Editing Kirk
Jump to navigation
Jump to search
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 532: | Line 532: | ||
| 2 | | 2 | ||
| KIRK_CMD_DNAS_ENCRYPT | | KIRK_CMD_DNAS_ENCRYPT | ||
| | | Encrypt Operation for DNAS (inverse of command 3) | ||
| buf_size+0x90 | | buf_size+0x90 | ||
| buf_size | | buf_size | ||
Line 541: | Line 541: | ||
| 3 | | 3 | ||
| KIRK_CMD_DNAS_DECRYPT | | KIRK_CMD_DNAS_DECRYPT | ||
| Decrypt | | Decrypt Operation for DNAS (inverse of command 2) | ||
| buf_size+0x90 | | buf_size+0x90 | ||
| buf_size | | buf_size | ||
| mesg_led | | mesg_led | ||
| {{yes}} | | {{yes}} | ||
| {{no}} | | {{no}} | ||
Line 879: | Line 879: | ||
# Read the body size and check that it is non-zero | # Read the body size and check that it is non-zero | ||
# Get the AES key at key slot 4 + <keyseed>. Command 4 can only encrypt with keyseeds 0..0x3F while command 7 can decrypt with keyseeds 0..0x7F. | # Get the AES key at key slot 4 + <keyseed>. Command 4 can only encrypt with keyseeds 0..0x3F while command 7 can decrypt with keyseeds 0..0x7F. | ||
# | # Derive the key for some keyseeds using per-console parameters: | ||
## If the key mesh's derivation key MSB is 1 and keyseed is in the 0x20..0x2f or 0x6c | ## If the key mesh's derivation key MSB is 1 and keyseed is in the 0x20..0x2f or 0x6c, 0x7b range, invert the bits of the last word (4 bytes) of the key | ||
## If the keyseed is in the 0x27..0x2f or 0x73..0x7b range, XOR the first word of the key with the key mesh derivation key | ## If the keyseed is in the 0x27..0x2f or 0x73..0x7b range, XOR the first word of the key with the key mesh derivation key | ||
# For command 4, copy the input header to the output, just replacing mode 4 with 5, and encrypt the body from offset 0x14 using AES-CBC with a null IV and the key determined at step 5. | # For command 4, copy the input header to the output, just replacing mode 4 with 5, and encrypt the body from offset 0x14 using AES-CBC with a null IV and the key determined at step 5. |