forked from axi0mX/ipwndfu
-
Notifications
You must be signed in to change notification settings - Fork 0
/
usbexec.py
155 lines (138 loc) · 7.5 KB
/
usbexec.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
import struct, sys
import dfu, device_platform
class ExecConfig:
def __init__(self, info, aes_crypto_cmd):
self.info = info
self.aes_crypto_cmd = aes_crypto_cmd
def match(self, info):
return info == self.info[0].ljust(0x40, '\0') + self.info[1].ljust(0x40, '\0') + self.info[2].ljust(0x80, '\0')
configs = [
ExecConfig(('SecureROM for s5l8947xsi, Copyright 2011, Apple Inc.', 'RELEASE', 'iBoot-1458.2'), aes_crypto_cmd=0x7060+1),
ExecConfig(('SecureROM for s5l8950xsi, Copyright 2011, Apple Inc.', 'RELEASE', 'iBoot-1145.3'), aes_crypto_cmd=0x7300+1),
ExecConfig(('SecureROM for s5l8955xsi, Copyright 2011, Apple Inc.', 'RELEASE', 'iBoot-1145.3.3'), aes_crypto_cmd=0x7340+1),
ExecConfig(('SecureROM for t8002si, Copyright 2007-2014, Apple Inc.', 'ROMRELEASE', 'iBoot-2651.0.0.1.31'), aes_crypto_cmd=0x86DC+1),
ExecConfig(('SecureROM for t8004si, Copyright 2007-2014, Apple Inc.', 'ROMRELEASE', 'iBoot-2651.0.0.3.3'), aes_crypto_cmd=0x786C+1),
ExecConfig(('SecureROM for s5l8960xsi, Copyright 2012, Apple Inc.', 'RELEASE', 'iBoot-1704.10'), aes_crypto_cmd=0x10000B9A8),
ExecConfig(('SecureROM for t8010si, Copyright 2007-2015, Apple Inc.', 'ROMRELEASE', 'iBoot-2696.0.0.1.33'), aes_crypto_cmd=0x10000C8F4),
ExecConfig(('SecureROM for t8011si, Copyright 2007-2015, Apple Inc.', 'ROMRELEASE', 'iBoot-3135.0.0.2.3'), aes_crypto_cmd=0x10000C994),
ExecConfig(('SecureROM for t8015si, Copyright 2007-2016, Apple Inc.', 'ROMRELEASE', 'iBoot-3332.0.0.1.23'), aes_crypto_cmd=0x100009E9C),
]
EXEC_MAGIC = 'execexec'[::-1]
DONE_MAGIC = 'donedone'[::-1]
MEMC_MAGIC = 'memcmemc'[::-1]
MEMS_MAGIC = 'memsmems'[::-1]
USB_READ_LIMIT = 0xFFFF # why does that panic T8015 ROM?
CMD_TIMEOUT = 5000
AES_BLOCK_SIZE = 16
AES_ENCRYPT = 16
AES_DECRYPT = 17
AES_GID_KEY = 0x20000200
AES_UID_KEY = 0x20000201
class PwnedUSBDevice():
def memset(self, address, c, length): self.command(self.cmd_memset(address, c, length), 0)
def memcpy(self, dest, src, length): self.command(self.cmd_memcpy(dest, src, length), 0)
def read_memory_ptr(self, address): return struct.unpack('<%s' % self.cmd_arg_type(), self.read_memory(address, self.cmd_arg_size()))[0]
def read_memory_uint8(self, address): return struct.unpack('<B', self.read_memory(address, 1))[0]
def read_memory_uint16(self, address): return struct.unpack('<H', self.read_memory(address, 2))[0]
def read_memory_uint32(self, address): return struct.unpack('<I', self.read_memory(address, 4))[0]
def read_memory_uint64(self, address): return struct.unpack('<Q', self.read_memory(address, 8))[0]
def write_memory(self, address, data): self.command(self.cmd_memcpy(address, self.cmd_data_address(3), len(data)) + data, 0)
def write_memory_ptr(self, address, value): self.write_memory(address, struct.pack('<%s' % self.cmd_arg_type(), value))
def write_memory_uint8(self, address, value): self.write_memory(address, struct.pack('<B', value))
def write_memory_uint16(self, address, value): self.write_memory(address, struct.pack('<H', value))
def write_memory_uint32(self, address, value): self.write_memory(address, struct.pack('<I', value))
def write_memory_uint64(self, address, value): self.write_memory(address, struct.pack('<Q', value))
def cmd_arg_type(self): return 'Q' if self.platform.arch == 'arm64' else 'I'
def cmd_arg_size(self): return 8 if self.platform.arch == 'arm64' else 4
def cmd_data_offset(self, index): return 16 + index * self.cmd_arg_size()
def cmd_data_address(self, index): return self.load_base() + self.cmd_data_offset(index)
def cmd_memcpy(self, dest, src, length): return struct.pack('<8s8x3%s' % self.cmd_arg_type(), MEMC_MAGIC, dest, src, length)
def cmd_memset(self, address, c, length): return struct.pack('<8s8x3%s' % self.cmd_arg_type(), MEMS_MAGIC, address, c, length)
def load_base(self):
if 'SRTG:' in self.serial_number:
return self.platform.dfu_image_base
else:
return self.platform.dfu_load_base
def image_base(self):
if 'SRTG:' in self.serial_number:
return self.platform.rom_base
else:
return self.platform.dfu_image_base
def usb_serial_number(self, key):
for pair in self.serial_number.split(' '):
if pair.startswith(key + ':'):
k,v = pair.split(':')
if v[0] == '[' and v[-1] == ']':
return v[1:-1]
else:
return int(v, 16)
return None
def aes(self, data, action, key):
assert len(data) % AES_BLOCK_SIZE == 0
(retval, received) = self.execute(len(data), self.config.aes_crypto_cmd, action, self.cmd_data_address(7), self.cmd_data_address(0), len(data), key, 0, 0, data)
assert retval & 0xFFFFFFFF == 0
return received[:len(data)]
def read_memory(self, address, length):
data = str()
while len(data) < length:
part_length = min(length - len(data), USB_READ_LIMIT - self.cmd_data_offset(0))
response = self.command(self.cmd_memcpy(self.cmd_data_address(0), address + len(data), part_length), self.cmd_data_offset(0) + part_length)
assert response[:8] == DONE_MAGIC
data += response[self.cmd_data_offset(0):]
return data
def command(self, request_data, response_length):
assert 0 <= response_length <= USB_READ_LIMIT
device = dfu.acquire_device()
assert self.serial_number == device.serial_number
dfu.send_data(device, '\0' * 16)
device.ctrl_transfer(0x21, 1, 0, 0, 0, 100)
device.ctrl_transfer(0xA1, 3, 0, 0, 6, 100)
device.ctrl_transfer(0xA1, 3, 0, 0, 6, 100)
dfu.send_data(device, request_data)
# HACK
if response_length == 0:
response = device.ctrl_transfer(0xA1, 2, 0xFFFF, 0, response_length + 1, CMD_TIMEOUT).tostring()[1:]
else:
response = device.ctrl_transfer(0xA1, 2, 0xFFFF, 0, response_length, CMD_TIMEOUT).tostring()
dfu.release_device(device)
assert len(response) == response_length
return response
def execute(self, response_length, *args):
cmd = str()
for i in range(len(args)):
if isinstance(args[i], (int, long)):
cmd += struct.pack('<%s' % self.cmd_arg_type(), args[i])
elif isinstance(args[i], basestring) and i == len(args) - 1:
cmd += args[i]
else:
print 'ERROR: usbexec.execute: invalid argument at position %s' % i
sys.exit(1)
if i == 0 and self.platform.arch != 'arm64':
cmd += '\0' * 4
response = self.command(EXEC_MAGIC + cmd, self.cmd_data_offset(0) + response_length)
done, retval = struct.unpack('<8sQ', response[:self.cmd_data_offset(0)])
assert done == DONE_MAGIC
return retval, response[self.cmd_data_offset(0):]
def __init__(self):
self.config = None
self.platform = None
device = dfu.acquire_device()
self.serial_number = device.serial_number
dfu.release_device(device)
for dp in device_platform.all_platforms:
if self.serial_number.startswith('CPID:%04x CPRV:%02x ' % (dp.cpid, dp.cprv)):
self.platform = dp
break
if self.platform is None:
print self.serial_number
print 'ERROR: No matching usbexec.platform found for this device.'
sys.exit(1)
info = self.read_memory(self.image_base() + 0x200, 0x100)
for config in configs:
if config.match(info):
self.config = config
break
if self.config is None:
print info
print 'ERROR: No matching usbexec.config found for this image.'
sys.exit(1)