Editing Keys
Jump to navigation
Jump to search
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 1: | Line 1: | ||
[[Category:Software]] | [[Category:Software]]<noinclude>[[Category:Main]]</noinclude> | ||
<noinclude> | |||
[[Category:Main]] | |||
</noinclude> | |||
== Location == | == Location == | ||
keyfiles should be placed in ~/.vita or %userprofile%\vitakeys <br /> | |||
== Naming == | |||
== Naming | |||
naming: | naming: | ||
* file prefix: pkg | * file prefix: pkg | ||
Line 21: | Line 14: | ||
* priv file (private): %s-priv-%s | * priv file (private): %s-priv-%s | ||
= | == PS Vita Keys == | ||
These are the PS Vita Keys. | |||
=== PSP2 Keys === | |||
{| class="wikitable" | |||
These | |||
=== | |||
{| class="wikitable" | |||
|- | |- | ||
! Type !! Version !! Length !! PSP2 Key !! Notes | |||
! Type !! Version !! | |||
|- | |- | ||
| | | Game PKG || Beta/Retail (<1.00) || 0x10 || <code>07F2C68290B50D2C33818D709B60E62B</code> || It's the PSP AES PKG Key (It's on the net, i did't found it) | ||
|- | |- | ||
| | | Game PKG || (1.00+) || 0x10 || - || - | ||
|- | |||
|} | |} | ||
=== | == NonVita == | ||
===PSPAesKey=== | |||
Also used on PS Vita for Beta <1.00 packages | |||
//PSP | |||
private byte[] PSPAesKey = new byte[16] { | |||
0x07, 0xF2, 0xC6, 0x82, 0x90, 0xB5, 0x0D, 0x2C, | |||
0x33, 0x81, 0x8D, 0x70, 0x9B, 0x60, 0xE6, 0x2B | |||
}; | |||
== | ===PSPIDStorageKey=== | ||
//PSP | |||
private byte[] PSPIDStorageKey = new byte[16] { | |||
0x47, 0x5E, 0x09, 0xF4, 0xA2, 0x37, 0xDA, 0x9B, | |||
0xEF, 0xFF, 0x3B, 0xC0, 0x77, 0x14, 0x3D, 0x8A | |||
}; | |||
===PSPSDHashKey1=== | |||
//PSP | |||
private byte[] PSPSDHashKey1 = new byte[16] { | |||
0x40, 0xE6, 0x53, 0x3F, 0x05, 0x11, 0x3A, 0x4E, | |||
0xA1, 0x4B, 0xDA, 0xD6, 0x72, 0x7C, 0x53, 0x4C | |||
}; | |||
===PSPSDHashKey2=== | |||
//PSP | |||
private byte[] PSPSDHashKey2 = new byte[16] { | |||
0xFA, 0xAA, 0x50, 0xEC, 0x2F, 0xDE, 0x54, 0x93, | |||
0xAD, 0x14, 0xB2, 0xCE, 0xA5, 0x30, 0x05, 0xDF | |||
}; | |||
== | ===PSPSDHashKey3=== | ||
//PSP | |||
private byte[] PSPSDHashKey3 = new byte[16] { | |||
0x36, 0xA5, 0x3E, 0xAC, 0xC5, 0x26, 0x9E, 0xA3, | |||
0x83, 0xD9, 0xEC, 0x25, 0x6C, 0x48, 0x48, 0x72 | |||
}; | |||
===PSPSDHashKey4=== | |||
//PSP | |||
private byte[] PSPSDHashKey4 = new byte[16] { | |||
0xD8, 0xC0, 0xB0, 0xF3, 0x3E, 0x6B, 0x76, 0x85, | |||
0xFD, 0xFB, 0x4D, 0x7D, 0x45, 0x1E, 0x92, 0x03 | |||
}; | |||
===PSPSDHashKey5=== | |||
//PSP | |||
private byte[] PSPSDHashKey5 = new byte[16] { | |||
0xCB, 0x15, 0xF4, 0x07, 0xF9, 0x6A, 0x52, 0x3C, | |||
0x04, 0xB9, 0xB2, 0xEE, 0x5C, 0x53, 0xFA, 0x86 | |||
}; | |||
== | ===PSPSDHashKey6=== | ||
//PSP | |||
private byte[] PSPSDHashKey6 = new byte[16] { | |||
0x70, 0x44, 0xA3, 0xAE, 0xEF, 0x5D, 0xA5, 0xF2, | |||
0x85, 0x7F, 0xF2, 0xD6, 0x94, 0xF5, 0x36, 0x3B | |||
}; | |||
===PSPSDHashKey7=== | |||
//PSP | |||
private byte[] PSPSDHashKey7 = new byte[16] { | |||
0xEC, 0x6D, 0x29, 0x59, 0x26, 0x35, 0xA5, 0x7F, | |||
0x97, 0x2A, 0x0D, 0xBC, 0xA3, 0x26, 0x33, 0x00 | |||
}; | |||
===PSPECDSAParamKirk1=== | |||
//PSP ECDSA param of kirk1 | |||
private byte[][] ecdsa_kirk1 = new byte[6][] { | |||
new byte [20] { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0x00, 0x00, 0x00, 0x01, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }, | |||
new byte[20] { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0x00, 0x00, 0x00, 0x01, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFC }, | |||
new byte[20] { 0x65, 0xD1, 0x48, 0x8C, 0x03, 0x59, 0xE2, 0x34, 0xAD, 0xC9, 0x5B, 0xD3, 0x90, 0x80, 0x14, 0xBD, 0x91, 0xA5, 0x25, 0xF9 }, | |||
new byte[20] { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x01, 0xb5, 0xc6, 0x17, 0xf2, 0x90, 0xea, 0xe1, 0xdb, 0xad, 0x8f }, | |||
new byte[20] { 0x22, 0x59, 0xAC, 0xEE, 0x15, 0x48, 0x9C, 0xB0, 0x96, 0xA8, 0x82, 0xF0, 0xAE, 0x1C, 0xF9, 0xFD, 0x8E, 0xE5, 0xF8, 0xFA }, | |||
new byte[20] { 0x60, 0x43, 0x58, 0x45, 0x6D, 0x0A, 0x1C, 0xB2, 0x90, 0x8D, 0xE9, 0x0F, 0x27, 0xD7, 0x5C, 0x82, 0xBE, 0xC1, 0x08, 0xC0 }, | |||
}; | |||
== | ===PSPECDSAPrivKirk1=== | ||
//PSP ECDSA private key of kirk1 | |||
private byte[] priv_key_kirk1 = new byte[20] = { | |||
0xF3, 0x92, 0xE2, 0x64, 0x90, 0xB8, 0x0F, 0xD8, | |||
0x89, 0xF2, 0xD9, 0x72, 0x2C, 0x1F, 0x34, 0xD7, | |||
0x27, 0x4F, 0x98, 0x3D | |||
}; | |||
===PSPECDSAPubKirk1=== | |||
//PSP ECDSA public key of kirk1 | |||
private byte[] pub_key_kirk1_x = new byte[20] { 0xED, 0x9C, 0xE5, 0x82, 0x34, 0xE6, 0x1A, 0x53, 0xC6, 0x85, 0xD6, 0x4D, 0x51, 0xD0, 0x23, 0x6B, 0xC3, 0xB5, 0xD4, 0xB9 }; | |||
private byte[] pub_key_kirk1_y = new byte[20] { 0x04, 0x9D, 0xF1, 0xA0, 0x75, 0xC0, 0xE0, 0x4F, 0xB3, 0x44, 0x85, 0x8B, 0x61, 0xB7, 0x9B, 0x69, 0xA6, 0x3D, 0x2C, 0x39 }; | |||
private byte[] kirk1_ec_m_header = new byte[20] { 0x7D, 0x7E, 0x46, 0x85, 0x4D, 0x07, 0xFA, 0x0B, 0xC6, 0xE8, 0xED, 0x62, 0x99, 0x89, 0x26, 0x14, 0x39, 0x5F, 0xEA, 0xFC }; | |||
private byte[] kirk1_ec_r_header = new byte[20] { 0x66, 0x4f, 0xe1, 0xf2, 0xe9, 0xd6, 0x63, 0x36, 0xf7, 0x33, 0x0b, 0xca, 0xb9, 0x55, 0x6d, 0xb6, 0xeb, 0xe8, 0x05, 0xdc }; | |||
private byte[] kirk1_ec_m_data = new byte[20] { 0x15, 0xee, 0x16, 0x24, 0x12, 0x09, 0x58, 0x16, 0x0f, 0x8b, 0x1a, 0x21, 0x33, 0x7a, 0x38, 0xf8, 0x29, 0xf7, 0x2e, 0x58 }; | |||
private byte[] kirk1_ec_r_data = new byte[20] { 0xcd, 0xe3, 0x88, 0xa6, 0x3c, 0x1d, 0x57, 0xdc, 0x5e, 0x94, 0xee, 0xac, 0x2e, 0x6c, 0x9f, 0x2e, 0x81, 0xc7, 0x1c, 0x58 }; | |||
== | ===PSPECDSAParamApp=== | ||
//PSP ECDSA param of applations | |||
private byte[][] ecdsa_app = new byte[6][] { | |||
new byte [20] { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0x00, 0x00, 0x00, 0x01, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }, | |||
new byte [20] { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0x00, 0x00, 0x00, 0x01, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFC }, | |||
new byte [20] { 0xA6, 0x8B, 0xED, 0xC3, 0x34, 0x18, 0x02, 0x9C, 0x1D, 0x3C, 0xE3, 0x3B, 0x9A, 0x32, 0x1F, 0xCC, 0xBB, 0x9E, 0x0F, 0x0B }, | |||
new byte [20] { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFE, 0xFF, 0xFF, 0xB5, 0xAE, 0x3C, 0x52, 0x3E, 0x63, 0x94, 0x4F, 0x21, 0x27 }, | |||
new byte [20] { 0x12, 0x8E, 0xC4, 0x25, 0x64, 0x87, 0xFD, 0x8F, 0xDF, 0x64, 0xE2, 0x43, 0x7B, 0xC0, 0xA1, 0xF6, 0xD5, 0xAF, 0xDE, 0x2C }, | |||
new byte [20] { 0x59, 0x58, 0x55, 0x7E, 0xB1, 0xDB, 0x00, 0x12, 0x60, 0x42, 0x55, 0x24, 0xDB, 0xC3, 0x79, 0xD5, 0xAC, 0x5F, 0x4A, 0xDF }, | |||
}; | |||
===PSPECDSAPrivEDATA=== | |||
//PSP ECDSA private key of EDATA | |||
private byte[] priv_key_edata = new byte[20] { | |||
0xe5, 0xc4, 0xd0, 0xa8, 0x24, 0x9a, 0x6f, 0x27, | |||
0xe5, 0xe0, 0xc9, 0xd5, 0x34, 0xf4, 0xda, 0x15, | |||
0x22, 0x3f, 0x42, 0xad | |||
}; | |||
=== | ===PSPAESKirk1=== | ||
//PSP AES key for kirk1 | |||
private byte[] kirk1_key = new byte[16] { | |||
0x98, 0xC9, 0x40, 0x97, 0x5C, 0x1D, 0x10, 0xE8, | |||
0x7F, 0xE6, 0x0E, 0xA3, 0xFD, 0x03, 0xA8, 0xBA | |||
}; | |||
===PSPAESKirk4/7=== | |||
//PSP AES key for kirk4/7 | |||
private byte[] kirk7_key03 = new byte[16] { 0x98, 0x02, 0xC4, 0xE6, 0xEC, 0x9E, 0x9E, 0x2F, 0xFC, 0x63, 0x4C, 0xE4, 0x2F, 0xBB, 0x46, 0x68 }; | |||
private byte[] kirk7_key04 = new byte[16] { 0x99, 0x24, 0x4C, 0xD2, 0x58, 0xF5, 0x1B, 0xCB, 0xB0, 0x61, 0x9C, 0xA7, 0x38, 0x30, 0x07, 0x5F }; | |||
private byte[] kirk7_key05 = new byte[16] { 0x02, 0x25, 0xD7, 0xBA, 0x63, 0xEC, 0xB9, 0x4A, 0x9D, 0x23, 0x76, 0x01, 0xB3, 0xF6, 0xAC, 0x17 }; | |||
private byte[] kirk7_key0C = new byte[16] { 0x84, 0x85, 0xC8, 0x48, 0x75, 0x08, 0x43, 0xBC, 0x9B, 0x9A, 0xEC, 0xA7, 0x9C, 0x7F, 0x60, 0x18 }; | |||
private byte[] kirk7_key0D = new byte[16] { 0xB5, 0xB1, 0x6E, 0xDE, 0x23, 0xA9, 0x7B, 0x0E, 0xA1, 0x7C, 0xDB, 0xA2, 0xDC, 0xDE, 0xC4, 0x6E }; | |||
private byte[] kirk7_key0E = new byte[16] { 0xC8, 0x71, 0xFD, 0xB3, 0xBC, 0xC5, 0xD2, 0xF2, 0xE2, 0xD7, 0x72, 0x9D, 0xDF, 0x82, 0x68, 0x82 }; | |||
private byte[] kirk7_key0F = new byte[16] { 0x0A, 0xBB, 0x33, 0x6C, 0x96, 0xD4, 0xCD, 0xD8, 0xCB, 0x5F, 0x4B, 0xE0, 0xBA, 0xDB, 0x9E, 0x03 }; | |||
private byte[] kirk7_key10 = new byte[16] { 0x32, 0x29, 0x5B, 0xD5, 0xEA, 0xF7, 0xA3, 0x42, 0x16, 0xC8, 0x8E, 0x48, 0xFF, 0x50, 0xD3, 0x71 }; | |||
private byte[] kirk7_key11 = new byte[16] { 0x46, 0xF2, 0x5E, 0x8E, 0x4D, 0x2A, 0xA5, 0x40, 0x73, 0x0B, 0xC4, 0x6E, 0x47, 0xEE, 0x6F, 0x0A }; | |||
private byte[] kirk7_key12 = new byte[16] { 0x5D, 0xC7, 0x11, 0x39, 0xD0, 0x19, 0x38, 0xBC, 0x02, 0x7F, 0xDD, 0xDC, 0xB0, 0x83, 0x7D, 0x9D }; | |||
private byte[] kirk7_key38 = new byte[16] { 0x12, 0x46, 0x8D, 0x7E, 0x1C, 0x42, 0x20, 0x9B, 0xBA, 0x54, 0x26, 0x83, 0x5E, 0xB0, 0x33, 0x03 }; | |||
private byte[] kirk7_key39 = new byte[16] { 0xC4, 0x3B, 0xB6, 0xD6, 0x53, 0xEE, 0x67, 0x49, 0x3E, 0xA9, 0x5F, 0xBC, 0x0C, 0xED, 0x6F, 0x8A }; | |||
private byte[] kirk7_key3A = new byte[16] { 0x2C, 0xC3, 0xCF, 0x8C, 0x28, 0x78, 0xA5, 0xA6, 0x63, 0xE2, 0xAF, 0x2D, 0x71, 0x5E, 0x86, 0xBA }; | |||
private byte[] kirk7_key4B = new byte[16] { 0x0C, 0xFD, 0x67, 0x9A, 0xF9, 0xB4, 0x72, 0x4F, 0xD7, 0x8D, 0xD6, 0xE9, 0x96, 0x42, 0x28, 0x8B }; //1.xx game eboot.bin | |||
private byte[] kirk7_key53 = new byte[16] { 0xAF, 0xFE, 0x8E, 0xB1, 0x3D, 0xD1, 0x7E, 0xD8, 0x0A, 0x61, 0x24, 0x1C, 0x95, 0x92, 0x56, 0xB6 }; | |||
private byte[] kirk7_key57 = new byte[16] { 0x1C, 0x9B, 0xC4, 0x90, 0xE3, 0x06, 0x64, 0x81, 0xFA, 0x59, 0xFD, 0xB6, 0x00, 0xBB, 0x28, 0x70 }; | |||
private byte[] kirk7_key5D = new byte[16] { 0x11, 0x5A, 0x5D, 0x20, 0xD5, 0x3A, 0x8D, 0xD3, 0x9C, 0xC5, 0xAF, 0x41, 0x0F, 0x0F, 0x18, 0x6F }; | |||
private byte[] kirk7_key63 = new byte[16] { 0x9C, 0x9B, 0x13, 0x72, 0xF8, 0xC6, 0x40, 0xCF, 0x1C, 0x62, 0xF5, 0xD5, 0x92, 0xDD, 0xB5, 0x82 }; | |||
private byte[] kirk7_key64 = new byte[16] { 0x03, 0xB3, 0x02, 0xE8, 0x5F, 0xF3, 0x81, 0xB1, 0x3B, 0x8D, 0xAA, 0x2A, 0x90, 0xFF, 0x5E, 0x61 }; | |||
=== | ===PS3AesKey=== | ||
//PS3 | |||
private byte[] PS3AesKey = new byte[16] { | |||
0x2E, 0x7B, 0x71, 0xD7, 0xC9, 0xC9, 0xA1, 0x4E, | |||
0xA3, 0x22, 0x1F, 0x18, 0x88, 0x28, 0xB8, 0xF8 | |||
}; | |||
= | |||
{ | |||