mirror of
https://github.com/NinjaCheetah/libWiiPy.git
synced 2025-04-26 13:21:01 -04:00
Experimental content re-encrypting code
This commit is contained in:
parent
73d684a74f
commit
74192f8feb
@ -91,7 +91,7 @@ class ContentRegion:
|
||||
content_record_hash = str(self.content_records[index].content_hash.decode())
|
||||
# Compare the hash and throw a ValueError if the hash doesn't match.
|
||||
if content_dec_hash.hexdigest() != content_record_hash:
|
||||
raise ValueError("Content hash did not match the expected hash in its record! The incorrect Title Key may"
|
||||
raise ValueError("Content hash did not match the expected hash in its record! The incorrect Title Key may "
|
||||
"have been used!.\n"
|
||||
"Expected hash is: {}\n".format(content_record_hash) +
|
||||
"Actual hash is: {}".format(content_dec_hash.hexdigest()))
|
||||
|
@ -39,7 +39,8 @@ def decrypt_title_key(title_key_enc, common_key_index, title_id) -> bytes:
|
||||
def decrypt_content(content_enc, title_key, content_index, content_length) -> bytes:
|
||||
"""Gets the decrypted version of the encrypted content.
|
||||
|
||||
Requires the index of the common key to use, and the Title ID of the title that the Title Key is for.
|
||||
This requires the index of the content to decrypt as it is used as the IV, as well as the content length to adjust
|
||||
padding as necessary.
|
||||
|
||||
Parameters
|
||||
----------
|
||||
@ -72,3 +73,47 @@ def decrypt_content(content_enc, title_key, content_index, content_length) -> by
|
||||
while len(content_dec) > content_length:
|
||||
content_dec = content_dec[:-1]
|
||||
return content_dec
|
||||
|
||||
|
||||
def encrypt_content(content_dec, title_key, content_index) -> bytes:
|
||||
"""Gets the encrypted version of the decrypted content.
|
||||
|
||||
This requires the index of the content to encrypt as it is used as the IV, as well as the content length to adjust
|
||||
padding as necessary.
|
||||
|
||||
Parameters
|
||||
----------
|
||||
content_dec : bytes
|
||||
The decrypted content.
|
||||
title_key : bytes
|
||||
The Title Key for the title the content is from.
|
||||
content_index : int
|
||||
The index in the TMD's content record of the content being decrypted.
|
||||
|
||||
Returns
|
||||
-------
|
||||
bytes
|
||||
The decrypted content.
|
||||
"""
|
||||
# Generate the IV from the Content Index of the content to be decrypted.
|
||||
content_index_bin = struct.pack('>H', content_index)
|
||||
while len(content_index_bin) < 16:
|
||||
content_index_bin += b'\x00'
|
||||
# Align content to 64 bytes to ensure that all the data is being encrypted, and so it works with AES encryption.
|
||||
bytes_added = None
|
||||
if (len(content_dec) % 64) != 0:
|
||||
bytes_added = len(b'\x00' * (64 - (len(content_dec) % 64)))
|
||||
print(bytes_added)
|
||||
content_dec = content_dec + (b'\x00' * (64 - (len(content_dec) % 64)))
|
||||
# Create a new AES object with the values provided, with the content's unique ID as the IV.
|
||||
aes = AES.new(title_key, AES.MODE_CBC, content_index_bin)
|
||||
# Encrypt the content using the AES object.
|
||||
content_enc = aes.encrypt(content_dec)
|
||||
# Remove any bytes added.
|
||||
if bytes_added:
|
||||
while bytes_added:
|
||||
content_enc = content_enc[:-1]
|
||||
bytes_added -= 1
|
||||
print("removing " + str(bytes_added))
|
||||
print(str(len(content_enc)))
|
||||
return content_enc
|
||||
|
Loading…
x
Reference in New Issue
Block a user