WiiFlow_Lite/source/channel/channel_launcher.cpp

116 lines
2.9 KiB
C++
Raw Normal View History

2012-01-21 21:57:41 +01:00
#include <stdlib.h>
#include <string.h>
#include <stdio.h>
#include <malloc.h>
2012-01-21 21:57:41 +01:00
#include "channel_launcher.h"
#include "booter/external_booter.hpp"
#include "gecko/gecko.hpp"
#include "loader/disc.h"
#include "loader/fs.h"
#include "loader/fst.h"
#include "loader/utils.h"
#include "loader/sys.h"
#include "memory/mem2.hpp"
#include "memory/memory.h"
#include "unzip/lz77.h"
#include "types.h"
2012-01-21 21:57:41 +01:00
bool Identify_GenerateTik(signed_blob **outbuf, u32 *outlen)
{
signed_blob *buffer = (signed_blob*)MEM2_memalign(32, STD_SIGNED_TIK_SIZE);
if(!buffer)
return false;
2012-01-21 21:57:41 +01:00
memset(buffer, 0, STD_SIGNED_TIK_SIZE);
sig_rsa2048 *signature = (sig_rsa2048*)buffer;
2012-01-21 21:57:41 +01:00
signature->type = ES_SIG_RSA2048;
tik *tik_data = (tik *)SIGNATURE_PAYLOAD(buffer);
strcpy(tik_data->issuer, "Root-CA00000001-XS00000003");
memset(tik_data->cidx_mask, 0xFF, 32);
*outbuf = buffer;
*outlen = STD_SIGNED_TIK_SIZE;
return true;
}
bool Identify(u64 titleid)
2012-01-21 21:57:41 +01:00
{
char filepath[ISFS_MAXPATH] ATTRIBUTE_ALIGN(32);
memset(filepath, 0, ISFS_MAXPATH);
2018-11-15 16:45:04 +01:00
gprintf("Reading TMD for %08x %08x...", TITLE_UPPER(titleid), TITLE_LOWER(titleid));
sprintf(filepath, "/title/%08x/%08x/content/title.tmd", TITLE_UPPER(titleid), TITLE_LOWER(titleid));
2012-01-21 21:57:41 +01:00
u32 tmdSize;
u8 *tmdBuffer = ISFS_GetFile(filepath, &tmdSize, -1);
2012-01-21 21:57:41 +01:00
if (tmdBuffer == NULL || tmdSize == 0)
{
gprintf("Failed!\n");
2012-01-21 21:57:41 +01:00
return false;
}
gprintf("Success!\n");
2012-01-21 21:57:41 +01:00
u32 tikSize;
signed_blob *tikBuffer = NULL;
gprintf("Generating fake ticket...");
if(!Identify_GenerateTik(&tikBuffer, &tikSize))
2012-01-21 21:57:41 +01:00
{
gprintf("Failed!\n");
2012-01-21 21:57:41 +01:00
return false;
}
gprintf("Success!\n");
2012-01-21 21:57:41 +01:00
gprintf("Reading certs...");
memset(filepath, 0, ISFS_MAXPATH);
strcpy(filepath, "/sys/cert.sys");
u32 certSize = 0;
u8 *certBuffer = ISFS_GetFile(filepath, &certSize, -1);
2012-01-21 21:57:41 +01:00
if (certBuffer == NULL || certSize == 0)
{
gprintf("Failed!\n");
free(tmdBuffer);
free(tikBuffer);
2012-01-21 21:57:41 +01:00
return false;
}
gprintf("Success!\n");
gprintf("ES_Identify\n");
u32 keyId = 0;
DCFlushRange(tmdBuffer, tmdSize);
DCFlushRange(tikBuffer, tikSize);
DCFlushRange(certBuffer, certSize);
s32 ret = ES_Identify((signed_blob*)certBuffer, certSize, (signed_blob*)tmdBuffer, tmdSize, tikBuffer, tikSize, &keyId);
if(ret < 0)
2012-01-21 21:57:41 +01:00
{
switch(ret)
{
case ES_EINVAL:
gprintf("Error! ES_Identify (ret = %d;) Data invalid!\n", ret);
break;
case ES_EALIGN:
gprintf("Error! ES_Identify (ret = %d;) Data not aligned!\n", ret);
break;
case ES_ENOTINIT:
gprintf("Error! ES_Identify (ret = %d;) ES not initialized!\n", ret);
break;
case ES_ENOMEM:
gprintf("Error! ES_Identify (ret = %d;) No memory!\n", ret);
break;
default:
gprintf("Error! ES_Identify (ret = %d)\n", ret);
break;
}
}
gprintf("AHBPROT: %d, Key ID: %u\n", AHBPROT_Patched(), keyId);
free(tmdBuffer);
free(tikBuffer);
free(certBuffer);
2012-01-21 21:57:41 +01:00
return ret < 0 ? false : true;
}