Keys: Difference between revisions
Line 177: | Line 177: | ||
== AES PORTABLE 0x10 == | == AES PORTABLE 0x10 == | ||
=== E === | |||
<pre> | <pre> | ||
32 AF 1A E6 A8 B4 08 AC A7 07 2C 93 64 BF 8A 36 | 32 AF 1A E6 A8 B4 08 AC A7 07 2C 93 64 BF 8A 36 | ||
BA 19 E5 52 63 F0 05 85 EA 26 53 31 17 47 A1 E4 | BA 19 E5 52 63 F0 05 85 EA 26 53 31 17 47 A1 E4 | ||
</pre> | |||
=== I === | |||
<pre> | |||
05 E0 51 FE DB 73 7F EE A2 FF A6 D7 8A AC 16 13 | |||
2A BA E3 62 53 F2 A2 91 C2 EF 0A 1A CA DA E1 D1 | |||
</pre> | </pre> | ||
Revision as of 01:00, 19 March 2023
Static KeySlots
Slot | Size | Key | Static? | Notes |
---|---|---|---|---|
0x43 | 0x10 | 6B 98 18 FF 35 16 7D 30 90 09 0A A4 22 D6 80 57 |
Yes | Unknown Usage, same from 2 5.05 identical dumps |
0x44 | 0x10 | 50 5E 2D 39 EB 32 E5 FC E9 DE E1 F8 0D 9E ED 26 |
Yes | Unknown Usage, same from 2 5.05 identical dumps |
0x50 | 0x10 | 50 7E 2C 58 77 B3 A0 F3 DE 7B 96 A4 F3 8E FE FF |
Yes | Unknown Usage, same from 2 5.05 identical dumps |
0x52 | 0x10 | F4 E6 20 AE EE 53 37 73 85 03 D3 64 01 7D AA 29 |
Yes | Unknown Usage, same from 2 5.05 identical dumps |
0x67 | 0x10 | B2 EB AB D9 2C 2D 12 BE 12 C1 1E BD C7 2D 90 36 |
Yes | Unknown Usage, same from 2 5.05 identical dumps |
0x71 | 0x10 | 87 DB 4C 5C 56 29 1F 3D 4D 60 2E C4 09 50 3A FE |
Yes | Unknown Usage, same from 2 5.05 identical dumps |
0x15A | 0x10 | 1A F9 22 3E 6C C0 A3 C8 7E CC C6 52 74 19 13 72 |
Yes | Unknown Usage, same from 2 5.05 identical dumps |
0x15B | 0x10 | 2D D7 7F D0 38 BF 67 4C FC 60 73 A9 E7 B6 17 76 |
Yes | Unknown Usage, same from 2 5.05 identical dumps |
Portability/EncDec Keys
- Todo: fill slots
- Todo: EncDec 0x4C (present in 7.55) (SCE_KDF_NCDT_PSK)
- Todo: EncDec 0x58 (present in 7.55) (sceSblPfsSaveDataUpdateAuthCode)
- Todo: EncDec 0x54 (present in 7.55) (sbl_pfs)
- Todo: EncDec 0x50 (present in 7.55) (SIEIPMISceIpmiMgrEQSx)
AES PORTABLE 0x0
- pfsSKKey__SecKey
- iv is F6 00 16 BA CD 42 AD 21 C7 0D 9B 07 5C B5 19 83
E
9E A5 CD 89 DA 8D AB 6E 66 CE 6D 34 57 52 63 9D 9A 4E E5 1E EA F0 84 D9 70 FE FC 28 50 F7 60 4E
I
6C ED CF 30 A3 03 06 F3 AA E5 2B 51 B9 37 26 FD E1 8C E3 B2 B1 ED 8B B7 4B DE 51 D7 12 34 93 14
HMAC PORTABLE 0x0
D8 80 86 16 FA 98 B0 BF 50 A4 99 D5 FA 5D CC A7
AES PORTABLE 0x4
23 1D 69 F7 3D 12 C5 51 64 D5 A4 0A 10 DB 51 70 4D F9 80 99 8A 15 5C E3 81 96 6E 65 21 C5 72 C6
HMAC PORTABLE 0x4
B3 54 7B 17 91 54 B3 C9 AC 96 30 4B 4F 9A EA 73
AES PORTABLE 0x5
21 E4 74 E2 08 45 F8 68 B1 EA DB C9 0C 7B E0 01 CF 7F BB 1A 47 97 16 EA 02 F8 A3 0B 23 C5 77 BB
HMAC PORTABLE 0x5
94 CA 4F DC 57 5C 81 2E 9E 04 32 45 9E 30 DB 75
AES PORTABLE 0x6
A4 89 32 A3 14 C7 5E D5 32 17 64 63 8B 7A 2F E8 9E F8 AD B0 44 C0 13 02 93 69 10 C2 5F D7 41 0E
HMAC PORTABLE 0x6
6E 30 BD 54 F5 20 53 CA 6B 68 F9 F2 3B 7F D2 16
AES PORTABLE 0x7
7B 62 69 24 42 0F 5F 8D 7B C5 CB F7 BC 80 3C 27 DA FA 0E A5 07 08 3A F6 D9 10 33 54 8B CF B2 16
HMAC PORTABLE 0x7
8F AA 08 82 3B F7 35 4F 09 99 D0 D8 A7 F0 A8 93
AES PORTABLE 0x8
E
CC 3C 6C D6 08 71 59 1A 5A 6C 63 47 B2 10 0C A2 FC 28 66 33 A4 D9 48 2B 93 13 FE E5 74 E0 43 38
I
33 1B DC 5E F4 5C A0 CA DE B2 10 DD C3 09 C1 D2 4E 00 59 E8 2E 16 26 F2 4A 18 55 69 6B E3 24 B2
- Index.dat
- iv is 31 0C C1 BD 68 FA 39 AF 74 FB 07 A6 C6 7B 6C BF
HMAC PORTABLE 0x8
7F A3 B3 BA 6D 94 56 EE 22 3E B7 4A 2D 30 AA 54
AES PORTABLE 0xC
E
36 90 2D C7 BD 1E C1 12 BE 12 2D 2C D9 AB EB B2 29 AA 7D 01 64 D3 03 85 73 37 53 EE AE 20 E6 F4
I
16 BC 4C CE AB EA 9F 03 D2 EB 67 0B D2 96 30 A1 88 2D 16 F7 07 FD 33 FA 2A BF EC 13 0F 60 EE FF
- CFK1 (Crepo)
HMAC PORTABLE 0xC
FF FE 8E F3 A4 96 7B DE F3 A0 B3 77 58 2C 7E 50
AES PORTABLE 0xD
E
BD A9 87 42 51 81 57 C4 63 4A 21 FB B4 7C 83 11 D2 1C E6 01 64 04 D8 CB 2E F0 C2 44 62 C4 2C 38
I
8F C2 40 5D 96 B4 12 90 DF 62 52 5E 53 6E 37 B6 42 D7 98 F0 53 8B 7F B4 28 29 C0 5E CB B0 0B 08
- hostnames (ShellCore)
HMAC PORTABLE 0xD
AE D0 BC C3 26 4D 91 A6 98 E4 D7 D8 CA 42 8E 52
AES PORTABLE 0x10
E
32 AF 1A E6 A8 B4 08 AC A7 07 2C 93 64 BF 8A 36 BA 19 E5 52 63 F0 05 85 EA 26 53 31 17 47 A1 E4
I
05 E0 51 FE DB 73 7F EE A2 FF A6 D7 8A AC 16 13 2A BA E3 62 53 F2 A2 91 C2 EF 0A 1A CA DA E1 D1
- logger
- iv is a1d989b020185024f4c448283537540b
HMAC PORTABLE 0x10
E2 AB 16 3D FA 81 2B 4A A7 3F FB 0A B4 CB 27 E2
AES PORTABLE 14
3A 99 80 C6 0B 27 52 B1 E5 C9 43 7C 8B E0 73 0E 05 76 83 37 1B 02 07 B1 B6 3D 32 41 2D 41 AA C3
- SCEROOTPARAM_KEY
- iv is 95 69 82 9C D4 B1 5F F8 43 30 54 5A 34 EC 1B C5
HMAC PORTABLE 14
38 61 8E 37 74 54 AD C8 EA 79 93 76 DE B0 1D 34
AES PORTABLE 18
7D 03 19 10 F9 91 82 42 BD 00 69 AA CD 04 72 49 A9 5E 1F 06 51 AE 9D 14 E4 F7 B0 9D 0D 81 6E 56
- swagner, swreset
HMAC PORTABLE 18
E4 2C 03 F0 AB AF 7D ED 9E F3 B3 14 61 52 6D F1
AES PORTABLE 1C
77 68 4D 4A CD 21 0B 03 38 23 27 D4 D1 5A 88 A4 19 BD 06 EE C0 44 74 ED EE B1 A0 07 C6 11 2C EA
- SCECloudSD___KEY
- iv is DF 14 0F 0A 54 E9 5A 58 1B 80 49 DA A2 A9 AF 2B
HMAC PORTABLE 1C
24 02 99 60 7E DB 65 05 B6 8A 7C 88 52 E9 30 5E
AES PORTABLE 20
07 1B 19 D5 3D 46 20 93 E0 AF 66 4A CF A9 F9 37 2F CD 01 54 FF 04 A9 AE 39 E8 8E FF 27 82 3F 0C
HMAC PORTABLE 20
8F 1D FF 01 2B 18 14 D7 3F 70 A1 BC F0 4E AE 7F
AES PORTABLE 24
3B DD F8 1A 1F E5 CF EE 3D AD 18 35 B2 1C FF ED C1 06 09 C5 D4 D1 DB 17 33 3A BE CA EB 2E F9 55
- SCE_LwUtoken_Key
- iv is ED 7B D6 31 51 7C F4 75 3C 9D DA 7A 3A B8 59 DB
HMAC PORTABLE 24
7D 10 C4 15 D0 C0 C5 DD 85 C6 79 5E 7B A0 8A 7B
AES PORTABLE 28
27 E0 77 0E 09 A7 FC 1D 83 81 2F 82 D5 77 5A E1 7C B5 D7 7F E7 3E C9 81 57 9E B0 D2 D4 FE 19 FE
- BAR_KEY (Backup And Restore)
HMAC PORTABLE 28
DD BE 5F 9A AB C6 E8 10 C1 52 7C 56 0E AF 8D C5
AES PORTABLE 3C
B7 F7 1C B8 21 D1 63 D3 E4 8D 20 E1 3C B3 7C 64 FE 88 34 B9 60 73 CC FD 0A 60 BC C0 44 11 C0 0C
- SCE_SYS_TLM_SECK
- iv is ce5326c917b698478c46e0387689cb4a
HMAC PORTABLE 3C
83 9E 28 FC 04 55 F0 27 BD E0 24 DF A6 AD CB 8A
AES PORTABLE 40
FE 3A 50 09 C4 2E 60 4D 3D 1F 29 56 5C 4C DB 87 0F DC D5 21 33 8C 84 86 D2 AD 85 BB 52 20 AC 49
- envelopes (i'm looking at you idc ;) )
HMAC PORTABLE 40
89 8B C1 30 4C 51 73 6B A5 6C 33 CA E9 92 22 5F
AES PORTABLE 44
FA BE 3A 6D 6B 96 A1 50 CD 5B D5 65 22 08 F6 95 18 F7 5E BD 22 70 4F 52 98 F3 B5 92 48 95 13 89
- livedump_secure
HMAC PORTABLE 44
C7 95 9E 77 98 83 36 34 76 4B E4 04 21 E4 CA 87
AES PORTABLE 48
06 06 70 84 96 45 2D D3 21 91 FD 83 8B 3B 68 40 84 CF A1 C4 FB 44 27 BB 21 CA 18 E8 CA 80 40 6D
- SceHidAuth
- iv is 322FDB812C9AA16311E13372657282A1
HMAC PORTABLE 48
64 21 DC 67 BF 15 20 75 7F B1 5A 68 01 5B 06 93
AES PORTABLE 4C
BA 08 EE 7E FA 8B FE BD 4C 63 60 A8 F6 1C 1D 37 E7 35 A3 A1 18 5C 2B 91 B4 38 D5 DD 13 2A 5E D0
- SCE_KDF_NCDT_PSK
- iv is 90f86bd0bd6587517e71feb62a8ae2bf
HMAC PORTABLE 4C
CD 54 86 B6 21 9C 0B 17 98 79 95 76 19 47 74 AA
AES PORTABLE 50
C2 E2 11 E7 1F 4C CD 76 B6 5E BB 45 E6 4D 99 5A 74 24 AE 72 CC C4 DF 2D 6F 34 CA 2F 92 79 7B 49
- SIEIPMISceIpmiMgrEQSx
- iv is 6E 73 A4 D0 DF 65 78 85 81 DA DA 97 5F 5F 37 A6
HMAC PORTABLE 50
06 17 3B D0 9F AB 15 56 70 64 93 9F 1C 62 2A 5B
AES PORTABLE 54
FF 42 F9 8D 1E 43 E9 97 5E 8F E8 B7 93 B2 46 A1 3E ED 30 98 D2 06 BC B4 55 0F 29 FA 87 61 DE E4
- rootparam?
- iv is 6de690827f71c3f2e47a329dca0f63c9
HMAC PORTABLE 54
33 47 8B 82 F3 A1 CE CB D5 C1 8B C2 46 BE 23 FE
AES PORTABLE 58
AA 78 DA 20 F9 39 12 F3 3E 83 1C 9A 95 9A 99 EB AE CB BE AD 59 F2 42 27 CF 5C F0 CF 1B FF 95 F1
- sceSblPfsSaveDataUpdateAuthCode
- iv is 3e0386accf22356622a15bfac1f42c3a
HMAC PORTABLE 58
03 9E 51 0C 50 F5 77 C0 22 EA 7D 68 C9 43 5E 26
AES PORTABLE 5C
FA D9 28 59 43 74 47 3E EE 62 B2 FB 49 0F F6 40 15 BA 7A 54 77 1D 98 72 43 22 1E 45 AD 0B 4D 39
HMAC PORTABLE 5C
01 9D F2 D7 81 AA 83 0E 7A D7 4B B6 47 39 F6 97
Companion App Protocol RSA Public Key
-----BEGIN PUBLIC KEY----- MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAxfAO/MDk5ovZpp7xlG9J JKc4Sg4ztAz+BbOt6Gbhub02tF9bryklpTIyzM0v817pwQ3TCoigpxEcWdTykhDL cGhAbcp6E7Xh8aHEsqgtQ/c+wY1zIl3fU//uddlB1XuipXthDv6emXsyyU/tJWqc zy9HCJncLJeYo7MJvf2TE9nnlVm1x4flmD0k1zrvb3MONqoZbKb/TQVuVhBv7SM+ U5PSi3diXIx1Nnj4vQ8clRNUJ5X1tT9XfVmKQS1J513XNZ0uYHYRDzQYujpLWucu ob7v50wCpUm3iKP1fYCixMP6xFm0jPYz1YQaMV35VkYwc40qgk3av0PDS+1G0dCm swIDAQAB -----END PUBLIC KEY-----
SMU Keys
AMD System Management Unit (SMU) is a thermal and electric management unit found in modern AMD x86 processors. See this video.
SMU HMAC Key
4D7E73210B677A832B9F293B496E7C3E
EMC Keys
EMC IPL Cipher Key for Aeolia
5F74FE7790127FECF82CC6E6D91FA2D1
- iv is all zeroes
- algorithm is AES128CBC
- Aeolia exists since at least PS4 prototype firmware 0.910.040
- EMC IPL is codenamed C0000001
- index is 0xD (13_ if you use Zer0xFF's tools)
EMC IPL Cipher Key for Belize
1A4B4DC4179114F0A6B0266ACFC81193
- iv is all zeroes
- algorithm is AES128CBC
- Belize was introduced in firmware 2.00
- EMC IPL is codenamed C0000001
- index is 0x20 (32_ if you use Zer0xFF's tools)
EMC IPL Hasher Key for Aeolia
73FE06F3906B05ECB506DFB8691F9F54
- Algorithm is HMAC-SHA1
- It hashes the header (0x6C) of EMC IPL
EAP Keys
EAP KBL Cipher Key for Aeolia
581A75D7E9C01F3C1BD7473DBD443B98
- iv is all zeroes
- algorithm is AES128CBC
- Aeolia exists since at least PS4 prototype firmware 0.910.040
- EAP KBL is codenamed C0010001
- index is 0xE (14_ if you use Zer0xFF's tools)
EAP KBL Hasher Key for Aeolia
824D9BB4DBA3209294C93976221249E4
- Algorithm is HMAC-SHA1
- It hashes the header (size 0x6C) of EAP KBL
portability_seed_key
E973A44C578757A73492625D2CE2D76B
portability_seed
DF0C2552DFC7F4F089B9D52DAA0E572A
eap_hdd_key_blob_key1_seed
7A49D928D2243C9C4D6E1EA8F5B4E229 317E0DCAD2ABE5C56D2540572FB4B6E3
eap_hdd_key_blob_key2_seed
921CE9C8184C5DD476F4B5D3981F7E2F 468193ED071E19FFFD66B693534689D6
use_new_blob = Y
- enc
CFFDCB6ECAE612B7A30A9EDBD8F77E26 1D629DE5E6CA3F22F439211AC033884F 4B5D7D16D0A6F65D3173A2586CF819C7 C6F437444C1D9499F6EBC4145E0BBAAB C1DE7C63ED1F5A1E1946358C7F181B1F AB6DAB31195D8E611A1CB81B9ACF8B38 FF21029FAB568C7A1BCC3E2FBEB25B13 F1AFD6A3599EEF09EAEBE32684FDDA29
- sig
4798B78DD422601F26A32A1FEC5CAB8B 256E50958E0B11A31D77DEE201D4D00E
- iv
462500ECC487F0A8C2F39511E020CC59
use_new_blob = N
- enc
E073B691E177D39642DF2E1D583D0E9A 5A49EDF72BE9412E2B433E51490CE973 234B84F49E949F03727331D5456F4598 F2EDE6D0C11483B84CE3283243D0DE9D C379E915301A805DFAEB292B30374C9B F1C59041509BF11D215C35D5C08E3330 807C8229C930FAB88672C4CF7DACA881 C323D72346CA07921DB806FC242A2ED1
- sig
ED4F32C095847C6D3143EFFD61E7582F 75F24465855C4E94DAF34885D8D03463
- iv
3286EA97F3E92C434E1DC170C9289003
EAP_HDD_KEY_BLOB
5343455F4541505F4844445F5F4B4559 BB6CD66DDC671FAC3664F7BF5049BAA8 C4687904BC31CF4F2F4E9F89FA458793 811745E7C7E80D460FAF2326550BD7E4 D2A0A0D9729DE5D2117D70676F1D5574 8DC17CDF29C86A855F2AE9A1AD3E915F 00000000000000000000000000000000 00000000000000000000000000000000
Syscon Keys
Common
Security ID
3A4E6F743A557365643A (:Not:Used:)
Checksum for RL78: 3A+4E+6F+74+3A+55+73+65+64+3A = 0x370 && 0xFF = 0x70 - 1 = 0x6F Same Checksum for 78K0R
Used to access more privileged commands, such as the write command
DevKit
Full Firmware
AES-CBC-128
Key = 5301C28824B57137A819C042FC119E3F IV = 00000000000000000000000000000000
Used for:
- 40000001 (BLNK)
- 40000002 (BASE)
- 40000003 (SYST)
AES-CMAC-128
Key = 8F215691AC7EF6510239DD32CC6A2394
Used to generate the AES-CMAC-128 at the start of decrypted 40000001, 40000002 and 40000003, by digesting the remainder of the decrypted data
Retail/TestKit
Patch Firmware Keys
AES-CBC-128
Key = EF90B21B31452379068E3041AAD8281E IV = 00000000000000000000000000000000
Used for:
- 40010001 (Patch #1)
- 40010002 (Patch #2)
AES-CMAC-128
Key = 95B1AAF20C16D46FC816DF32551DE032
Used to generate the AES-CMAC-128 at the start of decrypted 40010001 and 40010002, by digesting the remainder of the decrypted data
Kernel Keys
Kernel Magic
2FB09FD1DE76967DEB947B51EC82781E
Backup And Restore Keys (BAR)
Cipher
79C8CCC889A1540D4F2E27BB614FD653
Hasher
1F18C970D000AC7E6FCC1A8CDD89B4FECDA133A10EC8F525982223F5861F0200
default_suffix
Key = 518D64A635DED8C1E6B039B1C3E55230
Used as suffix to symbol names when hashing with SHA1 to create a NID.
Crash Dump KeySeed
kd, kc KEYS = [ ['',''], [b'8F86DDEDCBF24A44EB6C30607AA26F76', b'4125715AAB8B78E569F512E65CA62DD3'], # 1.01-3.15 [b'63AEF79DC49969FD8997B2F60DB65F81', b'1800A5DE2D0F0652FA5602FFADD440AA'], # 3.50-3.70 [b'05205507B7A154E08A7A38B1897563FB', b'AD334D142EAF8B9438DB00D1D0BFF357'], # 4.00-4.05 [b'04C1A0961BBB0CB2140361B0956AAABA', b'052D2FF3014FB38CAAF6898CB899982A'], # 4.06-4.07 (to test) ]
Sealed Key Values or (PFS_EncKey and sealedkey_retail_key) Values
Keyset 1
AES-CBC-128
Key = B5DAEFFF39E6D90ECA7DC5B029A8153E
SHA-256-HMAC
Hash = 8707960A53468D6C843B3DC9624E22AF
Keyset 2
AES-CBC-128
Key = EC0D347E2A7657471F1FC33E9E916FD4
SHA-256-HMAC
Hash = A6D6583D3217E87D9BE9BCFC4436BE4F
Keyset 3
AES-CBC-128
Key = 51D8BFB4E387FB4120F081FE33E4BE9A
SHA-256-HMAC
Hash = FFF9BDEA803B14824C61850EBB084EE9
Keyset 4
AES-CBC-128
Key = 346B5D231332AC428A44A708B1138F6D
SHA-256-HMAC
Hash = 5DC6B8D1A3A0741852A7D44268714824
Dumped with getSealedKeySecret on 5.05
Keyset 5
AES-CBC-128
20 D0 43 85 25 30 C4 04 D1 68 69 E0 79 08 D5 E6
SHA-256-HMAC
2D E8 DE 4D E6 62 8B B6 2D D5 C1 70 F5 65 B6 2C
Keyset 6
AES-CBC-128
93 B7 27 0D F0 D3 73 10 60 07 90 66 65 5D 8D 07
SHA-256-HMAC
FD 44 A3 2D 8B C8 AC 18 9C 1B D0 96 40 29 66 CF
Keyset 7
AES-CBC-128
4C 78 44 83 69 37 50 8B 92 33 DF 7C D7 D6 51 65
SHA-256-HMAC
BC 4C 9F 0F E5 D3 56 A0 57 52 02 4C BD EE C8 E4
Keyset 8
AES-CBC-128
3A 32 EE CF 74 99 39 87 1C 3D 7B F8 C0 1C 7D 1F
SHA-256-HMAC
F6 F9 D8 21 82 CC C2 22 7B 7D 33 A3 B7 1E AD E3
Keyset 9
AES-CBC-128
EB 35 64 04 7D 60 24 7F 55 73 CD E5 7E 0C DE 1C
SHA-256-HMAC
29 8B 4F 59 1E F0 4E 52 17 3E EC 59 C5 A4 78 33
Keyset 0xA
AES-CBC-128
8A D4 92 CC 5B 27 B5 C3 60 11 A5 85 8B 90 93 80
SHA-256-HMAC
00 6A 34 41 82 B6 1B E5 6A 6C D6 B9 46 6F 03 45
AuthCode
KeySet 1
2B CF 69 8E 79 CF DD FA C2 4D 4C 25 BF 35 1E 62
Vtrm Cipher Init Keys
hmac_key_seed
Key = 87FB19BBF3D4D6B1B0ED226E39CC621A 37FA4ED2B6618B59B34F770FBB92947B IV = 00112233445566778899AABBCCDDEEFF
aes_key_seed
B0ED226E39CC621A37FA4ED2B6618B59
Keystone Keys
keystone_passcode_secret or passcode_hmac_secret
C74405F67424BA342BC1276251BBC2F5 55F16025B6A1B6714780DBAEC852FA2F
keystone_ks_secret or keystone_hmac_secret
783D6F3AE91C0E0712FCAAB7950BDE06 855CF7A22DCDBDE127E9BFCBAD0FF0FE
ShellCore Keys
DevKit/TestKit
Trophy Key
Key = 02CCD346B459CB83505E8E760A44D457
Retail
Trophy Key
Key = 21F41A6BAD8A1D3ECA7AD586C101B7A9
RSA PKG Meta
Modulus 400
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
Private Key 500
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
P 600
F967AD9912310C56A22E161C46B34D5B 43BE42A2F686968042C3C73FC342F587 49339F075D6E2C04FDE3E1B2AE0A0CF0 C7A61CA16350C8099C5124526C5E5EBD 1E2706BBBC9E94E135D46DB3CB3C68DD 68B3FE6CCB8D8220762363B7E9681001 4EDCBA275D01C12D805E2BAF826BD884 B6105286A7898EAE9AE289C6F7D587FB
Q 680
D7A10F9A8BF2C91195329A8CF0D94047 F568A00DBDC1FC432F65F9C3610F2577 54ADD758AC8440608D3FF3658975B5C6 2C511A2F1F22E4431154BEC9B4C7B51B 050BBC569ACD4AD973685E5CFB92B78B 0DFFF507CAB4C89B963C079E3E6B2A11 F28AB18AD72E1BA5532406ED50B89067 B1E241C69201EE10F061BBFBB27D4A73
DP 700
52CC2DA09C9E75E728EE3DDEE345D14F 941CCCC88729453B8D6EAB6E2AA7C715 43A3048F905FEBF3384A77FA36B71576 B6011A8E258782F155D8C6432AC0E598 C932D1946FD901BA0681E06D88F2242A 2501645CBFF2D999673EF672EEE4E233 5CF80040E32A9AF43D2286443CFB0AA5 7C3FCCF5F116C4AC88B4DE6294926A13
DQ 780
7C9DAD39E0D560149448197F8895D58B 80AD858A4B773785D077BBBF89714A72 CB726838EC02C67DC6440633511CC0FF 958F0D75DC25BB0B7391A96D42D803B7 68D41E7562A37035797800C8F5EF15B9 FC4E475AC870705B5298C0C2584A7096 CCB810E12F788B2BA17FF9ACDEF0BB2B E266E3229231215792C4B8F23E762037
QP 800
459755D422085EF35CB4057AFDAA4242 AD9A8CA06CBB1D6854546E3E32E35373 76F13E01EAD3CFEBEB233EC0BECEEC2C 895FA8273A4CB7E674BC454C26C825FF 34632537E14810C193A6AFEBBAE3A2F1 3DEF63D8F4FDD3EEE25DE933CCADBA75 5C85AFCEA93DD1A217F3F698B3508E5E F6EB028EA162A7D62CEC91FF1540D2E3
Index.dat Key (Portability)
Key = EED5A4FFE8A3C910DC1BFD6AAF1382250B380DBAE5045D230569473F46B07B1F IV = 3ACB38C1EC12119D56929F49F70415FF
flag is 8
HMAC-SHA256 Patch Pkg URL Key
Key = AD62E37F905E06BC19593142281C112CEC0E7EC3E97EFDCAEFCDBAAFA6378D84
RSA-2048 HID Config Service Signature Verification Public Key
Key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
RSA-2048 HID P
EECAE0D972C35872BAC2A7E427C69FE0 D3FA59ADE49F2F9986F3905B601717BB 01DDB35955213C7F0A3C5B22B01F6512 73EF14E95AD68129D69A7BC7BA45D0E5 85A8E385EDEF421CCE70A0191F7BE000 EDF1EE4C05047445AC7BBE990822AE7B D0414BFEE999299B6620364BEAC36B14 C07FA5BF4210E30E951CA0D5640C487F
RSA-2048 HID Q
D9EBE9E88218DEA733ED14D2C41D8EA3 B9993F0C47F585093DAB47261B9F8574 297FDC1028AABF6E88E9DE203714924B 55069C4C9275A8E6C8221B930BA63AD6 2413BAB057CF39B6FF53B3C944526C6E F4A03EFE7888C316722EF142CD4A2380 EC5E284C75F31CA324DDBFECDB59D04F 3F4BE1017FF7AD7B1253A5D7A8D6FDFF
Dualshock 4 Keys
Jedi "MASTER" Key
9B03D4FB5FEC1A2373462C45E4BC72A6
- decrypts dualshock4 firmwares. algo is aes-128-cbc. zeroed iv
Common
Bootloader Key
39FF1A672B4F99A6A1CA65C299D6270C 7D4E1AF91036AD6C8D20EAD1FF33D903 94FD4415B54072D9C83B94994304FD49
App 0 Key
3E5C05C6AFAFAB02203B3D181733DDCB A965400FD53A6F501731F38655B20808 CFB8E6181CC91D64C4993B040BECC7B5 ED18A5683A95A338F3CA325528A96FCB
App 1 Key
7F81488F32024C6BF5D999928798AEC0 785FC3E61BAF32DFA5833F434964CD53 37525239B10BF838EF29B37EBD73D951 1EC4DFFB9725A1E9D2678990A03C2832
Certificate Authority Modulus
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xponent = 0x10001