Editing User talk:Zecoxao

Jump to navigation Jump to search
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 1: Line 1:
= The Last Piece of the Puzzle =
* http://www.psdevwiki.com/ps3/Syscon_Hardware (<SW-301)
* http://www.psdevwiki.com/ps3/Service_Connectors (Diag/Backup Mode, <3rd Generation)
* http://www.psdevwiki.com/ps3/Talk:Syscon_Hardware#Backup_Mode_.2F_Diag
* http://www.psdevwiki.com/ps3/Talk:Service_Connectors
* http://www.ps3devwiki.com/ps3/Cell_Configuration_Ring
* http://www.psdevwiki.com/ps3/SIG_File_Format
* http://i.imgur.com/xQizq0K.png
* http://www.psdevwiki.com/ps3/images/a/ac/TMU-520_1-871-645-11_A_Detail_3_%28SYSCON%29.jpg
* http://www.psdevwiki.com/ps3/File:PS3_Service_Connector_1st_Generation_COK-001.png
* http://en.wikipedia.org/wiki/ARM7#ARM7TDMI
* http://www.fpga4fun.com/images/JTAG_TAP.gif
* http://hsb.wikidot.com/arduino-jtag-finder-workshop
* https://www.youtube.com/watch?v=Up0697E5DGc
* http://urjtag.org/
* http://i.imgur.com/O10hqAK.png
* http://pastie.org/private/grd5u9izjlglkult64rta
* http://psx-scene.com/forums/f149/brick-recovery-research-74903/index37.html#post786487
* http://i.imgur.com/o9R0YjJ.jpg
* https://www.sendspace.com/file/qzq6a4 (Patent Explaining DECR SYSCON)
* https://imgur.com/a/pR0a4 (Messages from mullion indicating erasing of User Program Area before updating)
= Vita Shennanigans =
= Vita Shennanigans =
<pre>
BGA Test Pins (for 100 and 64 pin config)
100-pin:
TOOL0 D8
TOOL1 E7
FLMD0 F9
RESET G9
64-pin
TOOL0 D6
TOOL1 E6
FLMD0 E8
RESET E7
CL Pad to Syscon (IRS-002) (78K0R)
F5 F6 F9 F10 G10 H1 H4 J3 J10


* check https://psdevwiki.com/vita/index.php?title=Ernie
</pre>


= DYN-001 Shennanigans =
= DYN-001 Shennanigans =


* check https://www.psdevwiki.com/ps3/Keys#DYN-001_body_key
* https://imgur.com/OJbWsPZ
* check https://www.psdevwiki.com/ps3/Keys#DYN-001_hasher_key
* https://imgur.com/z5zhedg
* check https://psdevwiki.com/ps3/Service_Connectors#CN.3F.3F.3F.3F
* VDD Feeds to 5 different pins, as opposed to ARM BGA VDD.
* Needs a large number of samples and a proper alignment
* https://www.sendspace.com/file/lofkfo


= PSP Shennanigans =
= PSP Shennanigans =
<pre>
D780032AY (TMU-001/TMU-002)
ROM: 16 KB, RAM: 512 B
(see D790019)
D790019 (TA-079/TA-081)
ROM RAM
D780021AY/D780031AY 8 KB 512 B
D780022AY/D780032AY 16 KB 512 B
D780023AY/D780033AY 24 KB 1 KB
D780024AY/D780034AY 32 KB 1 KB
D78F0034AY/D78F0034BY 32 KB 1 KB


* check https://psdevwiki.com/psp/index.php?title=Baryon
Tools: IE-78K0-NS, IE-78K0-NS-A, IE-78K0-NS-PA, IE-780034-NS-EM1, IE-78001-R-A, IE-78K0-R-EX1, PG-FP3, PG-FP4


= request_idps generated files binary xor =


* [[https://mega.co.nz/#!J1M1zKDK!MNBmfqyoqp2hJR3kj8urcKZ-b_pCVnMBrY2zcb-gTBs 2 generated cex files (dead link)]]
D79F0036 (TA-082/TA-086)
* [[https://mega.co.nz/#!N1dmQA5C!gbmqekcbUorH-2zXlakfxJNd1QMC8fSMoNl0pvdfFjs 2 generated decr files (dead link)]]
ROM RAM ERAM
* [[https://mega.co.nz/#!VlUmgJBJ!gWk0Y4aXSOu7VoxiwfpnkFpOm7pNaWJqgl39coZ93L4 2 generated dex files (dead link)]]
D78F0531/D78F0531A 16 KB 768 B -
D78F0532/D78F0532A 24 KB 1 KB -
D78F0533/D78F0533A 32 KB 1 KB -
D78F0534/D78F0534A 48 KB 1 KB 1 KB
D78F0535/D78F0535A 60 KB 1 KB 2 KB
D78F0536/D78F0536A 96 KB 1 KB 4 KB
D78F0537/D78F0537A 128 KB 1 KB 6 KB
D78F0537D/D78F0537DA 128 KB 1 KB 6 KB
 
Tools: QB-78K0KX2, QB-MINI2, E1, E20, PG-FP4, PG-FP5, PG-FP6
 


Note: files are padded 8 bytes at start, for convenience
D79F???? (TA-085)
"custom" 84-pin 78K0 based on D79F0036
(see D79F0036)


CelesteBlue: can you describe how they were generated and possible usage please ?


= DSi Key/IV Goodness =


== Pubs & Privs (Dev) (GCD, NAND, NOR) ==
Service/Debug Testpoints
TA-081 TA-082/TA-086         TA-085


<pre>
CL3001 VDD VDD VDD
RSA Private-Key: (1024 bit, 2 primes)
CL3002 RxD RxD RxD
modulus:
CL3003 TxD TxD TxD
    00:ef:d8:9f:71:13:7e:38:84:e0:65:e2:5b:63:6a:
CL3004 IC/VPP FLMD0 FLMD0
    f2:9e:29:ee:1d:06:0d:9f:79:2e:dd:e8:57:2b:5b:
CL3005 RESET         RESET RESET
    86:a9:dc:04:35:3f:2f:e1:11:32:c8:10:33:14:de:
CL3006 GND OCD0B OCD0B
    c0:10:80:86:0b:e6:eb:ba:55:1a:95:8f:14:92:13:
CL3007 - OCD0A OCD0A
    f5:f2:5d:eb:f1:f8:7f:3d:78:ec:92:d7:ea:07:45:
CL3008 - VDD (R3037) -
    06:e6:57:f3:dd:15:d4:91:2c:1e:38:7f:fa:12:36:
CL3009 - GND GND
    e4:35:7a:5b:2f:35:7f:a7:8e:14:23:54:3d:f6:6d:
CL3010 - P01 -
    f4:4b:c1:6d:26:e2:72:9d:a9:55:93:1a:8a:3a:1b:
CL3011 - P22 -
    a7:59:b0:30:f7:65:73:ea:d5
CL3012 - CPU_RESET -
publicExponent: 65537 (0x10001)
CL3013 - LEPTON_RST -
privateExponent:
CL3014 - POMMEL_ALERT         -
    66:d2:b7:88:02:93:5a:27:9d:0c:10:be:9d:20:7c:
    62:d2:17:02:da:55:7c:c8:b7:0e:eb:4c:73:8a:09:
    71:48:a1:85:32:51:94:6b:8b:19:b9:d8:2c:5a:52:
    7c:c0:9c:b6:fd:88:91:99:6a:8c:33:8a:de:15:30:
    9b:77:28:6e:ff:4e:68:9d:52:23:c2:52:0e:97:6c:
    5a:b3:1c:e0:42:2b:52:d4:95:9d:1f:3e:19:ae:f1:
    67:b6:3f:a6:26:4b:ea:20:ac:8b:f6:a0:59:a9:1c:
    54:bf:9b:32:14:ad:ec:8c:55:cd:b3:69:00:7f:75:
    68:c3:ad:16:c7:f9:c0:01
prime1:
    00:fe:c2:31:7e:63:f6:9a:2e:22:d3:da:c3:66:a3:
    58:76:50:14:58:bc:f7:c9:51:0f:5d:fc:4d:d0:7f:
    63:5c:69:13:4f:15:e7:cf:66:68:a4:b8:9b:cb:84:
    35:8e:2f:b6:85:cd:b3:27:57:89:b8:ec:b3:11:1c:
    c7:6b:3a:83:95
prime2:
    00:f1:03:d3:99:32:4b:94:b7:12:b7:32:18:28:ca:
    37:f2:cd:30:6f:4b:39:3b:f3:b7:cb:64:7d:c0:d3:
    5f:9e:e6:9c:96:42:0d:b6:96:ad:30:8a:6e:64:da:
    7e:98:c7:d9:32:16:81:fa:dd:13:bc:0a:c2:17:97:
    27:54:75:fa:41
exponent1:
    00:d0:14:9b:4a:69:a9:ad:4b:0b:a5:50:a4:93:3b:
    cd:f0:6c:fe:01:70:ef:4e:9e:87:d7:b3:51:77:7f:
    e5:0f:40:bf:c5:b3:d5:b0:20:2c:4e:86:7e:b1:df:
    1d:c3:32:13:79:fc:86:5d:16:f1:e5:7a:67:d4:0d:
    56:90:ad:ad:75
exponent2:
    00:84:cc:b5:f8:10:b5:82:a1:09:67:f5:eb:47:f6:
    7c:b3:85:8a:2d:98:c6:55:99:69:e9:61:5a:c5:37:
    f2:d5:2c:7e:95:70:99:fb:c4:b4:73:2d:a3:bc:60:
    84:27:0c:df:49:71:0b:77:bd:ff:14:ba:dc:cd:80:
    d5:03:fd:e9:c1
coefficient:
    13:91:c9:69:93:71:f4:92:81:45:ae:85:c6:3c:aa:
    a5:aa:35:58:30:8a:e0:63:40:89:31:75:28:c5:24:
    7f:da:50:95:b8:b5:60:77:3e:45:92:19:85:66:a0:
    39:48:d4:fc:8c:21:f9:14:86:08:9a:47:75:77:41:
    02:f4:82:1d
RSA Private-Key: (1024 bit, 2 primes)
modulus:
    00:a5:33:ce:7e:45:c2:fb:a3:65:75:43:28:d7:ca:
    9f:78:ed:97:0c:e3:db:61:37:4c:3a:b1:b5:ff:60:
    26:83:43:77:eb:14:2b:2f:5a:f3:91:8e:99:a4:76:
    c6:6b:90:bd:fd:a8:2e:c9:63:84:66:01:bc:45:c2:
    f8:af:35:ae:52:e0:07:9d:ea:0a:46:d0:7d:85:a8:
    eb:1c:c2:f5:d4:eb:88:fa:5b:a2:7d:08:98:96:df:
    d1:1b:dd:fe:44:bd:26:e7:49:df:8f:d1:64:0a:ce:
    67:b1:48:30:ce:e4:4b:50:48:67:82:ee:fd:59:c9:
    fb:d3:bd:3f:9f:9c:81:0f:ed
publicExponent: 65537 (0x10001)
privateExponent:
    3a:31:ab:b5:d3:81:41:ff:67:08:0d:a6:5f:8d:a2:
    eb:88:56:43:56:28:bb:70:2d:4c:27:b9:c2:c1:ee:
    0f:23:3f:24:f2:2f:dc:38:9f:c0:50:89:52:e3:fc:
    35:7c:01:51:4f:63:5b:d1:d0:9b:d6:54:aa:06:6a:
    6f:dd:eb:0f:f9:9a:e3:12:66:1f:b0:8a:44:db:34:
    86:ac:a8:83:f3:00:71:ea:3f:f6:34:c8:b4:2c:eb:
    84:66:3c:b1:d7:ef:e2:23:2c:24:f9:37:18:82:57:
    ac:19:51:85:f6:f8:5d:29:6a:21:39:ec:89:f8:97:
    b9:43:28:f8:10:c1:c0:49
prime1:
    00:d5:5f:bf:05:92:4a:88:f7:e8:75:c2:0f:ff:04:
    af:8a:93:e7:1c:c2:4e:ff:5d:b2:ff:0c:81:2d:52:
    fa:23:08:be:1d:1f:5c:e4:ed:c3:4e:b6:47:09:6e:
    91:ab:4c:27:e9:ab:d0:bd:76:c9:59:f1:c8:bf:72:
    fb:5a:0a:f5:47
prime2:
    00:c6:34:7e:56:6d:89:e6:7e:6f:62:d3:dd:9f:c7:
    5b:24:b7:b8:87:b5:9d:84:2c:a9:d7:ad:ae:08:31:
    7d:3f:db:4b:23:c3:fd:5e:fc:f8:10:4a:8c:7f:c4:
    38:8f:4f:43:51:96:ea:fd:96:66:82:40:2e:4f:a2:
    28:44:09:bb:2b
exponent1:
    45:15:9a:00:90:cc:07:2a:d5:1e:03:76:30:68:70:
    f9:9a:47:92:dd:2a:bc:ad:b6:bd:b3:6b:c3:a4:01:
    0f:04:ce:a1:19:3d:77:75:af:ed:b5:40:ac:c2:1a:
    f1:ee:57:61:e5:da:50:ed:bb:e5:9e:4e:14:06:83:
    71:34:e9:13
exponent2:
    00:be:75:b2:f1:5a:51:29:2c:55:dc:a1:ba:55:cf:
    3b:c6:0c:c5:45:a3:3f:b9:c3:31:72:0f:73:2c:6c:
    61:ee:fa:cb:39:93:1b:e6:2b:30:34:77:6e:8b:58:
    03:01:b3:28:fd:3e:08:91:a5:f4:db:34:d1:4b:b4:
    86:fc:da:5d
coefficient:
    40:27:66:b1:eb:8f:cd:b2:a6:2c:74:99:ef:8b:9e:
    b3:a1:bd:8f:3c:dd:eb:93:59:09:9f:a5:0a:56:b8:
    f0:de:ac:80:10:12:ed:5b:77:6e:00:c4:3a:3e:e3:
    0b:ea:82:df:34:4f:81:7a:02:e1:9c:82:e8:06:50:
    12:10:9a:33
RSA Private-Key: (1024 bit, 2 primes)
modulus:
    00:b8:b1:e8:64:54:87:67:c0:9f:e5:74:f2:f1:39:
    89:83:4a:e4:97:8d:81:ba:ed:4b:97:24:be:76:6c:
    19:e4:1e:8b:e5:64:f3:be:9e:0e:76:68:77:8f:4e:
    14:0b:d4:8c:58:ce:8d:0d:93:64:58:9c:a3:20:cf:
    8f:cc:7c:8a:fa:26:7f:db:37:dc:2b:17:13:36:98:
    a1:7a:d1:75:61:a8:3f:52:f9:3f:13:91:57:44:41:
    ea:c9:f6:3f:35:46:0a:b2:3d:c2:ab:c5:f3:b5:07:
    f5:13:8e:58:c8:a1:2e:e8:5b:25:26:df:6d:e5:52:
    11:e6:16:37:a5:41:f4:54:f5
publicExponent: 65537 (0x10001)
privateExponent:
    7a:35:1d:b3:e5:4a:83:18:2d:b4:c2:21:4e:03:e8:
    3d:7b:7c:ad:da:f0:10:23:9b:74:b2:d7:63:bc:3b:
    95:79:b0:cf:64:70:f3:9b:d9:ad:f7:89:c4:c4:c0:
    f6:e2:f8:ca:7a:41:52:ce:48:03:6a:01:76:60:60:
    a1:c9:76:9a:d6:68:18:c8:21:9c:d8:5a:cd:33:0a:
    36:07:35:38:47:f0:e6:dc:95:86:de:96:a4:ef:0a:
    e2:5c:94:b8:eb:56:f5:20:86:9e:2f:2b:a7:8e:ce:
    48:9f:33:36:a2:55:2d:7f:d2:a4:ec:49:79:b8:85:
    56:c2:c8:8e:a0:16:27:31
prime1:
    00:e4:9e:cb:9e:72:b5:b9:00:39:b9:b8:41:10:e2:
    a8:47:52:03:7f:43:44:b0:cb:39:fa:e8:46:b7:af:
    73:58:00:e2:ba:d0:9a:5e:22:74:8c:6a:d3:0d:7e:
    dd:71:7f:2e:e3:c4:2d:e3:8f:ea:e6:b7:c6:b0:35:
    3d:d4:e7:a7:9b
prime2:
    00:ce:d0:6a:f5:f0:f9:49:a0:61:2c:21:ea:a9:0e:
    d7:b7:40:c5:04:bc:cf:1c:d3:25:17:ce:6f:75:7e:
    46:37:25:ee:a3:4c:60:31:f1:5f:df:ef:a7:73:ac:
    f2:5b:17:15:8e:24:53:c9:45:89:a0:77:32:1f:aa:
    c9:9c:03:66:af
exponent1:
    38:6e:9e:12:59:7c:53:d3:23:6c:9d:77:aa:24:58:
    a7:6a:2e:24:ce:c4:f8:e2:e1:47:f6:e7:e5:d5:70:
    22:4b:ed:ab:71:6c:79:4a:05:fc:d7:2d:8b:8a:42:
    3d:0e:c8:d3:3e:0c:99:bc:5f:9e:5d:c4:b4:a0:1f:
    c8:1a:fa:7b
exponent2:
    31:0e:eb:70:6f:bb:12:a6:02:a6:ef:5c:b4:c1:9a:
    96:13:bd:28:84:89:34:b3:39:67:4e:46:ce:3e:27:
    f5:c8:ff:b4:a8:d7:60:c1:7b:16:a9:c8:b4:fd:df:
    77:90:20:42:d9:87:2e:85:5a:42:40:44:19:92:ef:
    c4:1c:62:6d
coefficient:
    79:7f:ca:56:26:12:e7:56:8a:23:5b:d5:94:b1:36:
    73:3d:ec:8d:fd:5d:84:2c:9a:ab:0b:7c:f0:3d:d0:
    85:80:3d:ea:48:9a:8a:7f:bc:e2:d1:fd:18:4c:69:
    a5:1e:fe:30:13:31:40:03:5c:c5:51:4e:9d:f4:9c:
    84:f0:44:95
</pre>
</pre>


= 3DS Key/IV Goodness =
= How =


== Retail 3DS ==
* <strike>By enabling diagnostic mode on the ps3, we can enable the use of JTAG again (it's temporarily disabled when diag mode isn't set)</strike> false
* <strike>It is possible to dump the syscon firmware using this method (in unencrypted state) </strike> false
* <strike>The JTAG registers/TAP-controllers need to be bruteforced / reverse engineered </strike> false
* <strike>The leaked service manuals present information about the pins connected to the JigPin</strike> false
* <strike>The ObjectiveSuite contains an object (DIAGSERVICE) used to diagnose the ps3 using JTAG</strike> false
* <strike>Using a DIY JigPin would facilitate the task, but we still need more info about the hardware and software interface used by ObjectiveSuite to handle this.</strike> false
* <strike>This would probably work on ps4 too (provided that the diag pin and the JTAG pins still exist)</strike> false
* f0f's method is a viable way to get the ROM from later syscons
* tx function can be produced and it's not required for bruteforcing
* ocd flag is located somewhere in the second SFR area (which covers 0x800 bytes, minus already documented flags)
* code base is located somewhere in the backup ram ( 0x800 bytes) or in the second SFR area (0x800 bytes)
* second SFR area ranges from 0xF0000 to 0xF0800
* backup ram ranges from 0xF0800 to 0xF1000
* ocd flag is likely 0xF07F5 since the other SFRs are the same from RL78 to 78K0R
* 486 registers from the 2nd SFR range are publically documented (https://www.youtube.com/watch?v=FdveKrmoA7E)
* 1562 registers are not documented (0xF01E7 - 0xF07FF)
* minimum scan area would be 0xE1A bytes (covering code base only and assuming ocd flag is the known value of 0xF07F5)
* maximum scan area would be 0x55FC8A bytes (same as above and assuming ocd flag isn't known (times 0x619 bytes)
* assuming that the code base is in the 2nd SFR area on RL78 and that the two devices are very similar, we could narrow down the minimum scan area to 0x61A bytes
* IC4002 is sony's syscon naming in oficial service docs


<pre>
<pre>
generator=1FF9E9AAC5FE0408024591DC5D52768A
//TX FUNC, 78K0R CASE
slot0x03KeyX=647C9FFB4E494E54454E444F0D0AEE88
//TAKING NOTE THAT PS3 SYSCON is uPD78F11XX, where X is A, B or C
slot0x18KeyX=82E9C9BEBFB8BDB875ECC0A07D474374
//ASIM -> 0xFFF8C
slot0x19KeyX=F5367FCE73142E66ED13917914B7F2EF
//TXS  -> 0xFFF8F
slot0x1AKeyX=EABA984C9CB766D4A3A7E974E2E713A3
<pre>
slot0x1BKeyX=45AD04953992C7C893724A9A7BCE6182
ROM:000EFF05                set1    byte_FFF8C.7
slot0x1CKeyX=C3830F8156E3543B723F0BC046741E8F
ROM:000EFF08                nop
slot0x1DKeyX=D6B38BC759417596D619D6029D13E0D8
ROM:000EFF09                mov    byte_FFF8F, a
slot0x1EKeyX=BB623A97DDD793D757C4104B8D9FB969
ROM:000EFF0B
slot0x1FKeyX=4C28EC6EFFA3C23646078BBA350C7995
ROM:000EFF0B loc_EFF0B:                              ; CODE XREF: ROM:loc_EFF0B↓j
slot0x25KeyX=CEE7D8AB30C00DAE850EF5E382AC5AF3
ROM:000EFF0B                bf      byte_FFF8B.0, loc_EFF0B
slot0x2CKeyX=B98E95CECA3E4D171F76A94DE934C053
ROM:000EFF0F                mov    byte_FFF8B, #0
slot0x2DKeyX=B98E95CECA3E4D171F76A94DE934C053
ROM:000EFF12                clr1    byte_FFF8C.7
slot0x2EKeyX=B98E95CECA3E4D171F76A94DE934C053
ROM:000EFF15                ret
slot0x2FKeyX=B98E95CECA3E4D171F76A94DE934C053
slot0x30KeyX=C66E23128F289133F04CDB877A3749F2
slot0x31KeyX=C66E23128F289133F04CDB877A3749F2
slot0x32KeyX=C66E23128F289133F04CDB877A3749F2
slot0x33KeyX=C66E23128F289133F04CDB877A3749F2
slot0x34KeyX=6FBB01F872CAF9C01834EEC04065EE53
slot0x35KeyX=6FBB01F872CAF9C01834EEC04065EE53
slot0x36KeyX=6FBB01F872CAF9C01834EEC04065EE53
slot0x37KeyX=6FBB01F872CAF9C01834EEC04065EE53
slot0x38KeyX=B529221CDDB5DB5A1BF26EFF2041E875
slot0x39KeyX=B529221CDDB5DB5A1BF26EFF2041E875
slot0x3AKeyX=B529221CDDB5DB5A1BF26EFF2041E875
slot0x3BKeyX=B529221CDDB5DB5A1BF26EFF2041E875
slot0x3CKeyX=C35D6D15680B1AD4e912A341836121B3
slot0x3DKeyX=617085719B7CFB316DF4DF2E8362C6E2
slot0x3EKeyX=24BAF628D06889BF282D0AA35DC55650
slot0x3FKeyX=A31233280BB4DAA7761393f78C424952
slot0x03KeyY=76DCB90AD3C44DBD1DDD2D200500A0E1
slot0x04KeyY=FF3388ECD21705BB339E967986DC4907
slot0x05KeyY=54EF035F30260E0E9b5E004FC985DC22
slot0x06KeyY=24B05AAAAC0B099252030C02D1040317
slot0x07KeyY=E9ACC5ABD4AD3F0660C83C8934882F3F
slot0x08KeyY=4803050106D482DCD75F85C5AADFF9B3
slot0x09KeyY=AF6346EFDDDFA9806E3C6B6855B78930
slot0x0AKeyY=0A870A2C4B2FC3172E5F0335d8C5085D
slot0x0BKeyY=FDA0152FCD6DDB3133B887BA727C0ADA
slot0x24KeyY=74CA074884F4228DEB2A1CA72D287762
slot0x2DKeyY=80C4E824F2FA5FD515CC2D96F44A2681
slot0x2EKeyY=7462553F9E5A7904B8647CCA736DA1F5
slot0x2FKeyY=C369BAA21E188A88A9AA94E5506A9F16
slot0x31KeyY=7462553F9E5A7904B8647CCA736DA1F5
slot0x0CKeyN=E7C9FF9D4F5B6F4DC5E2F50E856F0AB2
slot0x0DKeyN=E7C9FF9D4F5B6F4DC5E2F50E856F0AB2
slot0x0EKeyN=E7C9FF9D4F5B6F4DC5E2F50E856F0AB2
slot0x0FKeyN=E7C9FF9D4F5B6F4DC5E2F50E856F0AB2
slot0x10KeyN=285713DB53051C089BDFB3B6AA638FDA
slot0x11KeyN=285713DB53051C089BDFB3B6AA638FDA
slot0x12KeyN=285713DB53051C089BDFB3B6AA638FDA
slot0x13KeyN=285713DB53051C089BDFB3B6AA638FDA
slot0x14KeyN=2AF3BBD32CD59C06FD4ABE58651987AD
slot0x15KeyN=2AF3BBD32CD59C06FD4ABE58651987AD
slot0x16KeyN=2AF3BBD32CD59C06FD4ABE58651987AD
slot0x17KeyN=D0294CFB7BE0B4FB7324D986FD3993BB
slot0x18KeyN=5DDD4739037BC6A870E620B70F673504
slot0x19KeyN=5DDD4739037BC6A870E620B70F673504
slot0x1AKeyN=5DDD4739037BC6A870E620B70F673504
slot0x1BKeyN=5DDD4739037BC6A870E620B70F673504
slot0x1CKeyN=59F4399C2F95A4128A1FE49D4DB686DD
slot0x1DKeyN=59F4399C2F95A4128A1FE49D4DB686DD
slot0x1EKeyN=59F4399C2F95A4128A1FE49D4DB686DD
slot0x1FKeyN=59F4399C2F95A4128A1FE49D4DB686DD
slot0x20KeyN=7C92F6272551C4614DB0B345EDD2E869
slot0x21KeyN=7C92F6272551C4614DB0B345EDD2E869
slot0x22KeyN=7C92F6272551C4614DB0B345EDD2E869
slot0x23KeyN=7C92F6272551C4614DB0B345EDD2E869
slot0x24KeyN=BBE8B4E09D0937816B234D8EB3CD3CA2
slot0x25KeyN=BBE8B4E09D0937816B234D8EB3CD3CA2
slot0x26KeyN=BBE8B4E09D0937816B234D8EB3CD3CA2
slot0x27KeyN=BBE8B4E09D0937816B234D8EB3CD3CA2
slot0x28KeyN=BBE8B4E09D0937816B234D8EB3CD3CA2
slot0x29KeyN=5218127E133CE3B85BB8C018CE76b7E2
slot0x2AKeyN=4A4264CF32E84170666F29AC88EF3F7E
slot0x2BKeyN=51AF6C4C8B13DA3228BD29B371CF84E1
slot0x2CKeyN=3ED6F5CF2CC37C54655000B7C8B52E0D
slot0x2DKeyN=3ED6F5CF2CC37C54655000B7C8B52E0D
slot0x2EKeyN=3ED6F5CF2CC37C54655000B7C8B52E0D
slot0x2FKeyN=3ED6F5CF2CC37C54655000B7C8B52E0D
slot0x30KeyN=B87E64018B190FFE048A8124C6454196
slot0x31KeyN=59FC817E6446EA6190347B20E9BDCE52
slot0x32KeyN=B87E64018B190FFE048A8124C6454196
slot0x33KeyN=B87E64018B190FFE048A8124C6454196
slot0x34KeyN=28C0D59B736657BCDF50FF174979958A
slot0x35KeyN=28C0D59B736657BCDF50FF174979958A
slot0x36KeyN=28C0D59B736657BCDF50FF174979958A
slot0x37KeyN=28C0D59B736657BCDF50FF174979958A
slot0x38KeyN=6E78A3BE9BDDDA09BFD569483F24FCE0
slot0x39KeyN=6E78A3BE9BDDDA09BFD569483F24FCE0
slot0x3AKeyN=6E78A3BE9BDDDA09BFD569483F24FCE0
slot0x3BKeyN=6E78A3BE9BDDDA09BFD569483F24FCE0
slot0x3CKeyN=6E78A3BE9BDDDA09BFD569483F24FCE0
slot0x3EKeyN=85DB63077C50116B9490D4FAD61AB241
slot0x3FKeyN=A308EB3064114213A60C56158F5C4963
common0=D07B337F9CA4385932A2E25723232EB9
common1=0C767230F0998F1C46828202FAACBE4C
common2=C475CB3AB8C788BB575E12A10907B8A4
common3=E486EEE3D0C09C902F6686D4C06F649F
common4=ED31BA9C04B067506C4497A35B7804FC
common5=5E66998AB4E8931606850FD7A16DD755
common0N=64C5FD55DD3AD988325BAAEC5243DB98
common1N=4AAA3D0E27D4D728D0B1B433F0F9CBC8
common2N=FBB0EF8CDBB0D8E453CD99344371697F
common3N=25959B7AD0409F72684198BA2ECD7DC6
common4N=7ADA22CAFFC476CC8297A0C7CEEEEEBE
common5N=A5051CA1B37DCF3AFBCF8CC1EDD9CE02
dlpKeyY=7462553f9E5A7904B8647CCA736da1F5
nfcKeyY=ED7858A8BBA7EED7FC970C5979BC0AF2
nfcSecret0Phrase=756E666978656420696E666F7300
nfcSecret0Seed=DB4B9E3F45278F397EFF9B4FB993
nfcSecret0HmacKey=1D164B375B72A55728B91D64B6A3C205
nfcSecret1Phrase=6C6F636B65642073656372657400
nfcSecret1Seed=FDC8A07694B89E4C47D37DE8CE5C74C1
nfcSecret1HmacKey=7F752D2873A20017FEF85C0575904B6D
nfcIv=4FD39A6E79FCEAAD99904DB8EE38E9DB
</pre>
</pre>


== Dev 3DS ==
* OCD Flag at 0xF07EC
* Entry Point at 0xF07F0
* All SW Models use 0xFFF as block size (SW, SW2, SW3)
* SW Uses 0x80000 as total ROM size. SW2,SW3 use 0xC0000 as total rom size
* To use block related commands, one must send signature check command before sending the block check/erase/program command
* 0xFFFFFED0(IV error?) 0xFFFFFED1 (hash error?) 0xFFFFFED2 (magic error)
 
= To wikify =
* Wikify begin  (please wait...)
* Roxanne, if you could also take care of these : http://pastebin.com/s75FzYxd , that would be awesome (i'm not sure what happened to eussNL so, i leave it on your hands.)
** When I get my left hand back, then we can check this out together. [[User:Roxanne|Roxanne]]
 
= request_idps generated files binary xor =


<pre>
* [[https://mega.co.nz/#!J1M1zKDK!MNBmfqyoqp2hJR3kj8urcKZ-b_pCVnMBrY2zcb-gTBs 2 generated cex files]]
slot0x18KeyX=304BF1468372EE64115EBD4093D84276
* [[https://mega.co.nz/#!N1dmQA5C!gbmqekcbUorH-2zXlakfxJNd1QMC8fSMoNl0pvdfFjs 2 generated decr files]]
slot0x1BKeyX=6C8B2944A0726035F941DFC018524FB6
* [[https://mega.co.nz/#!VlUmgJBJ!gWk0Y4aXSOu7VoxiwfpnkFpOm7pNaWJqgl39coZ93L4 2 generated dex files]]
slot0x25KeyX=81907A4B6F1B47323A677974CE4AD71B
slot0x2CKeyX=510207515507CBB18E243DCB85E23A1D
slot0x2DKeyX=510207515507CBB18E243DCB85E23A1D
slot0x2EKeyX=510207515507CBB18E243DCB85E23A1D
slot0x2FKeyX=510207515507CBB18E243DCB85E23A1D
slot0x30KeyX=3F054E663B3EF728C8984D20C4AFd5A0
slot0x31KeyX=3F054E663B3EF728C8984D20C4AFd5A0
slot0x32KeyX=3F054E663B3EF728C8984D20C4AFd5A0
slot0x33KeyX=3F054E663B3EF728C8984D20C4AFd5A0
slot0x34KeyX=7BFB77BCBC059A06ACAD88EF2FCABEDB
slot0x35KeyX=7BFB77BCBC059A06ACAD88EF2FCABEDB
slot0x36KeyX=7BFB77BCBC059A06ACAD88EF2FCABEDB
slot0x37KeyX=7BFB77BCBC059A06ACAD88EF2FCABEDB
slot0x38KeyX=5C3D38AC1740994EFC8fD0BE8D8097B3
slot0x39KeyX=5C3D38AC1740994EFC8fD0BE8D8097B3
slot0x3AKeyX=5C3D38AC1740994EFC8fD0BE8D8097B3
slot0x3BKeyX=5C3D38AC1740994EFC8fD0BE8D8097B3
slot0x3CKeyX=61BF11370B292FFAB38851EC5DAE5DEC
slot0x3DKeyX=BD4FE7E733C755FCE7540EABBD8AC30D
slot0x3EKeyX=2887A4D428F6F224B03AB336E22C611E
slot0x3FKeyX=BE665DE6FB8C3F0A9871960AD7CFBE79
slot0x04KeyY=5CE6B1EC3F5F9D7B2E81E22145A5768D
slot0x05KeyY=285B2E23A3C30E548F24EE8D287C2642
slot0x06KeyY=AE94FC90BE6B6CD5F1B0CB559507220E
slot0x07KeyY=49974D47B6E2C9D9194A2D97FDF283BE
slot0x08KeyY=25A619504F07D068190334A81409C208
slot0x09KeyY=657BBD652E8BF30F3740C48FAC6CC59E
slot0x0AKeyY=147AD14AC206B100E2002A7B1A0DDD3D
slot0x0BKeyY=A3D00D9E2C5EDF30866486611CE08D25
slot0x2DKeyY=F04CC9952DE0B8D9113EDFEFBBB61E00
slot0x31KeyY=7462553F9E5A7904B8647CCA736DA1F5
slot0x0CKeyN=25C6265955A4FC6AC7E858087BD30971
slot0x0DKeyN=25C6265955A4FC6AC7E858087BD30971
slot0x0EKeyN=25C6265955A4FC6AC7E858087BD30971
slot0x0FKeyN=25C6265955A4FC6AC7E858087BD30971
slot0x10KeyN=2972AFF50FEE9F6F7B443EC34C7FDEAD
slot0x11KeyN=2972AFF50FEE9F6F7B443EC34C7FDEAD
slot0x12KeyN=2972AFF50FEE9F6F7B443EC34C7FDEAD
slot0x13KeyN=2972AFF50FEE9F6F7B443EC34C7FDEAD
slot0x14KeyN=09712F77EF367Cc0C96841938DC0B3A1
slot0x15KeyN=62EE746F91E02B1DD2F17D46BBC2C9C5
slot0x16KeyN=419720ED8304AC7C38E730C6F44EAC7C
slot0x17KeyN=C8E1943B639A02F148B4FC99DFCF646D
slot0x18KeyN=76F845681132BB31B6CF9E2E3948993A
slot0x19KeyN=76F845681132BB31B6CF9E2E3948993A
slot0x1AKeyN=76F845681132BB31B6CF9E2E3948993A
slot0x1BKeyN=76F845681132BB31B6CF9E2E3948993A
slot0x1CKeyN=185C51170D6816F2E4A56322FABBB39D
slot0x1DKeyN=185C51170D6816F2E4A56322FABBB39D
slot0x1EKeyN=185C51170D6816F2E4A56322FABBB39D
slot0x1FKeyN=185C51170D6816F2E4A56322FABBB39D
slot0x20KeyN=E386815AA04FEE3A23AE8E5AD7C50F48
slot0x21KeyN=E386815AA04FEE3A23AE8E5AD7C50F48
slot0x22KeyN=E386815AA04FEE3A23AE8E5AD7C50F48
slot0x23KeyN=E386815AA04FEE3A23AE8E5AD7C50F48
slot0x24KeyN=D9C01EC568E9C5850827EEED59CC1057
slot0x25KeyN=D9C01EC568E9C5850827EEED59CC1057
slot0x26KeyN=D9C01EC568E9C5850827EEED59CC1057
slot0x27KeyN=D9C01EC568E9C5850827EEED59CC1057
slot0x28KeyN=D9C01EC568E9C5850827EEED59CC1057
slot0x29KeyN=2962F347B1f98A697C6894A8BABD15A2
slot0x2AKeyN=EBCDE86C34BE2D9EB95E18B03D8A4168
slot0x2BKeyN=3508CFD3EAE5A4DA14AACDD737263F77
slot0x2CKeyN=4F04C8B67FEA1F5F3D9FFECD1395F9DD
slot0x2DKeyN=4F04C8B67FEA1F5F3D9FFECD1395F9DD
slot0x2EKeyN=4F04C8B67FEA1F5F3D9FFECD1395F9DD
slot0x2FKeyN=4F04C8B67FEA1F5F3D9FFECD1395F9DD
slot0x30KeyN=8AFE0F8269901AD9319A4CA70FB0970C
slot0x31KeyN=12DF92B6FFD438AB291C4FD4D7CE256D
slot0x32KeyN=8AFE0F8269901AD9319A4CA70FB0970C
slot0x33KeyN=8AFE0F8269901AD9319A4CA70FB0970C
slot0x34KeyN=FAD5b849640896C34EACDB2C72D3713A
slot0x35KeyN=FAD5b849640896C34EACDB2C72D3713A
slot0x36KeyN=FAD5b849640896C34EACDB2C72D3713A
slot0x37KeyN=FAD5b849640896C34EACDB2C72D3713A
slot0x38KeyN=A9BE6AB4316CA58A00C2A23BE757DF39
slot0x39KeyN=A9BE6AB4316CA58A00C2A23BE757DF39
slot0x3AKeyN=A9BE6AB4316CA58A00C2A23BE757DF39
slot0x3BKeyN=A9BE6AB4316CA58A00C2A23BE757DF39
slot0x3CKeyN=A9BE6AB4316CA58A00C2A23BE757DF39
slot0x3EKeyN=82226A9B554A47EBA38BD40498ED3F38
slot0x3FKeyN=E3038802DE969E1d5E5DB5B9F45441BF
common0=85215E96CB95A9ECA4B4DE601CB562C7
common1=0C767230F0998F1C46828202FAACBE4C
common2=C475CB3AB8C788BB575E12A10907B8A4
common3=E486EEE3D0C09C902F6686D4C06F649F
common4=ED31BA9C04B067506C4497A35B7804FC
common5=5E66998AB4E8931606850FD7A16DD755
common0N=55A3F872BDC80C555A654381139E153B
common1N=4434ED14820CA1EBAB82C16E7BEF0C25
common2N=F62E3F958E28A21F289EEC71A86629DC
common3N=2B49CB6F9998D9AD94F2EDE7B5DA3E27
common4N=750552BFAA1C040755C8D59A55F9AD1F
common5N=AADA4CA8F6E5A977E0A0F9E476CF0D63
</pre>


= Wii Key/IV Goodness =
Note: files are padded 8 bytes at start, for convenience
{| class=wikitable
! Type !! Key  !! Description 
|-
| Key || 9258A75264960D82676F904456882A73 || Boot1 Decryption Key
|-
| IV  || 00000000000000000000000000000000|| Boot1/2 Decryption IV
|-
| Key || A1604A6A7123B529AE8BEC32C816FCAA || Boot2 Decryption Key (Devel)
|-
| Key || EBE42A225E8593E448D9C5457381AAF7 || Boot2 Decryption Key (Prod)
|-
| RSA Key || <pre>D01FE100D43556B24B56DAE971B5A5D3
84B93003BE1BBF28A2305B060645467D
5B0251D2561A274F9E9F9CEC646150AB
3D2AE3366866ACA4BAE81AE3D79AA6B0
4A8BCBA7E6FB648945EBDFDB85BA091F
D7D114B5A3A780E3A22E6ECD87B5A4C6
F910E4032208814B0CEEA1A17DF73969
5F617EF63528DB949637A056037F7B32
413895C0A8F1982E1565E38EEDC22E59
0EE2677B8609F48C2E303FBC405CAC18
042F822084E4936803DA7F4134924856
2B8EE12F78F803246330BC7BE7EE724A
F458A472E7AB46A1A7C10C2F18FA07C3
DDD89806A11C9CC130B247A33C8D47DE
67F29E5577B11C43493D5BBA7634A7E4
E71531B7DF5981FE24A114554CBD8F00
5CE1DB35085CCFC77806B6DE254068A2
6CB5492D4580438FE1E5A9ED75C5ED45
1DCE789439CCC3BA28A2312A1B8719EF
0F73B713950C02591A7462A607F37C0A
A7A18FA943A36D752A5F4192F0136100
AA9CB41BBE14BEB1F9FC692FDFA09446
DE5A9DDE2CA5F68C1C0C21429287CB2D
AAA3D263752F73E09FAF4479D2817429
F69800AFDE6B592DC19882BDF581CCAB
F2CB91029EF35C4CFDBBFF49C1FA1B2F
E31DE7A560ECB47EBCFE32425B956F81
B69917487E3B789151DB2E78B1FD2EBE
7E626B3EA165B4FB00CCB751AF507329
C4A3939EA6DD9C50A0E7386B0145796B
41AF61F78555944F3BC22DC3BD0D00F8
798A42B1AAA08320659AC7395AB4F329
</pre> || Root Key (Devel)
|- 
| RSA Key || <pre>F8246C58BAE7500301FBB7C2EBE00105
71DA922378F0514EC0031DD0D21ED3D0
7EFC852069B5DE9BB951A8BC90A24492
6D379295AE9436AAA6A302510C7B1DED
D5FB20869D7F3016F6BE65D383A16DB3
321B95351890B17002937EE193F57E99
A2474E9D3824C7AEE38541F567E7518C
7A0E38E7EBAF41191BCFF17B42A6B4ED
E6CE8DE7318F7F5204B3990E226745AF
D485B24493008B08C7F6B7E56B02B3E8
FE0C9D859CB8B68223B8AB27EE5F6538
078B2DB91E2A153E85818072A23B6DD9
3281054F6FB0F6F5AD283ECA0B7AF354
55E03DA7B68326F3EC834AF314048AC6
DF20D28508673CAB62A2C7BC131A533E
0B66806B1C30664B372331BDC4B0CAD8
D11EE7BBD9285548AAEC1F66E821B3C8
A0476900C5E688E80CCE3C61D69CBBA1
37C6604F7A72DD8C7B3E3D51290DAA6A
597B081F9D3633A3467A356109ACA7DD
7D2E2FB2C1AEB8E20F4892D8B9F8B46F
4E3C11F4F47D8B757DFEFEA3899C3359
5C5EFDEBCBABE8413E3A9A803C69356E
B2B2AD5CC4C858455EF5F7B30644B47C
64068CDF809F76025A2DB446E03D7CF6
2F34E702457B02A4CF5D9DD53CA53A7C
A629788C67CA08BFECCA43A957AD16C9
4E1CD875CA107DCE7E0118F0DF6BFEE5
1DDBD991C26E60CD4858AA592C820075
F29F526C917C6FE5403EA7D4A50CEC3B
7384DE886E82D2EB4D4E42B5F2B149A8
1EA7CE7144DC2994CFC44E1F91CBD495
</pre> || Root Key (Prod)
|-
| Key || 67C6697351FF4AEC29CDBAABF2FBE346 || DVD Key (Devel)
|-
| Key || AB01B9D8E1622B08AFBAD84DBFC2A55D || App Key
|-
| IV || 216712E6AA1F689F95C5A22324DC6A98 || App IV
|-
| Key || 2B7E151628AED2A6ABF7158809CF4F3C || SW Key
|-
| IV  || 00000000000000000000000000000000 || SW IV
|-
| Key || 0E65378199BE4517AB06EC22451A5793 || MD5 Blanker
|-
|}


= Wii U Key/IV Goodness =
= Wii U Key/IV Goodness =
Line 538: Line 202:
|| vWii Common
|| vWii Common
|-
|-
| Key ||  {{key|FA3F309B8E43DAF3D64C6F32CBD1EEC9}} || {{sha1|D14A4C3CF313BD72E3291F21BB3DDC15D8DEDB2D}} || style="background-color:green;color:white" | Valid
| Key ||  - || {{sha1|56dd59752e6af1e55fc2ee7074abe2d2c9e70a10}} || style="background-color:yellow;color:black" | Confirmation Needed
|| boot1
|| boot1
|-
| Key ||  {{key|CE88CE6CD6F5F18135EB7B615FD7D009}} || {{sha1|56dd59752e6af1e55fc2ee7074abe2d2c9e70a10}} || style="background-color:green;color:white" | Valid
|| boot 1 dev
|-
|-
| IV ||  {{key|4FCD24A0E4D3AB6FAE8DFD8108581DCF}} || {{sha1|a1a87792b95d0294c0867c93d46c3068c1c6d322}} || style="background-color:green;color:white" | Valid
| IV ||  {{key|4FCD24A0E4D3AB6FAE8DFD8108581DCF}} || {{sha1|a1a87792b95d0294c0867c93d46c3068c1c6d322}} || style="background-color:green;color:white" | Valid
Line 554: Line 215:
|-
|-
|}
|}
 
= Switch Key/IV Goodness =
= Switch Key/IV Goodness (Variable) =
{| class=wikitable
 
! Type !! Key                    !!  SHA1/SHA256        !! Status    !! Description 
== prod (16.02) (oled) ==
|-
 
| AES-CTR || {{key|F4ECA1685C1E4DF77F19DB7B44A985CA}} || {{sha1|8c98ff409724784ddf3e3d39b60b25b7087ff537}} || style="background-color:green;color:white" | Valid || stage1_key_00
<pre>
|-
aes_kek_generation_source = 4d870986c45d20722fba1053da92e8a9
| AES-128-ECB || {{key|C2CAAFF089B9AED55694876055271C7D}} || {{sha1|4a98d62ff6ec0a042b7592219200e37dd9603479}} || style="background-color:green;color:white" | Valid || package1_key_00
aes_key_generation_source = 89615ee05c31b6805fe58f3da24f7aa8
|-
bis_kek_source = 34c1a0c48258f8b4fa9e5e6adafc7e4f
| AES-128-ECB || {{key|54E1B8E999C2FD16CD07B66109ACAAA6}} || {{sha1|8cec47b1b3974eed32c03b11a9de0133d9e0f00b}} || style="background-color:green;color:white" | Valid || master_key_01
bis_key_00 = 5ceb86d9b99d614277e3a07d02cce0c58d741050ab35362e5719eaeb12970a21
|-
bis_key_01 = c2995819501ac8961e0c7dc49f88a60292738cccf424e99311131c1296971104
| AES-128-ECB || {{key|4F6B10D33072AF2F250562BFF06B6DA3}} || {{sha1|add1d37e4a5c540aeeef4050a2ab98e8b0dc1d04}} || style="background-color:green;color:white" | Valid || master_key_02
bis_key_02 = 1efb18e1bb6d8a667f0313f3b0e9c4148025700df781803ade867a899f6fc8c5
|-
bis_key_03 = 1efb18e1bb6d8a667f0313f3b0e9c4148025700df781803ade867a899f6fc8c5
| AES-CTR || {{key|A35A19CB14404B2F4460D343D178638D}} || {{sha1|4d64731f7afa031c7eeae3eb2f462d55ff8ff5ae}} || style="background-color:green;color:white" | Valid || package2_key_00  
bis_key_source_00 = f83f386e2cd2ca32a89ab9aa29bfc7487d92b03aa8bfdee1a74c3b6e35cb7106
|-
bis_key_source_01 = 41003049ddccc065647a7eb41eed9c5f44424edab49dfcd98777249adc9f7ca4
| Kernel || - || {{sha1|124befb2895bba4db1726485daf6684b33ef5f51}} || style="background-color:green;color:white" | Valid || 1.00 Encrypted Kernel
bis_key_source_02 = 52c2e9eb09e3ee2932a10c1fb6a0926c4d12e14b2a474c1c09cb0359f015f4e4
|-
device_key_4x = ed2ab6a3d51af21d7604228cccf69097
| System Modules || - || {{sha1|96bf598bd162d5d8c87f2b25741f758f47730c88}} || style="background-color:green;color:white" | Valid || 1.00 Encrypted System Modules
eticket_rsa_kek = 19c8b441d318802bad63a5beda283a84
|-
eticket_rsa_kek_personalized = 5ab955e297e133b2cd1ff99e31072361
| Modulus ||
eticket_rsa_kek_source = dba451124ca0a9836814f5ed95e3125b
<pre>B36554FB0AB01E85A7F6CF918EBA9699
eticket_rsa_kekek_source = 466e57b74a447f02f321cde58f2f5535
0D8B91692AEE01204F345C2C4F4E37C7
eticket_rsa_keypair = 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
F10BD4CDA17F93F13359CEB1E9DD26E6
header_kek_source = 1f12913a4acbf00d4cde3af6d523882a
F3BB7787467AD64E474AD141B7794A38
header_key = aeaab1ca08adf9bef12991f369e3c567d6881e4e4a6a47a51f6e4877062d542d
066ECF618FCDC1400BFA26DCC0345183
header_key_source = 5a3ed84fdec0d82631f7e25d197bf5d01c9b7bfaf628183d71f64d73f150b9d2
D93B11543B9627329A95BE1E681150A0
key_area_key_application_00 = ef979e289a132c23d39c4ec5a0bba969
6B10A8838BF5FCBC90847A5A5C4352E6
key_area_key_application_01 = cdedbab97b69729073dfb2440bff2c13
C826E9FE06A08B530FAF1EC41C0BCF50
key_area_key_application_02 = 75716ed3b524a01dfe21456ce26c7270
1AA4F35CFBF097E4DE320A9FE35AAAB7
key_area_key_application_03 = f428306544cf5707c25eaa8bc0583fd1
447F5C3360B90F222D332AE969793142
key_area_key_application_04 = 798844ec099eb6a04b26c7c728a35a4d
8FE43A138BE726BD08876CA6F273F68E
key_area_key_application_05 = a57c6eecc5410ada22712eb3ccbf45f1
A7F2FEFB6C28660DBDD7EB42A878E6B8
key_area_key_application_06 = 2a60f6c4275df1770651d5891b8e73ec
6BAEC7A9E2406E892082258E3C6A60D7
key_area_key_application_07 = 32221bd6ed19b938bec06b9d36ed9e51
F3568EEC8D518A633C0478230E900CB4
key_area_key_application_08 = fb20aa9e3dbf67350e86479eb431a0b3
E7863B4F8E130947320E04B84D5BB046
key_area_key_application_09 = ce8d5fa79e220d5f48470e9f21be018b
71B05CF4AD634FC5E2AC1EC43396097B
key_area_key_application_0a = 38b865725adcf568a81d2db3ceaa5bcc
key_area_key_application_0b = bbddfd40a59d0ff555c0954239972213
key_area_key_application_0c = 3fee7204e21c6b0ff1373226c0c3e055
key_area_key_application_0d = 7b05d214fa554bc3e91b044fb412fc0d
key_area_key_application_0e = 061667d7668b76a423e3f1aea52a8baa
key_area_key_application_0f = 7ee19b046987ba2588e852cc24bc2953
key_area_key_application_source = 7f59971e629f36a13098066f2144c30d
key_area_key_ocean_00 = b33813e4c9c4399c75fabc673ab4947b
key_area_key_ocean_01 = c54166efa8c9c0f6511fa8b580191677
key_area_key_ocean_02 = 3061ce73461e0b0409d6a33da85843c8
key_area_key_ocean_03 = 06f170025a64921c849df168e74d37f2
key_area_key_ocean_04 = dc857fd6dc1c6213076ec7b902ec5bb6
key_area_key_ocean_05 = 131d76b70bd8a60036d8218c15cb610f
key_area_key_ocean_06 = 17d565492ba819b0c19bed1b4297b659
key_area_key_ocean_07 = 37255186f7678324bf2b2d773ea2c412
key_area_key_ocean_08 = 4115c119b7bd8522ad63c831b6c816a6
key_area_key_ocean_09 = 792bfc652870cca7491d1685384be147
key_area_key_ocean_0a = dfcc9e87e61c9fba54a9b1c262d41e4d
key_area_key_ocean_0b = 66fe3107f5a6a8d8eda2459d920b07a1
key_area_key_ocean_0c = b79b6bf3d6cdc5ec10277fc07a4fec93
key_area_key_ocean_0d = 9a20ffbdcb03cfc5b8e88b058d27ae6c
key_area_key_ocean_0e = 1e8bba40c91ca4d55163cdfb779a2f4e
key_area_key_ocean_0f = 2a51262c614e175f22cb0bf7907418b0
key_area_key_ocean_source = 327d36085ad1758dab4e6fbaa555d882
key_area_key_system_00 = 6dd02aa15b440d6231236b6677de86bc
key_area_key_system_01 = 4ab155e7f29a292037fd147592770b12
key_area_key_system_02 = b7a74adeaf89c2a198c327bdff322d7d
key_area_key_system_03 = d5aab1acd23a8aec284a316df859d377
key_area_key_system_04 = 9b44b45b37de9d14754b1d22c2ca742c
key_area_key_system_05 = 0012e957530d3dc7af34fbbe6fd44559
key_area_key_system_06 = 01744e3b0818445cd54ee9f89da43192
key_area_key_system_07 = d0d30e46f5695b875f11522c375c5a80
key_area_key_system_08 = bd06cb1b86bd5c433667470a09eb63de
key_area_key_system_09 = e19f788f658eda8bbf34a1dd2a9503a9
key_area_key_system_0a = 7070e7ff5cfe448630143a9874903c38
key_area_key_system_0b = 3fa471d4483e58b8f7756fcb64f63890
key_area_key_system_0c = 7bfd381df3369407ab1c6bdd9fabf522
key_area_key_system_0d = 53ed531cd657edf443b551a964f44ecc
key_area_key_system_0e = fa9d4958e8f8f2c8c8ae33b1034a0a02
key_area_key_system_0f = 91eae4eeb5335cc5a706c4fe81d8d8af
key_area_key_system_source = 8745f1bba6be79647d048ba67b5fda4a
keyblob_key_source_00 = df206f594454efdc7074483b0ded9fd3
keyblob_key_source_01 = 0c25615d684ceb421c2379ea822512ac
keyblob_key_source_02 = 337685ee884aae0ac28afd7d63c0433b
keyblob_key_source_03 = 2d1f4880edeced3e3cf248b5657df7be
keyblob_key_source_04 = bb5a01f988aff5fc6cff079e133c3980
keyblob_key_source_05 = d8cce1266a353fcc20f32d3b517de9c0
keyblob_mac_key_source = 59c7fb6fbe9bbe87656b15c0537336a5
mariko_master_kek_source_05 = 77605ad2ee6ef83c3f72e2599dac5e56
mariko_master_kek_source_06 = 1e80b8173ec060aa11be1a4aa66fe4ae
mariko_master_kek_source_07 = 940867bd0a00388411d31adbdd8df18a
mariko_master_kek_source_08 = 5c24e3b8b4f700c23cfd0ace13c3dc23
mariko_master_kek_source_09 = 8669f00987c805aeb57b4874de62a613
mariko_master_kek_source_0a = 0e440cedb436c03faa1daebf62b10982
mariko_master_kek_source_0b = e541acecd1a7d1abed0377f127caf8f1
mariko_master_kek_source_0c = 52719bdfa78b61d8d58511e48e4f74c6
mariko_master_kek_source_0d = d268c6539d94f9a8a5a8a7c88f534b7a
mariko_master_kek_source_0e = ec61bc821e0f5ac32b643f9dd619222d
mariko_master_kek_source_0f = a5ec16391a3016082ecf096f5e7ceea9
master_kek_05 = 94a92da1d73c2b3e165c891ced5607fc
master_kek_06 = a6c7b7870e42d5302fe6110883aa3889
master_kek_07 = 5cf8c1d58063aff640aaa681f0ce426c
master_kek_08 = e42f1ec8002043d746575ae6dd9f283f
master_kek_09 = cec2885fbeef5f6a989db84a4cc4b393
master_kek_0a = dd1a730232522b5cb4590cd43869ab6a
master_kek_0b = fc6f0c891d42710180724ed9e112e72a
master_kek_0c = 43f7fc20fcec22a5b2a744790371b094
master_kek_0d = 8dc9a8223671daa73ccd8b93cdaaed9f
master_kek_0e = f3f857257c3f63ca63b9c9710b8f673e
master_kek_0f = 1e8f01c4927a76a66097df44c3bad27d
master_kek_source_06 = 374b772959b4043081f6e58c6d36179a
master_kek_source_07 = 9a3ea9abfd56461c9bf6487f5cfa095c
master_kek_source_08 = dedce339308816f8ae97adec642d4141
master_kek_source_09 = 1aec11822b32387a2bedba01477e3b67
master_kek_source_0a = 303f027ed838ecd7932534b530ebca7a
master_kek_source_0b = 8467b67f1311aee6589b19af136c807a
master_kek_source_0c = 683bca54b86f9248c305768788707923
master_kek_source_0d = f013379ad56351c3b49635bc9ce87681
master_kek_source_0e = 6e7786ac830a8d3e7db766a022b76e67
master_kek_source_0f = 99220957a7f95e94fe787f41d6e756e6
master_key_00 = c2caaff089b9aed55694876055271c7d
master_key_01 = 54e1b8e999c2fd16cd07b66109acaaa6
master_key_02 = 4f6b10d33072af2f250562bff06b6da3
master_key_03 = 84e04ec20b9373818c540829cf147f3d
master_key_04 = cfa2176790a53ff74974bff2af180921
master_key_05 = c1dbedcebf0dd6956079e506cfa1af6e
master_key_06 = 0aa90e6330cdc12d819b3254d11a4e1e
master_key_07 = 929f86fbfe4ef7732892bf3462511b0e
master_key_08 = 23cfb792c3cb50cd715da0f84880c877
master_key_09 = 75c93b716255319b8e03e14c19dea64e
master_key_0a = 73767484c73088f629b0eeb605f64aa6
master_key_0b = 8500b14bf4766b855a26ffc614097a8f
master_key_0c = b3c503709135d4b35de31be4b0b9c0f7
master_key_0d = 6d2b26416ab030dc504cbfd6bb2977b7
master_key_0e = 3b995e3bf23207c3cacb07f8c57415e6
master_key_0f = ff22454d86237004c750e2dcb4b16c80
master_key_source = d8a2410ac6c59001c61d6a267c513f3c
package2_key_00 = a35a19cb14404b2f4460d343d178638d
package2_key_01 = a0dd1eacd438610c85a191f02c1db8a8
package2_key_02 = 7e5ba2aafd57d47a85fd4a57f2076679
package2_key_03 = bf03e9889fa18f0d7a55e8e9f684323d
package2_key_04 = 09df6e361e28eb9c96c9fa0bfc897179
package2_key_05 = 444b1a4f9035178b9b1fe262462acb8e
package2_key_06 = 442cd9c21cfb8914587dc12e8e7ed608
package2_key_07 = 70c821e7d6716feb124acbac09f7b863
package2_key_08 = 8accebcc3d15a328a48365503f8369b6
package2_key_09 = f562a7c6c42e3d4d3d13ffd504d77346
package2_key_0a = 0803167ec7fc0bc753d8330e5592a289
package2_key_0b = 341db6796aa7bdb8092f7aae6554900a
package2_key_0c = 4e97dc4225d00c6ae33d49bddd17637d
package2_key_0d = db13c2de2c313540b18a32b4f106d4a1
package2_key_0e = 254d393b26e6d98963c1c8c4fa6d11e2
package2_key_0f = 1c87f9650cca54af03df3590021e457d
package2_key_source = fb8b6a9c7900c849efd24d854d30a0c7
per_console_key_source = 4f025f0eb66d110edc327d4186c2f478
retail_specific_aes_key_source = e2d6b87a119cb880e822888a46fba195
save_mac_kek_source = d89c236ec9124e43c82b038743f9cf1b
save_mac_key = 22a5c49b342baf6fb06708dcdde6ce0c
save_mac_key_source = e4cd3d4ad50f742845a487e5a063ea1f
save_mac_sd_card_kek_source = 0489ef5d326e1a59c4b7ab8c367aab17
save_mac_sd_card_key_source = 6f645947c56146f9ffa045d595332918
sd_card_custom_storage_key_source = 370c345e12e4cefe21b58e64db52af354f2ca5a3fc999a47c03ee004485b2fd0
sd_card_kek_source = 88358d9c629ba1a00147dbe0621b5432
sd_card_nca_key_source = 5841a284935b56278b8e1fc518e99f2b67c793f0f24fded075495dca006d99c2
sd_card_save_key_source = 2449b722726703a81965e6e3ea582fdd9a951517b16e8f7f1f68263152ea296a
sd_seed = a6ce754ab34540140bad7116339419da
ssl_rsa_kek = b011100660d1dccbad1b1b733afa9f95
ssl_rsa_kek_personalized = b667f4804030a1248233e7a3a1b78796
ssl_rsa_kek_source = 9a383bf431d0bd8132534ba964397de3
ssl_rsa_kekek_source = 7f5bb0847b25aa67fac84be23d7b6903
ssl_rsa_key = 615a7711e6d46d83ff2303a08b3020f6d1c150552d5691e540e0f71a0b3e574805d438ec5c2e13b9b6f1e5ff6b9946376e8594e172b70c748b199e96f0e12f08aedadfa0dfee60dc9165f2968c4360b51697fa50fcee0498c30444bf17b6c951d09484c3fdb8bcaab67a727cc3127c7f3534db50c2f28edfc017eb3231aac17c906867f5bdabcae43ff639eb772e8248659b0b9e9f57e228ac3053b4a923791841f0ba23245adac09eaf7854dbb4362a96bf5f8736259d946954566070893d0769af9715ceba217fea9641d775b492e80a63241c9b4d6f3542280dd9f11e380b979556572c6a5165443ff8b3dae2be6245694f45ff885270adbc2ac58e030001
titlekek_00 = 62a24d6e6d0d0e0abf3554d259be3dc9
titlekek_01 = 8821f642176969b1a18021d2665c0111
titlekek_02 = 5d15b9b95a5739a0ac9b20f600283962
titlekek_03 = 1b3f63bcb67d4b06da5badc7d89acce1
titlekek_04 = e45c1789a69c7afbbf1a1e61f2499459
titlekek_05 = ddc67f7189f4527a37b519cb051eee21
titlekek_06 = b1532b9d38ab036068f074c0d78706ac
titlekek_07 = 81dc1b1783df268789a6a0edbf058343
titlekek_08 = 47dfe4bf0eeda88b17136b8005ab08ea
titlekek_09 = adaa785d90e1a9c182ac07bc276bf600
titlekek_0a = 42daa957c128f75bb1fda56a8387e17b
titlekek_0b = d08903363f2c8655d3de3ccf85d79406
titlekek_0c = be2682599db34caa9bc7ebb2cc7c654c
titlekek_0d = 41071f95beddc4114a03e0072e6ccab7
titlekek_0e = e342365a0fa0fa4a28a7bc00e45b3f68
titlekek_0f = 105999eaf8b71d199bf201f525b2c68d
titlekek_source = 1edc7b3b60e6b4d878b81715985e629b
</pre>
</pre>
 
|| {{sha1|f847ed0465c0dfdcd2c28b3e1a6da0c0f01fbbc5}} || style="background-color:green;color:white" | Valid || Public Debug
== dev ==
|-
 
| Modulus ||
<pre>
<pre>
keyblob_00=4C6A5CF3273BFA10166C689B8403DF55520817FFF2D84D3D5AD3C513ADFFA9C69B7EDD5B01F01D464F09DADF18D2E22EB94C067E48E83FAE2E09934574EF052C66A3576E2E86083700783EA264E14F5FA0D99A13A6EAC6C634C25308F98E50D55D10E3CCFC6D0F9146A6C64DE074689B4D77D1C7F90CC5609089450DB20E684E0F60BE8945FF612F4B07261360B27CDE
8D13A7776AE5DCC03B25D058E4206959
keyblob_01=EB3B51E088A4A25FC51F062955B6AA64D07DB7BE22100E26DDAEFFC1B1C0A0DFB58FACE75DFBFFB4B2E71B44D65D262DE892FFFFC6E4A7270B586E6EA07E24BD30A279EA605E84CC363F1A25DD0CCFB3825D8135B6532C699CD059821CA876CDBE7188EBA03EFAECF6091D9E9ACA7124273657C4B4FEDDD55E6772660E8045E673E7656C75B0D1B3C0E34865800DE5D0
554BAB7040082807A8A7FD0F312E11FE
keyblob_02=827DEEFD4D18F2707025F5939704F3F58CD5ECF115F3F5E6EC05C4C8FC685C203DA4380334EE5F7ED8608E7A3B752AAEC4A2306C1BD06802C0B6F8274182F76EA413ABB04ABCC832B4D09A46A180ADE28F2F7B68812DDB6784F1C61836B1155B1C8BA45F24D8E22885E3802990A9632EF938C91F65C973069094CEAA88F4EC18A0E13786F705DF8825C90344029376F6
47A0F99DDF80DB865A2789CD976C85C5
keyblob_03=00940BB4E3EFF38ED531B1AAFB4C186A8969A1AD7673CA1D199BFB6E3E76D039D653E4E24133B40E11EE5D92807E26D1F17622EAB4DC1E860A94EAFE0B0F1561C8FC1EC1BCB5ECD87FAE48EA127AD632C9E9C37B97F6361A5B328E04D93BDA1549702209FE71CED88FBF9B095D1FCAB5A27099D6A82F00D9214BC2AC21958032CAA35FA5C1BE5698F35508E843499235
6C397F41F2FF2420C395A6F79D4A4574
keyblob_04=2C98F4A47B0D15D7B5D7EA6B5A77F62B4417A723BEC578CD95CA0E1E1080C924C2B9CBA398E43E4E13F291381738E7D9123ECE6273166AB2A64A2EBF1D398FEBB8112A99440B3F7B91DECD41986E0F545E725BA087E82733FFDB132315A82959CBEE0F9837D4CD320179E38390E8A8214C545A459B550AC0169902D73413097969DA1D381703EE3D2310CC8832666525
8B5D288AC699356885A56432809FD348
keyblob_mac_key_source=59C7FB6FBE9BBE87656B15C0537336A5
39A21D246769DF75AC12B5BDC32990BE
keyblob_key_source_00=DF206F594454EFDC7074483B0DED9FD3
37E4A0809ABE36BF1F2CAB2BADF59732
keyblob_key_source_01=0C25615D684CEB421C2379EA822512AC
9A429D098B08F06347A3E91B36D82D8A
keyblob_key_source_02=337685EE884AAE0AC28AFD7D63C0433B
D7E1541195E44588698A2B35CED0A50B
keyblob_key_source_03=2D1F4880EDECED3E3CF248B5657DF7BE
D55DACDBAF114DCAB81EE7019EF446A3
keyblob_key_source_04=BB5A01F988AFF5FC6CFF079E133C3980
8A946D76BD8AC83BD231580C79A826E9
master_key_source=D8A2410AC6C59001C61D6A267C513F3C
D1799CCBD42B6A4FC6CCCF90A7B99847
master_key_00=597D677238F5C73A91B4343F8212AF61
FDFA4C6C6F81873BCAB850F63E395D4D
master_key_01=B82937D1D0E1433019C834B94F628B28
973F0F353953FBFACDABA87A629A3FF2
master_key_02=6A33B06721A15A36C1A6D795C25009CC
0927963F079A91F716BFC63A825A4BCF
master_key_03=1D25A7201668E9B22C717CFF2CDAD54C
4950958C55807E39B148051E21C7244F
master_key_04=C78B803E6521AF55A9AF128AA63146B7
package1_key_00=0F60BE8945FF612F4B07261360B27CDE
package1_key_01=73E7656C75B0D1B3C0E34865800DE5D0
package1_key_02=A0E13786F705DF8825C90344029376F6
package1_key_03=CAA35FA5C1BE5698F35508E843499235
package1_key_04=69DA1D381703EE3D2310CC8832666525
package2_key_source=FB8B6A9C7900C849EFD24D854D30A0C7
package2_key_00=5A5FBAE773F8B7964AE1847CFA41AAC8
package2_key_01=446EF2C55C88E875765AA7E7E7B44192
package2_key_02=275F7D21D36A711E00459A30F6C60631
package2_key_03=9F99C811BFE19B730629386F664643D5
package2_key_04=DC4440B71EF8D98F6C8BD911EEC15376
titlekek_source=1EDC7B3B60E6B4D878B81715985E629B
titlekek_00=C467D53F4FDFEB193F61BFDA57F489D0
titlekek_01=B0EAE34F4E270855B32401651D8AF695
titlekek_02=90E4F22B9B9A46E3074DA6D0AE149F8A
titlekek_03=B25A2BAF87A5B83B4E5ED4C3254B5CDC
titlekek_04=7B3C64A2E949F8DC8F10ED8559F3189A
aes_kek_generation_source=4D870986C45D20722FBA1053DA92E8A9
aes_key_generation_source=89615EE05C31B6805FE58F3DA24F7AA8
key_area_key_application_source=7F59971E629F36A13098066F2144C30D
key_area_key_application_00=3A7C3E384A8F22FF4B215719B781AD0C
key_area_key_application_01=CE3B2A68079D99B1448D69DC5E942E48
key_area_key_application_02=DB0479BA2D5395B27C71BD6AFE5C3EC7
key_area_key_application_03=E6DA7856D213F0AACB2B34A71A87B6FB
key_area_key_application_04=027406FDF59632B88BD053AAF306D39B
key_area_key_ocean_source=327D36085AD1758DAB4E6FBAA555D882
key_area_key_ocean_00=C026FC7EEAEA8150C66E5799AC3C57C3
key_area_key_ocean_01=74BFB7BE5ED5CF69DD57604E4DFF21C7
key_area_key_ocean_02=AF7355D87B1550F1295D01FDE52F7769
key_area_key_ocean_03=1D69DCF6B8319F8C55B377E0C8D570B0
key_area_key_ocean_04=EA38E8B7D775B3747F23041F6805D65C
key_area_key_system_source=8745F1BBA6BE79647D048BA67B5FDA4A
key_area_key_system_00=47BB5D75C1FB7FE6F0B2266174DC6356
key_area_key_system_01=E12E9FA285228D08059AE4DBA9E241B8
key_area_key_system_02=DC395137598BBFDEABB3B42BB4DA6EB5
key_area_key_system_03=027F9403ADD561FEDA12FF2593BE3838
key_area_key_system_04=2ACBED4AD66E751F0B23DC39D2397BB8
header_kek_source=1F12913A4ACBF00D4CDE3AF6D523882A
header_key_source=5A3ED84FDEC0D82631F7E25D197BF5D01C9B7BFAF628183D71F64D73F150B9D2
header_key=CB9A939F8272544A745D28469DCC381206312706AE62568C5B7EE69F7E010224
</pre>
</pre>
|| {{sha1|a809e09f8bd790446b86f28b84a6d0f36481a245}} || style="background-color:green;color:white" | Valid || Public Retail
|-
|}


= Other Switch Key Goodness =
= Regarding Jokes =
 
* Sorry, but it's difficult to distinguish Contributors with Spam Users, especially when you aren't logged in and when you log in to your account with different IP Addresses (and especially with this current Spam situation). It won't happen for a second time. [[User:Roxanne|Roxanne]] 21th December 2015 (18:12 GMT+1)
<pre>
** It's ok, i should've logged, but i keep formatting my pc, so i always forget :) In the end it was my fault. Thanks for the feedback though [[User:Zecoxao|Zecoxao]]
mariko_bek = 6A5D168B14E64CADD70DA934A06CC222
*** OK and to answer your question regarding the newest DEX Firmwares, I'm on CEX but I'm still on [[:File:IMG 0148.JPG|this]] Firmware. Is this Good or Bad? :) ([[User:Roxanne|Roxanne]] 22th December 2015 (22:56 GMT+1)
mariko_kek = 4130B8B842DD7CD2EA8FD50D3D48B77C
**** it'd be nice to test some psgroove on it :)
</pre>
***** http://www.psdevwiki.com/ps3/User:Not_Zecoxao is still needed?
 
****** nope
= 3K3Y Goodness =
 
<pre>
3K3Y Bootloader AES Key: 81EA6E834AA37D1D4BDB7BFF51EB5F86
3K3Y Linux Kernel AES Key: 23D331149A5A85F2CCF88F422D70B3AB
3K3Y Linux Kernel AES IV: 508E4724DA2EF3B7E861A6032D1EEDC6
3K3Y ROOTFS AES Key: CFA416812C4C33348E6642D122DFF1C6
3K3Y ROOTFS AES IV: 00000000000000000000000000000000
</pre>
 
= XK3Y Goodness =
 
<pre>
XK3Y Bootloader AES key: C0681465325EE0169F0C3E4AA28C54B2
XK3Y ROOTFS AES key: FC815A31137863C5B078FB6F1C31A58E (for XKEY firmware >= v1.06)
XK3Y ROOTFS AES key: 60BD0BB7084A1C104141B6B6D95B97C4 (for XKEY firmware < v1.06)
XK3Y ROOTFS AES IV: 00000000000000000000000000000000 (ALL XKEY ROOTFS firmwares)
XK3Y KERNEL AES key: 2B06C0D6B5A057F20FB949037860D056
XK3Y KERNEL AES IV: 508E4724DA2EF3B7E861A6032D1EEDC6
XK3Y SRAM EMUKEY: 3C51DDF6AF5CEAD5C3B3327830B336D6
</pre>
 
= 3K3Y Goodness =
 
<pre>
3K3Y Bootloader AES Key: 81EA6E834AA37D1D4BDB7BFF51EB5F86
3K3Y Linux Kernel AES Key: 23D331149A5A85F2CCF88F422D70B3AB
3K3Y Linux Kernel AES IV: 508E4724DA2EF3B7E861A6032D1EEDC6
3K3Y ROOTFS AES Key: CFA416812C4C33348E6642D122DFF1C6
3K3Y ROOTFS AES IV: 00000000000000000000000000000000
</pre>
 
= X360 Key Goodness =
 
== 1BL Key ==
 
<pre>
DD88AD0C9ED669E7B56794FB68563EFA
</pre>
 
== Other Keys ==
 
<pre>
#pragma once
 
// Various encryption keys used to decrypt XEX image key
// There's no indication inside the XEX which key is used though :(
// Only way to know is to try decrypting and check if the resulting data is valid
const uint8_t retail_key[16] = {
  0x20, 0xB1, 0x85, 0xA5, 0x9D, 0x28, 0xFD, 0xC3,
  0x40, 0x58, 0x3F, 0xBB, 0x08, 0x96, 0xBF, 0x91
};
const uint8_t devkit_key[16] = {
  0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
  0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
};
 
// unsure if any of the xex1 keys get used, we'll still try them as last resort anyway
const uint8_t retail_key_xex1[16] = {
  0xA2, 0x6C, 0x10, 0xF7, 0x1F, 0xD9, 0x35, 0xE9,
  0x8B, 0x99, 0x92, 0x2C, 0xE9, 0x32, 0x15, 0x72
};
const uint8_t devkit_key_xex1[16] = {
  0xA8, 0xB0, 0x05, 0x12, 0xED, 0xE3, 0x63, 0x8D,
  0xC6, 0x58, 0xB3, 0x10, 0x1F, 0x9F, 0x50, 0xD1
};
 
const int num_enckeys = 4;
const uint8_t* key_bytes[num_enckeys] = {
  retail_key,
  devkit_key,
  retail_key_xex1,
  devkit_key_xex1
};
const char* key_names[num_enckeys] = {
  "retail",
  "devkit",
  "retail-XEX1",
  "devkit-XEX1"
};
 
const uint8_t pirs_retail_public[] = {
    0x00, 0x00, 0x00, 0x20, // cqw
    0x00, 0x00, 0x00, 0x03, // dwPubExp
    0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // qwReserved
    // aqwM
    0xE6, 0x3B, 0x32, 0xB2, 0x8D, 0x9E, 0x9E, 0xE7, 0x9D, 0xFC, 0x5C, 0x72, 0x41, 0x94, 0x58, 0x47,
    0xDE, 0x0D, 0x18, 0x40, 0x72, 0xD6, 0xE3, 0x46, 0x8E, 0xBA, 0x8E, 0xBC, 0x1A, 0x90, 0xAC, 0x20,
    0xBA, 0x03, 0x85, 0xB5, 0x1A, 0x3E, 0x25, 0xF9, 0xA6, 0x58, 0xEB, 0xB6, 0xA3, 0xC4, 0xA3, 0xEE,
    0xB2, 0xB0, 0xAE, 0x97, 0x69, 0xEB, 0xFE, 0x71, 0xFC, 0x02, 0xAB, 0x77, 0xBA, 0xC8, 0xE6, 0x74,
    0xE6, 0x7C, 0x63, 0x0E, 0xAF, 0x4C, 0xF7, 0xE7, 0x11, 0x4A, 0x80, 0x24, 0x72, 0x05, 0x7A, 0x63,
    0xD0, 0xF8, 0x91, 0x02, 0xA6, 0xE7, 0x7D, 0x77, 0xC5, 0xA7, 0x9B, 0x08, 0x11, 0x2E, 0xA0, 0x64,
    0x45, 0x60, 0x46, 0xBC, 0x36, 0xE1, 0x17, 0x71, 0xBE, 0x66, 0x49, 0x2F, 0xAE, 0x20, 0xA4, 0x76,
    0x9C, 0x27, 0x51, 0xCF, 0x4B, 0x34, 0x7A, 0x35, 0xBC, 0xA4, 0xAA, 0x1C, 0x47, 0x4B, 0xF4, 0x97,
    0x22, 0x4E, 0x13, 0x24, 0xD3, 0xC1, 0x57, 0xDF, 0x4D, 0x84, 0xB9, 0x18, 0x97, 0x99, 0xAC, 0x00,
    0xB3, 0x3D, 0x03, 0x25, 0x60, 0xC8, 0x7A, 0x59, 0xFE, 0x48, 0xFF, 0x28, 0x3D, 0x10, 0xBB, 0x9E,
    0x09, 0x06, 0x2A, 0x61, 0x20, 0x2C, 0xF8, 0x72, 0xEB, 0x87, 0xE6, 0xD1, 0xFB, 0xB3, 0x66, 0xFC,
    0x4A, 0x02, 0xAE, 0xD4, 0xD8, 0x37, 0xCF, 0xA6, 0x32, 0x25, 0x79, 0x36, 0x0E, 0xF4, 0xED, 0x19,
    0xA2, 0x10, 0x27, 0x96, 0x2F, 0x9F, 0xA9, 0x3D, 0xA4, 0x37, 0x30, 0x11, 0x51, 0x83, 0xBD, 0xF7,
    0xC7, 0xE5, 0xCE, 0xAA, 0xEC, 0xDE, 0x48, 0xA0, 0x84, 0xF7, 0xB0, 0xF6, 0x4B, 0x8E, 0xF0, 0x89,
    0xBD, 0x47, 0x7C, 0x90, 0xDD, 0x88, 0x12, 0x17, 0x40, 0xD2, 0x4E, 0xA6, 0xC6, 0x11, 0x04, 0x1B,
    0x57, 0xA8, 0x68, 0xB4, 0x61, 0xF4, 0x1B, 0xC6, 0x8B, 0xE8, 0xD9, 0x20, 0xF2, 0x05, 0xE0, 0x70
};
 
const uint8_t live_retail_public[] = {
    0x00, 0x00, 0x00, 0x20, // cqw
    0x00, 0x01, 0x00, 0x01, // dwPubExp
    0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // qwReserved
    // aqwM
    0xF2, 0xE5, 0x3E, 0x3F, 0x03, 0x75, 0xC2, 0xB3, 0x20, 0xB6, 0xAB, 0x41, 0x90, 0x78, 0x9D, 0xA1,
    0x04, 0x4E, 0x58, 0x6D, 0xFC, 0xFF, 0x16, 0x1C, 0x9E, 0x01, 0x1D, 0xDA, 0x5D, 0x16, 0x7E, 0x54,
    0xCB, 0x2A, 0xF2, 0xA7, 0x02, 0x83, 0xE8, 0xAD, 0xCD, 0xA1, 0x00, 0xF8, 0x9C, 0xC4, 0xAD, 0x2D,
    0x4C, 0xAF, 0x2E, 0x18, 0x01, 0x9F, 0x38, 0xB1, 0x3D, 0xFA, 0xC9, 0xA6, 0xCF, 0x2A, 0xA8, 0x4E,
    0xE0, 0x7E, 0x17, 0x23, 0x61, 0xFB, 0xFD, 0x36, 0x2E, 0x22, 0x17, 0xFA, 0x75, 0x71, 0xA0, 0x74,
    0xF9, 0xF7, 0x10, 0x85, 0x7E, 0xEC, 0x5C, 0x35, 0xF5, 0xB0, 0xAC, 0xAB, 0xC1, 0x0B, 0x09, 0x1D,
    0x9A, 0x7A, 0xBE, 0xB9, 0xB7, 0x91, 0x78, 0x0A, 0x5D, 0xCA, 0xCB, 0xF9, 0x98, 0x4B, 0x68, 0x15,
    0x75, 0x77, 0x1C, 0xB0, 0xCC, 0xFA, 0x04, 0xA3, 0xEC, 0x08, 0xDD, 0x68, 0x5F, 0xEA, 0x69, 0xAF,
    0x9D, 0x98, 0xB9, 0xBF, 0xF3, 0x72, 0xFC, 0xC0, 0x1E, 0x5B, 0x15, 0x5B, 0x49, 0xAA, 0x6A, 0xDC,
    0x55, 0x35, 0x39, 0x3F, 0x8C, 0xDC, 0xC7, 0x57, 0xA7, 0x75, 0x21, 0x41, 0x08, 0xBB, 0x9B, 0x74,
    0x6C, 0xFB, 0xF6, 0x89, 0xC4, 0xB3, 0xEB, 0xD0, 0x7E, 0xAF, 0xA7, 0xA7, 0x27, 0x25, 0x41, 0x70,
    0x59, 0xAC, 0x96, 0x18, 0x16, 0x0E, 0xE9, 0x6B, 0x11, 0xC7, 0xEE, 0x35, 0x52, 0x72, 0xA4, 0xC2,
    0xB3, 0x1E, 0x20, 0x05, 0xC5, 0xC0, 0x9C, 0x5D, 0xC7, 0xCF, 0x5B, 0x81, 0xBE, 0xB2, 0xB3, 0xAF,
    0x83, 0x85, 0xDE, 0x73, 0x6E, 0x7A, 0x0E, 0xAC, 0x59, 0x0D, 0x46, 0x73, 0xFB, 0x7B, 0x78, 0x88,
    0x29, 0x87, 0x5A, 0xE6, 0x7B, 0x2E, 0x7D, 0x86, 0x82, 0x55, 0xBE, 0x12, 0x12, 0xD9, 0x87, 0xB3,
    0xBD, 0x3D, 0x41, 0xC8, 0xD0, 0x00, 0xF5, 0x7D, 0xC9, 0x7B, 0x51, 0x8E, 0xC7, 0x35, 0xDC, 0xEF
};
 
const uint8_t pirs_devkit_public[] = {
    0x00, 0x00, 0x00, 0x20, // cqw
    0x00, 0x00, 0x00, 0x03, // dwPubExp
    0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // qwReserved
    // aqwM
    0xC9, 0x1C, 0x35, 0x77, 0xC8, 0xBF, 0xA0, 0x6B, 0x64, 0x2F, 0x4E, 0x6C, 0x73, 0x99, 0xAC, 0xE5,
    0x84, 0xE7, 0xAB, 0x2E, 0xE4, 0xDB, 0xAE, 0x1E, 0x3E, 0x06, 0x70, 0x62, 0x4A, 0xA2, 0xAD, 0x99,
    0xE1, 0x76, 0x70, 0x61, 0xE6, 0xBE, 0x93, 0x27, 0x6D, 0x5D, 0x97, 0xFD, 0x73, 0x30, 0x76, 0x3A,
    0xB8, 0x70, 0x5C, 0xC0, 0xBE, 0x8F, 0x1B, 0x3D, 0x4C, 0x5D, 0x85, 0x65, 0x98, 0x8C, 0x4C, 0x6B,
    0xCC, 0xBE, 0xD0, 0xC5, 0xA7, 0x43, 0xAA, 0x6C, 0x56, 0x91, 0x0F, 0xF8, 0xE8, 0xBD, 0x90, 0x4D,
    0xB8, 0xD9, 0xA3, 0xF1, 0x3B, 0x6E, 0x71, 0xDB, 0xB0, 0xE0, 0xF5, 0x1A, 0x8E, 0x80, 0x39, 0xC2,
    0x4E, 0x3A, 0x81, 0x42, 0xC5, 0x6E, 0xB9, 0x49, 0x44, 0xF4, 0x8D, 0xC5, 0x84, 0x51, 0xC8, 0x1B,
    0x7D, 0xBC, 0x45, 0x59, 0xD0, 0xE3, 0xF2, 0x97, 0xEF, 0xA0, 0x39, 0xEA, 0x1C, 0xF9, 0x48, 0x66,
    0x66, 0x4E, 0x8B, 0xD0, 0x22, 0xAB, 0xDB, 0x90, 0x1E, 0xBC, 0xD8, 0x3D, 0x91, 0xA7, 0x89, 0x7C,
    0x72, 0x07, 0xDA, 0x63, 0xAA, 0xF3, 0x3E, 0xED, 0xD5, 0x87, 0x66, 0x7B, 0xF2, 0x28, 0x9C, 0xB3,
    0x40, 0x54, 0x22, 0x65, 0x44, 0x10, 0x2A, 0xD2, 0xB0, 0x48, 0x4C, 0xF9, 0x9E, 0x6F, 0xA4, 0x76,
    0x9F, 0x18, 0xD0, 0x4D, 0xAD, 0xA5, 0x6E, 0xFC, 0x9E, 0xC2, 0xA4, 0xCF, 0xB3, 0xEC, 0xC8, 0x05,
    0xED, 0x8C, 0x08, 0xED, 0x25, 0x13, 0xCC, 0xBB, 0x16, 0x60, 0x1A, 0x8A, 0xC7, 0x4B, 0x68, 0x93,
    0x7F, 0x95, 0x27, 0x1A, 0xCC, 0x7B, 0xAC, 0x29, 0xD4, 0xB7, 0x41, 0x9B, 0x0A, 0x99, 0x60, 0x02,
    0xA6, 0xE9, 0xA7, 0xC2, 0x78, 0xF5, 0xC0, 0xB8, 0xBB, 0x9D, 0x88, 0x16, 0x71, 0x64, 0x81, 0x07,
    0x2C, 0x5B, 0x33, 0xE5, 0x1C, 0xFA, 0x00, 0x02, 0xD7, 0x49, 0x2F, 0x13, 0xB1, 0xC1, 0x7F, 0xBF
};
 
const uint8_t live_devkit_public[] = {
    0x00, 0x00, 0x00, 0x20, // cqw
    0x00, 0x00, 0x00, 0x03, // dwPubExp
    0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // qwReserved
    // aqwM
    0x92, 0x12, 0xCD, 0x87, 0x27, 0xF1, 0x29, 0xA5, 0xB3, 0xBA, 0xD1, 0xDD, 0x2F, 0x59, 0xA8, 0x3F,
    0x65, 0x30, 0x62, 0xB2, 0xD1, 0xB4, 0x2D, 0x7E, 0x2F, 0x5B, 0x2F, 0x7F, 0x63, 0x89, 0xA9, 0x94,
    0xC1, 0x0A, 0x46, 0x16, 0x66, 0x54, 0x43, 0xAC, 0x78, 0x07, 0x38, 0xB2, 0xF9, 0xEB, 0x64, 0x18,
    0xC4, 0x26, 0xC8, 0x39, 0x61, 0x3C, 0xEC, 0xE5, 0x62, 0xDD, 0x92, 0x59, 0x42, 0x6D, 0xE9, 0x3E,
    0xCA, 0xAE, 0x81, 0x04, 0x19, 0x29, 0xF0, 0x04, 0x6D, 0xC5, 0x86, 0xAE, 0x48, 0x4C, 0xF9, 0x19,
    0xFB, 0x8A, 0x31, 0x54, 0x32, 0xCC, 0x52, 0x88, 0x25, 0x9E, 0x98, 0x42, 0x43, 0x3C, 0xB2, 0x63,
    0x07, 0xCA, 0x71, 0xA3, 0x97, 0x3E, 0xD3, 0x8D, 0x4E, 0x44, 0xA9, 0x56, 0xA3, 0xD2, 0xFD, 0x40,
    0xB8, 0x1A, 0x5E, 0xEE, 0x23, 0x92, 0x7D, 0xB4, 0xA8, 0xF7, 0x04, 0xC7, 0x02, 0xF9, 0xF3, 0x95,
    0x77, 0x82, 0xE2, 0x5C, 0x30, 0x90, 0x24, 0xCE, 0x7D, 0x05, 0x19, 0x4F, 0xBE, 0x39, 0x99, 0x77,
    0x82, 0xEF, 0x91, 0x74, 0x68, 0xB0, 0x55, 0x5D, 0xA7, 0x4D, 0xFA, 0x7B, 0x91, 0x11, 0xF5, 0xA9,
    0xDD, 0xA1, 0x3F, 0x87, 0x21, 0x76, 0xB0, 0xB1, 0x7D, 0xD6, 0x9D, 0x90, 0xBD, 0xDC, 0xD1, 0x56,
    0x5C, 0xA7, 0xEE, 0x6F, 0x80, 0xDA, 0x78, 0x33, 0x63, 0xD2, 0x61, 0x5B, 0x31, 0xBA, 0xDD, 0xB4,
    0x8E, 0xFC, 0x76, 0x2A, 0x97, 0xC5, 0xE8, 0x00, 0x6E, 0x3C, 0x7A, 0xFF, 0x18, 0xB3, 0xAA, 0xFE,
    0x78, 0xE8, 0x98, 0xA8, 0xEF, 0xA8, 0x63, 0x6E, 0x96, 0x02, 0xF7, 0x82, 0xCC, 0x49, 0xBC, 0xF7,
    0x77, 0x58, 0xD6, 0x84, 0x4E, 0x58, 0x88, 0xC6, 0x1F, 0x3F, 0x35, 0xD5, 0x30, 0xA1, 0x4A, 0xC0,
    0xDD, 0xA0, 0xF6, 0xE6, 0x06, 0x8E, 0x1C, 0x84, 0xB5, 0xFF, 0x62, 0xEB, 0xEC, 0x7B, 0xC3, 0x3D
};
 
const int num_pubkeys = 4;
const uint8_t* pubkey_bytes[num_pubkeys] = {
  pirs_retail_public,
  pirs_devkit_public,
  live_retail_public,
  live_devkit_public
};
const char* pubkey_names[num_pubkeys] = {
  "retail",
  "devkit",
  "retail-LIVE",
  "devkit-LIVE"
};
 
const uint8_t pirs_devkit_private[] = {
    0x00, 0x00, 0x00, 0x20, // cqw
    0x00, 0x00, 0x00, 0x03, // dwPubExp
    0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // qwReserved
    // aqwM
    0xC9, 0x1C, 0x35, 0x77, 0xC8, 0xBF, 0xA0, 0x6B, 0x64, 0x2F, 0x4E, 0x6C, 0x73, 0x99, 0xAC, 0xE5,
    0x84, 0xE7, 0xAB, 0x2E, 0xE4, 0xDB, 0xAE, 0x1E, 0x3E, 0x06, 0x70, 0x62, 0x4A, 0xA2, 0xAD, 0x99,
    0xE1, 0x76, 0x70, 0x61, 0xE6, 0xBE, 0x93, 0x27, 0x6D, 0x5D, 0x97, 0xFD, 0x73, 0x30, 0x76, 0x3A,
    0xB8, 0x70, 0x5C, 0xC0, 0xBE, 0x8F, 0x1B, 0x3D, 0x4C, 0x5D, 0x85, 0x65, 0x98, 0x8C, 0x4C, 0x6B,
    0xCC, 0xBE, 0xD0, 0xC5, 0xA7, 0x43, 0xAA, 0x6C, 0x56, 0x91, 0x0F, 0xF8, 0xE8, 0xBD, 0x90, 0x4D,
    0xB8, 0xD9, 0xA3, 0xF1, 0x3B, 0x6E, 0x71, 0xDB, 0xB0, 0xE0, 0xF5, 0x1A, 0x8E, 0x80, 0x39, 0xC2,
    0x4E, 0x3A, 0x81, 0x42, 0xC5, 0x6E, 0xB9, 0x49, 0x44, 0xF4, 0x8D, 0xC5, 0x84, 0x51, 0xC8, 0x1B,
    0x7D, 0xBC, 0x45, 0x59, 0xD0, 0xE3, 0xF2, 0x97, 0xEF, 0xA0, 0x39, 0xEA, 0x1C, 0xF9, 0x48, 0x66,
    0x66, 0x4E, 0x8B, 0xD0, 0x22, 0xAB, 0xDB, 0x90, 0x1E, 0xBC, 0xD8, 0x3D, 0x91, 0xA7, 0x89, 0x7C,
    0x72, 0x07, 0xDA, 0x63, 0xAA, 0xF3, 0x3E, 0xED, 0xD5, 0x87, 0x66, 0x7B, 0xF2, 0x28, 0x9C, 0xB3,
    0x40, 0x54, 0x22, 0x65, 0x44, 0x10, 0x2A, 0xD2, 0xB0, 0x48, 0x4C, 0xF9, 0x9E, 0x6F, 0xA4, 0x76,
    0x9F, 0x18, 0xD0, 0x4D, 0xAD, 0xA5, 0x6E, 0xFC, 0x9E, 0xC2, 0xA4, 0xCF, 0xB3, 0xEC, 0xC8, 0x05,
    0xED, 0x8C, 0x08, 0xED, 0x25, 0x13, 0xCC, 0xBB, 0x16, 0x60, 0x1A, 0x8A, 0xC7, 0x4B, 0x68, 0x93,
    0x7F, 0x95, 0x27, 0x1A, 0xCC, 0x7B, 0xAC, 0x29, 0xD4, 0xB7, 0x41, 0x9B, 0x0A, 0x99, 0x60, 0x02,
    0xA6, 0xE9, 0xA7, 0xC2, 0x78, 0xF5, 0xC0, 0xB8, 0xBB, 0x9D, 0x88, 0x16, 0x71, 0x64, 0x81, 0x07,
    0x2C, 0x5B, 0x33, 0xE5, 0x1C, 0xFA, 0x00, 0x02, 0xD7, 0x49, 0x2F, 0x13, 0xB1, 0xC1, 0x7F, 0xBF,
    // aqwP
    0x4D, 0x4D, 0x16, 0x27, 0x77, 0x9E, 0x3C, 0x97, 0x2D, 0xBE, 0x03, 0x13, 0xCB, 0x82, 0x9E, 0x5D,
    0x9F, 0xA8, 0x1C, 0x79, 0x6E, 0x40, 0x9F, 0x29, 0x76, 0x46, 0xA9, 0xB4, 0xC9, 0xFA, 0x6F, 0xA4,
    0x5B, 0xCD, 0x1C, 0x49, 0x7B, 0x4E, 0xCC, 0xB3, 0xFF, 0xC8, 0x1F, 0x08, 0x03, 0x34, 0x2D, 0x90,
    0x7F, 0x39, 0x41, 0xA3, 0x47, 0x64, 0x95, 0xD1, 0x18, 0xB7, 0x7C, 0x8D, 0x52, 0x04, 0x0F, 0xDF,
    0xB4, 0x03, 0xB0, 0x24, 0x65, 0xFA, 0x7F, 0xF3, 0xEA, 0x48, 0xB3, 0xA5, 0xCB, 0x30, 0xE9, 0x9F,
    0x72, 0x73, 0xC4, 0x3A, 0x7A, 0xC8, 0xAA, 0x05, 0x48, 0x1D, 0xD1, 0x73, 0xEF, 0xFF, 0xF3, 0xE8,
    0xFD, 0x50, 0x4E, 0xC5, 0xE8, 0x6E, 0x74, 0x55, 0x08, 0x0B, 0xE2, 0xE8, 0x11, 0x0A, 0x4B, 0x01,
    0xE0, 0x64, 0xCE, 0x0D, 0x6C, 0x4B, 0x49, 0xA0, 0xF7, 0x5B, 0x98, 0x10, 0x62, 0x49, 0x5F, 0x19,
    // aqwQ
    0xEF, 0x3A, 0xAF, 0xB9, 0x5D, 0x35, 0xB1, 0x4D, 0xDB, 0x82, 0xE4, 0x77, 0x4D, 0xCA, 0x8A, 0x34,
    0x4B, 0x1D, 0xCF, 0xCF, 0x32, 0xCE, 0x0D, 0x9D, 0x50, 0x3A, 0xA0, 0x68, 0x23, 0xD8, 0x80, 0x72,
    0xE3, 0xCD, 0xB6, 0xB6, 0xE1, 0xD9, 0x2A, 0x26, 0xCC, 0x3C, 0xA7, 0x17, 0x9E, 0x05, 0xD4, 0xAA,
    0x6E, 0xD5, 0x61, 0x6A, 0x64, 0x68, 0x59, 0x80, 0xD2, 0x1C, 0xD0, 0x8C, 0xD8, 0xD4, 0x92, 0xBD,
    0x84, 0xAD, 0xE7, 0x54, 0x92, 0x13, 0x7A, 0x9E, 0x92, 0x8A, 0x8C, 0x6E, 0xF6, 0x5D, 0x29, 0xE4,
    0xB9, 0xEB, 0x51, 0x34, 0xB6, 0xE5, 0x0B, 0x67, 0x41, 0x43, 0x45, 0x45, 0xB8, 0x5E, 0x25, 0x73,
    0x6D, 0xF3, 0x11, 0x12, 0x79, 0xCB, 0xE6, 0x9F, 0x4F, 0xA1, 0x91, 0xCA, 0x3E, 0x9F, 0x2D, 0xDF,
    0x34, 0x2F, 0x23, 0x32, 0x86, 0xB4, 0x3E, 0x10, 0xDE, 0xCE, 0xBB, 0xD8, 0x86, 0x85, 0x0E, 0xF0,
    // aqwDP
    0xDE, 0x33, 0x64, 0x1A, 0x4F, 0xBE, 0xD3, 0x0F, 0x1E, 0x7E, 0xAC, 0xB7, 0xDD, 0x01, 0xBE, 0xE8,
    0xBF, 0xC5, 0x68, 0x50, 0xF4, 0x2B, 0x14, 0xC6, 0xA4, 0x2F, 0x1B, 0xCD, 0xDB, 0xFC, 0x4A, 0x6D,
    0x92, 0x88, 0xBD, 0x86, 0x52, 0x34, 0x88, 0x77, 0xFF, 0xDA, 0xBF, 0x5A, 0xAC, 0xCD, 0x73, 0xB5,
    0x54, 0xD0, 0xD6, 0x6C, 0xDA, 0x43, 0x0E, 0x8B, 0x65, 0xCF, 0xA8, 0x5E, 0x36, 0xAD, 0x5F, 0xEA,
    0xCD, 0x57, 0xCA, 0xC2, 0xEE, 0xA6, 0xFF, 0xF7, 0xF1, 0x85, 0xCD, 0x19, 0x32, 0x20, 0x9B, 0xBF,
    0x4C, 0x4D, 0x2D, 0x7C, 0x51, 0xDB, 0x1C, 0x03, 0xDA, 0xBE, 0x8B, 0xA2, 0x9F, 0xFF, 0xF7, 0xF0,
    0xFE, 0x35, 0x89, 0xD9, 0x45, 0x9E, 0xF8, 0x38, 0xB0, 0x07, 0xEC, 0x9A, 0xB6, 0x06, 0xDC, 0xAB,
    0xEA, 0xED, 0xDE, 0xB3, 0x9D, 0x87, 0x86, 0x6A, 0xA4, 0xE7, 0xBA, 0xB5, 0x96, 0xDB, 0x94, 0xBB,
    // aqwDQ
    0x4A, 0x27, 0x1F, 0xD0, 0xE8, 0xCE, 0x76, 0x33, 0x92, 0x57, 0x42, 0xFA, 0x33, 0xDC, 0x5C, 0x23,
    0xDC, 0xBE, 0x8A, 0x8A, 0x21, 0xDE, 0xB3, 0xBE, 0x35, 0x7C, 0x6A, 0xF0, 0x17, 0xE5, 0xAA, 0xF6,
    0xED, 0x33, 0xCF, 0x24, 0x96, 0x90, 0xC6, 0xC4, 0xDD, 0x7D, 0xC4, 0xBA, 0x69, 0x59, 0x38, 0x71,
    0x49, 0xE3, 0x96, 0x46, 0xED, 0x9A, 0xE6, 0x55, 0x36, 0xBD, 0xE0, 0x5D, 0xE5, 0xE3, 0x0C, 0x7E,
    0x03, 0x1E, 0x9A, 0x38, 0x61, 0x62, 0x51, 0xBF, 0xB7, 0x07, 0x08, 0x49, 0xF9, 0x93, 0x71, 0x43,
    0x26, 0x9C, 0xE0, 0xCD, 0xCF, 0x43, 0x5C, 0xEF, 0x2B, 0x82, 0x2E, 0x2E, 0x7A, 0xE9, 0x6E, 0x4D,
    0xF3, 0xF7, 0x60, 0xB6, 0xFB, 0xDD, 0x44, 0x6A, 0x8A, 0x6B, 0xB6, 0x86, 0xD4, 0x6A, 0x1E, 0x94,
    0x78, 0x1F, 0x6C, 0xCC, 0x59, 0xCD, 0x7E, 0xB5, 0x94, 0x89, 0xD2, 0x90, 0x59, 0xAE, 0x09, 0xF5,
    // aqwCR
    0xC9, 0xA2, 0xB3, 0xAE, 0xDE, 0x77, 0x71, 0xFA, 0x39, 0xF7, 0x89, 0x93, 0xBB, 0x6A, 0xA9, 0x3C,
    0x8D, 0x79, 0xE3, 0x3D, 0x35, 0x06, 0x0F, 0x76, 0x2D, 0xA5, 0x8B, 0xCC, 0x4D, 0xAF, 0xDF, 0xFC,
    0xD3, 0x03, 0xBB, 0xA4, 0xA0, 0x51, 0x80, 0x58, 0x3C, 0xCF, 0x62, 0xE3, 0x09, 0xBC, 0x63, 0x9E,
    0xB3, 0xEF, 0x29, 0x41, 0x55, 0x23, 0x0B, 0x2A, 0x2A, 0x31, 0xB8, 0xDA, 0xD6, 0x13, 0xE4, 0xBE,
    0xAB, 0xCA, 0x58, 0xBF, 0x24, 0xB5, 0x60, 0xD2, 0xB7, 0x9E, 0x00, 0x30, 0x15, 0xFD, 0xFA, 0x05,
    0xA7, 0x5C, 0x3B, 0x44, 0x78, 0xBA, 0x5B, 0x91, 0x2C, 0xB4, 0x16, 0x16, 0x3A, 0x6E, 0xBA, 0x40,
    0x15, 0xA2, 0xB3, 0x61, 0x05, 0xCB, 0xC6, 0xC0, 0x86, 0x92, 0xD9, 0x57, 0x34, 0x92, 0x15, 0x86,
    0x79, 0x21, 0xBB, 0x43, 0xE6, 0xFC, 0xA4, 0xC8, 0x75, 0x8D, 0x75, 0x1B, 0x93, 0x53, 0xDD, 0xF4
};
 
const uint8_t live_devkit_private[] = {
    0x00, 0x00, 0x00, 0x20, // cqw
    0x00, 0x00, 0x00, 0x03, // dwPubExp
    0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // qwReserved
    // aqwM
    0x92, 0x12, 0xCD, 0x87, 0x27, 0xF1, 0x29, 0xA5, 0xB3, 0xBA, 0xD1, 0xDD, 0x2F, 0x59, 0xA8, 0x3F,
    0x65, 0x30, 0x62, 0xB2, 0xD1, 0xB4, 0x2D, 0x7E, 0x2F, 0x5B, 0x2F, 0x7F, 0x63, 0x89, 0xA9, 0x94,
    0xC1, 0x0A, 0x46, 0x16, 0x66, 0x54, 0x43, 0xAC, 0x78, 0x07, 0x38, 0xB2, 0xF9, 0xEB, 0x64, 0x18,
    0xC4, 0x26, 0xC8, 0x39, 0x61, 0x3C, 0xEC, 0xE5, 0x62, 0xDD, 0x92, 0x59, 0x42, 0x6D, 0xE9, 0x3E,
    0xCA, 0xAE, 0x81, 0x04, 0x19, 0x29, 0xF0, 0x04, 0x6D, 0xC5, 0x86, 0xAE, 0x48, 0x4C, 0xF9, 0x19,
    0xFB, 0x8A, 0x31, 0x54, 0x32, 0xCC, 0x52, 0x88, 0x25, 0x9E, 0x98, 0x42, 0x43, 0x3C, 0xB2, 0x63,
    0x07, 0xCA, 0x71, 0xA3, 0x97, 0x3E, 0xD3, 0x8D, 0x4E, 0x44, 0xA9, 0x56, 0xA3, 0xD2, 0xFD, 0x40,
    0xB8, 0x1A, 0x5E, 0xEE, 0x23, 0x92, 0x7D, 0xB4, 0xA8, 0xF7, 0x04, 0xC7, 0x02, 0xF9, 0xF3, 0x95,
    0x77, 0x82, 0xE2, 0x5C, 0x30, 0x90, 0x24, 0xCE, 0x7D, 0x05, 0x19, 0x4F, 0xBE, 0x39, 0x99, 0x77,
    0x82, 0xEF, 0x91, 0x74, 0x68, 0xB0, 0x55, 0x5D, 0xA7, 0x4D, 0xFA, 0x7B, 0x91, 0x11, 0xF5, 0xA9,
    0xDD, 0xA1, 0x3F, 0x87, 0x21, 0x76, 0xB0, 0xB1, 0x7D, 0xD6, 0x9D, 0x90, 0xBD, 0xDC, 0xD1, 0x56,
    0x5C, 0xA7, 0xEE, 0x6F, 0x80, 0xDA, 0x78, 0x33, 0x63, 0xD2, 0x61, 0x5B, 0x31, 0xBA, 0xDD, 0xB4,
    0x8E, 0xFC, 0x76, 0x2A, 0x97, 0xC5, 0xE8, 0x00, 0x6E, 0x3C, 0x7A, 0xFF, 0x18, 0xB3, 0xAA, 0xFE,
    0x78, 0xE8, 0x98, 0xA8, 0xEF, 0xA8, 0x63, 0x6E, 0x96, 0x02, 0xF7, 0x82, 0xCC, 0x49, 0xBC, 0xF7,
    0x77, 0x58, 0xD6, 0x84, 0x4E, 0x58, 0x88, 0xC6, 0x1F, 0x3F, 0x35, 0xD5, 0x30, 0xA1, 0x4A, 0xC0,
    0xDD, 0xA0, 0xF6, 0xE6, 0x06, 0x8E, 0x1C, 0x84, 0xB5, 0xFF, 0x62, 0xEB, 0xEC, 0x7B, 0xC3, 0x3D,
    // aqwP
    0x5B, 0x0E, 0x3F, 0xDF, 0x19, 0x1B, 0xED, 0x7B, 0xAE, 0x7E, 0x04, 0x9B, 0x5A, 0x0B, 0xBA, 0xE2,
    0x03, 0xAC, 0x6E, 0x20, 0xDB, 0x8E, 0x4F, 0xE7, 0xBC, 0xEC, 0xDD, 0x18, 0x23, 0x54, 0x83, 0x49,
    0x47, 0xDF, 0x1E, 0xA7, 0x7D, 0x39, 0x2F, 0x3B, 0xA6, 0x51, 0x11, 0x6A, 0x2B, 0xBF, 0x84, 0xCA,
    0xCD, 0x0C, 0xF6, 0x1E, 0x2B, 0xCA, 0xF4, 0x2D, 0x26, 0x53, 0x0E, 0x45, 0x84, 0x5C, 0xA8, 0x6C,
    0x4F, 0x2F, 0x67, 0x9B, 0xB9, 0x01, 0x85, 0xB0, 0x77, 0x66, 0xFF, 0xCC, 0xEA, 0x1E, 0x9D, 0x83,
    0x0E, 0xFF, 0xA8, 0x1A, 0x07, 0x22, 0x9F, 0x27, 0x9E, 0x91, 0x81, 0xD2, 0x33, 0x06, 0x3A, 0x3D,
    0x76, 0x9A, 0x1B, 0xD3, 0x0D, 0xE0, 0x0F, 0x09, 0x4A, 0xFC, 0x54, 0x5F, 0x7C, 0x6C, 0x04, 0x17,
    0xA9, 0x9C, 0xBB, 0x79, 0x4E, 0x38, 0xA1, 0x9C, 0xEA, 0xB7, 0x17, 0x6D, 0x35, 0x20, 0xD7, 0xD6,
    // aqwQ
    0x8B, 0xEB, 0x8D, 0xED, 0x61, 0xB3, 0x4B, 0x5F, 0x50, 0x05, 0xC7, 0xA5, 0xB6, 0x4F, 0xF7, 0xCF,
    0x9E, 0xA6, 0xEA, 0xF0, 0xB7, 0x6D, 0x00, 0xAD, 0xBC, 0xFD, 0x3F, 0x19, 0xAE, 0xF2, 0xA8, 0xC5,
    0xFA, 0xCF, 0x3A, 0x18, 0x8D, 0x2F, 0xF1, 0xA9, 0xB4, 0xFD, 0xAB, 0xF2, 0x47, 0x04, 0xE0, 0x25,
    0x4A, 0x0D, 0x65, 0xB0, 0xA6, 0x9B, 0x0D, 0x9B, 0xFD, 0x17, 0xE6, 0xCE, 0x29, 0xAA, 0x2D, 0xC0,
    0xF8, 0xC7, 0xD7, 0xE9, 0x38, 0x87, 0xCC, 0xDF, 0x39, 0xEC, 0xC8, 0x8E, 0xE6, 0xCB, 0xBE, 0x4B,
    0x38, 0xD9, 0x06, 0xB6, 0xB2, 0x03, 0x4C, 0xF1, 0xC8, 0xFE, 0x5E, 0x51, 0xAC, 0x0D, 0xEE, 0x47,
    0xFB, 0x89, 0x26, 0xCD, 0xB0, 0xD2, 0x5E, 0xE7, 0x16, 0x9A, 0xEC, 0xFD, 0xCB, 0xAE, 0x23, 0xD2,
    0xF3, 0x50, 0xE1, 0x7B, 0x8E, 0xFE, 0x04, 0x4C, 0xC6, 0x80, 0x74, 0xFB, 0xB5, 0xC5, 0x4B, 0x8E,
    // aqwDP
    0x3C, 0xB4, 0x2A, 0x94, 0xBB, 0x67, 0xF3, 0xA7, 0x74, 0x54, 0x03, 0x12, 0x3C, 0x07, 0xD1, 0xEC,
    0x57, 0xC8, 0x49, 0x6B, 0x3D, 0x09, 0x8A, 0x9A, 0x7D, 0xF3, 0x3E, 0x10, 0x17, 0x8D, 0xAC, 0xDB,
    0xDA, 0x94, 0xBF, 0x1A, 0x53, 0x7B, 0x74, 0xD2, 0xC4, 0x36, 0x0B, 0x9C, 0x1D, 0x2A, 0x58, 0x86,
    0x33, 0x5D, 0xF9, 0x69, 0x72, 0x87, 0x4D, 0x73, 0x6E, 0xE2, 0x09, 0x83, 0xAD, 0x93, 0x1A, 0xF3,
    0x8A, 0x1F, 0x9A, 0x67, 0xD0, 0xAB, 0xAE, 0x75, 0x4F, 0x99, 0xFF, 0xDD, 0xF1, 0x69, 0xBE, 0x57,
    0x09, 0xFF, 0xC5, 0x66, 0xAF, 0x6C, 0x6A, 0x1A, 0x14, 0x61, 0x01, 0x36, 0xCC, 0xAE, 0xD1, 0x7E,
    0xF9, 0xBC, 0x12, 0x8C, 0xB3, 0xEA, 0xB4, 0xB1, 0x87, 0x52, 0xE2, 0xEA, 0x52, 0xF2, 0xAD, 0x64,
    0x1B, 0xBD, 0xD2, 0x50, 0xDE, 0xD0, 0x6B, 0xBD, 0x9C, 0x7A, 0x0F, 0x9E, 0x23, 0x6B, 0x3A, 0x8F,
    // aqwDQ
    0x07, 0xF2, 0x5E, 0x9E, 0x41, 0x22, 0x32, 0x3F, 0xE0, 0x03, 0xDA, 0x6E, 0x79, 0x8A, 0xA5, 0x35,
    0x14, 0x6F, 0x47, 0x4B, 0x24, 0xF3, 0x55, 0xC8, 0xD3, 0x53, 0x7F, 0x66, 0x74, 0xA1, 0xC5, 0xD9,
    0xFC, 0x8A, 0x26, 0xBB, 0x08, 0xCA, 0xA1, 0x1B, 0xCD, 0xFE, 0x72, 0xA1, 0x84, 0xAD, 0xEA, 0xC3,
    0xDC, 0x08, 0xEE, 0x75, 0xC4, 0x67, 0x5E, 0x67, 0xFE, 0x0F, 0xEF, 0x34, 0x1B, 0xC6, 0xC9, 0x2A,
    0x50, 0x85, 0x3A, 0x9B, 0x7B, 0x05, 0x33, 0x3F, 0x26, 0x9D, 0xDB, 0x09, 0xEF, 0x32, 0x7E, 0xDD,
    0xD0, 0x90, 0xAF, 0x24, 0x76, 0xAC, 0xDD, 0xF6, 0x85, 0xFE, 0xE9, 0x8B, 0xC8, 0x09, 0x49, 0x84,
    0xFD, 0x06, 0x19, 0xDE, 0x75, 0xE1, 0x94, 0x9A, 0x64, 0x67, 0x48, 0xA9, 0x32, 0x74, 0x17, 0xE1,
    0x4C, 0xE0, 0x96, 0x52, 0x5F, 0x54, 0x02, 0xDD, 0x84, 0x55, 0xA3, 0x52, 0x79, 0x2E, 0x32, 0x5F,
    // aqwCR
    0xA5, 0xA5, 0xC7, 0x37, 0x92, 0xD0, 0xD8, 0x8D, 0x2B, 0xD0, 0x3C, 0x4E, 0x27, 0x8F, 0x47, 0x24,
    0x6E, 0x31, 0x2C, 0xFE, 0x4C, 0xD8, 0xFD, 0x9E, 0xA3, 0xED, 0xE4, 0xC4, 0x41, 0xD2, 0x33, 0x8E,
    0x5E, 0x83, 0xAD, 0x47, 0xB5, 0xFF, 0x09, 0x35, 0x58, 0x61, 0xB8, 0xDC, 0x33, 0xD3, 0x4E, 0x15,
    0x7A, 0x8E, 0x66, 0x1C, 0x21, 0x10, 0xA8, 0x66, 0x61, 0xC2, 0xDA, 0x82, 0x0B, 0xA5, 0xFB, 0xF8,
    0x3B, 0x28, 0x1B, 0xF8, 0xF5, 0x33, 0xA9, 0xA8, 0xE0, 0xA7, 0xE1, 0x86, 0x04, 0xD9, 0xD5, 0xEF,
    0xEA, 0xCB, 0x13, 0xC9, 0x1A, 0x78, 0xC7, 0x92, 0x3D, 0xD5, 0x2B, 0xBB, 0xB4, 0xCC, 0xE8, 0x15,
    0x72, 0xA3, 0x63, 0xCA, 0x4C, 0xBC, 0x54, 0x3D, 0x2B, 0x12, 0xDD, 0xB5, 0x05, 0x0C, 0x7F, 0x49,
    0x0A, 0x96, 0x1A, 0xC4, 0x78, 0x5C, 0x83, 0x0A, 0x5B, 0xFE, 0x79, 0xF4, 0x19, 0x29, 0xA9, 0x7F
};
</pre>
 
= Xboner Key Goodness =
 
== GreenGamesPublicKey.rsa ==
 
<pre>
52 53 41 31 00 10 00 00 03 00 00 00 00 02 00 00
00 00 00 00 00 00 00 00 01 00 01 B4 6D 37 A9 8E
57 1A D5 A9 DB B8 99 00 A3 4B BE 5A 43 50 96 D7
0B 6C 80 65 C8 D7 05 4C 63 95 8C 42 95 40 A3 16
FA D7 59 FE F6 E8 A6 B4 2B 52 BE DF 9B 15 19 8C
17 9A B5 79 CC 76 6C 9C 5B B7 35 F7 52 72 0F 46
C9 73 6D C3 6B 82 7D 91 9E 6D 74 19 2C 7C 19 21
53 F1 E7 89 E0 D9 9B C5 C0 05 47 26 0D 70 FC 92
3D 3F F1 D5 26 18 EC 2D 4C 42 19 81 33 DA 67 C2
0D FD F0 6A 72 03 53 13 80 07 B4 A2 24 E4 3A CF
E5 C4 52 BB 69 3F 37 B3 C3 1D 64 B4 8D 95 16 3B
A6 DB DD 59 6D 00 D2 58 09 E6 9D C2 3D 98 39 CD
49 9A 63 8C 85 83 F8 96 58 C3 43 75 DF F5 AE 00
E1 B4 18 DF DE B6 1F 5E 35 F3 60 ED 3A 58 5E F8
0A BA 13 A5 1E AD FA 5E 85 27 B7 A5 69 2C B2 71
4B F0 3B C7 FE 12 88 EA 87 A0 12 20 6B A7 63 63
FB C1 B5 6F 8E B3 61 9B 3C 85 E5 BD E5 65 33 05
65 98 AF E8 77 1E 55 FA 05 EC 03 61 2C 5F 67 73
0E 37 28 D6 DC 05 38 76 E0 34 1D A8 6E 9B A6 A4
96 80 21 16 2A AC BE 48 B0 6B D3 0A 43 E0 E4 DA
C3 BB E8 16 74 D1 1E 2C 4C EE CB B8 B3 37 1F F7
A2 31 C7 A2 10 6C 36 AC 66 83 1F E8 44 A2 53 DE
B3 63 6A 2C 06 36 0F CF 57 F4 F3 4D 0F 30 0C 5C
10 11 0F 9F 3F 4E FD F7 C0 96 9E E6 34 86 2A 33
C9 27 8E FC BD 34 A7 26 20 A1 AD F8 14 65 AC D2
8A 22 F1 5D D2 30 A0 C6 7D 58 5E 92 58 66 F2 21
CE E8 20 CA BB E0 96 C6 02 55 80 5F 1C 11 95 67
BB D7 3B F7 5E EE 21 56 23 07 C4 4D 05 F7 5D 90
2A D9 B5 EE 07 F9 BB 4F E7 68 C1 DA A7 52 0A 43
BD B0 91 E0 62 FC 1C E1 8B 58 50 B1 5F 22 66 BD
F9 D1 C3 0E C8 C5 17 E0 87 0B E4 B3 BE 2D DF F8
C5 30 6B 81 D8 95 87 91 3E D9 FD 51 0C D4 25 A6
50 E6 DC 17 3D 2E 4D F0 47 A7 CA 88 BA EB 43 5E
D1 EB 5D DD 66 AC A4 BE 5B E7 EF
</pre>
 
== GreenXvdPublicKey.rsa ==
 
<pre>
52 53 41 31 00 10 00 00 03 00 00 00 00 02 00 00
00 00 00 00 00 00 00 00 01 00 01 AC 00 3E CF 18
9B 18 07 A3 71 D2 39 45 4B 2F 51 10 3A 63 E7 CE
2F 4C DC 3F 45 6E 96 E1 60 7E 10 7A EA 68 A9 36
ED E8 85 7B 54 11 91 F1 FF 69 D0 E7 65 78 76 8C
71 3F D5 FD 1A A9 6C 5F 07 9B EC 12 20 50 32 8A
79 73 35 F4 A9 C9 B6 DB 86 C0 C0 AD 3F 7F B8 25
CA AE 22 C6 71 F7 04 13 4D 89 88 A5 AF B9 3F 87
AF 4C EB 63 55 9F A7 CD 45 1D 42 4C 07 D6 35 59
4A E9 DE 59 BF 62 4D 56 E5 9C 1E FF A6 A2 67 83
63 99 37 01 3E 92 A8 BA 99 77 C0 8F 67 16 4D 67
B1 3D 55 31 47 BC 19 6F 0A E1 02 A7 23 33 8C 5F
1F 33 E9 84 71 7B 66 E7 F1 A3 9D 61 66 B1 ED C3
9A C7 64 E6 0A D8 A4 81 AA 8B C9 62 13 27 10 78
98 D6 89 93 33 CA A5 25 2D 32 C4 5B 29 3B 75 BD
ED 5F 31 73 5B C3 14 B4 6E 68 27 C2 94 81 C0 5D
73 7D D4 6E F3 56 AE 9A 81 0F 95 D0 3A 1E F4 31
72 B7 5D 8E 94 8F 67 95 54 57 65 65 4B CA 07 A2
8F 4F 01 0C 7D 9D C0 80 96 0D 47 DD 7D 0A 6E A0
36 D5 DD B8 96 D1 47 E8 F9 AB 17 6D 0E 63 3A 33
A1 84 DE 65 6A C5 EB 27 ED D3 04 23 45 BC 68 BC
CB DA 28 A0 6E 10 B4 58 72 1F 77 07 C2 D4 D3 AC
5C 9B 35 AD E6 1F 5D D0 8D AA C6 10 26 72 5C D7
13 AE 42 C0 4E 82 C0 8D 6C DB 44 65 BA C5 CE 28
EB 87 C4 BF 00 1E 06 3A A5 55 28 8A 08 EC D6 C6
BF 28 6A BA 48 4C DB 16 C0 9E B5 26 4A 41 CA 82
BC 6B 06 1D E9 C8 07 96 B8 E9 D9 06 52 62 2E 5D
9C A4 62 D6 E7 78 F8 2C 8C 6D 59 BF 08 A5 6A 1F
45 72 9A AD CA 84 00 C5 66 E9 1A 8C FE 09 71 5F
1B 10 5C 86 77 07 71 82 07 2B 42 0D 13 E3 BC 01
FC C6 27 02 7D 73 C5 7A 0C 40 C5 12 5B 92 16 60
4D 46 7A E6 7D 56 A6 F4 9E CB 7F 71 2C 29 9E 31
56 1D A8 4C C8 77 2F CF DF 43 C3 22 96 9F 39 2B
48 BE 09 6D BF A3 90 C9 A1 DE 51
</pre>
 
== RedXvdPrivateKey.rsa ==
 
<pre>
52 53 41 33 00 10 00 00 03 00 00 00 00 02 00 00
00 01 00 00 00 01 00 00 01 00 01 C6 6B 09 E2 B5
5E 84 95 8B 9C 63 D2 C0 C1 E8 15 A7 16 3E EF C2
15 63 88 D9 DB 56 09 26 93 F0 AA D0 7C E1 65 13
B3 80 C9 DD 71 FE 97 70 D0 25 5F B9 DE 15 CB 32
27 CC DC 06 32 2B D9 21 FA 7D 38 FC B9 B5 43 DF
70 62 11 CE C8 BD 8C 6D B9 E1 71 10 45 C6 9A CF
01 29 31 56 09 89 7B B7 93 6A C2 2A 74 E9 A3 06
CE EF 9C 54 69 D1 69 08 B0 62 79 DB 86 DC 43 81
43 C9 9B 63 69 A7 35 B5 08 B3 EF 02 47 85 80 31
FD E8 A1 D7 0C C4 48 E5 7A AD 2F 32 23 0E E1 94
24 42 76 C8 A3 E4 95 43 88 B4 8F 0F 31 6F C9 17
75 B2 60 2E C3 90 14 B8 9B 4B FA D3 16 CD A3 ED
49 20 0A 8D 79 DC A7 FA 61 C9 8B AF D1 5B F8 95
BD CB B7 D8 FA E5 CD FC 92 C6 06 4C 1F 95 15 1E
0C 41 74 1C 38 1C 88 39 AA F1 BD CB 84 7F 4B 9D
FC 3A 85 F7 E4 C7 FD 0D 5C 49 7B C3 11 50 38 DA
65 D6 A4 72 E7 04 82 FB BA 87 11 52 56 04 15 B5
70 94 F7 10 CB A9 23 41 E0 5D 59 7E 5F 14 D9 9B
D9 95 AE 54 59 BD F2 28 14 2A FA 5A E8 FB 2A 83
ED 7D 6A E5 B8 69 C9 A5 9C 35 86 C9 A0 18 1F 16
19 A5 D6 C0 BA D5 25 95 0D 79 D9 3D 15 10 85 74
2A AF E7 18 B1 AE CA C2 1D 24 68 B2 2A 06 40 D8
EE EA 74 45 6E 9E 0D 01 46 E4 FF 1E 6A 7A 58 E2
CE E1 54 79 0E 8B 92 14 DE 98 90 6A 3A 71 4A 79
F7 94 9D 74 39 F5 E3 0B 21 63 08 49 96 02 59 E0
69 D4 CB ED 82 0F 2C 3E D2 19 26 25 78 09 F6 9F
F7 76 73 61 81 CC 44 63 97 89 37 7A 53 9B CC BE
72 78 18 ED 23 5D 7A 9E 95 A4 20 ED E3 4D E3 3B
85 CB 76 7D E6 A6 9E C7 CA 9B 54 42 43 2C 96 32
B3 FF 2F 84 26 1C 40 14 3F 3F CA 22 BC C9 8B EF
38 9E 0D 6E F3 41 75 C1 BC 98 E1 38 4E CA 96 AD
B5 B7 BE 6D FB 0A AE 18 56 8A 6B AA 1D 4F AD 15
2B 6C 12 AB 3E 80 D6 E9 DB 0F 5B E6 48 4E 3F B4
40 76 85 AE F3 DC 26 CC A7 BE B8 6C 51 D6 87 F6
A2 DF 21 76 3C AC 3B A8 C3 F6 7B 37 E3 EF 08 A4
A5 8E 48 73 09 44 F6 CE 4D 83 74 FA A6 D8 1E 14
21 B8 45 7D 6C 84 5D D6 91 33 B5 C2 61 6F 9D D5
BB A4 AC FF 6C 82 A2 2E 13 9B 37 E1 DE 26 D5 F7
B4 59 65 EB E1 36 00 99 FE 99 05 8D 1E 48 2E 67
10 D4 00 F2 48 AE F0 D7 9F 30 69 32 29 FF 27 09
AD CA 18 65 82 AC D2 78 D3 CD 85 36 48 C3 39 C1
0C B6 AC 16 7B A0 99 D2 7A 51 CD 78 E4 11 BD 24
29 86 34 FE 9D CD A3 7E F0 2C 9A 95 D1 6D 1C 1A
E4 7A 31 36 6C 8F 20 50 56 87 90 44 29 C7 A9 93
90 84 E0 7D 71 05 D0 BE 82 7A FD AC 2F 31 C6 95
AD 3D 07 7B 3F A3 0E F1 16 12 AF 56 4D EF A1 F3
E4 ED 3B 45 2D D2 04 7B 17 65 99 74 3A 3B ED 45
71 1A FA 17 2F E3 CB FA 3F 68 BA FE E0 C1 8D A9
73 9B 1D 23 D3 BD 18 E3 0E BE 2B DC 93 BE 3B 53
89 B0 F6 C4 9D FD 0C 69 12 ED B4 26 22 B9 6A 3E
C0 C4 30 EF D4 F3 CE 55 5D 3B 97 8C 65 1F 29 41
7F AC 6F 93 1A E6 AF B3 E5 71 22 7F 7D EE B0 0F
C8 D2 A5 09 FF 6A 3E EF 0D B9 D7 37 83 97 7E D4
85 70 E0 C4 18 63 86 7B 4A B7 07 44 E8 37 3E 53
A0 3B 6F 52 7A DA 79 75 DF 8B 39 C0 01 51 59 CF
23 A0 DF D2 8F C6 19 57 61 C3 34 0E 71 42 57 00
58 AE 90 63 8F 60 86 A4 17 51 34 51 D0 67 18 CF
53 08 9D 0F B7 BA CA 75 53 7A 23 CE CF 7C 44 B4
07 AC 1C 98 97 B9 5A 7C 96 4F 48 09 89 8C 3C D5
82 ED 69 EC A1 61 91 42 75 D9 06 72 72 D7 1E 5D
AE 54 E2 4F DF 28 25 CA C2 46 44 E7 DF 61 93 94
85 BE ED D3 A5 EA 17 9C C2 21 DF B4 F5 F6 EF 1E
BD 20 94 5E 9E FB 8C 25 9E D4 B6 44 BA 9C 83 F3
B8 75 51 A4 8B C0 53 F1 E9 02 10 EE 66 B7 6C 29
22 B3 B8 33 84 E2 5A 87 C0 8B 91 D1 19 0E 94 21
A3 F6 FA E4 25 61 DD 89 2F 37 AA 56 10 E9 6F 83
AF D8 53 95 FC F9 97 22 62 ED C8 6C B3 77 34 AD
EB F6 0A 2B 0A 5B A8 8F 23 2B 1E 69 0A 5E 6A D1
74 DC D1 9C 55 90 CB 74 2D 5C 7A CA 09 97 44 05
F2 E0 50 85 8D 8E 00 9D 3E 08 4E F1 B4 BA 26 C7
48 E7 73 F8 7F 02 7E 01 56 80 B3 DD B3 85 6F 3C
FE B6 C2 35 3D 72 3C 16 4D E1 B3 63 6D 66 D5 97
A0 4A 45 64 C7 07 0E 05 D0 AC 69 2D 25 5C BF 70
5F 8E EF 2B 6B 0E 25 1E 4D 1B 42 2B 67 4C 04 26
75 DD FA F8 C7 69 15 F0 09 3D 37 10 9A 9D 2C 4B
EE F2 55 05 4A 05 9C 1D D6 B4 39 76 EB 48 F4 DD
9C F8 4A AF 1C 95 5F 39 DD 58 B8 46 44 84 3A 01
66 D0 67 9E AD E5 ED 87 53 B7 9B A6 0E 16 6D 43
FC B6 BC 7E D0 60 46 D9 4E 21 5E F9 7E 77 33 B7
3E 40 74 9D E1 4A 42 C8 F4 12 B0 D9 06 54 39 C1
87 CB 6C E6 3F 39 11 03 FB 3B 09 80 64 EF A2 90
E9 E1 3C 83 0E 83 B1 A9 A7 FE FD 92 05 3C 70 7F
BE AD 74 DE E5 D2 55 14 93 84 90 9E 84 6E 33 11
91 43 CA 5E 92 96 1D 48 56 12 18 C6 A5 83 3E B0
B1 71 0B E8 59 E8 7A 61 A4 57 BC D2 EF A2 4B 8D
61 6F 67 26 3E 1C 10 B7 CB B1 E6 65 51 D6 76 4D
2F 43 E9 74 D5 56 3E C5 42 2E 44 9B 63 28 FB 61
FB 97 35 31 D7 C6 B4 11 8D 32 97 26 A0 FE C0 AD
CE F1 2D D3 06 2E 65 B1 36 71 6A 47 05 4C 3D C0
D0 D0 7E BC 1B 72 7B 4E F8 1C 6C A3 81 5B 10 92
CA B4 80 A0 C2 10 7E 7F 6E EF 0F 3B 9D F9 27 A0
10 EA 29 72 38 2E 16 E3 DC BD 4B 67 6B 39 94 CF
6B 1E B5 ED 50 34 8A 6B 0F D2 DF 61 29 42 1F 29
A1 00 96 67 50 78 86 EE 14 82 AB 39 26 C3 6A 45
36 49 B4 93 AF 6F 35 10 E0 F7 68 71 71 3E 92 00
58 2A D2 2F 39 B9 E6 23 36 42 A1 A0 63 E1 F8 EF
A8 E7 7C 1D 61 08 71 31 FB FE 41 90 65 7F 97 E8
3F 66 00 E1 D5 C6 16 F0 A6 BF D7 C1 BB 83 5E D3
9E 36 4C A1 C8 48 39 33 54 E7 D7 9B 2C FE 84 0C
D0 26 0D CC DA CC E6 3C 57 DC 7D 83 E8 58 7F C1
05 97 02 42 0E 73 A2 47 52 05 5D 40 4E D5 F5 EB
96 66 01 7F 6F 5E 63 30 6C 3B A8 45 61 26 25 DA
1E 29 BB CD 02 F6 B0 68 04 A5 95 EB 32 BA 73 49
AC 0E CD B1 2F DC F3 2A FB 75 C7 41 84 43 41 61
A8 4C AC 14 D0 1A 33 79 F7 52 3E E8 FD 1D FA 1B
A6 C0 B9 AF 8B B0 34 42 FA E8 AF 7D D2 0F 7B D5
48 3F 9B 78 FA CE F8 1F 4B 4B 48 F3 C1 20 CA 48
4F FF EF 6D 05 B3 1A E3 23 D1 BF 1F 21 E7 D4 6F
93 9B 2C DA 68 5A ED 6F 04 86 81 84 22 CE 65 7F
80 D0 9D 8E 53 80 6C F5 D3 9D AB 5F CA C0 6D 0F
A0 71 00 06 C9 AB 0B 3D B5 B6 F4 0A CA B3 97 BE
5C 86 E0 51 E9 92 9F 3C 1B FA 95 F9 AE C4 E3 06
D1 B2 AC 4A 47 48 37 8E 85 31 DC 4B 90 B2 48 1B
E8 AE 37 C1 DE C2 89 9E 0D 7B 14 DB F8 75 E9 9B
91 C7 C1 73 AE BB BA 6A 6D C7 27 56 95 68 C5 B4
D6 15 03 4C 09 C0 FA ED E4 E7 86 E8 63 73 0B 5A
C3 9B 9A 63 E5 B1 9B 54 FC 6F BA 47 4D 76 82 2D
D3 40 16 26 19 7F 4E BE EF 1E B3 8F 8D F3 50 3B
EB E6 43 3A D0 11 03 03 EB E9 A9 9E BF BD C6 EF
AD D9 C5 40 C4 B8 12 F7 53 2D 7D D9 24 28 38 B1
3F 1E C5 C5 FB 93 C9 B9 73 62 0B 71 63 C9 AD 03
DC FE 3E BC 86 C9 2E 35 EF 1D 8B AE DD 79 2A 61
DF D9 4C 21 A7 81 43 73 5F D9 DB ED DE 57 03 4F
A2 EC 57 03 18 49 84 0A B6 62 1E 59 4C 02 EF 1E
4C 4E 1E 96 B8 C5 57 57 DC EC 03 FD E6 8E CF 42
3F F1 18 C8 52 ED 38 20 AB C9 2C D6 CA E4 5D 11
7F 7B 61 FB E9 46 BC 7E B1 E2 B4 F4 90 36 66 96
F9 5B 54 70 0F 3A 36 DE 62 BA 3D 9F 11 B5 EA A1
0A 4D CF 7D 4F 0C 01 D2 5A BC 5B 29 BA 3A 99 36
EE FE 1C C7 4A 20 2D FC 82 52 3A 38 B2 AD 00 EF
9D 95 BA 7B 2A 0D F1 C0 20 1F B9 1B 3D 36 E3 8C
3B 9B 63 42 10 D4 05 4F D4 22 FD C0 D8 67 24 9B
C7 62 CA 7A 1C D9 61 5B 16 6F EA 0F 60 79 04 E6
78 C7 E6 A3 B0 95 8C 5E 3E 36 0D CA 5F 1E CA 30
F7 89 0A 32 88 57 50 92 0D E1 F2 6B 83 C7 D0 D1
1B 52 98 52 16 93 48 18 3B EC 39 0B 2D EB E7 40
EE A3 45 EF F5 17 F3 87 BC 35 11 85 50 C5 79 2B
7B 5B AB DD B9 D4 70 20 5C 0C 07 49 3A 2E 37 0F
EA 2B 42 6F 27 D2 EE 38 6D DE 14 E5 FB F0 EA 87
9A E1 21 F6 D7 68 01 BD 32 5E 3D 82 45 B2 24 83
8A 37 3C C6 D0 D7 8C C3 9A F8 6C E9 5A 70 CD 53
33 C7 05 E1 08 00 37 A9 5F 0F 00 E7 34 8B C5 1C
43 5F 15 99 8B C0 71 8F BD 3C 40 CF 2E 73 30 DE
8D 0D EC F9 83 79 CC 45 79 1F 64 17 67 9D 07 D2
20 B5 ED 08 49 B1 27 D2 57 AA 61
</pre>
 
== RedOdk.odk ==
 
<pre>
F5 30 5A B4 E9 54 A7 EE 88 44 34 60 D2 F0 68 7B
A6 BD E9 3A BB 5E 22 6C DB 51 74 FD B0 13 79 8B
</pre>
 
== 33ec8436-5a0e-4f0d-b1ce-3f29c3955039.cik ==
 
<pre>
36 84 EC 33 0E 5A 0D 4F B1 CE 3F 29 C3 95 50 39
21 75 87 B8 E3 19 45 9C BA 2E F2 6F 8D E6 8E A8
9A B6 DC 0F BC 11 42 D0 9F 44 98 B0 BE E2 24 96
</pre>
 
== f0522b7c-7fc1-d806-43e3-68a5daab06da.cik ==
 
<pre>
7C 2B 52 F0 C1 7F 06 D8 43 E3 68 A5 DA AB 06 DA
60 33 FA 90 6C 17 AD 16 F6 FB CE 0D 91 67 30 B6
5E 9D A8 50 6F 8B A5 F4 11 D6 90 DC 88 98 BA A6
</pre>
 
= List of Xbox One Games and their Sizes =
 
* https://disk.yandex.com/d/by5w9wLwro7alw
 
= List of Xbox Series Games and their Sizes =


* https://disk.yandex.com/d/OIgclTKIgtcMog
= ebootrom wikify =
https://yadi.sk/d/z2Vr1NE_DZ6eHQ
Please note that all contributions to PS3 Developer wiki are considered to be released under the GNU Free Documentation License 1.2 (see PS3 Developer wiki:Copyrights for details). If you do not want your writing to be edited mercilessly and redistributed at will, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource. Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following hCaptcha:

Cancel Editing help (opens in new window)

Templates used on this page: