Add initial files
This commit is contained in:
commit
cd17480368
17 changed files with 5741 additions and 0 deletions
2
.gitignore
vendored
Normal file
2
.gitignore
vendored
Normal file
|
@ -0,0 +1,2 @@
|
|||
.directory
|
||||
/cmake-*build*
|
11
CMakeLists.txt
Normal file
11
CMakeLists.txt
Normal file
|
@ -0,0 +1,11 @@
|
|||
cmake_minimum_required(VERSION 3.16)
|
||||
project(pkgrip)
|
||||
|
||||
add_executable(pkgrip
|
||||
src/libkirk/aes.c
|
||||
src/libkirk/amctrl.c
|
||||
src/libkirk/bn.c
|
||||
src/libkirk/ec.c
|
||||
src/libkirk/kirk_engine.c
|
||||
src/libkirk/sha1.c
|
||||
src/pkgrip.c)
|
674
LICENSE
Normal file
674
LICENSE
Normal file
|
@ -0,0 +1,674 @@
|
|||
GNU GENERAL PUBLIC LICENSE
|
||||
Version 3, 29 June 2007
|
||||
|
||||
Copyright (C) 2007 Free Software Foundation, Inc. <http://fsf.org/>
|
||||
Everyone is permitted to copy and distribute verbatim copies
|
||||
of this license document, but changing it is not allowed.
|
||||
|
||||
Preamble
|
||||
|
||||
The GNU General Public License is a free, copyleft license for
|
||||
software and other kinds of works.
|
||||
|
||||
The licenses for most software and other practical works are designed
|
||||
to take away your freedom to share and change the works. By contrast,
|
||||
the GNU General Public License is intended to guarantee your freedom to
|
||||
share and change all versions of a program--to make sure it remains free
|
||||
software for all its users. We, the Free Software Foundation, use the
|
||||
GNU General Public License for most of our software; it applies also to
|
||||
any other work released this way by its authors. You can apply it to
|
||||
your programs, too.
|
||||
|
||||
When we speak of free software, we are referring to freedom, not
|
||||
price. Our General Public Licenses are designed to make sure that you
|
||||
have the freedom to distribute copies of free software (and charge for
|
||||
them if you wish), that you receive source code or can get it if you
|
||||
want it, that you can change the software or use pieces of it in new
|
||||
free programs, and that you know you can do these things.
|
||||
|
||||
To protect your rights, we need to prevent others from denying you
|
||||
these rights or asking you to surrender the rights. Therefore, you have
|
||||
certain responsibilities if you distribute copies of the software, or if
|
||||
you modify it: responsibilities to respect the freedom of others.
|
||||
|
||||
For example, if you distribute copies of such a program, whether
|
||||
gratis or for a fee, you must pass on to the recipients the same
|
||||
freedoms that you received. You must make sure that they, too, receive
|
||||
or can get the source code. And you must show them these terms so they
|
||||
know their rights.
|
||||
|
||||
Developers that use the GNU GPL protect your rights with two steps:
|
||||
(1) assert copyright on the software, and (2) offer you this License
|
||||
giving you legal permission to copy, distribute and/or modify it.
|
||||
|
||||
For the developers' and authors' protection, the GPL clearly explains
|
||||
that there is no warranty for this free software. For both users' and
|
||||
authors' sake, the GPL requires that modified versions be marked as
|
||||
changed, so that their problems will not be attributed erroneously to
|
||||
authors of previous versions.
|
||||
|
||||
Some devices are designed to deny users access to install or run
|
||||
modified versions of the software inside them, although the manufacturer
|
||||
can do so. This is fundamentally incompatible with the aim of
|
||||
protecting users' freedom to change the software. The systematic
|
||||
pattern of such abuse occurs in the area of products for individuals to
|
||||
use, which is precisely where it is most unacceptable. Therefore, we
|
||||
have designed this version of the GPL to prohibit the practice for those
|
||||
products. If such problems arise substantially in other domains, we
|
||||
stand ready to extend this provision to those domains in future versions
|
||||
of the GPL, as needed to protect the freedom of users.
|
||||
|
||||
Finally, every program is threatened constantly by software patents.
|
||||
States should not allow patents to restrict development and use of
|
||||
software on general-purpose computers, but in those that do, we wish to
|
||||
avoid the special danger that patents applied to a free program could
|
||||
make it effectively proprietary. To prevent this, the GPL assures that
|
||||
patents cannot be used to render the program non-free.
|
||||
|
||||
The precise terms and conditions for copying, distribution and
|
||||
modification follow.
|
||||
|
||||
TERMS AND CONDITIONS
|
||||
|
||||
0. Definitions.
|
||||
|
||||
"This License" refers to version 3 of the GNU General Public License.
|
||||
|
||||
"Copyright" also means copyright-like laws that apply to other kinds of
|
||||
works, such as semiconductor masks.
|
||||
|
||||
"The Program" refers to any copyrightable work licensed under this
|
||||
License. Each licensee is addressed as "you". "Licensees" and
|
||||
"recipients" may be individuals or organizations.
|
||||
|
||||
To "modify" a work means to copy from or adapt all or part of the work
|
||||
in a fashion requiring copyright permission, other than the making of an
|
||||
exact copy. The resulting work is called a "modified version" of the
|
||||
earlier work or a work "based on" the earlier work.
|
||||
|
||||
A "covered work" means either the unmodified Program or a work based
|
||||
on the Program.
|
||||
|
||||
To "propagate" a work means to do anything with it that, without
|
||||
permission, would make you directly or secondarily liable for
|
||||
infringement under applicable copyright law, except executing it on a
|
||||
computer or modifying a private copy. Propagation includes copying,
|
||||
distribution (with or without modification), making available to the
|
||||
public, and in some countries other activities as well.
|
||||
|
||||
To "convey" a work means any kind of propagation that enables other
|
||||
parties to make or receive copies. Mere interaction with a user through
|
||||
a computer network, with no transfer of a copy, is not conveying.
|
||||
|
||||
An interactive user interface displays "Appropriate Legal Notices"
|
||||
to the extent that it includes a convenient and prominently visible
|
||||
feature that (1) displays an appropriate copyright notice, and (2)
|
||||
tells the user that there is no warranty for the work (except to the
|
||||
extent that warranties are provided), that licensees may convey the
|
||||
work under this License, and how to view a copy of this License. If
|
||||
the interface presents a list of user commands or options, such as a
|
||||
menu, a prominent item in the list meets this criterion.
|
||||
|
||||
1. Source Code.
|
||||
|
||||
The "source code" for a work means the preferred form of the work
|
||||
for making modifications to it. "Object code" means any non-source
|
||||
form of a work.
|
||||
|
||||
A "Standard Interface" means an interface that either is an official
|
||||
standard defined by a recognized standards body, or, in the case of
|
||||
interfaces specified for a particular programming language, one that
|
||||
is widely used among developers working in that language.
|
||||
|
||||
The "System Libraries" of an executable work include anything, other
|
||||
than the work as a whole, that (a) is included in the normal form of
|
||||
packaging a Major Component, but which is not part of that Major
|
||||
Component, and (b) serves only to enable use of the work with that
|
||||
Major Component, or to implement a Standard Interface for which an
|
||||
implementation is available to the public in source code form. A
|
||||
"Major Component", in this context, means a major essential component
|
||||
(kernel, window system, and so on) of the specific operating system
|
||||
(if any) on which the executable work runs, or a compiler used to
|
||||
produce the work, or an object code interpreter used to run it.
|
||||
|
||||
The "Corresponding Source" for a work in object code form means all
|
||||
the source code needed to generate, install, and (for an executable
|
||||
work) run the object code and to modify the work, including scripts to
|
||||
control those activities. However, it does not include the work's
|
||||
System Libraries, or general-purpose tools or generally available free
|
||||
programs which are used unmodified in performing those activities but
|
||||
which are not part of the work. For example, Corresponding Source
|
||||
includes interface definition files associated with source files for
|
||||
the work, and the source code for shared libraries and dynamically
|
||||
linked subprograms that the work is specifically designed to require,
|
||||
such as by intimate data communication or control flow between those
|
||||
subprograms and other parts of the work.
|
||||
|
||||
The Corresponding Source need not include anything that users
|
||||
can regenerate automatically from other parts of the Corresponding
|
||||
Source.
|
||||
|
||||
The Corresponding Source for a work in source code form is that
|
||||
same work.
|
||||
|
||||
2. Basic Permissions.
|
||||
|
||||
All rights granted under this License are granted for the term of
|
||||
copyright on the Program, and are irrevocable provided the stated
|
||||
conditions are met. This License explicitly affirms your unlimited
|
||||
permission to run the unmodified Program. The output from running a
|
||||
covered work is covered by this License only if the output, given its
|
||||
content, constitutes a covered work. This License acknowledges your
|
||||
rights of fair use or other equivalent, as provided by copyright law.
|
||||
|
||||
You may make, run and propagate covered works that you do not
|
||||
convey, without conditions so long as your license otherwise remains
|
||||
in force. You may convey covered works to others for the sole purpose
|
||||
of having them make modifications exclusively for you, or provide you
|
||||
with facilities for running those works, provided that you comply with
|
||||
the terms of this License in conveying all material for which you do
|
||||
not control copyright. Those thus making or running the covered works
|
||||
for you must do so exclusively on your behalf, under your direction
|
||||
and control, on terms that prohibit them from making any copies of
|
||||
your copyrighted material outside their relationship with you.
|
||||
|
||||
Conveying under any other circumstances is permitted solely under
|
||||
the conditions stated below. Sublicensing is not allowed; section 10
|
||||
makes it unnecessary.
|
||||
|
||||
3. Protecting Users' Legal Rights From Anti-Circumvention Law.
|
||||
|
||||
No covered work shall be deemed part of an effective technological
|
||||
measure under any applicable law fulfilling obligations under article
|
||||
11 of the WIPO copyright treaty adopted on 20 December 1996, or
|
||||
similar laws prohibiting or restricting circumvention of such
|
||||
measures.
|
||||
|
||||
When you convey a covered work, you waive any legal power to forbid
|
||||
circumvention of technological measures to the extent such circumvention
|
||||
is effected by exercising rights under this License with respect to
|
||||
the covered work, and you disclaim any intention to limit operation or
|
||||
modification of the work as a means of enforcing, against the work's
|
||||
users, your or third parties' legal rights to forbid circumvention of
|
||||
technological measures.
|
||||
|
||||
4. Conveying Verbatim Copies.
|
||||
|
||||
You may convey verbatim copies of the Program's source code as you
|
||||
receive it, in any medium, provided that you conspicuously and
|
||||
appropriately publish on each copy an appropriate copyright notice;
|
||||
keep intact all notices stating that this License and any
|
||||
non-permissive terms added in accord with section 7 apply to the code;
|
||||
keep intact all notices of the absence of any warranty; and give all
|
||||
recipients a copy of this License along with the Program.
|
||||
|
||||
You may charge any price or no price for each copy that you convey,
|
||||
and you may offer support or warranty protection for a fee.
|
||||
|
||||
5. Conveying Modified Source Versions.
|
||||
|
||||
You may convey a work based on the Program, or the modifications to
|
||||
produce it from the Program, in the form of source code under the
|
||||
terms of section 4, provided that you also meet all of these conditions:
|
||||
|
||||
a) The work must carry prominent notices stating that you modified
|
||||
it, and giving a relevant date.
|
||||
|
||||
b) The work must carry prominent notices stating that it is
|
||||
released under this License and any conditions added under section
|
||||
7. This requirement modifies the requirement in section 4 to
|
||||
"keep intact all notices".
|
||||
|
||||
c) You must license the entire work, as a whole, under this
|
||||
License to anyone who comes into possession of a copy. This
|
||||
License will therefore apply, along with any applicable section 7
|
||||
additional terms, to the whole of the work, and all its parts,
|
||||
regardless of how they are packaged. This License gives no
|
||||
permission to license the work in any other way, but it does not
|
||||
invalidate such permission if you have separately received it.
|
||||
|
||||
d) If the work has interactive user interfaces, each must display
|
||||
Appropriate Legal Notices; however, if the Program has interactive
|
||||
interfaces that do not display Appropriate Legal Notices, your
|
||||
work need not make them do so.
|
||||
|
||||
A compilation of a covered work with other separate and independent
|
||||
works, which are not by their nature extensions of the covered work,
|
||||
and which are not combined with it such as to form a larger program,
|
||||
in or on a volume of a storage or distribution medium, is called an
|
||||
"aggregate" if the compilation and its resulting copyright are not
|
||||
used to limit the access or legal rights of the compilation's users
|
||||
beyond what the individual works permit. Inclusion of a covered work
|
||||
in an aggregate does not cause this License to apply to the other
|
||||
parts of the aggregate.
|
||||
|
||||
6. Conveying Non-Source Forms.
|
||||
|
||||
You may convey a covered work in object code form under the terms
|
||||
of sections 4 and 5, provided that you also convey the
|
||||
machine-readable Corresponding Source under the terms of this License,
|
||||
in one of these ways:
|
||||
|
||||
a) Convey the object code in, or embodied in, a physical product
|
||||
(including a physical distribution medium), accompanied by the
|
||||
Corresponding Source fixed on a durable physical medium
|
||||
customarily used for software interchange.
|
||||
|
||||
b) Convey the object code in, or embodied in, a physical product
|
||||
(including a physical distribution medium), accompanied by a
|
||||
written offer, valid for at least three years and valid for as
|
||||
long as you offer spare parts or customer support for that product
|
||||
model, to give anyone who possesses the object code either (1) a
|
||||
copy of the Corresponding Source for all the software in the
|
||||
product that is covered by this License, on a durable physical
|
||||
medium customarily used for software interchange, for a price no
|
||||
more than your reasonable cost of physically performing this
|
||||
conveying of source, or (2) access to copy the
|
||||
Corresponding Source from a network server at no charge.
|
||||
|
||||
c) Convey individual copies of the object code with a copy of the
|
||||
written offer to provide the Corresponding Source. This
|
||||
alternative is allowed only occasionally and noncommercially, and
|
||||
only if you received the object code with such an offer, in accord
|
||||
with subsection 6b.
|
||||
|
||||
d) Convey the object code by offering access from a designated
|
||||
place (gratis or for a charge), and offer equivalent access to the
|
||||
Corresponding Source in the same way through the same place at no
|
||||
further charge. You need not require recipients to copy the
|
||||
Corresponding Source along with the object code. If the place to
|
||||
copy the object code is a network server, the Corresponding Source
|
||||
may be on a different server (operated by you or a third party)
|
||||
that supports equivalent copying facilities, provided you maintain
|
||||
clear directions next to the object code saying where to find the
|
||||
Corresponding Source. Regardless of what server hosts the
|
||||
Corresponding Source, you remain obligated to ensure that it is
|
||||
available for as long as needed to satisfy these requirements.
|
||||
|
||||
e) Convey the object code using peer-to-peer transmission, provided
|
||||
you inform other peers where the object code and Corresponding
|
||||
Source of the work are being offered to the general public at no
|
||||
charge under subsection 6d.
|
||||
|
||||
A separable portion of the object code, whose source code is excluded
|
||||
from the Corresponding Source as a System Library, need not be
|
||||
included in conveying the object code work.
|
||||
|
||||
A "User Product" is either (1) a "consumer product", which means any
|
||||
tangible personal property which is normally used for personal, family,
|
||||
or household purposes, or (2) anything designed or sold for incorporation
|
||||
into a dwelling. In determining whether a product is a consumer product,
|
||||
doubtful cases shall be resolved in favor of coverage. For a particular
|
||||
product received by a particular user, "normally used" refers to a
|
||||
typical or common use of that class of product, regardless of the status
|
||||
of the particular user or of the way in which the particular user
|
||||
actually uses, or expects or is expected to use, the product. A product
|
||||
is a consumer product regardless of whether the product has substantial
|
||||
commercial, industrial or non-consumer uses, unless such uses represent
|
||||
the only significant mode of use of the product.
|
||||
|
||||
"Installation Information" for a User Product means any methods,
|
||||
procedures, authorization keys, or other information required to install
|
||||
and execute modified versions of a covered work in that User Product from
|
||||
a modified version of its Corresponding Source. The information must
|
||||
suffice to ensure that the continued functioning of the modified object
|
||||
code is in no case prevented or interfered with solely because
|
||||
modification has been made.
|
||||
|
||||
If you convey an object code work under this section in, or with, or
|
||||
specifically for use in, a User Product, and the conveying occurs as
|
||||
part of a transaction in which the right of possession and use of the
|
||||
User Product is transferred to the recipient in perpetuity or for a
|
||||
fixed term (regardless of how the transaction is characterized), the
|
||||
Corresponding Source conveyed under this section must be accompanied
|
||||
by the Installation Information. But this requirement does not apply
|
||||
if neither you nor any third party retains the ability to install
|
||||
modified object code on the User Product (for example, the work has
|
||||
been installed in ROM).
|
||||
|
||||
The requirement to provide Installation Information does not include a
|
||||
requirement to continue to provide support service, warranty, or updates
|
||||
for a work that has been modified or installed by the recipient, or for
|
||||
the User Product in which it has been modified or installed. Access to a
|
||||
network may be denied when the modification itself materially and
|
||||
adversely affects the operation of the network or violates the rules and
|
||||
protocols for communication across the network.
|
||||
|
||||
Corresponding Source conveyed, and Installation Information provided,
|
||||
in accord with this section must be in a format that is publicly
|
||||
documented (and with an implementation available to the public in
|
||||
source code form), and must require no special password or key for
|
||||
unpacking, reading or copying.
|
||||
|
||||
7. Additional Terms.
|
||||
|
||||
"Additional permissions" are terms that supplement the terms of this
|
||||
License by making exceptions from one or more of its conditions.
|
||||
Additional permissions that are applicable to the entire Program shall
|
||||
be treated as though they were included in this License, to the extent
|
||||
that they are valid under applicable law. If additional permissions
|
||||
apply only to part of the Program, that part may be used separately
|
||||
under those permissions, but the entire Program remains governed by
|
||||
this License without regard to the additional permissions.
|
||||
|
||||
When you convey a copy of a covered work, you may at your option
|
||||
remove any additional permissions from that copy, or from any part of
|
||||
it. (Additional permissions may be written to require their own
|
||||
removal in certain cases when you modify the work.) You may place
|
||||
additional permissions on material, added by you to a covered work,
|
||||
for which you have or can give appropriate copyright permission.
|
||||
|
||||
Notwithstanding any other provision of this License, for material you
|
||||
add to a covered work, you may (if authorized by the copyright holders of
|
||||
that material) supplement the terms of this License with terms:
|
||||
|
||||
a) Disclaiming warranty or limiting liability differently from the
|
||||
terms of sections 15 and 16 of this License; or
|
||||
|
||||
b) Requiring preservation of specified reasonable legal notices or
|
||||
author attributions in that material or in the Appropriate Legal
|
||||
Notices displayed by works containing it; or
|
||||
|
||||
c) Prohibiting misrepresentation of the origin of that material, or
|
||||
requiring that modified versions of such material be marked in
|
||||
reasonable ways as different from the original version; or
|
||||
|
||||
d) Limiting the use for publicity purposes of names of licensors or
|
||||
authors of the material; or
|
||||
|
||||
e) Declining to grant rights under trademark law for use of some
|
||||
trade names, trademarks, or service marks; or
|
||||
|
||||
f) Requiring indemnification of licensors and authors of that
|
||||
material by anyone who conveys the material (or modified versions of
|
||||
it) with contractual assumptions of liability to the recipient, for
|
||||
any liability that these contractual assumptions directly impose on
|
||||
those licensors and authors.
|
||||
|
||||
All other non-permissive additional terms are considered "further
|
||||
restrictions" within the meaning of section 10. If the Program as you
|
||||
received it, or any part of it, contains a notice stating that it is
|
||||
governed by this License along with a term that is a further
|
||||
restriction, you may remove that term. If a license document contains
|
||||
a further restriction but permits relicensing or conveying under this
|
||||
License, you may add to a covered work material governed by the terms
|
||||
of that license document, provided that the further restriction does
|
||||
not survive such relicensing or conveying.
|
||||
|
||||
If you add terms to a covered work in accord with this section, you
|
||||
must place, in the relevant source files, a statement of the
|
||||
additional terms that apply to those files, or a notice indicating
|
||||
where to find the applicable terms.
|
||||
|
||||
Additional terms, permissive or non-permissive, may be stated in the
|
||||
form of a separately written license, or stated as exceptions;
|
||||
the above requirements apply either way.
|
||||
|
||||
8. Termination.
|
||||
|
||||
You may not propagate or modify a covered work except as expressly
|
||||
provided under this License. Any attempt otherwise to propagate or
|
||||
modify it is void, and will automatically terminate your rights under
|
||||
this License (including any patent licenses granted under the third
|
||||
paragraph of section 11).
|
||||
|
||||
However, if you cease all violation of this License, then your
|
||||
license from a particular copyright holder is reinstated (a)
|
||||
provisionally, unless and until the copyright holder explicitly and
|
||||
finally terminates your license, and (b) permanently, if the copyright
|
||||
holder fails to notify you of the violation by some reasonable means
|
||||
prior to 60 days after the cessation.
|
||||
|
||||
Moreover, your license from a particular copyright holder is
|
||||
reinstated permanently if the copyright holder notifies you of the
|
||||
violation by some reasonable means, this is the first time you have
|
||||
received notice of violation of this License (for any work) from that
|
||||
copyright holder, and you cure the violation prior to 30 days after
|
||||
your receipt of the notice.
|
||||
|
||||
Termination of your rights under this section does not terminate the
|
||||
licenses of parties who have received copies or rights from you under
|
||||
this License. If your rights have been terminated and not permanently
|
||||
reinstated, you do not qualify to receive new licenses for the same
|
||||
material under section 10.
|
||||
|
||||
9. Acceptance Not Required for Having Copies.
|
||||
|
||||
You are not required to accept this License in order to receive or
|
||||
run a copy of the Program. Ancillary propagation of a covered work
|
||||
occurring solely as a consequence of using peer-to-peer transmission
|
||||
to receive a copy likewise does not require acceptance. However,
|
||||
nothing other than this License grants you permission to propagate or
|
||||
modify any covered work. These actions infringe copyright if you do
|
||||
not accept this License. Therefore, by modifying or propagating a
|
||||
covered work, you indicate your acceptance of this License to do so.
|
||||
|
||||
10. Automatic Licensing of Downstream Recipients.
|
||||
|
||||
Each time you convey a covered work, the recipient automatically
|
||||
receives a license from the original licensors, to run, modify and
|
||||
propagate that work, subject to this License. You are not responsible
|
||||
for enforcing compliance by third parties with this License.
|
||||
|
||||
An "entity transaction" is a transaction transferring control of an
|
||||
organization, or substantially all assets of one, or subdividing an
|
||||
organization, or merging organizations. If propagation of a covered
|
||||
work results from an entity transaction, each party to that
|
||||
transaction who receives a copy of the work also receives whatever
|
||||
licenses to the work the party's predecessor in interest had or could
|
||||
give under the previous paragraph, plus a right to possession of the
|
||||
Corresponding Source of the work from the predecessor in interest, if
|
||||
the predecessor has it or can get it with reasonable efforts.
|
||||
|
||||
You may not impose any further restrictions on the exercise of the
|
||||
rights granted or affirmed under this License. For example, you may
|
||||
not impose a license fee, royalty, or other charge for exercise of
|
||||
rights granted under this License, and you may not initiate litigation
|
||||
(including a cross-claim or counterclaim in a lawsuit) alleging that
|
||||
any patent claim is infringed by making, using, selling, offering for
|
||||
sale, or importing the Program or any portion of it.
|
||||
|
||||
11. Patents.
|
||||
|
||||
A "contributor" is a copyright holder who authorizes use under this
|
||||
License of the Program or a work on which the Program is based. The
|
||||
work thus licensed is called the contributor's "contributor version".
|
||||
|
||||
A contributor's "essential patent claims" are all patent claims
|
||||
owned or controlled by the contributor, whether already acquired or
|
||||
hereafter acquired, that would be infringed by some manner, permitted
|
||||
by this License, of making, using, or selling its contributor version,
|
||||
but do not include claims that would be infringed only as a
|
||||
consequence of further modification of the contributor version. For
|
||||
purposes of this definition, "control" includes the right to grant
|
||||
patent sublicenses in a manner consistent with the requirements of
|
||||
this License.
|
||||
|
||||
Each contributor grants you a non-exclusive, worldwide, royalty-free
|
||||
patent license under the contributor's essential patent claims, to
|
||||
make, use, sell, offer for sale, import and otherwise run, modify and
|
||||
propagate the contents of its contributor version.
|
||||
|
||||
In the following three paragraphs, a "patent license" is any express
|
||||
agreement or commitment, however denominated, not to enforce a patent
|
||||
(such as an express permission to practice a patent or covenant not to
|
||||
sue for patent infringement). To "grant" such a patent license to a
|
||||
party means to make such an agreement or commitment not to enforce a
|
||||
patent against the party.
|
||||
|
||||
If you convey a covered work, knowingly relying on a patent license,
|
||||
and the Corresponding Source of the work is not available for anyone
|
||||
to copy, free of charge and under the terms of this License, through a
|
||||
publicly available network server or other readily accessible means,
|
||||
then you must either (1) cause the Corresponding Source to be so
|
||||
available, or (2) arrange to deprive yourself of the benefit of the
|
||||
patent license for this particular work, or (3) arrange, in a manner
|
||||
consistent with the requirements of this License, to extend the patent
|
||||
license to downstream recipients. "Knowingly relying" means you have
|
||||
actual knowledge that, but for the patent license, your conveying the
|
||||
covered work in a country, or your recipient's use of the covered work
|
||||
in a country, would infringe one or more identifiable patents in that
|
||||
country that you have reason to believe are valid.
|
||||
|
||||
If, pursuant to or in connection with a single transaction or
|
||||
arrangement, you convey, or propagate by procuring conveyance of, a
|
||||
covered work, and grant a patent license to some of the parties
|
||||
receiving the covered work authorizing them to use, propagate, modify
|
||||
or convey a specific copy of the covered work, then the patent license
|
||||
you grant is automatically extended to all recipients of the covered
|
||||
work and works based on it.
|
||||
|
||||
A patent license is "discriminatory" if it does not include within
|
||||
the scope of its coverage, prohibits the exercise of, or is
|
||||
conditioned on the non-exercise of one or more of the rights that are
|
||||
specifically granted under this License. You may not convey a covered
|
||||
work if you are a party to an arrangement with a third party that is
|
||||
in the business of distributing software, under which you make payment
|
||||
to the third party based on the extent of your activity of conveying
|
||||
the work, and under which the third party grants, to any of the
|
||||
parties who would receive the covered work from you, a discriminatory
|
||||
patent license (a) in connection with copies of the covered work
|
||||
conveyed by you (or copies made from those copies), or (b) primarily
|
||||
for and in connection with specific products or compilations that
|
||||
contain the covered work, unless you entered into that arrangement,
|
||||
or that patent license was granted, prior to 28 March 2007.
|
||||
|
||||
Nothing in this License shall be construed as excluding or limiting
|
||||
any implied license or other defenses to infringement that may
|
||||
otherwise be available to you under applicable patent law.
|
||||
|
||||
12. No Surrender of Others' Freedom.
|
||||
|
||||
If conditions are imposed on you (whether by court order, agreement or
|
||||
otherwise) that contradict the conditions of this License, they do not
|
||||
excuse you from the conditions of this License. If you cannot convey a
|
||||
covered work so as to satisfy simultaneously your obligations under this
|
||||
License and any other pertinent obligations, then as a consequence you may
|
||||
not convey it at all. For example, if you agree to terms that obligate you
|
||||
to collect a royalty for further conveying from those to whom you convey
|
||||
the Program, the only way you could satisfy both those terms and this
|
||||
License would be to refrain entirely from conveying the Program.
|
||||
|
||||
13. Use with the GNU Affero General Public License.
|
||||
|
||||
Notwithstanding any other provision of this License, you have
|
||||
permission to link or combine any covered work with a work licensed
|
||||
under version 3 of the GNU Affero General Public License into a single
|
||||
combined work, and to convey the resulting work. The terms of this
|
||||
License will continue to apply to the part which is the covered work,
|
||||
but the special requirements of the GNU Affero General Public License,
|
||||
section 13, concerning interaction through a network will apply to the
|
||||
combination as such.
|
||||
|
||||
14. Revised Versions of this License.
|
||||
|
||||
The Free Software Foundation may publish revised and/or new versions of
|
||||
the GNU General Public License from time to time. Such new versions will
|
||||
be similar in spirit to the present version, but may differ in detail to
|
||||
address new problems or concerns.
|
||||
|
||||
Each version is given a distinguishing version number. If the
|
||||
Program specifies that a certain numbered version of the GNU General
|
||||
Public License "or any later version" applies to it, you have the
|
||||
option of following the terms and conditions either of that numbered
|
||||
version or of any later version published by the Free Software
|
||||
Foundation. If the Program does not specify a version number of the
|
||||
GNU General Public License, you may choose any version ever published
|
||||
by the Free Software Foundation.
|
||||
|
||||
If the Program specifies that a proxy can decide which future
|
||||
versions of the GNU General Public License can be used, that proxy's
|
||||
public statement of acceptance of a version permanently authorizes you
|
||||
to choose that version for the Program.
|
||||
|
||||
Later license versions may give you additional or different
|
||||
permissions. However, no additional obligations are imposed on any
|
||||
author or copyright holder as a result of your choosing to follow a
|
||||
later version.
|
||||
|
||||
15. Disclaimer of Warranty.
|
||||
|
||||
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
|
||||
APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
|
||||
HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY
|
||||
OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
|
||||
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||
PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM
|
||||
IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
|
||||
ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
|
||||
|
||||
16. Limitation of Liability.
|
||||
|
||||
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
|
||||
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS
|
||||
THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
|
||||
GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE
|
||||
USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
|
||||
DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
|
||||
PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),
|
||||
EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
|
||||
SUCH DAMAGES.
|
||||
|
||||
17. Interpretation of Sections 15 and 16.
|
||||
|
||||
If the disclaimer of warranty and limitation of liability provided
|
||||
above cannot be given local legal effect according to their terms,
|
||||
reviewing courts shall apply local law that most closely approximates
|
||||
an absolute waiver of all civil liability in connection with the
|
||||
Program, unless a warranty or assumption of liability accompanies a
|
||||
copy of the Program in return for a fee.
|
||||
|
||||
END OF TERMS AND CONDITIONS
|
||||
|
||||
How to Apply These Terms to Your New Programs
|
||||
|
||||
If you develop a new program, and you want it to be of the greatest
|
||||
possible use to the public, the best way to achieve this is to make it
|
||||
free software which everyone can redistribute and change under these terms.
|
||||
|
||||
To do so, attach the following notices to the program. It is safest
|
||||
to attach them to the start of each source file to most effectively
|
||||
state the exclusion of warranty; and each file should have at least
|
||||
the "copyright" line and a pointer to where the full notice is found.
|
||||
|
||||
<one line to give the program's name and a brief idea of what it does.>
|
||||
Copyright (C) <year> <name of author>
|
||||
|
||||
This program is free software: you can redistribute it and/or modify
|
||||
it under the terms of the GNU General Public License as published by
|
||||
the Free Software Foundation, either version 3 of the License, or
|
||||
(at your option) any later version.
|
||||
|
||||
This program is distributed in the hope that it will be useful,
|
||||
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
GNU General Public License for more details.
|
||||
|
||||
You should have received a copy of the GNU General Public License
|
||||
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
|
||||
Also add information on how to contact you by electronic and paper mail.
|
||||
|
||||
If the program does terminal interaction, make it output a short
|
||||
notice like this when it starts in an interactive mode:
|
||||
|
||||
<program> Copyright (C) <year> <name of author>
|
||||
This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
|
||||
This is free software, and you are welcome to redistribute it
|
||||
under certain conditions; type `show c' for details.
|
||||
|
||||
The hypothetical commands `show w' and `show c' should show the appropriate
|
||||
parts of the General Public License. Of course, your program's commands
|
||||
might be different; for a GUI interface, you would use an "about box".
|
||||
|
||||
You should also get your employer (if you work as a programmer) or school,
|
||||
if any, to sign a "copyright disclaimer" for the program, if necessary.
|
||||
For more information on this, and how to apply and follow the GNU GPL, see
|
||||
<http://www.gnu.org/licenses/>.
|
||||
|
||||
The GNU General Public License does not permit incorporating your program
|
||||
into proprietary programs. If your program is a subroutine library, you
|
||||
may consider it more useful to permit linking proprietary applications with
|
||||
the library. If this is what you want to do, use the GNU Lesser General
|
||||
Public License instead of this License. But first, please read
|
||||
<http://www.gnu.org/philosophy/why-not-lgpl.html>.
|
31
README.md
Normal file
31
README.md
Normal file
|
@ -0,0 +1,31 @@
|
|||
# pkgrip
|
||||
|
||||
Tool for decrypting PS3/PSP [PKG files](https://psdevwiki.com/ps3/PKG_files).
|
||||
|
||||
This is modified [from it's original source code](https://github.com/qwikrazor87/pkgrip) to include some patches, and fixes I needed for what I needed the tool for. I also ported to CMake.
|
||||
|
||||
## Usage
|
||||
|
||||
Compile with CMake and then run `pkgrip`:
|
||||
|
||||
```shell
|
||||
$ ./pkgrip
|
||||
Usage:
|
||||
pkgrip [options] pathtopkg
|
||||
|
||||
Options: (optional)
|
||||
-psp - extract PSP files only
|
||||
-ps3 - extract PS3 files only
|
||||
Both enabled by default.
|
||||
```
|
||||
|
||||
## Credits
|
||||
|
||||
* [qwikrazor87](https://github.com/qwikrazor87) for writing pkgrip.
|
||||
* [misha](https://github.com/it-misha) for her patch to increase the supported file up to 16 GB.
|
||||
|
||||
## License
|
||||
|
||||

|
||||
|
||||
This project is licensed under the GNU General Public License 3. Some parts of libkirk may be licensed differently.
|
1463
src/libkirk/aes.c
Normal file
1463
src/libkirk/aes.c
Normal file
File diff suppressed because it is too large
Load diff
51
src/libkirk/aes.h
Normal file
51
src/libkirk/aes.h
Normal file
|
@ -0,0 +1,51 @@
|
|||
#ifndef __RIJNDAEL_H
|
||||
#define __RIJNDAEL_H
|
||||
|
||||
#include "kirk_engine.h"
|
||||
|
||||
#define AES_KEY_LEN_128 (128)
|
||||
#define AES_KEY_LEN_192 (192)
|
||||
#define AES_KEY_LEN_256 (256)
|
||||
|
||||
#define AES_BUFFER_SIZE (16)
|
||||
|
||||
#define AES_MAXKEYBITS (256)
|
||||
#define AES_MAXKEYBYTES (AES_MAXKEYBITS/8)
|
||||
/* for 256-bit keys, fewer for less */
|
||||
#define AES_MAXROUNDS 14
|
||||
#define pwuAESContextBuffer rijndael_ctx
|
||||
|
||||
/* The structure for key information */
|
||||
typedef struct
|
||||
{
|
||||
int enc_only; /* context contains only encrypt schedule */
|
||||
int Nr; /* key-length-dependent number of rounds */
|
||||
u32 ek[4*(AES_MAXROUNDS + 1)]; /* encrypt key schedule */
|
||||
u32 dk[4*(AES_MAXROUNDS + 1)]; /* decrypt key schedule */
|
||||
} rijndael_ctx;
|
||||
|
||||
typedef struct
|
||||
{
|
||||
int enc_only; /* context contains only encrypt schedule */
|
||||
int Nr; /* key-length-dependent number of rounds */
|
||||
u32 ek[4*(AES_MAXROUNDS + 1)]; /* encrypt key schedule */
|
||||
u32 dk[4*(AES_MAXROUNDS + 1)]; /* decrypt key schedule */
|
||||
} AES_ctx;
|
||||
|
||||
int rijndael_set_key(rijndael_ctx *, const u8 *, int);
|
||||
int rijndael_set_key_enc_only(rijndael_ctx *, const u8 *, int);
|
||||
void rijndael_decrypt(rijndael_ctx *, const u8 *, u8 *);
|
||||
void rijndael_encrypt(rijndael_ctx *, const u8 *, u8 *);
|
||||
|
||||
int AES_set_key(AES_ctx *ctx, const u8 *key, int bits);
|
||||
void AES_encrypt(AES_ctx *ctx, const u8 *src, u8 *dst);
|
||||
void AES_decrypt(AES_ctx *ctx, const u8 *src, u8 *dst);
|
||||
void AES_cbc_encrypt(AES_ctx *ctx, u8 *src, u8 *dst, int size);
|
||||
void AES_cbc_decrypt(AES_ctx *ctx, u8 *src, u8 *dst, int size);
|
||||
void AES_CMAC(AES_ctx *ctx, unsigned char *input, int length, unsigned char *mac);
|
||||
|
||||
int rijndaelKeySetupEnc(unsigned int [], const unsigned char [], int);
|
||||
int rijndaelKeySetupDec(unsigned int [], const unsigned char [], int);
|
||||
void rijndaelEncrypt(const unsigned int [], int, const unsigned char [], unsigned char []);
|
||||
|
||||
#endif /* __RIJNDAEL_H */
|
825
src/libkirk/amctrl.c
Normal file
825
src/libkirk/amctrl.c
Normal file
|
@ -0,0 +1,825 @@
|
|||
// Copyright (C) 2013 tpu
|
||||
// Copyright (C) 2015 Hykem <hykem@hotmail.com>
|
||||
// Licensed under the terms of the GNU GPL, version 3
|
||||
// http://www.gnu.org/licenses/gpl-3.0.txt
|
||||
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
|
||||
#include "kirk_engine.h"
|
||||
#include "amctrl.h"
|
||||
#include "aes.h"
|
||||
|
||||
// KIRK buffer.
|
||||
static u8 kirk_buf[0x0814];
|
||||
|
||||
// AMCTRL keys.
|
||||
static u8 amctrl_key1[0x10] = {0xE3, 0x50, 0xED, 0x1D, 0x91, 0x0A, 0x1F, 0xD0, 0x29, 0xBB, 0x1C, 0x3E, 0xF3, 0x40, 0x77, 0xFB};
|
||||
static u8 amctrl_key2[0x10] = {0x13, 0x5F, 0xA4, 0x7C, 0xAB, 0x39, 0x5B, 0xA4, 0x76, 0xB8, 0xCC, 0xA9, 0x8F, 0x3A, 0x04, 0x45};
|
||||
static u8 amctrl_key3[0x10] = {0x67, 0x8D, 0x7F, 0xA3, 0x2A, 0x9C, 0xA0, 0xD1, 0x50, 0x8A, 0xD8, 0x38, 0x5E, 0x4B, 0x01, 0x7E};
|
||||
|
||||
u8 dnas_key1A90[] = {0xED,0xE2,0x5D,0x2D,0xBB,0xF8,0x12,0xE5,0x3C,0x5C,0x59,0x32,0xFA,0xE3,0xE2,0x43};
|
||||
u8 dnas_key1AA0[] = {0x27,0x74,0xFB,0xEB,0xA4,0xA0,0x01,0xD7,0x02,0x56,0x9E,0x33,0x8C,0x19,0x57,0x83};
|
||||
|
||||
// sceNpDrmGetFixedKey keys.
|
||||
static u8 npdrm_enc_keys[0x30] = {
|
||||
0x07, 0x3D, 0x9E, 0x9D, 0xA8, 0xFD, 0x3B, 0x2F, 0x63, 0x18, 0x93, 0x2E, 0xF8, 0x57, 0xA6, 0x64,
|
||||
0x37, 0x49, 0xB7, 0x01, 0xCA, 0xE2, 0xE0, 0xC5, 0x44, 0x2E, 0x06, 0xB6, 0x1E, 0xFF, 0x84, 0xF2,
|
||||
0x9D, 0x31, 0xB8, 0x5A, 0xC8, 0xFA, 0x16, 0x80, 0x73, 0x60, 0x18, 0x82, 0x18, 0x77, 0x91, 0x9D,
|
||||
};
|
||||
static u8 npdrm_fixed_key[0x10] = {
|
||||
0x38, 0x20, 0xD0, 0x11, 0x07, 0xA3, 0xFF, 0x3E, 0x0A, 0x4C, 0x20, 0x85, 0x39, 0x10, 0xB5, 0x54,
|
||||
};
|
||||
|
||||
/*
|
||||
KIRK wrapper functions.
|
||||
*/
|
||||
static int kirk4(u8 *buf, int size, int type)
|
||||
{
|
||||
int retv;
|
||||
u32 *header = (u32*)buf;
|
||||
|
||||
header[0] = 4;
|
||||
header[1] = 0;
|
||||
header[2] = 0;
|
||||
header[3] = type;
|
||||
header[4] = size;
|
||||
|
||||
retv = sceUtilsBufferCopyWithRange(buf, size + 0x14, buf, size, 4);
|
||||
|
||||
if (retv)
|
||||
return 0x80510311;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int kirk7(u8 *buf, int size, int type)
|
||||
{
|
||||
int retv;
|
||||
u32 *header = (u32*)buf;
|
||||
|
||||
header[0] = 5;
|
||||
header[1] = 0;
|
||||
header[2] = 0;
|
||||
header[3] = type;
|
||||
header[4] = size;
|
||||
|
||||
retv = sceUtilsBufferCopyWithRange(buf, size + 0x14, buf, size, 7);
|
||||
|
||||
if (retv)
|
||||
return 0x80510311;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int kirk5(u8 *buf, int size)
|
||||
{
|
||||
int retv;
|
||||
u32 *header = (u32*)buf;
|
||||
|
||||
header[0] = 4;
|
||||
header[1] = 0;
|
||||
header[2] = 0;
|
||||
header[3] = 0x0100;
|
||||
header[4] = size;
|
||||
|
||||
retv = sceUtilsBufferCopyWithRange(buf, size + 0x14, buf, size, 5);
|
||||
|
||||
if (retv)
|
||||
return 0x80510312;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int kirk8(u8 *buf, int size)
|
||||
{
|
||||
int retv;
|
||||
u32 *header = (u32*)buf;
|
||||
|
||||
header[0] = 5;
|
||||
header[1] = 0;
|
||||
header[2] = 0;
|
||||
header[3] = 0x0100;
|
||||
header[4] = size;
|
||||
|
||||
retv = sceUtilsBufferCopyWithRange(buf, size+0x14, buf, size, 8);
|
||||
|
||||
if (retv)
|
||||
return 0x80510312;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int kirk14(u8 *buf)
|
||||
{
|
||||
int retv;
|
||||
|
||||
retv = sceUtilsBufferCopyWithRange(buf, 0x14, 0, 0, 14);
|
||||
|
||||
if (retv)
|
||||
return 0x80510315;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
/*
|
||||
Internal functions.
|
||||
*/
|
||||
static int encrypt_buf(u8 *buf, int size, u8 *key, int key_type)
|
||||
{
|
||||
int i, retv;
|
||||
|
||||
for (i = 0; i < 16; i++) {
|
||||
buf[0x14+i] ^= key[i];
|
||||
}
|
||||
|
||||
retv = kirk4(buf, size, key_type);
|
||||
|
||||
if (retv)
|
||||
return retv;
|
||||
|
||||
memcpy(key, buf + size + 4, 16);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int decrypt_buf(u8 *buf, int size, u8 *key, int key_type)
|
||||
{
|
||||
int i, retv;
|
||||
u8 tmp[16];
|
||||
|
||||
memcpy(tmp, buf + size + 0x14 - 16, 16);
|
||||
|
||||
retv = kirk7(buf, size, key_type);
|
||||
|
||||
if (retv)
|
||||
return retv;
|
||||
|
||||
for (i = 0; i < 16; i++) {
|
||||
buf[i] ^= key[i];
|
||||
}
|
||||
|
||||
memcpy(key, tmp, 16);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int cipher_buf(u8 *kbuf, u8 *dbuf, int size, CIPHER_KEY *ckey)
|
||||
{
|
||||
int i, retv;
|
||||
u8 tmp1[16], tmp2[16];
|
||||
|
||||
memcpy(kbuf + 0x14, ckey->key, 16);
|
||||
|
||||
for (i = 0; i < 16; i++) {
|
||||
kbuf[0x14 + i] ^= amctrl_key3[i];
|
||||
}
|
||||
|
||||
if (ckey->type == 2)
|
||||
retv = kirk8(kbuf, 16);
|
||||
else
|
||||
retv = kirk7(kbuf, 16, 0x39);
|
||||
|
||||
if (retv)
|
||||
return retv;
|
||||
|
||||
for (i = 0; i < 16; i++) {
|
||||
kbuf[i] ^= amctrl_key2[i];
|
||||
}
|
||||
|
||||
memcpy(tmp2, kbuf, 0x10);
|
||||
|
||||
if (ckey->seed == 1) {
|
||||
memset(tmp1, 0, 0x10);
|
||||
} else {
|
||||
memcpy(tmp1, tmp2, 0x10);
|
||||
*(u32*)(tmp1 + 0x0c) = ckey->seed - 1;
|
||||
}
|
||||
|
||||
for (i = 0; i < size; i += 16) {
|
||||
memcpy(kbuf + 0x14 + i, tmp2, 12);
|
||||
*(u32*)(kbuf + 0x14 + i + 12) = ckey->seed;
|
||||
ckey->seed += 1;
|
||||
}
|
||||
|
||||
retv = decrypt_buf(kbuf, size, tmp1, 0x63);
|
||||
|
||||
if (retv)
|
||||
return retv;
|
||||
|
||||
for (i = 0; i < size; i++) {
|
||||
dbuf[i] ^= kbuf[i];
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
/*
|
||||
BBMac functions.
|
||||
*/
|
||||
int sceDrmBBMacInit(MAC_KEY *mkey, int type)
|
||||
{
|
||||
mkey->type = type;
|
||||
mkey->pad_size = 0;
|
||||
|
||||
memset(mkey->key, 0, 16);
|
||||
memset(mkey->pad, 0, 16);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
int sceDrmBBMacUpdate(MAC_KEY *mkey, u8 *buf, int size)
|
||||
{
|
||||
int retv = 0, ksize, p, type;
|
||||
u8 *kbuf;
|
||||
|
||||
if (mkey->pad_size > 16) {
|
||||
retv = 0x80510302;
|
||||
goto _exit;
|
||||
}
|
||||
|
||||
if (mkey->pad_size + size <= 16) {
|
||||
memcpy(mkey->pad + mkey->pad_size, buf, size);
|
||||
mkey->pad_size += size;
|
||||
retv = 0;
|
||||
} else {
|
||||
kbuf = kirk_buf + 0x14;
|
||||
memcpy(kbuf, mkey->pad, mkey->pad_size);
|
||||
|
||||
p = mkey->pad_size;
|
||||
|
||||
mkey->pad_size += size;
|
||||
mkey->pad_size &= 0x0f;
|
||||
if (mkey->pad_size == 0)
|
||||
mkey->pad_size = 16;
|
||||
|
||||
size -= mkey->pad_size;
|
||||
memcpy(mkey->pad, buf + size, mkey->pad_size);
|
||||
|
||||
type = (mkey->type == 2) ? 0x3A : 0x38;
|
||||
|
||||
while (size)
|
||||
{
|
||||
ksize = (size + p >= 0x0800) ? 0x0800 : size + p;
|
||||
memcpy(kbuf + p, buf, ksize - p);
|
||||
retv = encrypt_buf(kirk_buf, ksize, mkey->key, type);
|
||||
|
||||
if (retv)
|
||||
goto _exit;
|
||||
|
||||
size -= (ksize - p);
|
||||
buf += ksize - p;
|
||||
p = 0;
|
||||
}
|
||||
}
|
||||
|
||||
_exit:
|
||||
return retv;
|
||||
|
||||
}
|
||||
|
||||
int sceDrmBBMacFinal(MAC_KEY *mkey, u8 *buf, u8 *vkey)
|
||||
{
|
||||
int i, retv, code;
|
||||
u8 *kbuf, tmp[16], tmp1[16];
|
||||
u32 t0, v0, v1;
|
||||
|
||||
if (mkey->pad_size > 16)
|
||||
return 0x80510302;
|
||||
|
||||
code = (mkey->type == 2) ? 0x3A : 0x38;
|
||||
kbuf = kirk_buf + 0x14;
|
||||
|
||||
memset(kbuf, 0, 16);
|
||||
retv = kirk4(kirk_buf, 16, code);
|
||||
|
||||
if (retv)
|
||||
goto _exit;
|
||||
|
||||
memcpy(tmp, kbuf, 16);
|
||||
|
||||
t0 = (tmp[0] & 0x80) ? 0x87 : 0;
|
||||
for (i = 0; i < 15; i++)
|
||||
{
|
||||
v1 = tmp[i + 0];
|
||||
v0 = tmp[i + 1];
|
||||
v1 <<= 1;
|
||||
v0 >>= 7;
|
||||
v0 |= v1;
|
||||
tmp[i + 0] = v0;
|
||||
}
|
||||
v0 = tmp[15];
|
||||
v0 <<= 1;
|
||||
v0 ^= t0;
|
||||
tmp[15] = v0;
|
||||
|
||||
if (mkey->pad_size < 16)
|
||||
{
|
||||
t0 = (tmp[0] & 0x80) ? 0x87 : 0;
|
||||
for (i = 0; i < 15; i++)
|
||||
{
|
||||
v1 = tmp[i + 0];
|
||||
v0 = tmp[i + 1];
|
||||
v1 <<= 1;
|
||||
v0 >>= 7;
|
||||
v0 |= v1;
|
||||
tmp[i + 0] = v0;
|
||||
}
|
||||
v0 = tmp[15];
|
||||
v0 <<= 1;
|
||||
v0 ^= t0;
|
||||
tmp[15] = v0;
|
||||
|
||||
mkey->pad[mkey->pad_size] = 0x80;
|
||||
if (mkey->pad_size + 1 < 16)
|
||||
memset(mkey->pad + mkey->pad_size + 1, 0, 16 - mkey->pad_size - 1);
|
||||
}
|
||||
|
||||
for (i = 0; i < 16; i++) {
|
||||
mkey->pad[i] ^= tmp[i];
|
||||
}
|
||||
|
||||
memcpy(kbuf, mkey->pad, 16);
|
||||
memcpy(tmp1, mkey->key, 16);
|
||||
|
||||
retv = encrypt_buf(kirk_buf, 0x10, tmp1, code);
|
||||
|
||||
if (retv)
|
||||
return retv;
|
||||
|
||||
for (i = 0; i < 0x10; i++) {
|
||||
tmp1[i] ^= amctrl_key1[i];
|
||||
}
|
||||
|
||||
if (mkey->type == 2)
|
||||
{
|
||||
memcpy(kbuf, tmp1, 16);
|
||||
|
||||
retv = kirk5(kirk_buf, 0x10);
|
||||
|
||||
if (retv)
|
||||
goto _exit;
|
||||
|
||||
retv = kirk4(kirk_buf, 0x10, code);
|
||||
|
||||
if (retv)
|
||||
goto _exit;
|
||||
|
||||
memcpy(tmp1, kbuf, 16);
|
||||
}
|
||||
|
||||
if (vkey)
|
||||
{
|
||||
for (i = 0; i < 0x10; i++) {
|
||||
tmp1[i] ^= vkey[i];
|
||||
}
|
||||
memcpy(kbuf, tmp1, 16);
|
||||
|
||||
retv = kirk4(kirk_buf, 0x10, code);
|
||||
|
||||
if (retv)
|
||||
goto _exit;
|
||||
|
||||
memcpy(tmp1, kbuf, 16);
|
||||
}
|
||||
|
||||
memcpy(buf, tmp1, 16);
|
||||
|
||||
memset(mkey->key, 0, 16);
|
||||
memset(mkey->pad, 0, 16);
|
||||
|
||||
mkey->pad_size = 0;
|
||||
mkey->type = 0;
|
||||
retv = 0;
|
||||
|
||||
_exit:
|
||||
return retv;
|
||||
}
|
||||
|
||||
int sceDrmBBMacFinal2(MAC_KEY *mkey, u8 *out, u8 *vkey)
|
||||
{
|
||||
int i, retv, type;
|
||||
u8 *kbuf, tmp[16];
|
||||
|
||||
type = mkey->type;
|
||||
retv = sceDrmBBMacFinal(mkey, tmp, vkey);
|
||||
if (retv)
|
||||
return retv;
|
||||
|
||||
kbuf = kirk_buf+0x14;
|
||||
|
||||
if (type == 3) {
|
||||
memcpy(kbuf, out, 0x10);
|
||||
kirk7(kirk_buf, 0x10, 0x63);
|
||||
} else {
|
||||
memcpy(kirk_buf, out, 0x10);
|
||||
}
|
||||
|
||||
retv = 0;
|
||||
for (i = 0; i < 0x10; i++) {
|
||||
if (kirk_buf[i] != tmp[i]) {
|
||||
retv = 0x80510300;
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
return retv;
|
||||
}
|
||||
|
||||
/*
|
||||
BBCipher functions.
|
||||
*/
|
||||
int sceDrmBBCipherInit(CIPHER_KEY *ckey, int type, int mode, u8 *header_key, u8 *version_key, u32 seed)
|
||||
{
|
||||
int i, retv;
|
||||
u8 *kbuf;
|
||||
|
||||
kbuf = kirk_buf + 0x14;
|
||||
ckey->type = type;
|
||||
if (mode == 2)
|
||||
{
|
||||
ckey->seed = seed + 1;
|
||||
for (i = 0; i < 16; i++) {
|
||||
ckey->key[i] = header_key[i];
|
||||
}
|
||||
if (version_key) {
|
||||
for (i = 0; i < 16; i++) {
|
||||
ckey->key[i] ^= version_key[i];
|
||||
}
|
||||
}
|
||||
retv = 0;
|
||||
}
|
||||
else if (mode == 1)
|
||||
{
|
||||
ckey->seed = 1;
|
||||
retv = kirk14(kirk_buf);
|
||||
|
||||
if (retv)
|
||||
return retv;
|
||||
|
||||
memcpy(kbuf, kirk_buf, 0x10);
|
||||
memset(kbuf + 0x0c, 0, 4);
|
||||
|
||||
if (ckey->type == 2)
|
||||
{
|
||||
for (i = 0; i < 16; i++) {
|
||||
kbuf[i] ^= amctrl_key2[i];
|
||||
}
|
||||
retv = kirk5(kirk_buf, 0x10);
|
||||
for (i = 0; i < 16; i++) {
|
||||
kbuf[i] ^= amctrl_key3[i];
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
for (i = 0; i < 16; i++) {
|
||||
kbuf[i] ^= amctrl_key2[i];
|
||||
}
|
||||
retv = kirk4(kirk_buf, 0x10, 0x39);
|
||||
for(i = 0; i < 16; i++) {
|
||||
kbuf[i] ^= amctrl_key3[i];
|
||||
}
|
||||
}
|
||||
|
||||
if (retv)
|
||||
return retv;
|
||||
|
||||
memcpy(ckey->key, kbuf, 0x10);
|
||||
memcpy(header_key, kbuf, 0x10);
|
||||
|
||||
if (version_key)
|
||||
{
|
||||
for (i = 0; i < 16; i++) {
|
||||
ckey->key[i] ^= version_key[i];
|
||||
}
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
retv = 0;
|
||||
}
|
||||
|
||||
return retv;
|
||||
}
|
||||
|
||||
int sceDrmBBCipherUpdate(CIPHER_KEY *ckey, u8 *data, int size)
|
||||
{
|
||||
int p, retv, dsize;
|
||||
|
||||
retv = 0;
|
||||
p = 0;
|
||||
|
||||
while (size > 0)
|
||||
{
|
||||
dsize = (size >= 0x0800) ? 0x0800 : size;
|
||||
retv = cipher_buf(kirk_buf, data + p, dsize, ckey);
|
||||
|
||||
if (retv)
|
||||
break;
|
||||
|
||||
size -= dsize;
|
||||
p += dsize;
|
||||
}
|
||||
|
||||
return retv;
|
||||
}
|
||||
|
||||
int sceDrmBBCipherFinal(CIPHER_KEY *ckey)
|
||||
{
|
||||
memset(ckey->key, 0, 16);
|
||||
ckey->type = 0;
|
||||
ckey->seed = 0;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
/*
|
||||
Extra functions.
|
||||
*/
|
||||
int bbmac_build_final2(int type, u8 *mac)
|
||||
{
|
||||
u8 *kbuf = kirk_buf + 0x14;
|
||||
|
||||
if (type == 3)
|
||||
{
|
||||
memcpy(kbuf, mac, 16);
|
||||
kirk4(kirk_buf, 0x10, 0x63);
|
||||
memcpy(mac, kbuf, 16);
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
int bbmac_getkey(MAC_KEY *mkey, u8 *bbmac, u8 *vkey)
|
||||
{
|
||||
int i, retv, type, code;
|
||||
u8 *kbuf, tmp[16], tmp1[16];
|
||||
|
||||
type = mkey->type;
|
||||
retv = sceDrmBBMacFinal(mkey, tmp, NULL);
|
||||
|
||||
if (retv)
|
||||
return retv;
|
||||
|
||||
kbuf = kirk_buf + 0x14;
|
||||
|
||||
if (type == 3) {
|
||||
memcpy(kbuf, bbmac, 0x10);
|
||||
kirk7(kirk_buf, 0x10, 0x63);
|
||||
} else {
|
||||
memcpy(kirk_buf, bbmac, 0x10);
|
||||
}
|
||||
|
||||
memcpy(tmp1, kirk_buf, 16);
|
||||
memcpy(kbuf, tmp1, 16);
|
||||
|
||||
code = (type == 2) ? 0x3A : 0x38;
|
||||
kirk7(kirk_buf, 0x10, code);
|
||||
|
||||
for (i = 0; i < 0x10; i++) {
|
||||
vkey[i] = tmp[i] ^ kirk_buf[i];
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
int bbmac_forge(MAC_KEY *mkey, u8 *bbmac, u8 *vkey, u8 *buf)
|
||||
{
|
||||
int i, retv, type;
|
||||
u8 *kbuf, tmp[16], tmp1[16];
|
||||
u32 t0, v0, v1;
|
||||
|
||||
if (mkey->pad_size > 16)
|
||||
return 0x80510302;
|
||||
|
||||
type = (mkey->type == 2) ? 0x3A : 0x38;
|
||||
kbuf = kirk_buf + 0x14;
|
||||
|
||||
memset(kbuf, 0, 16);
|
||||
retv = kirk4(kirk_buf, 16, type);
|
||||
|
||||
if (retv)
|
||||
return retv;
|
||||
|
||||
memcpy(tmp, kbuf, 16);
|
||||
|
||||
t0 = (tmp[0] & 0x80) ? 0x87 : 0;
|
||||
for (i = 0; i < 15; i++)
|
||||
{
|
||||
v1 = tmp[i + 0];
|
||||
v0 = tmp[i + 1];
|
||||
v1 <<= 1;
|
||||
v0 >>= 7;
|
||||
v0 |= v1;
|
||||
tmp[i + 0] = v0;
|
||||
}
|
||||
v0 = tmp[15];
|
||||
v0 <<= 1;
|
||||
v0 ^= t0;
|
||||
tmp[15] = v0;
|
||||
|
||||
if (mkey->pad_size < 16)
|
||||
{
|
||||
t0 = (tmp[0] & 0x80) ? 0x87 : 0;
|
||||
for (i = 0; i < 15; i++)
|
||||
{
|
||||
v1 = tmp[i + 0];
|
||||
v0 = tmp[i + 1];
|
||||
v1 <<= 1;
|
||||
v0 >>= 7;
|
||||
v0 |= v1;
|
||||
tmp[i + 0] = v0;
|
||||
}
|
||||
v0 = tmp[15];
|
||||
v0 <<= 1;
|
||||
v0 ^= t0;
|
||||
tmp[15] = t0;
|
||||
|
||||
mkey->pad[mkey->pad_size] = 0x80;
|
||||
if (mkey->pad_size + 1 < 16)
|
||||
memset(mkey->pad+mkey->pad_size + 1, 0, 16 - mkey->pad_size - 1);
|
||||
}
|
||||
|
||||
for (i = 0; i < 16; i++) {
|
||||
mkey->pad[i] ^= tmp[i];
|
||||
}
|
||||
for (i = 0; i < 0x10; i++) {
|
||||
mkey->pad[i] ^= mkey->key[i];
|
||||
}
|
||||
|
||||
memcpy(kbuf, bbmac, 0x10);
|
||||
kirk7(kirk_buf, 0x10, 0x63);
|
||||
|
||||
memcpy(kbuf, kirk_buf, 0x10);
|
||||
kirk7(kirk_buf, 0x10, type);
|
||||
|
||||
memcpy(tmp1, kirk_buf, 0x10);
|
||||
for (i = 0; i < 0x10; i++) {
|
||||
tmp1[i] ^= vkey[i];
|
||||
}
|
||||
for (i = 0; i < 0x10; i++) {
|
||||
tmp1[i] ^= amctrl_key1[i];
|
||||
}
|
||||
|
||||
memcpy(kbuf, tmp1, 0x10);
|
||||
kirk7(kirk_buf, 0x10, type);
|
||||
|
||||
memcpy(tmp1, kirk_buf, 0x10);
|
||||
for (i = 0; i < 16; i++) {
|
||||
mkey->pad[i] ^= tmp1[i];
|
||||
}
|
||||
|
||||
for (i = 0; i < 16; i++) {
|
||||
buf[i] ^= mkey->pad[i];
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
/*
|
||||
sceNpDrm functions.
|
||||
*/
|
||||
int sceNpDrmGetFixedKey(u8 *key, char *npstr, int type)
|
||||
{
|
||||
AES_ctx akey;
|
||||
MAC_KEY mkey;
|
||||
char strbuf[0x30];
|
||||
int retv;
|
||||
|
||||
if ((type & 0x01000000) == 0)
|
||||
return 0x80550901;
|
||||
|
||||
type &= 0x000000ff;
|
||||
|
||||
memset(strbuf, 0, 0x30);
|
||||
strncpy(strbuf, npstr, 0x30);
|
||||
|
||||
retv = sceDrmBBMacInit(&mkey, 1);
|
||||
|
||||
if (retv)
|
||||
return retv;
|
||||
|
||||
retv = sceDrmBBMacUpdate(&mkey, (u8*)strbuf, 0x30);
|
||||
|
||||
if (retv)
|
||||
return retv;
|
||||
|
||||
retv = sceDrmBBMacFinal(&mkey, key, npdrm_fixed_key);
|
||||
|
||||
if (retv)
|
||||
return 0x80550902;
|
||||
|
||||
if (type == 0)
|
||||
return 0;
|
||||
if (type > 3)
|
||||
return 0x80550901;
|
||||
|
||||
type = (type - 1) * 16;
|
||||
|
||||
AES_set_key(&akey, &npdrm_enc_keys[type], 128);
|
||||
AES_encrypt(&akey, key, key);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
int decrypt_pgd(u8* pgd_data, int pgd_size, int flag, u8* key __attribute__((unused)))
|
||||
{
|
||||
int result;
|
||||
PGD_HEADER PGD[sizeof(PGD_HEADER)];
|
||||
MAC_KEY mkey;
|
||||
CIPHER_KEY ckey;
|
||||
u8* fkey;
|
||||
|
||||
// Read in the PGD header parameters.
|
||||
memset(PGD, 0, sizeof(PGD_HEADER));
|
||||
|
||||
PGD->buf = pgd_data;
|
||||
PGD->key_index = *(u32*)(pgd_data + 4);
|
||||
PGD->drm_type = *(u32*)(pgd_data + 8);
|
||||
|
||||
// Set the hashing, crypto and open modes.
|
||||
if (PGD->drm_type == 1) {
|
||||
PGD->mac_type = 1;
|
||||
flag |= 4;
|
||||
|
||||
if(PGD->key_index > 1) {
|
||||
PGD->mac_type = 3;
|
||||
flag |= 8;
|
||||
}
|
||||
|
||||
PGD->cipher_type = 1;
|
||||
} else {
|
||||
PGD->mac_type = 2;
|
||||
PGD->cipher_type = 2;
|
||||
}
|
||||
|
||||
PGD->open_flag = flag;
|
||||
|
||||
// Get the fixed DNAS key.
|
||||
fkey = NULL;
|
||||
if ((flag & 0x2) == 0x2)
|
||||
fkey = dnas_key1A90;
|
||||
if ((flag & 0x1) == 0x1)
|
||||
fkey = dnas_key1AA0;
|
||||
|
||||
if (fkey == NULL) {
|
||||
printf("PGD: Invalid PGD DNAS flag! %08x\n", flag);
|
||||
return -1;
|
||||
}
|
||||
|
||||
// Test MAC hash at 0x80 (DNAS hash).
|
||||
sceDrmBBMacInit(&mkey, PGD->mac_type);
|
||||
sceDrmBBMacUpdate(&mkey, pgd_data, 0x80);
|
||||
result = sceDrmBBMacFinal2(&mkey, pgd_data + 0x80, fkey);
|
||||
|
||||
if (result) {
|
||||
printf("PGD: Invalid PGD 0x80 MAC hash!\n");
|
||||
return -1;
|
||||
}
|
||||
|
||||
// Test MAC hash at 0x70 (key hash).
|
||||
sceDrmBBMacInit(&mkey, PGD->mac_type);
|
||||
sceDrmBBMacUpdate(&mkey, pgd_data, 0x70);
|
||||
|
||||
// Generate the key from MAC 0x70.
|
||||
bbmac_getkey(&mkey, pgd_data + 0x70, PGD->vkey);
|
||||
|
||||
// Decrypt the PGD header block (0x30 bytes).
|
||||
sceDrmBBCipherInit(&ckey, PGD->cipher_type, 2, pgd_data + 0x10, PGD->vkey, 0);
|
||||
sceDrmBBCipherUpdate(&ckey, pgd_data + 0x30, 0x30);
|
||||
sceDrmBBCipherFinal(&ckey);
|
||||
|
||||
// Get the decryption parameters from the decrypted header.
|
||||
PGD->data_size = *(u32*)(pgd_data + 0x44);
|
||||
PGD->block_size = *(u32*)(pgd_data + 0x48);
|
||||
PGD->data_offset = *(u32*)(pgd_data + 0x4c);
|
||||
|
||||
// Additional size variables.
|
||||
PGD->align_size = (PGD->data_size + 15) &~ 15;
|
||||
PGD->table_offset = PGD->data_offset + PGD->align_size;
|
||||
PGD->block_nr = (PGD->align_size + PGD->block_size - 1) &~ (PGD->block_size - 1);
|
||||
PGD->block_nr = PGD->block_nr / PGD->block_size;
|
||||
|
||||
if ((PGD->align_size + PGD->block_nr * 16) > pgd_size) {
|
||||
printf("ERROR: Invalid PGD data size!\n");
|
||||
return -1;
|
||||
}
|
||||
|
||||
// Test MAC hash at 0x60 (table hash).
|
||||
sceDrmBBMacInit(&mkey, PGD->mac_type);
|
||||
sceDrmBBMacUpdate(&mkey, pgd_data + PGD->table_offset, PGD->block_nr * 16);
|
||||
result = sceDrmBBMacFinal2(&mkey, pgd_data + 0x60, PGD->vkey);
|
||||
|
||||
if (result) {
|
||||
printf("ERROR: Invalid PGD 0x60 MAC hash!\n");
|
||||
return -1;
|
||||
}
|
||||
|
||||
// Decrypt the data.
|
||||
sceDrmBBCipherInit(&ckey, PGD->cipher_type, 2, pgd_data + 0x30, PGD->vkey, 0);
|
||||
sceDrmBBCipherUpdate(&ckey, pgd_data + 0x90, PGD->align_size);
|
||||
sceDrmBBCipherFinal(&ckey);
|
||||
|
||||
return PGD->data_size;
|
||||
}
|
59
src/libkirk/amctrl.h
Normal file
59
src/libkirk/amctrl.h
Normal file
|
@ -0,0 +1,59 @@
|
|||
// Copyright (C) 2013 tpu
|
||||
// Copyright (C) 2015 Hykem <hykem@hotmail.com>
|
||||
// Licensed under the terms of the GNU GPL, version 3
|
||||
// http://www.gnu.org/licenses/gpl-3.0.txt
|
||||
|
||||
#ifndef AMCTRL_H
|
||||
#define AMCTRL_H
|
||||
|
||||
typedef struct
|
||||
{
|
||||
int type;
|
||||
u8 key[16];
|
||||
u8 pad[16];
|
||||
int pad_size;
|
||||
} MAC_KEY;
|
||||
|
||||
typedef struct
|
||||
{
|
||||
u32 type;
|
||||
u32 seed;
|
||||
u8 key[16];
|
||||
} CIPHER_KEY;
|
||||
|
||||
typedef struct {
|
||||
unsigned char vkey[16];
|
||||
|
||||
int open_flag;
|
||||
int key_index;
|
||||
int drm_type;
|
||||
int mac_type;
|
||||
int cipher_type;
|
||||
|
||||
int data_size;
|
||||
int align_size;
|
||||
int block_size;
|
||||
int block_nr;
|
||||
int data_offset;
|
||||
int table_offset;
|
||||
|
||||
unsigned char *buf;
|
||||
} PGD_HEADER;
|
||||
|
||||
int sceDrmBBMacInit(MAC_KEY *mkey, int type);
|
||||
int sceDrmBBMacUpdate(MAC_KEY *mkey, u8 *buf, int size);
|
||||
int sceDrmBBMacFinal(MAC_KEY *mkey, u8 *buf, u8 *vkey);
|
||||
int sceDrmBBMacFinal2(MAC_KEY *mkey, u8 *out, u8 *vkey);
|
||||
|
||||
int bbmac_build_final2(int type, u8 *mac);
|
||||
int bbmac_getkey(MAC_KEY *mkey, u8 *bbmac, u8 *vkey);
|
||||
int bbmac_forge(MAC_KEY *mkey, u8 *bbmac, u8 *vkey, u8 *buf);
|
||||
|
||||
int sceDrmBBCipherInit(CIPHER_KEY *ckey, int type, int mode, u8 *header_key, u8 *version_key, u32 seed);
|
||||
int sceDrmBBCipherUpdate(CIPHER_KEY *ckey, u8 *data, int size);
|
||||
int sceDrmBBCipherFinal(CIPHER_KEY *ckey);
|
||||
|
||||
int sceNpDrmGetFixedKey(u8 *key, char *npstr, int type);
|
||||
int decrypt_pgd(u8* pgd_data, int pgd_size, int flag, u8* key __attribute__((unused)));
|
||||
|
||||
#endif
|
200
src/libkirk/bn.c
Normal file
200
src/libkirk/bn.c
Normal file
|
@ -0,0 +1,200 @@
|
|||
// Copyright 2007,2008,2010 Segher Boessenkool <segher@kernel.crashing.org>
|
||||
// Licensed under the terms of the GNU GPL, version 2
|
||||
// http://www.gnu.org/licenses/old-licenses/gpl-2.0.txt
|
||||
|
||||
#include <string.h>
|
||||
#include <stdio.h>
|
||||
|
||||
#include "kirk_engine.h"
|
||||
|
||||
void bn_print(char *name, u8 *a, u32 n)
|
||||
{
|
||||
u32 i;
|
||||
|
||||
printf("%s = ", name);
|
||||
|
||||
for (i = 0; i < n; i++)
|
||||
printf("%02x", a[i]);
|
||||
|
||||
printf("\n");
|
||||
}
|
||||
|
||||
static void bn_zero(u8 *d, u32 n)
|
||||
{
|
||||
memset(d, 0, n);
|
||||
}
|
||||
|
||||
void bn_copy(u8 *d, u8 *a, u32 n)
|
||||
{
|
||||
memcpy(d, a, n);
|
||||
}
|
||||
|
||||
int bn_compare(u8 *a, u8 *b, u32 n)
|
||||
{
|
||||
u32 i;
|
||||
|
||||
for (i = 0; i < n; i++) {
|
||||
if (a[i] < b[i])
|
||||
return -1;
|
||||
if (a[i] > b[i])
|
||||
return 1;
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static u8 bn_add_1(u8 *d, u8 *a, u8 *b, u32 n)
|
||||
{
|
||||
u32 i;
|
||||
u32 dig;
|
||||
u8 c;
|
||||
|
||||
c = 0;
|
||||
for (i = n - 1; i < n; i--) {
|
||||
dig = a[i] + b[i] + c;
|
||||
c = dig >> 8;
|
||||
d[i] = dig;
|
||||
}
|
||||
|
||||
return c;
|
||||
}
|
||||
|
||||
static u8 bn_sub_1(u8 *d, u8 *a, u8 *b, u32 n)
|
||||
{
|
||||
u32 i;
|
||||
u32 dig;
|
||||
u8 c;
|
||||
|
||||
c = 1;
|
||||
for (i = n - 1; i < n; i--) {
|
||||
dig = a[i] + 255 - b[i] + c;
|
||||
c = dig >> 8;
|
||||
d[i] = dig;
|
||||
}
|
||||
|
||||
return 1 - c;
|
||||
}
|
||||
|
||||
void bn_reduce(u8 *d, u8 *N, u32 n)
|
||||
{
|
||||
if (bn_compare(d, N, n) >= 0)
|
||||
bn_sub_1(d, d, N, n);
|
||||
}
|
||||
|
||||
void bn_add(u8 *d, u8 *a, u8 *b, u8 *N, u32 n)
|
||||
{
|
||||
if (bn_add_1(d, a, b, n))
|
||||
bn_sub_1(d, d, N, n);
|
||||
|
||||
bn_reduce(d, N, n);
|
||||
}
|
||||
|
||||
void bn_sub(u8 *d, u8 *a, u8 *b, u8 *N, u32 n)
|
||||
{
|
||||
if (bn_sub_1(d, a, b, n))
|
||||
bn_add_1(d, d, N, n);
|
||||
}
|
||||
|
||||
static const u8 inv256[0x80] = {
|
||||
0x01, 0xab, 0xcd, 0xb7, 0x39, 0xa3, 0xc5, 0xef,
|
||||
0xf1, 0x1b, 0x3d, 0xa7, 0x29, 0x13, 0x35, 0xdf,
|
||||
0xe1, 0x8b, 0xad, 0x97, 0x19, 0x83, 0xa5, 0xcf,
|
||||
0xd1, 0xfb, 0x1d, 0x87, 0x09, 0xf3, 0x15, 0xbf,
|
||||
0xc1, 0x6b, 0x8d, 0x77, 0xf9, 0x63, 0x85, 0xaf,
|
||||
0xb1, 0xdb, 0xfd, 0x67, 0xe9, 0xd3, 0xf5, 0x9f,
|
||||
0xa1, 0x4b, 0x6d, 0x57, 0xd9, 0x43, 0x65, 0x8f,
|
||||
0x91, 0xbb, 0xdd, 0x47, 0xc9, 0xb3, 0xd5, 0x7f,
|
||||
0x81, 0x2b, 0x4d, 0x37, 0xb9, 0x23, 0x45, 0x6f,
|
||||
0x71, 0x9b, 0xbd, 0x27, 0xa9, 0x93, 0xb5, 0x5f,
|
||||
0x61, 0x0b, 0x2d, 0x17, 0x99, 0x03, 0x25, 0x4f,
|
||||
0x51, 0x7b, 0x9d, 0x07, 0x89, 0x73, 0x95, 0x3f,
|
||||
0x41, 0xeb, 0x0d, 0xf7, 0x79, 0xe3, 0x05, 0x2f,
|
||||
0x31, 0x5b, 0x7d, 0xe7, 0x69, 0x53, 0x75, 0x1f,
|
||||
0x21, 0xcb, 0xed, 0xd7, 0x59, 0xc3, 0xe5, 0x0f,
|
||||
0x11, 0x3b, 0x5d, 0xc7, 0x49, 0x33, 0x55, 0xff,
|
||||
};
|
||||
|
||||
static void bn_mon_muladd_dig(u8 *d, u8 *a, u8 b, u8 *N, u32 n)
|
||||
{
|
||||
u32 dig;
|
||||
u32 i;
|
||||
|
||||
u8 z = -(d[n-1] + a[n-1]*b) * inv256[N[n-1]/2];
|
||||
|
||||
dig = d[n-1] + a[n-1]*b + N[n-1]*z;
|
||||
dig >>= 8;
|
||||
|
||||
for (i = n - 2; i < n; i--) {
|
||||
dig += d[i] + a[i]*b + N[i]*z;
|
||||
d[i+1] = dig;
|
||||
dig >>= 8;
|
||||
}
|
||||
|
||||
d[0] = dig;
|
||||
dig >>= 8;
|
||||
|
||||
if (dig)
|
||||
bn_sub_1(d, d, N, n);
|
||||
|
||||
bn_reduce(d, N, n);
|
||||
}
|
||||
|
||||
void bn_mon_mul(u8 *d, u8 *a, u8 *b, u8 *N, u32 n)
|
||||
{
|
||||
u8 t[512];
|
||||
u32 i;
|
||||
|
||||
bn_zero(t, n);
|
||||
|
||||
for (i = n - 1; i < n; i--)
|
||||
bn_mon_muladd_dig(t, a, b[i], N, n);
|
||||
|
||||
bn_copy(d, t, n);
|
||||
}
|
||||
|
||||
void bn_to_mon(u8 *d, u8 *N, u32 n)
|
||||
{
|
||||
u32 i;
|
||||
|
||||
for (i = 0; i < 8*n; i++)
|
||||
bn_add(d, d, d, N, n);
|
||||
}
|
||||
|
||||
void bn_from_mon(u8 *d, u8 *N, u32 n)
|
||||
{
|
||||
u8 t[512];
|
||||
|
||||
bn_zero(t, n);
|
||||
t[n-1] = 1;
|
||||
bn_mon_mul(d, d, t, N, n);
|
||||
}
|
||||
|
||||
static void bn_mon_exp(u8 *d, u8 *a, u8 *N, u32 n, u8 *e, u32 en)
|
||||
{
|
||||
u8 t[512];
|
||||
u32 i;
|
||||
u8 mask;
|
||||
|
||||
bn_zero(d, n);
|
||||
d[n-1] = 1;
|
||||
bn_to_mon(d, N, n);
|
||||
|
||||
for (i = 0; i < en; i++)
|
||||
for (mask = 0x80; mask != 0; mask >>= 1) {
|
||||
bn_mon_mul(t, d, d, N, n);
|
||||
if ((e[i] & mask) != 0)
|
||||
bn_mon_mul(d, t, a, N, n);
|
||||
else
|
||||
bn_copy(d, t, n);
|
||||
}
|
||||
}
|
||||
|
||||
void bn_mon_inv(u8 *d, u8 *a, u8 *N, u32 n)
|
||||
{
|
||||
u8 t[512], s[512];
|
||||
|
||||
bn_zero(s, n);
|
||||
s[n-1] = 2;
|
||||
bn_sub_1(t, N, s, n);
|
||||
bn_mon_exp(d, a, N, n, t, n);
|
||||
}
|
423
src/libkirk/ec.c
Normal file
423
src/libkirk/ec.c
Normal file
|
@ -0,0 +1,423 @@
|
|||
// Copyright 2007,2008,2010 Segher Boessenkool <segher@kernel.crashing.org>
|
||||
// Licensed under the terms of the GNU GPL, version 2
|
||||
// http://www.gnu.org/licenses/old-licenses/gpl-2.0.txt
|
||||
|
||||
#include <string.h>
|
||||
#include <stdio.h>
|
||||
|
||||
#include "kirk_engine.h"
|
||||
|
||||
struct point {
|
||||
u8 x[20];
|
||||
u8 y[20];
|
||||
};
|
||||
|
||||
u8 ec_p[20];
|
||||
u8 ec_a[20];
|
||||
u8 ec_b[20];
|
||||
u8 ec_N[21];
|
||||
struct point ec_G; // mon
|
||||
struct point ec_Q; // mon
|
||||
u8 ec_k[21];
|
||||
|
||||
void hex_dump(char *str, u8 *buf, int size)
|
||||
{
|
||||
int i;
|
||||
|
||||
if(str)
|
||||
printf("%s:", str);
|
||||
|
||||
for(i=0; i<size; i++){
|
||||
if((i%32)==0){
|
||||
printf("\n%4X:", i);
|
||||
}
|
||||
printf(" %02X", buf[i]);
|
||||
}
|
||||
printf("\n\n");
|
||||
}
|
||||
|
||||
static void elt_copy(u8 *d, u8 *a)
|
||||
{
|
||||
memcpy(d, a, 20);
|
||||
}
|
||||
|
||||
static void elt_zero(u8 *d)
|
||||
{
|
||||
memset(d, 0, 20);
|
||||
}
|
||||
|
||||
static int elt_is_zero(u8 *d)
|
||||
{
|
||||
u32 i;
|
||||
|
||||
for (i = 0; i < 20; i++)
|
||||
if (d[i] != 0)
|
||||
return 0;
|
||||
|
||||
return 1;
|
||||
}
|
||||
|
||||
static void elt_add(u8 *d, u8 *a, u8 *b)
|
||||
{
|
||||
bn_add(d, a, b, ec_p, 20);
|
||||
}
|
||||
|
||||
static void elt_sub(u8 *d, u8 *a, u8 *b)
|
||||
{
|
||||
bn_sub(d, a, b, ec_p, 20);
|
||||
}
|
||||
|
||||
static void elt_mul(u8 *d, u8 *a, u8 *b)
|
||||
{
|
||||
bn_mon_mul(d, a, b, ec_p, 20);
|
||||
}
|
||||
|
||||
static void elt_square(u8 *d, u8 *a)
|
||||
{
|
||||
elt_mul(d, a, a);
|
||||
}
|
||||
|
||||
static void elt_inv(u8 *d, u8 *a)
|
||||
{
|
||||
u8 s[20];
|
||||
elt_copy(s, a);
|
||||
bn_mon_inv(d, s, ec_p, 20);
|
||||
}
|
||||
|
||||
static void point_to_mon(struct point *p)
|
||||
{
|
||||
bn_to_mon(p->x, ec_p, 20);
|
||||
bn_to_mon(p->y, ec_p, 20);
|
||||
}
|
||||
|
||||
static void point_from_mon(struct point *p)
|
||||
{
|
||||
bn_from_mon(p->x, ec_p, 20);
|
||||
bn_from_mon(p->y, ec_p, 20);
|
||||
}
|
||||
|
||||
#if 0
|
||||
static int point_is_on_curve(u8 *p)
|
||||
{
|
||||
u8 s[20], t[20];
|
||||
u8 *x, *y;
|
||||
|
||||
x = p;
|
||||
y = p + 20;
|
||||
|
||||
elt_square(t, x);
|
||||
elt_mul(s, t, x);
|
||||
|
||||
elt_mul(t, x, ec_a);
|
||||
elt_add(s, s, t);
|
||||
|
||||
elt_add(s, s, ec_b);
|
||||
|
||||
elt_square(t, y);
|
||||
elt_sub(s, s, t);
|
||||
|
||||
return elt_is_zero(s);
|
||||
}
|
||||
#endif
|
||||
|
||||
static void point_zero(struct point *p)
|
||||
{
|
||||
elt_zero(p->x);
|
||||
elt_zero(p->y);
|
||||
}
|
||||
|
||||
static int point_is_zero(struct point *p)
|
||||
{
|
||||
return elt_is_zero(p->x) && elt_is_zero(p->y);
|
||||
}
|
||||
|
||||
static void point_double(struct point *r, struct point *p)
|
||||
{
|
||||
u8 s[20], t[20];
|
||||
struct point pp;
|
||||
u8 *px, *py, *rx, *ry;
|
||||
|
||||
pp = *p;
|
||||
|
||||
px = pp.x;
|
||||
py = pp.y;
|
||||
rx = r->x;
|
||||
ry = r->y;
|
||||
|
||||
if (elt_is_zero(py)) {
|
||||
point_zero(r);
|
||||
return;
|
||||
}
|
||||
|
||||
elt_square(t, px); // t = px*px
|
||||
elt_add(s, t, t); // s = 2*px*px
|
||||
elt_add(s, s, t); // s = 3*px*px
|
||||
elt_add(s, s, ec_a); // s = 3*px*px + a
|
||||
elt_add(t, py, py); // t = 2*py
|
||||
elt_inv(t, t); // t = 1/(2*py)
|
||||
elt_mul(s, s, t); // s = (3*px*px+a)/(2*py)
|
||||
|
||||
elt_square(rx, s); // rx = s*s
|
||||
elt_add(t, px, px); // t = 2*px
|
||||
elt_sub(rx, rx, t); // rx = s*s - 2*px
|
||||
|
||||
elt_sub(t, px, rx); // t = -(rx-px)
|
||||
elt_mul(ry, s, t); // ry = -s*(rx-px)
|
||||
elt_sub(ry, ry, py); // ry = -s*(rx-px) - py
|
||||
}
|
||||
|
||||
static void point_add(struct point *r, struct point *p, struct point *q)
|
||||
{
|
||||
u8 s[20], t[20], u[20];
|
||||
u8 *px, *py, *qx, *qy, *rx, *ry;
|
||||
struct point pp, qq;
|
||||
|
||||
pp = *p;
|
||||
qq = *q;
|
||||
|
||||
px = pp.x;
|
||||
py = pp.y;
|
||||
qx = qq.x;
|
||||
qy = qq.y;
|
||||
rx = r->x;
|
||||
ry = r->y;
|
||||
|
||||
if (point_is_zero(&pp)) {
|
||||
elt_copy(rx, qx);
|
||||
elt_copy(ry, qy);
|
||||
return;
|
||||
}
|
||||
|
||||
if (point_is_zero(&qq)) {
|
||||
elt_copy(rx, px);
|
||||
elt_copy(ry, py);
|
||||
return;
|
||||
}
|
||||
|
||||
elt_sub(u, qx, px);
|
||||
|
||||
if (elt_is_zero(u)) {
|
||||
elt_sub(u, qy, py);
|
||||
if (elt_is_zero(u))
|
||||
point_double(r, &pp);
|
||||
else
|
||||
point_zero(r);
|
||||
|
||||
return;
|
||||
}
|
||||
|
||||
elt_inv(t, u); // t = 1/(qx-px)
|
||||
elt_sub(u, qy, py); // u = qy-py
|
||||
elt_mul(s, t, u); // s = (qy-py)/(qx-px)
|
||||
|
||||
elt_square(rx, s); // rx = s*s
|
||||
elt_add(t, px, qx); // t = px+qx
|
||||
elt_sub(rx, rx, t); // rx = s*s - (px+qx)
|
||||
|
||||
elt_sub(t, px, rx); // t = -(rx-px)
|
||||
elt_mul(ry, s, t); // ry = -s*(rx-px)
|
||||
elt_sub(ry, ry, py); // ry = -s*(rx-px) - py
|
||||
}
|
||||
|
||||
static void point_mul(struct point *d, u8 *a, struct point *b)
|
||||
{
|
||||
u32 i;
|
||||
u8 mask;
|
||||
|
||||
point_zero(d);
|
||||
|
||||
for (i = 0; i < 21; i++)
|
||||
for (mask = 0x80; mask != 0; mask >>= 1) {
|
||||
point_double(d, d);
|
||||
if ((a[i] & mask) != 0)
|
||||
point_add(d, d, b);
|
||||
}
|
||||
}
|
||||
|
||||
static void generate_ecdsa(u8 *outR, u8 *outS, u8 *k, u8 *hash)
|
||||
{
|
||||
u8 e[21];
|
||||
u8 kk[21];
|
||||
u8 m[21];
|
||||
u8 R[21];
|
||||
u8 S[21];
|
||||
u8 minv[21];
|
||||
struct point mG;
|
||||
|
||||
e[0] = 0;R[0] = 0;S[0] = 0;
|
||||
memcpy(e + 1, hash, 20);
|
||||
bn_reduce(e, ec_N, 21);
|
||||
|
||||
kirk_CMD14(m+1, 20);
|
||||
m[0] = 0;
|
||||
|
||||
point_mul(&mG, m, &ec_G);
|
||||
point_from_mon(&mG);
|
||||
R[0] = 0;
|
||||
elt_copy(R+1, mG.x);
|
||||
|
||||
bn_copy(kk, k, 21);
|
||||
bn_reduce(kk, ec_N, 21);
|
||||
bn_to_mon(m, ec_N, 21);
|
||||
bn_to_mon(e, ec_N, 21);
|
||||
bn_to_mon(R, ec_N, 21);
|
||||
bn_to_mon(kk, ec_N, 21);
|
||||
|
||||
bn_mon_mul(S, R, kk, ec_N, 21);
|
||||
bn_add(kk, S, e, ec_N, 21);
|
||||
bn_mon_inv(minv, m, ec_N, 21);
|
||||
bn_mon_mul(S, minv, kk, ec_N, 21);
|
||||
|
||||
bn_from_mon(R, ec_N, 21);
|
||||
bn_from_mon(S, ec_N, 21);
|
||||
memcpy(outR,R+1,0x20);
|
||||
memcpy(outS,S+1,0x20);
|
||||
}
|
||||
|
||||
static int check_ecdsa(struct point *Q, u8 *inR, u8 *inS, u8 *hash)
|
||||
{
|
||||
u8 Sinv[21];
|
||||
u8 e[21], R[21], S[21];
|
||||
u8 w1[21], w2[21];
|
||||
struct point r1, r2;
|
||||
u8 rr[21];
|
||||
|
||||
e[0] = 0;
|
||||
memcpy(e + 1, hash, 20);
|
||||
bn_reduce(e, ec_N, 21);
|
||||
R[0] = 0;
|
||||
memcpy(R + 1, inR, 20);
|
||||
bn_reduce(R, ec_N, 21);
|
||||
S[0] = 0;
|
||||
memcpy(S + 1, inS, 20);
|
||||
bn_reduce(S, ec_N, 21);
|
||||
|
||||
bn_to_mon(R, ec_N, 21);
|
||||
bn_to_mon(S, ec_N, 21);
|
||||
bn_to_mon(e, ec_N, 21);
|
||||
// make Sinv = 1/S
|
||||
bn_mon_inv(Sinv, S, ec_N, 21);
|
||||
// w1 = m * Sinv
|
||||
bn_mon_mul(w1, e, Sinv, ec_N, 21);
|
||||
// w2 = r * Sinv
|
||||
bn_mon_mul(w2, R, Sinv, ec_N, 21);
|
||||
|
||||
// mod N both
|
||||
bn_from_mon(w1, ec_N, 21);
|
||||
bn_from_mon(w2, ec_N, 21);
|
||||
|
||||
// r1 = m/s * G
|
||||
point_mul(&r1, w1, &ec_G);
|
||||
// r2 = r/s * P
|
||||
point_mul(&r2, w2, Q);
|
||||
|
||||
//r1 = r1 + r2
|
||||
point_add(&r1, &r1, &r2);
|
||||
|
||||
point_from_mon(&r1);
|
||||
|
||||
rr[0] = 0;
|
||||
memcpy(rr + 1, r1.x, 20);
|
||||
bn_reduce(rr, ec_N, 21);
|
||||
|
||||
bn_from_mon(R, ec_N, 21);
|
||||
bn_from_mon(S, ec_N, 21);
|
||||
|
||||
return (bn_compare(rr, R, 21) == 0);
|
||||
}
|
||||
|
||||
void ec_priv_to_pub(u8 *k, u8 *Q)
|
||||
{
|
||||
struct point ec_temp;
|
||||
bn_to_mon(k, ec_N, 21);
|
||||
point_mul(&ec_temp, k, &ec_G);
|
||||
point_from_mon(&ec_temp);
|
||||
memcpy(Q,ec_temp.x,20);
|
||||
memcpy(Q+20,ec_temp.y,20);
|
||||
}
|
||||
|
||||
void ec_pub_mult(u8 *k, u8 *Q)
|
||||
{
|
||||
struct point ec_temp;
|
||||
point_mul(&ec_temp, k, &ec_Q);
|
||||
point_from_mon(&ec_temp);
|
||||
memcpy(Q,ec_temp.x,20);
|
||||
memcpy(Q+20,ec_temp.y,20);
|
||||
}
|
||||
|
||||
int ecdsa_set_curve(u8* p,u8* a,u8* b,u8* N,u8* Gx,u8* Gy)
|
||||
{
|
||||
memcpy(ec_p,p,20);
|
||||
memcpy(ec_a,a,20);
|
||||
memcpy(ec_b,b,20);
|
||||
memcpy(ec_N,N,21);
|
||||
|
||||
bn_to_mon(ec_a, ec_p, 20);
|
||||
bn_to_mon(ec_b, ec_p, 20);
|
||||
|
||||
memcpy(ec_G.x, Gx, 20);
|
||||
memcpy(ec_G.y, Gy, 20);
|
||||
point_to_mon(&ec_G);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
void ecdsa_set_pub(u8 *Q)
|
||||
{
|
||||
memcpy(ec_Q.x, Q, 20);
|
||||
memcpy(ec_Q.y, Q+20, 20);
|
||||
point_to_mon(&ec_Q);
|
||||
}
|
||||
|
||||
void ecdsa_set_priv(u8 *ink)
|
||||
{
|
||||
u8 k[21];
|
||||
k[0]=0;
|
||||
memcpy(k+1,ink,20);
|
||||
bn_reduce(k, ec_N, 21);
|
||||
|
||||
memcpy(ec_k, k, sizeof ec_k);
|
||||
}
|
||||
|
||||
int ecdsa_verify(u8 *hash, u8 *R, u8 *S)
|
||||
{
|
||||
return check_ecdsa(&ec_Q, R, S, hash);
|
||||
}
|
||||
|
||||
void ecdsa_sign(u8 *hash, u8 *R, u8 *S)
|
||||
{
|
||||
generate_ecdsa(R, S, ec_k, hash);
|
||||
}
|
||||
|
||||
int point_is_on_curve(u8 *p)
|
||||
{
|
||||
u8 s[20], t[20];
|
||||
u8 *x, *y;
|
||||
|
||||
x = p;
|
||||
y = p + 20;
|
||||
|
||||
elt_square(t, x);
|
||||
elt_mul(s, t, x);// s = x^3
|
||||
|
||||
elt_mul(t, x, ec_a);
|
||||
elt_add(s, s, t); //s = x^3 + a *x
|
||||
|
||||
elt_add(s, s, ec_b);//s = x^3 + a *x + b
|
||||
|
||||
elt_square(t, y); //t = y^2
|
||||
elt_sub(s, s, t); // is s - t = 0?
|
||||
hex_dump("S", s, 20);
|
||||
hex_dump("T", t,20);
|
||||
return elt_is_zero(s);
|
||||
}
|
||||
|
||||
void dump_ecc(void)
|
||||
{
|
||||
hex_dump("P", ec_p, 20);
|
||||
hex_dump("a", ec_a, 20);
|
||||
hex_dump("b", ec_b, 20);
|
||||
hex_dump("N", ec_N, 21);
|
||||
hex_dump("Gx", ec_G.x, 20);
|
||||
hex_dump("Gy", ec_G.y, 20);
|
||||
}
|
78
src/libkirk/key_vault.h
Normal file
78
src/libkirk/key_vault.h
Normal file
|
@ -0,0 +1,78 @@
|
|||
/*
|
||||
Draan proudly presents:
|
||||
|
||||
With huge help from community:
|
||||
coyotebean, Davee, hitchhikr, kgsws, liquidzigong, Mathieulh, Proxima, SilverSpring
|
||||
|
||||
******************** KIRK-ENGINE ********************
|
||||
An Open-Source implementation of KIRK (PSP crypto engine) algorithms and keys.
|
||||
Includes also additional routines for hash forging.
|
||||
|
||||
********************
|
||||
|
||||
This program is free software: you can redistribute it and/or modify
|
||||
it under the terms of the GNU General Public License as published by
|
||||
the Free Software Foundation, either version 3 of the License, or
|
||||
(at your option) any later version.
|
||||
|
||||
This program is distributed in the hope that it will be useful,
|
||||
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
GNU General Public License for more details.
|
||||
|
||||
You should have received a copy of the GNU General Public License
|
||||
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
*/
|
||||
|
||||
#ifndef KEY_VAULT
|
||||
#define KEY_VAULT
|
||||
|
||||
// KIRK AES keys
|
||||
static u8 kirk1_key[0x10] = {0x98, 0xC9, 0x40, 0x97, 0x5C, 0x1D, 0x10, 0xE8, 0x7F, 0xE6, 0x0E, 0xA3, 0xFD, 0x03, 0xA8, 0xBA};
|
||||
static u8 kirk7_key02[0x10] = {0xB8, 0x13, 0xC3, 0x5E, 0xC6, 0x44, 0x41, 0xE3, 0xDC, 0x3C, 0x16, 0xF5, 0xB4, 0x5E, 0x64, 0x84};
|
||||
static u8 kirk7_key03[0x10] = {0x98, 0x02, 0xC4, 0xE6, 0xEC, 0x9E, 0x9E, 0x2F, 0xFC, 0x63, 0x4C, 0xE4, 0x2F, 0xBB, 0x46, 0x68};
|
||||
static u8 kirk7_key04[0x10] = {0x99, 0x24, 0x4C, 0xD2, 0x58, 0xF5, 0x1B, 0xCB, 0xB0, 0x61, 0x9C, 0xA7, 0x38, 0x30, 0x07, 0x5F};
|
||||
static u8 kirk7_key05[0x10] = {0x02, 0x25, 0xD7, 0xBA, 0x63, 0xEC, 0xB9, 0x4A, 0x9D, 0x23, 0x76, 0x01, 0xB3, 0xF6, 0xAC, 0x17};
|
||||
static u8 kirk7_key07[0x10] = {0x76, 0x36, 0x8B, 0x43, 0x8F, 0x77, 0xD8, 0x7E, 0xFE, 0x5F, 0xB6, 0x11, 0x59, 0x39, 0x88, 0x5C};
|
||||
static u8 kirk7_key0C[0x10] = {0x84, 0x85, 0xC8, 0x48, 0x75, 0x08, 0x43, 0xBC, 0x9B, 0x9A, 0xEC, 0xA7, 0x9C, 0x7F, 0x60, 0x18};
|
||||
static u8 kirk7_key0D[0x10] = {0xB5, 0xB1, 0x6E, 0xDE, 0x23, 0xA9, 0x7B, 0x0E, 0xA1, 0x7C, 0xDB, 0xA2, 0xDC, 0xDE, 0xC4, 0x6E};
|
||||
static u8 kirk7_key0E[0x10] = {0xC8, 0x71, 0xFD, 0xB3, 0xBC, 0xC5, 0xD2, 0xF2, 0xE2, 0xD7, 0x72, 0x9D, 0xDF, 0x82, 0x68, 0x82};
|
||||
static u8 kirk7_key0F[0x10] = {0x0A, 0xBB, 0x33, 0x6C, 0x96, 0xD4, 0xCD, 0xD8, 0xCB, 0x5F, 0x4B, 0xE0, 0xBA, 0xDB, 0x9E, 0x03};
|
||||
static u8 kirk7_key10[0x10] = {0x32, 0x29, 0x5B, 0xD5, 0xEA, 0xF7, 0xA3, 0x42, 0x16, 0xC8, 0x8E, 0x48, 0xFF, 0x50, 0xD3, 0x71};
|
||||
static u8 kirk7_key11[0x10] = {0x46, 0xF2, 0x5E, 0x8E, 0x4D, 0x2A, 0xA5, 0x40, 0x73, 0x0B, 0xC4, 0x6E, 0x47, 0xEE, 0x6F, 0x0A};
|
||||
static u8 kirk7_key12[0x10] = {0x5D, 0xC7, 0x11, 0x39, 0xD0, 0x19, 0x38, 0xBC, 0x02, 0x7F, 0xDD, 0xDC, 0xB0, 0x83, 0x7D, 0x9D};
|
||||
static u8 kirk7_key38[0x10] = {0x12, 0x46, 0x8D, 0x7E, 0x1C, 0x42, 0x20, 0x9B, 0xBA, 0x54, 0x26, 0x83, 0x5E, 0xB0, 0x33, 0x03};
|
||||
static u8 kirk7_key39[0x10] = {0xC4, 0x3B, 0xB6, 0xD6, 0x53, 0xEE, 0x67, 0x49, 0x3E, 0xA9, 0x5F, 0xBC, 0x0C, 0xED, 0x6F, 0x8A};
|
||||
static u8 kirk7_key3A[0x10] = {0x2C, 0xC3, 0xCF, 0x8C, 0x28, 0x78, 0xA5, 0xA6, 0x63, 0xE2, 0xAF, 0x2D, 0x71, 0x5E, 0x86, 0xBA};
|
||||
static u8 kirk7_key44[0x10] = {0x7D, 0xF4, 0x92, 0x65, 0xE3, 0xFA, 0xD6, 0x78, 0xD6, 0xFE, 0x78, 0xAD, 0xBB, 0x3D, 0xFB, 0x63};
|
||||
static u8 kirk7_key4B[0x10] = {0x0C, 0xFD, 0x67, 0x9A, 0xF9, 0xB4, 0x72, 0x4F, 0xD7, 0x8D, 0xD6, 0xE9, 0x96, 0x42, 0x28, 0x8B};
|
||||
static u8 kirk7_key53[0x10] = {0xAF, 0xFE, 0x8E, 0xB1, 0x3D, 0xD1, 0x7E, 0xD8, 0x0A, 0x61, 0x24, 0x1C, 0x95, 0x92, 0x56, 0xB6};
|
||||
static u8 kirk7_key57[0x10] = {0x1C, 0x9B, 0xC4, 0x90, 0xE3, 0x06, 0x64, 0x81, 0xFA, 0x59, 0xFD, 0xB6, 0x00, 0xBB, 0x28, 0x70};
|
||||
static u8 kirk7_key5D[0x10] = {0x11, 0x5A, 0x5D, 0x20, 0xD5, 0x3A, 0x8D, 0xD3, 0x9C, 0xC5, 0xAF, 0x41, 0x0F, 0x0F, 0x18, 0x6F};
|
||||
static u8 kirk7_key63[0x10] = {0x9C, 0x9B, 0x13, 0x72, 0xF8, 0xC6, 0x40, 0xCF, 0x1C, 0x62, 0xF5, 0xD5, 0x92, 0xDD, 0xB5, 0x82};
|
||||
static u8 kirk7_key64[0x10] = {0x03, 0xB3, 0x02, 0xE8, 0x5F, 0xF3, 0x81, 0xB1, 0x3B, 0x8D, 0xAA, 0x2A, 0x90, 0xFF, 0x5E, 0x61};
|
||||
static u8 kirk16_key[0x10] = {0x47, 0x5E, 0x09, 0xF4, 0xA2, 0x37, 0xDA, 0x9B, 0xEF, 0xFF, 0x3B, 0xC0, 0x77, 0x14, 0x3D, 0x8A};
|
||||
|
||||
/* ECC Curves for Kirk 1 and Kirk 0x11 */
|
||||
// Common Curve paramters p and a
|
||||
static u8 ec_p[0x14] = {0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0x00, 0x00, 0x00, 0x01, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF};
|
||||
static u8 ec_a[0x14] = {0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0x00, 0x00, 0x00, 0x01, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFC}; // mon
|
||||
|
||||
// Kirk 0xC,0xD,0x10,0x11,(likely 0x12)- Unique curve parameters for b, N, and base point G for Kirk 0xC,0xD,0x10,0x11,(likely 0x12) service
|
||||
// Since public key is variable, it is not specified here
|
||||
static u8 ec_b2[0x14] = {0xA6, 0x8B, 0xED, 0xC3, 0x34, 0x18, 0x02, 0x9C, 0x1D, 0x3C, 0xE3, 0x3B, 0x9A, 0x32, 0x1F, 0xCC, 0xBB, 0x9E, 0x0F, 0x0B};// mon
|
||||
static u8 ec_N2[0x15] = {0x00, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFE, 0xFF, 0xFF, 0xB5, 0xAE, 0x3C, 0x52, 0x3E, 0x63, 0x94, 0x4F, 0x21, 0x27};
|
||||
static u8 Gx2[0x14] = {0x12, 0x8E, 0xC4, 0x25, 0x64, 0x87, 0xFD, 0x8F, 0xDF, 0x64, 0xE2, 0x43, 0x7B, 0xC0, 0xA1, 0xF6, 0xD5, 0xAF, 0xDE, 0x2C };
|
||||
static u8 Gy2[0x14] = {0x59, 0x58, 0x55, 0x7E, 0xB1, 0xDB, 0x00, 0x12, 0x60, 0x42, 0x55, 0x24, 0xDB, 0xC3, 0x79, 0xD5, 0xAC, 0x5F, 0x4A, 0xDF };
|
||||
|
||||
// KIRK 1 - Unique curve parameters for b, N, and base point G
|
||||
// Since public key is hard coded, it is also included
|
||||
static u8 ec_b1[0x14] = {0x65, 0xD1, 0x48, 0x8C, 0x03, 0x59, 0xE2, 0x34, 0xAD, 0xC9, 0x5B, 0xD3, 0x90, 0x80, 0x14, 0xBD, 0x91, 0xA5, 0x25, 0xF9};
|
||||
static u8 ec_N1[0x15] = {0x00, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0x00, 0x01, 0xB5, 0xC6, 0x17, 0xF2, 0x90, 0xEA, 0xE1, 0xDB, 0xAD, 0x8F};
|
||||
static u8 Gx1[0x14] = {0x22, 0x59, 0xAC, 0xEE, 0x15, 0x48, 0x9C, 0xB0, 0x96, 0xA8, 0x82, 0xF0, 0xAE, 0x1C, 0xF9, 0xFD, 0x8E, 0xE5, 0xF8, 0xFA };
|
||||
static u8 Gy1[0x14] = {0x60, 0x43, 0x58, 0x45, 0x6D, 0x0A, 0x1C, 0xB2, 0x90, 0x8D, 0xE9, 0x0F, 0x27, 0xD7, 0x5C, 0x82, 0xBE, 0xC1, 0x08, 0xC0 };
|
||||
|
||||
static u8 Px1[0x14] = {0xED, 0x9C, 0xE5, 0x82, 0x34, 0xE6, 0x1A, 0x53, 0xC6, 0x85, 0xD6, 0x4D, 0x51, 0xD0, 0x23, 0x6B, 0xC3, 0xB5, 0xD4, 0xB9 };
|
||||
static u8 Py1[0x14] = {0x04, 0x9D, 0xF1, 0xA0, 0x75, 0xC0, 0xE0, 0x4F, 0xB3, 0x44, 0x85, 0x8B, 0x61, 0xB7, 0x9B, 0x69, 0xA6, 0x3D, 0x2C, 0x39 };
|
||||
|
||||
#endif
|
603
src/libkirk/kirk_engine.c
Normal file
603
src/libkirk/kirk_engine.c
Normal file
|
@ -0,0 +1,603 @@
|
|||
/*
|
||||
Draan proudly presents:
|
||||
|
||||
With huge help from community:
|
||||
coyotebean, Davee, hitchhikr, kgsws, liquidzigong, Mathieulh, Proxima, SilverSpring
|
||||
|
||||
******************** KIRK-ENGINE ********************
|
||||
An Open-Source implementation of KIRK (PSP crypto engine) algorithms and keys.
|
||||
Includes also additional routines for hash forging.
|
||||
|
||||
********************
|
||||
|
||||
This program is free software: you can redistribute it and/or modify
|
||||
it under the terms of the GNU General Public License as published by
|
||||
the Free Software Foundation, either version 3 of the License, or
|
||||
(at your option) any later version.
|
||||
|
||||
This program is distributed in the hope that it will be useful,
|
||||
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
GNU General Public License for more details.
|
||||
|
||||
You should have received a copy of the GNU General Public License
|
||||
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
*/
|
||||
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
#include <time.h>
|
||||
|
||||
#include "kirk_engine.h"
|
||||
#include "key_vault.h"
|
||||
#include "aes.h"
|
||||
#include "sha1.h"
|
||||
|
||||
// Internal variables
|
||||
typedef struct kirk16_data
|
||||
{
|
||||
u8 fuseid[8];
|
||||
u8 mesh[0x40];
|
||||
} kirk16_data;
|
||||
|
||||
typedef struct header_keys
|
||||
{
|
||||
u8 AES[16];
|
||||
u8 CMAC[16];
|
||||
} header_keys;
|
||||
|
||||
u32 g_fuse90;
|
||||
u32 g_fuse94;
|
||||
|
||||
AES_ctx aes_kirk1;
|
||||
u8 PRNG_DATA[0x14];
|
||||
|
||||
char is_kirk_initialized;
|
||||
|
||||
// Internal functions
|
||||
u8* kirk_4_7_get_key(int key_type)
|
||||
{
|
||||
switch(key_type)
|
||||
{
|
||||
case(0x02): return kirk7_key02; break;
|
||||
case(0x03): return kirk7_key03; break;
|
||||
case(0x04): return kirk7_key04; break;
|
||||
case(0x05): return kirk7_key05; break;
|
||||
case(0x07): return kirk7_key07; break;
|
||||
case(0x0C): return kirk7_key0C; break;
|
||||
case(0x0D): return kirk7_key0D; break;
|
||||
case(0x0E): return kirk7_key0E; break;
|
||||
case(0x0F): return kirk7_key0F; break;
|
||||
case(0x10): return kirk7_key10; break;
|
||||
case(0x11): return kirk7_key11; break;
|
||||
case(0x12): return kirk7_key12; break;
|
||||
case(0x38): return kirk7_key38; break;
|
||||
case(0x39): return kirk7_key39; break;
|
||||
case(0x3A): return kirk7_key3A; break;
|
||||
case(0x44): return kirk7_key44; break;
|
||||
case(0x4B): return kirk7_key4B; break;
|
||||
case(0x53): return kirk7_key53; break;
|
||||
case(0x57): return kirk7_key57; break;
|
||||
case(0x5D): return kirk7_key5D; break;
|
||||
case(0x63): return kirk7_key63; break;
|
||||
case(0x64): return kirk7_key64; break;
|
||||
default: return (u8*)KIRK_INVALID_SIZE; break;
|
||||
}
|
||||
}
|
||||
|
||||
void decrypt_kirk16_private(u8 *dA_out, u8 *dA_enc)
|
||||
{
|
||||
int i, k;
|
||||
kirk16_data keydata;
|
||||
u8 subkey_1[0x10], subkey_2[0x10];
|
||||
rijndael_ctx aes_ctx;
|
||||
|
||||
keydata.fuseid[7] = g_fuse90 &0xFF;
|
||||
keydata.fuseid[6] = (g_fuse90>>8) &0xFF;
|
||||
keydata.fuseid[5] = (g_fuse90>>16) &0xFF;
|
||||
keydata.fuseid[4] = (g_fuse90>>24) &0xFF;
|
||||
keydata.fuseid[3] = g_fuse94 &0xFF;
|
||||
keydata.fuseid[2] = (g_fuse94>>8) &0xFF;
|
||||
keydata.fuseid[1] = (g_fuse94>>16) &0xFF;
|
||||
keydata.fuseid[0] = (g_fuse94>>24) &0xFF;
|
||||
|
||||
/* set encryption key */
|
||||
rijndael_set_key(&aes_ctx, kirk16_key, 128);
|
||||
|
||||
/* set the subkeys */
|
||||
for (i = 0; i < 0x10; i++)
|
||||
{
|
||||
/* set to the fuseid */
|
||||
subkey_2[i] = subkey_1[i] = keydata.fuseid[i % 8];
|
||||
}
|
||||
|
||||
/* do aes crypto */
|
||||
for (i = 0; i < 3; i++)
|
||||
{
|
||||
/* encrypt + decrypt */
|
||||
rijndael_encrypt(&aes_ctx, subkey_1, subkey_1);
|
||||
rijndael_decrypt(&aes_ctx, subkey_2, subkey_2);
|
||||
}
|
||||
|
||||
/* set new key */
|
||||
rijndael_set_key(&aes_ctx, subkey_1, 128);
|
||||
|
||||
/* now lets make the key mesh */
|
||||
for (i = 0; i < 3; i++)
|
||||
{
|
||||
/* do encryption in group of 3 */
|
||||
for (k = 0; k < 3; k++)
|
||||
{
|
||||
/* crypto */
|
||||
rijndael_encrypt(&aes_ctx, subkey_2, subkey_2);
|
||||
}
|
||||
|
||||
/* copy to out block */
|
||||
memcpy(&keydata.mesh[i * 0x10], subkey_2, 0x10);
|
||||
}
|
||||
|
||||
/* set the key to the mesh */
|
||||
rijndael_set_key(&aes_ctx, &keydata.mesh[0x20], 128);
|
||||
|
||||
/* do the encryption routines for the aes key */
|
||||
for (i = 0; i < 2; i++)
|
||||
{
|
||||
/* encrypt the data */
|
||||
rijndael_encrypt(&aes_ctx, &keydata.mesh[0x10], &keydata.mesh[0x10]);
|
||||
}
|
||||
|
||||
/* set the key to that mesh shit */
|
||||
rijndael_set_key(&aes_ctx, &keydata.mesh[0x10], 128);
|
||||
|
||||
/* cbc decrypt the dA */
|
||||
AES_cbc_decrypt((AES_ctx *)&aes_ctx, dA_enc, dA_out, 0x20);
|
||||
}
|
||||
|
||||
void encrypt_kirk16_private(u8 *dA_out, u8 *dA_dec)
|
||||
{
|
||||
int i, k;
|
||||
kirk16_data keydata;
|
||||
u8 subkey_1[0x10], subkey_2[0x10];
|
||||
rijndael_ctx aes_ctx;
|
||||
|
||||
keydata.fuseid[7] = g_fuse90 &0xFF;
|
||||
keydata.fuseid[6] = (g_fuse90>>8) &0xFF;
|
||||
keydata.fuseid[5] = (g_fuse90>>16) &0xFF;
|
||||
keydata.fuseid[4] = (g_fuse90>>24) &0xFF;
|
||||
keydata.fuseid[3] = g_fuse94 &0xFF;
|
||||
keydata.fuseid[2] = (g_fuse94>>8) &0xFF;
|
||||
keydata.fuseid[1] = (g_fuse94>>16) &0xFF;
|
||||
keydata.fuseid[0] = (g_fuse94>>24) &0xFF;
|
||||
/* set encryption key */
|
||||
rijndael_set_key(&aes_ctx, kirk16_key, 128);
|
||||
|
||||
/* set the subkeys */
|
||||
for (i = 0; i < 0x10; i++)
|
||||
{
|
||||
/* set to the fuseid */
|
||||
subkey_2[i] = subkey_1[i] = keydata.fuseid[i % 8];
|
||||
}
|
||||
|
||||
/* do aes crypto */
|
||||
for (i = 0; i < 3; i++)
|
||||
{
|
||||
/* encrypt + decrypt */
|
||||
rijndael_encrypt(&aes_ctx, subkey_1, subkey_1);
|
||||
rijndael_decrypt(&aes_ctx, subkey_2, subkey_2);
|
||||
}
|
||||
|
||||
/* set new key */
|
||||
rijndael_set_key(&aes_ctx, subkey_1, 128);
|
||||
|
||||
/* now lets make the key mesh */
|
||||
for (i = 0; i < 3; i++)
|
||||
{
|
||||
/* do encryption in group of 3 */
|
||||
for (k = 0; k < 3; k++)
|
||||
{
|
||||
/* crypto */
|
||||
rijndael_encrypt(&aes_ctx, subkey_2, subkey_2);
|
||||
}
|
||||
|
||||
/* copy to out block */
|
||||
memcpy(&keydata.mesh[i * 0x10], subkey_2, 0x10);
|
||||
}
|
||||
|
||||
/* set the key to the mesh */
|
||||
rijndael_set_key(&aes_ctx, &keydata.mesh[0x20], 128);
|
||||
|
||||
/* do the encryption routines for the aes key */
|
||||
for (i = 0; i < 2; i++)
|
||||
{
|
||||
/* encrypt the data */
|
||||
rijndael_encrypt(&aes_ctx, &keydata.mesh[0x10], &keydata.mesh[0x10]);
|
||||
}
|
||||
|
||||
/* set the key to that mesh shit */
|
||||
rijndael_set_key(&aes_ctx, &keydata.mesh[0x10], 128);
|
||||
|
||||
/* cbc encrypt the dA */
|
||||
AES_cbc_encrypt((AES_ctx *)&aes_ctx, dA_dec, dA_out, 0x20);
|
||||
}
|
||||
|
||||
// KIRK commands
|
||||
int kirk_init()
|
||||
{
|
||||
return kirk_init2((u8*)"Lazy Dev should have initialized!", 33, 0xBABEF00D, 0xDEADBEEF);
|
||||
}
|
||||
|
||||
int kirk_init2(u8 * rnd_seed __attribute__((unused)), u32 seed_size, u32 fuseid_90, u32 fuseid_94)
|
||||
{
|
||||
u8 temp[0x104];
|
||||
|
||||
KIRK_SHA1_HEADER *header = (KIRK_SHA1_HEADER *) temp;
|
||||
|
||||
// Another randomly selected data for a "key" to add to each randomization
|
||||
u8 key[0x10] = {0x07, 0xAB, 0xEF, 0xF8, 0x96, 0x8C, 0xF3, 0xD6, 0x14, 0xE0, 0xEB, 0xB2, 0x9D, 0x8B, 0x4E, 0x74};
|
||||
u32 curtime;
|
||||
|
||||
//Set PRNG_DATA initially, otherwise use what ever uninitialized data is in the buffer
|
||||
if(seed_size > 0) {
|
||||
u8 * seedbuf;
|
||||
KIRK_SHA1_HEADER *seedheader;;
|
||||
seedbuf=(u8*)malloc(seed_size+4);
|
||||
seedheader= (KIRK_SHA1_HEADER *) seedbuf;
|
||||
seedheader->data_size = seed_size;
|
||||
kirk_CMD11(PRNG_DATA, seedbuf, seed_size+4);
|
||||
free(seedbuf);
|
||||
}
|
||||
|
||||
memcpy(temp+4, PRNG_DATA,0x14);
|
||||
|
||||
// This uses the standard C time function for portability.
|
||||
curtime = (u32)time(0);
|
||||
temp[0x18] = curtime &0xFF;
|
||||
temp[0x19] = (curtime>>8) &0xFF;
|
||||
temp[0x1A] = (curtime>>16) &0xFF;
|
||||
temp[0x1B] = (curtime>>24) &0xFF;
|
||||
memcpy(&temp[0x1C], key, 0x10);
|
||||
|
||||
// This leaves the remainder of the 0x100 bytes in temp to whatever remains on the stack
|
||||
// in an uninitialized state. This should add unpredicableness to the results as well
|
||||
header->data_size = 0x100;
|
||||
kirk_CMD11(PRNG_DATA, temp, 0x104);
|
||||
|
||||
//Set Fuse ID
|
||||
g_fuse90 = fuseid_90;
|
||||
g_fuse94 = fuseid_94;
|
||||
|
||||
// Set KIRK1 main key
|
||||
AES_set_key(&aes_kirk1, kirk1_key, 128);
|
||||
|
||||
is_kirk_initialized = 1;
|
||||
return 0;
|
||||
}
|
||||
|
||||
int kirk_CMD0(u8* outbuff, u8* inbuff, int size, int generate_trash)
|
||||
{
|
||||
KIRK_CMD1_HEADER* header = (KIRK_CMD1_HEADER*)outbuff;
|
||||
header_keys *keys = (header_keys *)outbuff; //0-15 AES key, 16-31 CMAC key
|
||||
int chk_size;
|
||||
AES_ctx k1;
|
||||
AES_ctx cmac_key;
|
||||
u8 cmac_header_hash[16];
|
||||
u8 cmac_data_hash[16];
|
||||
|
||||
if (is_kirk_initialized == 0) return KIRK_NOT_INITIALIZED;
|
||||
|
||||
memcpy(outbuff, inbuff, size);
|
||||
|
||||
if (header->mode != KIRK_MODE_CMD1) return KIRK_INVALID_MODE;
|
||||
|
||||
// FILL PREDATA WITH RANDOM DATA
|
||||
if (generate_trash) kirk_CMD14(outbuff+sizeof(KIRK_CMD1_HEADER), header->data_offset);
|
||||
|
||||
// Make sure data is 16 aligned
|
||||
chk_size = header->data_size;
|
||||
if (chk_size % 16) chk_size += 16 - (chk_size % 16);
|
||||
|
||||
// ENCRYPT DATA
|
||||
AES_set_key(&k1, keys->AES, 128);
|
||||
AES_cbc_encrypt(&k1, inbuff+sizeof(KIRK_CMD1_HEADER)+header->data_offset, (u8*)outbuff+sizeof(KIRK_CMD1_HEADER)+header->data_offset, chk_size);
|
||||
|
||||
// CMAC HASHES
|
||||
AES_set_key(&cmac_key, keys->CMAC, 128);
|
||||
AES_CMAC(&cmac_key, outbuff+0x60, 0x30, cmac_header_hash);
|
||||
AES_CMAC(&cmac_key, outbuff+0x60, 0x30 + chk_size + header->data_offset, cmac_data_hash);
|
||||
|
||||
memcpy(header->CMAC_header_hash, cmac_header_hash, 16);
|
||||
memcpy(header->CMAC_data_hash, cmac_data_hash, 16);
|
||||
|
||||
// ENCRYPT KEYS
|
||||
AES_cbc_encrypt(&aes_kirk1, inbuff, outbuff, 16*2);
|
||||
return KIRK_OPERATION_SUCCESS;
|
||||
}
|
||||
|
||||
int kirk_CMD1(u8* outbuff, u8* inbuff, int size)
|
||||
{
|
||||
KIRK_CMD1_HEADER* header = (KIRK_CMD1_HEADER*)inbuff;
|
||||
header_keys keys; //0-15 AES key, 16-31 CMAC key
|
||||
AES_ctx k1;
|
||||
|
||||
if (size < 0x90) return KIRK_INVALID_SIZE;
|
||||
if (is_kirk_initialized == 0) return KIRK_NOT_INITIALIZED;
|
||||
if (header->mode != KIRK_MODE_CMD1) return KIRK_INVALID_MODE;
|
||||
|
||||
AES_cbc_decrypt(&aes_kirk1, inbuff, (u8*)&keys, 16*2); //decrypt AES & CMAC key to temp buffer
|
||||
|
||||
if(header->ecdsa_hash == 1)
|
||||
{
|
||||
SHA_CTX sha;
|
||||
KIRK_CMD1_ECDSA_HEADER* eheader = (KIRK_CMD1_ECDSA_HEADER*) inbuff;
|
||||
u8 kirk1_pub[40];
|
||||
u8 header_hash[20];u8 data_hash[20];
|
||||
ecdsa_set_curve(ec_p,ec_a,ec_b1,ec_N1,Gx1,Gy1);
|
||||
memcpy(kirk1_pub,Px1,20);
|
||||
memcpy(kirk1_pub+20,Py1,20);
|
||||
ecdsa_set_pub(kirk1_pub);
|
||||
|
||||
//Hash the Header
|
||||
SHAInit(&sha);
|
||||
SHAUpdate(&sha, (u8*)eheader+0x60, 0x30);
|
||||
SHAFinal(header_hash, &sha);
|
||||
|
||||
if(!ecdsa_verify(header_hash,eheader->header_sig_r,eheader->header_sig_s)) {
|
||||
return KIRK_HEADER_HASH_INVALID;
|
||||
}
|
||||
|
||||
SHAInit(&sha);
|
||||
SHAUpdate(&sha, (u8*)eheader+0x60, size-0x60);
|
||||
SHAFinal(data_hash, &sha);
|
||||
|
||||
if(!ecdsa_verify(data_hash,eheader->data_sig_r,eheader->data_sig_s)) {
|
||||
return KIRK_DATA_HASH_INVALID;
|
||||
}
|
||||
} else {
|
||||
int ret = kirk_CMD10(inbuff, size);
|
||||
if(ret != KIRK_OPERATION_SUCCESS) return ret;
|
||||
}
|
||||
|
||||
AES_set_key(&k1, keys.AES, 128);
|
||||
AES_cbc_decrypt(&k1, inbuff+sizeof(KIRK_CMD1_HEADER)+header->data_offset, outbuff, header->data_size);
|
||||
|
||||
return KIRK_OPERATION_SUCCESS;
|
||||
}
|
||||
|
||||
int kirk_CMD1_ex(u8* outbuff, u8* inbuff, int size, KIRK_CMD1_HEADER* header)
|
||||
{
|
||||
u8* buffer = (u8*)malloc(size);
|
||||
int ret;
|
||||
|
||||
memcpy(buffer, header, sizeof(KIRK_CMD1_HEADER));
|
||||
memcpy(buffer+sizeof(KIRK_CMD1_HEADER), inbuff, header->data_size);
|
||||
|
||||
ret = kirk_CMD1(outbuff, buffer, size);
|
||||
free(buffer);
|
||||
return ret;
|
||||
}
|
||||
|
||||
int kirk_CMD4(u8* outbuff, u8* inbuff, int size)
|
||||
{
|
||||
KIRK_AES128CBC_HEADER *header = (KIRK_AES128CBC_HEADER*)inbuff;
|
||||
u8* key;
|
||||
AES_ctx aesKey;
|
||||
|
||||
if (is_kirk_initialized == 0) return KIRK_NOT_INITIALIZED;
|
||||
if (header->mode != KIRK_MODE_ENCRYPT_CBC) return KIRK_INVALID_MODE;
|
||||
if (header->data_size == 0) return KIRK_DATA_SIZE_ZERO;
|
||||
|
||||
key = kirk_4_7_get_key(header->keyseed);
|
||||
if (key == (u8*)KIRK_INVALID_SIZE) return KIRK_INVALID_SIZE;
|
||||
|
||||
// Set the key
|
||||
AES_set_key(&aesKey, key, 128);
|
||||
AES_cbc_encrypt(&aesKey, inbuff+sizeof(KIRK_AES128CBC_HEADER), outbuff+sizeof(KIRK_AES128CBC_HEADER), size);
|
||||
|
||||
return KIRK_OPERATION_SUCCESS;
|
||||
}
|
||||
|
||||
int kirk_CMD7(u8* outbuff, u8* inbuff, int size)
|
||||
{
|
||||
KIRK_AES128CBC_HEADER *header = (KIRK_AES128CBC_HEADER*)inbuff;
|
||||
u8* key;
|
||||
AES_ctx aesKey;
|
||||
|
||||
if (is_kirk_initialized == 0) return KIRK_NOT_INITIALIZED;
|
||||
if (header->mode != KIRK_MODE_DECRYPT_CBC) return KIRK_INVALID_MODE;
|
||||
if (header->data_size == 0) return KIRK_DATA_SIZE_ZERO;
|
||||
|
||||
key = kirk_4_7_get_key(header->keyseed);
|
||||
if (key == (u8*)KIRK_INVALID_SIZE) return KIRK_INVALID_SIZE;
|
||||
|
||||
// Set the key
|
||||
AES_set_key(&aesKey, key, 128);
|
||||
AES_cbc_decrypt(&aesKey, inbuff+sizeof(KIRK_AES128CBC_HEADER), outbuff, size);
|
||||
|
||||
return KIRK_OPERATION_SUCCESS;
|
||||
}
|
||||
|
||||
int kirk_CMD10(u8* inbuff, int insize __attribute__((unused)))
|
||||
{
|
||||
KIRK_CMD1_HEADER* header = (KIRK_CMD1_HEADER*)inbuff;
|
||||
header_keys keys; //0-15 AES key, 16-31 CMAC key
|
||||
u8 cmac_header_hash[16];
|
||||
u8 cmac_data_hash[16];
|
||||
AES_ctx cmac_key;
|
||||
int chk_size;
|
||||
|
||||
if (is_kirk_initialized == 0) return KIRK_NOT_INITIALIZED;
|
||||
if (!(header->mode == KIRK_MODE_CMD1 || header->mode == KIRK_MODE_CMD2 || header->mode == KIRK_MODE_CMD3)) return KIRK_INVALID_MODE;
|
||||
if (header->data_size == 0) return KIRK_DATA_SIZE_ZERO;
|
||||
|
||||
if (header->mode == KIRK_MODE_CMD1)
|
||||
{
|
||||
AES_cbc_decrypt(&aes_kirk1, inbuff, (u8*)&keys, 32); //decrypt AES & CMAC key to temp buffer
|
||||
AES_set_key(&cmac_key, keys.CMAC, 128);
|
||||
AES_CMAC(&cmac_key, inbuff+0x60, 0x30, cmac_header_hash);
|
||||
|
||||
// Make sure data is 16 aligned
|
||||
chk_size = header->data_size;
|
||||
if(chk_size % 16) chk_size += 16 - (chk_size % 16);
|
||||
AES_CMAC(&cmac_key, inbuff+0x60, 0x30 + chk_size + header->data_offset, cmac_data_hash);
|
||||
|
||||
if(memcmp(cmac_header_hash, header->CMAC_header_hash, 16) != 0) return KIRK_HEADER_HASH_INVALID;
|
||||
if(memcmp(cmac_data_hash, header->CMAC_data_hash, 16) != 0) return KIRK_DATA_HASH_INVALID;
|
||||
|
||||
return KIRK_OPERATION_SUCCESS;
|
||||
}
|
||||
|
||||
return KIRK_SIG_CHECK_INVALID; //Checks for cmd 2 & 3 not included right now
|
||||
}
|
||||
|
||||
int kirk_CMD11(u8* outbuff, u8* inbuff, int size)
|
||||
{
|
||||
KIRK_SHA1_HEADER *header = (KIRK_SHA1_HEADER *)inbuff;
|
||||
SHA_CTX sha;
|
||||
if (is_kirk_initialized == 0) return KIRK_NOT_INITIALIZED;
|
||||
if (header->data_size == 0 || size == 0) return KIRK_DATA_SIZE_ZERO;
|
||||
|
||||
SHAInit(&sha);
|
||||
SHAUpdate(&sha, inbuff+sizeof(KIRK_SHA1_HEADER), header->data_size);
|
||||
SHAFinal(outbuff, &sha);
|
||||
|
||||
return KIRK_OPERATION_SUCCESS;
|
||||
}
|
||||
|
||||
int kirk_CMD12(u8 * outbuff, int outsize)
|
||||
{
|
||||
u8 k[0x15];
|
||||
KIRK_CMD12_BUFFER * keypair = (KIRK_CMD12_BUFFER *) outbuff;
|
||||
|
||||
if (outsize != 0x3C) return KIRK_INVALID_SIZE;
|
||||
ecdsa_set_curve(ec_p,ec_a,ec_b2,ec_N2,Gx2,Gy2);
|
||||
k[0] = 0;
|
||||
|
||||
kirk_CMD14(k+1,0x14);
|
||||
ec_priv_to_pub(k, (u8*)keypair->public_key.x);
|
||||
memcpy(keypair->private_key,k+1,0x14);
|
||||
|
||||
return KIRK_OPERATION_SUCCESS;
|
||||
}
|
||||
|
||||
int kirk_CMD13(u8 * outbuff, int outsize,u8 * inbuff, int insize)
|
||||
{
|
||||
u8 k[0x15];
|
||||
KIRK_CMD13_BUFFER * pointmult = (KIRK_CMD13_BUFFER *) inbuff;
|
||||
k[0]=0;
|
||||
|
||||
if (outsize != 0x28) return KIRK_INVALID_SIZE;
|
||||
if (insize != 0x3C) return KIRK_INVALID_SIZE;
|
||||
|
||||
ecdsa_set_curve(ec_p,ec_a,ec_b2,ec_N2,Gx2,Gy2);
|
||||
ecdsa_set_pub((u8*)pointmult->public_key.x);
|
||||
memcpy(k+1,pointmult->multiplier,0x14);
|
||||
ec_pub_mult(k, outbuff);
|
||||
|
||||
return KIRK_OPERATION_SUCCESS;
|
||||
}
|
||||
|
||||
int kirk_CMD14(u8 * outbuff, int outsize)
|
||||
{
|
||||
u8 temp[0x104];
|
||||
KIRK_SHA1_HEADER *header = (KIRK_SHA1_HEADER *) temp;
|
||||
|
||||
// Some randomly selected data for a "key" to add to each randomization
|
||||
u8 key[0x10] = { 0xA7, 0x2E, 0x4C, 0xB6, 0xC3, 0x34, 0xDF, 0x85, 0x70, 0x01, 0x49, 0xFC, 0xC0, 0x87, 0xC4, 0x77 };
|
||||
u32 curtime;
|
||||
|
||||
if(outsize <=0) return KIRK_OPERATION_SUCCESS;
|
||||
|
||||
memcpy(temp+4, PRNG_DATA,0x14);
|
||||
|
||||
// This uses the standard C time function for portability.
|
||||
curtime=(u32)time(0);
|
||||
temp[0x18] = curtime &0xFF;
|
||||
temp[0x19] = (curtime>>8) &0xFF;
|
||||
temp[0x1A] = (curtime>>16) &0xFF;
|
||||
temp[0x1B] = (curtime>>24) &0xFF;
|
||||
memcpy(&temp[0x1C], key, 0x10);
|
||||
|
||||
// This leaves the remainder of the 0x100 bytes in temp to whatever remains on the stack
|
||||
// in an uninitialized state. This should add unpredicableness to the results as well
|
||||
header->data_size=0x100;
|
||||
kirk_CMD11(PRNG_DATA, temp, 0x104);
|
||||
|
||||
while(outsize)
|
||||
{
|
||||
int blockrem = outsize %0x14;
|
||||
int block = outsize /0x14;
|
||||
|
||||
if(block)
|
||||
{
|
||||
memcpy(outbuff, PRNG_DATA, 0x14);
|
||||
outbuff += 0x14;
|
||||
outsize -= 0x14;
|
||||
kirk_CMD14(outbuff, outsize);
|
||||
} else {
|
||||
if(blockrem)
|
||||
{
|
||||
memcpy(outbuff, PRNG_DATA, blockrem);
|
||||
outsize -= blockrem;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
return KIRK_OPERATION_SUCCESS;
|
||||
}
|
||||
|
||||
int kirk_CMD16(u8 * outbuff, int outsize, u8 * inbuff, int insize)
|
||||
{
|
||||
u8 dec_private[0x20];
|
||||
KIRK_CMD16_BUFFER * signbuf = (KIRK_CMD16_BUFFER *) inbuff;
|
||||
ECDSA_SIG * sig = (ECDSA_SIG *) outbuff;
|
||||
|
||||
if (insize != 0x34) return KIRK_INVALID_SIZE;
|
||||
if (outsize != 0x28) return KIRK_INVALID_SIZE;
|
||||
|
||||
decrypt_kirk16_private(dec_private,signbuf->enc_private);
|
||||
|
||||
// Clear out the padding for safety
|
||||
memset(&dec_private[0x14], 0, 0xC);
|
||||
|
||||
ecdsa_set_curve(ec_p,ec_a,ec_b2,ec_N2,Gx2,Gy2);
|
||||
ecdsa_set_priv(dec_private);
|
||||
ecdsa_sign(signbuf->message_hash,sig->r, sig->s);
|
||||
|
||||
return KIRK_OPERATION_SUCCESS;
|
||||
}
|
||||
|
||||
int kirk_CMD17(u8 * inbuff, int insize)
|
||||
{
|
||||
KIRK_CMD17_BUFFER * sig = (KIRK_CMD17_BUFFER *) inbuff;
|
||||
|
||||
if (insize != 0x64) return KIRK_INVALID_SIZE;
|
||||
|
||||
ecdsa_set_curve(ec_p,ec_a,ec_b2,ec_N2,Gx2,Gy2);
|
||||
ecdsa_set_pub(sig->public_key.x);
|
||||
|
||||
if (ecdsa_verify(sig->message_hash,sig->signature.r,sig->signature.s)) {
|
||||
return KIRK_OPERATION_SUCCESS;
|
||||
} else {
|
||||
return KIRK_SIG_CHECK_INVALID;
|
||||
}
|
||||
}
|
||||
|
||||
// SCE functions
|
||||
int sceUtilsBufferCopyWithRange(u8* outbuff, int outsize, u8* inbuff, int insize, int cmd)
|
||||
{
|
||||
switch(cmd)
|
||||
{
|
||||
case KIRK_CMD_DECRYPT_PRIVATE: return kirk_CMD1(outbuff, inbuff, insize); break;
|
||||
case KIRK_CMD_ENCRYPT_IV_0: return kirk_CMD4(outbuff, inbuff, insize); break;
|
||||
case KIRK_CMD_DECRYPT_IV_0: return kirk_CMD7(outbuff, inbuff, insize); break;
|
||||
case KIRK_CMD_PRIV_SIGN_CHECK: return kirk_CMD10(inbuff, insize); break;
|
||||
case KIRK_CMD_SHA1_HASH: return kirk_CMD11(outbuff, inbuff, insize); break;
|
||||
case KIRK_CMD_ECDSA_GEN_KEYS: return kirk_CMD12(outbuff,outsize); break;
|
||||
case KIRK_CMD_ECDSA_MULTIPLY_POINT: return kirk_CMD13(outbuff,outsize, inbuff, insize); break;
|
||||
case KIRK_CMD_PRNG: return kirk_CMD14(outbuff,outsize); break;
|
||||
case KIRK_CMD_ECDSA_SIGN: return kirk_CMD16(outbuff, outsize, inbuff, insize); break;
|
||||
case KIRK_CMD_ECDSA_VERIFY: return kirk_CMD17(inbuff, insize); break;
|
||||
}
|
||||
return -1;
|
||||
}
|
245
src/libkirk/kirk_engine.h
Normal file
245
src/libkirk/kirk_engine.h
Normal file
|
@ -0,0 +1,245 @@
|
|||
/*
|
||||
Draan proudly presents:
|
||||
|
||||
With huge help from community:
|
||||
coyotebean, Davee, hitchhikr, kgsws, liquidzigong, Mathieulh, Proxima, SilverSpring
|
||||
|
||||
******************** KIRK-ENGINE ********************
|
||||
An Open-Source implementation of KIRK (PSP crypto engine) algorithms and keys.
|
||||
Includes also additional routines for hash forging.
|
||||
|
||||
********************
|
||||
|
||||
This program is free software: you can redistribute it and/or modify
|
||||
it under the terms of the GNU General Public License as published by
|
||||
the Free Software Foundation, either version 3 of the License, or
|
||||
(at your option) any later version.
|
||||
|
||||
This program is distributed in the hope that it will be useful,
|
||||
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
GNU General Public License for more details.
|
||||
|
||||
You should have received a copy of the GNU General Public License
|
||||
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
*/
|
||||
|
||||
#ifndef KIRK_ENGINE
|
||||
#define KIRK_ENGINE
|
||||
|
||||
typedef unsigned char u8;
|
||||
typedef unsigned short int u16;
|
||||
typedef unsigned int u32;
|
||||
|
||||
// Macros
|
||||
#define round_up(x,n) (-(-(x) & -(n)))
|
||||
#define array_size(x) (sizeof(x) / sizeof(*(x)))
|
||||
|
||||
// KIRK return values
|
||||
#define KIRK_OPERATION_SUCCESS 0
|
||||
#define KIRK_NOT_ENABLED 1
|
||||
#define KIRK_INVALID_MODE 2
|
||||
#define KIRK_HEADER_HASH_INVALID 3
|
||||
#define KIRK_DATA_HASH_INVALID 4
|
||||
#define KIRK_SIG_CHECK_INVALID 5
|
||||
#define KIRK_UNK_1 6
|
||||
#define KIRK_UNK_2 7
|
||||
#define KIRK_UNK_3 8
|
||||
#define KIRK_UNK_4 9
|
||||
#define KIRK_UNK_5 0xA
|
||||
#define KIRK_UNK_6 0xB
|
||||
#define KIRK_NOT_INITIALIZED 0xC
|
||||
#define KIRK_INVALID_OPERATION 0xD
|
||||
#define KIRK_INVALID_SEED_CODE 0xE
|
||||
#define KIRK_INVALID_SIZE 0xF
|
||||
#define KIRK_DATA_SIZE_ZERO 0x10
|
||||
|
||||
// sceUtilsBufferCopyWithRange modes
|
||||
#define KIRK_CMD_DECRYPT_PRIVATE 1
|
||||
#define KIRK_CMD_2 2
|
||||
#define KIRK_CMD_3 3
|
||||
#define KIRK_CMD_ENCRYPT_IV_0 4
|
||||
#define KIRK_CMD_ENCRYPT_IV_FUSE 5
|
||||
#define KIRK_CMD_ENCRYPT_IV_USER 6
|
||||
#define KIRK_CMD_DECRYPT_IV_0 7
|
||||
#define KIRK_CMD_DECRYPT_IV_FUSE 8
|
||||
#define KIRK_CMD_DECRYPT_IV_USER 9
|
||||
#define KIRK_CMD_PRIV_SIGN_CHECK 10
|
||||
#define KIRK_CMD_SHA1_HASH 11
|
||||
#define KIRK_CMD_ECDSA_GEN_KEYS 12
|
||||
#define KIRK_CMD_ECDSA_MULTIPLY_POINT 13
|
||||
#define KIRK_CMD_PRNG 14
|
||||
#define KIRK_CMD_15 15
|
||||
#define KIRK_CMD_ECDSA_SIGN 16
|
||||
#define KIRK_CMD_ECDSA_VERIFY 17
|
||||
|
||||
// KIRK header modes
|
||||
#define KIRK_MODE_CMD1 1
|
||||
#define KIRK_MODE_CMD2 2
|
||||
#define KIRK_MODE_CMD3 3
|
||||
#define KIRK_MODE_ENCRYPT_CBC 4
|
||||
#define KIRK_MODE_DECRYPT_CBC 5
|
||||
|
||||
// sceUtilsBufferCopyWithRange errors
|
||||
#define SUBCWR_NOT_16_ALGINED 0x90A
|
||||
#define SUBCWR_HEADER_HASH_INVALID 0x920
|
||||
#define SUBCWR_BUFFER_TOO_SMALL 0x1000
|
||||
|
||||
// Structs
|
||||
typedef struct
|
||||
{
|
||||
int mode;
|
||||
int unk_4;
|
||||
int unk_8;
|
||||
int keyseed;
|
||||
int data_size;
|
||||
} KIRK_AES128CBC_HEADER;
|
||||
|
||||
typedef struct
|
||||
{
|
||||
u8 AES_key[16];
|
||||
u8 CMAC_key[16];
|
||||
u8 CMAC_header_hash[16];
|
||||
u8 CMAC_data_hash[16];
|
||||
u8 unused[32];
|
||||
u32 mode;
|
||||
u8 ecdsa_hash;
|
||||
u8 unk3[11];
|
||||
u32 data_size;
|
||||
u32 data_offset;
|
||||
u8 unk4[8];
|
||||
u8 unk5[16];
|
||||
} KIRK_CMD1_HEADER;
|
||||
|
||||
typedef struct
|
||||
{
|
||||
u8 AES_key[16];
|
||||
u8 header_sig_r[20];
|
||||
u8 header_sig_s[20];
|
||||
u8 data_sig_r[20];
|
||||
u8 data_sig_s[20];
|
||||
u32 mode;
|
||||
u8 ecdsa_hash;
|
||||
u8 unk3[11];
|
||||
u32 data_size;
|
||||
u32 data_offset;
|
||||
u8 unk4[8];
|
||||
u8 unk5[16];
|
||||
} KIRK_CMD1_ECDSA_HEADER;
|
||||
|
||||
typedef struct
|
||||
{
|
||||
u8 r[0x14];
|
||||
u8 s[0x14];
|
||||
} ECDSA_SIG;
|
||||
|
||||
typedef struct
|
||||
{
|
||||
u8 x[0x14];
|
||||
u8 y[0x14];
|
||||
} ECDSA_POINT;
|
||||
|
||||
typedef struct
|
||||
{
|
||||
u32 data_size;
|
||||
} KIRK_SHA1_HEADER;
|
||||
|
||||
typedef struct
|
||||
{
|
||||
u8 private_key[0x14];
|
||||
ECDSA_POINT public_key;
|
||||
} KIRK_CMD12_BUFFER;
|
||||
|
||||
typedef struct
|
||||
{
|
||||
u8 multiplier[0x14];
|
||||
ECDSA_POINT public_key;
|
||||
} KIRK_CMD13_BUFFER;
|
||||
|
||||
typedef struct
|
||||
{
|
||||
u8 enc_private[0x20];
|
||||
u8 message_hash[0x14];
|
||||
} KIRK_CMD16_BUFFER;
|
||||
|
||||
typedef struct
|
||||
{
|
||||
ECDSA_POINT public_key;
|
||||
u8 message_hash[0x14];
|
||||
ECDSA_SIG signature;
|
||||
} KIRK_CMD17_BUFFER;
|
||||
|
||||
// KIRK commands
|
||||
/*
|
||||
// Private Sig + Cipher
|
||||
0x01: Super-Duper decryption (no inverse)
|
||||
0x02: Encrypt Operation (inverse of 0x03)
|
||||
0x03: Decrypt Operation (inverse of 0x02)
|
||||
|
||||
// Cipher
|
||||
0x04: Encrypt Operation (inverse of 0x07) (IV=0)
|
||||
0x05: Encrypt Operation (inverse of 0x08) (IV=FuseID)
|
||||
0x06: Encrypt Operation (inverse of 0x09) (IV=UserDefined)
|
||||
0x07: Decrypt Operation (inverse of 0x04)
|
||||
0x08: Decrypt Operation (inverse of 0x05)
|
||||
0x09: Decrypt Operation (inverse of 0x06)
|
||||
|
||||
// Sig Gens
|
||||
0x0A: Private Signature Check (checks for private SCE sig)
|
||||
0x0B: SHA1 Hash
|
||||
0x0C: Mul1
|
||||
0x0D: Mul2
|
||||
0x0E: Random Number Gen
|
||||
0x0F: (absolutely no idea – could be KIRK initialization)
|
||||
0x10: Signature Gen
|
||||
|
||||
// Sig Checks
|
||||
0x11: Signature Check (checks for generated sigs)
|
||||
0x12: Certificate Check (idstorage signatures)
|
||||
*/
|
||||
|
||||
int kirk_init();
|
||||
int kirk_init2(u8 *, u32, u32, u32);
|
||||
int kirk_CMD0(u8* outbuff, u8* inbuff, int size, int generate_trash);
|
||||
int kirk_CMD1(u8* outbuff, u8* inbuff, int size);
|
||||
int kirk_CMD1_ex(u8* outbuff, u8* inbuff, int size, KIRK_CMD1_HEADER* header);
|
||||
int kirk_CMD4(u8* outbuff, u8* inbuff, int size);
|
||||
int kirk_CMD7(u8* outbuff, u8* inbuff, int size);
|
||||
int kirk_CMD10(u8* inbuff, int insize);
|
||||
int kirk_CMD11(u8* outbuff, u8* inbuff, int size);
|
||||
int kirk_CMD12(u8* outbuff, int outsize);
|
||||
int kirk_CMD13(u8* outbuff, int outsize,u8* inbuff, int insize);
|
||||
int kirk_CMD14(u8* outbuff, int outsize);
|
||||
int kirk_CMD16(u8* outbuff, int outsize,u8* inbuff, int insize);
|
||||
int kirk_CMD17(u8* inbuff, int insize);
|
||||
|
||||
// Internal functions
|
||||
u8* kirk_4_7_get_key(int key_type);
|
||||
void decrypt_kirk16_private(u8 *dA_out, u8 *dA_enc);
|
||||
void encrypt_kirk16_private(u8 *dA_out, u8 *dA_dec);
|
||||
|
||||
// SCE functions
|
||||
int sceUtilsSetFuseID(u8*fuse);
|
||||
int sceUtilsBufferCopyWithRange(u8* outbuff, int outsize, u8* inbuff, int insize, int cmd);
|
||||
|
||||
// Prototypes for the Elliptic Curve and Big Number functions
|
||||
int ecdsa_get_params(u32 type, u8 *p, u8 *a, u8 *b, u8 *N, u8 *Gx, u8 *Gy);
|
||||
int ecdsa_set_curve(u8* p,u8* a,u8* b,u8* N,u8* Gx,u8* Gy);
|
||||
void ecdsa_set_pub(u8 *Q);
|
||||
void ecdsa_set_priv(u8 *k);
|
||||
int ecdsa_verify(u8 *hash, u8 *R, u8 *S);
|
||||
void ecdsa_sign(u8 *hash, u8 *R, u8 *S);
|
||||
void ec_priv_to_pub(u8 *k, u8 *Q);
|
||||
void ec_pub_mult(u8 *k, u8 *Q);
|
||||
void bn_copy(u8 *d, u8 *a, u32 n);
|
||||
int bn_compare(u8 *a, u8 *b, u32 n);
|
||||
void bn_reduce(u8 *d, u8 *N, u32 n);
|
||||
void bn_add(u8 *d, u8 *a, u8 *b, u8 *N, u32 n);
|
||||
void bn_sub(u8 *d, u8 *a, u8 *b, u8 *N, u32 n);
|
||||
void bn_to_mon(u8 *d, u8 *N, u32 n);
|
||||
void bn_from_mon(u8 *d, u8 *N, u32 n);
|
||||
void bn_mon_mul(u8 *d, u8 *a, u8 *b, u8 *N, u32 n);
|
||||
void bn_mon_inv(u8 *d, u8 *a, u8 *N, u32 n);
|
||||
void hex_dump(char *str, u8 *buf, int size);
|
||||
|
||||
#endif
|
148
src/libkirk/psp_headers.h
Normal file
148
src/libkirk/psp_headers.h
Normal file
|
@ -0,0 +1,148 @@
|
|||
// Copyright (C) 2013 tpu
|
||||
// Copyright (C) 2015 Hykem <hykem@hotmail.com>
|
||||
// Licensed under the terms of the GNU GPL, version 3
|
||||
// http://www.gnu.org/licenses/gpl-3.0.txt
|
||||
|
||||
/* Values for p_type. */
|
||||
#define PT_LOAD 1 /* Loadable segment. */
|
||||
|
||||
/* Values for p_flags. */
|
||||
#define PF_X 0x1 /* Executable. */
|
||||
#define PF_W 0x2 /* Writable. */
|
||||
#define PF_R 0x4 /* Readable. */
|
||||
#define PF_RW (PF_R|PF_W)
|
||||
|
||||
typedef struct
|
||||
{
|
||||
u32 e_magic;
|
||||
u8 e_class;
|
||||
u8 e_data;
|
||||
u8 e_idver;
|
||||
u8 e_pad[9];
|
||||
u16 e_type;
|
||||
u16 e_machine;
|
||||
u32 e_version;
|
||||
u32 e_entry;
|
||||
u32 e_phoff;
|
||||
u32 e_shoff;
|
||||
u32 e_flags;
|
||||
u16 e_ehsize;
|
||||
u16 e_phentsize;
|
||||
u16 e_phnum;
|
||||
u16 e_shentsize;
|
||||
u16 e_shnum;
|
||||
u16 e_shstrndx;
|
||||
} __attribute__((packed)) Elf32_Ehdr;
|
||||
|
||||
typedef struct
|
||||
{
|
||||
u32 p_type;
|
||||
u32 p_offset;
|
||||
u32 p_vaddr;
|
||||
u32 p_paddr;
|
||||
u32 p_filesz;
|
||||
u32 p_memsz;
|
||||
u32 p_flags;
|
||||
u32 p_align;
|
||||
} __attribute__((packed)) Elf32_Phdr;
|
||||
|
||||
typedef struct
|
||||
{
|
||||
u32 sh_name;
|
||||
u32 sh_type;
|
||||
u32 sh_flags;
|
||||
u32 sh_addr;
|
||||
u32 sh_offset;
|
||||
u32 sh_size;
|
||||
u32 sh_link;
|
||||
u32 sh_info;
|
||||
u32 sh_addralign;
|
||||
u32 sh_entsize;
|
||||
} __attribute__((packed)) Elf32_Shdr;
|
||||
|
||||
typedef struct {
|
||||
u32 r_offset;
|
||||
u32 r_info; /* sym, type: ELF32_R_... */
|
||||
} Elf32_Rel;
|
||||
|
||||
typedef struct {
|
||||
u16 modattribute;
|
||||
u8 modversion[2]; /* minor, major, etc... */
|
||||
char modname[28];
|
||||
void *gp_value;
|
||||
void *ent_top;
|
||||
void *ent_end;
|
||||
void *stub_top;
|
||||
void *stub_end;
|
||||
} SceModuleInfo;
|
||||
|
||||
typedef struct
|
||||
{
|
||||
u32 signature; //0
|
||||
u16 mod_attribute; //4
|
||||
u16 comp_attribute; //6 compress method:
|
||||
// 0x0001=PRX Compress
|
||||
// 0x0002=ELF Packed
|
||||
// 0x0008=GZIP overlap
|
||||
// 0x0200=KL4E(if not set, GZIP)
|
||||
u8 module_ver_lo; //8
|
||||
u8 module_ver_hi; //9
|
||||
char modname[28]; //0xA
|
||||
u8 mod_version; //0x26
|
||||
u8 nsegments; //0x27
|
||||
u32 elf_size; //0x28
|
||||
u32 psp_size; //0x2C
|
||||
u32 boot_entry; //0x30
|
||||
u32 modinfo_offset; //0x34
|
||||
int bss_size; //0x38
|
||||
u16 seg_align[4]; //0x3C
|
||||
u32 seg_address[4]; //0x44
|
||||
int seg_size[4]; //0x54
|
||||
u32 reserved[5]; //0x64
|
||||
u32 devkit_version; //0x78
|
||||
u8 decrypt_mode; //0x7C
|
||||
u8 padding; //0x7D
|
||||
u16 overlap_size; //0x7E
|
||||
u8 key_data[0x30]; //0x80
|
||||
u32 comp_size; //0xB0 kirk data_size
|
||||
int _80; //0xB4 kirk data_offset
|
||||
u32 unk_B8; //0xB8
|
||||
u32 unk_BC; //0xBC
|
||||
u8 key_data2[0x10]; //0xC0
|
||||
u32 tag; //0xD0
|
||||
u8 scheck[0x58]; //0xD4
|
||||
u8 sha1_hash[0x14]; //0x12C
|
||||
u8 key_data4[0x10]; //0x140
|
||||
} __attribute__((packed)) PSP_Header2; //0x150
|
||||
|
||||
typedef struct
|
||||
{
|
||||
u32 signature; // 0
|
||||
u16 attribute;
|
||||
u8 module_ver_lo;
|
||||
u8 module_ver_hi;
|
||||
char modname[28];
|
||||
u8 version; // 26
|
||||
u8 nsegments; // 27
|
||||
int elf_size; // 28
|
||||
int psp_size; // 2C
|
||||
u32 entry; // 30
|
||||
u32 modinfo_offset; // 34
|
||||
int bss_size; // 38
|
||||
u16 seg_align[4]; // 3C
|
||||
u32 seg_address[4]; // 44
|
||||
int seg_size[4]; // 54
|
||||
u32 reserved[5]; // 64
|
||||
u32 devkitversion; // 78
|
||||
u32 decrypt_mode; // 7C
|
||||
u8 key_data0[0x30]; // 80
|
||||
int comp_size; // B0
|
||||
int _80; // B4
|
||||
int reserved2[2]; // B8
|
||||
u8 key_data1[0x10]; // C0
|
||||
u32 tag; // D0
|
||||
u8 scheck[0x58]; // D4
|
||||
u32 key_data2; // 12C
|
||||
u32 oe_tag; // 130
|
||||
u8 key_data3[0x1C]; // 134
|
||||
} __attribute__((packed)) PSP_Header;
|
389
src/libkirk/sha1.c
Normal file
389
src/libkirk/sha1.c
Normal file
|
@ -0,0 +1,389 @@
|
|||
/* sha1.c : Implementation of the Secure Hash Algorithm */
|
||||
|
||||
/* SHA: NIST's Secure Hash Algorithm */
|
||||
|
||||
/* This version written November 2000 by David Ireland of
|
||||
DI Management Services Pty Limited <code@di-mgt.com.au>
|
||||
|
||||
Adapted from code in the Python Cryptography Toolkit,
|
||||
version 1.0.0 by A.M. Kuchling 1995.
|
||||
*/
|
||||
|
||||
/* AM Kuchling's posting:-
|
||||
Based on SHA code originally posted to sci.crypt by Peter Gutmann
|
||||
in message <30ajo5$oe8@ccu2.auckland.ac.nz>.
|
||||
Modified to test for endianness on creation of SHA objects by AMK.
|
||||
Also, the original specification of SHA was found to have a weakness
|
||||
by NSA/NIST. This code implements the fixed version of SHA.
|
||||
*/
|
||||
|
||||
/* Here's the first paragraph of Peter Gutmann's posting:
|
||||
|
||||
The following is my SHA (FIPS 180) code updated to allow use of the "fixed"
|
||||
SHA, thanks to Jim Gillogly and an anonymous contributor for the information on
|
||||
what's changed in the new version. The fix is a simple change which involves
|
||||
adding a single rotate in the initial expansion function. It is unknown
|
||||
whether this is an optimal solution to the problem which was discovered in the
|
||||
SHA or whether it's simply a bandaid which fixes the problem with a minimum of
|
||||
effort (for example the reengineering of a great many Capstone chips).
|
||||
*/
|
||||
|
||||
/* h files included here to make this just one file ... */
|
||||
|
||||
/* sha.c */
|
||||
#include "sha1.h"
|
||||
|
||||
#include <stdio.h>
|
||||
#include <string.h>
|
||||
|
||||
static void SHAtoByte(BYTE *output, UINT4 *input, unsigned int len);
|
||||
|
||||
/* The SHS block size and message digest sizes, in bytes */
|
||||
|
||||
#define SHS_DATASIZE 64
|
||||
#define SHS_DIGESTSIZE 20
|
||||
|
||||
|
||||
/* The SHS f()-functions. The f1 and f3 functions can be optimized to
|
||||
save one boolean operation each - thanks to Rich Schroeppel,
|
||||
rcs@cs.arizona.edu for discovering this */
|
||||
|
||||
/*#define f1(x,y,z) ( ( x & y ) | ( ~x & z ) ) // Rounds 0-19 */
|
||||
#define f1(x,y,z) ( z ^ ( x & ( y ^ z ) ) ) /* Rounds 0-19 */
|
||||
#define f2(x,y,z) ( x ^ y ^ z ) /* Rounds 20-39 */
|
||||
/*#define f3(x,y,z) ( ( x & y ) | ( x & z ) | ( y & z ) ) // Rounds 40-59 */
|
||||
#define f3(x,y,z) ( ( x & y ) | ( z & ( x | y ) ) ) /* Rounds 40-59 */
|
||||
#define f4(x,y,z) ( x ^ y ^ z ) /* Rounds 60-79 */
|
||||
|
||||
/* The SHS Mysterious Constants */
|
||||
|
||||
#define K1 0x5A827999L /* Rounds 0-19 */
|
||||
#define K2 0x6ED9EBA1L /* Rounds 20-39 */
|
||||
#define K3 0x8F1BBCDCL /* Rounds 40-59 */
|
||||
#define K4 0xCA62C1D6L /* Rounds 60-79 */
|
||||
|
||||
/* SHS initial values */
|
||||
|
||||
#define h0init 0x67452301L
|
||||
#define h1init 0xEFCDAB89L
|
||||
#define h2init 0x98BADCFEL
|
||||
#define h3init 0x10325476L
|
||||
#define h4init 0xC3D2E1F0L
|
||||
|
||||
/* Note that it may be necessary to add parentheses to these macros if they
|
||||
are to be called with expressions as arguments */
|
||||
/* 32-bit rotate left - kludged with shifts */
|
||||
|
||||
#define ROTL(n,X) ( ( ( X ) << n ) | ( ( X ) >> ( 32 - n ) ) )
|
||||
|
||||
/* The initial expanding function. The hash function is defined over an
|
||||
80-UINT2 expanded input array W, where the first 16 are copies of the input
|
||||
data, and the remaining 64 are defined by
|
||||
|
||||
W[ i ] = W[ i - 16 ] ^ W[ i - 14 ] ^ W[ i - 8 ] ^ W[ i - 3 ]
|
||||
|
||||
This implementation generates these values on the fly in a circular
|
||||
buffer - thanks to Colin Plumb, colin@nyx10.cs.du.edu for this
|
||||
optimization.
|
||||
|
||||
The updated SHS changes the expanding function by adding a rotate of 1
|
||||
bit. Thanks to Jim Gillogly, jim@rand.org, and an anonymous contributor
|
||||
for this information */
|
||||
|
||||
#define expand(W,i) ( W[ i & 15 ] = ROTL( 1, ( W[ i & 15 ] ^ W[ (i - 14) & 15 ] ^ \
|
||||
W[ (i - 8) & 15 ] ^ W[ (i - 3) & 15 ] ) ) )
|
||||
|
||||
|
||||
/* The prototype SHS sub-round. The fundamental sub-round is:
|
||||
|
||||
a' = e + ROTL( 5, a ) + f( b, c, d ) + k + data;
|
||||
b' = a;
|
||||
c' = ROTL( 30, b );
|
||||
d' = c;
|
||||
e' = d;
|
||||
|
||||
but this is implemented by unrolling the loop 5 times and renaming the
|
||||
variables ( e, a, b, c, d ) = ( a', b', c', d', e' ) each iteration.
|
||||
This code is then replicated 20 times for each of the 4 functions, using
|
||||
the next 20 values from the W[] array each time */
|
||||
|
||||
#define subRound(a, b, c, d, e, f, k, data) \
|
||||
( e += ROTL( 5, a ) + f( b, c, d ) + k + data, b = ROTL( 30, b ) )
|
||||
|
||||
/* Initialize the SHS values */
|
||||
|
||||
void SHAInit(SHA_CTX *shsInfo)
|
||||
{
|
||||
endianTest(&shsInfo->Endianness);
|
||||
/* Set the h-vars to their initial values */
|
||||
shsInfo->digest[ 0 ] = h0init;
|
||||
shsInfo->digest[ 1 ] = h1init;
|
||||
shsInfo->digest[ 2 ] = h2init;
|
||||
shsInfo->digest[ 3 ] = h3init;
|
||||
shsInfo->digest[ 4 ] = h4init;
|
||||
|
||||
/* Initialise bit count */
|
||||
shsInfo->countLo = shsInfo->countHi = 0;
|
||||
}
|
||||
|
||||
|
||||
/* Perform the SHS transformation. Note that this code, like MD5, seems to
|
||||
break some optimizing compilers due to the complexity of the expressions
|
||||
and the size of the basic block. It may be necessary to split it into
|
||||
sections, e.g. based on the four subrounds
|
||||
|
||||
Note that this corrupts the shsInfo->data area */
|
||||
|
||||
static void SHSTransform( digest, data )
|
||||
UINT4 *digest, *data ;
|
||||
{
|
||||
UINT4 A, B, C, D, E; /* Local vars */
|
||||
UINT4 eData[ 16 ]; /* Expanded data */
|
||||
|
||||
/* Set up first buffer and local data buffer */
|
||||
A = digest[ 0 ];
|
||||
B = digest[ 1 ];
|
||||
C = digest[ 2 ];
|
||||
D = digest[ 3 ];
|
||||
E = digest[ 4 ];
|
||||
memcpy( (POINTER)eData, (POINTER)data, SHS_DATASIZE );
|
||||
|
||||
/* Heavy mangling, in 4 sub-rounds of 20 interations each. */
|
||||
subRound( A, B, C, D, E, f1, K1, eData[ 0 ] );
|
||||
subRound( E, A, B, C, D, f1, K1, eData[ 1 ] );
|
||||
subRound( D, E, A, B, C, f1, K1, eData[ 2 ] );
|
||||
subRound( C, D, E, A, B, f1, K1, eData[ 3 ] );
|
||||
subRound( B, C, D, E, A, f1, K1, eData[ 4 ] );
|
||||
subRound( A, B, C, D, E, f1, K1, eData[ 5 ] );
|
||||
subRound( E, A, B, C, D, f1, K1, eData[ 6 ] );
|
||||
subRound( D, E, A, B, C, f1, K1, eData[ 7 ] );
|
||||
subRound( C, D, E, A, B, f1, K1, eData[ 8 ] );
|
||||
subRound( B, C, D, E, A, f1, K1, eData[ 9 ] );
|
||||
subRound( A, B, C, D, E, f1, K1, eData[ 10 ] );
|
||||
subRound( E, A, B, C, D, f1, K1, eData[ 11 ] );
|
||||
subRound( D, E, A, B, C, f1, K1, eData[ 12 ] );
|
||||
subRound( C, D, E, A, B, f1, K1, eData[ 13 ] );
|
||||
subRound( B, C, D, E, A, f1, K1, eData[ 14 ] );
|
||||
subRound( A, B, C, D, E, f1, K1, eData[ 15 ] );
|
||||
subRound( E, A, B, C, D, f1, K1, expand( eData, 16 ) );
|
||||
subRound( D, E, A, B, C, f1, K1, expand( eData, 17 ) );
|
||||
subRound( C, D, E, A, B, f1, K1, expand( eData, 18 ) );
|
||||
subRound( B, C, D, E, A, f1, K1, expand( eData, 19 ) );
|
||||
|
||||
subRound( A, B, C, D, E, f2, K2, expand( eData, 20 ) );
|
||||
subRound( E, A, B, C, D, f2, K2, expand( eData, 21 ) );
|
||||
subRound( D, E, A, B, C, f2, K2, expand( eData, 22 ) );
|
||||
subRound( C, D, E, A, B, f2, K2, expand( eData, 23 ) );
|
||||
subRound( B, C, D, E, A, f2, K2, expand( eData, 24 ) );
|
||||
subRound( A, B, C, D, E, f2, K2, expand( eData, 25 ) );
|
||||
subRound( E, A, B, C, D, f2, K2, expand( eData, 26 ) );
|
||||
subRound( D, E, A, B, C, f2, K2, expand( eData, 27 ) );
|
||||
subRound( C, D, E, A, B, f2, K2, expand( eData, 28 ) );
|
||||
subRound( B, C, D, E, A, f2, K2, expand( eData, 29 ) );
|
||||
subRound( A, B, C, D, E, f2, K2, expand( eData, 30 ) );
|
||||
subRound( E, A, B, C, D, f2, K2, expand( eData, 31 ) );
|
||||
subRound( D, E, A, B, C, f2, K2, expand( eData, 32 ) );
|
||||
subRound( C, D, E, A, B, f2, K2, expand( eData, 33 ) );
|
||||
subRound( B, C, D, E, A, f2, K2, expand( eData, 34 ) );
|
||||
subRound( A, B, C, D, E, f2, K2, expand( eData, 35 ) );
|
||||
subRound( E, A, B, C, D, f2, K2, expand( eData, 36 ) );
|
||||
subRound( D, E, A, B, C, f2, K2, expand( eData, 37 ) );
|
||||
subRound( C, D, E, A, B, f2, K2, expand( eData, 38 ) );
|
||||
subRound( B, C, D, E, A, f2, K2, expand( eData, 39 ) );
|
||||
|
||||
subRound( A, B, C, D, E, f3, K3, expand( eData, 40 ) );
|
||||
subRound( E, A, B, C, D, f3, K3, expand( eData, 41 ) );
|
||||
subRound( D, E, A, B, C, f3, K3, expand( eData, 42 ) );
|
||||
subRound( C, D, E, A, B, f3, K3, expand( eData, 43 ) );
|
||||
subRound( B, C, D, E, A, f3, K3, expand( eData, 44 ) );
|
||||
subRound( A, B, C, D, E, f3, K3, expand( eData, 45 ) );
|
||||
subRound( E, A, B, C, D, f3, K3, expand( eData, 46 ) );
|
||||
subRound( D, E, A, B, C, f3, K3, expand( eData, 47 ) );
|
||||
subRound( C, D, E, A, B, f3, K3, expand( eData, 48 ) );
|
||||
subRound( B, C, D, E, A, f3, K3, expand( eData, 49 ) );
|
||||
subRound( A, B, C, D, E, f3, K3, expand( eData, 50 ) );
|
||||
subRound( E, A, B, C, D, f3, K3, expand( eData, 51 ) );
|
||||
subRound( D, E, A, B, C, f3, K3, expand( eData, 52 ) );
|
||||
subRound( C, D, E, A, B, f3, K3, expand( eData, 53 ) );
|
||||
subRound( B, C, D, E, A, f3, K3, expand( eData, 54 ) );
|
||||
subRound( A, B, C, D, E, f3, K3, expand( eData, 55 ) );
|
||||
subRound( E, A, B, C, D, f3, K3, expand( eData, 56 ) );
|
||||
subRound( D, E, A, B, C, f3, K3, expand( eData, 57 ) );
|
||||
subRound( C, D, E, A, B, f3, K3, expand( eData, 58 ) );
|
||||
subRound( B, C, D, E, A, f3, K3, expand( eData, 59 ) );
|
||||
|
||||
subRound( A, B, C, D, E, f4, K4, expand( eData, 60 ) );
|
||||
subRound( E, A, B, C, D, f4, K4, expand( eData, 61 ) );
|
||||
subRound( D, E, A, B, C, f4, K4, expand( eData, 62 ) );
|
||||
subRound( C, D, E, A, B, f4, K4, expand( eData, 63 ) );
|
||||
subRound( B, C, D, E, A, f4, K4, expand( eData, 64 ) );
|
||||
subRound( A, B, C, D, E, f4, K4, expand( eData, 65 ) );
|
||||
subRound( E, A, B, C, D, f4, K4, expand( eData, 66 ) );
|
||||
subRound( D, E, A, B, C, f4, K4, expand( eData, 67 ) );
|
||||
subRound( C, D, E, A, B, f4, K4, expand( eData, 68 ) );
|
||||
subRound( B, C, D, E, A, f4, K4, expand( eData, 69 ) );
|
||||
subRound( A, B, C, D, E, f4, K4, expand( eData, 70 ) );
|
||||
subRound( E, A, B, C, D, f4, K4, expand( eData, 71 ) );
|
||||
subRound( D, E, A, B, C, f4, K4, expand( eData, 72 ) );
|
||||
subRound( C, D, E, A, B, f4, K4, expand( eData, 73 ) );
|
||||
subRound( B, C, D, E, A, f4, K4, expand( eData, 74 ) );
|
||||
subRound( A, B, C, D, E, f4, K4, expand( eData, 75 ) );
|
||||
subRound( E, A, B, C, D, f4, K4, expand( eData, 76 ) );
|
||||
subRound( D, E, A, B, C, f4, K4, expand( eData, 77 ) );
|
||||
subRound( C, D, E, A, B, f4, K4, expand( eData, 78 ) );
|
||||
subRound( B, C, D, E, A, f4, K4, expand( eData, 79 ) );
|
||||
|
||||
/* Build message digest */
|
||||
digest[ 0 ] += A;
|
||||
digest[ 1 ] += B;
|
||||
digest[ 2 ] += C;
|
||||
digest[ 3 ] += D;
|
||||
digest[ 4 ] += E;
|
||||
}
|
||||
|
||||
/* When run on a little-endian CPU we need to perform byte reversal on an
|
||||
array of long words. */
|
||||
|
||||
static void longReverse(UINT4 *buffer, int byteCount, int Endianness )
|
||||
{
|
||||
UINT4 value;
|
||||
|
||||
if (Endianness==TRUE) return;
|
||||
byteCount /= sizeof( UINT4 );
|
||||
while( byteCount-- )
|
||||
{
|
||||
value = *buffer;
|
||||
value = ( ( value & 0xFF00FF00L ) >> 8 ) | \
|
||||
( ( value & 0x00FF00FFL ) << 8 );
|
||||
*buffer++ = ( value << 16 ) | ( value >> 16 );
|
||||
}
|
||||
}
|
||||
|
||||
/* Update SHS for a block of data */
|
||||
|
||||
void SHAUpdate(SHA_CTX *shsInfo, BYTE *buffer, int count)
|
||||
{
|
||||
UINT4 tmp;
|
||||
int dataCount;
|
||||
|
||||
/* Update bitcount */
|
||||
tmp = shsInfo->countLo;
|
||||
if ( ( shsInfo->countLo = tmp + ( ( UINT4 ) count << 3 ) ) < tmp )
|
||||
shsInfo->countHi++; /* Carry from low to high */
|
||||
shsInfo->countHi += count >> 29;
|
||||
|
||||
/* Get count of bytes already in data */
|
||||
dataCount = ( int ) ( tmp >> 3 ) & 0x3F;
|
||||
|
||||
/* Handle any leading odd-sized chunks */
|
||||
if( dataCount )
|
||||
{
|
||||
BYTE *p = ( BYTE * ) shsInfo->data + dataCount;
|
||||
|
||||
dataCount = SHS_DATASIZE - dataCount;
|
||||
if( count < dataCount )
|
||||
{
|
||||
memcpy( p, buffer, count );
|
||||
return;
|
||||
}
|
||||
memcpy( p, buffer, dataCount );
|
||||
longReverse( shsInfo->data, SHS_DATASIZE, shsInfo->Endianness);
|
||||
SHSTransform( shsInfo->digest, shsInfo->data );
|
||||
buffer += dataCount;
|
||||
count -= dataCount;
|
||||
}
|
||||
|
||||
/* Process data in SHS_DATASIZE chunks */
|
||||
while( count >= SHS_DATASIZE )
|
||||
{
|
||||
memcpy( (POINTER)shsInfo->data, (POINTER)buffer, SHS_DATASIZE );
|
||||
longReverse( shsInfo->data, SHS_DATASIZE, shsInfo->Endianness );
|
||||
SHSTransform( shsInfo->digest, shsInfo->data );
|
||||
buffer += SHS_DATASIZE;
|
||||
count -= SHS_DATASIZE;
|
||||
}
|
||||
|
||||
/* Handle any remaining bytes of data. */
|
||||
memcpy( (POINTER)shsInfo->data, (POINTER)buffer, count );
|
||||
}
|
||||
|
||||
/* Final wrapup - pad to SHS_DATASIZE-byte boundary with the bit pattern
|
||||
1 0* (64-bit count of bits processed, MSB-first) */
|
||||
|
||||
void SHAFinal(BYTE *output, SHA_CTX *shsInfo)
|
||||
{
|
||||
int count;
|
||||
BYTE *dataPtr;
|
||||
|
||||
/* Compute number of bytes mod 64 */
|
||||
count = ( int ) shsInfo->countLo;
|
||||
count = ( count >> 3 ) & 0x3F;
|
||||
|
||||
/* Set the first char of padding to 0x80. This is safe since there is
|
||||
always at least one byte free */
|
||||
dataPtr = ( BYTE * ) shsInfo->data + count;
|
||||
*dataPtr++ = 0x80;
|
||||
|
||||
/* Bytes of padding needed to make 64 bytes */
|
||||
count = SHS_DATASIZE - 1 - count;
|
||||
|
||||
/* Pad out to 56 mod 64 */
|
||||
if( count < 8 )
|
||||
{
|
||||
/* Two lots of padding: Pad the first block to 64 bytes */
|
||||
memset( dataPtr, 0, count );
|
||||
longReverse( shsInfo->data, SHS_DATASIZE, shsInfo->Endianness );
|
||||
SHSTransform( shsInfo->digest, shsInfo->data );
|
||||
|
||||
/* Now fill the next block with 56 bytes */
|
||||
memset( (POINTER)shsInfo->data, 0, SHS_DATASIZE - 8 );
|
||||
}
|
||||
else
|
||||
/* Pad block to 56 bytes */
|
||||
memset( dataPtr, 0, count - 8 );
|
||||
|
||||
/* Append length in bits and transform */
|
||||
shsInfo->data[ 14 ] = shsInfo->countHi;
|
||||
shsInfo->data[ 15 ] = shsInfo->countLo;
|
||||
|
||||
longReverse( shsInfo->data, SHS_DATASIZE - 8, shsInfo->Endianness );
|
||||
SHSTransform( shsInfo->digest, shsInfo->data );
|
||||
|
||||
/* Output to an array of bytes */
|
||||
SHAtoByte(output, shsInfo->digest, SHS_DIGESTSIZE);
|
||||
|
||||
/* Zeroise sensitive stuff */
|
||||
memset((POINTER)shsInfo, 0, sizeof(shsInfo));
|
||||
}
|
||||
|
||||
static void SHAtoByte(BYTE *output, UINT4 *input, unsigned int len)
|
||||
{ /* Output SHA digest in byte array */
|
||||
unsigned int i, j;
|
||||
|
||||
for(i = 0, j = 0; j < len; i++, j += 4)
|
||||
{
|
||||
output[j+3] = (BYTE)( input[i] & 0xff);
|
||||
output[j+2] = (BYTE)((input[i] >> 8 ) & 0xff);
|
||||
output[j+1] = (BYTE)((input[i] >> 16) & 0xff);
|
||||
output[j ] = (BYTE)((input[i] >> 24) & 0xff);
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
|
||||
|
||||
/* endian.c */
|
||||
|
||||
void endianTest(int *endian_ness)
|
||||
{
|
||||
if((*(unsigned short *) ("#S") >> 8) == '#')
|
||||
{
|
||||
/* printf("Big endian = no change\n"); */
|
||||
*endian_ness = !(0);
|
||||
}
|
||||
else
|
||||
{
|
||||
/* printf("Little endian = swap\n"); */
|
||||
*endian_ness = 0;
|
||||
}
|
||||
}
|
52
src/libkirk/sha1.h
Normal file
52
src/libkirk/sha1.h
Normal file
|
@ -0,0 +1,52 @@
|
|||
#ifndef _GLOBAL_H_
|
||||
#define _GLOBAL_H_ 1
|
||||
|
||||
/* POINTER defines a generic pointer type */
|
||||
typedef unsigned char *POINTER;
|
||||
|
||||
/* UINT4 defines a four byte word */
|
||||
typedef unsigned int UINT4;
|
||||
|
||||
/* BYTE defines a unsigned character */
|
||||
typedef unsigned char BYTE;
|
||||
|
||||
#ifndef TRUE
|
||||
#define FALSE 0
|
||||
#define TRUE ( !FALSE )
|
||||
#endif /* TRUE */
|
||||
|
||||
#endif /* end _GLOBAL_H_ */
|
||||
|
||||
/* sha.h */
|
||||
|
||||
#ifndef _SHA_H_
|
||||
#define _SHA_H_ 1
|
||||
|
||||
/* #include "global.h" */
|
||||
|
||||
/* The structure for storing SHS info */
|
||||
|
||||
typedef struct
|
||||
{
|
||||
UINT4 digest[ 5 ]; /* Message digest */
|
||||
UINT4 countLo, countHi; /* 64-bit bit count */
|
||||
UINT4 data[ 16 ]; /* SHS data buffer */
|
||||
int Endianness;
|
||||
} SHA_CTX;
|
||||
|
||||
/* Message digest functions */
|
||||
|
||||
void SHAInit(SHA_CTX *);
|
||||
void SHAUpdate(SHA_CTX *, BYTE *buffer, int count);
|
||||
void SHAFinal(BYTE *output, SHA_CTX *);
|
||||
|
||||
#endif /* end _SHA_H_ */
|
||||
|
||||
/* endian.h */
|
||||
|
||||
#ifndef _ENDIAN_H_
|
||||
#define _ENDIAN_H_ 1
|
||||
|
||||
void endianTest(int *endianness);
|
||||
|
||||
#endif /* end _ENDIAN_H_ */
|
487
src/pkgrip.c
Normal file
487
src/pkgrip.c
Normal file
|
@ -0,0 +1,487 @@
|
|||
#include <stdio.h>
|
||||
#include <stdarg.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
#include <sys/stat.h>
|
||||
#include "libkirk/aes.h"
|
||||
#include "libkirk/amctrl.h"
|
||||
#include "libkirk/kirk_engine.h"
|
||||
|
||||
#define PKGRIP_VERSION "1.1a"
|
||||
|
||||
/* NOTE: Supports files up to 16 GB */
|
||||
|
||||
typedef unsigned char u8;
|
||||
typedef unsigned short u16;
|
||||
typedef unsigned int u64;
|
||||
|
||||
char *exec;
|
||||
char *pkgfile;
|
||||
u8 public_key[16], static_public_key[16], pkg_key[16], xor_key[16],
|
||||
title_id[10], *pkg_header, *pkg_file_name;
|
||||
u64 *pkg_file_name_offset, *pkg_file_name_length, *pkg_file_offset,
|
||||
*pkg_file_size, *pkg_is_file, *pkg_entry_type;
|
||||
u64 pkg_enc_start, pkg_enc_size, pkg_file_count;
|
||||
int xpsp = 0;
|
||||
int xps3 = 0;
|
||||
|
||||
u8 PSPAESKey[16] = {0x07, 0xF2, 0xC6, 0x82, 0x90, 0xB5, 0x0D, 0x2C,
|
||||
0x33, 0x81, 0x8D, 0x70, 0x9B, 0x60, 0xE6, 0x2B};
|
||||
|
||||
u8 PS3AESKey[16] = {0x2E, 0x7B, 0x71, 0xD7, 0xC9, 0xC9, 0xA1, 0x4E,
|
||||
0xA3, 0x22, 0x1F, 0x18, 0x88, 0x28, 0xB8, 0xF8};
|
||||
|
||||
void usage(const char *fmt, ...) {
|
||||
va_list list;
|
||||
char msg[256];
|
||||
|
||||
va_start(list, fmt);
|
||||
vsprintf(msg, fmt, list);
|
||||
va_end(list);
|
||||
|
||||
printf("%s", msg);
|
||||
|
||||
printf("\nUsage:\n\t%s [options] pathtopkg\n\n", exec);
|
||||
printf("Options: (optional)\n\t-psp - extract PSP files only\n\t-ps3 - "
|
||||
"extract PS3 files only\n\tBoth enabled by default.\n\n");
|
||||
exit(0);
|
||||
}
|
||||
|
||||
void dumpPS1key(const char *path) {
|
||||
int flag = 2;
|
||||
PGD_HEADER PGD;
|
||||
memset(&PGD, 0, sizeof(PGD_HEADER));
|
||||
MAC_KEY mkey;
|
||||
u8 buf[1024];
|
||||
|
||||
kirk_init();
|
||||
|
||||
FILE *fd = fopen(path, "rb");
|
||||
fseek(fd, 0x24, 0);
|
||||
u64 psar, pgdoff = 0;
|
||||
|
||||
if (fread(&psar, 1, 4, fd)) {
|
||||
};
|
||||
fseek(fd, psar, 0);
|
||||
if (fread(buf, 1, 16, fd)) {
|
||||
};
|
||||
|
||||
if (!memcmp(buf, "PSTITLE", 7))
|
||||
pgdoff = psar + 0x200;
|
||||
else if (!memcmp(buf, "PSISO", 5))
|
||||
pgdoff = psar + 0x400;
|
||||
else {
|
||||
fclose(fd);
|
||||
return;
|
||||
}
|
||||
|
||||
fseek(fd, pgdoff, 0);
|
||||
if (fread(buf, 1, sizeof(buf), fd)) {
|
||||
};
|
||||
fclose(fd);
|
||||
|
||||
PGD.buf = buf;
|
||||
PGD.key_index = *(u64 *)(buf + 4);
|
||||
PGD.drm_type = *(u64 *)(buf + 8);
|
||||
|
||||
// Set the hashing, crypto and open modes.
|
||||
if (PGD.drm_type == 1) {
|
||||
PGD.mac_type = 1;
|
||||
flag |= 4;
|
||||
|
||||
if (PGD.key_index > 1) {
|
||||
PGD.mac_type = 3;
|
||||
flag |= 8;
|
||||
}
|
||||
|
||||
PGD.cipher_type = 1;
|
||||
} else {
|
||||
PGD.mac_type = 2;
|
||||
PGD.cipher_type = 2;
|
||||
}
|
||||
|
||||
PGD.open_flag = flag;
|
||||
|
||||
int rt = sceDrmBBMacInit(&mkey, PGD.mac_type);
|
||||
printf("0x%08X\n", rt);
|
||||
rt = sceDrmBBMacUpdate(&mkey, buf, 0x70);
|
||||
printf("0x%08X\n", rt);
|
||||
rt = bbmac_getkey(&mkey, buf + 0x70, PGD.vkey);
|
||||
printf("0x%08X\n", rt);
|
||||
char Path[1024];
|
||||
strcpy(Path, path);
|
||||
int len = strlen(Path);
|
||||
|
||||
while (Path[len] != '/')
|
||||
len--;
|
||||
|
||||
Path[len + 1] = 0;
|
||||
strcat(Path, "KEYS.BIN");
|
||||
fd = fopen(Path, "wb");
|
||||
fwrite(PGD.vkey, 1, 16, fd);
|
||||
fclose(fd);
|
||||
}
|
||||
|
||||
void printhex(u8 *buf) {
|
||||
int i;
|
||||
for (i = 0; i < 16; i++)
|
||||
printf("%02X ", buf[i]);
|
||||
printf("\n");
|
||||
}
|
||||
|
||||
u64 tou64(u8 *buf) {
|
||||
return (u64)((buf[0] << 24) | (buf[1] << 16) | (buf[2] << 8) | buf[3]);
|
||||
}
|
||||
|
||||
void xor128(u8 *dst, u8 *xor1, u8 *xor2) {
|
||||
int i;
|
||||
for (i = 0; i < 16; i++)
|
||||
dst[i] = xor1[i] ^ xor2[i];
|
||||
}
|
||||
|
||||
void iter128(u8 *buf) {
|
||||
int i;
|
||||
for (i = 15; i >= 0; i--) {
|
||||
buf[i]++;
|
||||
|
||||
if (buf[i])
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
void setiter128(u8 *dst, int size) {
|
||||
memcpy(dst, static_public_key, 16);
|
||||
|
||||
int i;
|
||||
for (i = 0; i < size; i++)
|
||||
iter128(dst);
|
||||
}
|
||||
|
||||
void check_pkg_exist(const char *file) {
|
||||
FILE *fd = fopen(file, "rb");
|
||||
|
||||
if (fd == NULL)
|
||||
usage("Could not locate file \"%s\"\n", file);
|
||||
|
||||
fclose(fd);
|
||||
}
|
||||
|
||||
void check_pkg_supported(const char *file) {
|
||||
u8 buf[4];
|
||||
|
||||
FILE *fd = fopen(file, "rb");
|
||||
if (fread(buf, 1, sizeof(buf), fd)) {
|
||||
};
|
||||
fclose(fd);
|
||||
|
||||
if (memcmp(buf, "\x7FPKG", 4))
|
||||
usage("Unknown PKG detected!\n");
|
||||
}
|
||||
|
||||
void check_pkg_retail(const char *file) {
|
||||
u8 buf[1];
|
||||
|
||||
FILE *fd = fopen(file, "rb");
|
||||
fseek(fd, 4, 0);
|
||||
if (fread(buf, 1, sizeof(buf), fd)) {
|
||||
};
|
||||
fclose(fd);
|
||||
|
||||
if (buf[0] != 0x80)
|
||||
usage("Non-retail PKG type detected!\n");
|
||||
}
|
||||
|
||||
void check_pkg_type(const char *file) {
|
||||
u8 buf[1];
|
||||
|
||||
FILE *fd = fopen(file, "rb");
|
||||
fseek(fd, 7, 0);
|
||||
if (fread(buf, 1, sizeof(buf), fd)) {
|
||||
};
|
||||
fclose(fd);
|
||||
|
||||
if (buf[0] != 0x01 && buf[0] != 0x02)
|
||||
usage("File is not a PS3/PSP PKG!\n");
|
||||
}
|
||||
|
||||
void check_pkg_size(const char *file) {
|
||||
u8 buf[4];
|
||||
u64 size, pkgsize;
|
||||
|
||||
FILE *fd = fopen(file, "rb");
|
||||
fseek(fd, 0x1C, 0);
|
||||
if (fread(buf, 1, sizeof(buf), fd)) {
|
||||
};
|
||||
pkgsize = tou64(buf);
|
||||
fseek(fd, 0x18, 0);
|
||||
if (fread(buf, 1, sizeof(buf), fd)) {
|
||||
};
|
||||
fseek(fd, 0, 2);
|
||||
size = ftell(fd);
|
||||
fclose(fd);
|
||||
|
||||
if (size != pkgsize)
|
||||
usage("Corrupt PKG detected!\ndetected size: %u\nexpected size: %u\n",
|
||||
size, tou64(buf));
|
||||
|
||||
//if (tou64(buf))
|
||||
// usage("PKG size too large, must be less than 16 GB!\n");
|
||||
}
|
||||
|
||||
void get_pkg_info(const char *file) {
|
||||
pkg_header = malloc(0x80);
|
||||
|
||||
FILE *fd = fopen(file, "rb");
|
||||
if (fread(pkg_header, 1, 0x80, fd)) {
|
||||
};
|
||||
fclose(fd);
|
||||
|
||||
memcpy(title_id, pkg_header + 0x37, 9);
|
||||
title_id[9] = 0;
|
||||
memcpy(public_key, pkg_header + 0x70, 16);
|
||||
memcpy(static_public_key, pkg_header + 0x70, 16);
|
||||
|
||||
memcpy(pkg_key, pkg_header[0x07] == 0x01 ? PS3AESKey : PSPAESKey,
|
||||
sizeof(pkg_key));
|
||||
|
||||
pkg_file_count = tou64(pkg_header + 0x14);
|
||||
pkg_enc_start = tou64(pkg_header + 0x24);
|
||||
pkg_enc_size = tou64(pkg_header + 0x2C);
|
||||
|
||||
pkg_file_name_offset = malloc(pkg_file_count * sizeof(u64));
|
||||
pkg_file_name_length = malloc(pkg_file_count * sizeof(u64));
|
||||
pkg_file_offset = malloc(pkg_file_count * sizeof(u64));
|
||||
pkg_file_size = malloc(pkg_file_count * sizeof(u64));
|
||||
pkg_is_file = malloc(pkg_file_count * sizeof(u64));
|
||||
pkg_entry_type = malloc(pkg_file_count * sizeof(u64));
|
||||
|
||||
printf("PKG info:\n");
|
||||
printf("\tPKG type: %s\n", pkg_header[0x07] == 0x01 ? "PS3" : "PSP");
|
||||
printf("\tContent ID: %s\n", pkg_header + 0x30);
|
||||
printf("\tTitle ID: %s\n", title_id);
|
||||
printf("\tPKG file count: %u\n", pkg_file_count);
|
||||
printf("\tPKG size: %u\n\n", tou64(pkg_header + 0x1C));
|
||||
}
|
||||
|
||||
void extract_pkg(const char *file) {
|
||||
int i, j, extracted = 0;
|
||||
u64 MB = 1024 * 1024;
|
||||
u8 buf[16], *decbuf = malloc(MB);
|
||||
char path[512];
|
||||
AES_ctx ctx;
|
||||
memset(&ctx, 0, sizeof(AES_ctx));
|
||||
AES_set_key(&ctx, pkg_key, AES_KEY_LEN_128);
|
||||
|
||||
sprintf(path, "./%s_dec", title_id);
|
||||
|
||||
mkdir(path, 0777);
|
||||
|
||||
FILE *fd = fopen(file, "rb");
|
||||
fseek(fd, pkg_enc_start, 0);
|
||||
|
||||
for (i = 0; i < (int)pkg_file_count * 2; i++) {
|
||||
if (fread(buf, 1, sizeof(buf), fd)) {
|
||||
};
|
||||
|
||||
AES_encrypt(&ctx, public_key, xor_key);
|
||||
xor128(buf, buf, xor_key);
|
||||
iter128(public_key);
|
||||
|
||||
if (!(i & 1)) {
|
||||
pkg_file_name_offset[i / 2] = tou64(buf);
|
||||
pkg_file_name_length[i / 2] = tou64(buf + 4);
|
||||
pkg_file_offset[i / 2] = tou64(buf + 12);
|
||||
} else {
|
||||
pkg_file_size[(i - 1) / 2] = tou64(buf + 4);
|
||||
pkg_entry_type[(i - 1) / 2] = tou64(buf + 8);
|
||||
}
|
||||
}
|
||||
|
||||
for (i = 0; i < (int)pkg_file_count; i++) {
|
||||
if (!xpsp && (pkg_entry_type[i] >> 24) == 0x90)
|
||||
continue;
|
||||
if (!xps3 && ((pkg_entry_type[i] >> 24) != 0x90) &&
|
||||
((pkg_entry_type[i] & 0xFF) != 0x04))
|
||||
continue;
|
||||
|
||||
int namelength = (pkg_file_name_length[i] + 15) & -16;
|
||||
int isfile = !((pkg_entry_type[i] & 0xFF) == 0x04 && !pkg_file_size[i]);
|
||||
pkg_file_name = malloc(namelength);
|
||||
fseek(fd, pkg_enc_start + pkg_file_name_offset[i], 0);
|
||||
if (fread(pkg_file_name, 1, namelength, fd)) {
|
||||
};
|
||||
setiter128(public_key, pkg_file_name_offset[i] >> 4);
|
||||
AES_set_key(&ctx,
|
||||
(pkg_entry_type[i] >> 24) == 0x90 ? PSPAESKey : PS3AESKey,
|
||||
AES_KEY_LEN_128);
|
||||
|
||||
for (j = 0; j < (namelength >> 4); j++) {
|
||||
AES_encrypt(&ctx, public_key, xor_key);
|
||||
xor128(pkg_file_name + (j * 16), pkg_file_name + (j * 16), xor_key);
|
||||
iter128(public_key);
|
||||
}
|
||||
|
||||
sprintf(path, "%s_dec/%s", title_id, pkg_file_name);
|
||||
char tmpstr[21];
|
||||
sprintf(tmpstr, "Extracting %s file:",
|
||||
((pkg_entry_type[i] >> 24) == 0x90) ? "PSP" : "PS3");
|
||||
printf("\n%s\n%s\n", isfile ? tmpstr : "Creating directory:", path);
|
||||
|
||||
if (isfile) {
|
||||
u64 szcheck = 0, mincheck = 0;
|
||||
FILE *dst = fopen(path, "wb");
|
||||
fseek(fd, pkg_enc_start + pkg_file_offset[i], 0);
|
||||
if (fread(decbuf, 1,
|
||||
(pkg_file_size[i] >= MB) ? MB : pkg_file_size[i], fd)) {
|
||||
};
|
||||
setiter128(public_key, pkg_file_offset[i] >> 4);
|
||||
|
||||
printf("%u/%u bytes written\r", 0, pkg_file_size[i]);
|
||||
|
||||
for (j = 0; j < (int)(pkg_file_size[i] >> 4); j++) {
|
||||
if (szcheck == MB) {
|
||||
szcheck = 0;
|
||||
mincheck += MB;
|
||||
fwrite(decbuf, 1, MB, dst);
|
||||
printf("%u/%u bytes written\r", mincheck, pkg_file_size[i]);
|
||||
if (fread(decbuf, 1,
|
||||
((pkg_file_size[i] - (j << 4)) >= MB)
|
||||
? MB
|
||||
: pkg_file_size[i] - (j << 4),
|
||||
fd)) {
|
||||
};
|
||||
}
|
||||
|
||||
AES_encrypt(&ctx, public_key, xor_key);
|
||||
xor128(decbuf + ((j << 4) - mincheck),
|
||||
decbuf + ((j << 4) - mincheck), xor_key);
|
||||
iter128(public_key);
|
||||
|
||||
szcheck += 16;
|
||||
}
|
||||
|
||||
if (mincheck < pkg_file_size[i]) {
|
||||
printf("%u/%u bytes written", pkg_file_size[i],
|
||||
pkg_file_size[i]);
|
||||
fwrite(decbuf, 1, pkg_file_size[i] - mincheck, dst);
|
||||
}
|
||||
|
||||
fclose(dst);
|
||||
printf("\n");
|
||||
extracted++;
|
||||
|
||||
int pathlen = strlen(path);
|
||||
if (!strcmp(path + pathlen - 9, "EBOOT.PBP")) {
|
||||
dst = fopen(path, "rb");
|
||||
fseek(dst, 0x24, 0);
|
||||
u64 psar;
|
||||
if (fread(&psar, 1, 4, dst)) {
|
||||
};
|
||||
fseek(dst, psar, 0);
|
||||
u8 block[16];
|
||||
if (fread(block, 1, sizeof(block), dst)) {
|
||||
};
|
||||
|
||||
if (!memcmp(block, "PSTITLE", 7))
|
||||
fseek(dst, psar + 0x200, 0);
|
||||
else if (!memcmp(block, "PSISO", 5))
|
||||
fseek(dst, psar + 0x400, 0);
|
||||
|
||||
if (fread(block, 1, 4, dst)) {
|
||||
};
|
||||
|
||||
if (!memcmp(block, "\x00PGD", 4)) {
|
||||
dumpPS1key(path);
|
||||
printf("PS1 KEYS.BIN dumped.\n");
|
||||
extracted++;
|
||||
}
|
||||
|
||||
fclose(dst);
|
||||
} else if (!strcmp(path + pathlen - 4, ".PTF")) {
|
||||
u8 *pgdbuf = malloc(pkg_file_size[i] - 0x80);
|
||||
dst = fopen(path, "rb");
|
||||
fseek(dst, 0x80, 0);
|
||||
if (fread(pgdbuf, 1, pkg_file_size[i] - 0x80, dst)) {
|
||||
};
|
||||
fclose(dst);
|
||||
kirk_init();
|
||||
u64 pgdsize =
|
||||
decrypt_pgd(pgdbuf, pkg_file_size[i] - 0x80, 2, NULL);
|
||||
path[pathlen - 4] = 0;
|
||||
strcat(path, "_DEC.PTF");
|
||||
dst = fopen(path, "wb");
|
||||
fwrite(pgdbuf + 0x90, 1, pgdsize, dst);
|
||||
fclose(dst);
|
||||
printf("PTF theme decrypted.\nDecrypted size: %u bytes\n",
|
||||
pgdsize);
|
||||
extracted++;
|
||||
}
|
||||
} else {
|
||||
mkdir(path, 0777);
|
||||
}
|
||||
|
||||
free(pkg_file_name);
|
||||
}
|
||||
|
||||
free(decbuf);
|
||||
fclose(fd);
|
||||
|
||||
printf("\nFiles extracted: %u\n", extracted);
|
||||
}
|
||||
|
||||
void free_mallocs() {
|
||||
if (pkg_header)
|
||||
free(pkg_header);
|
||||
|
||||
if (pkg_file_name_offset)
|
||||
free(pkg_file_name_offset);
|
||||
|
||||
if (pkg_file_name_length)
|
||||
free(pkg_file_name_length);
|
||||
|
||||
if (pkg_file_offset)
|
||||
free(pkg_file_offset);
|
||||
|
||||
if (pkg_file_size)
|
||||
free(pkg_file_size);
|
||||
|
||||
if (pkg_is_file)
|
||||
free(pkg_is_file);
|
||||
|
||||
if (pkg_entry_type)
|
||||
free(pkg_entry_type);
|
||||
}
|
||||
|
||||
int main(int argc, char **argv) {
|
||||
exec = argv[0];
|
||||
|
||||
if (argc < 2)
|
||||
usage("");
|
||||
|
||||
int i;
|
||||
for (i = 1; i < (argc - 1); i++) {
|
||||
if (!strcmp(argv[i], "-psp"))
|
||||
xpsp = 1;
|
||||
else if (!strcmp(argv[i], "-ps3"))
|
||||
xps3 = 1;
|
||||
}
|
||||
|
||||
if (!xpsp && !xps3) {
|
||||
xpsp = 1;
|
||||
xps3 = 1;
|
||||
}
|
||||
|
||||
pkgfile = argv[argc - 1];
|
||||
|
||||
check_pkg_exist(pkgfile);
|
||||
check_pkg_supported(pkgfile);
|
||||
check_pkg_retail(pkgfile);
|
||||
check_pkg_type(pkgfile);
|
||||
check_pkg_size(pkgfile);
|
||||
get_pkg_info(pkgfile);
|
||||
extract_pkg(pkgfile);
|
||||
|
||||
free_mallocs();
|
||||
|
||||
return 0;
|
||||
}
|
Loading…
Add table
Reference in a new issue