Editing Talk:Keys

Jump to navigation Jump to search
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 1: Line 1:
= EAP/EMC Aeolia Script for decrypting and keeping header =
= system modules keysets changes =
 
<pre>
import struct
from binascii import unhexlify as uhx
from binascii import hexlify as hx
from Crypto.Cipher import AES
from Crypto.Hash import SHA, HMAC
 
import os
import sys
 
CIPHERKEYSEMC = ['5F74FE7790127FECF82CC6E6D91FA2D1'] # FULL
CIPHERKEYSEAP = ['581A75D7E9C01F3C1BD7473DBD443B98']
HASHERKEYEMC  = ['73FE06F3906B05ECB506DFB8691F9F54']
HASHERKEYEAP  = ['824D9BB4DBA3209294C93976221249E4']
ZEROS128 =      ['00000000000000000000000000000000']
 
def aes_decrypt_cbc(key, iv, input):
    return AES.new(key, AES.MODE_CBC, iv).decrypt(input)
   
def aes_encrypt_cbc(key, iv, input):
    return AES.new(key, AES.MODE_CBC, iv).encrypt(input)
 
def emc_decrypt_header(hdr):
    return hdr[:0x30] + aes_decrypt_cbc(uhx(CIPHERKEYSEMC[0]), uhx(ZEROS128[0]), hdr[0x30:0x80])
   
def emc_encrypt_header(hdr):
    return hdr[:0x30] + aes_encrypt_cbc(uhx(CIPHERKEYSEMC[0]), uhx(ZEROS128[0]), hdr[0x30:0x80])
   
def eap_decrypt_header(hdr):
    return hdr[:0x30] + aes_decrypt_cbc(uhx(CIPHERKEYSEAP[0]), uhx(ZEROS128[0]), hdr[0x30:0x80])
   
def eap_encrypt_header(hdr):
    return hdr[:0x30] + aes_encrypt_cbc(uhx(CIPHERKEYSEAP[0]), uhx(ZEROS128[0]), hdr[0x30:0x80])
 
def main(argc, argv):
        with open(sys.argv[1], 'rb') as f:
            data = f.read(0x80)
            type = data[7:8]
            if type == uhx('48'):
                print 'EMC'
                hdr = emc_decrypt_header(data)
                body_aes_key  = hdr[0x30:0x40]
                body_hmac_key = hdr[0x40:0x50]
                body_hmac = hdr[0x50:0x64]
                zeroes = hdr[0x64:0x6C]
                print(hx(zeroes))
                header_hmac = hdr[0x6C:0x80]
                body_len = struct.unpack('<L', hdr[0xc:0x10])[0]
                print body_len
                ehdr = hdr[:0x6C]
                ebody = f.read(body_len)
                bhmac = HMAC.new(body_hmac_key, ebody, SHA)
                hhmac = HMAC.new(uhx(HASHERKEYEMC[0]), ehdr, SHA)
                body = aes_decrypt_cbc(body_aes_key, uhx(ZEROS128[0]), ebody)
                print bhmac.hexdigest()
                print hhmac.hexdigest()
                print hx(body_hmac)
                print hx(header_hmac)
                with open(sys.argv[1] + '.bin', 'wb') as g:
                    g.write(hdr+body)
            if type == uhx('68'):
                print 'EAP'
                hdr = eap_decrypt_header(data)
                body_aes_key  = hdr[0x30:0x40]
                body_hmac_key = hdr[0x40:0x50]
                body_hmac = hdr[0x50:0x64]
                zeroes = hdr[0x64:0x6C]
                print(hx(zeroes))
                header_hmac = hdr[0x6C:0x80]
                body_len = struct.unpack('<L', hdr[0xc:0x10])[0]
                print body_len
                ehdr = hdr[:0x6C]
                ebody = f.read(body_len)
                bhmac = HMAC.new(body_hmac_key, ebody, SHA)
                hhmac = HMAC.new(uhx(HASHERKEYEAP[0]), ehdr, SHA)
                body = aes_decrypt_cbc(body_aes_key, uhx(ZEROS128[0]), ebody)
                print bhmac.hexdigest()
                print hhmac.hexdigest()
                print hx(body_hmac)
                print hx(header_hmac)
                with open(sys.argv[1] + '.bin', 'wb') as g:
                    g.write(hdr+body)
           
           
 
if __name__ == '__main__':
    main(len(sys.argv), sys.argv)
</pre>
 
= EAP/EMC Aeolia Script for encrypting (with header necessary) =
 
<pre>
import struct
from binascii import unhexlify as uhx
from binascii import hexlify as hx
from Crypto.Cipher import AES
from Crypto.Hash import SHA, HMAC
 
import os
import sys
 
CIPHERKEYSEMC = ['5F74FE7790127FECF82CC6E6D91FA2D1'] # FULL
CIPHERKEYSEAP = ['581A75D7E9C01F3C1BD7473DBD443B98']
HASHERKEYEMC  = ['73FE06F3906B05ECB506DFB8691F9F54']
HASHERKEYEAP  = ['824D9BB4DBA3209294C93976221249E4']
ZEROS128 =      ['00000000000000000000000000000000']
 
def aes_decrypt_cbc(key, iv, input):
    return AES.new(key, AES.MODE_CBC, iv).decrypt(input)
   
def aes_encrypt_cbc(key, iv, input):
    return AES.new(key, AES.MODE_CBC, iv).encrypt(input)
 
def emc_decrypt_header(hdr):
    return hdr[:0x30] + aes_decrypt_cbc(uhx(CIPHERKEYSEMC[0]), uhx(ZEROS128[0]), hdr[0x30:0x80])
   
def emc_encrypt_header(hdr):
    return hdr[:0x30] + aes_encrypt_cbc(uhx(CIPHERKEYSEMC[0]), uhx(ZEROS128[0]), hdr[0x30:])
   
def eap_decrypt_header(hdr):
    return hdr[:0x30] + aes_decrypt_cbc(uhx(CIPHERKEYSEAP[0]), uhx(ZEROS128[0]), hdr[0x30:0x80])
   
def eap_encrypt_header(hdr):
    return hdr[:0x30] + aes_encrypt_cbc(uhx(CIPHERKEYSEAP[0]), uhx(ZEROS128[0]), hdr[0x30:0x80])
 
def main(argc, argv):
        with open(sys.argv[1], 'rb') as f:
            data = f.read()
            type = data[7:8]
            if type == uhx('48'):
                print 'EMC'
               
                body_len = struct.unpack('<L', data[0xc:0x10])[0]
                body = data[0x80:0x80+body_len]
                body_aes_key  = data[0x30:0x40]
                ebody = aes_encrypt_cbc(body_aes_key, uhx(ZEROS128[0]), body)
                body_hmac_key = data[0x40:0x50]
                bhmac = HMAC.new(body_hmac_key, ebody, SHA)
                hdr = (data[0:0x50] + uhx(bhmac.hexdigest()) + data[0x64:0x6C])
                hhmac = HMAC.new(uhx(HASHERKEYEMC[0]), hdr, SHA)
                hdr = (hdr + uhx(hhmac.hexdigest()))
                hdr = emc_encrypt_header(hdr)
                print bhmac.hexdigest()
                print hhmac.hexdigest()
                with open(sys.argv[1] + '.bin', 'wb') as g:
                    g.write(hdr+ebody)
            if type == uhx('68'):
                print 'EAP'
                body_len = struct.unpack('<L', data[0xc:0x10])[0]
                body = data[0x80:0x80+body_len]
                body_aes_key  = data[0x30:0x40]
                ebody = aes_encrypt_cbc(body_aes_key, uhx(ZEROS128[0]), body)
                body_hmac_key = data[0x40:0x50]
                bhmac = HMAC.new(body_hmac_key, ebody, SHA)
                hdr = (data[0:0x50] + uhx(bhmac.hexdigest()) + data[0x64:0x6C])
                hhmac = HMAC.new(uhx(HASHERKEYEAP[0]), hdr, SHA)
                hdr = (hdr + uhx(hhmac.hexdigest()))
                hdr = eap_encrypt_header(hdr)
                print bhmac.hexdigest()
                print hhmac.hexdigest()
                with open(sys.argv[1] + '.bin', 'wb') as g:
                    g.write(hdr+ebody)
           
           
 
if __name__ == '__main__':
    main(len(sys.argv), sys.argv)
</pre>
 
= System modules keysets changes =
 
<pre>
<pre>
1.00 to 3.70 are 0
1.00 to 3.70 are 0
Line 182: Line 10:
7.00 to 7.02 are 7
7.00 to 7.02 are 7
7.50 to 7.55 are 8
7.50 to 7.55 are 8
8.00 to 8.03 are 9
8.00 to 8.XX are 9
8.50 to 8.52 are 0xA
9.00 to 9.04 are 0xB
9.50 to 9.60 are 0xC
10.00 to 10.01 are 0xD
10.50 to 10.70 are 0xE
11.00 to 11.02 are 0xF
11.50 to 11.XX are 0 (counter at 0xA at 1 instead of 0)
</pre>
</pre>


* Final slot (0xF) has been depleted so in theory SIE will not be able to update keys again.
= southbridge firmware keysets changes =
 
= Southbridge firmware keysets changes =


<pre>
<pre>
Line 204: Line 23:
</pre>
</pre>


= Order of keys in ShellCore =
= order of keys in shellcore =


P->Q->DQ->QP
P->Q->DQ->QP
Line 234: Line 53:
* <s>42 42 AA FD 7A 05 B4 5C F3 5E 08 22 D4 55 97 45</s> (ShellCore, QP, 0x80)
* <s>42 42 AA FD 7A 05 B4 5C F3 5E 08 22 D4 55 97 45</s> (ShellCore, QP, 0x80)


= Database rebuild trigger magic =
= Database reconstruction magic =


<pre>
<pre>
Line 242: Line 61:
= Portable Keys Dumps =
= Portable Keys Dumps =


* Static always.
* Static Always


== sealedkey_key_E ==
== sealedkey_key_E ==
Line 263: Line 82:
</pre>
</pre>


== sealedkey_key_sign_E ==
== sealedkey_key_sign_E ==


<pre>
<pre>
Line 291: Line 110:


== crepo_iv ==
== crepo_iv ==
Used for Crash Report.


<pre>
<pre>
Line 299: Line 116:


== crepo_key_1_sign_E ==
== crepo_key_1_sign_E ==
Used for Crash Report.


<pre>
<pre>
Line 307: Line 122:
</pre>
</pre>


== crepo_key_2_sign_E ==
== crepo_key_2_sign_E ==
 
Used for Crash Report.


<pre>
<pre>
Line 316: Line 129:
</pre>
</pre>


== crepo_key_1_sign_I ==
== crepo_key_1_sign_I   ==
 
Used for Crash Report.


<pre>
<pre>
Line 325: Line 136:
</pre>
</pre>


== crepo_key_2_sign_I ==
== crepo_key_2_sign_I   ==
 
Used for Crash Report.


<pre>
<pre>
Line 335: Line 144:


== crepo_key_1_E ==
== crepo_key_1_E ==
Used for Crash Report.
<pre>
<pre>
24 3F 86 77 5F 7C DA 8F 9A D4 8A 72 69 9C BC 1E  
24 3F 86 77 5F 7C DA 8F 9A D4 8A 72 69 9C BC 1E  
Line 349: Line 155:
</pre>
</pre>


== crepo_key_2_E ==
== crepo_key_2_E ==
 
Used for Crash Report.


<pre>
<pre>
Line 364: Line 168:
</pre>
</pre>


== crepo_key_1_I ==
== crepo_key_1_I   ==
 
Used for Crash Report.
 
<pre>
<pre>
8B 5B 04 14 D6 26 36 F6 86 37 DD 3A E2 8B EC FA  
8B 5B 04 14 D6 26 36 F6 86 37 DD 3A E2 8B EC FA  
Line 380: Line 181:


== rootparam_key_IV ==
== rootparam_key_IV ==
<pre>
<pre>
95 69 82 9C D4 B1 5F F8 43 30 54 5A 34 EC 1B C5
95 69 82 9C D4 B1 5F F8 43 30 54 5A 34 EC 1B C5
Line 428: Line 228:


== rootparam_key_0_I ==
== rootparam_key_0_I ==
<pre>
<pre>
F6 9F B6 9A 77 1F C2 D5 12 F7 25 2F A5 86 FB 22  
F6 9F B6 9A 77 1F C2 D5 12 F7 25 2F A5 86 FB 22  
Line 440: Line 239:
</pre>
</pre>


== rootparam_key_1_I ==
== rootparam_key_1_I ==
 
 


<pre>
<pre>
Line 453: Line 254:
</pre>
</pre>


== rootparam_key_2_I ==
== rootparam_key_2_I ==
 
 


<pre>
<pre>
Line 466: Line 269:
</pre>
</pre>


== rootparam_key_3_I ==
== rootparam_key_3_I ==
 


<pre>
<pre>
Line 478: Line 282:
18 83 AB 46 60 2F 27 D2 6B 86 65 0C CA C7 89 C1  
18 83 AB 46 60 2F 27 D2 6B 86 65 0C CA C7 89 C1  
</pre>
</pre>


== rootparam_key_4_I ==
== rootparam_key_4_I ==


<pre>
<pre>
Line 491: Line 297:
D6 7E A4 70 53 25 BE 42 D3 19 4A 8D B0 8A AC EF  
D6 7E A4 70 53 25 BE 42 D3 19 4A 8D B0 8A AC EF  
</pre>
</pre>


== rootparam_key_5_I ==
== rootparam_key_5_I ==
Line 518: Line 325:
E6 99 81 1C A7 25 73 C0 00 EA 1C A9 D6 B6 12 3A  
E6 99 81 1C A7 25 73 C0 00 EA 1C A9 D6 B6 12 3A  
</pre>
</pre>
== rootparam_key_2_sign_E ==
== rootparam_key_2_sign_E ==


Line 525: Line 331:
4C 60 CC 78 F7 F4 D5 45 82 9B 2E 79 62 D2 D1 CD  
4C 60 CC 78 F7 F4 D5 45 82 9B 2E 79 62 D2 D1 CD  
</pre>
</pre>
== rootparam_key_3_sign_E ==
== rootparam_key_3_sign_E ==


Line 532: Line 337:
4C 60 CC 78 F7 F4 D5 45 82 9B 2E 79 62 D2 D1 CD  
4C 60 CC 78 F7 F4 D5 45 82 9B 2E 79 62 D2 D1 CD  
</pre>
</pre>
== rootparam_key_4_sign_E ==
== rootparam_key_4_sign_E ==


Line 539: Line 343:
3D C7 51 95 7B A1 CB 80 A5 EC 47 81 43 A9 61 4E  
3D C7 51 95 7B A1 CB 80 A5 EC 47 81 43 A9 61 4E  
</pre>
</pre>
== rootparam_key_5_sign_E ==
== rootparam_key_5_sign_E ==


Line 626: Line 429:


== sealedkey_key_E (pfsSKKey__SecKey) ==
== sealedkey_key_E (pfsSKKey__SecKey) ==
Used for PFS encryption.


<pre>
<pre>
Line 639: Line 440:


* flag is 0
* flag is 0
* identical to I


== SCE_EAP_HDD__KEY (External) ==
== SCE_EAP_HDD__KEY (External) ==
Used for HDD encryption.


<pre>
<pre>
Line 660: Line 458:


== crepo_key_1_E (CFK1) ==
== crepo_key_1_E (CFK1) ==
Used for Crash Report.


<pre>
<pre>
Line 676: Line 472:


* flag is 0xC
* flag is 0xC
== crepo_key_1_I (CFK1) ==
Used for Crash Report.
<pre>
43 46 4B 31 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
77 B7 5A 04 C9 69 D3 FE BC 11 38 EE 2F B1 31 CC
71 E6 66 F7 D3 78 E4 F4 CD AB 35 D7 DE C4 A3 26
3B 2A 68 2C 43 06 15 CE 04 77 3D 4B A5 BC F8 7E
CF 9B CF 77 B4 8B A7 78 DE BD 09 75 BB 5B B1 27
44 A1 E3 CC EC 71 4F 10 09 48 CC 23 55 41 3C CE
11 34 1A 57 F2 34 69 F9 62 6B 2E 71 AD 17 B2 2C
</pre>


== crepo_key_2_E (CFK1) ==
== crepo_key_2_E (CFK1) ==
Used for Crash Report.


<pre>
<pre>
Line 723: Line 502:


* flag is 0x14
* flag is 0x14
== rootparam_key_0_I (SCEROOTPARAM_KEY) ==
<pre>
53 43 45 52 4F 4F 54 50 41 52 41 4D 5F 4B 45 59
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
CA 5C 5D 73 F7 57 0D 77 E9 00 AB 72 C0 5A C3 C4
B4 9C 45 CB CD 90 29 61 58 EC 47 1F 5F 26 72 52
29 ED 9C 0A F8 D3 97 00 29 85 A9 DF D0 F2 47 21
03 EA A7 1E B1 10 C0 03 99 B1 1D EC B2 E5 DF 08
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
</pre>


== rootparam_key_4_E  (SCEROOTPARAM_KEY) ==
== rootparam_key_4_E  (SCEROOTPARAM_KEY) ==
Line 753: Line 519:
* flag is 0x14
* flag is 0x14


== rootparam_key_5_E (SCEROOTPARAM_KEY) ==
== rootparam_key_5_E (SCEROOTPARAM_KEY) ==


<pre>
<pre>
Line 770: Line 536:


== SCE_LwUtoken_Key (External) ==
== SCE_LwUtoken_Key (External) ==
Used for "low" user tokens.


<pre>
<pre>
Line 787: Line 551:


== SCE_LwUtoken_Key (External-Extra1) ==
== SCE_LwUtoken_Key (External-Extra1) ==
Used for "low" user tokens.


<pre>
<pre>
Line 805: Line 567:


== SCE_LwUtoken_Key (External-Extra2) ==  
== SCE_LwUtoken_Key (External-Extra2) ==  
Used for "low" user tokens.


<pre>
<pre>
Line 823: Line 583:


== IPMI (E) ==
== IPMI (E) ==
Used for Inter-Process Method Invocation.


<pre>
<pre>
Line 840: Line 598:


== SCE_SBL_BAR_KEY1 (E) ==
== SCE_SBL_BAR_KEY1 (E) ==
Used for Secure Block Backup And Restore feature.
<pre>
<pre>
ffffff80869df8e0  53 43 45 5f 53 42 4c 5f  42 41 52 5f 4b 45 59 31  |SCE_SBL_BAR_KEY1|
ffffff80869df8e0  53 43 45 5f 53 42 4c 5f  42 41 52 5f 4b 45 59 31  |SCE_SBL_BAR_KEY1|
Line 870: Line 625:
* flag is 0x4C
* flag is 0x4C


== Unknown key 0x54 ==
== Other Keys ==
 
<pre>
<pre>
91 0B 7C A6 6B 4B F9 DA 00 72 F1 67 6C 51 99 70
91 0B 7C A6 6B 4B F9 DA 00 72 F1 67 6C 51 99 70
Line 884: Line 638:


* flag 0x54
* flag 0x54
== hidAuthThreadMain ==


<pre>
<pre>
Line 900: Line 652:
* hidAuthThreadMain  
* hidAuthThreadMain  
* flag 0x48
* flag 0x48
== livedump ==


<pre>
<pre>
Line 916: Line 666:
* livedump
* livedump
* flag 0x44
* flag 0x44
== pfs_sbl_key ==


<pre>
<pre>
Line 932: Line 680:
* pfs_sbl_key
* pfs_sbl_key
* flag 0x58
* flag 0x58
== SCECloudSD___KEY ==
Used for Cloud Save Data features. Similar to the Cloud Data Key Ring used in PS Vita since System Software version 3.100.081.


<pre>
<pre>
Line 998: Line 742:
* flag 0x1C
* flag 0x1C


= Portable Keys Dumps (ShellCore) =
= Portable Keys Dumps (Shellcore) =


== SCE_CFS_hostname (E) ==
== SCE_CFS_hostname (E) ==


Host by Amazon AWS at Portland, Oregon, 97086 United States of America. Alias of cfss.crs.playstation.net.
<pre>


Zeke Jedediah Dunbar is a main character of the Infamous videogame developped by Sony Computer Entertainment America.
<pre>
-------HEX DUMP------
-------HEX DUMP------
ffffff8085f7f8e0  53 43 45 5f 43 46 53 5f  68 6f 73 74 6e 61 6d 65  |SCE_CFS_hostname|
ffffff8085f7f8e0  53 43 45 5f 43 46 53 5f  68 6f 73 74 6e 61 6d 65  |SCE_CFS_hostname|
Line 1,020: Line 761:
* flag 0xD
* flag 0xD


== SCE_RCR_hostname (E) ==  
== SCE_RCR_hostname(E) ==  
 
Host by Amazon AWS at Portland, Oregon, 97086 United States of America. Owned by Minato-ku for Sony Computer Entertainment Inc. Network Platform Service Department at Tokyo (Japan).
 
Zeke Jedediah Dunbar is a main character of the Infamous videogame developped by Sony Computer Entertainment America.


<pre>
<pre>
Line 1,041: Line 778:


== SCE_CDN_hostname (E) ==
== SCE_CDN_hostname (E) ==
Used for Crash Report.


<pre>
<pre>
Line 1,055: Line 790:
ffffff8085f7f950  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
ffffff8085f7f950  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
</pre>
</pre>


* flag 0xD
* flag 0xD


== SCE_SYS_TLM_SECK (E) ==
== SCE_SYS_TLM_SECK(E) (GetOpenPsIdHash) ==
 
Used in GetOpenPsIdHash.


<pre>
<pre>
Line 1,077: Line 811:


== Other Keys ==
== Other Keys ==
<pre>
<pre>
-------HEX DUMP------
-------HEX DUMP------
Line 1,108: Line 841:
56 6B DD 67 C3 B6 B5 04 EF 1A 39 C0 CC AC 4B E2
56 6B DD 67 C3 B6 B5 04 EF 1A 39 C0 CC AC 4B E2
</pre>
</pre>
* same as Internal


* timezone_key_E | flag = 0x40
* timezone_key_E | flag = 0x40
Line 1,172: Line 903:


* system_log_privacy_key_E | flag = 0x40
* system_log_privacy_key_E | flag = 0x40
= Unknown Index Modulus =
<pre>
1
A75F472844342E6633AC8243F0D77110
4A58F5C9CBEF4AA8D12CAE14995B1034
2FE84161CD0C56ED45DAC9D9A60F3599
FD710CD636098CD209719EFFC842A9A7
09BCC228870AA2F4D9D5A3C28F8F6432
5914F79086D7CC906D20E4329F3011FC
59A7E3736230A33068CB456F1E88D02D
49A5387995562A14584EE50052C27BAF
98ABEC1E6F4EF2C7DCD67ED1E97757AD
6EDAA03AF3C66DF4E1CB2D2411985080
16B46FC0CF8ED3BED5528EEB86F2E63A
B90410386E544EB438C23B355D0DACAE
33823F1CAEF64F8BEBCC9703934E4BC7
BA30A9BE6D415EBA31571C8C6F8985BD
80C09BA23F6F6CFDCB83AF9D9EEF9850
FB182EAF721A54F29CC7515CDC838C6B
2
DD7159C87B00C020E6F0A2FE595AE9C5
317A4DE8351FBB1647A2D3D1E0796CB8
AC3BB687B391D68FF1F5AE10CC279CF9
8D7AAD6C213B7E5B0BEC6C67612531E7
D3774E1319FA760C7183B4E28FBF680C
EC4D27619D858A873BD343794AAFA08F
DD3C03026E9DE7A3B4AE5A72CE422A2F
AFC7E5307228EAE342D4BE0DD1538EA7
240D369AE912024F7267F061849C0C4D
E9912518111281E95182E84842DD3114
8153F8C3E9A4A8EC8A89248601F7F3C9
B6A4C337C090031CF482C17CD4C1CA0A
55705CA7382E2CFAFBB2E1F4D5A0F8CB
407FB067222D34A8B2C4BAAA1B391F60
35624406EC47AED23868490C043D8D94
A780DE4DBCCF9787D42877D88A7A149D
3
BAE3BDD7677BB1320AD9F4886FA4236A
3DB5FC25AD014BC00DED4E8860F8E126
3193506D1FD80790FE773A3AD1349A7D
7D82EDD045D8AE73A4DDA79B9AEA1868
25D718DFEB428ED441496E991C488B77
8F11A800B65744DBCE294A9C2AE1001A
6E85C6BD6EB0715870E8D70B2BACA574
74A16B4EC76CD83FCAE75BD5D4E713BE
5E0A448F146EB31E372657C5B5DBD29F
3D52C30F66AF2D20C74EFA8C3163C72A
71A47A1C94D8496851085DD2944107F1
7738DD00E434883B31EA33E62AF70039
F1FC2099806C92250CEC3BB046985758
86F5E9BDEB7B22B707232D5F3998D8DC
A7BFFE4A60B37643FD981204C13FF759
F277373E079DFE227DCD8E0D3951189B
4
A46CEC18F7F2930870A8FB252E0D8229
AD1FE819AF9597E1C89BF871CA818558
6FBFB55EAD810E1798AD4BFDB424F2B3
865F528D4277FD5C5EEA6BB0EF76DE71
29AB1B9EA472850C066DFF10BF039E48
33D126FFBF3375FB6CAD8AB60D87A759
CF63FDED18CB16FFE3D187E2DD8FE134
B2C5CC4882CDE3E05E25E3B438666ABA
BE8CC6BE2A60978C1E9D63EB07EECEEE
AB5A416245E5840B987B9CB726765A15
2AD199DBFCF6DD9CF9D88B0DCAE45AC0
6702AB551E22CB2D5E250D7DA645E731
E92397627DC23FC804B6FECDA16C7623
46DAE61AE2F8DC8523C740A0EF1C6403
C523998875537A90430882A224BE771A
B454443B4D883B2382F82D6DBA483F2D
5
F2C477469489576778502B7A8366718A
B88726B73F4BE27E7B60135A54C29946
F62C14613C88C5C8D8AE465F4EB43D10
45BAC2A6196E1DCEBFB7378FD737DEFF
D4CDC24DBC8BA6C63B546FF8902BC4B6
92137C1B504D7B22395F37F1A532CE03
909C7E562D346257077525440033EBBE
17508E2188C8B6FFB4EC2C0148E3B62A
9197878B05D27DE3327667B249B8F6ED
1E15CC90D088FB1F469A2CD75C2BE807
0A9B95ED0478DD6B0A1C8FB4FB8DA064
30DC7087214F5121FE0038691BA757BE
7E40AA7C49A1DC9EF97AD0F4ADE8E68A
12E1ECBAE2CADA5857BBB7273E568AF0
43E61D0154930844FE1B4526F21AC57A
721F46D3BD97565ECF3C45AE88ACB531
6
D91D7E8AE2C3A5A4C36FB481BF16D198
4E9C9AC678C113C7A4D5712669344F6F
DE09C5865E189C96E1FEA398C77F6FBF
919EE5419954B473B0DE191BAFFB0076
7B29D25ED1C23C4C9356957933FE15E2
5B383C6C5015F4A795AF46342F3F5FF9
9F95C24C6AAF0C76CCA9322B5970C75E
EA0E06D4FE38773DEF3E78AE5DDF74B0
B52163D40CC3B986915130EE87FF6F78
3C38D9481BDCA4F14F05D228965240AE
BB6E027FEB4B7971E642B86FFAF81367
EEB0865F3F6670B1CFE8193CFEA635CB
EF970F46032667B67F1382BD3554D4A3
81CE4215D96B8BC902B95D443360EA06
49726CC8E9BBF6B8F52093FA6017194F
58E0380D47733042E60330E7953543ED
7
AA542A79413B3B5D1E6D38DBDA0B9BC9
933200CA08FCC3D7000845D7F594492C
C00124791060AFB3848CDA5CAFA6AB35
9516C1360F86DA0356104A80CBF818F1
C27BA934FF7CA2F907A8689251099798
4D61EDB6476126BA9EC099014C33FFC2
261087B513F8B29384B3C0E86AF9E096
3BD71C7A96CF445CE10AAA90E0172AC4
B4E20E8AD2F3E758D2B9D64169387EB9
060831D5946386FF0DA87BA1F225F246
6DDFE010C7507EA50A5CDAE6E9C9EA09
D4DDFA02DAE3BCFC772216A5015E7950
89247C45AE048A79C7FE395934D637C1
F7ADC39F40764984B364187C0A878F50
9DC75C5E2904380E200844143B67A916
AC57128464EC990CC742AB9F02920C35
8
D4CAD71FFF3F65A5F18E06304B7FF051
D3B8F7C42D9044A2387F6DF2A1C4B7D0
8A408303519B1CB5567A33FE8F1A8CCD
4A8255ECC7BE6FAE0AEA4C85FA822818
D0D74D9CE401CF6FD01B181CEF838D6B
7338F089B0578802775502EFBE4E20E2
40190A4E3A79B6F15792B527FD6BA3E4
3181B605EB7F636155D66F909EA8A92D
43CA813E7705B8885DBBDA1840022238
F30AC96A76054B225F7FD73ACC0AE56A
99944F95ADF4A4E35FF6DDE635B75365
F0B909D7B1E30C536B494ADD2DB77E69
626E6BD528F2DF9FC72CAE2D791DB6BF
2888FFDA303228E7AC6BFCB040BCE9FE
AFFA802C959B06625D6FCB2E200F8F70
0103488FEA272C6B3AE490F1C44EB9A3
9
CE53064783B52140C7C919E1650416FD
9CAF72B4C1AB5ED886D526310E437FFB
B556DAE8C377807988955E5C4732B034
66FD5EC2D0420A64769A59C30EB026BF
B16DC22ADA7294FCAD55A48FBC75B2E7
449739A14CA12CA085A1AC22C8452567
F795609706681DCA86B1755F7A697832
551B80808C555479BBF065E1266478E2
6CD173B1AC4963DD38F6E7010D8121B0
1EE6416A5396E3B02BBBB15F09583382
FAB0C9651CAB6700A1B1A3E83845BE81
FC02E7F215EAC301F27231CC3568E05C
DF5E888EB6DD8E8EB59C3466A149A5D9
D43FF8A1E13AE1C57F81F51A994B7556
4231EE724734B6AAEFE7CB037977E9F4
AEAD4CFFF9CFC2EB3CE9DD75F8A277ED
10
D043EB64095D326E36A75EF2BD35E96D
D045FFDF76EC790C7F6632842BBD24D3
227E39DFF632B0E45D0AC8BD0AB90A30
824C6594DA81FA5FE0F49F05F6CE9DF9
6D72330916014685C5E92944235D8E06
72B272685D751B3E4EF664BF54B39BDB
1DDF5B95F6705A396FABC9D052768B9C
2E31F0EF63D5D8AF40D9257571AA881F
C7694F00A6FC70052E219C22276896D2
E7711C61ADB5E3FBBB96F522AAAB606E
0D98B9447ACF43177C6095A8286685FB
509C1D5C386770DCB097A3F6217FC247
AC818838492DABE0A24903E681DA44EB
44BB58B731D29040ADE80C9E426BE23B
B166FAF683199602D63F6849F7F55B01
6A7B8F1092E70462B1C5604F41F18177
11
CF131623AA3A4010E1104979190025E4
E6164032DF62C2F1B64825BE8A745F92
08429C6DC89E7F8055A032557CFD31B4
ABF07B2D841CF4D92D097BAC04D52784
7DFC1339F8ECC3847C845AAF70A64492
D80456E40367EAD8BD21B273E911BEB8
53BEAE331736EA12DE74FDE095B71A84
C9C1A6212BBA56AB0A50784659ECFD01
5EF711EF77437F0FC37BFBE09ECE8C0C
332A07E435648382F23AE90BE7BFF4B3
F2D726585766E57CF6F5374E62D1A634
679660D5B6C5267E5095A2D39633F5EF
2F25EB4BB771EEC8855538233ED77CA4
9E6D905595FF01E64D6DE28DAC3A3EC8
15D0A36B5A7C9EAA245559B7B4B04079
965DFDD5A612CC4066D163D560B724AB
12
BEE9A1B94CD339CCA029248536084D1F
05D709299C8D752646A00ABB2C044B62
4D604BC5403388B3FD6DD818508EC015
0C252514146ECF4A84BBF4956BD6D954
45E7027B7783F3574F790B1F0726C382
782697683BECCE5CFEDA4DEFDAB45DB1
C4BF33CA269AF6D50717E7FD4AE88667
EFBCB719F63C965741FD78F4EB1E205B
4A240FD6AB1BA9BE91F79AD8D4F9D292
2BAEB1E5C1E83C30D9BEC33429BE1B0D
B68420AB1EF850C6C90E0F4D2E92CF67
6C71A6CC4BAC752B960B13C8DF5E7971
1D4042369FC58BCDE0BE9434B2F9B13A
000A8F071319F8409A9DEA9320699D6B
97A7175ABC0C6C30E8ABC7C8F0392688
16454386B0B4CD4D24E5F2EF3981D80D
13
BC96A42D97562B1B28F4E0CA7F7F74CB
1BE7CEE1170DB7B7E11D833DC2A02FCA
B7CA6F5B596B2FE814EEE22C75BD1B5A
34578B740EF5FBA9AE5DA2745271CC2B
CD2AEEE0144F814B377C514169E63E8F
68EC1857828D2201A57193F880D03891
3A8286DFA425360FB2950A98BCB4E884
183B189D417328F7982ADECA9F3BF4DD
30AEEBE4EA7C9688348AD63946E4E02D
10BE1FD108380C6E66451F5CD6E7E751
049837480E18FCB03F0422A2210E4B47
5C104A05E8CD671417392D6038A568D0
6333773040D1E9D3B47A47103476FFCA
2BC133E581793032A96E3BA7B78968C3
1CEE42D4DE68465B7758C6F45F47D552
A69C3B27EC639912DC782AC43FED0BBB
14
B5277596EF86A3A83A734FCC52D8ABE0
07C3C49841ED10D5C3986529FFA9E964
05D2B957A8E3E0B4F29C3BE50B6671B2
AB5E2FAAAFAC5FCDF6B5F37E1C0E950F
292A14780B39AC32BEAC4D16DA8DE7E7
E4081EBCEEB6FA3EA12F9C35884E5262
87F5A030B39ECBBE5414293DD360CD8C
B30029F10CC1BEBBB84C187C2F9172C5
94A033497DA75C0F17B591CAB50F2A12
70AB5C8E74EFAB49229138C59A3A6CBF
4A9EFE4F9C22E170F38248A374CD6A04
72BC992825341BD4A579DCCEA0FE7B25
A0E1A86731A31DB84F3A9C2168F6688D
14ED5685749E1076C464929AA65AF456
128D59F42161CA25A55A38355A79172A
1C79680C21129402B7C2F1C12DDEF8DF
15
CAC0011523A171AD3C27C42F0CECF68D
A011CB83FD6A33EAF561C8FAAEB222DD
D08C30A6308CF3ADC0E11394E6E61490
C29A53242E8AF27F0E4CE843B16E8700
41A1A49767A93D8C5089E99E78E89D5F
809DBBC8B4C8182A17E3C8E7C7447BA5
CF3F43720C71F665CD04EC69E5AD58DF
38F8560AD55D97240D8D07C3B5069671
3A9689F22AD2A3D6F1D2D19D7E765820
C699F517E852C3F6C4D2B78A842B0A75
FAD59FC01C067EE2CC13757FE4D8D49A
191A35C63C1FA3C2A25B93D83B241B6B
9B0BEBC104FE65D9068AAB40ADBC498E
56F5E7C5ACF12E809C75B5F92CD37CE1
77AF57181595D92A576984D33E8EB546
16C8C0125F54A694955B1DE4B18A933B
16
CCA6039629DADABFADD33E8EA637387E
807B03B48A41DC050E5D2C8EF38E385E
2F28736FB6EEF9E4CACEC4FBB88F7BCC
FC9224885A57E630C7467595EBBD46E6
1E0CBD22E5B872F5AD4A1C7C548FDF93
48F5E992490973DFAFCF091B54976BF5
B69D6AB9DFEAF1E94A13204930199787
E1D386AF3064A637162352B19F2185CD
09DB0509F4E99EBE2C67478D805E79F9
A018E8FDFCDE48C2588C8116B22DAE17
F3A86A8CBD1FC2BE2FC05B9B3A06E703
FCF38BE94CFF24670CB30B8442E2B0D1
9ACAEE5C671ED261222B1186E3A0D5CB
5585E55B25E3ED8DA7B3780E34E846A0
1BDA58C086245ADDF6D1D65E28C2B32B
EE25E436333DBB1C2F39F059AA519EDD
</pre>
= Unknown Index Rabin Others =
<pre>
1
955E4C9550D3DA9D0FFF37E7334138DD
B0EF94C3AE6162A18BDCB8990015D7CF
0157551CE071FAAF728B8C9B418CD6FE
AFCF7F87E7464BD85ECBC5EC06BF3275
7CAB4278BDCA0DC851391301D2F97F37
EC04274E05C4162AD6CCC0A9EFE2421A
A81E8CE9097640BE0F746D612B867D10
9B763694B71455B04B69CB8D7350D333
5B60F5A4021EF36258EA3A52445B3AB2
61558F18AC3F8E0CBF81FD1A3175FBEE
B91EC6B43D3CD3D0905AB1436AA54282
CC5215FC4B96C72C2837D419E202AF65
ABB3DC3FB025EE0CB15586BABCAA37B1
7C4F0132B04C39209ABC95683458885F
6814169BB798B96F0760919D42F6B0AA
AF6C0C9A5A91701970B38E84B5A18184
2
1E31D390BCC147D54EBFAAF404BF0009
4F43C0ADCF00206E482395EAEEE07F37
29457D947993CA4350DB2DF2FDAE1259
7255B5319CA0A015521901535050576F
6B1BCE8A679E9BE9B8F15264C83CB389
CBBFC79335992ED3647E43557163A00C
DDA5DFAC76AEC0EDD259EA07812C47C1
8AE00B71EDD628AC1F51099AD6F17985
E77FE67D2FB1547B0548A1F842307247
347696BFD15FEE00496E8BB3CDEC7CF3
8FBD0218DEA9C1B169CA3223C35785D1
70AE1449493FD96794A70D63F1660F0D
B7BDA043868AB6EAF179B7C6B94084CC
6948D591908F0005127FABA9A95C4BD1
ECEF60D60AE1C3FDF0E0E8A9AD35A41E
671A0F91AD3AB6BC202CB7366BB91E61
3
2A32CA0E12B3CC852045062B935B9899
239D5938DDD8C340CBC8FA44BDE04A1E
E2B3CDB42AEFE63A9A4062961AEB8E41
B639D35E1B4F515B4243764114A69A16
B4EE60321D71B28F7FE8ADB6E7987895
FC61E27E8FBB4576F6EAF19258C6F7DF
051AA52B09C00235215C99B1790DE7DB
106667172D7027630125E19EBB301DCF
0C850EAADC8A7A7A5EEE8AC8CE3A7763
B8BBBE7529F60B2B2ADB0CB675F6A975
A73563A93B07B94CBC823E19F974CDBC
7DD24292E0C8A79AB5F1EE4FBFE80ED1
E92ADF11E638ED9DD6EA86FA7B4CE14D
3DA62E9181BC374B27AB720C3335B141
7B1F0B36C2F236912F74714D015429E6
467D51813E239EC62B037B46A9109993
4
88F3B59562F77114C363082DF6D6BB5E
AC427CEE71B436286E6C4C0E83D55B67
80585DE487411F0D68D8432C95656F49
3D465C5733780FE84316451902446209
773D4B4B7057271E6712D652CEDADB68
6D4DB66168A0EEC45C82EEFCB8C5F7C1
97E8A20393198EDEF391A80653D437A1
0633A672408EFC12F1D7FD98EE5790C0
076020D3A090FF4878936299A6C7082C
9AF733CF8E6C0282A6AC4C7A50C604F9
A8F21B83B5873CF21D1E49607FC3411D
17D7178D34129EBF8BFEEC8EE431CA58
57E1A242B751CBA5117C2DA550FB19AD
6D8813C8D834412154D66C5A1A26D5BE
9AECE41C08563CC1EBE91D94C85E2B56
737B516F5F35DB7712438D1203CD74F4
5
D70282AFDBD2612D28166F7CB6455243
02A07A1CF40472CA48FD3D1599CFA0DD
529C0D18214212AAA149960B7F2D7E1E
051E7D30ACCF2A803C6AE6CC35EC0983
9614A62BCD50BB09487101D705C41954
F9A4622E7DF957E7EBAC305BDBF31F39
F7CD55875C71B79F556CBC3D856F4498
608D62B87DDB922E2598E4BC11385212
82D3A89419A1C21BFB28648D34D79EFE
325C23CDE56ED575D3824CFF055D6407
3C16F239172905FC934EC367E7BACDCD
6CA7D5CC6F506988651A32ACF21DD6CD
85B7A8C921A5E6FFE7BF6802B51473FF
A1DD709B42F69613214E2ED56EC88F5D
4EB8A0544FE141BD790CFD7E29EECB4F
D70AE54426C53826ACD5BC6C59B53A9D
6
4C57B00D8D2963980C23FB006D911ABE
29DF92920357CBC2A37D3054169CCF22
57A7F8CD652DBAE664B70E6E4E9FB7DD
CF30ACC84BCD28AF8574F5FE3C3B4870
D19759BF477D8074B5654B84DFAEC568
DCD92D43A961F2ABB7657F7F01C80D9B
7905A52BECC24BEEE1410540203ACFED
4D951A8EB8F227E1E42A9CAC1DF53B9D
2C982B1C6463BDE26545575957506B4E
F433AE989834C636ABF474E086892760
28BA4C01D71F9A7AA9C444821139890D
74D6A950F7F3654B4430A1C0753D4C3D
EC71185FDCEA3C8EBA68B2D1F2537E02
BF69506E9BBF5348AF9E1B291C0503F0
3CC21ABEBE9AE95734138B08A3B74413
6784BCBD48FF32BF74A0B5ADBB31665A
7
44820EACBC35EC4EF9A7D0BE36CB71A7
E7F4FC08E82D1153FF864D940EA65774
3ECE0AB90866AD7BFB67166B18082A7B
CE88A2BDB1528FE4E158CCB869510308
B43BB7CF19142519ADA2FF51B0301250
8031FF1CEFB21454D41E0AEEDF7CDDB6
CA3D6F6E2CDAB8299CE6066CDDB4A032
F79A58259D514AA6D406279C3D84FE29
77F51DC16C1E0AB10AA37AD5AA512B81
EBA719FDDA40B0B874C7D055EF2C639C
201043CBA99BB5903DC611B15A7E40C6
F14E50FD6F7AD689B23F4FBC5D286F95
DF25A4CBEAE1DC29F11E9426169AE759
CC1CB7F62A71031C006A1EF3E2FAF0E5
98353DE49DEECB7B9E7A9FAE42549A64
4F2F0FB004FBF6068680CFABFABE1718
8
B7D26BC2765B130CFA79B4A2468F7DFE
8B59BF06549083C1E259D79EA56FC001
1B074C4725C96051407D2D7E1C984D4A
FB0A2986C84808C52E2F37CF726D5BBD
FFE2B7D15F887BA20B0DF6E39C65F5DE
145BD49F033D6B93A36F8CAD23806238
812EAAB6F64E1ACCC9C43562DC76B786
C04D8B7783606915BF05EC905DF6754E
3B1EE3081D9740EED5BECD4F6E7E4192
F5DDE22320192A3D93A87F0170C8EC13
B19F99AF6BDC82CA0887D1FAC50957E2
AB1B2932DD845CE9F63AA6EA10D7021A
EB1A212E54560C3EE3A864035A0DD3E9
E86E2A5E533C9ECE5F5AD155D34D6AAA
B34AC6D418292B4BB80DE6797B858664
07D6DD685BDD83B15FCD80641AF1EA23
9
6B0132770F10B2B8DAA3342327BE1519
7C102DF3CFD7B0BA601FDD8FCFA218DD
960CCDAE353FC6669ACDBF5739E3D482
CB202CE37228C38CC3BF196B27FB19C7
67B5270D74CE95AF4AFD7C86BB3AC5FA
18B4292D10E8570AB26F00DC1635D227
377235D8456D1D43B755E5C15E4E9479
802AD45F1E6919EAE01AB9229EE8B230
2C515E52242BE467216A8A3960C63EFA
1B3086D6E5D74653DB2F263A49D2A75B
E9391499DAC8D202B876FEF40E2CC15B
277AD4B7461629A8B1487CC84B69F39A
05290D6C1420CC51566D262CC726DF31
9D781C1F81120F9C974C3E84639D45CA
B8957E5BCC14233E9288480FD47F8551
0A217C0D921F70C604BDF8D1B6DD3DAF
10
3C957B54833116E9FE885D2D40A42A87
052188D318FD706E8962C5F93C635E68
B98C6611FF7B49F0F049E1A869B24A69
18D855F4A6317EF3BE51BA755DC532FB
46A665C24BF58F0845C8473B4C44DE3B
BFBE922B155313715C1BAD6EEF11C856
8E27954C7CEB5DCD143E867167E68930
854B1A66F695CDA8ED9158E5BD68F540
58C80FB489F7EECD2C3F84A6AB6BC242
815D7455C1454D61291A80935894E609
A55602397C31691FBED89A99B66EDB08
552B13F69448FBB50F76EB9007F9D3DD
518A35721EE81189A51276EF98803926
9B75FBD049DFFAD50208247359655D37
18047004D94CBEB7230FF19508358090
2ECE233EC995D7DD7747901DF0954218
11
1D56BB9FCC3564944C5AE3B80F9F52D2
3663C810226DA36CFB14B39D643E6956
77D8F1EA42C2C7BD2DA2B495CE209F95
AC45E1A5F373C35A082B24F16F85C1F5
6DF4E76B91E3A6264E7F812B6703EEB3
EE77DC3B87C9354DD56159535857356A
320D177692A3B35F6E75DC02F54E965E
EB7CB82C25EE68DB6E103399D35859AF
53035ABADE67BD975604129698ACCD0C
0645F81169AFAF843F9B552EB0ED7B95
E8256BA21A345469900A7D81AB8A26E2
9E048BBC73C6BC0E2535D6FAA3EE3AD9
ADF0F4932BA2C1EA798DA29AB2DBEC48
D5CBEFE64547D43C64254C0727ED1B02
9C9CB8DFD32E7C6A070FD5333B3BBBF6
02C84C75481FD00160BEF78DFBE6963F
12
572EDE4CF1760409BB4F0A5A2A08BE65
3DBE827481F596A39128B173A95AAEE5
A67443FCDFE8225DAB22A5A183461397
D66ECB21E575904F51F831ECBD1B4E5D
16BC57E6CA68AF4B08E7897A380A472C
2B7F052D08EF9B9646F3E946E25E6254
72B11EDE25E4DF3F5E03655038BF9A28
B4173B65B1273918E6AABD3828B5656E
AA3CF83FCE3C757DE08D2F13A579E657
7F0B2CE89AAF83AF47B687D7CE6714A3
960002346F1E2C401DDB6541191B9CFB
00C605195BB0436237E383A1ECD13B18
828EE96E608A408325898A7FE0F3C6DE
4ECA290BFC6E61458EAFD7839886001C
F7420AF025FC6688796B9792AA1E527A
FAC70B3791E44E27D519926E4020F0C3
13
29E0B15036866B7FC75DB2ED8B3B86FD
010558E2E6602B2A0C465CCBECA89FCA
1B6F5B5195555B5F8FF78C491B7A2F72
B66D5CB7F1F53FBBB26E97552343DD07
22E7193BFFA8EB95B1A312CCB7149EFC
E15114A744CE0C631F1BBCD3E9A6D3E0
0A3A80A0F23FAAF02330E013CF047074
B0B83F4F32BBE0FC2A609198C54456EB
8C671354D6DD58C451C6C7886A48C4E1
35CFE8A168041D0A5DC667420824C527
66A2CDC92074A392DECC53F8D63706D3
BF6C1CB24CA1C8935E4E63242AEC3211
E14D878B98EB689B059AC722EAA055BB
DBD76FD7AFA49E4735D324DB7405C792
E86E82903F515A0B384CE8A72F84D2B8
57EA5D351263256606143E70A098BD2A
14
3834512ABBAFF2328859AB62E8999783
4614501AA978A453DE64C38BF164511E
ACD1A1161AEBCE3A2619EEB754C0A2E6
73F78471FE8064C66359C9BF6BB986D8
327D3C794D2FFE550F90159B6E48EAA5
C9453A54C01FBE6D7DD622788DEDAFB4
4E0DC654FA2407D8B4F000CF992160C5
72E31DECB9C596C5F9780CC43AEB9B35
4CEB9424660B5423B3F59595D4D82796
B34877EE6A9E6A343C6255B333D27E29
8C355D7501F7E30F851155A7CD7D59F1
6BF42C27ECD0035926D87F7202DC0A2A
46D9A888BD6099E52D616D50FF53C35E
D00CE9D9C2367C969818B67A22EFCBB0
BBA6754D5E8EDCDFC93241F0ED13A4AD
05F0BDA36F4A482A423EA49FA3E491D9
15
A002BC619170CF408F1199D9ACE257B7
47BE83638CE1555398E6C9F7A9D4A45A
A01B057751483C23087780C5801A6A7A
63AAE8B5E6A90EB5E809536AA2F893CC
91589EF6DCAAEA60893903D819D4EE17
FFA26D703D01731E3BD8F7349343D05E
5C10A3141E013943B9CDE53C6976DB9D
AD5D2A8FE00E18B075A03C2F1D3CFD57
B1FF8747F2A7A4F762B852479047DB13
D99D49E16B769B2F27CCB25D4165264C
3EA9D9A9888D50CFD160971F1B2511BB
8C9B57D436263BFE3EDD961058F7E384
9B58C1879C9242EA246D0A18E2C4FFDF
84BF39483F95B2EF87F5DA7596631EA4
2420DA0B5107838E3AD059B5F61CC459
FB34733C6B6071C78E53B2A04BDEF178
16
68927B3046CFA2B420D3AFF8996D26F1
3B932A861A536E5A009912AFD063B473
31AE420AFBAF215BC2FA5D64E85406B3
74C2EEE52A719D4B4FF6C0AD6EC522BA
05360F95BB05675427FB71FB52655963
E622AEB41EE726DA6D6EE04172857B4A
220DCB175D2C1D0486D251DCF657974F
3B7E81B37DD62DEE20FEC77D695D9934
93EB286BCBEE2914C3ADF701984CF83D
A2C65596FF5AA9BC7185625D86474ECA
CC10D830380055B4DF6367EDB394A5DA
BC236E9E1D405719A33357826789560B
C1B0C9C23FB9B0F396EDE2394FD0DB6B
73AA77FCA383FDBE2294F990AD04F7F6
F295D7267EFF17843BBDA1A2A856A854
79B5BF573AFF3B8B00088891F6FD27D3
</pre>
= Unknown Others =
<pre>
k1_1 E35FCBCAF6E1A3CE967510FA79086F9D
k1_2 7A4ADD7D3911075FCE122ADD1ACB796F
k2_1 9AECC9DCD9C52B890D8D9FB1FB56260E
k3_1 2B9C753A8D50ABC8575CF3661C7169F37E30827433F219067A2431B51041E7CA
k3_2 891DAE2D1F458B6D541F5612998C3AE28021764E959CABB93492CE79D8A00EFE
k4_1 8E5EEEDDB6F7E9B445742BF974589505A2F236605D8CF8AC4AC519655C021F21
k4_2 6DBFBE33CCA90FF2762AD332FA1A155E8D2A6323AA3300001F4688BE33E6C5CC
</pre>
Please note that all contributions to PS4 Developer wiki are considered to be released under the GNU Free Documentation License 1.2 (see PS4 Developer wiki:Copyrights for details). If you do not want your writing to be edited mercilessly and redistributed at will, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource. Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following hCaptcha:

Cancel Editing help (opens in new window)