PKHeX/PKHeX.Core/Saves/MemeCrypto/MemeCrypto.cs
Kurt d3ec969187 Style updates
split pcd/pgt
add more xmldoc
2018-08-09 21:53:39 -07:00

173 lines
6.5 KiB
C#

using System;
using System.Security.Cryptography;
namespace PKHeX.Core
{
public static class MemeCrypto
{
private const uint POKE = 0x454B4F50;
public static bool VerifyMemePOKE(byte[] input, out byte[] output)
{
if (input.Length < 0x60)
throw new ArgumentException("Invalid POKE buffer!");
var memeLen = input.Length - 8;
var memeIndex = MemeKeyIndex.PokedexAndSaveFile;
for (var i = input.Length - 8; i >= 0; i--)
{
if (BitConverter.ToUInt32(input, i) != POKE) continue;
var keyIndex = BitConverter.ToInt32(input, i + 4);
if (!MemeKey.IsValidPokeKeyIndex(keyIndex)) continue;
memeLen = i;
memeIndex = (MemeKeyIndex)keyIndex;
break;
}
foreach (var len in new[] { memeLen, memeLen - 2 }) // Account for Pokedex QR Edge case
{
if (VerifyMemeData(input, out output, 0, len, memeIndex))
return true;
if (VerifyMemeData(input, out output, 0, len, MemeKeyIndex.PokedexAndSaveFile))
return true;
}
output = null;
return false;
}
public static bool VerifyMemeData(byte[] input, out byte[] output)
{
foreach (MemeKeyIndex keyIndex in Enum.GetValues(typeof(MemeKeyIndex)))
{
if (VerifyMemeData(input, out output, keyIndex))
return true;
}
output = null;
return false;
}
public static bool VerifyMemeData(byte[] input, out byte[] output, MemeKeyIndex keyIndex)
{
output = null;
if (input.Length < 0x60)
return false;
var memekey = new MemeKey(keyIndex);
output = (byte[])input.Clone();
var sigBuffer = new byte[0x60];
Array.Copy(input, input.Length - 0x60, sigBuffer, 0, 0x60);
sigBuffer = memekey.RsaPublic(sigBuffer);
using (var sha1 = SHA1.Create())
{
foreach (var orVal in new byte[] { 0, 0x80 })
{
sigBuffer[0x0] |= orVal;
sigBuffer.CopyTo(output, output.Length - 0x60);
memekey.AesDecrypt(output).CopyTo(output, 0);
// Check for 8-byte equality.
var hash1 = BitConverter.ToUInt64(sha1.ComputeHash(output, 0, output.Length - 0x8), 0);
var hash2 = BitConverter.ToUInt64(output, output.Length - 0x8);
if (hash1 == hash2) // compute == exist
return true;
}
}
output = null;
return false;
}
public static bool VerifyMemeData(byte[] input, out byte[] output, int offset, int length)
{
var data = new byte[length];
Array.Copy(input, offset, data, 0, length);
if (VerifyMemeData(data, out output))
{
var newOutput = (byte[])input.Clone();
output.CopyTo(newOutput, offset);
output = newOutput;
return true;
}
output = null;
return false;
}
public static bool VerifyMemeData(byte[] input, out byte[] output, int offset, int length, MemeKeyIndex keyIndex)
{
var data = new byte[length];
Array.Copy(input, offset, data, 0, length);
if (VerifyMemeData(data, out output, keyIndex))
{
var newOutput = (byte[])input.Clone();
output.CopyTo(newOutput, offset);
output = newOutput;
return true;
}
output = null;
return false;
}
public static byte[] SignMemeData(byte[] input, MemeKeyIndex keyIndex = MemeKeyIndex.PokedexAndSaveFile)
{
// Validate Input
if (input.Length < 0x60)
throw new ArgumentException("Cannot memesign a buffer less than 0x60 bytes in size!");
var memekey = new MemeKey(keyIndex);
if (!memekey.CanResign)
throw new ArgumentException("Cannot sign with the specified memekey!");
var output = (byte[])input.Clone();
// Copy in the SHA1 signature
using (var sha1 = SHA1.Create())
{
Array.Copy(sha1.ComputeHash(input, 0, input.Length - 8), 0, output, output.Length - 8, 8);
}
// Perform AES operations
output = memekey.AesEncrypt(output);
var sigBuffer = new byte[0x60];
Array.Copy(output, output.Length - 0x60, sigBuffer, 0, 0x60);
sigBuffer[0] &= 0x7F;
sigBuffer = memekey.RsaPrivate(sigBuffer);
sigBuffer.CopyTo(output, output.Length - 0x60);
return output;
}
/// <summary>
/// Resigns save data.
/// </summary>
/// <param name="sav7">Save file data to resign</param>
/// <returns>The resigned save data. Invalid input returns null.</returns>
public static byte[] Resign7(byte[] sav7)
{
if (sav7 == null || (sav7.Length != SaveUtil.SIZE_G7SM && sav7.Length != SaveUtil.SIZE_G7USUM))
return null;
// Save Chunks are 0x200 bytes each; Memecrypto signature is 0x100 bytes into the 2nd to last chunk.
var isUSUM = sav7.Length == SaveUtil.SIZE_G7USUM;
var ChecksumTableOffset = sav7.Length - 0x200;
var MemeCryptoOffset = isUSUM ? 0x6C100 : 0x6BB00;
var ChecksumSignatureLength = isUSUM ? 0x150 : 0x140;
const int MemeCryptoSignatureLength = 0x80;
var outSav = (byte[])sav7.Clone();
using (var sha256 = SHA256.Create())
{
// Store current signature
var CurSig = new byte[MemeCryptoSignatureLength];
Buffer.BlockCopy(sav7, MemeCryptoOffset, CurSig, 0, MemeCryptoSignatureLength);
var newSig = sha256.ComputeHash(sav7, ChecksumTableOffset, ChecksumSignatureLength);
Array.Resize(ref newSig, MemeCryptoSignatureLength);
if (VerifyMemeData(CurSig, out var memeSig, MemeKeyIndex.PokedexAndSaveFile))
Buffer.BlockCopy(memeSig, 0x20, newSig, 0x20, 0x60);
SignMemeData(newSig).CopyTo(outSav, MemeCryptoOffset);
}
return outSav;
}
}
}