|
|
Line 45: |
Line 45: |
| | | |
| =Description= | | =Description= |
− | This decrypts the input SEED and verifies it with the input AES-CCM MAC, verifies the RSA-signature, then writes the data to [[nand/private/movable.sed]]. The nonce used for the AES-CCM MAC seems to be all-zero. | + | This decrypts the input SEED and verifies it with the input AES-CCM MAC, verifies the RSA-signature, then writes the data to [[nand/private/movable.sed]]. The nonce used for the AES-CCM MAC is all-zero. |
Revision as of 22:23, 22 August 2012
Request
Index Word
|
Description
|
0
|
Header code [0x00460002]
|
1
|
Always 0x00013004, for 0x130 size: (size<<8) | 4
|
2
|
Input IntegrityVerificationSeed pointer
|
Response
Index Word
|
Description
|
0
|
Header code
|
1
|
Result code
|
IntegrityVerificationSeed
Offset
|
Size
|
Description
|
0x0
|
0x10
|
AES-CCM MAC over a SHA256 hash, which hashes the first 0x110-bytes of the cleartext SEED.
|
0x10
|
0x120
|
The nand/private/movable.sed, encrypted with AES-CTR using the above MAC for the counter.
|
Description
This decrypts the input SEED and verifies it with the input AES-CCM MAC, verifies the RSA-signature, then writes the data to nand/private/movable.sed. The nonce used for the AES-CCM MAC is all-zero.