Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Automatic derivation of 0x2F keyY #7

Open
Cu3PO42 opened this issue Dec 3, 2019 · 0 comments
Open

Automatic derivation of 0x2F keyY #7

Cu3PO42 opened this issue Dec 3, 2019 · 0 comments

Comments

@Cu3PO42
Copy link

Cu3PO42 commented Dec 3, 2019

Key 0x2F keyY is derived by NATIVE_FIRM, but the derivation procedure is arguably quite simple.
It is probably best summarised by this one line from SciresM/3ds-pohlig-hellmann:

keys = hashlib.sha256(binascii.unhexlify('%0512X' % pow(asn1, d, n))).hexdigest().upper()

where asn1 is some data that would need to be hardcoded and d and n can be read from boot9.

I'm not sure if hardcoding (some) data is something that aligns with the ideas you have for this project, but I believe it would be quite convenient, since it's a lot less clear how to obtain that key than it is to obtain boot9.

Maybe a similar procedure would also be viable for 0x19 and 0x1A keyX?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant