Editing Keys

Jump to navigation Jump to search
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 1: Line 1:
[[Category:Software]]
[[Category:Software]]<noinclude>[[Category:Main]]</noinclude>
<noinclude>
[[Category:Main]]
</noinclude>


= Useful Information =
== Usefull information ==
ID Storage Source and explanation: [http://www.lolhax.org/2011/07/06/kirk-0x10-private-key/]
Save Data Source: [http://pastebin.com/RFDXKCAf]
Kirk Engine Source: [https://github.com/tpunix/kirk_engine/blob/master/kirk/kirk_engine.c]


== Location ==
== Location ==
keyfiles should be placed in ~/.vita or %userprofile%\vitakeys <br />


For deroad's scetool, keyfiles should be placed in <code>~/.vita</code> or <code>%userprofile%\vitakeys</code>.<br />
== Naming ==
 
== Naming Conventions ==
 
naming:
naming:
* file prefix: pkg
* file prefix: pkg
Line 21: Line 19:
* priv file (private): %s-priv-%s
* priv file (private): %s-priv-%s


= Per-console keys =
== PS Vita Keys ==
These are the PS Vita Keys.
=== PSP2 Keys ===
{| class="wikitable"
|-
! Type !! Version !! Length !! PSP2 Key !! Notes
|-
| Game PKG || Beta/Retail (&lt;1.00) || 0x10 || <code>07F2C68290B50D2C33818D709B60E62B</code> || It's the PSP AES PKG Key (It's on the net, i did't found it)
|-
| Game PKG || (1.00+) || 0x10 || - || -
|-
|}
 
== NonVita ==
===PSPAesKey===
Also used on PS Vita for Beta &lt;1.00 packages
//PSP
private byte[] PSPAesKey = new byte[16] {
0x07, 0xF2, 0xC6, 0x82, 0x90, 0xB5, 0x0D, 0x2C, 0x33, 0x81, 0x8D, 0x70, 0x9B, 0x60, 0xE6, 0x2B
};
 
===PSPSpockMasterKey===
//PSP SPOCK CMD9 key
private byte[] PSPSpockMasterKey = new byte[16] {
0x9F, 0x46, 0xF9, 0xFC, 0xFA, 0xB2, 0xAD, 0x05, 0x69, 0xF6, 0x88, 0xD8, 0x79, 0x4B, 0x92, 0xBA
};
 
===PSPIDStorageKey===
//PSP KIRK CMD16 key
private byte[] PSPIDStorageKey = new byte[16] {
0x47, 0x5E, 0x09, 0xF4, 0xA2, 0x37, 0xDA, 0x9B, 0xEF, 0xFF, 0x3B, 0xC0, 0x77, 0x14, 0x3D, 0x8A
};
 
===PSPECDSAPubKirk17===
// KIRK CMD17 ECDSA PUB keys.
public static final int[] kirkCertSigs = {
// certSig0
0x40, 0x04, 0xC8, 0x0B, 0xD9, 0xC8, 0xBA, 0x38, 0x22, 0x10, 0x65, 0x92, 0x3E, 0x32, 0x4B, 0x5F, 0x0E, 0xC1, 0x65, 0xED,
0x6C, 0xFF, 0x7D, 0x9F, 0x2C, 0x42, 0x0B, 0x84, 0xDF, 0xDA, 0x6E, 0x96, 0xC0, 0xAE, 0xE2, 0x99, 0x27, 0xBC, 0xAF, 0x1E,
// certSig1
0x06, 0x48, 0x5F, 0xD0, 0x29, 0x85, 0x3B, 0x55, 0x2F, 0x7E, 0xFD, 0xD6, 0x7A, 0x2D, 0xE7, 0xA1, 0xA4, 0xE2, 0x55, 0x37,
0xB2, 0x45, 0x9D, 0x87, 0x86, 0x42, 0x6D, 0x5B, 0x27, 0xEF, 0xA5, 0xA9, 0x31, 0x1C, 0xB8, 0xAB, 0xAB, 0xFA, 0x0E, 0xCE,
// certSig2
0x3F, 0x8C, 0x34, 0xF2, 0x10, 0xAE, 0xC4, 0x8E, 0x15, 0x20, 0xFF, 0x2A, 0x44, 0x89, 0x9E, 0x05, 0x4A, 0x0D, 0xA3, 0x3D,
0xF8, 0xB9, 0x75, 0x4B, 0x09, 0xC0, 0xEC, 0x7E, 0x61, 0x86, 0x7A, 0x51, 0x26, 0xFE, 0x69, 0x26, 0x97, 0x21, 0x96, 0xF5,
// certSig3
0xCC, 0xB3, 0x44, 0x0D, 0xC4, 0x83, 0x6D, 0xD5, 0x19, 0xE1, 0x3B, 0x28, 0x05, 0xB3, 0x08, 0x70, 0xDC, 0xAE, 0xE4, 0x62,
0x13, 0x6B, 0x38, 0x88, 0x65, 0x1A, 0x98, 0xE0, 0x2B, 0x29, 0xFA, 0x0C, 0xD3, 0x4F, 0x16, 0x16, 0xF1, 0xED, 0x57, 0x86,
// certSig4
0x08, 0xB3, 0x36, 0x92, 0x5C, 0x2B, 0x44, 0x5D, 0x03, 0xA9, 0xBE, 0x51, 0xB9, 0xAA, 0xBF, 0x54, 0xE4, 0xCC, 0x14, 0x2E,
0xA7, 0x2A, 0x23, 0xBB, 0x80, 0x60, 0xB0, 0x3B, 0x71, 0xCD, 0xE0, 0x77, 0x2D, 0xE8, 0x2A, 0xD8, 0x93, 0x16, 0x48, 0xD6,
// certSig5
0x4F, 0x0A, 0x2B, 0xC9, 0x98, 0x76, 0x40, 0x86, 0x0E, 0x22, 0xEE, 0x5D, 0x86, 0x08, 0x7C, 0x96, 0x92, 0x47, 0x0B, 0xDF,
0x59, 0xDC, 0x4C, 0x1F, 0x2E, 0x38, 0xF9, 0x2C, 0xE7, 0xB6, 0x68, 0x75, 0xB5, 0x9E, 0xD1, 0x0C, 0x9D, 0x84, 0xFA, 0x6A,
};
 
===PSPSDHashKey1===
//PSP
private byte[] PSPSDHashKey1 = new byte[16] {
0x40, 0xE6, 0x53, 0x3F, 0x05, 0x11, 0x3A, 0x4E, 0xA1, 0x4B, 0xDA, 0xD6, 0x72, 0x7C, 0x53, 0x4C
};
 
===PSPSDHashKey2===
//PSP
private byte[] PSPSDHashKey2 = new byte[16] {
0xFA, 0xAA, 0x50, 0xEC, 0x2F, 0xDE, 0x54, 0x93, 0xAD, 0x14, 0xB2, 0xCE, 0xA5, 0x30, 0x05, 0xDF
};
 
===PSPSDHashKey3===
//PSP
private byte[] PSPSDHashKey3 = new byte[16] {
0x36, 0xA5, 0x3E, 0xAC, 0xC5, 0x26, 0x9E, 0xA3, 0x83, 0xD9, 0xEC, 0x25, 0x6C, 0x48, 0x48, 0x72
};
 
===PSPSDHashKey4===
//PSP
private byte[] PSPSDHashKey4 = new byte[16] {
0xD8, 0xC0, 0xB0, 0xF3, 0x3E, 0x6B, 0x76, 0x85, 0xFD, 0xFB, 0x4D, 0x7D, 0x45, 0x1E, 0x92, 0x03
};
 
===PSPSDHashKey5===
//PSP
private byte[] PSPSDHashKey5 = new byte[16] {
0xCB, 0x15, 0xF4, 0x07, 0xF9, 0x6A, 0x52, 0x3C, 0x04, 0xB9, 0xB2, 0xEE, 0x5C, 0x53, 0xFA, 0x86
};
 
===PSPSDHashKey6===
//PSP
private byte[] PSPSDHashKey6 = new byte[16] {
0x70, 0x44, 0xA3, 0xAE, 0xEF, 0x5D, 0xA5, 0xF2, 0x85, 0x7F, 0xF2, 0xD6, 0x94, 0xF5, 0x36, 0x3B
};
 
===PSPSDHashKey7===
//PSP
private byte[] PSPSDHashKey7 = new byte[16] {
0xEC, 0x6D, 0x29, 0x59, 0x26, 0x35, 0xA5, 0x7F, 0x97, 0x2A, 0x0D, 0xBC, 0xA3, 0x26, 0x33, 0x00
};
 
=== PSPAMHashKey ===
// PSP AMCTRL HashKeys
private byte[] PSPAMHashKey1 = new byte[16] { 0x9C, 0x48, 0xB6, 0x28, 0x40, 0xE6, 0x53, 0x3F, 0x05, 0x11, 0x3A, 0x4E, 0x65, 0xE6, 0x3A, 0x64 };
private byte[] PSPAMHashKey2 = new byte[16] { 0x70, 0xB4, 0x7B, 0xC0, 0xA1, 0x4B, 0xDA, 0xD6, 0xE0, 0x10, 0x14, 0xED, 0x72, 0x7C, 0x53, 0x4C };
private byte[] PSPAMHashKey1 = new byte[16] { 0xE3, 0x50, 0xED, 0x1D, 0x91, 0x0A, 0x1F, 0xD0, 0x29, 0xBB, 0x1C, 0x3E, 0xF3, 0x40, 0x77, 0xFB };
private byte[] PSPAMHashKey1 = new byte[16] { 0x13, 0x5F, 0xA4, 0x7C, 0xAB, 0x39, 0x5B, 0xA4, 0x76, 0xB8, 0xCC, 0xA9, 0x8F, 0x3A, 0x04, 0x45 };
private byte[] PSPAMHashKey1 = new byte[16] { 0x67, 0x8D, 0x7F, 0xA3, 0x2A, 0x9C, 0xA0, 0xD1, 0x50, 0x8A, 0xD8, 0x38, 0x5E, 0x4B, 0x01, 0x7E };
 
===PSPECDSAParamKirk1===
//PSP ECDSA param of kirk1
private byte[][] ecdsa_kirk1 = new byte[6][] {
new byte[20] { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0x00, 0x00, 0x00, 0x01, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF },
new byte[20] { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0x00, 0x00, 0x00, 0x01, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFC },
new byte[20] { 0x65, 0xD1, 0x48, 0x8C, 0x03, 0x59, 0xE2, 0x34, 0xAD, 0xC9, 0x5B, 0xD3, 0x90, 0x80, 0x14, 0xBD, 0x91, 0xA5, 0x25, 0xF9 },
new byte[20] { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0x00, 0x01, 0xB5, 0xC6, 0x17, 0xF2, 0x90, 0xEA, 0xE1, 0xDB, 0xAD, 0x8F },
new byte[20] { 0x22, 0x59, 0xAC, 0xEE, 0x15, 0x48, 0x9C, 0xB0, 0x96, 0xA8, 0x82, 0xF0, 0xAE, 0x1C, 0xF9, 0xFD, 0x8E, 0xE5, 0xF8, 0xFA },
new byte[20] { 0x60, 0x43, 0x58, 0x45, 0x6D, 0x0A, 0x1C, 0xB2, 0x90, 0x8D, 0xE9, 0x0F, 0x27, 0xD7, 0x5C, 0x82, 0xBE, 0xC1, 0x08, 0xC0 },
};
 
===PSPECDSAPrivKirk1===
//PSP ECDSA private key of kirk1
private byte[] priv_key_kirk1 = new byte[20] = {
0xF3, 0x92, 0xE2, 0x64, 0x90, 0xB8, 0x0F, 0xD8, 0x89, 0xF2, 0xD9, 0x72, 0x2C, 0x1F, 0x34, 0xD7, 0x27, 0x4F, 0x98, 0x3D
};
 
===PSPECDSAPubKirk1===
//PSP ECDSA public key of kirk1
private byte[] pub_key_kirk1_x = new byte[20] { 0xED, 0x9C, 0xE5, 0x82, 0x34, 0xE6, 0x1A, 0x53, 0xC6, 0x85, 0xD6, 0x4D, 0x51, 0xD0, 0x23, 0x6B, 0xC3, 0xB5, 0xD4, 0xB9 };
private byte[] pub_key_kirk1_y = new byte[20] { 0x04, 0x9D, 0xF1, 0xA0, 0x75, 0xC0, 0xE0, 0x4F, 0xB3, 0x44, 0x85, 0x8B, 0x61, 0xB7, 0x9B, 0x69, 0xA6, 0x3D, 0x2C, 0x39 };
private byte[] kirk1_ec_m_header = new byte[20] { 0x7D, 0x7E, 0x46, 0x85, 0x4D, 0x07, 0xFA, 0x0B, 0xC6, 0xE8, 0xED, 0x62, 0x99, 0x89, 0x26, 0x14, 0x39, 0x5F, 0xEA, 0xFC };
private byte[] kirk1_ec_r_header = new byte[20] { 0x66, 0x4f, 0xe1, 0xf2, 0xe9, 0xd6, 0x63, 0x36, 0xf7, 0x33, 0x0b, 0xca, 0xb9, 0x55, 0x6d, 0xb6, 0xeb, 0xe8, 0x05, 0xdc };
private byte[] kirk1_ec_m_data = new byte[20] { 0x15, 0xee, 0x16, 0x24, 0x12, 0x09, 0x58, 0x16, 0x0f, 0x8b, 0x1a, 0x21, 0x33, 0x7a, 0x38, 0xf8, 0x29, 0xf7, 0x2e, 0x58 };
private byte[] kirk1_ec_r_data = new byte[20] { 0xcd, 0xe3, 0x88, 0xa6, 0x3c, 0x1d, 0x57, 0xdc, 0x5e, 0x94, 0xee, 0xac, 0x2e, 0x6c, 0x9f, 0x2e, 0x81, 0xc7, 0x1c, 0x58 };
 
===PSPECDSAParamApp===
//PSP ECDSA param of applications
private byte[][] ecdsa_app = new byte[6][] {
new byte[20] { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0x00, 0x00, 0x00, 0x01, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF },
new byte[20] { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0x00, 0x00, 0x00, 0x01, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFC },
new byte[20] { 0xA6, 0x8B, 0xED, 0xC3, 0x34, 0x18, 0x02, 0x9C, 0x1D, 0x3C, 0xE3, 0x3B, 0x9A, 0x32, 0x1F, 0xCC, 0xBB, 0x9E, 0x0F, 0x0B },
new byte[20] { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFE, 0xFF, 0xFF, 0xB5, 0xAE, 0x3C, 0x52, 0x3E, 0x63, 0x94, 0x4F, 0x21, 0x27 },
new byte[20] { 0x12, 0x8E, 0xC4, 0x25, 0x64, 0x87, 0xFD, 0x8F, 0xDF, 0x64, 0xE2, 0x43, 0x7B, 0xC0, 0xA1, 0xF6, 0xD5, 0xAF, 0xDE, 0x2C },
new byte[20] { 0x59, 0x58, 0x55, 0x7E, 0xB1, 0xDB, 0x00, 0x12, 0x60, 0x42, 0x55, 0x24, 0xDB, 0xC3, 0x79, 0xD5, 0xAC, 0x5F, 0x4A, 0xDF },
};
 
===PSPECDSAPrivEDATA===
//PSP ECDSA private key of EDATA
private byte[] priv_key_edata = new byte[20] {
0xE5, 0xC4, 0xD0, 0xA8, 0x24, 0x9A, 0x6F, 0x27, 0xE5, 0xE0, 0xC9, 0xD5, 0x34, 0xF4, 0xDA, 0x15, 0x22, 0x3F, 0x42, 0xAD
};
 
===PSPAESKirk1===
//PSP KIRK CMD1 AESCBC128-CMAC key
private byte[] kirk1_key = new byte[16] {
0x98, 0xC9, 0x40, 0x97, 0x5C, 0x1D, 0x10, 0xE8, 0x7F, 0xE6, 0x0E, 0xA3, 0xFD, 0x03, 0xA8, 0xBA
};
 
===PSPAESKirk4/7===
//PSP KIRK CMD4 and CMD7 AESCBC128 key table
private byte[] kirk7_key02 = new byte[16] { 0xB8, 0x13, 0xC3, 0x5E, 0xC6, 0x44, 0x41, 0xE3, 0xDC, 0x3C, 0x16, 0xF5, 0xB4, 0x5E, 0x64, 0x84 }; // New from PS3
private byte[] kirk7_key03 = new byte[16] { 0x98, 0x02, 0xC4, 0xE6, 0xEC, 0x9E, 0x9E, 0x2F, 0xFC, 0x63, 0x4C, 0xE4, 0x2F, 0xBB, 0x46, 0x68 };
private byte[] kirk7_key04 = new byte[16] { 0x99, 0x24, 0x4C, 0xD2, 0x58, 0xF5, 0x1B, 0xCB, 0xB0, 0x61, 0x9C, 0xA7, 0x38, 0x30, 0x07, 0x5F };
private byte[] kirk7_key05 = new byte[16] { 0x02, 0x25, 0xD7, 0xBA, 0x63, 0xEC, 0xB9, 0x4A, 0x9D, 0x23, 0x76, 0x01, 0xB3, 0xF6, 0xAC, 0x17 };
private byte[] kirk7_key07 = new byte[16] { 0x76, 0x36, 0x8B, 0x43, 0x8F, 0x77, 0xD8, 0x7E, 0xFE, 0x5F, 0xB6, 0x11, 0x59, 0x39, 0x88, 0x5C }; // New from PS3
private byte[] kirk7_key0C = new byte[16] { 0x84, 0x85, 0xC8, 0x48, 0x75, 0x08, 0x43, 0xBC, 0x9B, 0x9A, 0xEC, 0xA7, 0x9C, 0x7F, 0x60, 0x18 };
private byte[] kirk7_key0D = new byte[16] { 0xB5, 0xB1, 0x6E, 0xDE, 0x23, 0xA9, 0x7B, 0x0E, 0xA1, 0x7C, 0xDB, 0xA2, 0xDC, 0xDE, 0xC4, 0x6E };
private byte[] kirk7_key0E = new byte[16] { 0xC8, 0x71, 0xFD, 0xB3, 0xBC, 0xC5, 0xD2, 0xF2, 0xE2, 0xD7, 0x72, 0x9D, 0xDF, 0x82, 0x68, 0x82 };
private byte[] kirk7_key0F = new byte[16] { 0x0A, 0xBB, 0x33, 0x6C, 0x96, 0xD4, 0xCD, 0xD8, 0xCB, 0x5F, 0x4B, 0xE0, 0xBA, 0xDB, 0x9E, 0x03 };
private byte[] kirk7_key10 = new byte[16] { 0x32, 0x29, 0x5B, 0xD5, 0xEA, 0xF7, 0xA3, 0x42, 0x16, 0xC8, 0x8E, 0x48, 0xFF, 0x50, 0xD3, 0x71 };
private byte[] kirk7_key11 = new byte[16] { 0x46, 0xF2, 0x5E, 0x8E, 0x4D, 0x2A, 0xA5, 0x40, 0x73, 0x0B, 0xC4, 0x6E, 0x47, 0xEE, 0x6F, 0x0A };
private byte[] kirk7_key12 = new byte[16] { 0x5D, 0xC7, 0x11, 0x39, 0xD0, 0x19, 0x38, 0xBC, 0x02, 0x7F, 0xDD, 0xDC, 0xB0, 0x83, 0x7D, 0x9D };
private byte[] kirk7_key38 = new byte[16] { 0x12, 0x46, 0x8D, 0x7E, 0x1C, 0x42, 0x20, 0x9B, 0xBA, 0x54, 0x26, 0x83, 0x5E, 0xB0, 0x33, 0x03 };
private byte[] kirk7_key39 = new byte[16] { 0xC4, 0x3B, 0xB6, 0xD6, 0x53, 0xEE, 0x67, 0x49, 0x3E, 0xA9, 0x5F, 0xBC, 0x0C, 0xED, 0x6F, 0x8A };
private byte[] kirk7_key3A = new byte[16] { 0x2C, 0xC3, 0xCF, 0x8C, 0x28, 0x78, 0xA5, 0xA6, 0x63, 0xE2, 0xAF, 0x2D, 0x71, 0x5E, 0x86, 0xBA };
private byte[] kirk7_key44 = new byte[16] { 0x7D, 0xF4, 0x92, 0x65, 0xE3, 0xFA, 0xD6, 0x78, 0xD6, 0xFE, 0x78, 0xAD, 0xBB, 0x3D, 0xFB, 0x63 }; // New from PS3
private byte[] kirk7_key4B = new byte[16] { 0x0C, 0xFD, 0x67, 0x9A, 0xF9, 0xB4, 0x72, 0x4F, 0xD7, 0x8D, 0xD6, 0xE9, 0x96, 0x42, 0x28, 0x8B }; //1.xx game eboot.bin
private byte[] kirk7_key53 = new byte[16] { 0xAF, 0xFE, 0x8E, 0xB1, 0x3D, 0xD1, 0x7E, 0xD8, 0x0A, 0x61, 0x24, 0x1C, 0x95, 0x92, 0x56, 0xB6 };
private byte[] kirk7_key57 = new byte[16] { 0x1C, 0x9B, 0xC4, 0x90, 0xE3, 0x06, 0x64, 0x81, 0xFA, 0x59, 0xFD, 0xB6, 0x00, 0xBB, 0x28, 0x70 };
private byte[] kirk7_key5D = new byte[16] { 0x11, 0x5A, 0x5D, 0x20, 0xD5, 0x3A, 0x8D, 0xD3, 0x9C, 0xC5, 0xAF, 0x41, 0x0F, 0x0F, 0x18, 0x6F };
private byte[] kirk7_key63 = new byte[16] { 0x9C, 0x9B, 0x13, 0x72, 0xF8, 0xC6, 0x40, 0xCF, 0x1C, 0x62, 0xF5, 0xD5, 0x92, 0xDD, 0xB5, 0x82 };
private byte[] kirk7_key64 = new byte[16] { 0x03, 0xB3, 0x02, 0xE8, 0x5F, 0xF3, 0x81, 0xB1, 0x3B, 0x8D, 0xAA, 0x2A, 0x90, 0xFF, 0x5E, 0x61 };
 
===DRMKeys===
// DRM keys
public static final int[] drmFixedKey = { 0x38, 0x20, 0xD0, 0x11, 0x07, 0xA3, 0xFF, 0x3E, 0x0A, 0x4C, 0x20, 0x85, 0x39, 0x10, 0xB5, 0x54 };
public static final int[] drmModuleKey = { 0xBA, 0x87, 0xE4, 0xAB, 0x2C, 0x60, 0x5F, 0x59, 0xB8, 0x3B, 0xDB, 0xA6, 0x82, 0xFD, 0xAE, 0x14 };
public static final int[] drmRifKey = { 0xDA, 0x7D, 0x4B, 0x5E, 0x49, 0x9A, 0x4F, 0x53, 0xB1, 0xC1, 0xA1, 0x4A, 0x74, 0x84, 0x44, 0x3B };
public static final int[] drmActdatKey = { 0x5E, 0x06, 0xE0, 0x4F, 0xD9, 0x4A, 0x71, 0xBF, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01 };
public static final int[] drmUnkKey1 = { 0x69, 0xB4, 0x53, 0xF2, 0xE4, 0x21, 0x89, 0x8E, 0x53, 0xE4, 0xA3, 0x5A, 0x5B, 0x91, 0x79, 0x51 };
public static final int[] drmUnkKey2 = { 0xF0, 0x79, 0xD5, 0x19, 0x2D, 0x5D, 0xD3, 0x8C, 0xB5, 0x4B, 0x9E, 0xCD, 0xCD, 0xFD, 0xD3, 0xD7 };
public static final int[] drmRenameKey = { 0xEB, 0x71, 0x5D, 0xB8, 0xD3, 0x73, 0xCE, 0xA4, 0x6F, 0xE7, 0x1D, 0xCF, 0xFF, 0x63, 0xFA, 0xEA };
public static final int[] drmEncKey1 = { 0x07, 0x3D, 0x9E, 0x9D, 0xA8, 0xFD, 0x3B, 0x2F, 0x63, 0x18, 0x93, 0x2E, 0xF8, 0x57, 0xA6, 0x64 };
public static final int[] drmEncKey2 = { 0x37, 0x49, 0xB7, 0x01, 0xCA, 0xE2, 0xE0, 0xC5, 0x44, 0x2E, 0x06, 0xB6, 0x1E, 0xFF, 0x84, 0xF2 };
public static final int[] drmEncKey3 = { 0x9D, 0x31, 0xB8, 0x5A, 0xC8, 0xFA, 0x16, 0x80, 0x73, 0x60, 0x18, 0x82, 0x18, 0x77, 0x91, 0x9D };
public static final int[] drmDNASKey1 = { 0xED, 0xE2, 0x5D, 0x2D, 0xBB, 0xF8, 0x12, 0xE5, 0x3C, 0x5C, 0x59, 0x32, 0xFA, 0xE3, 0xE2, 0x43 };
public static final int[] drmDNASKey2 = { 0x27, 0x74, 0xFB, 0xEB, 0xA4, 0xA0, 0x01, 0xD7, 0x02, 0x56, 0x9E, 0x33, 0x8C, 0x19, 0x57, 0x83 };
     
public static final int[] drmActRifSig = {
0x62, 0x27, 0xB0, 0x0A, 0x02, 0x85, 0x6F, 0xB0, 0x41, 0x08, 0x87, 0x67, 0x19, 0xE0, 0xA0, 0x18, 0x32, 0x91, 0xEE, 0xB9,
0x6E, 0x73, 0x6A, 0xBF, 0x81, 0xF7, 0x0E, 0xE9, 0x16, 0x1B, 0x0D, 0xDE, 0xB0, 0x26, 0x76, 0x1A, 0x5B, 0xC8, 0x7B, 0xFF
};
   
public static final int[] drmEdatSprxSig = {
0x1F, 0x07, 0x2B, 0xCC, 0xC1, 0x62, 0xF2, 0xCF, 0xAE, 0xA0, 0xE7, 0xF4, 0xCD, 0xFD, 0x9C, 0xAE, 0xC6, 0xC4, 0x55, 0x21,
0x53, 0x01, 0xF4, 0xE3, 0x70, 0xC3, 0xED, 0xE2, 0xD4, 0xF5, 0xDB, 0xC3, 0xA7, 0xDE, 0x8C, 0xAA, 0xE8, 0xAD, 0x5B, 0x7D
};


See [https://www.psdevwiki.com/psp/Kirk#Individual_Seed Kirk documentation] for usage of PSP-related individual seeds.
=== ScePauthKey ===
// scePauth key
public static final int[] pauthXorKey = {
0xA9, 0x1E, 0xDD, 0x7B, 0x09, 0xBB, 0x22, 0xB5, 0x9D, 0xA3, 0x30, 0x69, 0x13, 0x6E, 0x0E, 0xD8
};


== Cmep Keyring 0x600 - Visible ID (Test Subject 9 PS Vita) ==
=== PRXDecrypter16byteTagKeys ===
// PRXDecrypter 16-byte tag keys.
public static final int[] keys260_0 = {0xC3, 0x24, 0x89, 0xD3, 0x80, 0x87, 0xB2, 0x4E, 0x4C, 0xD7, 0x49, 0xE4, 0x9D, 0x1D, 0x34, 0xD1};
public static final int[] keys260_1 = {0xF3, 0xAC, 0x6E, 0x7C, 0x04, 0x0A, 0x23, 0xE7, 0x0D, 0x33, 0xD8, 0x24, 0x73, 0x39, 0x2B, 0x4A};
public static final int[] keys260_2 = {0x72, 0xB4, 0x39, 0xFF, 0x34, 0x9B, 0xAE, 0x82, 0x30, 0x34, 0x4A, 0x1D, 0xA2, 0xD8, 0xB4, 0x3C};
public static final int[] keys280_0 = {0xCA, 0xFB, 0xBF, 0xC7, 0x50, 0xEA, 0xB4, 0x40, 0x8E, 0x44, 0x5C, 0x63, 0x53, 0xCE, 0x80, 0xB1};
public static final int[] keys280_1 = {0x40, 0x9B, 0xC6, 0x9B, 0xA9, 0xFB, 0x84, 0x7F, 0x72, 0x21, 0xD2, 0x36, 0x96, 0x55, 0x09, 0x74};
public static final int[] keys280_2 = {0x03, 0xA7, 0xCC, 0x4A, 0x5B, 0x91, 0xC2, 0x07, 0xFF, 0xFC, 0x26, 0x25, 0x1E, 0x42, 0x4B, 0xB5};
public static final int[] keys300_0 = {0x9F, 0x67, 0x1A, 0x7A, 0x22, 0xF3, 0x59, 0x0B, 0xAA, 0x6D, 0xA4, 0xC6, 0x8B, 0xD0, 0x03, 0x77};
public static final int[] keys300_1 = {0x15, 0x07, 0x63, 0x26, 0xDB, 0xE2, 0x69, 0x34, 0x56, 0x08, 0x2A, 0x93, 0x4E, 0x4B, 0x8A, 0xB2};
public static final int[] keys300_2 = {0x56, 0x3B, 0x69, 0xF7, 0x29, 0x88, 0x2F, 0x4C, 0xDB, 0xD5, 0xDE, 0x80, 0xC6, 0x5C, 0xC8, 0x73};
public static final int[] keys303_0 = {0x7b, 0xa1, 0xe2, 0x5a, 0x91, 0xb9, 0xd3, 0x13, 0x77, 0x65, 0x4a, 0xb7, 0xc2, 0x8a, 0x10, 0xaf};
public static final int[] keys310_0 = {0xa2, 0x41, 0xe8, 0x39, 0x66, 0x5b, 0xfa, 0xbb, 0x1b, 0x2d, 0x6e, 0x0e, 0x33, 0xe5, 0xd7, 0x3f};
public static final int[] keys310_1 = {0xA4, 0x60, 0x8F, 0xAB, 0xAB, 0xDE, 0xA5, 0x65, 0x5D, 0x43, 0x3A, 0xD1, 0x5E, 0xC3, 0xFF, 0xEA};
public static final int[] keys310_2 = {0xE7, 0x5C, 0x85, 0x7A, 0x59, 0xB4, 0xE3, 0x1D, 0xD0, 0x9E, 0xCE, 0xC2, 0xD6, 0xD4, 0xBD, 0x2B};
public static final int[] keys310_3 = {0x2E, 0x00, 0xF6, 0xF7, 0x52, 0xCF, 0x95, 0x5A, 0xA1, 0x26, 0xB4, 0x84, 0x9B, 0x58, 0x76, 0x2F};
public static final int[] keys330_0 = {0x3B, 0x9B, 0x1A, 0x56, 0x21, 0x80, 0x14, 0xED, 0x8E, 0x8B, 0x08, 0x42, 0xFA, 0x2C, 0xDC, 0x3A};
public static final int[] keys330_1 = {0xE8, 0xBE, 0x2F, 0x06, 0xB1, 0x05, 0x2A, 0xB9, 0x18, 0x18, 0x03, 0xE3, 0xEB, 0x64, 0x7D, 0x26};
public static final int[] keys330_2 = {0xAB, 0x82, 0x25, 0xD7, 0x43, 0x6F, 0x6C, 0xC1, 0x95, 0xC5, 0xF7, 0xF0, 0x63, 0x73, 0x3F, 0xE7};
public static final int[] keys330_3 = {0xA8, 0xB1, 0x47, 0x77, 0xDC, 0x49, 0x6A, 0x6F, 0x38, 0x4C, 0x4D, 0x96, 0xBD, 0x49, 0xEC, 0x9B};
public static final int[] keys330_4 = {0xEC, 0x3B, 0xD2, 0xC0, 0xFA, 0xC1, 0xEE, 0xB9, 0x9A, 0xBC, 0xFF, 0xA3, 0x89, 0xF2, 0x60, 0x1F};
public static final int[] keys360_0 = {0x3C, 0x2B, 0x51, 0xD4, 0x2D, 0x85, 0x47, 0xDA, 0x2D, 0xCA, 0x18, 0xDF, 0xFE, 0x54, 0x09, 0xED};
public static final int[] keys360_1 = {0x31, 0x1F, 0x98, 0xD5, 0x7B, 0x58, 0x95, 0x45, 0x32, 0xAB, 0x3A, 0xE3, 0x89, 0x32, 0x4B, 0x34};
public static final int[] keys370_0 = {0x26, 0x38, 0x0A, 0xAC, 0xA5, 0xD8, 0x74, 0xD1, 0x32, 0xB7, 0x2A, 0xBF, 0x79, 0x9E, 0x6D, 0xDB};
public static final int[] keys370_1 = {0x53, 0xE7, 0xAB, 0xB9, 0xC6, 0x4A, 0x4B, 0x77, 0x92, 0x17, 0xB5, 0x74, 0x0A, 0xDA, 0xA9, 0xEA};
public static final int[] keys370_2 = {0x71, 0x10, 0xF0, 0xA4, 0x16, 0x14, 0xD5, 0x93, 0x12, 0xFF, 0x74, 0x96, 0xDF, 0x1F, 0xDA, 0x89};
public static final int[] keys390_0 = {0x45, 0xEF, 0x5C, 0x5D, 0xED, 0x81, 0x99, 0x84, 0x12, 0x94, 0x8F, 0xAB, 0xE8, 0x05, 0x6D, 0x7D};
public static final int[] keys390_1 = {0x70, 0x1B, 0x08, 0x25, 0x22, 0xA1, 0x4D, 0x3B, 0x69, 0x21, 0xF9, 0x71, 0x0A, 0xA8, 0x41, 0xA9};
public static final int[] keys500_0 = {0xEB, 0x1B, 0x53, 0x0B, 0x62, 0x49, 0x32, 0x58, 0x1F, 0x83, 0x0A, 0xF4, 0x99, 0x3D, 0x75, 0xD0};
public static final int[] keys500_1 = {0xBA, 0xE2, 0xA3, 0x12, 0x07, 0xFF, 0x04, 0x1B, 0x64, 0xA5, 0x11, 0x85, 0xF7, 0x2F, 0x99, 0x5B};
public static final int[] keys500_2 = {0x2C, 0x8E, 0xAF, 0x1D, 0xFF, 0x79, 0x73, 0x1A, 0xAD, 0x96, 0xAB, 0x09, 0xEA, 0x35, 0x59, 0x8B};
public static final int[] keys500_c = {0xA3, 0x5D, 0x51, 0xE6, 0x56, 0xC8, 0x01, 0xCA, 0xE3, 0x77, 0xBF, 0xCD, 0xFF, 0x24, 0xDA, 0x4D};
public static final int[] keys505_a = {0x7B, 0x94, 0x72, 0x27, 0x4C, 0xCC, 0x54, 0x3B, 0xAE, 0xDF, 0x46, 0x37, 0xAC, 0x01, 0x4D, 0x87};
public static final int[] keys505_0 = {0x2E, 0x8E, 0x97, 0xA2, 0x85, 0x42, 0x70, 0x73, 0x18, 0xDA, 0xA0, 0x8A, 0xF8, 0x62, 0xA2, 0xB0};
public static final int[] keys505_1 = {0x58, 0x2A, 0x4C, 0x69, 0x19, 0x7B, 0x83, 0x3D, 0xD2, 0x61, 0x61, 0xFE, 0x14, 0xEE, 0xAA, 0x11};
public static final int[] keys570_5k = {0x6D, 0x72, 0xA4, 0xBA, 0x7F, 0xBF, 0xD1, 0xF1, 0xA9, 0xF3, 0xBB, 0x07, 0x1B, 0xC0, 0xB3, 0x66};
public static final int[] keys600_1 = {0xE3, 0x52, 0x39, 0x97, 0x3B, 0x84, 0x41, 0x1C, 0xC3, 0x23, 0xF1, 0xB8, 0xA9, 0x09, 0x4B, 0xF0};
public static final int[] keys600_2 = {0xE1, 0x45, 0x93, 0x2C, 0x53, 0xE2, 0xAB, 0x06, 0x6F, 0xB6, 0x8F, 0x0B, 0x66, 0x91, 0xE7, 0x1E};
public static final int[] keys620_0 = {0xD6, 0xBD, 0xCE, 0x1E, 0x12, 0xAF, 0x9A, 0xE6, 0x69, 0x30, 0xDE, 0xDA, 0x88, 0xB8, 0xFF, 0xFB};
public static final int[] keys620_1 = {0x1D, 0x13, 0xE9, 0x50, 0x04, 0x73, 0x3D, 0xD2, 0xE1, 0xDA, 0xB9, 0xC1, 0xE6, 0x7B, 0x25, 0xA7};
public static final int[] keys620_a = {0xAC, 0x34, 0xBA, 0xB1, 0x97, 0x8D, 0xAE, 0x6F, 0xBA, 0xE8, 0xB1, 0xD6, 0xDF, 0xDF, 0xF1, 0xA2};
public static final int[] keys620_e = {0xB1, 0xB3, 0x7F, 0x76, 0xC3, 0xFB, 0x88, 0xE6, 0xF8, 0x60, 0xD3, 0x35, 0x3C, 0xA3, 0x4E, 0xF3};
public static final int[] keys620_5 = {0xF1, 0xBC, 0x17, 0x07, 0xAE, 0xB7, 0xC8, 0x30, 0xD8, 0x34, 0x9D, 0x40, 0x6A, 0x8E, 0xDF, 0x4E};
public static final int[] keys620_5k = {0x41, 0x8A, 0x35, 0x4F, 0x69, 0x3A, 0xDF, 0x04, 0xFD, 0x39, 0x46, 0xA2, 0x5C, 0x2D, 0xF2, 0x21};
public static final int[] keys620_5v = {0xF2, 0x8F, 0x75, 0xA7, 0x31, 0x91, 0xCE, 0x9E, 0x75, 0xBD, 0x27, 0x26, 0xB4, 0xB4, 0x0C, 0x32};
public static final int[] keys630_k1 = {0x36, 0xB0, 0xDC, 0xFC, 0x59, 0x2A, 0x95, 0x1D, 0x80, 0x2D, 0x80, 0x3F, 0xCD, 0x30, 0xA0, 0x1B};
public static final int[] keys630_k2 = {0xd4, 0x35, 0x18, 0x02, 0x29, 0x68, 0xfb, 0xa0, 0x6a, 0xa9, 0xa5, 0xed, 0x78, 0xfd, 0x2e, 0x9d};
public static final int[] keys630_k3 = {0x23, 0x8D, 0x3D, 0xAE, 0x41, 0x50, 0xA0, 0xFA, 0xF3, 0x2F, 0x32, 0xCE, 0xC7, 0x27, 0xCD, 0x50};
public static final int[] keys630_k4 = {0xAA, 0xA1, 0xB5, 0x7C, 0x93, 0x5A, 0x95, 0xBD, 0xEF, 0x69, 0x16, 0xFC, 0x2B, 0x92, 0x31, 0xDD};
public static final int[] keys630_k5 = {0x87, 0x37, 0x21, 0xCC, 0x65, 0xAE, 0xAA, 0x5F, 0x40, 0xF6, 0x6F, 0x2A, 0x86, 0xC7, 0xA1, 0xC8};
public static final int[] keys630_k6 = {0x8D, 0xDB, 0xDC, 0x5C, 0xF2, 0x70, 0x2B, 0x40, 0xB2, 0x3D, 0x00, 0x09, 0x61, 0x7C, 0x10, 0x60};
public static final int[] keys630_k7 = {0x77, 0x1C, 0x06, 0x5F, 0x53, 0xEC, 0x3F, 0xFC, 0x22, 0xCE, 0x5A, 0x27, 0xFF, 0x78, 0xA8, 0x48};
public static final int[] keys630_k8 = {0x81, 0xD1, 0x12, 0x89, 0x35, 0xC8, 0xEA, 0x8B, 0xE0, 0x02, 0x2D, 0x2D, 0x6A, 0x18, 0x67, 0xB8};
public static final int[] keys636_1 = {0x47, 0xEC, 0x60, 0x15, 0x12, 0x2C, 0xE3, 0xE0, 0x4A, 0x22, 0x6F, 0x31, 0x9F, 0xFA, 0x97, 0x3E};
public static final int[] keys636_k1 = {0x07, 0xE3, 0x08, 0x64, 0x7F, 0x60, 0xA3, 0x36, 0x6A, 0x76, 0x21, 0x44, 0xC9, 0xD7, 0x06, 0x83};
public static final int[] keys636_k2 = {0x91, 0xF2, 0x02, 0x9E, 0x63, 0x32, 0x30, 0xA9, 0x1D, 0xDA, 0x0B, 0xA8, 0xB7, 0x41, 0xA3, 0xCC};
public static final int[] keys638_k4 = {0x98, 0x43, 0xFF, 0x85, 0x68, 0xB2, 0xDB, 0x3B, 0xD4, 0x22, 0xD0, 0x4F, 0xAB, 0x5F, 0x0A, 0x31};
public static final int[] keys639_k3 = {0x01, 0x7B, 0xF0, 0xE9, 0xBE, 0x9A, 0xDD, 0x54, 0x37, 0xEA, 0x0E, 0xC4, 0xD6, 0x4D, 0x8E, 0x9E};
public static final int[] keys660_k0 = {0x48, 0x58, 0xAA, 0x38, 0x78, 0x9A, 0x6C, 0x0D, 0x42, 0xEA, 0xC8, 0x19, 0x23, 0x34, 0x4D, 0xF0};
public static final int[] keys660_k1 = {0x76, 0xF2, 0x6C, 0x0A, 0xCA, 0x3A, 0xBA, 0x4E, 0xAC, 0x76, 0xD2, 0x40, 0xF5, 0xC3, 0xBF, 0xF9};
public static final int[] keys660_k2 = {0x7A, 0x3E, 0x55, 0x75, 0xB9, 0x6A, 0xFC, 0x4F, 0x3E, 0xE3, 0xDF, 0xB3, 0x6C, 0xE8, 0x2A, 0x82};
public static final int[] keys660_k3 = {0xFA, 0x79, 0x09, 0x36, 0xE6, 0x19, 0xE8, 0xA4, 0xA9, 0x41, 0x37, 0x18, 0x81, 0x02, 0xE9, 0xB3};
public static final int[] keys660_k4 = {0xC8, 0xA0, 0x70, 0x98, 0xAE, 0xE6, 0x2B, 0x80, 0xD7, 0x91, 0xE6, 0xCA, 0x4C, 0xA9, 0x78, 0x4E};
public static final int[] keys660_k5 = {0xBF, 0xF8, 0x34, 0x02, 0x84, 0x47, 0xBD, 0x87, 0x1C, 0x52, 0x03, 0x23, 0x79, 0xBB, 0x59, 0x81};
public static final int[] keys660_k6 = {0xD2, 0x83, 0xCC, 0x63, 0xBB, 0x10, 0x15, 0xE7, 0x7B, 0xC0, 0x6D, 0xEE, 0x34, 0x9E, 0x4A, 0xFA};
public static final int[] keys660_k7 = {0xEB, 0xD9, 0x1E, 0x05, 0x3C, 0xAE, 0xAB, 0x62, 0xE3, 0xB7, 0x1F, 0x37, 0xE5, 0xCD, 0x68, 0xC3};
public static final int[] keys660_k8 = {0x85, 0x93, 0x1F, 0xED, 0x2C, 0x4D, 0xA4, 0x53, 0x59, 0x9C, 0x3F, 0x16, 0xF3, 0x50, 0xDE, 0x46};
public static final int[] keys660_v0 = {0x08, 0x57, 0xC2, 0x49, 0x15, 0xD6, 0x2C, 0xDB, 0x62, 0xBE, 0x86, 0x6C, 0x75, 0x19, 0xDC, 0x4D};
public static final int[] keys660_v1 = {0xBA, 0x76, 0x61, 0x47, 0x8B, 0x55, 0xA8, 0x72, 0x89, 0x15, 0x79, 0x6D, 0xD7, 0x2F, 0x78, 0x0E};
public static final int[] keys660_v2 = {0xF9, 0x4A, 0x6B, 0x96, 0x79, 0x3F, 0xEE, 0x0A, 0x04, 0xC8, 0x8D, 0x7E, 0x5F, 0x38, 0x3A, 0xCF};
public static final int[] keys660_v3 = {0x88, 0xAF, 0x18, 0xE9, 0xC3, 0xAA, 0x6B, 0x56, 0xF7, 0xC5, 0xA8, 0xBF, 0x1A, 0x84, 0xE9, 0xF3};
public static final int[] keys660_v4 = {0xD1, 0xB0, 0xAE, 0xC3, 0x24, 0x36, 0x13, 0x49, 0xD6, 0x49, 0xD7, 0x88, 0xEA, 0xA4, 0x99, 0x86};
public static final int[] keys660_v5 = {0xCB, 0x93, 0x12, 0x38, 0x31, 0xC0, 0x2D, 0x2E, 0x7A, 0x18, 0x5C, 0xAC, 0x92, 0x93, 0xAB, 0x32};
public static final int[] keys660_v6 = {0x92, 0x8C, 0xA4, 0x12, 0xD6, 0x5C, 0x55, 0x31, 0x5B, 0x94, 0x23, 0x9B, 0x62, 0xB3, 0xDB, 0x47};
public static final int[] keys660_v7 = {0xC5, 0x9C, 0x77, 0x9C, 0x41, 0x01, 0xE4, 0x85, 0x79, 0xC8, 0x71, 0x63, 0xA5, 0x7D, 0x4F, 0xFB};
public static final int[] keys660_v8 = {0x86, 0xA0, 0x7D, 0x4D, 0xB3, 0x6B, 0xA2, 0xFD, 0xF4, 0x15, 0x85, 0x70, 0x2D, 0x6A, 0x0D, 0x3A};
public static final int[] keys660_v9 = {0x4B, 0x6B, 0xC8, 0x98, 0xE7, 0xBC, 0x6A, 0xA3, 0xEF, 0x63, 0x72, 0x7F, 0xFD, 0x0E, 0x9E, 0x8C};
public static final int[] keys210_vita_k0 = {0x3F, 0x67, 0x09, 0xA1, 0x47, 0x71, 0xD6, 0x9E, 0x27, 0x7C, 0x7B, 0x32, 0x67, 0x0E, 0x65, 0x8A};
public static final int[] key_21C0 = {0x6A, 0x19, 0x71, 0xF3, 0x18, 0xDE, 0xD3, 0xA2, 0x6D, 0x3B, 0xDE, 0xC7, 0xBE, 0x98, 0xE2, 0x4C};
public static final int[] key_2250 = {0x50, 0xCC, 0x03, 0xAC, 0x3F, 0x53, 0x1A, 0xFA, 0x0A, 0xA4, 0x34, 0x23, 0x86, 0x61, 0x7F, 0x97};
public static final int[] key_22E0 = {0x66, 0x0F, 0xCB, 0x3B, 0x30, 0x75, 0xE3, 0x10, 0x0A, 0x95, 0x65, 0xC7, 0x3C, 0x93, 0x87, 0x22};
public static final int[] key_2D80 = {0x40, 0x02, 0xC0, 0xBF, 0x20, 0x02, 0xC0, 0xBF, 0x5C, 0x68, 0x2B, 0x95, 0x5F, 0x40, 0x7B, 0xB8};
public static final int[] key_2D90 = {0x55, 0x19, 0x35, 0x10, 0x48, 0xD8, 0x2E, 0x46, 0xA8, 0xB1, 0x47, 0x77, 0xDC, 0x49, 0x6A, 0x6F};
public static final int[] key_2DA8 = {0x80, 0x02, 0xC0, 0xBF, 0x00, 0x0A, 0xC0, 0xBF, 0x40, 0x03, 0xC0, 0xBF, 0x40, 0x00, 0x00, 0x00};
public static final int[] key_2DB8 = {0x4C, 0x2D, 0x00, 0x00, 0x00, 0xFF, 0xFF, 0x00, 0xB8, 0x15, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00};
public static final int[] key_D91605F0 = {0xB8, 0x8C, 0x45, 0x8B, 0xB6, 0xE7, 0x6E, 0xB8, 0x51, 0x59, 0xA6, 0x53, 0x7C, 0x5E, 0x86, 0x31};
public static final int[] key_D91606F0 = {0xED, 0x10, 0xE0, 0x36, 0xC4, 0xFE, 0x83, 0xF3, 0x75, 0x70, 0x5E, 0xF6, 0xA4, 0x40, 0x05, 0xF7};
public static final int[] key_D91608F0 = {0x5C, 0x77, 0x0C, 0xBB, 0xB4, 0xC2, 0x4F, 0xA2, 0x7E, 0x3B, 0x4E, 0xB4, 0xB4, 0xC8, 0x70, 0xAF};
public static final int[] key_D91609F0 = {0xD0, 0x36, 0x12, 0x75, 0x80, 0x56, 0x20, 0x43, 0xC4, 0x30, 0x94, 0x3E, 0x1C, 0x75, 0xD1, 0xBF};
public static final int[] key_D9160AF0 = {0x10, 0xA9, 0xAC, 0x16, 0xAE, 0x19, 0xC0, 0x7E, 0x3B, 0x60, 0x77, 0x86, 0x01, 0x6F, 0xF2, 0x63};
public static final int[] key_D9160BF0 = {0x83, 0x83, 0xF1, 0x37, 0x53, 0xD0, 0xBE, 0xFC, 0x8D, 0xA7, 0x32, 0x52, 0x46, 0x0A, 0xC2, 0xC2};
public static final int[] key_D91611F0 = {0x61, 0xB0, 0xC0, 0x58, 0x71, 0x57, 0xD9, 0xFA, 0x74, 0x67, 0x0E, 0x5C, 0x7E, 0x6E, 0x95, 0xB9};
public static final int[] key_D91612F0 = {0x9E, 0x20, 0xE1, 0xCD, 0xD7, 0x88, 0xDE, 0xC0, 0x31, 0x9B, 0x10, 0xAF, 0xC5, 0xB8, 0x73, 0x23};
public static final int[] key_D91613F0 = {0xEB, 0xFF, 0x40, 0xD8, 0xB4, 0x1A, 0xE1, 0x66, 0x91, 0x3B, 0x8F, 0x64, 0xB6, 0xFC, 0xB7, 0x12};
public static final int[] key_D91614F0 = {0xFD, 0xF7, 0xB7, 0x3C, 0x9F, 0xD1, 0x33, 0x95, 0x11, 0xB8, 0xB5, 0xBB, 0x54, 0x23, 0x73, 0x85};
public static final int[] key_D91615F0 = {0xC8, 0x03, 0xE3, 0x44, 0x50, 0xF1, 0xE7, 0x2A, 0x6A, 0x0D, 0xC3, 0x61, 0xB6, 0x8E, 0x5F, 0x51};
public static final int[] key_D91616F0 = {0x53, 0x03, 0xB8, 0x6A, 0x10, 0x19, 0x98, 0x49, 0x1C, 0xAF, 0x30, 0xE4, 0x25, 0x1B, 0x6B, 0x28};
public static final int[] key_D91617F0 = {0x02, 0xFA, 0x48, 0x73, 0x75, 0xAF, 0xAE, 0x0A, 0x67, 0x89, 0x2B, 0x95, 0x4B, 0x09, 0x87, 0xA3};
public static final int[] key_D91618F0 = {0x96, 0x96, 0x7C, 0xC3, 0xF7, 0x12, 0xDA, 0x62, 0x1B, 0xF6, 0x9A, 0x9A, 0x44, 0x44, 0xBC, 0x48};
public static final int[] key_D91619F0 = {0xE0, 0x32, 0xA7, 0x08, 0x6B, 0x2B, 0x29, 0x2C, 0xD1, 0x4D, 0x5B, 0xEE, 0xA8, 0xC8, 0xB4, 0xE9};
public static final int[] key_D9161AF0 = {0x27, 0xE5, 0xA7, 0x49, 0x52, 0xE1, 0x94, 0x67, 0x35, 0x66, 0x91, 0x0C, 0xE8, 0x9A, 0x25, 0x24};
public static final int[] key_D91620F0 = {0x52, 0x1C, 0xB4, 0x5F, 0x40, 0x3B, 0x9A, 0xDD, 0xAC, 0xFC, 0xEA, 0x92, 0xFD, 0xDD, 0xF5, 0x90};
public static final int[] key_D91621F0 = {0xD1, 0x91, 0x2E, 0xA6, 0x21, 0x14, 0x29, 0x62, 0xF6, 0xED, 0xAE, 0xCB, 0xDD, 0xA3, 0xBA, 0xFE};
public static final int[] key_D91622F0 = {0x59, 0x5D, 0x78, 0x4D, 0x21, 0xB2, 0x01, 0x17, 0x6C, 0x9A, 0xB5, 0x1B, 0xDA, 0xB7, 0xF9, 0xE6};
public static final int[] key_D91623F0 = {0xAA, 0x45, 0xEB, 0x4F, 0x62, 0xFB, 0xD1, 0x0D, 0x71, 0xD5, 0x62, 0xD2, 0xF5, 0xBF, 0xA5, 0x2F};
public static final int[] key_D91624F0 = {0x61, 0xB7, 0x26, 0xAF, 0x8B, 0xF1, 0x41, 0x58, 0x83, 0x6A, 0xC4, 0x92, 0x12, 0xCB, 0xB1, 0xE9};
public static final int[] key_D91628F0 = {0x49, 0xA4, 0xFC, 0x66, 0xDC, 0xE7, 0x62, 0x21, 0xDB, 0x18, 0xA7, 0x50, 0xD6, 0xA8, 0xC1, 0xB6};
public static final int[] key_D91680F0 = {0x2C, 0x22, 0x9B, 0x12, 0x36, 0x74, 0x11, 0x67, 0x49, 0xD1, 0xD1, 0x88, 0x92, 0xF6, 0xA1, 0xD8};
public static final int[] key_D91681F0 = {0x52, 0xB6, 0x36, 0x6C, 0x8C, 0x46, 0x7F, 0x7A, 0xCC, 0x11, 0x62, 0x99, 0xC1, 0x99, 0xBE, 0x98};
public static final int[] key_2E5E10F0 = {0x9D, 0x5C, 0x5B, 0xAF, 0x8C, 0xD8, 0x69, 0x7E, 0x51, 0x9F, 0x70, 0x96, 0xE6, 0xD5, 0xC4, 0xE8};
public static final int[] key_2E5E12F0 = {0x8A, 0x7B, 0xC9, 0xD6, 0x52, 0x58, 0x88, 0xEA, 0x51, 0x83, 0x60, 0xCA, 0x16, 0x79, 0xE2, 0x07};
public static final int[] key_2E5E13F0 = {0xFF, 0xA4, 0x68, 0xC3, 0x31, 0xCA, 0xB7, 0x4C, 0xF1, 0x23, 0xFF, 0x01, 0x65, 0x3D, 0x26, 0x36};
public static final int[] key_2FD30BF0 = {0xD8, 0x58, 0x79, 0xF9, 0xA4, 0x22, 0xAF, 0x86, 0x90, 0xAC, 0xDA, 0x45, 0xCE, 0x60, 0x40, 0x3F};
public static final int[] key_2FD311F0 = {0x3A, 0x6B, 0x48, 0x96, 0x86, 0xA5, 0xC8, 0x80, 0x69, 0x6C, 0xE6, 0x4B, 0xF6, 0x04, 0x17, 0x44};
public static final int[] key_2FD312F0 = {0xC5, 0xFB, 0x69, 0x03, 0x20, 0x7A, 0xCF, 0xBA, 0x2C, 0x90, 0xF8, 0xB8, 0x4D, 0xD2, 0xF1, 0xDE};
public static final int[] key_2FD313F0 = {0xB0, 0x24, 0xC8, 0x16, 0x43, 0xE8, 0xF0, 0x1C, 0x8C, 0x30, 0x67, 0x73, 0x3E, 0x96, 0x35, 0xEF};
public static final int[] keys02G_E = {0x9D, 0x09, 0xFD, 0x20, 0xF3, 0x8F, 0x10, 0x69, 0x0D, 0xB2, 0x6F, 0x00, 0xCC, 0xC5, 0x51, 0x2E};
public static final int[] keys03G_E = {0x4F, 0x44, 0x5C, 0x62, 0xB3, 0x53, 0xC4, 0x30, 0xFC, 0x3A, 0xA4, 0x5B, 0xEC, 0xFE, 0x51, 0xEA};
public static final int[] keys05G_E = {0x5D, 0xAA, 0x72, 0xF2, 0x26, 0x60, 0x4D, 0x1C, 0xE7, 0x2D, 0xC8, 0xA3, 0x2F, 0x79, 0xC5, 0x54};
public static final int[] oneseg_310 = {0xC7, 0x27, 0x72, 0x85, 0xAB, 0xA7, 0xF7, 0xF0, 0x4C, 0xC1, 0x86, 0xCC, 0xE3, 0x7F, 0x17, 0xCA};
public static final int[] oneseg_300 = {0x76, 0x40, 0x9E, 0x08, 0xDB, 0x9B, 0x3B, 0xA1, 0x47, 0x8A, 0x96, 0x8E, 0xF3, 0xF7, 0x62, 0x92};
public static final int[] oneseg_280 = {0x23, 0xDC, 0x3B, 0xB5, 0xA9, 0x82, 0xD6, 0xEA, 0x63, 0xA3, 0x6E, 0x2B, 0x2B, 0xE9, 0xE1, 0x54};
public static final int[] oneseg_260_271 = {0x22, 0x43, 0x57, 0x68, 0x2F, 0x41, 0xCE, 0x65, 0x4C, 0xA3, 0x7C, 0xC6, 0xC4, 0xAC, 0xF3, 0x60};
public static final int[] oneseg_slim = {0x12, 0x57, 0x0D, 0x8A, 0x16, 0x6D, 0x87, 0x06, 0x03, 0x7D, 0xC8, 0x8B, 0x62, 0xA3, 0x32, 0xA9};
public static final int[] ms_app_main = {0x1E, 0x2E, 0x38, 0x49, 0xDA, 0xD4, 0x16, 0x08, 0x27, 0x2E, 0xF3, 0xBC, 0x37, 0x75, 0x80, 0x93};
public static final int[] demokeys_280 = {0x12, 0x99, 0x70, 0x5E, 0x24, 0x07, 0x6C, 0xD0, 0x2D, 0x06, 0xFE, 0x7E, 0xB3, 0x0C, 0x11, 0x26};
public static final int[] demokeys_3XX_1 = {0x47, 0x05, 0xD5, 0xE3, 0x56, 0x1E, 0x81, 0x9B, 0x09, 0x2F, 0x06, 0xDB, 0x6B, 0x12, 0x92, 0xE0};
public static final int[] demokeys_3XX_2 = {0xF6, 0x62, 0x39, 0x6E, 0x26, 0x22, 0x4D, 0xCA, 0x02, 0x64, 0x16, 0x99, 0x7B, 0x9A, 0xE7, 0xB8};
public static final int[] ebootbin_271_new = {0xF4, 0xAE, 0xF4, 0xE1, 0x86, 0xDD, 0xD2, 0x9C, 0x7C, 0xC5, 0x42, 0xA6, 0x95, 0xA0, 0x83, 0x88};
public static final int[] ebootbin_280_new = {0xB8, 0x8C, 0x45, 0x8B, 0xB6, 0xE7, 0x6E, 0xB8, 0x51, 0x59, 0xA6, 0x53, 0x7C, 0x5E, 0x86, 0x31};
public static final int[] ebootbin_300_new = {0xED, 0x10, 0xE0, 0x36, 0xC4, 0xFE, 0x83, 0xF3, 0x75, 0x70, 0x5E, 0xF6, 0xA4, 0x40, 0x05, 0xF7};
public static final int[] ebootbin_310_new = {0x5C, 0x77, 0x0C, 0xBB, 0xB4, 0xC2, 0x4F, 0xA2, 0x7E, 0x3B, 0x4E, 0xB4, 0xB4, 0xC8, 0x70, 0xAF};
public static final int[] gameshare_260_271 = {0xF9, 0x48, 0x38, 0x0C, 0x96, 0x88, 0xA7, 0x74, 0x4F, 0x65, 0xA0, 0x54, 0xC2, 0x76, 0xD9, 0xB8};
public static final int[] gameshare_280 = {0x2D, 0x86, 0x77, 0x3A, 0x56, 0xA4, 0x4F, 0xDD, 0x3C, 0x16, 0x71, 0x93, 0xAA, 0x8E, 0x11, 0x43};
public static final int[] gameshare_300 = {0x78, 0x1A, 0xD2, 0x87, 0x24, 0xBD, 0xA2, 0x96, 0x18, 0x3F, 0x89, 0x36, 0x72, 0x90, 0x92, 0x85};
public static final int[] gameshare_310 = {0xC9, 0x7D, 0x3E, 0x0A, 0x54, 0x81, 0x6E, 0xC7, 0x13, 0x74, 0x99, 0x74, 0x62, 0x18, 0xE7, 0xDD};
public static final int[] key_380210F0 = {0x32, 0x2C, 0xFA, 0x75, 0xE4, 0x7E, 0x93, 0xEB, 0x9F, 0x22, 0x80, 0x85, 0x57, 0x08, 0x98, 0x48};
public static final int[] key_380280F0 = {0x97, 0x09, 0x12, 0xD3, 0xDB, 0x02, 0xBD, 0xD8, 0xE7, 0x74, 0x51, 0xFE, 0xF0, 0xEA, 0x6C, 0x5C};
public static final int[] key_380283F0 = {0x34, 0x20, 0x0C, 0x8E, 0xA1, 0x86, 0x79, 0x84, 0xAF, 0x13, 0xAE, 0x34, 0x77, 0x6F, 0xEA, 0x89};
public static final int[] key_407810F0 = {0xAF, 0xAD, 0xCA, 0xF1, 0x95, 0x59, 0x91, 0xEC, 0x1B, 0x27, 0xD0, 0x4E, 0x8A, 0xF3, 0x3D, 0xE7};
public static final int[] drmkeys_6XX_1 = {0x36, 0xEF, 0x82, 0x4E, 0x74, 0xFB, 0x17, 0x5B, 0x14, 0x14, 0x05, 0xF3, 0xB3, 0x8A, 0x76, 0x18};
public static final int[] drmkeys_6XX_2 = {0x21, 0x52, 0x5D, 0x76, 0xF6, 0x81, 0x0F, 0x15, 0x2F, 0x4A, 0x40, 0x89, 0x63, 0xA0, 0x10, 0x55};
public static final int[] key_gamepkg = {0x07, 0xF2, 0xC6, 0x82, 0x90, 0xB5, 0x0D, 0x2C, 0x33, 0x81, 0x8D, 0x70, 0x9B, 0x60, 0xE6, 0x2B};


=== PRXDecrypter144byteTagKeys ===
// PRXDecrypter 144-byte tag keys
public static final int g_key0[] = {
0x7b21f3be, 0x299c5e1d, 0x1c9c5e71, 0x96cb4645, 0x3c9b1be0, 0xeb85de3d, 0x4a7f2022, 0xc2206eaa, 0xd50b3265, 0x55770567, 0x3c080840, 0x981d55f2,
0x5fd8f6f3, 0xee8eb0c5, 0x944d8152, 0xf8278651, 0x2705bafa, 0x8420e533, 0x27154ae9, 0x4819aa32, 0x59a3aa40, 0x2cb3cf65, 0xf274466d, 0x3a655605,
0x21b0f88f, 0xc5b18d26, 0x64c19051, 0xd669c94e, 0xe87035f2, 0x9d3a5909, 0x6f4e7102, 0xdca946ce, 0x8416881b, 0xbab097a5, 0x249125c6, 0xb34c0872 };
   
public static final int g_key2[] = {
0xccfda932, 0x51c06f76, 0x046dcccf, 0x49e1821e, 0x7d3b024c, 0x9dda5865, 0xcc8c9825, 0xd1e97db5, 0x6874d8cb, 0x3471c987, 0x72edb3fc, 0x81c8365d,
0xe161e33a, 0xfc92db59, 0x2009b1ec, 0xb1a94ce4, 0x2f03696b, 0x87e236d8, 0x3b2b8ce9, 0x0305e784, 0xf9710883, 0xb039db39, 0x893bea37, 0xe74d6805,
0x2a5c38bd, 0xb08dc813, 0x15b32375, 0x46be4525, 0x0103fd90, 0xa90e87a2, 0x52aba66a, 0x85bf7b80, 0x45e8ce63, 0x4dd716d3, 0xf5e30d2d, 0xaf3ae456 };
   
public static final int g_key3[] = {
0xa6c8f5ca, 0x6d67c080, 0x924f4d3a, 0x047ca06a, 0x08640297, 0x4fd4a758, 0xbd685a87, 0x9b2701c2, 0x83b62a35, 0x726b533c, 0xe522fa0c, 0xc24b06b4,
0x459d1cac, 0xa8c5417b, 0x4fea62a2, 0x0615d742, 0x30628d09, 0xc44fab14, 0x69ff715e, 0xd2d8837d, 0xbeed0b8b, 0x1e6e57ae, 0x61e8c402, 0xbe367a06,
0x543f2b5e, 0xdb3ec058, 0xbe852075, 0x1e7e4dcc, 0x1564ea55, 0xec7825b4, 0xc0538cad, 0x70f72c7f, 0x49e8c3d0, 0xeda97ec5, 0xf492b0a4, 0xe05eb02a };
   
public static final int g_key44[] = {
0xef80e005, 0x3a54689f, 0x43c99ccd, 0x1b7727be, 0x5cb80038, 0xdd2efe62, 0xf369f92c, 0x160f94c5, 0x29560019, 0xbf3c10c5, 0xf2ce5566, 0xcea2c626,
0xb601816f, 0x64e7481e, 0x0c34debd, 0x98f29cb0, 0x3fc504d7, 0xc8fb39f0, 0x0221b3d8, 0x63f936a2, 0x9a3a4800, 0x6ecc32e3, 0x8e120cfd, 0xb0361623,
0xaee1e689, 0x745502eb, 0xe4a6c61c, 0x74f23eb4, 0xd7fa5813, 0xb01916eb, 0x12328457, 0xd2bc97d2, 0x646425d8, 0x328380a5, 0x43da8ab1, 0x4b122ac9 };
   
public static final int g_key20[] = {
0x33b50800, 0xf32f5fcd, 0x3c14881f, 0x6e8a2a95, 0x29feefd5, 0x1394eae3, 0xbd6bd443, 0x0821c083, 0xfab379d3, 0xe613e165, 0xf5a754d3, 0x108b2952,
0x0a4b1e15, 0x61eadeba, 0x557565df, 0x3b465301, 0xae54ecc3, 0x61423309, 0x70c9ff19, 0x5b0ae5ec, 0x989df126, 0x9d987a5f, 0x55bc750e, 0xc66eba27,
0x2de988e8, 0xf76600da, 0x0382dccb, 0x5569f5f2, 0x8e431262, 0x288fe3d3, 0x656f2187, 0x37d12e9c, 0x2f539eb4, 0xa492998e, 0xed3958f7, 0x39e96523 };
 
public static final int g_key3A[] = {
0x67877069, 0x3abd5617, 0xc23ab1dc, 0xab57507d, 0x066a7f40, 0x24def9b9, 0x06f759e4, 0xdcf524b1, 0x13793e5e, 0x0359022d, 0xaae7e1a2, 0x76b9b2fa,
0x9a160340, 0x87822fba, 0x19e28fbb, 0x9e338a02, 0xd8007e9a, 0xea317af1, 0x630671de, 0x0b67ca7c, 0x865192af, 0xea3c3526, 0x2b448c8e, 0x8b599254,
0x4602e9cb, 0x4de16cda, 0xe164d5bb, 0x07ecd88e, 0x99ffe5f8, 0x768800c1, 0x53b091ed, 0x84047434, 0xb426dbbc, 0x36f948bb, 0x46142158, 0x749bb492 };
   
public static final int g_keyEBOOT1xx[] = {
0x18CB69EF, 0x158E8912, 0xDEF90EBB, 0x4CB0FB23, 0x3687EE18, 0x868D4A6E, 0x19B5C756, 0xEE16551D, 0xE7CB2D6C, 0x9747C660, 0xCE95143F, 0x2956F477,
0x03824ADE, 0x210C9DF1, 0x5029EB24, 0x81DFE69F, 0x39C89B00, 0xB00C8B91, 0xEF2DF9C2, 0xE13A93FC, 0x8B94A4A8, 0x491DD09D, 0x686A400D, 0xCED4C7E4,
0x96C8B7C9, 0x1EAADC28, 0xA4170B84, 0x505D5DDC, 0x5DA6C3CF, 0x0E5DFA2D, 0x6E7919B5, 0xCE5E29C7, 0xAAACDB94, 0x45F70CDD, 0x62A73725, 0xCCE6563D };
   
public static final int g_keyEBOOT2xx[] = {
0xDA8E36FA, 0x5DD97447, 0x76C19874, 0x97E57EAF, 0x1CAB09BD, 0x9835BAC6, 0x03D39281, 0x03B205CF, 0x2882E734, 0xE714F663, 0xB96E2775, 0xBD8AAFC7,
0x1DD3EC29, 0xECA4A16C, 0x5F69EC87, 0x85981E92, 0x7CFCAE21, 0xBAE9DD16, 0xE6A97804, 0x2EEE02FC, 0x61DF8A3D, 0xDD310564, 0x9697E149, 0xC2453F3B,
0xF91D8456, 0x39DA6BC8, 0xB3E5FEF5, 0x89C593A3, 0xFB5C8ABC, 0x6C0B7212, 0xE10DD3CB, 0x98D0B2A8, 0x5FD61847, 0xF0DC2357, 0x7701166A, 0x0F5C3B68 };
   
public static final int g_keyUPDATER[] = {
0xA5603CBF, 0xD7482441, 0xF65764CC, 0x1F90060B, 0x4EA73E45, 0xE551D192, 0xE7B75D8A, 0x465A506E, 0x40FB1022, 0x2C273350, 0x8096DA44, 0x9947198E,
0x278DEE77, 0x745D062E, 0xC148FA45, 0x832582AF, 0x5FDB86DA, 0xCB15C4CE, 0x2524C62F, 0x6C2EC3B1, 0x369BE39E, 0xF7EB1FC4, 0x1E51CE1A, 0xD70536F4,
0xC34D39D8, 0x7418FB13, 0xE3C84DE1, 0xB118F03C, 0xA2018D4E, 0xE6D8770D, 0x5720F390, 0x17F96341, 0x60A4A68F, 0x1327DD28, 0x05944C64, 0x0C2C4C12 };
   
public static final int g_keyMEIMG250[] = {
0xA381FEBC, 0x99B9D5C9, 0x6C560A8D, 0x30309F95, 0x792646CC, 0x82B64E5E, 0x1A3951AD, 0x0A182EC4, 0xC46131B4, 0x77C50C8A, 0x325F16C6, 0x02D1942E,
0x0AA38AC4, 0x2A940AC6, 0x67034726, 0xE52DB133, 0xD2EF2107, 0x85C81E90, 0xC8D164BA, 0xC38DCE1D, 0x948BA275, 0x0DB84603, 0xE2473637, 0xCD74FCDA,
0x588E3D66, 0x6D28E822, 0x891E548B, 0xF53CF56D, 0x0BBDDB66, 0xC4B286AA, 0x2BEBBC4B, 0xFC261FF4, 0x92B8E705, 0xDCEE6952, 0x5E0442E5, 0x8BEB7F21 };
   
public static final int g_keyMEIMG260[] = {
0x11BFD698, 0xD7F9B324, 0xDD524927, 0x16215B86, 0x504AC36D, 0x5843B217, 0xE5A0DA47, 0xBB73A1E7, 0x2915DB35, 0x375CFD3A, 0xBB70A905, 0x272BEFCA,
0x2E960791, 0xEA0799BB, 0xB85AE6C8, 0xC9CAF773, 0x250EE641, 0x06E74A9E, 0x5244895D, 0x466755A5, 0x9A84AF53, 0xE1024174, 0xEEBA031E, 0xED80B9CE,
0xBC315F72, 0x5821067F, 0xE8313058, 0xD2D0E706, 0xE6D8933E, 0xD7D17FB4, 0x505096C4, 0xFDA50B3B, 0x4635AE3D, 0xEB489C8A, 0x422D762D, 0x5A8B3231 };
   
public static final int g_keyDEMOS27X[] = {
0x1ABF102F, 0xD596D071, 0x6FC552B2, 0xD4F2531F, 0xF025CDD9, 0xAF9AAF03, 0xE0CF57CF, 0x255494C4, 0x7003675E, 0x907BC884, 0x002D4EE4, 0x0B687A0D,
0x9E3AA44F, 0xF58FDA81, 0xEC26AC8C, 0x3AC9B49D, 0x3471C037, 0xB0F3834D, 0x10DC4411, 0xA232EA31, 0xE2E5FA6B, 0x45594B03, 0xE43A1C87, 0x31DAD9D1,
0x08CD7003, 0xFA9C2FDF, 0x5A891D25, 0x9B5C1934, 0x22F366E5, 0x5F084A32, 0x695516D5, 0x2245BE9F, 0x4F6DD705, 0xC4B8B8A1, 0xBC13A600, 0x77B7FC3B };
   
public static final int g_keyUNK1[] = {
0x33B50800, 0xF32F5FCD, 0x3C14881F, 0x6E8A2A95, 0x29FEEFD5, 0x1394EAE3, 0xBD6BD443, 0x0821C083, 0xFAB379D3, 0xE613E165, 0xF5A754D3, 0x108B2952,
0x0A4B1E15, 0x61EADEBA, 0x557565DF, 0x3B465301, 0xAE54ECC3, 0x61423309, 0x70C9FF19, 0x5B0AE5EC, 0x989DF126, 0x9D987A5F, 0x55BC750E, 0xC66EBA27,
0x2DE988E8, 0xF76600DA, 0x0382DCCB, 0x5569F5F2, 0x8E431262, 0x288FE3D3, 0x656F2187, 0x37D12E9C, 0x2F539EB4, 0xA492998E, 0xED3958F7, 0x39E96523 };
   
public static final int g_key_GAMESHARE1xx[] = {
0x721B53E8, 0xFC3E31C6, 0xF85BA2A2, 0x3CF0AC72, 0x54EEA7AB, 0x5959BFCB, 0x54B8836B, 0xBC431313, 0x989EF2CF, 0xF0CE36B2, 0x98BA4CF8, 0xE971C931,
0xA0375DC8, 0x08E52FA0, 0xAC0DD426, 0x57E4D601, 0xC56E61C7, 0xEF1AB98A, 0xD1D9F8F4, 0x5FE9A708, 0x3EF09D07, 0xFA0C1A8C, 0xA91EEA5C, 0x58F482C5,
0x2C800302, 0x7EE6F6C3, 0xFF6ABBBB, 0x2110D0D0, 0xD3297A88, 0x980012D3, 0xDC59C87B, 0x7FDC5792, 0xDB3F5DA6, 0xFC23B787, 0x22698ED3, 0xB680E812 };
   
public static final int g_key_GAMESHARE2xx[] = {
0x94A757C7, 0x9FD39833, 0xF8508371, 0x328B0B29, 0x2CBCB9DA, 0x2918B9C6, 0x944C50BA, 0xF1DCE7D0, 0x640C3966, 0xC90B3D08, 0xF4AD17BA, 0x6CA0F84B,
0xF7767C67, 0xA4D3A55A, 0x4A085C6A, 0x6BB27071, 0xFA8B38FB, 0x3FDB31B8, 0x8B7196F2, 0xDB9BED4A, 0x51625B84, 0x4C1481B4, 0xF684F508, 0x30B44770,
0x93AA8E74, 0x90C579BC, 0x246EC88D, 0x2E051202, 0xC774842E, 0xA185D997, 0x7A2B3ADD, 0xFE835B6D, 0x508F184D, 0xEB4C4F13, 0x0E1993D3, 0xBA96DFD2 };
   
public static final int g_key_INDEXDAT1xx[] = {
0x76CB00AF, 0x111CE62F, 0xB7B27E36, 0x6D8DE8F9, 0xD54BF16A, 0xD9E90373, 0x7599D982, 0x51F82B0E, 0x636103AD, 0x8E40BC35, 0x2F332C94, 0xF513AAE9,
0xD22AFEE9, 0x04343987, 0xFC5BB80C, 0x12349D89, 0x14A481BB, 0x25ED3AE8, 0x7D500E4F, 0x43D1B757, 0x7B59FDAD, 0x4CFBBF34, 0xC3D17436, 0xC1DA21DB,
0xA34D8C80, 0x962B235D, 0x3E420548, 0x09CF9FFE, 0xD4883F5C, 0xD90E9CB5, 0x00AEF4E9, 0xF0886DE9, 0x62A58A5B, 0x52A55546, 0x971941B5, 0xF5B79FAC };
=== PRXtype910keys ===
// PRX type 9 and 10 keys.
public static final int g_pubkey_28672[] = {
0x77, 0x3F, 0x4B, 0xE1, 0x4C, 0x0A, 0xB4, 0x52, 0x67, 0x2B, 0x67, 0x56, 0x82, 0x4C, 0xCF, 0x42, 0xAA, 0x37, 0xFF, 0xC0,
0x89, 0x41, 0xE5, 0x63, 0x5E, 0x84, 0xE9, 0xFB, 0x53, 0xDA, 0x94, 0x9E, 0x9B, 0xB7, 0xC2, 0xA4, 0x22, 0x9F, 0xDF, 0x1F
};
   
public static final int g_pubkey_28712[] = {
0x25, 0xDC, 0xFD, 0xE2, 0x12, 0x79, 0x89, 0x54, 0x79, 0x37, 0x13, 0x24, 0xEC, 0x25, 0x08, 0x81, 0x57, 0xAA, 0xF1, 0xD0,
0xA4, 0x64, 0x8C, 0x15, 0x42, 0x25, 0xF6, 0x90, 0x3F, 0x44, 0xE3, 0x6A, 0xE6, 0x64, 0x12, 0xFC, 0x80, 0x68, 0xBD, 0xC1
};
   
public static final int g_pubkey_28752[] = {
0xE3, 0x5E, 0x4E, 0x7E, 0x2F, 0xA3, 0x20, 0x96, 0x75, 0x43, 0x94, 0xA9, 0x92, 0x01, 0x83, 0xA7, 0x85, 0xBD, 0xF6, 0x19,
0x1F, 0x44, 0x8F, 0x95, 0xE0, 0x43, 0x35, 0xA3, 0xF5, 0xE5, 0x05, 0x65, 0x5E, 0xD7, 0x59, 0x3F, 0xC6, 0xDB, 0xAF, 0x39
};
=== PSPUMDKeys ===
<pre>
<pre>
00 00 01 01 AC 72 45 00 F5 68 96 03 80 57 C8 1A
// UMD Keys Decrypted by Spock from the idstorage using spock cmd 0x9 key:
25 99 21 A1 73 A4 89 F2 E9 96 23 E9 86 0F 74 2D
 
</pre>
UmdKey umdkeys[N_KEYS] =
{
 
// 0-78 -> TA-85 v2 euro
// 79-111 -> from TA86 euro
// 112-164 -> from TA-79 jap
 
{
0x00000002, 0x80000000,
{0x33, 0x50, 0x48, 0xCE, 0x08, 0x5E, 0xF3, 0xDD, 0xFE, 0x8D, 0x69, 0xE3, 0x81, 0xD7, 0x2B, 0xCF }
}, // 0
 
{
0x0000000F, 0x80000000,
{0x5D, 0xBA, 0xFE, 0xA7, 0xA9, 0xFB, 0x7D, 0x9B, 0x65, 0x10, 0x8B, 0x6D, 0xA7, 0xDE, 0x31, 0x19 }
}, // 1
 
{
0x00000012, 0x80000000,
{0xB7, 0x6D, 0xC0, 0xD3, 0xCC, 0xC5, 0x85, 0xFE, 0x85, 0xD6, 0x7A, 0xFE, 0x34, 0x2F, 0xD7, 0x14 }
}, // 2
 
{
0x0000001F, 0x80000000,
{0x47, 0xC8, 0x1A, 0xFF, 0x27, 0x10, 0x41, 0x64, 0x55, 0x24, 0xEE, 0xB8, 0xB3, 0x8A, 0xEE, 0x62 }
}, // 3
 
{
0x00000022, 0x80000000,
{0x67, 0x8B, 0x6A, 0x33, 0x98, 0x5C, 0x45, 0x19, 0x46, 0x07, 0xF0, 0x4E, 0x1D, 0x70, 0xEA, 0x1B }
}, // 4
 
{
0x0000002F, 0x80000000,
{0xCE, 0x5E, 0x6A, 0x10, 0x7C, 0x3F, 0x9A, 0x18, 0xCF, 0xF2, 0xB4, 0xA9, 0x16, 0xB0, 0x8E, 0xA6 }
}, // 5
 
{
0x00000032, 0x80000000,
{0xF5, 0x43, 0xE8, 0xE5, 0x39, 0x78, 0x5C, 0xEA, 0x9B, 0x91, 0x85, 0x1A, 0x30, 0x5E, 0x75, 0x1E }
}, // 6
 
{
0x0000003F, 0x80000000,
{0x49, 0xF1, 0xFA, 0x16, 0xBE, 0x5F, 0xC2, 0x00, 0xDC, 0x8D, 0x50, 0xD2, 0x6F, 0x1D, 0x5F, 0x48 }
}, // 7
 
{
0x00000042, 0x80000000,
{0x73, 0x97, 0x32, 0x8B, 0x36, 0x28, 0xBC, 0x51, 0x29, 0xEE, 0x7E, 0x82, 0x8D, 0x26, 0xD5, 0x24 }
}, // 8
 
{
0x0000004F, 0x80000000,
{0x65, 0xBE, 0x3D, 0x73, 0x26, 0x55, 0xE9, 0x05, 0x74, 0xF0, 0x06, 0x1A, 0xDA, 0x2C, 0xB8, 0x62 }
}, // 9
 
{
0x1000000F, 0x80000000,
{0x71, 0x16, 0x41, 0x21, 0xC3, 0xE0, 0x6A, 0xB5, 0x76, 0x57, 0x35, 0x90, 0xAB, 0x22, 0x3E, 0xFD }
}, // 10
 
{
0x1000001F, 0x80000000,
{0x42, 0x01, 0x82, 0x19, 0x24, 0xFF, 0x0C, 0x34, 0xEB, 0xB4, 0x3F, 0x5D, 0xCA, 0x80, 0x7E, 0x8D }
}, // 11
 
{
0x1000002F, 0x80000000,
{0x40, 0x78, 0x66, 0xEB, 0x9B, 0xA5, 0xE9, 0x29, 0x0B, 0x2F, 0x8E, 0x4D, 0x30, 0x11, 0x67, 0x54 }
}, // 12
 
{
0x1000003F, 0x80000000,
{0x27, 0xC7, 0x59, 0xF1, 0x48, 0xD8, 0x7E, 0xA8, 0xC0, 0xC2, 0x7F, 0x01, 0x3A, 0xE6, 0xEC, 0xD6 }
}, // 13
 
{
0x1000004F, 0x80000000,
{0x05, 0x8F, 0xE5, 0x35, 0xA0, 0x4C, 0x89, 0xB1, 0xC0, 0x12, 0xAD, 0xE7, 0xDA, 0x06, 0xD9, 0x22 }
}, // 14
 
{
0x2000000F, 0x80000000,
{0x1A, 0x4A, 0xA0, 0x55, 0x30, 0x8D, 0x2B, 0xBC, 0x63, 0x2B, 0x54, 0x68, 0xBB, 0x3A, 0x9D, 0x5B }
}, // 15
 
{
0x00000001, 0x00000000,
{0xFD, 0x61, 0xF4, 0xC2, 0x39, 0x3E, 0x1C, 0xA0, 0xC2, 0x7F, 0xF8, 0x55, 0x04, 0x2B, 0x8B, 0xDC }
}, // 16
 
{
0x00000002, 0x00000000,
{0xD0, 0x5E, 0x62, 0x43, 0xD6, 0x79, 0x5F, 0xCD, 0x98, 0x59, 0x12, 0xF0, 0x1C, 0xC4, 0xE2, 0x5F }
}, // 17
 
{
0x00000004, 0x00000000,
{0xDE, 0x08, 0x48, 0xC0, 0x29, 0xD2, 0x75, 0x5B, 0x69, 0x43, 0x42, 0x8A, 0xA5, 0x69, 0xB3, 0xF7 }
}, // 18
 
{
0x00000008, 0x00000000,
{0xD4, 0xF8, 0x16, 0x0E, 0xAF, 0x2D, 0x38, 0xEC, 0x1D, 0x2A, 0xDC, 0x71, 0x3C, 0xFE, 0x9E, 0x6C }
}, // 19
 
{
0x00000010, 0x00000000,
{0x72, 0x77, 0x23, 0x01, 0x6E, 0x91, 0x15, 0x43, 0x0F, 0xDD, 0x6B, 0xDF, 0x71, 0xE8, 0x03, 0x88 }
}, // 20
 
{
0x00000020, 0x00000000,
{0x30, 0x04, 0xF2, 0xAA, 0x88, 0xCE, 0x10, 0x65, 0xA5, 0x7D, 0xE5, 0x9F, 0x38, 0xDE, 0x1F, 0x34 }
}, // 21
 
{
0x00000040, 0x00000000,
{0xE1, 0x9D, 0x85, 0xD3, 0x5D, 0x21, 0x62, 0xB5, 0x62, 0x05, 0xC7, 0xFF, 0x92, 0xB8, 0xB6, 0x98 }
}, // 22
 
{
0x00000080, 0x00000000,
{0x26, 0xB7, 0x0A, 0x89, 0xD7, 0xB3, 0xD2, 0x5B, 0x30, 0x34, 0xE3, 0xC9, 0xB0, 0x38, 0xC5, 0x9A }
}, // 23
 
{
0x00000101, 0x00000000,
{0xE7, 0x87, 0xE2, 0xD5, 0x46, 0x8A, 0x2D, 0xDE, 0x0B, 0x32, 0x1E, 0x06, 0xE4, 0x98, 0x43, 0xEA }
}, // 24
 
{
0x00000202, 0x00000000,
{0xFA, 0x67, 0x31, 0x50, 0x1A, 0x19, 0xB3, 0x75, 0x74, 0x7A, 0x62, 0xB0, 0x0C, 0x09, 0xEC, 0x69 }
}, // 25
 
{
0x00000404, 0x00000000,
{0x80, 0xD4, 0xE0, 0x7D, 0x74, 0xE1, 0xA0, 0x2F, 0x21, 0x8E, 0x1B, 0x74, 0x88, 0xA4, 0x7C, 0x5D }
}, // 26
 
{
0x00000808, 0x00000000,
{0x67, 0x30, 0x2C, 0xF7, 0xCB, 0x97, 0x6E, 0xC3, 0xA8, 0x92, 0x00, 0x8D, 0xA3, 0x68, 0x86, 0x1B }
}, // 27
 
{
0x00001010, 0x00000000,
{0xC9, 0xF4, 0x1F, 0xD2, 0xA3, 0x43, 0xD8, 0x5F, 0xBA, 0x0A, 0xA2, 0x45, 0x5A, 0x5C, 0x0F, 0x8A }
}, // 28
 
{
0x00002020, 0x00000000,
{0xB3, 0x85, 0xBE, 0x2A, 0xE7, 0xDF, 0xE0, 0x90, 0x97, 0x53, 0x3E, 0xE8, 0xEC, 0xAC, 0xB2, 0xAB }
}, // 29
 
{
0x00004041, 0x00000000,
{0xCF, 0x99, 0x22, 0xD5, 0x37, 0x9A, 0xF1, 0xC5, 0x03, 0xAB, 0x43, 0x80, 0x5D, 0xEF, 0x3E, 0xA8 }
}, // 30
 
{
0x00008082, 0x00000000,
{0xC1, 0xFF, 0xFA, 0xCC, 0x92, 0x95, 0xDF, 0x19, 0xED, 0xBB, 0x7E, 0x8C, 0x5E, 0x7B, 0x4D, 0x2F }
}, // 31
 
{
0x00010105, 0x00000000,
{0xDA, 0xD4, 0xB7, 0x2E, 0x71, 0xC4, 0x09, 0xDE, 0x41, 0x2D, 0x1A, 0x4C, 0x06, 0x4E, 0x20, 0x32 }
}, // 32
 
{
0x0002020A, 0x00000000,
{0x32, 0x56, 0x45, 0xB7, 0x4F, 0x56, 0x52, 0xFA, 0x47, 0x21, 0xE5, 0x9F, 0x6D, 0xAA, 0xE2, 0xB3 }
}, // 33
 
{
0x00040414, 0x00000000,
{0xCB, 0xFE, 0xC2, 0x20, 0x5A, 0x12, 0xBE, 0x52, 0xCF, 0x99, 0x24, 0x34, 0x1D, 0x84, 0x5E, 0x5F }
}, // 34
 
{
0x00080828, 0x00000000,
{0xAC, 0x92, 0x61, 0xD1, 0xE9, 0x5B, 0xF1, 0xDE, 0x06, 0x2D, 0x28, 0x8E, 0x1B, 0x44, 0xD9, 0x97 }
}, // 35
 
{
0x00101050, 0x00000000,
{0x0C, 0x38, 0x63, 0x17, 0x5B, 0x01, 0x13, 0x80, 0x59, 0x6F, 0x9A, 0xAB, 0x29, 0xB8, 0x9B, 0xE1 }
}, // 36
 
{
0x002020A0, 0x00000000,
{0x4E, 0x1F, 0x91, 0xC1, 0x0A, 0xF0, 0xFB, 0x36, 0xEB, 0x72, 0x70, 0x9D, 0x08, 0x06, 0x4E, 0x51 }
}, // 37
 
{
0x00404140, 0x00000000,
{0xBB, 0x77, 0xAF, 0x29, 0xD0, 0x12, 0x34, 0x8E, 0x09, 0x36, 0xD6, 0x97, 0xF0, 0xD3, 0x45, 0xDE }
}, // 38
 
{
0x00808280, 0x00000000,
{0xFF, 0xE5, 0xCA, 0x92, 0x03, 0xC1, 0xAA, 0x92, 0x02, 0xD2, 0xB7, 0x40, 0x5C, 0x95, 0x1C, 0xE4 }
}, // 39
 
{
0x01010500, 0x00000000,
{0x68, 0x98, 0xD7, 0xD2, 0x67, 0x50, 0x17, 0xAE, 0xB3, 0x1B, 0x12, 0x36, 0x72, 0x43, 0x43, 0x15 }
}, // 40
 
{
0x02020A00, 0x00000000,
{0xEC, 0xA5, 0x90, 0x0A, 0x10, 0x5C, 0x90, 0xFB, 0xED, 0x28, 0xD7, 0xE9, 0x52, 0x28, 0x73, 0x3E }
}, // 41
 
{
0x04041401, 0x00000000,
{0x91, 0x56, 0x58, 0x7C, 0x59, 0xFA, 0x02, 0x0A, 0x0E, 0xE6, 0x28, 0xD5, 0x86, 0x31, 0xA8, 0xA4 }
}, // 42
 
{
0x08082803, 0x00000000,
{0xB3, 0x05, 0xFB, 0x2D, 0x15, 0xDD, 0x96, 0x8B, 0x7F, 0x9E, 0x49, 0x33, 0x17, 0xF5, 0xC0, 0x32 }
}, // 43
 
{
0x10105006, 0x00000000,
{0xF1, 0x58, 0x34, 0x46, 0x58, 0xAA, 0x06, 0x70, 0xDD, 0x07, 0x8F, 0x4C, 0x1A, 0x3F, 0x30, 0x83 }
}, // 44
 
{
0x2020A00C, 0x00000000,
{0x48, 0x44, 0x07, 0x5E, 0xD2, 0x9F, 0x0B, 0xD4, 0x11, 0x8C, 0xC7, 0x69, 0x59, 0x63, 0xFB, 0xB6 }
}, // 45
 
{
0x40414018, 0x00000000,
{0xC0, 0x85, 0x59, 0x52, 0xC3, 0x36, 0x9F, 0x94, 0xD3, 0x68, 0x2F, 0x8C, 0xD8, 0xB2, 0x9B, 0xAE }
}, // 46
 
{
0x80828030, 0x00000000,
{0x7D, 0xE3, 0x2D, 0x1C, 0x53, 0x05, 0x0D, 0x18, 0x47, 0x06, 0x42, 0x41, 0x58, 0x8E, 0xC3, 0xA3 }
}, // 47
 
{
0x01050061, 0x00000001,
{0xC0, 0x6A, 0xC0, 0x6B, 0xB5, 0xB5, 0x33, 0xB1, 0xD5, 0xF3, 0x3C, 0xD4, 0x66, 0xBA, 0x9E, 0x7F }
}, // 48
 
{
0x020A00C3, 0x00000002,
{0x34, 0xB2, 0xD0, 0x97, 0x53, 0xC1, 0x56, 0x22, 0x89, 0xAB, 0x08, 0x63, 0x24, 0x68, 0xD9, 0x24 }
}, // 49
 
{
0x04140186, 0x00000004,
{0x89, 0x39, 0x8A, 0x7B, 0x17, 0x55, 0x02, 0x26, 0x75, 0xEB, 0xDE, 0x94, 0x91, 0x9E, 0xB3, 0x89 }
}, // 50
 
{
0x0828030C, 0x00000008,
{0xD9, 0x2A, 0xDB, 0x67, 0xCC, 0x7C, 0xA2, 0x2E, 0x64, 0x74, 0x48, 0x30, 0xF4, 0xED, 0x78, 0xAA }
}, // 51
 
{
0x10500618, 0x00000010,
{0x2B, 0x71, 0xEE, 0x0A, 0xD1, 0x2F, 0xC1, 0xEB, 0xE0, 0x76, 0x88, 0xEB, 0x3F, 0xFE, 0xDF, 0x37 }
}, // 52
 
{
0x20A00C30, 0x00000020,
{0x57, 0xE0, 0x51, 0x3E, 0x3F, 0x2D, 0xA5, 0xE4, 0x54, 0x69, 0x2D, 0x97, 0x7E, 0x17, 0x17, 0x87 }
}, // 53
 
{
0x41401860, 0x00000040,
{0x12, 0x76, 0x66, 0x75, 0x4F, 0x6E, 0x64, 0xAF, 0xF9, 0xAE, 0xB0, 0x5B, 0x99, 0x9B, 0xB2, 0xB9 }
}, // 54
 
{
0x828030C1, 0x00000080,
{0xCE, 0x43, 0x97, 0x82, 0xF8, 0x97, 0xF6, 0xCA, 0x1B, 0xF9, 0x62, 0x61, 0xAE, 0xA2, 0x4A, 0x27 }
}, // 55
 
{
0x05006183, 0x00000101,
{0x6B, 0x1D, 0xE7, 0xAA, 0x8B, 0x3A, 0x65, 0xE1, 0xD7, 0x33, 0xEC, 0x5E, 0x31, 0x09, 0xF9, 0x40 }
}, // 56
 
{
0x0A00C307, 0x00000202,
{0xA7, 0x23, 0xAA, 0x3C, 0x8E, 0x81, 0xBC, 0x3C, 0x5C, 0x8F, 0xC8, 0x8E, 0x56, 0x3A, 0xE0, 0x5F }
}, // 57
 
{
0x1401860F, 0x00000404,
{0x51, 0x4A, 0x55, 0x9B, 0x2E, 0x81, 0x6F, 0x83, 0x60, 0x36, 0x88, 0xFA, 0x9F, 0xE9, 0xDB, 0x5E }
}, // 58
 
{
0x28030C1E, 0x00000808,
{0x87, 0xE2, 0x65, 0x13, 0xE4, 0xBF, 0x4C, 0xF5, 0x56, 0xAA, 0xC3, 0xD5, 0x59, 0x8F, 0x19, 0x19 }
}, // 59
 
{
0x5006183D, 0x00001010,
{0x6A, 0x56, 0x83, 0x2F, 0x78, 0xA7, 0xC5, 0xED, 0xA4, 0x90, 0x00, 0x93, 0x28, 0x7D, 0xDE, 0xE3 }
}, // 60
 
{
0xA00C307B, 0x00002020,
{0xC3, 0xFD, 0x72, 0xB7, 0x50, 0xCF, 0x2D, 0x3A, 0xDA, 0x00, 0x84, 0xEA, 0x7F, 0xF4, 0xB0, 0x21 }
}, // 61
 
{
0x401860F7, 0x00004041,
{0x13, 0xCD, 0xFB, 0x84, 0x6E, 0xE4, 0x7F, 0x01, 0x2B, 0x13, 0x97, 0xDF, 0xFD, 0xF7, 0xEE, 0x8D }
}, // 62
 
{
0x8030C1EF, 0x00008082,
{0xE0, 0xFB, 0x34, 0xF0, 0xE8, 0x1E, 0x63, 0xFB, 0x4D, 0x0C, 0x96, 0xC4, 0x46, 0x9A, 0x94, 0x4B }
}, // 63
 
{
0x006183DF, 0x00010105,
{0xF3, 0x0D, 0x9D, 0x0D, 0xB1, 0xB4, 0x57, 0x6C, 0x71, 0x2B, 0x4D, 0x73, 0x56, 0x3C, 0x0E, 0xB3 }
}, // 64
 
{
0x00C307BE, 0x0002020A,
{0xC5, 0xA2, 0x08, 0xBE, 0x15, 0x4B, 0x43, 0x39, 0xA9, 0xAF, 0x15, 0x8A, 0x74, 0xE4, 0xEA, 0x30 }
}, // 65
 
{
0x01860F7C, 0x00040414,
{0xBB, 0x30, 0x7C, 0xB3, 0xFA, 0x1E, 0xF6, 0xE5, 0xC2, 0xE7, 0x35, 0xAB, 0xD5, 0x7B, 0xE4, 0xF0 }
}, // 66
 
{
0x030C1EF8, 0x00080828,
{0x1E, 0xDE, 0x13, 0xE4, 0x4B, 0xB4, 0xDC, 0x6E, 0xB1, 0xBE, 0x62, 0x4B, 0xBE, 0x29, 0xC6, 0x3C }
}, // 67
 
{
0x06183DF0, 0x00101050,
{0x04, 0xF7, 0xEE, 0x30, 0x87, 0xC2, 0x47, 0x98, 0x66, 0x92, 0x61, 0x26, 0x5E, 0xDA, 0x04, 0x9E }
}, // 68
 
{
0x0C307BE1, 0x002020A0,
{0x19, 0x37, 0xCD, 0xFF, 0x8A, 0x7F, 0x5A, 0xF3, 0x66, 0x92, 0xE8, 0x8C, 0xBB, 0x59, 0x16, 0xA6 }
}, // 69
 
{
0x1860F7C3, 0x00404140,
{0x08, 0x6B, 0x77, 0x04, 0x34, 0xA6, 0xA5, 0x5C, 0x59, 0x6E, 0x16, 0xB2, 0x87, 0xD0, 0x86, 0x49 }
}, // 70
 
{
0x30C1EF87, 0x00808280,
{0x34, 0x76, 0x9A, 0x98, 0xAD, 0x11, 0x40, 0x48, 0x7A, 0x40, 0xBA, 0x28, 0x3F, 0xDA, 0xEF, 0x30 }
}, // 71
 
{
0x6183DF0F, 0x01010500,
{0x2E, 0x2D, 0x42, 0x52, 0xEA, 0x1A, 0x74, 0x3D, 0xA8, 0xF2, 0x5C, 0x4E, 0x3D, 0xC7, 0xB4, 0x7B }
}, // 72
 
{
0xC307BE1E, 0x02020A00,
{0x83, 0x3D, 0x43, 0xF6, 0xFE, 0x17, 0x28, 0xF6, 0x73, 0x9C, 0x38, 0x20, 0x2F, 0xAF, 0xF9, 0xF4 }
}, // 73
 
{
0x860F7C3C, 0x04041401,
{0x21, 0xF5, 0x15, 0xB7, 0x24, 0xD5, 0x48, 0x54, 0xAD, 0x43, 0xAD, 0x5D, 0xD9, 0x3B, 0x77, 0xE2 }
}, // 74
 
{
0x0C1EF878, 0x08082803,
{0xEF, 0xCD, 0xD4, 0xF6, 0xE1, 0x3B, 0x9E, 0xC6, 0x79, 0x1C, 0x54, 0xBB, 0xED, 0x85, 0x86, 0x7C }
}, // 75
 
{
0x00000001, 0x70000000,
{0x3A, 0xBA, 0x2E, 0x14, 0xC1, 0x07, 0x37, 0x9F, 0x5F, 0x03, 0x3F, 0x79, 0x4D, 0xE0, 0xCE, 0x7E }
}, // 76
 
{
0x00000002, 0x80000000,
{0x33, 0x50, 0x48, 0xCE, 0x08, 0x5E, 0xF3, 0xDD, 0xFE, 0x8D, 0x69, 0xE3, 0x81, 0xD7, 0x2B, 0xCF }
},// 77
 
{
0x00000002, 0x80000000,
{0x33, 0x50, 0x48, 0xCE, 0x08, 0x5E, 0xF3, 0xDD, 0xFE, 0x8D, 0x69, 0xE3, 0x81, 0xD7, 0x2B, 0xCF }
},// 78
 
{
0x08082802, 0x00000000,
{0xF3, 0xB6, 0xC9, 0x65, 0xE3, 0x0C, 0x67, 0x5E, 0xEA, 0xC2, 0xF7, 0x3C, 0x1A, 0x83, 0x68, 0x16 }
}, // 79
 
{
0x10105004, 0x00000000,
{0x4D, 0x1B, 0x1C, 0xD2, 0x97, 0x14, 0x7A, 0xD9, 0xC8, 0x4A, 0x59, 0xBB, 0xAF, 0xB6, 0xA8, 0x35 }
}, // 80
 
{
0x2020A008, 0x00000000,
{0x59, 0xB4, 0x08, 0x34, 0x13, 0x66, 0x9B, 0x5A, 0xBE, 0x52, 0x78, 0x92, 0xDC, 0x28, 0x8D, 0x92 }
}, // 81
 
{
0x40414010, 0x00000000,
{0xCF, 0xE9, 0xFA, 0x5D, 0x6D, 0xF2, 0xEB, 0x66, 0xD4, 0x7B, 0xEB, 0x94, 0xC9, 0x22, 0xEC, 0xC1 }
}, // 82
 
{
0x80828020, 0x00000000,
{0x86, 0x36, 0x60, 0x2C, 0x89, 0xCF, 0x84, 0x30, 0xB7, 0x68, 0xA6, 0x1B, 0xB4, 0x4D, 0x56, 0xA9 }
}, // 83
 
{
0x01050041, 0x00000001,
{0x4A, 0xB1, 0x9D, 0x12, 0x21, 0xEA, 0xF3, 0x8B, 0x38, 0x92, 0x29, 0x5A, 0x58, 0xA0, 0xBF, 0xE4 }
}, // 84
 
{
0x020A0082, 0x00000002,
{0x9C, 0xEF, 0x75, 0x5D, 0xBB, 0x2E, 0x10, 0x61, 0x69, 0x1C, 0x2D, 0xD2, 0x8A, 0xE0, 0xE0, 0x72 }
}, // 85
 
{
0x04140104, 0x00000004,
{0x9C, 0x8B, 0x06, 0xBB, 0x0A, 0xFD, 0x2B, 0x1B, 0xCD, 0xA0, 0x52, 0x23, 0x28, 0x69, 0x11, 0xEB }
}, // 86
 
{
0x08280208, 0x00000008,
{0x79, 0xFB, 0x15, 0xF5, 0xA5, 0x5A, 0xF0, 0xFA, 0x85, 0xBD, 0x10, 0xBC, 0x98, 0x3E, 0xBF, 0x93 }
}, // 87
 
{
0x10500410, 0x00000010,
{0x8F, 0x65, 0x93, 0x7E, 0x1C, 0x85, 0x54, 0x7B, 0x86, 0xB6, 0x5A, 0x46, 0xC7, 0x09, 0x56, 0xAB }
}, // 88
 
{
0x20A00820, 0x00000020,
{0xA6, 0x40, 0x07, 0x0A, 0x4B, 0xA2, 0x24, 0xB2, 0x39, 0x7A, 0xF6, 0xF3, 0xBC, 0x71, 0xDB, 0xB6 }
}, // 89
 
{
0x41401040, 0x00000040,
{0x0E, 0xAD, 0xCE, 0x00, 0xCB, 0x42, 0x37, 0xB8, 0xC6, 0x4D, 0x78, 0x22, 0x98, 0xB0, 0x71, 0x2B }
}, // 90
 
{
0x82802081, 0x00000080,
{0x95, 0x1C, 0xA2, 0x4C, 0x09, 0xD5, 0x7B, 0xE2, 0xED, 0x4F, 0x1E, 0x80, 0xA5, 0xFA, 0xF4, 0x14 }
}, // 91
 
{
0x05004102, 0x00000101,
{0xD7, 0x6E, 0x36, 0x28, 0x58, 0x4A, 0xDF, 0x77, 0xAA, 0x03, 0x44, 0x91, 0xB0, 0xFB, 0xD5, 0x92 }
}, // 92
 
{
0x0A008204, 0x00000202,
{0xB4, 0x65, 0xE9, 0xA0, 0xF6, 0xB2, 0xA2, 0x40, 0x47, 0xE9, 0x76, 0xAF, 0x8C, 0x20, 0x0B, 0xB9 }
}, // 93
 
{
0x14010408, 0x00000404,
{0xA3, 0x11, 0xFC, 0xD3, 0xFB, 0xF8, 0x83, 0x6E, 0xB1, 0x5A, 0x44, 0x55, 0x0C, 0xB8, 0x69, 0x7A }
}, // 94
 
{
0x28020810, 0x00000808,
{0xA1, 0x5D, 0xFA, 0x46, 0xC5, 0x01, 0xD2, 0x78, 0x1E, 0xAE, 0xC2, 0x99, 0xEA, 0xEB, 0xEF, 0x16 }
}, // 95
 
{
0x50041020, 0x00001010,
{0xCD, 0xF4, 0x87, 0x9D, 0x17, 0x84, 0x4A, 0x74, 0xCB, 0x7A, 0xD5, 0xFA, 0xD8, 0xC0, 0xEB, 0x9D }
}, // 96
 
{
0xA0082041, 0x00002020,
{0x4D, 0xD7, 0xCA, 0x76, 0x58, 0xC9, 0x8F, 0xC6, 0xA9, 0xB8, 0xA9, 0x79, 0xF8, 0xA4, 0xA4, 0x7C }
}, // 97
 
{
0x40104083, 0x00004041,
{0x0B, 0xBF, 0x19, 0x05, 0xC3, 0xDF, 0xEA, 0x3B, 0xE6, 0x39, 0x8A, 0x90, 0xE0, 0xD3, 0xF5, 0xB0 }
}, // 98
 
{
0x80208106, 0x00008082,
{0x21, 0x11, 0x96, 0x09, 0x14, 0x56, 0xE9, 0xBA, 0x01, 0x05, 0xAE, 0xD8, 0xA8, 0x8A, 0x42, 0xC7 }
}, // 99
 
{
0x0041020C, 0x00010105,
{0xBA, 0x95, 0x8D, 0x94, 0xA4, 0x20, 0x3B, 0x17, 0x92, 0xA5, 0x45, 0x3D, 0x34, 0xF9, 0x19, 0x5B }
}, // 100
 
{
0x00820419, 0x0002020A,
{0x5D, 0x4E, 0xCA, 0xCB, 0x6B, 0x94, 0x93, 0x13, 0x82, 0x89, 0xE9, 0x54, 0x15, 0xFD, 0x03, 0x9D }
}, // 101
 
{
0x01040833, 0x00040414,
{0xDA, 0x9A, 0x77, 0x99, 0x81, 0x2A, 0x6F, 0xAD, 0x0E, 0xA0, 0xDA, 0xBD, 0x55, 0xC0, 0x09, 0x1B }
}, // 102
 
{
0x02081067, 0x00080828,
{0x12, 0xC6, 0x2B, 0xF6, 0xC2, 0x4D, 0x48, 0x66, 0xE5, 0x91, 0xDF, 0xE4, 0x3A, 0x64, 0x93, 0xDB }
}, // 103
 
{
0x041020CE, 0x00101050,
{0x6D, 0x15, 0x86, 0x85, 0x75, 0xD7, 0x1D, 0x7F, 0x77, 0x13, 0x21, 0x0C, 0x61, 0xE1, 0x00, 0xDC }
}, // 104
 
{
0x0820419D, 0x002020A0,
{0xBF, 0x13, 0x73, 0x35, 0xB0, 0x4E, 0x82, 0xAE, 0x77, 0xA9, 0xF7, 0xBB, 0x00, 0x4F, 0xF0, 0x7C }
}, // 105
 
{
0x1040833B, 0x00404140,
{0x39, 0xCB, 0x08, 0xBE, 0x33, 0xE6, 0x5B, 0x1D, 0xDE, 0x38, 0xEB, 0xAB, 0x88, 0x35, 0xC6, 0x82 }
}, // 106
 
{
0x20810676, 0x00808280,
{0x86, 0x2E, 0x5A, 0x1B, 0x8A, 0x24, 0x12, 0x4A, 0x6A, 0x8C, 0x1A, 0xCF, 0x19, 0x22, 0xA4, 0x9C }
}, // 107
 
{
0x41020CED, 0x01010500,
{0x8C, 0x58, 0x04, 0x7D, 0x2A, 0x39, 0x5A, 0x4A, 0x09, 0x4B, 0x5B, 0x44, 0x9C, 0x64, 0xB4, 0x18 }
}, // 108
 
{
0x820419DB, 0x02020A00,
{0x71, 0xF3, 0x1D, 0xC3, 0xB4, 0x06, 0x7E, 0x83, 0x1A, 0x23, 0x35, 0xA7, 0xC3, 0x09, 0xE7, 0x58 }
}, // 109
 
{
0x040833B6, 0x04041401,
{0x1B, 0x2F, 0x60, 0x2A, 0x43, 0x59, 0x77, 0x1F, 0x55, 0x18, 0x77, 0x61, 0xCC, 0x83, 0x60, 0xAB }
}, // 110
 
{
0x0810676C, 0x08082802,
{0x47, 0xD0, 0x07, 0x7C, 0x09, 0x9B, 0xA2, 0x04, 0x30, 0x45, 0x51, 0x6D, 0x9F, 0x89, 0x7E, 0x56 }
}, // 111
 
{
0x00000000, 0x80000000,
{0x37, 0x2D, 0xD8, 0x7F, 0x71, 0xBA, 0x1B, 0xC9, 0xC8, 0x40, 0xC8, 0xFA, 0xA2, 0x48, 0x97, 0xFC }
}, // 112
 
{
0x00000010, 0x80000000,
{0x15, 0xFC, 0x30, 0xE8, 0x8E, 0xC9, 0xEB, 0xE0, 0x17, 0x5D, 0x1C, 0x05, 0x6A, 0xA4, 0xAA, 0x04 }
}, // 113
 
{
0x00000020, 0x80000000,
{0x0F, 0x42, 0xC0, 0x42, 0x18, 0xB0, 0x37, 0x42, 0x11, 0xC4, 0x9B, 0xE3, 0x20, 0x1C, 0x1E, 0x19 }
}, // 114
 
{
0x00000030, 0x80000000,
{0x79, 0x4C, 0xF7, 0x29, 0xD8, 0x29, 0x03, 0x02, 0x03, 0x2A, 0x9D, 0xFF, 0x1A, 0xE8, 0x38, 0xA0 }
}, // 115
 
{
0x00000040, 0x80000000,
{0x19, 0x45, 0x6F, 0x72, 0x9E, 0x95, 0xAD, 0x6B, 0xB4, 0xDA, 0x01, 0xFA, 0x78, 0xEA, 0x4C, 0x3E }
}, // 116
 
{
0x00004040, 0x00000000,
{0x3D, 0xB3, 0xE0, 0x5C, 0xC7, 0x05, 0x76, 0x6B, 0x45, 0xB4, 0x5F, 0x82, 0x36, 0x24, 0x02, 0xB1 }
}, // 117
 
{
0x00008081, 0x00000000,
{0x20, 0x33, 0x9F, 0x3E, 0x97, 0x20, 0xCE, 0x0A, 0xD7, 0x69, 0x29, 0xB2, 0xAE, 0xFE, 0x79, 0x8D }
}, // 118
 
{
0x00010103, 0x00000000,
{0x7C, 0xC9, 0xFC, 0x63, 0x9D, 0x2F, 0x58, 0xA5, 0xBC, 0xF3, 0x76, 0xCD, 0xB0, 0xBD, 0xF7, 0x1A }
}, // 119
 
{
0x00020206, 0x00000000,
{0x46, 0xCF, 0xEB, 0xF9, 0x48, 0x90, 0xDC, 0x1F, 0x34, 0x0F, 0xA8, 0x79, 0x5B, 0x0E, 0xAA, 0xB8 }
}, // 120
 
{
0x0004040C, 0x00000000,
{0x29, 0x89, 0x20, 0xB6, 0xC1, 0xBE, 0x2E, 0x1E, 0x70, 0x77, 0xF7, 0xDE, 0x64, 0xDC, 0x8F, 0x14 }
}, // 121
 
{
0x00080818, 0x00000000,
{0x42, 0x77, 0x79, 0x02, 0xC0, 0x56, 0xF0, 0x62, 0x29, 0xF6, 0x14, 0x71, 0xC1, 0xF4, 0x61, 0xE3 }
}, // 122
 
{
0x00101030, 0x00000000,
{0x1C, 0xD3, 0x50, 0xF6, 0xA0, 0xAE, 0x69, 0x50, 0xFB, 0xA4, 0x36, 0x5B, 0x55, 0x32, 0xEF, 0x6D }
}, // 123
 
{
0x00202060, 0x00000000,
{0x08, 0xA2, 0xAC, 0x6D, 0x5E, 0xD4, 0x21, 0x06, 0x80, 0xE6, 0x99, 0xE3, 0xC2, 0x6A, 0x3C, 0x1C }
}, // 124
 
{
0x004040C0, 0x00000000,
{0x15, 0xF9, 0xD8, 0xE1, 0x5C, 0x40, 0xDD, 0xE7, 0x55, 0x67, 0x49, 0xAD, 0xDB, 0x63, 0x71, 0x4D }
}, // 125
 
{
0x00808180, 0x00000000,
{0x90, 0x95, 0xF0, 0x3E, 0x16, 0xC9, 0xAD, 0x1A, 0xA0, 0xCA, 0x74, 0x33, 0x6D, 0x2D, 0x21, 0x52 }
}, // 126
 
{
0x01010300, 0x00000000,
{0x78, 0x2B, 0x36, 0x85, 0xDA, 0x7E, 0xB7, 0xE0, 0xC0, 0x73, 0xF7, 0x53, 0x54, 0x98, 0x4D, 0x9B }
}, // 127
 
{
0x02020600, 0x00000000,
{0x24, 0xF0, 0xFB, 0xCE, 0xAF, 0xBB, 0x32, 0x39, 0x12, 0xBB, 0xAA, 0xCC, 0x6A, 0x3C, 0x4E, 0xFC }
}, // 128
 
{
0x04040C00, 0x00000000,
{0xF7, 0x9B, 0x5A, 0xE2, 0xE4, 0x32, 0x52, 0xE5, 0x27, 0x26, 0x0B, 0x68, 0x42, 0x76, 0x22, 0x60 }
}, // 129
 
{
0x08081801, 0x00000000,
{0x95, 0x1F, 0xAC, 0x48, 0xF7, 0x81, 0xEB, 0x10, 0x60, 0x9F, 0xC7, 0x0D, 0xCF, 0xFD, 0xDB, 0x5A }
}, // 130
 
{
0x10103002, 0x00000000,
{0x55, 0xED, 0x1F, 0xB0, 0x6C, 0xD4, 0x9C, 0x97, 0x40, 0x53, 0x09, 0x8E, 0x80, 0xBC, 0x2A, 0xF9 }
}, // 131
 
{
0x20206004, 0x00000000,
{0x2E, 0x0B, 0xD9, 0xD7, 0x9D, 0x94, 0xAC, 0x9A, 0xB6, 0xC1, 0xC1, 0x36, 0x37, 0x62, 0xB9, 0xF5 }
}, // 132
 
{
0x4040C008, 0x00000000,
{0x89, 0x36, 0x39, 0xE8, 0x87, 0xFA, 0xB8, 0x0C, 0x26, 0xAD, 0x37, 0x78, 0x03, 0x89, 0x0A, 0x03 }
}, // 133
 
{
0x80818010, 0x00000000,
{0x62, 0x37, 0x2C, 0x0B, 0xD1, 0x97, 0x40, 0x62, 0xE8, 0x13, 0x45, 0x22, 0xDC, 0x2A, 0x79, 0x53 }
}, // 134
 
{
0x01030020, 0x00000001,
{0x5E, 0x23, 0x97, 0xEB, 0xE1, 0x08, 0x78, 0x7B, 0x81, 0x13, 0x6E, 0x72, 0x19, 0xB1, 0x96, 0xEA }
}, // 135
 
{
0x02060041, 0x00000002,
{0x0A, 0x9E, 0x4B, 0x56, 0x28, 0xB3, 0x00, 0x68, 0xCC, 0xEB, 0xC2, 0x8A, 0x13, 0x6A, 0x7B, 0x42 }
}, // 136
 
{
0x040C0082, 0x00000004,
{0xB4, 0xF6, 0x12, 0x5A, 0x8A, 0x6F, 0x99, 0xF3, 0x6A, 0xF8, 0xE0, 0xEC, 0x49, 0x36, 0xCE, 0xA9 }
}, // 137
 
{
0x08180104, 0x00000008,
{0x40, 0x5D, 0xB9, 0xB2, 0xAE, 0xC1, 0xB2, 0x44, 0x7C, 0xC7, 0xE1, 0xCD, 0x88, 0xCB, 0x34, 0x79 }
}, // 138
 
{
0x10300208, 0x00000010,
{0xAA, 0x13, 0x21, 0xD7, 0x85, 0x22, 0xD8, 0xC6, 0x3C, 0x8B, 0x1E, 0x03, 0x80, 0x47, 0xD7, 0x6C }
}, // 139
 
{
0x20600410, 0x00000020,
{0x35, 0x88, 0xC3, 0x64, 0x7A, 0xA5, 0x19, 0x32, 0x0E, 0xD8, 0xC0, 0x70, 0xCC, 0x62, 0x3D, 0x41 }
}, // 140
 
{
0x40C00820, 0x00000040,
{0xD4, 0x54, 0x5A, 0xE8, 0x84, 0x8F, 0x5F, 0x3F, 0xA5, 0x4D, 0xB6, 0x22, 0x82, 0x24, 0x5A, 0xB4 }
}, // 141
 
{
0x81801041, 0x00000080,
{0xD3, 0x27, 0x71, 0x3A, 0x72, 0xC8, 0x6D, 0x3D, 0x6D, 0xC6, 0x93, 0xD8, 0x70, 0x0E, 0xE2, 0xEC }
}, // 142
 
{
0x03002082, 0x00000101,
{0xE7, 0x5A, 0x26, 0xE5, 0x0F, 0x61, 0x00, 0x46, 0xE5, 0xEB, 0x81, 0x6A, 0xE1, 0x28, 0x4C, 0x67 }
}, // 143
 
{
0x06004104, 0x00000202,
{0xE9, 0xCE, 0x7F, 0xC8, 0x13, 0x73, 0x22, 0xD1, 0x81, 0xAB, 0xC5, 0x0A, 0x61, 0x5B, 0x3E, 0x1D }
}, // 144
 
{
0x0C008208, 0x00000404,
{0xD4, 0xCA, 0x58, 0x9D, 0x75, 0xC8, 0xE8, 0xAA, 0x9D, 0x8F, 0x11, 0xBD, 0x53, 0x6E, 0x1C, 0x81 }
}, // 145
 
{
0x18010411, 0x00000808,
{0x69, 0x82, 0xD4, 0xF3, 0x07, 0x61, 0x74, 0x7E, 0xE2, 0x90, 0xC4, 0x5A, 0x9C, 0x7D, 0x60, 0x32 }
}, // 146
 
{
0x30020823, 0x00001010,
{0xBB, 0x40, 0x82, 0x82, 0xA8, 0xB8, 0x92, 0xA1, 0xEB, 0xAB, 0x6C, 0x0C, 0x5A, 0xB2, 0x16, 0x27 }
}, // 147
 
{
0x60041047, 0x00002020,
{0xF6, 0x05, 0x0F, 0x92, 0xDE, 0x52, 0x81, 0x06, 0xDC, 0xC9, 0x18, 0xD2, 0xD0, 0x60, 0x62, 0x36 }
}, // 148
 
{
0xC008208E, 0x00004040,
{0x11, 0x71, 0xDB, 0xB8, 0x54, 0x5F, 0xE8, 0x4E, 0xE3, 0x3C, 0xDF, 0xF1, 0xD6, 0x5B, 0x74, 0x56 }
}, // 149
 
{
0x8010411C, 0x00008081,
{0xA7, 0xCC, 0x67, 0x0A, 0xD5, 0xFB, 0xF3, 0x1A, 0x8C, 0xC5, 0xE6, 0xA6, 0x07, 0x8A, 0x59, 0x49 }
}, // 150
 
{
0x00208238, 0x00010103,
{0x57, 0xDF, 0x9A, 0xB8, 0x91, 0x70, 0xD0, 0xA0, 0xB2, 0xF7, 0x71, 0xE0, 0x3E, 0x03, 0xD0, 0xFF }
}, // 151
 
{
0x00410471, 0x00020206,
{0xF9, 0xD0, 0x9A, 0xB8, 0x45, 0xB1, 0xE3, 0x10, 0x5A, 0x01, 0x59, 0x58, 0x4D, 0x25, 0x1E, 0x6E }
}, // 152
 
{
0x008208E2, 0x0004040C,
{0x7D, 0x11, 0xB2, 0x36, 0x78, 0xEB, 0x97, 0xA5, 0xAC, 0xA2, 0x07, 0x17, 0x6E, 0xAD, 0xEC, 0xCD }
}, // 153
 
{
0x010411C4, 0x00080818,
{0x47, 0x39, 0x98, 0x82, 0x08, 0x65, 0x76, 0xD9, 0xE8, 0x95, 0x4E, 0xEE, 0xB4, 0xE7, 0xDE, 0x72 }
}, // 154
 
{
0x02082388, 0x00101030,
{0xFC, 0x7E, 0x13, 0xBB, 0xF6, 0xAE, 0x1A, 0x25, 0x48, 0x9C, 0xF3, 0x6E, 0xCC, 0x66, 0x54, 0x54 }
}, // 155
 
{
0x04104710, 0x00202060,
{0xEC, 0xE0, 0x9D, 0xA8, 0xCD, 0x6B, 0x55, 0xDC, 0xA7, 0xC4, 0x30, 0xDE, 0xF4, 0xD8, 0x8A, 0x61 }
}, // 156
 
{
0x08208E21, 0x004040C0,
{0xE8, 0x43, 0x94, 0xED, 0xB7, 0xBD, 0x7C, 0x31, 0x17, 0xA1, 0xE0, 0x0E, 0x57, 0x50, 0xF5, 0xCC }
}, // 157
 
{
0x10411C43, 0x00808180,
{0x3B, 0x64, 0xC0, 0xD0, 0x04, 0x4A, 0xB0, 0xA8, 0x28, 0xAE, 0x3C, 0xC3, 0xC3, 0x3F, 0x15, 0xBE }
}, // 158
 
{
0x20823887, 0x01010300,
{0xDF, 0x6C, 0x94, 0xAE, 0x52, 0xF3, 0x73, 0x76, 0x90, 0x76, 0xDA, 0x27, 0xC4, 0x48, 0xF9, 0x70 }
}, // 159
 
{
0x4104710F, 0x02020600,
{0x89, 0x3F, 0xFD, 0x02, 0xD5, 0xDC, 0xA4, 0x70, 0x38, 0x09, 0xDA, 0xEB, 0x83, 0x28, 0x3C, 0x91 }
}, // 160
 
{
0x8208E21F, 0x04040C00,
{0xE4, 0xF6, 0x73, 0x10, 0xB8, 0x10, 0xA8, 0x5D, 0xF1, 0xE7, 0x7B, 0x77, 0x8D, 0xAC, 0x47, 0x22 }
}, // 161
 
{
0x0411C43E, 0x08081801,
{0x3F, 0x1D, 0x26, 0xD5, 0x36, 0xE9, 0x87, 0x2F, 0x98, 0xE3, 0x4D, 0x34, 0x78, 0xCD, 0x56, 0x67 }
}, // 162
 
{
0x00000000, 0x80000000,
{0x37, 0x2D, 0xD8, 0x7F, 0x71, 0xBA, 0x1B, 0xC9, 0xC8, 0x40, 0xC8, 0xFA, 0xA2, 0x48, 0x97, 0xFC }
},// 163
 
{
0x00000000, 0x80000000,
{0x37, 0x2D, 0xD8, 0x7F, 0x71, 0xBA, 0x1B, 0xC9, 0xC8, 0x40, 0xC8, 0xFA, 0xA2, 0x48, 0x97, 0xFC }
},// 164
 
{
0x04040C01, 0x00000000,
{0xB3, 0xF0, 0xE3, 0x57, 0x64, 0xB6, 0xD9, 0x86, 0x1D, 0x26, 0x33, 0x7D, 0xEB, 0x8A, 0xC0, 0x47 }
}, // 165
 
{
0x08081803, 0x00000000,
{0x87, 0x15, 0x11, 0x16, 0xDB, 0xBA, 0xC8, 0xFC, 0x6B, 0x8D, 0x3A, 0x57, 0xCF, 0x97, 0x68, 0x7F }
}, // 166
 
{
0x10103006, 0x00000000,
{0x92, 0xF9, 0xC1, 0x0C, 0xF5, 0x58, 0xD9, 0xA5, 0xCE, 0xC2, 0xD6, 0x6F, 0x62, 0x69, 0xF9, 0xE2 }
}, // 167
 
{
0x2020600C, 0x00000000,
{0x28, 0xB5, 0x2D, 0x97, 0xF2, 0xF1, 0x9D, 0x08, 0xFD, 0x1C, 0x2E, 0xC8, 0xF5, 0x9A, 0xAE, 0xA0 }
}, // 168
 
{
0x4040C018, 0x00000000,
{0x7A, 0x21, 0xF2, 0xB4, 0x44, 0x96, 0x3A, 0xE1, 0x9C, 0x8B, 0x96, 0x41, 0xE5, 0xC5, 0x35, 0x93 }
}, // 169
 
{
0x80818030, 0x00000000,
{0x99, 0xF4, 0x75, 0x24, 0x94, 0x61, 0x01, 0xCE, 0x15, 0x84, 0x76, 0x32, 0x14, 0xA4, 0x16, 0x67 }
}, // 170
 
{
0x01030061, 0x00000001,
{0x2E, 0x5C, 0x60, 0x0A, 0xF4, 0xC7, 0x64, 0x71, 0xC5, 0x53, 0x21, 0x01, 0xB9, 0x31, 0x38, 0x00 }
}, // 171
 
{
0x020600C3, 0x00000002,
{0x0E, 0x39, 0xFD, 0x1A, 0xAB, 0x39, 0xC7, 0xC9, 0x45, 0x09, 0x09, 0x00, 0x4D, 0xD2, 0x33, 0x7C }
}, // 172
 
{
0x040C0186, 0x00000004,
{0xC8, 0x5A, 0x27, 0x9F, 0x5A, 0x18, 0xCE, 0xCA, 0xE3, 0x3D, 0xC0, 0x24, 0x04, 0xDD, 0x4A, 0x6A }
}, // 173
 
{
0x0818030C, 0x00000008,
{0x7B, 0xBB, 0xD8, 0xB5, 0x15, 0xB6, 0xAC, 0x2F, 0xCC, 0x9A, 0x03, 0xEB, 0x5C, 0xD6, 0x9C, 0xE3 }
}, // 174
 
{
0x10300618, 0x00000010,
{0xF0, 0x1B, 0xF5, 0x6C, 0x47, 0x71, 0x02, 0xB5, 0x7E, 0x66, 0xA8, 0x7A, 0x64, 0x16, 0xAB, 0x21 }
}, // 175
 
{
0x20600C30, 0x00000020,
{0x9A, 0xB3, 0xD1, 0xAA, 0xAE, 0x49, 0x65, 0x6B, 0xD9, 0x9B, 0xDC, 0x10, 0xF3, 0x8D, 0x86, 0x3C }
}, // 176
 
{
0x40C01860, 0x00000040,
{0x02, 0x6F, 0xB2, 0x90, 0xA1, 0x56, 0x43, 0xA1, 0x21, 0x06, 0xE3, 0x3E, 0x13, 0x87, 0x56, 0x62 }
}, // 177
 
{
0x818030C0, 0x00000080,
{0xFB, 0x73, 0x8A, 0xCF, 0x4F, 0x96, 0xCC, 0x6B, 0x19, 0x09, 0xA7, 0xB2, 0x19, 0xF0, 0x0C, 0xED }
}, // 178
 
{
0x03006180, 0x00000101,
{0x9D, 0x9C, 0x28, 0xC2, 0x90, 0xEB, 0x87, 0x9B, 0xA2, 0x45, 0x4F, 0xF2, 0x93, 0x0B, 0xA4, 0x73 }
}, // 179
 
{
0x0600C300, 0x00000202,
{0x22, 0x86, 0x29, 0xF3, 0x76, 0x99, 0xBD, 0x2B, 0x90, 0xC3, 0xE4, 0x16, 0x8C, 0x8A, 0x21, 0x09 }
}, // 180
 
{
0x0C018600, 0x00000404,
{0xB6, 0xEC, 0xE1, 0x82, 0x6B, 0xFB, 0x71, 0x87, 0x66, 0x28, 0xB8, 0xFC, 0x21, 0x09, 0x3E, 0x9F }
}, // 181
 
{
0x18030C01, 0x00000808,
{0x4C, 0x5D, 0x9C, 0xAA, 0xFB, 0xE4, 0x22, 0x0A, 0xEB, 0x7A, 0x69, 0xD2, 0x46, 0x3F, 0xB3, 0x83 }
}, // 182
 
{
0x30061803, 0x00001010,
{0x24, 0xB2, 0xB3, 0xE2, 0x2D, 0xCB, 0x91, 0x05, 0x7D, 0x18, 0xCB, 0xED, 0x1C, 0x7D, 0x02, 0xE0 }
}, // 183
 
{
0x600C3007, 0x00002020,
{0x74, 0x53, 0xF2, 0xDC, 0xE7, 0xE7, 0xC4, 0x56, 0xDF, 0x1D, 0xB5, 0xD7, 0x4E, 0x2A, 0x30, 0x8C }
}, // 184
 
{
0xC018600E, 0x00004040,
{0xCC, 0x99, 0xA4, 0xB8, 0x97, 0x6C, 0xF2, 0x97, 0x1E, 0xB6, 0x29, 0xE9, 0x8F, 0x06, 0x29, 0x28 }
}, // 185
 
{
0x8030C01C, 0x00008081,
{0x9F, 0xED, 0xB7, 0xF9, 0x54, 0x9C, 0xD2, 0x7E, 0x90, 0xEF, 0x39, 0x06, 0x5B, 0xAD, 0xE1, 0xD6 }
}, // 186
 
{
0x00618038, 0x00010103,
{0x7A, 0xAF, 0x9F, 0xA1, 0x60, 0xA8, 0x46, 0xCD, 0x26, 0x82, 0xC9, 0xE0, 0xBB, 0xAC, 0xEB, 0x8A }
}, // 187
 
{
0x00C30070, 0x00020206,
{0x38, 0x8E, 0x03, 0xA9, 0xEC, 0xE9, 0x3B, 0x40, 0x7F, 0xDD, 0x61, 0x83, 0x3D, 0xA2, 0x84, 0x57 }
}, // 188
 
{
0x018600E0, 0x0004040C,
{0xB2, 0x02, 0x09, 0xF7, 0x65, 0x7D, 0xAA, 0x09, 0xFE, 0xDB, 0xEF, 0x59, 0x5E, 0xA8, 0xA9, 0x0B }
}, // 189
 
{
0x030C01C1, 0x00080818,
{0x48, 0xCA, 0x9E, 0x5A, 0xB6, 0x80, 0x7E, 0xCF, 0x7E, 0x2E, 0x39, 0xCD, 0x5E, 0xDB, 0x94, 0xC7 }
}, // 190
 
{
0x06180382, 0x00101030,
{0xDE, 0x98, 0xB5, 0x0E, 0xFF, 0x7D, 0x81, 0x4C, 0xF9, 0xD9, 0x64, 0x94, 0x9E, 0xAA, 0x7F, 0xE5 }
}, // 191
 
{
0x0C300705, 0x00202060,
{0x5E, 0x66, 0xD8, 0x6C, 0x67, 0x70, 0x77, 0x20, 0x02, 0xB0, 0xFE, 0xEE, 0xE6, 0xE5, 0xA8, 0xA1 }
}, // 192
 
{
0x18600E0A, 0x004040C0,
{0x76, 0x01, 0x20, 0x3F, 0x95, 0xE1, 0x3B, 0x4D, 0x02, 0x46, 0xE2, 0xC7, 0xA7, 0xB9, 0x5B, 0x9B }
}, // 193
 
{
0x30C01C15, 0x00808180,
{0xF1, 0xFA, 0x8B, 0xCA, 0x6D, 0x09, 0x2B, 0x2B, 0x8D, 0xA5, 0x39, 0x9D, 0x08, 0xF9, 0xA8, 0x0A }
}, // 194
 
{
0x6180382B, 0x01010300,
{0x13, 0x07, 0x91, 0x71, 0x70, 0xF2, 0xEE, 0x5A, 0x40, 0xEF, 0xF5, 0x85, 0x61, 0x4E, 0xCD, 0x8F }
}, // 195
 
{
0xC3007056, 0x02020600,
{0x61, 0x26, 0xC7, 0xBB, 0x02, 0xEE, 0xB4, 0xF9, 0xC0, 0x93, 0xB5, 0x82, 0xD3, 0x48, 0xD5, 0x42 }
}, // 196
 
{
0x8600E0AD, 0x04040C01,
{0x90, 0x57, 0xD7, 0xC5, 0x06, 0x2F, 0x28, 0x58, 0xA9, 0x46, 0x0C, 0x39, 0x8B, 0x54, 0xA6, 0x40 }
}, // 197
 
{
0x0C01C15A, 0x08081803,
{0x4A, 0xA8, 0x99, 0x98, 0x83, 0x76, 0x64, 0x3F, 0xF1, 0x42, 0x32, 0x36, 0x18, 0xDC, 0xCE, 0x5F }
}, // 198
 
{
0x00000001, 0x80000000,
{0xC4, 0x1E, 0xAA, 0xDB, 0x22, 0x92, 0xF3, 0x16, 0x95, 0xE6, 0xBC, 0x3B, 0x11, 0x1F, 0xC6, 0x24 }
}, // 199
 
{
0x00000011, 0x80000000,
{0x92, 0x19, 0xA4, 0x85, 0xE9, 0x8B, 0x61, 0x1C, 0xD1, 0xA9, 0x14, 0x95, 0x75, 0xF2, 0x15, 0x4B }
}, // 200
 
{
0x00000021, 0x80000000,
{0x99, 0x05, 0x7D, 0x00, 0xBE, 0xFD, 0x9E, 0x42, 0xE0, 0xC2, 0x1B, 0x94, 0xF3, 0x27, 0x42, 0xC8 }
}, // 201
 
{
0x00000031, 0x80000000,
{0xB2, 0x50, 0x95, 0x4D, 0x1C, 0xCC, 0x4B, 0x67, 0x0D, 0xD3, 0x6A, 0xEB, 0xC2, 0x1D, 0x48, 0x3B }
}, // 202
 
{
0x00000041, 0x80000000,
{0x02, 0xBD, 0x3D, 0xBC, 0x07, 0x23, 0x7A, 0x96, 0x87, 0x0A, 0x0F, 0x92, 0xB5, 0x0D, 0x7C, 0xAC }
}, // 203
 
{
0x00010104, 0x00000000,
{0xF8, 0xD5, 0x79, 0x30, 0xF4, 0xDC, 0xE6, 0x67, 0xDE, 0x30, 0xCB, 0x04, 0xB5, 0x1A, 0x26, 0x83 }
}, // 204
 
{
0x00020208, 0x00000000,
{0xDB, 0x1F, 0xB8, 0xED, 0xFE, 0xB9, 0x37, 0x3E, 0xFA, 0x25, 0x36, 0x96, 0x91, 0x79, 0xEF, 0xFF }
}, // 205
 
{
0x00040410, 0x00000000,
{0x33, 0x6F, 0xF8, 0x7D, 0x19, 0x10, 0x45, 0x4C, 0x65, 0x1C, 0x42, 0xDC, 0xB8, 0x08, 0x0E, 0xC4 }
}, // 206
 
{
0x00080820, 0x00000000,
{0x1A, 0x5B, 0xF3, 0xFB, 0x56, 0xBD, 0xF1, 0xF9, 0x7C, 0x9E, 0x47, 0xAB, 0x6F, 0x51, 0xF5, 0x9F }
}, // 207
 
{
0x00101040, 0x00000000,
{0xCD, 0x18, 0xA1, 0xD7, 0xFC, 0x08, 0xE8, 0x84, 0x95, 0x64, 0xDE, 0x9B, 0x77, 0xD8, 0xEE, 0x4E }
}, // 208
 
{
0x00202080, 0x00000000,
{0x2C, 0x6D, 0x7B, 0xAB, 0x33, 0xA5, 0x86, 0x13, 0xFD, 0x09, 0x27, 0x36, 0x65, 0xE4, 0x3A, 0x40 }
}, // 209
 
{
0x00404100, 0x00000000,
{0xE1, 0x1F, 0xEC, 0xE5, 0xA3, 0x7C, 0xF6, 0x40, 0xE2, 0x73, 0x1E, 0x65, 0x5C, 0x8F, 0x5B, 0x14 }
}, // 210
 
{
0x00808200, 0x00000000,
{0x14, 0x2A, 0x78, 0x81, 0x49, 0x55, 0x90, 0x10, 0x79, 0xEE, 0x35, 0xA8, 0x98, 0x07, 0xBB, 0xFE }
}, // 211
 
{
0x01010400, 0x00000000,
{0x6F, 0xFF, 0x23, 0x98, 0x8D, 0x66, 0x1A, 0x9F, 0x35, 0x06, 0xC1, 0x98, 0x33, 0x91, 0x6A, 0x8C }
}, // 212
 
{
0x02020800, 0x00000000,
{0x35, 0xCC, 0xC8, 0x78, 0x33, 0x48, 0x7F, 0x6C, 0x79, 0x26, 0xD1, 0x43, 0x19, 0xFE, 0x71, 0x21 }
}, // 213
 
{
0x04041000, 0x00000000,
{0x47, 0xEA, 0xC2, 0x31, 0xE3, 0x41, 0xEE, 0x79, 0xFB, 0x91, 0xB8, 0x05, 0x5F, 0x5F, 0x42, 0x73 }
}, // 214
 
{
0x08082001, 0x00000000,
{0xD6, 0x18, 0x65, 0xA6, 0x70, 0x1F, 0xF8, 0x47, 0xEE, 0xF7, 0x40, 0x54, 0xD4, 0xE0, 0x16, 0xBA }
}, // 215
 
{
0x10104002, 0x00000000,
{0x1E, 0x81, 0x1E, 0x10, 0x5A, 0xB0, 0xF1, 0x1C, 0x3F, 0xE3, 0xCD, 0x7B, 0x1B, 0x0B, 0xFC, 0x7E }
}, // 216
 
{
0x20208004, 0x00000000,
{0xC7, 0xD3, 0x91, 0xD1, 0x65, 0xBF, 0xA6, 0x2F, 0x91, 0x06, 0x27, 0x73, 0xE3, 0x98, 0x28, 0xDB }
}, // 217
 
{
0x40410008, 0x00000000,
{0x42, 0xFE, 0x10, 0x2D, 0xE0, 0x61, 0x75, 0xF4, 0xEA, 0x4B, 0x1D, 0x79, 0xB5, 0x81, 0x2F, 0x15 }
}, // 218
 
{
0x80820010, 0x00000000,
{0xDA, 0x7B, 0x31, 0x8D, 0xC9, 0x7F, 0x53, 0x0D, 0x6C, 0xDC, 0xD8, 0xD2, 0x0E, 0x0E, 0x9A, 0x4B }
}, // 219
 
{
0x01040021, 0x00000001,
{0xC3, 0x27, 0x8C, 0x96, 0x1B, 0xB0, 0x20, 0x32, 0x71, 0x56, 0x87, 0xD0, 0x3D, 0x0D, 0x48, 0x15 }
}, // 220
 
{
0x02080042, 0x00000002,
{0x22, 0xB0, 0x3E, 0xBF, 0x03, 0x94, 0x19, 0x95, 0x8C, 0x3E, 0xDC, 0x78, 0x3D, 0xFB, 0xDB, 0xB3 }
}, // 221
 
{
0x04100084, 0x00000004,
{0xA7, 0x1C, 0x75, 0xCC, 0xBE, 0x2D, 0xD9, 0xFE, 0x09, 0xE3, 0x43, 0xA3, 0xAE, 0xE6, 0x9E, 0x4F }
}, // 222
 
{
0x08200108, 0x00000008,
{0xDB, 0x48, 0x82, 0x56, 0xF1, 0xFE, 0xB0, 0x3A, 0x8D, 0x33, 0x5C, 0x3D, 0x7F, 0x2E, 0xEC, 0x09 }
}, // 223
 
{
0x10400210, 0x00000010,
{0x26, 0xC9, 0xB9, 0xF0, 0x96, 0x0E, 0xCD, 0x15, 0x04, 0xD5, 0x4A, 0x32, 0x90, 0xC6, 0x08, 0x59 }
}, // 224
 
{
0x20800420, 0x00000020,
{0xA1, 0x8D, 0x0B, 0xC8, 0xF6, 0x5C, 0x3F, 0x9B, 0xBD, 0x64, 0x50, 0xF2, 0x5E, 0x94, 0x60, 0x5E }
}, // 225
 
{
0x41000840, 0x00000040,
{0xCE, 0xA8, 0xB6, 0x8C, 0x7E, 0x34, 0x0E, 0xB0, 0x2C, 0x62, 0xE9, 0xB1, 0x05, 0xFC, 0x6B, 0x10 }
}, // 226
 
{
0x82001081, 0x00000080,
{0x2B, 0xCC, 0x5A, 0x9D, 0x04, 0x0B, 0xC1, 0x80, 0x25, 0xC3, 0x70, 0xD9, 0x1B, 0x9D, 0x29, 0x58 }
}, // 227
 
{
0x04002103, 0x00000101,
{0x4C, 0xD4, 0x6C, 0x88, 0xDB, 0x4E, 0x84, 0x5E, 0x22, 0x31, 0x48, 0x0D, 0xE1, 0x38, 0xBC, 0x07 }
}, // 228
 
{
0x08004206, 0x00000202,
{0xDA, 0x1B, 0x19, 0x17, 0xAD, 0x79, 0xA4, 0xDC, 0x93, 0xBB, 0xF7, 0x2E, 0x18, 0x01, 0x85, 0x41 }
}, // 229


* Contains the console's [https://wiki.henkaku.xyz/vita/VisibleId Visible ID].
{
0x1000840D, 0x00000404,
{0x33, 0xB5, 0x3C, 0x23, 0x26, 0xA3, 0x20, 0x89, 0x50, 0x16, 0x75, 0x1D, 0xC3, 0x92, 0x26, 0xD5 }
}, // 230


== Cmep Keyring 0x601 - ScePspIndividualKeyMeshCert first half (Test Subject 9 PS Vita) ==
{
0x2001081B, 0x00000808,
{0xED, 0x2F, 0x66, 0x64, 0x91, 0x5D, 0xA5, 0x44, 0x9B, 0xA9, 0x42, 0xFF, 0xAF, 0x15, 0x8C, 0x3B }
}, // 231


* Contains the first half (0x20 bytes) of of the console's [https://www.psdevwiki.com/psp/Kirk#PSP_Individual_Key_Mesh_Certificate ScePspIndividualKeyMeshCert].
{
* Warning: the dump presented here is byte-swapped.
0x40021036, 0x00001010,
{0xF1, 0xE2, 0x96, 0x42, 0x85, 0x6C, 0x62, 0x5F, 0x5F, 0x8B, 0xD3, 0xA5, 0x28, 0x4E, 0x2F, 0xBA }
}, // 232


<pre>
{
B9 18 4E 22 83 8B 91 6D 19 86 72 D5 FB 10 FD A3 <- byte-swapped key_mesh.derivation_seed_1
0x8004206C, 0x00002020,
4A 4E 72 CB 02 6E 96 E9 96 B2 C3 23 B9 CF 36 A4 <- byte-swapped key_mesh.derivation_seed_0
{0x46, 0x6A, 0xAB, 0x2C, 0x3E, 0x89, 0x0F, 0x6C, 0xE3, 0xC1, 0x8B, 0xF8, 0x8E, 0x73, 0x35, 0x48 }
</pre>
}, // 233


== Cmep Keyring 0x602 - ScePspIndividualKeyMeshCert second half (Test Subject 9 PS Vita) ==
{
0x000840D9, 0x00004041,
{0x3B, 0x4F, 0xE2, 0x99, 0xF4, 0x33, 0x77, 0x76, 0x9C, 0x36, 0x65, 0xCF, 0x63, 0x59, 0xCC, 0xAB }
}, // 234


* Contains the second half (0x20 bytes) of the console's [https://www.psdevwiki.com/psp/Kirk#PSP_Individual_Key_Mesh_Certificate ScePspIndividualKeyMeshCert].
{
* Warning: the dump presented here is byte-swapped.
0x001081B3, 0x00008082,
{0x46, 0xCB, 0x56, 0x2B, 0xC1, 0x1E, 0xF2, 0xAD, 0xCE, 0x77, 0x36, 0x10, 0xD5, 0xBA, 0xEA, 0x61 }
}, // 235


<pre>
{
85 4B 14 AB 00 00 00 00 00 45 72 AC 01 01 08 10 <- byte-swapped hash, byte-swapped reserved, byte-swapped fuse_id
0x00210367, 0x00010104,
FF 9A 3E E5 A2 B9 F5 25 32 4D E0 2A 8F B1 8F B9 <- byte-swapped key_mesh.derivation_key
{0x67, 0x86, 0xCD, 0xB6, 0x13, 0xDC, 0x08, 0xBD, 0xC6, 0x8F, 0xCA, 0x26, 0x78, 0xFF, 0x94, 0x1F }
</pre>
}, // 236


== ScePspIndividualKeyMeshCert (Test Subject 9 PS Vita) ==
{
0x004206CE, 0x00020208,
{0x76, 0xBE, 0x55, 0x7E, 0x6C, 0x4F, 0xB0, 0x29, 0x03, 0xB7, 0x53, 0xD7, 0x0B, 0xF5, 0x56, 0xD5 }
}, // 237


* By byte-swapping keyrings 0x601 and 0x602 or by taking Fuse ID only and running the ScePspIndividualKeyMeshCert generation algorithm (see PSP Jig Kick flashData.prx), we can obtain ScePspIndividualKeyMeshCert.
{
<pre>
0x00840D9D, 0x00040410,
A4 36 CF B9 23 C3 B2 96 E9 96 6E 02 CB 72 4E 4A <- key_mesh.derivation_seed_0
{0xD9, 0xEC, 0x2F, 0xB9, 0xE7, 0x3D, 0x78, 0x81, 0x42, 0xB8, 0x59, 0x4D, 0xDD, 0xE9, 0x65, 0xD2 }
A3 FD 10 FB D5 72 86 19 6D 91 8B 83 22 4E 18 B9 <- key_mesh.derivation_seed_1
}, // 238
B9 8F B1 8F 2A E0 4D 32 25 F5 B9 A2 E5 3E 9A FF <- key_mesh.derivation_key
10 08 01 01 AC 72 45 00 00 00 00 00 AB 14 4B 85 <- fuse_id, reserved, hash
</pre>


= SUPER KEYS (Dumped by SDBoot glitching) =
{
0x01081B3B, 0x00080820,
{0xBA, 0xEC, 0x17, 0xE9, 0xC3, 0xBA, 0xD9, 0xC7, 0x11, 0xA1, 0x18, 0x7F, 0x1E, 0xC6, 0x92, 0x6B }
}, // 239


== Perconsole Keyslot 0x8 (Test Subject 6) ==
{
0x02103677, 0x00101040,
{0xCF, 0x79, 0x39, 0x2B, 0x29, 0x78, 0x83, 0xC7, 0x89, 0x62, 0x41, 0x8F, 0x0E, 0xB2, 0xAF, 0x99 }
}, // 240


<pre>
{
D9022A0C0D9DC52A55A162EA23F50A65
0x04206CEE, 0x00202080,
</pre>
{0xB7, 0x7D, 0xA2, 0xD0, 0x06, 0x43, 0xAF, 0xCF, 0xD9, 0x1B, 0x63, 0x17, 0x95, 0xC3, 0x5F, 0xEB }
}, // 241


== Perconsole Keyslot 0x8 (Test Subject 7) ==
{
0x0840D9DD, 0x00404100,
{0xC4, 0x5E, 0xEE, 0x1E, 0xED, 0x0D, 0x69, 0x81, 0x74, 0x4E, 0x3E, 0xBC, 0x1E, 0x4C, 0xD9, 0xE1 }
}, // 242


<pre>
{
A193E1DD073BECDF6720D0616A8E815D
0x1081B3BA, 0x00808200,
</pre>
{0x13, 0x12, 0x16, 0xF1, 0xD5, 0x8F, 0x6B, 0x65, 0x77, 0x8A, 0x62, 0xB5, 0x4E, 0xEA, 0xCD, 0x43 }
}, // 243


== Perconsole Keyslot 0x8 (Test Subject 8) ==
{
0x21036774, 0x01010400,
{0xED, 0xDF, 0x55, 0x0E, 0x59, 0x1B, 0x59, 0x80, 0x8D, 0x71, 0x6D, 0xD2, 0x29, 0x56, 0xB2, 0x29 }
}, // 244


<pre>
{
80D71F18E0A3F393236AE1E875AE3EF8
0x4206CEE9, 0x02020800,
</pre>
{0xA9, 0x20, 0x90, 0xF4, 0xF8, 0x8C, 0x82, 0x7D, 0x9A, 0xA9, 0xF1, 0x30, 0xE6, 0xFE, 0xA6, 0x4E }
}, // 245


== Perconsole Keyslot 0x9 (Test Subject 6) ==
{
0x840D9DD2, 0x04041000,
{0x04, 0x8D, 0x47, 0x92, 0xF0, 0xB9, 0x9A, 0x3D, 0xBC, 0x97, 0x1D, 0x81, 0x51, 0x5E, 0x44, 0xFF }
}, // 246


<pre>
{
4B0F736E9A1FD865B125B05BC3641EC9
0x081B3BA5, 0x08082001,
</pre>
{0x40, 0xFD, 0xBE, 0x79, 0x29, 0x2A, 0x72, 0xD6, 0x1C, 0xB1, 0x21, 0x9C, 0xD3, 0xC6, 0x7A, 0xE3 }
}, // 247


== Perconsole Keyslot 0x9 (Test Subject 7) ==
{
0x00000001, 0x80000000,
{0xC4, 0x1E, 0xAA, 0xDB, 0x22, 0x92, 0xF3, 0x16, 0x95, 0xE6, 0xBC, 0x3B, 0x11, 0x1F, 0xC6, 0x24 }
},// 248


<pre>
{
C310134A5F5D825AC5E0BB838BA3E287
0x00000001, 0x80000000,
</pre>
{0xC4, 0x1E, 0xAA, 0xDB, 0x22, 0x92, 0xF3, 0x16, 0x95, 0xE6, 0xBC, 0x3B, 0x11, 0x1F, 0xC6, 0x24 }
},// 249


== Perconsole Keyslot 0x9 (Test Subject 8) ==
{
0x01040020, 0x00000001,
{0x9E, 0x08, 0xE2, 0x2E, 0x3E, 0x17, 0x07, 0xCF, 0x80, 0x73, 0x03, 0x15, 0xE4, 0x5F, 0xFA, 0x5D }
}, // 250


<pre>
{
04937A014699DA528E6B0CF7ECCADB78
0x02080041, 0x00000002,
</pre>
{0x30, 0xBF, 0x3D, 0xA5, 0xE4, 0x68, 0xD8, 0x4F, 0x69, 0x2C, 0xFA, 0x04, 0x14, 0xF0, 0x10, 0x47 }
}, // 251


== Static Keyslot 0x605 ==
{
0x04100082, 0x00000004,
{0xFA, 0xBF, 0xF9, 0x12, 0x24, 0x34, 0x7F, 0x01, 0x83, 0x03, 0x6F, 0x1F, 0xCA, 0xA2, 0xE1, 0x8C }
}, // 252


<pre>
{
3B 39 E9 2E 25 B0 40 38 27 EE 32 D7 D6 49 A8 47
0x08200104, 0x00000008,
D7 F1 1E 24 D0 11 76 0A 79 43 37 D4 F7 40 C9 DF
{0xCE, 0x18, 0x0B, 0xB6, 0xFF, 0xBA, 0x56, 0xB3, 0xA4, 0xEF, 0x9A, 0x29, 0xF4, 0x56, 0x2E, 0x99 }
</pre>
}, // 253


* Universal
{
0x10400208, 0x00000010,
{0x05, 0xFD, 0xB2, 0x9B, 0x4E, 0xD6, 0x58, 0x8E, 0x33, 0x2F, 0x2B, 0xE1, 0xF4, 0x22, 0xDC, 0x3A }
}, // 254


== Perconsole Keyslot 0x606 (Test Subject 5) ==
{
0x20800410, 0x00000020,
{0x87, 0xB1, 0x5B, 0x0C, 0x58, 0x26, 0x3E, 0x04, 0x48, 0xC3, 0xC0, 0xFC, 0x37, 0xA3, 0x20, 0xE3 }
}, // 255


<pre>
{
5E 75 05 CD A7 40 E8 5D 7F 82 B7 EA EA 32 CE 1C
0x41000821, 0x00000040,
66 04 2C E9 E6 B6 F4 F1 DC AA 94 A1 06 B8 32 EF
{0x72, 0x62, 0x87, 0x18, 0xC9, 0x97, 0xF1, 0x4A, 0x60, 0x87, 0x0C, 0xDB, 0xBE, 0xA7, 0x9D, 0xC3 }
</pre>
}, // 256


== Perconsole Keyslot 0x606 (Test Subject 6) ==
{
0x82001042, 0x00000080,
{0xE1, 0x01, 0x3C, 0x92, 0x66, 0xBF, 0xCC, 0xE1, 0xF2, 0x00, 0xA6, 0xF0, 0xD1, 0x33, 0x1C, 0x9B }
}, // 257


<pre>
{
DD DF C7 61 C7 7F AE 89 CF 39 6F BC 30 CF 7F 60 
0x04002085, 0x00000101,
F8 BF BC 24 E1 3F 5A CE 46 50 BC 66 2F 73 AC D4 
{0xAC, 0x06, 0xB1, 0x7A, 0x1A, 0x24, 0xE6, 0xC8, 0x3B, 0x60, 0x6B, 0x1A, 0xD3, 0xBF, 0xA1, 0x39 }
</pre>
}, // 258


== Perconsole Keyslot 0x606 (Test Subject 7) ==
{
0x0800410B, 0x00000202,
{0x54, 0x68, 0xBC, 0x4B, 0xA9, 0x73, 0xE6, 0xFC, 0x29, 0xEE, 0xBE, 0x4F, 0x27, 0x08, 0xDB, 0x7E }
}, // 259


<pre>
{
72 39 DE 10 B7 F1 92 D5 78 E1 03 81 63 7F CF CF 
0x10008216, 0x00000404,
D4 44 9B 58 A1 7C 97 E5 EC F6 1D 09 40 82 7B B2 
{0x8A, 0xFF, 0x65, 0xA9, 0x3C, 0xED, 0x45, 0x63, 0x6F, 0xCB, 0xC4, 0x72, 0xB6, 0xD5, 0x5B, 0xAA }
</pre>
}, // 260


== Perconsole Keyslot 0x606 (Test Subject 8) ==
{
0x2001042D, 0x00000808,
{0x27, 0x88, 0xA7, 0xE3, 0x30, 0x4D, 0x39, 0x34, 0x59, 0xE7, 0xAF, 0xDC, 0x5B, 0xCE, 0x75, 0x93 }
}, // 261


<pre>
{
98 AF 08 AD B7 8A E2 83 0A 31 47 0A FD 00 B2 64 
0x4002085A, 0x00001010,
D4 E2 C5 83 E2 14 EB 57 F9 58 CD 54 C4 BA 09 4C
{0xE5, 0x0B, 0x79, 0x93, 0x36, 0x8F, 0x7D, 0xF5, 0x4B, 0x01, 0x27, 0xF5, 0x8A, 0x8F, 0x0D, 0x7D }
</pre>
}, // 262


== Perconsole Keyslot 0x607 (Test Subject 5) ==
{
0x800410B4, 0x00002020,
{0xA7, 0xB0, 0x58, 0x57, 0x04, 0x9A, 0xB2, 0xE9, 0xB0, 0x6F, 0xBA, 0x20, 0xAD, 0xD1, 0x4B, 0x6B }
}, // 263


<pre>
{
F5 B1 8E B5 37 DD C4 6F 6B 59 A4 19 AD AB F4 A8
0x00082168, 0x00004041,
52 02 9A 0E 50 E4 FC 3F F0 93 88 EA E3 34 C7 E3
{0x79, 0xAD, 0x27, 0xBA, 0xF0, 0xB1, 0x85, 0x16, 0xF2, 0x21, 0x72, 0xFB, 0xFF, 0xE7, 0x67, 0x24 }
</pre>
}, // 264


== Perconsole Keyslot 0x607 (Test Subject 6) ==
{
0x001042D1, 0x00008082,
{0xDA, 0xCB, 0xAF, 0x24, 0x52, 0xE5, 0x93, 0x21, 0x76, 0x56, 0xF6, 0x84, 0xDA, 0xA8, 0xC8, 0xBB }
}, // 265


<pre>
{
FA 87 A5 75 15 B2 88 60 57 5E 2C 2D 45 7F BA 86 
0x002085A2, 0x00010104,
55 32 A9 74 96 BF D5 B9 E8 D4 CE D7 98 19 40 97
{0x67, 0x5C, 0x2E, 0xE0, 0xCA, 0x18, 0xFE, 0x8B, 0xE7, 0x0A, 0x2B, 0x59, 0x31, 0xFE, 0xB6, 0xF4 }
</pre>
}, // 266


== Perconsole Keyslot 0x607 (Test Subject 7) ==
{
0x00410B45, 0x00020208,
{0xE7, 0x92, 0xD1, 0xE8, 0xD6, 0x43, 0xF0, 0x57, 0x03, 0x9C, 0xA0, 0x26, 0xC9, 0xB6, 0x20, 0x84 }
}, // 267


<pre>
{
7E EE 37 A4 C0 DA C7 D2 0A AA 5E DA 34 17 B4 5C 
0x0082168B, 0x00040410,
45 A8 DA 4E FD 40 7D 9D E5 08 53 B4 9A 06 29 43
{0x50, 0x1B, 0xB8, 0x6D, 0xA0, 0x9E, 0xB7, 0x5D, 0xB5, 0xB5, 0xDD, 0xB1, 0x19, 0xA3, 0x4E, 0xDE }
</pre>
}, // 268


== Perconsole Keyslot 0x607 (Test Subject 8) ==
{
0x01042D16, 0x00080820,
{0x40, 0x0B, 0x75, 0x52, 0x9B, 0xE1, 0x87, 0x97, 0xCF, 0xA7, 0xC1, 0x4F, 0xAE, 0x52, 0x88, 0x11 }
}, // 269


<pre>
{
6E 1E 68 77 A7 1D 05 8B 97 55 F6 9D 2E 2A 24 1C 
0x02085A2D, 0x00101040,
4A 3D B7 E4 3B E8 F0 65 FA A0 8C 20 58 89 3F F2
{0x18, 0xD2, 0x20, 0x72, 0x19, 0x0A, 0x7A, 0xD6, 0x74, 0xFB, 0x80, 0x70, 0x63, 0x5C, 0x89, 0x8A }
</pre>
}, // 270


= Keys =
{
0x0410B45B, 0x00202080,
{0x59, 0x17, 0x20, 0x0F, 0x2A, 0x29, 0x96, 0x09, 0x13, 0x34, 0xD9, 0x52, 0xFC, 0xC1, 0x31, 0x65 }
}, // 271


== Bootrom ==
{
0x082168B6, 0x00404100,
{0x6A, 0x30, 0x8D, 0x5D, 0xBE, 0xA0, 0x9B, 0x82, 0xC0, 0xD7, 0xA4, 0x79, 0x37, 0xD3, 0xC0, 0x8E }
}, // 272


=== Personalization removal Key for SLSK (Proto) (Perconsole) (Slot 8) (Test Subject 0) ===
{
0x1042D16C, 0x00808200,
{0x25, 0x80, 0x3C, 0x3E, 0x8A, 0x26, 0x0D, 0xAF, 0xDD, 0x11, 0xBF, 0x16, 0x26, 0xE4, 0xD1, 0xA9 }
}, // 273


<pre>
{
85C688C1B3BACB16EB57B4CC35B7D590
0x2085A2D8, 0x01010400,
</pre>
{0x97, 0x42, 0x07, 0x88, 0x95, 0x78, 0xD1, 0xAB, 0x44, 0x31, 0xEA, 0xF4, 0x7B, 0x2B, 0x61, 0x8C }
}, // 274


* decrypts the .enp (not ._enp!) perconsole layer of an enp file, turning it into an enc file
{
* algo is aes-128-cbc
0x410B45B1, 0x02020800,
{0xD3, 0x82, 0xAE, 0x99, 0x12, 0x90, 0xF7, 0x63, 0x62, 0x83, 0x99, 0x1C, 0x2F, 0x7F, 0x67, 0xAF }
}, // 275


=== Personalization removal Key for SLSK (Proto) (Perconsole) (Slot 8) (Test Subject 1) ===
{
0x82168B63, 0x04041000,
{0xCC, 0x4D, 0x18, 0xAA, 0xC7, 0x1F, 0x50, 0x9C, 0x7E, 0x5B, 0x2D, 0xF1, 0x63, 0xBF, 0xC5, 0x09 }
}, // 276


<pre>
{
8B5415DC7EB5986472BF6B30D8E3E812
0x042D16C7, 0x08082001,
</pre>
{0x59, 0x90, 0x38, 0xFF, 0x6D, 0xC1, 0x65, 0xB6, 0x8A, 0x63, 0xED, 0x14, 0x89, 0x45, 0x4F, 0xA3 }
}, // 277


=== Personalization removal Key for SLSK (Proto) (Perconsole) (Slot 8) (Test Subject 2) ===
{
0x82001080, 0x00000080,
{0x76, 0xB9, 0x47, 0xE7, 0x1C, 0x5C, 0x07, 0x96, 0x0E, 0x15, 0x20, 0x74, 0x24, 0xCD, 0x7C, 0x1A }
}, // 278


<pre>
{
95B7B3EDB2EF277FB0F78FA3970EE0D0
0x04002101, 0x00000101,
</pre>
{0x97, 0x95, 0x09, 0x1D, 0x3D, 0x0F, 0x60, 0x62, 0xE8, 0x76, 0xB1, 0xE3, 0x32, 0xCA, 0xFD, 0xD5 }
}, // 279


=== Personalization removal Key for SLSK (Proto) (Perconsole) (Slot 8) (Test Subject 3) ===
{
0x08004203, 0x00000202,
{0x60, 0x52, 0x35, 0x6F, 0xCA, 0x57, 0x35, 0x6F, 0x0F, 0x0D, 0x9A, 0x3A, 0x73, 0x2F, 0x92, 0xE6 }
}, // 280


<pre>
{
CB0B65F7897F30310471F7CDA2CFD804
0x10008407, 0x00000404,
</pre>
{0xDD, 0x4B, 0xAF, 0x42, 0xE2, 0x16, 0x0D, 0x57, 0xDD, 0x07, 0x68, 0xF0, 0x34, 0x5D, 0xDC, 0x88 }
}, // 281


=== Personalization removal Key for SLSK (Proto) (Perconsole) (Slot 8) (Test Subject 4) ===
{
0x2001080F, 0x00000808,
{0xFB, 0x4C, 0x48, 0xEF, 0x15, 0x20, 0x83, 0x0F, 0xFD, 0xE7, 0xDE, 0xA0, 0x3D, 0x70, 0xD6, 0xDE }
}, // 282


<pre>
{
F3E408E1EDC3B513277DB99E58A15BE3
0x4002101E, 0x00001010,
</pre>
{0x37, 0xCA, 0xEE, 0x43, 0x0B, 0xCA, 0x47, 0x81, 0xFF, 0xE5, 0xE6, 0x41, 0xF1, 0xBA, 0x5A, 0xA1 }
}, // 283


=== Personalization removal IV for SLSK (Proto) (Perconsole) (Slot 8) ===
{
0x8004203D, 0x00002020,
{0x41, 0x36, 0x21, 0x3A, 0xE8, 0x3D, 0x12, 0x99, 0x49, 0x79, 0x63, 0xD7, 0x4F, 0xD8, 0xBA, 0xFB }
}, // 284


<pre>
{
FD4FA8FA4FE79430A0CA305C88E524DD
0x0008407A, 0x00004041,
</pre>
{0xAF, 0x0E, 0x84, 0x9D, 0x39, 0xCF, 0x9C, 0x85, 0x7B, 0x7C, 0x5E, 0xB4, 0xE8, 0x8E, 0x67, 0x5A }
}, // 285


=== Personalization removal KEY for SLSK (Proto) (Perconsole) (Slot 9) (JigKick) (Test Subject 0)  ===
{
<pre>
0x001080F4, 0x00008082,
9E0A8285C3BE83951C78480A7AEC80FD
{0xC4, 0x49, 0x78, 0x0E, 0x9E, 0x86, 0x24, 0x73, 0x4A, 0xB6, 0xCD, 0x69, 0x1A, 0x2A, 0xF1, 0xFD }
</pre>
}, // 286


=== Personalization removal KEY for SLSK (Proto) (Perconsole) (Slot 9) (JigKick) (Test Subject 1)  ===
{
<pre>
0x002101E8, 0x00010104,
686268A876650A6A6DC353F69EB82F19
{0xB1, 0x32, 0x5F, 0xE2, 0xA2, 0x49, 0x65, 0x80, 0x88, 0x12, 0x71, 0x62, 0x76, 0x3D, 0xCB, 0x67 }
</pre>
}, // 287


=== Personalization removal KEY for SLSK (Proto) (Perconsole) (Slot 9) (JigKick) (Test Subject 2)  ===
{
<pre>
0x004203D0, 0x00020208,
E7A8ADF7B7E2BC26E3445084384FBCE1
{0x13, 0x23, 0x06, 0x66, 0x78, 0xDF, 0x65, 0x4F, 0xBC, 0xB7, 0xD6, 0x6F, 0x3A, 0x35, 0x78, 0xB6 }
</pre>
}, // 288


=== Personalization removal KEY for SLSK (Proto) (Perconsole) (Slot 9) (JigKick) (Test Subject 3)  ===
{
<pre>
0x008407A0, 0x00040410,
736F7501E9A15AB29800113686C946BA
{0xFB, 0x32, 0x09, 0xF8, 0x12, 0x0F, 0xCE, 0x4A, 0x4F, 0x34, 0xC6, 0x87, 0xBB, 0x35, 0xC0, 0x08 }
</pre>
}, // 289


{
0x01080F40, 0x00080820,
{0xCE, 0x9E, 0x65, 0x42, 0x72, 0x94, 0xB6, 0xC1, 0x07, 0x19, 0xBD, 0x11, 0xB2, 0x58, 0x71, 0x29 }
}, // 290


=== Personalization removal KEY for SLSK (Proto) (Perconsole) (Slot 9) (JigKick) (Test Subject 4)  ===
{
<pre>
0x02101E80, 0x00101040,
BEA39D6443FBACAB05DA62BB95470D57
{0x62, 0xD3, 0x02, 0x01, 0x80, 0xC6, 0x16, 0xC1, 0x1F, 0x0C, 0x7B, 0xAF, 0x9C, 0x9B, 0x63, 0x19 }
</pre>
}, // 291


=== Personalization removal IV for SLSK (Proto) (Perconsole) (Slot 9) (JigKick) ===
{
0x04203D00, 0x00202080,
{0xC3, 0xFA, 0x52, 0xE9, 0x73, 0x4D, 0xA4, 0xD9, 0xC6, 0xF8, 0xE3, 0x31, 0x62, 0x59, 0xC8, 0x77 }
}, // 292


<pre>
{
986D5EE1E7759F4F52DB43F33FA5960A
0x08407A00, 0x00404100,
</pre>
{0x29, 0x76, 0xFD, 0x87, 0x13, 0x4C, 0xC2, 0x35, 0xA8, 0x28, 0x42, 0xC9, 0xD6, 0x9B, 0xA5, 0x9B }
}, // 293


=== SLSK SHA256HMAC KEY (NonPerconsole) (Slot 0x20) ===
{
0x1080F400, 0x00808200,
{0x1C, 0xF7, 0xFE, 0x2C, 0x5D, 0xC0, 0x8B, 0x8B, 0xA8, 0x03, 0x5E, 0x7F, 0x66, 0x34, 0x4B, 0xE6 }
}, // 294


<pre>
{
2E1FC0BF211AEE3977C96F1089A150F5
0x2101E801, 0x01010400,
A3CB9E41314BC39F0CBEC16AF3B0B9AC
{0x4C, 0x9E, 0x98, 0x86, 0xDB, 0xE4, 0x5E, 0x52, 0x0F, 0x06, 0xF7, 0xED, 0xE5, 0xB2, 0xB9, 0x0A }
</pre>
}, // 295


* calculates header hmac (0:0x1C0) which is compared against signature at 0x1C0 size 0x100, verified with key 0 from bootrom rsa pairs
{
* calculates encrypted body hmac + 0x10 bytes (0x2B0:end_of_body_from_header) verified against hmac at 0x190 (encrypted with double AA key and custom iv from bootrom)
0x4203D003, 0x02020800,
{0xDF, 0x38, 0x9D, 0x57, 0xDF, 0xB9, 0x10, 0x93, 0x05, 0x6D, 0xAA, 0x1F, 0x06, 0x09, 0x89, 0x62 }
}, // 296


=== SLSK Header HMAC/CBC KEY/IV ===
{
0x8407A006, 0x04041000,
{0x40, 0x4E, 0x8E, 0xCF, 0x53, 0x65, 0x05, 0x83, 0x7A, 0x00, 0x90, 0xED, 0x6C, 0x6F, 0xE5, 0x28 }
}, // 297


* key
{
0x080F400D, 0x08082001,
{0x5E, 0xDC, 0xE3, 0x6B, 0x13, 0xE2, 0x54, 0xE1, 0xCD, 0x8C, 0xEF, 0xA1, 0xAC, 0x98, 0x40, 0x1A }
}, // 298


<pre>
{
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
0x04041400, 0x00000000,
</pre>
{0xCF, 0xAD, 0xCE, 0x41, 0xD1, 0x31, 0x82, 0x07, 0x5A, 0x61, 0x81, 0xCD, 0xDE, 0x3B, 0x19, 0x7A }
}, // 299


* iv
{
0x08082801, 0x00000000,
{0x0C, 0x37, 0x3A, 0xC4, 0xC8, 0xD5, 0x41, 0x45, 0xD3, 0xA0, 0x2B, 0xD3, 0x51, 0x66, 0x2A, 0x85 }
}, // 300


<pre>
{
EEB5EC5CCF1CF43113F5213AD5B8D6DA
0x10105002, 0x00000000,
</pre>
{0x77, 0x02, 0xFE, 0x14, 0x51, 0xA5, 0x20, 0x02, 0xC0, 0xF4, 0x59, 0x5A, 0xE9, 0xE6, 0x6B, 0xAF }
}, // 301


* decrypts what's at 0x190 size 0x20 of .enc file using aes 256 cbc
{
* result will be a hmac calculated with key 2E1FC0BF211AEE3977C96F1089A150F5A3CB9E41314BC39F0CBEC16AF3B0B9AC
0x2020A004, 0x00000000,
* said hmac will be from header size (usually 0x2B0) until header size plus body size (0x2B0 + ???) with body encrypted
{0x28, 0xAF, 0x2E, 0xA6, 0x32, 0x2A, 0xD3, 0x73, 0xCC, 0x66, 0x50, 0x08, 0x14, 0x47, 0x7F, 0x57 }
}, // 302


=== Factory Handshake Key ===
{
0x40414008, 0x00000000,
{0xBF, 0x68, 0xF5, 0x6C, 0xF0, 0xB6, 0xE1, 0xBF, 0xC0, 0xD1, 0xF7, 0xD1, 0x4A, 0x85, 0x87, 0x9B }
}, // 303


<pre>
{
F47716E6C5649FD648538FD9773D12D1
0x80828010, 0x00000000,
229E118737B1D782D6A80CDB72E4B9C3
{0xAB, 0xFF, 0x46, 0x79, 0xD6, 0xC0, 0xC0, 0x7E, 0x2A, 0x4B, 0x08, 0x77, 0xDD, 0x11, 0x15, 0x62 }
</pre>
}, // 304


* Shared with SYSCON
{
0x01050020, 0x00000001,
{0xD3, 0x76, 0xC6, 0xA9, 0x1B, 0xD7, 0x1D, 0x5D, 0xD1, 0x5E, 0xE0, 0x30, 0x41, 0xEB, 0xF7, 0xE7 }
}, // 305


=== SLSK IV (Confirmed) ===
{
0x020A0041, 0x00000002,
{0x43, 0x98, 0x2B, 0xBE, 0x83, 0xCB, 0x68, 0x93, 0xF6, 0x07, 0x76, 0x45, 0x4B, 0xE6, 0x1B, 0xA1 }
}, // 306


<pre>
{
AF5F2CB04AC1751ABF51CEF1C8096210
0x04140082, 0x00000004,
</pre>
{0x14, 0x4F, 0x25, 0xC9, 0xB2, 0x2D, 0xCC, 0x3A, 0xD5, 0xCF, 0xDF, 0x6E, 0xA8, 0xBC, 0x90, 0x5F }
}, // 307


* Used with AA 16x Battery key (AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA) to decrypt SLSK after depersonalization
{
0x08280104, 0x00000008,
{0xF4, 0x1E, 0x15, 0xEC, 0x4F, 0x4A, 0xC2, 0x4F, 0xD8, 0xAA, 0xD6, 0xC4, 0x4C, 0xAC, 0x61, 0x3C }
}, // 308


=== Bootrom RSA Key (Fallback for SLSK Validation, all fuses blown) (Proto) ===
{
0x10500208, 0x00000010,
{0x20, 0x35, 0x54, 0xFC, 0x12, 0xCC, 0xFC, 0x93, 0x8F, 0x5F, 0xDE, 0xC5, 0xF4, 0x76, 0x02, 0x29 }
}, // 309


<pre>
{
3BD3D7E98A17F359F19E3AF9802B95E9
0x20A00410, 0x00000020,
D6946CA8903136582EFC9C88F4F01E3D
{0x40, 0xCC, 0x88, 0x10, 0x85, 0xA6, 0x65, 0xD0, 0xBA, 0x30, 0xE5, 0xF1, 0xDE, 0x70, 0x9D, 0xF5 }
3101E2FA33541A231E4E45F05E8536C6
}, // 310
4D69B60EF4B3004D23AD72BF801B8695
EEA843BE585862A63D6B2BE7F90055A8
C690AECAD63B85EA118A79BBD510156F
53D3B7623811C18F0829364ABAFB1A6C
9D841F20A08831963C0D5B64FB360947
206C748AEFDB1715896BCA4D2980EE22
B0C3243FB73C3F2A0A868C587E57B77A
FEBE2B983046D6428C722319A598A5C6
0EFB9C4E9FDCF793DFA3CDEEC6C8A249
42652531706D6D701B0B0C660E79D241
9D38E1B8E976BD9FB4D4CD1E6F461E86
B295C6FA10D1C7927CB266C08B3025CC
76A4837EF0D8208BBA305059E23DDABC
</pre>


=== SLSK Verification RSA Keys ===
{
0x41400820, 0x00000040,
{0xBE, 0xBD, 0xD2, 0x78, 0xB1, 0x2F, 0xF3, 0x46, 0xEB, 0x9C, 0xEB, 0x81, 0xFA, 0xE2, 0x6F, 0x36 }
}, // 311


<pre>
{
CDAE7E886C890F5EC5FF3AB72EE09D4A
0x82801040, 0x00000080,
2369F5593A3BAD32256747103EB173E5
{0x51, 0x8A, 0xB3, 0x0F, 0xA4, 0xF2, 0x52, 0x96, 0xD6, 0x45, 0x93, 0x16, 0x51, 0x0D, 0xAE, 0x81 }
9E6EAD3ABD18C0474CF54A09A0500B94
}, // 312
CC20534F04CC8268507F0E3E109307F3
4B74885FEA456FBECEE2F04B87FDD1C5
4784CC79ECF76688CCBCDC18FB36ED20
0662C058D91619F3F50E404969A57CE9
1697F907B768094B5F0A683CD72962D6
84A12145CA84DBEE6F4B03D986A19C0E
7CFCBF0006AA492F071662707CF92604
A8B7E6BBFB3FDB66C4E049A4978A523B
D6E521346BA64BD8B050185730B4556E
1678BB9D7384EA0FCE3E509F1227B45F
FC5FBD39C42C628012C22DF47F5D4ADD
C8FF6F6DF11BC1604028141F21224B5F
D323C1F3B7B7DE6C1F1BFC8215C47AB1


2136E5DF66193889419EAE7D7B6AA49B
{
258D47EBB1C3C1A20737D9400FECCA43
0x05002081, 0x00000101,
567613B5BED61C9645110A4BEAD9D9DA
{0xC6, 0xDC, 0x51, 0x3F, 0x5B, 0x34, 0xFE, 0x61, 0xFF, 0xE1, 0xD4, 0x66, 0x2E, 0x65, 0x4E, 0x18 }
CECFED9E87A50422560490F243F53595
}, // 313
08C98FAB44E067FDF86A1F7ECACF9E38
A2ACA19C6740C22742CBB8E7364531CC
39127BB97B18C9E0A3C8AAA44DA6BCA8
59DACBF238B75732C5858C9D73F0415F
ADAEE2224E567670FA7911450495BCC1
C95B69AF831774557890C3DC9EC62BC2
830FC7639156D58A81C83557E080B970
17AF7FD4652BE8DCD1F7A2D622ABC4FC
C65BBA3E466742153CE3AB595C27CC35
BA4719C5D8CB4174229AFD52B0F496A8
8A178FC4FC85290A3C87776131516782
291E56C84D624079DDF2C30C05813BD4


2956BAF256B87660D15B82108D8D516F
{
EFA8C083CFBFD789D24DE45C4B577471
0x0A004102, 0x00000202,
CC135976422B66FCB8CDCFA8A1FE89C1
{0xD9, 0xC5, 0xBF, 0x31, 0x46, 0x0B, 0x48, 0x6F, 0x78, 0x41, 0xD0, 0xB2, 0x20, 0x99, 0xD6, 0xFE }
FBF425FD672BE4C1A7CF9076ABD5735A
}, // 314
EAC6DFB30E7800FC45AAC29A71E94766
5FF72C8A8E1971EC5A37A4D4255A5A79
C716A404C8CEAB584557B0C927A22C59
B1A530B7B355402229F648A3D53A0E36
DFF42C59E23892978EDC425DD9E3E62C
8940FEF195C87DD5F66BB6A343472139
8A9660B4F4171D6D8869F5E2E467FC4D
262F3A6F0634F0460586156C23C821D0
93C0ABD45AB174B303C1C09A6B3A03C0
4A077C770770EB25652F1CE6EDA6B0A8
CE3033B085EACF8AB3B387F940311DF4
B6DFAEC8A95AFA19EA2FF4F23A6A2FAF


43CE217A67DCA72211AB644072D251A4
{
9967A771F98CD1BA4631239EED253F77
0x14008205, 0x00000404,
56170514BB5DFBE8A4BB7C1ABE6DAD3E
{0x20, 0xFD, 0xD2, 0x29, 0x1B, 0xC8, 0xBB, 0x46, 0x36, 0xE3, 0x3E, 0x76, 0x5C, 0x43, 0xC0, 0xFE }
CBECB7DA2174B540CDFE6FF3349EB298
}, // 315
3A6F299237E79CD1270E57598C10B2E6
99C381DBDBFFEE1275A9FBBA81724C9D
CCC18897EDE7FA70F2EA715955DE48A2
B6D0542B736FBDCB51B85D684C5EAD89
1B224EB51D92BB26D5ED5B5EE7E0A837
4F2EE8728B73973CEFB39168D025686E
89A96361BD2279C9DDE0E4A448A572D4
707AB9DE3C7BB3FB67302518DE31CBC9
491BF12F76B681496257AD20BDB8C63A
E44595B82352CDCE00B9850B151BFA3E
81F7197593FDB5DDD562992C21E86A28
E0CE3CA59CB0C6315B06B3483873A3AE


493A79509144EF3042D01456727F3E0E
{
8B652C4B34343EEE9439B36D91FB9037
0x2801040B, 0x00000808,
4A4546A405BBFB192751708F54EF23B1
{0x27, 0x85, 0x29, 0xE7, 0xC3, 0x98, 0x70, 0x00, 0x50, 0xFA, 0xA3, 0xFB, 0x76, 0xDD, 0x85, 0x6D }
F19065F0BB0C306476BEAD56B4601B4A
}, // 316
EF947A87E3FE79BAE1AEEE0F695D9A54
E03A60F8A3CDDDAECD9965F193627611
254DD9F02129C51AAE4549B0887FFDE7
5B0790D9FD81D90AAAF1AA364C5A7FC8
B4A5ACD9D3C8F3A6184812745D2F9017
98EF62812907586D6029116379A1E0FF
ACA8C646FB0EA2433703327DEA866A9C
7C63D5D6656F71DD65D79E67969AB256
4F813AEA955E0105F3587B6A28EAD7E6
0A00FEF6DF38CF1735502684F4ED0A81
1BD5A1A076F2DB59280C683D714FC41B
4A5FFC5237E77176056F2843A4E4B8B4


DD9B97C1C59C84304950FB578266181A
{
49E208403BCFA664B705628C94A48223
0x50020816, 0x00001010,
7D7E67167D717474A052C03938D1791F
{0x80, 0x77, 0x75, 0x93, 0x89, 0x9D, 0x06, 0x85, 0x09, 0x8A, 0x72, 0xD0, 0x5F, 0x5D, 0x4A, 0x6A }
6ACED52A4F3F30E2ACE0226E45A5E296
}, // 317
D57D35D8CE3E1953C9290940EDE10CB7
3C9718F2D0D370EA887311D6A0187491
BDBC7301538897C7B76BAAFDE38CBD04
9E35957B0D09438A826E52E15F414A1C
B1CFE4ABC4BEB25133CF8FC15075768A
4FD106E44C7FBAD184E9105CC238CDB9
42B5167DE438425606C03B5C8481E6BC
0AF7F5E183A3B4A6935188968DF8A817
AE06B4CCB6BEE8F989FBD98FAEA40EF4
5F8E207CE3BEF80284CDB7B59075A63D
C59D6B826FB4E72C95206C2BB84D46B3
E60DE3D48EF1366144F3F5B22B599CEC


F7DC3137EC6E0A1F8EC018023AB259F8
{
C2D6B282CC5A9957B58AFD6E29206B90
0xA004102C, 0x00002020,
C565F9CC4EB14AA2DAA159A5EED38C85
{0xDF, 0xBA, 0x00, 0x2C, 0xC4, 0xB0, 0x5C, 0x5B, 0x24, 0xBB, 0x4A, 0xFB, 0x76, 0x94, 0xC0, 0x69 }
B01AEB1E4F4B3DEC8E0A9A4676515ACC
}, // 318
BD3FA08EDF85F278BD8EF51A7FBDDA96
5B88970DB139F4C9488B0D60ED6F555B
AEF77CFAAB76B4798AC34A02A95D3DAE
A700A9B28F55FCF47554DC10430F7A89
E44FD416C024FC830870710AF42528A1
E3F00BECEF50274A29C31C2E71302E25
077AB07427F09815D5B0D029A57AD69C
044BABF08F9D2764A5E15C25CE53E320
612FC68363A34A52F9A69A9D12F31D3D
C6D6D37C8B8407D9B7178F1EF19AE7C2
B1D5FB7618063AB016DE433800BDD696
6C574EC47FA34A66B0324D39D9F887EA


53229DFA87ADCDEE652C35A44952A00F
{
3E4D078C9007C43705477B234ED128E9
0x40082059, 0x00004041,
03EBA44D0CF85EC26B9057CC38E62778
{0xA3, 0xC4, 0x2C, 0x31, 0x95, 0x21, 0x5C, 0x0A, 0xFC, 0x69, 0xAA, 0x29, 0xEC, 0xED, 0x80, 0xCE }
395C9F5EDFAD71F2CBA30A40806F9225
}, // 319
180958F85FEF21D2419653E780EE74CF
82E6B0B1AF5D2C52ACDCA913FC37BEC7
54BA1BA337EE42F598DC462DB96EEE02
9060ACD6D27E9DD58DB1C36603FD057F
EFD6ECB9977F1EF5486ABA7338A4A1DF
FFD5BFC2796D4469374C61495D62A781
BA97EC2739EA5FDCAC538CE891D900EA
40FC0EDABD7D08000B37419E114766F4
012555D2B097CE780A8B51960F88100E
5AE90798F0076D00959E17FD7416BB0C
002882A1576D8B20A7859E559B4ECE54
1444E86206C77F6FFA43BF7C756B62BA


E1BF0650D31FE12C9DA5024CD4645A0A
{
E96DB6ADDEF787ABA872F3037335249D
0x801040B2, 0x00008082,
06FC3B6D03D9B9D5DCFE418F2A37896F
{0x3A, 0xBE, 0x5F, 0x0F, 0x7B, 0xF5, 0x34, 0xB4, 0x7A, 0xC3, 0x5D, 0x70, 0xB6, 0x69, 0xB5, 0x0D }
B9D758A1549335F5099423EEF0F46B15
}, // 320
FB3ADC695A3FC1900665C38C0B4CA12C
725149BF289C50EDDA751AE030A1006B
37C0A4BD8EE780FA9D3E1A97E649A3F8
E8345CA24842D5D1176DB24D98B2FA02
7CF4C898E6E72184B25583E66FC90DD7
85B995D1B6BCCE04D783616808F45810
D3A8B978884A0B22FEE09E2D7318EA02
EA9709589068BBE7A1A3D54D486221AE
7B618AE592FE76494B4434A736FCB10D
3DAB19B0A034235183CAB308334227B7
422D4EA100EB81B34DD698A139FED839
BBDDAF0D06FBCD608A350399C2B5BFE7


410DCBC7D20513E7DE81D2C3B2F6B3CB
{
7473FF0D9DA8F8AD3E807A8C48FCC319
0x00208165, 0x00010105,
4BCAC94497C344844636B35F3922CB80
{0x0F, 0xAC, 0xF3, 0xEC, 0x9E, 0x7D, 0x22, 0xC1, 0xE4, 0x42, 0x02, 0x42, 0x8C, 0x44, 0xC6, 0xA5 }
0F6DD1D7D25929693E94A1C2462B248A
}, // 321
60C2CD1220C8798E45DCE81953FADED3
18F136A550010B9E5AFD4E5B952A2E77
F22026188733C3A1FD128AF89820BA73
A56A23AF49E04F4DED4F78F69196AA88
042335A49C2582068E69A851E1ADF72B
8ACCF7EF2821B7AD776B1C50B4FFC792
B6172CD7188AA31298C42182C634D3D3
AC32A3FFA2C324897645D3EA053D1F8D
68F79CADA1A7802FA16FE7D399475731
CCA4977A9364BB312994F850095BE052
EC0A534029E63CCEA7CD9E43CACEF0B4
AE2429AA9912B7BAE7DCDF00BA9D4ADA


6130CB7658FC6EC566D622B55C4F6BEE
{
FD4BA5CAF2A4BB5F2E79820B5427CE60
0x004102CB, 0x0002020A,
1D7E92B80D1566ABED917B412F49A3D8
{0x31, 0x68, 0xFD, 0x60, 0x0D, 0x93, 0x34, 0x23, 0xC8, 0xDE, 0xBD, 0xD4, 0xD9, 0x47, 0x0B, 0x05 }
D5129A34B9861C1AEC99906847BAAE94
}, // 322
F790DACD9F0EFFAB81EEC5687D05003C
B748F279727AFE1E4A1FFC07318523B8
E6EBA0EBFF95626E466E6BE41EB7EC09
1A6263C04A92E1924E4D949B305B6F91
EC0FD294876D6548582AE12FF8A39FA0
FCC11B7E7F7AFB3D1DB33A15B1ACBDA5
BE8AE8F76EDA16B3482320B30E752392
F2C465C4A07792340B96072EFBB82B92
05F683AA1AEB69C0980409B1A2120518
63F0DC654CF95AA1A219D09204F4706F
A9D55BC79CBFB26FDC0130155A34B726
E6F168458EE622F725E75C2FB0ABCACA


05F244401B5862D742F3732AAB702DA9
{
AADCB86AFE3E59B1D670670043738940
0x00820597, 0x00040414,
283609746209898A3D70738A56C7E748
{0x36, 0xEC, 0x18, 0xC0, 0x70, 0xB7, 0x37, 0x78, 0xBA, 0xFF, 0x72, 0xD3, 0x26, 0x74, 0xCB, 0xD2 }
B2471143D84B0A88BD9629198CFCD5E7
}, // 323
D01AD41CEB9A08E081D8F72459C70411
249053AE392DBC284E1F49098A6A06F9
E1D8670B25864B2BF37CD5CFA2B32449
8B42F2DD41ABF081DFBA07061BE4B964
794313997F0D6E0F6BCE5509F87CD4E8
3162B15938BCF989F5F7384559D600C9
EE6C7E2D9ACA36FA3E6EF6C91D98C07A
9E79EE6955E8035CB49FC65EC35F2CF2
12BBABC6C6525A4FDFECC997F1D5E553
536A6FE5338182B4B001ACD49DCB677F
44E7112112EF26B7EAB62B44F91A5B0B
AD28B164530DC3A4FF17DBB976241EC3


FBD84775010D95618284570663BA7DDE
{
36DE981C7641FD35D356B01A1B39ED9A
0x01040B2F, 0x00080828,
2A6450F61A0F2023CBA098A43DCAC879
{0xC4, 0x6D, 0x13, 0x12, 0xE9, 0x46, 0xCB, 0x3D, 0x33, 0xD3, 0xB2, 0x62, 0x59, 0xC3, 0x58, 0x6E }
186AADFDC4BBE687CA8D78D9D62E96C9
}, // 324
3BFA87A8064988C49582AC1FC530330C
716526F440A79E2AFC0EB58F9A123B7D
342A48E5FEA7BEBCD4FFC8CEDF6122FE
3939080A5B8CE8F03869F6447FE1B33A
49B991924DBF8343F3DC72457BAE8CE5
0D291664475A1E6B564A09BE0A7FA279
4C27EBF2580D687E6116F84F1A347DCD
346B1AE3B48ADEC0860C36884653A5A3
9744C2229A85BB72973CB431647C7EB5
0DDD528C09C3C2097D7CD7A6FA28DD6E
8D9D3841CDDD90A413291C73F88523CA
C53618E0483E09BA88CA53FD6DE785CA


496905C2DEB8B75852F2C9FB948F5C15
{
C072C8571E5BC3163FC3FCBDF92E5B5D
0x0208165F, 0x00101050,
BA30D220C185502D7E9E0A83B2AEA098
{0x7F, 0x35, 0x72, 0x6D, 0xDA, 0xAE, 0x67, 0xD8, 0xF1, 0x4A, 0x3C, 0xC0, 0xE6, 0xFA, 0xDC, 0x45 }
E1F9507DEF5FD0F129076B3F7E745B44
}, // 325
0A2F56C8DE9591C3BC16F777B0826566
50FA1E85B1D244C0F691E893D7E0D2C3
A15AC56D069ECB0E31897EFB918FDF93
B5FA1ED6DFC7421E5439DA867ABADDEB
B785A6F95CD23B4CA8255C89EF4E8D9A
497FCA1C013B04BC9BEC00B265EBEDC4
FF58E990BEB594C738CA6A601796E0EE
79B1339FF36E0A49AA4984419DB4B233
F761AFA5EE61172DADC669ADA72390B4
7FB83172A975DFD0E4CD04FCA627A5BC
D1B249094673CA74ADF0E6F07BC5706F
9904E7C40C7EA59012BBEF30AAC35DC2


B101B337AE29FA754FD10AF5FFF77B3D
{
F77BB7A317F74801BE38B238CE98020B
0x04102CBE, 0x002020A0,
CA4C9268F837A03E83389EF7BDD9C7A0
{0xF7, 0xA5, 0xAA, 0x3B, 0x6E, 0xA0, 0x68, 0x52, 0x4B, 0xC5, 0xD6, 0xAC, 0x65, 0x32, 0x1B, 0x74 }
2FE93FF70808240BB634458B01973CD5
}, // 326
A0ED95619AA09C4933CA01411B9B26CF
FC633E2880CCD5A3776883CFE329FCD5
6912325EDEF3A61BB4FA5992C7A4CD13
230C1E65E99C1C71F7DDC5486FDEFCD5
632C384C40AE12676C66EBF25B859EDD
3061F8388070A99479A68E5EBC794BC8
7B3D16D8B4969F78A86D06DCE61B1DCC
B07720B84D8972AA2B861B2EB586837C
4422481883B297364C1C763396F94AF3
432B2FC57370311AC1B2857C517EC51E
5D45A31DEF78DC28422539D7A5EAC579
B0EBA8334D836668FA4F3A6FE25DBBAF


55157A5C49708D923589694220173DE9
{
A3CE2F96E33963EA87E2067FFC3807DA
0x0820597C, 0x00404140,
AFF11869DFCB2DC208313B7ACCB393D1
{0xC8, 0xCF, 0x53, 0x9F, 0x12, 0x8E, 0xA0, 0xDB, 0x57, 0x15, 0x3F, 0xD8, 0xC3, 0x07, 0xBD, 0x80 }
44E7D5D50FFFEF11C3DEDC877B028FA4
}, // 327
C4705E723702E28DC84C7E355C120375
3F7DEFC9E38CBD790D4C6C326A9F48E0
8CA66BB18D1AA342B7E62049C63ED76F
07ACEAE7BBDB5076BAA54F2D84E31775
97C02E539A4BC00BFCA54437463EF830
B1AC92BC339A9376F60792D61933C607
8CBD70E0752CC2099F183F6F4C8C7D5C
1DF02E626AD0FD595209EC9235ED63DD
D483EC895F5784D2FE640ABE4BBA2ADF
115EEA30F3C1B405F4A513A581C6333B
9844698FBEC9AD01A2619BFF716703D5
6A69B8EE459A06FD9A61EA1ECDF0E993


80D3AF14FBFE8E70BE3DB07595214A90
{
8712B756322A8667DA589F370C3867A6
0x1040B2F8, 0x00808280,
1DF895CD14E53DB0E6479C975C13FFBA
{0x33, 0xAB, 0xBF, 0xA0, 0xAA, 0xD8, 0x67, 0xBD, 0xEE, 0x4F, 0xC4, 0xF2, 0xC6, 0xA3, 0x89, 0x0A }
0C27C40B84168FFFD63CE001D334A4FD
}, // 328
D3FC72DD9963AE825F7FD9C5EA1D9924
1DB1261DD0E31CD94D8F2657D8EC3D93
F2F08E3D7DF6FE07ED9FBE87FCEC75EF
7E5FA243F5BA24C1B81E121FA07DB901
6A5F33FCE5F23BB89E108BC27718F5EA
A09CF686DC15FFDEC0129928680ABE5A
336FF78FA69C57741899EF7A238DE1AB
CD39BD6B23B888A34D7DCDD3F57CD8A5
5D2735973E74F3C416FA1B019515B5B2
CC45367F1E769010A96ACF79B78BB8BF
7BE678AEEBA54214F5DBC3B0ED3FEF22
793C9B3564F9B3B134DC87662C0014A0


5BD5F12ABD2413C8E8AC5D8CFC71EF07
{
E0276B083E3A2729EEA5B068F1F85331
0x208165F0, 0x01010500,
986420BC576CD005228A4396AF000F4F
{0x3B, 0x74, 0xFE, 0x8F, 0x5C, 0xA0, 0x20, 0xFC, 0x5C, 0x9F, 0xE6, 0xFA, 0x0C, 0xA3, 0x2C, 0xA2 }
95EA10E442844D84EAAD40C95796F705
}, // 329
7A5BA3F08ED905E179416E05BABE6D43
216D5E5F8B346CEF01DD266F5DD2ADF8
F6FB17FB08515B0B752B6A53E09EA007
FAC79327B53E568FCEF00E2E85D54C1B
6BECD2639F5527F7A6F32A689013A091
1F1E011227AB565C4D5ADBF9FF02F15A
00429863BA5634B4285CA2F2B5109AF1
A83314D1F3EDA27D8CE9EE568B13A575
94630701EA5BC9518339C697341EBCAB
6F21B615EC1A93FD141B3190DCB6346C
35E7E9C15F468104EEE83771A2FA096C
27E1077F176A6A2B72927126301A91E0


8F9D7AB79E79587837981413153A4531
{
4517E300F97086529D73DD9F2A3AA946
0x4102CBE1, 0x02020A00,
29D644DFA9A730C42F3D5865E436FCE6
{0x08, 0xCD, 0x28, 0x45, 0xCC, 0x3C, 0x8C, 0x4D, 0x19, 0x6C, 0xAA, 0xE6, 0x0B, 0x33, 0x9A, 0x86 }
9A98344EAE3A3B9675CE9DA9F5877820
}, // 330
78876C7583D4859CE27BC6A0181F070E
C12FAEC7943177837A618070D2EBE603
4058F525D70BA7690AA615D2D83B882C
38C70FF2175FD11D89375104E5D59268
114910602E78EEC49DFDB30ED2D32E45
F39D530F76B5194DEEDAC6AE5BE64473
B287A1D2B3BD78EA498249A4A3F6E944
4FB4A1E306969B4E61704C39D78DFACE
985116F83F1B2CB1119798740C059FC5
EB77A8C232EC13A8C004FBE259DDD369
C3B53CF8E86F2A47B01107C63261EF73
558EA2F03CE2A2E2FB7F4E8141D98206


834A3D317CF16E6756DABBE968F733BE
{
A5C954A2CFE5D3D276E0CBC7A225B4E7
0x820597C2, 0x04041400,
D7877384AD02EA56F09E5C82DF5C236B
{0x86, 0x9C, 0xDE, 0x3D, 0x62, 0x3C, 0x0D, 0xB7, 0x64, 0x6C, 0x29, 0x37, 0x84, 0x5A, 0xBB, 0xF3 }
A054420A95F0FA959108032DEB1B7811
}, // 331
037BB91AB52F151D1F760EC949F4C7A1
26451A5707F7C5E9F1723D2C8F892A36
C5A0DD4B5750F5DA8A26E3F4F7B2F107
68E00410C84E69039A833153D8DA687A
061C6DE184F761BC8771C6909C791AF8
D8D9927048D03600BE531BE3D7D5C51C
D493B5640F4A7AACDB934797BEEDA10D
102DD5329D44BEDA56570752A7BC2A9F
6F4B5ACA17641CA3ADD546F59A9FBE0B
DE984D1F6A88CA2764676CE785380B41
71D70E9D083C81D567366B3D951779FC
2C12AEB2A865483145754B79EBA173C8


8DE96A5B2F557055A9CB4B4A299E86EF
{
0EF6769415F8CB3A83D514CC3F70008A
0x040B2F84, 0x08082801,
1E090FEB4614201D25B54202A8CB3811
{0x64, 0xE3, 0x94, 0x79, 0x74, 0x50, 0x69, 0x92, 0x2B, 0xF4, 0x18, 0x9A, 0xB1, 0x6F, 0xD9, 0x18 }
D49DBDAFC4ACE6D63B6E13E67CC9730B
}, // 332
CAE4A283424BBC14EFD89E72E6513902
AACB955CB3CCDF4A47B3948A4B0201E7
6BE4F58725AD38C481E67D4060C2D31C
DBC87DBC491114E6A87C45B3EA37A227
0C5C941CEE02E8C1BCC29256DD86D0B0
160724EAF49B4363F8F65229B5202D69
F1DC00952693B75A8883AE8FF5A6B4B9
F85367D5EC06AD8AA0C765EC09590543
3DA8897BC46CEC5193C81E39EE0A574B
CA73FD099805B48477B3887305EDAF9D
E19B36E6DE66691CD0A8EF19ECB45BA2
898E6D9D4A0C6E678E3BEBAAF44E67BE


431AF443ACA1049CAF3455F4288D6A4C
{
C69307F7BD986F1239F846CAD5EB1CAF
0x0C008209, 0x00000404,
B5F9906E558F087984DDA69DBB43AA7B
{0xF2, 0xB1, 0x87, 0xBD, 0x3B, 0xFF, 0x33, 0x27, 0x42, 0xD5, 0x73, 0xF4, 0xD7, 0x41, 0x43, 0x70 }
E8FF00FAD2D02DF4CEE88BF423F51BDA
}, // 333
1F1B3944D5A17E74B7EBDEC3ED8A7078
3EDC9BCBDB76BBFAFB546CF882FE1107
9778F5ADE0126F3B357ABD48D6B6EF2C
A0E303D3159E69178C2CAB41F841DE56
609EC551F154811896907D2B8691D8B8
360BD8E3062B0A46DF7778BEBA6484E3
0701B80610D59E2253AB10DB8D896426
DD111DBA5F1E31B7761C6A963056C59E
70F74A7CA32DA4CB46518AF2192D0416
E9B93644B03073270DE6BA75816DBB51
F8769CF01ABDC46336466C9261597E70
106344EBD0735178E70B83CD4A187EA6


283D76AB50F838B41DD94D94D8FF1AFF
{
23E42CC58BEE0A56ABA29A3151528C3E
0x18010413, 0x00000808,
B0281F507A97C79EFA14DF4BC64F3F59
{0x99, 0xC8, 0x14, 0x46, 0xBD, 0x8E, 0x62, 0xFE, 0xCB, 0x89, 0x71, 0xEE, 0x8A, 0xF4, 0xC4, 0x24 }
64EE0076934AFF3375D9E4F04DAE5E14
}, // 334
DF27D3F0054F40201CBBC6BCB75A9655
0A5EAAC417FB605A0014B9205325753C
556328F1F096E5D50D83EB3CB335C453
E0F3B0BBF3B75277B915B7F5E9878DE3
847DF7AB55C11A75FD5353FD1B38930A
6B27956CCC9505AF49E3B005711FA514
6A4ECB0F506CBADA661D466298EE1433
7C27680232FD5510D538160AD27CB490
1AEDDE48DDD6185FD743B69D9F0454E4
DF723F416684FBFFC73BB09E4588A68B
E8EEA00603D07E4E37E2FA8E61CA97D6
4C3019AD267187CEFB132734825B7640


BDC147A43A1092A482EC5CCCB6890401
{
22F9F538433C2EFD9F4D13D5A612ECFF
0x30020826, 0x00001010,
5C7A7CFF2E6DAD153A63D0C88E39FBAE
{0x30, 0xA1, 0x14, 0xCB, 0x69, 0x32, 0x44, 0x20, 0x2B, 0x91, 0xEB, 0x32, 0xF6, 0xC1, 0x03, 0x99 }
7ADBF37C540BE6F1F4240566475EC978
}, // 335
1ACA6B4A5FB7AF017A4C5CDFD1503699
4F7E4D677B124C602FBD08D952FA7B47
3CA989237AB17D48090D9CD1C7CA37DA
737D596487BAC92E6FFC18F1242F873B
BED97C92DFF41DC45F73EEFCEAB3EC68
00321E1FA4B9DE8840B29AD648C8438F
EC18D74088D6E075BB1295869DF5FDA9
3A89BF187D4CB310EB9B3D3D0666294D
D234D4D96ABB1421A94321647E49E418
5295854F89D61886F905304150D418BB
4C80C7C775F12FD51C3F3721237B473D
C82F1176221546C6BCC22383CFE63DD8


8497D52C2C329F399841CAD263BB4D7F
{
640C8B583FC15400FD3CE28EB6F52EC6
0x6004104D, 0x00002020,
1E094DD0479201E59FFDAC0B7193DC11
{0x26, 0xCB, 0x01, 0xFB, 0x5E, 0xFC, 0x23, 0xD0, 0xCF, 0xD5, 0x3C, 0x75, 0x7C, 0xB7, 0x0E, 0x55 }
6E98A9C9ABBB729209F5600FCC901990
}, // 336
804B691CE39E3CE01F8F0B2238F73C2F
68747C6E590C30675F15AD230AFFDFB3
07AD55B0F6D241AD6C3FCC6903A6B25D
64DCE7F683D23317C3BB8F27D93EC42F
F947AD4115BAFB3DC4C57051F6AD787D
341C716395E8432352776003E375E6AA
E07E2174B75D26C83BC0D96F8E350C4F
F7BAE27584BB6D64BF46AF0C94A6CD56
2A63807907B0F4F1C90888DB4F5A8E3D
FFB073F8D7605157FE08916B3390004A
0250F18BC7F05306DFC231E627F010B4
E2417DB0C6A3EE785D13F2BD48F1716A


3D621C703958DC2B8ACF42D385F64927
{
1D56AA6077AF74F68E16B54028038A40
0xC008209B, 0x00004040,
588E93C26CF3D71386338A4E14132CDA
{0x2B, 0xF2, 0x87, 0xFE, 0xF0, 0x82, 0xD8, 0x99, 0x7D, 0xD6, 0x55, 0xBE, 0x26, 0xD0, 0x95, 0x05 }
4E97A73BC3D01CC3A41909570F24BE41
}, // 337
7663161A5166D2BDBEEA969EA7FF5A5E
12B8E7B4AD60E1671A3FFD6105593349
F323EF2610BB4854251B3BAC0B5A1B3E
91C1426D9A89AEBDC87F39822F6B331F
0793894273CBC60A07F4CB45B5D7B040
058DED872952E779BB800F81A57A3995
E319252EA178D2F82ED01656E4BAD172
2802FE57C656A6F8BD01AD104ADBAF54
E5238F1ADD7AA48968F26F71F187A245
14E8C60112A803A4241F9E57E1F7AF6A
D18DB03F4A0DCBB7A736EE3CE3876E2A
46053A2A12B3088377CC5FE2392938EF


8CB2497089F9F56EF18A21A2B16579E8
{
813C055D93BB8DF483C6786DE063E8F4
0x80104136, 0x00008081,
116C1CBBE2BCC48292999FF2ADD6507B
{0x31, 0x52, 0xE2, 0x82, 0x66, 0x66, 0x9D, 0x14, 0x30, 0xDD, 0xD2, 0x59, 0xF8, 0x84, 0xBB, 0xA1 }
6002E61EE9AB734B89B89EB26377A67E
}, // 338
F18A3E1AAAEDABAA126E07E59C696503
8D3EB0F6FA3FB302E125E34FBFEF01E3
D6F599DA74515C72CD33DCD6444A4E9C
FEA0F8DE75C7FCA523B4DC6695C30F4D
711E50C91441BEEDFA92F4BB93014A77
6ED4CD9A0AD9EE1FE3DB222BB93F6D5F
C35F0BFD48380C556778935DF1705E55
15E00783F98814E911842AE9FD45B122
A094EB80910643477FD5CFC60C62F2A4
10030732E31894420E473CFAA43EBA8B
43596E6B06E6CD67BAD69D2943A67D44
9C9FEFE25732D09B7B993EA16372B71B


EC06D570BEEC94C4CEE301A77504AD00
{
E7C9F8E2FEDB7DB4F2404EC4605958D0
0x0020826D, 0x00010103,
5C799199EFBC7E483A85B7A774651B7B
{0xB3, 0x12, 0x1C, 0xB2, 0xBE, 0x4C, 0x7B, 0xC7, 0x25, 0x3A, 0xBC, 0xEB, 0x20, 0x17, 0xF5, 0x93 }
EC1107F3C35E5F9623CC1479FA2FCAB2
}, // 339
606C323790EC44B77748216E8E259973
62CD59F7DB176E40B012C6C252121237
451DAB82BCF376741B1F6D0530C58E30
F97CBFAF81C1D30B3D4476B82FAEC5AF
8C79E83EFD53E7C40777D0FE4A2584C0
EEDA30D2E95EFF0D5E74B2D4A7A7FB9F
B16DCD1FFA3D7A090E4040D74C2D7789
D2C2351634F11395BE1A2E3888048B5D
3E97F9CA56CEF2970EF4D5B047A8BAE8
FFC67DFE1218C0FA1113C26CF15F7274
E5273ED1901FF8A9681B531A66575BDD
1C6C8E6BF1FA894B3C67E490AD0478EC


795EB5161BAA2FF99377ACC74BA7F7EF
{
79E41D03E8B899E7B0DC3486F33220FD
0x004104DB, 0x00020206,
0D008B128F46648DD0311BF3798143C6
{0xC5, 0xA7, 0x96, 0x60, 0x90, 0x3D, 0x2A, 0x62, 0x03, 0x40, 0xDD, 0x73, 0xC0, 0x66, 0x88, 0x8F }
1F51C08D4A5A942821CE4EF84988B411
}, // 340
2739D8E6E7186D34084D126B6A4F459F
BD09B5DD34EF00FBB611EB2D312191DB
F4ABF13038833D5DA7327CD9290FFBCE
6CA3F689882D225AE7C40957E9BAD7E2
0E2A4C20664A235F28386EBFF817D077
5FAD3151B8E39F3A8CA89A4178FC6520
F90E31956A64CEEF68285A391DBD96CD
1E0FAEE2D027636E50804BC47D23B90A
184193FD28E2EF1CE6F782146E595DB4
798FDFB8E03625709E9998A0D8EBFE32
6A9204919336D4DF3273CFD6A5B58CAC
5C2542CC4B4D89757F010254DB01009B


677DEFF2D7391FBB6DA67485CB88D76C
{
FABBA7656625D0373C761E294082653E
0x008209B7, 0x0004040C,
91689D9D9B271EF47170214BCA129392
{0xFF, 0x35, 0x15, 0x90, 0xF1, 0x7E, 0xA1, 0x8D, 0x5A, 0x1E, 0xF9, 0xBA, 0x4D, 0xD1, 0xB8, 0xFF }
B5DB30D1F4B77B1375A45A1BDC2A3A55
}, // 341
2559BD1455D42F1F13CCCF7C2500EFE3
2D963059504F0D69FF6BD30CD6A95C1C
077C149C3A40062A49367B4033B2C80E
36A64DE9AA5E01F5A37016D777396A85
04B7B3666CCAF1DC911F90C869B199EC
149BCCED50B19EB32654457712996458
34418D27DE5915D074D6E3732A65918C
4C1018AA486109C8B1A3335850FEF450
BBA43308D81208C27309549590A3FD02
33E686EF6C1299096D3F8A872196EC36
0107F6ECFB56299AB71116E775D04742
A12D9C23F00051AF37252C85D60DD347


606001E3846F3621E8E66CF444D2E20C
{
01ED73AD810421D290D824F9F08EE9A2
0x0104136E, 0x00080818,
3DDB41E084520E6073AE5F84926A000C
{0xFC, 0x32, 0xEA, 0x8D, 0x80, 0xDB, 0x8B, 0xDD, 0xA1, 0x61, 0xDF, 0x49, 0x66, 0x6A, 0xB9, 0x1E }
B53B5B63E1A888F46556D1D916577084
}, // 342
9ADF52F1926B6C545CA959CE9800BFE8
6BFABF64AB5C04F3D41540303489B4FE
CD978EDC1DB6DC5C1DA17BFF3AA8FED5
407D7336D8027087C553B1E3C15491A1
F83FC2615EF7F647DDB9E666DB49EFFD
CBB08B1DC32773C6F52558C24F467341
04B0B70938D13314924D5E20FAFA62D7
85875F49ED6F1B39C7C1C7CB859856EB
69213CB98BF7665F999FB87CBF7BF87F
7D7006A2F42DF2B0A8DD7576F895A650
79BBD313309FAAEEA24C3A8D3BEC8ABA
81C3B008BA13765FFC0EEB39D0AFE2CC


71A56CE5AF79188CF70A048E41691F2D
{
90DE0ABCC6B9CCA235C5C105EC77CD32
0x020826DD, 0x00101030,
915DA02507F7CF4286C375B2E5EADD0E
{0xBF, 0xDC, 0x19, 0x77, 0x0C, 0x48, 0xC9, 0xCF, 0xDF, 0x58, 0xF5, 0x2C, 0xA2, 0xCD, 0x52, 0x18 }
C01D272D6236D9FCD147F2A84651242F
}, // 343
68333929DA8542489F9EA852F160D9D8
0D25112F5330F54AE188F9F69823E81E
C8D96C49FBAE295252047BB6BFE5D175
502181DA177BFD8792E4E2205C2D689C
511B792980A78E5F9C12461FC498EF1A
B105A1A8133FFAA93B28B4BAC6604C84
196F5DE217D71579B9B58FA214FF52EA
798B258258CBBC4CAA95C6189757ECED
AC373D038B695AF368EE1294655A6F98
C30D291017300033BB5EB4E4703F2337
967D0F21ECD5A0FE1DC6782034B7AC34
8A0FEAADBC6AA28CB828EF5EC4CFE49C
</pre>


* Only first key is used
{
0x04104DBB, 0x00202060,
{0xD6, 0xC1, 0xB8, 0x59, 0xED, 0x01, 0x3C, 0x86, 0x1C, 0x55, 0xFF, 0x4F, 0xFE, 0x45, 0xD8, 0xEF }
}, // 344


=== Keyseed 0 (Proto) ===
{
0x08209B76, 0x004040C0,
{0xB6, 0x8B, 0xDB, 0xE5, 0x39, 0xBD, 0x01, 0xD7, 0xEB, 0x1C, 0x23, 0x9F, 0xEB, 0xC8, 0xC8, 0x9F }
}, // 345


<pre>
{
1EB25643234EF6EF380F9E57A216FA22
0x104136ED, 0x00808180,
D835FF0508BEBBE97676FA478C29C21D
{0xB2, 0x3E, 0x92, 0x76, 0x21, 0x5E, 0x70, 0x91, 0x85, 0x7F, 0xEA, 0x03, 0xF7, 0xF3, 0x3D, 0x2F }
</pre>
}, // 346


* Encrypt AES256ECB into Slot 8 using slot 0x206
{
* Obtain PCK Layer Removal SLSK From NAND Key (128 Bit)
0x20826DDA, 0x01010300,
{0xF2, 0xB2, 0x16, 0x08, 0x3F, 0x11, 0x09, 0xED, 0x75, 0x0F, 0x09, 0x9F, 0xC4, 0xF9, 0x1B, 0x4F }
}, // 347


=== Keyseed 1 (Proto) ===
{
0x4104DBB4, 0x02020600,
{0x56, 0xB5, 0x29, 0x02, 0x1B, 0x85, 0x4C, 0xCA, 0x8E, 0x18, 0x1F, 0xC9, 0xBC, 0x88, 0x9E, 0xAA }
}, // 348


<pre>
{
50976238EED23234F9C746CCB07D6D71
0x8209B769, 0x04040C00,
3F5BA67BC8C097DAE52D8512084683E7
{0x97, 0x37, 0xED, 0xC5, 0xDD, 0x0A, 0x76, 0xE3, 0x22, 0x0C, 0x15, 0x68, 0xB3, 0xC2, 0xEF, 0x85 }
</pre>
}, // 349


* Encrypt AES256ECB into Slot 9 using slot 0x207
{
* Obtain SLSK ENP DePersonalization Key (JigKick Only) (128bit)
0x04136ED3, 0x08081801,
{0xAB, 0xC2, 0x58, 0x1E, 0x6E, 0xDC, 0x47, 0x99, 0x60, 0x5C, 0x80, 0x25, 0x9F, 0x99, 0x17, 0xC0 }
}, // 350


=== Keyseed 2 (Proto) ===
{
0x41000820, 0x00000040,
{0x03, 0x59, 0x54, 0x5A, 0x35, 0xD8, 0x4B, 0xF2, 0x28, 0xEF, 0x50, 0x30, 0x80, 0x3B, 0x32, 0x49 }
}, // 351


<pre>
{
4A41DEDEFFBAC04F52602D0034DAD666
0x82001041, 0x00000080,
164E3CF1FC23BE4F4D0F8471A7E60563
{0x51, 0x52, 0x43, 0xC5, 0xB5, 0x66, 0xDB, 0x34, 0x79, 0x1A, 0xAF, 0x12, 0x67, 0x59, 0x26, 0xDA }
</pre>
}, // 352


* Encrypt AES256ECB into Slot 0x20 with key 0x344
{
* Obtain SLSK HMAC-SHA256 Key
0x04002083, 0x00000101,
{0xA2, 0xE5, 0x23, 0x12, 0x40, 0xD6, 0xEC, 0xE0, 0x9E, 0x75, 0x0A, 0xA6, 0x43, 0xE0, 0x6E, 0xC8 }
}, // 353


=== SLSK KEY IVs ===
{
0x08004107, 0x00000202,
{0xBE, 0x10, 0x51, 0x72, 0x9B, 0xC9, 0xE1, 0x27, 0x61, 0x0B, 0x3A, 0xAA, 0x82, 0x30, 0xC0, 0x2B }
}, // 354


<pre>
{
B07FEB18E422167AECDB60A8EE0CA427 Index 0
0x1000820E, 0x00000404,
69425551E9AE3945F36873F110FDA6FB Index 1
{0xC5, 0x25, 0xFC, 0x93, 0x56, 0x95, 0x71, 0x85, 0x4F, 0x3D, 0x67, 0x4B, 0x67, 0xD4, 0x22, 0x08 }
1C48B1C8A599CD59C7AECF8E469830BE Index 2
}, // 355
7C598FB45BCF00A9F49E5AFAD3554754 Index 3
98E3F508D16EF78C8FAE96F4168F20A6 Index 4
766410AE5109F2201DDAE41FB07F6EF6 Index 5
</pre>


=== Auxiliary IVs ===
{
0x2001041C, 0x00000808,
{0x6B, 0x9E, 0x52, 0xE3, 0xB5, 0x06, 0x34, 0x37, 0x3C, 0xD5, 0xB4, 0x31, 0x0A, 0xCA, 0xC3, 0x43 }
}, // 356


<pre>
{
0962939DC5BE560F52F6BB45B34CE097
0x40020839, 0x00001010,
D46CF82FC8BA5D5B6436F9F7E4E20434
{0x77, 0x5B, 0x9E, 0x62, 0xD1, 0x40, 0xB8, 0xD0, 0x34, 0x6D, 0xED, 0x95, 0xA0, 0xAA, 0x67, 0xC9 }
EA574C6CB6B11505D5DA35446D187808
}, // 357
8F62AAEDBD4E025BE6E8FF8E7D654704
C898610BF8E6CCC12C9BA48414CC2BCF
</pre>


* Used with other possible keys besides AA key (5 possibilities)
{
* Never seen used
0x80041072, 0x00002020,
{0x36, 0xC5, 0x98, 0x94, 0x29, 0xC8, 0x9B, 0x01, 0x3A, 0x6F, 0x85, 0xD5, 0x88, 0x63, 0x22, 0xC1 }
}, // 358


== Second Loader ==
{
0x000820E5, 0x00004041,
{0x19, 0x11, 0x85, 0xCC, 0xC6, 0xAA, 0x4D, 0x66, 0x1D, 0x36, 0x31, 0x2C, 0x04, 0x04, 0x0C, 0x12 }
}, // 359


=== FallBack IDPS and PSID (CEM/DEM) ===
{
0x001041CB, 0x00008082,
{0x2F, 0xF4, 0x68, 0x6B, 0x45, 0x3F, 0x80, 0x10, 0x87, 0x44, 0x74, 0xF8, 0x95, 0xAA, 0x8E, 0x86 }
}, // 360


<pre>
{
fallback cem idps
0x00208396, 0x00010104,
{0xF8, 0xC6, 0x50, 0xB3, 0x9D, 0x9A, 0xDC, 0x6D, 0x36, 0x0B, 0x94, 0x6B, 0x05, 0x32, 0xCC, 0x0B }
}, // 361


00 00 00 01 01 03 00 10 90 00 00 00 C8 B4 00 CD
{
0x0041072C, 0x00020208,
{0x8D, 0x0E, 0x4D, 0x56, 0x11, 0x70, 0x1D, 0x4B, 0x9B, 0x76, 0x4D, 0xF4, 0x7C, 0xC3, 0x7E, 0xA7 }
}, // 362


{
0x00820E59, 0x00040410,
{0x65, 0x89, 0x7B, 0x8B, 0x44, 0xDD, 0x81, 0xEC, 0x08, 0x69, 0x5E, 0x1F, 0x86, 0x93, 0x7F, 0x75 }
}, // 363


fallback cem psid
{
0x01041CB2, 0x00080820,
{0xEA, 0x41, 0x3A, 0x02, 0xA0, 0x9E, 0xDA, 0x9F, 0x78, 0xB7, 0x8C, 0x7E, 0x95, 0x53, 0x2B, 0xF4 }
}, // 364


C9 E5 91 3A FD 20 52 AA 4B 85 97 51 24 F7 59 A2
{
0x02083964, 0x00101040,
{0x26, 0x95, 0x93, 0x44, 0x1F, 0xA0, 0x94, 0x9F, 0xC2, 0x05, 0xF5, 0x0D, 0xB5, 0x91, 0xE2, 0x58 }
}, // 365


{
0x041072C8, 0x00202080,
{0x57, 0xD8, 0xE4, 0x1D, 0xAD, 0xEE, 0x5E, 0x57, 0xDD, 0xCC, 0x5A, 0x2A, 0xE7, 0x22, 0xAB, 0x6D }
}, // 366


fallback dem idps
{
0x0820E591, 0x00404100,
{0x99, 0x24, 0x3D, 0xA1, 0x0C, 0xC3, 0xC3, 0x51, 0x61, 0xC1, 0x81, 0x12, 0x47, 0x5A, 0x5F, 0x80 }
}, // 367


00 00 00 01 01 00 00 01 00 00 00 01 88 25 9E 0E
{
0x1041CB23, 0x00808200,
{0xB4, 0x1E, 0xF5, 0xE9, 0xDC, 0xD1, 0x2C, 0xC9, 0xCA, 0x0B, 0xED, 0x1D, 0xEC, 0xDE, 0xD3, 0xDF }
}, // 368


{
0x20839647, 0x01010400,
{0x0D, 0xDD, 0x6C, 0xF1, 0x4B, 0xEE, 0x07, 0x76, 0x40, 0x32, 0x1A, 0x9B, 0x13, 0x2B, 0x7A, 0x96 }
}, // 369


fallback dem psid
{
0x41072C8E, 0x02020800,
{0x18, 0x5D, 0xBE, 0xD1, 0xCB, 0x93, 0x94, 0x39, 0x12, 0xD2, 0xEB, 0xD9, 0x64, 0x8D, 0x3C, 0x59 }
}, // 370


71 CB BB DE 6B D4 1B 24 37 A3 6E BA 3E C3 6C 93
{
</pre>
0x820E591C, 0x04041000,
{0xE3, 0xC1, 0x77, 0x6A, 0x87, 0x36, 0xF5, 0x36, 0x04, 0x29, 0x4D, 0xE8, 0xED, 0x1A, 0x5E, 0x92 }
}, // 371


=== Jig Auth 5 Keys (SharedKeyB SharedDataB related) ===
{
0x041CB239, 0x08082001,
{0x34, 0x24, 0x9B, 0xFF, 0x54, 0x5D, 0xFC, 0xA0, 0xB3, 0x11, 0x90, 0x45, 0x91, 0x8F, 0xE0, 0xFA }
}, // 372


<pre>
{
1C7FD39E8D63AA32D386413EE6A01C15C4876BF614CA954E36C1602DD7871C4F KEY
0x01050021, 0x00000001,
051DFE9D9BEA8087F66EB8F631010D88 IV
{0x56, 0x63, 0xCA, 0x4C, 0x96, 0xDB, 0x14, 0xFF, 0xC9, 0xB8, 0x4F, 0xC6, 0xE5, 0x45, 0x3F, 0x59 }
</pre>
}, // 373


=== SMI Modulus ===
{
0x020A0042, 0x00000002,
{0x01, 0x4D, 0x28, 0x31, 0xEC, 0x69, 0x4F, 0x95, 0xDE, 0x3F, 0xC1, 0x48, 0x83, 0xBC, 0x2D, 0x9A }
}, // 374


<pre>
{
C618BE3270E1553B2D08660C70000616
0x04140084, 0x00000004,
38388DB331BFF30E7DB6334EA8F8F7EB
{0xAD, 0xAF, 0xB7, 0x37, 0x32, 0x1C, 0x38, 0xE2, 0x61, 0x3D, 0xD8, 0xCA, 0x76, 0x0F, 0x76, 0x21 }
93540B6624465ABE2AFAF01ACF0B8705
}, // 375
1CBAE118769183B9EA9B09C225A063BA
387A23452BBCDA2949C4ABA0C66A8D1D
0A44A7AE22D1AC449C9EAC5ED79A18AC
1B0691B3451673965ED336C9987EF5B4
2FA6DE995FFD319A629A5E2523164E3F
B9C7BDE7025E839C3B528F53E5ABB077
776C80E1C7A15720CBEA770D7674C9CD
C44559F0ED538DE33F79E9334C62AD81
114B23432D736A89CE7A53FECD50E66E
021F9DCC2B635E33305FD5EA8F15656D
2B00E93BBC78EE97B6BDDDF8EE218289
2D6A739CA1001AD8849F2F0A2550592A
4DA15742BB712E07B7933B8BFE1F2AD1
</pre>


=== SMI (Slot 0x213) ===
{
<pre>
0x08280108, 0x00000008,
AB7097356FDD49D83878540167F0C4AD85537C5A56BD15DF0EB5F7F0D9E276E6 Seed First Derivation SMI
{0x87, 0x21, 0xC7, 0xF7, 0x2A, 0x1A, 0x19, 0x14, 0x5F, 0x88, 0xAA, 0xB2, 0x66, 0xF6, 0x63, 0x6D }
}, // 376


310D20077AF3BF121F21D9ADAF389CDA IV First Derivation SMI
{
0x10500210, 0x00000010,
{0x40, 0x47, 0x1C, 0x07, 0x88, 0x55, 0x64, 0x49, 0x23, 0x2A, 0x34, 0x34, 0x08, 0x4F, 0xBD, 0xF7 }
}, // 377


2F0AEEF98EE3965650F8485E6C0BC2C4 IV First Decryption SMI
{
0x20A00420, 0x00000020,
{0xDF, 0xD2, 0x6A, 0x95, 0x0D, 0x5F, 0x7C, 0x02, 0xBA, 0xA7, 0xED, 0xA9, 0x95, 0x01, 0x2D, 0xBB }
}, // 378


D9A2CA7FD2E5AA65134CBF9ECF036F8AACE02A42D9187A08717C0255A13AB966 Seed Second Derivation SMI
{
0x41400841, 0x00000040,
{0x5D, 0x07, 0xCF, 0xB4, 0xC2, 0x8F, 0x3C, 0x1E, 0x6A, 0x4B, 0x7A, 0x18, 0xDD, 0x43, 0xE0, 0xA3 }
}, // 379


0F92B97AC4353337FD222A0E7E49EB58 IV Second Derivation SMI
{
0x82801082, 0x00000080,
{0x36, 0x3C, 0x17, 0xF0, 0x18, 0x3C, 0x73, 0x73, 0x0F, 0x97, 0x87, 0x09, 0x1C, 0xE6, 0xEC, 0xB9 }
}, // 380


69D7618B7DBE7B59C04DEF5169831FBF IV Second Decryption SMI
{
</pre>
0x05002104, 0x00000101,
{0xA5, 0x46, 0x7A, 0xC2, 0x51, 0xA9, 0xCD, 0xBB, 0xFE, 0x6C, 0x21, 0x1D, 0xD5, 0xBF, 0x50, 0x50 }
}, // 381


=== Other Keys/IVs ===
{
0x0A004208, 0x00000202,
{0xD9, 0xFE, 0x19, 0xAB, 0x1E, 0x67, 0xA2, 0xDA, 0x9B, 0x4C, 0x2F, 0x07, 0xC3, 0xF5, 0x4A, 0xAF }
}, // 382


<pre>
{
62FC3C4751B32657E71E89ECE4324BE3 (Internal) (Introduced in 0.920I, removed in 0.995I, qa flag related?)
0x14008411, 0x00000404,
</pre>
{0xAB, 0x39, 0x39, 0x14, 0xBD, 0xA8, 0x3F, 0x0D, 0x4B, 0xE9, 0x7A, 0x9A, 0x77, 0x73, 0x69, 0xDF }
}, // 383


=== Secure Kernel XXX Proto Keys ===
{
0x28010822, 0x00000808,
{0x9E, 0x41, 0xEA, 0x8D, 0x71, 0x26, 0xAD, 0xA1, 0x74, 0x3B, 0x4F, 0x0D, 0x84, 0xF4, 0xF7, 0x5C }
}, // 384


* Algorithm is AES 256 CBC
{
* IV is all zeroes
0x50021044, 0x00001010,
{0x27, 0x8F, 0x56, 0xA2, 0x13, 0x31, 0xBF, 0x47, 0xF6, 0x0C, 0x1D, 0x58, 0x9F, 0xCB, 0x49, 0x5D }
}, // 385


==== External ====
{
0xA0042088, 0x00002020,
{0x91, 0xF1, 0x0A, 0xE6, 0x31, 0x5D, 0x42, 0xA5, 0x46, 0x24, 0x7B, 0x6C, 0x97, 0x74, 0x89, 0x51 }
}, // 386


<pre>
{
992EF70868DE1B219EC3618FA79DAEC39067FE5638116C29FC0FF7E2A58FBD9E
0x40084111, 0x00004041,
</pre>
{0x8F, 0x32, 0x15, 0x44, 0x96, 0xE1, 0x29, 0x22, 0x3F, 0xFC, 0xAF, 0x7B, 0x25, 0x02, 0xC4, 0xEB }
}, // 387


==== Internal ====
{
0x80108222, 0x00008082,
{0x40, 0x42, 0xFC, 0x84, 0x95, 0x17, 0x6D, 0x05, 0x62, 0x5E, 0xBF, 0xB5, 0x21, 0x79, 0xB5, 0x4F }
}, // 388


<pre>
{
AC78EE86799148699B9CB3F5C6CAB73A6AC45EB11F44E9151232CF8F123C7D88
0x00210444, 0x00010105,
</pre>
{0x55, 0xDF, 0x2F, 0xA9, 0x3A, 0xE2, 0x07, 0x6D, 0x22, 0x23, 0xB1, 0x84, 0xF2, 0xFC, 0xF6, 0x7D }
}, // 389


== GcAuthMgr ==
{
=== Master Key Seeds ===
0x00420889, 0x0002020A,
As part of gc authentication, some keys are derived using these key seeds
{0xF9, 0xC9, 0xBC, 0xF3, 0xD5, 0x6A, 0xFD, 0x21, 0x28, 0xFF, 0x8F, 0x8D, 0x9F, 0x3B, 0x54, 0xD6 }
& 0x345 and 0x348 bbmac.
}, // 390
different key seeds are used depending on the key id used by the gamecart.


==== KeyID 0x1 ====
{
KEYSEED:
0x00841112, 0x00040414,
<pre>
{0x7A, 0xA1, 0xDA, 0x13, 0xE4, 0x77, 0x4A, 0xE7, 0x57, 0xC4, 0x17, 0x95, 0x41, 0xEA, 0xC1, 0xED }
7f1fd065dd2f40b3e26579a6390b616d
}, // 391
</pre>
IV:
<pre>
8b14c8a1e96f30a7f101a96a3033c55b
</pre>
==== KeyID 0x8001 ====
KEYSEED:
<pre>
6f2285ed463a6e57c5f3550ddcc81feb
</pre>
==== KeyID 0x8002 ====
KEYSEED:
<pre>
da9608b528825d6d13a7af1446b8ec08
</pre>
==== KeyID 0x8003 ====
KEYSEED:
<pre>
368b2eb5437a821862a6c95596d8c135
</pre>
=== Unknown GcAuthMgr Key and IV ===
<pre>
821C5714415E9804D6AAE324EB3DDDFE7BB73E8EC0F9E04D3D6D60BCD0CF4EE9
</pre>


<pre>
{
CEC36FCD7DB3102A80E9C2AA65734FC1
0x01082224, 0x00080828,
</pre>
{0xEA, 0x8C, 0xF9, 0x42, 0x6C, 0x80, 0xB1, 0x4D, 0xD1, 0x62, 0xD1, 0x2D, 0x8D, 0x4C, 0x2A, 0x31 }
}, // 392


{
0x02104449, 0x00101050,
{0x9C, 0x12, 0xAE, 0x5D, 0x27, 0xD6, 0xF2, 0x50, 0xBB, 0x60, 0xFF, 0xA7, 0x45, 0xAA, 0xA1, 0xA3 }
}, // 393


== KPRX_AUTH ==
{
keys part of kprx_auth_sm
0x04208893, 0x002020A0,
{0x54, 0x2F, 0xAB, 0x20, 0x48, 0x58, 0xE1, 0x24, 0x0A, 0x5F, 0xC1, 0xE4, 0xAE, 0x7C, 0x3F, 0xFC }
}, // 394


=== Bind Data HMAC Key ===
{
used for ksceSblAuthMgrDecBindData
0x08411126, 0x00404140,
<pre>
{0x28, 0xED, 0xCD, 0x90, 0x8D, 0x19, 0x0A, 0x2F, 0xB0, 0x03, 0xAD, 0x75, 0x1F, 0xD1, 0x43, 0x7D }
901a84fb13a744a378c5018a60f58c22
}, // 395
</pre>
HMAC-SHA256 using this key
result is the key to aes-cbc-decrypt bind data
first 0x10 is key, last 0x10 is iv.


== AIMGR ==
{
0x1082224C, 0x00808280,
{0x7B, 0x66, 0xB1, 0x79, 0x32, 0x46, 0xA1, 0x21, 0x50, 0x98, 0xD9, 0xEA, 0xEA, 0x1F, 0xD1, 0x44 }
}, // 396


* All these seem to be fallback keys in case keyslot 0 (aka pck0) fails to decrypt the idstorage enc_cmac located at cert + 0xD8
{
0x21044499, 0x01010500,
{0x2C, 0x93, 0x99, 0x0D, 0xD7, 0x25, 0x5C, 0xF3, 0x1E, 0x98, 0x5F, 0xBB, 0xDE, 0x71, 0x87, 0xEC }
}, // 397


* algo used is aes-128-ecb-dec
{
0x42088932, 0x02020A00,
{0x4E, 0xDE, 0xF1, 0xCF, 0xAB, 0x13, 0x21, 0xF5, 0xF5, 0xFD, 0xCF, 0xB5, 0x14, 0xCF, 0x5B, 0x26 }
}, // 398


* used together with keyslot 0x212 for cmac
{
0x84111264, 0x04041400,
{0x83, 0xF7, 0x8D, 0xB3, 0xAE, 0x7A, 0xEC, 0x06, 0xBA, 0xDD, 0xCD, 0x25, 0x06, 0x30, 0x0C, 0xB0 }
}, // 399


<pre>
{
7BB73E8EC0F9E04D3D6D60BCD0CF4EE9
0x082224C8, 0x08082801,
{0x60, 0x0D, 0x0E, 0x64, 0xB7, 0x46, 0xC8, 0x4C, 0xD9, 0x38, 0x0B, 0x59, 0x12, 0xC4, 0x01, 0x0F }
}, // 400


CEC36FCD7DB3102A80E9C2AA65734FC1
{
0x00000006, 0x80000000,
{0x9B, 0xB4, 0x67, 0xD7, 0x9D, 0x9B, 0x1C, 0xD1, 0xB4, 0xC5, 0x48, 0x18, 0x38, 0x1A, 0x79, 0xCE }
}, // 401


89398ED8AE6FB3B0519485893AD0E5F3
{
0x00000016, 0x80000000,
{0x3B, 0x6D, 0x05, 0x66, 0x74, 0x0B, 0xCE, 0x27, 0x6A, 0x61, 0x1E, 0xA1, 0xC2, 0xF8, 0x52, 0x79 }
}, // 402


33B90F7B250879F87DB269CFC4E7FB35
{
</pre>
0x00000026, 0x80000000,
{0x28, 0x1C, 0xDF, 0xD3, 0x7D, 0xF3, 0x8E, 0xE4, 0x4B, 0xFA, 0x04, 0x6A, 0xA2, 0xA2, 0xFF, 0x60 }
}, // 403


* This seems to be used to derive decryption for the certificate from idstorage
{
0x00000036, 0x80000000,
{0x92, 0x47, 0x43, 0xB1, 0xAB, 0xE6, 0xEB, 0xE1, 0xBC, 0x91, 0xAA, 0xC1, 0x5A, 0x9F, 0x6B, 0xE5 }
}, // 404


* used with slot 0x204 (likely iv for aes-256 master key)
{
0x00000046, 0x80000000,
{0xE0, 0xF7, 0xB8, 0x15, 0x5E, 0x62, 0x54, 0x01, 0xA1, 0x66, 0x07, 0x39, 0x81, 0xBD, 0x05, 0xAB }
}, // 405


<pre>
{
821C5714415E9804D6AAE324EB3DDDFE
0x00002021, 0x00000000,
</pre>
{0x3C, 0xB9, 0xB8, 0x00, 0x5A, 0xAE, 0xFA, 0xDB, 0x7E, 0x6A, 0xFE, 0x74, 0x79, 0xFF, 0x24, 0x6D }
=== PSN Keys ===
}, // 406
==== X-I-4-Passphrase ====


used to aes-128-cbc encrypt X-I-4-Passphrase header of PSN authentication request:
{
0x00004042, 0x00000000,
{0xC2, 0xB7, 0x0C, 0xB9, 0x4C, 0x83, 0x90, 0x25, 0x3E, 0x0D, 0x86, 0xEE, 0xCD, 0x1E, 0x33, 0xEB }
}, // 407


- Version 1 (used until 3.63)
{
<pre>
0x00008084, 0x00000000,
EA35FA34B747929A540219DBA2DA001F
{0xA2, 0xA0, 0xC4, 0xF0, 0x14, 0x23, 0x7B, 0xF3, 0xEA, 0x0E, 0xF3, 0x20, 0xB3, 0x6D, 0x83, 0xF2 }
</pre>
}, // 408
- Version 2 (used 3.63 onwards)
<pre>
886073DE0511F0581792DC66FD6CA6AF
</pre>


notes:
{
the IV is all 0 in both cases
0x00010109, 0x00000000,
PSN will still accept a version 1 passphrase which is how henkaku psn spoof works
{0x3E, 0x48, 0x7A, 0xDA, 0xDF, 0x0E, 0x6B, 0x24, 0x37, 0xE3, 0xEB, 0xBD, 0x5D, 0xA3, 0x7B, 0x97 }
}, // 409


==== X-I-4-Passphrase HMAC ====
{
used to generate the HMAC signature for X-I-4-Passphrase
0x00020212, 0x00000000,
<pre>
{0x9F, 0xCB, 0x77, 0x29, 0x5D, 0x5D, 0x1B, 0x3D, 0xB2, 0x52, 0x0D, 0x09, 0x31, 0x5F, 0x5E, 0x54 }
4D3E171CFB60DF96D1AFA6E76FEBFB5C079A5D177919C3EF417BAFA23A0B0DE2036624F0C87A8D3659DAE19E77195146B11A767D8A35A8610D301A79BBA9342D
}, // 410
</pre>


== Communication Processor ==
{
0x00040424, 0x00000000,
{0xD5, 0xD4, 0x83, 0x34, 0xBF, 0x3B, 0x69, 0x2A, 0x11, 0xA5, 0x0B, 0x4B, 0x6A, 0xFE, 0xF9, 0x37 }
}, // 411


=== ES2 fsimage1.trf Pub ===
{
0x00080848, 0x00000000,
{0xBB, 0xF8, 0x04, 0xDE, 0x94, 0x0F, 0xD4, 0x3E, 0x4E, 0x9F, 0x11, 0x02, 0x3C, 0x51, 0x67, 0x79 }
}, // 412


<pre>
{
A9 69 7F 9D 93 43 CA DE 68 E0 4F 9E 35 6E 6A B6
0x00101090, 0x00000000,
BB C7 DE 36 A4 D8 1B 98 A8 3B C1 2B E3 F6 DF 96
{0xDB, 0x95, 0x1C, 0x82, 0x54, 0xE0, 0xC3, 0xC0, 0x26, 0x63, 0x8B, 0x22, 0xEB, 0xFB, 0xBC, 0x2A }
ED 7A 64 38 94 56 AC A9 33 BE BF BA 4F FE F0 5C
}, // 413
F4 5F 2F 88 6F 43 4F BB C3 A0 13 48 53 30 70 C0
B7 D5 E9 C2 1E FE 53 E9 5A 60 19 DB 51 C1 2C 6B
AF EB 94 E9 92 28 79 63 44 8E 59 60 63 84 B9 9F
3F F3 E5 EB 6A A0 8B F3 2A 4D BA 7A 31 25 20 CE
C2 B6 9B B2 0A 6D 06 40 B1 17 17 0A A2 DD A1 FB
59 0A EE 7A DF C4 E8 0D FC F2 7F A5 5D DE C9 2C
07 92 2F DD 05 AB 16 18 DC B7 27 AA 6F F7 00 27
A9 41 0B C8 45 E5 0E AF D4 6C 0F D9 2F F5 00 67
2D E5 64 89 C6 69 B0 AA 48 1F FD 75 E9 9E 21 A8
DC 2F 9F 9E 87 95 7B 46 BB F6 3F B7 DD BE 8B 8C
A8 61 BA 34 9A 62 45 8E 85 5E E7 8C 3D D6 79 1F
92 E7 64 22 14 4E 51 29 5B 13 37 E1 5C 12 6D F6
FA 0C 29 32 1B C1 D7 C0 0E 3C 19 EE F3 A3 E7 A5
</pre>


=== ES2 CPUP Pub ===
{
0x00202120, 0x00000000,
{0x6A, 0xD2, 0x52, 0xA1, 0x91, 0xF8, 0xFB, 0xA3, 0x3C, 0xE9, 0xA4, 0x87, 0xE7, 0xC7, 0x28, 0xD9 }
}, // 414


<pre>
{
A7 CC AE 0F 50 11 88 52 7B F3 DA CC A3 E2 31 C8
0x00404240, 0x00000000,
D8 70 1E 7B 91 92 73 90 70 1D E5 E7 A9 63 27 DA
{0xB3, 0x3F, 0xEB, 0x07, 0x8B, 0x2C, 0xE7, 0xF1, 0x45, 0x47, 0x6F, 0x13, 0xEA, 0xFA, 0x20, 0xD8 }
D8 71 67 A8 F0 13 68 AD DF E4 90 E3 25 A2 90 53
}, // 415
36 97 05 8F BA 77 57 66 69 80 10 AF D8 FD 7A 3F
FD 26 5E 0A 52 FE 04 92 8B CE 8B 43 02 F4 C7 0F
FA C3 C9 39 7F D2 4B 10 62 71 E5 7B DA 20 D2 D7
02 29 8F 6F 99 0E CF 9B 0F E0 4F F6 CC EE 17 0B
55 53 04 23 20 12 D7 8E 60 19 DA B2 97 63 82 9E
6A F5 AD A8 02 20 4F A5 51 63 11 79 CB FE 61 64
73 26 62 E8 57 67 41 94 9B B1 36 45 6C 11 DE 35
5F 48 72 11 D2 30 26 7D C0 5E 69 9A 26 52 AD 5C
6D 74 B0 56 83 26 F4 F2 F5 B8 6A D9 56 E9 44 04
D3 A6 59 28 F4 EA 21 89 56 7C E9 98 99 11 B0 48
08 51 7F 4C 76 A8 B2 5D F1 D6 AB BE 85 95 C4 69
BF D7 E8 70 C4 F0 0A 89 61 0C 2C 9B 79 F6 25 A4
2C A2 B4 C6 B8 D3 7E 62 CE 9E C6 1A 85 6F D3 2F
</pre>


=== NBL Configs ===
{
0x00808480, 0x00000000,
{0x8C, 0x84, 0xD7, 0x18, 0xCF, 0x9D, 0x23, 0x42, 0xFE, 0x33, 0xB2, 0x94, 0x29, 0x0D, 0x9B, 0xCB }
}, // 416


==== Key ====
{
0x01010900, 0x00000000,
{0x38, 0x44, 0xB6, 0x85, 0xC9, 0xFE, 0xA0, 0xC1, 0xDD, 0xAE, 0xCA, 0x84, 0x80, 0x2A, 0x5D, 0x7C }
}, // 417


<pre>
{
3C 97 EB 60 B2 06 80 E9 5E B7 00 13 11 96 5F AE
0x02021200, 0x00000000,
</pre>
{0x27, 0x4D, 0x00, 0x9C, 0xD3, 0x41, 0xF8, 0x24, 0xA3, 0x7A, 0xD2, 0x57, 0x61, 0xB9, 0xF3, 0xA3 }
}, // 418


==== IV ====
{
<pre>
0x04042400, 0x00000000,
4D 8A C9 0A E0 B3 C1 30 46 31 A8 6D 56 32 02 70
{0x05, 0x04, 0x24, 0xC9, 0x95, 0x8B, 0x69, 0x8E, 0x5A, 0xBD, 0x15, 0x22, 0xBC, 0x66, 0xA9, 0xDF }
</pre>
}, // 419


=== Deobfuscated blob ===
{
0x08084801, 0x00000000,
{0xC1, 0xAB, 0xAE, 0x84, 0x55, 0xCF, 0xB5, 0x8A, 0xBC, 0xC7, 0x44, 0x8E, 0xEC, 0x32, 0x21, 0x73 }
}, // 420


<pre>
{
4D 8A C9 0A E0 B3 C1 30 46 31 A8 6D 56 32 02 70 iv  blob01 aes-128-cbc
0x10109002, 0x00000000,
3C 97 EB 60 B2 06 80 E9 5E B7 00 13 11 96 5F AE key blob01 aes-128-cbc
{0xD8, 0x3C, 0x1E, 0xE9, 0xB7, 0x75, 0x6C, 0x11, 0x7D, 0xE2, 0xD3, 0x3F, 0xDE, 0x89, 0x37, 0xBF }
}, // 421


A9 69 7F 9D 93 43 CA DE 68 E0 4F 9E 35 6E 6A B6 fs1 rsa
{
BB C7 DE 36 A4 D8 1B 98 A8 3B C1 2B E3 F6 DF 96 fs1
0x20212004, 0x00000000,
ED 7A 64 38 94 56 AC A9 33 BE BF BA 4F FE F0 5C fs1
{0xEB, 0xE9, 0x62, 0xEB, 0x7E, 0x31, 0x31, 0x08, 0xE3, 0xFD, 0x4D, 0xDE, 0x2C, 0x1A, 0x4D, 0xA7 }
F4 5F 2F 88 6F 43 4F BB C3 A0 13 48 53 30 70 C0 fs1
}, // 422
B7 D5 E9 C2 1E FE 53 E9 5A 60 19 DB 51 C1 2C 6B fs1
AF EB 94 E9 92 28 79 63 44 8E 59 60 63 84 B9 9F fs1
3F F3 E5 EB 6A A0 8B F3 2A 4D BA 7A 31 25 20 CE fs1
C2 B6 9B B2 0A 6D 06 40 B1 17 17 0A A2 DD A1 FB fs1
59 0A EE 7A DF C4 E8 0D FC F2 7F A5 5D DE C9 2C fs1
07 92 2F DD 05 AB 16 18 DC B7 27 AA 6F F7 00 27 fs1
A9 41 0B C8 45 E5 0E AF D4 6C 0F D9 2F F5 00 67 fs1
2D E5 64 89 C6 69 B0 AA 48 1F FD 75 E9 9E 21 A8 fs1
DC 2F 9F 9E 87 95 7B 46 BB F6 3F B7 DD BE 8B 8C fs1
A8 61 BA 34 9A 62 45 8E 85 5E E7 8C 3D D6 79 1F fs1
92 E7 64 22 14 4E 51 29 5B 13 37 E1 5C 12 6D F6 fs1
FA 0C 29 32 1B C1 D7 C0 0E 3C 19 EE F3 A3 E7 A5 fs1 rsa


68 48 3F BB 69 F1 04 A3 CB 0A D8 18 7F 90 0B 12
{
89 6F F0 68 51 B5 51 CC 75 B9 C7 01 4D B1 8F A9
0x40424008, 0x00000000,
0A 82 27 97 B6 CC 1D C0 2B CD 68 8E 91 C6 22 64
{0xAC, 0x6C, 0x01, 0xCB, 0x64, 0x27, 0x17, 0x29, 0x56, 0x33, 0xE5, 0x9D, 0x9D, 0xAF, 0x47, 0x49 }
1B F4 36 ED 32 2D D4 F0 D2 CD C1 7F 20 35 AA 0B
}, // 423
F4 E0 8D 02 49 BF EE 25 52 90 AC E9 40 C4 69 27
E0 C9 DF 3D 3A A0 62 98 4E B6 D3 77 41 5C C4 09
3F B8 3E 20 28 65 2D 80 70 C5 25 4A CA 0B CA D0
A7 C3 3A DC 90 EF 6B 66 D2 CD F5 0B A3 CC A0 E2
29 9E 38 D2 76 11 66 B9 2C 28 7F 75 1F 94 FF 06
74 18 EA A9 D7 C9 EF 9A 26 3D 42 8C 23 33 0D 27
41 42 67 E7 DB BC A6 B7 07 F8 C3 3D 9F 06 B0 3E
CB 45 3F A6 40 22 28 A4 0A 13 8A 49 68 F3 F0 72
94 EA D9 E8 55 37 CF 8D 43 AD AF EC 51 87 40 D4
D4 D5 A5 4B AE 14 27 7E FB 42 F9 C7 81 4E 1E E5
</pre>


== Ernie ==
{
0x80848010, 0x00000000,
{0x8C, 0x09, 0x92, 0x68, 0x69, 0x76, 0xD6, 0xC6, 0xDE, 0xCE, 0x7C, 0x41, 0x5F, 0x08, 0xB1, 0xEC }
}, // 424


=== Security ID (RL78) ===
{
0x01090021, 0x00000001,
{0xFB, 0xDA, 0xCD, 0xF4, 0x97, 0xA0, 0x4D, 0x8D, 0x20, 0xF2, 0xA0, 0x7B, 0xB2, 0x5A, 0x46, 0x92 }
}, // 425


<pre>
{
00 00 00 00 00 00 00 00 00 00 (it's blank LMAO)
0x02120042, 0x00000002,
</pre>
{0x85, 0x38, 0x1A, 0x9A, 0x07, 0x4D, 0xD9, 0x6E, 0xF0, 0xEC, 0x00, 0x3E, 0xD3, 0x3D, 0x91, 0x3F }
}, // 426


=== Ernie Update AES128CBC Key 0x10/0x30/0x31/0x40/0x41 (PHAT) ===
{
0x04240084, 0x00000004,
{0x0B, 0x14, 0xD8, 0xA1, 0x93, 0xB6, 0x5D, 0x8D, 0x75, 0x5F, 0x23, 0x4D, 0xD7, 0x2D, 0xEA, 0x4D }
}, // 427


<pre>
{
key: 12B5408FD189E223B61890F488536008
0x08480108, 0x00000008,
iv : 82D6528A87BC55B38EF29A45730EF130
{0x3B, 0x03, 0xB1, 0xC6, 0xCB, 0x0E, 0x51, 0x57, 0xFC, 0xB0, 0xB7, 0x11, 0x64, 0xF5, 0x48, 0xBD }
</pre>
}, // 428


* supports type 0
{
* for block size 0x400 ONLY (block size 0x800 not supported)
0x10900210, 0x00000010,
{0xDC, 0x0B, 0x7B, 0x76, 0x08, 0x5F, 0x94, 0x60, 0xAC, 0xA8, 0x4D, 0x94, 0x9B, 0x1D, 0x43, 0x9A }
}, // 429


=== Ernie Updater AES128CBC Key 0x10/0x30/0x31/0x40/0x41 (PHAT) ===
{
0x21200420, 0x00000020,
{0x7E, 0xEE, 0xAD, 0xF8, 0x50, 0x0B, 0x75, 0x00, 0xD6, 0x20, 0x6A, 0x27, 0x1E, 0x61, 0x75, 0x2B }
}, // 430


<pre>
{
key: EAE43A1C48CD32A565E2CA7D8F9018DC
0x42400840, 0x00000040,
iv: C9D9619CA151342D04602ECF0B8D6E33
{0x5B, 0xAB, 0xAD, 0x85, 0x9F, 0x18, 0x43, 0xDB, 0x4A, 0x1C, 0x3C, 0xF5, 0x90, 0x15, 0x6D, 0x4B }
</pre>
}, // 431


* supports type 0
{
* for block size 0x400 ONLY (block size 0x800 not supported)
0x84801080, 0x00000080,
* for updater and confzz firmwares ONLY
{0x27, 0xD6, 0x73, 0x72, 0xDD, 0xFD, 0xB3, 0xB6, 0x90, 0x9F, 0x49, 0x7C, 0x7B, 0xFB, 0x6D, 0xE6 }
* location: around 0xFXXX of syscon firmware
}, // 432


=== Ernie Update AES128CBC Key 0x60 (PHAT) ===
{
0x09002100, 0x00000101,
{0x8C, 0xA4, 0xCC, 0xA4, 0x44, 0xA7, 0x37, 0xCB, 0x2E, 0x30, 0xAE, 0xD2, 0x03, 0x68, 0x13, 0x21 }
}, // 433


<pre>
{
key: 8C9ED3908C4143AE02855794C025BE1A
0x12004200, 0x00000202,
iv : C85AE1576D5E205FE8043573F55F4E11
{0xD0, 0x05, 0xC5, 0x43, 0x9D, 0x27, 0x77, 0x03, 0x99, 0x24, 0xFE, 0x03, 0x3D, 0x5B, 0x5A, 0xA4 }
</pre>
}, // 434


* supports type 0
{
* location: around 0xFXXX in syscon firmware
0x24008400, 0x00000404,
{0x63, 0x8B, 0x3C, 0x69, 0x00, 0x08, 0xEF, 0x8D, 0x49, 0x66, 0x01, 0xB0, 0x3D, 0xE6, 0xE0, 0xBA }
}, // 435


=== Ernie Updater AES128CBC Key 0x60 (PHAT) ===
{
0x48010801, 0x00000808,
{0xC7, 0xEC, 0x0B, 0x0B, 0xF5, 0x1C, 0x9B, 0xD0, 0xF2, 0x38, 0x3D, 0x0C, 0xA0, 0x93, 0x15, 0x3E }
}, // 436


<pre>
{
key: 7014BEE6136725B9FFBE9A8614DD5C2A
0x90021002, 0x00001010,
iv: FBD11DF2E0AAEE0B9C3738163CB8B6BD
{0x78, 0xCB, 0xBA, 0x19, 0x26, 0xFE, 0xD5, 0x82, 0x8F, 0xE4, 0x55, 0x8A, 0x60, 0xC1, 0x92, 0x7B }
</pre>
}, // 437


* supports type 0
{
* for updater and confzz firmwares ONLY
0x20042004, 0x00002021,
{0x70, 0x98, 0x0E, 0x09, 0xC8, 0x24, 0x7B, 0x9F, 0x11, 0x71, 0x70, 0x84, 0x48, 0x4C, 0x78, 0x9B }
}, // 438


=== Ernie Update AES128CBC Key 0x70/0x72 (PSTV) ===
{
0x40084009, 0x00004042,
{0xA7, 0xE1, 0x46, 0x1B, 0x3D, 0xA7, 0xF9, 0xA5, 0x2C, 0x32, 0x2D, 0x03, 0x9A, 0x53, 0x40, 0x82 }
}, // 439


<pre>
{
key: 67C34253A7DE13517EC903FE1119C04C
0x80108012, 0x00008084,
iv : DB302673D69F0D513A635E68A470F9C1
{0x4C, 0x77, 0x16, 0x67, 0xC4, 0xF2, 0xF3, 0xF4, 0x91, 0xE4, 0xD1, 0xE1, 0x02, 0xB0, 0x20, 0x6D }
</pre>
}, // 440


* aka the key for the meaning of life, universe and everything else
{
* supports type 6 and 7
0x00210025, 0x00010109,
{0xB9, 0xBB, 0xC7, 0xE9, 0xAB, 0x3F, 0x36, 0x25, 0x27, 0x1E, 0x5E, 0x41, 0x79, 0x44, 0x63, 0x8B }
}, // 441


=== Ernie Updater AES128CBC Key 0x70/0x72 (PSTV) ===
{
0x0042004A, 0x00020212,
{0xFE, 0x7E, 0xE6, 0x33, 0x82, 0x81, 0xFE, 0x07, 0x7B, 0x60, 0xC0, 0x99, 0x08, 0x47, 0x16, 0x5E }
}, // 442


<pre>
{
key: BE01B7FA1EC3ED641879DDE44D60486E
0x00840095, 0x00040424,
iv : 671A74C7E50F25CF64D4341039C78705
{0x20, 0x6F, 0xA0, 0xFA, 0x11, 0x0B, 0x5D, 0x00, 0xA3, 0x0A, 0xA4, 0xF3, 0x7E, 0xD7, 0x3F, 0x0B }
</pre>
}, // 443


* aka the key for the meaning of life, universe and everything else
{
* supports type 6 and 7
0x0108012A, 0x00080848,
* for updater and confzz firmwares ONLY
{0x41, 0xA2, 0x25, 0x36, 0x08, 0x46, 0x44, 0xBB, 0x54, 0xE5, 0x71, 0x7F, 0xF8, 0x55, 0x4F, 0x03 }
}, // 444


=== Ernie Update AES128CBC Key 0x80/0x82 (PS Vita SLIM) ===
{
0x02100254, 0x00101090,
{0x5A, 0x4D, 0x58, 0x75, 0x87, 0x63, 0x4C, 0x9F, 0x20, 0x16, 0xBE, 0xEC, 0x3E, 0x56, 0x2E, 0x45 }
}, // 445


<pre>
{
key: 523BEB53FCB95DC772AA1BFB0A96CD10
0x042004A9, 0x00202120,
iv : 385D67E50CE7669ECD171FE576814343
{0x02, 0xEA, 0x9A, 0x3C, 0x07, 0x22, 0x38, 0xA7, 0xE0, 0xDD, 0x76, 0xFE, 0x19, 0x1E, 0x28, 0x8F }
</pre>
}, // 446


* supports type 5 and 8
{
0x08400953, 0x00404240,
{0xCD, 0xA9, 0x8D, 0x44, 0x52, 0x6F, 0xF4, 0x40, 0xE0, 0xCE, 0x95, 0xE7, 0x71, 0xE3, 0x54, 0xE7 }
}, // 447


=== Ernie Updater AES128CBC Key 0x80/0x82 (PS Vita SLIM) ===
{
0x108012A7, 0x00808480,
{0xB9, 0x9F, 0xC8, 0x30, 0x12, 0x17, 0x1B, 0x78, 0xC7, 0x63, 0xA2, 0x85, 0xEF, 0xB3, 0xF5, 0xD1 }
}, // 448


<pre>
{
key: DBD9450ACCA8544895663A6F472BDE7F
0x2100254E, 0x01010900,
iv : F927C6A1153DB2D65F736C3AD9E1CE76
{0x16, 0x66, 0x4E, 0x83, 0x31, 0x24, 0xEB, 0x60, 0xED, 0xFF, 0x99, 0x80, 0xDA, 0x59, 0x93, 0x1E }
</pre>
}, // 449


* supports type 5 and 8
{
* for updater and confzz firmwares ONLY
0x42004A9C, 0x02021200,
{0x70, 0x44, 0x87, 0x43, 0x75, 0x4C, 0x8B, 0x2A, 0x7A, 0x39, 0xA6, 0xE4, 0x87, 0x5C, 0x13, 0xA5 }
}, // 450


=== SERVICE 0x900 PASSPHRASE ===
{
<pre>
0x84009539, 0x04042400,
93CE8EBEDF7F69A96F35DDE3BECB97D5
{0xF1, 0x47, 0xBB, 0x55, 0x27, 0x9A, 0xAF, 0x4D, 0x20, 0x79, 0x32, 0x28, 0xD8, 0x9E, 0xA7, 0x56 }
</pre>
}, // 451


=== BStoBSid Key ===
{
<pre>
0x08012A72, 0x08084801,
46B532E3F012E663C0694ECA7C8C58B7
{0x5B, 0x1A, 0xBE, 0xFE, 0xFF, 0x3C, 0xCC, 0xEF, 0xB4, 0x9F, 0x27, 0x14, 0x62, 0xFD, 0x15, 0x77 }
</pre>
}, // 452


=== First Loader Jig Handshake Key ===
{
0x00000006, 0x80000000,
{0x9B, 0xB4, 0x67, 0xD7, 0x9D, 0x9B, 0x1C, 0xD1, 0xB4, 0xC5, 0x48, 0x18, 0x38, 0x1A, 0x79, 0xCE }
},// 453


Also known as g_debug_challenge_key. See [https://wiki.henkaku.xyz/vita/Enc#Secret_debug_mode].
{
0x00000006, 0x80000000,
{0x9B, 0xB4, 0x67, 0xD7, 0x9D, 0x9B, 0x1C, 0xD1, 0xB4, 0xC5, 0x48, 0x18, 0x38, 0x1A, 0x79, 0xCE }
},// 454


AES256ECB Key:
{
<pre>
0x05002080, 0x00000101,
F47716E6C5649FD648538FD9773D12D1
{0xB9, 0x3C, 0xB4, 0xF4, 0xAE, 0x60, 0xA0, 0x78, 0x40, 0x03, 0xF3, 0xB6, 0x1B, 0x65, 0xE9, 0x66 }
229E118737B1D782D6A80CDB72E4B9C3
}, // 455
</pre>


=== Supported Keysets by Ernie ===
{
<pre>
0x0A004101, 0x00000202,
0, 1, 0xB, 0xE, 0xF
{0x93, 0x68, 0x47, 0xAA, 0xBE, 0x0F, 0xA9, 0xAE, 0xDD, 0xF7, 0x1B, 0x92, 0xDA, 0x3D, 0xF8, 0x7C }
</pre>
}, // 456


=== Ernie Handshake Keysets ===
{
0x14008202, 0x00000404,
{0x68, 0xC5, 0x76, 0x63, 0x2F, 0x3B, 0xD8, 0x41, 0x27, 0x51, 0x0D, 0x45, 0xB2, 0x32, 0x87, 0x1F }
}, // 457


These keysets are stored on each side (Ernie firmware and cMeP binaries).
{
0x28010404, 0x00000808,
{0x57, 0x88, 0xAC, 0xB2, 0xE8, 0xB3, 0xB8, 0xFF, 0x21, 0xC5, 0x76, 0x7F, 0xA4, 0xB9, 0xFC, 0x33 }
}, // 458


==== Keyset 0x0 ====
{
0x50020809, 0x00001010,
{0x9D, 0xAA, 0x75, 0xDE, 0xF2, 0x11, 0xAA, 0x3F, 0xC2, 0x93, 0x54, 0x59, 0x0F, 0xBA, 0xC2, 0x45 }
}, // 459


===== SharedData_0 =====
{
<pre>
0xA0041013, 0x00002020,
80996FBBC8B4EBA30595F4D379A23BD0
{0x1E, 0x04, 0xE8, 0x63, 0xFF, 0xBD, 0x3C, 0x87, 0x74, 0x66, 0xBA, 0xE6, 0x6D, 0xAC, 0x8B, 0x88 }
</pre>
}, // 460


===== SharedKey_0_A =====
{
<pre>
0x40082027, 0x00004041,
EF685D2E33C7D029A1A2EE646BE39D41
{0x4E, 0xD0, 0xE6, 0xC1, 0x34, 0x60, 0xDA, 0xC0, 0x88, 0x80, 0xB3, 0x05, 0x4A, 0x02, 0x7B, 0x32 }
</pre>
}, // 461


===== SharedKey_0_B =====
{
<pre>
0x8010404E, 0x00008082,
CE7867DE57575C008D998281E8DA5912
{0x33, 0xC2, 0xAD, 0x8A, 0x1F, 0x9A, 0x30, 0xFB, 0x54, 0x08, 0xB1, 0x0B, 0x03, 0x58, 0x38, 0x76 }
</pre>
}, // 462


==== Keyset 0x1 ====
{
0x0020809D, 0x00010105,
{0x36, 0xC7, 0x3E, 0x8D, 0x07, 0x0B, 0x90, 0x8C, 0x4D, 0x96, 0x8D, 0x85, 0x5E, 0xB3, 0x55, 0xE7 }
}, // 463


===== SharedData_1 =====
{
<pre>
0x0041013A, 0x0002020A,
8C20B6FABD2236F772AA283B8C82B13E
{0x70, 0xCF, 0x78, 0xC5, 0xE4, 0xDA, 0xC0, 0x51, 0x93, 0xB2, 0x0B, 0xB2, 0xC6, 0x1C, 0x00, 0x3C }
</pre>
}, // 464


===== SharedKey_1_A =====
{
<pre>
0x00820275, 0x00040414,
87DC6ECFF1CA5D709B01AEF69EA6B283
{0x28, 0xBF, 0xA7, 0xC1, 0x50, 0x5B, 0xF3, 0x0B, 0x6E, 0x1D, 0xAD, 0xB5, 0x86, 0xFD, 0xA8, 0xF1 }
</pre>
}, // 465


===== SharedKey_1_B =====
{
<pre>
0x010404EB, 0x00080828,
51EB8DD39B0585CE915F3BFF609C9563
{0x5C, 0x5B, 0xD7, 0x67, 0x12, 0x9C, 0xED, 0x6A, 0x96, 0xD6, 0x75, 0x08, 0x98, 0x52, 0xFB, 0x84 }
</pre>
}, // 466


==== Keyset 0xB (command 0xA0) ====
{
0x020809D7, 0x00101050,
{0xC2, 0x97, 0x98, 0xE8, 0xA5, 0x8C, 0xFC, 0xDC, 0x01, 0x31, 0x48, 0x0D, 0x6A, 0xDC, 0xB9, 0xA7 }
}, // 467


===== SharedKey_B_A =====
{
<pre>
0x041013AF, 0x002020A0,
BB644721CB4C55072E83177BEB3BBEE9 (2F1C)
{0x0A, 0xC7, 0x20, 0x94, 0xB8, 0xE3, 0xDC, 0x1B, 0x14, 0x64, 0x39, 0x66, 0x1A, 0x61, 0x4E, 0xE1 }
</pre>
}, // 468
Initial key to encrypt step 2 packet.


===== SharedKey_B_B =====
{
<pre>
0x0820275E, 0x00404140,
DC6B6EE0F457DF0E7BAD1C5EA338027F (2F2C)
{0xD2, 0x8D, 0x74, 0xC8, 0x68, 0x5B, 0xB5, 0xC8, 0x5A, 0xFE, 0xC9, 0x76, 0xD5, 0x9C, 0xC0, 0x47 }
</pre>
}, // 469
Intermediate key used to decrypt Syscon step 3 response.


Ernie communication session key AES128ECB master key:
{
<pre>
0x10404EBC, 0x00808280,
00000000000000000000000000000000
{0xF2, 0x5D, 0xF5, 0xDF, 0x0A, 0xE9, 0xD6, 0xF6, 0x29, 0xEC, 0x03, 0x2D, 0xB9, 0xF1, 0xEE, 0xD6 }
</pre>
}, // 470
Unused with command 0xA0.


===== SharedData_B =====
{
<pre>
0x20809D78, 0x01010500,
CF2E93E9F94E28CCA48026134C7C77CE (2F0C)
{0x89, 0x92, 0x4B, 0xF6, 0xF9, 0x48, 0x76, 0x53, 0xE4, 0xCE, 0x5C, 0x47, 0xE8, 0xB9, 0xAB, 0xAF }
</pre>
}, // 471
Checked in Syscon only.


==== Keyset 0xE ====
{
0x41013AF1, 0x02020A00,
{0xC8, 0xE8, 0x73, 0xC1, 0x04, 0xA7, 0xDD, 0x0A, 0x40, 0x9F, 0x43, 0xAB, 0xB9, 0x60, 0x3C, 0x68 }
}, // 472


===== SharedData_E =====
{
0x820275E3, 0x04041400,
{0x86, 0x14, 0xB2, 0x94, 0x1B, 0x99, 0x32, 0x48, 0xD4, 0x64, 0xFD, 0xA4, 0x57, 0xA5, 0x3D, 0x1B }
}, // 473


<pre>
{
AD2F322F4256C49D1848818F0FDD81BE
0x0404EBC7, 0x08082801,
</pre>
{0x09, 0x7C, 0x72, 0x3B, 0x48, 0xCA, 0xAD, 0x36, 0x78, 0xCB, 0x6F, 0x5C, 0x0F, 0x9E, 0x81, 0xC7 }
}, // 474


===== SharedKey_E_A =====
{
0x82802080, 0x00000080,
{0x34, 0x87, 0xA2, 0x01, 0x47, 0x82, 0x02, 0xD5, 0xC1, 0x82, 0x37, 0x50, 0x37, 0x59, 0xA6, 0x63 }
}, // 475


<pre>
{
4ACE3A668AAEBB11793C432FB8A4CE88
0x05004100, 0x00000101,
</pre>
{0x5F, 0x18, 0xBF, 0xF6, 0x74, 0xD3, 0x14, 0x7B, 0xC2, 0xFE, 0xDB, 0x0F, 0xA2, 0x74, 0xB0, 0xD2 }
}, // 476


===== SharedKey_E_B =====
{
0x0A008200, 0x00000202,
{0x09, 0x9E, 0x40, 0x19, 0xD4, 0xE1, 0xE9, 0xBF, 0x5D, 0xCE, 0x9A, 0x94, 0x26, 0xE8, 0xC4, 0x48 }
}, // 477


<pre>
{
1CBAE93DE883557C8AA14886786BE227
0x14010400, 0x00000404,
</pre>
{0x64, 0x2A, 0x4A, 0xFA, 0x4A, 0x5F, 0x96, 0x65, 0x20, 0xA0, 0x40, 0x04, 0x42, 0xE1, 0x7C, 0x2D }
}, // 478


==== Keyset 0xF (command 0xD0) ====
{
0x28020801, 0x00000808,
{0xD2, 0x77, 0x05, 0xF3, 0xEA, 0x70, 0x03, 0x2E, 0x12, 0x56, 0x91, 0xCB, 0x87, 0x81, 0xD6, 0x65 }
}, // 479


===== SharedKey_F_A =====
{
<pre>
0x50041003, 0x00001010,
50E4C3A77264167C409C72A9B57A8609 (2F5C)
{0xD4, 0x55, 0xDB, 0xCB, 0x9F, 0x04, 0xFA, 0x20, 0x92, 0xEB, 0x67, 0x0E, 0xC8, 0xC4, 0xA3, 0x8D }
</pre>
}, // 480
Initial key to encrypt step 2 packet.


===== SharedKey_F_B =====
{
<pre>
0xA0082006, 0x00002020,
9E34087C48985B4B351A63572D9B481B (2F6C)
{0x2F, 0x41, 0x0E, 0x61, 0x3C, 0x38, 0xF8, 0xFC, 0xC8, 0xBC, 0x06, 0x22, 0x7E, 0x1E, 0x2D, 0x15 }
</pre>
}, // 481
Intermediate key used to decrypt Syscon step 3 response.


===== SharedKey_F_Master =====
{
<pre>
0x4010400C, 0x00004041,
EBE3460D84A41754AC441368CF0200D8 (2F7C)
{0xD3, 0xA5, 0x64, 0x7C, 0xC8, 0xC9, 0x90, 0xAC, 0xD1, 0xD0, 0x8E, 0x80, 0x43, 0x9F, 0x9B, 0xFC }
</pre>
}, // 482
Master key to generate Ernie communication session key (stored in Bigmac keyslot 0x511) by encrypting step 2 data.


===== SharedData_F =====
{
<pre>
0x80208018, 0x00008082,
C86B51FB019A207F32118E55462D5008 (2F3C)
{0x46, 0x84, 0xBF, 0x5A, 0xFD, 0x76, 0xB6, 0x17, 0x41, 0xE3, 0x3B, 0xC2, 0x99, 0x81, 0x29, 0x57 }
</pre>
}, // 483
Checked by Syscon only.


Step 4-5 passphrase:
{
<pre>
0x00410030, 0x00010105,
B01103B0623832D62540B56333D6E11D (2F4C)
{0xB8, 0x86, 0x5D, 0xB2, 0x59, 0x20, 0x3F, 0x3D, 0x83, 0x49, 0x16, 0x84, 0x53, 0x66, 0x22, 0xA3 }
</pre>
}, // 484
Checked by both Syscon (step 4) and cMeP (step 5) to ensure packet authenticity.


=== All not known Ernie-embedded Keys ===
{
0x00820060, 0x0002020A,
{0xC4, 0xC6, 0x40, 0xFB, 0xBB, 0x22, 0xBB, 0xE5, 0x3A, 0xF0, 0x0D, 0xC3, 0xB8, 0xBF, 0x21, 0xE9 }
}, // 485


<pre>
{
DB D9 45 0A CC A8 54 48 95 66 3A 6F 47 2B DE 7F 21C44(USS-1002) AES KEY
0x010400C0, 0x00040414,
F9 27 C6 A1 15 3D B2 D6 5F 73 6C 3A D9 E1 CE 76 21C44(USS-1002) AES IV
{0xDF, 0x94, 0x77, 0xBF, 0x87, 0x7D, 0x22, 0x95, 0x03, 0x70, 0x85, 0xF0, 0x27, 0xDB, 0x75, 0x8C }
</pre>
}, // 486


=== JigKick Key Expansion ===
{
0x02080180, 0x00080828,
{0x2D, 0x6F, 0xA5, 0x5E, 0xA9, 0xEE, 0x54, 0xD6, 0xC3, 0x34, 0x3F, 0xE2, 0x31, 0xAC, 0x53, 0xEA }
}, // 487


<pre>
{
$ ./aes_keyschedule.exe F47716E6C5649FD648538FD9773D12D1229E118737B1D782D6A80CD
0x04100300, 0x00101050,
B72E4B9C3
{0x5F, 0xDA, 0xEB, 0xA7, 0x7C, 0xD3, 0x88, 0xDE, 0x0B, 0xBB, 0xD7, 0x4A, 0x62, 0x3D, 0x50, 0x36 }
K00: F47716E6C5649FD648538FD9773D12D1
}, // 488
K01: 229E118737B1D782D6A80CDB72E4B9C3
K02: 9C2138A65945A770111628A9662B3A78
K03: 116F913B26DE46B9F0764A628292F3A1
K04: D12C0AB58869ADC5997F856CFF54BF14
K05: 074F99C12191DF78D1E7951A537566BB
K06: 481FE058C0764D9D5909C8F1A65D77E5
K07: 23036C180292B360D375267A800040C1
K08: 23169895E360D508BA691DF91C346A1C
K09: BF1B6E84BD89DDE46EFCFB9EEEFCBB5F
K10: 83FC57BD609C82B5DAF59F4CC6C1F550
K11: 0B6388D7B6EA5533D816AEAD36EA15F2
K12: 24A5DEB844395C0D9ECCC341580D3611
K13: 61B48D55D75ED8660F4876CB39A26339
K14: 5E5ECCAA1A6790A784AB53E6DCA665F7
</pre>


* Some keys are repeated in the Ernie memory dump, as it seems Ernie stores many versions of code binaries. Maybe backup bank or updater.
{
0x08200600, 0x002020A0,
{0x7A, 0x78, 0xDD, 0x16, 0xDA, 0x90, 0x99, 0xDA, 0x33, 0x0F, 0x65, 0xBE, 0xF2, 0x8A, 0xC6, 0x01 }
}, // 489


== Ernie Handshake Keys (not stored in Ernie) ==
{
0x10400C00, 0x00404140,
{0x06, 0x5F, 0xA7, 0xF1, 0x29, 0x12, 0xC1, 0x80, 0x4B, 0xAC, 0xE7, 0x17, 0x5E, 0x6E, 0x36, 0x68 }
}, // 490


These keysets are stored in second_loader and in many SMs.
{
0x20801800, 0x00808280,
{0x7D, 0x1E, 0x97, 0xE2, 0x13, 0x6B, 0x07, 0xF4, 0x4C, 0x40, 0xEA, 0x48, 0x59, 0x85, 0x85, 0x0B }
}, // 491


=== Keyset 4 ===
{
0x41003000, 0x01010500,
{0x8E, 0xAF, 0xB3, 0x61, 0x3F, 0x87, 0xB3, 0xBD, 0xC8, 0x0A, 0xA9, 0xAC, 0x6D, 0x6E, 0x3E, 0x19 }
}, // 492


Step 2 AES128ECB key:
{
<pre>
0x82006000, 0x02020A00,
A6CD383341CB9B0D69FD4A243E30F4B1
{0x70, 0xFD, 0x36, 0xE9, 0x56, 0x14, 0x05, 0x65, 0x32, 0xD5, 0x5A, 0x08, 0xD6, 0xD4, 0xF5, 0x22 }
</pre>
}, // 493
Initial key to encrypt step 2 packet.


Step 3 AES128ECB key:
{
<pre>
0x0400C001, 0x04041401,
D3EFEDE608691946CB77E14F8DEC69FA
{0xBE, 0x21, 0xDB, 0xC6, 0x12, 0xE7, 0x76, 0x34, 0x24, 0x3D, 0xD2, 0xA4, 0x56, 0x63, 0xCE, 0x50 }
</pre>
}, // 494
Intermediate key used to decrypt Syscon step 3 response.


Ernie communication session key AES128ECB master key:
{
<pre>
0x08018002, 0x08082802,
15C7B32429F8603216F4F3E081D7C86D
{0xAB, 0x0A, 0x4C, 0x03, 0xA7, 0x7F, 0x3E, 0xD6, 0x75, 0xB3, 0x78, 0x10, 0x60, 0xDD, 0xC7, 0xD7 }
</pre>
}, // 495
Master key to generate Ernie communication session key (stored in Bigmac keyslot 0x511) by encrypting step 2 data.


Step 2 passphrase:
{
<pre>
0x04041001, 0x00000000,
9ABD1B275C7537F7E62AB93AB3EB76F9
{0xA5, 0xA7, 0x3A, 0x0F, 0xD7, 0x22, 0x9A, 0x91, 0xFC, 0xFC, 0xD3, 0xA5, 0x6D, 0x90, 0xF1, 0xCF }
</pre>
}, // 496
Checked by Syscon only.


Step 4-5 passphrase:
{
<pre>
0x08082003, 0x00000000,
DC454ED5F6E8A2B1B24D34A82215B2A5
{0xFD, 0x71, 0x1D, 0xA8, 0xA7, 0x92, 0x93, 0x26, 0xD4, 0x2A, 0x1B, 0x68, 0x76, 0x86, 0xE8, 0x38 }
</pre>
}, // 497
Checked by both Syscon (step 4) and cMeP (step 5) to ensure packet authenticity.


=== Keyset 6 ===
{
0x10104006, 0x00000000,
{0x5E, 0x9F, 0x35, 0x32, 0xED, 0x97, 0xDE, 0x9F, 0xA1, 0x9D, 0xB8, 0xF7, 0x9F, 0x74, 0xAB, 0xFA }
}, // 498


Step 2 AES128ECB key:
{
<pre>
0x2020800C, 0x00000000,
1053143BEAECC59FCFF1A195F8F5AFB0
{0xA9, 0x64, 0x4C, 0xA6, 0x68, 0x1B, 0x89, 0x9B, 0x93, 0xFF, 0x4D, 0xFF, 0x66, 0xEA, 0x9E, 0xC6 }
</pre>
}, // 499
Initial key to encrypt step 2 packet.


Step 3 AES128ECB key:
{
<pre>
0x40410018, 0x00000000,
F90CDCBF009BA8367F841B25E8B10306
{0x85, 0x2B, 0x92, 0x8E, 0xE7, 0x9D, 0x3B, 0x14, 0x47, 0x33, 0x52, 0xE2, 0x87, 0x9D, 0xC5, 0xD7 }
</pre>
}, // 500
Intermediate key used to decrypt Syscon step 3 response.


Ernie communication session key AES128ECB master key:
{
<pre>
0x80820030, 0x00000000,
6F6374FD1A41A75269EE15832451DEBF
{0x15, 0x96, 0xF2, 0xF6, 0xA9, 0x8B, 0xA8, 0xE4, 0x0A, 0x7B, 0x0C, 0x35, 0x73, 0x9F, 0xDE, 0x3C }
</pre>
}, // 501
Master key to generate Ernie communication session key (stored in Bigmac keyslot 0x511) by encrypting step 2 data.


Step 2 passphrase:
{
<pre>
0x01040061, 0x00000001,
B6806F9F58706D72B0E03717197D430C
{0x27, 0xEC, 0xC3, 0xB7, 0x85, 0xAC, 0x6B, 0xF0, 0x03, 0xD2, 0x39, 0x0D, 0xE0, 0xDF, 0x38, 0x91 }
</pre>
}, // 502
Checked by Syscon only.


Step 4-5 passphrase:
{
<pre>
0x020800C3, 0x00000002,
0E08A20C8718BD3B158E2E6992202DE7
{0xC7, 0x84, 0xA9, 0xC6, 0x62, 0x40, 0x5E, 0x15, 0xCB, 0x9D, 0xEA, 0xDF, 0x2A, 0xBB, 0x9F, 0x99 }
</pre>
}, // 503
Checked by both Syscon (step 4) and cMeP (step 5) to ensure packet authenticity.


=== Keyset 0xC (AuthEtoI, similar to command 0xA0) ===
{
0x04100186, 0x00000004,
{0xEB, 0x8B, 0xA7, 0x5A, 0x74, 0x60, 0x25, 0x1C, 0xA3, 0xC5, 0x26, 0x29, 0xFF, 0xFE, 0x90, 0xA7 }
}, // 504


Step 2 AES128ECB key:
{
<pre>
0x0820030C, 0x00000008,
3CF54027DAE2F45C929B76927DFFD269
{0x15, 0x41, 0x02, 0x0D, 0x88, 0xA6, 0x62, 0xB4, 0x95, 0xCE, 0xB0, 0x17, 0xBE, 0x3B, 0x04, 0xA9 }
</pre>
}, // 505
Initial key to encrypt step 2 packet.


Step 3 AES128ECB key:
{
<pre>
0x10400618, 0x00000010,
39AF55239062D2F3F6CBB401EDC54C09
{0x73, 0x86, 0x7D, 0x62, 0xC8, 0x81, 0xD0, 0x94, 0x32, 0x56, 0xB8, 0xE6, 0x4A, 0x76, 0x9F, 0xE2 }
</pre>
}, // 506
Intermediate key used to decrypt Syscon step 3 response.


Ernie communication session key AES128ECB master key:
{
<pre>
0x20800C30, 0x00000020,
00000000000000000000000000000000
{0xE6, 0x2E, 0x20, 0x47, 0x69, 0xF9, 0x72, 0x47, 0x2D, 0x6F, 0xF9, 0xB5, 0x18, 0x58, 0x7A, 0xA4 }
</pre>
}, // 507
Unused with command AuthEtoI.


Step 2 passphrase:
{
<pre>
0x41001860, 0x00000040,
4231FFB14B941DBFEB44DFF97E64EC7D
{0x94, 0xF7, 0xEB, 0x0D, 0xFE, 0x7D, 0xF2, 0x35, 0x3E, 0xC6, 0xF8, 0xBB, 0x99, 0x7F, 0x56, 0xB3 }
</pre>
}, // 508
Checked in Syscon only.


==== Keyset 0xE ====
{
0x820030C1, 0x00000080,
{0x8C, 0x51, 0xCE, 0x7F, 0x3C, 0xC2, 0xE8, 0xF6, 0x5E, 0xFE, 0x29, 0xEA, 0x04, 0xFB, 0x16, 0x92 }
}, // 509


Step 2 AES128ECB key:
{
<pre>
0x04006182, 0x00000101,
E55364616CA8C3DD2859B1D913E1CC15
{0xF7, 0x4A, 0xA9, 0x3C, 0xC9, 0x29, 0xE0, 0x8F, 0xE9, 0xC5, 0x5F, 0x9C, 0x84, 0xE5, 0x77, 0x43 }
</pre>
}, // 510
Initial key to encrypt step 2 packet.


Step 3 AES128ECB key:
{
<pre>
0x0800C304, 0x00000202,
02DA870FB5983DE568E324DDF5330C9D
{0xE2, 0x04, 0xAF, 0xE0, 0x16, 0x21, 0x46, 0x8D, 0x1C, 0x9F, 0x66, 0xF3, 0x24, 0x4B, 0xE8, 0xCC }
</pre>
}, // 511
Intermediate key used to decrypt Syscon step 3 response.


Ernie communication session key AES128ECB master key:
{
<pre>
0x10018609, 0x00000404,
D606A99E381A4B440DB9A8A87F608F1B
{0xA5, 0xC5, 0x37, 0x52, 0xE2, 0xAE, 0xFB, 0x4A, 0xAF, 0x4F, 0x5B, 0x40, 0x78, 0x66, 0x04, 0x32 }
</pre>
}, // 512
Master key to generate Ernie communication session key (stored in Bigmac keyslot 0x511) by encrypting step 2 data.


Step 2 passphrase:
{
<pre>
0x20030C12, 0x00000808,
8082307DA258780D5088C40218B98EFC
{0x35, 0xDB, 0x41, 0x96, 0x46, 0xC3, 0x5A, 0xA1, 0x74, 0x8E, 0x64, 0x52, 0x9E, 0x90, 0x41, 0x49 }
</pre>
}, // 513
Checked by Syscon only.


Step 4-5 passphrase:
{
<pre>
0x40061824, 0x00001010,
D14A64DF4011E110325E159602F23BA7
{0xEA, 0xD8, 0xD2, 0x13, 0x68, 0x87, 0x84, 0xD5, 0x83, 0xC1, 0xBA, 0x84, 0x21, 0x39, 0xB0, 0x1A }
</pre>
}, // 514
Checked by both Syscon (step 4) and cMeP (step 5) to ensure packet authenticity.


== Ernie SNVS Keys ==
{
0x800C3049, 0x00002020,
{0xBF, 0xA3, 0xBF, 0xF4, 0x77, 0x5C, 0x9E, 0x66, 0xF2, 0xF4, 0x50, 0x89, 0xD6, 0xCF, 0xCB, 0xCC }
}, // 515


=== Prototype Ernie SNVS Keys (min FW < 0.996) ===
{
0x00186093, 0x00004041,
{0x8E, 0xBB, 0x73, 0x94, 0x7B, 0x91, 0xEA, 0x57, 0xE4, 0xA2, 0x45, 0x2E, 0x1D, 0x67, 0xB3, 0x4C }
}, // 516


Maybe also eMMC Keys.
{
0x0030C127, 0x00008082,
{0x22, 0x37, 0xE4, 0x0E, 0x4D, 0x22, 0x48, 0x09, 0x73, 0x5B, 0xF9, 0xD5, 0xE4, 0xA2, 0xCE, 0x15 }
}, // 517


These constant keys are used instead of per-console keys stored in Bigmac keyslots 0x502-0x504.
{
0x0061824F, 0x00010104,
{0xA0, 0xF8, 0xDF, 0x8A, 0x66, 0x41, 0x65, 0xA2, 0x70, 0xFD, 0x06, 0xE8, 0xCE, 0x6B, 0x65, 0x40 }
}, // 518


==== AES XTS Tweak Key ====
{
0x00C3049E, 0x00020208,
{0x35, 0x5E, 0x13, 0x9D, 0x27, 0x71, 0x90, 0x58, 0x2C, 0x29, 0xDC, 0xED, 0x78, 0xC5, 0xD6, 0x95 }
}, // 519


<pre>
{
E122F9C47E1C94F082536A1F244B9A9C
0x0186093C, 0x00040410,
E08DA5E8E122F9C47E1C94F082536A1F
{0xDD, 0x00, 0x1E, 0x73, 0x6E, 0x0A, 0x95, 0xE7, 0xF7, 0xE0, 0x68, 0x24, 0x3B, 0x70, 0x29, 0x61 }
</pre>
}, // 520


==== AES XTS Decryption Key ====
{
0x030C1278, 0x00080820,
{0xAA, 0xC5, 0xE8, 0x30, 0xCD, 0xA7, 0x8F, 0xED, 0x0D, 0x78, 0x32, 0xF7, 0x0A, 0x3E, 0x03, 0x88 }
}, // 521


<pre>
{
244B9A9CE08DA5E8E122F9C47E1C94F0
0x061824F1, 0x00101040,
82536A1F244B9A9CE08DA5E8E122F9C4
{0xD4, 0x2D, 0x76, 0x9C, 0xE7, 0x87, 0x9B, 0x85, 0x92, 0xDB, 0xBD, 0x10, 0x80, 0xF8, 0x93, 0x13 }
</pre>
}, // 522


==== HMAC-SHA256 Key ====
{
0x0C3049E2, 0x00202080,
{0xD3, 0xBF, 0xDA, 0xC8, 0xFE, 0x3B, 0xB1, 0xA3, 0x26, 0x72, 0xB5, 0xCA, 0xFD, 0xEF, 0xB2, 0xD3 }
}, // 523


<pre>
{
EDF481EF0AFF55CD1A643E8A7AF50911
0x186093C4, 0x00404100,
36A7749CEDF481EF0AFF55CD1A643E8A
{0x3F, 0xE8, 0x9E, 0x4D, 0x6C, 0x2A, 0xEE, 0x4D, 0xF4, 0xBC, 0xD0, 0x0C, 0xA7, 0xCE, 0xF5, 0xF9 }
</pre>
}, // 524


== Mystery update_service_sm Keys ==
{
0x30C12789, 0x00808200,
{0xD4, 0xDF, 0x2B, 0x7E, 0xEB, 0xEE, 0x1A, 0xDC, 0x77, 0x8B, 0x61, 0xFF, 0x42, 0x1E, 0x2B, 0x8B }
}, // 525


These keys are found in update_service_sm and are used for something unknown. They are not used by the PS Vita.
{
0x61824F13, 0x01010400,
{0x3D, 0x66, 0x75, 0x8A, 0xBC, 0x13, 0x58, 0xC0, 0x0E, 0xD9, 0x02, 0x02, 0x24, 0x11, 0x2D, 0x72 }
}, // 526


=== SCE WaterMark External (Not Used) ===
{
0xC3049E26, 0x02020800,
{0x6D, 0x11, 0xF4, 0x19, 0xD4, 0x03, 0x8C, 0xF9, 0x3B, 0x82, 0x97, 0xE7, 0x5D, 0xDE, 0x71, 0x22 }
}, // 527


Exponent: 0x10001
{
0x86093C4C, 0x04041001,
{0x73, 0xA3, 0x12, 0xA3, 0xDA, 0xFB, 0xD7, 0xD6, 0x6B, 0xD7, 0x8B, 0x30, 0xA1, 0x0E, 0xAE, 0x07 }
}, // 528


==== P ====
{
0x0C127898, 0x08082003,
{0x5B, 0x72, 0xFF, 0xA8, 0x3A, 0xDC, 0x32, 0x13, 0x49, 0x97, 0x07, 0xDF, 0x1C, 0xF6, 0xE3, 0xD5 }
}, // 529


<pre>
{
EA236F5002D0B5EB937ED04E5A100276
0x41001861, 0x00000040,
26A47DB379E2B3049EA2CC6ED5E48B5A
{0x14, 0xE3, 0x88, 0x2F, 0xA5, 0x4E, 0xF4, 0xBA, 0x9B, 0xC2, 0x36, 0x55, 0x74, 0xBC, 0x84, 0x15 }
A8BA066A7827D2D5D83C238F7BA807B9
}, // 530
43E07616C77E69AA2A2FC447C3FC5A1B
BB4678E6931078DA24DF6904E8F5C628
EFC79548F49D7665A8FA40B4B24679AB
B4AADD00AF0829B0CB97A2A6FD44E813
BFCC06C46B1DB91E4CB30C992B255E21
</pre>


==== Q ====
{
0x820030C3, 0x00000080,
{0x81, 0xDC, 0x65, 0xD6, 0xD5, 0xD8, 0x91, 0xFD, 0xE9, 0x00, 0x68, 0x7E, 0xFF, 0x41, 0x1D, 0x13 }
}, // 531


<pre>
{
E22A87F84528A12EB31AAA6A8FC4D6EF
0x04006187, 0x00000101,
6352133A4D6ABDF917A0967370307E65
{0x53, 0x00, 0x35, 0xCF, 0x6A, 0x44, 0x0C, 0xF5, 0xCC, 0xC8, 0xDE, 0x6C, 0x49, 0x12, 0xC0, 0x18 }
98216D4A251FFAFDDF41F79CFAF477D6
}, // 532
B7A513B953E0F42D27C5687EBE39FFF9
A48C6000D34F5FFE92FE1967C5B6E42A
CC38FDB71294042FA0695F19C502FAD1
BD125672C0C20AD029B75379CCE2BBAA
D88FE9EC4B3C18269CEEE87DA330DF99
</pre>


==== DP ====
{
0x0800C30F, 0x00000202,
{0x73, 0x74, 0x90, 0xA9, 0x8C, 0xFF, 0x75, 0x5B, 0x73, 0x18, 0x7F, 0x31, 0x78, 0x9C, 0xB0, 0xD8 }
}, // 533


<pre>
{
75F155A0335AD9590ADA85AA025A3033
0x1001861F, 0x00000404,
3E31FC140DA0F1D6B0E6871E89E66F80
{0x73, 0x28, 0x2B, 0x6C, 0xF4, 0xBE, 0xC3, 0x42, 0xF7, 0x88, 0xFC, 0x10, 0x8C, 0xEA, 0x1E, 0x39 }
42A03A9D255BC22BF09A12BBB369A842
}, // 534
5DFBD2E094AB8C24A8CD990D219F9BF0
7E3CF8A8058AF5A5C58F38C2BD6B18E0
0431407518ABBD39668E714BD4C60582
46270FDEC94CCE5B7DA32BCEFCA3DA58
207471303E5921A82EB0BEF6E53214A1
</pre>


==== DQ ====
{
0x20030C3E, 0x00000808,
{0xB1, 0xAE, 0x98, 0x70, 0xAB, 0x6D, 0xEA, 0x50, 0x7D, 0x22, 0x66, 0x5D, 0x82, 0x42, 0x2D, 0xFC }
}, // 535


<pre>
{
2948B0373E9093138E3810E190CAD29D
0x4006187C, 0x00001010,
32191A4F6B304FEB3747E60EBE6CEBB5
{0x38, 0xBC, 0x6E, 0x2B, 0x0F, 0x03, 0x86, 0x47, 0xDB, 0x92, 0x95, 0xFD, 0x76, 0x2A, 0xBE, 0x7A }
A9D67837AF9D2DD8C7B727F6ECCC514F
}, // 536
CD880198B3D9FD587CC9093111924ECA
8821E3A862EA3B50A20E661ECE357B62
E0928AA5AF6B7B742228F9E61F5352EB
9442D3AAF0CABAE492A8D741058861CF
66E6A641AEDE125E82090E4158D7A409
</pre>


==== DinvQ ====
{
0x800C30F8, 0x00002020,
{0x1C, 0x6C, 0x3B, 0x97, 0x3F, 0xBD, 0x63, 0xAB, 0xF5, 0xE2, 0xC9, 0x49, 0xC8, 0x9D, 0x3C, 0x05 }
}, // 537


<pre>
{
68A77889A624A12BFF7013D4A390B101
0x001861F0, 0x00004041,
77F18C6E2AA0894408B328F78A1DF319
{0x32, 0x1B, 0xB0, 0xE2, 0x3A, 0x87, 0xD7, 0x0E, 0xCC, 0x76, 0x2A, 0x53, 0xFA, 0x6B, 0x98, 0xCB }
B9C243C815C293A8B080C40849B811CE
}, // 538
1168821C3AF49F6B771F3DE4396F731E
4402679475F5379077B70FA44F495B1B
36B89F7E62C37333344F54FAE248CB69
EB92F540E65F50A1D19F98AA476EF103
71648229865145C3FE240F4BD6D83254
</pre>


==== Modulus ====
{
0x0030C3E1, 0x00008082,
{0xDF, 0x69, 0xD4, 0x06, 0x80, 0x28, 0xD2, 0xF9, 0x6F, 0x5C, 0x9F, 0x87, 0x5E, 0xCD, 0xA1, 0x5C }
}, // 539


<pre>
{
CEDA2E70A6E473CB8F6CCBC808B75C88
0x006187C3, 0x00010104,
C3B31125793EE135DDF2D36D68C22011
{0x61, 0x34, 0xC7, 0x98, 0x0A, 0x5A, 0xAA, 0x18, 0xF0, 0xDA, 0xF1, 0x20, 0x99, 0xB2, 0x21, 0xE7 }
77079AF5234E8774B0634C6EAD9918C1
}, // 540
8024C67A4A4F4060B6C7AFE5E4BE6BE1
132CB334D0FABEBF64F5B23E711F8AF9
E7DE33C93239AD416DB61408A92CD768
687DCD5C37F2771F508790C461B3C475
8C5147FBE9C3A1F3A51898FD44BB6BAD
ACEF2EB5CA7D48EFFDC27E9350A9A29C
DBC478D5B8B64953DAEEF6A610E90B8A
D6F5A65C3E44662F028F4415268BF184
B939E6FB0C754D8B29C6C82B654B46F6
6ACC1E29B7A359A88BB42CCD21D3D0A8
54065DF50A34A6D8B80C5E76583E0EB0
DA4A7E60032476DDFA6C94FC4056CBE2
B2E6841E502D53673F67B42DFF8400B9
</pre>


==== Private ====
{
<pre>
0x00C30F87, 0x00020208,
B3D81690734A253352DBF0C15672B5CD
{0x21, 0x64, 0x30, 0x78, 0x11, 0x8C, 0xD9, 0x3A, 0x48, 0xF0, 0x18, 0x55, 0x9D, 0x2C, 0x7B, 0x6A }
62F9096B5F634043A9593A61E1B70652
}, // 541
A8FEBFC76A8F184E681DAD927CF4A305
79F87F684BBB63E9B2812379E9CB75D8
16E7C257A56A9CF5A33DCB5F66D359ED
B59F07BF621FAB773B8017230093B025
62D41DFC93D807A1FE4E1F9BDEA681A5
01FE996B78EF529B976B2F78E48D5F2B
ECFDBE4744369BC8889AEC72B2FD4685
0666D3BE61B21A85AB145240E4D4374A
7FFEFF13A77076B6C9297E3BF0DB6A64
B39B6175B86EAE1DDB02AEECA452C931
506D31BE5B1129A9883117A90BF579EA
0AD2DE86EFBB8E7C8275CC6E01B4296D
90F567B310DA64E0A356018C25D11241
71A21254346E24B2DD883480618DBC01
</pre>


=== SCE WaterMark Internal (Not Used) ===
{
0x01861F0E, 0x00040410,
{0xCC, 0x6D, 0x0D, 0xA8, 0x6B, 0x1C, 0x53, 0x4E, 0xF6, 0x35, 0xFC, 0x6E, 0x68, 0x48, 0xB4, 0x4B }
}, // 542


Exponent: 0x10001
{
0x030C3E1D, 0x00080820,
{0x54, 0x00, 0x92, 0xD6, 0xD5, 0xC5, 0x82, 0xB7, 0x61, 0xF1, 0x20, 0xE1, 0x7B, 0x13, 0x45, 0xB0 }
}, // 543


==== P ====
{
0x06187C3A, 0x00101040,
{0x87, 0x56, 0x29, 0x25, 0x8C, 0xC9, 0xA0, 0x78, 0x86, 0xD2, 0x46, 0x1E, 0x1C, 0x20, 0xF3, 0x95 }
}, // 544


<pre>
{
E2946A07650E5C657AC662EB1A6DD6DF
0x0C30F875, 0x00202080,
E44618AF35247EEF5E54559F581DBEAD
{0x23, 0x8C, 0xB0, 0x2D, 0x93, 0x6C, 0xC3, 0xF6, 0x20, 0xA6, 0xBE, 0x71, 0xE3, 0xB3, 0x4E, 0xC4 }
1AC2CF038ABF663344366F76E323F382
}, // 545
1A3F3699C972664E636E1373130E8AA3
71721B530CA58B8EA30E338AD1827FAC
8147AFE207B116CCEC9EB9D9C5A8D48F
788A98CE6B5E2A99FE27F7197A5D6548
93C84D4292F394C1A4CD6D09FF06F7E5
</pre>


==== Q ====
{
0x1861F0EA, 0x00404100,
{0x6F, 0xF0, 0x67, 0x10, 0x75, 0x96, 0x87, 0x57, 0x84, 0x43, 0x31, 0xA3, 0x0C, 0x85, 0xC8, 0x98 }
}, // 546


<pre>
{
D369EC809646C3D07EBA35124F20FA33
0x30C3E1D4, 0x00808200,
D7ADC2E1C1A31D5909533F88CEEE6AD3
{0xBE, 0xD3, 0x43, 0xA0, 0x64, 0x62, 0x9B, 0x24, 0x3C, 0xBE, 0x89, 0x37, 0x21, 0x0C, 0x97, 0xFD }
BF0FDFAFE67165DAF7229CA4F230CB7C
}, // 547
2C7D4525A942637ABCB843A8C2388B27
88848689DA3423A0D9CA8837A7BC1D9D
D5A89374689B77BC53C0FFB196A2A0F3
1D81E81F302A544C18942A44F08B8CF9
36D66ACA38512B5C5550AE178887151B
</pre>


==== DP ====
{
0x6187C3A9, 0x01010400,
{0x5C, 0x2B, 0x5E, 0x1D, 0x58, 0xA8, 0xF5, 0x0D, 0x14, 0x9B, 0x31, 0xB7, 0x81, 0x50, 0x66, 0x18 }
}, // 548


<pre>
{
2FB4FE2A366DF2A86F546C2982741425
0xC30F8753, 0x02020800,
2A24543837E14A54CE30C5A27A6430EC
{0x78, 0x4C, 0xFC, 0xD9, 0x13, 0x25, 0xC2, 0x7E, 0xD2, 0x4B, 0xE1, 0x95, 0x18, 0x43, 0xFA, 0xF6 }
B3D0C6D3C11811C5C39C0E9622B74423
}, // 549
65B15FA6BBD2B995D1BBB09EAF2985A9
6A4E9350463E69070C70060C3996D799
13D36B461546853D7AA8E50AE4626AF7
1673603F3E3E228C30066C31D220EE1D
7CF854C42ABADCDC74FDC7F2ADDEE2BD
</pre>


==== DQ ====
{
0x861F0EA7, 0x04041001,
{0x8A, 0x65, 0xCF, 0xA9, 0x38, 0x4E, 0x57, 0x74, 0x1C, 0x67, 0xDE, 0x6F, 0x33, 0xD6, 0x77, 0x41 }
}, // 550


<pre>
{
47054E6DE40DE1BA28D864FBC1995274
0x0C3E1D4E, 0x08082003,
180047778F953C46ACDB4A7CAB076CDB
{0x45, 0x77, 0x40, 0xDA, 0x9B, 0xFA, 0xE2, 0x7E, 0x12, 0xD0, 0xF7, 0xEF, 0xE1, 0xDF, 0x6C, 0x75 }
B5539FD17798A09EEE66B238B723AD38
}, // 551
09BA0B809B5BB20F89565D6453DAAAE4
9CF7E83A67131CE4EC451D7D94DB9D17
68AF38D9E24A57EEEC33E9B1BEE8E328
C8C0DB399EF4995CF6E4CF4E598087DB
3090D74F179C2CF4D7B442C7A515BC01
</pre>


==== DinvQ ====
{
0x40C01861, 0x00000040,
{0xDF, 0x74, 0x6E, 0xE9, 0xED, 0xA0, 0xC8, 0x2C, 0x1C, 0xE2, 0x67, 0x0A, 0x26, 0x47, 0x42, 0x14 }
}, // 552


<pre>
{
5B917A6768A9912815A0F09D2A8AA77D
0x818030C3, 0x00000080,
72F1230A81987BB9452EF03BE0B5B63F
{0x9C, 0x93, 0xC1, 0xDE, 0x0C, 0x49, 0x71, 0x9B, 0xD6, 0x1A, 0x24, 0xCC, 0x98, 0x15, 0x16, 0x65 }
10AA391219D3EA92A3F2330F6899B458
}, // 553
DF04818DF79E126E84293595EBC60275
D96FC1D4DEAA024FF59E4187934BCDA2
B11BD26D941E6FC4E979BD12DB197D2A
D6EE300BA0E0A46CF2531B84F5F0102B
B714B9D176C46A8BDF3CFA8CD4DF6EDF
</pre>


==== Modulus ====
{
0x03006186, 0x00000101,
{0x2A, 0x6B, 0x90, 0xBC, 0xD3, 0xCD, 0x18, 0x1F, 0xF2, 0x2F, 0xF5, 0x72, 0x71, 0xC8, 0xB2, 0x02 }
}, // 554


<pre>
{
BB1E13963648B5EC36EC4DDD00DD3752
0x0600C30C, 0x00000202,
53B47A3FD452BB67F1FB8B0967DDAB08
{0x33, 0xDF, 0xC3, 0x2B, 0x61, 0x49, 0x8D, 0xE3, 0x18, 0xE3, 0x4D, 0x6B, 0x9B, 0x5C, 0xD8, 0xD6 }
AA82456200CC9006D27DD00144F36C5C
}, // 555
98EF4A2C53074C654978F49AE82E2589
887E2DF24E748BDB1B2EE222F8C6EC6E
0DF3C32666209882C008D66AEE35F18F
D8A810B886B1A926C3C96906482FAB7B
103EF76900FE7C1DF13041051398CAE8
83B8485069F98CB78CD275C96714DB22
C91CF19B4BE2C77AC228C93DFA0B09DA
ADE4ACFDA26D66DFFD18DDE58895A34C
A6377C2594603FE41E0C5062150761D8
73FB5394D1032FC0929F9ED6C5BE051B
039C6C5BF5D92BEBC3EC83EC06E3CC7B
5EC1BCE445622741CD60BE2DDCF83848
BC86B3EBF987C438320B6DEAD9D4EE27
</pre>


==== Private ====
{
0x0C018618, 0x00000404,
{0x91, 0x73, 0xB8, 0xF9, 0xD3, 0xB0, 0x35, 0xF7, 0x8E, 0x91, 0x57, 0x8B, 0x91, 0x82, 0x4F, 0x43 }
}, // 556


<pre>
{
57CA38AE5531B008EF8BD6CC45C78459
0x18030C31, 0x00000808,
1FE4A126A95B5789E1427F6D1E4A2620
{0xEE, 0x9D, 0x50, 0x20, 0x73, 0xD4, 0xAD, 0xCF, 0x7A, 0xAA, 0xF8, 0xA9, 0x70, 0x25, 0x11, 0xC6 }
9EBF18066F118AD1689896AAC1CAE3A0
}, // 557
5E3086C05D042397B1ED09F653D0B2D3
E03233246822CE2B3289C0975FD914BC
5DD76C4BEBC687477109B46FDEEB7836
611419243A2DC88AE378EFC97EBCBEDB
B23798A4AF4EB6B4E5A01A21639C6036
0177A834BD946F442BF650F59030FF2F
28A18A31B6D45463FF8A7701764916C1
8E7A12B0848146B1FB1120405DD5A848
0D0C0C97DE5C2FC162362FCA01C71AE7
87C4040DA1D36EFAA318F91960FAB59E
76251FE9F34A91DCD2938FAFE2DA2E93
F2B6F53739616158064D1D3546F25B8C
8E9AA4D58542F3FDC91793ABD8EA6061
</pre>


== PKG HMAC Keys ==
{
0x30061863, 0x00001010,
{0x2D, 0x42, 0xF4, 0xDE, 0x2A, 0xA3, 0x27, 0x69, 0xDC, 0x68, 0x4D, 0xA8, 0xFA, 0x78, 0x20, 0x25 }
}, // 558


* present in 0.920 os0 update_service_sm I
{
0x600C30C6, 0x00002020,
{0x13, 0xAA, 0x5F, 0x70, 0x7F, 0x70, 0xD1, 0x0C, 0x31, 0xF9, 0x76, 0x8C, 0x62, 0xC4, 0xE0, 0x00 }
}, // 559


<pre>
{
DBE1A473887A076D204B6CE361EFE4B9
0xC018618D, 0x00004040,
C540E10B7EEE29C0A225CDAE10E6134C
{0x6A, 0x6A, 0x32, 0xEA, 0xB9, 0x30, 0x42, 0x3F, 0xAF, 0x91, 0x8A, 0xEB, 0x8B, 0x8C, 0xD4, 0x14 }
59D6CDA0F426D9F0B4F8C5BAA0EF397B
}, // 560
D38FB0F9B9100B4615816B1F6810D651


F8EAFE04E0A66FCDDCD6CD2746DEBBEE
{
81C614EED15E02CFA9D1F87F64AE7597
0x8030C31B, 0x00008081,
B38B2AA048A3E0B14DA36904B01E4DAA
{0x08, 0xFC, 0xC5, 0xE1, 0x4D, 0x23, 0x6E, 0x74, 0x64, 0x04, 0x9E, 0x1C, 0xBD, 0x2F, 0x05, 0xE9 }
C1317E63E6DE80196EBE2D0CC2715494
}, // 561


A6E0B640BEEC23CC82DEDE0A227C5A58
{
89D238906A7EFE369596A1346F0B3547
0x00618637, 0x00010103,
2654F43DEE032837601A3246514DF4E2
{0x6A, 0x96, 0xF4, 0x4B, 0x99, 0xA2, 0xA8, 0xC7, 0xBC, 0x76, 0x21, 0xE7, 0x14, 0x50, 0x6A, 0xEC }
E109829A60ABD62521EFE0FAC812E6DD
}, // 562


8D814CE4C9C3298346F74079F077A2C8
{
4BA0EA40E7BF55305F24976E2E3F7D97
0x00C30C6E, 0x00020206,
D37DC6B65149FF8560199FABF74A495E
{0x8F, 0x45, 0x3B, 0xA9, 0x03, 0x5C, 0x86, 0xF7, 0x55, 0x02, 0xA3, 0x08, 0xED, 0x5F, 0xF3, 0x3A }
569EFEB78B4E128F914367C953405C13
}, // 563


5C93D3939B27B2CABD19848FF9075E81
{
00C92BBC9D4B5D1A4D135ADDE1FBD71B
0x018618DC, 0x0004040C,
66B724BDBA101D6A3057234895393610
{0x83, 0x40, 0x83, 0x1C, 0x45, 0x14, 0x5B, 0xB7, 0xF8, 0xEE, 0x00, 0x72, 0x00, 0xD7, 0x59, 0x35 }
91ED466F251A38EE90825F6287DC8C77
}, // 564


C7939B509967CE44A815F3D3A69F3BCA
{
24080619F39B8B0D3EC22BFBE584D7C2
0x030C31B8, 0x00080818,
B7124FD11B94F8004AD477AE689D0C1D
{0xF9, 0xA7, 0x13, 0x23, 0x9C, 0x9E, 0x39, 0x0F, 0x1A, 0x0F, 0x4D, 0x10, 0x2F, 0x81, 0xFE, 0xA1 }
B3B4E59E880163B279C83671F22FD285
}, // 565


7721C65140A2CA799F366C7275C09F9D
{
A03F12CC9D71C4BE21209167D403E834
0x06186371, 0x00101030,
9A831933A1D109D24DC850246D39EEEC
{0x06, 0x84, 0x8F, 0xC9, 0x52, 0xDB, 0x6A, 0x24, 0x66, 0x57, 0x5B, 0x5E, 0xA1, 0x4F, 0xBC, 0x66 }
CA64137119A95F5FB57E0EC310C2A73E
}, // 566


AF92C200B8EBCA305C1D1273B636F912
{
B23247A4C573A69BA525D3AD5177F3EE
0x0C30C6E2, 0x00202060,
C45764EF426B6DA37AB25C37D5EE99AB
{0x0C, 0xAF, 0x87, 0x0B, 0xC1, 0x12, 0x5B, 0x0A, 0x71, 0x8F, 0x33, 0xB0, 0x13, 0x06, 0x9E, 0xA2 }
7ABDFCC9ED82C94C3016EDD295872061
}, // 567


C80EAAB7E368851BCC3319D806D5B5E6
{
AF613993B86F437AF05528219C549256
0x18618DC5, 0x004040C0,
AC26FE362692EC55152E706CBB078A7A
{0x0E, 0xC1, 0xA0, 0x82, 0x3D, 0x71, 0x1F, 0xB2, 0x32, 0x91, 0x5B, 0xC8, 0xF1, 0x41, 0x6B, 0x7A }
0B35A20425BD8A18C581622359EEF7AE
}, // 568


B68C19699474A019CA7BAE575B1F5B7C
{
6DD7A4C115B208666A9A93418DA224B7
0x30C31B8A, 0x00808180,
A202B21059BEA357A96B5A6D7AF01E9E
{0x1E, 0x35, 0x32, 0x4D, 0x0C, 0xB3, 0xF5, 0xF2, 0xFD, 0x79, 0x52, 0x09, 0x9A, 0xA1, 0x15, 0xD3 }
97CF303CA1207F58743E83CED77700BF
}, // 569
</pre>


== KIRK command 7 New Keys ==
{
0x61863715, 0x01010300,
{0xF8, 0xD6, 0xC0, 0x78, 0x19, 0x46, 0x8A, 0x54, 0x46, 0xCA, 0x58, 0x99, 0xAF, 0xD2, 0x90, 0xEE }
}, // 570


<pre>
{
kirk7_key80 = 83FFF149A687A5C5CD95779352C8BF66
0xC30C6E2A, 0x02020600,
kirk7_key81 = D83D2D277CE2DE154A4E2AA6D1E8D20B
{0xA5, 0x39, 0x74, 0x2D, 0xA0, 0x65, 0x5D, 0xEF, 0x3B, 0x66, 0xE8, 0x8A, 0x80, 0xA4, 0x54, 0x4B }
kirk7_key82 = 4C5C71519F62A5FE5EF36D4B075BE2F3
}, // 571
kirk7_key83 = 8005EF43124F650A9DF158F72A509C10
kirk7_keyC0 = BF57AEF02DC587F327C8C3F8BDECA5EE
kirk7_keyC1 = 9FFF2EECED8476D900DFD579E1AAAB63
kirk7_keyC2 = 04460D61F563D46C0C4EB9AAE5466E84
kirk7_keyC3 = 1E5B17DAC321E6B8DFE7718CA2930370
</pre>


== IdStorage Keys ==
{
0x8618DC54, 0x04040C01,
{0xB8, 0xCE, 0x26, 0xFB, 0x0D, 0x65, 0xDB, 0x1D, 0x5C, 0x85, 0x81, 0x28, 0x16, 0x5C, 0x6A, 0x00 }
}, // 572


=== PS Vita IdStorage leaves 0-0x7D RSA2048 Public Key ===
{
0x0C31B8A9, 0x08081803,
{0xE3, 0x1E, 0xAC, 0x47, 0xBC, 0xC5, 0xB2, 0xF0, 0x04, 0x15, 0xC2, 0xAC, 0xE4, 0xDC, 0x7B, 0x6D }
}, // 573


<pre>
{
E9 18 F0 8E F8 D1 ED 4A 5E 80 65 44 15 5D AF 3E
0x41401861, 0x00000040,
99 CD 65 65 5C 5D FE BC BA 59 A4 AB 52 81 63 53
{0x75, 0xDB, 0xEA, 0x93, 0x09, 0x9E, 0xB5, 0xEC, 0x18, 0xCA, 0x05, 0xF1, 0x79, 0xA4, 0xD8, 0xC9 }
B1 DC 9C 0E BB 70 F7 48 57 47 9C 4C 49 00 8E E4
}, // 574
F7 55 93 14 71 67 DF 9C 92 8E D8 42 4A 10 75 50
D0 9F 6A 48 57 9A E3 86 BF 6B A3 0C 73 57 00 DC
F7 CB 2B B3 7C 03 11 CC EC D9 0F BA A1 2E E5 EE
5C D3 10 D5 0F 1D 58 C1 23 8B CD 7B 9E E6 2C 7F
4C AE 11 01 8C A5 AE F0 D5 C2 8D 5E E9 F6 6F 1E
37 8B B4 BD BC C0 2F 3D 3D 6E F8 E6 35 EF B6 C2
EF 82 ED AD 07 16 5A 4D A4 AB 83 76 14 9D 6F 29
6D AD DA 83 CF 0D F3 9F 9C 6B AC 79 61 B6 6F 32
60 34 99 B4 C3 9C 94 D7 1A 29 8A B4 12 D8 42 F9
69 C3 0E 47 EF 86 FD 35 E5 CD 23 E8 95 B3 E1 A3
D6 E9 CA 90 8F 46 59 FE BC B3 00 C0 9C E7 34 07
5A 7F 85 2A 5B AD 82 B8 52 85 74 6F 73 45 C2 5F
4B 7A 8D 85 70 8B 6C FD AA 59 70 BF 33 00 79 D5
</pre>


* Exponent is 65537.
{
* Found in PS Vita factTest.self.
0x828030C3, 0x00000080,
* Signature is stored in PS Vita IdStorage leaf 0x7E offset 0x60.
{0x7C, 0xCC, 0x40, 0x55, 0xE9, 0x61, 0x6F, 0xA9, 0xC9, 0xA0, 0x93, 0x1B, 0x03, 0x0A, 0x23, 0x46 }
* PSP IdStorage does not have this signature.
}, // 575
* This signature does not seem to be checked on console boot. It might be used only during manufacturing/servicing to ensure that IdStorage leaves 0-0x7D have been written correctly. This implies that IdStorage leaves 0-0x7D are not meant to be edited after manufacturing, contrarly to some other leaves.


== IdStorage Certificate Keys ==
{
0x05006187, 0x00000101,
{0xB0, 0x15, 0x45, 0x35, 0x8B, 0x86, 0x6B, 0x28, 0xB3, 0x07, 0xC8, 0xD7, 0x3D, 0xC7, 0x08, 0x6D }
}, // 576


=== IdStorage Certificates ECDSA Public Keys (160 bit) ===
{
0x0A00C30E, 0x00000202,
{0x8A, 0xC7, 0x00, 0x16, 0x38, 0x65, 0x9C, 0xCB, 0x5B, 0x29, 0xBF, 0x86, 0x27, 0xC0, 0x02, 0xE9 }
}, // 577


==== PSP Certificates ====
{
0x1401861D, 0x00000404,
{0xDA, 0xED, 0x39, 0xDF, 0x97, 0xFF, 0xEE, 0xFA, 0x61, 0xF8, 0xC6, 0x54, 0x7B, 0x92, 0x9A, 0xDF }
}, // 578


<pre>
{
4004C80BD9C8BA38221065923E324B5F0EC165ED6CFF7D9F2C420B84DFDA6E96C0AEE29927BCAF1E Sec.0 PSP IDPS
0x28030C3A, 0x00000808,
06485FD029853B552F7EFDD67A2DE7A1A4E25537B2459D8786426D5B27EFA5A9311CB8ABABFA0ECE Sec.1 PSP IDPS
{0x3D, 0x08, 0xE4, 0xF7, 0x8F, 0x65, 0xF1, 0x40, 0xF5, 0x7F, 0x8A, 0x41, 0x5E, 0xC6, 0x12, 0xE8 }
3F8C34F210AEC48E1520FF2A44899E054A0DA33DF8B9754B09C0EC7E61867A5126FE6926972196F5 Sec.2 PSP IDPS
}, // 579
CCB3440DC4836DD519E13B2805B30870DCAEE462136B3888651A98E02B29FA0CD34F1616F1ED5786 Sec.3 PSP IDPS
08B336925C2B445D03A9BE51B9AABF54E4CC142EA72A23BB8060B03B71CDE0772DE82AD8931648D6 Sec.4 PSP IDPS
4F0A2BC9987640860E22EE5D86087C9692470BDF59DC4C1F2E38F92CE7B66875B59ED10C9D84FA6A Sec.5 PSP PSID
</pre>


==== PS3 Certificates ====
{
0x50061874, 0x00001010,
{0xB8, 0x6C, 0x5E, 0xE2, 0xAD, 0x7A, 0x03, 0xDA, 0x64, 0x4B, 0x06, 0xA0, 0xA6, 0xF5, 0xC9, 0xCF }
}, // 580


<pre>
{
94D100BE6E24991D65D93F3DA938858CEC2D133051F47DB4287AC86631719B31573EF7CCE071CA8A Sec.0 PS3 IDPS
0xA00C30E8, 0x00002020,
071984A1F27D1E91196410D57C828AF7115BF1A32071AA1EC25B7FBF4884F5322A26483C46D8B43C Sec.1 PS3 IDPS
{0xE6, 0x65, 0x29, 0x32, 0x36, 0xEE, 0x86, 0xA5, 0x08, 0xD4, 0x04, 0xC2, 0xBF, 0x82, 0x53, 0x9A }
1B6389CECD99843CA088E325C796F510A151C1545C5DE4E37A1D892D2504A8604C094F59063D589F Sec.2 PS3 IDPS
}, // 581
17BE639B87F138049D94398E8929DE535D1CB0DC5E7C04D720D2F3DE86F9B581DD1B6F7CDCF80DE4 Sec.4 PS3 IDPS
4B4F044420207907E3BC7D5423FF4D05E9DAA10B1F973327F7FEDEAE498BC656FF7C7459C9B993F4 Sec.5 PS3 IDPS
1F960A3BD61462553A0DC015AEC66C818CBAA8F62F733AC9F0C287D496F321058AC26669ECBED3DB Sec.6 PS3 PSID
</pre>


=== IdStorage Certificates ECDSA Public Keys (224 bit) ===
{
0x401861D0, 0x00004041,
{0x81, 0x11, 0x6B, 0xBD, 0xF3, 0x0D, 0xF9, 0xA4, 0x94, 0xAF, 0x8C, 0x26, 0x89, 0x7F, 0xDB, 0xD4 }
}, // 582


==== PS Vita Certificates ====
{
0x8030C3A0, 0x00008082,
{0x85, 0x66, 0xE4, 0x32, 0x85, 0x45, 0xE4, 0xA4, 0x09, 0x16, 0x07, 0xC0, 0x19, 0x75, 0x3A, 0x94 }
}, // 583


<pre>
{
1A9146C3AB04FBA1C32027C47C7906947CC2AB1E247AF59A8D714AF44CA559E78A2C164A77DAD5A878F516E4D905D810C73C39E70EA93198 Sec.0 PS Vita IDPS
0x00618741, 0x00010105,
A17772FD3E86091EAE2B246D5E05CE80A8E24A03C6764D26CD2443AE3DD656F919A10F87C67CB2AE280D0751E15ECD3C4FDFC9D71D7F067C Sec.1 PS Vita IDPS
{0xE9, 0x3D, 0x5C, 0x0A, 0x19, 0x25, 0xDD, 0x2B, 0x2E, 0x98, 0xDD, 0xF0, 0xF6, 0x65, 0x8D, 0x42 }
056891AE27047A7D5DE88C57612E1A7D0A7CCD369E8CF2F8F374FEA34155B20B613236C2BDFFE8187AC09C7EDF194D81A440BEB91DC6F257 Sec.2 PS Vita IDPS
}, // 584
6B0AB6A5570334E8B559CC06BA811618ADD2A1EC587A98D35A04E8B98B1D5903711469EE3049B06E1EC81EEB72A9E181D5920B453CF2C21F Sec.3 PS Vita IDPS
1C1816019AE3F8955021892257535F0E92D988E11EA45C2E908E2E208C10F3D7F3ED189EEFC027C8A91B6770A727402423CE976A3435FF8A Sec.4 PS Vita IDPS
108464CCDB76611475AEA911FBD1D476FF41F1C70D811031C552DB9B85E9941A3FD79644B717E0FEE48C4CF7387CF10E900BDBC2D7A35F5D Sec.5 PS Vita PSID
</pre>


== GC Auth Mgr ECDSA Keys ==
{
0x00C30E83, 0x0002020A,
{0xBA, 0x3E, 0xE9, 0xF9, 0xD0, 0xAD, 0x8D, 0xC5, 0x13, 0xE9, 0x0A, 0x28, 0x38, 0x15, 0xB0, 0xC3 }
}, // 585


=== 160 bit Curve ===
{
0x01861D06, 0x00040414,
{0xA8, 0x4D, 0x12, 0xF7, 0x18, 0x5C, 0x92, 0xE0, 0x10, 0x99, 0x3C, 0xA7, 0xAA, 0x43, 0xA3, 0xAA }
}, // 586


<pre>
{
p=FFFFFFFFFFFFFFFF00000001FFFFFFFFFFFFFFFF
0x030C3A0D, 0x00080828,
a=FFFFFFFFFFFFFFFF00000001FFFFFFFFFFFFFFFC
{0xAD, 0xD0, 0xD6, 0x65, 0xA1, 0xFD, 0x5D, 0xB2, 0xD2, 0xC9, 0x5B, 0xE3, 0xD1, 0x1F, 0x1D, 0xA4 }
b=A68BEDC33418029C1D3CE33B9A321FCCBB9E0F0B
}, // 587
N=FFFFFFFFFFFFFFFEFFFFB5AE3C523E63944F2127
Gx=128EC4256487FD8FDF64E2437BC0A1F6D5AFDE2C
Gy=5958557EB1DB001260425524DBC379D5AC5F4ADF
</pre>


=== 160 bit Public Key ===
{
0x0618741B, 0x00101050,
{0x5E, 0xC6, 0x4F, 0x29, 0xD8, 0x9C, 0xE5, 0xD8, 0x5F, 0x69, 0xCC, 0xA4, 0x55, 0x69, 0xDF, 0x80 }
}, // 588


<pre>
{
Qx:55D73E67B84E15B2F28C3B1F6C9DCE2911E3B4ED
0x0C30E837, 0x002020A0,
Qy:0333EEDA263BC89B7696AB5C6B69E18BF1785A80
{0x35, 0x8A, 0xB6, 0xA1, 0x8B, 0xD1, 0x56, 0x4F, 0x43, 0x34, 0xBD, 0xE9, 0xE0, 0x0E, 0x04, 0xFE }
</pre>
}, // 589


=== 160 bit Private Key ===
{
0x1861D06E, 0x00404140,
{0x42, 0xDE, 0xEC, 0xBD, 0x13, 0xE5, 0xE2, 0xB8, 0x12, 0xA3, 0xCF, 0x55, 0xDC, 0x6D, 0xF5, 0x7E }
}, // 590


<pre>
{
53CCC36EDFADBE245583270552D23B22518EE3A8
0x30C3A0DC, 0x00808280,
</pre>
{0xE7, 0x0C, 0x76, 0xDD, 0x35, 0x90, 0x2C, 0xF5, 0xF0, 0x24, 0x0C, 0x98, 0x89, 0x92, 0x79, 0x0F }
}, // 591


* Seen on FW 3.70.
{
* Used by Kirk command 0x21 (related to new PS Vita NPDRM PKG files).
0x618741B8, 0x01010500,
{0x78, 0x9C, 0x1C, 0xB4, 0x81, 0x0D, 0xD9, 0x11, 0x5D, 0xFE, 0xBA, 0xB2, 0x97, 0x67, 0x9F, 0xD2 }
}, // 592


=== 224 bit Curve ===
{
0xC30E8371, 0x02020A00,
{0xAB, 0xB1, 0x8C, 0xD2, 0x39, 0x5C, 0x84, 0x64, 0xD7, 0xB4, 0x5C, 0x2E, 0xA3, 0x19, 0x82, 0xD9 }
}, // 593


<pre>
{
p=A53E113E46D8C9C1F09D9BCB2A5373D379F69DA28D09999FED57A90F
0x861D06E2, 0x04041401,
a=A53E113E46D8C9C1F09D9BCB2A5373D379F69DA28D09999FED57A90C
{0xAE, 0xF3, 0x74, 0x13, 0x75, 0x0F, 0xC6, 0x82, 0x5C, 0x5B, 0xE5, 0x90, 0xD4, 0xB6, 0xB6, 0xBF }
b=9065941D29374A8F11DD1E540189434E4A6EBFAF5477F6C172F6855E
}, // 594
N=A53E113E46D8C9C1F09D9BCB2A522698DEEF58DB1AD9AB7F04E3AE7F
Gx=7E06098247E6B59F3110BCBB3AB6C250BC5AB06C032DAD43684C248F
Gy=0BD9418DE8E3E45D2D701E0237FD7F2ADE0D48B74CEEF2F1C8AC484E
</pre>


=== 224 bit Public Key ===
{
0x0C3A0DC4, 0x08082803,
{0x91, 0xFD, 0x62, 0xC5, 0x04, 0xD8, 0x9B, 0x4B, 0x9C, 0x1D, 0xE4, 0x0A, 0x32, 0xE6, 0x4C, 0x40 }
}, // 595


<pre>
{
Qx:5F9D171A2BDDA8D40878BF985AC326ED5EFF43C9376C77EC0A00C7BB
0x08081802, 0x00000000,
Qy:A344E44E6EAC255235F954F5B617C7BD49F180262454AAE1B62A9F2C
{0x2C, 0x7E, 0x0E, 0x11, 0x4D, 0xAF, 0x3F, 0x2B, 0x2E, 0x4D, 0x02, 0x8D, 0x3A, 0x56, 0x75, 0xFB }
</pre>
}, // 596


<pre>
{
Qx:67002D9BB8E42D2BF9610B27FEAB9B34561550921312DFEE7A3A86EC
0x10103004, 0x00000000,
Qy:6CA714426F6D4E9609A638BF4AFB182BFA50C82FF2B4C5EC6CCD9765
{0x08, 0xEA, 0x03, 0x83, 0xFE, 0xA9, 0xD6, 0x23, 0x09, 0x78, 0x3F, 0xC3, 0x03, 0x4C, 0xBD, 0x8C }
</pre>
}, // 597


=== 224 bit Private Key ===
{
0x20206008, 0x00000000,
{0x86, 0x81, 0x8A, 0xE3, 0x57, 0xEC, 0x0D, 0x1F, 0xD3, 0x6A, 0x29, 0x07, 0x62, 0xA5, 0x6A, 0x7B }
}, // 598


<pre>
{
767436A6999D88480EC856F55CEABB4396859E374599403921F55598
0x4040C010, 0x00000000,
</pre>
{0xD0, 0xCB, 0x40, 0xB2, 0x7D, 0xA4, 0xA7, 0x54, 0x7A, 0x44, 0xD1, 0xC0, 0x9B, 0xE9, 0x0D, 0x34 }
}, // 599


* Seen on FW 1.50.
{
* Used by Kirk command 0x22.
0x80818020, 0x00000000,
{0x16, 0x18, 0x85, 0x7F, 0x72, 0xE5, 0x60, 0xBF, 0x50, 0x8F, 0xC2, 0x93, 0xC9, 0x35, 0x69, 0xEB }
}, // 600


<pre>
{
607A2E5568B4B9A032F45253CFED20DB2E6E446C3782E82A1AB9C923
0x01030041, 0x00000001,
</pre>
{0xA5, 0x11, 0xB2, 0x31, 0xB7, 0x33, 0x71, 0x61, 0x89, 0x1E, 0xE3, 0x50, 0xE7, 0x5E, 0x0F, 0x0C }
}, // 601


* Seen on FW 3.70.
{
* Used by Kirk command 0x22.
0x02060082, 0x00000002,
{0xBD, 0xF7, 0x17, 0x24, 0x1A, 0xD0, 0x3D, 0x58, 0x82, 0xB1, 0xD2, 0x61, 0xEF, 0xF6, 0xBE, 0xCA }
}, // 602


== MSIF Key / Memory Card Auth Key ==
{
    D419A2EB9D61A52F4FA28B27E32FCDD7E0048D443D63C92C0B27135541D92EC4
0x040C0104, 0x00000004,
{0x9E, 0xB8, 0x23, 0x62, 0x3A, 0x2D, 0x9D, 0xA4, 0x60, 0xB0, 0x66, 0xF3, 0x6F, 0xAB, 0xFF, 0xCB }
}, // 603


== PocketStation Keys ==
{
0x08180208, 0x00000008,
{0x23, 0x5B, 0xE1, 0xB9, 0xF5, 0xD0, 0x96, 0x9F, 0xE4, 0xB7, 0x04, 0x82, 0xA2, 0x92, 0x54, 0x40 }
}, // 604


=== texture.enc key ===
{
0x10300410, 0x00000010,
{0x0A, 0x66, 0x70, 0xD4, 0x7C, 0x30, 0x4B, 0xB9, 0x6B, 0x46, 0xE8, 0xAC, 0x85, 0xBD, 0x70, 0x18 }
}, // 605


    5B27B12FCB513F79A3B610D912B09CF5
{
0x20600820, 0x00000020,
{0xC5, 0x86, 0x6E, 0x04, 0x59, 0x97, 0x5A, 0xC3, 0x5D, 0x61, 0x91, 0x73, 0x7B, 0xD6, 0x1F, 0x0F }
}, // 606


=== texture.enc iv ===
{
0x40C01041, 0x00000040,
{0x1C, 0x3F, 0xDF, 0xA2, 0x35, 0x44, 0x24, 0xA0, 0x97, 0x75, 0x45, 0x78, 0x63, 0xE7, 0xA5, 0x8F }
}, // 607


    72D859C6642BE65CF0BE141B84B93AA8
{
0x81802082, 0x00000080,
{0xAB, 0x8F, 0x63, 0x98, 0x65, 0xFB, 0x06, 0x6C, 0x24, 0x58, 0x16, 0xFA, 0x9C, 0xA6, 0x2C, 0xA9 }
}, // 608


=== MCX.BIN key ===
{
0x03004105, 0x00000101,
{0x57, 0x28, 0x0E, 0x87, 0x7F, 0xE5, 0xC7, 0xBB, 0x9B, 0x94, 0x7F, 0x04, 0x36, 0x7A, 0xB9, 0x8C }
}, // 609


    81D9CCE971A9499B04ADDC48307F0792
{
0x0600820A, 0x00000202,
{0xDD, 0x32, 0x9D, 0x58, 0xCB, 0x18, 0x8E, 0xD5, 0x9A, 0x0D, 0x79, 0x53, 0xA4, 0x8F, 0xD5, 0x64 }
}, // 610


=== MCX.BIN iv ===
{
0x0C010414, 0x00000404,
{0x8D, 0x4E, 0x94, 0x98, 0xBB, 0x08, 0x49, 0x84, 0x19, 0x74, 0x26, 0x0A, 0xCE, 0x1B, 0xAC, 0xF4 }
}, // 611


    13C2E7694BEC696D52CF00092AC1F272
{
0x18020829, 0x00000808,
{0x23, 0xB9, 0x02, 0xFF, 0xAE, 0x14, 0xC1, 0xCC, 0xE3, 0x41, 0x94, 0xDA, 0x42, 0x03, 0x4E, 0xD3 }
}, // 612


== PSM Keys ==
{
0x30041052, 0x00001010,
{0x61, 0xA5, 0x08, 0xD6, 0x4C, 0xD5, 0x61, 0x56, 0x1F, 0x63, 0xD6, 0xA1, 0x1E, 0x81, 0x34, 0x53 }
}, // 613


=== Update HMAC Key ===
{
0x600820A4, 0x00002020,
{0x9B, 0xB2, 0x73, 0xEF, 0x30, 0x00, 0xA0, 0x48, 0xD5, 0x4F, 0x1E, 0x9C, 0x02, 0xC2, 0x79, 0xF6 }
}, // 614


    5AE4E16B214290E14366E5B653C4E3C3E69E4956510EADD66ACB37A077E0686E
{
    086F8BAB5030E3D82407F01B676CB8037DF20D1420C08A91A2141A3FE5DC063C
0xC0104148, 0x00004040,
{0x3B, 0xA2, 0xFC, 0x20, 0x4F, 0xE4, 0x08, 0x59, 0x4E, 0x8C, 0xF3, 0xE4, 0xDE, 0x11, 0xE7, 0xF4 }
}, // 615


how to calculate update URL:
{
0x80208290, 0x00008081,
{0xC5, 0xCD, 0xC5, 0xAC, 0xB0, 0x8D, 0x79, 0xAD, 0x5C, 0x3E, 0x3D, 0x0B, 0x96, 0x15, 0xC4, 0xCD }
}, // 616


HmacSha1("NPPA00236_00", hmackey) => 87b2fc0108d5197ae7572bda397dd8a81b56839e
{
0x00410520, 0x00010103,
{0x21, 0x52, 0x69, 0x4F, 0x1C, 0x81, 0x6C, 0xFD, 0x80, 0xF7, 0x6D, 0xED, 0x3E, 0x79, 0xA8, 0x3C }
}, // 617


append first 8 characters of hex encoded hmac; like such: "NPPA00236_00_87B2FC01"
{
0x00820A41, 0x00020206,
{0x13, 0xA5, 0xAE, 0x35, 0xAE, 0xD4, 0xAF, 0x35, 0x48, 0xF1, 0xF3, 0xAD, 0x91, 0xA7, 0xF6, 0x95 }
}, // 618


update xml is => http://psm-pkg.np.dl.playstation.net/psm/np/NPPA/NPPA00236_00_87B2FC01/version.xml
{
0x01041482, 0x0004040C,
{0x05, 0xF7, 0x59, 0x73, 0xF8, 0xB9, 0x23, 0xC4, 0x72, 0x05, 0xA3, 0xCD, 0x97, 0xED, 0xED, 0xB3 }
}, // 619


you can get the PKG for any PSM application like so:
{
0x02082905, 0x00080818,
{0x6A, 0xFE, 0xE9, 0x69, 0xB1, 0x85, 0x06, 0x98, 0x10, 0x24, 0x4F, 0xAE, 0x7C, 0xB3, 0xA2, 0xF4 }
}, // 620


take "appVersion" from version.xml => "1.00"
{
0x0410520B, 0x00101030,
{0xDF, 0x26, 0x36, 0x12, 0x9A, 0x04, 0x09, 0xD3, 0x7B, 0x82, 0x90, 0x62, 0xF7, 0xD6, 0x19, 0x3F }
}, // 621


build PKG link using version => http://psm-pkg.np.dl.playstation.net/psm/np/NPPA/NPPA00236_00_87B2FC01/1.00/NPPA00236_00.pkg
{
0x0820A417, 0x00202060,
{0x8B, 0x73, 0x9C, 0x9A, 0xD5, 0x18, 0x1C, 0xB7, 0x4D, 0x77, 0xE5, 0x86, 0xE2, 0x1F, 0x94, 0xDA }
}, // 622


you can also get screenshots and description of the application; using /metadata.xml; for example;
{
0x1041482F, 0x004040C0,
{0xE8, 0x86, 0x8B, 0x3C, 0x8E, 0x3F, 0x30, 0x6B, 0x17, 0xC1, 0xAC, 0xFF, 0xA2, 0x6F, 0x3B, 0x0D }
}, // 623


http://psm-pkg.np.dl.playstation.net/psm/np/NPPA/NPPA00236_00_87B2FC01/1.00/metadata.xml
{
0x2082905F, 0x00808180,
{0x14, 0xFD, 0xE9, 0xFA, 0x28, 0xD5, 0x4A, 0x32, 0x3A, 0xEC, 0xF1, 0x1F, 0x21, 0x89, 0x0A, 0x6E }
}, // 624


(note; you have to change the domain to zeus.dl.playstation.net as sony removed the "psm-pkg.np.dl.playstation.net" subdomain awhile ago)
{
0x410520BF, 0x01010300,
{0x92, 0x87, 0x78, 0x8B, 0x95, 0xB7, 0x3A, 0xF9, 0x9F, 0x56, 0x38, 0xDB, 0x2F, 0x0B, 0xF0, 0xD1 }
}, // 625


=== 'psm.pub' strong name public key ===
{
Used for verifying strong name signature of runtime's Mono/.NET assemblies;
0x820A417E, 0x02020600,
    00240000048000009400000006020000002400005253413100040000110000009133D396CA929938BC68440B541D8888614E7BD475B
{0x7D, 0x39, 0xF6, 0xB2, 0x8C, 0x85, 0x60, 0xF4, 0x0C, 0x4F, 0x23, 0x03, 0xA7, 0xA9, 0x69, 0x6C }
    EF719AB4F4B85B1C21FC3EF2B5F32DF0DE7C769CA90687650DA49EEBE7ADCB71479F1463E10902CB65A1F44FA2E71B3F30E108FE0F6
}, // 626
    699D179DAED5B1A774DB1ABA104C59118544B47CDA724AEA8E6899FA760DFE0BA8656515B48AE94FDE29FC8F5BD569126C7A9AE6F3


{
0x041482FC, 0x04040C01,
{0xF3, 0xF8, 0x6D, 0xE0, 0x62, 0x36, 0x13, 0x1A, 0x9B, 0xED, 0x67, 0xC1, 0x0B, 0x99, 0xB0, 0x46 }
}, // 627


=== PSM Developer Assistant ===
{
Keys used in the PlayStation Mobile Development Assistant and PlayStation Mobile Development Assistant for Unity applications
0x082905F8, 0x08081802,
{0x74, 0x97, 0x9B, 0x08, 0xF5, 0x0C, 0x78, 0xF1, 0x1B, 0xCF, 0x01, 0x5D, 0x97, 0x7D, 0x10, 0xB2 }
}, // 628


==== "protected_kconsole_cache.dat" HMAC Key ====
{
0x818030C2, 0x00000080,
{0x22, 0x01, 0x87, 0x4F, 0xD4, 0x6F, 0x46, 0xCD, 0x9D, 0x0D, 0x16, 0x5C, 0xD3, 0x3E, 0xFB, 0x87 }
}, // 629


    B73966320E286ADC03F05465CA9E2F92388AEE236D43883135BAB0A5BD5043EA
{
0x03006184, 0x00000101,
{0xC3, 0x07, 0x5F, 0xCB, 0x31, 0x42, 0x63, 0x19, 0x2C, 0x66, 0x77, 0xA9, 0x9D, 0xF9, 0xF6, 0x51 }
}, // 630


==== "NSXVID-PSS.VT.WW-GLOBAL.xml" RSA Private ====
{
0x0600C309, 0x00000202,
{0x37, 0x07, 0x4E, 0x4D, 0x85, 0xBC, 0x18, 0xF6, 0x45, 0x19, 0x5F, 0x10, 0x0F, 0x6C, 0x7D, 0xBF }
}, // 631


    -----BEGIN PRIVATE KEY-----
{
    MIIEvgIBADANBgkqhkiG9w0BAQEFAASCBKgwggSkAgEAAoIBAQCxl+8fRzDzyWb0
0x0C018613, 0x00000404,
    89L9ssKWMO4IYJATVV/qsGPqL5XtgjqlSY6dV3QHWtdiqm4B9h8cy325+XEORMC8
{0x32, 0xD9, 0x6F, 0xCD, 0x6D, 0x78, 0x2D, 0x68, 0x5D, 0x7F, 0xC3, 0xB7, 0x35, 0xD3, 0xAB, 0x51 }
    oErllSl7yovu956/D5laLLGqRkyFPcNer+DOjO99bDfJTTV1bSHuwc9oo3mJn6AO
}, // 632
    WuiY3aguCIYxNgSlDsfavjmCDXa3Q85hFOxJnn7HlM4X6rNxFi9y48LqUrDyWw0L
    bs+07bqNLoYHXtMoZcNQHqNmGtIHGx4RuFzZ4hduorjNsmSKHiQSz+ydJgJWtLJO
    tC2EM8zj8zStmlDiMTyAqKPHjENp4FBLoF87PISLsbyf4dTdWk35TvnsU/+tGVyH
    bVNcEAzvAgMBAAECggEBAKSil//kDIKD/BkrDDc6h9+aHqDPe+EgbVnxCb8pPBFB
    gEKIbVh5oUvMMA38txzEYNVd5AELOH6kyBRVePlajWmAPLddAOJYgK6y7kVPBFMl
    Db/yxjJVPxODxjeshtmEQUfIjhGQMvSdcVC9gBFusyFxr41haW7mw+mKHV/uQVbk
    TM/ZnEaN2Zrl7FfCUwXa3qyMrwj01bbAXXEqdM9ZF3UIXCLzihtNDKPAbpcVoQXH
    fItXVFeHjXqVCOVcKTI1PgElM6Q7VsVsU4pJGOmKy2gFbKqF4eniDK6gdGitbVpp
    rlXIrS2P8ZOfT+fSMjLbrr+mJEc2np4LYFlEHcJgtkkCgYEAwMrmf1LasiU/sijh
    0fOTV6TXefSrOxnpiq9Qs/oTSZ5USTh5FrunF0dX5Isy4XjYKWfIVwVl9LnAXRqR
    QTiHkbFon2KMYYyQfDUe4T9kuX6cAqp8WjBaivxs8chErM8rzZns62bR1B9+/IX4
    VIiHA1jfP9eiCl+1lMhhnnNIHX0CgYEA69Ffc2w5UCJ1cHxu8dR9V4otY57vBJFN
    2Svb8h3kJnO9LfU/RYMeXTgJSklh9Tw/zXPOMEQnxi7LocrDd1713vQTTspT3wWd
    3AJ25l0BP3NGnbEtGwv6It+VnUULr964vOUv/bl4UMQs52JsnxURts+GPZ3gAF1S
    U2AVxvVej9sCgYBAk7Yhb99RTKjJRGhfqvbvpIeIkivI4CUaDx85KcrMHfydig0F
    UFXntj36j6W7YH8HX3v7qhM8pfuJNBzze7vtUT96I8hh5HOBJ0nwqQtUFtSrD/AX
    RZsOcv8K/coDGGHTvHtfXlFqfCJM85L6vcB7nokpGVFtqCFqdLQ+Ht9JAQKBgQCU
    Ao/0dCLs5xPrDE7ePk6FmVavxlui9Eh2XI7qQlSmxdIhfGLAEHIIdFlwZOq076Hk
    JCFwLfcA7vIklI1m6RVNYMiVlWxa+L2CD5HtOMbFumbCJyh2Z2gSZ18SnPme4x30
    ga1DhRu9JcRBXodqueCqa0qIdgTYdbpsVkyU2gEGLQKBgGotuH/yrXNfifTc6Y24
    TSaqk/Dq6OvQOEFSIzgOzaQhWvwZjlz3uOnmi3vUo/guG9q/J1JWucWoXNXkkcmb
    trc3RYwzy6Rn+0uGHGA91e2bn6vT6PLNOgNUE7YCRDJe5DsDYHtUNILNbRVdSvNs
    rnh1i22Y3zLWChh3swswqgf7
    -----END PRIVATE KEY-----


* Used by the PSM Dev Assistant to sign the NSXVID-PSS.VT.WW-GLOBAL.xml file to prevent from modification.
{
0x18030C26, 0x00000808,
{0x87, 0x99, 0x20, 0x1D, 0xF6, 0x91, 0x01, 0xC5, 0x7F, 0x62, 0xC7, 0x2C, 0x53, 0x5E, 0xD4, 0xFF }
}, // 633


==== Publishing License PKCS12 Import Password ====
{
0x3006184D, 0x00001010,
{0xD0, 0x1A, 0xCC, 0xF3, 0x09, 0x01, 0xC1, 0xC2, 0x42, 0x57, 0xF1, 0x4B, 0xBC, 0x76, 0xBB, 0xC8 }
}, // 634


    password
{
0x600C309A, 0x00002020,
{0xCD, 0xF5, 0x9E, 0x6F, 0x6C, 0x4A, 0xA6, 0x66, 0xD6, 0xDA, 0xEE, 0xE6, 0xC6, 0xC4, 0x3A, 0x69 }
}, // 635


==== Publishing License PKCS12 PEM Pass Phrase ====
{
0xC0186135, 0x00004040,
{0xBD, 0x2C, 0x80, 0xB7, 0x00, 0x48, 0x85, 0xF1, 0x32, 0xCC, 0xEB, 0x31, 0x1F, 0xDD, 0xCE, 0x61 }
}, // 636


    password
{
0x8030C26A, 0x00008081,
{0xB3, 0xDE, 0x21, 0x0E, 0xE9, 0x10, 0x12, 0x06, 0xBE, 0x36, 0x3B, 0x29, 0x01, 0x3E, 0xD7, 0xD4 }
}, // 637


* PKCS12 certificate used in signing PSM Dev PSSE with PSM SDK.
{
(World's most secure passwords ever, impossible to crack)   
0x006184D4, 0x00010103,
{0xC6, 0xA9, 0x27, 0xA3, 0x3D, 0x36, 0x61, 0x56, 0xDF, 0x3D, 0x01, 0xB0, 0x19, 0xB9, 0x5C, 0x6D }
}, // 638


You can use openssl like so:   
{
    openssl pkcs12 -in <filename> -password pass:password -passout pass:password
0x00C309A8, 0x00020206,
to view the private and public keys of a PSM Publishing license.
{0xB4, 0xB7, 0xF2, 0x18, 0xDE, 0xDE, 0x84, 0x7E, 0x28, 0xB6, 0x53, 0x82, 0xCB, 0x4E, 0xDC, 0xC8 }
}, // 639


=== PSM Android ===
{
These keys are labeled within the debug symbols of the Android version of PSM.
0x01861351, 0x0004040C,
{0x56, 0x7E, 0x6E, 0x0B, 0x9A, 0x5C, 0xE7, 0xBB, 0xEE, 0xC7, 0x4D, 0xB2, 0x20, 0x22, 0xCA, 0xFF }
}, // 640


==== SCE_PSM_KDBG_ACCOUNT_KEY ====
{
0x030C26A2, 0x00080818,
{0x82, 0xA4, 0x84, 0x4F, 0x71, 0x6D, 0x6F, 0xAF, 0xD9, 0xA4, 0x34, 0x1F, 0x9E, 0x2C, 0x38, 0xB3 }
}, // 641


    965895DF95F5432CCBCC4B7823CBF4B3
{
0x06184D45, 0x00101030,
{0xE5, 0x7F, 0x7B, 0x8D, 0x8E, 0xD7, 0x95, 0xF3, 0x31, 0x21, 0x4F, 0x21, 0x4A, 0xF5, 0xBC, 0x87 }
}, // 642


==== SCE_PSM_KDBG_ACCOUNT_IV ====
{
0x0C309A8A, 0x00202060,
{0xAB, 0x6B, 0x22, 0x4A, 0x5B, 0xE2, 0xAE, 0xCA, 0x3D, 0x62, 0xA7, 0xA7, 0x98, 0xE4, 0x21, 0x35 }
}, // 643


    00000000000000000000000000000000
{
0x18613514, 0x004040C0,
{0xFA, 0x2C, 0x27, 0xFE, 0x87, 0xAF, 0x45, 0x62, 0x56, 0x9A, 0xCE, 0x88, 0x21, 0x52, 0x9E, 0xC8 }
}, // 644


==== SCE_PSM_KDBG_C1_KEY ====
{
0x30C26A29, 0x00808180,
{0x4C, 0x01, 0xA1, 0xF8, 0xBF, 0xEB, 0x70, 0x59, 0xE4, 0xB6, 0x34, 0xC4, 0xB7, 0xE9, 0x8C, 0xCA }
}, // 645


    965895DF95F5432CCBCC4B7823CBF4B3
{
0x6184D453, 0x01010300,
{0xE8, 0x5D, 0x98, 0x70, 0x27, 0xB1, 0x85, 0x58, 0x6C, 0x0E, 0x47, 0x8B, 0x8E, 0x89, 0x94, 0x55 }
}, // 646


==== SCE_PSM_KDBG_C1_IV ====
{
0xC309A8A7, 0x02020600,
{0xBC, 0xE2, 0x67, 0x28, 0x22, 0x55, 0x11, 0xFF, 0x7B, 0xE8, 0x6E, 0x9B, 0x83, 0x85, 0x2B, 0xFB }
}, // 647


    00000000000000000000000000000000
{
0x8613514F, 0x04040C01,
{0x2F, 0xB7, 0x7D, 0xF6, 0x21, 0xDB, 0x70, 0x49, 0x7C, 0x40, 0x11, 0x55, 0x85, 0x6E, 0x53, 0xE4 }
}, // 648


==== SCE_PSM_KDBG_CONSOLE_KEY ====
{
0x0C26A29F, 0x08081803,
{0x4F, 0x5D, 0xA6, 0x29, 0x13, 0xED, 0x41, 0x29, 0x97, 0xC8, 0x2B, 0x2B, 0x16, 0x10, 0x70, 0xA0 }
}, // 649


    8235EDC66CD14D04F793369A74C7A4FE
{
0x08082002, 0x00000000,
{0x1D, 0xB3, 0xAF, 0x14, 0x1A, 0x4A, 0x1A, 0xD2, 0xD4, 0xD5, 0x78, 0x9A, 0xB4, 0x39, 0x19, 0xBF }
}, // 650


==== SCE_PSM_KDBG_CONSOLE_IV ====
{
0x10104004, 0x00000000,
{0xD2, 0xED, 0x53, 0x6A, 0xDE, 0xA7, 0x06, 0x42, 0x7D, 0x6D, 0x98, 0xC0, 0x70, 0x07, 0x66, 0xD4 }
}, // 651


    00000000000000000000000000000000
{
0x20208008, 0x00000000,
{0xFB, 0xA3, 0x69, 0x94, 0xCA, 0xD6, 0x14, 0xE5, 0x67, 0x2D, 0xC0, 0xA0, 0xB6, 0x93, 0xB1, 0xCE }
}, // 652


==== SCE_PSM_KDBG_LOGINFO_KEY ====
{
0x40410010, 0x00000000,
{0x93, 0xF1, 0x65, 0xCD, 0x2A, 0xFC, 0x23, 0x6D, 0x31, 0xF8, 0x6C, 0xD3, 0x5E, 0x76, 0xB7, 0xD1 }
}, // 653


    B293993BB5977F88844A7D21DDF63BC7
{
0x80820020, 0x00000000,
{0x5E, 0x70, 0x4C, 0x33, 0x21, 0xED, 0xD0, 0x5D, 0x1E, 0x27, 0x3D, 0x22, 0x30, 0xC8, 0x02, 0x1D }
}, // 654


==== SCE_PSM_KDBG_LOGINFO_IV ====
{
0x01040041, 0x00000001,
{0x6B, 0x5F, 0x65, 0x80, 0x09, 0x11, 0x59, 0x4B, 0x3A, 0xEF, 0xBA, 0xCA, 0x7C, 0x7C, 0xD3, 0x6D }
}, // 655


    00000000000000000000000000000000
{
0x02080083, 0x00000002,
{0xCD, 0x16, 0x63, 0x84, 0x6C, 0x52, 0x83, 0x49, 0x59, 0x15, 0xB3, 0xD9, 0x1A, 0xBD, 0xD2, 0xB7 }
}, // 656


==== SCE_PSM_KDBG_V1_KEY ====
{
0x04100106, 0x00000004,
{0x38, 0x04, 0x86, 0x89, 0xC3, 0x9E, 0x47, 0x96, 0xB2, 0x7C, 0xF0, 0x2F, 0x46, 0xF6, 0x6C, 0x29 }
}, // 657


    14E5A03B1E62D483F88769986EDB1140
{
0x0820020C, 0x00000008,
{0xC2, 0x6F, 0x59, 0x15, 0x92, 0xF2, 0x18, 0xE6, 0x40, 0xE0, 0xC2, 0xCD, 0x2F, 0xCA, 0xE9, 0x65 }
}, // 658


==== SCE_PSM_KDBG_V1_IV ====
{
0x10400418, 0x00000010,
{0x69, 0x36, 0x24, 0x3F, 0x7A, 0x50, 0x3C, 0xA0, 0x4C, 0x66, 0x86, 0x95, 0xC8, 0xCE, 0xA6, 0xF1 }
}, // 659


    00000000000000000000000000000000
{
0x20800830, 0x00000020,
{0xC0, 0x8F, 0xA3, 0x62, 0x3D, 0x96, 0x8A, 0xF6, 0x0B, 0x83, 0xC2, 0xC3, 0xB2, 0x82, 0xFF, 0x26 }
}, // 660


==== SCE_PSM_HEADER_SIGNATURE_PUB_KEY ====
{
0x41001060, 0x00000040,
{0x0B, 0x30, 0x04, 0xEB, 0x62, 0xD5, 0xA2, 0x82, 0x1C, 0x07, 0xD9, 0xE2, 0x90, 0x4E, 0xE8, 0xEF }
}, // 661


    3082010A0282010100A98F6B27F5AFF0F96C7411A337DFCF723C37BEF6FF6552B
{
    8E5A3EEE3672CF0366EA0442B7913018C7355C0F2336DE496DCADE8BF5A32D1DB
0x820020C0, 0x00000080,
    25705D5A9A11C06FFF6801776BFF871FDDDC4EA4CAF49886E02D4835B3DCC9674
{0x55, 0x6E, 0xFE, 0xB1, 0x82, 0x02, 0xDC, 0xC8, 0x2C, 0x1E, 0x24, 0xC1, 0x6D, 0xF8, 0x0F, 0x70 }
    457E4E66744CB997155271C211E2FAE0ECEA5FABD91719766C488860072E81CCC
}, // 662
    7B5DFEA0907D25E60CCB28500D3FDC9CC244DBBAED7A41FDA571C27D87E92B17E
    34B0289329EB0FEFED4682F1679D89FF00D2A78F78B8A05A9B4D7306E992AAE7B
    7A0E9ADDF4F4BC286E1E52A80AB2DF31012B18B996670446F07AF2307A7FFCBC4
    5ADB3B815B659536A7AADA813FD303156C792E28157001DC7BB9AF93A59A607E4
    F2EE34F88702030100010000


==== SCE_PSM_WHOLE_SIGNATURE_PUB_KEY ====
{
0x04004180, 0x00000101,
{0xB2, 0x25, 0x31, 0x94, 0x6B, 0x3C, 0x23, 0x03, 0x9E, 0x0B, 0xDD, 0xB2, 0x52, 0x0A, 0xC3, 0xB1 }
}, // 663


    3082010A0282010100D452C18752BDE6289ACEB862AD32145322C13EEC82F5675
{
    E9DA96B51CCAA68488F2B5E09E1C1DEFE7A27ECB5EACF473A9D15171F43EE32DA
0x08008301, 0x00000202,
    03E7BA07182B408540C37CD8AA357F4DCD12295AD3901D6A0D6D41665BA7084B1
{0x43, 0x83, 0xB6, 0x6E, 0xFC, 0x77, 0x3C, 0x2B, 0xA1, 0xA3, 0x55, 0x51, 0x88, 0x09, 0xF3, 0x2D }
    A98DFE15A1F0B3A2A4B4D0A00A1CD8BA5B09E80BC4E2C588357C0F2E285C05055
}, // 664
    6DC971A43FEA4C056CF2DFD8BB2EE975F67F76878E1FB01E7A23F87FD5732864D
    D62B2C3FFD4BCF184923A3706819467723AA508FC53E80F6E5A57CF3E7B1BB0A3
    988037656CBB2FC70BDF344B5683E4943D08C609D44DFDAE90C5300C5CDE7C2D8
    9035B20FC189F9DBC34BEB6478D6B32183FB886133B04C1962EEEDA7FFD47DB80
    655F4CDE0F02030100010000


==== internalKey (KeyStore) ====
{
0x10010602, 0x00000404,
{0xE6, 0x5F, 0x1E, 0x22, 0x87, 0xA4, 0x56, 0x78, 0x2F, 0x74, 0x9C, 0x05, 0x6B, 0x51, 0x5F, 0x05 }
}, // 665


    534B4257020000000000000010000000002F27E9ECD4606C3CE0BCFE99E2AE5EB
{
    F000102030405060708090A0B0C0D0E0FB747787D7742E60223E2B7C58E4F0F6C
0x20020C04, 0x00000808,
    00000001A02C5BA09F9DD01D40D19006A5A9E5C2F1AD690470726F74000000109
{0x35, 0xEC, 0x29, 0x2C, 0x4E, 0xA0, 0xB6, 0x55, 0xDC, 0xC8, 0xC9, 0xC8, 0x44, 0xB8, 0x00, 0xD6 }
    0AD6840B2876C1B5B580B0B39B1292F0000000000000000000000000000000089
}, // 666
    E83746A9819C60AB7ED23B8D7685612A831C41000000


==== internalIcvKey (KeyStore) ====
{
0x40041809, 0x00001010,
{0xF8, 0xC2, 0xE7, 0x35, 0x40, 0x07, 0xDA, 0xBA, 0x94, 0xC8, 0x4A, 0x17, 0xDE, 0xC9, 0x25, 0x44 }
}, // 667


    534B4257020000000000000010000000002F27E9ECD4606C3CE0BCFE99E2AE5EB
{
    F000102030405060708090A0B0C0D0E0F0458D907E9B5EF926EA235615A4C09AF
0x80083013, 0x00002020,
    000000018AE457BF9465071664521E2C0468FA010D8260CD70726F7400000010F
{0xE9, 0xE3, 0x1A, 0x03, 0x04, 0x16, 0xE4, 0x96, 0xBB, 0xE2, 0x30, 0x74, 0xD1, 0x28, 0xB9, 0xC1 }
    C026F69D7A98767567BF04C95074B4C00000000000000000000000000000000BB
}, // 668
    6E2E9E14AB8D04309918ABD4186B5798F48C78000000
=== PSSE (PlayStation Suite Encryption) ===
PSSE is the encryption of PSM application files,  
the whole game is encrypted and it server a similar function as PFS for the PSVita.


==== Header IV ====
{
0x00106027, 0x00004041,
{0x93, 0xBA, 0x39, 0x5C, 0x09, 0x81, 0xA4, 0x44, 0x43, 0xC3, 0x69, 0x9F, 0xC7, 0xF0, 0x66, 0xC5 }
}, // 669


    000102030405060708090A0B0C0D0E0F
{
0x0020C04E, 0x00008082,
{0x7B, 0xB3, 0x86, 0x18, 0x3B, 0x05, 0x94, 0xC6, 0x23, 0x1D, 0x39, 0xD6, 0x2C, 0x1E, 0xA0, 0x03 }
}, // 670


==== Header Key ====
{
   
0x0041809C, 0x00010104,
    4E298B40F531F469D21F75B133C307BE
{0xC1, 0xA3, 0x8A, 0x90, 0xB1, 0x88, 0x6C, 0xF2, 0x9B, 0x68, 0x32, 0xE3, 0x93, 0xF2, 0xF1, 0x19 }
}, // 671


==== App Key ====
{
For decrypting PSSE files with IP9100-NPXS10074_00-0000000000000000 as content id
0x00830138, 0x00020208,
    A8693C4DF0AEEDBC9ABFD8213692912D
{0xFF, 0x03, 0xB6, 0xD4, 0x05, 0x8A, 0x5F, 0x7C, 0x43, 0x03, 0x0D, 0x2E, 0xBC, 0x73, 0xB1, 0x4F }
}, // 672


==== Debug Header Key ====
{
When you encrypt files locally for use in PSM Dev Assistant, using PSM SDK's "psm_encryptor64.dll"
0x01060270, 0x00040410,
the following header key is used INSTEAD of the retail one.
{0x31, 0x5D, 0x22, 0xCA, 0x3A, 0xF1, 0xAF, 0xDF, 0x8A, 0xC9, 0x67, 0xED, 0x11, 0x91, 0x21, 0xBA }
    00112233445566778899AABBCCDDEEFF
}, // 673


=== Hash Account ID ===
{
used for calculating "Unique ID" in
0x020C04E1, 0x00080820,
Sce.PlayStation.Core.Services.AccountInformation.UniqueID
{0x8D, 0x10, 0x0A, 0x6C, 0xB7, 0xE3, 0xCA, 0x95, 0x76, 0x82, 0x66, 0x6A, 0x43, 0xFA, 0x9E, 0x30 }
}, // 674


==== Hash Account ID HMAC-SHA256 key ====
{
    BDEE3E0B93073749856F25CCDB443AFB0FAB94287493DC1AD0C5697E2A7AE14E
0x041809C2, 0x00101040,
{0x2B, 0x90, 0xA8, 0x2A, 0xDE, 0xB8, 0x5C, 0x43, 0x00, 0xBC, 0xFA, 0xC1, 0x8F, 0x70, 0x0A, 0x7B }
}, // 675


==== Hash Account ID AES-128-CBC Key ====
{
    5AA3DB8FE6AEE26CD185B086F5BD78A4
0x08301384, 0x00202080,
{0x7E, 0xAF, 0x28, 0x79, 0x07, 0xAD, 0xC9, 0xA9, 0xC6, 0xBB, 0x55, 0x87, 0x7B, 0xA4, 0xEC, 0xF9 }
}, // 676


==== Hash Account ID AES-128-CBC Iv ====
{
    00000000000000000000000000000000
0x10602708, 0x00404100,
How to calculate UniqueID:
{0x14, 0xDD, 0x8E, 0xAF, 0x71, 0x04, 0x5C, 0xE6, 0x42, 0x2E, 0xD6, 0xAF, 0x8B, 0x60, 0x3F, 0xD1 }
}, // 677


get psn accountid; => 0123456789abcdef (example)
{
0x20C04E10, 0x00808200,
{0xAD, 0xFE, 0x0B, 0x6F, 0x58, 0xC3, 0x51, 0x17, 0xB7, 0x70, 0xD2, 0xA2, 0x69, 0xB7, 0x9A, 0xBC }
}, // 678


sha256hmac(accountid, hmackey) => 4653ec6275f410c47d280a3688a554a579a7e7c9f52599381ae9ee4a1b6220e3
{
0x41809C20, 0x01010400,
{0x94, 0x5D, 0xC1, 0x42, 0x0F, 0xD2, 0x40, 0xAA, 0x6A, 0x2D, 0x0A, 0xCC, 0x74, 0x7C, 0xC7, 0x6E }
}, // 679


trim hmac to first 8 bytes => 4653ec6275f410c4
{
0x83013841, 0x02020800,
{0x4C, 0x07, 0x84, 0x33, 0xA2, 0xA8, 0x08, 0x7C, 0x2F, 0x21, 0xA9, 0x1E, 0xD4, 0xF5, 0x52, 0xE6 }
}, // 680


append trimmed hmac to accountid => 0123456789abcdef4653ec6275f410c4
{
0x06027083, 0x04041001,
{0x10, 0xEF, 0x54, 0x77, 0x76, 0x28, 0x5F, 0xD3, 0xB5, 0x94, 0xD2, 0x47, 0x13, 0x8D, 0xBD, 0x0E }
}, // 681


aes128cbc(accountid + trimhmac, key, iv) => c7656d883573d94809c8fa05f511d84f
{
0x0C04E106, 0x08082002,
{0x1D, 0xDD, 0x1B, 0x45, 0x89, 0x7E, 0x9C, 0x2C, 0xE1, 0x32, 0x58, 0x0E, 0xAB, 0x81, 0x02, 0xC7 }
}, // 682


so "c7656d883573d94809c8fa05f511d84f" is the "UniqueID"
{
0x40C01040, 0x00000040,
{0xD1, 0x45, 0xF0, 0x77, 0xD3, 0x37, 0xFE, 0x72, 0xB6, 0x89, 0xDF, 0xF1, 0xC1, 0xE1, 0x68, 0x9C }
}, // 683


== EncDec Keys ==
{
0x81802080, 0x00000080,
{0x90, 0x60, 0x5D, 0xBD, 0xFF, 0x59, 0x25, 0xDE, 0x0D, 0xB1, 0x61, 0xE5, 0x1C, 0xE4, 0xBB, 0x87 }
}, // 684


=== External ===
{
0x03004101, 0x00000101,
{0xA9, 0x3E, 0x49, 0xBD, 0x59, 0x72, 0x33, 0x91, 0x34, 0x98, 0x6D, 0xBB, 0xC8, 0x67, 0x3C, 0x3D }
}, // 685


<pre>
{
01: 4E953B7F820562D4C94DB42034D0E26F6B855BDA78A53DDBA5FE92473DE6A1B3
0x06008203, 0x00000202,
02: EA3B52CB07B80B242E772B7FD70B74433DAECD531F97BD1266CBD2FC63139183
{0x8C, 0xFD, 0xA3, 0xB7, 0xBE, 0x11, 0x8D, 0xBE, 0x5C, 0x0A, 0xA0, 0x55, 0xBA, 0x26, 0x30, 0x41 }
03: 631A57F5462BA3FD177F973F2062EC4826D0935D0DC65DEEF6C99E8AC69511C7 (Passphrase)
}, // 686
04: 24B5B7E071927DEB44C3F5D29EFCADF5CBB923972283EC15370A0AF26F98FB95
05: 569C77212725F9FEF41661F15978A6744C0F029FACE221D751958CA085FE6153 (Passphrase)
06: DEAD01085F00D513C35DB4C51EE2EC2750E5A0CBEF8147B4020805068A2BF34B
07: FCDF261E1D91D3DF790B1B8989E046EB5BE0EB772EAF4BE3F6F58C02C4296C52
08: E081D77FFDD4C000BA5E6C6F7BD89D8681590DDF5AC2BF59F42EF5AD48B032E7
09: 5CB92AAD7C977D1DADAF984F2272422B501AD73CC07761E3FAB9893D5B9796E5
10: F7413D73398A51B0EBF9FAD5BE26F76C21C766B351E4686F45B159A7E37E3DD2
11: 397410772097765634EB696EF5827F073484844DF54FAF2BEFBECBC031F3CAD5
12: 5D5DC4065A8F77D360F4FAF369512F0D6B38F2B4117A44A2F8E23CC0E4EB3C25
13: B4D1061ABEADF11A72F34632D7C2D4203583765B462F74FB6D200740E4D6460B
14: DEF0247032D97B7D1F26825AC86F9A6CAABFA3703E48492C9EC6523F317557F7
15: 704D524C293CBFBAEE284DA219A74304CF3F7E86DC1A989939349B62A7679742
16: 4CC2EE15AA17D0876EFC88DF22C8B4EB6ECDAA407E5C2931B7A946E95BEECD50
17: F083FE77B664DDECE7707682A63176581A1B5841E66088F5889E43574A2F8208
18: 5B596C1D36C4C6F078995F942F680FC13FA0AD8AB154E7AF0505A797006C85A9
19: 1F3558EDC5AC0B5F7ED2EDAB8E713760C375835E6912EE5758D3D6D6E7A58D40
20: 21B66BAE9C895D95757148DE3E471E94CE8A254B9520657B34C92DCE6B66DDA6
</pre>


=== Internal ===
{
0x0C010407, 0x00000404,
{0x33, 0xC4, 0x3C, 0xA5, 0xA7, 0xF3, 0x05, 0x73, 0x72, 0x91, 0x4C, 0xBC, 0x10, 0xC2, 0xA9, 0x02 }
}, // 687


<pre>
{
01: 5811E08CE7C304BD38AF116252A9074703AE23EF1C80CBD55A407A3322C0286D
0x1802080E, 0x00000808,
02: 135521CCC5A50572F9E69A93C1E41FFD30D7FE1F6F993E27F427364D18F45D2C
{0x3F, 0x0C, 0xCB, 0x8A, 0xAA, 0xC6, 0xA4, 0x51, 0x47, 0xEB, 0x65, 0x04, 0x24, 0x9F, 0x62, 0xB4 }
03: 9CDA12AE5607B2355161FF1B178C62DFFA428C1C29C505290D6B5580691E1FF1
}, // 688
04: 4A37E813D3044A72BC0BDC7E267C15070E44F9205B969743A7CF65498A026BF3
05: C197B0F923F92BB7E64B81F841057DE06123B6FA5447506E7EE0F9EFEAE89289
06: 155F7DCAEF58D2E5CB92286FF57A4DA1FB5623D83B62ABE438B6B92D04CF6DC4
07: C8BFADC3856B9CCB347D07428BB01FC150D2DDD8E799DA555398D3512781C8A3
08: B6CBB3E7C258AFC744F536622096FF3572603D3B349F6D2AB1D7748ABE28D003
09: D30ACA5121A4DF81B38085557F356B70E5F962B1CE116A83A6498402DBAE3140
10: CD053F1B107CE42875EBFD94095ABFA619B31FD2E2677B740039A3E500188454
</pre>


=== Prototype ===
{
0x3004101C, 0x00001010,
{0x7F, 0x33, 0xDE, 0x6A, 0x93, 0x99, 0x30, 0xBD, 0xF8, 0xEB, 0xF6, 0x87, 0xEF, 0xC8, 0x1E, 0x61 }
}, // 689


<pre>
{
01: 5811E08CE7C304BD38AF116252A9074703AE23EF1C80CBD55A407A3322C0286D
0x60082038, 0x00002020,
02: 500AF8A3EC80F3F42E89D18DEC2BB799548CCAF3D5BA578AE6E5CD0DCA2748E9
{0xC6, 0x22, 0xC2, 0xF4, 0x27, 0xFC, 0xE3, 0x4C, 0xE1, 0x8B, 0x44, 0x0C, 0x3B, 0x2C, 0x77, 0xE2 }
03: 49BE3301F6E35174EA36D47023F9D61CD99ACE5777C9D68E304AEEA9B88AEE1F
}, // 690
04: 24B5DECE1EAC6F10E6671B47370CDD3AD08440422A29162F3EE7528793943BD1
05: 8E13D964BE8377845DEB09596EAFA0A58CC524DE003C4D63CF98AAAC60BE6C04
06: F96C4721373759EC6F4A9DCEEFCE266C40C87C702EE22D936E25D075A98FEC88
07: 63A4ED2233D2F468C4C2A2E6BBF3854A326895D7826100CB5D50F946CF3312E4
08: 36E8F8B5196CFF961443C0BFDA702852000C1E6BBE5EDE78AFF3BB08D88AC6AC
09: E137A8068F015BBA1D1ABBFD5753D1F9436E55B0F277818A841C66CAC99475BF
10: A788C670A1E8AB723CEB3016C21BA1A1EE817F6BE5EF12DA4D0FE21F4D5DFAA3
</pre>


== QAF Keys ==
{
0xC0104071, 0x00004040,
{0x6A, 0x7E, 0xF8, 0x1D, 0xA3, 0xEC, 0x5E, 0xC3, 0xE1, 0x5D, 0x21, 0x7F, 0xBF, 0xD5, 0xD5, 0x64 }
}, // 691


=== Token External Modulus ===
{
0x802080E3, 0x00008081,
{0xDE, 0x50, 0xAB, 0x5D, 0x91, 0x2C, 0x13, 0xB6, 0x13, 0x0F, 0xBD, 0x98, 0x39, 0xDA, 0xB6, 0x63 }
}, // 692


<pre>
{
D2 CE 7D 0F 4B FC A7 88 B0 66 8F 65 6D 4F 56 C2
0x004101C6, 0x00010103,
A9 95 CF 75 02 52 91 36 81 A3 50 44 8F 3A 09 1E
{0x01, 0xED, 0xDD, 0x41, 0x2B, 0x70, 0x7E, 0xC2, 0xB8, 0x9D, 0x3B, 0x8C, 0xD9, 0xAB, 0x16, 0xA3 }
BA 02 12 37 9F 72 D7 A8 D7 C2 9A E4 E2 8D 5D 62
}, // 693
84 FA D5 39 A0 70 B1 12 51 FC 55 F2 B5 59 D3 0F
51 76 29 C7 38 CF B8 95 0D B6 02 BA D2 1D 92 78
D1 DD 75 41 C0 A2 27 A6 E0 2F 1B 26 1D A7 DD 08
8F 2F 43 99 AE 54 BB 8D 1C E5 97 63 05 07 18 8C
A9 AB EF 57 26 64 3D 22 F4 CD 78 09 DE C5 6F 0B
FF 16 CC 24 44 35 EF B6 19 F6 19 2E BF FA 5F FE
A6 F5 76 66 46 32 18 BB 7C B0 78 A8 C4 E9 86 16
01 F9 A6 B7 DE 41 DD E5 1C A5 8D 2D 85 F8 4F 54
D2 40 BA A6 9F 70 68 32 5B BD 13 ED 2F 6E 34 4F
8D 54 9E F7 A9 A5 9B 7C 5F 89 B3 21 B0 91 20 00
81 56 0A 02 17 3A 48 DC 9A 6D FF 25 C4 FC 56 3D
13 B9 E3 81 37 83 05 D6 22 3B 87 C9 72 3A 8E 9B
7F B4 FE 39 FF 16 9F A8 ED EE CB 8B A9 62 8E 77
</pre>


=== Token Internal Modulus ===
{
0x0082038C, 0x00020206,
{0x30, 0xD0, 0x9C, 0x32, 0x5E, 0x4E, 0x46, 0x1A, 0xAC, 0x59, 0x2B, 0x29, 0xE8, 0xCA, 0x6B, 0xD6 }
}, // 694


<pre>
{
CF E6 7B BB B3 5F 31 91 5C F5 B4 1B 57 95 A3 A3
0x01040718, 0x0004040C,
5B 2C 76 B3 97 85 F3 4D A8 F4 72 67 A3 07 01 BC
{0x75, 0xA8, 0x20, 0xB9, 0xAE, 0x33, 0xF0, 0x7F, 0x37, 0x7C, 0x46, 0x17, 0xF6, 0xE0, 0x24, 0x26 }
CD BF 75 A2 AD 94 67 BD E0 C4 19 9A A0 2A B8 7F
}, // 695
AF 37 93 7F 3B 7D BC 57 F6 CA 62 D9 68 55 B8 6A
F6 97 A8 71 78 B3 7A 26 4E 4F 81 47 12 41 E9 10
04 E5 9F 19 1A 31 2E B9 29 14 2A 90 79 CE 89 6B
3D FE DF E9 58 87 B1 9D DF B1 00 59 DA 1F 61 00
55 D5 C4 EF AE 92 7A 18 7E 85 81 5C 32 6F D1 A1
2A 2B 56 B7 84 DA 71 2B 54 CA DC 01 9C 2B 13 16
53 D5 D4 49 6C F7 C3 DE F2 E6 9E 8F 97 26 6E 2D
84 D0 07 1A 80 15 0F 0A 4F 9E 3B D2 7F 4D 79 D8
E5 8F D7 73 62 7B 4D DD 93 CE AB 90 D5 9F EB B0
2E 81 3F BA 9D 5A DB A0 88 72 AB 92 C5 B2 5A EA
96 F0 C2 DD AE 1F FD 82 21 5F 26 2A 34 11 C7 3B
09 33 16 1F AB FA BA D3 29 1A 29 4A D6 5E AD A1
A7 ED 6D 30 3F 17 D1 76 61 8E 52 2E 09 4B DC C3
</pre>


=== Internal Token Encryption Keys ===
{
0x02080E31, 0x00080818,
{0xC8, 0x22, 0x6C, 0x32, 0x1F, 0x4A, 0xF7, 0xF8, 0x6A, 0xFA, 0x90, 0x25, 0x9B, 0x42, 0x91, 0xB9 }
}, // 696


==== OLD KEY ====
{
<pre>
0x04101C63, 0x00101030,
A3822022A2B98951B7835E196C004BDF28E89C645EB368FCFD94495D128F0EFC
{0x52, 0x2D, 0xF8, 0xDA, 0xBF, 0xF5, 0xC8, 0x01, 0x41, 0xB2, 0x6B, 0x5D, 0x0E, 0x98, 0x6C, 0xCE }
</pre>
}, // 697


==== KEY ====
{
0x082038C6, 0x00202060,
{0x6F, 0x34, 0xB0, 0x97, 0xBE, 0x04, 0x45, 0x81, 0x0E, 0x02, 0x78, 0x51, 0x4B, 0xAB, 0x7C, 0xB9 }
}, // 698


<pre>
{
0E04E91805B1BA0E07474DD257A6063AB60D1296B6DAC572AC3E036D88770F2C
0x1040718C, 0x004040C0,
</pre>
{0x6A, 0x65, 0x36, 0x9F, 0x94, 0xE6, 0x68, 0x6E, 0xAA, 0x53, 0xAC, 0x55, 0x0C, 0x6A, 0x09, 0xA2 }
}, // 699


==== OLD IV ====
{
<pre>
0x2080E318, 0x00808180,
E588E6312554F4DC665F057877D878A4
{0xB4, 0x5E, 0xFD, 0xAD, 0x25, 0x34, 0x41, 0x61, 0xCD, 0xF9, 0x33, 0x4C, 0xBC, 0x39, 0x73, 0xBD }
</pre>
}, // 700


==== IV ====
{
0x4101C631, 0x01010300,
{0xDD, 0xAE, 0x7E, 0x9A, 0x8E, 0xAB, 0x3F, 0x0A, 0x1F, 0xAB, 0x66, 0xF7, 0x91, 0xF2, 0xE6, 0x05 }
}, // 701


<pre>
{
456286F824DAB499BCFD78928C1BA93F
0x82038C63, 0x02020600,
</pre>
{0x4C, 0x9F, 0x9A, 0x7A, 0x0D, 0x14, 0xFB, 0x3B, 0x6C, 0xD0, 0xB6, 0xD5, 0xCA, 0x54, 0x72, 0x99 }
}, // 702


==== CMAC KEY ====
{
0x040718C7, 0x04040C01,
{0x8D, 0x4B, 0xCF, 0xF7, 0xC3, 0x6A, 0x30, 0xD9, 0x5D, 0x77, 0x53, 0x86, 0x88, 0x5A, 0x4A, 0xBE }
}, // 703


<pre>
{
0E04E91805B1BA0E07474DD257A6063AB60D1296B6DAC572AC3E036D88770F2C
0x080E318E, 0x08081802,
</pre>
{0x10, 0xF9, 0x85, 0x30, 0x6B, 0x95, 0x0D, 0xCF, 0x1D, 0x9B, 0x6D, 0xBF, 0xAA, 0x5F, 0x08, 0xAE }
}, // 704


=== Proto Token Encryption Keys ===
{
0x0800C30E, 0x00000202,
{0x51, 0xBD, 0x9A, 0xA1, 0x74, 0xFC, 0x1F, 0x9B, 0x4B, 0xA4, 0xD4, 0x84, 0x6F, 0x72, 0x06, 0x77 }
}, // 705


==== KEY ====
{
0x1001861C, 0x00000404,
{0x0B, 0x24, 0x45, 0xAD, 0x2B, 0xC2, 0x5C, 0x43, 0xA1, 0xD9, 0xE9, 0xB6, 0x96, 0x95, 0x3D, 0x13 }
}, // 706


<pre>
{
B64C38B4EFDD74C929090B985A215999FC6826244DB5EC2D5D832636560315AF
0x20030C38, 0x00000808,
</pre>
{0x33, 0x03, 0xBF, 0x8B, 0x5A, 0xAA, 0xA2, 0xBD, 0x94, 0xE2, 0xAE, 0xA7, 0x44, 0x2F, 0x5F, 0xD9 }
}, // 707


==== IV ====
{
0x40061871, 0x00001010,
{0x74, 0x10, 0xC2, 0x39, 0x7A, 0x82, 0x3D, 0x98, 0x4A, 0x39, 0x1A, 0x9A, 0xBB, 0xCF, 0xA1, 0xE7 }
}, // 708


<pre>
{
695570C72F2384EA2D439106CFB2B3CF
0x800C30E2, 0x00002020,
</pre>
{0x37, 0x00, 0xB9, 0xB7, 0x0D, 0xF0, 0xD7, 0xEC, 0x80, 0xE7, 0xD3, 0x15, 0x17, 0xBB, 0x09, 0xFC }
}, // 709


=== External Token Encryption Keys ===
{
0x001861C5, 0x00004041,
{0xF0, 0x9F, 0xB7, 0x58, 0xE6, 0x9C, 0x2F, 0xDB, 0xF1, 0x48, 0x1F, 0x6E, 0x5C, 0xD7, 0x1B, 0x5E }
}, // 710


==== KEY ====
{
0x0030C38A, 0x00008082,
{0xF7, 0x2B, 0xBE, 0x20, 0x85, 0xDC, 0x4D, 0x56, 0xEE, 0x6D, 0xC8, 0x62, 0xDA, 0x91, 0xD1, 0xDB }
}, // 711


<pre>
{
6C1C31251E7BF435F3E232ECDBFCB9D647A31A4D2954F1CC718FA92F63E30A73
0x00618715, 0x00010104,
</pre>
{0x76, 0x53, 0xDE, 0x20, 0xA4, 0xB7, 0x7E, 0xC1, 0xBE, 0xC5, 0x93, 0xAB, 0x50, 0x34, 0xA6, 0x98 }
}, // 712


==== IV ====
{
0x00C30E2B, 0x00020208,
{0x6B, 0x5B, 0xBA, 0x88, 0xA5, 0xF9, 0x4E, 0xFA, 0xC4, 0x5E, 0x4A, 0xB1, 0x6B, 0xA5, 0x16, 0x8E }
}, // 713


<pre>
{
11295CABDE7337EC8F29DD451D387CB2
0x01861C57, 0x00040410,
</pre>
{0x40, 0x7D, 0x5A, 0xC9, 0x58, 0xC7, 0x25, 0xC3, 0x65, 0xFF, 0xBE, 0x0A, 0x49, 0x6D, 0xA6, 0x7F }
}, // 714


==== CMAC KEY ====
{
0x030C38AE, 0x00080820,
{0x6E, 0xB2, 0x94, 0xC3, 0xFA, 0xC3, 0xE5, 0xAE, 0x74, 0xB4, 0x03, 0x1B, 0x8B, 0xB4, 0x6F, 0xF7 }
}, // 715


<pre>
{
6C1C31251E7BF435F3E232ECDBFCB9D647A31A4D2954F1CC718FA92F63E30A73
0x0618715D, 0x00101040,
</pre>
{0x76, 0x28, 0xD3, 0xE5, 0xAE, 0xC9, 0x8B, 0xCC, 0x37, 0xAF, 0xA4, 0x38, 0x9B, 0x03, 0xFE, 0xE2 }
}, // 716


== F00D keys ==
{
0x0C30E2BA, 0x00202080,
{0xDC, 0xC3, 0x0E, 0x06, 0xF3, 0xAA, 0x2C, 0x1E, 0x70, 0xF7, 0xCF, 0x3C, 0x15, 0xA9, 0xB6, 0xA3 }
}, // 717


TO BE !MERGED! WITH [https://docs.google.com/spreadsheets/d/1NRDVSqYR3uwnzCLY47ZBACzFlXTzcvJtgLMc3aGOdEU/edit].
{
0x1861C574, 0x00404100,
{0x88, 0x27, 0x08, 0xC7, 0x8B, 0x2A, 0x7D, 0xF2, 0x93, 0x2C, 0xF2, 0x2A, 0x28, 0x22, 0x78, 0x01 }
}, // 718


{| class="wikitable" style="font-size: 90%;"
{
! Module !! Algorithm !! Keyset (Internal&nbsp;/ Prototype&nbsp;/ External) !! Version !! Comments !! ERK !! RIV !! PUBLIC
0x30C38AE8, 0x00808200,
|-
{0x79, 0xB4, 0xE1, 0xEB, 0x1A, 0xFE, 0xAA, 0xB3, 0x51, 0x48, 0xD5, 0x02, 0xB4, 0x8D, 0xF6, 0x7D }
| Secure ENC: second_loader and secure_kernel || AES128-CBC || ALL <br /> (SD, DEM, CEM, PDEL, PTEL, PCH, VTE) ||  0.930 - 3.69 || 0x10 = data size; 0x20 = hash; 0x40 = version; 0xE0 = Encrypted header (0x1E0); 0x2C0 = data segment. || <pre>AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA</pre> || <pre>AF5F2CB04AC1751ABF51CEF1C8096210</pre> || <pre>unknown</pre>
}, // 719
|-
| Secure ENC: second_loader and secure_kernel || AES128-CBC || ALL <br /> (SD, DEM, CEM, PDEL, PTEL, PCH, VTE) ||  3.70 - 3.74 || 0x10 = data size; 0x20 = hash; 0x40 = version; 0xE0 = Encrypted header (0x1E0); 0x2C0 = data segment. || <pre>7CE42822813F360928801C59E01622AB</pre> <pre>7CE42822813F360928801C59E01622AB8E0840ABC5A27AE768F9C7B06C7C6EE0 (full keyslot)</pre> || <pre>AF5F2CB04AC1751ABF51CEF1C8096210</pre> || <pre>unknown</pre>
|-
| SPKG || [[Certified File]] || Internal <br /> (System Debugger) || 0.920+ || n/a || <pre>23F1D525244266E6DA7A52DA9446318301EE8CC58D54901AE94D93010F7DEE6B</pre> || <pre>3721F7C05DE5F55ECC39BDDB4A6C585D</pre> ||
<pre>
BD824E911F2F61AEC796A1B930D181A5
27B49C798F46945982603ED32FFE0AAA
3DBF62E85858589D81A92917F8CCF139
0E6537D83DFC56DCC17D81EBE5F7FCE8
AF002397F9EBF1867EB4A461ADF5E8AB
FF2127CBA6467EAACC5E19ADBD1290BA
824E14D1443A438DFD19AD0A189C8F3C
B641731DA5175D0F4D1804C0D74DF334
C1C9D53BB8DFE89258F70957E30DB72B
39404A68B8C547BCEC7A93E18E40BD1C
CD3B3F4488F8E39C222E25CC37D40D0B
9AE63E86F9EDB26F1E24A05DB3AE683A
56FD5FD62FB530ED5F891B4E546A5B20
4CB4E9E478C89E849C33110B8C88A1FD
125E83D5CA1452248AF145F68150B122
FE308F579A450220875C4747A94952E1
</pre>
|-
|-
| SPKG || [[Certified File]] || Proto <br /> || 0.920+ || n/a || <pre>FA88E5B5CBB49603DF689F139045E7C3C9C7E33B5923DF54E4C5FE5298B4FD32</pre> || <pre>5EAA69AB35E737EC22C721A916E00263</pre> ||
<pre>
D73C9A8F35254C08C82B1CAA8284D5BE
E0335393BCB317FFC144899ED31F6419
46C58D0593AB150937471082FE41EBD8
46054B9C951AB5CB0691B58409BDD692
9A361E2E5F59FCE12214887F44359C6C
DCB0F50C66894D03317D5E706D44D8FB
F05641D7EDA0A5C6B25FA7A37738E654
D03653A520E222F0A28AD8E214089F76
E9A14B71BAD37167F04952D6FC6F6E10
682FFFA6C48C33E24CE494616EF4697D
02AE4FDB9995A74C3F0BC2FDA0DA84D3
9CFCBCB6F1F38184973E6763BFFF8527
B84A917A5517FED4D3DAFA34F0AB8BDC
3FD41E2DB107E56DF6CBE698DFB6ACCA
0AAD445C2D23AE2DD4F5A5D48EBB851D
5A91B960931D96386A4CBCC1F8AC6C35
</pre>
|-
| SPKG  || [[Certified File]] || External <br /> (PDEL, PTEL, PCH) || 1.03+ || n/a || <pre>2E6F4751D15B06C51F572A9306E52DD7007EA56A31D459EC6D3681AB08625501</pre> || <pre>B3D541A568751DF8F4833BAB4EFE0537</pre> ||
<pre>
BB601FB5D4E48DF0377935B275956F17
5612A888241F2FB3C5EE24524CD0E18D
ED32E72BF2215542755942F709495864
AC23CEA18D84F868A2CBD1D808AC8633
9B891283CAA01673B55926585A193184
E394E7B1C5726AEFAD11DD63C036BC68
3DC5521318C45DDCD3F256F3216138C3
07843CE5633DD4FE3EB64520B696F02B
EBC3AE6A44AF75798D1E51C9B0E0E44E
9662D0BF10C7A1C92C4346AAEF860E96
9072A42E363B854821A399BD340FDA15
C68EEA8F5E922E78E92920F89F5FE999
9442A1765BA903A0CC7A933E39D38FDC
6C9832D77B04316E9B60C1A18F38F7A3
7165CB70A438C03225E2575D9F95FB3F
CBB658D9C0DED6C23A0E03A150D4FE99
</pre>
|-
| BOOT || [[Certified File]] || Internal <br /> System Debugger || 0.920+ || n/a || <pre>9D3F28DE30DED1D503DB6FA762A571C422A88D0F361899EF36D357059C72EC43</pre> || <pre>30E43CFB57D418A5A0D32A9939D23501</pre> ||
<pre>
C8195172CB70B06A29FAEF059251754B
87DEE210A6C35CBA5367D5965BAD4A43
06F7E5B1CB2B135CB240349CAB66B5F2
208F3FBBFB3B2D01E0059BF64C4DE894
F716F8AB18057F52ACE45940A7D67604
80B4E9E993E5010AFD5492028BBCA663
D3E59032AD52D0712CDF169274798323
52855F4688420157D02B28DB22E760CD
81DEAA802BE2D1E5A33FB51F6B3713E8
F524F34CFEAB50C5593366657C3C7090
7516B0227E93672FB4D5E3A3D64A0743
6B5A6CC514F2D76F3AC5BDF38DC08D6A
007336A88690EFF5BCA98DCB13B52E2B
713CBFECDA9825AAD6BBE41EE4BB1A5A
AA052741E71586CBF5BAB7670F997B0D
23E43C08C6A1313E6A3E52A5E714D01B
</pre>
|-
| BOOT || [[Certified File]] || Proto <br /> || 0.920+ || n/a || <pre>9EE16CA4AADD77F53BEE0F4AE3D45326D009806D2DE9942CE0836E43DC5DD1CE</pre> || <pre>CFBA84A87EE29C9A521CA20691485E45</pre> ||
<pre>
CD45B1D60A1727A7579258E70B5641AB
FB02183E9689270D266D3A5093BC5FBD
9AF6479332770AAA0892A9A59C5099B9
C8C074BA7D3DFC3865892C4D28F4669D
6F89CC77464EA9005F581DE523C177F7
0F0AF3E721CE46430B5DE5897CFF1BA6
A6F329958AE7235A9EAA35078A39F6A3
82C061F9DDD4352429D7ABB1E62ECFEB
1CB815EAED057B48053ED1A57CFAB1AD
043D130876277DDBDCE31CA8FC14BBF7
63102A2A60F70B97A88301B43A734473
462A85398AC474914A42314EBC581FB0
E2333B08A8653532FF9BC53E64B42B36
8F0E8208A42CDB7FD148E8A43F899CD9
35C28806E22008EA72482FDB863F98A7
54DAA6F430BB637E9EAD075179EEF11D
</pre>
|-
| BOOT || [[Certified File]] || External <br /> (PDEL, PTEL, PCH) || 1.03 - 1.692 || n/a || <pre>7A7FB1560DCD121CEA5E11B90124B13282752F2D5B95D75036AB3A29BB3BD2AB</pre> || <pre>6C71642A042A041F1EE3094070B009BE</pre> ||
<pre>
C6F09DAC32179DC85881C5BAE1A27D04
3B8D114DE4349718EB3579BDF7FDE9A1
693B3F5AA21DCBAC926D2261CC252DCD
BC1CA6D7896B4B6C2546F87F61FC676B
83E42358CF1EEE07A1080E23ECDE80A4
19BC64020A8EA4FA46FB3308871070A5
5725EFBCD065CF6A3B327AA7D0C398A6
C36603F1A2060ACF3A0040DF907FBDED
3A8417DD33798518CC83D1A91F7AE8DB
1B1DEBB151266B952A0F839E1F9C68D2
56371E5525E70607BAD72EB62B38FF2D
F4556A453A43BC215EF1ACE115568FB6
79B61FBD7A110CB966D26EF159A1FD0E
17752208CE8E7E75F42D4F5BBEF9DD6F
8C99700D214C9C8A5EFA0C55024A9DBC
07586D7FBD2C1DF72DEB8B442C0A8823
</pre>
|-
| BOOT || [[Certified File]] || External <br /> (PDEL, PTEL, PCH) || 1.80-3.61 || n/a || <pre>B1B936B512F9A16E51B948622B26F15C53680C77AC332EC25846B839520393EC</pre> || <pre>90D527BAF7296B5B6A576CFA6B54D266</pre> ||
<pre>
ACE1841824FEC57D354ADB3C0572CFCF
64F8F3BFCDC732DD4F2E6E4A08A5E53E
66182123EF1074E64ADA5FE2279A7EF1
CB0C61A29A2BBFF21214C13BE7AC453C
411093FA2F2511E0E032BDBA4E73C182
9DABB08167E0A4F10885F6423C2EB136
F55149AA64E7A1AD0D8C47FAAC861511
06B96208CE9669EBAAA09B8ABD816526
D7D56CD692EB6A1405FE021375E4975E
E377A8E51C44C471FABD532C23B7543C
0463DE144DF6D4FD75CFFA952CF53B07
46419684FB62EE341F3AAE9096BA6099
532D160DED09DE3EA7FCE3C1EEAD7135
95D242DA023360A560DC31E4ADF58F16
94082DBC66622D683564983AEC351BAC
3774A53F49AB3761CB40C9A2485D3249
</pre>
|-
| BOOT || [[Certified File]] || External <br /> (PDEL, PTEL, PCH) || 3.63-3.69 || n/a || <pre>426FD1D33FEBBFAC560B7957B94F445AE5F1DED2AA70F74DB944645DC439122F</pre> || <pre>995F1364BB9735FA448B18D886150C85</pre> ||
<pre>
B19901417A312E32F8B7C394176F1BD4
868E5C01C4B0EFD2F5E2C2FC46DD0F61
4F59D9538469E0FDDA78F49D38E81108
2F63933680A356CE5F201FA8D80643C9
FF48D4BD2EE885AA9CC8597A4C212B0F
942BBE32A1146F815643E1CD4B1E2FF4
A5343E79012FF82F945132882FB7D18D
19CC51E7BCC4D1DC56562108694A4694
A999AEC96943086A6FBABE874285363E
5E5BD1881C9A6CA80870B1D09B613876
8F07DE8F726CC574B7152FE83E816FB0
87469CBD9E39EE660950727C42B15F2C
6ED86B3FD6DD98CF416B0212C5A788AE
F6F0AA29AABC7FCF175CC61D7E460EAA
A7DF2E9993A34B0F2768E6F935D831B9
79FE4E2A37CBC7C603AF68457EA5906D
</pre>
|-
| SECURE || [[Certified File]] || Internal <br /> (System Debugger) || 0.920+ || n/a || <pre>AED9D76EE1E29290002BFF32D4B0656EEE40FBDA4F8B55BE5BE0ED83530F27D2</pre> || <pre>DB50912F2416B54F7F36227169ECE500</pre> ||
<pre>
D970E1ECEE27CBA9EACA424950D74C43
90022429265D38FD0AC1ADC2FDC9C569
F696A857F2E86D609F448611C1E2FFAB
2CEF575B92DF78182B2F0BBF3EFBA62F
5800B22EC649E2870E6B0829EC9BB4C9
04D24A99F269C960FA3E12314D8F08D5
124C671F7C92900DE0EF45CBB4415C2D
1AFE74A40633804A05D9A789916EDAB5
2A71B6DDCB0AE21B810C4FA69CE5AE59
0250747394F88E3A711A9A1D92E65857
383EB0F6D81D7ACD003EB2033B7029AE
44E500ED82179F3B1DC37EE89E2D6DF5
A5784339F714C1281392BADEC780F569
CB0D8AD41CF1568D7B7DFD96F975C07C
F53615766E6ACB7C70C5125BFCD9E9ED
219BBCDC34BF4B420ECF4A62AA185D47
</pre>
|-
| SECURE || [[Certified File]] || Proto <br />  || 0.920+ || n/a || <pre>B982589B568CDD4055433747DF19644A8D1B479B17CA44ECE5E82694550FEC74</pre> || <pre>BECEDF96543939032CC4DD7D95E47720</pre> ||
<pre>
DD60E4C2FDA981B3FAA32CB4F2B5A080
54C9AC1D4925DA062553EEC935987EC9
5FF81E009F4F071AFCD97432F06CC1BD
0EB2930D69651DA532B72F7F79FDDF1D
B49555B5F5A7EEBC11DD4931FF3F0A4B
A3A62B9709F9FD8FB8E5C787EC2362C8
749741F5DB1665AC03E919E6E155A998
C076670F7F4F0376FC4D34AFD4B841A9
ECA8AB6D8668B79F853F86B2CD9B0233
A6345ED5431A8A7AEAFD458DD6026EE3
1A8F1D37D50756139B7D3931CA4A3A59
0AD553A6A5109B9214D8ED4589E9EB71
02D8686E6018348A9FBD1B182A0F2D77
D51857DC4149E93BE0419CC7B8846CA8
4BE498BF3E16EC53CF06B54C7F8B560C
4DDB3E243F8538B00AD112AD2FE83759
</pre>
|-
| SECURE  || [[Certified File]] || External <br /> (PDEL, PTEL, PCH) || 1.03 - 1.692 || n/a || <pre>9D4E4CE92EA1C4576EB9601EC43EC03AAE8EC324ECF6DE01E918E61D2223EE55</pre> || <pre>CFEA3CCBA454D3279AD7CB0510431434</pre> ||
<pre>
AD3229A94BCC5E46D203B4A0806910C5
BE028CB2931570A19DB38A7B6EBB3A7F
F9893F14A5FA1ABC65250EA6AB3DA66C
A9A0B8C08D7C54C6AFE3E34FB46C99F9
CA27E6D96785150695F8BB0CE1E22DFA
E8AA635BF156B72A2F7D8959841B2E16
6BDFA121823F018E6D34228FDC80D2D1
B3BEBE096742327E1FCE7C2FFDC277E5
C3E34E6B070C35AE1C114746C412A196
451AF788A8989025C35AE2239915C5C8
0B9614079007D17BB8A080ECB0639452
C4DE1A9B66451148FBA841CD64EC3557
A3E9E3D77630F62E4937D7ACC604B91F
B5A68A8E49D1E1577D8ECD11FBB73640
C2FE42F9B330CE8926DD83B8A0877A84
CF79A4786A0C2489F6398CDC37E31E9F
</pre>
|-
| SECURE  || [[Certified File]] || External <br /> (PDEL, PTEL, PCH) || 1.80 - 3.61 || n/a || <pre>B1B6FEB39A8BD7A2AC584D435E150C624F560D3EFB03E745C575E0844569E2D0</pre> || <pre>89B4E6BAB03B03D49BF0FC927FEA8659</pre> ||
<pre>
C9F97FAFB842FBD73A6CC06945B30A28
E949831AC895B734243E176B839C2710
48EF91BBF0D55EB88BB1A3A7853701CE
23460FA789A04754F0D32C9201DBD61C
B25276896847A483C20120334EC934E2
EBD6A4F2A8D9D55D2F9AE5A99BA6D940
065F3FDCB02F9990D4ED6A9EBB936A1B
FBFA9F8AF1EBFC703A8BD8DC93CDF0EB
B9F955D64BE7B928CD256447D1FFEAE5
83884631F209ADD00D612F40CBA29219
DF7785CB23BC97327709FF147D1762C5
0D5AEA6F56758362F19514FA51A36BEE
95CE7C332655E247496C922EB1AA209F
0437651417DE214F9DA8BB6919371E63
E1759CB5A7962583D7B0866CB6EB1A1F
BDB7D3F4DBD90A45617A2AA37B414971
</pre>
|-
| SECURE  || [[Certified File]] || External <br /> (PDEL, PTEL, PCH) || 3.63-3.69 || n/a || <pre>59AC7F05E115D758201A3F3461BCA0D42BD186F00CFC24263973F622AD9ED30C</pre> || <pre>A053B00BA4BF880799B4265C6BC064B5</pre> ||
<pre>
E8722B48CE574F27EEDC480ACBD025E3
B754A5996198848DF654C7459EF6B205
3E3CFD14C5046EF56465789A6754A86C
B96EA9F572CE4F7EB8033491EF516DCC
B8DAE33144AABF0571723DFE822297F2
3D3035604A737F6F211ACDE3E34AA1FF
D6FD515DD00EED22934497B5746945A1
2F1277226A31A091A8F7F4A67BC30830
76FE1FE278967CECF34B671C7065BA68
D9D0AE8E781FF86C3C914589D92106AA
3450DFA6421D755109C02C6ABEB6EE28
D1083EDBE9B0F496F182D92F0957DA54
DB1330210DCAB08D175FB6B9F7666860
A5F8C6ACE4DBF798BB348415E0EE43B5
979BB70EC065BAD41BBE225237D362FC
681CC31DC200E22605F4A07905401EC7
</pre>
|-
| SRVK || [[Certified File]] || Internal <br /> (System Debugger) || 0.920+ || n/a || <pre>EAB14F9BE15EAEC1603BE63C9FCDE4099D601FB0E9FC4DF250B8DEC635987A1C</pre> || <pre>30B9E61707993B635D0E182446DB0B8D</pre> ||
<pre>
9C8F5072013F914C15408EDE85D37E4C
0B6CEA08AAA321680C0E11DD299D2A45
0671B8247E8405F58EC0DCB33E1BCD8D
40E790650149E6DD2C62FEBA196FE4FE
AAD72E69CF22D217294F61E1A88FF33F
45255E853D0C2E1D206287ED76DB1C8C
D75812DD7C36CFAC0A97F30F07F02ED3
E8A79A7780696EB4FD24829E0D7FD054
1FE4BF490415D9E0CC2116B703E2947E
5269B63941FF511C183E4D2A0818F931
988DF36EF8DC972EE2709336018C9ED5
B7ED68341FFB229E82C97E5CE900ACF3
E5EA2E86BFD32A4BD0D6DBE17713DA78
3626911CF92C05EA5AE879A3272134CF
35D567D5FBC159DEA20A1B0550A12F11
E9E54DAA84889CF10B72C59E7569DDC1
</pre>
|-
| SRVK || [[Certified File]] || Proto <br />  || 0.920+ || n/a || <pre>A603AA68753CEE3E186C81900A862DCDB13505D39FC59C62BBFAD94C526B8A06</pre> || <pre>352F596CFB513A148B95F9D78E57E755</pre> ||
<pre>
</pre>
|-
| SRVK || [[Certified File]] || External <br /> (PDEL, PTEL, PCH) || 1.03 - 1.692 || n/a || <pre>4648164DB9E67009456C7CA6F2378835FD678539B36B3DE6F1C604B7D4258141</pre> || <pre>6EC8AD67993DAE75675F0AFFDE5C41F3</pre> ||
<pre>
EE55BE9D6B5FF27E9D87BD5F40F8ACDF
F59DB8CEE4777A8ED0C7FFD2B7C3C596
B25796C0D8692C8204684D6B27D6E955
3ACE2D99B998AEF37689416819BEC3EB
6A4E8B3DC2BBE7AA961BB93536B05FAE
D8EE17BF4A875930E40DDE3BDC5AED0D
79D62DB3E059851FD91F41BD4F8E4CBC
C5666E2850D34B28569AA0E5FCB67438
5C589F619B87AB4F274247DAB757E345
4E73B6980C6E7579B77D484205E89C91
7CD8B573BBC4D90BA2730267F4F72DCE
39DB6F8BC1273A3C15CAE1273723BE99
77B4F7E283AB01174A1E1B93231736DD
76B9F9CFDB2B94C6B6CD927EEBAEF99F
2A8F4F6E91667A6212E90A17FD1B86F4
0DF73E8B33DC4E629937C39C6F4F4343
</pre>
|-
| SRVK || [[Certified File]] || External <br /> (PDEL, PTEL, PCH) || 1.80 - 3.69 || n/a || <pre>DAE4B0F901E338DEFF3CCDBDEA1E2FDEA9926BB98CB182443CC0C0F7FAE428EE</pre> || <pre>18D925FA885C7E28A9CFF458C24D8BED</pre> ||
<pre>
B09BFB3EA696732FF3096F91954F613E
797BC7531F81F6CF31432F143BDF8D5A
B9D4362A382971F6892280615FB372F3
37DE2B95C672CFFED65C9551C52F94DA
C6694D62CFB90BD64C6249A550B43A66
E5761606A066E75C2593BFEB72D2F53F
6C39D2AEB1559868A7DFCD7DF82802B9
39AAF84A8BDFC7F88DE442980206FC88
50A9EB1CE2F98494ED9F8C2502756047
7D3DFF61016B056A9CABE958ACE107DE
7D0B629DAE53093F1BBE9BC88B8D70DA
9BE0D0EF1E744EDA8E3EA0D54628AB43
2B448C595EC02257141FDBFA509E27E6
5C8DB64C9FC8268BF52AA4FE5F3D97D8
0ED063D2DB8C289D87C6E31DFE091CA8
C0CF7F28CA204151F50F416E7DFAF4A5
</pre>
|-
| KERNEL || [[Certified File]] || Internal <br /> (System Debugger) || 0.920+ || n/a || <pre>74F6D2A1D2A093AE32B83337E0AE4AD2E6D93B034F5BF3B68DB77131883310D4</pre> || <pre>926AB55BDADC45DBB610E90E56A0368C</pre> ||
<pre>
C2F385A70C3ABA5BEF408374C29CB022
DDB2B1E24C4F06174AA37EFC38AAEF4B
D1813C86500B1BB8E7C6FD13FD3EE071
2BC384C43488F67D1239B088D34C7263
8612F7402B218E733D02939FEB3EF087
604F481BD17821258585FE52DFDC9047
98396F34DC69CBCA782D8A3BBEB1AB49
80DC0004435E77BDDDFEC9D6BB80FA06
5E0B5751416C23EFBEC40DFC42B05086
CC1CCE7AF7CFC2404DFCCE05F5BFD56F
3FEAA9738536AC356E0D028B4098C449
12E096CB3575D2900F06DB5DDED3B36B
6844F4860B9753BA9981ECB74EDB3828
476DED1BD9A9784D3B69C801688C3DE5
8325CA05160CD9C362BEF13740E0E5B9
2C14A62B925FCDA754B2B106BA42EF1D
</pre>
|-
| KERNEL || [[Certified File]] || Proto <br />  || 0.920+ || n/a || <pre>61E7E786BB6F67570A71FC92E73885439CD16B96BC7C37C200EF11D3446FCF69</pre> || <pre>99E8B68EE784FDAFC3294B8E55F0C529</pre> ||
<pre>
DE8F9031E864B17AC0ED93F8B2860398
3AEF4CCC7992E254D1321B3BBF7B8819
EBE814C8BFDF6353F29254CC01DDCB4F
5512999091BB5A62BB6C29B0C484AFB3
155B03F706CB3830BA0BD05439DF1416
0CDB19113399D08264DF47DF73677330
7B34E5339A5B14F5D2807D568DC3BBA0
4C5FDCAC10F92DA8E3A13DB4F0AF3950
C8A2D5FE02710E6D2344FFCBDE0CE6B4
E7AEA5F4BA097189A9E2E5511BB5DD17
034308B80419328FD42505CAFE71415D
F5F6D7E01B92580E1A8EC772AA668493
6B19CDE2CC0C126D0B1846D47DD16D3F
434954FC580C4D167346281FDC87E0FA
4C2E08E91DBB2FF1933A0681771D0156
11EED19741166265E0C827C20AB7237D
</pre>
|-
| KERNEL || [[Certified File]] || External <br /> (PDEL, PTEL, PCH) || 1.03-1.692 || n/a || <pre>B4AAF62D48FBD898C240308A9773AFE57B8A18D783F0B37932BB21B51386A9A0</pre> || <pre>8CD162C5C613376F3E4BEA0B8FD5A3D0</pre>||
<pre>
BC25A8ADC24861B587E9EBCB0D73F5BE
16C3CDB2606608BF68211AB44514F275
5C14F6B24A6692D7E41B75AA44C59FAA
7EF7B5993F5E311F50295A01DD8D2E84
3EB00B95E49465E1C0A52BEC3CDE3587
93745FD915E04F3E02E8340782602339
266923DCE27AAF46336DF0A3F6A984BA
E44343C20B47C90400250F8152025EAA
0247BD882123F21B5310897A8B185039
1E049E2593E6313162A7502CE2E7BF18
63C5FC3A11197036691FCE8C967D9760
8F33DCC48D65C720C249FDBFC6797A83
27F1B1E53878699BFB37254B3680170C
D78F9087C925D5863DBC94B890521F8E
56DBBC91925F610420691B8863252DDE
28BFC407D97A7E053C6A26EA123BA027
</pre>
|-
| KERNEL || [[Certified File]] || External <br /> (PDEL, PTEL, PCH) || 1.80-3.61 - Decrypts scePd || n/a || <pre>849AF7E8DE5B9C28C38CA74963FCF155E0F200FB08185E46CDA87790AAA10D72</pre> || <pre>88710E219454A3CBF6D382D4BBD22BFC</pre> ||
<pre>
C0C47F0C9944A43A642B59E0CDA30411
892574373FC07C5F9D9D4D9E36C8AE39
06FD2A3DEE77185D0C46E56EB95D8B6A
EA96E390A7E91B21C15644EFE5A921A8
3BC63C1D8630C7340CDE67E239C0D0D4
263B334296B25A647410F1F8912726C7
0E5B75F4EDAD6B32767CD2BC7FDC6A8B
784E2ACD9DA7199CAA252B29CBF40938
8B2A6D6739BDC493AD1085978A29FB1F
1D3804F68CD3F0278452FFFAB6537E1A
A998F041CAE53D6DF7DE98EA7A3B8129
11481B1134449C63A84663FDE24B9187
98A9906A3F4FCFDE4920D23F73BE9FB5
D739AEAC98B51857D9A7648A9AA311E1
5029D7A99514D5B14F9E52B00D6E7D30
A7DD31E4388C4E09EA55663EB51EE1A1
</pre>
|-
| KERNEL || [[Certified File]] || External <br /> (PDEL, PTEL, PCH) || 3.63-3.69 - Decrypts scePd || n/a || <pre>18E26DF712C362769D4F5E70460D28D88B7B991733DE692C2B9463B41FF4B925</pre> || <pre>5B13077EEA801FC77D492050801FA507</pre> ||
<pre>
CD3A2672EE97FE68CBB2E03B176623F4
1BF380BD41015EE440E5766FE55FFF1F
D8F2B9ABC3C71E582A4BF4C6F417646F
A15E0503DA3CA42792BB3FDDED006821
D5C10F67C122D3D902D830BA34E642F7
2B71DDD9D0B79EAAD651EA91E332CEDD
014744468AB8B5788FDDDA41D5AF3618
424AC7671058CDE89450AFB452357080
A8A5718E5702F10DFF1BFC8F41B34328
776E2B08E36D02717A96C90EFEE17C1E
23BCDAB01F7912DADF8A256C4C474849
1591EB8830133CA43C800A13142E93C4
94F85B346AADEA0B6067DD6F9BDD9C0A
2BA7F83557EFBFC420EAD81F828A20D0
1B2296358D7E3CC2D9C4C177901260DF
115C1876101F02739C1DC64DB100DF55
</pre>
|-
| USER || [[Certified File]] || Internal <br /> (System Debugger) || 0.920+ || n/a || <pre>322D706CB6EBEA14DEF7BFE45F812971347DC95CD7697C16A71EA4B2A1E12C0D</pre> || <pre>31FA2E606031EDF39665B5616E9F937D</pre> ||
<pre>
ADF0C3B17044488306735EDC7A0B326F
3BAD99AF586B233958B82C921DDE3EC5
67B69DAB66FC674F7C4E99DD49679244
8F012C7136E68E21CFEFDA257D4D18EC
A7040BB9972C5AB9B30BCEE77C3C9AAD
6CBB34B7A83766159B041DD02EBD4AEA
CB491F1818E640FCB1C145A14993B92C
05D5207D6B9FEF460E621A48403438DD
25CAE7A8934001BC89EC98ADBB1436C3
1AC0D4EBB5592BB548AEF8A2585585BC
1B3F4625E35BE3B85930B7E36FAA38E4
B1B21D1960D66376FAB1CF6F0ECB3364
3BD5B4D8DF8323634F7B61AFBCF8928F
C07893F10C1485C315961A76C25B49C2
D0EC8348F3F67405687270FCA1CC2B50
C0B8CF62DE5D852B61ADE9DEE8F17CB3
</pre>
|-
| USER || [[Certified File]] || Proto <br />  || 0.920+ || n/a || <pre>8D355E70736EF7AA508D640D8D382B19D9C8747C4A8273A6D5707F227F49592E</pre> || <pre>BEB4819878915F3025978538693B3EBB</pre> ||
<pre>
B3BD307380603F37EDAFC51BF1B483BD
5A5F936DA2003F6DBB55A2F1AEA147D7
A974EE44884587F726630D0A087A3F1E
CD232F5710B8AEEB370BB07A84E28F36
59A8D66E8CE731E714D9C7BC599544AE
590C760F37B218FE31D0460B2C5EF403
F29DD48F9D5378CDF637782CBCED1B49
470AD0555F5152C88B5FDF42B9E60A90
3995F564B2FDE507376F6A0E6CFF105A
B4568525E94AC44B616AAA040B26B2DC
F4E87E360EEB706EFE4E52CD585FB36C
F094098D7D6A8A7DF313AE8EEDA0CD6C
C92B49525F821677C7C4A5EB7CDE6729
27EDC1F5527696229021496C5788EFA7
19836EC439EEDD4235CECD97CDED8FE8
AD5D4F47388B04572B6C4FDF9BDC6485
</pre>
|-
| USER 0 || [[Certified File]] || External <br /> (PDEL, PTEL, PCH) || 1.03-3.69 || n/a || <pre>C9AFB5CDE420F208B68E8C114778A55CA16E38C376490360111F21633FAF80BB</pre> || <pre>92CE0F89324414E756B824DE1CBCCA6B</pre> ||
<pre>
F105999A3404267136749C8B0D1887E1
70BE5FE6F543429A5FDC4A566955A376
3157D45EF1253E8A7BD89019E100ADBF
C1519E1F52F761C3710F95D214320E3B
FEF2FA82DE6CBB56BFA337D434DC2170
0FDA88E936CFE3078FFB69D1149DB544
D2B551599DB673B2C5DCDAFF6A827B6C
4192898A892B61684D5F21635CF204C2
E114D16EB04AC7DE92ED35B9D89933F1
C7E4C64AA945ACC5301CDB1A4EA70F70
50DAE29E67D289A8818D364A8C190FE7
8237C552C61D393A5A84B5B6CFEBE3BA
2E514DFEDA33A81D5CE09DA1B4154209
B6B1B4C4BB2994304B31594A483E09CF
7C428F7E54D6A9B4DED5B4A15A0ABB88
8389ADC1BDD663F739F770166909F635
</pre>
|-
| USER 1 || [[Certified File]] || External <br /> (PDEL, PTEL, PCH) || 1.03-3.69 || n/a || <pre>613AD6EAC63D4E14F51A8C6AF18C66621968323B6F205B5E515C16D77BB06671</pre> || <pre>ADBDAA5041B2094CF2B359301DE64171</pre> ||
<pre>
A4AA9F81AE21F8EBC9DA36BB9A1BAE75
25841DB46272C5794BB36E3DB249C6C4
8081EF602F7940C67AD3F90EE5A84CB0
AE3AACDB08C6CD14D3AE3FC073C1AA65
9E878F4AAFE3BB1AE3CA1D261B0E7FAE
82B4BC7F0E1B18D9E46EE3B74B1571F7
743F7DE787E09F9B1B5B8B36FB33EDE1
A15BC53B5D435F3698A9118B9566C51A
056D66099F11494250827BA2810C30F2
AF98EF312615D673F8CAD88CFBC727B9
AE5C2A335FDACCF7D66FB156064BFB7C
DD63CC3A91CBFDFE056DCB1426A204D3
71513763B8AE8C1CC5E54B36A6AC33B2
BD5964ACD557518A4E6D70803DF9C451
8DBE5612F2737DEC0ADB36A86D694E24
FD4D0EA3E6CBF2EC7D6B0CBCCBC59F41
</pre>
|-
| USER 2 || [[Certified File]] || External <br /> (PDEL, PTEL, PCH) || 1.03-1.692 || n/a || <pre>0F2041269B26D6B7EF143E35E83E914629A92F50F3A4CEE14CDFF63AEC641117</pre> || <pre>07EF64437F0CB6995E6D785E42796C83</pre> ||
<pre>
9EE60F144BDA881AA55B37CD84703625
48DB93EB8DE5CCEC8A75E19E960BF3F1
D64FBB33B2E4BD4FB26AECEE18196963
4519D2DD04D126F0B2834A1159D197DA
AE80AC5D4602A5D16FD7599EE4711264
4E5E5C1FF039AF4ABCA339F7E0E6AA97
5513041B48D9B04D62E1A1889DBE8711
0E58DACC43A9A23377683CC68487C1D6
32EECB9E0AE5E6B76E51253BF66D599F
EE8BDFA216760CFD0527801DBEA23F63
EA03879A841BCDF21F32A122427B000F
B2A05C5F66FBF2D91C5C2E09478CC2F6
BA36121F902B718646DA4F13BD9348DC
8C355573B8024322F85519703F0941F1
05BFFE6668A736AA7F8D3C6C318CEDC2
D47D820FC4EB496D0299BD1C5A5E69B9
</pre>
|-
| USER 3 || [[Certified File]] || External <br /> (PDEL, PTEL, PCH) || 1.80-3.61 || n/a || <pre>3AFADA34660C6515B539EBBBC79C9C0ADA4337C32652CA03C6DD21A1D612D8F4</pre> || <pre>7F98A137869B91B1EB9604F81FD74C50</pre> ||
<pre>
B0F9349CC3908CF5DE59900E0837E840
71BD8B5DC2621F48130D3200CB5ED0FC
7475A87AE58A2F525BB09B2D9D3C2D57
5A6C30A02B0A80C6677A9F987162AA88
38E1013D6ADEF1AB207D15166F639B27
C47BAAD813FD07570773CD2429EF912E
04E8AAE52EC7F4E91918293DDEF24051
657F22C5D7564AD697081C6ECDDB43A3
243156468B968AFAA867F7A20C110625
EF05E0A2D553BED2CE1B7FC8D53DB774
51330B73E1C1C28F604D9D21985C7975
37924F65B814C5248A7638C51EFCEA87
AAE7F94ACFA8607C0EA018BE01BC4BF4
FD23CF08752DCB5FC05B61C4997BB623
E6C9C8A6E09067EEB3E4C7F6B41884F0
73DAC52E4D790590FAF84E5FDD35897B
</pre>
|-
| USER 4 || [[Certified File]] || External <br /> (PDEL, PTEL, PCH) || 1.80-3.61 || n/a || <pre>8FF491B36713E8AA38DE30B303689657F07AE70A8A8B1D7867441C52DB39C806</pre> || <pre>D9CC7E26CE99053E48F9BEF1CB93C184</pre> ||
<pre>
CB93C1849D2058478063D1F64E259AF6
5C649AB78CC1566CC4D24082E5BE1A13
861D25617D3BEE9E16F451788E102217
504804AF65E8FF1CD52A773476449B26
77BC6C8E008B540F0683413CF0FF3A79
334406DED5CB92CBBB61413C349FF482
27FA733BD2F0FC36156716481492F8D8
04C2F29A75D60BE87DD0EBFCA35DB661
B0A92C6A38F294D40A67C6FB797E8445
01A4680EF6F73FAED3DAD2EE39C67E85
64F74683C4890F217BD426A9443162E6
7D051FB2292AEDD0F228923BB7523A80
4FB4098D0B7F92662BB0B26162B16E2D
76F7311B8E5ECF89337FD081C401A205
DDC4904BDCC82BEFE651C3C7F07F556A
B1CC5AF7BC3E4F81B9DBE89955FF870B
</pre>
|-
| USER 5 || [[Certified File]] || External <br /> (PDEL, PTEL, PCH) || 3.63-3.69 || n/a || <pre>4D71B2FB3D4359FB34445305C88A5E82FA12D34A8308F312AA34B58F6112253A</pre> || <pre>04A27133FF0205C96B7F45A60D7D417B</pre> ||
<pre>
B734B41FDB38573145086C3CE86FAFAB
E006A877E951505A0F062CA79C9570EC
A60E5DF0C277AECF55ABBED18B1522FD
52543CFF7BB8898EA0794855DF716E88
1EB89F8E2958DD676EB95FF217234426
28CA52FAA89CCDB3FC46BF1D123FC950
CC65DBACEE555B04FDD4187AC6A3D090
61FB57D9ACB1A592094B227C2E21FDD9
5A757528A41BD79F385F7C3C80F850E2
60B544E8EF68B8897907495314BA3DB5
DC10B328E040BCF1AE54A8A59D35C691
52EF11FD085772F5206EC689A89D890C
9A7CDC9951CBB41C0D51615C38A4AE2C
05B29D0F5A63726F8623A5F3CAFA4C97
29E86ED692CD1775023A449C0BD8FF5E
7A7A2E6689D7CC53C6F881484A858D2B
</pre>
|-
| APP 0 || [[Certified File]] || External <br /> (PDEL, PTEL, PCH) || 1.03-3.69 || n/a || <pre>5661E5FB20CFD1D1DFF50C1E59A6EA977D0AA5C5770F53B9CDD4E9451FFF55CB</pre> || <pre>23D02FF79BF430E2D123869BF0CACAA0</pre> ||
<pre>
BD7D071818433B4312BA784DB296ABD0
9FA25FDF385CF15E808065AB3AEEE183
2BEE04ACDE465D0916B7BEFBF3718A1F
8B64DE685EECC96FBB196116FDA91E88
0D9316BB05B50FC9C35E37E9267C8B15
59AD9DAC4F2B418B059A1EFDA848FCE4
9E87824CFF25B7CCA0B6642EB0A4C4F5
A7FC828EBE034D6E56226A148EAE5112
2E1783ED2DE85C7B95882F4352FEC904
32699E452DB74A01A163303593D60CE4
270FB6C1F349C97AEAF7D2DDB6EFDA43
69A36C2F2A55B7E17D0C36CD60CF4BB4
0D6D82495E65B7BCCCF2A6D032BECAF4
FB044471DF10B77CC84F887E953D2B11
3661EEF0EC70863E552DEBFFA398C976
741D2CCFC5C2C37BDEFADD32DC68B267
</pre>
|-
| APP 1 || [[Certified File]] || External <br /> (PDEL, PTEL, PCH) || 1.03-1.692 || n/a || <pre>4181B2DF5F5D94D3C80B7D86EACF1928533A49BA58EDE2B43CDEE7E572568BD4</pre> || <pre>B1678C0543B6C1997B63A6F4F3C8FD33</pre> ||
<pre>
C2C6F85A213CADCC1F71B6DDC2FA7ED1
CCAEA81EA4D1468D160B0EF3AD3EC64C
B79B094507FD03B36D7644704659C927
EC510EBEF47A7262E46E8A691F166974
11CE34E1DDE5A142D49932D0DACEC936
2AD3BC2D118050422861D4FF49FADBC8
853D5D3326D84AF9AF0803C2B3B1844D
0A085D61C444D1AC44948E3C077D093F
9E8AB4AC7BA091942DDFCAF22363A6B2
02B6CF071BA6348C91B4E0DA1C010364
26F5DEB53C53657A613AFE6C07F582C2
6E808FB6892C0E2D98F3CF5838B0CFCC
AF4BA3CC61053D046D7C25B27EEBBD62
75FD6B83F0934EAB34E838B2499DEE7A
AB4473A630B5DAD6FDA8D857A10118A4
354333792E433B0A3CD871D3641FFDE7
</pre>
|-
| APP 2 || [[Certified File]] || External <br /> (PDEL, PTEL, PCH) || 1.80-3.61 || n/a || <pre>5282582F17F068F89A260AAFB71C58928F45A8D08C681376B07FF9EAB1114226</pre> || <pre>29672DF43E426F41AF46D42E8437D449</pre> ||
<pre>
A19E248D2CCB21C3A6632DDB77D2715B
36487AB9C8D2DD7B63175DE8CE4D21A5
6EC799E54CFDCBE3595DB051BAE09DF5
2AD8D43B06CF5AEBDCA9F6001DBD5051
E725678A4E9952A08C5A1C7F3DC2BCF4
3C9769DC7946CF304E837ACCCC2F531A
DA3871F66D81B6F55B7650F88CD58E45
1C0761CEDD7B5F3D2509C6A4991542CE
31B5F37B9CF2EA8C268995177106E49E
852998BA76F0F01D715F04FA55F4D402
CFB455DADD24E3B6F427CE16305FFC82
ED9438E3DE81717004742F72C458F76D
F5BD26ADD4122B011A38A00F99CA96AF
18C249B0B17D66894A0F8E82DCB1BE8F
E185B3D5468761AD744BFDA651D6A789
50193A11B176E018D703B92C78D5213D
</pre>
|-
| APP 3 || [[Certified File]] || External <br /> (PDEL, PTEL, PCH) || 1.80-3.61 || n/a || <pre>270CBA370061B87077672ADB5142D18844AAED352A9CCEE63602B0D740594334</pre> || <pre>1CF2454FBF47D76221B91AFC3B608C28</pre> ||
<pre>
D7E446AEAA4C55A573862BFDBF8DAA07
375DD089153FBAB46235A51F7387CF4B
31ED1092AADEB1EF49D95E91C8223C67
B8CE2188A9A3361618D196FF9C29DC60
C7C9B1FD07066E92C4ED489E3AC8F7B9
78F35D2C41257DAF99158749EB6F1F01
81AD70E3073DF69D5F87BD7AFB71AFFE
BAEA7773A3402EA48F8678C12EECF73F
A231FD3A7AE503DEB833C054485C5C1A
28DD916DC774B95CC06325080E4149D8
8077EF5AD44F7CB7595224C7C040FE4D
38D6DBEB5AD2483ED3BE11F1727CDCBD
93C331E853F6B61334F4F1C2AA8DD8E5
FD9DBA244BAEAC5474B8E11187349C0D
980ABE7496289B5C5E6A703985385022
951C4CB7F8B3DBBF2C251F2F4C1D8897
</pre>
|-
| APP 4 || [[Certified File]] || External <br /> (PDEL, PTEL, PCH) || 3.63-3.69 || n/a || <pre>A782BC5A9EDDFC49A513FF3E592C4677A8C8920F23C9F11F2558FB9D99A43868</pre> || <pre>559B5E658559EB65EBF892C274E098A9</pre> ||
<pre>
DB05337883920C1BCBAAA04A8DCBEFB8
71BDB49AEFF764FFA79D10B2F4948F53
6940C80D133E143F2A40BD165C212723
2E2862D381FFA72FF535E7AB50D15E1A
5C7A1A020012AFFBEF3EA55AA017B441
B9708A457E7731ABAA299CC36D285EBE
71DDF1C49EDE34E1C20BCA31FABDDF98
0E0EC8784005489D4EFB7633D0147D4C
89E5CBC81534F26D7E49B1BD2612D6D4
30040D4CF7D6D8935DA3DFB231597894
B86D3C9E253A61C4B9078B51486C5735
E5D120C8312A69363B4A41B1BAD65D2C
639616FFA79888243F88D6D2E3FE7D0C
3DDCA87166213D027634A9B3DF649549
353F1086D43D3A09EDE21798556DFF77
63970940DC25930E5C9DDA7B9E243735
</pre>
|-
| APP 5 || [[Certified File]] || External <br /> (PDEL, PTEL, PCH) || 3.63-3.69 || n/a || <pre>12D64D0172495226010A687DE245A73DE028B3561E25E69BABC325636F3CAE0A</pre> || <pre>F149EED1757E5A915B24309795BFC380</pre> ||
<pre>
D11F5A2D844D1C94FB86462FD53A0B23
3D1A2BF17407A3F97A4BEEA8A53B13EA
B6E2BF4A7E490AF11CBB5E14BEFEEBED
0A14DD56ACC1F9B91A8C08CAAF472D81
A87402CD4EB75133B73F3FB4F03AAFB6
90C29D02836AA784BAB0EEE872332860
DDD02E8751181B523A9BB169433FFF69
61DD9B6CA60A0E573889D5FF30C192E1
B36A89FEF7F3DBE97C860015D6EC2A21
763029A8A1CFEE950BCCDE722EFA276E
978E095D31F5E44FFE093827FBF67C2D
904FF4EA0930D846C770813F1E6F1A13
105198626CF44F54046815173BE13F59
3C0CA9A11BD02BB1735967D3BFCC704F
E7FBAF844B2814171850E2BD239ECCBC
6EFBD836EABF99844F2C8A862CFB52D3
</pre>
|-
| NPDRM 0 - for 0,1,2 APP || [[Certified File]] || External <br /> (PDEL, PTEL, PCH) || 1.03-1.692 || n/a || <pre>C10368BF3D2943BC6E5BD05E46A9A7B6</pre> || <pre>00000000000000000000000000000000</pre> ||
<pre>
n/a
</pre>
|-
| NPDRM 1 - for 3,4,5 APP || [[Certified File]] || External <br /> (PDEL, PTEL, PCH) || 1.80-3.69 || n/a || <pre>16419DD3BFBE8BDC596929B72CE237CD</pre> || <pre>00000000000000000000000000000000</pre> ||
<pre>
n/a
</pre>
|-
| PUP watermark (SCEWM) || AES128-CBC || Internal <br /> (System Debugger) || 0.920+ || decrypts the whole block || <pre>AB7097356FDD49D83878540167F0C4AD</pre> || <pre>85537C5A56BD15DF0EB5F7F0D9E276E6</pre> || <pre>n/a</pre>
|-
| Compat SM IPL || XOR || Internal <br /> (System Debugger) || 0.920+ || XOR the IPL header with that key and decrypt with Kirk 1 ||<pre>
8241A9C6421299C50EE399BA66327D73
1451D946F7325358B1AE297DF603911A
3A5B717506680D4B67EBD0F97D79C055
0674090D425A9541AA2B0F17985D5C21
</pre>||<pre>n/a</pre>|| <pre>n/a</pre>
|-
| Compat SM IPL || XOR || External <br /> (PDEL,PTEL,PCH) || 1.03+ || XOR the IPL header with that key and decrypt with Kirk  || <pre>
283406246A9B9C9F095CF02D98307332
ECAA97CBAAC70B101235E77D84A9FD16
9142DEB5EBD909846A1864D2FEB81ECD
0750D863130BF190279D46DBA0449AF1
</pre>
|-
| Compat SM IPL || XOR || External <br /> (PDEL, PTEL, PCH) || 3.60 || XOR the IPL header with that key and decrypt with Kirk 1 ||<pre>
59AD29D3E66279F1AF532C627992DECB
56A8B99C68A5095818F352DC9BC7FB8F
3D43707D2FBB723C12360C8E81BE031E
012F20D268DA7CCD2021D5560FE62702
</pre>||<pre>n/a</pre>|| <pre>n/a</pre>
|-
| act_sm cmd 2 || AES-256-CBC || ALL <br /> (SD, DEM, PDEL, PTEL) || 0.920+ || 2.10+ require an additional RSA signature as act.sig ||<pre>846D2DFD77D3C2E5F0E17EB18CC786928B881E2E17AE0CD8FDE88809D0D033C5</pre> || <pre>C8A040662B10A1986A1894E94FBEFCF0</pre> || <pre>n/a</pre>
|-
| act_sm cmd 1 || AES-256-CBC || ALL <br /> (SD, DEM) || 0.940-0.995 || 2.10+ require an additional RSA signature as act.sig || <pre>3D1EFB3CFED42A5F871213D4CF1E3B7A65F927E23811B594215D616BE59DA4D8</pre> || <pre>D57E3699983302611632DE33B197A43C</pre> || <pre>n/a</pre>
|-
| act_sm NVS 0x520 CMAC || AES-256-CMAC || ALL <br /> (SD, DEM, PDEL, PTEL, PCH, VTE) || 0.940-3.70 || || <pre>5A91FC74A82BE3F2B8F4DB6070A099A2BDF00E7BF00E7BF08B685534A0646D87</pre> || <pre></pre> || <pre>n/a</pre>
|-
| act_sm unk || unk || ALL <br /> (SD, DEM, PDEL, PTEL, PCH, VTE) || 0.940-3.70 || || <pre>18EDD96BB0E98108314ED06F5176208455E0F5DA5921EBF29D079E13D30E1EC015257C3912266368C5C2DE01CF270055</pre> || <pre>n/a</pre> || <pre>n/a</pre>
|-
| act_sm RSA PUB || RSA || ALL <br /> (SD, DEM) || 2.10+ || 2.10+ require an additional RSA signature as act.sig || <pre>n/a</pre> || <pre>n/a</pre> ||
<pre>
A844CC0E308B55E9113FA511FF257FA6
431AFECFC360264355DCDD07B5D9610E
92BBA8842226B027BB18B5A596B1FFAF
41466E167B6BB7CEE8B6AD264469D58E
9E1CC8DC8677A0ACFFC6CD6B6060E96B
971D54063C6C38484C2C8D2F9CD1EC70
ACB808C577EFA70785F86C86977D7A0C
6939E7221939512484DC399966EA6EE2
28DBCD99F74CBC179BCE59FC76CAF6FC
D9B65FA6B3EB113A58F71FDD16B249B6
1C8AF859819F5E311E871E475B424263
5A79B0C8DE2713E6D5847215B28E037C
5181E51CC7A3E8A65BD4041A6FD74277
FC2A3E63434B549BB62BDC649FA212A0
3FFEA5A3893B93C620C2642A7179289B
981B7CFB681E0577DD3EBC1747245239
</pre>
|}


== PSVIMG Master Key ==
{
0x618715D0, 0x01010400,
{0x2C, 0x62, 0x37, 0x11, 0x31, 0xA6, 0xB9, 0xFE, 0xBA, 0xB0, 0x84, 0x3D, 0x4D, 0xAF, 0x34, 0x3E }
}, // 720


This AES128-ECB key is used for PSVIMG Key Derivation.
{
0xC30E2BA1, 0x02020800,
{0xD9, 0x44, 0x2A, 0x89, 0xC4, 0x71, 0x92, 0xA8, 0x98, 0x0C, 0xB5, 0xEE, 0xF9, 0xAA, 0xB1, 0xCD }
}, // 721


A9FA5A62799FCC4C726B4E2CE3506D38
{
0x861C5742, 0x04041001,
{0x64, 0x61, 0xD3, 0x5A, 0x05, 0x26, 0xE9, 0x6B, 0x1D, 0xA4, 0x6A, 0x0C, 0xD3, 0x6C, 0x4B, 0x53 }
}, // 722


== NPDRM PKG Keys ==
{
0x0C38AE85, 0x08082003,
{0x08, 0x9A, 0x40, 0xC1, 0xCA, 0x30, 0xDD, 0x93, 0xAB, 0x21, 0x08, 0x36, 0x98, 0xE2, 0xA6, 0x09 }
}, // 723


These AES128-CTR keys are used in NPDRM PKG file decryption.
{
0x02080082, 0x00000002,
{0x2A, 0x07, 0x3E, 0x6C, 0xBA, 0x7D, 0x98, 0x5F, 0x60, 0x86, 0xF5, 0xB4, 0x2D, 0x05, 0x61, 0xFD }
}, // 724


PS Vita, PS Vita Livearea and PSM PKGs use a different algorithm than PS3 and PSP PKGs: you first encrypt the IV with the correct type of key, then use the result as the actual key for the CTR. Every PKG will use a different key as a result of this.
{
0x04100104, 0x00000004,
{0xED, 0xF7, 0x60, 0xD4, 0xEE, 0x17, 0xC8, 0x99, 0xBB, 0x2E, 0xC8, 0x83, 0xE4, 0x76, 0x5D, 0x6F }
}, // 725


{| class="wikitable sortable"
{
! Type !! Version !! ERK
0x08200208, 0x00000008,
|-
{0x6F, 0x5F, 0x17, 0x81, 0x0D, 0x79, 0x56, 0xA4, 0x34, 0xEE, 0x0E, 0xED, 0x23, 0xB1, 0xD1, 0xBF }
| PSP || 1.00+ || <code>07F2C68290B50D2C33818D709B60E62B</code>
}, // 726
|-
| PS Vita || 1.00+ Type 2 || <code>E31A70C9CE1DD72BF3C0622963F2ECCB</code>
|-
| PS Vita Livearea || 1.00+ Type 3 || <code>423ACA3A2BD5649F9686ABAD6FD8801F</code>
|-
| PSM || 1.00+ Type 4 || <code>AF07FD59652527BAF13389668B17D9EA</code>
|}


== index.dat Keys ==
{
0x10400410, 0x00000010,
{0xE9, 0xF8, 0xEC, 0xF0, 0x78, 0xDB, 0x18, 0x2B, 0x98, 0xCA, 0xDB, 0xF5, 0x4F, 0xEF, 0xE2, 0x84 }
}, // 727


These AES-CBC 256-bit keys are used in <code>vs0:vsh/etc/[[index.dat]]</code> file decryption.
{
0x20800820, 0x00000020,
{0x5B, 0xF9, 0xFD, 0x46, 0x62, 0x35, 0x39, 0xB7, 0xD1, 0x18, 0xB5, 0xF2, 0x3D, 0xA8, 0x23, 0x82 }
}, // 728


{| class="wikitable sortable"
{
! Type !! Version !! IV || KEY
0x41001040, 0x00000040,
|-
{0x27, 0x85, 0x0D, 0x8A, 0x81, 0xE7, 0xB4, 0xBB, 0xC9, 0xD4, 0x88, 0x7A, 0x2A, 0x29, 0x3E, 0xAB }
| index.dat || 0.945.040-1.692.000 || <code>37FA4ED2B6618B59B34F770FBB92947B</code>
}, // 729
|| <code>06CC2E8FD40805A736F17CF2C13D58A6C8CF107E9E4A66AE25D39CA21C2531CC</code>
|-
| index.dat || 1.800.071-3.740.011 || <code>37FA4ED2B6618B59B34F770FBB92947B</code> ||
<code>272AE4378CB06BF3F658F51C77ACA2769BE87FB19BBF3D4D6B1B0ED226E39CC6</code>
|}


== Title Update Download Link keyset ==
{
0x82002080, 0x00000080,
{0xAC, 0xAE, 0x58, 0x80, 0xA5, 0xC3, 0xC1, 0xDD, 0x0E, 0xAF, 0x29, 0x41, 0x7C, 0xC7, 0x01, 0xCB }
}, // 730


This HMAC key is for downloading game title updates. See link [http://wololo.net/talk/viewtopic.php?f=54&t=44091 here] for details.
{
0x04004100, 0x00000101,
{0x80, 0x0B, 0xFE, 0xFE, 0x5F, 0x36, 0xAE, 0x79, 0x5A, 0xF3, 0x50, 0x8C, 0xCC, 0x2C, 0xB8, 0xE3 }
}, // 731


Compiled GUI App: [http://www.psdevwiki.com/vita/index.php?title=Tools#Vita_Title_Update_HMAC_Tool Vita Tools]
{
0x08008201, 0x00000202,
{0xC5, 0xBF, 0x03, 0x8C, 0xBF, 0x03, 0x3D, 0x8F, 0xE8, 0x75, 0x88, 0x28, 0x76, 0x15, 0x80, 0x22 }
}, // 732


{| class="wikitable sortable"
{
! Type !! Version !! HMAC
0x10010403, 0x00000404,
|-
{0x45, 0xB5, 0xAD, 0x06, 0x9A, 0x97, 0x20, 0x8B, 0xA4, 0x98, 0x67, 0x9B, 0x2A, 0x5D, 0xDA, 0xEA }
| Title Update || 1.00+ || <code>E5E278AA1EE34082A088279C83F9BBC806821C52F2AB5D2B4ABD995450355114</code>
}, // 733
|}


== LiveArea Update HMAC Key ==
{
0x20020807, 0x00000808,
{0x00, 0xD2, 0x82, 0xBF, 0x6A, 0x5E, 0x59, 0x65, 0x73, 0x64, 0xC5, 0x2E, 0x62, 0xEF, 0xA5, 0x16 }
}, // 734


For resolving the PKG link to LiveArea Update Packages.
{
0x4004100E, 0x00001010,
{0xF1, 0xB4, 0x8D, 0xB8, 0x5A, 0x6C, 0xAA, 0x4B, 0xE4, 0x89, 0x8C, 0xA9, 0x2D, 0x61, 0xD5, 0xA0 }
}, // 735


D8DBED766EABCD68D47DDBED9D3CA825837DE8AA789B7FF92D9A1594FCD8EAC4
{
0x8008201D, 0x00002020,
{0x65, 0xA7, 0x21, 0xF3, 0xF5, 0x7E, 0x45, 0x23, 0x65, 0x58, 0xB0, 0x3A, 0xEF, 0x5E, 0xC2, 0x44 }
}, // 736


== PFS Keys ==
{
0x0010403A, 0x00004041,
{0xC7, 0xEE, 0x32, 0xB8, 0xB2, 0x45, 0x1D, 0x2A, 0xDE, 0x6C, 0xD8, 0x55, 0xE0, 0x6B, 0xE3, 0x6F }
}, // 737


{| class="wikitable sortable"
{
! Type !! Version !! ERK !! Usage
0x00208075, 0x00008082,
|-
{0x1B, 0xC7, 0x7B, 0x50, 0xAB, 0xA2, 0xB4, 0x91, 0x03, 0xBB, 0x50, 0xEE, 0x98, 0x8A, 0xE2, 0xE4 }
| PFS EncKey || 1.00+ || <code>00298CDF4428E72C8785DAE0923C60BD</code> ||
}, // 738
|-
| PFS Secret || 1.00+ || <code>8C5D3A4B9D9BF4B453BCE6CDC34331D8</code> || Check HMAC at position 0x30 of file sealedkey, from the first 0x30 bytes of the file
|}


== Passcode / Keystone Keys ==
{
0x004100EA, 0x00010104,
{0xE4, 0x36, 0xBF, 0xAA, 0x57, 0xFB, 0x98, 0xCE, 0xD1, 0xF1, 0xDC, 0xE5, 0xC0, 0x64, 0x85, 0x97 }
}, // 739


{| class="wikitable sortable"
{
! Type !! Version !! ERK !! Usage
0x008201D4, 0x00020208,
|-
{0x6D, 0xB0, 0x86, 0x80, 0xEA, 0x00, 0x58, 0x43, 0x8C, 0x88, 0x82, 0x89, 0x34, 0xE4, 0x94, 0xCE }
| Keystone HMAC Key || 1.00+ || <code>310C2F2D70A62226F4582B4FF03E24196EEF01EF73A8981F2504BD50549A478F</code> ||
}, // 740
|-
| Passcode HMAC Key || 1.00+ || <code>543E368DF6629D682CD5A43644B1B2D733F0F2964DCD2CE8E9CB95D76C9DD928</code> ||
|}


=== NPDRM/PSM RIF Name Key ===
{
0x010403A9, 0x00040410,
{0xC0, 0x71, 0xCD, 0x84, 0xDD, 0x86, 0xC9, 0x15, 0x20, 0x30, 0x37, 0xC4, 0x16, 0xB4, 0xBF, 0xF8 }
}, // 741


This key is used to calculate RIF name (file path).
{
0x02080752, 0x00080820,
{0xFB, 0xDE, 0xFE, 0xBD, 0x54, 0x98, 0xD5, 0x8A, 0xC6, 0x7E, 0xDF, 0x37, 0x9D, 0x5E, 0xFC, 0x55 }
}, // 742


    19DD4FB989482BD4CB9EC9C79A2EFBD0
{
0x04100EA4, 0x00101040,
{0xE1, 0x9C, 0x6C, 0x6C, 0xB3, 0x15, 0xDB, 0x36, 0x37, 0x10, 0x78, 0x24, 0x22, 0x8A, 0xD3, 0x81 }
}, // 743


== RIF RSA Keys ==
{
0x08201D48, 0x00202080,
{0x5F, 0x9C, 0xE3, 0x90, 0x68, 0xF1, 0x74, 0xC7, 0xA8, 0x9A, 0xAF, 0xB7, 0xA0, 0x5B, 0x5F, 0x42 }
}, // 744


{| class="wikitable sortable"
{
! Type !! Version !! Modulus !! Usage || Notes
0x10403A90, 0x00404100,
|-
{0xD6, 0x8F, 0x8E, 0xA2, 0xDD, 0x19, 0x7C, 0x64, 0xB6, 0xF5, 0x62, 0x95, 0xE0, 0xD7, 0x92, 0xA5 }
| 0 and 1 || 1.00+ ||
}, // 745
    9CCCE3A536FA641B2D1354EE98F093C2
    68470F722C024B86CD60274E08E0067A
    3CB0DBA3D33DB2ACE44AA070B10B612A
    C4546E51B5EDFA23F5ED507F23365F9A
    0A09C1807D43E6172225AEB81630AC59
    79C4A534460A41A6207E6B426F3DF8CA
    A0FBA7ED2B6A474C2AAB50A92DC743F2
    232228FAC48FED218A8190F0423AD00C
    595DCB410D18845DA90CCF2FDFD6B90E
    23074B52B57C4866B93DD6A7C7336D74
    D26D9E30D8A1B1C94459F34312AB0A46
    B1B281D22B38809352A487C00D60340F
    EAC1834BCF88DA25D980B37847087574
    27D40948493D2F5A8FEEB5B74B2961FF
    B4E7F3832207CE6481F07E88164E3208
    1801B68F8D141541CED6D7D966A08DCB 
|| PS3 Rifs || Inside SceNpDrm
|-
| 2 || 1.00+ ||
    8F347CAE575CE487ADC5482E64D041AB
    C32F1012E4B69478904738A8145D62BF
    F98C6D2C361B75D3C165E42B999A5B63
    6B914889EBB5F216362A8BDDD72AE8D0
    A45A730F79A3E9BB513895754C142874
    70213CEE44C675178F01E09A6BB0C451
    5C1DB9C9BF40F1481E361EFC7F9F236D
    183C59A1B7F0136BAF10A62FA92ABDD5
    E852B9EC2C1B17B080C1D31FB288954B
    F94F93B0419CFCEB8673E93874A34027
    17F8B1DA761876C6CADAF9FD11B6EA50
    F800D2EB33AB217EFF4C603FEA56C299
    138A5F2912EAB936BFA879CFBCC8FA19
    A64404C79F61B80C3DF68A466208870B
    1C7BEE3AC4F2056AF3EF64CCE10D311F
    B3D7F42C73EDF33163435F0AFA727507
||  || Inside SceNpDrm
|-
| 3 || 1.00+ ||
    A6E0B2D4B582C0E204808C4583AB7607
    6B3496B96FFC90174AB1E03567B4FCD7
    69406D9DE3A8CEEBA2E7D4CDB23E2BEE
    471C53D2F71B9DD82233CDD8168BE3A5
    67592D7ED55FB45C717917756FFCB39E
    C755157AB97F89F7BC1E7592F54755ED
    BA4914F08F0C77E0B3EAFF9CEE876F3B
    713E6581EC09E5173E212B612DA70DB3
    66039B320802E0228B9E422E3C814B4C
    F8C50207DA9EC689B5F4456173446356
    8AB65363DAAB3C605C9DA80DF7756480
    68BB375E99A8FAA80269E094D775A781
    EBFE0B7C39DB82272049852C4395B8BF
    67A9E25CBFCFD40BE6B2C1895CE63534
    E552D7C4F04659A7CD3C59841E2C242D
    26501EB4FF1C553BA90F320428A760F3
||  || Inside SceNpDrm
|-
| 4 and 5 || 1.80?+ ||
    F30CA7B21C19D18794607698EF935DB9
    FAF6CDB684EC36587465DF1F43F7CEAB
    5ABCCDE0B38259591462D5F65C9AF5A6
    A2F1CC2F87F00C0228AA37CF19841065
    93F84ABB14AC57A70188B158A68DB1F1
    37891DE69ECE1DB876AC74B4F6B15601
    4B06CFD017C32BFB07A3271EF466F19A
    26294197C5972B34BB2E3CBF585A429B
    A9124FC50E2E483B0A5C90F1A04988B3
    96A2A0B59A411AF90D1B914C528E1606
    013A411AB7690F2BD622F8D5BA3AD03C
    AF8CFD581887BF34E74782E226FFAB27
    CF5E40184341663286491EC0743A4019
    24B0EC6061155E72A18784E67C878CA5
    1F9D49DA923881F432CDD9342F1F923C
    D380CC417592606E84F71B0173E41967
||  || Inside SceNpDrm
|}


* RSA Exponent is 65537 (0x10001)
{
0x20807521, 0x00808200,
{0x37, 0xEE, 0x2F, 0xF3, 0x5A, 0x33, 0x61, 0xD0, 0x5B, 0x59, 0x98, 0x2B, 0xFE, 0xC4, 0x2B, 0x05 }
}, // 746


== RSA PKG Keys ==
{
0x4100EA42, 0x01010400,
{0x17, 0xFD, 0x19, 0xB7, 0x85, 0xB4, 0x75, 0x1B, 0x80, 0xD6, 0x85, 0x5D, 0x6C, 0x7E, 0x39, 0x31 }
}, // 747


{| class="wikitable sortable"
{
! Type !! Version !! Modulus !! Usage || Notes
0x8201D485, 0x02020800,
|-
{0xF0, 0xF9, 0xDD, 0xF8, 0xB4, 0x9B, 0x51, 0xFB, 0xF3, 0x9E, 0x6B, 0x0E, 0x0C, 0x8C, 0x7C, 0x70 }
| PSP || 1.00+ ||
}, // 748
    BBDB6AA32E3B51A6D4708D5FC9899919
    395A2AAD83E98F4864C3BA43A5D6906F
    476E73535BFA8EF9C3720826A1F227B8
    FF06F69F39963987635EBFFBCA51D0FB
    8ED6BF178BBEA8F6AEDD64B401392905
    3F169B7EAD97698E75C060ADADCC7026
    EFFE531672F9DD1A11718D4A4E5D43A1
    625F53360699257CEA1A051499C31FF7
    E4AFCCB9A9DA2E7031C8E468C1612D1A
    0EBC22F42B30A2E53D802BC5ACE8A719
    8B909202ACBC234E7FC7D8321137B3B2
    AD0F0D0985DC891363FAA3AD8D379AD6
    5A7194AEA09DC2907BD3C88896565457
    A659A662AAD4E6FB4018B2CDF1886C43
    E16AADE1ABA75E8879F6B9D545C7C4D0
    2567107CDE1C1ACC43E51BBFB8519DD5
||  || Inside SceNpDrm
|-
| PSV || 1.00+ ||
    85D72F79A67C9A04D2691B1D2D30274A
    731CF624E3BC68FE8B3BAD9DEFB50784
    C4BBAF63D5CC431119911288854E38EA
    61D7571B33EB12C7AD3BCD4610FA1CA1
    B4C77D204550D6F72AB1E680A4609CCF
    890B953AAC6CDCDAED9F102729843914
    CA4A88BCB88D41EE0DC0E4D3E657A795
    012807C500AE13A0B44247D5E40B5F9E
    4ACEF46C0FA2882DF3F510961C6B8AE1
    139EE661350CDD8C7A5D4F9C1CD55E04
    49CB0065A88CF6376664F6C4F522AFC9
    C556F16A36DA79F822D28D3C2F63DDD1
    18E62B162BC73E2BE1B13F8391EEE462
    70D820C8BBF3A023683EA1D079D7B4D6
    F2F557A73A168AA23F882ACFDBA9A0B3
    7C7EAEAE6B88B869DECDD6892813A6C3
||  || Inside SceNpDrm
|-
| Live Area || 1.00+ ||
    8E5C3B05CECFC0CA1328C25009D740B2
    7376208F678AC454D015BB3E67B37D05
    B09990B67F6C0FE63E30AC7CC93CB2A1
    C83517CCCDF37AE7A2DE3E1F817919B1
    944F5ABC9C00C846D01A9A5E014FF15C
    3B840669AE25D06BA0449EF6ED1C14D7
    23EBA9151756B94DA5265F93AE364816
    BE152285B01A56E380F285AD2106D6B5
    41D950B2C84BA68559B3A10115403780
    8A85884D3A74612AF76F68B646A70FEB
    0EF244876671B7CB2FF0D1CC926B7CFF
    8C440C12AE322E3A1EA2856EFCA24BD9
    B8967C3F26038EF44B26AF23A684814B
    CE28806B81DC9227CE387F3820AF13FB
    A964F3A343D692154EEBEB917ABE861E
    84EEAD728C30A33473895376E9FDC62D
||  || Inside SceNpDrm
|}


* RSA exponent is 65537 (0x10001)
{
0x0403A90A, 0x04041001,
{0xC7, 0x9D, 0xEF, 0xAE, 0x61, 0xBE, 0xFB, 0x6A, 0xFE, 0xA1, 0x39, 0xB4, 0x4F, 0x33, 0x93, 0xC8 }
}, // 749


== registry.db0 XOR Key ==
{
0x08075215, 0x08082002,
{0x7A, 0x59, 0x13, 0x4F, 0x10, 0xD7, 0x33, 0x62, 0xA1, 0x25, 0x65, 0xF6, 0x9C, 0xBB, 0x71, 0xDE }
}, // 750


This key is used by SceRegistryMgr to decode <code>os0:kd/registry.db0</code>.
{
0x828030C0, 0x00000080,
{0xB4, 0x85, 0x1F, 0xBD, 0xB1, 0x84, 0x80, 0xD8, 0xE9, 0x53, 0x76, 0xA2, 0xCB, 0x5A, 0xF8, 0x79 }
}, // 751


  <code>89FA9548CB6D779DA22534FDA935596E</code>
{
0x05006180, 0x00000101,
{0xD3, 0xFC, 0x3F, 0xA6, 0x27, 0x2F, 0x8E, 0x22, 0x3C, 0x6E, 0x2F, 0x31, 0xF9, 0xB2, 0x6A, 0x42 }
}, // 752


== Database Reconstruction Magic ==
{
0x0A00C300, 0x00000202,
{0xD2, 0xE2, 0x02, 0x2D, 0x3F, 0x5F, 0x42, 0xF1, 0xC1, 0x92, 0xA6, 0x01, 0x62, 0xEC, 0x31, 0xA3 }
}, // 753


<pre>BEBAFECA (or CAFEBABE byteswapped)</pre>
{
0x14018601, 0x00000404,
{0xB3, 0xF3, 0xA8, 0x44, 0x1C, 0x0E, 0xFF, 0x59, 0x71, 0x62, 0x15, 0xC8, 0x68, 0xF1, 0xDB, 0xF8 }
}, // 754


== NID generation suffixes ==
{
0x28030C02, 0x00000808,
{0xC4, 0x9A, 0x9C, 0x23, 0x1E, 0x99, 0x82, 0xC8, 0xA6, 0x0D, 0x84, 0xE9, 0x86, 0x0D, 0x39, 0x27 }
}, // 755


* The algorithm is sha1(name + suffix).
{
0x50061805, 0x00001010,
{0x1A, 0xBB, 0x34, 0x77, 0x87, 0x17, 0x39, 0xC6, 0x27, 0x8F, 0xB2, 0xA1, 0x3C, 0xAB, 0xF5, 0xE1 }
}, // 756


=== No suffix ===
{
0xA00C300A, 0x00002020,
{0xB6, 0xF2, 0xC5, 0x80, 0x3C, 0xD0, 0xAF, 0x7A, 0x91, 0x42, 0x8C, 0x92, 0x84, 0xA9, 0xCF, 0x44 }
}, // 757


For some PSP and PS Vita old NIDs, there was no suffix at all: algo was simply sha1(name).
{
0x40186015, 0x00004041,
{0x70, 0x56, 0x10, 0x17, 0x54, 0x3F, 0xC6, 0x37, 0xE9, 0x6E, 0x68, 0xAF, 0x64, 0x22, 0xE5, 0x48 }
}, // 758


=== PS3 NONAME suffix ===
{
0x8030C02A, 0x00008082,
{0x2B, 0xFE, 0xC5, 0x44, 0x90, 0x57, 0x42, 0x43, 0xD7, 0xBB, 0xF3, 0x0D, 0x00, 0x1F, 0x33, 0x99 }
}, // 759


<pre>"0xbc5eba9e042504905b64274994d9c41f"</pre>
{
0x00618055, 0x00010105,
{0x74, 0xAF, 0xB7, 0x99, 0x0F, 0x54, 0x88, 0xCC, 0x7A, 0x8E, 0xF6, 0x85, 0x76, 0x88, 0xB7, 0x96 }
}, // 760


* Note that this ASCII string is used but not the hexadecimal value for it.
{
0x00C300AB, 0x0002020A,
{0xD2, 0xC7, 0x2C, 0xF9, 0x6A, 0x08, 0xCB, 0x38, 0x5C, 0x45, 0xE0, 0xAD, 0xC2, 0x31, 0x7E, 0xF6 }
}, // 761


=== PS3 default suffix ===
{
0x01860157, 0x00040414,
{0x44, 0xE9, 0x7C, 0x7F, 0xC8, 0xF6, 0xC8, 0xD5, 0x9E, 0x59, 0x6D, 0x99, 0x12, 0x8E, 0x6A, 0x81 }
}, // 762


<pre>6759659904250490566427499489741A</pre>
{
0x030C02AE, 0x00080828,
{0x5B, 0xFD, 0x0F, 0x85, 0x9B, 0x02, 0xA7, 0xA0, 0xB1, 0x84, 0x48, 0x39, 0x93, 0x18, 0x8F, 0xFB }
}, // 763


* Note that this hexadecimal value is used but not the ASCII string for it.
{
0x0618055C, 0x00101050,
{0x23, 0xD1, 0x3F, 0x66, 0x87, 0xEE, 0x4C, 0xF2, 0xA4, 0x5D, 0x92, 0x7C, 0x2D, 0x9F, 0xA3, 0xE0 }
}, // 764


=== PS Vita NONAME suffix ===
{
0x0C300AB8, 0x002020A0,
{0x25, 0xC1, 0xFD, 0x13, 0xF9, 0x23, 0xD9, 0x25, 0x01, 0x45, 0xDC, 0xD4, 0x0D, 0xDE, 0x7F, 0x32 }
}, // 765


<pre>c1b886af5c31846467e7ba5e2cffd64a</pre>
{
0x18601570, 0x00404140,
{0xA4, 0xC1, 0xAE, 0x97, 0xE9, 0x43, 0x01, 0xE4, 0xAB, 0x36, 0x44, 0x94, 0x19, 0xD8, 0x70, 0x0E }
}, // 766


* Note that this hexadecimal value is used but not the ASCII string for it.
{
0x30C02AE1, 0x00808280,
{0x6F, 0x04, 0x99, 0xD5, 0x40, 0x26, 0x10, 0x56, 0x89, 0x45, 0x97, 0xCB, 0x75, 0x4A, 0x0D, 0xF8 }
}, // 767


== SceKrm ==
{
0x618055C3, 0x01010500,
{0x4A, 0x97, 0x92, 0x86, 0x66, 0x92, 0x64, 0xA4, 0xB3, 0x07, 0xD4, 0x49, 0x6F, 0x3A, 0xAC, 0x49 }
}, // 768


<pre>
{
// key1 main (secp256r1 based)
0xC300AB86, 0x02020A00,
D : 0xAAB9B284FC9B0476C43C5559EEE2A1E19AAA92C5E4C234DD67F43297C714E728
{0x40, 0x5C, 0xB6, 0xD5, 0x9E, 0x1E, 0xEF, 0x6E, 0x6D, 0x78, 0x0E, 0x6B, 0xD3, 0xB1, 0x41, 0xAE }
Qx: 0xDE62FA3452DABD3C60067D375B3A52CE94CC77ED3E7238869EE05FE7822A5653
}, // 769
Qy: 0x71EC7D5C167B8DA2429AF960F5B84F4741D49233F1008D081142D1CAA07F0D8F


// key1 failback (unknown curve based)
{
D : 0x4B35AEC3D94F02078118971D71286D59A26F0FE958118A5206229477ED3A5775
0x8601570D, 0x04041401,
Qx: 0x88657D5551E48855289D0AB827C82A35F00B5F523D24694BEA1606F8BE18D925
{0xE3, 0x6E, 0x26, 0xC3, 0xCE, 0xB4, 0xD5, 0x2A, 0x52, 0xB6, 0x84, 0x60, 0x0D, 0xC3, 0x01, 0x24 }
Qy: 0xB761CC3BAD42EA379367B995E1BEA5611823267675959EEAB5975D336F59B3A9
}, // 770


// key2 main (secp256r1 based)
{
D : 0xA7B032E2ABB0C17AA91C2EB5F615E10DE3BE18A7E0CA98874F978FE65122A215
0x0C02AE1A, 0x08082803,
Qx: 0x1E10B4130F22D336A88B195252D6CFEA7574C942089E365622FDE221DC9E944A
{0x8A, 0x82, 0xE4, 0x81, 0xDF, 0x8F, 0x70, 0xE5, 0xA6, 0x27, 0x64, 0xBB, 0x37, 0x88, 0xDF, 0x4F }
Qy: 0xD563C129375B9C39FE572CD634B6BBC4141ED51D47536F3ECCF291CAF11C4460
}, // 771


// key2 failback (unknown curve based)
};
D:  0x8E5F93EB6EEAFCB1AC0B6A35AEA043A4C7DEFE94397E5787937024DB32A2B47F
Qx: 0x33A31120E507FAED9EB3CBCD7789ABC012913C0DF14DDD98760B0DBF009C466A
Qy: 0x25001960EB067612E5CA9177E37B42E8862801BA2C45A95FA494C0E51FBF4C66
</pre>
</pre>


== ePSP Keys ==


=== ePSP PRX Decryption 16-Byte Tag Keys  ===
=== sceFactoryGetUMDKey ===
These keys are used to decrypt the ePSP firmware PRX files stored in pcff.elf <br />
int __sceFactoryGetUMDKey(unsigned int part1, unsigned int part2, u8* out)
Shared between Retail/Testing Tool/Development Tool firmwares
{
{| class="wikitable"
u8* key = NULL;
|-
int ret = 0, x, i;
! Firmware !! Usage !! Key !! Tag !! KIRK CMD7 Seed
u8 key_00001708[16] = { 0x05, 0x8F, 0xE5, 0x35, 0xA0, 0x4C, 0x89, 0xB1, 0xC0, 0x12, 0xAD, 0xE7, 0xDA, 0x06, 0xD9, 0x22 };
|-
u8 key_000016D0[16] = { 0x80, 0x8C, 0x8D, 0xA8, 0x66, 0x65, 0x5C, 0x11, 0x35, 0x12, 0xA6, 0xBF, 0x96, 0x6D, 0x3C, 0x46 };
| colspan="5" | <center> <big> Found in /kd/mesg_led_01g.prx firmware file stored in pcff.elf </big> </center>
u8 key_00001698[16] = { 0x77, 0xA5, 0x97, 0xDE, 0x0A, 0xF3, 0xEF, 0x40, 0x06, 0x96, 0x00, 0x9C, 0x03, 0x3C, 0xE3, 0xAE };
|-
u8 key_00001664[16] = { 0x9F, 0x26, 0xB3, 0x3D, 0x66, 0xAF, 0xFC, 0xF7, 0xC6, 0xC0, 0x1A, 0x35, 0xAB, 0x32, 0x24, 0x22 };
| <center> 0.931 - 0.945 </center> || <center> usersystemlib.prx </center> || <pre> 0xE8, 0xBE, 0x2F, 0x06, 0xB1, 0x05, 0x2A, 0xB9, 0x18, 0x18, 0x03, 0xE3, 0xEB, 0x64, 0x7D, 0x26 </pre> || 0x457B0AF0 || <center> 0x5B </center>
u8 key_00001614[16] = { 0xAA, 0x62, 0x42, 0x04, 0x9E, 0x40, 0xFB, 0xBF, 0x91, 0x16, 0xC3, 0x23, 0x6F, 0xEA, 0x17, 0xEF };
|-
u8 key_00001598[16] = { 0x1A, 0x4A, 0xA0, 0x55, 0x30, 0x8D, 0x2B, 0xBC, 0x63, 0x2B, 0x54, 0x68, 0xBB, 0x3A, 0x9D, 0x5B };
| <center> 0.990 - 0.996 </center> || <center> usersystemlib.prx </center> || <pre> 0xD4, 0x35, 0x18, 0x02, 0x29, 0x68, 0xFB, 0xA0, 0x6A, 0xA9, 0xA5, 0xED, 0x78, 0xFD, 0x2E, 0x9D </pre> || 0x457B80F0 || <center> 0x5B </center>
u8 key_00001564[16] = { 0xF2, 0x2C, 0x77, 0xAA, 0x4B, 0x1C, 0x14, 0x01, 0x9D, 0xE5, 0x53, 0x23, 0xE3, 0x41, 0x3D, 0x21 };
|-
u8 key_000014D0[16] = { 0x42, 0x01, 0x82, 0x19, 0x24, 0xFF, 0x0C, 0x34, 0xEB, 0xB4, 0x3F, 0x5D, 0xCA, 0x80, 0x7E, 0x8D };
| <center> 1.00 - 3.73 </center> || <center> VSH Modules </center> || <pre> 0x08, 0x57, 0xC2, 0x49, 0x15, 0xD6, 0x2C, 0xDB, 0x62, 0xBE, 0x86, 0x6C, 0x75, 0x19, 0xDC, 0x4D </pre> || 0x457B9AF0 || <center> 0x5B </center>
u8 key_00001498[16] = { 0x40, 0x78, 0x66, 0xEB, 0x9B, 0xA5, 0xE9, 0x29, 0x0B, 0x2F, 0x8E, 0x4D, 0x30, 0x11, 0x67, 0x54 };
|-
u8 key_00001460[16] = { 0x27, 0xC7, 0x59, 0xF1, 0x48, 0xD8, 0x7E, 0xA8, 0xC0, 0xC2, 0x7F, 0x01, 0x3A, 0xE6, 0xEC, 0xD6 };
| colspan="5" | <center> <big> Found in ePSP IPL stored in os0/kd/pcbc.elf </center>
u8 key_000013F0[16] = { 0x3A, 0xBA, 0x2E, 0x14, 0xC1, 0x07, 0x37, 0x9F, 0x5F, 0x03, 0x3F, 0x79, 0x4D, 0xE0, 0xCE, 0x7E };
|-
u8 key_000013BC[16] = { 0x71, 0x16, 0x41, 0x21, 0xC3, 0xE0, 0x6A, 0xB5, 0x76, 0x57, 0x35, 0x90, 0xAB, 0x22, 0x3E, 0xFD };
| <center> 0.931 - 1.81 </center> || <center> Kernel Modules </center> || <pre> 0x48, 0x58, 0xAA, 0x38, 0x78, 0x9A, 0x6C, 0x0D, 0x42, 0xEA, 0xC8, 0x19, 0x23, 0x34, 0x4D, 0xF0 </pre> || 0x4C949AF0 || <center> 0x43 </center>
};
|-
'''Source:''' http://pastie.org/pastes/1467889
| <center> 2.00 - 2.02 </center> || <center> Kernel Modules </center> || <pre> 0x20, 0x00, 0x5B, 0x67, 0x48, 0x77, 0x02, 0x60, 0xCF, 0x0C, 0xAB, 0x7E, 0xAE, 0x0C, 0x55, 0xA1 </pre> || 0x4C949BF0 || <center> 0x43 </center>
 
|-
=== priv_key_npumdimg ===
| <center> 2.05 - 3.01 </center> || <center> Kernel Modules </center> || <pre> 0x3F, 0x67, 0x09, 0xA1, 0x47, 0x71, 0xD6, 0x9E, 0x27, 0x7C, 0x7B, 0x32, 0x67, 0x0E, 0x65, 0x8A </pre> || 0x4C949CF0 || <center> 0x43 </center>
u8 priv_key_npumdimg[0x14] = {0x14, 0xB0, 0x22, 0xE8, 0x92, 0xCF, 0x86, 0x14, 0xA4, 0x45, 0x57, 0xDB, 0x09, 0x5C, 0x92, 0x8D, 0xE9, 0xB8, 0x99, 0x70};
|-
'''Source:''' http://www.pastie.org/private/kdybqsmz7gqklh19pgvema
| <center> 3.10 - 3.18 </center> || <center> Kernel Modules </center> || <pre> 0x9B, 0x92, 0x99, 0x91, 0xA2, 0xE8, 0xAA, 0x4A, 0x87, 0x10, 0xA0, 0x9A, 0xBF, 0x88, 0xC0, 0xAC </pre> || 0x4C949DF0 || <center> 0x43 </center>
 
|-
=== "neur0n" ===
| <center> 3.30 - 3.50 </center> || <center> Kernel Modules </center> || <pre> 0x90, 0x22, 0x66, 0xE9, 0x59, 0x11, 0x9B, 0x99, 0x67, 0x39, 0x49, 0x81, 0xAB, 0x98, 0x08, 0xA6 </pre> || 0x4C949EF0 || <center> 0x43 </center>
u8 keys639_k3[0x10] = {
|-
0x01, 0x7B, 0xF0, 0xE9, 0xBE, 0x9A, 0xDD, 0x54, 0x37, 0xEA, 0x0E, 0xC4, 0xD6, 0x4D, 0x8E, 0x9E
| <center> 3.51 - 3.55 </center> || <center> Kernel Modules </center> || <pre> 0xA0, 0xA5, 0x55, 0x0A, 0xFA, 0xB2, 0x16, 0x62, 0x05, 0xDC, 0x4B, 0x8E, 0xDA, 0xD5, 0xA5, 0xCA </pre> || 0x4C949FF0 || <center> 0x43 </center>
};
|-
https://twitter.com/neur0ner/status/74168118485860352
| <center> 3.57 - 3.63 </center> || <center> Kernel Modules </center> || <pre> 0x78, 0x96, 0xAE, 0x9C, 0xE7, 0x89, 0x2D, 0xF5, 0x34, 0x9C, 0x29, 0x36, 0xD1, 0xF9, 0xE8, 0x3C </pre> || 0x4C94A0F0 || <center> 0x43 </center>
|-
| <center> 3.65 - 3.73 </center> || <center> Kernel Modules </center> || <pre> 0x71, 0x44, 0x53, 0xB6, 0xE6, 0x75, 0x3F, 0xF0, 0x8D, 0x5E, 0xB4, 0xB2, 0xEA, 0x06, 0x23, 0x6A </pre> || 0x4C94A1F0 || <center> 0x43 </center>
|-
|}


=== ePSP IPL Xor Keys ===
===PS3AesKey===
These keys are used to xor the KIRK header of the ePSP IPL stored in os0/kd/pcbc.elf <br />
//PS3
Shared between Retail/Testing Tool/Development Tool firmwares
private byte[] PS3AesKey = new byte[16] {
{| class="wikitable"
  0x2E, 0x7B, 0x71, 0xD7, 0xC9, 0xC9, 0xA1, 0x4E, 0xA3, 0x22, 0x1F, 0x18, 0x88, 0x28, 0xB8, 0xF8
|-
  };
! Firmware !! Key
|-
| colspan="2" | <center> <big> Found in os0/sm/compat_sm.elf </big> </center>
|-
| <center> 0.931 - 1.69.2 </center> ||
<pre>
0x82, 0x41, 0xa9, 0xc6, 0x42, 0x12, 0x99, 0xc5,
0x0e, 0xe3, 0x99, 0xba, 0x66, 0x32, 0x7d, 0x73,
0x14, 0x51, 0xd9, 0x46, 0xf7, 0x32, 0x53, 0x58,
0xb1, 0xae, 0x29, 0x7d, 0xf6, 0x03, 0x91, 0x1a,
  0x3a, 0x5b, 0x71, 0x75, 0x06, 0x68, 0x0d, 0x4b,
0x67, 0xeb, 0xd0, 0xf9, 0x7d, 0x79, 0xc0, 0x55,
0x06, 0x74, 0x09, 0x0d, 0x42, 0x5a, 0x95, 0x41,
0xaa, 0x2b, 0x0f, 0x17, 0x98, 0x5d, 0x5c, 0x21
</pre>
|-
| <center> 1.80 - 3.73 </center> ||
<pre>
0x28, 0x34, 0x06, 0x24, 0x6a, 0x9b, 0x9c, 0x9f,
  0x09, 0x5c, 0xf0, 0x2d, 0x98, 0x30, 0x73, 0x32,
0xec, 0xaa, 0x97, 0xcb, 0xaa, 0xc7, 0x0b, 0x10,
0x12, 0x35, 0xe7, 0x7d, 0x84, 0xa9, 0xfd, 0x16,
0x91, 0x42, 0xde, 0xb5, 0xeb, 0xd9, 0x09, 0x84,
0x6a, 0x18, 0x64, 0xd2, 0xfe, 0xb8, 0x1e, 0xcd,
0x07, 0x50, 0xd8, 0x63, 0x13, 0x0b, 0xf1, 0x90,
0x27, 0x9d, 0x46, 0xdb, 0xa0, 0x44, 0x9a, 0xf1
</pre>
|}
Please note that all contributions to Vita Developer wiki are considered to be released under the GNU Free Documentation License 1.2 (see Vita Developer wiki:Copyrights for details). If you do not want your writing to be edited mercilessly and redistributed at will, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource. Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following hCaptcha:

Cancel Editing help (opens in new window)