Keys: Difference between revisions
(→Devkit) |
|||
Line 310: | Line 310: | ||
= ShellCore Keys = | = ShellCore Keys = | ||
== Devkit == | == Devkit/Testkit == | ||
=== Trophy Key === | === Trophy Key === |
Revision as of 20:13, 25 September 2018
Syscon Keys
Common
Security ID
3A4E6F743A557365643A (:Not:Used:)
Used to access more privileged commands, such as the write command
AUTH #1/#2
RSA-2048
Modulus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xponent = 0x10001
Used for UART communications
Unknown #1
RSA-2048
Modulus = 7BB325CEDD2FE9C1F8C987E0BC175D5F F99FEBBB45E96793AFBF5727E276F234 91D82CAD483FA77E917C5DD589D28049 6D24A0BEBBCBF10D6BB75EC621272886 EFDA5C481DCBC8A9AD6AD776E7D6DFE6 A06ACD1BC0D6704455D10D363DBD2497 E6723F94A98AC31FF7DD7AE72CA75427 CF7A1E55D145E4E331D7CEDCC27DCEF9 Exponent = 0x10001
Used for UART communications
Unknown #2
RSA-2048
Modulus = 23C4F66168B060AB37DCBEB26012D3C5 B1932E9E7DCB4BC7C4E566BE5DC1F5CA B185F63280ED4FB078111C186DC52F00 82502D3D37F366C61A2B92BE2630049D F8ECC33BDD6A21380E53505E3E564389 FA8EE23812463E1BA0F6A073778E853E FE263157D33F409ACEA6BCF0C4C87F1E FFB449A6C05C06BC115465357992C8BC Exponent = 0x10001
Used for UART communications
Devkit
Full Firmware
AES-CBC-128
Key = 5301C28824B57137A819C042FC119E3F IV = 0000000000000000
Used for:
- 40000001 (BLNK)
- 40000002 (BASE)
- 40000003 (SYST)
AES-CMAC-128
Key = 8F215691AC7EF6510239DD32CC6A2394
Used to generate the AES-CMAC-128 at the start of decrypted 40000001, 40000002 and 40000003, by digesting the remainder of the decrypted data
SNVS?
AES-CBC-128
Key = 82D4EEE9E7F68EFBC43C3D2747E4139F IV = 0000000000000000
Used for:
- 40000001 (BLNK)
AES-CMAC-128
Key = 4C49DC8DF6A20E1592F9E9F7442B4261
Used to generate the AES-CMAC-128 at the start of decrypted 40000001, by digesting the remainder of the decrypted data
AES-CBC-128
Key = DB603053A4D3119149996D0BA84434E2 IV = 0000000000000000
Used for:
- 40000002 (BASE)
AES-CMAC-128
Key = B3A8CB797D1406658372A92B6CFB3490
Used to generate the AES-CMAC-128 at the start of decrypted 40000002, by digesting the remainder of the decrypted data
Retail/Testkit
Patch Firmware
AES-CBC-128
Key = EF90B21B31452379068E3041AAD8281E IV = 0000000000000000
Used for:
- 40010001 (Patch #1)
- 40010002 (Patch #2)
AES-CMAC-128
Key = 95B1AAF20C16D46FC816DF32551DE032
Used to generate the AES-CMAC-128 at the start of decrypted 40010001 and 40010002, by digesting the remainder of the decrypted data
SNVS?
AES-CBC-128
Key = 8BF074CCA3D9C398142256D7DD1A1259 IV = 0000000000000000
AES-CMAC-128
Key = 4065918EB339184DAACCD61B30B5FB59
Kernel Keys
Retail/Testkit
default_suffix
AES-CBC-128
Key = 518D64A635DED8C1E6B039B1C3E55230
Used as suffix to symbol names when hashing with SHA256 to create a NID.
Crash Dump KeySeed
s_kd
AES-CBC-128
Key = 8F86DDEDCBF24A44EB6C30607AA26F76
s_kc
AES-CBC-128
Key = 4125715AAB8B78E569F512E65CA62DD3
Sealed Key Values
Keyset 1
AES-CBC-128
Key = B5DAEFFF39E6D90ECA7DC5B029A8153E
SHA-256-HMAC
Hash = 8707960A53468D6C843B3DC9624E22AF
Keyset 2
AES-CBC-128
Key = EC0D347E2A7657471F1FC33E9E916FD4
SHA-256-HMAC
Hash = A6D6583D3217E87D9BE9BCFC4436BE4F
Keyset 3
AES-CBC-128
Key = 51D8BFB4E387FB4120F081FE33E4BE9A
SHA-256-HMAC
Hash = FFF9BDEA803B14824C61850EBB084EE9
Keyset 4
AES-CBC-128
Key = 346B5D231332AC428A44A708B1138F6D
SHA-256-HMAC
Hash = 5DC6B8D1A3A0741852A7D44268714824
Dumped with getSealedKeySecret on 5.05
Vtrm Cipher Init Keys
hmac_key_seed
Key = 87FB19BBF3D4D6B1B0ED226E39CC621A 37FA4ED2B6618B59B34F770FBB92947B IV = 00112233445566778899AABBCCDDEEFF
aes_key_seed
B0ED226E39CC621A37FA4ED2B6618B59 DBF07E82FFFFFFFF47F17E82FFFFFFFF 81F17E82FFFFFFFFBBF17E82FFFFFFFF F5F17E82FFFFFFFF37F27E82FFFFFFFF 79F27E82FFFFFFFFA9F27E82FFFFFFFF DAF27E82FFFFFFFF07F37E82FFFFFFFF 47F37E82FFFFFFFF0000000000000000
Keystone Keys
keystone_passcode_secret
C74405F67424BA342BC1276251BBC2F5 55F16025B6A1B6714780DBAEC852FA2F
keystone_ks_secret
783D6F3AE91C0E0712FCAAB7950BDE06 855CF7A22DCDBDE127E9BFCBAD0FF0FE
ShellCore Keys
Devkit/Testkit
Trophy Key
Key = 02CCD346B459CB83505E8E760A44D457
Retail
Trophy Key
Key = 21F41A6BAD8A1D3ECA7AD586C101B7A9
RSA PKG Meta
P
F967AD9912310C56A22E161C46B34D5B 43BE42A2F686968042C3C73FC342F587 49339F075D6E2C04FDE3E1B2AE0A0CF0 C7A61CA16350C8099C5124526C5E5EBD 1E2706BBBC9E94E135D46DB3CB3C68DD 68B3FE6CCB8D8220762363B7E9681001 4EDCBA275D01C12D805E2BAF826BD884 B6105286A7898EAE9AE289C6F7D587FB
Q
D7A10F9A8BF2C91195329A8CF0D94047 F568A00DBDC1FC432F65F9C3610F2577 54ADD758AC8440608D3FF3658975B5C6 2C511A2F1F22E4431154BEC9B4C7B51B 050BBC569ACD4AD973685E5CFB92B78B 0DFFF507CAB4C89B963C079E3E6B2A11 F28AB18AD72E1BA5532406ED50B89067 B1E241C69201EE10F061BBFBB27D4A73
Modulus
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
Private Key
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
DP
52CC2DA09C9E75E728EE3DDEE345D14F 941CCCC88729453B8D6EAB6E2AA7C715 43A3048F905FEBF3384A77FA36B71576 B6011A8E258782F155D8C6432AC0E598 C932D1946FD901BA0681E06D88F2242A 2501645CBFF2D999673EF672EEE4E233 5CF80040E32A9AF43D2286443CFB0AA5 7C3FCCF5F116C4AC88B4DE6294926A13
DQ
7C9DAD39E0D560149448197F8895D58B 80AD858A4B773785D077BBBF89714A72 CB726838EC02C67DC6440633511CC0FF 958F0D75DC25BB0B7391A96D42D803B7 68D41E7562A37035797800C8F5EF15B9 FC4E475AC870705B5298C0C2584A7096 CCB810E12F788B2BA17FF9ACDEF0BB2B E266E3229231215792C4B8F23E762037
QP
459755D422085EF35CB4057AFDAA4242 AD9A8CA06CBB1D6854546E3E32E35373 76F13E01EAD3CFEBEB233EC0BECEEC2C 895FA8273A4CB7E674BC454C26C825FF 34632537E14810C193A6AFEBBAE3A2F1 3DEF63D8F4FDD3EEE25DE933CCADBA75 5C85AFCEA93DD1A217F3F698B3508E5E F6EB028EA162A7D62CEC91FF1540D2E3
Index.dat Key (Portability)
Key = EED5A4FFE8A3C910DC1BFD6AAF138225 0B380DBAE5045D230569473F46B07B1F IV = 3ACB38C1EC12119D56929F49F70415FF
flag is 8
Dualshock 4 Keys
Common
Bootloader Key
39FF1A672B4F99A6A1CA65C299D6270C 7D4E1AF91036AD6C8D20EAD1FF33D903 94FD4415B54072D9C83B94994304FD49
App 0 Key
3E5C05C6AFAFAB02203B3D181733DDCB A965400FD53A6F501731F38655B20808 CFB8E6181CC91D64C4993B040BECC7B5 ED18A5683A95A338F3CA325528A96FCB
App 1 Key
7F81488F32024C6BF5D999928798AEC0 785FC3E61BAF32DFA5833F434964CD53 37525239B10BF838EF29B37EBD73D951 1EC4DFFB9725A1E9D2678990A03C2832
Certificate Authority Modulus
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xponent = 0x10001