mirror of
https://github.com/kwsch/PKHeX
synced 2024-11-24 04:53:08 +00:00
02420d3e93
* Handle some nullable cases Refactor MysteryGift into a second abstract class (backed by a byte array, or fake data) Make some classes have explicit constructors instead of { } initialization * Handle bits more obviously without null * Make SaveFile.BAK explicitly readonly again * merge constructor methods to have readonly fields * Inline some properties * More nullable handling * Rearrange box actions define straightforward classes to not have any null properties * Make extrabyte reference array immutable * Move tooltip creation to designer * Rearrange some logic to reduce nesting * Cache generated fonts * Split mystery gift album purpose * Handle more tooltips * Disallow null setters * Don't capture RNG object, only type enum * Unify learnset objects Now have readonly properties which are never null don't new() empty learnsets (>800 Learnset objects no longer created, total of 2400 objects since we also new() a move & level array) optimize g1/2 reader for early abort case * Access rewrite Initialize blocks in a separate object, and get via that object removes a couple hundred "might be null" warnings since blocks are now readonly getters some block references have been relocated, but interfaces should expose all that's needed put HoF6 controls in a groupbox, and disable * Readonly personal data * IVs non nullable for mystery gift * Explicitly initialize forced encounter moves * Make shadow objects readonly & non-null Put murkrow fix in binary data resource, instead of on startup * Assign dex form fetch on constructor Fixes legality parsing edge cases also handle cxd parse for valid; exit before exception is thrown in FrameGenerator * Remove unnecessary null checks * Keep empty value until init SetPouch sets the value to an actual one during load, but whatever * Readonly team lock data * Readonly locks Put locked encounters at bottom (favor unlocked) * Mail readonly data / offset Rearrange some call flow and pass defaults Add fake classes for SaveDataEditor mocking Always party size, no need to check twice in stat editor use a fake save file as initial data for savedata editor, and for gamedata (wow i found a usage) constrain eventwork editor to struct variable types (uint, int, etc), thus preventing null assignment errors
173 lines
6.5 KiB
C#
173 lines
6.5 KiB
C#
using System;
|
|
using System.Security.Cryptography;
|
|
|
|
namespace PKHeX.Core
|
|
{
|
|
public static class MemeCrypto
|
|
{
|
|
private const uint POKE = 0x454B4F50;
|
|
|
|
public static bool VerifyMemePOKE(byte[] input, out byte[] output)
|
|
{
|
|
if (input.Length < 0x60)
|
|
throw new ArgumentException("Invalid POKE buffer!");
|
|
var memeLen = input.Length - 8;
|
|
var memeIndex = MemeKeyIndex.PokedexAndSaveFile;
|
|
for (var i = input.Length - 8; i >= 0; i--)
|
|
{
|
|
if (BitConverter.ToUInt32(input, i) != POKE) continue;
|
|
var keyIndex = BitConverter.ToInt32(input, i + 4);
|
|
if (!MemeKey.IsValidPokeKeyIndex(keyIndex)) continue;
|
|
memeLen = i;
|
|
memeIndex = (MemeKeyIndex)keyIndex;
|
|
break;
|
|
}
|
|
|
|
foreach (var len in new[] { memeLen, memeLen - 2 }) // Account for Pokedex QR Edge case
|
|
{
|
|
if (VerifyMemeData(input, out output, 0, len, memeIndex))
|
|
return true;
|
|
|
|
if (VerifyMemeData(input, out output, 0, len, MemeKeyIndex.PokedexAndSaveFile))
|
|
return true;
|
|
}
|
|
|
|
output = input;
|
|
return false;
|
|
}
|
|
|
|
public static bool VerifyMemeData(byte[] input, out byte[] output)
|
|
{
|
|
foreach (MemeKeyIndex keyIndex in Enum.GetValues(typeof(MemeKeyIndex)))
|
|
{
|
|
if (VerifyMemeData(input, out output, keyIndex))
|
|
return true;
|
|
}
|
|
output = input;
|
|
return false;
|
|
}
|
|
|
|
public static bool VerifyMemeData(byte[] input, out byte[] output, MemeKeyIndex keyIndex)
|
|
{
|
|
if (input.Length < 0x60)
|
|
{
|
|
output = input;
|
|
return false;
|
|
}
|
|
var memekey = new MemeKey(keyIndex);
|
|
output = (byte[])input.Clone();
|
|
|
|
var sigBuffer = new byte[0x60];
|
|
Array.Copy(input, input.Length - 0x60, sigBuffer, 0, 0x60);
|
|
sigBuffer = memekey.RsaPublic(sigBuffer);
|
|
using var sha1 = SHA1.Create();
|
|
foreach (var orVal in new byte[] { 0, 0x80 })
|
|
{
|
|
sigBuffer[0x0] |= orVal;
|
|
sigBuffer.CopyTo(output, output.Length - 0x60);
|
|
memekey.AesDecrypt(output).CopyTo(output, 0);
|
|
// Check for 8-byte equality.
|
|
var computed = BitConverter.ToUInt64(sha1.ComputeHash(output, 0, output.Length - 0x8), 0);
|
|
var existing = BitConverter.ToUInt64(output, output.Length - 0x8);
|
|
if (computed == existing)
|
|
return true;
|
|
}
|
|
|
|
output = input;
|
|
return false;
|
|
}
|
|
|
|
public static bool VerifyMemeData(byte[] input, out byte[] output, int offset, int length)
|
|
{
|
|
var data = new byte[length];
|
|
Array.Copy(input, offset, data, 0, length);
|
|
if (VerifyMemeData(data, out output))
|
|
{
|
|
var newOutput = (byte[])input.Clone();
|
|
output.CopyTo(newOutput, offset);
|
|
output = newOutput;
|
|
return true;
|
|
}
|
|
output = input;
|
|
return false;
|
|
}
|
|
|
|
public static bool VerifyMemeData(byte[] input, out byte[] output, int offset, int length, MemeKeyIndex keyIndex)
|
|
{
|
|
var data = new byte[length];
|
|
Array.Copy(input, offset, data, 0, length);
|
|
if (VerifyMemeData(data, out output, keyIndex))
|
|
{
|
|
var newOutput = (byte[])input.Clone();
|
|
output.CopyTo(newOutput, offset);
|
|
output = newOutput;
|
|
return true;
|
|
}
|
|
output = input;
|
|
return false;
|
|
}
|
|
|
|
public static byte[] SignMemeData(byte[] input, MemeKeyIndex keyIndex = MemeKeyIndex.PokedexAndSaveFile)
|
|
{
|
|
// Validate Input
|
|
if (input.Length < 0x60)
|
|
throw new ArgumentException("Cannot memesign a buffer less than 0x60 bytes in size!");
|
|
var memekey = new MemeKey(keyIndex);
|
|
if (!memekey.CanResign)
|
|
throw new ArgumentException("Cannot sign with the specified memekey!");
|
|
|
|
var output = (byte[])input.Clone();
|
|
|
|
// Copy in the SHA1 signature
|
|
using (var sha1 = SHA1.Create())
|
|
{
|
|
Array.Copy(sha1.ComputeHash(input, 0, input.Length - 8), 0, output, output.Length - 8, 8);
|
|
}
|
|
|
|
// Perform AES operations
|
|
output = memekey.AesEncrypt(output);
|
|
var sigBuffer = new byte[0x60];
|
|
Array.Copy(output, output.Length - 0x60, sigBuffer, 0, 0x60);
|
|
sigBuffer[0] &= 0x7F;
|
|
sigBuffer = memekey.RsaPrivate(sigBuffer);
|
|
sigBuffer.CopyTo(output, output.Length - 0x60);
|
|
return output;
|
|
}
|
|
|
|
/// <summary>
|
|
/// Resigns save data.
|
|
/// </summary>
|
|
/// <param name="sav7">Save file data to resign</param>
|
|
/// <returns>The resigned save data. Invalid input returns null.</returns>
|
|
public static byte[] Resign7(byte[] sav7)
|
|
{
|
|
if (sav7.Length != SaveUtil.SIZE_G7SM && sav7.Length != SaveUtil.SIZE_G7USUM)
|
|
throw new ArgumentException("Should not be using this for unsupported saves.");
|
|
|
|
// Save Chunks are 0x200 bytes each; Memecrypto signature is 0x100 bytes into the 2nd to last chunk.
|
|
var isUSUM = sav7.Length == SaveUtil.SIZE_G7USUM;
|
|
var ChecksumTableOffset = sav7.Length - 0x200;
|
|
var MemeCryptoOffset = isUSUM ? 0x6C100 : 0x6BB00;
|
|
var ChecksumSignatureLength = isUSUM ? 0x150 : 0x140;
|
|
const int MemeCryptoSignatureLength = 0x80;
|
|
|
|
var outSav = (byte[])sav7.Clone();
|
|
|
|
using (var sha256 = SHA256.Create())
|
|
{
|
|
// Store current signature
|
|
var CurSig = new byte[MemeCryptoSignatureLength];
|
|
Buffer.BlockCopy(sav7, MemeCryptoOffset, CurSig, 0, MemeCryptoSignatureLength);
|
|
|
|
var newSig = sha256.ComputeHash(sav7, ChecksumTableOffset, ChecksumSignatureLength);
|
|
Array.Resize(ref newSig, MemeCryptoSignatureLength);
|
|
|
|
if (VerifyMemeData(CurSig, out var memeSig, MemeKeyIndex.PokedexAndSaveFile))
|
|
Buffer.BlockCopy(memeSig, 0x20, newSig, 0x20, 0x60);
|
|
|
|
SignMemeData(newSig).CopyTo(outSav, MemeCryptoOffset);
|
|
}
|
|
return outSav;
|
|
}
|
|
}
|
|
}
|