Talk:BD Drive Reverse Engineering: Difference between revisions
Jump to navigation
Jump to search
(Created page with "= Getting keys the easier way = First you need to get the sv_iso_spu_module.self individuals seed that can be found in the metadata header: <pre> 3E C2 XX XX XX XX XX XX XX...") |
(No difference)
|
Revision as of 10:13, 15 August 2012
Getting keys the easier way
First you need to get the sv_iso_spu_module.self individuals seed that can be found in the metadata header:
3E C2 XX XX XX XX XX XX XX XX XX XX XX XX XX XX 04 29 XX XX XX XX XX XX XX XX XX XX XX XX XX XX 3D E0 XX XX XX XX XX XX XX XX XX XX XX XX XX XX 1B A3 XX XX XX XX XX XX XX XX XX XX XX XX XX XX
Using your console specific eid_root_key/iv (e.g. from metldr dump) and libeeid (insert the seed in keys.c) you can then decrypt EID4 directly by calling
u8 eid4[0x30] = {/* your EID4 */}; eid4_decrypt_buffer(eid4);
Now you got the two keys you need in eid4+0x00 and eid4+0x10 :)