User Tools

Site Tools


devicesal

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
devicesal [2009/05/27 12:31] – example for ssatrans marcusdevicesal [2009/06/02 01:44] (current) – document dictionary marcus
Line 1: Line 1:
 +<code>
 +DeviceSal Dict 000 (EKB) -> (status): Verify EKB file.  For version 1, check SHA-1 of first 176 bytes.  For any other, call DeviceSal Dict 159.  Returns 0 if OK, otherwise an error code.
 +DeviceSal Dict 001
 +DeviceSal Dict 002
 +DeviceSal Dict 003
 +DeviceSal Dict 159 (EKB) -> (status): Verify EKB file with version > 1.  Checks ECC signature, returns 0 if OK, otherwise an error code.
 +DeviceSal Dict 160
 +DeviceSal Dict 165
 +DeviceSal Dict 170
 +DeviceSal Dict 171
 +DeviceSal Dict 172: Dispatch table for D171.
 +DeviceSal Dict 173
 +DeviceSal Dict 174
 +DeviceSal Dict 175
 +DeviceSal Dict 177
 +DeviceSal Dict 178: Dispatch table for D177.
 +DeviceSal Dict 180 (a,b,c) -> (1): Returns 1.
 +DeviceSal Dict 181 (deskey,plain,cipher,xorout,xorin) -> (): DES-ECB-Encrypt "plain XORrep xorin" and set cipher to "that XORrep xorout".
 +DeviceSal Dict 182
 +DeviceSal Dict 183
 +DeviceSal Dict 184 (msg,tripdeskey) -> (mac): tripdeskey has two keys (2*8 bytes), say k1 ++ k2. DES-CBC-Encrypt msg with k1, then DES-Decrypt the last block with k2, DES-Encrypt that with k1, and return the single block result.
 +DeviceSal Dict 185 (cipher,iv,enckey2,encobj,key) -> (plain): DES-OCM-Decrypt encobj with "key", the plaintext is a 3DES key k1 ++ k2.  DES-Decrypt enckey2 with k2, DES-Encrypt that with k1, resulting in key2.  DES-CBC-Decrypt cipher with key2 and iv and return the result.
 +DeviceSal Dict 186 (plain,iv,encobj,key) -> (nkey,cipher): DES-OCM-Decrypt encobj with "key", the plaintext is a 3DES key k1 ++ k2.  Then create a new key, and encrypt it with k2, that's nkey.  Also encrypt the new key with k1, and use that to DES-CBC-Encrypt plain with iv into cipher.
 +DeviceSal Dict 187
 +DeviceSal Dict 189 (key,value) -> (): Use D191 as a map and enter (key, value) into it.
 +DeviceSal Dict 190 (key,default) -> (): Use D191 as map and return the value for key, or default if not found.
 +DeviceSal Dict 191: Variable to pass mapping to helper functions.
 +DeviceSal Dict 193
 +DeviceSal Dict 194
 +DeviceSal Dict 195
 +DeviceSal Dict 196
 +DeviceSal Dict 197: Dispatch table for 196.
 +DeviceSal Dict 198: (Decrypto with hook D249, reencrypt with DES-OCM)
 +DeviceSal Dict 199
 +DeviceSal Dict 207 (encobj, objkey) -> (...): DES-OCM-Decrypt encobj with objkey and unpack an ASN.1 encoded array (stripping off the length parameter) 
 +DeviceSal Dict 208 (o1, o2, objkey) -> (encobj): DES-OCM-Encrypt an ASN.1 encoded array containing the first 8 bytes of o1 and o2 each.
 +DeviceSal Dict 209 (version) -> (ekbpath): Return the local EKB path.
 +DeviceSal Dict 210 () -> (1): Produce 1.
 +DeviceSal Dict 211
 +DeviceSal Dict 212
 +DeviceSal Dict 213
 +DeviceSal Dict 214 (encobj, protokey) -> (obj): Descramble cipher and OCM-Decrypt with SHA-1(protokey) and ASN.1-decode the result.
 +DeviceSal Dict 215 (obj, protokey) -> (encobj): OCM-Encrypt the serialized obj with SHA-1(protokey) and scramble the result.
 +DeviceSal Dict 216 (encobj, xorprotokey) -> (obj): DES-OCM-Decrypt with SHA-1(xorprotokey XOR D252++D252) and ASN.1-decode the result.
 +DeviceSal Dict 217 (obj, xorprotokey) -> (encobj): DES-OCM-Encrypt the serialized obj with SHA-1(xorprotokey XOR D252++D252).
 +DeviceSal Dict 220 (cipher, key) -> (plain): Decrypt with some weird SHA-1 based stream cipher.
 +DeviceSal Dict 221 (plain, key) -> (cipher): Encrypt with some weird SHA-1 based stream cipher.
 +</code>
 +
 Missing Info: Missing Info:
 +
 +
 +
  
 <code> <code>
devicesal.1243427510.txt.gz · Last modified: 2009/05/27 12:31 by marcus

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki