-
Notifications
You must be signed in to change notification settings - Fork 60
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Subaru SSM4 CMD_SecurityAccess #26
Comments
Here's some seed/key pairs from a 2021 Crosstrek eyesight module. ECU ID appears to be 12425. Tried your tool but couldn't get it to work for this ecu. Perhaps an endianness issue? ca5616c0 ce0baaff 1f5e4b83 8a598591 d121cfea 9c11699b 2714cb65 47e5e9fe |
Thanks! I've tried swapping the endianness of the inputs and variant keys and couldn't find a match too. Are those seed/keys generated through SSM4? I'm curious if it is using the same algo as the rip ( |
Yes they are generated by ssm4. I'll try putting a breakpoint at CMD_SecurityAccess to verify |
ECU Name
Subaru ECUs that depend on SSM4 CMD_SecurityAccess
Source file
SSM4,
CMD_FhiCan.dll
Additional context
Subaru ECU key material can now be extracted from SSM4 as the XML keys are now known. In their API definitions, there are typically two types of keys
CMD_SecurityAccess2018CY1
, already addressed hereCMD_SecurityAccess
, 4 input bytes, 4 output bytes. This is the target algoI've ripped and tidied up the raw x86 instructions, and stuck them into a keygen template. As of right now, I am unable to test if it is working correctly as I do not have a known seed/key pair with an associated ECU ID/variant.
Help wanted!
I would appreciate having seed/key pairs with the ECU variant (e.g. 12002/2EE2)
Here's the tool if you'd like to test the algo on your own: sandbox.zip. Windows-only, requires XP and above.
The text was updated successfully, but these errors were encountered: