mirror of
https://github.com/Scandal-UK/Incognito_RCM.git
synced 2024-11-22 20:06:42 +00:00
make decrypting work for unaligned blocks
This commit is contained in:
parent
76bfd54fd2
commit
5d6f606925
2 changed files with 171 additions and 111 deletions
|
@ -234,38 +234,38 @@ void dump_keys() {
|
|||
se_aes_crypt_block_ecb(8, 0, master_key[6], master_key_source);
|
||||
}
|
||||
|
||||
if (pkg1_id->kb >= KB_FIRMWARE_VERSION_620) {
|
||||
// derive all lower master keys in case keyblobs are bad
|
||||
if (_key_exists(master_key[pkg1_id->kb])) {
|
||||
for (u32 i = pkg1_id->kb; i > 0; i--) {
|
||||
se_aes_key_set(8, master_key[i], 0x10);
|
||||
se_aes_crypt_block_ecb(8, 0, master_key[i-1], mkey_vectors[i]);
|
||||
}
|
||||
se_aes_key_set(8, master_key[0], 0x10);
|
||||
se_aes_crypt_block_ecb(8, 0, temp_key, mkey_vectors[0]);
|
||||
if (_key_exists(temp_key)) {
|
||||
EPRINTFARGS("Failed to derive master key. kb = %d", pkg1_id->kb);
|
||||
}
|
||||
} else if (_key_exists(master_key[KB_FIRMWARE_VERSION_MAX])) {
|
||||
// handle sept version differences
|
||||
for (u32 kb = KB_FIRMWARE_VERSION_MAX; kb >= KB_FIRMWARE_VERSION_620; kb--) {
|
||||
for (u32 i = kb; i > 0; i--) {
|
||||
se_aes_key_set(8, master_key[i], 0x10);
|
||||
se_aes_crypt_block_ecb(8, 0, master_key[i-1], mkey_vectors[i]);
|
||||
}
|
||||
se_aes_key_set(8, master_key[0], 0x10);
|
||||
se_aes_crypt_block_ecb(8, 0, temp_key, mkey_vectors[0]);
|
||||
if (!_key_exists(temp_key)) {
|
||||
break;
|
||||
}
|
||||
memcpy(master_key[kb-1], master_key[kb], 0x10);
|
||||
memcpy(master_key[kb], zeros, 0x10);
|
||||
}
|
||||
if (_key_exists(temp_key)) {
|
||||
EPRINTF("Failed to derive master key.");
|
||||
}
|
||||
}
|
||||
}
|
||||
// if (pkg1_id->kb >= KB_FIRMWARE_VERSION_620) {
|
||||
// // derive all lower master keys in case keyblobs are bad
|
||||
// if (_key_exists(master_key[pkg1_id->kb])) {
|
||||
// for (u32 i = pkg1_id->kb; i > 0; i--) {
|
||||
// se_aes_key_set(8, master_key[i], 0x10);
|
||||
// se_aes_crypt_block_ecb(8, 0, master_key[i-1], mkey_vectors[i]);
|
||||
// }
|
||||
// se_aes_key_set(8, master_key[0], 0x10);
|
||||
// se_aes_crypt_block_ecb(8, 0, temp_key, mkey_vectors[0]);
|
||||
// if (_key_exists(temp_key)) {
|
||||
// EPRINTFARGS("Failed to derive master key. kb = %d", pkg1_id->kb);
|
||||
// }
|
||||
// } else if (_key_exists(master_key[KB_FIRMWARE_VERSION_MAX])) {
|
||||
// // handle sept version differences
|
||||
// for (u32 kb = KB_FIRMWARE_VERSION_MAX; kb >= KB_FIRMWARE_VERSION_620; kb--) {
|
||||
// for (u32 i = kb; i > 0; i--) {
|
||||
// se_aes_key_set(8, master_key[i], 0x10);
|
||||
// se_aes_crypt_block_ecb(8, 0, master_key[i-1], mkey_vectors[i]);
|
||||
// }
|
||||
// se_aes_key_set(8, master_key[0], 0x10);
|
||||
// se_aes_crypt_block_ecb(8, 0, temp_key, mkey_vectors[0]);
|
||||
// if (!_key_exists(temp_key)) {
|
||||
// break;
|
||||
// }
|
||||
// memcpy(master_key[kb-1], master_key[kb], 0x10);
|
||||
// memcpy(master_key[kb], zeros, 0x10);
|
||||
// }
|
||||
// if (_key_exists(temp_key)) {
|
||||
// EPRINTF("Failed to derive master key.");
|
||||
// }
|
||||
// }
|
||||
// }
|
||||
|
||||
u8 *keyblob_block = (u8 *)calloc(NX_EMMC_BLOCKSIZE, 1);
|
||||
u8 keyblob_mac[0x10] = {0};
|
||||
|
@ -387,12 +387,16 @@ void dump_keys() {
|
|||
gfx_hexdump(0, buffer, sizeof(buffer));
|
||||
//free(buffer);
|
||||
|
||||
verify();
|
||||
|
||||
writeClientCertHash();
|
||||
writeCal0Hash();
|
||||
// restore();
|
||||
|
||||
verify();
|
||||
|
||||
// writeClientCertHash();
|
||||
// writeCal0Hash();
|
||||
|
||||
// verify();
|
||||
|
||||
// verify();
|
||||
// free(tmp_copy);
|
||||
|
||||
|
||||
|
@ -686,11 +690,25 @@ bool writeData(u8 *buffer, u32 offset, u32 length)
|
|||
|
||||
bool writeHash(u32 hashOffset, u32 offset, u32 sz)
|
||||
{
|
||||
|
||||
u8 *buffer = (u8 *)malloc(NX_EMMC_BLOCKSIZE);
|
||||
|
||||
SHA256_CTX ctx;
|
||||
sha256_init(&ctx);
|
||||
|
||||
u32 newOffset = offset % NX_EMMC_BLOCKSIZE;
|
||||
|
||||
if (newOffset > 0 && newOffset + sz >= NX_EMMC_BLOCKSIZE)
|
||||
{
|
||||
u32 toRead = NX_EMMC_BLOCKSIZE - newOffset;
|
||||
readData(buffer, offset, toRead);
|
||||
// gfx_hexdump(0, buffer + NX_EMMC_BLOCKSIZE - 8, 8);
|
||||
sha256_update(&ctx, buffer, toRead);
|
||||
|
||||
sz -= toRead;
|
||||
offset += toRead;
|
||||
}
|
||||
|
||||
while (sz > NX_EMMC_BLOCKSIZE)
|
||||
{
|
||||
|
||||
|
@ -702,8 +720,8 @@ bool writeHash(u32 hashOffset, u32 offset, u32 sz)
|
|||
offset += NX_EMMC_BLOCKSIZE;
|
||||
}
|
||||
|
||||
if(sz > 0){
|
||||
|
||||
if (sz > 0)
|
||||
{
|
||||
|
||||
readData(buffer, offset, sz);
|
||||
sha256_update(&ctx, buffer, sz);
|
||||
|
@ -728,19 +746,32 @@ bool verifyHash(u32 hashOffset, u32 offset, u32 sz)
|
|||
SHA256_CTX ctx;
|
||||
sha256_init(&ctx);
|
||||
|
||||
while (sz > 64)
|
||||
u32 newOffset = offset % NX_EMMC_BLOCKSIZE;
|
||||
|
||||
if (newOffset > 0 && newOffset + sz >= NX_EMMC_BLOCKSIZE)
|
||||
{
|
||||
|
||||
readData(buffer, offset, 64);
|
||||
u32 toRead = NX_EMMC_BLOCKSIZE - newOffset;
|
||||
readData(buffer, offset, toRead);
|
||||
// gfx_hexdump(0, buffer + NX_EMMC_BLOCKSIZE - 8, 8);
|
||||
sha256_update(&ctx, buffer, 64);
|
||||
sha256_update(&ctx, buffer, toRead);
|
||||
|
||||
sz -= 64;
|
||||
offset += 64;
|
||||
sz -= toRead;
|
||||
offset += toRead;
|
||||
}
|
||||
|
||||
if(sz > 0){
|
||||
while (sz > NX_EMMC_BLOCKSIZE)
|
||||
{
|
||||
|
||||
readData(buffer, offset, NX_EMMC_BLOCKSIZE);
|
||||
// gfx_hexdump(0, buffer + NX_EMMC_BLOCKSIZE - 8, 8);
|
||||
sha256_update(&ctx, buffer, NX_EMMC_BLOCKSIZE);
|
||||
|
||||
sz -= NX_EMMC_BLOCKSIZE;
|
||||
offset += NX_EMMC_BLOCKSIZE;
|
||||
}
|
||||
|
||||
if (sz > 0)
|
||||
{
|
||||
|
||||
readData(buffer, offset, sz);
|
||||
sha256_update(&ctx, buffer, sz);
|
||||
|
@ -854,23 +885,51 @@ void backup(){
|
|||
f_open(&fp, "sd:/prodinfoENC.bin", FA_CREATE_NEW | FA_WRITE);
|
||||
size = 0x3FBC00;
|
||||
offset = 0;
|
||||
while(size > NX_EMMC_BLOCKSIZE){
|
||||
while(size > 0){
|
||||
nx_emmc_part_read(&storage, prodinfo_part, offset, 1, bufferNX);
|
||||
f_write(&fp, bufferNX, NX_EMMC_BLOCKSIZE, NULL);
|
||||
offset ++;
|
||||
size -= NX_EMMC_BLOCKSIZE;
|
||||
}
|
||||
if(size > 0){
|
||||
nx_emmc_part_read(&storage, prodinfo_part, offset, 1, bufferNX);
|
||||
f_write(&fp, bufferNX, size, NULL);
|
||||
}
|
||||
// if(size > 0){
|
||||
// nx_emmc_part_read(&storage, prodinfo_part, offset, 1, bufferNX);
|
||||
// f_write(&fp, bufferNX, size, NULL);
|
||||
// }
|
||||
|
||||
f_close(&fp);
|
||||
|
||||
gfx_printf("\n%kBackup encrypted done!", 4);
|
||||
gfx_printf("\n%kBackup encrypted done!", colors[4]);
|
||||
|
||||
}
|
||||
|
||||
bool restore(){
|
||||
FIL fp;
|
||||
if(f_open(&fp, "sd:/prodinfoENC.bin", FA_READ) != FR_OK){
|
||||
gfx_printf("\n%Cannot open prodinfEnc.bin!", 4);
|
||||
return false;
|
||||
}
|
||||
u8 bufferNX[NX_EMMC_BLOCKSIZE];
|
||||
|
||||
u32 size = 0x3FBC00;
|
||||
u32 offset = 0;
|
||||
while(size > 0){
|
||||
f_read(&fp, bufferNX, NX_EMMC_BLOCKSIZE, NULL);
|
||||
nx_emmc_part_write(&storage, prodinfo_part, offset, 1, bufferNX);
|
||||
offset ++;
|
||||
size -= NX_EMMC_BLOCKSIZE;
|
||||
}
|
||||
// if(size > 0){
|
||||
// f_read(&fp, bufferNX, size, NULL);
|
||||
// nx_emmc_part_write(&storage, prodinfo_part, offset, 1, bufferNX);
|
||||
// f_write(&fp, bufferNX, size, NULL);
|
||||
// }
|
||||
|
||||
f_close(&fp);
|
||||
|
||||
gfx_printf("\n%Restore encrypted done!", 4);
|
||||
return true;
|
||||
}
|
||||
|
||||
// bool erase(u32 offset, u32 sz)
|
||||
// {
|
||||
// u8 zero = 0;
|
||||
|
|
|
@ -25,5 +25,6 @@ bool writeData(u8 *buffer, u32 offset, u32 length);
|
|||
bool writeClientCertHash();
|
||||
bool writeCal0Hash();
|
||||
bool verify();
|
||||
bool restore();
|
||||
|
||||
#endif
|
||||
|
|
Loading…
Reference in a new issue