Seeds: Difference between revisions
CelesteBlue (talk | contribs) (→EID0) |
|||
(35 intermediate revisions by 5 users not shown) | |||
Line 1: | Line 1: | ||
= | = Source of the PS3 seeds = | ||
The seeds | The seeds presented on this page were acquired through different means. It started with a simple search (which I have to thank glevand and naehrwert for, as had it not been for those guys, I wouldn't have found myself the confidence to post this) and it went through several people who helped me along the way, and who probably wish to stay anonymous. | ||
= Seeds = | |||
== Common == | == Common == | ||
Line 16: | Line 16: | ||
</pre> | </pre> | ||
Used on old firmwares, | * Used on old firmwares, possibly for an old EID0 format (or fallback?) which can be 0x20 or 0x28 bytes in size. Decrypted section is always the same. | ||
* See [https://web.archive.org/web/20141118235214/http://pastie.org/private/rzg83pokd4vnxg60dj3qwg comments]. | |||
* Location: isoldr/appldr/lv1ldr | |||
== eEID == | == eEID == | ||
=== | === EID0 === | ||
==== | ==== EID0 individuals seed ==== | ||
<pre> | <pre> | ||
Line 35: | Line 33: | ||
</pre> | </pre> | ||
* Location: aim_spu_module.self/isoldr/appldr/lv1ldr/spu_token_processor.self/spu_utoken_processor.self | |||
==== EID0 section 0 seed for enc/dec + CMAC (Kirk command 0x12) ==== | |||
<pre>2ED7CE8D1D55454585BF6A3281CD03AF</pre> | |||
* Location: aim_spu_module.self | |||
==== EID0 section 6 seed for enc/dec + CMAC (Kirk command 0x12) ==== | |||
<pre>3AB0E6C4ACFFB629362FFBBBDBC854BC</pre> | |||
* Location: pspemudrm (KIRK) | |||
==== EID0 section 0xA seed for enc/dec + CMAC (Kirk command 0x12) ==== | |||
<pre>30B0395DC5835AAA3A7986B44AFAE684</pre> | |||
* Location: aim_spu_module.self | |||
==== EID0 section 6 seed for encrypted ECDSA private key (Kirk command 0x10) ==== | |||
<pre>33793B9F79E2EBAE55D4D6BF0ED376E6</pre> | |||
Notes: | |||
* This seed is the equivalent of the PSP Kirk command 0x10 AES128ECB seed (idskey0). | |||
* EID0 sections 7-0xA use a different and unknown seed. | |||
1) aes-256-ecb encrypt the seed with per-console EID0_key (indiv+0x20) and EID0_iv (indiv+0x10), in order to obtain the 128bit decryption key to decrypt per-console encrypted ECDSA private key. | |||
2) aes-128-cbc decrypt with iv=0 the encrypted ECDSA private key, located at certificate offset 0x88. | |||
3) Verify the ECDSA private key by using the ECDSA public key at certificate offset 0x10. See KIRK command 0x10 on PSP or PS3 wiki (same constant public key and curve). | |||
* Location: pspemudrm (KIRK) | |||
=== EID1 === | |||
==== | ==== EID1 individuals seed (SD) ==== | ||
<pre> | <pre> | ||
Line 86: | Line 80: | ||
</pre> | </pre> | ||
* Location: {{SD}} sc_iso.self/sc_iso_factory.self | |||
==== | ==== EID1 individuals seed ==== | ||
<pre> | <pre> | ||
Line 97: | Line 91: | ||
</pre> | </pre> | ||
* Location: sc_iso.self/sc_iso_factory.self/ss_sc_init.self | |||
==== Time EID1 seed ==== | |||
<pre> | |||
A8DCAB3577F30F7B81C788B80446B03F | |||
C240BD9F72BBFC7268E4E688C1C24F6E | |||
EF100F2B53199715A99C3E4794487073 | |||
74CE56F619FBD2486115A2FBA4F5FBB4 | |||
</pre> | |||
* Location: from all decrypted EID1, offset 0x110, size 0x40 | |||
=== EID2 === | |||
==== | ==== EID2 individuals seed ==== | ||
<pre> | <pre> | ||
Line 112: | Line 115: | ||
</pre> | </pre> | ||
* Location: fdm_spu_module.self | |||
==== | ==== EID2 DES key ==== | ||
<pre>6CCAB35405FA562C</pre> | |||
* Location: Lv2diag.self for BD remarry | |||
==== EID2 DES IV ==== | |||
<pre>0000000000000000</pre> | |||
* Location: Lv2diag.self for BD remarry | |||
=== EID3 === | |||
==== | ==== EID3 individuals seed ==== | ||
<pre> | <pre> | ||
Line 142: | Line 140: | ||
</pre> | </pre> | ||
* Location: CprmModule.spu.isoself | |||
==== | ==== EID3 seed ==== | ||
<pre> | <pre>5FFF3FD81E18B956DAE4E6D3368297EF</pre> | ||
5FFF3FD81E18B956DAE4E6D3368297EF | |||
</pre> | |||
* Location: CprmModule.spu.isoself | |||
==== | ==== EID3 static key ==== | ||
<pre> | <pre>D99406CA4BF30750436A454736834589</pre> | ||
D99406CA4BF30750436A454736834589 | |||
</pre> | |||
* Location: CprmModule.spu.isoself | |||
=== | === EID4 === | ||
==== EID4 individuals seed ==== | |||
<pre> | <pre> | ||
3EC20C17021901978A2971793829D308 | 3EC20C17021901978A2971793829D308 | ||
Line 172: | Line 165: | ||
</pre> | </pre> | ||
* Location: sv_iso_spu_module.self | |||
== HDD Specific == | == HDD Specific == | ||
Line 185: | Line 178: | ||
</pre> | </pre> | ||
* Location: sb_iso_spu_module.self | |||
=== ATA tweak individuals seed === | === ATA tweak individuals seed === | ||
Line 195: | Line 187: | ||
</pre> | </pre> | ||
* Location: sb_iso_spu_module.self | |||
=== ENCDEC data individuals seed === | === ENCDEC data individuals seed === | ||
Line 205: | Line 197: | ||
=== ENCDEC tweak individuals seed === | === ENCDEC tweak individuals seed === | ||
<pre> | <pre> | ||
02083292C305D538BC50E699710C0A3E | 02083292C305D538BC50E699710C0A3E | ||
Line 212: | Line 205: | ||
=== Arcade/SYSDBG Seeds === | === Arcade/SYSDBG Seeds === | ||
====ATA data/tweak==== | ==== ATA data/tweak ==== | ||
<pre> | <pre> | ||
Line 219: | Line 212: | ||
</pre> | </pre> | ||
====ENCDEC data==== | ==== ENCDEC data ==== | ||
<pre> | <pre> | ||
D2BCFF742D571A80DFEE5E2496D19C3A | D2BCFF742D571A80DFEE5E2496D19C3A | ||
6F25FA0FC69764CAC20F4269EB540FD8 | 6F25FA0FC69764CAC20F4269EB540FD8 | ||
</pre> | </pre> | ||
====ENCDEC tweak==== | |||
==== ENCDEC tweak ==== | |||
<pre> | <pre> | ||
C19C7F987EDB6E244B07BEDEFA1E6CC9 | C19C7F987EDB6E244B07BEDEFA1E6CC9 | ||
Line 232: | Line 227: | ||
== PS2 Emu Specific == | == PS2 Emu Specific == | ||
Used for ps2 memory card save generation | Used for ps2 memory card save generation. | ||
=== mc_iso individuals seed === | === mc_iso individuals seed === | ||
Line 243: | Line 238: | ||
</pre> | </pre> | ||
* Location: mc_iso_spu_module.self | |||
=== me_iso individuals seed === | === me_iso individuals seed === | ||
Line 255: | Line 249: | ||
</pre> | </pre> | ||
* Location: me_iso_spu_module.self | |||
== Syscon Specific == | == Syscon Specific == | ||
Line 270: | Line 264: | ||
</pre> | </pre> | ||
=== sc_iso module seed | === sc_iso module seed (SD) === | ||
<pre> | <pre> | ||
0AB7611E56DA45076B46129718F5C80E | 0AB7611E56DA45076B46129718F5C80E | ||
Line 299: | Line 294: | ||
</pre> | </pre> | ||
Size 256 | * Size: 256 bytes | ||
=== random xseed === | === random xseed === | ||
Line 329: | Line 302: | ||
</pre> | </pre> | ||
Used for generating a random number through the use of ch74. | |||
=== data key seed === | === data key seed === | ||
Line 343: | Line 316: | ||
</pre> | </pre> | ||
=== vtrm | === vtrm key seed === | ||
<pre> | <pre> | ||
Line 355: | Line 328: | ||
</pre> | </pre> | ||
== eEID1 fallback == | |||
<pre> | <pre> | ||
Line 401: | Line 374: | ||
</pre> | </pre> | ||
= | === eEID1 fallback decrypted === | ||
= | |||
<pre> | <pre> | ||
1E05FC2C1A5C5512E0604252C7A3C942 | |||
9E6C2A490A6543914510071EC93987BB | |||
3BF1CDB740E234FE7D9A9444FC53E3AB | |||
57548976BA11018074C3FF2ADD1A469A | |||
680EDC509AD0CBC6C90CEA843905482A | |||
BEAB40BA985E134492FD8FC1487DC828 | |||
0EEF78B26AD1A241C38C743BB344DAFE | |||
1A0B7E797669107B673A95C4617AF0EC | |||
3E600567DC98B61CFB44F5972086CD38 | |||
C36D5EC828F2D81476302FED32FC2E83 | |||
162FA5D83931BFE1154321CDAA240C6C | |||
38B27DF52F81E0069F906075EDB6E739 | |||
4EE82A46A9729A68728735DFC9C9F461 | |||
A29CD185CC02CF9EB37BDD83D0ABA0AA | |||
BA9D51FBD95F88E3CBDDD2300E51F086 | |||
3A059B178EB657C8E793473B0CC3298B | |||
E9AF9924FDD6BCD0E7D3B43161DDF8BF | |||
A8DCAB3577F30F7B81C788B80446B03F | |||
C240BD9F72BBFC7268E4E688C1C24F6E | |||
EF100F2B53199715A99C3E4794487073 | |||
74CE56F619FBD2486115A2FBA4F5FBB4 | |||
5900A06CB88F39D4D2B430B299EA6910 | |||
00000000000000000000000000000000 | |||
00000000000000000000000000000000 | |||
00000000000000000000000000000000 | |||
00000000000000000000000000000000 | |||
00000000000000000000000000000000 | |||
00000000000000000000000000000000 | |||
00000000000000000000000000000000 | |||
00000000000000000000000000000000 | |||
00000000000000000000000000000000 | |||
00000000000000000000000000000000 | |||
00000000000000000000000000000000 | |||
00000000000000000000000000000000 | |||
00000000000000000000000000000000 | |||
00000000000000000000000000000000 | |||
00000000000000000000000000000000 | |||
00000000000000000000000000000000 | |||
00000000000000000000000000000000 | |||
00000000000000000000000000000000 | |||
</pre> | </pre> | ||
* Decrypted with flash key 0x10. | |||
= | = Notes = | ||
* There are some tools that to work with these seeds: libeeid / ps3hdd_poc / ps3_decrypt_tools. | |||
* https://github.com/zecoxao/ps3_decrypt_tools Up-to-date tool for EID decryption and encryption. | |||
* The seeds are scattered all over the wiki, so it's nice to have a spot where you can look at the seed you wish :) | |||
* Many thanks to fail0verfl0w for this. Gotta love the print_hash function :3 | |||
* Regarding Syscon, there are two chunks of data, one located at ss_sc_init and the other at sc_iso with sizes 0x290 and 0x280 respectively. one is after keyseed_for_srk2 and the other is between k4 and k5. | |||
* ss_sc_init contains fallback EID1 of size 0x290 bytes. | |||
[http://pastie.org/ | * [https://web.archive.org/web/20141118233711/http://pastie.org/2858016 THE PLACEHOLDER]. This curious pastie contains the first 4 bytes of several keys/seeds: | ||
<pre> | |||
1st line - EID2 individuals seed | |||
2nd line - EID0 individuals seed | |||
3rd line - EID1 individuals seed | |||
4th line - EID4 individuals seed | |||
5th line - ata data seed | |||
6th line - me iso indiv seed | |||
7th line - mc iso indiv seed | |||
</pre> | |||
== | = References = | ||
[[Iso_module|Isolated modules]] <- used as reference for EID specific seeds, amongst others | |||
{{Reverse engineering}}<noinclude>[[Category:Main]]</noinclude> | {{Reverse engineering}}<noinclude>[[Category:Main]]</noinclude> |
Latest revision as of 14:21, 14 May 2021
Source of the PS3 seeds[edit | edit source]
The seeds presented on this page were acquired through different means. It started with a simple search (which I have to thank glevand and naehrwert for, as had it not been for those guys, I wouldn't have found myself the confidence to post this) and it went through several people who helped me along the way, and who probably wish to stay anonymous.
Seeds[edit | edit source]
Common[edit | edit source]
Common individuals seed[edit | edit source]
59302145AC09B1EFE69E9B7A25FF8F86 E9F6814D37DE204D29729B8416BAEDE4 227098657F298CDB6A9B5E59E4A4BA2F 8E6A740E1FC1E3E935DDD2F66CDEDD6B
- Used on old firmwares, possibly for an old EID0 format (or fallback?) which can be 0x20 or 0x28 bytes in size. Decrypted section is always the same.
- See comments.
- Location: isoldr/appldr/lv1ldr
eEID[edit | edit source]
EID0[edit | edit source]
EID0 individuals seed[edit | edit source]
ABCAAD1771EFABFC2B921276FAC2130C 37A6BE3FEF82C79F3BA5733FC35A690B 08B358F970FA16A3D2FFE2299E841EE4 D3DB0E0C9BAEB51BC7DFF10467472F85
- Location: aim_spu_module.self/isoldr/appldr/lv1ldr/spu_token_processor.self/spu_utoken_processor.self
EID0 section 0 seed for enc/dec + CMAC (Kirk command 0x12)[edit | edit source]
2ED7CE8D1D55454585BF6A3281CD03AF
- Location: aim_spu_module.self
EID0 section 6 seed for enc/dec + CMAC (Kirk command 0x12)[edit | edit source]
3AB0E6C4ACFFB629362FFBBBDBC854BC
- Location: pspemudrm (KIRK)
EID0 section 0xA seed for enc/dec + CMAC (Kirk command 0x12)[edit | edit source]
30B0395DC5835AAA3A7986B44AFAE684
- Location: aim_spu_module.self
EID0 section 6 seed for encrypted ECDSA private key (Kirk command 0x10)[edit | edit source]
33793B9F79E2EBAE55D4D6BF0ED376E6
Notes:
- This seed is the equivalent of the PSP Kirk command 0x10 AES128ECB seed (idskey0).
- EID0 sections 7-0xA use a different and unknown seed.
1) aes-256-ecb encrypt the seed with per-console EID0_key (indiv+0x20) and EID0_iv (indiv+0x10), in order to obtain the 128bit decryption key to decrypt per-console encrypted ECDSA private key.
2) aes-128-cbc decrypt with iv=0 the encrypted ECDSA private key, located at certificate offset 0x88.
3) Verify the ECDSA private key by using the ECDSA public key at certificate offset 0x10. See KIRK command 0x10 on PSP or PS3 wiki (same constant public key and curve).
- Location: pspemudrm (KIRK)
EID1[edit | edit source]
EID1 individuals seed (SD)[edit | edit source]
0AB7611E56DA45076B46129718F5C80E 80BFFBA1800145BF2F1C02F7C011FDE8 E486A45215B5FFFF432DD7F7DFF0C47D 989ADED904DD987FC93BD735DA114397
- Location: SD sc_iso.self/sc_iso_factory.self
EID1 individuals seed[edit | edit source]
B0D655764C3B44B338F32DD1D0999B66 48A35A2CEB15E28EECDC2DC0B4C7EB05 DC8225C0D5789DBB2E89A24A78585800 72363834EE1A116C2CD25E58EE6763F7
- Location: sc_iso.self/sc_iso_factory.self/ss_sc_init.self
Time EID1 seed[edit | edit source]
A8DCAB3577F30F7B81C788B80446B03F C240BD9F72BBFC7268E4E688C1C24F6E EF100F2B53199715A99C3E4794487073 74CE56F619FBD2486115A2FBA4F5FBB4
- Location: from all decrypted EID1, offset 0x110, size 0x40
EID2[edit | edit source]
EID2 individuals seed[edit | edit source]
7492E57C2C7C63F44942268FB41C58ED 668341F9C97B298396FA9D82075199D8 BC1A934B374FA38D46AF94C7C33373B3 09572084FE2DE34457E0F8527A34753D
- Location: fdm_spu_module.self
EID2 DES key[edit | edit source]
6CCAB35405FA562C
- Location: Lv2diag.self for BD remarry
EID2 DES IV[edit | edit source]
0000000000000000
- Location: Lv2diag.self for BD remarry
EID3[edit | edit source]
EID3 individuals seed[edit | edit source]
01D0496A3BADD1735570CB29E16FA231 4FA9FD1ABA19A1C69EEA2F4AA607A71C 6FE23EF8DFBB0F2D9D452CD5FAD58B74 5BF8A4A50D8BDB29B2F4BF14C44ADD76
- Location: CprmModule.spu.isoself
EID3 seed[edit | edit source]
5FFF3FD81E18B956DAE4E6D3368297EF
- Location: CprmModule.spu.isoself
EID3 static key[edit | edit source]
D99406CA4BF30750436A454736834589
- Location: CprmModule.spu.isoself
EID4[edit | edit source]
EID4 individuals seed[edit | edit source]
3EC20C17021901978A2971793829D308 0429FA84E33E7F730C1D416EEA25CAFB 3DE02BC005EA490B03E99198F83F101F 1BA34B50589428ADD2B3EB3FF4C31A58
- Location: sv_iso_spu_module.self
HDD Specific[edit | edit source]
Used for individual hard drive information.
ATA data individuals seed[edit | edit source]
D92D65DB057D49E1A66F2274B8BAC508 83844ED756CA79516362EA8ADAC60326
- Location: sb_iso_spu_module.self
ATA tweak individuals seed[edit | edit source]
C3B3B5AACC74CD6A48EFABF44DCDF16E 379F55F5777D09FBEEDE07058E94BE08
- Location: sb_iso_spu_module.self
ENCDEC data individuals seed[edit | edit source]
E2D05D4071945B01C36D5151E88CB833 4AAA298081D8C44F185DC660ED575686
ENCDEC tweak individuals seed[edit | edit source]
02083292C305D538BC50E699710C0A3E 55F51CBAA535A38030B67F79C905BDA3
Arcade/SYSDBG Seeds[edit | edit source]
ATA data/tweak[edit | edit source]
DA73ED9020918F4C0A703DCCF890617B FFD25E3340009109583C643DF4A21324
ENCDEC data[edit | edit source]
D2BCFF742D571A80DFEE5E2496D19C3A 6F25FA0FC69764CAC20F4269EB540FD8
ENCDEC tweak[edit | edit source]
C19C7F987EDB6E244B07BEDEFA1E6CC9 F08524D98C05654CC742141E01F823E1
PS2 Emu Specific[edit | edit source]
Used for ps2 memory card save generation.
mc_iso individuals seed[edit | edit source]
5238D0FA23A993B8971D400F982D2177 8130DCF4DE7C4E119C1DE286AA37610B 1AB711223F27681659AE6B71F184F9CB 0E00D08AD06AF9F7A1D55F69C71D2B25
- Location: mc_iso_spu_module.self
me_iso individuals seed[edit | edit source]
F2336E2563B603077A76657126CAE4DB 820E92856B693CE81422E9FB1C1CA5B3 E943388E4B480350AA24A5FBFABFD172 D97A1E25DE3E64A0A7A482528456B174
- Location: me_iso_spu_module.self
Syscon Specific[edit | edit source]
Used for individual SYSCON authentication.
sc_iso module seed[edit | edit source]
B0D655764C3B44B338F32DD1D0999B66 48A35A2CEB15E28EECDC2DC0B4C7EB05 DC8225C0D5789DBB2E89A24A78585800 72363834EE1A116C2CD25E58EE6763F7
sc_iso module seed (SD)[edit | edit source]
0AB7611E56DA45076B46129718F5C80E 80BFFBA1800145BF2F1C02F7C011FDE8 E486A45215B5FFFF432DD7F7DFF0C47D 989ADED904DD987FC93BD735DA114397
sc_magic::auth_magic[edit | edit source]
63DCA7D3FEE47F749A408363F1104E8F auth_1 0x00 4D10094324009CC8E6B69C70328E34C5 auth_2 0x00 D97949BAD8DA69D0E01BF31523732832 auth_1 0x01 C9D1DD3CE27E356697E26C12A7B316A8 auth_2 0x01 72FF4C7FD2A5908D6C9C3FD3C037FEEB auth_1 0x02 FA8D083C052080D4A19453452E179A44 auth_2 0x02 35F8421295CBF484E06A17FA2FB98686 auth_1 0x03 C2F3685E7EF49768337B79FDBC8265BE auth_2 0x03 C6E19331FC6D75D1C2800913D1793C7E auth_1 0x04 771A755F402D5196D02A0D092BEFE01E auth_2 0x04 B11701629ED2FA918F9F4D8B78D72D74 auth_1 0x05 19930DE0B6FDCFFC7BA630B82D530431 auth_2 0x05 4420ED722FEA35021955AB40C78EE6DF auth_1 0x06 3E67C2D9432E15D09BEF0E6C6492455D auth_2 0x06 5FA6AF2BB07F72E2ABF80B4EF6DA98E0 auth_1 0x07 8CB782E53E8AEB8A768D366598281B9B auth_2 0x07
- Size: 256 bytes
random xseed[edit | edit source]
AB19502586A381E670D34F560EAAF31A20475903
Used for generating a random number through the use of ch74.
data key seed[edit | edit source]
73686572776F6F645F73735F73656564 "sherwood_ss_seed"
tweak key seed[edit | edit source]
73735F736565645F6F6E655F6D6F7265 "ss_seed_one_more"
vtrm key seed[edit | edit source]
6B6579736565645F666F725F73726B32 "keyseed_for_srk2"
seed for backup[edit | edit source]
736565645F666F725F6261636B757000 "seed_for_backup."
eEID1 fallback[edit | edit source]
84DEDB601CBFE24C17DDC7BD1B466406 0126A315C548FDD56C0DF6DE19667079 CB21566A84CAFE5CC883F5255E9586E4 4C02AC7201D69D2F6274E86918BE2703 4A86714B7D122170D45E317F97D173E7 615506000725FDE96EE7ACA391D06F73 3B24EABA2DCB71B6AEC2AB4B809ABD09 B8B7EDD3361CC1F3B71DA99617B7DC01 518E3B27164816ACF9C89157B07BB6C8 633D8DD1CFCE1E15AED07083E38E8EBB 145138B3BA0E240F3A7E77678D9D2961 BD123E045C9C0C58A9A03EB8940A1B99 75A1EE8E575ADFD8811BDE09B098ED38 F87F7DC557618412C827EF32FD5215D0 20900F5D2DF6C1BA52CB1B2E5DBC0310 5C91D011F8F232DD14CFA4E9A3108069 DFA88A3C2E27CB4892E8074794B32CF4 B78EC1E9E6A83ECC280182E29E22EDCE A0A8BA86FF4304C488A8BD461A9B2D6F E56C435F841C561E0E724F6CEDF38505 1EBB412CB7BBD395D56FD515782C5957 B687263DF0F4E5353BBAD52CCE4C634F 842663A906ED14319746A91FC63E556A 60426AB2283679450F76054E0EB39F22 F92881B49D9811F846E392FB66056DCB 267AA10094FD262D121B5576A0E6C0F1 58DEF55F710C789D8ED78CDE4E6AD6F8 2D9F8180B8C050D9B1847BC50803D3A4 5CB1178E0241C39AC3AA77558BA96567 7EECBF204F0760ECD976FE20AE97BA5C 4150D9D7EA9AC4C286E63C21FBDCE903 B6AD8EDA663C266A1B8F81F843A1C919 5856F90CB7390EBDB5A000D87F4E2619 CDA436059FD3723C3B6DA657E6D936D8 EA517214BA336B9B57912840AF8A3E76 EA715EE979F03A9857AA358E83B45E0E 8FC797DF9927B0E933EA33EBA1592231 E34C8E3E54C98E27C2E3AB69CC0E45F1 AD1BC8B53D9F87107F3FB7BB1B5E26B2 B710593154505CF21A36E2E57823D5BE 0D5D3AB4CD04B1C27A74BEE02E6D25F4
eEID1 fallback decrypted[edit | edit source]
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
- Decrypted with flash key 0x10.
Notes[edit | edit source]
- There are some tools that to work with these seeds: libeeid / ps3hdd_poc / ps3_decrypt_tools.
- https://github.com/zecoxao/ps3_decrypt_tools Up-to-date tool for EID decryption and encryption.
- The seeds are scattered all over the wiki, so it's nice to have a spot where you can look at the seed you wish :)
- Many thanks to fail0verfl0w for this. Gotta love the print_hash function :3
- Regarding Syscon, there are two chunks of data, one located at ss_sc_init and the other at sc_iso with sizes 0x290 and 0x280 respectively. one is after keyseed_for_srk2 and the other is between k4 and k5.
- ss_sc_init contains fallback EID1 of size 0x290 bytes.
- THE PLACEHOLDER. This curious pastie contains the first 4 bytes of several keys/seeds:
1st line - EID2 individuals seed 2nd line - EID0 individuals seed 3rd line - EID1 individuals seed 4th line - EID4 individuals seed 5th line - ata data seed 6th line - me iso indiv seed 7th line - mc iso indiv seed
References[edit | edit source]
Isolated modules <- used as reference for EID specific seeds, amongst others