mirror of
https://github.com/d0k3/GodMode9.git
synced 2025-06-25 21:22:47 +00:00
Compare commits
198 Commits
v1.9.2pre1
...
master
Author | SHA1 | Date | |
---|---|---|---|
|
cf1cb1cfc5 | ||
|
9ae4351bce | ||
|
99f1abd7a4 | ||
|
15eb3b1ebe | ||
|
4424c37a89 | ||
|
bc84780036 | ||
|
712df196f1 | ||
|
a20c955e2a | ||
|
7b20581fce | ||
|
ba0272ff5d | ||
|
50270a820c | ||
|
61c79e3e3f | ||
|
ab222de6b1 | ||
|
143fcf0d6b | ||
|
157848c770 | ||
|
8cde50e091 | ||
|
105f4ae5f7 | ||
|
9e7df4c52d | ||
|
208f12bde7 | ||
|
7b6b478582 | ||
|
eee63dd155 | ||
|
dab90a9162 | ||
|
26990ca23a | ||
|
338a2aa98a | ||
|
399740b50e | ||
|
ad8b5e0a8c | ||
|
14b390a943 | ||
|
031762a1fe | ||
|
8b362c977a | ||
|
11b05d7a3d | ||
|
3008bfed61 | ||
|
f7a9b3eec8 | ||
|
e1fa23a031 | ||
|
8006fbd5db | ||
|
b4f04d3620 | ||
|
eb37a21354 | ||
|
a68d7d0cb7 | ||
|
87f9b82cd3 | ||
|
a293c008d5 | ||
|
780016933c | ||
|
041ff61d41 | ||
|
1fd15657d8 | ||
|
0971b3d9fa | ||
|
b7c97af144 | ||
|
723529e2d8 | ||
|
b5fca3bc7e | ||
|
620e5061c5 | ||
|
5aaac66eef | ||
|
439e06334b | ||
|
8303440c19 | ||
|
93ee590cad | ||
|
cae3d272d3 | ||
|
64414e12ab | ||
|
9514755989 | ||
|
ccd21984b2 | ||
|
a23ba0e14b | ||
|
3710ed975b | ||
|
9416ec5ac0 | ||
|
c9d792cb27 | ||
|
096e6c3cb7 | ||
|
b11194397a | ||
|
658c9b491c | ||
|
f611b31c0c | ||
|
c13bba4cfe | ||
|
d95a606ec2 | ||
|
586d30fafa | ||
|
682b570ef7 | ||
|
8d1557191f | ||
|
cb11db6f1b | ||
|
1554aac4e1 | ||
|
fdbca10773 | ||
|
1f8de2af99 | ||
|
1b8bd121b6 | ||
|
ba10ce96c3 | ||
|
25bf8b3f93 | ||
|
07cb94d99a | ||
|
1ffbca7d46 | ||
|
942e67e507 | ||
|
830479f50c | ||
|
0275a85121 | ||
|
3eb92754bc | ||
|
77fc7af2f2 | ||
|
b366200d4b | ||
|
13eb4f8869 | ||
|
55385a5502 | ||
|
0dbe70928f | ||
|
7feeb51a65 | ||
|
c966acc851 | ||
|
e042886db4 | ||
|
ddf577b88c | ||
|
3124d944a6 | ||
|
27e316571d | ||
|
0e46d4fca8 | ||
|
33d59f6d3a | ||
|
d85023b173 | ||
|
4dc96d37e8 | ||
|
c9b6a335f7 | ||
|
33a115b75c | ||
|
ef161bce42 | ||
|
d8d43c14f3 | ||
|
37c8c50097 | ||
|
c2d96c0d9c | ||
|
41d36c620f | ||
|
4b5ac1a8e0 | ||
|
be289b4c55 | ||
|
3bfb9ef6ec | ||
|
1f96b5e9e6 | ||
|
8427e0776c | ||
|
61c17e491f | ||
|
236d2dc09c | ||
|
8680358aa1 | ||
|
7e01954e48 | ||
|
0825139cb2 | ||
|
9f431a5fde | ||
|
cc99734fac | ||
|
6799b24730 | ||
|
adb8ad260f | ||
|
5c2ab6958c | ||
|
7af76b91bb | ||
|
ce50bd63a8 | ||
|
1a27dcb1e8 | ||
|
c20911047a | ||
|
fd8c5d1897 | ||
|
0bbbc7c324 | ||
|
9f52deedad | ||
|
60f2c5192d | ||
|
f2e52bd1c7 | ||
|
dfb2dff352 | ||
|
1cb72a87e1 | ||
|
3952de3a1e | ||
|
294890057f | ||
|
4e00b8b7b6 | ||
|
ddfdf81cf7 | ||
|
8b5af2c22f | ||
|
445688c5fb | ||
|
8fa85437dd | ||
|
2cd6acb31e | ||
|
c70a7db0f3 | ||
|
7bdd01738a | ||
|
152c6c4d5a | ||
|
32936345a6 | ||
|
30c5e1fd67 | ||
|
3f7eb872b8 | ||
|
bea16124a4 | ||
|
71e3b6f73c | ||
|
ee43fe328f | ||
|
31389687ab | ||
|
eadc1ab6b9 | ||
|
9ecb90a2ba | ||
|
a6e20c641a | ||
|
c4b3b582a7 | ||
|
c31737c257 | ||
|
2f61722aa4 | ||
|
ab4316fd4e | ||
|
24195c319a | ||
|
f9408a9c10 | ||
|
8114a0bd26 | ||
|
7620310b73 | ||
|
1e9fb36582 | ||
|
9191a3244f | ||
|
af5e1a218e | ||
|
667a1bf2c0 | ||
|
48347c947a | ||
|
e41b098843 | ||
|
58fb9913d5 | ||
|
899c8a8816 | ||
|
203cf7f9e3 | ||
|
8ebb74b0bc | ||
|
af14376c84 | ||
|
647d5722aa | ||
|
25a22d30d0 | ||
|
2f2b7faeb4 | ||
|
efcfed31b3 | ||
|
7f6f6db410 | ||
|
e9599aad1c | ||
|
46a9a5819a | ||
|
65f6748dc1 | ||
|
d63db4bc6d | ||
|
cadd21508f | ||
|
01dd46ced3 | ||
|
e95e0fe90c | ||
|
608cf39e12 | ||
|
df4619b213 | ||
|
cebc43792e | ||
|
89be93384d | ||
|
145bf6de54 | ||
|
355519285a | ||
|
ae32e63074 | ||
|
d5db8c7216 | ||
|
f2876b2a61 | ||
|
3b59b0bbfb | ||
|
bd7658a808 | ||
|
7c01e1dfe9 | ||
|
8e2d1d465e | ||
|
d010f2858b | ||
|
d682a65df6 | ||
|
1f2514f19e | ||
|
a2e574a451 |
42
.github/workflows/ci.yml
vendored
Normal file
42
.github/workflows/ci.yml
vendored
Normal file
@ -0,0 +1,42 @@
|
||||
name: CI
|
||||
|
||||
on: [push, pull_request]
|
||||
|
||||
jobs:
|
||||
build:
|
||||
runs-on: ubuntu-latest
|
||||
container: devkitpro/devkitarm
|
||||
|
||||
steps:
|
||||
- uses: actions/checkout@v1
|
||||
|
||||
- name: Fix apt sources
|
||||
run: |
|
||||
apt-get update
|
||||
apt-get -y install dirmngr
|
||||
echo 'deb http://us.archive.ubuntu.com/ubuntu/ bionic main' >> /etc/apt/sources.list
|
||||
apt-key adv --keyserver keyserver.ubuntu.com --recv-keys 3B4FE6ACC0B21F32
|
||||
apt-get update
|
||||
|
||||
- name: Install and update packages
|
||||
run: |
|
||||
apt-get -y install python3 python3-pip p7zip-full libarchive13
|
||||
python3 --version
|
||||
python3 -m pip install --upgrade pip setuptools
|
||||
python3 -m pip install cryptography git+https://github.com/TuxSH/firmtool.git
|
||||
|
||||
- name: Build Project
|
||||
run: make release -j$(nproc)
|
||||
|
||||
- name: Prepare build artifact
|
||||
working-directory: release
|
||||
run: |
|
||||
ZIPNAME=$(ls GodMode9-*.zip)
|
||||
rm $ZIPNAME
|
||||
echo "OUTNAME=${ZIPNAME%.zip}" >> $GITHUB_ENV
|
||||
|
||||
- uses: actions/upload-artifact@v4
|
||||
with:
|
||||
name: ${{ env.OUTNAME }}
|
||||
path: release/*
|
||||
if-no-files-found: error
|
9
.gitignore
vendored
9
.gitignore
vendored
@ -5,6 +5,7 @@
|
||||
*.obj
|
||||
*.elf
|
||||
*.map
|
||||
*.dis
|
||||
|
||||
# Precompiled Headers
|
||||
*.gch
|
||||
@ -35,10 +36,14 @@
|
||||
|
||||
# OS leftovers
|
||||
desktop.ini
|
||||
.DS_Store
|
||||
|
||||
# Sublime files
|
||||
*.sublime-*
|
||||
|
||||
# Visual Studio Code files
|
||||
.vscode
|
||||
|
||||
# Build directories
|
||||
/build
|
||||
/output
|
||||
@ -48,6 +53,6 @@ desktop.ini
|
||||
/data/README_internal.md
|
||||
|
||||
# User additions
|
||||
/data/aeskeydb.bin
|
||||
/data/aeskeydb_.bin
|
||||
/zzz_backup
|
||||
/arm9/source/language.inl
|
||||
*.trf
|
||||
|
19
.travis.yml
19
.travis.yml
@ -1,19 +0,0 @@
|
||||
language: c
|
||||
sudo: true
|
||||
dist: bionic
|
||||
|
||||
before_install:
|
||||
- wget "https://github.com/devkitPro/pacman/releases/latest/download/devkitpro-pacman.amd64.deb" -O dkp-pacman.deb
|
||||
- export DEVKITPRO=/opt/devkitpro
|
||||
- export DEVKITARM=${DEVKITPRO}/devkitARM
|
||||
|
||||
install:
|
||||
- sudo apt-get -y install python3 python3-pip p7zip-full libarchive13
|
||||
- sudo dpkg -i dkp-pacman.deb
|
||||
- sudo dkp-pacman -S --noconfirm devkitARM
|
||||
- sudo pip3 install --upgrade pip setuptools
|
||||
- sudo pip3 install cryptography
|
||||
- sudo pip3 install git+https://github.com/TuxSH/firmtool.git
|
||||
|
||||
script:
|
||||
- make release
|
62
Makefile
62
Makefile
@ -16,15 +16,28 @@ export RELDIR := release
|
||||
export COMMON_DIR := ../common
|
||||
|
||||
# Definitions for initial RAM disk
|
||||
VRAM_OUT := $(OUTDIR)/vram0.tar
|
||||
VRAM_DATA := data
|
||||
VRAM_FLAGS := --make-new --path-limit 99 --size-limit 262144
|
||||
VRAM_TAR := $(OUTDIR)/vram0.tar
|
||||
VRAM_DATA := data/*
|
||||
VRAM_FLAGS := --make-new --path-limit 99
|
||||
ifeq ($(NTRBOOT),1)
|
||||
VRAM_SCRIPTS := resources/gm9/scripts/*
|
||||
endif
|
||||
|
||||
# Definitions for translation files
|
||||
JSON_FOLDER := resources/languages
|
||||
TRF_FOLDER := resources/gm9/languages
|
||||
|
||||
SOURCE_JSON := $(JSON_FOLDER)/source.json
|
||||
LANGUAGE_INL := arm9/source/language.inl
|
||||
|
||||
JSON_FILES := $(filter-out $(SOURCE_JSON),$(wildcard $(JSON_FOLDER)/*.json))
|
||||
TRF_FILES := $(subst $(JSON_FOLDER),$(TRF_FOLDER),$(JSON_FILES:.json=.trf))
|
||||
|
||||
ifeq ($(OS),Windows_NT)
|
||||
ifeq ($(TERM),cygwin)
|
||||
PY3 := py -3 # Windows / CMD/PowerShell
|
||||
else
|
||||
PY3 := python3 # Windows / MSYS2
|
||||
PY3 := py # Windows / MSYS2
|
||||
endif
|
||||
else
|
||||
PY3 := python3 # Unix-like
|
||||
@ -37,18 +50,18 @@ export ASFLAGS := -g -x assembler-with-cpp $(INCLUDE)
|
||||
export CFLAGS := -DDBUILTS="\"$(DBUILTS)\"" -DDBUILTL="\"$(DBUILTL)\"" -DVERSION="\"$(VERSION)\"" -DFLAVOR="\"$(FLAVOR)\"" \
|
||||
-g -Os -Wall -Wextra -Wcast-align -Wformat=2 -Wno-main \
|
||||
-fomit-frame-pointer -ffast-math -std=gnu11 -MMD -MP \
|
||||
-Wno-unused-function -Wno-format-truncation $(INCLUDE) -ffunction-sections -fdata-sections
|
||||
-Wno-unused-function -Wno-format-truncation -Wno-format-nonliteral $(INCLUDE) -ffunction-sections -fdata-sections
|
||||
export LDFLAGS := -Tlink.ld -nostartfiles -Wl,--gc-sections,-z,max-page-size=4096
|
||||
ELF := arm9/arm9.elf arm11/arm11.elf
|
||||
ELF := arm9/arm9_code.elf arm9/arm9_data.elf arm11/arm11.elf
|
||||
|
||||
.PHONY: all firm vram0 elf release clean
|
||||
.PHONY: all firm $(VRAM_TAR) elf release clean
|
||||
all: firm
|
||||
|
||||
clean:
|
||||
@set -e; for elf in $(ELF); do \
|
||||
$(MAKE) --no-print-directory -C $$(dirname $$elf) clean; \
|
||||
done
|
||||
@rm -rf $(OUTDIR) $(RELDIR) $(FIRM) $(FIRMD) $(VRAM_OUT)
|
||||
@rm -rf $(OUTDIR) $(RELDIR) $(FIRM) $(FIRMD) $(VRAM_TAR) $(LANGUAGE_INL) $(TRF_FILES)
|
||||
|
||||
unmarked_readme: .FORCE
|
||||
@$(PY3) utils/unmark.py -f README.md data/README_internal.md
|
||||
@ -72,29 +85,44 @@ release: clean unmarked_readme
|
||||
@cp $(OUTDIR)/$(FLAVOR)_dev.firm.sha $(RELDIR)/
|
||||
@cp $(ELF) $(RELDIR)/elf
|
||||
@cp $(CURDIR)/README.md $(RELDIR)
|
||||
@cp $(CURDIR)/resources/lua-doc.md $(RELDIR)/lua-doc.md
|
||||
@cp -R $(CURDIR)/resources/gm9 $(RELDIR)/gm9
|
||||
@cp -R $(CURDIR)/resources/sample $(RELDIR)/sample
|
||||
|
||||
@-7za a $(RELDIR)/$(FLAVOR)-$(VERSION)-$(DBUILTS).zip ./$(RELDIR)/*
|
||||
|
||||
vram0:
|
||||
@mkdir -p "$(OUTDIR)"
|
||||
@echo "Creating $(VRAM_OUT)"
|
||||
@$(PY3) utils/add2tar.py $(VRAM_FLAGS) $(VRAM_OUT) $(shell ls -d $(SPLASH) $(OVERRIDE_FONT) $(VRAM_DATA)/*)
|
||||
$(VRAM_TAR): $(SPLASH) $(OVERRIDE_FONT) $(VRAM_DATA) $(VRAM_SCRIPTS)
|
||||
@mkdir -p "$(@D)"
|
||||
@echo "Creating $@"
|
||||
@$(PY3) utils/add2tar.py $(VRAM_FLAGS) $(VRAM_TAR) $(shell ls -d -1 $^)
|
||||
|
||||
$(LANGUAGE_INL): $(SOURCE_JSON)
|
||||
@echo "Creating $@"
|
||||
@$(PY3) utils/transcp.py $< $@
|
||||
|
||||
$(TRF_FOLDER)/%.trf: $(JSON_FOLDER)/%.json
|
||||
@$(PY3) utils/transriff.py $< $@
|
||||
|
||||
%.elf: .FORCE
|
||||
@echo "Building $@"
|
||||
@$(MAKE) --no-print-directory -C $(@D)
|
||||
@$(MAKE) --no-print-directory -C $(@D) $(@F)
|
||||
|
||||
firm: $(ELF) vram0
|
||||
@test `wc -c <$(VRAM_OUT)` -le 262144
|
||||
# Indicate a few explicit dependencies:
|
||||
# The ARM9 data section depends on the VRAM drive
|
||||
arm9/arm9_data.elf: $(VRAM_TAR) $(LANGUAGE_INL)
|
||||
# And the code section depends on the data section being built already
|
||||
arm9/arm9_code.elf: arm9/arm9_data.elf
|
||||
|
||||
firm: $(ELF) $(TRF_FILES)
|
||||
@mkdir -p $(call dirname,"$(FIRM)") $(call dirname,"$(FIRMD)")
|
||||
@echo "[FLAVOR] $(FLAVOR)"
|
||||
@echo "[VERSION] $(VERSION)"
|
||||
@echo "[BUILD] $(DBUILTL)"
|
||||
@echo "[FIRM] $(FIRM)"
|
||||
@$(PY3) -m firmtool build $(FIRM) $(FTFLAGS) -g -A 0x80C0000 -D $(ELF) $(VRAM_OUT) -C NDMA XDMA memcpy
|
||||
@$(PY3) -m firmtool build $(FIRM) $(FTFLAGS) -g -D $(ELF) -C NDMA NDMA XDMA
|
||||
@echo "[FIRM] $(FIRMD)"
|
||||
@$(PY3) -m firmtool build $(FIRMD) $(FTDFLAGS) -g -A 0x80C0000 -D $(ELF) $(VRAM_OUT) -C NDMA XDMA memcpy
|
||||
@$(PY3) -m firmtool build $(FIRMD) $(FTDFLAGS) -g -D $(ELF) -C NDMA NDMA XDMA
|
||||
|
||||
vram0: $(VRAM_TAR) .FORCE # legacy target name
|
||||
|
||||
.FORCE:
|
||||
|
@ -1,4 +1,6 @@
|
||||
|
||||
LIBS ?=
|
||||
|
||||
OBJECTS := $(patsubst $(SOURCE)/%.s, $(BUILD)/%.o, \
|
||||
$(patsubst $(SOURCE)/%.c, $(BUILD)/%.o, \
|
||||
$(call rwildcard, $(SOURCE), *.s *.c)))
|
||||
@ -11,11 +13,12 @@ all: $(TARGET).elf
|
||||
|
||||
.PHONY: clean
|
||||
clean:
|
||||
@rm -rf $(BUILD) $(TARGET).elf $(TARGET).map
|
||||
@rm -rf $(BUILD) $(TARGET).elf $(TARGET).dis $(TARGET).map
|
||||
|
||||
$(TARGET).elf: $(OBJECTS) $(OBJECTS_COMMON)
|
||||
@mkdir -p "$(@D)"
|
||||
@$(CC) $(LDFLAGS) $^ -o $@
|
||||
@$(CC) $(LDFLAGS) $^ -o $@ $(LIBS)
|
||||
@$(OBJDUMP) -S -h $@ > $@.dis
|
||||
|
||||
$(BUILD)/%.cmn.o: $(COMMON_DIR)/%.c
|
||||
@mkdir -p "$(@D)"
|
||||
|
@ -1,3 +1,4 @@
|
||||
export OBJDUMP := arm-none-eabi-objdump
|
||||
|
||||
dirname = $(shell dirname $(1))
|
||||
|
||||
@ -25,6 +26,12 @@ else ifeq ($(FLAVOR),ZuishMode9)
|
||||
CFLAGS += -DDEFAULT_FONT=\"font_zuish_8x8.pbm\"
|
||||
endif
|
||||
|
||||
ifeq ($(LARGEDLC),1)
|
||||
CFLAGS += -DTITLE_MAX_CONTENTS=1536
|
||||
else
|
||||
CFLAGS += -DTITLE_MAX_CONTENTS=1024
|
||||
endif
|
||||
|
||||
ifeq ($(SALTMODE),1)
|
||||
CFLAGS += -DSALTMODE
|
||||
endif
|
||||
@ -61,6 +68,10 @@ ifdef SD_TIMEOUT
|
||||
CFLAGS += -DSD_TIMEOUT=$(SD_TIMEOUT)
|
||||
endif
|
||||
|
||||
ifeq ($(NO_LUA),1)
|
||||
CFLAGS += -DNO_LUA
|
||||
endif
|
||||
|
||||
ifdef N_PANES
|
||||
CFLAGS += -DN_PANES=$(N_PANES)
|
||||
endif
|
||||
|
56
README.md
56
README.md
@ -39,9 +39,9 @@ GodMode9 is designed to be intuitive, buttons leading to the results you'd expec
|
||||
## How to build this / developer info
|
||||
Build `GodMode9.firm` via `make firm`. This requires [firmtool](https://github.com/TuxSH/firmtool), [Python 3.5+](https://www.python.org/downloads/) and [devkitARM](https://sourceforge.net/projects/devkitpro/) installed).
|
||||
|
||||
You may run `make release` to get a nice, release-ready package of all required files. To build __SafeMode9__ (a bricksafe variant of GodMode9, with limited write permissions) instead of GodMode9, compile with `make FLAVOR=SafeMode9`. To switch screens, compile with `make SWITCH_SCREENS=1`. For additional customization, you may choose the internal font by replacing `font_default.pbm` inside the `data` directory. You may also hardcode the brightness via `make FIXED_BRIGHTNESS=x`, whereas `x` is a value between 0...15.
|
||||
You may run `make release` to get a nice, release-ready package of all required files. To build __SafeMode9__ (a bricksafe variant of GodMode9, with limited write permissions) instead of GodMode9, compile with `make FLAVOR=SafeMode9`. To switch screens, compile with `make SWITCH_SCREENS=1`. For additional customization, you may choose the internal font by replacing `font_default.frf` inside the `data` directory. You may also hardcode the brightness via `make FIXED_BRIGHTNESS=x`, whereas `x` is a value between 0...15.
|
||||
|
||||
Further customization is possible by hardcoding `aeskeydb.bin` (just put the file into the `data` folder when compiling). All files put into the `data` folder will turn up in the `V:` drive, but keep in mind there's a hard 3MB limit for all files inside, including overhead. A standalone script runner is compiled by providing `autorun.gm9` (again, in the `data` folder) and building with `make SCRIPT_RUNNER=1`. There's more possibility for customization, read the Makefiles to learn more.
|
||||
Further customization is possible by hardcoding `aeskeydb.bin` (just put the file into the `data` folder when compiling). All files put into the `data` folder will turn up in the `V:` drive, but keep in mind there's a hard 223.5KiB limit for all files inside, including overhead. A standalone script runner is compiled by providing `autorun.lua` or `autorun.gm9` (again, in the `data` folder) and building with `make SCRIPT_RUNNER=1`. There's more possibility for customization, read the Makefiles to learn more.
|
||||
|
||||
To build a .firm signed with SPI boot keys (for ntrboot and the like), run `make NTRBOOT=1`. You may need to rename the output files if the ntrboot installer you use uses hardcoded filenames. Some features such as boot9 / boot11 access are not currently available from the ntrboot environment.
|
||||
|
||||
@ -61,10 +61,14 @@ GodMode9 provides a write permissions system, which will protect you from accide
|
||||
|
||||
## Support files
|
||||
For certain functionality, GodMode9 may need 'support files'. Support files should be placed into either `0:/gm9/support` or `1:/gm9/support`. Support files contain additional information that is required in decryption operations. A list of support files, and what they do, is found below. Please don't ask for support files - find them yourself.
|
||||
* __`aeskeydb.bin`__: This should contain 0x25keyX, 0x18keyX and 0x1BkeyX to enable decryption of 7x / Secure3 / Secure4 encrypted NCCH files, 0x11key95 / 0x11key96 for FIRM decrypt support and 0x11keyOTP / 0x11keyIVOTP for 'secret' sector 0x96 crypto support. Entrypoints other than [boot9strap](https://github.com/SciresM/boot9strap) or [fastboot3ds](https://github.com/derrekr/fastboot3DS) may require a aeskeydb.bin file. A known perfect `aeskeydb.bin` can be found somewhere on the net, is exactly 1024 byte big and has an MD5 of A5B28945A7C051D7A0CD18AF0E580D1B. Have fun hunting!
|
||||
* __`seeddb.bin`__: This file is required to decrypt and mount seed encrypted NCCHs and CIAs if the seed in question is not installed to your NAND. Note that your seeddb.bin must also contain the seed for the specific game you need to decrypt.
|
||||
* __`encTitleKeys.bin`__ / __`decTitleKeys.bin`__: These files are optional and provide titlekeys, which are required to create updatable CIAs from NCCH / NCSD files. CIAs created without these files will still work, but won't be updatable from eShop.
|
||||
* __`aeskeydb.bin`__: This should contain 0x25keyX, 0x18keyX and 0x1BkeyX to enable decryption of 7x / Secure3 / Secure4 encrypted NCCH files, 0x11key95 / 0x11key96 for FIRM decrypt support and 0x11keyOTP / 0x11keyIVOTP for 'secret' sector 0x96 crypto support. Entrypoints other than [boot9strap](https://github.com/SciresM/boot9strap) or [fastboot3ds](https://github.com/derrekr/fastboot3DS) may require a aeskeydb.bin file. This is now included in standard releases of GM9. No need to hunt down the file!
|
||||
* __`seeddb.bin`__: This file is optional and required to decrypt and mount seed-encrypted NCCHs and CIAs (if the seed in question is not installed to your NAND). Note that your seeddb.bin must also contain the seed for the specific game you need to decrypt.
|
||||
* __`encTitleKeys.bin`__ / __`decTitleKeys.bin`__: These files are optional and provide titlekeys, which are required to decrypt and install contents downloaded from CDN (for DSi and 3DS content).
|
||||
|
||||
### Fonts and translations
|
||||
GodMode9 also supports custom fonts and translations as support files. These both use custom formats, fonts use FRF (Font RIFF) files which can be created using the `fontriff.py` Python script in the 'utils' folder. Translations use TRF (Translation RIFF) files from the `transriff.py` script. Examples of the inputs to these scripts can be found in the 'fonts' and 'languages' folders of the 'resources' folder respectively.
|
||||
|
||||
TRF files can be placed in `0:/gm9/languages` to show in the language menu accessible from the HOME menu and shown on first load. Official translations are provided from the community via the [GodMode9 Crowdin](https://crowdin.com/project/GodMode9). Languages can use a special font by having an FRF with the same name, for example `en.trf` and `en.frf`.
|
||||
|
||||
## Drives in GodMode9
|
||||
GodMode9 provides access to system data via drives, a listing of what each drive contains and additional info follows below. Some of these drives are removable (such as drive `7:`), some will only turn up if they are available (drive `8:` and everything associated with EmuNAND, f.e.). Information on the 3DS console file system is also found on [3Dbrew.org](https://3dbrew.org/wiki/Flash_Filesystem).
|
||||
@ -86,9 +90,10 @@ GodMode9 provides access to system data via drives, a listing of what each drive
|
||||
* __`C: GAMECART`__: This is read-only and provides access to the game cartridge currently inserted into the cart slot. This can be used for dumps of CTR and TWL mode cartridges. Flash cards are supported only to a limited extent.
|
||||
* __`G: GAME IMAGE`__: CIA/NCSD/NCCH/EXEFS/ROMFS/FIRM images can be accessed via this drive when mounted. This is read-only.
|
||||
* __`K: AESKEYDB IMAGE`__: An `aeskeydb.bin` image can be mounted and accessed via this drive. The drive shows all keys inside the aeskeydb.bin. This is read-only.
|
||||
* __`T: TICKET.DB IMAGE`__: Ticket database files can be mounted and accessed via this drive. This provides easy and quick access to all tickets inside the `ticket.db`. This is read-only.
|
||||
* __`T: TICKET.DB IMAGE / BDRI IMAGE`__: Ticket database files can be mounted and accessed via this drive. This provides easy and quick access to all tickets inside the `ticket.db`. This drive also provides access to other BDRI images, such as the Title database (`title.db`).
|
||||
* __`M: MEMORY VIRTUAL`__: This provides access to various memory regions. This is protected by a special write permission, and caution is advised when doing modifications inside this drive. This drive also gives access to `boot9.bin`, `boot11.bin` (boot9strap only) and `otp.mem` (sighaxed systems only).
|
||||
* __`V: VRAM VIRTUAL`__: This drive resides in the first VRAM bank and contains files essential to GodMode9. The font (in PBM format), the splash logo (in PNG format) and the readme file are found there, as well as any file that is provided inside the `data` folder at build time. This is read-only.
|
||||
* __`V: VRAM VIRTUAL`__: This drive resides in part of ARM9 internal memory and contains files essential to GodMode9. The font (in FRF format), the splash logo (in PNG format) and the readme file are found there, as well as any file that is provided inside the `data` folder at build time. This is read-only.
|
||||
* __`Y: TITLE MANAGER`__: The title manager is accessed via the HOME menu and provides easy access to all installed titles.
|
||||
* __`Z: LAST SEARCH`__: After a search operation, search results are found inside this drive. The drive can be accessed at a later point to return to the former search results.
|
||||
|
||||
|
||||
@ -96,8 +101,8 @@ GodMode9 provides access to system data via drives, a listing of what each drive
|
||||
GodMode9 is one of the most important tools for digital preservation of 3DS content data. Here's some stuff you should know:
|
||||
* __Dumping game cartridges (size < 4GiB)__: Game cartridges turn up inside the `C:` drive (see above). For most carts all you need to do is copy the `.3DS` game image to some place of your choice. Game images dumped by GodMode9 contain no identifying info such as private headers or savegames. Private headers can be dumped in a separate image.
|
||||
* __Dumping game cartridges (size = 4GiB)__: Everything written above applies here as well. However, the FAT32 file system (which is what the 3DS uses) is limited to _4GiB - 1byte_. Take note that the `.3DS` game image, as provided by GodMode9 actually misses the last byte in these cases. That byte is 0xFF and unused in all known cases. It is not required for playing the image. If you need to check, we also provide split files (`.000`, `.001)`, which contain all the data. If you need a valid checksum for the `.3DS` game image, append a 0xFF byte before checking.
|
||||
* __Building CIAs (all types)__: You may convert compatible file types (game images, installed content) to the CIA installable format using the A button menu. To get a list of installed content, press R+A on one of the compatible drives (`1:`, `2:`, `A:`, ...) and select `Search for titles`. Take note that `standard` built CIAs are decrypted by default (decryption allows better compression by ZIP and 7Z). If you should need an encrypted CIA for some reason, apply the encryption to the CIA afterwards.
|
||||
* __Building CIAs (legit type)__: Installed content can be built as `legit` or `standard` CIA. Legit CIAs preserve more of the original data and are thus recommended for preservation purposes. When building legit CIAs, GodMode9 keeps the original crypto and tries to find a genuine, signature-valid ticket. If it doesn't find one on your system or if it only finds a personalized one, it offers to use a generic ticket instead. It is not recommended to use personalized tickets - only choose this if you know what you're doing.
|
||||
* __Building CIAs (all types)__: You may convert compatible file types (game images, installed content, CDN content) to the CIA installable format using the A button menu. To get a list of installed content, press HOME, select `Title manager` and choose a drive. Take note that `standard` built CIAs are decrypted by default (decryption allows better compression by ZIP and 7Z). If you should need an encrypted CIA for some reason, apply the encryption to the CIA afterwards.
|
||||
* __Building CIAs (legit type)__: Installed content can be built as `legit` or `standard` CIA. Legit CIAs preserve more of the original data and are thus recommended for preservation purposes. When building legit CIAs, GodMode9 keeps the original crypto and tries to find a genuine, signature-valid ticket. If it doesn't find one on your system, it will use a generic ticket instead. If it only finds a personalized one, it still offers to use a generic ticket. It is not recommended to use personalized tickets - only choose this if you know what you're doing.
|
||||
* __Checking CIAs__: You may also check your CIA files with the builtin `CIA checker tool`. Legit CIAs with generic tickets are identified as `Universal Pirate Legit`, which is the recommended preservation format where `Universal Legit` is not available. Note: apart from system titles, `Universal Legit` is only available for a handful of preinstalled games from special edition 3DS consoles.
|
||||
|
||||
|
||||
@ -113,12 +118,13 @@ With the possibilites GodMode9 provides, not everything may be obvious at first
|
||||
* __Hexview and hexedit any file__: Press the A button on a file and select `Show in Hexeditor`. A button again enables edit mode, hold the A button and press arrow buttons to edit bytes. You will get an additional confirmation prompt to take over changes. Take note that for certain files, write permissions can't be enabled.
|
||||
* __View text files in a text viewer__: Press the A button on a file and select `Show in Textviewer` (only shows up for actual text files). You can enable wordwrapped mode via R+Y, and navigate around the file via R+X and the dpad.
|
||||
* __Chainload FIRM payloads__: Press the A button on a FIRM file, select `FIRM options` -> `Boot FIRM`. Keep in mind you should not run FIRMs from dubious sources and that the write permissions system is no longer in place after booting a payload.
|
||||
* __Chainload FIRM payloads from a neat menu__: The `payloads` menu is found inside the HOME button menu. It provides any FIRM found in `0:/gm9/payloads` for quick chainloading.
|
||||
* __Chainload FIRM payloads from a neat menu__: The `payloads` menu is found inside the HOME button menu. It provides any FIRM found in `0:/gm9/payloads` for quick chainloading.
|
||||
* __Inject a file to another file__: Put exactly one file (the file to be injected from) into the clipboard (via the Y button). Press A on the file to be injected to. There will be an option to inject the first file into it.
|
||||
|
||||
### Scripting functionality
|
||||
* __Run .gm9 scripts from anywhere on your SD card__: You can run scripts in .gm9 format via the A button menu. .gm9 scripts use a shell-like language and can be edited in any text editor. For an overview of usable commands have a look into the sample scripts included in the release archive. *Don't run scripts from untrusted sources.*
|
||||
* __Run .gm9 scripts via a neat menu__: Press the HOME button, select `More...` -> `Scripts...`. Any script you put into `0:/gm9/scripts` (subdirs included) will be found here. Scripts ran via this method won't have the confirmation at the beginning either.
|
||||
* __Run .lua scripts from anywhere on your SD card__: You can run Lua scripts via the A button menu. For an overview of usable commands have a look into the documentation and sample scripts included in the release archive. *Don't run scripts from untrusted sources.*
|
||||
* __Run Lua scripts via a neat menu__: Press the HOME button, select `More...` -> `Lua scripts...`. Any script you put into `0:/gm9/luascripts` (subdirs included) will be found here. Scripts ran via this method won't have the confirmation at the beginning either.
|
||||
* __Run legacy .gm9 scripts__: The old format of .gm9 scripts is still available, but is deprecated and will see no further development.
|
||||
|
||||
### SD card handling
|
||||
* __Format your SD card / setup an EmuNAND__: Press the HOME button, select `More...` -> `SD format menu`. This also allows to setup a RedNAND (single/multi) or GW type EmuNAND on your SD card. You will get a warning prompt and an unlock sequence before any operation starts.
|
||||
@ -128,15 +134,17 @@ With the possibilites GodMode9 provides, not everything may be obvious at first
|
||||
* __Set (and use) the RTC clock__: For correct modification / creation dates in your file system, you need to setup the RTC clock first. Press the HOME Button and select `More...` to find the option. Keep in mind that modifying the RTC clock means you should also fix system OS time afterwards.
|
||||
|
||||
### Game file handling
|
||||
* __List titles installed on your system__: Press R+A on a /title dir or a subdir below that. This will also work directly for `CTRNAND`, `TWLN` and `A:`/`B:` drives. This will list all titles installed in the selected location. Works best with the below two features.
|
||||
* __Build CIAs from NCCH / NCSD (.3DS) / TMD (installed contents)__: Press A on the file you want converted and the option will be shown. Installed contents are found (among others) in `1:/titles/`(SysNAND) and `A:/titles/`(SD installed). Where applicable, you will also be able to generate legit CIAs. Note: this works also from a file search and title listing.
|
||||
* __List titles installed on your system__: Press HOME and select `Title manager`. This will also work via R+A for `CTRNAND` and `A:`/`B:` drives. This will list all titles installed in the selected location.
|
||||
* __Install titles to your system__: Just press A on any file you want installed and select `Install game image` from the submenu. Works with NCCH / NCSD / CIA / DSiWare SRLs / 3DS CDN TMDs / DSi CDN TMDs / NUS TMDs.
|
||||
* __(Batch) Uninstall titles from your system__: Most easily done via the HOME menu `Title manager`. Just select one or more titles and find the option inside the `Manage title...` submenu.
|
||||
* __Build CIAs from NCCH / NCSD (.3DS) / SRL / TMD__: Press A on the file you want converted and the option will be shown. Installed contents are found most easily via the HOME menu `Title manager`. Where applicable, you will also be able to generate legit CIAs. Note: this works also from a file search and title listing.
|
||||
* __Dump CXIs / NDS from TMD (installed contents)__: This works the same as building CIAs, but dumps decrypted CXIs or NDS rom dumps instead. Note: this works also from a file search and title listing.
|
||||
* __Decrypt, encrypt and verify NCCH / NCSD / CIA / BOSS / FIRM images__: Options are found inside the A button menu. You will be able to decrypt/encrypt to the standard output directory or (where applicable) in place.
|
||||
* __Decrypt content downloaded from CDN / NUS__: Press A on the file you want decrypted. For this to work, you need at least a TMD file (`encTitlekeys.bin` / `decTitlekeys.bin` also required, see _Support files_ below) or a CETK file. Either keep the names provided by CDN / NUS, or rename the downloaded content to `(anything).nus` or `(anything).cdn` and the CETK to `(anything).cetk`.
|
||||
* __Batch mode for the above operations__: Just select multiple files of the same type via the L button, then press the A button on one of the selected files.
|
||||
* __Access any file inside NCCH / NCSD / CIA / FIRM / NDS images__: Just mount the file via the A button menu and browse to the file you want. For CDN / NUS content, prior decryption is required for full access.
|
||||
* __Rename your NCCH / NCSD / CIA / NDS / GBA files to proper names__: Find this feature inside the A button menu. Proper names include title id, game name, product code and region.
|
||||
* __Trim NCCH / NCSD / NDS / FIRM / NAND images__: This feature is found inside the A button menu. It allows you to trim excess data from supported file types. *Warning: Excess data may not be empty, bonus drives are stored there for NAND images, NCSD card2 images store savedata there, for FIRMs parts of the A9LH exploit may be stored there*.
|
||||
* __Trim NCCH / NCSD / NDS / GBA / FIRM / NAND images__: This feature is found inside the A button menu. It allows you to trim excess data from supported file types. *Warning: Excess data may not be empty, bonus drives are stored there for NAND images, NCSD card2 images store savedata there, for FIRMs parts of the A9LH exploit may be stored there*.
|
||||
* __Dump 3DS / NDS / DSi type retail game cartridges__: Insert the cartridge and take a look inside the `C:` drive. You may also dump private headers from 3DS game cartridges. The `C:` drive also gives you read/write access to the saves on the cartridges. Note: For 4GiB cartridges, the last byte is not included in the .3ds file dump. This is due to restrictrions of the FAT32 file system.
|
||||
|
||||
### NAND handling
|
||||
@ -154,7 +162,7 @@ With the possibilites GodMode9 provides, not everything may be obvious at first
|
||||
* __Check and fix CMACs (for any file that has them)__: The option will turn up in the A button menu if it is available for a given file (f.e. system savegames, `ticket.db`, etc...). This can also be done for multiple files at once if they are marked.
|
||||
* __Mount ticket.db files and dump tickets__: Mount the file via the A button menu. Tickets are sorted into `eshop` (stuff from eshop), `system` (system tickets), `unknown` (typically empty) and `hidden` (hidden tickets, found via a deeper scan) categories. All tickets displayed are legit, fake tickets are ignored
|
||||
* __Inject any NCCH CXI file into Health & Safety__: The option is found inside the A button menu for any NCCH CXI file. NCCH CXIs are found, f.e. inside of CIAs. Keep in mind there is a (system internal) size restriction on H&S injectable apps.
|
||||
* __Inject and dump GBA VC saves__: Find the options to do this inside the A button menu for `agbsave.bin` in the `S:` drive. Keep in mind that you need to start the specific GBA game on your console before dumping / injecting the save.
|
||||
* __Inject and dump GBA VC saves__: Find the options to do this inside the A button menu for `agbsave.bin` in the `S:` drive. Keep in mind that you need to start the specific GBA game on your console before dumping / injecting the save. _To inject a save it needs to be in the clipboard_.
|
||||
* __Dump a copy of boot9, boot11 & your OTP__: This works on sighax, via boot9strap only. These files are found inside the `M:` drive and can be copied from there to any other place.
|
||||
|
||||
### Support file handling
|
||||
@ -165,6 +173,8 @@ With the possibilites GodMode9 provides, not everything may be obvious at first
|
||||
## License
|
||||
You may use this under the terms of the GNU General Public License GPL v2 or under the terms of any later revisions of the GPL. Refer to the provided `LICENSE.txt` file for further information.
|
||||
|
||||
## Contact info
|
||||
You can chat directly with us via IRC @ #GodMode9 on [libera.chat](https://web.libera.chat/#GodMode9) or [Discord](https://discord.gg/BRcbvtFxX4)!
|
||||
|
||||
## Credits
|
||||
This tool would not have been possible without the help of numerous people. Thanks go to (in no particular order)...
|
||||
@ -174,9 +184,13 @@ This tool would not have been possible without the help of numerous people. Than
|
||||
* **Wolfvak** for ARM11 code, FIRM binary launcher, exception handlers, PCX code, Makefile and for help on countless other occasions
|
||||
* **SciresM** for helping me figure out RomFS and for boot9strap
|
||||
* **SciresM**, **Myria**, **Normmatt**, **TuxSH** and **hedgeberg** for figuring out sighax and giving us access to bootrom
|
||||
* **ihaveamac** for first developing the simple CIA generation method and for being of great help in porting it
|
||||
* **ihaveamac** for implementing Lua support, and first developing the simple CIA generation method and for being of great help in porting it
|
||||
* **DarkRTA** for linker support during the implementation of Lua
|
||||
* **luigoalma** for fixing Lua to compile without issues
|
||||
* **Gruetzig** for re-implementing the Lua os module
|
||||
* **wwylele** and **aspargas2** for documenting and implementing the DISA, DIFF, and BDRI formats
|
||||
* **dratini0** for savefile management, based on [TWLSaveTool](https://github.com/TuxSH/TWLSaveTool/)
|
||||
* **Pk11** for unicode support and her ongoing work on GodMode9 translations and translation support
|
||||
* **b1l1s** for helping me figure out A9LH compatibility
|
||||
* **Gelex** and **AuroraWright** for helping me figure out various things
|
||||
* **stuckpixel** for the new 6x10 font and help on various things
|
||||
@ -185,14 +199,16 @@ This tool would not have been possible without the help of numerous people. Than
|
||||
* **profi200** for always useful advice and helpful hints on various things
|
||||
* **windows-server-2003** for the initial implementation of if-else-goto in .gm9 scripts
|
||||
* **Kazuma77** for pushing forward scripting, for testing and for always useful advice
|
||||
* **TurdPooCharger** for being one of the most meticulous software testers around
|
||||
* **JaySea**, **YodaDaCoda**, **liomajor**, **Supster131**, **imanoob**, **Kasher_CS** and countless others from freenode #Cakey and the GBAtemp forums for testing, feedback and helpful hints
|
||||
* **Shadowhand** for being awesome and [hosting my nightlies](https://d0k3.secretalgorithm.com/)
|
||||
* **Plailect** for putting his trust in my tools and recommending this in [The Guide](https://3ds.guide/)
|
||||
* **SirNapkin1334** for testing, bug reports and for hosting the official [GodMode9 Discord channel](https://discord.gg/EGu6Qxw)
|
||||
* **SirNapkin1334** for testing, bug reports and for hosting the original GodMode9 Discord server
|
||||
* **Lilith Valentine** for testing and helpful advice
|
||||
* **Project Nayuki** for [qrcodegen](https://github.com/nayuki/QR-Code-generator)
|
||||
* **Amazingmax fonts** for the Amazdoom font
|
||||
* The fine folks on **the official GodMode9 Discord**
|
||||
* **TakWolf** for [fusion-pixel-font](https://github.com/TakWolf/fusion-pixel-font) used for Chinese and Korean
|
||||
* The fine folks on **the official GodMode9 IRC channel and Discord server**
|
||||
* The fine folks on **freenode #Cakey**
|
||||
* All **[3dbrew.org](https://www.3dbrew.org/wiki/Main_Page) editors**
|
||||
* Everyone I possibly forgot, if you think you deserve to be mentioned, just contact me!
|
||||
* Everyone I possibly forgot, if you think you deserve to be mentioned, just contact us!
|
||||
|
@ -1,6 +1,6 @@
|
||||
PROCESSOR := ARM11
|
||||
|
||||
TARGET := $(shell basename $(CURDIR))
|
||||
TARGET := $(shell basename "$(CURDIR)")
|
||||
|
||||
SOURCE := source
|
||||
BUILD := build
|
||||
@ -11,7 +11,7 @@ INCLUDE := $(foreach dir,$(INCDIRS),-I"$(shell pwd)/$(dir)")
|
||||
|
||||
ASFLAGS += $(SUBARCH) $(INCLUDE)
|
||||
CFLAGS += $(SUBARCH) $(INCLUDE) -flto
|
||||
LDFLAGS += $(SUBARCH) -Wl,-Map,$(TARGET).map -flto
|
||||
LDFLAGS += $(SUBARCH) -Wl,--use-blx,-Map,$(TARGET).map -flto
|
||||
|
||||
include ../Makefile.common
|
||||
include ../Makefile.build
|
||||
|
@ -16,7 +16,7 @@ SECTIONS
|
||||
__text_va = ABSOLUTE(.);
|
||||
*(.text*)
|
||||
. = ALIGN(4K);
|
||||
__text_len = . - __text_va;
|
||||
__text_va_end = .;
|
||||
} >AXIWRAM
|
||||
|
||||
.data : ALIGN(4K)
|
||||
@ -25,7 +25,7 @@ SECTIONS
|
||||
__data_va = ABSOLUTE(.);
|
||||
*(.data*)
|
||||
. = ALIGN(4K);
|
||||
__data_len = . - __data_va;
|
||||
__data_va_end = .;
|
||||
} >AXIWRAM
|
||||
|
||||
.rodata : ALIGN(4K)
|
||||
@ -34,7 +34,7 @@ SECTIONS
|
||||
__rodata_va = ABSOLUTE(.);
|
||||
*(.rodata*)
|
||||
. = ALIGN(4K);
|
||||
__rodata_len = . - __rodata_va;
|
||||
__rodata_va_end = .;
|
||||
} >AXIWRAM
|
||||
|
||||
.shared (NOLOAD) : ALIGN(4K)
|
||||
@ -43,7 +43,7 @@ SECTIONS
|
||||
__shared_va = ABSOLUTE(.);
|
||||
*(.shared*)
|
||||
. = ALIGN(4K);
|
||||
__shared_len = . - __shared_va;
|
||||
__shared_va_end = .;
|
||||
} >AXIWRAM
|
||||
|
||||
.bss (NOLOAD) : ALIGN(4K)
|
||||
@ -52,6 +52,6 @@ SECTIONS
|
||||
__bss_va = ABSOLUTE(.);
|
||||
*(.bss*)
|
||||
. = ALIGN(4K);
|
||||
__bss_len = . - __bss_va;
|
||||
__bss_va_end = .;
|
||||
} >AXIWRAM
|
||||
}
|
||||
|
@ -19,8 +19,12 @@
|
||||
#include <common.h>
|
||||
#include <arm.h>
|
||||
|
||||
#include <stdatomic.h>
|
||||
|
||||
#include "arm/gic.h"
|
||||
|
||||
#include "system/event.h"
|
||||
|
||||
/* Generic Interrupt Controller Registers */
|
||||
#define REG_GIC(cpu, o, t) REG_ARM_PMR(0x200 + ((cpu) * 0x100) + (o), t)
|
||||
|
||||
@ -72,6 +76,7 @@
|
||||
#define IRQN_IS_VALID(n) ((n) < DIC_MAX_IRQ)
|
||||
|
||||
static gicIrqHandler gicIrqHandlers[DIC_MAX_IRQ];
|
||||
static _Atomic(u32) gicIrqPending[DIC_MAX_IRQ / 32];
|
||||
|
||||
static struct {
|
||||
u8 tgt;
|
||||
@ -106,14 +111,13 @@ static u8 gicGetDefaultIrqCfg(u32 irqn) {
|
||||
return gicDefaultIrqCfg[i].mode;
|
||||
}
|
||||
// TODO: would it be considerably faster to use bsearch?
|
||||
|
||||
return GIC_RISINGEDGE_1N;
|
||||
}
|
||||
|
||||
void gicTopHandler(void)
|
||||
{
|
||||
while(1) {
|
||||
u32 irqn;
|
||||
u32 irqn, irqsource, index, mask;
|
||||
|
||||
/**
|
||||
If more than one of these CPUs reads the Interrupt Acknowledge Register at the
|
||||
@ -121,16 +125,22 @@ void gicTopHandler(void)
|
||||
routine must ensure that only one of them tries to process the interrupt, with the
|
||||
others returning after writing the ID to the End of Interrupt Register.
|
||||
*/
|
||||
irqn = REG_GIC_IRQACK(GIC_THIS_CPU_ALIAS);
|
||||
irqsource = REG_GIC_IRQACK(GIC_THIS_CPU_ALIAS);
|
||||
|
||||
if (irqn == GIC_IRQ_SPURIOUS) // no further processing is needed
|
||||
if (irqsource == GIC_IRQ_SPURIOUS) // no further processing is needed
|
||||
break;
|
||||
|
||||
(gicIrqHandlers[irqn & ~IRQN_SRC_MASK])(irqn);
|
||||
irqn = irqsource & ~IRQN_SRC_MASK;
|
||||
|
||||
index = irqn / 32;
|
||||
mask = BIT(irqn % 32);
|
||||
atomic_fetch_or(&gicIrqPending[index], mask);
|
||||
|
||||
(gicIrqHandlers[irqn])(irqsource);
|
||||
// if the id is < 16, the source CPU can be obtained from irqn
|
||||
// if the handler isn't set, it'll try to branch to 0 and trigger a prefetch abort
|
||||
|
||||
REG_GIC_IRQEND(GIC_THIS_CPU_ALIAS) = irqn;
|
||||
REG_GIC_IRQEND(GIC_THIS_CPU_ALIAS) = irqsource;
|
||||
}
|
||||
}
|
||||
|
||||
@ -152,6 +162,7 @@ void gicGlobalReset(void)
|
||||
gicn = MAX_CPU;
|
||||
|
||||
// clear the interrupt handler and config table
|
||||
getEventIRQ()->reset();
|
||||
memset(gicIrqHandlers, 0, sizeof(gicIrqHandlers));
|
||||
memset(gicIrqConfig, 0, sizeof(gicIrqConfig));
|
||||
|
||||
@ -263,3 +274,27 @@ void gicTriggerSoftInterrupt(u32 softirq)
|
||||
{
|
||||
REG_DIC_SOFTINT = softirq;
|
||||
}
|
||||
|
||||
static void irqEvReset(void) {
|
||||
memset(&gicIrqPending, 0, sizeof(gicIrqPending));
|
||||
}
|
||||
|
||||
static u32 irqEvTest(u32 param, u32 clear) {
|
||||
u32 index, tstmask, clrmask;
|
||||
|
||||
if (param >= DIC_MAX_IRQ)
|
||||
bkpt;
|
||||
index = param / 32;
|
||||
tstmask = BIT(param % 32);
|
||||
clrmask = clear ? tstmask : 0;
|
||||
return !!(atomic_fetch_and(&gicIrqPending[index], ~clrmask) & tstmask);
|
||||
}
|
||||
|
||||
static const EventInterface evIRQ = {
|
||||
.reset = irqEvReset,
|
||||
.test = irqEvTest
|
||||
};
|
||||
|
||||
const EventInterface *getEventIRQ(void) {
|
||||
return &evIRQ;
|
||||
}
|
||||
|
@ -31,7 +31,7 @@ enum {
|
||||
GIC_RISINGEDGE_1N = 3
|
||||
|
||||
// With the 1-N model, an interrupt that is taken on any CPU clears the Pending
|
||||
// status on all CPUs.
|
||||
// status on all CPUs.
|
||||
// With the N-N model, all CPUs receive the interrupt independently. The Pending
|
||||
// status is cleared only for the CPU that takes it, not for the other CPUs
|
||||
};
|
||||
|
@ -76,10 +76,12 @@ __boot:
|
||||
b 1b
|
||||
|
||||
corezero_start:
|
||||
@ assume __bss_len is 128 byte aligned
|
||||
@ assumes the .bss section size is 128 byte aligned (or zero)
|
||||
ldr r0, =__bss_pa
|
||||
ldr r1, =__bss_len
|
||||
add r1, r0, r1
|
||||
ldr r1, =__bss_va_end @ calculate the length of .bss using the VA start and end
|
||||
ldr r2, =__bss_va
|
||||
sub r1, r1, r2
|
||||
add r1, r0, r1 @ fixup to be PA start and end
|
||||
mov r2, #0
|
||||
mov r3, #0
|
||||
mov r4, #0
|
||||
|
@ -27,6 +27,8 @@
|
||||
#include "hw/mcu.h"
|
||||
#include "hw/gpulcd.h"
|
||||
|
||||
#include "system/event.h"
|
||||
|
||||
static struct
|
||||
{
|
||||
u16 lcdIds; // Bits 0-7 top screen, 8-15 bottom screen.
|
||||
@ -112,13 +114,13 @@ unsigned GFX_init(GfxFbFmt mode)
|
||||
TIMER_WaitMS(10);
|
||||
resetLcdsMaybe();
|
||||
MCU_controlLCDPower(2u); // Power on LCDs.
|
||||
if(MCU_waitEvents(0x3Fu<<24) != 2u<<24) __builtin_trap();
|
||||
if(eventWait(getEventMCU(), 0x3Fu<<24, 0x3Fu<<24) != 2u<<24) __builtin_trap();
|
||||
|
||||
waitLcdsReady();
|
||||
REG_LCD_ABL0_LIGHT_PWM = 0x1023E;
|
||||
REG_LCD_ABL1_LIGHT_PWM = 0x1023E;
|
||||
MCU_controlLCDPower(0x28u); // Power on backlights.
|
||||
if(MCU_waitEvents(0x3Fu<<24) != 0x28u<<24) __builtin_trap();
|
||||
if(eventWait(getEventMCU(), 0x3Fu<<24, 0x3Fu<<24) != 0x28u<<24) __builtin_trap();
|
||||
g_gfxState.lcdPower = 0x15; // All on.
|
||||
|
||||
// Make sure the fills finished.
|
||||
@ -212,8 +214,9 @@ void GFX_powerOnBacklights(GfxBlight mask)
|
||||
|
||||
mask <<= 1;
|
||||
MCU_controlLCDPower(mask); // Power on backlights.
|
||||
if(MCU_waitEvents(0x3Fu<<24) != (u32)mask<<24)
|
||||
__builtin_trap();
|
||||
eventWait(getEventMCU(), 0x3F<<24, 0x3F<<24);
|
||||
/*if(mcuEventWait(0x3Fu<<24) != (u32)mask<<24)
|
||||
__builtin_trap();*/
|
||||
}
|
||||
|
||||
void GFX_powerOffBacklights(GfxBlight mask)
|
||||
@ -221,8 +224,9 @@ void GFX_powerOffBacklights(GfxBlight mask)
|
||||
g_gfxState.lcdPower &= ~mask;
|
||||
|
||||
MCU_controlLCDPower(mask); // Power off backlights.
|
||||
if(MCU_waitEvents(0x3Fu<<24) != (u32)mask<<24)
|
||||
__builtin_trap();
|
||||
eventWait(getEventMCU(), 0x3F<<24, 0x3F<<24);
|
||||
/*if(mcuEventWait(0x3Fu<<24) != (u32)mask<<24)
|
||||
__builtin_trap();*/
|
||||
}
|
||||
|
||||
u8 GFX_getBrightness(void)
|
||||
|
@ -52,7 +52,7 @@ u64 HID_GetState(void)
|
||||
|
||||
CODEC_Get(&codec);
|
||||
|
||||
ret = REG_HID | MCU_GetSpecialHID();
|
||||
ret = REG_HID | mcuGetSpecialHID();
|
||||
if (!(ret & BUTTON_ARROW))
|
||||
ret |= HID_ConvertCPAD(codec.cpad_x, codec.cpad_y);
|
||||
|
||||
|
@ -20,40 +20,39 @@
|
||||
#include <types.h>
|
||||
#include <arm.h>
|
||||
|
||||
#include <stdatomic.h>
|
||||
|
||||
#include "common.h"
|
||||
|
||||
#include "arm/timer.h"
|
||||
|
||||
#include "hw/gpio.h"
|
||||
#include "hw/gpulcd.h"
|
||||
#include "hw/mcu.h"
|
||||
|
||||
enum {
|
||||
MCU_PWR_BTN = 0,
|
||||
MCU_PWR_HOLD = 1,
|
||||
MCU_HOME_BTN = 2,
|
||||
MCU_HOME_LIFT = 3,
|
||||
MCU_WIFI_SWITCH = 4,
|
||||
MCU_SHELL_CLOSE = 5,
|
||||
MCU_SHELL_OPEN = 6,
|
||||
MCU_VOL_SLIDER = 22,
|
||||
};
|
||||
#include "system/event.h"
|
||||
|
||||
#define MCUEV_HID_MASK ( \
|
||||
MCUEV_HID_PWR_DOWN | MCUEV_HID_PWR_HOLD | \
|
||||
MCUEV_HID_HOME_DOWN | MCUEV_HID_HOME_UP | MCUEV_HID_WIFI_SWITCH)
|
||||
|
||||
enum {
|
||||
REG_VOL_SLIDER = 0x09,
|
||||
MCUREG_VOLUME_SLIDER = 0x09,
|
||||
|
||||
REG_BATTERY_LEVEL = 0x0B,
|
||||
REG_CONSOLE_STATE = 0x0F,
|
||||
MCUREG_BATTERY_LEVEL = 0x0B,
|
||||
MCUREG_CONSOLE_STATE = 0x0F,
|
||||
|
||||
REG_INT_MASK = 0x10,
|
||||
REG_INT_EN = 0x18,
|
||||
MCUREG_INT_MASK = 0x10,
|
||||
MCUREG_INT_EN = 0x18,
|
||||
|
||||
REG_LCD_STATE = 0x22,
|
||||
MCUREG_LCD_STATE = 0x22,
|
||||
|
||||
REG_LED_WIFI = 0x2A,
|
||||
REG_LED_CAMERA = 0x2B,
|
||||
REG_LED_SLIDER = 0x2C,
|
||||
REG_LED_NOTIF = 0x2D,
|
||||
MCUREG_LED_WIFI = 0x2A,
|
||||
MCUREG_LED_CAMERA = 0x2B,
|
||||
MCUREG_LED_SLIDER = 0x2C,
|
||||
MCUREG_LED_STATUS = 0x2D,
|
||||
|
||||
REG_RTC = 0x30,
|
||||
MCUREG_RTC = 0x30,
|
||||
};
|
||||
|
||||
typedef struct {
|
||||
@ -64,47 +63,70 @@ typedef struct {
|
||||
u32 red[8];
|
||||
u32 green[8];
|
||||
u32 blue[8];
|
||||
} PACKED_STRUCT MCU_NotificationLED;
|
||||
} PACKED_STRUCT mcuStatusLED;
|
||||
|
||||
static u8 cached_volume_slider = 0;
|
||||
static u32 spec_hid = 0, shell_state = 0;
|
||||
static u8 volumeSliderValue;
|
||||
static u32 shellState;
|
||||
static _Atomic(u32) pendingEvents;
|
||||
|
||||
static void MCU_UpdateVolumeSlider(void)
|
||||
static void mcuEventUpdate(void)
|
||||
{
|
||||
cached_volume_slider = MCU_ReadReg(REG_VOL_SLIDER);
|
||||
u32 mask;
|
||||
|
||||
// lazily update the mask on each test attempt
|
||||
if (!getEventIRQ()->test(MCU_INTERRUPT, true))
|
||||
return;
|
||||
|
||||
// reading the pending mask automagically acknowledges
|
||||
// the interrupts so all of them must be processed in one go
|
||||
mcuReadRegBuf(MCUREG_INT_MASK, (u8*)&mask, sizeof(mask));
|
||||
|
||||
if (mask & MCUEV_HID_VOLUME_SLIDER)
|
||||
volumeSliderValue = mcuReadReg(MCUREG_VOLUME_SLIDER);
|
||||
|
||||
if (mask & MCUEV_HID_SHELL_OPEN) {
|
||||
mcuResetLEDs();
|
||||
shellState = SHELL_OPEN;
|
||||
}
|
||||
|
||||
if (mask & MCUEV_HID_SHELL_CLOSE) {
|
||||
shellState = SHELL_CLOSED;
|
||||
}
|
||||
|
||||
atomic_fetch_or(&pendingEvents, mask);
|
||||
}
|
||||
|
||||
static void MCU_UpdateShellState(bool open)
|
||||
u8 mcuGetVolumeSlider(void)
|
||||
{
|
||||
shell_state = open ? SHELL_OPEN : SHELL_CLOSED;
|
||||
mcuEventUpdate();
|
||||
return volumeSliderValue;
|
||||
}
|
||||
|
||||
u8 MCU_GetVolumeSlider(void)
|
||||
u32 mcuGetSpecialHID(void)
|
||||
{
|
||||
return cached_volume_slider;
|
||||
u32 ret = 0, pend = getEventMCU()->test(MCUEV_HID_MASK, MCUEV_HID_MASK);
|
||||
|
||||
// hopefully gets unrolled
|
||||
if (pend & (MCUEV_HID_PWR_DOWN | MCUEV_HID_PWR_HOLD))
|
||||
ret |= BUTTON_POWER;
|
||||
if (pend & MCUEV_HID_HOME_DOWN)
|
||||
ret |= BUTTON_HOME;
|
||||
if (pend & MCUEV_HID_HOME_UP)
|
||||
ret &= ~BUTTON_HOME;
|
||||
return ret | shellState;
|
||||
}
|
||||
|
||||
u32 MCU_GetSpecialHID(void)
|
||||
void mcuSetStatusLED(u32 period_ms, u32 color)
|
||||
{
|
||||
u32 ret = spec_hid | shell_state;
|
||||
spec_hid = 0;
|
||||
return ret;
|
||||
}
|
||||
u32 r, g, b, delay;
|
||||
mcuStatusLED ledState;
|
||||
|
||||
void MCU_SetNotificationLED(u32 period_ms, u32 color)
|
||||
{
|
||||
u32 r, g, b;
|
||||
MCU_NotificationLED led_state;
|
||||
delay = clamp((period_ms * 0x200) / 1000, 1, 0xFF);
|
||||
|
||||
// handle proper non-zero periods
|
||||
// so small the hardware can't handle it
|
||||
if (period_ms != 0 && period_ms < 63)
|
||||
period_ms = 63;
|
||||
|
||||
led_state.delay = (period_ms * 0x10) / 1000;
|
||||
led_state.smoothing = 0x40;
|
||||
led_state.loop_delay = 0x10;
|
||||
led_state.unk = 0;
|
||||
ledState.delay = delay;
|
||||
ledState.smoothing = delay;
|
||||
ledState.loop_delay = 0x10;
|
||||
ledState.unk = 0;
|
||||
|
||||
// all colors look like 0x00ZZ00ZZ
|
||||
// in order to alternate between
|
||||
@ -112,93 +134,65 @@ void MCU_SetNotificationLED(u32 period_ms, u32 color)
|
||||
r = (color >> 16) & 0xFF;
|
||||
r |= r << 16;
|
||||
for (int i = 0; i < 8; i++)
|
||||
led_state.red[i] = r;
|
||||
ledState.red[i] = r;
|
||||
|
||||
g = (color >> 8) & 0xFF;
|
||||
g |= g << 16;
|
||||
for (int i = 0; i < 8; i++)
|
||||
led_state.green[i] = g;
|
||||
ledState.green[i] = g;
|
||||
|
||||
b = color & 0xFF;
|
||||
b |= b << 16;
|
||||
for (int i = 0; i < 8; i++)
|
||||
led_state.blue[i] = b;
|
||||
ledState.blue[i] = b;
|
||||
|
||||
MCU_WriteRegBuf(REG_LED_NOTIF, (const u8*)&led_state, sizeof(led_state));
|
||||
mcuWriteRegBuf(MCUREG_LED_STATUS, (const u8*)&ledState, sizeof(ledState));
|
||||
}
|
||||
|
||||
void MCU_ResetLED(void)
|
||||
void mcuResetLEDs(void)
|
||||
{
|
||||
MCU_WriteReg(REG_LED_WIFI, 0);
|
||||
MCU_WriteReg(REG_LED_CAMERA, 0);
|
||||
MCU_WriteReg(REG_LED_SLIDER, 0);
|
||||
MCU_SetNotificationLED(0, 0);
|
||||
mcuWriteReg(MCUREG_LED_WIFI, 0);
|
||||
mcuWriteReg(MCUREG_LED_CAMERA, 0);
|
||||
mcuWriteReg(MCUREG_LED_SLIDER, 0);
|
||||
mcuSetStatusLED(0, 0);
|
||||
}
|
||||
|
||||
void MCU_HandleInterrupts(u32 __attribute__((unused)) irqn)
|
||||
void mcuReset(void)
|
||||
{
|
||||
u32 ints;
|
||||
u32 intmask = 0;
|
||||
|
||||
// Reading the pending mask automagically acknowledges
|
||||
// the interrupts so all of them must be processed in one go
|
||||
MCU_ReadRegBuf(REG_INT_MASK, (u8*)&ints, sizeof(ints));
|
||||
atomic_init(&pendingEvents, 0);
|
||||
|
||||
while(ints != 0) {
|
||||
u32 mcu_int_id = 31 - __builtin_clz(ints);
|
||||
// set register mask and clear any pending registers
|
||||
mcuWriteRegBuf(MCUREG_INT_EN, (const u8*)&intmask, sizeof(intmask));
|
||||
mcuReadRegBuf(MCUREG_INT_MASK, (u8*)&intmask, sizeof(intmask));
|
||||
|
||||
switch(mcu_int_id) {
|
||||
case MCU_PWR_BTN:
|
||||
case MCU_PWR_HOLD:
|
||||
spec_hid |= BUTTON_POWER;
|
||||
break;
|
||||
mcuResetLEDs();
|
||||
|
||||
case MCU_HOME_BTN:
|
||||
spec_hid |= BUTTON_HOME;
|
||||
break;
|
||||
|
||||
case MCU_HOME_LIFT:
|
||||
spec_hid &= ~BUTTON_HOME;
|
||||
break;
|
||||
|
||||
case MCU_WIFI_SWITCH:
|
||||
spec_hid |= BUTTON_WIFI;
|
||||
break;
|
||||
|
||||
case MCU_SHELL_OPEN:
|
||||
MCU_UpdateShellState(true);
|
||||
MCU_ResetLED();
|
||||
break;
|
||||
|
||||
case MCU_SHELL_CLOSE:
|
||||
MCU_UpdateShellState(false);
|
||||
break;
|
||||
|
||||
case MCU_VOL_SLIDER:
|
||||
MCU_UpdateVolumeSlider();
|
||||
break;
|
||||
|
||||
default:
|
||||
break;
|
||||
}
|
||||
|
||||
ints &= ~BIT(mcu_int_id);
|
||||
}
|
||||
}
|
||||
|
||||
void MCU_Init(void)
|
||||
{
|
||||
u32 clrpend, mask = 0;
|
||||
|
||||
shell_state = SHELL_OPEN;
|
||||
|
||||
/* set register mask and clear any pending registers */
|
||||
MCU_WriteRegBuf(REG_INT_EN, (const u8*)&mask, sizeof(mask));
|
||||
MCU_ReadRegBuf(REG_INT_MASK, (u8*)&clrpend, sizeof(clrpend));
|
||||
|
||||
MCU_ResetLED();
|
||||
|
||||
MCU_UpdateVolumeSlider();
|
||||
MCU_UpdateShellState(MCU_ReadReg(REG_CONSOLE_STATE) & BIT(1));
|
||||
volumeSliderValue = mcuReadReg(MCUREG_VOLUME_SLIDER);
|
||||
shellState = SHELL_OPEN;
|
||||
// assume the shell is always open on boot
|
||||
// knowing the average 3DS user, there will be plenty
|
||||
// of laughs when this comes back to bite us in the rear
|
||||
|
||||
GPIO_setBit(19, 9);
|
||||
}
|
||||
|
||||
static void evReset(void) {
|
||||
atomic_store(&pendingEvents, 0);
|
||||
}
|
||||
|
||||
static u32 evTest(u32 mask, u32 clear) {
|
||||
mcuEventUpdate();
|
||||
return atomic_fetch_and(&pendingEvents, ~clear) & mask;
|
||||
}
|
||||
|
||||
static const EventInterface evMCU = {
|
||||
.reset = evReset,
|
||||
.test = evTest
|
||||
};
|
||||
|
||||
const EventInterface *getEventMCU(void) {
|
||||
return &evMCU;
|
||||
}
|
||||
|
||||
|
@ -26,51 +26,48 @@
|
||||
#define MCU_INTERRUPT (0x71)
|
||||
#define I2C_MCU_DEVICE (3)
|
||||
|
||||
u8 MCU_GetVolumeSlider(void);
|
||||
u32 MCU_GetSpecialHID(void);
|
||||
enum {
|
||||
MCUEV_HID_PWR_DOWN = BIT(0),
|
||||
MCUEV_HID_PWR_HOLD = BIT(1),
|
||||
MCUEV_HID_HOME_DOWN = BIT(2),
|
||||
MCUEV_HID_HOME_UP = BIT(3),
|
||||
MCUEV_HID_WIFI_SWITCH = BIT(4),
|
||||
MCUEV_HID_SHELL_CLOSE = BIT(5),
|
||||
MCUEV_HID_SHELL_OPEN = BIT(6),
|
||||
MCUEV_HID_VOLUME_SLIDER = BIT(22),
|
||||
};
|
||||
|
||||
void MCU_SetNotificationLED(u32 period_ms, u32 color);
|
||||
void MCU_ResetLED(void);
|
||||
u8 mcuGetVolumeSlider(void);
|
||||
u32 mcuGetSpecialHID(void);
|
||||
|
||||
void MCU_HandleInterrupts(u32 irqn);
|
||||
void mcuSetStatusLED(u32 period_ms, u32 color);
|
||||
void mcuResetLEDs(void);
|
||||
|
||||
void MCU_Init(void);
|
||||
void mcuReset(void);
|
||||
|
||||
static inline u8 MCU_ReadReg(u8 addr)
|
||||
static inline u8 mcuReadReg(u8 addr)
|
||||
{
|
||||
u8 val;
|
||||
I2C_readRegBuf(I2C_MCU_DEVICE, addr, &val, 1);
|
||||
return val;
|
||||
}
|
||||
|
||||
static inline bool MCU_ReadRegBuf(u8 addr, u8 *buf, u32 size)
|
||||
static inline bool mcuReadRegBuf(u8 addr, u8 *buf, u32 size)
|
||||
{
|
||||
return I2C_readRegBuf(I2C_MCU_DEVICE, addr, buf, size);
|
||||
}
|
||||
|
||||
static inline bool MCU_WriteReg(u8 addr, u8 val)
|
||||
static inline bool mcuWriteReg(u8 addr, u8 val)
|
||||
{
|
||||
return I2C_writeRegBuf(I2C_MCU_DEVICE, addr, &val, 1);
|
||||
}
|
||||
|
||||
static inline bool MCU_WriteRegBuf(u8 addr, const u8 *buf, u32 size)
|
||||
static inline bool mcuWriteRegBuf(u8 addr, const u8 *buf, u32 size)
|
||||
{
|
||||
return I2C_writeRegBuf(I2C_MCU_DEVICE, addr, buf, size);
|
||||
}
|
||||
|
||||
static inline u32 MCU_waitEvents(u32 mask) {
|
||||
u32 v;
|
||||
while(1) {
|
||||
TIMER_WaitMS(10);
|
||||
MCU_ReadRegBuf(0x10, (u8*)&v, 4);
|
||||
v &= mask;
|
||||
if (v)
|
||||
break;
|
||||
}
|
||||
return v;
|
||||
}
|
||||
|
||||
static inline void MCU_controlLCDPower(u8 bits)
|
||||
{
|
||||
MCU_WriteReg(0x22u, bits);
|
||||
mcuWriteReg(0x22u, bits);
|
||||
}
|
||||
|
@ -31,24 +31,29 @@
|
||||
#include "hw/nvram.h"
|
||||
|
||||
#include "system/sys.h"
|
||||
#include "system/event.h"
|
||||
|
||||
#ifndef FIXED_BRIGHTNESS
|
||||
static const u8 brightness_lvls[] = {
|
||||
0x10, 0x17, 0x1E, 0x25,
|
||||
0x2C, 0x34, 0x3C, 0x44,
|
||||
0x4D, 0x56, 0x60, 0x6B,
|
||||
0x79, 0x8C, 0xA7, 0xD2
|
||||
};
|
||||
|
||||
#ifndef FIXED_BRIGHTNESS
|
||||
static int prev_bright_lvl;
|
||||
static bool auto_brightness;
|
||||
#endif
|
||||
|
||||
static SystemSHMEM __attribute__((section(".shared"))) SharedMemoryState;
|
||||
static SystemSHMEM __attribute__((section(".shared"))) sharedMem;
|
||||
|
||||
void VBlank_Handler(u32 __attribute__((unused)) irqn)
|
||||
static void vblankUpdate(void)
|
||||
{
|
||||
if (!getEventIRQ()->test(VBLANK_INTERRUPT, true))
|
||||
return;
|
||||
|
||||
#ifndef FIXED_BRIGHTNESS
|
||||
int cur_bright_lvl = (MCU_GetVolumeSlider() >> 2) % countof(brightness_lvls);
|
||||
int cur_bright_lvl = (mcuGetVolumeSlider() >> 2) % countof(brightness_lvls);
|
||||
if ((cur_bright_lvl != prev_bright_lvl) && auto_brightness) {
|
||||
prev_bright_lvl = cur_bright_lvl;
|
||||
u8 br = brightness_lvls[cur_bright_lvl];
|
||||
@ -56,152 +61,165 @@ void VBlank_Handler(u32 __attribute__((unused)) irqn)
|
||||
}
|
||||
#endif
|
||||
|
||||
SharedMemoryState.hidState.full = HID_GetState();
|
||||
// handle shell events
|
||||
static const u32 mcuEvShell = MCUEV_HID_SHELL_OPEN | MCUEV_HID_SHELL_CLOSE;
|
||||
u32 shell = getEventMCU()->test(mcuEvShell, mcuEvShell);
|
||||
if (shell & MCUEV_HID_SHELL_CLOSE) {
|
||||
GFX_powerOffBacklights(GFX_BLIGHT_BOTH);
|
||||
} else if (shell & MCUEV_HID_SHELL_OPEN) {
|
||||
GFX_powerOnBacklights(GFX_BLIGHT_BOTH);
|
||||
}
|
||||
|
||||
sharedMem.hidState.full = HID_GetState();
|
||||
}
|
||||
|
||||
static bool legacy_boot = false;
|
||||
|
||||
void PXI_RX_Handler(u32 __attribute__((unused)) irqn)
|
||||
static u32 pxiRxUpdate(u32 *args)
|
||||
{
|
||||
u32 ret, msg, cmd, argc, args[PXI_MAX_ARGS];
|
||||
u32 msg, lo, hi;
|
||||
|
||||
if (!getEventIRQ()->test(PXI_RX_INTERRUPT, true))
|
||||
return PXICMD_NONE;
|
||||
|
||||
msg = PXI_Recv();
|
||||
cmd = msg & 0xFFFF;
|
||||
argc = msg >> 16;
|
||||
lo = msg & 0xFFFF;
|
||||
hi = msg >> 16;
|
||||
|
||||
if (argc >= PXI_MAX_ARGS) {
|
||||
PXI_Send(0xFFFFFFFF);
|
||||
return;
|
||||
}
|
||||
|
||||
PXI_RecvArray(args, argc);
|
||||
|
||||
switch (cmd) {
|
||||
case PXI_LEGACY_MODE:
|
||||
{
|
||||
// TODO: If SMP is enabled, an IPI should be sent here (with a DSB)
|
||||
legacy_boot = true;
|
||||
ret = 0;
|
||||
break;
|
||||
}
|
||||
|
||||
case PXI_GET_SHMEM:
|
||||
{
|
||||
ret = (u32)&SharedMemoryState;
|
||||
break;
|
||||
}
|
||||
|
||||
case PXI_SET_VMODE:
|
||||
{
|
||||
GFX_init(args[0] ? GFX_BGR8 : GFX_RGB565);
|
||||
ret = 0;
|
||||
break;
|
||||
}
|
||||
|
||||
case PXI_I2C_READ:
|
||||
{
|
||||
u32 devId, regAddr, size;
|
||||
|
||||
devId = (args[0] & 0xff);
|
||||
regAddr = (args[0] >> 8) & 0xff;
|
||||
size = (args[0] >> 16) % I2C_SHARED_BUFSZ;
|
||||
|
||||
ret = I2C_readRegBuf(devId, regAddr, SharedMemoryState.i2cBuffer, size);
|
||||
break;
|
||||
}
|
||||
|
||||
case PXI_I2C_WRITE:
|
||||
{
|
||||
u32 devId, regAddr, size;
|
||||
|
||||
devId = (args[0] & 0xff);
|
||||
regAddr = (args[0] >> 8) & 0xff;
|
||||
size = (args[0] >> 16) % I2C_SHARED_BUFSZ;
|
||||
|
||||
ret = I2C_writeRegBuf(devId, regAddr, SharedMemoryState.i2cBuffer, size);
|
||||
break;
|
||||
}
|
||||
|
||||
case PXI_NVRAM_ONLINE:
|
||||
{
|
||||
ret = (NVRAM_Status() & NVRAM_SR_WIP) == 0;
|
||||
break;
|
||||
}
|
||||
|
||||
case PXI_NVRAM_READ:
|
||||
{
|
||||
NVRAM_Read(args[0], (u32*)SharedMemoryState.spiBuffer, args[1]);
|
||||
ret = 0;
|
||||
break;
|
||||
}
|
||||
|
||||
case PXI_NOTIFY_LED:
|
||||
{
|
||||
MCU_SetNotificationLED(args[0], args[1]);
|
||||
ret = 0;
|
||||
break;
|
||||
}
|
||||
|
||||
case PXI_BRIGHTNESS:
|
||||
{
|
||||
s32 newbrightness = (s32)args[0];
|
||||
ret = GFX_getBrightness();
|
||||
#ifndef FIXED_BRIGHTNESS
|
||||
if ((newbrightness > 0) && (newbrightness < 0x100)) {
|
||||
GFX_setBrightness(newbrightness, newbrightness);
|
||||
auto_brightness = false;
|
||||
} else {
|
||||
prev_bright_lvl = -1;
|
||||
auto_brightness = true;
|
||||
}
|
||||
#endif
|
||||
break;
|
||||
}
|
||||
|
||||
/* New CMD template:
|
||||
case CMD_ID:
|
||||
{
|
||||
<var declarations/assignments>
|
||||
<execute the command>
|
||||
<set the return value>
|
||||
break;
|
||||
}
|
||||
*/
|
||||
|
||||
default:
|
||||
ret = 0xFFFFFFFF;
|
||||
break;
|
||||
}
|
||||
|
||||
PXI_Send(ret);
|
||||
PXI_RecvArray(args, hi);
|
||||
return lo;
|
||||
}
|
||||
|
||||
void __attribute__((noreturn)) MainLoop(void)
|
||||
{
|
||||
bool runPxiCmdProcessor = true;
|
||||
|
||||
#ifdef FIXED_BRIGHTNESS
|
||||
LCD_SetBrightness(FIXED_BRIGHTNESS);
|
||||
u8 fixed_bright_lvl = brightness_lvls[clamp(FIXED_BRIGHTNESS, 0, countof(brightness_lvls)-1)];
|
||||
GFX_setBrightness(fixed_bright_lvl, fixed_bright_lvl);
|
||||
#else
|
||||
prev_bright_lvl = -1;
|
||||
auto_brightness = true;
|
||||
#endif
|
||||
|
||||
// initialize state stuff
|
||||
getEventIRQ()->reset();
|
||||
getEventMCU()->reset();
|
||||
memset(&sharedMem, 0, sizeof(sharedMem));
|
||||
|
||||
// configure interrupts
|
||||
gicSetInterruptConfig(PXI_RX_INTERRUPT, BIT(0), GIC_PRIO2, PXI_RX_Handler);
|
||||
gicSetInterruptConfig(MCU_INTERRUPT, BIT(0), GIC_PRIO1, MCU_HandleInterrupts);
|
||||
gicSetInterruptConfig(VBLANK_INTERRUPT, BIT(0), GIC_PRIO0, VBlank_Handler);
|
||||
gicSetInterruptConfig(PXI_RX_INTERRUPT, BIT(0), GIC_PRIO0, NULL);
|
||||
gicSetInterruptConfig(VBLANK_INTERRUPT, BIT(0), GIC_PRIO0, NULL);
|
||||
gicSetInterruptConfig(MCU_INTERRUPT, BIT(0), GIC_PRIO0, NULL);
|
||||
|
||||
// enable interrupts
|
||||
gicEnableInterrupt(PXI_RX_INTERRUPT);
|
||||
gicEnableInterrupt(MCU_INTERRUPT);
|
||||
|
||||
// perform gpu init after initializing mcu but before
|
||||
// enabling the pxi system and the vblank handler
|
||||
GFX_init(GFX_RGB565);
|
||||
|
||||
gicEnableInterrupt(PXI_RX_INTERRUPT);
|
||||
gicEnableInterrupt(VBLANK_INTERRUPT);
|
||||
|
||||
// ARM9 won't try anything funny until this point
|
||||
PXI_Barrier(PXI_BOOT_BARRIER);
|
||||
|
||||
// Process IRQs until the ARM9 tells us it's time to boot something else
|
||||
// Process commands until the ARM9 tells
|
||||
// us it's time to boot something else
|
||||
// also handles VBlank events as needed
|
||||
do {
|
||||
ARM_WFI();
|
||||
} while(!legacy_boot);
|
||||
u32 pxiCmd, pxiReply, args[PXI_MAX_ARGS];
|
||||
|
||||
vblankUpdate();
|
||||
pxiCmd = pxiRxUpdate(args);
|
||||
|
||||
switch(pxiCmd) {
|
||||
// ignore args and just wait until the next event
|
||||
case PXICMD_NONE:
|
||||
ARM_WFI();
|
||||
break;
|
||||
|
||||
// revert to legacy boot mode
|
||||
case PXICMD_LEGACY_BOOT:
|
||||
runPxiCmdProcessor = false;
|
||||
pxiReply = 0;
|
||||
break;
|
||||
|
||||
// returns the shared memory address
|
||||
case PXICMD_GET_SHMEM_ADDRESS:
|
||||
pxiReply = (u32)&sharedMem;
|
||||
break;
|
||||
|
||||
// takes in a single argument word and performs either an
|
||||
// I2C read or write depending on the value of the top bit
|
||||
case PXICMD_I2C_OP:
|
||||
{
|
||||
u32 devId, regAddr, size;
|
||||
|
||||
devId = (args[0] & 0xff);
|
||||
regAddr = (args[0] >> 8) & 0xFF;
|
||||
size = (args[0] >> 16) % SHMEM_BUFFER_SIZE;
|
||||
|
||||
if (args[0] & BIT(31)) {
|
||||
pxiReply = I2C_writeRegBuf(devId, regAddr, sharedMem.dataBuffer.b, size);
|
||||
} else {
|
||||
pxiReply = I2C_readRegBuf(devId, regAddr, sharedMem.dataBuffer.b, size);
|
||||
}
|
||||
break;
|
||||
}
|
||||
|
||||
// checks whether the NVRAM chip is online (not doing any work)
|
||||
case PXICMD_NVRAM_ONLINE:
|
||||
pxiReply = (NVRAM_Status() & NVRAM_SR_WIP) == 0;
|
||||
break;
|
||||
|
||||
// reads data from the NVRAM chip
|
||||
case PXICMD_NVRAM_READ:
|
||||
NVRAM_Read(args[0], sharedMem.dataBuffer.w, args[1]);
|
||||
pxiReply = 0;
|
||||
break;
|
||||
|
||||
// sets the notification LED with the given color and period
|
||||
case PXICMD_SET_NOTIFY_LED:
|
||||
mcuSetStatusLED(args[0], args[1]);
|
||||
pxiReply = 0;
|
||||
break;
|
||||
|
||||
// sets the LCDs brightness (if FIXED_BRIGHTNESS is disabled)
|
||||
case PXICMD_SET_BRIGHTNESS:
|
||||
{
|
||||
pxiReply = GFX_getBrightness();
|
||||
#ifndef FIXED_BRIGHTNESS
|
||||
s32 newbrightness = (s32)args[0];
|
||||
if ((newbrightness > 0) && (newbrightness < 0x100)) {
|
||||
GFX_setBrightness(newbrightness, newbrightness);
|
||||
auto_brightness = false;
|
||||
} else {
|
||||
prev_bright_lvl = -1;
|
||||
auto_brightness = true;
|
||||
}
|
||||
#endif
|
||||
break;
|
||||
}
|
||||
|
||||
// replies -1 on default
|
||||
default:
|
||||
pxiReply = 0xFFFFFFFF;
|
||||
break;
|
||||
}
|
||||
|
||||
if (pxiCmd != PXICMD_NONE)
|
||||
PXI_Send(pxiReply); // was a command sent from the ARM9, send a response
|
||||
} while(runPxiCmdProcessor);
|
||||
|
||||
// perform deinit in reverse order
|
||||
gicDisableInterrupt(VBLANK_INTERRUPT);
|
||||
gicDisableInterrupt(PXI_RX_INTERRUPT);
|
||||
|
||||
// unconditionally reinitialize the screens
|
||||
// in RGB24 framebuffer mode
|
||||
GFX_init(GFX_BGR8);
|
||||
|
||||
gicDisableInterrupt(MCU_INTERRUPT);
|
||||
|
||||
// Wait for the ARM9 to do its firmlaunch setup
|
||||
PXI_Barrier(PXI_FIRMLAUNCH_BARRIER);
|
||||
|
26
arm11/source/system/event.h
Normal file
26
arm11/source/system/event.h
Normal file
@ -0,0 +1,26 @@
|
||||
#pragma once
|
||||
|
||||
#include <types.h>
|
||||
|
||||
typedef struct {
|
||||
void (*reset)(void);
|
||||
u32 (*test)(u32 param, u32 clear);
|
||||
} EventInterface;
|
||||
|
||||
const EventInterface *getEventIRQ(void);
|
||||
const EventInterface *getEventMCU(void);
|
||||
|
||||
static inline void eventReset(const EventInterface *ei) {
|
||||
ei->reset();
|
||||
}
|
||||
|
||||
static inline u32 eventTest(const EventInterface *ei, u32 param, u32 clear) {
|
||||
return ei->test(param, clear);
|
||||
}
|
||||
|
||||
static inline u32 eventWait(const EventInterface *ei, u32 param, u32 clear) {
|
||||
while(1) {
|
||||
u32 ret = ei->test(param, clear);
|
||||
if (ret) return ret;
|
||||
}
|
||||
}
|
@ -20,7 +20,7 @@
|
||||
|
||||
#include <types.h>
|
||||
|
||||
#define DEF_SECT_(n) extern u32 __##n##_pa, __##n##_va, __##n##_len;
|
||||
#define DEF_SECT_(n) extern u32 __##n##_pa, __##n##_va, __##n##_va_end;
|
||||
DEF_SECT_(text)
|
||||
DEF_SECT_(data)
|
||||
DEF_SECT_(rodata)
|
||||
@ -30,6 +30,6 @@ DEF_SECT_(shared)
|
||||
|
||||
#define SECTION_VA(n) ((u32)&__##n##_va)
|
||||
#define SECTION_PA(n) ((u32)&__##n##_pa)
|
||||
#define SECTION_LEN(n) ((u32)&__##n##_len)
|
||||
#define SECTION_LEN(n) (((u32)(&__##n##_va_end) - (u32)(&__##n##_va)))
|
||||
|
||||
#define SECTION_TRI(n) SECTION_VA(n), SECTION_PA(n), SECTION_LEN(n)
|
||||
|
@ -107,20 +107,17 @@ void SYS_CoreZeroInit(void)
|
||||
mmuMapArea(0x20000000, 0x20000000, 128UL << 20, MMU_FLAGS(MMU_CACHE_WB, MMU_READ_WRITE, 1, 1));
|
||||
}
|
||||
|
||||
if (SYS_IsNewConsole()) {
|
||||
TIMER_WaitMS(150);
|
||||
}
|
||||
// screen init magicks
|
||||
TIMER_WaitMS(64);
|
||||
|
||||
// Initialize peripherals
|
||||
PXI_Reset();
|
||||
|
||||
I2C_init();
|
||||
MCU_Init();
|
||||
mcuReset();
|
||||
|
||||
SPI_Init();
|
||||
CODEC_Init();
|
||||
|
||||
GFX_init(GFX_RGB565);
|
||||
}
|
||||
|
||||
void SYS_CoreInit(void)
|
||||
|
@ -1,17 +1,24 @@
|
||||
PROCESSOR := ARM9
|
||||
|
||||
TARGET := $(shell basename $(CURDIR))
|
||||
TARGET := $(shell basename "$(CURDIR)")
|
||||
|
||||
SOURCE := source
|
||||
BUILD := build
|
||||
|
||||
SUBARCH := -D$(PROCESSOR) -march=armv5te -mtune=arm946e-s -mthumb -mfloat-abi=soft
|
||||
INCDIRS := source source/common source/filesys source/crypto source/fatfs source/nand source/virtual source/game source/gamecart source/lodepng source/qrcodegen source/system source/utils
|
||||
INCDIRS := source source/common source/filesys source/crypto source/fatfs source/nand source/virtual source/game source/gamecart source/lodepng source/lua source/qrcodegen source/system source/utils
|
||||
INCLUDE := $(foreach dir,$(INCDIRS),-I"$(shell pwd)/$(dir)")
|
||||
|
||||
ASFLAGS += $(SUBARCH) $(INCLUDE)
|
||||
CFLAGS += $(SUBARCH) $(INCLUDE) -fno-builtin-memcpy -flto
|
||||
LDFLAGS += $(SUBARCH) -Wl,-Map,$(TARGET).map -flto
|
||||
LDFLAGS += $(SUBARCH) -Wl,--use-blx,-Map,$(TARGET).map -flto
|
||||
LIBS += -lm
|
||||
|
||||
include ../Makefile.common
|
||||
include ../Makefile.build
|
||||
|
||||
arm9_data.elf: arm9.elf
|
||||
$(OBJCOPY) -O elf32-littlearm -j .rodata* -j .data* -j .bss* $< $@
|
||||
|
||||
arm9_code.elf: arm9.elf
|
||||
$(OBJCOPY) -O elf32-littlearm -j .text* -j .vectors* $< $@
|
||||
|
20
arm9/link.ld
20
arm9/link.ld
@ -4,8 +4,10 @@ ENTRY(_start)
|
||||
|
||||
MEMORY
|
||||
{
|
||||
AHBWRAM (RWX) : ORIGIN = 0x08006000, LENGTH = 512K
|
||||
VECTORS (RX) : ORIGIN = 0x08000000, LENGTH = 64
|
||||
CODEMEM (RX) : ORIGIN = 0x08000040, LENGTH = 512K - 64
|
||||
BOOTROM (R) : ORIGIN = 0x08080000, LENGTH = 128K /* BootROM mirrors, don't touch! */
|
||||
DATAMEM (RW) : ORIGIN = 0x080A0000, LENGTH = 384K
|
||||
}
|
||||
|
||||
SECTIONS
|
||||
@ -16,7 +18,7 @@ SECTIONS
|
||||
KEEP(*(.vectors));
|
||||
. = ALIGN(4);
|
||||
__vectors_len = ABSOLUTE(.) - __vectors_vma;
|
||||
} >VECTORS AT>AHBWRAM
|
||||
} >VECTORS AT>CODEMEM
|
||||
|
||||
.text : ALIGN(4) {
|
||||
__text_s = ABSOLUTE(.);
|
||||
@ -24,24 +26,28 @@ SECTIONS
|
||||
*(.text*);
|
||||
. = ALIGN(4);
|
||||
__text_e = ABSOLUTE(.);
|
||||
} >AHBWRAM
|
||||
} >CODEMEM
|
||||
|
||||
.rodata : ALIGN(4) {
|
||||
*(.rodata*);
|
||||
. = ALIGN(4);
|
||||
} >AHBWRAM
|
||||
__exidx_start = .;
|
||||
*(.ARM.exidx* .gnu.linkonce.armexidx.*)
|
||||
__exidx_end = .;
|
||||
. = ALIGN(4);
|
||||
} >DATAMEM
|
||||
|
||||
.data : ALIGN(4) {
|
||||
*(.data*);
|
||||
. = ALIGN(4);
|
||||
} >AHBWRAM
|
||||
} >DATAMEM
|
||||
|
||||
.bss : ALIGN(4) {
|
||||
.bss (NOLOAD) : ALIGN(4) {
|
||||
__bss_start = .;
|
||||
*(.bss*);
|
||||
. = ALIGN(4);
|
||||
__bss_end = .;
|
||||
} >AHBWRAM
|
||||
} >DATAMEM
|
||||
|
||||
__end__ = ABSOLUTE(.);
|
||||
}
|
||||
|
@ -19,7 +19,7 @@ static void SetNotificationLED(u32 period_ms, u32 rgb565_color)
|
||||
(rgb565_color >> 5) << (8+2) |
|
||||
(rgb565_color << 3));
|
||||
u32 args[] = {period_ms, rgb888_color};
|
||||
PXI_DoCMD(PXI_NOTIFY_LED, args, 2);
|
||||
PXI_DoCMD(PXICMD_SET_NOTIFY_LED, args, 2);
|
||||
}
|
||||
|
||||
// there's some weird thing going on when reading this
|
||||
|
@ -12,7 +12,7 @@ u32 SetScreenBrightness(int level) {
|
||||
arg = 0;
|
||||
}
|
||||
|
||||
return PXI_DoCMD(PXI_BRIGHTNESS, &arg, 1);
|
||||
return PXI_DoCMD(PXICMD_SET_BRIGHTNESS, &arg, 1);
|
||||
}
|
||||
|
||||
u32 GetBatteryPercent() {
|
||||
|
@ -7,23 +7,23 @@ bool is_valid_dstime(DsTime* dstime) {
|
||||
(DSTIMEGET(dstime, bcd_m) >= 60) ||
|
||||
(DSTIMEGET(dstime, bcd_s) >= 60))
|
||||
return false;
|
||||
|
||||
|
||||
// check the date...
|
||||
u32 year = 2000 + DSTIMEGET(dstime, bcd_Y);
|
||||
u32 month = DSTIMEGET(dstime, bcd_M);
|
||||
u32 day = DSTIMEGET(dstime, bcd_D);
|
||||
|
||||
|
||||
// date: year & month
|
||||
if ((year >= 2100) || (month == 0) || (month > 12))
|
||||
return false;
|
||||
|
||||
|
||||
// date: day
|
||||
// see: https://github.com/devkitPro/libnds/blob/9678bf09389cb1fcdc99dfa0357ec0cbe51dd0b7/source/arm7/clock.c#L224-L262
|
||||
u32 months_lastday[1+12] = { 0, 31, 28, 31, 30, 31, 30, 31, 31, 30, 31, 30, 31 };
|
||||
u32 leap = (((year % 4 == 0) && (year % 100 != 0)) || (year % 400 == 0)) ? 1 : 0;
|
||||
u32 days_in_month = months_lastday[month] + ((month == 2) ? leap : 0);
|
||||
if (day > days_in_month) return false;
|
||||
|
||||
|
||||
return true;
|
||||
}
|
||||
|
||||
|
@ -27,7 +27,7 @@ void CreateScreenshot(void) {
|
||||
|
||||
fvx_rmkdir(OUTPUT_PATH);
|
||||
get_dstime(&dstime);
|
||||
snprintf(filename, 64, OUTPUT_PATH "/snap_%02X%02X%02X%02X%02X%02X.png",
|
||||
snprintf(filename, sizeof(filename), OUTPUT_PATH "/snap_%02X%02X%02X%02X%02X%02X.png",
|
||||
dstime.bcd_Y, dstime.bcd_M, dstime.bcd_D,
|
||||
dstime.bcd_h, dstime.bcd_m, dstime.bcd_s);
|
||||
filename[63] = '\0';
|
||||
|
@ -1,8 +1,10 @@
|
||||
#include <stdarg.h>
|
||||
|
||||
#include "language.h"
|
||||
#include "swkbd.h"
|
||||
#include "timer.h"
|
||||
#include "hid.h"
|
||||
#include "utf.h"
|
||||
|
||||
|
||||
static inline char to_uppercase(char c) {
|
||||
@ -58,10 +60,7 @@ static bool BuildKeyboard(TouchBox* swkbd, const char* keys, const u8* layout) {
|
||||
}
|
||||
|
||||
// next row
|
||||
if (layout[l++] != 0) {
|
||||
ShowPrompt(false, "Oh shit %lu %lu", k, l);
|
||||
return false; // error!!!! THIS HAS TO GO!
|
||||
}
|
||||
if (layout[l++] != 0) return false;
|
||||
p_y += SWKBD_STDKEY_HEIGHT + SWKDB_KEY_SPACING;
|
||||
}
|
||||
|
||||
@ -73,7 +72,7 @@ static bool BuildKeyboard(TouchBox* swkbd, const char* keys, const u8* layout) {
|
||||
|
||||
static void DrawKey(const TouchBox* key, const bool pressed, const u32 uppercase) {
|
||||
const char* keystrs[] = { SWKBD_KEYSTR };
|
||||
const u32 color = (pressed) ? COLOR_SWKBD_PRESSED :
|
||||
const u32 color = (pressed) ? COLOR_SWKBD_PRESSED :
|
||||
(key->id == KEY_ENTER) ? COLOR_SWKBD_ENTER :
|
||||
((key->id == KEY_CAPS) && (uppercase > 1)) ? COLOR_SWKBD_CAPS :
|
||||
COLOR_SWKBD_NORMAL;
|
||||
@ -82,7 +81,7 @@ static void DrawKey(const TouchBox* key, const bool pressed, const u32 uppercase
|
||||
if (key->id == KEY_TXTBOX) return;
|
||||
|
||||
char keystr[16];
|
||||
if (key->id >= 0x80) snprintf(keystr, 16, "%s", keystrs[key->id - 0x80]);
|
||||
if (key->id >= 0x80) snprintf(keystr, sizeof(keystr), "%s", keystrs[key->id - 0x80]);
|
||||
else {
|
||||
keystr[0] = (uppercase) ? to_uppercase(key->id) : key->id;
|
||||
keystr[1] = 0;
|
||||
@ -93,7 +92,7 @@ static void DrawKey(const TouchBox* key, const bool pressed, const u32 uppercase
|
||||
const u32 f_offs_y = (key->h - FONT_HEIGHT_EXT) / 2;
|
||||
|
||||
DrawRectangle(BOT_SCREEN, key->x, key->y, key->w, key->h, color);
|
||||
DrawString(BOT_SCREEN, keystr, key->x + f_offs_x, key->y + f_offs_y, COLOR_SWKBD_CHARS, color, false);
|
||||
DrawString(BOT_SCREEN, keystr, key->x + f_offs_x, key->y + f_offs_y, COLOR_SWKBD_CHARS, color);
|
||||
}
|
||||
|
||||
static void DrawKeyBoardBox(TouchBox* swkbd, u32 color) {
|
||||
@ -122,34 +121,50 @@ static void DrawKeyBoard(TouchBox* swkbd, const u32 uppercase) {
|
||||
}
|
||||
|
||||
static void DrawTextBox(const TouchBox* txtbox, const char* inputstr, const u32 cursor, u32* scroll) {
|
||||
const u32 input_shown = (txtbox->w / FONT_WIDTH_EXT) - 2;
|
||||
const u32 input_shown_length = (txtbox->w / FONT_WIDTH_EXT) - 2;
|
||||
const u32 inputstr_size = strlen(inputstr); // we rely on a zero terminated string
|
||||
const u16 x = txtbox->x;
|
||||
const u16 y = txtbox->y;
|
||||
|
||||
const u16 y = txtbox->y;
|
||||
|
||||
// fix scroll
|
||||
if (cursor < *scroll) *scroll = cursor;
|
||||
else if (cursor - *scroll > input_shown) *scroll = cursor - input_shown;
|
||||
|
||||
if (cursor < *scroll) {
|
||||
*scroll = cursor;
|
||||
} else {
|
||||
int scroll_adjust = -input_shown_length;
|
||||
for (u32 i = *scroll; i < cursor; i++) {
|
||||
if (i >= inputstr_size || (inputstr[i] & 0xC0) != 0x80) scroll_adjust++;
|
||||
}
|
||||
|
||||
for (int i = 0; i < scroll_adjust; i++)
|
||||
*scroll += *scroll >= inputstr_size ? 1 : GetCharSize(inputstr + *scroll);
|
||||
}
|
||||
|
||||
u32 input_shown_size = 0;
|
||||
for (u32 i = 0; i < input_shown_length || (*scroll + input_shown_size < inputstr_size && (inputstr[*scroll + input_shown_size] & 0xC0) == 0x80); input_shown_size++) {
|
||||
if (*scroll + input_shown_size >= inputstr_size || (inputstr[*scroll + input_shown_size] & 0xC0) != 0x80) i++;
|
||||
}
|
||||
|
||||
// draw input string
|
||||
DrawStringF(BOT_SCREEN, x, y, COLOR_STD_FONT, COLOR_STD_BG, "%c%-*.*s%-*.*s%c",
|
||||
DrawStringF(BOT_SCREEN, x, y, COLOR_STD_FONT, COLOR_STD_BG, "%c%-*.*s%c",
|
||||
(*scroll) ? '<' : '|',
|
||||
(inputstr_size > input_shown) ? input_shown : inputstr_size,
|
||||
(inputstr_size > input_shown) ? input_shown : inputstr_size,
|
||||
inputstr + *scroll,
|
||||
(inputstr_size > input_shown) ? 0 : input_shown - inputstr_size,
|
||||
(inputstr_size > input_shown) ? 0 : input_shown - inputstr_size,
|
||||
"",
|
||||
(inputstr_size - (s32) *scroll > input_shown) ? '>' : '|'
|
||||
(int) input_shown_size,
|
||||
(int) input_shown_size,
|
||||
(*scroll > inputstr_size) ? "" : inputstr + *scroll,
|
||||
(inputstr_size - (s32) *scroll > input_shown_size) ? '>' : '|'
|
||||
);
|
||||
|
||||
|
||||
// draw cursor
|
||||
u16 cpos = 0;
|
||||
for (u16 i = *scroll; i < cursor; i++) {
|
||||
if (i >= inputstr_size || (inputstr[i] & 0xC0) != 0x80) cpos++;
|
||||
}
|
||||
|
||||
DrawStringF(BOT_SCREEN, x-(FONT_WIDTH_EXT/2), y+10, COLOR_STD_FONT, COLOR_STD_BG, "%-*.*s^%-*.*s",
|
||||
1 + cursor - *scroll,
|
||||
1 + cursor - *scroll,
|
||||
(int) (1 + cpos),
|
||||
(int) (1 + cpos),
|
||||
"",
|
||||
input_shown - (cursor - *scroll),
|
||||
input_shown - (cursor - *scroll),
|
||||
(int) (input_shown_length - cpos),
|
||||
(int) (input_shown_length - cpos),
|
||||
""
|
||||
);
|
||||
}
|
||||
@ -166,8 +181,17 @@ static void MoveTextBoxCursor(const TouchBox* txtbox, const char* inputstr, cons
|
||||
const TouchBox* tb = TouchBoxGet(&id, x, y, txtbox, 0);
|
||||
if (id == KEY_TXTBOX) {
|
||||
u16 x_tb = x - tb->x;
|
||||
u16 cpos = (x_tb < (FONT_WIDTH_EXT/2)) ? 0 : (x_tb - (FONT_WIDTH_EXT/2)) / FONT_WIDTH_EXT;
|
||||
u32 cursor_next = *scroll + ((cpos <= input_shown) ? cpos : input_shown);
|
||||
|
||||
const u32 inputstr_size = strlen(inputstr);
|
||||
const u16 cpos_x = (x_tb < (FONT_WIDTH_EXT/2)) ? 0 : (x_tb - (FONT_WIDTH_EXT/2)) / FONT_WIDTH_EXT;
|
||||
u16 cpos_length = 0;
|
||||
u16 cpos_size = 0;
|
||||
while ((cpos_length < cpos_x && cpos_length < input_shown) || (*scroll + cpos_size < inputstr_size && (inputstr[*scroll + cpos_size] & 0xC0) == 0x80)) {
|
||||
if (*scroll + cpos_size >= inputstr_size || (inputstr[*scroll + cpos_size] & 0xC0) != 0x80) cpos_length++;
|
||||
cpos_size++;
|
||||
}
|
||||
|
||||
u32 cursor_next = *scroll + cpos_size;
|
||||
// move cursor to position pointed to
|
||||
if (*cursor != cursor_next) {
|
||||
if (cursor_next < max_size) *cursor = cursor_next;
|
||||
@ -176,10 +200,10 @@ static void MoveTextBoxCursor(const TouchBox* txtbox, const char* inputstr, cons
|
||||
}
|
||||
// move beyound visible field
|
||||
if (timer_msec(timer) >= scroll_cooldown) {
|
||||
if ((cpos == 0) && (*scroll > 0))
|
||||
(*scroll)--;
|
||||
else if ((cpos >= input_shown) && (*cursor < (max_size-1)))
|
||||
(*scroll)++;
|
||||
if ((cpos_length == 0) && (*scroll > 0))
|
||||
*scroll -= GetPrevCharSize(inputstr + *scroll);
|
||||
else if ((cpos_length >= input_shown) && (*cursor < (max_size-1)))
|
||||
*scroll += GetCharSize(inputstr + *scroll);
|
||||
}
|
||||
}
|
||||
}
|
||||
@ -199,6 +223,7 @@ static char KeyboardWait(TouchBox* swkbd, bool uppercase) {
|
||||
else if (pressed & BUTTON_R1) return KEY_CAPS;
|
||||
else if (pressed & BUTTON_RIGHT) return KEY_RIGHT;
|
||||
else if (pressed & BUTTON_LEFT) return KEY_LEFT;
|
||||
else if (pressed & BUTTON_SELECT) return KEY_SWITCH;
|
||||
else if (pressed & BUTTON_TOUCH) break;
|
||||
}
|
||||
|
||||
@ -228,6 +253,13 @@ bool ShowKeyboard(char* inputstr, const u32 max_size, const char *format, ...) {
|
||||
TouchBox swkbd_numpad[32];
|
||||
TouchBox* textbox = swkbd_alphabet; // always use this textbox
|
||||
|
||||
static bool show_instr = true;
|
||||
const char* instr = STR_KEYBOARD_CONTROLS_DETAILS;
|
||||
if (show_instr) {
|
||||
ShowPrompt(false, "%s", instr);
|
||||
show_instr = false;
|
||||
}
|
||||
|
||||
// generate keyboards
|
||||
if (!BuildKeyboard(swkbd_alphabet, keys_alphabet, layout_alphabet)) return false;
|
||||
if (!BuildKeyboard(swkbd_special, keys_special, layout_special)) return false;
|
||||
@ -237,7 +269,7 @@ bool ShowKeyboard(char* inputstr, const u32 max_size, const char *format, ...) {
|
||||
char str[512]; // arbitrary limit, should be more than enough
|
||||
va_list va;
|
||||
va_start(va, format);
|
||||
vsnprintf(str, 512, format, va);
|
||||
vsnprintf(str, sizeof(str), format, va);
|
||||
va_end(va);
|
||||
u32 str_width = GetDrawStringWidth(str);
|
||||
if (str_width < (24 * FONT_WIDTH_EXT)) str_width = 24 * FONT_WIDTH_EXT;
|
||||
@ -281,22 +313,51 @@ bool ShowKeyboard(char* inputstr, const u32 max_size, const char *format, ...) {
|
||||
break;
|
||||
} else if (key == KEY_BKSPC) {
|
||||
if (cursor) {
|
||||
int size = GetPrevCharSize(inputstr + cursor);
|
||||
if (cursor <= inputstr_size) {
|
||||
memmove(inputstr + cursor - 1, inputstr + cursor, inputstr_size - cursor + 1);
|
||||
inputstr_size--;
|
||||
memmove(inputstr + cursor - size, inputstr + cursor, inputstr_size - cursor + size);
|
||||
inputstr_size -= size;
|
||||
}
|
||||
cursor--;
|
||||
cursor -= size;
|
||||
}
|
||||
} else if (key == KEY_LEFT) {
|
||||
if (cursor) cursor--;
|
||||
if (cursor) cursor -= GetPrevCharSize(inputstr + cursor);
|
||||
} else if (key == KEY_RIGHT) {
|
||||
if (cursor < (max_size-1)) cursor++;
|
||||
int size = cursor > inputstr_size ? 1 : GetCharSize(inputstr + cursor);
|
||||
if (cursor + size < max_size) cursor += size;
|
||||
} else if (key == KEY_ALPHA) {
|
||||
swkbd = swkbd_alphabet;
|
||||
} else if (key == KEY_SPECIAL) {
|
||||
swkbd = swkbd_special;
|
||||
} else if (key == KEY_NUMPAD) {
|
||||
swkbd = swkbd_numpad;
|
||||
} else if (key == KEY_SWITCH) {
|
||||
ClearScreen(BOT_SCREEN, COLOR_STD_BG);
|
||||
return ShowStringPrompt(inputstr, max_size, "%s", str);
|
||||
} else if (key == KEY_UNICODE) {
|
||||
if (cursor > 3 && cursor <= inputstr_size) {
|
||||
u16 codepoint = 0;
|
||||
for (char *c = inputstr + cursor - 4; c < inputstr + cursor; c++) {
|
||||
if ((*c >= '0' && *c <= '9') || (*c >= 'A' && *c <= 'F') || (*c >= 'a' && *c <= 'f')) {
|
||||
codepoint <<= 4;
|
||||
codepoint |= *c - (*c <= '9' ? '0' : ((*c <= 'F' ? 'A' : 'a') - 10));
|
||||
} else {
|
||||
codepoint = 0;
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
if(codepoint != 0) {
|
||||
char character[5] = {0};
|
||||
u16 input[2] = {codepoint, 0};
|
||||
utf16_to_utf8((u8*)character, input, 4, 1);
|
||||
|
||||
u32 char_size = GetCharSize(character);
|
||||
memmove(inputstr + cursor - 4 + char_size, inputstr + cursor, max_size - cursor + 4 - char_size);
|
||||
memcpy(inputstr + cursor - 4, character, char_size);
|
||||
cursor -= 4 - char_size;
|
||||
}
|
||||
}
|
||||
} else if (key && (key < 0x80)) {
|
||||
if ((cursor < (max_size-1)) && (inputstr_size < max_size)) {
|
||||
// pad string (if cursor beyound string size)
|
||||
|
@ -18,16 +18,17 @@ enum {
|
||||
KEY_LEFT = 0x88,
|
||||
KEY_RIGHT = 0x89,
|
||||
KEY_ESCAPE = 0x8A,
|
||||
KEY_SWITCH = 0x8B,
|
||||
KEY_UNICODE = 0x8C,
|
||||
KEY_TXTBOX = 0xFF
|
||||
};
|
||||
|
||||
// special key strings
|
||||
#define SWKBD_KEYSTR "", "DEL", "INS", "SUBMIT", "CAPS", "#$@", "123", "ABC", "\x1b", "\x1a", "ESC"
|
||||
#define SWKBD_KEYSTR "", "DEL", "INS", "SUBMIT", "CAPS", "#$@", "123", "ABC", "←", "→", "ESC", "SWITCH", "U+"
|
||||
|
||||
#define COLOR_SWKBD_NORMAL COLOR_GREY
|
||||
#define COLOR_SWKBD_PRESSED COLOR_LIGHTGREY
|
||||
#define COLOR_SWKBD_BOX COLOR_DARKGREY
|
||||
#define COLOR_SWKBD_TEXTBOX COLOR_DARKGREY
|
||||
#define COLOR_SWKBD_CHARS COLOR_BLACK
|
||||
#define COLOR_SWKBD_ENTER COLOR_TINTEDBLUE
|
||||
#define COLOR_SWKBD_CAPS COLOR_TINTEDYELLOW
|
||||
@ -56,7 +57,7 @@ enum {
|
||||
'4', '5', '6', 'D', 'C', \
|
||||
'3', '2', '1', 'B', 'A', \
|
||||
'0', '.', '_', KEY_LEFT, KEY_RIGHT, \
|
||||
KEY_ALPHA, ' ', KEY_BKSPC
|
||||
KEY_ALPHA, KEY_UNICODE, ' ', KEY_BKSPC
|
||||
|
||||
// offset, num of keys in row, width of special keys (...), 0
|
||||
#define SWKBD_LAYOUT_ALPHABET \
|
||||
@ -80,9 +81,9 @@ enum {
|
||||
5, 0, \
|
||||
5, 0, \
|
||||
5, 18, 18, 0, \
|
||||
3, 30, 34, 30, 0, \
|
||||
4, 20, 20, 31, 20, 0, \
|
||||
0
|
||||
|
||||
|
||||
#define ShowKeyboardOrPrompt (TouchIsCalibrated() ? ShowKeyboard : ShowStringPrompt)
|
||||
bool ShowKeyboard(char* inputstr, u32 max_size, const char *format, ...);
|
||||
bool PRINTF_ARGS(3) ShowKeyboard(char* inputstr, u32 max_size, const char *format, ...);
|
||||
|
@ -7,7 +7,7 @@ u64 timer_start( void ) {
|
||||
if (!(*TIMER_CNT0 & *TIMER_CNT1 & *TIMER_CNT2 & *TIMER_CNT3 & TIMER_ACTIVE) ||
|
||||
!(*TIMER_CNT1 & *TIMER_CNT2 & *TIMER_CNT3 & TIMER_COUNT_UP))
|
||||
timer_init = true;
|
||||
|
||||
|
||||
if (timer_init) {
|
||||
// deactivate, then reset timers
|
||||
*TIMER_CNT0 = 0;
|
||||
@ -17,7 +17,7 @@ u64 timer_start( void ) {
|
||||
// start timers
|
||||
*TIMER_CNT0 = TIMER_ACTIVE;
|
||||
*TIMER_CNT1 = *TIMER_CNT2 = *TIMER_CNT3 = TIMER_ACTIVE | TIMER_COUNT_UP;
|
||||
|
||||
|
||||
// timer initialized
|
||||
timer_init = false;
|
||||
}
|
||||
|
@ -2,6 +2,7 @@
|
||||
#include "ui.h"
|
||||
#include "hid.h"
|
||||
#include "crc16.h"
|
||||
#include "language.h"
|
||||
#include "spiflash.h"
|
||||
#include "support.h"
|
||||
|
||||
@ -46,8 +47,8 @@ bool ShowTouchCalibrationDialog(void)
|
||||
|
||||
// clear screen, draw instructions
|
||||
ClearScreen(BOT_SCREEN, COLOR_STD_BG);
|
||||
DrawStringCenter(BOT_SCREEN, COLOR_STD_FONT, COLOR_STD_BG,
|
||||
"Touch the red crosshairs to\ncalibrate your touchscreen.\n \nUse the stylus for best\nresults!");
|
||||
DrawStringCenter(BOT_SCREEN, COLOR_STD_FONT, COLOR_STD_BG, "%s",
|
||||
STR_TOUCH_CROSSHAIRS_TO_CALIBRATE_TOUCHSCREEN_USE_STYLUS);
|
||||
|
||||
// set calibration defaults
|
||||
SetCalibrationDefaults();
|
||||
@ -89,7 +90,7 @@ bool CalibrateTouchFromSupportFile(void) {
|
||||
size_t size = LoadSupportFile(TOUCH_CALIB_FILENAME, calibrations, sizeof(calibrations));
|
||||
u32 n_dots = size / sizeof(HID_CalibrationData);
|
||||
|
||||
is_calibrated = (n_dots == 0) ? false :
|
||||
is_calibrated = (n_dots == 0) ? false :
|
||||
HID_SetCalibrationData(calibrations, n_dots, SCREEN_WIDTH_BOT, SCREEN_HEIGHT);
|
||||
return is_calibrated;
|
||||
}
|
||||
@ -99,11 +100,11 @@ bool CalibrateTouchFromFlash(void) {
|
||||
|
||||
// set calibration defaults
|
||||
SetCalibrationDefaults();
|
||||
|
||||
|
||||
// check SPIflash status
|
||||
if (!spiflash_get_status())
|
||||
return false;
|
||||
|
||||
|
||||
// check NVRAM console ID
|
||||
u32 console_id = 0;
|
||||
if (!spiflash_read(0x001C, 4, (u8*)&console_id))
|
||||
|
File diff suppressed because it is too large
Load Diff
@ -21,6 +21,11 @@
|
||||
#define FONT_WIDTH_EXT GetFontWidth()
|
||||
#define FONT_HEIGHT_EXT GetFontHeight()
|
||||
|
||||
#define UTF_MAX_BYTES_PER_RUNE 4
|
||||
#define UTF_BUFFER_BYTESIZE(rune_count) (((rune_count) + 1) * UTF_MAX_BYTES_PER_RUNE)
|
||||
|
||||
#define PRINTF_ARGS(n) __attribute__ ((format (printf, (n), (n) + 1)))
|
||||
|
||||
#define TOP_SCREEN ((u16*)VRAM_TOP_LA)
|
||||
#define BOT_SCREEN ((u16*)VRAM_BOT_A)
|
||||
|
||||
@ -40,13 +45,14 @@
|
||||
|
||||
|
||||
#ifndef AUTO_UNLOCK
|
||||
bool ShowUnlockSequence(u32 seqlvl, const char *format, ...);
|
||||
bool PRINTF_ARGS(2) ShowUnlockSequence(u32 seqlvl, const char *format, ...);
|
||||
#else
|
||||
#define ShowUnlockSequence ShowPrompt
|
||||
#endif
|
||||
|
||||
u8* GetFontFromPbm(const void* pbm, const u32 pbm_size, u32* w, u32* h);
|
||||
bool SetFontFromPbm(const void* pbm, const u32 pbm_size);
|
||||
const u8* GetFontFromPbm(const void* pbm, const u32 riff_size, u32* w, u32* h);
|
||||
const u8* GetFontFromRiff(const void* riff, const u32 riff_size, u32* w, u32* h, u16* count);
|
||||
bool SetFont(const void* font, const u32 font_size);
|
||||
|
||||
u16 GetColor(const u16 *screen, int x, int y);
|
||||
|
||||
@ -57,35 +63,39 @@ void DrawRectangle(u16 *screen, int x, int y, u32 width, u32 height, u32 color);
|
||||
void DrawBitmap(u16 *screen, int x, int y, u32 w, u32 h, const u16* bitmap);
|
||||
void DrawQrCode(u16 *screen, const u8* qrcode);
|
||||
|
||||
void DrawCharacter(u16 *screen, int character, int x, int y, u32 color, u32 bgcolor);
|
||||
void DrawString(u16 *screen, const char *str, int x, int y, u32 color, u32 bgcolor, bool fix_utf8);
|
||||
void DrawStringF(u16 *screen, int x, int y, u32 color, u32 bgcolor, const char *format, ...);
|
||||
void DrawStringCenter(u16 *screen, u32 color, u32 bgcolor, const char *format, ...);
|
||||
void DrawCharacter(u16 *screen, u32 character, int x, int y, u32 color, u32 bgcolor);
|
||||
void DrawString(u16 *screen, const char *str, int x, int y, u32 color, u32 bgcolor);
|
||||
void PRINTF_ARGS(6) DrawStringF(u16 *screen, int x, int y, u32 color, u32 bgcolor, const char *format, ...);
|
||||
void PRINTF_ARGS(4) DrawStringCenter(u16 *screen, u32 color, u32 bgcolor, const char *format, ...);
|
||||
|
||||
u32 GetCharSize(const char* str);
|
||||
u32 GetPrevCharSize(const char* str);
|
||||
|
||||
u32 GetDrawStringHeight(const char* str);
|
||||
u32 GetDrawStringWidth(const char* str);
|
||||
u32 GetFontWidth(void);
|
||||
u32 GetFontHeight(void);
|
||||
|
||||
void MultiLineString(char* dest, const char* orig, int llen, int maxl);
|
||||
void WordWrapString(char* str, int llen);
|
||||
void ResizeString(char* dest, const char* orig, int nsize, int tpos, bool align_right);
|
||||
void TruncateString(char* dest, const char* orig, int nsize, int tpos);
|
||||
void ResizeString(char* dest, const char* orig, int nlength, int tpos, bool align_right);
|
||||
void TruncateString(char* dest, const char* orig, int nlength, int tpos);
|
||||
void FormatNumber(char* str, u64 number);
|
||||
void FormatBytes(char* str, u64 bytes);
|
||||
|
||||
void ShowString(const char *format, ...);
|
||||
void ShowStringF(u16* screen, const char *format, ...);
|
||||
void ShowIconString(u16* icon, int w, int h, const char *format, ...);
|
||||
void ShowIconStringF(u16* screen, u16* icon, int w, int h, const char *format, ...);
|
||||
bool ShowPrompt(bool ask, const char *format, ...);
|
||||
u32 ShowSelectPrompt(u32 n, const char** options, const char *format, ...);
|
||||
u32 ShowFileScrollPrompt(u32 n, const DirEntry** entries, bool hide_ext, const char *format, ...);
|
||||
u32 ShowHotkeyPrompt(u32 n, const char** options, const u32* keys, const char *format, ...);
|
||||
bool ShowStringPrompt(char* inputstr, u32 max_size, const char *format, ...);
|
||||
u64 ShowHexPrompt(u64 start_val, u32 n_digits, const char *format, ...);
|
||||
u64 ShowNumberPrompt(u64 start_val, const char *format, ...);
|
||||
bool ShowDataPrompt(u8* data, u32* size, const char *format, ...);
|
||||
bool ShowRtcSetterPrompt(void* time, const char *format, ...);
|
||||
void PRINTF_ARGS(1) ShowString(const char *format, ...);
|
||||
void PRINTF_ARGS(2) ShowStringF(u16* screen, const char *format, ...);
|
||||
void PRINTF_ARGS(4) ShowIconString(u16* icon, int w, int h, const char *format, ...);
|
||||
void PRINTF_ARGS(5) ShowIconStringF(u16* screen, u16* icon, int w, int h, const char *format, ...);
|
||||
bool PRINTF_ARGS(2) ShowPrompt(bool ask, const char *format, ...);
|
||||
u32 PRINTF_ARGS(3) ShowSelectPrompt(int n, const char** options, const char *format, ...);
|
||||
u32 PRINTF_ARGS(4) ShowFileScrollPrompt(int n, const DirEntry** entries, bool hide_ext, const char *format, ...);
|
||||
u32 PRINTF_ARGS(4) ShowHotkeyPrompt(u32 n, const char** options, const u32* keys, const char *format, ...);
|
||||
bool PRINTF_ARGS(3) ShowStringPrompt(char* inputstr, u32 max_size, const char *format, ...);
|
||||
u64 PRINTF_ARGS(3) ShowHexPrompt(u64 start_val, u32 n_digits, const char *format, ...);
|
||||
u64 PRINTF_ARGS(2) ShowNumberPrompt(u64 start_val, const char *format, ...);
|
||||
bool PRINTF_ARGS(3) ShowDataPrompt(u8* data, u32* size, const char *format, ...);
|
||||
bool PRINTF_ARGS(2) ShowRtcSetterPrompt(void* time, const char *format, ...);
|
||||
bool ShowProgress(u64 current, u64 total, const char* opstr);
|
||||
|
||||
int ShowBrightnessConfig(int set_brightness);
|
||||
|
@ -189,7 +189,7 @@ int utf16_to_utf8(u8 *out, const u16 *in, int len_out, int len_in)
|
||||
units = decode_utf16(&code, in);
|
||||
if(units == -1)
|
||||
return -1;
|
||||
|
||||
|
||||
if (len_in >= units)
|
||||
len_in -= units;
|
||||
else return -1;
|
||||
@ -238,7 +238,7 @@ int utf8_to_utf16(u16 *out, const u8 *in, int len_out, int len_in)
|
||||
units = decode_utf8(&code, in);
|
||||
if(units == -1)
|
||||
return -1;
|
||||
|
||||
|
||||
if (len_in >= units)
|
||||
len_in -= units;
|
||||
else return -1;
|
||||
|
@ -213,11 +213,11 @@ void ctr_decrypt_byte(void *inbuf, void *outbuf, size_t size, size_t off, uint32
|
||||
uint8_t *in = inbuf;
|
||||
uint8_t *out = outbuf;
|
||||
uint32_t i;
|
||||
|
||||
|
||||
for (i=0; i<AES_BLOCK_SIZE; i++) // setup local ctr
|
||||
ctr_local[i] = ctr[i];
|
||||
add_ctr(ctr_local, off / AES_BLOCK_SIZE);
|
||||
|
||||
|
||||
if (off_fix) // handle misaligned offset (at beginning)
|
||||
{
|
||||
size_t last_byte = ((off_fix + bytes_left) >= AES_BLOCK_SIZE) ?
|
||||
@ -229,7 +229,7 @@ void ctr_decrypt_byte(void *inbuf, void *outbuf, size_t size, size_t off, uint32
|
||||
*(out++) = temp[i];
|
||||
bytes_left -= last_byte - off_fix;
|
||||
}
|
||||
|
||||
|
||||
if (bytes_left >= AES_BLOCK_SIZE)
|
||||
{
|
||||
size_t blocks = bytes_left / AES_BLOCK_SIZE;
|
||||
@ -238,7 +238,7 @@ void ctr_decrypt_byte(void *inbuf, void *outbuf, size_t size, size_t off, uint32
|
||||
out += AES_BLOCK_SIZE * blocks;
|
||||
bytes_left -= AES_BLOCK_SIZE * blocks;
|
||||
}
|
||||
|
||||
|
||||
if (bytes_left) // handle misaligned offset (at end)
|
||||
{
|
||||
for (i=0; i<bytes_left; i++)
|
||||
@ -300,7 +300,7 @@ void aes_cmac(void* inbuf, void* outbuf, size_t size)
|
||||
AES_CNT_INPUT_ENDIAN | AES_CNT_OUTPUT_ENDIAN;
|
||||
uint32_t* out = (uint32_t*) outbuf;
|
||||
uint32_t* in = (uint32_t*) inbuf;
|
||||
|
||||
|
||||
// create xorpad for last block
|
||||
set_ctr(zeroes);
|
||||
aes_decrypt(xorpad, xorpad, 1, mode);
|
||||
@ -312,7 +312,7 @@ void aes_cmac(void* inbuf, void* outbuf, size_t size)
|
||||
}
|
||||
xorpadb[15] <<= 1;
|
||||
xorpadb[15] ^= finalxor;
|
||||
|
||||
|
||||
// process blocks
|
||||
for (uint32_t i = 0; i < 4; i++)
|
||||
out[i] = 0;
|
||||
|
@ -10,7 +10,7 @@ u16 crc16_quick(const void* src, u32 len) {
|
||||
static const u16 tabval[] = { CRC16_TABVAL };
|
||||
u16* data = (u16*) src;
|
||||
u16 crc = 0xFFFF;
|
||||
|
||||
|
||||
for (len >>= 1; len; len--) {
|
||||
u16 curr = *(data++);
|
||||
for (u32 i = 0; i < 4; i++) {
|
||||
@ -21,6 +21,6 @@ u16 crc16_quick(const void* src, u32 len) {
|
||||
crc ^= tval;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
return crc;
|
||||
}
|
||||
|
@ -73,7 +73,7 @@ u32 crc32_calculate_from_file(const char* fileName, u32 offset, u32 length) {
|
||||
return crc32;
|
||||
}
|
||||
fvx_lseek(&inputFile, offset);
|
||||
|
||||
|
||||
bool ret = true;
|
||||
for (u64 pos = 0; (pos < length) && ret; pos += bufsiz) {
|
||||
UINT read_bytes = min(bufsiz, length - pos);
|
||||
@ -83,7 +83,7 @@ u32 crc32_calculate_from_file(const char* fileName, u32 offset, u32 length) {
|
||||
ret = false;
|
||||
if (ret) crc32 = crc32_calculate(crc32, buffer, read_bytes);
|
||||
}
|
||||
|
||||
|
||||
fvx_close(&inputFile);
|
||||
free(buffer);
|
||||
return ~crc32;
|
||||
|
@ -17,7 +17,7 @@ static u64 keyYState = 0;
|
||||
u32 GetUnitKeysType(void)
|
||||
{
|
||||
static u32 keys_type = KEYS_UNKNOWN;
|
||||
|
||||
|
||||
if (keys_type == KEYS_UNKNOWN) {
|
||||
static const u8 slot0x2CSampleRetail[16] = {
|
||||
0xBC, 0xC4, 0x16, 0x2C, 0x2A, 0x06, 0x91, 0xEE, 0x47, 0x18, 0x86, 0xB8, 0xEB, 0x2F, 0xB5, 0x48 };
|
||||
@ -35,15 +35,18 @@ u32 GetUnitKeysType(void)
|
||||
keys_type = KEYS_DEVKIT;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
return keys_type;
|
||||
}
|
||||
|
||||
void CryptAesKeyInfo(AesKeyInfo* info) {
|
||||
static u8 zeroes[16] = { 0 };
|
||||
static const u8 zeros[16] = { 0 };
|
||||
static const u8 keyY_dev[16] = {
|
||||
0xA2, 0x32, 0x4A, 0x7E, 0x7C, 0xE6, 0x1A, 0x9A, 0x45, 0x4A, 0x52, 0x19, 0xB3, 0x5B, 0xE9, 0x3B };
|
||||
const u8* aeskeyY = GetUnitKeysType() == KEYS_DEVKIT ? &keyY_dev[0] : &zeros[0];
|
||||
u8 ctr[16] = { 0 };
|
||||
memcpy(ctr, (void*) info, 12); // CTR -> slot + type + id + zeroes
|
||||
setup_aeskeyY(0x2C, zeroes);
|
||||
setup_aeskeyY(0x2C, aeskeyY);
|
||||
use_aeskey(0x2C);
|
||||
set_ctr(ctr);
|
||||
aes_decrypt(info->key, info->key, 1, AES_CNT_CTRNAND_MODE);
|
||||
@ -67,15 +70,15 @@ u32 CheckKeySlot(u32 keyslot, char type)
|
||||
{ 0xBC, 0x83, 0x7C, 0xC9, 0x99, 0xC8, 0x80, 0x9E, 0x8A, 0xDE, 0x4A, 0xFA, 0xAA, 0x72, 0x08, 0x28 } }
|
||||
};
|
||||
u64* state = (type == 'X') ? &keyXState : (type == 'Y') ? &keyYState : (type == 'N') ? &keyState : NULL;
|
||||
|
||||
|
||||
// just to be safe...
|
||||
if (keyslot >= 0x40)
|
||||
return 1;
|
||||
|
||||
|
||||
// check if key is already loaded
|
||||
if ((type != 'I') && ((*state >> keyslot) & 1))
|
||||
return 0;
|
||||
|
||||
|
||||
// if is not, we may still be able to verify the currently set one (for NCCH keys)
|
||||
for (u32 p = 0; (type == 'X') && (p < sizeof(keyNcchSamples) / sizeof(AesNcchSampleInfo)); p++) {
|
||||
if (keyNcchSamples[p].slot != keyslot) // only for keyslots in the keyNcchSamples table!
|
||||
@ -93,7 +96,7 @@ u32 CheckKeySlot(u32 keyslot, char type)
|
||||
return 0;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
// not set up if getting here
|
||||
return 1;
|
||||
}
|
||||
@ -102,13 +105,13 @@ u32 CheckKeySlot(u32 keyslot, char type)
|
||||
// to get rid of these, you may replace this function with anything that works for you
|
||||
u32 LoadKeyDb(const char* path_db, AesKeyInfo* keydb, u32 bsize) {
|
||||
UINT fsize = 0;
|
||||
|
||||
|
||||
if (path_db) {
|
||||
if (fvx_qread (path_db, keydb, 0, bsize, &fsize) != FR_OK) fsize = 0;
|
||||
} else if (fvx_qread ("S:/" KEYDB_NAME, keydb, 0, bsize, &fsize) != FR_OK) {
|
||||
fsize = LoadSupportFile(KEYDB_NAME, keydb, bsize); // load key database support file
|
||||
}
|
||||
|
||||
|
||||
u32 nkeys = 0;
|
||||
if (fsize && !(fsize % sizeof(AesKeyInfo)))
|
||||
nkeys = fsize / sizeof(AesKeyInfo);
|
||||
@ -119,24 +122,24 @@ u32 LoadKeyFromFile(void* key, u32 keyslot, char type, char* id)
|
||||
{
|
||||
u8 keystore[16] __attribute__((aligned(32))) = {0};
|
||||
bool found = false;
|
||||
|
||||
|
||||
// checking the obvious
|
||||
if ((keyslot >= 0x40) || ((type != 'X') && (type != 'Y') && (type != 'N') && (type != 'I')))
|
||||
return 1;
|
||||
|
||||
|
||||
// check if already loaded
|
||||
if (!key && !id && (CheckKeySlot(keyslot, type) == 0)) return 0;
|
||||
|
||||
|
||||
// use keystore if key == NULL
|
||||
if (!key) key = keystore;
|
||||
|
||||
|
||||
// try to get key from 'aeskeydb.bin' file
|
||||
AesKeyInfo* keydb = (AesKeyInfo*) malloc(STD_BUFFER_SIZE);
|
||||
u32 nkeys = (keydb) ? LoadKeyDb(NULL, keydb, STD_BUFFER_SIZE) : 0;
|
||||
|
||||
|
||||
for (u32 i = 0; i < nkeys; i++) {
|
||||
AesKeyInfo* info = &(keydb[i]);
|
||||
if (!((info->slot == keyslot) && (info->type == type) &&
|
||||
if (!((info->slot == keyslot) && (info->type == type) &&
|
||||
((!id && !(info->id[0])) || (id && (strncmp(id, info->id, 10) == 0))) &&
|
||||
(!info->keyUnitType || (info->keyUnitType == GetUnitKeysType()))))
|
||||
continue;
|
||||
@ -146,23 +149,23 @@ u32 LoadKeyFromFile(void* key, u32 keyslot, char type, char* id)
|
||||
memcpy(key, info->key, 16);
|
||||
break;
|
||||
}
|
||||
|
||||
|
||||
free(keydb);
|
||||
|
||||
|
||||
// load legacy slot0x??Key?.bin file instead
|
||||
if (!found && (type != 'I')) {
|
||||
char fname[64];
|
||||
snprintf(fname, 64, "slot0x%02lXKey%s%s.bin", keyslot,
|
||||
snprintf(fname, sizeof(fname), "slot0x%02lXKey%s%s.bin", keyslot,
|
||||
(type == 'X') ? "X" : (type == 'Y') ? "Y" : (type == 'I') ? "IV" : "", (id) ? id : "");
|
||||
found = (LoadSupportFile(fname, key, 16) == 16);
|
||||
}
|
||||
|
||||
|
||||
// key still not found (duh)
|
||||
if (!found) return 1; // out of options here
|
||||
|
||||
|
||||
// done if this is an IV
|
||||
if (type == 'I') return 0;
|
||||
|
||||
|
||||
// now, setup the key
|
||||
if (type == 'X') {
|
||||
setup_aeskeyX(keyslot, key);
|
||||
@ -177,7 +180,7 @@ u32 LoadKeyFromFile(void* key, u32 keyslot, char type, char* id)
|
||||
keyYState |= 1ull << keyslot;
|
||||
}
|
||||
use_aeskey(keyslot);
|
||||
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
@ -186,11 +189,11 @@ u32 InitKeyDb(const char* path)
|
||||
// use this to quickly initialize all applicable keys in aeskeydb.bin
|
||||
static const u64 keyslot_whitelist = (1ull<<0x02)|(1ull<<0x03)|(1ull<<0x05)|(1ull<<0x18)|(1ull<<0x19)|(1ull<<0x1A)|(1ull<<0x1B)|
|
||||
(1ull<<0x1C)|(1ull<<0x1D)|(1ull<<0x1E)|(1ull<<0x1F)|(1ull<<0x24)|(1ull<<0x25)|(1ull<<0x2F);
|
||||
|
||||
|
||||
// try to load aeskeydb.bin file
|
||||
AesKeyInfo* keydb = (AesKeyInfo*) malloc(STD_BUFFER_SIZE);
|
||||
u32 nkeys = (keydb) ? LoadKeyDb(path, keydb, STD_BUFFER_SIZE) : 0;
|
||||
|
||||
|
||||
// apply all applicable keys
|
||||
for (u32 i = 0; i < nkeys; i++) {
|
||||
AesKeyInfo* info = &(keydb[i]);
|
||||
@ -202,7 +205,7 @@ u32 InitKeyDb(const char* path)
|
||||
if ((info->type == 'I') || (*(info->id)) || (info->keyUnitType && (info->keyUnitType != GetUnitKeysType())) ||
|
||||
(CheckKeySlot(info->slot, info->type) == 0)) continue; // most likely valid, but not applicable or already set
|
||||
if (info->isEncrypted) CryptAesKeyInfo(info); // decrypt key
|
||||
|
||||
|
||||
// apply key
|
||||
u8 key[16] __attribute__((aligned(32))) = {0};
|
||||
char type = info->type;
|
||||
@ -222,29 +225,7 @@ u32 InitKeyDb(const char* path)
|
||||
}
|
||||
use_aeskey(keyslot);
|
||||
}
|
||||
|
||||
|
||||
free(keydb);
|
||||
return (nkeys) ? 0 : 1;
|
||||
}
|
||||
|
||||
// creates dependency to "sha.h", not required for base keydb functions
|
||||
u32 CheckRecommendedKeyDb(const char* path)
|
||||
{
|
||||
// SHA-256 of the recommended aeskeydb.bin file
|
||||
// equals MD5 A5B28945A7C051D7A0CD18AF0E580D1B
|
||||
static const u8 recommended_sha[0x20] = {
|
||||
0x40, 0x76, 0x54, 0x3D, 0xA3, 0xFF, 0x91, 0x1C, 0xE1, 0xCC, 0x4E, 0xC7, 0x2F, 0x92, 0xE4, 0xB7,
|
||||
0x2B, 0x24, 0x00, 0x15, 0xBE, 0x9B, 0xFC, 0xDE, 0x7F, 0xED, 0x95, 0x1D, 0xD5, 0xAB, 0x2D, 0xCB
|
||||
};
|
||||
|
||||
// try to load aeskeydb.bin file
|
||||
AesKeyInfo* keydb = (AesKeyInfo*) malloc(STD_BUFFER_SIZE);
|
||||
if (!keydb) return 1;
|
||||
u32 nkeys = LoadKeyDb(path, keydb, STD_BUFFER_SIZE);
|
||||
|
||||
// compare with recommended SHA
|
||||
bool res = (nkeys && (sha_cmp(recommended_sha, keydb, nkeys * sizeof(AesKeyInfo), SHA256_MODE) == 0));
|
||||
|
||||
free(keydb);
|
||||
return res ? 0 : 1;
|
||||
}
|
||||
|
@ -14,10 +14,10 @@
|
||||
#define KEYS_UNKNOWN 0
|
||||
#define KEYS_DEVKIT 1
|
||||
#define KEYS_RETAIL 2
|
||||
|
||||
|
||||
|
||||
typedef struct {
|
||||
u8 slot; // keyslot, 0x00...0x3F
|
||||
u8 slot; // keyslot, 0x00...0x3F
|
||||
char type; // type 'X' / 'Y' / 'N' for normalKey / 'I' for IV
|
||||
char id[10]; // key ID for special keys, all zero for standard keys
|
||||
u8 reserved[2]; // reserved space
|
||||
@ -30,4 +30,3 @@ u32 GetUnitKeysType(void);
|
||||
void CryptAesKeyInfo(AesKeyInfo* info);
|
||||
u32 LoadKeyFromFile(void* key, u32 keyslot, char type, char* id);
|
||||
u32 InitKeyDb(const char* path);
|
||||
u32 CheckRecommendedKeyDb(const char* path);
|
||||
|
@ -13,9 +13,9 @@ void sha_init(u32 mode)
|
||||
}
|
||||
|
||||
void sha_update(const void* src, u32 size)
|
||||
{
|
||||
{
|
||||
const u32* src32 = (const u32*)src;
|
||||
|
||||
|
||||
while(size >= 0x40) {
|
||||
while(*REG_SHACNT & 1);
|
||||
*((volatile _sha_block*)REG_SHAINFIFO) = *((const _sha_block*)src32);
|
||||
|
@ -63,7 +63,7 @@ FATpartition DriveInfo[13] = {
|
||||
{ TYPE_RAMDRV, SUBTYPE_NONE, 0, 0, 0xFF } // Z - RAMDRIVE
|
||||
};
|
||||
|
||||
static BYTE imgnand_mode = 0x00;
|
||||
static BYTE imgnand_mode = 0x00;
|
||||
|
||||
|
||||
|
||||
@ -81,7 +81,7 @@ DWORD get_fattime( void ) {
|
||||
((DSTIMEGET(&dstime, bcd_D)&0x1F) << 16) |
|
||||
((DSTIMEGET(&dstime, bcd_M)&0x0F) << 21) |
|
||||
(((DSTIMEGET(&dstime, bcd_Y)+(2000-1980))&0x7F) << 25);
|
||||
|
||||
|
||||
return fattime;
|
||||
}
|
||||
|
||||
@ -113,10 +113,10 @@ DSTATUS disk_initialize (
|
||||
imgnand_mode = (GetMountState() & IMG_NAND) ? 0x01 : 0x00;
|
||||
FATpartition* fat_info = PART_INFO(pdrv);
|
||||
BYTE type = PART_TYPE(pdrv);
|
||||
|
||||
|
||||
fat_info->offset = fat_info->size = 0;
|
||||
fat_info->keyslot = 0xFF;
|
||||
|
||||
|
||||
if (type == TYPE_SDCARD) {
|
||||
if (sdmmc_sdcard_init() != 0) return STA_NOINIT|STA_NODISK;
|
||||
fat_info->size = getMMCDevice(1)->total_size;
|
||||
@ -149,7 +149,7 @@ DSTATUS disk_initialize (
|
||||
InitRamDrive();
|
||||
fat_info->size = (GetRamDriveSize() + 0x1FF) / 0x200;
|
||||
}
|
||||
|
||||
|
||||
return RES_OK;
|
||||
}
|
||||
|
||||
@ -166,9 +166,9 @@ DRESULT disk_read (
|
||||
DWORD sector, /* Sector address in LBA */
|
||||
UINT count /* Number of sectors to read */
|
||||
)
|
||||
{
|
||||
{
|
||||
BYTE type = PART_TYPE(pdrv);
|
||||
|
||||
|
||||
if (type == TYPE_NONE) {
|
||||
return RES_PARERR;
|
||||
} else if (type == TYPE_SDCARD) {
|
||||
@ -205,7 +205,7 @@ DRESULT disk_write (
|
||||
)
|
||||
{
|
||||
BYTE type = PART_TYPE(pdrv);
|
||||
|
||||
|
||||
if (type == TYPE_NONE) {
|
||||
return RES_PARERR;
|
||||
} else if (type == TYPE_SDCARD) {
|
||||
@ -245,7 +245,7 @@ DRESULT disk_ioctl (
|
||||
{
|
||||
BYTE type = PART_TYPE(pdrv);
|
||||
FATpartition* fat_info = PART_INFO(pdrv);
|
||||
|
||||
|
||||
switch (cmd) {
|
||||
case GET_SECTOR_SIZE:
|
||||
*((DWORD*) buff) = 0x200;
|
||||
@ -262,7 +262,7 @@ DRESULT disk_ioctl (
|
||||
// nothing else to do here - sdmmc.c handles the rest
|
||||
return RES_OK;
|
||||
}
|
||||
|
||||
|
||||
return RES_PARERR;
|
||||
}
|
||||
#endif
|
||||
|
@ -5,7 +5,7 @@ u32 ValidateMbrHeader(MbrHeader* mbr) {
|
||||
u32 sector = 1; // check partitions
|
||||
for (u32 i = 0; i < 4; i++) {
|
||||
MbrPartitionInfo* partition = mbr->partitions + i;
|
||||
if (!partition->count && i) continue;
|
||||
if (!partition->count && i) continue;
|
||||
else if (!partition->count) return 1; // first partition can't be empty
|
||||
if ((partition->type != 0x1) && (partition->type != 0x4) && (partition->type != 0x6) &&
|
||||
(partition->type != 0xB) && (partition->type != 0xC) && (partition->type != 0xE))
|
||||
@ -22,7 +22,7 @@ u32 ValidateFatHeader(void* fat) {
|
||||
if (strncmp(fat32->fs_type, "FAT32 ", 8) == 0)
|
||||
return 0; // is FAT32 header
|
||||
Fat16Header* fat16 = (Fat16Header*) fat;
|
||||
if ((strncmp(fat16->fs_type, "FAT16 ", 8) == 0) ||
|
||||
if ((strncmp(fat16->fs_type, "FAT16 ", 8) == 0) ||
|
||||
(strncmp(fat16->fs_type, "FAT12 ", 8) == 0) ||
|
||||
(strncmp(fat16->fs_type, "FAT ", 8) == 0))
|
||||
return 0; // is FAT16 / FAT12 header
|
||||
|
@ -15,7 +15,7 @@ typedef struct {
|
||||
|
||||
typedef struct {
|
||||
char text[446];
|
||||
MbrPartitionInfo partitions[4];
|
||||
MbrPartitionInfo partitions[4];
|
||||
u16 magic; // 0xAA55
|
||||
} PACKED_ALIGN(2) MbrHeader;
|
||||
|
||||
@ -50,7 +50,7 @@ typedef struct {
|
||||
u32 clr_root; // 0x02
|
||||
u16 sct_fsinfo; // 0x01
|
||||
u16 sct_backup; // 0x06
|
||||
u8 reserved3[12];
|
||||
u8 reserved3[12];
|
||||
u8 ndrive; // 0x80
|
||||
u8 head_cur; // 0x00
|
||||
u8 boot_sig; // 0x29
|
||||
|
@ -8,6 +8,7 @@
|
||||
#include "keydb.h"
|
||||
#include "ctrtransfer.h"
|
||||
#include "scripting.h"
|
||||
#include "gm9lua.h"
|
||||
#include "png.h"
|
||||
#include "ui.h" // only for font file detection
|
||||
|
||||
@ -86,11 +87,14 @@ u64 IdentifyFileType(const char* path) {
|
||||
return GAME_ROMFS; // RomFS file (check could be better)
|
||||
} else if (ValidateTmd((TitleMetaData*) data) == 0) {
|
||||
if (fsize == TMD_SIZE_N(getbe16(header + 0x1DE)) + TMD_CDNCERT_SIZE)
|
||||
return GAME_TMD | FLAG_NUSCDN; // TMD file from NUS/CDN
|
||||
return GAME_CDNTMD; // TMD file from NUS/CDN
|
||||
else if (fsize >= TMD_SIZE_N(getbe16(header + 0x1DE)))
|
||||
return GAME_TMD; // TMD file
|
||||
} else if (ValidateTwlTmd((TitleMetaData*) data) == 0) {
|
||||
if (fsize == TMD_SIZE_TWL + TMD_CDNCERT_SIZE)
|
||||
return GAME_TWLTMD; // TMD file from NUS/CDN (TWL)
|
||||
} else if (ValidateTicket((Ticket*) data) == 0) {
|
||||
return GAME_TICKET; // Ticket file (not used for anything right now)
|
||||
return GAME_TICKET; // Ticket file
|
||||
} else if (ValidateFirmHeader((FirmHeader*) data, fsize) == 0) {
|
||||
return SYS_FIRM; // FIRM file
|
||||
} else if ((ValidateAgbSaveHeader((AgbSaveHeader*) data) == 0) && (fsize >= AGBSAVE_MAX_SIZE)) {
|
||||
@ -112,7 +116,7 @@ u64 IdentifyFileType(const char* path) {
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
if (fsize == sizeof(TitleInfoEntry) && (strncasecmp(path, "T:/", 3) == 0)) {
|
||||
const char* mntpath = GetMountPath();
|
||||
if (mntpath && *mntpath) {
|
||||
@ -124,6 +128,10 @@ u64 IdentifyFileType(const char* path) {
|
||||
}
|
||||
} else if (GetFontFromPbm(data, fsize, NULL, NULL)) {
|
||||
return FONT_PBM;
|
||||
} else if (GetFontFromRiff(data, fsize, NULL, NULL, NULL)) {
|
||||
return FONT_RIFF;
|
||||
} else if (GetLanguage(data, fsize, NULL, NULL, NULL)) {
|
||||
return TRANSLATION;
|
||||
} else if ((fsize > sizeof(AgbHeader)) &&
|
||||
(ValidateAgbHeader((AgbHeader*) data) == 0)) {
|
||||
return GAME_GBA;
|
||||
@ -143,14 +151,6 @@ u64 IdentifyFileType(const char* path) {
|
||||
} else if ((strncasecmp(ext, "png", 4) == 0) &&
|
||||
(fsize > sizeof(png_magic)) && (memcmp(data, png_magic, sizeof(png_magic)) == 0)) {
|
||||
return GFX_PNG;
|
||||
} else if ((strncasecmp(ext, "cdn", 4) == 0) || (strncasecmp(ext, "nus", 4) == 0)) {
|
||||
char path_cetk[256];
|
||||
char* ext_cetk = path_cetk + (ext - path);
|
||||
strncpy(path_cetk, path, 256);
|
||||
path_cetk[255] = '\0';
|
||||
strncpy(ext_cetk, "cetk", 5);
|
||||
if (FileGetSize(path_cetk) > 0)
|
||||
return GAME_NUSCDN; // NUS/CDN type 2
|
||||
} else if (strncasecmp(fname, TIKDB_NAME_ENC, sizeof(TIKDB_NAME_ENC)+1) == 0) {
|
||||
return BIN_TIKDB | FLAG_ENC; // titlekey database / encrypted
|
||||
} else if (strncasecmp(fname, TIKDB_NAME_DEC, sizeof(TIKDB_NAME_DEC)+1) == 0) {
|
||||
@ -159,10 +159,16 @@ u64 IdentifyFileType(const char* path) {
|
||||
return BIN_KEYDB; // key database
|
||||
} else if ((sscanf(fname, "slot%02lXKey", &id) == 1) && (strncasecmp(ext, "bin", 4) == 0) && (fsize = 16) && (id < 0x40)) {
|
||||
return BIN_LEGKEY; // legacy key file
|
||||
} else if ((strncmp((char*) data, CIFINISH_MAGIC, strlen(CIFINISH_MAGIC)) == 0) &&
|
||||
(fsize == CIFINISH_SIZE((void*) data)) && (fsize > sizeof(CifinishHeader))) {
|
||||
return BIN_CIFNSH;
|
||||
} else if (ValidateText((char*) data, (fsize > 0x200) ? 0x200 : fsize)) {
|
||||
u64 type = 0;
|
||||
if ((fsize < SCRIPT_MAX_SIZE) && (strncasecmp(ext, SCRIPT_EXT, strnlen(SCRIPT_EXT, 16) + 1) == 0))
|
||||
if ((fsize < SCRIPT_MAX_SIZE) && (strcasecmp(ext, SCRIPT_EXT) == 0))
|
||||
type |= TXT_SCRIPT; // should be a script (which is also generic text)
|
||||
// this should check if it's compiled lua bytecode (done with luac), which is NOT text
|
||||
else if ((fsize < LUASCRIPT_MAX_SIZE) && (strcasecmp(ext, LUASCRIPT_EXT) == 0))
|
||||
type |= TXT_LUA;
|
||||
if (fsize < STD_BUFFER_SIZE) type |= TXT_GENERIC;
|
||||
return type;
|
||||
} else if ((strncmp(path + 2, "/Nintendo DSiWare/", 18) == 0) &&
|
||||
@ -176,13 +182,13 @@ u64 IdentifyFileType(const char* path) {
|
||||
char* name_cdn = path_cdn + (fname - path);
|
||||
strncpy(path_cdn, path, 256);
|
||||
path_cdn[255] = '\0';
|
||||
strncpy(name_cdn, "tmd", 4);
|
||||
strncpy(name_cdn, "tmd", 4); // this will not catch tmd with version
|
||||
if (FileGetSize(path_cdn) > 0)
|
||||
return GAME_NUSCDN; // NUS/CDN type 1
|
||||
return GAME_NUSCDN; // NUS/CDN, recognized by TMD
|
||||
strncpy(name_cdn, "cetk", 5);
|
||||
if (FileGetSize(path_cdn) > 0)
|
||||
return GAME_NUSCDN; // NUS/CDN type 1
|
||||
return GAME_NUSCDN; // NUS/CDN, recognized by CETK
|
||||
}
|
||||
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
@ -8,58 +8,65 @@
|
||||
#define GAME_NCSD (1ULL<<3)
|
||||
#define GAME_NCCH (1ULL<<4)
|
||||
#define GAME_TMD (1ULL<<5)
|
||||
#define GAME_CMD (1ULL<<6)
|
||||
#define GAME_EXEFS (1ULL<<7)
|
||||
#define GAME_ROMFS (1ULL<<8)
|
||||
#define GAME_BOSS (1ULL<<9)
|
||||
#define GAME_NUSCDN (1ULL<<10)
|
||||
#define GAME_TICKET (1ULL<<11)
|
||||
#define GAME_TIE (1ULL<<12)
|
||||
#define GAME_SMDH (1ULL<<13)
|
||||
#define GAME_3DSX (1ULL<<14)
|
||||
#define GAME_NDS (1ULL<<15)
|
||||
#define GAME_GBA (1ULL<<16)
|
||||
#define GAME_TAD (1ULL<<17)
|
||||
#define SYS_FIRM (1ULL<<18)
|
||||
#define SYS_DIFF (1ULL<<19)
|
||||
#define SYS_DISA (1ULL<<20)
|
||||
#define SYS_AGBSAVE (1ULL<<21)
|
||||
#define SYS_TICKDB (1ULL<<22)
|
||||
#define BIN_NCCHNFO (1ULL<<23)
|
||||
#define BIN_TIKDB (1ULL<<24)
|
||||
#define BIN_KEYDB (1ULL<<25)
|
||||
#define BIN_LEGKEY (1ULL<<26)
|
||||
#define TXT_SCRIPT (1ULL<<27)
|
||||
#define TXT_GENERIC (1ULL<<28)
|
||||
#define GFX_PNG (1ULL<<29)
|
||||
#define FONT_PBM (1ULL<<30)
|
||||
#define NOIMG_NAND (1ULL<<31)
|
||||
#define HDR_NAND (1ULL<<32)
|
||||
#define GAME_CDNTMD (1ULL<<6)
|
||||
#define GAME_TWLTMD (1ULL<<7)
|
||||
#define GAME_CMD (1ULL<<8)
|
||||
#define GAME_EXEFS (1ULL<<9)
|
||||
#define GAME_ROMFS (1ULL<<10)
|
||||
#define GAME_BOSS (1ULL<<11)
|
||||
#define GAME_NUSCDN (1ULL<<12)
|
||||
#define GAME_TICKET (1ULL<<13)
|
||||
#define GAME_TIE (1ULL<<14)
|
||||
#define GAME_SMDH (1ULL<<15)
|
||||
#define GAME_3DSX (1ULL<<16)
|
||||
#define GAME_NDS (1ULL<<17)
|
||||
#define GAME_GBA (1ULL<<18)
|
||||
#define GAME_TAD (1ULL<<19)
|
||||
#define SYS_FIRM (1ULL<<20)
|
||||
#define SYS_DIFF (1ULL<<21)
|
||||
#define SYS_DISA (1ULL<<22)
|
||||
#define SYS_AGBSAVE (1ULL<<23)
|
||||
#define SYS_TICKDB (1ULL<<24)
|
||||
#define BIN_CIFNSH (1ULL<<25)
|
||||
#define BIN_NCCHNFO (1ULL<<26)
|
||||
#define BIN_TIKDB (1ULL<<27)
|
||||
#define BIN_KEYDB (1ULL<<28)
|
||||
#define BIN_LEGKEY (1ULL<<29)
|
||||
#define TXT_SCRIPT (1ULL<<30)
|
||||
#define TXT_GENERIC (1ULL<<31)
|
||||
#define GFX_PNG (1ULL<<32)
|
||||
#define FONT_PBM (1ULL<<33)
|
||||
#define FONT_RIFF (1ULL<<34)
|
||||
#define NOIMG_NAND (1ULL<<35)
|
||||
#define HDR_NAND (1ULL<<36)
|
||||
#define TRANSLATION (1ULL<<37)
|
||||
#define TXT_LUA (1ULL<<38)
|
||||
#define TYPE_BASE 0xFFFFFFFFFFULL // 40 bit reserved for base types
|
||||
|
||||
// #define FLAG_FIRM (1ULL<<57) // <--- for CXIs containing FIRMs
|
||||
// #define FLAG_GBAVC (1ULL<<58) // <--- for GBAVC CXIs
|
||||
#define FLAG_DSIW (1ULL<<59)
|
||||
#define FLAG_ENC (1ULL<<60)
|
||||
#define FLAG_CTR (1ULL<<61)
|
||||
#define FLAG_NUSCDN (1ULL<<62)
|
||||
// #define FLAG_FIRM (1ULL<<58) // <--- for CXIs containing FIRMs
|
||||
// #define FLAG_GBAVC (1ULL<<59) // <--- for GBAVC CXIs
|
||||
#define FLAG_DSIW (1ULL<<60)
|
||||
#define FLAG_ENC (1ULL<<61)
|
||||
#define FLAG_CTR (1ULL<<62)
|
||||
#define FLAG_CXI (1ULL<<63)
|
||||
|
||||
#define FTYPE_MOUNTABLE(tp) (tp&(IMG_FAT|IMG_NAND|GAME_CIA|GAME_NCSD|GAME_NCCH|GAME_EXEFS|GAME_ROMFS|GAME_NDS|GAME_TAD|SYS_FIRM|SYS_DIFF|SYS_DISA|SYS_TICKDB|BIN_KEYDB))
|
||||
#define FTYPE_VERIFICABLE(tp) (tp&(IMG_NAND|GAME_CIA|GAME_NCSD|GAME_NCCH|GAME_TMD|GAME_TIE|GAME_BOSS|SYS_FIRM))
|
||||
#define FTYPE_VERIFICABLE(tp) (tp&(IMG_NAND|GAME_CIA|GAME_NCSD|GAME_NCCH|GAME_TMD|GAME_CDNTMD|GAME_TWLTMD|GAME_TIE|GAME_TAD|GAME_TICKET|GAME_BOSS|SYS_FIRM))
|
||||
#define FTYPE_DECRYPTABLE(tp) (tp&(GAME_CIA|GAME_NCSD|GAME_NCCH|GAME_BOSS|GAME_NUSCDN|SYS_FIRM|BIN_KEYDB))
|
||||
#define FTYPE_ENCRYPTABLE(tp) (tp&(GAME_CIA|GAME_NCSD|GAME_NCCH|GAME_BOSS|BIN_KEYDB))
|
||||
#define FTYPE_CIABUILD(tp) ((tp&(GAME_NCSD|GAME_NCCH|GAME_TMD|GAME_TIE)) || ((tp&GAME_NDS)&&(tp&(FLAG_DSIW))))
|
||||
#define FTYPE_CIABUILD_L(tp) (FTYPE_CIABUILD(tp) && (tp&(GAME_TMD|GAME_TIE)))
|
||||
#define FTYPE_CIAINSTALL(tp) ((tp&(GAME_NCSD|GAME_NCCH|GAME_CIA)) || ((tp&GAME_NDS)&&(tp&(FLAG_DSIW))) || (tp&(GAME_TMD)&&(tp&(FLAG_NUSCDN))))
|
||||
#define FTYPE_CXIDUMP(tp) (tp&(GAME_TMD))
|
||||
#define FTYPE_CIABUILD(tp) ((tp&(GAME_NCSD|GAME_NCCH|GAME_TMD|GAME_CDNTMD|GAME_TWLTMD|GAME_TIE|GAME_TAD)) || ((tp&GAME_NDS)&&(tp&(FLAG_DSIW))))
|
||||
#define FTYPE_CIABUILD_L(tp) (tp&(GAME_TMD|GAME_CDNTMD|GAME_TIE|GAME_TAD))
|
||||
#define FTYPE_CIAINSTALL(tp) ((tp&(GAME_NCSD|GAME_NCCH|GAME_CIA|GAME_CDNTMD|GAME_TWLTMD)) || ((tp&GAME_NDS)&&(tp&(FLAG_DSIW))))
|
||||
#define FTYPE_TIKINSTALL(tp) (tp&(GAME_TICKET))
|
||||
#define FTYPE_CIFINSTALL(tp) (tp&(BIN_CIFNSH))
|
||||
#define FTYPE_TIKDUMP(tp) (tp&(GAME_TIE))
|
||||
#define FTYPE_CXIDUMP(tp) (tp&(GAME_TMD|GAME_TIE))
|
||||
#define FTYPE_UNINSTALL(tp) (tp&(GAME_TIE))
|
||||
#define FTYPE_TIKBUILD(tp) (tp&(GAME_TICKET|SYS_TICKDB|BIN_TIKDB))
|
||||
#define FTYPE_KEYBUILD(tp) (tp&(BIN_KEYDB|BIN_LEGKEY))
|
||||
#define FTYPE_TITLEINFO(tp) (tp&(GAME_TIE|GAME_SMDH|GAME_NCCH|GAME_NCSD|GAME_CIA|GAME_TMD|GAME_NDS|GAME_GBA|GAME_TAD|GAME_3DSX))
|
||||
#define FTYPE_CIACHECK(tp) (tp&GAME_CIA)
|
||||
#define FTYPE_TITLEINFO(tp) (tp&(GAME_TIE|GAME_CIA|GAME_TMD|GAME_CDNTMD|GAME_TWLTMD))
|
||||
#define FTYPE_RENAMABLE(tp) (tp&(GAME_NCCH|GAME_NCSD|GAME_CIA|GAME_NDS|GAME_GBA))
|
||||
#define FTYPE_TRIMABLE(tp) (tp&(IMG_NAND|GAME_NCCH|GAME_NCSD|GAME_NDS|SYS_FIRM))
|
||||
#define FTYPE_TRIMABLE(tp) (tp&(IMG_NAND|GAME_NCCH|GAME_NCSD|GAME_NDS|GAME_GBA|SYS_FIRM))
|
||||
#define FTYPE_TRANSFERABLE(tp) ((u64) (tp&(IMG_FAT|FLAG_CTR)) == (u64) (IMG_FAT|FLAG_CTR))
|
||||
#define FTYPE_NCSDFIXABLE(tp) (tp&(HDR_NAND|NOIMG_NAND))
|
||||
#define FTYPE_HASCODE(tp) (((u64) (tp&(GAME_NCCH|FLAG_CXI)) == (u64) (GAME_NCCH|FLAG_CXI))|(tp&GAME_NCSD))
|
||||
@ -71,9 +78,11 @@
|
||||
#define FTYPE_KEYINIT(tp) (tp&(BIN_KEYDB))
|
||||
#define FTYPE_KEYINSTALL(tp) (tp&(BIN_KEYDB))
|
||||
#define FTYPE_SCRIPT(tp) (tp&(TXT_SCRIPT))
|
||||
#define FTYPE_FONT(tp) (tp&(FONT_PBM))
|
||||
#define FTYPE_LUA(tp) (tp&(TXT_LUA))
|
||||
#define FTYPE_FONT(tp) (tp&(FONT_PBM|FONT_RIFF))
|
||||
#define FTYPE_TRANSLATION(tp) (tp&(TRANSLATION))
|
||||
#define FTYPE_GFX(tp) (tp&(GFX_PNG))
|
||||
#define FTYPE_SETABLE(tp) (tp&(FONT_PBM))
|
||||
#define FTYPE_SETABLE(tp) (tp&(FONT_PBM|FONT_RIFF|TRANSLATION))
|
||||
#define FTYPE_BOOTABLE(tp) (tp&(SYS_FIRM))
|
||||
#define FTYPE_INSTALLABLE(tp) (tp&(SYS_FIRM))
|
||||
#define FTYPE_AGBSAVE(tp) (tp&(SYS_AGBSAVE))
|
||||
|
@ -1,6 +1,7 @@
|
||||
#include "fsdrive.h"
|
||||
#include "fsgame.h"
|
||||
#include "fsinit.h"
|
||||
#include "language.h"
|
||||
#include "virtual.h"
|
||||
#include "vcart.h"
|
||||
#include "sddata.h"
|
||||
@ -11,16 +12,18 @@
|
||||
// last search pattern, path & mode
|
||||
static char search_pattern[256] = { 0 };
|
||||
static char search_path[256] = { 0 };
|
||||
static bool search_title_mode = false;
|
||||
static bool title_manager_mode = false;
|
||||
|
||||
int DriveType(const char* path) {
|
||||
int type = DRV_UNKNOWN;
|
||||
int pdrv = GetMountedFSNum(path);
|
||||
|
||||
|
||||
if (CheckAliasDrive(path)) {
|
||||
type = DRV_FAT | DRV_ALIAS | ((*path == 'A') ? DRV_SYSNAND : DRV_EMUNAND);
|
||||
} else if (*search_pattern && *search_path && (strncmp(path, "Z:", 3) == 0)) {
|
||||
type = DRV_SEARCH;
|
||||
} else if (title_manager_mode && (strncmp(path, "Y:", 3) == 0)) {
|
||||
type = DRV_VIRTUAL | DRV_TITLEMAN;
|
||||
} else if ((pdrv >= 0) && (pdrv < NORM_FS)) {
|
||||
if (pdrv == 0) {
|
||||
type = DRV_FAT | DRV_SDCARD | DRV_STDFAT;
|
||||
@ -39,7 +42,7 @@ int DriveType(const char* path) {
|
||||
} else if ((pdrv >= 7) && (pdrv <= 9) &&
|
||||
(GetMountState() & (IMG_FAT|IMG_NAND))) {
|
||||
type = DRV_FAT | DRV_IMAGE | DRV_STDFAT;
|
||||
}
|
||||
}
|
||||
} else if (CheckVirtualDrive(path)) {
|
||||
int vsrc = GetVirtualSource(path);
|
||||
if (vsrc == VRT_SYSNAND) {
|
||||
@ -58,53 +61,56 @@ int DriveType(const char* path) {
|
||||
type = DRV_VIRTUAL | DRV_CART;
|
||||
} else if (vsrc == VRT_VRAM) {
|
||||
type = DRV_VIRTUAL | DRV_VRAM;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
return type;
|
||||
}
|
||||
|
||||
void SetFSSearch(const char* pattern, const char* path, bool mode) {
|
||||
void SetFSSearch(const char* pattern, const char* path) {
|
||||
if (pattern && path) {
|
||||
strncpy(search_pattern, pattern, 256);
|
||||
search_pattern[255] = '\0';
|
||||
strncpy(search_path, path, 256);
|
||||
search_path[255] = '\0';
|
||||
search_title_mode = mode;
|
||||
} else *search_pattern = *search_path = '\0';
|
||||
}
|
||||
|
||||
void SetTitleManagerMode(bool mode) {
|
||||
title_manager_mode = mode;
|
||||
}
|
||||
|
||||
bool GetFATVolumeLabel(const char* drv, char* label) {
|
||||
return (f_getlabel(drv, label, NULL) == FR_OK);
|
||||
}
|
||||
|
||||
bool GetRootDirContentsWorker(DirStruct* contents) {
|
||||
static const char* drvname[] = { FS_DRVNAME };
|
||||
const char* drvname[] = { FS_DRVNAME };
|
||||
static const char* drvnum[] = { FS_DRVNUM };
|
||||
u32 n_entries = 0;
|
||||
|
||||
|
||||
char sdlabel[DRV_LABEL_LEN];
|
||||
if (!GetFATVolumeLabel("0:", sdlabel) || !(*sdlabel))
|
||||
strcpy(sdlabel, "NOLABEL");
|
||||
strcpy(sdlabel, STR_LAB_NOLABEL);
|
||||
|
||||
char carttype[16];
|
||||
GetVCartTypeString(carttype);
|
||||
|
||||
|
||||
// virtual root objects hacked in
|
||||
for (u32 i = 0; (i < countof(drvnum)) && (n_entries < MAX_DIR_ENTRIES); i++) {
|
||||
DirEntry* entry = &(contents->entry[n_entries]);
|
||||
if (!DriveType(drvnum[i])) continue; // drive not available
|
||||
entry->p_name = 4;
|
||||
entry->name = entry->path + entry->p_name;
|
||||
memset(entry->path, 0x00, 64);
|
||||
memset(entry->path, 0x00, 256);
|
||||
snprintf(entry->path, 4, "%s", drvnum[i]);
|
||||
if ((*(drvnum[i]) >= '7') && (*(drvnum[i]) <= '9') && !(GetMountState() & IMG_NAND)) // Drive 7...9 handling
|
||||
snprintf(entry->name, 32, "[%s] %s", drvnum[i],
|
||||
(*(drvnum[i]) == '7') ? "FAT IMAGE" :
|
||||
(*(drvnum[i]) == '8') ? "BONUS DRIVE" :
|
||||
(*(drvnum[i]) == '9') ? "RAMDRIVE" : "UNK");
|
||||
snprintf(entry->name, 252, "[%s] %s", drvnum[i],
|
||||
(*(drvnum[i]) == '7') ? STR_LAB_FAT_IMAGE :
|
||||
(*(drvnum[i]) == '8') ? STR_LAB_BONUS_DRIVE :
|
||||
(*(drvnum[i]) == '9') ? STR_LAB_RAMDRIVE : "UNK");
|
||||
else if (*(drvnum[i]) == 'G') // Game drive special handling
|
||||
snprintf(entry->name, 32, "[%s] %s %s", drvnum[i],
|
||||
snprintf(entry->name, 252, "[%s] %s %s", drvnum[i],
|
||||
(GetMountState() & GAME_CIA ) ? "CIA" :
|
||||
(GetMountState() & GAME_NCSD ) ? "NCSD" :
|
||||
(GetMountState() & GAME_NCCH ) ? "NCCH" :
|
||||
@ -114,17 +120,17 @@ bool GetRootDirContentsWorker(DirStruct* contents) {
|
||||
(GetMountState() & SYS_FIRM ) ? "FIRM" :
|
||||
(GetMountState() & GAME_TAD ) ? "DSIWARE" : "UNK", drvname[i]);
|
||||
else if (*(drvnum[i]) == 'C') // Game cart handling
|
||||
snprintf(entry->name, 32, "[%s] %s (%s)", drvnum[i], drvname[i], carttype);
|
||||
snprintf(entry->name, 252, "[%s] %s (%s)", drvnum[i], drvname[i], carttype);
|
||||
else if (*(drvnum[i]) == '0') // SD card handling
|
||||
snprintf(entry->name, 32, "[%s] %s (%s)", drvnum[i], drvname[i], sdlabel);
|
||||
else snprintf(entry->name, 32, "[%s] %s", drvnum[i], drvname[i]);
|
||||
snprintf(entry->name, 252, "[%s] %s (%s)", drvnum[i], drvname[i], sdlabel);
|
||||
else snprintf(entry->name, 252, "[%s] %s", drvnum[i], drvname[i]);
|
||||
entry->size = GetTotalSpace(entry->path);
|
||||
entry->type = T_ROOT;
|
||||
entry->marked = 0;
|
||||
n_entries++;
|
||||
}
|
||||
contents->n_entries = n_entries;
|
||||
|
||||
|
||||
return contents->n_entries;
|
||||
}
|
||||
|
||||
@ -133,11 +139,11 @@ bool GetDirContentsWorker(DirStruct* contents, char* fpath, int fnsize, const ch
|
||||
FILINFO fno;
|
||||
char* fname = fpath + strnlen(fpath, fnsize - 1);
|
||||
bool ret = false;
|
||||
|
||||
|
||||
if (fvx_opendir(&pdir, fpath) != FR_OK)
|
||||
return false;
|
||||
if (*(fname-1) != '/') *(fname++) = '/';
|
||||
|
||||
|
||||
while (fvx_readdir(&pdir, &fno) == FR_OK) {
|
||||
if ((strncmp(fno.fname, ".", 2) == 0) || (strncmp(fno.fname, "..", 3) == 0))
|
||||
continue; // filter out virtual entries
|
||||
@ -176,7 +182,7 @@ bool GetDirContentsWorker(DirStruct* contents, char* fpath, int fnsize, const ch
|
||||
}
|
||||
}
|
||||
fvx_closedir(&pdir);
|
||||
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
@ -206,9 +212,12 @@ void SearchDirContents(DirStruct* contents, const char* path, const char* patter
|
||||
|
||||
void GetDirContents(DirStruct* contents, const char* path) {
|
||||
if (*search_path && (DriveType(path) & DRV_SEARCH)) {
|
||||
ShowString("Searching, please wait...");
|
||||
ShowString("%s", STR_SEARCHING_PLEASE_WAIT);
|
||||
SearchDirContents(contents, search_path, search_pattern, true);
|
||||
if (search_title_mode) SetDirGoodNames(contents);
|
||||
ClearScreenF(true, false, COLOR_STD_BG);
|
||||
} else if (title_manager_mode && (DriveType(path) & DRV_TITLEMAN)) {
|
||||
SearchDirContents(contents, "T:", "*", false);
|
||||
SetupTitleManager(contents);
|
||||
ClearScreenF(true, false, COLOR_STD_BG);
|
||||
} else SearchDirContents(contents, path, NULL, false);
|
||||
if (*path) SortDirStruct(contents);
|
||||
@ -222,8 +231,8 @@ uint64_t GetFreeSpace(const char* path)
|
||||
int pdrv = GetMountedFSNum(path);
|
||||
FATFS* fsobj = GetMountedFSObject(path);
|
||||
if ((pdrv < 0) || !fsobj) return 0;
|
||||
|
||||
snprintf(fsname, 3, "%i:", pdrv);
|
||||
|
||||
snprintf(fsname, sizeof(fsname), "%i:", pdrv);
|
||||
if (f_getfree(fsname, &free_clusters, &fsptr) != FR_OK)
|
||||
return 0;
|
||||
|
||||
|
@ -25,30 +25,36 @@
|
||||
#define DRV_VRAM (1UL<<13)
|
||||
#define DRV_ALIAS (1UL<<14)
|
||||
#define DRV_BONUS (1UL<<15)
|
||||
#define DRV_SEARCH (1UL<<16)
|
||||
#define DRV_STDFAT (1UL<<17) // standard FAT drive without limitations
|
||||
#define DRV_TITLEMAN (1UL<<16)
|
||||
#define DRV_SEARCH (1UL<<17)
|
||||
#define DRV_STDFAT (1UL<<18) // standard FAT drive without limitations
|
||||
|
||||
#define DRV_LABEL_LEN (36)
|
||||
|
||||
#define FS_DRVNAME \
|
||||
"SDCARD", \
|
||||
"SYSNAND CTRNAND", "SYSNAND TWLN", "SYSNAND TWLP", "SYSNAND SD", "SYSNAND VIRTUAL", \
|
||||
"EMUNAND CTRNAND", "EMUNAND TWLN", "EMUNAND TWLP", "EMUNAND SD", "EMUNAND VIRTUAL", \
|
||||
"IMGNAND CTRNAND", "IMGNAND TWLN", "IMGNAND TWLP", "IMGNAND VIRTUAL", \
|
||||
"GAMECART", \
|
||||
"GAME IMAGE", "AESKEYDB IMAGE", "BDRI IMAGE", "DISA/DIFF IMAGE", \
|
||||
"MEMORY VIRTUAL", \
|
||||
"VRAM VIRTUAL", \
|
||||
"LAST SEARCH" \
|
||||
|
||||
STR_LAB_SDCARD, \
|
||||
STR_LAB_SYSNAND_CTRNAND, STR_LAB_SYSNAND_TWLN, STR_LAB_SYSNAND_TWLP, STR_LAB_SYSNAND_SD, STR_LAB_SYSNAND_VIRTUAL, \
|
||||
STR_LAB_EMUNAND_CTRNAND, STR_LAB_EMUNAND_TWLN, STR_LAB_EMUNAND_TWLP, STR_LAB_EMUNAND_SD, STR_LAB_EMUNAND_VIRTUAL, \
|
||||
STR_LAB_IMGNAND_CTRNAND, STR_LAB_IMGNAND_TWLN, STR_LAB_IMGNAND_TWLP, STR_LAB_IMGNAND_VIRTUAL, \
|
||||
STR_LAB_GAMECART, \
|
||||
STR_LAB_GAME_IMAGE, STR_LAB_AESKEYDB_IMAGE, STR_LAB_BDRI_IMAGE, STR_LAB_DISA_DIFF_IMAGE, \
|
||||
STR_LAB_MEMORY_VIRTUAL, \
|
||||
STR_LAB_VRAM_VIRTUAL, \
|
||||
STR_LAB_TITLE_MANAGER, \
|
||||
STR_LAB_LAST_SEARCH
|
||||
|
||||
#define FS_DRVNUM \
|
||||
"0:", "1:", "2:", "3:", "A:", "S:", "4:", "5:", "6:", "B:", "E:", "7:", "8:", "9:", "I:", "C:", "G:", "K:", "T:", "D:", "M:", "V:", "Z:"
|
||||
"0:", "1:", "2:", "3:", "A:", "S:", "4:", "5:", "6:", "B:", "E:", "7:", "8:", "9:", \
|
||||
"I:", "C:", "G:", "K:", "T:", "D:", "M:", "V:", "Y:", "Z:"
|
||||
|
||||
/** Function to identify the type of a drive **/
|
||||
int DriveType(const char* path);
|
||||
|
||||
/** Set search pattern / path / mode for special Z: drive **/
|
||||
void SetFSSearch(const char* pattern, const char* path, bool mode);
|
||||
void SetFSSearch(const char* pattern, const char* path);
|
||||
|
||||
/** Enable title manager for special processing of mounted title.db **/
|
||||
void SetTitleManagerMode(bool mode);
|
||||
|
||||
/** Read the FAT volume label of a partition **/
|
||||
bool GetFATVolumeLabel(const char* drv, char* label);
|
||||
|
@ -1,14 +1,17 @@
|
||||
#include "fsgame.h"
|
||||
#include "fsperm.h"
|
||||
#include "gameutil.h"
|
||||
#include "language.h"
|
||||
#include "tie.h"
|
||||
#include "ui.h"
|
||||
#include "ff.h"
|
||||
#include "vff.h"
|
||||
|
||||
void SetDirGoodNames(DirStruct* contents) {
|
||||
void SetupTitleManager(DirStruct* contents) {
|
||||
char goodname[256];
|
||||
ShowProgress(0, 0, "");
|
||||
for (u32 s = 0; s < contents->n_entries; s++) {
|
||||
DirEntry* entry = &(contents->entry[s]);
|
||||
// set good name for entry
|
||||
u32 plen = strnlen(entry->path, 256);
|
||||
if (!ShowProgress(s+1, contents->n_entries, entry->path)) break;
|
||||
if ((GetGoodName(goodname, entry->path, false) != 0) ||
|
||||
@ -17,6 +20,11 @@ void SetDirGoodNames(DirStruct* contents) {
|
||||
entry->p_name = plen + 1;
|
||||
entry->name = entry->path + entry->p_name;
|
||||
snprintf(entry->name, 256 - entry->p_name, "%s", goodname);
|
||||
// grab title size from tie
|
||||
TitleInfoEntry tie;
|
||||
if (fvx_qread(entry->path, &tie, 0, sizeof(TitleInfoEntry), NULL) != FR_OK)
|
||||
continue;
|
||||
entry->size = tie.title_size;
|
||||
}
|
||||
}
|
||||
|
||||
@ -25,17 +33,17 @@ bool GoodRenamer(DirEntry* entry, bool ask) {
|
||||
if ((GetGoodName(goodname, entry->path, false) != 0) ||
|
||||
(strncmp(goodname + strnlen(goodname, 256) - 4, ".tmd", 4) == 0)) // no TMD, please
|
||||
return false;
|
||||
|
||||
|
||||
if (ask) { // ask for confirmatiom
|
||||
char oldname_tr[32+1];
|
||||
char oldname_tr[UTF_BUFFER_BYTESIZE(32)];
|
||||
char newname_ww[256];
|
||||
TruncateString(oldname_tr, entry->name, 32, 8);
|
||||
strncpy(newname_ww, goodname, 256);
|
||||
WordWrapString(newname_ww, 32);
|
||||
if (!ShowPrompt(true, "%s\nRename to good name?\n \n%s", oldname_tr, newname_ww))
|
||||
if (!ShowPrompt(true, "%s\n%s\n \n%s", oldname_tr, STR_RENAME_TO_GOOD_NAME, newname_ww))
|
||||
return true; // call it a success because user choice
|
||||
}
|
||||
|
||||
|
||||
char npath[256]; // get new path
|
||||
strncpy(npath, entry->path, 256);
|
||||
char* nname = strrchr(npath, '/');
|
||||
@ -47,6 +55,6 @@ bool GoodRenamer(DirEntry* entry, bool ask) {
|
||||
if (f_rename(entry->path, npath) != FR_OK) return false;
|
||||
strncpy(entry->path, npath, 256);
|
||||
entry->name = entry->path + (nname - npath);
|
||||
|
||||
|
||||
return true;
|
||||
}
|
||||
|
@ -3,5 +3,5 @@
|
||||
#include "common.h"
|
||||
#include "fsdir.h"
|
||||
|
||||
void SetDirGoodNames(DirStruct* contents);
|
||||
void SetupTitleManager(DirStruct* contents);
|
||||
bool GoodRenamer(DirEntry* entry, bool ask);
|
||||
|
@ -18,10 +18,10 @@ bool InitSDCardFS() {
|
||||
|
||||
bool InitExtFS() {
|
||||
static bool ramdrv_ready = false;
|
||||
|
||||
|
||||
for (u32 i = 1; i < NORM_FS; i++) {
|
||||
char fsname[8];
|
||||
snprintf(fsname, 7, "%lu:", i);
|
||||
snprintf(fsname, sizeof(fsname), "%lu:", i);
|
||||
if (fs_mounted[i]) continue;
|
||||
fs_mounted[i] = (f_mount(fs + i, fsname, 1) == FR_OK);
|
||||
if ((!fs_mounted[i] || !ramdrv_ready) && (i == NORM_FS - 1) && !(GetMountState() & IMG_NAND)) {
|
||||
@ -44,7 +44,7 @@ bool InitImgFS(const char* path) {
|
||||
u32 drv_i = NORM_FS - IMGN_FS;
|
||||
char fsname[8];
|
||||
for (; drv_i < NORM_FS; drv_i++) {
|
||||
snprintf(fsname, 7, "%lu:", drv_i);
|
||||
snprintf(fsname, sizeof(fsname), "%lu:", drv_i);
|
||||
if (!(DriveType(fsname)&DRV_IMAGE)) break;
|
||||
}
|
||||
// deinit virtual filesystem
|
||||
@ -58,7 +58,7 @@ bool InitImgFS(const char* path) {
|
||||
else if ((type&IMG_FAT) && (drv_i < NORM_FS - IMGN_FS + 1)) drv_i = NORM_FS - IMGN_FS + 1;
|
||||
// reinit image filesystem
|
||||
for (u32 i = NORM_FS - IMGN_FS; i < drv_i; i++) {
|
||||
snprintf(fsname, 7, "%lu:", i);
|
||||
snprintf(fsname, sizeof(fsname), "%lu:", i);
|
||||
fs_mounted[i] = (f_mount(fs + i, fsname, 1) == FR_OK);
|
||||
}
|
||||
return GetMountState();
|
||||
@ -71,7 +71,7 @@ void DeinitExtFS() {
|
||||
for (u32 i = NORM_FS - 1; i > 0; i--) {
|
||||
if (fs_mounted[i]) {
|
||||
char fsname[8];
|
||||
snprintf(fsname, 7, "%lu:", i);
|
||||
snprintf(fsname, sizeof(fsname), "%lu:", i);
|
||||
f_mount(NULL, fsname, 1);
|
||||
fs_mounted[i] = false;
|
||||
}
|
||||
@ -91,7 +91,7 @@ void DismountDriveType(u32 type) { // careful with this - no safety checks
|
||||
}
|
||||
for (u32 i = 0; i < NORM_FS; i++) {
|
||||
char fsname[8];
|
||||
snprintf(fsname, 7, "%lu:", i);
|
||||
snprintf(fsname, sizeof(fsname), "%lu:", i);
|
||||
if (!fs_mounted[i] || !(type & DriveType(fsname)))
|
||||
continue;
|
||||
f_mount(NULL, fsname, 1);
|
||||
|
@ -6,7 +6,7 @@
|
||||
// init SD card filesystem - required(?) for everything else
|
||||
bool InitSDCardFS();
|
||||
|
||||
// init fill external fileystem
|
||||
// init fill external fileystem
|
||||
bool InitExtFS();
|
||||
|
||||
// mount and init image file system
|
||||
@ -21,7 +21,7 @@ void DeinitSDCardFS();
|
||||
// dismount drives of a certain type
|
||||
void DismountDriveType(u32 type);
|
||||
|
||||
// returns the mount state of the SD card
|
||||
// returns the mount state of the SD card
|
||||
bool CheckSDMountState(void);
|
||||
|
||||
// get number of mounted file system (only for FATFS filesystems)
|
||||
|
@ -4,10 +4,11 @@
|
||||
#include "image.h"
|
||||
#include "unittype.h"
|
||||
#include "essentials.h"
|
||||
#include "language.h"
|
||||
#include "ui.h"
|
||||
#include "sdmmc.h"
|
||||
|
||||
#define PATH_SYS_LVL1 "S:/twln.bin", "S:/twlp.bin"
|
||||
#define PATH_SYS_LVL1 "S:/twln.bin", "S:/twlp.bin"
|
||||
#define PATH_SYS_LVL2 "1:/rw/sys/LocalFriendCodeSeed_B", "1:/rw/sys/LocalFriendCodeSeed_A", \
|
||||
"1:/rw/sys/SecureInfo_A", "1:/rw/sys/SecureInfo_B", \
|
||||
"1:/private/movable.sed", "1:/ro/sys/HWCAL0.dat", "1:/ro/sys/HWCAL1.dat", \
|
||||
@ -20,10 +21,10 @@
|
||||
static u32 write_permissions = PERM_BASE;
|
||||
|
||||
bool CheckWritePermissions(const char* path) {
|
||||
char area_name[16];
|
||||
char area_name[UTF_BUFFER_BYTESIZE(16)];
|
||||
int drvtype = DriveType(path);
|
||||
u32 perm;
|
||||
|
||||
|
||||
// create a standardized path string
|
||||
char path_f[256];
|
||||
char* p = (char*) path;
|
||||
@ -37,13 +38,13 @@ bool CheckWritePermissions(const char* path) {
|
||||
// check mounted image write permissions
|
||||
if ((drvtype & DRV_IMAGE) && !CheckWritePermissions(GetMountPath()))
|
||||
return false; // endless loop when mounted file inside image, but not possible
|
||||
|
||||
|
||||
// SD card write protection check
|
||||
if ((drvtype & (DRV_SDCARD | DRV_EMUNAND | DRV_ALIAS)) && SD_WRITE_PROTECTED) {
|
||||
ShowPrompt(false, "SD card is write protected!\nCan't continue.");
|
||||
ShowPrompt(false, "%s", STR_SD_WRITE_PROTECTED_CANT_CONTINUE);
|
||||
return false;
|
||||
}
|
||||
|
||||
|
||||
// check drive type, get permission type
|
||||
if (drvtype & DRV_SYSNAND) {
|
||||
static const u32 perms[] = { PERM_SYS_LVL0, PERM_SYS_LVL1, PERM_SYS_LVL2, PERM_SYS_LVL3 };
|
||||
@ -63,7 +64,7 @@ bool CheckWritePermissions(const char* path) {
|
||||
if ((drvtype & DRV_CTRNAND) || (lvl == 2)) lvl = 3;
|
||||
}
|
||||
perm = perms[lvl];
|
||||
snprintf(area_name, 16, "SysNAND (lvl%lu)", lvl);
|
||||
snprintf(area_name, sizeof(area_name), STR_SYSNAND_LVL_N, lvl);
|
||||
} else if (drvtype & DRV_EMUNAND) {
|
||||
static const u32 perms[] = { PERM_EMU_LVL0, PERM_EMU_LVL1 };
|
||||
u32 lvl = (drvtype & (DRV_ALIAS|DRV_CTRNAND)) ? 1 : 0;
|
||||
@ -73,53 +74,53 @@ bool CheckWritePermissions(const char* path) {
|
||||
if (strncasecmp(path_f, path_lvl1[i], 256) == 0) lvl = 1;
|
||||
}
|
||||
perm = perms[lvl];
|
||||
snprintf(area_name, 16, "EmuNAND (lvl%lu)", lvl);
|
||||
snprintf(area_name, sizeof(area_name), STR_EMUNAND_LVL_N, lvl);
|
||||
} else if (drvtype & DRV_GAME) {
|
||||
perm = PERM_GAME;
|
||||
snprintf(area_name, 16, "game images");
|
||||
snprintf(area_name, sizeof(area_name), "%s", STR_GAME_IMAGES);
|
||||
} else if (drvtype & DRV_CART) {
|
||||
perm = PERM_CART;
|
||||
snprintf(area_name, 16, "gamecart saves");
|
||||
snprintf(area_name, sizeof(area_name), "%s", STR_GAMECART_SAVES);
|
||||
} else if (drvtype & DRV_VRAM) {
|
||||
perm = PERM_VRAM;
|
||||
snprintf(area_name, 16, "vram0");
|
||||
snprintf(area_name, sizeof(area_name), "vram0");
|
||||
} else if (drvtype & DRV_XORPAD) {
|
||||
perm = PERM_XORPAD;
|
||||
snprintf(area_name, 16, "XORpads");
|
||||
snprintf(area_name, sizeof(area_name), "XORpads");
|
||||
} else if (drvtype & DRV_IMAGE) {
|
||||
perm = PERM_IMAGE;
|
||||
snprintf(area_name, 16, "images");
|
||||
snprintf(area_name, sizeof(area_name), "%s", STR_IMAGES);
|
||||
} else if (drvtype & DRV_MEMORY) {
|
||||
perm = PERM_MEMORY;
|
||||
snprintf(area_name, 16, "memory areas");
|
||||
snprintf(area_name, sizeof(area_name), "%s", STR_MEMORY_AREAS);
|
||||
} else if (strncasecmp(path_f, "0:/Nintendo 3DS", 15) == 0) { // this check could be better
|
||||
perm = PERM_SDDATA;
|
||||
snprintf(area_name, 16, "SD system data");
|
||||
snprintf(area_name, sizeof(area_name), "%s", STR_SD_SYSTEM_DATA);
|
||||
} else if (drvtype & DRV_SDCARD) {
|
||||
perm = PERM_SDCARD;
|
||||
snprintf(area_name, 16, "SD card");
|
||||
snprintf(area_name, sizeof(area_name), "%s", STR_SD_CARD);
|
||||
} else if (drvtype & DRV_RAMDRIVE) {
|
||||
perm = PERM_RAMDRIVE;
|
||||
snprintf(area_name, 16, "RAM drive");
|
||||
snprintf(area_name, sizeof(area_name), "%s", STR_RAM_DRIVE);
|
||||
} else {
|
||||
return false;
|
||||
}
|
||||
|
||||
|
||||
// check permission, return if already set
|
||||
if ((write_permissions & perm) == perm)
|
||||
return true;
|
||||
|
||||
|
||||
// offer unlock if possible
|
||||
if (!(perm & (PERM_VRAM|PERM_GAME|PERM_XORPAD))) {
|
||||
// ask the user
|
||||
if (!ShowPrompt(true, "Writing to %s is locked!\nUnlock it now?", area_name))
|
||||
if (!ShowPrompt(true, STR_WRITING_TO_DRIVE_IS_LOCKED_UNLOCK_NOW, area_name))
|
||||
return false;
|
||||
|
||||
|
||||
return SetWritePermissions(perm, true);
|
||||
}
|
||||
|
||||
|
||||
// unlock not possible
|
||||
ShowPrompt(false, "Unlock write permission for\n%s is not allowed.", area_name);
|
||||
ShowPrompt(false, STR_UNLOCK_WRITE_FOR_DRIVE_NOT_ALLOWED, area_name);
|
||||
return false;
|
||||
}
|
||||
|
||||
@ -141,75 +142,75 @@ bool SetWritePermissions(u32 perm, bool add_perm) {
|
||||
if (!add_perm) write_permissions = perm;
|
||||
return true;
|
||||
}
|
||||
|
||||
|
||||
switch (perm) {
|
||||
case PERM_BASE:
|
||||
if (!ShowUnlockSequence(1, "You want to enable base\nwriting permissions."))
|
||||
if (!ShowUnlockSequence(1, "%s", STR_ENABLE_BASE_WRITE))
|
||||
return false;
|
||||
break;
|
||||
case PERM_SDCARD:
|
||||
if (!ShowUnlockSequence(1, "You want to enable SD card\nwriting permissions."))
|
||||
if (!ShowUnlockSequence(1, "%s", STR_ENABLE_SD_WRITE))
|
||||
return false;
|
||||
break;
|
||||
case PERM_IMAGE:
|
||||
if (!ShowUnlockSequence(1, "You want to enable image\nwriting permissions."))
|
||||
if (!ShowUnlockSequence(1, "%s", STR_ENABLE_IMAGE_WRITE))
|
||||
return false;
|
||||
break;
|
||||
case PERM_RAMDRIVE:
|
||||
if (!ShowUnlockSequence(1, "You want to enable RAM drive\nwriting permissions."))
|
||||
if (!ShowUnlockSequence(1, "%s", STR_ENABLE_RAM_DRIVE_WRITE))
|
||||
return false;
|
||||
break;
|
||||
case PERM_EMU_LVL0:
|
||||
if (!ShowUnlockSequence(1, "You want to enable EmuNAND\nlvl0 writing permissions."))
|
||||
if (!ShowUnlockSequence(1, "%s", STR_ENABLE_EMUNAND_0_WRITE))
|
||||
return false;
|
||||
break;
|
||||
case PERM_SYS_LVL0:
|
||||
if (!ShowUnlockSequence(1, "You want to enable SysNAND\nlvl0 writing permissions."))
|
||||
if (!ShowUnlockSequence(1, "%s", STR_ENABLE_SYSNAND_0_WRITE))
|
||||
return false;
|
||||
break;
|
||||
case PERM_EMU_LVL1:
|
||||
if (!ShowUnlockSequence(2, "You want to enable EmuNAND\nlvl1 writing permissions.\n \nThis enables you to modify\nrecoverable system data,\nuser data & savegames."))
|
||||
if (!ShowUnlockSequence(2, "%s", STR_ENABLE_EMUNAND_1_WRITE))
|
||||
return false;
|
||||
break;
|
||||
case PERM_SYS_LVL1:
|
||||
if (!ShowUnlockSequence(2, "You want to enable SysNAND\nlvl1 writing permissions.\n \nThis enables you to modify\nsystem data, installations,\nuser data & savegames."))
|
||||
return false;
|
||||
break;
|
||||
case PERM_SDDATA:
|
||||
if (!ShowUnlockSequence(2, "You want to enable SD data\nwriting permissions.\n \nThis enables you to modify\ninstallations, user data &\nsavegames."))
|
||||
if (!ShowUnlockSequence(2, "%s", STR_ENABLE_SYSNAND_1_WRITE))
|
||||
return false;
|
||||
break;
|
||||
case PERM_CART:
|
||||
if (!ShowUnlockSequence(2, "You want to enable gamecart\nsave writing permissions."))
|
||||
if (!ShowUnlockSequence(2, "%s", STR_ENABLE_GAMECART_SAVE_WRITE))
|
||||
return false;
|
||||
break;
|
||||
#ifndef SAFEMODE
|
||||
case PERM_SYS_LVL2:
|
||||
if (!ShowUnlockSequence(3, "!Better be careful!\n \nYou want to enable SysNAND\nlvl2 writing permissions.\n \nThis enables you to modify\nirrecoverable system data!"))
|
||||
if (!ShowUnlockSequence(3, "%s", STR_ENABLE_SYSNAND_2_WRITE))
|
||||
return false;
|
||||
break;
|
||||
case PERM_MEMORY:
|
||||
if (!ShowUnlockSequence(4, "!Better be careful!\n \nYou want to enable memory\nwriting permissions.\n \nWriting to certain areas may\nlead to unexpected results."))
|
||||
if (!ShowUnlockSequence(4, "%s", STR_ENABLE_MEMORY_WRITE))
|
||||
return false;
|
||||
break;
|
||||
case PERM_SDDATA:
|
||||
if (!ShowUnlockSequence(5, "%s", STR_ENABLE_SD_DATA_WRITE))
|
||||
return false;
|
||||
break;
|
||||
case PERM_SYS_LVL3:
|
||||
if (!ShowUnlockSequence(6, "!THIS IS YOUR ONLY WARNING!\n \nYou want to enable SysNAND\nlvl3 writing permissions.\n \nThis enables you to OVERWRITE\nyour bootloader installation,\nessential system files and/or\nBRICK your console!"))
|
||||
if (!ShowUnlockSequence(6, "%s", STR_ENABLE_SYSNAND_3_WRITE))
|
||||
return false;
|
||||
break;
|
||||
default:
|
||||
ShowPrompt(false, "Unlock write permission is not allowed.");
|
||||
ShowPrompt(false, "%s", STR_UNLOCK_WRITE_NOT_ALLOWED);
|
||||
return false;
|
||||
break;
|
||||
#else
|
||||
default:
|
||||
ShowPrompt(false, "Can't unlock write permission.\nTry GodMode9 instead!");
|
||||
ShowPrompt(false, "%s", STR_CANT_UNLOCK_WRITE_TRY_GODMODE9);
|
||||
return false;
|
||||
break;
|
||||
#endif
|
||||
}
|
||||
|
||||
|
||||
write_permissions = add_perm ? write_permissions | perm : perm;
|
||||
|
||||
|
||||
return true;
|
||||
}
|
||||
|
||||
|
@ -21,7 +21,7 @@
|
||||
#define PERM_BASE (PERM_SDCARD | PERM_IMAGE | PERM_RAMDRIVE | PERM_EMU_LVL0 | PERM_SYS_LVL0)
|
||||
|
||||
// permission levels / colors
|
||||
#define PERM_BLUE (GetWritePermissions()&PERM_MEMORY)
|
||||
#define PERM_BLUE (GetWritePermissions()&(PERM_MEMORY|(PERM_SDDATA&~PERM_SDCARD)))
|
||||
#define PERM_RED (GetWritePermissions()&(PERM_SYS_LVL3&~PERM_SYS_LVL2))
|
||||
#define PERM_ORANGE (GetWritePermissions()&(PERM_SYS_LVL2&~PERM_SYS_LVL1))
|
||||
#define PERM_YELLOW (GetWritePermissions()&((PERM_SYS_LVL1&~PERM_SYS_LVL0)|(PERM_EMU_LVL1&~PERM_EMU_LVL0)|(PERM_SDDATA&~PERM_SDCARD)|PERM_CART))
|
||||
|
@ -11,9 +11,10 @@
|
||||
#include "ff.h"
|
||||
#include "ui.h"
|
||||
#include "swkbd.h"
|
||||
#include "language.h"
|
||||
|
||||
#define SKIP_CUR (1UL<<10)
|
||||
#define OVERWRITE_CUR (1UL<<11)
|
||||
#define SKIP_CUR (1UL<<11)
|
||||
#define OVERWRITE_CUR (1UL<<12)
|
||||
|
||||
#define _MAX_FS_OPT 8 // max file selector options
|
||||
|
||||
@ -43,19 +44,19 @@ bool FormatSDCard(u64 hidden_mb, u32 cluster_size, const char* label) {
|
||||
u32 emu_size = (u32) ((hidden_mb * 1024 * 1024) / 512);
|
||||
u32 fat_sector = align(emu_sector + emu_size, 0x2000); // align to 4MB
|
||||
u32 fat_size = (fat_sector < sd_size) ? sd_size - fat_sector : 0;
|
||||
|
||||
|
||||
// FAT size check
|
||||
if (fat_size < 0x80000) { // minimum free space: 256MB
|
||||
ShowPrompt(false, "Error: SD card is too small");
|
||||
ShowPrompt(false, "%s", STR_ERROR_SD_TOO_SMALL);
|
||||
return false;
|
||||
}
|
||||
|
||||
|
||||
// Write protection check
|
||||
if (SD_WRITE_PROTECTED) {
|
||||
ShowPrompt(false, "SD card is write protected!\nCan't continue.");
|
||||
ShowPrompt(false, "%s", STR_SD_WRITE_PROTECTED_CANT_CONTINUE);
|
||||
return false;
|
||||
}
|
||||
|
||||
|
||||
// build the MBR
|
||||
memcpy(mbrdata + 0x08, &fat_sector, 4);
|
||||
memcpy(mbrdata + 0x0C, &fat_size, 4);
|
||||
@ -64,25 +65,25 @@ bool FormatSDCard(u64 hidden_mb, u32 cluster_size, const char* label) {
|
||||
memcpy(mbr + 0x1BE, mbrdata, 0x42);
|
||||
if (hidden_mb) memcpy(mbr, "GATEWAYNAND", 12); // legacy
|
||||
else memset(mbr + 0x1CE, 0, 0x10);
|
||||
|
||||
|
||||
// one last warning....
|
||||
// 0:/Nintendo 3DS/ write permission is ignored here, this warning is enough
|
||||
if (!ShowUnlockSequence(5, "!WARNING!\n \nProceeding will format this SD.\nThis will irreversibly delete\nALL data on it."))
|
||||
if (!ShowUnlockSequence(5, "%s", STR_WARNING_PROCEEDING_WILL_FORMAT_SD_DELETE_ALL_DATA))
|
||||
return false;
|
||||
ShowString("Formatting SD, please wait...");
|
||||
|
||||
ShowString("%s", STR_FORMATTING_SD_PLEASE_WAIT);
|
||||
|
||||
// write the MBR to disk
|
||||
// !this assumes a fully deinitialized file system!
|
||||
if ((sdmmc_sdcard_init() != 0) || (sdmmc_sdcard_writesectors(0, 1, mbr) != 0) ||
|
||||
(emu_size && ((sdmmc_nand_readsectors(0, 1, ncsd) != 0) || (sdmmc_sdcard_writesectors(1, 1, ncsd) != 0)))) {
|
||||
ShowPrompt(false, "Error: SD card i/o failure");
|
||||
ShowPrompt(false, "%s", STR_ERROR_SD_CARD_IO_FAILURE);
|
||||
return false;
|
||||
}
|
||||
|
||||
|
||||
// format the SD card
|
||||
VolToPart[0].pt = 1; // workaround to prevent FatFS rebuilding the MBR
|
||||
InitSDCardFS();
|
||||
|
||||
|
||||
u8* buffer = (u8*) malloc(STD_BUFFER_SIZE);
|
||||
if (!buffer) bkpt; // will not happen
|
||||
MKFS_PARM opt0, opt1;
|
||||
@ -92,28 +93,28 @@ bool FormatSDCard(u64 hidden_mb, u32 cluster_size, const char* label) {
|
||||
opt0.align = opt1.align = 0;
|
||||
opt0.n_fat = opt1.n_fat = 1;
|
||||
opt0.n_root = opt1.n_root = 0;
|
||||
bool ret = ((f_mkfs("0:", &opt0, buffer, STD_BUFFER_SIZE) == FR_OK) ||
|
||||
bool ret = ((f_mkfs("0:", &opt0, buffer, STD_BUFFER_SIZE) == FR_OK) ||
|
||||
(f_mkfs("0:", &opt1, buffer, STD_BUFFER_SIZE) == FR_OK)) &&
|
||||
(f_setlabel((label) ? label : "0:GM9SD") == FR_OK);
|
||||
free(buffer);
|
||||
|
||||
|
||||
DeinitSDCardFS();
|
||||
VolToPart[0].pt = 0; // revert workaround to prevent SD mount problems
|
||||
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
bool SetupBonusDrive(void) {
|
||||
if (!ShowUnlockSequence(3, "Format the bonus drive?\nThis will irreversibly delete\nALL data on it."))
|
||||
if (!ShowUnlockSequence(3, "%s", STR_FORMAT_BONUS_DRIVE_DELETE_ALL_DATA))
|
||||
return false;
|
||||
ShowString("Formatting drive, please wait...");
|
||||
ShowString("%s", STR_FORMATTING_DRIVE_PLEASE_WAIT);
|
||||
if (GetMountState() & IMG_NAND) InitImgFS(NULL);
|
||||
|
||||
|
||||
u8* buffer = (u8*) malloc(STD_BUFFER_SIZE);
|
||||
if (!buffer) bkpt;
|
||||
bool ret = (f_mkfs("8:", NULL, buffer, STD_BUFFER_SIZE) == FR_OK);
|
||||
free(buffer);
|
||||
|
||||
|
||||
if (ret) {
|
||||
f_setlabel("8:BONUS");
|
||||
InitExtFS();
|
||||
@ -124,20 +125,20 @@ bool SetupBonusDrive(void) {
|
||||
bool FileUnlock(const char* path) {
|
||||
FIL file;
|
||||
FRESULT res;
|
||||
|
||||
|
||||
if (!(DriveType(path) & DRV_FAT)) return true; // can't really check this
|
||||
if ((res = fx_open(&file, path, FA_READ | FA_OPEN_EXISTING)) != FR_OK) {
|
||||
char pathstr[32 + 1];
|
||||
char pathstr[UTF_BUFFER_BYTESIZE(32)];
|
||||
TruncateString(pathstr, path, 32, 8);
|
||||
if (GetMountState() && (res == FR_LOCKED) &&
|
||||
(ShowPrompt(true, "%s\nFile is currently mounted.\nUnmount to unlock?", pathstr))) {
|
||||
if (GetMountState() && (res == FR_LOCKED) &&
|
||||
(ShowPrompt(true, "%s\n%s", pathstr, STR_FILE_IS_MOUNTED_UNMOUNT_TO_UNLOCK))) {
|
||||
InitImgFS(NULL);
|
||||
if (fx_open(&file, path, FA_READ | FA_OPEN_EXISTING) != FR_OK)
|
||||
return false;
|
||||
} else return false;
|
||||
}
|
||||
fx_close(&file);
|
||||
|
||||
|
||||
return true;
|
||||
}
|
||||
|
||||
@ -161,25 +162,25 @@ size_t FileGetSize(const char* path) {
|
||||
return fno.fsize;
|
||||
}
|
||||
|
||||
bool FileGetSha256(const char* path, u8* sha256, u64 offset, u64 size) {
|
||||
bool FileGetSha(const char* path, u8* hash, u64 offset, u64 size, bool sha1) {
|
||||
bool ret = true;
|
||||
FIL file;
|
||||
u64 fsize;
|
||||
|
||||
|
||||
if (fvx_open(&file, path, FA_READ | FA_OPEN_EXISTING) != FR_OK)
|
||||
return false;
|
||||
|
||||
|
||||
fsize = fvx_size(&file);
|
||||
if (offset + size > fsize) return false;
|
||||
if (!size) size = fsize - offset;
|
||||
fvx_lseek(&file, offset);
|
||||
|
||||
|
||||
u32 bufsiz = min(STD_BUFFER_SIZE, fsize);
|
||||
u8* buffer = (u8*) malloc(bufsiz);
|
||||
if (!buffer) return false;
|
||||
|
||||
|
||||
ShowProgress(0, 0, path);
|
||||
sha_init(SHA256_MODE);
|
||||
sha_init(sha1 ? SHA1_MODE : SHA256_MODE);
|
||||
for (u64 pos = 0; (pos < size) && ret; pos += bufsiz) {
|
||||
UINT read_bytes = min(bufsiz, size - pos);
|
||||
UINT bytes_read = 0;
|
||||
@ -189,13 +190,13 @@ bool FileGetSha256(const char* path, u8* sha256, u64 offset, u64 size) {
|
||||
ret = false;
|
||||
sha_update(buffer, bytes_read);
|
||||
}
|
||||
|
||||
sha_get(sha256);
|
||||
|
||||
sha_get(hash);
|
||||
fvx_close(&file);
|
||||
free(buffer);
|
||||
|
||||
|
||||
ShowProgress(1, 1, path);
|
||||
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
@ -203,13 +204,13 @@ u32 FileFindData(const char* path, u8* data, u32 size_data, u32 offset_file) {
|
||||
FIL file; // used for FAT & virtual
|
||||
u64 found = (u64) -1;
|
||||
u64 fsize = FileGetSize(path);
|
||||
|
||||
|
||||
if (fvx_open(&file, path, FA_READ | FA_OPEN_EXISTING) != FR_OK)
|
||||
return found;
|
||||
|
||||
|
||||
u8* buffer = (u8*) malloc(STD_BUFFER_SIZE);
|
||||
if (!buffer) return false;
|
||||
|
||||
|
||||
// main routine
|
||||
for (u32 pass = 0; pass < 2; pass++) {
|
||||
bool show_progress = false;
|
||||
@ -236,10 +237,10 @@ u32 FileFindData(const char* path, u8* data, u32 size_data, u32 offset_file) {
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
free(buffer);
|
||||
fvx_close(&file);
|
||||
|
||||
|
||||
return found;
|
||||
}
|
||||
|
||||
@ -247,13 +248,13 @@ bool FileInjectFile(const char* dest, const char* orig, u64 off_dest, u64 off_or
|
||||
FIL ofile;
|
||||
FIL dfile;
|
||||
bool allow_expand = (flags && (*flags & ALLOW_EXPAND));
|
||||
|
||||
|
||||
if (!CheckWritePermissions(dest)) return false;
|
||||
if (strncasecmp(dest, orig, 256) == 0) {
|
||||
ShowPrompt(false, "Error: Can't inject file into itself");
|
||||
ShowPrompt(false, "%s", STR_ERROR_CANT_INJECT_FILE_INTO_ITSELF);
|
||||
return false;
|
||||
}
|
||||
|
||||
|
||||
// open destination / origin
|
||||
if (fvx_open(&dfile, dest, FA_WRITE | ((allow_expand) ? FA_OPEN_ALWAYS : FA_OPEN_EXISTING)) != FR_OK)
|
||||
return false;
|
||||
@ -266,23 +267,23 @@ bool FileInjectFile(const char* dest, const char* orig, u64 off_dest, u64 off_or
|
||||
fvx_lseek(&ofile, off_orig);
|
||||
if (!size && (off_orig < fvx_size(&ofile)))
|
||||
size = fvx_size(&ofile) - off_orig;
|
||||
|
||||
|
||||
// check file limits
|
||||
if (!allow_expand && (off_dest + size > fvx_size(&dfile))) {
|
||||
ShowPrompt(false, "Operation would write beyond end of file");
|
||||
ShowPrompt(false, "%s", STR_OPERATION_WOULD_WRITE_BEYOND_EOF);
|
||||
fvx_close(&dfile);
|
||||
fvx_close(&ofile);
|
||||
return false;
|
||||
} else if (off_orig + size > fvx_size(&ofile)) {
|
||||
ShowPrompt(false, "Not enough data in file");
|
||||
ShowPrompt(false, "%s", STR_NOT_ENOUGH_DATA_IN_FILE);
|
||||
fvx_close(&dfile);
|
||||
fvx_close(&ofile);
|
||||
return false;
|
||||
}
|
||||
|
||||
|
||||
u8* buffer = (u8*) malloc(STD_BUFFER_SIZE);
|
||||
if (!buffer) return false;
|
||||
|
||||
|
||||
bool ret = true;
|
||||
ShowProgress(0, 0, orig);
|
||||
for (u64 pos = 0; (pos < size) && ret; pos += STD_BUFFER_SIZE) {
|
||||
@ -295,46 +296,46 @@ bool FileInjectFile(const char* dest, const char* orig, u64 off_dest, u64 off_or
|
||||
ret = false;
|
||||
if (ret && !ShowProgress(pos + bytes_read, size, orig)) {
|
||||
if (flags && (*flags & NO_CANCEL)) {
|
||||
ShowPrompt(false, "Cancel is not allowed here");
|
||||
} else ret = !ShowPrompt(true, "B button detected. Cancel?");
|
||||
ShowPrompt(false, "%s", STR_CANCEL_IS_NOT_ALLOWED_HERE);
|
||||
} else ret = !ShowPrompt(true, "%s", STR_B_DETECTED_CANCEL);
|
||||
ShowProgress(0, 0, orig);
|
||||
ShowProgress(pos + bytes_read, size, orig);
|
||||
}
|
||||
}
|
||||
ShowProgress(1, 1, orig);
|
||||
|
||||
|
||||
free(buffer);
|
||||
fvx_close(&dfile);
|
||||
fvx_close(&ofile);
|
||||
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
bool FileSetByte(const char* dest, u64 offset, u64 size, u8 fillbyte, u32* flags) {
|
||||
FIL dfile;
|
||||
bool allow_expand = (flags && (*flags & ALLOW_EXPAND));
|
||||
|
||||
|
||||
if (!CheckWritePermissions(dest)) return false;
|
||||
|
||||
|
||||
// open destination
|
||||
if (fvx_open(&dfile, dest, FA_WRITE | ((allow_expand) ? FA_OPEN_ALWAYS : FA_OPEN_EXISTING)) != FR_OK)
|
||||
return false;
|
||||
fvx_lseek(&dfile, offset);
|
||||
if (!size && (offset < fvx_size(&dfile)))
|
||||
size = fvx_size(&dfile) - offset;
|
||||
|
||||
|
||||
// check file limits
|
||||
if (!allow_expand && (offset + size > fvx_size(&dfile))) {
|
||||
ShowPrompt(false, "Operation would write beyond end of file");
|
||||
ShowPrompt(false, "%s", STR_OPERATION_WOULD_WRITE_BEYOND_EOF);
|
||||
fvx_close(&dfile);
|
||||
return false;
|
||||
}
|
||||
|
||||
|
||||
u32 bufsiz = min(STD_BUFFER_SIZE, size);
|
||||
u8* buffer = (u8*) malloc(bufsiz);
|
||||
if (!buffer) return false;
|
||||
memset(buffer, fillbyte, bufsiz);
|
||||
|
||||
|
||||
bool ret = true;
|
||||
ShowProgress(0, 0, dest);
|
||||
for (u64 pos = 0; (pos < size) && ret; pos += bufsiz) {
|
||||
@ -345,26 +346,26 @@ bool FileSetByte(const char* dest, u64 offset, u64 size, u8 fillbyte, u32* flags
|
||||
ret = false;
|
||||
if (ret && !ShowProgress(pos + bytes_written, size, dest)) {
|
||||
if (flags && (*flags & NO_CANCEL)) {
|
||||
ShowPrompt(false, "Cancel is not allowed here");
|
||||
} else ret = !ShowPrompt(true, "B button detected. Cancel?");
|
||||
ShowPrompt(false, "%s", STR_CANCEL_IS_NOT_ALLOWED_HERE);
|
||||
} else ret = !ShowPrompt(true, "%s", STR_B_DETECTED_CANCEL);
|
||||
ShowProgress(0, 0, dest);
|
||||
ShowProgress(pos + bytes_written, size, dest);
|
||||
}
|
||||
}
|
||||
ShowProgress(1, 1, dest);
|
||||
|
||||
|
||||
free(buffer);
|
||||
fvx_close(&dfile);
|
||||
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
bool FileCreateDummy(const char* cpath, const char* filename, u64 size) {
|
||||
char npath[256]; // 256 is the maximum length of a full path
|
||||
if (!CheckWritePermissions(cpath)) return false;
|
||||
if (filename) snprintf(npath, 255, "%s/%s", cpath, filename);
|
||||
else snprintf(npath, 255, "%s", cpath);
|
||||
|
||||
if (filename) snprintf(npath, sizeof(npath), "%s/%s", cpath, filename);
|
||||
else snprintf(npath, sizeof(npath), "%s", cpath);
|
||||
|
||||
// create dummy file (fail if already existing)
|
||||
// then, expand the file size via cluster preallocation
|
||||
FIL dfile;
|
||||
@ -373,14 +374,14 @@ bool FileCreateDummy(const char* cpath, const char* filename, u64 size) {
|
||||
f_lseek(&dfile, size > 0xFFFFFFFF ? 0xFFFFFFFF : (FSIZE_t) size);
|
||||
f_sync(&dfile);
|
||||
fx_close(&dfile);
|
||||
|
||||
|
||||
return (fa_stat(npath, NULL) == FR_OK);
|
||||
}
|
||||
|
||||
bool DirCreate(const char* cpath, const char* dirname) {
|
||||
char npath[256]; // 256 is the maximum length of a full path
|
||||
if (!CheckWritePermissions(cpath)) return false;
|
||||
snprintf(npath, 255, "%s/%s", cpath, dirname);
|
||||
snprintf(npath, sizeof(npath), "%s/%s", cpath, dirname);
|
||||
if (fa_mkdir(npath) != FR_OK) return false;
|
||||
return (fa_stat(npath, NULL) == FR_OK);
|
||||
}
|
||||
@ -425,7 +426,7 @@ bool DirInfoWorker(char* fpath, bool virtual, u64* tsize, u32* tdirs, u32* tfile
|
||||
}
|
||||
f_closedir(&pdir);
|
||||
}
|
||||
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
@ -448,24 +449,25 @@ bool PathMoveCopyRec(char* dest, char* orig, u32* flags, bool move, u8* buffer,
|
||||
bool silent = (flags && (*flags & SILENT));
|
||||
bool append = (flags && (*flags & APPEND_ALL));
|
||||
bool calcsha = (flags && (*flags & CALC_SHA) && !append);
|
||||
bool sha1 = (flags && (*flags & USE_SHA1));
|
||||
bool ret = false;
|
||||
|
||||
|
||||
// check destination write permission (special paths only)
|
||||
if (((*dest == '1') || (strncmp(dest, "0:/Nintendo 3DS", 16) == 0)) &&
|
||||
(!flags || !(*flags & OVERRIDE_PERM)) &&
|
||||
(!flags || !(*flags & OVERRIDE_PERM)) &&
|
||||
!CheckWritePermissions(dest)) return false;
|
||||
|
||||
|
||||
FILINFO fno;
|
||||
if (fvx_stat(orig, &fno) != FR_OK) return false; // origin does not exist
|
||||
if (move && (to_virtual || fno.fattrib & AM_VRT)) return false; // trying to move a virtual file
|
||||
|
||||
|
||||
// path string (for output)
|
||||
char deststr[36 + 1];
|
||||
char deststr[UTF_BUFFER_BYTESIZE(36)];
|
||||
TruncateString(deststr, dest, 36, 8);
|
||||
|
||||
|
||||
// the copy process takes place here
|
||||
if (!ShowProgress(0, 0, orig) && !(flags && (*flags & NO_CANCEL))) {
|
||||
if (ShowPrompt(true, "%s\nB button detected. Cancel?", deststr)) return false;
|
||||
if (ShowPrompt(true, "%s\n%s", deststr, STR_B_DETECTED_CANCEL)) return false;
|
||||
ShowProgress(0, 0, orig);
|
||||
}
|
||||
if (move && fvx_stat(dest, NULL) != FR_OK) { // moving if dest not existing
|
||||
@ -473,24 +475,24 @@ bool PathMoveCopyRec(char* dest, char* orig, u32* flags, bool move, u8* buffer,
|
||||
} else if (fno.fattrib & AM_DIR) { // processing folders (same for move & copy)
|
||||
DIR pdir;
|
||||
char* fname = orig + strnlen(orig, 256);
|
||||
|
||||
|
||||
if (append) {
|
||||
if (!silent) ShowPrompt(false, "%s\nError: Cannot append a folder", deststr);
|
||||
if (!silent) ShowPrompt(false, "%s\n%s", deststr, STR_ERROR_CANNOT_APPEND_FOLDER);
|
||||
return false;
|
||||
}
|
||||
|
||||
|
||||
// create the destination folder if it does not already exist
|
||||
if (fvx_opendir(&pdir, dest) != FR_OK) {
|
||||
if (fvx_mkdir(dest) != FR_OK) {
|
||||
if (!silent) ShowPrompt(false, "%s\nError: Overwriting file with dir", deststr);
|
||||
if (!silent) ShowPrompt(false, "%s\n%s", deststr, STR_ERROR_OVERWRITING_FILE_WITH_DIR);
|
||||
return false;
|
||||
}
|
||||
} else fvx_closedir(&pdir);
|
||||
|
||||
|
||||
if (fvx_opendir(&pdir, orig) != FR_OK)
|
||||
return false;
|
||||
*(fname++) = '/';
|
||||
|
||||
|
||||
while (fvx_readdir(&pdir, &fno) == FR_OK) {
|
||||
if ((strncmp(fno.fname, ".", 2) == 0) || (strncmp(fno.fname, "..", 3) == 0))
|
||||
continue; // filter out virtual entries
|
||||
@ -509,13 +511,13 @@ bool PathMoveCopyRec(char* dest, char* orig, u32* flags, bool move, u8* buffer,
|
||||
if (!res) break;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
fvx_closedir(&pdir);
|
||||
*(--fname) = '\0';
|
||||
} else if (move) { // moving if destination exists
|
||||
if (fvx_stat(dest, &fno) != FR_OK) return false;
|
||||
if (fno.fattrib & AM_DIR) {
|
||||
if (!silent) ShowPrompt(false, "%s\nError: Overwriting dir with file", deststr);
|
||||
if (!silent) ShowPrompt(false, "%s\n%s", deststr, STR_ERROR_OVERWRITING_DIR_WITH_FILE);
|
||||
return false;
|
||||
}
|
||||
if (fvx_unlink(dest) != FR_OK) return false;
|
||||
@ -525,37 +527,37 @@ bool PathMoveCopyRec(char* dest, char* orig, u32* flags, bool move, u8* buffer,
|
||||
FIL dfile;
|
||||
u64 osize;
|
||||
u64 dsize;
|
||||
|
||||
|
||||
if (fvx_open(&ofile, orig, FA_READ | FA_OPEN_EXISTING) != FR_OK) {
|
||||
if (!FileUnlock(orig) || (fvx_open(&ofile, orig, FA_READ | FA_OPEN_EXISTING) != FR_OK))
|
||||
return false;
|
||||
ShowProgress(0, 0, orig); // reinit progress bar
|
||||
}
|
||||
|
||||
|
||||
if ((!append || (fvx_open(&dfile, dest, FA_WRITE | FA_OPEN_EXISTING) != FR_OK)) &&
|
||||
(fvx_open(&dfile, dest, FA_WRITE | FA_CREATE_ALWAYS) != FR_OK)) {
|
||||
if (!silent) ShowPrompt(false, "%s\nError: Cannot open destination file", deststr);
|
||||
if (!silent) ShowPrompt(false, "%s\n%s", deststr, STR_ERROR_CANNOT_OPEN_DESTINATION_FILE);
|
||||
fvx_close(&ofile);
|
||||
return false;
|
||||
}
|
||||
|
||||
|
||||
ret = true; // destination file exists by now, so we need to handle deletion
|
||||
osize = fvx_size(&ofile);
|
||||
dsize = append ? fvx_size(&dfile) : 0; // always 0 if not appending to file
|
||||
if ((fvx_lseek(&dfile, (osize + dsize)) != FR_OK) || (fvx_sync(&dfile) != FR_OK) || (fvx_tell(&dfile) != (osize + dsize))) { // check space via cluster preallocation
|
||||
if (!silent) ShowPrompt(false, "%s\nError: Not enough space available", deststr);
|
||||
if (!silent) ShowPrompt(false, "%s\n%s", deststr, STR_ERROR_NOT_ENOUGH_SPACE_AVAILABLE);
|
||||
ret = false;
|
||||
}
|
||||
|
||||
|
||||
fvx_lseek(&dfile, dsize);
|
||||
fvx_sync(&dfile);
|
||||
fvx_lseek(&ofile, 0);
|
||||
fvx_sync(&ofile);
|
||||
|
||||
if (calcsha) sha_init(SHA256_MODE);
|
||||
|
||||
if (calcsha) sha_init(sha1 ? SHA1_MODE : SHA256_MODE);
|
||||
for (u64 pos = 0; (pos < osize) && ret; pos += bufsiz) {
|
||||
UINT bytes_read = 0;
|
||||
UINT bytes_written = 0;
|
||||
UINT bytes_written = 0;
|
||||
if ((fvx_read(&ofile, buffer, bufsiz, &bytes_read) != FR_OK) ||
|
||||
(fvx_write(&dfile, buffer, bytes_read, &bytes_written) != FR_OK) ||
|
||||
(bytes_read != bytes_written))
|
||||
@ -565,8 +567,8 @@ bool PathMoveCopyRec(char* dest, char* orig, u32* flags, bool move, u8* buffer,
|
||||
u64 total = osize;
|
||||
if (ret && !ShowProgress(current, total, orig)) {
|
||||
if (flags && (*flags & NO_CANCEL)) {
|
||||
ShowPrompt(false, "%s\nCancel is not allowed here", deststr);
|
||||
} else ret = !ShowPrompt(true, "%s\nB button detected. Cancel?", deststr);
|
||||
ShowPrompt(false, "%s\n%s", deststr, STR_CANCEL_IS_NOT_ALLOWED_HERE);
|
||||
} else ret = !ShowPrompt(true, "%s\n%s", deststr, STR_B_DETECTED_CANCEL);
|
||||
ShowProgress(0, 0, orig);
|
||||
ShowProgress(current, total, orig);
|
||||
}
|
||||
@ -574,20 +576,20 @@ bool PathMoveCopyRec(char* dest, char* orig, u32* flags, bool move, u8* buffer,
|
||||
sha_update(buffer, bytes_read);
|
||||
}
|
||||
ShowProgress(1, 1, orig);
|
||||
|
||||
|
||||
fvx_close(&ofile);
|
||||
fvx_close(&dfile);
|
||||
if (!ret && ((dsize == 0) || (fvx_lseek(&dfile, dsize) != FR_OK) || (f_truncate(&dfile) != FR_OK))) {
|
||||
fvx_unlink(dest);
|
||||
} else if (!to_virtual && calcsha) {
|
||||
u8 sha256[0x20];
|
||||
u8 hash[0x20];
|
||||
char* ext_sha = dest + strnlen(dest, 256);
|
||||
strncpy(ext_sha, ".sha", 256 - (ext_sha - dest));
|
||||
sha_get(sha256);
|
||||
FileSetData(dest, sha256, 0x20, 0, true);
|
||||
snprintf(ext_sha, 256 - (ext_sha - dest), ".sha%c", sha1 ? '1' : '\0');
|
||||
sha_get(hash);
|
||||
FileSetData(dest, hash, sha1 ? 20 : 32, 0, true);
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
@ -597,45 +599,45 @@ bool PathMoveCopy(const char* dest, const char* orig, u32* flags, bool move) {
|
||||
if (!CheckWritePermissions(dest)) return false;
|
||||
if (move && !CheckDirWritePermissions(orig)) return false;
|
||||
}
|
||||
|
||||
|
||||
// reset local flags
|
||||
if (flags) *flags = *flags & ~(SKIP_CUR|OVERWRITE_CUR);
|
||||
|
||||
|
||||
// preparations
|
||||
int ddrvtype = DriveType(dest);
|
||||
int odrvtype = DriveType(orig);
|
||||
char ldest[256]; // 256 is the maximum length of a full path
|
||||
char lorig[256];
|
||||
strncpy(ldest, dest, 255);
|
||||
strncpy(lorig, orig, 255);
|
||||
char deststr[36 + 1];
|
||||
strncpy(ldest, dest, 256);
|
||||
strncpy(lorig, orig, 256);
|
||||
char deststr[UTF_BUFFER_BYTESIZE(36)];
|
||||
TruncateString(deststr, ldest, 36, 8);
|
||||
|
||||
|
||||
// moving only for regular FAT drives (= not alias drives)
|
||||
if (move && !(ddrvtype & odrvtype & DRV_STDFAT)) {
|
||||
ShowPrompt(false, "Error: Only FAT files can be moved");
|
||||
ShowPrompt(false, "%s", STR_ERROR_ONLY_FAT_FILES_CAN_BE_MOVED);
|
||||
return false;
|
||||
}
|
||||
|
||||
|
||||
// is destination part of origin?
|
||||
u32 olen = strnlen(lorig, 255);
|
||||
if ((strncasecmp(ldest, lorig, olen) == 0) && (ldest[olen] == '/')) {
|
||||
ShowPrompt(false, "%s\nError: Destination is part of origin", deststr);
|
||||
ShowPrompt(false, "%s\n%s", deststr, STR_ERROR_DESTINATION_IS_PART_OF_ORIGIN);
|
||||
return false;
|
||||
}
|
||||
|
||||
|
||||
if (!(ddrvtype & DRV_VIRTUAL)) { // FAT destination handling
|
||||
// get destination name
|
||||
char* dname = strrchr(ldest, '/');
|
||||
if (!dname) return false;
|
||||
dname++;
|
||||
|
||||
|
||||
// check & fix destination == origin
|
||||
while (strncasecmp(ldest, lorig, 255) == 0) {
|
||||
if (!ShowKeyboardOrPrompt(dname, 255 - (dname - ldest), "%s\nDestination equals origin\nChoose another name?", deststr))
|
||||
if (!ShowKeyboardOrPrompt(dname, 255 - (dname - ldest), "%s\n%s", deststr, STR_ERROR_DESTINATION_EQUALS_ORIGIN_CHOOSE_ANOTHER_NAME))
|
||||
return false;
|
||||
}
|
||||
|
||||
|
||||
// check if destination exists
|
||||
if (flags && !(*flags & (OVERWRITE_CUR|OVERWRITE_ALL|APPEND_ALL)) && (fa_stat(ldest, NULL) == FR_OK)) {
|
||||
if (*flags & SKIP_ALL) {
|
||||
@ -643,12 +645,11 @@ bool PathMoveCopy(const char* dest, const char* orig, u32* flags, bool move) {
|
||||
return true;
|
||||
}
|
||||
const char* optionstr[5] =
|
||||
{"Choose new name", "Overwrite file(s)", "Skip file(s)", "Overwrite all", "Skip all"};
|
||||
u32 user_select = ShowSelectPrompt((*flags & ASK_ALL) ? 5 : 3, optionstr,
|
||||
"Destination already exists:\n%s", deststr);
|
||||
{STR_CHOOSE_NEW_NAME, STR_OVERWRITE_FILES, STR_SKIP_FILES, STR_OVERWRITE_ALL, STR_SKIP_ALL};
|
||||
u32 user_select = ShowSelectPrompt((*flags & ASK_ALL) ? 5 : 3, optionstr, STR_DESTINATION_ALREADY_EXISTS, deststr);
|
||||
if (user_select == 1) {
|
||||
do {
|
||||
if (!ShowKeyboardOrPrompt(dname, 255 - (dname - ldest), "Choose new destination name"))
|
||||
if (!ShowKeyboardOrPrompt(dname, 255 - (dname - ldest), "%s", STR_CHOOSE_NEW_DESTINATION_NAME))
|
||||
return false;
|
||||
} while (fa_stat(ldest, NULL) == FR_OK);
|
||||
} else if (user_select == 2) {
|
||||
@ -665,29 +666,29 @@ bool PathMoveCopy(const char* dest, const char* orig, u32* flags, bool move) {
|
||||
return false;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
// ensure the destination path exists
|
||||
if (flags && (*flags & BUILD_PATH)) fvx_rmkpath(ldest);
|
||||
|
||||
|
||||
// setup buffer
|
||||
u8* buffer = (u8*) malloc(STD_BUFFER_SIZE);
|
||||
if (!buffer) {
|
||||
ShowPrompt(false, "Out of memory.");
|
||||
ShowPrompt(false, "%s", STR_OUT_OF_MEMORY);
|
||||
return false;
|
||||
}
|
||||
|
||||
|
||||
// actual move / copy operation
|
||||
bool same_drv = (strncasecmp(lorig, ldest, 2) == 0);
|
||||
bool res = PathMoveCopyRec(ldest, lorig, flags, move && same_drv, buffer, STD_BUFFER_SIZE);
|
||||
if (move && res && (!flags || !(*flags&SKIP_CUR))) PathDelete(lorig);
|
||||
|
||||
|
||||
free(buffer);
|
||||
return res;
|
||||
} else { // virtual destination handling
|
||||
// can't write an SHA file to a virtual destination
|
||||
if (flags) *flags &= ~CALC_SHA;
|
||||
bool force_unmount = false;
|
||||
|
||||
|
||||
// handle NAND image unmounts
|
||||
if ((ddrvtype & (DRV_SYSNAND|DRV_EMUNAND|DRV_IMAGE)) && !(GetVirtualSource(dest) & (VRT_DISADIFF | VRT_BDRI))) {
|
||||
FILINFO fno;
|
||||
@ -695,31 +696,31 @@ bool PathMoveCopy(const char* dest, const char* orig, u32* flags, bool move) {
|
||||
if ((fvx_stat(ldest, &fno) == FR_OK) && (fno.fsize > 4 * 1024 * 1024))
|
||||
force_unmount = true;
|
||||
}
|
||||
|
||||
|
||||
// prevent illegal operations
|
||||
if (force_unmount && (odrvtype & ddrvtype & (DRV_SYSNAND|DRV_EMUNAND|DRV_IMAGE))) {
|
||||
ShowPrompt(false, "Copy operation is not allowed");
|
||||
return false;
|
||||
}
|
||||
|
||||
// check destination == origin
|
||||
if (strncasecmp(ldest, lorig, 255) == 0) {
|
||||
ShowPrompt(false, "%s\nDestination equals origin", deststr);
|
||||
ShowPrompt(false, "%s", STR_COPY_OPERATION_IS_NOT_ALLOWED);
|
||||
return false;
|
||||
}
|
||||
|
||||
|
||||
// check destination == origin
|
||||
if (strncasecmp(ldest, lorig, 255) == 0) {
|
||||
ShowPrompt(false, "%s\n%s", deststr, STR_DESTINATION_EQUALS_ORIGIN);
|
||||
return false;
|
||||
}
|
||||
|
||||
// setup buffer
|
||||
u8* buffer = (u8*) malloc(STD_BUFFER_SIZE);
|
||||
if (!buffer) {
|
||||
ShowPrompt(false, "Out of memory.");
|
||||
ShowPrompt(false, "%s", STR_OUT_OF_MEMORY);
|
||||
return false;
|
||||
}
|
||||
|
||||
|
||||
// actual virtual copy operation
|
||||
if (force_unmount) DismountDriveType(DriveType(ldest)&(DRV_SYSNAND|DRV_EMUNAND|DRV_IMAGE));
|
||||
bool res = PathMoveCopyRec(ldest, lorig, flags, false, buffer, STD_BUFFER_SIZE);
|
||||
if (force_unmount) InitExtFS();
|
||||
|
||||
|
||||
free(buffer);
|
||||
return res;
|
||||
}
|
||||
@ -730,8 +731,8 @@ bool PathCopy(const char* destdir, const char* orig, u32* flags) {
|
||||
char dest[256]; // maximum path name length in FAT
|
||||
char* oname = strrchr(orig, '/');
|
||||
if (oname == NULL) return false; // not a proper origin path
|
||||
snprintf(dest, 255, "%s/%s", destdir, (++oname));
|
||||
|
||||
snprintf(dest, sizeof(dest), "%s/%s", destdir, (++oname));
|
||||
|
||||
// virtual destination special handling
|
||||
if (GetVirtualSource(destdir) & ~VRT_BDRI) {
|
||||
u64 osize = FileGetSize(orig);
|
||||
@ -744,12 +745,12 @@ bool PathCopy(const char* destdir, const char* orig, u32* flags) {
|
||||
if (!ReadVirtualDir(&dvfile, &vdir)) return false;
|
||||
if (dvfile.size == osize) break; // file found
|
||||
}
|
||||
if (!ShowPrompt(true, "Entry not found: %s\nInject into %s instead?", dest, dvfile.name))
|
||||
if (!ShowPrompt(true, STR_ENTRY_NOT_FOUND_PATH_INJECT_INTO_PATH_INSTEAD, dest, dvfile.name))
|
||||
return false;
|
||||
snprintf(dest, 255, "%s/%s", destdir, dvfile.name);
|
||||
snprintf(dest, sizeof(dest), "%s/%s", destdir, dvfile.name);
|
||||
} else if (osize < dvfile.size) { // if origin is smaller than destination...
|
||||
char deststr[36 + 1];
|
||||
char origstr[36 + 1];
|
||||
char deststr[UTF_BUFFER_BYTESIZE(36)];
|
||||
char origstr[UTF_BUFFER_BYTESIZE(36)];
|
||||
char osizestr[32];
|
||||
char dsizestr[32];
|
||||
TruncateString(deststr, dest, 36, 8);
|
||||
@ -757,12 +758,12 @@ bool PathCopy(const char* destdir, const char* orig, u32* flags) {
|
||||
FormatBytes(osizestr, osize);
|
||||
FormatBytes(dsizestr, dvfile.size);
|
||||
if (dvfile.size > osize) {
|
||||
if (!ShowPrompt(true, "File smaller than available space:\n%s (%s)\n%s (%s)\nContinue?", origstr, osizestr, deststr, dsizestr))
|
||||
if (!ShowPrompt(true, STR_FILE_SMALLER_THAN_SPACE_SIZES_CONTINUE, origstr, osizestr, deststr, dsizestr))
|
||||
return false;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
return PathMoveCopy(dest, orig, flags, false);
|
||||
}
|
||||
|
||||
@ -771,8 +772,8 @@ bool PathMove(const char* destdir, const char* orig, u32* flags) {
|
||||
char dest[256]; // maximum path name length in FAT
|
||||
char* oname = strrchr(orig, '/');
|
||||
if (oname == NULL) return false; // not a proper origin path
|
||||
snprintf(dest, 255, "%s/%s", destdir, (++oname));
|
||||
|
||||
snprintf(dest, sizeof(dest), "%s/%s", destdir, (++oname));
|
||||
|
||||
return PathMoveCopy(dest, orig, flags, true);
|
||||
}
|
||||
|
||||
@ -784,13 +785,13 @@ bool PathDelete(const char* path) {
|
||||
bool PathRename(const char* path, const char* newname) {
|
||||
char npath[256]; // 256 is the maximum length of a full path
|
||||
char* oldname = strrchr(path, '/');
|
||||
|
||||
|
||||
if (!CheckDirWritePermissions(path)) return false;
|
||||
if (!oldname) return false;
|
||||
oldname++;
|
||||
strncpy(npath, path, oldname - path);
|
||||
strncpy(npath + (oldname - path), newname, 255 - (oldname - path));
|
||||
|
||||
|
||||
if (fvx_rename(path, npath) != FR_OK) return false;
|
||||
if ((strncasecmp(path, npath, 256) != 0) &&
|
||||
((fvx_stat(path, NULL) == FR_OK) || (fvx_stat(npath, NULL) != FR_OK)))
|
||||
@ -808,20 +809,20 @@ bool FileSelectorWorker(char* result, const char* text, const char* path, const
|
||||
char path_local[256];
|
||||
strncpy(path_local, path, 256);
|
||||
path_local[255] = '\0';
|
||||
|
||||
|
||||
bool no_dirs = flags & NO_DIRS;
|
||||
bool no_files = flags & NO_FILES;
|
||||
bool hide_ext = flags & HIDE_EXT;
|
||||
bool select_dirs = flags & SELECT_DIRS;
|
||||
|
||||
|
||||
// main loop
|
||||
while (true) {
|
||||
u32 n_found = 0;
|
||||
u32 pos = 0;
|
||||
GetDirContents(contents, path_local);
|
||||
|
||||
|
||||
while (pos < contents->n_entries) {
|
||||
char opt_names[_MAX_FS_OPT+1][32+1];
|
||||
char opt_names[_MAX_FS_OPT+1][UTF_BUFFER_BYTESIZE(32)];
|
||||
DirEntry* res_entry[MAX_DIR_ENTRIES+1] = { NULL };
|
||||
u32 n_opt = 0;
|
||||
for (; pos < contents->n_entries; pos++) {
|
||||
@ -831,13 +832,13 @@ bool FileSelectorWorker(char* result, const char* text, const char* path, const
|
||||
(entry->type == T_DOTDOT) || (strncmp(entry->name, "._", 2) == 0))
|
||||
continue;
|
||||
if (!new_style && n_opt == _MAX_FS_OPT) {
|
||||
snprintf(opt_names[n_opt++], 32, "[more...]");
|
||||
snprintf(opt_names[n_opt++], 32, "%s", STR_BRACKET_MORE);
|
||||
break;
|
||||
}
|
||||
|
||||
|
||||
if (!new_style) {
|
||||
char temp_str[256];
|
||||
snprintf(temp_str, 256, "%s", entry->name);
|
||||
snprintf(temp_str, sizeof(temp_str), "%s", entry->name);
|
||||
if (hide_ext && (entry->type == T_FILE)) {
|
||||
char* dot = strrchr(temp_str, '.');
|
||||
if (dot) *dot = '\0';
|
||||
@ -848,9 +849,9 @@ bool FileSelectorWorker(char* result, const char* text, const char* path, const
|
||||
n_found++;
|
||||
}
|
||||
if ((pos >= contents->n_entries) && (n_opt < n_found) && !new_style)
|
||||
snprintf(opt_names[n_opt++], 32, "[more...]");
|
||||
snprintf(opt_names[n_opt++], 32, "%s", STR_BRACKET_MORE);
|
||||
if (!n_opt) break;
|
||||
|
||||
|
||||
const char* optionstr[_MAX_FS_OPT+1] = { NULL };
|
||||
for (u32 i = 0; i <= _MAX_FS_OPT; i++) optionstr[i] = opt_names[i];
|
||||
u32 user_select = new_style ? ShowFileScrollPrompt(n_opt, (const DirEntry**)res_entry, hide_ext, "%s", text)
|
||||
@ -871,10 +872,10 @@ bool FileSelectorWorker(char* result, const char* text, const char* path, const
|
||||
}
|
||||
}
|
||||
if (!n_found) { // not a single matching entry found
|
||||
char pathstr[32+1];
|
||||
char pathstr[UTF_BUFFER_BYTESIZE(32)];
|
||||
TruncateString(pathstr, path_local, 32, 8);
|
||||
ShowPrompt(false, "%s\nNo usable entries found.", pathstr);
|
||||
return false;
|
||||
ShowPrompt(false, "%s\n%s", pathstr, STR_NO_USABLE_ENTRIES_FOUND);
|
||||
return false;
|
||||
}
|
||||
}
|
||||
}
|
||||
@ -882,7 +883,8 @@ bool FileSelectorWorker(char* result, const char* text, const char* path, const
|
||||
bool FileSelector(char* result, const char* text, const char* path, const char* pattern, u32 flags, bool new_style) {
|
||||
void* buffer = (void*) malloc(sizeof(DirStruct));
|
||||
if (!buffer) return false;
|
||||
|
||||
|
||||
// for this to work, result needs to be at least 256 bytes in size
|
||||
bool ret = FileSelectorWorker(result, text, path, pattern, flags, buffer, new_style);
|
||||
free(buffer);
|
||||
return ret;
|
||||
|
@ -7,12 +7,13 @@
|
||||
#define NO_CANCEL (1UL<<1)
|
||||
#define SILENT (1UL<<2)
|
||||
#define CALC_SHA (1UL<<3)
|
||||
#define BUILD_PATH (1UL<<4)
|
||||
#define ALLOW_EXPAND (1UL<<5)
|
||||
#define ASK_ALL (1UL<<6)
|
||||
#define SKIP_ALL (1UL<<7)
|
||||
#define OVERWRITE_ALL (1UL<<8)
|
||||
#define APPEND_ALL (1UL<<9)
|
||||
#define USE_SHA1 (1UL<<4)
|
||||
#define BUILD_PATH (1UL<<5)
|
||||
#define ALLOW_EXPAND (1UL<<6)
|
||||
#define ASK_ALL (1UL<<7)
|
||||
#define SKIP_ALL (1UL<<8)
|
||||
#define OVERWRITE_ALL (1UL<<9)
|
||||
#define APPEND_ALL (1UL<<10)
|
||||
|
||||
// file selector flags
|
||||
#define NO_DIRS (1UL<<0)
|
||||
@ -43,7 +44,7 @@ size_t FileGetData(const char* path, void* data, size_t size, size_t foffset);
|
||||
size_t FileGetSize(const char* path);
|
||||
|
||||
/** Get SHA-256 of file **/
|
||||
bool FileGetSha256(const char* path, u8* sha256, u64 offset, u64 size);
|
||||
bool FileGetSha(const char* path, u8* hash, u64 offset, u64 size, bool sha1);
|
||||
|
||||
/** Find data in file **/
|
||||
u32 FileFindData(const char* path, u8* data, u32 size_data, u32 offset_file);
|
||||
|
@ -17,7 +17,7 @@ int ReadImageBytes(void* buffer, u64 offset, u64 count) {
|
||||
if (!mount_state) return FR_INVALID_OBJECT;
|
||||
if (fvx_tell(&mount_file) != offset) {
|
||||
if (fvx_size(&mount_file) < offset) return -1;
|
||||
fvx_lseek(&mount_file, offset);
|
||||
fvx_lseek(&mount_file, offset);
|
||||
}
|
||||
ret = fvx_read(&mount_file, buffer, count, &bytes_read);
|
||||
return (ret != 0) ? (int) ret : (bytes_read != count) ? -1 : 0;
|
||||
@ -74,6 +74,6 @@ u64 MountImage(const char* path) {
|
||||
return 0;
|
||||
fvx_lseek(&mount_file, 0);
|
||||
fvx_sync(&mount_file);
|
||||
strncpy(mount_path, path, 255);
|
||||
strncpy(mount_path, path, 256);
|
||||
return (mount_state = type);
|
||||
}
|
||||
|
@ -35,14 +35,14 @@ int alias_num (const TCHAR* path) {
|
||||
void dealias_path (TCHAR* alias, const TCHAR* path) {
|
||||
int num = alias_num(path);
|
||||
u32 p_offs = (path[2] == '/' && ((path[3] == '/') || (path[3] == '\0'))) ? 3 : 2;
|
||||
if (num >= 0) // set alias (alias is assumed to be 256 byte)
|
||||
if (num >= 0) // set alias (alias is assumed to be 256 byte!)
|
||||
snprintf(alias, 256, "%s%s", alias_path[num], path + p_offs);
|
||||
else strncpy(alias, path, 256);
|
||||
else snprintf(alias, 256, "%s", path);
|
||||
}
|
||||
|
||||
FilCryptInfo* fx_find_cryptinfo(FIL* fptr) {
|
||||
FilCryptInfo* info = NULL;
|
||||
|
||||
|
||||
for (u32 i = 0; i < NUM_FILCRYPTINFO; i++) {
|
||||
if (!info && !filcrypt[i].fptr) // use first free
|
||||
info = &filcrypt[i];
|
||||
@ -51,7 +51,7 @@ FilCryptInfo* fx_find_cryptinfo(FIL* fptr) {
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
return info;
|
||||
}
|
||||
|
||||
@ -59,27 +59,27 @@ FRESULT fx_decrypt_dsiware (FIL* fp, void* buff, FSIZE_t ofs, UINT len) {
|
||||
const u32 mode = AES_CNT_TITLEKEY_DECRYPT_MODE;
|
||||
const u32 num_tbl = sizeof(TadContentTable) / sizeof(u32);
|
||||
const FSIZE_t ofs0 = f_tell(fp);
|
||||
|
||||
|
||||
u8 __attribute__((aligned(16))) iv[AES_BLOCK_SIZE];
|
||||
u32 tbl[num_tbl];
|
||||
u8 hdr[TAD_HEADER_LEN];
|
||||
|
||||
|
||||
FRESULT res;
|
||||
UINT br;
|
||||
|
||||
|
||||
|
||||
|
||||
// read and decrypt header
|
||||
if ((res = f_lseek(fp, TAD_HEADER_OFFSET)) != FR_OK) return res;
|
||||
if ((res = f_read(fp, hdr, TAD_HEADER_LEN, &br)) != FR_OK) return res;
|
||||
if (br != TAD_HEADER_LEN) return FR_DENIED;
|
||||
memcpy(iv, hdr + TAD_HEADER_LEN - AES_BLOCK_SIZE, AES_BLOCK_SIZE);
|
||||
cbc_decrypt(hdr, hdr, sizeof(TadHeader) / AES_BLOCK_SIZE, mode, iv);
|
||||
|
||||
|
||||
// setup the table
|
||||
if (BuildTadContentTable(tbl, hdr) != 0) return FR_DENIED;
|
||||
if (tbl[num_tbl-1] > f_size(fp)) return FR_DENIED; // obviously missing data
|
||||
|
||||
|
||||
|
||||
|
||||
// process sections
|
||||
u32 sct_start = 0;
|
||||
u32 sct_end = 0;
|
||||
@ -87,21 +87,21 @@ FRESULT fx_decrypt_dsiware (FIL* fp, void* buff, FSIZE_t ofs, UINT len) {
|
||||
sct_end = tbl[i];
|
||||
if (sct_start == sct_end) continue; // nothing in section
|
||||
if ((ofs + len <= sct_start) || (ofs >= sct_end)) continue; // section not in data
|
||||
|
||||
|
||||
const u32 crypt_end = sct_end - (AES_BLOCK_SIZE * 2);
|
||||
const u32 data_end = min(crypt_end, ofs + len);
|
||||
u32 data_pos = max(ofs, sct_start);
|
||||
if (ofs >= crypt_end) continue; // nothing to do
|
||||
|
||||
|
||||
if ((sct_start < ofs) || (sct_end > ofs + len)) { // incomplete section, ugh
|
||||
u8 __attribute__((aligned(16))) block[AES_BLOCK_SIZE];
|
||||
|
||||
|
||||
// load iv0
|
||||
FSIZE_t block0_ofs = data_pos - (data_pos % AES_BLOCK_SIZE);
|
||||
FSIZE_t iv0_ofs = ((block0_ofs > sct_start) ? block0_ofs : sct_end) - AES_BLOCK_SIZE;
|
||||
if ((res = f_lseek(fp, iv0_ofs)) != FR_OK) return res;
|
||||
if ((res = f_read(fp, iv, AES_BLOCK_SIZE, &br)) != FR_OK) return res;
|
||||
|
||||
|
||||
// load and decrypt block0 (if misaligned)
|
||||
if (data_pos % AES_BLOCK_SIZE) {
|
||||
if ((res = f_lseek(fp, block0_ofs)) != FR_OK) return res;
|
||||
@ -110,7 +110,7 @@ FRESULT fx_decrypt_dsiware (FIL* fp, void* buff, FSIZE_t ofs, UINT len) {
|
||||
data_pos = min(block0_ofs + AES_BLOCK_SIZE, data_end);
|
||||
memcpy(buff, block + (ofs - block0_ofs), data_pos - ofs);
|
||||
}
|
||||
|
||||
|
||||
// decrypt blocks in between
|
||||
u32 num_blocks = (data_end - data_pos) / AES_BLOCK_SIZE;
|
||||
if (num_blocks) {
|
||||
@ -118,7 +118,7 @@ FRESULT fx_decrypt_dsiware (FIL* fp, void* buff, FSIZE_t ofs, UINT len) {
|
||||
cbc_decrypt(blocks, blocks, num_blocks, mode, iv);
|
||||
data_pos += num_blocks * AES_BLOCK_SIZE;
|
||||
}
|
||||
|
||||
|
||||
// decrypt last block
|
||||
if (data_pos < data_end) {
|
||||
u8* lbuff = (u8*) buff + (data_pos - ofs);
|
||||
@ -137,7 +137,7 @@ FRESULT fx_decrypt_dsiware (FIL* fp, void* buff, FSIZE_t ofs, UINT len) {
|
||||
cbc_decrypt(blocks, blocks, num_blocks, mode, iv);
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
return f_lseek(fp, ofs0);
|
||||
}
|
||||
|
||||
@ -145,7 +145,7 @@ FRESULT fx_open (FIL* fp, const TCHAR* path, BYTE mode) {
|
||||
int num = alias_num(path);
|
||||
FilCryptInfo* info = fx_find_cryptinfo(fp);
|
||||
if (info) info->fptr = NULL;
|
||||
|
||||
|
||||
if (info && (num >= 0)) {
|
||||
// DSIWare Export, mark with the magic number
|
||||
if (strncmp(path + 2, "/" DSIWARE_MAGIC, 1 + 16) == 0) {
|
||||
@ -172,7 +172,7 @@ FRESULT fx_open (FIL* fp, const TCHAR* path, BYTE mode) {
|
||||
memcpy(info->keyy, sd_keyy[num], 16);
|
||||
info->fptr = fp;
|
||||
}
|
||||
|
||||
|
||||
return fa_open(fp, path, mode);
|
||||
}
|
||||
|
||||
@ -193,12 +193,12 @@ FRESULT fx_write (FIL* fp, const void* buff, UINT btw, UINT* bw) {
|
||||
FilCryptInfo* info = fx_find_cryptinfo(fp);
|
||||
FSIZE_t off = f_tell(fp);
|
||||
FRESULT res = FR_OK;
|
||||
|
||||
|
||||
if (info && info->fptr) {
|
||||
if (memcmp(info->ctr, DSIWARE_MAGIC, 16) == 0) return FR_DENIED;
|
||||
void* crypt_buff = (void*) malloc(min(btw, STD_BUFFER_SIZE));
|
||||
if (!crypt_buff) return FR_DENIED;
|
||||
|
||||
|
||||
setup_aeskeyY(0x34, info->keyy);
|
||||
use_aeskey(0x34);
|
||||
*bw = 0;
|
||||
@ -210,7 +210,7 @@ FRESULT fx_write (FIL* fp, const void* buff, UINT btw, UINT* bw) {
|
||||
res = f_write(fp, (const void*) crypt_buff, pcount, &bwl);
|
||||
*bw += bwl;
|
||||
}
|
||||
|
||||
|
||||
free(crypt_buff);
|
||||
} else res = f_write(fp, buff, btw, bw);
|
||||
return res;
|
||||
@ -255,12 +255,12 @@ FRESULT fa_unlink (const TCHAR* path) {
|
||||
// special functions for access of virtual NAND SD drives
|
||||
bool SetupNandSdDrive(const char* path, const char* sd_path, const char* movable, int num) {
|
||||
char alias[128];
|
||||
|
||||
|
||||
// initial checks
|
||||
if ((num >= NUM_ALIAS_DRV) || (num < 0)) return false;
|
||||
alias_drv[num] = 0;
|
||||
if (!sd_path || !movable || !path) return true;
|
||||
|
||||
|
||||
// grab the key Y from movable.sed
|
||||
UINT bytes_read = 0;
|
||||
FIL file;
|
||||
@ -272,13 +272,13 @@ bool SetupNandSdDrive(const char* path, const char* sd_path, const char* movable
|
||||
return false;
|
||||
}
|
||||
f_close(&file);
|
||||
|
||||
|
||||
// build the alias path (id0)
|
||||
u32 sha256sum[8];
|
||||
sha_quick(sha256sum, sd_keyy[num], 0x10, SHA256_MODE);
|
||||
snprintf(alias, 127, "%s/Nintendo 3DS/%08lX%08lX%08lX%08lX",
|
||||
snprintf(alias, sizeof(alias), "%s/Nintendo 3DS/%08lX%08lX%08lX%08lX",
|
||||
sd_path, sha256sum[0], sha256sum[1], sha256sum[2], sha256sum[3]);
|
||||
|
||||
|
||||
// find the alias path (id1)
|
||||
char* id1 = alias + strnlen(alias, 127);
|
||||
DIR pdir;
|
||||
@ -297,7 +297,7 @@ bool SetupNandSdDrive(const char* path, const char* sd_path, const char* movable
|
||||
}
|
||||
f_closedir(&pdir);
|
||||
if (!(*id1)) return false;
|
||||
|
||||
|
||||
// create the alias drive
|
||||
return SetupAliasDrive(path, alias, num);
|
||||
}
|
||||
@ -307,12 +307,12 @@ bool SetupAliasDrive(const char* path, const char* alias, int num) {
|
||||
if ((num >= NUM_ALIAS_DRV) || (num < 0)) return false;
|
||||
alias_drv[num] = 0;
|
||||
if (!alias || !path) return true;
|
||||
|
||||
|
||||
// take over drive path and alias
|
||||
strncpy(alias_path[num], alias, 128);
|
||||
if (path[1] != ':') return false;
|
||||
alias_drv[num] = path[0];
|
||||
|
||||
|
||||
return true;
|
||||
}
|
||||
|
||||
|
@ -12,16 +12,16 @@ bool CheckSupportFile(const char* fname)
|
||||
// try VRAM0 first
|
||||
if (FindVTarFileInfo(fname, NULL))
|
||||
return true;
|
||||
|
||||
|
||||
// try support file paths
|
||||
const char* base_paths[] = { SUPPORT_FILE_PATHS };
|
||||
for (u32 i = 0; i < countof(base_paths); i++) {
|
||||
char path[256];
|
||||
snprintf(path, 256, "%s/%s", base_paths[i], fname);
|
||||
snprintf(path, sizeof(path), "%s/%s", base_paths[i], fname);
|
||||
if (fvx_stat(path, NULL) == FR_OK)
|
||||
return true;
|
||||
}
|
||||
|
||||
|
||||
return false;
|
||||
}
|
||||
|
||||
@ -34,17 +34,17 @@ size_t LoadSupportFile(const char* fname, void* buffer, size_t max_len)
|
||||
memcpy(buffer, data, len64);
|
||||
return (size_t) len64;
|
||||
}
|
||||
|
||||
|
||||
// try support file paths
|
||||
const char* base_paths[] = { SUPPORT_FILE_PATHS };
|
||||
for (u32 i = 0; i < countof(base_paths); i++) {
|
||||
UINT len32;
|
||||
char path[256];
|
||||
snprintf(path, 256, "%s/%s", base_paths[i], fname);
|
||||
snprintf(path, sizeof(path), "%s/%s", base_paths[i], fname);
|
||||
if (fvx_qread(path, buffer, 0, max_len, &len32) == FR_OK)
|
||||
return len32;
|
||||
}
|
||||
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
@ -68,12 +68,12 @@ bool SaveSupportFile(const char* fname, void* buffer, size_t len)
|
||||
// write support file
|
||||
if (idx >= 0) {
|
||||
char path[256];
|
||||
snprintf(path, 256, "%s/%s", base_paths[idx], fname);
|
||||
snprintf(path, sizeof(path), "%s/%s", base_paths[idx], fname);
|
||||
fvx_unlink(path);
|
||||
if (fvx_qwrite(path, buffer, 0, len, NULL) == FR_OK)
|
||||
return true;
|
||||
}
|
||||
|
||||
|
||||
return false;
|
||||
}
|
||||
|
||||
@ -102,7 +102,7 @@ bool GetSupportDir(char* path, const char* dname)
|
||||
if ((fvx_stat(path, &fno) == FR_OK) && (fno.fattrib & AM_DIR))
|
||||
return true;
|
||||
}
|
||||
|
||||
|
||||
return false;
|
||||
}
|
||||
|
||||
@ -115,6 +115,7 @@ bool CheckSupportDir(const char* dname)
|
||||
bool FileSelectorSupport(char* result, const char* text, const char* dname, const char* pattern)
|
||||
{
|
||||
char path[256];
|
||||
// result needs to be at least 256 bytes long for this to work!
|
||||
if (!GetSupportDir(path, dname)) return false;
|
||||
return FileSelector(result, text, path, pattern, HIDE_EXT, false);
|
||||
}
|
||||
|
@ -3,7 +3,9 @@
|
||||
#include "common.h"
|
||||
|
||||
// scripts / payloads dir names
|
||||
#define LANGUAGES_DIR "languages"
|
||||
#define SCRIPTS_DIR "scripts"
|
||||
#define LUASCRIPTS_DIR "luascripts"
|
||||
#define PAYLOADS_DIR "payloads"
|
||||
|
||||
bool CheckSupportFile(const char* fname);
|
||||
@ -11,5 +13,6 @@ size_t LoadSupportFile(const char* fname, void* buffer, size_t max_len);
|
||||
bool SaveSupportFile(const char* fname, void* buffer, size_t len);
|
||||
bool SetAsSupportFile(const char* fname, const char* source);
|
||||
|
||||
bool GetSupportDir(char* path, const char* dname);
|
||||
bool CheckSupportDir(const char* fpath);
|
||||
bool FileSelectorSupport(char* result, const char* text, const char* dname, const char* pattern);
|
||||
|
@ -151,22 +151,22 @@ FRESULT fvx_qread (const TCHAR* path, void* buff, FSIZE_t ofs, UINT btr, UINT* b
|
||||
FIL fp;
|
||||
FRESULT res;
|
||||
UINT brt = 0;
|
||||
|
||||
|
||||
res = fvx_open(&fp, path, FA_READ | FA_OPEN_EXISTING);
|
||||
if (res != FR_OK) return res;
|
||||
|
||||
|
||||
res = fvx_lseek(&fp, ofs);
|
||||
if (res != FR_OK) {
|
||||
fvx_close(&fp);
|
||||
return res;
|
||||
}
|
||||
|
||||
|
||||
res = fvx_read(&fp, buff, btr, &brt);
|
||||
fvx_close(&fp);
|
||||
|
||||
|
||||
if (br) *br = brt;
|
||||
else if ((res == FR_OK) && (brt != btr)) res = FR_DENIED;
|
||||
|
||||
|
||||
return res;
|
||||
}
|
||||
|
||||
@ -174,29 +174,29 @@ FRESULT fvx_qwrite (const TCHAR* path, const void* buff, FSIZE_t ofs, UINT btw,
|
||||
FIL fp;
|
||||
FRESULT res;
|
||||
UINT bwt = 0;
|
||||
|
||||
|
||||
res = fvx_open(&fp, path, FA_WRITE | FA_OPEN_ALWAYS);
|
||||
if (res != FR_OK) return res;
|
||||
|
||||
|
||||
res = fvx_lseek(&fp, ofs);
|
||||
if (res != FR_OK) {
|
||||
fvx_close(&fp);
|
||||
return res;
|
||||
}
|
||||
|
||||
|
||||
res = fvx_write(&fp, buff, btw, &bwt);
|
||||
fvx_close(&fp);
|
||||
|
||||
|
||||
if (bw) *bw = bwt;
|
||||
else if ((res == FR_OK) && (bwt != btw)) res = FR_DENIED;
|
||||
|
||||
|
||||
return res;
|
||||
}
|
||||
|
||||
FRESULT fvx_qcreate (const TCHAR* path, UINT btc) {
|
||||
FIL fp;
|
||||
FRESULT res;
|
||||
|
||||
|
||||
res = fvx_open(&fp, path, FA_WRITE | FA_CREATE_ALWAYS);
|
||||
if (res != FR_OK) return res;
|
||||
|
||||
@ -212,7 +212,7 @@ FRESULT fvx_qfill (const TCHAR* path, const void* buff, UINT btb) {
|
||||
FRESULT res;
|
||||
UINT bwtt = 0;
|
||||
UINT fsiz = 0;
|
||||
|
||||
|
||||
res = fvx_open(&fp, path, FA_WRITE | FA_OPEN_EXISTING);
|
||||
if (res != FR_OK) return res;
|
||||
|
||||
@ -257,7 +257,8 @@ FRESULT worker_fvx_rmkdir (TCHAR* tpath) {
|
||||
FRESULT fvx_rmkdir (const TCHAR* path) {
|
||||
#if !_LFN_UNICODE // this will not work for unicode
|
||||
TCHAR tpath[_MAX_FN_LEN+1];
|
||||
strncpy(tpath, path, _MAX_FN_LEN);
|
||||
if (strlen(path) > _MAX_FN_LEN) return FR_INVALID_NAME;
|
||||
strcpy(tpath, path);
|
||||
return worker_fvx_rmkdir( tpath );
|
||||
#else
|
||||
return FR_DENIED;
|
||||
@ -267,7 +268,8 @@ FRESULT fvx_rmkdir (const TCHAR* path) {
|
||||
FRESULT fvx_rmkpath (const TCHAR* path) {
|
||||
#if !_LFN_UNICODE // this will not work for unicode
|
||||
TCHAR tpath[_MAX_FN_LEN+1];
|
||||
strncpy(tpath, path, _MAX_FN_LEN);
|
||||
if (strlen(path) > _MAX_FN_LEN) return FR_INVALID_NAME;
|
||||
strcpy(tpath, path);
|
||||
TCHAR* slash = strrchr(tpath, '/');
|
||||
if (!slash) return FR_DENIED;
|
||||
*slash = '\0';
|
||||
@ -281,21 +283,21 @@ FRESULT fvx_rmkpath (const TCHAR* path) {
|
||||
FRESULT worker_fvx_runlink (TCHAR* tpath) {
|
||||
FILINFO fno;
|
||||
FRESULT res;
|
||||
|
||||
|
||||
// this code handles directory content deletion
|
||||
if ((res = fvx_stat(tpath, &fno)) != FR_OK) return res; // tpath does not exist
|
||||
if (fno.fattrib & AM_DIR) { // process folder contents
|
||||
DIR pdir;
|
||||
TCHAR* fname = tpath + strnlen(tpath, 255);
|
||||
|
||||
|
||||
|
||||
|
||||
if ((res = fa_opendir(&pdir, tpath)) != FR_OK) return res;
|
||||
*(fname++) = '/';
|
||||
|
||||
|
||||
while (fvx_readdir(&pdir, &fno) == FR_OK) {
|
||||
if ((strncmp(fno.fname, ".", 2) == 0) || (strncmp(fno.fname, "..", 3) == 0))
|
||||
continue; // filter out virtual entries
|
||||
strncpy(fname, fno.fname, tpath + 255 - fname);
|
||||
strcpy(fname, fno.fname);
|
||||
if (fno.fname[0] == 0) {
|
||||
break;
|
||||
} else { // return value won't matter
|
||||
@ -305,7 +307,7 @@ FRESULT worker_fvx_runlink (TCHAR* tpath) {
|
||||
fvx_closedir(&pdir);
|
||||
*(--fname) = '\0';
|
||||
}
|
||||
|
||||
|
||||
return fvx_unlink( tpath );
|
||||
}
|
||||
#endif
|
||||
@ -313,7 +315,8 @@ FRESULT worker_fvx_runlink (TCHAR* tpath) {
|
||||
FRESULT fvx_runlink (const TCHAR* path) {
|
||||
#if !_LFN_UNICODE // this will not work for unicode
|
||||
TCHAR tpath[_MAX_FN_LEN+1];
|
||||
strncpy(tpath, path, _MAX_FN_LEN);
|
||||
if (strlen(path) > _MAX_FN_LEN) return FR_INVALID_NAME;
|
||||
strcpy(tpath, path);
|
||||
return worker_fvx_runlink( tpath );
|
||||
#else
|
||||
return FR_DENIED;
|
||||
@ -344,7 +347,7 @@ FRESULT fvx_match_name(const TCHAR* path, const TCHAR* pattern) {
|
||||
if (fvx_match_name(path, pattern + 1) == FR_OK) return FR_OK;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
return FR_NO_FILE;
|
||||
}
|
||||
|
||||
@ -356,40 +359,42 @@ FRESULT fvx_preaddir (DIR* dp, FILINFO* fno, const TCHAR* pattern) {
|
||||
}
|
||||
|
||||
FRESULT fvx_findpath (TCHAR* path, const TCHAR* pattern, BYTE mode) {
|
||||
strncpy(path, pattern, _MAX_FN_LEN);
|
||||
if (strlen(pattern) > _MAX_FN_LEN) return FR_INVALID_NAME;
|
||||
strcpy(path, pattern);
|
||||
TCHAR* fname = strrchr(path, '/');
|
||||
if (!fname) return FR_DENIED;
|
||||
*fname = '\0';
|
||||
|
||||
|
||||
TCHAR* npattern = strrchr(pattern, '/');
|
||||
if (!npattern) return FR_DENIED;
|
||||
npattern++;
|
||||
|
||||
|
||||
DIR pdir;
|
||||
FILINFO fno;
|
||||
FRESULT res;
|
||||
if ((res = fvx_opendir(&pdir, path)) != FR_OK) return res;
|
||||
|
||||
|
||||
*(fname++) = '/';
|
||||
*fname = '\0';
|
||||
|
||||
|
||||
while ((fvx_preaddir(&pdir, &fno, npattern) == FR_OK) && *(fno.fname)) {
|
||||
int cmp = strncmp(fno.fname, fname, _MAX_FN_LEN);
|
||||
if (((mode & FN_HIGHEST) && (cmp > 0)) || ((mode & FN_LOWEST) && (cmp < 0)) || !(*fname))
|
||||
strncpy(fname, fno.fname, _MAX_FN_LEN - (fname - path));
|
||||
strcpy(fname, fno.fname);
|
||||
if (!(mode & (FN_HIGHEST|FN_LOWEST))) break;
|
||||
}
|
||||
fvx_closedir( &pdir );
|
||||
|
||||
|
||||
return (*fname) ? FR_OK : FR_NO_PATH;
|
||||
}
|
||||
|
||||
FRESULT fvx_findnopath (TCHAR* path, const TCHAR* pattern) {
|
||||
strncpy(path, pattern, _MAX_FN_LEN);
|
||||
if (strlen(pattern) > _MAX_FN_LEN) return FR_INVALID_NAME;
|
||||
strcpy(path, pattern);
|
||||
TCHAR* fname = strrchr(path, '/');
|
||||
if (!fname) return FR_DENIED;
|
||||
fname++;
|
||||
|
||||
|
||||
TCHAR* rep[16];
|
||||
u32 n_rep = 0;
|
||||
for (u32 i = 0; fname[i]; i++) {
|
||||
@ -400,7 +405,7 @@ FRESULT fvx_findnopath (TCHAR* path, const TCHAR* pattern) {
|
||||
if (n_rep >= 16) return FR_DENIED;
|
||||
}
|
||||
if (!n_rep) return (fvx_stat(path, NULL) == FR_OK) ? FR_NO_PATH : FR_OK;
|
||||
|
||||
|
||||
while (fvx_stat(path, NULL) == FR_OK) {
|
||||
for (int i = n_rep - 1; (i >= 0); i--) {
|
||||
if (*(rep[i]) == '9') {
|
||||
@ -412,7 +417,7 @@ FRESULT fvx_findnopath (TCHAR* path, const TCHAR* pattern) {
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
return FR_OK;
|
||||
}
|
||||
|
||||
|
@ -8,6 +8,7 @@
|
||||
|
||||
#define fvx_tell(fp) ((fp)->fptr)
|
||||
#define fvx_size(fp) ((fp)->obj.objsize)
|
||||
#define fvx_eof(fp) (fvx_tell(fp) == fvx_size(fp))
|
||||
|
||||
#define FN_ANY 0x00
|
||||
#define FN_HIGHEST 0x01
|
||||
|
@ -2,6 +2,7 @@
|
||||
#include "vff.h"
|
||||
|
||||
#define FAT_ENTRY_SIZE 2 * sizeof(u32)
|
||||
#define REPLACE_SIZE_MISMATCH 2
|
||||
|
||||
#define getfatflag(uv) (((uv) & 0x80000000UL) != 0)
|
||||
#define getfatindex(uv) ((uv) & 0x7FFFFFFFUL)
|
||||
@ -105,8 +106,8 @@ static FRESULT BDRIWrite(UINT ofs, UINT btw, const void* buf) {
|
||||
bool CheckDBMagic(const u8* pre_header, bool tickdb) {
|
||||
const TitleDBPreHeader* title = (TitleDBPreHeader*) pre_header;
|
||||
const TickDBPreHeader* tick = (TickDBPreHeader*) pre_header;
|
||||
|
||||
return (tickdb ? ((strncmp(tick->magic, "TICK", 4) == 0) && (tick->unknown1 == 1)) :
|
||||
|
||||
return (tickdb ? ((strncmp(tick->magic, "TICK", 4) == 0) && (tick->unknown1 == 1)) :
|
||||
((strcmp(title->magic, "NANDIDB") == 0) || (strcmp(title->magic, "NANDTDB") == 0) ||
|
||||
(strcmp(title->magic, "TEMPIDB") == 0) || (strcmp(title->magic, "TEMPTDB") == 0))) &&
|
||||
(strcmp((tickdb ? tick->fs_header : title->fs_header).magic, "BDRI") == 0) &&
|
||||
@ -133,13 +134,13 @@ static u32 GetBDRIEntrySize(const BDRIFsHeader* fs_header, const u32 fs_header_o
|
||||
const u32 data_offset = fs_header_offset + fs_header->data_offset;
|
||||
const u32 fet_offset = data_offset + fs_header->fet_start_block * fs_header->data_block_size;
|
||||
const u32 fht_offset = fs_header_offset + fs_header->fht_offset;
|
||||
|
||||
|
||||
u32 index = 0;
|
||||
TdbFileEntry file_entry;
|
||||
u64 tid_be = getbe64(title_id);
|
||||
u8* title_id_be = (u8*) &tid_be;
|
||||
const u32 hash_bucket = GetHashBucket(title_id_be, 1, fs_header->fht_bucket_count);
|
||||
|
||||
|
||||
if (BDRIRead(fht_offset + hash_bucket * sizeof(u32), sizeof(u32), &(file_entry.hash_bucket_next_index)) != FR_OK)
|
||||
return 1;
|
||||
|
||||
@ -147,13 +148,13 @@ static u32 GetBDRIEntrySize(const BDRIFsHeader* fs_header, const u32 fs_header_o
|
||||
do {
|
||||
if (file_entry.hash_bucket_next_index == 0)
|
||||
return 1;
|
||||
|
||||
|
||||
index = file_entry.hash_bucket_next_index;
|
||||
|
||||
|
||||
if (BDRIRead(fet_offset + index * sizeof(TdbFileEntry), sizeof(TdbFileEntry), &file_entry) != FR_OK)
|
||||
return 1;
|
||||
} while (memcmp(title_id_be, file_entry.title_id, 8) != 0);
|
||||
|
||||
|
||||
*size = file_entry.size;
|
||||
|
||||
return 0;
|
||||
@ -162,18 +163,18 @@ static u32 GetBDRIEntrySize(const BDRIFsHeader* fs_header, const u32 fs_header_o
|
||||
static u32 ReadBDRIEntry(const BDRIFsHeader* fs_header, const u32 fs_header_offset, const u8* title_id, u8* entry, const u32 expected_size) {
|
||||
if ((fs_header->info_offset != 0x20) || (fs_header->fat_entry_count != fs_header->data_block_count)) // Could be more thorough
|
||||
return 1;
|
||||
|
||||
|
||||
const u32 data_offset = fs_header_offset + fs_header->data_offset;
|
||||
const u32 fet_offset = data_offset + fs_header->fet_start_block * fs_header->data_block_size;
|
||||
const u32 fht_offset = fs_header_offset + fs_header->fht_offset;
|
||||
const u32 fat_offset = fs_header_offset + fs_header->fat_offset;
|
||||
|
||||
|
||||
u32 index = 0;
|
||||
TdbFileEntry file_entry;
|
||||
u64 tid_be = getbe64(title_id);
|
||||
u8* title_id_be = (u8*) &tid_be;
|
||||
const u32 hash_bucket = GetHashBucket(title_id_be, 1, fs_header->fht_bucket_count);
|
||||
|
||||
|
||||
if (BDRIRead(fht_offset + hash_bucket * sizeof(u32), sizeof(u32), &(file_entry.hash_bucket_next_index)) != FR_OK)
|
||||
return 1;
|
||||
|
||||
@ -181,108 +182,108 @@ static u32 ReadBDRIEntry(const BDRIFsHeader* fs_header, const u32 fs_header_offs
|
||||
do {
|
||||
if (file_entry.hash_bucket_next_index == 0)
|
||||
return 1;
|
||||
|
||||
|
||||
index = file_entry.hash_bucket_next_index;
|
||||
|
||||
|
||||
if (BDRIRead(fet_offset + index * sizeof(TdbFileEntry), sizeof(TdbFileEntry), &file_entry) != FR_OK)
|
||||
return 1;
|
||||
} while (memcmp(title_id_be, file_entry.title_id, 8) != 0);
|
||||
|
||||
|
||||
if (expected_size && (file_entry.size != expected_size))
|
||||
return 1;
|
||||
|
||||
|
||||
index = file_entry.start_block_index + 1; // FAT entry index
|
||||
|
||||
|
||||
u32 bytes_read = 0;
|
||||
u32 fat_entry[2];
|
||||
|
||||
|
||||
while (bytes_read < file_entry.size) { // Read the full entry, walking the FAT node chain
|
||||
u32 read_start = index - 1; // Data region block index
|
||||
u32 read_count = 0;
|
||||
|
||||
|
||||
if (BDRIRead(fat_offset + index * FAT_ENTRY_SIZE, FAT_ENTRY_SIZE, fat_entry) != FR_OK)
|
||||
return 1;
|
||||
|
||||
|
||||
if ((bytes_read == 0) && !getfatflag(fat_entry[0]))
|
||||
return 1;
|
||||
|
||||
|
||||
u32 next_index = getfatindex(fat_entry[1]);
|
||||
|
||||
|
||||
if (getfatflag(fat_entry[1])) { // Multi-entry node
|
||||
if (BDRIRead(fat_offset + (index + 1) * FAT_ENTRY_SIZE, FAT_ENTRY_SIZE, fat_entry) != FR_OK)
|
||||
return 1;
|
||||
|
||||
|
||||
if (!getfatflag(fat_entry[0]) || getfatflag(fat_entry[1]) || (getfatindex(fat_entry[0]) != index) || (getfatindex(fat_entry[0]) >= getfatindex(fat_entry[1])))
|
||||
return 1;
|
||||
|
||||
|
||||
read_count = getfatindex(fat_entry[1]) + 1 - index;
|
||||
} else { // Single-entry node
|
||||
read_count = 1;
|
||||
}
|
||||
|
||||
|
||||
index = next_index;
|
||||
|
||||
|
||||
u32 btr = min(file_entry.size - bytes_read, read_count * fs_header->data_block_size);
|
||||
if (entry && (BDRIRead(data_offset + read_start * fs_header->data_block_size, btr, entry + bytes_read) != FR_OK))
|
||||
return 1;
|
||||
|
||||
|
||||
bytes_read += btr;
|
||||
}
|
||||
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static u32 RemoveBDRIEntry(const BDRIFsHeader* fs_header, const u32 fs_header_offset, const u8* title_id) {
|
||||
if ((fs_header->info_offset != 0x20) || (fs_header->fat_entry_count != fs_header->data_block_count)) // Could be more thorough
|
||||
return 1;
|
||||
|
||||
|
||||
const u32 data_offset = fs_header_offset + fs_header->data_offset;
|
||||
const u32 det_offset = data_offset + fs_header->det_start_block * fs_header->data_block_size;
|
||||
const u32 fet_offset = data_offset + fs_header->fet_start_block * fs_header->data_block_size;
|
||||
const u32 fht_offset = fs_header_offset + fs_header->fht_offset;
|
||||
const u32 fat_offset = fs_header_offset + fs_header->fat_offset;
|
||||
|
||||
|
||||
u32 index = 0, previous_index = 0;
|
||||
TdbFileEntry file_entry;
|
||||
u64 tid_be = getbe64(title_id);
|
||||
u8* title_id_be = (u8*) &tid_be;
|
||||
|
||||
|
||||
// Read the index of the first file entry from the directory entry table
|
||||
if (BDRIRead(det_offset + 0x2C, sizeof(u32), &(file_entry.next_sibling_index)) != FR_OK)
|
||||
return 1;
|
||||
|
||||
|
||||
// Find the file entry for the tid specified, fail if it doesn't exist
|
||||
do {
|
||||
previous_index = index;
|
||||
index = file_entry.next_sibling_index;
|
||||
|
||||
|
||||
if (index == 0)
|
||||
return 1;
|
||||
|
||||
|
||||
if (BDRIRead(fet_offset + index * sizeof(TdbFileEntry), sizeof(TdbFileEntry), &file_entry) != FR_OK)
|
||||
return 1;
|
||||
} while (memcmp(title_id_be, file_entry.title_id, 8) != 0);
|
||||
|
||||
|
||||
DummyFileEntry dummy_entry;
|
||||
|
||||
|
||||
// Read the 0th entry in the FET, which is always a dummy entry
|
||||
if (BDRIRead(fet_offset, sizeof(DummyFileEntry), &dummy_entry) != FR_OK)
|
||||
return 1;
|
||||
|
||||
|
||||
if (dummy_entry.max_entry_count != fs_header->max_file_count + 1)
|
||||
return 1;
|
||||
|
||||
|
||||
if ((BDRIWrite(fet_offset + index * sizeof(TdbFileEntry), sizeof(TdbFileEntry), &dummy_entry) != FR_OK) ||
|
||||
(BDRIWrite(fet_offset + 0x28, sizeof(u32), &index) != FR_OK) ||
|
||||
(BDRIWrite((previous_index == 0) ? det_offset + 0x2C : fet_offset + previous_index * sizeof(TdbFileEntry) + 0xC, sizeof(u32), &(file_entry.next_sibling_index)) != FR_OK))
|
||||
return 1;
|
||||
|
||||
|
||||
const u32 hash_bucket = GetHashBucket(file_entry.title_id, file_entry.parent_index, fs_header->fht_bucket_count);
|
||||
u32 index_hash = 0;
|
||||
|
||||
|
||||
if (BDRIRead(fht_offset + hash_bucket * sizeof(u32), sizeof(u32), &index_hash) != FR_OK)
|
||||
return 1;
|
||||
|
||||
|
||||
if (index_hash == index) {
|
||||
if (BDRIWrite(fht_offset + hash_bucket * sizeof(u32), sizeof(u32), &(file_entry.hash_bucket_next_index)) != FR_OK)
|
||||
return 1;
|
||||
@ -290,96 +291,97 @@ static u32 RemoveBDRIEntry(const BDRIFsHeader* fs_header, const u32 fs_header_of
|
||||
do {
|
||||
if (index_hash == 0) // This shouldn't happen if the entry was properly added
|
||||
break;
|
||||
|
||||
|
||||
if (BDRIRead(fet_offset + index_hash * sizeof(TdbFileEntry) + 0x28, sizeof(u32), &index_hash) != FR_OK)
|
||||
return 1;
|
||||
} while (index_hash != index);
|
||||
|
||||
|
||||
if ((index_hash != 0) && BDRIWrite(fet_offset + index_hash * sizeof(TdbFileEntry) + 0x28, sizeof(u32), &(file_entry.hash_bucket_next_index)) != FR_OK)
|
||||
return 1;
|
||||
}
|
||||
|
||||
|
||||
u32 fat_entry[2];
|
||||
|
||||
|
||||
if (BDRIRead(fat_offset, FAT_ENTRY_SIZE, fat_entry) != FR_OK)
|
||||
return 1;
|
||||
|
||||
|
||||
if (getfatflag(fat_entry[1]) || (fat_entry[0] != 0))
|
||||
return 1;
|
||||
|
||||
|
||||
u32 next_free_index = getfatindex(fat_entry[1]), fat_index = file_entry.start_block_index + 1;
|
||||
|
||||
|
||||
if (BDRIWrite(fat_offset + sizeof(u32), sizeof(u32), &fat_index) != FR_OK)
|
||||
return 1;
|
||||
|
||||
|
||||
fat_entry[1] = fat_index;
|
||||
|
||||
|
||||
do {
|
||||
fat_index = getfatindex(fat_entry[1]);
|
||||
|
||||
|
||||
if (BDRIRead(fat_offset + FAT_ENTRY_SIZE * fat_index, FAT_ENTRY_SIZE, fat_entry) != FR_OK)
|
||||
return 1;
|
||||
} while (getfatindex(fat_entry[1]) != 0);
|
||||
|
||||
|
||||
fat_entry[1] |= next_free_index;
|
||||
|
||||
|
||||
if ((BDRIWrite(fat_offset + fat_index * FAT_ENTRY_SIZE, FAT_ENTRY_SIZE, fat_entry) != FR_OK) ||
|
||||
(BDRIRead(fat_offset + next_free_index * FAT_ENTRY_SIZE, FAT_ENTRY_SIZE, fat_entry) != FR_OK))
|
||||
return 1;
|
||||
|
||||
|
||||
fat_entry[0] = buildfatuv(fat_index, false);
|
||||
|
||||
|
||||
if (BDRIWrite(fat_offset + next_free_index * FAT_ENTRY_SIZE, FAT_ENTRY_SIZE, fat_entry) != FR_OK)
|
||||
return 1;
|
||||
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static u32 AddBDRIEntry(const BDRIFsHeader* fs_header, const u32 fs_header_offset, const u8* title_id, const u8* entry, const u32 size, bool replace) {
|
||||
if ((fs_header->info_offset != 0x20) || (fs_header->fat_entry_count != fs_header->data_block_count)) // Could be more thorough
|
||||
return 1;
|
||||
|
||||
|
||||
if (!entry || !size)
|
||||
return 1;
|
||||
|
||||
|
||||
const u32 data_offset = fs_header_offset + fs_header->data_offset;
|
||||
const u32 det_offset = data_offset + fs_header->det_start_block * fs_header->data_block_size;
|
||||
const u32 fet_offset = data_offset + fs_header->fet_start_block * fs_header->data_block_size;
|
||||
const u32 fht_offset = fs_header_offset + fs_header->fht_offset;
|
||||
const u32 fat_offset = fs_header_offset + fs_header->fat_offset;
|
||||
const u32 size_blocks = (size / fs_header->data_block_size) + (((size % fs_header->data_block_size) == 0) ? 0 : 1);
|
||||
|
||||
|
||||
u32 index = 0, max_index = 0;
|
||||
TdbFileEntry file_entry;
|
||||
u64 tid_be = getbe64(title_id);
|
||||
u8* title_id_be = (u8*) &tid_be;
|
||||
bool do_replace = false;
|
||||
|
||||
|
||||
// Read the index of the first file entry from the directory entry table
|
||||
if (BDRIRead(det_offset + 0x2C, sizeof(u32), &(file_entry.next_sibling_index)) != FR_OK)
|
||||
if (BDRIRead(det_offset + 0x2C, sizeof(u32), &(file_entry.next_sibling_index)) != FR_OK)
|
||||
return 1;
|
||||
|
||||
|
||||
// Try to find the file entry for the tid specified
|
||||
while (file_entry.next_sibling_index != 0) {
|
||||
index = file_entry.next_sibling_index;
|
||||
max_index = max(index, max_index);
|
||||
|
||||
max_index = max(index, max_index);
|
||||
|
||||
if (BDRIRead(fet_offset + index * sizeof(TdbFileEntry), sizeof(TdbFileEntry), &file_entry) != FR_OK)
|
||||
return 1;
|
||||
|
||||
|
||||
// If an entry for the tid already existed that is already the specified size and replace was specified, just replace the existing entry
|
||||
if (memcmp(title_id_be, file_entry.title_id, 8) == 0) {
|
||||
if (!replace || (file_entry.size != size)) return 1;
|
||||
if (!replace) return 1;
|
||||
else if (file_entry.size != size) return REPLACE_SIZE_MISMATCH;
|
||||
else {
|
||||
do_replace = true;
|
||||
break;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
u32 fat_entry[2];
|
||||
u32 fat_index = 0;
|
||||
|
||||
|
||||
if (!do_replace) {
|
||||
if (BDRIRead(fat_offset, FAT_ENTRY_SIZE, fat_entry) != FR_OK)
|
||||
return 1;
|
||||
@ -476,48 +478,48 @@ static u32 AddBDRIEntry(const BDRIFsHeader* fs_header, const u32 fs_header_offse
|
||||
if (BDRIWrite(fat_offset + previous_free_index * FAT_ENTRY_SIZE, FAT_ENTRY_SIZE, fat_entry) != FR_OK)
|
||||
return 1;
|
||||
} else fat_index = file_entry.start_block_index + 1;
|
||||
|
||||
|
||||
u32 bytes_written = 0, fat_index_write = fat_index;
|
||||
|
||||
|
||||
while (bytes_written < size) { // Write the full entry, walking the FAT node chain
|
||||
// Can't assume contiguity here, because we might be replacing an existing entry
|
||||
u32 write_start = fat_index_write - 1; // Data region block index
|
||||
u32 write_count = 0;
|
||||
|
||||
|
||||
if (BDRIRead(fat_offset + fat_index_write * FAT_ENTRY_SIZE, FAT_ENTRY_SIZE, fat_entry) != FR_OK)
|
||||
return 1;
|
||||
|
||||
|
||||
if ((bytes_written == 0) && !getfatflag(fat_entry[0]))
|
||||
return 1;
|
||||
|
||||
|
||||
u32 next_index = getfatindex(fat_entry[1]);
|
||||
|
||||
|
||||
if (getfatflag(fat_entry[1])) { // Multi-entry node
|
||||
if (BDRIRead(fat_offset + (fat_index_write + 1) * FAT_ENTRY_SIZE, FAT_ENTRY_SIZE, fat_entry) != FR_OK)
|
||||
return 1;
|
||||
|
||||
|
||||
if (!getfatflag(fat_entry[0]) || getfatflag(fat_entry[1]) || (getfatindex(fat_entry[0]) != fat_index_write) || (getfatindex(fat_entry[0]) >= getfatindex(fat_entry[1])))
|
||||
return 1;
|
||||
|
||||
|
||||
write_count = getfatindex(fat_entry[1]) + 1 - fat_index_write;
|
||||
} else { // Single-entry node
|
||||
write_count = 1;
|
||||
}
|
||||
|
||||
|
||||
fat_index_write = next_index;
|
||||
|
||||
|
||||
u32 btw = min(size - bytes_written, write_count * fs_header->data_block_size);
|
||||
if (BDRIWrite(data_offset + write_start * fs_header->data_block_size, btw, entry + bytes_written) != FR_OK)
|
||||
return 1;
|
||||
|
||||
|
||||
bytes_written += btw;
|
||||
}
|
||||
|
||||
|
||||
if (!do_replace) {
|
||||
DummyFileEntry dummy_entry;
|
||||
|
||||
// Read the 0th entry in the FET, which is always a dummy entry
|
||||
if (BDRIRead(fet_offset, sizeof(DummyFileEntry), &dummy_entry) != FR_OK)
|
||||
if (BDRIRead(fet_offset, sizeof(DummyFileEntry), &dummy_entry) != FR_OK)
|
||||
return 1;
|
||||
|
||||
if (dummy_entry.max_entry_count != fs_header->max_file_count + 1)
|
||||
@ -559,83 +561,83 @@ static u32 AddBDRIEntry(const BDRIFsHeader* fs_header, const u32 fs_header_offse
|
||||
if (BDRIWrite(fet_offset + index * sizeof(TdbFileEntry), sizeof(TdbFileEntry), &file_entry) != FR_OK)
|
||||
return 1;
|
||||
}
|
||||
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static u32 GetNumBDRIEntries(const BDRIFsHeader* fs_header, const u32 fs_header_offset) {
|
||||
if ((fs_header->info_offset != 0x20) || (fs_header->fat_entry_count != fs_header->data_block_count)) // Could be more thorough
|
||||
return 0;
|
||||
|
||||
return 0;
|
||||
|
||||
const u32 data_offset = fs_header_offset + fs_header->data_offset;
|
||||
const u32 det_offset = data_offset + fs_header->det_start_block * fs_header->data_block_size;
|
||||
const u32 fet_offset = data_offset + fs_header->fet_start_block * fs_header->data_block_size;
|
||||
|
||||
|
||||
u32 num_entries = 0;
|
||||
TdbFileEntry file_entry;
|
||||
|
||||
|
||||
// Read the index of the first file entry from the directory entry table
|
||||
if (BDRIRead(det_offset + 0x2C, sizeof(u32), &(file_entry.next_sibling_index)) != FR_OK)
|
||||
return 0;
|
||||
|
||||
|
||||
while (file_entry.next_sibling_index != 0) {
|
||||
num_entries++;
|
||||
if (BDRIRead(fet_offset + file_entry.next_sibling_index * sizeof(TdbFileEntry), sizeof(TdbFileEntry), &file_entry) != FR_OK)
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
||||
return num_entries;
|
||||
}
|
||||
|
||||
static u32 ListBDRIEntryTitleIDs(const BDRIFsHeader* fs_header, const u32 fs_header_offset, u8* title_ids, u32 max_title_ids) {
|
||||
if ((fs_header->info_offset != 0x20) || (fs_header->fat_entry_count != fs_header->data_block_count))
|
||||
return 0;
|
||||
|
||||
|
||||
const u32 data_offset = fs_header_offset + fs_header->data_offset;
|
||||
const u32 det_offset = data_offset + fs_header->det_start_block * fs_header->data_block_size;
|
||||
const u32 fet_offset = data_offset + fs_header->fet_start_block * fs_header->data_block_size;
|
||||
|
||||
|
||||
u32 num_entries = 0;
|
||||
TdbFileEntry file_entry;
|
||||
|
||||
|
||||
for (u32 i = 0; i < max_title_ids; i++)
|
||||
memset(title_ids, 0, max_title_ids * 8);
|
||||
|
||||
|
||||
// Read the index of the first file entry from the directory entry table
|
||||
if (BDRIRead(det_offset + 0x2C, sizeof(u32), &(file_entry.next_sibling_index)) != FR_OK)
|
||||
return 1;
|
||||
|
||||
|
||||
while ((file_entry.next_sibling_index != 0) && (num_entries < max_title_ids)) {
|
||||
if (BDRIRead(fet_offset + file_entry.next_sibling_index * sizeof(TdbFileEntry), sizeof(TdbFileEntry), &file_entry) != FR_OK)
|
||||
return 1;
|
||||
|
||||
|
||||
u64 tid_be = getbe64(file_entry.title_id);
|
||||
memcpy(title_ids + num_entries * 8, (u8*) &tid_be, 8);
|
||||
|
||||
|
||||
num_entries++;
|
||||
}
|
||||
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
u32 GetNumTitleInfoEntries(const char* path) {
|
||||
FIL file;
|
||||
TitleDBPreHeader pre_header;
|
||||
|
||||
|
||||
if (fvx_open(&file, path, FA_READ | FA_OPEN_EXISTING) != FR_OK)
|
||||
return 0;
|
||||
|
||||
|
||||
bdrifp = &file;
|
||||
|
||||
|
||||
if ((BDRIRead(0, sizeof(TitleDBPreHeader), &pre_header) != FR_OK) ||
|
||||
!CheckDBMagic((u8*) &pre_header, false)) {
|
||||
fvx_close(bdrifp);
|
||||
bdrifp = NULL;
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
||||
u32 num = GetNumBDRIEntries(&(pre_header.fs_header), sizeof(TitleDBPreHeader) - sizeof(BDRIFsHeader));
|
||||
|
||||
|
||||
fvx_close(bdrifp);
|
||||
bdrifp = NULL;
|
||||
return num;
|
||||
@ -644,12 +646,12 @@ u32 GetNumTitleInfoEntries(const char* path) {
|
||||
u32 GetNumTickets(const char* path) {
|
||||
FIL file;
|
||||
TickDBPreHeader pre_header;
|
||||
|
||||
|
||||
if (fvx_open(&file, path, FA_READ | FA_OPEN_EXISTING) != FR_OK)
|
||||
return 0;
|
||||
|
||||
|
||||
bdrifp = &file;
|
||||
|
||||
|
||||
if ((BDRIRead(0, sizeof(TickDBPreHeader), &pre_header) != FR_OK) ||
|
||||
!CheckDBMagic((u8*) &pre_header, true)) {
|
||||
fvx_close(bdrifp);
|
||||
@ -658,7 +660,7 @@ u32 GetNumTickets(const char* path) {
|
||||
}
|
||||
|
||||
u32 num = GetNumBDRIEntries(&(pre_header.fs_header), sizeof(TickDBPreHeader) - sizeof(BDRIFsHeader));
|
||||
|
||||
|
||||
fvx_close(bdrifp);
|
||||
bdrifp = NULL;
|
||||
return num;
|
||||
@ -667,12 +669,12 @@ u32 GetNumTickets(const char* path) {
|
||||
u32 ListTitleInfoEntryTitleIDs(const char* path, u8* title_ids, u32 max_title_ids) {
|
||||
FIL file;
|
||||
TitleDBPreHeader pre_header;
|
||||
|
||||
|
||||
if (fvx_open(&file, path, FA_READ | FA_OPEN_EXISTING) != FR_OK)
|
||||
return 1;
|
||||
|
||||
|
||||
bdrifp = &file;
|
||||
|
||||
|
||||
if ((BDRIRead(0, sizeof(TitleDBPreHeader), &pre_header) != FR_OK) ||
|
||||
!CheckDBMagic((u8*) &pre_header, false) ||
|
||||
(ListBDRIEntryTitleIDs(&(pre_header.fs_header), sizeof(TitleDBPreHeader) - sizeof(BDRIFsHeader), title_ids, max_title_ids) != 0)) {
|
||||
@ -680,7 +682,7 @@ u32 ListTitleInfoEntryTitleIDs(const char* path, u8* title_ids, u32 max_title_id
|
||||
bdrifp = NULL;
|
||||
return 1;
|
||||
}
|
||||
|
||||
|
||||
fvx_close(bdrifp);
|
||||
bdrifp = NULL;
|
||||
return 0;
|
||||
@ -689,12 +691,12 @@ u32 ListTitleInfoEntryTitleIDs(const char* path, u8* title_ids, u32 max_title_id
|
||||
u32 ListTicketTitleIDs(const char* path, u8* title_ids, u32 max_title_ids) {
|
||||
FIL file;
|
||||
TickDBPreHeader pre_header;
|
||||
|
||||
|
||||
if (fvx_open(&file, path, FA_READ | FA_OPEN_EXISTING) != FR_OK)
|
||||
return 1;
|
||||
|
||||
|
||||
bdrifp = &file;
|
||||
|
||||
|
||||
if ((BDRIRead(0, sizeof(TickDBPreHeader), &pre_header) != FR_OK) ||
|
||||
!CheckDBMagic((u8*) &pre_header, true) ||
|
||||
(ListBDRIEntryTitleIDs(&(pre_header.fs_header), sizeof(TickDBPreHeader) - sizeof(BDRIFsHeader), title_ids, max_title_ids) != 0)) {
|
||||
@ -702,7 +704,7 @@ u32 ListTicketTitleIDs(const char* path, u8* title_ids, u32 max_title_ids) {
|
||||
bdrifp = NULL;
|
||||
return 1;
|
||||
}
|
||||
|
||||
|
||||
fvx_close(bdrifp);
|
||||
bdrifp = NULL;
|
||||
return 0;
|
||||
@ -711,12 +713,12 @@ u32 ListTicketTitleIDs(const char* path, u8* title_ids, u32 max_title_ids) {
|
||||
u32 ReadTitleInfoEntryFromDB(const char* path, const u8* title_id, TitleInfoEntry* tie) {
|
||||
FIL file;
|
||||
TitleDBPreHeader pre_header;
|
||||
|
||||
|
||||
if (fvx_open(&file, path, FA_READ | FA_OPEN_EXISTING) != FR_OK)
|
||||
return 1;
|
||||
|
||||
|
||||
bdrifp = &file;
|
||||
|
||||
|
||||
if ((BDRIRead(0, sizeof(TitleDBPreHeader), &pre_header) != FR_OK) ||
|
||||
!CheckDBMagic((u8*) &pre_header, false) ||
|
||||
(ReadBDRIEntry(&(pre_header.fs_header), sizeof(TitleDBPreHeader) - sizeof(BDRIFsHeader), title_id, (u8*) tie,
|
||||
@ -725,7 +727,7 @@ u32 ReadTitleInfoEntryFromDB(const char* path, const u8* title_id, TitleInfoEntr
|
||||
bdrifp = NULL;
|
||||
return 1;
|
||||
}
|
||||
|
||||
|
||||
fvx_close(bdrifp);
|
||||
bdrifp = NULL;
|
||||
return 0;
|
||||
@ -737,15 +739,16 @@ u32 ReadTicketFromDB(const char* path, const u8* title_id, Ticket** ticket) {
|
||||
TicketEntry* te = NULL;
|
||||
u32 entry_size;
|
||||
|
||||
*ticket = NULL;
|
||||
if (fvx_open(&file, path, FA_READ | FA_OPEN_EXISTING) != FR_OK)
|
||||
return 1;
|
||||
|
||||
|
||||
bdrifp = &file;
|
||||
|
||||
|
||||
if ((BDRIRead(0, sizeof(TickDBPreHeader), &pre_header) != FR_OK) ||
|
||||
!CheckDBMagic((u8*) &pre_header, true) ||
|
||||
(GetBDRIEntrySize(&(pre_header.fs_header), sizeof(TickDBPreHeader) - sizeof(BDRIFsHeader), title_id, &entry_size) != 0) ||
|
||||
entry_size < sizeof(TicketEntry) + 0x14 ||
|
||||
entry_size < sizeof(TicketEntry) + 0x14 ||
|
||||
(te = (TicketEntry*)malloc(entry_size), te == NULL) ||
|
||||
(ReadBDRIEntry(&(pre_header.fs_header), sizeof(TickDBPreHeader) - sizeof(BDRIFsHeader), title_id, (u8*) te,
|
||||
entry_size) != 0)) {
|
||||
@ -754,15 +757,15 @@ u32 ReadTicketFromDB(const char* path, const u8* title_id, Ticket** ticket) {
|
||||
bdrifp = NULL;
|
||||
return 1;
|
||||
}
|
||||
|
||||
|
||||
fvx_close(bdrifp);
|
||||
bdrifp = NULL;
|
||||
|
||||
|
||||
if (te->ticket_size != GetTicketSize(&te->ticket)) {
|
||||
free(te);
|
||||
return 1;
|
||||
}
|
||||
|
||||
|
||||
if (ticket) {
|
||||
u32 size = te->ticket_size;
|
||||
memmove(te, &te->ticket, size); // recycle this memory, instead of allocating another
|
||||
@ -771,7 +774,7 @@ u32 ReadTicketFromDB(const char* path, const u8* title_id, Ticket** ticket) {
|
||||
*ticket = tik;
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
||||
free(te);
|
||||
return 0;
|
||||
}
|
||||
@ -779,12 +782,12 @@ u32 ReadTicketFromDB(const char* path, const u8* title_id, Ticket** ticket) {
|
||||
u32 RemoveTitleInfoEntryFromDB(const char* path, const u8* title_id) {
|
||||
FIL file;
|
||||
TitleDBPreHeader pre_header;
|
||||
|
||||
|
||||
if (fvx_open(&file, path, FA_READ | FA_WRITE | FA_OPEN_EXISTING) != FR_OK)
|
||||
return 1;
|
||||
|
||||
|
||||
bdrifp = &file;
|
||||
|
||||
|
||||
if ((BDRIRead(0, sizeof(TitleDBPreHeader), &pre_header) != FR_OK) ||
|
||||
!CheckDBMagic((u8*) &pre_header, false) ||
|
||||
(RemoveBDRIEntry(&(pre_header.fs_header), sizeof(TitleDBPreHeader) - sizeof(BDRIFsHeader), title_id) != 0)) {
|
||||
@ -792,7 +795,7 @@ u32 RemoveTitleInfoEntryFromDB(const char* path, const u8* title_id) {
|
||||
bdrifp = NULL;
|
||||
return 1;
|
||||
}
|
||||
|
||||
|
||||
fvx_close(bdrifp);
|
||||
bdrifp = NULL;
|
||||
return 0;
|
||||
@ -801,12 +804,12 @@ u32 RemoveTitleInfoEntryFromDB(const char* path, const u8* title_id) {
|
||||
u32 RemoveTicketFromDB(const char* path, const u8* title_id) {
|
||||
FIL file;
|
||||
TickDBPreHeader pre_header;
|
||||
|
||||
|
||||
if (fvx_open(&file, path, FA_READ | FA_WRITE | FA_OPEN_EXISTING) != FR_OK)
|
||||
return 1;
|
||||
|
||||
|
||||
bdrifp = &file;
|
||||
|
||||
|
||||
if ((BDRIRead(0, sizeof(TickDBPreHeader), &pre_header) != FR_OK) ||
|
||||
!CheckDBMagic((u8*) &pre_header, true) ||
|
||||
(RemoveBDRIEntry(&(pre_header.fs_header), sizeof(TickDBPreHeader) - sizeof(BDRIFsHeader), title_id) != 0)) {
|
||||
@ -814,7 +817,7 @@ u32 RemoveTicketFromDB(const char* path, const u8* title_id) {
|
||||
bdrifp = NULL;
|
||||
return 1;
|
||||
}
|
||||
|
||||
|
||||
fvx_close(&file);
|
||||
bdrifp = NULL;
|
||||
return 0;
|
||||
@ -823,13 +826,13 @@ u32 RemoveTicketFromDB(const char* path, const u8* title_id) {
|
||||
u32 AddTitleInfoEntryToDB(const char* path, const u8* title_id, const TitleInfoEntry* tie, bool replace) {
|
||||
FIL file;
|
||||
TitleDBPreHeader pre_header;
|
||||
|
||||
|
||||
if (fvx_open(&file, path, FA_READ | FA_WRITE | FA_OPEN_EXISTING) != FR_OK)
|
||||
return 1;
|
||||
|
||||
|
||||
bdrifp = &file;
|
||||
|
||||
if ((BDRIRead(0, sizeof(TitleDBPreHeader), &pre_header) != FR_OK) ||
|
||||
|
||||
if ((BDRIRead(0, sizeof(TitleDBPreHeader), &pre_header) != FR_OK) ||
|
||||
!CheckDBMagic((u8*) &pre_header, false) ||
|
||||
(AddBDRIEntry(&(pre_header.fs_header), sizeof(TitleDBPreHeader) - sizeof(BDRIFsHeader), title_id,
|
||||
(const u8*) tie, sizeof(TitleInfoEntry), replace) != 0)) {
|
||||
@ -837,7 +840,7 @@ u32 AddTitleInfoEntryToDB(const char* path, const u8* title_id, const TitleInfoE
|
||||
bdrifp = NULL;
|
||||
return 1;
|
||||
}
|
||||
|
||||
|
||||
fvx_close(bdrifp);
|
||||
bdrifp = NULL;
|
||||
return 0;
|
||||
@ -847,7 +850,7 @@ u32 AddTicketToDB(const char* path, const u8* title_id, const Ticket* ticket, bo
|
||||
FIL file;
|
||||
TickDBPreHeader pre_header;
|
||||
u32 entry_size = sizeof(TicketEntry) + GetTicketContentIndexSize(ticket);
|
||||
|
||||
|
||||
TicketEntry* te = (TicketEntry*)malloc(entry_size);
|
||||
if (!te) {
|
||||
return 1;
|
||||
@ -860,13 +863,18 @@ u32 AddTicketToDB(const char* path, const u8* title_id, const Ticket* ticket, bo
|
||||
free(te);
|
||||
return 1;
|
||||
}
|
||||
|
||||
|
||||
bdrifp = &file;
|
||||
|
||||
|
||||
u32 add_bdri_res = 0;
|
||||
|
||||
if ((BDRIRead(0, sizeof(TickDBPreHeader), &pre_header) != FR_OK) ||
|
||||
!CheckDBMagic((u8*) &pre_header, true) ||
|
||||
(AddBDRIEntry(&(pre_header.fs_header), sizeof(TickDBPreHeader) - sizeof(BDRIFsHeader), title_id,
|
||||
(const u8*) te, entry_size, replace) != 0)) {
|
||||
((add_bdri_res = AddBDRIEntry(&(pre_header.fs_header), sizeof(TickDBPreHeader) - sizeof(BDRIFsHeader), title_id,
|
||||
(const u8*) te, entry_size, replace)) == 1) ||
|
||||
(add_bdri_res == REPLACE_SIZE_MISMATCH && ((RemoveBDRIEntry(&(pre_header.fs_header), sizeof(TickDBPreHeader) - sizeof(BDRIFsHeader), title_id) != 0) ||
|
||||
(AddBDRIEntry(&(pre_header.fs_header), sizeof(TickDBPreHeader) - sizeof(BDRIFsHeader), title_id,
|
||||
(const u8*) te, entry_size, replace) != 0)))) {
|
||||
free(te);
|
||||
fvx_close(bdrifp);
|
||||
bdrifp = NULL;
|
||||
|
@ -7,7 +7,7 @@ u32 CheckBossHash(BossHeader* boss, bool encrypted) {
|
||||
u8 hash_area[0x14] __attribute__((aligned(4))) = { 0 };
|
||||
u8 boss_sha256[0x20];
|
||||
u8 l_sha256[0x20];
|
||||
|
||||
|
||||
// calculate hash
|
||||
memcpy(hash_area, ((u8*) boss) + 0x28, 0x12);
|
||||
memcpy(boss_sha256, boss->hash_header, 0x20);
|
||||
@ -16,13 +16,13 @@ u32 CheckBossHash(BossHeader* boss, bool encrypted) {
|
||||
CryptBoss(boss_sha256, 0x28 + 0x12, 0x20, boss);
|
||||
}
|
||||
sha_quick(l_sha256, hash_area, 0x14, SHA256_MODE);
|
||||
|
||||
|
||||
return (memcmp(boss_sha256, l_sha256, 0x20) == 0) ? 0 : 1;
|
||||
}
|
||||
|
||||
u32 ValidateBossHeader(BossHeader* header, u32 fsize) {
|
||||
u8 boss_magic[] = { BOSS_MAGIC };
|
||||
|
||||
|
||||
// base checks
|
||||
if ((memcmp(header->magic, boss_magic, sizeof(boss_magic)) != 0) ||
|
||||
(fsize && (fsize != getbe32(header->filesize))) ||
|
||||
@ -31,12 +31,12 @@ u32 ValidateBossHeader(BossHeader* header, u32 fsize) {
|
||||
(getbe16(header->cnthdr_hash_type) != 0x0002) ||
|
||||
(getbe16(header->cnthdr_rsa_size) != 0x0002))
|
||||
return 1;
|
||||
|
||||
|
||||
// hash check
|
||||
if ((CheckBossHash(header, false) != 0) &&
|
||||
(CheckBossHash(header, true) != 0))
|
||||
return 1;
|
||||
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
@ -59,14 +59,14 @@ u32 CryptBoss(void* data, u32 offset, u32 size, BossHeader* boss) {
|
||||
size -= 0x28 - offset;
|
||||
offset = 0x28;
|
||||
}
|
||||
|
||||
|
||||
// decrypt BOSS data
|
||||
u8 ctr[16] = { 0 };
|
||||
memcpy(ctr, boss->ctr12, 12);
|
||||
ctr[15] = 0x01;
|
||||
use_aeskey(0x38);
|
||||
ctr_decrypt_byte(data, data, size, offset - 0x28, AES_CNT_CTRNAND_MODE, ctr);
|
||||
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
@ -76,7 +76,7 @@ u32 CryptBossSequential(void* data, u32 offset, u32 size) {
|
||||
// unexpected results otherwise
|
||||
static BossHeader boss = { 0 };
|
||||
static BossHeader* bossptr = NULL;
|
||||
|
||||
|
||||
// fetch boss header from data
|
||||
if ((offset == 0) && (size >= sizeof(BossHeader))) {
|
||||
bossptr = NULL;
|
||||
@ -87,9 +87,9 @@ u32 CryptBossSequential(void* data, u32 offset, u32 size) {
|
||||
return 1;
|
||||
bossptr = &boss;
|
||||
}
|
||||
|
||||
|
||||
// safety check, boss pointer
|
||||
if (!bossptr) return 1;
|
||||
|
||||
|
||||
return CryptBoss(data, offset, size, bossptr);
|
||||
}
|
||||
|
@ -14,7 +14,7 @@
|
||||
typedef struct {
|
||||
// actual BOSS header
|
||||
u8 magic[8]; // "boss" + 0x00010001, see above
|
||||
u8 filesize[4]; // big endian
|
||||
u8 filesize[4]; // big endian
|
||||
u8 release_date[8];
|
||||
u8 unknown0[2]; // always 0x0001
|
||||
u8 padding[2];
|
||||
@ -27,7 +27,7 @@ typedef struct {
|
||||
u8 hash_header[0x20];
|
||||
u8 signature_header[0x100];
|
||||
// payload header, first 0x1C byte used for hash (0x15A)
|
||||
u8 programId[8];
|
||||
u8 programId[8];
|
||||
u8 unknown2[4]; // typically zero
|
||||
u8 data_type[4];
|
||||
u8 size_payload[4];
|
||||
|
@ -18,6 +18,7 @@
|
||||
|
||||
#include <libgen.h>
|
||||
|
||||
#include "language.h"
|
||||
#include "common.h"
|
||||
#include "timer.h"
|
||||
#include "crc32.h"
|
||||
@ -143,18 +144,18 @@ static bool BEAT_UpdateProgress(const BEAT_Context *ctx)
|
||||
static const char *BEAT_ErrString(int error)
|
||||
{ // Get an error description string
|
||||
switch(error) {
|
||||
case BEAT_OK: return "No error";
|
||||
case BEAT_EOAL: return "End of action list";
|
||||
case BEAT_ABORTED: return "Aborted by user";
|
||||
case BEAT_IO_ERROR: return "Failed to read/write file";
|
||||
case BEAT_OVERFLOW: return "Attempted to write beyond end of file";
|
||||
case BEAT_BADPATCH: return "Invalid patch file";
|
||||
case BEAT_BADINPUT: return "Invalid input file";
|
||||
case BEAT_BADOUTPUT: return "Output file checksum mismatch";
|
||||
case BEAT_BADCHKSUM: return "File checksum failed";
|
||||
case BEAT_PATCH_EXPECT: return "Expected more patch data";
|
||||
case BEAT_OUT_OF_MEMORY: return "Out of memory";
|
||||
default: return "Unknown error";
|
||||
case BEAT_OK: return STR_BEAT_NO_ERROR;
|
||||
case BEAT_EOAL: return STR_BEAT_END_OF_ACTION_LIST;
|
||||
case BEAT_ABORTED: return STR_BEAT_ABORTED_BY_USER;
|
||||
case BEAT_IO_ERROR: return STR_BEAT_FAILED_TO_READ_WRITE_FILE;
|
||||
case BEAT_OVERFLOW: return STR_BEAT_ATTEMPTED_TO_WRITE_BEYOND_EOF;
|
||||
case BEAT_BADPATCH: return STR_BEAT_INVALID_PATCH_FILE;
|
||||
case BEAT_BADINPUT: return STR_BEAT_INVALID_INPUT_FILE;
|
||||
case BEAT_BADOUTPUT: return STR_BEAT_OUTPUT_FILE_CHECKSUM_MISMATCH;
|
||||
case BEAT_BADCHKSUM: return STR_BEAT_FILE_CHECKSUM_FAILED;
|
||||
case BEAT_PATCH_EXPECT: return STR_BEAT_EXPECTED_MORE_PATCH_DATA;
|
||||
case BEAT_OUT_OF_MEMORY: return STR_BEAT_OUT_OF_MEMORY;
|
||||
default: return STR_BEAT_UNKNOWN_ERROR;
|
||||
}
|
||||
}
|
||||
|
||||
@ -221,7 +222,7 @@ static s32 BEAT_DecodeSigned(u32 val) // Extract the signed number
|
||||
static int BEAT_RunActions(BEAT_Context *ctx, const BEAT_Action *acts)
|
||||
{ // Parses an action list and runs commands specified in `acts`
|
||||
u32 vli, len;
|
||||
int cmd, res;
|
||||
int cmd, res = BEAT_OK;
|
||||
|
||||
while((res == BEAT_OK) &&
|
||||
(ctx->foff[BEAT_PF] < (BEAT_RANGE(ctx, BEAT_PF) - ctx->eoal_offset))) {
|
||||
@ -660,19 +661,18 @@ static int BEAT_Run(const char *p, const char *s, const char *d, bool bpm)
|
||||
progress_timer = timer_start();
|
||||
res = (bpm ? BPM_InitCTX : BPS_InitCTX)(&ctx, p, s, d);
|
||||
if (res != BEAT_OK) {
|
||||
ShowPrompt(false, "Failed to initialize %s file:\n%s",
|
||||
bpm ? "BPM" : "BPS", BEAT_ErrString(res));
|
||||
ShowPrompt(false, bpm ? STR_FAILED_TO_INITIALIZE_BPM_FILE : STR_FAILED_TO_INITIALIZE_BPS_FILE, BEAT_ErrString(res));
|
||||
} else {
|
||||
res = (bpm ? BPM_RunActions : BPS_RunActions)(&ctx);
|
||||
switch(res) {
|
||||
case BEAT_OK:
|
||||
ShowPrompt(false, "Patch successfully applied");
|
||||
ShowPrompt(false, "%s", STR_PATCH_SUCCESSFULLY_APPLIED);
|
||||
break;
|
||||
case BEAT_ABORTED:
|
||||
ShowPrompt(false, "Patching aborted by user");
|
||||
ShowPrompt(false, "%s", STR_PATCHING_ABORTED_BY_USER);
|
||||
break;
|
||||
default:
|
||||
ShowPrompt(false, "Failed to run patch:\n%s", BEAT_ErrString(res));
|
||||
ShowPrompt(false, STR_FAILED_TO_RUN_PATCH, BEAT_ErrString(res));
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
@ -1,21 +1,816 @@
|
||||
#include "cert.h"
|
||||
#include "ff.h"
|
||||
#include "disadiff.h"
|
||||
#include "rsa.h"
|
||||
|
||||
u32 LoadCertFromCertDb(u64 offset, Certificate* cert, u32* mod, u32* exp) {
|
||||
Certificate cert_local;
|
||||
FIL db;
|
||||
UINT bytes_read;
|
||||
typedef struct {
|
||||
char magic[4]; // "CERT"
|
||||
u8 unk[4]; // afaik, always 0
|
||||
u8 used_size[4]; // size used after this header
|
||||
u8 garbage[4]; // literally garbage values
|
||||
} PACKED_STRUCT CertsDbPartitionHeader;
|
||||
|
||||
// not much in terms of error checking here
|
||||
if (f_open(&db, "1:/dbs/certs.db", FA_READ | FA_OPEN_EXISTING) != FR_OK)
|
||||
static inline void GetCertDBPath(char* path, bool emunand) {
|
||||
path[0] = emunand ? '4' : '1';
|
||||
strcpy(&path[1], ":/dbs/certs.db");
|
||||
}
|
||||
|
||||
#define CERT_RETAIL_CA3_IDENT BIT(0)
|
||||
#define CERT_RETAIL_XSc_IDENT BIT(1)
|
||||
#define CERT_RETAIL_CPb_IDENT BIT(2)
|
||||
#define CERT_DEV_CA4_IDENT BIT(3)
|
||||
#define CERT_DEV_XS9_IDENT BIT(4)
|
||||
#define CERT_DEV_CPa_IDENT BIT(5)
|
||||
#define CERT_NO_STORE_SPACE (0xFF)
|
||||
|
||||
static struct {
|
||||
u32 loaded_certs_flg;
|
||||
u8 retail_CA3_raw[CERT_RSA4096_SIG_SIZE + CERT_RSA2048_BODY_SIZE];
|
||||
u8 retail_XSc_raw[CERT_RSA2048_SIG_SIZE + CERT_RSA2048_BODY_SIZE];
|
||||
u8 retail_CPb_raw[CERT_RSA2048_SIG_SIZE + CERT_RSA2048_BODY_SIZE];
|
||||
u8 dev_CA4_raw[CERT_RSA4096_SIG_SIZE + CERT_RSA2048_BODY_SIZE];
|
||||
u8 dev_XS9_raw[CERT_RSA2048_SIG_SIZE + CERT_RSA2048_BODY_SIZE];
|
||||
u8 dev_CPa_raw[CERT_RSA2048_SIG_SIZE + CERT_RSA2048_BODY_SIZE];
|
||||
Certificate retail_CA3;
|
||||
Certificate retail_XSc;
|
||||
Certificate retail_CPb;
|
||||
Certificate dev_CA4;
|
||||
Certificate dev_XS9;
|
||||
Certificate dev_CPa;
|
||||
} _CommonCertsStorage = {
|
||||
0, // none loaded yet, ident defines used to say what's loaded
|
||||
{0}, {0}, {0}, {0}, {0}, {0}, // no data yet
|
||||
// cert structs pre-point already to raw certs
|
||||
{
|
||||
(CertificateSignature*)&_CommonCertsStorage.retail_CA3_raw[0],
|
||||
(CertificateBody*)&_CommonCertsStorage.retail_CA3_raw[CERT_RSA4096_SIG_SIZE]
|
||||
},
|
||||
{
|
||||
(CertificateSignature*)&_CommonCertsStorage.retail_XSc_raw[0],
|
||||
(CertificateBody*)&_CommonCertsStorage.retail_XSc_raw[CERT_RSA2048_SIG_SIZE]
|
||||
},
|
||||
{
|
||||
(CertificateSignature*)&_CommonCertsStorage.retail_CPb_raw[0],
|
||||
(CertificateBody*)&_CommonCertsStorage.retail_CPb_raw[CERT_RSA2048_SIG_SIZE]
|
||||
},
|
||||
{
|
||||
(CertificateSignature*)&_CommonCertsStorage.dev_CA4_raw[0],
|
||||
(CertificateBody*)&_CommonCertsStorage.dev_CA4_raw[CERT_RSA4096_SIG_SIZE]
|
||||
},
|
||||
{
|
||||
(CertificateSignature*)&_CommonCertsStorage.dev_XS9_raw[0],
|
||||
(CertificateBody*)&_CommonCertsStorage.dev_XS9_raw[CERT_RSA2048_SIG_SIZE]
|
||||
},
|
||||
{
|
||||
(CertificateSignature*)&_CommonCertsStorage.dev_CPa_raw[0],
|
||||
(CertificateBody*)&_CommonCertsStorage.dev_CPa_raw[CERT_RSA2048_SIG_SIZE]
|
||||
}
|
||||
};
|
||||
|
||||
static inline void _Certificate_CleanupImpl(Certificate* cert);
|
||||
|
||||
bool Certificate_IsValid(const Certificate* cert) {
|
||||
if (!cert || !cert->sig || !cert->data)
|
||||
return false;
|
||||
|
||||
u32 sig_type = getbe32(cert->sig->sig_type);
|
||||
if (sig_type < 0x10000 || sig_type > 0x10005)
|
||||
return false;
|
||||
|
||||
u32 keytype = getbe32(cert->data->keytype);
|
||||
if (keytype > 2)
|
||||
return false;
|
||||
|
||||
size_t issuer_len = strnlen(cert->data->issuer, 0x40);
|
||||
size_t name_len = strnlen(cert->data->name, 0x40);
|
||||
// if >= 0x40, cert can't fit as issuer for other objects later
|
||||
// since later objects using the certificate as their issuer will have them use it as certissuer-certname
|
||||
if (!issuer_len || !name_len || (issuer_len + name_len + 1) >= 0x40)
|
||||
return false;
|
||||
|
||||
return true;
|
||||
}
|
||||
|
||||
bool Certificate_IsRSA(const Certificate* cert) {
|
||||
if (!Certificate_IsValid(cert)) return false;
|
||||
if (getbe32(cert->data->keytype) >= 2) return false;
|
||||
return true;
|
||||
}
|
||||
|
||||
bool Certificate_IsECC(const Certificate* cert) {
|
||||
if (!Certificate_IsValid(cert)) return false;
|
||||
if (getbe32(cert->data->keytype) != 2) return false;
|
||||
return true;
|
||||
}
|
||||
|
||||
u32 Certificate_GetSignatureSize(const Certificate* cert, u32* size) {
|
||||
if (!size || !Certificate_IsValid(cert)) return 1;
|
||||
|
||||
u32 sig_type = getbe32(cert->sig->sig_type);
|
||||
|
||||
if (sig_type == 0x10000 || sig_type == 0x10003)
|
||||
*size = 0x200;
|
||||
else if (sig_type == 0x10001 || sig_type == 0x10004)
|
||||
*size = 0x100;
|
||||
else if (sig_type == 0x10002 || sig_type == 0x10005)
|
||||
*size = 0x3C;
|
||||
else
|
||||
return 1;
|
||||
f_lseek(&db, offset);
|
||||
if (!cert) cert = &cert_local;
|
||||
f_read(&db, cert, CERT_SIZE, &bytes_read);
|
||||
f_close(&db);
|
||||
|
||||
if (mod) memcpy(mod, cert->mod, 0x100);
|
||||
if (exp) *exp = getle32(cert->exp);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
u32 Certificate_GetModulusSize(const Certificate* cert, u32* size) {
|
||||
if (!size || !Certificate_IsRSA(cert)) return 1;
|
||||
|
||||
u32 keytype = getbe32(cert->data->keytype);
|
||||
|
||||
if (keytype == 0)
|
||||
*size = 4096 / 8;
|
||||
else if (keytype == 1)
|
||||
*size = 2048 / 8;
|
||||
else return 1;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
u32 Certificate_GetModulus(const Certificate* cert, void* mod) {
|
||||
u32 size;
|
||||
if (!mod || Certificate_GetModulusSize(cert, &size)) return 1;
|
||||
|
||||
memcpy(mod, cert->data->pub_key_data, size);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
u32 Certificate_GetExponent(const Certificate* cert, void* exp) {
|
||||
u32 size;
|
||||
if (!exp || Certificate_GetModulusSize(cert, &size)) return 1;
|
||||
|
||||
memcpy(exp, &cert->data->pub_key_data[size], 4);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
u32 Certificate_GetEccSingleCoordinateSize(const Certificate* cert, u32* size) {
|
||||
if (!size || !Certificate_IsECC(cert)) return 1;
|
||||
|
||||
u32 keytype = getbe32(cert->data->keytype);
|
||||
|
||||
if (keytype == 2)
|
||||
*size = 0x3C / 2;
|
||||
else return 1;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
u32 Certificate_GetEccXY(const Certificate* cert, void* X, void* Y) {
|
||||
u32 size;
|
||||
if (!X || !Y || Certificate_GetEccSingleCoordinateSize(cert, &size)) return 1;
|
||||
|
||||
memcpy(X, cert->data->pub_key_data, size);
|
||||
memcpy(Y, &cert->data->pub_key_data[size], size);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static inline u32 _Certificate_GetSignatureChunkSizeFromType(u32 sig_type) {
|
||||
if (sig_type == 0x10000 || sig_type == 0x10003)
|
||||
return CERT_RSA4096_SIG_SIZE;
|
||||
else if (sig_type == 0x10001 || sig_type == 0x10004)
|
||||
return CERT_RSA2048_SIG_SIZE;
|
||||
else if (sig_type == 0x10002 || sig_type == 0x10005)
|
||||
return CERT_ECC_SIG_SIZE;
|
||||
return 0;
|
||||
}
|
||||
|
||||
u32 Certificate_GetSignatureChunkSize(const Certificate* cert, u32* size) {
|
||||
if (!size || !Certificate_IsValid(cert)) return 1;
|
||||
|
||||
u32 _size = _Certificate_GetSignatureChunkSizeFromType(getbe32(cert->sig->sig_type));
|
||||
|
||||
if (_size == 0) return 1;
|
||||
|
||||
*size = _size;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static inline u32 _Certificate_GetDataChunkSizeFromType(u32 keytype) {
|
||||
if (keytype == 0)
|
||||
return CERT_RSA4096_BODY_SIZE;
|
||||
else if (keytype == 1)
|
||||
return CERT_RSA2048_BODY_SIZE;
|
||||
else if (keytype == 2)
|
||||
return CERT_ECC_BODY_SIZE;
|
||||
return 0;
|
||||
}
|
||||
|
||||
u32 Certificate_GetDataChunkSize(const Certificate* cert, u32* size) {
|
||||
if (!size || !Certificate_IsValid(cert)) return 1;
|
||||
|
||||
u32 _size = _Certificate_GetDataChunkSizeFromType(getbe32(cert->data->keytype));
|
||||
|
||||
if (_size == 0) return 1;
|
||||
|
||||
*size = _size;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
u32 Certificate_GetFullSize(const Certificate* cert, u32* size) {
|
||||
if (!size || !Certificate_IsValid(cert)) return 1;
|
||||
|
||||
u32 sig_size = _Certificate_GetSignatureChunkSizeFromType(getbe32(cert->sig->sig_type));
|
||||
u32 data_size = _Certificate_GetDataChunkSizeFromType(getbe32(cert->data->keytype));
|
||||
|
||||
if (sig_size == 0 || data_size == 0)
|
||||
return 1;
|
||||
|
||||
*size = sig_size + data_size;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static inline u32 _Certificate_KeytypeSignatureSize(u32 keytype) {
|
||||
if (keytype == 0)
|
||||
return 0x200;
|
||||
else if (keytype == 1)
|
||||
return 0x100;
|
||||
else if (keytype == 2)
|
||||
return 0x3C;
|
||||
return 0;
|
||||
}
|
||||
|
||||
static inline u32 _Certificate_VerifyRSA4096(const Certificate* cert, const void* sig, const void* data, u32 data_size, bool sha256) {
|
||||
(void)cert; (void)sig; (void)data; (void)data_size; (void)sha256;
|
||||
return 2; // not implemented
|
||||
}
|
||||
|
||||
// noipa, to avoid form of inlining, cloning, etc, to avoid the extra stack usage when unneeded
|
||||
static __attribute__((noipa)) bool _Certificate_SetKey2048Misaligned(const Certificate* cert) {
|
||||
u32 mod[2048/8];
|
||||
u32 exp;
|
||||
|
||||
memcpy(mod, cert->data->pub_key_data, 2048/8);
|
||||
exp = getle32(&cert->data->pub_key_data[2048/8]);
|
||||
|
||||
return RSA_setKey2048(3, mod, exp);
|
||||
}
|
||||
|
||||
static inline u32 _Certificate_VerifyRSA2048(const Certificate* cert, const void* sig, const void* data, u32 data_size, bool sha256) {
|
||||
if (!sha256)
|
||||
return 2; // not implemented
|
||||
|
||||
int ret;
|
||||
|
||||
if (((u32)&cert->data->pub_key_data[0]) & 0x3)
|
||||
ret = !_Certificate_SetKey2048Misaligned(cert);
|
||||
else
|
||||
ret = !RSA_setKey2048(3, (const u32*)(const void*)&cert->data->pub_key_data[0], getle32(&cert->data->pub_key_data[2048/8]));
|
||||
|
||||
if (ret)
|
||||
return ret;
|
||||
|
||||
return !RSA_verify2048(sig, data, data_size);
|
||||
}
|
||||
|
||||
static inline u32 _Certificate_VerifyECC(const Certificate* cert, const void* sig, const void* data, u32 data_size, bool sha256) {
|
||||
(void)cert; (void)sig; (void)data; (void)data_size; (void)sha256;
|
||||
return 2; // not implemented
|
||||
}
|
||||
|
||||
u32 Certificate_VerifySignatureBlock(const Certificate* cert, const void* sig, u32 sig_size, const void* data, u32 data_size, bool sha256) {
|
||||
if (!sig || !sig_size || (!data && data_size) || !Certificate_IsValid(cert))
|
||||
return 1;
|
||||
|
||||
u32 keytype = getbe32(cert->data->keytype);
|
||||
u32 _sig_size = _Certificate_KeytypeSignatureSize(keytype);
|
||||
|
||||
if (sig_size != _sig_size)
|
||||
return 1;
|
||||
|
||||
if (keytype == 0)
|
||||
return _Certificate_VerifyRSA4096(cert, sig, data, data_size, sha256);
|
||||
if (keytype == 1)
|
||||
return _Certificate_VerifyRSA2048(cert, sig, data, data_size, sha256);
|
||||
if (keytype == 2)
|
||||
return _Certificate_VerifyECC(cert, sig, data, data_size, sha256);
|
||||
return 1;
|
||||
}
|
||||
|
||||
static inline void* _Certificate_SafeRealloc(void* ptr, size_t size, size_t oldsize) {
|
||||
void* new_ptr;
|
||||
size_t min_size = min(oldsize, size);
|
||||
|
||||
if ((u32)ptr >= (u32)&_CommonCertsStorage && (u32)ptr < (u32)&_CommonCertsStorage + sizeof(_CommonCertsStorage)) {
|
||||
new_ptr = malloc(size);
|
||||
if (new_ptr) memcpy(new_ptr, ptr, min_size);
|
||||
} else {
|
||||
new_ptr = realloc(ptr, size);
|
||||
}
|
||||
if (!new_ptr) return NULL;
|
||||
|
||||
memset(&((u8*)new_ptr)[min_size], 0, size - min_size);
|
||||
return new_ptr;
|
||||
}
|
||||
|
||||
// will reallocate memory for certificate signature and body to fit the max possible size.
|
||||
// will also allocate an empty object if Certificate is NULL initialized.
|
||||
// if certificate points to static storage, an allocated version will be created.
|
||||
// if function fails, the Certificate, even if previously NULL initialized, still has to be passed to cleaned up after use.
|
||||
u32 Certificate_MakeEditSafe(Certificate* cert) {
|
||||
if (!cert) return 1;
|
||||
bool isvalid = Certificate_IsValid(cert);
|
||||
if ((cert->sig || cert->data) && !isvalid) return 1;
|
||||
|
||||
Certificate cert_local;
|
||||
|
||||
u32 sig_size = isvalid ? _Certificate_GetSignatureChunkSizeFromType(getbe32(cert->sig->sig_type)) : 0;
|
||||
u32 data_size = isvalid ? _Certificate_GetDataChunkSizeFromType(getbe32(cert->data->keytype)) : 0;
|
||||
|
||||
if (isvalid && (sig_size == 0 || data_size == 0)) return 1;
|
||||
|
||||
cert_local.sig = _Certificate_SafeRealloc(cert->sig, CERT_RSA4096_SIG_SIZE, sig_size);
|
||||
if (!cert_local.sig) return 1;
|
||||
cert->sig = cert_local.sig;
|
||||
cert_local.data = _Certificate_SafeRealloc(cert->data, CERT_RSA4096_BODY_SIZE, data_size);
|
||||
if (!cert_local.data) return 1;
|
||||
cert->data = cert_local.data;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static u32 _Certificate_AllocCopyOutImpl(const Certificate* cert, Certificate* out_cert) {
|
||||
u32 sig_size = _Certificate_GetSignatureChunkSizeFromType(getbe32(cert->sig->sig_type));
|
||||
u32 data_size = _Certificate_GetDataChunkSizeFromType(getbe32(cert->data->keytype));
|
||||
|
||||
if (sig_size == 0 || data_size == 0)
|
||||
return 1;
|
||||
|
||||
out_cert->sig = (CertificateSignature*)malloc(sig_size);
|
||||
out_cert->data = (CertificateBody*)malloc(data_size);
|
||||
|
||||
if (!out_cert->sig || !out_cert->data) {
|
||||
_Certificate_CleanupImpl(out_cert);
|
||||
return 1;
|
||||
}
|
||||
|
||||
memcpy(out_cert->sig, cert->sig, sig_size);
|
||||
memcpy(out_cert->data, cert->data, data_size);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
u32 Certificate_AllocCopyOut(const Certificate* cert, Certificate* out_cert) {
|
||||
if (!out_cert || !Certificate_IsValid(cert)) return 1;
|
||||
|
||||
return _Certificate_AllocCopyOutImpl(cert, out_cert);
|
||||
}
|
||||
|
||||
static u32 _Certificate_RawCopyImpl(const Certificate* cert, void* raw) {
|
||||
u32 sig_size = _Certificate_GetSignatureChunkSizeFromType(getbe32(cert->sig->sig_type));
|
||||
u32 data_size = _Certificate_GetDataChunkSizeFromType(getbe32(cert->data->keytype));
|
||||
|
||||
if (sig_size == 0 || data_size == 0)
|
||||
return 1;
|
||||
|
||||
memcpy(raw, cert->sig, sig_size);
|
||||
memcpy(&((u8*)raw)[sig_size], cert->data, data_size);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
u32 Certificate_RawCopy(const Certificate* cert, void* raw) {
|
||||
if (!raw || !Certificate_IsValid(cert)) return 1;
|
||||
|
||||
return _Certificate_RawCopyImpl(cert, raw);
|
||||
}
|
||||
|
||||
// ptr free check, to not free if ptr is pointing to static storage!!
|
||||
static inline void _Certificate_SafeFree(void* ptr) {
|
||||
if ((u32)ptr >= (u32)&_CommonCertsStorage && (u32)ptr < (u32)&_CommonCertsStorage + sizeof(_CommonCertsStorage))
|
||||
return;
|
||||
|
||||
free(ptr);
|
||||
}
|
||||
|
||||
static inline void _Certificate_CleanupImpl(Certificate* cert) {
|
||||
_Certificate_SafeFree(cert->sig);
|
||||
_Certificate_SafeFree(cert->data);
|
||||
cert->sig = NULL;
|
||||
cert->data = NULL;
|
||||
}
|
||||
|
||||
u32 Certificate_Cleanup(Certificate* cert) {
|
||||
if (!cert) return 1;
|
||||
|
||||
_Certificate_CleanupImpl(cert);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static u32 _Issuer_To_StorageIdent(const char* issuer) {
|
||||
if (strncmp(issuer, "Root-CA0000000", 14) != 0)
|
||||
return CERT_NO_STORE_SPACE;
|
||||
|
||||
if (issuer[14] == '3') { // retail
|
||||
if (issuer[15] == 0)
|
||||
return CERT_RETAIL_CA3_IDENT;
|
||||
if (issuer[15] != '-')
|
||||
return CERT_NO_STORE_SPACE;
|
||||
if (!strcmp(&issuer[16], "XS0000000c"))
|
||||
return CERT_RETAIL_XSc_IDENT;
|
||||
if (!strcmp(&issuer[16], "CP0000000b"))
|
||||
return CERT_RETAIL_CPb_IDENT;
|
||||
}
|
||||
|
||||
if (issuer[14] == '4') { // dev
|
||||
if (issuer[15] == 0)
|
||||
return CERT_DEV_CA4_IDENT;
|
||||
if (issuer[15] != '-')
|
||||
return CERT_NO_STORE_SPACE;
|
||||
if (!strcmp(&issuer[16], "XS00000009"))
|
||||
return CERT_DEV_XS9_IDENT;
|
||||
if (!strcmp(&issuer[16], "CP0000000a"))
|
||||
return CERT_DEV_CPa_IDENT;
|
||||
}
|
||||
|
||||
return CERT_NO_STORE_SPACE;
|
||||
}
|
||||
|
||||
static bool _LoadFromCertStorage(Certificate* cert, u32 ident) {
|
||||
if (ident == CERT_NO_STORE_SPACE)
|
||||
return false;
|
||||
|
||||
Certificate* _cert = NULL;
|
||||
|
||||
switch (ident) {
|
||||
case CERT_RETAIL_CA3_IDENT:
|
||||
if (_CommonCertsStorage.loaded_certs_flg & CERT_RETAIL_CA3_IDENT)
|
||||
_cert = &_CommonCertsStorage.retail_CA3;
|
||||
break;
|
||||
case CERT_RETAIL_XSc_IDENT:
|
||||
if (_CommonCertsStorage.loaded_certs_flg & CERT_RETAIL_XSc_IDENT)
|
||||
_cert = &_CommonCertsStorage.retail_XSc;
|
||||
break;
|
||||
case CERT_RETAIL_CPb_IDENT:
|
||||
if (_CommonCertsStorage.loaded_certs_flg & CERT_RETAIL_CPb_IDENT)
|
||||
_cert = &_CommonCertsStorage.retail_CPb;
|
||||
break;
|
||||
case CERT_DEV_CA4_IDENT:
|
||||
if (_CommonCertsStorage.loaded_certs_flg & CERT_DEV_CA4_IDENT)
|
||||
_cert = &_CommonCertsStorage.dev_CA4;
|
||||
break;
|
||||
case CERT_DEV_XS9_IDENT:
|
||||
if (_CommonCertsStorage.loaded_certs_flg & CERT_DEV_XS9_IDENT)
|
||||
_cert = &_CommonCertsStorage.dev_XS9;
|
||||
break;
|
||||
case CERT_DEV_CPa_IDENT:
|
||||
if (_CommonCertsStorage.loaded_certs_flg & CERT_DEV_CPa_IDENT)
|
||||
_cert = &_CommonCertsStorage.dev_CPa;
|
||||
break;
|
||||
default:
|
||||
break;
|
||||
}
|
||||
|
||||
if (!_cert)
|
||||
return false;
|
||||
|
||||
*cert = *_cert;
|
||||
return true;
|
||||
}
|
||||
|
||||
static void _SaveToCertStorage(const Certificate* cert, u32 ident) {
|
||||
if (ident == CERT_NO_STORE_SPACE)
|
||||
return;
|
||||
|
||||
Certificate* _cert = NULL;
|
||||
u8* raw_space = NULL;
|
||||
u32 raw_size = 0;
|
||||
|
||||
switch (ident) {
|
||||
case CERT_RETAIL_CA3_IDENT:
|
||||
if (!(_CommonCertsStorage.loaded_certs_flg & CERT_RETAIL_CA3_IDENT)) {
|
||||
_cert = &_CommonCertsStorage.retail_CA3;
|
||||
raw_space = &_CommonCertsStorage.retail_CA3_raw[0];
|
||||
raw_size = sizeof(_CommonCertsStorage.retail_CA3_raw);
|
||||
}
|
||||
break;
|
||||
case CERT_RETAIL_XSc_IDENT:
|
||||
if (!(_CommonCertsStorage.loaded_certs_flg & CERT_RETAIL_XSc_IDENT)) {
|
||||
_cert = &_CommonCertsStorage.retail_XSc;
|
||||
raw_space = &_CommonCertsStorage.retail_XSc_raw[0];
|
||||
raw_size = sizeof(_CommonCertsStorage.retail_XSc_raw);
|
||||
}
|
||||
break;
|
||||
case CERT_RETAIL_CPb_IDENT:
|
||||
if (!(_CommonCertsStorage.loaded_certs_flg & CERT_RETAIL_CPb_IDENT)) {
|
||||
_cert = &_CommonCertsStorage.retail_CPb;
|
||||
raw_space = &_CommonCertsStorage.retail_CPb_raw[0];
|
||||
raw_size = sizeof(_CommonCertsStorage.retail_CPb_raw);
|
||||
}
|
||||
break;
|
||||
case CERT_DEV_CA4_IDENT:
|
||||
if (!(_CommonCertsStorage.loaded_certs_flg & CERT_DEV_CA4_IDENT)) {
|
||||
_cert = &_CommonCertsStorage.dev_CA4;
|
||||
raw_space = &_CommonCertsStorage.dev_CA4_raw[0];
|
||||
raw_size = sizeof(_CommonCertsStorage.dev_CA4_raw);
|
||||
}
|
||||
break;
|
||||
case CERT_DEV_XS9_IDENT:
|
||||
if (!(_CommonCertsStorage.loaded_certs_flg & CERT_DEV_XS9_IDENT)) {
|
||||
_cert = &_CommonCertsStorage.dev_XS9;
|
||||
raw_space = &_CommonCertsStorage.dev_XS9_raw[0];
|
||||
raw_size = sizeof(_CommonCertsStorage.dev_XS9_raw);
|
||||
}
|
||||
break;
|
||||
case CERT_DEV_CPa_IDENT:
|
||||
if (!(_CommonCertsStorage.loaded_certs_flg & CERT_DEV_CPa_IDENT)) {
|
||||
_cert = &_CommonCertsStorage.dev_CPa;
|
||||
raw_space = &_CommonCertsStorage.dev_CPa_raw[0];
|
||||
raw_size = sizeof(_CommonCertsStorage.dev_CPa_raw);
|
||||
}
|
||||
break;
|
||||
default:
|
||||
break;
|
||||
}
|
||||
|
||||
if (!_cert || !raw_space || !raw_size)
|
||||
return;
|
||||
|
||||
u32 sig_size = _Certificate_GetSignatureChunkSizeFromType(getbe32(cert->sig->sig_type));
|
||||
u32 data_size = _Certificate_GetDataChunkSizeFromType(getbe32(cert->data->keytype));
|
||||
|
||||
if (sig_size == 0 || data_size == 0)
|
||||
return;
|
||||
|
||||
if (sig_size + data_size != raw_size)
|
||||
return;
|
||||
|
||||
if (!_Certificate_RawCopyImpl(cert, raw_space)) {
|
||||
_CommonCertsStorage.loaded_certs_flg |= ident;
|
||||
}
|
||||
}
|
||||
|
||||
// grumble grumble, gotta avoid repeated code when possible or at least if significant enough
|
||||
|
||||
static u32 _DisaOpenCertDb(char (*path)[16], bool emunand, DisaDiffRWInfo* info, u8** cache, u32* offset, u32* max_offset) {
|
||||
GetCertDBPath(*path, emunand);
|
||||
|
||||
u8* _cache = NULL;
|
||||
if (GetDisaDiffRWInfo(*path, info, false) != 0) return 1;
|
||||
_cache = (u8*)malloc(info->size_dpfs_lvl2);
|
||||
if (!_cache) return 1;
|
||||
if (BuildDisaDiffDpfsLvl2Cache(*path, info, _cache, info->size_dpfs_lvl2) != 0) {
|
||||
free(_cache);
|
||||
return 1;
|
||||
}
|
||||
|
||||
CertsDbPartitionHeader header;
|
||||
|
||||
if (ReadDisaDiffIvfcLvl4(*path, info, 0, sizeof(CertsDbPartitionHeader), &header) != sizeof(CertsDbPartitionHeader)) {
|
||||
free(_cache);
|
||||
return 1;
|
||||
}
|
||||
|
||||
if (getbe32(header.magic) != 0x43455254 /* 'CERT' */ ||
|
||||
getbe32(header.unk) != 0 ||
|
||||
getle32(header.used_size) & 0xFF) {
|
||||
free(_cache);
|
||||
return 1;
|
||||
}
|
||||
|
||||
*cache = _cache;
|
||||
|
||||
*offset = sizeof(CertsDbPartitionHeader);
|
||||
*max_offset = getle32(header.used_size) + sizeof(CertsDbPartitionHeader);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static u32 _ProcessNextCertDbEntry(const char* path, DisaDiffRWInfo* info, Certificate* cert, u32 *full_size, char (*full_issuer)[0x41], u32* offset, u32 max_offset) {
|
||||
u8 sig_type_data[4];
|
||||
u8 keytype_data[4];
|
||||
|
||||
if (*offset + 4 > max_offset) return 1;
|
||||
|
||||
if (ReadDisaDiffIvfcLvl4(path, info, *offset, 4, sig_type_data) != 4)
|
||||
return 1;
|
||||
|
||||
u32 sig_type = getbe32(sig_type_data);
|
||||
|
||||
if (sig_type == 0x10002 || sig_type == 0x10005) return 1; // ECC signs not allowed on db
|
||||
|
||||
u32 sig_size = _Certificate_GetSignatureChunkSizeFromType(sig_type);
|
||||
if (sig_size == 0) return 1;
|
||||
|
||||
u32 keytype_off = *offset + sig_size + offsetof(CertificateBody, keytype);
|
||||
if (keytype_off + 4 > max_offset) return 1;
|
||||
|
||||
if (ReadDisaDiffIvfcLvl4(path, info, keytype_off, 4, keytype_data) != 4)
|
||||
return 1;
|
||||
|
||||
u32 keytype = getbe32(keytype_data);
|
||||
|
||||
if (keytype == 2) return 1; // ECC keys not allowed on db
|
||||
|
||||
u32 data_size = _Certificate_GetDataChunkSizeFromType(keytype);
|
||||
if (data_size == 0) return 1;
|
||||
|
||||
*full_size = sig_size + data_size;
|
||||
if (*offset + *full_size > max_offset) return 1;
|
||||
|
||||
cert->sig = (CertificateSignature*)malloc(sig_size);
|
||||
cert->data = (CertificateBody*)malloc(data_size);
|
||||
if (!cert->sig || !cert->data)
|
||||
return 1;
|
||||
|
||||
if (ReadDisaDiffIvfcLvl4(path, info, *offset, sig_size, cert->sig) != sig_size)
|
||||
return 1;
|
||||
|
||||
if (ReadDisaDiffIvfcLvl4(path, info, *offset + sig_size, data_size, cert->data) != data_size)
|
||||
return 1;
|
||||
|
||||
if (!Certificate_IsValid(cert))
|
||||
return 1;
|
||||
|
||||
if (snprintf(*full_issuer, 0x41, "%s-%s", cert->data->issuer, cert->data->name) > 0x40)
|
||||
return 1;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
// certificates returned by this call are not to be deemed safe to edit, pointers or pointed data
|
||||
u32 LoadCertFromCertDb(Certificate* cert, const char* issuer) {
|
||||
if (!issuer || !cert) return 1;
|
||||
|
||||
u32 _ident = _Issuer_To_StorageIdent(issuer);
|
||||
if (_LoadFromCertStorage(cert, _ident)) {
|
||||
return 0;
|
||||
}
|
||||
|
||||
int ret = 1;
|
||||
|
||||
for (int i = 0; i < 2 && ret; ++i) {
|
||||
Certificate cert_local = CERTIFICATE_NULL_INIT;
|
||||
|
||||
char path[16];
|
||||
DisaDiffRWInfo info;
|
||||
u8* cache;
|
||||
|
||||
u32 offset, max_offset;
|
||||
|
||||
if (_DisaOpenCertDb(&path, i ? true : false, &info, &cache, &offset, &max_offset))
|
||||
return 1;
|
||||
|
||||
// certs.db has no filesystem.. its pretty plain, certificates after another
|
||||
// but also, certificates are not equally sized
|
||||
// so most cases of bad data, leads to giving up
|
||||
while (offset < max_offset) {
|
||||
char full_issuer[0x41];
|
||||
u32 full_size;
|
||||
|
||||
if (_ProcessNextCertDbEntry(path, &info, &cert_local, &full_size, &full_issuer, &offset, max_offset))
|
||||
break;
|
||||
|
||||
if (!strcmp(full_issuer, issuer)) {
|
||||
ret = 0;
|
||||
break;
|
||||
}
|
||||
|
||||
_Certificate_CleanupImpl(&cert_local);
|
||||
|
||||
offset += full_size;
|
||||
}
|
||||
|
||||
if (ret) {
|
||||
_Certificate_CleanupImpl(&cert_local);
|
||||
} else {
|
||||
*cert = cert_local;
|
||||
_SaveToCertStorage(&cert_local, _ident);
|
||||
}
|
||||
|
||||
free(cache);
|
||||
}
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
// I dont expect many certs on a cert bundle, so I'll cap it to 8
|
||||
u32 BuildRawCertBundleFromCertDb(void* rawout, size_t* size, const char* const* cert_issuers, int count) {
|
||||
if (!rawout || !size || !cert_issuers || count < 0 || count > 8) return 1;
|
||||
if (!*size && count) return 1;
|
||||
if (!count) { // *shrug*
|
||||
*size = 0;
|
||||
return 0;
|
||||
}
|
||||
|
||||
for (int i = 0; i < count; ++i) {
|
||||
if (!cert_issuers[i])
|
||||
return 1;
|
||||
}
|
||||
|
||||
Certificate certs[8];
|
||||
u8 certs_loaded = 0;
|
||||
|
||||
memset(certs, 0, sizeof(certs));
|
||||
|
||||
int loaded_count = 0;
|
||||
|
||||
// search static storage first
|
||||
for (int i = 0; i < count; ++i) {
|
||||
u32 _ident = _Issuer_To_StorageIdent(cert_issuers[i]);
|
||||
if (_LoadFromCertStorage(&certs[i], _ident)) {
|
||||
certs_loaded |= BIT(i);
|
||||
++loaded_count;
|
||||
}
|
||||
}
|
||||
|
||||
int ret = 0;
|
||||
|
||||
for (int i = 0; i < 2 && loaded_count != count && !ret; ++i) {
|
||||
Certificate cert_local = CERTIFICATE_NULL_INIT;
|
||||
|
||||
char path[16];
|
||||
DisaDiffRWInfo info;
|
||||
u8* cache;
|
||||
|
||||
u32 offset, max_offset;
|
||||
|
||||
if (_DisaOpenCertDb(&path, i ? true : false, &info, &cache, &offset, &max_offset))
|
||||
continue;
|
||||
|
||||
while (offset < max_offset) {
|
||||
char full_issuer[0x41];
|
||||
u32 full_size;
|
||||
|
||||
if (_ProcessNextCertDbEntry(path, &info, &cert_local, &full_size, &full_issuer, &offset, max_offset))
|
||||
break;
|
||||
|
||||
for (int j = 0; j < count; j++) {
|
||||
if (certs_loaded & BIT(j)) continue;
|
||||
if (!strcmp(full_issuer, cert_issuers[j])) {
|
||||
ret = _Certificate_AllocCopyOutImpl(&cert_local, &certs[j]);
|
||||
if (ret) break;
|
||||
certs_loaded |= BIT(j);
|
||||
++loaded_count;
|
||||
}
|
||||
}
|
||||
|
||||
// while at it, try to save to static storage, if applicable
|
||||
u32 _ident = _Issuer_To_StorageIdent(full_issuer);
|
||||
_SaveToCertStorage(&cert_local, _ident);
|
||||
|
||||
_Certificate_CleanupImpl(&cert_local);
|
||||
|
||||
if (loaded_count == count || ret) // early exit
|
||||
break;
|
||||
|
||||
offset += full_size;
|
||||
}
|
||||
|
||||
free(cache);
|
||||
}
|
||||
|
||||
if (!ret && loaded_count == count) {
|
||||
u8* out = (u8*)rawout;
|
||||
size_t limit = *size, written = 0;
|
||||
|
||||
for (int i = 0; i < count; ++i) {
|
||||
u32 sig_size = _Certificate_GetSignatureChunkSizeFromType(getbe32(certs[i].sig->sig_type));
|
||||
u32 data_size = _Certificate_GetDataChunkSizeFromType(getbe32(certs[i].data->keytype));
|
||||
|
||||
if (sig_size == 0 || data_size == 0) {
|
||||
ret = 1;
|
||||
break;
|
||||
}
|
||||
|
||||
u32 full_size = sig_size + data_size;
|
||||
|
||||
if (written + full_size > limit) {
|
||||
ret = 1;
|
||||
break;
|
||||
}
|
||||
|
||||
if (_Certificate_RawCopyImpl(&certs[i], out)) {
|
||||
ret = 1;
|
||||
break;
|
||||
}
|
||||
|
||||
out += full_size;
|
||||
written += full_size;
|
||||
}
|
||||
|
||||
if (!ret)
|
||||
*size = written;
|
||||
} else {
|
||||
ret = 1;
|
||||
}
|
||||
|
||||
for (int i = 0; i < count; ++i) {
|
||||
if (certs_loaded & BIT(i))
|
||||
_Certificate_CleanupImpl(&certs[i]);
|
||||
}
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
@ -2,21 +2,54 @@
|
||||
|
||||
#include "common.h"
|
||||
|
||||
#define CERT_SIZE sizeof(Certificate)
|
||||
#define CERT_MAX_SIZE (sizeof(CertificateSignature) + 0x23C + sizeof(CertificateBody) + 0x238)
|
||||
|
||||
#define CERT_RSA4096_SIG_SIZE (sizeof(CertificateSignature) + 0x23C)
|
||||
#define CERT_RSA2048_SIG_SIZE (sizeof(CertificateSignature) + 0x13C)
|
||||
#define CERT_ECC_SIG_SIZE (sizeof(CertificateSignature) + 0x7C)
|
||||
#define CERT_RSA4096_BODY_SIZE (sizeof(CertificateBody) + 0x238)
|
||||
#define CERT_RSA2048_BODY_SIZE (sizeof(CertificateBody) + 0x138)
|
||||
#define CERT_ECC_BODY_SIZE (sizeof(CertificateBody) + 0x78)
|
||||
|
||||
#define CERTIFICATE_NULL_INIT ((Certificate){NULL, NULL})
|
||||
|
||||
// from: http://3dbrew.org/wiki/Certificates
|
||||
// all numbers in big endian
|
||||
typedef struct {
|
||||
u8 sig_type[4]; // expected: 0x010004 / RSA_2048 SHA256
|
||||
u8 signature[0x100];
|
||||
u8 padding0[0x3C];
|
||||
u8 issuer[0x40];
|
||||
u8 keytype[4]; // expected: 0x01 / RSA_2048
|
||||
u8 name[0x40];
|
||||
u8 unknown[4];
|
||||
u8 mod[0x100];
|
||||
u8 exp[0x04];
|
||||
u8 padding1[0x34];
|
||||
} PACKED_STRUCT Certificate;
|
||||
u8 sig_type[4];
|
||||
u8 signature[];
|
||||
} PACKED_ALIGN(1) CertificateSignature;
|
||||
|
||||
u32 LoadCertFromCertDb(u64 offset, Certificate* cert, u32* mod, u32* exp);
|
||||
typedef struct {
|
||||
char issuer[0x40];
|
||||
u8 keytype[4];
|
||||
char name[0x40];
|
||||
u8 expiration[4];
|
||||
u8 pub_key_data[];
|
||||
} PACKED_ALIGN(1) CertificateBody;
|
||||
|
||||
typedef struct {
|
||||
CertificateSignature* sig;
|
||||
CertificateBody* data;
|
||||
} Certificate;
|
||||
|
||||
bool Certificate_IsValid(const Certificate* cert);
|
||||
bool Certificate_IsRSA(const Certificate* cert);
|
||||
bool Certificate_IsECC(const Certificate* cert);
|
||||
u32 Certificate_GetSignatureSize(const Certificate* cert, u32* size);
|
||||
u32 Certificate_GetModulusSize(const Certificate* cert, u32* size);
|
||||
u32 Certificate_GetModulus(const Certificate* cert, void* mod);
|
||||
u32 Certificate_GetExponent(const Certificate* cert, void* exp);
|
||||
u32 Certificate_GetEccSingleCoordinateSize(const Certificate* cert, u32* size);
|
||||
u32 Certificate_GetEccXY(const Certificate* cert, void* X, void* Y);
|
||||
u32 Certificate_GetSignatureChunkSize(const Certificate* cert, u32* size);
|
||||
u32 Certificate_GetDataChunkSize(const Certificate* cert, u32* size);
|
||||
u32 Certificate_GetFullSize(const Certificate* cert, u32* size);
|
||||
u32 Certificate_VerifySignatureBlock(const Certificate* cert, const void* sig, u32 sig_size, const void* data, u32 data_size, bool sha256);
|
||||
u32 Certificate_MakeEditSafe(Certificate* cert);
|
||||
u32 Certificate_AllocCopyOut(const Certificate* cert, Certificate* out_cert);
|
||||
u32 Certificate_RawCopy(const Certificate* cert, void* raw);
|
||||
u32 Certificate_Cleanup(Certificate* cert);
|
||||
|
||||
u32 LoadCertFromCertDb(Certificate* cert, const char* issuer);
|
||||
u32 BuildRawCertBundleFromCertDb(void* rawout, size_t* size, const char* const* cert_issuers, int count);
|
||||
|
@ -4,6 +4,7 @@
|
||||
#include "ff.h"
|
||||
#include "aes.h"
|
||||
#include "sha.h"
|
||||
#include "cert.h"
|
||||
|
||||
u32 ValidateCiaHeader(CiaHeader* header) {
|
||||
if ((header->size_header != CIA_HEADER_SIZE) ||
|
||||
@ -18,20 +19,20 @@ u32 ValidateCiaHeader(CiaHeader* header) {
|
||||
|
||||
u32 GetCiaInfo(CiaInfo* info, CiaHeader* header) {
|
||||
if ((u8*) info != (u8*) header) memcpy(info, header, 0x20); // take over first 0x20 byte
|
||||
|
||||
|
||||
info->offset_cert = align(header->size_header, 64);
|
||||
info->offset_ticket = info->offset_cert + align(header->size_cert, 64);
|
||||
info->offset_tmd = info->offset_ticket + align(header->size_ticket, 64);
|
||||
info->offset_content = info->offset_tmd + align(header->size_tmd, 64);
|
||||
info->offset_meta = (header->size_meta) ? info->offset_content + align(header->size_content, 64) : 0;
|
||||
info->offset_content_list = info->offset_tmd + sizeof(TitleMetaData);
|
||||
|
||||
|
||||
info->size_content_list = info->size_tmd - sizeof(TitleMetaData);
|
||||
info->size_cia = (header->size_meta) ? info->offset_meta + info->size_meta :
|
||||
info->offset_content + info->size_content;
|
||||
|
||||
|
||||
info->max_contents = (info->size_tmd - sizeof(TitleMetaData)) / sizeof(TmdContentChunk);
|
||||
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
@ -58,29 +59,22 @@ u32 BuildCiaCert(u8* ciacert) {
|
||||
0xFB, 0xD2, 0xC0, 0x47, 0x95, 0xB9, 0x4C, 0xC8, 0x0B, 0x64, 0x58, 0x96, 0xF6, 0x61, 0x0F, 0x52,
|
||||
0x18, 0x83, 0xAF, 0xE0, 0xF4, 0xE5, 0x62, 0xBA, 0x69, 0xEE, 0x72, 0x2A, 0xC2, 0x4E, 0x95, 0xB3
|
||||
};
|
||||
|
||||
// open certs.db file on SysNAND
|
||||
FIL db;
|
||||
UINT bytes_read;
|
||||
if (f_open(&db, "1:/dbs/certs.db", FA_READ | FA_OPEN_EXISTING) != FR_OK)
|
||||
|
||||
static const char* const retail_issuers[] = {"Root-CA00000003", "Root-CA00000003-XS0000000c", "Root-CA00000003-CP0000000b"};
|
||||
static const char* const dev_issuers[] = {"Root-CA00000004", "Root-CA00000004-XS00000009", "Root-CA00000004-CP0000000a"};
|
||||
|
||||
size_t size = CIA_CERT_SIZE;
|
||||
if (BuildRawCertBundleFromCertDb(ciacert, &size, !IS_DEVKIT ? retail_issuers : dev_issuers, 3) ||
|
||||
size != CIA_CERT_SIZE) {
|
||||
return 1;
|
||||
// grab CIA cert from 4 offsets
|
||||
f_lseek(&db, 0x0C10);
|
||||
f_read(&db, ciacert + 0x000, 0x1F0, &bytes_read);
|
||||
f_lseek(&db, 0x3A00);
|
||||
f_read(&db, ciacert + 0x1F0, 0x210, &bytes_read);
|
||||
f_lseek(&db, 0x3F10);
|
||||
f_read(&db, ciacert + 0x400, 0x300, &bytes_read);
|
||||
f_lseek(&db, 0x3C10);
|
||||
f_read(&db, ciacert + 0x700, 0x300, &bytes_read);
|
||||
f_close(&db);
|
||||
|
||||
}
|
||||
|
||||
// check the certificate hash
|
||||
u8 cert_hash[0x20];
|
||||
sha_quick(cert_hash, ciacert, CIA_CERT_SIZE, SHA256_MODE);
|
||||
if (memcmp(cert_hash, IS_DEVKIT ? cert_hash_expected_dev : cert_hash_expected, 0x20) != 0)
|
||||
return 1;
|
||||
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
23
arm9/source/game/cifinish.h
Normal file
23
arm9/source/game/cifinish.h
Normal file
@ -0,0 +1,23 @@
|
||||
#pragma once
|
||||
|
||||
#include "common.h"
|
||||
|
||||
#define CIFINISH_MAGIC "CIFINISH"
|
||||
#define CIFINISH_TITLE_MAGIC "TITLE"
|
||||
#define CIFINISH_SIZE(c) (sizeof(CifinishHeader) + ((((CifinishHeader*)(c))->n_entries) * sizeof(CifinishTitle)))
|
||||
|
||||
// see: https://github.com/ihaveamac/custom-install/blob/ac0be9d61d7ebef9356df23036dc53e8e862011a/custominstall.py#L163
|
||||
typedef struct {
|
||||
char magic[8];
|
||||
u32 version;
|
||||
u32 n_entries;
|
||||
} __attribute__((packed, aligned(4))) CifinishHeader;
|
||||
|
||||
typedef struct {
|
||||
char magic[5];
|
||||
u8 padding0;
|
||||
u8 has_seed; // 1 if it does, otherwise 0
|
||||
u8 padding1;
|
||||
u64 title_id;
|
||||
u8 seed[16];
|
||||
} __attribute__((packed, aligned(4))) CifinishTitle;
|
@ -1,4 +1,5 @@
|
||||
#include "codelzss.h"
|
||||
#include "language.h"
|
||||
#include "ui.h"
|
||||
|
||||
#define CODE_COMP_SIZE(f) ((f)->off_size_comp & 0xFFFFFF)
|
||||
@ -16,10 +17,10 @@ typedef struct {
|
||||
|
||||
u32 GetCodeLzssUncompressedSize(void* footer, u32 comp_size) {
|
||||
if (comp_size < sizeof(CodeLzssFooter)) return 0;
|
||||
|
||||
|
||||
CodeLzssFooter* f = (CodeLzssFooter*) footer;
|
||||
if ((CODE_COMP_SIZE(f) > comp_size) || (CODE_COMP_END(f) < 0)) return 0;
|
||||
|
||||
|
||||
return CODE_DEC_SIZE(f) + (comp_size - CODE_COMP_SIZE(f));
|
||||
}
|
||||
|
||||
@ -27,40 +28,40 @@ u32 GetCodeLzssUncompressedSize(void* footer, u32 comp_size) {
|
||||
u32 DecompressCodeLzss(u8* code, u32* code_size, u32 max_size) {
|
||||
u8* data_start = code;
|
||||
u8* comp_start = data_start;
|
||||
|
||||
|
||||
// get footer, fix comp_start offset
|
||||
if ((*code_size < sizeof(CodeLzssFooter)) || (*code_size > max_size)) return 1;
|
||||
CodeLzssFooter* footer = (CodeLzssFooter*) (void*) (data_start + *code_size - sizeof(CodeLzssFooter));
|
||||
if (CODE_COMP_SIZE(footer) <= *code_size) comp_start += *code_size - CODE_COMP_SIZE(footer);
|
||||
else return 1;
|
||||
|
||||
|
||||
// more sanity checks
|
||||
if ((CODE_COMP_END(footer) < 0) || (CODE_DEC_SIZE(footer) > max_size))
|
||||
return 1; // not reverse LZSS compressed code or too big uncompressed
|
||||
|
||||
|
||||
// set pointers
|
||||
u8* data_end = (u8*) comp_start + CODE_DEC_SIZE(footer);
|
||||
u8* ptr_in = (u8*) comp_start + CODE_COMP_END(footer);
|
||||
u8* ptr_out = data_end;
|
||||
|
||||
|
||||
// main decompression loop
|
||||
while ((ptr_in > comp_start) && (ptr_out > comp_start)) {
|
||||
if (!ShowProgress(data_end - ptr_out, data_end - data_start, "Decompressing .code...")) {
|
||||
if (ShowPrompt(true, "Decompressing .code...\nB button detected. Cancel?")) return 1;
|
||||
ShowProgress(0, data_end - data_start, "Decompressing .code...");
|
||||
ShowProgress(data_end - ptr_out, data_end - data_start, "Decompressing .code...");
|
||||
if (!ShowProgress(data_end - ptr_out, data_end - data_start, STR_DECOMPRESSING_DOT_CODE)) {
|
||||
if (ShowPrompt(true, "%s", STR_DECOMPRESSING_DOT_CODE_B_DETECTED_CANCEL)) return 1;
|
||||
ShowProgress(0, data_end - data_start, STR_DECOMPRESSING_DOT_CODE);
|
||||
ShowProgress(data_end - ptr_out, data_end - data_start, STR_DECOMPRESSING_DOT_CODE);
|
||||
}
|
||||
|
||||
|
||||
// sanity check
|
||||
if (ptr_out < ptr_in) return 1;
|
||||
|
||||
|
||||
// read and process control byte
|
||||
u8 ctrlbyte = *(--ptr_in);
|
||||
for (int i = 7; i >= 0; i--) {
|
||||
// end conditions met?
|
||||
if ((ptr_in <= comp_start) || (ptr_out <= comp_start))
|
||||
break;
|
||||
|
||||
|
||||
// process control byte
|
||||
if ((ctrlbyte >> i) & 0x1) {
|
||||
// control bit set, read segment code
|
||||
@ -69,11 +70,11 @@ u32 DecompressCodeLzss(u8* code, u32* code_size, u32 max_size) {
|
||||
if (ptr_in < comp_start) return 1; // corrupted code
|
||||
u32 seg_off = CODE_SEG_OFFSET(seg_code);
|
||||
u32 seg_len = CODE_SEG_SIZE(seg_code);
|
||||
|
||||
|
||||
// sanity check for output pointer
|
||||
if ((ptr_out - seg_len < comp_start) || (ptr_out + seg_off >= data_end))
|
||||
return 1;
|
||||
|
||||
|
||||
// copy data to the correct place
|
||||
for (u32 c = 0; c < seg_len; c++) {
|
||||
u8 byte = *(ptr_out + seg_off);
|
||||
@ -83,17 +84,17 @@ u32 DecompressCodeLzss(u8* code, u32* code_size, u32 max_size) {
|
||||
// sanity check for both pointers
|
||||
if ((ptr_out == comp_start) || (ptr_in == comp_start))
|
||||
return 1;
|
||||
|
||||
|
||||
// control bit not set, copy byte verbatim
|
||||
*(--ptr_out) = *(--ptr_in);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
// check pointers
|
||||
if ((ptr_in != comp_start) || (ptr_out != comp_start))
|
||||
return 1;
|
||||
|
||||
|
||||
// all fine if arriving here - return the result
|
||||
*code_size = data_end - data_start;
|
||||
return 0;
|
||||
@ -116,7 +117,7 @@ void initTable(sCompressInfo* a_pInfo, void* a_pWork) {
|
||||
a_pInfo->ReversedOffsetTable = (s16*)(a_pWork) + 4098;
|
||||
a_pInfo->ByteTable = (s16*)(a_pWork) + 4098 + 4098;
|
||||
a_pInfo->EndTable = (s16*)(a_pWork) + 4098 + 4098 + 256;
|
||||
|
||||
|
||||
for (int i = 0; i < 256; i++) {
|
||||
a_pInfo->ByteTable[i] = -1;
|
||||
a_pInfo->EndTable[i] = -1;
|
||||
@ -127,35 +128,35 @@ int search(sCompressInfo* a_pInfo, const u8* a_pSrc, int* a_nOffset, int a_nMaxS
|
||||
if (a_nMaxSize < 3) {
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
||||
const u8* pSearch = NULL;
|
||||
int nSize = 2;
|
||||
const u16 uWindowPos = a_pInfo->WindowPos;
|
||||
const u16 uWindowLen = a_pInfo->WindowLen;
|
||||
s16* pReversedOffsetTable = a_pInfo->ReversedOffsetTable;
|
||||
|
||||
|
||||
for (s16 nOffset = a_pInfo->EndTable[*(a_pSrc - 1)]; nOffset != -1; nOffset = pReversedOffsetTable[nOffset]) {
|
||||
if (nOffset < uWindowPos) {
|
||||
pSearch = a_pSrc + uWindowPos - nOffset;
|
||||
} else {
|
||||
pSearch = a_pSrc + uWindowLen + uWindowPos - nOffset;
|
||||
}
|
||||
|
||||
|
||||
if (pSearch - a_pSrc < 3) {
|
||||
continue;
|
||||
}
|
||||
|
||||
|
||||
if (*(pSearch - 2) != *(a_pSrc - 2) || *(pSearch - 3) != *(a_pSrc - 3)) {
|
||||
continue;
|
||||
}
|
||||
|
||||
|
||||
int nMaxSize = (int)((s64)min(a_nMaxSize, pSearch - a_pSrc));
|
||||
int nCurrentSize = 3;
|
||||
|
||||
|
||||
while (nCurrentSize < nMaxSize && *(pSearch - nCurrentSize - 1) == *(a_pSrc - nCurrentSize - 1)) {
|
||||
nCurrentSize++;
|
||||
}
|
||||
|
||||
|
||||
if (nCurrentSize > nSize) {
|
||||
nSize = nCurrentSize;
|
||||
*a_nOffset = (int)(pSearch - a_pSrc);
|
||||
@ -164,11 +165,11 @@ int search(sCompressInfo* a_pInfo, const u8* a_pSrc, int* a_nOffset, int a_nMaxS
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
if (nSize < 3) {
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
||||
return nSize;
|
||||
}
|
||||
|
||||
@ -181,33 +182,33 @@ void slideByte(sCompressInfo* a_pInfo, const u8* a_pSrc) {
|
||||
s16* pReversedOffsetTable = a_pInfo->ReversedOffsetTable;
|
||||
s16* pByteTable = a_pInfo->ByteTable;
|
||||
s16* pEndTable = a_pInfo->EndTable;
|
||||
|
||||
|
||||
if (uWindowLen == 4098) {
|
||||
u8 uOutData = *(a_pSrc + 4097);
|
||||
|
||||
|
||||
if ((pByteTable[uOutData] = pOffsetTable[pByteTable[uOutData]]) == -1) {
|
||||
pEndTable[uOutData] = -1;
|
||||
} else {
|
||||
pReversedOffsetTable[pByteTable[uOutData]] = -1;
|
||||
}
|
||||
|
||||
|
||||
uInsertOffset = uWindowPos;
|
||||
} else {
|
||||
uInsertOffset = uWindowLen;
|
||||
}
|
||||
|
||||
|
||||
s16 nOffset = pEndTable[uInData];
|
||||
|
||||
|
||||
if (nOffset == -1) {
|
||||
pByteTable[uInData] = uInsertOffset;
|
||||
} else {
|
||||
pOffsetTable[nOffset] = uInsertOffset;
|
||||
}
|
||||
|
||||
|
||||
pEndTable[uInData] = uInsertOffset;
|
||||
pOffsetTable[uInsertOffset] = -1;
|
||||
pReversedOffsetTable[uInsertOffset] = nOffset;
|
||||
|
||||
|
||||
if (uWindowLen == 4098) {
|
||||
a_pInfo->WindowPos = (uWindowPos + 1) % 4098;
|
||||
} else {
|
||||
@ -228,42 +229,42 @@ s64 alignBytes(s64 a_nData, s64 a_nAlignment) {
|
||||
bool CompressCodeLzss(const u8* a_pUncompressed, u32 a_uUncompressedSize, u8* a_pCompressed, u32* a_uCompressedSize) {
|
||||
const int s_nCompressWorkSize = (4098 + 4098 + 256 + 256) * sizeof(s16);
|
||||
bool bResult = true;
|
||||
|
||||
|
||||
if (a_uUncompressedSize > sizeof(CodeLzssFooter) && *a_uCompressedSize >= a_uUncompressedSize) {
|
||||
u8* pWork = malloc(s_nCompressWorkSize * sizeof(u8));
|
||||
if (!pWork) return false;
|
||||
|
||||
|
||||
do {
|
||||
sCompressInfo info;
|
||||
initTable(&info, pWork);
|
||||
|
||||
|
||||
const int nMaxSize = 0xF + 3;
|
||||
const u8* pSrc = a_pUncompressed + a_uUncompressedSize;
|
||||
u8* pDest = a_pCompressed + a_uUncompressedSize;
|
||||
|
||||
|
||||
while (pSrc - a_pUncompressed > 0 && pDest - a_pCompressed > 0) {
|
||||
if (!ShowProgress((u32)(a_pUncompressed + a_uUncompressedSize - pSrc), a_uUncompressedSize, "Compressing .code...")) {
|
||||
if (ShowPrompt(true, "Compressing .code...\nB button detected. Cancel?")) {
|
||||
if (!ShowProgress((u32)(a_pUncompressed + a_uUncompressedSize - pSrc), a_uUncompressedSize, STR_COMPRESSING_DOT_CODE)) {
|
||||
if (ShowPrompt(true, "%s", STR_COMPRESSING_DOT_CODE_B_DETECTED_CANCEL)) {
|
||||
bResult = false;
|
||||
break;
|
||||
}
|
||||
ShowProgress(0, a_uUncompressedSize, "Compressing .code...");
|
||||
ShowProgress((u32)(a_pUncompressed + a_uUncompressedSize - pSrc), a_uUncompressedSize, "Compressing .code...");
|
||||
ShowProgress(0, a_uUncompressedSize, STR_COMPRESSING_DOT_CODE);
|
||||
ShowProgress((u32)(a_pUncompressed + a_uUncompressedSize - pSrc), a_uUncompressedSize, STR_COMPRESSING_DOT_CODE);
|
||||
}
|
||||
|
||||
|
||||
u8* pFlag = --pDest;
|
||||
*pFlag = 0;
|
||||
|
||||
|
||||
for (int i = 0; i < 8; i++) {
|
||||
int nOffset = 0;
|
||||
int nSize = search(&info, pSrc, &nOffset, (int)((s64)min((s64)min(nMaxSize, pSrc - a_pUncompressed), a_pUncompressed + a_uUncompressedSize - pSrc)));
|
||||
|
||||
|
||||
if (nSize < 3) {
|
||||
if (pDest - a_pCompressed < 1) {
|
||||
bResult = false;
|
||||
break;
|
||||
}
|
||||
|
||||
|
||||
slide(&info, pSrc, 1);
|
||||
*--pDest = *--pSrc;
|
||||
} else {
|
||||
@ -271,7 +272,7 @@ bool CompressCodeLzss(const u8* a_pUncompressed, u32 a_uUncompressedSize, u8* a_
|
||||
bResult = false;
|
||||
break;
|
||||
}
|
||||
|
||||
|
||||
*pFlag |= 0x80 >> i;
|
||||
slide(&info, pSrc, nSize);
|
||||
pSrc -= nSize;
|
||||
@ -279,29 +280,29 @@ bool CompressCodeLzss(const u8* a_pUncompressed, u32 a_uUncompressedSize, u8* a_
|
||||
*--pDest = (nSize << 4 & 0xF0) | ((nOffset - 3) >> 8 & 0x0F);
|
||||
*--pDest = (nOffset - 3) & 0xFF;
|
||||
}
|
||||
|
||||
|
||||
if (pSrc - a_pUncompressed <= 0) {
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
if (!bResult) {
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
if (!bResult) {
|
||||
break;
|
||||
}
|
||||
|
||||
|
||||
*a_uCompressedSize = (u32)(a_pCompressed + a_uUncompressedSize - pDest);
|
||||
} while (false);
|
||||
|
||||
|
||||
free(pWork);
|
||||
} else {
|
||||
bResult = false;
|
||||
}
|
||||
|
||||
|
||||
if (bResult) {
|
||||
u32 uOrigSize = a_uUncompressedSize;
|
||||
u8* pCompressBuffer = a_pCompressed + a_uUncompressedSize - *a_uCompressedSize;
|
||||
@ -309,10 +310,10 @@ bool CompressCodeLzss(const u8* a_pUncompressed, u32 a_uUncompressedSize, u8* a_
|
||||
u32 uOrigSafe = 0;
|
||||
u32 uCompressSafe = 0;
|
||||
bool bOver = false;
|
||||
|
||||
|
||||
while (uOrigSize > 0) {
|
||||
u8 uFlag = pCompressBuffer[--uCompressBufferSize];
|
||||
|
||||
|
||||
for (int i = 0; i < 8; i++) {
|
||||
if ((uFlag << i & 0x80) == 0) {
|
||||
uCompressBufferSize--;
|
||||
@ -321,7 +322,7 @@ bool CompressCodeLzss(const u8* a_pUncompressed, u32 a_uUncompressedSize, u8* a_
|
||||
int nSize = (pCompressBuffer[--uCompressBufferSize] >> 4 & 0x0F) + 3;
|
||||
uCompressBufferSize--;
|
||||
uOrigSize -= nSize;
|
||||
|
||||
|
||||
if (uOrigSize < uCompressBufferSize) {
|
||||
uOrigSafe = uOrigSize;
|
||||
uCompressSafe = uCompressBufferSize;
|
||||
@ -329,24 +330,24 @@ bool CompressCodeLzss(const u8* a_pUncompressed, u32 a_uUncompressedSize, u8* a_
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
if (uOrigSize <= 0) {
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
if (bOver) {
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
u32 uCompressedSize = *a_uCompressedSize - uCompressSafe;
|
||||
u32 uPadOffset = uOrigSafe + uCompressedSize;
|
||||
u32 uCompFooterOffset = (u32)(alignBytes(uPadOffset, 4));
|
||||
*a_uCompressedSize = uCompFooterOffset + sizeof(CodeLzssFooter);
|
||||
u32 uTop = *a_uCompressedSize - uOrigSafe;
|
||||
u32 uBottom = *a_uCompressedSize - uPadOffset;
|
||||
|
||||
|
||||
if (*a_uCompressedSize >= a_uUncompressedSize || uTop > 0xFFFFFF) {
|
||||
bResult = false;
|
||||
} else {
|
||||
@ -358,6 +359,6 @@ bool CompressCodeLzss(const u8* a_pUncompressed, u32 a_uUncompressedSize, u8* a_
|
||||
pCompFooter->addsize_dec = a_uUncompressedSize - *a_uCompressedSize;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
return bResult;
|
||||
}
|
||||
|
@ -107,13 +107,13 @@ inline static u32 DisaDiffSize(const TCHAR* path) {
|
||||
|
||||
inline static FRESULT DisaDiffOpen(const TCHAR* path) {
|
||||
FRESULT res = FR_OK;
|
||||
|
||||
|
||||
ddfp = NULL;
|
||||
if (path) {
|
||||
res = fvx_open(&ddfile, path, FA_READ | FA_WRITE | FA_OPEN_EXISTING);
|
||||
if (res == FR_OK) ddfp = &ddfile;
|
||||
} else if (!GetMountState()) res = FR_DENIED;
|
||||
|
||||
|
||||
return res;
|
||||
}
|
||||
|
||||
@ -164,16 +164,16 @@ u32 GetDisaDiffRWInfo(const char* path, DisaDiffRWInfo* info, bool partitionB) {
|
||||
static const u8 ivfc_magic[] = { IVFC_MAGIC };
|
||||
static const u8 dpfs_magic[] = { DPFS_MAGIC };
|
||||
static const u8 difi_magic[] = { DIFI_MAGIC };
|
||||
|
||||
|
||||
// reset reader info
|
||||
memset(info, 0x00, sizeof(DisaDiffRWInfo));
|
||||
|
||||
|
||||
// get file size, header at header offset
|
||||
u32 file_size = DisaDiffSize(path);
|
||||
u8 header[0x100];
|
||||
if (DisaDiffQRead(path, header, 0x100, 0x100) != FR_OK)
|
||||
return 1;
|
||||
|
||||
|
||||
// DISA/DIFF header: find partition offset & size and DIFI descriptor
|
||||
u32 offset_partition = 0;
|
||||
u32 size_partition = 0;
|
||||
@ -207,22 +207,22 @@ u32 GetDisaDiffRWInfo(const char* path, DisaDiffRWInfo* info, bool partitionB) {
|
||||
} else {
|
||||
return 1;
|
||||
}
|
||||
|
||||
|
||||
// check the output so far
|
||||
if (!offset_difi || (offset_difi + sizeof(DifiStruct) > file_size) || (offset_partition + size_partition > file_size))
|
||||
return 1;
|
||||
|
||||
|
||||
info->offset_difi = offset_difi;
|
||||
// read DIFI struct from file
|
||||
const DifiStruct difis;
|
||||
if (DisaDiffQRead(path, (DifiStruct*) &difis, offset_difi, sizeof(DifiStruct)) != FR_OK)
|
||||
return 1;
|
||||
|
||||
|
||||
if ((memcmp(difis.difi.magic, difi_magic, 8) != 0) ||
|
||||
(memcmp(difis.ivfc.magic, ivfc_magic, 8) != 0) ||
|
||||
(memcmp(difis.dpfs.magic, dpfs_magic, 8) != 0))
|
||||
return 1;
|
||||
|
||||
|
||||
// check & get data from DIFI header
|
||||
const DifiHeader* difi = &(difis.difi);
|
||||
if ((difi->offset_ivfc != sizeof(DifiHeader)) ||
|
||||
@ -232,12 +232,12 @@ u32 GetDisaDiffRWInfo(const char* path, DisaDiffRWInfo* info, bool partitionB) {
|
||||
(difi->offset_hash != difi->offset_dpfs + difi->size_dpfs) ||
|
||||
(difi->size_hash < 0x20))
|
||||
return 1;
|
||||
|
||||
|
||||
info->dpfs_lvl1_selector = difi->dpfs_lvl1_selector;
|
||||
info->ivfc_use_extlvl4 = difi->ivfc_use_extlvl4;
|
||||
info->offset_ivfc_lvl4 = (u32) (offset_partition + difi->ivfc_offset_extlvl4);
|
||||
info->offset_master_hash = (u32) difi->offset_hash;
|
||||
|
||||
|
||||
// check & get data from DPFS descriptor
|
||||
const DpfsDescriptor* dpfs = &(difis.dpfs);
|
||||
if ((dpfs->offset_lvl1 + dpfs->size_lvl1 > dpfs->offset_lvl2) ||
|
||||
@ -246,7 +246,7 @@ u32 GetDisaDiffRWInfo(const char* path, DisaDiffRWInfo* info, bool partitionB) {
|
||||
(2 > dpfs->log_lvl2) || (dpfs->log_lvl2 > dpfs->log_lvl3) ||
|
||||
!dpfs->size_lvl1 || !dpfs->size_lvl2 || !dpfs->size_lvl3)
|
||||
return 1;
|
||||
|
||||
|
||||
info->offset_dpfs_lvl1 = (u32) (offset_partition + dpfs->offset_lvl1);
|
||||
info->offset_dpfs_lvl2 = (u32) (offset_partition + dpfs->offset_lvl2);
|
||||
info->offset_dpfs_lvl3 = (u32) (offset_partition + dpfs->offset_lvl3);
|
||||
@ -255,7 +255,7 @@ u32 GetDisaDiffRWInfo(const char* path, DisaDiffRWInfo* info, bool partitionB) {
|
||||
info->size_dpfs_lvl3 = (u32) dpfs->size_lvl3;
|
||||
info->log_dpfs_lvl2 = (u32) dpfs->log_lvl2;
|
||||
info->log_dpfs_lvl3 = (u32) dpfs->log_lvl3;
|
||||
|
||||
|
||||
// check & get data from IVFC descriptor
|
||||
const IvfcDescriptor* ivfc = &(difis.ivfc);
|
||||
if ((ivfc->size_hash != difi->size_hash) ||
|
||||
@ -264,16 +264,16 @@ u32 GetDisaDiffRWInfo(const char* path, DisaDiffRWInfo* info, bool partitionB) {
|
||||
(ivfc->offset_lvl2 + ivfc->size_lvl2 > ivfc->offset_lvl3) ||
|
||||
(ivfc->offset_lvl3 + ivfc->size_lvl3 > dpfs->size_lvl3))
|
||||
return 1;
|
||||
|
||||
|
||||
if (!info->ivfc_use_extlvl4) {
|
||||
if ((ivfc->offset_lvl3 + ivfc->size_lvl3 > ivfc->offset_lvl4) ||
|
||||
(ivfc->offset_lvl4 + ivfc->size_lvl4 > dpfs->size_lvl3))
|
||||
return 1;
|
||||
|
||||
|
||||
info->offset_ivfc_lvl4 = (u32) ivfc->offset_lvl4;
|
||||
} else if (info->offset_ivfc_lvl4 + ivfc->size_lvl4 > offset_partition + size_partition)
|
||||
return 1;
|
||||
|
||||
|
||||
info->log_ivfc_lvl1 = (u32) ivfc->log_lvl1;
|
||||
info->log_ivfc_lvl2 = (u32) ivfc->log_lvl2;
|
||||
info->log_ivfc_lvl3 = (u32) ivfc->log_lvl3;
|
||||
@ -285,7 +285,7 @@ u32 GetDisaDiffRWInfo(const char* path, DisaDiffRWInfo* info, bool partitionB) {
|
||||
info->size_ivfc_lvl2 = (u32) ivfc->size_lvl2;
|
||||
info->size_ivfc_lvl3 = (u32) ivfc->size_lvl3;
|
||||
info->size_ivfc_lvl4 = (u32) ivfc->size_lvl4;
|
||||
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
@ -293,31 +293,31 @@ u32 BuildDisaDiffDpfsLvl2Cache(const char* path, const DisaDiffRWInfo* info, u8*
|
||||
const u32 min_cache_bits = (info->size_dpfs_lvl3 + (1 << info->log_dpfs_lvl3) - 1) >> info->log_dpfs_lvl3;
|
||||
const u32 min_cache_size = ((min_cache_bits + 31) >> (3 + 2)) << 2;
|
||||
const u32 offset_lvl1 = info->offset_dpfs_lvl1 + ((info->dpfs_lvl1_selector) ? info->size_dpfs_lvl1 : 0);
|
||||
|
||||
|
||||
// safety (this still assumes all the checks from GetDisaDiffRWInfo())
|
||||
if ((cache_size < min_cache_size) ||
|
||||
(min_cache_size > info->size_dpfs_lvl2) ||
|
||||
(min_cache_size > (info->size_dpfs_lvl1 << (3 + info->log_dpfs_lvl2)))) {
|
||||
return 1;
|
||||
}
|
||||
|
||||
|
||||
// allocate memory
|
||||
u8* lvl1 = (u8*) malloc(info->size_dpfs_lvl1);
|
||||
if (!lvl1) return 1; // this is never more than 8 byte in reality -___-
|
||||
|
||||
|
||||
// open file pointer
|
||||
if (DisaDiffOpen(path) != FR_OK) {
|
||||
free(lvl1);
|
||||
return 1;
|
||||
}
|
||||
|
||||
|
||||
// read lvl1
|
||||
u32 ret = 0;
|
||||
if ((ret != 0) || DisaDiffRead(lvl1, info->size_dpfs_lvl1, offset_lvl1)) ret = 1;
|
||||
|
||||
|
||||
// read full lvl2_0 to cache
|
||||
if ((ret != 0) || DisaDiffRead(cache, info->size_dpfs_lvl2, info->offset_dpfs_lvl2)) ret = 1;
|
||||
|
||||
|
||||
// cherry-pick lvl2_1
|
||||
u32 log_lvl2 = info->log_dpfs_lvl2;
|
||||
u32 offset_lvl2_1 = info->offset_dpfs_lvl2 + info->size_dpfs_lvl2;
|
||||
@ -330,7 +330,7 @@ u32 BuildDisaDiffDpfsLvl2Cache(const char* path, const DisaDiffRWInfo* info, u8*
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
((DisaDiffRWInfo*) info)->dpfs_lvl2_cache = cache;
|
||||
free(lvl1);
|
||||
DisaDiffClose();
|
||||
@ -344,11 +344,11 @@ static u32 ReadDisaDiffDpfsLvl3(const DisaDiffRWInfo* info, u32 offset, u32 size
|
||||
const u32 offset_lvl3_0 = info->offset_dpfs_lvl3;
|
||||
const u32 offset_lvl3_1 = offset_lvl3_0 + info->size_dpfs_lvl3;
|
||||
const u32 log_lvl3 = info->log_dpfs_lvl3;
|
||||
|
||||
|
||||
u32 read_start = offset_start;
|
||||
u32 read_end = read_start;
|
||||
u32 bit_state = 0;
|
||||
|
||||
|
||||
// full reading below
|
||||
while (size && (read_start < offset_end)) {
|
||||
// read bits until bit_state does not match
|
||||
@ -370,7 +370,7 @@ static u32 ReadDisaDiffDpfsLvl3(const DisaDiffRWInfo* info, u32 offset, u32 size
|
||||
// flip the bit_state
|
||||
bit_state = ~bit_state & 0x1;
|
||||
}
|
||||
|
||||
|
||||
return size;
|
||||
}
|
||||
|
||||
@ -381,11 +381,11 @@ static u32 WriteDisaDiffDpfsLvl3(const DisaDiffRWInfo* info, u32 offset, u32 siz
|
||||
const u32 offset_lvl3_0 = info->offset_dpfs_lvl3;
|
||||
const u32 offset_lvl3_1 = offset_lvl3_0 + info->size_dpfs_lvl3;
|
||||
const u32 log_lvl3 = info->log_dpfs_lvl3;
|
||||
|
||||
|
||||
u32 write_start = offset_start;
|
||||
u32 write_end = write_start;
|
||||
u32 bit_state = 0;
|
||||
|
||||
|
||||
// full reading below
|
||||
while (size && (write_start < offset_end)) {
|
||||
// write bits until bit_state does not match
|
||||
@ -407,40 +407,40 @@ static u32 WriteDisaDiffDpfsLvl3(const DisaDiffRWInfo* info, u32 offset, u32 siz
|
||||
// flip the bit_state
|
||||
bit_state = ~bit_state & 0x1;
|
||||
}
|
||||
|
||||
|
||||
return size;
|
||||
}
|
||||
|
||||
|
||||
u32 FixDisaDiffPartitionHash(const DisaDiffRWInfo* info) {
|
||||
const u32 size = info->size_table;
|
||||
u8 sha_buf[0x20];
|
||||
u8* buf;
|
||||
|
||||
|
||||
if (!(buf = malloc(size)))
|
||||
return 1;
|
||||
|
||||
|
||||
if (DisaDiffRead(buf, size, info->offset_table) != FR_OK) {
|
||||
free(buf);
|
||||
return 1;
|
||||
}
|
||||
|
||||
|
||||
sha_quick(sha_buf, buf, size, SHA256_MODE);
|
||||
|
||||
|
||||
free(buf);
|
||||
|
||||
|
||||
if (DisaDiffWrite(sha_buf, 0x20, info->offset_partition_hash) != FR_OK)
|
||||
return 1;
|
||||
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
u32 FixDisaDiffIvfcLevel(const DisaDiffRWInfo* info, u32 level, u32 offset, u32 size, u32* next_offset, u32* next_size) {
|
||||
if (level == 0)
|
||||
return FixDisaDiffPartitionHash(info);
|
||||
|
||||
|
||||
if (level > 4)
|
||||
return 1;
|
||||
|
||||
|
||||
const u32 offset_ivfc_lvl = (&(info->offset_ivfc_lvl1))[level - 1];
|
||||
const u32 size_ivfc_lvl = (&(info->size_ivfc_lvl1))[level - 1];
|
||||
const u32 log_ivfc_lvl = (&(info->log_ivfc_lvl1))[level - 1];
|
||||
@ -448,48 +448,48 @@ u32 FixDisaDiffIvfcLevel(const DisaDiffRWInfo* info, u32 level, u32 offset, u32
|
||||
u32 read_size = block_size;
|
||||
u32 align_offset = (offset >> log_ivfc_lvl) << log_ivfc_lvl; // align starting offset
|
||||
u32 align_size = size + offset - align_offset; // increase size by the amount starting offset decreased when aligned
|
||||
|
||||
|
||||
if (level != 1) {
|
||||
if (next_offset) *next_offset = (align_offset >> log_ivfc_lvl) * 0x20;
|
||||
if (next_size) *next_size = ((align_size >> log_ivfc_lvl) + (((align_size % block_size) == 0) ? 0 : 1)) * 0x20;
|
||||
}
|
||||
|
||||
|
||||
u8 sha_buf[0x20];
|
||||
u8* buf;
|
||||
|
||||
|
||||
if (!(buf = malloc(block_size)))
|
||||
return 1;
|
||||
|
||||
|
||||
while (align_size > 0) {
|
||||
if (align_offset + block_size > size_ivfc_lvl) {
|
||||
memset(buf, 0, block_size);
|
||||
read_size -= (align_offset + block_size - size_ivfc_lvl);
|
||||
}
|
||||
|
||||
|
||||
if (((level == 4) && info->ivfc_use_extlvl4) ? (DisaDiffRead(buf, read_size, align_offset + offset_ivfc_lvl) != FR_OK) :
|
||||
(ReadDisaDiffDpfsLvl3(info, align_offset + offset_ivfc_lvl, read_size, buf) != read_size)) {
|
||||
free(buf);
|
||||
return 1;
|
||||
}
|
||||
|
||||
|
||||
sha_quick(sha_buf, buf, block_size, SHA256_MODE);
|
||||
|
||||
|
||||
if ((level == 1) ? (DisaDiffWrite(sha_buf, 0x20, info->offset_difi + info->offset_master_hash + ((align_offset >> log_ivfc_lvl) * 0x20)) != FR_OK) :
|
||||
|
||||
|
||||
if ((level == 1) ? (DisaDiffWrite(sha_buf, 0x20, info->offset_difi + info->offset_master_hash + ((align_offset >> log_ivfc_lvl) * 0x20)) != FR_OK) :
|
||||
(WriteDisaDiffDpfsLvl3(info, (&(info->offset_ivfc_lvl1))[level - 2] + ((align_offset >> log_ivfc_lvl) * 0x20), 0x20, sha_buf) != 0x20)) {
|
||||
free(buf);
|
||||
return 1;
|
||||
}
|
||||
|
||||
|
||||
align_offset += block_size;
|
||||
align_size = ((align_size < block_size) ? 0 : (align_size - block_size));
|
||||
}
|
||||
|
||||
|
||||
free(buf);
|
||||
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
||||
u32 ReadDisaDiffIvfcLvl4(const char* path, const DisaDiffRWInfo* info, u32 offset, u32 size, void* buffer) { // offset: offset inside IVFC lvl4
|
||||
// DisaDiffRWInfo not provided?
|
||||
DisaDiffRWInfo info_l;
|
||||
@ -504,15 +504,15 @@ u32 ReadDisaDiffIvfcLvl4(const char* path, const DisaDiffRWInfo* info, u32 offse
|
||||
return 0;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
// open file pointer
|
||||
if (DisaDiffOpen(path) != FR_OK)
|
||||
size = 0;
|
||||
|
||||
|
||||
// sanity checks - offset & size
|
||||
if (offset > info->size_ivfc_lvl4) return 0;
|
||||
else if (offset + size > info->size_ivfc_lvl4) size = info->size_ivfc_lvl4 - offset;
|
||||
|
||||
|
||||
if (info->ivfc_use_extlvl4) {
|
||||
if (DisaDiffRead(buffer, size, info->offset_ivfc_lvl4 + offset) != FR_OK)
|
||||
size = 0;
|
||||
@ -541,22 +541,22 @@ u32 WriteDisaDiffIvfcLvl4(const char* path, const DisaDiffRWInfo* info, u32 offs
|
||||
return 0;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
// sanity check - offset & size
|
||||
if (offset + size > info->size_ivfc_lvl4)
|
||||
return 0;
|
||||
|
||||
|
||||
// open file pointer
|
||||
if (DisaDiffOpen(path) != FR_OK)
|
||||
size = 0;
|
||||
|
||||
|
||||
if (info->ivfc_use_extlvl4) {
|
||||
if (DisaDiffWrite(buffer, size, info->offset_ivfc_lvl4 + offset) != FR_OK)
|
||||
size = 0;
|
||||
} else {
|
||||
size = WriteDisaDiffDpfsLvl3(info, info->offset_ivfc_lvl4 + offset, size, buffer);
|
||||
}
|
||||
|
||||
|
||||
if ((size != 0) && ddfp) { // if we're writing to a mounted image, the hash chain will be handled later by vdisadiff
|
||||
u32 hashfix_offset = offset, hashfix_size = size;
|
||||
for (int i = 4; i >= 0; i--) {
|
||||
@ -566,7 +566,7 @@ u32 WriteDisaDiffIvfcLvl4(const char* path, const DisaDiffRWInfo* info, u32 offs
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
DisaDiffClose();
|
||||
if (cache) free(cache);
|
||||
return size;
|
||||
|
@ -12,18 +12,19 @@
|
||||
// valid addresses for FIRM section loading
|
||||
// pairs of start / end address, provided by Wolfvak
|
||||
#define FIRM_VALID_ADDRESS \
|
||||
0x08000040, 0x08100000, \
|
||||
0x18000000, 0x18600000, \
|
||||
0x1FF00000, 0x1FFFFC00
|
||||
|
||||
// valid addresses (installable) for FIRM section loading
|
||||
#define FIRM_VALID_ADDRESS_INSTALL \
|
||||
FIRM_VALID_ADDRESS, \
|
||||
0x08000040, 0x080F7FFF, \
|
||||
0x10000000, 0x10200000
|
||||
|
||||
// valid addresses (bootable) for FIRM section loading
|
||||
#define FIRM_VALID_ADDRESS_BOOT \
|
||||
FIRM_VALID_ADDRESS, \
|
||||
0x08000040, 0x08100000, \
|
||||
0x20000000, 0x27FFFA00
|
||||
|
||||
static const u32 whitelist_boot[] = { FIRM_VALID_ADDRESS_BOOT };
|
||||
@ -169,10 +170,10 @@ u32 SetupSecretKey(u32 keynum) {
|
||||
static u8 __attribute__((aligned(32))) sector[0x200];
|
||||
static u32 got_keys = 0;
|
||||
u8* key = sector + (keynum*0x10);
|
||||
|
||||
|
||||
if (keynum >= 0x200/0x10)
|
||||
return 1; // safety
|
||||
|
||||
|
||||
// try to load full secret sector
|
||||
if (!got_keys) {
|
||||
ReadNandSectors(sector, 0x96, 1, 0x11, NAND_SYSNAND);
|
||||
@ -185,34 +186,34 @@ u32 SetupSecretKey(u32 keynum) {
|
||||
if (LoadKeyFromFile(key, 0x11, 'N', (keynum == 0) ? "95" : "96") == 0)
|
||||
got_keys |= (0x1<<keynum); // got at least this key
|
||||
}
|
||||
|
||||
|
||||
// setup the key
|
||||
if (got_keys & (0x1<<keynum)) {
|
||||
setup_aeskey(0x11, key);
|
||||
use_aeskey(0x11);
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
||||
// out of options
|
||||
return 1;
|
||||
}
|
||||
|
||||
u32 DecryptA9LHeader(FirmA9LHeader* header) {
|
||||
u32 type = A9L_CRYPTO_TYPE(header);
|
||||
|
||||
|
||||
if (SetupSecretKey(0) != 0) return 1;
|
||||
aes_decrypt(header->keyX0x15, header->keyX0x15, 1, AES_CNT_ECB_DECRYPT_MODE);
|
||||
if (type) {
|
||||
if (SetupSecretKey((type == 1) ? 0 : 1) != 0) return 1;
|
||||
aes_decrypt(header->keyX0x16, header->keyX0x16, 1, AES_CNT_ECB_DECRYPT_MODE);
|
||||
}
|
||||
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
u32 SetupArm9BinaryCrypto(FirmA9LHeader* header) {
|
||||
u32 type = A9L_CRYPTO_TYPE(header);
|
||||
|
||||
|
||||
if (type == 0) {
|
||||
u8 __attribute__((aligned(32))) keyX0x15[0x10];
|
||||
memcpy(keyX0x15, header->keyX0x15, 0x10);
|
||||
@ -230,24 +231,24 @@ u32 SetupArm9BinaryCrypto(FirmA9LHeader* header) {
|
||||
setup_aeskeyY(0x16, header->keyY0x150x16);
|
||||
use_aeskey(0x16);
|
||||
}
|
||||
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
u32 DecryptArm9Binary(void* data, u32 offset, u32 size, FirmA9LHeader* a9l) {
|
||||
// offset == offset inside ARM9 binary
|
||||
// ARM9 binary begins 0x800 byte after the ARM9 loader header
|
||||
|
||||
|
||||
// only process actual ARM9 binary
|
||||
u32 size_bin = GetArm9BinarySize(a9l);
|
||||
if (offset >= size_bin) return 0;
|
||||
else if (size >= size_bin - offset)
|
||||
size = size_bin - offset;
|
||||
|
||||
|
||||
// decrypt data
|
||||
if (SetupArm9BinaryCrypto(a9l) != 0) return 1;
|
||||
ctr_decrypt_byte(data, data, size, offset, AES_CNT_CTRNAND_MODE, a9l->ctr);
|
||||
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
@ -256,16 +257,16 @@ u32 DecryptFirm(void* data, u32 offset, u32 size, FirmHeader* firm, FirmA9LHeade
|
||||
FirmSectionHeader* arm9s = FindFirmArm9Section(firm);
|
||||
u32 offset_arm9bin = arm9s->offset + ARM9BIN_OFFSET;
|
||||
u32 size_arm9bin = GetArm9BinarySize(a9l);
|
||||
|
||||
|
||||
// sanity checks
|
||||
if (!size_arm9bin || (size_arm9bin + ARM9BIN_OFFSET > arm9s->size))
|
||||
return 1; // bad header / data
|
||||
|
||||
|
||||
// check if ARM9 binary in data
|
||||
if ((offset_arm9bin >= offset + size) ||
|
||||
(offset >= offset_arm9bin + size_arm9bin))
|
||||
return 0; // section not in data
|
||||
|
||||
|
||||
// determine data / offset / size
|
||||
u8* data8 = (u8*)data;
|
||||
u8* data_i = data8;
|
||||
@ -277,7 +278,7 @@ u32 DecryptFirm(void* data, u32 offset, u32 size, FirmHeader* firm, FirmA9LHeade
|
||||
size_i = size_arm9bin - offset_i;
|
||||
if (size_i > size - (data_i - data8))
|
||||
size_i = size - (data_i - data8);
|
||||
|
||||
|
||||
return DecryptArm9Binary(data_i, offset_i, size_i, a9l);
|
||||
}
|
||||
|
||||
@ -290,7 +291,7 @@ u32 DecryptFirmSequential(void* data, u32 offset, u32 size) {
|
||||
static FirmHeader* firmptr = NULL;
|
||||
static FirmA9LHeader* a9lptr = NULL;
|
||||
static FirmSectionHeader* arm9s = NULL;
|
||||
|
||||
|
||||
// fetch firm header from data
|
||||
if ((offset == 0) && (size >= sizeof(FirmHeader))) {
|
||||
memcpy(&firm, data, sizeof(FirmHeader));
|
||||
@ -298,17 +299,17 @@ u32 DecryptFirmSequential(void* data, u32 offset, u32 size) {
|
||||
arm9s = (firmptr) ? FindFirmArm9Section(firmptr) : NULL;
|
||||
a9lptr = NULL;
|
||||
}
|
||||
|
||||
|
||||
// safety check, firm header pointer
|
||||
if (!firmptr) return 1;
|
||||
|
||||
|
||||
// fetch ARM9 loader header from data
|
||||
if (arm9s && !a9lptr && (offset <= arm9s->offset) &&
|
||||
((offset + size) >= arm9s->offset + sizeof(FirmA9LHeader))) {
|
||||
memcpy(&a9l, (u8*)data + arm9s->offset - offset, sizeof(FirmA9LHeader));
|
||||
a9lptr = (ValidateFirmA9LHeader(&a9l) == 0) ? &a9l : NULL;
|
||||
}
|
||||
|
||||
|
||||
return (a9lptr) ? DecryptFirm(data, offset, size, firmptr, a9lptr) : 0;
|
||||
}
|
||||
|
||||
@ -318,17 +319,17 @@ u32 DecryptFirmFull(void* data, u32 size) {
|
||||
FirmSectionHeader* arm9s = FindFirmArm9Section(firm);
|
||||
if (ValidateFirmHeader(firm, size) != 0) return 1; // not a proper firm
|
||||
if (!arm9s) return 0; // no ARM9 section -> not encrypted -> done
|
||||
|
||||
|
||||
FirmA9LHeader* a9l = (FirmA9LHeader*)(void*) ((u8*) data + arm9s->offset);
|
||||
if (ValidateFirmA9LHeader(a9l) != 0) return 0; // no ARM9bin -> not encrypted -> done
|
||||
|
||||
|
||||
// decrypt FIRM and ARM9loader header
|
||||
if ((DecryptFirm(data, 0, size, firm, a9l) != 0) || (DecryptA9LHeader(a9l) != 0))
|
||||
return 1;
|
||||
|
||||
|
||||
// fix ARM9 section SHA and ARM9 entrypoint
|
||||
sha_quick(arm9s->hash, (u8*) data + arm9s->offset, arm9s->size, SHA256_MODE);
|
||||
firm->entry_arm9 = ARM9ENTRY_FIX(firm);
|
||||
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
@ -20,3 +20,4 @@
|
||||
#include "bdri.h"
|
||||
#include "ticketdb.h"
|
||||
#include "ncchinfo.h"
|
||||
#include "cifinish.h"
|
||||
|
@ -8,20 +8,20 @@
|
||||
|
||||
u32 ValidateAgbSaveHeader(AgbSaveHeader* header) {
|
||||
static u8 magic[] = { AGBSAVE_MAGIC };
|
||||
|
||||
|
||||
// basic checks
|
||||
if ((memcmp(header->magic, magic, sizeof(magic)) != 0) ||
|
||||
(header->unknown0 != 1) || (header->save_start != 0x200) ||
|
||||
(header->save_size > AGBSAVE_MAX_SSIZE) || !(GBASAVE_VALID(header->save_size)))
|
||||
return 1;
|
||||
|
||||
|
||||
// reserved area checks
|
||||
// disabled due to a weird quirk https://github.com/d0k3/GodMode9/issues/412
|
||||
// for (u32 i = 0; i < sizeof(header->reserved0); i++) if (header->reserved0[i] != 0xFF) return 1;
|
||||
// for (u32 i = 0; i < sizeof(header->reserved1); i++) if (header->reserved1[i] != 0xFF) return 1;
|
||||
// for (u32 i = 0; i < sizeof(header->reserved2); i++) if (header->reserved2[i] != 0xFF) return 1;
|
||||
// for (u32 i = 0; i < sizeof(header->reserved3); i++) if (header->reserved3[i] != 0xFF) return 1;
|
||||
|
||||
|
||||
// all fine if arriving here
|
||||
return 0;
|
||||
}
|
||||
@ -30,60 +30,74 @@ u32 ValidateAgbSaveHeader(AgbSaveHeader* header) {
|
||||
u32 ValidateAgbHeader(AgbHeader* agb) {
|
||||
static const u8 logo_sha[0x20] = { AGBLOGO_SHA256 };
|
||||
u8 logo[0x9C] __attribute__((aligned(4)));
|
||||
|
||||
|
||||
// check fixed value
|
||||
if (agb->fixed != 0x96) return 1;
|
||||
|
||||
|
||||
// header checksum
|
||||
u8* hdr = (u8*) agb;
|
||||
u8 checksum = 0x00 - 0x19;
|
||||
for (u32 i = 0xA0; i < 0xBD; i++)
|
||||
checksum -= hdr[i];
|
||||
if (agb->checksum != checksum) return 1;
|
||||
|
||||
|
||||
// logo SHA check
|
||||
memcpy(logo, agb->logo, 0x9C);
|
||||
logo[0x98] &= ~0x84;
|
||||
logo[0x98] &= ~0x84;
|
||||
logo[0x9A] &= ~0x03;
|
||||
if (sha_cmp(logo_sha, logo, 0x9C, SHA256_MODE) != 0)
|
||||
return 1;
|
||||
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
/* u32 ValidateAgbVc(void* data, u32 len) {
|
||||
const u8 magic[] = { GBAVC_MAGIC };
|
||||
|
||||
|
||||
if (len < sizeof(AgbHeader) + sizeof(AgbVcFooter))
|
||||
return 1;
|
||||
|
||||
|
||||
AgbHeader* header = (AgbHeader*) data;
|
||||
AgbVcFooter* footer = (AgbVcFooter*) (((u8*) data) + len - sizeof(AgbVcFooter));
|
||||
|
||||
|
||||
if ((ValidateAgbHeader(header) != 0) || (memcmp(footer->magic, magic, sizeof(magic)) != 0) ||
|
||||
(footer->rom_size != len - sizeof(AgbVcFooter)))
|
||||
return 1;
|
||||
|
||||
|
||||
return 0;
|
||||
} */
|
||||
|
||||
// basically reverse ValidateAgbSaveHeader()
|
||||
/* u32 BuildAgbSaveHeader(AgbSaveHeader* header, u64 title_id, u32 save_size) {
|
||||
const u8 magic[] = { AGBSAVE_MAGIC };
|
||||
|
||||
|
||||
memset(header, 0x00, sizeof(AgbSaveHeader));
|
||||
memset(header->reserved0, 0xFF, sizeof(header->reserved0));
|
||||
memset(header->reserved1, 0xFF, sizeof(header->reserved1));
|
||||
memset(header->reserved2, 0xFF, sizeof(header->reserved2));
|
||||
memset(header->reserved3, 0xFF, sizeof(header->reserved3));
|
||||
|
||||
|
||||
memcpy(header->magic, magic, sizeof(magic));
|
||||
header->unknown0 = 0x01;
|
||||
header->title_id = title_id;
|
||||
header->save_start = 0x200;
|
||||
header->save_size = save_size;
|
||||
|
||||
|
||||
sdmmc_get_cid(0, (u32*) (void*) &(header->sd_cid));
|
||||
|
||||
|
||||
return 0;
|
||||
} */
|
||||
|
||||
// see: http://problemkaputt.de/gbatek.htm#gbacartridgeheader
|
||||
const char* AgbDestStr(const char* code) {
|
||||
switch(code[3]) {
|
||||
case 'J': return STR_REGION_JAPAN;
|
||||
case 'E': return STR_REGION_AMERICAS;
|
||||
case 'P': return STR_REGION_EUROPE;
|
||||
case 'D': return STR_REGION_GERMANY;
|
||||
case 'F': return STR_REGION_FRANCE;
|
||||
case 'I': return STR_REGION_ITALY;
|
||||
case 'S': return STR_REGION_SPAIN;
|
||||
default: return STR_REGION_UNKNOWN;
|
||||
}
|
||||
}
|
||||
|
@ -1,7 +1,8 @@
|
||||
#pragma once
|
||||
|
||||
#include "common.h"
|
||||
|
||||
#include "language.h"
|
||||
|
||||
#define GBAVC_MAGIC '.', 'C', 'A', 'A'
|
||||
#define AGBSAVE_MAGIC '.', 'S', 'A', 'V'
|
||||
#define AGBSAVE_MAX_SIZE (0x000180 * 0x200) // standard size of the NAND partition
|
||||
@ -20,25 +21,15 @@
|
||||
((tp >= 0x4) && (tp <= 0x9)) ? GBASAVE_FLASH_64K : \
|
||||
((tp >= 0xA) && (tp <= 0xD)) ? GBASAVE_FLASH_128K : \
|
||||
(tp == 0xE) ? GBASAVE_SRAM_32K : 0); // last one means invalid
|
||||
|
||||
|
||||
#define GBASAVE_VALID(size) \
|
||||
(((size) == GBASAVE_EEPROM_512) || \
|
||||
((size) == GBASAVE_EEPROM_8K) || \
|
||||
((size) == GBASAVE_SRAM_32K) || \
|
||||
((size) == GBASAVE_FLASH_64K) || \
|
||||
((size) == GBASAVE_FLASH_128K))
|
||||
|
||||
// see: http://problemkaputt.de/gbatek.htm#gbacartridgeheader
|
||||
#define AGB_DESTSTR(code) \
|
||||
(((code)[3] == 'J') ? "Japan" : \
|
||||
((code)[3] == 'E') ? "USA/English" : \
|
||||
((code)[3] == 'P') ? "Europe/Elsewhere" : \
|
||||
((code)[3] == 'D') ? "German" : \
|
||||
((code)[3] == 'F') ? "French" : \
|
||||
((code)[3] == 'I') ? "Italian" : \
|
||||
((code)[3] == 'S') ? "Spanish" : "Unknown")
|
||||
|
||||
|
||||
|
||||
// see: http://3dbrew.org/wiki/3DS_Virtual_Console#Footer
|
||||
// still a lot of unknowns in here, also redundant stuff left out
|
||||
typedef struct {
|
||||
@ -73,7 +64,7 @@ typedef struct {
|
||||
|
||||
// see: http://problemkaputt.de/gbatek.htm#gbacartridgeheader
|
||||
typedef struct {
|
||||
u32 arm7_rom_entry;
|
||||
u32 arm7_rom_entry;
|
||||
u8 logo[0x9C];
|
||||
char game_title[12];
|
||||
char game_code[4];
|
||||
@ -89,5 +80,8 @@ typedef struct {
|
||||
} __attribute__((packed, aligned(16))) AgbHeader;
|
||||
|
||||
|
||||
|
||||
u32 ValidateAgbSaveHeader(AgbSaveHeader* header);
|
||||
u32 ValidateAgbHeader(AgbHeader* agb);
|
||||
|
||||
const char* AgbDestStr(const char* code);
|
||||
|
@ -5,6 +5,7 @@
|
||||
#include "ips.h"
|
||||
#include "common.h"
|
||||
#include "fsperm.h"
|
||||
#include "language.h"
|
||||
#include "ui.h"
|
||||
#include "vff.h"
|
||||
|
||||
@ -30,21 +31,21 @@ char errName[256];
|
||||
int displayError(int errcode) {
|
||||
switch(errcode) {
|
||||
case IPS_NOTTHIS:
|
||||
ShowPrompt(false, "%s\nThe patch is most likely not intended for this file.", errName); break;
|
||||
ShowPrompt(false, "%s\n%s", errName, STR_PATCH_MOST_LIKELY_NOT_FOR_THIS_FILE); break;
|
||||
case IPS_THISOUT:
|
||||
ShowPrompt(false, "%s\nYou most likely applied the patch on the output file.", errName); break;
|
||||
ShowPrompt(false, "%s\n%s", errName, STR_YOU_MOST_LIKELY_APPLIED_PATCH_ON_OUTPUT); break;
|
||||
case IPS_SCRAMBLED:
|
||||
ShowPrompt(false, "%s\nThe patch is technically valid,\nbut seems scrambled or malformed.", errName); break;
|
||||
ShowPrompt(false, "%s\n%s", errName, STR_PATCH_TECHNICALLY_VALID_BUT_SEEMS_SCRAMBLED); break;
|
||||
case IPS_INVALID:
|
||||
ShowPrompt(false, "%s\nThe patch is invalid.", errName); break;
|
||||
ShowPrompt(false, "%s\n%s", errName, STR_PATCH_IS_INVALID); break;
|
||||
case IPS_16MB:
|
||||
ShowPrompt(false, "%s\nOne or both files is bigger than 16MB.\nThe IPS format doesn't support that.", errName); break;
|
||||
ShowPrompt(false, "%s\n%s", errName, STR_FILES_BIGGER_THAN_16MB_IPS_DOESNT_SUPPORT_THAT); break;
|
||||
case IPS_INVALID_FILE_PATH:
|
||||
ShowPrompt(false, "%s\nThe requested file path was invalid.", errName); break;
|
||||
ShowPrompt(false, "%s\n%s", errName, STR_REQUESTED_FILE_PATH_WAS_INVALID); break;
|
||||
case IPS_CANCELED:
|
||||
ShowPrompt(false, "%s\nPatching canceled.", errName); break;
|
||||
ShowPrompt(false, "%s\n%s", errName, STR_PATCHING_CANCELED); break;
|
||||
case IPS_MEMORY:
|
||||
ShowPrompt(false, "%s\nNot enough memory.", errName); break;
|
||||
ShowPrompt(false, "%s\n%s", errName, STR_NOT_ENOUGH_MEMORY); break;
|
||||
}
|
||||
fvx_close(&patchFile);
|
||||
fvx_close(&inFile);
|
||||
@ -112,15 +113,15 @@ UINT read24() {
|
||||
int ApplyIPSPatch(const char* patchName, const char* inName, const char* outName) {
|
||||
int error = IPS_INVALID;
|
||||
UINT outlen_min, outlen_max, outlen_min_mem;
|
||||
snprintf(errName, 256, "%s", patchName);
|
||||
|
||||
snprintf(errName, sizeof(errName), "%s", patchName);
|
||||
|
||||
if (fvx_open(&patchFile, patchName, FA_READ) != FR_OK) return displayError(IPS_INVALID_FILE_PATH);
|
||||
patchSize = fvx_size(&patchFile);
|
||||
ShowProgress(0, patchSize, patchName);
|
||||
|
||||
|
||||
patch = malloc(patchSize);
|
||||
if (!patch || fvx_read(&patchFile, patch, patchSize, NULL) != FR_OK) return displayError(IPS_MEMORY);
|
||||
|
||||
|
||||
// Check validity of patch
|
||||
if (patchSize < 8) return displayError(IPS_INVALID);
|
||||
if (read8() != 'P' ||
|
||||
@ -131,7 +132,7 @@ int ApplyIPSPatch(const char* patchName, const char* inName, const char* outName
|
||||
{
|
||||
return displayError(IPS_INVALID);
|
||||
}
|
||||
|
||||
|
||||
unsigned int offset = read24();
|
||||
unsigned int outlen = 0;
|
||||
unsigned int thisout = 0;
|
||||
@ -140,11 +141,11 @@ int ApplyIPSPatch(const char* patchName, const char* inName, const char* outName
|
||||
while (offset != 0x454F46) // 454F46=EOF
|
||||
{
|
||||
if (!ShowProgress(patchOffset, patchSize, patchName)) {
|
||||
if (ShowPrompt(true, "%s\nB button detected. Cancel?", patchName)) return displayError(IPS_CANCELED);
|
||||
if (ShowPrompt(true, "%s\n%s", patchName, STR_B_DETECTED_CANCEL)) return displayError(IPS_CANCELED);
|
||||
ShowProgress(0, patchSize, patchName);
|
||||
ShowProgress(patchOffset, patchSize, patchName);
|
||||
}
|
||||
|
||||
|
||||
unsigned int size = read16();
|
||||
if (size == 0)
|
||||
{
|
||||
@ -180,7 +181,7 @@ int ApplyIPSPatch(const char* patchName, const char* inName, const char* outName
|
||||
outlen_min = outlen;
|
||||
error = IPS_OK;
|
||||
if (w_scrambled) error = IPS_SCRAMBLED;
|
||||
|
||||
|
||||
// start applying patch
|
||||
bool inPlace = false;
|
||||
if (!CheckWritePermissions(outName)) return displayError(IPS_INVALID_FILE_PATH);
|
||||
@ -193,36 +194,36 @@ int ApplyIPSPatch(const char* patchName, const char* inName, const char* outName
|
||||
else if ((fvx_open(&inFile, inName, FA_READ) != FR_OK) ||
|
||||
(fvx_open(&outFile, outName, FA_CREATE_ALWAYS | FA_WRITE | FA_READ) != FR_OK))
|
||||
return displayError(IPS_INVALID_FILE_PATH);
|
||||
|
||||
|
||||
size_t inSize = fvx_size(&inFile);
|
||||
outlen = max(outlen_min, min(inSize, outlen_max));
|
||||
fvx_lseek(&outFile, max(outlen, outlen_min_mem));
|
||||
fvx_lseek(&outFile, 0);
|
||||
size_t outSize = outlen;
|
||||
ShowProgress(0, outSize, outName);
|
||||
|
||||
|
||||
fvx_lseek(&inFile, 0);
|
||||
if (!inPlace && !IPScopy(COPY_IN, min(inSize, outlen), 0)) return displayError(IPS_MEMORY);
|
||||
fvx_lseek(&outFile, inSize);
|
||||
if (outSize > inSize && !IPScopy(COPY_RLE, outSize - inSize, 0)) return displayError(IPS_MEMORY);
|
||||
|
||||
|
||||
fvx_lseek(&patchFile, 5);
|
||||
offset = read24();
|
||||
while (offset != 0x454F46)
|
||||
{
|
||||
if (!ShowProgress(offset, outSize, outName)) {
|
||||
if (ShowPrompt(true, "%s\nB button detected. Cancel?", outName)) return displayError(IPS_CANCELED);
|
||||
if (ShowPrompt(true, "%s\n%s", outName, STR_B_DETECTED_CANCEL)) return displayError(IPS_CANCELED);
|
||||
ShowProgress(0, outSize, outName);
|
||||
ShowProgress(offset, outSize, outName);
|
||||
}
|
||||
|
||||
|
||||
fvx_lseek(&outFile, offset);
|
||||
unsigned int size = read16();
|
||||
if (size == 0 && !IPScopy(COPY_RLE, read16(), read8())) return displayError(IPS_MEMORY);
|
||||
if (size == 0 && !IPScopy(COPY_RLE, read16(), read8())) return displayError(IPS_MEMORY);
|
||||
else if (size != 0 && !IPScopy(COPY_PATCH, size, 0)) return displayError(IPS_MEMORY);
|
||||
offset = read24();
|
||||
}
|
||||
|
||||
|
||||
fvx_lseek(&outFile, outSize);
|
||||
f_truncate(&outFile);
|
||||
return displayError(error);
|
||||
|
@ -1,17 +1,14 @@
|
||||
#include "ncch.h"
|
||||
#include "support.h"
|
||||
#include "disadiff.h"
|
||||
#include "keydb.h"
|
||||
#include "aes.h"
|
||||
#include "sha.h"
|
||||
#include "ff.h"
|
||||
|
||||
#define EXEFS_KEYID(name) (((strncmp(name, "banner", 8) == 0) || (strncmp(name, "icon", 8) == 0)) ? 0 : 1)
|
||||
|
||||
u32 ValidateNcchHeader(NcchHeader* header) {
|
||||
if (memcmp(header->magic, "NCCH", 4) != 0) // check magic number
|
||||
return 1;
|
||||
|
||||
|
||||
u32 ncch_units = (NCCH_EXTHDR_OFFSET + header->size_exthdr) / NCCH_MEDIA_UNIT; // exthdr
|
||||
if (header->size_plain) { // plain region
|
||||
if (header->offset_plain < ncch_units) return 1; // overlapping plain region
|
||||
@ -26,8 +23,8 @@ u32 ValidateNcchHeader(NcchHeader* header) {
|
||||
ncch_units = (header->offset_romfs + header->size_romfs);
|
||||
}
|
||||
// size check
|
||||
if (ncch_units > header->size) return 1;
|
||||
|
||||
if (ncch_units > header->size) return 1;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
@ -36,7 +33,7 @@ u32 GetNcchCtr(u8* ctr, NcchHeader* ncch, u8 section) {
|
||||
if (ncch->version == 1) {
|
||||
memcpy(ctr, &(ncch->partitionId), 8);
|
||||
if (section == 1) { // ExtHeader ctr
|
||||
add_ctr(ctr, NCCH_EXTHDR_OFFSET);
|
||||
add_ctr(ctr, NCCH_EXTHDR_OFFSET);
|
||||
} else if (section == 2) { // ExeFS ctr
|
||||
add_ctr(ctr, ncch->offset_exefs * NCCH_MEDIA_UNIT);
|
||||
} else if (section == 3) { // RomFS ctr
|
||||
@ -47,101 +44,7 @@ u32 GetNcchCtr(u8* ctr, NcchHeader* ncch, u8 section) {
|
||||
ctr[i] = ((u8*) &(ncch->partitionId))[7-i];
|
||||
ctr[8] = section;
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
u32 GetNcchSeed(u8* seed, NcchHeader* ncch) {
|
||||
static u8 lseed[16+8] __attribute__((aligned(4))) = { 0 }; // seed plus title ID for easy validation
|
||||
u64 titleId = ncch->programId;
|
||||
u32 hash_seed = ncch->hash_seed;
|
||||
u32 sha256sum[8];
|
||||
|
||||
memcpy(lseed+16, &(ncch->programId), 8);
|
||||
sha_quick(sha256sum, lseed, 16 + 8, SHA256_MODE);
|
||||
if (hash_seed == sha256sum[0]) {
|
||||
memcpy(seed, lseed, 16);
|
||||
return 0;
|
||||
}
|
||||
|
||||
// setup a large enough buffer
|
||||
u8* buffer = (u8*) malloc(max(STD_BUFFER_SIZE, SEEDSAVE_AREA_SIZE));
|
||||
if (!buffer) return 1;
|
||||
|
||||
// try to grab the seed from NAND database
|
||||
const char* nand_drv[] = {"1:", "4:"}; // SysNAND and EmuNAND
|
||||
for (u32 i = 0; i < countof(nand_drv); i++) {
|
||||
UINT btr = 0;
|
||||
FIL file;
|
||||
char path[128];
|
||||
|
||||
// grab the key Y from movable.sed
|
||||
u8 movable_keyy[16];
|
||||
snprintf(path, 128, "%s/private/movable.sed", nand_drv[i]);
|
||||
if (f_open(&file, path, FA_READ | FA_OPEN_EXISTING) != FR_OK)
|
||||
continue;
|
||||
f_lseek(&file, 0x110);
|
||||
f_read(&file, movable_keyy, 0x10, &btr);
|
||||
f_close(&file);
|
||||
|
||||
// build the seed save path
|
||||
sha_quick(sha256sum, movable_keyy, 0x10, SHA256_MODE);
|
||||
snprintf(path, 128, "%s/data/%08lX%08lX%08lX%08lX/sysdata/0001000F/00000000",
|
||||
nand_drv[i], sha256sum[0], sha256sum[1], sha256sum[2], sha256sum[3]);
|
||||
|
||||
// check seedsave for seed
|
||||
u8* seeddb = buffer;
|
||||
if (ReadDisaDiffIvfcLvl4(path, NULL, SEEDSAVE_AREA_OFFSET, SEEDSAVE_AREA_SIZE, seeddb) != SEEDSAVE_AREA_SIZE)
|
||||
continue;
|
||||
|
||||
// search for the seed
|
||||
for (u32 s = 0; s < SEEDSAVE_MAX_ENTRIES; s++) {
|
||||
if (titleId != getle64(seeddb + (s*8))) continue;
|
||||
memcpy(lseed, seeddb + (SEEDSAVE_MAX_ENTRIES*8) + (s*16), 16);
|
||||
sha_quick(sha256sum, lseed, 16 + 8, SHA256_MODE);
|
||||
if (hash_seed == sha256sum[0]) {
|
||||
memcpy(seed, lseed, 16);
|
||||
free(buffer);
|
||||
return 0; // found!
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// not found -> try seeddb.bin
|
||||
SeedInfo* seeddb = (SeedInfo*) (void*) buffer;
|
||||
size_t len = LoadSupportFile(SEEDDB_NAME, seeddb, STD_BUFFER_SIZE);
|
||||
if (len && (seeddb->n_entries <= (len - 16) / 32)) { // check filesize / seeddb size
|
||||
for (u32 s = 0; s < seeddb->n_entries; s++) {
|
||||
if (titleId != seeddb->entries[s].titleId)
|
||||
continue;
|
||||
memcpy(lseed, seeddb->entries[s].seed, 16);
|
||||
sha_quick(sha256sum, lseed, 16 + 8, SHA256_MODE);
|
||||
if (hash_seed == sha256sum[0]) {
|
||||
memcpy(seed, lseed, 16);
|
||||
free(buffer);
|
||||
return 0; // found!
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// out of options -> failed!
|
||||
free(buffer);
|
||||
return 1;
|
||||
}
|
||||
|
||||
u32 AddSeedToDb(SeedInfo* seed_info, SeedInfoEntry* seed_entry) {
|
||||
if (!seed_entry) { // no seed entry -> reset database
|
||||
memset(seed_info, 0, 16);
|
||||
return 0;
|
||||
}
|
||||
// check if entry already in DB
|
||||
u32 n_entries = seed_info->n_entries;
|
||||
SeedInfoEntry* seed = seed_info->entries;
|
||||
for (u32 i = 0; i < n_entries; i++, seed++)
|
||||
if (seed->titleId == seed_entry->titleId) return 0;
|
||||
// actually a new seed entry
|
||||
memcpy(seed, seed_entry, sizeof(SeedInfoEntry));
|
||||
seed_info->n_entries++;
|
||||
return 0;
|
||||
}
|
||||
|
||||
@ -150,10 +53,10 @@ u32 SetNcchKey(NcchHeader* ncch, u16 crypto, u32 keyid) {
|
||||
u8 flags7 = crypto & 0xFF;
|
||||
u32 keyslot = (!keyid || !flags3) ? 0x2C : // standard / secure3 / secure4 / 7.x crypto
|
||||
(flags3 == 0x0A) ? 0x18 : (flags3 == 0x0B) ? 0x1B : 0x25;
|
||||
|
||||
|
||||
if (flags7 & 0x04)
|
||||
return 1;
|
||||
|
||||
|
||||
if (flags7 & 0x01) { // fixed key crypto
|
||||
// from https://github.com/profi200/Project_CTR/blob/master/makerom/pki/dev.h
|
||||
u8 zeroKey[16] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||
@ -164,11 +67,11 @@ u32 SetNcchKey(NcchHeader* ncch, u16 crypto, u32 keyid) {
|
||||
use_aeskey(0x11);
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
||||
// load key X from file if required
|
||||
if ((keyslot != 0x2C) && (LoadKeyFromFile(NULL, keyslot, 'X', NULL) != 0))
|
||||
return 1;
|
||||
|
||||
|
||||
// key Y for seed and non seed
|
||||
if (keyid && (flags7 & 0x20)) { // seed crypto
|
||||
static u8 seedkeyY[16+16] __attribute__((aligned(32))) = { 0 };
|
||||
@ -177,7 +80,7 @@ u32 SetNcchKey(NcchHeader* ncch, u16 crypto, u32 keyid) {
|
||||
if ((memcmp(lsignature, ncch->signature, 16) != 0) || (ltitleId != ncch->programId)) {
|
||||
u8 keydata[16+16] __attribute__((aligned(4)));
|
||||
memcpy(keydata, ncch->signature, 16);
|
||||
if (GetNcchSeed(keydata + 16, ncch) != 0)
|
||||
if (FindSeed(keydata + 16, ncch->programId, ncch->hash_seed) != 0)
|
||||
return 1;
|
||||
sha_quick(seedkeyY, keydata, 32, SHA256_MODE);
|
||||
memcpy(lsignature, ncch->signature, 16);
|
||||
@ -188,12 +91,12 @@ u32 SetNcchKey(NcchHeader* ncch, u16 crypto, u32 keyid) {
|
||||
setup_aeskeyY(keyslot, ncch->signature);
|
||||
}
|
||||
use_aeskey(keyslot);
|
||||
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
// this is used to force and check crypto setup
|
||||
// (also prevents SHA register usage later on)
|
||||
// (also prevents SHA register usage later on)
|
||||
u32 SetupNcchCrypto(NcchHeader* ncch, u16 crypt_to) {
|
||||
u16 crypt_from = NCCH_GET_CRYPTO(ncch);
|
||||
u32 res_from = ((crypt_from & NCCH_NOCRYPTO) ||
|
||||
@ -207,14 +110,14 @@ u32 CryptNcchSection(void* data, u32 offset_data, u32 size_data, u32 offset_sect
|
||||
u32 offset_ctr, NcchHeader* ncch, u32 snum, u16 crypt_to, u32 keyid) {
|
||||
u16 crypt_from = NCCH_GET_CRYPTO(ncch);
|
||||
const u32 mode = AES_CNT_CTRNAND_MODE;
|
||||
|
||||
|
||||
// check if section in data
|
||||
if ((offset_section >= offset_data + size_data) ||
|
||||
(offset_data >= offset_section + size_section) ||
|
||||
!size_section) {
|
||||
return 0; // section not in data
|
||||
}
|
||||
|
||||
|
||||
// determine data / offset / size
|
||||
u8* data8 = (u8*)data;
|
||||
u8* data_i = data8;
|
||||
@ -226,7 +129,7 @@ u32 CryptNcchSection(void* data, u32 offset_data, u32 size_data, u32 offset_sect
|
||||
size_i = size_section - offset_i;
|
||||
if (size_i > size_data - (data_i - data8))
|
||||
size_i = size_data - (data_i - data8);
|
||||
|
||||
|
||||
// actual decryption stuff
|
||||
u8 ctr[16];
|
||||
GetNcchCtr(ctr, ncch, snum);
|
||||
@ -238,7 +141,7 @@ u32 CryptNcchSection(void* data, u32 offset_data, u32 size_data, u32 offset_sect
|
||||
if (SetNcchKey(ncch, crypt_to, keyid) != 0) return 1;
|
||||
ctr_decrypt_byte(data_i, data_i, size_i, offset_i + offset_ctr, mode, ctr);
|
||||
}
|
||||
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
@ -247,11 +150,11 @@ u32 CryptNcch(void* data, u32 offset, u32 size, NcchHeader* ncch, ExeFsHeader* e
|
||||
const u32 offset_flag3 = 0x188 + 3;
|
||||
const u32 offset_flag7 = 0x188 + 7;
|
||||
u16 crypt_from = NCCH_GET_CRYPTO(ncch);
|
||||
|
||||
|
||||
// check for encryption
|
||||
if ((crypt_to & crypt_from & NCCH_NOCRYPTO) || (crypt_to == crypt_from))
|
||||
return 0; // desired end result already met
|
||||
|
||||
|
||||
// ncch flags handling
|
||||
if ((offset <= offset_flag3) && (offset + size > offset_flag3))
|
||||
((u8*)data)[offset_flag3 - offset] = (crypt_to >> 8);
|
||||
@ -259,7 +162,7 @@ u32 CryptNcch(void* data, u32 offset, u32 size, NcchHeader* ncch, ExeFsHeader* e
|
||||
((u8*)data)[offset_flag7 - offset] &= ~(0x01|0x20|0x04);
|
||||
((u8*)data)[offset_flag7 - offset] |= (crypt_to & (0x01|0x20|0x04));
|
||||
}
|
||||
|
||||
|
||||
// exthdr handling
|
||||
if (ncch->size_exthdr) {
|
||||
if (CryptNcchSection(data, offset, size,
|
||||
@ -267,14 +170,14 @@ u32 CryptNcch(void* data, u32 offset, u32 size, NcchHeader* ncch, ExeFsHeader* e
|
||||
NCCH_EXTHDR_SIZE,
|
||||
0, ncch, 1, crypt_to, 0) != 0) return 1;
|
||||
}
|
||||
|
||||
|
||||
// exefs handling
|
||||
if (ncch->size_exefs) {
|
||||
// exefs header handling
|
||||
if (CryptNcchSection(data, offset, size,
|
||||
ncch->offset_exefs * NCCH_MEDIA_UNIT,
|
||||
0x200, 0, ncch, 2, crypt_to, 0) != 0) return 1;
|
||||
|
||||
|
||||
// exefs file handling
|
||||
if (exefs) for (u32 i = 0; i < 10; i++) {
|
||||
ExeFsFileHeader* file = exefs->files + i;
|
||||
@ -291,7 +194,7 @@ u32 CryptNcch(void* data, u32 offset, u32 size, NcchHeader* ncch, ExeFsHeader* e
|
||||
ncch, 2, crypt_to, 0) != 0) return 1;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
// romfs handling
|
||||
if (ncch->size_romfs) {
|
||||
if (CryptNcchSection(data, offset, size,
|
||||
@ -299,7 +202,7 @@ u32 CryptNcch(void* data, u32 offset, u32 size, NcchHeader* ncch, ExeFsHeader* e
|
||||
ncch->size_romfs * NCCH_MEDIA_UNIT,
|
||||
0, ncch, 3, crypt_to, 1) != 0) return 1;
|
||||
}
|
||||
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
@ -311,31 +214,31 @@ u32 CryptNcchSequential(void* data, u32 offset, u32 size, u16 crypt_to) {
|
||||
static ExeFsHeader exefs = { 0 };
|
||||
static NcchHeader* ncchptr = NULL;
|
||||
static ExeFsHeader* exefsptr = NULL;
|
||||
|
||||
|
||||
// fetch ncch header from data
|
||||
if ((offset == 0) && (size >= sizeof(NcchHeader))) {
|
||||
memcpy(&ncch, data, sizeof(NcchHeader));
|
||||
ncchptr = (ValidateNcchHeader(&ncch) == 0) ? &ncch : NULL;
|
||||
exefsptr = NULL;
|
||||
}
|
||||
|
||||
|
||||
// safety check, ncch pointer
|
||||
if (!ncchptr) return 1;
|
||||
|
||||
|
||||
// fetch exefs header from data
|
||||
if (ncchptr->offset_exefs && !exefsptr) {
|
||||
u32 offset_exefs = ncchptr->offset_exefs * NCCH_MEDIA_UNIT;
|
||||
if ((offset <= offset_exefs) &&
|
||||
((offset + size) >= offset_exefs + sizeof(ExeFsHeader))) {
|
||||
memcpy(&exefs, (u8*)data + offset_exefs - offset, sizeof(ExeFsHeader));
|
||||
if ((NCCH_ENCRYPTED(ncchptr)) &&
|
||||
if ((NCCH_ENCRYPTED(ncchptr)) &&
|
||||
(DecryptNcch((u8*) &exefs, offset_exefs, sizeof(ExeFsHeader), ncchptr, NULL) != 0))
|
||||
return 1;
|
||||
if (ValidateExeFsHeader(&exefs, 0) != 0) return 1;
|
||||
exefsptr = &exefs;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
return CryptNcch(data, offset, size, ncchptr, exefsptr, crypt_to);
|
||||
}
|
||||
|
||||
@ -343,17 +246,26 @@ u32 SetNcchSdFlag(void* data) { // data must be at least 0x600 byte and start wi
|
||||
NcchHeader* ncch = (NcchHeader*) data;
|
||||
NcchExtHeader* exthdr = (NcchExtHeader*) (void*) ((u8*)data + NCCH_EXTHDR_OFFSET);
|
||||
NcchExtHeader exthdr_dec;
|
||||
|
||||
|
||||
if ((ValidateNcchHeader(ncch) != 0) || (!ncch->size_exthdr))
|
||||
return 0; // no extheader
|
||||
memcpy(&exthdr_dec, exthdr, sizeof(NcchExtHeader));
|
||||
if (DecryptNcch((u8*) &exthdr_dec, NCCH_EXTHDR_OFFSET, sizeof(NcchExtHeader), ncch, NULL) != 0)
|
||||
return 1;
|
||||
if (exthdr_dec.flag & (1<<1)) return 0; // flag already set
|
||||
|
||||
|
||||
exthdr_dec.flag |= (1<<1);
|
||||
exthdr->flag ^= (1<<1);
|
||||
sha_quick(ncch->hash_exthdr, &exthdr_dec, 0x400, SHA256_MODE);
|
||||
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
u32 SetupSystemForNcch(NcchHeader* ncch, bool to_emunand) {
|
||||
u16 crypto = NCCH_GET_CRYPTO(ncch);
|
||||
if ((crypto & 0x20) && // seed crypto
|
||||
(SetupSeedSystemCrypto(ncch->programId, ncch->hash_seed, to_emunand) != 0) &&
|
||||
(SetupSeedPrePurchase(ncch->programId, to_emunand) != 0))
|
||||
return 1;
|
||||
return 0;
|
||||
}
|
||||
|
@ -2,6 +2,7 @@
|
||||
|
||||
#include "common.h"
|
||||
#include "exefs.h"
|
||||
#include "seedsave.h"
|
||||
|
||||
#define NCCH_MEDIA_UNIT 0x200
|
||||
|
||||
@ -17,13 +18,6 @@
|
||||
#define NCCH_STDCRYPTO 0x0000
|
||||
#define NCCH_GET_CRYPTO(ncch) (!NCCH_ENCRYPTED(ncch) ? NCCH_NOCRYPTO : (((ncch)->flags[3] << 8) | ((ncch)->flags[7]&(0x01|0x20))))
|
||||
|
||||
#define SEEDDB_NAME "seeddb.bin"
|
||||
#define SEEDDB_SIZE(sdb) (16 + ((sdb)->n_entries * sizeof(SeedInfoEntry)))
|
||||
|
||||
#define SEEDSAVE_MAX_ENTRIES 2000
|
||||
#define SEEDSAVE_AREA_OFFSET 0x4000
|
||||
#define SEEDSAVE_AREA_SIZE (SEEDSAVE_MAX_ENTRIES * (8+16))
|
||||
|
||||
// wrapper defines
|
||||
#define DecryptNcch(data, offset, size, ncch, exefs) CryptNcch(data, offset, size, ncch, exefs, NCCH_NOCRYPTO)
|
||||
#define EncryptNcch(data, offset, size, ncch, exefs, crypto) CryptNcch(data, offset, size, ncch, exefs, crypto)
|
||||
@ -89,23 +83,10 @@ typedef struct {
|
||||
u8 hash_romfs[0x20];
|
||||
} __attribute__((packed, aligned(16))) NcchHeader;
|
||||
|
||||
typedef struct {
|
||||
u64 titleId;
|
||||
u8 seed[16];
|
||||
u8 reserved[8];
|
||||
} PACKED_STRUCT SeedInfoEntry;
|
||||
|
||||
typedef struct {
|
||||
u32 n_entries;
|
||||
u8 padding[12];
|
||||
SeedInfoEntry entries[256]; // this number is only a placeholder
|
||||
} PACKED_STRUCT SeedInfo;
|
||||
|
||||
u32 ValidateNcchHeader(NcchHeader* header);
|
||||
u32 SetNcchKey(NcchHeader* ncch, u16 crypto, u32 keyid);
|
||||
u32 SetupNcchCrypto(NcchHeader* ncch, u16 crypt_to);
|
||||
u32 CryptNcch(void* data, u32 offset, u32 size, NcchHeader* ncch, ExeFsHeader* exefs, u16 crypto);
|
||||
u32 CryptNcchSequential(void* data, u32 offset, u32 size, u16 crypto);
|
||||
u32 SetNcchSdFlag(void* data);
|
||||
|
||||
u32 AddSeedToDb(SeedInfo* seed_info, SeedInfoEntry* seed_entry);
|
||||
u32 SetupSystemForNcch(NcchHeader* ncch, bool to_emunand);
|
||||
|
@ -18,25 +18,25 @@ u32 FixNcchInfoEntry(NcchInfoEntry* entry, u32 version) {
|
||||
} else if (version != 4) { // !ncchinfo v4.0/v4.1/v4.2
|
||||
return 1;
|
||||
}
|
||||
|
||||
|
||||
// poor man's UTF-16 -> UTF-8
|
||||
if (entry->filename[1] == 0x00) {
|
||||
for (u32 i = 1; i < (sizeof(entry->filename) / 2); i++)
|
||||
entry->filename[i] = entry->filename[i*2];
|
||||
}
|
||||
|
||||
|
||||
// fix sdmc: prefix
|
||||
if (memcmp(entry->filename, "sdmc:", 5) == 0)
|
||||
memmove(entry->filename, entry->filename + 5, 112 - 5);
|
||||
|
||||
|
||||
// workaround (1) for older (v4.0) ncchinfo.bin
|
||||
// this combination means seed crypto rather than FixedKey
|
||||
if ((entry->ncchFlag7 == 0x01) && entry->ncchFlag3)
|
||||
entry->ncchFlag7 = 0x20;
|
||||
|
||||
|
||||
// workaround (2) for older (v4.1) ncchinfo.bin
|
||||
if (!entry->size_b) entry->size_b = entry->size_mb * 1024 * 1024;
|
||||
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
@ -50,10 +50,10 @@ u32 BuildNcchInfoXorpad(void* buffer, NcchInfoEntry* entry, u32 size, u32 offset
|
||||
ncch.programId = ncch.partitionId = entry->titleId;
|
||||
if (SetNcchKey(&ncch, NCCH_GET_CRYPTO(&ncch), 1) != 0)
|
||||
return 1;
|
||||
|
||||
|
||||
// write xorpad
|
||||
memset(buffer, 0, size);
|
||||
ctr_decrypt_byte(buffer, buffer, size, offset, AES_CNT_CTRNAND_MODE, entry->ctr);
|
||||
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
@ -6,7 +6,7 @@ u32 ValidateNcsdHeader(NcsdHeader* header) {
|
||||
if ((memcmp(header->magic, "NCSD", 4) != 0) || // check magic number
|
||||
(memcmp(header->partitions_fs_type, zeroes, 8) != 0) || !header->mediaId) // prevent detection of NAND images
|
||||
return 1;
|
||||
|
||||
|
||||
u32 data_units = 0;
|
||||
for (u32 i = 0; i < 8; i++) {
|
||||
NcchPartition* partition = header->partitions + i;
|
||||
@ -18,7 +18,7 @@ u32 ValidateNcsdHeader(NcsdHeader* header) {
|
||||
}
|
||||
if (data_units > header->size)
|
||||
return 1;
|
||||
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
@ -30,7 +30,7 @@ u64 GetNcsdTrimmedSize(NcsdHeader* header) {
|
||||
if (!partition->size) continue;
|
||||
data_units = (partition_end > data_units) ? partition_end : data_units;
|
||||
}
|
||||
|
||||
|
||||
return data_units * NCSD_MEDIA_UNIT;
|
||||
}
|
||||
|
||||
@ -38,11 +38,11 @@ u64 GetNcsdTrimmedSize(NcsdHeader* header) {
|
||||
u32 CryptNcsdSequential(void* data, u32 offset_data, u32 size_data, u16 crypto) {
|
||||
// warning: this will only work for sequential processing
|
||||
static NcsdHeader ncsd;
|
||||
|
||||
|
||||
// fetch ncsd header from data
|
||||
if ((offset_data == 0) && (size_data >= sizeof(NcsdHeader)))
|
||||
memcpy(&ncsd, data, sizeof(NcsdHeader));
|
||||
|
||||
|
||||
for (u32 i = 0; i < 8; i++) {
|
||||
NcchPartition* partition = ncsd.partitions + i;
|
||||
u32 offset_p = partition->offset * NCSD_MEDIA_UNIT;
|
||||
@ -68,7 +68,7 @@ u32 CryptNcsdSequential(void* data, u32 offset_data, u32 size_data, u16 crypto)
|
||||
if (CryptNcchSequential(data_i, offset_i, size_i, crypto) != 0)
|
||||
return 1;
|
||||
}
|
||||
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
@ -27,32 +27,53 @@ u32 ValidateTwlHeader(TwlHeader* twl) {
|
||||
return (crc16_quick(twl->logo, sizeof(twl->logo)) == NDS_LOGO_CRC16) ? 0 : 1;
|
||||
}
|
||||
|
||||
u32 VerifyTwlIconData(TwlIconData* icon, u32 version) {
|
||||
u32 tsize = TWLICON_SIZE_DATA(version);
|
||||
u32 isize = TWLICON_SIZE_DATA(icon->version);
|
||||
u8* icn = (u8*) icon;
|
||||
|
||||
if (!isize) return 1;
|
||||
if (version && (!tsize || tsize > isize)) return 1;
|
||||
|
||||
u32 size = version ? tsize : isize;
|
||||
if ((size >= 0x0840) && (crc16_quick(icn + 0x0020, 0x0840 - 0x0020) != icon->crc_0x0020_0x0840)) return 1;
|
||||
if ((size >= 0x0940) && (crc16_quick(icn + 0x0020, 0x0940 - 0x0020) != icon->crc_0x0020_0x0940)) return 1;
|
||||
if ((size >= 0x1240) && (crc16_quick(icn + 0x0020, 0x0A40 - 0x0020) != icon->crc_0x0020_0x0A40)) return 1;
|
||||
if ((size >= 0x23C0) && (crc16_quick(icn + 0x1240, 0x23C0 - 0x1240) != icon->crc_0x1240_0x23C0)) return 1;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
u32 BuildTwlSaveHeader(void* sav, u32 size) {
|
||||
const u16 sct_size = 0x200;
|
||||
if (size / (u32) sct_size > 0xFFFF)
|
||||
return 1;
|
||||
|
||||
// fit max number of sectors into size
|
||||
// fit max number of sectors into size
|
||||
// that's how Nintendo does it ¯\_(ツ)_/¯
|
||||
const u16 n_sct_max = size / sct_size;
|
||||
u16 n_sct = 1;
|
||||
u16 sct_track = 1;
|
||||
u16 sct_heads = 1;
|
||||
while (true) {
|
||||
if (sct_heads < sct_track) {
|
||||
u16 n_sct_next = sct_track * (sct_heads+1) * (sct_heads+1);
|
||||
if (n_sct_next < n_sct_max) {
|
||||
sct_heads++;
|
||||
u16 n_sct_next = 0;
|
||||
while (n_sct_next <= n_sct_max) {
|
||||
n_sct_next = sct_track * (sct_heads + 1) * (sct_heads + 1);
|
||||
if (n_sct_next <= n_sct_max) {
|
||||
sct_heads++;
|
||||
n_sct = n_sct_next;
|
||||
|
||||
sct_track++;
|
||||
n_sct_next = sct_track * sct_heads * sct_heads;
|
||||
if (n_sct_next <= n_sct_max) {
|
||||
n_sct = n_sct_next;
|
||||
} else break;
|
||||
} else {
|
||||
u16 n_sct_next = (sct_track+1) * sct_heads * sct_heads;
|
||||
if (n_sct_next < n_sct_max) {
|
||||
sct_track++;
|
||||
n_sct = n_sct_next;
|
||||
} else break;
|
||||
}
|
||||
}
|
||||
}
|
||||
n_sct_next = (sct_track + 1) * sct_heads * sct_heads;
|
||||
if (n_sct_next <= n_sct_max) {
|
||||
sct_track++;
|
||||
n_sct = n_sct_next;
|
||||
}
|
||||
|
||||
// sectors per cluster (should be identical to Nintendo)
|
||||
u8 clr_size = (n_sct > 8 * 1024) ? 8 : (n_sct > 1024) ? 4 : 1;
|
||||
@ -126,11 +147,19 @@ u32 GetTwlIcon(u16* icon, const TwlIconData* twl_icon) {
|
||||
u32 ix = x + (i & 0x7);
|
||||
u32 iy = y + (i >> 3);
|
||||
|
||||
pix555 = palette[((i%2) ? (*pix4 >> 4) : *pix4) & 0xF];
|
||||
r = pix555 & 0x1F;
|
||||
g = ((pix555 >> 5) & 0x1F) << 1;
|
||||
g |= (g >> 1) & 1;
|
||||
b = (pix555 >> 10) & 0x1F;
|
||||
int palette_index = ((i%2) ? (*pix4 >> 4) : *pix4) & 0xF;
|
||||
if (palette_index) {
|
||||
pix555 = palette[palette_index];
|
||||
r = pix555 & 0x1F;
|
||||
g = ((pix555 >> 5) & 0x1F) << 1;
|
||||
g |= (g >> 1) & 1;
|
||||
b = (pix555 >> 10) & 0x1F;
|
||||
} else {
|
||||
// Set transparent pixels to white
|
||||
r = 31;
|
||||
g = 63;
|
||||
b = 31;
|
||||
}
|
||||
icon[(iy * w) + ix] = (r << 11) | (g << 5) | b;
|
||||
if (i % 2) pix4++;
|
||||
}
|
||||
@ -143,15 +172,15 @@ u32 FindNitroRomDir(u32 dirid, u32* fileid, u8** fnt_entry, TwlHeader* hdr, u8*
|
||||
NitroFntBaseEntry* fnt_base = (NitroFntBaseEntry*) fnt;
|
||||
NitroFntBaseEntry* fnt_dir = &((NitroFntBaseEntry*) fnt)[dirid];
|
||||
NitroFatEntry* fat_lut = (NitroFatEntry*) fat;
|
||||
|
||||
|
||||
// base sanity checks
|
||||
if (fnt_base->parent_id*sizeof(NitroFntBaseEntry) > fnt_base->subtable_offset) return 1; // invalid FNT
|
||||
if (dirid >= fnt_base->parent_id) return 1; // dir ID out of bounds
|
||||
|
||||
|
||||
// set first FNT entry / fileid
|
||||
*fnt_entry = fnt + fnt_dir->subtable_offset;
|
||||
*fileid = fnt_dir->file0_id;
|
||||
|
||||
|
||||
// check subtable / directory validity
|
||||
u32 fid = *fileid;
|
||||
for (u8* entry = *fnt_entry;; entry = FNT_ENTRY_NEXT(entry)) {
|
||||
@ -161,29 +190,29 @@ u32 FindNitroRomDir(u32 dirid, u32* fileid, u8** fnt_entry, TwlHeader* hdr, u8*
|
||||
if (!FNT_ENTRY_ISDIR(entry)) fid++;
|
||||
}
|
||||
if (fid*sizeof(NitroFatEntry) > hdr->fat_size) return 1; // corrupt fnt / fat
|
||||
|
||||
|
||||
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
u32 NextNitroRomEntry(u32* fileid, u8** fnt_entry) {
|
||||
// check for end of subtable
|
||||
if (!*fnt_entry || !**fnt_entry) return 1;
|
||||
|
||||
|
||||
// advance to next entry
|
||||
if (!FNT_ENTRY_ISDIR(*fnt_entry)) (*fileid)++;
|
||||
*fnt_entry += FNT_ENTRY_LEN(*fnt_entry);
|
||||
|
||||
|
||||
// check for end of subtable
|
||||
if (!**fnt_entry) return 1;
|
||||
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
u32 ReadNitroRomEntry(u64* offset, u64* size, bool* is_dir, u32 fileid, u8* fnt_entry, u8* fat) {
|
||||
// check for end of subtable
|
||||
if (!fnt_entry || !*fnt_entry) return 1;
|
||||
|
||||
|
||||
// decipher FNT entry
|
||||
*is_dir = FNT_ENTRY_ISDIR(fnt_entry);
|
||||
if (!(*is_dir)) { // for files
|
||||
@ -195,6 +224,6 @@ u32 ReadNitroRomEntry(u64* offset, u64* size, bool* is_dir, u32 fileid, u8* fnt_
|
||||
*offset = (u64) (fnt_entry[1+fnlen]|(fnt_entry[1+fnlen+1]<<8)) & 0xFFF; // dir ID goes in offset
|
||||
*size = 0;
|
||||
}
|
||||
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
@ -7,7 +7,7 @@
|
||||
// see: http://problemkaputt.de/gbatek.htm#dscartridgeicontitle
|
||||
// v0x0001 -> 0x0840 byte (contains JPN, USA, FRE, GER, ITA, ESP titles)
|
||||
// v0x0002 -> 0x0940 byte (adds CHN title)
|
||||
// v0x0003 -> 0x0A40 byte (adds KOR title)
|
||||
// v0x0003 -> 0x0A40 byte (adds KOR title)
|
||||
// v0x0103 -> 0x23C0 byte (adds TWL animated icon data)
|
||||
#define TWLICON_SIZE_DATA(v) ((v == 0x0001) ? 0x0840 : (v == 0x0002) ? 0x0940 : \
|
||||
(v == 0x0003) ? 0x1240 : (v == 0x0103) ? 0x23C0 : 0x0000)
|
||||
@ -127,6 +127,7 @@ typedef struct {
|
||||
} PACKED_STRUCT TwlHeader;
|
||||
|
||||
u32 ValidateTwlHeader(TwlHeader* twl);
|
||||
u32 VerifyTwlIconData(TwlIconData* icon, u32 size);
|
||||
u32 BuildTwlSaveHeader(void* sav, u32 size);
|
||||
u32 LoadTwlMetaData(const char* path, TwlHeader* hdr, TwlIconData* icon);
|
||||
u32 GetTwlTitle(char* desc, const TwlIconData* twl_icon);
|
||||
|
@ -1,4 +1,5 @@
|
||||
#include "common.h"
|
||||
#include "language.h"
|
||||
#include "region.h"
|
||||
|
||||
// Names of system regions, short form.
|
||||
@ -12,13 +13,16 @@ const char* const g_regionNamesShort[SMDH_NUM_REGIONS] = {
|
||||
"TWN",
|
||||
};
|
||||
|
||||
// Names of system regions, long form.
|
||||
const char* const g_regionNamesLong[SMDH_NUM_REGIONS] = {
|
||||
"Japan",
|
||||
"Americas",
|
||||
"Europe",
|
||||
"Australia",
|
||||
"China",
|
||||
"Korea",
|
||||
"Taiwan",
|
||||
// Names of system regions, long form and translatable.
|
||||
const char* regionNameLong(int region) {
|
||||
switch(region) {
|
||||
case REGION_JPN: return STR_REGION_JAPAN;
|
||||
case REGION_USA: return STR_REGION_AMERICAS;
|
||||
case REGION_EUR: return STR_REGION_EUROPE;
|
||||
case REGION_AUS: return STR_REGION_AUSTRALIA;
|
||||
case REGION_CHN: return STR_REGION_CHINA;
|
||||
case REGION_KOR: return STR_REGION_KOREA;
|
||||
case REGION_TWN: return STR_REGION_TAIWAN;
|
||||
default: return STR_REGION_UNKNOWN;
|
||||
}
|
||||
};
|
||||
|
@ -27,5 +27,5 @@
|
||||
|
||||
// Names of system regions, short form.
|
||||
extern const char* const g_regionNamesShort[SMDH_NUM_REGIONS];
|
||||
// Names of system regions, long form.
|
||||
extern const char* const g_regionNamesLong[SMDH_NUM_REGIONS];
|
||||
// Names of system regions, long form and translatable.
|
||||
const char* regionNameLong(int region);
|
||||
|
@ -58,12 +58,12 @@ u32 BuildLv3Index(RomFsLv3Index* index, u8* lv3) {
|
||||
index->filehash = (u32*) (void*) (lv3 + hdr->offset_filehash);
|
||||
index->filemeta = lv3 + hdr->offset_filemeta;
|
||||
index->filedata = NULL;
|
||||
|
||||
|
||||
index->mod_dir = (hdr->size_dirhash / sizeof(u32));
|
||||
index->mod_file = (hdr->size_filehash / sizeof(u32));
|
||||
index->size_dirmeta = hdr->size_dirmeta;
|
||||
index->size_filemeta = hdr->size_filemeta;
|
||||
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
@ -77,13 +77,13 @@ u32 HashLv3Path(u16* wname, u32 name_len, u32 offset_parent) {
|
||||
|
||||
RomFsLv3DirMeta* GetLv3DirMeta(const char* name, u32 offset_parent, RomFsLv3Index* index) {
|
||||
RomFsLv3DirMeta* meta;
|
||||
|
||||
|
||||
// wide (UTF-16) name
|
||||
u16 wname[256];
|
||||
int name_len = utf8_to_utf16(wname, (u8*) name, 255, 255);
|
||||
if (name_len <= 0) return NULL;
|
||||
wname[name_len] = 0;
|
||||
|
||||
|
||||
// hashing, first offset
|
||||
u32 hash = HashLv3Path(wname, name_len, offset_parent);
|
||||
u32 offset = index->dirhash[hash % index->mod_dir];
|
||||
@ -96,19 +96,19 @@ RomFsLv3DirMeta* GetLv3DirMeta(const char* name, u32 offset_parent, RomFsLv3Inde
|
||||
(memcmp(wname, meta->wname, name_len * 2) == 0))
|
||||
break;
|
||||
}
|
||||
|
||||
return (offset >= index->size_dirmeta) ? NULL : meta;
|
||||
|
||||
return (offset >= index->size_dirmeta) ? NULL : meta;
|
||||
}
|
||||
|
||||
RomFsLv3FileMeta* GetLv3FileMeta(const char* name, u32 offset_parent, RomFsLv3Index* index) {
|
||||
RomFsLv3FileMeta* meta;
|
||||
|
||||
|
||||
// wide (UTF-16) name
|
||||
u16 wname[256];
|
||||
int name_len = utf8_to_utf16(wname, (u8*) name, 255, 255);
|
||||
if (name_len <= 0) return NULL;
|
||||
wname[name_len] = 0;
|
||||
|
||||
|
||||
// hashing, first offset
|
||||
u32 hash = HashLv3Path(wname, name_len, offset_parent);
|
||||
u32 offset = index->filehash[hash % index->mod_file];
|
||||
@ -121,6 +121,6 @@ RomFsLv3FileMeta* GetLv3FileMeta(const char* name, u32 offset_parent, RomFsLv3In
|
||||
(memcmp(wname, meta->wname, name_len * 2) == 0))
|
||||
break;
|
||||
}
|
||||
|
||||
return (offset >= index->size_filemeta) ? NULL : meta;
|
||||
|
||||
return (offset >= index->size_filemeta) ? NULL : meta;
|
||||
}
|
||||
|
240
arm9/source/game/seedsave.c
Normal file
240
arm9/source/game/seedsave.c
Normal file
@ -0,0 +1,240 @@
|
||||
#include "seedsave.h"
|
||||
#include "support.h"
|
||||
#include "nandcmac.h"
|
||||
#include "sha.h"
|
||||
#include "ff.h"
|
||||
|
||||
#define TITLETAG_MAX_ENTRIES 2000 // same as SEEDSAVE_MAX_ENTRIES
|
||||
#define TITLETAG_AREA_OFFSET 0x10000 // thanks @luigoalma
|
||||
|
||||
// this structure is 0x80 bytes, thanks @luigoalma
|
||||
typedef struct {
|
||||
char magic[4]; // "PREP" for prepurchase install. NIM excepts "PREP" to do seed downloads on the background.
|
||||
// playable date parameters
|
||||
// 2000-01-01 is a safe bet for a stub entry
|
||||
s32 year;
|
||||
u8 month;
|
||||
u8 day;
|
||||
u16 country_code; // enum list of values, this will affect seed downloading, just requires at least one valid enum value. 1 == Japan, it's enough.
|
||||
// everything after this point can be 0 padded
|
||||
u32 seed_status; // 0 == not tried, 1 == last attempt failed, 2 == seed downloaded successfully
|
||||
s32 seed_result; // result related to last download attempt
|
||||
s32 seed_support_error_code; // support code derived from the result code
|
||||
// after this point, all is unused or padding. NIM wont use or access this at all.
|
||||
// It's memset to 0 by NIM
|
||||
u8 unknown[0x68];
|
||||
} PACKED_STRUCT TitleTagEntry;
|
||||
|
||||
typedef struct {
|
||||
u32 unknown0;
|
||||
u32 n_entries;
|
||||
u8 unknown1[0x1000 - 0x8];
|
||||
u64 titleId[TITLETAG_MAX_ENTRIES];
|
||||
TitleTagEntry tag[TITLETAG_MAX_ENTRIES];
|
||||
} PACKED_STRUCT TitleTag;
|
||||
|
||||
u32 GetSeedPath(char* path, const char* drv) {
|
||||
u8 movable_keyy[16] = { 0 };
|
||||
u32 sha256sum[8];
|
||||
UINT btr = 0;
|
||||
FIL file;
|
||||
|
||||
// grab the key Y from movable.sed
|
||||
// wrong result if movable.sed does not have it
|
||||
snprintf(path, 128, "%2.2s/private/movable.sed", drv);
|
||||
if (f_open(&file, path, FA_READ | FA_OPEN_EXISTING) != FR_OK)
|
||||
return 1;
|
||||
f_lseek(&file, 0x110);
|
||||
f_read(&file, movable_keyy, 0x10, &btr);
|
||||
f_close(&file);
|
||||
if (btr != 0x10)
|
||||
return 1;
|
||||
|
||||
// build the seed save path
|
||||
sha_quick(sha256sum, movable_keyy, 0x10, SHA256_MODE);
|
||||
snprintf(path, 128, "%2.2s/data/%08lX%08lX%08lX%08lX/sysdata/0001000F/00000000",
|
||||
drv, sha256sum[0], sha256sum[1], sha256sum[2], sha256sum[3]);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
u32 FindSeed(u8* seed, u64 titleId, u32 hash_seed) {
|
||||
static u8 lseed[16+8] __attribute__((aligned(4))) = { 0 }; // seed plus title ID for easy validation
|
||||
u32 sha256sum[8];
|
||||
|
||||
memcpy(lseed+16, &titleId, 8);
|
||||
sha_quick(sha256sum, lseed, 16 + 8, SHA256_MODE);
|
||||
if (hash_seed == sha256sum[0]) {
|
||||
memcpy(seed, lseed, 16);
|
||||
return 0;
|
||||
}
|
||||
|
||||
// setup a large enough buffer
|
||||
u8* buffer = (u8*) malloc(max(STD_BUFFER_SIZE, sizeof(SeedDb)));
|
||||
if (!buffer) return 1;
|
||||
|
||||
// try to grab the seed from NAND database
|
||||
const char* nand_drv[] = {"1:", "4:"}; // SysNAND and EmuNAND
|
||||
for (u32 i = 0; i < countof(nand_drv); i++) {
|
||||
char path[128];
|
||||
SeedDb* seeddb = (SeedDb*) (void*) buffer;
|
||||
|
||||
// read SEEDDB from file
|
||||
if (GetSeedPath(path, nand_drv[i]) != 0) continue;
|
||||
if ((ReadDisaDiffIvfcLvl4(path, NULL, SEEDSAVE_AREA_OFFSET, sizeof(SeedDb), seeddb) != sizeof(SeedDb)) ||
|
||||
(seeddb->n_entries > SEEDSAVE_MAX_ENTRIES))
|
||||
continue;
|
||||
|
||||
// search for the seed
|
||||
for (u32 s = 0; s < seeddb->n_entries; s++) {
|
||||
if (titleId != seeddb->titleId[s]) continue;
|
||||
memcpy(lseed, &(seeddb->seed[s]), sizeof(Seed));
|
||||
sha_quick(sha256sum, lseed, 16 + 8, SHA256_MODE);
|
||||
if (hash_seed == sha256sum[0]) {
|
||||
memcpy(seed, lseed, 16);
|
||||
free(buffer);
|
||||
return 0; // found!
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// not found -> try seeddb.bin
|
||||
SeedInfo* seeddb = (SeedInfo*) (void*) buffer;
|
||||
size_t len = LoadSupportFile(SEEDINFO_NAME, seeddb, STD_BUFFER_SIZE);
|
||||
if (len && (seeddb->n_entries <= (len - 16) / 32)) { // check filesize / seeddb size
|
||||
for (u32 s = 0; s < seeddb->n_entries; s++) {
|
||||
if (titleId != seeddb->entries[s].titleId)
|
||||
continue;
|
||||
memcpy(lseed, &(seeddb->entries[s].seed), sizeof(Seed));
|
||||
sha_quick(sha256sum, lseed, 16 + 8, SHA256_MODE);
|
||||
if (hash_seed == sha256sum[0]) {
|
||||
memcpy(seed, lseed, 16);
|
||||
free(buffer);
|
||||
return 0; // found!
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// out of options -> failed!
|
||||
free(buffer);
|
||||
return 1;
|
||||
}
|
||||
|
||||
u32 AddSeedToDb(SeedInfo* seed_info, SeedInfoEntry* seed_entry) {
|
||||
if (!seed_entry) { // no seed entry -> reset database
|
||||
memset(seed_info, 0, 16);
|
||||
return 0;
|
||||
}
|
||||
// check if entry already in DB
|
||||
u32 n_entries = seed_info->n_entries;
|
||||
SeedInfoEntry* seed = seed_info->entries;
|
||||
for (u32 i = 0; i < n_entries; i++, seed++)
|
||||
if (seed->titleId == seed_entry->titleId) return 0;
|
||||
// actually a new seed entry
|
||||
memcpy(seed, seed_entry, sizeof(SeedInfoEntry));
|
||||
seed_info->n_entries++;
|
||||
return 0;
|
||||
}
|
||||
|
||||
u32 InstallSeedDbToSystem(SeedInfo* seed_info, bool to_emunand) {
|
||||
char path[128];
|
||||
SeedDb* seeddb = (SeedDb*) malloc(sizeof(SeedDb));
|
||||
if (!seeddb) return 1;
|
||||
|
||||
// read the current SEEDDB database
|
||||
if ((GetSeedPath(path, to_emunand ? "4:" : "1:") != 0) ||
|
||||
(ReadDisaDiffIvfcLvl4(path, NULL, SEEDSAVE_AREA_OFFSET, sizeof(SeedDb), seeddb) != sizeof(SeedDb)) ||
|
||||
(seeddb->n_entries >= SEEDSAVE_MAX_ENTRIES)) {
|
||||
free (seeddb);
|
||||
return 1;
|
||||
}
|
||||
|
||||
// find free slots, insert seeds from SeedInfo
|
||||
for (u32 slot = 0, s = 0; s < seed_info->n_entries; s++) {
|
||||
SeedInfoEntry* entry = &(seed_info->entries[s]);
|
||||
for (slot = 0; slot < seeddb->n_entries; slot++)
|
||||
if (seeddb->titleId[slot] == entry->titleId) break;
|
||||
if (slot >= SEEDSAVE_MAX_ENTRIES) break;
|
||||
if (slot >= seeddb->n_entries) seeddb->n_entries = slot + 1;
|
||||
seeddb->titleId[slot] = entry->titleId;
|
||||
memcpy(&(seeddb->seed[slot]), &(entry->seed), sizeof(Seed));
|
||||
}
|
||||
|
||||
// write back to system (warning: no write protection checks here)
|
||||
u32 size = WriteDisaDiffIvfcLvl4(path, NULL, SEEDSAVE_AREA_OFFSET, sizeof(SeedDb), seeddb);
|
||||
FixFileCmac(path, false);
|
||||
|
||||
free (seeddb);
|
||||
return (size == sizeof(SeedDb)) ? 0 : 1;
|
||||
}
|
||||
|
||||
u32 SetupSeedPrePurchase(u64 titleId, bool to_emunand) {
|
||||
// here, we ask the system to install the seed for us
|
||||
TitleTag* titletag = (TitleTag*) malloc(sizeof(TitleTag));
|
||||
if (!titletag) return 1;
|
||||
|
||||
char path[128];
|
||||
if ((GetSeedPath(path, to_emunand ? "4:" : "1:") != 0) ||
|
||||
(ReadDisaDiffIvfcLvl4(path, NULL, TITLETAG_AREA_OFFSET, sizeof(TitleTag), titletag) != sizeof(TitleTag)) ||
|
||||
(titletag->n_entries >= TITLETAG_MAX_ENTRIES)) {
|
||||
free (titletag);
|
||||
return 1;
|
||||
}
|
||||
|
||||
// pointers for TITLETAG title IDs and seeds
|
||||
// find a free slot, insert titletag
|
||||
u32 slot = 0;
|
||||
for (; slot < titletag->n_entries; slot++)
|
||||
if (titletag->titleId[slot] == titleId) break;
|
||||
if (slot >= titletag->n_entries)
|
||||
titletag->n_entries = slot + 1;
|
||||
|
||||
TitleTagEntry* ttag = &(titletag->tag[slot]);
|
||||
titletag->titleId[slot] = titleId;
|
||||
memset(ttag, 0, sizeof(TitleTagEntry));
|
||||
memcpy(ttag->magic, "PREP", 4);
|
||||
ttag->year = 2000;
|
||||
ttag->month = 1;
|
||||
ttag->day = 1;
|
||||
ttag->country_code = 1;
|
||||
|
||||
// write back to system (warning: no write protection checks here)
|
||||
u32 size = WriteDisaDiffIvfcLvl4(path, NULL, TITLETAG_AREA_OFFSET, sizeof(TitleTag), titletag);
|
||||
FixFileCmac(path, false);
|
||||
|
||||
free(titletag);
|
||||
return (size == sizeof(TitleTag)) ? 0 : 1;
|
||||
}
|
||||
|
||||
u32 SetupSeedSystemCrypto(u64 titleId, u32 hash_seed, bool to_emunand) {
|
||||
// attempt to find the seed inside the seeddb.bin support file
|
||||
SeedInfo* seeddb = (SeedInfo*) malloc(STD_BUFFER_SIZE);
|
||||
if (!seeddb) return 1;
|
||||
|
||||
size_t len = LoadSupportFile(SEEDINFO_NAME, seeddb, STD_BUFFER_SIZE);
|
||||
if (len && (seeddb->n_entries <= (len - 16) / 32)) { // check filesize / seeddb size
|
||||
for (u32 s = 0; s < seeddb->n_entries; s++) {
|
||||
if (titleId != seeddb->entries[s].titleId)
|
||||
continue;
|
||||
// found a candidate, hash and verify it
|
||||
u8 lseed[16+8] __attribute__((aligned(4))) = { 0 }; // seed plus title ID for easy validation
|
||||
u32 sha256sum[8];
|
||||
memcpy(lseed+16, &titleId, 8);
|
||||
memcpy(lseed, &(seeddb->entries[s].seed), sizeof(Seed));
|
||||
sha_quick(sha256sum, lseed, 16 + 8, SHA256_MODE);
|
||||
u32 res = 0; // assuming the installed seed to be correct
|
||||
if (hash_seed == sha256sum[0]) {
|
||||
// found, install it
|
||||
seeddb->n_entries = 1;
|
||||
seeddb->entries[0].titleId = titleId;
|
||||
memcpy(&(seeddb->entries[0].seed), lseed, sizeof(Seed));
|
||||
res = InstallSeedDbToSystem(seeddb, to_emunand);
|
||||
}
|
||||
free(seeddb);
|
||||
return res;
|
||||
}
|
||||
}
|
||||
|
||||
free(seeddb);
|
||||
return 1;
|
||||
}
|
41
arm9/source/game/seedsave.h
Normal file
41
arm9/source/game/seedsave.h
Normal file
@ -0,0 +1,41 @@
|
||||
#pragma once
|
||||
|
||||
#include "common.h"
|
||||
#include "disadiff.h"
|
||||
|
||||
#define SEEDINFO_NAME "seeddb.bin"
|
||||
#define SEEDINFO_SIZE(sdb) (16 + ((sdb)->n_entries * sizeof(SeedInfoEntry)))
|
||||
|
||||
#define SEEDSAVE_MAX_ENTRIES 2000
|
||||
#define SEEDSAVE_AREA_OFFSET 0x3000
|
||||
|
||||
typedef struct {
|
||||
u8 byte[16];
|
||||
} PACKED_STRUCT Seed;
|
||||
|
||||
typedef struct {
|
||||
u64 titleId;
|
||||
Seed seed;
|
||||
u8 reserved[8];
|
||||
} PACKED_STRUCT SeedInfoEntry;
|
||||
|
||||
typedef struct {
|
||||
u32 n_entries;
|
||||
u8 padding[12];
|
||||
SeedInfoEntry entries[SEEDSAVE_MAX_ENTRIES]; // this number is only a placeholder
|
||||
} PACKED_STRUCT SeedInfo;
|
||||
|
||||
typedef struct {
|
||||
u32 unknown0;
|
||||
u32 n_entries;
|
||||
u8 unknown1[0x1000 - 0x8];
|
||||
u64 titleId[SEEDSAVE_MAX_ENTRIES];
|
||||
Seed seed[SEEDSAVE_MAX_ENTRIES];
|
||||
} PACKED_STRUCT SeedDb;
|
||||
|
||||
u32 GetSeedPath(char* path, const char* drv);
|
||||
u32 FindSeed(u8* seed, u64 titleId, u32 hash_seed);
|
||||
u32 AddSeedToDb(SeedInfo* seed_info, SeedInfoEntry* seed_entry);
|
||||
u32 InstallSeedDbToSystem(SeedInfo* seed_info, bool to_emunand);
|
||||
u32 SetupSeedPrePurchase(u64 titleId, bool to_emunand);
|
||||
u32 SetupSeedSystemCrypto(u64 titleId, u32 hash_seed, bool to_emunand);
|
@ -1,17 +1,31 @@
|
||||
#include "tad.h"
|
||||
#include "sha.h"
|
||||
|
||||
|
||||
u32 VerifyTadStub(TadStub* tad) {
|
||||
TadFooter* ftr = &(tad->footer);
|
||||
TadHeader* hdr = &(tad->header);
|
||||
TadBanner* bnr = &(tad->banner);
|
||||
|
||||
if ((strncmp(hdr->magic, TAD_HEADER_MAGIC, strlen(TAD_HEADER_MAGIC)) != 0) ||
|
||||
(sha_cmp(ftr->banner_sha256, bnr, sizeof(TadBanner), SHA256_MODE) != 0) ||
|
||||
(sha_cmp(ftr->header_sha256, hdr, sizeof(TadHeader), SHA256_MODE) != 0))
|
||||
return 1;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
u32 BuildTadContentTable(void* table, void* header) {
|
||||
TadHeader* hdr = (TadHeader*) header;
|
||||
TadContentTable* tbl = (TadContentTable*) table;
|
||||
|
||||
|
||||
if (strncmp(hdr->magic, TAD_HEADER_MAGIC, strlen(TAD_HEADER_MAGIC)) != 0)
|
||||
return 1;
|
||||
|
||||
|
||||
tbl->banner_end = 0 + sizeof(TadBanner) + sizeof(TadBlockMetaData);
|
||||
tbl->header_end = tbl->banner_end + sizeof(TadHeader) + sizeof(TadBlockMetaData);
|
||||
tbl->footer_end = tbl->header_end + sizeof(TadFooter) + sizeof(TadBlockMetaData);
|
||||
|
||||
|
||||
u32 content_end_last = tbl->footer_end;
|
||||
for (u32 i = 0; i < TAD_NUM_CONTENT; i++) {
|
||||
tbl->content_end[i] = content_end_last;
|
||||
@ -19,6 +33,6 @@ u32 BuildTadContentTable(void* table, void* header) {
|
||||
tbl->content_end[i] += align(hdr->content_size[i], 0x10) + sizeof(TadBlockMetaData);
|
||||
content_end_last = tbl->content_end[i];
|
||||
}
|
||||
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
@ -56,4 +56,14 @@ typedef struct {
|
||||
u8 padding[0x4];
|
||||
} PACKED_STRUCT TadFooter;
|
||||
|
||||
typedef struct {
|
||||
TadBanner banner;
|
||||
TadBlockMetaData banner_bmd;
|
||||
TadHeader header;
|
||||
TadBlockMetaData header_bmd;
|
||||
TadFooter footer;
|
||||
TadBlockMetaData footer_bmd;
|
||||
} PACKED_STRUCT TadStub;
|
||||
|
||||
u32 VerifyTadStub(TadStub* tad);
|
||||
u32 BuildTadContentTable(void* table, void* header);
|
||||
|
@ -19,47 +19,113 @@ u32 ValidateTicket(Ticket* ticket) {
|
||||
return 0;
|
||||
}
|
||||
|
||||
u32 ValidateTicketSignature(Ticket* ticket) {
|
||||
static bool got_modexp = false;
|
||||
static u32 mod[0x100 / 0x4] = { 0 };
|
||||
static u32 exp = 0;
|
||||
|
||||
if (!got_modexp) {
|
||||
// grab mod/exp from cert from cert.db
|
||||
if (LoadCertFromCertDb(0x3F10, NULL, mod, &exp) == 0)
|
||||
got_modexp = true;
|
||||
else return 1;
|
||||
}
|
||||
|
||||
if (!RSA_setKey2048(3, mod, exp) ||
|
||||
!RSA_verify2048((void*) &(ticket->signature), (void*) &(ticket->issuer), GetTicketSize(ticket) - 0x140))
|
||||
u32 ValidateTwlTicket(Ticket* ticket) {
|
||||
static const u8 magic[] = { TICKET_SIG_TYPE_TWL };
|
||||
if ((memcmp(ticket->sig_type, magic, sizeof(magic)) != 0) ||
|
||||
(strncmp((char*) ticket->issuer, TICKET_ISSUER_TWL, 0x40) != 0))
|
||||
return 1;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
u32 BuildFakeTicket(Ticket* ticket, u8* title_id) {
|
||||
u32 ValidateTicketSignature(Ticket* ticket) {
|
||||
Certificate cert;
|
||||
|
||||
// grab cert from certs.db
|
||||
if (LoadCertFromCertDb(&cert, (char*)(ticket->issuer)) != 0)
|
||||
return 1;
|
||||
|
||||
int ret = Certificate_VerifySignatureBlock(&cert, &(ticket->signature), 0x100, (void*)&(ticket->issuer), GetTicketSize(ticket) - 0x140, true);
|
||||
|
||||
Certificate_Cleanup(&cert);
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
u32 BuildVariableFakeTicket(Ticket** ticket, u32* ticket_size, const u8* title_id, u32 index_max) {
|
||||
if (!ticket || !ticket_size)
|
||||
return 1;
|
||||
|
||||
static const u8 sig_type[4] = { TICKET_SIG_TYPE }; // RSA_2048 SHA256
|
||||
static const u8 ticket_cnt_index[] = { // whatever this is
|
||||
0x00, 0x01, 0x00, 0x14, 0x00, 0x00, 0x00, 0xAC, 0x00, 0x00, 0x00, 0x14, 0x00, 0x01, 0x00, 0x14,
|
||||
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x28, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x84,
|
||||
0x00, 0x00, 0x00, 0x84, 0x00, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
|
||||
};
|
||||
|
||||
// calculate sizes and determine pointers to use
|
||||
u32 rights_field_count = (min(index_max, 0x10000) + 1023) >> 10; // round up to 1024 and cap at 65536, and div by 1024
|
||||
u32 content_index_size = sizeof(TicketContentIndexMainHeader) + sizeof(TicketContentIndexDataHeader) + sizeof(TicketRightsField) * rights_field_count;
|
||||
u32 _ticket_size = sizeof(Ticket) + content_index_size;
|
||||
Ticket *_ticket;
|
||||
|
||||
if (*ticket) { // if a pointer was pregiven
|
||||
if (*ticket_size < _ticket_size) { // then check given boundary size
|
||||
*ticket_size = _ticket_size; // if not enough, inform the actual needed size
|
||||
return 2; // indicate a size error
|
||||
}
|
||||
_ticket = *ticket; // get the pointer if we good to go
|
||||
} else // if not pregiven, allocate one
|
||||
_ticket = (Ticket*)malloc(_ticket_size);
|
||||
|
||||
if (!_ticket)
|
||||
return 1;
|
||||
|
||||
// set ticket all zero for a clean start
|
||||
memset(ticket, 0x00, TICKET_COMMON_SIZE); // 0xAC being size of this fake ticket's content index
|
||||
memset(_ticket, 0x00, _ticket_size);
|
||||
// fill ticket values
|
||||
memcpy(ticket->sig_type, sig_type, 4);
|
||||
memset(ticket->signature, 0xFF, 0x100);
|
||||
snprintf((char*) ticket->issuer, 0x40, IS_DEVKIT ? TICKET_ISSUER_DEV : TICKET_ISSUER);
|
||||
memset(ticket->ecdsa, 0xFF, 0x3C);
|
||||
ticket->version = 0x01;
|
||||
memset(ticket->titlekey, 0xFF, 16);
|
||||
memcpy(ticket->title_id, title_id, 8);
|
||||
ticket->commonkey_idx = 0x00; // eshop
|
||||
ticket->audit = 0x01; // whatever
|
||||
memcpy(ticket->content_index, ticket_cnt_index, sizeof(ticket_cnt_index));
|
||||
memset(&ticket->content_index[sizeof(ticket_cnt_index)], 0xFF, 0x80); // 1024 content indexes
|
||||
|
||||
memcpy(_ticket->sig_type, sig_type, 4);
|
||||
memset(_ticket->signature, 0xFF, 0x100);
|
||||
snprintf((char*) _ticket->issuer, 0x40, IS_DEVKIT ? TICKET_ISSUER_DEV : TICKET_ISSUER);
|
||||
memset(_ticket->ecdsa, 0xFF, 0x3C);
|
||||
_ticket->version = 0x01;
|
||||
memset(_ticket->titlekey, 0xFF, 16);
|
||||
if (title_id) memcpy(_ticket->title_id, title_id, 8);
|
||||
_ticket->commonkey_idx = 0x00; // eshop
|
||||
_ticket->audit = 0x01; // whatever
|
||||
|
||||
// fill in rights
|
||||
TicketContentIndexMainHeader* mheader = (TicketContentIndexMainHeader*)&_ticket->content_index[0];
|
||||
TicketContentIndexDataHeader* dheader = (TicketContentIndexDataHeader*)&_ticket->content_index[0x14];
|
||||
TicketRightsField* rights = (TicketRightsField*)&_ticket->content_index[0x28];
|
||||
|
||||
// first main data header
|
||||
mheader->unk1[1] = 0x1; mheader->unk2[1] = 0x14;
|
||||
mheader->content_index_size[3] = (u8)(content_index_size >> 0);
|
||||
mheader->content_index_size[2] = (u8)(content_index_size >> 8);
|
||||
mheader->content_index_size[1] = (u8)(content_index_size >> 16);
|
||||
mheader->content_index_size[0] = (u8)(content_index_size >> 24);
|
||||
mheader->data_header_relative_offset[3] = 0x14; // relative offset for TicketContentIndexDataHeader
|
||||
mheader->unk3[1] = 0x1; mheader->unk4[1] = 0x14;
|
||||
|
||||
// then the data header
|
||||
dheader->data_relative_offset[3] = 0x28; // relative offset for TicketRightsField
|
||||
dheader->max_entry_count[3] = (u8)(rights_field_count >> 0);
|
||||
dheader->max_entry_count[2] = (u8)(rights_field_count >> 8);
|
||||
dheader->max_entry_count[1] = (u8)(rights_field_count >> 16);
|
||||
dheader->max_entry_count[0] = (u8)(rights_field_count >> 24);
|
||||
dheader->size_per_entry[3] = (u8)sizeof(TicketRightsField); // sizeof should be 0x84
|
||||
dheader->total_size_used[3] = (u8)((sizeof(TicketRightsField) * rights_field_count) >> 0);
|
||||
dheader->total_size_used[2] = (u8)((sizeof(TicketRightsField) * rights_field_count) >> 8);
|
||||
dheader->total_size_used[1] = (u8)((sizeof(TicketRightsField) * rights_field_count) >> 16);
|
||||
dheader->total_size_used[0] = (u8)((sizeof(TicketRightsField) * rights_field_count) >> 24);
|
||||
dheader->data_type[1] = 3; // right fields
|
||||
|
||||
// now the right fields
|
||||
// indexoffets must be in accending order to have the desired effect
|
||||
for (u32 i = 0; i < rights_field_count; ++i) {
|
||||
rights[i].indexoffset[1] = (u8)((1024 * i) >> 0);
|
||||
rights[i].indexoffset[0] = (u8)((1024 * i) >> 8);
|
||||
memset(&rights[i].rightsbitfield[0], 0xFF, sizeof(rights[0].rightsbitfield));
|
||||
}
|
||||
|
||||
*ticket = _ticket;
|
||||
*ticket_size = _ticket_size;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
u32 BuildFakeTicket(Ticket* ticket, const u8* title_id) {
|
||||
Ticket* tik = NULL;
|
||||
u32 ticket_size = sizeof(TicketCommon);
|
||||
u32 res = BuildVariableFakeTicket(&tik, &ticket_size, title_id, TICKET_MAX_CONTENTS);
|
||||
if (res != 0) return res;
|
||||
memcpy(ticket, tik, ticket_size);
|
||||
free(tik);
|
||||
return 0;
|
||||
}
|
||||
|
||||
@ -73,34 +139,29 @@ u32 GetTicketSize(const Ticket* ticket) {
|
||||
|
||||
u32 BuildTicketCert(u8* tickcert) {
|
||||
static const u8 cert_hash_expected[0x20] = {
|
||||
0xDC, 0x15, 0x3C, 0x2B, 0x8A, 0x0A, 0xC8, 0x74, 0xA9, 0xDC, 0x78, 0x61, 0x0E, 0x6A, 0x8F, 0xE3,
|
||||
0xDC, 0x15, 0x3C, 0x2B, 0x8A, 0x0A, 0xC8, 0x74, 0xA9, 0xDC, 0x78, 0x61, 0x0E, 0x6A, 0x8F, 0xE3,
|
||||
0xE6, 0xB1, 0x34, 0xD5, 0x52, 0x88, 0x73, 0xC9, 0x61, 0xFB, 0xC7, 0x95, 0xCB, 0x47, 0xE6, 0x97
|
||||
};
|
||||
static const u8 cert_hash_expected_dev[0x20] = {
|
||||
0x97, 0x2A, 0x32, 0xFF, 0x9D, 0x4B, 0xAA, 0x2F, 0x1A, 0x24, 0xCF, 0x21, 0x13, 0x87, 0xF5, 0x38,
|
||||
0xC6, 0x4B, 0xD4, 0x8F, 0xDF, 0x13, 0x21, 0x3D, 0xFC, 0x72, 0xFC, 0x8D, 0x9F, 0xDD, 0x01, 0x0E
|
||||
};
|
||||
|
||||
// open certs.db file on SysNAND
|
||||
FIL db;
|
||||
UINT bytes_read;
|
||||
if (f_open(&db, "1:/dbs/certs.db", FA_READ | FA_OPEN_EXISTING) != FR_OK)
|
||||
|
||||
static const char* const retail_issuers[] = {"Root-CA00000003-XS0000000c", "Root-CA00000003"};
|
||||
static const char* const dev_issuers[] = {"Root-CA00000004-XS00000009", "Root-CA00000004"};
|
||||
|
||||
size_t size = TICKET_CDNCERT_SIZE;
|
||||
if (BuildRawCertBundleFromCertDb(tickcert, &size, !IS_DEVKIT ? retail_issuers : dev_issuers, 2) ||
|
||||
size != TICKET_CDNCERT_SIZE) {
|
||||
return 1;
|
||||
// grab ticket cert from 3 offsets
|
||||
f_lseek(&db, 0x3F10);
|
||||
f_read(&db, tickcert + 0x000, 0x300, &bytes_read);
|
||||
f_lseek(&db, 0x0C10);
|
||||
f_read(&db, tickcert + 0x300, 0x1F0, &bytes_read);
|
||||
f_lseek(&db, 0x3A00);
|
||||
f_read(&db, tickcert + 0x4F0, 0x210, &bytes_read);
|
||||
f_close(&db);
|
||||
|
||||
}
|
||||
|
||||
// check the certificate hash
|
||||
u8 cert_hash[0x20];
|
||||
sha_quick(cert_hash, tickcert, TICKET_CDNCERT_SIZE, SHA256_MODE);
|
||||
if (memcmp(cert_hash, IS_DEVKIT ? cert_hash_expected_dev : cert_hash_expected, 0x20) != 0)
|
||||
return 1;
|
||||
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
@ -1,15 +1,22 @@
|
||||
#pragma once
|
||||
|
||||
#include "common.h"
|
||||
#include "tmd.h"
|
||||
|
||||
#define TICKET_COMMON_SIZE sizeof(TicketCommon)
|
||||
#define TICKET_MINIMUM_SIZE sizeof(TicketMinimum)
|
||||
#define TICKET_TWL_SIZE sizeof(Ticket)
|
||||
#define TICKET_CDNCERT_SIZE 0x700
|
||||
#define TICKET_MAX_CONTENTS TITLE_MAX_CONTENTS // should be TMD_MAX_CONTENTS
|
||||
#define TICKET_COMMON_CNT_INDEX_SIZE (0x28 + (((TICKET_MAX_CONTENTS + 1023) >> 10) * 0x84))
|
||||
|
||||
#define TICKET_ISSUER "Root-CA00000003-XS0000000c"
|
||||
#define TICKET_ISSUER_DEV "Root-CA00000004-XS00000009"
|
||||
#define TICKET_SIG_TYPE 0x00, 0x01, 0x00, 0x04 // RSA_2048 SHA256
|
||||
|
||||
#define TICKET_ISSUER_TWL "Root-CA00000001-XS00000006"
|
||||
#define TICKET_SIG_TYPE_TWL 0x00, 0x01, 0x00, 0x01 // RSA_2048 SHA1
|
||||
|
||||
#define TICKET_DEVKIT(tick) (strncmp((char*)tick->issuer, TICKET_ISSUER_DEV, 0x40) == 0)
|
||||
|
||||
// from: https://github.com/profi200/Project_CTR/blob/02159e17ee225de3f7c46ca195ff0f9ba3b3d3e4/ctrtool/tik.h#L15-L39
|
||||
@ -46,18 +53,18 @@
|
||||
typedef struct {
|
||||
TICKETBASE;
|
||||
u8 content_index[];
|
||||
} __attribute__((packed, aligned(4))) Ticket;
|
||||
} PACKED_STRUCT Ticket;
|
||||
|
||||
typedef struct {
|
||||
TICKETBASE;
|
||||
u8 content_index[0xAC];
|
||||
} __attribute__((packed, aligned(4))) TicketCommon;
|
||||
u8 content_index[TICKET_COMMON_CNT_INDEX_SIZE];
|
||||
} PACKED_STRUCT TicketCommon;
|
||||
|
||||
// minimum allowed content_index is 0x14
|
||||
typedef struct {
|
||||
TICKETBASE;
|
||||
u8 content_index[0x14];
|
||||
} __attribute__((packed, aligned(4))) TicketMinimum;
|
||||
} PACKED_STRUCT TicketMinimum;
|
||||
|
||||
typedef struct {
|
||||
u8 unk1[2];
|
||||
@ -67,7 +74,7 @@ typedef struct {
|
||||
u8 unk3[2];
|
||||
u8 unk4[2];
|
||||
u8 unk5[4];
|
||||
} __attribute__((packed)) TicketContentIndexMainHeader;
|
||||
} PACKED_ALIGN(1) TicketContentIndexMainHeader;
|
||||
|
||||
typedef struct {
|
||||
u8 data_relative_offset[4]; // relative to content index start
|
||||
@ -76,14 +83,14 @@ typedef struct {
|
||||
u8 total_size_used[4]; // also no effect
|
||||
u8 data_type[2]; // perhaps, does have effect and change with different data like on 0004000D tickets
|
||||
u8 unknown[2]; // or padding
|
||||
} __attribute__((packed)) TicketContentIndexDataHeader;
|
||||
} PACKED_ALIGN(1) TicketContentIndexDataHeader;
|
||||
|
||||
// data type == 3
|
||||
typedef struct {
|
||||
u8 unk[2]; // seemly has no meaning
|
||||
u8 indexoffset[2];
|
||||
u8 rightsbitfield[0x80];
|
||||
} __attribute__((packed)) TicketRightsField;
|
||||
} PACKED_ALIGN(1) TicketRightsField;
|
||||
|
||||
typedef struct {
|
||||
size_t count;
|
||||
@ -91,8 +98,9 @@ typedef struct {
|
||||
} TicketRightsCheck;
|
||||
|
||||
u32 ValidateTicket(Ticket* ticket);
|
||||
u32 ValidateTwlTicket(Ticket* ticket);
|
||||
u32 ValidateTicketSignature(Ticket* ticket);
|
||||
u32 BuildFakeTicket(Ticket* ticket, u8* title_id);
|
||||
u32 BuildFakeTicket(Ticket* ticket, const u8* title_id);
|
||||
u32 GetTicketContentIndexSize(const Ticket* ticket);
|
||||
u32 GetTicketSize(const Ticket* ticket);
|
||||
u32 BuildTicketCert(u8* tickcert);
|
||||
|
@ -1,17 +1,11 @@
|
||||
#include "ticketdb.h"
|
||||
#include "vbdri.h"
|
||||
#include "bdri.h"
|
||||
#include "support.h"
|
||||
#include "aes.h"
|
||||
#include "vff.h"
|
||||
#include "fsinit.h"
|
||||
#include "image.h"
|
||||
|
||||
const char* virtual_tickdb_dirs[] = {
|
||||
"homebrew",
|
||||
"eshop",
|
||||
"system",
|
||||
"unknown",
|
||||
};
|
||||
#define PART_PATH "D:/partitionA.bin"
|
||||
|
||||
u32 CryptTitleKey(TitleKeyEntry* tik, bool encrypt, bool devkit) {
|
||||
// From https://github.com/profi200/Project_CTR/blob/master/makerom/pki/prod.h#L19
|
||||
@ -32,18 +26,24 @@ u32 CryptTitleKey(TitleKeyEntry* tik, bool encrypt, bool devkit) {
|
||||
{0x75, 0x05, 0x52, 0xBF, 0xAA, 0x1C, 0x04, 0x07, 0x55, 0xC8, 0xD5, 0x9A, 0x55, 0xF9, 0xAD, 0x1F} , // 4
|
||||
{0xAA, 0xDA, 0x4C, 0xA8, 0xF6, 0xE5, 0xA9, 0x77, 0xE0, 0xA0, 0xF9, 0xE4, 0x76, 0xCF, 0x0D, 0x63} , // 5
|
||||
};
|
||||
|
||||
// From unknown source
|
||||
static const u8 common_key_twl[16] __attribute__((aligned(16))) =
|
||||
{0xAF, 0x1B, 0xF5, 0x16, 0xA8, 0x07, 0xD2, 0x1A, 0xEA, 0x45, 0x98, 0x4F, 0x04, 0x74, 0x28, 0x61}; // TWL
|
||||
|
||||
u32 mode = (encrypt) ? AES_CNT_TITLEKEY_ENCRYPT_MODE : AES_CNT_TITLEKEY_DECRYPT_MODE;
|
||||
u8 ctr[16] = { 0 };
|
||||
|
||||
// setup key 0x3D // ctr
|
||||
if (tik->commonkey_idx >= 6) return 1;
|
||||
if (!devkit) setup_aeskeyY(0x3D, (void*) common_keyy[tik->commonkey_idx]);
|
||||
else setup_aeskey(0x3D, (void*) common_key_dev[tik->commonkey_idx]);
|
||||
use_aeskey(0x3D);
|
||||
|
||||
if (getbe16(tik->title_id) == 0x3) { // setup TWL key
|
||||
setup_aeskey(0x11, (void*) common_key_twl);
|
||||
use_aeskey(0x11);
|
||||
} else { // setup key 0x3D // ctr
|
||||
if (!devkit) setup_aeskeyY(0x3D, (void*) common_keyy[tik->commonkey_idx]);
|
||||
else setup_aeskey(0x3D, (void*) common_key_dev[tik->commonkey_idx]);
|
||||
use_aeskey(0x3D);
|
||||
}
|
||||
memcpy(ctr, tik->title_id, 8);
|
||||
set_ctr(ctr);
|
||||
|
||||
|
||||
// decrypt / encrypt the titlekey
|
||||
aes_decrypt(tik->titlekey, tik->titlekey, 1, mode);
|
||||
return 0;
|
||||
@ -54,78 +54,65 @@ u32 GetTitleKey(u8* titlekey, Ticket* ticket) {
|
||||
memcpy(tik.title_id, ticket->title_id, 8);
|
||||
memcpy(tik.titlekey, ticket->titlekey, 16);
|
||||
tik.commonkey_idx = ticket->commonkey_idx;
|
||||
|
||||
|
||||
if (CryptTitleKey(&tik, false, TICKET_DEVKIT(ticket)) != 0) return 1;
|
||||
memcpy(titlekey, tik.titlekey, 16);
|
||||
return 0;
|
||||
}
|
||||
|
||||
u32 SetTitleKey(const u8* titlekey, Ticket* ticket) {
|
||||
TitleKeyEntry tik = { 0 };
|
||||
memcpy(tik.title_id, ticket->title_id, 8);
|
||||
memcpy(tik.titlekey, titlekey, 16);
|
||||
tik.commonkey_idx = ticket->commonkey_idx;
|
||||
|
||||
if (CryptTitleKey(&tik, true, TICKET_DEVKIT(ticket)) != 0) return 1;
|
||||
memcpy(ticket->titlekey, tik.titlekey, 16);
|
||||
return 0;
|
||||
}
|
||||
|
||||
u32 FindTicket(Ticket** ticket, u8* title_id, bool force_legit, bool emunand) {
|
||||
const char* path_db = TICKDB_PATH(emunand); // EmuNAND / SysNAND
|
||||
char path_store[256] = { 0 };
|
||||
char* path_bak = NULL;
|
||||
|
||||
|
||||
// just to be safe
|
||||
*ticket = NULL;
|
||||
|
||||
// store previous mount path
|
||||
strncpy(path_store, GetMountPath(), 256);
|
||||
if (*path_store) path_bak = path_store;
|
||||
if (!InitImgFS(path_db))
|
||||
return 1;
|
||||
|
||||
char tid_string[17];
|
||||
u64 tid = getbe64(title_id);
|
||||
snprintf(tid_string, 17, "%016llX", tid);
|
||||
|
||||
DIR dir;
|
||||
FILINFO fno;
|
||||
char dir_path[12];
|
||||
char tik_path[64];
|
||||
|
||||
for (u32 i = force_legit ? 1 : 0; i < 4; i++) {
|
||||
snprintf(dir_path, 12, "T:/%s", virtual_tickdb_dirs[i]);
|
||||
|
||||
if (fvx_opendir(&dir, dir_path) != FR_OK) {
|
||||
InitImgFS(path_bak);
|
||||
return 1;
|
||||
}
|
||||
|
||||
while ((fvx_readdir(&dir, &fno) == FR_OK) && *(fno.fname)) {
|
||||
if (strncmp(tid_string, fno.fname, 16) == 0) {
|
||||
snprintf(tik_path, 64, "%s/%s", dir_path, fno.fname);
|
||||
|
||||
u32 size = fvx_qsize(tik_path);
|
||||
if (!(*ticket = malloc(size))) {
|
||||
InitImgFS(path_bak);
|
||||
return 1;
|
||||
}
|
||||
|
||||
if ((fvx_qread(tik_path, *ticket, 0, size, NULL) != FR_OK) ||
|
||||
(force_legit && (ValidateTicketSignature(*ticket) != 0))) {
|
||||
free(*ticket);
|
||||
InitImgFS(path_bak);
|
||||
return 1;
|
||||
}
|
||||
|
||||
InitImgFS(path_bak);
|
||||
return 0;
|
||||
}
|
||||
}
|
||||
|
||||
fvx_closedir(&dir);
|
||||
// search ticket in database
|
||||
if (ReadTicketFromDB(PART_PATH, title_id, ticket) != 0) {
|
||||
InitImgFS(path_bak);
|
||||
return 1;
|
||||
}
|
||||
|
||||
|
||||
// (optional) validate ticket signature
|
||||
if (force_legit && (ValidateTicketSignature(*ticket) != 0)) {
|
||||
free(*ticket);
|
||||
*ticket = NULL;
|
||||
InitImgFS(path_bak);
|
||||
return 1;
|
||||
}
|
||||
|
||||
InitImgFS(path_bak);
|
||||
return 1;
|
||||
return 0;
|
||||
}
|
||||
|
||||
u32 FindTitleKey(Ticket* ticket, u8* title_id) {
|
||||
bool found = false;
|
||||
TitleKeysInfo* tikdb = (TitleKeysInfo*) malloc(STD_BUFFER_SIZE); // more than enough
|
||||
if (!tikdb) return 1;
|
||||
|
||||
|
||||
// search for a titlekey inside encTitleKeys.bin / decTitleKeys.bin
|
||||
// when found, add it to the ticket
|
||||
TitleKeysInfo* tikdb = (TitleKeysInfo*) malloc(STD_BUFFER_SIZE); // more than enough
|
||||
if (!tikdb) return 1;
|
||||
for (u32 enc = 0; (enc <= 1) && !found; enc++) {
|
||||
u32 len = LoadSupportFile((enc) ? TIKDB_NAME_ENC : TIKDB_NAME_DEC, tikdb, STD_BUFFER_SIZE);
|
||||
|
||||
|
||||
if (len == 0) continue; // file not found
|
||||
if (tikdb->n_entries > (len - 16) / 32)
|
||||
continue; // filesize / titlekey db size mismatch
|
||||
@ -141,11 +128,31 @@ u32 FindTitleKey(Ticket* ticket, u8* title_id) {
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
free(tikdb);
|
||||
|
||||
// desperate measures - search in the internal ticket database
|
||||
Ticket* ticket_tmp = NULL;
|
||||
if (FindTicket(&ticket_tmp, title_id, false, false) == 0) {
|
||||
memcpy(ticket->titlekey, ticket_tmp->titlekey, 16);
|
||||
ticket->commonkey_idx = ticket_tmp->commonkey_idx;
|
||||
free(ticket_tmp);
|
||||
found = true;
|
||||
}
|
||||
|
||||
return (found) ? 0 : 1;
|
||||
}
|
||||
|
||||
u32 FindTitleKeyForId(u8* titlekey, u8* title_id) {
|
||||
TicketCommon tik;
|
||||
|
||||
if ((BuildFakeTicket((Ticket*) &tik, title_id) != 0) ||
|
||||
(FindTitleKey((Ticket*) &tik, title_id) != 0) ||
|
||||
(GetTitleKey(titlekey, (Ticket*) &tik) != 0))
|
||||
return 1;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
u32 AddTitleKeyToInfo(TitleKeysInfo* tik_info, TitleKeyEntry* tik_entry, bool decrypted_in, bool decrypted_out, bool devkit) {
|
||||
if (!tik_entry) { // no titlekey entry -> reset database
|
||||
memset(tik_info, 0, 16);
|
||||
@ -171,3 +178,9 @@ u32 AddTicketToInfo(TitleKeysInfo* tik_info, Ticket* ticket, bool decrypt) { //
|
||||
tik.commonkey_idx = ticket->commonkey_idx;
|
||||
return AddTitleKeyToInfo(tik_info, &tik, false, decrypt, TICKET_DEVKIT(ticket));
|
||||
}
|
||||
|
||||
u32 CryptTitleKeyInfo(TitleKeysInfo* tik_info, bool encrypt) {
|
||||
for (u32 t = 0; t < tik_info->n_entries; t++)
|
||||
CryptTitleKey(tik_info->entries + t, encrypt, false);
|
||||
return 0;
|
||||
}
|
||||
|
@ -35,7 +35,10 @@ typedef struct {
|
||||
|
||||
|
||||
u32 GetTitleKey(u8* titlekey, Ticket* ticket);
|
||||
u32 SetTitleKey(const u8* titlekey, Ticket* ticket);
|
||||
u32 FindTicket(Ticket** ticket, u8* title_id, bool force_legit, bool emunand);
|
||||
u32 FindTitleKey(Ticket* ticket, u8* title_id);
|
||||
u32 FindTitleKeyForId(u8* titlekey, u8* title_id);
|
||||
u32 AddTitleKeyToInfo(TitleKeysInfo* tik_info, TitleKeyEntry* tik_entry, bool decrypted_in, bool decrypted_out, bool devkit);
|
||||
u32 AddTicketToInfo(TitleKeysInfo* tik_info, Ticket* ticket, bool decrypt);
|
||||
u32 CryptTitleKeyInfo(TitleKeysInfo* tik_info, bool encrypt);
|
||||
|
@ -8,7 +8,7 @@ u32 BuildTitleInfoEntryTmd(TitleInfoEntry* tie, TitleMetaData* tmd, bool sd) {
|
||||
u64 title_id = getbe64(tmd->title_id);
|
||||
bool has_idx1 = false;
|
||||
bool has_idx2 = false;
|
||||
|
||||
|
||||
// set basic values
|
||||
memset(tie, 0x00, sizeof(TitleInfoEntry));
|
||||
tie->title_type = 0x40;
|
||||
@ -34,7 +34,7 @@ u32 BuildTitleInfoEntryTmd(TitleInfoEntry* tie, TitleMetaData* tmd, bool sd) {
|
||||
((tmd->twl_flag & 0x2) ? align(sizeof(TwlIconData), align_size) : 0);
|
||||
}
|
||||
|
||||
// contents title size + some additional stuff
|
||||
// contents title size + some additional stuff
|
||||
TmdContentChunk* chunk = (TmdContentChunk*) (tmd + 1);
|
||||
tie->content0_id = getbe32(chunk->id);
|
||||
for (u32 i = 0; (i < content_count) && (i < TMD_MAX_CONTENTS); i++, chunk++) {
|
||||
@ -44,7 +44,9 @@ u32 BuildTitleInfoEntryTmd(TitleInfoEntry* tie, TitleMetaData* tmd, bool sd) {
|
||||
}
|
||||
|
||||
// manual? dlp? save? (we need to properly check this later)
|
||||
if (((title_id >> 32) == 0x00040000) || ((title_id >> 32) == 0x00040010)) {
|
||||
if (((title_id >> 32) == 0x00040000) ||
|
||||
((title_id >> 32) == 0x0004000E) ||
|
||||
((title_id >> 32) == 0x00040010)) {
|
||||
if (has_idx1) tie->flags_0[0] = 0x1; // this may have a manual
|
||||
if (has_idx2) tie->title_version |= (0xFFFF << 16); // this may have a dlp
|
||||
if (getle32(tmd->save_size)) tie->flags_1[0] = 0x01; // this may have an sd save
|
||||
@ -55,7 +57,7 @@ u32 BuildTitleInfoEntryTmd(TitleInfoEntry* tie, TitleMetaData* tmd, bool sd) {
|
||||
|
||||
u32 BuildTitleInfoEntryTwl(TitleInfoEntry* tie, TitleMetaData* tmd, TwlHeader* twl) {
|
||||
u64 title_id = getbe64(tmd->title_id);
|
||||
|
||||
|
||||
// build the basic titledb entry
|
||||
if (BuildTitleInfoEntryTmd(tie, tmd, false) != 0) return 1;
|
||||
|
||||
@ -90,7 +92,7 @@ u32 BuildTitleInfoEntryNcch(TitleInfoEntry* tie, TitleMetaData* tmd, NcchHeader*
|
||||
|
||||
// NCCH titles need no content0 ID
|
||||
tie->content0_id = 0;
|
||||
|
||||
|
||||
// specific flags
|
||||
// see: http://3dbrew.org/wiki/Titles
|
||||
if (!((title_id >> 32) & 0x10)) // not a system title
|
||||
|
@ -14,25 +14,29 @@ u32 ValidateTmd(TitleMetaData* tmd) {
|
||||
return 0;
|
||||
}
|
||||
|
||||
u32 ValidateTmdSignature(TitleMetaData* tmd) {
|
||||
static bool got_modexp = false;
|
||||
static u32 mod[0x100 / 4] = { 0 };
|
||||
static u32 exp = 0;
|
||||
|
||||
if (!got_modexp) {
|
||||
// grab mod/exp from cert from cert.db
|
||||
if (LoadCertFromCertDb(0x3C10, NULL, mod, &exp) == 0)
|
||||
got_modexp = true;
|
||||
else return 1;
|
||||
}
|
||||
|
||||
if (!RSA_setKey2048(3, mod, exp) ||
|
||||
!RSA_verify2048((void*) &(tmd->signature), (void*) &(tmd->issuer), 0xC4))
|
||||
u32 ValidateTwlTmd(TitleMetaData* tmd) {
|
||||
static const u8 magic[] = { TMD_SIG_TYPE_TWL };
|
||||
if ((memcmp(tmd->sig_type, magic, sizeof(magic)) != 0) ||
|
||||
(strncmp((char*) tmd->issuer, TMD_ISSUER_TWL, 0x40) != 0) ||
|
||||
(getbe16(tmd->content_count) != 1))
|
||||
return 1;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
u32 ValidateTmdSignature(TitleMetaData* tmd) {
|
||||
Certificate cert;
|
||||
|
||||
// grab cert from certs.db
|
||||
if (LoadCertFromCertDb(&cert, (char*)(tmd->issuer)) != 0)
|
||||
return 1;
|
||||
|
||||
int ret = Certificate_VerifySignatureBlock(&cert, &(tmd->signature), 0x100, (void*)&(tmd->issuer), 0xC4, true);
|
||||
|
||||
Certificate_Cleanup(&cert);
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
u32 VerifyTmd(TitleMetaData* tmd) {
|
||||
TmdContentChunk* content_list = (TmdContentChunk*) (tmd + 1);
|
||||
u32 content_count = getbe16(tmd->content_count);
|
||||
@ -98,39 +102,34 @@ u32 BuildFakeTmd(TitleMetaData* tmd, u8* title_id, u32 n_contents, u32 save_size
|
||||
memcpy(tmd->contentinfo[0].cmd_count, tmd->content_count, 2);
|
||||
memset(tmd->contentinfo[0].hash, 0xFF, 0x20); // placeholder (hash)
|
||||
// nothing to do for content list (yet)
|
||||
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
u32 BuildTmdCert(u8* tmdcert) {
|
||||
static const u8 cert_hash_expected[0x20] = {
|
||||
0x91, 0x5F, 0x77, 0x3A, 0x07, 0x82, 0xD4, 0x27, 0xC4, 0xCE, 0xF5, 0x49, 0x25, 0x33, 0xE8, 0xEC,
|
||||
0x91, 0x5F, 0x77, 0x3A, 0x07, 0x82, 0xD4, 0x27, 0xC4, 0xCE, 0xF5, 0x49, 0x25, 0x33, 0xE8, 0xEC,
|
||||
0xF6, 0xFE, 0xA1, 0xEB, 0x8C, 0xCF, 0x59, 0x6E, 0x69, 0xBA, 0x2A, 0x38, 0x8D, 0x73, 0x8A, 0xE1
|
||||
};
|
||||
static const u8 cert_hash_expected_dev[0x20] = {
|
||||
0x49, 0xC9, 0x41, 0x56, 0xCA, 0x86, 0xBD, 0x1F, 0x36, 0x51, 0x51, 0x6A, 0x4A, 0x9F, 0x54, 0xA1,
|
||||
0xC2, 0xE9, 0xCA, 0x93, 0x94, 0xF4, 0x29, 0xA0, 0x38, 0x54, 0x75, 0xFF, 0xAB, 0x6E, 0x8E, 0x71
|
||||
};
|
||||
|
||||
// open certs.db file on SysNAND
|
||||
FIL db;
|
||||
UINT bytes_read;
|
||||
if (f_open(&db, "1:/dbs/certs.db", FA_READ | FA_OPEN_EXISTING) != FR_OK)
|
||||
|
||||
static const char* const retail_issuers[] = {"Root-CA00000003-CP0000000b", "Root-CA00000003"};
|
||||
static const char* const dev_issuers[] = {"Root-CA00000004-CP0000000a", "Root-CA00000004"};
|
||||
|
||||
size_t size = TMD_CDNCERT_SIZE;
|
||||
if (BuildRawCertBundleFromCertDb(tmdcert, &size, !IS_DEVKIT ? retail_issuers : dev_issuers, 2) ||
|
||||
size != TMD_CDNCERT_SIZE) {
|
||||
return 1;
|
||||
// grab TMD cert from 3 offsets
|
||||
f_lseek(&db, 0x3C10);
|
||||
f_read(&db, tmdcert + 0x000, 0x300, &bytes_read);
|
||||
f_lseek(&db, 0x0C10);
|
||||
f_read(&db, tmdcert + 0x300, 0x1F0, &bytes_read);
|
||||
f_lseek(&db, 0x3A00);
|
||||
f_read(&db, tmdcert + 0x4F0, 0x210, &bytes_read);
|
||||
f_close(&db);
|
||||
|
||||
}
|
||||
|
||||
// check the certificate hash
|
||||
u8 cert_hash[0x20];
|
||||
sha_quick(cert_hash, tmdcert, TMD_CDNCERT_SIZE, SHA256_MODE);
|
||||
if (memcmp(cert_hash, IS_DEVKIT ? cert_hash_expected_dev : cert_hash_expected, 0x20) != 0)
|
||||
return 1;
|
||||
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
@ -2,17 +2,22 @@
|
||||
|
||||
#include "common.h"
|
||||
|
||||
#define TMD_MAX_CONTENTS 1000 // 383 // theme CIAs contain maximum 100 themes + 1 index content
|
||||
#define TMD_MAX_CONTENTS TITLE_MAX_CONTENTS // 1024 // 383 // theme CIAs contain maximum 100 themes + 1 index content
|
||||
|
||||
#define TMD_SIZE_MIN sizeof(TitleMetaData)
|
||||
#define TMD_SIZE_MAX (sizeof(TitleMetaData) + (TMD_MAX_CONTENTS*sizeof(TmdContentChunk)))
|
||||
#define TMD_SIZE_N(n) (sizeof(TitleMetaData) + (n*sizeof(TmdContentChunk)))
|
||||
#define TMD_SIZE_STUB (TMD_SIZE_MIN - (0x20 + (64 * sizeof(TmdContentInfo))))
|
||||
#define TMD_SIZE_TWL (TMD_SIZE_STUB + 0x24)
|
||||
#define TMD_CDNCERT_SIZE 0x700
|
||||
|
||||
#define TMD_ISSUER "Root-CA00000003-CP0000000b"
|
||||
#define TMD_ISSUER_DEV "Root-CA00000004-CP0000000a"
|
||||
#define TMD_SIG_TYPE 0x00, 0x01, 0x00, 0x04 // RSA_2048 SHA256
|
||||
|
||||
#define TMD_ISSUER_TWL "Root-CA00000001-CP00000007"
|
||||
#define TMD_SIG_TYPE_TWL 0x00, 0x01, 0x00, 0x01 // RSA_2048 SHA1
|
||||
|
||||
#define DLC_TID_HIGH 0x00, 0x04, 0x00, 0x8C // title id high for DLC
|
||||
|
||||
// from: https://github.com/profi200/Project_CTR/blob/02159e17ee225de3f7c46ca195ff0f9ba3b3d3e4/ctrtool/tmd.h#L18-L59;
|
||||
@ -58,6 +63,7 @@ typedef struct {
|
||||
} __attribute__((packed, aligned(4))) TitleMetaData;
|
||||
|
||||
u32 ValidateTmd(TitleMetaData* tmd);
|
||||
u32 ValidateTwlTmd(TitleMetaData* tmd);
|
||||
u32 ValidateTmdSignature(TitleMetaData* tmd);
|
||||
u32 VerifyTmd(TitleMetaData* tmd);
|
||||
u32 GetTmdCtr(u8* ctr, TmdContentChunk* chunk);
|
||||
|
@ -18,6 +18,7 @@
|
||||
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
||||
*/
|
||||
|
||||
#include <arm.h>
|
||||
#include "card_spi.h"
|
||||
#include <spi.h>
|
||||
#include "timer.h"
|
||||
@ -30,7 +31,7 @@
|
||||
#define SPI_512B_EEPROM_CMD_RDLO 3
|
||||
#define SPI_512B_EEPROM_CMD_RDHI 11
|
||||
|
||||
#define SPI_EEPROM_CMD_WRITE 2
|
||||
#define SPI_EEPROM_CMD_WRITE 2
|
||||
|
||||
#define SPI_CMD_READ 3
|
||||
|
||||
@ -57,58 +58,56 @@ int CardSPIWriteSaveData_24bit_erase_program(CardSPIType type, u32 offset, const
|
||||
int CardSPIEraseSector_emulated(CardSPIType type, u32 offset);
|
||||
int CardSPIEraseSector_real(CardSPIType type, u32 offset);
|
||||
|
||||
const CardSPITypeData EEPROM_512B_ = { CardSPIEnableWriting_512B, CardSPIReadSaveData_9bit, CardSPIWriteSaveData_9bit, CardSPIEraseSector_emulated, 0xffffff, 1 << 9, 16, 16, 16, 0, 0, 0 };
|
||||
const CardSPITypeData EEPROM_512B = { CardSPIEnableWriting_512B, CardSPIReadSaveData_9bit, CardSPIWriteSaveData_9bit, CardSPIEraseSector_emulated, 0xffff, 1 << 9, 16, 16, 16, 0, 0, 0 };
|
||||
|
||||
const CardSPITypeData EEPROM_DUMMY = { CardSPIEnableWriting_regular, CardSPIReadSaveData_16bit, CardSPIWriteSaveData_16bit, CardSPIEraseSector_emulated, 0xffffff, UINT32_MAX, 1, 1, 1, SPI_EEPROM_CMD_WRITE, 0, 0 };
|
||||
const CardSPITypeData EEPROM_DUMMY = { CardSPIEnableWriting_regular, CardSPIReadSaveData_16bit, CardSPIWriteSaveData_16bit, CardSPIEraseSector_emulated, 0xffff, UINT32_MAX, 1, 1, 1, SPI_EEPROM_CMD_WRITE, 0, 0 };
|
||||
const CardSPITypeData EEPROMTypes[] = {
|
||||
{ CardSPIEnableWriting_regular, CardSPIReadSaveData_16bit, CardSPIWriteSaveData_16bit, CardSPIEraseSector_emulated, 0xffffff, 1 << 13, 32, 32, 32, SPI_EEPROM_CMD_WRITE, 0, 0}, // EEPROM 8 KB
|
||||
{ CardSPIEnableWriting_regular, CardSPIReadSaveData_16bit, CardSPIWriteSaveData_16bit, CardSPIEraseSector_emulated, 0xffffff, 1 << 16, 128, 128, 128, SPI_EEPROM_CMD_WRITE, 0, 0}, // EEPROM 64 KB
|
||||
{ CardSPIEnableWriting_regular, CardSPIReadSaveData_24bit, CardSPIWriteSaveData_24bit_write, CardSPIEraseSector_emulated, 0xffffff, 1 << 17, 256, 256, 256, SPI_EEPROM_CMD_WRITE, 0, 0}, // EEPROM 128 KB
|
||||
{ CardSPIEnableWriting_regular, CardSPIReadSaveData_16bit, CardSPIWriteSaveData_16bit, CardSPIEraseSector_emulated, 0xffff, 1 << 13, 32, 32, 32, SPI_EEPROM_CMD_WRITE, 0, 0}, // EEPROM 8 KB
|
||||
{ CardSPIEnableWriting_regular, CardSPIReadSaveData_16bit, CardSPIWriteSaveData_16bit, CardSPIEraseSector_emulated, 0xffff, 1 << 16, 128, 128, 128, SPI_EEPROM_CMD_WRITE, 0, 0}, // EEPROM 64 KB
|
||||
{ CardSPIEnableWriting_regular, CardSPIReadSaveData_24bit, CardSPIWriteSaveData_24bit_write, CardSPIEraseSector_emulated, 0xffff, 1 << 17, 256, 256, 256, SPI_EEPROM_CMD_WRITE, 0, 0}, // EEPROM 128 KB
|
||||
};
|
||||
|
||||
const CardSPITypeData FLASH_DUMMY = { NULL, CardSPIReadSaveData_24bit, NULL, NULL, 0x0, 0, 0, 0, 0, 0, 0, 0 };
|
||||
const CardSPITypeData flashTypes[] = {
|
||||
// NTR/TWL
|
||||
{ CardSPIEnableWriting_regular, CardSPIReadSaveData_24bit, CardSPIWriteSaveData_24bit_write, CardSPIEraseSector_real, 0x204012, 1 << 18, 65536, 256, 256, SPI_FLASH_CMD_PW, SPI_CMD_PP, SPI_FLASH_CMD_SE },
|
||||
{ CardSPIEnableWriting_regular, CardSPIReadSaveData_24bit, CardSPIWriteSaveData_24bit_erase_program, CardSPIEraseSector_real, 0x621600, 1 << 18, 65536, 256, 65536, SPI_FLASH_CMD_PW, SPI_CMD_PP, SPI_FLASH_CMD_SE },
|
||||
{ CardSPIEnableWriting_regular, CardSPIReadSaveData_24bit, CardSPIWriteSaveData_24bit_write, CardSPIEraseSector_real, 0x204013, 1 << 19, 65536, 256, 256, SPI_FLASH_CMD_PW, SPI_CMD_PP, SPI_FLASH_CMD_SE },
|
||||
{ CardSPIEnableWriting_regular, CardSPIReadSaveData_24bit, CardSPIWriteSaveData_24bit_write, CardSPIEraseSector_real, 0x621100, 1 << 19, 65536, 256, 256, SPI_FLASH_CMD_PW, SPI_CMD_PP, SPI_FLASH_CMD_SE },
|
||||
{ CardSPIEnableWriting_regular, CardSPIReadSaveData_24bit, CardSPIWriteSaveData_24bit_write, CardSPIEraseSector_real, 0x204014, 1 << 20, 65536, 256, 256, SPI_FLASH_CMD_PW, SPI_CMD_PP, SPI_FLASH_CMD_SE },
|
||||
{ CardSPIEnableWriting_regular, CardSPIReadSaveData_24bit, CardSPIWriteSaveData_24bit_erase_program, CardSPIEraseSector_real, 0x202017, 1 << 23, 65536, 256, 65536, SPI_FLASH_CMD_PW, SPI_CMD_PP, SPI_FLASH_CMD_SE },
|
||||
// CTR
|
||||
{ CardSPIEnableWriting_regular, CardSPIReadSaveData_24bit, CardSPIWriteSaveData_24bit_erase_program, CardSPIEraseSector_real, 0xC22211, 1 << 17, 4096, 32, 4096, SPI_FLASH_CMD_PW, SPI_CMD_PP, SPI_FLASH_CMD_MXIC_SE },
|
||||
{ CardSPIEnableWriting_regular, CardSPIReadSaveData_24bit, CardSPIWriteSaveData_24bit_erase_program, CardSPIEraseSector_real, 0xC22213, 1 << 19, 4096, 32, 4096, SPI_FLASH_CMD_PW, SPI_CMD_PP, SPI_FLASH_CMD_MXIC_SE },
|
||||
{ CardSPIEnableWriting_regular, CardSPIReadSaveData_24bit, CardSPIWriteSaveData_24bit_erase_program, CardSPIEraseSector_real, 0xC22214, 1 << 20, 4096, 32, 4096, SPI_FLASH_CMD_PW, SPI_CMD_PP, SPI_FLASH_CMD_MXIC_SE },
|
||||
|
||||
// Most common flash chip in DS games, in 3 different sizes (256kB: ST M45PE20, 512kB: ST M45PE40, 1MB: ST M45PE80)
|
||||
{ CardSPIEnableWriting_regular, CardSPIReadSaveData_24bit, CardSPIWriteSaveData_24bit_write, CardSPIEraseSector_real, 0x2040, 0, 65536, 256, 256, SPI_FLASH_CMD_PW, SPI_CMD_PP, SPI_FLASH_CMD_SE },
|
||||
|
||||
// Found in Mario Kart, for example (always 256kB, Sanyo LE25FW203T)
|
||||
{ CardSPIEnableWriting_regular, CardSPIReadSaveData_24bit, CardSPIWriteSaveData_24bit_erase_program, CardSPIEraseSector_real, 0x6216, 1 << 18, 65536, 256, 65536, SPI_FLASH_CMD_PW, SPI_CMD_PP, SPI_FLASH_CMD_SE },
|
||||
|
||||
// Found in some copies of Pokemon Diamond/Pearl (always 512kB, Sanyo ??)
|
||||
{ CardSPIEnableWriting_regular, CardSPIReadSaveData_24bit, CardSPIWriteSaveData_24bit_write, CardSPIEraseSector_real, 0x6211, 1 << 19, 65536, 256, 256, SPI_FLASH_CMD_PW, SPI_CMD_PP, SPI_FLASH_CMD_SE },
|
||||
|
||||
// Found in Art Academy, and maybe some other ones (8MB: ST M25P64)
|
||||
{ CardSPIEnableWriting_regular, CardSPIReadSaveData_24bit, CardSPIWriteSaveData_24bit_erase_program, CardSPIEraseSector_real, 0x2020, 0, 65536, 256, 65536, SPI_FLASH_CMD_PW, SPI_CMD_PP, SPI_FLASH_CMD_SE },
|
||||
|
||||
// Found in some DS bootlegs (ST M25PE40VP in my case)
|
||||
{ CardSPIEnableWriting_regular, CardSPIReadSaveData_24bit, CardSPIWriteSaveData_24bit_erase_program, CardSPIEraseSector_real, 0x2080, 0, 65536, 256, 65536, SPI_FLASH_CMD_PW, SPI_CMD_PP, SPI_FLASH_CMD_SE },
|
||||
|
||||
// This is the most common type of flash 3DS cartridges. Not normally found in DS ones, but check anyway. (Custom MXIC chips)
|
||||
{ CardSPIEnableWriting_regular, CardSPIReadSaveData_24bit, CardSPIWriteSaveData_24bit_erase_program, CardSPIEraseSector_real, 0xC222, 0, 4096, 32, 4096, SPI_FLASH_CMD_PW, SPI_CMD_PP, SPI_FLASH_CMD_MXIC_SE },
|
||||
|
||||
// Found this in some copies of ArtAcademy, I think it's something from MXIC (Thank you for the help @FerozElMejor on Discord)
|
||||
{ CardSPIEnableWriting_regular, CardSPIReadSaveData_24bit, CardSPIWriteSaveData_24bit_erase_program, CardSPIEraseSector_real, 0xC220, 0, 4096, 32, 4096, SPI_FLASH_CMD_PW, SPI_CMD_PP, SPI_FLASH_CMD_MXIC_SE },
|
||||
};
|
||||
|
||||
const CardSPITypeData * const EEPROM_512B = &EEPROM_512B_;
|
||||
|
||||
const CardSPITypeData * const EEPROM_8KB = EEPROMTypes + 0;
|
||||
const CardSPITypeData * const EEPROM_64KB = EEPROMTypes + 1;
|
||||
const CardSPITypeData * const EEPROM_128KB = EEPROMTypes + 2;
|
||||
|
||||
const CardSPITypeData * const FLASH_256KB_1 = flashTypes + 0;
|
||||
const CardSPITypeData * const FLASH_256KB_2 = flashTypes + 1;
|
||||
const CardSPITypeData * const FLASH_512KB_1 = flashTypes + 2;
|
||||
const CardSPITypeData * const FLASH_512KB_2 = flashTypes + 3;
|
||||
const CardSPITypeData * const FLASH_1MB = flashTypes + 4;
|
||||
const CardSPITypeData * const FLASH_8MB = flashTypes + 5;
|
||||
|
||||
const CardSPITypeData * const FLASH_128KB_CTR = flashTypes + 6;
|
||||
const CardSPITypeData * const FLASH_512KB_CTR = flashTypes + 7;
|
||||
const CardSPITypeData * const FLASH_1MB_CTR = flashTypes + 8;
|
||||
const CardSPITypeData * const FLASH_CTR_GENERIC = flashTypes + 5;
|
||||
|
||||
#define REG_CFG9_CARDCTL *((vu16*)0x1000000C)
|
||||
#define CARDCTL_SPICARD (1u<<8)
|
||||
|
||||
int CardSPIWriteRead(CardSPIType type, const void* cmd, u32 cmdSize, void* answer, u32 answerSize, const void* data, u32 dataSize) {
|
||||
int CardSPIWriteRead(bool infrared, const void* cmd, u32 cmdSize, void* answer, u32 answerSize, const void* data, u32 dataSize) {
|
||||
u32 headerFooterVal = 0;
|
||||
|
||||
REG_CFG9_CARDCTL |= CARDCTL_SPICARD;
|
||||
|
||||
if (type.infrared) {
|
||||
if (infrared) {
|
||||
SPI_XferInfo irXfer = { &headerFooterVal, 1, false };
|
||||
SPI_DoXfer(SPI_DEV_CART_IR, &irXfer, 1, false);
|
||||
// Wait as specified by GBATEK (0x800 cycles at 33 MHz)
|
||||
ARM_WaitCycles(0x800 * 4);
|
||||
}
|
||||
|
||||
SPI_XferInfo transfers[3] = {
|
||||
@ -119,17 +118,22 @@ int CardSPIWriteRead(CardSPIType type, const void* cmd, u32 cmdSize, void* answe
|
||||
SPI_DoXfer(SPI_DEV_CART_FLASH, transfers, 3, true);
|
||||
|
||||
REG_CFG9_CARDCTL &= ~CARDCTL_SPICARD;
|
||||
|
||||
|
||||
if (infrared) {
|
||||
// Wait as specified by GBATEK (0x800 cycles at 33 MHz)
|
||||
ARM_WaitCycles(0x800 * 4);
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
int CardSPIWaitWriteEnd(CardSPIType type, u32 timeout) {
|
||||
int CardSPIWaitWriteEnd(bool infrared, u32 timeout) {
|
||||
u8 cmd = SPI_CMD_RDSR, statusReg = 0;
|
||||
int res = 0;
|
||||
u64 time_start = timer_start();
|
||||
|
||||
do {
|
||||
res = CardSPIWriteRead(type, &cmd, 1, &statusReg, 1, 0, 0);
|
||||
res = CardSPIWriteRead(infrared, &cmd, 1, &statusReg, 1, 0, 0);
|
||||
if (res) return res;
|
||||
if (timer_msec(time_start) > timeout) return 1;
|
||||
} while(statusReg & SPI_FLG_WIP);
|
||||
@ -139,21 +143,21 @@ int CardSPIWaitWriteEnd(CardSPIType type, u32 timeout) {
|
||||
|
||||
int CardSPIEnableWriting_512B(CardSPIType type) {
|
||||
u8 cmd = SPI_CMD_WREN;
|
||||
return CardSPIWriteRead(type, &cmd, 1, NULL, 0, 0, 0);
|
||||
return CardSPIWriteRead(type.infrared, &cmd, 1, NULL, 0, 0, 0);
|
||||
}
|
||||
|
||||
int CardSPIEnableWriting_regular(CardSPIType type) {
|
||||
u8 cmd = SPI_CMD_WREN, statusReg = 0;
|
||||
int res = CardSPIWriteRead(type, &cmd, 1, NULL, 0, 0, 0);
|
||||
int res = CardSPIWriteRead(type.infrared, &cmd, 1, NULL, 0, 0, 0);
|
||||
|
||||
if (res) return res;
|
||||
cmd = SPI_CMD_RDSR;
|
||||
|
||||
|
||||
do {
|
||||
res = CardSPIWriteRead(type, &cmd, 1, &statusReg, 1, 0, 0);
|
||||
res = CardSPIWriteRead(type.infrared, &cmd, 1, &statusReg, 1, 0, 0);
|
||||
if (res) return res;
|
||||
} while(statusReg & ~SPI_FLG_WEL);
|
||||
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
@ -165,28 +169,28 @@ int CardSPIEnableWriting(CardSPIType type) {
|
||||
int _SPIWriteTransaction(CardSPIType type, void* cmd, u32 cmdSize, const void* data, u32 dataSize) {
|
||||
int res;
|
||||
if ((res = CardSPIEnableWriting(type))) return res;
|
||||
if ((res = CardSPIWriteRead(type, cmd, cmdSize, NULL, 0, (void*) ((u8*) data), dataSize))) return res;
|
||||
return CardSPIWaitWriteEnd(type, 1000);
|
||||
if ((res = CardSPIWriteRead(type.infrared, cmd, cmdSize, NULL, 0, (void*) ((u8*) data), dataSize))) return res;
|
||||
return CardSPIWaitWriteEnd(type.infrared, 10000);
|
||||
}
|
||||
|
||||
int CardSPIReadJEDECIDAndStatusReg(CardSPIType type, u32* id, u8* statusReg) {
|
||||
int CardSPIReadJEDECIDAndStatusReg(bool infrared, u32* id, u8* statusReg) {
|
||||
u8 cmd = SPI_FLASH_CMD_RDID;
|
||||
u8 reg = 0;
|
||||
u8 idbuf[3] = { 0 };
|
||||
u32 id_ = 0;
|
||||
int res = CardSPIWaitWriteEnd(type, 0);
|
||||
int res = CardSPIWaitWriteEnd(infrared, 10);
|
||||
if (res) return res;
|
||||
|
||||
if ((res = CardSPIWriteRead(type, &cmd, 1, idbuf, 3, 0, 0))) return res;
|
||||
|
||||
|
||||
if ((res = CardSPIWriteRead(infrared, &cmd, 1, idbuf, 3, 0, 0))) return res;
|
||||
|
||||
id_ = (idbuf[0] << 16) | (idbuf[1] << 8) | idbuf[2];
|
||||
cmd = SPI_CMD_RDSR;
|
||||
|
||||
if ((res = CardSPIWriteRead(type, &cmd, 1, ®, 1, 0, 0))) return res;
|
||||
|
||||
|
||||
if ((res = CardSPIWriteRead(infrared, &cmd, 1, ®, 1, 0, 0))) return res;
|
||||
|
||||
if (id) *id = id_;
|
||||
if (statusReg) *statusReg = reg;
|
||||
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
@ -202,24 +206,36 @@ u32 CardSPIGetEraseSize(CardSPIType type) {
|
||||
|
||||
u32 CardSPIGetCapacity(CardSPIType type) {
|
||||
if (type.chip == NO_CHIP) return 0;
|
||||
return type.chip->capacity;
|
||||
if (type.chip->capacity != 0) {
|
||||
return type.chip->capacity;
|
||||
} else {
|
||||
u32 jedecid;
|
||||
CardSPIReadJEDECIDAndStatusReg(type.infrared, &jedecid, NULL);
|
||||
u8 size_exponent = jedecid & 0xff;
|
||||
if ((size_exponent >= 8) && (size_exponent <= 24)) {
|
||||
// Thanks to @wwylele for pointing this out
|
||||
return 1 << size_exponent;
|
||||
} else {
|
||||
return 0;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
int CardSPIWriteSaveData_9bit(CardSPIType type, u32 offset, const void* data, u32 size) {
|
||||
u8 cmd[2] = { (offset >= 0x100) ? SPI_512B_EEPROM_CMD_WRHI : SPI_512B_EEPROM_CMD_WRLO, (u8) offset };
|
||||
|
||||
|
||||
return _SPIWriteTransaction(type, cmd, 2, (void*) ((u8*) data), size);
|
||||
}
|
||||
|
||||
int CardSPIWriteSaveData_16bit(CardSPIType type, u32 offset, const void* data, u32 size) {
|
||||
u8 cmd[3] = { type.chip->writeCommand, (u8)(offset >> 8), (u8) offset };
|
||||
|
||||
|
||||
return _SPIWriteTransaction(type, cmd, 3, (void*) ((u8*) data), size);
|
||||
}
|
||||
|
||||
int CardSPIWriteSaveData_24bit_write(CardSPIType type, u32 offset, const void* data, u32 size) {
|
||||
u8 cmd[4] = { type.chip->writeCommand, (u8)(offset >> 16), (u8)(offset >> 8), (u8) offset };
|
||||
|
||||
|
||||
return _SPIWriteTransaction(type, cmd, 4, (void*) ((u8*) data), size);
|
||||
}
|
||||
|
||||
@ -256,7 +272,7 @@ int CardSPIWriteSaveData_24bit_erase_program(CardSPIType type, u32 offset, const
|
||||
if (!(res = _SPIWriteTransaction(type, cmd, 4, (void*) ((u8*) data - offset + pos), pageSize))) {
|
||||
break;
|
||||
}
|
||||
CardSPIWriteRead(type, "\x04", 1, NULL, 0, NULL, 0);
|
||||
CardSPIWriteRead(type.infrared, "\x04", 1, NULL, 0, NULL, 0);
|
||||
}
|
||||
if(res) {
|
||||
free(newData);
|
||||
@ -270,84 +286,81 @@ int CardSPIWriteSaveData_24bit_erase_program(CardSPIType type, u32 offset, const
|
||||
|
||||
int CardSPIWriteSaveData(CardSPIType type, u32 offset, const void* data, u32 size) {
|
||||
if (type.chip == NO_CHIP) return 1;
|
||||
|
||||
|
||||
if (size == 0) return 0;
|
||||
size = min(size, CardSPIGetCapacity(type) - offset);
|
||||
u32 end = offset + size;
|
||||
u32 pos = offset;
|
||||
u32 writeSize = type.chip->writeSize;
|
||||
if (writeSize == 0) return 0xC8E13404;
|
||||
|
||||
int res = CardSPIWaitWriteEnd(type, 1000);
|
||||
|
||||
int res = CardSPIWaitWriteEnd(type.infrared, 1000);
|
||||
if (res) return res;
|
||||
|
||||
|
||||
while(pos < end) {
|
||||
u32 remaining = end - pos;
|
||||
u32 nb = writeSize - (pos % writeSize);
|
||||
|
||||
|
||||
u32 dataSize = (remaining < nb) ? remaining : nb;
|
||||
|
||||
|
||||
if ((res = type.chip->writeSaveData(type, pos, (void*) ((u8*) data - offset + pos), dataSize))) return res;
|
||||
|
||||
|
||||
pos = ((pos / writeSize) + 1) * writeSize; // truncate
|
||||
}
|
||||
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
int CardSPIReadSaveData_9bit(CardSPIType type, u32 pos, void* data, u32 size) {
|
||||
int CardSPIReadSaveData_9bit(CardSPIType type, u32 pos, void* data, u32 size) {
|
||||
u8 cmd[4];
|
||||
u32 cmdSize = 2;
|
||||
|
||||
|
||||
u32 end = pos + size;
|
||||
|
||||
|
||||
u32 read = 0;
|
||||
if (pos < 0x100) {
|
||||
u32 len = 0x100 - pos;
|
||||
u32 len = min(0x100 - pos, size);
|
||||
cmd[0] = SPI_512B_EEPROM_CMD_RDLO;
|
||||
cmd[1] = (u8) pos;
|
||||
|
||||
int res = CardSPIWriteRead(type, cmd, cmdSize, data, len, NULL, 0);
|
||||
|
||||
int res = CardSPIWriteRead(type.infrared, cmd, cmdSize, data, len, NULL, 0);
|
||||
if (res) return res;
|
||||
|
||||
|
||||
read += len;
|
||||
}
|
||||
|
||||
|
||||
if (end >= 0x100) {
|
||||
u32 len = end - 0x100;
|
||||
u32 len = min(end - 0x100, size);
|
||||
|
||||
cmd[0] = SPI_512B_EEPROM_CMD_RDHI;
|
||||
cmd[1] = (u8)(pos + read);
|
||||
|
||||
int res = CardSPIWriteRead(type, cmd, cmdSize, (void*)((u8*)data + read), len, NULL, 0);
|
||||
|
||||
int res = CardSPIWriteRead(type.infrared, cmd, cmdSize, (void*)((u8*)data + read), len, NULL, 0);
|
||||
|
||||
if (res) return res;
|
||||
}
|
||||
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
int CardSPIReadSaveData_16bit(CardSPIType type, u32 offset, void* data, u32 size) {
|
||||
u8 cmd[3] = { SPI_CMD_READ, (u8)(offset >> 8), (u8) offset };
|
||||
|
||||
return CardSPIWriteRead(type, cmd, 3, data, size, NULL, 0);
|
||||
return CardSPIWriteRead(type.infrared, cmd, 3, data, size, NULL, 0);
|
||||
}
|
||||
|
||||
int CardSPIReadSaveData_24bit(CardSPIType type, u32 offset, void* data, u32 size) {
|
||||
u8 cmd[4] = { SPI_CMD_READ, (u8)(offset >> 16), (u8)(offset >> 8), (u8) offset };
|
||||
|
||||
return CardSPIWriteRead(type, cmd, 4, data, size, NULL, 0);
|
||||
|
||||
return CardSPIWriteRead(type.infrared, cmd, 4, data, size, NULL, 0);
|
||||
}
|
||||
|
||||
int CardSPIReadSaveData(CardSPIType type, u32 offset, void* data, u32 size) {
|
||||
if (type.chip == NO_CHIP) return 1;
|
||||
|
||||
if (size == 0) return 0;
|
||||
|
||||
int res = CardSPIWaitWriteEnd(type, 1000);
|
||||
|
||||
int res = CardSPIWaitWriteEnd(type.infrared, 1000);
|
||||
if (res) return res;
|
||||
|
||||
size = (size <= CardSPIGetCapacity(type) - offset) ? size : CardSPIGetCapacity(type) - offset;
|
||||
|
||||
return type.chip->readSaveData(type, offset, data, size);
|
||||
}
|
||||
@ -358,7 +371,7 @@ int CardSPIEraseSector_emulated(CardSPIType type, u32 offset) {
|
||||
if (!fill_buf) return 1;
|
||||
memset(fill_buf, 0xff, blockSize);
|
||||
offset = (offset / blockSize) * blockSize;
|
||||
|
||||
|
||||
int res = CardSPIWriteSaveData(type, offset, fill_buf, blockSize);
|
||||
free(fill_buf);
|
||||
return res;
|
||||
@ -366,10 +379,10 @@ int CardSPIEraseSector_emulated(CardSPIType type, u32 offset) {
|
||||
|
||||
int CardSPIEraseSector_real(CardSPIType type, u32 offset) {
|
||||
u8 cmd[4] = { type.chip->eraseCommand, (u8)(offset >> 16), (u8)(offset >> 8), (u8) offset };
|
||||
|
||||
int res = CardSPIWaitWriteEnd(type, 10000);
|
||||
|
||||
int res = CardSPIWaitWriteEnd(type.infrared, 10000);
|
||||
if (res) return res;
|
||||
|
||||
|
||||
return _SPIWriteTransaction(type, cmd, 4, NULL, 0);
|
||||
}
|
||||
|
||||
@ -399,92 +412,81 @@ int CardSPIErase(CardSPIType type) {
|
||||
*
|
||||
* Copyright (C) Pokedoc (2010)
|
||||
*/
|
||||
/*
|
||||
* This program is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation; either version 2 of the License, or
|
||||
/*
|
||||
* This program is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation; either version 2 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* This program is distributed in the hope that it will be useful, but
|
||||
* WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
|
||||
* or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
||||
*
|
||||
* This program is distributed in the hope that it will be useful, but
|
||||
* WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
|
||||
* or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
||||
* for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License along
|
||||
* with this program; if not, write to the Free Software Foundation, Inc.,
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License along
|
||||
* with this program; if not, write to the Free Software Foundation, Inc.,
|
||||
* 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
||||
*/
|
||||
|
||||
|
||||
|
||||
int _SPIIsDataMirrored(CardSPIType type, int size, bool* mirrored) {
|
||||
u32 offset0 = (size-1); // n KB
|
||||
u32 offset1 = (2*size-1); // 2n KB
|
||||
|
||||
|
||||
u8 buf1; // +0k data read -> write
|
||||
u8 buf2; // +n k data read -> read
|
||||
u8 buf3; // +0k ~data write
|
||||
u8 buf4; // +n k data new comp buf2
|
||||
|
||||
|
||||
int res;
|
||||
|
||||
|
||||
if ((res = CardSPIReadSaveData(type, offset0, &buf1, 1))) return res;
|
||||
if ((res = CardSPIReadSaveData(type, offset1, &buf2, 1))) return res;
|
||||
buf3=~buf1;
|
||||
if ((res = CardSPIWriteSaveData(type, offset0, &buf3, 1))) return res;
|
||||
if ((res = CardSPIReadSaveData(type, offset1, &buf4, 1))) return res;
|
||||
if ((res = CardSPIWriteSaveData(type, offset0, &buf1, 1))) return res;
|
||||
|
||||
|
||||
*mirrored = buf2 != buf4;
|
||||
return 0;
|
||||
}
|
||||
|
||||
int CardSPIGetCardSPIType(CardSPIType* type, bool infrared) {
|
||||
CardSPIType CardSPIGetCardSPIType(bool infrared) {
|
||||
u8 sr = 0;
|
||||
u32 jedec = 0;
|
||||
CardSPIType t = {NO_CHIP, infrared};
|
||||
int res;
|
||||
|
||||
if(infrared) {
|
||||
// Infrared carts currently not supported, need additional handling!
|
||||
*type = (CardSPIType) {NO_CHIP, true};
|
||||
return 0;
|
||||
int res;
|
||||
|
||||
res = CardSPIReadJEDECIDAndStatusReg(infrared, &jedec, &sr);
|
||||
if (res) return (CardSPIType) {NO_CHIP, false};
|
||||
|
||||
if ((sr & 0xfd) == 0x00 && (jedec != 0x00ffffff)) { t.chip = &FLASH_DUMMY; }
|
||||
if ((sr & 0xfd) == 0xF0 && (jedec == 0x00ffffff)) { return (CardSPIType) { &EEPROM_512B, false }; }
|
||||
if ((sr & 0xfd) == 0x00 && (jedec == 0x00ffffff)) { t = (CardSPIType) { &EEPROM_DUMMY, false }; }
|
||||
|
||||
if(t.chip == NO_CHIP) {
|
||||
return (CardSPIType) {NO_CHIP, false};
|
||||
}
|
||||
|
||||
res = CardSPIReadJEDECIDAndStatusReg(t, &jedec, &sr);
|
||||
if (res) return res;
|
||||
|
||||
if ((sr & 0xfd) == 0x00 && (jedec != 0x00ffffff)) { t.chip = &FLASH_DUMMY; }
|
||||
if ((sr & 0xfd) == 0xF0 && (jedec == 0x00ffffff)) { *type = (CardSPIType) { EEPROM_512B, false }; return 0; }
|
||||
if ((sr & 0xfd) == 0x00 && (jedec == 0x00ffffff)) { t = (CardSPIType) { &EEPROM_DUMMY, false }; }
|
||||
|
||||
if(t.chip == NO_CHIP) {
|
||||
*type = (CardSPIType) {NO_CHIP, false};
|
||||
return 0;
|
||||
}
|
||||
|
||||
if (t.chip == &EEPROM_DUMMY) {
|
||||
bool mirrored = false;
|
||||
size_t i;
|
||||
|
||||
|
||||
for(i = 0; i < sizeof(EEPROMTypes) / sizeof(CardSPITypeData) - 1; i++) {
|
||||
if ((res = _SPIIsDataMirrored(t, CardSPIGetCapacity((CardSPIType) {EEPROMTypes + i, false}), &mirrored))) return res;
|
||||
if ((res = _SPIIsDataMirrored(t, CardSPIGetCapacity((CardSPIType) {EEPROMTypes + i, false}), &mirrored))) return (CardSPIType) {NO_CHIP, false};
|
||||
if (mirrored) {
|
||||
*type = (CardSPIType) {EEPROMTypes + i, false};
|
||||
return 0;
|
||||
return (CardSPIType) {EEPROMTypes + i, false};
|
||||
}
|
||||
}
|
||||
*type = (CardSPIType) { EEPROMTypes + i, false };
|
||||
return 0;
|
||||
return (CardSPIType) { EEPROMTypes + i, false };
|
||||
}
|
||||
|
||||
|
||||
for(size_t i = 0; i < sizeof(flashTypes) / sizeof(CardSPITypeData); i++) {
|
||||
if (flashTypes[i].jedecId == jedec) {
|
||||
*type = (CardSPIType) { flashTypes + i, infrared };
|
||||
return 0;
|
||||
if (flashTypes[i].jedecId == (jedec >> 8)) {
|
||||
return (CardSPIType) { flashTypes + i, infrared };
|
||||
}
|
||||
}
|
||||
|
||||
*type = (CardSPIType) { NO_CHIP, infrared };
|
||||
return 0;
|
||||
|
||||
|
||||
return (CardSPIType) { NO_CHIP, infrared };
|
||||
|
||||
}
|
||||
|
@ -1,7 +1,7 @@
|
||||
/*
|
||||
* This file is based on SPI.h from TWLSaveTool. Its copyright notice is
|
||||
* reproduced below.
|
||||
*
|
||||
*
|
||||
* Copyright (C) 2015-2016 TuxSH
|
||||
*
|
||||
* TWLSaveTool is free software: you can redistribute it and/or modify
|
||||
@ -37,7 +37,7 @@ struct CardSPITypeData {
|
||||
int (*readSaveData) (CardSPIType type, u32 offset, void* data, u32 size);
|
||||
int (*writeSaveData) (CardSPIType type, u32 offset, const void* data, u32 size);
|
||||
int (*eraseSector) (CardSPIType type, u32 offset);
|
||||
u32 jedecId;
|
||||
u16 jedecId;
|
||||
u32 capacity;
|
||||
u32 eraseSize;
|
||||
u32 pageSize;
|
||||
@ -49,28 +49,13 @@ struct CardSPITypeData {
|
||||
|
||||
#define NO_CHIP NULL
|
||||
|
||||
extern const CardSPITypeData * const EEPROM_512B;
|
||||
extern const CardSPITypeData * const FLASH_CTR_GENERIC; // Handles each 3ds cartridge the exact same
|
||||
|
||||
extern const CardSPITypeData * const EEPROM_8KB;
|
||||
extern const CardSPITypeData * const EEPROM_64KB;
|
||||
extern const CardSPITypeData * const EEPROM_128KB;
|
||||
|
||||
extern const CardSPITypeData * const FLASH_256KB_1;
|
||||
extern const CardSPITypeData * const FLASH_256KB_2;
|
||||
extern const CardSPITypeData * const FLASH_512KB_1;
|
||||
extern const CardSPITypeData * const FLASH_512KB_2;
|
||||
extern const CardSPITypeData * const FLASH_1MB;
|
||||
extern const CardSPITypeData * const FLASH_8MB;
|
||||
|
||||
extern const CardSPITypeData * const FLASH_128KB_CTR; // Most common, including Ocarina of time 3D
|
||||
extern const CardSPITypeData * const FLASH_512KB_CTR; // Also common, including Detective Pikachu
|
||||
extern const CardSPITypeData * const FLASH_1MB_CTR; // For example Pokemon Ultra Sun
|
||||
|
||||
int CardSPIWriteRead(CardSPIType type, const void* cmd, u32 cmdSize, void* answer, u32 answerSize, const void* data, u32 dataSize);
|
||||
int CardSPIWaitWriteEnd(CardSPIType type, u32 timeout);
|
||||
int CardSPIWriteRead(bool infrared, const void* cmd, u32 cmdSize, void* answer, u32 answerSize, const void* data, u32 dataSize);
|
||||
int CardSPIWaitWriteEnd(bool infrared, u32 timeout);
|
||||
int CardSPIEnableWriting(CardSPIType type);
|
||||
int CardSPIReadJEDECIDAndStatusReg(CardSPIType type, u32* id, u8* statusReg);
|
||||
int CardSPIGetCardSPIType(CardSPIType* type, bool infrared);
|
||||
int CardSPIReadJEDECIDAndStatusReg(bool infrared, u32* id, u8* statusReg);
|
||||
CardSPIType CardSPIGetCardSPIType(bool infrared);
|
||||
u32 CardSPIGetPageSize(CardSPIType type);
|
||||
u32 CardSPIGetCapacity(CardSPIType type);
|
||||
u32 CardSPIGetEraseSize(CardSPIType type);
|
||||
|
@ -27,7 +27,7 @@ void CTR_CmdReadData(u32 sector, u32 length, u32 blocks, void* buffer)
|
||||
(u32)((sector << 9) & 0xFFFFFFFF),
|
||||
0x00000000, 0x00000000
|
||||
};
|
||||
CTR_SendCommand(read_cmd, length, blocks, 0x704822C, buffer);
|
||||
CTR_SendCommand(read_cmd, length, blocks, 0x104822C, buffer); // Clock divider 5 (13.4 MHz). Same as Process9.
|
||||
}
|
||||
|
||||
void CTR_CmdReadHeader(void* buffer)
|
||||
|
@ -42,9 +42,9 @@ void NTR_CmdReadHeader (u8* buffer)
|
||||
while(REG_NTRCARDROMCNT&NTRCARD_BUSY) ;
|
||||
u32 iCardId=cardReadID(NTRCARD_CLK_SLOW);
|
||||
while(REG_NTRCARDROMCNT&NTRCARD_BUSY) ;
|
||||
|
||||
|
||||
u32 iCheapCard=iCardId&0x80000000;
|
||||
|
||||
|
||||
if(iCheapCard)
|
||||
{
|
||||
//this is magic of wood goblins
|
||||
|
@ -15,5 +15,5 @@ void NTR_CmdEnter16ByteMode(void);
|
||||
void NTR_CmdReadHeader (u8* buffer);
|
||||
void NTR_CmdReadData (u32 offset, void* buffer);
|
||||
|
||||
bool NTR_Secure_Init (u8* buffer, u32 CartID, int iCardDevice);
|
||||
bool NTR_Secure_Init (u8* buffer, u8* sa_copy, u32 CartID, int iCardDevice);
|
||||
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user