Keys: Difference between revisions
Line 410: | Line 410: | ||
7D4E1AF91036AD6C8D20EAD1FF33D903 | 7D4E1AF91036AD6C8D20EAD1FF33D903 | ||
94FD4415B54072D9C83B94994304FD49 | 94FD4415B54072D9C83B94994304FD49 | ||
</pre> | |||
== App 0 Key == | |||
<pre> | |||
3E5C05C6AFAFAB02203B3D181733DDCB | |||
A965400FD53A6F501731F38655B20808 | |||
CFB8E6181CC91D64C4993B040BECC7B5 | |||
ED18A5683A95A338F3CA325528A96FCB | |||
</pre> | </pre> |
Revision as of 00:39, 23 September 2018
Syscon Keys
Common
Security ID
3A4E6F743A557365643A (:Not:Used:)
Used to access more privileged commands, such as the write command
AUTH #1/#2
RSA-2048
Modulus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xponent = 0x10001
Used for UART communications
Unknown #1
RSA-2048
Modulus = 7BB325CEDD2FE9C1F8C987E0BC175D5F F99FEBBB45E96793AFBF5727E276F234 91D82CAD483FA77E917C5DD589D28049 6D24A0BEBBCBF10D6BB75EC621272886 EFDA5C481DCBC8A9AD6AD776E7D6DFE6 A06ACD1BC0D6704455D10D363DBD2497 E6723F94A98AC31FF7DD7AE72CA75427 CF7A1E55D145E4E331D7CEDCC27DCEF9 Exponent = 0x10001
Used for UART communications
Unknown #2
RSA-2048
Modulus = 23C4F66168B060AB37DCBEB26012D3C5 B1932E9E7DCB4BC7C4E566BE5DC1F5CA B185F63280ED4FB078111C186DC52F00 82502D3D37F366C61A2B92BE2630049D F8ECC33BDD6A21380E53505E3E564389 FA8EE23812463E1BA0F6A073778E853E FE263157D33F409ACEA6BCF0C4C87F1E FFB449A6C05C06BC115465357992C8BC Exponent = 0x10001
Used for UART communications
Devkit
Full Firmware
AES-CBC-128
Key = 5301C28824B57137A819C042FC119E3F IV = 0000000000000000
Used for:
- 40000001 (BLNK)
- 40000002 (BASE)
- 40000003 (SYST)
AES-CMAC-128
Key = 8F215691AC7EF6510239DD32CC6A2394
Used to generate the AES-CMAC-128 at the start of decrypted 40000001, 40000002 and 40000003, by digesting the remainder of the decrypted data
SNVS?
AES-CBC-128
Key = 82D4EEE9E7F68EFBC43C3D2747E4139F IV = 0000000000000000
Used for:
- 40000001 (BLNK)
AES-CMAC-128
Key = 4C49DC8DF6A20E1592F9E9F7442B4261
Used to generate the AES-CMAC-128 at the start of decrypted 40000001, by digesting the remainder of the decrypted data
AES-CBC-128
Key = DB603053A4D3119149996D0BA84434E2 IV = 0000000000000000
Used for:
- 40000002 (BASE)
AES-CMAC-128
Key = B3A8CB797D1406658372A92B6CFB3490
Used to generate the AES-CMAC-128 at the start of decrypted 40000002, by digesting the remainder of the decrypted data
Retail/Testkit
Patch Firmware
AES-CBC-128
Key = EF90B21B31452379068E3041AAD8281E IV = 0000000000000000
Used for:
- 40010001 (Patch #1)
- 40010002 (Patch #2)
AES-CMAC-128
Key = 95B1AAF20C16D46FC816DF32551DE032
Used to generate the AES-CMAC-128 at the start of decrypted 40010001 and 40010002, by digesting the remainder of the decrypted data
SNVS?
AES-CBC-128
Key = 8BF074CCA3D9C398142256D7DD1A1259 IV = 0000000000000000
AES-CMAC-128
Key = 4065918EB339184DAACCD61B30B5FB59
Kernel Keys
default_suffix
Used as suffix to symbol names when hashing with SHA256 to create a NID.
51 8D 64 A6 35 DE D8 C1 E6 B0 39 B1 C3 E5 52 30
Crash Dump KeySeed
Retail
s_kd
8F 86 DD ED CB F2 4A 44 EB 6C 30 60 7A A2 6F 76
s_kc
41 25 71 5A AB 8B 78 E5 69 F5 12 E6 5C A6 2D D3
- algo used is aes cbc
Sealed Key Values
Retail
Key: AES CFB 128
Hash: SHA 256 HMAC
Keyset 1
Key: B5DAEFFF39E6D90ECA7DC5B029A8153E
Hash: 8707960A53468D6C843B3DC9624E22AF
Keyset 2
Key: EC0D347E2A7657471F1FC33E9E916FD4
Hash: A6D6583D3217E87D9BE9BCFC4436BE4F
Keyset 3
Key: 51D8BFB4E387FB4120F081FE33E4BE9A
Hash: FFF9BDEA803B14824C61850EBB084EE9
Keyset 4
Key: 346B5D231332AC428A44A708B1138F6D
Hash: 5DC6B8D1A3A0741852A7D44268714824
Dumped with getSealedKeySecret on 5.05
Vtrm Cipher Init Keys
hmac_key_seed
87 FB 19 BB F3 D4 D6 B1 B0 ED 22 6E 39 CC 62 1A 37 FA 4E D2 B6 61 8B 59 B3 4F 77 0F BB 92 94 7B
iv
00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF
aes_key_seed
B0 ED 22 6E 39 CC 62 1A 37 FA 4E D2 B6 61 8B 59 DB F0 7E 82 FF FF FF FF 47 F1 7E 82 FF FF FF FF 81 F1 7E 82 FF FF FF FF BB F1 7E 82 FF FF FF FF F5 F1 7E 82 FF FF FF FF 37 F2 7E 82 FF FF FF FF 79 F2 7E 82 FF FF FF FF A9 F2 7E 82 FF FF FF FF DA F2 7E 82 FF FF FF FF 07 F3 7E 82 FF FF FF FF 47 F3 7E 82 FF FF FF FF 00 00 00 00 00 00 00 00
Keystone files Keys
keystone_passcode_secret
C7 44 05 F6 74 24 BA 34 2B C1 27 62 51 BB C2 F5 55 F1 60 25 B6 A1 B6 71 47 80 DB AE C8 52 FA 2F
keystone_ks_secret
78 3D 6F 3A E9 1C 0E 07 12 FC AA B7 95 0B DE 06 85 5C F7 A2 2D CD BD E1 27 E9 BF CB AD 0F F0 FE
ShellCore Keys
Trophy Debug Key
02 CC D3 46 B4 59 CB 83 50 5E 8E 76 0A 44 D4 57
Trophy Retail Key
21 F4 1A 6B AD 8A 1D 3E CA 7A D5 86 C1 01 B7 A9
RSA PKG Meta P
F9 67 AD 99 12 31 0C 56 A2 2E 16 1C 46 B3 4D 5B 43 BE 42 A2 F6 86 96 80 42 C3 C7 3F C3 42 F5 87 49 33 9F 07 5D 6E 2C 04 FD E3 E1 B2 AE 0A 0C F0 C7 A6 1C A1 63 50 C8 09 9C 51 24 52 6C 5E 5E BD 1E 27 06 BB BC 9E 94 E1 35 D4 6D B3 CB 3C 68 DD 68 B3 FE 6C CB 8D 82 20 76 23 63 B7 E9 68 10 01 4E DC BA 27 5D 01 C1 2D 80 5E 2B AF 82 6B D8 84 B6 10 52 86 A7 89 8E AE 9A E2 89 C6 F7 D5 87 FB
RSA PKG Meta Q
D7 A1 0F 9A 8B F2 C9 11 95 32 9A 8C F0 D9 40 47 F5 68 A0 0D BD C1 FC 43 2F 65 F9 C3 61 0F 25 77 54 AD D7 58 AC 84 40 60 8D 3F F3 65 89 75 B5 C6 2C 51 1A 2F 1F 22 E4 43 11 54 BE C9 B4 C7 B5 1B 05 0B BC 56 9A CD 4A D9 73 68 5E 5C FB 92 B7 8B 0D FF F5 07 CA B4 C8 9B 96 3C 07 9E 3E 6B 2A 11 F2 8A B1 8A D7 2E 1B A5 53 24 06 ED 50 B8 90 67 B1 E2 41 C6 92 01 EE 10 F0 61 BB FB B2 7D 4A 73
RSA PKG Meta Modulus
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
RSA PKG Meta Private Key
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
RSA PKG Meta DP
52 CC 2D A0 9C 9E 75 E7 28 EE 3D DE E3 45 D1 4F 94 1C CC C8 87 29 45 3B 8D 6E AB 6E 2A A7 C7 15 43 A3 04 8F 90 5F EB F3 38 4A 77 FA 36 B7 15 76 B6 01 1A 8E 25 87 82 F1 55 D8 C6 43 2A C0 E5 98 C9 32 D1 94 6F D9 01 BA 06 81 E0 6D 88 F2 24 2A 25 01 64 5C BF F2 D9 99 67 3E F6 72 EE E4 E2 33 5C F8 00 40 E3 2A 9A F4 3D 22 86 44 3C FB 0A A5 7C 3F CC F5 F1 16 C4 AC 88 B4 DE 62 94 92 6A 13
RSA PKG Meta DQ
7C 9D AD 39 E0 D5 60 14 94 48 19 7F 88 95 D5 8B 80 AD 85 8A 4B 77 37 85 D0 77 BB BF 89 71 4A 72 CB 72 68 38 EC 02 C6 7D C6 44 06 33 51 1C C0 FF 95 8F 0D 75 DC 25 BB 0B 73 91 A9 6D 42 D8 03 B7 68 D4 1E 75 62 A3 70 35 79 78 00 C8 F5 EF 15 B9 FC 4E 47 5A C8 70 70 5B 52 98 C0 C2 58 4A 70 96 CC B8 10 E1 2F 78 8B 2B A1 7F F9 AC DE F0 BB 2B E2 66 E3 22 92 31 21 57 92 C4 B8 F2 3E 76 20 37
RSA PKG Meta QP
45 97 55 D4 22 08 5E F3 5C B4 05 7A FD AA 42 42 AD 9A 8C A0 6C BB 1D 68 54 54 6E 3E 32 E3 53 73 76 F1 3E 01 EA D3 CF EB EB 23 3E C0 BE CE EC 2C 89 5F A8 27 3A 4C B7 E6 74 BC 45 4C 26 C8 25 FF 34 63 25 37 E1 48 10 C1 93 A6 AF EB BA E3 A2 F1 3D EF 63 D8 F4 FD D3 EE E2 5D E9 33 CC AD BA 75 5C 85 AF CE A9 3D D1 A2 17 F3 F6 98 B3 50 8E 5E F6 EB 02 8E A1 62 A7 D6 2C EC 91 FF 15 40 D2 E3
Index.dat Key (Portability)
key : EE D5 A4 FF E8 A3 C9 10 DC 1B FD 6A AF 13 82 25 0B 38 0D BA E5 04 5D 23 05 69 47 3F 46 B0 7B 1F iv : 3A CB 38 C1 EC 12 11 9D 56 92 9F 49 F7 04 15 FF
- flag is 8
Dualshock 4 Keys
Bootloader Key
39FF1A672B4F99A6A1CA65C299D6270C 7D4E1AF91036AD6C8D20EAD1FF33D903 94FD4415B54072D9C83B94994304FD49
App 0 Key
3E5C05C6AFAFAB02203B3D181733DDCB A965400FD53A6F501731F38655B20808 CFB8E6181CC91D64C4993B040BECC7B5 ED18A5683A95A338F3CA325528A96FCB