Those are keys for the first decryption step which is to decrypt the Encryption Root Header using AES256CBC. ![]() Loaders all have a static key and iv called respectively erk and riv. Here is a small summary on how the SELF cryptography works.īasically here are the steps being involved by the loaders: SHA1/HMAC-SHA1/HMAC-SHA256 is used to ensure that they have not been modified. Signature is an ECDSA160/RSA2048 signature of the SHA1/SHA256 digest of the SELF file starting at offset 0 and ending at offset sign_offset.ĭata segments can be encrypted and/or compressed. It contains key and IV to further decrypt the Certification data using AES128 (CBC or CTR).Ĭertification Header, Certification Body and CF Signature are encrypted under an AES128 (CBC or CTR) layer with the Encryption Root Header key and IV. The first part is in plaintext until the Encryption Root Header.Įncryption Root Header is encrypted under an AES256CBC layer. A SELF has a specific header called Extended header where it stores all the parameters for this program.Įxtended Header consists of information regarding the structure and offsets of the SELF. ELF sections can be encrypted using AES128 and signed using ECDSA160 or RSA2048 + HMAC-SHA1 or HMAC-SHA256. A SELF is usually encrypted and signed, but fSELF are unsigned SELFs. ELF sections can be compressed using gzip. SELF consists of a Certified File header with an Extended Header followed by the encapsulated ELF file. ![]() ![]() 5.7.2 SCE specific section types (sh_type).5.6.3 SCE specific segment flags (p_flags).5.6.2 SCE specific segment types (p_type).
0 Comments
Leave a Reply. |