Kirk: Difference between revisions

From PSP Developer wiki
Jump to navigation Jump to search
No edit summary
(Kirk commands 1/2/3/10 full explanation)
Line 20: Line 20:
Both use the usual Weierstrass form.
Both use the usual Weierstrass form.


== Elliptic curve for Kirk command 1 ==
== Elliptic curve for Kirk commands 1/2/3/10 ==


This curve is used for the ECDSA verification of Kirk command 1.
This curve is used for the ECDSA verification of Kirk commands 1, 2, 3 and 10.


<pre>
<pre>
Line 36: Line 36:
== Elliptic curve for the other commands ==
== Elliptic curve for the other commands ==


This curved is used for Kirk commands 0xC, 0xD, 0x10, 0x11, and likely 0x12.
This curved is used for Kirk commands 12, 13, 14, 16 and 17.


<pre>
<pre>
Line 98: Line 98:
!Id
!Id
!Content
!Content
!Do we have it?
|-
|-
|0
|0
|KIRK command 0 (Kbooti from Devkit) decryption key
|KIRK command 0 (Kbooti from Devkit) decryption key
|No
|-
|-
|1
|1
|KIRK command 0 (Kbooti from Devkit) CMAC key
|KIRK command 0 (Kbooti from Devkit) CMAC key
|No
|-
|-
|2
|2
|KIRK command 1 (IPL) decryption key
|KIRK command 1 (IPL) decryption key
|Yes
|-
|-
|3
|3
|KIRK command 2 (DRM) decryption key
|KIRK command 2 (DRM) decryption key
|No
|-
|-
|4~131
|4~131
|KIRK commands 4/7 decryption keys (128 possible ones)
|KIRK commands 4/7 decryption keys (128 possible ones)
|Yes
|}
|}


Line 121: Line 127:
!Id
!Id
!Content
!Content
!Do we have it?
|-
|-
|0/1
|0/1
|KIRK command 1 (IPL) public key (used to verify valid IPLs)
|KIRK command 1 (IPL) public key (used to verify valid IPLs)
|Yes (including the private key!)
|-
|-
|2/3
|2/3
|KIRK command 2 (DRM) public key (used to verify data passed to KIRK command 2)
|KIRK command 2 (DRM) public key (used to verify data passed to KIRK command 2)
|No
|-
|-
|4
|4
|KIRK command 3 (DRM) private key (used by command 2 to sign data for command 3)
|KIRK command 3 (DRM) private key (used by command 2 to sign data for command 3)
|No
|-
|-
|5/6
|5/6
|KIRK command 3 (DRM) public key (used by command 3 to verify data coming from command 2)
|KIRK command 3 (DRM) public key (used by command 3 to verify data coming from command 2)
|No
|}
|}


Line 199: Line 210:
     subkey_2[i] = subkey_1[i] = fuseid[i % 8];
     subkey_2[i] = subkey_1[i] = fuseid[i % 8];


   for (i = 0; i < 3; i++) { // Encrypt first subkey three times, and decrypt second subkey three times
   for (i = 0; i < 3; i++) { // encrypt first subkey three times, and decrypt second subkey three times
     rijndael_encrypt(&aes_ctx, subkey_1, subkey_1);
     rijndael_encrypt(&aes_ctx, subkey_1, subkey_1);
     rijndael_decrypt(&aes_ctx, subkey_2, subkey_2);
     rijndael_decrypt(&aes_ctx, subkey_2, subkey_2);
Line 206: Line 217:
   rijndael_set_key(&aes_ctx, subkey_1, 128); // set subkey_1 as AES key
   rijndael_set_key(&aes_ctx, subkey_1, 128); // set subkey_1 as AES key


   for (i = 0; i < 3; i++) { // encrypt 3, 6 and 9 times the subkey_2 to obtain the  
   for (i = 0; i < 3; i++) { // encrypt 3, 6 and 9 times the subkey_2 to obtain the final keymesh
     for (k = 0; k < 3; k++)
     for (k = 0; k < 3; k++)
       rijndael_encrypt(&aes_ctx, subkey_2, subkey_2);
       rijndael_encrypt(&aes_ctx, subkey_2, subkey_2);
Line 251: Line 262:
| KIRK_CMD_DECRYPT_BOOTROM
| KIRK_CMD_DECRYPT_BOOTROM
| Decryption of the psp devkit kbooti bootrom (no inverse)
| Decryption of the psp devkit kbooti bootrom (no inverse)
| encrypted kbooti size
| encrypted kbooti size+0x12
| decrypted kbooti bootrom size
| decrypted kbooti bootrom size
| tachsm.o
| tachsm.o
Line 420: Line 431:
|}
|}


== Command 1: decryption and authentication ==
== Command 0: decrypt kbooti ==
This command is only used by devkits to decrypt the kbooti, ie the devkit's Pre-IPL. It supposedly can only be run at a very early stage. The very short header is as follows.
{| class="wikitable"
|+
!Address
!Size
!Description
|-
|0x0
|16
|CMAC of the body, computed using AES slotted key 1
|-
|0x10
|2
|Size of the body
|-
|0x12
|...
|Body, encrypted using AES slotted key 0
|}
The command is very simple and acts as follows:
 
# Verify the command is run at an early stage
# Read the body size and check it's non-zero
# Verify the CMAC of the body using AES slotted key 1
# While computing the CMAC, verify the body size didn't change
# Decrypt body using AES slotted key 0
 
== Commands 1, 2, 3 & 10: decryption and authentication ==


=== Overview ===
=== Overview ===


This function is used to both decrypt and verify the signature of the IPL blocks.
These three functions take very similar inputs, as they all do signature verification and decryption.
 
* Command 1 is used to decrypt the IPL blocks.
* Command 2 is used to decrypt DRMBB and reencrypt them using a (random key encrypted with a) per-console key to generate data to pass to command 3.
* Command 3 decrypts data encrypted by command 2.
* Command 10 takes the same data as commands 1, 2 and 3 but only does the signature verification for the header (not for the body) and no decryption (or reencryption). It is used to verify IdStorage IDPS certificates.


There are two versions of this service: AES CMAC Verification, and ECDSA Verification. They use the header section of the input buffer slightly differently.
There are two versions of this service: AES CMAC verification, and ECDSA verification. They use the header section of the input buffer slightly differently.


In both cases, the total header length is 0x90. The first 0x60 bytes depend on the version. The last 0x30 bytes are the same in both cases:
In both cases, the total header length is 0x90. The 0x10..0x60 bytes depend on the signature mode.


'''Metadata Header Structure (Length 0x30)''':
'''Metadata Header Structure (Length 0x90)''':
{| class="wikitable"
{| class="wikitable"
|-
|-
! Address !! Size !! Description
! Address !! Size !! Description
|-
|-
| 0x60  || 4    || Set to 1
|0x00
|0x10
|Decryption key, encrypted with another key depending on the command
|-
|0x10
|0x50
|Signature information, depends on the signature mode (see below)
|-
|-
| 0x64   || 4    || 0 indicates AES CMAC version, 1 indicates ECDSA version
| 0x60   || 4    || Set to 1, 2 or 3 depending on the command
|-
|-
| 0x68  || 4    || 0
| 0x64  || 4    || Bit 0 is 0 if block is AES CMAC-signed, 1 if it is ECDSA-signed
Bit 1 is used by command 2 to determine if the resulting Kirk 3 block should be AES CMAC-signed (0) or ECDSA-signed (1)
|-
| 0x68  || 4    || Bit 0 indicates all input data (including the full header) should be wiped if the body signature check fails
|-
|-
| 0x6C  || 4    || 0 for retail version and 0xFFFFFFFF for dev versions
| 0x6C  || 4    || 0 for retail version and 0xFFFFFFFF for dev versions
Line 447: Line 500:
| 0x74  || 4    || Length of the padding after the header and before the real data
| 0x74  || 4    || Length of the padding after the header and before the real data
|-
|-
| 0x78  || 8   || 0
| 0x78  || 24   || Unused
|}
|}


=== AES CMAC Version ===
=== AES CMAC Version ===


'''Key Header Structure (Length 0x60)''':
'''Signature Structure (Length 0x60)''':
{| class="wikitable"
{| class="wikitable"
|-
|-
! Address !! Size !! Description
! Address !! Size !! Description
|-
|-
| 0x00 || 16 || Decryption key, encrypted with the Kirk command 1 AES master key
| 0x10 || 16 || CMAC key, encrypted with the the same key as the decryption key (at 0x00)
|-
| 0x10 || 16 || CMAC key, encrypted with the Kirk command 1 AES master key
|-
|-
| 0x20 || 16 || Header hash (CMAC)
| 0x20 || 16 || Header hash (CMAC)
Line 468: Line 519:
|}
|}


==== Decryption process ====
==== Verification process ====
 
The CMAC key at 0x10 is decrypted using a key which depends on the command and is the same as the decryption key at 0x00 (see below). It is decrypted using AES-CBC (so offset 0x00 is used as the IV).
 
The CMAC of the header from offset 0x60 and size 0x30 is computed. Kirk then checks the data size & offset (at 0x70 and 0x74) didn't change from what was previously read (possibly to avoid data being overwritten while being processed). The value is then checked against the value at 0x20.


The first 0x20 bytes of the Key Header are decrypted with the Kirk command 1 Stored AES Key. This was allegedly discovered by Datel by decapping the chip and reversing engineering the algorithms and keys. This was also recovered through the failure in PS3 cryptography by decrypting the isolated module in the PSP emulator on the PS3.
If this fails, the command returns KIRK_HEADER_SIG_INVALID. Otherwise, except for command 10, it proceeds with the full data CMAC, computed from header offset 0x60 to the end of the body contents. The value is checked against the value at 0x30.


The first block is the AES Key used for decrypting the main data. The second block is used to decrypt the next two blocks (0x20 bytes at offset 0x20). These represent the Metadata Header CMAC and the Data CMAC. They are checked against the AES CMAC of the metadata header section and the AES CMAC of the whole data, from the metadata header section to the end of the data (including padding in-between).
If this second check fails, and the LSB of 0x68 is set to 1, all the input data is wiped (set to zero's). In both cases, if the check fails, it then returns KIRK_HEADER_SIG_INVALID.


=== ECDSA Version ===
=== ECDSA Version ===
Line 480: Line 535:
|-
|-
! Address !! Size !! Description
! Address !! Size !! Description
|-
| 0x00 || 0x10 || Decryption key, encrypted with the Kirk command 1 AES master key
|-
|-
| 0x10 || 0x14 || Header ECDSA signature r
| 0x10 || 0x14 || Header ECDSA signature r
Line 492: Line 545:
|}
|}


==== Decryption process ====
==== Verification process ====


The ECDSA version is slightly different. Only the first block (0x10 bytes) is decrypted with the Kirk command 1 AES Key. It is used to decrypt the main data section just as in the AES CMAC version. Rather than a CMAC, the Metadata header is checked by SHA1 hashing its 0x30 bytes and checking the signature components through a ECDSA Verify call. The encrypted Data section is also checked via SHA1 of the entire data through a ECDSA Verify call.
The ECDSA version is slightly different. The header from offset 0x60 with size 0x30 is hashed and the header signature is verified. Similarly to CMAC, it then verifies values at 0x70 and 0x74 didn't change. It then acts similarly to the CMAC version with the data signature, including the possible data wiping.


The ECDSA curve parameters are indicated above.
=== Commands 1 & 3 ===
Commands 1 and 3 work exactly the same. The only difference is that the ECDSA public key comes from slots 0/1 for command 1, and 5/6 for command 3. Also, the AES key, used for decrypting the decryption & CMAC keys, is a static key in keyslot 2 for command 1, and a per-console key with seed 0 for command 3.


== Commands 2 & 3: DRM encrypt & decrypt ==
# Verify that the command mode at 0x60 matches the current command
# Read the body size and data offset and verify that the body size is non-zero
# Get or compute the AES key
# Check the signature mode at 0x64, and check the header & the data signature as specified above depending on the signature mode
# Decrypt the decryption key at 0x00 using the key from step 3.
# Decrypt the data using AES-CBC with a null IV.


These commands are mostly unknown. The header is the same as Kirk command 1, with the mode set to 2 or 3.
=== Command 2 ===
Command 2 is a bit more complicated as it re-encrypts data for command 3.


In command 2, the input data passed to Kirk is first checked (presumably CMAC), then decrypted, and re-encrypted with the console unique private key.
# Follow steps 1-5 from above, using key slots 2/3 for the ECDSA key and key slot 3 for the AES key
Having that common key would allow legit creation of DRM BB install packages.
# Copy the input header (including padding) to the output
# Change offset 0x60 (command) to command 3
# Change offset 0x64 to 0 or 1 depending on the second bit of the input value at 0x64 (which determines if the output of command 2 should be ECDSA or CMAC-signed)
# Decrypt the body of the data similarly to commands 1 & 3
# Generate a random key and encrypt it with per-console key (seed = 0), and store the result at 0x00
# If in CMAC mode for the output, do the same for the CMAC key at 0x10 (encrypt using CBC mode and data at 0x00 as the IV)
# Encrypt the body in CBC mode with a null IV
# Generate a valid CMAC or ECDSA signature for the output. For ECDSA, this uses the private key stored in key slot 4 (and is the private counterpart of slots 5/6 used by command 3).


Command 3 is the decryption counterpart of command 2.
=== Command 10 ===
Its behavior is very simple:
 
# Determine if the input is data for command 1, 2 or 3 depending on the command mode. (If it is another value, return an error.)
# Get or compute AES and ECDSA public keys depending on the command
# Check the signature similarly to the other commands.


== Commands 4~9: AES encrypt & decrypt ==
== Commands 4~9: AES encrypt & decrypt ==
Line 527: Line 599:
| 0x10 || 4 || Size of the following data
| 0x10 || 4 || Size of the following data
|}
|}
== Command 10: AES CMAC verification ==
Used to verify IdStorage IDPS certificates.
This seems to be the AES CMAC verification of Kirk command 1, and takes the same header as Command 1, the only difference is that no decryption is performed.
See command 1 information for details.
It could also possibly verify CMACs for commands 2 and 3, but that is unknown.


== Command 11: SHA1 ==
== Command 11: SHA1 ==
Line 571: Line 633:


== Command 15: Init Fuse Seeds ==
== Command 15: Init Fuse Seeds ==
Kirk initialization of Fuse Seeds. Takes a 0x1C data as input and 0x1C data as output.
Kirk initialization of Fuse Seeds. Takes a 0x1C data as input and 0x1C data as output.



Revision as of 23:38, 14 January 2024

The PSP KIRK Crypto Engine is a security hardware device that is embedded into the TACHYON main IC chip. It is a bus master and can DMA to/from main DDR RAM memory, operating independantly of the CPU. It is interfaced via memory mapped registers at base of 0xBDE00000 (SPOCK Crypto Engine on the other hand is mapped to 0xBDF00000). It is capable of performing AES encryption, decryption, SHA1 Hash, pseudo random number generation, and signature generation and verifications (ECDSA) and CMAC.

Most of the static keys used by the engine (plus the private key for Kirk command 1, which is not present on the chip) have been found through the PS3 hacks or glitching and can be found on the Keys page.

Invocation

All of the Kirk commands can be used using the function sceUtilsBufferCopyWithRange, which takes five arguments:

  • the output buffer (if there is one, NULL otherwise)
  • the output buffer size (if there is one, 0 otherwise)
  • the input buffer (if there is one, NULL otherwise)
  • the input buffer size (if there is one, 0 otherwise)
  • the index of the command (as detailed below).

Elliptic curves

The PSP uses ECDSA for public-key cryptography. Elliptic curves are known for being fast and only requiring small keys, contrary to other public-key cryptography algorithms. They are still considered to be very secure, even for the 160-bit curves used by the PSP, unless a mistake is made when using them.

These curves have been designed by Sony only for the console. They are not vulnerable to any known attack.

Both use the usual Weierstrass form.

Elliptic curve for Kirk commands 1/2/3/10

This curve is used for the ECDSA verification of Kirk commands 1, 2, 3 and 10.

p = 0xFFFFFFFFFFFFFFFF0001B5C617F290EAE1DBAD8F
G = (0x2259ACEE15489CB096A882F0AE1CF9FD8EE5F8FA, 0x604358456D0A1CB2908DE90F27D75C82BEC108C0)
n = 0xFFFFFFFFFFFFFFFF00000001FFFFFFFFFFFFFFFF
a = -3
b = 0x65D1488C0359E234ADC95BD3908014BD91A525F9

The public key is hardcoded, and is equal to: (0xED9CE58234E61A53C685D64D51D0236BC3B5D4B9, 0x049DF1A075C0E04FB344858B61B79B69A63D2C39).

Elliptic curve for the other commands

This curved is used for Kirk commands 12, 13, 14, 16 and 17.

p = 0xFFFFFFFFFFFFFFFEFFFFB5AE3C523E63944F2127
G = (0x128EC4256487FD8FDF64E2437BC0A1F6D5AFDE2C, 0x5958557EB1DB001260425524DBC379D5AC5F4ADF)
n = 0xFFFFFFFFFFFFFFFF00000001FFFFFFFFFFFFFFFF
a = -3
b = 0xA68BEDC33418029C1D3CE33B9A321FCCBB9E0F0B

The public key is variable. For the latest Pre-IPL version which add an additional ECDSA verification of the XOR of the block hashes, the public key is (0xBC660611A70BD7F2D140A48215C096D11D2D4112, 0xF0E9379AC4E0D387C542D091349DD15169DD5A87).

Code sample

Below is an example of how to manipulate these curves using the ecpy python library.

import ecpy.curves

psp_curve_cmd1 = {
    'name':      "psp_curve_cmd1",
    'type':      "weierstrass",
    'size':      160,
    'field':     0xFFFFFFFFFFFFFFFF00000001FFFFFFFFFFFFFFFF,
    'generator': (0x2259ACEE15489CB096A882F0AE1CF9FD8EE5F8FA, 0x604358456D0A1CB2908DE90F27D75C82BEC108C0),
    'order':     0xFFFFFFFFFFFFFFFF0001B5C617F290EAE1DBAD8F,
    'cofactor':  1,
    'a':         -3,
    'b':         0x65D1488C0359E234ADC95BD3908014BD91A525F9,
}

psp_curve_cmd17 = {
    'name':      "psp_curve_cmd17",
    'type':      "weierstrass",
    'size':      160,
    'field':     0xFFFFFFFFFFFFFFFF00000001FFFFFFFFFFFFFFFF,
    'generator': (0x128EC4256487FD8FDF64E2437BC0A1F6D5AFDE2C, 0x5958557EB1DB001260425524DBC379D5AC5F4ADF),
    'order':     0xFFFFFFFFFFFFFFFEFFFFB5AE3C523E63944F2127,
    'cofactor':  1,
    'a':         -3,
    'b':         0xA68BEDC33418029C1D3CE33B9A321FCCBB9E0F0B,
}

crv1 = ecpy.curves.WeierstrassCurve(psp_curve_cmd1)
crv17 = ecpy.curves.WeierstrassCurve(psp_curve_cmd17)

pt1 = ecpy.curves.Point(0xED9CE58234E61A53C685D64D51D0236BC3B5D4B9, 0x049DF1A075C0E04FB344858B61B79B69A63D2C39, crv1)
pt17 = ecpy.curves.Point(0xbc660611a70bd7f2d140a48215c096d11d2d4112, 0xf0e9379ac4e0d387c542d091349dd15169dd5a87, crv17)

# verify the Kirk command 1 ECDSA private key
crv1_g = ecpy.curves.Point(0x2259ACEE15489CB096A882F0AE1CF9FD8EE5F8FA, 0x604358456D0A1CB2908DE90F27D75C82BEC108C0, crv1)
assert(crv1.mul_point(crv1.generator, 0xF392E26490B80FD889F2D9722C1F34D7274F983D) == pt1)

Slotted Keys

The KIRK ROM can access different keys which are slotted in what might be some kind of secure enclave. There are slots for both AES and ECDSA keys.

AES slotted keys

Id Content Do we have it?
0 KIRK command 0 (Kbooti from Devkit) decryption key No
1 KIRK command 0 (Kbooti from Devkit) CMAC key No
2 KIRK command 1 (IPL) decryption key Yes
3 KIRK command 2 (DRM) decryption key No
4~131 KIRK commands 4/7 decryption keys (128 possible ones) Yes

ECDSA slotted keys

Note: public keys take two slots (for both coordinates), and private keys take only one.

Id Content Do we have it?
0/1 KIRK command 1 (IPL) public key (used to verify valid IPLs) Yes (including the private key!)
2/3 KIRK command 2 (DRM) public key (used to verify data passed to KIRK command 2) No
4 KIRK command 3 (DRM) private key (used by command 2 to sign data for command 3) No
5/6 KIRK command 3 (DRM) public key (used by command 3 to verify data coming from command 2) No

Per-console keys

Some Kirk commands like commands 16 and 18 use individual (per-console) seeds. The base per-console seed is the Fuse ID (6 bytes), which is transformed into a 0x30 bytes buffer ("key mesh"). This buffer is used to generate different keys depending on a seed.

Seed Usage
0 Kirk commands 2 (encryption) & 3 (decryption) (the real encryption & CMAC keys are random, but this per-console key is used to encrypt them)
1 Kirk command 5 (encryption) & 8 (decryption)
2 Kirk command 6 (encryption) & 9 (decryption)
3 Kirk command 16
4 Kirk command 18
5 Unused
6 RNG buffer reseeding
typedef struct ScePspKeyMesh { // size is 0x30
    SceUInt8 aes128cbc_key_1[0x10]; // used by Kirk commands 5 & 8 and 16
    SceUInt8 aes128cbc_key_2[0x10]; // used by Kirk command 2 & 3, 6 & 9 and 18
    SceUInt8 derivation_key[0x10]; // used to derive the 2 other keys
} ScePspKeyMesh;

To generate the key mesh of a PSP, provided the Fuse ID (0xBC100090 and 0xBC100094 hardware registers), execute the following code.

void gen_psp_individual_seed() {   
  int i, k;
  ScePspKeyMesh seed;
  u8 subkey_1[0x10], subkey_2[0x10];
  rijndael_ctx aes_ctx;
  u8 fuseid[8];
  
  // Byte-reverse the Fuse ID
  u32 g_fuse90 = *(u32 *)0xBC100090;
  u32 g_fuse94 = *(u32 *)0xBC100094;
  fuseid[7] = g_fuse90 &0xFF;
  fuseid[6] = (g_fuse90>>8) &0xFF;
  fuseid[5] = (g_fuse90>>16) &0xFF;
  fuseid[4] = (g_fuse90>>24) &0xFF;
  fuseid[3] = g_fuse94 &0xFF;
  fuseid[2] = (g_fuse94>>8) &0xFF;
  fuseid[1] = (g_fuse94>>16) &0xFF;
  fuseid[0] = (g_fuse94>>24) &0xFF;
 
  rijndael_set_key(&aes_ctx, ids_master_key, 128); // set ids_master_key as AES key
  
  for (i = 0; i < 0x10; i++) // initialize the subkeys using the Fuse ID
    subkey_2[i] = subkey_1[i] = fuseid[i % 8];

  for (i = 0; i < 3; i++) { // encrypt first subkey three times, and decrypt second subkey three times
    rijndael_encrypt(&aes_ctx, subkey_1, subkey_1);
    rijndael_decrypt(&aes_ctx, subkey_2, subkey_2);
  }

  rijndael_set_key(&aes_ctx, subkey_1, 128); // set subkey_1 as AES key

  for (i = 0; i < 3; i++) { // encrypt 3, 6 and 9 times the subkey_2 to obtain the final keymesh
    for (k = 0; k < 3; k++)
      rijndael_encrypt(&aes_ctx, subkey_2, subkey_2);
    memcpy(&seed[i * 0x10], subkey_2, 0x10);
  }
}

The key mesh can then be used along with a seed to generate a key using the following algorithm:

void make_perconsole_key(u8 output[16], int seed, ScePspKeyMesh keymesh)
{
    if (seed & 1) {
        memcpy(output, keymesh.aes128cbc_key_2, 16);
    } else {
        memcpy(output, keymesh.aes128cbc_key_1, 16);
    }
    // Encrypt the result several times depending on the seed
    rijndael_set_key(&aes_ctx, keymesh.aes128cbc_derivation_key);
    seed = (seed / 2) + 1;
    while ((seed--) >= 0) {
        rijndael_encrypt(&aes_ctx, output);
    }
}

Commands

On PSP there are 19 Kirk commands. On PSVita, there are these 19 commands plus some new commands to support bigger keys (192 bits for example). See F00D commands.

Kirk commands are called with the same 5 arguments (outbuf, outbuf_size, inbuf, inbuf_size, service_number (which is the command ID)). Depending on the service number used, the expectations of the inbuf or outbuf vary and are detailed below.

Table

Command ID Name Short description Input size Output size Used in Uses perconsole key fuse based algo? Uses slot key? (if yes, specify)
0 KIRK_CMD_DECRYPT_BOOTROM Decryption of the psp devkit kbooti bootrom (no inverse) encrypted kbooti size+0x12 decrypted kbooti bootrom size tachsm.o No Slot0_AES_1_CMAC
1 KIRK_CMD_DECRYPT_PRIVATE Super-Duper decryption (no inverse) buf_size+0x90 buf_size memlmd, mesg_led, bootrom No Slot2_AES_CMAC
2 KIRK_CMD_DNAS_ENCRYPT Encrypt Operation for DNAS (inverse of command 3) buf_size+0x90 buf_size mesg_led Yes Slot3_AES
3 KIRK_CMD_DNAS_DECRYPT Decrypt Operation for DNAS (inverse of command 2) buf_size+0x90 buf_size mesg_led Yes No
4 KIRK_CMD_ENCRYPT_STATIC Encrypt Operation (inverse of command 7) (key=static) buf_size+0x14 buf_size+0x14 chnnlsv, memab, openpsid No Slot4<->0x83_AES
5 KIRK_CMD_ENCRYPT_PERCONSOLE Encrypt Operation (inverse of command 8) (key=per-console) buf_size+0x14 buf_size+0x14 openpsid, chnnlsv, psheet since PSP FW 2.81 for PGD, ?openpsid for IDPS Certificates? Yes No
6 KIRK_CMD_ENCRYPT_USER Encrypt Operation (inverse of command 9) (key=user-defined) buf_size+0x24 buf_size+0x34 power, inside a kl4e blob, IPL (stage 2) Yes No
7 KIRK_CMD_DECRYPT_STATIC Decrypt Operation (inverse of command 4) (key=static) buf_size+0x14 buf_size+0x14 memlmd, mesg_led,chnnlsv, memab, openpsid, bootrom No Slot4<->0x83_AES
8 KIRK_CMD_DECRYPT_PERCONSOLE Decrypt Operation (inverse of command 5) (key=per-console) buf_size+0x14 buf_size+0x14 memlmd, chnnlsv, psheet since PSP FW 2.81 for PGD Yes No
9 KIRK_CMD_DECRYPT_USER Decrypt Operation (inverse of command 6) (key=user-defined) buf_size+0x34 (header + key) buf_size power, inside a kl4e blob, IPL (stage 2) Yes No
10 (0xA) KIRK_CMD_PRIV_SIGVRY Private Signature Verify (checks for private SCE sig) buf_size+0x90 0 Yes No
11 (0xB) KIRK_CMD_HASH SHA1 Hash buf_size >= 0x14 0x14 memlmd, mesg_led, memab, chkreg, openpsid, bootrom No No
12 (0xC) KIRK_CMD_ECDSA_GENKEY ECDSA Generate Private/Public Key Pair 0 0x3C memab, openpsid No No
13 (0xD) KIRK_CMD_ECDSA_MUL ECDSA Multiply Point 0x3C 0x3C memab, openpsid No No
14 (0xE) KIRK_CMD_PRNGEN Pseudo Random Number Generation 0 0x14 mesg_led, chnnlsv, memab, semawm, openpsid No No
15 (0xF) KIRK_CMD_INIT_FUSE_SEEDS Initializes Kirk Fuse Seeds. 0x1C 0x1C IPL Yes No
16 (0x10) KIRK_CMD_SIGGEN ECDSA Signature Generation 0x34 0x28 memab, openpsid Yes No
17 (0x11) KIRK_CMD_SIGVRY Signature Verification (checks for generated signatures) 0x64 0 memab, memlmd, mesg_led, openpsid No No
18 (0x12) KIRK_CMD_CERTVRY Certificate Verification (IDStorage Certificates CMAC) 0xB8 0 openpsid, memab, chkreg Yes No

Command 0: decrypt kbooti

This command is only used by devkits to decrypt the kbooti, ie the devkit's Pre-IPL. It supposedly can only be run at a very early stage. The very short header is as follows.

Address Size Description
0x0 16 CMAC of the body, computed using AES slotted key 1
0x10 2 Size of the body
0x12 ... Body, encrypted using AES slotted key 0

The command is very simple and acts as follows:

  1. Verify the command is run at an early stage
  2. Read the body size and check it's non-zero
  3. Verify the CMAC of the body using AES slotted key 1
  4. While computing the CMAC, verify the body size didn't change
  5. Decrypt body using AES slotted key 0

Commands 1, 2, 3 & 10: decryption and authentication

Overview

These three functions take very similar inputs, as they all do signature verification and decryption.

  • Command 1 is used to decrypt the IPL blocks.
  • Command 2 is used to decrypt DRMBB and reencrypt them using a (random key encrypted with a) per-console key to generate data to pass to command 3.
  • Command 3 decrypts data encrypted by command 2.
  • Command 10 takes the same data as commands 1, 2 and 3 but only does the signature verification for the header (not for the body) and no decryption (or reencryption). It is used to verify IdStorage IDPS certificates.

There are two versions of this service: AES CMAC verification, and ECDSA verification. They use the header section of the input buffer slightly differently.

In both cases, the total header length is 0x90. The 0x10..0x60 bytes depend on the signature mode.

Metadata Header Structure (Length 0x90):

Address Size Description
0x00 0x10 Decryption key, encrypted with another key depending on the command
0x10 0x50 Signature information, depends on the signature mode (see below)
0x60 4 Set to 1, 2 or 3 depending on the command
0x64 4 Bit 0 is 0 if block is AES CMAC-signed, 1 if it is ECDSA-signed

Bit 1 is used by command 2 to determine if the resulting Kirk 3 block should be AES CMAC-signed (0) or ECDSA-signed (1)

0x68 4 Bit 0 indicates all input data (including the full header) should be wiped if the body signature check fails
0x6C 4 0 for retail version and 0xFFFFFFFF for dev versions
0x70 4 Length of decrypted data
0x74 4 Length of the padding after the header and before the real data
0x78 24 Unused

AES CMAC Version

Signature Structure (Length 0x60):

Address Size Description
0x10 16 CMAC key, encrypted with the the same key as the decryption key (at 0x00)
0x20 16 Header hash (CMAC)
0x30 16 Data hash (CMAC)
0x40 32 0

Verification process

The CMAC key at 0x10 is decrypted using a key which depends on the command and is the same as the decryption key at 0x00 (see below). It is decrypted using AES-CBC (so offset 0x00 is used as the IV).

The CMAC of the header from offset 0x60 and size 0x30 is computed. Kirk then checks the data size & offset (at 0x70 and 0x74) didn't change from what was previously read (possibly to avoid data being overwritten while being processed). The value is then checked against the value at 0x20.

If this fails, the command returns KIRK_HEADER_SIG_INVALID. Otherwise, except for command 10, it proceeds with the full data CMAC, computed from header offset 0x60 to the end of the body contents. The value is checked against the value at 0x30.

If this second check fails, and the LSB of 0x68 is set to 1, all the input data is wiped (set to zero's). In both cases, if the check fails, it then returns KIRK_HEADER_SIG_INVALID.

ECDSA Version

Key Header Structure (Length 0x60):

Address Size Description
0x10 0x14 Header ECDSA signature r
0x24 0x14 Header ECDSA signature s
0x38 0x14 Data ECDSA signature r
0x4C 0x14 Data ECDSA signature s

Verification process

The ECDSA version is slightly different. The header from offset 0x60 with size 0x30 is hashed and the header signature is verified. Similarly to CMAC, it then verifies values at 0x70 and 0x74 didn't change. It then acts similarly to the CMAC version with the data signature, including the possible data wiping.

Commands 1 & 3

Commands 1 and 3 work exactly the same. The only difference is that the ECDSA public key comes from slots 0/1 for command 1, and 5/6 for command 3. Also, the AES key, used for decrypting the decryption & CMAC keys, is a static key in keyslot 2 for command 1, and a per-console key with seed 0 for command 3.

  1. Verify that the command mode at 0x60 matches the current command
  2. Read the body size and data offset and verify that the body size is non-zero
  3. Get or compute the AES key
  4. Check the signature mode at 0x64, and check the header & the data signature as specified above depending on the signature mode
  5. Decrypt the decryption key at 0x00 using the key from step 3.
  6. Decrypt the data using AES-CBC with a null IV.

Command 2

Command 2 is a bit more complicated as it re-encrypts data for command 3.

  1. Follow steps 1-5 from above, using key slots 2/3 for the ECDSA key and key slot 3 for the AES key
  2. Copy the input header (including padding) to the output
  3. Change offset 0x60 (command) to command 3
  4. Change offset 0x64 to 0 or 1 depending on the second bit of the input value at 0x64 (which determines if the output of command 2 should be ECDSA or CMAC-signed)
  5. Decrypt the body of the data similarly to commands 1 & 3
  6. Generate a random key and encrypt it with per-console key (seed = 0), and store the result at 0x00
  7. If in CMAC mode for the output, do the same for the CMAC key at 0x10 (encrypt using CBC mode and data at 0x00 as the IV)
  8. Encrypt the body in CBC mode with a null IV
  9. Generate a valid CMAC or ECDSA signature for the output. For ECDSA, this uses the private key stored in key slot 4 (and is the private counterpart of slots 5/6 used by command 3).

Command 10

Its behavior is very simple:

  1. Determine if the input is data for command 1, 2 or 3 depending on the command mode. (If it is another value, return an error.)
  2. Get or compute AES and ECDSA public keys depending on the command
  3. Check the signature similarly to the other commands.

Commands 4~9: AES encrypt & decrypt

All these commands do AES128-CBC encryption/decryption with an IV equal to 0. - Commands 4 (encryption) and 7 (decryption) use a one of the 128 keys stored in the Kirk chip and available on the Keys page, index being given by the keyseed field (which must be between 0x00 and 0x7F) - Commands 5 (encryption) and 8 (decryption) use an unknown per-console key (it is unknown if it is derived from other data, or just stored as-is on the chip) - Commands 6 (encryption) and 9 (decryption) use a key derived from the keyseed using an unknown key derivation function

In all cases, data is prefixed with a 0x14-byte long header:

Address Size Description
0x00 4 Mode: must be 4 for encryption, 5 for decryption
0x04 8 Unknown (0?)
0x0C 4 Keyseed
0x10 4 Size of the following data

Command 11: SHA1

This command computes the SHA1 of the input. The input must be prefixed with a 4-byte header giving the length of the buffer. Output is 0x14-byte long.

Command 12: ECDSA key pair generation

This command generates a random private key and computes the associated public key. See above for the parameters of the elliptic curve.

This returns the following into the keypair buffer, of size 0x3C (each value is 0x14 bytes long):

  • 0x00 - randomly generated private key
  • 0x14 - Public Key point x value
  • 0x28 - Public Key point y value

Command 13: ECDSA point multiplication

This command multiplies an elliptic curve point by a scalar. See above for the parameters of the elliptic curve.

Input (size 0x3c):

  • 0x00 - scalar k
  • 0x14 - point x value P.x
  • 0x28 - point y value P.y

Output (size 0x28):

  • 0x00 - point x value (kP).x
  • 0x14 - point y value (kP).y

The result is a new point(x and y are each 0x14 bytes long).

Command 14: PRNG

This function takes no input and generates random data of the given size (depending on the specified size of the output buffer).

Command 15: Init Fuse Seeds

Kirk initialization of Fuse Seeds. Takes a 0x1C data as input and 0x1C data as output.

Command 16: ECDSA signature generation

This command generates an ECDSA signature of a SHA1 hash (0x14 buffer) using an encrypted private key.

Input is:

  • 0x00: 0x20-byte long encrypted buffer containing the private key
  • 0x20: the message hash.

The output is a 0x28-byte long signature (r and s, both 0x14-byte long).

The private key buffer is encrypted with a device-specific encryption using the FuseID.

Here is the code of the decryption, thanks to Davee & Proxima. g_fuse90 and g_fuse94 are the two words composing the FuseID (present at the 0xBC100090 and 0xBC100094 hardware registers).

Output is 0x20-byte long, but the last 0xC bytes are ignored (and possibly always equal to zero) for the private key.

void decrypt_kirk16_private(u8 *dA_out, u8 *dA_enc)
{   
  int i, k;
  kirk16_data keydata;
  u8 subkey_1[0x10], subkey_2[0x10];
  rijndael_ctx aes_ctx;
  
  keydata.fuseid[7] = g_fuse90 &0xFF;
  keydata.fuseid[6] = (g_fuse90>>8) &0xFF;
  keydata.fuseid[5] = (g_fuse90>>16) &0xFF;
  keydata.fuseid[4] = (g_fuse90>>24) &0xFF;
  keydata.fuseid[3] = g_fuse94 &0xFF;
  keydata.fuseid[2] = (g_fuse94>>8) &0xFF;
  keydata.fuseid[1] = (g_fuse94>>16) &0xFF;
  keydata.fuseid[0] = (g_fuse94>>24) &0xFF;
 
  /* set encryption key */
  rijndael_set_key(&aes_ctx, kirk16_key, 128);
  
  /* set the subkeys */
  for (i = 0; i < 0x10; i++)
  {
    /* set to the fuseid */
    subkey_2[i] = subkey_1[i] = keydata.fuseid[i % 8];
  } 

  /* do aes crypto */
  for (i = 0; i < 3; i++)
  {
    /* encrypt + decrypt */
    rijndael_encrypt(&aes_ctx, subkey_1, subkey_1);
    rijndael_decrypt(&aes_ctx, subkey_2, subkey_2);
  }

  /* set new key */
  rijndael_set_key(&aes_ctx, subkey_1, 128);

  /* now lets make the key mesh */
  for (i = 0; i < 3; i++)
  {
    /* do encryption in group of 3 */
    for (k = 0; k < 3; k++)
    {
      /* crypto */
      rijndael_encrypt(&aes_ctx, subkey_2, subkey_2);
    }

    /* copy to out block */
    memcpy(&keydata.mesh[i * 0x10], subkey_2, 0x10);
  }

  /* set the key to the mesh */
  rijndael_set_key(&aes_ctx, &keydata.mesh[0x20], 128);

  /* do the encryption routines for the aes key */
  for (i = 0; i < 2; i++)
  {
    /* encrypt the data */
    rijndael_encrypt(&aes_ctx, &keydata.mesh[0x10], &keydata.mesh[0x10]);
  }

  /* set the key to that mesh shit */
  rijndael_set_key(&aes_ctx, &keydata.mesh[0x10], 128);

  /* cbc decrypt the dA */
  AES_cbc_decrypt((AES_ctx *)&aes_ctx, dA_enc, dA_out, 0x20);
}

Command 17: ECDSA signature verification

This command verifies an ECDSA signature using the ECDSA curve described above.

It takes no output, and takes as an input:

  • 0x00: public key
  • 0x28: signed message hash
  • 0x3C: signature r
  • 0x50: signature s

The result of the operation is given by the return value (0 on success, 5 on failure to verify the signature).

Command 18: verify certificate

This command has most likely no output header.

It takes as an input a 0xB8-long buffer:

  • 0x00: certificate data (either ConsoleID or OpenPSID)
  • 0x10: certificate public key (x and y)
  • 0x38: ECDSA signature (r and s)
  • 0x60: ECDSA public key used for the signature
  • 0x88: certificate encrypted private key (padded)
  • 0xA8: AES-CMAC hash of the rest of the header.

Details are on PS Vita wiki. See also DespertarDelCementerio and CEX2DEX programs source codes.

Error codes

    0×00: Success
    0×01: Kirk not enabled
    0×02: Invalid mode
    0×03: Invalid header digest
    0×04: Invalid data digest
    0×05: Invalid signature
    0x0C: isInCriticalSection violation
    0x0D: Invalid operation (out of 1-18 range)
    0x0E: Invalid seed/code (cipher operations)
    0x0F: Invalid ?header size? (cipher operations)
    0×10: Invalid data size (equals 0) (sign/cipher operations)

Code Samples

Open problems

  • The private key corresponding to the latest version Bootrom public key is unknown.
  • Commands 0, 2, 3 are mostly unknown and need testing/documentation.