Editing Keys
Jump to navigation
Jump to search
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 1: | Line 1: | ||
= Useful Information = | = Useful Information = | ||
* | * KIRK commands 0x10 and 0x11 explanation: [http://www.lolhax.org/2011/07/06/kirk-0x10-private-key/] | ||
* Save Data encryption code: [http://pastebin.com/RFDXKCAf] | * Save Data encryption code: [http://pastebin.com/RFDXKCAf] | ||
* Kirk Engine code: [https://github.com/tpunix/kirk_engine/blob/master/kirk/kirk_engine.c] | * Kirk Engine code: [https://github.com/tpunix/kirk_engine/blob/master/kirk/kirk_engine.c] | ||
Line 7: | Line 7: | ||
== Location == | == Location == | ||
keyfiles should be placed in ~/.psp or %userprofile%\pspkeys | keyfiles should be placed in ~/.psp or %userprofile%\pspkeys <br /> | ||
== Naming == | == Naming == | ||
Line 22: | Line 22: | ||
= Keys = | = Keys = | ||
== | == Baryon Keys == | ||
=== | === Security ID (TA-086 Baryon) === | ||
<pre> | <pre> | ||
008080A217A91705180F | |||
</pre> | </pre> | ||
=== | === Sbox === | ||
<pre> | <pre> | ||
637C777BF26B6FC53001672BFED7AB76 | |||
CA82C97DFA5947F0ADD4A2AF9CA472C0 | |||
B7FD9326363FF7CC34A5E5F171D83115 | |||
04C723C31896059A071280E2EB27B275 | |||
09832C1A1B6E5AA0523BD6B329E32F84 | |||
53D100ED20FCB15B6ACBBE394A4C58CF | |||
D0EFAAFB434D338545F9027F503C9FA8 | |||
51A3408F929D38F5BCB6DA2110FFF3D2 | |||
CD0C13EC5F974417C4A77E3D645D1973 | |||
60814FDC222A908846EEB814DE5E0BDB | |||
E0323A0A4906245CC2D3AC629195E479 | |||
E7C8376D8DD54EA96C56F4EA657AAE08 | |||
BA78252E1CA6B4C6E8DD741F4BBD8B8A | |||
703EB5664803F60E613557B986C11D9E | |||
E1F8981169D98E949B1E87E9CE5528DF | |||
8CA1890DBFE6426841992D0FB054BB16 | |||
</pre> | </pre> | ||
=== | === Table Keys === | ||
==== Index Correlation ==== | |||
* 0 <- TA086 | |||
* 2 <- TA085v2 (fallback, ffs) | |||
* 4 <- TA090,TA093,TA095,TA096 (zeroes) | |||
* 8 <- TA085v2 (main, ffs) | |||
* A <- TA090 (normal) | |||
* D <- TA093,TA095,TA096 (normal) | |||
* 2F <- TA093, TA095, TA096 (ffs) | |||
* D9 <- TA090 (ffs) | |||
==== Keys ==== | |||
<pre> | <pre> | ||
5C52D91CF382ACA489D88178EC16297B 0 | |||
9D4F50FCE1B68E1209307DDBA6A5B5AA 1 | |||
0975988864ACF7621BC0909DF0FCABFF 2 | |||
C9115CE2064A2686D8D6D9D08CDE3059 3 | |||
667539D2FB4273B2903FD7A39ED2C60C 4 | |||
F4FAEF20F4DBAB31D18674FD8F990566 5 | |||
EA0C811363D7E930F961135A4F352DDC 6 | |||
???????????????????????????????? 8 | |||
AC00C0E3E80AF0683FDD1745194543BD A | |||
DFF3FCD608B05597CF09A23BD17D3FD2 D | |||
???????????????????????????????? 2F | |||
???????????????????????????????? 97 | |||
C7AC1306DEFE39EC83A1483B0EE2EC89 D9 | |||
</pre> | </pre> | ||
=== | ==== Secrets ==== | ||
<pre> | <pre> | ||
D2072253A4F27468 | |||
F5D7D4B575F08E4E 0 | |||
B37A16EF557BD089 | |||
CC699581FD89126C 1 | |||
A04E32BBA7139E46 | |||
495E034794931D7B 2 | |||
B0B809833989FAE2 | |||
F4E04313AD2EB4DB 3 | |||
FE7D7899BFEC47C5 | |||
865E3EEF9DFBB1FD 4 | |||
306F3A03D86CBEE4 | |||
FF72BD2B83B89D2F 5 | |||
8422DFEAE21B63C2 | |||
58B95AAEF399DBD0 6 | |||
???????????????? | |||
???????????????? 8 | |||
C2377E8A74096C5F | |||
093EC519AF0F502D A | |||
581C7F1944F96262 | |||
318053875C203E24 D | |||
???????????????? | |||
???????????????? 2F | |||
???????????????? | |||
???????????????? 97 | |||
90E1F0C00178E3FF | |||
C34A6A7B205FE8F9 D9 | |||
</pre> | </pre> | ||
=== | * In psp battery chips (1000-2000) (keyset 7 is supported only on some 2000 and above/3000) | ||
* Added PSP3000 (TA-090) secrets | |||
* TA-090 has keysets 4, A, D9 (4 for 00s, A for normal, D9 for 0xFF) | |||
* TA-093+ has keysets 4, D, 2F (4 for 00s, D for normal, 2F, for 0xFF) | |||
* TA-086 has keyset 0 (for all, 00, FF and normal) | |||
* Some 3000s use 0x97 keyset | |||
* Some 2000s use keysets 2 and 8 | |||
==== Expansions ==== | |||
<pre> | <pre> | ||
expansion 0 | |||
F35CEC89825216D8ACD92981A41C7B78 k0 | |||
E91A8C6075F7BBAD54F8FCD576D2750E k1 | |||
1BF2F77B3247249F316518E4C0B6BBCE k2 | |||
DBC057A0D8EA6347BE8F425A1EDE6BD0 k3 | |||
E8331F481EC63A594EF056149B85204B k4 | |||
4BA31C0369770A3009474B1DDE45B595 k5 | |||
AFE4B0ACADC4979D9B92CD8607D92792 k6 | |||
832C9F2FD479DE49C55E8E43393E8CAB k7 | |||
32B1821DB46023FDFF3A32BCDCE5FB77 k8 | |||
BE8C21A3F743290ACA3544762AF6A65D k9 | |||
A11F2302AF588CA5DB11E9AD210BDA7C k10 | |||
expansion 1 | |||
E19DA609B64FA5308E50B57D12FCAADB k0 | |||
7B9AD4722C9AB91C72FCBA0FCAD8BB11 k1 | |||
B5CE13C7426EE75E6416D16B5A90F04B k2 | |||
EB5E3F2C1250AB4CFE9A4495B7ED0CFC k3 | |||
DF34CCF3594BBE159A644B0F2F98DFD3 k4 | |||
558A6AA6A1F80AB460FA246FFCD3F02F k5 | |||
98CD543E6FCED1DB16765D792DD1F202 k6 | |||
2BB34115ED82E736E9FFCD90DCF12CDE k7 | |||
8CA7D899D23F03E4678E3AF7AE725C70 k8 | |||
4BC70AD26DBF8A89A3C46E54BD1391CD k9 | |||
C48F1C164D204EC4E645DCB2C9749504 k10 | |||
expansion 2 | |||
6409F01BAC75FCC0F798AB906288FF9D | |||
DCB837C7BB17877B798E42E9660404FB | |||
71AD81B6803B7CFB057CAEECF89E0703 | |||
C8B9FF7E5FDFD8A4BCB9FE506A926E69 | |||
18D099663B64479F9A2634CAEE84E987 | |||
7860871E477C9FD8A2385C68846AEA03 | |||
E39B7AFD713636A91DBF2975F97D10FA | |||
3DDEBAC0E2937D4B6875341D5EA7B4A4 | |||
9CA1E65C698B5F2290F8B98D0D531DA9 | |||
E97553B5B4DDC996CC5CF841D0DD6479 | |||
779E91C2289C77BED31F6A92E030FD99 | |||
expansion 3 | |||
06C98CD84A11DED6265C30D986E259D0 | |||
D3D5870B5F155789B1975868008689D0 | |||
5F8CD354207FFEA98130B1E99191C841 | |||
6C33EB3897B7C03E59D801B066F7EF27 | |||
ED813ED55CCBA2625E07EFEE781EB05F | |||
46ABAD934814882ABEE0BF50D4AC3B8B | |||
094F379A541CF67EBC0253ECED395D66 | |||
444DE9DEA5F12DDBF24E4D1E4EA37528 | |||
5115668FB712416C21D3723FF3BDAEDB | |||
DC8D3553E552C88916375B297D8E08A6 | |||
8F53E9DC8E6BCF07110763386518CBC3 | |||
expansion 4 | |||
FB669E904275D23F7339C6D7B2D20CA3 | |||
29D227B983C16EBCB4C7A5636BD9C4C8 | |||
664FF8DF44C796F86FDBA90C7E1572B6 | |||
BDDB9A6250143EA8F49B51F82A54EE9C | |||
DC6124BE95C5033D47B3EEBFC6ECB45A | |||
D60A4C6878ED4645793E28C61CDAF246 | |||
A67082CEA1D9A2E4CEB72008EFF35BA9 | |||
AC0AE062CF6E892B408E68480FE0FDA6 | |||
812D03E3E42B46CF9ADABAD20E0155A8 | |||
ED6C0D0E3BDFB2F4BC26D46E747A89DC | |||
806D838EAC97EA583D818753D9AD8C05 | |||
expansion 5 | |||
F4F48FD1DBFA9986ABEF0574312066FD | |||
EF1BB13E4A9155CC77DC06036253F99F | |||
0AE58534B4FE2D7832453731F99B9F66 | |||
33398207D06485A8AC9EAA9DF50C0C93 | |||
95A6109218C835B0CC60FB51EA1F7579 | |||
B5203727DFC75A6F31FD9B603FD53346 | |||
0BBE1B2C0CD339630F3EF46F704F0536 | |||
E7ECD0CB606C3A035A55C13590E0A3A6 | |||
0BEC10C074144D77055FF130009005A6 | |||
1F14CFDFC1B5FBB63134F0015A5AF9FC | |||
322D22EDF839B54E9CAD6D9D8AD08F76 | |||
expansion 6 | |||
63EA4FF9D70C3561E9812D133013DC5A | |||
1E7DA8E703D45762EE07D0FDA79721FD | |||
3A2475DDA7A492C514FA39E9F2552E0F | |||
556FFD8811B646D4DFCB0F363AC81B35 | |||
683D1DE0D1C04305BB64828DA69C8893 | |||
5F37A2BF02D344071BA014969E38850D | |||
530C4EEC2B29682C2C37AEBA9C021491 | |||
5A09F8B6E6CDA2CAE1CDF55BB12D3420 | |||
E9B3A75FCD2BA50734D59A6FDD6CC9FD | |||
47AEBF185E93FC593C08C953ED30D910 | |||
6F28C877104EB549013D9B52D5381CC5 | |||
</pre> | |||
* Only in psp battery chips (1000-2000) (keyset 7 is supported only on some 2000 and above/3000) | |||
=== Obfuscation Algirithm for the psp-3000 battery firmware keys === | |||
<pre> | <pre> | ||
Public Sub EncryptNec(buff() As Byte, r_key() As Variant) | |||
Dim i As Byte | |||
Dim j As Byte | |||
Dim r As Byte | |||
Dim x As Byte | |||
Dim a(15) As Byte | |||
Dim y(15) As Byte | |||
Debug.Print "entrance: " & Arr2Hex(buff) | |||
Debug.Print "key0: " & Arr2Hex(r_key(0)) | |||
'1 round - XOR with first keys | |||
For r = 0 To 9 | |||
'sub_F9F and sub_F4E | |||
a(0) = buff(0) Xor r_key(r)(0) | |||
a(1) = buff(1) Xor r_key(r)(1) | |||
a(2) = buff(2) Xor r_key(r)(2) | |||
a(3) = buff(3) Xor r_key(r)(3) | |||
a(4) = buff(5) Xor r_key(r)(5) | |||
a(5) = buff(6) Xor r_key(r)(6) ' rotate 5-7 | |||
a(6) = buff(7) Xor r_key(r)(7) | |||
a(7) = buff(4) Xor r_key(r)(4) ' rotate 5-7 | |||
a(8) = buff(10) Xor r_key(r)(10) ' rotate 8-11 | |||
a(9) = buff(11) Xor r_key(r)(11) ' rotate 9-10 | |||
a(10) = buff(8) Xor r_key(r)(8) ' rotate 9-10 | |||
a(11) = buff(9) Xor r_key(r)(9) ' rotate 8-11 | |||
a(12) = buff(15) Xor r_key(r)(15) ' rotate 12-14 | |||
a(13) = buff(12) Xor r_key(r)(12) | |||
a(14) = buff(13) Xor r_key(r)(13) ' rotate 12-14 | |||
a(15) = buff(14) Xor r_key(r)(14) | |||
'sub_FD4 | |||
For i = 0 To 15 | |||
a(i) = m_fbsub(a(i)) | |||
Next i | |||
' Debug.Print "step1: " & Arr2Hex(a) | |||
If r < 9 Then | |||
'sub_EE3 | |||
For j = 0 To 3 | |||
x = a(j) Xor a(j + 12) Xor a(j + 4) Xor a(j + 8) ' include in X | |||
y(j) = a(j) Xor x Xor LShiftByteNec(a(j), 1) Xor LShiftByteNec(a(j + 4), 1) | |||
y(j + 4) = a(j + 4) Xor x Xor LShiftByteNec(a(j + 4), 1) Xor LShiftByteNec(a(j + 8), 1) | |||
y(j + 8) = a(j + 8) Xor x Xor LShiftByteNec(a(j + 8), 1) Xor LShiftByteNec(a(j + 12), 1) | |||
y(j + 12) = a(j + 12) Xor x Xor LShiftByteNec(a(j + 12), 1) Xor LShiftByteNec(a(j), 1) | |||
Next | |||
For i = 0 To 15 | |||
buff(i) = y(i) | |||
Next i | |||
Else | |||
For i = 0 To 15 | |||
buff(i) = a(i) | |||
Next i | |||
End If | |||
'Debug.Print "_EE3-" & r & ": " & Arr2Hex(buff) | |||
Next r | |||
'last round XOR | |||
For i = 0 To 15 | |||
buff(i) = buff(i) Xor r_key(10)(i) | |||
Next i | |||
' Debug.Print "_EE3-" & r & ": " & Arr2Hex(a) | |||
End Sub | |||
Private Function LShiftByteNec(ByVal bytValue As Integer, _ | |||
&nbs | |||
p; ByVal bytShiftBits As Byte) As Byte | |||
bytValue = LShift(bytValue, bytShiftBits) | |||
If bytValue > &HFF Then | |||
LShiftByteNec = (bytValue - &HFF) Xor &H1A | |||
Else | |||
LShiftByteNec = bytValue | |||
End If | |||
End Function | |||
</pre> | |||
== Spock Keys == | |||
=== Spock Master Key (Spock command 9) === | |||
= | private byte[] PSPSpockMasterKey = new byte[16] { | ||
0x9F, 0x46, 0xF9, 0xFC, 0xFA, 0xB2, 0xAD, 0x05, 0x69, 0xF6, 0x88, 0xD8, 0x79, 0x4B, 0x92, 0xBA | |||
}; | |||
== | == PSP IdStorage Keys == | ||
=== | === PSP IdStorage Master Key === | ||
//PSP Kirk commands 16 and 18 master key, also used for UMD Keys decryption | |||
private byte[] PSPIDStorageKey = new byte[16] { | |||
0x47, 0x5E, 0x09, 0xF4, 0xA2, 0x37, 0xDA, 0x9B, 0xEF, 0xFF, 0x3B, 0xC0, 0x77, 0x14, 0x3D, 0x8A | |||
}; | |||
=== | === PSP IdStorage Certificates ECDSA Public Keys === | ||
They all use Curve Type 2 (VSH). | |||
==== | ==== Section 0 ==== | ||
< | Public key: <code>4004C80BD9C8BA38221065923E324B5F0EC165ED6CFF7D9F2C420B84DFDA6E96C0AEE29927BCAF1E</code> | ||
</ | |||
==== | ==== Section 1 ==== | ||
< | Public key: <code>06485FD029853B552F7EFDD67A2DE7A1A4E25537B2459D8786426D5B27EFA5A9311CB8ABABFA0ECE</code> | ||
</ | |||
==== | ==== Section 2 ==== | ||
< | Public key: <code>3F8C34F210AEC48E1520FF2A44899E054A0DA33DF8B9754B09C0EC7E61867A5126FE6926972196F5</code> | ||
==== Section 3 ==== | |||
Public key: <code>CCB3440DC4836DD519E13B2805B30870DCAEE462136B3888651A98E02B29FA0CD34F1616F1ED5786</code> | |||
==== Section 4 ==== | |||
Public key: <code>08B336925C2B445D03A9BE51B9AABF54E4CC142EA72A23BB8060B03B71CDE0772DE82AD8931648D6</code> | |||
==== Section 5 ==== | |||
Public key: <code>4F0A2BC9987640860E22EE5D86087C9692470BDF59DC4C1F2E38F92CE7B66875B59ED10C9D84FA6A</code> | |||
<pre> | |||
public static final int[] psp_ids_certs_pub_keys = { | |||
// certificate 0 | |||
0x40, 0x04, 0xC8, 0x0B, 0xD9, 0xC8, 0xBA, 0x38, 0x22, 0x10, 0x65, 0x92, 0x3E, 0x32, 0x4B, 0x5F, 0x0E, 0xC1, 0x65, 0xED, | |||
0x6C, 0xFF, 0x7D, 0x9F, 0x2C, 0x42, 0x0B, 0x84, 0xDF, 0xDA, 0x6E, 0x96, 0xC0, 0xAE, 0xE2, 0x99, 0x27, 0xBC, 0xAF, 0x1E, | |||
// certificate 1 | |||
0x06, 0x48, 0x5F, 0xD0, 0x29, 0x85, 0x3B, 0x55, 0x2F, 0x7E, 0xFD, 0xD6, 0x7A, 0x2D, 0xE7, 0xA1, 0xA4, 0xE2, 0x55, 0x37, | |||
0xB2, 0x45, 0x9D, 0x87, 0x86, 0x42, 0x6D, 0x5B, 0x27, 0xEF, 0xA5, 0xA9, 0x31, 0x1C, 0xB8, 0xAB, 0xAB, 0xFA, 0x0E, 0xCE, | |||
// certificate 2 | |||
0x3F, 0x8C, 0x34, 0xF2, 0x10, 0xAE, 0xC4, 0x8E, 0x15, 0x20, 0xFF, 0x2A, 0x44, 0x89, 0x9E, 0x05, 0x4A, 0x0D, 0xA3, 0x3D, | |||
0xF8, 0xB9, 0x75, 0x4B, 0x09, 0xC0, 0xEC, 0x7E, 0x61, 0x86, 0x7A, 0x51, 0x26, 0xFE, 0x69, 0x26, 0x97, 0x21, 0x96, 0xF5, | |||
// certificate 3 | |||
0xCC, 0xB3, 0x44, 0x0D, 0xC4, 0x83, 0x6D, 0xD5, 0x19, 0xE1, 0x3B, 0x28, 0x05, 0xB3, 0x08, 0x70, 0xDC, 0xAE, 0xE4, 0x62, | |||
0x13, 0x6B, 0x38, 0x88, 0x65, 0x1A, 0x98, 0xE0, 0x2B, 0x29, 0xFA, 0x0C, 0xD3, 0x4F, 0x16, 0x16, 0xF1, 0xED, 0x57, 0x86, | |||
// certificate 4 | |||
0x08, 0xB3, 0x36, 0x92, 0x5C, 0x2B, 0x44, 0x5D, 0x03, 0xA9, 0xBE, 0x51, 0xB9, 0xAA, 0xBF, 0x54, 0xE4, 0xCC, 0x14, 0x2E, | |||
0xA7, 0x2A, 0x23, 0xBB, 0x80, 0x60, 0xB0, 0x3B, 0x71, 0xCD, 0xE0, 0x77, 0x2D, 0xE8, 0x2A, 0xD8, 0x93, 0x16, 0x48, 0xD6, | |||
// certificate 5 | |||
0x4F, 0x0A, 0x2B, 0xC9, 0x98, 0x76, 0x40, 0x86, 0x0E, 0x22, 0xEE, 0x5D, 0x86, 0x08, 0x7C, 0x96, 0x92, 0x47, 0x0B, 0xDF, | |||
0x59, 0xDC, 0x4C, 0x1F, 0x2E, 0x38, 0xF9, 0x2C, 0xE7, 0xB6, 0x68, 0x75, 0xB5, 0x9E, 0xD1, 0x0C, 0x9D, 0x84, 0xFA, 0x6A, | |||
}; | |||
<pre> | |||
== PSP Save Data Hash Keys == | |||
private byte[] PSPSDHashKey1 = new byte[16] { 0x40, 0xE6, 0x53, 0x3F, 0x05, 0x11, 0x3A, 0x4E, 0xA1, 0x4B, 0xDA, 0xD6, 0x72, 0x7C, 0x53, 0x4C }; | |||
private byte[] PSPSDHashKey2 = new byte[16] { 0xFA, 0xAA, 0x50, 0xEC, 0x2F, 0xDE, 0x54, 0x93, 0xAD, 0x14, 0xB2, 0xCE, 0xA5, 0x30, 0x05, 0xDF }; | |||
private byte[] PSPSDHashKey3 = new byte[16] { 0x36, 0xA5, 0x3E, 0xAC, 0xC5, 0x26, 0x9E, 0xA3, 0x83, 0xD9, 0xEC, 0x25, 0x6C, 0x48, 0x48, 0x72 }; | |||
private byte[] PSPSDHashKey4 = new byte[16] { 0xD8, 0xC0, 0xB0, 0xF3, 0x3E, 0x6B, 0x76, 0x85, 0xFD, 0xFB, 0x4D, 0x7D, 0x45, 0x1E, 0x92, 0x03 }; | |||
private byte[] PSPSDHashKey5 = new byte[16] { 0xCB, 0x15, 0xF4, 0x07, 0xF9, 0x6A, 0x52, 0x3C, 0x04, 0xB9, 0xB2, 0xEE, 0x5C, 0x53, 0xFA, 0x86 }; | |||
private byte[] PSPSDHashKey6 = new byte[16] { 0x70, 0x44, 0xA3, 0xAE, 0xEF, 0x5D, 0xA5, 0xF2, 0x85, 0x7F, 0xF2, 0xD6, 0x94, 0xF5, 0x36, 0x3B }; | |||
private byte[] PSPSDHashKey7 = new byte[16] { 0xEC, 0x6D, 0x29, 0x59, 0x26, 0x35, 0xA5, 0x7F, 0x97, 0x2A, 0x0D, 0xBC, 0xA3, 0x26, 0x33, 0x00 }; | |||
== PSP AMCTRL Hash Keys == | |||
private byte[] PSPAMHashKey1 = new byte[16] { 0x9C, 0x48, 0xB6, 0x28, 0x40, 0xE6, 0x53, 0x3F, 0x05, 0x11, 0x3A, 0x4E, 0x65, 0xE6, 0x3A, 0x64 }; | |||
private byte[] PSPAMHashKey2 = new byte[16] { 0x70, 0xB4, 0x7B, 0xC0, 0xA1, 0x4B, 0xDA, 0xD6, 0xE0, 0x10, 0x14, 0xED, 0x72, 0x7C, 0x53, 0x4C }; | |||
private byte[] PSPAMHashKey3 = new byte[16] { 0xE3, 0x50, 0xED, 0x1D, 0x91, 0x0A, 0x1F, 0xD0, 0x29, 0xBB, 0x1C, 0x3E, 0xF3, 0x40, 0x77, 0xFB }; | |||
private byte[] PSPAMHashKey4 = new byte[16] { 0x13, 0x5F, 0xA4, 0x7C, 0xAB, 0x39, 0x5B, 0xA4, 0x76, 0xB8, 0xCC, 0xA9, 0x8F, 0x3A, 0x04, 0x45 }; | |||
private byte[] PSPAMHashKey5 = new byte[16] { 0x67, 0x8D, 0x7F, 0xA3, 0x2A, 0x9C, 0xA0, 0xD1, 0x50, 0x8A, 0xD8, 0x38, 0x5E, 0x4B, 0x01, 0x7E }; | |||
== PSP Kirk command 1 AESCBC128-CMAC Key == | |||
private byte[] kirk_command_1_aes128cmac_key = new byte[16] { | |||
0x98, 0xC9, 0x40, 0x97, 0x5C, 0x1D, 0x10, 0xE8, 0x7F, 0xE6, 0x0E, 0xA3, 0xFD, 0x03, 0xA8, 0xBA | |||
}; | |||
== PSP Kirk command 1 ECDSA Curve == | |||
private byte[][] kirk_command_1_ecdsa_curve = new byte[6][] { | |||
new byte[20] { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0x00, 0x00, 0x00, 0x01, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }, | |||
new byte[20] { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0x00, 0x00, 0x00, 0x01, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFC }, | |||
new byte[20] { 0x65, 0xD1, 0x48, 0x8C, 0x03, 0x59, 0xE2, 0x34, 0xAD, 0xC9, 0x5B, 0xD3, 0x90, 0x80, 0x14, 0xBD, 0x91, 0xA5, 0x25, 0xF9 }, | |||
new byte[20] { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0x00, 0x01, 0xB5, 0xC6, 0x17, 0xF2, 0x90, 0xEA, 0xE1, 0xDB, 0xAD, 0x8F }, | |||
new byte[20] { 0x22, 0x59, 0xAC, 0xEE, 0x15, 0x48, 0x9C, 0xB0, 0x96, 0xA8, 0x82, 0xF0, 0xAE, 0x1C, 0xF9, 0xFD, 0x8E, 0xE5, 0xF8, 0xFA }, | |||
new byte[20] { 0x60, 0x43, 0x58, 0x45, 0x6D, 0x0A, 0x1C, 0xB2, 0x90, 0x8D, 0xE9, 0x0F, 0x27, 0xD7, 0x5C, 0x82, 0xBE, 0xC1, 0x08, 0xC0 }, | |||
}; | |||
== | == PSP Kirk command 1 ECDSA Private Key == | ||
private byte[] kirk_command_1_ecdsa_private_key = new byte[20] = { | |||
0xF3, 0x92, 0xE2, 0x64, 0x90, 0xB8, 0x0F, 0xD8, 0x89, 0xF2, 0xD9, 0x72, 0x2C, 0x1F, 0x34, 0xD7, 0x27, 0x4F, 0x98, 0x3D | |||
}; | |||
== PSP Kirk command 1 ECDSA Public Key == | |||
private byte[] kirk_command_1_ecdsa_pub_key_x = new byte[20] { 0xED, 0x9C, 0xE5, 0x82, 0x34, 0xE6, 0x1A, 0x53, 0xC6, 0x85, 0xD6, 0x4D, 0x51, 0xD0, 0x23, 0x6B, 0xC3, 0xB5, 0xD4, 0xB9 }; | |||
private byte[] kirk_command_1_ecdsa_pub_key_y = new byte[20] { 0x04, 0x9D, 0xF1, 0xA0, 0x75, 0xC0, 0xE0, 0x4F, 0xB3, 0x44, 0x85, 0x8B, 0x61, 0xB7, 0x9B, 0x69, 0xA6, 0x3D, 0x2C, 0x39 }; | |||
private byte[] kirk_command_1_ecdsa_ec_m_header = new byte[20] { 0x7D, 0x7E, 0x46, 0x85, 0x4D, 0x07, 0xFA, 0x0B, 0xC6, 0xE8, 0xED, 0x62, 0x99, 0x89, 0x26, 0x14, 0x39, 0x5F, 0xEA, 0xFC }; | |||
private byte[] kirk_command_1_ecdsa_ec_r_header = new byte[20] { 0x66, 0x4f, 0xe1, 0xf2, 0xe9, 0xd6, 0x63, 0x36, 0xf7, 0x33, 0x0b, 0xca, 0xb9, 0x55, 0x6d, 0xb6, 0xeb, 0xe8, 0x05, 0xdc }; | |||
private byte[] kirk_command_1_ecdsa_ec_m_data = new byte[20] { 0x15, 0xee, 0x16, 0x24, 0x12, 0x09, 0x58, 0x16, 0x0f, 0x8b, 0x1a, 0x21, 0x33, 0x7a, 0x38, 0xf8, 0x29, 0xf7, 0x2e, 0x58 }; | |||
private byte[] kirk_command_1_ecdsa_ec_r_data = new byte[20] { 0xcd, 0xe3, 0x88, 0xa6, 0x3c, 0x1d, 0x57, 0xdc, 0x5e, 0x94, 0xee, 0xac, 0x2e, 0x6c, 0x9f, 0x2e, 0x81, 0xc7, 0x1c, 0x58 }; | |||
== | == PSP Applications ECDSA Curve == | ||
private byte[][] psp_applications_ecdsa_curve = new byte[6][] { | |||
new byte[20] { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0x00, 0x00, 0x00, 0x01, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }, | |||
new byte[20] { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0x00, 0x00, 0x00, 0x01, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFC }, | |||
new byte[20] { 0xA6, 0x8B, 0xED, 0xC3, 0x34, 0x18, 0x02, 0x9C, 0x1D, 0x3C, 0xE3, 0x3B, 0x9A, 0x32, 0x1F, 0xCC, 0xBB, 0x9E, 0x0F, 0x0B }, | |||
new byte[20] { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFE, 0xFF, 0xFF, 0xB5, 0xAE, 0x3C, 0x52, 0x3E, 0x63, 0x94, 0x4F, 0x21, 0x27 }, | |||
new byte[20] { 0x12, 0x8E, 0xC4, 0x25, 0x64, 0x87, 0xFD, 0x8F, 0xDF, 0x64, 0xE2, 0x43, 0x7B, 0xC0, 0xA1, 0xF6, 0xD5, 0xAF, 0xDE, 0x2C }, | |||
new byte[20] { 0x59, 0x58, 0x55, 0x7E, 0xB1, 0xDB, 0x00, 0x12, 0x60, 0x42, 0x55, 0x24, 0xDB, 0xC3, 0x79, 0xD5, 0xAC, 0x5F, 0x4A, 0xDF }, | |||
}; | |||
== PSP EDATA ECDSA Private Key == | |||
private byte[] psp_edata_ecdsa_private_key = new byte[20] { | |||
0xE5, 0xC4, 0xD0, 0xA8, 0x24, 0x9A, 0x6F, 0x27, 0xE5, 0xE0, 0xC9, 0xD5, 0x34, 0xF4, 0xDA, 0x15, 0x22, 0x3F, 0x42, 0xAD | |||
}; | |||
== PSP EDATA ECDSA Public Key == | |||
private byte[] psp_edata_ecdsa_public_key = new byte[20] { | |||
0x1F, 0x07, 0x2B, 0xCC, 0xC1, 0x62, 0xF2, 0xCF, 0xAE, 0xA0, 0xE7, 0xF4, 0xCD, 0xFD, 0x9C, 0xAE, 0xC6, 0xC4, 0x55, 0x21, | |||
0x53, 0x01, 0xF4, 0xE3, 0x70, 0xC3, 0xED, 0xE2, 0xD4, 0xF5, 0xDB, 0xC3, 0xA7, 0xDE, 0x8C, 0xAA, 0xE8, 0xAD, 0x5B, 0x7D | |||
}; | |||
== PSP Kirk commands 4/7 AES128CBC Keys == | |||
<pre> | |||
2C92E5902B86C106B72EEA6CD4EC7248 0 | |||
058DC80B33A5BF9D5698FAE0D3715E1F 1 | |||
B813C35EC64441E3DC3C16F5B45E6484 2 | |||
9802C4E6EC9E9E2FFC634CE42FBB4668 3 | |||
99244CD258F51BCBB0619CA73830075F 4 | |||
0225D7BA63ECB94A9D237601B3F6AC17 5 | |||
6099F28170560E5F747CB520C0CDC23C 6 | |||
76368B438F77D87EFE5FB6115939885C 7 | |||
14A115EB434A1BA4905E03B617A15C04 8 | |||
E65803D9A71AA87F059D229DAF5453D0 9 | |||
BA3480B428A7CA5F216412F70FBB7323 A | |||
72AD35AC9AC3130A778CB19D88550B0C B | |||
8485C848750843BC9B9AECA79C7F6018 C | |||
B5B16EDE23A97B0EA17CDBA2DCDEC46E D | |||
C871FDB3BCC5D2F2E2D7729DDF826882 E | |||
0ABB336C96D4CDD8CB5F4BE0BADB9E03 F | |||
32295BD5EAF7A34216C88E48FF50D371 10 | |||
46F25E8E4D2AA540730BC46E47EE6F0A 11 | |||
5DC71139D01938BC027FDDDCB0837D9D 12 | |||
51DD65F071A4E5EA6AAF12194129B8F4 13 | |||
03763C6865C69B0FFE8FD8EEA43616A0 14 (SYSCON) | |||
7D50B85CAF6769F0E54AA8098B0EBE1C 15 (SYSCON) | |||
72684B32AC3B332F2A7AFC9E14D56F6B 16 | |||
201D31964AD99FBF32D5D61C491BD9FC 17 | |||
F8D84463D610D12A448E9690A6BB0BAD 18 | |||
5CD4057FA13060440AD9B6745F244F4E 19 | |||
F48AD678599C22C1D411933DF845B893 1A | |||
CAE7D287A2ECC1CD94542B5E1D9488B2 1B | |||
DE26D37A39956C2AD8C3A6AF21EBB301 1C | |||
7CB68B4DA38D1DD932679CA99FFB2852 1D | |||
A0B556B469AB368F36DEC9092ECB41B1 1E | |||
939DE19B725FEEE2452ABC1706D14769 1F | |||
A4A4E621382EF1AF7B177AE842AD0031 20 | |||
C37F13E8CF84DB34747BC3A0F19D3A73 21 | |||
2BF7838AD898E95FA5F901DA61FE35BB 22 | |||
C704621E714A66EA62E04B203DB8C2E5 23 | |||
C933859AAB00CDCE4D8B8E9F3DE6C00F 24 | |||
1842561F2B5F34E3513EB78977431A65 25 | |||
DCB0A0065A50A14E59AC973F1758A3A3 26 | |||
C4DBAE83E29CF254A3DD374E807BF425 27 | |||
BFAEEB498265C57C64B8C17E19064409 28 | |||
797CECC3B3EE0AC03BD8E6C1E0A8B1A4 29 | |||
7534FE0BD6D0C28D68D4E02AE7D5D155 2A | |||
FAB35326974F4EDFE4C3A814C32F0F88 2B | |||
EC97B386B433C6BF4E539D95EBB979E4 2C | |||
B320A204CF480629B5DD8EFC98D4177B 2D | |||
5DFC0D4F2C39DA684A3374ED4958A73A 2E | |||
D75A5422CED9A3D62B557D8DE8BEC7EC 2F | |||
6B4AEE4345AE7007CF8DCF4E4AE93CFA 30 | |||
2B522F664C2D114CFE61318C56784EA6 31 | |||
3AA34E44C66FAF7BFAE55327EFCFCC24 32 | |||
2B5C78BFC38E499D41C33C5C7B2796CE 33 | |||
F37EEAD2C0C8231DA99BFA495DB7081B 34 | |||
708D4E6FD1F66F1D1E1FCB02F9B39926 35 | |||
0F6716E180699C51FCC7AD6E4FB846C9 36 | |||
560A494A844C8ED982EE0B6DC57D208D 37 | |||
12468D7E1C42209BBA5426835EB03303 38 | |||
C43BB6D653EE67493EA95FBC0CED6F8A 39 | |||
2CC3CF8C2878A5A663E2AF2D715E86BA 3A | |||
833DA70CED6A2012D196E6FE5C4D37C5 3B | |||
C743D06742EE90B8CA75503520ADBCCE 3C | |||
8AE3663F8D9E82A1EDE68C9CE8256DAA 3D | |||
7FC96F0BB1485CA55DD364B77AF5E4EA 3E | |||
91B765788BCB8BD402ED553A6662D0AD 3F | |||
2824F9101B8D0F7B6EB263B5B55B2EBB 40 | |||
30E2575DE0A249CEE8CF2B5E4D9F52C7 41 | |||
5EE50439623202FA85393F72BB77FD1A 42 | |||
F88174B1BDE9BFDD45E2F55589CF46AB 43 | |||
7DF49265E3FAD678D6FE78ADBB3DFB63 44 | |||
747FD62DC7A1CA96E27ACEFFAA723FF7 45 | |||
1E58EBD065BBF168C5BDF746BA7BE100 46 | |||
24347DAF5E4B35727A52276BA05474DB 47 | |||
09B1C705C35F536677C0EB3677DF8307 48 | |||
CCBE615C05A20033378E5964A7DD703D 49 | |||
0D4750BBFCB0028130E184DEA8D48413 4A | |||
0CFD679AF9B4724FD78DD6E99642288B 4B | |||
7AD31A8B4BEFC2C2B39901A9FE76B987 4C | |||
BE787817C7F16F1AE0EF3BDE4CC2D786 4D | |||
7CD8B891910A4314D0533DD84C45BE16 4E | |||
32722C8807CF357D4A2F511944AE68DA 4F | |||
7E6BBFF6F687B898EEB51B3216E46E5D 50 | |||
08EA5A8349B59DB53E0779B19A59A354 51 | |||
F31281BFE69F51D164082521FFBB2261 52 | |||
AFFE8EB13DD17ED80A61241C959256B6 53 | |||
92CDB4C25BF2355A2309E819C9144235 54 | |||
E1C65B226BE1DA02BA18FA21349EF96D 55 | |||
14EC76CE97F38A0A34506C539A5C9AB4 56 | |||
1C9BC490E3066481FA59FDB600BB2870 57 | |||
43A5CACC0D6C2D3F2BD989676B3F7F57 58 | |||
00EFFD1808A405893C38FB2572706106 59 | |||
EEAF49E009879BEFAAD6326A3213C429 5A | |||
8D26B90F431DBB08DB1DDAC5B52C92ED 5B | |||
577C3060AE6EBEAE3AAB1819C571680B 5C | |||
115A5D20D53A8DD39CC5AF410F0F186F 5D | |||
0D4D51AB2379BF803ABFB90E75FC14BF 5E | |||
9993DA3E7D2E5B15F252A4E66BB85A98 5F | |||
F42830A5FB0D8D760EA671C22BDE669D 60 | |||
FB5FEB7FC7DCDD693701979B29035C47 61 | |||
02326AE7D396CE7F1C419DD65207ED09 62 | |||
9C9B1372F8C640CF1C62F5D592DDB582 63 | |||
03B302E85FF381B13B8DAA2A90FF5E61 64 | |||
BCD7F9D32FACF847C0FB4D2F309ABDA6 65 | |||
F55596E97FAF867FACB33AE69C8B6F93 66 | |||
EE297093F94E445944171F8E86E170FC 67 | |||
E434520CF088CFC8CD781B6CCF8C48C4 68 | |||
C1BF66818EF953F2E1266B6F550CC9CD 69 (SYSCON) | |||
560FFF8F3C9649144516F1BCBFCEA30C 6A | |||
2408DC753760A29F0554B5F243857399 6B | |||
DDD5B56A59C55AE83B9667C75C2AE2DC 6C | |||
AA686772E02D44D5CDBB6504BCD5BF4E 6D | |||
1F17F014E777A2FE4B136B56CD7EF7E9 6E | |||
C93548CF558D7503896B2EEB618CA902 6F | |||
DE34C541E7CA86E8BEA7C31CECE4360F 70 | |||
DDE5FF551B74F6F4E016D7AB22311B6A 71 | |||
B0E93521333FD7BAB4762CCB4D8008D8 72 | |||
381469C4C3F91B9633638E4D5F3DF029 73 | |||
FA486AD98E6716EF6AB087F589457F2A 74 | |||
321A091250148A3E963DEA025932E18F 75 | |||
4B00BE29BCB02864CEFD43A96FD95CED 76 | |||
577DC4FF0244E28091F4CA0A7569FDA8 77 | |||
835336C61803E43E4EB30F6B6E799B7A 78 | |||
5C9265FD7B596AA37A2F509D85E927F8 79 | |||
9A39FB89DF55B2601424CEA6D9650A9D 7A | |||
8B75BE91A8C75AD2D7A594A01CBB9591 7B | |||
95C21B8D05ACF5EC5AEE77812395C4D7 7C | |||
B9A461643633FA5D9488E2D3281E01A2 7D | |||
B8B084FB9F4CFAF730FE7325A2AB897D 7E | |||
5F8C179FC1B21DF1F6367A9CF7D3D47C 7F | |||
</pre> | |||
Table with each key indexed: | |||
<pre> | |||
u8 kirk7_key00[] = {0x2C, 0x92, 0xE5, 0x90, 0x2B, 0x86, 0xC1, 0x06, 0xB7, 0x2E, 0xEA, 0x6C, 0xD4, 0xEC, 0x72, 0x48}; | |||
u8 kirk7_key01[] = {0x05, 0x8D, 0xC8, 0x0B, 0x33, 0xA5, 0xBF, 0x9D, 0x56, 0x98, 0xFA, 0xE0, 0xD3, 0x71, 0x5E, 0x1F}; | |||
u8 kirk7_key02[] = {0xB8, 0x13, 0xC3, 0x5E, 0xC6, 0x44, 0x41, 0xE3, 0xDC, 0x3C, 0x16, 0xF5, 0xB4, 0x5E, 0x64, 0x84}; // New from PS3 | |||
u8 kirk7_key03[] = {0x98, 0x02, 0xC4, 0xE6, 0xEC, 0x9E, 0x9E, 0x2F, 0xFC, 0x63, 0x4C, 0xE4, 0x2F, 0xBB, 0x46, 0x68}; | |||
u8 kirk7_key04[] = {0x99, 0x24, 0x4C, 0xD2, 0x58, 0xF5, 0x1B, 0xCB, 0xB0, 0x61, 0x9C, 0xA7, 0x38, 0x30, 0x07, 0x5F}; | |||
u8 kirk7_key05[] = {0x02, 0x25, 0xD7, 0xBA, 0x63, 0xEC, 0xB9, 0x4A, 0x9D, 0x23, 0x76, 0x01, 0xB3, 0xF6, 0xAC, 0x17}; | |||
u8 kirk7_key06[] = {0x60, 0x99, 0xF2, 0x81, 0x70, 0x56, 0x0E, 0x5F, 0x74, 0x7C, 0xB5, 0x20, 0xC0, 0xCD, 0xC2, 0x3C}; // New from PS3 | |||
u8 kirk7_key07[] = {0x76, 0x36, 0x8B, 0x43, 0x8F, 0x77, 0xD8, 0x7E, 0xFE, 0x5F, 0xB6, 0x11, 0x59, 0x39, 0x88, 0x5C}; | |||
u8 kirk7_key08[] = {0x14, 0xA1, 0x15, 0xEB, 0x43, 0x4A, 0x1B, 0xA4, 0x90, 0x5E, 0x03, 0xB6, 0x17, 0xA1, 0x5C, 0x04}; | |||
u8 kirk7_key09[] = {0xE6, 0x58, 0x03, 0xD9, 0xA7, 0x1A, 0xA8, 0x7F, 0x05, 0x9D, 0x22, 0x9D, 0xAF, 0x54, 0x53, 0xD0}; | |||
u8 kirk7_key0A[] = {0xBA, 0x34, 0x80, 0xB4, 0x28, 0xA7, 0xCA, 0x5F, 0x21, 0x64, 0x12, 0xF7, 0x0F, 0xBB, 0x73, 0x23}; | |||
u8 kirk7_key0B[] = {0x72, 0xAD, 0x35, 0xAC, 0x9A, 0xC3, 0x13, 0x0A, 0x77, 0x8C, 0xB1, 0x9D, 0x88, 0x55, 0x0B, 0x0C}; | |||
u8 kirk7_key0C[] = {0x84, 0x85, 0xC8, 0x48, 0x75, 0x08, 0x43, 0xBC, 0x9B, 0x9A, 0xEC, 0xA7, 0x9C, 0x7F, 0x60, 0x18}; | |||
u8 kirk7_key0D[] = {0xB5, 0xB1, 0x6E, 0xDE, 0x23, 0xA9, 0x7B, 0x0E, 0xA1, 0x7C, 0xDB, 0xA2, 0xDC, 0xDE, 0xC4, 0x6E}; | |||
u8 kirk7_key0E[] = {0xC8, 0x71, 0xFD, 0xB3, 0xBC, 0xC5, 0xD2, 0xF2, 0xE2, 0xD7, 0x72, 0x9D, 0xDF, 0x82, 0x68, 0x82}; | |||
u8 kirk7_key0F[] = {0x0A, 0xBB, 0x33, 0x6C, 0x96, 0xD4, 0xCD, 0xD8, 0xCB, 0x5F, 0x4B, 0xE0, 0xBA, 0xDB, 0x9E, 0x03}; | |||
u8 kirk7_key10[] = {0x32, 0x29, 0x5B, 0xD5, 0xEA, 0xF7, 0xA3, 0x42, 0x16, 0xC8, 0x8E, 0x48, 0xFF, 0x50, 0xD3, 0x71}; | |||
u8 kirk7_key11[] = {0x46, 0xF2, 0x5E, 0x8E, 0x4D, 0x2A, 0xA5, 0x40, 0x73, 0x0B, 0xC4, 0x6E, 0x47, 0xEE, 0x6F, 0x0A}; | |||
u8 kirk7_key12[] = {0x5D, 0xC7, 0x11, 0x39, 0xD0, 0x19, 0x38, 0xBC, 0x02, 0x7F, 0xDD, 0xDC, 0xB0, 0x83, 0x7D, 0x9D}; | |||
u8 kirk7_key13[] = {0x51, 0xDD, 0x65, 0xF0, 0x71, 0xA4, 0xE5, 0xEA, 0x6A, 0xAF, 0x12, 0x19, 0x41, 0x29, 0xB8, 0xF4}; | |||
u8 kirk7_key14[] = {0x03, 0x76, 0x3C, 0x68, 0x65, 0xC6, 0x9B, 0x0F, 0xFE, 0x8F, 0xD8, 0xEE, 0xA4, 0x36, 0x16, 0xA0}; | |||
u8 kirk7_key15[] = {0x7D, 0x50, 0xB8, 0x5C, 0xAF, 0x67, 0x69, 0xF0, 0xE5, 0x4A, 0xA8, 0x09, 0x8B, 0x0E, 0xBE, 0x1C}; | |||
u8 kirk7_key16[] = {0x72, 0x68, 0x4B, 0x32, 0xAC, 0x3B, 0x33, 0x2F, 0x2A, 0x7A, 0xFC, 0x9E, 0x14, 0xD5, 0x6F, 0x6B}; | |||
u8 kirk7_key17[] = {0x20, 0x1D, 0x31, 0x96, 0x4A, 0xD9, 0x9F, 0xBF, 0x32, 0xD5, 0xD6, 0x1C, 0x49, 0x1B, 0xD9, 0xFC}; | |||
u8 kirk7_key18[] = {0xF8, 0xD8, 0x44, 0x63, 0xD6, 0x10, 0xD1, 0x2A, 0x44, 0x8E, 0x96, 0x90, 0xA6, 0xBB, 0x0B, 0xAD}; | |||
u8 kirk7_key19[] = {0x5C, 0xD4, 0x05, 0x7F, 0xA1, 0x30, 0x60, 0x44, 0x0A, 0xD9, 0xB6, 0x74, 0x5F, 0x24, 0x4F, 0x4E}; | |||
u8 kirk7_key1A[] = {0xF4, 0x8A, 0xD6, 0x78, 0x59, 0x9C, 0x22, 0xC1, 0xD4, 0x11, 0x93, 0x3D, 0xF8, 0x45, 0xB8, 0x93}; | |||
u8 kirk7_key1B[] = {0xCA, 0xE7, 0xD2, 0x87, 0xA2, 0xEC, 0xC1, 0xCD, 0x94, 0x54, 0x2B, 0x5E, 0x1D, 0x94, 0x88, 0xB2}; | |||
u8 kirk7_key1C[] = {0xDE, 0x26, 0xD3, 0x7A, 0x39, 0x95, 0x6C, 0x2A, 0xD8, 0xC3, 0xA6, 0xAF, 0x21, 0xEB, 0xB3, 0x01}; | |||
u8 kirk7_key1D[] = {0x7C, 0xB6, 0x8B, 0x4D, 0xA3, 0x8D, 0x1D, 0xD9, 0x32, 0x67, 0x9C, 0xA9, 0x9F, 0xFB, 0x28, 0x52}; | |||
u8 kirk7_key1E[] = {0xA0, 0xB5, 0x56, 0xB4, 0x69, 0xAB, 0x36, 0x8F, 0x36, 0xDE, 0xC9, 0x09, 0x2E, 0xCB, 0x41, 0xB1}; | |||
u8 kirk7_key1F[] = {0x93, 0x9D, 0xE1, 0x9B, 0x72, 0x5F, 0xEE, 0xE2, 0x45, 0x2A, 0xBC, 0x17, 0x06, 0xD1, 0x47, 0x69}; | |||
u8 kirk7_key20[] = {0xA4, 0xA4, 0xE6, 0x21, 0x38, 0x2E, 0xF1, 0xAF, 0x7B, 0x17, 0x7A, 0xE8, 0x42, 0xAD, 0x00, 0x31}; | |||
u8 kirk7_key21[] = {0xC3, 0x7F, 0x13, 0xE8, 0xCF, 0x84, 0xDB, 0x34, 0x74, 0x7B, 0xC3, 0xA0, 0xF1, 0x9D, 0x3A, 0x73}; | |||
u8 kirk7_key22[] = {0x2B, 0xF7, 0x83, 0x8A, 0xD8, 0x98, 0xE9, 0x5F, 0xA5, 0xF9, 0x01, 0xDA, 0x61, 0xFE, 0x35, 0xBB}; | |||
u8 kirk7_key23[] = {0xC7, 0x04, 0x62, 0x1E, 0x71, 0x4A, 0x66, 0xEA, 0x62, 0xE0, 0x4B, 0x20, 0x3D, 0xB8, 0xC2, 0xE5}; | |||
u8 kirk7_key24[] = {0xC9, 0x33, 0x85, 0x9A, 0xAB, 0x00, 0xCD, 0xCE, 0x4D, 0x8B, 0x8E, 0x9F, 0x3D, 0xE6, 0xC0, 0x0F}; | |||
u8 kirk7_key25[] = {0x18, 0x42, 0x56, 0x1F, 0x2B, 0x5F, 0x34, 0xE3, 0x51, 0x3E, 0xB7, 0x89, 0x77, 0x43, 0x1A, 0x65}; | |||
== | u8 kirk7_key26[] = {0xDC, 0xB0, 0xA0, 0x06, 0x5A, 0x50, 0xA1, 0x4E, 0x59, 0xAC, 0x97, 0x3F, 0x17, 0x58, 0xA3, 0xA3}; | ||
u8 kirk7_key27[] = {0xC4, 0xDB, 0xAE, 0x83, 0xE2, 0x9C, 0xF2, 0x54, 0xA3, 0xDD, 0x37, 0x4E, 0x80, 0x7B, 0xF4, 0x25}; | |||
u8 kirk7_key28[] = {0xBF, 0xAE, 0xEB, 0x49, 0x82, 0x65, 0xC5, 0x7C, 0x64, 0xB8, 0xC1, 0x7E, 0x19, 0x06, 0x44, 0x09}; | |||
u8 kirk7_key29[] = {0x79, 0x7C, 0xEC, 0xC3, 0xB3, 0xEE, 0x0A, 0xC0, 0x3B, 0xD8, 0xE6, 0xC1, 0xE0, 0xA8, 0xB1, 0xA4}; | |||
u8 kirk7_key2A[] = {0x75, 0x34, 0xFE, 0x0B, 0xD6, 0xD0, 0xC2, 0x8D, 0x68, 0xD4, 0xE0, 0x2A, 0xE7, 0xD5, 0xD1, 0x55}; | |||
u8 kirk7_key2B[] = {0xFA, 0xB3, 0x53, 0x26, 0x97, 0x4F, 0x4E, 0xDF, 0xE4, 0xC3, 0xA8, 0x14, 0xC3, 0x2F, 0x0F, 0x88}; | |||
u8 kirk7_key2C[] = {0xEC, 0x97, 0xB3, 0x86, 0xB4, 0x33, 0xC6, 0xBF, 0x4E, 0x53, 0x9D, 0x95, 0xEB, 0xB9, 0x79, 0xE4}; | |||
u8 kirk7_key2D[] = {0xB3, 0x20, 0xA2, 0x04, 0xCF, 0x48, 0x06, 0x29, 0xB5, 0xDD, 0x8E, 0xFC, 0x98, 0xD4, 0x17, 0x7B}; | |||
u8 kirk7_key2E[] = {0x5D, 0xFC, 0x0D, 0x4F, 0x2C, 0x39, 0xDA, 0x68, 0x4A, 0x33, 0x74, 0xED, 0x49, 0x58, 0xA7, 0x3A}; | |||
u8 kirk7_key2F[] = {0xD7, 0x5A, 0x54, 0x22, 0xCE, 0xD9, 0xA3, 0xD6, 0x2B, 0x55, 0x7D, 0x8D, 0xE8, 0xBE, 0xC7, 0xEC}; | |||
u8 kirk7_key30[] = {0x6B, 0x4A, 0xEE, 0x43, 0x45, 0xAE, 0x70, 0x07, 0xCF, 0x8D, 0xCF, 0x4E, 0x4A, 0xE9, 0x3C, 0xFA}; | |||
u8 kirk7_key31[] = {0x2B, 0x52, 0x2F, 0x66, 0x4C, 0x2D, 0x11, 0x4C, 0xFE, 0x61, 0x31, 0x8C, 0x56, 0x78, 0x4E, 0xA6}; | |||
u8 kirk7_key32[] = {0x3A, 0xA3, 0x4E, 0x44, 0xC6, 0x6F, 0xAF, 0x7B, 0xFA, 0xE5, 0x53, 0x27, 0xEF, 0xCF, 0xCC, 0x24}; | |||
u8 kirk7_key33[] = {0x2B, 0x5C, 0x78, 0xBF, 0xC3, 0x8E, 0x49, 0x9D, 0x41, 0xC3, 0x3C, 0x5C, 0x7B, 0x27, 0x96, 0xCE}; | |||
u8 kirk7_key34[] = {0xF3, 0x7E, 0xEA, 0xD2, 0xC0, 0xC8, 0x23, 0x1D, 0xA9, 0x9B, 0xFA, 0x49, 0x5D, 0xB7, 0x08, 0x1B}; | |||
u8 kirk7_key35[] = {0x70, 0x8D, 0x4E, 0x6F, 0xD1, 0xF6, 0x6F, 0x1D, 0x1E, 0x1F, 0xCB, 0x02, 0xF9, 0xB3, 0x99, 0x26}; | |||
u8 kirk7_key36[] = {0x0F, 0x67, 0x16, 0xE1, 0x80, 0x69, 0x9C, 0x51, 0xFC, 0xC7, 0xAD, 0x6E, 0x4F, 0xB8, 0x46, 0xC9}; | |||
u8 kirk7_key37[] = {0x56, 0x0A, 0x49, 0x4A, 0x84, 0x4C, 0x8E, 0xD9, 0x82, 0xEE, 0x0B, 0x6D, 0xC5, 0x7D, 0x20, 0x8D}; | |||
= | u8 kirk7_key38[] = {0x12, 0x46, 0x8D, 0x7E, 0x1C, 0x42, 0x20, 0x9B, 0xBA, 0x54, 0x26, 0x83, 0x5E, 0xB0, 0x33, 0x03}; | ||
u8 kirk7_key39[] = {0xC4, 0x3B, 0xB6, 0xD6, 0x53, 0xEE, 0x67, 0x49, 0x3E, 0xA9, 0x5F, 0xBC, 0x0C, 0xED, 0x6F, 0x8A}; | |||
== | u8 kirk7_key3A[] = {0x2C, 0xC3, 0xCF, 0x8C, 0x28, 0x78, 0xA5, 0xA6, 0x63, 0xE2, 0xAF, 0x2D, 0x71, 0x5E, 0x86, 0xBA}; | ||
u8 kirk7_key3B[] = {0x83, 0x3D, 0xA7, 0x0C, 0xED, 0x6A, 0x20, 0x12, 0xD1, 0x96, 0xE6, 0xFE, 0x5C, 0x4D, 0x37, 0xC5}; | |||
u8 kirk7_key3C[] = {0xC7, 0x43, 0xD0, 0x67, 0x42, 0xEE, 0x90, 0xB8, 0xCA, 0x75, 0x50, 0x35, 0x20, 0xAD, 0xBC, 0xCE}; | |||
u8 kirk7_key3D[] = {0x8A, 0xE3, 0x66, 0x3F, 0x8D, 0x9E, 0x82, 0xA1, 0xED, 0xE6, 0x8C, 0x9C, 0xE8, 0x25, 0x6D, 0xAA}; | |||
u8 kirk7_key3E[] = {0x7F, 0xC9, 0x6F, 0x0B, 0xB1, 0x48, 0x5C, 0xA5, 0x5D, 0xD3, 0x64, 0xB7, 0x7A, 0xF5, 0xE4, 0xEA}; | |||
u8 kirk7_key3F[] = {0x91, 0xB7, 0x65, 0x78, 0x8B, 0xCB, 0x8B, 0xD4, 0x02, 0xED, 0x55, 0x3A, 0x66, 0x62, 0xD0, 0xAD}; | |||
u8 kirk7_key40[] = {0x28, 0x24, 0xF9, 0x10, 0x1B, 0x8D, 0x0F, 0x7B, 0x6E, 0xB2, 0x63, 0xB5, 0xB5, 0x5B, 0x2E, 0xBB}; | |||
u8 kirk7_key41[] = {0x30, 0xE2, 0x57, 0x5D, 0xE0, 0xA2, 0x49, 0xCE, 0xE8, 0xCF, 0x2B, 0x5E, 0x4D, 0x9F, 0x52, 0xC7}; | |||
== | u8 kirk7_key42[] = {0x5E, 0xE5, 0x04, 0x39, 0x62, 0x32, 0x02, 0xFA, 0x85, 0x39, 0x3F, 0x72, 0xBB, 0x77, 0xFD, 0x1A}; | ||
u8 kirk7_key43[] = {0xF8, 0x81, 0x74, 0xB1, 0xBD, 0xE9, 0xBF, 0xDD, 0x45, 0xE2, 0xF5, 0x55, 0x89, 0xCF, 0x46, 0xAB}; | |||
u8 kirk7_key44[] = {0x7D, 0xF4, 0x92, 0x65, 0xE3, 0xFA, 0xD6, 0x78, 0xD6, 0xFE, 0x78, 0xAD, 0xBB, 0x3D, 0xFB, 0x63}; // New from PS3 | |||
u8 kirk7_key45[] = {0x74, 0x7F, 0xD6, 0x2D, 0xC7, 0xA1, 0xCA, 0x96, 0xE2, 0x7A, 0xCE, 0xFF, 0xAA, 0x72, 0x3F, 0xF7}; | |||
=== | u8 kirk7_key46[] = {0x1E, 0x58, 0xEB, 0xD0, 0x65, 0xBB, 0xF1, 0x68, 0xC5, 0xBD, 0xF7, 0x46, 0xBA, 0x7B, 0xE1, 0x00}; | ||
u8 kirk7_key47[] = {0x24, 0x34, 0x7D, 0xAF, 0x5E, 0x4B, 0x35, 0x72, 0x7A, 0x52, 0x27, 0x6B, 0xA0, 0x54, 0x74, 0xDB}; | |||
u8 kirk7_key48[] = {0x09, 0xB1, 0xC7, 0x05, 0xC3, 0x5F, 0x53, 0x66, 0x77, 0xC0, 0xEB, 0x36, 0x77, 0xDF, 0x83, 0x07}; | |||
u8 kirk7_key49[] = {0xCC, 0xBE, 0x61, 0x5C, 0x05, 0xA2, 0x00, 0x33, 0x37, 0x8E, 0x59, 0x64, 0xA7, 0xDD, 0x70, 0x3D}; | |||
== | u8 kirk7_key4A[] = {0x0D, 0x47, 0x50, 0xBB, 0xFC, 0xB0, 0x02, 0x81, 0x30, 0xE1, 0x84, 0xDE, 0xA8, 0xD4, 0x84, 0x13}; | ||
u8 kirk7_key4B[] = {0x0C, 0xFD, 0x67, 0x9A, 0xF9, 0xB4, 0x72, 0x4F, 0xD7, 0x8D, 0xD6, 0xE9, 0x96, 0x42, 0x28, 0x8B}; // 1.xx game eboot.bin | |||
u8 kirk7_key4C[] = {0x7A, 0xD3, 0x1A, 0x8B, 0x4B, 0xEF, 0xC2, 0xC2, 0xB3, 0x99, 0x01, 0xA9, 0xFE, 0x76, 0xB9, 0x87}; | |||
u8 kirk7_key4D[] = {0xBE, 0x78, 0x78, 0x17, 0xC7, 0xF1, 0x6F, 0x1A, 0xE0, 0xEF, 0x3B, 0xDE, 0x4C, 0xC2, 0xD7, 0x86}; | |||
== | u8 kirk7_key4E[] = {0x7C, 0xD8, 0xB8, 0x91, 0x91, 0x0A, 0x43, 0x14, 0xD0, 0x53, 0x3D, 0xD8, 0x4C, 0x45, 0xBE, 0x16}; | ||
u8 kirk7_key4F[] = {0x32, 0x72, 0x2C, 0x88, 0x07, 0xCF, 0x35, 0x7D, 0x4A, 0x2F, 0x51, 0x19, 0x44, 0xAE, 0x68, 0xDA}; | |||
u8 kirk7_key50[] = {0x7E, 0x6B, 0xBF, 0xF6, 0xF6, 0x87, 0xB8, 0x98, 0xEE, 0xB5, 0x1B, 0x32, 0x16, 0xE4, 0x6E, 0x5D}; | |||
u8 kirk7_key51[] = {0x08, 0xEA, 0x5A, 0x83, 0x49, 0xB5, 0x9D, 0xB5, 0x3E, 0x07, 0x79, 0xB1, 0x9A, 0x59, 0xA3, 0x54}; | |||
== | u8 kirk7_key52[] = {0xF3, 0x12, 0x81, 0xBF, 0xE6, 0x9F, 0x51, 0xD1, 0x64, 0x08, 0x25, 0x21, 0xFF, 0xBB, 0x22, 0x61}; | ||
u8 kirk7_key53[] = {0xAF, 0xFE, 0x8E, 0xB1, 0x3D, 0xD1, 0x7E, 0xD8, 0x0A, 0x61, 0x24, 0x1C, 0x95, 0x92, 0x56, 0xB6}; | |||
u8 kirk7_key54[] = {0x92, 0xCD, 0xB4, 0xC2, 0x5B, 0xF2, 0x35, 0x5A, 0x23, 0x09, 0xE8, 0x19, 0xC9, 0x14, 0x42, 0x35}; | |||
u8 kirk7_key55[] = {0xE1, 0xC6, 0x5B, 0x22, 0x6B, 0xE1, 0xDA, 0x02, 0xBA, 0x18, 0xFA, 0x21, 0x34, 0x9E, 0xF9, 0x6D}; | |||
== | u8 kirk7_key56[] = {0x14, 0xEC, 0x76, 0xCE, 0x97, 0xF3, 0x8A, 0x0A, 0x34, 0x50, 0x6C, 0x53, 0x9A, 0x5C, 0x9A, 0xB4}; | ||
u8 kirk7_key57[] = {0x1C, 0x9B, 0xC4, 0x90, 0xE3, 0x06, 0x64, 0x81, 0xFA, 0x59, 0xFD, 0xB6, 0x00, 0xBB, 0x28, 0x70}; | |||
u8 kirk7_key58[] = {0x43, 0xA5, 0xCA, 0xCC, 0x0D, 0x6C, 0x2D, 0x3F, 0x2B, 0xD9, 0x89, 0x67, 0x6B, 0x3F, 0x7F, 0x57}; | |||
u8 kirk7_key59[] = {0x00, 0xEF, 0xFD, 0x18, 0x08, 0xA4, 0x05, 0x89, 0x3C, 0x38, 0xFB, 0x25, 0x72, 0x70, 0x61, 0x06}; | |||
= | u8 kirk7_key5A[] = {0xEE, 0xAF, 0x49, 0xE0, 0x09, 0x87, 0x9B, 0xEF, 0xAA, 0xD6, 0x32, 0x6A, 0x32, 0x13, 0xC4, 0x29}; | ||
u8 kirk7_key5B[] = {0x8D, 0x26, 0xB9, 0x0F, 0x43, 0x1D, 0xBB, 0x08, 0xDB, 0x1D, 0xDA, 0xC5, 0xB5, 0x2C, 0x92, 0xED}; | |||
u8 kirk7_key5C[] = {0x57, 0x7C, 0x30, 0x60, 0xAE, 0x6E, 0xBE, 0xAE, 0x3A, 0xAB, 0x18, 0x19, 0xC5, 0x71, 0x68, 0x0B}; | |||
u8 kirk7_key5D[] = {0x11, 0x5A, 0x5D, 0x20, 0xD5, 0x3A, 0x8D, 0xD3, 0x9C, 0xC5, 0xAF, 0x41, 0x0F, 0x0F, 0x18, 0x6F}; | |||
u8 kirk7_key5E[] = {0x0D, 0x4D, 0x51, 0xAB, 0x23, 0x79, 0xBF, 0x80, 0x3A, 0xBF, 0xB9, 0x0E, 0x75, 0xFC, 0x14, 0xBF}; | |||
u8 kirk7_key5F[] = {0x99, 0x93, 0xDA, 0x3E, 0x7D, 0x2E, 0x5B, 0x15, 0xF2, 0x52, 0xA4, 0xE6, 0x6B, 0xB8, 0x5A, 0x98}; | |||
u8 kirk7_key60[] = {0xF4, 0x28, 0x30, 0xA5, 0xFB, 0x0D, 0x8D, 0x76, 0x0E, 0xA6, 0x71, 0xC2, 0x2B, 0xDE, 0x66, 0x9D}; | |||
u8 kirk7_key61[] = {0xFB, 0x5F, 0xEB, 0x7F, 0xC7, 0xDC, 0xDD, 0x69, 0x37, 0x01, 0x97, 0x9B, 0x29, 0x03, 0x5C, 0x47}; | |||
u8 kirk7_key62[] = {0x02, 0x32, 0x6A, 0xE7, 0xD3, 0x96, 0xCE, 0x7F, 0x1C, 0x41, 0x9D, 0xD6, 0x52, 0x07, 0xED, 0x09}; | |||
u8 kirk7_key63[] = {0x9C, 0x9B, 0x13, 0x72, 0xF8, 0xC6, 0x40, 0xCF, 0x1C, 0x62, 0xF5, 0xD5, 0x92, 0xDD, 0xB5, 0x82}; | |||
u8 kirk7_key64[] = {0x03, 0xB3, 0x02, 0xE8, 0x5F, 0xF3, 0x81, 0xB1, 0x3B, 0x8D, 0xAA, 0x2A, 0x90, 0xFF, 0x5E, 0x61}; | |||
u8 kirk7_key65[] = {0xBC, 0xD7, 0xF9, 0xD3, 0x2F, 0xAC, 0xF8, 0x47, 0xC0, 0xFB, 0x4D, 0x2F, 0x30, 0x9A, 0xBD, 0xA6}; | |||
u8 kirk7_key66[] = {0xF5, 0x55, 0x96, 0xE9, 0x7F, 0xAF, 0x86, 0x7F, 0xAC, 0xB3, 0x3A, 0xE6, 0x9C, 0x8B, 0x6F, 0x93}; | |||
u8 kirk7_key67[] = {0xEE, 0x29, 0x70, 0x93, 0xF9, 0x4E, 0x44, 0x59, 0x44, 0x17, 0x1F, 0x8E, 0x86, 0xE1, 0x70, 0xFC}; | |||
u8 kirk7_key68[] = {0xE4, 0x34, 0x52, 0x0C, 0xF0, 0x88, 0xCF, 0xC8, 0xCD, 0x78, 0x1B, 0x6C, 0xCF, 0x8C, 0x48, 0xC4}; | |||
u8 kirk7_key69[] = {0xC1, 0xBF, 0x66, 0x81, 0x8E, 0xF9, 0x53, 0xF2, 0xE1, 0x26, 0x6B, 0x6F, 0x55, 0x0C, 0xC9, 0xCD}; | |||
u8 kirk7_key6A[] = {0x56, 0x0F, 0xFF, 0x8F, 0x3C, 0x96, 0x49, 0x14, 0x45, 0x16, 0xF1, 0xBC, 0xBF, 0xCE, 0xA3, 0x0C}; | |||
u8 kirk7_key6B[] = {0x24, 0x08, 0xDC, 0x75, 0x37, 0x60, 0xA2, 0x9F, 0x05, 0x54, 0xB5, 0xF2, 0x43, 0x85, 0x73, 0x99}; | |||
u8 kirk7_key6C[] = {0xDD, 0xD5, 0xB5, 0x6A, 0x59, 0xC5, 0x5A, 0xE8, 0x3B, 0x96, 0x67, 0xC7, 0x5C, 0x2A, 0xE2, 0xDC}; | |||
u8 kirk7_key6D[] = {0xAA, 0x68, 0x67, 0x72, 0xE0, 0x2D, 0x44, 0xD5, 0xCD, 0xBB, 0x65, 0x04, 0xBC, 0xD5, 0xBF, 0x4E}; | |||
u8 kirk7_key6E[] = {0x1F, 0x17, 0xF0, 0x14, 0xE7, 0x77, 0xA2, 0xFE, 0x4B, 0x13, 0x6B, 0x56, 0xCD, 0x7E, 0xF7, 0xE9}; | |||
u8 kirk7_key6F[] = {0xC9, 0x35, 0x48, 0xCF, 0x55, 0x8D, 0x75, 0x03, 0x89, 0x6B, 0x2E, 0xEB, 0x61, 0x8C, 0xA9, 0x02}; | |||
u8 kirk7_key70[] = {0xDE, 0x34, 0xC5, 0x41, 0xE7, 0xCA, 0x86, 0xE8, 0xBE, 0xA7, 0xC3, 0x1C, 0xEC, 0xE4, 0x36, 0x0F}; | |||
u8 kirk7_key71[] = {0xDD, 0xE5, 0xFF, 0x55, 0x1B, 0x74, 0xF6, 0xF4, 0xE0, 0x16, 0xD7, 0xAB, 0x22, 0x31, 0x1B, 0x6A}; | |||
u8 kirk7_key72[] = {0xB0, 0xE9, 0x35, 0x21, 0x33, 0x3F, 0xD7, 0xBA, 0xB4, 0x76, 0x2C, 0xCB, 0x4D, 0x80, 0x08, 0xD8}; | |||
u8 kirk7_key73[] = {0x38, 0x14, 0x69, 0xC4, 0xC3, 0xF9, 0x1B, 0x96, 0x33, 0x63, 0x8E, 0x4D, 0x5F, 0x3D, 0xF0, 0x29}; | |||
u8 kirk7_key74[] = {0xFA, 0x48, 0x6A, 0xD9, 0x8E, 0x67, 0x16, 0xEF, 0x6A, 0xB0, 0x87, 0xF5, 0x89, 0x45, 0x7F, 0x2A}; | |||
u8 kirk7_key75[] = {0x32, 0x1A, 0x09, 0x12, 0x50, 0x14, 0x8A, 0x3E, 0x96, 0x3D, 0xEA, 0x02, 0x59, 0x32, 0xE1, 0x8F}; | |||
u8 kirk7_key76[] = {0x4B, 0x00, 0xBE, 0x29, 0xBC, 0xB0, 0x28, 0x64, 0xCE, 0xFD, 0x43, 0xA9, 0x6F, 0xD9, 0x5C, 0xED}; | |||
u8 kirk7_key77[] = {0x57, 0x7D, 0xC4, 0xFF, 0x02, 0x44, 0xE2, 0x80, 0x91, 0xF4, 0xCA, 0x0A, 0x75, 0x69, 0xFD, 0xA8}; | |||
u8 kirk7_key78[] = {0x83, 0x53, 0x36, 0xC6, 0x18, 0x03, 0xE4, 0x3E, 0x4E, 0xB3, 0x0F, 0x6B, 0x6E, 0x79, 0x9B, 0x7A}; | |||
u8 kirk7_key79[] = {0x5C, 0x92, 0x65, 0xFD, 0x7B, 0x59, 0x6A, 0xA3, 0x7A, 0x2F, 0x50, 0x9D, 0x85, 0xE9, 0x27, 0xF8}; | |||
u8 kirk7_key7A[] = {0x9A, 0x39, 0xFB, 0x89, 0xDF, 0x55, 0xB2, 0x60, 0x14, 0x24, 0xCE, 0xA6, 0xD9, 0x65, 0x0A, 0x9D}; | |||
u8 kirk7_key7B[] = {0x8B, 0x75, 0xBE, 0x91, 0xA8, 0xC7, 0x5A, 0xD2, 0xD7, 0xA5, 0x94, 0xA0, 0x1C, 0xBB, 0x95, 0x91}; | |||
u8 kirk7_key7C[] = {0x95, 0xC2, 0x1B, 0x8D, 0x05, 0xAC, 0xF5, 0xEC, 0x5A, 0xEE, 0x77, 0x81, 0x23, 0x95, 0xC4, 0xD7}; | |||
u8 kirk7_key7D[] = {0xB9, 0xA4, 0x61, 0x64, 0x36, 0x33, 0xFA, 0x5D, 0x94, 0x88, 0xE2, 0xD3, 0x28, 0x1E, 0x01, 0xA2}; | |||
u8 kirk7_key7E[] = {0xB8, 0xB0, 0x84, 0xFB, 0x9F, 0x4C, 0xFA, 0xF7, 0x30, 0xFE, 0x73, 0x25, 0xA2, 0xAB, 0x89, 0x7D}; | |||
u8 kirk7_key7F[] = {0x5F, 0x8C, 0x17, 0x9F, 0xC1, 0xB2, 0x1D, 0xF1, 0xF6, 0x36, 0x7A, 0x9C, 0xF7, 0xD3, 0xD4, 0x7C}; | |||
u8 kirk7_key80[] = {0x83, 0xFF, 0xF1, 0x49, 0xA6, 0x87, 0xA5, 0xC5, 0xCD, 0x95, 0x77, 0x93, 0x52, 0xC8, 0xBF, 0x66}; // New kirk Service, Only on PS Vita | |||
u8 kirk7_key81[] = {0xD8, 0x3D, 0x2D, 0x27, 0x7C, 0xE2, 0xDE, 0x15, 0x4A, 0x4E, 0x2A, 0xA6, 0xD1, 0xE8, 0xD2, 0x0B}; // New kirk Service, Only on PS Vita | |||
u8 kirk7_key82[] = {0x4C, 0x5C, 0x71, 0x51, 0x9F, 0x62, 0xA5, 0xFE, 0x5E, 0xF3, 0x6D, 0x4B, 0x07, 0x5B, 0xE2, 0xF3}; // New kirk Service, Only on PS Vita | |||
u8 kirk7_key83[] = {0x80, 0x05, 0xEF, 0x43, 0x12, 0x4F, 0x65, 0x0A, 0x9D, 0xF1, 0x58, 0xF7, 0x2A, 0x50, 0x9C, 0x10}; // New kirk Service, Only on PS Vita | |||
u8 kirk7_keyC0[] = {0xBF, 0x57, 0xAE, 0xF0, 0x2D, 0xC5, 0x87, 0xF3, 0x27, 0xC8, 0xC3, 0xF8, 0xBD, 0xEC, 0xA5, 0xEE}; // New kirk Service, Only on PS Vita | |||
u8 kirk7_keyC1[] = {0x9F, 0xFF, 0x2E, 0xEC, 0xED, 0x84, 0x76, 0xD9, 0x00, 0xDF, 0xD5, 0x79, 0xE1, 0xAA, 0xAB, 0x63}; // New kirk Service, Only on PS Vita | |||
u8 kirk7_keyC2[] = {0x04, 0x46, 0x0D, 0x61, 0xF5, 0x63, 0xD4, 0x6C, 0x0C, 0x4E, 0xB9, 0xAA, 0xE5, 0x46, 0x6E, 0x84}; // New kirk Service, Only on PS Vita | |||
u8 kirk7_keyC3[] = {0x1E, 0x5B, 0x17, 0xDA, 0xC3, 0x21, 0xE6, 0xB8, 0xDF, 0xE7, 0x71, 0x8C, 0xA2, 0x93, 0x03, 0x70}; // New kirk Service, Only on PS Vita | |||
</pre> | </pre> | ||
== | == DRM Keys == | ||
public static final int[] drmFixedKey = { 0x38, 0x20, 0xD0, 0x11, 0x07, 0xA3, 0xFF, 0x3E, 0x0A, 0x4C, 0x20, 0x85, 0x39, 0x10, 0xB5, 0x54 }; | |||
public static final int[] drmModuleKey = { 0xBA, 0x87, 0xE4, 0xAB, 0x2C, 0x60, 0x5F, 0x59, 0xB8, 0x3B, 0xDB, 0xA6, 0x82, 0xFD, 0xAE, 0x14 }; | |||
== | public static final int[] drmRifKey = { 0xDA, 0x7D, 0x4B, 0x5E, 0x49, 0x9A, 0x4F, 0x53, 0xB1, 0xC1, 0xA1, 0x4A, 0x74, 0x84, 0x44, 0x3B }; | ||
public static final int[] drmActdatKey = { 0x5E, 0x06, 0xE0, 0x4F, 0xD9, 0x4A, 0x71, 0xBF, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01 }; | |||
Unknown Keys | |||
public static final int[] | public static final int[] drmUnkKey1 = { 0x69, 0xB4, 0x53, 0xF2, 0xE4, 0x21, 0x89, 0x8E, 0x53, 0xE4, 0xA3, 0x5A, 0x5B, 0x91, 0x79, 0x51 }; | ||
public static final int[] | public static final int[] drmUnkKey2 = { 0xF0, 0x79, 0xD5, 0x19, 0x2D, 0x5D, 0xD3, 0x8C, 0xB5, 0x4B, 0x9E, 0xCD, 0xCD, 0xFD, 0xD3, 0xD7 }; | ||
Rename Key | Rename Key | ||
Line 928: | Line 929: | ||
public static final int[] drmkeys_6XX_1 = {0x36, 0xEF, 0x82, 0x4E, 0x74, 0xFB, 0x17, 0x5B, 0x14, 0x14, 0x05, 0xF3, 0xB3, 0x8A, 0x76, 0x18}; | public static final int[] drmkeys_6XX_1 = {0x36, 0xEF, 0x82, 0x4E, 0x74, 0xFB, 0x17, 0x5B, 0x14, 0x14, 0x05, 0xF3, 0xB3, 0x8A, 0x76, 0x18}; | ||
public static final int[] drmkeys_6XX_2 = {0x21, 0x52, 0x5D, 0x76, 0xF6, 0x81, 0x0F, 0x15, 0x2F, 0x4A, 0x40, 0x89, 0x63, 0xA0, 0x10, 0x55}; | public static final int[] drmkeys_6XX_2 = {0x21, 0x52, 0x5D, 0x76, 0xF6, 0x81, 0x0F, 0x15, 0x2F, 0x4A, 0x40, 0x89, 0x63, 0xA0, 0x10, 0x55}; | ||
== PRXDecrypter 144-byte Tag Keys == | == PRXDecrypter 144-byte Tag Keys == | ||
Line 4,925: | Line 4,925: | ||
</pre> | </pre> | ||
== PKG AES Keys == | |||
psp_gpkg_aes_key: 07F2C68290B50D2C33818D709B60E62B | |||
* Location: nas_plugin.sprx , from FW 3.55 cex: sub_36EEC, offset: 0x3724A@elf file | |||
psp_gpkg_aes_idu_key: 7547EE76CA8C55AC1BA8D22535E05593 | |||
* Location: nas_plugin.sprx , from FW 2.60 IDU: FUN_00027f98 | |||
== SDK ARC DES Key == | == SDK ARC DES Key == | ||
* DES encrypted, every 0x200 | * DES encrypted, every 0x200 are reset for the info blocks and every 0x400 are reset for the data blocks. | ||
=== 0.6.5 === | === 0.6.5 === | ||
Line 5,054: | Line 4,949: | ||
IV: 41FBCFDDDE9E5B2C | IV: 41FBCFDDDE9E5B2C | ||
[[Category:Software]]<noinclude>[[Category:Main]]</noinclude> | |||
[[Category:Software]] | |||
<noinclude> | |||
[[Category:Main]] | |||
</noinclude> |