・ツリーの整理。

dummyCA, rsakeyフォルダの削除。
 realKeyフォルダを追加し、AESのIVとECDSAのpublicKeyは、USE_HSM時にも組み込むようにする。
 但し、現時点ではデバッグの都合上、realKeyフォルダ内の鍵は、dummyKeyフォルダと同じものにしておく。
・ツリー内から"Nintendo"の表記を出来る限り削除。
 issuerNameは、0x5aでXORマスクしたものをソース上に置いておく。
・USE_HSMの場合でも、AESのIVをファイルから読み込んで使用するようにする。

git-svn-id: file:///Volumes/Transfer/gigaleak_20231201/2020-09-30%20-%20paladin.7z/paladin/ctr_eFuse@134 ff987cc8-cf2f-4642-8568-d52cce064691
This commit is contained in:
(no author) 2010-01-05 10:51:17 +00:00
parent fe7a885611
commit ae1edae695
34 changed files with 68 additions and 344 deletions

View File

@ -66,8 +66,8 @@ ifeq ($(USE_DUMMY_KEY),TRUE)
DEV_DER_KEY_DIR = ./dummyKey/dev
PROD_DER_KEY_DIR = ./dummyKey/prod
else # !USE_DUMMY_KEY
DEV_DER_KEY_DIR = /cygdrive/w/CTR/dev
PROD_DER_KEY_DIR = /cygdrive/w/CTR/prod
DEV_DER_KEY_DIR = ./realKey/dev
PROD_DER_KEY_DIR = ./realKey/prod
endif # USE_DUMMY_KEY
PACKAGE_DIR = ./package
@ -76,12 +76,19 @@ OPENSSL_DIR = ./openssl-0.9.8k
TARGET = gen_id
KEYS_C = cr_eFuse_privKey_prod.c cr_eFuse_pubKey_prod.c \
cr_eFuse_privKey_dev.c cr_eFuse_pubKey_dev.c \
cr_eFuse_aesKey_prod.c cr_eFuse_iv_prod.c \
cr_eFuse_aesKey_dev.c cr_eFuse_iv_dev.c \
cr_NintendoCTR2_priv_dummy_prod.c cr_NintendoCTR2_pub_dummy_prod.c \
cr_NintendoCTR2_priv_dummy_dev.c cr_NintendoCTR2_pub_dummy_dev.c
KEYS_C = cr_eFuse_iv_prod.c \
cr_eFuse_iv_dev.c \
cr_NCT2_pub_prod.c \
cr_NCT2_pub_dev.c
ifeq ($(USE_DUMMY_KEY),TRUE)
KEYS_C += cr_eFuse_privKey_prod.c cr_eFuse_pubKey_prod.c \
cr_eFuse_privKey_dev.c cr_eFuse_pubKey_dev.c \
cr_eFuse_aesKey_prod.c \
cr_eFuse_aesKey_dev.c \
cr_NCT2_priv_prod.c \
cr_NCT2_priv_dev.c
endif # USE_DUMMY_KEY
SRCS = main.c cr_generate_id.c cr_id_util.c cr_keyPair.c \
cr_device_cert.c cr_enc_id.c cr_alloc.c \
@ -155,10 +162,10 @@ cr_eFuse_aesKey_prod.c : $(PROD_DER_KEY_DIR)/eFuse_aesKey.bin
cr_eFuse_iv_prod.c : $(PROD_DER_KEY_DIR)/eFuse_iv.bin
perl tools/bin2c.plx $< prod
cr_NintendoCTR2_priv_dummy_prod.c : $(PROD_DER_KEY_DIR)/NintendoCTR2_priv_dummy.der
cr_NCT2_priv_prod.c : $(PROD_DER_KEY_DIR)/NCT2_priv.der
perl tools/bin2c.plx $< prod
cr_NintendoCTR2_pub_dummy_prod.c : $(PROD_DER_KEY_DIR)/NintendoCTR2_pub_dummy.der
cr_NCT2_pub_prod.c : $(PROD_DER_KEY_DIR)/NCT2_pub.der
perl tools/bin2c.plx $< prod
@ -174,10 +181,10 @@ cr_eFuse_aesKey_dev.c : $(DEV_DER_KEY_DIR)/eFuse_aesKey.bin
cr_eFuse_iv_dev.c : $(DEV_DER_KEY_DIR)/eFuse_iv.bin
perl tools/bin2c.plx $< dev
cr_NintendoCTR2_priv_dummy_dev.c : $(DEV_DER_KEY_DIR)/NintendoCTR2_priv_dummy.der
cr_NCT2_priv_dev.c : $(DEV_DER_KEY_DIR)/NCT2_priv.der
perl tools/bin2c.plx $< dev
cr_NintendoCTR2_pub_dummy_dev.c : $(DEV_DER_KEY_DIR)/NintendoCTR2_pub_dummy.der
cr_NCT2_pub_dev.c : $(DEV_DER_KEY_DIR)/NCT2_pub.der
perl tools/bin2c.plx $< dev

View File

@ -130,12 +130,12 @@
#include <openssl/sha.h>
#include <openssl/ec.h>
#include <openssl/ecdsa.h>
#include "cr_NintendoCTR2_priv_dummy_dev.c"
#include "cr_NintendoCTR2_priv_dummy_prod.c"
#include "cr_NCT2_priv_dev.c"
#include "cr_NCT2_priv_prod.c"
#endif // USE_HSM
#include "cr_NintendoCTR2_pub_dummy_dev.c"
#include "cr_NintendoCTR2_pub_dummy_prod.c"
#include "cr_NCT2_pub_dev.c"
#include "cr_NCT2_pub_prod.c"
#include "cr_generate_id.h"
#include "cr_generate_id_private.h"
@ -159,8 +159,11 @@ typedef struct CR_DeviceCert
u8 padding1 [ 60 ]; // 0x144 - 0x17F : zero-filled
} CR_DeviceCert;
const char *issuerNameDev = "NintendoCA - G2_NintendoCTR2dev";
const char *issuerNameProd = "NintendoCA - G2_NintendoCTR2prod";
const u8 issuerName[] = {
0x14, 0x33, 0x34, 0x2E, 0x3F, 0x34, 0x3E, 0x35,
0x19, 0x1B, 0x7A, 0x77, 0x7A, 0x1D, 0x68, 0x05,
0x14, 0x33, 0x34, 0x2E, 0x3F, 0x34, 0x3E, 0x35,
0x19, 0x0E, 0x08, 0x68 };
static void BN2BinWithPadding( BIGNUM *pBn, u8 *pDst, int dstLen );
@ -170,7 +173,8 @@ int GenerateCTRDeviceCert( EC_KEY *pECkey, u32 device_id, u8 bonding_option, u8
{
int ret_code = CR_GENID_SUCCESS;
CR_DeviceCert deviceCert;
EC_KEY *NintendoCTR2 = NULL;
EC_KEY *NCT2 = NULL;
int i;
#ifdef DEBUG_PRINT
if ( sizeof( CR_DeviceCert ) > 384 )
@ -188,9 +192,10 @@ int GenerateCTRDeviceCert( EC_KEY *pECkey, u32 device_id, u8 bonding_option, u8
deviceCert.sigType[3] = 0x05;
// issuerName
memcpy( deviceCert.issuerName,
bonding_option ? issuerNameDev : issuerNameProd,
bonding_option ? strlen( issuerNameDev ) : strlen( issuerNameProd ) );
for( i = 0; i < sizeof(issuerName); i++ ) {
deviceCert.issuerName[ i ] = issuerName[ i ] ^ 0x5a;
}
sprintf( &deviceCert.issuerName[ sizeof(issuerName) ], "%s", bonding_option ? "dev" : "prod" );
// keyType 0x00000002 ECC233
deviceCert.keyType[0] = 0x00;
@ -244,20 +249,20 @@ int GenerateCTRDeviceCert( EC_KEY *pECkey, u32 device_id, u8 bonding_option, u8
// DERフォーマットのECC鍵を読み込み
{
// bonding_option によって、鍵を差し替え
const unsigned char *der_priv = bonding_option ? cr_NintendoCTR2_priv_dummy_dev : cr_NintendoCTR2_priv_dummy_prod;
const unsigned char *der_priv = bonding_option ? cr_NCT2_priv_dev : cr_NCT2_priv_prod;
int priv_len = der_priv[ 8 ] | der_priv[ 9 ] << 8; // KEY長を取り出し
der_priv += 0x10; // ヘッダ部分を除外してKEY実体を指定
// ECCは、秘密鍵のみで公開鍵成分もセットされるようなので、公開鍵は読み込まない。
NintendoCTR2 = d2i_ECPrivateKey( NULL, &der_priv, priv_len );
if( NintendoCTR2 == NULL ) {
NCT2 = d2i_ECPrivateKey( NULL, &der_priv, priv_len );
if( NCT2 == NULL ) {
ret_code = CR_GENID_ERROR_ECC_READ_PRIVATE_KEY;
goto end;
}
#if 0
DEBUG_PRINT_ARRAY( "EC priv:", (const char *)NintendoCTR2->priv_key->d, NintendoCTR2->priv_key->dmax * 4);
DEBUG_PRINT_ARRAY( "EC pub.X:", (const char *)NintendoCTR2->pub_key->X.d, NintendoCTR2->pub_key->X.dmax * 4 );
DEBUG_PRINT_ARRAY( "EC pub.Y:", (const char *)NintendoCTR2->pub_key->Y.d, NintendoCTR2->pub_key->Y.dmax * 4 );
DEBUG_PRINT_ARRAY( "EC priv:", (const char *)NCT2->priv_key->d, NCT2->priv_key->dmax * 4);
DEBUG_PRINT_ARRAY( "EC pub.X:", (const char *)NCT2->pub_key->X.d, NCT2->pub_key->X.dmax * 4 );
DEBUG_PRINT_ARRAY( "EC pub.Y:", (const char *)NCT2->pub_key->Y.d, NCT2->pub_key->Y.dmax * 4 );
#endif
}
// ECDSA署名付加
@ -274,7 +279,7 @@ int GenerateCTRDeviceCert( EC_KEY *pECkey, u32 device_id, u8 bonding_option, u8
// 上位232bit分で署名
memset( ecdsasig, 0, sizeof(ecdsasig) );
test_ret = ECDSA_sign( 0, sha256buf, 233/8, ecdsasig, &signLen, NintendoCTR2 );
test_ret = ECDSA_sign( 0, sha256buf, 233/8, ecdsasig, &signLen, NCT2 );
if (test_ret == 0) {
ret_code = CR_GENID_ERROR_ECDSA_SIGN;
SetErrorInfo( __FUNCTION__, __LINE__ );
@ -284,7 +289,7 @@ int GenerateCTRDeviceCert( EC_KEY *pECkey, u32 device_id, u8 bonding_option, u8
#if 0
// 署名ベリファイ
ret_code = ECDSA_verify( 0, sha1buf, 20, tempSign, 66, NintendoCTR2 );
ret_code = ECDSA_verify( 0, sha1buf, 20, tempSign, 66, NCT2 );
if( ret_code != 1) {
ret_code = CR_GENID_ERROR_ECDSA_VERIFY;
SetErrorInfo( __FUNCTION__, __LINE__ );
@ -308,8 +313,8 @@ int GenerateCTRDeviceCert( EC_KEY *pECkey, u32 device_id, u8 bonding_option, u8
BN2BinWithPadding( sig->s, &deviceCert.eccSignature[ 30 ], 30 );
memcpy( pDevCertSign, &deviceCert.eccSignature, 60 );
if( sig ) ECDSA_SIG_free( sig );
if( NintendoCTR2 ) EC_KEY_free( NintendoCTR2 );
NintendoCTR2 = NULL;
if( NCT2 ) EC_KEY_free( NCT2 );
NCT2 = NULL;
#ifdef DEBUG_DEVICE_CERT_OUTPUT_FILE
DebugFileOutput( device_id, "dgst", sha256buf, 233/8 );
@ -321,7 +326,7 @@ int GenerateCTRDeviceCert( EC_KEY *pECkey, u32 device_id, u8 bonding_option, u8
// ECDSA署名検証
{
// bonding_option によって、鍵を差し替え
const unsigned char *der_pub = bonding_option ? cr_NintendoCTR2_pub_dummy_dev : cr_NintendoCTR2_pub_dummy_prod;
const unsigned char *der_pub = bonding_option ? cr_NCT2_pub_dev : cr_NCT2_pub_prod;
int pub_len = der_pub[ 8 ] | der_pub[ 9 ] << 8; // KEY長を取り出し
der_pub += 0x10; // ヘッダ部分を除外してKEY実体を指定
@ -330,13 +335,13 @@ int GenerateCTRDeviceCert( EC_KEY *pECkey, u32 device_id, u8 bonding_option, u8
der_pub += 0x17;
// ECC公開鍵の読み込み
NintendoCTR2 = EC_KEY_new_by_curve_name( NID_sect233r1 );
if( NintendoCTR2 == NULL ) {
NCT2 = EC_KEY_new_by_curve_name( NID_sect233r1 );
if( NCT2 == NULL ) {
SetErrorInfo( __FUNCTION__, __LINE__ );
ret_code = CR_GENID_ERROR_ECC_KEY_NEW;
goto end;
}
if( o2i_ECPublicKey( &NintendoCTR2, &der_pub, pub_len ) == NULL ) {
if( o2i_ECPublicKey( &NCT2, &der_pub, pub_len ) == NULL ) {
SetErrorInfo( __FUNCTION__, __LINE__ );
ret_code = CR_GENID_ERROR_ECC_READ_PUBLIC_KEY;
goto end;
@ -345,7 +350,7 @@ int GenerateCTRDeviceCert( EC_KEY *pECkey, u32 device_id, u8 bonding_option, u8
// TODO: ハッシュ処理
// TODO: ECDSA署名DERを再構築
// 署名ベリファイ
ret_code = ECDSA_verify( 0, sha1Buf, 20, signBuf, signLen, NintendoCTR2 );
ret_code = ECDSA_verify( 0, sha1Buf, 20, signBuf, signLen, NCT2 );
if( ret_code != 1) {
ret_code = CR_GENID_ERROR_ECDSA_VERIFY;
SetErrorInfo( __FUNCTION__, __LINE__ );
@ -388,7 +393,7 @@ int GenerateCTRDeviceCert( EC_KEY *pECkey, u32 device_id, u8 bonding_option, u8
#endif // dump deviceCert
end:
if( NintendoCTR2 ) EC_KEY_free( NintendoCTR2 );
if( NCT2 ) EC_KEY_free( NCT2 );
return ret_code;
} // generate_CTRCustom_deviceCert

View File

@ -132,14 +132,15 @@
#include "cr_eFuse_pubKey_prod.c"
#include "cr_eFuse_aesKey_dev.c"
#include "cr_eFuse_iv_dev.c"
#include "cr_eFuse_aesKey_prod.c"
#include "cr_eFuse_iv_prod.c"
extern RSA *d2i_RSA_PUBKEY(RSA **a, const unsigned char **pp, long length);
#endif // USE_HSM
#include "cr_eFuse_iv_dev.c"
#include "cr_eFuse_iv_prod.c"
#ifdef ENCRYPT_AES
static int crypto_aes_enc_dec( unsigned char *dst_buf,unsigned char *org_buf, u8 bonding_option );
#else // !ENCRYPT_AES
@ -171,9 +172,10 @@ int crypto_aes_enc_dec( unsigned char *dst_buf, unsigned char *org_buf, u8 bondi
{
int i;
int ret_code = CR_GENID_SUCCESS;
char *pIV = (char *)( bonding_option ? cr_eFuse_iv_dev : cr_eFuse_iv_prod ) + 0x10;
// encrypt
ret_code = hsm_aes_encrypt( local_buf_1, org_buf, CR_ID_BUF_SIZE, bonding_option );
ret_code = hsm_aes_encrypt( local_buf_1, org_buf, CR_ID_BUF_SIZE, bonding_option, pIV );
if ( ret_code != CR_GENID_SUCCESS )
{
SetErrorInfo( __FUNCTION__, __LINE__ );
@ -181,7 +183,7 @@ int crypto_aes_enc_dec( unsigned char *dst_buf, unsigned char *org_buf, u8 bondi
}
// decyrpt
ret_code = hsm_aes_decrypt( local_buf_2, local_buf_1, CR_ID_BUF_SIZE, bonding_option );
ret_code = hsm_aes_decrypt( local_buf_2, local_buf_1, CR_ID_BUF_SIZE, bonding_option, pIV );
if ( ret_code != CR_GENID_SUCCESS )
{
SetErrorInfo( __FUNCTION__, __LINE__ );

View File

@ -137,7 +137,7 @@ typedef unsigned long long u64;
ID2 = device_id[ 3 ] | ( device_id[ 4 ] << 32 )
*/
// Nintendo ID Žd—l
// eFuseID Žd—l
#define CR_ID0_BIT_NUM 32
#define CR_ID1_BIT_NUM 34
#define CR_ID2_BIT_NUM 64

View File

@ -137,12 +137,14 @@ NFKM_WorldInfo *hsmWorld = NULL; // allocate
// TODO: <20>Å<EFBFBD>IŒ®É•Ï<E280A2>X·é
#ifdef ENCRYPT_AES
M_KeyID hsmAesKeyidDev, hsmAesKeyidProd;
// TODO : 最終的な鍵の名前を決める "efuse-aes-dev, efuse-aes-prod"
const NFKM_KeyIdent hsmAesKeyidentDev = { (char*)"simple", (char*)"efuse-aes-key-dummy-dev" };
const NFKM_KeyIdent hsmAesKeyidentProd = { (char*)"simple", (char*)"efuse-aes-key-dummy-prod" };
static int hsm_aes_load_key( NFKM_KeyIdent keyident, M_KeyID *keyid );
#else // !ENCRYPT_AES
M_KeyID hsmRsaPrivkeyidDev, hsmRsaPubkeyidDev, hsmRsaPrivkeyidProd, hsmRsaPubkeyidProd;
// TODO : 最終的な鍵の名前を決める "efuse-rsa-priv-dev, efuse-rsa-priv-prod"
const NFKM_KeyIdent hsmRsaKeyidentDev = { (char*)"simple", (char*)"rsa-dummykeypair-dev" };
const NFKM_KeyIdent hsmRsaKeyidentProd = { (char*)"simple", (char*)"rsa-dummykeypair-prod" };
@ -153,6 +155,7 @@ static int hsm_rsa_load_keypair( NFKM_KeyIdent keyident, M_KeyID *privKeyid, M_K
M_KeyID hsmEcdsaPrivkeyidDev, hsmEcdsaPubkeyidDev;
M_KeyID hsmEcdsaPrivkeyidProd, hsmEcdsaPubkeyidProd;
// TODO : 最終的な鍵の名前を決める "nct2-priv-dev, nct2-priv-prod", 公開鍵は入れない
const NFKM_KeyIdent hsmEcdsaPrivkeyidentDev = { (char*)"simple", (char*)"nintendo-ctr2-priv-dummy-dev" };
const NFKM_KeyIdent hsmEcdsaPubkeyidentDev = { (char*)"simple", (char*)"nintendo-ctr2-pub-dummy-dev" };
const NFKM_KeyIdent hsmEcdsaPrivkeyidentProd = { (char*)"simple", (char*)"nintendo-ctr2-priv-dummy-prod" };
@ -486,7 +489,7 @@ end:
return ret_code;
} // hsm_aes_load_key
int hsm_aes_encrypt( unsigned char *dst_buf, unsigned char *org_buf, int size, u8 bonding_option )
int hsm_aes_encrypt( unsigned char *dst_buf, unsigned char *org_buf, int size, u8 bonding_option, u8 *pIV )
{
int ret_code = CR_GENID_SUCCESS;
@ -503,7 +506,7 @@ int hsm_aes_encrypt( unsigned char *dst_buf, unsigned char *org_buf, int size, u
// iv set
enc_iv.mech = Mech_RijndaelmCBCpNONE;
memset( enc_iv.iv.generic128.iv.bytes, 0, sizeof( enc_iv.iv.generic128.iv.bytes ) );
memcpy( enc_iv.iv.generic128.iv.bytes, pIV, sizeof( enc_iv.iv.generic128.iv.bytes ) );
// encrypt command set
cmd.cmd = Cmd_Encrypt;
@ -538,7 +541,7 @@ int hsm_aes_encrypt( unsigned char *dst_buf, unsigned char *org_buf, int size, u
return CR_GENID_SUCCESS;
} // hsm_aes_encrypt
int hsm_aes_decrypt( unsigned char *dst_buf, unsigned char *org_buf, int size, u8 bonding_option )
int hsm_aes_decrypt( unsigned char *dst_buf, unsigned char *org_buf, int size, u8 bonding_option, u8 *pIV )
{
int ret_code = CR_GENID_SUCCESS;
@ -555,7 +558,7 @@ int hsm_aes_decrypt( unsigned char *dst_buf, unsigned char *org_buf, int size, u
// iv set
dec_iv.mech = Mech_RijndaelmCBCpNONE;
memset( dec_iv.iv.generic128.iv.bytes, 0, sizeof( dec_iv.iv.generic128.iv.bytes ) );
memcpy( dec_iv.iv.generic128.iv.bytes, pIV, sizeof( dec_iv.iv.generic128.iv.bytes ) );
// decyrpt
cmd.cmd = Cmd_Decrypt;

View File

@ -128,8 +128,8 @@ int hsm_finalize( void );
int hsm_reset_module( void );
int hsm_generate_random( unsigned char *buf, int bytes );
int hsm_get_rtc( time_t *time );
int hsm_aes_encrypt( unsigned char *dst_buf, unsigned char *org_buf, int size, unsigned char bonding_option );
int hsm_aes_decrypt( unsigned char *dst_buf, unsigned char *org_buf, int size, unsigned char bonding_option );
int hsm_aes_encrypt( unsigned char *dst_buf, unsigned char *org_buf, int size, unsigned char bonding_option, unsigned char *pIV );
int hsm_aes_decrypt( unsigned char *dst_buf, unsigned char *org_buf, int size, unsigned char bonding_option, unsigned char *pIV );
int hsm_rsa_encrypt( unsigned char *dst_buf, unsigned char *org_buf, int size, unsigned char bonding_option );
int hsm_rsa_decrypt( unsigned char *dst_buf, unsigned char *org_buf, int size, unsigned char bonding_option );
int hsm_ecdsa_sign( unsigned char *sign_buf, int *sign_size, unsigned char *data_buf, int data_size, unsigned char bonding_option );

View File

@ -1,83 +0,0 @@
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 0 (0x0)
Signature Algorithm: sha1WithRSAEncryption
Issuer: C=US, ST=WA, O=NINTENDO_OF_AMERICA, OU=SYSTEM, CN=ALL-PLATFORM/emailAddress=admin@nintendo.co.jp
Validity
Not Before: Nov 19 08:58:03 2009 GMT
Not After : Nov 17 08:58:03 2019 GMT
Subject: C=US, ST=WA, O=NINTENDO_OF_AMERICA, OU=SYSTEM, CN=ALL-PLATFORM/emailAddress=admin@nintendo.co.jp
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (2048 bit)
Modulus:
00:b7:b9:5f:4b:d5:c8:d6:9c:04:05:0c:d3:64:b9:
94:75:1e:08:6e:71:ee:86:9b:95:05:09:57:d4:2a:
40:41:1c:ce:b3:5d:f9:2f:29:ef:13:1e:a2:d0:11:
67:18:cc:a2:69:dd:eb:ce:90:d7:48:8b:60:0a:b9:
eb:32:ae:03:38:de:dc:4a:a6:83:1d:54:0c:73:50:
32:97:cb:72:1d:7d:07:a8:a4:3d:ed:a7:6e:91:01:
bc:f4:97:d9:ae:22:33:30:2b:05:d7:f4:a7:11:0c:
be:f5:e5:fb:81:b3:7c:d3:87:22:cd:85:2b:0e:fb:
7f:1e:7a:c4:65:0c:1e:6a:27:c5:24:e4:2a:da:c7:
64:b0:b7:1d:72:0d:1c:cd:d7:85:f2:74:3a:c1:ba:
03:49:06:43:95:f8:c9:48:e8:0f:7c:ca:1a:c5:d7:
a3:22:75:ff:7f:29:91:b8:aa:65:30:d1:19:18:7e:
08:e1:a0:4a:54:f0:bc:42:89:f6:7a:81:c5:83:c5:
78:28:b1:d7:9c:7e:69:78:09:14:12:75:13:62:ef:
4b:d9:76:e3:29:9a:6b:35:e4:53:b8:14:4f:8b:93:
9c:7b:21:8e:f0:5a:04:b3:04:3f:6a:f0:96:1a:e2:
99:42:51:e0:e5:6f:13:d0:f9:86:5e:80:c6:31:21:
47:6f
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Basic Constraints:
CA:FALSE
Netscape Comment:
OpenSSL Generated Certificate
X509v3 Subject Key Identifier:
C7:3D:11:8F:6F:EB:10:5C:CE:C4:CE:04:79:BF:61:E9:70:E0:58:B2
X509v3 Authority Key Identifier:
keyid:C7:3D:11:8F:6F:EB:10:5C:CE:C4:CE:04:79:BF:61:E9:70:E0:58:B2
Signature Algorithm: sha1WithRSAEncryption
02:56:8e:4c:e2:bb:c7:2c:3a:16:ef:26:c7:11:fa:1c:a5:fc:
a8:a3:be:7a:0b:d7:e1:32:77:b9:c5:0a:1a:d8:74:6e:f6:42:
3e:c2:ae:60:94:57:6a:d6:4d:56:cd:3e:82:21:4f:e1:53:95:
a0:83:e1:24:10:57:ac:89:53:6f:45:9e:85:04:a2:47:1f:e9:
85:01:3b:8e:f5:77:ae:66:93:49:90:53:5f:12:10:c3:14:b9:
9b:f3:b9:02:54:60:c6:da:48:db:a1:23:9b:ae:9d:42:30:96:
af:b5:b2:23:5a:e0:33:89:51:db:f1:6b:a8:10:57:d6:f9:5d:
fb:d9:ec:29:92:8a:3b:e8:6d:e2:ae:a6:8d:3c:a1:bd:09:92:
3e:d2:05:e4:c0:54:b7:49:92:03:c8:4b:9b:d5:66:91:04:41:
dd:65:dd:32:b9:00:f7:54:0e:a0:71:74:33:30:76:4b:59:34:
7d:58:59:c7:65:69:3b:72:91:8f:ba:1b:a2:8b:2e:d5:fe:b0:
64:2d:f3:ae:ae:76:76:21:a1:c0:a3:53:a6:93:62:99:e2:22:
fc:80:aa:d2:a6:2f:6f:03:28:6d:01:66:40:7d:36:0e:05:ca:
06:09:4b:6d:7a:42:a9:57:85:80:50:f1:21:cd:df:47:e2:49:
73:9d:12:ca
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View File

@ -1,18 +0,0 @@
-----BEGIN CERTIFICATE REQUEST-----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-----END CERTIFICATE REQUEST-----

Binary file not shown.

View File

@ -1,27 +0,0 @@
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----

Binary file not shown.

View File

@ -1,9 +0,0 @@
-----BEGIN PUBLIC KEY-----
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAt7lfS9XI1pwEBQzTZLmU
dR4IbnHuhpuVBQlX1CpAQRzOs135LynvEx6i0BFnGMyiad3rzpDXSItgCrnrMq4D
ON7cSqaDHVQMc1Ayl8tyHX0HqKQ97adukQG89JfZriIzMCsF1/SnEQy+9eX7gbN8
04cizYUrDvt/HnrEZQweaifFJOQq2sdksLcdcg0czdeF8nQ6wboDSQZDlfjJSOgP
fMoaxdejInX/fymRuKplMNEZGH4I4aBKVPC8Qon2eoHFg8V4KLHXnH5peAkUEnUT
Yu9L2XbjKZprNeRTuBRPi5OceyGO8FoEswQ/avCWGuKZQlHg5W8T0PmGXoDGMSFH
bwIDAQAB
-----END PUBLIC KEY-----

View File

@ -1,66 +0,0 @@
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: sha1WithRSAEncryption
Issuer: C=US, ST=WA, O=NINTENDO_OF_AMERICA, OU=SYSTEM, CN=ALL-PLATFORM/emailAddress=admin@nintendo.co.jp
Validity
Not Before: Nov 19 09:02:31 2009 GMT
Not After : Nov 17 09:02:31 2019 GMT
Subject: C=JP, ST=KYOTO, L=KYOTO, O=NINTENDO, OU=RED, CN=CTR/emailAddress=ctr_admin@nintendo.co.jp
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (233 bit)
pub:
04:00:d9:01:fd:e5:55:60:d9:32:33:25:93:53:0a:
ba:63:a3:14:50:96:2d:4c:72:f2:9a:e6:a0:fb:6b:
bf:01:be:d6:c3:8c:64:11:a2:6c:d3:ac:aa:31:9a:
f5:67:a4:85:67:d6:93:67:04:8b:f0:a0:9e:2d:25:
35
ASN1 OID: sect233r1
X509v3 extensions:
X509v3 Basic Constraints:
CA:FALSE
Netscape Comment:
OpenSSL Generated Certificate
X509v3 Subject Key Identifier:
71:C3:EC:E7:2A:49:31:38:31:5B:7B:76:9D:2E:10:03:FE:19:78:4C
X509v3 Authority Key Identifier:
keyid:C7:3D:11:8F:6F:EB:10:5C:CE:C4:CE:04:79:BF:61:E9:70:E0:58:B2
Signature Algorithm: sha1WithRSAEncryption
78:77:94:27:9d:db:1e:4b:4a:f0:58:de:a3:09:b2:d3:be:08:
ce:ff:12:14:8c:f5:3f:fd:c8:bb:f1:51:5e:7a:6f:38:dc:c8:
cd:c9:af:52:d1:a7:c3:b7:60:e0:37:95:7d:72:89:94:40:fb:
c5:ce:ff:ed:9f:a8:ff:93:ee:61:f1:36:01:a9:2f:df:bc:3d:
8b:e8:ee:60:98:75:93:3b:96:92:0b:a1:41:33:d8:01:b9:13:
42:5f:04:56:c9:84:3e:41:06:6d:4c:82:bd:9f:dd:77:45:df:
76:0e:27:c5:ae:69:3a:61:5d:a2:85:b9:fe:64:96:a5:ef:1d:
d5:93:05:c3:24:9e:ce:fc:b6:c3:0e:fa:8f:40:31:f8:ed:f9:
66:52:75:9d:2a:66:a6:ce:52:46:1c:90:39:5a:53:ea:eb:8c:
25:9e:16:70:6b:9b:3f:2a:22:23:55:67:a6:fa:50:2b:4a:e4:
e5:a6:db:2d:df:ae:76:4a:04:be:b9:1c:45:74:82:0a:91:70:
d6:31:5f:ed:c9:bf:14:db:5a:8b:d0:e6:8a:20:4b:db:2e:c4:
1f:13:08:22:72:bb:79:9b:7a:19:b1:9e:a5:2e:e6:15:b8:66:
6e:62:39:77:70:e4:63:9b:fc:03:5c:4b:ad:64:55:6e:11:f1:
b9:e0:b8:24
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View File

@ -1,9 +0,0 @@
-----BEGIN CERTIFICATE REQUEST-----
MIIBMzCB4QIBADCBhTELMAkGA1UEBhMCSlAxDjAMBgNVBAgMBUtZT1RPMQ4wDAYD
VQQHDAVLWU9UTzERMA8GA1UECgwITklOVEVORE8xDDAKBgNVBAsMA1JFRDEMMAoG
A1UEAwwDQ1RSMScwJQYJKoZIhvcNAQkBFhhjdHJfYWRtaW5AbmludGVuZG8uY28u
anAwUjAQBgcqhkjOPQIBBgUrgQQAGwM+AAQA2QH95VVg2TIzJZNTCrpjoxRQli1M
cvKa5qD7a78BvtbDjGQRomzTrKoxmvVnpIVn1pNnBIvwoJ4tJTWgADAJBgcqhkjO
PQQBA0IAMD8CHgDRzF0qVB7z6NG9nNEWq6w+gzxzFV95+tfWCYkCsgIdUT2iMI7Z
UZiE0I/lrOIHqetBIsJFpYVGA83D1gc=
-----END CERTIFICATE REQUEST-----

View File

@ -1,8 +0,0 @@
-----BEGIN EC PARAMETERS-----
BgUrgQQAGw==
-----END EC PARAMETERS-----
-----BEGIN EC PRIVATE KEY-----
MG0CAQEEHSPpFxKbsybBnzhicMZAWpTsdlB1u/Ca7PlXn9SZoAcGBSuBBAAboUAD
PgAEANkB/eVVYNkyMyWTUwq6Y6MUUJYtTHLymuag+2u/Ab7Ww4xkEaJs06yqMZr1
Z6SFZ9aTZwSL8KCeLSU1
-----END EC PRIVATE KEY-----

View File

@ -1,50 +0,0 @@
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 2 (0x2)
Signature Algorithm: ecdsa-with-SHA1
Issuer: C=JP, ST=KYOTO, L=KYOTO, O=NINTENDO, OU=RED, CN=CTR/emailAddress=ctr_admin@nintendo.co.jp
Validity
Not Before: Nov 19 09:19:06 2009 GMT
Not After : Nov 17 09:19:06 2019 GMT
Subject: C=JP, ST=OKAYAMA, L=ODA, O=SHARP, OU=TAKAYA, CN=HSM/emailAddress=admin@sharp.co.jp
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (233 bit)
pub:
04:01:b3:a1:96:8b:60:29:fe:b9:18:86:89:82:4c:
92:d8:98:0d:d8:f3:8f:6a:68:8e:f5:93:f2:4f:5a:
d4:01:5a:02:86:1f:cd:e1:37:7b:1b:5e:47:b2:f9:
8f:f5:85:a3:ae:e2:4a:51:28:22:2d:1a:82:6e:91:
96
ASN1 OID: sect233r1
X509v3 extensions:
X509v3 Basic Constraints:
CA:FALSE
Netscape Comment:
OpenSSL Generated Certificate
X509v3 Subject Key Identifier:
6F:90:5B:FE:66:6D:4D:4B:B1:6D:3F:CC:64:1A:26:BF:8F:5D:1D:1B
X509v3 Authority Key Identifier:
keyid:71:C3:EC:E7:2A:49:31:38:31:5B:7B:76:9D:2E:10:03:FE:19:78:4C
Signature Algorithm: ecdsa-with-SHA1
30:3f:02:1d:2d:13:94:04:c0:cc:57:48:fe:73:b8:c0:25:88:
92:9b:27:ec:ba:fc:cb:bd:e6:40:87:91:4d:7b:1f:02:1e:00:
94:a0:7b:72:a0:72:e3:87:fd:3d:d1:9b:db:18:87:5b:54:24:
3a:f5:48:7e:9c:86:ad:89:69:bf:fa
-----BEGIN CERTIFICATE-----
MIICXzCCAgygAwIBAgIBAjAJBgcqhkjOPQQBMIGFMQswCQYDVQQGEwJKUDEOMAwG
A1UECAwFS1lPVE8xDjAMBgNVBAcMBUtZT1RPMREwDwYDVQQKDAhOSU5URU5ETzEM
MAoGA1UECwwDUkVEMQwwCgYDVQQDDANDVFIxJzAlBgkqhkiG9w0BCQEWGGN0cl9h
ZG1pbkBuaW50ZW5kby5jby5qcDAeFw0wOTExMTkwOTE5MDZaFw0xOTExMTcwOTE5
MDZaMH4xCzAJBgNVBAYTAkpQMRAwDgYDVQQIDAdPS0FZQU1BMQwwCgYDVQQHDANP
REExDjAMBgNVBAoMBVNIQVJQMQ8wDQYDVQQLDAZUQUtBWUExDDAKBgNVBAMMA0hT
TTEgMB4GCSqGSIb3DQEJARYRYWRtaW5Ac2hhcnAuY28uanAwUjAQBgcqhkjOPQIB
BgUrgQQAGwM+AAQBs6GWi2Ap/rkYhomCTJLYmA3Y849qaI71k/JPWtQBWgKGH83h
N3sbXkey+Y/1haOu4kpRKCItGoJukZajezB5MAkGA1UdEwQCMAAwLAYJYIZIAYb4
QgENBB8WHU9wZW5TU0wgR2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBRv
kFv+Zm1NS7FtP8xkGia/j10dGzAfBgNVHSMEGDAWgBRxw+znKkkxODFbe3adLhAD
/hl4TDAJBgcqhkjOPQQBA0IAMD8CHS0TlATAzFdI/nO4wCWIkpsn7Lr8y73mQIeR
TXsfAh4AlKB7cqBy44f9PdGb2xiHW1QkOvVIfpyGrYlpv/o=
-----END CERTIFICATE-----

View File

@ -1,9 +0,0 @@
-----BEGIN CERTIFICATE REQUEST-----
MIIBKjCB2QIBADB+MQswCQYDVQQGEwJKUDEQMA4GA1UECAwHT0tBWUFNQTEMMAoG
A1UEBwwDT0RBMQ4wDAYDVQQKDAVTSEFSUDEPMA0GA1UECwwGVEFLQVlBMQwwCgYD
VQQDDANIU00xIDAeBgkqhkiG9w0BCQEWEWFkbWluQHNoYXJwLmNvLmpwMFIwEAYH
KoZIzj0CAQYFK4EEABsDPgAEAbOhlotgKf65GIaJgkyS2JgN2POPamiO9ZPyT1rU
AVoChh/N4Td7G15HsvmP9YWjruJKUSgiLRqCbpGWoAAwCQYHKoZIzj0EAQNBADA+
Ah1hHULgGMJQ9thR6xIXnKnf7MRoL+8MM+7IiytapwIdE4cmzuPZRQ1TohuAI4zZ
seqaK/9grU1rWEcDZT0=
-----END CERTIFICATE REQUEST-----

View File

@ -1,8 +0,0 @@
-----BEGIN EC PARAMETERS-----
BgUrgQQAGw==
-----END EC PARAMETERS-----
-----BEGIN EC PRIVATE KEY-----
MG0CAQEEHeionsNFKvOye5ZdTN7DgNma1Hecm5/085LBPsdVoAcGBSuBBAAboUAD
PgAEAbOhlotgKf65GIaJgkyS2JgN2POPamiO9ZPyT1rUAVoChh/N4Td7G15HsvmP
9YWjruJKUSgiLRqCbpGW
-----END EC PRIVATE KEY-----

View File

@ -1,4 +0,0 @@
-----BEGIN PUBLIC KEY-----
MFIwEAYHKoZIzj0CAQYFK4EEABsDPgAEAbOhlotgKf65GIaJgkyS2JgN2POPamiO
9ZPyT1rUAVoChh/N4Td7G15HsvmP9YWjruJKUSgiLRqCbpGW
-----END PUBLIC KEY-----

View File

@ -1,4 +0,0 @@
-----BEGIN PUBLIC KEY-----
MFIwEAYHKoZIzj0CAQYFK4EEABsDPgAEANkB/eVVYNkyMyWTUwq6Y6MUUJYtTHLy
muag+2u/Ab7Ww4xkEaJs06yqMZr1Z6SFZ9aTZwSL8KCeLSU1
-----END PUBLIC KEY-----

1
realKey/dev/eFuse_iv.bin Normal file
View File

@ -0,0 +1 @@
eMHë{ôéÜ<C3A9>:°˙<C2B0>D

BIN
realKey/prod/NCT2_pub.der Normal file

Binary file not shown.

View File

@ -0,0 +1 @@
<EFBFBD><EFBFBD><EFBFBD><1D><>L<EFBFBD>C<EFBFBD>k4m<34><6D><EFBFBD>