Editing Sealedkey / pfsSKKey
Jump to navigation
Jump to search
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 1: | Line 1: | ||
This key can be found on different places and will be used for eg. SaveGame or Trophy Data decryption and encryption. | |||
==== Paths ==== | |||
= | |||
== | |||
{| class="wikitable" | {| class="wikitable" | ||
|- | |- | ||
! Kind !! Path | ! Kind !! Path | ||
|- | |- | ||
| | | Trophys || /user/home/[[User ID|user Id]]/trophy/data/[[sce_trop]]/sealedkey | ||
|- | |- | ||
| | | SaveGames || /user/home/[[User ID|user Id]]/[[NP Title ID|title Id]]/[[save data directory]]/[[sce_sys]]/ | ||
|} | |} | ||
= Structure = | == Structure == | ||
- size always 96 bytes | |||
{| class="wikitable" | {| class="wikitable" | ||
|- | |- | ||
! | ! From !! To !! Description | ||
|- | |- | ||
| | | 00 || 07 || MAGIC ("pfsSKKey") (?playstation file system sealed key key?) | ||
|- | |- | ||
| | | 08 || 0F || Category (game=1 or version ?) | ||
|- | |- | ||
| | | 10 || 1F || IV (16 bytes) | ||
|- | |- | ||
| | | 20 || 3F || Encrypted key (32 bytes) | ||
|- | |- | ||
| | | 40 || 5F || SHA-256 (32 bytes) | ||
|} | |} | ||
'''C''' | |||
<source lang="c"> | <source lang="c"> | ||
typedef struct sealedkey { | |||
const unsigned char MAGIC[8]; | |||
const unsigned char CAT[8]; | |||
const unsigned char IV[16]; | |||
const unsigned char KEY[32]; | |||
const unsigned char SHA256[32]; | |||
} selaedkey; | |||
</source> | </source> | ||
'''CSharp''' | |||
<source lang="csharp"> | |||
protected internal struct sealedkey { | |||
internal static byte[] MAGIC = new byte[8]; | |||
internal static byte[] CAT = new byte[8]; | |||
internal static byte[] IV = new byte[16]; | |||
internal static byte[] KEY = new byte[32]; | |||
internal static byte[] SHA256 = new byte[32]; | |||
} | |||
</source> | |||
Note: You can't use a const byte[] defination in C#. It need to be a static byte[]. | |||
== | == De/En -Crypting == | ||
Can be decrypted by frindly asking the OS to do it for you. You will need kernel rights to be able to ask the PS4 for it. | |||
<source lang="c"> | |||
* | /* Decryption */ | ||
* | #define foreach(item, array) \ | ||
* | for (int keep = 1, \ | ||
count = 0, \ | |||
size = sizeof(array) / sizeof*(array); \ | |||
{{ | keep && count != size; \ | ||
keep = !keep, count++) \ | |||
for (item = (array) + count; keep; keep = !keep) | |||
typedef unsigned char byte; /* byte defination for c/c++ */ | |||
const char USER1 = "10000000"; | |||
const char usb0 = "/mnt/usb0/"; | |||
const char usb1 = "/mnt/usb1/"; | |||
const char pfs = "dec_pfsSK.Key"; | |||
const char home = "/user/home/"; | |||
const char tropkey = "/trophy/data/sce_trop/sealedkey"; | |||
char usb_error = "[-] ERROR: Can't access usb0 nor usb1!\n[-] Will return now to caller.\n" | |||
char usb0path[(sizeof(usb0) + sizeof(pfs))]; | |||
char usb1path[sizeof(usb0path)]; | |||
/* Get's the encrypted sealed key based on user id */ | |||
int get_pfsSKKey(byte *buffer, const char *userID, char path) { | |||
char toOpen[(sizeof(home) + sizeof(userID) + sizeof(path))]; | |||
snprintf(toOpen, sizeof(toOpen), home, userID, path) | |||
FILE *pfskey = fopen(toOpen, "r"); | |||
if (!pfskey) return NULL; | |||
fread(buffer, 96, 1, pfskey); | |||
fclose(pfskey); | |||
return 1; | |||
} | |||
/* Dump the sealedkey. Send over tcp and save to file */ | |||
int dumpDecryptedSealedKey(int to) { | |||
if (to < 0 || to > 1) return -2; | |||
/* First load the sealedkey into a buffer */ | |||
byte enc_pfsSKKey[96]; | |||
if (!get_pfsSKKey(&enc_pfsSKKey, USER1, tropkey)) { | |||
printf("[-] Can not load the sealed key!\n"); | |||
return -1; | |||
} | |||
/* Now decrypt it */ | |||
byte dec_pfsSKKey[16]; | |||
int i; | |||
if (!(i = kernel.sceSblSsDecryptSealedKey(&enc_pfsSKKey, &dec_pfsSKKey))) { | |||
printf("[-] Error!\n[-] sceSblSsDecryptSealedKey returned %d\n", i); | |||
return -1; | |||
} | |||
printf("[+] sceSblSsDecryptSealedKey returned %d\n", i); | |||
if (!to) { /* Print it out */ | |||
printf("[+] Your decrypted sealedkey = "); | |||
foreach(byte *val, &dec_pfsSKKey) { printf("%02X", *val); } | |||
printf("\n"); | |||
return 1; | |||
} | |||
else { /* Saving to file */ | |||
printf("[+] Will try to save to file..."); | |||
snprintf(usb0path, sizeof(usb0path), usb0, pfs); | |||
snprintf(usb1path, sizeof(usb1path), usb1, pfs); | |||
FILE *dump = fopen(usb0path, "w"); | |||
if (!dump) { | |||
dump = fopen(usb1path, "w"); | |||
if (!dump) { | |||
printf("fail!\n%s", usb_error); | |||
return -3; | |||
} | |||
} | |||
fwrite(&dec_pfsSKKey, 16, 1, dump); | |||
printf("done!\n"); | |||
fclose(dump); | |||
return 1; | |||
} | |||
} | |||
</source> |