Editing Keys
Jump to navigation
Jump to search
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 1: | Line 1: | ||
[[Category:Software]] | [[Category:Software]]<noinclude>[[Category:Main]]</noinclude> | ||
<noinclude> | |||
[[Category:Main]] | |||
</noinclude> | |||
= Useful | == Useful information == | ||
PSVita uses F00D and KIRK for high security of keys. | |||
KIRK have been hacked on PSP and almost fully reversed in 2008. | |||
The KIRK keys are mainly the same than on PSP but some have been changed past 3.60 (before 3.67). | |||
KIRK10 (used in IDStorage) explanation: [http://www.lolhax.org/2011/07/06/kirk-0x10-private-key/] | |||
Save Data Source: [http://pastebin.com/RFDXKCAf] | |||
Kirk Engine source (there exists other version of kirk-engine): [https://github.com/tpunix/kirk_engine/blob/master/kirk/kirk_engine.c] | |||
== Location == | == Location == | ||
Line 20: | Line 29: | ||
* pub file (public): %s-pub-%s | * pub file (public): %s-pub-%s | ||
* priv file (private): %s-priv-%s | * priv file (private): %s-priv-%s | ||
== F00D keys == | == F00D keys == | ||
{| class="wikitable" style="font-size: 90%;" | {| class="wikitable" style="font-size: 90%;" | ||
Line 2,459: | Line 36: | ||
|- | |- | ||
| Secure ENC: second_loader and secure_kernel || AES128-CBC || ALL <br /> (SD, DEM, CEM, PDEL, PTEL, PCH, VTE) || 0.930 - 3.69 || 0x10 = data size; 0x20 = hash; 0x40 = version; 0xE0 = Encrypted header (0x1E0); 0x2C0 = data segment. || <pre>AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA</pre> || <pre>AF5F2CB04AC1751ABF51CEF1C8096210</pre> || <pre>unknown</pre> | | Secure ENC: second_loader and secure_kernel || AES128-CBC || ALL <br /> (SD, DEM, CEM, PDEL, PTEL, PCH, VTE) || 0.930 - 3.69 || 0x10 = data size; 0x20 = hash; 0x40 = version; 0xE0 = Encrypted header (0x1E0); 0x2C0 = data segment. || <pre>AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA</pre> || <pre>AF5F2CB04AC1751ABF51CEF1C8096210</pre> || <pre>unknown</pre> | ||
|- | |- | ||
| SPKG || [[Certified File]] || Internal <br /> (System Debugger) || 0.920+ || n/a || <pre>23F1D525244266E6DA7A52DA9446318301EE8CC58D54901AE94D93010F7DEE6B</pre> || <pre>3721F7C05DE5F55ECC39BDDB4A6C585D</pre> || | | SPKG || [[Certified File]] || Internal <br /> (System Debugger) || 0.920+ || n/a || <pre>23F1D525244266E6DA7A52DA9446318301EE8CC58D54901AE94D93010F7DEE6B</pre> || <pre>3721F7C05DE5F55ECC39BDDB4A6C585D</pre> || | ||
Line 3,185: | Line 760: | ||
0674090D425A9541AA2B0F17985D5C21 | 0674090D425A9541AA2B0F17985D5C21 | ||
</pre>||<pre>n/a</pre>|| <pre>n/a</pre> | </pre>||<pre>n/a</pre>|| <pre>n/a</pre> | ||
|- | |- | ||
| Compat SM IPL || XOR || External <br /> (PDEL, PTEL, PCH) || 3.60 || XOR the IPL header with that key and decrypt with Kirk 1 ||<pre> | | Compat SM IPL || XOR || External <br /> (PDEL, PTEL, PCH) || 3.60 || XOR the IPL header with that key and decrypt with Kirk 1 ||<pre> | ||
Line 3,200: | Line 768: | ||
</pre>||<pre>n/a</pre>|| <pre>n/a</pre> | </pre>||<pre>n/a</pre>|| <pre>n/a</pre> | ||
|- | |- | ||
| act_sm | | act_sm CMAC 1 || AES-256-CBC || ALL <br /> (SD, DEM, PDEL, PTEL) || 0.920+ || 2.10+ require an additional RSA signature as act.sig ||<pre>846D2DFD77D3C2E5F0E17EB18CC786928B881E2E17AE0CD8FDE88809D0D033C5</pre> || <pre>C8A040662B10A1986A1894E94FBEFCF0</pre> || <pre>n/a</pre> | ||
|- | |- | ||
| act_sm | | act_sm CMAC 2 || AES-256-CBC || ALL <br /> (SD, DEM) || 0.940-0.995 || 2.10+ require an additional RSA signature as act.sig || <pre>3D1EFB3CFED42A5F871213D4CF1E3B7A65F927E23811B594215D616BE59DA4D8</pre> || <pre>D57E3699983302611632DE33B197A43C</pre> || <pre>n/a</pre> | ||
|- | |- | ||
| act_sm NVS 0x520 CMAC || AES-256-CMAC || ALL <br /> (SD, DEM, PDEL, PTEL, PCH, VTE) || 0.940-3.70 || || <pre>5A91FC74A82BE3F2B8F4DB6070A099A2BDF00E7BF00E7BF08B685534A0646D87</pre> || <pre></pre> || <pre>n/a</pre> | | act_sm NVS 0x520 CMAC || AES-256-CMAC || ALL <br /> (SD, DEM, PDEL, PTEL, PCH, VTE) || 0.940-3.70 || || <pre>5A91FC74A82BE3F2B8F4DB6070A099A2BDF00E7BF00E7BF08B685534A0646D87</pre> || <pre></pre> || <pre>n/a</pre> | ||
Line 3,229: | Line 797: | ||
|} | |} | ||
[https://wiki.henkaku.xyz/vita/Keys Source] | |||
== | == Content PKG Keys == | ||
These | These AES-CTR 128-bit keys are used in Content PKG file decryption. | ||
PSVita keys use a different algorithm: you first encrypt the IV with the correct type of key, then use the result as the actual key for the CTR. Every pkg will use a different key as a result of this. | |||
{| class="wikitable sortable" | {| class="wikitable sortable" | ||
! Type !! Version !! ERK | ! Type !! Version !! ERK | ||
|- | |- | ||
| PSP || 1.00+ || <code>07F2C68290B50D2C33818D709B60E62B</code> | | PSP / soonest PSVita || 1.00+ || <code>07F2C68290B50D2C33818D709B60E62B</code> | ||
|- | |- | ||
| | | PSVita || 1.00+ Type 2 || <code>E31A70C9CE1DD72BF3C0622963F2ECCB</code> | ||
|- | |- | ||
| | | ? || 1.00+ Type 3 || <code>423ACA3A2BD5649F9686ABAD6FD8801F</code> | ||
|- | |- | ||
| PSM || 1.00+ Type 4 || <code>AF07FD59652527BAF13389668B17D9EA</code> | | PSM || 1.00+ Type 4 || <code>AF07FD59652527BAF13389668B17D9EA</code> | ||
|} | |} | ||
== index.dat | == index.dat keysets == | ||
These AES-CBC 256-bit keys are used in <code>vs0:vsh/etc/[[index.dat]]</code> file decryption. | These AES-CBC 256-bit keys are used in <code>vs0:vsh/etc/[[index.dat]]</code> file decryption. | ||
Line 3,260: | Line 825: | ||
! Type !! Version !! IV || KEY | ! Type !! Version !! IV || KEY | ||
|- | |- | ||
| index.dat || 0. | | index.dat || 0.990-1.691 ?1.692? || <code>37FA4ED2B6618B59B34F770FBB92947B</code> | ||
|| <code>06CC2E8FD40805A736F17CF2C13D58A6C8CF107E9E4A66AE25D39CA21C2531CC</code> | || <code>06CC2E8FD40805A736F17CF2C13D58A6C8CF107E9E4A66AE25D39CA21C2531CC</code> | ||
|- | |- | ||
| index.dat || 1. | | index.dat || ?1.692? 1.80-3.70 || <code>37FA4ED2B6618B59B34F770FBB92947B</code> || | ||
<code>272AE4378CB06BF3F658F51C77ACA2769BE87FB19BBF3D4D6B1B0ED226E39CC6</code> | <code>272AE4378CB06BF3F658F51C77ACA2769BE87FB19BBF3D4D6B1B0ED226E39CC6</code> | ||
|} | |} | ||
Line 3,271: | Line 836: | ||
This HMAC key is for downloading game title updates. See link [http://wololo.net/talk/viewtopic.php?f=54&t=44091 here] for details. | This HMAC key is for downloading game title updates. See link [http://wololo.net/talk/viewtopic.php?f=54&t=44091 here] for details. | ||
Compiled GUI App: [http://www. | Compiled GUI App: [http://www.vitadevwiki.com/index.php?title=Tools#Vita_Title_Update_HMAC_Tool Vita Tools] | ||
{| class="wikitable sortable" | {| class="wikitable sortable" | ||
Line 3,278: | Line 843: | ||
| Title Update || 1.00+ || <code>E5E278AA1EE34082A088279C83F9BBC806821C52F2AB5D2B4ABD995450355114</code> | | Title Update || 1.00+ || <code>E5E278AA1EE34082A088279C83F9BBC806821C52F2AB5D2B4ABD995450355114</code> | ||
|} | |} | ||
== PFS Keys == | == PFS Keys == | ||
Line 3,293: | Line 852: | ||
|- | |- | ||
| PFS Secret || 1.00+ || <code>8C5D3A4B9D9BF4B453BCE6CDC34331D8</code> || Check HMAC at position 0x30 of file sealedkey, from the first 0x30 bytes of the file | | PFS Secret || 1.00+ || <code>8C5D3A4B9D9BF4B453BCE6CDC34331D8</code> || Check HMAC at position 0x30 of file sealedkey, from the first 0x30 bytes of the file | ||
|- | |||
|} | |} | ||
Line 3,305: | Line 865: | ||
|} | |} | ||
== | == RSA RIF Keys == | ||
{| class="wikitable sortable" | {| class="wikitable sortable" | ||
! Type !! Version !! Modulus !! Usage || Notes | ! Type !! Version !! Modulus !! Usage || Notes | ||
|- | |- | ||
| 0 and 1 || 1.00+ || | | 0 and 1 || 1.00+ || | ||
9CCCE3A536FA641B2D1354EE98F093C2 | 9CCCE3A536FA641B2D1354EE98F093C2 | ||
68470F722C024B86CD60274E08E0067A | 68470F722C024B86CD60274E08E0067A | ||
Line 3,392: | Line 946: | ||
|| || Inside SceNpDrm | || || Inside SceNpDrm | ||
|} | |} | ||
* RSA Exponent is 65537 (0x10001) | * RSA Exponent is 65537 (0x10001) | ||
== RSA PKG Keys == | == RSA PKG Keys == | ||
{| class="wikitable sortable" | {| class="wikitable sortable" | ||
! Type !! Version !! Modulus !! Usage || Notes | ! Type !! Version !! Modulus !! Usage || Notes | ||
|- | |- | ||
| PSP || 1.00+ || | | PSP || 1.00+ || | ||
BBDB6AA32E3B51A6D4708D5FC9899919 | BBDB6AA32E3B51A6D4708D5FC9899919 | ||
395A2AAD83E98F4864C3BA43A5D6906F | 395A2AAD83E98F4864C3BA43A5D6906F | ||
Line 3,458: | Line 1,010: | ||
|} | |} | ||
* RSA | * RSA Exponent is 65537 (0x10001) | ||
== PSMDA "protected_kconsole_cache.dat" HMAC Key == | |||
B70x390x660x320x0E0x280x6A0xDC0x030xF00x540x650xCA0x9E0x2F0x920x380x8A0xEE0x230x6D0x430x880x310x350xBA0xB00xA50xBD0x500x430xEA | |||
== PSMDA "NSXVID-PSS.VT.WW-GLOBAL.xml" RSA Private == | |||
-----BEGIN PRIVATE KEY----- | |||
MIIEvgIBADANBgkqhkiG9w0BAQEFAASCBKgwggSkAgEAAoIBAQCxl+8fRzDzyWb0 | |||
89L9ssKWMO4IYJATVV/qsGPqL5XtgjqlSY6dV3QHWtdiqm4B9h8cy325+XEORMC8 | |||
oErllSl7yovu956/D5laLLGqRkyFPcNer+DOjO99bDfJTTV1bSHuwc9oo3mJn6AO | |||
WuiY3aguCIYxNgSlDsfavjmCDXa3Q85hFOxJnn7HlM4X6rNxFi9y48LqUrDyWw0L | |||
bs+07bqNLoYHXtMoZcNQHqNmGtIHGx4RuFzZ4hduorjNsmSKHiQSz+ydJgJWtLJO | |||
tC2EM8zj8zStmlDiMTyAqKPHjENp4FBLoF87PISLsbyf4dTdWk35TvnsU/+tGVyH | |||
bVNcEAzvAgMBAAECggEBAKSil//kDIKD/BkrDDc6h9+aHqDPe+EgbVnxCb8pPBFB | |||
gEKIbVh5oUvMMA38txzEYNVd5AELOH6kyBRVePlajWmAPLddAOJYgK6y7kVPBFMl | |||
Db/yxjJVPxODxjeshtmEQUfIjhGQMvSdcVC9gBFusyFxr41haW7mw+mKHV/uQVbk | |||
TM/ZnEaN2Zrl7FfCUwXa3qyMrwj01bbAXXEqdM9ZF3UIXCLzihtNDKPAbpcVoQXH | |||
fItXVFeHjXqVCOVcKTI1PgElM6Q7VsVsU4pJGOmKy2gFbKqF4eniDK6gdGitbVpp | |||
rlXIrS2P8ZOfT+fSMjLbrr+mJEc2np4LYFlEHcJgtkkCgYEAwMrmf1LasiU/sijh | |||
0fOTV6TXefSrOxnpiq9Qs/oTSZ5USTh5FrunF0dX5Isy4XjYKWfIVwVl9LnAXRqR | |||
QTiHkbFon2KMYYyQfDUe4T9kuX6cAqp8WjBaivxs8chErM8rzZns62bR1B9+/IX4 | |||
VIiHA1jfP9eiCl+1lMhhnnNIHX0CgYEA69Ffc2w5UCJ1cHxu8dR9V4otY57vBJFN | |||
2Svb8h3kJnO9LfU/RYMeXTgJSklh9Tw/zXPOMEQnxi7LocrDd1713vQTTspT3wWd | |||
3AJ25l0BP3NGnbEtGwv6It+VnUULr964vOUv/bl4UMQs52JsnxURts+GPZ3gAF1S | |||
U2AVxvVej9sCgYBAk7Yhb99RTKjJRGhfqvbvpIeIkivI4CUaDx85KcrMHfydig0F | |||
UFXntj36j6W7YH8HX3v7qhM8pfuJNBzze7vtUT96I8hh5HOBJ0nwqQtUFtSrD/AX | |||
RZsOcv8K/coDGGHTvHtfXlFqfCJM85L6vcB7nokpGVFtqCFqdLQ+Ht9JAQKBgQCU | |||
Ao/0dCLs5xPrDE7ePk6FmVavxlui9Eh2XI7qQlSmxdIhfGLAEHIIdFlwZOq076Hk | |||
JCFwLfcA7vIklI1m6RVNYMiVlWxa+L2CD5HtOMbFumbCJyh2Z2gSZ18SnPme4x30 | |||
ga1DhRu9JcRBXodqueCqa0qIdgTYdbpsVkyU2gEGLQKBgGotuH/yrXNfifTc6Y24 | |||
TSaqk/Dq6OvQOEFSIzgOzaQhWvwZjlz3uOnmi3vUo/guG9q/J1JWucWoXNXkkcmb | |||
trc3RYwzy6Rn+0uGHGA91e2bn6vT6PLNOgNUE7YCRDJe5DsDYHtUNILNbRVdSvNs | |||
rnh1i22Y3zLWChh3swswqgf7 | |||
-----END PRIVATE KEY----- | |||
Used by the Playstation Mobile development assistant to sign the NSXVID-PSS.VT.WW-GLOBAL.xml file to prevent you from modifying it. | |||
== registry.db0 XOR Key == | == registry.db0 XOR Key == | ||
Line 3,470: | Line 1,055: | ||
<pre>BEBAFECA (or CAFEBABE byteswapped)</pre> | <pre>BEBAFECA (or CAFEBABE byteswapped)</pre> | ||
== | == PSP/PSP2/PS3 NID Suffixes == | ||
=== PS3 | === PS3 noname exports === | ||
<pre> | <pre>bc5eba9e042504905b64274994d9c41f</pre> | ||
* | * algo is sha1(name + 0xsuffix) where name+suffix is all ascii | ||
=== | === PSVITA noname exports === | ||
<pre>c1b886af5c31846467e7ba5e2cffd64a</pre> | <pre>c1b886af5c31846467e7ba5e2cffd64a</pre> | ||
* | * algo is sha1(name + suffix) where name + suffix is hex | ||