Difference between revisions of "Keys"

From PS4 Developer wiki
Jump to: navigation, search
m (Security ID)
m (Security ID)
Line 5: Line 5:
 
=== Security ID ===
 
=== Security ID ===
  
 +
<pre>
 
3A4E6F743A557365643A (:Not:Used:)
 
3A4E6F743A557365643A (:Not:Used:)
 +
</pre>
  
 
Used to access more privileged commands, such as the write command
 
Used to access more privileged commands, such as the write command

Revision as of 23:31, 22 September 2018

Syscon Keys

Common

Security ID

3A4E6F743A557365643A (:Not:Used:)

Used to access more privileged commands, such as the write command

AUTH #1

RSA-2048

Modulus = C1653D76057907FBD28AFBC559C23C58
          03A0CD505613C5878E91D90BB6B4CBA4
          513F54A0F52140B0A38C15C24DCC59EB
          605618D020B4A21A34C99915DA5A589D
          793F58CB6EA82666D272145B62F203ED
          87840C844842CA773EDFC581BCAABFFB
          4AA4EEED08F6695CAA2C13EC30FA1CE3
          9FCDCDCBA7CDD9C68BA1329D18F89842
Exponent = 0x10001

Used for UART communications

AUTH #2

RSA-2048

Modulus = 46228A1F1EB57D08E5A52DE51CC3E3D2
          FF96AE61BE0F9E8F996CCDA8C76D66A9
          5DCE0C18FBF86BC27050DB6565F681AA
          6670D8F4E626192DEB591E57E99B3325
          297146188EDB6D654ED7F61B5A11532D
          87AE562A76EEC16FEC4B1E92977F730D
          3D44DB9FB11A4FF07281456D0CFEB30A
          123995FE7C72FB5FCC249FB095704ECB
Exponent = 0x10001

Used for UART communications

Unknown #1

RSA-2048

Modulus = 7BB325CEDD2FE9C1F8C987E0BC175D5F
          F99FEBBB45E96793AFBF5727E276F234
          91D82CAD483FA77E917C5DD589D28049
          6D24A0BEBBCBF10D6BB75EC621272886
          EFDA5C481DCBC8A9AD6AD776E7D6DFE6
          A06ACD1BC0D6704455D10D363DBD2497
          E6723F94A98AC31FF7DD7AE72CA75427
          CF7A1E55D145E4E331D7CEDCC27DCEF9
Exponent = 0x10001

Used for UART communications

Unknown #2

RSA-2048

Modulus = 23C4F66168B060AB37DCBEB26012D3C5
          B1932E9E7DCB4BC7C4E566BE5DC1F5CA
          B185F63280ED4FB078111C186DC52F00
          82502D3D37F366C61A2B92BE2630049D
          F8ECC33BDD6A21380E53505E3E564389
          FA8EE23812463E1BA0F6A073778E853E
          FE263157D33F409ACEA6BCF0C4C87F1E
          FFB449A6C05C06BC115465357992C8BC
Exponent = 0x10001

Used for UART communications

Devkit

Full Firmware

AES-CBC-128

Key = 5301C28824B57137A819C042FC119E3F
IV = 0000000000000000

Used for:

  • 40000001 (BLNK)
  • 40000002 (BASE)
  • 40000003 (SYST)


AES-CMAC-128

Key = 8F215691AC7EF6510239DD32CC6A2394

Used to generate the AES-CMAC-128 at the start of decrypted 40000001, 40000002 and 40000003, by digesting the remainder of the decrypted data

SNVS?

AES-CBC-128

Key = 82D4EEE9E7F68EFBC43C3D2747E4139F
IV = 0000000000000000

Used for:

  • 40000001 (BLNK)


AES-CMAC-128

Key = 4C49DC8DF6A20E1592F9E9F7442B4261

Used to generate the AES-CMAC-128 at the start of decrypted 40000001, by digesting the remainder of the decrypted data


AES-CBC-128

Key = DB603053A4D3119149996D0BA84434E2
IV = 0000000000000000

Used for:

  • 40000002 (BASE)


AES-CMAC-128

Key = B3A8CB797D1406658372A92B6CFB3490

Used to generate the AES-CMAC-128 at the start of decrypted 40000002, by digesting the remainder of the decrypted data

Retail/Testkit

Patch Firmware

AES-CBC-128

Key = EF90B21B31452379068E3041AAD8281E
IV = 0000000000000000

Used for:

  • 40010001 (Patch #1)
  • 40010002 (Patch #2)


AES-CMAC-128

Key = 95B1AAF20C16D46FC816DF32551DE032

Used to generate the AES-CMAC-128 at the start of decrypted 40010001 and 40010002, by digesting the remainder of the decrypted data

SNVS?

AES-CBC-128

Key = 8BF074CCA3D9C398142256D7DD1A1259
IV = 0000000000000000

AES-CMAC-128

Key = 4065918EB339184DAACCD61B30B5FB59

Kernel Keys

default_suffix

Used as suffix to symbol names when hashing with SHA256 to create a NID.

51 8D 64 A6 35 DE D8 C1 E6 B0 39 B1 C3 E5 52 30

Crash Dump KeySeed

Retail

s_kd

8F 86 DD ED CB F2 4A 44 EB 6C 30 60 7A A2 6F 76

s_kc

41 25 71 5A AB 8B 78 E5  69 F5 12 E6 5C A6 2D D3
  • algo used is aes cbc

Sealed Key Values

Retail

Key: AES CFB 128
Hash: SHA 256 HMAC

Keyset 1

Key: B5DAEFFF39E6D90ECA7DC5B029A8153E
Hash: 8707960A53468D6C843B3DC9624E22AF


Keyset 2

Key: EC0D347E2A7657471F1FC33E9E916FD4
Hash: A6D6583D3217E87D9BE9BCFC4436BE4F


Keyset 3

Key: 51D8BFB4E387FB4120F081FE33E4BE9A
Hash: FFF9BDEA803B14824C61850EBB084EE9


Keyset 4

Key: 346B5D231332AC428A44A708B1138F6D
Hash: 5DC6B8D1A3A0741852A7D44268714824

Dumped with getSealedKeySecret on 5.05

Vtrm Cipher Init Keys

hmac_key_seed

87 FB 19 BB F3 D4 D6 B1  B0 ED 22 6E 39 CC 62 1A
37 FA 4E D2 B6 61 8B 59  B3 4F 77 0F BB 92 94 7B

iv

00 11 22 33 44 55 66 77  88 99 AA BB CC DD EE FF

aes_key_seed

B0 ED 22 6E 39 CC 62 1A  37 FA 4E D2 B6 61 8B 59
DB F0 7E 82 FF FF FF FF  47 F1 7E 82 FF FF FF FF
81 F1 7E 82 FF FF FF FF  BB F1 7E 82 FF FF FF FF
F5 F1 7E 82 FF FF FF FF  37 F2 7E 82 FF FF FF FF
79 F2 7E 82 FF FF FF FF  A9 F2 7E 82 FF FF FF FF
DA F2 7E 82 FF FF FF FF  07 F3 7E 82 FF FF FF FF
47 F3 7E 82 FF FF FF FF  00 00 00 00 00 00 00 00

Keystone files Keys

keystone_passcode_secret

C7 44 05 F6 74 24 BA 34 2B C1 27 62 51 BB C2 F5 55 F1 60 25 B6 A1 B6 71 47 80 DB AE C8 52 FA 2F

keystone_ks_secret

78 3D 6F 3A E9 1C 0E 07 12 FC AA B7 95 0B DE 06 85 5C F7 A2 2D CD BD E1 27 E9 BF CB AD 0F F0 FE

ShellCore Keys

Trophy Debug Key

02 CC D3 46 B4 59 CB 83 50 5E 8E 76 0A 44 D4 57

Trophy Retail Key

21 F4 1A 6B AD 8A 1D 3E CA 7A D5 86 C1 01 B7 A9

RSA PKG Meta P

F9 67 AD 99 12 31 0C 56 A2 2E 16 1C 46 B3 4D 5B 
43 BE 42 A2 F6 86 96 80 42 C3 C7 3F C3 42 F5 87 
49 33 9F 07 5D 6E 2C 04 FD E3 E1 B2 AE 0A 0C F0 
C7 A6 1C A1 63 50 C8 09 9C 51 24 52 6C 5E 5E BD 
1E 27 06 BB BC 9E 94 E1 35 D4 6D B3 CB 3C 68 DD 
68 B3 FE 6C CB 8D 82 20 76 23 63 B7 E9 68 10 01 
4E DC BA 27 5D 01 C1 2D 80 5E 2B AF 82 6B D8 84 
B6 10 52 86 A7 89 8E AE 9A E2 89 C6 F7 D5 87 FB

RSA PKG Meta Q

D7 A1 0F 9A 8B F2 C9 11 95 32 9A 8C F0 D9 40 47 
F5 68 A0 0D BD C1 FC 43 2F 65 F9 C3 61 0F 25 77 
54 AD D7 58 AC 84 40 60 8D 3F F3 65 89 75 B5 C6 
2C 51 1A 2F 1F 22 E4 43 11 54 BE C9 B4 C7 B5 1B 
05 0B BC 56 9A CD 4A D9 73 68 5E 5C FB 92 B7 8B 
0D FF F5 07 CA B4 C8 9B 96 3C 07 9E 3E 6B 2A 11 
F2 8A B1 8A D7 2E 1B A5 53 24 06 ED 50 B8 90 67 
B1 E2 41 C6 92 01 EE 10 F0 61 BB FB B2 7D 4A 73

RSA PKG Meta Modulus

D2 12 FC 33 5F 6D DB 83 16 09 62 8B 03 56 27 37 
82 D4 77 85 35 29 39 2D 52 6B 8C 4C 8C FB 06 C1 
84 5B E7 D4 F7 BC D2 4E 62 45 CD 2A BB D7 77 76 
45 36 55 27 3F B3 F5 F9 8E DA 4B EF AA 59 AE B3 
9B EA 54 98 D2 06 32 6A 58 31 2A E0 D4 4F 90 B5 
0A 7D EC F4 3A 9C 52 67 2D 99 31 8E 0C 43 E6 82 
FE 07 46 E1 2E 50 D4 1F 2D 2F 7E D9 08 BA 06 B3 
BF 2E 20 3F 4E 3F FE 44 FF AA 50 43 57 91 69 94 
49 15 82 82 E4 0F 4C 8D 9D 2C C9 5B 1D 64 BF 88 
8B D4 C5 94 E7 65 47 84 1E E5 79 10 FB 98 93 47 
B9 7D 85 12 A6 40 98 2C F7 92 BC 95 19 32 ED E8 
90 56 0D 65 C1 AA 78 C6 2E 54 FD 5F 54 A1 F6 7E 
E5 E0 5F 61 C1 20 B4 B9 B4 33 08 70 E4 DF 89 56 
ED 01 29 46 77 5F 8C B8 A9 F5 1E 2E B3 B9 BF E0 
09 B7 8D 28 D4 A6 C3 B8 1E 1F 07 EB B4 12 0B 95 
B8 85 30 FD DC 39 13 D0 7C DC 8F ED F9 C9 A3 C1

RSA PKG Meta Private Key

32 D9 03 90 8F BD B0 8F 57 2B 28 5E 0B 8D B3 EA 
5C D1 7E A8 90 88 8C DD 6A 80 BB B1 DF C1 F7 0D 
AA 32 F0 B7 7C CB 88 80 0E 8B 64 B0 BE 4C D6 0E 
9B 8C 1E 2A 64 E1 F3 5C D7 76 01 41 5E 93 5C 94 
FE DD 46 62 C3 1B 5A E2 A0 BC 2D EB C3 98 0A A7 
B7 85 69 70 68 2B 64 4A B3 1F CC 7D DC 7C 26 F4 
77 F6 5C F2 AE 5A 44 2D D3 AB 16 62 04 19 BA FB 
90 FF E2 30 50 89 6E CB 56 B2 EB C0 91 16 92 5E 
30 8E AE C7 94 5D FD 35 E1 20 F8 AD 3E BC 08 BF 
C0 36 74 9F D5 BB 52 08 FD 06 66 F3 7A B3 04 F4 
75 29 5D E9 5F AA 10 30 B2 0F 5A 1A C1 2A B3 FE 
CB 21 AD 80 EC 8F 20 09 1C DB C5 58 94 C2 9C C6 
CE 82 65 3E 57 90 BC A9 8B 06 B4 F0 72 F6 77 DF 
98 64 F1 EC FE 37 2D BC AE 8C 08 81 1F C3 C9 89 
1A C7 42 82 4B 2E DC 8E 8D 73 CE B1 CC 01 D9 08 
70 87 3C 44 08 EC 49 8F 81 5A E2 40 FF 77 FC 0D

RSA PKG Meta DP

52 CC 2D A0 9C 9E 75 E7 28 EE 3D DE E3 45 D1 4F 
94 1C CC C8 87 29 45 3B 8D 6E AB 6E 2A A7 C7 15 
43 A3 04 8F 90 5F EB F3 38 4A 77 FA 36 B7 15 76 
B6 01 1A 8E 25 87 82 F1 55 D8 C6 43 2A C0 E5 98 
C9 32 D1 94 6F D9 01 BA 06 81 E0 6D 88 F2 24 2A 
25 01 64 5C BF F2 D9 99 67 3E F6 72 EE E4 E2 33 
5C F8 00 40 E3 2A 9A F4 3D 22 86 44 3C FB 0A A5 
7C 3F CC F5 F1 16 C4 AC 88 B4 DE 62 94 92 6A 13

RSA PKG Meta DQ

7C 9D AD 39 E0 D5 60 14 94 48 19 7F 88 95 D5 8B 
80 AD 85 8A 4B 77 37 85 D0 77 BB BF 89 71 4A 72 
CB 72 68 38 EC 02 C6 7D C6 44 06 33 51 1C C0 FF 
95 8F 0D 75 DC 25 BB 0B 73 91 A9 6D 42 D8 03 B7 
68 D4 1E 75 62 A3 70 35 79 78 00 C8 F5 EF 15 B9 
FC 4E 47 5A C8 70 70 5B 52 98 C0 C2 58 4A 70 96 
CC B8 10 E1 2F 78 8B 2B A1 7F F9 AC DE F0 BB 2B 
E2 66 E3 22 92 31 21 57 92 C4 B8 F2 3E 76 20 37

RSA PKG Meta QP

45 97 55 D4 22 08 5E F3 5C B4 05 7A FD AA 42 42 
AD 9A 8C A0 6C BB 1D 68 54 54 6E 3E 32 E3 53 73 
76 F1 3E 01 EA D3 CF EB EB 23 3E C0 BE CE EC 2C 
89 5F A8 27 3A 4C B7 E6 74 BC 45 4C 26 C8 25 FF 
34 63 25 37 E1 48 10 C1 93 A6 AF EB BA E3 A2 F1 
3D EF 63 D8 F4 FD D3 EE E2 5D E9 33 CC AD BA 75 
5C 85 AF CE A9 3D D1 A2 17 F3 F6 98 B3 50 8E 5E 
F6 EB 02 8E A1 62 A7 D6 2C EC 91 FF 15 40 D2 E3

Index.dat Key (Portability)

key : EE D5 A4 FF E8 A3 C9 10 DC 1B FD 6A AF 13 82 25 0B 38 0D BA E5 04 5D 23 05 69 47 3F 46 B0 7B 1F

iv :  3A CB 38 C1 EC 12 11 9D 56 92 9F 49 F7 04 15 FF
  • flag is 8