New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
revokation checks for all firmwares. #1
Comments
understood. i'll try asap. |
@zecoxao After multiple analysis and decryptions of RL_FOR_PACKAGE.img files from various ofw pup versions, the decrypted content (only 0x40 bytes) is the same since, at least, OFW1.80 pup. As the keys are the same before 3.56, the RL_FOR_PACKAGE.img files should be the same for all pups before 3.56... But it's not the case. I also tryed to analyse and decrypted the trvk_pkg's from various flash dumps I have (clean dumps from virgin machines). Anyway, I failed to find a way to identify and predict trvk_pkg's md5 / per version. |
on thing though. if you don't mind, i'd like if you made a database of sorts with the revokation lists you've decrypted together with key used and showed it on psx-place. as for the issue, i guess you can close this one :) |
@littlebalup
https://github.com/naehrwert/scetool/blob/master/rvk.cpp
scetool handles revokation packages.
the problem with scetool when decrypting is that only the latest revision is used.
so when handling firmware files/flash files for revokation, don't forget to set the keys file with only the key you want to use on the package (aka the one that works)
The text was updated successfully, but these errors were encountered: