Communication Processor: Difference between revisions
m (Post Scriptum) |
mNo edit summary |
||
Line 10: | Line 10: | ||
So use this Syntax after skipping the first 32 bytes of the file: | So use this Syntax after skipping the first 32 bytes of the file: | ||
{{keyboard|content=openssl aes-256-cbc -in psptoolupdate.bin -K E8ED2B817207B70C5DF9090507AF2A8982967620D692B92A59231638402DF13F -iv the_first_16_bytes_of_the_file -d > dec.tgz | |||
}}<br /><br /> | |||
PSP Hardware Tool Updates use the very same encryption but a different key inside the toolupdatedec binary. | PSP Hardware Tool Updates use the very same encryption but a different key inside the toolupdatedec binary. |
Revision as of 20:05, 17 December 2012
This is how to decrypt/encrypt Playstation 3 Reference Tool Communication Processor updates. (use this knowledge wisely)
This was achieved by exploiting the communication processor firmware and gaining root privileges on the running Montavista Linux. The key for the CP update packages is located within the toolupdatedec binary located at /usr/local/sony/bin/toolupdatedec
The update packages are just tar.gz packages encrypted using AES256CBC Here is the syntax to decrypt them :
The first 16 bytes of the package is the IV, the Second 16 bytes is the hash of the decrypted package.
So use this Syntax after skipping the first 32 bytes of the file:
openssl aes-256-cbc -in psptoolupdate.bin -K E8ED2B817207B70C5DF9090507AF2A8982967620D692B92A59231638402DF13F -iv the_first_16_bytes_of_the_file -d > dec.tgz
PSP Hardware Tool Updates use the very same encryption but a different key inside the toolupdatedec binary.
P.S. If you have any trouble extracting the tarballs, try using Linux.
- Mathieulh