mirror of
https://github.com/melonDS-emu/melonDS.git
synced 2025-07-27 00:00:07 -06:00
lay some base
This commit is contained in:
@ -46,6 +46,13 @@ add_library(core STATIC
|
||||
Wifi.cpp
|
||||
WifiAP.cpp
|
||||
|
||||
fatfs/diskio.c
|
||||
fatfs/ff.c
|
||||
fatfs/ffsystem.c
|
||||
fatfs/ffunicode.c
|
||||
fatfs/ffconf.h
|
||||
|
||||
sha1/sha1.c
|
||||
tiny-AES-c/aes.c
|
||||
xxhash/xxhash.c
|
||||
)
|
||||
|
66
src/DSi.cpp
66
src/DSi.cpp
@ -39,6 +39,7 @@
|
||||
#include "DSi_DSP.h"
|
||||
#include "DSi_Camera.h"
|
||||
|
||||
#include "sha1/sha1.hpp"
|
||||
#include "tiny-AES-c/aes.hpp"
|
||||
|
||||
|
||||
@ -529,6 +530,71 @@ bool LoadNAND()
|
||||
memcpy(&ARM7Init[0x0254], &ARM7iBIOS[0xC6D0], 0x1048);
|
||||
memcpy(&ARM7Init[0x129C], &ARM7iBIOS[0xD718], 0x1048);
|
||||
|
||||
// TEST ZONE
|
||||
{
|
||||
SHA1_CTX sha;
|
||||
u8 cidhash[20];
|
||||
u8 iv[16];
|
||||
|
||||
SHA1Init(&sha);
|
||||
SHA1Update(&sha, eMMC_CID, 16);
|
||||
SHA1Final(cidhash, &sha);
|
||||
|
||||
printf("ASS HASH: ");
|
||||
for (int i = 0; i < 20; i++) printf("%02X", cidhash[i]);
|
||||
printf("\n");
|
||||
|
||||
DSi_AES::Swap16(iv, cidhash);
|
||||
|
||||
printf("ASS IV: ");
|
||||
for (int i = 0; i < 16; i++) printf("%02X", iv[i]);
|
||||
printf("\n");
|
||||
|
||||
u8 keyX[16];
|
||||
*(u32*)&keyX[0] = (u32)ConsoleID;
|
||||
*(u32*)&keyX[4] = (u32)ConsoleID ^ 0x24EE6906;
|
||||
*(u32*)&keyX[8] = (u32)(ConsoleID >> 32) ^ 0xE65B601D;
|
||||
*(u32*)&keyX[12] = (u32)(ConsoleID >> 32);
|
||||
|
||||
u8 keyY[16];
|
||||
*(u32*)&keyY[0] = 0x0AB9DC76;
|
||||
*(u32*)&keyY[4] = 0xBD4DC4D3;
|
||||
*(u32*)&keyY[8] = 0x202DDD1D;
|
||||
*(u32*)&keyY[12] = 0xE1A00005;
|
||||
|
||||
u8 shittykey[16];
|
||||
DSi_AES::DeriveNormalKey(keyX, keyY, shittykey);
|
||||
|
||||
u8 normalkey[16];
|
||||
DSi_AES::Swap16(normalkey, shittykey);
|
||||
|
||||
u8 dorp[0x200];
|
||||
fseek(SDMMCFile, 0, SEEK_SET);
|
||||
fread(&dorp, 0x200, 1, SDMMCFile);
|
||||
|
||||
AES_ctx ctx;
|
||||
AES_init_ctx_iv(&ctx, normalkey, iv);
|
||||
|
||||
//AES_CTR_xcrypt_buffer(&ctx, dorp, 0x200);
|
||||
for (int i = 0; i < 0x200; i+=16)
|
||||
{
|
||||
u8 tmp[16];
|
||||
DSi_AES::Swap16(tmp, &dorp[i]);
|
||||
AES_CTR_xcrypt_buffer(&ctx, tmp, 16);
|
||||
DSi_AES::Swap16(&dorp[i], tmp);
|
||||
}
|
||||
|
||||
//printf("%08X %08X %08X %08X\n", *(u32*)&dorp[0], *(u32*)&dorp[4], *(u32*)&dorp[8], *(u32*)&dorp[12]);
|
||||
for (int i = 0; i < 0x200; i+=16)
|
||||
{
|
||||
for (int j = 0; j < 16; j++)
|
||||
{
|
||||
printf("%02X ", dorp[i+j]);
|
||||
}
|
||||
printf("\n");
|
||||
}
|
||||
}
|
||||
|
||||
return true;
|
||||
}
|
||||
|
||||
|
@ -485,16 +485,13 @@ void WriteMAC(u32 offset, u32 val, u32 mask)
|
||||
//printf("AES: MAC: "); _printhex(MAC, 16);
|
||||
}
|
||||
|
||||
void DeriveNormalKey(u32 slot)
|
||||
void DeriveNormalKey(u8* keyX, u8* keyY, u8* normalkey)
|
||||
{
|
||||
const u8 key_const[16] = {0xFF, 0xFE, 0xFB, 0x4E, 0x29, 0x59, 0x02, 0x58, 0x2A, 0x68, 0x0F, 0x5F, 0x1A, 0x4F, 0x3E, 0x79};
|
||||
u8 tmp[16];
|
||||
|
||||
//printf("slot%d keyX: ", slot); _printhex(KeyX[slot], 16);
|
||||
//printf("slot%d keyY: ", slot); _printhex(KeyY[slot], 16);
|
||||
|
||||
for (int i = 0; i < 16; i++)
|
||||
tmp[i] = KeyX[slot][i] ^ KeyY[slot][i];
|
||||
tmp[i] = keyX[i] ^ keyY[i];
|
||||
|
||||
u32 carry = 0;
|
||||
for (int i = 0; i < 16; i++)
|
||||
@ -506,9 +503,7 @@ void DeriveNormalKey(u32 slot)
|
||||
|
||||
ROL16(tmp, 42);
|
||||
|
||||
//printf("derive normalkey %d\n", slot); _printhex(tmp, 16);
|
||||
|
||||
memcpy(KeyNormal[slot], tmp, 16);
|
||||
memcpy(normalkey, tmp, 16);
|
||||
}
|
||||
|
||||
void WriteKeyNormal(u32 slot, u32 offset, u32 val, u32 mask)
|
||||
@ -539,7 +534,7 @@ void WriteKeyY(u32 slot, u32 offset, u32 val, u32 mask)
|
||||
|
||||
if (offset >= 0xC)
|
||||
{
|
||||
DeriveNormalKey(slot);
|
||||
DeriveNormalKey(KeyX[slot], KeyY[slot], KeyNormal[slot]);
|
||||
}
|
||||
}
|
||||
|
||||
@ -555,7 +550,7 @@ void GetModcryptKey(u8* romheader, u8* key)
|
||||
return;
|
||||
}
|
||||
|
||||
u8 oldkeys[16*3];
|
||||
/*u8 oldkeys[16*3];
|
||||
memcpy(&oldkeys[16*0], KeyX[0], 16);
|
||||
memcpy(&oldkeys[16*1], KeyY[0], 16);
|
||||
memcpy(&oldkeys[16*2], KeyNormal[0], 16);
|
||||
@ -576,7 +571,7 @@ void GetModcryptKey(u8* romheader, u8* key)
|
||||
|
||||
memcpy(KeyX[0], &oldkeys[16*0], 16);
|
||||
memcpy(KeyY[0], &oldkeys[16*1], 16);
|
||||
memcpy(KeyNormal[0], &oldkeys[16*2], 16);
|
||||
memcpy(KeyNormal[0], &oldkeys[16*2], 16);*/
|
||||
}
|
||||
|
||||
void ApplyModcrypt(u8* data, u32 len, u8* key, u8* iv)
|
||||
|
@ -46,6 +46,8 @@ void WriteKeyNormal(u32 slot, u32 offset, u32 val, u32 mask);
|
||||
void WriteKeyX(u32 slot, u32 offset, u32 val, u32 mask);
|
||||
void WriteKeyY(u32 slot, u32 offset, u32 val, u32 mask);
|
||||
|
||||
void Swap16(u8* dst, u8* src);
|
||||
void DeriveNormalKey(u8* keyX, u8* keyY, u8* normalkey);
|
||||
void GetModcryptKey(u8* romheader, u8* key);
|
||||
void ApplyModcrypt(u8* data, u32 len, u8* key, u8* iv);
|
||||
|
||||
|
9
src/sha1/sha1.hpp
Normal file
9
src/sha1/sha1.hpp
Normal file
@ -0,0 +1,9 @@
|
||||
#ifndef SHA1_HPP
|
||||
#define SHA1_HPP
|
||||
|
||||
extern "C"
|
||||
{
|
||||
#include "sha1.h"
|
||||
}
|
||||
|
||||
#endif
|
Reference in New Issue
Block a user