You can decrypt the .self once you have the klicensee from the eboot.
Decrypt the eboot so it becomes a .elf
In the .elf, you will need to find the klicensee key. Once you have that, use SCETool to decrypt the self:
scetool.exe -v -l WHATEVERTHEKLICENSEWASINHEX -d t6mp_ps3f.self t6mp_ps3f.elf
In my eboot.elf, the klicensee was at offset 00AFC3C0 and matches the one posted earlier:
8C 10 AC 14 73 DF 38 AD D7 A4 F2 EE 8C 83 8D AB
So, the SCETool command would be:
scetool.exe -v -l 8C10AC1473DF38ADD7A4F2EE8C838DAB -d t6mp_ps3f.self t6mp_ps3f.elf