Editing Keys

Jump to navigation Jump to search
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 1: Line 1:
See also [https://www.psdevwiki.com/ps5/Keys PS5 Keys].
= PSVR Keys =


= System modules keysets revisions =
== ./cache_key.bin Container ==
 
<pre>
The major keyset is at offset 0xA in System Modules (waiting to be more precise).
BD 9C 8F E6 5D 99 05 41 A6 B7 17 55 7D 1E 11 3C
 
C8 9C 64 FC C6 4E 6B 2D 92 2A 81 03 A7 D9 49 CB
{| class="wikitable"
2F FD D2 F2 B1 A2 E6 2D 25 04 29 50 C3 1A 5B B3
|+ PS4 system modules keysets revisions
18 A1 40 25 E5 E4 B5 81 35 62 90 96 55 6A E6 E0
|-
3D 56 44 6E 46 C9 2E 84 71 F5 AE DC 43 A2 DA 25
! Keyset Major !! Keyset Minor !! PS4 System Software Version
1E 89 27 09 B1 6F 2F C3 79 55 2E 7E B1 BB 78 DE
|-
06 AA EC 6B 1F 65 01 68 CB 10 EC CB 7E 31 E6 D5
| 0 || 0 || 1.00-3.70
18 36 76 18 73 A1 D5 22 8D 99 DE 75 11 0A A4 5C
|-
99 B8 C7 E8 40 B6 E3 74 B1 D2 57 CC F1 E0 3F 21
| 0 || 1 || 4.00-4.07
90 90 00 B0 62 1E 08 DE A5 CD 15 F9 33 58 D2 FE
|-
82 C9 8E 02 13 1C E9 E7 E8 4B 08 BD 15 1D 2E BF
| 0 || 2 || 4.50-4.74
68 EA 23 1B D7 C4 E3 EC 96 49 A7 64 B3 43 29 22
|-
56 F4 16 64 68 6D 8B A3 AA 9B 52 33 09 F5 70 86
| 0 || 3 || 5.00-5.07
7B D9 16 2A 6B 7D C7 DB 23 AD F0 3C FF 08 B6 00
|-
BC 7C 05 31 C0 4A 9B A6 76 9A 5A 59 BB 0C 04 E6
| 0 || 4 || 5.50-5.56
5D A8 37 20 A0 69 73 3F 4E 7B 9D 25 68 7B 43 3D
|-
74 FE 35 A2 55 F4 0F 63 65 3F CE B0 32 2B 58 7D
| 0 || 5 || 6.00-6.20
48 1F A0 B1 30 06 D0 8E E4 84 A7 87 75 E9 A8 FE
|-
C5 84 7D EA E3 8A 1D DA F6 AB 7C 3E DE 02 4A 66
| 0 || 6 || 6.50-6.72
53 E4 39 32 CD 8C D5 C4 5C 1C 2C 07 0A 18 31 84
|-
2D 5B 7F 90 99 1D 28 D3 59 78 48 C2 78 CE FD A7
| 0 || 7 || 7.00-7.02
C3 C1 A3 19 E6 44 4D 86 57 19 19 2B 47 BB E5 64
|-
AE 43 9B D3 02 D6 B3 91 81 22 4A B5 7A 9A 7C 31
| 0 || 8 || 7.50-7.55
C5 5A 37 E5 B1 F6 5C 5B 10 33 3E 47 42 B6 42 C7
|-
80 C6 1E 0A C3 46 B2 96 B5 5D 91 3C 4D E9 88 2D
| 0 || 9 || 8.00-8.03
36 03 A8 1B C6 54 27 92 8B 2C 04 2B 61 9E 8A E7
|-
55 B3 1B 23 EF 7E 59 AF 6C F1 72 14 D3 40 33 96
| 0 || 10 || 8.50-5.82
1E 28 31 53 78 1E 6D CF 0D A8 50 1C BB BD 55 9C
|-
C5 E7 B4 32 01 70 A4 EC A3 43 F0 0F 5F 96 B0 A2
| 0 || 11 || 9.00-9.04
71 DF 96 DA 3B C4 DD 1F 7F 1A 5F 14 1F 50 BD E0
|-
96 23 59 D1 99 6C F5 F1 20 AA F9 46 5D A7 78 B9
| 0 || 12 || 9.50-9.60
B2 39 F1 E9 F3 81 A3 6D 0A E0 BA 84 55 45 20 B4
|-
B8 5E B7 8E 6A 38 2A 7A EA 9B 2B 8D A1 C9 1D 21
| 0 || 13 || 10.00-10.01
78 00 9D 2F 5E BC DC 10 5D 70 8A 7F 36 3E C4 05
|-
95 BA EB C9 D1 3D 63 A0 1F 39 88 A5 4C 7B 3D 97
| 0 || 14 || 10.50-10.70
9C 6B B2 D3 EC 1C 80 7E CD BE 18 F9 58 98 0F 48
|-
4F F0 A0 1F 46 09 92 E4 08 AC 9E 2C 63 B5 65 7A
| 0 || 15 || 11.00-11.02
E5 12 20 23 AB FC 92 42 2F C7 6E 2B EE 99 E4 13
|-
46 94 C6 ED 9A 7B 15 95 BF F0 CB FC 9D 78 F4 D6
| 1 || 0 || 11.50-11.52
B9 EC 2E 4A 20 46 0E 26 6F 9C 17 09 E6 7D 41 B0
|-
02 72 FE 8A 38 5C C0 18 6C 59 36 2D 2F 21 DF 6E
| 1 || 1 || 12.00
AE 0A 4C F7 24 95 7D 6F 77 7B F2 43 C0 9D D3 8B
|}
DF 01 E7 6E 65 C5 46 BA B3 E5 9E 04 5A 60 91 E7
 
6B 5E 1D BD FC B4 1D 26 C7 6C 28 02 C4 94 BE 6F
= Southbridge firmware keysets revisions =
C7 C5 EC 12 A5 36 03 02 9B FD 9D 68 76 F1 A6 E1
 
03 25 05 5E BE 13 4D 3A 64 0C E1 6A C6 C7 21 4F
This section should be explained: meaning if the firmware indexes if possible (Aeolia, Belize, Baikal, Belize2, etc.).
F0 04 0D 36 99 FB 62 13 2C 5D 06 D1 FF 3C 57 F1
 
C3 B4 B5 CC EC 99 1D A4 41 5E 90 D5 D1 FF 40 B6
{| class="wikitable"
99 FA AF 65 2C F8 9F 1F 19 CD D6 91 1F B9 06 A6
|+ PS4 southbridge firmware keysets revisions
C2 B2 75 48 6A EF 73 B9 AA 40 78 0B 14 13 36 83
|-
67 86 47 64 CE E5 B4 EB 27 B2 43 25 64 2B 56 9C
! Firmware index !! Keyset
86 F9 93 11 BD C0 5C B5 72 0B F2 63 83 CF 60 A7
|-
EA 81 59 80 5B A9 E3 C5 70 7C 63 7F C9 82 0C F3
| 1 || obsolete
B1 B4 FC 91 79 E9 57 96 D7 CB CB 44 BD FB 47 7C
|-
04 7A 83 42 A5 71 D0 E9 88 FC E1 DC DC D4 7B 38
| 13 || 0x10000
35 5A 66 0B FE 7E A6 F9 57 6F 76 63 30 0F 22 E6
|-
F7 7B
| 32/40 || 0x20000
|-
| 36 || 0x30000
|-
| 42 || 0x40000
|}
 
= PSVR Keys =
 
== HowTo ==
 
<pre>
./ps4encdec keyvault/factory_setting_key.bin psvr_emmc_dump/mmc/1.慦瑣牯役敳瑴湩g.img factory_setting 0
./ps4encdec keyvault/rootfs_key.bin psvr_emmc_dump/mmc/6.潲瑯獦.img rootfs 0
./ps4encdec keyvault/firmware_key.bin psvr_emmc_dump/mmc/7.楦浲慷敲.img firmware 0
./ps4encdec keyvault/ta_storage_key.bin psvr_emmc_dump/mmc/8.牴獵整彤瑳牯条e.img trusted_storage 0
./ps4encdec keyvault/rootfs_key.bin psvr_emmc_dump/mmc/9.潲瑯獦㉟.img rootfs2 0
./ps4encdec keyvault/cache_key.bin psvr_emmc_dump/mmc/11.慣档e.img cache 0
./ps4encdec keyvault/firmware_key.bin psvr_emmc_dump/mmc/13.楦浲慷敲㉟.img firmware2 0
./ps4encdec keyvault/userdata_key.bin psvr_emmc_dump/mmc/14.獵牥慤慴.img userdata 0
./ps4encdec keyvault/factory_fw_key.bin psvr_emmc_dump/mmc/15.慦瑣牯役睦.img factory_fw 0
</pre>
 
== Notes ==
 
<pre>
Filesystems
Part    Name              XTS Key                                Notes
boot0, boot1                                                      bootloader files with fallback partition
p1      fts                                                        Android-style key-value storage for environment
p2      factory_setting    factory_setting_key.bin                Global and per-device key stores, all encrypted per-device
p3      tzk_recovery                                              FIGO image (recovery TZK and TZBP)
p4      recovery                                                  FIGO image (recovery bootimg)
p5      tzk_normal                                                FIGO image (TZK and TZBP)
p6      boot                                                      FIGO image (bootimg)
p7      rootfs              rootfs_key.bin   
p8      firmware            firmware_key.bin                      Empty linux-firmware tree
p9      trusted_storage    ta_storage_key.bin                    Unused, but seems to have garbage in non-allocated sectors
p10    rootfs_2            rootfs_key.bin                        rootfs fallback
p11    boot_2                                                    FIGO images (boot fallback)
p12    cache              cache_key.bin                          Empty
p13    tzk_normal_2                                              FIGO images (tzk_normal fallback)
p14    firmware_2          firmware_key.bin                      linux-firmware fallback
p15    userdata            userdata_key.bin                      Contains persisted runtime logs
p16    factory_fw          factory_fw_key.bin                    Stores DFU files for provisioning
</pre>
 
* All containers are XTS keys (data at 0x0, tweak at 0x10)
 
== kcrs_key.bin ==
 
<pre>
8E A1 C8 28 C1 27 C4 67 A9 5A A9 13 D1 36 87 D6
</pre>
 
== cache_key.bin Container ==
 
<pre>
BD 9C 8F E6 5D 99 05 41 A6 B7 17 55 7D 1E 11 3C
C8 9C 64 FC C6 4E 6B 2D 92 2A 81 03


= Static KeySlots =
== In Shellcore ==


This section should be more precise: static in which sense, which keyslots, if there are known keyslots, etc.
<pre>
 
0x08 Index.dat
{| class="wikitable sortable"
0x0D Hostnames
|-
0x10 SystemLogger
! Slot !! Size !! Key !! Static? !! Notes
|-
| 0x43 || 0x10 || <pre>6B 98 18 FF 35 16 7D 30 90 09 0A A4 22 D6 80 57</pre> || {{yes}} || Unknown usage. Same from two PS4 5.05 identical dumps.
|-
| 0x44 || 0x10 || <pre>50 5E 2D 39 EB 32 E5 FC E9 DE E1 F8 0D 9E ED 26</pre> || {{yes}} || Unknown usage. Same from two PS4 5.05 identical dumps.
|-
| 0x50 || 0x10 || <pre>50 7E 2C 58 77 B3 A0 F3 DE 7B 96 A4 F3 8E FE FF</pre> || {{yes}} || Unknown usage. Same from two PS4 5.05 identical dumps.
|-
| 0x52 || 0x10 || <pre>F4 E6 20 AE EE 53 37 73 85 03 D3 64 01 7D AA 29</pre> || {{yes}} || Unknown usage. Same from two PS4 5.05 identical dumps.
|-
| 0x67 || 0x10 || <pre>B2 EB AB D9 2C 2D 12 BE 12 C1 1E BD C7 2D 90 36</pre> || {{yes}} || Unknown usage. Same from two PS4 5.05 identical dumps.
|-
| 0x71 || 0x10 || <pre>87 DB 4C 5C 56 29 1F 3D 4D 60 2E C4 09 50 3A FE</pre> || {{yes}} || Unknown usage. Same from two PS4 5.05 identical dumps.
|-
| 0x15A || 0x10 || <pre>1A F9 22 3E 6C C0 A3 C8 7E CC C6 52 74 19 13 72</pre> || {{yes}} || Unknown usage. Same from two PS4 5.05 identical dumps.
|-
| 0x15B || 0x10 || <pre>2D D7 7F D0 38 BF 67 4C FC 60 73 A9 E7 B6 17 76</pre> || {{yes}} || Unknown usage. Same from two PS4 5.05 identical dumps.
|}
 
= Portability EncDec Keys =
 
Keys of type I are probably used for TestKit/DevKit files and for internal consoles whilst type E are used for retail files.
 
== Portability EncDec Keys Usage in OS ==
 
=== Nowhere known ===
 
<pre>
0xA Unknown
</pre>
 
=== In [[Kernel]] ===
 
<pre>
0x0 pfsSKKey__SecKey
0xC CFK1
0x14 SCEROOTPARAM_KEY
0x1C SCECloudSD___KEY
0x20 sbl_srv_ioctl
0x24 SCE_LwUtoken_Key
0x28 SCE_SBL_BAR_KEY1
0x44 livedump_secure
0x48 SceHidAuth
0x4C SCE_KDF_NCDT_PSK (as seen on PS4 System Software version 7.55)
0x50 SIEIPMISceIpmiMgrEQSx (as seen on PS4 System Software version 7.55)
0x54 pfs_sbl (as seen on PS4 System Software version 7.55)
0x58 sceSblPfsSaveDataUpdateAuthCode (as seen on PS4 System Software version 7.55)
</pre>
 
=== In [[SceShellCore]] ===
 
<pre>
0x8 Index.dat
0xD Hostnames
0x10 SystemLogger
0x3C GetOpenPsIdHash
0x3C GetOpenPsIdHash
0x40 Envelope Files
0x40 envelope keys
</pre>
</pre>


=== In [[NPXS20001]] ===
== In NPXS20001 ==


<pre>
<pre>
0x8
0x08
0x40
0x40
</pre>
</pre>


=== In [[NPXS20120]] ===
== In NPXS20120 ==


<pre>
<pre>
Line 1,124: Line 994:
</pre>
</pre>


=== In [[NPXS21000]] ===
== In NPXS21000 ==


<pre>
<pre>
Line 1,130: Line 1,000:
</pre>
</pre>


=== In [[coredump.elf]] ===
== In coredump.elf ==


<pre>
<pre>
0x8
0x08
</pre>
</pre>


=== In [[libtsmp.sprx]] ===
== In libtsmp.sprx ==


<pre>
<pre>
0x8
0x08
</pre>
</pre>


=== In [[libSceSystemService.sprx]] ===
== in libSceSystemService.sprx ==


<pre>
<pre>
Line 1,148: Line 1,018:
</pre>
</pre>


=== In [[swagner.self]] ===
== in swagner.self ==


<pre>
<pre>
Line 1,154: Line 1,024:
</pre>
</pre>


=== In [[swreset.self]] ===
== in swreset.self ==


<pre>
<pre>
Line 1,160: Line 1,030:
</pre>
</pre>


=== In [[ScePlayReady2.self]] ===
== in ScePlayReady2.self ==


<pre>
<pre>
Line 1,166: Line 1,036:
</pre>
</pre>


== Encrypted and Plaintext Portability Keys ==
== AES PORTABLE 0x0==


=== 0x0 - pfsSKKey__SecKey ===
* pfsSKKey__SecKey
* iv is F60016BACD42AD21C70D9B075CB51983


Used for [[PFS]] encryption/decryption of [[Save Data]] and [[Trophy]].
===E===


==== AES ====
type E:
<pre>
<pre>
9EA5CD89DA8DAB6E66CE6D345752639D
9EA5CD89DA8DAB6E66CE6D345752639D
Line 1,180: Line 1,048:
</pre>
</pre>


type I:
===I===
<pre>
<pre>
6CEDCF30A30306F3AAE52B51B93726FD
6CEDCF30A30306F3AAE52B51B93726FD
Line 1,186: Line 1,054:
</pre>
</pre>


==== HMAC ====
== HMAC PORTABLE 0x0==
 
===E===


type E:
<pre>
<pre>
D8808616FA98B0BF50A499D5FA5DCCA7
D8808616FA98B0BF50A499D5FA5DCCA7
</pre>
</pre>


type I:
===I===
 
<pre>
<pre>
096459F1A0C8C5DDDD404E40A4CEBF6C
096459F1A0C8C5DDDD404E40A4CEBF6C
</pre>
</pre>


==== PFS Sealed Key Keys ====
== AES PORTABLE 0x4==
 
After decrypting with portability the keyset 1, types E or I giving the same result, one obtains:


<pre>
<pre>
00000000  70 66 73 53 4b 4b 65 79  5f 5f 53 65 63 4b 65 79  |pfsSKKey__SecKey|
231D69F73D12C55164D5A40A10DB5170
00000010  b5 da ef ff 39 e6 d9 0e  ca 7d c5 b0 29 a8 15 3e  |....9....}..)..>|
4DF980998A155CE381966E6521C572C6
00000020  87 07 96 0a 53 46 8d 6c  84 3b 3d c9 62 4e 22 af  |....SF.l.;=.bN".|
00000030  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
*
00000080
</pre>
</pre>


* pfsSKKey__EncKey is AES-CBC-128 Key for [[Sealedkey_/_pfsSKKey]]
== HMAC PORTABLE 0x4==
* pfsSKKey__Secret is HMAC-SHA256 Key for [[Sealedkey_/_pfsSKKey]]
* It is the same keyset on Internal and External.
* A PS4 on System Software version that has keysets til N exports savedata to USB using keyset N and can import savedata from USB using any keyset <= N.
* PS4 Keysets 4 and lower were dumped with the getSealedKeySecret kernel function on System Software 5.05.


{| class="wikitable sortable" style="width: 100%"
<pre>
! style="width: 5%" | PS4 Sealed Key Revision
B3547B179154B3C9AC96304B4F9AEA73
! style="width: 25%" | PS4 System Software Version
</pre>
! style="width: 35%" | PS4 pfsSKKey__EncKey
! style="width: 35%" | PS4 pfsSKKey__Secret
|-
| 1
| >= 1.01 (maybe earlier)
| <pre>B5DAEFFF39E6D90ECA7DC5B029A8153E</pre>
| <pre>8707960A53468D6C843B3DC9624E22AF</pre>
|-
| 2
| >= 4.55 (maybe earlier)
| <pre>EC0D347E2A7657471F1FC33E9E916FD4</pre>
| <pre>A6D6583D3217E87D9BE9BCFC4436BE4F</pre>
|-
| 3
| >= 5.05 (maybe earlier)
| <pre>51D8BFB4E387FB4120F081FE33E4BE9A</pre>
| <pre>FFF9BDEA803B14824C61850EBB084EE9</pre>
|-
| 4
| >= 5.05 (maybe earlier)
| <pre>346B5D231332AC428A44A708B1138F6D</pre>
| <pre>5DC6B8D1A3A0741852A7D44268714824</pre>
|-
| 5
| >= 11.00 (maybe earlier)
| <pre>20D043852530C404D16869E07908D5E6</pre>
| <pre>2DE8DE4DE6628BB62DD5C170F565B62C</pre>
|-
| 6
| >= 11.00 (maybe earlier)
| <pre>93B7270DF0D3731060079066655D8D07</pre>
| <pre>FD44A32D8BC8AC189C1BD096402966CF</pre>
|-
| 7
| >= 11.00 (maybe earlier)
| <pre>4C7844836937508B9233DF7CD7D65165</pre>
| <pre>BC4C9F0FE5D356A05752024CBDEEC8E4</pre>
|-
| 8
| >= 11.00 (maybe earlier)
| <pre>3A32EECF749939871C3D7BF8C01C7D1F</pre>
| <pre>F6F9D82182CCC2227B7D33A3B71EADE3</pre>
|-
| 9
| >= 11.00 (maybe earlier)
| <pre>EB3564047D60247F5573CDE57E0CDE1C</pre>
| <pre>298B4F591EF04E52173EEC59C5A47833</pre>
|-
| 10
| >= 11.00 (maybe earlier)
| <pre>8AD492CC5B27B5C36011A5858B909380</pre>
| <pre>006A344182B61BE56A6CD6B9466F0345</pre>
|}


==== sealedkey_key ====
== AES PORTABLE 0x5==


type E:
<pre>
<pre>
AC 81 12 EC 4B B2 E1 4D 13 57 8F 72 AC 56 F2 67
21E474E20845F868B1EADBC90C7BE001
F7 D5 CB E2 04 84 F5 2C 7F EB A5 80 FF 56 65 2C
CF7FBB1A479716EA02F8A30B23C577BB
91 D6 52 BC F2 44 8B 58 CE B7 E9 C2 47 FB C7 C0
F9 83 36 31 75 C1 25 8A 63 7A 27 B2 F8 40 1B 87
9D DA 5C 2B 48 9B 31 16 22 5F F6 25 D6 E5 CA B5
97 D3 08 69 8C 69 88 94 AC 44 8D 02 75 85 56 D1
28 76 0D B7 C7 16 E4 E2 6D 89 89 6F 3F 27 5D F7
7B E0 07 9F 3E 1A B8 38 D3 91 89 D4 7C 82 6A 6D
</pre>
</pre>


type I:
* AACS
 
== HMAC PORTABLE 0x5==
 
<pre>
<pre>
7D 72 D3 AD 98 30 8C 5B AA 86 08 2B 5A 5A 69 69
94CA4FDC575C812E9E0432459E30DB75
94 60 D3 5A 10 A6 7D 80 89 10 11 2F 14 E7 95 34
62 99 90 68 9A 84 13 9B B6 A9 40 AA C4 CB DF 3B
81 DE E5 63 9F 70 F3 18 CD 26 8C 3D DD 38 5C EA
38 6D 9C 73 E1 82 8F 0D 81 69 C3 AF 7D 72 6A 4C
87 F1 16 F3 D8 D4 27 BB 37 DC 62 71 64 82 B7 9B
0B D2 A3 B2 6A 62 3B 54 8E A7 DA D2 0B 61 62 66
C5 C9 1A 1F 78 C6 A0 A8 2E 69 13 CC 1D EB 9E 8B
</pre>
</pre>


==== sealedkey_key_IV ====
== AES PORTABLE 0x6==


type E and I:
<pre>
<pre>
F6 00 16 BA CD 42 AD 21 C7 0D 9B 07 5C B5 19 83
A48932A314C75ED5321764638B7A2FE8
9EF8ADB044C01302936910C25FD7410E
</pre>
</pre>


==== sealedkey_key_sign ====
* Css
 
== HMAC PORTABLE 0x6==


type E:
<pre>
<pre>
E0 B8 33 73 96 0E F4 46 C2 C7 04 BB 25 9B 27 DA
6E30BD54F52053CA6B68F9F23B7FD216
39 70 D0 AE EF 3E 72 62 7C D1 5E FF 8B FC FC F0
</pre>
</pre>


type I:
== AES PORTABLE 0x7==
 
<pre>
<pre>
2A E5 A0 FB C1 4F C7 34 F5 3B EB B7 13 CE B7 2D
7B626924420F5F8D7BC5CBF7BC803C27
7E 62 06 E6 09 05 AE 28 E3 5B FB D2 8E E1 EC 78
DAFA0EA507083AF6D91033548BCFB216
</pre>
</pre>


=== 0x4 ===
* BdPlus


==== AES ====
== HMAC PORTABLE 0x7==


<pre>
<pre>
231D69F73D12C55164D5A40A10DB5170
8FAA08823BF7354F0999D0D8A7F0A893
4DF980998A155CE381966E6521C572C6
</pre>
</pre>


==== HMAC ====
== AES PORTABLE 0x8==
 
===E===


<pre>
<pre>
B3547B179154B3C9AC96304B4F9AEA73
CC3C6CD60871591A5A6C6347B2100CA2
FC286633A4D9482B9313FEE574E04338
</pre>
</pre>


=== 0x5 - AACS (Bluray) ===
===I===
<pre>
331BDC5EF45CA0CADEB210DDC309C1D2
4E0059E82E1626F24A1855696BE324B2
</pre>


==== AES ====
*Index.dat
* iv is 310CC1BD68FA39AF74FB07A6C67B6CBF


<pre>
== HMAC PORTABLE 0x8==
21E474E20845F868B1EADBC90C7BE001
CF7FBB1A479716EA02F8A30B23C577BB
</pre>


==== HMAC ====
===E===


<pre>
<pre>
94CA4FDC575C812E9E0432459E30DB75
7FA3B3BA6D9456EE223EB74A2D30AA54
</pre>
</pre>


==== AACS Keys ====
===I===
 
<pre>
<pre>
0A547025878C198979548FF00BA9E445 <- Key
D820E2E7455FB1F43EE0593EDA734E9B
C0D00D285FC00870B543C1F31FAE44A8 <- IV
CD4F7C917ED4C9FE3B337EA2C60EC273
115BF5EE2659FF078C373EEDDFD4F3C7
05628DC933468421B2C88448080092B5
FD2ECD5E11264EDEDBA51D7E7B364B1C
B24216CF7D781DFB82DC866B976F4EC4 <-
B73C1037C7FED6C1315AD7C16AC8EA79 <-
</pre>
</pre>


=== 0x6 - CSS (Bluray) ===
== AES PORTABLE 0xC==


==== AES ====
===E===


<pre>
<pre>
A48932A314C75ED5321764638B7A2FE8
36902DC7BD1EC112BE122D2CD9ABEBB2
9EF8ADB044C01302936910C25FD7410E
29AA7D0164D30385733753EEAE20E6F4
</pre>
</pre>


==== HMAC ====
===I===
 
<pre>
<pre>
6E30BD54F52053CA6B68F9F23B7FD216
16BC4CCEABEA9F03D2EB670BD29630A1
882D16F707FD33FA2ABFEC130F60EEFF
</pre>
</pre>


==== CSS Keys ====
*CFK1(Crepo)
 
== HMAC PORTABLE 0xC==
 
===E===


<pre>
<pre>
0957909454D722D5FD71D02A5CCAC711 <- Key
FFFE8EF3A4967BDEF3A0B377582C7E50
C9E37A810F42EFAA2A5BE0C8E75E3D2A <- IV
75B68FB0DBEF478F3975443180095AD2 <-
EA018F41C99D65CA57190A1B4F973BED <-
2DB61C46D497A1EC092816DC1243FF5E
C86676C3A45AB182B21BF75277916BE0
548631EF9270FC6F8BCBBCAF8BA3753D
F3F472638D324ECBBA7A4D844C2CA612
</pre>
</pre>


=== 0x7 - BdPlus (Bluray) ===
===I===
 
==== AES ====


<pre>
<pre>
7B626924420F5F8D7BC5CBF7BC803C27
C3F74D676DCF7A68AA482ED8914405B7
DAFA0EA507083AF6D91033548BCFB216
</pre>
</pre>


==== HMAC ====
== AES PORTABLE 0xD==
 
===E===


<pre>
<pre>
8FAA08823BF7354F0999D0D8A7F0A893
BDA98742518157C4634A21FBB47C8311
D21CE6016404D8CB2EF0C24462C42C38
</pre>
</pre>


==== BdPlus Keys ====
===I===


<pre>
<pre>
CAC19E73A99A37649720DBA9E5B9C8E9 <- Key
8FC2405D96B41290DF62525E536E37B6
971D666C66C5BBA31B6280AC5D00A849 <- IV
42D798F0538B7FB42829C05ECBB00B08
B49740B965AACFA87DCE1218EBB1B27C <-
0CA31B024A73E030D2BB9FB3613DF147 <-
AE27A7DE70E1C1329DBC1CD0533F836D
081812B592AFCD8180C054F5F9F04616
185317D8D26C5DA45F80C358DA071BAA
F55720FC0620F54F235A5DA1C3459FB0
</pre>
</pre>


=== 0x8 - index.dat ===
*hostnames(ShellCore)


==== AES ====
== HMAC PORTABLE 0xD==


* iv is 310CC1BD68FA39AF74FB07A6C67B6CBF
===E===


type E:
<pre>
<pre>
CC3C6CD60871591A5A6C6347B2100CA2
AED0BCC3264D91A698E4D7D8CA428E52
FC286633A4D9482B9313FEE574E04338
</pre>
</pre>


type I:
===I===
<pre>
<pre>
331BDC5EF45CA0CADEB210DDC309C1D2
A43C5B248AEF15C4CEFAEA170F6F31F7
4E0059E82E1626F24A1855696BE324B2
</pre>
</pre>


==== HMAC ====
== AES PORTABLE 0x10==


type E:
===E===
<pre>
7FA3B3BA6D9456EE223EB74A2D30AA54
</pre>


type I:
<pre>
<pre>
D820E2E7455FB1F43EE0593EDA734E9B
32AF1AE6A8B408ACA7072C9364BF8A36
BA19E55263F00585EA2653311747A1E4
</pre>
</pre>


==== index.dat Key ====
===I===


Key for E and I:
<pre>
<pre>
EED5A4FFE8A3C910DC1BFD6AAF1382250B380DBAE5045D230569473F46B07B1F
05E051FEDB737FEEA2FFA6D78AAC1613
2ABAE36253F2A291C2EF0A1ACADAE1D1
</pre>
</pre>


IV for E and I:
*logger
<pre>
* iv is a1d989b020185024f4c448283537540b
3ACB38C1EC12119D56929F49F70415FF
</pre>


=== 0xA - Unknown ===
== HMAC PORTABLE 0x10==


==== Unknown 0xA Key ====
===E===


Dumped from PS4 kernel:
<pre>
<pre>
ffffff807b92b8e0  15 a0 cb 65 d6 a4 05 27  e6 1c cd da 2a ef 53 3b  |...e...'....*.S;|
E2AB163DFA812B4AA73FFB0AB4CB27E2
ffffff807b92b8f0  13 fc 7c 35 24 14 b3 54  3d c7 83 24 6e fc c9 64  |..|5$..T=..$n..d|
ffffff807b92b900  9d f8 40 9a c2 02 09 82  3c 08 61 2b e6 2a 51 79  |..@.....<.a+.*Qy|
ffffff807b92b910  cf 87 62 61 c0 85 46 c2  a5 da a1 9b d0 e7 ff 79  |..ba..F........y|
ffffff807b92b920  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff807b92b930  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff807b92b940  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff807b92b950  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
</pre>
</pre>


=== 0xC - CFK1 (Crash Report) ===
===I===
 
==== AES ====


type E:
<pre>
<pre>
36902DC7BD1EC112BE122D2CD9ABEBB2
F7B1C4722FC52AEED7AE88C7DAB14C97
29AA7D0164D30385733753EEAE20E6F4
</pre>
</pre>


type I:
== AES PORTABLE 14==
 
===E===
 
<pre>
<pre>
16BC4CCEABEA9F03D2EB670BD29630A1
3A9980C60B2752B1E5C9437C8BE0730E
882D16F707FD33FA2ABFEC130F60EEFF
057683371B0207B1B63D32412D41AAC3
</pre>
</pre>


==== HMAC ====
===I===


type E:
<pre>
<pre>
FFFE8EF3A4967BDEF3A0B377582C7E50
190C5FD353B619FFE1CEE8DEB9F828DA
60F0ADA572E1C5CB30BC259BD0818C66
</pre>
</pre>


type I:
*SCEROOTPARAM_KEY
<pre>
* iv is 9569829CD4B15FF84330545A34EC1BC5
C3F74D676DCF7A68AA482ED8914405B7
</pre>


==== crepo_key_1 ====
== HMAC PORTABLE 14==


type E:
===E===
<pre>
00000000  43 46 4b 31 00 00 00 00  00 00 00 00 00 00 00 00  |CFK1............|
00000010  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
00000020  61 9a d0 db 62 cb 51 37  d8 aa 84 d0 28 b9 92 2d  |a...b.Q7....(..-|
00000030  74 46 01 4d 5a 20 67 31  af d2 ab 62 44 d1 f5 92  |tF.MZ g1...bD...|
00000040  de 9f 35 6c 99 1b 1c 04  3d 76 cd 9f b1 a7 03 57  |..5l....=v.....W|
00000050  89 73 d9 26 a1 60 ea 72  d8 e7 33 9f b0 52 f0 e2  |.s.&.`.r..3..R..|
00000060  06 80 47 c4 d7 7a fd fd  95 72 27 8d 97 ab f4 21  |..G..z...r'....!|
00000070  aa cd 9d 9d 2a a2 30 cc  0d 37 b8 69 47 d1 6a ac  |....*.0..7.iG.j.|
00000080
</pre>


type I:
<pre>
<pre>
43 46 4B 31 00 00 00 00 00 00 00 00 00 00 00 00
38618E377454ADC8EA799376DEB01D34
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
77 B7 5A 04 C9 69 D3 FE BC 11 38 EE 2F B1 31 CC
71 E6 66 F7 D3 78 E4 F4 CD AB 35 D7 DE C4 A3 26
3B 2A 68 2C 43 06 15 CE 04 77 3D 4B A5 BC F8 7E
CF 9B CF 77 B4 8B A7 78 DE BD 09 75 BB 5B B1 27
44 A1 E3 CC EC 71 4F 10 09 48 CC 23 55 41 3C CE
11 34 1A 57 F2 34 69 F9 62 6B 2E 71 AD 17 B2 2C
</pre>
</pre>


==== crepo_key_2 ====
===I===


type E:
<pre>
<pre>
00000000  40 83 63 f3 b4 d0 4b 54  09 ba f3 f4 27 41 13 c4  |@.c...KT....'A..|
0CB1FD77B96A6815E65A1B26BF29822F
00000010  ac 97 ae 26 3b 9b 26 1c  2d 87 50 35 80 a3 e0 34  |...&;.&.-.P5...4|
00000020  f9 97 e5 b9 8c 85 9d 90  33 68 04 32 81 1b 50 21  |........3h.2..P!|
00000030  1f a4 5d 36 63 a3 50 7b  cc 68 12 7c bf 9a aa 2d  |..]6c.P{.h.|...-|
00000040  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
*
00000080
</pre>
</pre>


==== crepo_iv ====
== AES PORTABLE 18==
 
===E===


<pre>
<pre>
23 F8 85 CA 50 B2 98 0A AB 7E 88 AE 65 51 C0 BF
7D031910F9918242BD0069AACD047249
A95E1F0651AE9D14E4F7B09D0D816E56
</pre>
</pre>


==== crepo_key_1_sign_E ====
===I===
 
<pre>
<pre>
AE 41 33 01 F9 6E 1D 03 F1 D9 98 1B 2F B3 75 87
9FCEEE75F2FD4C0A57AA32FDBD4093D3
05 C0 6A 94 AD 29 34 5C ED 22 17 ED 4C 7A A3 D1
7876E4D29D621BB54E62A2756E3E9C83
</pre>
</pre>


==== crepo_key_1_sign_I ====
*swagner,swreset
 
== HMAC PORTABLE 18==
 
===E===


<pre>
<pre>
00 3F 02 7D 1A BE F2 9A BB E5 23 D7 0F 7B 55 3A
E42C03F0ABAF7DED9EF3B31461526DF1
14 F7 F0 83 14 04 05 0F 2A B5 23 DD D1 5D F4 C6
</pre>
</pre>


==== crepo_key_2_sign_E ====
===I===
 
<pre>
<pre>
E6 A0 82 8A B4 7A 8D A2 AF B4 A7 34 20 DF B7 88
0F4A79378A97768F719E29A5AE787513
F6 6B 78 E7 DF F7 17 69 43 8B 15 64 75 15 F3 33
</pre>
</pre>


==== crepo_key_2_sign_I ====
== AES PORTABLE 1C==
 
===E===


<pre>
<pre>
B1 2B 7C 5B 0E 11 18 C3 B0 F6 7B 31 80 C8 B8 F7
77684D4ACD210B03382327D4D15A88A4
B6 9E 3D 97 E5 36 47 C2 08 E0 34 43 51 0A DC 13
19BD06EEC04474EDEEB1A007C6112CEA
</pre>
</pre>


==== crepo_key_1_E ====
===I===


<pre>
<pre>
24 3F 86 77 5F 7C DA 8F 9A D4 8A 72 69 9C BC 1E
EA9F99E9ED0D33D58C81E14D30F804C4
97 6E 77 0B CE E0 C9 5C 06 CD A7 D4 FD A2 1F E4
75B1B85AF1C33E3408F4107FA78AEE05
B8 1F 78 FD 20 80 81 9B B5 4C 49 D7 12 87 18 86
CE 04 7A 2C 47 63 10 A7 FC 38 F4 C2 C9 2F 8A 38
80 E6 F4 5E F3 32 FF 11 E0 7C D5 DA 99 A9 36 72
EC BD E0 B1 E2 27 90 73 3C DD 8F B6 1B 3B E8 88
29 E6 85 EC E9 FB 4C D9 B9 53 FA D5 0D D0 73 78
6F 91 03 07 54 F6 CF 74 98 E9 4C D7 DF 8F 5F CA
</pre>
</pre>


==== crepo_key_1_I ====
*SCECloudSD___KEY
* iv is DF140F0A54E95A581B8049DAA2A9AF2B
 
== HMAC PORTABLE 1C==
 
===E===


<pre>
<pre>
8B 5B 04 14 D6 26 36 F6 86 37 DD 3A E2 8B EC FA
240299607EDB6505B68A7C8852E9305E
44 54 2C EB 14 6D 61 F7 4B 47 CF B5 6D 3F 82 F1
45 49 B1 52 50 B9 95 59 37 56 4A A5 59 A7 AC DA
CA 09 D5 04 F0 1A 23 95 E4 99 B8 D3 4A B5 41 C9
4B BE 57 53 61 BF E7 55 95 EE DC 1F 52 E3 16 C2
3E E6 2A 52 3F 17 36 A9 F2 4D 4D BD 0A 15 16 EB
3C 6B 55 0F B9 24 32 48 E0 F7 89 69 B6 D5 5C 09
31 4B 29 23 46 90 B3 1C B6 B3 CB C8 58 31 3E 65
</pre>
</pre>


==== crepo_key_2_E ====
===I===


<pre>
<pre>
E6 6C 7A 2A 1F 0F B8 B1 11 E4 23 09 48 05 0A 21
1539E66891EFC669FF9BDA34123BBE06
9A EF 3C FC 8C 23 33 55 FE 92 9D 27 37 60 72 6C
7B D2 4A 68 8A 47 F9 9A 8A 47 7C A3 11 45 1B D0
C4 B1 08 65 0A 75 6E 2A FB 67 A8 D7 F6 BD 9F 9A
D0 20 B3 66 57 71 CA 02 1C E4 4E C0 76 9B 06 AC
F4 21 90 AF 68 0E 63 CE 18 4D B2 49 9B 15 BE 4B
19 B8 00 51 CA 98 DD 3B 78 57 41 11 AE B2 D9 C6
EC C1 28 54 1C 06 B2 DB 32 4B 88 8D 6E FB 23 F0
</pre>
</pre>


=== 0xD - hostnames ===
== AES PORTABLE 20==
 
Decrypts some hostnames that [[SceShellCore]] connects to.


==== AES ====
===E===


type E:
<pre>
<pre>
BDA98742518157C4634A21FBB47C8311
071B19D53D462093E0AF664ACFA9F937
D21CE6016404D8CB2EF0C24462C42C38
2FCD0154FF04A9AE39E88EFF27823F0C
</pre>
</pre>


type I:
===I===
 
<pre>
<pre>
8FC2405D96B41290DF62525E536E37B6
D6E3473A984BB836E1637F813CA5953E
42D798F0538B7FB42829C05ECBB00B08
186EF9F184BB76DBBC64B639F50CFF02
</pre>
</pre>


==== HMAC ====
== HMAC PORTABLE 20==
 
===E===


type E:
<pre>
<pre>
AED0BCC3264D91A698E4D7D8CA428E52
8F1DFF012B1814D73F70A1BCF04EAE7F
</pre>
</pre>


type I:
===I===
 
<pre>
<pre>
A43C5B248AEF15C4CEFAEA170F6F31F7
DB801FB08E1C0DCE0B9ECC4E518AE24E
</pre>
</pre>


==== SCE_CFS_hostname (type E) ====
== AES PORTABLE 24==


Host by Amazon AWS at Portland, Oregon, 97086 United States of America. Alias of cfss.crs.playstation.net.
===E===


Zeke Jedediah Dunbar is a main character of the Infamous videogame developped by Sony Computer Entertainment America.
<pre>
3BDDF81A1FE5CFEE3DAD1835B21CFFED
C10609C5D4D1DB17333ABECAEB2EF955
</pre>


===I===
<pre>
<pre>
ffffff8085f7f8e0  53 43 45 5f 43 46 53 5f  68 6f 73 74 6e 61 6d 65  |SCE_CFS_hostname|
6E523DCAFDAFC20BDF288C8DF3F7BA97
ffffff8085f7f8f0  63 66 73 73 2e 64 75 6e  62 61 72 2e 73 63 65 61  |cfss.dunbar.scea|
146BFF1C88427E52461DA28F8D305B36
ffffff8085f7f900  2e 63 6f 6d 00 00 00 00  00 00 00 00 00 00 00 00  |.com............|
ffffff8085f7f910  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8085f7f920  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8085f7f930  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8085f7f940  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8085f7f950  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
</pre>
</pre>


==== SCE_RCR_hostname (type E) ====
*SCE_LwUtoken_Key
* iv is ED7BD631517CF4753C9DDA7A3AB859DB


Host by Amazon AWS at Portland, Oregon, 97086 United States of America. Owned by Minato-ku for Sony Computer Entertainment Inc. Network Platform Service Department at Tokyo (Japan).
== HMAC PORTABLE 24==


Zeke Jedediah Dunbar is a main character of the Infamous videogame developped by Sony Computer Entertainment America.
===E===


<pre>
<pre>
ffffff8085f7f8e0  53 43 45 5f 52 43 52 5f  68 6f 73 74 6e 61 6d 65  |SCE_RCR_hostname|
7D10C415D0C0C5DD85C6795E7BA08A7B
ffffff8085f7f8f0  7a 65 6b 65 2e 73 63 65  61 2e 63 6f 6d 00 00 00  |zeke.scea.com...|
ffffff8085f7f900  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8085f7f910  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8085f7f920  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8085f7f930  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8085f7f940  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8085f7f950  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
</pre>
</pre>


==== SCE_CDN_hostname (type E) ====
===I===
 
CDN hotname used for Crash Report. When a crash happens in a PS4 usermode application, the software asks the user if it accepts to send it to SCE servers. If the user accepts, the crashdump is encrypted and sent to SCE crepo servers for analysis.


<pre>
<pre>
ffffff8085f7f8e0  53 43 45 5f 43 44 4e 5f  68 6f 73 74 6e 61 6d 65  |SCE_CDN_hostname|
4AC61958B2BCFA6793B49DF84672A44D
ffffff8085f7f8f0  63 72 65 70 6f 2e 77 77  2e 64 6c 2e 70 6c 61 79  |crepo.ww.dl.play|
ffffff8085f7f900  73 74 61 74 69 6f 6e 2e  6e 65 74 00 00 00 00 00  |station.net.....|
ffffff8085f7f910  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8085f7f920  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8085f7f930  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8085f7f940  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8085f7f950  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
</pre>
</pre>


=== 0x10 - logger ===
== AES PORTABLE 28==
 
==== AES ====


* iv is A1D989B020185024F4C448283537540B
===E===


type E:
<pre>
<pre>
32AF1AE6A8B408ACA7072C9364BF8A36
27E0770E09A7FC1D83812F82D5775AE1
BA19E55263F00585EA2653311747A1E4
7CB5D77FE73EC981579EB0D2D4FE19FE
</pre>
</pre>


type I:
===I===
<pre>
<pre>
05E051FEDB737FEEA2FFA6D78AAC1613
587853D8EF32804120B6CA6AC15F9E7C
2ABAE36253F2A291C2EF0A1ACADAE1D1
31844FBB1FD5677B18CA34F3C86C371E
</pre>
</pre>


==== HMAC ====
*BAR_KEY(BackupAndRestore)
 
== HMAC PORTABLE 28==
 
===E===


type E:
<pre>
<pre>
E2AB163DFA812B4AA73FFB0AB4CB27E2
DDBE5F9AABC6E810C1527C560EAF8DC5
</pre>
</pre>


type I:
===I===
 
<pre>
<pre>
F7B1C4722FC52AEED7AE88C7DAB14C97
13D173D007FC85D02FC146A78B2C3032
</pre>
</pre>


=== 0x14 - SCEROOTPARAM_KEY ===
== AES PORTABLE 3C==


Used by [[SceShellCore]] to verify rootparam SFO/JSON.
===E===


==== AES ====
type E:
<pre>
<pre>
3A9980C60B2752B1E5C9437C8BE0730E
B7F71CB821D163D3E48D20E13CB37C64
057683371B0207B1B63D32412D41AAC3
FE8834B96073CCFD0A60BCC04411C00C
</pre>
</pre>


type I:
===I===
 
<pre>
<pre>
190C5FD353B619FFE1CEE8DEB9F828DA
37CE6FF2CBA0C69460329C223EA763E6
60F0ADA572E1C5CB30BC259BD0818C66
EAE1D5DBFC5803C94CDA8D708161F6A0
</pre>
</pre>


==== HMAC ====
*SCE_SYS_TLM_SECK
* iv is CE5326C917B698478C46E0387689CB4A
 
== HMAC PORTABLE 3C==


type E:
===E===
<pre>
38618E377454ADC8EA799376DEB01D34
</pre>


type I:
<pre>
<pre>
0CB1FD77B96A6815E65A1B26BF29822F
839E28FC0455F027BDE024DFA6ADCB8A
</pre>
</pre>


==== rootparam_key_IV ====
===I===


type I and E:
<pre>
<pre>
95 69 82 9C D4 B1 5F F8 43 30 54 5A 34 EC 1B C5
0D7F88C9A9128A1FD6EF367E78062572
</pre>
</pre>


==== rootparam_key_0_sign_I ====
== AES PORTABLE 40==
 
===E===


<pre>
<pre>
56 CF 9D AE DC 50 B4 1F D7 AA 70 9C A5 4B 9F 1A
FE3A5009C42E604D3D1F29565C4CDB87
74 82 ED 32 BC 74 39 63 55 AD B4 97 E0 53 59 48
0FDCD521338C8486D2AD85BB5220AC49
</pre>
</pre>


==== rootparam_key_1_sign_I ====
===I===


<pre>
<pre>
F5 1C 1C 99 EF 32 50 74 74 D8 A8 1E 18 98 2B D1
353233D34AE6544ADB79FFE2978E88B9
AC FE FB E1 44 BC E8 1F FA B0 01 A9 AA 10 84 09
F5E5951E752DC76941E173B0F239DE49
</pre>
</pre>


==== rootparam_key_2_sign_I ====
*envelopes(i'm looking at you, idc ;) )


<pre>
== HMAC PORTABLE 40==
30 28 0F 86 13 4C 1E 6D 63 79 CF D6 2D 00 11 50
D7 8D 58 D9 F1 6B 0C A2 94 BB 61 17 77 70 62 80
</pre>


==== rootparam_key_3_sign_I ====
===E===


<pre>
<pre>
54 98 5A 3A A1 8E 1C C6 78 62 A3 B9 71 C7 85 13
898BC1304C51736BA56C33CAE992225F
12 93 87 86 64 D7 4A B0 A0 87 DF C7 55 BD 28 60
</pre>
</pre>


==== rootparam_key_4_sign_I ====
===I===


<pre>
<pre>
B9 CC D2 86 B6 3B 9C 1C 35 08 27 B3 2A D9 30 9A
1D9E1E5B2A87B887FF1E017B02D0E04C
9A AE F9 FB 45 CA D1 32 0D 93 21 41 F8 85 48 26
</pre>
</pre>


==== rootparam_key_5_sign_I ====
== AES PORTABLE 44==
 
===E===


<pre>
<pre>
9C 5F A8 5E 4D 1C A8 C7 81 D1 EF 42 1E 34 A2 D0
FABE3A6D6B96A150CD5BD5652208F695
ED 3B 4D E5 6C 7C 34 1B 49 EC CF 36 2D B5 C2 43
18F75EBD22704F5298F3B59248951389
</pre>
</pre>


==== rootparam_key_0_I ====
===I===


<pre>
<pre>
F6 9F B6 9A 77 1F C2 D5 12 F7 25 2F A5 86 FB 22
882D16F707FD33FA2ABFEC130F60EEFF
0D BF A3 F2 38 89 A5 17 97 49 34 D7 83 83 D6 6D
D1F8B09AA448624FD62A94C84A9433D6
F9 74 DA 89 35 6B 7F A8 00 63 42 61 ED 70 19 5C
A7 A0 34 73 8D FC 2E E3 66 D6 FC 07 D4 F4 FC 86
E4 67 B4 8B E9 54 34 0D AE B2 01 60 AA A4 70 42
0E 95 62 13 AC D4 7D 11 88 DB 22 7D 4D 1D 92 D2
CF E9 D8 E5 54 7A B6 D6 51 C6 A8 8E 29 B3 C0 51
45 66 F6 41 82 A1 33 1D 7C 6C F8 00 43 F0 BD D3
</pre>
</pre>


==== rootparam_key_0_I (SCEROOTPARAM_KEY plain) ====
*livedump_secure


* Dumped from Kernel memory.
== HMAC PORTABLE 44==
<pre>
53 43 45 52 4F 4F 54 50 41 52 41 4D 5F 4B 45 59
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
CA 5C 5D 73 F7 57 0D 77 E9 00 AB 72 C0 5A C3 C4
B4 9C 45 CB CD 90 29 61 58 EC 47 1F 5F 26 72 52
29 ED 9C 0A F8 D3 97 00 29 85 A9 DF D0 F2 47 21
03 EA A7 1E B1 10 C0 03 99 B1 1D EC B2 E5 DF 08
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
</pre>


==== rootparam_key_1_I ====
===E===


<pre>
<pre>
95 C7 DC 5B 0A EA 8D 72 A2 6A 57 9E 54 12 6F 22
C7959E7798833634764BE40421E4CA87
C8 C9 7C 84 1C E9 F3 E4 02 F8 7D 63 03 21 5F 9D
AA 52 46 E7 31 24 58 14 BA ED F2 9D 34 A3 2A 11
C3 08 1E 5C A6 39 50 38 6A 0F CA D4 31 26 31 89
65 78 67 BF 4A BF 4B C0 FE A5 B1 84 48 1D 5A E6
A5 DA 6B BB 54 57 E8 AB A5 2E 95 C4 C5 84 4B EB
95 01 0B 6B 37 8C B6 5D E0 A4 B8 2A 7F 9C 87 9F
46 E4 67 82 84 58 71 C8 6E 41 CF 02 FA 4C 41 D5
</pre>
</pre>


==== rootparam_key_2_I ====
===I===
 
<pre>
<pre>
A9 60 9B D1 75 16 C8 85 03 49 D2 14 47 04 DD 1A
A154061C592CE76844847C137F5BE71B
E7 A5 EF 87 45 76 DA 51 1F 42 82 8F 76 48 81 9B
95 CF 6A 22 21 84 3F 0A 2E 16 B3 64 E5 8C 08 CC
5E AD B8 5B F4 AC AB 9F 6D 3C 7B B9 2B 63 83 FB
89 07 A5 CF 8D 00 18 F9 F5 95 57 7A 8A B2 0A 25
03 53 69 EB BC 58 EE 96 42 D8 3C 99 E1 5F 62 92
C8 05 5B A3 47 25 C5 B5 97 B9 05 5E D2 52 1B 6A
90 22 FD 01 6F D3 95 2B 12 86 F3 7E 1D 74 04 E0
</pre>
</pre>


==== rootparam_key_3_I ====
== AES PORTABLE 48==
 
===E===


<pre>
<pre>
8C E4 47 03 2A C2 DA A9 8C 83 6E 9B 47 35 D5 37
0606708496452DD32191FD838B3B6840
CC B8 36 DA C4 F8 22 E8 7A FA 26 50 C8 17 71 26
84CFA1C4FB4427BB21CA18E8CA80406D
BC F4 8A B7 55 EE 81 3A F9 80 6D 34 E6 9A B8 7D
93 8F C0 BD 3A 16 5C 7E CD FF 36 D5 9A BC 6F 15
D5 45 DF 5D 15 5D E7 C6 AF 67 6F 18 D1 8B 95 2E
7C D4 2D B2 E0 72 E3 A1 80 7B 01 F0 32 BB 27 88
24 08 B1 EE BF E0 5E 28 9B 1B C5 F3 F0 84 D5 3E
18 83 AB 46 60 2F 27 D2 6B 86 65 0C CA C7 89 C1
</pre>
</pre>


==== rootparam_key_4_I ====
===I===


<pre>
<pre>
5C 5D B0 53 08 4B A6 BA A7 B1 E2 6B C6 36 32 CA
AC4E5205E1EFF2CD76DBC73EB13C383A
38 E7 DC 3A 19 67 34 D0 AB 5D 3C CA 29 1B 10 C2
8C8F99A88FB3A50D554C0934DA1E7946
B9 A5 84 99 82 B5 AA EE 75 36 B1 3C 9B 64 A4 83
42 51 68 8E 4B 1F 14 D3 F8 38 1E 8A A3 56 8A 41
43 CD D6 E7 05 6D 7F B5 A9 4E A2 34 ED 82 29 80
8D 63 C0 AF F8 C3 35 66 DC 49 E6 B6 AB F5 AA F6
1E B3 FD 52 F8 79 18 F2 55 98 66 8C 61 4E 83 F1
D6 7E A4 70 53 25 BE 42 D3 19 4A 8D B0 8A AC EF
</pre>
</pre>


==== rootparam_key_5_I ====
*SceHidAuth
 
* iv is 322FDB812C9AA16311E13372657282A1


<pre>
== HMAC PORTABLE 48==
36 EF D1 C2 7E 49 6E 6B 23 98 C4 43 AE AB DB B0
BA 5D A5 6C 2A E1 86 45 F8 39 E9 26 DB FD 4C 10
1A A4 32 D0 F0 0C A3 13 5D 17 82 5A 45 9C C7 76
5F 70 25 31 23 3E A0 15 C6 01 BE 5F 48 56 A7 15
08 9D F2 D6 64 9A 2F 38 8F 67 DA 09 17 A9 4D 02
79 EA D9 31 23 C4 37 19 36 EE 4F 7D 88 1D 8B 5D
EB C6 74 F2 EA FE F6 E6 F4 66 B6 FF 0A 65 FD 46
14 D2 98 88 CF 13 49 15 58 BE E6 E6 1E CB 42 F7
</pre>


==== rootparam_key_0_sign_E ====
===E===


<pre>
<pre>
6C 11 E6 DD 2F 5D 27 D5 8F 06 9E FC 24 11 6F DD
6421DC67BF1520757FB15A68015B0693
1D 26 36 33 F4 A7 A2 DE C9 06 17 88 51 88 ED 61
</pre>
</pre>


==== rootparam_key_1_sign_E ====
===I===


<pre>
<pre>
BC 8E 1B D1 91 D4 EF A8 65 A4 25 15 C6 6F BE D1
54D04BABDE26E6D8481A5D860C2D3200
E6 99 81 1C A7 25 73 C0 00 EA 1C A9 D6 B6 12 3A
</pre>
</pre>


==== rootparam_key_2_sign_E ====
== AES PORTABLE 4C==


<pre>
<pre>
55 29 35 D8 4A B8 D5 FD B0 0C B7 71 CF E3 5D 48
BA08EE7EFA8BFEBD4C6360A8F61C1D37
4C 60 CC 78 F7 F4 D5 45 82 9B 2E 79 62 D2 D1 CD
E735A3A1185C2B91B438D5DD132A5ED0
</pre>
</pre>


==== rootparam_key_3_sign_E ====
*SCE_KDF_NCDT_PSK
* iv is 90F86BD0BD6587517E71FEB62A8AE2BF
 
== HMAC PORTABLE 4C==


<pre>
<pre>
55 29 35 D8 4A B8 D5 FD B0 0C B7 71 CF E3 5D 48
CD5486B6219C0B1798799576194774AA
4C 60 CC 78 F7 F4 D5 45 82 9B 2E 79 62 D2 D1 CD
</pre>
</pre>


==== rootparam_key_4_sign_E ====
==AES PORTABLE 50==


<pre>
<pre>
F5 AA 42 70 7B D5 F6 3D 3B 9C 6C 99 36 8B 94 65
C2E211E71F4CCD76B65EBB45E64D995A
3D C7 51 95 7B A1 CB 80 A5 EC 47 81 43 A9 61 4E
7424AE72CCC4DF2D6F34CA2F92797B49
</pre>
</pre>


==== rootparam_key_5_sign_E ====
*SIEIPMISceIpmiMgrEQSx
* iv is 6E73A4D0DF65788581DADA975F5F37A6
 
==HMAC PORTABLE 50==


<pre>
<pre>
03 D2 54 72 DB 35 27 C6 7B 98 EE 9F 1F C8 A7 74
06173BD09FAB15567064939F1C622A5B
6F BB BF DF DD E9 97 5C F7 86 48 8E 5F 4D EE 63
</pre>
</pre>


==== rootparam_key_0_E ====
==AES PORTABLE 54==


<pre>
<pre>
19 54 0D A2 DF F8 D6 6A 66 08 30 0F 37 8B F5 D4
FF42F98D1E43E9975E8FE8B793B246A1
B3 59 C2 EA B7 9B EB C4 5B 8B B5 E8 6A B8 77 A6
3EED3098D206BCB4550F29FA8761DEE4
4E 7E 7B 33 6D F1 10 A8 C1 2D 46 29 D4 B4 3C 60
B2 AD 4F BB C9 33 39 38 65 62 AA C4 FE 74 D2 4A
CD 23 A9 36 B7 36 3C B0 E1 AB BF 6C 25 C4 2C 4C
58 E9 4D 20 4A A2 AD 15 C2 74 E8 51 00 44 DA 15
BB 74 2D 91 E1 DC 52 DF DC 7D F6 93 3C EF F2 E5
45 5D 3A DA C6 E1 25 12 2B BA B2 42 5E F3 F5 FE
</pre>
</pre>


==== rootparam_key_0_E (SCEROOTPARAM_KEY plain) ====
*rootparam?
* iv is 6DE690827F71C3F2E47A329DCA0F63C9
 
==HMAC PORTABLE 54==


* Dumped from Kernel memory.
<pre>
<pre>
00000000  53 43 45 52 4f 4f 54 50  41 52 41 4d 5f 4b 45 59  |SCEROOTPARAM_KEY|
33478B82F3A1CECBD5C18BC246BE23FE
00000010  01 00 01 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
00000020  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
*
00000040  29 ed 9c 0a f8 d3 97 00  29 85 a9 df d0 f2 47 21  |).......).....G!|
00000050  03 ea a7 1e b1 10 c0 03  99 b1 1d ec b2 e5 df 08  |................|
00000060  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
*
00000080
</pre>
</pre>


==== rootparam_key_1_E ====
==AES PORTABLE 58==


<pre>
<pre>
F9 DA 87 36 B5 B2 30 17 DC 1D 47 51 FE 0B 75 23
AA78DA20F93912F33E831C9A959A99EB
2A 3E 58 AD 92 96 B3 D1 C1 11 97 DA FD 7D A2 E5
AECBBEAD59F24227CF5CF0CF1BFF95F1
51 33 49 F4 31 DC EA 7B 3F 15 54 DF 26 6B 66 88
50 4D 3B 59 AD 95 0B D6 6F B5 62 AF 0F F6 BD E0
CB 08 FA 5D 44 B1 A4 94 82 A3 74 63 25 C5 56 9E
12 54 53 B6 DA C8 DD BF CF 7A 7B A2 1A 8C A0 88
AC 74 2E D4 96 CD 36 2E 14 83 A1 51 5A 0D 8A A9
28 1B 53 FA 5A C2 DF C5 EE E9 37 0F F5 64 61 F7
</pre>
</pre>


==== rootparam_key_2_E ====
*sceSblPfsSaveDataUpdateAuthCode
* iv is 3E0386ACCF22356622A15BFAC1F42C3A
 
==HMAC PORTABLE 58==


<pre>
<pre>
E6 EA DF D7 E8 B0 23 7B 9A 40 8F 96 52 15 3B 78
039E510C50F577C022EA7D68C9435E26
2C 63 28 6A 47 AE 91 92 36 DF 6B D1 BE A5 10 34
55 EC C7 D3 FE 43 5C 60 27 4F AB BC 68 2A 00 37
EB 28 7C 58 54 E1 0A 1C D5 30 47 B5 6E 40 8E A3
6D ED 64 81 CE A1 81 D8 CF 9E C7 C2 1E 6C 2F 86
CF 30 F3 16 A8 5B C0 74 EB 03 6A E4 C3 48 82 2E
54 75 61 44 B5 D5 4F BB 24 7A E5 21 11 49 1D 48
8F D2 B0 78 AA EF 6A 3B A5 C9 35 62 C7 7A 6C C2
</pre>
</pre>


==== rootparam_key_3_E ====
==AES PORTABLE 5C==


<pre>
<pre>
E6 EA DF D7 E8 B0 23 7B 9A 40 8F 96 52 15 3B 78
FAD928594374473EEE62B2FB490FF640
2C 63 28 6A 47 AE 91 92 36 DF 6B D1 BE A5 10 34
15BA7A54771D987243221E45AD0B4D39
55 EC C7 D3 FE 43 5C 60 27 4F AB BC 68 2A 00 37
EB 28 7C 58 54 E1 0A 1C D5 30 47 B5 6E 40 8E A3
6D ED 64 81 CE A1 81 D8 CF 9E C7 C2 1E 6C 2F 86
CF 30 F3 16 A8 5B C0 74 EB 03 6A E4 C3 48 82 2E
54 75 61 44 B5 D5 4F BB 24 7A E5 21 11 49 1D 48
8F D2 B0 78 AA EF 6A 3B A5 C9 35 62 C7 7A 6C C2
</pre>
</pre>


==== rootparam_key_4_E ====
==HMAC PORTABLE 5C==


<pre>
<pre>
F6 C5 1C A3 8E F0 18 2D 55 35 48 75 47 AE BE BA
019DF2D781AA830E7AD74BB64739F697
D2 70 93 D5 C5 87 01 00 34 65 FE D8 87 A4 2C B3
0F D0 C5 F3 FD EA B2 78 09 CB 4D BF 4C 02 26 02
F6 5D 0E 86 C3 D5 30 5B 78 9A E8 A4 3E 19 22 FC
5B 7D F4 4D 66 50 73 72 CF EB 03 AC 7F 82 55 90
F1 06 02 2F A5 88 93 07 2C 94 51 57 05 92 87 F9
F6 2B 15 6B F4 EE 15 BF D2 2B C4 BE 4C D7 AC 28
AD 52 F0 E4 F4 92 CC 90 E6 20 D6 F7 DD D4 AA 57
</pre>
</pre>


==== rootparam_key_4_E (SCEROOTPARAM_KEY plain) ====
= Bluray DRM =
 
== AACS ==


* Dumped from Kernel memory.
<pre>
<pre>
00000000  ab 75 84 e1 58 6e f3 38  66 3b 39 9b 09 40 49 54  |.u..Xn.8f;9..@IT|
0A547025878C198979548FF00BA9E445 <- K
00000010  6b ce b2 f0 9f 32 0a 1b  f8 de 0a a0 d1 5f 28 bd  |k....2......._(.|
C0D00D285FC00870B543C1F31FAE44A8 <- iv
00000020  7f f5 78 1d c5 4c 80 fb  e4 7a 3e 36 91 8d 19 3e  |..x..L...z>6...>|
CD4F7C917ED4C9FE3B337EA2C60EC273
00000030  09 67 ae 3d 61 4e b1 4f  7d 71 cf 20 e4 40 71 1f  |.g.=aN.O}q. .@q.|
115BF5EE2659FF078C373EEDDFD4F3C7
00000040  05 65 93 0d fd 2d a6 d1  21 3c ef f4 5a 00 97 cb  |.e...-..!<..Z...|
05628DC933468421B2C88448080092B5
00000050  2f e9 ed b5 ce 07 bb d3  57 4e fa b1 ac a3 fe 80  |/.......WN......|
FD2ECD5E11264EDEDBA51D7E7B364B1C
00000060  88 3f 0a 0e 75 9b 4f 2f  40 6a c6 ef 98 23 b9 e5  |.?..u.O/@j...#..|
B24216CF7D781DFB82DC866B976F4EC4 <-
00000070  ae bd 3b 75 b7 c6 e1 68  5f b3 90 c4 12 a0 4d 24  |..;u...h_.....M$|
B73C1037C7FED6C1315AD7C16AC8EA79 <-
00000080
</pre>
</pre>


==== rootparam_key_5_E ====
== BDPLUS ==
 
<pre>
<pre>
B2 37 2E C2 0A CA 40 00 99 03 21 83 3B 03 D2 74
CAC19E73A99A37649720DBA9E5B9C8E9 <- K
5C 41 42 A4 13 F3 E1 28 CB B5 BC 7B 3A D0 30 20
971D666C66C5BBA31B6280AC5D00A849 <- iv
CC 5D 99 AB 56 4B F4 B2 05 57 26 C3 63 EC 93 32
B49740B965AACFA87DCE1218EBB1B27C <-
5B 4A 66 06 88 B5 91 02 CD D5 35 2F E2 C1 B7 7A
0CA31B024A73E030D2BB9FB3613DF147 <-
14 E3 B2 D5 14 80 06 28 F3 00 D7 61 32 5B F9 54
AE27A7DE70E1C1329DBC1CD0533F836D
A1 25 D2 EC 69 16 4B 0C 95 06 86 60 50 31 80 67
081812B592AFCD8180C054F5F9F04616
44 9F 57 87 4E 8D 09 20 73 3E BE F8 A9 CF C2 0B
185317D8D26C5DA45F80C358DA071BAA
68 22 EC DD 65 8A D8 BB 70 04 F5 7A 69 3D 19 DC
F55720FC0620F54F235A5DA1C3459FB0
</pre>
</pre>


==== rootparam_key_5_E (SCEROOTPARAM_KEY plain) ====
== CSS ==


* Dumped from Kernel memory.
<pre>
<pre>
00000000  44 62 12 3c 06 10 f2 55  3c 01 d1 f8 50 eb 1e 88  |Db.<...U<...P...|
0957909454D722D5FD71D02A5CCAC711 <- K
00000010  c0 34 61 40 04 19 80 9d  ab b4 63 f6 f3 6c e9 4d  |[email protected]|
C9E37A810F42EFAA2A5BE0C8E75E3D2A <- iv
00000020  39 6e 07 40 d9 8a d3 27  0c 27 e1 4a ad 0e b1 19  |9n.@...'.'.J....|
75B68FB0DBEF478F3975443180095AD2 <-
00000030  fe 79 df 09 7c 07 9b eb  ec f9 aa 64 f0 42 f6 4d  |.y..|......d.B.M|
EA018F41C99D65CA57190A1B4F973BED <-
00000040  58 45 0e 46 d9 e8 31 98  5d c5 10 ed 81 32 f5 c8  |XE.F..1.]....2..|
2DB61C46D497A1EC092816DC1243FF5E
00000050  8a d2 48 5b cc 6f 7e 2d  38 b0 f4 3e 8f 2b 0c 63  |..H[.o~-8..>.+.c|
C86676C3A45AB182B21BF75277916BE0
00000060  19 1d f8 5f 50 0b 77 f9  37 ec 7c 6b ea cd c9 15  |..._P.w.7.|k....|
548631EF9270FC6F8BCBBCAF8BA3753D
00000070  ea e6 d8 e1 bf 80 28 a3  eb 3e 9a 9d 5c 00 48 ad  |......(..>..\.H.|
F3F472638D324ECBBA7A4D844C2CA612
00000080
</pre>
</pre>


=== 0x18 ===
= Companion App Protocol RSA Public Key =
 
* Used by [[swagner]], [[swreset]].
 
==== AES ====


type E:
<pre>
<pre>
7D031910F9918242BD0069AACD047249
-----BEGIN PUBLIC KEY-----
A95E1F0651AE9D14E4F7B09D0D816E56
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAxfAO/MDk5ovZpp7xlG9J
JKc4Sg4ztAz+BbOt6Gbhub02tF9bryklpTIyzM0v817pwQ3TCoigpxEcWdTykhDL
cGhAbcp6E7Xh8aHEsqgtQ/c+wY1zIl3fU//uddlB1XuipXthDv6emXsyyU/tJWqc
zy9HCJncLJeYo7MJvf2TE9nnlVm1x4flmD0k1zrvb3MONqoZbKb/TQVuVhBv7SM+
U5PSi3diXIx1Nnj4vQ8clRNUJ5X1tT9XfVmKQS1J513XNZ0uYHYRDzQYujpLWucu
ob7v50wCpUm3iKP1fYCixMP6xFm0jPYz1YQaMV35VkYwc40qgk3av0PDS+1G0dCm
swIDAQAB
-----END PUBLIC KEY-----
</pre>
</pre>


type I:
= SMU Keys =
<pre>
9FCEEE75F2FD4C0A57AA32FDBD4093D3
7876E4D29D621BB54E62A2756E3E9C83
</pre>


==== HMAC ====
AMD System Management Unit (SMU) is a thermal and electric management unit found in modern AMD x86 processors. See [https://www.youtube.com/watch?v=iYvhHey_dTk this video].


type E:
== SMU HMAC Key ==
<pre>
E42C03F0ABAF7DED9EF3B31461526DF1
</pre>


type I:
<pre>
<pre>
0F4A79378A97768F719E29A5AE787513
4D7E73210B677A832B9F293B496E7C3E
</pre>
</pre>


=== 0x1C - SCECloudSD___KEY ===
= EMC Keys =


Used for upload of PS4 games [[Save Data]] to Sony's Cloud storage. Similar to the Cloud Data Key Ring used in PS Vita since System Software version 3.100.081.
== EMC Fuse Key for Aeolia ==
 
==== AES ====
 
* iv is DF140F0A54E95A581B8049DAA2A9AF2B


type E:
<pre>
<pre>
77684D4ACD210B03382327D4D15A88A4
1C7680D2963F3903811139C9C993BCA6
19BD06EEC04474EDEEB1A007C6112CEA
</pre>
</pre>


type I:
== EMC Constants for Aeolia ==
<pre>
EA9F99E9ED0D33D58C81E14D30F804C4
75B1B85AF1C33E3408F4107FA78AEE05
</pre>


==== HMAC ====
type E:
<pre>
<pre>
240299607EDB6505B68A7C8852E9305E
F1 F2 F3 F4 F5 F6 F7 F8 F1 F2 F3 F4 F5 F6 F7 F8
47 1D 3A FE 3C 26 F1 BB 01 F1 94 8F 9A 7F B1 24
F1 F2 F3 F4 F5 F6 F7 F8 F1 F2 F3 F4 F5 F6 F7 F8
EA 29 B8 CD A2 01 0C 98 53 CA BB F9 F2 1D 04 8C
F1 F2 F3 F4 F5 F6 F7 F8 F1 F2 F3 F4 F5 F6 F7 F8
E3 6E 21 4F 63 57 E9 EA 08 F0 B8 11 BD F8 01 60
F1 F2 F3 F4 F5 F6 F7 F8 F1 F2 F3 F4 F5 F6 F7 F8
88 DA B5 B0 51 95 E9 7F 88 82 F4 39 DD 10 61 81
</pre>
</pre>


type I:
== EMC IPL Cipher Key for Aeolia ==
 
<pre>
<pre>
1539E66891EFC669FF9BDA34123BBE06
5F74FE7790127FECF82CC6E6D91FA2D1
</pre>
</pre>


==== SCECloudSD___KEY ====
* iv is all zeroes
* algorithm is AES128CBC
* Aeolia exists since at least PS4 prototype firmware 0.910.040
* EMC IPL is codenamed C0000001
* index is 0xD (13_ if you use Zer0xFF's tools)
 
== EMC IPL Cipher Key for Belize ==


<pre>
<pre>
53 43 45 43 6C 6F 75 64 53 44 5F 5F 5F 4B 45 59
1A4B4DC4179114F0A6B0266ACFC81193
01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00
61 6F AD DF 22 04 AC 7A 24 06 4C CE D8 CD 88 A0
DE 07 F0 15 43 45 32 7D BE 4D 49 E1 CA 87 5D 98
5E F0 E4 AB 2A CE 26 69 00 96 D9 48 D4 C0 1B 36
8B B0 B2 1D 45 72 7D 70 91 26 F4 A1 10 77 0C F9
7A 0A F1 17 81 97 33 CC 71 05 73 92 4F D2 5C 1B
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
</pre>
</pre>


<pre>
* iv is all zeroes
5F 15 6F 65 CF DA 91 51 83 7C E3 06 D3 39 75 71
* algorithm is AES128CBC
08 3C 5B 08 10 5A 9C 6D 79 F0 64 29 DF D1 6D 33
* Belize was introduced in firmware 2.00
4A 75 88 66 9B 61 54 B4 2F A6 C2 29 55 6E AD 76
* EMC IPL is codenamed C0000001
34 4B B4 B8 F6 03 83 4D F4 B4 92 5A C8 F9 39 8E
* index is 0x20 (32_ if you use Zer0xFF's tools)
31 60 25 1A 88 51 53 F7 A4 D9 5E 4C FF D0 3D 4B
95 A7 6F E8 DD BF 92 B2 D4 1C 0B 0E 28 29 B3 40
B0 AD 2F 35 8A 19 D9 C1 2D AA 81 C3 23 16 3A 17
15 0D 4C 33 3A 62 49 A7 51 A3 3C 4E 78 01 50 F8


B1 24 25 11 6E C0 95 15 9E FA 11 B6 48 BD 96 70
== EMC IPL Hasher Key for Aeolia ==
AE 87 C9 99 DA 38 2E F1 B7 D6 41 81 09 98 A1 FF
27 69 85 D1 68 1C BE 72 2A F2 38 7F 65 AD 66 95
8B 72 A5 C8 73 34 3E A8 35 E2 82 74 2A 94 67 40
30 DF 3B 19 6C 5D CC D9 AD 44 7E 6C 22 76 ED 0A
64 E8 A1 46 A0 BE B7 D9 CA 6F CB 4F 54 92 2F 0F
41 90 1F 95 62 AF 0B 0E 18 63 06 C0 EA 22 8C 2E
3C 7E E9 79 73 A0 09 0C 36 D2 09 8D 75 DE 88 C7


EB 3E E3 B6 66 0F DD 75 99 CE 39 76 59 07 15 60
<pre>
86 92 96 C5 B3 CB 06 B1 C2 E9 E9 C5 8B 13 35 5E
73FE06F3906B05ECB506DFB8691F9F54
76 34 61 BA A2 4F F2 DB 99 CC BC DC 3C 13 2C A3
13 56 55 A7 0A FD 88 43 11 95 0A 0D 6D A4 7F 74
F3 2C 67 BC F4 E9 6F 1E 4D 69 5C CC 2E 1C 57 A8
CE 97 0B 4B D9 6A 5A 81 42 3F 6E 5C 7B A5 4A 78
AE 95 97 26 2A FF 9E 00 4F B4 F0 BB 40 72 1C 1F
8F 4B F7 AB FD D3 8C DC 14 FE 92 DD 16 51 A1 2F
 
01 AB 69 DF 87 71 AE BF E7 97 CD 88 18 F1 98 BF
A9 D3 3B 1A 95 C5 F1 37 65 17 DB FE C4 4D 0C 3B
26 27 73 61 F9 60 36 BE 90 36 A5 73 0F A5 98 EB
AE BD 9E 84 35 BD B4 CD A8 59 15 4C 25 CA DE 33
FA 53 D9 5C 9B 26 CD 1A BA CC 80 8F A5 0F 1A 6A
1D 2D A3 0D 52 56 89 FF BC 63 AE 7A 0B D4 F6 24
8F 3D BF F8 BD DB DB 9A 2A 52 85 EB AB D4 BA 08
37 39 EE EE 4A D2 ED D3 52 A5 BA 39 50 1B BA A3
 
F7 1B 39 B8 5D 55 7D 5E B7 6F 22 F9 82 95 0E 45
1B CC 18 CD B9 FB 14 25 5A 22 FC BA 98 1D 50 C6
20 1C 15 47 C7 1D 1D 55 CC A2 94 8D CF 4E A9 8E
4D F8 2F 96 D6 C3 AB B9 46 A4 0C 1A FD E5 01 B9
8F 07 DE DA BC 20 FF 0D BD CC CE FD 77 E2 28 62
25 56 1A F3 D1 92 DD F7 72 43 64 9C D4 38 7A C6
FA C3 60 45 61 B2 EA 3B C5 90 AC 0F 20 0F 26 73
14 03 A8 2D 00 48 35 2D 45 8A 86 7B 6B 28 69 02
</pre>
</pre>


=== 0x20 - SCE_EAP_HDD__KEY ===
* Algorithm is HMAC-SHA1
* It hashes the header (0x6C) of EMC IPL


Used for internal HDD encryption.
= EAP Keys =


==== AES ====
== EAP KBL Cipher Key for Aeolia ==


type E:
<pre>
<pre>
071B19D53D462093E0AF664ACFA9F937
581A75D7E9C01F3C1BD7473DBD443B98
2FCD0154FF04A9AE39E88EFF27823F0C
</pre>
</pre>


type I:
* iv is all zeroes
<pre>
* algorithm is AES128CBC
D6E3473A984BB836E1637F813CA5953E
* Aeolia exists since at least PS4 prototype firmware 0.910.040
186EF9F184BB76DBBC64B639F50CFF02
* EAP KBL is codenamed C0010001
</pre>
* index is 0xE (14_ if you use Zer0xFF's tools)


==== HMAC ====
== EAP KBL Hasher Key for Aeolia ==


type E:
<pre>
<pre>
8F1DFF012B1814D73F70A1BCF04EAE7F
824D9BB4DBA3209294C93976221249E4
</pre>
 
type I:
<pre>
DB801FB08E1C0DCE0B9ECC4E518AE24E
</pre>
 
==== SCE_EAP_HDD__KEY ====
 
type E:
<pre>
00000000  53 43 45 5f 45 41 50 5f  48 44 44 5f 5f 4b 45 59  |SCE_EAP_HDD__KEY|
00000010  bb 6c d6 6d dc 67 1f ac  36 64 f7 bf 50 49 ba a8  |.l.m.g..6d..PI..|
00000020  c4 68 79 04 bc 31 cf 4f  2f 4e 9f 89 fa 45 87 93  |.hy..1.O/N...E..|
00000030  81 17 45 e7 c7 e8 0d 46  0f af 23 26 55 0b d7 e4  |..E....F..#&U...|
00000040  d2 a0 a0 d9 72 9d e5 d2  11 7d 70 67 6f 1d 55 74  |....r....}pgo.Ut|
00000050  8d c1 7c df 29 c8 6a 85  5f 2a e9 a1 ad 3e 91 5f  |..|.).j._*...>._|
00000060  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
*
00000080
</pre>
</pre>


=== 0x24 - SCE_LwUtoken_Key ===
* Algorithm is HMAC-SHA1
 
* It hashes the header (size 0x6C) of EAP KBL
Used for "low" user tokens, sort of QA tokens for usermode internal tests by SCE.


==== AES ====
== EMC/EAP/KERNEL shared keys ==


* iv is ED7BD631517CF4753C9DDA7A3AB859DB
=== portability_seed_key ===


type E:
<pre>
<pre>
3BDDF81A1FE5CFEE3DAD1835B21CFFED
E973A44C578757A73492625D2CE2D76B
C10609C5D4D1DB17333ABECAEB2EF955
</pre>
 
type I:
<pre>
6E523DCAFDAFC20BDF288C8DF3F7BA97
146BFF1C88427E52461DA28F8D305B36
</pre>
</pre>


==== HMAC ====
=== portability_seed ===


type E:
<pre>
<pre>
7D10C415D0C0C5DD85C6795E7BA08A7B
DF0C2552DFC7F4F089B9D52DAA0E572A
</pre>
 
type I:
<pre>
4AC61958B2BCFA6793B49DF84672A44D
</pre>
</pre>


==== SCE_LwUtoken_Key ====
=== eap_hdd_key_blob_key1_seed ===


type E:
<pre>
<pre>
00000000  53 43 45 5f 4c 77 55 74  6f 6b 65 6e 5f 4b 65 79  |SCE_LwUtoken_Key|
7A49D928D2243C9C4D6E1EA8F5B4E229
00000010  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
317E0DCAD2ABE5C56D2540572FB4B6E3
*
00000040  e4 03 52 c3 02 18 f1 a6  22 5a cf 4c a7 9e 54 eb  |..R....."Z.L..T.|
00000050  b2 7a bc be b7 1f b4 7a  5c d0 66 c7 9e 99 9f 2a  |.z.....z\.f....*|
00000060  66 4a b9 75 36 4c f3 0e  75 ee 24 15 9c 38 51 f3  |fJ.u6L..u.$..8Q.|
00000070  01 00 01 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
00000080
</pre>
</pre>


type E Extra1:
=== eap_hdd_key_blob_key2_seed ===
<pre>
00000000  a3 c6 b1 40 de 3d d5 e9  44 8c 16 0a 18 54 75 6f  |...@.=..D....Tuo|
00000010  1c 51 87 64 cd 3d a4 6f  ce 72 a8 36 eb 61 f6 81  |.Q.d.=.o.r.6.a..|
00000020  5a 3f b5 c4 73 08 7e 87  a9 ff 8d a6 a7 27 60 22  |Z?..s.~......'`"|
00000030  fe 2f 64 64 ed 9c 97 fe  72 38 e4 d3 11 a9 b1 8b  |./dd....r8......|
00000040  35 32 29 d6 38 1e 7d 47  cc 09 0e 61 23 67 5f 00  |52).8.}G...a#g_.|
00000050  cc 11 f2 51 69 5d 51 64  1b 4f c1 47 62 bb c0 3b  |...Qi]Qd.O.Gb..;|
00000060  46 60 85 53 7c 41 78 76  39 5c 5a a3 fa 7e 40 17  |F`.S|Axv9\Z..~@.|
00000070  34 6f 6c 2a 27 04 25 cc  7c ad 87 c4 6a eb f6 bf  |4ol*'.%.|...j...|
00000080
</pre>


type E Extra2:
<pre>
<pre>
00000000  2c e9 d0 41 3b f5 29 aa  ad aa 0f 3b d6 18 44 7e  |,..A;.)....;..D~|
921CE9C8184C5DD476F4B5D3981F7E2F
00000010  35 95 f6 9f af f0 03 92  1a cd 6e 59 22 54 c5 d9  |5.........nY"T..|
468193ED071E19FFFD66B693534689D6
00000020  6b 9d c2 14 d6 3f ee bf  ef 07 58 af 96 1a ab 5d  |k....?....X....]|
00000030  77 09 27 96 2d fe a8 20  03 b4 e3 41 94 75 b2 49  |w.'.-.. ...A.u.I|
00000040  54 4f 08 e7 5d f4 dc 87  3a 34 5d 8e a8 10 67 22  |TO..]...:4]...g"|
00000050  e4 78 c4 70 d6 1b 9f 8c  5a b9 a9 d7 c9 17 83 30  |.x.p....Z......0|
00000060  35 0e 11 ba a2 27 46 82  f9 f1 88 31 ea af ec 75  |5....'F....1...u|
00000070  dc 5b 86 d7 70 90 c9 dc  76 c2 35 5c cd 9c 33 d4  |.[..p...v.5\..3.|
00000080
</pre>
</pre>


=== 0x28 - SCE_SBL_BAR_KEY1 ([[Backup And Restore]]) ===
=== use_new_blob = Y ===


Used for the [[Backup And Restore feature]], handled by the [[SBL]] module.
* enc


==== AES ====
type E:
<pre>
<pre>
27E0770E09A7FC1D83812F82D5775AE1
CFFDCB6ECAE612B7A30A9EDBD8F77E26
7CB5D77FE73EC981579EB0D2D4FE19FE
1D629DE5E6CA3F22F439211AC033884F
4B5D7D16D0A6F65D3173A2586CF819C7
C6F437444C1D9499F6EBC4145E0BBAAB
C1DE7C63ED1F5A1E1946358C7F181B1F
AB6DAB31195D8E611A1CB81B9ACF8B38
FF21029FAB568C7A1BCC3E2FBEB25B13
F1AFD6A3599EEF09EAEBE32684FDDA29
</pre>
</pre>


type I:
* sig
 
<pre>
<pre>
587853D8EF32804120B6CA6AC15F9E7C
4798B78DD422601F26A32A1FEC5CAB8B
31844FBB1FD5677B18CA34F3C86C371E
256E50958E0B11A31D77DEE201D4D00E
</pre>
</pre>


==== HMAC ====
* iv


type E:
<pre>
<pre>
DDBE5F9AABC6E810C1527C560EAF8DC5
462500ECC487F0A8C2F39511E020CC59
</pre>
</pre>


type I:
=== use_new_blob = N ===
 
* enc
 
<pre>
<pre>
13D173D007FC85D02FC146A78B2C3032
E073B691E177D39642DF2E1D583D0E9A
5A49EDF72BE9412E2B433E51490CE973
234B84F49E949F03727331D5456F4598
F2EDE6D0C11483B84CE3283243D0DE9D
C379E915301A805DFAEB292B30374C9B
F1C59041509BF11D215C35D5C08E3330
807C8229C930FAB88672C4CF7DACA881
C323D72346CA07921DB806FC242A2ED1
</pre>
</pre>


==== SCE_SBL_BAR_KEY1 ====
* sig


type E:
<pre>
<pre>
ffffff80869df8e0  53 43 45 5f 53 42 4c 5f  42 41 52 5f 4b 45 59 31  |SCE_SBL_BAR_KEY1|
ED4F32C095847C6D3143EFFD61E7582F
ffffff80869df8f0  1f 18 c9 70 d0 00 ac 7e  6f cc 1a 8c dd 89 b4 fe  |...p...~o.......|
75F24465855C4E94DAF34885D8D03463
ffffff80869df900  cd a1 33 a1 0e c8 f5 25  98 22 23 f5 86 1f 02 00  |..3....%."#.....|
ffffff80869df910  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff80869df920  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff80869df930  79 c8 cc c8 89 a1 54 0d  4f 2e 27 bb 61 4f d6 53  |y.....T.O.'.aO.S|
ffffff80869df940  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff80869df950  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
</pre>
</pre>


* Usage for verification: openssl dgst -hmac 1f18c970d000ac7e6fcc1a8cdd89b4fecda133a10ec8f525982223f5861f0200 -sha256 encrypted_caf_segment.bin
* iv
* Usage for encryption: openssl aes-128-cbc -d -K 79c8ccc889a1540d4f2e27bb614fd653 -iv 0 -in encrypted_caf_segment.bin -out decrypted_caf_segment.bin -nopad


==== CAF Cipher ====
<pre>
 
3286EA97F3E92C434E1DC170C9289003
* AES-128-CBC Key for each [[Backup And Restore]] [[archive.dat]] CAF segment. The AES-128-CBC IV is in the header of each CAF segment.
 
<pre>
79C8CCC889A1540D4F2E27BB614FD653
</pre>
</pre>


==== CAF Hasher ====
=== EAP_HDD_KEY_BLOB ===
 
* HMAC-SHA256 Key for each [[Backup And Restore]] [[archive.dat]] CAF segment in encrypted form.


<pre>
<pre>
1F18C970D000AC7E6FCC1A8CDD89B4FECDA133A10EC8F525982223F5861F0200
5343455F4541505F4844445F5F4B4559
BB6CD66DDC671FAC3664F7BF5049BAA8
C4687904BC31CF4F2F4E9F89FA458793
811745E7C7E80D460FAF2326550BD7E4
D2A0A0D9729DE5D2117D70676F1D5574
8DC17CDF29C86A855F2AE9A1AD3E915F
00000000000000000000000000000000
00000000000000000000000000000000
</pre>
</pre>


=== 0x3C - SCE_SYS_TLM_SECK ===
= Syscon Keys =


Used in the GetOpenPsIdHash function by [[SceShellCore]].
== Common ==


==== AES ====
=== Security ID ===
 
* iv is CE5326C917B698478C46E0387689CB4A


type E:
<pre>
<pre>
B7F71CB821D163D3E48D20E13CB37C64
3A4E6F743A557365643A (:Not:Used:)
FE8834B96073CCFD0A60BCC04411C00C
</pre>
</pre>


type I:
<pre>
<pre>
37CE6FF2CBA0C69460329C223EA763E6
Checksum for RL78: 3A+4E+6F+74+3A+55+73+65+64+3A = 0x370 && 0xFF = 0x70 - 1 = 0x6F
EAE1D5DBFC5803C94CDA8D708161F6A0
Same Checksum for 78K0R
</pre>
</pre>
Used to access more privileged commands, such as the write command
== DevKit ==


==== HMAC ====
=== Full Firmware ===


type E:
AES-CBC-128
<pre>
<pre>
839E28FC0455F027BDE024DFA6ADCB8A
Key = 5301C28824B57137A819C042FC119E3F
</pre>


type I:
IV =  00000000000000000000000000000000
<pre>
0D7F88C9A9128A1FD6EF367E78062572
</pre>
</pre>


==== SCE_SYS_TLM_SECK ====
Used for:
* 40000001 (BLNK)
* 40000002 (BASE)
* 40000003 (SYST)
 
<br>


type E:
AES-CMAC-128
<pre>
<pre>
ffffff80861838e0  53 43 45 5f 53 59 53 5f  54 4c 4d 5f 53 45 43 4b  |SCE_SYS_TLM_SECK|
Key = 8F215691AC7EF6510239DD32CC6A2394
ffffff80861838f0  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8086183900  99 e9 ac b7 36 53 5e 4b  25 4d 25 b9 e2 ab 3e 09  |....6S^K%M%...>.|
ffffff8086183910  cb cb c7 a7 c0 e8 1a ef  93 cf ae e1 57 4c 1a 7c  |............WL.||
ffffff8086183920  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8086183930  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8086183940  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8086183950  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
</pre>
</pre>


=== 0x40 - Envelope Files ===
Used to generate the AES-CMAC-128 at the start of decrypted 40000001, 40000002 and 40000003, by digesting the remainder of the decrypted data


The PS4 [[Envelope Files]] Verification Public Keys are stored in [[SceShellCore]] as plaintext bytes whilst the encryptions Keys are stored encrypted in [[SceShellCore]] as portable keys that are decrypted with <code>sceSblSsDecryptWithPortability</code> (with flag <code>0x40</code>).
== Retail/TestKit ==


==== AES ====
=== Patch Firmware Keys ===


type E:
AES-CBC-128
<pre>
<pre>
FE3A5009C42E604D3D1F29565C4CDB87
Key = EF90B21B31452379068E3041AAD8281E
0FDCD521338C8486D2AD85BB5220AC49
 
IV =  00000000000000000000000000000000
</pre>
</pre>


type I:
Used for:
* 40010001 (Patch #1)
* 40010002 (Patch #2)
 
<br>
 
AES-CMAC-128
<pre>
<pre>
353233D34AE6544ADB79FFE2978E88B9
Key = 95B1AAF20C16D46FC816DF32551DE032
F5E5951E752DC76941E173B0F239DE49
</pre>
</pre>


==== HMAC ====
Used to generate the AES-CMAC-128 at the start of decrypted 40010001 and 40010002, by digesting the remainder of the decrypted data
 
= Kernel Keys =
 
== Kernel Magic ==


type E:
<pre>
<pre>
898BC1304C51736BA56C33CAE992225F
2FB09FD1DE76967DEB947B51EC82781E
</pre>
</pre>


type I:
=== Backup And Restore Keys (BAR) ===
 
==== Cipher ====
 
<pre>
<pre>
1D9E1E5B2A87B887FF1E017B02D0E04C
79C8CCC889A1540D4F2E27BB614FD653
</pre>
</pre>


==== Envelope Message Encryption Keys ====
==== Hasher ====


{| class="wikitable sortable" style="width: 100%"
<pre>
! style="width: 5%" | Content ID
1F18C970D000AC7E6FCC1A8CDD89B4FECDA133A10EC8F525982223F5861F0200
! style="width: 15%" | Name
</pre>
! style="width: 40%" | Key I
 
! style="width: 40%" | Key E
=== default_suffix ===
|-
 
| <code>1</code>
<pre>
| beta_updatelist
Key = 518D64A635DED8C1E6B039B1C3E55230
|
</pre>
| <pre>C6 8A 9B 40 49 35 77 E7 54 3A 2D 95 59 9F 7E 96</pre>
|-
| <code>2</code>
| timezone
| <pre>56 6B DD 67 C3 B6 B5 04 EF 1A 39 C0 CC AC 4B E2</pre>
| <pre>56 6B DD 67 C3 B6 B5 04 EF 1A 39 C0 CC AC 4B E2</pre>
|-
| <code>3</code>
| system_log_config
|
| <pre>8C 81 17 54 AB E7 2C 8A 1B 4D DC A2 32 B8 CC 2A</pre>
|-
| <code>4</code>
| system_log_unknown (unknown name)
|
| <pre>8A 7A 15 CE 5D 21 62 19 7C FA 83 B1 DC 77 3C C7</pre>
|-
| <code>5</code>
| bgdc_config (probably related to Background Download)
|
| <pre>DA AF 3B 06 99 F7 6E 04 8F 3C 27 BF 0B E8 95 1C</pre>
|-
| <code>6</code>
| wctl_config
|
| <pre>67 EE DA F2 67 E0 43 BE B5 AD 5C 7A 6F 54 C5 37</pre>
|-
| <code>7</code>
| morpheus_updatelist
|
| <pre>5A 1F 16 C3 47 F8 24 6B F6 D7 8B E3 C4 D6 F2 D1</pre>
|-
| <code>8</code>
| netev_config
|
| <pre>66 01 69 2E 46 1B BD CC 85 6E A8 DC CE 06 3C F1</pre>
|-
| <code>9</code>
| gls_config
|
| <pre>89 D5 DD 4B 3A E3 89 1E A3 07 D5 62 FF 7A 94 D2</pre>
|-
| <code>10</code>
| hid_config
|
| <pre>5C C6 92 D0 6C CF 52 88 57 59 92 29 2C 8A B9 79</pre>
|-
| <code>12</code>
| hidusbpower
|
| <pre>61 76 2F AF A7 50 69 F6 16 BA 91 43 F6 98 68 0B</pre>
|-
| <code>13</code>
| patch_hmac_key
|
| <pre>9B 12 DA 7C 22 44 3B CD 2B BC F6 C0 18 5E 77 70</pre>
|-
| <code>14</code>
| bgft
|
| <pre>F1 1B 19 25 D9 3C E7 70 86 F4 9C CC 50 96 45 56</pre>
|-
| <code>17</code>
| system_log_privacy
|
| <pre>CE A4 74 20 1F 0C A2 36 8D D8 37 BF A1 B4 BD 78</pre>
|-
| <code>18</code>
| webbrowser_xutil
|
| <pre>CA 4A 06 AD 3C 09 8D AB 6B 30 97 2C BC 49 00 BD</pre>
|-
| <code>19</code>
| entitlementmgr_config
|
| <pre>49 B6 1A 0B 8F 33 BC 28 6F 85 6D A8 CB 04 B8 B4</pre>
|-
| <code>21</code>
| jsnex_netflixdeckeys
|
| <pre>51 AE 12 B0 CB D8 EF D3 59 8B C5 11 8D E1 A3 0C</pre>
|-
| <code>22</code>
| party_config
|
| <pre>9C 4E E3 E6 DC 82 A1 8A A2 12 33 D5 35 B1 08 EC</pre>
|}


==== Envelope Message Verification Keys ====
Used as suffix to symbol names when hashing with SHA1 to create a NID.


These are the public keys for signature verification.
=== Crash Dump KeySeed ===


{| class="wikitable sortable" style="width: 100%"
<pre>
! style="width: 5%" | Content ID
kd, kc
! style="width: 15%" | Name
KEYS = [
! style="width: 80%" | Public Key
    ['',''],
|-
    [b'8F86DDEDCBF24A44EB6C30607AA26F76', b'4125715AAB8B78E569F512E65CA62DD3'], # 1.01-3.15
| <code>1</code>
    [b'63AEF79DC49969FD8997B2F60DB65F81', b'1800A5DE2D0F0652FA5602FFADD440AA'], # 3.50-3.70
| beta_updatelist
    [b'05205507B7A154E08A7A38B1897563FB', b'AD334D142EAF8B9438DB00D1D0BFF357'], # 4.00-4.05
|
    [b'04C1A0961BBB0CB2140361B0956AAABA', b'052D2FF3014FB38CAAF6898CB899982A'], # 4.06-4.07 (to test)
<pre>B2 1A 5E F3 ED 15 83 0A 98 09 2A 63 AE 1F 52 3C F7 3A 5D F7 5F 38 30 F1 E7 1A 2C 08 47 EB A6 A0 86 2B 8A D3 E7 F6 39 A6 72 20 CF AA A7 B3 E1 47 60 17 35 5B 68 E2 12 BB 66 C1 3B 3B 5D 0F 61 4C 29 DB 5C 2B CC D8 4F 4C F8 B8 60 92 64 16 3B 6F 87 1A 8C BF 74 50 0C BF A9 30 71 26 D0 38 21 AB CD 49 AD E1 E1 C1 2F BE 92 23 EB 91 1E AF D1 BD D8 8A 16 29 FB 40 B1 89 B7 F8 1A 0F 11 14 44 C6 2D 1B FB E9 C5 D0 56 C2 95 42 44 56 EE 1A A8 9D B4 B1 B4 49 B9 87 61 45 F3 F6 BA 63 0C BD E5 CA 1B 23 8F 4B A7 91 C8 8C E0 67 44 CD 54 65 E8 48 8F E9 3A 72 BD 64 92 14 2B 9F F0 F9 C1 18 CF 75 BF 2D CF 78 85 C0 C3 59 1D 20 4C 98 E5 67 81 40 C0 78 A1 30 E9 5E 23 F3 30 29 EB 4C 1C 24 70 45 B7 C5 1C F3 67 07 36 20 5B 0E 51 93 8F 9E 95 14 F1 9F 69 0F 5B F1 CC 6C 41 EE FF 0B CE 53 ED 79 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 01</pre>
]
|-
</pre>
| <code>2</code>
 
| timezone
=== Sealed Key Values or (PFS_EncKey and sealedkey_retail_key) Values ===
| <pre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pre>
|-
| <code>3</code>
| system_log_config
| <pre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pre>
|-
| <code>4</code>
| system_log_unknown
| <pre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pre>
|-
| <code>5</code>
| bgdc_config
| <pre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pre>
|-
| <code>6</code>
| wctl_config
| <pre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pre>
|-
| <code>7</code>
| morpheus_updatelist
| <pre>B3 32 BC 81 7F F6 A4 12 A6 41 21 35 F7 9B 70 47 E9 C1 12 67 65 91 88 C9 39 DF ED B2 77 54 21 57 B8 00 36 5E EA 7F D0 C2 9C D5 E1 0F 30 BA AC 42 2F 67 7C EC 56 DD 8E C8 E6 FE B2 B6 0B 7B 80 7E 9F 66 20 F1 DD 95 B4 2B 6C F8 3D B7 A7 5C 09 95 2A F2 36 9E 5C 85 0B FF C1 1A 04 AE A4 A0 6B B7 6D FE 67 44 A4 F8 19 FA 96 BB 41 51 64 AA 9F B9 9D 49 F3 A1 B3 01 60 55 8A 0F 5B B9 ED 7E 14 B2 B9 C2 A9 87 E0 1B 52 F7 58 52 5B 7A FE 77 E6 61 BF 6B 46 CF CF E6 52 98 3B F1 79 41 61 B4 40 D5 C6 75 73 E8 9D 3E 1F 3C 72 1A A1 AA 9C 39 42 5E F8 F1 DC 12 8F C5 57 25 51 B7 C6 D1 94 62 8E F3 41 7F 79 9C 42 5B 98 64 E3 08 77 0F 0D 29 AA 15 3F 96 7C 38 85 E9 1A D5 F7 86 27 3E C5 C2 9A 6A 47 FF BE 4E 47 F8 7B E8 D7 17 5F 0E 55 78 A5 0D 59 6E B4 2E 5F 4D 09 4B EA 1B E1 4F 86 D6 60 CF 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 01</pre>
|-
| <code>8</code>
| netev_config
| <pre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pre>
|-
| <code>9</code>
| gls_config
| <pre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pre>
|-
| <code>10</code>
| hid_config
| <pre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pre>
|-
| <code>12</code>
| hidusbpower
| <pre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pre>
|-
| <code>13</code>
| patch_hmac_key
| <pre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pre>
|-
| <code>14</code>
| bgft
| <pre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pre>
|-
| <code>17</code>
| system_log_privacy
| <pre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pre>
|-
| <code>18</code>
| webbrowser_xutil
| <pre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pre>
|-
| <code>19</code>
| entitlementmgr_config
| <pre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pre>
|-
| <code>21</code>
| jsnex_netflixdeckeys
| <pre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pre>
|-
| <code>22</code>
| party_config
| <pre>C5 C9 41 E1 26 F3 8A E6 DB 6F D3 9A B4 1A FA 8F 9E 6A C6 7A B8 92 31 94 2D 5D 48 79 91 45 3B 15 30 CC 3D 8D 96 4F ED 38 D4 BF 46 EB 77 A7 3A 56 A3 94 F7 9C B2 7E 9E 33 7B BD 24 2E 04 82 D3 A6 32 1B EA 8D 85 18 19 86 59 CA ED 58 34 5C 3B ED 5A 29 2E 98 DD 0B A7 43 F4 86 79 9F C9 2F D5 2D CC A2 68 1A 12 19 02 4E 77 A4 53 76 42 92 60 A6 50 CA 8D B3 DB 2E FF FE 53 B0 87 F5 35 DF C9 AB 88 8F E1 EB F6 89 23 55 31 B4 F8 B5 37 31 60 C7 74 1C B4 7D 98 4D B5 4D A7 E4 4F DB 24 95 CD 93 FA DA B0 A8 C1 4E BC 86 EF 06 57 4C AF FB 1B 3F F7 D4 8A 4E 57 69 46 F6 79 C4 16 1E DF A8 C0 48 55 B3 39 B6 97 17 8A B8 F9 6A A8 59 3C 18 F2 A7 36 DF 20 8A 4B 4A AD 85 A3 01 27 5F 57 33 24 4E 24 51 07 9D EC D7 E5 5F 38 AD 7F B7 21 29 FD 95 DF 4B 43 8C 96 F5 5E CF 0B 76 DE C0 33 36 23 C3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 01</pre>
|}


==== patch_hmac_key - HMAC-SHA256 Patch Pkg URL Key ====
==== Keyset 1 ====


AES-CBC-128
<pre>
<pre>
AD62E37F905E06BC19593142281C112CEC0E7EC3E97EFDCAEFCDBAAFA6378D84
Key = B5DAEFFF39E6D90ECA7DC5B029A8153E
</pre>
</pre>


* HMAC-SHA256 key used to generate a URL pointing to a PS4 game update patch.
<br>
* For PS4, the generated hash is inserted into the following URL pattern: <code>http://gs-sec.ww.np.dl.playstation.net/plo/np/<TITLEID>/<HASH><TITLEID>-ver.xml</code>


=== 0x44 - livedump_secure ===
SHA-256-HMAC
<pre>
Hash = 8707960A53468D6C843B3DC9624E22AF
</pre>


==== AES ====
==== Keyset 2 ====


type E:
AES-CBC-128
<pre>
<pre>
FABE3A6D6B96A150CD5BD5652208F695
Key = EC0D347E2A7657471F1FC33E9E916FD4
18F75EBD22704F5298F3B59248951389
</pre>
</pre>


type I:
<br>
 
SHA-256-HMAC
<pre>
<pre>
882D16F707FD33FA2ABFEC130F60EEFF
Hash = A6D6583D3217E87D9BE9BCFC4436BE4F
D1F8B09AA448624FD62A94C84A9433D6
</pre>
</pre>


==== HMAC ====
==== Keyset 3 ====


type E:
AES-CBC-128
<pre>
<pre>
C7959E7798833634764BE40421E4CA87
Key = 51D8BFB4E387FB4120F081FE33E4BE9A
</pre>
</pre>


type I:
<br>
 
SHA-256-HMAC
<pre>
<pre>
A154061C592CE76844847C137F5BE71B
Hash = FFF9BDEA803B14824C61850EBB084EE9
</pre>
</pre>


==== livedump_secure ====
==== Keyset 4 ====


AES-CBC-128
<pre>
<pre>
96 1E 5E 85 B5 3E 77 64 43 E5 F4 45 85 E8 90 0A
Key = 346B5D231332AC428A44A708B1138F6D
52 5E 06 2A 4C 79 64 69 0F 75 2F 28 71 9C 6B A1
A8 C2 A0 0D 84 31 E7 17 DD EF 6D 80 F6 5C AE 32
42 1F CB E5 E7 A4 F9 1F 79 2B 25 C7 A1 0C 9E 5A
7B 07 82 9F F3 7C 3F B4 66 2F CB F8 E4 0A 63 F2
99 EE B8 6F 06 D5 58 CD 6E 8E 6A F7 5E 48 3A 24
CC 73 EA E7 73 2F 44 2F 8B E5 28 FB 19 60 62 50
F4 A9 9C A5 9E FC 63 2C 2D CC 67 73 2B 8B 5A DE
</pre>
</pre>


=== 0x48 - SceHidAuth ===
<br>


Used for the DUALSHOCK 4 and DualSense HandShake with the PS4/PS5.
SHA-256-HMAC
<pre>
Hash = 5DC6B8D1A3A0741852A7D44268714824
</pre>


==== AES ====
Dumped with getSealedKeySecret on 5.05


* iv is 322FDB812C9AA16311E13372657282A1
==== Keyset 5 ====


type E:
AES-CBC-128
<pre>
<pre>
0606708496452DD32191FD838B3B6840
20 D0 43 85 25 30 C4 04 D1 68 69 E0 79 08 D5 E6
84CFA1C4FB4427BB21CA18E8CA80406D
</pre>
</pre>


type I:
SHA-256-HMAC
<pre>
<pre>
AC4E5205E1EFF2CD76DBC73EB13C383A
2D E8 DE 4D E6 62 8B B6 2D D5 C1 70 F5 65 B6 2C
8C8F99A88FB3A50D554C0934DA1E7946
</pre>
</pre>


==== HMAC ====


type E:
==== Keyset 6 ====
 
AES-CBC-128
<pre>
<pre>
6421DC67BF1520757FB15A68015B0693
93 B7 27 0D F0 D3 73 10 60 07 90 66 65 5D 8D 07
</pre>
</pre>


type I:
SHA-256-HMAC
<pre>
<pre>
54D04BABDE26E6D8481A5D860C2D3200
FD 44 A3 2D 8B C8 AC 18 9C 1B D0 96 40 29 66 CF
</pre>
</pre>


==== hidAuthThreadMain Keys ====
==== Keyset 7 ====


AES-CBC-128
<pre>
<pre>
ED E7 41 CC 7F D6 0E 1F 2D B0 89 16 1F C0 EB 66
4C 78 44 83 69 37 50 8B 92 33 DF 7C D7 D6 51 65
7C A4 DA 59 40 CE 19 54 00 90 1D BF 59 25 EE 4F
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
</pre>
</pre>


=== 0x4C - SCE_KDF_NCDT_PSK ===
SHA-256-HMAC
 
<pre>
==== AES ====
BC 4C 9F 0F E5 D3 56 A0 57 52 02 4C BD EE C8 E4
</pre>


* iv is 90F86BD0BD6587517E71FEB62A8AE2BF
==== Keyset 8 ====


AES-CBC-128
<pre>
<pre>
BA08EE7EFA8BFEBD4C6360A8F61C1D37
3A 32 EE CF 74 99 39 87 1C 3D 7B F8 C0 1C 7D 1F
E735A3A1185C2B91B438D5DD132A5ED0
</pre>
</pre>


==== HMAC ====
SHA-256-HMAC
 
<pre>
<pre>
CD5486B6219C0B1798799576194774AA
F6 F9 D8 21 82 CC C2 22 7B 7D 33 A3 B7 1E AD E3
</pre>
</pre>


==== SCE_KDF_NCDT_PSK ====
==== Keyset 9 ====


type E:
AES-CBC-128
<pre>
<pre>
ffffff80869df8e0  53 43 45 5f 4b 44 46 5f  4e 43 44 54 5f 50 53 4b  |SCE_KDF_NCDT_PSK|
EB 35 64 04 7D 60 24 7F 55 73 CD E5 7E 0C DE 1C
ffffff80869df8f0  59 e6 32 88 b0 4e 7f 68  f8 b8 db 83 86 1e 07 50  |Y.2..N.h.......P|
ffffff80869df900  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff80869df910  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff80869df920  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff80869df930  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff80869df940  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff80869df950  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
</pre>
</pre>


=== 0x50 - SIEIPMISceIpmiMgrEQSx ===
SHA-256-HMAC
 
Used for IPMI Manager, likely standing for Inter-Process Method Invocation or Intelligent Platform Management Interface.
 
==== AES ====
 
* iv is 6E73A4D0DF65788581DADA975F5F37A6
 
<pre>
<pre>
C2E211E71F4CCD76B65EBB45E64D995A
29 8B 4F 59 1E F0 4E 52 17 3E EC 59 C5 A4 78 33
7424AE72CCC4DF2D6F34CA2F92797B49
</pre>
</pre>


==== HMAC ====
==== Keyset 0xA ====


AES-CBC-128
<pre>
<pre>
06173BD09FAB15567064939F1C622A5B
8A D4 92 CC 5B 27 B5 C3 60 11 A5 85 8B 90 93 80
</pre>
</pre>


==== SCEIPMI Key ====
SHA-256-HMAC
 
type E:
<pre>
<pre>
ffffff80869df8e0  53 49 45 49 50 4d 49 00  00 00 00 00 00 00 00 00  |SIEIPMI.........|
00 6A 34 41 82 B6 1B E5 6A 6C D6 B9 46 6F 03 45
ffffff80869df8f0  1a 88 b2 a3 64 e6 a2 8e  78 08 4e 3f 7f 40 fd 01  |....d...x.N?.@..|
ffffff80869df900  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff80869df910  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff80869df920  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff80869df930  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff80869df940  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff80869df950  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
</pre>
</pre>


=== 0x54 - pfs_sbl ===
=== AuthCode ===
 
Maybe used for USB Extended Storage encryption that was introduced in PS4 System Software 4.50.
 
==== AES ====


* iv is 6DE690827F71C3F2E47A329DCA0F63C9
==== KeySet 1 ====


<pre>
<pre>
FF42F98D1E43E9975E8FE8B793B246A1
2B CF 69 8E 79 CF DD FA C2 4D 4C 25 BF 35 1E 62
3EED3098D206BCB4550F29FA8761DEE4
</pre>
</pre>


==== HMAC ====
=== Vtrm Cipher Init Keys ===
 
==== hmac_key_seed ====


<pre>
<pre>
33478B82F3A1CECBD5C18BC246BE23FE
Key = 87FB19BBF3D4D6B1B0ED226E39CC621A
      37FA4ED2B6618B59B34F770FBB92947B
 
IV = 00112233445566778899AABBCCDDEEFF
</pre>
</pre>


==== pfs_sbl Key ====
==== aes_key_seed ====


<pre>
<pre>
91 0B 7C A6 6B 4B F9 DA 00 72 F1 67 6C 51 99 70
B0ED226E39CC621A37FA4ED2B6618B59
C1 4D B2 26 6A 59 29 C2 5E 1A 72 5D D8 19 05 BF
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
</pre>
</pre>


=== 0x58 - pfs_sd_auth ===
=== Keystone Keys ===


* Used in the sceSblPfsSaveDataUpdateAuthCode function.
==== keystone_passcode_secret or passcode_hmac_secret ====
* Used for [[Save Data]] authentication (to explain).


==== AES ====
<pre>
C74405F67424BA342BC1276251BBC2F5
55F16025B6A1B6714780DBAEC852FA2F
</pre>


* iv is 3E0386ACCF22356622A15BFAC1F42C3A
==== keystone_ks_secret or keystone_hmac_secret ====


<pre>
<pre>
AA78DA20F93912F33E831C9A959A99EB
783D6F3AE91C0E0712FCAAB7950BDE06
AECBBEAD59F24227CF5CF0CF1BFF95F1
855CF7A22DCDBDE127E9BFCBAD0FF0FE
</pre>
</pre>


==== HMAC ====
= ShellCore Keys =


<pre>
== DevKit/TestKit ==
039E510C50F577C022EA7D68C9435E26
</pre>


==== pfs_sd_auth KeySet 1 ====
=== Trophy Key ===
 
* This section is missing algorithms and usage.


<pre>
<pre>
2BCF698E79CFDDFAC24D4C25BF351E62
Key = 02CCD346B459CB83505E8E760A44D457
</pre>
</pre>


* Present in [[Kernel]] memory.
== Retail ==


=== 0x5C ===
=== Trophy Key ===
 
==== AES ====
 
<pre>
FAD928594374473EEE62B2FB490FF640
15BA7A54771D987243221E45AD0B4D39
</pre>
 
==== HMAC ====


<pre>
<pre>
019DF2D781AA830E7AD74BB64739F697
Key = 21F41A6BAD8A1D3ECA7AD586C101B7A9
</pre>
</pre>


= Companion App Protocol RSA Public Key =
=== RSA PKG Meta ===


<pre>
==== Modulus 400 ====
-----BEGIN PUBLIC KEY-----
<pre>  
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAxfAO/MDk5ovZpp7xlG9J
D212FC335F6DDB831609628B03562737
JKc4Sg4ztAz+BbOt6Gbhub02tF9bryklpTIyzM0v817pwQ3TCoigpxEcWdTykhDL
82D477853529392D526B8C4C8CFB06C1
cGhAbcp6E7Xh8aHEsqgtQ/c+wY1zIl3fU//uddlB1XuipXthDv6emXsyyU/tJWqc
845BE7D4F7BCD24E6245CD2ABBD77776
zy9HCJncLJeYo7MJvf2TE9nnlVm1x4flmD0k1zrvb3MONqoZbKb/TQVuVhBv7SM+
453655273FB3F5F98EDA4BEFAA59AEB3
U5PSi3diXIx1Nnj4vQ8clRNUJ5X1tT9XfVmKQS1J513XNZ0uYHYRDzQYujpLWucu
9BEA5498D206326A58312AE0D44F90B5
ob7v50wCpUm3iKP1fYCixMP6xFm0jPYz1YQaMV35VkYwc40qgk3av0PDS+1G0dCm
0A7DECF43A9C52672D99318E0C43E682
swIDAQAB
FE0746E12E50D41F2D2F7ED908BA06B3
-----END PUBLIC KEY-----
BF2E203F4E3FFE44FFAA504357916994
49158282E40F4C8D9D2CC95B1D64BF88
8BD4C594E76547841EE57910FB989347
B97D8512A640982CF792BC951932EDE8
90560D65C1AA78C62E54FD5F54A1F67E
E5E05F61C120B4B9B4330870E4DF8956
ED012946775F8CB8A9F51E2EB3B9BFE0
09B78D28D4A6C3B81E1F07EBB4120B95
B88530FDDC3913D07CDC8FEDF9C9A3C1
</pre>
</pre>


= AMD SMU Keys =
==== Private Key 500 ====
 
== PS4 AMD SMU firmware HMAC-SHA1 Key ==
 
<pre>
<pre>
4D7E73210B677A832B9F293B496E7C3E
32D903908FBDB08F572B285E0B8DB3EA
</pre>
5CD17EA890888CDD6A80BBB1DFC1F70D
 
AA32F0B77CCB88800E8B64B0BE4CD60E
* This symmetric key is used to sign the AMD SMU firmware of the PS4.
9B8C1E2A64E1F35CD77601415E935C94
* It is related to the "42?" and "Prezident Zeman je K U N D A" strings presented by Rudolf Marek at 31C3.
FEDD4662C31B5AE2A0BC2DEBC3980AA7
 
B7856970682B644AB31FCC7DDC7C26F4
= EMC Keys =
77F65CF2AE5A442DD3AB16620419BAFB
 
90FFE23050896ECB56B2EBC09116925E
See also [https://github.com/TeamFAPS/PS4-RE-tools/tree/master/ps4-emc-ipl-eap-kbl-tool PS4 EMC IPL and EAP KBL Tool] for usage.
308EAEC7945DFD35E120F8AD3EBC08BF
 
C036749FD5BB5208FD0666F37AB304F4
== EMC Fuse Key for Aeolia ==
75295DE95FAA1030B20F5A1AC12AB3FE
CB21AD80EC8F20091CDBC55894C29CC6
CE82653E5790BCA98B06B4F072F677DF
9864F1ECFE372DBCAE8C08811FC3C989
1AC742824B2EDC8E8D73CEB1CC01D908
70873C4408EC498F815AE240FF77FC0D
</pre>


==== P 600 ====
<pre>
<pre>
1C7680D2963F3903811139C9C993BCA6
F967AD9912310C56A22E161C46B34D5B
43BE42A2F686968042C3C73FC342F587
49339F075D6E2C04FDE3E1B2AE0A0CF0
C7A61CA16350C8099C5124526C5E5EBD
1E2706BBBC9E94E135D46DB3CB3C68DD
68B3FE6CCB8D8220762363B7E9681001
4EDCBA275D01C12D805E2BAF826BD884
B6105286A7898EAE9AE289C6F7D587FB
</pre>
</pre>


== EMC Constants for Aeolia ==
==== Q 680 ====
 
<pre>
<pre>
F1 F2 F3 F4 F5 F6 F7 F8 F1 F2 F3 F4 F5 F6 F7 F8
D7A10F9A8BF2C91195329A8CF0D94047
47 1D 3A FE 3C 26 F1 BB 01 F1 94 8F 9A 7F B1 24
F568A00DBDC1FC432F65F9C3610F2577
F1 F2 F3 F4 F5 F6 F7 F8 F1 F2 F3 F4 F5 F6 F7 F8
54ADD758AC8440608D3FF3658975B5C6
EA 29 B8 CD A2 01 0C 98 53 CA BB F9 F2 1D 04 8C
2C511A2F1F22E4431154BEC9B4C7B51B
F1 F2 F3 F4 F5 F6 F7 F8 F1 F2 F3 F4 F5 F6 F7 F8
050BBC569ACD4AD973685E5CFB92B78B
E3 6E 21 4F 63 57 E9 EA 08 F0 B8 11 BD F8 01 60
0DFFF507CAB4C89B963C079E3E6B2A11
F1 F2 F3 F4 F5 F6 F7 F8 F1 F2 F3 F4 F5 F6 F7 F8
F28AB18AD72E1BA5532406ED50B89067
88 DA B5 B0 51 95 E9 7F 88 82 F4 39 DD 10 61 81
B1E241C69201EE10F061BBFBB27D4A73
</pre>
</pre>


== EMC IPL Cipher Key for Aeolia ==
==== DP 700 ====
 
<pre>
<pre>
5F74FE7790127FECF82CC6E6D91FA2D1
52CC2DA09C9E75E728EE3DDEE345D14F
941CCCC88729453B8D6EAB6E2AA7C715
43A3048F905FEBF3384A77FA36B71576
B6011A8E258782F155D8C6432AC0E598
C932D1946FD901BA0681E06D88F2242A
2501645CBFF2D999673EF672EEE4E233
5CF80040E32A9AF43D2286443CFB0AA5
7C3FCCF5F116C4AC88B4DE6294926A13
</pre>
</pre>


* Algorithm is AES-128-CBC with zeroed IV.
==== DQ 780 ====
* Aeolia exists since at least PS4 prototype System Software 0.910.040.
* EMC IPL is codenamed C0000001. PUP unpack index is 0xD (13_ if you use Zer0xFF's tools).
 
== EMC IPL Cipher Key for Belize ==
 
<pre>
<pre>
1A4B4DC4179114F0A6B0266ACFC81193
7C9DAD39E0D560149448197F8895D58B
80AD858A4B773785D077BBBF89714A72
CB726838EC02C67DC6440633511CC0FF
958F0D75DC25BB0B7391A96D42D803B7
68D41E7562A37035797800C8F5EF15B9
FC4E475AC870705B5298C0C2584A7096
CCB810E12F788B2BA17FF9ACDEF0BB2B
E266E3229231215792C4B8F23E762037
</pre>
</pre>


* Algorithm is AES-128-CBC with zeroed IV.
==== QP 800 ====
* Belize was introduced in PS4 System Software version 2.00.
* EMC IPL is codenamed C0000001. PUP unpack index is 0x20 (32_ if you use Zer0xFF's tools)
 
== EMC IPL Hasher Key for Aeolia ==
 
<pre>
<pre>
73FE06F3906B05ECB506DFB8691F9F54
459755D422085EF35CB4057AFDAA4242
</pre>
AD9A8CA06CBB1D6854546E3E32E35373
 
76F13E01EAD3CFEBEB233EC0BECEEC2C
* Algorithm is HMAC-SHA1.
895FA8273A4CB7E674BC454C26C825FF
* It hashes the header (size 0x6C) of EMC IPL.
34632537E14810C193A6AFEBBAE3A2F1
 
3DEF63D8F4FDD3EEE25DE933CCADBA75
= EAP Keys =
5C85AFCEA93DD1A217F3F698B3508E5E
 
F6EB028EA162A7D62CEC91FF1540D2E3
See also [https://github.com/TeamFAPS/PS4-RE-tools/tree/master/ps4-emc-ipl-eap-kbl-tool PS4 EMC IPL and EAP KBL Tool] for usage.
 
== EAP KBL Cipher Key for Aeolia ==
 
<pre>
581A75D7E9C01F3C1BD7473DBD443B98
</pre>
 
* Algorithm is AES-128-CBC with zeroed IV.
* Aeolia exists since at least PS4 prototype System Software version 0.910.040.
* EAP KBL is codenamed C0010001. PUP unpack index is 0xE (14_ if you use Zer0xFF's tools).
 
== EAP KBL Hasher Key for Aeolia ==
 
<pre>
824D9BB4DBA3209294C93976221249E4
</pre>
 
* Algorithm is HMAC-SHA1.
* It hashes the header (size 0x6C) of EAP KBL.
 
= EMC/EAP/Kernel shared keys =
 
== portability_seed_key ==
 
<pre>
E973A44C578757A73492625D2CE2D76B
</pre>
 
== portability_seed ==
 
<pre>
DF0C2552DFC7F4F089B9D52DAA0E572A
</pre>
 
== eap_hdd_key_blob_key1_seed ==
 
<pre>
7A49D928D2243C9C4D6E1EA8F5B4E229
317E0DCAD2ABE5C56D2540572FB4B6E3
</pre>
 
== eap_hdd_key_blob_key2_seed ==
 
<pre>
921CE9C8184C5DD476F4B5D3981F7E2F
468193ED071E19FFFD66B693534689D6
</pre>
 
== use_new_blob = Y ==
 
* Encryption Key:
<pre>
CFFDCB6ECAE612B7A30A9EDBD8F77E26
1D629DE5E6CA3F22F439211AC033884F
4B5D7D16D0A6F65D3173A2586CF819C7
C6F437444C1D9499F6EBC4145E0BBAAB
C1DE7C63ED1F5A1E1946358C7F181B1F
AB6DAB31195D8E611A1CB81B9ACF8B38
FF21029FAB568C7A1BCC3E2FBEB25B13
F1AFD6A3599EEF09EAEBE32684FDDA29
</pre>
 
* Signature ?HMAC-SHA256? Key:
<pre>
4798B78DD422601F26A32A1FEC5CAB8B
256E50958E0B11A31D77DEE201D4D00E
</pre>
 
* IV:
<pre>
462500ECC487F0A8C2F39511E020CC59
</pre>
 
== use_new_blob = N ==
 
* Encryption Key:
<pre>
E073B691E177D39642DF2E1D583D0E9A
5A49EDF72BE9412E2B433E51490CE973
234B84F49E949F03727331D5456F4598
F2EDE6D0C11483B84CE3283243D0DE9D
C379E915301A805DFAEB292B30374C9B
F1C59041509BF11D215C35D5C08E3330
807C8229C930FAB88672C4CF7DACA881
C323D72346CA07921DB806FC242A2ED1
</pre>
 
* Signature ?HMAC-SHA256? Key:
<pre>
ED4F32C095847C6D3143EFFD61E7582F
75F24465855C4E94DAF34885D8D03463
</pre>
 
* IV:
<pre>
3286EA97F3E92C434E1DC170C9289003
</pre>
 
== EAP_HDD_KEY_BLOB ==
 
<pre>
5343455F4541505F4844445F5F4B4559
BB6CD66DDC671FAC3664F7BF5049BAA8
C4687904BC31CF4F2F4E9F89FA458793
811745E7C7E80D460FAF2326550BD7E4
D2A0A0D9729DE5D2117D70676F1D5574
8DC17CDF29C86A855F2AE9A1AD3E915F
00000000000000000000000000000000
00000000000000000000000000000000
</pre>
 
== PS4-PS5 USB Extended Storage Key ==
 
Used for USB Extended Storage encryption that was introduced in PS4 System Software 4.50.
 
Data:
<pre>
7213197452C6CC7EC8A3C06C3E22F91A
</pre>
 
Tweak:
<pre>
7617B6E7A97360FC4C67BF38D07FD72D
</pre>
 
Usage (to be rewritten in a more understandable way):
# Step 1: Decrypt the 64 first bytes of sector 0 of the storage with AES-XTS-128 using Data and Tweak.
# Step 2: Compute HMAC-SHA256 of decrypted 0x20 bytes from offset 0x20 with Tweak and Data, appended together in this order, as key.
# Step 3: In the resulting digest, swap 16 first bytes with 16 last bytes. This forms the final key: new Data key followed by new Tweak key.
# Step 4: Use the final keys with AES-XTS-128 to fully decrypt the PS4-PS5 USB Extended Storage.
* Source: https://pastebin.com/WfE50xw0
 
= Syscon Keys =
 
== Common ==
 
=== Security ID ===
 
<pre>
3A4E6F743A557365643A
</pre>
* In ASCII this key reads "(:Not:Used:)".
 
* Checksum for RL78: 3A+4E+6F+74+3A+55+73+65+64+3A = 0x370 && 0xFF = 0x70 - 1 = 0x6F
* Checksum for 78K0R: same as for RL78.
 
These keys are used to access high-privileges Syscon commands, such as the write-to-EEPROM command.
 
== DevKit ==
 
=== Full Firmware ===
 
AES-CBC-128 Key:
<pre>
5301C28824B57137A819C042FC119E3F
</pre>
 
AES-CBC-128 IV:
</pre>
00000000000000000000000000000000
</pre>
 
Used for:
* 40000001 (BLNK)
* 40000002 (BASE)
* 40000003 (SYST)
 
<br />
 
AES-CMAC-128 Key:
<pre>
8F215691AC7EF6510239DD32CC6A2394
</pre>
 
Used to generate the AES-CMAC-128 hash at the start of decrypted 40000001, 40000002 and 40000003, by digesting the remainder of the decrypted data.
 
== Retail/TestKit ==
 
=== Patch Firmware Keys ===
 
AES-CBC-128 Key:
<pre>
EF90B21B31452379068E3041AAD8281E
</pre>
 
AES-CBC-128 IV:
<pre>
00000000000000000000000000000000
</pre>
 
Used for:
* 40010001 (Patch #1)
* 40010002 (Patch #2)
 
<br />
 
AES-CMAC-128 Key:
<pre>
95B1AAF20C16D46FC816DF32551DE032
</pre>
 
Used to generate the AES-CMAC-128 hash at the start of decrypted 40010001 and 40010002, by digesting the remainder of the decrypted data.
 
= Kernel Keys =
 
== Kernel Magic ==
 
* Usage undocumented.
 
<pre>
2FB09FD1DE76967DEB947B51EC82781E
</pre>
 
== PS4 NID default_suffix ==
 
* Salt suffix to symbol names when hashing with SHA1 to create a NID.
 
<pre>
518D64A635DED8C1E6B039B1C3E55230
</pre>
 
== Crash Dump KeySeed ==
 
Crash Dump Master keys (kd, kc):
<pre>
KEYS = [
    ['',''],
    [b'8F86DDEDCBF24A44EB6C30607AA26F76', b'4125715AAB8B78E569F512E65CA62DD3'], # 1.01-3.15
    [b'63AEF79DC49969FD8997B2F60DB65F81', b'1800A5DE2D0F0652FA5602FFADD440AA'], # 3.50-3.70
    [b'05205507B7A154E08A7A38B1897563FB', b'AD334D142EAF8B9438DB00D1D0BFF357'], # 4.00-4.05
    [b'04C1A0961BBB0CB2140361B0956AAABA', b'052D2FF3014FB38CAAF6898CB899982A'], # 4.06-4.07 (to test)
]
</pre>
 
* Crash Dump AES-256-CBC-CFB IV = b'0000000000000000'
 
* Remark: kd and kc names may have been wrongly assigned in fail0verflow's writeup because kd should stand for Digest Key and kc for Cipher Key.
 
=== Usage for generation and unpacking ===
 
For generation, the kd key is used to encrypt the OpenPSID that will be stored in the header:
* OPENPSID_ENC = aes_ecb_encrypt(kd, OpenPSID)
 
For both generation and decryption, from the kc key and the encrypted OpenPSID are derived 2 keys:
* Crash Dump AES-256-CBC-CFB Key = hmac_sha256(kc, OPENPSID_ENC)[:0x10]
* Crash Dump HMAC-SHA256 Key = hmac_sha256(kc, OPENPSID_ENC)[0x10:]
 
For data encryption:
* Encrypted Data = AES.new(Crash Dump AES-256-CBC-CFB Key, AES.MODE_CBC, Crash Dump AES-256-CBC-CFB IV).encrypt(DATA)
* Remark: The algorithm should actually be AesCbcCfb128Encrypt but it is always block-size multiple in crashdump usage.
 
For signature generation:
* Digest in Final Header = hmac_sha256(Crash Dump HMAC-SHA256 Key, secure_header (aligned to 0x80) + DATA_ENC (without final_header))
* Remark: 0x80 bytes of secure_header are hashed for the data_hmac but only 0x14 bytes (actual used bytes) are actually written to disk.
 
For decryption, the kd key is used to decrypt the OpenPSID provided in the header:
* OpenPSID = aes_ecb_decrypt(kd, OPENPSID_ENC)
* Remark: for decryption the user does not have to know the OpenPSID as the encrypted OpenPSID is embedded in the Crash Dump header.
 
For signature verification:
* Digest in Final Header = hmac_sha256(Crash Dump HMAC-SHA256 Key, secure_header (aligned to 0x80) + DATA_ENC (without final_header))
* Remark: 0x80 bytes of secure_header are hashed for the data_hmac but only 0x14 bytes (actual used bytes) are actually written to disk.
 
For data decryption:
* Decrypted Data = AES.new(Crash Dump AES-256-CBC-CFB Key, AES.MODE_CBC, Crash Dump AES-256-CBC-CFB IV).decrypt(DATA_ENC)
* Remark: The algorithm should actually be AesCbcCfb128Decrypt but it is always block-size multiple in crashdump usage.
 
See also:
* Crash Dump decryption and verification implemented in: https://github.com/TeamFAPS/PS4-RE-tools/tree/master/ps4-crash-dump-decrypt
* Crash Dump analysis (parsing after decryption and verification) implemented in: https://fail0verflow.com/blog/2017/ps4-crashdump-dump
 
== PFS Keystone Keys ==
 
=== keystone_passcode_secret ===
 
* keystone_passcode_secret is HMAC-SHA256 Key for [[Passcode]] digest in [[Keystone]] file
 
<pre>
C74405F67424BA342BC1276251BBC2F5
55F16025B6A1B6714780DBAEC852FA2F
</pre>
 
=== keystone_ks_secret ===
 
* keystone_ks_secret is HMAC-SHA256 Key for full keystone digest in [[Keystone]] file
 
<pre>
783D6F3AE91C0E0712FCAAB7950BDE06
855CF7A22DCDBDE127E9BFCBAD0FF0FE
</pre>
 
== VTRM Cipher Init Keys ==
 
* This section is missing the algorithms and usage.
* Used to encrypt/decrypt and hash [[VTRM]] in PS4 [[Serial Flash]].
 
=== hmac_key_seed ===
 
Key:
<pre>
87FB19BBF3D4D6B1B0ED226E39CC621A
37FA4ED2B6618B59B34F770FBB92947B
</pre>
 
IV:
<pre>
00112233445566778899AABBCCDDEEFF
</pre>
 
=== aes_key_seed ===
 
<pre>
B0ED226E39CC621A37FA4ED2B6618B59
</pre>
 
= SceShellCore Keys =
 
=== param.sfo OpenPSID HMAC-SHA256 Key ===
 
<pre>
13D1DF0675C9FD950A17E564C2777F2C
</pre>
 
* In [[Save Data]], a digest of the OpenPSID of the PS4 must be present in the [[Param.sfo#PARAMS|PARAMS]] field of the [[Param.sfo#PARAMS|param.sfo]] file.
* This hash makes the savedata per-console. When the savedata is imported to another PS4/PS5, the hash has to be recomputed and overwritten by the new PS4/PS5 or manually before import.
 
=== Trophy Key ===
 
type Debug (DEX, TOOL):
<pre>
02CCD346B459CB83505E8E760A44D457
</pre>
 
type Release (CEX):
<pre>
21F41A6BAD8A1D3ECA7AD586C101B7A9
</pre>
 
== CEX SceShellCore Keys ==
 
=== RSA PKG Meta ===
 
==== Modulus 400 ====
 
<pre>
D212FC335F6DDB831609628B03562737
82D477853529392D526B8C4C8CFB06C1
845BE7D4F7BCD24E6245CD2ABBD77776
453655273FB3F5F98EDA4BEFAA59AEB3
9BEA5498D206326A58312AE0D44F90B5
0A7DECF43A9C52672D99318E0C43E682
FE0746E12E50D41F2D2F7ED908BA06B3
BF2E203F4E3FFE44FFAA504357916994
49158282E40F4C8D9D2CC95B1D64BF88
8BD4C594E76547841EE57910FB989347
B97D8512A640982CF792BC951932EDE8
90560D65C1AA78C62E54FD5F54A1F67E
E5E05F61C120B4B9B4330870E4DF8956
ED012946775F8CB8A9F51E2EB3B9BFE0
09B78D28D4A6C3B81E1F07EBB4120B95
B88530FDDC3913D07CDC8FEDF9C9A3C1
</pre>
 
==== Private Key 500 ====
 
<pre>
32D903908FBDB08F572B285E0B8DB3EA
5CD17EA890888CDD6A80BBB1DFC1F70D
AA32F0B77CCB88800E8B64B0BE4CD60E
9B8C1E2A64E1F35CD77601415E935C94
FEDD4662C31B5AE2A0BC2DEBC3980AA7
B7856970682B644AB31FCC7DDC7C26F4
77F65CF2AE5A442DD3AB16620419BAFB
90FFE23050896ECB56B2EBC09116925E
308EAEC7945DFD35E120F8AD3EBC08BF
C036749FD5BB5208FD0666F37AB304F4
75295DE95FAA1030B20F5A1AC12AB3FE
CB21AD80EC8F20091CDBC55894C29CC6
CE82653E5790BCA98B06B4F072F677DF
9864F1ECFE372DBCAE8C08811FC3C989
1AC742824B2EDC8E8D73CEB1CC01D908
70873C4408EC498F815AE240FF77FC0D
</pre>
 
==== P 600 ====
 
<pre>
F967AD9912310C56A22E161C46B34D5B
43BE42A2F686968042C3C73FC342F587
49339F075D6E2C04FDE3E1B2AE0A0CF0
C7A61CA16350C8099C5124526C5E5EBD
1E2706BBBC9E94E135D46DB3CB3C68DD
68B3FE6CCB8D8220762363B7E9681001
4EDCBA275D01C12D805E2BAF826BD884
B6105286A7898EAE9AE289C6F7D587FB
</pre>
</pre>


==== Q 680 ====
=== Index.dat Key (Portability) ===


<pre>
<pre>
D7A10F9A8BF2C91195329A8CF0D94047
Key = EED5A4FFE8A3C910DC1BFD6AAF1382250B380DBAE5045D230569473F46B07B1F
F568A00DBDC1FC432F65F9C3610F2577
54ADD758AC8440608D3FF3658975B5C6
2C511A2F1F22E4431154BEC9B4C7B51B
050BBC569ACD4AD973685E5CFB92B78B
0DFFF507CAB4C89B963C079E3E6B2A11
F28AB18AD72E1BA5532406ED50B89067
B1E241C69201EE10F061BBFBB27D4A73
</pre>
 
==== DP 700 ====


<pre>
IV = 3ACB38C1EC12119D56929F49F70415FF
52CC2DA09C9E75E728EE3DDEE345D14F
941CCCC88729453B8D6EAB6E2AA7C715
43A3048F905FEBF3384A77FA36B71576
B6011A8E258782F155D8C6432AC0E598
C932D1946FD901BA0681E06D88F2242A
2501645CBFF2D999673EF672EEE4E233
5CF80040E32A9AF43D2286443CFB0AA5
7C3FCCF5F116C4AC88B4DE6294926A13
</pre>
</pre>


==== DQ 780 ====
flag is 8


<pre>
same as internal
7C9DAD39E0D560149448197F8895D58B
80AD858A4B773785D077BBBF89714A72
CB726838EC02C67DC6440633511CC0FF
958F0D75DC25BB0B7391A96D42D803B7
68D41E7562A37035797800C8F5EF15B9
FC4E475AC870705B5298C0C2584A7096
CCB810E12F788B2BA17FF9ACDEF0BB2B
E266E3229231215792C4B8F23E762037
</pre>


==== QP 800 ====
=== HMAC-SHA256 Patch Pkg URL Key ===


<pre>
<pre>
459755D422085EF35CB4057AFDAA4242
Key = AD62E37F905E06BC19593142281C112CEC0E7EC3E97EFDCAEFCDBAAFA6378D84
AD9A8CA06CBB1D6854546E3E32E35373
76F13E01EAD3CFEBEB233EC0BECEEC2C
895FA8273A4CB7E674BC454C26C825FF
34632537E14810C193A6AFEBBAE3A2F1
3DEF63D8F4FDD3EEE25DE933CCADBA75
5C85AFCEA93DD1A217F3F698B3508E5E
F6EB028EA162A7D62CEC91FF1540D2E3
</pre>
</pre>


=== RSA-2048 HID Config Service Signature Verification Public Key ===
=== RSA-2048 HID Config Service Signature Verification Public Key ===
Key:
<pre>
<pre>
EF276915B7822ADF5D8EA7DF9094AD0EF2C72BB9C08FFAC58FEA3A07505A4B2D610EEE589DBAC967D08B96FBC05AC8111F38886DA99409940B786491FECF0EA6
Key = EF276915B7822ADF5D8EA7DF9094AD0EF2C72BB9C08FFAC58FEA3A07505A4B2D610EEE589DBAC967D08B96FBC05AC8111F38886DA99409940B786491FECF0EA6
4C7F0F1E419B5BA4D6701F2E0069A0E0FFCB4884339827D44A78CDC59E287A40ABB2A3D26BAF99693F8E2376A309CFC52D2F1167F8CD1204C66C94DC54C09332
4C7F0F1E419B5BA4D6701F2E0069A0E0FFCB4884339827D44A78CDC59E287A40ABB2A3D26BAF99693F8E2376A309CFC52D2F1167F8CD1204C66C94DC54C09332
82B12D0362A993BFE995D477611BB7B26FB34AC4ED47C3EFC62D8A93B3561255307DFAA1DCA95EBA612468F3471CEF854868DC035C74442F21F7374AA62CEEAE
82B12D0362A993BFE995D477611BB7B26FB34AC4ED47C3EFC62D8A93B3561255307DFAA1DCA95EBA612468F3471CEF854868DC035C74442F21F7374AA62CEEAE
Line 3,433: Line 2,348:
</pre>
</pre>


* Used to decrypt DUALSHOCK 4 (codenamed Jedi) firmware.
* decrypts dualshock4 firmwares. algo is aes-128-cbc. zeroed iv
* Algorithm is aes-128-cbc with zeroed iv.


== Common ==
== Common ==
Line 3,466: Line 2,380:
=== Certificate Authority Modulus ===
=== Certificate Authority Modulus ===


Modulus:
<pre>
<pre>
8ED7F9E4AA5CC5D23196F0DE797DFEAC
8ED7F9E4AA5CC5D23196F0DE797DFEAC
Line 3,484: Line 2,397:
0B36118C60F253FDBCE227A8A4C9CDF2
0B36118C60F253FDBCE227A8A4C9CDF2
260858584AB8D71C629CD421EC666059
260858584AB8D71C629CD421EC666059
</pre>
Exponent:
<pre>
0x10001
</pre>
= Database rebuild trigger magic =


<pre>
Exponent = 0x10001
0102FECA (or CAFE0201 byteswapped)
</pre>
</pre>
Please note that all contributions to PS4 Developer wiki are considered to be released under the GNU Free Documentation License 1.2 (see PS4 Developer wiki:Copyrights for details). If you do not want your writing to be edited mercilessly and redistributed at will, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource. Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following hCaptcha:

Cancel Editing help (opens in new window)

Template used on this page: