FreeCalypso > hg > freecalypso-reveng
diff miscprog/imeibrute.c @ 129:597143ba1c37
miscellaneous C programs moved out of the top level directory
author | Michael Spacefalcon <msokolov@ivan.Harhan.ORG> |
---|---|
date | Sun, 06 Apr 2014 20:20:39 +0000 |
parents | imeibrute.c@1e797f846563 |
children |
line wrap: on
line diff
--- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/miscprog/imeibrute.c Sun Apr 06 20:20:39 2014 +0000 @@ -0,0 +1,99 @@ +/* + * The IMEI "protection" implemented by TI for Calypso (as opposed to Calypso+ + * or LoCosto) platforms for those device manufs who desired to obfuscate their + * IMEIs (not everyone did - Openmoko opted out, for example), as seen in + * g23m/condat/com/src/comlib/cl_imei.c in the Leonardo semi-src by Sotovik, + * encrypts the IMEI using plain DES, using a key derived from the Calypso die + * ID. However, only 28 effective key bits are used, and the key is then also + * encrypted with itself and stored right after the encrypted IMEI, and is used + * by the decryption & verification routine. Per TI's source, the 16-byte + * encrypted IMEI record is to be stored in FFS in /gsm/imei.enc; the DP-L10 + * phone by Pirelli/Foxconn has been found to use the same scheme, but store + * the 16-byte record in question in their "factory block" instead, at absolute + * address 0x027F0504 as seen by the ARM7 CPU. + * + * The encryption scheme seems so weak to me (28 effective key bits and an easy + * hit detection criterion for a brute force cracker) that I decided to see, + * just for fun, how long it would take to crack that encryption by brute force + * alone, and using a totally non-optimized program to do that. + */ + +#include <sys/types.h> +#include <openssl/des.h> +#include <stdio.h> +#include <stdlib.h> + +DES_cblock ciphertext[2], dieid_key, decrypted[2]; +DES_key_schedule keysched; + +read_ciphertext(filename, offset_arg) + char *filename, *offset_arg; +{ + FILE *f; + u_long offset_val; + + f = fopen(filename, "r"); + if (!f) { + perror(filename); + exit(1); + } + if (offset_arg) { + offset_val = strtoul(offset_arg, 0, 16); + fseek(f, offset_val, 0); + } + fread(ciphertext, 8, 2, f); + fclose(f); +} + +print_des_cblock(msg, blk) + char *msg; + DES_cblock blk; +{ + printf("%s: %02X %02X %02X %02X %02X %02X %02X %02X\n", msg, + blk[0], blk[1], blk[2], blk[3], blk[4], blk[5], blk[6], blk[7]); +} + +try() +{ + DES_set_key_unchecked(&dieid_key, &keysched); + DES_ecb_encrypt(&ciphertext[1], &decrypted[1], &keysched, DES_DECRYPT); + if (decrypted[1][0] & 0xFE != dieid_key[0]) + return; + if (decrypted[1][1]) + return; + if (decrypted[1][2] & 0xFE != dieid_key[2]) + return; + if (decrypted[1][3]) + return; + if (decrypted[1][4] & 0xFE != dieid_key[4]) + return; + if (decrypted[1][5]) + return; + if (decrypted[1][6] & 0xFE != dieid_key[6]) + return; + if (decrypted[1][7]) + return; + print_des_cblock("Hit", &decrypted[1]); + DES_ecb_encrypt(&ciphertext[0], &decrypted[0], &keysched, DES_DECRYPT); + print_des_cblock("IMEI", &decrypted[0]); +} + +main(argc, argv) + char **argv; +{ + if (argc < 2 || argc > 3) { + fprintf(stderr, "usage: %s binfile [offset]\n", argv[0]); + exit(1); + } + read_ciphertext(argv[1], argv[2]); + dieid_key[1] = 0; + dieid_key[3] = 0; + dieid_key[5] = 0; + dieid_key[7] = 0; + for (dieid_key[0] = 0; dieid_key[0] <= 0xFE; dieid_key[0] += 2) + for (dieid_key[2] = 0; dieid_key[2] <= 0xFE; dieid_key[2] += 2) + for (dieid_key[4] = 0; dieid_key[4] <= 0xFE; dieid_key[4] += 2) + for (dieid_key[6] = 0; dieid_key[6] <= 0xFE; dieid_key[6] += 2) + try(); + exit(0); +}