SceNpDrm: Difference between revisions
CelesteBlue (talk | contribs) No edit summary |
CelesteBlue (talk | contribs) |
||
Line 1,056: | Line 1,056: | ||
</source> | </source> | ||
=== | === scePsmDrmUpdateActDataForDriver === | ||
{| class="wikitable" | {| class="wikitable" | ||
|- | |- | ||
Line 1,064: | Line 1,064: | ||
|} | |} | ||
<source lang="C">int | reads tm0:/psmdrm/act.dat | ||
verifies RSA with sha256 | |||
decrypts Primary Key Table | |||
<source lang="C">int scePsmDrmUpdateActDataForDriver(void);</source> | |||
=== ScePsmDrmForDriver_B09003A7 === | === ScePsmDrmForDriver_B09003A7 === |
Revision as of 14:20, 22 June 2023
Module
Version | World | Privilege |
---|---|---|
0.990.000-3.740.011 | Non-secure | Kernel |
Libraries
Known NIDs
Version | Name | World | Visibility | NID |
---|---|---|---|---|
1.000.071-3.740.011 | SceNpDrm | Non-secure | User | 0xF2799B1B |
0.990.000-3.740.011 | SceNpDrmForDriver | Non-secure | Kernel | 0xD84DC44A |
1.000.071-3.740.011 | SceNpDrmPackage | Non-secure | User | 0x88514DB2 |
1.800.071-3.570.011 | ScePsmDrm | Non-secure | User | 0x3F2B0888 |
1.800.071-3.740.011 | ScePsmDrmForDriver | Non-secure | Kernel | 0x9F4924F2 |
Data segment layout
Address | Size | Description |
---|---|---|
0x0000 | 0x4 | SceNpDrm mutex SceUID |
0x0004 | 0x4 | ScePsmDrm mutex SceUID |
0x0008 | 0x8 | unknown |
0x0010 | 0xC0 | Static keys decrypted with sceSblAuthMgrGetEKcForDriver key 0.
First 0x10 bytes are reencrypted with ConsoleId. First 0x10 bytes are aes_key used to decrypt 0x800 bytes of Primary Key Table from act.dat. Second 0x10 bytes are aes_key used to decrypt Primary Key Table index from rif. |
0x00D0 | 0xCF8 | unknown |
0x0DC8 | 0x4 | Game Exist flag |
0x0DCC | 0x4 | Is DEX flag or Is Tool flag |
0x0DD0 | 0x30 | unknown |
0x0E00 | 0x1040 | tm0:/npdrm/act.dat data |
0x1E40 | 0x400 | tm0:/psmdrm/act.dat data |
0x2240 | 0x10 | OpenPsId
This data is compared against OpenPsId in act.dat and under some conditions in .rif at offset 0xC0. |
0x2250 | 0x4 | act data Is Valid flag |
0x2254 | 0x4 | unknown |
0x2258 | 0x8 | /CONFIG/NP/account_id registry key |
0x2260 | 0x4 | Loose Account Bind flag |
0x2264 | 0x4 | /CONFIG/NP/debug_upgradable registry key |
0x2268 | 0x20 | sha256 digest of get_act_data |
0x2288 | 0x20 | hmac-sha256 digest of get_act_data |
0x22A8 | 0x8 | unknown |
0x22B0 | 0x8 | account_id |
0x22B8 | 0x8 | PSM activation start date |
0x22C0 | 0x8 | PSM activation end date |
0x22C8 | 0x20 | some key decrypted with 0x2288 |
Obtaining klicensee
Initialization steps (common):
1. Get the hardcoded encrypted EKc (0xC0 bytes). (on FW 3.60, 0xC0 bytes from SceNpDrm code segment at offset 0x111D0)
2. Decrypt the hardcoded encrypted EKc using sceSblAuthMgrGetEKcForDriver with key revision 0 (?or 1 or 2?).
Initialization steps (per-console):
3. Get ConsoleId (0x10 bytes) using sceSblAimgrGetConsoleIdForDriver.
4. Decrypt using AES128ECB first 0x10 bytes of EKc with ConsoleId as key.
5. Read 0x800 bytes of the encrypted Primary Key Table from act.dat file.
6. Decrypt 0x800 bytes of Primary Key Table with reencrypted static key using AES (need to figure out which AES exactly).
Initialization steps (per-content):
7. Get 0x98 / 0x200 bytes of RIF from the content's .rif file and select one of the 5 scenarios for decrypting RIF Key into klicensee based on License flags (need to figure out). In most cases only the first 0x70 bytes are needed for klicensee derivation because at 0x70 is the ECDSA signature which is not used for derivation, and after 0x98 is data only used for some PS Vita contents (maybe only PS Vita cartridges require a 0x200-byte RIF).
Scenario 1 - maybe DRM Free
Take RIF Key 2.
Take static keys 3, 4.
Take first 0x70 bytes of RIF.
Use SceSblAuthMgr#sceSblAuthMgrDecBindDataForDriver to decrypt RIF key 2 and obtain klicensee.
Scenario 2
Take RIF Key 2.
Take primary keys 1, 2.
Take first 0x70 bytes of RIF.
Use SceSblAuthMgr#sceSblAuthMgrDecBindDataForDriver to decrypt RIF key 2 and obtain klicensee.
Scenario 3 - Game Cartridge
Take RIF Key 2.
Take cmd56 handshake keys with get_5018_data.
Take first 0x70 bytes of RIF.
Use SceSblAuthMgr#sceSblAuthMgrDecBindDataForDriver to decrypt RIF key 2 and obtain klicensee.
Scenario 4 - Game Cartridge
Take RIF Key 1.
Take cmd56 handshake keys with get_5018_data.
Take first 0x70 bytes of RIF.
Erase RIF Key 1 from RIF.
Use SceSblAuthMgr#sceSblAuthMgrDecBindDataForDriver to decrypt RIF key 1 and obtain klicensee.
Scenario 5
Take RIF Key 1.
Decrypt Primary Table Key index from RIF with static key 2 using AES (need to figure out which AES exactly).
Take primary key using decrypted index.
Decrypt RIF key 1 with obtained primary key using AES (need to figure out which AES exactly).
Get rif name algorithm
uint8_t rif_name_keys[0x10] = { 0x19, 0xDD, 0x4F, 0xB9, 0x89, 0x48, 0x2B, 0xD4, 0xCB, 0x9E, 0xC9, 0xC7, 0x9A, 0x2E, 0xFB, 0xD0 }; int aes_encrypt(const void *buf, int size, uint8_t *keys) { AES_ctx ctx; AES_set_key(&ctx, rif_name_keys, 0x80); int i; for (i = 0; i < size; i += 0x10) { AES_encrypt(&ctx, buf+i, buf+i); } } typedef struct { uint64_t mode; // 0: bounded, 1: fixed uint64_t account_id; } SceNpDrmRifName; int getRifName(char *name, int length, uint64_t account_id, uint64_t mode) { SceNpDrmRifName rif_name; rif_name.mode = mode; rif_name.account_id= account_id; aes_encrypt(&rif_name, sizeof(SceNpDrmRifName), rif_name_keys); snprintf(name, length, "%016llx%016llx.rif", __builtin_bswap64(((uint64_t *)&rif_name)[0]), __builtin_bswap64(((uint64_t *)&rif_name)[1])); }
SceNpDrm
_sceNpDrmCheckDrmReset
Version | NID |
---|---|
1.000.071-3.740.011 | 0x4458812B |
//opt is of size 0x18 int _sceNpDrmCheckDrmReset(int unk0, int unk1, void *opt);
_sceNpDrmRemoveActData
Version | NID |
---|---|
1.000.071-3.740.011 | 0x507D06A6 |
Removes NPDRM per-console activation data at tm0:/npdrm/act.dat.
// pAccountId of removed tm0:/npdrm/act.dat >int _sceNpDrmRemoveActData(SceUInt64 *pAccountId);
_sceNpDrmGetRifName
Version | NID |
---|---|
1.000.071-3.740.011 | 0xB8C5DA7C |
int _sceNpDrmGetRifName(char *rif_name, SceUInt64 account_id);
_sceNpDrmGetRifNameForInstall
Version | NID |
---|---|
1.000.071-3.740.011 | 0xD312424D |
// rif_name is of size 0x30 // rif is of size 0x200 // num: must be 1 int _sceNpDrmGetRifNameForInstall(char *rif_name, void *rif, int num);
_sceNpDrmGetRifInfo
Version | NID |
---|---|
1.000.071-3.740.011 | 0xE8343660 |
typedef struct rif_info { // size is 0x70 char content_id[0x30]; char version_number[4]; char rif_lic_flags[4]; char drm_type0[4]; // DRM type related char drm_type1[4]; // DRM type related char account_id[8]; char rif_data_0x98[8]; uint64_t lic_start_time; uint64_t lic_exp_time; char klicensee[0x10]; } rif_info; typedef struct _sceNpDrmGetRifInfo_opt { // size is 0x28 void* content_id; void* account_id; void* version_number; void* rif_lic_flags; void* lic_type0; // DRM type related void* lic_type1; // DRM type related void* lic_start_time; void* lic_exp_time; void* rif_data_0x98; } _sceNpDrmGetRifInfo_opt; // rif is of size 0x200 int _sceNpDrmGetRifInfo(void* rif, SceSize rif_size, SceUInt32 num, _sceNpDrmGetRifInfo_opt* pOpt);
_sceNpDrmGetFixedRifName
Version | NID |
---|---|
1.000.071-3.740.011 | 0xE935B0FC |
int _sceNpDrmGetFixedRifName(char *name, uint64_t account_id);
_sceNpDrmCheckActData
Version | NID |
---|---|
1.000.071-3.740.011 | 0xFEEBCD62 |
// opt is of size 0x10 int _sceNpDrmCheckActData(int unk0, int unk1, int unk2, void* opt);
_sceNpDrmPresetRifProvisionalFlag
Version | NID |
---|---|
0.931.010-1.692.000 | not present |
1.800.071-3.740.011 | 0x2523F57F |
// rif is of size 0x200 int _sceNpDrmPresetRifProvisionalFlag(void* rif);
SceNpDrmForDriver
sceNpDrmGetRifInfoForDriver
Version | NID |
---|---|
3.60 | 0xDB406EAE |
// content_id is of size 0x30 int sceNpDrmGetRifInfoForDriver(const void *license, SceSize license_size, int check_sign, char *content_id, SceUInt64 *pAccountId, int *pLicenseVersion, int *pLicenseFlags, int *flags, int *sku_flags, SceInt64 *lic_start_time, SceInt64 *lic_exp_time, SceUInt64 *flags2);
sceNpDrmPackageSetGameExistForDriver
Version | NID |
---|---|
3.60 | 0x3BFD2850 |
int sceNpDrmPackageSetGameExistForDriver(int value);
sceNpDrmGetFixedRifNameForDriver
Version | NID |
---|---|
3.60 | 0x5D73448C |
// name is of size 0x30 int sceNpDrmGetFixedRifNameForDriver(char *name, SceUInt64 account_id);
sceNpDrmGetRifNameForDriver
Version | NID |
---|---|
3.60 | 0xDF62F3B8 |
// name is of size 0x30 int sceNpDrmGetRifNameForDriver(char *name, SceUInt64 account_id);
sceNpDrmGetRifNameForInstallForDriver
Version | NID |
---|---|
3.60 | 0x17573133 |
// name is of size 0x30 // if not_use_content_id is zero, use license content id int sceNpDrmGetRifNameForInstallForDriver(char *name, const void *license, int not_use_content_id);
sceNpDrmPresetRifProvisionalFlagForDriver
Version | NID |
---|---|
3.60 | 0xC070FE89 |
Updating license data.
int sceNpDrmPresetRifProvisionalFlagForDriver(void *license, int unk2);
sceNpDrmCheckActDataForDriver
Version | NID |
---|---|
3.60 | 0x9265B350 |
Gets information about NPDRM per-console activation data at tm0:/npdrm/act.dat.
//size of act data is 0x1040 int sceNpDrmCheckActDataForDriver(int *act_type, int *unk2, SceUInt64 *pAccountId, SceInt64 *act_start_time, SceInt64 *act_exp_time);
sceNpDrmRemoveActDataForDriver
Version | NID |
---|---|
3.60 | 0x8B85A509 |
Removes NPDRM per-console activation data at tm0:/npdrm/act.dat.
// pAccountId of removed tm0:/npdrm/act.dat int sceNpDrmRemoveActDataForDriver(SceUInt64 *pAccountId);
sceNpDrmUpdateAccountIdForDriver
Version | NID |
---|---|
3.60 | 0x116FC0D6 |
int sceNpDrmUpdateAccountIdForDriver(SceUInt64 account_id);
sceNpDrmEbootSigGenMultiDiscForDriver
Version | NID |
---|---|
3.60 | 0x39A7A666 |
// dst is of size 0x200 int sceNpDrmEbootSigGenMultiDiscForDriver(const char *path, const void *some_sig, void *dst, SceUInt32 systemSwVersion);
sceNpDrmEbootSigGenPs1ForDriver
Version | NID |
---|---|
3.60 | 0x6D9223E1 |
// dst is of size 0x200 int sceNpDrmEbootSigGenPs1ForDriver(const char *path, const void *hash_sha256, void *dst, SceUInt32 systemSwVersion);
sceNpDrmGetLegacyDocKeyForDriver
Version | NID |
---|---|
3.60 | 0x4E321BDE |
Gets klicensee to decrypt encrypted DOCUMENT.DAT.
// pLegacyDocKey is of size 0x10 bytes int sceNpDrmGetLegacyDocKeyForDriver(void *pRif, void *pDocEdat, SceSize docEdatSize, void *pLegacyDocKey);
sceNpDrmEbootSigVerifyForDriver
Version | NID |
---|---|
3.60 | 0x7A319692 |
drm_data - __sce_ebootpbp or license data, size is 0x200.
int sceNpDrmEbootSigVerifyForDriver(const char *path, void *drm_data);
sceNpDrmEbootSigGenPspForDriver
Version | NID |
---|---|
3.60 | 0x90B1A6D3 |
// dst is of size 0x200 int sceNpDrmEbootSigGenPspForDriver(const char *path, const void *hash_sha256, void *dst, SceUInt32 systemSwVersion);
sceNpDrmEbootSigConvertForDriver
Version | NID |
---|---|
3.60 | 0xA29B75F9 |
// dst is of size 0x200 int sceNpDrmEbootSigConvertForDriver(const char *path, const void *some_sig, void *dst);
sceNpDrmPspEbootVerifyForDriver
Version | NID |
---|---|
3.60 | 0xB6CA3A2C |
int sceNpDrmPspEbootVerifyForDriver(const char *path, const void *some_sig);
sceNpDrmPspEbootSigGenForDriver
Version | NID |
---|---|
3.60 | 0xEF387FC4 |
// dst is of size 0x100 int sceNpDrmPspEbootSigGenForDriver(const char *path, const void *hash_sha256, void *dst);
sceNpDrmIsLooseAccountBindForDriver
Version | NID |
---|---|
3.60 | 0xFC84CA1A |
int sceNpDrmIsLooseAccountBindForDriver(void);
sceNpDrmUpdateDebugSettingsForDriver
Version | NID |
---|---|
3.60 | 0xA91C7443 |
checks /CONFIG/NP debug_upgradable and /CONFIG/NP2 debug_drm_loose_bind registry values
int sceNpDrmUpdateDebugSettingsForDriver(void);
sceNpDrmGetRifPspKeyForDriver
Version | NID |
---|---|
3.60 | 0xDACB71F4 |
int sceNpDrmGetRifPspKeyForDriver(const void *license, void *klicensee, SceUInt32 *flags, SceUInt64 *lic_start_time, SceUInt64 *lic_exp_time);
sceNpDrmGetRifVitaKeyForDriver
Version | NID |
---|---|
3.60 | 0x723322B5 |
It uses #sceNpDrmGetRifInfoForDriver to get required fields.
int sceNpDrmGetRifVitaKeyForDriver(const void *license, void *klicensee, SceUInt32 *flags, SceUInt32 *sku_flags, SceUInt64 *lic_start_time, SceUInt64 *lic_exp_time);
sceNpDrmWriteActDataForDriver
Version | NID |
---|---|
0.990-3.60 | 0x742EBAF4 |
Related to SceSblGcAuthMgr#_sceSblGcAuthMgrPcactActivation.
decrypts act_data with aes_dec_key and stores it to data segment
verifies sha1 - ecdsa or sha256 - RSA
checks Loose Account Bind flag
verifies OpenPsId
creates tm0:/npdrm folder
writes tm0:/npdrm/act.dat file
repeats all verification steps
decrypts Primary Key Table
// npdrm_act_data is of size 0x1040 int sceNpDrmWriteActDataForDriver(void *npdrm_act_data, const char *aes_dec_key);
sceNpDrmReadActDataForDriver
Version | NID |
---|---|
3.60 | 0xD91C3BCE |
Related to sceSblGcAuthMgrPcactGetChallenge
reads 0x1038 bytes of tm0:/npdrm/act.dat data
// act_data is of size 0x1038 int sceNpDrmReadActDataForDriver(void *act_data);
sceNpDrmVerifyRifForDriver
Version | NID |
---|---|
3.60 | 0xFE7B17B6 |
verify ECDSA - SHA1 pair or RSA - SHA256 pair
// rif max size is 0x200 int sceNpDrmVerifyRifForDriver(void *rif, SceSize rif_size);
sceNpDrmVerifyRifFullForDriver
Version | NID |
---|---|
3.60 | 0xFF63672D |
check OpenPsId
check cmd56 handshake part
perform steps to get decrypted rif key
// rif size is unknown but at least 0xF8 int sceNpDrmVerifyRifFullForDriver(void *rif);
sceNpDrmUpdateActDataForDriver
Version | NID |
---|---|
3.60 | 0x77926F5 |
reads tm0:/npdrm/act.dat
verifies ECDSA with sha1 and RSA with sha256
checks Loose Account Bind flag
verifies OpenPsId
clears Secondary Table, RSA Signature, Unknown Sig, ECDSA Signature
decrypts Primary Key Table
int sceNpDrmUpdateActDataForDriver(void);
SceNpDrmPackage
_sceNpDrmPackageTransform
Version | NID |
---|---|
1.69-3.60 | 0x0567DCA1 |
// opt is of size 0x28 int _sceNpDrmPackageTransform(int unk0, int unk1, void* opt, int unk3);
_sceNpDrmPackageInstallFinished
Version | NID |
---|---|
1.69-3.60 | 0x6896EAF2 |
// opt is of size 0x8 int _sceNpDrmPackageInstallFinished(int unk0, int unk1, int unk2, void* opt);
_sceNpDrmPackageCheck
Version | NID |
---|---|
1.69-3.60 | 0xA1D885FA |
int _sceNpDrmPackageCheck(const void *buffer1, SceSize size, void *buffer2, SceUInt32 identifier);
sceNpDrmPackageIsGameExist
Version | NID |
---|---|
1.69-3.60 | 0xB9337914 |
int sceNpDrmPackageIsGameExist();
_sceNpDrmPackageInstallStarted
Version | NID |
---|---|
1.69-3.60 | 0xCEC18DA4 |
// opt is of size 0x10 int _sceNpDrmPackageInstallStarted(int unk0, int unk1, int unk2, void* opt);
_sceNpDrmPackageDecrypt
Version | NID |
---|---|
1.69-3.60 | 0xD6F05ACC |
typedef struct _sceNpDrmPackageDecrypt { // size is 0x10 SceOff offset; //The offset in the encrypted data unsigned int identifier; uint32_t unk_C; } _sceNpDrmPackageDecrypt_opt; int _sceNpDrmPackageDecrypt(void * buffer, SceSize size, _sceNpDrmPackageDecrypt_opt * opt);
sceNpDrmPackageInstallOngoing
Version | NID |
---|---|
1.69-3.60 | 0xED0471FE |
int sceNpDrmPackageInstallOngoing(int unk0, int unk1);
_sceNpDrmPackageUninstallFinished
Version | NID |
---|---|
3.60 | 0x23A28861 |
// opt is of size 0x8 int _sceNpDrmPackageUninstallFinished(int unk0, int unk1, int unk2, void* opt);
_sceNpDrmPackageUninstallStarted
Version | NID |
---|---|
3.60 | 0x4901C3E6 |
// opt is of size 0x10 int _sceNpDrmPackageUninstallStarted(int unk0, int unk1, int unk2, void* opt);
sceNpDrmPackageUninstallOngoing
Version | NID |
---|---|
3.60 | 0xF1FF6193 |
int sceNpDrmPackageUninstallOngoing(int unk0, int unk1);
unk_200D2DE4
Version | NID |
---|---|
3.60 | 0x200D2DE4 |
int unk_200D2DE4(int unk0, int unk1);
unk_4665E75A
Version | NID |
---|---|
3.60 | 0x4665E75A |
// opt is of size 0x10 int unk_4665E75A(int unk0, int unk1, int unk2, void *opt);
unk_640C1724
Version | NID |
---|---|
3.60 | 0x640C1724 |
// opt is of size 0x8 int unk_640C1724(int unk0, int unk1, int unk2, void *opt);
unk_97BB85BD
Version | NID |
---|---|
3.60 | 0x97BB85BD |
// opt is of size 0x10 int unk_97BB85BD(int unk0, int unk1, int unk2, void *opt)
unk_A5E0F38C
Version | NID |
---|---|
3.60 | 0xA5E0F38C |
int unk_A5E0F38C(int unk0, int unk1);
unk_C75A775B
Version | NID |
---|---|
3.60 | 0xC75A775B |
// opt is of size 0x8 int unk_C75A775B(int unk0, int unk1, int unk2, void *opt);
ScePsmDrm
scePsmDrmGetRifName
Version | NID |
---|---|
3.60 | 0x0D6470DA |
This is a guessed name.
// rif is of size 0x400 int scePsmDrmGetRifName(char *rif_name, void *rif);
scePsmDrmGetDebugRifName
Version | NID |
---|---|
3.60 | 0x3E881391 |
This is a guessed name.
int scePsmDrmGetDebugRifName(char *rif_name);
scePsmDrmGetRifInfo
Version | NID |
---|---|
3.60 | 0xE31A6220 |
typedef struct ScePsmDrmGetRifInfoOpt { //size is 0x10 SceUInt64 lic_start_time; SceUInt64 lic_exp_time; } ScePsmDrmGetRifInfoOpt; int scePsmDrmGetRifInfo(void *rif, char *content_id, void *account_id, ScePsmDrmGetRifInfoOpt *pOpt);
scePsmDrmGetPsmRifKey
Version | NID |
---|---|
3.60 | 0x207A2C53 |
/** * rif is of size 0x400 * klicensee is of size 0x200 **/ int scePsmDrmGetPsmRifKey(void *rif, void *klicensee, SceUInt32 *flags, SceUInt64 *lic_start_time, SceUInt64 *lic_exp_time);
scePsmDrmRemoveActData
Version | NID |
---|---|
3.60 | 0x0E193CBB |
// pAccountId of removed tm0:/psmdrm/act.dat int scePsmDrmRemoveActData(SceUInt64 *pAccountId);
ScePsmDrm_A89653B3
Version | NID |
---|---|
3.60 | 0xA89653B3 |
Calls #ScePsmDrmForDriver_B09003A7.
typedef struct ScePsmDrm_A89653B3_Opt { // size is 0x10 SceUInt64 info4; SceUInt64 info5; } ScePsmDrm_A89653B3_Opt; int ScePsmDrm_A89653B3(SceUInt32 *pInfo1, SceUInt32 *pInfo2, SceUInt64 *pInfo3, ScePsmDrm_A89653B3_Opt *pOpt);
ScePsmDrmForDriver
scePsmDrmGetRifInfoForDriver
Version | NID |
---|---|
3.60 | 0x984F9017 |
This function is named after sceNpDrmGetRifInfoForDriver since arguments are very similar.
// rif is of size 0x400 // content_id is of size 0x30 int scePsmDrmGetRifInfoForDriver(void *rif, char *content_id, SceUInt64 *account_id, SceUInt64 *lic_start_time, SceUInt64 *lic_exp_time);
scePsmDrmGetRifPsmKeyForDriver
Version | NID |
---|---|
3.60 | 0x8C8CFD01 |
this function is named after sceNpDrmGetRifInfoForDriver since arguments are very similar
// rif is of size 0x400 // klicensee is of size 0x200 int scePsmDrmGetRifPsmKeyForDriver(void *rif, void *klicensee, SceUInt32 *flags, SceUInt64 *lic_start_time, SceUInt64 *lic_exp_time);
scePsmDrmWriteActDataForDriver
Version | NID |
---|---|
3.60 | 0xCB73E9D3 |
decrypts psm_act_data with aes_dec_key
creates tm0:/psmdrm if necessary
writes tm0:/psmdrm/act.dat
verifies sha256 - rca
//data is of size 0x400 int scePsmDrmWriteActDataForDriver(void *psm_act_data, const char *aes_dec_key);
scePsmDrmRemoveActDataForDriver
Version | NID |
---|---|
3.60 | 0x4CD5375C |
Removes PSM DRM per-console activation data at tm0:/psmdrm/act.dat.
// pAccountId of removed tm0:/psmdrm/act.dat int scePsmDrmRemoveActDataForDriver(SceUInt64 *pAccountId);
scePsmDrmUpdateActDataForDriver
Version | NID |
---|---|
3.60 | 0x791198CE |
reads tm0:/psmdrm/act.dat
verifies RSA with sha256
decrypts Primary Key Table
int scePsmDrmUpdateActDataForDriver(void);
ScePsmDrmForDriver_B09003A7
Version | NID |
---|---|
3.60 | 0xB09003A7 |
Gets information about PSM RIF or ACT.DAT.
int ScePsmDrmForDriver_B09003A7(SceUInt32 *pInfo1, SceUInt32 *pInfo2, SceUInt64 *pInfo3, SceUInt64 *pInfo4, SceUInt64 *pInfo5);
Package integrity checks
Disable hash/signature verification
To find the function responsible for package verification search for immediate 0x7F504B47 ('.PKG'). Inside it does a lot of stuff including determining the function that will do signature checks. Find the condition that looks like if ( (v62 & 7) == 3 )
; below you will see the assignment check_func = &off_81009CFC;
. To bypass signature checks you need to patch two functions located at this offset and offset+4, making them behave as "return 1" is enough. For reference, on 1.60 the functions are sub_81000310 and sub_81000AA4. sub_81000310 is the only function in this module that calls SceSblGcAuthMgrPkgForDriver_E459A9A8_imp.
Note that on 1.60 this module sometimes is loaded at different addresses between reboots.
Allow debug packages to be installed
Find the function that calls sceSblAIMgrIsCEXForDriver. Patch it to always return 1. On FW 1.60 it is at 0x81002d64.
Search for immediate 0x80870003, there should be two matches. Replace both with "MOV Reg, #0". On 1.60 the locations are 0x810035fe and 0x81004856.
RIF
The RIF file holds the klicensee for NPDRM contents. The RIF files are used as DRM licenses. For each installed PKG and Game Card you have a unique RIF file with proper information that is used when you open the game to verify if you own the game (or PKG). The RIF files holds important information as PSN Account ID, the key used to decrypt one of the SELF encryption layers.
PS Vita supports two different RIF file formats. The first format version (v0) is used by RIF files with 0x98 bytes size and the second version (v1) is used by RIF files with 0x200 bytes size. The difference between these formats is just the signature and some data used by PS Vita only. RIF version 0 only uses ECDSA Signature only whilst RIF Version 1 uses the ECDSA Signature and an extra RSA Signature.
Name | Offset | Size | Remarks |
---|---|---|---|
Version | 0x0 | 0x2 | |
Version Flag | 0x2 | 0x2 | 0 or 1 |
License Flags | 0x4 | 0x2 | See [1]. |
DRM Type | 0x6 | 0x2 | See [2]. |
NP Account ID | 0x8 | 0x8 | NP Account ID (in little-endian) for Network and Local DRM, 8 first bytes of sha-1 of some key for Free DRM. |
Content ID | 0x10 | 0x30 | CONTENT_ID |
Encrypted account keyring index | 0x40 | 0x10 | Encrypted account keyring index for Network and Local DRM, 12 last bytes of sha-1 of some key + 4 bytes of zeroes for Free DRM. |
Encrypted RIF Key | 0x50 | 0x10 | Used to get klicensee to decrypt NPDRM SELF/SPRX/EDAT/PFS files. |
License start time | 0x60 | 0x8 | For human readable, convert to decimal and use an Epoch-Unix converter time format online. |
License expiration time | 0x68 | 0x8 | If zeroed, there is no time limit. Used for PS+ time-limited content for example. |
ECDSA Signature | 0x70 | 0x28 | Patched in most PS3 CFWs to allow unsigned RIF. See Rif_Junk on Rap2Rif by Flatz. Params are same as for act.dat. |
Some Flag | 0x98 | 0x4 | Used by PS Vita only, not PSP nor PS3. |
Some Flag | 0x9C | 0x4 | Used by PS Vita only, not PSP nor PS3. ex: ?0x400?. |
Encrypted RIF Key 2 | 0xA0 | 0x10 | Used by PS Vita only, not PSP nor PS3. Used to get klicensee to decrypt NPDRM SELF/SPRX/EDAT/PFS files. |
Unknown_B0 | 0xB0 | 0x10 | Used by PS Vita only, not PSP nor PS3. |
OpenPsId | 0xC0 | 0x10 | Used by PS Vita only, not PSP nor PS3. Checked only if License Flag 0x100 is set. |
Unknown_D0 | 0xD0 | 0x10 | Used by PS Vita only, not PSP nor PS3. |
CMD56 handshake part | 0xE0 | 0x14 | Used by PS Vita only, not PSP nor PS3. Checked only if License Flag 0x400 is set. |
Unknown_F4 | 0xF4 | 0x4 | Used by PS Vita only, not PSP nor PS3. Some flag related to debug_upgradable. ex: 0 (default), 1 (seen on a PSP2 gamecard). |
Unknown_F8 | 0xF8 | 0x4 | Used by PS Vita only, not PSP nor PS3. |
SKU flag | 0xFC | 0x4 | Used by PS Vita only, not PSP nor PS3. Some flag related to debug_upgradable. |
RSA Signature | 0x100 | 0x100 | Used by PS Vita only, not PSP nor PS3. |
PSM-ACT
PSM Activation file
Name | Offset | Size | Example | Remark |
---|---|---|---|---|
Magic | 0x0 | 0x8 | "PSM-ACT" | |
Unknown1 | 0x8 | 0x8 | 00 00 00 00 00 00 00 00 | |
Account Id | 0x10 | 0x8 | 91 78 34 02 01 EF CD AB | PSN account ID (little endian) |
Unknown2 | 0x18 | 0x4 | 00 00 00 00 | Must be 0 |
Unknown3 | 0x1C | 0x4 | 00 00 00 00 | Must be 0 |
Activation start time | 0x20 | 0x8 | 00 00 01 4C 16 4D 83 A8 | |
Activation expiration time | 0x28 | 0x8 | 00 00 04 2A D4 3D 3E 68 | |
SHA256 from act.dat | 0x30 | 0x20 | SHA256 digest of get_act_data (0x39222A58) | |
Unknown4 | 0x50 | 0xB0 | Zeros | |
Unknown5 | 0x100 | 0x200 | KEY saved at 0x22C8 - Decrypted with 0x2288 | |
RSA signature | 0x300 | 0x100 |
PSM-RIF
PSM RIF file
Name | Offset | Size | Example | Remark |
---|---|---|---|---|
Magic | 0x0 | 0x8 | "PSM-RIF" | |
Unknown1 | 0x8 | 0x4 | 00 00 00 01 | Maybe Version and Version Flag? |
Unknown2 | 0xC | 0x4 | 00 00 00 00 | Maybe DRM Type and License Flags? |
Account ID | 0x10 | 0x8 | 91 78 34 02 01 EF CD AB | PSN account ID (little endian) |
Unknown3 | 0x18 | 0x4 | 00 00 00 00 | Must be 0 |
Unknown4 | 0x1C | 0x4 | 00 00 00 00 | Must be 0 |
Activation start time | 0x20 | 0x8 | 00 00 01 4C 16 4D 83 A8 | |
Activation expiration time | 0x28 | 0x8 | 7F FF FF FF FF FF FF FF | Max Value |
SHA256 from act.dat | 0x30 | 0x20 | SHA256 digest of get_act_data (0x39222A58) | |
Content ID | 0x50 | 0x30 | EM0041-NPOA00013_00-0000000000000000 | |
Unknown5 | 0x80 | 0x80 | Zeros | |
Unknown6 | 0x100 | 0x200 | Key saved at 0x1F40. First 0x200 bytes are decrypted with 0x22C8 and then only the first 0x20 bytes are again decrypted with 0x2288 | |
RSA signature | 0x300 | 0x100 |