mirror of
https://github.com/rvtr/ctr_eFuse.git
synced 2025-11-02 00:11:04 -04:00
・ツリーの整理。
dummyCA, rsakeyフォルダの削除。 realKeyフォルダを追加し、AESのIVとECDSAのpublicKeyは、USE_HSM時にも組み込むようにする。 但し、現時点ではデバッグの都合上、realKeyフォルダ内の鍵は、dummyKeyフォルダと同じものにしておく。 ・ツリー内から"Nintendo"の表記を出来る限り削除。 issuerNameは、0x5aでXORマスクしたものをソース上に置いておく。 ・USE_HSMの場合でも、AESのIVをファイルから読み込んで使用するようにする。 git-svn-id: file:///Volumes/Transfer/gigaleak_20231201/2020-09-30%20-%20paladin.7z/paladin/ctr_eFuse@134 ff987cc8-cf2f-4642-8568-d52cce064691
This commit is contained in:
parent
fe7a885611
commit
ae1edae695
31
Makefile
31
Makefile
@ -66,8 +66,8 @@ ifeq ($(USE_DUMMY_KEY),TRUE)
|
||||
DEV_DER_KEY_DIR = ./dummyKey/dev
|
||||
PROD_DER_KEY_DIR = ./dummyKey/prod
|
||||
else # !USE_DUMMY_KEY
|
||||
DEV_DER_KEY_DIR = /cygdrive/w/CTR/dev
|
||||
PROD_DER_KEY_DIR = /cygdrive/w/CTR/prod
|
||||
DEV_DER_KEY_DIR = ./realKey/dev
|
||||
PROD_DER_KEY_DIR = ./realKey/prod
|
||||
endif # USE_DUMMY_KEY
|
||||
|
||||
PACKAGE_DIR = ./package
|
||||
@ -76,12 +76,19 @@ OPENSSL_DIR = ./openssl-0.9.8k
|
||||
|
||||
TARGET = gen_id
|
||||
|
||||
KEYS_C = cr_eFuse_privKey_prod.c cr_eFuse_pubKey_prod.c \
|
||||
cr_eFuse_privKey_dev.c cr_eFuse_pubKey_dev.c \
|
||||
cr_eFuse_aesKey_prod.c cr_eFuse_iv_prod.c \
|
||||
cr_eFuse_aesKey_dev.c cr_eFuse_iv_dev.c \
|
||||
cr_NintendoCTR2_priv_dummy_prod.c cr_NintendoCTR2_pub_dummy_prod.c \
|
||||
cr_NintendoCTR2_priv_dummy_dev.c cr_NintendoCTR2_pub_dummy_dev.c
|
||||
KEYS_C = cr_eFuse_iv_prod.c \
|
||||
cr_eFuse_iv_dev.c \
|
||||
cr_NCT2_pub_prod.c \
|
||||
cr_NCT2_pub_dev.c
|
||||
|
||||
ifeq ($(USE_DUMMY_KEY),TRUE)
|
||||
KEYS_C += cr_eFuse_privKey_prod.c cr_eFuse_pubKey_prod.c \
|
||||
cr_eFuse_privKey_dev.c cr_eFuse_pubKey_dev.c \
|
||||
cr_eFuse_aesKey_prod.c \
|
||||
cr_eFuse_aesKey_dev.c \
|
||||
cr_NCT2_priv_prod.c \
|
||||
cr_NCT2_priv_dev.c
|
||||
endif # USE_DUMMY_KEY
|
||||
|
||||
SRCS = main.c cr_generate_id.c cr_id_util.c cr_keyPair.c \
|
||||
cr_device_cert.c cr_enc_id.c cr_alloc.c \
|
||||
@ -155,10 +162,10 @@ cr_eFuse_aesKey_prod.c : $(PROD_DER_KEY_DIR)/eFuse_aesKey.bin
|
||||
cr_eFuse_iv_prod.c : $(PROD_DER_KEY_DIR)/eFuse_iv.bin
|
||||
perl tools/bin2c.plx $< prod
|
||||
|
||||
cr_NintendoCTR2_priv_dummy_prod.c : $(PROD_DER_KEY_DIR)/NintendoCTR2_priv_dummy.der
|
||||
cr_NCT2_priv_prod.c : $(PROD_DER_KEY_DIR)/NCT2_priv.der
|
||||
perl tools/bin2c.plx $< prod
|
||||
|
||||
cr_NintendoCTR2_pub_dummy_prod.c : $(PROD_DER_KEY_DIR)/NintendoCTR2_pub_dummy.der
|
||||
cr_NCT2_pub_prod.c : $(PROD_DER_KEY_DIR)/NCT2_pub.der
|
||||
perl tools/bin2c.plx $< prod
|
||||
|
||||
|
||||
@ -174,10 +181,10 @@ cr_eFuse_aesKey_dev.c : $(DEV_DER_KEY_DIR)/eFuse_aesKey.bin
|
||||
cr_eFuse_iv_dev.c : $(DEV_DER_KEY_DIR)/eFuse_iv.bin
|
||||
perl tools/bin2c.plx $< dev
|
||||
|
||||
cr_NintendoCTR2_priv_dummy_dev.c : $(DEV_DER_KEY_DIR)/NintendoCTR2_priv_dummy.der
|
||||
cr_NCT2_priv_dev.c : $(DEV_DER_KEY_DIR)/NCT2_priv.der
|
||||
perl tools/bin2c.plx $< dev
|
||||
|
||||
cr_NintendoCTR2_pub_dummy_dev.c : $(DEV_DER_KEY_DIR)/NintendoCTR2_pub_dummy.der
|
||||
cr_NCT2_pub_dev.c : $(DEV_DER_KEY_DIR)/NCT2_pub.der
|
||||
perl tools/bin2c.plx $< dev
|
||||
|
||||
|
||||
|
||||
@ -130,12 +130,12 @@
|
||||
#include <openssl/sha.h>
|
||||
#include <openssl/ec.h>
|
||||
#include <openssl/ecdsa.h>
|
||||
#include "cr_NintendoCTR2_priv_dummy_dev.c"
|
||||
#include "cr_NintendoCTR2_priv_dummy_prod.c"
|
||||
#include "cr_NCT2_priv_dev.c"
|
||||
#include "cr_NCT2_priv_prod.c"
|
||||
#endif // USE_HSM
|
||||
|
||||
#include "cr_NintendoCTR2_pub_dummy_dev.c"
|
||||
#include "cr_NintendoCTR2_pub_dummy_prod.c"
|
||||
#include "cr_NCT2_pub_dev.c"
|
||||
#include "cr_NCT2_pub_prod.c"
|
||||
|
||||
#include "cr_generate_id.h"
|
||||
#include "cr_generate_id_private.h"
|
||||
@ -159,8 +159,11 @@ typedef struct CR_DeviceCert
|
||||
u8 padding1 [ 60 ]; // 0x144 - 0x17F : zero-filled
|
||||
} CR_DeviceCert;
|
||||
|
||||
const char *issuerNameDev = "NintendoCA - G2_NintendoCTR2dev";
|
||||
const char *issuerNameProd = "NintendoCA - G2_NintendoCTR2prod";
|
||||
const u8 issuerName[] = {
|
||||
0x14, 0x33, 0x34, 0x2E, 0x3F, 0x34, 0x3E, 0x35,
|
||||
0x19, 0x1B, 0x7A, 0x77, 0x7A, 0x1D, 0x68, 0x05,
|
||||
0x14, 0x33, 0x34, 0x2E, 0x3F, 0x34, 0x3E, 0x35,
|
||||
0x19, 0x0E, 0x08, 0x68 };
|
||||
|
||||
static void BN2BinWithPadding( BIGNUM *pBn, u8 *pDst, int dstLen );
|
||||
|
||||
@ -170,7 +173,8 @@ int GenerateCTRDeviceCert( EC_KEY *pECkey, u32 device_id, u8 bonding_option, u8
|
||||
{
|
||||
int ret_code = CR_GENID_SUCCESS;
|
||||
CR_DeviceCert deviceCert;
|
||||
EC_KEY *NintendoCTR2 = NULL;
|
||||
EC_KEY *NCT2 = NULL;
|
||||
int i;
|
||||
|
||||
#ifdef DEBUG_PRINT
|
||||
if ( sizeof( CR_DeviceCert ) > 384 )
|
||||
@ -188,9 +192,10 @@ int GenerateCTRDeviceCert( EC_KEY *pECkey, u32 device_id, u8 bonding_option, u8
|
||||
deviceCert.sigType[3] = 0x05;
|
||||
|
||||
// issuerName
|
||||
memcpy( deviceCert.issuerName,
|
||||
bonding_option ? issuerNameDev : issuerNameProd,
|
||||
bonding_option ? strlen( issuerNameDev ) : strlen( issuerNameProd ) );
|
||||
for( i = 0; i < sizeof(issuerName); i++ ) {
|
||||
deviceCert.issuerName[ i ] = issuerName[ i ] ^ 0x5a;
|
||||
}
|
||||
sprintf( &deviceCert.issuerName[ sizeof(issuerName) ], "%s", bonding_option ? "dev" : "prod" );
|
||||
|
||||
// keyType 0x00000002 ECC233
|
||||
deviceCert.keyType[0] = 0x00;
|
||||
@ -244,20 +249,20 @@ int GenerateCTRDeviceCert( EC_KEY *pECkey, u32 device_id, u8 bonding_option, u8
|
||||
// DERフォーマットのECC鍵を読み込み
|
||||
{
|
||||
// bonding_option によって、鍵を差し替え
|
||||
const unsigned char *der_priv = bonding_option ? cr_NintendoCTR2_priv_dummy_dev : cr_NintendoCTR2_priv_dummy_prod;
|
||||
const unsigned char *der_priv = bonding_option ? cr_NCT2_priv_dev : cr_NCT2_priv_prod;
|
||||
int priv_len = der_priv[ 8 ] | der_priv[ 9 ] << 8; // KEY長を取り出し
|
||||
der_priv += 0x10; // ヘッダ部分を除外してKEY実体を指定
|
||||
|
||||
// ECCは、秘密鍵のみで公開鍵成分もセットされるようなので、公開鍵は読み込まない。
|
||||
NintendoCTR2 = d2i_ECPrivateKey( NULL, &der_priv, priv_len );
|
||||
if( NintendoCTR2 == NULL ) {
|
||||
NCT2 = d2i_ECPrivateKey( NULL, &der_priv, priv_len );
|
||||
if( NCT2 == NULL ) {
|
||||
ret_code = CR_GENID_ERROR_ECC_READ_PRIVATE_KEY;
|
||||
goto end;
|
||||
}
|
||||
#if 0
|
||||
DEBUG_PRINT_ARRAY( "EC priv:", (const char *)NintendoCTR2->priv_key->d, NintendoCTR2->priv_key->dmax * 4);
|
||||
DEBUG_PRINT_ARRAY( "EC pub.X:", (const char *)NintendoCTR2->pub_key->X.d, NintendoCTR2->pub_key->X.dmax * 4 );
|
||||
DEBUG_PRINT_ARRAY( "EC pub.Y:", (const char *)NintendoCTR2->pub_key->Y.d, NintendoCTR2->pub_key->Y.dmax * 4 );
|
||||
DEBUG_PRINT_ARRAY( "EC priv:", (const char *)NCT2->priv_key->d, NCT2->priv_key->dmax * 4);
|
||||
DEBUG_PRINT_ARRAY( "EC pub.X:", (const char *)NCT2->pub_key->X.d, NCT2->pub_key->X.dmax * 4 );
|
||||
DEBUG_PRINT_ARRAY( "EC pub.Y:", (const char *)NCT2->pub_key->Y.d, NCT2->pub_key->Y.dmax * 4 );
|
||||
#endif
|
||||
}
|
||||
// ECDSA署名付加
|
||||
@ -274,7 +279,7 @@ int GenerateCTRDeviceCert( EC_KEY *pECkey, u32 device_id, u8 bonding_option, u8
|
||||
|
||||
// 上位232bit分で署名
|
||||
memset( ecdsasig, 0, sizeof(ecdsasig) );
|
||||
test_ret = ECDSA_sign( 0, sha256buf, 233/8, ecdsasig, &signLen, NintendoCTR2 );
|
||||
test_ret = ECDSA_sign( 0, sha256buf, 233/8, ecdsasig, &signLen, NCT2 );
|
||||
if (test_ret == 0) {
|
||||
ret_code = CR_GENID_ERROR_ECDSA_SIGN;
|
||||
SetErrorInfo( __FUNCTION__, __LINE__ );
|
||||
@ -284,7 +289,7 @@ int GenerateCTRDeviceCert( EC_KEY *pECkey, u32 device_id, u8 bonding_option, u8
|
||||
|
||||
#if 0
|
||||
// 署名ベリファイ
|
||||
ret_code = ECDSA_verify( 0, sha1buf, 20, tempSign, 66, NintendoCTR2 );
|
||||
ret_code = ECDSA_verify( 0, sha1buf, 20, tempSign, 66, NCT2 );
|
||||
if( ret_code != 1) {
|
||||
ret_code = CR_GENID_ERROR_ECDSA_VERIFY;
|
||||
SetErrorInfo( __FUNCTION__, __LINE__ );
|
||||
@ -308,8 +313,8 @@ int GenerateCTRDeviceCert( EC_KEY *pECkey, u32 device_id, u8 bonding_option, u8
|
||||
BN2BinWithPadding( sig->s, &deviceCert.eccSignature[ 30 ], 30 );
|
||||
memcpy( pDevCertSign, &deviceCert.eccSignature, 60 );
|
||||
if( sig ) ECDSA_SIG_free( sig );
|
||||
if( NintendoCTR2 ) EC_KEY_free( NintendoCTR2 );
|
||||
NintendoCTR2 = NULL;
|
||||
if( NCT2 ) EC_KEY_free( NCT2 );
|
||||
NCT2 = NULL;
|
||||
|
||||
#ifdef DEBUG_DEVICE_CERT_OUTPUT_FILE
|
||||
DebugFileOutput( device_id, "dgst", sha256buf, 233/8 );
|
||||
@ -321,7 +326,7 @@ int GenerateCTRDeviceCert( EC_KEY *pECkey, u32 device_id, u8 bonding_option, u8
|
||||
// ECDSA署名検証
|
||||
{
|
||||
// bonding_option によって、鍵を差し替え
|
||||
const unsigned char *der_pub = bonding_option ? cr_NintendoCTR2_pub_dummy_dev : cr_NintendoCTR2_pub_dummy_prod;
|
||||
const unsigned char *der_pub = bonding_option ? cr_NCT2_pub_dev : cr_NCT2_pub_prod;
|
||||
int pub_len = der_pub[ 8 ] | der_pub[ 9 ] << 8; // KEY長を取り出し
|
||||
der_pub += 0x10; // ヘッダ部分を除外してKEY実体を指定
|
||||
|
||||
@ -330,13 +335,13 @@ int GenerateCTRDeviceCert( EC_KEY *pECkey, u32 device_id, u8 bonding_option, u8
|
||||
der_pub += 0x17;
|
||||
|
||||
// ECC公開鍵の読み込み
|
||||
NintendoCTR2 = EC_KEY_new_by_curve_name( NID_sect233r1 );
|
||||
if( NintendoCTR2 == NULL ) {
|
||||
NCT2 = EC_KEY_new_by_curve_name( NID_sect233r1 );
|
||||
if( NCT2 == NULL ) {
|
||||
SetErrorInfo( __FUNCTION__, __LINE__ );
|
||||
ret_code = CR_GENID_ERROR_ECC_KEY_NEW;
|
||||
goto end;
|
||||
}
|
||||
if( o2i_ECPublicKey( &NintendoCTR2, &der_pub, pub_len ) == NULL ) {
|
||||
if( o2i_ECPublicKey( &NCT2, &der_pub, pub_len ) == NULL ) {
|
||||
SetErrorInfo( __FUNCTION__, __LINE__ );
|
||||
ret_code = CR_GENID_ERROR_ECC_READ_PUBLIC_KEY;
|
||||
goto end;
|
||||
@ -345,7 +350,7 @@ int GenerateCTRDeviceCert( EC_KEY *pECkey, u32 device_id, u8 bonding_option, u8
|
||||
// TODO: ハッシュ処理
|
||||
// TODO: ECDSA署名(DER)を再構築
|
||||
// 署名ベリファイ
|
||||
ret_code = ECDSA_verify( 0, sha1Buf, 20, signBuf, signLen, NintendoCTR2 );
|
||||
ret_code = ECDSA_verify( 0, sha1Buf, 20, signBuf, signLen, NCT2 );
|
||||
if( ret_code != 1) {
|
||||
ret_code = CR_GENID_ERROR_ECDSA_VERIFY;
|
||||
SetErrorInfo( __FUNCTION__, __LINE__ );
|
||||
@ -388,7 +393,7 @@ int GenerateCTRDeviceCert( EC_KEY *pECkey, u32 device_id, u8 bonding_option, u8
|
||||
#endif // dump deviceCert
|
||||
|
||||
end:
|
||||
if( NintendoCTR2 ) EC_KEY_free( NintendoCTR2 );
|
||||
if( NCT2 ) EC_KEY_free( NCT2 );
|
||||
|
||||
return ret_code;
|
||||
} // generate_CTRCustom_deviceCert
|
||||
|
||||
10
cr_enc_id.c
10
cr_enc_id.c
@ -132,14 +132,15 @@
|
||||
#include "cr_eFuse_pubKey_prod.c"
|
||||
|
||||
#include "cr_eFuse_aesKey_dev.c"
|
||||
#include "cr_eFuse_iv_dev.c"
|
||||
#include "cr_eFuse_aesKey_prod.c"
|
||||
#include "cr_eFuse_iv_prod.c"
|
||||
|
||||
extern RSA *d2i_RSA_PUBKEY(RSA **a, const unsigned char **pp, long length);
|
||||
|
||||
#endif // USE_HSM
|
||||
|
||||
#include "cr_eFuse_iv_dev.c"
|
||||
#include "cr_eFuse_iv_prod.c"
|
||||
|
||||
#ifdef ENCRYPT_AES
|
||||
static int crypto_aes_enc_dec( unsigned char *dst_buf,unsigned char *org_buf, u8 bonding_option );
|
||||
#else // !ENCRYPT_AES
|
||||
@ -171,9 +172,10 @@ int crypto_aes_enc_dec( unsigned char *dst_buf, unsigned char *org_buf, u8 bondi
|
||||
{
|
||||
int i;
|
||||
int ret_code = CR_GENID_SUCCESS;
|
||||
char *pIV = (char *)( bonding_option ? cr_eFuse_iv_dev : cr_eFuse_iv_prod ) + 0x10;
|
||||
|
||||
// encrypt
|
||||
ret_code = hsm_aes_encrypt( local_buf_1, org_buf, CR_ID_BUF_SIZE, bonding_option );
|
||||
ret_code = hsm_aes_encrypt( local_buf_1, org_buf, CR_ID_BUF_SIZE, bonding_option, pIV );
|
||||
if ( ret_code != CR_GENID_SUCCESS )
|
||||
{
|
||||
SetErrorInfo( __FUNCTION__, __LINE__ );
|
||||
@ -181,7 +183,7 @@ int crypto_aes_enc_dec( unsigned char *dst_buf, unsigned char *org_buf, u8 bondi
|
||||
}
|
||||
|
||||
// decyrpt
|
||||
ret_code = hsm_aes_decrypt( local_buf_2, local_buf_1, CR_ID_BUF_SIZE, bonding_option );
|
||||
ret_code = hsm_aes_decrypt( local_buf_2, local_buf_1, CR_ID_BUF_SIZE, bonding_option, pIV );
|
||||
if ( ret_code != CR_GENID_SUCCESS )
|
||||
{
|
||||
SetErrorInfo( __FUNCTION__, __LINE__ );
|
||||
|
||||
@ -137,7 +137,7 @@ typedef unsigned long long u64;
|
||||
ID2 = device_id[ 3 ] | ( device_id[ 4 ] << 32 )
|
||||
*/
|
||||
|
||||
// Nintendo ID Žd—l
|
||||
// eFuseID Žd—l
|
||||
#define CR_ID0_BIT_NUM 32
|
||||
#define CR_ID1_BIT_NUM 34
|
||||
#define CR_ID2_BIT_NUM 64
|
||||
|
||||
@ -137,12 +137,14 @@ NFKM_WorldInfo *hsmWorld = NULL; // allocate
|
||||
// TODO: <20>Å<EFBFBD>IŒ®‚É•Ï<E280A2>X‚·‚é
|
||||
#ifdef ENCRYPT_AES
|
||||
M_KeyID hsmAesKeyidDev, hsmAesKeyidProd;
|
||||
// TODO : 最終的な鍵の名前を決める "efuse-aes-dev, efuse-aes-prod"
|
||||
const NFKM_KeyIdent hsmAesKeyidentDev = { (char*)"simple", (char*)"efuse-aes-key-dummy-dev" };
|
||||
const NFKM_KeyIdent hsmAesKeyidentProd = { (char*)"simple", (char*)"efuse-aes-key-dummy-prod" };
|
||||
|
||||
static int hsm_aes_load_key( NFKM_KeyIdent keyident, M_KeyID *keyid );
|
||||
#else // !ENCRYPT_AES
|
||||
M_KeyID hsmRsaPrivkeyidDev, hsmRsaPubkeyidDev, hsmRsaPrivkeyidProd, hsmRsaPubkeyidProd;
|
||||
// TODO : 最終的な鍵の名前を決める "efuse-rsa-priv-dev, efuse-rsa-priv-prod"
|
||||
const NFKM_KeyIdent hsmRsaKeyidentDev = { (char*)"simple", (char*)"rsa-dummykeypair-dev" };
|
||||
const NFKM_KeyIdent hsmRsaKeyidentProd = { (char*)"simple", (char*)"rsa-dummykeypair-prod" };
|
||||
|
||||
@ -153,6 +155,7 @@ static int hsm_rsa_load_keypair( NFKM_KeyIdent keyident, M_KeyID *privKeyid, M_K
|
||||
M_KeyID hsmEcdsaPrivkeyidDev, hsmEcdsaPubkeyidDev;
|
||||
M_KeyID hsmEcdsaPrivkeyidProd, hsmEcdsaPubkeyidProd;
|
||||
|
||||
// TODO : 最終的な鍵の名前を決める "nct2-priv-dev, nct2-priv-prod", 公開鍵は入れない
|
||||
const NFKM_KeyIdent hsmEcdsaPrivkeyidentDev = { (char*)"simple", (char*)"nintendo-ctr2-priv-dummy-dev" };
|
||||
const NFKM_KeyIdent hsmEcdsaPubkeyidentDev = { (char*)"simple", (char*)"nintendo-ctr2-pub-dummy-dev" };
|
||||
const NFKM_KeyIdent hsmEcdsaPrivkeyidentProd = { (char*)"simple", (char*)"nintendo-ctr2-priv-dummy-prod" };
|
||||
@ -486,7 +489,7 @@ end:
|
||||
return ret_code;
|
||||
} // hsm_aes_load_key
|
||||
|
||||
int hsm_aes_encrypt( unsigned char *dst_buf, unsigned char *org_buf, int size, u8 bonding_option )
|
||||
int hsm_aes_encrypt( unsigned char *dst_buf, unsigned char *org_buf, int size, u8 bonding_option, u8 *pIV )
|
||||
{
|
||||
int ret_code = CR_GENID_SUCCESS;
|
||||
|
||||
@ -503,7 +506,7 @@ int hsm_aes_encrypt( unsigned char *dst_buf, unsigned char *org_buf, int size, u
|
||||
|
||||
// iv set
|
||||
enc_iv.mech = Mech_RijndaelmCBCpNONE;
|
||||
memset( enc_iv.iv.generic128.iv.bytes, 0, sizeof( enc_iv.iv.generic128.iv.bytes ) );
|
||||
memcpy( enc_iv.iv.generic128.iv.bytes, pIV, sizeof( enc_iv.iv.generic128.iv.bytes ) );
|
||||
|
||||
// encrypt command set
|
||||
cmd.cmd = Cmd_Encrypt;
|
||||
@ -538,7 +541,7 @@ int hsm_aes_encrypt( unsigned char *dst_buf, unsigned char *org_buf, int size, u
|
||||
return CR_GENID_SUCCESS;
|
||||
} // hsm_aes_encrypt
|
||||
|
||||
int hsm_aes_decrypt( unsigned char *dst_buf, unsigned char *org_buf, int size, u8 bonding_option )
|
||||
int hsm_aes_decrypt( unsigned char *dst_buf, unsigned char *org_buf, int size, u8 bonding_option, u8 *pIV )
|
||||
{
|
||||
int ret_code = CR_GENID_SUCCESS;
|
||||
|
||||
@ -555,7 +558,7 @@ int hsm_aes_decrypt( unsigned char *dst_buf, unsigned char *org_buf, int size, u
|
||||
|
||||
// iv set
|
||||
dec_iv.mech = Mech_RijndaelmCBCpNONE;
|
||||
memset( dec_iv.iv.generic128.iv.bytes, 0, sizeof( dec_iv.iv.generic128.iv.bytes ) );
|
||||
memcpy( dec_iv.iv.generic128.iv.bytes, pIV, sizeof( dec_iv.iv.generic128.iv.bytes ) );
|
||||
|
||||
// decyrpt
|
||||
cmd.cmd = Cmd_Decrypt;
|
||||
|
||||
@ -128,8 +128,8 @@ int hsm_finalize( void );
|
||||
int hsm_reset_module( void );
|
||||
int hsm_generate_random( unsigned char *buf, int bytes );
|
||||
int hsm_get_rtc( time_t *time );
|
||||
int hsm_aes_encrypt( unsigned char *dst_buf, unsigned char *org_buf, int size, unsigned char bonding_option );
|
||||
int hsm_aes_decrypt( unsigned char *dst_buf, unsigned char *org_buf, int size, unsigned char bonding_option );
|
||||
int hsm_aes_encrypt( unsigned char *dst_buf, unsigned char *org_buf, int size, unsigned char bonding_option, unsigned char *pIV );
|
||||
int hsm_aes_decrypt( unsigned char *dst_buf, unsigned char *org_buf, int size, unsigned char bonding_option, unsigned char *pIV );
|
||||
int hsm_rsa_encrypt( unsigned char *dst_buf, unsigned char *org_buf, int size, unsigned char bonding_option );
|
||||
int hsm_rsa_decrypt( unsigned char *dst_buf, unsigned char *org_buf, int size, unsigned char bonding_option );
|
||||
int hsm_ecdsa_sign( unsigned char *sign_buf, int *sign_size, unsigned char *data_buf, int data_size, unsigned char bonding_option );
|
||||
|
||||
@ -1,83 +0,0 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 0 (0x0)
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
Issuer: C=US, ST=WA, O=NINTENDO_OF_AMERICA, OU=SYSTEM, CN=ALL-PLATFORM/emailAddress=admin@nintendo.co.jp
|
||||
Validity
|
||||
Not Before: Nov 19 08:58:03 2009 GMT
|
||||
Not After : Nov 17 08:58:03 2019 GMT
|
||||
Subject: C=US, ST=WA, O=NINTENDO_OF_AMERICA, OU=SYSTEM, CN=ALL-PLATFORM/emailAddress=admin@nintendo.co.jp
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:b7:b9:5f:4b:d5:c8:d6:9c:04:05:0c:d3:64:b9:
|
||||
94:75:1e:08:6e:71:ee:86:9b:95:05:09:57:d4:2a:
|
||||
40:41:1c:ce:b3:5d:f9:2f:29:ef:13:1e:a2:d0:11:
|
||||
67:18:cc:a2:69:dd:eb:ce:90:d7:48:8b:60:0a:b9:
|
||||
eb:32:ae:03:38:de:dc:4a:a6:83:1d:54:0c:73:50:
|
||||
32:97:cb:72:1d:7d:07:a8:a4:3d:ed:a7:6e:91:01:
|
||||
bc:f4:97:d9:ae:22:33:30:2b:05:d7:f4:a7:11:0c:
|
||||
be:f5:e5:fb:81:b3:7c:d3:87:22:cd:85:2b:0e:fb:
|
||||
7f:1e:7a:c4:65:0c:1e:6a:27:c5:24:e4:2a:da:c7:
|
||||
64:b0:b7:1d:72:0d:1c:cd:d7:85:f2:74:3a:c1:ba:
|
||||
03:49:06:43:95:f8:c9:48:e8:0f:7c:ca:1a:c5:d7:
|
||||
a3:22:75:ff:7f:29:91:b8:aa:65:30:d1:19:18:7e:
|
||||
08:e1:a0:4a:54:f0:bc:42:89:f6:7a:81:c5:83:c5:
|
||||
78:28:b1:d7:9c:7e:69:78:09:14:12:75:13:62:ef:
|
||||
4b:d9:76:e3:29:9a:6b:35:e4:53:b8:14:4f:8b:93:
|
||||
9c:7b:21:8e:f0:5a:04:b3:04:3f:6a:f0:96:1a:e2:
|
||||
99:42:51:e0:e5:6f:13:d0:f9:86:5e:80:c6:31:21:
|
||||
47:6f
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
OpenSSL Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
C7:3D:11:8F:6F:EB:10:5C:CE:C4:CE:04:79:BF:61:E9:70:E0:58:B2
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:C7:3D:11:8F:6F:EB:10:5C:CE:C4:CE:04:79:BF:61:E9:70:E0:58:B2
|
||||
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
02:56:8e:4c:e2:bb:c7:2c:3a:16:ef:26:c7:11:fa:1c:a5:fc:
|
||||
a8:a3:be:7a:0b:d7:e1:32:77:b9:c5:0a:1a:d8:74:6e:f6:42:
|
||||
3e:c2:ae:60:94:57:6a:d6:4d:56:cd:3e:82:21:4f:e1:53:95:
|
||||
a0:83:e1:24:10:57:ac:89:53:6f:45:9e:85:04:a2:47:1f:e9:
|
||||
85:01:3b:8e:f5:77:ae:66:93:49:90:53:5f:12:10:c3:14:b9:
|
||||
9b:f3:b9:02:54:60:c6:da:48:db:a1:23:9b:ae:9d:42:30:96:
|
||||
af:b5:b2:23:5a:e0:33:89:51:db:f1:6b:a8:10:57:d6:f9:5d:
|
||||
fb:d9:ec:29:92:8a:3b:e8:6d:e2:ae:a6:8d:3c:a1:bd:09:92:
|
||||
3e:d2:05:e4:c0:54:b7:49:92:03:c8:4b:9b:d5:66:91:04:41:
|
||||
dd:65:dd:32:b9:00:f7:54:0e:a0:71:74:33:30:76:4b:59:34:
|
||||
7d:58:59:c7:65:69:3b:72:91:8f:ba:1b:a2:8b:2e:d5:fe:b0:
|
||||
64:2d:f3:ae:ae:76:76:21:a1:c0:a3:53:a6:93:62:99:e2:22:
|
||||
fc:80:aa:d2:a6:2f:6f:03:28:6d:01:66:40:7d:36:0e:05:ca:
|
||||
06:09:4b:6d:7a:42:a9:57:85:80:50:f1:21:cd:df:47:e2:49:
|
||||
73:9d:12:ca
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIEAjCCAuqgAwIBAgIBADANBgkqhkiG9w0BAQUFADCBhTELMAkGA1UEBhMCVVMx
|
||||
CzAJBgNVBAgMAldBMRwwGgYDVQQKDBNOSU5URU5ET19PRl9BTUVSSUNBMQ8wDQYD
|
||||
VQQLDAZTWVNURU0xFTATBgNVBAMMDEFMTC1QTEFURk9STTEjMCEGCSqGSIb3DQEJ
|
||||
ARYUYWRtaW5AbmludGVuZG8uY28uanAwHhcNMDkxMTE5MDg1ODAzWhcNMTkxMTE3
|
||||
MDg1ODAzWjCBhTELMAkGA1UEBhMCVVMxCzAJBgNVBAgMAldBMRwwGgYDVQQKDBNO
|
||||
SU5URU5ET19PRl9BTUVSSUNBMQ8wDQYDVQQLDAZTWVNURU0xFTATBgNVBAMMDEFM
|
||||
TC1QTEFURk9STTEjMCEGCSqGSIb3DQEJARYUYWRtaW5AbmludGVuZG8uY28uanAw
|
||||
ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC3uV9L1cjWnAQFDNNkuZR1
|
||||
Hghuce6Gm5UFCVfUKkBBHM6zXfkvKe8THqLQEWcYzKJp3evOkNdIi2AKuesyrgM4
|
||||
3txKpoMdVAxzUDKXy3IdfQeopD3tp26RAbz0l9muIjMwKwXX9KcRDL715fuBs3zT
|
||||
hyLNhSsO+38eesRlDB5qJ8Uk5Crax2Swtx1yDRzN14XydDrBugNJBkOV+MlI6A98
|
||||
yhrF16Midf9/KZG4qmUw0RkYfgjhoEpU8LxCifZ6gcWDxXgosdecfml4CRQSdRNi
|
||||
70vZduMpmms15FO4FE+Lk5x7IY7wWgSzBD9q8JYa4plCUeDlbxPQ+YZegMYxIUdv
|
||||
AgMBAAGjezB5MAkGA1UdEwQCMAAwLAYJYIZIAYb4QgENBB8WHU9wZW5TU0wgR2Vu
|
||||
ZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBTHPRGPb+sQXM7EzgR5v2HpcOBY
|
||||
sjAfBgNVHSMEGDAWgBTHPRGPb+sQXM7EzgR5v2HpcOBYsjANBgkqhkiG9w0BAQUF
|
||||
AAOCAQEAAlaOTOK7xyw6Fu8mxxH6HKX8qKO+egvX4TJ3ucUKGth0bvZCPsKuYJRX
|
||||
atZNVs0+giFP4VOVoIPhJBBXrIlTb0WehQSiRx/phQE7jvV3rmaTSZBTXxIQwxS5
|
||||
m/O5AlRgxtpI26Ejm66dQjCWr7WyI1rgM4lR2/FrqBBX1vld+9nsKZKKO+ht4q6m
|
||||
jTyhvQmSPtIF5MBUt0mSA8hLm9VmkQRB3WXdMrkA91QOoHF0MzB2S1k0fVhZx2Vp
|
||||
O3KRj7oboosu1f6wZC3zrq52diGhwKNTppNimeIi/ICq0qYvbwMobQFmQH02DgXK
|
||||
BglLbXpCqVeFgFDxIc3fR+JJc50Syg==
|
||||
-----END CERTIFICATE-----
|
||||
@ -1,18 +0,0 @@
|
||||
-----BEGIN CERTIFICATE REQUEST-----
|
||||
MIIC3TCCAcUCAQAwgZcxCzAJBgNVBAYTAlVTMQswCQYDVQQIDAJXQTEQMA4GA1UE
|
||||
BwwHUkVETU9ORDEcMBoGA1UECgwTTklOVEVORE9fT0ZfQU1FUklDQTEPMA0GA1UE
|
||||
CwwGU1lTVEVNMRUwEwYDVQQDDAxBTEwtUExBVEZPUk0xIzAhBgkqhkiG9w0BCQEW
|
||||
FGFkbWluQG5pbnRlbmRvLmNvLmpwMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB
|
||||
CgKCAQEAt7lfS9XI1pwEBQzTZLmUdR4IbnHuhpuVBQlX1CpAQRzOs135LynvEx6i
|
||||
0BFnGMyiad3rzpDXSItgCrnrMq4DON7cSqaDHVQMc1Ayl8tyHX0HqKQ97adukQG8
|
||||
9JfZriIzMCsF1/SnEQy+9eX7gbN804cizYUrDvt/HnrEZQweaifFJOQq2sdksLcd
|
||||
cg0czdeF8nQ6wboDSQZDlfjJSOgPfMoaxdejInX/fymRuKplMNEZGH4I4aBKVPC8
|
||||
Qon2eoHFg8V4KLHXnH5peAkUEnUTYu9L2XbjKZprNeRTuBRPi5OceyGO8FoEswQ/
|
||||
avCWGuKZQlHg5W8T0PmGXoDGMSFHbwIDAQABoAAwDQYJKoZIhvcNAQEFBQADggEB
|
||||
ACz+sEe0XyW4NkDJvTEJbtPaIyL8PYcz7Iz6sAdwyoj67sZh/H1evyKPDDF6AHtp
|
||||
Q+TMzGFUWxrv3Rwp2xHNi35T8jpCpvZNNtAQ7+v0/IHn1TPyIjxWcSh8qShR6OqE
|
||||
LhBhs+5jumbJVw0D7R1CGc9n/hhjJyfVt1l4PSIYbMWkdPcl/3rXJtc/PQUzcLoH
|
||||
jQZC8OlvZKH77SiJ5avdfq5co7By0Pw4ANNuw8hZnG8BuRed1/xo7ZsR4F63P0g3
|
||||
Hi2G9bNWR1eeORo1ouGQDg8RhCgKk39BDLIQWEqto6GwHYpolydzUKtWkHV7zEU1
|
||||
Gt3UGMqCqltOj8RIZKsIIF8=
|
||||
-----END CERTIFICATE REQUEST-----
|
||||
Binary file not shown.
@ -1,27 +0,0 @@
|
||||
-----BEGIN RSA PRIVATE KEY-----
|
||||
MIIEowIBAAKCAQEAt7lfS9XI1pwEBQzTZLmUdR4IbnHuhpuVBQlX1CpAQRzOs135
|
||||
LynvEx6i0BFnGMyiad3rzpDXSItgCrnrMq4DON7cSqaDHVQMc1Ayl8tyHX0HqKQ9
|
||||
7adukQG89JfZriIzMCsF1/SnEQy+9eX7gbN804cizYUrDvt/HnrEZQweaifFJOQq
|
||||
2sdksLcdcg0czdeF8nQ6wboDSQZDlfjJSOgPfMoaxdejInX/fymRuKplMNEZGH4I
|
||||
4aBKVPC8Qon2eoHFg8V4KLHXnH5peAkUEnUTYu9L2XbjKZprNeRTuBRPi5OceyGO
|
||||
8FoEswQ/avCWGuKZQlHg5W8T0PmGXoDGMSFHbwIDAQABAoIBAGgTLYWjDEtuQ+Ss
|
||||
eE+1xQB3S+Vsyucb2VXqDgPVD2MTM5BuKotqINFe6HIfeZyVx2dbXIo+iIXC1lwd
|
||||
J7wk0RR1QqtTGjER/J+SDabpi7JismT47U/kKgEgz+5q2tgG7aJarMvB/qXs53wa
|
||||
lNfLWmnlQnTT/ClXlJIqj3iCXfRZrmzlwvO8U0kil0oe1jFAlgYAj/ktnsvQmK/t
|
||||
Mli7zQdg2GYLouRSk1HexLkf9Hmf3pKJjmNL4Xx2WblaGGX+sGTOZP4d1Mwx1q3z
|
||||
kEscTjxWiTh1YRjxY8gdf1W63w1H0+9eBxp7DfzwmEt6wBu/dsLaBwDDAmqdgyqY
|
||||
nEc8yFkCgYEA7N8GJ1on2dYtDkVXrTHA9lOoj6es10F59FRydaRMm2FMY9m6lEg3
|
||||
jstSKf8AZTV+6KOlEf4K7ym1BIkdVD0FlkUp0d8tLtmF36y9qV8L0zUwaZAaR/Pi
|
||||
xRZ6cP+Fr6KNYqB5O9iPb+z4cDQtwS9SYFLjP6ZU2Q0lUDoQZPyfnk0CgYEAxo+b
|
||||
lRDLhADN0A+df8W/AWFWdrCexC9vwhzcinMr55nXJv2gzmR78BiXv2IVwPHg6dz2
|
||||
sSQKttgEnQwVW4nqY0E8mEPNja6sMpt4xkblwXQRm1u09MERUk2M4Lg5hvtFXiM2
|
||||
qSkcryD0OYs9MMQ0wyKbJGHLVB9si1D6trK1sqsCgYBTh8Z8xB8/g3a6DJwBmIUK
|
||||
mK/dkOyzsARYtBr0/26AcMxmfdZ9CgaFlY+w/ZrfFgFd+q9wa9zhQBz0r4GnPiml
|
||||
N1irCP+/ALhkC1+Kxdi+r4gWAdoyu3+hru6YwJMdP76KJDr8br8OYkuuDciA0rZC
|
||||
/5fhzz8ml6sr4n37jtafFQKBgQCW7JUfivKGVW4a1aOreQ0j6W6lLL6g9EWIUBO6
|
||||
EKywj5igBGx0NKCX8Ll3OQC79Z41ZEUGhBS4wh1Pmd2qBHxqES4TtoXJSZmNper5
|
||||
Gu6MSsMPSXeUCiQ2YMfSD3V6igdB9JYZoiwxWWUJUDKknJ5WLDmsP8EjIfeJNXY7
|
||||
5D6DnQKBgDdiPyGUHRLQy7+hm5EYWVhc8L//ejtF73XHxeBao6V7QZvM6dLalqie
|
||||
eY8bNy9nDUbk9dnL193VPbmH3ZcYkcKtkGuBRQsFcImCVkxcxtG110LMHbOcuVax
|
||||
Bsh6Ia0hswVFY4mzKf6mpzo2oNHT7s8vaDtVCJkjGN3d8Suf/2ng
|
||||
-----END RSA PRIVATE KEY-----
|
||||
Binary file not shown.
@ -1,9 +0,0 @@
|
||||
-----BEGIN PUBLIC KEY-----
|
||||
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAt7lfS9XI1pwEBQzTZLmU
|
||||
dR4IbnHuhpuVBQlX1CpAQRzOs135LynvEx6i0BFnGMyiad3rzpDXSItgCrnrMq4D
|
||||
ON7cSqaDHVQMc1Ayl8tyHX0HqKQ97adukQG89JfZriIzMCsF1/SnEQy+9eX7gbN8
|
||||
04cizYUrDvt/HnrEZQweaifFJOQq2sdksLcdcg0czdeF8nQ6wboDSQZDlfjJSOgP
|
||||
fMoaxdejInX/fymRuKplMNEZGH4I4aBKVPC8Qon2eoHFg8V4KLHXnH5peAkUEnUT
|
||||
Yu9L2XbjKZprNeRTuBRPi5OceyGO8FoEswQ/avCWGuKZQlHg5W8T0PmGXoDGMSFH
|
||||
bwIDAQAB
|
||||
-----END PUBLIC KEY-----
|
||||
@ -1,66 +0,0 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 1 (0x1)
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
Issuer: C=US, ST=WA, O=NINTENDO_OF_AMERICA, OU=SYSTEM, CN=ALL-PLATFORM/emailAddress=admin@nintendo.co.jp
|
||||
Validity
|
||||
Not Before: Nov 19 09:02:31 2009 GMT
|
||||
Not After : Nov 17 09:02:31 2019 GMT
|
||||
Subject: C=JP, ST=KYOTO, L=KYOTO, O=NINTENDO, OU=RED, CN=CTR/emailAddress=ctr_admin@nintendo.co.jp
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: id-ecPublicKey
|
||||
Public-Key: (233 bit)
|
||||
pub:
|
||||
04:00:d9:01:fd:e5:55:60:d9:32:33:25:93:53:0a:
|
||||
ba:63:a3:14:50:96:2d:4c:72:f2:9a:e6:a0:fb:6b:
|
||||
bf:01:be:d6:c3:8c:64:11:a2:6c:d3:ac:aa:31:9a:
|
||||
f5:67:a4:85:67:d6:93:67:04:8b:f0:a0:9e:2d:25:
|
||||
35
|
||||
ASN1 OID: sect233r1
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
OpenSSL Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
71:C3:EC:E7:2A:49:31:38:31:5B:7B:76:9D:2E:10:03:FE:19:78:4C
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:C7:3D:11:8F:6F:EB:10:5C:CE:C4:CE:04:79:BF:61:E9:70:E0:58:B2
|
||||
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
78:77:94:27:9d:db:1e:4b:4a:f0:58:de:a3:09:b2:d3:be:08:
|
||||
ce:ff:12:14:8c:f5:3f:fd:c8:bb:f1:51:5e:7a:6f:38:dc:c8:
|
||||
cd:c9:af:52:d1:a7:c3:b7:60:e0:37:95:7d:72:89:94:40:fb:
|
||||
c5:ce:ff:ed:9f:a8:ff:93:ee:61:f1:36:01:a9:2f:df:bc:3d:
|
||||
8b:e8:ee:60:98:75:93:3b:96:92:0b:a1:41:33:d8:01:b9:13:
|
||||
42:5f:04:56:c9:84:3e:41:06:6d:4c:82:bd:9f:dd:77:45:df:
|
||||
76:0e:27:c5:ae:69:3a:61:5d:a2:85:b9:fe:64:96:a5:ef:1d:
|
||||
d5:93:05:c3:24:9e:ce:fc:b6:c3:0e:fa:8f:40:31:f8:ed:f9:
|
||||
66:52:75:9d:2a:66:a6:ce:52:46:1c:90:39:5a:53:ea:eb:8c:
|
||||
25:9e:16:70:6b:9b:3f:2a:22:23:55:67:a6:fa:50:2b:4a:e4:
|
||||
e5:a6:db:2d:df:ae:76:4a:04:be:b9:1c:45:74:82:0a:91:70:
|
||||
d6:31:5f:ed:c9:bf:14:db:5a:8b:d0:e6:8a:20:4b:db:2e:c4:
|
||||
1f:13:08:22:72:bb:79:9b:7a:19:b1:9e:a5:2e:e6:15:b8:66:
|
||||
6e:62:39:77:70:e4:63:9b:fc:03:5c:4b:ad:64:55:6e:11:f1:
|
||||
b9:e0:b8:24
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDMDCCAhigAwIBAgIBATANBgkqhkiG9w0BAQUFADCBhTELMAkGA1UEBhMCVVMx
|
||||
CzAJBgNVBAgMAldBMRwwGgYDVQQKDBNOSU5URU5ET19PRl9BTUVSSUNBMQ8wDQYD
|
||||
VQQLDAZTWVNURU0xFTATBgNVBAMMDEFMTC1QTEFURk9STTEjMCEGCSqGSIb3DQEJ
|
||||
ARYUYWRtaW5AbmludGVuZG8uY28uanAwHhcNMDkxMTE5MDkwMjMxWhcNMTkxMTE3
|
||||
MDkwMjMxWjCBhTELMAkGA1UEBhMCSlAxDjAMBgNVBAgMBUtZT1RPMQ4wDAYDVQQH
|
||||
DAVLWU9UTzERMA8GA1UECgwITklOVEVORE8xDDAKBgNVBAsMA1JFRDEMMAoGA1UE
|
||||
AwwDQ1RSMScwJQYJKoZIhvcNAQkBFhhjdHJfYWRtaW5AbmludGVuZG8uY28uanAw
|
||||
UjAQBgcqhkjOPQIBBgUrgQQAGwM+AAQA2QH95VVg2TIzJZNTCrpjoxRQli1McvKa
|
||||
5qD7a78BvtbDjGQRomzTrKoxmvVnpIVn1pNnBIvwoJ4tJTWjezB5MAkGA1UdEwQC
|
||||
MAAwLAYJYIZIAYb4QgENBB8WHU9wZW5TU0wgR2VuZXJhdGVkIENlcnRpZmljYXRl
|
||||
MB0GA1UdDgQWBBRxw+znKkkxODFbe3adLhAD/hl4TDAfBgNVHSMEGDAWgBTHPRGP
|
||||
b+sQXM7EzgR5v2HpcOBYsjANBgkqhkiG9w0BAQUFAAOCAQEAeHeUJ53bHktK8Fje
|
||||
owmy074Izv8SFIz1P/3Iu/FRXnpvONzIzcmvUtGnw7dg4DeVfXKJlED7xc7/7Z+o
|
||||
/5PuYfE2Aakv37w9i+juYJh1kzuWkguhQTPYAbkTQl8EVsmEPkEGbUyCvZ/dd0Xf
|
||||
dg4nxa5pOmFdooW5/mSWpe8d1ZMFwySezvy2ww76j0Ax+O35ZlJ1nSpmps5SRhyQ
|
||||
OVpT6uuMJZ4WcGubPyoiI1VnpvpQK0rk5abbLd+udkoEvrkcRXSCCpFw1jFf7cm/
|
||||
FNtai9DmiiBL2y7EHxMIInK7eZt6GbGepS7mFbhmbmI5d3DkY5v8A1xLrWRVbhHx
|
||||
ueC4JA==
|
||||
-----END CERTIFICATE-----
|
||||
@ -1,9 +0,0 @@
|
||||
-----BEGIN CERTIFICATE REQUEST-----
|
||||
MIIBMzCB4QIBADCBhTELMAkGA1UEBhMCSlAxDjAMBgNVBAgMBUtZT1RPMQ4wDAYD
|
||||
VQQHDAVLWU9UTzERMA8GA1UECgwITklOVEVORE8xDDAKBgNVBAsMA1JFRDEMMAoG
|
||||
A1UEAwwDQ1RSMScwJQYJKoZIhvcNAQkBFhhjdHJfYWRtaW5AbmludGVuZG8uY28u
|
||||
anAwUjAQBgcqhkjOPQIBBgUrgQQAGwM+AAQA2QH95VVg2TIzJZNTCrpjoxRQli1M
|
||||
cvKa5qD7a78BvtbDjGQRomzTrKoxmvVnpIVn1pNnBIvwoJ4tJTWgADAJBgcqhkjO
|
||||
PQQBA0IAMD8CHgDRzF0qVB7z6NG9nNEWq6w+gzxzFV95+tfWCYkCsgIdUT2iMI7Z
|
||||
UZiE0I/lrOIHqetBIsJFpYVGA83D1gc=
|
||||
-----END CERTIFICATE REQUEST-----
|
||||
@ -1,8 +0,0 @@
|
||||
-----BEGIN EC PARAMETERS-----
|
||||
BgUrgQQAGw==
|
||||
-----END EC PARAMETERS-----
|
||||
-----BEGIN EC PRIVATE KEY-----
|
||||
MG0CAQEEHSPpFxKbsybBnzhicMZAWpTsdlB1u/Ca7PlXn9SZoAcGBSuBBAAboUAD
|
||||
PgAEANkB/eVVYNkyMyWTUwq6Y6MUUJYtTHLymuag+2u/Ab7Ww4xkEaJs06yqMZr1
|
||||
Z6SFZ9aTZwSL8KCeLSU1
|
||||
-----END EC PRIVATE KEY-----
|
||||
@ -1,50 +0,0 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 2 (0x2)
|
||||
Signature Algorithm: ecdsa-with-SHA1
|
||||
Issuer: C=JP, ST=KYOTO, L=KYOTO, O=NINTENDO, OU=RED, CN=CTR/emailAddress=ctr_admin@nintendo.co.jp
|
||||
Validity
|
||||
Not Before: Nov 19 09:19:06 2009 GMT
|
||||
Not After : Nov 17 09:19:06 2019 GMT
|
||||
Subject: C=JP, ST=OKAYAMA, L=ODA, O=SHARP, OU=TAKAYA, CN=HSM/emailAddress=admin@sharp.co.jp
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: id-ecPublicKey
|
||||
Public-Key: (233 bit)
|
||||
pub:
|
||||
04:01:b3:a1:96:8b:60:29:fe:b9:18:86:89:82:4c:
|
||||
92:d8:98:0d:d8:f3:8f:6a:68:8e:f5:93:f2:4f:5a:
|
||||
d4:01:5a:02:86:1f:cd:e1:37:7b:1b:5e:47:b2:f9:
|
||||
8f:f5:85:a3:ae:e2:4a:51:28:22:2d:1a:82:6e:91:
|
||||
96
|
||||
ASN1 OID: sect233r1
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
OpenSSL Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
6F:90:5B:FE:66:6D:4D:4B:B1:6D:3F:CC:64:1A:26:BF:8F:5D:1D:1B
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:71:C3:EC:E7:2A:49:31:38:31:5B:7B:76:9D:2E:10:03:FE:19:78:4C
|
||||
|
||||
Signature Algorithm: ecdsa-with-SHA1
|
||||
30:3f:02:1d:2d:13:94:04:c0:cc:57:48:fe:73:b8:c0:25:88:
|
||||
92:9b:27:ec:ba:fc:cb:bd:e6:40:87:91:4d:7b:1f:02:1e:00:
|
||||
94:a0:7b:72:a0:72:e3:87:fd:3d:d1:9b:db:18:87:5b:54:24:
|
||||
3a:f5:48:7e:9c:86:ad:89:69:bf:fa
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIICXzCCAgygAwIBAgIBAjAJBgcqhkjOPQQBMIGFMQswCQYDVQQGEwJKUDEOMAwG
|
||||
A1UECAwFS1lPVE8xDjAMBgNVBAcMBUtZT1RPMREwDwYDVQQKDAhOSU5URU5ETzEM
|
||||
MAoGA1UECwwDUkVEMQwwCgYDVQQDDANDVFIxJzAlBgkqhkiG9w0BCQEWGGN0cl9h
|
||||
ZG1pbkBuaW50ZW5kby5jby5qcDAeFw0wOTExMTkwOTE5MDZaFw0xOTExMTcwOTE5
|
||||
MDZaMH4xCzAJBgNVBAYTAkpQMRAwDgYDVQQIDAdPS0FZQU1BMQwwCgYDVQQHDANP
|
||||
REExDjAMBgNVBAoMBVNIQVJQMQ8wDQYDVQQLDAZUQUtBWUExDDAKBgNVBAMMA0hT
|
||||
TTEgMB4GCSqGSIb3DQEJARYRYWRtaW5Ac2hhcnAuY28uanAwUjAQBgcqhkjOPQIB
|
||||
BgUrgQQAGwM+AAQBs6GWi2Ap/rkYhomCTJLYmA3Y849qaI71k/JPWtQBWgKGH83h
|
||||
N3sbXkey+Y/1haOu4kpRKCItGoJukZajezB5MAkGA1UdEwQCMAAwLAYJYIZIAYb4
|
||||
QgENBB8WHU9wZW5TU0wgR2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBRv
|
||||
kFv+Zm1NS7FtP8xkGia/j10dGzAfBgNVHSMEGDAWgBRxw+znKkkxODFbe3adLhAD
|
||||
/hl4TDAJBgcqhkjOPQQBA0IAMD8CHS0TlATAzFdI/nO4wCWIkpsn7Lr8y73mQIeR
|
||||
TXsfAh4AlKB7cqBy44f9PdGb2xiHW1QkOvVIfpyGrYlpv/o=
|
||||
-----END CERTIFICATE-----
|
||||
@ -1,9 +0,0 @@
|
||||
-----BEGIN CERTIFICATE REQUEST-----
|
||||
MIIBKjCB2QIBADB+MQswCQYDVQQGEwJKUDEQMA4GA1UECAwHT0tBWUFNQTEMMAoG
|
||||
A1UEBwwDT0RBMQ4wDAYDVQQKDAVTSEFSUDEPMA0GA1UECwwGVEFLQVlBMQwwCgYD
|
||||
VQQDDANIU00xIDAeBgkqhkiG9w0BCQEWEWFkbWluQHNoYXJwLmNvLmpwMFIwEAYH
|
||||
KoZIzj0CAQYFK4EEABsDPgAEAbOhlotgKf65GIaJgkyS2JgN2POPamiO9ZPyT1rU
|
||||
AVoChh/N4Td7G15HsvmP9YWjruJKUSgiLRqCbpGWoAAwCQYHKoZIzj0EAQNBADA+
|
||||
Ah1hHULgGMJQ9thR6xIXnKnf7MRoL+8MM+7IiytapwIdE4cmzuPZRQ1TohuAI4zZ
|
||||
seqaK/9grU1rWEcDZT0=
|
||||
-----END CERTIFICATE REQUEST-----
|
||||
Binary file not shown.
@ -1,8 +0,0 @@
|
||||
-----BEGIN EC PARAMETERS-----
|
||||
BgUrgQQAGw==
|
||||
-----END EC PARAMETERS-----
|
||||
-----BEGIN EC PRIVATE KEY-----
|
||||
MG0CAQEEHeionsNFKvOye5ZdTN7DgNma1Hecm5/085LBPsdVoAcGBSuBBAAboUAD
|
||||
PgAEAbOhlotgKf65GIaJgkyS2JgN2POPamiO9ZPyT1rUAVoChh/N4Td7G15HsvmP
|
||||
9YWjruJKUSgiLRqCbpGW
|
||||
-----END EC PRIVATE KEY-----
|
||||
Binary file not shown.
@ -1,4 +0,0 @@
|
||||
-----BEGIN PUBLIC KEY-----
|
||||
MFIwEAYHKoZIzj0CAQYFK4EEABsDPgAEAbOhlotgKf65GIaJgkyS2JgN2POPamiO
|
||||
9ZPyT1rUAVoChh/N4Td7G15HsvmP9YWjruJKUSgiLRqCbpGW
|
||||
-----END PUBLIC KEY-----
|
||||
Binary file not shown.
@ -1,4 +0,0 @@
|
||||
-----BEGIN PUBLIC KEY-----
|
||||
MFIwEAYHKoZIzj0CAQYFK4EEABsDPgAEANkB/eVVYNkyMyWTUwq6Y6MUUJYtTHLy
|
||||
muag+2u/Ab7Ww4xkEaJs06yqMZr1Z6SFZ9aTZwSL8KCeLSU1
|
||||
-----END PUBLIC KEY-----
|
||||
1
realKey/dev/eFuse_iv.bin
Normal file
1
realKey/dev/eFuse_iv.bin
Normal file
@ -0,0 +1 @@
|
||||
eMHë{ôéÜ<C3A9>:°˙<C2B0>D
|
||||
BIN
realKey/prod/NCT2_pub.der
Normal file
BIN
realKey/prod/NCT2_pub.der
Normal file
Binary file not shown.
1
realKey/prod/eFuse_iv.bin
Normal file
1
realKey/prod/eFuse_iv.bin
Normal file
@ -0,0 +1 @@
|
||||
<EFBFBD><EFBFBD><EFBFBD><1D><>L<EFBFBD>C<EFBFBD>k4m<34><6D><EFBFBD>
|
||||
Loading…
Reference in New Issue
Block a user