Editing Keys
Jump to navigation
Jump to search
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 1: | Line 1: | ||
= | = Syscon Keys = | ||
== | == Devkit == | ||
=== Full Firmware === | |||
== | |||
AES-CBC-128 | |||
<pre> | <pre> | ||
Key = 5301C28824B57137A819C042FC119E3F | |||
IV = 0000000000000000 | |||
</pre> | </pre> | ||
* | Used for: | ||
* 40000001 (BLNK) | |||
* 40000002 (BASE) | |||
* 40000003 (SYST) | |||
<br> | |||
< | |||
AES-CMAC-128 | |||
<pre> | <pre> | ||
Key = 8F215691AC7EF6510239DD32CC6A2394 | |||
</pre> | </pre> | ||
Used to generate the AES-CMAC-128 at the start of decrypted 40000001, 40000002 and 40000003, by digesting the remainder of the decrypted data | |||
=== SNVS? === | |||
== | |||
AES-CBC-128 | |||
<pre> | <pre> | ||
Key = 82D4EEE9E7F68EFBC43C3D2747E4139F | |||
IV = 0000000000000000 | |||
</pre> | </pre> | ||
Used for: | |||
* 40000001 (BLNK) | |||
< | <br> | ||
AES-CMAC-128 | |||
<pre> | <pre> | ||
Key = 4C49DC8DF6A20E1592F9E9F7442B4261 | |||
</pre> | </pre> | ||
Used to generate the AES-CMAC-128 at the start of decrypted 40000001, by digesting the remainder of the decrypted data | |||
< | <br> | ||
AES-CBC-128 | AES-CBC-128 | ||
<pre> | <pre> | ||
Key = | Key = DB603053A4D3119149996D0BA84434E2 | ||
IV = 0000000000000000 | |||
IV = | |||
</pre> | </pre> | ||
Used for: | Used for: | ||
* 40000002 (BASE) | * 40000002 (BASE) | ||
<br> | <br> | ||
Line 1,967: | Line 60: | ||
AES-CMAC-128 | AES-CMAC-128 | ||
<pre> | <pre> | ||
Key = | Key = B3A8CB797D1406658372A92B6CFB3490 | ||
</pre> | </pre> | ||
Used to generate the AES-CMAC-128 at the start of decrypted | Used to generate the AES-CMAC-128 at the start of decrypted 40000002, by digesting the remainder of the decrypted data | ||
== Retail | == Retail == | ||
=== Patch Firmware | === Patch Firmware === | ||
AES-CBC-128 | AES-CBC-128 | ||
<pre> | <pre> | ||
Key = EF90B21B31452379068E3041AAD8281E | Key = EF90B21B31452379068E3041AAD8281E | ||
IV = 0000000000000000 | |||
IV = | |||
</pre> | </pre> | ||
Line 1,996: | Line 88: | ||
Used to generate the AES-CMAC-128 at the start of decrypted 40010001 and 40010002, by digesting the remainder of the decrypted data | Used to generate the AES-CMAC-128 at the start of decrypted 40010001 and 40010002, by digesting the remainder of the decrypted data | ||
= | === SNVS? === | ||
== | |||
AES-CBC-128 | |||
<pre> | <pre> | ||
Key = 8BF074CCA3D9C398142256D7DD1A1259 | |||
IV = 0000000000000000 | |||
</pre> | </pre> | ||
AES-CMAC-128 | |||
<pre> | <pre> | ||
Key = 4065918EB339184DAACCD61B30B5FB59 | |||
</pre> | </pre> | ||
=== | === AUTH #1 === | ||
RSA-2048 | |||
<pre> | <pre> | ||
Modulus = C1653D76057907FBD28AFBC559C23C58 | |||
03A0CD505613C5878E91D90BB6B4CBA4 | |||
513F54A0F52140B0A38C15C24DCC59EB | |||
605618D020B4A21A34C99915DA5A589D | |||
793F58CB6EA82666D272145B62F203ED | |||
87840C844842CA773EDFC581BCAABFFB | |||
4AA4EEED08F6695CAA2C13EC30FA1CE3 | |||
9FCDCDCBA7CDD9C68BA1329D18F89842 | |||
Exponent = 0x10001 | |||
</pre> | </pre> | ||
Used | Used for UART communications | ||
=== | === AUTH #2 === | ||
RSA-2048 | |||
<pre> | <pre> | ||
Modulus = 46228A1F1EB57D08E5A52DE51CC3E3D2 | |||
FF96AE61BE0F9E8F996CCDA8C76D66A9 | |||
5DCE0C18FBF86BC27050DB6565F681AA | |||
6670D8F4E626192DEB591E57E99B3325 | |||
297146188EDB6D654ED7F61B5A11532D | |||
87AE562A76EEC16FEC4B1E92977F730D | |||
3D44DB9FB11A4FF07281456D0CFEB30A | |||
123995FE7C72FB5FCC249FB095704ECB | |||
Exponent = 0x10001 | |||
</pre> | </pre> | ||
Used for UART communications | |||
=== | === Unknown #1 === | ||
RSA-2048 | |||
<pre> | <pre> | ||
Modulus = 7BB325CEDD2FE9C1F8C987E0BC175D5F | |||
F99FEBBB45E96793AFBF5727E276F234 | |||
91D82CAD483FA77E917C5DD589D28049 | |||
6D24A0BEBBCBF10D6BB75EC621272886 | |||
EFDA5C481DCBC8A9AD6AD776E7D6DFE6 | |||
A06ACD1BC0D6704455D10D363DBD2497 | |||
E6723F94A98AC31FF7DD7AE72CA75427 | |||
CF7A1E55D145E4E331D7CEDCC27DCEF9 | |||
Exponent = 0x10001 | |||
</pre> | </pre> | ||
Used for UART communications | |||
=== Unknown #2 === | |||
RSA-2048 | |||
<pre> | <pre> | ||
Modulus = 23C4F66168B060AB37DCBEB26012D3C5 | |||
B1932E9E7DCB4BC7C4E566BE5DC1F5CA | |||
B185F63280ED4FB078111C186DC52F00 | |||
82502D3D37F366C61A2B92BE2630049D | |||
F8ECC33BDD6A21380E53505E3E564389 | |||
FA8EE23812463E1BA0F6A073778E853E | |||
FE263157D33F409ACEA6BCF0C4C87F1E | |||
FFB449A6C05C06BC115465357992C8BC | |||
Exponent = 0x10001 | |||
</pre> | </pre> | ||
Used for UART communications | |||
= Kernel Keys = | |||
==== | == default_suffix == | ||
Used as suffix to symbol names when hashing with SHA256 to create a NID. | |||
<pre> | <pre> | ||
51 8D 64 A6 35 DE D8 C1 E6 B0 39 B1 C3 E5 52 30 | |||
</pre> | </pre> | ||
== Crash Dump KeySeed == | |||
=== Retail === | |||
==== | ==== s_kd ==== | ||
<pre> | <pre> | ||
8F 86 DD ED CB F2 4A 44 EB 6C 30 60 7A A2 6F 76 | |||
</pre> | </pre> | ||
==== s_kc ==== | |||
<pre> | <pre> | ||
41 25 71 5A AB 8B 78 E5 69 F5 12 E6 5C A6 2D D3 | |||
</pre> | </pre> | ||
* algo used is aes cbc | |||
== | == Sealed Key Values == | ||
AES | === Retail === | ||
Key: AES CFB 128<br> | |||
Hash: SHA 256 HMAC<br><br> | |||
Keyset 1<br> | |||
<pre> | <pre> | ||
Key: B5DAEFFF39E6D90ECA7DC5B029A8153E | |||
</pre> | </pre> | ||
<pre> | <pre> | ||
Hash: 8707960A53468D6C843B3DC9624E22AF | |||
</pre> | </pre><br> | ||
Keyset 2<br> | |||
<pre> | <pre> | ||
Key: EC0D347E2A7657471F1FC33E9E916FD4 | |||
</pre> | </pre> | ||
<pre> | <pre> | ||
Hash: A6D6583D3217E87D9BE9BCFC4436BE4F | |||
</pre> | </pre><br> | ||
Keyset 3<br> | |||
<pre> | <pre> | ||
Key: 51D8BFB4E387FB4120F081FE33E4BE9A | |||
</pre> | </pre> | ||
<pre> | <pre> | ||
Hash: FFF9BDEA803B14824C61850EBB084EE9 | |||
</pre> | </pre><br> | ||
Keyset 4<br> | |||
<pre> | <pre> | ||
Key: 346B5D231332AC428A44A708B1138F6D | |||
</pre> | </pre> | ||
<pre> | <pre> | ||
Hash: 5DC6B8D1A3A0741852A7D44268714824 | |||
</pre> | </pre> | ||
Dumped with getSealedKeySecret on 5.05 | |||
== Vtrm Cipher Init Keys == | |||
=== hmac_key_seed === | |||
<pre> | <pre> | ||
87 FB 19 BB F3 D4 D6 B1 B0 ED 22 6E 39 CC 62 1A | |||
37 FA 4E D2 B6 61 8B 59 B3 4F 77 0F BB 92 94 7B | |||
</pre> | </pre> | ||
=== iv === | |||
<pre> | <pre> | ||
00 | 00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF | ||
</pre> | </pre> | ||
=== | === aes_key_seed === | ||
<pre> | <pre> | ||
B0 ED 22 6E 39 CC 62 1A 37 FA 4E D2 B6 61 8B 59 | |||
DB F0 7E 82 FF FF FF FF 47 F1 7E 82 FF FF FF FF | |||
81 F1 7E 82 FF FF FF FF BB F1 7E 82 FF FF FF FF | |||
F5 F1 7E 82 FF FF FF FF 37 F2 7E 82 FF FF FF FF | |||
79 F2 7E 82 FF FF FF FF A9 F2 7E 82 FF FF FF FF | |||
DA F2 7E 82 FF FF FF FF 07 F3 7E 82 FF FF FF FF | |||
47 F3 7E 82 FF FF FF FF 00 00 00 00 00 00 00 00 | |||
</pre> | </pre> | ||
== | == Keystone files Keys == | ||
=== | === keystone_passcode_secret === | ||
<pre> | <pre> | ||
C7 44 05 F6 74 24 BA 34 2B C1 27 62 51 BB C2 F5 55 F1 60 25 B6 A1 B6 71 47 80 DB AE C8 52 FA 2F | |||
</pre> | </pre> | ||
=== | === keystone_ks_secret === | ||
<pre> | <pre> | ||
78 3D 6F 3A E9 1C 0E 07 12 FC AA B7 95 0B DE 06 85 5C F7 A2 2D CD BD E1 27 E9 BF CB AD 0F F0 FE | |||
</pre> | </pre> | ||
= ShellCore Keys = | = ShellCore Keys = | ||
== Trophy Debug Key == | |||
<pre> | <pre> | ||
02 CC D3 46 B4 59 CB 83 50 5E 8E 76 0A 44 D4 57 | |||
</pre> | </pre> | ||
== Retail | == Trophy Retail Key == | ||
<pre> | <pre> | ||
21 F4 1A 6B AD 8A 1D 3E CA 7A D5 86 C1 01 B7 A9 | |||
</pre> | </pre> | ||
== RSA PKG Meta P == | |||
<pre> | <pre> | ||
F9 67 AD 99 12 31 0C 56 A2 2E 16 1C 46 B3 4D 5B | |||
43 BE 42 A2 F6 86 96 80 42 C3 C7 3F C3 42 F5 87 | |||
49 33 9F 07 5D 6E 2C 04 FD E3 E1 B2 AE 0A 0C F0 | |||
C7 A6 1C A1 63 50 C8 09 9C 51 24 52 6C 5E 5E BD | |||
1E 27 06 BB BC 9E 94 E1 35 D4 6D B3 CB 3C 68 DD | |||
68 B3 FE 6C CB 8D 82 20 76 23 63 B7 E9 68 10 01 | |||
4E DC BA 27 5D 01 C1 2D 80 5E 2B AF 82 6B D8 84 | |||
B6 10 52 86 A7 89 8E AE 9A E2 89 C6 F7 D5 87 FB | |||
</pre> | </pre> | ||
== | == RSA PKG Meta Q == | ||
<pre> | <pre> | ||
D7 A1 0F 9A 8B F2 C9 11 95 32 9A 8C F0 D9 40 47 | |||
F5 68 A0 0D BD C1 FC 43 2F 65 F9 C3 61 0F 25 77 | |||
54 AD D7 58 AC 84 40 60 8D 3F F3 65 89 75 B5 C6 | |||
2C 51 1A 2F 1F 22 E4 43 11 54 BE C9 B4 C7 B5 1B | |||
05 0B BC 56 9A CD 4A D9 73 68 5E 5C FB 92 B7 8B | |||
0D FF F5 07 CA B4 C8 9B 96 3C 07 9E 3E 6B 2A 11 | |||
F2 8A B1 8A D7 2E 1B A5 53 24 06 ED 50 B8 90 67 | |||
B1 E2 41 C6 92 01 EE 10 F0 61 BB FB B2 7D 4A 73 | |||
</pre> | </pre> | ||
==== | == RSA PKG Meta Modulus == | ||
<pre> | <pre> | ||
D2 12 FC 33 5F 6D DB 83 16 09 62 8B 03 56 27 37 | |||
82 D4 77 85 35 29 39 2D 52 6B 8C 4C 8C FB 06 C1 | |||
84 5B E7 D4 F7 BC D2 4E 62 45 CD 2A BB D7 77 76 | |||
45 36 55 27 3F B3 F5 F9 8E DA 4B EF AA 59 AE B3 | |||
9B EA 54 98 D2 06 32 6A 58 31 2A E0 D4 4F 90 B5 | |||
0A 7D EC F4 3A 9C 52 67 2D 99 31 8E 0C 43 E6 82 | |||
FE 07 46 E1 2E 50 D4 1F 2D 2F 7E D9 08 BA 06 B3 | |||
BF 2E 20 3F 4E 3F FE 44 FF AA 50 43 57 91 69 94 | |||
49 15 82 82 E4 0F 4C 8D 9D 2C C9 5B 1D 64 BF 88 | |||
8B D4 C5 94 E7 65 47 84 1E E5 79 10 FB 98 93 47 | |||
B9 7D 85 12 A6 40 98 2C F7 92 BC 95 19 32 ED E8 | |||
90 56 0D 65 C1 AA 78 C6 2E 54 FD 5F 54 A1 F6 7E | |||
E5 E0 5F 61 C1 20 B4 B9 B4 33 08 70 E4 DF 89 56 | |||
ED 01 29 46 77 5F 8C B8 A9 F5 1E 2E B3 B9 BF E0 | |||
09 B7 8D 28 D4 A6 C3 B8 1E 1F 07 EB B4 12 0B 95 | |||
B8 85 30 FD DC 39 13 D0 7C DC 8F ED F9 C9 A3 C1 | |||
</pre> | </pre> | ||
==== | == RSA PKG Meta Private Key == | ||
<pre> | <pre> | ||
32 D9 03 90 8F BD B0 8F 57 2B 28 5E 0B 8D B3 EA | |||
5C D1 7E A8 90 88 8C DD 6A 80 BB B1 DF C1 F7 0D | |||
AA 32 F0 B7 7C CB 88 80 0E 8B 64 B0 BE 4C D6 0E | |||
9B 8C 1E 2A 64 E1 F3 5C D7 76 01 41 5E 93 5C 94 | |||
FE DD 46 62 C3 1B 5A E2 A0 BC 2D EB C3 98 0A A7 | |||
B7 85 69 70 68 2B 64 4A B3 1F CC 7D DC 7C 26 F4 | |||
77 F6 5C F2 AE 5A 44 2D D3 AB 16 62 04 19 BA FB | |||
90 FF E2 30 50 89 6E CB 56 B2 EB C0 91 16 92 5E | |||
30 8E AE C7 94 5D FD 35 E1 20 F8 AD 3E BC 08 BF | |||
C0 36 74 9F D5 BB 52 08 FD 06 66 F3 7A B3 04 F4 | |||
75 29 5D E9 5F AA 10 30 B2 0F 5A 1A C1 2A B3 FE | |||
CB 21 AD 80 EC 8F 20 09 1C DB C5 58 94 C2 9C C6 | |||
CE 82 65 3E 57 90 BC A9 8B 06 B4 F0 72 F6 77 DF | |||
98 64 F1 EC FE 37 2D BC AE 8C 08 81 1F C3 C9 89 | |||
1A C7 42 82 4B 2E DC 8E 8D 73 CE B1 CC 01 D9 08 | |||
70 87 3C 44 08 EC 49 8F 81 5A E2 40 FF 77 FC 0D | |||
</pre> | </pre> | ||
== | == RSA PKG Meta DP == | ||
<pre> | <pre> | ||
52 CC 2D A0 9C 9E 75 E7 28 EE 3D DE E3 45 D1 4F | |||
94 1C CC C8 87 29 45 3B 8D 6E AB 6E 2A A7 C7 15 | |||
43 A3 04 8F 90 5F EB F3 38 4A 77 FA 36 B7 15 76 | |||
B6 01 1A 8E 25 87 82 F1 55 D8 C6 43 2A C0 E5 98 | |||
C9 32 D1 94 6F D9 01 BA 06 81 E0 6D 88 F2 24 2A | |||
25 01 64 5C BF F2 D9 99 67 3E F6 72 EE E4 E2 33 | |||
5C F8 00 40 E3 2A 9A F4 3D 22 86 44 3C FB 0A A5 | |||
7C 3F CC F5 F1 16 C4 AC 88 B4 DE 62 94 92 6A 13 | |||
</pre> | </pre> | ||
== RSA PKG Meta DQ == | |||
=== | |||
<pre> | <pre> | ||
7C 9D AD 39 E0 D5 60 14 94 48 19 7F 88 95 D5 8B | |||
80 AD 85 8A 4B 77 37 85 D0 77 BB BF 89 71 4A 72 | |||
CB 72 68 38 EC 02 C6 7D C6 44 06 33 51 1C C0 FF | |||
95 8F 0D 75 DC 25 BB 0B 73 91 A9 6D 42 D8 03 B7 | |||
68 D4 1E 75 62 A3 70 35 79 78 00 C8 F5 EF 15 B9 | |||
FC 4E 47 5A C8 70 70 5B 52 98 C0 C2 58 4A 70 96 | |||
CC B8 10 E1 2F 78 8B 2B A1 7F F9 AC DE F0 BB 2B | |||
E2 66 E3 22 92 31 21 57 92 C4 B8 F2 3E 76 20 37 | |||
</pre> | </pre> | ||
== RSA PKG Meta QP == | |||
<pre> | <pre> | ||
45 97 55 D4 22 08 5E F3 5C B4 05 7A FD AA 42 42 | |||
AD 9A 8C A0 6C BB 1D 68 54 54 6E 3E 32 E3 53 73 | |||
76 F1 3E 01 EA D3 CF EB EB 23 3E C0 BE CE EC 2C | |||
89 5F A8 27 3A 4C B7 E6 74 BC 45 4C 26 C8 25 FF | |||
34 63 25 37 E1 48 10 C1 93 A6 AF EB BA E3 A2 F1 | |||
3D EF 63 D8 F4 FD D3 EE E2 5D E9 33 CC AD BA 75 | |||
5C 85 AF CE A9 3D D1 A2 17 F3 F6 98 B3 50 8E 5E | |||
F6 EB 02 8E A1 62 A7 D6 2C EC 91 FF 15 40 D2 E3 | |||
</pre> | </pre> | ||
== | == Index.dat Key (Portability) == | ||
<pre> | <pre> | ||
key : EE D5 A4 FF E8 A3 C9 10 DC 1B FD 6A AF 13 82 25 0B 38 0D BA E5 04 5D 23 05 69 47 3F 46 B0 7B 1F | |||
iv : 3A CB 38 C1 EC 12 11 9D 56 92 9F 49 F7 04 15 FF | |||
</pre> | </pre> | ||
* flag is 8 | |||