emulator_drm only contains isolated module, you have to extract it and use spu-objdump on it.ben1066 wrote:Right I managed to decrypt the sprx with unself from ps3tools under linux but I cant manage to run spu-objdump. It keeps saying
spu-objdump: emulator_drm.prx: File format not recognized
Any idea what I'm doing wrong?
Yes, i think same. As i know, AES CTR is inverse to itself (= no encryption/decryption operations). Kirk command 7 (used in PRX) has inverse command 4 (inverse for PRX keys is disabled). Thanks to CBC fact i was able "encrypt" any data which were correctly decrypted by kirk command 7, but first 16 bytes were always "random".coyotebean wrote:Also I still think there is AES CBC operation somewhere, Kirk decrypt exhibit CBC behaviour, i.e. when 1 bit is reverse, the decoding of that block is messed up and the next block has the bit reversed in the same position. AES CTR operation alone will not chain the changes to the next block.
EDIT: Here is example - just use kirk command 7 on it. Note that i just use decrypting algorithm fact and i don't know keys - that's why first 16 bytes are "random".