Sealedkey / pfsSKKey: Difference between revisions

From PS4 Developer wiki
Jump to navigation Jump to search
Line 59: Line 59:
     for (int keep = 1, \
     for (int keep = 1, \
               count = 0, \
               count = 0, \
               size = sizeof(array) / sizeof(*array); \
               size = sizeof(array) / sizeof*(array); \
           keep && count != size; \
           keep && count != size; \
           keep = !keep, count++) \
           keep = !keep, count++) \
Line 74: Line 74:
  char usb0path[(sizeof(usb0) + sizeof(pfs))];
  char usb0path[(sizeof(usb0) + sizeof(pfs))];
  char usb1path[sizeof(usb0path)];
  char usb1path[sizeof(usb0path)];
byte pfsSKKey[96];
   
   
  /* Get's the encrypted sealed key based on user id */
  /* Get's the encrypted sealed key based on user id */
  byte get_pfsSKKey(const char *userID, const char path) {
  int get_pfsSKKey(byte *buffer, const char *userID, char path) {
     char toOpen[(sizeof(home) + sizeof(userID) + sizeof(path))];
     char toOpen[(sizeof(home) + sizeof(userID) + sizeof(path))];
   
   
     FILE *pfskey = fopen(snprintf(toOpen, sizeof(toOpen), %s%s%s, home, userID, path), "rb");  
     snprintf(toOpen, sizeof(toOpen), %s%s%s, home, userID, path)
    FILE *pfskey = fopen(toOpen, "r");  
   
   
     if (!pfskey) return NULL;
     if (!pfskey) return NULL;
    
    
    byte pfsSKKey[96];
     fread(buffer, 96, 1, pfskey);
     fread(pfsSKKey, 96, 1, pfskey);
     fclose(pfskey);
     fclose(pfskey);
     return pfsSKKey;
     return 1;
  }
  }
   
   
  /* Dump the sealedkey. Send over tcp and save to file */
  /* Dump the sealedkey. Send over tcp and save to file */
  int dumpDecryptedSealedKey(int to) {
  int dumpDecryptedSealedKey(int to) {
     if (to != 0 || to != 1) return -2;
     if (to < 0 || to > 1) return -2;
   
   
     byte enc_pfsSKKey;
    /* First load the sealedkey into a buffer */
     if (sizeof((enc_pfsSKKey = get_pfsSKKey(USER1, tropkey))) != 96) {
     byte enc_pfsSKKey[96];
     if (!get_pfsSKKey(&enc_pfsSKKey, USER1, tropkey)) {
         printf("[-] Can not load the sealed key!\n");
         printf("[-] Can not load the sealed key!\n");
         return -1;
         return -1;
     }
     }
   
   
     /* Now decrpyt the key */
     /* Now decrypt it */
     byte dec_pfsSKKey[16];
     byte dec_pfsSKKey[16];
    int i = kernel.sceSblSsDecryptSealedKey(enc_pfsSKKey, dec_pfsSKKey);
    printf("[+] sceSblSsDecryptSealedKey returned %d\n", i);
   
   
     /* Sending over tcp */
     int i;
     if (i) {
     if (!(i = kernel.sceSblSsDecryptSealedKey(&enc_pfsSKKey, &dec_pfsSKKey))) {
         if (!to) {
         printf("[-] Error!\n[-] sceSblSsDecryptSealedKey returned %d\n", i);
            printf("[+] Your decrypted sealedkey = ");
        return -1;
    }
    printf("[+] sceSblSsDecryptSealedKey returned %d\n", i);
   
   
            foreach(byte *val, dec_pfsSKKey) {
    if (!to) { /* Print it out */
                printf("%02X", *val);
        printf("[+] Your decrypted sealedkey = ");
            }
        foreach(byte *val, &dec_pfsSKKey) { printf("%02X", *val); }
   
   
            printf("\n");
        printf("\n");
            return 1;
        return 1;
        }
    }
        else { /* Saving to file */
    else { /* Saving to file */
            printf("[+] Will try to save to file...");
        printf("[+] Will try to save to file...");
     
     
            snprintf(usb0path, sizeof(usb0path), %s%s, usb0, pfs);
        snprintf(usb0path, sizeof(usb0path), %s%s, usb0, pfs);
            snprintf(usb1path, sizeof(usb1path), %s%s, usb1, pfs);
        snprintf(usb1path, sizeof(usb1path), %s%s, usb1, pfs);
   
   
            FILE *dump = fopen(usb0path, "wb");
        FILE *dump = fopen(usb0path, "w");
   
   
        if (!dump) {
            dump = fopen(usb1path, "w");
             if (!dump) {
             if (!dump) {
                 dump = fopen(usb1path, "wb");
                 printf("fail!\n%s" ,usb_error);
                if (!dump) {
                return -3;
                    printf("fail!\n" + usb_error);
                    return -3;
                }
             }
             }
        }
   
   
            fwrite(dec_pfsSKKey, 16, 1, dump);
        fwrite(&dec_pfsSKKey, 16, 1, dump);
            printf("done!\n");
        printf("done!\n");
            fclose(dump);
        fclose(dump);
            return 1;
        return 1;
        }
     }
     }
    else printf("[+] Error!\n");
    return -1;
  }
  }
</source>
</source>

Revision as of 07:48, 14 October 2016

This key can be found on different places and will be used for eg. SaveGame or Trophy Data decryption and encryption.

Paths

Kind Path
Trophys /user/home/user Id/trophy/data/sce_trop/sealedkey
SaveGames /user/home/user Id/title Id/save data directory/sce_sys/

Structure

- size always 96 bytes

From To Description
00 07 MAGIC ("pfsSKKey") (?playstation file system sealed key key?)
08 0F Category (game=1 or version ?)
10 1F IV (16 bytes)
20 3F Encrypted key (32 bytes)
40 5F SHA-256 (32 bytes)

C

 typedef struct sealedkey {
     const unsigned char MAGIC[8];
     const unsigned char CAT[8];
     const unsigned char IV[16];
     const unsigned char KEY[32];
     const unsigned char SHA256[32];
 } selaedkey;

CSharp

 protected internal struct sealedkey {
     internal static byte[] MAGIC = new byte[8];
     internal static byte[] CAT = new byte[8];
     internal static byte[] IV = new byte[16];
     internal static byte[] KEY = new byte[32];
     internal static byte[] SHA256 = new byte[32];
 }

Note: You can't use a const byte[] defination in C#. It need to be a static byte[].

De/En -Crypting

Can be decrypted by frindly asking the OS to do it for you. You will need kernel rights to be able to ask the PS4 for it.

 /* Decryption */ 
 #define foreach(item, array) \
     for (int keep = 1, \
              count = 0, \
              size = sizeof(array) / sizeof*(array); \
          keep && count != size; \
          keep = !keep, count++) \
         for (item = (array) + count; keep; keep = !keep)
 
 typedef unsigned char byte;              /* byte defination for c/c++ */
 const char USER1 = "10000000";
 const char usb0 = "/mnt/usb0/";
 const char usb1 = "/mnt/usb1/";
 const char pfs = "dec_pfsSK.Key";
 const char home = "/user/home/";
 const char tropkey = "/trophy/data/sce_trop/sealedkey";
 char usb_error = "[-] ERROR: Can't access usb0 nor usb1!\n[-] Will return now to caller.\n"
 char usb0path[(sizeof(usb0) + sizeof(pfs))];
 char usb1path[sizeof(usb0path)];
 
 /* Get's the encrypted sealed key based on user id */
 int get_pfsSKKey(byte *buffer, const char *userID, char path) {
     char toOpen[(sizeof(home) + sizeof(userID) + sizeof(path))];
 
     snprintf(toOpen, sizeof(toOpen), %s%s%s, home, userID, path)
 
     FILE *pfskey = fopen(toOpen, "r"); 
 
     if (!pfskey) return NULL;
  
     fread(buffer, 96, 1, pfskey);
     fclose(pfskey);
     return 1;
 }
 
 /* Dump the sealedkey. Send over tcp and save to file */
 int dumpDecryptedSealedKey(int to) {
     if (to < 0 || to > 1) return -2;
 
     /* First load the sealedkey into a buffer */
     byte enc_pfsSKKey[96];
     if (!get_pfsSKKey(&enc_pfsSKKey, USER1, tropkey)) {
         printf("[-] Can not load the sealed key!\n");
         return -1;
     }
 
     /* Now decrypt it */
     byte dec_pfsSKKey[16];
 
     int i;
     if (!(i = kernel.sceSblSsDecryptSealedKey(&enc_pfsSKKey, &dec_pfsSKKey))) {
         printf("[-] Error!\n[-] sceSblSsDecryptSealedKey returned %d\n", i);
         return -1;
     }
     printf("[+] sceSblSsDecryptSealedKey returned %d\n", i);
 
     if (!to) { /* Print it out */
         printf("[+] Your decrypted sealedkey = ");
 
         foreach(byte *val, &dec_pfsSKKey) { printf("%02X", *val); }
 
         printf("\n");
         return 1;
     }
     else { /* Saving to file */
         printf("[+] Will try to save to file...");
	    
         snprintf(usb0path, sizeof(usb0path), %s%s, usb0, pfs);
         snprintf(usb1path, sizeof(usb1path), %s%s, usb1, pfs);
 
         FILE *dump = fopen(usb0path, "w");
	  
         if (!dump) {
             dump = fopen(usb1path, "w");
             if (!dump) {
                 printf("fail!\n%s" ,usb_error);
                 return -3;
             }
         }
 
         fwrite(&dec_pfsSKKey, 16, 1, dump);
         printf("done!\n");
         fclose(dump);
         return 1;
     }
 }