cpupes2-decrypt/CpUpES2-Decrypt/Program.cs

159 lines
7.6 KiB
C#

using Org.BouncyCastle.Crypto.Encodings;
using Org.BouncyCastle.Crypto.Engines;
using Org.BouncyCastle.Crypto.Parameters;
using Org.BouncyCastle.Math;
using System;
using System.Collections.Generic;
using System.IO;
using System.Linq;
using System.Security.Cryptography;
using System.Text;
using System.Threading;
using System.Threading.Tasks;
namespace CpUpES2_Decrypt
{
class Program
{
public static byte[] Aes_128_Decrypt(byte[] message, byte[] Key, byte[] Iv)
{
Aes aes = new AesManaged();
aes.Key = Key;
aes.IV = Iv;
aes.Mode = CipherMode.CBC;
aes.Padding = PaddingMode.None;
ICryptoTransform cipher;
cipher = aes.CreateDecryptor();
return cipher.TransformFinalBlock(message, 0, message.Length);
}
static int Main(string[] args)
{
RsaKeyParameters CpUp_Public_Key = new RsaKeyParameters(false, new BigInteger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new BigInteger("10001", 16));
RsaKeyParameters FsImage_Public_Key = new RsaKeyParameters(false, new BigInteger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new BigInteger("10001", 16));
if(args.Length < 1)
{
Console.WriteLine("Usage: CpUpES2-Decrypt.exe <UpdaterES2.CpUp File OR fsimage1.trf File>");
return 2;
}
else if(File.Exists(args[0]))
{
// Parse Header
FileStream fs = File.OpenRead(args[0]);
BinaryReader bfs = new BinaryReader(fs);
UInt32 Magic = bfs.ReadUInt32();
UInt32 Version = bfs.ReadUInt32();
UInt32 TrfSize = bfs.ReadUInt32();
UInt32 TrfStartAddress = bfs.ReadUInt32();
UInt32 TrfExtractedSize = bfs.ReadUInt32();
UInt32 FullSize = bfs.ReadUInt32();
UInt32 StartAddress = bfs.ReadUInt32();
UInt32 ExtractedSize = bfs.ReadUInt32();
if (Magic == 0x43705570 || Magic == 0x23642745)
{
String FileType = "CpUp";
if (Magic == 0x23642745)
FileType = "Trf";
UInt32 UsedStartAddress = StartAddress;
UInt32 UsedSize = FullSize;
UInt32 UsedExtractedSize = ExtractedSize;
Boolean IsEncrypted = true;
String FileName = Path.ChangeExtension(args[0], "tar.gz");
if (FileType == "Trf")
{
UsedStartAddress = TrfStartAddress;
UsedSize = TrfSize;
UsedExtractedSize = TrfExtractedSize;
FileName = Path.ChangeExtension(args[0], "img");
if(Version == 0x1010100) // I think?
IsEncrypted = false;
}
Console.WriteLine(FileType+" Magic: 0x" + Magic.ToString("X"));
Console.WriteLine(FileType + " Version: 0x" + Version.ToString("X"));
Console.WriteLine(FileType + " TSize: 0x" + TrfSize.ToString("X"));
Console.WriteLine(FileType + " TStart Address: 0x" + TrfStartAddress.ToString("X"));
Console.WriteLine(FileType + " TExtracted Size: 0x" + TrfExtractedSize.ToString("X"));
Console.WriteLine(FileType + " CSize: 0x" + FullSize.ToString("X"));
Console.WriteLine(FileType + " CStart Address: 0x" + StartAddress.ToString("X"));
Console.WriteLine(FileType + " CExtracted Size: 0x" + ExtractedSize.ToString("X"));
Console.WriteLine("\n\nRSA Decrypting Key Information...");
// Dervie AES Key
Pkcs1Encoding pkcs1Encoding = new Pkcs1Encoding(new RsaEngine());
if(FileType == "Trf")
pkcs1Encoding.Init(false, FsImage_Public_Key);
else if (FileType == "CpUp")
pkcs1Encoding.Init(false, CpUp_Public_Key);
pkcs1Encoding.GetInputBlockSize();
fs.Seek(-0x100, SeekOrigin.End);
Byte[] HeaderData = new Byte[0x100];
fs.Read(HeaderData, 0x00, 0x100);
Byte[] HeaderDecrypted = pkcs1Encoding.ProcessBlock(HeaderData, 0, 0x100);
Byte[] Iv = new Byte[0x10];
Byte[] Key = new Byte[0x10];
Byte[] Sha1Hash = new Byte[0x14];
Array.ConstrainedCopy(HeaderDecrypted, 0x0, Iv, 0x0, 0x10);
Array.ConstrainedCopy(HeaderDecrypted, 0x10, Key, 0x0, 0x10);
Array.ConstrainedCopy(HeaderDecrypted, 0x20, Sha1Hash, 0x0, 0x14);
Console.WriteLine(FileType + " Key: " + BitConverter.ToString(Key));
Console.WriteLine(FileType + " Iv: " + BitConverter.ToString(Iv));
Console.WriteLine(FileType + " Sha1: " + BitConverter.ToString(Sha1Hash));
Console.WriteLine("\n\nAES Decrypting "+FileType+" File...");
// Decrypt Update
fs.Seek(UsedStartAddress, SeekOrigin.Begin);
Byte[] UpdateData = new Byte[(UsedSize - UsedStartAddress) - 0x100];
fs.Read(UpdateData, 0x00, UpdateData.Length);
if(IsEncrypted)
UpdateData = Aes_128_Decrypt(UpdateData, Key, Iv);
fs.Close();
fs = File.OpenWrite(FileName);
fs.Write(UpdateData, 0x00, (Int32)UsedExtractedSize);
fs.Close();
Console.WriteLine("Decrypted file saved to: " + FileName);
ConsoleColor PrevColor = Console.ForegroundColor;
Console.ForegroundColor = ConsoleColor.Green;
Console.WriteLine("\n\nBlessed Be!");
Console.ForegroundColor = PrevColor;
return 0;
}
else
{
Console.WriteLine("Unknown Filetype! (Magic = 0x" + Magic.ToString("X")+")");
return 1;
}
}
else
{
Console.WriteLine("File not Found: " + args[0]);
return 4;
}
}
}
}