Editing Keys

Jump to navigation Jump to search
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 1: Line 1:
[[Category:Software]]
[[Category:Software]]<noinclude>[[Category:Main]]</noinclude>
<noinclude>
[[Category:Main]]
</noinclude>


= Useful Information =
= Useful Information =
Line 21: Line 18:
* priv file (private): %s-priv-%s
* priv file (private): %s-priv-%s


= Per-console keys =
= SUPER KEYS (Dumped by SDBoot glitching) =


See [https://www.psdevwiki.com/psp/Kirk#Individual_Seed Kirk documentation] for usage of PSP-related individual seeds.
== Static Keyslot 0x605 ==
 
== Cmep Keyring 0x600 - Visible ID (Test Subject 9 PS Vita) ==


<pre>
<pre>
00 00 01 01 AC 72 45 00 F5 68 96 03 80 57 C8 1A
3B 39 E9 2E 25 B0 40 38 27 EE 32 D7 D6 49 A8 47
25 99 21 A1 73 A4 89 F2 E9 96 23 E9 86 0F 74 2D
D7 F1 1E 24 D0 11 76 0A 79 43 37 D4 F7 40 C9 DF
</pre>
</pre>


* Contains the console's [https://wiki.henkaku.xyz/vita/VisibleId Visible ID].
* Type 3 (finalized unit)


== Cmep Keyring 0x601 - ScePspIndividualKeyMeshCert first half (Test Subject 9 PS Vita) ==
== Perconsole Keyslot 0x606 (Test Subject 5) ==
 
* Contains the first half (0x20 bytes) of of the console's [https://www.psdevwiki.com/psp/Kirk#PSP_Individual_Key_Mesh_Certificate ScePspIndividualKeyMeshCert].
* Warning: the dump presented here is byte-swapped.


<pre>
<pre>
B9 18 4E 22 83 8B 91 6D 19 86 72 D5 FB 10 FD A3 <- byte-swapped key_mesh.derivation_seed_1
5E 75 05 CD A7 40 E8 5D 7F 82 B7 EA EA 32 CE 1C
4A 4E 72 CB 02 6E 96 E9 96 B2 C3 23 B9 CF 36 A4 <- byte-swapped key_mesh.derivation_seed_0
66 04 2C E9 E6 B6 F4 F1 DC AA 94 A1 06 B8 32 EF
</pre>
</pre>


== Cmep Keyring 0x602 - ScePspIndividualKeyMeshCert second half (Test Subject 9 PS Vita) ==
== Perconsole Keyslot 0x606 (Test Subject 6) ==
 
* Contains the second half (0x20 bytes) of the console's [https://www.psdevwiki.com/psp/Kirk#PSP_Individual_Key_Mesh_Certificate ScePspIndividualKeyMeshCert].
* Warning: the dump presented here is byte-swapped.


<pre>
<pre>
85 4B 14 AB 00 00 00 00 00 45 72 AC 01 01 08 10 <- byte-swapped hash, byte-swapped reserved, byte-swapped fuse_id
DD DF C7 61 C7 7F AE 89 CF 39 6F BC 30 CF 7F 60 
FF 9A 3E E5 A2 B9 F5 25 32 4D E0 2A 8F B1 8F B9 <- byte-swapped key_mesh.derivation_key
F8 BF BC 24 E1 3F 5A CE 46 50 BC 66 2F 73 AC D4 
</pre>
</pre>


== ScePspIndividualKeyMeshCert (Test Subject 9 PS Vita) ==
== Perconsole Keyslot 0x8 (Test Subject 6) ==


* By byte-swapping keyrings 0x601 and 0x602 or by taking Fuse ID only and running the ScePspIndividualKeyMeshCert generation algorithm (see PSP Jig Kick flashData.prx), we can obtain ScePspIndividualKeyMeshCert.
<pre>
<pre>
A4 36 CF B9 23 C3 B2 96 E9 96 6E 02 CB 72 4E 4A <- key_mesh.derivation_seed_0
D9022A0C0D9DC52A55A162EA23F50A65
A3 FD 10 FB D5 72 86 19 6D 91 8B 83 22 4E 18 B9 <- key_mesh.derivation_seed_1
B9 8F B1 8F 2A E0 4D 32 25 F5 B9 A2 E5 3E 9A FF <- key_mesh.derivation_key
10 08 01 01 AC 72 45 00 00 00 00 00 AB 14 4B 85 <- fuse_id, reserved, hash
</pre>
</pre>


= SUPER KEYS (Dumped by SDBoot glitching) =
== Perconsole Keyslot 0x607 (Test Subject 5) ==
 
== Perconsole Keyslot 0x8 (Test Subject 6) ==


<pre>
<pre>
D9022A0C0D9DC52A55A162EA23F50A65
F5 B1 8E B5 37 DD C4 6F 6B 59 A4 19 AD AB F4 A8
52 02 9A 0E 50 E4 FC 3F F0 93 88 EA E3 34 C7 E3
</pre>
</pre>


== Perconsole Keyslot 0x8 (Test Subject 7) ==
== Perconsole Keyslot 0x607 (Test Subject 6) ==


<pre>
<pre>
A193E1DD073BECDF6720D0616A8E815D
FA 87 A5 75 15 B2 88 60 57 5E 2C 2D 45 7F BA 86 
55 32 A9 74 96 BF D5 B9 E8 D4 CE D7 98 19 40 97
</pre>
</pre>


== Perconsole Keyslot 0x8 (Test Subject 8) ==
= Keys =


<pre>
== Bootrom ==
80D71F18E0A3F393236AE1E875AE3EF8
</pre>


== Perconsole Keyslot 0x9 (Test Subject 6) ==
=== Personalization removal Key for SLSK (Proto) (Perconsole) (Slot 8) (Test Subject 0) ===


<pre>
<pre>
4B0F736E9A1FD865B125B05BC3641EC9
85C688C1B3BACB16EB57B4CC35B7D590
</pre>
</pre>


== Perconsole Keyslot 0x9 (Test Subject 7) ==
* decrypts the .enp (not ._enp!) perconsole layer of an enp file, turning it into an enc file
* algo is aes-128-cbc
 
=== Personalization removal Key for SLSK (Proto) (Perconsole) (Slot 8) (Test Subject 1) ===


<pre>
<pre>
C310134A5F5D825AC5E0BB838BA3E287
8B5415DC7EB5986472BF6B30D8E3E812
</pre>
</pre>


== Perconsole Keyslot 0x9 (Test Subject 8) ==
=== Personalization removal Key for SLSK (Proto) (Perconsole) (Slot 8) (Test Subject 2) ===


<pre>
<pre>
04937A014699DA528E6B0CF7ECCADB78
95B7B3EDB2EF277FB0F78FA3970EE0D0
</pre>
</pre>


== Static Keyslot 0x605 ==
=== Personalization removal Key for SLSK (Proto) (Perconsole) (Slot 8) (Test Subject 3) ===


<pre>
<pre>
3B 39 E9 2E 25 B0 40 38 27 EE 32 D7 D6 49 A8 47
CB0B65F7897F30310471F7CDA2CFD804
D7 F1 1E 24 D0 11 76 0A 79 43 37 D4 F7 40 C9 DF
</pre>
</pre>


* Universal
=== Personalization removal Key for SLSK (Proto) (Perconsole) (Slot 8) (Test Subject 4) ===
 
== Perconsole Keyslot 0x606 (Test Subject 5) ==


<pre>
<pre>
5E 75 05 CD A7 40 E8 5D 7F 82 B7 EA EA 32 CE 1C
F3E408E1EDC3B513277DB99E58A15BE3
66 04 2C E9 E6 B6 F4 F1 DC AA 94 A1 06 B8 32 EF
</pre>
</pre>


== Perconsole Keyslot 0x606 (Test Subject 6) ==
=== Personalization removal IV for SLSK (Proto) (Perconsole) (Slot 8) ===


<pre>
<pre>
DD DF C7 61 C7 7F AE 89 CF 39 6F BC 30 CF 7F 60 
FD4FA8FA4FE79430A0CA305C88E524DD
F8 BF BC 24 E1 3F 5A CE 46 50 BC 66 2F 73 AC D4 
</pre>
</pre>


== Perconsole Keyslot 0x606 (Test Subject 7) ==
=== Personalization removal KEY for SLSK (Proto) (Perconsole) (Slot 9) (JigKick) (Test Subject 0) ===
 
<pre>
<pre>
72 39 DE 10 B7 F1 92 D5 78 E1 03 81 63 7F CF CF 
9E0A8285C3BE83951C78480A7AEC80FD
D4 44 9B 58 A1 7C 97 E5 EC F6 1D 09 40 82 7B B2 
</pre>
</pre>


== Perconsole Keyslot 0x606 (Test Subject 8) ==
=== Personalization removal KEY for SLSK (Proto) (Perconsole) (Slot 9) (JigKick) (Test Subject 1) ===
 
<pre>
<pre>
98 AF 08 AD B7 8A E2 83 0A 31 47 0A FD 00 B2 64 
686268A876650A6A6DC353F69EB82F19
D4 E2 C5 83 E2 14 EB 57 F9 58 CD 54 C4 BA 09 4C
</pre>
</pre>


== Perconsole Keyslot 0x607 (Test Subject 5) ==
=== Personalization removal KEY for SLSK (Proto) (Perconsole) (Slot 9) (JigKick) (Test Subject 2) ===
 
<pre>
<pre>
F5 B1 8E B5 37 DD C4 6F 6B 59 A4 19 AD AB F4 A8
E7A8ADF7B7E2BC26E3445084384FBCE1
52 02 9A 0E 50 E4 FC 3F F0 93 88 EA E3 34 C7 E3
</pre>
</pre>


== Perconsole Keyslot 0x607 (Test Subject 6) ==
=== Personalization removal KEY for SLSK (Proto) (Perconsole) (Slot 9) (JigKick) (Test Subject 3) ===
 
<pre>
<pre>
FA 87 A5 75 15 B2 88 60 57 5E 2C 2D 45 7F BA 86 
736F7501E9A15AB29800113686C946BA
55 32 A9 74 96 BF D5 B9 E8 D4 CE D7 98 19 40 97
</pre>
</pre>


== Perconsole Keyslot 0x607 (Test Subject 7) ==


=== Personalization removal KEY for SLSK (Proto) (Perconsole) (Slot 9) (JigKick) (Test Subject 4)  ===
<pre>
<pre>
7E EE 37 A4 C0 DA C7 D2 0A AA 5E DA 34 17 B4 5C 
BEA39D6443FBACAB05DA62BB95470D57
45 A8 DA 4E FD 40 7D 9D E5 08 53 B4 9A 06 29 43
</pre>
</pre>


== Perconsole Keyslot 0x607 (Test Subject 8) ==
=== Personalization removal IV for SLSK (Proto) (Perconsole) (Slot 9) (JigKick) ===


<pre>
<pre>
6E 1E 68 77 A7 1D 05 8B 97 55 F6 9D 2E 2A 24 1C 
986D5EE1E7759F4F52DB43F33FA5960A
4A 3D B7 E4 3B E8 F0 65 FA A0 8C 20 58 89 3F F2
</pre>
</pre>


= Keys =
=== SLSK SHA256HMAC KEY (NonPerconsole) (Slot 0x20) ===
 
== Bootrom ==
 
=== Personalization removal Key for SLSK (Proto) (Perconsole) (Slot 8) (Test Subject 0) ===


<pre>
<pre>
85C688C1B3BACB16EB57B4CC35B7D590
2E1FC0BF211AEE3977C96F1089A150F5
A3CB9E41314BC39F0CBEC16AF3B0B9AC
</pre>
</pre>


* decrypts the .enp (not ._enp!) perconsole layer of an enp file, turning it into an enc file
* calculates header hmac (0:0x1C0) which is compared against signature at 0x1C0 size 0x100, verified with key 0 from bootrom rsa pairs
* algo is aes-128-cbc
* calculates encrypted body hmac + 0x10 bytes (0x2B0:end_of_body_from_header) verified against hmac at 0x190 (encrypted with double AA key and custom iv from bootrom)
 
=== SLSK Header HMAC/CBC KEY/IV ===


=== Personalization removal Key for SLSK (Proto) (Perconsole) (Slot 8) (Test Subject 1) ===
* key


<pre>
<pre>
8B5415DC7EB5986472BF6B30D8E3E812
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
</pre>
</pre>


=== Personalization removal Key for SLSK (Proto) (Perconsole) (Slot 8) (Test Subject 2) ===
* iv


<pre>
<pre>
95B7B3EDB2EF277FB0F78FA3970EE0D0
EEB5EC5CCF1CF43113F5213AD5B8D6DA
</pre>
</pre>


=== Personalization removal Key for SLSK (Proto) (Perconsole) (Slot 8) (Test Subject 3) ===
* decrypts what's at 0x190 size 0x20 of .enc file using aes 256 cbc
* result will be a hmac calculated with key 2E1FC0BF211AEE3977C96F1089A150F5A3CB9E41314BC39F0CBEC16AF3B0B9AC
* said hmac will be from header size (usually 0x2B0) until header size plus body size (0x2B0 + ???) with body encrypted
 
=== Factory Handshake Key ===


<pre>
<pre>
CB0B65F7897F30310471F7CDA2CFD804
F47716E6C5649FD648538FD9773D12D1
229E118737B1D782D6A80CDB72E4B9C3
</pre>
</pre>


=== Personalization removal Key for SLSK (Proto) (Perconsole) (Slot 8) (Test Subject 4) ===
* Shared with SYSCON
 
=== SLSK IV (Confirmed) ===


<pre>
<pre>
F3E408E1EDC3B513277DB99E58A15BE3
AF5F2CB04AC1751ABF51CEF1C8096210
</pre>
</pre>


=== Personalization removal IV for SLSK (Proto) (Perconsole) (Slot 8) ===
* Used with AA 16x Battery key (AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA) to decrypt SLSK after depersonalization


<pre>
=== Bootrom RSA Key (Fallback for SLSK Validation, all fuses blown) (Proto) ===
FD4FA8FA4FE79430A0CA305C88E524DD
</pre>


=== Personalization removal KEY for SLSK (Proto) (Perconsole) (Slot 9) (JigKick) (Test Subject 0)  ===
<pre>
<pre>
9E0A8285C3BE83951C78480A7AEC80FD
3BD3D7E98A17F359F19E3AF9802B95E9
D6946CA8903136582EFC9C88F4F01E3D
3101E2FA33541A231E4E45F05E8536C6
4D69B60EF4B3004D23AD72BF801B8695
EEA843BE585862A63D6B2BE7F90055A8
C690AECAD63B85EA118A79BBD510156F
53D3B7623811C18F0829364ABAFB1A6C
9D841F20A08831963C0D5B64FB360947
206C748AEFDB1715896BCA4D2980EE22
B0C3243FB73C3F2A0A868C587E57B77A
FEBE2B983046D6428C722319A598A5C6
0EFB9C4E9FDCF793DFA3CDEEC6C8A249
42652531706D6D701B0B0C660E79D241
9D38E1B8E976BD9FB4D4CD1E6F461E86
B295C6FA10D1C7927CB266C08B3025CC
76A4837EF0D8208BBA305059E23DDABC
</pre>
</pre>


=== Personalization removal KEY for SLSK (Proto) (Perconsole) (Slot 9) (JigKick) (Test Subject 1)  ===
=== SLSK Verification RSA Keys ===
<pre>
686268A876650A6A6DC353F69EB82F19
</pre>


=== Personalization removal KEY for SLSK (Proto) (Perconsole) (Slot 9) (JigKick) (Test Subject 2)  ===
<pre>
<pre>
E7A8ADF7B7E2BC26E3445084384FBCE1
CDAE7E886C890F5EC5FF3AB72EE09D4A
</pre>
2369F5593A3BAD32256747103EB173E5
 
9E6EAD3ABD18C0474CF54A09A0500B94
=== Personalization removal KEY for SLSK (Proto) (Perconsole) (Slot 9) (JigKick) (Test Subject 3)  ===
CC20534F04CC8268507F0E3E109307F3
<pre>
4B74885FEA456FBECEE2F04B87FDD1C5
736F7501E9A15AB29800113686C946BA
4784CC79ECF76688CCBCDC18FB36ED20
</pre>
0662C058D91619F3F50E404969A57CE9
1697F907B768094B5F0A683CD72962D6
84A12145CA84DBEE6F4B03D986A19C0E
7CFCBF0006AA492F071662707CF92604
A8B7E6BBFB3FDB66C4E049A4978A523B
D6E521346BA64BD8B050185730B4556E
1678BB9D7384EA0FCE3E509F1227B45F
FC5FBD39C42C628012C22DF47F5D4ADD
C8FF6F6DF11BC1604028141F21224B5F
D323C1F3B7B7DE6C1F1BFC8215C47AB1


2136E5DF66193889419EAE7D7B6AA49B
258D47EBB1C3C1A20737D9400FECCA43
567613B5BED61C9645110A4BEAD9D9DA
CECFED9E87A50422560490F243F53595
08C98FAB44E067FDF86A1F7ECACF9E38
A2ACA19C6740C22742CBB8E7364531CC
39127BB97B18C9E0A3C8AAA44DA6BCA8
59DACBF238B75732C5858C9D73F0415F
ADAEE2224E567670FA7911450495BCC1
C95B69AF831774557890C3DC9EC62BC2
830FC7639156D58A81C83557E080B970
17AF7FD4652BE8DCD1F7A2D622ABC4FC
C65BBA3E466742153CE3AB595C27CC35
BA4719C5D8CB4174229AFD52B0F496A8
8A178FC4FC85290A3C87776131516782
291E56C84D624079DDF2C30C05813BD4


=== Personalization removal KEY for SLSK (Proto) (Perconsole) (Slot 9) (JigKick) (Test Subject 4)  ===
2956BAF256B87660D15B82108D8D516F
<pre>
EFA8C083CFBFD789D24DE45C4B577471
BEA39D6443FBACAB05DA62BB95470D57
CC135976422B66FCB8CDCFA8A1FE89C1
</pre>
FBF425FD672BE4C1A7CF9076ABD5735A
EAC6DFB30E7800FC45AAC29A71E94766
5FF72C8A8E1971EC5A37A4D4255A5A79
C716A404C8CEAB584557B0C927A22C59
B1A530B7B355402229F648A3D53A0E36
DFF42C59E23892978EDC425DD9E3E62C
8940FEF195C87DD5F66BB6A343472139
8A9660B4F4171D6D8869F5E2E467FC4D
262F3A6F0634F0460586156C23C821D0
93C0ABD45AB174B303C1C09A6B3A03C0
4A077C770770EB25652F1CE6EDA6B0A8
CE3033B085EACF8AB3B387F940311DF4
B6DFAEC8A95AFA19EA2FF4F23A6A2FAF


=== Personalization removal IV for SLSK (Proto) (Perconsole) (Slot 9) (JigKick) ===
43CE217A67DCA72211AB644072D251A4
9967A771F98CD1BA4631239EED253F77
56170514BB5DFBE8A4BB7C1ABE6DAD3E
CBECB7DA2174B540CDFE6FF3349EB298
3A6F299237E79CD1270E57598C10B2E6
99C381DBDBFFEE1275A9FBBA81724C9D
CCC18897EDE7FA70F2EA715955DE48A2
B6D0542B736FBDCB51B85D684C5EAD89
1B224EB51D92BB26D5ED5B5EE7E0A837
4F2EE8728B73973CEFB39168D025686E
89A96361BD2279C9DDE0E4A448A572D4
707AB9DE3C7BB3FB67302518DE31CBC9
491BF12F76B681496257AD20BDB8C63A
E44595B82352CDCE00B9850B151BFA3E
81F7197593FDB5DDD562992C21E86A28
E0CE3CA59CB0C6315B06B3483873A3AE


<pre>
493A79509144EF3042D01456727F3E0E
986D5EE1E7759F4F52DB43F33FA5960A
8B652C4B34343EEE9439B36D91FB9037
</pre>
4A4546A405BBFB192751708F54EF23B1
 
F19065F0BB0C306476BEAD56B4601B4A
=== SLSK SHA256HMAC KEY (NonPerconsole) (Slot 0x20) ===
EF947A87E3FE79BAE1AEEE0F695D9A54
E03A60F8A3CDDDAECD9965F193627611
254DD9F02129C51AAE4549B0887FFDE7
5B0790D9FD81D90AAAF1AA364C5A7FC8
B4A5ACD9D3C8F3A6184812745D2F9017
98EF62812907586D6029116379A1E0FF
ACA8C646FB0EA2433703327DEA866A9C
7C63D5D6656F71DD65D79E67969AB256
4F813AEA955E0105F3587B6A28EAD7E6
0A00FEF6DF38CF1735502684F4ED0A81
1BD5A1A076F2DB59280C683D714FC41B
4A5FFC5237E77176056F2843A4E4B8B4


<pre>
DD9B97C1C59C84304950FB578266181A
2E1FC0BF211AEE3977C96F1089A150F5
49E208403BCFA664B705628C94A48223
A3CB9E41314BC39F0CBEC16AF3B0B9AC
7D7E67167D717474A052C03938D1791F
</pre>
6ACED52A4F3F30E2ACE0226E45A5E296
D57D35D8CE3E1953C9290940EDE10CB7
3C9718F2D0D370EA887311D6A0187491
BDBC7301538897C7B76BAAFDE38CBD04
9E35957B0D09438A826E52E15F414A1C
B1CFE4ABC4BEB25133CF8FC15075768A
4FD106E44C7FBAD184E9105CC238CDB9
42B5167DE438425606C03B5C8481E6BC
0AF7F5E183A3B4A6935188968DF8A817
AE06B4CCB6BEE8F989FBD98FAEA40EF4
5F8E207CE3BEF80284CDB7B59075A63D
C59D6B826FB4E72C95206C2BB84D46B3
E60DE3D48EF1366144F3F5B22B599CEC


* calculates header hmac (0:0x1C0) which is compared against signature at 0x1C0 size 0x100, verified with key 0 from bootrom rsa pairs
F7DC3137EC6E0A1F8EC018023AB259F8
* calculates encrypted body hmac + 0x10 bytes (0x2B0:end_of_body_from_header) verified against hmac at 0x190 (encrypted with double AA key and custom iv from bootrom)
C2D6B282CC5A9957B58AFD6E29206B90
C565F9CC4EB14AA2DAA159A5EED38C85
B01AEB1E4F4B3DEC8E0A9A4676515ACC
BD3FA08EDF85F278BD8EF51A7FBDDA96
5B88970DB139F4C9488B0D60ED6F555B
AEF77CFAAB76B4798AC34A02A95D3DAE
A700A9B28F55FCF47554DC10430F7A89
E44FD416C024FC830870710AF42528A1
E3F00BECEF50274A29C31C2E71302E25
077AB07427F09815D5B0D029A57AD69C
044BABF08F9D2764A5E15C25CE53E320
612FC68363A34A52F9A69A9D12F31D3D
C6D6D37C8B8407D9B7178F1EF19AE7C2
B1D5FB7618063AB016DE433800BDD696
6C574EC47FA34A66B0324D39D9F887EA


=== SLSK Header HMAC/CBC KEY/IV ===
53229DFA87ADCDEE652C35A44952A00F
3E4D078C9007C43705477B234ED128E9
03EBA44D0CF85EC26B9057CC38E62778
395C9F5EDFAD71F2CBA30A40806F9225
180958F85FEF21D2419653E780EE74CF
82E6B0B1AF5D2C52ACDCA913FC37BEC7
54BA1BA337EE42F598DC462DB96EEE02
9060ACD6D27E9DD58DB1C36603FD057F
EFD6ECB9977F1EF5486ABA7338A4A1DF
FFD5BFC2796D4469374C61495D62A781
BA97EC2739EA5FDCAC538CE891D900EA
40FC0EDABD7D08000B37419E114766F4
012555D2B097CE780A8B51960F88100E
5AE90798F0076D00959E17FD7416BB0C
002882A1576D8B20A7859E559B4ECE54
1444E86206C77F6FFA43BF7C756B62BA


* key
E1BF0650D31FE12C9DA5024CD4645A0A
 
E96DB6ADDEF787ABA872F3037335249D
<pre>
06FC3B6D03D9B9D5DCFE418F2A37896F
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
B9D758A1549335F5099423EEF0F46B15
</pre>
FB3ADC695A3FC1900665C38C0B4CA12C
725149BF289C50EDDA751AE030A1006B
37C0A4BD8EE780FA9D3E1A97E649A3F8
E8345CA24842D5D1176DB24D98B2FA02
7CF4C898E6E72184B25583E66FC90DD7
85B995D1B6BCCE04D783616808F45810
D3A8B978884A0B22FEE09E2D7318EA02
EA9709589068BBE7A1A3D54D486221AE
7B618AE592FE76494B4434A736FCB10D
3DAB19B0A034235183CAB308334227B7
422D4EA100EB81B34DD698A139FED839
BBDDAF0D06FBCD608A350399C2B5BFE7


* iv
410DCBC7D20513E7DE81D2C3B2F6B3CB
7473FF0D9DA8F8AD3E807A8C48FCC319
4BCAC94497C344844636B35F3922CB80
0F6DD1D7D25929693E94A1C2462B248A
60C2CD1220C8798E45DCE81953FADED3
18F136A550010B9E5AFD4E5B952A2E77
F22026188733C3A1FD128AF89820BA73
A56A23AF49E04F4DED4F78F69196AA88
042335A49C2582068E69A851E1ADF72B
8ACCF7EF2821B7AD776B1C50B4FFC792
B6172CD7188AA31298C42182C634D3D3
AC32A3FFA2C324897645D3EA053D1F8D
68F79CADA1A7802FA16FE7D399475731
CCA4977A9364BB312994F850095BE052
EC0A534029E63CCEA7CD9E43CACEF0B4
AE2429AA9912B7BAE7DCDF00BA9D4ADA


<pre>
6130CB7658FC6EC566D622B55C4F6BEE
EEB5EC5CCF1CF43113F5213AD5B8D6DA
FD4BA5CAF2A4BB5F2E79820B5427CE60
</pre>
1D7E92B80D1566ABED917B412F49A3D8
 
D5129A34B9861C1AEC99906847BAAE94
* decrypts what's at 0x190 size 0x20 of .enc file using aes 256 cbc
F790DACD9F0EFFAB81EEC5687D05003C
* result will be a hmac calculated with key 2E1FC0BF211AEE3977C96F1089A150F5A3CB9E41314BC39F0CBEC16AF3B0B9AC
B748F279727AFE1E4A1FFC07318523B8
* said hmac will be from header size (usually 0x2B0) until header size plus body size (0x2B0 + ???) with body encrypted
E6EBA0EBFF95626E466E6BE41EB7EC09
1A6263C04A92E1924E4D949B305B6F91
EC0FD294876D6548582AE12FF8A39FA0
FCC11B7E7F7AFB3D1DB33A15B1ACBDA5
BE8AE8F76EDA16B3482320B30E752392
F2C465C4A07792340B96072EFBB82B92
05F683AA1AEB69C0980409B1A2120518
63F0DC654CF95AA1A219D09204F4706F
A9D55BC79CBFB26FDC0130155A34B726
E6F168458EE622F725E75C2FB0ABCACA


=== Factory Handshake Key ===
05F244401B5862D742F3732AAB702DA9
AADCB86AFE3E59B1D670670043738940
283609746209898A3D70738A56C7E748
B2471143D84B0A88BD9629198CFCD5E7
D01AD41CEB9A08E081D8F72459C70411
249053AE392DBC284E1F49098A6A06F9
E1D8670B25864B2BF37CD5CFA2B32449
8B42F2DD41ABF081DFBA07061BE4B964
794313997F0D6E0F6BCE5509F87CD4E8
3162B15938BCF989F5F7384559D600C9
EE6C7E2D9ACA36FA3E6EF6C91D98C07A
9E79EE6955E8035CB49FC65EC35F2CF2
12BBABC6C6525A4FDFECC997F1D5E553
536A6FE5338182B4B001ACD49DCB677F
44E7112112EF26B7EAB62B44F91A5B0B
AD28B164530DC3A4FF17DBB976241EC3


<pre>
FBD84775010D95618284570663BA7DDE
F47716E6C5649FD648538FD9773D12D1
36DE981C7641FD35D356B01A1B39ED9A
229E118737B1D782D6A80CDB72E4B9C3
2A6450F61A0F2023CBA098A43DCAC879
</pre>
186AADFDC4BBE687CA8D78D9D62E96C9
3BFA87A8064988C49582AC1FC530330C
716526F440A79E2AFC0EB58F9A123B7D
342A48E5FEA7BEBCD4FFC8CEDF6122FE
3939080A5B8CE8F03869F6447FE1B33A
49B991924DBF8343F3DC72457BAE8CE5
0D291664475A1E6B564A09BE0A7FA279
4C27EBF2580D687E6116F84F1A347DCD
346B1AE3B48ADEC0860C36884653A5A3
9744C2229A85BB72973CB431647C7EB5
0DDD528C09C3C2097D7CD7A6FA28DD6E
8D9D3841CDDD90A413291C73F88523CA
C53618E0483E09BA88CA53FD6DE785CA


* Shared with SYSCON
496905C2DEB8B75852F2C9FB948F5C15
C072C8571E5BC3163FC3FCBDF92E5B5D
BA30D220C185502D7E9E0A83B2AEA098
E1F9507DEF5FD0F129076B3F7E745B44
0A2F56C8DE9591C3BC16F777B0826566
50FA1E85B1D244C0F691E893D7E0D2C3
A15AC56D069ECB0E31897EFB918FDF93
B5FA1ED6DFC7421E5439DA867ABADDEB
B785A6F95CD23B4CA8255C89EF4E8D9A
497FCA1C013B04BC9BEC00B265EBEDC4
FF58E990BEB594C738CA6A601796E0EE
79B1339FF36E0A49AA4984419DB4B233
F761AFA5EE61172DADC669ADA72390B4
7FB83172A975DFD0E4CD04FCA627A5BC
D1B249094673CA74ADF0E6F07BC5706F
9904E7C40C7EA59012BBEF30AAC35DC2


=== SLSK IV (Confirmed) ===
B101B337AE29FA754FD10AF5FFF77B3D
 
F77BB7A317F74801BE38B238CE98020B
<pre>
CA4C9268F837A03E83389EF7BDD9C7A0
AF5F2CB04AC1751ABF51CEF1C8096210
2FE93FF70808240BB634458B01973CD5
</pre>
A0ED95619AA09C4933CA01411B9B26CF
FC633E2880CCD5A3776883CFE329FCD5
6912325EDEF3A61BB4FA5992C7A4CD13
230C1E65E99C1C71F7DDC5486FDEFCD5
632C384C40AE12676C66EBF25B859EDD
3061F8388070A99479A68E5EBC794BC8
7B3D16D8B4969F78A86D06DCE61B1DCC
B07720B84D8972AA2B861B2EB586837C
4422481883B297364C1C763396F94AF3
432B2FC57370311AC1B2857C517EC51E
5D45A31DEF78DC28422539D7A5EAC579
B0EBA8334D836668FA4F3A6FE25DBBAF


* Used with AA 16x Battery key (AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA) to decrypt SLSK after depersonalization
55157A5C49708D923589694220173DE9
A3CE2F96E33963EA87E2067FFC3807DA
AFF11869DFCB2DC208313B7ACCB393D1
44E7D5D50FFFEF11C3DEDC877B028FA4
C4705E723702E28DC84C7E355C120375
3F7DEFC9E38CBD790D4C6C326A9F48E0
8CA66BB18D1AA342B7E62049C63ED76F
07ACEAE7BBDB5076BAA54F2D84E31775
97C02E539A4BC00BFCA54437463EF830
B1AC92BC339A9376F60792D61933C607
8CBD70E0752CC2099F183F6F4C8C7D5C
1DF02E626AD0FD595209EC9235ED63DD
D483EC895F5784D2FE640ABE4BBA2ADF
115EEA30F3C1B405F4A513A581C6333B
9844698FBEC9AD01A2619BFF716703D5
6A69B8EE459A06FD9A61EA1ECDF0E993


=== Bootrom RSA Key (Fallback for SLSK Validation, all fuses blown) (Proto) ===
80D3AF14FBFE8E70BE3DB07595214A90
 
8712B756322A8667DA589F370C3867A6
<pre>
1DF895CD14E53DB0E6479C975C13FFBA
3BD3D7E98A17F359F19E3AF9802B95E9
0C27C40B84168FFFD63CE001D334A4FD
D6946CA8903136582EFC9C88F4F01E3D
D3FC72DD9963AE825F7FD9C5EA1D9924
3101E2FA33541A231E4E45F05E8536C6
1DB1261DD0E31CD94D8F2657D8EC3D93
4D69B60EF4B3004D23AD72BF801B8695
F2F08E3D7DF6FE07ED9FBE87FCEC75EF
EEA843BE585862A63D6B2BE7F90055A8
7E5FA243F5BA24C1B81E121FA07DB901
C690AECAD63B85EA118A79BBD510156F
6A5F33FCE5F23BB89E108BC27718F5EA
53D3B7623811C18F0829364ABAFB1A6C
A09CF686DC15FFDEC0129928680ABE5A
9D841F20A08831963C0D5B64FB360947
336FF78FA69C57741899EF7A238DE1AB
206C748AEFDB1715896BCA4D2980EE22
CD39BD6B23B888A34D7DCDD3F57CD8A5
B0C3243FB73C3F2A0A868C587E57B77A
5D2735973E74F3C416FA1B019515B5B2
FEBE2B983046D6428C722319A598A5C6
CC45367F1E769010A96ACF79B78BB8BF
0EFB9C4E9FDCF793DFA3CDEEC6C8A249
7BE678AEEBA54214F5DBC3B0ED3FEF22
42652531706D6D701B0B0C660E79D241
793C9B3564F9B3B134DC87662C0014A0
9D38E1B8E976BD9FB4D4CD1E6F461E86
B295C6FA10D1C7927CB266C08B3025CC
76A4837EF0D8208BBA305059E23DDABC
</pre>


=== SLSK Verification RSA Keys ===
5BD5F12ABD2413C8E8AC5D8CFC71EF07
 
E0276B083E3A2729EEA5B068F1F85331
<pre>
986420BC576CD005228A4396AF000F4F
CDAE7E886C890F5EC5FF3AB72EE09D4A
95EA10E442844D84EAAD40C95796F705
2369F5593A3BAD32256747103EB173E5
7A5BA3F08ED905E179416E05BABE6D43
9E6EAD3ABD18C0474CF54A09A0500B94
216D5E5F8B346CEF01DD266F5DD2ADF8
CC20534F04CC8268507F0E3E109307F3
F6FB17FB08515B0B752B6A53E09EA007
4B74885FEA456FBECEE2F04B87FDD1C5
FAC79327B53E568FCEF00E2E85D54C1B
4784CC79ECF76688CCBCDC18FB36ED20
6BECD2639F5527F7A6F32A689013A091
0662C058D91619F3F50E404969A57CE9
1F1E011227AB565C4D5ADBF9FF02F15A
1697F907B768094B5F0A683CD72962D6
00429863BA5634B4285CA2F2B5109AF1
84A12145CA84DBEE6F4B03D986A19C0E
A83314D1F3EDA27D8CE9EE568B13A575
7CFCBF0006AA492F071662707CF92604
94630701EA5BC9518339C697341EBCAB
A8B7E6BBFB3FDB66C4E049A4978A523B
6F21B615EC1A93FD141B3190DCB6346C
D6E521346BA64BD8B050185730B4556E
35E7E9C15F468104EEE83771A2FA096C
1678BB9D7384EA0FCE3E509F1227B45F
27E1077F176A6A2B72927126301A91E0
FC5FBD39C42C628012C22DF47F5D4ADD
C8FF6F6DF11BC1604028141F21224B5F
D323C1F3B7B7DE6C1F1BFC8215C47AB1


2136E5DF66193889419EAE7D7B6AA49B
8F9D7AB79E79587837981413153A4531
258D47EBB1C3C1A20737D9400FECCA43
4517E300F97086529D73DD9F2A3AA946
567613B5BED61C9645110A4BEAD9D9DA
29D644DFA9A730C42F3D5865E436FCE6
CECFED9E87A50422560490F243F53595
9A98344EAE3A3B9675CE9DA9F5877820
08C98FAB44E067FDF86A1F7ECACF9E38
78876C7583D4859CE27BC6A0181F070E
A2ACA19C6740C22742CBB8E7364531CC
C12FAEC7943177837A618070D2EBE603
39127BB97B18C9E0A3C8AAA44DA6BCA8
4058F525D70BA7690AA615D2D83B882C
59DACBF238B75732C5858C9D73F0415F
38C70FF2175FD11D89375104E5D59268
ADAEE2224E567670FA7911450495BCC1
114910602E78EEC49DFDB30ED2D32E45
C95B69AF831774557890C3DC9EC62BC2
F39D530F76B5194DEEDAC6AE5BE64473
830FC7639156D58A81C83557E080B970
B287A1D2B3BD78EA498249A4A3F6E944
17AF7FD4652BE8DCD1F7A2D622ABC4FC
4FB4A1E306969B4E61704C39D78DFACE
C65BBA3E466742153CE3AB595C27CC35
985116F83F1B2CB1119798740C059FC5
BA4719C5D8CB4174229AFD52B0F496A8
EB77A8C232EC13A8C004FBE259DDD369
8A178FC4FC85290A3C87776131516782
C3B53CF8E86F2A47B01107C63261EF73
291E56C84D624079DDF2C30C05813BD4
558EA2F03CE2A2E2FB7F4E8141D98206


2956BAF256B87660D15B82108D8D516F
834A3D317CF16E6756DABBE968F733BE
EFA8C083CFBFD789D24DE45C4B577471
A5C954A2CFE5D3D276E0CBC7A225B4E7
CC135976422B66FCB8CDCFA8A1FE89C1
D7877384AD02EA56F09E5C82DF5C236B
FBF425FD672BE4C1A7CF9076ABD5735A
A054420A95F0FA959108032DEB1B7811
EAC6DFB30E7800FC45AAC29A71E94766
037BB91AB52F151D1F760EC949F4C7A1
5FF72C8A8E1971EC5A37A4D4255A5A79
26451A5707F7C5E9F1723D2C8F892A36
C716A404C8CEAB584557B0C927A22C59
C5A0DD4B5750F5DA8A26E3F4F7B2F107
B1A530B7B355402229F648A3D53A0E36
68E00410C84E69039A833153D8DA687A
DFF42C59E23892978EDC425DD9E3E62C
061C6DE184F761BC8771C6909C791AF8
8940FEF195C87DD5F66BB6A343472139
D8D9927048D03600BE531BE3D7D5C51C
8A9660B4F4171D6D8869F5E2E467FC4D
D493B5640F4A7AACDB934797BEEDA10D
262F3A6F0634F0460586156C23C821D0
102DD5329D44BEDA56570752A7BC2A9F
93C0ABD45AB174B303C1C09A6B3A03C0
6F4B5ACA17641CA3ADD546F59A9FBE0B
4A077C770770EB25652F1CE6EDA6B0A8
DE984D1F6A88CA2764676CE785380B41
CE3033B085EACF8AB3B387F940311DF4
71D70E9D083C81D567366B3D951779FC
B6DFAEC8A95AFA19EA2FF4F23A6A2FAF
2C12AEB2A865483145754B79EBA173C8


43CE217A67DCA72211AB644072D251A4
8DE96A5B2F557055A9CB4B4A299E86EF
9967A771F98CD1BA4631239EED253F77
0EF6769415F8CB3A83D514CC3F70008A
56170514BB5DFBE8A4BB7C1ABE6DAD3E
1E090FEB4614201D25B54202A8CB3811
CBECB7DA2174B540CDFE6FF3349EB298
D49DBDAFC4ACE6D63B6E13E67CC9730B
3A6F299237E79CD1270E57598C10B2E6
CAE4A283424BBC14EFD89E72E6513902
99C381DBDBFFEE1275A9FBBA81724C9D
AACB955CB3CCDF4A47B3948A4B0201E7
CCC18897EDE7FA70F2EA715955DE48A2
6BE4F58725AD38C481E67D4060C2D31C
B6D0542B736FBDCB51B85D684C5EAD89
DBC87DBC491114E6A87C45B3EA37A227
1B224EB51D92BB26D5ED5B5EE7E0A837
0C5C941CEE02E8C1BCC29256DD86D0B0
4F2EE8728B73973CEFB39168D025686E
160724EAF49B4363F8F65229B5202D69
89A96361BD2279C9DDE0E4A448A572D4
F1DC00952693B75A8883AE8FF5A6B4B9
707AB9DE3C7BB3FB67302518DE31CBC9
F85367D5EC06AD8AA0C765EC09590543
491BF12F76B681496257AD20BDB8C63A
3DA8897BC46CEC5193C81E39EE0A574B
E44595B82352CDCE00B9850B151BFA3E
CA73FD099805B48477B3887305EDAF9D
81F7197593FDB5DDD562992C21E86A28
E19B36E6DE66691CD0A8EF19ECB45BA2
E0CE3CA59CB0C6315B06B3483873A3AE
898E6D9D4A0C6E678E3BEBAAF44E67BE


493A79509144EF3042D01456727F3E0E
431AF443ACA1049CAF3455F4288D6A4C
8B652C4B34343EEE9439B36D91FB9037
C69307F7BD986F1239F846CAD5EB1CAF
4A4546A405BBFB192751708F54EF23B1
B5F9906E558F087984DDA69DBB43AA7B
F19065F0BB0C306476BEAD56B4601B4A
E8FF00FAD2D02DF4CEE88BF423F51BDA
EF947A87E3FE79BAE1AEEE0F695D9A54
1F1B3944D5A17E74B7EBDEC3ED8A7078
E03A60F8A3CDDDAECD9965F193627611
3EDC9BCBDB76BBFAFB546CF882FE1107
254DD9F02129C51AAE4549B0887FFDE7
9778F5ADE0126F3B357ABD48D6B6EF2C
5B0790D9FD81D90AAAF1AA364C5A7FC8
A0E303D3159E69178C2CAB41F841DE56
B4A5ACD9D3C8F3A6184812745D2F9017
609EC551F154811896907D2B8691D8B8
98EF62812907586D6029116379A1E0FF
360BD8E3062B0A46DF7778BEBA6484E3
ACA8C646FB0EA2433703327DEA866A9C
0701B80610D59E2253AB10DB8D896426
7C63D5D6656F71DD65D79E67969AB256
DD111DBA5F1E31B7761C6A963056C59E
4F813AEA955E0105F3587B6A28EAD7E6
70F74A7CA32DA4CB46518AF2192D0416
0A00FEF6DF38CF1735502684F4ED0A81
E9B93644B03073270DE6BA75816DBB51
1BD5A1A076F2DB59280C683D714FC41B
F8769CF01ABDC46336466C9261597E70
4A5FFC5237E77176056F2843A4E4B8B4
106344EBD0735178E70B83CD4A187EA6


DD9B97C1C59C84304950FB578266181A
283D76AB50F838B41DD94D94D8FF1AFF
49E208403BCFA664B705628C94A48223
23E42CC58BEE0A56ABA29A3151528C3E
7D7E67167D717474A052C03938D1791F
B0281F507A97C79EFA14DF4BC64F3F59
6ACED52A4F3F30E2ACE0226E45A5E296
64EE0076934AFF3375D9E4F04DAE5E14
D57D35D8CE3E1953C9290940EDE10CB7
DF27D3F0054F40201CBBC6BCB75A9655
3C9718F2D0D370EA887311D6A0187491
0A5EAAC417FB605A0014B9205325753C
BDBC7301538897C7B76BAAFDE38CBD04
556328F1F096E5D50D83EB3CB335C453
9E35957B0D09438A826E52E15F414A1C
E0F3B0BBF3B75277B915B7F5E9878DE3
B1CFE4ABC4BEB25133CF8FC15075768A
847DF7AB55C11A75FD5353FD1B38930A
4FD106E44C7FBAD184E9105CC238CDB9
6B27956CCC9505AF49E3B005711FA514
42B5167DE438425606C03B5C8481E6BC
6A4ECB0F506CBADA661D466298EE1433
0AF7F5E183A3B4A6935188968DF8A817
7C27680232FD5510D538160AD27CB490
AE06B4CCB6BEE8F989FBD98FAEA40EF4
1AEDDE48DDD6185FD743B69D9F0454E4
5F8E207CE3BEF80284CDB7B59075A63D
DF723F416684FBFFC73BB09E4588A68B
C59D6B826FB4E72C95206C2BB84D46B3
E8EEA00603D07E4E37E2FA8E61CA97D6
E60DE3D48EF1366144F3F5B22B599CEC
4C3019AD267187CEFB132734825B7640


F7DC3137EC6E0A1F8EC018023AB259F8
BDC147A43A1092A482EC5CCCB6890401
C2D6B282CC5A9957B58AFD6E29206B90
22F9F538433C2EFD9F4D13D5A612ECFF
C565F9CC4EB14AA2DAA159A5EED38C85
5C7A7CFF2E6DAD153A63D0C88E39FBAE
B01AEB1E4F4B3DEC8E0A9A4676515ACC
7ADBF37C540BE6F1F4240566475EC978
BD3FA08EDF85F278BD8EF51A7FBDDA96
1ACA6B4A5FB7AF017A4C5CDFD1503699
5B88970DB139F4C9488B0D60ED6F555B
4F7E4D677B124C602FBD08D952FA7B47
AEF77CFAAB76B4798AC34A02A95D3DAE
3CA989237AB17D48090D9CD1C7CA37DA
A700A9B28F55FCF47554DC10430F7A89
737D596487BAC92E6FFC18F1242F873B
E44FD416C024FC830870710AF42528A1
BED97C92DFF41DC45F73EEFCEAB3EC68
E3F00BECEF50274A29C31C2E71302E25
00321E1FA4B9DE8840B29AD648C8438F
077AB07427F09815D5B0D029A57AD69C
EC18D74088D6E075BB1295869DF5FDA9
044BABF08F9D2764A5E15C25CE53E320
3A89BF187D4CB310EB9B3D3D0666294D
612FC68363A34A52F9A69A9D12F31D3D
D234D4D96ABB1421A94321647E49E418
C6D6D37C8B8407D9B7178F1EF19AE7C2
5295854F89D61886F905304150D418BB
B1D5FB7618063AB016DE433800BDD696
4C80C7C775F12FD51C3F3721237B473D
6C574EC47FA34A66B0324D39D9F887EA
C82F1176221546C6BCC22383CFE63DD8


53229DFA87ADCDEE652C35A44952A00F
8497D52C2C329F399841CAD263BB4D7F
3E4D078C9007C43705477B234ED128E9
640C8B583FC15400FD3CE28EB6F52EC6
03EBA44D0CF85EC26B9057CC38E62778
1E094DD0479201E59FFDAC0B7193DC11
395C9F5EDFAD71F2CBA30A40806F9225
6E98A9C9ABBB729209F5600FCC901990
180958F85FEF21D2419653E780EE74CF
804B691CE39E3CE01F8F0B2238F73C2F
82E6B0B1AF5D2C52ACDCA913FC37BEC7
68747C6E590C30675F15AD230AFFDFB3
54BA1BA337EE42F598DC462DB96EEE02
07AD55B0F6D241AD6C3FCC6903A6B25D
9060ACD6D27E9DD58DB1C36603FD057F
64DCE7F683D23317C3BB8F27D93EC42F
EFD6ECB9977F1EF5486ABA7338A4A1DF
F947AD4115BAFB3DC4C57051F6AD787D
FFD5BFC2796D4469374C61495D62A781
341C716395E8432352776003E375E6AA
BA97EC2739EA5FDCAC538CE891D900EA
E07E2174B75D26C83BC0D96F8E350C4F
40FC0EDABD7D08000B37419E114766F4
F7BAE27584BB6D64BF46AF0C94A6CD56
012555D2B097CE780A8B51960F88100E
2A63807907B0F4F1C90888DB4F5A8E3D
5AE90798F0076D00959E17FD7416BB0C
FFB073F8D7605157FE08916B3390004A
002882A1576D8B20A7859E559B4ECE54
0250F18BC7F05306DFC231E627F010B4
1444E86206C77F6FFA43BF7C756B62BA
E2417DB0C6A3EE785D13F2BD48F1716A


E1BF0650D31FE12C9DA5024CD4645A0A
3D621C703958DC2B8ACF42D385F64927
E96DB6ADDEF787ABA872F3037335249D
1D56AA6077AF74F68E16B54028038A40
06FC3B6D03D9B9D5DCFE418F2A37896F
588E93C26CF3D71386338A4E14132CDA
B9D758A1549335F5099423EEF0F46B15
4E97A73BC3D01CC3A41909570F24BE41
FB3ADC695A3FC1900665C38C0B4CA12C
7663161A5166D2BDBEEA969EA7FF5A5E
725149BF289C50EDDA751AE030A1006B
12B8E7B4AD60E1671A3FFD6105593349
37C0A4BD8EE780FA9D3E1A97E649A3F8
F323EF2610BB4854251B3BAC0B5A1B3E
E8345CA24842D5D1176DB24D98B2FA02
91C1426D9A89AEBDC87F39822F6B331F
7CF4C898E6E72184B25583E66FC90DD7
0793894273CBC60A07F4CB45B5D7B040
85B995D1B6BCCE04D783616808F45810
058DED872952E779BB800F81A57A3995
D3A8B978884A0B22FEE09E2D7318EA02
E319252EA178D2F82ED01656E4BAD172
EA9709589068BBE7A1A3D54D486221AE
2802FE57C656A6F8BD01AD104ADBAF54
7B618AE592FE76494B4434A736FCB10D
E5238F1ADD7AA48968F26F71F187A245
3DAB19B0A034235183CAB308334227B7
14E8C60112A803A4241F9E57E1F7AF6A
422D4EA100EB81B34DD698A139FED839
D18DB03F4A0DCBB7A736EE3CE3876E2A
BBDDAF0D06FBCD608A350399C2B5BFE7
46053A2A12B3088377CC5FE2392938EF


410DCBC7D20513E7DE81D2C3B2F6B3CB
8CB2497089F9F56EF18A21A2B16579E8
7473FF0D9DA8F8AD3E807A8C48FCC319
813C055D93BB8DF483C6786DE063E8F4
4BCAC94497C344844636B35F3922CB80
116C1CBBE2BCC48292999FF2ADD6507B
0F6DD1D7D25929693E94A1C2462B248A
6002E61EE9AB734B89B89EB26377A67E
60C2CD1220C8798E45DCE81953FADED3
F18A3E1AAAEDABAA126E07E59C696503
18F136A550010B9E5AFD4E5B952A2E77
8D3EB0F6FA3FB302E125E34FBFEF01E3
F22026188733C3A1FD128AF89820BA73
D6F599DA74515C72CD33DCD6444A4E9C
A56A23AF49E04F4DED4F78F69196AA88
FEA0F8DE75C7FCA523B4DC6695C30F4D
042335A49C2582068E69A851E1ADF72B
711E50C91441BEEDFA92F4BB93014A77
8ACCF7EF2821B7AD776B1C50B4FFC792
6ED4CD9A0AD9EE1FE3DB222BB93F6D5F
B6172CD7188AA31298C42182C634D3D3
C35F0BFD48380C556778935DF1705E55
AC32A3FFA2C324897645D3EA053D1F8D
15E00783F98814E911842AE9FD45B122
68F79CADA1A7802FA16FE7D399475731
A094EB80910643477FD5CFC60C62F2A4
CCA4977A9364BB312994F850095BE052
10030732E31894420E473CFAA43EBA8B
EC0A534029E63CCEA7CD9E43CACEF0B4
43596E6B06E6CD67BAD69D2943A67D44
AE2429AA9912B7BAE7DCDF00BA9D4ADA
9C9FEFE25732D09B7B993EA16372B71B


6130CB7658FC6EC566D622B55C4F6BEE
EC06D570BEEC94C4CEE301A77504AD00
FD4BA5CAF2A4BB5F2E79820B5427CE60
E7C9F8E2FEDB7DB4F2404EC4605958D0
1D7E92B80D1566ABED917B412F49A3D8
5C799199EFBC7E483A85B7A774651B7B
D5129A34B9861C1AEC99906847BAAE94
EC1107F3C35E5F9623CC1479FA2FCAB2
F790DACD9F0EFFAB81EEC5687D05003C
606C323790EC44B77748216E8E259973
B748F279727AFE1E4A1FFC07318523B8
62CD59F7DB176E40B012C6C252121237
E6EBA0EBFF95626E466E6BE41EB7EC09
451DAB82BCF376741B1F6D0530C58E30
1A6263C04A92E1924E4D949B305B6F91
F97CBFAF81C1D30B3D4476B82FAEC5AF
EC0FD294876D6548582AE12FF8A39FA0
8C79E83EFD53E7C40777D0FE4A2584C0
FCC11B7E7F7AFB3D1DB33A15B1ACBDA5
EEDA30D2E95EFF0D5E74B2D4A7A7FB9F
BE8AE8F76EDA16B3482320B30E752392
B16DCD1FFA3D7A090E4040D74C2D7789
F2C465C4A07792340B96072EFBB82B92
D2C2351634F11395BE1A2E3888048B5D
05F683AA1AEB69C0980409B1A2120518
3E97F9CA56CEF2970EF4D5B047A8BAE8
63F0DC654CF95AA1A219D09204F4706F
FFC67DFE1218C0FA1113C26CF15F7274
A9D55BC79CBFB26FDC0130155A34B726
E5273ED1901FF8A9681B531A66575BDD
E6F168458EE622F725E75C2FB0ABCACA
1C6C8E6BF1FA894B3C67E490AD0478EC


05F244401B5862D742F3732AAB702DA9
795EB5161BAA2FF99377ACC74BA7F7EF
AADCB86AFE3E59B1D670670043738940
79E41D03E8B899E7B0DC3486F33220FD
283609746209898A3D70738A56C7E748
0D008B128F46648DD0311BF3798143C6
B2471143D84B0A88BD9629198CFCD5E7
1F51C08D4A5A942821CE4EF84988B411
D01AD41CEB9A08E081D8F72459C70411
2739D8E6E7186D34084D126B6A4F459F
249053AE392DBC284E1F49098A6A06F9
BD09B5DD34EF00FBB611EB2D312191DB
E1D8670B25864B2BF37CD5CFA2B32449
F4ABF13038833D5DA7327CD9290FFBCE
8B42F2DD41ABF081DFBA07061BE4B964
6CA3F689882D225AE7C40957E9BAD7E2
794313997F0D6E0F6BCE5509F87CD4E8
0E2A4C20664A235F28386EBFF817D077
3162B15938BCF989F5F7384559D600C9
5FAD3151B8E39F3A8CA89A4178FC6520
EE6C7E2D9ACA36FA3E6EF6C91D98C07A
F90E31956A64CEEF68285A391DBD96CD
9E79EE6955E8035CB49FC65EC35F2CF2
1E0FAEE2D027636E50804BC47D23B90A
12BBABC6C6525A4FDFECC997F1D5E553
184193FD28E2EF1CE6F782146E595DB4
536A6FE5338182B4B001ACD49DCB677F
798FDFB8E03625709E9998A0D8EBFE32
44E7112112EF26B7EAB62B44F91A5B0B
6A9204919336D4DF3273CFD6A5B58CAC
AD28B164530DC3A4FF17DBB976241EC3
5C2542CC4B4D89757F010254DB01009B


FBD84775010D95618284570663BA7DDE
677DEFF2D7391FBB6DA67485CB88D76C
36DE981C7641FD35D356B01A1B39ED9A
FABBA7656625D0373C761E294082653E
2A6450F61A0F2023CBA098A43DCAC879
91689D9D9B271EF47170214BCA129392
186AADFDC4BBE687CA8D78D9D62E96C9
B5DB30D1F4B77B1375A45A1BDC2A3A55
3BFA87A8064988C49582AC1FC530330C
2559BD1455D42F1F13CCCF7C2500EFE3
716526F440A79E2AFC0EB58F9A123B7D
2D963059504F0D69FF6BD30CD6A95C1C
342A48E5FEA7BEBCD4FFC8CEDF6122FE
077C149C3A40062A49367B4033B2C80E
3939080A5B8CE8F03869F6447FE1B33A
36A64DE9AA5E01F5A37016D777396A85
49B991924DBF8343F3DC72457BAE8CE5
04B7B3666CCAF1DC911F90C869B199EC
0D291664475A1E6B564A09BE0A7FA279
149BCCED50B19EB32654457712996458
4C27EBF2580D687E6116F84F1A347DCD
34418D27DE5915D074D6E3732A65918C
346B1AE3B48ADEC0860C36884653A5A3
4C1018AA486109C8B1A3335850FEF450
9744C2229A85BB72973CB431647C7EB5
BBA43308D81208C27309549590A3FD02
0DDD528C09C3C2097D7CD7A6FA28DD6E
33E686EF6C1299096D3F8A872196EC36
8D9D3841CDDD90A413291C73F88523CA
0107F6ECFB56299AB71116E775D04742
C53618E0483E09BA88CA53FD6DE785CA
A12D9C23F00051AF37252C85D60DD347


496905C2DEB8B75852F2C9FB948F5C15
606001E3846F3621E8E66CF444D2E20C
C072C8571E5BC3163FC3FCBDF92E5B5D
01ED73AD810421D290D824F9F08EE9A2
BA30D220C185502D7E9E0A83B2AEA098
3DDB41E084520E6073AE5F84926A000C
E1F9507DEF5FD0F129076B3F7E745B44
B53B5B63E1A888F46556D1D916577084
0A2F56C8DE9591C3BC16F777B0826566
9ADF52F1926B6C545CA959CE9800BFE8
50FA1E85B1D244C0F691E893D7E0D2C3
6BFABF64AB5C04F3D41540303489B4FE
A15AC56D069ECB0E31897EFB918FDF93
CD978EDC1DB6DC5C1DA17BFF3AA8FED5
B5FA1ED6DFC7421E5439DA867ABADDEB
407D7336D8027087C553B1E3C15491A1
B785A6F95CD23B4CA8255C89EF4E8D9A
F83FC2615EF7F647DDB9E666DB49EFFD
497FCA1C013B04BC9BEC00B265EBEDC4
CBB08B1DC32773C6F52558C24F467341
FF58E990BEB594C738CA6A601796E0EE
04B0B70938D13314924D5E20FAFA62D7
79B1339FF36E0A49AA4984419DB4B233
85875F49ED6F1B39C7C1C7CB859856EB
F761AFA5EE61172DADC669ADA72390B4
69213CB98BF7665F999FB87CBF7BF87F
7FB83172A975DFD0E4CD04FCA627A5BC
7D7006A2F42DF2B0A8DD7576F895A650
D1B249094673CA74ADF0E6F07BC5706F
79BBD313309FAAEEA24C3A8D3BEC8ABA
9904E7C40C7EA59012BBEF30AAC35DC2
81C3B008BA13765FFC0EEB39D0AFE2CC


B101B337AE29FA754FD10AF5FFF77B3D
71A56CE5AF79188CF70A048E41691F2D
F77BB7A317F74801BE38B238CE98020B
90DE0ABCC6B9CCA235C5C105EC77CD32
CA4C9268F837A03E83389EF7BDD9C7A0
915DA02507F7CF4286C375B2E5EADD0E
2FE93FF70808240BB634458B01973CD5
C01D272D6236D9FCD147F2A84651242F
A0ED95619AA09C4933CA01411B9B26CF
68333929DA8542489F9EA852F160D9D8
FC633E2880CCD5A3776883CFE329FCD5
0D25112F5330F54AE188F9F69823E81E
6912325EDEF3A61BB4FA5992C7A4CD13
C8D96C49FBAE295252047BB6BFE5D175
230C1E65E99C1C71F7DDC5486FDEFCD5
502181DA177BFD8792E4E2205C2D689C
632C384C40AE12676C66EBF25B859EDD
511B792980A78E5F9C12461FC498EF1A
3061F8388070A99479A68E5EBC794BC8
B105A1A8133FFAA93B28B4BAC6604C84
7B3D16D8B4969F78A86D06DCE61B1DCC
196F5DE217D71579B9B58FA214FF52EA
B07720B84D8972AA2B861B2EB586837C
798B258258CBBC4CAA95C6189757ECED
4422481883B297364C1C763396F94AF3
AC373D038B695AF368EE1294655A6F98
432B2FC57370311AC1B2857C517EC51E
C30D291017300033BB5EB4E4703F2337
5D45A31DEF78DC28422539D7A5EAC579
967D0F21ECD5A0FE1DC6782034B7AC34
B0EBA8334D836668FA4F3A6FE25DBBAF
8A0FEAADBC6AA28CB828EF5EC4CFE49C
</pre>


55157A5C49708D923589694220173DE9
* Only first key is used
A3CE2F96E33963EA87E2067FFC3807DA
AFF11869DFCB2DC208313B7ACCB393D1
44E7D5D50FFFEF11C3DEDC877B028FA4
C4705E723702E28DC84C7E355C120375
3F7DEFC9E38CBD790D4C6C326A9F48E0
8CA66BB18D1AA342B7E62049C63ED76F
07ACEAE7BBDB5076BAA54F2D84E31775
97C02E539A4BC00BFCA54437463EF830
B1AC92BC339A9376F60792D61933C607
8CBD70E0752CC2099F183F6F4C8C7D5C
1DF02E626AD0FD595209EC9235ED63DD
D483EC895F5784D2FE640ABE4BBA2ADF
115EEA30F3C1B405F4A513A581C6333B
9844698FBEC9AD01A2619BFF716703D5
6A69B8EE459A06FD9A61EA1ECDF0E993


80D3AF14FBFE8E70BE3DB07595214A90
=== Keyseed 0 (Proto) ===
8712B756322A8667DA589F370C3867A6
1DF895CD14E53DB0E6479C975C13FFBA
0C27C40B84168FFFD63CE001D334A4FD
D3FC72DD9963AE825F7FD9C5EA1D9924
1DB1261DD0E31CD94D8F2657D8EC3D93
F2F08E3D7DF6FE07ED9FBE87FCEC75EF
7E5FA243F5BA24C1B81E121FA07DB901
6A5F33FCE5F23BB89E108BC27718F5EA
A09CF686DC15FFDEC0129928680ABE5A
336FF78FA69C57741899EF7A238DE1AB
CD39BD6B23B888A34D7DCDD3F57CD8A5
5D2735973E74F3C416FA1B019515B5B2
CC45367F1E769010A96ACF79B78BB8BF
7BE678AEEBA54214F5DBC3B0ED3FEF22
793C9B3564F9B3B134DC87662C0014A0


5BD5F12ABD2413C8E8AC5D8CFC71EF07
<pre>
E0276B083E3A2729EEA5B068F1F85331
1EB25643234EF6EF380F9E57A216FA22
986420BC576CD005228A4396AF000F4F
D835FF0508BEBBE97676FA478C29C21D
95EA10E442844D84EAAD40C95796F705
</pre>
7A5BA3F08ED905E179416E05BABE6D43
216D5E5F8B346CEF01DD266F5DD2ADF8
F6FB17FB08515B0B752B6A53E09EA007
FAC79327B53E568FCEF00E2E85D54C1B
6BECD2639F5527F7A6F32A689013A091
1F1E011227AB565C4D5ADBF9FF02F15A
00429863BA5634B4285CA2F2B5109AF1
A83314D1F3EDA27D8CE9EE568B13A575
94630701EA5BC9518339C697341EBCAB
6F21B615EC1A93FD141B3190DCB6346C
35E7E9C15F468104EEE83771A2FA096C
27E1077F176A6A2B72927126301A91E0


8F9D7AB79E79587837981413153A4531
* Encrypt AES256ECB into Slot 8 using slot 0x206
4517E300F97086529D73DD9F2A3AA946
* Obtain PCK Layer Removal SLSK From NAND Key (128 Bit)
29D644DFA9A730C42F3D5865E436FCE6
9A98344EAE3A3B9675CE9DA9F5877820
78876C7583D4859CE27BC6A0181F070E
C12FAEC7943177837A618070D2EBE603
4058F525D70BA7690AA615D2D83B882C
38C70FF2175FD11D89375104E5D59268
114910602E78EEC49DFDB30ED2D32E45
F39D530F76B5194DEEDAC6AE5BE64473
B287A1D2B3BD78EA498249A4A3F6E944
4FB4A1E306969B4E61704C39D78DFACE
985116F83F1B2CB1119798740C059FC5
EB77A8C232EC13A8C004FBE259DDD369
C3B53CF8E86F2A47B01107C63261EF73
558EA2F03CE2A2E2FB7F4E8141D98206


834A3D317CF16E6756DABBE968F733BE
=== Keyseed 1 (Proto) ===
A5C954A2CFE5D3D276E0CBC7A225B4E7
D7877384AD02EA56F09E5C82DF5C236B
A054420A95F0FA959108032DEB1B7811
037BB91AB52F151D1F760EC949F4C7A1
26451A5707F7C5E9F1723D2C8F892A36
C5A0DD4B5750F5DA8A26E3F4F7B2F107
68E00410C84E69039A833153D8DA687A
061C6DE184F761BC8771C6909C791AF8
D8D9927048D03600BE531BE3D7D5C51C
D493B5640F4A7AACDB934797BEEDA10D
102DD5329D44BEDA56570752A7BC2A9F
6F4B5ACA17641CA3ADD546F59A9FBE0B
DE984D1F6A88CA2764676CE785380B41
71D70E9D083C81D567366B3D951779FC
2C12AEB2A865483145754B79EBA173C8


8DE96A5B2F557055A9CB4B4A299E86EF
<pre>
0EF6769415F8CB3A83D514CC3F70008A
50976238EED23234F9C746CCB07D6D71
1E090FEB4614201D25B54202A8CB3811
3F5BA67BC8C097DAE52D8512084683E7
D49DBDAFC4ACE6D63B6E13E67CC9730B
</pre>
CAE4A283424BBC14EFD89E72E6513902
 
AACB955CB3CCDF4A47B3948A4B0201E7
* Encrypt AES256ECB into Slot 9 using slot 0x207
6BE4F58725AD38C481E67D4060C2D31C
* Obtain SLSK ENP DePersonalization Key (JigKick Only) (128bit)
DBC87DBC491114E6A87C45B3EA37A227
0C5C941CEE02E8C1BCC29256DD86D0B0
160724EAF49B4363F8F65229B5202D69
F1DC00952693B75A8883AE8FF5A6B4B9
F85367D5EC06AD8AA0C765EC09590543
3DA8897BC46CEC5193C81E39EE0A574B
CA73FD099805B48477B3887305EDAF9D
E19B36E6DE66691CD0A8EF19ECB45BA2
898E6D9D4A0C6E678E3BEBAAF44E67BE


431AF443ACA1049CAF3455F4288D6A4C
=== Keyseed 2 (Proto) ===
C69307F7BD986F1239F846CAD5EB1CAF
B5F9906E558F087984DDA69DBB43AA7B
E8FF00FAD2D02DF4CEE88BF423F51BDA
1F1B3944D5A17E74B7EBDEC3ED8A7078
3EDC9BCBDB76BBFAFB546CF882FE1107
9778F5ADE0126F3B357ABD48D6B6EF2C
A0E303D3159E69178C2CAB41F841DE56
609EC551F154811896907D2B8691D8B8
360BD8E3062B0A46DF7778BEBA6484E3
0701B80610D59E2253AB10DB8D896426
DD111DBA5F1E31B7761C6A963056C59E
70F74A7CA32DA4CB46518AF2192D0416
E9B93644B03073270DE6BA75816DBB51
F8769CF01ABDC46336466C9261597E70
106344EBD0735178E70B83CD4A187EA6


283D76AB50F838B41DD94D94D8FF1AFF
<pre>
23E42CC58BEE0A56ABA29A3151528C3E
4A41DEDEFFBAC04F52602D0034DAD666
B0281F507A97C79EFA14DF4BC64F3F59
164E3CF1FC23BE4F4D0F8471A7E60563
64EE0076934AFF3375D9E4F04DAE5E14
</pre>
DF27D3F0054F40201CBBC6BCB75A9655
 
0A5EAAC417FB605A0014B9205325753C
* Encrypt AES256ECB into Slot 0x20 with key 0x344
556328F1F096E5D50D83EB3CB335C453
* Obtain SLSK HMAC-SHA256 Key
E0F3B0BBF3B75277B915B7F5E9878DE3
847DF7AB55C11A75FD5353FD1B38930A
6B27956CCC9505AF49E3B005711FA514
6A4ECB0F506CBADA661D466298EE1433
7C27680232FD5510D538160AD27CB490
1AEDDE48DDD6185FD743B69D9F0454E4
DF723F416684FBFFC73BB09E4588A68B
E8EEA00603D07E4E37E2FA8E61CA97D6
4C3019AD267187CEFB132734825B7640


BDC147A43A1092A482EC5CCCB6890401
=== SLSK KEY IVs ===
22F9F538433C2EFD9F4D13D5A612ECFF
5C7A7CFF2E6DAD153A63D0C88E39FBAE
7ADBF37C540BE6F1F4240566475EC978
1ACA6B4A5FB7AF017A4C5CDFD1503699
4F7E4D677B124C602FBD08D952FA7B47
3CA989237AB17D48090D9CD1C7CA37DA
737D596487BAC92E6FFC18F1242F873B
BED97C92DFF41DC45F73EEFCEAB3EC68
00321E1FA4B9DE8840B29AD648C8438F
EC18D74088D6E075BB1295869DF5FDA9
3A89BF187D4CB310EB9B3D3D0666294D
D234D4D96ABB1421A94321647E49E418
5295854F89D61886F905304150D418BB
4C80C7C775F12FD51C3F3721237B473D
C82F1176221546C6BCC22383CFE63DD8


8497D52C2C329F399841CAD263BB4D7F
<pre>
640C8B583FC15400FD3CE28EB6F52EC6
B07FEB18E422167AECDB60A8EE0CA427 Index 0
1E094DD0479201E59FFDAC0B7193DC11
69425551E9AE3945F36873F110FDA6FB Index 1
6E98A9C9ABBB729209F5600FCC901990
1C48B1C8A599CD59C7AECF8E469830BE Index 2
804B691CE39E3CE01F8F0B2238F73C2F
7C598FB45BCF00A9F49E5AFAD3554754 Index 3
68747C6E590C30675F15AD230AFFDFB3
98E3F508D16EF78C8FAE96F4168F20A6 Index 4
07AD55B0F6D241AD6C3FCC6903A6B25D
766410AE5109F2201DDAE41FB07F6EF6 Index 5
64DCE7F683D23317C3BB8F27D93EC42F
</pre>
F947AD4115BAFB3DC4C57051F6AD787D
 
341C716395E8432352776003E375E6AA
=== Auxiliary IVs ===
E07E2174B75D26C83BC0D96F8E350C4F
F7BAE27584BB6D64BF46AF0C94A6CD56
2A63807907B0F4F1C90888DB4F5A8E3D
FFB073F8D7605157FE08916B3390004A
0250F18BC7F05306DFC231E627F010B4
E2417DB0C6A3EE785D13F2BD48F1716A


3D621C703958DC2B8ACF42D385F64927
<pre>
1D56AA6077AF74F68E16B54028038A40
0962939DC5BE560F52F6BB45B34CE097
588E93C26CF3D71386338A4E14132CDA
D46CF82FC8BA5D5B6436F9F7E4E20434
4E97A73BC3D01CC3A41909570F24BE41
EA574C6CB6B11505D5DA35446D187808
7663161A5166D2BDBEEA969EA7FF5A5E
8F62AAEDBD4E025BE6E8FF8E7D654704
12B8E7B4AD60E1671A3FFD6105593349
C898610BF8E6CCC12C9BA48414CC2BCF
F323EF2610BB4854251B3BAC0B5A1B3E
</pre>
91C1426D9A89AEBDC87F39822F6B331F
 
0793894273CBC60A07F4CB45B5D7B040
* Used with other possible keys besides AA key (5 possibilities)
058DED872952E779BB800F81A57A3995
* Never seen used
E319252EA178D2F82ED01656E4BAD172
 
2802FE57C656A6F8BD01AD104ADBAF54
 
E5238F1ADD7AA48968F26F71F187A245
 
14E8C60112A803A4241F9E57E1F7AF6A
== Second Loader ==
D18DB03F4A0DCBB7A736EE3CE3876E2A
46053A2A12B3088377CC5FE2392938EF


8CB2497089F9F56EF18A21A2B16579E8
=== FallBack IDPS and PSID (CEM/DEM) ===
813C055D93BB8DF483C6786DE063E8F4
 
116C1CBBE2BCC48292999FF2ADD6507B
<pre>
6002E61EE9AB734B89B89EB26377A67E
fallback cem idps
F18A3E1AAAEDABAA126E07E59C696503
 
8D3EB0F6FA3FB302E125E34FBFEF01E3
00 00 00 01 01 03 00 10 90 00 00 00 C8 B4 00 CD
D6F599DA74515C72CD33DCD6444A4E9C
FEA0F8DE75C7FCA523B4DC6695C30F4D
711E50C91441BEEDFA92F4BB93014A77
6ED4CD9A0AD9EE1FE3DB222BB93F6D5F
C35F0BFD48380C556778935DF1705E55
15E00783F98814E911842AE9FD45B122
A094EB80910643477FD5CFC60C62F2A4
10030732E31894420E473CFAA43EBA8B
43596E6B06E6CD67BAD69D2943A67D44
9C9FEFE25732D09B7B993EA16372B71B


EC06D570BEEC94C4CEE301A77504AD00
E7C9F8E2FEDB7DB4F2404EC4605958D0
5C799199EFBC7E483A85B7A774651B7B
EC1107F3C35E5F9623CC1479FA2FCAB2
606C323790EC44B77748216E8E259973
62CD59F7DB176E40B012C6C252121237
451DAB82BCF376741B1F6D0530C58E30
F97CBFAF81C1D30B3D4476B82FAEC5AF
8C79E83EFD53E7C40777D0FE4A2584C0
EEDA30D2E95EFF0D5E74B2D4A7A7FB9F
B16DCD1FFA3D7A090E4040D74C2D7789
D2C2351634F11395BE1A2E3888048B5D
3E97F9CA56CEF2970EF4D5B047A8BAE8
FFC67DFE1218C0FA1113C26CF15F7274
E5273ED1901FF8A9681B531A66575BDD
1C6C8E6BF1FA894B3C67E490AD0478EC


795EB5161BAA2FF99377ACC74BA7F7EF
fallback cem psid
79E41D03E8B899E7B0DC3486F33220FD
0D008B128F46648DD0311BF3798143C6
1F51C08D4A5A942821CE4EF84988B411
2739D8E6E7186D34084D126B6A4F459F
BD09B5DD34EF00FBB611EB2D312191DB
F4ABF13038833D5DA7327CD9290FFBCE
6CA3F689882D225AE7C40957E9BAD7E2
0E2A4C20664A235F28386EBFF817D077
5FAD3151B8E39F3A8CA89A4178FC6520
F90E31956A64CEEF68285A391DBD96CD
1E0FAEE2D027636E50804BC47D23B90A
184193FD28E2EF1CE6F782146E595DB4
798FDFB8E03625709E9998A0D8EBFE32
6A9204919336D4DF3273CFD6A5B58CAC
5C2542CC4B4D89757F010254DB01009B


677DEFF2D7391FBB6DA67485CB88D76C
C9 E5 91 3A FD 20 52 AA 4B 85 97 51 24 F7 59 A2
FABBA7656625D0373C761E294082653E
 
91689D9D9B271EF47170214BCA129392
 
B5DB30D1F4B77B1375A45A1BDC2A3A55
fallback dem idps
2559BD1455D42F1F13CCCF7C2500EFE3
 
2D963059504F0D69FF6BD30CD6A95C1C
00 00 00 01 01 00 00 01 00 00 00 01 88 25 9E 0E
077C149C3A40062A49367B4033B2C80E
36A64DE9AA5E01F5A37016D777396A85
04B7B3666CCAF1DC911F90C869B199EC
149BCCED50B19EB32654457712996458
34418D27DE5915D074D6E3732A65918C
4C1018AA486109C8B1A3335850FEF450
BBA43308D81208C27309549590A3FD02
33E686EF6C1299096D3F8A872196EC36
0107F6ECFB56299AB71116E775D04742
A12D9C23F00051AF37252C85D60DD347


606001E3846F3621E8E66CF444D2E20C
01ED73AD810421D290D824F9F08EE9A2
3DDB41E084520E6073AE5F84926A000C
B53B5B63E1A888F46556D1D916577084
9ADF52F1926B6C545CA959CE9800BFE8
6BFABF64AB5C04F3D41540303489B4FE
CD978EDC1DB6DC5C1DA17BFF3AA8FED5
407D7336D8027087C553B1E3C15491A1
F83FC2615EF7F647DDB9E666DB49EFFD
CBB08B1DC32773C6F52558C24F467341
04B0B70938D13314924D5E20FAFA62D7
85875F49ED6F1B39C7C1C7CB859856EB
69213CB98BF7665F999FB87CBF7BF87F
7D7006A2F42DF2B0A8DD7576F895A650
79BBD313309FAAEEA24C3A8D3BEC8ABA
81C3B008BA13765FFC0EEB39D0AFE2CC


71A56CE5AF79188CF70A048E41691F2D
fallback dem psid
90DE0ABCC6B9CCA235C5C105EC77CD32
 
915DA02507F7CF4286C375B2E5EADD0E
71 CB BB DE 6B D4 1B 24 37 A3 6E BA 3E C3 6C 93
C01D272D6236D9FCD147F2A84651242F
68333929DA8542489F9EA852F160D9D8
0D25112F5330F54AE188F9F69823E81E
C8D96C49FBAE295252047BB6BFE5D175
502181DA177BFD8792E4E2205C2D689C
511B792980A78E5F9C12461FC498EF1A
B105A1A8133FFAA93B28B4BAC6604C84
196F5DE217D71579B9B58FA214FF52EA
798B258258CBBC4CAA95C6189757ECED
AC373D038B695AF368EE1294655A6F98
C30D291017300033BB5EB4E4703F2337
967D0F21ECD5A0FE1DC6782034B7AC34
8A0FEAADBC6AA28CB828EF5EC4CFE49C
</pre>
</pre>


* Only first key is used
=== Jig Auth 5 Keys (SharedKeyB SharedDataB related) ===


=== Keyseed 0 (Proto) ===
<pre>
1C7FD39E8D63AA32D386413EE6A01C15C4876BF614CA954E36C1602DD7871C4F KEY
051DFE9D9BEA8087F66EB8F631010D88 IV
</pre>


=== Unknown GCAUTHMGR Key and IV ===
<pre>
<pre>
1EB25643234EF6EF380F9E57A216FA22
821C5714415E9804D6AAE324EB3DDDFE7BB73E8EC0F9E04D3D6D60BCD0CF4EE9
D835FF0508BEBBE97676FA478C29C21D
</pre>
</pre>
* Encrypt AES256ECB into Slot 8 using slot 0x206
* Obtain PCK Layer Removal SLSK From NAND Key (128 Bit)
=== Keyseed 1 (Proto) ===


<pre>
<pre>
50976238EED23234F9C746CCB07D6D71
CEC36FCD7DB3102A80E9C2AA65734FC1
3F5BA67BC8C097DAE52D8512084683E7
</pre>
</pre>


* Encrypt AES256ECB into Slot 9 using slot 0x207
=== SMI Modulus ===
* Obtain SLSK ENP DePersonalization Key (JigKick Only) (128bit)
 
=== Keyseed 2 (Proto) ===


<pre>
<pre>
4A41DEDEFFBAC04F52602D0034DAD666
C618BE3270E1553B2D08660C70000616
164E3CF1FC23BE4F4D0F8471A7E60563
38388DB331BFF30E7DB6334EA8F8F7EB
93540B6624465ABE2AFAF01ACF0B8705
1CBAE118769183B9EA9B09C225A063BA
387A23452BBCDA2949C4ABA0C66A8D1D
0A44A7AE22D1AC449C9EAC5ED79A18AC
1B0691B3451673965ED336C9987EF5B4
2FA6DE995FFD319A629A5E2523164E3F
B9C7BDE7025E839C3B528F53E5ABB077
776C80E1C7A15720CBEA770D7674C9CD
C44559F0ED538DE33F79E9334C62AD81
114B23432D736A89CE7A53FECD50E66E
021F9DCC2B635E33305FD5EA8F15656D
2B00E93BBC78EE97B6BDDDF8EE218289
2D6A739CA1001AD8849F2F0A2550592A
4DA15742BB712E07B7933B8BFE1F2AD1
</pre>
</pre>


* Encrypt AES256ECB into Slot 0x20 with key 0x344
=== SMI (Slot 0x213) ===
* Obtain SLSK HMAC-SHA256 Key
<pre>
310D20077AF3BF121F21D9ADAF389CDA IV First Derivation SMI
 
2F0AEEF98EE3965650F8485E6C0BC2C4 IV First Decryption SMI
 
D9A2CA7FD2E5AA65134CBF9ECF036F8AACE02A42D9187A08717C0255A13AB966 Seed Second Derivation SMI


=== SLSK KEY IVs ===
0F92B97AC4353337FD222A0E7E49EB58 IV Second Derivation SMI


<pre>
69D7618B7DBE7B59C04DEF5169831FBF IV Second Decryption SMI
B07FEB18E422167AECDB60A8EE0CA427 Index 0
69425551E9AE3945F36873F110FDA6FB Index 1
1C48B1C8A599CD59C7AECF8E469830BE Index 2
7C598FB45BCF00A9F49E5AFAD3554754 Index 3
98E3F508D16EF78C8FAE96F4168F20A6 Index 4
766410AE5109F2201DDAE41FB07F6EF6 Index 5
</pre>
</pre>


=== Auxiliary IVs ===
=== Other Keys/IVs ===


<pre>
<pre>
0962939DC5BE560F52F6BB45B34CE097
62FC3C4751B32657E71E89ECE4324BE3 (Internal) (Introduced in 0.920I, removed in 0.995I, qa flag related?)
D46CF82FC8BA5D5B6436F9F7E4E20434
EA574C6CB6B11505D5DA35446D187808
8F62AAEDBD4E025BE6E8FF8E7D654704
C898610BF8E6CCC12C9BA48414CC2BCF
</pre>
</pre>


* Used with other possible keys besides AA key (5 possibilities)
=== Secure Kernel XXX Proto Keys ===
* Never seen used


* Algorithm is AES 256 CBC
* IV is all zeroes


==== External ====


== Second Loader ==
<pre>
992EF70868DE1B219EC3618FA79DAEC39067FE5638116C29FC0FF7E2A58FBD9E
</pre>


=== FallBack IDPS and PSID (CEM/DEM) ===
==== Internal ====


<pre>
<pre>
fallback cem idps
AC78EE86799148699B9CB3F5C6CAB73A6AC45EB11F44E9151232CF8F123C7D88
</pre>


00 00 00 01 01 03 00 10 90 00 00 00 C8 B4 00 CD
== AIMGR ==


* All these seem to be fallback keys in case keyslot 0 (aka pck0) fails to decrypt the idstorage enc_cmac located at cert + 0xD8


fallback cem psid
* algo used is aes-128-ecb-dec


C9 E5 91 3A FD 20 52 AA 4B 85 97 51 24 F7 59 A2
* used together with keyslot 0x212 for cmac


<pre>
7BB73E8EC0F9E04D3D6D60BCD0CF4EE9


fallback dem idps
CEC36FCD7DB3102A80E9C2AA65734FC1


00 00 00 01 01 00 00 01 00 00 00 01 88 25 9E 0E
89398ED8AE6FB3B0519485893AD0E5F3


33B90F7B250879F87DB269CFC4E7FB35
</pre>


fallback dem psid
* This seems to be used to derive decryption for the certificate from idstorage


71 CB BB DE 6B D4 1B 24 37 A3 6E BA 3E C3 6C 93
* used with slot 0x204 (likely iv for aes-256 master key)
</pre>
 
=== Jig Auth 5 Keys (SharedKeyB SharedDataB related) ===


<pre>
<pre>
1C7FD39E8D63AA32D386413EE6A01C15C4876BF614CA954E36C1602DD7871C4F KEY
821C5714415E9804D6AAE324EB3DDDFE
051DFE9D9BEA8087F66EB8F631010D88 IV
</pre>
</pre>
=== PSN Keys ===
==== X-I-4-Passphrase ====


=== SMI Modulus ===
used to aes-128-cbc encrypt X-I-4-Passphrase header of PSN authentication request:


- Version 1 (used until 3.63)
<pre>
<pre>
C618BE3270E1553B2D08660C70000616
EA35FA34B747929A540219DBA2DA001F
38388DB331BFF30E7DB6334EA8F8F7EB
93540B6624465ABE2AFAF01ACF0B8705
1CBAE118769183B9EA9B09C225A063BA
387A23452BBCDA2949C4ABA0C66A8D1D
0A44A7AE22D1AC449C9EAC5ED79A18AC
1B0691B3451673965ED336C9987EF5B4
2FA6DE995FFD319A629A5E2523164E3F
B9C7BDE7025E839C3B528F53E5ABB077
776C80E1C7A15720CBEA770D7674C9CD
C44559F0ED538DE33F79E9334C62AD81
114B23432D736A89CE7A53FECD50E66E
021F9DCC2B635E33305FD5EA8F15656D
2B00E93BBC78EE97B6BDDDF8EE218289
2D6A739CA1001AD8849F2F0A2550592A
4DA15742BB712E07B7933B8BFE1F2AD1
</pre>
</pre>
 
- Version 2 (used 3.63 onwards)
=== SMI (Slot 0x213) ===
<pre>
<pre>
310D20077AF3BF121F21D9ADAF389CDA IV First Derivation SMI
886073DE0511F0581792DC66FD6CA6AF
</pre>


2F0AEEF98EE3965650F8485E6C0BC2C4 IV First Decryption SMI
notes:
the IV is all 0 in both cases
PSN will still accept a version 1 passphrase which is how henkaku psn spoof works


D9A2CA7FD2E5AA65134CBF9ECF036F8AACE02A42D9187A08717C0255A13AB966 Seed Second Derivation SMI
==== X-I-4-Passphrase HMAC ====
used to generate the HMAC signature for X-I-4-Passphrase
<pre>
4D3E171CFB60DF96D1AFA6E76FEBFB5C079A5D177919C3EF417BAFA23A0B0DE2036624F0C87A8D3659DAE19E77195146B11A767D8A35A8610D301A79BBA9342D
</pre>


0F92B97AC4353337FD222A0E7E49EB58 IV Second Derivation SMI
== Communication Processor ==


69D7618B7DBE7B59C04DEF5169831FBF IV Second Decryption SMI
=== ES2 fsimage1.trf Pub ===
</pre>
 
=== Other Keys/IVs ===


<pre>
<pre>
62FC3C4751B32657E71E89ECE4324BE3 (Internal) (Introduced in 0.920I, removed in 0.995I, qa flag related?)
A9 69 7F 9D 93 43 CA DE 68 E0 4F 9E 35 6E 6A B6
BB C7 DE 36 A4 D8 1B 98 A8 3B C1 2B E3 F6 DF 96
ED 7A 64 38 94 56 AC A9 33 BE BF BA 4F FE F0 5C
F4 5F 2F 88 6F 43 4F BB C3 A0 13 48 53 30 70 C0
B7 D5 E9 C2 1E FE 53 E9 5A 60 19 DB 51 C1 2C 6B
AF EB 94 E9 92 28 79 63 44 8E 59 60 63 84 B9 9F
3F F3 E5 EB 6A A0 8B F3 2A 4D BA 7A 31 25 20 CE
C2 B6 9B B2 0A 6D 06 40 B1 17 17 0A A2 DD A1 FB
59 0A EE 7A DF C4 E8 0D FC F2 7F A5 5D DE C9 2C
07 92 2F DD 05 AB 16 18 DC B7 27 AA 6F F7 00 27
A9 41 0B C8 45 E5 0E AF D4 6C 0F D9 2F F5 00 67
2D E5 64 89 C6 69 B0 AA 48 1F FD 75 E9 9E 21 A8
DC 2F 9F 9E 87 95 7B 46 BB F6 3F B7 DD BE 8B 8C
A8 61 BA 34 9A 62 45 8E 85 5E E7 8C 3D D6 79 1F
92 E7 64 22 14 4E 51 29 5B 13 37 E1 5C 12 6D F6
FA 0C 29 32 1B C1 D7 C0 0E 3C 19 EE F3 A3 E7 A5
</pre>
</pre>


=== Secure Kernel XXX Proto Keys ===
=== ES2 CPUP Pub ===


* Algorithm is AES 256 CBC
<pre>
* IV is all zeroes
A7 CC AE 0F 50 11 88 52 7B F3 DA CC A3 E2 31 C8
D8 70 1E 7B 91 92 73 90 70 1D E5 E7 A9 63 27 DA
D8 71 67 A8 F0 13 68 AD DF E4 90 E3 25 A2 90 53
36 97 05 8F BA 77 57 66 69 80 10 AF D8 FD 7A 3F
FD 26 5E 0A 52 FE 04 92 8B CE 8B 43 02 F4 C7 0F
FA C3 C9 39 7F D2 4B 10 62 71 E5 7B DA 20 D2 D7
02 29 8F 6F 99 0E CF 9B 0F E0 4F F6 CC EE 17 0B
55 53 04 23 20 12 D7 8E 60 19 DA B2 97 63 82 9E
6A F5 AD A8 02 20 4F A5 51 63 11 79 CB FE 61 64
73 26 62 E8 57 67 41 94 9B B1 36 45 6C 11 DE 35
5F 48 72 11 D2 30 26 7D C0 5E 69 9A 26 52 AD 5C
6D 74 B0 56 83 26 F4 F2 F5 B8 6A D9 56 E9 44 04
D3 A6 59 28 F4 EA 21 89 56 7C E9 98 99 11 B0 48
08 51 7F 4C 76 A8 B2 5D F1 D6 AB BE 85 95 C4 69
BF D7 E8 70 C4 F0 0A 89 61 0C 2C 9B 79 F6 25 A4
2C A2 B4 C6 B8 D3 7E 62 CE 9E C6 1A 85 6F D3 2F
</pre>
 
=== NBL Configs ===


==== External ====
==== Key ====


<pre>
<pre>
992EF70868DE1B219EC3618FA79DAEC39067FE5638116C29FC0FF7E2A58FBD9E
3C 97 EB 60 B2 06 80 E9 5E B7 00 13 11 96 5F AE
</pre>
</pre>


==== Internal ====
==== IV ====
 
<pre>
<pre>
AC78EE86799148699B9CB3F5C6CAB73A6AC45EB11F44E9151232CF8F123C7D88
4D 8A C9 0A E0 B3 C1 30 46 31 A8 6D 56 32 02 70
</pre>
</pre>


== GcAuthMgr ==
=== Deobfuscated blob ===
=== Master Key Seeds ===
As part of gc authentication, some keys are derived using these key seeds
& 0x345 and 0x348 bbmac.
different key seeds are used depending on the key id used by the gamecart.


==== KeyID 0x1 ====
KEYSEED:
<pre>
<pre>
7f1fd065dd2f40b3e26579a6390b616d
4D 8A C9 0A E0 B3 C1 30 46 31 A8 6D 56 32 02 70 iv  blob01 aes-128-cbc
</pre>
3C 97 EB 60 B2 06 80 E9 5E B7 00 13 11 96 5F AE key blob01 aes-128-cbc
IV:
 
<pre>
A9 69 7F 9D 93 43 CA DE 68 E0 4F 9E 35 6E 6A B6 fs1 rsa
8b14c8a1e96f30a7f101a96a3033c55b
BB C7 DE 36 A4 D8 1B 98 A8 3B C1 2B E3 F6 DF 96 fs1
</pre>
ED 7A 64 38 94 56 AC A9 33 BE BF BA 4F FE F0 5C fs1
==== KeyID 0x8001 ====
F4 5F 2F 88 6F 43 4F BB C3 A0 13 48 53 30 70 C0 fs1
KEYSEED:
B7 D5 E9 C2 1E FE 53 E9 5A 60 19 DB 51 C1 2C 6B fs1
<pre>
AF EB 94 E9 92 28 79 63 44 8E 59 60 63 84 B9 9F fs1
6f2285ed463a6e57c5f3550ddcc81feb
3F F3 E5 EB 6A A0 8B F3 2A 4D BA 7A 31 25 20 CE fs1
</pre>
C2 B6 9B B2 0A 6D 06 40 B1 17 17 0A A2 DD A1 FB fs1
==== KeyID 0x8002 ====
59 0A EE 7A DF C4 E8 0D FC F2 7F A5 5D DE C9 2C fs1
KEYSEED:
07 92 2F DD 05 AB 16 18 DC B7 27 AA 6F F7 00 27 fs1
<pre>
A9 41 0B C8 45 E5 0E AF D4 6C 0F D9 2F F5 00 67 fs1
da9608b528825d6d13a7af1446b8ec08
2D E5 64 89 C6 69 B0 AA 48 1F FD 75 E9 9E 21 A8 fs1
</pre>
DC 2F 9F 9E 87 95 7B 46 BB F6 3F B7 DD BE 8B 8C fs1
==== KeyID 0x8003 ====
A8 61 BA 34 9A 62 45 8E 85 5E E7 8C 3D D6 79 1F fs1
KEYSEED:
92 E7 64 22 14 4E 51 29 5B 13 37 E1 5C 12 6D F6 fs1
<pre>
FA 0C 29 32 1B C1 D7 C0 0E 3C 19 EE F3 A3 E7 A5 fs1 rsa
368b2eb5437a821862a6c95596d8c135
</pre>
=== Unknown GcAuthMgr Key and IV ===
<pre>
821C5714415E9804D6AAE324EB3DDDFE7BB73E8EC0F9E04D3D6D60BCD0CF4EE9
</pre>


<pre>
68 48 3F BB 69 F1 04 A3 CB 0A D8 18 7F 90 0B 12
CEC36FCD7DB3102A80E9C2AA65734FC1
89 6F F0 68 51 B5 51 CC 75 B9 C7 01 4D B1 8F A9
0A 82 27 97 B6 CC 1D C0 2B CD 68 8E 91 C6 22 64
1B F4 36 ED 32 2D D4 F0 D2 CD C1 7F 20 35 AA 0B
F4 E0 8D 02 49 BF EE 25 52 90 AC E9 40 C4 69 27
E0 C9 DF 3D 3A A0 62 98 4E B6 D3 77 41 5C C4 09
3F B8 3E 20 28 65 2D 80 70 C5 25 4A CA 0B CA D0
A7 C3 3A DC 90 EF 6B 66 D2 CD F5 0B A3 CC A0 E2
29 9E 38 D2 76 11 66 B9 2C 28 7F 75 1F 94 FF 06
74 18 EA A9 D7 C9 EF 9A 26 3D 42 8C 23 33 0D 27
41 42 67 E7 DB BC A6 B7 07 F8 C3 3D 9F 06 B0 3E
CB 45 3F A6 40 22 28 A4 0A 13 8A 49 68 F3 F0 72
94 EA D9 E8 55 37 CF 8D 43 AD AF EC 51 87 40 D4
D4 D5 A5 4B AE 14 27 7E FB 42 F9 C7 81 4E 1E E5
</pre>
</pre>


== Ernie ==


== KPRX_AUTH ==
=== Security ID (RL78) ===
keys part of kprx_auth_sm


=== Bind Data HMAC Key ===
used for ksceSblAuthMgrDecBindData
<pre>
<pre>
901a84fb13a744a378c5018a60f58c22
00 00 00 00 00 00 00 00 00 00 (it's blank LMAO)
</pre>
</pre>
HMAC-SHA256 using this key
result is the key to aes-cbc-decrypt bind data
first 0x10 is key, last 0x10 is iv.


== AIMGR ==
=== Ernie Update AES128CBC Key 0x10/0x30/0x31/0x40/0x41 (PHAT) ===


* All these seem to be fallback keys in case keyslot 0 (aka pck0) fails to decrypt the idstorage enc_cmac located at cert + 0xD8
<pre>
key: 12B5408FD189E223B61890F488536008
iv : 82D6528A87BC55B38EF29A45730EF130
</pre>


* algo used is aes-128-ecb-dec
* supports type 0
* for block size 0x400 ONLY (block size 0x800 not supported)


* used together with keyslot 0x212 for cmac
=== Ernie Updater AES128CBC Key 0x10/0x30/0x31/0x40/0x41 (PHAT) ===


<pre>
<pre>
7BB73E8EC0F9E04D3D6D60BCD0CF4EE9
key: EAE43A1C48CD32A565E2CA7D8F9018DC
iv: C9D9619CA151342D04602ECF0B8D6E33
</pre>


CEC36FCD7DB3102A80E9C2AA65734FC1
* supports type 0
* for block size 0x400 ONLY (block size 0x800 not supported)
* for updater and confzz firmwares ONLY
* location: around 0xFXXX of syscon firmware


89398ED8AE6FB3B0519485893AD0E5F3
=== Ernie Update AES128CBC Key 0x60 (PHAT) ===


33B90F7B250879F87DB269CFC4E7FB35
<pre>
key: 8C9ED3908C4143AE02855794C025BE1A
iv : C85AE1576D5E205FE8043573F55F4E11
</pre>
</pre>


* This seems to be used to derive decryption for the certificate from idstorage
* supports type 0
* location: around 0xFXXX in syscon firmware


* used with slot 0x204 (likely iv for aes-256 master key)
=== Ernie Updater AES128CBC Key 0x60 (PHAT) ===


<pre>
<pre>
821C5714415E9804D6AAE324EB3DDDFE
key: 7014BEE6136725B9FFBE9A8614DD5C2A
iv: FBD11DF2E0AAEE0B9C3738163CB8B6BD
</pre>
</pre>
=== PSN Keys ===
==== X-I-4-Passphrase ====


used to aes-128-cbc encrypt X-I-4-Passphrase header of PSN authentication request:
* supports type 0
* for updater and confzz firmwares ONLY
 
=== Ernie Update AES128CBC Key 0x70/0x72 (PSTV) ===


- Version 1 (used until 3.63)
<pre>
<pre>
EA35FA34B747929A540219DBA2DA001F
key: 67C34253A7DE13517EC903FE1119C04C
iv : DB302673D69F0D513A635E68A470F9C1
</pre>
</pre>
- Version 2 (used 3.63 onwards)
 
* aka the key for the meaning of life, universe and everything else
* supports type 6 and 7
 
=== Ernie Updater AES128CBC Key 0x70/0x72 (PSTV) ===
 
<pre>
<pre>
886073DE0511F0581792DC66FD6CA6AF
key: BE01B7FA1EC3ED641879DDE44D60486E
iv : 671A74C7E50F25CF64D4341039C78705
</pre>
</pre>


notes:
* aka the key for the meaning of life, universe and everything else
the IV is all 0 in both cases
* supports type 6 and 7
PSN will still accept a version 1 passphrase which is how henkaku psn spoof works
* for updater and confzz firmwares ONLY
 
=== Ernie Update AES128CBC Key 0x80/0x82 (PS Vita SLIM) ===


==== X-I-4-Passphrase HMAC ====
used to generate the HMAC signature for X-I-4-Passphrase
<pre>
<pre>
4D3E171CFB60DF96D1AFA6E76FEBFB5C079A5D177919C3EF417BAFA23A0B0DE2036624F0C87A8D3659DAE19E77195146B11A767D8A35A8610D301A79BBA9342D
key: 523BEB53FCB95DC772AA1BFB0A96CD10
iv : 385D67E50CE7669ECD171FE576814343
</pre>
</pre>


== Communication Processor ==
* supports type 5 and 8


=== ES2 fsimage1.trf Pub ===
=== Ernie Updater AES128CBC Key 0x80/0x82 (PS Vita SLIM) ===


<pre>
<pre>
A9 69 7F 9D 93 43 CA DE 68 E0 4F 9E 35 6E 6A B6
key: DBD9450ACCA8544895663A6F472BDE7F
BB C7 DE 36 A4 D8 1B 98 A8 3B C1 2B E3 F6 DF 96
iv : F927C6A1153DB2D65F736C3AD9E1CE76
ED 7A 64 38 94 56 AC A9 33 BE BF BA 4F FE F0 5C
F4 5F 2F 88 6F 43 4F BB C3 A0 13 48 53 30 70 C0
B7 D5 E9 C2 1E FE 53 E9 5A 60 19 DB 51 C1 2C 6B
AF EB 94 E9 92 28 79 63 44 8E 59 60 63 84 B9 9F
3F F3 E5 EB 6A A0 8B F3 2A 4D BA 7A 31 25 20 CE
C2 B6 9B B2 0A 6D 06 40 B1 17 17 0A A2 DD A1 FB
59 0A EE 7A DF C4 E8 0D FC F2 7F A5 5D DE C9 2C
07 92 2F DD 05 AB 16 18 DC B7 27 AA 6F F7 00 27
A9 41 0B C8 45 E5 0E AF D4 6C 0F D9 2F F5 00 67
2D E5 64 89 C6 69 B0 AA 48 1F FD 75 E9 9E 21 A8
DC 2F 9F 9E 87 95 7B 46 BB F6 3F B7 DD BE 8B 8C
A8 61 BA 34 9A 62 45 8E 85 5E E7 8C 3D D6 79 1F
92 E7 64 22 14 4E 51 29 5B 13 37 E1 5C 12 6D F6
FA 0C 29 32 1B C1 D7 C0 0E 3C 19 EE F3 A3 E7 A5
</pre>
</pre>


=== ES2 CPUP Pub ===
* supports type 5 and 8
* for updater and confzz firmwares ONLY


=== SERVICE 0x900 PASSPHRASE ===
<pre>
<pre>
A7 CC AE 0F 50 11 88 52 7B F3 DA CC A3 E2 31 C8
93CE8EBEDF7F69A96F35DDE3BECB97D5
D8 70 1E 7B 91 92 73 90 70 1D E5 E7 A9 63 27 DA
D8 71 67 A8 F0 13 68 AD DF E4 90 E3 25 A2 90 53
36 97 05 8F BA 77 57 66 69 80 10 AF D8 FD 7A 3F
FD 26 5E 0A 52 FE 04 92 8B CE 8B 43 02 F4 C7 0F
FA C3 C9 39 7F D2 4B 10 62 71 E5 7B DA 20 D2 D7
02 29 8F 6F 99 0E CF 9B 0F E0 4F F6 CC EE 17 0B
55 53 04 23 20 12 D7 8E 60 19 DA B2 97 63 82 9E
6A F5 AD A8 02 20 4F A5 51 63 11 79 CB FE 61 64
73 26 62 E8 57 67 41 94 9B B1 36 45 6C 11 DE 35
5F 48 72 11 D2 30 26 7D C0 5E 69 9A 26 52 AD 5C
6D 74 B0 56 83 26 F4 F2 F5 B8 6A D9 56 E9 44 04
D3 A6 59 28 F4 EA 21 89 56 7C E9 98 99 11 B0 48
08 51 7F 4C 76 A8 B2 5D F1 D6 AB BE 85 95 C4 69
BF D7 E8 70 C4 F0 0A 89 61 0C 2C 9B 79 F6 25 A4
2C A2 B4 C6 B8 D3 7E 62 CE 9E C6 1A 85 6F D3 2F
</pre>
</pre>


=== NBL Configs ===
=== BStoBSid Key ===
<pre>
46B532E3F012E663C0694ECA7C8C58B7
</pre>
 
=== First Loader Jig Handshake Key ===


==== Key ====
Also known as g_debug_challenge_key. See [https://wiki.henkaku.xyz/vita/Enc#Secret_debug_mode].


AES256ECB Key:
<pre>
<pre>
3C 97 EB 60 B2 06 80 E9 5E B7 00 13 11 96 5F AE
F47716E6C5649FD648538FD9773D12D1
229E118737B1D782D6A80CDB72E4B9C3
</pre>
</pre>


==== IV ====
=== Supported Keysets by Ernie ===
<pre>
<pre>
4D 8A C9 0A E0 B3 C1 30 46 31 A8 6D 56 32 02 70
0, 1, 0xB, 0xE, 0xF
</pre>
</pre>


=== Deobfuscated blob ===
=== Ernie Handshake Keysets ===
 
These keysets are stored on each side (Ernie firmware and cMeP binaries).
 
==== Keyset 0x0 ====
 
===== SharedData_0 =====
<pre>
80996FBBC8B4EBA30595F4D379A23BD0
</pre>


===== SharedKey_0_A =====
<pre>
<pre>
4D 8A C9 0A E0 B3 C1 30 46 31 A8 6D 56 32 02 70 iv  blob01 aes-128-cbc
EF685D2E33C7D029A1A2EE646BE39D41
3C 97 EB 60 B2 06 80 E9 5E B7 00 13 11 96 5F AE key blob01 aes-128-cbc
</pre>


A9 69 7F 9D 93 43 CA DE 68 E0 4F 9E 35 6E 6A B6 fs1 rsa
===== SharedKey_0_B =====
BB C7 DE 36 A4 D8 1B 98 A8 3B C1 2B E3 F6 DF 96 fs1
<pre>
ED 7A 64 38 94 56 AC A9 33 BE BF BA 4F FE F0 5C fs1
CE7867DE57575C008D998281E8DA5912
F4 5F 2F 88 6F 43 4F BB C3 A0 13 48 53 30 70 C0 fs1
B7 D5 E9 C2 1E FE 53 E9 5A 60 19 DB 51 C1 2C 6B fs1
AF EB 94 E9 92 28 79 63 44 8E 59 60 63 84 B9 9F fs1
3F F3 E5 EB 6A A0 8B F3 2A 4D BA 7A 31 25 20 CE fs1
C2 B6 9B B2 0A 6D 06 40 B1 17 17 0A A2 DD A1 FB fs1
59 0A EE 7A DF C4 E8 0D FC F2 7F A5 5D DE C9 2C fs1
07 92 2F DD 05 AB 16 18 DC B7 27 AA 6F F7 00 27 fs1
A9 41 0B C8 45 E5 0E AF D4 6C 0F D9 2F F5 00 67 fs1
2D E5 64 89 C6 69 B0 AA 48 1F FD 75 E9 9E 21 A8 fs1
DC 2F 9F 9E 87 95 7B 46 BB F6 3F B7 DD BE 8B 8C fs1
A8 61 BA 34 9A 62 45 8E 85 5E E7 8C 3D D6 79 1F fs1
92 E7 64 22 14 4E 51 29 5B 13 37 E1 5C 12 6D F6 fs1
FA 0C 29 32 1B C1 D7 C0 0E 3C 19 EE F3 A3 E7 A5 fs1 rsa
 
68 48 3F BB 69 F1 04 A3 CB 0A D8 18 7F 90 0B 12
89 6F F0 68 51 B5 51 CC 75 B9 C7 01 4D B1 8F A9
0A 82 27 97 B6 CC 1D C0 2B CD 68 8E 91 C6 22 64
1B F4 36 ED 32 2D D4 F0 D2 CD C1 7F 20 35 AA 0B
F4 E0 8D 02 49 BF EE 25 52 90 AC E9 40 C4 69 27
E0 C9 DF 3D 3A A0 62 98 4E B6 D3 77 41 5C C4 09
3F B8 3E 20 28 65 2D 80 70 C5 25 4A CA 0B CA D0
A7 C3 3A DC 90 EF 6B 66 D2 CD F5 0B A3 CC A0 E2
29 9E 38 D2 76 11 66 B9 2C 28 7F 75 1F 94 FF 06
74 18 EA A9 D7 C9 EF 9A 26 3D 42 8C 23 33 0D 27
41 42 67 E7 DB BC A6 B7 07 F8 C3 3D 9F 06 B0 3E
CB 45 3F A6 40 22 28 A4 0A 13 8A 49 68 F3 F0 72
94 EA D9 E8 55 37 CF 8D 43 AD AF EC 51 87 40 D4
D4 D5 A5 4B AE 14 27 7E FB 42 F9 C7 81 4E 1E E5
</pre>
</pre>


== Ernie ==
==== Keyset 0x1 ====
 
=== Security ID (RL78) ===


===== SharedData_1 =====
<pre>
<pre>
00 00 00 00 00 00 00 00 00 00 (it's blank LMAO)
8C20B6FABD2236F772AA283B8C82B13E
</pre>
</pre>


=== Ernie Update AES128CBC Key 0x10/0x30/0x31/0x40/0x41 (PHAT) ===
===== SharedKey_1_A =====
 
<pre>
<pre>
key: 12B5408FD189E223B61890F488536008
87DC6ECFF1CA5D709B01AEF69EA6B283
iv : 82D6528A87BC55B38EF29A45730EF130
</pre>
</pre>


* supports type 0
===== SharedKey_1_B =====
* for block size 0x400 ONLY (block size 0x800 not supported)
 
=== Ernie Updater AES128CBC Key 0x10/0x30/0x31/0x40/0x41 (PHAT) ===
 
<pre>
<pre>
key: EAE43A1C48CD32A565E2CA7D8F9018DC
51EB8DD39B0585CE915F3BFF609C9563
iv: C9D9619CA151342D04602ECF0B8D6E33
</pre>
</pre>


* supports type 0
==== Keyset 0xB (command 0xA0) ====
* for block size 0x400 ONLY (block size 0x800 not supported)
* for updater and confzz firmwares ONLY
* location: around 0xFXXX of syscon firmware
 
=== Ernie Update AES128CBC Key 0x60 (PHAT) ===


===== SharedKey_B_A =====
<pre>
<pre>
key: 8C9ED3908C4143AE02855794C025BE1A
BB644721CB4C55072E83177BEB3BBEE9 (2F1C)
iv : C85AE1576D5E205FE8043573F55F4E11
</pre>
</pre>
Initial key to encrypt step 2 packet.


* supports type 0
===== SharedKey_B_B =====
* location: around 0xFXXX in syscon firmware
 
=== Ernie Updater AES128CBC Key 0x60 (PHAT) ===
 
<pre>
<pre>
key: 7014BEE6136725B9FFBE9A8614DD5C2A
DC6B6EE0F457DF0E7BAD1C5EA338027F (2F2C)
iv: FBD11DF2E0AAEE0B9C3738163CB8B6BD
</pre>
</pre>
Intermediate key used to decrypt Syscon step 3 response.


* supports type 0
Ernie communication session key AES128ECB master key:
* for updater and confzz firmwares ONLY
<pre>
 
00000000000000000000000000000000
=== Ernie Update AES128CBC Key 0x70/0x72 (PSTV) ===
</pre>
Unused with command 0xA0.


===== SharedData_B =====
<pre>
<pre>
key: 67C34253A7DE13517EC903FE1119C04C
CF2E93E9F94E28CCA48026134C7C77CE (2F0C)
iv : DB302673D69F0D513A635E68A470F9C1
</pre>
</pre>
Checked in Syscon only.


* aka the key for the meaning of life, universe and everything else
==== Keyset 0xE ====
* supports type 6 and 7


=== Ernie Updater AES128CBC Key 0x70/0x72 (PSTV) ===
===== SharedData_E =====


<pre>
<pre>
key: BE01B7FA1EC3ED641879DDE44D60486E
AD2F322F4256C49D1848818F0FDD81BE
iv : 671A74C7E50F25CF64D4341039C78705
</pre>
</pre>


* aka the key for the meaning of life, universe and everything else
===== SharedKey_E_A =====
* supports type 6 and 7
* for updater and confzz firmwares ONLY
 
=== Ernie Update AES128CBC Key 0x80/0x82 (PS Vita SLIM) ===


<pre>
<pre>
key: 523BEB53FCB95DC772AA1BFB0A96CD10
4ACE3A668AAEBB11793C432FB8A4CE88
iv : 385D67E50CE7669ECD171FE576814343
</pre>
</pre>


* supports type 5 and 8
===== SharedKey_E_B =====
 
=== Ernie Updater AES128CBC Key 0x80/0x82 (PS Vita SLIM) ===


<pre>
<pre>
key: DBD9450ACCA8544895663A6F472BDE7F
1CBAE93DE883557C8AA14886786BE227
iv : F927C6A1153DB2D65F736C3AD9E1CE76
</pre>
</pre>


* supports type 5 and 8
==== Keyset 0xF (command 0xD0) ====
* for updater and confzz firmwares ONLY


=== SERVICE 0x900 PASSPHRASE ===
===== SharedKey_F_A =====
<pre>
<pre>
93CE8EBEDF7F69A96F35DDE3BECB97D5
50E4C3A77264167C409C72A9B57A8609 (2F5C)
</pre>
</pre>
Initial key to encrypt step 2 packet.


=== BStoBSid Key ===
===== SharedKey_F_B =====
<pre>
<pre>
46B532E3F012E663C0694ECA7C8C58B7
9E34087C48985B4B351A63572D9B481B (2F6C)
</pre>
</pre>
Intermediate key used to decrypt Syscon step 3 response.


=== First Loader Jig Handshake Key ===
===== SharedKey_F_Master =====
<pre>
EBE3460D84A41754AC441368CF0200D8 (2F7C)
</pre>
Master key to generate Ernie communication session key (stored in Bigmac keyslot 0x511) by encrypting step 2 data.


Also known as g_debug_challenge_key. See [https://wiki.henkaku.xyz/vita/Enc#Secret_debug_mode].
===== SharedData_F =====
 
AES256ECB Key:
<pre>
<pre>
F47716E6C5649FD648538FD9773D12D1
C86B51FB019A207F32118E55462D5008 (2F3C)
229E118737B1D782D6A80CDB72E4B9C3
</pre>
</pre>
Checked by Syscon only.


=== Supported Keysets by Ernie ===
Step 4-5 passphrase:
<pre>
<pre>
0, 1, 0xB, 0xE, 0xF
B01103B0623832D62540B56333D6E11D (2F4C)
</pre>
</pre>
Checked by both Syscon (step 4) and cMeP (step 5) to ensure packet authenticity.


=== Ernie Handshake Keysets ===
=== All not known Ernie-embedded Keys ===


These keysets are stored on each side (Ernie firmware and cMeP binaries).
<pre>
DB D9 45 0A CC A8 54 48 95 66 3A 6F 47 2B DE 7F 21C44(USS-1002) AES KEY
F9 27 C6 A1 15 3D B2 D6 5F 73 6C 3A D9 E1 CE 76 21C44(USS-1002) AES IV
</pre>


==== Keyset 0x0 ====
=== JigKick Key Expansion ===


===== SharedData_0 =====
<pre>
<pre>
80996FBBC8B4EBA30595F4D379A23BD0
$ ./aes_keyschedule.exe F47716E6C5649FD648538FD9773D12D1229E118737B1D782D6A80CD
B72E4B9C3
K00: F47716E6C5649FD648538FD9773D12D1
K01: 229E118737B1D782D6A80CDB72E4B9C3
K02: 9C2138A65945A770111628A9662B3A78
K03: 116F913B26DE46B9F0764A628292F3A1
K04: D12C0AB58869ADC5997F856CFF54BF14
K05: 074F99C12191DF78D1E7951A537566BB
K06: 481FE058C0764D9D5909C8F1A65D77E5
K07: 23036C180292B360D375267A800040C1
K08: 23169895E360D508BA691DF91C346A1C
K09: BF1B6E84BD89DDE46EFCFB9EEEFCBB5F
K10: 83FC57BD609C82B5DAF59F4CC6C1F550
K11: 0B6388D7B6EA5533D816AEAD36EA15F2
K12: 24A5DEB844395C0D9ECCC341580D3611
K13: 61B48D55D75ED8660F4876CB39A26339
K14: 5E5ECCAA1A6790A784AB53E6DCA665F7
</pre>
</pre>


===== SharedKey_0_A =====
* Some keys are repeated in the Ernie memory dump, as it seems Ernie stores many versions of code binaries. Maybe backup bank or updater.
 
== Ernie Handshake Keys (not stored in Ernie) ==
 
These keysets are stored in second_loader and in many SMs.
 
=== Keyset 4 ===
 
Step 2 AES128ECB key:
<pre>
<pre>
EF685D2E33C7D029A1A2EE646BE39D41
A6CD383341CB9B0D69FD4A243E30F4B1
</pre>
</pre>
Initial key to encrypt step 2 packet.


===== SharedKey_0_B =====
Step 3 AES128ECB key:
<pre>
<pre>
CE7867DE57575C008D998281E8DA5912
D3EFEDE608691946CB77E14F8DEC69FA
</pre>
</pre>
Intermediate key used to decrypt Syscon step 3 response.


==== Keyset 0x1 ====
Ernie communication session key AES128ECB master key:
 
===== SharedData_1 =====
<pre>
<pre>
8C20B6FABD2236F772AA283B8C82B13E
15C7B32429F8603216F4F3E081D7C86D
</pre>
</pre>
Master key to generate Ernie communication session key (stored in Bigmac keyslot 0x511) by encrypting step 2 data.


===== SharedKey_1_A =====
Step 2 passphrase:
<pre>
<pre>
87DC6ECFF1CA5D709B01AEF69EA6B283
9ABD1B275C7537F7E62AB93AB3EB76F9
</pre>
</pre>
Checked by Syscon only.


===== SharedKey_1_B =====
Step 4-5 passphrase:
<pre>
<pre>
51EB8DD39B0585CE915F3BFF609C9563
DC454ED5F6E8A2B1B24D34A82215B2A5
</pre>
</pre>
Checked by both Syscon (step 4) and cMeP (step 5) to ensure packet authenticity.


==== Keyset 0xB (command 0xA0) ====
=== Keyset 6 ===


===== SharedKey_B_A =====
Step 2 AES128ECB key:
<pre>
<pre>
BB644721CB4C55072E83177BEB3BBEE9 (2F1C)
1053143BEAECC59FCFF1A195F8F5AFB0
</pre>
</pre>
Initial key to encrypt step 2 packet.
Initial key to encrypt step 2 packet.


===== SharedKey_B_B =====
Step 3 AES128ECB key:
<pre>
<pre>
DC6B6EE0F457DF0E7BAD1C5EA338027F (2F2C)
F90CDCBF009BA8367F841B25E8B10306
</pre>
</pre>
Intermediate key used to decrypt Syscon step 3 response.
Intermediate key used to decrypt Syscon step 3 response.
Line 1,369: Line 1,367:
Ernie communication session key AES128ECB master key:
Ernie communication session key AES128ECB master key:
<pre>
<pre>
00000000000000000000000000000000
6F6374FD1A41A75269EE15832451DEBF
</pre>
</pre>
Unused with command 0xA0.
Master key to generate Ernie communication session key (stored in Bigmac keyslot 0x511) by encrypting step 2 data.


===== SharedData_B =====
Step 2 passphrase:
<pre>
<pre>
CF2E93E9F94E28CCA48026134C7C77CE (2F0C)
B6806F9F58706D72B0E03717197D430C
</pre>
</pre>
Checked in Syscon only.
Checked by Syscon only.


==== Keyset 0xE ====
Step 4-5 passphrase:
<pre>
0E08A20C8718BD3B158E2E6992202DE7
</pre>
Checked by both Syscon (step 4) and cMeP (step 5) to ensure packet authenticity.


===== SharedData_E =====
=== Keyset 0xC (AuthEtoI, similar to command 0xA0) ===


Step 2 AES128ECB key:
<pre>
<pre>
AD2F322F4256C49D1848818F0FDD81BE
3CF54027DAE2F45C929B76927DFFD269
</pre>
</pre>
Initial key to encrypt step 2 packet.


===== SharedKey_E_A =====
Step 3 AES128ECB key:
<pre>
39AF55239062D2F3F6CBB401EDC54C09
</pre>
Intermediate key used to decrypt Syscon step 3 response.


Ernie communication session key AES128ECB master key:
<pre>
<pre>
4ACE3A668AAEBB11793C432FB8A4CE88
00000000000000000000000000000000
</pre>
</pre>
Unused with command AuthEtoI.


===== SharedKey_E_B =====
Step 2 passphrase:
 
<pre>
<pre>
1CBAE93DE883557C8AA14886786BE227
4231FFB14B941DBFEB44DFF97E64EC7D
</pre>
</pre>
Checked in Syscon only.


==== Keyset 0xF (command 0xD0) ====
==== Keyset 0xE ====


===== SharedKey_F_A =====
Step 2 AES128ECB key:
<pre>
<pre>
50E4C3A77264167C409C72A9B57A8609 (2F5C)
E55364616CA8C3DD2859B1D913E1CC15
</pre>
</pre>
Initial key to encrypt step 2 packet.
Initial key to encrypt step 2 packet.


===== SharedKey_F_B =====
Step 3 AES128ECB key:
<pre>
<pre>
9E34087C48985B4B351A63572D9B481B (2F6C)
02DA870FB5983DE568E324DDF5330C9D
</pre>
</pre>
Intermediate key used to decrypt Syscon step 3 response.
Intermediate key used to decrypt Syscon step 3 response.


===== SharedKey_F_Master =====
Ernie communication session key AES128ECB master key:
<pre>
<pre>
EBE3460D84A41754AC441368CF0200D8 (2F7C)
D606A99E381A4B440DB9A8A87F608F1B
</pre>
</pre>
Master key to generate Ernie communication session key (stored in Bigmac keyslot 0x511) by encrypting step 2 data.
Master key to generate Ernie communication session key (stored in Bigmac keyslot 0x511) by encrypting step 2 data.


===== SharedData_F =====
Step 2 passphrase:
<pre>
<pre>
C86B51FB019A207F32118E55462D5008 (2F3C)
8082307DA258780D5088C40218B98EFC
</pre>
</pre>
Checked by Syscon only.
Checked by Syscon only.
Line 1,427: Line 1,437:
Step 4-5 passphrase:
Step 4-5 passphrase:
<pre>
<pre>
B01103B0623832D62540B56333D6E11D (2F4C)
D14A64DF4011E110325E159602F23BA7
</pre>
</pre>
Checked by both Syscon (step 4) and cMeP (step 5) to ensure packet authenticity.
Checked by both Syscon (step 4) and cMeP (step 5) to ensure packet authenticity.


=== All not known Ernie-embedded Keys ===
== Ernie SNVS Keys ==
 
=== Prototype Ernie SNVS Keys (min FW < 0.996) ===
 
Maybe also eMMC Keys.
 
These constant keys are used instead of per-console keys stored in Bigmac keyslots 0x502-0x504.
 
==== AES XTS Tweak Key ====
 
<pre>
E122F9C47E1C94F082536A1F244B9A9C
E08DA5E8E122F9C47E1C94F082536A1F
</pre>
 
==== AES XTS Decryption Key ====


<pre>
<pre>
DB D9 45 0A CC A8 54 48 95 66 3A 6F 47 2B DE 7F 21C44(USS-1002) AES KEY
244B9A9CE08DA5E8E122F9C47E1C94F0
F9 27 C6 A1 15 3D B2 D6 5F 73 6C 3A D9 E1 CE 76 21C44(USS-1002) AES IV
82536A1F244B9A9CE08DA5E8E122F9C4
</pre>
</pre>


=== JigKick Key Expansion ===
==== HMAC-SHA256 Key ====


<pre>
<pre>
$ ./aes_keyschedule.exe F47716E6C5649FD648538FD9773D12D1229E118737B1D782D6A80CD
EDF481EF0AFF55CD1A643E8A7AF50911
B72E4B9C3
36A7749CEDF481EF0AFF55CD1A643E8A
K00: F47716E6C5649FD648538FD9773D12D1
K01: 229E118737B1D782D6A80CDB72E4B9C3
K02: 9C2138A65945A770111628A9662B3A78
K03: 116F913B26DE46B9F0764A628292F3A1
K04: D12C0AB58869ADC5997F856CFF54BF14
K05: 074F99C12191DF78D1E7951A537566BB
K06: 481FE058C0764D9D5909C8F1A65D77E5
K07: 23036C180292B360D375267A800040C1
K08: 23169895E360D508BA691DF91C346A1C
K09: BF1B6E84BD89DDE46EFCFB9EEEFCBB5F
K10: 83FC57BD609C82B5DAF59F4CC6C1F550
K11: 0B6388D7B6EA5533D816AEAD36EA15F2
K12: 24A5DEB844395C0D9ECCC341580D3611
K13: 61B48D55D75ED8660F4876CB39A26339
K14: 5E5ECCAA1A6790A784AB53E6DCA665F7
</pre>
</pre>


* Some keys are repeated in the Ernie memory dump, as it seems Ernie stores many versions of code binaries. Maybe backup bank or updater.
== Mystery update_service_sm Keys ==
 
These keys are found in update_service_sm and are used for something unknown. They are not used by the PS Vita.


== Ernie Handshake Keys (not stored in Ernie) ==
=== SCE WaterMark External (Not Used) ===


These keysets are stored in second_loader and in many SMs.
Exponent: 0x10001


=== Keyset 4 ===
==== P ====


Step 2 AES128ECB key:
<pre>
<pre>
A6CD383341CB9B0D69FD4A243E30F4B1
EA236F5002D0B5EB937ED04E5A100276
26A47DB379E2B3049EA2CC6ED5E48B5A
A8BA066A7827D2D5D83C238F7BA807B9
43E07616C77E69AA2A2FC447C3FC5A1B
BB4678E6931078DA24DF6904E8F5C628
EFC79548F49D7665A8FA40B4B24679AB
B4AADD00AF0829B0CB97A2A6FD44E813
BFCC06C46B1DB91E4CB30C992B255E21
</pre>
</pre>
Initial key to encrypt step 2 packet.


Step 3 AES128ECB key:
==== Q ====
 
<pre>
<pre>
D3EFEDE608691946CB77E14F8DEC69FA
E22A87F84528A12EB31AAA6A8FC4D6EF
</pre>
6352133A4D6ABDF917A0967370307E65
Intermediate key used to decrypt Syscon step 3 response.
98216D4A251FFAFDDF41F79CFAF477D6
 
B7A513B953E0F42D27C5687EBE39FFF9
Ernie communication session key AES128ECB master key:
A48C6000D34F5FFE92FE1967C5B6E42A
<pre>
CC38FDB71294042FA0695F19C502FAD1
15C7B32429F8603216F4F3E081D7C86D
BD125672C0C20AD029B75379CCE2BBAA
D88FE9EC4B3C18269CEEE87DA330DF99
</pre>
</pre>
Master key to generate Ernie communication session key (stored in Bigmac keyslot 0x511) by encrypting step 2 data.


Step 2 passphrase:
==== DP ====
<pre>
9ABD1B275C7537F7E62AB93AB3EB76F9
</pre>
Checked by Syscon only.


Step 4-5 passphrase:
<pre>
<pre>
DC454ED5F6E8A2B1B24D34A82215B2A5
75F155A0335AD9590ADA85AA025A3033
3E31FC140DA0F1D6B0E6871E89E66F80
42A03A9D255BC22BF09A12BBB369A842
5DFBD2E094AB8C24A8CD990D219F9BF0
7E3CF8A8058AF5A5C58F38C2BD6B18E0
0431407518ABBD39668E714BD4C60582
46270FDEC94CCE5B7DA32BCEFCA3DA58
207471303E5921A82EB0BEF6E53214A1
</pre>
</pre>
Checked by both Syscon (step 4) and cMeP (step 5) to ensure packet authenticity.


=== Keyset 6 ===
==== DQ ====


Step 2 AES128ECB key:
<pre>
<pre>
1053143BEAECC59FCFF1A195F8F5AFB0
2948B0373E9093138E3810E190CAD29D
</pre>
32191A4F6B304FEB3747E60EBE6CEBB5
Initial key to encrypt step 2 packet.
A9D67837AF9D2DD8C7B727F6ECCC514F
 
CD880198B3D9FD587CC9093111924ECA
Step 3 AES128ECB key:
8821E3A862EA3B50A20E661ECE357B62
<pre>
E0928AA5AF6B7B742228F9E61F5352EB
F90CDCBF009BA8367F841B25E8B10306
9442D3AAF0CABAE492A8D741058861CF
66E6A641AEDE125E82090E4158D7A409
</pre>
</pre>
Intermediate key used to decrypt Syscon step 3 response.


Ernie communication session key AES128ECB master key:
==== DinvQ ====
<pre>
6F6374FD1A41A75269EE15832451DEBF
</pre>
Master key to generate Ernie communication session key (stored in Bigmac keyslot 0x511) by encrypting step 2 data.
 
Step 2 passphrase:
<pre>
B6806F9F58706D72B0E03717197D430C
</pre>
Checked by Syscon only.


Step 4-5 passphrase:
<pre>
<pre>
0E08A20C8718BD3B158E2E6992202DE7
68A77889A624A12BFF7013D4A390B101
77F18C6E2AA0894408B328F78A1DF319
B9C243C815C293A8B080C40849B811CE
1168821C3AF49F6B771F3DE4396F731E
4402679475F5379077B70FA44F495B1B
36B89F7E62C37333344F54FAE248CB69
EB92F540E65F50A1D19F98AA476EF103
71648229865145C3FE240F4BD6D83254
</pre>
</pre>
Checked by both Syscon (step 4) and cMeP (step 5) to ensure packet authenticity.


=== Keyset 0xC (AuthEtoI, similar to command 0xA0) ===
==== Modulus ====


Step 2 AES128ECB key:
<pre>
<pre>
3CF54027DAE2F45C929B76927DFFD269
CEDA2E70A6E473CB8F6CCBC808B75C88
C3B31125793EE135DDF2D36D68C22011
77079AF5234E8774B0634C6EAD9918C1
8024C67A4A4F4060B6C7AFE5E4BE6BE1
132CB334D0FABEBF64F5B23E711F8AF9
E7DE33C93239AD416DB61408A92CD768
687DCD5C37F2771F508790C461B3C475
8C5147FBE9C3A1F3A51898FD44BB6BAD
ACEF2EB5CA7D48EFFDC27E9350A9A29C
DBC478D5B8B64953DAEEF6A610E90B8A
D6F5A65C3E44662F028F4415268BF184
B939E6FB0C754D8B29C6C82B654B46F6
6ACC1E29B7A359A88BB42CCD21D3D0A8
54065DF50A34A6D8B80C5E76583E0EB0
DA4A7E60032476DDFA6C94FC4056CBE2
B2E6841E502D53673F67B42DFF8400B9
</pre>
</pre>
Initial key to encrypt step 2 packet.


Step 3 AES128ECB key:
==== Private ====
<pre>
<pre>
39AF55239062D2F3F6CBB401EDC54C09
B3D81690734A253352DBF0C15672B5CD
62F9096B5F634043A9593A61E1B70652
A8FEBFC76A8F184E681DAD927CF4A305
79F87F684BBB63E9B2812379E9CB75D8
16E7C257A56A9CF5A33DCB5F66D359ED
B59F07BF621FAB773B8017230093B025
62D41DFC93D807A1FE4E1F9BDEA681A5
01FE996B78EF529B976B2F78E48D5F2B
ECFDBE4744369BC8889AEC72B2FD4685
0666D3BE61B21A85AB145240E4D4374A
7FFEFF13A77076B6C9297E3BF0DB6A64
B39B6175B86EAE1DDB02AEECA452C931
506D31BE5B1129A9883117A90BF579EA
0AD2DE86EFBB8E7C8275CC6E01B4296D
90F567B310DA64E0A356018C25D11241
71A21254346E24B2DD883480618DBC01
</pre>
</pre>
Intermediate key used to decrypt Syscon step 3 response.


Ernie communication session key AES128ECB master key:
=== SCE WaterMark Internal (Not Used) ===
<pre>
 
00000000000000000000000000000000
Exponent: 0x10001
</pre>
 
Unused with command AuthEtoI.
==== P ====


Step 2 passphrase:
<pre>
<pre>
4231FFB14B941DBFEB44DFF97E64EC7D
E2946A07650E5C657AC662EB1A6DD6DF
E44618AF35247EEF5E54559F581DBEAD
1AC2CF038ABF663344366F76E323F382
1A3F3699C972664E636E1373130E8AA3
71721B530CA58B8EA30E338AD1827FAC
8147AFE207B116CCEC9EB9D9C5A8D48F
788A98CE6B5E2A99FE27F7197A5D6548
93C84D4292F394C1A4CD6D09FF06F7E5
</pre>
</pre>
Checked in Syscon only.


==== Keyset 0xE ====
==== Q ====


Step 2 AES128ECB key:
<pre>
<pre>
E55364616CA8C3DD2859B1D913E1CC15
D369EC809646C3D07EBA35124F20FA33
D7ADC2E1C1A31D5909533F88CEEE6AD3
BF0FDFAFE67165DAF7229CA4F230CB7C
2C7D4525A942637ABCB843A8C2388B27
88848689DA3423A0D9CA8837A7BC1D9D
D5A89374689B77BC53C0FFB196A2A0F3
1D81E81F302A544C18942A44F08B8CF9
36D66ACA38512B5C5550AE178887151B
</pre>
</pre>
Initial key to encrypt step 2 packet.


Step 3 AES128ECB key:
==== DP ====
 
<pre>
<pre>
02DA870FB5983DE568E324DDF5330C9D
2FB4FE2A366DF2A86F546C2982741425
2A24543837E14A54CE30C5A27A6430EC
B3D0C6D3C11811C5C39C0E9622B74423
65B15FA6BBD2B995D1BBB09EAF2985A9
6A4E9350463E69070C70060C3996D799
13D36B461546853D7AA8E50AE4626AF7
1673603F3E3E228C30066C31D220EE1D
7CF854C42ABADCDC74FDC7F2ADDEE2BD
</pre>
</pre>
Intermediate key used to decrypt Syscon step 3 response.


Ernie communication session key AES128ECB master key:
==== DQ ====
 
<pre>
<pre>
D606A99E381A4B440DB9A8A87F608F1B
47054E6DE40DE1BA28D864FBC1995274
180047778F953C46ACDB4A7CAB076CDB
B5539FD17798A09EEE66B238B723AD38
09BA0B809B5BB20F89565D6453DAAAE4
9CF7E83A67131CE4EC451D7D94DB9D17
68AF38D9E24A57EEEC33E9B1BEE8E328
C8C0DB399EF4995CF6E4CF4E598087DB
3090D74F179C2CF4D7B442C7A515BC01
</pre>
</pre>
Master key to generate Ernie communication session key (stored in Bigmac keyslot 0x511) by encrypting step 2 data.


Step 2 passphrase:
==== DinvQ ====
 
<pre>
<pre>
8082307DA258780D5088C40218B98EFC
5B917A6768A9912815A0F09D2A8AA77D
72F1230A81987BB9452EF03BE0B5B63F
10AA391219D3EA92A3F2330F6899B458
DF04818DF79E126E84293595EBC60275
D96FC1D4DEAA024FF59E4187934BCDA2
B11BD26D941E6FC4E979BD12DB197D2A
D6EE300BA0E0A46CF2531B84F5F0102B
B714B9D176C46A8BDF3CFA8CD4DF6EDF
</pre>
</pre>
Checked by Syscon only.


Step 4-5 passphrase:
==== Modulus ====
 
<pre>
<pre>
D14A64DF4011E110325E159602F23BA7
BB1E13963648B5EC36EC4DDD00DD3752
53B47A3FD452BB67F1FB8B0967DDAB08
AA82456200CC9006D27DD00144F36C5C
98EF4A2C53074C654978F49AE82E2589
887E2DF24E748BDB1B2EE222F8C6EC6E
0DF3C32666209882C008D66AEE35F18F
D8A810B886B1A926C3C96906482FAB7B
103EF76900FE7C1DF13041051398CAE8
83B8485069F98CB78CD275C96714DB22
C91CF19B4BE2C77AC228C93DFA0B09DA
ADE4ACFDA26D66DFFD18DDE58895A34C
A6377C2594603FE41E0C5062150761D8
73FB5394D1032FC0929F9ED6C5BE051B
039C6C5BF5D92BEBC3EC83EC06E3CC7B
5EC1BCE445622741CD60BE2DDCF83848
BC86B3EBF987C438320B6DEAD9D4EE27
</pre>
</pre>
Checked by both Syscon (step 4) and cMeP (step 5) to ensure packet authenticity.


== Ernie SNVS Keys ==
==== Private ====
 
=== Prototype Ernie SNVS Keys (min FW < 0.996) ===
 
Maybe also eMMC Keys.
 
These constant keys are used instead of per-console keys stored in Bigmac keyslots 0x502-0x504.
 
==== AES XTS Tweak Key ====


<pre>
<pre>
E122F9C47E1C94F082536A1F244B9A9C
57CA38AE5531B008EF8BD6CC45C78459
E08DA5E8E122F9C47E1C94F082536A1F
1FE4A126A95B5789E1427F6D1E4A2620
</pre>
9EBF18066F118AD1689896AAC1CAE3A0
 
5E3086C05D042397B1ED09F653D0B2D3
==== AES XTS Decryption Key ====
E03233246822CE2B3289C0975FD914BC
5DD76C4BEBC687477109B46FDEEB7836
611419243A2DC88AE378EFC97EBCBEDB
B23798A4AF4EB6B4E5A01A21639C6036
0177A834BD946F442BF650F59030FF2F
28A18A31B6D45463FF8A7701764916C1
8E7A12B0848146B1FB1120405DD5A848
0D0C0C97DE5C2FC162362FCA01C71AE7
87C4040DA1D36EFAA318F91960FAB59E
76251FE9F34A91DCD2938FAFE2DA2E93
F2B6F53739616158064D1D3546F25B8C
8E9AA4D58542F3FDC91793ABD8EA6061
</pre>


<pre>
== PKG HMAC Keys ==
244B9A9CE08DA5E8E122F9C47E1C94F0
82536A1F244B9A9CE08DA5E8E122F9C4
</pre>


==== HMAC-SHA256 Key ====
* present in 0.920 os0 update_service_sm I


<pre>
<pre>
EDF481EF0AFF55CD1A643E8A7AF50911
DBE1A473887A076D204B6CE361EFE4B9
36A7749CEDF481EF0AFF55CD1A643E8A
C540E10B7EEE29C0A225CDAE10E6134C
</pre>
59D6CDA0F426D9F0B4F8C5BAA0EF397B
D38FB0F9B9100B4615816B1F6810D651


== Mystery update_service_sm Keys ==
F8EAFE04E0A66FCDDCD6CD2746DEBBEE
81C614EED15E02CFA9D1F87F64AE7597
B38B2AA048A3E0B14DA36904B01E4DAA
C1317E63E6DE80196EBE2D0CC2715494


These keys are found in update_service_sm and are used for something unknown. They are not used by the PS Vita.
A6E0B640BEEC23CC82DEDE0A227C5A58
89D238906A7EFE369596A1346F0B3547
2654F43DEE032837601A3246514DF4E2
E109829A60ABD62521EFE0FAC812E6DD


=== SCE WaterMark External (Not Used) ===
8D814CE4C9C3298346F74079F077A2C8
4BA0EA40E7BF55305F24976E2E3F7D97
D37DC6B65149FF8560199FABF74A495E
569EFEB78B4E128F914367C953405C13


Exponent: 0x10001
5C93D3939B27B2CABD19848FF9075E81
00C92BBC9D4B5D1A4D135ADDE1FBD71B
66B724BDBA101D6A3057234895393610
91ED466F251A38EE90825F6287DC8C77


==== P ====
C7939B509967CE44A815F3D3A69F3BCA
24080619F39B8B0D3EC22BFBE584D7C2
B7124FD11B94F8004AD477AE689D0C1D
B3B4E59E880163B279C83671F22FD285


<pre>
7721C65140A2CA799F366C7275C09F9D
EA236F5002D0B5EB937ED04E5A100276
A03F12CC9D71C4BE21209167D403E834
26A47DB379E2B3049EA2CC6ED5E48B5A
9A831933A1D109D24DC850246D39EEEC
A8BA066A7827D2D5D83C238F7BA807B9
CA64137119A95F5FB57E0EC310C2A73E
43E07616C77E69AA2A2FC447C3FC5A1B
BB4678E6931078DA24DF6904E8F5C628
EFC79548F49D7665A8FA40B4B24679AB
B4AADD00AF0829B0CB97A2A6FD44E813
BFCC06C46B1DB91E4CB30C992B255E21
</pre>


==== Q ====
AF92C200B8EBCA305C1D1273B636F912
B23247A4C573A69BA525D3AD5177F3EE
C45764EF426B6DA37AB25C37D5EE99AB
7ABDFCC9ED82C94C3016EDD295872061


<pre>
C80EAAB7E368851BCC3319D806D5B5E6
E22A87F84528A12EB31AAA6A8FC4D6EF
AF613993B86F437AF05528219C549256
6352133A4D6ABDF917A0967370307E65
AC26FE362692EC55152E706CBB078A7A
98216D4A251FFAFDDF41F79CFAF477D6
0B35A20425BD8A18C581622359EEF7AE
B7A513B953E0F42D27C5687EBE39FFF9
 
A48C6000D34F5FFE92FE1967C5B6E42A
B68C19699474A019CA7BAE575B1F5B7C
CC38FDB71294042FA0695F19C502FAD1
6DD7A4C115B208666A9A93418DA224B7
BD125672C0C20AD029B75379CCE2BBAA
A202B21059BEA357A96B5A6D7AF01E9E
D88FE9EC4B3C18269CEEE87DA330DF99
97CF303CA1207F58743E83CED77700BF
</pre>
</pre>


==== DP ====
== KIRK command 7 New Keys ==


<pre>
<pre>
75F155A0335AD9590ADA85AA025A3033
kirk7_key80 = 83FFF149A687A5C5CD95779352C8BF66
3E31FC140DA0F1D6B0E6871E89E66F80
kirk7_key81 = D83D2D277CE2DE154A4E2AA6D1E8D20B
42A03A9D255BC22BF09A12BBB369A842
kirk7_key82 = 4C5C71519F62A5FE5EF36D4B075BE2F3
5DFBD2E094AB8C24A8CD990D219F9BF0
kirk7_key83 = 8005EF43124F650A9DF158F72A509C10
7E3CF8A8058AF5A5C58F38C2BD6B18E0
kirk7_keyC0 = BF57AEF02DC587F327C8C3F8BDECA5EE
0431407518ABBD39668E714BD4C60582
kirk7_keyC1 = 9FFF2EECED8476D900DFD579E1AAAB63
46270FDEC94CCE5B7DA32BCEFCA3DA58
kirk7_keyC2 = 04460D61F563D46C0C4EB9AAE5466E84
207471303E5921A82EB0BEF6E53214A1
kirk7_keyC3 = 1E5B17DAC321E6B8DFE7718CA2930370
</pre>
</pre>


==== DQ ====
== IdStorage Certificate Keys ==
 
=== IdStorage Certificates ECDSA Public Keys (160 bit) ===
 
==== PSP Certificates ====


<pre>
<pre>
2948B0373E9093138E3810E190CAD29D
4004C80BD9C8BA38221065923E324B5F0EC165ED6CFF7D9F2C420B84DFDA6E96C0AEE29927BCAF1E Sec.0 PSP IDPS
32191A4F6B304FEB3747E60EBE6CEBB5
06485FD029853B552F7EFDD67A2DE7A1A4E25537B2459D8786426D5B27EFA5A9311CB8ABABFA0ECE Sec.1 PSP IDPS
A9D67837AF9D2DD8C7B727F6ECCC514F
3F8C34F210AEC48E1520FF2A44899E054A0DA33DF8B9754B09C0EC7E61867A5126FE6926972196F5 Sec.2 PSP IDPS
CD880198B3D9FD587CC9093111924ECA
CCB3440DC4836DD519E13B2805B30870DCAEE462136B3888651A98E02B29FA0CD34F1616F1ED5786 Sec.3 PSP IDPS
8821E3A862EA3B50A20E661ECE357B62
08B336925C2B445D03A9BE51B9AABF54E4CC142EA72A23BB8060B03B71CDE0772DE82AD8931648D6 Sec.4 PSP IDPS
E0928AA5AF6B7B742228F9E61F5352EB
4F0A2BC9987640860E22EE5D86087C9692470BDF59DC4C1F2E38F92CE7B66875B59ED10C9D84FA6A Sec.5 PSP PSID
9442D3AAF0CABAE492A8D741058861CF
66E6A641AEDE125E82090E4158D7A409
</pre>
</pre>


==== DinvQ ====
==== PS3 Certificates ====


<pre>
<pre>
68A77889A624A12BFF7013D4A390B101
94D100BE6E24991D65D93F3DA938858CEC2D133051F47DB4287AC86631719B31573EF7CCE071CA8A Sec.0 PS3 IDPS
77F18C6E2AA0894408B328F78A1DF319
071984A1F27D1E91196410D57C828AF7115BF1A32071AA1EC25B7FBF4884F5322A26483C46D8B43C Sec.1 PS3 IDPS
B9C243C815C293A8B080C40849B811CE
1B6389CECD99843CA088E325C796F510A151C1545C5DE4E37A1D892D2504A8604C094F59063D589F Sec.2 PS3 IDPS
1168821C3AF49F6B771F3DE4396F731E
17BE639B87F138049D94398E8929DE535D1CB0DC5E7C04D720D2F3DE86F9B581DD1B6F7CDCF80DE4 Sec.4 PS3 IDPS
4402679475F5379077B70FA44F495B1B
4B4F044420207907E3BC7D5423FF4D05E9DAA10B1F973327F7FEDEAE498BC656FF7C7459C9B993F4 Sec.5 PS3 IDPS
36B89F7E62C37333344F54FAE248CB69
1F960A3BD61462553A0DC015AEC66C818CBAA8F62F733AC9F0C287D496F321058AC26669ECBED3DB Sec.6 PS3 PSID
EB92F540E65F50A1D19F98AA476EF103
71648229865145C3FE240F4BD6D83254
</pre>
</pre>


==== Modulus ====
=== IdStorage Certificates ECDSA Public Keys (224 bit) ===
 
==== PS Vita Certificates ====


<pre>
<pre>
CEDA2E70A6E473CB8F6CCBC808B75C88
1A9146C3AB04FBA1C32027C47C7906947CC2AB1E247AF59A8D714AF44CA559E78A2C164A77DAD5A878F516E4D905D810C73C39E70EA93198 Sec.0 PS Vita IDPS
C3B31125793EE135DDF2D36D68C22011
A17772FD3E86091EAE2B246D5E05CE80A8E24A03C6764D26CD2443AE3DD656F919A10F87C67CB2AE280D0751E15ECD3C4FDFC9D71D7F067C Sec.1 PS Vita IDPS
77079AF5234E8774B0634C6EAD9918C1
056891AE27047A7D5DE88C57612E1A7D0A7CCD369E8CF2F8F374FEA34155B20B613236C2BDFFE8187AC09C7EDF194D81A440BEB91DC6F257 Sec.2 PS Vita IDPS
8024C67A4A4F4060B6C7AFE5E4BE6BE1
6B0AB6A5570334E8B559CC06BA811618ADD2A1EC587A98D35A04E8B98B1D5903711469EE3049B06E1EC81EEB72A9E181D5920B453CF2C21F Sec.3 PS Vita IDPS
132CB334D0FABEBF64F5B23E711F8AF9
1C1816019AE3F8955021892257535F0E92D988E11EA45C2E908E2E208C10F3D7F3ED189EEFC027C8A91B6770A727402423CE976A3435FF8A Sec.4 PS Vita IDPS
E7DE33C93239AD416DB61408A92CD768
108464CCDB76611475AEA911FBD1D476FF41F1C70D811031C552DB9B85E9941A3FD79644B717E0FEE48C4CF7387CF10E900BDBC2D7A35F5D Sec.5 PS Vita PSID
687DCD5C37F2771F508790C461B3C475
8C5147FBE9C3A1F3A51898FD44BB6BAD
ACEF2EB5CA7D48EFFDC27E9350A9A29C
DBC478D5B8B64953DAEEF6A610E90B8A
D6F5A65C3E44662F028F4415268BF184
B939E6FB0C754D8B29C6C82B654B46F6
6ACC1E29B7A359A88BB42CCD21D3D0A8
54065DF50A34A6D8B80C5E76583E0EB0
DA4A7E60032476DDFA6C94FC4056CBE2
B2E6841E502D53673F67B42DFF8400B9
</pre>
</pre>


==== Private ====
== GC Auth Mgr ECDSA Keys ==
<pre>
B3D81690734A253352DBF0C15672B5CD
62F9096B5F634043A9593A61E1B70652
A8FEBFC76A8F184E681DAD927CF4A305
79F87F684BBB63E9B2812379E9CB75D8
16E7C257A56A9CF5A33DCB5F66D359ED
B59F07BF621FAB773B8017230093B025
62D41DFC93D807A1FE4E1F9BDEA681A5
01FE996B78EF529B976B2F78E48D5F2B
ECFDBE4744369BC8889AEC72B2FD4685
0666D3BE61B21A85AB145240E4D4374A
7FFEFF13A77076B6C9297E3BF0DB6A64
B39B6175B86EAE1DDB02AEECA452C931
506D31BE5B1129A9883117A90BF579EA
0AD2DE86EFBB8E7C8275CC6E01B4296D
90F567B310DA64E0A356018C25D11241
71A21254346E24B2DD883480618DBC01
</pre>


=== SCE WaterMark Internal (Not Used) ===
=== 160 bit Curve ===


Exponent: 0x10001
<pre>
p=FFFFFFFFFFFFFFFF00000001FFFFFFFFFFFFFFFF
a=FFFFFFFFFFFFFFFF00000001FFFFFFFFFFFFFFFC
b=A68BEDC33418029C1D3CE33B9A321FCCBB9E0F0B
N=FFFFFFFFFFFFFFFEFFFFB5AE3C523E63944F2127
Gx=128EC4256487FD8FDF64E2437BC0A1F6D5AFDE2C
Gy=5958557EB1DB001260425524DBC379D5AC5F4ADF
</pre>


==== P ====
=== 160 bit Public Key ===


<pre>
<pre>
E2946A07650E5C657AC662EB1A6DD6DF
Qx:55D73E67B84E15B2F28C3B1F6C9DCE2911E3B4ED
E44618AF35247EEF5E54559F581DBEAD
Qy:0333EEDA263BC89B7696AB5C6B69E18BF1785A80
1AC2CF038ABF663344366F76E323F382
1A3F3699C972664E636E1373130E8AA3
71721B530CA58B8EA30E338AD1827FAC
8147AFE207B116CCEC9EB9D9C5A8D48F
788A98CE6B5E2A99FE27F7197A5D6548
93C84D4292F394C1A4CD6D09FF06F7E5
</pre>
</pre>


==== Q ====
=== 160 bit Private Key ===


<pre>
<pre>
D369EC809646C3D07EBA35124F20FA33
53CCC36EDFADBE245583270552D23B22518EE3A8
D7ADC2E1C1A31D5909533F88CEEE6AD3
BF0FDFAFE67165DAF7229CA4F230CB7C
2C7D4525A942637ABCB843A8C2388B27
88848689DA3423A0D9CA8837A7BC1D9D
D5A89374689B77BC53C0FFB196A2A0F3
1D81E81F302A544C18942A44F08B8CF9
36D66ACA38512B5C5550AE178887151B
</pre>
</pre>


==== DP ====
* Seen on FW 3.70.
* Used by Kirk command 0x21 (related to new PS Vita NPDRM PKG files).
 
=== 224 bit Curve ===


<pre>
<pre>
2FB4FE2A366DF2A86F546C2982741425
p=A53E113E46D8C9C1F09D9BCB2A5373D379F69DA28D09999FED57A90F
2A24543837E14A54CE30C5A27A6430EC
a=A53E113E46D8C9C1F09D9BCB2A5373D379F69DA28D09999FED57A90C
B3D0C6D3C11811C5C39C0E9622B74423
b=9065941D29374A8F11DD1E540189434E4A6EBFAF5477F6C172F6855E
65B15FA6BBD2B995D1BBB09EAF2985A9
N=A53E113E46D8C9C1F09D9BCB2A522698DEEF58DB1AD9AB7F04E3AE7F
6A4E9350463E69070C70060C3996D799
Gx=7E06098247E6B59F3110BCBB3AB6C250BC5AB06C032DAD43684C248F
13D36B461546853D7AA8E50AE4626AF7
Gy=0BD9418DE8E3E45D2D701E0237FD7F2ADE0D48B74CEEF2F1C8AC484E
1673603F3E3E228C30066C31D220EE1D
7CF854C42ABADCDC74FDC7F2ADDEE2BD
</pre>
</pre>


==== DQ ====
=== 224 bit Public Key ===


<pre>
<pre>
47054E6DE40DE1BA28D864FBC1995274
Qx:5F9D171A2BDDA8D40878BF985AC326ED5EFF43C9376C77EC0A00C7BB
180047778F953C46ACDB4A7CAB076CDB
Qy:A344E44E6EAC255235F954F5B617C7BD49F180262454AAE1B62A9F2C
B5539FD17798A09EEE66B238B723AD38
09BA0B809B5BB20F89565D6453DAAAE4
9CF7E83A67131CE4EC451D7D94DB9D17
68AF38D9E24A57EEEC33E9B1BEE8E328
C8C0DB399EF4995CF6E4CF4E598087DB
3090D74F179C2CF4D7B442C7A515BC01
</pre>
</pre>
==== DinvQ ====


<pre>
<pre>
5B917A6768A9912815A0F09D2A8AA77D
Qx:67002D9BB8E42D2BF9610B27FEAB9B34561550921312DFEE7A3A86EC
72F1230A81987BB9452EF03BE0B5B63F
Qy:6CA714426F6D4E9609A638BF4AFB182BFA50C82FF2B4C5EC6CCD9765
10AA391219D3EA92A3F2330F6899B458
DF04818DF79E126E84293595EBC60275
D96FC1D4DEAA024FF59E4187934BCDA2
B11BD26D941E6FC4E979BD12DB197D2A
D6EE300BA0E0A46CF2531B84F5F0102B
B714B9D176C46A8BDF3CFA8CD4DF6EDF
</pre>
</pre>


==== Modulus ====
=== 224 bit Private Key ===


<pre>
<pre>
BB1E13963648B5EC36EC4DDD00DD3752
767436A6999D88480EC856F55CEABB4396859E374599403921F55598
53B47A3FD452BB67F1FB8B0967DDAB08
AA82456200CC9006D27DD00144F36C5C
98EF4A2C53074C654978F49AE82E2589
887E2DF24E748BDB1B2EE222F8C6EC6E
0DF3C32666209882C008D66AEE35F18F
D8A810B886B1A926C3C96906482FAB7B
103EF76900FE7C1DF13041051398CAE8
83B8485069F98CB78CD275C96714DB22
C91CF19B4BE2C77AC228C93DFA0B09DA
ADE4ACFDA26D66DFFD18DDE58895A34C
A6377C2594603FE41E0C5062150761D8
73FB5394D1032FC0929F9ED6C5BE051B
039C6C5BF5D92BEBC3EC83EC06E3CC7B
5EC1BCE445622741CD60BE2DDCF83848
BC86B3EBF987C438320B6DEAD9D4EE27
</pre>
</pre>


==== Private ====
* Seen on FW 1.50.
* Used by Kirk command 0x22.


<pre>
<pre>
57CA38AE5531B008EF8BD6CC45C78459
607A2E5568B4B9A032F45253CFED20DB2E6E446C3782E82A1AB9C923
1FE4A126A95B5789E1427F6D1E4A2620
9EBF18066F118AD1689896AAC1CAE3A0
5E3086C05D042397B1ED09F653D0B2D3
E03233246822CE2B3289C0975FD914BC
5DD76C4BEBC687477109B46FDEEB7836
611419243A2DC88AE378EFC97EBCBEDB
B23798A4AF4EB6B4E5A01A21639C6036
0177A834BD946F442BF650F59030FF2F
28A18A31B6D45463FF8A7701764916C1
8E7A12B0848146B1FB1120405DD5A848
0D0C0C97DE5C2FC162362FCA01C71AE7
87C4040DA1D36EFAA318F91960FAB59E
76251FE9F34A91DCD2938FAFE2DA2E93
F2B6F53739616158064D1D3546F25B8C
8E9AA4D58542F3FDC91793ABD8EA6061
</pre>
</pre>


== PKG HMAC Keys ==
* Seen on FW 3.70.
* Used by Kirk command 0x22.


* present in 0.920 os0 update_service_sm I
== MSIF Key / Memory Card Auth Key ==
    D419A2EB9D61A52F4FA28B27E32FCDD7E0048D443D63C92C0B27135541D92EC4


<pre>
== PocketStation Keys ==
DBE1A473887A076D204B6CE361EFE4B9
C540E10B7EEE29C0A225CDAE10E6134C
59D6CDA0F426D9F0B4F8C5BAA0EF397B
D38FB0F9B9100B4615816B1F6810D651


F8EAFE04E0A66FCDDCD6CD2746DEBBEE
=== texture.enc key ===
81C614EED15E02CFA9D1F87F64AE7597
B38B2AA048A3E0B14DA36904B01E4DAA
C1317E63E6DE80196EBE2D0CC2715494


A6E0B640BEEC23CC82DEDE0A227C5A58
    5B27B12FCB513F79A3B610D912B09CF5
89D238906A7EFE369596A1346F0B3547
2654F43DEE032837601A3246514DF4E2
E109829A60ABD62521EFE0FAC812E6DD


8D814CE4C9C3298346F74079F077A2C8
=== texture.enc iv ===
4BA0EA40E7BF55305F24976E2E3F7D97
D37DC6B65149FF8560199FABF74A495E
569EFEB78B4E128F914367C953405C13


5C93D3939B27B2CABD19848FF9075E81
    72D859C6642BE65CF0BE141B84B93AA8
00C92BBC9D4B5D1A4D135ADDE1FBD71B
66B724BDBA101D6A3057234895393610
91ED466F251A38EE90825F6287DC8C77


C7939B509967CE44A815F3D3A69F3BCA
=== MCX.BIN key ===
24080619F39B8B0D3EC22BFBE584D7C2
B7124FD11B94F8004AD477AE689D0C1D
B3B4E59E880163B279C83671F22FD285


7721C65140A2CA799F366C7275C09F9D
    81D9CCE971A9499B04ADDC48307F0792
A03F12CC9D71C4BE21209167D403E834
 
9A831933A1D109D24DC850246D39EEEC
=== MCX.BIN iv ===
CA64137119A95F5FB57E0EC310C2A73E


AF92C200B8EBCA305C1D1273B636F912
    13C2E7694BEC696D52CF00092AC1F272
B23247A4C573A69BA525D3AD5177F3EE
C45764EF426B6DA37AB25C37D5EE99AB
7ABDFCC9ED82C94C3016EDD295872061


C80EAAB7E368851BCC3319D806D5B5E6
== PSM Keys ==
AF613993B86F437AF05528219C549256
AC26FE362692EC55152E706CBB078A7A
0B35A20425BD8A18C581622359EEF7AE


B68C19699474A019CA7BAE575B1F5B7C
=== PSM PKG HMAC Key ===
6DD7A4C115B208666A9A93418DA224B7
A202B21059BEA357A96B5A6D7AF01E9E
97CF303CA1207F58743E83CED77700BF
</pre>


== KIRK command 7 New Keys ==
    5AE4E16B214290E14366E5B653C4E3C3
    E69E4956510EADD66ACB37A077E0686E
    086F8BAB5030E3D82407F01B676CB803
    7DF20D1420C08A91A2141A3FE5DC063C


<pre>
used to calculate PSM PKG URL
kirk7_key80 = 83FFF149A687A5C5CD95779352C8BF66
kirk7_key81 = D83D2D277CE2DE154A4E2AA6D1E8D20B
kirk7_key82 = 4C5C71519F62A5FE5EF36D4B075BE2F3
kirk7_key83 = 8005EF43124F650A9DF158F72A509C10
kirk7_keyC0 = BF57AEF02DC587F327C8C3F8BDECA5EE
kirk7_keyC1 = 9FFF2EECED8476D900DFD579E1AAAB63
kirk7_keyC2 = 04460D61F563D46C0C4EB9AAE5466E84
kirk7_keyC3 = 1E5B17DAC321E6B8DFE7718CA2930370
</pre>


== IdStorage Keys ==
hmacsha1("NPPA00236_00", key) = 87b2fc0108d5197ae7572bda397dd8a81b56839e


=== PS Vita IdStorage leaves 0-0x7D RSA2048 Public Key ===
use last 8 characters for this part: "NPPA00236_00_87B2FC01"


<pre>
final result: http://psm-pkg.np.dl.playstation.net/psm/np/NPPA/NPPA00236_00_87B2FC01/1.00/NPPA00236_00.pkg
E9 18 F0 8E F8 D1 ED 4A 5E 80 65 44 15 5D AF 3E
99 CD 65 65 5C 5D FE BC BA 59 A4 AB 52 81 63 53
B1 DC 9C 0E BB 70 F7 48 57 47 9C 4C 49 00 8E E4
F7 55 93 14 71 67 DF 9C 92 8E D8 42 4A 10 75 50
D0 9F 6A 48 57 9A E3 86 BF 6B A3 0C 73 57 00 DC
F7 CB 2B B3 7C 03 11 CC EC D9 0F BA A1 2E E5 EE
5C D3 10 D5 0F 1D 58 C1 23 8B CD 7B 9E E6 2C 7F
4C AE 11 01 8C A5 AE F0 D5 C2 8D 5E E9 F6 6F 1E
37 8B B4 BD BC C0 2F 3D 3D 6E F8 E6 35 EF B6 C2
EF 82 ED AD 07 16 5A 4D A4 AB 83 76 14 9D 6F 29
6D AD DA 83 CF 0D F3 9F 9C 6B AC 79 61 B6 6F 32
60 34 99 B4 C3 9C 94 D7 1A 29 8A B4 12 D8 42 F9
69 C3 0E 47 EF 86 FD 35 E5 CD 23 E8 95 B3 E1 A3
D6 E9 CA 90 8F 46 59 FE BC B3 00 C0 9C E7 34 07
5A 7F 85 2A 5B AD 82 B8 52 85 74 6F 73 45 C2 5F
4B 7A 8D 85 70 8B 6C FD AA 59 70 BF 33 00 79 D5
</pre>


* Exponent is 65537.
(change domain to zeus.dl.playstation.net to download in current year)
* Found in PS Vita factTest.self.
* Signature is stored in PS Vita IdStorage leaf 0x7E offset 0x60.
* PSP IdStorage does not have this signature.
* This signature does not seem to be checked on console boot. It might be used only during manufacturing/servicing to ensure that IdStorage leaves 0-0x7D have been written correctly. This implies that IdStorage leaves 0-0x7D are not meant to be edited after manufacturing, contrarly to some other leaves.


== IdStorage Certificate Keys ==
=== PSMDA "protected_kconsole_cache.dat" HMAC Key ===


=== IdStorage Certificates ECDSA Public Keys (160 bit) ===
    B73966320E286ADC03F05465CA9E2F92388AEE236D43883135BAB0A5BD5043EA


==== PSP Certificates ====
=== PSMDA "NSXVID-PSS.VT.WW-GLOBAL.xml" RSA Private ===


<pre>
    -----BEGIN PRIVATE KEY-----
4004C80BD9C8BA38221065923E324B5F0EC165ED6CFF7D9F2C420B84DFDA6E96C0AEE29927BCAF1E Sec.0 PSP IDPS
    MIIEvgIBADANBgkqhkiG9w0BAQEFAASCBKgwggSkAgEAAoIBAQCxl+8fRzDzyWb0
06485FD029853B552F7EFDD67A2DE7A1A4E25537B2459D8786426D5B27EFA5A9311CB8ABABFA0ECE Sec.1 PSP IDPS
    89L9ssKWMO4IYJATVV/qsGPqL5XtgjqlSY6dV3QHWtdiqm4B9h8cy325+XEORMC8
3F8C34F210AEC48E1520FF2A44899E054A0DA33DF8B9754B09C0EC7E61867A5126FE6926972196F5 Sec.2 PSP IDPS
    oErllSl7yovu956/D5laLLGqRkyFPcNer+DOjO99bDfJTTV1bSHuwc9oo3mJn6AO
CCB3440DC4836DD519E13B2805B30870DCAEE462136B3888651A98E02B29FA0CD34F1616F1ED5786 Sec.3 PSP IDPS
    WuiY3aguCIYxNgSlDsfavjmCDXa3Q85hFOxJnn7HlM4X6rNxFi9y48LqUrDyWw0L
08B336925C2B445D03A9BE51B9AABF54E4CC142EA72A23BB8060B03B71CDE0772DE82AD8931648D6 Sec.4 PSP IDPS
    bs+07bqNLoYHXtMoZcNQHqNmGtIHGx4RuFzZ4hduorjNsmSKHiQSz+ydJgJWtLJO
4F0A2BC9987640860E22EE5D86087C9692470BDF59DC4C1F2E38F92CE7B66875B59ED10C9D84FA6A Sec.5 PSP PSID
    tC2EM8zj8zStmlDiMTyAqKPHjENp4FBLoF87PISLsbyf4dTdWk35TvnsU/+tGVyH
</pre>
    bVNcEAzvAgMBAAECggEBAKSil//kDIKD/BkrDDc6h9+aHqDPe+EgbVnxCb8pPBFB
    gEKIbVh5oUvMMA38txzEYNVd5AELOH6kyBRVePlajWmAPLddAOJYgK6y7kVPBFMl
    Db/yxjJVPxODxjeshtmEQUfIjhGQMvSdcVC9gBFusyFxr41haW7mw+mKHV/uQVbk
    TM/ZnEaN2Zrl7FfCUwXa3qyMrwj01bbAXXEqdM9ZF3UIXCLzihtNDKPAbpcVoQXH
    fItXVFeHjXqVCOVcKTI1PgElM6Q7VsVsU4pJGOmKy2gFbKqF4eniDK6gdGitbVpp
    rlXIrS2P8ZOfT+fSMjLbrr+mJEc2np4LYFlEHcJgtkkCgYEAwMrmf1LasiU/sijh
    0fOTV6TXefSrOxnpiq9Qs/oTSZ5USTh5FrunF0dX5Isy4XjYKWfIVwVl9LnAXRqR
    QTiHkbFon2KMYYyQfDUe4T9kuX6cAqp8WjBaivxs8chErM8rzZns62bR1B9+/IX4
    VIiHA1jfP9eiCl+1lMhhnnNIHX0CgYEA69Ffc2w5UCJ1cHxu8dR9V4otY57vBJFN
    2Svb8h3kJnO9LfU/RYMeXTgJSklh9Tw/zXPOMEQnxi7LocrDd1713vQTTspT3wWd
    3AJ25l0BP3NGnbEtGwv6It+VnUULr964vOUv/bl4UMQs52JsnxURts+GPZ3gAF1S
    U2AVxvVej9sCgYBAk7Yhb99RTKjJRGhfqvbvpIeIkivI4CUaDx85KcrMHfydig0F
    UFXntj36j6W7YH8HX3v7qhM8pfuJNBzze7vtUT96I8hh5HOBJ0nwqQtUFtSrD/AX
    RZsOcv8K/coDGGHTvHtfXlFqfCJM85L6vcB7nokpGVFtqCFqdLQ+Ht9JAQKBgQCU
    Ao/0dCLs5xPrDE7ePk6FmVavxlui9Eh2XI7qQlSmxdIhfGLAEHIIdFlwZOq076Hk
    JCFwLfcA7vIklI1m6RVNYMiVlWxa+L2CD5HtOMbFumbCJyh2Z2gSZ18SnPme4x30
    ga1DhRu9JcRBXodqueCqa0qIdgTYdbpsVkyU2gEGLQKBgGotuH/yrXNfifTc6Y24
    TSaqk/Dq6OvQOEFSIzgOzaQhWvwZjlz3uOnmi3vUo/guG9q/J1JWucWoXNXkkcmb
    trc3RYwzy6Rn+0uGHGA91e2bn6vT6PLNOgNUE7YCRDJe5DsDYHtUNILNbRVdSvNs
    rnh1i22Y3zLWChh3swswqgf7
    -----END PRIVATE KEY-----


==== PS3 Certificates ====
* Used by the PSM Dev Assistant to sign the NSXVID-PSS.VT.WW-GLOBAL.xml file to prevent from modification.


<pre>
=== PSM Publishing License PKCS12 Import Password ===
94D100BE6E24991D65D93F3DA938858CEC2D133051F47DB4287AC86631719B31573EF7CCE071CA8A Sec.0 PS3 IDPS
071984A1F27D1E91196410D57C828AF7115BF1A32071AA1EC25B7FBF4884F5322A26483C46D8B43C Sec.1 PS3 IDPS
1B6389CECD99843CA088E325C796F510A151C1545C5DE4E37A1D892D2504A8604C094F59063D589F Sec.2 PS3 IDPS
17BE639B87F138049D94398E8929DE535D1CB0DC5E7C04D720D2F3DE86F9B581DD1B6F7CDCF80DE4 Sec.4 PS3 IDPS
4B4F044420207907E3BC7D5423FF4D05E9DAA10B1F973327F7FEDEAE498BC656FF7C7459C9B993F4 Sec.5 PS3 IDPS
1F960A3BD61462553A0DC015AEC66C818CBAA8F62F733AC9F0C287D496F321058AC26669ECBED3DB Sec.6 PS3 PSID
</pre>


=== IdStorage Certificates ECDSA Public Keys (224 bit) ===
    password


==== PS Vita Certificates ====
=== PSM Publishing License PKCS12 PEM Pass Phrase ===


<pre>
    password
1A9146C3AB04FBA1C32027C47C7906947CC2AB1E247AF59A8D714AF44CA559E78A2C164A77DAD5A878F516E4D905D810C73C39E70EA93198 Sec.0 PS Vita IDPS
A17772FD3E86091EAE2B246D5E05CE80A8E24A03C6764D26CD2443AE3DD656F919A10F87C67CB2AE280D0751E15ECD3C4FDFC9D71D7F067C Sec.1 PS Vita IDPS
056891AE27047A7D5DE88C57612E1A7D0A7CCD369E8CF2F8F374FEA34155B20B613236C2BDFFE8187AC09C7EDF194D81A440BEB91DC6F257 Sec.2 PS Vita IDPS
6B0AB6A5570334E8B559CC06BA811618ADD2A1EC587A98D35A04E8B98B1D5903711469EE3049B06E1EC81EEB72A9E181D5920B453CF2C21F Sec.3 PS Vita IDPS
1C1816019AE3F8955021892257535F0E92D988E11EA45C2E908E2E208C10F3D7F3ED189EEFC027C8A91B6770A727402423CE976A3435FF8A Sec.4 PS Vita IDPS
108464CCDB76611475AEA911FBD1D476FF41F1C70D811031C552DB9B85E9941A3FD79644B717E0FEE48C4CF7387CF10E900BDBC2D7A35F5D Sec.5 PS Vita PSID
</pre>


== GC Auth Mgr ECDSA Keys ==
* PKCS12 certificate used in signing PSM Dev PSSE with PSM SDK.


=== 160 bit Curve ===
(World's most secure passwords ever, impossible to crack xD)    
 
You can use openssl like so:  
<pre>
    openssl pkcs12 -in <filename> -password pass:password -passout pass:password
p=FFFFFFFFFFFFFFFF00000001FFFFFFFFFFFFFFFF
to view the keystore of a PSM Publishing License
a=FFFFFFFFFFFFFFFF00000001FFFFFFFFFFFFFFFC
b=A68BEDC33418029C1D3CE33B9A321FCCBB9E0F0B
N=FFFFFFFFFFFFFFFEFFFFB5AE3C523E63944F2127
Gx=128EC4256487FD8FDF64E2437BC0A1F6D5AFDE2C
Gy=5958557EB1DB001260425524DBC379D5AC5F4ADF
</pre>
 
=== 160 bit Public Key ===
 
<pre>
Qx:55D73E67B84E15B2F28C3B1F6C9DCE2911E3B4ED
Qy:0333EEDA263BC89B7696AB5C6B69E18BF1785A80
</pre>
 
=== 160 bit Private Key ===
 
<pre>
53CCC36EDFADBE245583270552D23B22518EE3A8
</pre>
 
* Seen on FW 3.70.
* Used by Kirk command 0x21 (related to new PS Vita NPDRM PKG files).
 
=== 224 bit Curve ===
 
<pre>
p=A53E113E46D8C9C1F09D9BCB2A5373D379F69DA28D09999FED57A90F
a=A53E113E46D8C9C1F09D9BCB2A5373D379F69DA28D09999FED57A90C
b=9065941D29374A8F11DD1E540189434E4A6EBFAF5477F6C172F6855E
N=A53E113E46D8C9C1F09D9BCB2A522698DEEF58DB1AD9AB7F04E3AE7F
Gx=7E06098247E6B59F3110BCBB3AB6C250BC5AB06C032DAD43684C248F
Gy=0BD9418DE8E3E45D2D701E0237FD7F2ADE0D48B74CEEF2F1C8AC484E
</pre>
 
=== 224 bit Public Key ===
 
<pre>
Qx:5F9D171A2BDDA8D40878BF985AC326ED5EFF43C9376C77EC0A00C7BB
Qy:A344E44E6EAC255235F954F5B617C7BD49F180262454AAE1B62A9F2C
</pre>
 
<pre>
Qx:67002D9BB8E42D2BF9610B27FEAB9B34561550921312DFEE7A3A86EC
Qy:6CA714426F6D4E9609A638BF4AFB182BFA50C82FF2B4C5EC6CCD9765
</pre>
 
=== 224 bit Private Key ===
 
<pre>
767436A6999D88480EC856F55CEABB4396859E374599403921F55598
</pre>
 
* Seen on FW 1.50.
* Used by Kirk command 0x22.
 
<pre>
607A2E5568B4B9A032F45253CFED20DB2E6E446C3782E82A1AB9C923
</pre>
 
* Seen on FW 3.70.
* Used by Kirk command 0x22.
 
== MSIF Key / Memory Card Auth Key ==
    D419A2EB9D61A52F4FA28B27E32FCDD7E0048D443D63C92C0B27135541D92EC4
 
== PocketStation Keys ==
 
=== texture.enc key ===
 
    5B27B12FCB513F79A3B610D912B09CF5
 
=== texture.enc iv ===
 
    72D859C6642BE65CF0BE141B84B93AA8
 
=== MCX.BIN key ===
 
    81D9CCE971A9499B04ADDC48307F0792
 
=== MCX.BIN iv ===
 
    13C2E7694BEC696D52CF00092AC1F272
 
== PSM Keys ==
 
=== Update HMAC Key ===
 
    5AE4E16B214290E14366E5B653C4E3C3E69E4956510EADD66ACB37A077E0686E
    086F8BAB5030E3D82407F01B676CB8037DF20D1420C08A91A2141A3FE5DC063C
 
how to calculate update URL:
 
HmacSha1("NPPA00236_00", hmackey) => 87b2fc0108d5197ae7572bda397dd8a81b56839e


append first 8 characters of hex encoded hmac; like such: "NPPA00236_00_87B2FC01"
=== 'psm.pub' strong name signatures public key ===
 
update xml is => http://psm-pkg.np.dl.playstation.net/psm/np/NPPA/NPPA00236_00_87B2FC01/version.xml
 
you can get the PKG for any PSM application like so:
 
take "appVersion" from version.xml => "1.00"
 
build PKG link using version => http://psm-pkg.np.dl.playstation.net/psm/np/NPPA/NPPA00236_00_87B2FC01/1.00/NPPA00236_00.pkg
 
you can also get screenshots and description of the application; using /metadata.xml; for example;
 
http://psm-pkg.np.dl.playstation.net/psm/np/NPPA/NPPA00236_00_87B2FC01/1.00/metadata.xml
 
(note; you have to change the domain to zeus.dl.playstation.net as sony removed the "psm-pkg.np.dl.playstation.net" subdomain awhile ago)
 
=== 'psm.pub' strong name public key ===
Used for verifying strong name signature of runtime's Mono/.NET assemblies;
     00240000048000009400000006020000002400005253413100040000110000009133D396CA929938BC68440B541D8888614E7BD475B
     00240000048000009400000006020000002400005253413100040000110000009133D396CA929938BC68440B541D8888614E7BD475B
     EF719AB4F4B85B1C21FC3EF2B5F32DF0DE7C769CA90687650DA49EEBE7ADCB71479F1463E10902CB65A1F44FA2E71B3F30E108FE0F6
     EF719AB4F4B85B1C21FC3EF2B5F32DF0DE7C769CA90687650DA49EEBE7ADCB71479F1463E10902CB65A1F44FA2E71B3F30E108FE0F6
     699D179DAED5B1A774DB1ABA104C59118544B47CDA724AEA8E6899FA760DFE0BA8656515B48AE94FDE29FC8F5BD569126C7A9AE6F3
     699D179DAED5B1A774DB1ABA104C59118544B47CDA724AEA8E6899FA760DFE0BA8656515B48AE94FDE29FC8F5BD569126C7A9AE6F3


 
=== SCE_PSM_KDBG_ACCOUNT_KEY ===
=== PSM Developer Assistant ===
Keys used in the PlayStation Mobile Development Assistant and PlayStation Mobile Development Assistant for Unity applications
 
==== "protected_kconsole_cache.dat" HMAC Key ====
 
    B73966320E286ADC03F05465CA9E2F92388AEE236D43883135BAB0A5BD5043EA
 
==== "NSXVID-PSS.VT.WW-GLOBAL.xml" RSA Private ====
 
    -----BEGIN PRIVATE KEY-----
    MIIEvgIBADANBgkqhkiG9w0BAQEFAASCBKgwggSkAgEAAoIBAQCxl+8fRzDzyWb0
    89L9ssKWMO4IYJATVV/qsGPqL5XtgjqlSY6dV3QHWtdiqm4B9h8cy325+XEORMC8
    oErllSl7yovu956/D5laLLGqRkyFPcNer+DOjO99bDfJTTV1bSHuwc9oo3mJn6AO
    WuiY3aguCIYxNgSlDsfavjmCDXa3Q85hFOxJnn7HlM4X6rNxFi9y48LqUrDyWw0L
    bs+07bqNLoYHXtMoZcNQHqNmGtIHGx4RuFzZ4hduorjNsmSKHiQSz+ydJgJWtLJO
    tC2EM8zj8zStmlDiMTyAqKPHjENp4FBLoF87PISLsbyf4dTdWk35TvnsU/+tGVyH
    bVNcEAzvAgMBAAECggEBAKSil//kDIKD/BkrDDc6h9+aHqDPe+EgbVnxCb8pPBFB
    gEKIbVh5oUvMMA38txzEYNVd5AELOH6kyBRVePlajWmAPLddAOJYgK6y7kVPBFMl
    Db/yxjJVPxODxjeshtmEQUfIjhGQMvSdcVC9gBFusyFxr41haW7mw+mKHV/uQVbk
    TM/ZnEaN2Zrl7FfCUwXa3qyMrwj01bbAXXEqdM9ZF3UIXCLzihtNDKPAbpcVoQXH
    fItXVFeHjXqVCOVcKTI1PgElM6Q7VsVsU4pJGOmKy2gFbKqF4eniDK6gdGitbVpp
    rlXIrS2P8ZOfT+fSMjLbrr+mJEc2np4LYFlEHcJgtkkCgYEAwMrmf1LasiU/sijh
    0fOTV6TXefSrOxnpiq9Qs/oTSZ5USTh5FrunF0dX5Isy4XjYKWfIVwVl9LnAXRqR
    QTiHkbFon2KMYYyQfDUe4T9kuX6cAqp8WjBaivxs8chErM8rzZns62bR1B9+/IX4
    VIiHA1jfP9eiCl+1lMhhnnNIHX0CgYEA69Ffc2w5UCJ1cHxu8dR9V4otY57vBJFN
    2Svb8h3kJnO9LfU/RYMeXTgJSklh9Tw/zXPOMEQnxi7LocrDd1713vQTTspT3wWd
    3AJ25l0BP3NGnbEtGwv6It+VnUULr964vOUv/bl4UMQs52JsnxURts+GPZ3gAF1S
    U2AVxvVej9sCgYBAk7Yhb99RTKjJRGhfqvbvpIeIkivI4CUaDx85KcrMHfydig0F
    UFXntj36j6W7YH8HX3v7qhM8pfuJNBzze7vtUT96I8hh5HOBJ0nwqQtUFtSrD/AX
    RZsOcv8K/coDGGHTvHtfXlFqfCJM85L6vcB7nokpGVFtqCFqdLQ+Ht9JAQKBgQCU
    Ao/0dCLs5xPrDE7ePk6FmVavxlui9Eh2XI7qQlSmxdIhfGLAEHIIdFlwZOq076Hk
    JCFwLfcA7vIklI1m6RVNYMiVlWxa+L2CD5HtOMbFumbCJyh2Z2gSZ18SnPme4x30
    ga1DhRu9JcRBXodqueCqa0qIdgTYdbpsVkyU2gEGLQKBgGotuH/yrXNfifTc6Y24
    TSaqk/Dq6OvQOEFSIzgOzaQhWvwZjlz3uOnmi3vUo/guG9q/J1JWucWoXNXkkcmb
    trc3RYwzy6Rn+0uGHGA91e2bn6vT6PLNOgNUE7YCRDJe5DsDYHtUNILNbRVdSvNs
    rnh1i22Y3zLWChh3swswqgf7
    -----END PRIVATE KEY-----
 
* Used by the PSM Dev Assistant to sign the NSXVID-PSS.VT.WW-GLOBAL.xml file to prevent from modification.
 
==== Publishing License PKCS12 Import Password ====
 
    password
 
==== Publishing License PKCS12 PEM Pass Phrase ====
 
    password
 
* PKCS12 certificate used in signing PSM Dev PSSE with PSM SDK.
(World's most secure passwords ever, impossible to crack)   
 
You can use openssl like so:   
    openssl pkcs12 -in <filename> -password pass:password -passout pass:password
to view the private and public keys of a PSM Publishing license.
 
=== PSM Android ===
These keys are labeled within the debug symbols of the Android version of PSM.
 
==== SCE_PSM_KDBG_ACCOUNT_KEY ====  


     965895DF95F5432CCBCC4B7823CBF4B3
     965895DF95F5432CCBCC4B7823CBF4B3


==== SCE_PSM_KDBG_ACCOUNT_IV ====  
=== SCE_PSM_KDBG_ACCOUNT_IV ===


     00000000000000000000000000000000
     00000000000000000000000000000000


==== SCE_PSM_KDBG_C1_KEY ====  
=== SCE_PSM_KDBG_C1_KEY ===


     965895DF95F5432CCBCC4B7823CBF4B3
     965895DF95F5432CCBCC4B7823CBF4B3


==== SCE_PSM_KDBG_C1_IV ====  
=== SCE_PSM_KDBG_C1_IV ===


     00000000000000000000000000000000
     00000000000000000000000000000000


==== SCE_PSM_KDBG_CONSOLE_KEY ====  
=== SCE_PSM_KDBG_CONSOLE_KEY ===


     8235EDC66CD14D04F793369A74C7A4FE
     8235EDC66CD14D04F793369A74C7A4FE


==== SCE_PSM_KDBG_CONSOLE_IV ====  
=== SCE_PSM_KDBG_CONSOLE_IV ===


     00000000000000000000000000000000
     00000000000000000000000000000000


==== SCE_PSM_KDBG_LOGINFO_KEY ====  
=== SCE_PSM_KDBG_LOGINFO_KEY ===


     B293993BB5977F88844A7D21DDF63BC7
     B293993BB5977F88844A7D21DDF63BC7


==== SCE_PSM_KDBG_LOGINFO_IV ====  
=== SCE_PSM_KDBG_LOGINFO_IV ===


     00000000000000000000000000000000
     00000000000000000000000000000000


==== SCE_PSM_KDBG_V1_KEY ====  
=== SCE_PSM_KDBG_V1_KEY ===


     14E5A03B1E62D483F88769986EDB1140
     14E5A03B1E62D483F88769986EDB1140


==== SCE_PSM_KDBG_V1_IV ====  
=== SCE_PSM_KDBG_V1_IV ===


     00000000000000000000000000000000
     00000000000000000000000000000000


==== SCE_PSM_HEADER_SIGNATURE_PUB_KEY ====  
=== SCE_PSM_HEADER_SIGNATURE_PUB_KEY ===


     3082010A0282010100A98F6B27F5AFF0F96C7411A337DFCF723C37BEF6FF6552B
     3082010A0282010100A98F6B27F5AFF0F96C7411A337DFCF723C37BEF6FF6552B
Line 2,212: Line 2,020:
     F2EE34F88702030100010000
     F2EE34F88702030100010000


==== SCE_PSM_WHOLE_SIGNATURE_PUB_KEY ====  
=== SCE_PSM_WHOLE_SIGNATURE_PUB_KEY ===


     3082010A0282010100D452C18752BDE6289ACEB862AD32145322C13EEC82F5675
     3082010A0282010100D452C18752BDE6289ACEB862AD32145322C13EEC82F5675
Line 2,224: Line 2,032:
     655F4CDE0F02030100010000
     655F4CDE0F02030100010000


==== internalKey (KeyStore) ====  
=== internalKey (KeyStore) ===


     534B4257020000000000000010000000002F27E9ECD4606C3CE0BCFE99E2AE5EB
     534B4257020000000000000010000000002F27E9ECD4606C3CE0BCFE99E2AE5EB
Line 2,232: Line 2,040:
     E83746A9819C60AB7ED23B8D7685612A831C41000000
     E83746A9819C60AB7ED23B8D7685612A831C41000000


==== internalIcvKey (KeyStore) ====  
=== internalIcvKey (KeyStore) ===


     534B4257020000000000000010000000002F27E9ECD4606C3CE0BCFE99E2AE5EB
     534B4257020000000000000010000000002F27E9ECD4606C3CE0BCFE99E2AE5EB
Line 2,239: Line 2,047:
     C026F69D7A98767567BF04C95074B4C00000000000000000000000000000000BB
     C026F69D7A98767567BF04C95074B4C00000000000000000000000000000000BB
     6E2E9E14AB8D04309918ABD4186B5798F48C78000000
     6E2E9E14AB8D04309918ABD4186B5798F48C78000000
=== PSSE (PlayStation Suite Encryption) ===
PSSE is the encryption of PSM application files,
the whole game is encrypted and it server a similar function as PFS for the PSVita.


==== Header IV ====
=== PSSE Header IV ===


     000102030405060708090A0B0C0D0E0F
     000102030405060708090A0B0C0D0E0F


==== Header Key ====  
=== PSSE Header Key ===  
      
      
     4E298B40F531F469D21F75B133C307BE
     4E298B40F531F469D21F75B133C307BE


==== App Key ====
=== Runtime PSSE App Key ===
For decrypting PSSE files with IP9100-NPXS10074_00-0000000000000000 as content id
For decrypting PSSE files with IP9100-NPXS10074_00-0000000000000000 as content id
     A8693C4DF0AEEDBC9ABFD8213692912D
     A8693C4DF0AEEDBC9ABFD8213692912D


==== Debug Header Key ====
=== Debug PSSE Header Key ===
When you encrypt files locally for use in PSM Dev Assistant, using PSM SDK's "psm_encryptor64.dll"  
When you encrypt files locally for use in PSM Dev Assistant, using PSM SDK's "psm_encryptor64.dll"  
the following header key is used INSTEAD of the retail one.
the following header key is used INSTEAD of the retail one.
     00112233445566778899AABBCCDDEEFF
     00112233445566778899AABBCCDDEEFF
=== Hash Account ID ===
used for calculating "Unique ID" in
Sce.PlayStation.Core.Services.AccountInformation.UniqueID
==== Hash Account ID HMAC-SHA256 key ====
    BDEE3E0B93073749856F25CCDB443AFB0FAB94287493DC1AD0C5697E2A7AE14E
==== Hash Account ID AES-128-CBC Key ====
    5AA3DB8FE6AEE26CD185B086F5BD78A4
==== Hash Account ID AES-128-CBC Iv ====
    00000000000000000000000000000000
How to calculate UniqueID:
get psn accountid; => 0123456789abcdef (example)
sha256hmac(accountid, hmackey) => 4653ec6275f410c47d280a3688a554a579a7e7c9f52599381ae9ee4a1b6220e3
trim hmac to first 8 bytes => 4653ec6275f410c4
append trimmed hmac to accountid => 0123456789abcdef4653ec6275f410c4
aes128cbc(accountid + trimhmac, key, iv) => c7656d883573d94809c8fa05f511d84f
so "c7656d883573d94809c8fa05f511d84f" is the "UniqueID"


== EncDec Keys ==
== EncDec Keys ==
Line 3,316: Line 3,095:
! Type !! Version !! Modulus !! Usage || Notes
! Type !! Version !! Modulus !! Usage || Notes
|-
|-
| 0 and 1 || 1.00+ ||
| 0 and 1 || 1.00+ ||  
     9CCCE3A536FA641B2D1354EE98F093C2
     9CCCE3A536FA641B2D1354EE98F093C2
     68470F722C024B86CD60274E08E0067A
     68470F722C024B86CD60274E08E0067A
Line 3,400: Line 3,179:
! Type !! Version !! Modulus !! Usage || Notes
! Type !! Version !! Modulus !! Usage || Notes
|-
|-
| PSP || 1.00+ ||
| PSP || 1.00+ ||  
     BBDB6AA32E3B51A6D4708D5FC9899919
     BBDB6AA32E3B51A6D4708D5FC9899919
     395A2AAD83E98F4864C3BA43A5D6906F
     395A2AAD83E98F4864C3BA43A5D6906F
Line 3,472: Line 3,251:
== NID generation suffixes ==
== NID generation suffixes ==


* The algorithm is sha1(name + suffix).
* algo is sha1(name + suffix)


=== No suffix ===
=== No suffix ===
Line 3,478: Line 3,257:
For some PSP and PS Vita old NIDs, there was no suffix at all: algo was simply sha1(name).
For some PSP and PS Vita old NIDs, there was no suffix at all: algo was simply sha1(name).


=== PS3 NONAME suffix ===
=== PS3 NONAME default suffix ===


<pre>"0xbc5eba9e042504905b64274994d9c41f"</pre>
<pre>bc5eba9e042504905b64274994d9c41f</pre>


* Note that this ASCII string is used but not the hexadecimal value for it.
To check how to use this suffix (see: [https://www.psdevwiki.com/ps3/Keys#PS3_NONAME_NIDs_Salt]).


=== PS3 default suffix ===
=== PS3 default suffix ===
Line 3,488: Line 3,267:
<pre>6759659904250490566427499489741A</pre>
<pre>6759659904250490566427499489741A</pre>


* Note that this hexadecimal value is used but not the ASCII string for it.
=== PS Vita NONAME default suffix ===
 
=== PS Vita NONAME suffix ===


<pre>c1b886af5c31846467e7ba5e2cffd64a</pre>
<pre>c1b886af5c31846467e7ba5e2cffd64a</pre>
* Note that this hexadecimal value is used but not the ASCII string for it.


== SceKrm ==
== SceKrm ==
Please note that all contributions to Vita Developer wiki are considered to be released under the GNU Free Documentation License 1.2 (see Vita Developer wiki:Copyrights for details). If you do not want your writing to be edited mercilessly and redistributed at will, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource. Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following hCaptcha:

Cancel Editing help (opens in new window)