#pragma once #include #include "Types.h" #include #include #include #include struct PKGHeader { /*BE*/U32 magic;// Magic /*BE*/U32 pkg_type; /*BE*/U32 pkg_0x8; //unknown field /*BE*/U32 pkg_file_count; /*BE*/U32 pkg_table_entry_count; /*BE*/U16 pkg_sc_entry_count; /*BE*/U16 pkg_table_entry_count_2;// same as pkg_entry_count /*BE*/U32 pkg_table_entry_offset;//file table offset /*BE*/U32 pkg_sc_entry_data_size; /*BE*/U64 pkg_body_offset;//offset of PKG entries /*BE*/U64 pkg_body_size;//length of all PKG entries /*BE*/U64 pkg_content_offset; /*BE*/U64 pkg_content_size; U08 pkg_content_id[0x24];//packages' content ID as a 36-byte string U08 pkg_padding[0xC];//padding /*BE*/U32 pkg_drm_type;//DRM type /*BE*/U32 pkg_content_type;//Content type /*BE*/U32 pkg_content_flags;//Content flags /*BE*/U32 pkg_promote_size; /*BE*/U32 pkg_version_date; /*BE*/U32 pkg_version_hash; /*BE*/U32 pkg_0x088; /*BE*/U32 pkg_0x08C; /*BE*/U32 pkg_0x090; /*BE*/U32 pkg_0x094; /*BE*/U32 pkg_iro_tag; /*BE*/U32 pkg_drm_type_version; U08 pkg_zeroes_1[0x60]; /* Digest table */ U08 digest_entries1[0x20]; // sha256 digest for main entry 1 U08 digest_entries2[0x20]; // sha256 digest for main entry 2 U08 digest_table_digest[0x20]; // sha256 digest for digest table U08 digest_body_digest[0x20]; // sha256 digest for main table U08 pkg_zeroes_2[0x280]; U32 pkg_0x400; U32 pfs_image_count; // count of PFS images U64 pfs_image_flags; // PFS flags U64 pfs_image_offset; // offset to start of external PFS image U64 pfs_image_size; // size of external PFS image U64 mount_image_offset; U64 mount_image_size; U64 pkg_size; U32 pfs_signed_size; U32 pfs_cache_size; U08 pfs_image_digest[0x20]; U08 pfs_signed_digest[0x20]; U64 pfs_split_size_nth_0; U64 pfs_split_size_nth_1; U08 pkg_zeroes_3[0xB50]; U08 pkg_digest[0x20]; }; inline void ReadBE(PKGHeader& s) { ReadBE(s.magic); ReadBE(s.pkg_type); ReadBE(s.pkg_0x8); ReadBE(s.pkg_file_count); ReadBE(s.pkg_table_entry_count); ReadBE(s.pkg_sc_entry_count); ReadBE(s.pkg_table_entry_count_2); ReadBE(s.pkg_table_entry_offset); ReadBE(s.pkg_sc_entry_data_size); ReadBE(s.pkg_body_offset); ReadBE(s.pkg_body_size); ReadBE(s.pkg_content_offset); ReadBE(s.pkg_content_size); ReadBE(s.pfs_image_offset); ReadBE(s.pfs_image_size); ReadBE(s.pkg_size); } struct PKGEntry { U32 id; // File ID, useful for files without a filename entry U32 filename_offset; // Offset into the filenames table (ID 0x200) where this file's name is located U32 flags1; // Flags including encrypted flag, etc U32 flags2; // Flags including encryption key index, etc U32 offset; // Offset into PKG to find the file U32 size; // Size of the file U64 padding; // blank padding }; inline void ReadBE(PKGEntry& s) { ReadBE(s.id); ReadBE(s.filename_offset); ReadBE(s.flags1); ReadBE(s.flags2); ReadBE(s.offset); ReadBE(s.size); ReadBE(s.padding); } class PKG { private: U08* pkg; U64 pkgSize = 0; S08 pkgTitleID[9]; std::string extractPath; PKGHeader pkgheader; public: PKG(); ~PKG(); bool open(const std::string& filepath); U64 getPkgSize() { return pkgSize; } std::string getTitleID() { return std::string(pkgTitleID,9); } bool extract(const std::string& filepath, const std::string& extractPath, std::string& failreason); void* mmap(size_t sLength, std::FILE* nFd) { HANDLE hHandle; void* pStart=nullptr; hHandle = CreateFileMapping( (HANDLE)_get_osfhandle(_fileno((nFd))), NULL, // default security PAGE_WRITECOPY, // read/write access 0, // maximum object size (high-order DWORD) 0, // maximum object size (low-order DWORD) NULL); // name of mapping object if (hHandle != NULL) { pStart = MapViewOfFile(hHandle, FILE_MAP_COPY, 0, 0, sLength); } if(pStart == NULL) { return nullptr; } return pStart; } int munmap(void* pStart) { if (UnmapViewOfFile(pStart) != 0) return FALSE; return TRUE; } typedef struct { U32 type; std::string name; } pkg_entry_value; std::string getEntryNameByType(U32 type) { pkg_entry_value entries[] = { { 0x0001, "digests" }, { 0x0010, "entry_keys" }, { 0x0020, "image_key" }, { 0x0080, "general_digests" }, { 0x0100, "metas" }, { 0x0200, "entry_names" }, { 0x0400, "license.dat" }, { 0x0401, "license.info" }, { 0x0402, "nptitle.dat" }, { 0x0403, "npbind.dat" }, { 0x0409, "psreserved.dat" }, { 0x1000, "param.sfo" }, { 0x1001, "playgo-chunk.dat" }, { 0x1002, "playgo-chunk.sha" }, { 0x1003, "playgo-manifest.xml" }, { 0x1004, "pronunciation.xml" }, { 0x1005, "pronunciation.sig" }, { 0x1006, "pic1.png" }, { 0x1007, "pubtoolinfo.dat" }, { 0x100B, "shareparam.json" }, { 0x100C, "shareoverlayimage.png" }, { 0x100E, "shareprivacyguardimage.png"}, { 0x1200, "icon0.png" }, { 0x1220, "pic0.png" }, { 0x1240, "snd0.at9" }, { 0x1280, "icon0.dds" }, { 0x12A0, "pic0.dds" }, { 0x12C0, "pic1.dds" }, { 0x1400, "trophy/trophy00.trp" } }; std::string entry_name=""; for (size_t i = 0; i < sizeof entries / sizeof entries[0]; i++) { if (type == entries[i].type) { entry_name = entries[i].name; break; } } return entry_name; } void printPkgHeader() { printf("PS4 PKG header:\n"); printf("- PKG magic: 0x%X\n", pkgheader.magic); printf("- PKG type: 0x%X\n", pkgheader.pkg_type); printf("- PKG 0x8: 0x%X\n", pkgheader.pkg_0x8); printf("- PKG file count: 0x%X\n", pkgheader.pkg_file_count); printf("- PKG table entries: 0x%X\n", pkgheader.pkg_table_entry_count); printf("- PKG system entries: 0x%X\n", pkgheader.pkg_sc_entry_count); printf("- PKG table entries2: 0x%X\n", pkgheader.pkg_table_entry_count_2); printf("- PKG table offset: 0x%X\n", pkgheader.pkg_table_entry_offset); printf("- PKG table entry data size: 0x%X\n", pkgheader.pkg_sc_entry_data_size); printf("- PKG body offset: 0x%" PRIx64 "\n", pkgheader.pkg_body_offset); printf("- PKG body size: 0x%" PRIx64 "\n", pkgheader.pkg_body_size); printf("- PKG content offset: 0x%" PRIx64 "\n", pkgheader.pkg_content_offset); printf("- PKG conteít size: 0x%" PRIx64 "\n", pkgheader.pkg_content_offset); printf("- PKG pkg_content_id: %s\n", pkgheader.pkg_content_id); printf("\n\n"); // U08 pkg_content_id[0x24];//packages' content ID as a 36-byte string // U08 pkg_padding[0xC];//padding // /*BE*/U32 pkg_drm_type;//DRM type // /*BE*/U32 pkg_content_type;//Content type // /*BE*/U32 pkg_content_flags;//Content flags // /*BE*/U32 pkg_promote_size; // /*BE*/U32 pkg_version_date; // /*BE*/U32 pkg_version_hash; // /*BE*/U32 pkg_0x088; // /*BE*/U32 pkg_0x08C; // /*BE*/U32 pkg_0x090; // /*BE*/U32 pkg_0x094; // /*BE*/U32 pkg_iro_tag; // /*BE*/U32 pkg_drm_type_version; // U08 pkg_zeroes_1[0x60]; /* Digest table */ // U08 digest_entries1[0x20]; // sha256 digest for main entry 1 // U08 digest_entries2[0x20]; // sha256 digest for main entry 2 // U08 digest_table_digest[0x20]; // sha256 digest for digest table // U08 digest_body_digest[0x20]; // sha256 digest for main table // U08 pkg_zeroes_2[0x280]; // U32 pkg_0x400; // U32 pfs_image_count; // count of PFS images // U64 pfs_image_flags; // PFS flags // U64 pfs_image_offset; // offset to start of external PFS image // U64 pfs_image_size; // size of external PFS image // U64 mount_image_offset; // U64 mount_image_size; // U64 pkg_size; // U32 pfs_signed_size; // U32 pfs_cache_size; // U08 pfs_image_digest[0x20]; // U08 pfs_signed_digest[0x20]; // U64 pfs_split_size_nth_0; // U64 pfs_split_size_nth_1; // U08 pkg_zeroes_3[0xB50]; // U08 pkg_digest[0x20]; */ } };