mirror of
https://github.com/goatcorp/Dalamud.git
synced 2026-01-03 14:23:40 +01:00
173 lines
6.2 KiB
C#
173 lines
6.2 KiB
C#
using System;
|
|
using System.Buffers;
|
|
using System.Buffers.Text;
|
|
using System.Runtime.InteropServices;
|
|
using System.Text;
|
|
using Dalamud.Bootstrap.Crypto;
|
|
|
|
namespace Dalamud.Bootstrap.SqexArg
|
|
{
|
|
internal sealed class EncodedArgument : IDisposable
|
|
{
|
|
private static char[] ChecksumTable = new char[]
|
|
{
|
|
'f', 'X', '1', 'p', 'G', 't', 'd', 'S',
|
|
'5', 'C', 'A', 'P', '4', '_', 'V', 'L'
|
|
};
|
|
|
|
/// <summary>
|
|
/// Denotes that no checksum is encoded.
|
|
/// </summary>
|
|
private const char NoChecksumMarker = '!';
|
|
|
|
/// <summary>
|
|
/// A data that is not encrypted.
|
|
/// </summary>
|
|
private IMemoryOwner<byte> m_data;
|
|
|
|
/// <summary>
|
|
/// Creates an object that can take (e.g. /T=1234)
|
|
/// </summary>
|
|
/// <param name="data">A data that is not encrypted.</param>
|
|
/// <remarks>
|
|
/// This takes the ownership of the data.
|
|
/// </remarks>
|
|
public EncodedArgument(IMemoryOwner<byte> data)
|
|
{
|
|
m_data = data;
|
|
}
|
|
|
|
|
|
public EncodedArgument(string argument)
|
|
{
|
|
var buffer = MemoryPool<byte>.Shared.Rent(Encoding.UTF8.GetByteCount(argument));
|
|
Encoding.UTF8.GetBytes(argument, buffer.Memory.Span);
|
|
|
|
m_data = buffer;
|
|
}
|
|
|
|
public void Dispose()
|
|
{
|
|
m_data?.Dispose();
|
|
m_data = null!;
|
|
}
|
|
|
|
/// <summary>
|
|
///
|
|
/// </summary>
|
|
/// <param name="argument"></param>
|
|
/// <returns></returns>
|
|
public static EncodedArgument Parse(string argument)
|
|
{
|
|
if (argument.Length <= 17)
|
|
{
|
|
// does not contain: //**sqex0003 + payload + checksum + **//
|
|
var exMessage = $"The string ({argument}) is too short to parse the encoded argument."
|
|
+ $" It should be atleast large enough to contain the start marker, end marker, payload and checksum.";
|
|
throw new SqexArgException(exMessage);
|
|
}
|
|
|
|
if (!argument.StartsWith("//**sqex0003") || !argument.EndsWith("**//"))
|
|
{
|
|
var exMessage = $"The string ({argument}) doesn't look like the valid argument."
|
|
+ $" It should start with //**sqeex003 and end with **// string.";
|
|
throw new SqexArgException(exMessage);
|
|
}
|
|
|
|
// Extract the data
|
|
var checksum = argument[^5];
|
|
var encryptedData = DecodeUrlSafeBase64(argument.Substring(12, argument.Length - 1 - 12 - 4)); // //**sqex0003, checksum, **//
|
|
|
|
// Dedice a partial key from the checksum
|
|
var (partialKey, recoverStep) = RecoverKeyFragmentFromChecksum(checksum);
|
|
|
|
var decryptedData = MemoryPool<byte>.Shared.Rent(encryptedData.Length);
|
|
if (!RecoverKey(encryptedData, decryptedData.Memory.Span, partialKey, recoverStep))
|
|
{
|
|
// we need to free the memory to avoid a memory leak.
|
|
decryptedData.Dispose();
|
|
|
|
var exMessage = $"Could not find a valid key to decrypt the encoded argument.";
|
|
throw new SqexArgException(exMessage);
|
|
}
|
|
|
|
return new EncodedArgument(decryptedData);
|
|
}
|
|
|
|
private static bool RecoverKey(ReadOnlySpan<byte> encryptedData, Span<byte> decryptedData, uint partialKey, uint recoverStep)
|
|
{
|
|
|
|
Span<byte> keyBytes = stackalloc byte[8];
|
|
var keyCandicate = partialKey;
|
|
|
|
while (true)
|
|
{
|
|
if (!CreateKey(keyBytes, keyCandicate))
|
|
{
|
|
var message = $"BUG: Could not create a key"; // This should not fail but..
|
|
throw new InvalidOperationException(message);
|
|
}
|
|
|
|
var blowfish = new Blowfish(keyBytes);
|
|
blowfish.Decrypt(encryptedData, decryptedData);
|
|
|
|
// Check if the decrypted data looks valid
|
|
if (CheckDecryptedData(decryptedData))
|
|
{
|
|
return true;
|
|
}
|
|
|
|
// Try again with the next key.
|
|
try
|
|
{
|
|
keyCandicate = checked(keyCandicate + recoverStep);
|
|
}
|
|
catch (OverflowException)
|
|
{
|
|
// We've exhausted the key space and could not find a valid key.
|
|
return false;
|
|
}
|
|
}
|
|
}
|
|
|
|
private static bool CheckDecryptedData(ReadOnlySpan<byte> decryptedData)
|
|
{
|
|
// TODO
|
|
return false;
|
|
}
|
|
|
|
private static bool CreateKey(Span<byte> destination, uint key) => Utf8Formatter.TryFormat(key, destination, out var _, new StandardFormat('X', 8));
|
|
|
|
/// <summary>
|
|
/// Deduces a partial key from the checksum.
|
|
/// </summary>
|
|
/// <returns>
|
|
/// `partialKey` can be or'd (a | partialKey) to recover some bits from the key.
|
|
/// </returns>
|
|
/// <remarks>
|
|
/// The partialKey here is very useful because it can further reduce the number of possible key
|
|
/// from 0xFFFF to 0xFFF which is 16 times smaller. (and therefore we can initialize the blowfish 16 times less which is quite expensive to do so.)
|
|
/// </remarks>
|
|
private static (uint partialKey, uint step) RecoverKeyFragmentFromChecksum(char checksum)
|
|
{
|
|
return MemoryExtensions.IndexOf(ChecksumTable, checksum) switch
|
|
{
|
|
-1 => (0x0001_0000, 0x0001_0000), // This covers '!' as well (no checksum are encoded)
|
|
var index => ((uint) (index << 16), 0x0010_0000)
|
|
};
|
|
}
|
|
|
|
/// <summary>
|
|
/// Converts the url-safe variant of base64 string to bytes.
|
|
/// </summary>
|
|
/// <param name="payload">A url-safe variant of base64 string.</param>
|
|
private static byte[] DecodeUrlSafeBase64(string payload)
|
|
{
|
|
var base64Str = payload
|
|
.Replace('-', '+')
|
|
.Replace('_', '/');
|
|
|
|
return Convert.FromBase64String(base64Str);
|
|
}
|
|
}
|
|
}
|