Editing Keys
Jump to navigation
Jump to search
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 1: | Line 1: | ||
= Useful Information = | = Useful Information = | ||
* | * KIRK commands 0x10 and 0x11 explanation: [http://www.lolhax.org/2011/07/06/kirk-0x10-private-key/] | ||
* Save Data encryption code: [http://pastebin.com/RFDXKCAf] | * Save Data encryption code: [http://pastebin.com/RFDXKCAf] | ||
* Kirk Engine code: [https://github.com/tpunix/kirk_engine/blob/master/kirk/kirk_engine.c] | * Kirk Engine code: [https://github.com/tpunix/kirk_engine/blob/master/kirk/kirk_engine.c] | ||
Line 7: | Line 7: | ||
== Location == | == Location == | ||
keyfiles should be placed in ~/.psp or %userprofile%\pspkeys | keyfiles should be placed in ~/.psp or %userprofile%\pspkeys <br /> | ||
== Naming == | == Naming == | ||
Line 22: | Line 22: | ||
= Keys = | = Keys = | ||
== | == Baryon Keys == | ||
=== | === Security ID (TA-086 Baryon) === | ||
<pre> | <pre> | ||
008080A217A91705180F | |||
</pre> | </pre> | ||
=== | === Comms Key (Baryon) === | ||
<pre> | <pre> | ||
D2072253A4F27468F4E04313AD2EB4DB | |||
</pre> | </pre> | ||
=== | === Comms Keys 3000 (Baryon) (Partial) === | ||
<pre> | <pre> | ||
A9037ED9F08993B79A7C773C0D264810 | |||
A081XXXXXXXXXXXXXXXXXXXXXXXXXXXX | |||
</pre> | </pre> | ||
=== | === Table 1 Keys === | ||
<pre> | <pre> | ||
F35CEC89825216D8ACD92981A41C7B78 | |||
E91A8C6075F7BBAD54F8FCD576D2750E | |||
1BF2F77B3247249F316518E4C0B6BBCE | |||
DBC057A0D8EA6347BE8F425A1EDE6BD0 | |||
E8331F481EC63A594EF056149B85204B | |||
4BA31C0369770A3009474B1DDE45B595 | |||
AFE4B0ACADC4979D9B92CD8607D92792 | |||
832C9F2FD479DE49C55E8E43393E8CAB | |||
32B1821DB46023FDFF3A32BCDCE5FB77 | |||
BE8C21A3F743290ACA3544762AF6A65D | |||
A11F2302AF588CA5DB11E9AD210BDA7C | |||
</pre> | </pre> | ||
=== | * Baryon related keys. Likely used in battery auth | ||
=== Table 2-7 Keys === | |||
<pre> | <pre> | ||
E19DA609B64FA5308E50B57D12FCAADB | |||
7B9AD4722C9AB91C72FCBA0FCAD8BB11 | |||
B5CE13C7426EE75E6416D16B5A90F04B | |||
EB5E3F2C1250AB4CFE9A4495B7ED0CFC | |||
DF34CCF3594BBE159A644B0F2F98DFD3 | |||
558A6AA6A1F80AB460FA246FFCD3F02F | |||
98CD543E6FCED1DB16765D792DD1F202 | |||
2BB34115ED82E736E9FFCD90DCF12CDE | |||
8CA7D899D23F03E4678E3AF7AE725C70 | |||
4BC70AD26DBF8A89A3C46E54BD1391CD | |||
C48F1C164D204EC4E645DCB2C9749504 | |||
6409F01BAC75FCC0F798AB906288FF9D | |||
DCB837C7BB17877B798E42E9660404FB | |||
71AD81B6803B7CFB057CAEECF89E0703 | |||
C8B9FF7E5FDFD8A4BCB9FE506A926E69 | |||
18D099663B64479F9A2634CAEE84E987 | |||
7860871E477C9FD8A2385C68846AEA03 | |||
E39B7AFD713636A91DBF2975F97D10FA | |||
3DDEBAC0E2937D4B6875341D5EA7B4A4 | |||
9CA1E65C698B5F2290F8B98D0D531DA9 | |||
E97553B5B4DDC996CC5CF841D0DD6479 | |||
779E91C2289C77BED31F6A92E030FD99 | |||
06C98CD84A11DED6265C30D986E259D0 | |||
<pre> | D3D5870B5F155789B1975868008689D0 | ||
5F8CD354207FFEA98130B1E99191C841 | |||
6C33EB3897B7C03E59D801B066F7EF27 | |||
ED813ED55CCBA2625E07EFEE781EB05F | |||
46ABAD934814882ABEE0BF50D4AC3B8B | |||
094F379A541CF67EBC0253ECED395D66 | |||
444DE9DEA5F12DDBF24E4D1E4EA37528 | |||
5115668FB712416C21D3723FF3BDAEDB | |||
DC8D3553E552C88916375B297D8E08A6 | |||
8F53E9DC8E6BCF07110763386518CBC3 | |||
FB669E904275D23F7339C6D7B2D20CA3 | |||
29D227B983C16EBCB4C7A5636BD9C4C8 | |||
664FF8DF44C796F86FDBA90C7E1572B6 | |||
BDDB9A6250143EA8F49B51F82A54EE9C | |||
DC6124BE95C5033D47B3EEBFC6ECB45A | |||
D60A4C6878ED4645793E28C61CDAF246 | |||
A67082CEA1D9A2E4CEB72008EFF35BA9 | |||
AC0AE062CF6E892B408E68480FE0FDA6 | |||
812D03E3E42B46CF9ADABAD20E0155A8 | |||
ED6C0D0E3BDFB2F4BC26D46E747A89DC | |||
806D838EAC97EA583D818753D9AD8C05 | |||
F4F48FD1DBFA9986ABEF0574312066FD | |||
EF1BB13E4A9155CC77DC06036253F99F | |||
0AE58534B4FE2D7832453731F99B9F66 | |||
33398207D06485A8AC9EAA9DF50C0C93 | |||
95A6109218C835B0CC60FB51EA1F7579 | |||
B5203727DFC75A6F31FD9B603FD53346 | |||
0BBE1B2C0CD339630F3EF46F704F0536 | |||
E7ECD0CB606C3A035A55C13590E0A3A6 | |||
0BEC10C074144D77055FF130009005A6 | |||
1F14CFDFC1B5FBB63134F0015A5AF9FC | |||
322D22EDF839B54E9CAD6D9D8AD08F76 | |||
63EA4FF9D70C3561E9812D133013DC5A | |||
1E7DA8E703D45762EE07D0FDA79721FD | |||
3A2475DDA7A492C514FA39E9F2552E0F | |||
556FFD8811B646D4DFCB0F363AC81B35 | |||
683D1DE0D1C04305BB64828DA69C8893 | |||
5F37A2BF02D344071BA014969E38850D | |||
530C4EEC2B29682C2C37AEBA9C021491 | |||
5A09F8B6E6CDA2CAE1CDF55BB12D3420 | |||
E9B3A75FCD2BA50734D59A6FDD6CC9FD | |||
47AEBF185E93FC593C08C953ED30D910 | |||
6F28C877104EB549013D9B52D5381CC5 | |||
</pre> | |||
* Only in psp battery chip (3000) | |||
=== Comms Keys Final (psp-3000 battery) === | |||
<pre> | |||
F5D7D4B575F08E4EFE7D7899BFEC47C5 | |||
B37A16EF557BD089865E3EEF9DFBB1FD | |||
CC699581FD89126C306F3A03D86CBEE4 | |||
A04E32BBA7139E46FF72BD2B83B89D2F | |||
495E034794931D7B8422DFEAE21B63C2 | |||
B0B809833989FAE258B95AAEF399DBD0 | |||
</pre> | |||
=== Comms Keys Stage 1 (psp-3000 battery) === | |||
<pre> | |||
B37A16EF557BD089CC699581FD89126C | |||
A04E32BBA7139E46495E034794931D7B | |||
B0B809833989FAE2F4E04313AD2EB4DB | |||
FE7D7899BFEC47C5865E3EEF9DFBB1FD | |||
306F3A03D86CBEE4FF72BD2B83B89D2F | |||
8422DFEAE21B63C258B95AAEF399DBD0 | |||
</pre> | |||
=== Obfuscation Algirithm for the psp-3000 battery firmware keys === | |||
<pre> | |||
Public Sub EncryptNec(buff() As Byte, r_key() As Variant) | |||
Dim i As Byte | |||
Dim j As Byte | |||
Dim r As Byte | |||
Dim x As Byte | |||
Dim a(15) As Byte | |||
Dim y(15) As Byte | |||
Debug.Print "entrance: " & Arr2Hex(buff) | |||
Debug.Print "key0: " & Arr2Hex(r_key(0)) | |||
'1 round - XOR with first keys | |||
For r = 0 To 9 | |||
'sub_F9F and sub_F4E | |||
a(0) = buff(0) Xor r_key(r)(0) | |||
a(1) = buff(1) Xor r_key(r)(1) | |||
a(2) = buff(2) Xor r_key(r)(2) | |||
a(3) = buff(3) Xor r_key(r)(3) | |||
a(4) = buff(5) Xor r_key(r)(5) | |||
a(5) = buff(6) Xor r_key(r)(6) ' rotate 5-7 | |||
a(6) = buff(7) Xor r_key(r)(7) | |||
a(7) = buff(4) Xor r_key(r)(4) ' rotate 5-7 | |||
a(8) = buff(10) Xor r_key(r)(10) ' rotate 8-11 | |||
a(9) = buff(11) Xor r_key(r)(11) ' rotate 9-10 | |||
a(10) = buff(8) Xor r_key(r)(8) ' rotate 9-10 | |||
a(11) = buff(9) Xor r_key(r)(9) ' rotate 8-11 | |||
a(12) = buff(15) Xor r_key(r)(15) ' rotate 12-14 | |||
a(13) = buff(12) Xor r_key(r)(12) | |||
a(14) = buff(13) Xor r_key(r)(13) ' rotate 12-14 | |||
a(15) = buff(14) Xor r_key(r)(14) | |||
'sub_FD4 | |||
For i = 0 To 15 | |||
a(i) = m_fbsub(a(i)) | |||
Next i | |||
' Debug.Print "step1: " & Arr2Hex(a) | |||
If r < 9 Then | |||
'sub_EE3 | |||
For j = 0 To 3 | |||
x = a(j) Xor a(j + 12) Xor a(j + 4) Xor a(j + 8) ' include in X | |||
y(j) = a(j) Xor x Xor LShiftByteNec(a(j), 1) Xor LShiftByteNec(a(j + 4), 1) | |||
y(j + 4) = a(j + 4) Xor x Xor LShiftByteNec(a(j + 4), 1) Xor LShiftByteNec(a(j + 8), 1) | |||
y(j + 8) = a(j + 8) Xor x Xor LShiftByteNec(a(j + 8), 1) Xor LShiftByteNec(a(j + 12), 1) | |||
y(j + 12) = a(j + 12) Xor x Xor LShiftByteNec(a(j + 12), 1) Xor LShiftByteNec(a(j), 1) | |||
Next | |||
For i = 0 To 15 | |||
buff(i) = y(i) | |||
Next i | |||
Else | |||
For i = 0 To 15 | |||
buff(i) = a(i) | |||
Next i | |||
End If | |||
'Debug.Print "_EE3-" & r & ": " & Arr2Hex(buff) | |||
Next r | |||
'last round XOR | |||
For i = 0 To 15 | |||
buff(i) = buff(i) Xor r_key(10)(i) | |||
Next i | |||
' Debug.Print "_EE3-" & r & ": " & Arr2Hex(a) | |||
End Sub | |||
Private Function LShiftByteNec(ByVal bytValue As Integer, _ | |||
&nbs | |||
p; ByVal bytShiftBits As Byte) As Byte | |||
bytValue = LShift(bytValue, bytShiftBits) | |||
If bytValue > &HFF Then | |||
LShiftByteNec = (bytValue - &HFF) Xor &H1A | |||
Else | |||
LShiftByteNec = bytValue | |||
End If | |||
End Function | |||
</pre> | </pre> | ||
== | == Spock Keys == | ||
=== | === Spock Master Key (Spock command 9) === | ||
= | private byte[] PSPSpockMasterKey = new byte[16] { | ||
0x9F, 0x46, 0xF9, 0xFC, 0xFA, 0xB2, 0xAD, 0x05, 0x69, 0xF6, 0x88, 0xD8, 0x79, 0x4B, 0x92, 0xBA | |||
}; | |||
== PSP IdStorage Keys == | |||
=== | === PSP IdStorage Master Key === | ||
//PSP Kirk commands 16 and 18 master key, also used for UMD Keys decryption | |||
private byte[] PSPIDStorageKey = new byte[16] { | |||
0x47, 0x5E, 0x09, 0xF4, 0xA2, 0x37, 0xDA, 0x9B, 0xEF, 0xFF, 0x3B, 0xC0, 0x77, 0x14, 0x3D, 0x8A | |||
}; | |||
=== | === PSP IdStorage Certificates ECDSA Public Keys === | ||
They all use Curve Type 2 (VSH). | |||
==== | ==== Section 0 ==== | ||
< | Public key: <code>4004C80BD9C8BA38221065923E324B5F0EC165ED6CFF7D9F2C420B84DFDA6E96C0AEE29927BCAF1E</code> | ||
</ | |||
==== | ==== Section 1 ==== | ||
< | Public key: <code>06485FD029853B552F7EFDD67A2DE7A1A4E25537B2459D8786426D5B27EFA5A9311CB8ABABFA0ECE</code> | ||
==== Section 2 ==== | |||
Public key: <code>3F8C34F210AEC48E1520FF2A44899E054A0DA33DF8B9754B09C0EC7E61867A5126FE6926972196F5</code> | |||
==== Section 3 ==== | |||
Public key: <code>CCB3440DC4836DD519E13B2805B30870DCAEE462136B3888651A98E02B29FA0CD34F1616F1ED5786</code> | |||
==== Section 4 ==== | |||
Public key: <code>08B336925C2B445D03A9BE51B9AABF54E4CC142EA72A23BB8060B03B71CDE0772DE82AD8931648D6</code> | |||
==== Section 5 ==== | |||
Public key: <code>4F0A2BC9987640860E22EE5D86087C9692470BDF59DC4C1F2E38F92CE7B66875B59ED10C9D84FA6A</code> | |||
<pre> | |||
public static final int[] psp_ids_certs_pub_keys = { | |||
// certificate 0 | |||
0x40, 0x04, 0xC8, 0x0B, 0xD9, 0xC8, 0xBA, 0x38, 0x22, 0x10, 0x65, 0x92, 0x3E, 0x32, 0x4B, 0x5F, 0x0E, 0xC1, 0x65, 0xED, | |||
0x6C, 0xFF, 0x7D, 0x9F, 0x2C, 0x42, 0x0B, 0x84, 0xDF, 0xDA, 0x6E, 0x96, 0xC0, 0xAE, 0xE2, 0x99, 0x27, 0xBC, 0xAF, 0x1E, | |||
// certificate 1 | |||
0x06, 0x48, 0x5F, 0xD0, 0x29, 0x85, 0x3B, 0x55, 0x2F, 0x7E, 0xFD, 0xD6, 0x7A, 0x2D, 0xE7, 0xA1, 0xA4, 0xE2, 0x55, 0x37, | |||
0xB2, 0x45, 0x9D, 0x87, 0x86, 0x42, 0x6D, 0x5B, 0x27, 0xEF, 0xA5, 0xA9, 0x31, 0x1C, 0xB8, 0xAB, 0xAB, 0xFA, 0x0E, 0xCE, | |||
// certificate 2 | |||
0x3F, 0x8C, 0x34, 0xF2, 0x10, 0xAE, 0xC4, 0x8E, 0x15, 0x20, 0xFF, 0x2A, 0x44, 0x89, 0x9E, 0x05, 0x4A, 0x0D, 0xA3, 0x3D, | |||
0xF8, 0xB9, 0x75, 0x4B, 0x09, 0xC0, 0xEC, 0x7E, 0x61, 0x86, 0x7A, 0x51, 0x26, 0xFE, 0x69, 0x26, 0x97, 0x21, 0x96, 0xF5, | |||
// certificate 3 | |||
0xCC, 0xB3, 0x44, 0x0D, 0xC4, 0x83, 0x6D, 0xD5, 0x19, 0xE1, 0x3B, 0x28, 0x05, 0xB3, 0x08, 0x70, 0xDC, 0xAE, 0xE4, 0x62, | |||
0x13, 0x6B, 0x38, 0x88, 0x65, 0x1A, 0x98, 0xE0, 0x2B, 0x29, 0xFA, 0x0C, 0xD3, 0x4F, 0x16, 0x16, 0xF1, 0xED, 0x57, 0x86, | |||
// certificate 4 | |||
0x08, 0xB3, 0x36, 0x92, 0x5C, 0x2B, 0x44, 0x5D, 0x03, 0xA9, 0xBE, 0x51, 0xB9, 0xAA, 0xBF, 0x54, 0xE4, 0xCC, 0x14, 0x2E, | |||
0xA7, 0x2A, 0x23, 0xBB, 0x80, 0x60, 0xB0, 0x3B, 0x71, 0xCD, 0xE0, 0x77, 0x2D, 0xE8, 0x2A, 0xD8, 0x93, 0x16, 0x48, 0xD6, | |||
// certificate 5 | |||
0x4F, 0x0A, 0x2B, 0xC9, 0x98, 0x76, 0x40, 0x86, 0x0E, 0x22, 0xEE, 0x5D, 0x86, 0x08, 0x7C, 0x96, 0x92, 0x47, 0x0B, 0xDF, | |||
0x59, 0xDC, 0x4C, 0x1F, 0x2E, 0x38, 0xF9, 0x2C, 0xE7, 0xB6, 0x68, 0x75, 0xB5, 0x9E, 0xD1, 0x0C, 0x9D, 0x84, 0xFA, 0x6A, | |||
}; | |||
<pre> | |||
== PSP Save Data Hash Keys == | |||
private byte[] PSPSDHashKey1 = new byte[16] { 0x40, 0xE6, 0x53, 0x3F, 0x05, 0x11, 0x3A, 0x4E, 0xA1, 0x4B, 0xDA, 0xD6, 0x72, 0x7C, 0x53, 0x4C }; | |||
private byte[] PSPSDHashKey2 = new byte[16] { 0xFA, 0xAA, 0x50, 0xEC, 0x2F, 0xDE, 0x54, 0x93, 0xAD, 0x14, 0xB2, 0xCE, 0xA5, 0x30, 0x05, 0xDF }; | |||
private byte[] PSPSDHashKey3 = new byte[16] { 0x36, 0xA5, 0x3E, 0xAC, 0xC5, 0x26, 0x9E, 0xA3, 0x83, 0xD9, 0xEC, 0x25, 0x6C, 0x48, 0x48, 0x72 }; | |||
private byte[] PSPSDHashKey4 = new byte[16] { 0xD8, 0xC0, 0xB0, 0xF3, 0x3E, 0x6B, 0x76, 0x85, 0xFD, 0xFB, 0x4D, 0x7D, 0x45, 0x1E, 0x92, 0x03 }; | |||
private byte[] PSPSDHashKey5 = new byte[16] { 0xCB, 0x15, 0xF4, 0x07, 0xF9, 0x6A, 0x52, 0x3C, 0x04, 0xB9, 0xB2, 0xEE, 0x5C, 0x53, 0xFA, 0x86 }; | |||
private byte[] PSPSDHashKey6 = new byte[16] { 0x70, 0x44, 0xA3, 0xAE, 0xEF, 0x5D, 0xA5, 0xF2, 0x85, 0x7F, 0xF2, 0xD6, 0x94, 0xF5, 0x36, 0x3B }; | |||
private byte[] PSPSDHashKey7 = new byte[16] { 0xEC, 0x6D, 0x29, 0x59, 0x26, 0x35, 0xA5, 0x7F, 0x97, 0x2A, 0x0D, 0xBC, 0xA3, 0x26, 0x33, 0x00 }; | |||
== PSP AMCTRL Hash Keys == | |||
private byte[] PSPAMHashKey1 = new byte[16] { 0x9C, 0x48, 0xB6, 0x28, 0x40, 0xE6, 0x53, 0x3F, 0x05, 0x11, 0x3A, 0x4E, 0x65, 0xE6, 0x3A, 0x64 }; | |||
private byte[] PSPAMHashKey2 = new byte[16] { 0x70, 0xB4, 0x7B, 0xC0, 0xA1, 0x4B, 0xDA, 0xD6, 0xE0, 0x10, 0x14, 0xED, 0x72, 0x7C, 0x53, 0x4C }; | |||
private byte[] PSPAMHashKey3 = new byte[16] { 0xE3, 0x50, 0xED, 0x1D, 0x91, 0x0A, 0x1F, 0xD0, 0x29, 0xBB, 0x1C, 0x3E, 0xF3, 0x40, 0x77, 0xFB }; | |||
private byte[] PSPAMHashKey4 = new byte[16] { 0x13, 0x5F, 0xA4, 0x7C, 0xAB, 0x39, 0x5B, 0xA4, 0x76, 0xB8, 0xCC, 0xA9, 0x8F, 0x3A, 0x04, 0x45 }; | |||
private byte[] PSPAMHashKey5 = new byte[16] { 0x67, 0x8D, 0x7F, 0xA3, 0x2A, 0x9C, 0xA0, 0xD1, 0x50, 0x8A, 0xD8, 0x38, 0x5E, 0x4B, 0x01, 0x7E }; | |||
== PSP Kirk command 1 AESCBC128-CMAC Key == | |||
private byte[] kirk_command_1_aes128cmac_key = new byte[16] { | |||
0x98, 0xC9, 0x40, 0x97, 0x5C, 0x1D, 0x10, 0xE8, 0x7F, 0xE6, 0x0E, 0xA3, 0xFD, 0x03, 0xA8, 0xBA | |||
}; | |||
== | == PSP Kirk command 1 ECDSA Curve == | ||
private byte[][] kirk_command_1_ecdsa_curve = new byte[6][] { | |||
new byte[20] { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0x00, 0x00, 0x00, 0x01, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }, | |||
new byte[20] { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0x00, 0x00, 0x00, 0x01, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFC }, | |||
new byte[20] { 0x65, 0xD1, 0x48, 0x8C, 0x03, 0x59, 0xE2, 0x34, 0xAD, 0xC9, 0x5B, 0xD3, 0x90, 0x80, 0x14, 0xBD, 0x91, 0xA5, 0x25, 0xF9 }, | |||
new byte[20] { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0x00, 0x01, 0xB5, 0xC6, 0x17, 0xF2, 0x90, 0xEA, 0xE1, 0xDB, 0xAD, 0x8F }, | |||
new byte[20] { 0x22, 0x59, 0xAC, 0xEE, 0x15, 0x48, 0x9C, 0xB0, 0x96, 0xA8, 0x82, 0xF0, 0xAE, 0x1C, 0xF9, 0xFD, 0x8E, 0xE5, 0xF8, 0xFA }, | |||
new byte[20] { 0x60, 0x43, 0x58, 0x45, 0x6D, 0x0A, 0x1C, 0xB2, 0x90, 0x8D, 0xE9, 0x0F, 0x27, 0xD7, 0x5C, 0x82, 0xBE, 0xC1, 0x08, 0xC0 }, | |||
}; | |||
== PSP Kirk command 1 ECDSA Private Key == | |||
private byte[] kirk_command_1_ecdsa_private_key = new byte[20] = { | |||
0xF3, 0x92, 0xE2, 0x64, 0x90, 0xB8, 0x0F, 0xD8, 0x89, 0xF2, 0xD9, 0x72, 0x2C, 0x1F, 0x34, 0xD7, 0x27, 0x4F, 0x98, 0x3D | |||
}; | |||
== | == PSP Kirk command 1 ECDSA Public Key == | ||
private byte[] kirk_command_1_ecdsa_pub_key_x = new byte[20] { 0xED, 0x9C, 0xE5, 0x82, 0x34, 0xE6, 0x1A, 0x53, 0xC6, 0x85, 0xD6, 0x4D, 0x51, 0xD0, 0x23, 0x6B, 0xC3, 0xB5, 0xD4, 0xB9 }; | |||
private byte[] kirk_command_1_ecdsa_pub_key_y = new byte[20] { 0x04, 0x9D, 0xF1, 0xA0, 0x75, 0xC0, 0xE0, 0x4F, 0xB3, 0x44, 0x85, 0x8B, 0x61, 0xB7, 0x9B, 0x69, 0xA6, 0x3D, 0x2C, 0x39 }; | |||
private byte[] kirk_command_1_ecdsa_ec_m_header = new byte[20] { 0x7D, 0x7E, 0x46, 0x85, 0x4D, 0x07, 0xFA, 0x0B, 0xC6, 0xE8, 0xED, 0x62, 0x99, 0x89, 0x26, 0x14, 0x39, 0x5F, 0xEA, 0xFC }; | |||
private byte[] kirk_command_1_ecdsa_ec_r_header = new byte[20] { 0x66, 0x4f, 0xe1, 0xf2, 0xe9, 0xd6, 0x63, 0x36, 0xf7, 0x33, 0x0b, 0xca, 0xb9, 0x55, 0x6d, 0xb6, 0xeb, 0xe8, 0x05, 0xdc }; | |||
private byte[] kirk_command_1_ecdsa_ec_m_data = new byte[20] { 0x15, 0xee, 0x16, 0x24, 0x12, 0x09, 0x58, 0x16, 0x0f, 0x8b, 0x1a, 0x21, 0x33, 0x7a, 0x38, 0xf8, 0x29, 0xf7, 0x2e, 0x58 }; | |||
private byte[] kirk_command_1_ecdsa_ec_r_data = new byte[20] { 0xcd, 0xe3, 0x88, 0xa6, 0x3c, 0x1d, 0x57, 0xdc, 0x5e, 0x94, 0xee, 0xac, 0x2e, 0x6c, 0x9f, 0x2e, 0x81, 0xc7, 0x1c, 0x58 }; | |||
== PSP Applications ECDSA Curve == | |||
private byte[][] psp_applications_ecdsa_curve = new byte[6][] { | |||
new byte[20] { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0x00, 0x00, 0x00, 0x01, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }, | |||
new byte[20] { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0x00, 0x00, 0x00, 0x01, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFC }, | |||
new byte[20] { 0xA6, 0x8B, 0xED, 0xC3, 0x34, 0x18, 0x02, 0x9C, 0x1D, 0x3C, 0xE3, 0x3B, 0x9A, 0x32, 0x1F, 0xCC, 0xBB, 0x9E, 0x0F, 0x0B }, | |||
new byte[20] { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFE, 0xFF, 0xFF, 0xB5, 0xAE, 0x3C, 0x52, 0x3E, 0x63, 0x94, 0x4F, 0x21, 0x27 }, | |||
new byte[20] { 0x12, 0x8E, 0xC4, 0x25, 0x64, 0x87, 0xFD, 0x8F, 0xDF, 0x64, 0xE2, 0x43, 0x7B, 0xC0, 0xA1, 0xF6, 0xD5, 0xAF, 0xDE, 0x2C }, | |||
new byte[20] { 0x59, 0x58, 0x55, 0x7E, 0xB1, 0xDB, 0x00, 0x12, 0x60, 0x42, 0x55, 0x24, 0xDB, 0xC3, 0x79, 0xD5, 0xAC, 0x5F, 0x4A, 0xDF }, | |||
}; | |||
== PSP EDATA ECDSA Private Key == | |||
private byte[] psp_edata_ecdsa_private_key = new byte[20] { | |||
0xE5, 0xC4, 0xD0, 0xA8, 0x24, 0x9A, 0x6F, 0x27, 0xE5, 0xE0, 0xC9, 0xD5, 0x34, 0xF4, 0xDA, 0x15, 0x22, 0x3F, 0x42, 0xAD | |||
}; | |||
== PSP EDATA ECDSA Public Key == | |||
private byte[] psp_edata_ecdsa_public_key = new byte[20] { | |||
0x1F, 0x07, 0x2B, 0xCC, 0xC1, 0x62, 0xF2, 0xCF, 0xAE, 0xA0, 0xE7, 0xF4, 0xCD, 0xFD, 0x9C, 0xAE, 0xC6, 0xC4, 0x55, 0x21, | |||
0x53, 0x01, 0xF4, 0xE3, 0x70, 0xC3, 0xED, 0xE2, 0xD4, 0xF5, 0xDB, 0xC3, 0xA7, 0xDE, 0x8C, 0xAA, 0xE8, 0xAD, 0x5B, 0x7D | |||
}; | |||
== PSP Kirk commands 4/7 AES128CBC Keys == | |||
<pre> | |||
2C92E5902B86C106B72EEA6CD4EC7248 | |||
058DC80B33A5BF9D5698FAE0D3715E1F | |||
B813C35EC64441E3DC3C16F5B45E6484 | |||
9802C4E6EC9E9E2FFC634CE42FBB4668 | |||
99244CD258F51BCBB0619CA73830075F | |||
0225D7BA63ECB94A9D237601B3F6AC17 | |||
6099F28170560E5F747CB520C0CDC23C | |||
76368B438F77D87EFE5FB6115939885C | |||
14A115EB434A1BA4905E03B617A15C04 | |||
E65803D9A71AA87F059D229DAF5453D0 | |||
BA3480B428A7CA5F216412F70FBB7323 | |||
72AD35AC9AC3130A778CB19D88550B0C | |||
8485C848750843BC9B9AECA79C7F6018 | |||
B5B16EDE23A97B0EA17CDBA2DCDEC46E | |||
C871FDB3BCC5D2F2E2D7729DDF826882 | |||
0ABB336C96D4CDD8CB5F4BE0BADB9E03 | |||
32295BD5EAF7A34216C88E48FF50D371 | |||
46F25E8E4D2AA540730BC46E47EE6F0A | |||
5DC71139D01938BC027FDDDCB0837D9D | |||
51DD65F071A4E5EA6AAF12194129B8F4 | |||
03763C6865C69B0FFE8FD8EEA43616A0 | |||
7D50B85CAF6769F0E54AA8098B0EBE1C | |||
72684B32AC3B332F2A7AFC9E14D56F6B | |||
201D31964AD99FBF32D5D61C491BD9FC | |||
F8D84463D610D12A448E9690A6BB0BAD | |||
5CD4057FA13060440AD9B6745F244F4E | |||
F48AD678599C22C1D411933DF845B893 | |||
CAE7D287A2ECC1CD94542B5E1D9488B2 | |||
DE26D37A39956C2AD8C3A6AF21EBB301 | |||
7CB68B4DA38D1DD932679CA99FFB2852 | |||
A0B556B469AB368F36DEC9092ECB41B1 | |||
939DE19B725FEEE2452ABC1706D14769 | |||
A4A4E621382EF1AF7B177AE842AD0031 | |||
C37F13E8CF84DB34747BC3A0F19D3A73 | |||
2BF7838AD898E95FA5F901DA61FE35BB | |||
C704621E714A66EA62E04B203DB8C2E5 | |||
C933859AAB00CDCE4D8B8E9F3DE6C00F | |||
1842561F2B5F34E3513EB78977431A65 | |||
DCB0A0065A50A14E59AC973F1758A3A3 | |||
</pre> | C4DBAE83E29CF254A3DD374E807BF425 | ||
BFAEEB498265C57C64B8C17E19064409 | |||
797CECC3B3EE0AC03BD8E6C1E0A8B1A4 | |||
7534FE0BD6D0C28D68D4E02AE7D5D155 | |||
FAB35326974F4EDFE4C3A814C32F0F88 | |||
EC97B386B433C6BF4E539D95EBB979E4 | |||
B320A204CF480629B5DD8EFC98D4177B | |||
5DFC0D4F2C39DA684A3374ED4958A73A | |||
D75A5422CED9A3D62B557D8DE8BEC7EC | |||
6B4AEE4345AE7007CF8DCF4E4AE93CFA | |||
2B522F664C2D114CFE61318C56784EA6 | |||
3AA34E44C66FAF7BFAE55327EFCFCC24 | |||
2B5C78BFC38E499D41C33C5C7B2796CE | |||
F37EEAD2C0C8231DA99BFA495DB7081B | |||
708D4E6FD1F66F1D1E1FCB02F9B39926 | |||
0F6716E180699C51FCC7AD6E4FB846C9 | |||
560A494A844C8ED982EE0B6DC57D208D | |||
12468D7E1C42209BBA5426835EB03303 | |||
C43BB6D653EE67493EA95FBC0CED6F8A | |||
2CC3CF8C2878A5A663E2AF2D715E86BA | |||
833DA70CED6A2012D196E6FE5C4D37C5 | |||
C743D06742EE90B8CA75503520ADBCCE | |||
8AE3663F8D9E82A1EDE68C9CE8256DAA | |||
7FC96F0BB1485CA55DD364B77AF5E4EA | |||
91B765788BCB8BD402ED553A6662D0AD | |||
2824F9101B8D0F7B6EB263B5B55B2EBB | |||
30E2575DE0A249CEE8CF2B5E4D9F52C7 | |||
5EE50439623202FA85393F72BB77FD1A | |||
F88174B1BDE9BFDD45E2F55589CF46AB | |||
7DF49265E3FAD678D6FE78ADBB3DFB63 | |||
747FD62DC7A1CA96E27ACEFFAA723FF7 | |||
1E58EBD065BBF168C5BDF746BA7BE100 | |||
24347DAF5E4B35727A52276BA05474DB | |||
09B1C705C35F536677C0EB3677DF8307 | |||
CCBE615C05A20033378E5964A7DD703D | |||
0D4750BBFCB0028130E184DEA8D48413 | |||
0CFD679AF9B4724FD78DD6E99642288B | |||
7AD31A8B4BEFC2C2B39901A9FE76B987 | |||
BE787817C7F16F1AE0EF3BDE4CC2D786 | |||
7CD8B891910A4314D0533DD84C45BE16 | |||
32722C8807CF357D4A2F511944AE68DA | |||
7E6BBFF6F687B898EEB51B3216E46E5D | |||
08EA5A8349B59DB53E0779B19A59A354 | |||
F31281BFE69F51D164082521FFBB2261 | |||
AFFE8EB13DD17ED80A61241C959256B6 | |||
92CDB4C25BF2355A2309E819C9144235 | |||
E1C65B226BE1DA02BA18FA21349EF96D | |||
14EC76CE97F38A0A34506C539A5C9AB4 | |||
1C9BC490E3066481FA59FDB600BB2870 | |||
43A5CACC0D6C2D3F2BD989676B3F7F57 | |||
00EFFD1808A405893C38FB2572706106 | |||
EEAF49E009879BEFAAD6326A3213C429 | |||
8D26B90F431DBB08DB1DDAC5B52C92ED | |||
577C3060AE6EBEAE3AAB1819C571680B | |||
115A5D20D53A8DD39CC5AF410F0F186F | |||
0D4D51AB2379BF803ABFB90E75FC14BF | |||
9993DA3E7D2E5B15F252A4E66BB85A98 | |||
F42830A5FB0D8D760EA671C22BDE669D | |||
FB5FEB7FC7DCDD693701979B29035C47 | |||
02326AE7D396CE7F1C419DD65207ED09 | |||
9C9B1372F8C640CF1C62F5D592DDB582 | |||
03B302E85FF381B13B8DAA2A90FF5E61 | |||
BCD7F9D32FACF847C0FB4D2F309ABDA6 | |||
F55596E97FAF867FACB33AE69C8B6F93 | |||
EE297093F94E445944171F8E86E170FC | |||
E434520CF088CFC8CD781B6CCF8C48C4 | |||
C1BF66818EF953F2E1266B6F550CC9CD | |||
560FFF8F3C9649144516F1BCBFCEA30C | |||
2408DC753760A29F0554B5F243857399 | |||
DDD5B56A59C55AE83B9667C75C2AE2DC | |||
AA686772E02D44D5CDBB6504BCD5BF4E | |||
1F17F014E777A2FE4B136B56CD7EF7E9 | |||
C93548CF558D7503896B2EEB618CA902 | |||
DE34C541E7CA86E8BEA7C31CECE4360F | |||
DDE5FF551B74F6F4E016D7AB22311B6A | |||
B0E93521333FD7BAB4762CCB4D8008D8 | |||
381469C4C3F91B9633638E4D5F3DF029 | |||
FA486AD98E6716EF6AB087F589457F2A | |||
321A091250148A3E963DEA025932E18F | |||
4B00BE29BCB02864CEFD43A96FD95CED | |||
577DC4FF0244E28091F4CA0A7569FDA8 | |||
835336C61803E43E4EB30F6B6E799B7A | |||
5C9265FD7B596AA37A2F509D85E927F8 | |||
9A39FB89DF55B2601424CEA6D9650A9D | |||
8B75BE91A8C75AD2D7A594A01CBB9591 | |||
95C21B8D05ACF5EC5AEE77812395C4D7 | |||
B9A461643633FA5D9488E2D3281E01A2 | |||
B8B084FB9F4CFAF730FE7325A2AB897D | |||
5F8C179FC1B21DF1F6367A9CF7D3D47C | |||
</pre> | |||
Table with each key indexed: | |||
<pre> | <pre> | ||
u8 kirk7_key00[] = {0x2C, 0x92, 0xE5, 0x90, 0x2B, 0x86, 0xC1, 0x06, 0xB7, 0x2E, 0xEA, 0x6C, 0xD4, 0xEC, 0x72, 0x48}; | |||
u8 kirk7_key01[] = {0x05, 0x8D, 0xC8, 0x0B, 0x33, 0xA5, 0xBF, 0x9D, 0x56, 0x98, 0xFA, 0xE0, 0xD3, 0x71, 0x5E, 0x1F}; | |||
u8 kirk7_key02[] = {0xB8, 0x13, 0xC3, 0x5E, 0xC6, 0x44, 0x41, 0xE3, 0xDC, 0x3C, 0x16, 0xF5, 0xB4, 0x5E, 0x64, 0x84}; // New from PS3 | |||
u8 kirk7_key03[] = {0x98, 0x02, 0xC4, 0xE6, 0xEC, 0x9E, 0x9E, 0x2F, 0xFC, 0x63, 0x4C, 0xE4, 0x2F, 0xBB, 0x46, 0x68}; | |||
u8 kirk7_key04[] = {0x99, 0x24, 0x4C, 0xD2, 0x58, 0xF5, 0x1B, 0xCB, 0xB0, 0x61, 0x9C, 0xA7, 0x38, 0x30, 0x07, 0x5F}; | |||
u8 kirk7_key05[] = {0x02, 0x25, 0xD7, 0xBA, 0x63, 0xEC, 0xB9, 0x4A, 0x9D, 0x23, 0x76, 0x01, 0xB3, 0xF6, 0xAC, 0x17}; | |||
u8 kirk7_key06[] = {0x60, 0x99, 0xF2, 0x81, 0x70, 0x56, 0x0E, 0x5F, 0x74, 0x7C, 0xB5, 0x20, 0xC0, 0xCD, 0xC2, 0x3C}; // New from PS3 | |||
u8 kirk7_key07[] = {0x76, 0x36, 0x8B, 0x43, 0x8F, 0x77, 0xD8, 0x7E, 0xFE, 0x5F, 0xB6, 0x11, 0x59, 0x39, 0x88, 0x5C}; | |||
u8 kirk7_key08[] = {0x14, 0xA1, 0x15, 0xEB, 0x43, 0x4A, 0x1B, 0xA4, 0x90, 0x5E, 0x03, 0xB6, 0x17, 0xA1, 0x5C, 0x04}; | |||
u8 kirk7_key09[] = {0xE6, 0x58, 0x03, 0xD9, 0xA7, 0x1A, 0xA8, 0x7F, 0x05, 0x9D, 0x22, 0x9D, 0xAF, 0x54, 0x53, 0xD0}; | |||
u8 kirk7_key0A[] = {0xBA, 0x34, 0x80, 0xB4, 0x28, 0xA7, 0xCA, 0x5F, 0x21, 0x64, 0x12, 0xF7, 0x0F, 0xBB, 0x73, 0x23}; | |||
u8 kirk7_key0B[] = {0x72, 0xAD, 0x35, 0xAC, 0x9A, 0xC3, 0x13, 0x0A, 0x77, 0x8C, 0xB1, 0x9D, 0x88, 0x55, 0x0B, 0x0C}; | |||
u8 kirk7_key0C[] = {0x84, 0x85, 0xC8, 0x48, 0x75, 0x08, 0x43, 0xBC, 0x9B, 0x9A, 0xEC, 0xA7, 0x9C, 0x7F, 0x60, 0x18}; | |||
u8 kirk7_key0D[] = {0xB5, 0xB1, 0x6E, 0xDE, 0x23, 0xA9, 0x7B, 0x0E, 0xA1, 0x7C, 0xDB, 0xA2, 0xDC, 0xDE, 0xC4, 0x6E}; | |||
u8 kirk7_key0E[] = {0xC8, 0x71, 0xFD, 0xB3, 0xBC, 0xC5, 0xD2, 0xF2, 0xE2, 0xD7, 0x72, 0x9D, 0xDF, 0x82, 0x68, 0x82}; | |||
u8 kirk7_key0F[] = {0x0A, 0xBB, 0x33, 0x6C, 0x96, 0xD4, 0xCD, 0xD8, 0xCB, 0x5F, 0x4B, 0xE0, 0xBA, 0xDB, 0x9E, 0x03}; | |||
u8 kirk7_key10[] = {0x32, 0x29, 0x5B, 0xD5, 0xEA, 0xF7, 0xA3, 0x42, 0x16, 0xC8, 0x8E, 0x48, 0xFF, 0x50, 0xD3, 0x71}; | |||
u8 kirk7_key11[] = {0x46, 0xF2, 0x5E, 0x8E, 0x4D, 0x2A, 0xA5, 0x40, 0x73, 0x0B, 0xC4, 0x6E, 0x47, 0xEE, 0x6F, 0x0A}; | |||
u8 kirk7_key12[] = {0x5D, 0xC7, 0x11, 0x39, 0xD0, 0x19, 0x38, 0xBC, 0x02, 0x7F, 0xDD, 0xDC, 0xB0, 0x83, 0x7D, 0x9D}; | |||
u8 kirk7_key13[] = {0x51, 0xDD, 0x65, 0xF0, 0x71, 0xA4, 0xE5, 0xEA, 0x6A, 0xAF, 0x12, 0x19, 0x41, 0x29, 0xB8, 0xF4}; | |||
u8 kirk7_key14[] = {0x03, 0x76, 0x3C, 0x68, 0x65, 0xC6, 0x9B, 0x0F, 0xFE, 0x8F, 0xD8, 0xEE, 0xA4, 0x36, 0x16, 0xA0}; | |||
u8 kirk7_key15[] = {0x7D, 0x50, 0xB8, 0x5C, 0xAF, 0x67, 0x69, 0xF0, 0xE5, 0x4A, 0xA8, 0x09, 0x8B, 0x0E, 0xBE, 0x1C}; | |||
u8 kirk7_key16[] = {0x72, 0x68, 0x4B, 0x32, 0xAC, 0x3B, 0x33, 0x2F, 0x2A, 0x7A, 0xFC, 0x9E, 0x14, 0xD5, 0x6F, 0x6B}; | |||
u8 kirk7_key17[] = {0x20, 0x1D, 0x31, 0x96, 0x4A, 0xD9, 0x9F, 0xBF, 0x32, 0xD5, 0xD6, 0x1C, 0x49, 0x1B, 0xD9, 0xFC}; | |||
u8 kirk7_key18[] = {0xF8, 0xD8, 0x44, 0x63, 0xD6, 0x10, 0xD1, 0x2A, 0x44, 0x8E, 0x96, 0x90, 0xA6, 0xBB, 0x0B, 0xAD}; | |||
u8 kirk7_key19[] = {0x5C, 0xD4, 0x05, 0x7F, 0xA1, 0x30, 0x60, 0x44, 0x0A, 0xD9, 0xB6, 0x74, 0x5F, 0x24, 0x4F, 0x4E}; | |||
u8 kirk7_key1A[] = {0xF4, 0x8A, 0xD6, 0x78, 0x59, 0x9C, 0x22, 0xC1, 0xD4, 0x11, 0x93, 0x3D, 0xF8, 0x45, 0xB8, 0x93}; | |||
u8 kirk7_key1B[] = {0xCA, 0xE7, 0xD2, 0x87, 0xA2, 0xEC, 0xC1, 0xCD, 0x94, 0x54, 0x2B, 0x5E, 0x1D, 0x94, 0x88, 0xB2}; | |||
u8 kirk7_key1C[] = {0xDE, 0x26, 0xD3, 0x7A, 0x39, 0x95, 0x6C, 0x2A, 0xD8, 0xC3, 0xA6, 0xAF, 0x21, 0xEB, 0xB3, 0x01}; | |||
u8 kirk7_key1D[] = {0x7C, 0xB6, 0x8B, 0x4D, 0xA3, 0x8D, 0x1D, 0xD9, 0x32, 0x67, 0x9C, 0xA9, 0x9F, 0xFB, 0x28, 0x52}; | |||
u8 kirk7_key1E[] = {0xA0, 0xB5, 0x56, 0xB4, 0x69, 0xAB, 0x36, 0x8F, 0x36, 0xDE, 0xC9, 0x09, 0x2E, 0xCB, 0x41, 0xB1}; | |||
u8 kirk7_key1F[] = {0x93, 0x9D, 0xE1, 0x9B, 0x72, 0x5F, 0xEE, 0xE2, 0x45, 0x2A, 0xBC, 0x17, 0x06, 0xD1, 0x47, 0x69}; | |||
u8 kirk7_key20[] = {0xA4, 0xA4, 0xE6, 0x21, 0x38, 0x2E, 0xF1, 0xAF, 0x7B, 0x17, 0x7A, 0xE8, 0x42, 0xAD, 0x00, 0x31}; | |||
u8 kirk7_key21[] = {0xC3, 0x7F, 0x13, 0xE8, 0xCF, 0x84, 0xDB, 0x34, 0x74, 0x7B, 0xC3, 0xA0, 0xF1, 0x9D, 0x3A, 0x73}; | |||
u8 kirk7_key22[] = {0x2B, 0xF7, 0x83, 0x8A, 0xD8, 0x98, 0xE9, 0x5F, 0xA5, 0xF9, 0x01, 0xDA, 0x61, 0xFE, 0x35, 0xBB}; | |||
u8 kirk7_key23[] = {0xC7, 0x04, 0x62, 0x1E, 0x71, 0x4A, 0x66, 0xEA, 0x62, 0xE0, 0x4B, 0x20, 0x3D, 0xB8, 0xC2, 0xE5}; | |||
u8 kirk7_key24[] = {0xC9, 0x33, 0x85, 0x9A, 0xAB, 0x00, 0xCD, 0xCE, 0x4D, 0x8B, 0x8E, 0x9F, 0x3D, 0xE6, 0xC0, 0x0F}; | |||
u8 kirk7_key25[] = {0x18, 0x42, 0x56, 0x1F, 0x2B, 0x5F, 0x34, 0xE3, 0x51, 0x3E, 0xB7, 0x89, 0x77, 0x43, 0x1A, 0x65}; | |||
u8 kirk7_key26[] = {0xDC, 0xB0, 0xA0, 0x06, 0x5A, 0x50, 0xA1, 0x4E, 0x59, 0xAC, 0x97, 0x3F, 0x17, 0x58, 0xA3, 0xA3}; | |||
u8 kirk7_key27[] = {0xC4, 0xDB, 0xAE, 0x83, 0xE2, 0x9C, 0xF2, 0x54, 0xA3, 0xDD, 0x37, 0x4E, 0x80, 0x7B, 0xF4, 0x25}; | |||
u8 kirk7_key28[] = {0xBF, 0xAE, 0xEB, 0x49, 0x82, 0x65, 0xC5, 0x7C, 0x64, 0xB8, 0xC1, 0x7E, 0x19, 0x06, 0x44, 0x09}; | |||
u8 kirk7_key29[] = {0x79, 0x7C, 0xEC, 0xC3, 0xB3, 0xEE, 0x0A, 0xC0, 0x3B, 0xD8, 0xE6, 0xC1, 0xE0, 0xA8, 0xB1, 0xA4}; | |||
u8 kirk7_key2A[] = {0x75, 0x34, 0xFE, 0x0B, 0xD6, 0xD0, 0xC2, 0x8D, 0x68, 0xD4, 0xE0, 0x2A, 0xE7, 0xD5, 0xD1, 0x55}; | |||
u8 kirk7_key2B[] = {0xFA, 0xB3, 0x53, 0x26, 0x97, 0x4F, 0x4E, 0xDF, 0xE4, 0xC3, 0xA8, 0x14, 0xC3, 0x2F, 0x0F, 0x88}; | |||
u8 kirk7_key2C[] = {0xEC, 0x97, 0xB3, 0x86, 0xB4, 0x33, 0xC6, 0xBF, 0x4E, 0x53, 0x9D, 0x95, 0xEB, 0xB9, 0x79, 0xE4}; | |||
u8 kirk7_key2D[] = {0xB3, 0x20, 0xA2, 0x04, 0xCF, 0x48, 0x06, 0x29, 0xB5, 0xDD, 0x8E, 0xFC, 0x98, 0xD4, 0x17, 0x7B}; | |||
u8 kirk7_key2E[] = {0x5D, 0xFC, 0x0D, 0x4F, 0x2C, 0x39, 0xDA, 0x68, 0x4A, 0x33, 0x74, 0xED, 0x49, 0x58, 0xA7, 0x3A}; | |||
u8 kirk7_key2F[] = {0xD7, 0x5A, 0x54, 0x22, 0xCE, 0xD9, 0xA3, 0xD6, 0x2B, 0x55, 0x7D, 0x8D, 0xE8, 0xBE, 0xC7, 0xEC}; | |||
u8 kirk7_key30[] = {0x6B, 0x4A, 0xEE, 0x43, 0x45, 0xAE, 0x70, 0x07, 0xCF, 0x8D, 0xCF, 0x4E, 0x4A, 0xE9, 0x3C, 0xFA}; | |||
u8 kirk7_key31[] = {0x2B, 0x52, 0x2F, 0x66, 0x4C, 0x2D, 0x11, 0x4C, 0xFE, 0x61, 0x31, 0x8C, 0x56, 0x78, 0x4E, 0xA6}; | |||
u8 kirk7_key32[] = {0x3A, 0xA3, 0x4E, 0x44, 0xC6, 0x6F, 0xAF, 0x7B, 0xFA, 0xE5, 0x53, 0x27, 0xEF, 0xCF, 0xCC, 0x24}; | |||
u8 kirk7_key33[] = {0x2B, 0x5C, 0x78, 0xBF, 0xC3, 0x8E, 0x49, 0x9D, 0x41, 0xC3, 0x3C, 0x5C, 0x7B, 0x27, 0x96, 0xCE}; | |||
u8 kirk7_key34[] = {0xF3, 0x7E, 0xEA, 0xD2, 0xC0, 0xC8, 0x23, 0x1D, 0xA9, 0x9B, 0xFA, 0x49, 0x5D, 0xB7, 0x08, 0x1B}; | |||
u8 kirk7_key35[] = {0x70, 0x8D, 0x4E, 0x6F, 0xD1, 0xF6, 0x6F, 0x1D, 0x1E, 0x1F, 0xCB, 0x02, 0xF9, 0xB3, 0x99, 0x26}; | |||
u8 kirk7_key36[] = {0x0F, 0x67, 0x16, 0xE1, 0x80, 0x69, 0x9C, 0x51, 0xFC, 0xC7, 0xAD, 0x6E, 0x4F, 0xB8, 0x46, 0xC9}; | |||
u8 kirk7_key37[] = {0x56, 0x0A, 0x49, 0x4A, 0x84, 0x4C, 0x8E, 0xD9, 0x82, 0xEE, 0x0B, 0x6D, 0xC5, 0x7D, 0x20, 0x8D}; | |||
u8 kirk7_key38[] = {0x12, 0x46, 0x8D, 0x7E, 0x1C, 0x42, 0x20, 0x9B, 0xBA, 0x54, 0x26, 0x83, 0x5E, 0xB0, 0x33, 0x03}; | |||
u8 kirk7_key39[] = {0xC4, 0x3B, 0xB6, 0xD6, 0x53, 0xEE, 0x67, 0x49, 0x3E, 0xA9, 0x5F, 0xBC, 0x0C, 0xED, 0x6F, 0x8A}; | |||
u8 kirk7_key3A[] = {0x2C, 0xC3, 0xCF, 0x8C, 0x28, 0x78, 0xA5, 0xA6, 0x63, 0xE2, 0xAF, 0x2D, 0x71, 0x5E, 0x86, 0xBA}; | |||
u8 kirk7_key3B[] = {0x83, 0x3D, 0xA7, 0x0C, 0xED, 0x6A, 0x20, 0x12, 0xD1, 0x96, 0xE6, 0xFE, 0x5C, 0x4D, 0x37, 0xC5}; | |||
u8 kirk7_key3C[] = {0xC7, 0x43, 0xD0, 0x67, 0x42, 0xEE, 0x90, 0xB8, 0xCA, 0x75, 0x50, 0x35, 0x20, 0xAD, 0xBC, 0xCE}; | |||
u8 kirk7_key3D[] = {0x8A, 0xE3, 0x66, 0x3F, 0x8D, 0x9E, 0x82, 0xA1, 0xED, 0xE6, 0x8C, 0x9C, 0xE8, 0x25, 0x6D, 0xAA}; | |||
u8 kirk7_key3E[] = {0x7F, 0xC9, 0x6F, 0x0B, 0xB1, 0x48, 0x5C, 0xA5, 0x5D, 0xD3, 0x64, 0xB7, 0x7A, 0xF5, 0xE4, 0xEA}; | |||
u8 kirk7_key3F[] = {0x91, 0xB7, 0x65, 0x78, 0x8B, 0xCB, 0x8B, 0xD4, 0x02, 0xED, 0x55, 0x3A, 0x66, 0x62, 0xD0, 0xAD}; | |||
u8 kirk7_key40[] = {0x28, 0x24, 0xF9, 0x10, 0x1B, 0x8D, 0x0F, 0x7B, 0x6E, 0xB2, 0x63, 0xB5, 0xB5, 0x5B, 0x2E, 0xBB}; | |||
u8 kirk7_key41[] = {0x30, 0xE2, 0x57, 0x5D, 0xE0, 0xA2, 0x49, 0xCE, 0xE8, 0xCF, 0x2B, 0x5E, 0x4D, 0x9F, 0x52, 0xC7}; | |||
u8 kirk7_key42[] = {0x5E, 0xE5, 0x04, 0x39, 0x62, 0x32, 0x02, 0xFA, 0x85, 0x39, 0x3F, 0x72, 0xBB, 0x77, 0xFD, 0x1A}; | |||
u8 kirk7_key43[] = {0xF8, 0x81, 0x74, 0xB1, 0xBD, 0xE9, 0xBF, 0xDD, 0x45, 0xE2, 0xF5, 0x55, 0x89, 0xCF, 0x46, 0xAB}; | |||
u8 kirk7_key44[] = {0x7D, 0xF4, 0x92, 0x65, 0xE3, 0xFA, 0xD6, 0x78, 0xD6, 0xFE, 0x78, 0xAD, 0xBB, 0x3D, 0xFB, 0x63}; // New from PS3 | |||
u8 kirk7_key45[] = {0x74, 0x7F, 0xD6, 0x2D, 0xC7, 0xA1, 0xCA, 0x96, 0xE2, 0x7A, 0xCE, 0xFF, 0xAA, 0x72, 0x3F, 0xF7}; | |||
u8 kirk7_key46[] = {0x1E, 0x58, 0xEB, 0xD0, 0x65, 0xBB, 0xF1, 0x68, 0xC5, 0xBD, 0xF7, 0x46, 0xBA, 0x7B, 0xE1, 0x00}; | |||
u8 kirk7_key47[] = {0x24, 0x34, 0x7D, 0xAF, 0x5E, 0x4B, 0x35, 0x72, 0x7A, 0x52, 0x27, 0x6B, 0xA0, 0x54, 0x74, 0xDB}; | |||
u8 kirk7_key48[] = {0x09, 0xB1, 0xC7, 0x05, 0xC3, 0x5F, 0x53, 0x66, 0x77, 0xC0, 0xEB, 0x36, 0x77, 0xDF, 0x83, 0x07}; | |||
u8 kirk7_key49[] = {0xCC, 0xBE, 0x61, 0x5C, 0x05, 0xA2, 0x00, 0x33, 0x37, 0x8E, 0x59, 0x64, 0xA7, 0xDD, 0x70, 0x3D}; | |||
u8 kirk7_key4A[] = {0x0D, 0x47, 0x50, 0xBB, 0xFC, 0xB0, 0x02, 0x81, 0x30, 0xE1, 0x84, 0xDE, 0xA8, 0xD4, 0x84, 0x13}; | |||
u8 kirk7_key4B[] = {0x0C, 0xFD, 0x67, 0x9A, 0xF9, 0xB4, 0x72, 0x4F, 0xD7, 0x8D, 0xD6, 0xE9, 0x96, 0x42, 0x28, 0x8B}; // 1.xx game eboot.bin | |||
u8 kirk7_key4C[] = {0x7A, 0xD3, 0x1A, 0x8B, 0x4B, 0xEF, 0xC2, 0xC2, 0xB3, 0x99, 0x01, 0xA9, 0xFE, 0x76, 0xB9, 0x87}; | |||
u8 kirk7_key4D[] = {0xBE, 0x78, 0x78, 0x17, 0xC7, 0xF1, 0x6F, 0x1A, 0xE0, 0xEF, 0x3B, 0xDE, 0x4C, 0xC2, 0xD7, 0x86}; | |||
u8 kirk7_key4E[] = {0x7C, 0xD8, 0xB8, 0x91, 0x91, 0x0A, 0x43, 0x14, 0xD0, 0x53, 0x3D, 0xD8, 0x4C, 0x45, 0xBE, 0x16}; | |||
u8 kirk7_key4F[] = {0x32, 0x72, 0x2C, 0x88, 0x07, 0xCF, 0x35, 0x7D, 0x4A, 0x2F, 0x51, 0x19, 0x44, 0xAE, 0x68, 0xDA}; | |||
u8 kirk7_key50[] = {0x7E, 0x6B, 0xBF, 0xF6, 0xF6, 0x87, 0xB8, 0x98, 0xEE, 0xB5, 0x1B, 0x32, 0x16, 0xE4, 0x6E, 0x5D}; | |||
u8 kirk7_key51[] = {0x08, 0xEA, 0x5A, 0x83, 0x49, 0xB5, 0x9D, 0xB5, 0x3E, 0x07, 0x79, 0xB1, 0x9A, 0x59, 0xA3, 0x54}; | |||
u8 kirk7_key52[] = {0xF3, 0x12, 0x81, 0xBF, 0xE6, 0x9F, 0x51, 0xD1, 0x64, 0x08, 0x25, 0x21, 0xFF, 0xBB, 0x22, 0x61}; | |||
u8 kirk7_key53[] = {0xAF, 0xFE, 0x8E, 0xB1, 0x3D, 0xD1, 0x7E, 0xD8, 0x0A, 0x61, 0x24, 0x1C, 0x95, 0x92, 0x56, 0xB6}; | |||
u8 kirk7_key54[] = {0x92, 0xCD, 0xB4, 0xC2, 0x5B, 0xF2, 0x35, 0x5A, 0x23, 0x09, 0xE8, 0x19, 0xC9, 0x14, 0x42, 0x35}; | |||
u8 kirk7_key55[] = {0xE1, 0xC6, 0x5B, 0x22, 0x6B, 0xE1, 0xDA, 0x02, 0xBA, 0x18, 0xFA, 0x21, 0x34, 0x9E, 0xF9, 0x6D}; | |||
u8 kirk7_key56[] = {0x14, 0xEC, 0x76, 0xCE, 0x97, 0xF3, 0x8A, 0x0A, 0x34, 0x50, 0x6C, 0x53, 0x9A, 0x5C, 0x9A, 0xB4}; | |||
u8 kirk7_key57[] = {0x1C, 0x9B, 0xC4, 0x90, 0xE3, 0x06, 0x64, 0x81, 0xFA, 0x59, 0xFD, 0xB6, 0x00, 0xBB, 0x28, 0x70}; | |||
u8 kirk7_key58[] = {0x43, 0xA5, 0xCA, 0xCC, 0x0D, 0x6C, 0x2D, 0x3F, 0x2B, 0xD9, 0x89, 0x67, 0x6B, 0x3F, 0x7F, 0x57}; | |||
u8 kirk7_key59[] = {0x00, 0xEF, 0xFD, 0x18, 0x08, 0xA4, 0x05, 0x89, 0x3C, 0x38, 0xFB, 0x25, 0x72, 0x70, 0x61, 0x06}; | |||
u8 kirk7_key5A[] = {0xEE, 0xAF, 0x49, 0xE0, 0x09, 0x87, 0x9B, 0xEF, 0xAA, 0xD6, 0x32, 0x6A, 0x32, 0x13, 0xC4, 0x29}; | |||
u8 kirk7_key5B[] = {0x8D, 0x26, 0xB9, 0x0F, 0x43, 0x1D, 0xBB, 0x08, 0xDB, 0x1D, 0xDA, 0xC5, 0xB5, 0x2C, 0x92, 0xED}; | |||
u8 kirk7_key5C[] = {0x57, 0x7C, 0x30, 0x60, 0xAE, 0x6E, 0xBE, 0xAE, 0x3A, 0xAB, 0x18, 0x19, 0xC5, 0x71, 0x68, 0x0B}; | |||
u8 kirk7_key5D[] = {0x11, 0x5A, 0x5D, 0x20, 0xD5, 0x3A, 0x8D, 0xD3, 0x9C, 0xC5, 0xAF, 0x41, 0x0F, 0x0F, 0x18, 0x6F}; | |||
u8 kirk7_key5E[] = {0x0D, 0x4D, 0x51, 0xAB, 0x23, 0x79, 0xBF, 0x80, 0x3A, 0xBF, 0xB9, 0x0E, 0x75, 0xFC, 0x14, 0xBF}; | |||
u8 kirk7_key5F[] = {0x99, 0x93, 0xDA, 0x3E, 0x7D, 0x2E, 0x5B, 0x15, 0xF2, 0x52, 0xA4, 0xE6, 0x6B, 0xB8, 0x5A, 0x98}; | |||
u8 kirk7_key60[] = {0xF4, 0x28, 0x30, 0xA5, 0xFB, 0x0D, 0x8D, 0x76, 0x0E, 0xA6, 0x71, 0xC2, 0x2B, 0xDE, 0x66, 0x9D}; | |||
u8 kirk7_key61[] = {0xFB, 0x5F, 0xEB, 0x7F, 0xC7, 0xDC, 0xDD, 0x69, 0x37, 0x01, 0x97, 0x9B, 0x29, 0x03, 0x5C, 0x47}; | |||
u8 kirk7_key62[] = {0x02, 0x32, 0x6A, 0xE7, 0xD3, 0x96, 0xCE, 0x7F, 0x1C, 0x41, 0x9D, 0xD6, 0x52, 0x07, 0xED, 0x09}; | |||
u8 kirk7_key63[] = {0x9C, 0x9B, 0x13, 0x72, 0xF8, 0xC6, 0x40, 0xCF, 0x1C, 0x62, 0xF5, 0xD5, 0x92, 0xDD, 0xB5, 0x82}; | |||
u8 kirk7_key64[] = {0x03, 0xB3, 0x02, 0xE8, 0x5F, 0xF3, 0x81, 0xB1, 0x3B, 0x8D, 0xAA, 0x2A, 0x90, 0xFF, 0x5E, 0x61}; | |||
u8 kirk7_key65[] = {0xBC, 0xD7, 0xF9, 0xD3, 0x2F, 0xAC, 0xF8, 0x47, 0xC0, 0xFB, 0x4D, 0x2F, 0x30, 0x9A, 0xBD, 0xA6}; | |||
u8 kirk7_key66[] = {0xF5, 0x55, 0x96, 0xE9, 0x7F, 0xAF, 0x86, 0x7F, 0xAC, 0xB3, 0x3A, 0xE6, 0x9C, 0x8B, 0x6F, 0x93}; | |||
u8 kirk7_key67[] = {0xEE, 0x29, 0x70, 0x93, 0xF9, 0x4E, 0x44, 0x59, 0x44, 0x17, 0x1F, 0x8E, 0x86, 0xE1, 0x70, 0xFC}; | |||
u8 kirk7_key68[] = {0xE4, 0x34, 0x52, 0x0C, 0xF0, 0x88, 0xCF, 0xC8, 0xCD, 0x78, 0x1B, 0x6C, 0xCF, 0x8C, 0x48, 0xC4}; | |||
u8 kirk7_key69[] = {0xC1, 0xBF, 0x66, 0x81, 0x8E, 0xF9, 0x53, 0xF2, 0xE1, 0x26, 0x6B, 0x6F, 0x55, 0x0C, 0xC9, 0xCD}; | |||
u8 kirk7_key6A[] = {0x56, 0x0F, 0xFF, 0x8F, 0x3C, 0x96, 0x49, 0x14, 0x45, 0x16, 0xF1, 0xBC, 0xBF, 0xCE, 0xA3, 0x0C}; | |||
u8 kirk7_key6B[] = {0x24, 0x08, 0xDC, 0x75, 0x37, 0x60, 0xA2, 0x9F, 0x05, 0x54, 0xB5, 0xF2, 0x43, 0x85, 0x73, 0x99}; | |||
u8 kirk7_key6C[] = {0xDD, 0xD5, 0xB5, 0x6A, 0x59, 0xC5, 0x5A, 0xE8, 0x3B, 0x96, 0x67, 0xC7, 0x5C, 0x2A, 0xE2, 0xDC}; | |||
u8 kirk7_key6D[] = {0xAA, 0x68, 0x67, 0x72, 0xE0, 0x2D, 0x44, 0xD5, 0xCD, 0xBB, 0x65, 0x04, 0xBC, 0xD5, 0xBF, 0x4E}; | |||
u8 kirk7_key6E[] = {0x1F, 0x17, 0xF0, 0x14, 0xE7, 0x77, 0xA2, 0xFE, 0x4B, 0x13, 0x6B, 0x56, 0xCD, 0x7E, 0xF7, 0xE9}; | |||
u8 kirk7_key6F[] = {0xC9, 0x35, 0x48, 0xCF, 0x55, 0x8D, 0x75, 0x03, 0x89, 0x6B, 0x2E, 0xEB, 0x61, 0x8C, 0xA9, 0x02}; | |||
u8 kirk7_key70[] = {0xDE, 0x34, 0xC5, 0x41, 0xE7, 0xCA, 0x86, 0xE8, 0xBE, 0xA7, 0xC3, 0x1C, 0xEC, 0xE4, 0x36, 0x0F}; | |||
u8 kirk7_key71[] = {0xDD, 0xE5, 0xFF, 0x55, 0x1B, 0x74, 0xF6, 0xF4, 0xE0, 0x16, 0xD7, 0xAB, 0x22, 0x31, 0x1B, 0x6A}; | |||
u8 kirk7_key72[] = {0xB0, 0xE9, 0x35, 0x21, 0x33, 0x3F, 0xD7, 0xBA, 0xB4, 0x76, 0x2C, 0xCB, 0x4D, 0x80, 0x08, 0xD8}; | |||
u8 kirk7_key73[] = {0x38, 0x14, 0x69, 0xC4, 0xC3, 0xF9, 0x1B, 0x96, 0x33, 0x63, 0x8E, 0x4D, 0x5F, 0x3D, 0xF0, 0x29}; | |||
u8 kirk7_key74[] = {0xFA, 0x48, 0x6A, 0xD9, 0x8E, 0x67, 0x16, 0xEF, 0x6A, 0xB0, 0x87, 0xF5, 0x89, 0x45, 0x7F, 0x2A}; | |||
u8 kirk7_key75[] = {0x32, 0x1A, 0x09, 0x12, 0x50, 0x14, 0x8A, 0x3E, 0x96, 0x3D, 0xEA, 0x02, 0x59, 0x32, 0xE1, 0x8F}; | |||
u8 kirk7_key76[] = {0x4B, 0x00, 0xBE, 0x29, 0xBC, 0xB0, 0x28, 0x64, 0xCE, 0xFD, 0x43, 0xA9, 0x6F, 0xD9, 0x5C, 0xED}; | |||
u8 kirk7_key77[] = {0x57, 0x7D, 0xC4, 0xFF, 0x02, 0x44, 0xE2, 0x80, 0x91, 0xF4, 0xCA, 0x0A, 0x75, 0x69, 0xFD, 0xA8}; | |||
u8 kirk7_key78[] = {0x83, 0x53, 0x36, 0xC6, 0x18, 0x03, 0xE4, 0x3E, 0x4E, 0xB3, 0x0F, 0x6B, 0x6E, 0x79, 0x9B, 0x7A}; | |||
u8 kirk7_key79[] = {0x5C, 0x92, 0x65, 0xFD, 0x7B, 0x59, 0x6A, 0xA3, 0x7A, 0x2F, 0x50, 0x9D, 0x85, 0xE9, 0x27, 0xF8}; | |||
u8 kirk7_key7A[] = {0x9A, 0x39, 0xFB, 0x89, 0xDF, 0x55, 0xB2, 0x60, 0x14, 0x24, 0xCE, 0xA6, 0xD9, 0x65, 0x0A, 0x9D}; | |||
u8 kirk7_key7B[] = {0x8B, 0x75, 0xBE, 0x91, 0xA8, 0xC7, 0x5A, 0xD2, 0xD7, 0xA5, 0x94, 0xA0, 0x1C, 0xBB, 0x95, 0x91}; | |||
u8 kirk7_key7C[] = {0x95, 0xC2, 0x1B, 0x8D, 0x05, 0xAC, 0xF5, 0xEC, 0x5A, 0xEE, 0x77, 0x81, 0x23, 0x95, 0xC4, 0xD7}; | |||
u8 kirk7_key7D[] = {0xB9, 0xA4, 0x61, 0x64, 0x36, 0x33, 0xFA, 0x5D, 0x94, 0x88, 0xE2, 0xD3, 0x28, 0x1E, 0x01, 0xA2}; | |||
u8 kirk7_key7E[] = {0xB8, 0xB0, 0x84, 0xFB, 0x9F, 0x4C, 0xFA, 0xF7, 0x30, 0xFE, 0x73, 0x25, 0xA2, 0xAB, 0x89, 0x7D}; | |||
u8 kirk7_key7F[] = {0x5F, 0x8C, 0x17, 0x9F, 0xC1, 0xB2, 0x1D, 0xF1, 0xF6, 0x36, 0x7A, 0x9C, 0xF7, 0xD3, 0xD4, 0x7C}; | |||
u8 kirk7_key80[] = {0x83, 0xFF, 0xF1, 0x49, 0xA6, 0x87, 0xA5, 0xC5, 0xCD, 0x95, 0x77, 0x93, 0x52, 0xC8, 0xBF, 0x66}; // New kirk Service, Only on PS Vita | |||
u8 kirk7_key81[] = {0xD8, 0x3D, 0x2D, 0x27, 0x7C, 0xE2, 0xDE, 0x15, 0x4A, 0x4E, 0x2A, 0xA6, 0xD1, 0xE8, 0xD2, 0x0B}; // New kirk Service, Only on PS Vita | |||
u8 kirk7_key82[] = {0x4C, 0x5C, 0x71, 0x51, 0x9F, 0x62, 0xA5, 0xFE, 0x5E, 0xF3, 0x6D, 0x4B, 0x07, 0x5B, 0xE2, 0xF3}; // New kirk Service, Only on PS Vita | |||
u8 kirk7_key83[] = {0x80, 0x05, 0xEF, 0x43, 0x12, 0x4F, 0x65, 0x0A, 0x9D, 0xF1, 0x58, 0xF7, 0x2A, 0x50, 0x9C, 0x10}; // New kirk Service, Only on PS Vita | |||
u8 kirk7_keyC0[] = {0xBF, 0x57, 0xAE, 0xF0, 0x2D, 0xC5, 0x87, 0xF3, 0x27, 0xC8, 0xC3, 0xF8, 0xBD, 0xEC, 0xA5, 0xEE}; // New kirk Service, Only on PS Vita | |||
u8 kirk7_keyC1[] = {0x9F, 0xFF, 0x2E, 0xEC, 0xED, 0x84, 0x76, 0xD9, 0x00, 0xDF, 0xD5, 0x79, 0xE1, 0xAA, 0xAB, 0x63}; // New kirk Service, Only on PS Vita | |||
u8 kirk7_keyC2[] = {0x04, 0x46, 0x0D, 0x61, 0xF5, 0x63, 0xD4, 0x6C, 0x0C, 0x4E, 0xB9, 0xAA, 0xE5, 0x46, 0x6E, 0x84}; // New kirk Service, Only on PS Vita | |||
u8 kirk7_keyC3[] = {0x1E, 0x5B, 0x17, 0xDA, 0xC3, 0x21, 0xE6, 0xB8, 0xDF, 0xE7, 0x71, 0x8C, 0xA2, 0x93, 0x03, 0x70}; // New kirk Service, Only on PS Vita | |||
</pre> | </pre> | ||
== | == DRM Keys == | ||
public static final int[] drmFixedKey = { 0x38, 0x20, 0xD0, 0x11, 0x07, 0xA3, 0xFF, 0x3E, 0x0A, 0x4C, 0x20, 0x85, 0x39, 0x10, 0xB5, 0x54 }; | |||
public static final int[] drmModuleKey = { 0xBA, 0x87, 0xE4, 0xAB, 0x2C, 0x60, 0x5F, 0x59, 0xB8, 0x3B, 0xDB, 0xA6, 0x82, 0xFD, 0xAE, 0x14 }; | |||
public static final int[] | |||
public static final int[] drmRifKey = { 0xDA, 0x7D, 0x4B, 0x5E, 0x49, 0x9A, 0x4F, 0x53, 0xB1, 0xC1, 0xA1, 0x4A, 0x74, 0x84, 0x44, 0x3B }; | |||
public static final int[] drmActdatKey = { 0x5E, 0x06, 0xE0, 0x4F, 0xD9, 0x4A, 0x71, 0xBF, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01 }; | |||
Unknown Keys | |||
public static final int[] | public static final int[] drmUnkKey1 = { 0x69, 0xB4, 0x53, 0xF2, 0xE4, 0x21, 0x89, 0x8E, 0x53, 0xE4, 0xA3, 0x5A, 0x5B, 0x91, 0x79, 0x51 }; | ||
public static final int[] | public static final int[] drmUnkKey2 = { 0xF0, 0x79, 0xD5, 0x19, 0x2D, 0x5D, 0xD3, 0x8C, 0xB5, 0x4B, 0x9E, 0xCD, 0xCD, 0xFD, 0xD3, 0xD7 }; | ||
Rename Key | Rename Key | ||
Line 928: | Line 851: | ||
public static final int[] drmkeys_6XX_1 = {0x36, 0xEF, 0x82, 0x4E, 0x74, 0xFB, 0x17, 0x5B, 0x14, 0x14, 0x05, 0xF3, 0xB3, 0x8A, 0x76, 0x18}; | public static final int[] drmkeys_6XX_1 = {0x36, 0xEF, 0x82, 0x4E, 0x74, 0xFB, 0x17, 0x5B, 0x14, 0x14, 0x05, 0xF3, 0xB3, 0x8A, 0x76, 0x18}; | ||
public static final int[] drmkeys_6XX_2 = {0x21, 0x52, 0x5D, 0x76, 0xF6, 0x81, 0x0F, 0x15, 0x2F, 0x4A, 0x40, 0x89, 0x63, 0xA0, 0x10, 0x55}; | public static final int[] drmkeys_6XX_2 = {0x21, 0x52, 0x5D, 0x76, 0xF6, 0x81, 0x0F, 0x15, 0x2F, 0x4A, 0x40, 0x89, 0x63, 0xA0, 0x10, 0x55}; | ||
== PRXDecrypter 144-byte Tag Keys == | == PRXDecrypter 144-byte Tag Keys == | ||
Line 4,925: | Line 4,847: | ||
</pre> | </pre> | ||
== PKG AES Keys == | |||
== | |||
psp_gpkg_aes_key: 07F2C68290B50D2C33818D709B60E62B | |||
* Location: nas_plugin.sprx , from FW 3.55 cex: sub_36EEC, offset: 0x3724A@elf file | |||
psp_gpkg_aes_idu_key: 7547EE76CA8C55AC1BA8D22535E05593 | |||
* Location: nas_plugin.sprx , from FW 2.60 IDU: FUN_00027f98 | |||
== SDK ARC DES Key == | == SDK ARC DES Key == | ||
* DES encrypted, every 0x200 | * DES encrypted, every 0x200 are reset for the info blocks and every 0x400 are reset for the data blocks. | ||
=== 0.6.5 === | === 0.6.5 === | ||
Line 5,054: | Line 4,871: | ||
IV: 41FBCFDDDE9E5B2C | IV: 41FBCFDDDE9E5B2C | ||
[[Category:Software]]<noinclude>[[Category:Main]]</noinclude> | |||
[[Category:Software]] | |||
<noinclude> | |||
[[Category:Main]] | |||
</noinclude> |