Editing Keys
Jump to navigation
Jump to search
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 28: | Line 28: | ||
<pre> | <pre> | ||
98C940975C1D10E87FE60EA3FD03A8BA | 98C940975C1D10E87FE60EA3FD03A8BA | ||
</pre> | </pre> | ||
Line 656: | Line 632: | ||
=== Spock Master Key (Spock command 9) === | === Spock Master Key (Spock command 9) === | ||
private byte[] PSPSpockMasterKey = new byte[16] { | |||
0x9F, 0x46, 0xF9, 0xFC, 0xFA, 0xB2, 0xAD, 0x05, 0x69, 0xF6, 0x88, 0xD8, 0x79, 0x4B, 0x92, 0xBA | |||
}; | |||
* Located in Kicho & Dencho | * Located in Kicho & Dencho | ||
== PSP IdStorage Keys == | == PSP IdStorage Keys == | ||
=== PSP | === PSP IdStorage Master Key === | ||
//PSP Kirk commands 16 and 18 master key, also used for UMD Keys decryption | |||
private byte[] PSPIDStorageKey = new byte[16] { | |||
0x47, 0x5E, 0x09, 0xF4, 0xA2, 0x37, 0xDA, 0x9B, 0xEF, 0xFF, 0x3B, 0xC0, 0x77, 0x14, 0x3D, 0x8A | |||
}; | |||
* Located in Kicho & Dencho | * Located in Kicho & Dencho | ||
=== PSP IdStorage Certificates ECDSA Public Keys === | === PSP IdStorage Certificates ECDSA Public Keys === | ||
Line 748: | Line 717: | ||
private byte[] PSPAMHashKey4 = new byte[16] { 0x13, 0x5F, 0xA4, 0x7C, 0xAB, 0x39, 0x5B, 0xA4, 0x76, 0xB8, 0xCC, 0xA9, 0x8F, 0x3A, 0x04, 0x45 }; | private byte[] PSPAMHashKey4 = new byte[16] { 0x13, 0x5F, 0xA4, 0x7C, 0xAB, 0x39, 0x5B, 0xA4, 0x76, 0xB8, 0xCC, 0xA9, 0x8F, 0x3A, 0x04, 0x45 }; | ||
private byte[] PSPAMHashKey5 = new byte[16] { 0x67, 0x8D, 0x7F, 0xA3, 0x2A, 0x9C, 0xA0, 0xD1, 0x50, 0x8A, 0xD8, 0x38, 0x5E, 0x4B, 0x01, 0x7E }; | private byte[] PSPAMHashKey5 = new byte[16] { 0x67, 0x8D, 0x7F, 0xA3, 0x2A, 0x9C, 0xA0, 0xD1, 0x50, 0x8A, 0xD8, 0x38, 0x5E, 0x4B, 0x01, 0x7E }; | ||
== PSP Kirk command 1 ECDSA Private Key == | |||
private byte[] kirk_command_1_ecdsa_private_key = new byte[20] = { | |||
0xF3, 0x92, 0xE2, 0x64, 0x90, 0xB8, 0x0F, 0xD8, 0x89, 0xF2, 0xD9, 0x72, 0x2C, 0x1F, 0x34, 0xD7, 0x27, 0x4F, 0x98, 0x3D | |||
}; | |||
== PSP Kirk command 1 ECDSA Public Key == | |||
private byte[] kirk_command_1_ecdsa_pub_key_x = new byte[20] { 0xED, 0x9C, 0xE5, 0x82, 0x34, 0xE6, 0x1A, 0x53, 0xC6, 0x85, 0xD6, 0x4D, 0x51, 0xD0, 0x23, 0x6B, 0xC3, 0xB5, 0xD4, 0xB9 }; | |||
private byte[] kirk_command_1_ecdsa_pub_key_y = new byte[20] { 0x04, 0x9D, 0xF1, 0xA0, 0x75, 0xC0, 0xE0, 0x4F, 0xB3, 0x44, 0x85, 0x8B, 0x61, 0xB7, 0x9B, 0x69, 0xA6, 0x3D, 0x2C, 0x39 }; | |||
private byte[] kirk_command_1_ecdsa_ec_m_header = new byte[20] { 0x7D, 0x7E, 0x46, 0x85, 0x4D, 0x07, 0xFA, 0x0B, 0xC6, 0xE8, 0xED, 0x62, 0x99, 0x89, 0x26, 0x14, 0x39, 0x5F, 0xEA, 0xFC }; | |||
private byte[] kirk_command_1_ecdsa_ec_r_header = new byte[20] { 0x66, 0x4f, 0xe1, 0xf2, 0xe9, 0xd6, 0x63, 0x36, 0xf7, 0x33, 0x0b, 0xca, 0xb9, 0x55, 0x6d, 0xb6, 0xeb, 0xe8, 0x05, 0xdc }; | |||
private byte[] kirk_command_1_ecdsa_ec_m_data = new byte[20] { 0x15, 0xee, 0x16, 0x24, 0x12, 0x09, 0x58, 0x16, 0x0f, 0x8b, 0x1a, 0x21, 0x33, 0x7a, 0x38, 0xf8, 0x29, 0xf7, 0x2e, 0x58 }; | |||
private byte[] kirk_command_1_ecdsa_ec_r_data = new byte[20] { 0xcd, 0xe3, 0x88, 0xa6, 0x3c, 0x1d, 0x57, 0xdc, 0x5e, 0x94, 0xee, 0xac, 0x2e, 0x6c, 0x9f, 0x2e, 0x81, 0xc7, 0x1c, 0x58 }; | |||
== PSP Applications ECDSA Curve == | == PSP Applications ECDSA Curve == | ||
Line 928: | Line 913: | ||
public static final int[] drmkeys_6XX_1 = {0x36, 0xEF, 0x82, 0x4E, 0x74, 0xFB, 0x17, 0x5B, 0x14, 0x14, 0x05, 0xF3, 0xB3, 0x8A, 0x76, 0x18}; | public static final int[] drmkeys_6XX_1 = {0x36, 0xEF, 0x82, 0x4E, 0x74, 0xFB, 0x17, 0x5B, 0x14, 0x14, 0x05, 0xF3, 0xB3, 0x8A, 0x76, 0x18}; | ||
public static final int[] drmkeys_6XX_2 = {0x21, 0x52, 0x5D, 0x76, 0xF6, 0x81, 0x0F, 0x15, 0x2F, 0x4A, 0x40, 0x89, 0x63, 0xA0, 0x10, 0x55}; | public static final int[] drmkeys_6XX_2 = {0x21, 0x52, 0x5D, 0x76, 0xF6, 0x81, 0x0F, 0x15, 0x2F, 0x4A, 0x40, 0x89, 0x63, 0xA0, 0x10, 0x55}; | ||
== PRXDecrypter 144-byte Tag Keys == | == PRXDecrypter 144-byte Tag Keys == | ||
Line 4,931: | Line 4,915: | ||
See [https://www.psdevwiki.com/ps3/edit/Keys#NPDRM_Keys|NPDRM Keys on PS3 Dev Wiki]. | See [https://www.psdevwiki.com/ps3/edit/Keys#NPDRM_Keys|NPDRM Keys on PS3 Dev Wiki]. | ||
== Retail iplloader == | == Retail Lib-PSP iplloader == | ||
=== IPL header Kirk command 1 XOR keys === | === IPL header Kirk command 1 XOR keys === | ||
Line 4,972: | Line 4,956: | ||
</pre> | </pre> | ||
== 3.5.0 DTP-T1000 iplloader == | === Kirk command 1 ECDSA Public Key === | ||
<pre> | |||
BC660611A70BD7F2D140A48215C096D11D2D4112F0E9379AC4E0D387C542D091349DD15169DD5A87 | |||
</pre> | |||
== 3.5.0 DTP-T1000 Lib-PSP iplloader == | |||
=== IPL header Kirk command 1 XOR key === | === IPL header Kirk command 1 XOR key === |