Editing Keys
Jump to navigation
Jump to search
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 23: | Line 23: | ||
== Kirk Keys == | == Kirk Keys == | ||
=== PSP Kirk command 1 AESCBC128-CMAC Key === | === PSP Kirk command 1 AESCBC128-CMAC Key === | ||
Line 61: | Line 47: | ||
</pre> | </pre> | ||
=== PSP Kirk commands 4/7 AES128CBC Keys === | === PSP Kirk commands 4/7 AES128CBC Keys === | ||
Line 670: | Line 650: | ||
=== Spock Master Key (Spock command 9) === | === Spock Master Key (Spock command 9) === | ||
private byte[] PSPSpockMasterKey = new byte[16] { | |||
0x9F, 0x46, 0xF9, 0xFC, 0xFA, 0xB2, 0xAD, 0x05, 0x69, 0xF6, 0x88, 0xD8, 0x79, 0x4B, 0x92, 0xBA | |||
}; | |||
* Located in Kicho & Dencho | * Located in Kicho & Dencho | ||
== PSP IdStorage Keys == | == PSP IdStorage Keys == | ||
=== PSP | === PSP IdStorage Master Key === | ||
//PSP Kirk commands 16 and 18 master key, also used for UMD Keys decryption | |||
private byte[] PSPIDStorageKey = new byte[16] { | |||
0x47, 0x5E, 0x09, 0xF4, 0xA2, 0x37, 0xDA, 0x9B, 0xEF, 0xFF, 0x3B, 0xC0, 0x77, 0x14, 0x3D, 0x8A | |||
}; | |||
* Located in Kicho & Dencho | * Located in Kicho & Dencho | ||
=== PSP IdStorage Certificates ECDSA Public Keys === | === PSP IdStorage Certificates ECDSA Public Keys === | ||
Line 744: | Line 717: | ||
}; | }; | ||
</pre> | </pre> | ||
== PSP Save Data Hash Keys == | == PSP Save Data Hash Keys == | ||
Line 777: | Line 735: | ||
private byte[] PSPAMHashKey4 = new byte[16] { 0x13, 0x5F, 0xA4, 0x7C, 0xAB, 0x39, 0x5B, 0xA4, 0x76, 0xB8, 0xCC, 0xA9, 0x8F, 0x3A, 0x04, 0x45 }; | private byte[] PSPAMHashKey4 = new byte[16] { 0x13, 0x5F, 0xA4, 0x7C, 0xAB, 0x39, 0x5B, 0xA4, 0x76, 0xB8, 0xCC, 0xA9, 0x8F, 0x3A, 0x04, 0x45 }; | ||
private byte[] PSPAMHashKey5 = new byte[16] { 0x67, 0x8D, 0x7F, 0xA3, 0x2A, 0x9C, 0xA0, 0xD1, 0x50, 0x8A, 0xD8, 0x38, 0x5E, 0x4B, 0x01, 0x7E }; | private byte[] PSPAMHashKey5 = new byte[16] { 0x67, 0x8D, 0x7F, 0xA3, 0x2A, 0x9C, 0xA0, 0xD1, 0x50, 0x8A, 0xD8, 0x38, 0x5E, 0x4B, 0x01, 0x7E }; | ||
== PSP Kirk command 1 ECDSA Public Key == | |||
private byte[] kirk_command_1_ecdsa_pub_key_x = new byte[20] { 0xED, 0x9C, 0xE5, 0x82, 0x34, 0xE6, 0x1A, 0x53, 0xC6, 0x85, 0xD6, 0x4D, 0x51, 0xD0, 0x23, 0x6B, 0xC3, 0xB5, 0xD4, 0xB9 }; | |||
private byte[] kirk_command_1_ecdsa_pub_key_y = new byte[20] { 0x04, 0x9D, 0xF1, 0xA0, 0x75, 0xC0, 0xE0, 0x4F, 0xB3, 0x44, 0x85, 0x8B, 0x61, 0xB7, 0x9B, 0x69, 0xA6, 0x3D, 0x2C, 0x39 }; | |||
private byte[] kirk_command_1_ecdsa_ec_m_header = new byte[20] { 0x7D, 0x7E, 0x46, 0x85, 0x4D, 0x07, 0xFA, 0x0B, 0xC6, 0xE8, 0xED, 0x62, 0x99, 0x89, 0x26, 0x14, 0x39, 0x5F, 0xEA, 0xFC }; | |||
private byte[] kirk_command_1_ecdsa_ec_r_header = new byte[20] { 0x66, 0x4f, 0xe1, 0xf2, 0xe9, 0xd6, 0x63, 0x36, 0xf7, 0x33, 0x0b, 0xca, 0xb9, 0x55, 0x6d, 0xb6, 0xeb, 0xe8, 0x05, 0xdc }; | |||
private byte[] kirk_command_1_ecdsa_ec_m_data = new byte[20] { 0x15, 0xee, 0x16, 0x24, 0x12, 0x09, 0x58, 0x16, 0x0f, 0x8b, 0x1a, 0x21, 0x33, 0x7a, 0x38, 0xf8, 0x29, 0xf7, 0x2e, 0x58 }; | |||
private byte[] kirk_command_1_ecdsa_ec_r_data = new byte[20] { 0xcd, 0xe3, 0x88, 0xa6, 0x3c, 0x1d, 0x57, 0xdc, 0x5e, 0x94, 0xee, 0xac, 0x2e, 0x6c, 0x9f, 0x2e, 0x81, 0xc7, 0x1c, 0x58 }; | |||
== PSP Applications ECDSA Curve == | == PSP Applications ECDSA Curve == | ||
Line 957: | Line 925: | ||
public static final int[] drmkeys_6XX_1 = {0x36, 0xEF, 0x82, 0x4E, 0x74, 0xFB, 0x17, 0x5B, 0x14, 0x14, 0x05, 0xF3, 0xB3, 0x8A, 0x76, 0x18}; | public static final int[] drmkeys_6XX_1 = {0x36, 0xEF, 0x82, 0x4E, 0x74, 0xFB, 0x17, 0x5B, 0x14, 0x14, 0x05, 0xF3, 0xB3, 0x8A, 0x76, 0x18}; | ||
public static final int[] drmkeys_6XX_2 = {0x21, 0x52, 0x5D, 0x76, 0xF6, 0x81, 0x0F, 0x15, 0x2F, 0x4A, 0x40, 0x89, 0x63, 0xA0, 0x10, 0x55}; | public static final int[] drmkeys_6XX_2 = {0x21, 0x52, 0x5D, 0x76, 0xF6, 0x81, 0x0F, 0x15, 0x2F, 0x4A, 0x40, 0x89, 0x63, 0xA0, 0x10, 0x55}; | ||
== PRXDecrypter 144-byte Tag Keys == | == PRXDecrypter 144-byte Tag Keys == | ||
Line 4,958: | Line 4,925: | ||
== NPDRM Keys == | == NPDRM Keys == | ||
See [https://www.psdevwiki.com/ps3/Keys#NPDRM_Keys Keys on PS3 Dev Wiki]. | See [https://www.psdevwiki.com/ps3/edit/Keys#NPDRM_Keys|NPDRM Keys on PS3 Dev Wiki]. | ||
== Retail iplloader == | == Retail Lib-PSP iplloader == | ||
=== IPL header Kirk command 1 XOR keys === | === IPL header Kirk command 1 XOR keys === | ||
Line 5,001: | Line 4,968: | ||
</pre> | </pre> | ||
== 3.5.0 DTP-T1000 iplloader == | === Kirk command 1 ECDSA Public Key === | ||
<pre> | |||
BC660611A70BD7F2D140A48215C096D11D2D4112F0E9379AC4E0D387C542D091349DD15169DD5A87 | |||
</pre> | |||
== 3.5.0 DTP-T1000 Lib-PSP iplloader == | |||
=== IPL header Kirk command 1 XOR key === | === IPL header Kirk command 1 XOR key === | ||
Line 5,012: | Line 4,985: | ||
</pre> | </pre> | ||
=== IPL decryption seed | === IPL decryption seed hash (key) === | ||
<pre> | <pre> | ||
Line 5,019: | Line 4,992: | ||
4A9561D58704E6538410D9EEBFED2E97 | 4A9561D58704E6538410D9EEBFED2E97 | ||
EE4C8B042BC817DFD3D91EF6714055F7 | EE4C8B042BC817DFD3D91EF6714055F7 | ||
</pre> | |||
=== IPL decryption seed binary (0x280 bytes) === | |||
<pre> | |||
DF0CBB0F808D785D705C60DBA33B8788 | DF0CBB0F808D785D705C60DBA33B8788 | ||
CBA210244B6DD7FB292C57223B6D217F | CBA210244B6DD7FB292C57223B6D217F |