Difference between revisions of "Keys"
(→Keyset 9) |
CelesteBlue (talk | contribs) (→SAMU Keys) |
||
(One intermediate revision by the same user not shown) | |||
Line 1: | Line 1: | ||
= Companion App Protocol RSA Public Key = | = Companion App Protocol RSA Public Key = | ||
+ | |||
<pre> | <pre> | ||
-----BEGIN PUBLIC KEY----- | -----BEGIN PUBLIC KEY----- | ||
Line 12: | Line 13: | ||
</pre> | </pre> | ||
− | = Belize EMC Cipher Key = | + | = SMU Keys = |
+ | |||
+ | AMD System Management Unit (SMU) is a thermal and electric management unit found in modern AMD x86 processors. See [https://www.youtube.com/watch?v=iYvhHey_dTk this video]. | ||
+ | |||
+ | == SMU HMAC Key == | ||
+ | |||
+ | <pre> | ||
+ | 4D7E73210B677A832B9F293B496E7C3E | ||
+ | </pre> | ||
+ | |||
+ | = EMC Keys = | ||
+ | |||
+ | == Belize EMC Cipher Key == | ||
+ | |||
<pre> | <pre> | ||
1A4B4DC4179114F0A6B0266ACFC81193 | 1A4B4DC4179114F0A6B0266ACFC81193 | ||
Line 18: | Line 32: | ||
* iv is all zeroes | * iv is all zeroes | ||
− | * | + | * algorithm is AES128CBC |
* Belize was introduced in firmware 2.00 | * Belize was introduced in firmware 2.00 | ||
* EMC is codenamed C0000001 | * EMC is codenamed C0000001 | ||
* index is 0x20 (32_ if you use Zer0xFF's tools) | * index is 0x20 (32_ if you use Zer0xFF's tools) | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
= EAP Keys = | = EAP Keys = | ||
− | == EMC/EAP/KERNEL == | + | == EMC/EAP/KERNEL shared keys == |
=== portability_seed_key === | === portability_seed_key === |
Latest revision as of 17:16, 25 February 2021
Contents
- 1 Companion App Protocol RSA Public Key
- 2 SMU Keys
- 3 EMC Keys
- 4 EAP Keys
- 5 Syscon Keys
- 6 Kernel Keys
- 7 ShellCore Keys
- 8 Dualshock 4 Keys
Companion App Protocol RSA Public Key[edit]
-----BEGIN PUBLIC KEY----- MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAxfAO/MDk5ovZpp7xlG9J JKc4Sg4ztAz+BbOt6Gbhub02tF9bryklpTIyzM0v817pwQ3TCoigpxEcWdTykhDL cGhAbcp6E7Xh8aHEsqgtQ/c+wY1zIl3fU//uddlB1XuipXthDv6emXsyyU/tJWqc zy9HCJncLJeYo7MJvf2TE9nnlVm1x4flmD0k1zrvb3MONqoZbKb/TQVuVhBv7SM+ U5PSi3diXIx1Nnj4vQ8clRNUJ5X1tT9XfVmKQS1J513XNZ0uYHYRDzQYujpLWucu ob7v50wCpUm3iKP1fYCixMP6xFm0jPYz1YQaMV35VkYwc40qgk3av0PDS+1G0dCm swIDAQAB -----END PUBLIC KEY-----
SMU Keys[edit]
AMD System Management Unit (SMU) is a thermal and electric management unit found in modern AMD x86 processors. See this video.
SMU HMAC Key[edit]
4D7E73210B677A832B9F293B496E7C3E
EMC Keys[edit]
Belize EMC Cipher Key[edit]
1A4B4DC4179114F0A6B0266ACFC81193
- iv is all zeroes
- algorithm is AES128CBC
- Belize was introduced in firmware 2.00
- EMC is codenamed C0000001
- index is 0x20 (32_ if you use Zer0xFF's tools)
EAP Keys[edit]
[edit]
portability_seed_key[edit]
E973A44C578757A73492625D2CE2D76B
portability_seed[edit]
DF0C2552DFC7F4F089B9D52DAA0E572A
eap_hdd_key_blob_key1_seed[edit]
7A49D928D2243C9C4D6E1EA8F5B4E229 317E0DCAD2ABE5C56D2540572FB4B6E3
eap_hdd_key_blob_key2_seed[edit]
921CE9C8184C5DD476F4B5D3981F7E2F 468193ED071E19FFFD66B693534689D6
use_new_blob = Y[edit]
- enc
CFFDCB6ECAE612B7A30A9EDBD8F77E26 1D629DE5E6CA3F22F439211AC033884F 4B5D7D16D0A6F65D3173A2586CF819C7 C6F437444C1D9499F6EBC4145E0BBAAB C1DE7C63ED1F5A1E1946358C7F181B1F AB6DAB31195D8E611A1CB81B9ACF8B38 FF21029FAB568C7A1BCC3E2FBEB25B13 F1AFD6A3599EEF09EAEBE32684FDDA29
- sig
4798B78DD422601F26A32A1FEC5CAB8B 256E50958E0B11A31D77DEE201D4D00E
- iv
462500ECC487F0A8C2F39511E020CC59
use_new_blob = N[edit]
- enc
E073B691E177D39642DF2E1D583D0E9A 5A49EDF72BE9412E2B433E51490CE973 234B84F49E949F03727331D5456F4598 F2EDE6D0C11483B84CE3283243D0DE9D C379E915301A805DFAEB292B30374C9B F1C59041509BF11D215C35D5C08E3330 807C8229C930FAB88672C4CF7DACA881 C323D72346CA07921DB806FC242A2ED1
- sig
ED4F32C095847C6D3143EFFD61E7582F 75F24465855C4E94DAF34885D8D03463
- iv
3286EA97F3E92C434E1DC170C9289003
EAP_HDD_KEY_BLOB[edit]
5343455F4541505F4844445F5F4B4559 BB6CD66DDC671FAC3664F7BF5049BAA8 C4687904BC31CF4F2F4E9F89FA458793 811745E7C7E80D460FAF2326550BD7E4 D2A0A0D9729DE5D2117D70676F1D5574 8DC17CDF29C86A855F2AE9A1AD3E915F 00000000000000000000000000000000 00000000000000000000000000000000
Syscon Keys[edit]
Common[edit]
Security ID[edit]
3A4E6F743A557365643A (:Not:Used:)
Checksum for RL78: 3A+4E+6F+74+3A+55+73+65+64+3A = 0x370 && 0xFF = 0x70 - 1 = 0x6F Same Checksum for 78K0R
Used to access more privileged commands, such as the write command
AUTH #1/#2[edit]
RSA-2048
Modulus = C1653D76057907FBD28AFBC559C23C58 03A0CD505613C5878E91D90BB6B4CBA4 513F54A0F52140B0A38C15C24DCC59EB 605618D020B4A21A34C99915DA5A589D 793F58CB6EA82666D272145B62F203ED 87840C844842CA773EDFC581BCAABFFB 4AA4EEED08F6695CAA2C13EC30FA1CE3 9FCDCDCBA7CDD9C68BA1329D18F89842 46228A1F1EB57D08E5A52DE51CC3E3D2 FF96AE61BE0F9E8F996CCDA8C76D66A9 5DCE0C18FBF86BC27050DB6565F681AA 6670D8F4E626192DEB591E57E99B3325 297146188EDB6D654ED7F61B5A11532D 87AE562A76EEC16FEC4B1E92977F730D 3D44DB9FB11A4FF07281456D0CFEB30A 123995FE7C72FB5FCC249FB095704ECB Exponent = 0x10001
Used for UART communications
Unknown #1[edit]
RSA-2048
Modulus = 7BB325CEDD2FE9C1F8C987E0BC175D5F F99FEBBB45E96793AFBF5727E276F234 91D82CAD483FA77E917C5DD589D28049 6D24A0BEBBCBF10D6BB75EC621272886 EFDA5C481DCBC8A9AD6AD776E7D6DFE6 A06ACD1BC0D6704455D10D363DBD2497 E6723F94A98AC31FF7DD7AE72CA75427 CF7A1E55D145E4E331D7CEDCC27DCEF9 Exponent = 0x10001
Used for UART communications
Unknown #2[edit]
RSA-2048
Modulus = 23C4F66168B060AB37DCBEB26012D3C5 B1932E9E7DCB4BC7C4E566BE5DC1F5CA B185F63280ED4FB078111C186DC52F00 82502D3D37F366C61A2B92BE2630049D F8ECC33BDD6A21380E53505E3E564389 FA8EE23812463E1BA0F6A073778E853E FE263157D33F409ACEA6BCF0C4C87F1E FFB449A6C05C06BC115465357992C8BC Exponent = 0x10001
Used for UART communications
Devkit[edit]
Full Firmware[edit]
AES-CBC-128
Key = 5301C28824B57137A819C042FC119E3F IV = 0000000000000000
Used for:
- 40000001 (BLNK)
- 40000002 (BASE)
- 40000003 (SYST)
AES-CMAC-128
Key = 8F215691AC7EF6510239DD32CC6A2394
Used to generate the AES-CMAC-128 at the start of decrypted 40000001, 40000002 and 40000003, by digesting the remainder of the decrypted data
SNVS[edit]
AES-CBC-128
Key = 82D4EEE9E7F68EFBC43C3D2747E4139F IV = 0000000000000000
Used for:
- SNVS (Devkit)
AES-CMAC-128
Key = 4C49DC8DF6A20E1592F9E9F7442B4261
Used to generate the AES-CMAC-128 at the start of decrypted SNVS(Devkit), by digesting the remainder of the decrypted data
AES-CBC-128
Key = DB603053A4D3119149996D0BA84434E2 IV = 0000000000000000
Used for:
- SNVS(Devkit #2)
AES-CMAC-128
Key = B3A8CB797D1406658372A92B6CFB3490
Used to generate the AES-CMAC-128 at the start of decrypted SNVS(Devkit #2), by digesting the remainder of the decrypted data
Retail/Testkit[edit]
Patch Firmware Key and CMAC[edit]
AES-CBC-128
Key = EF90B21B31452379068E3041AAD8281E IV = 0000000000000000
Used for:
- 40010001 (Patch #1)
- 40010002 (Patch #2)
AES-CMAC-128
Key = 95B1AAF20C16D46FC816DF32551DE032
Used to generate the AES-CMAC-128 at the start of decrypted 40010001 and 40010002, by digesting the remainder of the decrypted data
SNVS Key and CMAC[edit]
AES-CBC-128
Key = 8BF074CCA3D9C398142256D7DD1A1259 IV = 0000000000000000
AES-CMAC-128
Key = 4065918EB339184DAACCD61B30B5FB59
Kernel Keys[edit]
Backup And Restore Keys (BAR)[edit]
Cipher[edit]
79C8CCC889A1540D4F2E27BB614FD653
Hasher[edit]
1F18C970D000AC7E6FCC1A8CDD89B4FECDA133A10EC8F525982223F5861F0200
default_suffix[edit]
Key = 518D64A635DED8C1E6B039B1C3E55230
Used as suffix to symbol names when hashing with SHA1 to create a NID.
Crash Dump KeySeed[edit]
kd, kc KEYS = [ ['',''], [b'8F86DDEDCBF24A44EB6C30607AA26F76', b'4125715AAB8B78E569F512E65CA62DD3'], # 1.01-3.15 [b'63AEF79DC49969FD8997B2F60DB65F81', b'1800A5DE2D0F0652FA5602FFADD440AA'], # 3.50-3.70 [b'05205507B7A154E08A7A38B1897563FB', b'AD334D142EAF8B9438DB00D1D0BFF357'], # 4.00-4.05 [b'04C1A0961BBB0CB2140361B0956AAABA', b'052D2FF3014FB38CAAF6898CB899982A'], # 4.06-4.07 (to test) ]
Sealed Key Values or (PFS_EncKey and sealedkey_retail_key) Values[edit]
Keyset 1[edit]
AES-CBC-128
Key = B5DAEFFF39E6D90ECA7DC5B029A8153E
SHA-256-HMAC
Hash = 8707960A53468D6C843B3DC9624E22AF
Keyset 2[edit]
AES-CBC-128
Key = EC0D347E2A7657471F1FC33E9E916FD4
SHA-256-HMAC
Hash = A6D6583D3217E87D9BE9BCFC4436BE4F
Keyset 3[edit]
AES-CBC-128
Key = 51D8BFB4E387FB4120F081FE33E4BE9A
SHA-256-HMAC
Hash = FFF9BDEA803B14824C61850EBB084EE9
Keyset 4[edit]
AES-CBC-128
Key = 346B5D231332AC428A44A708B1138F6D
SHA-256-HMAC
Hash = 5DC6B8D1A3A0741852A7D44268714824
Dumped with getSealedKeySecret on 5.05
Keyset 5[edit]
AES-CBC-128
20 D0 43 85 25 30 C4 04 D1 68 69 E0 79 08 D5 E6
SHA-256-HMAC
2D E8 DE 4D E6 62 8B B6 2D D5 C1 70 F5 65 B6 2C
Keyset 6[edit]
AES-CBC-128
93 B7 27 0D F0 D3 73 10 60 07 90 66 65 5D 8D 07
SHA-256-HMAC
FD 44 A3 2D 8B C8 AC 18 9C 1B D0 96 40 29 66 CF
Keyset 7[edit]
AES-CBC-128
4C 78 44 83 69 37 50 8B 92 33 DF 7C D7 D6 51 65
SHA-256-HMAC
BC 4C 9F 0F E5 D3 56 A0 57 52 02 4C BD EE C8 E4
Keyset 8[edit]
AES-CBC-128
3A 32 EE CF 74 99 39 87 1C 3D 7B F8 C0 1C 7D 1F
SHA-256-HMAC
F6 F9 D8 21 82 CC C2 22 7B 7D 33 A3 B7 1E AD E3
Keyset 9[edit]
AES-CBC-128
EB 35 64 04 7D 60 24 7F 55 73 CD E5 7E 0C DE 1C
SHA-256-HMAC
29 8B 4F 59 1E F0 4E 52 17 3E EC 59 C5 A4 78 33
Keyset 0xA[edit]
AES-CBC-128
8A D4 92 CC 5B 27 B5 C3 60 11 A5 85 8B 90 93 80
SHA-256-HMAC
00 6A 34 41 82 B6 1B E5 6A 6C D6 B9 46 6F 03 45
AuthCode[edit]
KeySet 1[edit]
2B CF 69 8E 79 CF DD FA C2 4D 4C 25 BF 35 1E 62
Vtrm Cipher Init Keys[edit]
hmac_key_seed[edit]
Key = 87FB19BBF3D4D6B1B0ED226E39CC621A 37FA4ED2B6618B59B34F770FBB92947B IV = 00112233445566778899AABBCCDDEEFF
aes_key_seed[edit]
B0ED226E39CC621A37FA4ED2B6618B59 DBF07E82FFFFFFFF47F17E82FFFFFFFF 81F17E82FFFFFFFFBBF17E82FFFFFFFF F5F17E82FFFFFFFF37F27E82FFFFFFFF 79F27E82FFFFFFFFA9F27E82FFFFFFFF DAF27E82FFFFFFFF07F37E82FFFFFFFF 47F37E82FFFFFFFF0000000000000000
Keystone Keys[edit]
keystone_passcode_secret or passcode_hmac_secret[edit]
C74405F67424BA342BC1276251BBC2F5 55F16025B6A1B6714780DBAEC852FA2F
keystone_ks_secret or keystone_hmac_secret[edit]
783D6F3AE91C0E0712FCAAB7950BDE06 855CF7A22DCDBDE127E9BFCBAD0FF0FE
ShellCore Keys[edit]
Devkit/Testkit[edit]
Trophy Key[edit]
Key = 02CCD346B459CB83505E8E760A44D457
Retail[edit]
Trophy Key[edit]
Key = 21F41A6BAD8A1D3ECA7AD586C101B7A9
RSA PKG Meta[edit]
P[edit]
F967AD9912310C56A22E161C46B34D5B 43BE42A2F686968042C3C73FC342F587 49339F075D6E2C04FDE3E1B2AE0A0CF0 C7A61CA16350C8099C5124526C5E5EBD 1E2706BBBC9E94E135D46DB3CB3C68DD 68B3FE6CCB8D8220762363B7E9681001 4EDCBA275D01C12D805E2BAF826BD884 B6105286A7898EAE9AE289C6F7D587FB
Q[edit]
D7A10F9A8BF2C91195329A8CF0D94047 F568A00DBDC1FC432F65F9C3610F2577 54ADD758AC8440608D3FF3658975B5C6 2C511A2F1F22E4431154BEC9B4C7B51B 050BBC569ACD4AD973685E5CFB92B78B 0DFFF507CAB4C89B963C079E3E6B2A11 F28AB18AD72E1BA5532406ED50B89067 B1E241C69201EE10F061BBFBB27D4A73
Modulus[edit]
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
Private Key[edit]
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
DP[edit]
52CC2DA09C9E75E728EE3DDEE345D14F 941CCCC88729453B8D6EAB6E2AA7C715 43A3048F905FEBF3384A77FA36B71576 B6011A8E258782F155D8C6432AC0E598 C932D1946FD901BA0681E06D88F2242A 2501645CBFF2D999673EF672EEE4E233 5CF80040E32A9AF43D2286443CFB0AA5 7C3FCCF5F116C4AC88B4DE6294926A13
DQ[edit]
7C9DAD39E0D560149448197F8895D58B 80AD858A4B773785D077BBBF89714A72 CB726838EC02C67DC6440633511CC0FF 958F0D75DC25BB0B7391A96D42D803B7 68D41E7562A37035797800C8F5EF15B9 FC4E475AC870705B5298C0C2584A7096 CCB810E12F788B2BA17FF9ACDEF0BB2B E266E3229231215792C4B8F23E762037
QP[edit]
459755D422085EF35CB4057AFDAA4242 AD9A8CA06CBB1D6854546E3E32E35373 76F13E01EAD3CFEBEB233EC0BECEEC2C 895FA8273A4CB7E674BC454C26C825FF 34632537E14810C193A6AFEBBAE3A2F1 3DEF63D8F4FDD3EEE25DE933CCADBA75 5C85AFCEA93DD1A217F3F698B3508E5E F6EB028EA162A7D62CEC91FF1540D2E3
Index.dat Key (Portability)[edit]
Key = EED5A4FFE8A3C910DC1BFD6AAF1382250B380DBAE5045D230569473F46B07B1F IV = 3ACB38C1EC12119D56929F49F70415FF
flag is 8
HMAC-SHA256 Patch Pkg URL Key[edit]
Key = AD62E37F905E06BC19593142281C112CEC0E7EC3E97EFDCAEFCDBAAFA6378D84
RSA-2048 HID Config Service Signature Verification Public Key[edit]
Key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
Dualshock 4 Keys[edit]
Common[edit]
Bootloader Key[edit]
39FF1A672B4F99A6A1CA65C299D6270C 7D4E1AF91036AD6C8D20EAD1FF33D903 94FD4415B54072D9C83B94994304FD49
App 0 Key[edit]
3E5C05C6AFAFAB02203B3D181733DDCB A965400FD53A6F501731F38655B20808 CFB8E6181CC91D64C4993B040BECC7B5 ED18A5683A95A338F3CA325528A96FCB
App 1 Key[edit]
7F81488F32024C6BF5D999928798AEC0 785FC3E61BAF32DFA5833F434964CD53 37525239B10BF838EF29B37EBD73D951 1EC4DFFB9725A1E9D2678990A03C2832
Certificate Authority Modulus[edit]
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xponent = 0x10001