Talk:Keys

From PS4 Developer wiki
Jump to navigation Jump to search

EAP/EMC Aeolia Script for decrypting and keeping header[edit source]

import struct
from binascii import unhexlify as uhx
from binascii import hexlify as hx
from Crypto.Cipher import AES
from Crypto.Hash import SHA, HMAC

import os
import sys

CIPHERKEYSEMC = ['5F74FE7790127FECF82CC6E6D91FA2D1'] # FULL
CIPHERKEYSEAP = ['581A75D7E9C01F3C1BD7473DBD443B98']
HASHERKEYEMC  = ['73FE06F3906B05ECB506DFB8691F9F54']
HASHERKEYEAP  = ['824D9BB4DBA3209294C93976221249E4']
ZEROS128 =      ['00000000000000000000000000000000']

def aes_decrypt_cbc(key, iv, input):
    return AES.new(key, AES.MODE_CBC, iv).decrypt(input)
    
def aes_encrypt_cbc(key, iv, input):
    return AES.new(key, AES.MODE_CBC, iv).encrypt(input)

def emc_decrypt_header(hdr):
    return hdr[:0x30] + aes_decrypt_cbc(uhx(CIPHERKEYSEMC[0]), uhx(ZEROS128[0]), hdr[0x30:0x80])
    
def emc_encrypt_header(hdr):
    return hdr[:0x30] + aes_encrypt_cbc(uhx(CIPHERKEYSEMC[0]), uhx(ZEROS128[0]), hdr[0x30:0x80])
    
def eap_decrypt_header(hdr):
    return hdr[:0x30] + aes_decrypt_cbc(uhx(CIPHERKEYSEAP[0]), uhx(ZEROS128[0]), hdr[0x30:0x80])
    
def eap_encrypt_header(hdr):
    return hdr[:0x30] + aes_encrypt_cbc(uhx(CIPHERKEYSEAP[0]), uhx(ZEROS128[0]), hdr[0x30:0x80])

def main(argc, argv):
        with open(sys.argv[1], 'rb') as f:
            data = f.read(0x80)
            type = data[7:8]
            if type == uhx('48'):
                print 'EMC'
                hdr = emc_decrypt_header(data)
                body_aes_key  = hdr[0x30:0x40]
                body_hmac_key = hdr[0x40:0x50]
                body_hmac = hdr[0x50:0x64]
                zeroes = hdr[0x64:0x6C]
                print(hx(zeroes))
                header_hmac = hdr[0x6C:0x80]
                body_len = struct.unpack('<L', hdr[0xc:0x10])[0]
                print body_len
                ehdr = hdr[:0x6C]
                ebody = f.read(body_len)
                bhmac = HMAC.new(body_hmac_key, ebody, SHA)
                hhmac = HMAC.new(uhx(HASHERKEYEMC[0]), ehdr, SHA)
                body = aes_decrypt_cbc(body_aes_key, uhx(ZEROS128[0]), ebody)
                print bhmac.hexdigest()
                print hhmac.hexdigest()
                print hx(body_hmac)
                print hx(header_hmac)
                with open(sys.argv[1] + '.bin', 'wb') as g:
                    g.write(hdr+body)
            if type == uhx('68'):
                print 'EAP'
                hdr = eap_decrypt_header(data)
                body_aes_key  = hdr[0x30:0x40]
                body_hmac_key = hdr[0x40:0x50]
                body_hmac = hdr[0x50:0x64]
                zeroes = hdr[0x64:0x6C]
                print(hx(zeroes))
                header_hmac = hdr[0x6C:0x80]
                body_len = struct.unpack('<L', hdr[0xc:0x10])[0]
                print body_len
                ehdr = hdr[:0x6C]
                ebody = f.read(body_len)
                bhmac = HMAC.new(body_hmac_key, ebody, SHA)
                hhmac = HMAC.new(uhx(HASHERKEYEAP[0]), ehdr, SHA)
                body = aes_decrypt_cbc(body_aes_key, uhx(ZEROS128[0]), ebody)
                print bhmac.hexdigest()
                print hhmac.hexdigest()
                print hx(body_hmac)
                print hx(header_hmac)
                with open(sys.argv[1] + '.bin', 'wb') as g:
                    g.write(hdr+body)
            
            

if __name__ == '__main__':
    main(len(sys.argv), sys.argv)

EAP/EMC Aeolia Script for encrypting (with header necessary)[edit source]

import struct
from binascii import unhexlify as uhx
from binascii import hexlify as hx
from Crypto.Cipher import AES
from Crypto.Hash import SHA, HMAC

import os
import sys

CIPHERKEYSEMC = ['5F74FE7790127FECF82CC6E6D91FA2D1'] # FULL
CIPHERKEYSEAP = ['581A75D7E9C01F3C1BD7473DBD443B98']
HASHERKEYEMC  = ['73FE06F3906B05ECB506DFB8691F9F54']
HASHERKEYEAP  = ['824D9BB4DBA3209294C93976221249E4']
ZEROS128 =      ['00000000000000000000000000000000']

def aes_decrypt_cbc(key, iv, input):
    return AES.new(key, AES.MODE_CBC, iv).decrypt(input)
    
def aes_encrypt_cbc(key, iv, input):
    return AES.new(key, AES.MODE_CBC, iv).encrypt(input)

def emc_decrypt_header(hdr):
    return hdr[:0x30] + aes_decrypt_cbc(uhx(CIPHERKEYSEMC[0]), uhx(ZEROS128[0]), hdr[0x30:0x80])
    
def emc_encrypt_header(hdr):
    return hdr[:0x30] + aes_encrypt_cbc(uhx(CIPHERKEYSEMC[0]), uhx(ZEROS128[0]), hdr[0x30:])
    
def eap_decrypt_header(hdr):
    return hdr[:0x30] + aes_decrypt_cbc(uhx(CIPHERKEYSEAP[0]), uhx(ZEROS128[0]), hdr[0x30:0x80])
    
def eap_encrypt_header(hdr):
    return hdr[:0x30] + aes_encrypt_cbc(uhx(CIPHERKEYSEAP[0]), uhx(ZEROS128[0]), hdr[0x30:0x80])

def main(argc, argv):
        with open(sys.argv[1], 'rb') as f:
            data = f.read()
            type = data[7:8]
            if type == uhx('48'):
                print 'EMC'
                
                body_len = struct.unpack('<L', data[0xc:0x10])[0]
                body = data[0x80:0x80+body_len]
                body_aes_key  = data[0x30:0x40]
                ebody = aes_encrypt_cbc(body_aes_key, uhx(ZEROS128[0]), body)
                body_hmac_key = data[0x40:0x50]
                bhmac = HMAC.new(body_hmac_key, ebody, SHA)
                hdr = (data[0:0x50] + uhx(bhmac.hexdigest()) + data[0x64:0x6C])
                hhmac = HMAC.new(uhx(HASHERKEYEMC[0]), hdr, SHA)
                hdr = (hdr + uhx(hhmac.hexdigest()))
                hdr = emc_encrypt_header(hdr)
                print bhmac.hexdigest()
                print hhmac.hexdigest()
                with open(sys.argv[1] + '.bin', 'wb') as g:
                    g.write(hdr+ebody)
            if type == uhx('68'):
                print 'EAP'
                body_len = struct.unpack('<L', data[0xc:0x10])[0]
                body = data[0x80:0x80+body_len]
                body_aes_key  = data[0x30:0x40]
                ebody = aes_encrypt_cbc(body_aes_key, uhx(ZEROS128[0]), body)
                body_hmac_key = data[0x40:0x50]
                bhmac = HMAC.new(body_hmac_key, ebody, SHA)
                hdr = (data[0:0x50] + uhx(bhmac.hexdigest()) + data[0x64:0x6C])
                hhmac = HMAC.new(uhx(HASHERKEYEAP[0]), hdr, SHA)
                hdr = (hdr + uhx(hhmac.hexdigest()))
                hdr = eap_encrypt_header(hdr)
                print bhmac.hexdigest()
                print hhmac.hexdigest()
                with open(sys.argv[1] + '.bin', 'wb') as g:
                    g.write(hdr+ebody)
            
            

if __name__ == '__main__':
    main(len(sys.argv), sys.argv)

System modules keysets changes[edit source]

1.00 to 3.70 are 0
4.00 to 4.07 are 1
4.50 to 4.74 are 2
5.00 to 5.07 are 3
5.50 to 5.56 are 4
6.00 to 6.20 are 5
6.50 to 6.72 are 6
7.00 to 7.02 are 7
7.50 to 7.55 are 8
8.00 to 8.03 are 9
8.50 to 8.52 are 0xA
9.00 to 9.04 are 0xB
9.50 to 9.60 are 0xC
10.00 to 10.01 are 0xD
10.50 to 10.70 are 0xE
11.00 to 11.02 are 0xF
11.50 to 11.XX are 0 (counter at 0xA at 1 instead of 0)
  • Final slot (0xF) has been depleted so in theory SIE will not be able to update keys again.

Southbridge firmware keysets changes[edit source]

1 is obsolete
13 is 0x10000
32/40 is 0x20000
36 is 0x30000
42 is 0x40000

Order of keys in ShellCore[edit source]

P->Q->DQ->QP

Trophy Debug -> Trophy Retail

Other random values in ShellCore[edit source]

  • 59 ED 05 E1 2B 97 3E E0 62 B8 07 A4 EB 48 10 10 (http related)
  • 65 9A 82 19 27 CF D6 2F 0C 1C C2 5F AF 67 96 5B (0x40 size, prolly http related)
  • E7 F5 9C F2 AC 00 1C 3C 57 17 1C 82 4D 80 0B 57 (0x80 size, NP COMM SIGN related)
  • 27 59 CD 8F 49 24 CF C5 64 2C 1A 44 E6 B6 12 79 (0x20 size, sp-int/ prod-qa / mgmt / np related? interesting stuff)
  • 56 EE 5E 50 F9 58 97 47 DF 80 5B 3D 31 A5 A7 6B (0x20 size, sp-int/ prod-qa / mgmt / np related? interesting stuff)
  • 4D 35 CC 3E 38 17 64 E2 DE F1 DC 7C 97 3E 6D 62 (0x100 size, sp-int?)
  • B3 A8 76 EC D6 BA 02 43 72 B1 95 AD D7 47 3C 74 (0x100 size, prod-qa?)
  • 09 CC 88 B3 8F D3 51 78 28 0F 63 E8 85 2A 00 E0 (0x100 size, mgmt?)
  • C1 64 9F 42 A4 70 6B B5 2E 93 E2 6E C2 2B 64 BC (0x100 size, np?)
  • 27 38 04 D2 5D A5 BA DE FF 59 C1 B9 2B 39 B8 40 (0x20 size)
  • 33 D5 1F 9C 1A 4A AE 43 EC 54 99 4A 77 04 41 B2 (0x80 size, AES related)
  • A7 99 29 D4 F4 25 C5 5C 9C A7 30 D4 62 D2 18 10 (0x80 size, AES related)
  • BC C7 43 2A 7D 34 0A D8 35 6C 4F 6C AE 55 52 6B (0x80 size, AES related)
  • D2 C3 D1 98 09 5C 73 FB 69 6F 6C 09 22 E3 84 0D (0x80 size, AES related)
  • DE EF DF 9A 3A A6 C9 58 85 9A F0 D6 69 F7 A1 AD (0x20 size, AES related)
  • 67 A7 CA 31 48 7A 5C 32 B4 83 8F 37 AA E5 9A 2A (0x20 size, AES related)
  • 6E 58 9C 22 A7 96 11 2B 80 25 15 22 CC BA D1 72 (0x20 size, AES related)
  • 33 F0 8A B8 DA 6F DD 99 08 6B 68 FF 28 DE E3 2D (0x20 size, AES related)
  • 16 6B CA 06 61 F5 EA 64 FA CF 4A 87 8B AE D2 C0 (AES related)
  • F7 D3 E8 A1 AB A1 FE 27 8E A1 C2 62 5D 1D F8 C4 (0x80 bytes)
  • 42 42 AA FD 7A 05 B4 5C F3 5E 08 22 D4 55 97 45 (ShellCore, QP, 0x80)

Database rebuild trigger magic[edit source]

0102FECA (or CAFE0201 byteswapped)

Portable Keys Dumps[edit source]

  • Static always.

sealedkey_key_E[edit source]

AC 81 12 EC 4B B2 E1 4D 13 57 8F 72 AC 56 F2 67 
F7 D5 CB E2 04 84 F5 2C 7F EB A5 80 FF 56 65 2C 
91 D6 52 BC F2 44 8B 58 CE B7 E9 C2 47 FB C7 C0 
F9 83 36 31 75 C1 25 8A 63 7A 27 B2 F8 40 1B 87 
9D DA 5C 2B 48 9B 31 16 22 5F F6 25 D6 E5 CA B5 
97 D3 08 69 8C 69 88 94 AC 44 8D 02 75 85 56 D1 
28 76 0D B7 C7 16 E4 E2 6D 89 89 6F 3F 27 5D F7 
7B E0 07 9F 3E 1A B8 38 D3 91 89 D4 7C 82 6A 6D

sealedkey_key_IV[edit source]

F6 00 16 BA CD 42 AD 21 C7 0D 9B 07 5C B5 19 83

sealedkey_key_sign_E[edit source]

E0 B8 33 73 96 0E F4 46 C2 C7 04 BB 25 9B 27 DA 
39 70 D0 AE EF 3E 72 62 7C D1 5E FF 8B FC FC F0

sealedkey_key_I[edit source]

7D 72 D3 AD 98 30 8C 5B AA 86 08 2B 5A 5A 69 69 
94 60 D3 5A 10 A6 7D 80 89 10 11 2F 14 E7 95 34 
62 99 90 68 9A 84 13 9B B6 A9 40 AA C4 CB DF 3B 
81 DE E5 63 9F 70 F3 18 CD 26 8C 3D DD 38 5C EA 
38 6D 9C 73 E1 82 8F 0D 81 69 C3 AF 7D 72 6A 4C 
87 F1 16 F3 D8 D4 27 BB 37 DC 62 71 64 82 B7 9B 
0B D2 A3 B2 6A 62 3B 54 8E A7 DA D2 0B 61 62 66 
C5 C9 1A 1F 78 C6 A0 A8 2E 69 13 CC 1D EB 9E 8B

sealedkey_key_sign_I[edit source]

2A E5 A0 FB C1 4F C7 34 F5 3B EB B7 13 CE B7 2D 
7E 62 06 E6 09 05 AE 28 E3 5B FB D2 8E E1 EC 78

crepo_iv[edit source]

Used for Crash Report.

23 F8 85 CA 50 B2 98 0A AB 7E 88 AE 65 51 C0 BF

crepo_key_1_sign_E[edit source]

Used for Crash Report.

AE 41 33 01 F9 6E 1D 03 F1 D9 98 1B 2F B3 75 87 
05 C0 6A 94 AD 29 34 5C ED 22 17 ED 4C 7A A3 D1

crepo_key_2_sign_E[edit source]

Used for Crash Report.

E6 A0 82 8A B4 7A 8D A2 AF B4 A7 34 20 DF B7 88 
F6 6B 78 E7 DF F7 17 69 43 8B 15 64 75 15 F3 33

crepo_key_1_sign_I[edit source]

Used for Crash Report.

00 3F 02 7D 1A BE F2 9A BB E5 23 D7 0F 7B 55 3A 
14 F7 F0 83 14 04 05 0F 2A B5 23 DD D1 5D F4 C6

crepo_key_2_sign_I[edit source]

Used for Crash Report.

B1 2B 7C 5B 0E 11 18 C3 B0 F6 7B 31 80 C8 B8 F7 
B6 9E 3D 97 E5 36 47 C2 08 E0 34 43 51 0A DC 13

crepo_key_1_E[edit source]

Used for Crash Report.

24 3F 86 77 5F 7C DA 8F 9A D4 8A 72 69 9C BC 1E 
97 6E 77 0B CE E0 C9 5C 06 CD A7 D4 FD A2 1F E4 
B8 1F 78 FD 20 80 81 9B B5 4C 49 D7 12 87 18 86 
CE 04 7A 2C 47 63 10 A7 FC 38 F4 C2 C9 2F 8A 38 
80 E6 F4 5E F3 32 FF 11 E0 7C D5 DA 99 A9 36 72 
EC BD E0 B1 E2 27 90 73 3C DD 8F B6 1B 3B E8 88 
29 E6 85 EC E9 FB 4C D9 B9 53 FA D5 0D D0 73 78 
6F 91 03 07 54 F6 CF 74 98 E9 4C D7 DF 8F 5F CA

crepo_key_2_E[edit source]

Used for Crash Report.

E6 6C 7A 2A 1F 0F B8 B1 11 E4 23 09 48 05 0A 21 
9A EF 3C FC 8C 23 33 55 FE 92 9D 27 37 60 72 6C 
7B D2 4A 68 8A 47 F9 9A 8A 47 7C A3 11 45 1B D0 
C4 B1 08 65 0A 75 6E 2A FB 67 A8 D7 F6 BD 9F 9A 
D0 20 B3 66 57 71 CA 02 1C E4 4E C0 76 9B 06 AC 
F4 21 90 AF 68 0E 63 CE 18 4D B2 49 9B 15 BE 4B 
19 B8 00 51 CA 98 DD 3B 78 57 41 11 AE B2 D9 C6 
EC C1 28 54 1C 06 B2 DB 32 4B 88 8D 6E FB 23 F0

crepo_key_1_I[edit source]

Used for Crash Report.

8B 5B 04 14 D6 26 36 F6 86 37 DD 3A E2 8B EC FA 
44 54 2C EB 14 6D 61 F7 4B 47 CF B5 6D 3F 82 F1 
45 49 B1 52 50 B9 95 59 37 56 4A A5 59 A7 AC DA 
CA 09 D5 04 F0 1A 23 95 E4 99 B8 D3 4A B5 41 C9 
4B BE 57 53 61 BF E7 55 95 EE DC 1F 52 E3 16 C2 
3E E6 2A 52 3F 17 36 A9 F2 4D 4D BD 0A 15 16 EB 
3C 6B 55 0F B9 24 32 48 E0 F7 89 69 B6 D5 5C 09 
31 4B 29 23 46 90 B3 1C B6 B3 CB C8 58 31 3E 65

rootparam_key_IV[edit source]

95 69 82 9C D4 B1 5F F8 43 30 54 5A 34 EC 1B C5

rootparam_key_0_sign_I[edit source]

56 CF 9D AE DC 50 B4 1F D7 AA 70 9C A5 4B 9F 1A 
74 82 ED 32 BC 74 39 63 55 AD B4 97 E0 53 59 48 

rootparam_key_1_sign_I[edit source]

F5 1C 1C 99 EF 32 50 74 74 D8 A8 1E 18 98 2B D1 
AC FE FB E1 44 BC E8 1F FA B0 01 A9 AA 10 84 09

rootparam_key_2_sign_I[edit source]

30 28 0F 86 13 4C 1E 6D 63 79 CF D6 2D 00 11 50 
D7 8D 58 D9 F1 6B 0C A2 94 BB 61 17 77 70 62 80 

rootparam_key_3_sign_I[edit source]

54 98 5A 3A A1 8E 1C C6 78 62 A3 B9 71 C7 85 13 
12 93 87 86 64 D7 4A B0 A0 87 DF C7 55 BD 28 60 

rootparam_key_4_sign_I[edit source]

B9 CC D2 86 B6 3B 9C 1C 35 08 27 B3 2A D9 30 9A 
9A AE F9 FB 45 CA D1 32 0D 93 21 41 F8 85 48 26 

rootparam_key_5_sign_I[edit source]

9C 5F A8 5E 4D 1C A8 C7 81 D1 EF 42 1E 34 A2 D0 
ED 3B 4D E5 6C 7C 34 1B 49 EC CF 36 2D B5 C2 43

rootparam_key_0_I[edit source]

F6 9F B6 9A 77 1F C2 D5 12 F7 25 2F A5 86 FB 22 
0D BF A3 F2 38 89 A5 17 97 49 34 D7 83 83 D6 6D 
F9 74 DA 89 35 6B 7F A8 00 63 42 61 ED 70 19 5C 
A7 A0 34 73 8D FC 2E E3 66 D6 FC 07 D4 F4 FC 86 
E4 67 B4 8B E9 54 34 0D AE B2 01 60 AA A4 70 42 
0E 95 62 13 AC D4 7D 11 88 DB 22 7D 4D 1D 92 D2 
CF E9 D8 E5 54 7A B6 D6 51 C6 A8 8E 29 B3 C0 51 
45 66 F6 41 82 A1 33 1D 7C 6C F8 00 43 F0 BD D3 

rootparam_key_1_I[edit source]

95 C7 DC 5B 0A EA 8D 72 A2 6A 57 9E 54 12 6F 22 
C8 C9 7C 84 1C E9 F3 E4 02 F8 7D 63 03 21 5F 9D 
AA 52 46 E7 31 24 58 14 BA ED F2 9D 34 A3 2A 11 
C3 08 1E 5C A6 39 50 38 6A 0F CA D4 31 26 31 89 
65 78 67 BF 4A BF 4B C0 FE A5 B1 84 48 1D 5A E6 
A5 DA 6B BB 54 57 E8 AB A5 2E 95 C4 C5 84 4B EB 
95 01 0B 6B 37 8C B6 5D E0 A4 B8 2A 7F 9C 87 9F 
46 E4 67 82 84 58 71 C8 6E 41 CF 02 FA 4C 41 D5 

rootparam_key_2_I[edit source]

A9 60 9B D1 75 16 C8 85 03 49 D2 14 47 04 DD 1A 
E7 A5 EF 87 45 76 DA 51 1F 42 82 8F 76 48 81 9B 
95 CF 6A 22 21 84 3F 0A 2E 16 B3 64 E5 8C 08 CC 
5E AD B8 5B F4 AC AB 9F 6D 3C 7B B9 2B 63 83 FB 
89 07 A5 CF 8D 00 18 F9 F5 95 57 7A 8A B2 0A 25 
03 53 69 EB BC 58 EE 96 42 D8 3C 99 E1 5F 62 92 
C8 05 5B A3 47 25 C5 B5 97 B9 05 5E D2 52 1B 6A 
90 22 FD 01 6F D3 95 2B 12 86 F3 7E 1D 74 04 E0 

rootparam_key_3_I[edit source]

8C E4 47 03 2A C2 DA A9 8C 83 6E 9B 47 35 D5 37 
CC B8 36 DA C4 F8 22 E8 7A FA 26 50 C8 17 71 26 
BC F4 8A B7 55 EE 81 3A F9 80 6D 34 E6 9A B8 7D 
93 8F C0 BD 3A 16 5C 7E CD FF 36 D5 9A BC 6F 15 
D5 45 DF 5D 15 5D E7 C6 AF 67 6F 18 D1 8B 95 2E 
7C D4 2D B2 E0 72 E3 A1 80 7B 01 F0 32 BB 27 88 
24 08 B1 EE BF E0 5E 28 9B 1B C5 F3 F0 84 D5 3E 
18 83 AB 46 60 2F 27 D2 6B 86 65 0C CA C7 89 C1 

rootparam_key_4_I[edit source]

5C 5D B0 53 08 4B A6 BA A7 B1 E2 6B C6 36 32 CA 
38 E7 DC 3A 19 67 34 D0 AB 5D 3C CA 29 1B 10 C2 
B9 A5 84 99 82 B5 AA EE 75 36 B1 3C 9B 64 A4 83 
42 51 68 8E 4B 1F 14 D3 F8 38 1E 8A A3 56 8A 41 
43 CD D6 E7 05 6D 7F B5 A9 4E A2 34 ED 82 29 80 
8D 63 C0 AF F8 C3 35 66 DC 49 E6 B6 AB F5 AA F6 
1E B3 FD 52 F8 79 18 F2 55 98 66 8C 61 4E 83 F1 
D6 7E A4 70 53 25 BE 42 D3 19 4A 8D B0 8A AC EF 

rootparam_key_5_I[edit source]

36 EF D1 C2 7E 49 6E 6B 23 98 C4 43 AE AB DB B0 
BA 5D A5 6C 2A E1 86 45 F8 39 E9 26 DB FD 4C 10 
1A A4 32 D0 F0 0C A3 13 5D 17 82 5A 45 9C C7 76 
5F 70 25 31 23 3E A0 15 C6 01 BE 5F 48 56 A7 15 
08 9D F2 D6 64 9A 2F 38 8F 67 DA 09 17 A9 4D 02 
79 EA D9 31 23 C4 37 19 36 EE 4F 7D 88 1D 8B 5D 
EB C6 74 F2 EA FE F6 E6 F4 66 B6 FF 0A 65 FD 46 
14 D2 98 88 CF 13 49 15 58 BE E6 E6 1E CB 42 F7

rootparam_key_0_sign_E[edit source]

6C 11 E6 DD 2F 5D 27 D5 8F 06 9E FC 24 11 6F DD 
1D 26 36 33 F4 A7 A2 DE C9 06 17 88 51 88 ED 61 

rootparam_key_1_sign_E[edit source]

BC 8E 1B D1 91 D4 EF A8 65 A4 25 15 C6 6F BE D1 
E6 99 81 1C A7 25 73 C0 00 EA 1C A9 D6 B6 12 3A 

rootparam_key_2_sign_E[edit source]

55 29 35 D8 4A B8 D5 FD B0 0C B7 71 CF E3 5D 48 
4C 60 CC 78 F7 F4 D5 45 82 9B 2E 79 62 D2 D1 CD 

rootparam_key_3_sign_E[edit source]

55 29 35 D8 4A B8 D5 FD B0 0C B7 71 CF E3 5D 48 
4C 60 CC 78 F7 F4 D5 45 82 9B 2E 79 62 D2 D1 CD 

rootparam_key_4_sign_E[edit source]

F5 AA 42 70 7B D5 F6 3D 3B 9C 6C 99 36 8B 94 65 
3D C7 51 95 7B A1 CB 80 A5 EC 47 81 43 A9 61 4E 

rootparam_key_5_sign_E[edit source]

03 D2 54 72 DB 35 27 C6 7B 98 EE 9F 1F C8 A7 74 
6F BB BF DF DD E9 97 5C F7 86 48 8E 5F 4D EE 63

rootparam_key_0_E[edit source]

19 54 0D A2 DF F8 D6 6A 66 08 30 0F 37 8B F5 D4 
B3 59 C2 EA B7 9B EB C4 5B 8B B5 E8 6A B8 77 A6 
4E 7E 7B 33 6D F1 10 A8 C1 2D 46 29 D4 B4 3C 60 
B2 AD 4F BB C9 33 39 38 65 62 AA C4 FE 74 D2 4A 
CD 23 A9 36 B7 36 3C B0 E1 AB BF 6C 25 C4 2C 4C 
58 E9 4D 20 4A A2 AD 15 C2 74 E8 51 00 44 DA 15 
BB 74 2D 91 E1 DC 52 DF DC 7D F6 93 3C EF F2 E5 
45 5D 3A DA C6 E1 25 12 2B BA B2 42 5E F3 F5 FE 

rootparam_key_1_E[edit source]

F9 DA 87 36 B5 B2 30 17 DC 1D 47 51 FE 0B 75 23 
2A 3E 58 AD 92 96 B3 D1 C1 11 97 DA FD 7D A2 E5 
51 33 49 F4 31 DC EA 7B 3F 15 54 DF 26 6B 66 88 
50 4D 3B 59 AD 95 0B D6 6F B5 62 AF 0F F6 BD E0 
CB 08 FA 5D 44 B1 A4 94 82 A3 74 63 25 C5 56 9E 
12 54 53 B6 DA C8 DD BF CF 7A 7B A2 1A 8C A0 88 
AC 74 2E D4 96 CD 36 2E 14 83 A1 51 5A 0D 8A A9 
28 1B 53 FA 5A C2 DF C5 EE E9 37 0F F5 64 61 F7 

rootparam_key_2_E[edit source]

E6 EA DF D7 E8 B0 23 7B 9A 40 8F 96 52 15 3B 78 
2C 63 28 6A 47 AE 91 92 36 DF 6B D1 BE A5 10 34 
55 EC C7 D3 FE 43 5C 60 27 4F AB BC 68 2A 00 37 
EB 28 7C 58 54 E1 0A 1C D5 30 47 B5 6E 40 8E A3 
6D ED 64 81 CE A1 81 D8 CF 9E C7 C2 1E 6C 2F 86 
CF 30 F3 16 A8 5B C0 74 EB 03 6A E4 C3 48 82 2E 
54 75 61 44 B5 D5 4F BB 24 7A E5 21 11 49 1D 48 
8F D2 B0 78 AA EF 6A 3B A5 C9 35 62 C7 7A 6C C2 

rootparam_key_3_E[edit source]

E6 EA DF D7 E8 B0 23 7B 9A 40 8F 96 52 15 3B 78 
2C 63 28 6A 47 AE 91 92 36 DF 6B D1 BE A5 10 34 
55 EC C7 D3 FE 43 5C 60 27 4F AB BC 68 2A 00 37 
EB 28 7C 58 54 E1 0A 1C D5 30 47 B5 6E 40 8E A3 
6D ED 64 81 CE A1 81 D8 CF 9E C7 C2 1E 6C 2F 86 
CF 30 F3 16 A8 5B C0 74 EB 03 6A E4 C3 48 82 2E 
54 75 61 44 B5 D5 4F BB 24 7A E5 21 11 49 1D 48 
8F D2 B0 78 AA EF 6A 3B A5 C9 35 62 C7 7A 6C C2 

rootparam_key_4_E[edit source]

F6 C5 1C A3 8E F0 18 2D 55 35 48 75 47 AE BE BA 
D2 70 93 D5 C5 87 01 00 34 65 FE D8 87 A4 2C B3 
0F D0 C5 F3 FD EA B2 78 09 CB 4D BF 4C 02 26 02 
F6 5D 0E 86 C3 D5 30 5B 78 9A E8 A4 3E 19 22 FC 
5B 7D F4 4D 66 50 73 72 CF EB 03 AC 7F 82 55 90 
F1 06 02 2F A5 88 93 07 2C 94 51 57 05 92 87 F9 
F6 2B 15 6B F4 EE 15 BF D2 2B C4 BE 4C D7 AC 28 
AD 52 F0 E4 F4 92 CC 90 E6 20 D6 F7 DD D4 AA 57 

rootparam_key_5_E[edit source]

B2 37 2E C2 0A CA 40 00 99 03 21 83 3B 03 D2 74 
5C 41 42 A4 13 F3 E1 28 CB B5 BC 7B 3A D0 30 20 
CC 5D 99 AB 56 4B F4 B2 05 57 26 C3 63 EC 93 32 
5B 4A 66 06 88 B5 91 02 CD D5 35 2F E2 C1 B7 7A 
14 E3 B2 D5 14 80 06 28 F3 00 D7 61 32 5B F9 54 
A1 25 D2 EC 69 16 4B 0C 95 06 86 60 50 31 80 67 
44 9F 57 87 4E 8D 09 20 73 3E BE F8 A9 CF C2 0B 
68 22 EC DD 65 8A D8 BB 70 04 F5 7A 69 3D 19 DC

sealedkey_key_E (pfsSKKey__SecKey)[edit source]

Used for PFS encryption.

00000000  70 66 73 53 4b 4b 65 79  5f 5f 53 65 63 4b 65 79  |pfsSKKey__SecKey|
00000010  b5 da ef ff 39 e6 d9 0e  ca 7d c5 b0 29 a8 15 3e  |....9....}..)..>|
00000020  87 07 96 0a 53 46 8d 6c  84 3b 3d c9 62 4e 22 af  |....SF.l.;=.bN".|
00000030  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
*
00000080
  • flag is 0
  • identical to I

SCE_EAP_HDD__KEY (External)[edit source]

Used for HDD encryption.

00000000  53 43 45 5f 45 41 50 5f  48 44 44 5f 5f 4b 45 59  |SCE_EAP_HDD__KEY|
00000010  bb 6c d6 6d dc 67 1f ac  36 64 f7 bf 50 49 ba a8  |.l.m.g..6d..PI..|
00000020  c4 68 79 04 bc 31 cf 4f  2f 4e 9f 89 fa 45 87 93  |.hy..1.O/N...E..|
00000030  81 17 45 e7 c7 e8 0d 46  0f af 23 26 55 0b d7 e4  |..E....F..#&U...|
00000040  d2 a0 a0 d9 72 9d e5 d2  11 7d 70 67 6f 1d 55 74  |....r....}pgo.Ut|
00000050  8d c1 7c df 29 c8 6a 85  5f 2a e9 a1 ad 3e 91 5f  |..|.).j._*...>._|
00000060  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
*
00000080
  • flag is 0x20

crepo_key_1_E (CFK1)[edit source]

Used for Crash Report.

00000000  43 46 4b 31 00 00 00 00  00 00 00 00 00 00 00 00  |CFK1............|
00000010  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
00000020  61 9a d0 db 62 cb 51 37  d8 aa 84 d0 28 b9 92 2d  |a...b.Q7....(..-|
00000030  74 46 01 4d 5a 20 67 31  af d2 ab 62 44 d1 f5 92  |tF.MZ g1...bD...|
00000040  de 9f 35 6c 99 1b 1c 04  3d 76 cd 9f b1 a7 03 57  |..5l....=v.....W|
00000050  89 73 d9 26 a1 60 ea 72  d8 e7 33 9f b0 52 f0 e2  |.s.&.`.r..3..R..|
00000060  06 80 47 c4 d7 7a fd fd  95 72 27 8d 97 ab f4 21  |..G..z...r'....!|
00000070  aa cd 9d 9d 2a a2 30 cc  0d 37 b8 69 47 d1 6a ac  |....*.0..7.iG.j.|
00000080
  • flag is 0xC

crepo_key_1_I (CFK1)[edit source]

Used for Crash Report.

43 46 4B 31 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
77 B7 5A 04 C9 69 D3 FE BC 11 38 EE 2F B1 31 CC 
71 E6 66 F7 D3 78 E4 F4 CD AB 35 D7 DE C4 A3 26 
3B 2A 68 2C 43 06 15 CE 04 77 3D 4B A5 BC F8 7E 
CF 9B CF 77 B4 8B A7 78 DE BD 09 75 BB 5B B1 27 
44 A1 E3 CC EC 71 4F 10 09 48 CC 23 55 41 3C CE 
11 34 1A 57 F2 34 69 F9 62 6B 2E 71 AD 17 B2 2C

crepo_key_2_E (CFK1)[edit source]

Used for Crash Report.

00000000  40 83 63 f3 b4 d0 4b 54  09 ba f3 f4 27 41 13 c4  |@.c...KT....'A..|
00000010  ac 97 ae 26 3b 9b 26 1c  2d 87 50 35 80 a3 e0 34  |...&;.&.-.P5...4|
00000020  f9 97 e5 b9 8c 85 9d 90  33 68 04 32 81 1b 50 21  |........3h.2..P!|
00000030  1f a4 5d 36 63 a3 50 7b  cc 68 12 7c bf 9a aa 2d  |..]6c.P{.h.|...-|
00000040  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
*
00000080
  • flag is 0xC

rootparam_key_0_E (SCEROOTPARAM_KEY)[edit source]

00000000  53 43 45 52 4f 4f 54 50  41 52 41 4d 5f 4b 45 59  |SCEROOTPARAM_KEY|
00000010  01 00 01 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
00000020  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
*
00000040  29 ed 9c 0a f8 d3 97 00  29 85 a9 df d0 f2 47 21  |).......).....G!|
00000050  03 ea a7 1e b1 10 c0 03  99 b1 1d ec b2 e5 df 08  |................|
00000060  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
*
00000080
  • flag is 0x14

rootparam_key_0_I (SCEROOTPARAM_KEY)[edit source]

53 43 45 52 4F 4F 54 50 41 52 41 4D 5F 4B 45 59 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
CA 5C 5D 73 F7 57 0D 77 E9 00 AB 72 C0 5A C3 C4 
B4 9C 45 CB CD 90 29 61 58 EC 47 1F 5F 26 72 52 
29 ED 9C 0A F8 D3 97 00 29 85 A9 DF D0 F2 47 21 
03 EA A7 1E B1 10 C0 03 99 B1 1D EC B2 E5 DF 08 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

rootparam_key_4_E (SCEROOTPARAM_KEY)[edit source]

00000000  ab 75 84 e1 58 6e f3 38  66 3b 39 9b 09 40 49 54  |.u..Xn.8f;9..@IT|
00000010  6b ce b2 f0 9f 32 0a 1b  f8 de 0a a0 d1 5f 28 bd  |k....2......._(.|
00000020  7f f5 78 1d c5 4c 80 fb  e4 7a 3e 36 91 8d 19 3e  |..x..L...z>6...>|
00000030  09 67 ae 3d 61 4e b1 4f  7d 71 cf 20 e4 40 71 1f  |.g.=aN.O}q. .@q.|
00000040  05 65 93 0d fd 2d a6 d1  21 3c ef f4 5a 00 97 cb  |.e...-..!<..Z...|
00000050  2f e9 ed b5 ce 07 bb d3  57 4e fa b1 ac a3 fe 80  |/.......WN......|
00000060  88 3f 0a 0e 75 9b 4f 2f  40 6a c6 ef 98 23 b9 e5  |.?..u.O/@j...#..|
00000070  ae bd 3b 75 b7 c6 e1 68  5f b3 90 c4 12 a0 4d 24  |..;u...h_.....M$|
00000080
  • flag is 0x14

rootparam_key_5_E (SCEROOTPARAM_KEY)[edit source]

00000000  44 62 12 3c 06 10 f2 55  3c 01 d1 f8 50 eb 1e 88  |Db.<...U<...P...|
00000010  c0 34 61 40 04 19 80 9d  ab b4 63 f6 f3 6c e9 4d  |[email protected]|
00000020  39 6e 07 40 d9 8a d3 27  0c 27 e1 4a ad 0e b1 19  |9n.@...'.'.J....|
00000030  fe 79 df 09 7c 07 9b eb  ec f9 aa 64 f0 42 f6 4d  |.y..|......d.B.M|
00000040  58 45 0e 46 d9 e8 31 98  5d c5 10 ed 81 32 f5 c8  |XE.F..1.]....2..|
00000050  8a d2 48 5b cc 6f 7e 2d  38 b0 f4 3e 8f 2b 0c 63  |..H[.o~-8..>.+.c|
00000060  19 1d f8 5f 50 0b 77 f9  37 ec 7c 6b ea cd c9 15  |..._P.w.7.|k....|
00000070  ea e6 d8 e1 bf 80 28 a3  eb 3e 9a 9d 5c 00 48 ad  |......(..>..\.H.|
00000080
  • flag is 0x14

SCE_LwUtoken_Key (External)[edit source]

Used for "low" user tokens.

00000000  53 43 45 5f 4c 77 55 74  6f 6b 65 6e 5f 4b 65 79  |SCE_LwUtoken_Key|
00000010  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
*
00000040  e4 03 52 c3 02 18 f1 a6  22 5a cf 4c a7 9e 54 eb  |..R....."Z.L..T.|
00000050  b2 7a bc be b7 1f b4 7a  5c d0 66 c7 9e 99 9f 2a  |.z.....z\.f....*|
00000060  66 4a b9 75 36 4c f3 0e  75 ee 24 15 9c 38 51 f3  |fJ.u6L..u.$..8Q.|
00000070  01 00 01 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
00000080
  • flag is 0x24

SCE_LwUtoken_Key (External-Extra1)[edit source]

Used for "low" user tokens.

00000000  a3 c6 b1 40 de 3d d5 e9  44 8c 16 0a 18 54 75 6f  |...@.=..D....Tuo|
00000010  1c 51 87 64 cd 3d a4 6f  ce 72 a8 36 eb 61 f6 81  |.Q.d.=.o.r.6.a..|
00000020  5a 3f b5 c4 73 08 7e 87  a9 ff 8d a6 a7 27 60 22  |Z?..s.~......'`"|
00000030  fe 2f 64 64 ed 9c 97 fe  72 38 e4 d3 11 a9 b1 8b  |./dd....r8......|
00000040  35 32 29 d6 38 1e 7d 47  cc 09 0e 61 23 67 5f 00  |52).8.}G...a#g_.|
00000050  cc 11 f2 51 69 5d 51 64  1b 4f c1 47 62 bb c0 3b  |...Qi]Qd.O.Gb..;|
00000060  46 60 85 53 7c 41 78 76  39 5c 5a a3 fa 7e 40 17  |F`.S|Axv9\Z..~@.|
00000070  34 6f 6c 2a 27 04 25 cc  7c ad 87 c4 6a eb f6 bf  |4ol*'.%.|...j...|
00000080
  • flag is 0x24

SCE_LwUtoken_Key (External-Extra2)[edit source]

Used for "low" user tokens.

00000000  2c e9 d0 41 3b f5 29 aa  ad aa 0f 3b d6 18 44 7e  |,..A;.)....;..D~|
00000010  35 95 f6 9f af f0 03 92  1a cd 6e 59 22 54 c5 d9  |5.........nY"T..|
00000020  6b 9d c2 14 d6 3f ee bf  ef 07 58 af 96 1a ab 5d  |k....?....X....]|
00000030  77 09 27 96 2d fe a8 20  03 b4 e3 41 94 75 b2 49  |w.'.-.. ...A.u.I|
00000040  54 4f 08 e7 5d f4 dc 87  3a 34 5d 8e a8 10 67 22  |TO..]...:4]...g"|
00000050  e4 78 c4 70 d6 1b 9f 8c  5a b9 a9 d7 c9 17 83 30  |.x.p....Z......0|
00000060  35 0e 11 ba a2 27 46 82  f9 f1 88 31 ea af ec 75  |5....'F....1...u|
00000070  dc 5b 86 d7 70 90 c9 dc  76 c2 35 5c cd 9c 33 d4  |.[..p...v.5\..3.|
00000080
  • flag is 0x24

IPMI (E)[edit source]

Used for Inter-Process Method Invocation.

ffffff80869df8e0  53 49 45 49 50 4d 49 00  00 00 00 00 00 00 00 00  |SIEIPMI.........|
ffffff80869df8f0  1a 88 b2 a3 64 e6 a2 8e  78 08 4e 3f 7f 40 fd 01  |....d...x.N?.@..|
ffffff80869df900  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff80869df910  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff80869df920  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff80869df930  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff80869df940  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff80869df950  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
  • flag is 0x50

SCE_SBL_BAR_KEY1 (E)[edit source]

Used for Secure Block Backup And Restore feature.

ffffff80869df8e0  53 43 45 5f 53 42 4c 5f  42 41 52 5f 4b 45 59 31  |SCE_SBL_BAR_KEY1|
ffffff80869df8f0  1f 18 c9 70 d0 00 ac 7e  6f cc 1a 8c dd 89 b4 fe  |...p...~o.......|
ffffff80869df900  cd a1 33 a1 0e c8 f5 25  98 22 23 f5 86 1f 02 00  |..3....%."#.....|
ffffff80869df910  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff80869df920  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff80869df930  79 c8 cc c8 89 a1 54 0d  4f 2e 27 bb 61 4f d6 53  |y.....T.O.'.aO.S|
ffffff80869df940  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff80869df950  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
  • flag is 0x28

SCE_KDF_NCDT_PSK(E)[edit source]

ffffff80869df8e0  53 43 45 5f 4b 44 46 5f  4e 43 44 54 5f 50 53 4b  |SCE_KDF_NCDT_PSK|
ffffff80869df8f0  59 e6 32 88 b0 4e 7f 68  f8 b8 db 83 86 1e 07 50  |Y.2..N.h.......P|
ffffff80869df900  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff80869df910  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff80869df920  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff80869df930  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff80869df940  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff80869df950  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
  • flag is 0x4C

Unknown key 0x54[edit source]

91 0B 7C A6 6B 4B F9 DA 00 72 F1 67 6C 51 99 70
C1 4D B2 26 6A 59 29 C2 5E 1A 72 5D D8 19 05 BF
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  • flag 0x54

hidAuthThreadMain[edit source]

ED E7 41 CC 7F D6 0E 1F 2D B0 89 16 1F C0 EB 66
7C A4 DA 59 40 CE 19 54 00 90 1D BF 59 25 EE 4F
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  • hidAuthThreadMain
  • flag 0x48

livedump[edit source]

96 1E 5E 85 B5 3E 77 64 43 E5 F4 45 85 E8 90 0A
52 5E 06 2A 4C 79 64 69 0F 75 2F 28 71 9C 6B A1
A8 C2 A0 0D 84 31 E7 17 DD EF 6D 80 F6 5C AE 32
42 1F CB E5 E7 A4 F9 1F 79 2B 25 C7 A1 0C 9E 5A
7B 07 82 9F F3 7C 3F B4 66 2F CB F8 E4 0A 63 F2
99 EE B8 6F 06 D5 58 CD 6E 8E 6A F7 5E 48 3A 24
CC 73 EA E7 73 2F 44 2F 8B E5 28 FB 19 60 62 50
F4 A9 9C A5 9E FC 63 2C 2D CC 67 73 2B 8B 5A DE
  • livedump
  • flag 0x44

pfs_sbl_key[edit source]

2B CF 69 8E 79 CF DD FA C2 4D 4C 25 BF 35 1E 62
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  • pfs_sbl_key
  • flag 0x58

SCECloudSD___KEY[edit source]

Used for Cloud Save Data features. Similar to the Cloud Data Key Ring used in PS Vita since System Software version 3.100.081.

53 43 45 43 6C 6F 75 64 53 44 5F 5F 5F 4B 45 59
01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00
61 6F AD DF 22 04 AC 7A 24 06 4C CE D8 CD 88 A0
DE 07 F0 15 43 45 32 7D BE 4D 49 E1 CA 87 5D 98
5E F0 E4 AB 2A CE 26 69 00 96 D9 48 D4 C0 1B 36
8B B0 B2 1D 45 72 7D 70 91 26 F4 A1 10 77 0C F9
7A 0A F1 17 81 97 33 CC 71 05 73 92 4F D2 5C 1B
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
5F 15 6F 65 CF DA 91 51 83 7C E3 06 D3 39 75 71
08 3C 5B 08 10 5A 9C 6D 79 F0 64 29 DF D1 6D 33
4A 75 88 66 9B 61 54 B4 2F A6 C2 29 55 6E AD 76
34 4B B4 B8 F6 03 83 4D F4 B4 92 5A C8 F9 39 8E
31 60 25 1A 88 51 53 F7 A4 D9 5E 4C FF D0 3D 4B
95 A7 6F E8 DD BF 92 B2 D4 1C 0B 0E 28 29 B3 40
B0 AD 2F 35 8A 19 D9 C1 2D AA 81 C3 23 16 3A 17
15 0D 4C 33 3A 62 49 A7 51 A3 3C 4E 78 01 50 F8

B1 24 25 11 6E C0 95 15 9E FA 11 B6 48 BD 96 70
AE 87 C9 99 DA 38 2E F1 B7 D6 41 81 09 98 A1 FF
27 69 85 D1 68 1C BE 72 2A F2 38 7F 65 AD 66 95
8B 72 A5 C8 73 34 3E A8 35 E2 82 74 2A 94 67 40
30 DF 3B 19 6C 5D CC D9 AD 44 7E 6C 22 76 ED 0A
64 E8 A1 46 A0 BE B7 D9 CA 6F CB 4F 54 92 2F 0F
41 90 1F 95 62 AF 0B 0E 18 63 06 C0 EA 22 8C 2E
3C 7E E9 79 73 A0 09 0C 36 D2 09 8D 75 DE 88 C7

EB 3E E3 B6 66 0F DD 75 99 CE 39 76 59 07 15 60
86 92 96 C5 B3 CB 06 B1 C2 E9 E9 C5 8B 13 35 5E
76 34 61 BA A2 4F F2 DB 99 CC BC DC 3C 13 2C A3
13 56 55 A7 0A FD 88 43 11 95 0A 0D 6D A4 7F 74
F3 2C 67 BC F4 E9 6F 1E 4D 69 5C CC 2E 1C 57 A8
CE 97 0B 4B D9 6A 5A 81 42 3F 6E 5C 7B A5 4A 78
AE 95 97 26 2A FF 9E 00 4F B4 F0 BB 40 72 1C 1F
8F 4B F7 AB FD D3 8C DC 14 FE 92 DD 16 51 A1 2F

01 AB 69 DF 87 71 AE BF E7 97 CD 88 18 F1 98 BF
A9 D3 3B 1A 95 C5 F1 37 65 17 DB FE C4 4D 0C 3B
26 27 73 61 F9 60 36 BE 90 36 A5 73 0F A5 98 EB
AE BD 9E 84 35 BD B4 CD A8 59 15 4C 25 CA DE 33
FA 53 D9 5C 9B 26 CD 1A BA CC 80 8F A5 0F 1A 6A
1D 2D A3 0D 52 56 89 FF BC 63 AE 7A 0B D4 F6 24
8F 3D BF F8 BD DB DB 9A 2A 52 85 EB AB D4 BA 08
37 39 EE EE 4A D2 ED D3 52 A5 BA 39 50 1B BA A3

F7 1B 39 B8 5D 55 7D 5E B7 6F 22 F9 82 95 0E 45
1B CC 18 CD B9 FB 14 25 5A 22 FC BA 98 1D 50 C6
20 1C 15 47 C7 1D 1D 55 CC A2 94 8D CF 4E A9 8E
4D F8 2F 96 D6 C3 AB B9 46 A4 0C 1A FD E5 01 B9
8F 07 DE DA BC 20 FF 0D BD CC CE FD 77 E2 28 62
25 56 1A F3 D1 92 DD F7 72 43 64 9C D4 38 7A C6
FA C3 60 45 61 B2 EA 3B C5 90 AC 0F 20 0F 26 73
14 03 A8 2D 00 48 35 2D 45 8A 86 7B 6B 28 69 02
  • Cloud Key
  • flag 0x1C

Portable Keys Dumps (ShellCore)[edit source]

SCE_CFS_hostname (E)[edit source]

Host by Amazon AWS at Portland, Oregon, 97086 United States of America. Alias of cfss.crs.playstation.net.

Zeke Jedediah Dunbar is a main character of the Infamous videogame developped by Sony Computer Entertainment America.

-------HEX DUMP------
ffffff8085f7f8e0  53 43 45 5f 43 46 53 5f  68 6f 73 74 6e 61 6d 65  |SCE_CFS_hostname|
ffffff8085f7f8f0  63 66 73 73 2e 64 75 6e  62 61 72 2e 73 63 65 61  |cfss.dunbar.scea|
ffffff8085f7f900  2e 63 6f 6d 00 00 00 00  00 00 00 00 00 00 00 00  |.com............|
ffffff8085f7f910  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8085f7f920  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8085f7f930  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8085f7f940  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8085f7f950  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
  • flag 0xD

SCE_RCR_hostname (E)[edit source]

Host by Amazon AWS at Portland, Oregon, 97086 United States of America. Owned by Minato-ku for Sony Computer Entertainment Inc. Network Platform Service Department at Tokyo (Japan).

Zeke Jedediah Dunbar is a main character of the Infamous videogame developped by Sony Computer Entertainment America.

-------HEX DUMP------
ffffff8085f7f8e0  53 43 45 5f 52 43 52 5f  68 6f 73 74 6e 61 6d 65  |SCE_RCR_hostname|
ffffff8085f7f8f0  7a 65 6b 65 2e 73 63 65  61 2e 63 6f 6d 00 00 00  |zeke.scea.com...|
ffffff8085f7f900  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8085f7f910  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8085f7f920  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8085f7f930  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8085f7f940  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8085f7f950  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
  • flag 0xD

SCE_CDN_hostname (E)[edit source]

Used for Crash Report.

-------HEX DUMP------
ffffff8085f7f8e0  53 43 45 5f 43 44 4e 5f  68 6f 73 74 6e 61 6d 65  |SCE_CDN_hostname|
ffffff8085f7f8f0  63 72 65 70 6f 2e 77 77  2e 64 6c 2e 70 6c 61 79  |crepo.ww.dl.play|
ffffff8085f7f900  73 74 61 74 69 6f 6e 2e  6e 65 74 00 00 00 00 00  |station.net.....|
ffffff8085f7f910  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8085f7f920  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8085f7f930  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8085f7f940  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8085f7f950  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
  • flag 0xD

SCE_SYS_TLM_SECK (E)[edit source]

Used in GetOpenPsIdHash.

-------HEX DUMP------
ffffff80861838e0  53 43 45 5f 53 59 53 5f  54 4c 4d 5f 53 45 43 4b  |SCE_SYS_TLM_SECK|
ffffff80861838f0  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8086183900  99 e9 ac b7 36 53 5e 4b  25 4d 25 b9 e2 ab 3e 09  |....6S^K%M%...>.|
ffffff8086183910  cb cb c7 a7 c0 e8 1a ef  93 cf ae e1 57 4c 1a 7c  |............WL.||
ffffff8086183920  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8086183930  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8086183940  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8086183950  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
  • flag 0x3C

Other Keys[edit source]

-------HEX DUMP------
ffffff807b92b8e0  15 a0 cb 65 d6 a4 05 27  e6 1c cd da 2a ef 53 3b  |...e...'....*.S;|
ffffff807b92b8f0  13 fc 7c 35 24 14 b3 54  3d c7 83 24 6e fc c9 64  |..|5$..T=..$n..d|
ffffff807b92b900  9d f8 40 9a c2 02 09 82  3c 08 61 2b e6 2a 51 79  |..@.....<.a+.*Qy|
ffffff807b92b910  cf 87 62 61 c0 85 46 c2  a5 da a1 9b d0 e7 ff 79  |..ba..F........y|
ffffff807b92b920  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff807b92b930  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff807b92b940  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff807b92b950  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
  • flag 0xA
C6 8A 9B 40 49 35 77 E7 54 3A 2D 95 59 9F 7E 96
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  • beta_update_key_E | flag = 0x40
56 6B DD 67 C3 B6 B5 04 EF 1A 39 C0 CC AC 4B E2
  • same as Internal
  • timezone_key_E | flag = 0x40
8C 81 17 54 AB E7 2C 8A 1B 4D DC A2 32 B8 CC 2A
  • system_log_config_key_E | flag = 0x40
8A 7A 15 CE 5D 21 62 19 7C FA 83 B1 DC 77 3C C7
  • system_log_unknown_key_E | flag = 0x40
DA AF 3B 06 99 F7 6E 04 8F 3C 27 BF 0B E8 95 1C
  • bgdc_key_E | flag = 0x40
67 EE DA F2 67 E0 43 BE B5 AD 5C 7A 6F 54 C5 37
  • wctl_key_E | flag = 0x40
5A 1F 16 C3 47 F8 24 6B F6 D7 8B E3 C4 D6 F2 D1
  • morpheus_updatelist_key_E | flag = 0x40
49 B6 1A 0B 8F 33 BC 28 6F 85 6D A8 CB 04 B8 B4
  • entitlementmgr_key_E | flag = 0x40
66 01 69 2E 46 1B BD CC 85 6E A8 DC CE 06 3C F1
  • netev_key_E | flag = 0x40
9B 12 DA 7C 22 44 3B CD 2B BC F6 C0 18 5E 77 70
  • patch_key_E | flag = 0x40
F1 1B 19 25 D9 3C E7 70 86 F4 9C CC 50 96 45 56
  • bgft_key_E | flag = 0x40
CE A4 74 20 1F 0C A2 36 8D D8 37 BF A1 B4 BD 78
  • system_log_privacy_key_E | flag = 0x40