1
0
Fork 0
mirror of https://github.com/DarkMatterCore/nxdumptool.git synced 2024-09-19 13:33:25 +01:00

poc: enable update option on ExeFS sections.

This commit is contained in:
Pablo Curiel 2023-12-17 19:03:08 +01:00
parent af275a558e
commit bfdd9e056e
3 changed files with 9 additions and 10 deletions

View file

@ -1970,8 +1970,7 @@ void updateNcaBasePatchList(TitleUserApplicationData *user_app_data, TitleInfo *
freeNcaBasePatchList(); freeNcaBasePatchList();
/* Only enable base/patch list if we're dealing with supported content types and/or FS section types. */ /* Only enable base/patch list if we're dealing with supported content types and/or FS section types. */
if ((content_type == NcmContentType_Program || content_type == NcmContentType_Data || content_type == NcmContentType_HtmlDocument) && \ if ((content_type == NcmContentType_Program || content_type == NcmContentType_Data || content_type == NcmContentType_HtmlDocument) && section_type < NcaFsSectionType_Nca0RomFs)
section_type < NcaFsSectionType_Nca0RomFs && (section_type != NcaFsSectionType_PartitionFs || nca_fs_ctx->has_sparse_layer))
{ {
/* Retrieve corresponding TitleInfo linked list for the current title type. */ /* Retrieve corresponding TitleInfo linked list for the current title type. */
switch(title_type) switch(title_type)
@ -2684,7 +2683,7 @@ static bool saveGameCardUid(void *userdata)
u32 crc = 0; u32 crc = 0;
char *filename = NULL; char *filename = NULL;
if (!gamecardGetSecurityInformation(&gc_security_information)) if (!gamecardGetSecurityInformation(&gc_security_information))
{ {
consolePrint("failed to get gamecard security information\n"); consolePrint("failed to get gamecard security information\n");
goto end; goto end;

View file

@ -629,10 +629,10 @@ def usbGetDeviceEndpoints() -> bool:
if not g_cliMode: if not g_cliMode:
utilsLogException(traceback.format_exc()) utilsLogException(traceback.format_exc())
g_logger.error('\nFatal error ocurred while enumerating USB devices.') g_logger.error('Fatal error ocurred while enumerating USB devices.')
if g_isWindows: if g_isWindows:
g_logger.error('\nTry reinstalling the libusbK driver using Zadig.') g_logger.error('Try reinstalling the libusbK driver using Zadig.')
return False return False

View file

@ -53,9 +53,9 @@ bool rsa2048OaepDecrypt(void *dst, size_t dst_size, const void *signature, const
return false; return false;
} }
mbedtls_entropy_context entropy; mbedtls_entropy_context entropy = {0};
mbedtls_ctr_drbg_context ctr_drbg; mbedtls_ctr_drbg_context ctr_drbg = {0};
mbedtls_rsa_context rsa; mbedtls_rsa_context rsa = {0};
const char *pers = __func__; const char *pers = __func__;
int mbedtls_ret = 0; int mbedtls_ret = 0;
@ -118,12 +118,12 @@ static bool rsa2048VerifySha256BasedSignature(const void *data, size_t data_size
} }
int mbedtls_ret = 0; int mbedtls_ret = 0;
mbedtls_rsa_context rsa; mbedtls_rsa_context rsa = {0};
u8 hash[SHA256_HASH_SIZE] = {0}; u8 hash[SHA256_HASH_SIZE] = {0};
bool ret = false; bool ret = false;
/* Initialize RSA context. */ /* Initialize RSA context. */
mbedtls_rsa_init(&rsa, MBEDTLS_RSA_PKCS_V21, MBEDTLS_MD_SHA256); mbedtls_rsa_init(&rsa, use_pss ? MBEDTLS_RSA_PKCS_V21 : MBEDTLS_RSA_PKCS_V15, MBEDTLS_MD_SHA256);
/* Import RSA parameters. */ /* Import RSA parameters. */
mbedtls_ret = mbedtls_rsa_import_raw(&rsa, (const u8*)modulus, RSA2048_BYTES, NULL, 0, NULL, 0, NULL, 0, (const u8*)public_exponent, public_exponent_size); mbedtls_ret = mbedtls_rsa_import_raw(&rsa, (const u8*)modulus, RSA2048_BYTES, NULL, 0, NULL, 0, NULL, 0, (const u8*)public_exponent, public_exponent_size);