1
0
Fork 0
mirror of https://github.com/Atmosphere-NX/Atmosphere.git synced 2024-12-29 13:46:01 +00:00
Atmosphere/sept/sept-secondary/sept_sign.py

84 lines
2.8 KiB
Python
Raw Normal View History

#!/usr/bin/env python
2019-06-19 07:23:31 +01:00
import sys, os
from struct import pack as pk, unpack as up
from Crypto.Cipher import AES
from Crypto.Hash import CMAC
try:
import KEYS
except ImportError:
import KEYS_template as KEYS
print('Warning: output will not work on 7.0.0+!')
2019-02-21 15:52:42 +00:00
2019-02-20 14:54:44 +00:00
def shift_left_xor_rb(s):
2019-02-21 15:52:42 +00:00
if hasattr(int, "from_bytes"):
N = int.from_bytes(s, byteorder="big")
else:
N = int(s.encode('hex'), 16)
2019-02-20 14:54:44 +00:00
if N & (1 << 127):
N = ((N << 1) ^ 0x87) & 0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
else:
N = ((N << 1) ^ 0x00) & 0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
2019-02-21 15:52:42 +00:00
return bytearray.fromhex('%032x' % N)
2019-02-20 14:54:44 +00:00
def sxor(x, y):
2019-02-21 15:52:42 +00:00
return bytearray(a^b for a,b in zip(x, y))
2019-02-20 14:54:44 +00:00
def get_last_block_for_desired_mac(key, data, desired_mac):
assert len(desired_mac) == 0x10
2019-02-21 15:52:42 +00:00
k1 = shift_left_xor_rb(AES.new(key, AES.MODE_ECB).encrypt(bytearray(0x10)))
2019-02-20 14:54:44 +00:00
if len(data) & 0xF:
k1 = shift_left_xor_rb(k1)
2019-03-24 15:26:14 +00:00
data = data + b'\x80'
data = data + bytearray((0x10 - (len(data) & 0xF)) & 0xF)
2019-02-20 14:54:44 +00:00
num_blocks = (len(data) + 0xF) >> 4
2019-02-21 15:52:42 +00:00
last_block = sxor(bytearray(AES.new(key, AES.MODE_ECB).decrypt(desired_mac)), bytearray(k1))
2019-02-20 14:54:44 +00:00
if len(data) > 0x0:
2019-02-21 15:52:42 +00:00
last_block = sxor(last_block, bytearray(AES.new(key, AES.MODE_CBC, bytearray(0x10)).encrypt(data)[-0x10:]))
2019-02-20 14:54:44 +00:00
return last_block
2019-02-21 15:52:42 +00:00
2019-06-19 07:23:31 +01:00
def sign_encrypt_code(code, sig_key, enc_key, iv, desired_mac, version):
# Pad with 0x20 of zeroes.
2019-03-24 15:26:14 +00:00
code = code + bytearray(0x20)
code_len = len(code)
code_len += 0xFFF
code_len &= ~0xFFF
2019-03-24 15:26:14 +00:00
code = code + bytearray(code_len - len(code))
2019-02-21 15:52:42 +00:00
2019-06-19 07:23:31 +01:00
# Insert version
code = code[:8] + pk('<I', version) + code[12:]
# Add empty trustzone, warmboot segments.
2019-03-24 15:26:14 +00:00
code = code + bytearray(0x1FE0 - 0x10)
2019-02-21 15:52:42 +00:00
pk11_hdr = b'PK11' + pk('<IIIIIII', 0x1000, 0, 0, code_len - 0x20, 0, 0x1000, 0)
pk11 = pk11_hdr + code
enc_pk11 = AES.new(enc_key, AES.MODE_CBC, iv).encrypt(pk11)
2019-02-20 14:54:44 +00:00
enc_pk11 = pk('<IIII', len(pk11) + 0x10, 0, 0, 0) + iv + enc_pk11
2019-03-24 15:26:14 +00:00
enc_pk11 = enc_pk11 + get_last_block_for_desired_mac(sig_key, enc_pk11, desired_mac)
enc_pk11 = enc_pk11 + CMAC.new(sig_key, enc_pk11, AES).digest()
return enc_pk11
2019-02-21 15:52:42 +00:00
def main(argc, argv):
if argc != 3:
print('Usage: %s input output' % argv[0])
return 1
with open(argv[1], 'rb') as f:
code = f.read()
if len(code) & 0xF:
2019-03-24 15:26:14 +00:00
code = code + bytearray(0x10 - (len(code) & 0xF))
# TODO: Support dev unit crypto
2019-06-19 07:23:31 +01:00
fn, fext = os.path.splitext(argv[2])
for key in range(KEYS.NUM_KEYS):
with open(fn + ('_%02X' % key) + fext, 'wb') as f:
f.write(sign_encrypt_code(code, KEYS.HOVI_SIG_KEY_PRD[key], KEYS.HOVI_ENC_KEY_PRD[key], KEYS.IV[key], b'THANKS_NVIDIA_<3', key))
return 0
2019-02-21 15:52:42 +00:00
if __name__ == '__main__':
2019-02-21 15:25:42 +00:00
sys.exit(main(len(sys.argv), sys.argv))