📄 seca.c
字号:
/* * Softcam plugin to VDR (C++) * * This code is free software; you can redistribute it and/or * modify it under the terms of the GNU General Public License * as published by the Free Software Foundation; either version 2 * of the License, or (at your option) any later version. * * This code is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. * Or, point your browser to http://www.gnu.org/copyleft/gpl.html */#include <stdio.h>#include <stdlib.h>#include <string.h>#include <ctype.h>#include <byteswap.h>#include <openssl/sha.h>#include "system-common.h"#include "data.h"#include "helper.h"#include "crypto.h"#include "parse.h"#include "misc.h"#include "log-sys.h"#include "log-core.h"#define SYSTEM_SECA 0x0100#define SYSTEM_NAME "Seca"#define SYSTEM_PRI -10#define SYSTEM_CAN_HANDLE(x) ((x)==SYSTEM_SECA)#define FILEMAP_DOMAIN "seca"#define L_SYS 14#define L_SYS_ALL LALL(L_SYS_LASTDEF)static const struct LogModule lm_sys = { (LMOD_ENABLE|L_SYS_ALL)&LOPT_MASK, (LMOD_ENABLE|L_SYS_DEFDEF)&LOPT_MASK, "seca", { L_SYS_DEFNAMES } };ADD_MODULE(L_SYS,lm_sys)// -- cPlainKeySeca ------------------------------------------------------------#define PLAINLEN_SECA_H 8#define PLAINLEN_SECA_D 16#define PLAINLEN_SECA_B 90#define PLAINLEN_SECA_E 6 // exponent key len#define EMM_MAGIC 1#define N51_MAGIC 2class cPlainKeySeca : public cDualKey {protected: virtual bool IsBNKey(void) const; virtual int IdSize(void) { return 4; } virtual cString PrintKeyNr(void);public: cPlainKeySeca(bool Super); virtual bool Parse(const char *line); };static cPlainKeyTypeReg<cPlainKeySeca,'S'> KeyReg;cPlainKeySeca::cPlainKeySeca(bool Super):cDualKey(Super,true){}bool cPlainKeySeca::IsBNKey(void) const{ switch(keynr&C2MASK) { case MBC('E','1'): case MBC('M','1'): case MBC('E','3'): case MBC('M','3'): case MBC('E','5'): case MBC('M','5'): case MBC('E','9'): case MBC('M','9'): return true; } return false;}bool cPlainKeySeca::Parse(const char *line){ unsigned char sid[2]; const char *sline=line; int len; if(GetChar(line,&type,1) && (len=GetHex(line,sid,2,false))) { type=toupper(type); id=Bin2Int(sid,len); line=skipspace(line); int emmnr=0, keylen=PLAINLEN_SECA_B; if(!strncasecmp(line,"EMM",3)) { // EMM RSA key emmnr=EMM_MAGIC; line+=3; line=skipspace(line); } else if(!strncasecmp(line,"N51",3)) { // Nano 51 RSA key emmnr=N51_MAGIC; line+=3; line=skipspace(line); keylen=toupper(*line)=='E'?1:129; } bool ok; switch(toupper(*line)) { case 'E': case 'M': ok=GetChar(line,&keynr,2); keynr=ADDC3(keynr,emmnr); break; default: ok=emmnr ? false : GetHex(line,sid,1); keynr=sid[0]; break; } if(ok) { unsigned char skey[keylen]; len=GetHex(line,skey,keylen,false); if(IsBNKey()) { if(C2(keynr)=='E' && len==PLAINLEN_SECA_E) { // support short exponent keys memset(&skey[len],0,keylen-len); len=keylen; } } else { if(len==PLAINLEN_SECA_H || len==PLAINLEN_SECA_D) { // support for 16 & 8 byte keys keylen=len; } } if(len==keylen) { SetBinKey(skey,keylen); return true; } } } FormatError("seca",sline); return false;}cString cPlainKeySeca::PrintKeyNr(void){ char nr[32]; int q=0; switch(C3(keynr)) { case EMM_MAGIC: q+=snprintf(nr+q,sizeof(nr)-q,"EMM "); break; case N51_MAGIC: q+=snprintf(nr+q,sizeof(nr)-q,"N51 "); break; } if(IsBNKey()) { nr[q ]=(keynr>>8) & 0xff; nr[q+1]= keynr & 0xff; nr[q+2]=0; q+=2; } else q+=snprintf(nr+q,sizeof(nr)-q,"%.2X",keynr); return nr;}// -- cSecaCardInfo ------------------------------------------------------------class cSecaCardInfo : public cProviderSeca {private: int len;public: unsigned char key[16]; // bool Parse(const char *line); bool Save(FILE *f) { return true; } bool IsUpdated(void) { return false; } void Updated(void) {} bool Cmp(cSecaCardInfo *ci) { return false; } int KeySize(void) { return len; } };bool cSecaCardInfo::Parse(const char *line){ return GetHex(line,provId,sizeof(provId)) && GetHex(line,sa,sizeof(sa)) && (len=GetHex(line,key,sizeof(key),false)) && (len==PLAINLEN_SECA_H || len==PLAINLEN_SECA_D);}// -- cSecaCardInfos -----------------------------------------------------------class cSecaCardInfos : public cCardInfos<cSecaCardInfo> {public: cSecaCardInfos(void):cCardInfos<cSecaCardInfo>(SYSTEM_NAME) {} };static cSecaCardInfos Scards;// -- cSeca --------------------------------------------------------------------static const unsigned char secaPC1[] = { 42,57,29,34, 41,53,30,15, 19,36,23,14, 43,61,12, 3, 51,49,5, 6, 45,54,52,47, 63,38,58,22, 60,33,10,26, 37,35,44, 1, 20,62,28,18, 46, 9,39, 4, 27,11,21,50, 31,25, 2, 7, 13,55,59,17 };static const unsigned char secaPC2[] = { 18, 3,21,15, 42,35,37, 8, 49,41,30,55, 56,29,12,23, 43,14,7 ,27, 13, 2,11,45, 4,34,54,51, 22,40,16,25, 26,48,53,28, 1,17, 5,31, 50, 6,39,24, 33,47,38,32 };static inline void __swap8_4(unsigned char *data){ unsigned char temp[4]; memcpy(temp,data,4); memcpy(data,&data[4],4); memcpy(&data[4],temp,4);}#define swap8_4(d) __swap8_4(d)class cSeca {private: static const unsigned char TD[]; // void Fase(unsigned char *data, const unsigned char *key, const unsigned char *T1, const unsigned char *T2);protected: static const unsigned char T1_S1[], T2_S1[]; // void Decrypt(unsigned char *data, const unsigned char *key, const unsigned char *T1, const unsigned char *T2); void Encrypt(unsigned char *data, const unsigned char *key, const unsigned char *T1, const unsigned char *T2); void CalcSignature(const unsigned char *buff, int len, unsigned char *signature, const unsigned char *k, const unsigned char *T1, const unsigned char *T2); // Seca2 functions void AdditionalAlgo(unsigned char *data, const unsigned char *key, const int mode); };const unsigned char cSeca::TD[4] = { 1,3,0,2 };const unsigned char cSeca::T1_S1[256] = { // Original Tables 0x2a,0xe1,0x0b,0x13,0x3e,0x6e,0x32,0x48, 0xd3,0x31,0x08,0x8c,0x8f,0x95,0xbd,0xd0, 0xe4,0x6d,0x50,0x81,0x20,0x30,0xbb,0x75, 0xf5,0xd4,0x7c,0x87,0x2c,0x4e,0xe8,0xf4, 0xbe,0x24,0x9e,0x4d,0x80,0x37,0xd2,0x5f, 0xdb,0x04,0x7a,0x3f,0x14,0x72,0x67,0x2d, 0xcd,0x15,0xa6,0x4c,0x2e,0x3b,0x0c,0x41, 0x62,0xfa,0xee,0x83,0x1e,0xa2,0x01,0x0e,//8 0x7f,0x59,0xc9,0xb9,0xc4,0x9d,0x9b,0x1b, 0x9c,0xca,0xaf,0x3c,0x73,0x1a,0x65,0xb1, 0x76,0x84,0x39,0x98,0xe9,0x53,0x94,0xba, 0x1d,0x29,0xcf,0xb4,0x0d,0x05,0x7d,0xd1, 0xd7,0x0a,0xa0,0x5c,0x91,0x71,0x92,0x88, 0xab,0x93,0x11,0x8a,0xd6,0x5a,0x77,0xb5, 0xc3,0x19,0xc1,0xc7,0x8e,0xf9,0xec,0x35, 0x4b,0xcc,0xd9,0x4a,0x18,0x23,0x9f,0x52,//16 0xdd,0xe3,0xad,0x7b,0x47,0x97,0x60,0x10, 0x43,0xef,0x07,0xa5,0x49,0xc6,0xb3,0x55, 0x28,0x51,0x5d,0x64,0x66,0xfc,0x44,0x42, 0xbc,0x26,0x09,0x74,0x6f,0xf7,0x6b,0x4f, 0x2f,0xf0,0xea,0xb8,0xae,0xf3,0x63,0x6a, 0x56,0xb2,0x02,0xd8,0x34,0xa4,0x00,0xe6, 0x58,0xeb,0xa3,0x82,0x85,0x45,0xe0,0x89, 0x7e,0xfd,0xf2,0x3a,0x36,0x57,0xff,0x06,//24 0x69,0x54,0x79,0x9a,0xb6,0x6c,0xdc,0x8b, 0xa7,0x1f,0x90,0x03,0x17,0x1c,0xed,0xd5, 0xaa,0x5e,0xfe,0xda,0x78,0xb0,0xbf,0x12, 0xa8,0x22,0x21,0x3d,0xc2,0xc0,0xb7,0xa9, 0xe7,0x33,0xfb,0xf1,0x70,0xe5,0x17,0x96, 0xf8,0x8d,0x46,0xa1,0x86,0xe2,0x40,0x38, 0xf6,0x68,0x25,0x16,0xac,0x61,0x27,0xcb, 0x5b,0xc8,0x2b,0x0f,0x99,0xde,0xce,0xc5 };const unsigned char cSeca::T2_S1[256] = { 0xbf,0x11,0x6d,0xfa,0x26,0x7f,0xf3,0xc8, 0x9e,0xdd,0x3f,0x16,0x97,0xbd,0x08,0x80, 0x51,0x42,0x93,0x49,0x5b,0x64,0x9b,0x25, 0xf5,0x0f,0x24,0x34,0x44,0xb8,0xee,0x2e, 0xda,0x8f,0x31,0xcc,0xc0,0x5e,0x8a,0x61, 0xa1,0x63,0xc7,0xb2,0x58,0x09,0x4d,0x46, 0x81,0x82,0x68,0x4b,0xf6,0xbc,0x9d,0x03, 0xac,0x91,0xe8,0x3d,0x94,0x37,0xa0,0xbb, //8 0xce,0xeb,0x98,0xd8,0x38,0x56,0xe9,0x6b, 0x28,0xfd,0x84,0xc6,0xcd,0x5f,0x6e,0xb6, 0x32,0xf7,0x0e,0xf1,0xf8,0x54,0xc1,0x53, 0xf0,0xa7,0x95,0x7b,0x19,0x21,0x23,0x7d, 0xe1,0xa9,0x75,0x3e,0xd6,0xed,0x8e,0x6f, 0xdb,0xb7,0x07,0x41,0x05,0x77,0xb4,0x2d, 0x45,0xdf,0x29,0x22,0x43,0x89,0x83,0xfc, 0xd5,0xa4,0x88,0xd1,0xf4,0x55,0x4f,0x78,//16 0x62,0x1e,0x1d,0xb9,0xe0,0x2f,0x01,0x13, 0x15,0xe6,0x17,0x6a,0x8d,0x0c,0x96,0x7e, 0x86,0x27,0xa6,0x0d,0xb5,0x73,0x71,0xaa, 0x36,0xd0,0x06,0x66,0xdc,0xb1,0x2a,0x5a, 0x72,0xbe,0x3a,0xc5,0x40,0x65,0x1b,0x02, 0x10,0x9f,0x3b,0xf9,0x2b,0x18,0x5c,0xd7, 0x12,0x47,0xef,0x1a,0x87,0xd2,0xc2,0x8b, 0x99,0x9c,0xd3,0x57,0xe4,0x76,0x67,0xca,//24 0x3c,0xfb,0x90,0x20,0x14,0x48,0xc9,0x60, 0xb0,0x70,0x4e,0xa2,0xad,0x35,0xea,0xc4, 0x74,0xcb,0x39,0xde,0xe7,0xd4,0xa3,0xa5, 0x04,0x92,0x8c,0xd9,0x7c,0x1c,0x7a,0xa8, 0x52,0x79,0xf2,0x33,0xba,0x1f,0x30,0x9a, 0x00,0x50,0x4c,0xff,0xe5,0xcf,0x59,0xc3, 0xe3,0x0a,0x85,0xb3,0xae,0xec,0x0b,0xfe, 0xe2,0xab,0x4a,0xaf,0x69,0x6c,0x2c,0x5d };void cSeca::Fase(unsigned char *D, const unsigned char *key, const unsigned char *T1, const unsigned char *T2){ for(int l=0; l<4; ++l) { D[l]^=key[l]; D[l]=T1[D[l]&0xff]; } for(int l=6; l>3; --l) { D[(l+2)&3]^=D[(l+1)&3]; D[l&3]=T2[(sn8(D[(l+1)&3])+D[l&3])&0xff]; } for(int l=3; l>0; --l) { D[(l+2)&3]^=D[(l+1)&3]; D[l&3]=T1[(sn8(D[(l+1)&3])+D[l&3])&0xff]; } D[2]^=D[1]; D[1]^=D[0];}void cSeca::Decrypt(unsigned char *d, const unsigned char *key, const unsigned char *T1, const unsigned char *T2){ unsigned char k[16],D[4]; memcpy(k,key,sizeof(k)); unsigned char C=0xff; for(int j=0; j<4; ++j) { for(int i=0; i<16; ++i) { if((i&3)==0) ++C; k[i]^=T1[(k[(15+i)&0xf]^k[(i+1)&0xf]^C)&0xff]; } } int j=0; for(int i=0; i<16; ++i) { for(int l=0; l<4; ++l) D[l]=d[l+4]; j=(j+12)&0xf; Fase(D,&k[j&0xc],T1,T2); for(int l=0; l<4; ++l) d[l]^=T2[D[TD[l]]&0xff]; for(int l=3; l>=0; --l) k[(j+l)&0xf]^=T1[(k[(j+l+1)&0xf]^k[(j+l+15)&0xf]^(15-i))&0xff]; if(i<15) swap8_4(d); }}void cSeca::Encrypt(unsigned char *d, const unsigned char *key, const unsigned char *T1, const unsigned char *T2){ unsigned char D[4],kk[16]; memcpy(kk, key, sizeof(kk)); for(int j=0, i=0; i<16; ++i, j=(j+4)&0xf) { for(int l=0; l<4; ++l) kk[(j+l)&0xf] ^= T1[(kk[(j+l+1)&0xf]^kk[(j+l+15)&0xf]^i)&0xff]; if(i>0) swap8_4(d); for(int l=0; l<4; ++l) D[l]=d[l+4]; Fase(D,&kk[j&0xc],T1,T2); for(int l=0; l<4; ++l) d[l]^=T2[D[TD[l]]&0xff]; } }void cSeca::CalcSignature(const unsigned char *buff, int len, unsigned char *signature, const unsigned char *k, const unsigned char *T1, const unsigned char *T2){ memset(signature,0,8); for(int i=0 ; i<len ; i+=8) { for(int j=0 ; j<8 && i+j<len; j++) signature[j]^=buff[i+j]; Encrypt(signature,k,T1,T2); }}void cSeca::AdditionalAlgo(unsigned char *data, const unsigned char *key, const int mode){ static const unsigned int adders[] = { 0x0000,0xe555,0xafff,0x5ffe,0xf552,0x6ffb,0xcff9,0x154c, 0x3ff4,0x4ff1,0x4543,0x1fea,0xdfe6,0x8537,0x0fdd,0x7fd8 }; const unsigned short * const k = (const unsigned short *)key; unsigned short * const dd = (unsigned short *)data; unsigned int d1=dd[0], d2=dd[1], d3=dd[2], d4=dd[3]; PRINTF(L_SYS_VERBOSE,"additional algo: %s",!mode?"encrypt":"decrypt"); if(!mode) { for(int i=0; i<0x10; i++) { const unsigned int adder = adders[i]; d1 += (k[0] + d3 + adder) ^ (k[1] + d4 + adder); d2 += (k[2] + d3 + adder) ^ (k[3] + d4 + adder); d1 = ror16(d1,5); d2 = rol16(d2,3); d3 += (k[0] + d1 + adder) ^ (k[1] + d2 + adder); d4 += (k[2] + d1 + adder) ^ (k[3] + d2 + adder); d3 = rol16(d3,3); d4 = ror16(d4,5); } } else { for(int i=0xf; i>=0; i--) { const unsigned int adder = adders[i]; d4 = rol16(d4,5); d3 = ror16(d3,3); d4 -= (k[2] + d1 + adder) ^ (k[3] + d2 + adder); d3 -= (k[0] + d1 + adder) ^ (k[1] + d2 + adder); d2 = ror16(d2,3); d1 = rol16(d1,5); d2 -= (k[2] + d3 + adder) ^ (k[3] + d4 + adder); d1 -= (k[0] + d3 + adder) ^ (k[1] + d4 + adder); } } dd[0]=d1; dd[1]=d2; dd[2]=d3; dd[3]=d4;}// -- cSeca2Prov ---------------------------------------------------------------#define MAX_PERMS 10#define KEY2INDEX(x) (((x)>>5)&0x03)struct Perm { unsigned char P1[8], P2[8], P3[8], P4[8]; };struct ProvData { unsigned short LoadId, MTLoadSize, MTSize; unsigned char SHA1Pad, SHA1End; unsigned char FP[8]; };class cSeca2Prov: protected cSeca {private: cFileMap *hash, *mask; unsigned short id; // unsigned short Sum(const unsigned char *data, int n) const;protected: const struct ProvData *pData; const struct Perm *perm; // cFileMap *GetMap(const char *type, int size, bool generic) const;public: cSeca2Prov(unsigned short Id); virtual ~cSeca2Prov(); // provider specific mods
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -