mirror of
https://github.com/SciresM/hactool
synced 2024-11-22 20:13:08 +00:00
2159f4396f
Passing in --sbk=, --tseckey= with -t keygen and an input BOOT0 BIS partition will now derive all keys derivable iwth the sources in the loaded keyset, and print them to output.
39 lines
1.2 KiB
C
39 lines
1.2 KiB
C
#ifndef HACTOOL_AES_H
|
|
#define HACTOOL_AES_H
|
|
|
|
#include "mbedtls/cipher.h"
|
|
#include "mbedtls/cmac.h"
|
|
|
|
/* Enumerations. */
|
|
typedef enum {
|
|
AES_MODE_ECB = MBEDTLS_CIPHER_AES_128_ECB,
|
|
AES_MODE_CTR = MBEDTLS_CIPHER_AES_128_CTR,
|
|
AES_MODE_XTS = MBEDTLS_CIPHER_AES_128_XTS
|
|
} aes_mode_t;
|
|
|
|
typedef enum {
|
|
AES_DECRYPT = MBEDTLS_DECRYPT,
|
|
AES_ENCRYPT = MBEDTLS_ENCRYPT,
|
|
} aes_operation_t;
|
|
|
|
/* Define structs. */
|
|
typedef struct {
|
|
mbedtls_cipher_context_t cipher_enc;
|
|
mbedtls_cipher_context_t cipher_dec;
|
|
} aes_ctx_t;
|
|
|
|
/* Function prototypes. */
|
|
aes_ctx_t *new_aes_ctx(const void *key, unsigned int key_size, aes_mode_t mode);
|
|
void free_aes_ctx(aes_ctx_t *ctx);
|
|
|
|
void aes_setiv(aes_ctx_t *ctx, const void *iv, size_t l);
|
|
|
|
void aes_encrypt(aes_ctx_t *ctx, void *dst, const void *src, size_t l);
|
|
void aes_decrypt(aes_ctx_t *ctx, void *dst, const void *src, size_t l);
|
|
|
|
void aes_calculate_cmac(void *dst, void *src, size_t size, const void *key);
|
|
|
|
void aes_xts_encrypt(aes_ctx_t *ctx, void *dst, const void *src, size_t l, size_t sector, size_t sector_size);
|
|
void aes_xts_decrypt(aes_ctx_t *ctx, void *dst, const void *src, size_t l, size_t sector, size_t sector_size);
|
|
|
|
#endif
|