#!/usr/bin/env python import sys from struct import pack as pk, unpack as up from Crypto.Cipher import AES from Crypto.Hash import CMAC try: import KEYS except ImportError: import KEYS_template as KEYS print('Warning: output will not work on 7.0.0+!') def shift_left_xor_rb(s): N = int(s.encode('hex'), 16) if N & (1 << 127): N = ((N << 1) ^ 0x87) & 0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF else: N = ((N << 1) ^ 0x00) & 0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF return ('%032x' % N).decode('hex') def sxor(x, y): return ''.join(chr(ord(a) ^ ord(b)) for a,b in zip(x, y)) def get_last_block_for_desired_mac(key, data, desired_mac): assert len(desired_mac) == 0x10 k1 = shift_left_xor_rb(AES.new(key, AES.MODE_ECB).encrypt('\x00'*0x10)) if len(data) & 0xF: k1 = shift_left_xor_rb(k1) data += '\x80' data += '\x00' * ((0x10 - (len(data) & 0xF)) & 0xF) num_blocks = (len(data) + 0xF) >> 4 last_block = sxor(AES.new(key, AES.MODE_ECB).decrypt(desired_mac), k1) if len(data) > 0x0: last_block = sxor(last_block, AES.new(key, AES.MODE_CBC, '\x00'*0x10).encrypt(data)[-0x10:]) return last_block def sign_encrypt_code(code, sig_key, enc_key, iv, desired_mac): # Pad with 0x20 of zeroes. code += '\x00' * 0x20 code_len = len(code) code_len += 0xFFF code_len &= ~0xFFF code += '\x00' * (code_len - len(code)) # Add empty trustzone, warmboot segments. code += '\x00'* (0x1FE0 - 0x10) pk11_hdr = 'PK11' + pk('