2016-06-28 09:20:37 +02:00
|
|
|
#include "meta.h"
|
2017-09-17 03:41:36 +02:00
|
|
|
#include "hca_keys.h"
|
|
|
|
#include "../coding/coding.h"
|
2021-08-14 11:39:54 +02:00
|
|
|
#include "../coding/hca_decoder_clhca.h"
|
2016-06-28 09:20:37 +02:00
|
|
|
|
2021-10-08 22:24:51 +02:00
|
|
|
#ifdef VGM_DEBUG_OUTPUT
|
2021-10-06 05:43:17 +02:00
|
|
|
//#define HCA_BRUTEFORCE
|
2020-02-22 20:40:21 +01:00
|
|
|
#ifdef HCA_BRUTEFORCE
|
2021-08-07 12:37:41 +02:00
|
|
|
static void bruteforce_hca_key(STREAMFILE* sf, hca_codec_data* hca_data, unsigned long long* p_keycode, uint16_t subkey);
|
2020-02-22 20:40:21 +01:00
|
|
|
#endif
|
2021-10-19 00:35:06 +02:00
|
|
|
#endif
|
|
|
|
|
2021-10-15 22:41:51 +02:00
|
|
|
static int find_hca_key(hca_codec_data* hca_data, uint64_t* p_keycode, uint16_t subkey);
|
2016-06-28 09:20:37 +02:00
|
|
|
|
2020-02-22 20:40:21 +01:00
|
|
|
|
|
|
|
/* CRI HCA - streamed audio from CRI ADX2/Atom middleware */
|
2021-03-14 16:28:35 +01:00
|
|
|
VGMSTREAM* init_vgmstream_hca(STREAMFILE* sf) {
|
2020-07-16 21:43:01 +02:00
|
|
|
return init_vgmstream_hca_subkey(sf, 0x0000);
|
2019-07-07 21:04:56 +02:00
|
|
|
}
|
|
|
|
|
2021-03-14 16:28:35 +01:00
|
|
|
VGMSTREAM* init_vgmstream_hca_subkey(STREAMFILE* sf, uint16_t subkey) {
|
2021-07-29 17:35:02 +02:00
|
|
|
VGMSTREAM* vgmstream = NULL;
|
2020-07-16 21:43:01 +02:00
|
|
|
hca_codec_data* hca_data = NULL;
|
|
|
|
clHCA_stInfo* hca_info;
|
2016-06-28 09:20:37 +02:00
|
|
|
|
2019-07-07 21:04:56 +02:00
|
|
|
|
2018-08-29 20:05:31 +02:00
|
|
|
/* checks */
|
2021-10-03 13:49:23 +02:00
|
|
|
if ((read_u32be(0x00,sf) & 0x7F7F7F7F) != get_id32be("HCA\0")) /* masked in encrypted files */
|
|
|
|
goto fail;
|
|
|
|
|
2020-07-16 21:43:01 +02:00
|
|
|
if (!check_extensions(sf, "hca"))
|
2018-08-29 20:05:31 +02:00
|
|
|
return NULL;
|
2020-07-16 21:43:01 +02:00
|
|
|
|
2018-09-01 20:28:00 +02:00
|
|
|
/* init vgmstream and library's context, will validate the HCA */
|
2020-07-16 21:43:01 +02:00
|
|
|
hca_data = init_hca(sf);
|
2021-08-26 19:39:58 +02:00
|
|
|
if (!hca_data) {
|
|
|
|
vgm_logi("HCA: unknown format (report)\n");
|
|
|
|
goto fail;
|
|
|
|
}
|
2016-07-01 00:34:40 +02:00
|
|
|
|
2020-07-16 21:43:01 +02:00
|
|
|
hca_info = hca_get_info(hca_data);
|
|
|
|
|
2017-09-17 03:41:36 +02:00
|
|
|
/* find decryption key in external file or preloaded list */
|
2020-07-16 21:43:01 +02:00
|
|
|
if (hca_info->encryptionEnabled) {
|
2020-04-12 20:36:46 +02:00
|
|
|
uint64_t keycode = 0;
|
2018-10-13 19:53:25 +02:00
|
|
|
uint8_t keybuf[0x08+0x02];
|
|
|
|
size_t keysize;
|
|
|
|
|
2020-07-16 21:43:01 +02:00
|
|
|
keysize = read_key_file(keybuf, 0x08+0x04, sf);
|
2018-10-13 19:53:25 +02:00
|
|
|
if (keysize == 0x08) { /* standard */
|
2020-07-16 21:43:01 +02:00
|
|
|
keycode = get_u64be(keybuf+0x00);
|
2019-08-02 21:13:00 +02:00
|
|
|
if (subkey) {
|
|
|
|
keycode = keycode * ( ((uint64_t)subkey << 16u) | ((uint16_t)~subkey + 2u) );
|
|
|
|
}
|
2018-10-13 19:53:25 +02:00
|
|
|
}
|
|
|
|
else if (keysize == 0x08+0x02) { /* seed key + AWB subkey */
|
2020-07-16 21:43:01 +02:00
|
|
|
uint64_t file_key = get_u64be(keybuf+0x00);
|
|
|
|
uint16_t file_sub = get_u16be(keybuf+0x08);
|
2019-08-02 21:13:00 +02:00
|
|
|
keycode = file_key * ( ((uint64_t)file_sub << 16u) | ((uint16_t)~file_sub + 2u) );
|
2018-10-13 19:53:25 +02:00
|
|
|
}
|
2020-02-22 20:40:21 +01:00
|
|
|
#ifdef HCA_BRUTEFORCE
|
|
|
|
else if (1) {
|
2021-10-15 22:41:51 +02:00
|
|
|
int ok = find_hca_key(hca_data, &keycode, subkey);
|
|
|
|
if (!ok)
|
|
|
|
bruteforce_hca_key(sf, hca_data, &keycode, subkey);
|
2020-02-22 20:40:21 +01:00
|
|
|
}
|
|
|
|
#endif
|
2018-10-13 19:53:25 +02:00
|
|
|
else {
|
2019-07-07 21:04:56 +02:00
|
|
|
find_hca_key(hca_data, &keycode, subkey);
|
2016-12-04 14:12:23 +01:00
|
|
|
}
|
|
|
|
|
2020-07-16 21:43:01 +02:00
|
|
|
hca_set_encryption_key(hca_data, keycode);
|
2018-09-01 20:28:00 +02:00
|
|
|
}
|
2017-09-17 03:41:36 +02:00
|
|
|
|
|
|
|
|
|
|
|
/* build the VGMSTREAM */
|
2020-07-16 21:43:01 +02:00
|
|
|
vgmstream = allocate_vgmstream(hca_info->channelCount, hca_info->loopEnabled);
|
2017-09-17 03:41:36 +02:00
|
|
|
if (!vgmstream) goto fail;
|
2016-07-01 00:34:40 +02:00
|
|
|
|
2018-08-29 20:05:31 +02:00
|
|
|
vgmstream->meta_type = meta_HCA;
|
2020-07-16 21:43:01 +02:00
|
|
|
vgmstream->sample_rate = hca_info->samplingRate;
|
|
|
|
|
|
|
|
vgmstream->num_samples = hca_info->blockCount * hca_info->samplesPerBlock -
|
|
|
|
hca_info->encoderDelay - hca_info->encoderPadding;
|
|
|
|
vgmstream->loop_start_sample = hca_info->loopStartBlock * hca_info->samplesPerBlock -
|
|
|
|
hca_info->encoderDelay + hca_info->loopStartDelay;
|
|
|
|
vgmstream->loop_end_sample = hca_info->loopEndBlock * hca_info->samplesPerBlock -
|
|
|
|
hca_info->encoderDelay + (hca_info->samplesPerBlock - hca_info->loopEndPadding);
|
2018-08-29 23:42:47 +02:00
|
|
|
/* After loop end CRI's encoder removes the rest of the original samples and puts some
|
|
|
|
* garbage in the last frame that should be ignored. Optionally it can encode fully preserving
|
|
|
|
* the file too, but it isn't detectable, so we'll allow the whole thing just in case */
|
|
|
|
//if (vgmstream->loop_end_sample && vgmstream->num_samples > vgmstream->loop_end_sample)
|
|
|
|
// vgmstream->num_samples = vgmstream->loop_end_sample;
|
2016-07-01 00:34:40 +02:00
|
|
|
|
2019-07-14 21:24:28 +02:00
|
|
|
/* this can happen in preloading HCA from memory AWB */
|
2020-07-16 21:43:01 +02:00
|
|
|
if (hca_info->blockCount * hca_info->blockSize > get_streamfile_size(sf)) {
|
|
|
|
unsigned int max_block = get_streamfile_size(sf) / hca_info->blockSize;
|
|
|
|
vgmstream->num_samples = max_block * hca_info->samplesPerBlock -
|
|
|
|
hca_info->encoderDelay - hca_info->encoderPadding;
|
2019-07-14 21:24:28 +02:00
|
|
|
}
|
|
|
|
|
2017-09-17 03:41:36 +02:00
|
|
|
vgmstream->coding_type = coding_CRI_HCA;
|
|
|
|
vgmstream->layout_type = layout_none;
|
|
|
|
vgmstream->codec_data = hca_data;
|
2016-07-01 00:34:40 +02:00
|
|
|
|
2019-08-15 15:15:00 +02:00
|
|
|
/* assumed mappings */
|
|
|
|
{
|
|
|
|
static const uint32_t hca_mappings[] = {
|
|
|
|
0,
|
|
|
|
mapping_MONO,
|
|
|
|
mapping_STEREO,
|
|
|
|
mapping_2POINT1,
|
|
|
|
mapping_QUAD,
|
|
|
|
mapping_5POINT0,
|
|
|
|
mapping_5POINT1,
|
|
|
|
mapping_7POINT0,
|
|
|
|
mapping_7POINT1,
|
|
|
|
};
|
|
|
|
|
|
|
|
vgmstream->channel_layout = hca_mappings[vgmstream->channels];
|
|
|
|
}
|
|
|
|
|
2017-09-17 03:41:36 +02:00
|
|
|
return vgmstream;
|
2016-06-28 09:20:37 +02:00
|
|
|
|
2017-09-17 03:41:36 +02:00
|
|
|
fail:
|
2018-08-29 20:05:31 +02:00
|
|
|
free_hca(hca_data);
|
2017-09-17 03:41:36 +02:00
|
|
|
return NULL;
|
|
|
|
}
|
2016-06-28 09:20:37 +02:00
|
|
|
|
|
|
|
|
2021-10-19 00:35:06 +02:00
|
|
|
/* try to find the decryption key from a list */
|
2021-10-15 22:41:51 +02:00
|
|
|
static int find_hca_key(hca_codec_data* hca_data, uint64_t* p_keycode, uint16_t subkey) {
|
2021-10-19 00:35:06 +02:00
|
|
|
const size_t keys_length = sizeof(hcakey_list) / sizeof(hcakey_list[0]);
|
2021-07-29 18:38:07 +02:00
|
|
|
int i;
|
2021-10-19 00:35:06 +02:00
|
|
|
hca_keytest_t hk = {0};
|
2016-06-28 09:20:37 +02:00
|
|
|
|
2021-10-19 00:35:06 +02:00
|
|
|
hk.best_key = 0xCC55463930DBE1AB; /* defaults to PSO2 key, most common */
|
|
|
|
hk.subkey = subkey;
|
2016-06-28 09:20:37 +02:00
|
|
|
|
2017-09-17 03:41:36 +02:00
|
|
|
for (i = 0; i < keys_length; i++) {
|
2021-10-19 00:35:06 +02:00
|
|
|
hk.key = hcakey_list[i].key;
|
2018-10-13 19:53:25 +02:00
|
|
|
|
2021-10-19 00:35:06 +02:00
|
|
|
test_hca_key(hca_data, &hk);
|
|
|
|
if (hk.best_score == 1)
|
2019-07-07 21:04:56 +02:00
|
|
|
goto done;
|
|
|
|
|
2021-07-29 17:35:02 +02:00
|
|
|
#if 0
|
|
|
|
{
|
2021-07-29 18:38:07 +02:00
|
|
|
int j;
|
2021-07-29 17:35:02 +02:00
|
|
|
size_t subkeys_size = hcakey_list[i].subkeys_size;
|
2021-10-19 00:35:06 +02:00
|
|
|
const uint16_t* subkeys = hcakey_list[i].subkeys;
|
2021-07-29 17:35:02 +02:00
|
|
|
if (subkeys_size > 0 && subkey == 0) {
|
|
|
|
for (j = 0; j < subkeys_size; j++) {
|
2021-10-19 00:35:06 +02:00
|
|
|
hk.subkey = subkeys[j];
|
|
|
|
test_hca_key(hca_data, &hk);
|
|
|
|
if (hk.best_score == 1)
|
2021-07-29 17:35:02 +02:00
|
|
|
goto done;
|
|
|
|
}
|
2018-10-13 19:53:25 +02:00
|
|
|
}
|
2017-09-17 03:41:36 +02:00
|
|
|
}
|
2021-07-29 17:35:02 +02:00
|
|
|
#endif
|
2017-09-17 03:41:36 +02:00
|
|
|
}
|
|
|
|
|
2018-10-13 19:53:25 +02:00
|
|
|
done:
|
2021-10-19 00:35:06 +02:00
|
|
|
*p_keycode = hk.best_key;
|
|
|
|
VGM_ASSERT(hk.best_score > 1, "HCA: best key=%08x%08x (score=%i)\n",
|
|
|
|
(uint32_t)((*p_keycode >> 32) & 0xFFFFFFFF), (uint32_t)(*p_keycode & 0xFFFFFFFF), hk.best_score);
|
|
|
|
vgm_asserti(hk.best_score <= 0, "HCA: decryption key not found\n");
|
|
|
|
return hk.best_score > 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/******************* */
|
|
|
|
|
|
|
|
static void bruteforce_process_result(hca_keytest_t* hk, unsigned long long* p_keycode) {
|
|
|
|
*p_keycode = hk->best_key;
|
|
|
|
if (hk->best_score < 0 || hk->best_score > 10000) {
|
|
|
|
VGM_LOG("HCA BF: no good key found\n");
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
VGM_LOG("HCA BF: best key=%08x%08x (score=%i)\n",
|
|
|
|
(uint32_t)((*p_keycode >> 32) & 0xFFFFFFFF), (uint32_t)(*p_keycode & 0xFFFFFFFF), hk->best_score);
|
|
|
|
}
|
2020-02-22 20:40:21 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef HCA_BRUTEFORCE
|
2021-09-19 23:54:38 +02:00
|
|
|
typedef enum {
|
|
|
|
HBF_TYPE_64LE_1,
|
|
|
|
HBF_TYPE_64BE_1,
|
|
|
|
HBF_TYPE_32LE_1,
|
|
|
|
HBF_TYPE_32BE_1,
|
|
|
|
HBF_TYPE_64LE_4,
|
|
|
|
HBF_TYPE_64BE_4,
|
|
|
|
HBF_TYPE_32LE_4,
|
|
|
|
HBF_TYPE_32BE_4,
|
|
|
|
} HBF_type_t;
|
|
|
|
|
2020-02-22 20:40:21 +01:00
|
|
|
/* Bruteforce binary keys in executables and similar files, mainly for some mobile games.
|
2021-10-19 00:35:06 +02:00
|
|
|
* Kinda slow but acceptable for ~100MB exes, not very optimized. Unity usually has keys
|
|
|
|
* in plaintext (inside levelX or other base files) instead though, use test below. */
|
2021-09-19 23:54:38 +02:00
|
|
|
static void bruteforce_hca_key_bin_type(STREAMFILE* sf, hca_codec_data* hca_data, unsigned long long* p_keycode, uint16_t subkey, HBF_type_t type) {
|
2020-02-22 20:40:21 +01:00
|
|
|
STREAMFILE* sf_keys = NULL;
|
|
|
|
uint8_t* buf = NULL;
|
2021-10-19 00:35:06 +02:00
|
|
|
uint32_t keys_size, bytes;
|
2021-10-15 22:41:51 +02:00
|
|
|
int pos, step;
|
2021-10-19 00:35:06 +02:00
|
|
|
uint64_t key = 0, old_key = 0;
|
|
|
|
hca_keytest_t hk = {0};
|
|
|
|
|
|
|
|
hk.subkey = subkey;
|
2020-02-22 20:40:21 +01:00
|
|
|
|
|
|
|
|
|
|
|
/* load whole file in memory for performance (exes with keys shouldn't be too big) */
|
|
|
|
sf_keys = open_streamfile_by_filename(sf, "keys.bin");
|
2021-10-03 13:49:23 +02:00
|
|
|
if (!sf_keys) return;
|
|
|
|
|
2021-10-15 22:41:51 +02:00
|
|
|
VGM_LOG("HCA BF: test keys.bin (type %i)\n", type);
|
2021-10-03 13:49:23 +02:00
|
|
|
*p_keycode = 0;
|
2020-02-22 20:40:21 +01:00
|
|
|
|
|
|
|
keys_size = get_streamfile_size(sf_keys);
|
2019-05-17 22:30:49 +02:00
|
|
|
|
2020-02-22 20:40:21 +01:00
|
|
|
buf = malloc(keys_size);
|
2021-10-19 00:35:06 +02:00
|
|
|
if (!buf) {
|
|
|
|
VGM_LOG("HCA BF: key file too big!\n");
|
|
|
|
goto done;
|
|
|
|
}
|
2020-02-22 20:40:21 +01:00
|
|
|
|
|
|
|
bytes = read_streamfile(buf, 0, keys_size, sf_keys);
|
|
|
|
if (bytes != keys_size) goto done;
|
|
|
|
|
2021-10-15 22:41:51 +02:00
|
|
|
VGM_LOG("HCA BF: start .bin\n");
|
|
|
|
|
|
|
|
switch(type) {
|
|
|
|
case HBF_TYPE_64LE_1:
|
|
|
|
case HBF_TYPE_64BE_1:
|
|
|
|
case HBF_TYPE_32LE_1:
|
|
|
|
case HBF_TYPE_32BE_1: step = 0x01; break;
|
|
|
|
case HBF_TYPE_64LE_4:
|
|
|
|
case HBF_TYPE_64BE_4:
|
|
|
|
case HBF_TYPE_32LE_4:
|
|
|
|
case HBF_TYPE_32BE_4: step = 0x04; break;
|
|
|
|
default: goto done;
|
|
|
|
}
|
2020-11-15 22:44:04 +01:00
|
|
|
|
2020-02-22 20:40:21 +01:00
|
|
|
pos = 0;
|
2021-10-15 22:41:51 +02:00
|
|
|
while (pos < keys_size - 8) {
|
2020-11-15 22:44:04 +01:00
|
|
|
VGM_ASSERT(pos % 0x1000000 == 0, "HCA: pos %x...\n", pos);
|
2020-02-22 20:40:21 +01:00
|
|
|
|
2021-09-19 23:54:38 +02:00
|
|
|
/* keys are usually u64le but other orders may exist */
|
|
|
|
switch(type) {
|
2021-10-15 22:41:51 +02:00
|
|
|
case HBF_TYPE_64LE_1: key = get_u64le(buf + pos); break;
|
|
|
|
case HBF_TYPE_64BE_1: key = get_u64be(buf + pos); break;
|
|
|
|
case HBF_TYPE_32LE_1: key = get_u32le(buf + pos); break;
|
|
|
|
case HBF_TYPE_32BE_1: key = get_u32be(buf + pos); break;
|
|
|
|
case HBF_TYPE_64LE_4: key = get_u64le(buf + pos); break;
|
|
|
|
case HBF_TYPE_64BE_4: key = get_u64be(buf + pos); break;
|
|
|
|
case HBF_TYPE_32LE_4: key = get_u32le(buf + pos); break;
|
|
|
|
case HBF_TYPE_32BE_4: key = get_u32be(buf + pos); break;
|
|
|
|
default: goto done;
|
2021-09-19 23:54:38 +02:00
|
|
|
}
|
2021-10-15 22:41:51 +02:00
|
|
|
pos += step;
|
2020-11-15 22:44:04 +01:00
|
|
|
|
|
|
|
if (key == 0 || key == old_key)
|
2020-02-22 20:40:21 +01:00
|
|
|
continue;
|
2020-11-15 22:44:04 +01:00
|
|
|
old_key = key;
|
2020-02-22 20:40:21 +01:00
|
|
|
|
2021-10-19 00:35:06 +02:00
|
|
|
hk.key = key;
|
|
|
|
test_hca_key(hca_data, &hk);
|
|
|
|
if (hk.best_score == 1)
|
2020-02-22 20:40:21 +01:00
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
done:
|
2021-10-19 00:35:06 +02:00
|
|
|
bruteforce_process_result(&hk, p_keycode);
|
2021-08-07 12:37:41 +02:00
|
|
|
close_streamfile(sf_keys);
|
|
|
|
free(buf);
|
|
|
|
}
|
|
|
|
|
2021-09-19 23:54:38 +02:00
|
|
|
static void bruteforce_hca_key_bin(STREAMFILE* sf, hca_codec_data* hca_data, unsigned long long* p_keycode, uint16_t subkey) {
|
|
|
|
bruteforce_hca_key_bin_type(sf, hca_data, p_keycode, subkey, HBF_TYPE_64LE_1);
|
2021-10-03 13:49:23 +02:00
|
|
|
/*
|
2021-09-19 23:54:38 +02:00
|
|
|
bruteforce_hca_key_bin_type(sf, hca_data, p_keycode, subkey, HBF_TYPE_32LE_1);
|
2021-10-03 13:49:23 +02:00
|
|
|
bruteforce_hca_key_bin_type(sf, hca_data, p_keycode, subkey, HBF_TYPE_64BE_1);
|
2021-09-19 23:54:38 +02:00
|
|
|
bruteforce_hca_key_bin_type(sf, hca_data, p_keycode, subkey, HBF_TYPE_32BE_1);
|
2021-10-03 13:49:23 +02:00
|
|
|
|
|
|
|
bruteforce_hca_key_bin_type(sf, hca_data, p_keycode, subkey, HBF_TYPE_64LE_4);
|
|
|
|
bruteforce_hca_key_bin_type(sf, hca_data, p_keycode, subkey, HBF_TYPE_32LE_4);
|
|
|
|
bruteforce_hca_key_bin_type(sf, hca_data, p_keycode, subkey, HBF_TYPE_64BE_4);
|
|
|
|
bruteforce_hca_key_bin_type(sf, hca_data, p_keycode, subkey, HBF_TYPE_32BE_4);
|
|
|
|
*/
|
2021-09-19 23:54:38 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2021-08-07 12:37:41 +02:00
|
|
|
#include <inttypes.h>
|
|
|
|
//#include <stdio.h>
|
|
|
|
|
|
|
|
/* same as the above but for txt lines. */
|
|
|
|
static void bruteforce_hca_key_txt(STREAMFILE* sf, hca_codec_data* hca_data, unsigned long long* p_keycode, uint16_t subkey) {
|
|
|
|
STREAMFILE* sf_keys = NULL;
|
|
|
|
uint8_t* buf = NULL;
|
2021-10-19 00:35:06 +02:00
|
|
|
uint32_t keys_size, bytes;
|
2021-08-07 12:37:41 +02:00
|
|
|
char line[1024];
|
2021-10-19 00:35:06 +02:00
|
|
|
int i = 0, pos;
|
|
|
|
uint64_t key = 0;
|
|
|
|
hca_keytest_t hk = {0};
|
2021-08-07 12:37:41 +02:00
|
|
|
|
2021-10-19 00:35:06 +02:00
|
|
|
hk.subkey = subkey;
|
2021-08-07 12:37:41 +02:00
|
|
|
|
|
|
|
|
|
|
|
/* load whole file in memory for performance (exes with keys shouldn't be too big) */
|
|
|
|
sf_keys = open_streamfile_by_filename(sf, "keys.txt");
|
2021-10-03 13:49:23 +02:00
|
|
|
if (!sf_keys) return;
|
|
|
|
|
2021-10-15 22:41:51 +02:00
|
|
|
VGM_LOG("HCA BF: test keys.txt\n");
|
2021-10-03 13:49:23 +02:00
|
|
|
*p_keycode = 0;
|
2021-08-07 12:37:41 +02:00
|
|
|
|
|
|
|
keys_size = get_streamfile_size(sf_keys);
|
|
|
|
|
|
|
|
buf = malloc(keys_size);
|
2021-10-19 00:35:06 +02:00
|
|
|
if (!buf) {
|
|
|
|
VGM_LOG("HCA BF: key file too big!\n");
|
|
|
|
goto done;
|
|
|
|
}
|
2021-08-07 12:37:41 +02:00
|
|
|
|
|
|
|
bytes = read_streamfile(buf, 0, keys_size, sf_keys);
|
|
|
|
if (bytes != keys_size) goto done;
|
|
|
|
|
2021-10-15 22:41:51 +02:00
|
|
|
VGM_LOG("HCA BF: start .txt\n");
|
2021-08-07 12:37:41 +02:00
|
|
|
|
|
|
|
pos = 0;
|
|
|
|
while (pos < keys_size) {
|
|
|
|
int bytes_read, line_ok, count;
|
2021-10-19 00:35:06 +02:00
|
|
|
key = 0;
|
2021-08-07 12:37:41 +02:00
|
|
|
|
|
|
|
bytes_read = read_line(line, sizeof(line), pos, sf_keys, &line_ok);
|
|
|
|
pos += bytes_read;
|
2021-09-19 23:54:38 +02:00
|
|
|
if (!line_ok) continue; /* line too long */
|
2021-08-07 12:37:41 +02:00
|
|
|
|
|
|
|
count = sscanf(line, "%" SCNd64, &key);
|
|
|
|
if (count != 1) continue;
|
|
|
|
|
2021-09-19 23:54:38 +02:00
|
|
|
VGM_ASSERT(pos % 10000 == 0, "HCA: count %i...\n", i);
|
2021-08-07 12:37:41 +02:00
|
|
|
|
|
|
|
if (key == 0)
|
|
|
|
continue;
|
|
|
|
i++;
|
|
|
|
|
2021-10-19 00:35:06 +02:00
|
|
|
hk.key = key;
|
|
|
|
test_hca_key(hca_data, &hk);
|
|
|
|
if (hk.best_score == 1)
|
2021-08-07 12:37:41 +02:00
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
done:
|
2021-10-19 00:35:06 +02:00
|
|
|
bruteforce_process_result(&hk, p_keycode);
|
2020-02-22 20:40:21 +01:00
|
|
|
close_streamfile(sf_keys);
|
|
|
|
free(buf);
|
2016-06-28 09:20:37 +02:00
|
|
|
}
|
2021-08-07 12:37:41 +02:00
|
|
|
|
2021-10-19 00:35:06 +02:00
|
|
|
/* same as the above but good ol' bruteforce numbers (useful for games with keys that are dates) */
|
|
|
|
static void bruteforce_hca_key_num(STREAMFILE* sf, hca_codec_data* hca_data, unsigned long long* p_keycode, uint16_t subkey) {
|
|
|
|
STREAMFILE* sf_keys = NULL;
|
|
|
|
uint32_t keys_size;
|
|
|
|
uint64_t min, max;
|
|
|
|
uint64_t key = 0;
|
|
|
|
hca_keytest_t hk = {0};
|
|
|
|
|
|
|
|
hk.subkey = subkey;
|
|
|
|
|
|
|
|
|
|
|
|
/* load whole file in memory for performance (exes with keys shouldn't be too big) */
|
|
|
|
sf_keys = open_streamfile_by_filename(sf, "keys.num");
|
|
|
|
if (!sf_keys) return;
|
|
|
|
|
|
|
|
VGM_LOG("HCA BF: test keys.num\n");
|
|
|
|
*p_keycode = 0;
|
|
|
|
|
|
|
|
keys_size = get_streamfile_size(sf_keys);
|
|
|
|
|
|
|
|
/* don't set too high as it does ~70000 keys per second, do the math */
|
|
|
|
if (keys_size < 0x10) {
|
|
|
|
min = 0;
|
|
|
|
max = 0xFFFFFFFF;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
min = read_u64be(0x00, sf_keys);
|
|
|
|
max = read_u64be(0x08, sf_keys);
|
|
|
|
}
|
|
|
|
|
|
|
|
VGM_LOG("HCA BF: start .num\n");
|
|
|
|
|
|
|
|
while (min < max) {
|
|
|
|
key = min;
|
|
|
|
|
|
|
|
min++;
|
|
|
|
VGM_ASSERT(min % 0x100000 == 0, "HCA: count %x...\n", (uint32_t)min);
|
|
|
|
|
|
|
|
hk.key = key;
|
|
|
|
test_hca_key(hca_data, &hk);
|
|
|
|
if (hk.best_score == 1)
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
done:
|
|
|
|
bruteforce_process_result(&hk, p_keycode);
|
|
|
|
close_streamfile(sf_keys);
|
|
|
|
}
|
|
|
|
|
2021-08-07 12:37:41 +02:00
|
|
|
static void bruteforce_hca_key(STREAMFILE* sf, hca_codec_data* hca_data, unsigned long long* p_keycode, uint16_t subkey) {
|
|
|
|
bruteforce_hca_key_bin(sf, hca_data, p_keycode, subkey);
|
|
|
|
if (*p_keycode != 0)
|
|
|
|
return;
|
|
|
|
|
|
|
|
bruteforce_hca_key_txt(sf, hca_data, p_keycode, subkey);
|
|
|
|
if (*p_keycode != 0)
|
|
|
|
return;
|
2021-10-19 00:35:06 +02:00
|
|
|
|
|
|
|
bruteforce_hca_key_num(sf, hca_data, p_keycode, subkey);
|
|
|
|
if (*p_keycode != 0)
|
|
|
|
return;
|
2021-08-07 12:37:41 +02:00
|
|
|
}
|
|
|
|
|
2020-02-22 20:40:21 +01:00
|
|
|
#endif
|