Fix bis key generation for newer hardware
This commit is contained in:
		@@ -68,6 +68,28 @@ static const u8 master_key_source[0x10] = {
 | 
			
		||||
    0xD8, 0xA2, 0x41, 0x0A, 0xC6, 0xC5, 0x90, 0x01, 0xC6, 0x1D, 0x6A, 0x26, 0x7C, 0x51, 0x3F, 0x3C};
 | 
			
		||||
static const u8 per_console_key_source[0x10] = {
 | 
			
		||||
    0x4F, 0x02, 0x5F, 0x0E, 0xB6, 0x6D, 0x11, 0x0E, 0xDC, 0x32, 0x7D, 0x41, 0x86, 0xC2, 0xF4, 0x78};
 | 
			
		||||
static const u8 per_console_key_source_4x[0x10] = {
 | 
			
		||||
    0x0C, 0x91, 0x09, 0xDB, 0x93, 0x93, 0x07, 0x81, 0x07, 0x3C, 0xC4, 0x16, 0x22, 0x7C, 0x6C, 0x28};
 | 
			
		||||
 | 
			
		||||
static const u8 new_device_key_sources[KB_FIRMWARE_VERSION_MAX - KB_FIRMWARE_VERSION_400 + 1][0x10] = {
 | 
			
		||||
    {0x8B, 0x4E, 0x1C, 0x22, 0x42, 0x07, 0xC8, 0x73, 0x56, 0x94, 0x08, 0x8B, 0xCC, 0x47, 0x0F, 0x5D}, /* 4.x   New Device Key Source. */
 | 
			
		||||
    {0x6C, 0xEF, 0xC6, 0x27, 0x8B, 0xEC, 0x8A, 0x91, 0x99, 0xAB, 0x24, 0xAC, 0x4F, 0x1C, 0x8F, 0x1C}, /* 5.x   New Device Key Source. */
 | 
			
		||||
    {0x70, 0x08, 0x1B, 0x97, 0x44, 0x64, 0xF8, 0x91, 0x54, 0x9D, 0xC6, 0x84, 0x8F, 0x1A, 0xB2, 0xE4}, /* 6.x   New Device Key Source. */
 | 
			
		||||
    {0x8E, 0x09, 0x1F, 0x7A, 0xBB, 0xCA, 0x6A, 0xFB, 0xB8, 0x9B, 0xD5, 0xC1, 0x25, 0x9C, 0xA9, 0x17}, /* 6.2.0 New Device Key Source. */
 | 
			
		||||
    {0x8F, 0x77, 0x5A, 0x96, 0xB0, 0x94, 0xFD, 0x8D, 0x28, 0xE4, 0x19, 0xC8, 0x16, 0x1C, 0xDB, 0x3D}, /* 7.0.0 New Device Key Source. */
 | 
			
		||||
    {0x67, 0x62, 0xD4, 0x8E, 0x55, 0xCF, 0xFF, 0x41, 0x31, 0x15, 0x3B, 0x24, 0x0C, 0x7C, 0x07, 0xAE}, /* 8.1.0 New Device Key Source. */
 | 
			
		||||
    {0x4A, 0xC3, 0x4E, 0x14, 0x8B, 0x96, 0x4A, 0xD5, 0xD4, 0x99, 0x73, 0xC4, 0x45, 0xAB, 0x8B, 0x49}, /* 9.0.0 New Device Key Source. */
 | 
			
		||||
};
 | 
			
		||||
 | 
			
		||||
static const u8 new_device_keygen_sources[KB_FIRMWARE_VERSION_MAX - KB_FIRMWARE_VERSION_400 + 1][0x10] = {
 | 
			
		||||
    {0x88, 0x62, 0x34, 0x6E, 0xFA, 0xF7, 0xD8, 0x3F, 0xE1, 0x30, 0x39, 0x50, 0xF0, 0xB7, 0x5D, 0x5D}, /* 4.x   New Device Keygen Source. */
 | 
			
		||||
    {0x06, 0x1E, 0x7B, 0xE9, 0x6D, 0x47, 0x8C, 0x77, 0xC5, 0xC8, 0xE7, 0x94, 0x9A, 0xA8, 0x5F, 0x2E}, /* 5.x   New Device Keygen Source. */
 | 
			
		||||
    {0x99, 0xFA, 0x98, 0xBD, 0x15, 0x1C, 0x72, 0xFD, 0x7D, 0x9A, 0xD5, 0x41, 0x00, 0xFD, 0xB2, 0xEF}, /* 6.x   New Device Keygen Source. */
 | 
			
		||||
    {0x81, 0x3C, 0x6C, 0xBF, 0x5D, 0x21, 0xDE, 0x77, 0x20, 0xD9, 0x6C, 0xE3, 0x22, 0x06, 0xAE, 0xBB}, /* 6.2.0 New Device Keygen Source. */
 | 
			
		||||
    {0x86, 0x61, 0xB0, 0x16, 0xFA, 0x7A, 0x9A, 0xEA, 0xF6, 0xF5, 0xBE, 0x1A, 0x13, 0x5B, 0x6D, 0x9E}, /* 7.0.0 New Device Keygen Source. */
 | 
			
		||||
    {0xA6, 0x81, 0x71, 0xE7, 0xB5, 0x23, 0x74, 0xB0, 0x39, 0x8C, 0xB7, 0xFF, 0xA0, 0x62, 0x9F, 0x8D}, /* 8.1.0 New Device Keygen Source. */
 | 
			
		||||
    {0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}, /* TODO: 9.0.0 New Device Keygen Source to be added on next change-of-keys. */
 | 
			
		||||
};
 | 
			
		||||
 | 
			
		||||
// from SPL
 | 
			
		||||
static const u8 aes_key_generation_source[0x10] = {
 | 
			
		||||
 
 | 
			
		||||
@@ -61,6 +61,7 @@ emmc_part_t *system_part;
 | 
			
		||||
static u8 temp_key[0x10],
 | 
			
		||||
          bis_key[4][0x20] = {0},
 | 
			
		||||
          device_key[0x10] = {0},
 | 
			
		||||
          new_device_key[0x10] = {0},
 | 
			
		||||
          sd_seed[0x10] = {0},
 | 
			
		||||
          // FS-related keys
 | 
			
		||||
          fs_keys[10][0x20] = {0},
 | 
			
		||||
@@ -260,8 +261,10 @@ get_tsec: ;
 | 
			
		||||
        se_aes_crypt_block_ecb(9, 0, keyblob_key[i], keyblob_key[i]); // kbk = unwrap(temp, sbk)
 | 
			
		||||
        se_aes_key_set(7, keyblob_key[i], 0x10);
 | 
			
		||||
        se_aes_crypt_block_ecb(7, 0, keyblob_mac_key[i], keyblob_mac_key_source); // kbm = unwrap(kbms, kbk)
 | 
			
		||||
        if (i == 0)
 | 
			
		||||
        if (i == 0) {
 | 
			
		||||
            se_aes_crypt_block_ecb(7, 0, device_key, per_console_key_source); // devkey = unwrap(pcks, kbk0)
 | 
			
		||||
            se_aes_crypt_block_ecb(7, 0, new_device_key, per_console_key_source_4x);
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        // verify keyblob is not corrupt
 | 
			
		||||
        sdmmc_storage_read(&storage, 0x180000 / NX_EMMC_BLOCKSIZE + i, 1, keyblob_block);
 | 
			
		||||
@@ -290,14 +293,28 @@ get_tsec: ;
 | 
			
		||||
    /*  key = unwrap(source, wrapped_key):
 | 
			
		||||
        key_set(ks, wrapped_key), block_ecb(ks, 0, key, source) -> final key in key
 | 
			
		||||
    */
 | 
			
		||||
   // TODO: fix bis key generation for newer unpatched consoles
 | 
			
		||||
 | 
			
		||||
    u32 key_generation = 0;
 | 
			
		||||
    if (pkg1_id->kb >= KB_FIRMWARE_VERSION_500) {
 | 
			
		||||
        if ((fuse_read_odm(4) & 0x800) && fuse_read_odm(0) == 0x8E61ECAE && fuse_read_odm(1) == 0xF2BA3BB2) {
 | 
			
		||||
            key_generation = fuse_read_odm(2) & 0x1F;
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
    if (_key_exists(device_key)) {
 | 
			
		||||
        se_aes_key_set(8, device_key, 0x10);
 | 
			
		||||
        if (key_generation) {
 | 
			
		||||
            se_aes_key_set(8, new_device_key, 0x10);
 | 
			
		||||
            se_aes_crypt_block_ecb(8, 0, temp_key, new_device_key_sources[pkg1_id->kb - KB_FIRMWARE_VERSION_400]);
 | 
			
		||||
            se_aes_key_set(8, master_key[0], 0x10);
 | 
			
		||||
            se_aes_unwrap_key(8, 8, new_device_keygen_sources[pkg1_id->kb - KB_FIRMWARE_VERSION_400]);
 | 
			
		||||
            se_aes_crypt_block_ecb(8, 0, temp_key, temp_key);
 | 
			
		||||
        } else
 | 
			
		||||
            memcpy(temp_key, device_key, 0x10);
 | 
			
		||||
        se_aes_key_set(8, temp_key, 0x10);
 | 
			
		||||
        se_aes_unwrap_key(8, 8, retail_specific_aes_key_source); // kek = unwrap(rsaks, devkey)
 | 
			
		||||
        se_aes_crypt_block_ecb(8, 0, bis_key[0] + 0x00, bis_key_source[0] + 0x00); // bkey = unwrap(bkeys, kek)
 | 
			
		||||
        se_aes_crypt_block_ecb(8, 0, bis_key[0] + 0x10, bis_key_source[0] + 0x10);
 | 
			
		||||
        // kek = generate_kek(bkeks, devkey, aeskek, aeskey)
 | 
			
		||||
        _generate_kek(8, bis_kek_source, device_key, aes_kek_generation_source, aes_key_generation_source);
 | 
			
		||||
        _generate_kek(8, bis_kek_source, temp_key, aes_kek_generation_source, aes_key_generation_source);
 | 
			
		||||
        se_aes_crypt_block_ecb(8, 0, bis_key[1] + 0x00, bis_key_source[1] + 0x00); // bkey = unwrap(bkeys, kek)
 | 
			
		||||
        se_aes_crypt_block_ecb(8, 0, bis_key[1] + 0x10, bis_key_source[1] + 0x10);
 | 
			
		||||
        se_aes_crypt_block_ecb(8, 0, bis_key[2] + 0x00, bis_key_source[2] + 0x00);
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user