Editing Kirk

Jump to navigation Jump to search
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 532: Line 532:
| 2
| 2
| KIRK_CMD_DNAS_ENCRYPT
| KIRK_CMD_DNAS_ENCRYPT
| Decrypt static and ReEncrypt perconsole Operation for DNAS secure installation (step 1)
| Encrypt Operation for DNAS (inverse of command 3)
| buf_size+0x90
| buf_size+0x90
| buf_size
| buf_size
Line 541: Line 541:
| 3
| 3
| KIRK_CMD_DNAS_DECRYPT
| KIRK_CMD_DNAS_DECRYPT
| Decrypt perconsole Operation for DNAS (step 2)
| Decrypt Operation for DNAS (inverse of command 2)
| buf_size+0x90
| buf_size+0x90
| buf_size
| buf_size
| mesg_led, sceChkuppkg_driver_56481562
| mesg_led
| {{yes}}
| {{yes}}
| {{no}}
| {{no}}
Line 879: Line 879:
# Read the body size and check that it is non-zero
# Read the body size and check that it is non-zero
# Get the AES key at key slot 4 + <keyseed>. Command 4 can only encrypt with keyseeds 0..0x3F while command 7 can decrypt with keyseeds 0..0x7F.
# Get the AES key at key slot 4 + <keyseed>. Command 4 can only encrypt with keyseeds 0..0x3F while command 7 can decrypt with keyseeds 0..0x7F.
# (PS VITA ONLY) Derive the key for some keyseeds using per-console parameters:
# Derive the key for some keyseeds using per-console parameters:
## If the key mesh's derivation key MSB is 1 and keyseed is in the 0x20..0x2f or 0x6c..0x7b range, invert the bits of the last word (4 bytes) of the key
## If the key mesh's derivation key MSB is 1 and keyseed is in the 0x20..0x2f or 0x6c, 0x7b range, invert the bits of the last word (4 bytes) of the key
## If the keyseed is in the 0x27..0x2f or 0x73..0x7b range, XOR the first word of the key with the key mesh derivation key
## If the keyseed is in the 0x27..0x2f or 0x73..0x7b range, XOR the first word of the key with the key mesh derivation key
# For command 4, copy the input header to the output, just replacing mode 4 with 5, and encrypt the body from offset 0x14 using AES-CBC with a null IV and the key determined at step 5.
# For command 4, copy the input header to the output, just replacing mode 4 with 5, and encrypt the body from offset 0x14 using AES-CBC with a null IV and the key determined at step 5.
You have switched to source editingClose

You can switch back to visual editing at any time by clicking on this icon.

Please note that all contributions to PSP Developer wiki are considered to be released under the GNU Free Documentation License 1.2 (see PSP Developer wiki:Copyrights for details). If you do not want your writing to be edited mercilessly and redistributed at will, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource. Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following hCaptcha:

Cancel Editing help (opens in new window)