Editing Keys

Jump to navigation Jump to search
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 1: Line 1:
See also [https://www.psdevwiki.com/ps5/Keys PS5 Keys].
= PSVR Keys =
 
== HowTo ==


= System modules keysets revisions =
<pre>
./ps4encdec keyvault/factory_setting_key.bin psvr_emmc_dump/mmc/1.慦瑣牯役敳瑴湩g.img factory_setting 0
./ps4encdec keyvault/rootfs_key.bin psvr_emmc_dump/mmc/6.潲瑯獦.img rootfs 0
./ps4encdec keyvault/firmware_key.bin psvr_emmc_dump/mmc/7.楦浲慷敲.img firmware 0
./ps4encdec keyvault/ta_storage_key.bin psvr_emmc_dump/mmc/8.牴獵整彤瑳牯条e.img trusted_storage 0
./ps4encdec keyvault/rootfs_key.bin psvr_emmc_dump/mmc/9.潲瑯獦㉟.img rootfs2 0
./ps4encdec keyvault/cache_key.bin psvr_emmc_dump/mmc/11.慣档e.img cache 0
./ps4encdec keyvault/firmware_key.bin psvr_emmc_dump/mmc/13.楦浲慷敲㉟.img firmware2 0
./ps4encdec keyvault/userdata_key.bin psvr_emmc_dump/mmc/14.獵牥慤慴.img userdata 0
./ps4encdec keyvault/factory_fw_key.bin psvr_emmc_dump/mmc/15.慦瑣牯役睦.img factory_fw 0
</pre>


The major keyset is at offset 0xA in System Modules (waiting to be more precise).
== Notes ==


{| class="wikitable"
<pre>
|+ PS4 system modules keysets revisions
Filesystems
|-
Part    Name              XTS Key                                Notes
! Keyset Major !! Keyset Minor !! PS4 System Software Version
boot0, boot1                                                      bootloader files with fallback partition
|-
p1      fts                                                        Android-style key-value storage for environment
| 0 || 0 || 1.00-3.70
p2      factory_setting    factory_setting_key.bin                Global and per-device key stores, all encrypted per-device
|-
p3      tzk_recovery                                              FIGO image (recovery TZK and TZBP)
| 0 || 1 || 4.00-4.07
p4      recovery                                                  FIGO image (recovery bootimg)
|-
p5      tzk_normal                                                FIGO image (TZK and TZBP)
| 0 || 2 || 4.50-4.74
p6      boot                                                      FIGO image (bootimg)
|-
p7      rootfs              rootfs_key.bin   
| 0 || 3 || 5.00-5.07
p8      firmware            firmware_key.bin                      Empty linux-firmware tree
|-
p9      trusted_storage    ta_storage_key.bin                    Unused, but seems to have garbage in non-allocated sectors
| 0 || 4 || 5.50-5.56
p10    rootfs_2            rootfs_key.bin                        rootfs fallback
|-
p11    boot_2                                                    FIGO images (boot fallback)
| 0 || 5 || 6.00-6.20
p12    cache              cache_key.bin                          Empty
|-
p13    tzk_normal_2                                              FIGO images (tzk_normal fallback)
| 0 || 6 || 6.50-6.72
p14    firmware_2          firmware_key.bin                      linux-firmware fallback
|-
p15    userdata            userdata_key.bin                      Contains persisted runtime logs
| 0 || 7 || 7.00-7.02
p16    factory_fw          factory_fw_key.bin                    Stores DFU files for provisioning
|-
</pre>
| 0 || 8 || 7.50-7.55
|-
| 0 || 9 || 8.00-8.03
|-
| 0 || 10 || 8.50-5.82
|-
| 0 || 11 || 9.00-9.04
|-
| 0 || 12 || 9.50-9.60
|-
| 0 || 13 || 10.00-10.01
|-
| 0 || 14 || 10.50-10.70
|-
| 0 || 15 || 11.00-11.02
|-
| 1 || 0 || 11.50-11.52
|-
| 1 || 1 || 12.00
|}


= Southbridge firmware keysets revisions =
== kcrs_key.bin ==
<pre>
8E A1 C8 28 C1 27 C4 67 A9 5A A9 13 D1 36 87 D6
</pre>


This section should be explained: meaning if the firmware indexes if possible (Aeolia, Belize, Baikal, Belize2, etc.).
== cache_key.bin Container ==
 
<pre>
{| class="wikitable"
BD 9C 8F E6 5D 99 05 41 A6 B7 17 55 7D 1E 11 3C
|+ PS4 southbridge firmware keysets revisions
C8 9C 64 FC C6 4E 6B 2D 92 2A 81 03 A7 D9 49 CB
|-
2F FD D2 F2 B1 A2 E6 2D 25 04 29 50 C3 1A 5B B3
! Firmware index !! Keyset
18 A1 40 25 E5 E4 B5 81 35 62 90 96 55 6A E6 E0
|-
3D 56 44 6E 46 C9 2E 84 71 F5 AE DC 43 A2 DA 25
| 1 || obsolete
1E 89 27 09 B1 6F 2F C3 79 55 2E 7E B1 BB 78 DE
|-
06 AA EC 6B 1F 65 01 68 CB 10 EC CB 7E 31 E6 D5
| 13 || 0x10000
18 36 76 18 73 A1 D5 22 8D 99 DE 75 11 0A A4 5C
|-
99 B8 C7 E8 40 B6 E3 74 B1 D2 57 CC F1 E0 3F 21
| 32/40 || 0x20000
90 90 00 B0 62 1E 08 DE A5 CD 15 F9 33 58 D2 FE
|-
82 C9 8E 02 13 1C E9 E7 E8 4B 08 BD 15 1D 2E BF
| 36 || 0x30000
68 EA 23 1B D7 C4 E3 EC 96 49 A7 64 B3 43 29 22
|-
56 F4 16 64 68 6D 8B A3 AA 9B 52 33 09 F5 70 86
| 42 || 0x40000
7B D9 16 2A 6B 7D C7 DB 23 AD F0 3C FF 08 B6 00
|}
BC 7C 05 31 C0 4A 9B A6 76 9A 5A 59 BB 0C 04 E6
 
5D A8 37 20 A0 69 73 3F 4E 7B 9D 25 68 7B 43 3D
= PSVR Keys =
74 FE 35 A2 55 F4 0F 63 65 3F CE B0 32 2B 58 7D
 
48 1F A0 B1 30 06 D0 8E E4 84 A7 87 75 E9 A8 FE
== HowTo ==
C5 84 7D EA E3 8A 1D DA F6 AB 7C 3E DE 02 4A 66
 
53 E4 39 32 CD 8C D5 C4 5C 1C 2C 07 0A 18 31 84
<pre>
2D 5B 7F 90 99 1D 28 D3 59 78 48 C2 78 CE FD A7
./ps4encdec keyvault/factory_setting_key.bin psvr_emmc_dump/mmc/1.慦瑣牯役敳瑴湩g.img factory_setting 0
C3 C1 A3 19 E6 44 4D 86 57 19 19 2B 47 BB E5 64
./ps4encdec keyvault/rootfs_key.bin psvr_emmc_dump/mmc/6.潲瑯獦.img rootfs 0
AE 43 9B D3 02 D6 B3 91 81 22 4A B5 7A 9A 7C 31
./ps4encdec keyvault/firmware_key.bin psvr_emmc_dump/mmc/7.楦浲慷敲.img firmware 0
C5 5A 37 E5 B1 F6 5C 5B 10 33 3E 47 42 B6 42 C7
./ps4encdec keyvault/ta_storage_key.bin psvr_emmc_dump/mmc/8.牴獵整彤瑳牯条e.img trusted_storage 0
80 C6 1E 0A C3 46 B2 96 B5 5D 91 3C 4D E9 88 2D
./ps4encdec keyvault/rootfs_key.bin psvr_emmc_dump/mmc/9.潲瑯獦㉟.img rootfs2 0
36 03 A8 1B C6 54 27 92 8B 2C 04 2B 61 9E 8A E7
./ps4encdec keyvault/cache_key.bin psvr_emmc_dump/mmc/11.慣档e.img cache 0
55 B3 1B 23 EF 7E 59 AF 6C F1 72 14 D3 40 33 96
./ps4encdec keyvault/firmware_key.bin psvr_emmc_dump/mmc/13.楦浲慷敲㉟.img firmware2 0
1E 28 31 53 78 1E 6D CF 0D A8 50 1C BB BD 55 9C
./ps4encdec keyvault/userdata_key.bin psvr_emmc_dump/mmc/14.獵牥慤慴.img userdata 0
C5 E7 B4 32 01 70 A4 EC A3 43 F0 0F 5F 96 B0 A2
./ps4encdec keyvault/factory_fw_key.bin psvr_emmc_dump/mmc/15.慦瑣牯役睦.img factory_fw 0
71 DF 96 DA 3B C4 DD 1F 7F 1A 5F 14 1F 50 BD E0
</pre>
96 23 59 D1 99 6C F5 F1 20 AA F9 46 5D A7 78 B9
 
B2 39 F1 E9 F3 81 A3 6D 0A E0 BA 84 55 45 20 B4
== Notes ==
B8 5E B7 8E 6A 38 2A 7A EA 9B 2B 8D A1 C9 1D 21
 
78 00 9D 2F 5E BC DC 10 5D 70 8A 7F 36 3E C4 05
<pre>
95 BA EB C9 D1 3D 63 A0 1F 39 88 A5 4C 7B 3D 97
Filesystems
9C 6B B2 D3 EC 1C 80 7E CD BE 18 F9 58 98 0F 48
Part    Name              XTS Key                                Notes
4F F0 A0 1F 46 09 92 E4 08 AC 9E 2C 63 B5 65 7A
boot0, boot1                                                      bootloader files with fallback partition
E5 12 20 23 AB FC 92 42 2F C7 6E 2B EE 99 E4 13
p1      fts                                                        Android-style key-value storage for environment
46 94 C6 ED 9A 7B 15 95 BF F0 CB FC 9D 78 F4 D6
p2      factory_setting    factory_setting_key.bin                Global and per-device key stores, all encrypted per-device
B9 EC 2E 4A 20 46 0E 26 6F 9C 17 09 E6 7D 41 B0
p3      tzk_recovery                                              FIGO image (recovery TZK and TZBP)
02 72 FE 8A 38 5C C0 18 6C 59 36 2D 2F 21 DF 6E
p4      recovery                                                  FIGO image (recovery bootimg)
AE 0A 4C F7 24 95 7D 6F 77 7B F2 43 C0 9D D3 8B
p5      tzk_normal                                                FIGO image (TZK and TZBP)
DF 01 E7 6E 65 C5 46 BA B3 E5 9E 04 5A 60 91 E7
p6      boot                                                      FIGO image (bootimg)
6B 5E 1D BD FC B4 1D 26 C7 6C 28 02 C4 94 BE 6F
p7      rootfs              rootfs_key.bin   
C7 C5 EC 12 A5 36 03 02 9B FD 9D 68 76 F1 A6 E1
p8      firmware            firmware_key.bin                      Empty linux-firmware tree
03 25 05 5E BE 13 4D 3A 64 0C E1 6A C6 C7 21 4F
p9      trusted_storage    ta_storage_key.bin                    Unused, but seems to have garbage in non-allocated sectors
F0 04 0D 36 99 FB 62 13 2C 5D 06 D1 FF 3C 57 F1
p10    rootfs_2            rootfs_key.bin                        rootfs fallback
C3 B4 B5 CC EC 99 1D A4 41 5E 90 D5 D1 FF 40 B6
p11    boot_2                                                    FIGO images (boot fallback)
99 FA AF 65 2C F8 9F 1F 19 CD D6 91 1F B9 06 A6
p12    cache              cache_key.bin                          Empty
C2 B2 75 48 6A EF 73 B9 AA 40 78 0B 14 13 36 83
p13    tzk_normal_2                                              FIGO images (tzk_normal fallback)
67 86 47 64 CE E5 B4 EB 27 B2 43 25 64 2B 56 9C
p14    firmware_2          firmware_key.bin                      linux-firmware fallback
86 F9 93 11 BD C0 5C B5 72 0B F2 63 83 CF 60 A7
p15    userdata            userdata_key.bin                      Contains persisted runtime logs
EA 81 59 80 5B A9 E3 C5 70 7C 63 7F C9 82 0C F3
p16    factory_fw          factory_fw_key.bin                    Stores DFU files for provisioning
B1 B4 FC 91 79 E9 57 96 D7 CB CB 44 BD FB 47 7C
</pre>
04 7A 83 42 A5 71 D0 E9 88 FC E1 DC DC D4 7B 38
 
35 5A 66 0B FE 7E A6 F9 57 6F 76 63 30 0F 22 E6
* All containers are XTS keys (data at 0x0, tweak at 0x10)
F7 7B EC 56 3F 5F 7D C2 B9 B6 85 6A 00 C3 08 38
 
05 6A FB BB FB F6 A8 81
== kcrs_key.bin ==
 
<pre>
8E A1 C8 28 C1 27 C4 67 A9 5A A9 13 D1 36 87 D6
</pre>
 
== cache_key.bin Container ==
 
<pre>
BD 9C 8F E6 5D 99 05 41 A6 B7 17 55 7D 1E 11 3C
C8 9C 64 FC C6 4E 6B 2D 92 2A 81 03 A7 D9 49 CB
2F FD D2 F2 B1 A2 E6 2D 25 04 29 50 C3 1A 5B B3
18 A1 40 25 E5 E4 B5 81 35 62 90 96 55 6A E6 E0
3D 56 44 6E 46 C9 2E 84 71 F5 AE DC 43 A2 DA 25
1E 89 27 09 B1 6F 2F C3 79 55 2E 7E B1 BB 78 DE
06 AA EC 6B 1F 65 01 68 CB 10 EC CB 7E 31 E6 D5
18 36 76 18 73 A1 D5 22 8D 99 DE 75 11 0A A4 5C
99 B8 C7 E8 40 B6 E3 74 B1 D2 57 CC F1 E0 3F 21
90 90 00 B0 62 1E 08 DE A5 CD 15 F9 33 58 D2 FE
82 C9 8E 02 13 1C E9 E7 E8 4B 08 BD 15 1D 2E BF
68 EA 23 1B D7 C4 E3 EC 96 49 A7 64 B3 43 29 22
56 F4 16 64 68 6D 8B A3 AA 9B 52 33 09 F5 70 86
7B D9 16 2A 6B 7D C7 DB 23 AD F0 3C FF 08 B6 00
BC 7C 05 31 C0 4A 9B A6 76 9A 5A 59 BB 0C 04 E6
5D A8 37 20 A0 69 73 3F 4E 7B 9D 25 68 7B 43 3D
74 FE 35 A2 55 F4 0F 63 65 3F CE B0 32 2B 58 7D
48 1F A0 B1 30 06 D0 8E E4 84 A7 87 75 E9 A8 FE
C5 84 7D EA E3 8A 1D DA F6 AB 7C 3E DE 02 4A 66
53 E4 39 32 CD 8C D5 C4 5C 1C 2C 07 0A 18 31 84
2D 5B 7F 90 99 1D 28 D3 59 78 48 C2 78 CE FD A7
C3 C1 A3 19 E6 44 4D 86 57 19 19 2B 47 BB E5 64
</pre>
</pre>


= Static KeySlots =
== In NPXS21000 ==
 
<pre>
0x40
</pre>


This section should be more precise: static in which sense, which keyslots, if there are known keyslots, etc.
== In coredump.elf ==
 
{| class="wikitable sortable"
|-
! Slot !! Size !! Key !! Static? !! Notes
|-
| 0x43 || 0x10 || <pre>6B 98 18 FF 35 16 7D 30 90 09 0A A4 22 D6 80 57</pre> || {{yes}} || Unknown usage. Same from two PS4 5.05 identical dumps.
|-
| 0x44 || 0x10 || <pre>50 5E 2D 39 EB 32 E5 FC E9 DE E1 F8 0D 9E ED 26</pre> || {{yes}} || Unknown usage. Same from two PS4 5.05 identical dumps.
|-
| 0x50 || 0x10 || <pre>50 7E 2C 58 77 B3 A0 F3 DE 7B 96 A4 F3 8E FE FF</pre> || {{yes}} || Unknown usage. Same from two PS4 5.05 identical dumps.
|-
| 0x52 || 0x10 || <pre>F4 E6 20 AE EE 53 37 73 85 03 D3 64 01 7D AA 29</pre> || {{yes}} || Unknown usage. Same from two PS4 5.05 identical dumps.
|-
| 0x67 || 0x10 || <pre>B2 EB AB D9 2C 2D 12 BE 12 C1 1E BD C7 2D 90 36</pre> || {{yes}} || Unknown usage. Same from two PS4 5.05 identical dumps.
|-
| 0x71 || 0x10 || <pre>87 DB 4C 5C 56 29 1F 3D 4D 60 2E C4 09 50 3A FE</pre> || {{yes}} || Unknown usage. Same from two PS4 5.05 identical dumps.
|-
| 0x15A || 0x10 || <pre>1A F9 22 3E 6C C0 A3 C8 7E CC C6 52 74 19 13 72</pre> || {{yes}} || Unknown usage. Same from two PS4 5.05 identical dumps.
|-
| 0x15B || 0x10 || <pre>2D D7 7F D0 38 BF 67 4C FC 60 73 A9 E7 B6 17 76</pre> || {{yes}} || Unknown usage. Same from two PS4 5.05 identical dumps.
|}
 
= Portability EncDec Keys =
 
Keys of type I are probably used for TestKit/DevKit files and for internal consoles whilst type E are used for retail files.
 
== Portability EncDec Keys Usage in OS ==
 
=== Nowhere known ===


<pre>
<pre>
0xA Unknown
0x08
</pre>
</pre>


=== In [[Kernel]] ===
== In libtsmp.sprx ==


<pre>
<pre>
0x0 pfsSKKey__SecKey
0x08
0xC CFK1
0x14 SCEROOTPARAM_KEY
0x1C SCECloudSD___KEY
0x20 sbl_srv_ioctl
0x24 SCE_LwUtoken_Key
0x28 SCE_SBL_BAR_KEY1
0x44 livedump_secure
0x48 SceHidAuth
0x4C SCE_KDF_NCDT_PSK (as seen on PS4 System Software version 7.55)
0x50 SIEIPMISceIpmiMgrEQSx (as seen on PS4 System Software version 7.55)
0x54 pfs_sbl (as seen on PS4 System Software version 7.55)
0x58 sceSblPfsSaveDataUpdateAuthCode (as seen on PS4 System Software version 7.55)
</pre>
</pre>


=== In [[SceShellCore]] ===
== in libSceSystemService.sprx ==


<pre>
<pre>
0x8 Index.dat
0x40
0xD Hostnames
0x10 SystemLogger
0x3C GetOpenPsIdHash
0x40 Envelope Files
</pre>
</pre>


=== In [[NPXS20001]] ===
== in swagner.self ==


<pre>
<pre>
0x8
0x18
0x40
</pre>
</pre>


=== In [[NPXS20120]] ===
== in swreset.self ==


<pre>
<pre>
0x40
0x18
</pre>
</pre>


=== In [[NPXS21000]] ===
== in ScePlayReady2.self ==


<pre>
<pre>
0x40
0x5C
</pre>
</pre>


=== In [[coredump.elf]] ===
== AES PORTABLE 0x0==


<pre>
* pfsSKKey__SecKey
0x8
* iv is F60016BACD42AD21C70D9B075CB51983
</pre>


=== In [[libtsmp.sprx]] ===
===E===


<pre>
<pre>
0x8
9EA5CD89DA8DAB6E66CE6D345752639D
9A4EE51EEAF084D970FEFC2850F7604E
</pre>
</pre>


=== In [[libSceSystemService.sprx]] ===
===I===
 
<pre>
<pre>
0x40
6CEDCF30A30306F3AAE52B51B93726FD
E18CE3B2B1ED8BB74BDE51D712349314
</pre>
</pre>


=== In [[swagner.self]] ===
== HMAC PORTABLE 0x0==
 
===E===


<pre>
<pre>
0x18
D8808616FA98B0BF50A499D5FA5DCCA7
</pre>
</pre>


=== In [[swreset.self]] ===
===I===


<pre>
<pre>
0x18
096459F1A0C8C5DDDD404E40A4CEBF6C
</pre>
</pre>


=== In [[ScePlayReady2.self]] ===
== AES PORTABLE 0x4==


<pre>
<pre>
0x5C
231D69F73D12C55164D5A40A10DB5170
4DF980998A155CE381966E6521C572C6
</pre>
</pre>


== Encrypted and Plaintext Portability Keys ==
== HMAC PORTABLE 0x4==


=== 0x0 - pfsSKKey__SecKey ===
<pre>
 
B3547B179154B3C9AC96304B4F9AEA73
Used for [[PFS]] encryption/decryption of [[Save Data]] and [[Trophy]].
</pre>


==== AES ====
== AES PORTABLE 0x5==


type E:
<pre>
<pre>
9EA5CD89DA8DAB6E66CE6D345752639D
21E474E20845F868B1EADBC90C7BE001
9A4EE51EEAF084D970FEFC2850F7604E
CF7FBB1A479716EA02F8A30B23C577BB
</pre>
</pre>


type I:
* AACS
<pre>
6CEDCF30A30306F3AAE52B51B93726FD
E18CE3B2B1ED8BB74BDE51D712349314
</pre>


==== HMAC ====
== HMAC PORTABLE 0x5==


type E:
<pre>
<pre>
D8808616FA98B0BF50A499D5FA5DCCA7
94CA4FDC575C812E9E0432459E30DB75
</pre>
</pre>


type I:
== AES PORTABLE 0x6==
 
<pre>
<pre>
096459F1A0C8C5DDDD404E40A4CEBF6C
A48932A314C75ED5321764638B7A2FE8
9EF8ADB044C01302936910C25FD7410E
</pre>
</pre>


==== PFS Sealed Key Keys ====
* Css


After decrypting with portability the keyset 1, types E or I giving the same result, one obtains:
== HMAC PORTABLE 0x6==


<pre>
<pre>
00000000  70 66 73 53 4b 4b 65 79  5f 5f 53 65 63 4b 65 79  |pfsSKKey__SecKey|
6E30BD54F52053CA6B68F9F23B7FD216
00000010  b5 da ef ff 39 e6 d9 0e  ca 7d c5 b0 29 a8 15 3e  |....9....}..)..>|
00000020  87 07 96 0a 53 46 8d 6c  84 3b 3d c9 62 4e 22 af  |....SF.l.;=.bN".|
00000030  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
*
00000080
</pre>
</pre>


* pfsSKKey__EncKey is AES-CBC-128 Key for [[Sealedkey_/_pfsSKKey]]
== AES PORTABLE 0x7==
* pfsSKKey__Secret is HMAC-SHA256 Key for [[Sealedkey_/_pfsSKKey]]
* It is the same keyset on Internal and External.
* A PS4 on System Software version that has keysets til N exports savedata to USB using keyset N and can import savedata from USB using any keyset <= N.
* PS4 Keysets 4 and lower were dumped with the getSealedKeySecret kernel function on System Software 5.05.
 
{| class="wikitable sortable" style="width: 100%"
! style="width: 5%" | PS4 Sealed Key Revision
! style="width: 25%" | PS4 System Software Version
! style="width: 35%" | PS4 pfsSKKey__EncKey
! style="width: 35%" | PS4 pfsSKKey__Secret
|-
| 1
| >= 1.01 (maybe earlier)
| <pre>B5DAEFFF39E6D90ECA7DC5B029A8153E</pre>
| <pre>8707960A53468D6C843B3DC9624E22AF</pre>
|-
| 2
| >= 4.55 (maybe earlier)
| <pre>EC0D347E2A7657471F1FC33E9E916FD4</pre>
| <pre>A6D6583D3217E87D9BE9BCFC4436BE4F</pre>
|-
| 3
| >= 5.05 (maybe earlier)
| <pre>51D8BFB4E387FB4120F081FE33E4BE9A</pre>
| <pre>FFF9BDEA803B14824C61850EBB084EE9</pre>
|-
| 4
| >= 5.05 (maybe earlier)
| <pre>346B5D231332AC428A44A708B1138F6D</pre>
| <pre>5DC6B8D1A3A0741852A7D44268714824</pre>
|-
| 5
| >= 11.00 (maybe earlier)
| <pre>20D043852530C404D16869E07908D5E6</pre>
| <pre>2DE8DE4DE6628BB62DD5C170F565B62C</pre>
|-
| 6
| >= 11.00 (maybe earlier)
| <pre>93B7270DF0D3731060079066655D8D07</pre>
| <pre>FD44A32D8BC8AC189C1BD096402966CF</pre>
|-
| 7
| >= 11.00 (maybe earlier)
| <pre>4C7844836937508B9233DF7CD7D65165</pre>
| <pre>BC4C9F0FE5D356A05752024CBDEEC8E4</pre>
|-
| 8
| >= 11.00 (maybe earlier)
| <pre>3A32EECF749939871C3D7BF8C01C7D1F</pre>
| <pre>F6F9D82182CCC2227B7D33A3B71EADE3</pre>
|-
| 9
| >= 11.00 (maybe earlier)
| <pre>EB3564047D60247F5573CDE57E0CDE1C</pre>
| <pre>298B4F591EF04E52173EEC59C5A47833</pre>
|-
| 10
| >= 11.00 (maybe earlier)
| <pre>8AD492CC5B27B5C36011A5858B909380</pre>
| <pre>006A344182B61BE56A6CD6B9466F0345</pre>
|}
 
==== sealedkey_key ====


type E:
<pre>
<pre>
AC 81 12 EC 4B B2 E1 4D 13 57 8F 72 AC 56 F2 67
7B626924420F5F8D7BC5CBF7BC803C27
F7 D5 CB E2 04 84 F5 2C 7F EB A5 80 FF 56 65 2C
DAFA0EA507083AF6D91033548BCFB216
91 D6 52 BC F2 44 8B 58 CE B7 E9 C2 47 FB C7 C0
F9 83 36 31 75 C1 25 8A 63 7A 27 B2 F8 40 1B 87
9D DA 5C 2B 48 9B 31 16 22 5F F6 25 D6 E5 CA B5
97 D3 08 69 8C 69 88 94 AC 44 8D 02 75 85 56 D1
28 76 0D B7 C7 16 E4 E2 6D 89 89 6F 3F 27 5D F7
7B E0 07 9F 3E 1A B8 38 D3 91 89 D4 7C 82 6A 6D
</pre>
</pre>


type I:
* BdPlus
<pre>
7D 72 D3 AD 98 30 8C 5B AA 86 08 2B 5A 5A 69 69
94 60 D3 5A 10 A6 7D 80 89 10 11 2F 14 E7 95 34
62 99 90 68 9A 84 13 9B B6 A9 40 AA C4 CB DF 3B
81 DE E5 63 9F 70 F3 18 CD 26 8C 3D DD 38 5C EA
38 6D 9C 73 E1 82 8F 0D 81 69 C3 AF 7D 72 6A 4C
87 F1 16 F3 D8 D4 27 BB 37 DC 62 71 64 82 B7 9B
0B D2 A3 B2 6A 62 3B 54 8E A7 DA D2 0B 61 62 66
C5 C9 1A 1F 78 C6 A0 A8 2E 69 13 CC 1D EB 9E 8B
</pre>


==== sealedkey_key_IV ====
== HMAC PORTABLE 0x7==


type E and I:
<pre>
<pre>
F6 00 16 BA CD 42 AD 21 C7 0D 9B 07 5C B5 19 83
8FAA08823BF7354F0999D0D8A7F0A893
</pre>
</pre>


==== sealedkey_key_sign ====
== AES PORTABLE 0x8==
 
===E===


type E:
<pre>
<pre>
E0 B8 33 73 96 0E F4 46 C2 C7 04 BB 25 9B 27 DA
CC3C6CD60871591A5A6C6347B2100CA2
39 70 D0 AE EF 3E 72 62 7C D1 5E FF 8B FC FC F0
FC286633A4D9482B9313FEE574E04338
</pre>
</pre>


type I:
===I===
<pre>
<pre>
2A E5 A0 FB C1 4F C7 34 F5 3B EB B7 13 CE B7 2D
331BDC5EF45CA0CADEB210DDC309C1D2
7E 62 06 E6 09 05 AE 28 E3 5B FB D2 8E E1 EC 78
4E0059E82E1626F24A1855696BE324B2
</pre>
</pre>


=== 0x4 ===
*Index.dat
* iv is 310CC1BD68FA39AF74FB07A6C67B6CBF
 
== HMAC PORTABLE 0x8==


==== AES ====
===E===


<pre>
<pre>
231D69F73D12C55164D5A40A10DB5170
7FA3B3BA6D9456EE223EB74A2D30AA54
4DF980998A155CE381966E6521C572C6
</pre>
</pre>


==== HMAC ====
===I===
 
<pre>
<pre>
B3547B179154B3C9AC96304B4F9AEA73
D820E2E7455FB1F43EE0593EDA734E9B
</pre>
</pre>


=== 0x5 - AACS (Bluray) ===
== AES PORTABLE 0xC==


==== AES ====
===E===


<pre>
<pre>
21E474E20845F868B1EADBC90C7BE001
36902DC7BD1EC112BE122D2CD9ABEBB2
CF7FBB1A479716EA02F8A30B23C577BB
29AA7D0164D30385733753EEAE20E6F4
</pre>
 
===I===
<pre>
16BC4CCEABEA9F03D2EB670BD29630A1
882D16F707FD33FA2ABFEC130F60EEFF
</pre>
</pre>


==== HMAC ====
*CFK1(Crepo)
 
== HMAC PORTABLE 0xC==
 
===E===


<pre>
<pre>
94CA4FDC575C812E9E0432459E30DB75
FFFE8EF3A4967BDEF3A0B377582C7E50
</pre>
</pre>


==== AACS Keys ====
===I===


<pre>
<pre>
0A547025878C198979548FF00BA9E445 <- Key
C3F74D676DCF7A68AA482ED8914405B7
C0D00D285FC00870B543C1F31FAE44A8 <- IV
CD4F7C917ED4C9FE3B337EA2C60EC273
115BF5EE2659FF078C373EEDDFD4F3C7
05628DC933468421B2C88448080092B5
FD2ECD5E11264EDEDBA51D7E7B364B1C
B24216CF7D781DFB82DC866B976F4EC4 <-
B73C1037C7FED6C1315AD7C16AC8EA79 <-
</pre>
</pre>


=== 0x6 - CSS (Bluray) ===
== AES PORTABLE 0xD==


==== AES ====
===E===


<pre>
<pre>
A48932A314C75ED5321764638B7A2FE8
BDA98742518157C4634A21FBB47C8311
9EF8ADB044C01302936910C25FD7410E
D21CE6016404D8CB2EF0C24462C42C38
</pre>
</pre>


==== HMAC ====
===I===


<pre>
<pre>
6E30BD54F52053CA6B68F9F23B7FD216
8FC2405D96B41290DF62525E536E37B6
42D798F0538B7FB42829C05ECBB00B08
</pre>
</pre>


==== CSS Keys ====
*hostnames(ShellCore)
 
== HMAC PORTABLE 0xD==
 
===E===


<pre>
<pre>
0957909454D722D5FD71D02A5CCAC711 <- Key
AED0BCC3264D91A698E4D7D8CA428E52
C9E37A810F42EFAA2A5BE0C8E75E3D2A <- IV
75B68FB0DBEF478F3975443180095AD2 <-
EA018F41C99D65CA57190A1B4F973BED <-
2DB61C46D497A1EC092816DC1243FF5E
C86676C3A45AB182B21BF75277916BE0
548631EF9270FC6F8BCBBCAF8BA3753D
F3F472638D324ECBBA7A4D844C2CA612
</pre>
</pre>


=== 0x7 - BdPlus (Bluray) ===
===I===
 
==== AES ====
 
<pre>
<pre>
7B626924420F5F8D7BC5CBF7BC803C27
A43C5B248AEF15C4CEFAEA170F6F31F7
DAFA0EA507083AF6D91033548BCFB216
</pre>
</pre>


==== HMAC ====
== AES PORTABLE 0x10==
 
===E===


<pre>
<pre>
8FAA08823BF7354F0999D0D8A7F0A893
32AF1AE6A8B408ACA7072C9364BF8A36
BA19E55263F00585EA2653311747A1E4
</pre>
</pre>


==== BdPlus Keys ====
===I===


<pre>
<pre>
CAC19E73A99A37649720DBA9E5B9C8E9 <- Key
05E051FEDB737FEEA2FFA6D78AAC1613
971D666C66C5BBA31B6280AC5D00A849 <- IV
2ABAE36253F2A291C2EF0A1ACADAE1D1
B49740B965AACFA87DCE1218EBB1B27C <-
0CA31B024A73E030D2BB9FB3613DF147 <-
AE27A7DE70E1C1329DBC1CD0533F836D
081812B592AFCD8180C054F5F9F04616
185317D8D26C5DA45F80C358DA071BAA
F55720FC0620F54F235A5DA1C3459FB0
</pre>
</pre>


=== 0x8 - index.dat ===
*logger
* iv is a1d989b020185024f4c448283537540b


==== AES ====
== HMAC PORTABLE 0x10==


* iv is 310CC1BD68FA39AF74FB07A6C67B6CBF
===E===


type E:
<pre>
<pre>
CC3C6CD60871591A5A6C6347B2100CA2
E2AB163DFA812B4AA73FFB0AB4CB27E2
FC286633A4D9482B9313FEE574E04338
</pre>
</pre>


type I:
===I===
 
<pre>
<pre>
331BDC5EF45CA0CADEB210DDC309C1D2
F7B1C4722FC52AEED7AE88C7DAB14C97
4E0059E82E1626F24A1855696BE324B2
</pre>
</pre>


==== HMAC ====
== AES PORTABLE 14==


type E:
===E===
<pre>
7FA3B3BA6D9456EE223EB74A2D30AA54
</pre>


type I:
<pre>
<pre>
D820E2E7455FB1F43EE0593EDA734E9B
3A9980C60B2752B1E5C9437C8BE0730E
057683371B0207B1B63D32412D41AAC3
</pre>
</pre>


==== index.dat Key ====
===I===


Key for E and I:
<pre>
<pre>
EED5A4FFE8A3C910DC1BFD6AAF1382250B380DBAE5045D230569473F46B07B1F
190C5FD353B619FFE1CEE8DEB9F828DA
60F0ADA572E1C5CB30BC259BD0818C66
</pre>
</pre>


IV for E and I:
*SCEROOTPARAM_KEY
<pre>
* iv is 9569829CD4B15FF84330545A34EC1BC5
3ACB38C1EC12119D56929F49F70415FF
</pre>


=== 0xA - Unknown ===
== HMAC PORTABLE 14==


==== Unknown 0xA Key ====
===E===


Dumped from PS4 kernel:
<pre>
<pre>
ffffff807b92b8e0  15 a0 cb 65 d6 a4 05 27  e6 1c cd da 2a ef 53 3b  |...e...'....*.S;|
38618E377454ADC8EA799376DEB01D34
ffffff807b92b8f0  13 fc 7c 35 24 14 b3 54  3d c7 83 24 6e fc c9 64  |..|5$..T=..$n..d|
ffffff807b92b900  9d f8 40 9a c2 02 09 82  3c 08 61 2b e6 2a 51 79  |..@.....<.a+.*Qy|
ffffff807b92b910  cf 87 62 61 c0 85 46 c2  a5 da a1 9b d0 e7 ff 79  |..ba..F........y|
ffffff807b92b920  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff807b92b930  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff807b92b940  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff807b92b950  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
</pre>
</pre>


=== 0xC - CFK1 (Crash Report) ===
===I===
 
==== AES ====


type E:
<pre>
<pre>
36902DC7BD1EC112BE122D2CD9ABEBB2
0CB1FD77B96A6815E65A1B26BF29822F
29AA7D0164D30385733753EEAE20E6F4
</pre>
</pre>


type I:
== AES PORTABLE 18==
<pre>
16BC4CCEABEA9F03D2EB670BD29630A1
882D16F707FD33FA2ABFEC130F60EEFF
</pre>


==== HMAC ====
===E===


type E:
<pre>
<pre>
FFFE8EF3A4967BDEF3A0B377582C7E50
7D031910F9918242BD0069AACD047249
A95E1F0651AE9D14E4F7B09D0D816E56
</pre>
</pre>


type I:
===I===
<pre>
<pre>
C3F74D676DCF7A68AA482ED8914405B7
9FCEEE75F2FD4C0A57AA32FDBD4093D3
7876E4D29D621BB54E62A2756E3E9C83
</pre>
</pre>


==== crepo_key_1 ====
*swagner,swreset
 
== HMAC PORTABLE 18==
 
===E===


type E:
<pre>
<pre>
00000000  43 46 4b 31 00 00 00 00  00 00 00 00 00 00 00 00  |CFK1............|
E42C03F0ABAF7DED9EF3B31461526DF1
00000010  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
00000020  61 9a d0 db 62 cb 51 37  d8 aa 84 d0 28 b9 92 2d  |a...b.Q7....(..-|
00000030  74 46 01 4d 5a 20 67 31  af d2 ab 62 44 d1 f5 92  |tF.MZ g1...bD...|
00000040  de 9f 35 6c 99 1b 1c 04  3d 76 cd 9f b1 a7 03 57  |..5l....=v.....W|
00000050  89 73 d9 26 a1 60 ea 72  d8 e7 33 9f b0 52 f0 e2  |.s.&.`.r..3..R..|
00000060  06 80 47 c4 d7 7a fd fd  95 72 27 8d 97 ab f4 21  |..G..z...r'....!|
00000070  aa cd 9d 9d 2a a2 30 cc  0d 37 b8 69 47 d1 6a ac  |....*.0..7.iG.j.|
00000080
</pre>
</pre>


type I:
===I===
<pre>
<pre>
43 46 4B 31 00 00 00 00 00 00 00 00 00 00 00 00
0F4A79378A97768F719E29A5AE787513
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
77 B7 5A 04 C9 69 D3 FE BC 11 38 EE 2F B1 31 CC
71 E6 66 F7 D3 78 E4 F4 CD AB 35 D7 DE C4 A3 26
3B 2A 68 2C 43 06 15 CE 04 77 3D 4B A5 BC F8 7E
CF 9B CF 77 B4 8B A7 78 DE BD 09 75 BB 5B B1 27
44 A1 E3 CC EC 71 4F 10 09 48 CC 23 55 41 3C CE
11 34 1A 57 F2 34 69 F9 62 6B 2E 71 AD 17 B2 2C
</pre>
</pre>


==== crepo_key_2 ====
== AES PORTABLE 1C==
 
===E===


type E:
<pre>
<pre>
00000000  40 83 63 f3 b4 d0 4b 54  09 ba f3 f4 27 41 13 c4  |@.c...KT....'A..|
77684D4ACD210B03382327D4D15A88A4
00000010  ac 97 ae 26 3b 9b 26 1c  2d 87 50 35 80 a3 e0 34  |...&;.&.-.P5...4|
19BD06EEC04474EDEEB1A007C6112CEA
00000020  f9 97 e5 b9 8c 85 9d 90  33 68 04 32 81 1b 50 21  |........3h.2..P!|
00000030  1f a4 5d 36 63 a3 50 7b  cc 68 12 7c bf 9a aa 2d  |..]6c.P{.h.|...-|
00000040  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
*
00000080
</pre>
</pre>


==== crepo_iv ====
===I===


<pre>
<pre>
23 F8 85 CA 50 B2 98 0A AB 7E 88 AE 65 51 C0 BF
EA9F99E9ED0D33D58C81E14D30F804C4
75B1B85AF1C33E3408F4107FA78AEE05
</pre>
</pre>


==== crepo_key_1_sign_E ====
*SCECloudSD___KEY
* iv is DF140F0A54E95A581B8049DAA2A9AF2B


<pre>
== HMAC PORTABLE 1C==
AE 41 33 01 F9 6E 1D 03 F1 D9 98 1B 2F B3 75 87
05 C0 6A 94 AD 29 34 5C ED 22 17 ED 4C 7A A3 D1
</pre>


==== crepo_key_1_sign_I ====
===E===


<pre>
<pre>
00 3F 02 7D 1A BE F2 9A BB E5 23 D7 0F 7B 55 3A
240299607EDB6505B68A7C8852E9305E
14 F7 F0 83 14 04 05 0F 2A B5 23 DD D1 5D F4 C6
</pre>
</pre>


==== crepo_key_2_sign_E ====
===I===


<pre>
<pre>
E6 A0 82 8A B4 7A 8D A2 AF B4 A7 34 20 DF B7 88
1539E66891EFC669FF9BDA34123BBE06
F6 6B 78 E7 DF F7 17 69 43 8B 15 64 75 15 F3 33
</pre>
</pre>


==== crepo_key_2_sign_I ====
== AES PORTABLE 20==
 
===E===


<pre>
<pre>
B1 2B 7C 5B 0E 11 18 C3 B0 F6 7B 31 80 C8 B8 F7
071B19D53D462093E0AF664ACFA9F937
B6 9E 3D 97 E5 36 47 C2 08 E0 34 43 51 0A DC 13
2FCD0154FF04A9AE39E88EFF27823F0C
</pre>
</pre>


==== crepo_key_1_E ====
===I===


<pre>
<pre>
24 3F 86 77 5F 7C DA 8F 9A D4 8A 72 69 9C BC 1E
D6E3473A984BB836E1637F813CA5953E
97 6E 77 0B CE E0 C9 5C 06 CD A7 D4 FD A2 1F E4
186EF9F184BB76DBBC64B639F50CFF02
B8 1F 78 FD 20 80 81 9B B5 4C 49 D7 12 87 18 86
CE 04 7A 2C 47 63 10 A7 FC 38 F4 C2 C9 2F 8A 38
80 E6 F4 5E F3 32 FF 11 E0 7C D5 DA 99 A9 36 72
EC BD E0 B1 E2 27 90 73 3C DD 8F B6 1B 3B E8 88
29 E6 85 EC E9 FB 4C D9 B9 53 FA D5 0D D0 73 78
6F 91 03 07 54 F6 CF 74 98 E9 4C D7 DF 8F 5F CA
</pre>
</pre>


==== crepo_key_1_I ====
== HMAC PORTABLE 20==
 
===E===


<pre>
<pre>
8B 5B 04 14 D6 26 36 F6 86 37 DD 3A E2 8B EC FA
8F1DFF012B1814D73F70A1BCF04EAE7F
44 54 2C EB 14 6D 61 F7 4B 47 CF B5 6D 3F 82 F1
45 49 B1 52 50 B9 95 59 37 56 4A A5 59 A7 AC DA
CA 09 D5 04 F0 1A 23 95 E4 99 B8 D3 4A B5 41 C9
4B BE 57 53 61 BF E7 55 95 EE DC 1F 52 E3 16 C2
3E E6 2A 52 3F 17 36 A9 F2 4D 4D BD 0A 15 16 EB
3C 6B 55 0F B9 24 32 48 E0 F7 89 69 B6 D5 5C 09
31 4B 29 23 46 90 B3 1C B6 B3 CB C8 58 31 3E 65
</pre>
</pre>


==== crepo_key_2_E ====
===I===


<pre>
<pre>
E6 6C 7A 2A 1F 0F B8 B1 11 E4 23 09 48 05 0A 21
DB801FB08E1C0DCE0B9ECC4E518AE24E
9A EF 3C FC 8C 23 33 55 FE 92 9D 27 37 60 72 6C
7B D2 4A 68 8A 47 F9 9A 8A 47 7C A3 11 45 1B D0
C4 B1 08 65 0A 75 6E 2A FB 67 A8 D7 F6 BD 9F 9A
D0 20 B3 66 57 71 CA 02 1C E4 4E C0 76 9B 06 AC
F4 21 90 AF 68 0E 63 CE 18 4D B2 49 9B 15 BE 4B
19 B8 00 51 CA 98 DD 3B 78 57 41 11 AE B2 D9 C6
EC C1 28 54 1C 06 B2 DB 32 4B 88 8D 6E FB 23 F0
</pre>
</pre>


=== 0xD - hostnames ===
== AES PORTABLE 24==
 
Decrypts some hostnames that [[SceShellCore]] connects to.


==== AES ====
===E===


type E:
<pre>
<pre>
BDA98742518157C4634A21FBB47C8311
3BDDF81A1FE5CFEE3DAD1835B21CFFED
D21CE6016404D8CB2EF0C24462C42C38
C10609C5D4D1DB17333ABECAEB2EF955
</pre>
</pre>


type I:
===I===
<pre>
<pre>
8FC2405D96B41290DF62525E536E37B6
6E523DCAFDAFC20BDF288C8DF3F7BA97
42D798F0538B7FB42829C05ECBB00B08
146BFF1C88427E52461DA28F8D305B36
</pre>
</pre>


==== HMAC ====
*SCE_LwUtoken_Key
* iv is ED7BD631517CF4753C9DDA7A3AB859DB
 
== HMAC PORTABLE 24==
 
===E===


type E:
<pre>
<pre>
AED0BCC3264D91A698E4D7D8CA428E52
7D10C415D0C0C5DD85C6795E7BA08A7B
</pre>
</pre>


type I:
===I===
 
<pre>
<pre>
A43C5B248AEF15C4CEFAEA170F6F31F7
4AC61958B2BCFA6793B49DF84672A44D
</pre>
</pre>


==== SCE_CFS_hostname (type E) ====
== AES PORTABLE 28==
 
Host by Amazon AWS at Portland, Oregon, 97086 United States of America. Alias of cfss.crs.playstation.net.


Zeke Jedediah Dunbar is a main character of the Infamous videogame developped by Sony Computer Entertainment America.
===E===


<pre>
<pre>
ffffff8085f7f8e0  53 43 45 5f 43 46 53 5f  68 6f 73 74 6e 61 6d 65  |SCE_CFS_hostname|
27E0770E09A7FC1D83812F82D5775AE1
ffffff8085f7f8f0  63 66 73 73 2e 64 75 6e  62 61 72 2e 73 63 65 61  |cfss.dunbar.scea|
7CB5D77FE73EC981579EB0D2D4FE19FE
ffffff8085f7f900  2e 63 6f 6d 00 00 00 00  00 00 00 00 00 00 00 00  |.com............|
ffffff8085f7f910  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8085f7f920  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8085f7f930  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8085f7f940  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8085f7f950  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
</pre>
</pre>


==== SCE_RCR_hostname (type E) ====
===I===
<pre>
587853D8EF32804120B6CA6AC15F9E7C
31844FBB1FD5677B18CA34F3C86C371E
</pre>
 
*BAR_KEY(BackupAndRestore)


Host by Amazon AWS at Portland, Oregon, 97086 United States of America. Owned by Minato-ku for Sony Computer Entertainment Inc. Network Platform Service Department at Tokyo (Japan).
== HMAC PORTABLE 28==


Zeke Jedediah Dunbar is a main character of the Infamous videogame developped by Sony Computer Entertainment America.
===E===


<pre>
<pre>
ffffff8085f7f8e0  53 43 45 5f 52 43 52 5f  68 6f 73 74 6e 61 6d 65  |SCE_RCR_hostname|
DDBE5F9AABC6E810C1527C560EAF8DC5
ffffff8085f7f8f0  7a 65 6b 65 2e 73 63 65  61 2e 63 6f 6d 00 00 00  |zeke.scea.com...|
ffffff8085f7f900  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8085f7f910  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8085f7f920  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8085f7f930  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8085f7f940  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8085f7f950  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
</pre>
</pre>


==== SCE_CDN_hostname (type E) ====
===I===
 
CDN hotname used for Crash Report. When a crash happens in a PS4 usermode application, the software asks the user if it accepts to send it to SCE servers. If the user accepts, the crashdump is encrypted and sent to SCE crepo servers for analysis.


<pre>
<pre>
ffffff8085f7f8e0  53 43 45 5f 43 44 4e 5f  68 6f 73 74 6e 61 6d 65  |SCE_CDN_hostname|
13D173D007FC85D02FC146A78B2C3032
ffffff8085f7f8f0  63 72 65 70 6f 2e 77 77  2e 64 6c 2e 70 6c 61 79  |crepo.ww.dl.play|
ffffff8085f7f900  73 74 61 74 69 6f 6e 2e  6e 65 74 00 00 00 00 00  |station.net.....|
ffffff8085f7f910  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8085f7f920  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8085f7f930  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8085f7f940  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8085f7f950  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
</pre>
</pre>


=== 0x10 - logger ===
== AES PORTABLE 3C==
 
==== AES ====


* iv is A1D989B020185024F4C448283537540B
===E===


type E:
<pre>
<pre>
32AF1AE6A8B408ACA7072C9364BF8A36
B7F71CB821D163D3E48D20E13CB37C64
BA19E55263F00585EA2653311747A1E4
FE8834B96073CCFD0A60BCC04411C00C
</pre>
</pre>


type I:
===I===
 
<pre>
<pre>
05E051FEDB737FEEA2FFA6D78AAC1613
37CE6FF2CBA0C69460329C223EA763E6
2ABAE36253F2A291C2EF0A1ACADAE1D1
EAE1D5DBFC5803C94CDA8D708161F6A0
</pre>
</pre>


==== HMAC ====
*SCE_SYS_TLM_SECK
* iv is CE5326C917B698478C46E0387689CB4A
 
== HMAC PORTABLE 3C==
 
===E===


type E:
<pre>
<pre>
E2AB163DFA812B4AA73FFB0AB4CB27E2
839E28FC0455F027BDE024DFA6ADCB8A
</pre>
</pre>


type I:
===I===
 
<pre>
<pre>
F7B1C4722FC52AEED7AE88C7DAB14C97
0D7F88C9A9128A1FD6EF367E78062572
</pre>
</pre>


=== 0x14 - SCEROOTPARAM_KEY ===
== AES PORTABLE 40==
 
Used by [[SceShellCore]] to verify rootparam SFO/JSON.


==== AES ====
===E===


type E:
<pre>
<pre>
3A9980C60B2752B1E5C9437C8BE0730E
FE3A5009C42E604D3D1F29565C4CDB87
057683371B0207B1B63D32412D41AAC3
0FDCD521338C8486D2AD85BB5220AC49
</pre>
</pre>


type I:
===I===
 
<pre>
<pre>
190C5FD353B619FFE1CEE8DEB9F828DA
353233D34AE6544ADB79FFE2978E88B9
60F0ADA572E1C5CB30BC259BD0818C66
F5E5951E752DC76941E173B0F239DE49
</pre>
</pre>


==== HMAC ====
*envelopes(i'm looking at you, idc ;) )
 
== HMAC PORTABLE 40==


type E:
===E===
<pre>
38618E377454ADC8EA799376DEB01D34
</pre>


type I:
<pre>
<pre>
0CB1FD77B96A6815E65A1B26BF29822F
898BC1304C51736BA56C33CAE992225F
</pre>
</pre>


==== rootparam_key_IV ====
===I===


type I and E:
<pre>
<pre>
95 69 82 9C D4 B1 5F F8 43 30 54 5A 34 EC 1B C5
1D9E1E5B2A87B887FF1E017B02D0E04C
</pre>
</pre>


==== rootparam_key_0_sign_I ====
== AES PORTABLE 44==
 
===E===


<pre>
<pre>
56 CF 9D AE DC 50 B4 1F D7 AA 70 9C A5 4B 9F 1A
FABE3A6D6B96A150CD5BD5652208F695
74 82 ED 32 BC 74 39 63 55 AD B4 97 E0 53 59 48
18F75EBD22704F5298F3B59248951389
</pre>
</pre>


==== rootparam_key_1_sign_I ====
===I===


<pre>
<pre>
F5 1C 1C 99 EF 32 50 74 74 D8 A8 1E 18 98 2B D1
882D16F707FD33FA2ABFEC130F60EEFF
AC FE FB E1 44 BC E8 1F FA B0 01 A9 AA 10 84 09
D1F8B09AA448624FD62A94C84A9433D6
</pre>
</pre>


==== rootparam_key_2_sign_I ====
*livedump_secure


<pre>
== HMAC PORTABLE 44==
30 28 0F 86 13 4C 1E 6D 63 79 CF D6 2D 00 11 50
D7 8D 58 D9 F1 6B 0C A2 94 BB 61 17 77 70 62 80
</pre>


==== rootparam_key_3_sign_I ====
===E===


<pre>
<pre>
54 98 5A 3A A1 8E 1C C6 78 62 A3 B9 71 C7 85 13
C7959E7798833634764BE40421E4CA87
12 93 87 86 64 D7 4A B0 A0 87 DF C7 55 BD 28 60
</pre>
</pre>


==== rootparam_key_4_sign_I ====
===I===
 
<pre>
<pre>
B9 CC D2 86 B6 3B 9C 1C 35 08 27 B3 2A D9 30 9A
A154061C592CE76844847C137F5BE71B
9A AE F9 FB 45 CA D1 32 0D 93 21 41 F8 85 48 26
</pre>
</pre>


==== rootparam_key_5_sign_I ====
== AES PORTABLE 48==
 
===E===


<pre>
<pre>
9C 5F A8 5E 4D 1C A8 C7 81 D1 EF 42 1E 34 A2 D0
0606708496452DD32191FD838B3B6840
ED 3B 4D E5 6C 7C 34 1B 49 EC CF 36 2D B5 C2 43
84CFA1C4FB4427BB21CA18E8CA80406D
</pre>
</pre>


==== rootparam_key_0_I ====
===I===


<pre>
<pre>
F6 9F B6 9A 77 1F C2 D5 12 F7 25 2F A5 86 FB 22
AC4E5205E1EFF2CD76DBC73EB13C383A
0D BF A3 F2 38 89 A5 17 97 49 34 D7 83 83 D6 6D
8C8F99A88FB3A50D554C0934DA1E7946
F9 74 DA 89 35 6B 7F A8 00 63 42 61 ED 70 19 5C
A7 A0 34 73 8D FC 2E E3 66 D6 FC 07 D4 F4 FC 86
E4 67 B4 8B E9 54 34 0D AE B2 01 60 AA A4 70 42
0E 95 62 13 AC D4 7D 11 88 DB 22 7D 4D 1D 92 D2
CF E9 D8 E5 54 7A B6 D6 51 C6 A8 8E 29 B3 C0 51
45 66 F6 41 82 A1 33 1D 7C 6C F8 00 43 F0 BD D3
</pre>
</pre>


==== rootparam_key_0_I (SCEROOTPARAM_KEY plain) ====
*SceHidAuth
 
* iv is 322FDB812C9AA16311E13372657282A1


* Dumped from Kernel memory.
== HMAC PORTABLE 48==
<pre>
53 43 45 52 4F 4F 54 50 41 52 41 4D 5F 4B 45 59
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
CA 5C 5D 73 F7 57 0D 77 E9 00 AB 72 C0 5A C3 C4
B4 9C 45 CB CD 90 29 61 58 EC 47 1F 5F 26 72 52
29 ED 9C 0A F8 D3 97 00 29 85 A9 DF D0 F2 47 21
03 EA A7 1E B1 10 C0 03 99 B1 1D EC B2 E5 DF 08
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
</pre>


==== rootparam_key_1_I ====
===E===


<pre>
<pre>
95 C7 DC 5B 0A EA 8D 72 A2 6A 57 9E 54 12 6F 22
6421DC67BF1520757FB15A68015B0693
C8 C9 7C 84 1C E9 F3 E4 02 F8 7D 63 03 21 5F 9D
AA 52 46 E7 31 24 58 14 BA ED F2 9D 34 A3 2A 11
C3 08 1E 5C A6 39 50 38 6A 0F CA D4 31 26 31 89
65 78 67 BF 4A BF 4B C0 FE A5 B1 84 48 1D 5A E6
A5 DA 6B BB 54 57 E8 AB A5 2E 95 C4 C5 84 4B EB
95 01 0B 6B 37 8C B6 5D E0 A4 B8 2A 7F 9C 87 9F
46 E4 67 82 84 58 71 C8 6E 41 CF 02 FA 4C 41 D5
</pre>
</pre>


==== rootparam_key_2_I ====
===I===


<pre>
<pre>
A9 60 9B D1 75 16 C8 85 03 49 D2 14 47 04 DD 1A
54D04BABDE26E6D8481A5D860C2D3200
E7 A5 EF 87 45 76 DA 51 1F 42 82 8F 76 48 81 9B
95 CF 6A 22 21 84 3F 0A 2E 16 B3 64 E5 8C 08 CC
5E AD B8 5B F4 AC AB 9F 6D 3C 7B B9 2B 63 83 FB
89 07 A5 CF 8D 00 18 F9 F5 95 57 7A 8A B2 0A 25
03 53 69 EB BC 58 EE 96 42 D8 3C 99 E1 5F 62 92
C8 05 5B A3 47 25 C5 B5 97 B9 05 5E D2 52 1B 6A
90 22 FD 01 6F D3 95 2B 12 86 F3 7E 1D 74 04 E0
</pre>
</pre>


==== rootparam_key_3_I ====
== AES PORTABLE 4C==


<pre>
<pre>
8C E4 47 03 2A C2 DA A9 8C 83 6E 9B 47 35 D5 37
BA08EE7EFA8BFEBD4C6360A8F61C1D37
CC B8 36 DA C4 F8 22 E8 7A FA 26 50 C8 17 71 26
E735A3A1185C2B91B438D5DD132A5ED0
BC F4 8A B7 55 EE 81 3A F9 80 6D 34 E6 9A B8 7D
93 8F C0 BD 3A 16 5C 7E CD FF 36 D5 9A BC 6F 15
D5 45 DF 5D 15 5D E7 C6 AF 67 6F 18 D1 8B 95 2E
7C D4 2D B2 E0 72 E3 A1 80 7B 01 F0 32 BB 27 88
24 08 B1 EE BF E0 5E 28 9B 1B C5 F3 F0 84 D5 3E
18 83 AB 46 60 2F 27 D2 6B 86 65 0C CA C7 89 C1
</pre>
</pre>


==== rootparam_key_4_I ====
*SCE_KDF_NCDT_PSK
* iv is 90F86BD0BD6587517E71FEB62A8AE2BF
 
== HMAC PORTABLE 4C==


<pre>
<pre>
5C 5D B0 53 08 4B A6 BA A7 B1 E2 6B C6 36 32 CA
CD5486B6219C0B1798799576194774AA
38 E7 DC 3A 19 67 34 D0 AB 5D 3C CA 29 1B 10 C2
B9 A5 84 99 82 B5 AA EE 75 36 B1 3C 9B 64 A4 83
42 51 68 8E 4B 1F 14 D3 F8 38 1E 8A A3 56 8A 41
43 CD D6 E7 05 6D 7F B5 A9 4E A2 34 ED 82 29 80
8D 63 C0 AF F8 C3 35 66 DC 49 E6 B6 AB F5 AA F6
1E B3 FD 52 F8 79 18 F2 55 98 66 8C 61 4E 83 F1
D6 7E A4 70 53 25 BE 42 D3 19 4A 8D B0 8A AC EF
</pre>
</pre>


==== rootparam_key_5_I ====
==AES PORTABLE 50==


<pre>
<pre>
36 EF D1 C2 7E 49 6E 6B 23 98 C4 43 AE AB DB B0
C2E211E71F4CCD76B65EBB45E64D995A
BA 5D A5 6C 2A E1 86 45 F8 39 E9 26 DB FD 4C 10
7424AE72CCC4DF2D6F34CA2F92797B49
1A A4 32 D0 F0 0C A3 13 5D 17 82 5A 45 9C C7 76
5F 70 25 31 23 3E A0 15 C6 01 BE 5F 48 56 A7 15
08 9D F2 D6 64 9A 2F 38 8F 67 DA 09 17 A9 4D 02
79 EA D9 31 23 C4 37 19 36 EE 4F 7D 88 1D 8B 5D
EB C6 74 F2 EA FE F6 E6 F4 66 B6 FF 0A 65 FD 46
14 D2 98 88 CF 13 49 15 58 BE E6 E6 1E CB 42 F7
</pre>
</pre>


==== rootparam_key_0_sign_E ====
*SIEIPMISceIpmiMgrEQSx
 
* iv is 6E73A4D0DF65788581DADA975F5F37A6
<pre>
6C 11 E6 DD 2F 5D 27 D5 8F 06 9E FC 24 11 6F DD
1D 26 36 33 F4 A7 A2 DE C9 06 17 88 51 88 ED 61
</pre>


==== rootparam_key_1_sign_E ====
==HMAC PORTABLE 50==


<pre>
<pre>
BC 8E 1B D1 91 D4 EF A8 65 A4 25 15 C6 6F BE D1
06173BD09FAB15567064939F1C622A5B
E6 99 81 1C A7 25 73 C0 00 EA 1C A9 D6 B6 12 3A
</pre>
</pre>


==== rootparam_key_2_sign_E ====
==AES PORTABLE 54==


<pre>
<pre>
55 29 35 D8 4A B8 D5 FD B0 0C B7 71 CF E3 5D 48
FF42F98D1E43E9975E8FE8B793B246A1
4C 60 CC 78 F7 F4 D5 45 82 9B 2E 79 62 D2 D1 CD
3EED3098D206BCB4550F29FA8761DEE4
</pre>
</pre>


==== rootparam_key_3_sign_E ====
*rootparam?
 
* iv is 6DE690827F71C3F2E47A329DCA0F63C9
<pre>
55 29 35 D8 4A B8 D5 FD B0 0C B7 71 CF E3 5D 48
4C 60 CC 78 F7 F4 D5 45 82 9B 2E 79 62 D2 D1 CD
</pre>


==== rootparam_key_4_sign_E ====
==HMAC PORTABLE 54==


<pre>
<pre>
F5 AA 42 70 7B D5 F6 3D 3B 9C 6C 99 36 8B 94 65
33478B82F3A1CECBD5C18BC246BE23FE
3D C7 51 95 7B A1 CB 80 A5 EC 47 81 43 A9 61 4E
</pre>
</pre>


==== rootparam_key_5_sign_E ====
==AES PORTABLE 58==


<pre>
<pre>
03 D2 54 72 DB 35 27 C6 7B 98 EE 9F 1F C8 A7 74
AA78DA20F93912F33E831C9A959A99EB
6F BB BF DF DD E9 97 5C F7 86 48 8E 5F 4D EE 63
AECBBEAD59F24227CF5CF0CF1BFF95F1
</pre>
</pre>


==== rootparam_key_0_E ====
*sceSblPfsSaveDataUpdateAuthCode
 
* iv is 3E0386ACCF22356622A15BFAC1F42C3A
<pre>
19 54 0D A2 DF F8 D6 6A 66 08 30 0F 37 8B F5 D4
B3 59 C2 EA B7 9B EB C4 5B 8B B5 E8 6A B8 77 A6
4E 7E 7B 33 6D F1 10 A8 C1 2D 46 29 D4 B4 3C 60
B2 AD 4F BB C9 33 39 38 65 62 AA C4 FE 74 D2 4A
CD 23 A9 36 B7 36 3C B0 E1 AB BF 6C 25 C4 2C 4C
58 E9 4D 20 4A A2 AD 15 C2 74 E8 51 00 44 DA 15
BB 74 2D 91 E1 DC 52 DF DC 7D F6 93 3C EF F2 E5
45 5D 3A DA C6 E1 25 12 2B BA B2 42 5E F3 F5 FE
</pre>


==== rootparam_key_0_E (SCEROOTPARAM_KEY plain) ====
==HMAC PORTABLE 58==


* Dumped from Kernel memory.
<pre>
<pre>
00000000  53 43 45 52 4f 4f 54 50  41 52 41 4d 5f 4b 45 59  |SCEROOTPARAM_KEY|
039E510C50F577C022EA7D68C9435E26
00000010  01 00 01 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
00000020  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
*
00000040  29 ed 9c 0a f8 d3 97 00  29 85 a9 df d0 f2 47 21  |).......).....G!|
00000050  03 ea a7 1e b1 10 c0 03  99 b1 1d ec b2 e5 df 08  |................|
00000060  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
*
00000080
</pre>
</pre>


==== rootparam_key_1_E ====
==AES PORTABLE 5C==


<pre>
<pre>
F9 DA 87 36 B5 B2 30 17 DC 1D 47 51 FE 0B 75 23
FAD928594374473EEE62B2FB490FF640
2A 3E 58 AD 92 96 B3 D1 C1 11 97 DA FD 7D A2 E5
15BA7A54771D987243221E45AD0B4D39
51 33 49 F4 31 DC EA 7B 3F 15 54 DF 26 6B 66 88
50 4D 3B 59 AD 95 0B D6 6F B5 62 AF 0F F6 BD E0
CB 08 FA 5D 44 B1 A4 94 82 A3 74 63 25 C5 56 9E
12 54 53 B6 DA C8 DD BF CF 7A 7B A2 1A 8C A0 88
AC 74 2E D4 96 CD 36 2E 14 83 A1 51 5A 0D 8A A9
28 1B 53 FA 5A C2 DF C5 EE E9 37 0F F5 64 61 F7
</pre>
</pre>


==== rootparam_key_2_E ====
==HMAC PORTABLE 5C==


<pre>
<pre>
E6 EA DF D7 E8 B0 23 7B 9A 40 8F 96 52 15 3B 78
019DF2D781AA830E7AD74BB64739F697
2C 63 28 6A 47 AE 91 92 36 DF 6B D1 BE A5 10 34
55 EC C7 D3 FE 43 5C 60 27 4F AB BC 68 2A 00 37
EB 28 7C 58 54 E1 0A 1C D5 30 47 B5 6E 40 8E A3
6D ED 64 81 CE A1 81 D8 CF 9E C7 C2 1E 6C 2F 86
CF 30 F3 16 A8 5B C0 74 EB 03 6A E4 C3 48 82 2E
54 75 61 44 B5 D5 4F BB 24 7A E5 21 11 49 1D 48
8F D2 B0 78 AA EF 6A 3B A5 C9 35 62 C7 7A 6C C2
</pre>
</pre>


==== rootparam_key_3_E ====
= Bluray DRM =
 
<pre>
E6 EA DF D7 E8 B0 23 7B 9A 40 8F 96 52 15 3B 78
2C 63 28 6A 47 AE 91 92 36 DF 6B D1 BE A5 10 34
55 EC C7 D3 FE 43 5C 60 27 4F AB BC 68 2A 00 37
EB 28 7C 58 54 E1 0A 1C D5 30 47 B5 6E 40 8E A3
6D ED 64 81 CE A1 81 D8 CF 9E C7 C2 1E 6C 2F 86
CF 30 F3 16 A8 5B C0 74 EB 03 6A E4 C3 48 82 2E
54 75 61 44 B5 D5 4F BB 24 7A E5 21 11 49 1D 48
8F D2 B0 78 AA EF 6A 3B A5 C9 35 62 C7 7A 6C C2
</pre>


==== rootparam_key_4_E ====
== AACS ==


<pre>
<pre>
F6 C5 1C A3 8E F0 18 2D 55 35 48 75 47 AE BE BA
0A547025878C198979548FF00BA9E445 <- K
D2 70 93 D5 C5 87 01 00 34 65 FE D8 87 A4 2C B3
C0D00D285FC00870B543C1F31FAE44A8 <- iv
0F D0 C5 F3 FD EA B2 78 09 CB 4D BF 4C 02 26 02
CD4F7C917ED4C9FE3B337EA2C60EC273
F6 5D 0E 86 C3 D5 30 5B 78 9A E8 A4 3E 19 22 FC
115BF5EE2659FF078C373EEDDFD4F3C7
5B 7D F4 4D 66 50 73 72 CF EB 03 AC 7F 82 55 90
05628DC933468421B2C88448080092B5
F1 06 02 2F A5 88 93 07 2C 94 51 57 05 92 87 F9
FD2ECD5E11264EDEDBA51D7E7B364B1C
F6 2B 15 6B F4 EE 15 BF D2 2B C4 BE 4C D7 AC 28
B24216CF7D781DFB82DC866B976F4EC4 <-
AD 52 F0 E4 F4 92 CC 90 E6 20 D6 F7 DD D4 AA 57
B73C1037C7FED6C1315AD7C16AC8EA79 <-
</pre>
</pre>


==== rootparam_key_4_E (SCEROOTPARAM_KEY plain) ====
== BDPLUS ==
 
* Dumped from Kernel memory.
<pre>
<pre>
00000000  ab 75 84 e1 58 6e f3 38  66 3b 39 9b 09 40 49 54  |.u..Xn.8f;9..@IT|
CAC19E73A99A37649720DBA9E5B9C8E9 <- K
00000010  6b ce b2 f0 9f 32 0a 1b  f8 de 0a a0 d1 5f 28 bd  |k....2......._(.|
971D666C66C5BBA31B6280AC5D00A849 <- iv
00000020  7f f5 78 1d c5 4c 80 fb  e4 7a 3e 36 91 8d 19 3e  |..x..L...z>6...>|
B49740B965AACFA87DCE1218EBB1B27C <-
00000030  09 67 ae 3d 61 4e b1 4f  7d 71 cf 20 e4 40 71 1f  |.g.=aN.O}q. .@q.|
0CA31B024A73E030D2BB9FB3613DF147 <-
00000040  05 65 93 0d fd 2d a6 d1  21 3c ef f4 5a 00 97 cb  |.e...-..!<..Z...|
AE27A7DE70E1C1329DBC1CD0533F836D
00000050  2f e9 ed b5 ce 07 bb d3  57 4e fa b1 ac a3 fe 80  |/.......WN......|
081812B592AFCD8180C054F5F9F04616
00000060  88 3f 0a 0e 75 9b 4f 2f  40 6a c6 ef 98 23 b9 e5  |.?..u.O/@j...#..|
185317D8D26C5DA45F80C358DA071BAA
00000070  ae bd 3b 75 b7 c6 e1 68  5f b3 90 c4 12 a0 4d 24  |..;u...h_.....M$|
F55720FC0620F54F235A5DA1C3459FB0
00000080
</pre>
</pre>


==== rootparam_key_5_E ====
== CSS ==


<pre>
<pre>
B2 37 2E C2 0A CA 40 00 99 03 21 83 3B 03 D2 74
0957909454D722D5FD71D02A5CCAC711 <- K
5C 41 42 A4 13 F3 E1 28 CB B5 BC 7B 3A D0 30 20
C9E37A810F42EFAA2A5BE0C8E75E3D2A <- iv
CC 5D 99 AB 56 4B F4 B2 05 57 26 C3 63 EC 93 32
75B68FB0DBEF478F3975443180095AD2 <-
5B 4A 66 06 88 B5 91 02 CD D5 35 2F E2 C1 B7 7A
EA018F41C99D65CA57190A1B4F973BED <-
14 E3 B2 D5 14 80 06 28 F3 00 D7 61 32 5B F9 54
2DB61C46D497A1EC092816DC1243FF5E
A1 25 D2 EC 69 16 4B 0C 95 06 86 60 50 31 80 67
C86676C3A45AB182B21BF75277916BE0
44 9F 57 87 4E 8D 09 20 73 3E BE F8 A9 CF C2 0B
548631EF9270FC6F8BCBBCAF8BA3753D
68 22 EC DD 65 8A D8 BB 70 04 F5 7A 69 3D 19 DC
F3F472638D324ECBBA7A4D844C2CA612
</pre>
</pre>


==== rootparam_key_5_E (SCEROOTPARAM_KEY plain) ====
= Companion App Protocol RSA Public Key =


* Dumped from Kernel memory.
<pre>
<pre>
00000000  44 62 12 3c 06 10 f2 55  3c 01 d1 f8 50 eb 1e 88  |Db.<...U<...P...|
-----BEGIN PUBLIC KEY-----
00000010  c0 34 61 40 04 19 80 9d  ab b4 63 f6 f3 6c e9 4d  |.4a@......c..l.M|
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAxfAO/MDk5ovZpp7xlG9J
00000020  39 6e 07 40 d9 8a d3 27  0c 27 e1 4a ad 0e b1 19  |9n.@...'.'.J....|
JKc4Sg4ztAz+BbOt6Gbhub02tF9bryklpTIyzM0v817pwQ3TCoigpxEcWdTykhDL
00000030  fe 79 df 09 7c 07 9b eb  ec f9 aa 64 f0 42 f6 4d  |.y..|......d.B.M|
cGhAbcp6E7Xh8aHEsqgtQ/c+wY1zIl3fU//uddlB1XuipXthDv6emXsyyU/tJWqc
00000040  58 45 0e 46 d9 e8 31 98  5d c5 10 ed 81 32 f5 c8  |XE.F..1.]....2..|
zy9HCJncLJeYo7MJvf2TE9nnlVm1x4flmD0k1zrvb3MONqoZbKb/TQVuVhBv7SM+
00000050  8a d2 48 5b cc 6f 7e 2d  38 b0 f4 3e 8f 2b 0c 63  |..H[.o~-8..>.+.c|
U5PSi3diXIx1Nnj4vQ8clRNUJ5X1tT9XfVmKQS1J513XNZ0uYHYRDzQYujpLWucu
00000060  19 1d f8 5f 50 0b 77 f9  37 ec 7c 6b ea cd c9 15  |..._P.w.7.|k....|
ob7v50wCpUm3iKP1fYCixMP6xFm0jPYz1YQaMV35VkYwc40qgk3av0PDS+1G0dCm
00000070  ea e6 d8 e1 bf 80 28 a3  eb 3e 9a 9d 5c 00 48 ad  |......(..>..\.H.|
swIDAQAB
00000080
-----END PUBLIC KEY-----
</pre>
</pre>


=== 0x18 ===
= SMU Keys =


* Used by [[swagner]], [[swreset]].
AMD System Management Unit (SMU) is a thermal and electric management unit found in modern AMD x86 processors. See [https://www.youtube.com/watch?v=iYvhHey_dTk this video].


==== AES ====
== SMU HMAC Key ==


type E:
<pre>
<pre>
7D031910F9918242BD0069AACD047249
4D7E73210B677A832B9F293B496E7C3E
A95E1F0651AE9D14E4F7B09D0D816E56
</pre>
</pre>


type I:
= EMC Keys =
 
== EMC Fuse Key for Aeolia ==
 
<pre>
<pre>
9FCEEE75F2FD4C0A57AA32FDBD4093D3
1C7680D2963F3903811139C9C993BCA6
7876E4D29D621BB54E62A2756E3E9C83
</pre>
</pre>


==== HMAC ====
== EMC Constants for Aeolia ==


type E:
<pre>
<pre>
E42C03F0ABAF7DED9EF3B31461526DF1
F1 F2 F3 F4 F5 F6 F7 F8 F1 F2 F3 F4 F5 F6 F7 F8
47 1D 3A FE 3C 26 F1 BB 01 F1 94 8F 9A 7F B1 24
F1 F2 F3 F4 F5 F6 F7 F8 F1 F2 F3 F4 F5 F6 F7 F8
EA 29 B8 CD A2 01 0C 98 53 CA BB F9 F2 1D 04 8C
F1 F2 F3 F4 F5 F6 F7 F8 F1 F2 F3 F4 F5 F6 F7 F8
E3 6E 21 4F 63 57 E9 EA 08 F0 B8 11 BD F8 01 60
F1 F2 F3 F4 F5 F6 F7 F8 F1 F2 F3 F4 F5 F6 F7 F8
88 DA B5 B0 51 95 E9 7F 88 82 F4 39 DD 10 61 81
</pre>
</pre>


type I:
== EMC IPL Cipher Key for Aeolia ==
 
<pre>
<pre>
0F4A79378A97768F719E29A5AE787513
5F74FE7790127FECF82CC6E6D91FA2D1
</pre>
</pre>


=== 0x1C - SCECloudSD___KEY ===
* iv is all zeroes
* algorithm is AES128CBC
* Aeolia exists since at least PS4 prototype firmware 0.910.040
* EMC IPL is codenamed C0000001
* index is 0xD (13_ if you use Zer0xFF's tools)
 
== EMC IPL Cipher Key for Belize ==


Used for upload of PS4 games [[Save Data]] to Sony's Cloud storage. Similar to the Cloud Data Key Ring used in PS Vita since System Software version 3.100.081.
<pre>
1A4B4DC4179114F0A6B0266ACFC81193
</pre>


==== AES ====
* iv is all zeroes
* algorithm is AES128CBC
* Belize was introduced in firmware 2.00
* EMC IPL is codenamed C0000001
* index is 0x20 (32_ if you use Zer0xFF's tools)


* iv is DF140F0A54E95A581B8049DAA2A9AF2B
== EMC IPL Hasher Key for Aeolia ==


type E:
<pre>
<pre>
77684D4ACD210B03382327D4D15A88A4
73FE06F3906B05ECB506DFB8691F9F54
19BD06EEC04474EDEEB1A007C6112CEA
</pre>
</pre>


type I:
* Algorithm is HMAC-SHA1
<pre>
* It hashes the header (0x6C) of EMC IPL
EA9F99E9ED0D33D58C81E14D30F804C4
 
75B1B85AF1C33E3408F4107FA78AEE05
= EAP Keys =
</pre>


==== HMAC ====
== EAP KBL Cipher Key for Aeolia ==


type E:
<pre>
<pre>
240299607EDB6505B68A7C8852E9305E
581A75D7E9C01F3C1BD7473DBD443B98
</pre>
</pre>


type I:
* iv is all zeroes
<pre>
* algorithm is AES128CBC
1539E66891EFC669FF9BDA34123BBE06
* Aeolia exists since at least PS4 prototype firmware 0.910.040
</pre>
* EAP KBL is codenamed C0010001
* index is 0xE (14_ if you use Zer0xFF's tools)


==== SCECloudSD___KEY ====
== EAP KBL Hasher Key for Aeolia ==


<pre>
<pre>
53 43 45 43 6C 6F 75 64 53 44 5F 5F 5F 4B 45 59
824D9BB4DBA3209294C93976221249E4
01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00
61 6F AD DF 22 04 AC 7A 24 06 4C CE D8 CD 88 A0
DE 07 F0 15 43 45 32 7D BE 4D 49 E1 CA 87 5D 98
5E F0 E4 AB 2A CE 26 69 00 96 D9 48 D4 C0 1B 36
8B B0 B2 1D 45 72 7D 70 91 26 F4 A1 10 77 0C F9
7A 0A F1 17 81 97 33 CC 71 05 73 92 4F D2 5C 1B
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
</pre>
</pre>


<pre>
* Algorithm is HMAC-SHA1
5F 15 6F 65 CF DA 91 51 83 7C E3 06 D3 39 75 71
* It hashes the header (size 0x6C) of EAP KBL
08 3C 5B 08 10 5A 9C 6D 79 F0 64 29 DF D1 6D 33
4A 75 88 66 9B 61 54 B4 2F A6 C2 29 55 6E AD 76
34 4B B4 B8 F6 03 83 4D F4 B4 92 5A C8 F9 39 8E
31 60 25 1A 88 51 53 F7 A4 D9 5E 4C FF D0 3D 4B
95 A7 6F E8 DD BF 92 B2 D4 1C 0B 0E 28 29 B3 40
B0 AD 2F 35 8A 19 D9 C1 2D AA 81 C3 23 16 3A 17
15 0D 4C 33 3A 62 49 A7 51 A3 3C 4E 78 01 50 F8


B1 24 25 11 6E C0 95 15 9E FA 11 B6 48 BD 96 70
== EMC/EAP/KERNEL shared keys ==
AE 87 C9 99 DA 38 2E F1 B7 D6 41 81 09 98 A1 FF
27 69 85 D1 68 1C BE 72 2A F2 38 7F 65 AD 66 95
8B 72 A5 C8 73 34 3E A8 35 E2 82 74 2A 94 67 40
30 DF 3B 19 6C 5D CC D9 AD 44 7E 6C 22 76 ED 0A
64 E8 A1 46 A0 BE B7 D9 CA 6F CB 4F 54 92 2F 0F
41 90 1F 95 62 AF 0B 0E 18 63 06 C0 EA 22 8C 2E
3C 7E E9 79 73 A0 09 0C 36 D2 09 8D 75 DE 88 C7


EB 3E E3 B6 66 0F DD 75 99 CE 39 76 59 07 15 60
=== portability_seed_key ===
86 92 96 C5 B3 CB 06 B1 C2 E9 E9 C5 8B 13 35 5E
76 34 61 BA A2 4F F2 DB 99 CC BC DC 3C 13 2C A3
13 56 55 A7 0A FD 88 43 11 95 0A 0D 6D A4 7F 74
F3 2C 67 BC F4 E9 6F 1E 4D 69 5C CC 2E 1C 57 A8
CE 97 0B 4B D9 6A 5A 81 42 3F 6E 5C 7B A5 4A 78
AE 95 97 26 2A FF 9E 00 4F B4 F0 BB 40 72 1C 1F
8F 4B F7 AB FD D3 8C DC 14 FE 92 DD 16 51 A1 2F


01 AB 69 DF 87 71 AE BF E7 97 CD 88 18 F1 98 BF
<pre>
A9 D3 3B 1A 95 C5 F1 37 65 17 DB FE C4 4D 0C 3B
E973A44C578757A73492625D2CE2D76B
26 27 73 61 F9 60 36 BE 90 36 A5 73 0F A5 98 EB
AE BD 9E 84 35 BD B4 CD A8 59 15 4C 25 CA DE 33
FA 53 D9 5C 9B 26 CD 1A BA CC 80 8F A5 0F 1A 6A
1D 2D A3 0D 52 56 89 FF BC 63 AE 7A 0B D4 F6 24
8F 3D BF F8 BD DB DB 9A 2A 52 85 EB AB D4 BA 08
37 39 EE EE 4A D2 ED D3 52 A5 BA 39 50 1B BA A3
 
F7 1B 39 B8 5D 55 7D 5E B7 6F 22 F9 82 95 0E 45
1B CC 18 CD B9 FB 14 25 5A 22 FC BA 98 1D 50 C6
20 1C 15 47 C7 1D 1D 55 CC A2 94 8D CF 4E A9 8E
4D F8 2F 96 D6 C3 AB B9 46 A4 0C 1A FD E5 01 B9
8F 07 DE DA BC 20 FF 0D BD CC CE FD 77 E2 28 62
25 56 1A F3 D1 92 DD F7 72 43 64 9C D4 38 7A C6
FA C3 60 45 61 B2 EA 3B C5 90 AC 0F 20 0F 26 73
14 03 A8 2D 00 48 35 2D 45 8A 86 7B 6B 28 69 02
</pre>
</pre>


=== 0x20 - SCE_EAP_HDD__KEY ===
=== portability_seed ===


Used for internal HDD encryption.
<pre>
DF0C2552DFC7F4F089B9D52DAA0E572A
</pre>


==== AES ====
=== eap_hdd_key_blob_key1_seed ===


type E:
<pre>
<pre>
071B19D53D462093E0AF664ACFA9F937
7A49D928D2243C9C4D6E1EA8F5B4E229
2FCD0154FF04A9AE39E88EFF27823F0C
317E0DCAD2ABE5C56D2540572FB4B6E3
</pre>
</pre>


type I:
=== eap_hdd_key_blob_key2_seed ===
 
<pre>
<pre>
D6E3473A984BB836E1637F813CA5953E
921CE9C8184C5DD476F4B5D3981F7E2F
186EF9F184BB76DBBC64B639F50CFF02
468193ED071E19FFFD66B693534689D6
</pre>
</pre>


==== HMAC ====
=== use_new_blob = Y ===


type E:
* enc
<pre>
8F1DFF012B1814D73F70A1BCF04EAE7F
</pre>


type I:
<pre>
<pre>
DB801FB08E1C0DCE0B9ECC4E518AE24E
CFFDCB6ECAE612B7A30A9EDBD8F77E26
1D629DE5E6CA3F22F439211AC033884F
4B5D7D16D0A6F65D3173A2586CF819C7
C6F437444C1D9499F6EBC4145E0BBAAB
C1DE7C63ED1F5A1E1946358C7F181B1F
AB6DAB31195D8E611A1CB81B9ACF8B38
FF21029FAB568C7A1BCC3E2FBEB25B13
F1AFD6A3599EEF09EAEBE32684FDDA29
</pre>
</pre>


==== SCE_EAP_HDD__KEY ====
* sig


type E:
<pre>
<pre>
00000000  53 43 45 5f 45 41 50 5f  48 44 44 5f 5f 4b 45 59  |SCE_EAP_HDD__KEY|
4798B78DD422601F26A32A1FEC5CAB8B
00000010  bb 6c d6 6d dc 67 1f ac  36 64 f7 bf 50 49 ba a8  |.l.m.g..6d..PI..|
256E50958E0B11A31D77DEE201D4D00E
00000020  c4 68 79 04 bc 31 cf 4f  2f 4e 9f 89 fa 45 87 93  |.hy..1.O/N...E..|
00000030  81 17 45 e7 c7 e8 0d 46  0f af 23 26 55 0b d7 e4  |..E....F..#&U...|
00000040  d2 a0 a0 d9 72 9d e5 d2  11 7d 70 67 6f 1d 55 74  |....r....}pgo.Ut|
00000050  8d c1 7c df 29 c8 6a 85  5f 2a e9 a1 ad 3e 91 5f  |..|.).j._*...>._|
00000060  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
*
00000080
</pre>
</pre>


=== 0x24 - SCE_LwUtoken_Key ===
* iv


Used for "low" user tokens, sort of QA tokens for usermode internal tests by SCE.
<pre>
462500ECC487F0A8C2F39511E020CC59
</pre>


==== AES ====
=== use_new_blob = N ===


* iv is ED7BD631517CF4753C9DDA7A3AB859DB
* enc


type E:
<pre>
<pre>
3BDDF81A1FE5CFEE3DAD1835B21CFFED
E073B691E177D39642DF2E1D583D0E9A
C10609C5D4D1DB17333ABECAEB2EF955
5A49EDF72BE9412E2B433E51490CE973
234B84F49E949F03727331D5456F4598
F2EDE6D0C11483B84CE3283243D0DE9D
C379E915301A805DFAEB292B30374C9B
F1C59041509BF11D215C35D5C08E3330
807C8229C930FAB88672C4CF7DACA881
C323D72346CA07921DB806FC242A2ED1
</pre>
</pre>


type I:
* sig
 
<pre>
<pre>
6E523DCAFDAFC20BDF288C8DF3F7BA97
ED4F32C095847C6D3143EFFD61E7582F
146BFF1C88427E52461DA28F8D305B36
75F24465855C4E94DAF34885D8D03463
</pre>
</pre>


==== HMAC ====
* iv


type E:
<pre>
<pre>
7D10C415D0C0C5DD85C6795E7BA08A7B
3286EA97F3E92C434E1DC170C9289003
</pre>
</pre>


type I:
=== EAP_HDD_KEY_BLOB ===
 
<pre>
<pre>
4AC61958B2BCFA6793B49DF84672A44D
5343455F4541505F4844445F5F4B4559
BB6CD66DDC671FAC3664F7BF5049BAA8
C4687904BC31CF4F2F4E9F89FA458793
811745E7C7E80D460FAF2326550BD7E4
D2A0A0D9729DE5D2117D70676F1D5574
8DC17CDF29C86A855F2AE9A1AD3E915F
00000000000000000000000000000000
00000000000000000000000000000000
</pre>
</pre>


==== SCE_LwUtoken_Key ====
= Syscon Keys =
 
== Common ==


type E:
=== Security ID ===
<pre>
00000000  53 43 45 5f 4c 77 55 74  6f 6b 65 6e 5f 4b 65 79  |SCE_LwUtoken_Key|
00000010  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
*
00000040  e4 03 52 c3 02 18 f1 a6  22 5a cf 4c a7 9e 54 eb  |..R....."Z.L..T.|
00000050  b2 7a bc be b7 1f b4 7a  5c d0 66 c7 9e 99 9f 2a  |.z.....z\.f....*|
00000060  66 4a b9 75 36 4c f3 0e  75 ee 24 15 9c 38 51 f3  |fJ.u6L..u.$..8Q.|
00000070  01 00 01 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
00000080
</pre>


type E Extra1:
<pre>
<pre>
00000000  a3 c6 b1 40 de 3d d5 e9  44 8c 16 0a 18 54 75 6f  |...@.=..D....Tuo|
3A4E6F743A557365643A (:Not:Used:)
00000010  1c 51 87 64 cd 3d a4 6f  ce 72 a8 36 eb 61 f6 81  |.Q.d.=.o.r.6.a..|
00000020  5a 3f b5 c4 73 08 7e 87  a9 ff 8d a6 a7 27 60 22  |Z?..s.~......'`"|
00000030  fe 2f 64 64 ed 9c 97 fe  72 38 e4 d3 11 a9 b1 8b  |./dd....r8......|
00000040  35 32 29 d6 38 1e 7d 47  cc 09 0e 61 23 67 5f 00  |52).8.}G...a#g_.|
00000050  cc 11 f2 51 69 5d 51 64  1b 4f c1 47 62 bb c0 3b  |...Qi]Qd.O.Gb..;|
00000060  46 60 85 53 7c 41 78 76  39 5c 5a a3 fa 7e 40 17  |F`.S|Axv9\Z..~@.|
00000070  34 6f 6c 2a 27 04 25 cc  7c ad 87 c4 6a eb f6 bf  |4ol*'.%.|...j...|
00000080
</pre>
</pre>


type E Extra2:
<pre>
<pre>
00000000  2c e9 d0 41 3b f5 29 aa  ad aa 0f 3b d6 18 44 7e  |,..A;.)....;..D~|
Checksum for RL78: 3A+4E+6F+74+3A+55+73+65+64+3A = 0x370 && 0xFF = 0x70 - 1 = 0x6F
00000010  35 95 f6 9f af f0 03 92  1a cd 6e 59 22 54 c5 d9  |5.........nY"T..|
Same Checksum for 78K0R
00000020  6b 9d c2 14 d6 3f ee bf  ef 07 58 af 96 1a ab 5d  |k....?....X....]|
00000030  77 09 27 96 2d fe a8 20  03 b4 e3 41 94 75 b2 49  |w.'.-.. ...A.u.I|
00000040  54 4f 08 e7 5d f4 dc 87  3a 34 5d 8e a8 10 67 22  |TO..]...:4]...g"|
00000050  e4 78 c4 70 d6 1b 9f 8c  5a b9 a9 d7 c9 17 83 30  |.x.p....Z......0|
00000060  35 0e 11 ba a2 27 46 82  f9 f1 88 31 ea af ec 75  |5....'F....1...u|
00000070  dc 5b 86 d7 70 90 c9 dc  76 c2 35 5c cd 9c 33 d4  |.[..p...v.5\..3.|
00000080
</pre>
</pre>
Used to access more privileged commands, such as the write command


=== 0x28 - SCE_SBL_BAR_KEY1 ([[Backup And Restore]]) ===
== DevKit ==


Used for the [[Backup And Restore feature]], handled by the [[SBL]] module.
=== Full Firmware ===


==== AES ====
AES-CBC-128
<pre>
Key = 5301C28824B57137A819C042FC119E3F


type E:
IV =  00000000000000000000000000000000
<pre>
27E0770E09A7FC1D83812F82D5775AE1
7CB5D77FE73EC981579EB0D2D4FE19FE
</pre>
</pre>


type I:
Used for:
<pre>
* 40000001 (BLNK)
587853D8EF32804120B6CA6AC15F9E7C
* 40000002 (BASE)
31844FBB1FD5677B18CA34F3C86C371E
* 40000003 (SYST)
</pre>


==== HMAC ====
<br>


type E:
AES-CMAC-128
<pre>
<pre>
DDBE5F9AABC6E810C1527C560EAF8DC5
Key = 8F215691AC7EF6510239DD32CC6A2394
</pre>
</pre>


type I:
Used to generate the AES-CMAC-128 at the start of decrypted 40000001, 40000002 and 40000003, by digesting the remainder of the decrypted data
<pre>
 
13D173D007FC85D02FC146A78B2C3032
== Retail/TestKit ==
</pre>


==== SCE_SBL_BAR_KEY1 ====
=== Patch Firmware Keys ===


type E:
AES-CBC-128
<pre>
<pre>
ffffff80869df8e0  53 43 45 5f 53 42 4c 5f  42 41 52 5f 4b 45 59 31  |SCE_SBL_BAR_KEY1|
Key = EF90B21B31452379068E3041AAD8281E
ffffff80869df8f0  1f 18 c9 70 d0 00 ac 7e  6f cc 1a 8c dd 89 b4 fe  |...p...~o.......|
ffffff80869df900  cd a1 33 a1 0e c8 f5 25  98 22 23 f5 86 1f 02 00  |..3....%."#.....|
ffffff80869df910  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff80869df920  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff80869df930  79 c8 cc c8 89 a1 54 0d  4f 2e 27 bb 61 4f d6 53  |y.....T.O.'.aO.S|
ffffff80869df940  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff80869df950  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
</pre>
 
* Usage for verification: openssl dgst -hmac 1f18c970d000ac7e6fcc1a8cdd89b4fecda133a10ec8f525982223f5861f0200 -sha256 encrypted_caf_segment.bin
* Usage for encryption: openssl aes-128-cbc -d -K 79c8ccc889a1540d4f2e27bb614fd653 -iv 0 -in encrypted_caf_segment.bin -out decrypted_caf_segment.bin -nopad
 
==== CAF Cipher ====
 
* AES-128-CBC Key for each [[Backup And Restore]] [[archive.dat]] CAF segment. The AES-128-CBC IV is in the header of each CAF segment.


<pre>
IV =  00000000000000000000000000000000
79C8CCC889A1540D4F2E27BB614FD653
</pre>
</pre>


==== CAF Hasher ====
Used for:
* 40010001 (Patch #1)
* 40010002 (Patch #2)


* HMAC-SHA256 Key for each [[Backup And Restore]] [[archive.dat]] CAF segment in encrypted form.
<br>


AES-CMAC-128
<pre>
<pre>
1F18C970D000AC7E6FCC1A8CDD89B4FECDA133A10EC8F525982223F5861F0200
Key = 95B1AAF20C16D46FC816DF32551DE032
</pre>
</pre>


=== 0x3C - SCE_SYS_TLM_SECK ===
Used to generate the AES-CMAC-128 at the start of decrypted 40010001 and 40010002, by digesting the remainder of the decrypted data


Used in the GetOpenPsIdHash function by [[SceShellCore]].
= Kernel Keys =


==== AES ====
== Kernel Magic ==
 
* iv is CE5326C917B698478C46E0387689CB4A


type E:
<pre>
<pre>
B7F71CB821D163D3E48D20E13CB37C64
2FB09FD1DE76967DEB947B51EC82781E
FE8834B96073CCFD0A60BCC04411C00C
</pre>
</pre>


type I:
=== Backup And Restore Keys (BAR) ===
<pre>
37CE6FF2CBA0C69460329C223EA763E6
EAE1D5DBFC5803C94CDA8D708161F6A0
</pre>


==== HMAC ====
==== Cipher ====


type E:
<pre>
<pre>
839E28FC0455F027BDE024DFA6ADCB8A
79C8CCC889A1540D4F2E27BB614FD653
</pre>
</pre>


type I:
==== Hasher ====
 
<pre>
<pre>
0D7F88C9A9128A1FD6EF367E78062572
1F18C970D000AC7E6FCC1A8CDD89B4FECDA133A10EC8F525982223F5861F0200
</pre>
</pre>


==== SCE_SYS_TLM_SECK ====
=== default_suffix ===


type E:
<pre>
<pre>
ffffff80861838e0  53 43 45 5f 53 59 53 5f  54 4c 4d 5f 53 45 43 4b  |SCE_SYS_TLM_SECK|
Key = 518D64A635DED8C1E6B039B1C3E55230
ffffff80861838f0  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8086183900  99 e9 ac b7 36 53 5e 4b  25 4d 25 b9 e2 ab 3e 09  |....6S^K%M%...>.|
ffffff8086183910  cb cb c7 a7 c0 e8 1a ef  93 cf ae e1 57 4c 1a 7c  |............WL.||
ffffff8086183920  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8086183930  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8086183940  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8086183950  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
</pre>
</pre>


=== 0x40 - Envelope Files ===
Used as suffix to symbol names when hashing with SHA1 to create a NID.


The PS4 [[Envelope Files]] Verification Public Keys are stored in [[SceShellCore]] as plaintext bytes whilst the encryptions Keys are stored encrypted in [[SceShellCore]] as portable keys that are decrypted with <code>sceSblSsDecryptWithPortability</code> (with flag <code>0x40</code>).
=== Crash Dump KeySeed ===


==== AES ====
type E:
<pre>
<pre>
FE3A5009C42E604D3D1F29565C4CDB87
kd, kc
0FDCD521338C8486D2AD85BB5220AC49
KEYS = [
    ['',''],
    [b'8F86DDEDCBF24A44EB6C30607AA26F76', b'4125715AAB8B78E569F512E65CA62DD3'], # 1.01-3.15
    [b'63AEF79DC49969FD8997B2F60DB65F81', b'1800A5DE2D0F0652FA5602FFADD440AA'], # 3.50-3.70
    [b'05205507B7A154E08A7A38B1897563FB', b'AD334D142EAF8B9438DB00D1D0BFF357'], # 4.00-4.05
    [b'04C1A0961BBB0CB2140361B0956AAABA', b'052D2FF3014FB38CAAF6898CB899982A'], # 4.06-4.07 (to test)
]
</pre>
 
=== Sealed Key Values or (PFS_EncKey and sealedkey_retail_key) Values ===
 
==== Keyset 1 ====
 
AES-CBC-128
<pre>
Key = B5DAEFFF39E6D90ECA7DC5B029A8153E
</pre>
 
<br>
 
SHA-256-HMAC
<pre>
Hash = 8707960A53468D6C843B3DC9624E22AF
</pre>
</pre>


type I:
==== Keyset 2 ====
 
AES-CBC-128
<pre>
<pre>
353233D34AE6544ADB79FFE2978E88B9
Key = EC0D347E2A7657471F1FC33E9E916FD4
F5E5951E752DC76941E173B0F239DE49
</pre>
</pre>


==== HMAC ====
<br>


type E:
SHA-256-HMAC
<pre>
<pre>
898BC1304C51736BA56C33CAE992225F
Hash = A6D6583D3217E87D9BE9BCFC4436BE4F
</pre>
</pre>


type I:
==== Keyset 3 ====
 
AES-CBC-128
<pre>
<pre>
1D9E1E5B2A87B887FF1E017B02D0E04C
Key = 51D8BFB4E387FB4120F081FE33E4BE9A
</pre>
</pre>


==== Envelope Message Encryption Keys ====
<br>


{| class="wikitable sortable" style="width: 100%"
SHA-256-HMAC
! style="width: 5%" | Content ID
<pre>
! style="width: 15%" | Name
Hash = FFF9BDEA803B14824C61850EBB084EE9
! style="width: 40%" | Key I
</pre>
! style="width: 40%" | Key E
 
|-
==== Keyset 4 ====
| <code>1</code>
 
| beta_updatelist
AES-CBC-128
|
<pre>
| <pre>C6 8A 9B 40 49 35 77 E7 54 3A 2D 95 59 9F 7E 96</pre>
Key = 346B5D231332AC428A44A708B1138F6D
|-
</pre>
| <code>2</code>
 
| timezone
<br>
| <pre>56 6B DD 67 C3 B6 B5 04 EF 1A 39 C0 CC AC 4B E2</pre>
 
| <pre>56 6B DD 67 C3 B6 B5 04 EF 1A 39 C0 CC AC 4B E2</pre>
SHA-256-HMAC
|-
<pre>
| <code>3</code>
Hash = 5DC6B8D1A3A0741852A7D44268714824
| system_log_config
</pre>
|
 
| <pre>8C 81 17 54 AB E7 2C 8A 1B 4D DC A2 32 B8 CC 2A</pre>
Dumped with getSealedKeySecret on 5.05
|-
| <code>4</code>
| system_log_unknown (unknown name)
|
| <pre>8A 7A 15 CE 5D 21 62 19 7C FA 83 B1 DC 77 3C C7</pre>
|-
| <code>5</code>
| bgdc_config (probably related to Background Download)
|
| <pre>DA AF 3B 06 99 F7 6E 04 8F 3C 27 BF 0B E8 95 1C</pre>
|-
| <code>6</code>
| wctl_config
|
| <pre>67 EE DA F2 67 E0 43 BE B5 AD 5C 7A 6F 54 C5 37</pre>
|-
| <code>7</code>
| morpheus_updatelist
|
| <pre>5A 1F 16 C3 47 F8 24 6B F6 D7 8B E3 C4 D6 F2 D1</pre>
|-
| <code>8</code>
| netev_config
|
| <pre>66 01 69 2E 46 1B BD CC 85 6E A8 DC CE 06 3C F1</pre>
|-
| <code>9</code>
| gls_config
|
| <pre>89 D5 DD 4B 3A E3 89 1E A3 07 D5 62 FF 7A 94 D2</pre>
|-
| <code>10</code>
| hid_config
|
| <pre>5C C6 92 D0 6C CF 52 88 57 59 92 29 2C 8A B9 79</pre>
|-
| <code>12</code>
| hidusbpower
|
| <pre>61 76 2F AF A7 50 69 F6 16 BA 91 43 F6 98 68 0B</pre>
|-
| <code>13</code>
| patch_hmac_key
|
| <pre>9B 12 DA 7C 22 44 3B CD 2B BC F6 C0 18 5E 77 70</pre>
|-
| <code>14</code>
| bgft
|
| <pre>F1 1B 19 25 D9 3C E7 70 86 F4 9C CC 50 96 45 56</pre>
|-
| <code>17</code>
| system_log_privacy
|
| <pre>CE A4 74 20 1F 0C A2 36 8D D8 37 BF A1 B4 BD 78</pre>
|-
| <code>18</code>
| webbrowser_xutil
|
| <pre>CA 4A 06 AD 3C 09 8D AB 6B 30 97 2C BC 49 00 BD</pre>
|-
| <code>19</code>
| entitlementmgr_config
|
| <pre>49 B6 1A 0B 8F 33 BC 28 6F 85 6D A8 CB 04 B8 B4</pre>
|-
| <code>21</code>
| jsnex_netflixdeckeys
|
| <pre>51 AE 12 B0 CB D8 EF D3 59 8B C5 11 8D E1 A3 0C</pre>
|-
| <code>22</code>
| party_config
|
| <pre>9C 4E E3 E6 DC 82 A1 8A A2 12 33 D5 35 B1 08 EC</pre>
|}


==== Envelope Message Verification Keys ====
==== Keyset 5 ====


These are the public keys for signature verification.
AES-CBC-128
 
<pre>
{| class="wikitable sortable" style="width: 100%"
20 D0 43 85 25 30 C4 04 D1 68 69 E0 79 08 D5 E6
! style="width: 5%" | Content ID
</pre>
! style="width: 15%" | Name
! style="width: 80%" | Public Key
|-
| <code>1</code>
| beta_updatelist
|
<pre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pre>
|-
| <code>2</code>
| timezone
| <pre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pre>
|-
| <code>3</code>
| system_log_config
| <pre>BF 88 5C E2 CC 58 B6 F7 B3 7A B3 38 B9 95 71 92 3A EF 5A 9D 23 24 93 3D BB F6 37 D1 92 D3 CB 8E 91 84 4C 40 24 F6 39 1C 90 6C 5E 1C 64 F0 E8 48 F4 62 55 B7 6B 86 F1 72 DF E8 61 6B D1 70 41 CC 19 26 C8 FD D9 8D 8A 0E 92 AD 8C 3E E5 3B 60 21 6E 10 24 5D AB E1 5A 0C 8E 51 B6 F8 68 BE 03 08 F7 92 3D FD 05 CB 1E 79 48 F7 9C 52 CA 5D E4 AC 50 27 5B B5 58 9C A0 F5 94 3F 1C 9A 25 D1 24 E4 A3 B4 76 32 EA DC AD 57 9D 40 43 BE 7D F9 DB 07 21 5D AB AB D9 BD E3 CD 13 31 0B 9C 77 6E 2F 9C 38 6D 02 30 3F 03 3C 5D 09 8C 70 6E 61 9A 3E 4D B2 32 D8 E5 34 CF 0A 71 70 1F 29 45 44 2D D6 10 BD AF 47 37 AF F5 F6 EE 87 EA D7 CE A0 F4 BE 53 E1 21 61 91 54 0C 15 02 E8 7F C9 92 60 8E 77 A7 B5 1A 10 2E AC CA 13 B1 39 2E 10 0E FD 7D 63 AF 09 08 D5 3D 2E B6 F7 28 42 DB A0 3E 55 F7 32 C1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 01</pre>
|-
| <code>4</code>
| system_log_unknown
| <pre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pre>
|-
| <code>5</code>
| bgdc_config
| <pre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pre>
|-
| <code>6</code>
| wctl_config
| <pre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pre>
|-
| <code>7</code>
| morpheus_updatelist
| <pre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pre>
|-
| <code>8</code>
| netev_config
| <pre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pre>
|-
| <code>9</code>
| gls_config
| <pre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pre>
|-
| <code>10</code>
| hid_config
| <pre>F8 F2 E4 03 0B F9 E3 C6 00 76 1F 4F 0E 47 E1 83 E3 32 2D EE CF 4A 59 88 7D 4F F1 8F 76 96 A5 A2 6E 11 7B 04 49 4E 9C DE D3 D3 07 E5 7E 85 A4 72 C1 FE B8 32 C4 D5 5A 98 D0 2B BA 4A 2D 0F 7D AE 56 93 E4 E6 36 BD 88 DB CB 0E 16 1C A9 F4 52 E9 87 4A 24 3B 2F 18 C6 6E 90 64 2C B5 63 EC 7F 72 12 9E 98 86 00 A3 E5 57 ED 83 06 2C CA 5B D1 52 40 F1 78 CA 4F F6 6C 11 94 36 85 8D 85 D9 24 CB 84 8D 38 03 88 82 0B B7 46 8D AD 35 97 E9 AD 29 E6 D3 AD 80 DA 49 BD F0 42 20 49 36 FA BA 6E 1B CF 3A 2E 5E 2C 5A C5 08 E3 D2 FE A5 33 AF E8 3C 84 28 40 D4 7B 80 21 7E BB EE 70 B5 A1 2F C5 46 B9 4D EC 61 E8 FD 56 53 62 FB 36 01 B8 C8 4B FB 3B 97 DC 4A 2C 3C C1 24 A9 BD 68 A5 5C A8 54 FA 6A D1 48 72 BA A6 28 5A D1 1A 28 5E B5 15 9B 96 53 54 3C B3 D2 25 4E B3 31 7B BF B5 A7 4F 2A 77 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 01</pre>
|-
| <code>12</code>
| hidusbpower
| <pre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pre>
|-
| <code>13</code>
| patch_hmac_key
| <pre>DA C7 C7 E1 C5 4F 4F EB 9C B4 F0 09 8E 66 9C EC F6 BA 0C FA 1B FD 5F 27 46 F2 CD 96 5D EE 9D BA 30 86 23 FD B5 8B 4D 6F B9 06 AF 50 E5 EE 16 3F AF 56 5A 06 97 8C 48 91 76 43 EB F5 C5 2C 8C CE 84 2F 37 E7 BA A3 9F 11 DE 7E 9E 2C 2D 29 25 92 00 A1 05 E3 09 EA BC 39 CA A7 3F BE A3 D4 AC CC C6 5F F0 C4 21 67 6F 61 45 D1 05 0F FD DE 7D F8 1E C7 A4 31 F9 55 74 27 20 3F CE F0 9D E7 75 A4 1E 9C 17 D4 EF A9 41 B1 53 16 64 A1 75 C0 53 92 72 65 F3 4A 23 C3 F7 7A 57 06 4B CD 04 38 12 46 C7 68 5B 7C E6 53 15 32 DE B3 A0 D1 E1 FB C2 2E DD BE 78 D2 4C 83 B4 A1 12 51 51 7E AE B5 87 BC CA D2 94 7F 43 E9 F9 D2 40 CF 02 12 01 19 C9 E8 E4 D7 EC DC 78 6B 66 18 72 A6 35 BD 84 83 FA AA 3B 67 D9 DF 4C 65 BE FB 1F 1E 61 C2 FE 0E 6E AD 4E F9 06 53 B4 F5 E4 1C FF DD D0 FF 8F F7 C4 AD 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 01</pre>
|-
| <code>14</code>
| bgft
| <pre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pre>
|-
| <code>17</code>
| system_log_privacy
| <pre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pre>
|-
| <code>18</code>
| webbrowser_xutil
| <pre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pre>
|-
| <code>19</code>
| entitlementmgr_config
| <pre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pre>
|-
| <code>21</code>
| jsnex_netflixdeckeys
| <pre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pre>
|-
| <code>22</code>
| party_config
| <pre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pre>
|}
 
==== patch_hmac_key - HMAC-SHA256 Patch Pkg URL Key ====


SHA-256-HMAC
<pre>
<pre>
AD62E37F905E06BC19593142281C112CEC0E7EC3E97EFDCAEFCDBAAFA6378D84
2D E8 DE 4D E6 62 8B B6 2D D5 C1 70 F5 65 B6 2C
</pre>
</pre>


* HMAC-SHA256 key used to generate a URL pointing to a PS4 game update patch.
* For PS4, the generated hash is inserted into the following URL pattern: <code>http://gs-sec.ww.np.dl.playstation.net/plo/np/<TITLEID>/<HASH><TITLEID>-ver.xml</code>
=== 0x44 - livedump_secure ===


==== AES ====
==== Keyset 6 ====


type E:
AES-CBC-128
<pre>
<pre>
FABE3A6D6B96A150CD5BD5652208F695
93 B7 27 0D F0 D3 73 10 60 07 90 66 65 5D 8D 07
18F75EBD22704F5298F3B59248951389
</pre>
</pre>


type I:
SHA-256-HMAC
<pre>
<pre>
882D16F707FD33FA2ABFEC130F60EEFF
FD 44 A3 2D 8B C8 AC 18 9C 1B D0 96 40 29 66 CF
D1F8B09AA448624FD62A94C84A9433D6
</pre>
</pre>


==== HMAC ====
==== Keyset 7 ====


type E:
AES-CBC-128
<pre>
<pre>
C7959E7798833634764BE40421E4CA87
4C 78 44 83 69 37 50 8B 92 33 DF 7C D7 D6 51 65
</pre>
</pre>


type I:
SHA-256-HMAC
<pre>
<pre>
A154061C592CE76844847C137F5BE71B
BC 4C 9F 0F E5 D3 56 A0 57 52 02 4C BD EE C8 E4
</pre>
</pre>


==== livedump_secure ====
==== Keyset 8 ====


AES-CBC-128
<pre>
<pre>
96 1E 5E 85 B5 3E 77 64 43 E5 F4 45 85 E8 90 0A
3A 32 EE CF 74 99 39 87 1C 3D 7B F8 C0 1C 7D 1F
52 5E 06 2A 4C 79 64 69 0F 75 2F 28 71 9C 6B A1
A8 C2 A0 0D 84 31 E7 17 DD EF 6D 80 F6 5C AE 32
42 1F CB E5 E7 A4 F9 1F 79 2B 25 C7 A1 0C 9E 5A
7B 07 82 9F F3 7C 3F B4 66 2F CB F8 E4 0A 63 F2
99 EE B8 6F 06 D5 58 CD 6E 8E 6A F7 5E 48 3A 24
CC 73 EA E7 73 2F 44 2F 8B E5 28 FB 19 60 62 50
F4 A9 9C A5 9E FC 63 2C 2D CC 67 73 2B 8B 5A DE
</pre>
</pre>


=== 0x48 - SceHidAuth ===
SHA-256-HMAC
 
<pre>
Used for the DUALSHOCK 4 and DualSense HandShake with the PS4/PS5.
F6 F9 D8 21 82 CC C2 22 7B 7D 33 A3 B7 1E AD E3
 
</pre>
==== AES ====


* iv is 322FDB812C9AA16311E13372657282A1
==== Keyset 9 ====


type E:
AES-CBC-128
<pre>
<pre>
0606708496452DD32191FD838B3B6840
EB 35 64 04 7D 60 24 7F 55 73 CD E5 7E 0C DE 1C
84CFA1C4FB4427BB21CA18E8CA80406D
</pre>
</pre>


type I:
SHA-256-HMAC
<pre>
<pre>
AC4E5205E1EFF2CD76DBC73EB13C383A
29 8B 4F 59 1E F0 4E 52 17 3E EC 59 C5 A4 78 33
8C8F99A88FB3A50D554C0934DA1E7946
</pre>
</pre>


==== HMAC ====
==== Keyset 0xA ====


type E:
AES-CBC-128
<pre>
<pre>
6421DC67BF1520757FB15A68015B0693
8A D4 92 CC 5B 27 B5 C3 60 11 A5 85 8B 90 93 80
</pre>
</pre>


type I:
SHA-256-HMAC
<pre>
<pre>
54D04BABDE26E6D8481A5D860C2D3200
00 6A 34 41 82 B6 1B E5 6A 6C D6 B9 46 6F 03 45
</pre>
</pre>


==== hidAuthThreadMain Keys ====
=== AuthCode ===
 
==== KeySet 1 ====


<pre>
<pre>
ED E7 41 CC 7F D6 0E 1F 2D B0 89 16 1F C0 EB 66
2B CF 69 8E 79 CF DD FA C2 4D 4C 25 BF 35 1E 62
7C A4 DA 59 40 CE 19 54 00 90 1D BF 59 25 EE 4F
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
</pre>
</pre>


=== 0x4C - SCE_KDF_NCDT_PSK ===
=== Vtrm Cipher Init Keys ===


==== AES ====
==== hmac_key_seed ====
 
* iv is 90F86BD0BD6587517E71FEB62A8AE2BF


<pre>
<pre>
BA08EE7EFA8BFEBD4C6360A8F61C1D37
Key = 87FB19BBF3D4D6B1B0ED226E39CC621A
E735A3A1185C2B91B438D5DD132A5ED0
      37FA4ED2B6618B59B34F770FBB92947B
</pre>
 
==== HMAC ====


<pre>
IV = 00112233445566778899AABBCCDDEEFF
CD5486B6219C0B1798799576194774AA
</pre>
</pre>


==== SCE_KDF_NCDT_PSK ====
==== aes_key_seed ====


type E:
<pre>
<pre>
ffffff80869df8e0  53 43 45 5f 4b 44 46 5f  4e 43 44 54 5f 50 53 4b  |SCE_KDF_NCDT_PSK|
B0ED226E39CC621A37FA4ED2B6618B59
ffffff80869df8f0  59 e6 32 88 b0 4e 7f 68  f8 b8 db 83 86 1e 07 50  |Y.2..N.h.......P|
ffffff80869df900  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff80869df910  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff80869df920  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff80869df930  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff80869df940  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff80869df950  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
</pre>
</pre>


=== 0x50 - SIEIPMISceIpmiMgrEQSx ===
=== Keystone Keys ===
 
Used for IPMI Manager, likely standing for Inter-Process Method Invocation or Intelligent Platform Management Interface.
 
==== AES ====


* iv is 6E73A4D0DF65788581DADA975F5F37A6
==== keystone_passcode_secret or passcode_hmac_secret ====


<pre>
<pre>
C2E211E71F4CCD76B65EBB45E64D995A
C74405F67424BA342BC1276251BBC2F5
7424AE72CCC4DF2D6F34CA2F92797B49
55F16025B6A1B6714780DBAEC852FA2F
</pre>
</pre>


==== HMAC ====
==== keystone_ks_secret or keystone_hmac_secret ====


<pre>
<pre>
06173BD09FAB15567064939F1C622A5B
783D6F3AE91C0E0712FCAAB7950BDE06
</pre>
855CF7A22DCDBDE127E9BFCBAD0FF0FE
 
==== SCEIPMI Key ====
 
type E:
<pre>
ffffff80869df8e0  53 49 45 49 50 4d 49 00  00 00 00 00 00 00 00 00  |SIEIPMI.........|
ffffff80869df8f0  1a 88 b2 a3 64 e6 a2 8e  78 08 4e 3f 7f 40 fd 01  |....d...x.N?.@..|
ffffff80869df900  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff80869df910  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff80869df920  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff80869df930  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff80869df940  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff80869df950  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
</pre>
</pre>


=== 0x54 - pfs_sbl ===
= ShellCore Keys =


Maybe used for USB Extended Storage encryption that was introduced in PS4 System Software 4.50.
== DevKit/TestKit ==


==== AES ====
=== Trophy Key ===
 
* iv is 6DE690827F71C3F2E47A329DCA0F63C9


<pre>
<pre>
FF42F98D1E43E9975E8FE8B793B246A1
Key = 02CCD346B459CB83505E8E760A44D457
3EED3098D206BCB4550F29FA8761DEE4
</pre>
</pre>


==== HMAC ====
== Retail ==
 
=== Trophy Key ===


<pre>
<pre>
33478B82F3A1CECBD5C18BC246BE23FE
Key = 21F41A6BAD8A1D3ECA7AD586C101B7A9
</pre>
</pre>


==== pfs_sbl Key ====
=== RSA PKG Meta ===


<pre>
==== Modulus 400 ====
91 0B 7C A6 6B 4B F9 DA 00 72 F1 67 6C 51 99 70
<pre>  
C1 4D B2 26 6A 59 29 C2 5E 1A 72 5D D8 19 05 BF
D212FC335F6DDB831609628B03562737
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
82D477853529392D526B8C4C8CFB06C1
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
845BE7D4F7BCD24E6245CD2ABBD77776
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
453655273FB3F5F98EDA4BEFAA59AEB3
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
9BEA5498D206326A58312AE0D44F90B5
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0A7DECF43A9C52672D99318E0C43E682
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
FE0746E12E50D41F2D2F7ED908BA06B3
BF2E203F4E3FFE44FFAA504357916994
49158282E40F4C8D9D2CC95B1D64BF88
8BD4C594E76547841EE57910FB989347
B97D8512A640982CF792BC951932EDE8
90560D65C1AA78C62E54FD5F54A1F67E
E5E05F61C120B4B9B4330870E4DF8956
ED012946775F8CB8A9F51E2EB3B9BFE0
09B78D28D4A6C3B81E1F07EBB4120B95
B88530FDDC3913D07CDC8FEDF9C9A3C1
</pre>
</pre>


=== 0x58 - pfs_sd_auth ===
==== Private Key 500 ====
 
* Used in the sceSblPfsSaveDataUpdateAuthCode function.
* Used for [[Save Data]] authentication (to explain).
 
==== AES ====
 
* iv is 3E0386ACCF22356622A15BFAC1F42C3A
 
<pre>
<pre>
AA78DA20F93912F33E831C9A959A99EB
32D903908FBDB08F572B285E0B8DB3EA
AECBBEAD59F24227CF5CF0CF1BFF95F1
5CD17EA890888CDD6A80BBB1DFC1F70D
</pre>
AA32F0B77CCB88800E8B64B0BE4CD60E
 
9B8C1E2A64E1F35CD77601415E935C94
==== HMAC ====
FEDD4662C31B5AE2A0BC2DEBC3980AA7
 
B7856970682B644AB31FCC7DDC7C26F4
<pre>
77F65CF2AE5A442DD3AB16620419BAFB
039E510C50F577C022EA7D68C9435E26
90FFE23050896ECB56B2EBC09116925E
308EAEC7945DFD35E120F8AD3EBC08BF
C036749FD5BB5208FD0666F37AB304F4
75295DE95FAA1030B20F5A1AC12AB3FE
CB21AD80EC8F20091CDBC55894C29CC6
CE82653E5790BCA98B06B4F072F677DF
9864F1ECFE372DBCAE8C08811FC3C989
1AC742824B2EDC8E8D73CEB1CC01D908
70873C4408EC498F815AE240FF77FC0D
</pre>
</pre>


==== pfs_sd_auth KeySet 1 ====
==== P 600 ====
 
* This section is missing algorithms and usage.
 
<pre>
<pre>
2BCF698E79CFDDFAC24D4C25BF351E62
F967AD9912310C56A22E161C46B34D5B
43BE42A2F686968042C3C73FC342F587
49339F075D6E2C04FDE3E1B2AE0A0CF0
C7A61CA16350C8099C5124526C5E5EBD
1E2706BBBC9E94E135D46DB3CB3C68DD
68B3FE6CCB8D8220762363B7E9681001
4EDCBA275D01C12D805E2BAF826BD884
B6105286A7898EAE9AE289C6F7D587FB
</pre>
</pre>


* Present in [[Kernel]] memory.
==== Q 680 ====
 
=== 0x5C ===
 
==== AES ====
 
<pre>
<pre>
FAD928594374473EEE62B2FB490FF640
D7A10F9A8BF2C91195329A8CF0D94047
15BA7A54771D987243221E45AD0B4D39
F568A00DBDC1FC432F65F9C3610F2577
54ADD758AC8440608D3FF3658975B5C6
2C511A2F1F22E4431154BEC9B4C7B51B
050BBC569ACD4AD973685E5CFB92B78B
0DFFF507CAB4C89B963C079E3E6B2A11
F28AB18AD72E1BA5532406ED50B89067
B1E241C69201EE10F061BBFBB27D4A73
</pre>
</pre>


==== HMAC ====
==== DP 700 ====
 
<pre>
<pre>
019DF2D781AA830E7AD74BB64739F697
52CC2DA09C9E75E728EE3DDEE345D14F
941CCCC88729453B8D6EAB6E2AA7C715
43A3048F905FEBF3384A77FA36B71576
B6011A8E258782F155D8C6432AC0E598
C932D1946FD901BA0681E06D88F2242A
2501645CBFF2D999673EF672EEE4E233
5CF80040E32A9AF43D2286443CFB0AA5
7C3FCCF5F116C4AC88B4DE6294926A13
</pre>
</pre>


= Companion App Protocol RSA Public Key =
==== DQ 780 ====
 
<pre>
<pre>
-----BEGIN PUBLIC KEY-----
7C9DAD39E0D560149448197F8895D58B
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAxfAO/MDk5ovZpp7xlG9J
80AD858A4B773785D077BBBF89714A72
JKc4Sg4ztAz+BbOt6Gbhub02tF9bryklpTIyzM0v817pwQ3TCoigpxEcWdTykhDL
CB726838EC02C67DC6440633511CC0FF
cGhAbcp6E7Xh8aHEsqgtQ/c+wY1zIl3fU//uddlB1XuipXthDv6emXsyyU/tJWqc
958F0D75DC25BB0B7391A96D42D803B7
zy9HCJncLJeYo7MJvf2TE9nnlVm1x4flmD0k1zrvb3MONqoZbKb/TQVuVhBv7SM+
68D41E7562A37035797800C8F5EF15B9
U5PSi3diXIx1Nnj4vQ8clRNUJ5X1tT9XfVmKQS1J513XNZ0uYHYRDzQYujpLWucu
FC4E475AC870705B5298C0C2584A7096
ob7v50wCpUm3iKP1fYCixMP6xFm0jPYz1YQaMV35VkYwc40qgk3av0PDS+1G0dCm
CCB810E12F788B2BA17FF9ACDEF0BB2B
swIDAQAB
E266E3229231215792C4B8F23E762037
-----END PUBLIC KEY-----
</pre>
</pre>


= AMD SMU Keys =
==== QP 800 ====
 
== PS4 AMD SMU firmware HMAC-SHA1 Key ==
 
<pre>
<pre>
4D7E73210B677A832B9F293B496E7C3E
459755D422085EF35CB4057AFDAA4242
</pre>
AD9A8CA06CBB1D6854546E3E32E35373
 
76F13E01EAD3CFEBEB233EC0BECEEC2C
* This symmetric key is used to sign the AMD SMU firmware of the PS4.
895FA8273A4CB7E674BC454C26C825FF
* It is related to the "42?" and "Prezident Zeman je K U N D A" strings presented by Rudolf Marek at 31C3.
34632537E14810C193A6AFEBBAE3A2F1
 
3DEF63D8F4FDD3EEE25DE933CCADBA75
= EMC Keys =
5C85AFCEA93DD1A217F3F698B3508E5E
 
F6EB028EA162A7D62CEC91FF1540D2E3
See also [https://github.com/TeamFAPS/PS4-RE-tools/tree/master/ps4-emc-ipl-eap-kbl-tool PS4 EMC IPL and EAP KBL Tool] for usage.
 
== EMC Fuse Key for Aeolia ==
 
<pre>
1C7680D2963F3903811139C9C993BCA6
</pre>
 
== EMC Constants for Aeolia ==
 
<pre>
F1 F2 F3 F4 F5 F6 F7 F8 F1 F2 F3 F4 F5 F6 F7 F8
47 1D 3A FE 3C 26 F1 BB 01 F1 94 8F 9A 7F B1 24
F1 F2 F3 F4 F5 F6 F7 F8 F1 F2 F3 F4 F5 F6 F7 F8
EA 29 B8 CD A2 01 0C 98 53 CA BB F9 F2 1D 04 8C
F1 F2 F3 F4 F5 F6 F7 F8 F1 F2 F3 F4 F5 F6 F7 F8
E3 6E 21 4F 63 57 E9 EA 08 F0 B8 11 BD F8 01 60
F1 F2 F3 F4 F5 F6 F7 F8 F1 F2 F3 F4 F5 F6 F7 F8
88 DA B5 B0 51 95 E9 7F 88 82 F4 39 DD 10 61 81
</pre>
 
== EMC IPL Cipher Key for Aeolia ==
 
<pre>
5F74FE7790127FECF82CC6E6D91FA2D1
</pre>
 
* Algorithm is AES-128-CBC with zeroed IV.
* Aeolia exists since at least PS4 prototype System Software 0.910.040.
* EMC IPL is codenamed C0000001. PUP unpack index is 0xD (13_ if you use Zer0xFF's tools).
 
== EMC IPL Cipher Key for Belize ==
 
<pre>
1A4B4DC4179114F0A6B0266ACFC81193
</pre>
 
* Algorithm is AES-128-CBC with zeroed IV.
* Belize was introduced in PS4 System Software version 2.00.
* EMC IPL is codenamed C0000001. PUP unpack index is 0x20 (32_ if you use Zer0xFF's tools)
 
== EMC IPL Hasher Key for Aeolia ==
 
<pre>
73FE06F3906B05ECB506DFB8691F9F54
</pre>
 
* Algorithm is HMAC-SHA1.
* It hashes the header (size 0x6C) of EMC IPL.
 
= EAP Keys =
 
See also [https://github.com/TeamFAPS/PS4-RE-tools/tree/master/ps4-emc-ipl-eap-kbl-tool PS4 EMC IPL and EAP KBL Tool] for usage.
 
== EAP KBL Cipher Key for Aeolia ==
 
<pre>
581A75D7E9C01F3C1BD7473DBD443B98
</pre>
 
* Algorithm is AES-128-CBC with zeroed IV.
* Aeolia exists since at least PS4 prototype System Software version 0.910.040.
* EAP KBL is codenamed C0010001. PUP unpack index is 0xE (14_ if you use Zer0xFF's tools).
 
== EAP KBL Hasher Key for Aeolia ==
 
<pre>
824D9BB4DBA3209294C93976221249E4
</pre>
 
* Algorithm is HMAC-SHA1.
* It hashes the header (size 0x6C) of EAP KBL.
 
= EMC/EAP/Kernel shared keys =
 
== portability_seed_key ==
 
<pre>
E973A44C578757A73492625D2CE2D76B
</pre>
 
== portability_seed ==
 
<pre>
DF0C2552DFC7F4F089B9D52DAA0E572A
</pre>
 
== eap_hdd_key_blob_key1_seed ==
 
<pre>
7A49D928D2243C9C4D6E1EA8F5B4E229
317E0DCAD2ABE5C56D2540572FB4B6E3
</pre>
 
== eap_hdd_key_blob_key2_seed ==
 
<pre>
921CE9C8184C5DD476F4B5D3981F7E2F
468193ED071E19FFFD66B693534689D6
</pre>
 
== use_new_blob = Y ==
 
* Encryption Key:
<pre>
CFFDCB6ECAE612B7A30A9EDBD8F77E26
1D629DE5E6CA3F22F439211AC033884F
4B5D7D16D0A6F65D3173A2586CF819C7
C6F437444C1D9499F6EBC4145E0BBAAB
C1DE7C63ED1F5A1E1946358C7F181B1F
AB6DAB31195D8E611A1CB81B9ACF8B38
FF21029FAB568C7A1BCC3E2FBEB25B13
F1AFD6A3599EEF09EAEBE32684FDDA29
</pre>
 
* Signature ?HMAC-SHA256? Key:
<pre>
4798B78DD422601F26A32A1FEC5CAB8B
256E50958E0B11A31D77DEE201D4D00E
</pre>
 
* IV:
<pre>
462500ECC487F0A8C2F39511E020CC59
</pre>
 
== use_new_blob = N ==
 
* Encryption Key:
<pre>
E073B691E177D39642DF2E1D583D0E9A
5A49EDF72BE9412E2B433E51490CE973
234B84F49E949F03727331D5456F4598
F2EDE6D0C11483B84CE3283243D0DE9D
C379E915301A805DFAEB292B30374C9B
F1C59041509BF11D215C35D5C08E3330
807C8229C930FAB88672C4CF7DACA881
C323D72346CA07921DB806FC242A2ED1
</pre>
 
* Signature ?HMAC-SHA256? Key:
<pre>
ED4F32C095847C6D3143EFFD61E7582F
75F24465855C4E94DAF34885D8D03463
</pre>
 
* IV:
<pre>
3286EA97F3E92C434E1DC170C9289003
</pre>
 
== EAP_HDD_KEY_BLOB ==
 
<pre>
5343455F4541505F4844445F5F4B4559
BB6CD66DDC671FAC3664F7BF5049BAA8
C4687904BC31CF4F2F4E9F89FA458793
811745E7C7E80D460FAF2326550BD7E4
D2A0A0D9729DE5D2117D70676F1D5574
8DC17CDF29C86A855F2AE9A1AD3E915F
00000000000000000000000000000000
00000000000000000000000000000000
</pre>
 
== PS4-PS5 USB Extended Storage Key ==
 
Used for USB Extended Storage encryption that was introduced in PS4 System Software 4.50.
 
Data:
<pre>
7213197452C6CC7EC8A3C06C3E22F91A
</pre>
 
Tweak:
<pre>
7617B6E7A97360FC4C67BF38D07FD72D
</pre>
 
Usage (to be rewritten in a more understandable way):
# Step 1: Decrypt the 64 first bytes of sector 0 of the storage with AES-XTS-128 using Data and Tweak.
# Step 2: Compute HMAC-SHA256 of decrypted 0x20 bytes from offset 0x20 with Tweak and Data, appended together in this order, as key.
# Step 3: In the resulting digest, swap 16 first bytes with 16 last bytes. This forms the final key: new Data key followed by new Tweak key.
# Step 4: Use the final keys with AES-XTS-128 to fully decrypt the PS4-PS5 USB Extended Storage.
* Source: https://pastebin.com/WfE50xw0
 
= Syscon Keys =
 
== Common ==
 
=== Security ID ===
 
<pre>
3A4E6F743A557365643A
</pre>
* In ASCII this key reads "(:Not:Used:)".
 
* Checksum for RL78: 3A+4E+6F+74+3A+55+73+65+64+3A = 0x370 && 0xFF = 0x70 - 1 = 0x6F
* Checksum for 78K0R: same as for RL78.
 
These keys are used to access high-privileges Syscon commands, such as the write-to-EEPROM command.
 
== DevKit ==
 
=== Full Firmware ===
 
AES-CBC-128 Key:
<pre>
5301C28824B57137A819C042FC119E3F
</pre>
 
AES-CBC-128 IV:
</pre>
00000000000000000000000000000000
</pre>
 
Used for:
* 40000001 (BLNK)
* 40000002 (BASE)
* 40000003 (SYST)
 
<br />
 
AES-CMAC-128 Key:
<pre>
8F215691AC7EF6510239DD32CC6A2394
</pre>
 
Used to generate the AES-CMAC-128 hash at the start of decrypted 40000001, 40000002 and 40000003, by digesting the remainder of the decrypted data.
 
== Retail/TestKit ==
 
=== Patch Firmware Keys ===
 
AES-CBC-128 Key:
<pre>
EF90B21B31452379068E3041AAD8281E
</pre>
 
AES-CBC-128 IV:
<pre>
00000000000000000000000000000000
</pre>
 
Used for:
* 40010001 (Patch #1)
* 40010002 (Patch #2)
 
<br />
 
AES-CMAC-128 Key:
<pre>
95B1AAF20C16D46FC816DF32551DE032
</pre>
 
Used to generate the AES-CMAC-128 hash at the start of decrypted 40010001 and 40010002, by digesting the remainder of the decrypted data.
 
= Kernel Keys =
 
== Kernel Magic ==
 
* Usage undocumented.
 
<pre>
2FB09FD1DE76967DEB947B51EC82781E
</pre>
 
== PS4 NID default_suffix ==
 
* Salt suffix to symbol names when hashing with SHA1 to create a NID.
 
<pre>
518D64A635DED8C1E6B039B1C3E55230
</pre>
 
== Crash Dump KeySeed ==
 
Crash Dump Master keys (kd, kc):
<pre>
KEYS = [
    ['',''],
    [b'8F86DDEDCBF24A44EB6C30607AA26F76', b'4125715AAB8B78E569F512E65CA62DD3'], # 1.01-3.15
    [b'63AEF79DC49969FD8997B2F60DB65F81', b'1800A5DE2D0F0652FA5602FFADD440AA'], # 3.50-3.70
    [b'05205507B7A154E08A7A38B1897563FB', b'AD334D142EAF8B9438DB00D1D0BFF357'], # 4.00-4.05
    [b'04C1A0961BBB0CB2140361B0956AAABA', b'052D2FF3014FB38CAAF6898CB899982A'], # 4.06-4.07 (to test)
]
</pre>
 
* Crash Dump AES-256-CBC-CFB IV = b'0000000000000000'
 
* Remark: kd and kc names may have been wrongly assigned in fail0verflow's writeup because kd should stand for Digest Key and kc for Cipher Key.
 
=== Usage for generation and unpacking ===
 
For generation, the kd key is used to encrypt the OpenPSID that will be stored in the header:
* OPENPSID_ENC = aes_ecb_encrypt(kd, OpenPSID)
 
For both generation and decryption, from the kc key and the encrypted OpenPSID are derived 2 keys:
* Crash Dump AES-256-CBC-CFB Key = hmac_sha256(kc, OPENPSID_ENC)[:0x10]
* Crash Dump HMAC-SHA256 Key = hmac_sha256(kc, OPENPSID_ENC)[0x10:]
 
For data encryption:
* Encrypted Data = AES.new(Crash Dump AES-256-CBC-CFB Key, AES.MODE_CBC, Crash Dump AES-256-CBC-CFB IV).encrypt(DATA)
* Remark: The algorithm should actually be AesCbcCfb128Encrypt but it is always block-size multiple in crashdump usage.
 
For signature generation:
* Digest in Final Header = hmac_sha256(Crash Dump HMAC-SHA256 Key, secure_header (aligned to 0x80) + DATA_ENC (without final_header))
* Remark: 0x80 bytes of secure_header are hashed for the data_hmac but only 0x14 bytes (actual used bytes) are actually written to disk.
 
For decryption, the kd key is used to decrypt the OpenPSID provided in the header:
* OpenPSID = aes_ecb_decrypt(kd, OPENPSID_ENC)
* Remark: for decryption the user does not have to know the OpenPSID as the encrypted OpenPSID is embedded in the Crash Dump header.
 
For signature verification:
* Digest in Final Header = hmac_sha256(Crash Dump HMAC-SHA256 Key, secure_header (aligned to 0x80) + DATA_ENC (without final_header))
* Remark: 0x80 bytes of secure_header are hashed for the data_hmac but only 0x14 bytes (actual used bytes) are actually written to disk.
 
For data decryption:
* Decrypted Data = AES.new(Crash Dump AES-256-CBC-CFB Key, AES.MODE_CBC, Crash Dump AES-256-CBC-CFB IV).decrypt(DATA_ENC)
* Remark: The algorithm should actually be AesCbcCfb128Decrypt but it is always block-size multiple in crashdump usage.
 
See also:
* Crash Dump decryption and verification implemented in: https://github.com/TeamFAPS/PS4-RE-tools/tree/master/ps4-crash-dump-decrypt
* Crash Dump analysis (parsing after decryption and verification) implemented in: https://fail0verflow.com/blog/2017/ps4-crashdump-dump
 
== PFS Keystone Keys ==
 
=== keystone_passcode_secret ===
 
* keystone_passcode_secret is HMAC-SHA256 Key for [[Passcode]] digest in [[Keystone]] file
 
<pre>
C74405F67424BA342BC1276251BBC2F5
55F16025B6A1B6714780DBAEC852FA2F
</pre>
 
=== keystone_ks_secret ===
 
* keystone_ks_secret is HMAC-SHA256 Key for full keystone digest in [[Keystone]] file
 
<pre>
783D6F3AE91C0E0712FCAAB7950BDE06
855CF7A22DCDBDE127E9BFCBAD0FF0FE
</pre>
 
== VTRM Cipher Init Keys ==
 
* This section is missing the algorithms and usage.
* Used to encrypt/decrypt and hash [[VTRM]] in PS4 [[Serial Flash]].
 
=== hmac_key_seed ===
 
Key:
<pre>
87FB19BBF3D4D6B1B0ED226E39CC621A
37FA4ED2B6618B59B34F770FBB92947B
</pre>
 
IV:
<pre>
00112233445566778899AABBCCDDEEFF
</pre>
 
=== aes_key_seed ===
 
<pre>
B0ED226E39CC621A37FA4ED2B6618B59
</pre>
 
= SceShellCore Keys =
 
=== param.sfo OpenPSID HMAC-SHA256 Key ===
 
<pre>
13D1DF0675C9FD950A17E564C2777F2C
</pre>
 
* In [[Save Data]], a digest of the OpenPSID of the PS4 must be present in the [[Param.sfo#PARAMS|PARAMS]] field of the [[Param.sfo#PARAMS|param.sfo]] file.
* This hash makes the savedata per-console. When the savedata is imported to another PS4/PS5, the hash has to be recomputed and overwritten by the new PS4/PS5 or manually before import.
 
=== Trophy Key ===
 
type Debug (DEX, TOOL):
<pre>
02CCD346B459CB83505E8E760A44D457
</pre>
 
type Release (CEX):
<pre>
21F41A6BAD8A1D3ECA7AD586C101B7A9
</pre>
 
== CEX SceShellCore Keys ==
 
=== RSA PKG Meta ===
 
==== Modulus 400 ====
 
<pre>
D212FC335F6DDB831609628B03562737
82D477853529392D526B8C4C8CFB06C1
845BE7D4F7BCD24E6245CD2ABBD77776
453655273FB3F5F98EDA4BEFAA59AEB3
9BEA5498D206326A58312AE0D44F90B5
0A7DECF43A9C52672D99318E0C43E682
FE0746E12E50D41F2D2F7ED908BA06B3
BF2E203F4E3FFE44FFAA504357916994
49158282E40F4C8D9D2CC95B1D64BF88
8BD4C594E76547841EE57910FB989347
B97D8512A640982CF792BC951932EDE8
90560D65C1AA78C62E54FD5F54A1F67E
E5E05F61C120B4B9B4330870E4DF8956
ED012946775F8CB8A9F51E2EB3B9BFE0
09B78D28D4A6C3B81E1F07EBB4120B95
B88530FDDC3913D07CDC8FEDF9C9A3C1
</pre>
 
==== Private Key 500 ====
 
<pre>
32D903908FBDB08F572B285E0B8DB3EA
5CD17EA890888CDD6A80BBB1DFC1F70D
AA32F0B77CCB88800E8B64B0BE4CD60E
9B8C1E2A64E1F35CD77601415E935C94
FEDD4662C31B5AE2A0BC2DEBC3980AA7
B7856970682B644AB31FCC7DDC7C26F4
77F65CF2AE5A442DD3AB16620419BAFB
90FFE23050896ECB56B2EBC09116925E
308EAEC7945DFD35E120F8AD3EBC08BF
C036749FD5BB5208FD0666F37AB304F4
75295DE95FAA1030B20F5A1AC12AB3FE
CB21AD80EC8F20091CDBC55894C29CC6
CE82653E5790BCA98B06B4F072F677DF
9864F1ECFE372DBCAE8C08811FC3C989
1AC742824B2EDC8E8D73CEB1CC01D908
70873C4408EC498F815AE240FF77FC0D
</pre>
 
==== P 600 ====
 
<pre>
F967AD9912310C56A22E161C46B34D5B
43BE42A2F686968042C3C73FC342F587
49339F075D6E2C04FDE3E1B2AE0A0CF0
C7A61CA16350C8099C5124526C5E5EBD
1E2706BBBC9E94E135D46DB3CB3C68DD
68B3FE6CCB8D8220762363B7E9681001
4EDCBA275D01C12D805E2BAF826BD884
B6105286A7898EAE9AE289C6F7D587FB
</pre>
</pre>


==== Q 680 ====
=== Index.dat Key (Portability) ===


<pre>
<pre>
D7A10F9A8BF2C91195329A8CF0D94047
Key = EED5A4FFE8A3C910DC1BFD6AAF1382250B380DBAE5045D230569473F46B07B1F
F568A00DBDC1FC432F65F9C3610F2577
54ADD758AC8440608D3FF3658975B5C6
2C511A2F1F22E4431154BEC9B4C7B51B
050BBC569ACD4AD973685E5CFB92B78B
0DFFF507CAB4C89B963C079E3E6B2A11
F28AB18AD72E1BA5532406ED50B89067
B1E241C69201EE10F061BBFBB27D4A73
</pre>
 
==== DP 700 ====


<pre>
IV = 3ACB38C1EC12119D56929F49F70415FF
52CC2DA09C9E75E728EE3DDEE345D14F
941CCCC88729453B8D6EAB6E2AA7C715
43A3048F905FEBF3384A77FA36B71576
B6011A8E258782F155D8C6432AC0E598
C932D1946FD901BA0681E06D88F2242A
2501645CBFF2D999673EF672EEE4E233
5CF80040E32A9AF43D2286443CFB0AA5
7C3FCCF5F116C4AC88B4DE6294926A13
</pre>
</pre>


==== DQ 780 ====
flag is 8


<pre>
same as internal
7C9DAD39E0D560149448197F8895D58B
80AD858A4B773785D077BBBF89714A72
CB726838EC02C67DC6440633511CC0FF
958F0D75DC25BB0B7391A96D42D803B7
68D41E7562A37035797800C8F5EF15B9
FC4E475AC870705B5298C0C2584A7096
CCB810E12F788B2BA17FF9ACDEF0BB2B
E266E3229231215792C4B8F23E762037
</pre>


==== QP 800 ====
=== HMAC-SHA256 Patch Pkg URL Key ===


<pre>
<pre>
459755D422085EF35CB4057AFDAA4242
Key = AD62E37F905E06BC19593142281C112CEC0E7EC3E97EFDCAEFCDBAAFA6378D84
AD9A8CA06CBB1D6854546E3E32E35373
76F13E01EAD3CFEBEB233EC0BECEEC2C
895FA8273A4CB7E674BC454C26C825FF
34632537E14810C193A6AFEBBAE3A2F1
3DEF63D8F4FDD3EEE25DE933CCADBA75
5C85AFCEA93DD1A217F3F698B3508E5E
F6EB028EA162A7D62CEC91FF1540D2E3
</pre>
</pre>


=== RSA-2048 HID Config Service Signature Verification Public Key ===
=== RSA-2048 HID Config Service Signature Verification Public Key ===
Key:
<pre>
<pre>
EF276915B7822ADF5D8EA7DF9094AD0EF2C72BB9C08FFAC58FEA3A07505A4B2D610EEE589DBAC967D08B96FBC05AC8111F38886DA99409940B786491FECF0EA6
Key = EF276915B7822ADF5D8EA7DF9094AD0EF2C72BB9C08FFAC58FEA3A07505A4B2D610EEE589DBAC967D08B96FBC05AC8111F38886DA99409940B786491FECF0EA6
4C7F0F1E419B5BA4D6701F2E0069A0E0FFCB4884339827D44A78CDC59E287A40ABB2A3D26BAF99693F8E2376A309CFC52D2F1167F8CD1204C66C94DC54C09332
4C7F0F1E419B5BA4D6701F2E0069A0E0FFCB4884339827D44A78CDC59E287A40ABB2A3D26BAF99693F8E2376A309CFC52D2F1167F8CD1204C66C94DC54C09332
82B12D0362A993BFE995D477611BB7B26FB34AC4ED47C3EFC62D8A93B3561255307DFAA1DCA95EBA612468F3471CEF854868DC035C74442F21F7374AA62CEEAE
82B12D0362A993BFE995D477611BB7B26FB34AC4ED47C3EFC62D8A93B3561255307DFAA1DCA95EBA612468F3471CEF854868DC035C74442F21F7374AA62CEEAE
Line 3,433: Line 2,390:
</pre>
</pre>


* Used to decrypt DUALSHOCK 4 (codenamed Jedi) firmware.
* decrypts dualshock4 firmwares. algo is aes-128-cbc. zeroed iv
* Algorithm is aes-128-cbc with zeroed iv.


== Common ==
== Common ==
Line 3,466: Line 2,422:
=== Certificate Authority Modulus ===
=== Certificate Authority Modulus ===


Modulus:
<pre>
<pre>
8ED7F9E4AA5CC5D23196F0DE797DFEAC
8ED7F9E4AA5CC5D23196F0DE797DFEAC
Line 3,484: Line 2,439:
0B36118C60F253FDBCE227A8A4C9CDF2
0B36118C60F253FDBCE227A8A4C9CDF2
260858584AB8D71C629CD421EC666059
260858584AB8D71C629CD421EC666059
</pre>
Exponent:
<pre>
0x10001
</pre>
= Database rebuild trigger magic =


<pre>
Exponent = 0x10001
0102FECA (or CAFE0201 byteswapped)
</pre>
</pre>
Please note that all contributions to PS4 Developer wiki are considered to be released under the GNU Free Documentation License 1.2 (see PS4 Developer wiki:Copyrights for details). If you do not want your writing to be edited mercilessly and redistributed at will, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource. Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following hCaptcha:

Cancel Editing help (opens in new window)

Template used on this page: