Editing Keys
Jump to navigation
Jump to search
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 253: | Line 253: | ||
== sv_iso_spu_module 095.001 - 3.55 == | == sv_iso_spu_module 095.001 - 3.55 == | ||
key_0: EF4F6A107742E8448BC1F9D8F2481B31 // key_0 is an AES128CBC key, used with zero iv | key_0: EF4F6A107742E8448BC1F9D8F2481B31 // key_0 is an AES128CBC key, used with zero iv | ||
iv_0(ss::giv): 2226928D44032F436AFD267E748B2393 | iv_0(ss::giv): 2226928D44032F436AFD267E748B2393 | ||
Line 314: | Line 314: | ||
uint8_t nppp_aes128cbc_iv[0x10] = {0}; | uint8_t nppp_aes128cbc_iv[0x10] = {0}; | ||
</source> | </source> | ||
ss::Kf1_u0: 213AA19F9640484DED1A90FF6E535BD9 | ss::Kf1_u0: 213AA19F9640484DED1A90FF6E535BD9 | ||
Line 324: | Line 323: | ||
ss::Kf1_u3: DC082F837F1487C2008B7BC920C55BD9 | ss::Kf1_u3: DC082F837F1487C2008B7BC920C55BD9 | ||
ss::Kf2_u3: E80885F96ED0F36752CE52BEC3C74EF3 | ss::Kf2_u3: E80885F96ED0F36752CE52BEC3C74EF3 | ||
These keys used for auth_drive_user | These keys used for auth_drive_user | ||
Line 351: | Line 348: | ||
These keys used on sv_udata_command::set_command() | These keys used on sv_udata_command::set_command() | ||
== spu_token_processor == | == spu_token_processor == | ||
Line 728: | Line 723: | ||
* 0x160 bytes of keys and a padding of zeroes present inside decrypted EID1. | * 0x160 bytes of keys and a padding of zeroes present inside decrypted EID1. | ||
* This crypto is also valid for PS3 SLIMs SW2 ! | * This crypto is also valid for PS3 SLIMs SW2 ! | ||
==== 0x20 Master Key ==== | ==== 0x20 Master Key ==== | ||
Line 826: | Line 815: | ||
* (0x130 xor 0x4578) | * (0x130 xor 0x4578) | ||
==== TB2SC Key ==== | ==== TB2SC Key ==== | ||
Line 840: | Line 823: | ||
* (0x130 xor 0x4588) | * (0x130 xor 0x4588) | ||
==== secure_com_lib_internal_key::session_key_create_key ==== | ==== secure_com_lib_internal_key::session_key_create_key ==== | ||
Line 1,012: | Line 989: | ||
* exists on slims! | * exists on slims! | ||
==== 0x140 Master Key ==== | ==== 0x140 Master Key ==== | ||
Line 1,028: | Line 997: | ||
* PTCH xor key | * PTCH xor key | ||
==== PTCH CIPHER XOR ==== | ==== PTCH CIPHER XOR ==== | ||
Line 1,042: | Line 1,005: | ||
* exists on slims! | * exists on slims! | ||
==== PTCH HASHER XOR ==== | ==== PTCH HASHER XOR ==== | ||
Line 1,058: | Line 1,013: | ||
* exists on slims! | * exists on slims! | ||
==== COK-001 body key ==== | ==== COK-001 body key ==== | ||
Line 1,446: | Line 1,393: | ||
|} | |} | ||
=== PS3 NIDs Salt === | |||
<pre> | <pre> | ||
6759659904250490566427499489741A | |||
</pre> | </pre> | ||
=== PS3 NONAME NIDs Salt === | |||
<pre> | <pre> | ||
"0xbc5eba9e042504905b64274994d9c41f" | |||
</pre> | </pre> | ||
* Note that this | * Note that this string is used, NOT the hex value for it! | ||
* Credit to ClientHax for the discovery | |||
* WTF Sony! | |||
=== Bluray Drive Keys === | === Bluray Drive Keys === | ||
Line 1,485: | Line 1,428: | ||
It can be used to decrypt emboot and another perdevice areas. | It can be used to decrypt emboot and another perdevice areas. | ||
=== EID0 Sections Keys === | === EID0 Sections Keys === | ||
Line 3,147: | Line 2,022: | ||
MG_KBIT_MASTER_KEY 5001C87121F939C144D86B069224B247 <- me_iso | MG_KBIT_MASTER_KEY 5001C87121F939C144D86B069224B247 <- me_iso | ||
MG_KC_MASTER_KEY 77F38314B047D87C9B37D266049228C4 <- me_iso | MG_KC_MASTER_KEY 77F38314B047D87C9B37D266049228C4 <- me_iso | ||
META_KEY_RETAIL 389DCBA5203C8159ECF94C9393164CC9 <- sb_iso | META_KEY_RETAIL 389DCBA5203C8159ECF94C9393164CC9 <- sb_iso | ||
DATA_KEY_RETAIL 1017823463F468C1AA41D700B140F257 <- sb_iso | DATA_KEY_RETAIL 1017823463F468C1AA41D700B140F257 <- sb_iso | ||
VMC_KEY_RETAIL 64E30D19A16941D677E32EEBE07F45D2 <- sb_iso | VMC_KEY_RETAIL 64E30D19A16941D677E32EEBE07F45D2 <- sb_iso | ||
META_KEY_DEBUG 2B05F7C7AFD1B169D62586503AEA9798 <- sb_iso | META_KEY_DEBUG 2B05F7C7AFD1B169D62586503AEA9798 <- sb_iso | ||
DATA_KEY_DEBUG 74FF7E5D1D7B96943BEFDCFA81FC2007 <- sb_iso | DATA_KEY_DEBUG 74FF7E5D1D7B96943BEFDCFA81FC2007 <- sb_iso | ||
VMC_KEY_DEBUG 30479D4B80E89E2B59E5C9145E1064A9 <- sb_iso | VMC_KEY_DEBUG 30479D4B80E89E2B59E5C9145E1064A9 <- sb_iso | ||
MG_SIG_HASH_KEY 65E88B1A9E3FD268 <- me_iso | MG_SIG_HASH_KEY 65E88B1A9E3FD268 <- me_iso | ||
MG_SIG_MASTER_KEY 51ED689419A83AD8 <- me_iso | MG_SIG_MASTER_KEY 51ED689419A83AD8 <- me_iso | ||
Line 3,366: | Line 2,241: | ||
kirk_unk100 = 000102030405060708090A0B0C0D0E0F | kirk_unk100 = 000102030405060708090A0B0C0D0E0F | ||
=== PSP | === PSP IdStorage Master Key === | ||
psp_idstorage_master_key = 475E09F4A237DA9BEFFF3BC077143D8A | psp_idstorage_master_key = 475E09F4A237DA9BEFFF3BC077143D8A | ||
=== DOCUMENT.DAT === | === DOCUMENT.DAT === |