mirror of
				https://github.com/Atmosphere-NX/Atmosphere.git
				synced 2025-10-30 18:55:56 +01:00 
			
		
		
		
	
		
			
				
	
	
		
			85 lines
		
	
	
		
			2.9 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
			
		
		
	
	
			85 lines
		
	
	
		
			2.9 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
| #!/usr/bin/env python
 | |
| import sys, os
 | |
| from struct import pack as pk, unpack as up
 | |
| from Crypto.Cipher import AES
 | |
| from Crypto.Hash import CMAC
 | |
| try:
 | |
|     import KEYS
 | |
| except ImportError:
 | |
|     import KEYS_template as KEYS
 | |
|     print('Warning: output will not work on 7.0.0+!')
 | |
| 
 | |
| 
 | |
| def shift_left_xor_rb(s):
 | |
|     if hasattr(int, "from_bytes"):
 | |
|       N = int.from_bytes(s, byteorder="big")
 | |
|     else:
 | |
|       N = int(s.encode('hex'), 16)
 | |
| 
 | |
|     if N & (1 << 127):
 | |
|         N = ((N << 1) ^ 0x87) & 0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
 | |
|     else:
 | |
|         N = ((N << 1) ^ 0x00) & 0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
 | |
|     return bytearray.fromhex('%032x' % N)
 | |
| 
 | |
| 
 | |
| def sxor(x, y):
 | |
|     return bytearray(a^b for a,b in zip(x, y))
 | |
| 
 | |
| 
 | |
| def get_last_block_for_desired_mac(key, data, desired_mac):
 | |
|     assert len(desired_mac) == 0x10
 | |
|     k1 = shift_left_xor_rb(AES.new(key, AES.MODE_ECB).encrypt(bytearray(0x10)))
 | |
|     if len(data) & 0xF:
 | |
|         k1 = shift_left_xor_rb(k1)
 | |
|         data = data + b'\x80'
 | |
|         data = data + bytearray((0x10 - (len(data) & 0xF)) & 0xF)
 | |
|     num_blocks = (len(data) + 0xF) >> 4
 | |
|     last_block = sxor(bytearray(AES.new(key, AES.MODE_ECB).decrypt(desired_mac)), bytearray(k1))
 | |
|     if len(data) > 0x0:
 | |
|         last_block = sxor(last_block, bytearray(AES.new(key, AES.MODE_CBC, bytearray(0x10)).encrypt(data)[-0x10:]))
 | |
|     return last_block
 | |
| 
 | |
| 
 | |
| def sign_encrypt_code(code, sig_key, enc_key, iv, desired_mac, version):
 | |
|     # Pad with 0x20 of zeroes.
 | |
|     code = code + bytearray(0x20)
 | |
|     code_len = len(code)
 | |
|     code_len += 0xFFF
 | |
|     code_len &= ~0xFFF
 | |
|     code = code + bytearray(code_len - len(code))
 | |
| 
 | |
|     # Insert version
 | |
|     code = code[:8] + pk('<I', version) + code[12:]
 | |
| 
 | |
|     # Add empty trustzone, warmboot segments.
 | |
|     code = code + bytearray(0x1FE0 - 0x10)
 | |
|     pk11_hdr = b'PK11' + pk('<IIIIIII', 0x1000, 0, 0, code_len - 0x20, 0, 0x1000, 0)
 | |
|     pk11 = pk11_hdr + code
 | |
|     enc_pk11 = AES.new(enc_key, AES.MODE_CBC, iv).encrypt(pk11)
 | |
|     enc_pk11 = pk('<IIII', len(pk11) + 0x10, 0, 0, 0) + iv + enc_pk11
 | |
|     enc_pk11 = enc_pk11 + get_last_block_for_desired_mac(sig_key, enc_pk11, desired_mac)
 | |
|     enc_pk11 = enc_pk11 + CMAC.new(sig_key, enc_pk11, AES).digest()
 | |
|     return enc_pk11
 | |
| 
 | |
| 
 | |
| def main(argc, argv):
 | |
|     if argc != 3:
 | |
|         print('Usage: %s input output' % argv[0])
 | |
|         return 1
 | |
|     with open(argv[1], 'rb') as f:
 | |
|         code = f.read()
 | |
|     if len(code) & 0xF:
 | |
|         code = code + bytearray(0x10 - (len(code) & 0xF))
 | |
|     fn, fext = os.path.splitext(argv[2])
 | |
|     for key in range(KEYS.NUM_KEYS):
 | |
|         with open(fn + ('_%02X' % key) + fext, 'wb') as f:
 | |
|             f.write(sign_encrypt_code(code, KEYS.HOVI_SIG_KEY_PRD[key], KEYS.HOVI_ENC_KEY_PRD[key], KEYS.IV[key], b'THANKS_NVIDIA_<3', key))
 | |
|         with open(fn + ('_dev_%02X' % key) + fext, 'wb') as f:
 | |
|             f.write(sign_encrypt_code(code, KEYS.HOVI_SIG_KEY_DEV[key], KEYS.HOVI_ENC_KEY_DEV[key], KEYS.IV_DEV[key], b'THANKS_NVIDIA_<3', key))
 | |
|     return 0
 | |
| 
 | |
| 
 | |
| if __name__ == '__main__':
 | |
|     sys.exit(main(len(sys.argv), sys.argv))
 |