Editing Talk:Keys

Jump to navigation Jump to search
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 1: Line 1:
= EAP/EMC Aeolia Script for decrypting and keeping header =
= system modules keysets changes =
 
<pre>
import struct
from binascii import unhexlify as uhx
from binascii import hexlify as hx
from Crypto.Cipher import AES
from Crypto.Hash import SHA, HMAC
 
import os
import sys
 
CIPHERKEYSEMC = ['5F74FE7790127FECF82CC6E6D91FA2D1'] # FULL
CIPHERKEYSEAP = ['581A75D7E9C01F3C1BD7473DBD443B98']
HASHERKEYEMC  = ['73FE06F3906B05ECB506DFB8691F9F54']
HASHERKEYEAP  = ['824D9BB4DBA3209294C93976221249E4']
ZEROS128 =      ['00000000000000000000000000000000']
 
def aes_decrypt_cbc(key, iv, input):
    return AES.new(key, AES.MODE_CBC, iv).decrypt(input)
   
def aes_encrypt_cbc(key, iv, input):
    return AES.new(key, AES.MODE_CBC, iv).encrypt(input)
 
def emc_decrypt_header(hdr):
    return hdr[:0x30] + aes_decrypt_cbc(uhx(CIPHERKEYSEMC[0]), uhx(ZEROS128[0]), hdr[0x30:0x80])
   
def emc_encrypt_header(hdr):
    return hdr[:0x30] + aes_encrypt_cbc(uhx(CIPHERKEYSEMC[0]), uhx(ZEROS128[0]), hdr[0x30:0x80])
   
def eap_decrypt_header(hdr):
    return hdr[:0x30] + aes_decrypt_cbc(uhx(CIPHERKEYSEAP[0]), uhx(ZEROS128[0]), hdr[0x30:0x80])
   
def eap_encrypt_header(hdr):
    return hdr[:0x30] + aes_encrypt_cbc(uhx(CIPHERKEYSEAP[0]), uhx(ZEROS128[0]), hdr[0x30:0x80])
 
def main(argc, argv):
        with open(sys.argv[1], 'rb') as f:
            data = f.read(0x80)
            type = data[7:8]
            if type == uhx('48'):
                print 'EMC'
                hdr = emc_decrypt_header(data)
                body_aes_key  = hdr[0x30:0x40]
                body_hmac_key = hdr[0x40:0x50]
                body_hmac = hdr[0x50:0x64]
                zeroes = hdr[0x64:0x6C]
                print(hx(zeroes))
                header_hmac = hdr[0x6C:0x80]
                body_len = struct.unpack('<L', hdr[0xc:0x10])[0]
                print body_len
                ehdr = hdr[:0x6C]
                ebody = f.read(body_len)
                bhmac = HMAC.new(body_hmac_key, ebody, SHA)
                hhmac = HMAC.new(uhx(HASHERKEYEMC[0]), ehdr, SHA)
                body = aes_decrypt_cbc(body_aes_key, uhx(ZEROS128[0]), ebody)
                print bhmac.hexdigest()
                print hhmac.hexdigest()
                print hx(body_hmac)
                print hx(header_hmac)
                with open(sys.argv[1] + '.bin', 'wb') as g:
                    g.write(hdr+body)
            if type == uhx('68'):
                print 'EAP'
                hdr = eap_decrypt_header(data)
                body_aes_key  = hdr[0x30:0x40]
                body_hmac_key = hdr[0x40:0x50]
                body_hmac = hdr[0x50:0x64]
                zeroes = hdr[0x64:0x6C]
                print(hx(zeroes))
                header_hmac = hdr[0x6C:0x80]
                body_len = struct.unpack('<L', hdr[0xc:0x10])[0]
                print body_len
                ehdr = hdr[:0x6C]
                ebody = f.read(body_len)
                bhmac = HMAC.new(body_hmac_key, ebody, SHA)
                hhmac = HMAC.new(uhx(HASHERKEYEAP[0]), ehdr, SHA)
                body = aes_decrypt_cbc(body_aes_key, uhx(ZEROS128[0]), ebody)
                print bhmac.hexdigest()
                print hhmac.hexdigest()
                print hx(body_hmac)
                print hx(header_hmac)
                with open(sys.argv[1] + '.bin', 'wb') as g:
                    g.write(hdr+body)
           
           
 
if __name__ == '__main__':
    main(len(sys.argv), sys.argv)
</pre>
 
= EAP/EMC Aeolia Script for encrypting (with header necessary) =
 
<pre>
import struct
from binascii import unhexlify as uhx
from binascii import hexlify as hx
from Crypto.Cipher import AES
from Crypto.Hash import SHA, HMAC
 
import os
import sys
 
CIPHERKEYSEMC = ['5F74FE7790127FECF82CC6E6D91FA2D1'] # FULL
CIPHERKEYSEAP = ['581A75D7E9C01F3C1BD7473DBD443B98']
HASHERKEYEMC  = ['73FE06F3906B05ECB506DFB8691F9F54']
HASHERKEYEAP  = ['824D9BB4DBA3209294C93976221249E4']
ZEROS128 =      ['00000000000000000000000000000000']
 
def aes_decrypt_cbc(key, iv, input):
    return AES.new(key, AES.MODE_CBC, iv).decrypt(input)
   
def aes_encrypt_cbc(key, iv, input):
    return AES.new(key, AES.MODE_CBC, iv).encrypt(input)
 
def emc_decrypt_header(hdr):
    return hdr[:0x30] + aes_decrypt_cbc(uhx(CIPHERKEYSEMC[0]), uhx(ZEROS128[0]), hdr[0x30:0x80])
   
def emc_encrypt_header(hdr):
    return hdr[:0x30] + aes_encrypt_cbc(uhx(CIPHERKEYSEMC[0]), uhx(ZEROS128[0]), hdr[0x30:])
   
def eap_decrypt_header(hdr):
    return hdr[:0x30] + aes_decrypt_cbc(uhx(CIPHERKEYSEAP[0]), uhx(ZEROS128[0]), hdr[0x30:0x80])
   
def eap_encrypt_header(hdr):
    return hdr[:0x30] + aes_encrypt_cbc(uhx(CIPHERKEYSEAP[0]), uhx(ZEROS128[0]), hdr[0x30:0x80])
 
def main(argc, argv):
        with open(sys.argv[1], 'rb') as f:
            data = f.read()
            type = data[7:8]
            if type == uhx('48'):
                print 'EMC'
               
                body_len = struct.unpack('<L', data[0xc:0x10])[0]
                body = data[0x80:0x80+body_len]
                body_aes_key  = data[0x30:0x40]
                ebody = aes_encrypt_cbc(body_aes_key, uhx(ZEROS128[0]), body)
                body_hmac_key = data[0x40:0x50]
                bhmac = HMAC.new(body_hmac_key, ebody, SHA)
                hdr = (data[0:0x50] + uhx(bhmac.hexdigest()) + data[0x64:0x6C])
                hhmac = HMAC.new(uhx(HASHERKEYEMC[0]), hdr, SHA)
                hdr = (hdr + uhx(hhmac.hexdigest()))
                hdr = emc_encrypt_header(hdr)
                print bhmac.hexdigest()
                print hhmac.hexdigest()
                with open(sys.argv[1] + '.bin', 'wb') as g:
                    g.write(hdr+ebody)
            if type == uhx('68'):
                print 'EAP'
                body_len = struct.unpack('<L', data[0xc:0x10])[0]
                body = data[0x80:0x80+body_len]
                body_aes_key  = data[0x30:0x40]
                ebody = aes_encrypt_cbc(body_aes_key, uhx(ZEROS128[0]), body)
                body_hmac_key = data[0x40:0x50]
                bhmac = HMAC.new(body_hmac_key, ebody, SHA)
                hdr = (data[0:0x50] + uhx(bhmac.hexdigest()) + data[0x64:0x6C])
                hhmac = HMAC.new(uhx(HASHERKEYEAP[0]), hdr, SHA)
                hdr = (hdr + uhx(hhmac.hexdigest()))
                hdr = eap_encrypt_header(hdr)
                print bhmac.hexdigest()
                print hhmac.hexdigest()
                with open(sys.argv[1] + '.bin', 'wb') as g:
                    g.write(hdr+ebody)
           
           
 
if __name__ == '__main__':
    main(len(sys.argv), sys.argv)
</pre>
 
= System modules keysets changes =
 
<pre>
1.00 to 3.70 are 0
4.00 to 4.07 are 1
4.50 to 4.74 are 2
5.00 to 5.07 are 3
5.50 to 5.56 are 4
6.00 to 6.20 are 5
6.50 to 6.72 are 6
7.00 to 7.02 are 7
7.50 to 7.55 are 8
8.00 to 8.03 are 9
8.50 to 8.52 are 0xA
9.00 to 9.04 are 0xB
9.50 to 9.60 are 0xC
10.00 to 10.01 are 0xD
10.50 to 10.70 are 0xE
11.00 to 11.02 are 0xF
11.50 to 11.XX are 0 (counter at 0xA at 1 instead of 0)
</pre>
 
* Final slot (0xF) has been depleted so in theory SIE will not be able to update keys again.
 
= Southbridge firmware keysets changes =
 
<pre>
<pre>
1 is obsolete
3.70->4.00 0->1 (all from 1.00 to 3.70 are 0)
13 is 0x10000
4.07->4.50 1->2 (all from 4.00 to 4.07 are 1)
32/40 is 0x20000
4.74->5.00 2->3 (all from 4.50 to 4.74 are 2)
36 is 0x30000
5.05->5.50 3->4 (all from 5.00 to 5.05 are 3)
42 is 0x40000
</pre>
</pre>


= Order of keys in ShellCore =
= order of keys in shellcore =


P->Q->DQ->QP
P->Q->DQ->QP
Line 234: Line 37:
* <s>42 42 AA FD 7A 05 B4 5C F3 5E 08 22 D4 55 97 45</s> (ShellCore, QP, 0x80)
* <s>42 42 AA FD 7A 05 B4 5C F3 5E 08 22 D4 55 97 45</s> (ShellCore, QP, 0x80)


= Database rebuild trigger magic =
= Database reconstruction magic =


<pre>
<pre>
Line 242: Line 45:
= Portable Keys Dumps =
= Portable Keys Dumps =


* Static always.
* Static Always


== sealedkey_key_E ==
== sealedkey_key_E ==
Line 263: Line 66:
</pre>
</pre>


== sealedkey_key_sign_E ==
== sealedkey_key_sign_E ==


<pre>
<pre>
Line 291: Line 94:


== crepo_iv ==
== crepo_iv ==
Used for Crash Report.


<pre>
<pre>
Line 299: Line 100:


== crepo_key_1_sign_E ==
== crepo_key_1_sign_E ==
Used for Crash Report.


<pre>
<pre>
Line 307: Line 106:
</pre>
</pre>


== crepo_key_2_sign_E ==
== crepo_key_2_sign_E ==
 
Used for Crash Report.


<pre>
<pre>
Line 316: Line 113:
</pre>
</pre>


== crepo_key_1_sign_I ==
== crepo_key_1_sign_I   ==
 
Used for Crash Report.


<pre>
<pre>
Line 325: Line 120:
</pre>
</pre>


== crepo_key_2_sign_I ==
== crepo_key_2_sign_I   ==
 
Used for Crash Report.


<pre>
<pre>
Line 335: Line 128:


== crepo_key_1_E ==
== crepo_key_1_E ==
Used for Crash Report.
<pre>
<pre>
24 3F 86 77 5F 7C DA 8F 9A D4 8A 72 69 9C BC 1E  
24 3F 86 77 5F 7C DA 8F 9A D4 8A 72 69 9C BC 1E  
Line 349: Line 139:
</pre>
</pre>


== crepo_key_2_E ==
== crepo_key_2_E ==
 
Used for Crash Report.


<pre>
<pre>
Line 364: Line 152:
</pre>
</pre>


== crepo_key_1_I ==
== crepo_key_1_I   ==
 
Used for Crash Report.
 
<pre>
<pre>
8B 5B 04 14 D6 26 36 F6 86 37 DD 3A E2 8B EC FA  
8B 5B 04 14 D6 26 36 F6 86 37 DD 3A E2 8B EC FA  
Line 380: Line 165:


== rootparam_key_IV ==
== rootparam_key_IV ==
<pre>
<pre>
95 69 82 9C D4 B1 5F F8 43 30 54 5A 34 EC 1B C5
95 69 82 9C D4 B1 5F F8 43 30 54 5A 34 EC 1B C5
Line 428: Line 212:


== rootparam_key_0_I ==
== rootparam_key_0_I ==
<pre>
<pre>
F6 9F B6 9A 77 1F C2 D5 12 F7 25 2F A5 86 FB 22  
F6 9F B6 9A 77 1F C2 D5 12 F7 25 2F A5 86 FB 22  
Line 440: Line 223:
</pre>
</pre>


== rootparam_key_1_I ==
== rootparam_key_1_I ==
 
 


<pre>
<pre>
Line 453: Line 238:
</pre>
</pre>


== rootparam_key_2_I ==
== rootparam_key_2_I ==
 
 


<pre>
<pre>
Line 466: Line 253:
</pre>
</pre>


== rootparam_key_3_I ==
== rootparam_key_3_I ==
 


<pre>
<pre>
Line 478: Line 266:
18 83 AB 46 60 2F 27 D2 6B 86 65 0C CA C7 89 C1  
18 83 AB 46 60 2F 27 D2 6B 86 65 0C CA C7 89 C1  
</pre>
</pre>


== rootparam_key_4_I ==
== rootparam_key_4_I ==


<pre>
<pre>
Line 491: Line 281:
D6 7E A4 70 53 25 BE 42 D3 19 4A 8D B0 8A AC EF  
D6 7E A4 70 53 25 BE 42 D3 19 4A 8D B0 8A AC EF  
</pre>
</pre>


== rootparam_key_5_I ==
== rootparam_key_5_I ==
Line 518: Line 309:
E6 99 81 1C A7 25 73 C0 00 EA 1C A9 D6 B6 12 3A  
E6 99 81 1C A7 25 73 C0 00 EA 1C A9 D6 B6 12 3A  
</pre>
</pre>
== rootparam_key_2_sign_E ==
== rootparam_key_2_sign_E ==


Line 525: Line 315:
4C 60 CC 78 F7 F4 D5 45 82 9B 2E 79 62 D2 D1 CD  
4C 60 CC 78 F7 F4 D5 45 82 9B 2E 79 62 D2 D1 CD  
</pre>
</pre>
== rootparam_key_3_sign_E ==
== rootparam_key_3_sign_E ==


Line 532: Line 321:
4C 60 CC 78 F7 F4 D5 45 82 9B 2E 79 62 D2 D1 CD  
4C 60 CC 78 F7 F4 D5 45 82 9B 2E 79 62 D2 D1 CD  
</pre>
</pre>
== rootparam_key_4_sign_E ==
== rootparam_key_4_sign_E ==


Line 539: Line 327:
3D C7 51 95 7B A1 CB 80 A5 EC 47 81 43 A9 61 4E  
3D C7 51 95 7B A1 CB 80 A5 EC 47 81 43 A9 61 4E  
</pre>
</pre>
== rootparam_key_5_sign_E ==
== rootparam_key_5_sign_E ==


Line 626: Line 413:


== sealedkey_key_E (pfsSKKey__SecKey) ==
== sealedkey_key_E (pfsSKKey__SecKey) ==
Used for PFS encryption.


<pre>
<pre>
Line 639: Line 424:


* flag is 0
* flag is 0
* identical to I


== SCE_EAP_HDD__KEY (External) ==
== SCE_EAP_HDD__KEY (External) ==
Used for HDD encryption.


<pre>
<pre>
Line 657: Line 439:
</pre>
</pre>


* flag is 0x20
* flag is 32


== crepo_key_1_E (CFK1) ==
== crepo_key_1_E (CFK1) ==
Used for Crash Report.


<pre>
<pre>
Line 675: Line 455:
</pre>
</pre>


* flag is 0xC
* flag is 12
 
== crepo_key_1_I (CFK1) ==
 
Used for Crash Report.
 
<pre>
43 46 4B 31 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
77 B7 5A 04 C9 69 D3 FE BC 11 38 EE 2F B1 31 CC
71 E6 66 F7 D3 78 E4 F4 CD AB 35 D7 DE C4 A3 26
3B 2A 68 2C 43 06 15 CE 04 77 3D 4B A5 BC F8 7E
CF 9B CF 77 B4 8B A7 78 DE BD 09 75 BB 5B B1 27
44 A1 E3 CC EC 71 4F 10 09 48 CC 23 55 41 3C CE
11 34 1A 57 F2 34 69 F9 62 6B 2E 71 AD 17 B2 2C
</pre>


== crepo_key_2_E (CFK1) ==
== crepo_key_2_E (CFK1) ==
Used for Crash Report.


<pre>
<pre>
Line 706: Line 469:
</pre>
</pre>


* flag is 0xC
* flag is 12


== rootparam_key_0_E (SCEROOTPARAM_KEY) ==
== rootparam_key_0_E (SCEROOTPARAM_KEY) ==
Line 722: Line 485:
</pre>
</pre>


* flag is 0x14
* flag is 20
 
== rootparam_key_0_I (SCEROOTPARAM_KEY) ==
 
<pre>
53 43 45 52 4F 4F 54 50 41 52 41 4D 5F 4B 45 59
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
CA 5C 5D 73 F7 57 0D 77 E9 00 AB 72 C0 5A C3 C4
B4 9C 45 CB CD 90 29 61 58 EC 47 1F 5F 26 72 52
29 ED 9C 0A F8 D3 97 00 29 85 A9 DF D0 F2 47 21
03 EA A7 1E B1 10 C0 03 99 B1 1D EC B2 E5 DF 08
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
</pre>


== rootparam_key_4_E  (SCEROOTPARAM_KEY) ==
== rootparam_key_4_E  (SCEROOTPARAM_KEY) ==
Line 751: Line 501:
</pre>
</pre>


* flag is 0x14
* flag is 20


== rootparam_key_5_E (SCEROOTPARAM_KEY) ==
== rootparam_key_5_E (SCEROOTPARAM_KEY) ==


<pre>
<pre>
Line 767: Line 517:
</pre>
</pre>


* flag is 0x14
* flag is 20


== SCE_LwUtoken_Key (External) ==
== SCE_LwUtoken_Key (External) ==
Used for "low" user tokens.


<pre>
<pre>
Line 784: Line 532:
</pre>
</pre>


* flag is 0x24
* flag is 36


== SCE_LwUtoken_Key (External-Extra1) ==
== SCE_LwUtoken_Key (External-Extra1) ==
Used for "low" user tokens.


<pre>
<pre>
Line 802: Line 548:
</pre>
</pre>


* flag is 0x24
* flag is 36


== SCE_LwUtoken_Key (External-Extra2) ==  
== SCE_LwUtoken_Key (External-Extra2) ==  
Used for "low" user tokens.


<pre>
<pre>
Line 820: Line 564:
</pre>
</pre>


* flag is 0x24
* flag is 36


== IPMI (E) ==
== IPMI (E) ==
Used for Inter-Process Method Invocation.


<pre>
<pre>
Line 837: Line 579:
</pre>
</pre>


* flag is 0x50
* flag is 80


== SCE_SBL_BAR_KEY1 (E) ==
== SCE_SBL_BAR_KEY1 (E) ==
Used for Secure Block Backup And Restore feature.
<pre>
<pre>
ffffff80869df8e0  53 43 45 5f 53 42 4c 5f  42 41 52 5f 4b 45 59 31  |SCE_SBL_BAR_KEY1|
ffffff80869df8e0  53 43 45 5f 53 42 4c 5f  42 41 52 5f 4b 45 59 31  |SCE_SBL_BAR_KEY1|
Line 854: Line 593:
</pre>
</pre>


* flag is 0x28
* flag is 40


== SCE_KDF_NCDT_PSK(E) ==  
== SCE_KDF_NCDT_PSK(E) ==  
Line 868: Line 607:
</pre>
</pre>


* flag is 0x4C
* flag is 76


== Unknown key 0x54 ==
== Other Keys ==


<pre>
<pre>
91 0B 7C A6 6B 4B F9 DA 00 72 F1 67 6C 51 99 70
-------HEX DUMP------
C1 4D B2 26 6A 59 29 C2 5E 1A 72 5D D8 19 05 BF
ffffff80869df8e0  96 1e 5e 85 b5 3e 77 64  43 e5 f4 45 85 e8 90 0a  |..^..>wdC..E....|
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
ffffff80869df8f0  52 5e 06 2a 4c 79 64 69  0f 75 2f 28 71 9c 6b a1  |R^.*Lydi.u/(q.k.|
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
ffffff80869df900  a8 c2 a0 0d 84 31 e7 17  dd ef 6d 80 f6 5c ae 32  |.....1....m..\.2|
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
ffffff80869df910  42 1f cb e5 e7 a4 f9 1f  79 2b 25 c7 a1 0c 9e 5a  |B.......y+%....Z|
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
ffffff80869df920  7b 07 82 9f f3 7c 3f b4  66 2f cb f8 e4 0a 63 f2  |{....|?.f/....c.|
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
ffffff80869df930  99 ee b8 6f 06 d5 58 cd  6e 8e 6a f7 5e 48 3a 24  |...o..X.n.j.^H:$|
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
ffffff80869df940  cc 73 ea e7 73 2f 44 2f  8b e5 28 fb 19 60 62 50  |.s..s/D/..(..`bP|
ffffff80869df950  f4 a9 9c a5 9e fc 63 2c  2d cc 67 73 2b 8b 5a de  |......c,-.gs+.Z.|
</pre>
</pre>


* flag 0x54
* flag is 68
 
== hidAuthThreadMain ==


<pre>
<pre>
ED E7 41 CC 7F D6 0E 1F 2D B0 89 16 1F C0 EB 66
-------HEX DUMP------
7C A4 DA 59 40 CE 19 54 00 90 1D BF 59 25 EE 4F
ffffff80869df8e0  ed e7 41 cc 7f d6 0e 1f  2d b0 89 16 1f c0 eb 66 |..A.....-......f|
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
ffffff80869df8f0  7c a4 da 59 40 ce 19 54 00 90 1d bf 59 25 ee 4f  ||[email protected]%.O|
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
ffffff80869df900  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
ffffff80869df910  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
ffffff80869df920  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
ffffff80869df930  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
ffffff80869df940  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
ffffff80869df950  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
</pre>
</pre>


* hidAuthThreadMain
* flag is 72
* flag 0x48


== livedump ==
= Portable Keys Dumps (Shellcore) =


<pre>
== SCE_CFS_hostname (E) ==
96 1E 5E 85 B5 3E 77 64 43 E5 F4 45 85 E8 90 0A
52 5E 06 2A 4C 79 64 69 0F 75 2F 28 71 9C 6B A1
A8 C2 A0 0D 84 31 E7 17 DD EF 6D 80 F6 5C AE 32
42 1F CB E5 E7 A4 F9 1F 79 2B 25 C7 A1 0C 9E 5A
7B 07 82 9F F3 7C 3F B4 66 2F CB F8 E4 0A 63 F2
99 EE B8 6F 06 D5 58 CD 6E 8E 6A F7 5E 48 3A 24
CC 73 EA E7 73 2F 44 2F 8B E5 28 FB 19 60 62 50
F4 A9 9C A5 9E FC 63 2C 2D CC 67 73 2B 8B 5A DE
</pre>
 
* livedump
* flag 0x44
 
== pfs_sbl_key ==


<pre>
<pre>
2B CF 69 8E 79 CF DD FA C2 4D 4C 25 BF 35 1E 62
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
</pre>
* pfs_sbl_key
* flag 0x58
== SCECloudSD___KEY ==


Used for Cloud Save Data features. Similar to the Cloud Data Key Ring used in PS Vita since System Software version 3.100.081.
<pre>
53 43 45 43 6C 6F 75 64 53 44 5F 5F 5F 4B 45 59
01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00
61 6F AD DF 22 04 AC 7A 24 06 4C CE D8 CD 88 A0
DE 07 F0 15 43 45 32 7D BE 4D 49 E1 CA 87 5D 98
5E F0 E4 AB 2A CE 26 69 00 96 D9 48 D4 C0 1B 36
8B B0 B2 1D 45 72 7D 70 91 26 F4 A1 10 77 0C F9
7A 0A F1 17 81 97 33 CC 71 05 73 92 4F D2 5C 1B
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
</pre>
<pre>
5F 15 6F 65 CF DA 91 51 83 7C E3 06 D3 39 75 71
08 3C 5B 08 10 5A 9C 6D 79 F0 64 29 DF D1 6D 33
4A 75 88 66 9B 61 54 B4 2F A6 C2 29 55 6E AD 76
34 4B B4 B8 F6 03 83 4D F4 B4 92 5A C8 F9 39 8E
31 60 25 1A 88 51 53 F7 A4 D9 5E 4C FF D0 3D 4B
95 A7 6F E8 DD BF 92 B2 D4 1C 0B 0E 28 29 B3 40
B0 AD 2F 35 8A 19 D9 C1 2D AA 81 C3 23 16 3A 17
15 0D 4C 33 3A 62 49 A7 51 A3 3C 4E 78 01 50 F8
B1 24 25 11 6E C0 95 15 9E FA 11 B6 48 BD 96 70
AE 87 C9 99 DA 38 2E F1 B7 D6 41 81 09 98 A1 FF
27 69 85 D1 68 1C BE 72 2A F2 38 7F 65 AD 66 95
8B 72 A5 C8 73 34 3E A8 35 E2 82 74 2A 94 67 40
30 DF 3B 19 6C 5D CC D9 AD 44 7E 6C 22 76 ED 0A
64 E8 A1 46 A0 BE B7 D9 CA 6F CB 4F 54 92 2F 0F
41 90 1F 95 62 AF 0B 0E 18 63 06 C0 EA 22 8C 2E
3C 7E E9 79 73 A0 09 0C 36 D2 09 8D 75 DE 88 C7
EB 3E E3 B6 66 0F DD 75 99 CE 39 76 59 07 15 60
86 92 96 C5 B3 CB 06 B1 C2 E9 E9 C5 8B 13 35 5E
76 34 61 BA A2 4F F2 DB 99 CC BC DC 3C 13 2C A3
13 56 55 A7 0A FD 88 43 11 95 0A 0D 6D A4 7F 74
F3 2C 67 BC F4 E9 6F 1E 4D 69 5C CC 2E 1C 57 A8
CE 97 0B 4B D9 6A 5A 81 42 3F 6E 5C 7B A5 4A 78
AE 95 97 26 2A FF 9E 00 4F B4 F0 BB 40 72 1C 1F
8F 4B F7 AB FD D3 8C DC 14 FE 92 DD 16 51 A1 2F
01 AB 69 DF 87 71 AE BF E7 97 CD 88 18 F1 98 BF
A9 D3 3B 1A 95 C5 F1 37 65 17 DB FE C4 4D 0C 3B
26 27 73 61 F9 60 36 BE 90 36 A5 73 0F A5 98 EB
AE BD 9E 84 35 BD B4 CD A8 59 15 4C 25 CA DE 33
FA 53 D9 5C 9B 26 CD 1A BA CC 80 8F A5 0F 1A 6A
1D 2D A3 0D 52 56 89 FF BC 63 AE 7A 0B D4 F6 24
8F 3D BF F8 BD DB DB 9A 2A 52 85 EB AB D4 BA 08
37 39 EE EE 4A D2 ED D3 52 A5 BA 39 50 1B BA A3
F7 1B 39 B8 5D 55 7D 5E B7 6F 22 F9 82 95 0E 45
1B CC 18 CD B9 FB 14 25 5A 22 FC BA 98 1D 50 C6
20 1C 15 47 C7 1D 1D 55 CC A2 94 8D CF 4E A9 8E
4D F8 2F 96 D6 C3 AB B9 46 A4 0C 1A FD E5 01 B9
8F 07 DE DA BC 20 FF 0D BD CC CE FD 77 E2 28 62
25 56 1A F3 D1 92 DD F7 72 43 64 9C D4 38 7A C6
FA C3 60 45 61 B2 EA 3B C5 90 AC 0F 20 0F 26 73
14 03 A8 2D 00 48 35 2D 45 8A 86 7B 6B 28 69 02
</pre>
* Cloud Key
* flag 0x1C
= Portable Keys Dumps (ShellCore) =
== SCE_CFS_hostname (E) ==
Host by Amazon AWS at Portland, Oregon, 97086 United States of America. Alias of cfss.crs.playstation.net.
Zeke Jedediah Dunbar is a main character of the Infamous videogame developped by Sony Computer Entertainment America.
<pre>
-------HEX DUMP------
-------HEX DUMP------
ffffff8085f7f8e0  53 43 45 5f 43 46 53 5f  68 6f 73 74 6e 61 6d 65  |SCE_CFS_hostname|
ffffff8085f7f8e0  53 43 45 5f 43 46 53 5f  68 6f 73 74 6e 61 6d 65  |SCE_CFS_hostname|
Line 1,018: Line 656:
</pre>
</pre>


* flag 0xD
* flag 13


== SCE_RCR_hostname (E) ==  
== SCE_RCR_hostname(E) ==  
 
Host by Amazon AWS at Portland, Oregon, 97086 United States of America. Owned by Minato-ku for Sony Computer Entertainment Inc. Network Platform Service Department at Tokyo (Japan).
 
Zeke Jedediah Dunbar is a main character of the Infamous videogame developped by Sony Computer Entertainment America.


<pre>
<pre>
Line 1,038: Line 672:
</pre>
</pre>


* flag 0xD
* flag 13


== SCE_CDN_hostname (E) ==
== SCE_CDN_hostname (E) ==
Used for Crash Report.


<pre>
<pre>
Line 1,056: Line 688:
</pre>
</pre>


* flag 0xD


== SCE_SYS_TLM_SECK (E) ==
* flag 13


Used in GetOpenPsIdHash.
== SCE_SYS_TLM_SECK(E) ==


<pre>
<pre>
Line 1,073: Line 704:
ffffff8086183950  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8086183950  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
</pre>
</pre>
* flag 0x3C
== Other Keys ==
<pre>
-------HEX DUMP------
ffffff807b92b8e0  15 a0 cb 65 d6 a4 05 27  e6 1c cd da 2a ef 53 3b  |...e...'....*.S;|
ffffff807b92b8f0  13 fc 7c 35 24 14 b3 54  3d c7 83 24 6e fc c9 64  |..|5$..T=..$n..d|
ffffff807b92b900  9d f8 40 9a c2 02 09 82  3c 08 61 2b e6 2a 51 79  |..@.....<.a+.*Qy|
ffffff807b92b910  cf 87 62 61 c0 85 46 c2  a5 da a1 9b d0 e7 ff 79  |..ba..F........y|
ffffff807b92b920  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff807b92b930  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff807b92b940  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff807b92b950  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
</pre>
* flag 0xA
<pre>
C6 8A 9B 40 49 35 77 E7 54 3A 2D 95 59 9F 7E 96
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
</pre>
* beta_update_key_E | flag = 0x40
<pre>
56 6B DD 67 C3 B6 B5 04 EF 1A 39 C0 CC AC 4B E2
</pre>
* same as Internal
* timezone_key_E | flag = 0x40
<pre>
8C 81 17 54 AB E7 2C 8A 1B 4D DC A2 32 B8 CC 2A
</pre>
* system_log_config_key_E | flag = 0x40
<pre>
8A 7A 15 CE 5D 21 62 19 7C FA 83 B1 DC 77 3C C7
</pre>
* system_log_unknown_key_E | flag = 0x40
<pre>
DA AF 3B 06 99 F7 6E 04 8F 3C 27 BF 0B E8 95 1C
</pre>
* bgdc_key_E | flag = 0x40
<pre>
67 EE DA F2 67 E0 43 BE B5 AD 5C 7A 6F 54 C5 37
</pre>
* wctl_key_E | flag = 0x40
<pre>
5A 1F 16 C3 47 F8 24 6B F6 D7 8B E3 C4 D6 F2 D1
</pre>
* morpheus_updatelist_key_E | flag = 0x40
<pre>
49 B6 1A 0B 8F 33 BC 28 6F 85 6D A8 CB 04 B8 B4
</pre>
* entitlementmgr_key_E | flag = 0x40
<pre>
66 01 69 2E 46 1B BD CC 85 6E A8 DC CE 06 3C F1
</pre>
* netev_key_E | flag = 0x40
<pre>
9B 12 DA 7C 22 44 3B CD 2B BC F6 C0 18 5E 77 70
</pre>
* patch_key_E | flag = 0x40
<pre>
F1 1B 19 25 D9 3C E7 70 86 F4 9C CC 50 96 45 56
</pre>
* bgft_key_E | flag = 0x40
<pre>
CE A4 74 20 1F 0C A2 36 8D D8 37 BF A1 B4 BD 78
</pre>
* system_log_privacy_key_E | flag = 0x40
Please note that all contributions to PS4 Developer wiki are considered to be released under the GNU Free Documentation License 1.2 (see PS4 Developer wiki:Copyrights for details). If you do not want your writing to be edited mercilessly and redistributed at will, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource. Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following hCaptcha:

Cancel Editing help (opens in new window)