Editing Keys

Jump to navigation Jump to search
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 1: Line 1:
= PSVR Keys =
= PSVR Keys =
== HowTo ==
<pre>
./ps4encdec keyvault/factory_setting_key.bin psvr_emmc_dump/mmc/1.慦瑣牯役敳瑴湩g.img factory_setting 0
./ps4encdec keyvault/rootfs_key.bin psvr_emmc_dump/mmc/6.潲瑯獦.img rootfs 0
./ps4encdec keyvault/firmware_key.bin psvr_emmc_dump/mmc/7.楦浲慷敲.img firmware 0
./ps4encdec keyvault/ta_storage_key.bin psvr_emmc_dump/mmc/8.牴獵整彤瑳牯条e.img trusted_storage 0
./ps4encdec keyvault/rootfs_key.bin psvr_emmc_dump/mmc/9.潲瑯獦㉟.img rootfs2 0
./ps4encdec keyvault/cache_key.bin psvr_emmc_dump/mmc/11.慣档e.img cache 0
./ps4encdec keyvault/firmware_key.bin psvr_emmc_dump/mmc/13.楦浲慷敲㉟.img firmware2 0
./ps4encdec keyvault/userdata_key.bin psvr_emmc_dump/mmc/14.獵牥慤慴.img userdata 0
./ps4encdec keyvault/factory_fw_key.bin psvr_emmc_dump/mmc/15.慦瑣牯役睦.img factory_fw 0
</pre>
== Notes ==
<pre>
Filesystems
Part    Name              XTS Key                                Notes
boot0, boot1                                                      bootloader files with fallback partition
p1      fts                                                        Android-style key-value storage for environment
p2      factory_setting    factory_setting_key.bin                Global and per-device key stores, all encrypted per-device
p3      tzk_recovery                                              FIGO image (recovery TZK and TZBP)
p4      recovery                                                  FIGO image (recovery bootimg)
p5      tzk_normal                                                FIGO image (TZK and TZBP)
p6      boot                                                      FIGO image (bootimg)
p7      rootfs              rootfs_key.bin   
p8      firmware            firmware_key.bin                      Empty linux-firmware tree
p9      trusted_storage    ta_storage_key.bin                    Unused, but seems to have garbage in non-allocated sectors
p10    rootfs_2            rootfs_key.bin                        rootfs fallback
p11    boot_2                                                    FIGO images (boot fallback)
p12    cache              cache_key.bin                          Empty
p13    tzk_normal_2                                              FIGO images (tzk_normal fallback)
p14    firmware_2          firmware_key.bin                      linux-firmware fallback
p15    userdata            userdata_key.bin                      Contains persisted runtime logs
p16    factory_fw          factory_fw_key.bin                    Stores DFU files for provisioning
</pre>
* All containers are XTS keys (data at 0x0, tweak at 0x10)
== kcrs_key.bin ==
<pre>
8E A1 C8 28 C1 27 C4 67 A9 5A A9 13 D1 36 87 D6
</pre>


== cache_key.bin Container ==
== cache_key.bin Container ==
Line 178: Line 133:


</pre>
</pre>
== factory_fw_key.bin Container ==
== factory_fw_key.bin Container ==
<pre>
<pre>
Line 971: Line 925:


</pre>
</pre>


= Static KeySlots =
= Static KeySlots =
Please note that all contributions to PS4 Developer wiki are considered to be released under the GNU Free Documentation License 1.2 (see PS4 Developer wiki:Copyrights for details). If you do not want your writing to be edited mercilessly and redistributed at will, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource. Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following hCaptcha:

Cancel Editing help (opens in new window)

Template used on this page: