⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 seca.c

📁 这是一个LINUX环境的 VDR 插件源代码,可支持Irdeto, Seca, Viaccess, Nagra, Conax & Cryptoworks等CA系统的读卡、共享等操作。
💻 C
📖 第 1 页 / 共 4 页
字号:
/* * Softcam plugin to VDR (C++) * * This code is free software; you can redistribute it and/or * modify it under the terms of the GNU General Public License * as published by the Free Software Foundation; either version 2 * of the License, or (at your option) any later version. * * This code is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. * Or, point your browser to http://www.gnu.org/copyleft/gpl.html */#include <stdio.h>#include <stdlib.h>#include <string.h>#include <ctype.h>#include <byteswap.h>#include <openssl/sha.h>#include "system-common.h"#include "data.h"#include "helper.h"#include "crypto.h"#include "parse.h"#include "misc.h"#include "log-sys.h"#include "log-core.h"#define SYSTEM_SECA          0x0100#define SYSTEM_NAME          "Seca"#define SYSTEM_PRI           -10#define SYSTEM_CAN_HANDLE(x) ((x)==SYSTEM_SECA)#define FILEMAP_DOMAIN       "seca"#define L_SYS        14#define L_SYS_ALL    LALL(L_SYS_LASTDEF)static const struct LogModule lm_sys = {  (LMOD_ENABLE|L_SYS_ALL)&LOPT_MASK,  (LMOD_ENABLE|L_SYS_DEFDEF)&LOPT_MASK,  "seca",  { L_SYS_DEFNAMES }  };ADD_MODULE(L_SYS,lm_sys)// -- cPlainKeySeca ------------------------------------------------------------#define PLAINLEN_SECA_H 8#define PLAINLEN_SECA_D 16#define PLAINLEN_SECA_B 90#define PLAINLEN_SECA_E 6  // exponent key len#define EMM_MAGIC       1#define N51_MAGIC       2class cPlainKeySeca : public cDualKey {protected:  virtual bool IsBNKey(void) const;  virtual int IdSize(void) { return 4; }  virtual cString PrintKeyNr(void);public:  cPlainKeySeca(bool Super);  virtual bool Parse(const char *line);  };static cPlainKeyTypeReg<cPlainKeySeca,'S'> KeyReg;cPlainKeySeca::cPlainKeySeca(bool Super):cDualKey(Super,true){}bool cPlainKeySeca::IsBNKey(void) const{  switch(keynr&C2MASK) {    case MBC('E','1'):    case MBC('M','1'):    case MBC('E','3'):    case MBC('M','3'):    case MBC('E','5'):    case MBC('M','5'):    case MBC('E','9'):    case MBC('M','9'): return true;    }  return false;}bool cPlainKeySeca::Parse(const char *line){  unsigned char sid[2];  const char *sline=line;  int len;  if(GetChar(line,&type,1) && (len=GetHex(line,sid,2,false))) {    type=toupper(type); id=Bin2Int(sid,len);    line=skipspace(line);    int emmnr=0, keylen=PLAINLEN_SECA_B;    if(!strncasecmp(line,"EMM",3)) { // EMM RSA key      emmnr=EMM_MAGIC;      line+=3;      line=skipspace(line);      }    else if(!strncasecmp(line,"N51",3)) { // Nano 51 RSA key      emmnr=N51_MAGIC;      line+=3;      line=skipspace(line);      keylen=toupper(*line)=='E'?1:129;      }    bool ok;    switch(toupper(*line)) {      case 'E':      case 'M': ok=GetChar(line,&keynr,2);                keynr=ADDC3(keynr,emmnr);                break;      default:  ok=emmnr ? false : GetHex(line,sid,1);                keynr=sid[0];                break;      }    if(ok) {      unsigned char skey[keylen];      len=GetHex(line,skey,keylen,false);      if(IsBNKey()) {        if(C2(keynr)=='E' && len==PLAINLEN_SECA_E) {          // support short exponent keys          memset(&skey[len],0,keylen-len);          len=keylen;          }        }      else {        if(len==PLAINLEN_SECA_H || len==PLAINLEN_SECA_D) {          // support for 16 & 8 byte keys          keylen=len;          }        }      if(len==keylen) {        SetBinKey(skey,keylen);        return true;        }      }    }  FormatError("seca",sline);  return false;}cString cPlainKeySeca::PrintKeyNr(void){  char nr[32];  int q=0;  switch(C3(keynr)) {    case EMM_MAGIC: q+=snprintf(nr+q,sizeof(nr)-q,"EMM "); break;    case N51_MAGIC: q+=snprintf(nr+q,sizeof(nr)-q,"N51 "); break;    }  if(IsBNKey()) {    nr[q  ]=(keynr>>8) & 0xff;    nr[q+1]= keynr     & 0xff;    nr[q+2]=0;    q+=2;    }  else q+=snprintf(nr+q,sizeof(nr)-q,"%.2X",keynr);  return nr;}// -- cSecaCardInfo ------------------------------------------------------------class cSecaCardInfo : public cProviderSeca {private:  int len;public:  unsigned char key[16];  //  bool Parse(const char *line);  bool Save(FILE *f) { return true; }  bool IsUpdated(void) { return false; }  void Updated(void) {}  bool Cmp(cSecaCardInfo *ci) { return false; }  int KeySize(void) { return len; }  };bool cSecaCardInfo::Parse(const char *line){  return GetHex(line,provId,sizeof(provId)) &&         GetHex(line,sa,sizeof(sa)) &&         (len=GetHex(line,key,sizeof(key),false)) &&          (len==PLAINLEN_SECA_H || len==PLAINLEN_SECA_D);}// -- cSecaCardInfos -----------------------------------------------------------class cSecaCardInfos : public cCardInfos<cSecaCardInfo> {public:  cSecaCardInfos(void):cCardInfos<cSecaCardInfo>(SYSTEM_NAME) {}  };static cSecaCardInfos Scards;// -- cSeca --------------------------------------------------------------------static const unsigned char secaPC1[] = {  42,57,29,34,  41,53,30,15,  19,36,23,14,  43,61,12, 3,  51,49,5,  6,  45,54,52,47,  63,38,58,22,  60,33,10,26,  37,35,44, 1,  20,62,28,18,  46, 9,39, 4,  27,11,21,50,  31,25, 2, 7,  13,55,59,17  };static const unsigned char secaPC2[] = {  18, 3,21,15,  42,35,37, 8,  49,41,30,55,  56,29,12,23,  43,14,7 ,27,  13, 2,11,45,   4,34,54,51,  22,40,16,25,  26,48,53,28,   1,17, 5,31,  50, 6,39,24,  33,47,38,32  };static inline void __swap8_4(unsigned char *data){  unsigned char temp[4];  memcpy(temp,data,4);  memcpy(data,&data[4],4);  memcpy(&data[4],temp,4);}#define swap8_4(d) __swap8_4(d)class cSeca {private:  static const unsigned char TD[];  //  void Fase(unsigned char *data, const unsigned char *key, const unsigned char *T1, const unsigned char *T2);protected:  static const unsigned char T1_S1[], T2_S1[];  //  void Decrypt(unsigned char *data, const unsigned char *key, const unsigned char *T1, const unsigned char *T2);  void Encrypt(unsigned char *data, const unsigned char *key, const unsigned char *T1, const unsigned char *T2);  void CalcSignature(const unsigned char *buff, int len, unsigned char *signature, const unsigned char *k, const unsigned char *T1, const unsigned char *T2);  // Seca2 functions  void AdditionalAlgo(unsigned char *data, const unsigned char *key, const int mode);  };const unsigned char cSeca::TD[4] = { 1,3,0,2 };const unsigned char cSeca::T1_S1[256] = { // Original Tables  0x2a,0xe1,0x0b,0x13,0x3e,0x6e,0x32,0x48, 0xd3,0x31,0x08,0x8c,0x8f,0x95,0xbd,0xd0,  0xe4,0x6d,0x50,0x81,0x20,0x30,0xbb,0x75, 0xf5,0xd4,0x7c,0x87,0x2c,0x4e,0xe8,0xf4,  0xbe,0x24,0x9e,0x4d,0x80,0x37,0xd2,0x5f, 0xdb,0x04,0x7a,0x3f,0x14,0x72,0x67,0x2d,  0xcd,0x15,0xa6,0x4c,0x2e,0x3b,0x0c,0x41, 0x62,0xfa,0xee,0x83,0x1e,0xa2,0x01,0x0e,//8  0x7f,0x59,0xc9,0xb9,0xc4,0x9d,0x9b,0x1b, 0x9c,0xca,0xaf,0x3c,0x73,0x1a,0x65,0xb1,  0x76,0x84,0x39,0x98,0xe9,0x53,0x94,0xba, 0x1d,0x29,0xcf,0xb4,0x0d,0x05,0x7d,0xd1,  0xd7,0x0a,0xa0,0x5c,0x91,0x71,0x92,0x88, 0xab,0x93,0x11,0x8a,0xd6,0x5a,0x77,0xb5,  0xc3,0x19,0xc1,0xc7,0x8e,0xf9,0xec,0x35, 0x4b,0xcc,0xd9,0x4a,0x18,0x23,0x9f,0x52,//16  0xdd,0xe3,0xad,0x7b,0x47,0x97,0x60,0x10, 0x43,0xef,0x07,0xa5,0x49,0xc6,0xb3,0x55,  0x28,0x51,0x5d,0x64,0x66,0xfc,0x44,0x42, 0xbc,0x26,0x09,0x74,0x6f,0xf7,0x6b,0x4f,  0x2f,0xf0,0xea,0xb8,0xae,0xf3,0x63,0x6a, 0x56,0xb2,0x02,0xd8,0x34,0xa4,0x00,0xe6,  0x58,0xeb,0xa3,0x82,0x85,0x45,0xe0,0x89, 0x7e,0xfd,0xf2,0x3a,0x36,0x57,0xff,0x06,//24  0x69,0x54,0x79,0x9a,0xb6,0x6c,0xdc,0x8b, 0xa7,0x1f,0x90,0x03,0x17,0x1c,0xed,0xd5,  0xaa,0x5e,0xfe,0xda,0x78,0xb0,0xbf,0x12, 0xa8,0x22,0x21,0x3d,0xc2,0xc0,0xb7,0xa9,  0xe7,0x33,0xfb,0xf1,0x70,0xe5,0x17,0x96, 0xf8,0x8d,0x46,0xa1,0x86,0xe2,0x40,0x38,  0xf6,0x68,0x25,0x16,0xac,0x61,0x27,0xcb, 0x5b,0xc8,0x2b,0x0f,0x99,0xde,0xce,0xc5  };const unsigned char cSeca::T2_S1[256] = {  0xbf,0x11,0x6d,0xfa,0x26,0x7f,0xf3,0xc8, 0x9e,0xdd,0x3f,0x16,0x97,0xbd,0x08,0x80,  0x51,0x42,0x93,0x49,0x5b,0x64,0x9b,0x25, 0xf5,0x0f,0x24,0x34,0x44,0xb8,0xee,0x2e,  0xda,0x8f,0x31,0xcc,0xc0,0x5e,0x8a,0x61, 0xa1,0x63,0xc7,0xb2,0x58,0x09,0x4d,0x46,  0x81,0x82,0x68,0x4b,0xf6,0xbc,0x9d,0x03, 0xac,0x91,0xe8,0x3d,0x94,0x37,0xa0,0xbb, //8  0xce,0xeb,0x98,0xd8,0x38,0x56,0xe9,0x6b, 0x28,0xfd,0x84,0xc6,0xcd,0x5f,0x6e,0xb6,  0x32,0xf7,0x0e,0xf1,0xf8,0x54,0xc1,0x53, 0xf0,0xa7,0x95,0x7b,0x19,0x21,0x23,0x7d,  0xe1,0xa9,0x75,0x3e,0xd6,0xed,0x8e,0x6f, 0xdb,0xb7,0x07,0x41,0x05,0x77,0xb4,0x2d,  0x45,0xdf,0x29,0x22,0x43,0x89,0x83,0xfc, 0xd5,0xa4,0x88,0xd1,0xf4,0x55,0x4f,0x78,//16  0x62,0x1e,0x1d,0xb9,0xe0,0x2f,0x01,0x13, 0x15,0xe6,0x17,0x6a,0x8d,0x0c,0x96,0x7e,  0x86,0x27,0xa6,0x0d,0xb5,0x73,0x71,0xaa, 0x36,0xd0,0x06,0x66,0xdc,0xb1,0x2a,0x5a,  0x72,0xbe,0x3a,0xc5,0x40,0x65,0x1b,0x02, 0x10,0x9f,0x3b,0xf9,0x2b,0x18,0x5c,0xd7,  0x12,0x47,0xef,0x1a,0x87,0xd2,0xc2,0x8b, 0x99,0x9c,0xd3,0x57,0xe4,0x76,0x67,0xca,//24  0x3c,0xfb,0x90,0x20,0x14,0x48,0xc9,0x60, 0xb0,0x70,0x4e,0xa2,0xad,0x35,0xea,0xc4,  0x74,0xcb,0x39,0xde,0xe7,0xd4,0xa3,0xa5, 0x04,0x92,0x8c,0xd9,0x7c,0x1c,0x7a,0xa8,  0x52,0x79,0xf2,0x33,0xba,0x1f,0x30,0x9a, 0x00,0x50,0x4c,0xff,0xe5,0xcf,0x59,0xc3,  0xe3,0x0a,0x85,0xb3,0xae,0xec,0x0b,0xfe, 0xe2,0xab,0x4a,0xaf,0x69,0x6c,0x2c,0x5d  };void cSeca::Fase(unsigned char *D, const unsigned char *key, const unsigned char *T1, const unsigned char *T2){  for(int l=0; l<4; ++l) { D[l]^=key[l]; D[l]=T1[D[l]&0xff]; }  for(int l=6; l>3; --l) {    D[(l+2)&3]^=D[(l+1)&3];    D[l&3]=T2[(sn8(D[(l+1)&3])+D[l&3])&0xff];    }   for(int l=3; l>0; --l) {    D[(l+2)&3]^=D[(l+1)&3];    D[l&3]=T1[(sn8(D[(l+1)&3])+D[l&3])&0xff];    }  D[2]^=D[1];  D[1]^=D[0];}void cSeca::Decrypt(unsigned char *d, const unsigned char *key, const unsigned char *T1, const unsigned char *T2){  unsigned char k[16],D[4];  memcpy(k,key,sizeof(k));  unsigned char C=0xff;  for(int j=0; j<4; ++j) {    for(int i=0; i<16; ++i) {      if((i&3)==0) ++C;      k[i]^=T1[(k[(15+i)&0xf]^k[(i+1)&0xf]^C)&0xff];       }     }  int j=0;  for(int i=0; i<16; ++i) {    for(int l=0; l<4; ++l) D[l]=d[l+4];    j=(j+12)&0xf;    Fase(D,&k[j&0xc],T1,T2);    for(int l=0; l<4; ++l) d[l]^=T2[D[TD[l]]&0xff];    for(int l=3; l>=0; --l) k[(j+l)&0xf]^=T1[(k[(j+l+1)&0xf]^k[(j+l+15)&0xf]^(15-i))&0xff];    if(i<15) swap8_4(d);    }}void cSeca::Encrypt(unsigned char *d, const unsigned char *key, const unsigned char *T1, const unsigned char *T2){  unsigned char D[4],kk[16];  memcpy(kk, key, sizeof(kk));  for(int j=0, i=0; i<16; ++i, j=(j+4)&0xf) {    for(int l=0; l<4; ++l) kk[(j+l)&0xf] ^= T1[(kk[(j+l+1)&0xf]^kk[(j+l+15)&0xf]^i)&0xff];     if(i>0) swap8_4(d);    for(int l=0; l<4; ++l) D[l]=d[l+4];    Fase(D,&kk[j&0xc],T1,T2);    for(int l=0; l<4; ++l) d[l]^=T2[D[TD[l]]&0xff];    } }void cSeca::CalcSignature(const unsigned char *buff, int len, unsigned char *signature, const unsigned char *k, const unsigned char *T1, const unsigned char *T2){  memset(signature,0,8);  for(int i=0 ; i<len ; i+=8) {    for(int j=0 ; j<8 && i+j<len; j++) signature[j]^=buff[i+j];    Encrypt(signature,k,T1,T2);    }}void cSeca::AdditionalAlgo(unsigned char *data, const unsigned char *key, const int mode){  static const unsigned int adders[] = {    0x0000,0xe555,0xafff,0x5ffe,0xf552,0x6ffb,0xcff9,0x154c,    0x3ff4,0x4ff1,0x4543,0x1fea,0xdfe6,0x8537,0x0fdd,0x7fd8    };  const unsigned short * const k = (const unsigned short *)key;  unsigned short * const dd = (unsigned short *)data;  unsigned int d1=dd[0], d2=dd[1], d3=dd[2], d4=dd[3];  PRINTF(L_SYS_VERBOSE,"additional algo: %s",!mode?"encrypt":"decrypt");  if(!mode) {    for(int i=0; i<0x10; i++) {      const unsigned int adder = adders[i];      d1 += (k[0] + d3 + adder) ^ (k[1] + d4 + adder);      d2 += (k[2] + d3 + adder) ^ (k[3] + d4 + adder);      d1 = ror16(d1,5);      d2 = rol16(d2,3);      d3 += (k[0] + d1 + adder) ^ (k[1] + d2 + adder);      d4 += (k[2] + d1 + adder) ^ (k[3] + d2 + adder);      d3 = rol16(d3,3);      d4 = ror16(d4,5);      }    }  else {    for(int i=0xf; i>=0; i--) {      const unsigned int adder = adders[i];      d4 = rol16(d4,5);      d3 = ror16(d3,3);      d4 -= (k[2] + d1 + adder) ^ (k[3] + d2 + adder);      d3 -= (k[0] + d1 + adder) ^ (k[1] + d2 + adder);      d2 = ror16(d2,3);      d1 = rol16(d1,5);      d2 -= (k[2] + d3 + adder) ^ (k[3] + d4 + adder);      d1 -= (k[0] + d3 + adder) ^ (k[1] + d4 + adder);      }    }  dd[0]=d1; dd[1]=d2; dd[2]=d3; dd[3]=d4;}// -- cSeca2Prov ---------------------------------------------------------------#define MAX_PERMS    10#define KEY2INDEX(x) (((x)>>5)&0x03)struct Perm {  unsigned char P1[8], P2[8], P3[8], P4[8];  };struct ProvData {  unsigned short LoadId, MTLoadSize, MTSize;  unsigned char SHA1Pad, SHA1End;  unsigned char FP[8];  };class cSeca2Prov: protected cSeca {private:  cFileMap *hash, *mask;  unsigned short id;  //  unsigned short Sum(const unsigned char *data, int n) const;protected:  const struct ProvData *pData;  const struct Perm *perm;  //  cFileMap *GetMap(const char *type, int size, bool generic) const;public:  cSeca2Prov(unsigned short Id);  virtual ~cSeca2Prov();  // provider specific mods

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -