mirror of
https://github.com/Xpl0itU/WiiUDownloader.git
synced 2025-05-15 15:44:56 -04:00
Remove hash check while downloading (broken for some titles)
This commit is contained in:
parent
6e3ed060d8
commit
80311a7647
3 changed files with 26 additions and 143 deletions
|
@ -15,6 +15,8 @@ import (
|
||||||
"reflect"
|
"reflect"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
var commonKey = []byte{0xD7, 0xB0, 0x04, 0x02, 0x65, 0x9B, 0xA2, 0xAB, 0xD2, 0xCB, 0x0D, 0xB2, 0x7F, 0xA2, 0xB6, 0x56}
|
||||||
|
|
||||||
const (
|
const (
|
||||||
BLOCK_SIZE = 0x8000
|
BLOCK_SIZE = 0x8000
|
||||||
BLOCK_SIZE_HASHED = 0x10000
|
BLOCK_SIZE_HASHED = 0x10000
|
||||||
|
|
|
@ -3,10 +3,7 @@ package wiiudownloader
|
||||||
import (
|
import (
|
||||||
"bytes"
|
"bytes"
|
||||||
"context"
|
"context"
|
||||||
"crypto/aes"
|
|
||||||
"crypto/cipher"
|
|
||||||
"encoding/binary"
|
"encoding/binary"
|
||||||
"encoding/hex"
|
|
||||||
"fmt"
|
"fmt"
|
||||||
"io"
|
"io"
|
||||||
"net/http"
|
"net/http"
|
||||||
|
@ -54,7 +51,7 @@ func downloadFile(ctx context.Context, progressReporter ProgressReporter, client
|
||||||
|
|
||||||
req.Header.Set("User-Agent", "WiiUDownloader")
|
req.Header.Set("User-Agent", "WiiUDownloader")
|
||||||
req.Header.Set("Connection", "Keep-Alive")
|
req.Header.Set("Connection", "Keep-Alive")
|
||||||
req.Header.Set("Accept-Encoding", "")
|
req.Header.Set("Accept-Encoding", "gzip")
|
||||||
|
|
||||||
resp, err := client.Do(req)
|
resp, err := client.Do(req)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -82,14 +79,7 @@ func downloadFile(ctx context.Context, progressReporter ProgressReporter, client
|
||||||
ticker := time.NewTicker(250 * time.Millisecond)
|
ticker := time.NewTicker(250 * time.Millisecond)
|
||||||
defer ticker.Stop()
|
defer ticker.Stop()
|
||||||
|
|
||||||
Loop:
|
|
||||||
for {
|
for {
|
||||||
select {
|
|
||||||
case <-ctx.Done():
|
|
||||||
return ctx.Err()
|
|
||||||
case <-ticker.C:
|
|
||||||
progressReporter.UpdateDownloadProgress(downloaded, calculateDownloadSpeed(downloaded, startTime, time.Now()), filePath)
|
|
||||||
default:
|
|
||||||
n, err := resp.Body.Read(buffer)
|
n, err := resp.Body.Read(buffer)
|
||||||
if err != nil && err != io.EOF {
|
if err != nil && err != io.EOF {
|
||||||
if doRetries && attempt < maxRetries {
|
if doRetries && attempt < maxRetries {
|
||||||
|
@ -100,7 +90,7 @@ func downloadFile(ctx context.Context, progressReporter ProgressReporter, client
|
||||||
}
|
}
|
||||||
|
|
||||||
if n == 0 {
|
if n == 0 {
|
||||||
break Loop
|
break
|
||||||
}
|
}
|
||||||
|
|
||||||
_, err = file.Write(buffer[:n])
|
_, err = file.Write(buffer[:n])
|
||||||
|
@ -113,6 +103,11 @@ func downloadFile(ctx context.Context, progressReporter ProgressReporter, client
|
||||||
}
|
}
|
||||||
|
|
||||||
downloaded += int64(n)
|
downloaded += int64(n)
|
||||||
|
select {
|
||||||
|
case <-ctx.Done():
|
||||||
|
return ctx.Err()
|
||||||
|
case <-ticker.C:
|
||||||
|
progressReporter.UpdateDownloadProgress(downloaded, calculateDownloadSpeed(downloaded, startTime, time.Now()), filePath)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
break
|
break
|
||||||
|
@ -129,10 +124,6 @@ func DownloadTitle(cancelCtx context.Context, titleID, outputDirectory string, d
|
||||||
|
|
||||||
outputDir := strings.TrimRight(outputDirectory, "/\\")
|
outputDir := strings.TrimRight(outputDirectory, "/\\")
|
||||||
baseURL := fmt.Sprintf("http://ccs.cdn.c.shop.nintendowifi.net/ccs/download/%s", titleID)
|
baseURL := fmt.Sprintf("http://ccs.cdn.c.shop.nintendowifi.net/ccs/download/%s", titleID)
|
||||||
titleIDBytes, err := hex.DecodeString(titleID)
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
if err := os.MkdirAll(outputDir, os.ModePerm); err != nil {
|
if err := os.MkdirAll(outputDir, os.ModePerm); err != nil {
|
||||||
return err
|
return err
|
||||||
|
@ -171,11 +162,6 @@ func DownloadTitle(cancelCtx context.Context, titleID, outputDirectory string, d
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
tikData, err := os.ReadFile(tikPath)
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
encryptedTitleKey := tikData[0x1BF : 0x1BF+0x10]
|
|
||||||
|
|
||||||
var contentCount uint16
|
var contentCount uint16
|
||||||
if err := binary.Read(bytes.NewReader(tmdData[478:480]), binary.BigEndian, &contentCount); err != nil {
|
if err := binary.Read(bytes.NewReader(tmdData[478:480]), binary.BigEndian, &contentCount); err != nil {
|
||||||
|
@ -217,20 +203,6 @@ func DownloadTitle(cancelCtx context.Context, titleID, outputDirectory string, d
|
||||||
defer certFile.Close()
|
defer certFile.Close()
|
||||||
logger.Info("Certificate saved to %v \n", certPath)
|
logger.Info("Certificate saved to %v \n", certPath)
|
||||||
|
|
||||||
c, err := aes.NewCipher(commonKey)
|
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("failed to create AES cipher: %w", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
decryptedTitleKey := make([]byte, len(encryptedTitleKey))
|
|
||||||
cbc := cipher.NewCBCDecrypter(c, append(titleIDBytes, make([]byte, 8)...))
|
|
||||||
cbc.CryptBlocks(decryptedTitleKey, encryptedTitleKey)
|
|
||||||
|
|
||||||
cipherHashTree, err := aes.NewCipher(decryptedTitleKey)
|
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("failed to create AES cipher: %w", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
var content Content
|
var content Content
|
||||||
tmdDataReader := bytes.NewReader(tmdData)
|
tmdDataReader := bytes.NewReader(tmdData)
|
||||||
|
|
||||||
|
@ -257,14 +229,6 @@ func DownloadTitle(cancelCtx context.Context, titleID, outputDirectory string, d
|
||||||
}
|
}
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
content.Hash = tmdData[offset+16 : offset+0x14]
|
|
||||||
content.Size = contentSizes[i]
|
|
||||||
if err := checkContentHashes(outputDirectory, content, cipherHashTree); err != nil {
|
|
||||||
if progressReporter.Cancelled() {
|
|
||||||
break
|
|
||||||
}
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
if progressReporter.Cancelled() {
|
if progressReporter.Cancelled() {
|
||||||
break
|
break
|
||||||
|
|
83
hash.go
83
hash.go
|
@ -1,83 +0,0 @@
|
||||||
package wiiudownloader
|
|
||||||
|
|
||||||
import (
|
|
||||||
"crypto/aes"
|
|
||||||
"crypto/cipher"
|
|
||||||
"crypto/sha1"
|
|
||||||
"errors"
|
|
||||||
"fmt"
|
|
||||||
"os"
|
|
||||||
"path/filepath"
|
|
||||||
"reflect"
|
|
||||||
)
|
|
||||||
|
|
||||||
var commonKey = []byte{0xD7, 0xB0, 0x04, 0x02, 0x65, 0x9B, 0xA2, 0xAB, 0xD2, 0xCB, 0x0D, 0xB2, 0x7F, 0xA2, 0xB6, 0x56}
|
|
||||||
|
|
||||||
func checkContentHashes(path string, content Content, cipherHashTree cipher.Block) error {
|
|
||||||
h3Data, err := os.ReadFile(filepath.Join(path, fmt.Sprintf("%08X.h3", content.ID)))
|
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("failed to read H3 hash tree file: %w", err)
|
|
||||||
}
|
|
||||||
encryptedFile, err := os.Open(filepath.Join(path, fmt.Sprintf("%08X.app", content.ID)))
|
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("failed to open encrypted file: %w", err)
|
|
||||||
}
|
|
||||||
defer encryptedFile.Close()
|
|
||||||
|
|
||||||
h3Hash := sha1.Sum(h3Data)
|
|
||||||
if !reflect.DeepEqual(h3Hash[:8], content.Hash[:8]) {
|
|
||||||
return errors.New("h3 Hash mismatch")
|
|
||||||
}
|
|
||||||
|
|
||||||
chunkCount := int(content.Size / 0x10000)
|
|
||||||
decryptedContent := make([]byte, 0x400)
|
|
||||||
|
|
||||||
h0HashNum := 0
|
|
||||||
h1HashNum := 0
|
|
||||||
h2HashNum := 0
|
|
||||||
h3HashNum := 0
|
|
||||||
|
|
||||||
buffer := make([]byte, 0x400)
|
|
||||||
iv := make([]byte, aes.BlockSize)
|
|
||||||
for chunkNum := 0; chunkNum < chunkCount; chunkNum++ {
|
|
||||||
encryptedFile.Read(buffer)
|
|
||||||
cipher.NewCBCDecrypter(cipherHashTree, iv).CryptBlocks(decryptedContent, buffer)
|
|
||||||
|
|
||||||
h0Hashes := decryptedContent[0:0x140]
|
|
||||||
h1Hashes := decryptedContent[0x140:0x280]
|
|
||||||
h2Hashes := decryptedContent[0x280:0x3c0]
|
|
||||||
|
|
||||||
h1Hash := h1Hashes[(h1HashNum * 0x14):((h1HashNum + 1) * 0x14)]
|
|
||||||
h2Hash := h2Hashes[(h2HashNum * 0x14):((h2HashNum + 1) * 0x14)]
|
|
||||||
h3Hash := h3Data[(h3HashNum * 0x14):((h3HashNum + 1) * 0x14)]
|
|
||||||
|
|
||||||
h0HashesHash := sha1.Sum(h0Hashes)
|
|
||||||
h1HashesHash := sha1.Sum(h1Hashes)
|
|
||||||
h2HashesHash := sha1.Sum(h2Hashes)
|
|
||||||
|
|
||||||
if !reflect.DeepEqual(h0HashesHash[:], h1Hash) {
|
|
||||||
return errors.New("h0 Hashes Hash mismatch")
|
|
||||||
}
|
|
||||||
if !reflect.DeepEqual(h1HashesHash[:], h2Hash) {
|
|
||||||
return errors.New("h1 Hashes Hash mismatch")
|
|
||||||
}
|
|
||||||
if !reflect.DeepEqual(h2HashesHash[:], h3Hash) {
|
|
||||||
return errors.New("h2 Hashes Hash mismatch")
|
|
||||||
}
|
|
||||||
encryptedFile.Seek(0xFC00, 1)
|
|
||||||
h0HashNum++
|
|
||||||
if h0HashNum >= 16 {
|
|
||||||
h0HashNum = 0
|
|
||||||
h1HashNum++
|
|
||||||
}
|
|
||||||
if h1HashNum >= 16 {
|
|
||||||
h1HashNum = 0
|
|
||||||
h2HashNum++
|
|
||||||
}
|
|
||||||
if h2HashNum >= 16 {
|
|
||||||
h2HashNum = 0
|
|
||||||
h3HashNum++
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
}
|
|
Loading…
Add table
Add a link
Reference in a new issue