Editing Seeds
Jump to navigation
Jump to search
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 35: | Line 35: | ||
* Location: aim_spu_module.self/isoldr/appldr/lv1ldr/spu_token_processor.self/spu_utoken_processor.self | * Location: aim_spu_module.self/isoldr/appldr/lv1ldr/spu_token_processor.self/spu_utoken_processor.self | ||
==== EID0 section 0 seed | ==== EID0 section 0 seed ==== | ||
<pre>2ED7CE8D1D55454585BF6A3281CD03AF</pre> | <pre>2ED7CE8D1D55454585BF6A3281CD03AF</pre> | ||
Line 41: | Line 41: | ||
* Location: aim_spu_module.self | * Location: aim_spu_module.self | ||
==== EID0 section 6 seed | ==== EID0 section 6 seed ==== | ||
<pre>3AB0E6C4ACFFB629362FFBBBDBC854BC</pre> | <pre>3AB0E6C4ACFFB629362FFBBBDBC854BC</pre> | ||
Line 47: | Line 47: | ||
* Location: pspemudrm (KIRK) | * Location: pspemudrm (KIRK) | ||
==== EID0 section | ==== EID0 section 6 seed for encrypted ECDSA private key ==== | ||
<pre> | <pre>33793B9F79E2EBAE55D4D6BF0ED376E6</pre> | ||
* | Notes: | ||
* This seed is the equivalent of the PSP KIRK command 0x10 AES128ECB seed (idskey0). | |||
* Does EID0 section 0xA (or others) use the same seed ? Else why not to search their seed ;) ? | |||
1) aes-256-ecb encrypt the seed with per-console EID0_key, in order to obtain the 128bit decryption key to decrypt your per-console encrypted ECDSA private key. | |||
2) aes-128-ecb decrypt the encrypted ECDSA private key, located in the decrypted EID0 section 6 at offset 0x88. | |||
3) Verify the ECDSA private key. See KIRK command 0x10 on PSP or PS3 wiki (same public key and curve). | |||
* Location: pspemudrm (KIRK) | |||
==== EID0 section 0xA seed ==== | |||
<pre>30B0395DC5835AAA3A7986B44AFAE684</pre> | |||
* Location: | * Location: aim_spu_module.self | ||
=== EID1 === | === EID1 === |