Editing Keys
Jump to navigation
Jump to search
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 1: | Line 1: | ||
= Syscon Keys = | = Syscon Keys = | ||
== | == Retail == | ||
=== Full Firmware === | === Full Firmware === | ||
Line 1,954: | Line 8: | ||
<pre> | <pre> | ||
Key = 5301C28824B57137A819C042FC119E3F | Key = 5301C28824B57137A819C042FC119E3F | ||
IV = 0000000000000000 | |||
IV = | |||
</pre> | </pre> | ||
Line 1,962: | Line 15: | ||
* 40000002 (BASE) | * 40000002 (BASE) | ||
* 40000003 (SYST) | * 40000003 (SYST) | ||
AES-CMAC-128 | AES-CMAC-128 | ||
Line 1,972: | Line 23: | ||
Used to generate the AES-CMAC-128 at the start of decrypted 40000001, 40000002 and 40000003, by digesting the remainder of the decrypted data | Used to generate the AES-CMAC-128 at the start of decrypted 40000001, 40000002 and 40000003, by digesting the remainder of the decrypted data | ||
=== Patch Firmware === | |||
=== Patch Firmware | |||
AES-CBC-128 | AES-CBC-128 | ||
<pre> | <pre> | ||
Key = EF90B21B31452379068E3041AAD8281E | Key = EF90B21B31452379068E3041AAD8281E | ||
IV = 0000000000000000 | |||
IV = | |||
</pre> | </pre> | ||
Line 1,986: | Line 34: | ||
* 40010001 (Patch #1) | * 40010001 (Patch #1) | ||
* 40010002 (Patch #2) | * 40010002 (Patch #2) | ||
AES-CMAC-128 | AES-CMAC-128 | ||
Line 1,996: | Line 42: | ||
Used to generate the AES-CMAC-128 at the start of decrypted 40010001 and 40010002, by digesting the remainder of the decrypted data | Used to generate the AES-CMAC-128 at the start of decrypted 40010001 and 40010002, by digesting the remainder of the decrypted data | ||
= | === Normal(?) === | ||
== | |||
AES-CBC-128 | |||
<pre> | <pre> | ||
Key = 8BF074CCA3D9C398142256D7DD1A1259 | |||
IV = 0000000000000000 | |||
</pre> | </pre> | ||
AES-CMAC-128 | |||
<pre> | <pre> | ||
Key = 4065918EB339184DAACCD61B30B5FB59 | |||
</pre> | </pre> | ||
=== | === Security ID === | ||
3A4E6F743A557365643A (:Not:Used:) | |||
Used to access more privileged commands, such as the write command | |||
=== | === AUTH #1 === | ||
RSA-2048 | |||
<pre> | <pre> | ||
Modulus = C1653D76057907FBD28AFBC559C23C58 | |||
03A0CD505613C5878E91D90BB6B4CBA4 | |||
513F54A0F52140B0A38C15C24DCC59EB | |||
605618D020B4A21A34C99915DA5A589D | |||
793F58CB6EA82666D272145B62F203ED | |||
87840C844842CA773EDFC581BCAABFFB | |||
4AA4EEED08F6695CAA2C13EC30FA1CE3 | |||
9FCDCDCBA7CDD9C68BA1329D18F89842 | |||
Exponent = 0x10001 | |||
</pre> | </pre> | ||
Used | Used for UART communications | ||
=== | === AUTH #2 === | ||
RSA-2048 | |||
<pre> | <pre> | ||
Modulus = 46228A1F1EB57D08E5A52DE51CC3E3D2 | |||
FF96AE61BE0F9E8F996CCDA8C76D66A9 | |||
5DCE0C18FBF86BC27050DB6565F681AA | |||
6670D8F4E626192DEB591E57E99B3325 | |||
297146188EDB6D654ED7F61B5A11532D | |||
87AE562A76EEC16FEC4B1E92977F730D | |||
3D44DB9FB11A4FF07281456D0CFEB30A | |||
123995FE7C72FB5FCC249FB095704ECB | |||
Exponent = 0x10001 | |||
</pre> | </pre> | ||
=== | === Unknown #1 === | ||
RSA-2048 | |||
<pre> | <pre> | ||
Modulus = 7BB325CEDD2FE9C1F8C987E0BC175D5F | |||
F99FEBBB45E96793AFBF5727E276F234 | |||
91D82CAD483FA77E917C5DD589D28049 | |||
6D24A0BEBBCBF10D6BB75EC621272886 | |||
EFDA5C481DCBC8A9AD6AD776E7D6DFE6 | |||
A06ACD1BC0D6704455D10D363DBD2497 | |||
E6723F94A98AC31FF7DD7AE72CA75427 | |||
CF7A1E55D145E4E331D7CEDCC27DCEF9 | |||
Exponent = 0x10001 | |||
</pre> | </pre> | ||
Used for UART communications | |||
=== | === Unknown #2 === | ||
RSA-2048 | |||
<pre> | <pre> | ||
Modulus = 23C4F66168B060AB37DCBEB26012D3C5 | |||
B1932E9E7DCB4BC7C4E566BE5DC1F5CA | |||
B185F63280ED4FB078111C186DC52F00 | |||
82502D3D37F366C61A2B92BE2630049D | |||
F8ECC33BDD6A21380E53505E3E564389 | |||
FA8EE23812463E1BA0F6A073778E853E | |||
FE263157D33F409ACEA6BCF0C4C87F1E | |||
FFB449A6C05C06BC115465357992C8BC | |||
Exponent = 0x10001 | |||
</pre> | </pre> | ||
Used for UART communications | |||
== Development Kit == | |||
=== | === Full Firmware === | ||
AES-CBC-128 | AES-CBC-128 | ||
<pre> | <pre> | ||
Key = | Key = 82D4EEE9E7F68EFBC43C3D2747E4139F | ||
IV = 0000000000000000 | |||
</pre> | </pre> | ||
Used for: | |||
* 40000001 (BLNK) | |||
AES-CMAC-128 | |||
<pre> | <pre> | ||
Key = 4C49DC8DF6A20E1592F9E9F7442B4261 | |||
</pre> | </pre> | ||
Used to generate the AES-CMAC-128 at the start of decrypted 40000001, by digesting the remainder of the decrypted data | |||
AES-CBC-128 | AES-CBC-128 | ||
<pre> | <pre> | ||
Key = | Key = DB603053A4D3119149996D0BA84434E2 | ||
IV = 0000000000000000 | |||
</pre> | </pre> | ||
Used for: | |||
* 40000002 (BASE) | |||
AES-CMAC-128 | |||
<pre> | <pre> | ||
Key = B3A8CB797D1406658372A92B6CFB3490 | |||
</pre> | </pre> | ||
Used to generate the AES-CMAC-128 at the start of decrypted 40000002, by digesting the remainder of the decrypted data | |||
= | = Kernel Keys = | ||
== default_suffix == | |||
Used as suffix to symbol names when hashing with SHA256 to create a NID. | |||
<pre> | <pre> | ||
51 8D 64 A6 35 DE D8 C1 E6 B0 39 B1 C3 E5 52 30 | |||
</pre> | </pre> | ||
== Crash Dump KeySeed == | |||
=== | === Retail === | ||
==== s_kd ==== | |||
<pre> | <pre> | ||
8F 86 DD ED CB F2 4A 44 EB 6C 30 60 7A A2 6F 76 | |||
</pre> | </pre> | ||
==== | ==== s_kc ==== | ||
<pre> | <pre> | ||
41 25 71 5A AB 8B 78 E5 69 F5 12 E6 5C A6 2D D3 | |||
</pre> | </pre> | ||
* algo used is aes cbc | |||
== | == Sealed Key Values == | ||
AES | === Retail === | ||
Key: AES CFB 128<br> | |||
Hash: SHA 256 HMAC<br><br> | |||
Keyset 1<br> | |||
<pre> | <pre> | ||
Key: B5DAEFFF39E6D90ECA7DC5B029A8153E | |||
</pre> | </pre> | ||
<pre> | <pre> | ||
Hash: 8707960A53468D6C843B3DC9624E22AF | |||
</pre><br> | |||
Keyset 2<br> | |||
<pre> | |||
Key: EC0D347E2A7657471F1FC33E9E916FD4 | |||
</pre> | </pre> | ||
<pre> | <pre> | ||
Hash: A6D6583D3217E87D9BE9BCFC4436BE4F | |||
</pre> | </pre><br> | ||
Keyset 3<br> | |||
<pre> | <pre> | ||
Key: 51D8BFB4E387FB4120F081FE33E4BE9A | |||
</pre> | </pre> | ||
<pre> | <pre> | ||
Hash: FFF9BDEA803B14824C61850EBB084EE9 | |||
</pre> | </pre><br> | ||
Keyset 4<br> | |||
<pre> | <pre> | ||
Key: 346B5D231332AC428A44A708B1138F6D | |||
</pre> | </pre> | ||
<pre> | <pre> | ||
Hash: 5DC6B8D1A3A0741852A7D44268714824 | |||
</pre> | </pre> | ||
Dumped with getSealedKeySecret on 5.05 | |||
== Vtrm Cipher Init Keys == | |||
=== | === hmac_key_seed === | ||
<pre> | <pre> | ||
87 FB 19 BB F3 D4 D6 B1 B0 ED 22 6E 39 CC 62 1A | |||
37 FA 4E D2 B6 61 8B 59 B3 4F 77 0F BB 92 94 7B | |||
</pre> | </pre> | ||
=== | === iv === | ||
<pre> | <pre> | ||
00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF | |||
</pre> | </pre> | ||
=== | === aes_key_seed === | ||
<pre> | <pre> | ||
B0 ED 22 6E 39 CC 62 1A 37 FA 4E D2 B6 61 8B 59 | |||
DB F0 7E 82 FF FF FF FF 47 F1 7E 82 FF FF FF FF | |||
81 F1 7E 82 FF FF FF FF BB F1 7E 82 FF FF FF FF | |||
F5 F1 7E 82 FF FF FF FF 37 F2 7E 82 FF FF FF FF | |||
79 F2 7E 82 FF FF FF FF A9 F2 7E 82 FF FF FF FF | |||
DA F2 7E 82 FF FF FF FF 07 F3 7E 82 FF FF FF FF | |||
47 F3 7E 82 FF FF FF FF 00 00 00 00 00 00 00 00 | |||
</pre> | </pre> | ||
= | == Keystone files Keys == | ||
=== | === keystone_passcode_secret === | ||
<pre> | <pre> | ||
C7 44 05 F6 74 24 BA 34 2B C1 27 62 51 BB C2 F5 55 F1 60 25 B6 A1 B6 71 47 80 DB AE C8 52 FA 2F | |||
</pre> | </pre> | ||
== | === keystone_ks_secret === | ||
<pre> | <pre> | ||
78 3D 6F 3A E9 1C 0E 07 12 FC AA B7 95 0B DE 06 85 5C F7 A2 2D CD BD E1 27 E9 BF CB AD 0F F0 FE | |||
</pre> | </pre> | ||
== | = ShellCore Keys = | ||
== | == Trophy Debug Key == | ||
<pre> | <pre> | ||
02 CC D3 46 B4 59 CB 83 50 5E 8E 76 0A 44 D4 57 | |||
</pre> | </pre> | ||
==== | == Trophy Retail Key == | ||
<pre> | <pre> | ||
21 F4 1A 6B AD 8A 1D 3E CA 7A D5 86 C1 01 B7 A9 | |||
</pre> | </pre> | ||
== | == RSA PKG Meta P == | ||
<pre> | <pre> | ||
F9 67 AD 99 12 31 0C 56 A2 2E 16 1C 46 B3 4D 5B | |||
43 BE 42 A2 F6 86 96 80 42 C3 C7 3F C3 42 F5 87 | |||
49 33 9F 07 5D 6E 2C 04 FD E3 E1 B2 AE 0A 0C F0 | |||
C7 A6 1C A1 63 50 C8 09 9C 51 24 52 6C 5E 5E BD | |||
1E 27 06 BB BC 9E 94 E1 35 D4 6D B3 CB 3C 68 DD | |||
68 B3 FE 6C CB 8D 82 20 76 23 63 B7 E9 68 10 01 | |||
4E DC BA 27 5D 01 C1 2D 80 5E 2B AF 82 6B D8 84 | |||
B6 10 52 86 A7 89 8E AE 9A E2 89 C6 F7 D5 87 FB | |||
</pre> | </pre> | ||
=== | == RSA PKG Meta Q == | ||
<pre> | <pre> | ||
D7 A1 0F 9A 8B F2 C9 11 95 32 9A 8C F0 D9 40 47 | |||
F5 68 A0 0D BD C1 FC 43 2F 65 F9 C3 61 0F 25 77 | |||
54 AD D7 58 AC 84 40 60 8D 3F F3 65 89 75 B5 C6 | |||
2C 51 1A 2F 1F 22 E4 43 11 54 BE C9 B4 C7 B5 1B | |||
05 0B BC 56 9A CD 4A D9 73 68 5E 5C FB 92 B7 8B | |||
0D FF F5 07 CA B4 C8 9B 96 3C 07 9E 3E 6B 2A 11 | |||
F2 8A B1 8A D7 2E 1B A5 53 24 06 ED 50 B8 90 67 | |||
B1 E2 41 C6 92 01 EE 10 F0 61 BB FB B2 7D 4A 73 | |||
</pre> | </pre> | ||
== RSA PKG Meta Modulus == | |||
== | |||
<pre> | <pre> | ||
D2 12 FC 33 5F 6D DB 83 16 09 62 8B 03 56 27 37 | |||
82 D4 77 85 35 29 39 2D 52 6B 8C 4C 8C FB 06 C1 | |||
84 5B E7 D4 F7 BC D2 4E 62 45 CD 2A BB D7 77 76 | |||
45 36 55 27 3F B3 F5 F9 8E DA 4B EF AA 59 AE B3 | |||
9B EA 54 98 D2 06 32 6A 58 31 2A E0 D4 4F 90 B5 | |||
0A 7D EC F4 3A 9C 52 67 2D 99 31 8E 0C 43 E6 82 | |||
FE 07 46 E1 2E 50 D4 1F 2D 2F 7E D9 08 BA 06 B3 | |||
BF 2E 20 3F 4E 3F FE 44 FF AA 50 43 57 91 69 94 | |||
49 15 82 82 E4 0F 4C 8D 9D 2C C9 5B 1D 64 BF 88 | |||
8B D4 C5 94 E7 65 47 84 1E E5 79 10 FB 98 93 47 | |||
B9 7D 85 12 A6 40 98 2C F7 92 BC 95 19 32 ED E8 | |||
90 56 0D 65 C1 AA 78 C6 2E 54 FD 5F 54 A1 F6 7E | |||
E5 E0 5F 61 C1 20 B4 B9 B4 33 08 70 E4 DF 89 56 | |||
ED 01 29 46 77 5F 8C B8 A9 F5 1E 2E B3 B9 BF E0 | |||
09 B7 8D 28 D4 A6 C3 B8 1E 1F 07 EB B4 12 0B 95 | |||
B8 85 30 FD DC 39 13 D0 7C DC 8F ED F9 C9 A3 C1 | |||
</pre> | </pre> | ||
== RSA PKG Meta Private Key == | |||
<pre> | <pre> | ||
32 D9 03 90 8F BD B0 8F 57 2B 28 5E 0B 8D B3 EA | |||
5C D1 7E A8 90 88 8C DD 6A 80 BB B1 DF C1 F7 0D | |||
AA 32 F0 B7 7C CB 88 80 0E 8B 64 B0 BE 4C D6 0E | |||
9B 8C 1E 2A 64 E1 F3 5C D7 76 01 41 5E 93 5C 94 | |||
FE DD 46 62 C3 1B 5A E2 A0 BC 2D EB C3 98 0A A7 | |||
B7 85 69 70 68 2B 64 4A B3 1F CC 7D DC 7C 26 F4 | |||
77 F6 5C F2 AE 5A 44 2D D3 AB 16 62 04 19 BA FB | |||
90 FF E2 30 50 89 6E CB 56 B2 EB C0 91 16 92 5E | |||
30 8E AE C7 94 5D FD 35 E1 20 F8 AD 3E BC 08 BF | |||
C0 36 74 9F D5 BB 52 08 FD 06 66 F3 7A B3 04 F4 | |||
75 29 5D E9 5F AA 10 30 B2 0F 5A 1A C1 2A B3 FE | |||
CB 21 AD 80 EC 8F 20 09 1C DB C5 58 94 C2 9C C6 | |||
CE 82 65 3E 57 90 BC A9 8B 06 B4 F0 72 F6 77 DF | |||
98 64 F1 EC FE 37 2D BC AE 8C 08 81 1F C3 C9 89 | |||
1A C7 42 82 4B 2E DC 8E 8D 73 CE B1 CC 01 D9 08 | |||
70 87 3C 44 08 EC 49 8F 81 5A E2 40 FF 77 FC 0D | |||
</pre> | </pre> | ||
== RSA PKG Meta DP == | |||
<pre> | <pre> | ||
52 CC 2D A0 9C 9E 75 E7 28 EE 3D DE E3 45 D1 4F | |||
94 1C CC C8 87 29 45 3B 8D 6E AB 6E 2A A7 C7 15 | |||
43 A3 04 8F 90 5F EB F3 38 4A 77 FA 36 B7 15 76 | |||
B6 01 1A 8E 25 87 82 F1 55 D8 C6 43 2A C0 E5 98 | |||
C9 32 D1 94 6F D9 01 BA 06 81 E0 6D 88 F2 24 2A | |||
25 01 64 5C BF F2 D9 99 67 3E F6 72 EE E4 E2 33 | |||
5C F8 00 40 E3 2A 9A F4 3D 22 86 44 3C FB 0A A5 | |||
7C 3F CC F5 F1 16 C4 AC 88 B4 DE 62 94 92 6A 13 | |||
</pre> | </pre> | ||
= | == RSA PKG Meta DQ == | ||
<pre> | <pre> | ||
7C 9D AD 39 E0 D5 60 14 94 48 19 7F 88 95 D5 8B | |||
80 AD 85 8A 4B 77 37 85 D0 77 BB BF 89 71 4A 72 | |||
CB 72 68 38 EC 02 C6 7D C6 44 06 33 51 1C C0 FF | |||
95 8F 0D 75 DC 25 BB 0B 73 91 A9 6D 42 D8 03 B7 | |||
68 D4 1E 75 62 A3 70 35 79 78 00 C8 F5 EF 15 B9 | |||
FC 4E 47 5A C8 70 70 5B 52 98 C0 C2 58 4A 70 96 | |||
CC B8 10 E1 2F 78 8B 2B A1 7F F9 AC DE F0 BB 2B | |||
E2 66 E3 22 92 31 21 57 92 C4 B8 F2 3E 76 20 37 | |||
</pre> | </pre> | ||
== RSA PKG Meta QP == | |||
== | |||
<pre> | <pre> | ||
45 97 55 D4 22 08 5E F3 5C B4 05 7A FD AA 42 42 | |||
AD 9A 8C A0 6C BB 1D 68 54 54 6E 3E 32 E3 53 73 | |||
76 F1 3E 01 EA D3 CF EB EB 23 3E C0 BE CE EC 2C | |||
89 5F A8 27 3A 4C B7 E6 74 BC 45 4C 26 C8 25 FF | |||
34 63 25 37 E1 48 10 C1 93 A6 AF EB BA E3 A2 F1 | |||
3D EF 63 D8 F4 FD D3 EE E2 5D E9 33 CC AD BA 75 | |||
5C 85 AF CE A9 3D D1 A2 17 F3 F6 98 B3 50 8E 5E | |||
F6 EB 02 8E A1 62 A7 D6 2C EC 91 FF 15 40 D2 E3 | |||
</pre> | </pre> | ||
== | == Index.dat Key (Portability) == | ||
<pre> | <pre> | ||
key : EE D5 A4 FF E8 A3 C9 10 DC 1B FD 6A AF 13 82 25 0B 38 0D BA E5 04 5D 23 05 69 47 3F 46 B0 7B 1F | |||
iv : 3A CB 38 C1 EC 12 11 9D 56 92 9F 49 F7 04 15 FF | |||
</pre> | </pre> | ||
* flag is 8 | |||