Project_CTR/ctrtool/keyset.cpp
2017-05-28 13:52:32 +08:00

367 lines
10 KiB
C++

#include <stdio.h>
#include "keyset.h"
#include "utils.h"
#include "tinyxml/tinyxml.h"
static void keyset_set_key128(key128* key, unsigned char* keydata);
static void keyset_parse_key128(key128* key, char* keytext, int keylen);
static int keyset_parse_key(const char* text, unsigned int textlen, unsigned char* key, unsigned int size, int* valid);
static int keyset_load_rsakey2048(TiXmlElement* elem, rsakey2048* key);
static int keyset_load_key128(TiXmlHandle node, key128* key);
static int keyset_load_key(TiXmlHandle node, unsigned char* key, unsigned int maxsize, int* valid);
static int ishex(char c)
{
if (c >= '0' && c <= '9')
return 1;
if (c >= 'A' && c <= 'F')
return 1;
if (c >= 'a' && c <= 'f')
return 1;
return 0;
}
static unsigned char hextobin(char c)
{
if (c >= '0' && c <= '9')
return c-'0';
if (c >= 'A' && c <= 'F')
return c-'A'+0xA;
if (c >= 'a' && c <= 'f')
return c-'a'+0xA;
return 0;
}
void keyset_init(keyset* keys, u32 actions)
{
const key128 defaultkeys_retail[] = {
// common keyX
{{0x61, 0x70, 0x85, 0x71, 0x9b, 0x7c, 0xfb, 0x31, 0x6d, 0xf4, 0xdf, 0x2e, 0x83, 0x62, 0xc6, 0xe2}, 1},
// fixed system key - unknown if used/correct?
{{0x52, 0x7c, 0xe6, 0x30, 0xa9, 0xca, 0x30, 0x5f, 0x36, 0x96, 0xf3, 0xcd, 0xe9, 0x54, 0x19, 0x4b}, 1},
// NCCH 0x2c keyX
{{0xb9, 0x8e, 0x95, 0xce, 0xca, 0x3e, 0x4d, 0x17, 0x1f, 0x76, 0xa9, 0x4d, 0xe9, 0x34, 0xc0, 0x53}, 1},
// NCCH 0x25 keyX 7.x
{{0xce, 0xe7, 0xd8, 0xab, 0x30, 0xc0, 0x0d, 0xae, 0x85, 0x0e, 0xf5, 0xe3, 0x82, 0xac, 0x5a, 0xf3}, 1},
// NCCH 0x18 keyX N9.3
{{0x82, 0xe9, 0xc9, 0xbe, 0xbf, 0xb8, 0xbd, 0xb8, 0x75, 0xec, 0xc0, 0xa0, 0x7d, 0x47, 0x43, 0x74}, 1},
// NCCH 0x1B keyX N9.6
{{0x45, 0xad, 0x04, 0x95, 0x39, 0x92, 0xc7, 0xc8, 0x93, 0x72, 0x4a, 0x9a, 0x7b, 0xce, 0x61, 0x82}, 1}
};
const key128 defaultkeys_dev[] = {
// common keyX
{{0xbd, 0x4f, 0xe7, 0xe7, 0x33, 0xc7, 0x55, 0xfc, 0xe7, 0x54, 0x0e, 0xab, 0xbd, 0x8a, 0xc3, 0x0d}, 1},
// fixed system key
{{0x52, 0x7c, 0xe6, 0x30, 0xa9, 0xca, 0x30, 0x5f, 0x36, 0x96, 0xf3, 0xcd, 0xe9, 0x54, 0x19, 0x4b}, 1},
// NCCH 0x2c keyX
{{0x51, 0x02, 0x07, 0x51, 0x55, 0x07, 0xcb, 0xb1, 0x8e, 0x24, 0x3d, 0xcb, 0x85, 0xe2, 0x3a, 0x1d}, 1},
// NCCH 0x25 keyX 7.x
{{0x81, 0x90, 0x7a, 0x4b, 0x6f, 0x1b, 0x47, 0x32, 0x3a, 0x67, 0x79, 0x74, 0xce, 0x4a, 0xd7, 0x1b}, 1},
// NCCH 0x18 keyX N9.3
{{0x30, 0x4b, 0xf1, 0x46, 0x83, 0x72, 0xee, 0x64, 0x11, 0x5e, 0xbd, 0x40, 0x93, 0xd8, 0x42, 0x76}, 1},
// NCCH 0x1B keyX N9.6
{{0x6c, 0x8b, 0x29, 0x44, 0xa0, 0x72, 0x60, 0x35, 0xf9, 0x41, 0xdf, 0xc0, 0x18, 0x52, 0x4f, 0xb6}, 1}
};
memset(keys, 0, sizeof(keyset));
if (actions & PlainFlag)
return;
if (!(actions & DevFlag)) {
memcpy(&keys->commonkeyX, &defaultkeys_retail[0], sizeof(key128));
memcpy(&keys->ncchfixedsystemkey, &defaultkeys_retail[1], sizeof(key128));
memcpy(&keys->ncchkeyX_old, &defaultkeys_retail[2], sizeof(key128));
memcpy(&keys->ncchkeyX_seven, &defaultkeys_retail[3], sizeof(key128));
memcpy(&keys->ncchkeyX_ninethree, &defaultkeys_retail[4], sizeof(key128));
memcpy(&keys->ncchkeyX_ninesix, &defaultkeys_retail[5], sizeof(key128));
} else {
memcpy(&keys->commonkeyX, &defaultkeys_dev[0], sizeof(key128));
memcpy(&keys->ncchfixedsystemkey, &defaultkeys_dev[1], sizeof(key128));
memcpy(&keys->ncchkeyX_old, &defaultkeys_dev[2], sizeof(key128));
memcpy(&keys->ncchkeyX_seven, &defaultkeys_dev[3], sizeof(key128));
memcpy(&keys->ncchkeyX_ninethree, &defaultkeys_dev[4], sizeof(key128));
memcpy(&keys->ncchkeyX_ninesix, &defaultkeys_dev[5], sizeof(key128));
}
}
int keyset_load_key(TiXmlHandle node, unsigned char* key, unsigned int size, int* valid)
{
TiXmlElement* elem = node.ToElement();
if (valid)
*valid = 0;
if (!elem)
return 0;
const char* text = elem->GetText();
unsigned int textlen = strlen(text);
int status = keyset_parse_key(text, textlen, key, size, valid);
if (status == KEY_ERR_LEN_MISMATCH)
{
fprintf(stderr, "Error size mismatch for key \"%s/%s\"\n", elem->Parent()->Value(), elem->Value());
return 0;
}
return 1;
}
int keyset_parse_key(const char* text, unsigned int textlen, unsigned char* key, unsigned int size, int* valid)
{
unsigned int i, j;
unsigned int hexcount = 0;
if (valid)
*valid = 0;
for(i=0; i<textlen; i++)
{
if (ishex(text[i]))
hexcount++;
}
if (hexcount != size*2)
{
fprintf(stdout, "Error, expected %d hex characters when parsing text \"", size*2);
for(i=0; i<textlen; i++)
fprintf(stdout, "%c", text[i]);
fprintf(stdout, "\"\n");
return KEY_ERR_LEN_MISMATCH;
}
for(i=0, j=0; i<textlen; i++)
{
if (ishex(text[i]))
{
if ( (j&1) == 0 )
key[j/2] = hextobin(text[i])<<4;
else
key[j/2] |= hextobin(text[i]);
j++;
}
}
if (valid)
*valid = 1;
return KEY_OK;
}
int keyset_load_key128(TiXmlHandle node, key128* key)
{
return keyset_load_key(node, key->data, sizeof(key->data), &key->valid);
}
int keyset_load_rsakey2048(TiXmlHandle node, rsakey2048* key)
{
key->keytype = RSAKEY_INVALID;
if (!keyset_load_key(node.FirstChild("N"), key->n, sizeof(key->n), 0))
goto clean;
if (!keyset_load_key(node.FirstChild("E"), key->e, sizeof(key->e), 0))
goto clean;
key->keytype = RSAKEY_PUB;
if (!keyset_load_key(node.FirstChild("D"), key->d, sizeof(key->d), 0))
goto clean;
if (!keyset_load_key(node.FirstChild("P"), key->p, sizeof(key->p), 0))
goto clean;
if (!keyset_load_key(node.FirstChild("Q"), key->q, sizeof(key->q), 0))
goto clean;
if (!keyset_load_key(node.FirstChild("DP"), key->dp, sizeof(key->dp), 0))
goto clean;
if (!keyset_load_key(node.FirstChild("DQ"), key->dq, sizeof(key->dq), 0))
goto clean;
if (!keyset_load_key(node.FirstChild("QP"), key->qp, sizeof(key->qp), 0))
goto clean;
key->keytype = RSAKEY_PRIV;
clean:
return (key->keytype != RSAKEY_INVALID);
}
int keyset_load(keyset* keys, const char* fname, int verbose)
{
TiXmlDocument doc(fname);
bool loadOkay = doc.LoadFile();
if (!loadOkay)
{
if (verbose)
fprintf(stderr, "Could not load keyset file \"%s\", error: %s.\n", fname, doc.ErrorDesc() );
return 0;
}
TiXmlHandle root = doc.FirstChild("document");
keyset_load_rsakey2048(root.FirstChild("ncsdrsakey"), &keys->ncsdrsakey);
keyset_load_rsakey2048(root.FirstChild("ncchrsakey"), &keys->ncchrsakey);
keyset_load_rsakey2048(root.FirstChild("ncchdescrsakey"), &keys->ncchdescrsakey);
keyset_load_rsakey2048(root.FirstChild("firmrsakey"), &keys->firmrsakey);
keyset_load_key128(root.FirstChild("commonkeyx"), &keys->commonkeyX);
keyset_load_key128(root.FirstChild("ncchfixedsystemkey"), &keys->ncchfixedsystemkey);
keyset_load_key128(root.FirstChild("ncchkeyxold"), &keys->ncchkeyX_old);
keyset_load_key128(root.FirstChild("ncchkeyxseven"), &keys->ncchkeyX_seven);
keyset_load_key128(root.FirstChild("ncchkeyxninethree"), &keys->ncchkeyX_ninethree);
keyset_load_key128(root.FirstChild("ncchkeyxninesix"), &keys->ncchkeyX_ninesix);
return 1;
}
void keyset_merge(keyset* keys, keyset* src)
{
#define COPY_IF_VALID(v) do {\
if (src->v.valid && !keys->v.valid)\
keyset_set_key128(&keys->v, src->v.data);\
} while (0)
COPY_IF_VALID(titlekey);
COPY_IF_VALID(commonkeyX);
COPY_IF_VALID(ncchfixedsystemkey);
COPY_IF_VALID(ncchkeyX_old);
COPY_IF_VALID(ncchkeyX_seven);
COPY_IF_VALID(ncchkeyX_ninethree);
COPY_IF_VALID(ncchkeyX_ninesix);
if (src->seed_num > 0)
{
keys->seed_num = src->seed_num;
keys->seed_db = (seeddb_entry*)calloc(src->seed_num, sizeof(seeddb_entry));
memcpy(keys->seed_db, src->seed_db, src->seed_num * sizeof(seeddb_entry));
}
#undef COPY_IF_VALID
}
void keyset_set_key128(key128* key, unsigned char* keydata)
{
memcpy(key->data, keydata, 16);
key->valid = 1;
}
void keyset_parse_key128(key128* key, char* keytext, int keylen)
{
keyset_parse_key(keytext, keylen, key->data, 16, &key->valid);
}
void keyset_parse_commonkeyX(keyset* keys, char* keytext, int keylen)
{
keyset_parse_key128(&keys->commonkeyX, keytext, keylen);
}
void keyset_parse_titlekey(keyset* keys, char* keytext, int keylen)
{
keyset_parse_key128(&keys->titlekey, keytext, keylen);
}
void keyset_parse_ncchkeyX_old(keyset* keys, char* keytext, int keylen)
{
keyset_parse_key128(&keys->ncchkeyX_old, keytext, keylen);
}
void keyset_parse_ncchfixedsystemkey(keyset* keys, char* keytext, int keylen)
{
keyset_parse_key128(&keys->ncchfixedsystemkey, keytext, keylen);
}
void keyset_parse_ncchkeyX_seven(keyset* keys, char* keytext, int keylen)
{
keyset_parse_key128(&keys->ncchkeyX_seven, keytext, keylen);
}
void keyset_parse_ncchkeyX_ninethree(keyset* keys, char* keytext, int keylen)
{
keyset_parse_key128(&keys->ncchkeyX_ninethree, keytext, keylen);
}
void keyset_parse_ncchkeyX_ninesix(keyset* keys, char* keytext, int keylen)
{
keyset_parse_key128(&keys->ncchkeyX_ninesix, keytext, keylen);
}
void keyset_parse_seeddb(keyset* keys, char* path)
{
//keyset_parse_key128(&keys->seed, keytext, keylen);
FILE* fp = fopen(path, "rb");
if (fp == NULL)
{
printf("[ERROR] Failed to load SeedDB (failed to open file)\n");
return;
}
seeddb_header hdr;
fread(&hdr, sizeof(seeddb_header), 1, fp);
keys->seed_num = getle32(hdr.n_entries);
for (u32 i = 0; i < 0xC; i++)
{
if (hdr.padding[i] != 0x00)
{
printf("[ERROR] SeedDB is corrupt. (padding malformed)\n");
return;
}
}
keys->seed_db = (seeddb_entry*)calloc(keys->seed_num, sizeof(seeddb_entry));
fread(keys->seed_db, keys->seed_num * sizeof(seeddb_entry), 1, fp);
}
void keyset_dump_rsakey(rsakey2048* key, const char* keytitle)
{
if (key->keytype == RSAKEY_INVALID)
return;
fprintf(stdout, "%s\n", keytitle);
memdump(stdout, "Modulus: ", key->n, 256);
memdump(stdout, "Exponent: ", key->e, 3);
if (key->keytype == RSAKEY_PRIV)
{
memdump(stdout, "P: ", key->p, 128);
memdump(stdout, "Q: ", key->q, 128);
}
fprintf(stdout, "\n");
}
void keyset_dump_key128(key128* key, const char* keytitle)
{
if (key->valid)
{
fprintf(stdout, "%s\n", keytitle);
memdump(stdout, "", key->data, 16);
fprintf(stdout, "\n");
}
}
void keyset_dump(keyset* keys)
{
#define DUMP_KEY(n, s) do {\
keyset_dump_key128(&keys->n, (s));\
} while(0)
fprintf(stdout, "Current keyset: \n");
DUMP_KEY(ncchkeyX_old, "NCCH OLD KEYX");
DUMP_KEY(ncchkeyX_seven, "NCCH 7.0 KEYX");
DUMP_KEY(ncchkeyX_ninethree, "NCCH N9.3 KEYX");
DUMP_KEY(ncchkeyX_ninesix, "NCCH N9.6 KEYX");
DUMP_KEY(ncchfixedsystemkey, "NCCH FIXEDSYSTEMKEY");
DUMP_KEY(commonkeyX, "COMMON KEYX");
#undef DUMP_KEY
keyset_dump_rsakey(&keys->ncsdrsakey, "NCSD RSA KEY");
keyset_dump_rsakey(&keys->ncchdescrsakey, "NCCH DESC RSA KEY");
fprintf(stdout, "\n");
}