[THEAD ARCHIVED]

  • Thread starter Deleted member 11734473
  • Start date
Search This thread

adfree

Senior Member
Jun 14, 2008
10,384
6,055
Samsung Galaxy Watch 4
Samsung Galaxy S22
Tiny progress...

I have now 1 Cert... inside this DRK Chain...
+ private Exponent :alien:

Maybe this helps with older steady... like our examples with SM-G960F... SM-G970U...


Need some time to check...

I have only SM-A202F... maybe this supports the old steady...


Results later...


Best Regards
 

Attachments

  • 1certFromDRKChain_v1.jpg
    1certFromDRKChain_v1.jpg
    49.2 KB · Views: 46
  • Like
Reactions: goofwear

adfree

Senior Member
Jun 14, 2008
10,384
6,055
Samsung Galaxy Watch 4
Samsung Galaxy S22
Need some infos about Phones... which can display Error Codes...

My SM-A202F shows only this text:
Code:
TOKEN unique is invalid


User with SM-A015F showed me photo... after this text...
Code:
-11

Unknown Phone... No idea which Model Name... shows full error Code.

About DID...

My SM-A202F have only 12 Byte instead 16 Byte...


Best Regards

Edit 1.

Photo could be from SM-G988U... So IMHO S20 Ultra shows full error Code

Edit 2.
-11 could mean this:
Code:
// Error codes.
#define EM_NO_ERROR                      0
#define EM_INTERNAL_ERROR               -1
#define EM_PERMISSION_ERROR             -2
#define EM_NOT_SUPPORT_MODE             -3
#define EM_NOT_ALLOW_MODE               -4
#define EM_INVAILD_INPUT                -5
#define EM_INVAILD_STORED_TOKEN         -6
#define EM_INVAILD_OTA_TOKEN            -7
#define EM_NOT_SUPPORT_VER              -8
#define EM_NOT_SUPPORT_CERT_NUM         -9
#define EM_OPENSSL_ERROR                -10
#define EM_WRITE_TOKEN_ERROR            -11
#define EM_READ_TOKEN_ERROR             -12
 

Attachments

  • withErrorCode_v1.jpg
    withErrorCode_v1.jpg
    51.5 KB · Views: 44
  • maybeErrorCode_v1.jpg
    maybeErrorCode_v1.jpg
    49 KB · Views: 44
Last edited:

adfree

Senior Member
Jun 14, 2008
10,384
6,055
Samsung Galaxy Watch 4
Samsung Galaxy S22

Only as info...

Root CA is created in 2013...

This Thread shows activity since S6... in 2015...

Best Regards
 
  • Like
Reactions: goofwear

adfree

Senior Member
Jun 14, 2008
10,384
6,055
Samsung Galaxy Watch 4
Samsung Galaxy S22
Please need help.

For tiny experiment I need Tool or script to create big Prime Numbers in HEX...
128 Byte lengths

The idea is BETWEEN:

Code:
A000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000

and maximum 128 Byte lengths "content":

Code:
FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF

And store result in file... would be perfect...


I have "few" Tools to this by stupid clicling... and random... but I need ALL primes...

Example for few big Primes in this "dream area":

Code:
F06E83B71E1565AC17274E245771A672347AE49AE1CAA25BDB06C0F3B172DE442BB55B0AB813D363D99C4A748F382299668EE49A3AC599E1927E50ADB64EA4AFFDBF6509839B7E1ABFAF367CE77A0D07869B6A90DC8A097B899D25BF78AB52B67BA47DCDE1386C407898D969AF7E19B87CDB031831CA500D77E44641C9D31967

F32C5F9E36BE948AEB8F387ACD4630FFBF31593A2CE2384338FBE2A592A36E1A529B82BF48707D10E2130DD6784E9A7D4D021A8785ED03C0E4D0A880B27E0FA1ECB8D7D69C298521DB6B3DA5CBC2DB75F178B00C009CCC145030B46CC9402B793C768E7B1FCCF366A4FFB4880F3BB182A12F983941E32F4794FFA4111336FE3B

F3C0626C1B75DE0F323E11225E196A56B631438EDAC6E7156E5F8EFAF1EC426EFE713664F227C33445F73116E2932B1364738B08FCCB10B8CC29C21937CAF44934981EBC02CF27E749E27D9A22E6E02D252FA3538D3637F3681179CD865358AE047063A5A5D32FEAE8EAE7D7ABA809B652BFCAEC0BABE130797591F4CFC81689

F41597837785A0C83789CFDE0A1E05BC053C6328F6F435B4C6F9678640B42790DE6CE8C0467CDBB0A2D238B429DF66CFBA6DC8645283C4A27D3CD29C5E52B108ED97310648DB0962E6A1721AE50CD6FBB1C8DC018751B5A29A423C78D5CB9B2B61E6B00E44D931EDCE971D092450D7561E892DC6B4AB3099EBCC36EB12272FAF

FF933182932492BFB4928D3BED4496AEA9E89A254D6EE3E2D8741770CEDED7A1F5EA846E0BF30D7A191D60C086898D976B5A2547B7FD4F345502DD378068349569756AD6AD4C96B826D4CE966477D6A9E23582DEB7E050CCE3B858D92254F02AEBC7B0E7F57C46B1ED7DCBC43810E74626E72A520FD749BFB6D1FCA8D53EF9CF


Thanx in advance.

Best Regards
 

adfree

Senior Member
Jun 14, 2008
10,384
6,055
Samsung Galaxy Watch 4
Samsung Galaxy S22
Interesting example for "random" Cert/Key creation from DRK world...

I am too lazy for all RSA 2048 Modulus... but here few:
Code:
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

8C5B29DBE2165F2B95A85F1DF9107D9F


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

915A0131844C32F9DCAD00B0D65749F0



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

90802DFB83CAE83D812BEC9FB2469E8C


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

98D83948C4F6A201DA6113DB41DDED71


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

8C2B18B2309E68B299B12715FAEBFBD5


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

8797CACD8DA48C9BF4CDD49D4A5262CF


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

858BDA623ABC915F14DAC317942CF4E5

The shorter is 16 Byte as Search HEX value or text string... instead the 256 Byte Modulus...

Only as info...

Best Regards
 

Attachments

  • random_DRK_CertKeyExample_v1.zip
    19.2 KB · Views: 19

adfree

Senior Member
Jun 14, 2008
10,384
6,055
Samsung Galaxy Watch 4
Samsung Galaxy S22
Memo to me...


Code:
D:\openssl>openssl prime -hex 2f
WARNING: can't open config file: C:\Build-OpenSSL-VC-32/ssl/openssl.cnf
2F is prime


Code:
D:\openssl>openssl prime -generate -bits 64
WARNING: can't open config file: C:\Build-OpenSSL-VC-32/ssl/openssl.cnf
14714640941308689713

Code:
D:\openssl>openssl prime -generate -bits 64 -hex
WARNING: can't open config file: C:\Build-OpenSSL-VC-32/ssl/openssl.cnf
C177247FA4858DF1

Found here:


So IMHO for 1024 bit Primes... for my tiny RSA 2048 Project...

Code:
D:\openssl>openssl prime -generate -bits 1024 -hex
WARNING: can't open config file: C:\Build-OpenSSL-VC-32/ssl/openssl.cnf
CE6F1F86D140DDE68A99F44EA84010FEE223EDA4DADFB0677C7DC2F2638ACE2DDCBBA122432F8B9A2A3CD8E15AAFABE4C06E1F71D77ED17E2B70F01C786006CC63828C516512385AFD038604CD0DFABD5205282743CF18BB98107A6D7462E0DCD50BE1E929FA195A040FEE56E17AB58CACF318AC200334819BE379CB84E06F9D

D:\openssl>openssl prime -generate -bits 1024 -hex
WARNING: can't open config file: C:\Build-OpenSSL-VC-32/ssl/openssl.cnf
D07CC9B5326E040C5ADE053423E715CE4F63AAE7FECBF8F187CFA7A2776F4724F183C06D23836D4CF48CDD01256278B2C47E96A9D160896DC7D3D96E05778F809F86D135A62CD257CC99D3B60ED49E9C2D9D607CCE024887FB21C3797E53DB8ADCEC4A13E7EB8BA58AA015EEDE95363D6E589C1A8E17D68A34EF2332A68C43F7

D:\openssl>openssl prime -generate -bits 1024 -hex
WARNING: can't open config file: C:\Build-OpenSSL-VC-32/ssl/openssl.cnf
E8C77F52CD27A378FCCC3AC79F19CDFB558AF3E6D11F09840A900018A6E208BC5B9343C2F298264E96779972141D23E1D673306689E06EC10F8156030B8394F4C1E3873BEE278B6FDFE1754994504E43BD95D37A1F22F28E57F19FD1FAFAC86CA18FEB18BAA87E9F36ECCBB6E76134DC4209E7A5ED25B09219D71FC6054D533F

D:\openssl>openssl prime -generate -bits 1024 -hex
WARNING: can't open config file: C:\Build-OpenSSL-VC-32/ssl/openssl.cnf
D2EA8F64785B9ADC594DB061198B6EC12E6CB9BEB9FD794662AEF3E10F72CFFDC5E7699EE66BFE5179E6D4E5B0685378C100CC169B2BDCBFFF2E833D3C55076568B93F948064055A29E7D9DC4423B34377DFAA884C0628B4E93832117B924C3D5970236D191C400C6C2F7560388DF98ABDDFBC4762C241099438935601697DDD

D:\openssl>openssl prime -generate -bits 1024 -hex
WARNING: can't open config file: C:\Build-OpenSSL-VC-32/ssl/openssl.cnf
FC46086450E114D675DE5A65D8658A0589CBA7DFE73672204F508FEB3FBA9B8F84154A1C3D3DD94282C17A3FFEC09EB27C7E517C57A30463B780E0506D4293A6259C45F47F17C6F43BCE35157E0BCB6539021C6CED90F6FAF2F1480E3F5470E2D46807DE00220CC8C25E3BEBF0922612A58E89373A852FD28B51B1A0B86C58B9

D:\openssl>openssl prime -generate -bits 1024 -hex
WARNING: can't open config file: C:\Build-OpenSSL-VC-32/ssl/openssl.cnf
C7E3FB1A1E9BC33A982EEDCE3A9221E3600DA125ADBE696C04F673DCAFFB83691CCAF653ECD1766F5E582863D65AF819998C7365E476199DEE0BB7205BA00FE911A7E6BFB0DE90DE183EBED1D1F55B39283EE42EC6FEE326A5E988723C9BD53C5BE44FB311FB46746446C30096C8C40C79A83FD0037EC3722132B62D737E40CD

D:\openssl>openssl prime -generate -bits 1024 -hex
WARNING: can't open config file: C:\Build-OpenSSL-VC-32/ssl/openssl.cnf
D608EAC3660334EE62E7D4A6FF6B3BD533F0077DD25E0719A08B82D4A2591BAE7B37B099292F3EC0BBC64B04EC1641855025FB8EB163E47AD3ACB231C44FC7172DB48363FF6AF50252A0CE904F45D8E086FE774633BD5C7A9BA6E8E3405E273133D7FBBD46AF3FD562BBA484E852DE73A0FF67D2FBDF5495CD6B25B06760B327

D:\openssl>openssl prime -generate -bits 1024 -hex
WARNING: can't open config file: C:\Build-OpenSSL-VC-32/ssl/openssl.cnf
D102EB093A315DD0E0DEECF427B902484F352184D67429EE8205FDDD1399043A8BBAA3BFFBBEFD68C000B81B142F442A2B0FB0A5E3B3407D291F739C3D151CA51632A459E9B60C2E00C27EE7032C009ABF29DD81A8CCF11EBDD16274EDD7F24A7F046B47570D5ABB066DBDFB5F4D0848E4D502F9C14A7944F5C0D58A28FBD8C9

D:\openssl>openssl prime -generate -bits 1024 -hex
WARNING: can't open config file: C:\Build-OpenSSL-VC-32/ssl/openssl.cnf
D09C4E81EB0E3ABBFDAD89DC4A83EBD839482472720B77A3CD880342C905F4EE632CFE793838683D8EAEA39C342A8A5D57594D0812C06B2F6DE5CF81928F8B9188AC31A740344B8EC007727232081940ABBF9FD55E56DC81829BB08F8E75BC5328FF8F331DC6731A05C3152143AEB68C742AFE7118A9D789B1857F32ED64732F

D:\openssl>openssl prime -generate -bits 1024 -hex
WARNING: can't open config file: C:\Build-OpenSSL-VC-32/ssl/openssl.cnf
C056D69604C88F885B227AF7653372E683FB2828EFADF0E987BB8E507A0A8BCA45D3739C12352FB722C5FFEA50912F058C498030E536738D5C6F66B55215D6793BED30D90EDC8D08C8D601DE351C668AC4E5EE7FFD8EF6383EAC70406AAF33D10F5DD45CA3F6DBAF7347E03494AC557754802CFB09F7E056CF880CCDBB02DEC7

D:\openssl>openssl prime -generate -bits 1024 -hex
WARNING: can't open config file: C:\Build-OpenSSL-VC-32/ssl/openssl.cnf
C88191695FC78C1349593360BF20A50942F24FB50828F8821365E3E65E5ACD2FBF4305B14A981B3732DCBE0090D4E7EA9E0878F0356369C74FBF540B79DDE847BD0AF15F9E3A4637DC243AB2C9312DE675E24EAE9638E1BEA4FE112F65EC1666B99611B270D3A7B342F8893AC0BD2DD60F0DDB490AAA2EC0688D61C3F76973BD

D:\openssl>openssl prime -generate -bits 1024 -hex
WARNING: can't open config file: C:\Build-OpenSSL-VC-32/ssl/openssl.cnf
C6FB81E042199F8EABA6FBCEB2F97BE32F4CFD186CD7F7D17C9D678E2284E9759D630446742229A5D518F64B91ABD58AD16D4754D4262731BB99460701B2C6067023C9D51CFDD995E9C1B12F544C169EE4DB4E31D98EAA3C5344F229D7C47CAEFEAACCF83C3ED309735462434FABD06088EBB03478F23345981D42FB5A1AF59B

D:\openssl>openssl prime -generate -bits 1024 -hex
WARNING: can't open config file: C:\Build-OpenSSL-VC-32/ssl/openssl.cnf
FF1106EF94AD800808F20B96728F7062AE53FD4D8D900610F414A9BBEF4F9BA9FCCAB96EEB24A2FFE6BD92FD51C8447FDEA05D8BAB1C6AD4EEF1CD83E33253F41B988F0740F3BF39CDDA27BE554163A079EE48D81F70BC26E97249DFC59D46811F990B3C603D44E1C3E0587D84C55997E59FB87F83E3D080B72EB150F661AFCD

D:\openssl>openssl prime -generate -bits 1024 -hex
WARNING: can't open config file: C:\Build-OpenSSL-VC-32/ssl/openssl.cnf
E24BE8EAFF4C91DF1C140398768E7CC72154CF553B55D58B09CFBE0E54D33E5D266A0DCDDD690B5AEFEB96C15A877556E2C5921A873A7189E144FDABDF05CDDF79A4B5E70A51900EA8CB6221A4CC63E41379D2AEDD4D350406032C53D2E045BEEBE60C99B6E9FE34D7B0C2A366C05A67C414040FE4D61EDBC7313FADB715F339

Edit 1.

Aha... interesting...

What is OpenSSL CNF?


The openssl. cnf file is primarily used to set default values for the CA function, key sizes for generating new key pairs, and similar configuration. Consult the OpenSSL documentation available at openssl.org for more information.

Found via Google search for:
Code:
WARNING: can't open config file: C:\Build-OpenSSL-VC-32/ssl/openssl.cnf
 
Last edited:

adfree

Senior Member
Jun 14, 2008
10,384
6,055
Samsung Galaxy Watch 4
Samsung Galaxy S22
Tiny manually test...

Code:
Prime number (Bitsize: 0) (*): p
============================================================= hex ====
FF1106EF94AD800808F20B96728F7062AE53FD4D8D900610F414A9BBEF4F9BA9FCCAB96EEB24A2FFE6BD92FD51C8447FDEA05D8BAB1C6AD4EEF1CD83E33253F41B988F0740F3BF39CDDA27BE554163A079EE48D81F70BC26E97249DFC59D46811F990B3C603D44E1C3E0587D84C55997E59FB87F83E3D080B72EB150F661AFCD

Prime number (Bitsize: 0) (*): q
============================================================= hex ====
FC46086450E114D675DE5A65D8658A0589CBA7DFE73672204F508FEB3FBA9B8F84154A1C3D3DD94282C17A3FFEC09EB27C7E517C57A30463B780E0506D4293A6259C45F47F17C6F43BCE35157E0BCB6539021C6CED90F6FAF2F1480E3F5470E2D46807DE00220CC8C25E3BEBF0922612A58E89373A852FD28B51B1A0B86C58B9

Modulus (Bitsize: 2048): n=p*q
============================================================= hex ====
fb5a89d8375138996405b4672c30a1d29f405b7ff8f69d2296d7bf63b02835148d92cf949a3ccc47e57b1865bf0eaa75df75abbe0c1d427c3ba1411140e8719a870d9ea12e695b38504c5f327d96fe1818c86b03b5f4349ec9a5da42e9a600cb423d5db89d135def8c8fff9b06a9076a27e94176dd08831fd0329b1464939f75f02a85eac71aa1c70eb79e4a4a8039e31750d90d27254465a7e0273eae4c10adce2792cdfc79fd3e4685c7feb3e2cfda99e699c87d764cc08905d8f6ac4bf3fa29d3c51e4821b068b55f94bf448751f188b0249f1f839cbbbbb58f5eb0b4335825932236885126cc3230d4aaf9edcaad4ab018e1c25b689be367bce523828325

Euler's phi(n) function (*): phi(n)=(p-1)*(q-1)
============================================================= hex ====


Public exponent: e [1 < e < phi ;  e and phi are coprime]
============================================================= hex ====
10001

Private exponent (*): d=(e^-1) mod phi
============================================================= hex ====
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

Chinese Remainder Theorem (CRT) exponent 1 (*): dP=d mod (p-1)
============================================================= hex ====
75dc1d5359652e730807283995a8182b511878447cb45f49382fd01a8a4343cfb182cf5aa487225692fd684d6b9bd9a32870fba8cd216d700515707c8fe03290eaab7cf3c21c9f710b60d1da8e348fdf9857f60affc42cfce20430849920ca7261f26b11b3fabbb882b548ce7f2a5df2e564ff70d4b5d12399019767ace188c5

Chinese Remainder Theorem (CRT) exponent 2 (*): dQ=d mod (q-1)
============================================================= hex ====
8c1d99ab9e0065c277d4f80079206c788700464d65ee27952a78647714fe604865e42d35620e680d38f29d23ce2acdf9f48b7456cb960f6a1311d184da2a903747cc744e4808bcc80a2f8dec5205db026d976e9251a0a28cdf4283f2e5d9d0992bc05c1e4194a7e5198f9d587e55ae2fcd244db20f1eca60f6607977faf6b29

Chinese Remainder Theorem (CRT) coefficient (*): qInv=(q^-1) mod p
============================================================= hex ====
47a07bd17935837d2eae60b52ef61fafcd761761b76b3e3a24fbdd69ef18ba63e1fba454ab0fcc07dbb4d65f37ce9dea838c5e74091c4e16f4d70bc422a7c3edb14313954abddce622be405836c8728efd0d0db20bcde9351b097860ad510dbf8811a898bead7cd19f6acb57a736b3466d4d7afda518aec38fd582680bc0ada3

Plaintext:
======================================================================


Message: m
============================================================= hex ====


Ciphertext: c = m^e mod n
============================================================= hex ====


Time to encrypt the message (m):
============================================================= sec ====


Time to decrypt the ciphertext (c) with the private key A:
============================================================= sec ====


Time to decrypt the ciphertext (c) with the private key B (CRT):
============================================================= sec ====


(*) Keep this information secret!


Second attempt with same p...

But smaller q

Code:
Prime number (Bitsize: 0) (*): p
============================================================= hex ====
FF1106EF94AD800808F20B96728F7062AE53FD4D8D900610F414A9BBEF4F9BA9FCCAB96EEB24A2FFE6BD92FD51C8447FDEA05D8BAB1C6AD4EEF1CD83E33253F41B988F0740F3BF39CDDA27BE554163A079EE48D81F70BC26E97249DFC59D46811F990B3C603D44E1C3E0587D84C55997E59FB87F83E3D080B72EB150F661AFCD

Prime number (Bitsize: 0) (*): q
============================================================= hex ====
E24BE8EAFF4C91DF1C140398768E7CC72154CF553B55D58B09CFBE0E54D33E5D266A0DCDDD690B5AEFEB96C15A877556E2C5921A873A7189E144FDABDF05CDDF79A4B5E70A51900EA8CB6221A4CC63E41379D2AEDD4D350406032C53D2E045BEEBE60C99B6E9FE34D7B0C2A366C05A67C414040FE4D61EDBC7313FADB715F339

Modulus (Bitsize: 2048): n=p*q
============================================================= hex ====
e178aa2e1ba96fe461d41e3664334b8f0f4e6f7f86537e3eb41123ee715f9569587522b7ffd82642c0891e9b26ec9a63a1762296e1cfff3b90bc92eeaa8f624487678f24660ae6795c976417a72a950c4a99e6bb14525da4350fb045035890e145690c2871803845e8450e9b8ea43ec69b717edcbf1aaec8e83b7b1eef14f2781f77ca0a7c2cfcc34fbf4ed398dcceeaa76ac92485c83e61186226e7c8f95d656468be137a735c50dbf85b5662ce29c538537ccdedeb016fc6c71f848ab4c8327df4d14350600c791ec00a3e209ecb3584e90bb0574fed8433c7d46ce9823bab30336e340c33affd70bddce0814133ec580d5e88a3e4453212fda01d8c70bba5

Euler's phi(n) function (*): phi(n)=(p-1)*(q-1)
============================================================= hex ====


Public exponent: e [1 < e < phi ;  e and phi are coprime]
============================================================= hex ====
10001

Private exponent (*): d=(e^-1) mod phi
============================================================= hex ====
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

Chinese Remainder Theorem (CRT) exponent 1 (*): dP=d mod (p-1)
============================================================= hex ====
75dc1d5359652e730807283995a8182b511878447cb45f49382fd01a8a4343cfb182cf5aa487225692fd684d6b9bd9a32870fba8cd216d700515707c8fe03290eaab7cf3c21c9f710b60d1da8e348fdf9857f60affc42cfce20430849920ca7261f26b11b3fabbb882b548ce7f2a5df2e564ff70d4b5d12399019767ace188c5

Chinese Remainder Theorem (CRT) exponent 2 (*): dQ=d mod (q-1)
============================================================= hex ====
d09b65856bff2be15e42dce5a934c4b5d4761802dc05ce2ab3cabbcafe4b158c4d232ac281be99e724902a92e75f43bdeaa27282ddf1f444445392fce344b879afeb347c5d38bef1a48c8853b7556b280f0418417663fbe14fa191355c89be01b7f883d9179330f1897bba9162e122f5d0fd1a99843c168a475f90f2147ab991

Chinese Remainder Theorem (CRT) coefficient (*): qInv=(q^-1) mod p
============================================================= hex ====
8fb1ac7b5e626cc08c7816ff5660a54059bd59ad2ed2d9a0154a7a5205e63f410b84e24f5c05ad808f2e01a65f38fd098c889b18534e436cf7febef055e1b23457bc91120a85db34f14d81adc104dce2865ef6600f04e685163375036b6545147128b094a143b54f1c2dd34b21ac7945b7e2fb66f1f1e8d5915f972f77202f8e

Plaintext:
======================================================================


Message: m
============================================================= hex ====


Ciphertext: c = m^e mod n
============================================================= hex ====


Time to encrypt the message (m):
============================================================= sec ====


Time to decrypt the ciphertext (c) with the private key A:
============================================================= sec ====


Time to decrypt the ciphertext (c) with the private key B (CRT):
============================================================= sec ====


(*) Keep this information secret!


Now maybe please look at my prior posts about Root CA Modulus...


Best Regards
 

adfree

Senior Member
Jun 14, 2008
10,384
6,055
Samsung Galaxy Watch 4
Samsung Galaxy S22
Code:
Prime number (Bitsize: 0) (*): p
============================================================= hex ====
E393CC285C8C4AE1202C17F10BF6CAD42711CBD750C5519A692E80762CCECFD0070D31EB0635A4B19A973B89043B56B12C743C3F6B9107FE9C164CFE324F19B6DE6A0C324F0E2A5F19B8B5DC9D916FA0AC688392D387D89456861056AF4B6D510C4F7B741D7501BD7CEEAF4D89AC5FDD7BC1E47122764525997A4D7194DCA5FD

Prime number (Bitsize: 0) (*): q
============================================================= hex ====
E24BE8EAFF4C91DF1C140398768E7CC72154CF553B55D58B09CFBE0E54D33E5D266A0DCDDD690B5AEFEB96C15A877556E2C5921A873A7189E144FDABDF05CDDF79A4B5E70A51900EA8CB6221A4CC63E41379D2AEDD4D350406032C53D2E045BEEBE60C99B6E9FE34D7B0C2A366C05A67C414040FE4D61EDBC7313FADB715F339

Modulus (Bitsize: 2048): n=p*q
============================================================= hex ====
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

Euler's phi(n) function (*): phi(n)=(p-1)*(q-1)
============================================================= hex ====


Public exponent: e [1 < e < phi ;  e and phi are coprime]
============================================================= hex ====
10001

Private exponent (*): d=(e^-1) mod phi
============================================================= hex ====
dae60a8665951bd6ad97b256027e20145fd3b4465ca97a65343878b74e8de10aced362154536ca90f6d7ade5c7c47ad49fe4fec87aa571a8d9f1720cae44327c1421325b50af422dc9764fa829195fa36f84759704b849810b3c17f68ee4829a3dc39f959d6b54ec886d744d6cfb1df974f4352054594ed5cf257c04e263ff24ccb1c6cef4f9728fef36de04892f4ea289656c45c95ca9f180a4ea2e10e4fa862d06f3868def3b006f33f211c55a4c4459837f149cc2a7ba2e9ccd5b6c20d64f38b06967e6bb90a53bf315945d210b73bc1fd26948f5dbf3f5449738603ce4284dcfff864e01a85279178707ddc2a31f5fba244a3cd2485ff420f55ad77e821

Chinese Remainder Theorem (CRT) exponent 1 (*): dP=d mod (p-1)
============================================================= hex ====
35fa001a329933c9619013bda050d09ab1098f876a28e2c9f4d88aaf7cc13098ee933a9bbbc54d62b27fdc270b51e7a5ee1d438ce73e66df04b6655c85222dbf29d18d43016d22af9bb22bb03fcf16e2cd019cf35e28823deca7af885fdb4bfa452934e6bd75db0bce6dee363dc91c93b39eb148041c791a09e4f029585d5d21

Chinese Remainder Theorem (CRT) exponent 2 (*): dQ=d mod (q-1)
============================================================= hex ====
d09b65856bff2be15e42dce5a934c4b5d4761802dc05ce2ab3cabbcafe4b158c4d232ac281be99e724902a92e75f43bdeaa27282ddf1f444445392fce344b879afeb347c5d38bef1a48c8853b7556b280f0418417663fbe14fa191355c89be01b7f883d9179330f1897bba9162e122f5d0fd1a99843c168a475f90f2147ab991

Chinese Remainder Theorem (CRT) coefficient (*): qInv=(q^-1) mod p
============================================================= hex ====
d08774e861f6a42ac99bde74a69a8380d9eee82df5b0c5776c4b6073a3ae51f979c0232f645efb607348c4676ad54b6eb4a7e20e96098efdfd678a4034c46748d18499826b7fa84a4388b4ec88f3aee10e27682fc6d1d74a7bfb99061996aad950f5952b095d8019d76efdf061f627c9180ac1cb26d60f563ead81db323b4e0

Plaintext:
======================================================================


Message: m
============================================================= hex ====


Ciphertext: c = m^e mod n
============================================================= hex ====


Time to encrypt the message (m):
============================================================= sec ====


Time to decrypt the ciphertext (c) with the private key A:
============================================================= sec ====


Time to decrypt the ciphertext (c) with the private key B (CRT):
============================================================= sec ====


(*) Keep this information secret!


Here are p and q too small to compute Modulus with E0...

Only Modulus C9...

Best Regards
 

adfree

Senior Member
Jun 14, 2008
10,384
6,055
Samsung Galaxy Watch 4
Samsung Galaxy S22
I have NOT many device(s) at home for tests...

Photos from my SM-A202F Bootloader Version U3.

ENG and Custom Mode no idea yet... maybe better if Knox not 1...

But FACTORY BIN ALLOWED tested successfully by flashing different Combination Firmwares...


I have NO luck yet with my SM-G965F Bootloader Version UH aka 17
Tested also SH is also 17... but also no success...
I can not downgrade nor find Combination Firmware for BL Version 17... only 11 leaked...

Only as info of progress...

Best Regards
 

Attachments

  • smA202F_U3_CustomAndFAC_v1.jpg
    smA202F_U3_CustomAndFAC_v1.jpg
    51.2 KB · Views: 20
  • smA202F_U3_ENG_v1.jpg
    smA202F_U3_ENG_v1.jpg
    89.1 KB · Views: 20

adfree

Senior Member
Jun 14, 2008
10,384
6,055
Samsung Galaxy Watch 4
Samsung Galaxy S22

I am searching for Tester(s).


Helping me to solve my SM-G965F Problem...
Code:
#define EM_ERR_ABNORMAL_CORE            0xF0000027


Maybe somebody have still S9 Samsung. For stupid test(s)...
Bootloader Version is not important... it could be oldest or latest...

Thanx in advance.

Best Regards
 

adfree

Senior Member
Jun 14, 2008
10,384
6,055
Samsung Galaxy Watch 4
Samsung Galaxy S22
Code:
Prime number (Bitsize: 0) (*): p
============================================================= hex ====
F5870E6F89EB6D4F1F30DCF994508385B53F2609A4C3C8749E37019E959190B51D99AB7F29A3C4FE583BD118AA1BD662B4795ABCF7646B06EBD447152FC51604202EA498C4AFE6DFBBC5016DC166E114CA38E6B82D1B7392D8C30D68B3D956BD9B2D4ADBF3FA3B74254F81F0C0EB7C5E7C99ACC5A05E9C146AEAF9AEF4798D95

Prime number (Bitsize: 0) (*): q
============================================================= hex ====
EA58AF11D3137E8B192002E791D7284054FE79BC8628AB589A34B9039A5127CA25E1A8B9CB05E0F926DF8B63847C57FA5362AE4FEF2511F3A2F493D506FB972323D5D4ED5E5F30F27A170FC5A88D75DBA8D35684BE9C22D28E9235C60035FBBAFC86E27ABCF1269BB38B8B198B8FE8EE728FA569097B4285481F53D5F340AF88

Modulus (Bitsize: 2048): n=p*q
============================================================= hex ====
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

Euler's phi(n) function (*): phi(n)=(p-1)*(q-1)
============================================================= hex ====


Public exponent: e [1 < e < phi ;  e and phi are coprime]
============================================================= hex ====
10001

Private exponent (*): d=(e^-1) mod phi
============================================================= hex ====
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

Chinese Remainder Theorem (CRT) exponent 1 (*): dP=d mod (p-1)
============================================================= hex ====
8cd698e04053ec92db48732932fb70464d6e58ca6559eced8027fb64d554f795fcd1be3f264a8be07e0a69e9e5022cdad7bd58e05664a2c40898eee167527d4b868e5ada4ad0bff58cc6f807d64dc644dfaefe219db6467870a08a5b89f6dcbbcc7c919953fd310771b386ccec4ce83d66e9dbe24d18981d5a2b496823526a75

Chinese Remainder Theorem (CRT) exponent 2 (*): dQ=d mod (q-1)
============================================================= hex ====
3c242451cbbcbe060e9da38130716a381057fa8002621f8f2e8c074b40684170e485e41a425b30e06034907e2abb0a8d08a7539ada01c678a342674a0d6fb5dae3d075c3b12b76d153b9e5675199743cba37fa8538b1b3521c1ab3c82bb7aef1ceeb02e682e4d486b2ee45f57956a66dc362d00d83cc6946f13a70f680660266

Chinese Remainder Theorem (CRT) coefficient (*): qInv=(q^-1) mod p
============================================================= hex ====
485871831a67bf7a19de16bee8de83079cc72cebfeff90649c414a719236312ec29faf4fb06127dabba51909f6b5e09c73a684eca0dcba032e79156a47723ed0c6f40f95880c412c203724a2b43b75826ee229e43da24a979fb0de2a91fde360608c16d572ab8a4940c8d9e62146df8efd0e9c45ff5b3b4faee72ee3d536992f

Plaintext:
======================================================================


Message: m
============================================================= hex ====


Ciphertext: c = m^e mod n
============================================================= hex ====


Time to encrypt the message (m):
============================================================= sec ====


Time to decrypt the ciphertext (c) with the private key A:
============================================================= sec ====


Time to decrypt the ciphertext (c) with the private key B (CRT):
============================================================= sec ====


(*) Keep this information secret!

Tiny progress...

Only as info.

Best Regards
 

noname9x

Member
Oct 28, 2017
5
0
@noname9x

ENGRES0001 have no INTE Text string...

This is the older Version...

No not encrypted... you can see adfree IMHO and other humanreadable text...

Best Regards
Interestingly, when I change "adfree" (HEX: 61 64 66 72 65 65) to "ddfree" (HEX: 64 64 66 72 65 65) and then flash with Odin. It just does not show anything on Download Mode. Like it was wiped out? I don't have rooted device to dd stready.bin afterwards and check. Do you have any idea?
 

adfree

Senior Member
Jun 14, 2008
10,384
6,055
Samsung Galaxy Watch 4
Samsung Galaxy S22
Interestingly, when I change "adfree" (HEX: 61 64 66 72 65 65) to "ddfree" (HEX: 64 64 66 72 65 65) and then flash with Odin. It just does not show anything on Download Mode. Like it was wiped out? I don't have rooted device to dd stready.bin afterwards and check. Do you have any idea?

steady.bin is "secured" by RSA 2048... like many other things...

SHA 256 HASH is ENcrypted with RSA 2048 Private Exponent...

If you change 1 Byte... you change HASH...

To compute new SHA 256 is NO Rocket Science...

The part with put SHA 256 Value into RSA 2048 Signature... also no Rocket Science.

But you need the RSA 2048 keys... AND the Cert valid from DRK CHAIN...

Best Regards
 
  • Like
Reactions: noname9x

Top Liked Posts

  • There are no posts matching your filters.
  • 1
    @noname9x

    ENGRES0001 have no INTE Text string...

    This is the older Version...

    No not encrypted... you can see adfree IMHO and other humanreadable text...

    Best Regards
    1
    Interestingly, when I change "adfree" (HEX: 61 64 66 72 65 65) to "ddfree" (HEX: 64 64 66 72 65 65) and then flash with Odin. It just does not show anything on Download Mode. Like it was wiped out? I don't have rooted device to dd stready.bin afterwards and check. Do you have any idea?

    steady.bin is "secured" by RSA 2048... like many other things...

    SHA 256 HASH is ENcrypted with RSA 2048 Private Exponent...

    If you change 1 Byte... you change HASH...

    To compute new SHA 256 is NO Rocket Science...

    The part with put SHA 256 Value into RSA 2048 Signature... also no Rocket Science.

    But you need the RSA 2048 keys... AND the Cert valid from DRK CHAIN...

    Best Regards
  • 3
    You misunderstand. I know there's no such thing as a global emtoken. I wanted a valid emtoken for an random DID. I didn't need one for any specific phone.

    It was for research. I found what i needed anyway.
    2
    Short looked into token examples...

    I see cer Cert... at end of file... so public key is visible inside...

    Model Name is human readable in Cert...
    SM-G960F1

    Its "only" RSA 2048...

    No idea if meanwhile somebody can compute this at home...

    All 6 steady are from SM-G960... no idea why first 1 shorter in length...

    And funny... I see DASEUL...
    Boah so long ago I had this Tool...

    Best Regards

    Edit 1.

    Example attached... if you know Cert *.cer begins with:
    3082 HEX

    You can find in these steady.bin...

    I saw 1 Base64 encoded crap... could be MD5 from lengths... 32 Byte...
    2
    D
    Deleted member 11734473

    @_guru_


    I wrote you few dayS ago Conversation aka Private message... few seconds ago tried second time...

    @goofwear


    I will contact you via Conversation... soon.

    Summary of today.

    First I replaced Cert inside steady as i thought it is damaged/incomplete...

    But my SM-R875F shows me this Error:
    0xf0100014
    Code:
    /* EM_CRYPTO_VERIFY_CERT */
    
    #define EM_ERR_EM_CRYPTO_VERIFY_CERT_SERVER_CERT             0xF0100014


    unmodified Original GW4 dumped steady shows this:
    0xf0220010

    Code:
    /* EM_CRYPTO_VERIFY_CERT */
    
    #define EM_ERR_EM_TOKEN_VERIFY_DID                           0xF0220010

    Then I insert my DID and got this Error:
    0xf0110015


    Code:
    /* EM_CRYPTO_VERIFY_CERT */
    
    #define EM_ERR_EM_CRYPTO_VERIFY_SIGN_NOT_MATCH_SIGN          0xF0110015


    Best Regards

    Edit 1.

    Sorry, I am the Id i o t...

    Did mistake by cutting Server Cert from dumped steady... few times
    So wrong conclusion from wrong cutting...

    Edit 2.

    Will do some exercise with this...


    I commend the work you've done on this. I figured I should share some of my findings since people were kind enough to share steady.bin


    Basically the steady.bin is the EM_TOKEN.

    The token contains various sections outlining config options for the device such as ENG mode stuff. The full capabilities of what the token can enable are unclear but you can look up some em_token tools to get an idea.

    This whole token has a section called INTE (for integrity). This section contains 2 parts:

    * A signed signature of the entire token
    * A signed "device" certificate that was used to sign and create the above signature. This certificate must be signed by an authority key. This is checked via a hardcoded public key in the bootloader during checking steady.bin


    Unfortunately the ONLY way you can create a valid EM_TOKEN is to have the capability to generate a signed device certificate. This cert is trusted by Samsung via the public key in the bootloader. As far as i know the only way to get said device certificate is to have an official Samsung signing server provide it for you.

    These EM_TOKEN services that people pay for likely have some rouge employees that have logins for the signing server. It's not uncommon is some parts of the world. These workers may not be paid well by Samsung so a side hustle can be worth it.

    Without the valid device certificate you will not be able to modify the EM_TOKEN. As you have noticed in your research: the device certificate will contain extended X509 options for stuff like "DRK" and base64 encoded info about the device.


    Unless someone gains access to the signing server to generate device certs for us, or leaks the private key associated with the public key in the bootloader, there's no path forward.


    NOTE: the validation process is a bit fuzzy. This is from memory. If anyone wants confirmation i will have to dig out my Ida .idb and check it again
    1
    D
    Deleted member 11734473
    UPDATE: I am marking this thread as archived as the original purpose of it was fulfilled.
    1
    Interestingly, when I change "adfree" (HEX: 61 64 66 72 65 65) to "ddfree" (HEX: 64 64 66 72 65 65) and then flash with Odin. It just does not show anything on Download Mode. Like it was wiped out? I don't have rooted device to dd stready.bin afterwards and check. Do you have any idea?

    steady.bin is "secured" by RSA 2048... like many other things...

    SHA 256 HASH is ENcrypted with RSA 2048 Private Exponent...

    If you change 1 Byte... you change HASH...

    To compute new SHA 256 is NO Rocket Science...

    The part with put SHA 256 Value into RSA 2048 Signature... also no Rocket Science.

    But you need the RSA 2048 keys... AND the Cert valid from DRK CHAIN...

    Best Regards