Editing Talk:Seeds

Jump to navigation Jump to search
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 1: Line 1:
= SYSCON KeySlot Keys =
* some keys
 
* https://pastebin.com/7s9VnjK3
* Some keys.
* [https://pastebin.com/7s9VnjK3 Source (from zecoxao and the PS3 Syscon hackers)]


<pre>
<pre>
Line 71: Line 69:
</pre>
</pre>


= SYSCON KeySlot Keys Prototype =
= Time Constants =


<pre>
<pre>
C1 9A 12 39 17 D2 3D 0F 57 66 FD 38 70 C3 39 2C //0x00 Key
358B2E4BDA394A185D4F5407594C20E4
18 38 0D 1F 34 A4 28 74 B0 97 BB 3B 77 D7 FA BD //0x10 Key EID1 SECOND LAYER KEY
08A4FD2A2A8D6DA788F9AB9626B3A991
C4 87 6E BD DE 11 2F D3 F4 EB 40 2C 30 A9 29 91 //0x20 Key EID1 FIRST LAYER KEY
9B 7F D3 84 3D C2 53 39 E7 F6 C0 2D 86 73 57 1E //0x30 Key SNVS KEY
C5 ED 68 E0 72 FC 70 74 74 B5 D7 0C 3B C0 8B 24 //0x40 Key INIT KEY
5C 87 6C F7 E8 3C 30 6B 2D E3 47 AB 8D DA 2D E8 //0x50 Key lv0::secure_com_lib_internal_key::session_key_create_key_0x00
0B EE C5 7F 6D 58 93 FE D1 3E AA 94 06 53 6A A5 //0x60 Key lv0::secure_com_lib_internal_key::session_key_create_key_0x01
95 D6 74 D7 11 CA 3C 59 ED 03 6C E6 7A 00 E9 0E //0x70 Key lv0::secure_com_lib_internal_key::session_key_create_key_0x02
81 D0 00 4B 51 2B B4 BD D0 39 E5 84 B8 EA 68 49 //0x80 Key lv0::secure_com_lib_internal_key::session_key_create_key_0x03
3D 42 3D A8 C0 1F 75 0E 64 64 0C CF D5 E8 B6 25 //0x90 Key lv0::secure_com_lib_internal_key::session_key_create_key_0x04
C8 C4 3F C5 49 44 EE 9F 13 4E 5D DC 2D CA 47 B2 //0xA0 Key lv0::secure_com_lib_internal_key::session_key_create_key_0x05
F5 5E C0 64 F0 F3 9B 5C 15 BF 2A 63 FC 7B 7B C6 //0xB0 Key lv0::secure_com_lib_internal_key::session_key_create_key_0x06
44 D1 82 C2 1B 1A 68 3D 46 D8 06 CF AE A7 9D 62 //0xC0 Key lv0::secure_com_lib_internal_key::session_key_create_key_0x07
FF 6A 33 0E A1 F6 F1 35 EC D3 DA 24 8A 1C DC 8B //0xD0 Key Used to encrypt keyseed 0x110 and forge time key 0x00 for second layer or keyseed 0x150 for first layer
C3 B2 81 46 87 CD B9 10 20 CF B0 89 5B DC FD 7C //0xE0 Key Used to encrypt keyseed 0x120 and forge time key 0x01 for second layer or keyseed 0x150 for first layer
B2 92 43 49 1C D1 3D 21 FE 76 15 EA CA 83 68 20 //0xF0 Key Used to encrypt keyseed 0x130 and forge time key 0x02 for second layer or keyseed 0x150 for first layer
EE FB C2 A9 55 F0 82 3E B7 70 3A FB 9B A0 BA B6 //0x100 Key Used to encrypt keyseed 0x140 and forge time key 0x03 for second layer or keyseed 0x150 for first layer
A3 AD B9 9A 21 E4 7A DF F3 FD 7F C3 17 39 81 CA //0x110 Key BE2SC KEY
69 33 CE E7 A5 18 E5 B8 CB E1 FC 14 B2 61 B7 65 //0x120 Key SC2BE KEY
5A A0 66 58 23 A4 1E 1B 56 AD 52 12 62 91 A0 E6 //0x130 Key BE2SC SC2BE XOR KEY
10 A6 65 12 05 46 C3 FD DC 81 E2 04 50 05 8C 90 //0x140 Key BINARY PATCH XOR KEY 1
8C D7 2F D3 E1 E5 37 CB 51 D6 F1 FE EE B5 CE 4C //0x150 Key Fallback Key for 0x2700
91 88 02 92 BB 64 92 7C 31 66 9E 26 BD 15 93 2A //0x160 Key 0x2710 KEY
1C E7 FF AF 48 9E 76 2A 99 72 7C F1 B1 E8 C1 B9 //0x170 Key 0x2760 KEY
F7 2D 0F 14 DA 2A 0B CC CD 32 14 97 3C C5 63 19 //0x180 Key 0x2790 KEY
70 49 28 15 8B D3 1D 17 18 54 F1 F6 CD A5 32 A1 //0x190 Key 0x26B0 0x26E0 0x26F0 KEY
39 8E 7F 80 B4 ED 6C F1 36 08 4F E9 C4 6F 94 35 //0x1A0 Key 0x26C0 KEY
83 A8 8D 67 81 20 E7 B6 85 E5 7C CA B3 58 6B 9E //0x1B0 Key 0x26D0 KEY
9A F6 7D F5 D0 14 6C 3B C4 7E E9 00 27 B1 A3 A2 //0x1C0 Key
44 F4 D2 FC E1 1C E9 B6 F1 4D 77 C0 8E AA 7E BF //0x1D0 Key 0x2700 KEY
</pre>


= EID Structure =
E01B01CF9C7FBC7D79D670086DAF497F
9BD3A5D5178DDE1D825344AE398113DD


EID is made of 6 "partitions" from EID0 to EID5.
FF525D8BF4422CC76B13AA47FA2CC369
83A720CD45D18FB3D4112888187E3040


== EID0 ==
702B91D8E6ACEEC4B801315F357E1EE3
2DA1081408D72C41AFC1B61AE7C9882D
</pre>


EID0 embeds 11 sections.
= Unknown keys =
 
=== EID0 Section (PSP) ===
 
* Size: 0xB8 bytes.
 
{|class="wikitable"
|-
! Description !! Length !! Note
|-
| Data || 0x10 || contains the actual data of the file (either idps or psid)
|-
| plaintext public key || 0x28 || contains the section's public key (without padding)
|-
| R || 0x14 || part of the ecdsa signature pair (r,s)
|-
| S || 0x14 || part of the ecdsa signature pair (r,s)
|-
| public key || 0x28 || ecdsa public key (can be used to verify ecdsa signature RS)
|-
| encrypted private key || 0x20 || encrypted blob that contains the section's KIRK 0xC private key (with zero byte padding)
|-
| cmac || 0x10 || cmac of the previous section (0xA8 bytes)
|-
|}
 
=== EID0 Section (PS3) ===
 
* Size: 0xC0 bytes.
 
{|class="wikitable"
|-
! Description !! Length !! Note
|-
| Data || 0x10 || contains the actual data of the file (either idps or psid)
|-
| plaintext public key || 0x28 || contains the section's public key (without padding)
|-
| R || 0x14 || part of the ecdsa signature pair (r,s)
|-
| S || 0x14 || part of the ecdsa signature pair (r,s)
|-
| public key || 0x28 || ecdsa public key (can be used to verify ecdsa signature RS)
|-
| encrypted private key || 0x20 || encrypted blob that contains the section's private key (with zero byte padding)
|-
| cmac || 0x10 || hash of the previous information in CMAC mode
|-
| padding || 0x8 || zero byte padding for AES 128 bits encryption
|}
 
=== EID0 Section (Vita) ===
 
* Size: 0xE0 bytes.
 
{|class="wikitable"
|-
! Description !! Length !! Note
|-
| Data || 0x10 || contains the actual data of the file (either idps or psid)
|-
| plaintext public key || 0x38 || contains the section's public key (without padding)
|-
| R || 0x1C || part of the ecdsa signature pair (r,s)
|-
| S || 0x1C || part of the ecdsa signature pair (r,s)
|-
| public key || 0x38 || ecdsa public key (can be used to verify ecdsa signature RS)
|-
| encrypted private key || 0x20 || encrypted blob that contains the section's private key (with zero byte padding)
|-
| cmac || 0x20 || hash of the previous information in CMAC mode
|-
| padding || 0x8 || zero byte padding for AES 128 bits encryption
|}
 
* [https://web.archive.org/web/20141118233713/http://pastie.org/6169158 naehrwert's EID0 section 0 ECDSA verification]
 
== EID1 ==
 
* Size: 0x2A0 bytes.
 
{|class="wikitable"
|-
! Offset !! Length !! Description
|-
| 0 || 0x10 || INIT Seed
|-
| 0x10 || 0x80 || AUTH1 Reencrypted Keyseeds
|-
| 0x90 || 0x80 || AUTH2 Reencrypted Keyseeds
|-
| 0x110 || 0x40 || Keyseeds (Time Service Purpose)
|-
| 0x150 || 0x10 ||  KeySeed (SNVS/Time Related)
|-
| 0x160 || 0x120 || Padding (Zeroes)
|-
| 0x280 || 0x10  || CMAC of Encrypted Data Using Master Key 0x20 if on EEPROM to CMAC (and encrypt/decrypt) or Master Key 0x10 if on FLASH
|-
| 0x290 || 0x10  || CMAC of Encrypted FLASH Data Using Perconsole Key encrypted using root key and EID1 Seeds
|}
 
== EID2 ==
 
* Size: 0x730 bytes.
 
Related to BD drive. See [[Hypervisor_Reverse_Engineering#Remarrying]].
 
{|class="wikitable"
|-
! Description !! Length !! Note
|-
| Header || 0x20 ||
|-
| P(rimary) block || 0x80 || contains bd drive info, including encrypted drive-auth keys
|-
| S(econdary) block || 0x690 || contains bd drive info
|}
 
== EID3 ==
 
* Size: 0x100 bytes.
 
Related to Communicatio. See [[Hypervisor_Reverse_Engineering#Communication]].
 
{|class="wikitable"
|-
! Offset !! Description !! Length !! Note
|-
| 0x00 || Header || 0x20 || contains ckp_management_id, size of cprm keys + sha1 digest + padding and nonce
|-
| 0x20 || cprm player keys || 0xB8 ||
|-
| 0xD8 || sha1 digest || 0x14 || sha1 digest of previous section
|-
| 0xEC || padding || 0x4 ||
|-
| 0xF0 || omac1 digest || 0x10 || omac1 digest of whole eid3
|}
 
== EID4 ==
 
* Size: 0x30 bytes.
 
{|class="wikitable"
|-
! Description !! Length !! Note
|-
| Drive Key 1 || 0x10 || Encrypts data sent from host to bd drive
|-
| Drive Key 2 || 0x10 || Decrypts data sent from bd drive to host
|-
| CMAC/OMAC1 || 0x10 || Hash of the previous bytes in CMAC/OMAC1 mode
|}
 
== EID5 ==
 
* Size: 0xA00 bytes.
 
The largest and quite possibly the most important EID of all 6. It's unknown what is inside this specific EID. We'll probably never know what's inside it without analyzing every possible clue about the PS3. And even then, it might be impossible to find its real use. Its size is similar to EID0, but it has an additional 0x1A0 bytes.
 
= Time Constants =


<pre>
<pre>
358B2E4BDA394A185D4F5407594C20E4 (FFs encrypted with garbage key 79 times)
BC3F7A48AF45EF283A0598103FE8793A
08A4FD2A2A8D6DA788F9AB9626B3A991 (FFs encrypted with garbage key 80 times)
DA48D52C75E54D7057A41EB5AE32166E
E01B01CF9C7FBC7D79D670086DAF497F (FFs encrypted with garbage key 81 times)
575C26D64FC4900B9A874F85436876CA
9BD3A5D5178DDE1D825344AE398113DD (FFs encrypted with garbage key 82 times)
8BE00FFD68EB4BDEE02D3F4E8D02CEA2
FF525D8BF4422CC76B13AA47FA2CC369 (FFs encrypted with garbage key 83 times)
37A5169ACC901FF55AC7CD984FACCCE9
83A720CD45D18FB3D4112888187E3040 (FFs encrypted with garbage key 84 times)
41657229DC984F4937A29F4E65D122A7
702B91D8E6ACEEC4B801315F357E1EE3 (FFs encrypted with garbage key 85 times)
2DA1081408D72C41AFC1B61AE7C9882D (FFs encrypted with garbage key 86 times)
</pre>
</pre>
Please note that all contributions to PS3 Developer wiki are considered to be released under the GNU Free Documentation License 1.2 (see PS3 Developer wiki:Copyrights for details). If you do not want your writing to be edited mercilessly and redistributed at will, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource. Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following hCaptcha:

Cancel Editing help (opens in new window)