Editing Spock
Jump to navigation
Jump to search
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 1: | Line 1: | ||
Spock is the PSP hardware cryptography engine responsible for the raw sector level decryption of UMD’s. Named after Captain Spock of Star Trek | Spock is the PSP hardware cryptography engine responsible for the raw sector level decryption of UMD’s. Named after Captain Spock of Star Trek. | ||
= Executing commands = | = Executing commands = | ||
You can more or less access Spock through Lepton's ram (there is some hidden test mode on Lepton allowing you to do this). Mathieulh will tell more on this later if he ever get the time to clean up those sources. | You can more or less access Spock through Lepton's ram (there is some hidden test mode on Lepton allowing you to do this). Mathieulh will tell more on this later if he ever get the time to clean up those sources. | ||
= Commands = | = Commands = | ||
Line 44: | Line 20: | ||
0x0A: Decrypt UMD Disc Sector | 0x0A: Decrypt UMD Disc Sector | ||
0x0B: Reset SPOCK | 0x0B: Reset SPOCK | ||
0x0C: | 0x0C: | ||
</pre> | </pre> | ||
Line 69: | Line 45: | ||
<pre> | <pre> | ||
0x9F, 0x46, 0xF9, 0xFC, 0xFA, 0xB2, 0xAD, 0x05, 0x69, 0xF6, 0x88, 0xD8, 0x79, 0x4B, 0x92, 0xBA | |||
</pre> | </pre> | ||
Line 78: | Line 54: | ||
== Command 11 (0xB) (Reset Spock) == | == Command 11 (0xB) (Reset Spock) == | ||
== Command 12 (0xC) ( | == Command 12 (0xC) (Read RAW UMD Sectors?) == | ||
* Seems to exist only on KICHO DENCHO PSP | * Seems to exist only on KICHO DENCHO PSP firmware, inside UMDMAN.prx | ||
= Where are spock commands used = | = Where are spock commands used = |