Editing Keys
Jump to navigation
Jump to search
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 3: | Line 3: | ||
= Keys Notes = | = Keys Notes = | ||
You can download the keys from: | You can download the keys from: [http://www.ps3devwiki.com/files/devtools/ps3keys/ ps3keys] (or for scetool here : [http://www.ps3devwiki.com/files/devtools/scetool/data/ scetool/data/]) | ||
[https://github.com/search?utf8=%E2%9C%93&q=PS3keys&repo=&langOverride=&start_value=1&type=Repositories&language= ''ps3keys at Github''] / | <!--// [https://github.com/search?utf8=%E2%9C%93&q=PS3keys&repo=&langOverride=&start_value=1&type=Repositories&language= ''ps3keys at Github''] / http://www.mirrorcreator.com/files/JSM2FRCD/ps3keys.exe_links [http://www.ps3devwiki.com/files/firmware/MFW-CEX/PS3MFWBuilder/ps3keys.exe ''ps3keys in RAR sfx (254.01 KB)''] / [http://www.mirrorcreator.com/files/EVWOWZES/ps3keys.zip_links ps3keys.zip (229.9 KB)] //--> | ||
== Location == | == Location == | ||
Line 253: | Line 253: | ||
== sv_iso_spu_module 095.001 - 3.55 == | == sv_iso_spu_module 095.001 - 3.55 == | ||
key_0: EF4F6A107742E8448BC1F9D8F2481B31 // key_0 is an AES128CBC key, used with zero iv | key_0: EF4F6A107742E8448BC1F9D8F2481B31 // key_0 is an AES128CBC key, used with zero iv | ||
iv_0(ss::giv): 2226928D44032F436AFD267E748B2393 | iv_0(ss::giv): 2226928D44032F436AFD267E748B2393 | ||
Line 259: | Line 259: | ||
key_0_1(ss::kms2): D9A20A79666C27D11032ACCF0D7FB501 // key_0_1 is used with iv_0 to generate gen_key_1(ss::sv_auth::ks2) | key_0_1(ss::kms2): D9A20A79666C27D11032ACCF0D7FB501 // key_0_1 is used with iv_0 to generate gen_key_1(ss::sv_auth::ks2) | ||
key_1(Kwm): 7CDD0E02076EFE4599B1B82C359919B3 // key_1 is used with iv_0 | key_1(Kwm): 7CDD0E02076EFE4599B1B82C359919B3 // key_1 is used with iv_0 | ||
iv_1(ivs_aes): 3BD624020BD3F865E80B3F0CD6566DD0 // iv_1 is used with gen_key_0 and gen_key_1 | iv_1(ivs_aes): 3BD624020BD3F865E80B3F0CD6566DD0 // iv_1 is used with gen_key_0 and gen_key_1 | ||
Line 314: | Line 314: | ||
uint8_t nppp_aes128cbc_iv[0x10] = {0}; | uint8_t nppp_aes128cbc_iv[0x10] = {0}; | ||
</source> | </source> | ||
== spu_token_processor == | == spu_token_processor == | ||
Line 728: | Line 689: | ||
* 0x160 bytes of keys and a padding of zeroes present inside decrypted EID1. | * 0x160 bytes of keys and a padding of zeroes present inside decrypted EID1. | ||
* This crypto is also valid for PS3 SLIMs SW2 ! | * This crypto is also valid for PS3 SLIMs SW2 ! | ||
==== 0x20 Master Key ==== | ==== 0x20 Master Key ==== | ||
Line 826: | Line 781: | ||
* (0x130 xor 0x4578) | * (0x130 xor 0x4578) | ||
==== TB2SC Key ==== | ==== TB2SC Key ==== | ||
Line 840: | Line 789: | ||
* (0x130 xor 0x4588) | * (0x130 xor 0x4588) | ||
==== secure_com_lib_internal_key::session_key_create_key ==== | ==== secure_com_lib_internal_key::session_key_create_key ==== | ||
Line 1,012: | Line 955: | ||
* exists on slims! | * exists on slims! | ||
==== 0x140 Master Key ==== | ==== 0x140 Master Key ==== | ||
Line 1,028: | Line 963: | ||
* PTCH xor key | * PTCH xor key | ||
==== PTCH CIPHER XOR ==== | ==== PTCH CIPHER XOR ==== | ||
Line 1,042: | Line 971: | ||
* exists on slims! | * exists on slims! | ||
==== PTCH HASHER XOR ==== | ==== PTCH HASHER XOR ==== | ||
Line 1,058: | Line 979: | ||
* exists on slims! | * exists on slims! | ||
==== COK-001 body key ==== | ==== COK-001 body key ==== | ||
Line 1,446: | Line 1,359: | ||
|} | |} | ||
=== PS3 NIDs Salt === | |||
<pre> | <pre> | ||
6759659904250490566427499489741A | |||
</pre> | </pre> | ||
=== PS3 NONAME NIDs Salt === | |||
<pre> | <pre> | ||
"0xbc5eba9e042504905b64274994d9c41f" | |||
</pre> | </pre> | ||
* Note that this | * Note that this string is used, NOT the hex value for it! | ||
* Credit to ClientHax for the discovery | |||
* WTF Sony! | |||
=== Bluray Drive Keys === | === Bluray Drive Keys === | ||
Line 1,485: | Line 1,394: | ||
It can be used to decrypt emboot and another perdevice areas. | It can be used to decrypt emboot and another perdevice areas. | ||
=== EID0 Sections Keys === | === EID0 Sections Keys === | ||
Line 2,826: | Line 1,667: | ||
See also [[NPDRM]]. | See also [[NPDRM]]. | ||
See [https:// | See [https://i.imgur.com/1UN7rOi.png a screenshot of the first retrieved PS3 NPDRM keys files]. | ||
=== NPDRM Activation ECDSA Public Key === | === NPDRM Activation ECDSA Public Key === | ||
Line 2,835: | Line 1,676: | ||
* Location: PSP npdrm.prx, PS3, PS Vita npdrm.skprx. | * Location: PSP npdrm.prx, PS3, PS Vita npdrm.skprx. | ||
Algorithm: Applies to NPDRM act.dat | Algorithm: Applies to both NPDRM act.dat and to NPDRM .rif. | ||
ECDSA curve type: 2 (vsh) | ECDSA curve type: ?2 (vsh)? | ||
=== NPDRM PSP EDAT ECDSA Public Key === | === NPDRM PSP EDAT ECDSA Public Key === | ||
Line 2,852: | Line 1,693: | ||
npdrm_psp_edat_ecdsa_priv_key: E5C4D0A8249A6F27E5E0C9D534F4DA15223F42AD | npdrm_psp_edat_ecdsa_priv_key: E5C4D0A8249A6F27E5E0C9D534F4DA15223F42AD | ||
* Location: | * Location: ? Maybe retrieved by PS3 ECDSA randomization fail. | ||
=== NPDRM PSISOIMG0000 ECDSA Public Key === | === NPDRM PSISOIMG0000 ECDSA Public Key === | ||
Line 2,878: | Line 1,719: | ||
ECDSA curve type: 2 (vsh) | ECDSA curve type: 2 (vsh) | ||
* Location: PSP | * Location: ?PSP?, ?PS3?, PS Vita npdrm.skprx. | ||
=== NPDRM NPUMDIMG ECDSA Private Key === | === NPDRM NPUMDIMG ECDSA Private Key === | ||
Line 2,884: | Line 1,725: | ||
npdrm_npumdimg_ecdsa_priv_key: 14B022E892CF8614A44557DB095C928DE9B89970 | npdrm_npumdimg_ecdsa_priv_key: 14B022E892CF8614A44557DB095C928DE9B89970 | ||
* Location: | * Location: ? Maybe retrieved by PS3 ECDSA randomization fail. | ||
This key is used to sign the NPUMDIMG data inside PSN NPDRM EBOOT.PBP. | This key is used to sign the NPUMDIMG data inside PSN NPDRM EBOOT.PBP. | ||
Line 2,917: | Line 1,753: | ||
npd_header_hash_xor_key: 6BA52976EFDA16EF3C339FB2971E256B | npd_header_hash_xor_key: 6BA52976EFDA16EF3C339FB2971E256B | ||
* Location: PS3 | * Location: PS3 OS as it is used in PS3 [[NPD]]. | ||
Algorithm: | Algorithm: | ||
Line 2,930: | Line 1,766: | ||
edat-hasher-key-0: EFFE5BD1652EEBC11918CF7C04D4F011 | edat-hasher-key-0: EFFE5BD1652EEBC11918CF7C04D4F011 | ||
edat-hasher-key-1: 3D92699B705B073854D8FCC6C7672747 | edat-hasher-key-1: 3D92699B705B073854D8FCC6C7672747 | ||
These keys have to be sorted, and detailed, soon. Also why are there also "edat-key-0 || 4.20" and other 4.20+ EDAT keys on wiki? | These keys have to be sorted, and detailed, soon. Also why are there also "edat-key-0 || 4.20" and other 4.20+ EDAT keys on wiki? | ||
Line 3,092: | Line 1,924: | ||
npdrm_pkg_self_ecdsa_pub_bak_y: EC4907E129C5B5CD386D94D82318B9D558777C5A | npdrm_pkg_self_ecdsa_pub_bak_y: EC4907E129C5B5CD386D94D82318B9D558777C5A | ||
== ECDSA | == ECDSA Curve Type 2 (VSH) == | ||
curve : 000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | curve : 000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | ||
Line 3,114: | Line 1,946: | ||
Other representation: https://github.com/balika011/DC-M33/blob/master/psptools/psptool/kirk.py#L158. | Other representation: https://github.com/balika011/DC-M33/blob/master/psptools/psptool/kirk.py#L158. | ||
* | * This curve is used for example for rif/act.dat, most IdStorage Certificates. | ||
== Snowden Key == | == Snowden Key == | ||
Line 3,147: | Line 1,979: | ||
MG_KBIT_MASTER_KEY 5001C87121F939C144D86B069224B247 <- me_iso | MG_KBIT_MASTER_KEY 5001C87121F939C144D86B069224B247 <- me_iso | ||
MG_KC_MASTER_KEY 77F38314B047D87C9B37D266049228C4 <- me_iso | MG_KC_MASTER_KEY 77F38314B047D87C9B37D266049228C4 <- me_iso | ||
META_KEY_RETAIL 389DCBA5203C8159ECF94C9393164CC9 <- sb_iso | META_KEY_RETAIL 389DCBA5203C8159ECF94C9393164CC9 <- sb_iso | ||
DATA_KEY_RETAIL 1017823463F468C1AA41D700B140F257 <- sb_iso | DATA_KEY_RETAIL 1017823463F468C1AA41D700B140F257 <- sb_iso | ||
VMC_KEY_RETAIL 64E30D19A16941D677E32EEBE07F45D2 <- sb_iso | VMC_KEY_RETAIL 64E30D19A16941D677E32EEBE07F45D2 <- sb_iso | ||
META_KEY_DEBUG 2B05F7C7AFD1B169D62586503AEA9798 <- sb_iso | META_KEY_DEBUG 2B05F7C7AFD1B169D62586503AEA9798 <- sb_iso | ||
DATA_KEY_DEBUG 74FF7E5D1D7B96943BEFDCFA81FC2007 <- sb_iso | DATA_KEY_DEBUG 74FF7E5D1D7B96943BEFDCFA81FC2007 <- sb_iso | ||
VMC_KEY_DEBUG 30479D4B80E89E2B59E5C9145E1064A9 <- sb_iso | VMC_KEY_DEBUG 30479D4B80E89E2B59E5C9145E1064A9 <- sb_iso | ||
MG_SIG_HASH_KEY 65E88B1A9E3FD268 <- me_iso | MG_SIG_HASH_KEY 65E88B1A9E3FD268 <- me_iso | ||
MG_SIG_MASTER_KEY 51ED689419A83AD8 <- me_iso | MG_SIG_MASTER_KEY 51ED689419A83AD8 <- me_iso | ||
Line 3,366: | Line 2,198: | ||
kirk_unk100 = 000102030405060708090A0B0C0D0E0F | kirk_unk100 = 000102030405060708090A0B0C0D0E0F | ||
=== PSP | === PSP IdStorage Master Key === | ||
psp_idstorage_master_key = 475E09F4A237DA9BEFFF3BC077143D8A | psp_idstorage_master_key = 475E09F4A237DA9BEFFF3BC077143D8A | ||
=== DOCUMENT.DAT === | === DOCUMENT.DAT === | ||
Line 3,430: | Line 2,256: | ||
It is used to generate URLs to obtain Title infos. | It is used to generate URLs to obtain Title infos. | ||
For example, title_id: BLES01133 | For example, title_id: BLES01133 | ||
Seed will contain BLES01133_00 | |||
openssl dgst -mac hmac -macopt hexkey:F5DE66D2680E255B2DF79E74F890EBF349262F618BCAE2A9ACCDEE5156CE8DF2CDF2D48C71173CDC2594465B87405D197 | |||
CF1AED3B7E9671EEB56CA6753C2E6B0 -sha1 seed | |||
HMAC-SHA1( | HMAC-SHA1(seed.bin) = 93ec11e04b137b433a9c867603e64660782a762e | ||
URL will be: http://tmdb.np.dl.playstation.net/tmdb/BLES01133_00_93EC11E04B137B433A9C867603E64660782A762E/BLES01133_00.xml | URL will be: http://tmdb.np.dl.playstation.net/tmdb/BLES01133_00_93EC11E04B137B433A9C867603E64660782A762E/BLES01133_00.xml |