| Commit message (Collapse) | Author | Age |
| |
|
|
| |
Change-Id: Ia37818faee29130ffe3690c83f85a39bd35637e0
|
| |
|
|
|
|
|
|
| |
* added KAS for nwz-x1000 (extracted from an NWZ-X1060 via "get_dnk_nvp kas")
* hint that -o is needed when extracting
Change-Id: Ic91c448aa058a22c8ddcae54726f628f7cf60f6b
|
| |
|
|
| |
Change-Id: I0a191db1970e64b5ced518c68861392ba342404f
|
| |
|
|
| |
Change-Id: I4e4679d6e92c1c0fc8a03db5201aee39d82b24b2
|
| |
|
|
| |
Change-Id: I2cc887ce2824a2d0b9aeb2a89df662c621c28750
|
| |
|
|
| |
Change-Id: I4341f2af71675cb795987ecc5ce12104445a9d97
|
| |
|
|
| |
Change-Id: I88fb2aefafbc7820a49847fbf0888de9cf81bd3f
|
| |
|
|
| |
Change-Id: I69b8b81d357553c979682d42097eba864c951512
|
| |
|
|
|
|
| |
Like the NW-A30, we don't know how to use it, but record it anyway.
Change-Id: Iebd26637253613625a4885afe88695ad3ffb0605
|
| |
|
|
|
|
|
|
| |
We don't know the encryption method, the KAS is completely different but it
might be useful to record it anyway for future purposes. MID extracted from
device, Japanese NW-A35.
Change-Id: I4c4bb5b063da99003b5c316061d8c490b77428a4
|
| |
|
|
|
|
| |
Extracted from a target.
Change-Id: Ieb4aff15f332a681142a7079c1adf3b1da31de24
|
| |
|
|
| |
Change-Id: I88ae7391732c6f41c3c4adccce2ddf0a92142067
|
| |
|
|
|
|
|
| |
We already use Crypto++ for DES anyway, and using OpenSSL is not great because
of its incompatible licence.
Change-Id: I78771b84c1708795a0c0c30afa5bdfe4885dea4e
|
| |
|
|
|
|
| |
This was a huge mess, the new is much cleaner hopefully.
Change-Id: I43663d021dc8bc31662d3923e1c3da22d987ebf9
|
| |
|
|
|
|
|
| |
Allow to search for hex with upper case and alphanumeric. This is *much* slower
of course.
Change-Id: I41a2fc63c4b2220c21147b711098ebc37ddb3527
|
| |
|
|
| |
Change-Id: I1b8272a486ba2377e5047855acda3f80aa92c232
|
| |
|
|
|
|
|
| |
There is no need to store the key and sig since those are derived from the KAS
anyway.
Change-Id: I228913b1cb32e496db265e9a7aaf3bb4200a9f6b
|
| |
|
|
|
|
|
|
| |
Unify series names: e46x -> e460 to be consistent with Sony' name. Add keys
for various players that were cracked using upgtools. The real KAS would need
to be extracted from a target but at least we can open/create firmware upgrades.
Change-Id: Id23a10e10170d7f6330c6699bf205c4df5ddebfe
|
| |
|
|
|
|
|
|
|
|
|
| |
The new search has two new features:
- it takes advantage of the fact that DES keys are only 56-bit long (and not 64)
- it is now multithreaded
As a proof of concept, I ran it on the A10 series firmware upgrade and was able
to find the key in a few seconds using 4 threads. The search is still limited
to ascii hex passwords (seems to work on all devices I have tried thus far).
Change-Id: Ied080286d2bbdc493a6ceaecaaadba802b429666
|
| |
|
|
|
|
|
|
| |
There was a lot of copy and paste, and the code was just crap. This commit tries
to clarify the code and also document the encryption procedure. Hopefully I didn't
break anything.
Change-Id: I257793010e7cf94f2b090b30bb8608359d3886e3
|
| |
|
|
|
|
| |
Also fix a typo in the script makefile
Change-Id: Ie747d8b99ca0f6a98bbcaf1c82e66c7788f00e6e
|
| |
|
|
|
|
| |
KAS was in its own structure for historical reasons, but it's stupid now.
Change-Id: Ie8d69ac6d489337cd857ace1abe5b1e4b1177172
|
| |
|
|
| |
Change-Id: I315d1010ce5477c0112f4a890156b360e8123e11
|
| |
|
|
| |
Change-Id: I9c3e2eb95f7eb6d41591b006328fd720dfcf93a5
|
|
|
This tool can unpack UPG archives for firmware updates.
Change-Id: I32f5f1a84759198c7af4a4ecfd7aa65eaeda567a
|