>
|
|
#include <vector>
|
|
|
|
#include <polarssl/aes.h>
|
|
|
|
#include "Common/CommonTypes.h"
|
|
#include "Common/StringUtil.h"
|
|
|
|
#include "DiscIO/Blob.h"
|
|
#include "DiscIO/Volume.h"
|
|
#include "DiscIO/VolumeCreator.h"
|
|
#include "DiscIO/VolumeDirectory.h"
|
|
#include "DiscIO/VolumeGC.h"
|
|
#include "DiscIO/VolumeWad.h"
|
|
#include "DiscIO/VolumeWiiCrypted.h"
|
|
|
|
|
|
namespace DiscIO
|
|
{
|
|
enum EDiscType
|
|
{
|
|
DISC_TYPE_UNK,
|
|
DISC_TYPE_WII,
|
|
DISC_TYPE_WII_CONTAINER,
|
|
DISC_TYPE_GC,
|
|
DISC_TYPE_WAD
|
|
};
|
|
|
|
class CBlobBigEndianReader
|
|
{
|
|
public:
|
|
CBlobBigEndianReader(IBlobReader& _rReader) : m_rReader(_rReader) {}
|
|
|
|
u32 Read32(u64 _Offset)
|
|
{
|
|
u32 Temp;
|
|
m_rReader.Read(_Offset, 4, (u8*)&Temp);
|
|
return Common::swap32(Temp);
|
|
}
|
|
u16 Read16(u64 _Offset)
|
|
{
|
|
u16 Temp;
|
|
m_rReader.Read(_Offset, 2, (u8*)&Temp);
|
|
return Common::swap16(Temp);
|
|
}
|
|
u8 Read8(u64 _Offset)
|
|
{
|
|
u8 Temp;
|
|
m_rReader.Read(_Offset, 1, &Temp);
|
|
return Temp;
|
|
}
|
|
private:
|
|
IBlobReader& m_rReader;
|
|
};
|
|
|
|
static const unsigned char s_master_key[16] = {
|
|
0xeb,0xe4,0x2a,0x22,0x5e,0x85,0x93,0xe4,
|
|
0x48,0xd9,0xc5,0x45,0x73,0x81,0xaa,0xf7
|
|
};
|
|
|
|
static const unsigned char s_master_key_korean[16] = {
|
|
0x63,0xb8,0x2b,0xb4,0xf4,0x61,0x4e,0x2e,
|
|
0x13,0xf2,0xfe,0xfb,0xba,0x4c,0x9b,0x7e
|
|
};
|
|
|
|
static IVolume* CreateVolumeFromCryptedWiiImage(IBlobReader& _rReader, u32 _PartitionGroup, u32 _VolumeType, u32 _VolumeNum);
|
|
EDiscType GetDiscType(IBlobReader& _rReader);
|
|
|
|
IVolume* CreateVolumeFromFilename(const std::string& _rFilename, u32 _PartitionGroup, u32 _VolumeNum)
|
|
{
|
|
IBlobReader* pReader = CreateBlobReader(_rFilename);
|
|
if (pReader == nullptr)
|
|
return nullptr;
|
|
|
|
switch (GetDiscType(*pReader))
|
|
{
|
|
case DISC_TYPE_WII:
|
|
case DISC_TYPE_GC:
|
|
return new CVolumeGC(pReader);
|
|
|
|
case DISC_TYPE_WAD:
|
|
return new CVolumeWAD(pReader);
|
|
|
|
case DISC_TYPE_WII_CONTAINER:
|
|
{
|
|
IVolume* pVolume = CreateVolumeFromCryptedWiiImage(*pReader, _PartitionGroup, 0, _VolumeNum);
|
|
|
|
if (pVolume == nullptr)
|
|
{
|
|
delete pReader;
|
|
}
|
|
|
|
return pVolume;
|
|
}
|
|
|
|
case DISC_TYPE_UNK:
|
|
default:
|
|
std::string Filename, ext;
|
|
SplitPath(_rFilename, nullptr, &Filename, &ext);
|
|
Filename += ext;
|
|
NOTICE_LOG(DISCIO, "%s does not have the Magic word for a gcm, wiidisc or wad file\n"
|
|
"Set Log Verbosity to Warning and attempt to load the game again to view the values", Filename.c_str());
|
|
delete pReader;
|
|
}
|
|
|
|
return nullptr;
|
|
}
|
|
|
|
IVolume* CreateVolumeFromDirectory(const std::string& _rDirectory, bool _bIsWii, const std::string& _rApploader, const std::string& _rDOL)
|
|
{
|
|
if (CVolumeDirectory::IsValidDirectory(_rDirectory))
|
|
return new CVolumeDirectory(_rDirectory, _bIsWii, _rApploader, _rDOL);
|
|
|
|
return nullptr;
|
|
}
|
|
|
|
bool IsVolumeWiiDisc(const IVolume *_rVolume)
|
|
{
|
|
u32 MagicWord = 0;
|
|
_rVolume->Read(0x18, 4, (u8*)&MagicWord, false);
|
|
|
|
return (Common::swap32(MagicWord) == 0x5D1C9EA3);
|
|
//GameCube 0xc2339f3d
|
|
}
|
|
|
|
bool IsVolumeWadFile(const IVolume *_rVolume)
|
|
{
|
|
u32 MagicWord = 0;
|
|
_rVolume->Read(0x02, 4, (u8*)&MagicWord, false);
|
|
|
|
return (Common::swap32(MagicWord) == 0x00204973 || Common::swap32(MagicWord) == 0x00206962);
|
|
}
|
|
|
|
void VolumeKeyForParition(IBlobReader& _rReader, u64 offset, u8* VolumeKey)
|
|
{
|
|
CBlobBigEndianReader Reader(_rReader);
|
|
|
|
u8 SubKey[16];
|
|
_rReader.Read(offset + 0x1bf, 16, SubKey);
|
|
|
|
u8 IV[16];
|
|
memset(IV, 0, 16);
|
|
_rReader.Read(offset + 0x44c, 8, IV);
|
|
|
|
bool usingKoreanKey = false;
|
|
// Issue: 6813
|
|
// Magic value is at partition's offset + 0x1f1 (1byte)
|
|
// If encrypted with the Korean key, the magic value would be 1
|
|
// Otherwise it is zero
|
|
if (Reader.Read8(0x3) == 'K' && Reader.Read8(offset + 0x1f1) == 1)
|
|
usingKoreanKey = true;
|
|
|
|
aes_context AES_ctx;
|
|
aes_setkey_dec(&AES_ctx, (usingKoreanKey ? s_master_key_korean : s_master_key), 128);
|
|
|
|
aes_crypt_cbc(&AES_ctx, AES_DECRYPT, 16, IV, SubKey, VolumeKey);
|
|
}
|
|
|
|
static IVolume* CreateVolumeFromCryptedWiiImage(IBlobReader& _rReader, u32 _PartitionGroup, u32 _VolumeType, u32 _VolumeNum)
|
|
{
|
|
CBlobBigEndianReader Reader(_rReader);
|
|
|
|
u32 numPartitions = Reader.Read32(0x40000 + (_PartitionGroup * 8));
|
|
u64 PartitionsOffset = (u64)Reader.Read32(0x40000 + (_PartitionGroup * 8) + 4) << 2;
|
|
|
|
// Check if we're looking for a valid partition
|
|
if ((int)_VolumeNum != -1 && _VolumeNum > numPartitions)
|
|
return nullptr;
|
|
|
|
struct SPartition
|
|
{
|
|
u64 Offset;
|
|
u32 Type;
|
|
};
|
|
|
|
struct SPartitionGroup
|
|
{
|
|
u32 numPartitions;
|
|
u64 PartitionsOffset;
|
|
std::vector<SPartition> PartitionsVec;
|
|
};
|
|
SPartitionGroup PartitionGroup[4];
|
|
|
|
// read all partitions
|
|
for (SPartitionGroup& group : PartitionGroup)
|
|
{
|
|
for (u32 i = 0; i < numPartitions; i++)
|
|
{
|
|
SPartition Partition;
|
|
Partition.Offset = ((u64)Reader.Read32(PartitionsOffset + (i * 8) + 0)) << 2;
|
|
Partition.Type = Reader.Read32(PartitionsOffset + (i * 8) + 4);
|
|
group.PartitionsVec.push_back(Partition);
|
|
}
|
|
}
|
|
|
|
// return the partition type specified or number
|
|
// types: 0 = game, 1 = firmware update, 2 = channel installer
|
|
// some partitions on ssbb use the ascii title id of the demo VC game they hold...
|
|
for (size_t i = 0; i < PartitionGroup[_PartitionGroup].PartitionsVec.size(); i++)
|
|
{
|
|
const SPartition& rPartition = PartitionGroup[_PartitionGroup].PartitionsVec.at(i);
|
|
|
|
if ((rPartition.Type == _VolumeType && (int)_VolumeNum == -1) || i == _VolumeNum)
|
|
{
|
|
u8 VolumeKey[16];
|
|
VolumeKeyForParition(_rReader, rPartition.Offset, VolumeKey);
|
|
return new CVolumeWiiCrypted(&_rReader, rPartition.Offset, VolumeKey);
|
|
}
|
|
}
|
|
|
|
return nullptr;
|
|
}
|
|
|
|
EDiscType GetDiscType(IBlobReader& _rReader)
|
|
{
|
|
CBlobBigEndianReader Reader(_rReader);
|
|
u32 WiiMagic = Reader.Read32(0x18);
|
|
u32 WiiContainerMagic = Reader.Read32(0x60);
|
|
u32 WADMagic = Reader.Read32(0x02);
|
|
u32 GCMagic = Reader.Read32(0x1C);
|
|
|
|
// check for Wii
|
|
if (WiiMagic == 0x5D1C9EA3 && WiiContainerMagic != 0)
|
|
return DISC_TYPE_WII;
|
|
if (WiiMagic == 0x5D1C9EA3 && WiiContainerMagic == 0)
|
|
return DISC_TYPE_WII_CONTAINER;
|
|
|
|
// check for WAD
|
|
// 0x206962 for boot2 wads
|
|
if (WADMagic == 0x00204973 || WADMagic == 0x00206962)
|
|
return DISC_TYPE_WAD;
|
|
|
|
// check for GC
|
|
if (GCMagic == 0xC2339F3D)
|
|
return DISC_TYPE_GC;
|
|
|
|
WARN_LOG(DISCIO, "No known magic words found");
|
|
WARN_LOG(DISCIO, "Wii offset: 0x18 value: 0x%08x", WiiMagic);
|
|
WARN_LOG(DISCIO, "WiiC offset: 0x60 value: 0x%08x", WiiContainerMagic);
|
|
WARN_LOG(DISCIO, "WAD offset: 0x02 value: 0x%08x", WADMagic);
|
|
WARN_LOG(DISCIO, "GC offset: 0x1C value: 0x%08x", GCMagic);
|
|
|
|
return DISC_TYPE_UNK;
|
|
}
|
|
|
|
} // namespace
|