Last active
July 28, 2025 19:31
-
-
Save kynex7510/160d1beb21f2f9005a333cdf1d1b6403 to your computer and use it in GitHub Desktop.
Build and sign SecureInfo_A files
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| """ | |
| make_secureinfo.py | |
| Build and sign SecureInfo_A files. | |
| - Kynex7510 | |
| """ | |
| from cryptography.hazmat.primitives.asymmetric import rsa, padding | |
| from cryptography.hazmat.primitives import hashes | |
| RETAIL_MODULO = [ | |
| 0xB1, 0x79, 0x1A, 0x6D, 0x1E, 0xAD, 0xD4, 0x29, 0xBA, 0x89, 0xA1, 0xCD, 0x43, 0x36, 0x30, 0x17, | |
| 0x4B, 0xC6, 0x87, 0x30, 0xC5, 0xE7, 0x05, 0x60, 0x19, 0x7B, 0x50, 0xD8, 0xC4, 0x54, 0x67, 0x10, | |
| 0xA6, 0xE8, 0xA1, 0x01, 0xBC, 0x2C, 0xEB, 0x03, 0x76, 0xF0, 0x05, 0xC7, 0x0C, 0xE0, 0xB6, 0xD6, | |
| 0xDF, 0xFD, 0x26, 0xDF, 0x33, 0x46, 0x8B, 0xDB, 0xB2, 0x39, 0x1E, 0x7E, 0xC0, 0x1A, 0xA1, 0xA5, | |
| 0xA0, 0x91, 0xE8, 0x07, 0xDA, 0x37, 0x86, 0x76, 0xBA, 0x39, 0x0A, 0x25, 0x42, 0x9D, 0x59, 0x61, | |
| 0xE1, 0x61, 0xD4, 0x04, 0x85, 0xA7, 0x4B, 0xB2, 0x01, 0x86, 0xBE, 0xB1, 0x1A, 0x35, 0x72, 0xC1, | |
| 0xC2, 0xEA, 0x28, 0xAB, 0x7A, 0x10, 0x15, 0x32, 0x5C, 0x9E, 0x71, 0x2B, 0x7D, 0xF9, 0x65, 0xEA, | |
| 0xE6, 0xC6, 0xFB, 0x8B, 0xAE, 0xD7, 0x6C, 0x2A, 0x94, 0xA6, 0xC5, 0xEC, 0xE4, 0x0E, 0xAF, 0x98, | |
| 0x7E, 0x06, 0xF2, 0x0F, 0x88, 0x4F, 0xD2, 0x06, 0x35, 0xA4, 0x76, 0xE9, 0xF7, 0x0A, 0xBA, 0x5C, | |
| 0x5B, 0x14, 0x61, 0x52, 0x00, 0x54, 0x04, 0x45, 0x93, 0xE4, 0x68, 0x27, 0x04, 0x35, 0x35, 0x5A, | |
| 0xAD, 0x58, 0x09, 0xD1, 0x19, 0x3F, 0x5A, 0x07, 0x28, 0xD6, 0xDB, 0x6B, 0x55, 0x1F, 0x77, 0x94, | |
| 0x5D, 0xC3, 0xBE, 0x6F, 0xAE, 0x5B, 0xCC, 0x08, 0x63, 0xE4, 0x76, 0xDF, 0xA2, 0x9B, 0x36, 0xEA, | |
| 0x85, 0x34, 0x03, 0xE6, 0x16, 0xEA, 0xA9, 0x05, 0xE0, 0x7F, 0x3A, 0x3E, 0x7E, 0x70, 0x77, 0xCF, | |
| 0x16, 0x6A, 0x61, 0xD1, 0x7E, 0x4D, 0x35, 0x4C, 0x74, 0x44, 0x85, 0xD4, 0xF6, 0x7B, 0x0E, 0xEE, | |
| 0x32, 0xF1, 0xC2, 0xD5, 0x79, 0x02, 0x48, 0xE9, 0x62, 0x1A, 0x33, 0xBA, 0xA3, 0x9B, 0x02, 0xB0, | |
| 0x22, 0x94, 0x05, 0x7F, 0xF6, 0xB4, 0x38, 0x88, 0xE3, 0x01, 0xE5, 0x5A, 0x23, 0x7C, 0x9C, 0x0B | |
| ] | |
| DEV_MODULO = [ | |
| 0xB1, 0xAA, 0x6C, 0x55, 0x3C, 0xA8, 0x4D, 0x83, 0x3C, 0x2E, 0x97, 0x56, 0xB5, 0x2B, 0xD3, 0x70, | |
| 0x1D, 0x0F, 0xD4, 0xD1, 0xEE, 0xF1, 0x71, 0xF4, 0xFD, 0x95, 0x96, 0x1D, 0x52, 0xBF, 0x75, 0x63, | |
| 0xB8, 0x9D, 0x2F, 0xF5, 0xF8, 0x15, 0xE4, 0x0A, 0x76, 0xE2, 0x0F, 0x55, 0x11, 0x63, 0xE9, 0xE9, | |
| 0x85, 0x68, 0x41, 0x5A, 0x28, 0x31, 0x22, 0xE1, 0x99, 0xDE, 0xEC, 0x77, 0x17, 0x12, 0xC6, 0x78, | |
| 0xDA, 0x0B, 0xB4, 0xDD, 0x50, 0xF3, 0x0C, 0x61, 0x5F, 0xA5, 0x7D, 0xEA, 0x74, 0xD7, 0x1D, 0x11, | |
| 0x87, 0xBF, 0xEB, 0xC3, 0x33, 0xD7, 0x35, 0x0E, 0xDD, 0x45, 0x98, 0x1B, 0xEF, 0x6F, 0xB9, 0x73, | |
| 0xE8, 0x35, 0x9C, 0xE5, 0xB0, 0xC8, 0xFF, 0x5C, 0x42, 0x9B, 0xA7, 0x90, 0xAE, 0xF9, 0xB7, 0x62, | |
| 0x56, 0x04, 0xB1, 0xB0, 0xB2, 0x44, 0xD6, 0x86, 0x34, 0xE6, 0x2F, 0x79, 0x4D, 0x9C, 0xAF, 0xB5, | |
| 0x9A, 0x3B, 0xFA, 0xC8, 0x81, 0x03, 0x96, 0x6F, 0x9B, 0xDC, 0x87, 0x8B, 0x32, 0x3C, 0x37, 0xEB, | |
| 0xCD, 0x21, 0xC8, 0xB9, 0x27, 0x6F, 0xFC, 0xC8, 0x47, 0x02, 0xFF, 0x87, 0xD1, 0xD0, 0x2F, 0x64, | |
| 0xD4, 0x36, 0xD4, 0x85, 0x01, 0xAD, 0x70, 0xF3, 0xA2, 0xB1, 0x0D, 0x13, 0xEF, 0x55, 0x94, 0xA0, | |
| 0x23, 0x81, 0x71, 0xF9, 0x4A, 0xD2, 0x01, 0x58, 0x90, 0x60, 0x13, 0xFB, 0x6D, 0xB6, 0x18, 0x38, | |
| 0x31, 0xDF, 0x11, 0x44, 0xB5, 0x96, 0x49, 0xA3, 0x53, 0x08, 0xB2, 0x64, 0xC1, 0xEF, 0x11, 0x9E, | |
| 0x1D, 0x17, 0x17, 0x9A, 0x87, 0x44, 0x17, 0x3A, 0x73, 0xA2, 0xF7, 0xD9, 0x96, 0x1A, 0x79, 0xE1, | |
| 0xF9, 0x86, 0x6E, 0xEE, 0x6F, 0xBB, 0xD2, 0xDC, 0xCF, 0x3B, 0x0D, 0xC4, 0xE2, 0x76, 0xD1, 0xD0, | |
| 0xC0, 0x37, 0x98, 0xBE, 0xC1, 0xBC, 0xD9, 0x64, 0x6F, 0xC4, 0xCB, 0x46, 0xBB, 0x5F, 0xF5, 0x55 | |
| ] | |
| def check_serial(serial: str) -> bool: | |
| if len(serial) > 16: | |
| return False | |
| data = serial.encode("ascii") | |
| check_digit = int(data[-1]) - 0x30 | |
| even_sum = 0 | |
| odd_sum = 0 | |
| digit_count = 0 | |
| for i in range(len(data) - 1): | |
| digit = int(data[i]) - 0x30 | |
| if digit >= 10: | |
| continue | |
| digit_count += 1 | |
| if digit_count & 1: | |
| odd_sum += digit | |
| else: | |
| even_sum += digit | |
| computed = ((3 * even_sum) + odd_sum) % 10 | |
| if computed != 0: | |
| computed = 10 - computed | |
| return computed == check_digit | |
| def gen_signature(data: bytes, n: int, e: int, d: int) -> bytes: | |
| (p, q) = rsa.rsa_recover_prime_factors(n, e, d) | |
| dmp1 = rsa.rsa_crt_dmp1(d, p) | |
| dmq1 = rsa.rsa_crt_dmq1(d, q) | |
| iqmp = rsa.rsa_crt_iqmp(p, q) | |
| priv_nums = rsa.RSAPrivateNumbers( | |
| p=p, | |
| q=q, | |
| d=d, | |
| dmp1=dmp1, | |
| dmq1=dmq1, | |
| iqmp=iqmp, | |
| public_numbers=rsa.RSAPublicNumbers(e, n)) | |
| priv_key = priv_nums.private_key() | |
| return priv_key.sign(data, padding.PKCS1v15(), hashes.SHA256()) | |
| if __name__ == "__main__": | |
| rsa_e = 65537 | |
| # Ask for key type. | |
| while True: | |
| print("Select key type:") | |
| print("1) Retail") | |
| print("2) Dev") | |
| key_type = int(input("> ")) | |
| if key_type >= 1 and key_type <= 2: | |
| break | |
| print("ERROR: Invalid key type") | |
| if key_type == 1: | |
| rsa_n = int.from_bytes(bytes(RETAIL_MODULO), byteorder='big') | |
| else: | |
| rsa_n = int.from_bytes(bytes(DEV_MODULO), byteorder='big') | |
| # Ask for private exponent. | |
| while True: | |
| privexp_path = input("Private exponent file path: ") | |
| try: | |
| with open(privexp_path, "rb") as f: | |
| rsa_d = int.from_bytes(f.read(), byteorder='big') | |
| # Check private exponent. | |
| m = rsa_n//4 | |
| c = pow(m, rsa_d, rsa_n) | |
| computed_m = pow(c, rsa_e, rsa_n) | |
| if m == computed_m: | |
| break | |
| print("ERROR: Decryption test failed, invalid private exponent") | |
| except OSError: | |
| print("ERROR: File not found") | |
| # Ask for region. | |
| while True: | |
| print("Select region:") | |
| print("1) JPN") | |
| print("2) USA") | |
| print("3) EUR") | |
| print("4) AUS") | |
| print("5) CHN") | |
| print("6) KOR") | |
| print("7) TWN") | |
| region = int(input("> ")) - 1 | |
| if region >= 0 and region <= 6: | |
| # AUS -> EUR. | |
| if region == 3: | |
| region = 2 | |
| break | |
| print("ERROR: Invalid region") | |
| # Ask for serial. | |
| while True: | |
| serial = input("Serial (with check digit): ") | |
| if check_serial(serial): | |
| # Remove check digit. | |
| serial = serial[:-1] | |
| break | |
| print("ERROR: invalid serial") | |
| # Build file. | |
| secureinfo_data = [] | |
| secureinfo_data.append(region) | |
| secureinfo_data.append(0x00) | |
| secureinfo_data.extend(serial.encode("ascii")) | |
| secureinfo_data.extend([0x00 for _ in range(0xF - len(serial))]) | |
| signature = gen_signature(bytes(secureinfo_data), rsa_n, rsa_e, rsa_d) | |
| with open("SecureInfo_A", "wb") as out: | |
| out.write(bytes(signature)) | |
| out.write(bytes(secureinfo_data)) | |
| print("Done!") |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment