View Full Version : IdStorage keys and their uses + regeneration [TECHNICAL DISCUSSION]
elgordoeste
01-22-2008, 01:10 PM
Originally Posted by jas0nuk  View Post
elgordoeste: The topic was intended to work out how to regenerate it, 
but it appears we've hit a dead end until 1) a new jigkick is leaked and
 it gets decrypted and reversed, 2) a miracle, or 3) someone finds a 
hidden method in the PSP to regenerate the keys.
Don't expect anything to happen within the next month or two... or six.
Now that is really sad. Iv been reading everything U guys R doing to 
figure out the ID Storage and it really seems to be very hard to do. Is 
sad because now morons like me that didnt backed up the NAND before 
downgrading cannot use the UMD drive or can only update the PSP using el
 famoso Despertar del Cementerio.
Anyway, nice JOB guys.
EDIT:
So how exactly does it works? Just to have an idea! The hardware ie the 
UMD Drive has an encrypted key that matches the 0x102-0x106 in the id 
storage? So it compares those keys and if they matches it uses the 
idstorage one for security?? Or is it just the key from the idstorage 
that has the code to make it work??
Thanks
adrahil
01-22-2008, 05:58 PM
Just idstorage got the keys. So fuck up 102-106 -=> no more UMD.
elgordoeste
01-22-2008, 07:48 PM
SAD!!! :-(
What about the CFWs? U guys R going to keep working on those right? cuz 
based on what U saying, we, the ones that R f*cked up the only way to 
update FW is via DC.
brin_vg
01-22-2008, 09:20 PM
SAD!!! :-(
What about the CFWs? U guys R going to keep working on those right? cuz 
based on what U saying, we, the ones that R f*cked up the only way to 
update FW is via DC.
First of all, we didn't make you flash that NAND dump.
Second of all, if we had a viable method of regenerating IDStorage, you'd know about it.
Keys like 0x0102-0x0106 can't just be faked or rebuilt at this point, 
they are used in the UMD sector decryption process, if they're corrupt, 
decryption fails. Custom firmware can't fix that.
You can't update, because you've changed key 0x0100, which when changed 
(to anything) reads invalid, preventing updaters from running. There is 
no workaround to this.
So yes, Despertar del Cementario is the only way you can update. The 
problem is known, it's a pain, but there just isn't any other way if 
you've corrupted IDStorage. No amount of complaining will solve this, if
 you're pissed off about it, I suggest you start working on a way of 
solving your problem, instead of complaining why we haven't.
elgordoeste
01-23-2008, 02:04 AM
It is because of people like you that you dont get the support U need.
First of all I was not complaining. I think M33 and DAX R the best ever.
 You have to be a fucking genius to do stuff like M33 can do.
I know I have a fucked up IdStorage. I just wanted to know if DAX will 
continue to program cfws. I happen to be a c++, c#, delphi, c, v, vb.net
 and assembly programmer so I understand what is going on.
Dont want and didnt want to sound like I am upset.
BTW -> you wrent with me when I fucked up my idstorage so DUH!!! No one is blaming on U. #$%^&
Anyway. Wont Post again in LAN.ST. I dont like when people who think they know everything just start talking trash.
See ya in HELL...........from heaven of course!
Mathieulh
01-23-2008, 07:02 AM
everyone
 please calm down, this happen to be a DEVELOPMENT forum, not an 
elementary school backyard. Thank you for your understanding.
And what bring_vg said is true, if we had any way of generating signed 
idstorage keys we would have posted it publically by now. To be honest I
 don't even think there is one or it is possible without very extensive 
hardware involved (for each psp to restore that is) as from my point of 
view dumping the syscon chip microcode containing the kirk id is the 
only way to do it and considering this very id is unique per psps it 
would require to read the microcode of all syscon chips, it's nonsense. 
Anyway if there is another way to do it then we haven't find it yet, but
 the best way to fix your problem is I guess to get another psp (it 
would be far less expensive than the equipment needed to read the 
syscon's chip microcode xD)
Jachra
01-23-2008, 08:01 PM
MathieulH, did anyone try decryption of the UMD-keys with key 0x0140?
brin_vg
01-24-2008, 05:43 AM
PSP-2002 Aus/NZ Piano Black key 0x0140:
60 6A D7 FB 7F D4 B8 09 B2 68 0E 1D 0A 41 51 38 DC DF CB B0
In case anyone wants it...
EDIT: As far as I can tell, corrupting the key doesn't do.... anything. 
KIRK seems to work just fine, PRX decryption still works at least.
Mathieulh,
 if you were able to reverse one syscon chip to see how it was 
encrypting the original keys from some generic ID, couldn't you use that
 to find the original ID?  
I don't know anything about IPL programming, but couldn't you build an 
IPL from scratch that just ran that generic ID back through the syscon 
to rebuild the keys?  
I also may not know what I'm talking about, and if I said something stupid, please correct me.  :cool:
cory1492
01-25-2008, 06:53 AM
I
 think the main point that was made is, by the time you have reversed 
one chip using invasive methods, you will be very broke from paying for 
the hardware to do it with.
Saben
01-25-2008, 05:42 PM
Keys
 like 0x0102-0x0106 can't just be faked or rebuilt at this point, they 
are used in the UMD sector decryption process, if they're corrupt, 
decryption fails. Custom firmware can't fix that.
I'm wondering about the UMD keys and whether they involve a per-psp kirk
 or if they only involve the UMD drive.  I seem to remember that if you 
pull the UMD drive from one unit and put it into another the drive still
 wont function.  I'm wondering if you pulled a drive and associated keys
 from a unit and placed it into the second if the drive would work.  
This would indicate that for these keys they only enable the decryption 
of the data streaming from the drive.  Unfortunately I dont have the 
hardware resources to test it, but wondered if someone else might think 
it worth testing.  I'm not even sure of the value of the answer if we 
knew.  If the drive works in the second unit, then the key is the public
 side of a public/private encryption with the private encryption 
happening in the drive mechanism.  If the drive doesn't work, then it 
doesnt work and we dont really know why (key involves per psp kirk, or 
some other reason).
ByteMaster
01-25-2008, 06:56 PM
I seem to remember that if you pull the UMD drive from one unit and put it into another the drive still wont function.
If you look online there are plenty of sites that sell replacement UMD drives.
EDIT: this suggests that replacing the UMD drive will work without any change to IDStorage.
EDIT2: see this link for instance: 
http://gamerscrew.com/html/repair-part/psp-laser-replacement-and-psp-disassembly-tutorial.html
Saben
01-25-2008, 08:48 PM
My
 bad, thought I'd read a couple of posts in the past talking about this 
problem.  Either I read some mis-information or the senility is kicking 
in harder than usual.
brin_vg
01-30-2008, 08:26 PM
The
 TA-085 V2 has somewhat poked a hole in our assumption that all 
batteries start off with 0xFFFFFFFF, since new Slims can no longer write
 to EEPROM. Perhaps they've only changed that part of the line, and 
IDStorage is generated on the first run....
Jachra
01-31-2008, 12:17 AM
The
 TA-085 V2 has somewhat poked a hole in our assumption that all 
batteries start off with 0xFFFFFFFF, since new Slims can no longer write
 to EEPROM. Perhaps they've only changed that part of the line, and 
IDStorage is generated on the first run....
Nah, they use special prepared batteries to start the initial generation
 of the ID Storage. I wonder if Sony replaces the motherboard and if the
 motherboard contains an empty nand.
cory1492
01-31-2008, 03:01 AM
The
 TA-085 V2 has somewhat poked a hole in our assumption that all 
batteries start off with 0xFFFFFFFF, since new Slims can no longer write
 to EEPROM. Perhaps they've only changed that part of the line, and 
IDStorage is generated on the first run....
Or perhaps they have just randomized the commands (or changed the 
params) to write/read the prom in a byte-wise fashion, and left the 
functions out of retail firmware so we'd have nothing to reverse... to 
me the evidence suggests that is what is going on.
brin_vg
01-31-2008, 03:49 AM
The
 TA-085 V2 has somewhat poked a hole in our assumption that all 
batteries start off with 0xFFFFFFFF, since new Slims can no longer write
 to EEPROM. Perhaps they've only changed that part of the line, and 
IDStorage is generated on the first run....
Or perhaps they have just randomized the commands (or changed the 
params) to write/read the prom in a byte-wise fashion, and left the 
functions out of retail firmware so we'd have nothing to reverse... to 
me the evidence suggests that is what is going on.
How dare they start realizing and fixing their mistakes! :(
Yes, as already made Pandorii (lol) still work, that makes sense, the 
only thing that will have changed is a small part of the read/write, 
which doesn't affect them at all, but has us dead in the water.
Bastards. :D
jas0nuk
01-31-2008, 05:35 PM
Probably just moved the battery write/read commands to a different number :P
Hellcat
02-01-2008, 09:04 AM
As
 I see and understand it (which might likely be wrong....) the commands 
and/or hardware to write to the battery EEPROM *must* still be there 
anywhere.
AFAIK the EEPROM not only holds the serial, but vital status information of the battery as well.
That information is maintained and updated by the device the battery sits in and maybe a bit by the battery itself.
I think they just added some sort of security check,
Another option would be, they really blocked write access to the bytes 
containing the serial completely in the syscon, since the serial is 
indeed not intended to be changed, so blocking write access to those 
positions wouldn't break anything....
Does this actually make sense, or am I lightyears off track?
Checking...
02-01-2008, 10:20 PM
Could anyone make a small program Visual Basic or C or a Javasript page that Prints out the NID once the "guess" is inputted. 
Sort of like this:
http://img220.imageshack.us/img220/3117/iamgetn6.png (http://imageshack.us)
I could make some intelligent guesses. Instead of going through websites
 and getting the SHA and reversing it's bits and checking if I got 
something luckily.
Zmathue
02-02-2008, 12:11 AM
I
 got a quick question, other then the umd decryption and magicgate 
memory stick's is the id storage accessed outside of the firmware.
jas0nuk
02-02-2008, 12:23 PM
Yes, the WLAN adhoc authentication uses key 0x100
Checking...
02-03-2008, 12:12 AM
Could anyone make a small program Visual Basic or C or a Javasript page that Prints out the NID once the "guess" is inputted. 
Sort of like this:
http://img220.imageshack.us/img220/3117/iamgetn6.png (http://imageshack.us)
I could make some intelligent guesses. Instead of going through websites
 and getting the SHA and reversing it's bits and checking if I got 
something luckily. 
Just diggin' :p
Hello everyone I upgrade the PSP's serious problems encountered 
For the error code : CAT80000025  I would like to ask how can we solve this problem??????:confused::confused::confused:
l_oliveira
02-04-2008, 04:44 AM
As
 I see and understand it (which might likely be wrong....) the commands 
and/or hardware to write to the battery EEPROM *must* still be there 
anywhere.
AFAIK the EEPROM not only holds the serial, but vital status information of the battery as well.
That information is maintained and updated by the device the battery sits in and maybe a bit by the battery itself.
I think they just added some sort of security check,
Another option would be, they really blocked write access to the bytes 
containing the serial completely in the syscon, since the serial is 
indeed not intended to be changed, so blocking write access to those 
positions wouldn't break anything....
Does this actually make sense, or am I lightyears off track?
Makes sense totally.
Back in 2002 PS2 hackers figured out that PS2s had their Serial numbers 
and iLINK IDs in plaintext on the mechacon eeprom. That was exploited to
 the exaustion and sony's response were a new mechacon design called 
"dragon" (CXR706080) on the 5000x and all Slimline PS2 series.
That chip has the eeprom and realtime clock moved to it's die, firmware 
is patched to disallow writes to the serial number and iLINK regions of 
the eeprom, as well. Also the protocols for the mechacon debug and 
diagnosis serial port were changed (Sony mechacon software tools that 
work with models up to SCPH-3900x were leaked from Sony authorized 
service and are available if you know where to look).
You see ... this kind of fixing is not only trivial but they have messed this up earlier ! lol
cory1492
02-06-2008, 05:54 AM
I've
 presumed all along that the commands still exist, either with a changed
 command number or specific parameter changes - and that the removal of 
those functions from 3.80 was their method of not "leaking" those 
changes in public firmware.
Changing the commands to read the prom doesn't have to change anything 
else like hellcat presumes though, since there are other commands and 
they don't necessarily have to rely on reading/writing the prom, as far 
as I can tell there is a challenge/response protocol that the PSP uses 
to "converse" with the batteries' onboard microcontroller which would 
already have direct access to all the info in the prom to formulate it's
 responses to things like capacity.
What would be nice is a low level routine/addresses that lets us 
formulate data going directly to that 1wire serial bus, so we don't need
 syscon to play the middleman. Whether that is possible... I don't know.
edit:/ not sure if this would work, but has anyone tried sending all 
possible commands to syscon to at least list which commands exist and 
which come back as unsupported? Perhaps one way of seeing if they just 
changed something simple like the command number.
Hellcat
02-06-2008, 09:31 AM
Well, they put the functions in there for a reason in pre 3.80, so the FW seems to use the access to the battery.
Let's assume 3.80+ still does, so somehere in the MBs of the firmware there is code that acesses the battery....
....how are chances of "scanning" the .PRXs for code that accesses the 
battery? It should have some sort of "pattern" to look for, wouldn't it?
SilverSpring
02-06-2008, 09:52 AM
edit:/
 not sure if this would work, but has anyone tried sending all possible 
commands to syscon to at least list which commands exist and which come 
back as unsupported? Perhaps one way of seeing if they just changed 
something simple like the command number.
Of course! What do you think :p. Though I havent listed changes between 
different syscon versions (I simply dont have that many different PSP 
models to test).
Internally sure the command would most probably still exist, the simplest change would be to the interface only.  
Looking at how that Datel battery converter works would sure provide some clues (especially for the challenge response).
EDIT:
Ok, here's my compiled list. It should be pretty complete. Some cmds 
have changed over versions, ie. only existed on an earlier version of 
SYSCON, or was changed to something different on a later version, or 
only on fat, or only on slim, etc.
A good example is cmd 0x4A, earlier SYSCON versions had that cmd mapped 
to GetPowerError, later GetPowerError was removed completely and cmd 
0x4A then became CtrlHddPower.
I should also note that not all values are used. Cmds are from 
0x00-0x7F, there aren't 128 cmds being used so if it says UNK it's not 
used (unless I've put a comment next to it saying the cmd exists but do 
not know what it does, usually because the nid hasnt been cracked). 
Example being cmd 0x23/0x24 which are being used quite a lot. But have 
no idea what it is.
http://pb.malloc.us/f56ce75ce
EDIT2:
Well, they put the functions in there for a reason in pre 3.80, so the FW seems to use the access to the battery.
Let's assume 3.80+ still does, so somehere in the MBs of the firmware there is code that acesses the battery....
....how are chances of "scanning" the .PRXs for code that accesses the 
battery? It should have some sort of "pattern" to look for, wouldn't it?
SCE are pretty lazy :p. They will reuse the same prx over & over on 
all their machines, devkits, testing tools, etc. (saves them from having
 to make a seperate version for each type). That is why you still see 
devkit only code in the fw which only runs on a devkit. The syscon.prx 
is used as a lib, so it's exports are not necessarily used in the fw 
itself (only small fraction of exports are actually used in the fw, and I
 assure you the read/write eeprom functions are DEFINITELY not used), 
but having a complete interface means that they are still able to use 
them in their internal apps on their internal machines (when doing 
testing etc). Frankly Im surprised these 
sceSysconBatteryReadNVM/sceSysconBatteryWriteNVM exports ever existed at
 all on the retail PSP.
cory1492
02-06-2008, 12:01 PM
Of
 course! What do you think :p. Though I havent listed changes between 
different syscon versions (I simply dont have that many different PSP 
models to test).
Ok, so I give this list to a guy with a newer PSP and they are just 
going to go "like wtf dude" or something equally inane. My thought is 
does syscon return a specific error if you feed it a command with no 
params at all, or will it always return hardware error like we are 
seeing with the revised slims if the params are not correct (really 
gotta get this mess I've got going cleared up and do some of my own 
legwork on it for my own curiosity.) And in the end, I guess I'd have to
 ask, would it even be safe to ask someone to brute/randomly try 
something that issues these commands on hardware (or advisable, you saw 
how long it took just to get that single error code, no thanks to me 
though xD)
From what I have seen of others logs, comms are not crypted between the 
battery and the PSP. It's likely the datel device just fakes the initial
 handshake, issues the commands to write the prom and away it goes. It's
 semi-documented by nem and other's analysis over at ps2 dev, as far as I
 can tell it'd be a fairly common single wire serial protocol which 
should be well documented right down to the timings. It may well even be
 possible to hijack the battery comms using a standard serial interface.
SilverSpring
02-06-2008, 12:33 PM
My
 thought is does syscon return a specific error if you feed it a command
 with no params at all, or will it always return hardware error like we 
are seeing with the revised slims if the params are not correct (really 
gotta get this mess I've got going cleared up and do some of my own 
legwork on it for my own curiosity.) And in the end, I guess I'd have to
 ask, would it even be safe to ask someone to brute/randomly try 
something that issues these commands on hardware (or advisable, you saw 
how long it took just to get that single error code, no thanks to me 
though xD)
Yes it will return 0x83 error if params are wrong (or 0x80250083 is what
 you'll really see returned by syscon.prx, the syscon chip itself 
returns 0x83). The 0x84 error that the new slims are returning means 
that the cmd is not recognised, you'll get that same error trying any 
other unused cmd. I just dump the whole syscon packet after executing 
the cmd to see if there are any other (minor) changes when it fails for 
those cmds. I'll give you a sample code to test (a funny bit I found, 
the SYSCON chip uses the 0xDEADBEEF moniker for their invalid addresses,
 cute).
About sending cmds via hw, it wont make a difference, it will just be the same as doing it in software. Basically:
CPU -> SPI bus -> SYSCON -> some 1-wire serial bus -> 
Battery. So sending the packet to syscon via HW on the SPI bus is no 
different than using the software interface. It's the way Syscon 
recognises these cmds in it's fw that determines what it will then do to
 the battery. And the only current way to work with Syscon is via this 
interface (though Im always hopeful for breakthroughs).
Fadil Hacking Team
02-06-2008, 01:26 PM
Will
 there be a way to regenerate corrupt ID Storage one day?:rolleyes: I 
Have a PSP fat with corrupt ID Storage & keys (UMD,Sony's 
updater,Wifi & Remote Play) are not working:(.Everytime that i need 
to update my PSP to a new custom firmware M33 i need to wait for 
Dark_AleX's Despertar del Cementerio
cory1492
02-07-2008, 05:46 PM
About sending cmds via hw, it wont make a difference, it will just be the same as doing it in software. Basically:
CPU -> SPI bus -> SYSCON -> some 1-wire serial bus -> 
Battery. So sending the packet to syscon via HW on the SPI bus is no 
different than using the software interface. It's the way Syscon 
recognises these cmds in it's fw that determines what it will then do to
 the battery. And the only current way to work with Syscon is via this 
interface (though Im always hopeful for breakthroughs).
Yeah, I kind of figure syscon would be handling the hw interface but one
 can always hope there are direct address lines like the NAND has.
Fadil: at the present rate of discovery, I'd say no time soon (if at 
all.) But you never know, someone may well stumble into something that 
blows the lid off; then again, the PSP may well take it's secret to the 
grave, so to speak...
DarkZero
02-10-2008, 04:07 AM
I
 don't know but I'm probably revisiting things people have already 
researched/discussed here. When the IDStorage was initially generated I 
would assume that kirk actually did the encryption on the unique keys 
correct? I guess we don't really know for sure but it would make sense 
wouldn't it. In which case kirk obviously has access to the encryption 
key as it seems to be believed that it is the kirk ID correct? So 
wouldn't there probably be some way of making kirk do whatever the 
factory had it do initially? 
On another note, I would assume decrypting the unique keys would be a 
major step forward. After all, the unencrypted info would be necessary 
to regenerate the keys correct? wonder if a way to crack the encryption 
could be devised.
Like I said, all this has probably been discussed but 29 pages is a lot 
to read. I'm hoping to play around and see if I can figure anything out 
as soon as I get a working PSP again. I screwed up my idstorage just to 
find that my brother had deleted my nand dump off the computer.
brin_vg
02-10-2008, 05:05 AM
I
 don't know but I'm probably revisiting things people have already 
researched/discussed here. When the IDStorage was initially generated I 
would assume that kirk actually did the encryption on the unique keys 
correct? I guess we don't really know for sure but it would make sense 
wouldn't it. In which case kirk obviously has access to the encryption 
key as it seems to be believed that it is the kirk ID correct? So 
wouldn't there probably be some way of making kirk do whatever the 
factory had it do initially? 
On another note, I would assume decrypting the unique keys would be a 
major step forward. After all, the unencrypted info would be necessary 
to regenerate the keys correct? wonder if a way to crack the encryption 
could be devised.
Like I said, all this has probably been discussed but 29 pages is a lot 
to read. I'm hoping to play around and see if I can figure anything out 
as soon as I get a working PSP again. I screwed up my idstorage just to 
find that my brother had deleted my nand dump off the computer.
Correct, the problem is that were you able to retrieve the KIRK ID by 
hardware means (rather expensive means, I might add), you'd still have 
to repeat that process for each individual PSP. If the KIRK ID is the 
key to all this, unless one of the undocumented KIRK commands is able to
 access this ID, we're a tad dead in the water.
DarkZero
02-10-2008, 07:22 AM
I'm
 purely speculating at this point but my theory is that one of the 
undocumented kirk commands may actually have been used in generating the
 idstorage. We won't know though until we can figure out the 
undocumented ones.
brin_vg
02-10-2008, 07:26 AM
I'm
 purely speculating at this point but my theory is that one of the 
undocumented kirk commands may actually have been used in generating the
 idstorage. We won't know though until we can figure out the 
undocumented ones.
Indeed, sadly, I'm shit at C :D
DarkZero
02-10-2008, 05:24 PM
eh, my C is rusty but I'll probably brush up on it. It would be awesome if we could find a way to regen the IDStorage though.
cory1492
02-11-2008, 01:12 PM
I
 think at this point it isn't so much C that is an issue, it is trying 
to understand "undocumented hardware that does dog only knows what 
internally" ;)
One also assumes (as in previous posts to this thread) that the key to 
generate idstore is actually kept somewhere in the process (even if it 
is to OTP flash inside the syscon or something equally odd), remember 
though that asym crypted data does not need the generating/private key 
to be decrypted.
Perhaps this would be a good point of speculation as to why they stopped
 writing an actual value to what we presume is the "serial" location in 
idstore (similar reasons to the removal of NVM routines from hardware 
recently.) I wonder if anyone has tried anything with syscon and that 
specific key, or for that matter if that key is used in any of the 
pre-nulled on hardware firmwares...
brin_vg
02-11-2008, 06:39 PM
I think at this point it isn't so much C that is an issue
It is for me, since testing has to be done painfully and slowly since I can't write my own programs for crap :D
Jachra
02-12-2008, 10:36 PM
EMO posted the text below on maxconsole, however I do not know if it is true.
If it is true, then it might contradict what we know in a way. It could 
mean that there just a "few" entry's possible in the ID Storage for the 
UMD key.
Link to comment 1 (http://forums.maxconsole.net/showpost.php?p=858487&postcount=10)
if he used a 1.50 firmware (only) nand dump from another PSP it will 
work as my phat psp fully bricked long time ago and i make an 1.50 
firmware nand dump from another PSP and it's worked  so try to find some
 one with a homebrew psp to make a dump for you 
I asked him: (http://forums.maxconsole.net/showpost.php?p=858684&postcount=11)
Are you very sure? Normally the UMD-drive shouldn't be reading a UMD and WiFi Ad-Hoc should fail.
His answer: (http://forums.maxconsole.net/showpost.php?p=859814&postcount=12)
No every thing is worked with me but be sure not to make a nand dump with idstorage.
Can this really be true?
moneymaker
02-12-2008, 11:59 PM
EMO posted the text below on maxconsole, however I do not know if it is true.
If it is true, then it might contradict what we know in a way. It could 
mean that there just a "few" entry's possible in the ID Storage for the 
UMD key.
 
Link to comment 1 (http://forums.maxconsole.net/showpost.php?p=858487&postcount=10)
 
if he used a 1.50 firmware (only) nand dump from another PSP it will 
work as my phat psp fully bricked long time ago and i make an 1.50 
firmware nand dump from another PSP and it's worked so try to find some 
one with a homebrew psp to make a dump for you 
 
I asked him: (http://forums.maxconsole.net/showpost.php?p=858684&postcount=11)
 
Are you very sure? Normally the UMD-drive shouldn't be reading a UMD and WiFi Ad-Hoc should fail.
 
His answer: (http://forums.maxconsole.net/showpost.php?p=859814&postcount=12)
 
No every thing is worked with me but be sure not to make a nand dump with idstorage.
 
Can this really be true?
 
Well, if you have a brick non IdStorage dependent ... I think ...why not (imho).:D
 
A stupid question however someway topic related:
 
I'm not native I'll do my best to be clear.
 
The point to me seems to be HW related.
 
All of you knows that flashing an installation image build on a machine 
over another one in most cases will lead to crashes but replacing a 
component will often only lead the system to a need of an update.
 
IdStorage is, encrypted or not, and callit whatever you want, nothing 
more than a registry and this is proven on the bases the system itself 
rewrite some of it's keys for BS things like the 0x054 key (display 
colour it seems...)... ok ?
 
Well if the system can write an encrypted key for such a stupid thing why couldn't do the same thing for other questions ?
 
Does anyone ever tried to make a IDS backup of a fully working unit with
 a fully working UMD unit and a make another one after replacing the UMD
 unit with another fully working one ?
 
Does something changes in the IdStorage after the move ?
 
Does the unit have the ability to update it's IdStorage keys whether detects hardware changes ?
 
UMD unit is a replaceable thing and when it's replaced due to overwork 
the main unit with the new one laser unit works again ...it's not ?
 
In many systems the OS store hardware related infos in a registry, encrypted or not, does the psp do the same thing ?
 
If it where so all would be a little more simple, it should means the kernel at his wish CAN rebuild IdS HW related keys...
 
I now, it's an hammer'nd chisel test but ...:D
moneymaker
02-13-2008, 12:20 AM
EMO posted the text below on maxconsole, however I do not know if it is true.
If it is true, then it might contradict what we know in a way. It could 
mean that there just a "few" entry's possible in the ID Storage for the 
UMD key.
 
Link to comment 1 (http://forums.maxconsole.net/showpost.php?p=858487&postcount=10)
 
if he used a 1.50 firmware (only) nand dump from another PSP it will 
work as my phat psp fully bricked long time ago and i make an 1.50 
firmware nand dump from another PSP and it's worked so try to find some 
one with a homebrew psp to make a dump for you 
 
I asked him: (http://forums.maxconsole.net/showpost.php?p=858684&postcount=11)
 
Are you very sure? Normally the UMD-drive shouldn't be reading a UMD and WiFi Ad-Hoc should fail.
 
His answer: (http://forums.maxconsole.net/showpost.php?p=859814&postcount=12)
 
No every thing is worked with me but be sure not to make a nand dump with idstorage.
 
Can this really be true?
 
Yes if it's a mess wich doesn't involves IdStorage...
 
 
Another stupid question:
 
Does anyone ever tried to compare IDS of a fully working unit after 
replacing a fully working UMD unit with another fully working one ?
 
Do the kernel does some changes in IDS ?
 
After all, encrypted or not, IDS is a bare registry or I've screwed my brain, do I ?
 
Since the main unit uses it for stupid things as the backgorund color is
 and encrypts a key only to remember it... afaik the hardware config is 
more than that...
 
Let's figure out an OS image with the kernel build on a machine and 
slapped to another machine kind... it wont work, but swapping only a 
device... the system may identify the new hardware... moreover in our 
test all the change is an hardware ID...
 
Well if the psp does the same thing (replacing an UMD with a broken lens
 seems to work anyway quite well and without troubles) AND changes it's 
internal hardware cofiguration ... I'll leave you all the rest...
cory1492
02-13-2008, 10:15 AM
From
 the sounds of that discussion EMO is pulling someones leg or isn't 
getting their point across completely. There is a good reason why this 
thread is an ongoing discussion.
No every thing is worked with me but be sure not to make a nand dump with idstorage.
Probably means be sure to not flash idstore from whatever nand dump is made.
moneymaker
02-14-2008, 02:13 AM
Well I'll go straight to the point as fast as I can unless I must spend few words.
When replacing due to overwork a cranked-up UMD unit a psp reads again without troubles, right ?
Do someone has tried to watch if IdStore changes in some way after an hardware replacement of a unit like UMD and Wi-FI ?
I now It may seems a dull question but let we analyze facts from another point of view:
An IdStorage is nothing more, nothing less than an encrypted callit 
wathever you want registry...but why in a registry can't be buried a 
"driver" ?
The system seems to have no problem to write in it since IF it's finally
 confirmed some keys changes seemingly to one storing default ?? 
background color ??
Do encryption changes between a key and another ?
At SCE are they so perverted ?
If not, are you focusing the point ?
The system knows how and where to write.
Moreover 1.50 updater add two keys to IdStorage to fix language in 1.00 version, right ?
Yes maybe it only does a chek of the stuff like MB 'nd OS version doing a
 "non per unit" patch, perhaps this isn't a good point but even in this 
case there must be the patch buried somewhere into the updater...
Never mind... not very helpfull, I don't really know where this can lead
 to...only before trying voodoo stuffs on a syscon maybe someone can 
give a check to theese ideas...
What I mean is, does an fw installer give a check at IdStorage ?
Yes it does, how come it do its checks only on a few bunch of keys instead to the whole batch ?
It's not it knows many keys can change, it is ?
It understands IDs or does a basically "encrypted mirror check" ?
Then...
... a key from a mobo wont work in another one but do an encrypted 
driver built for a device 'nd hardware signchecked can run on another 
machine even  for the same device ?
Do the machine itself recode the "driver" when it's detected an hardware
 change, encrypting it with it's own "wtf" microcode AND the new device 
microcode?
Do you understands where I'm aiming to ?
I'm not a really full fledged coder, I know it, my field is 
"logic"....don't blame me if I've told a bunch of BS but I'm concerned 
into this thing but things runs on my minds and trying to give somehow 
my support I fired them off...
Moreover I'm not native... I hope to have not mispelled something...
 
I've edited this post trying to explain better my point of view.
cory1492
02-14-2008, 03:35 AM
moneymaker: logic dictates you have not read or gotten what has come before.
Changing the UMD drive out doesn't require any software alterations, as 
the drives all feed the same data to the PSP (the data that is 
permanently crypted on the UMD, to be precise.) Changing the wifi module
 only requires altering the mac address in idstore to make it work fully
 (IIRC adhoc gets broken if you don't).
The problem is, there are a set of unique keys that are set up to 
decrypt from idstore on a per PSP basis (they are crypted to the PSP 
they are on at some point during manufacture), and they contain the data
 that is used to do things like validate region, PSID, and provide the 
decryption key for the data that comes off the UMD drive. It's been 
posited that some of this can be bypassed via software hacks (and in 
some things like region this is already partially done in custom 
firmware), but exactly how well that would work, whether it would work 
or is tied more strictly to hardware like syscon, and whether it is 
trivial to re-hack each new firmware - is another question entirely.
I definitely can't say the hardware is fully understood, but IF (big if)
 1.00 to 1.50 did update the idstore at all the changes were likely 
trivial (first I have ever heard of any official updater making any 
changes to idstore at all.)
brin_vg
02-14-2008, 04:14 AM
I
 definitely can't say the hardware is fully understood, but IF (big if) 
1.00 to 1.50 did update the idstore at all the changes were likely 
trivial (first I have ever heard of any official updater making any 
changes to idstore at all.)
Plus (I'm not entirely sure which keys we're talking about here) if the 
keys written aren't unique, they don't require generation, just writing 
as how KeyCleaner does it.
moneymaker
02-14-2008, 05:22 AM
logic dictates also the whole 100-106 key isn't THE key used for UMD decryption but a very small part of it must be.
I figure out how many processor cycles needs a strong key from the (2) core unit(s).
They must 've chosen a secure but fast path to not have the system sucks up the poor 3.6 volt battery too much.
Obviously processor knows exactly which to look of those 3136 bytes for decryption purposes if this is true.
At the end what could it be ? A bare metal assembler serialized processor microcode extension ?
I'll do some exp. on it... first of all I'll try setting all those bytes
 to FF watching the effects ...then I'll do some test on the code and 
only on it.
I'm not here crying "help me, i've screwed my precious psp", it's more 
fun than use it for what it's intended... thus if there some voltage 
control on it...well, then I microwave it and post a video on youtube, 
ok ? :D
brin_vg
02-14-2008, 05:39 AM
Setting
 it to all FF just produces a 'The game could not be started. The region
 code is incorrect' every time you try to launch... anything... from my 
testing.
SilverSpring
02-14-2008, 10:17 AM
NO
 updater has EVER written to idstorage. NO firmware has EVER written to 
idstorage. NO app/game has EVER written to idstorage (not including 
'homebrew' apps).
In short, NOTHING has ever written to idstorage (apart from when they 
were first written at factory and at service/repair centers).
EDIT:
Also when replacing the "umd drive", what you are really replacing is 
just the optical pickup unit. All the corresponding electronics are on 
the motherboard itself. So these type of replacements are perfectly 
fine. But even if the umd drive had an embedded controller (like a dvd 
drive) replacing it would still be fine since the umd drive doesnt do 
the decryption, just reads the (encrypted) data off the disc.
cory1492
02-14-2008, 04:58 PM
logic dictates also the whole 100-106 key isn't THE key used for UMD decryption but a very small part of it must be.
I figure out how many processor cycles needs a strong key from the (2) core unit(s).
Indeed, I also presume the full key isn't easily accessible intentionally (to prevent counterfeit and unlicensed UMD.)
Obviously processor knows exactly which to look of those 3136 bytes for decryption purposes if this is true.
The PSP has a couple crypto engines in it, I presume they have to be set
 up in some fashion requiring the idstore data (even if it is only used 
as per-psp auth against something that is programmed at manufacture to 
simply allow an internal function to work or not work.) As to what the 
chips are actually doing internally, don't know - but the idea of 
mux/demux comes to mind, and that they had the opportunity to have the 
chips designed for a single purpose (and thus be power efficient.)
I'll do some exp. on it... first of all I'll try setting all those bytes
 to FF watching the effects ...then I'll do some test on the code and 
only on it. I for one hope you have patience and better hardware than I 
do for looking into such things ;) 
BTW... skip the microwave, sparks aren't that impressive even when they are inside a plastic housing :D
moneymaker
02-15-2008, 03:10 PM
Indeed, I also presume the full key isn't easily accessible intentionally (to prevent counterfeit and unlicensed UMD.)
 
Most likely is it so, but the reason doesn't exist, I've never seen an umd dupe.
 
Games development is done on dedicated virtual machines and when the job
 is done the 9669 goes straight to the crafting factory, after some 
tests mass production starts.
 
UMD duping cannot be a business, all of you knows it well.
 
Then why they use 128 bits AES encryption for that drive ?
 
Perhaps the key is an hand painted Japanese character binary 
translation's CRC2 with meaning "suckthis" plus its byteswapped mirror 
(just ignore this, please).
 
But..even if we manage to find those cursed 16 bytes, wtf...?
 
For sure I can confirm 0x5 and 0x12 are the same (at least in euro 
version) on TA081(1004H) and TA085(v2 reasonably, cause noway to battery
 eeprom) (2004PB Italy, UK import) when 0x10,0x11,0x13 changes and mine 
TA085 also shows a (reintroduced) 0x050...
I'm analyzing 100-106 differences between the two.
ahchang
02-27-2008, 07:07 AM
hei
 there, a little help needed , i have a TA-82/86 system, i m having 
problem upgrading 3.80m33 to 3.90m33 and it appears to be the idstorage 
keys fault, of which i get a code of DRNFFFFFFB0, can anyone help me on 
rebuilding it back , any help would be greatly appreciated!!
Ghostman
02-27-2008, 01:37 PM
hei
 there, a little help needed , i have a TA-82/86 system, i m having 
problem upgrading 3.80m33 to 3.90m33 and it appears to be the idstorage 
keys fault, of which i get a code of DRNFFFFFFB0, can anyone help me on 
rebuilding it back , any help would be greatly appreciated!!
Go to help section!
Mathieulh
02-28-2008, 01:09 PM
hei
 there, a little help needed , i have a TA-82/86 system, i m having 
problem upgrading 3.80m33 to 3.90m33 and it appears to be the idstorage 
keys fault, of which i get a code of DRNFFFFFFB0, can anyone help me on 
rebuilding it back , any help would be greatly appreciated!!
This is a development forum. If you would have googled a little you 
would have found that this issue can easely be fixed by tools such as 
keycleaner. 
again this is the kind of requests to do in noob friendly boards (such 
as exophase, maxconsole etc etc) Please look at proper documentations 
and tutorials before asking questions here.
pspZorba
03-02-2008, 07:56 PM
HI all,
In my homebrew I am using sceIdStorageLookup to retreive the MAC address, it works fine for both  a Fat or a SLIN. 
When I am trying to look up the same MAC address in the dump file (of 
the NAND), I can find it for the FAT, but not  in the SLIM ones.
Did I miss something ?
cory1492
03-03-2008, 01:37 AM
When
 I am trying to look up the same MAC address in the dump file (of the 
NAND), I can find it for the FAT, but not in the SLIM ones.
Yes, you missed the fact that a NAND dump of a slim, unlike the fat PSP,
 has the idstore crypted; when running PSP firmware idstore driver takes
 care of the decrypt but the NAND driver still gets access to the 
crypted data.
pspZorba
03-03-2008, 02:19 AM
damn!
Thank you  cory1492.
my intention was to read the MAC address in the dump and compared it to 
the one retreived directly from the idstorage to be sure to reflash the 
right dump  to the right PSP...
FUNZEM
03-03-2008, 09:17 PM
When
 I am trying to look up the same MAC address in the dump file (of the 
NAND), I can find it for the FAT, but not in the SLIM ones.
Yes, you missed the fact that a NAND dump of a slim, unlike the fat PSP,
 has the idstore crypted; when running PSP firmware idstore driver takes
 care of the decrypt but the NAND driver still gets access to the 
crypted data.
hi Cory1492 , i have been following u guys with the id storage issues. really hope i can contribute some help.
i m not a programmer but i may be able to give u nands from few hundreds
 sets or even thousands for u guys to do comparision. or if u guys needs
 any hard ware data just let me know if i can contribute but i need 
instructions hee...i have extracted them from vga of phat machine thru 
the hard way before the m33 is release. all the best to the development .
Torch
03-18-2008, 04:54 PM
Wont the final UMD decryption key be stored in memory (probably some HW controller mem)  while the drive is reading?
I presume the UMD decryption key is got after decryption of corresponding IDStorage keys.
But if the final UMD decryption key is obtained, then that key will decrypt ANY UMD on ANY PSP right?
Is it possible to force the use of the obtained key, regardless of the 
IDStorage state, either by using specialized CFW (if such low level 
access is possible) or at worst by a hardmod?
Thought it wouldnt really be IDStorage regeneration, it would still be restoration of functionality.
jas0nuk
03-18-2008, 05:44 PM
Wont the final UMD decryption key be stored in memory (probably some HW controller mem)  while the drive is reading?
I presume the UMD decryption key is got after decryption of corresponding IDStorage keys.
But if the final UMD decryption key is obtained, then that key will decrypt ANY UMD on ANY PSP right?
Is it possible to force the use of the obtained key, regardless of the 
IDStorage state, either by using specialized CFW (if such low level 
access is possible) or at worst by a hardmod?
Thought it wouldnt really be IDStorage regeneration, it would still be restoration of functionality.
The key is probably stored in the UMD controller hardware or some other 
low level memory. It is obtained from the decryption of the keys, and 
probably some constant which is stored elsewhere. And yes, the final key
 will decrypt any UMD on any PSP.
If that key can be discovered, it may or may not be possible to force 
the PSP to use it, depends where the key is stored while it's being 
used.
And finally, that doesn't classify as IdStorage regeneration, but it's 
good enough. The aim here is to restore PSP functionality, if we can do 
that without regenerating the IdStorage, then that's good enough ;)
Jachra
03-18-2008, 10:59 PM
Correct
 if I am wrong, but are the ID Storage Keys for the UMD read and 
decrypted at boot from the IPL or when a UMD is accessed or initialized?
If it is the within the firmware, then possibly a program can hook into that.
It could be used for a slow brute force attack.
Bubbletune
03-22-2008, 10:10 PM
Correct
 if I am wrong, but are the ID Storage Keys for the UMD read and 
decrypted at boot from the IPL or when a UMD is accessed or initialized?
If it is the within the firmware, then possibly a program can hook into that.
It could be used for a slow brute force attack.
Even if it was in the IPL, it still won't matter as we've got custom IPL
 blocks now. However, such a bruteforce attack would take millions of 
years, it simply isn't going to work.
Jachra
03-23-2008, 10:12 PM
I know JumpR, but I haven't seen any other option at the moment. have you?
Bubbletune
03-23-2008, 11:43 PM
I know JumpR, but I haven't seen any other option at the moment. have you?
Well, breaking the encryption chips using invasive methods :p Gathering 
money to afford that would even take less long then such a huge 
bruteforce attack I guess. Seriously, it's going to take millions of 
years, it just isn't an option.
cory1492
03-24-2008, 01:55 PM
Jachra: stop, just stop.
Brute force isn't going to help, the likelihood of literally stumbling 
across the correct key within your lifetime is NIL, the size of the data
 is just too bloody big to one shot guess the thing.
Unless the hardware itself can be completely understood (again, fairly 
unlikely unless there are leaks I don't know about or someone with the 
skill and desire to do it rather than hound a forum with what is already
 understood by most as being a.. "very bad idea") and some form of 
timing attack can be made to help so that the entire key can be broken 
into smaller bits and guessed in small chunks (the reward, skill and 
hardware costs to do so would likely make purchasing a new PSP cheaper 
in the long run), put bluntly in a loud "voice" so you stop suggesting 
it as viable as it seems you aren't trying to attain the skill to do it 
yourself but have been suggesting someone do it for you:
THERE IS NO HOPE OF ONLY DIRECT BRUTE FORCE SUCCEEDING BEFORE THE HARDWARE FAILS.
 There are always two options available in the case of a lost idstore:
- just use the thing for parts and get a different one, and chalk it up 
to "I/they/their brothers/their friends/whathaveyou should have made a 
backup before messing around with unofficial software."
- sit on your hands and hope someone comes up with something. There are 
definitely people who are vigilant (and a few of them have suggested 
things that may be possible in circumventing the key issue that have 
nothing to do with brute forcing anything) in looking for a slip or 
indication that would give us what we need. That said, you never know if
 or when someone will get a key piece of info that they have been 
lacking to solve such a puzzle - but I do know popping up every so often
 to try and get someone to write something that will attempt to brute 
force the thing for you definitely isn't that key piece of info...
Sorry if it seems like I'm being hard on your brute force enthusiasts, 
but suggesting it without going into trying it yourself is just 
pointless and lan.st these days is a development board not a wishlist or
 request space. Just try doing your own bit table and see how long it 
takes, and then perhaps you'd understand the odds fundamentally. Here, 
I'll start one for you... maybe this will be enough to keep you occupied
 until well after you are dead an buried :(
0
1
10
11
100
101
110
1000
1001
1010
1011
1100
1101
1110
1111
etc., until you get to all combinations for the actual key's bit length.
 That's only 4 bits, or half a byte (nibble), the combinations are 
exponential for each bit you add.
Jachra
03-25-2008, 06:52 AM
Cory1942
I am making such program and I am not requesting it on anyone to make it
 for me or anyone else. I am only stuck in how I can hook a function in 
the firmware.
I am aware that it will take long to brute force it. Could be several 
years or more, but I find it a nice study object to be able to create 
it.
I know Lan.st is a dev board and nothing like maxconsole or even qj.net.
Bubbletune
03-25-2008, 05:15 PM
Cory1942
I am making such program and I am not requesting it on anyone to make it
 for me or anyone else. I am only stuck in how I can hook a function in 
the firmware.
I am aware that it will take long to brute force it. Could be several 
years or more, but I find it a nice study object to be able to create 
it.
I know Lan.st is a dev board and nothing like maxconsole or even qj.net.
... No, just no. Hooking a function in the firmware really isn't going 
to help. You'll need to research the modules that decrypt the UMD, and 
even if you manage to do so, it'll still take millions of years (not a 
couple of years, millions of years).
Seriously, what you're trying is nonsense.
Mathieulh
03-25-2008, 05:17 PM
I
 have to agree with cory1492 bruteforcing the key will likely take 
longer than your own lifetime so I don't really see the point.
Also the umdman (and not the IPL) does not decrypt idstorage keys on its
 own, it just "asks" kirk or spock to do it for him (kirk also checks 
the keys integrity of course) and then kirk (or spock) returns the 
result (likely the key in its decrypted form) of course idstorage keys 
are encrypted using the kirk/spock ID which we cannot dump since it is 
located somewhere within the syscon die. (I highly expect that not even 
sony can retrieve it, at least not using software.)
Jachra
03-25-2008, 07:03 PM
JumpR
I know it will take very, very long, That is why it will never be 
released. For me it is a study object. To see what I can make with the 
PSP. It is for me and me only. Just to see if I am able to do it and 
learn from it. Nothing more, nothing less. I do have to start somewhere,
 so why not this. Many more of some sort of software will be created by 
me, until I can create what I want to make for a very long time. That 
software might be released or not, at this point I really do not know.
I know my C/C++. I can read and change someone else code, but I feel 
that I do not learn much of it. It is nice to see how someone made 
something. In a sense it gives a insight how fellow programmer works and
 how he/she is. How he/she thinks and so on.
Btw, I assume that I have to calculate this much bytes:
2048 bytes to the power of 255 - number of bytes that is the same 
everywhere in the whole part. That will still leave many bytes to do.
MathieulH
For the first part in your answer, see above. For the second part, 
indeed, it could be hard coded in the die. Maybe Sony gets some paper 
that says that Syscon-chip & motherboard with number this has PSP 
Unique ID XXYYZZ. If it really happens that way, then we can assume that
 regeneration with that PSP Unique ID will never happen unless we find 
some leaked company secret documents. Unless we can look inside the 
factory where they build the PSP, we can only speculate on it. Have 
written that, I do agree with you on that point.
I hope that you guys/girls can find a way around it.
SilverSpring
03-26-2008, 01:41 AM
2048 bytes to the power of 255
Huh? How are you getting this calculation? If you think bruteforcing 
2048 bytes is that many combinations you are way way way waaaaaay off. 
2048^255 = 2.4 x 10^844
The real number of combinations is
2^(2048 x 8) = 1.2 x 10^4932
I dont think you realise just how big these numbers really are.
To put things in perspective:
The current generally accepted age of the universe is 13.7 billion 
years. In nanoseconds that is 4.3 x 10^26. Do you see the difference?
Now imagine you could check a combination each nanosecond (which you 
couldnt: assuming it takes one cycle to execute each instruction on the 
psp, it actually takes a few cycles, even running at 333MHz would take 
around 3ns to execute each instruction).
So if you started from the begininning of creation and checked one 
combination each nanosecond until the present day, you would have only 
bruteforced a little over 88 bits, thats 11 bytes !
Now think about bruteforcing 2048 bytes (if the universe is still around when you're finished).
SilverSpring
03-26-2008, 02:31 AM
Ok,
 I hope that'll put an end to this "bruteforcing idstorage" and hope 
people appreciate what it takes to bruteforce anything over a couple of 
bytes (theres a reason why commercial entities still only use 128 bit 
keys and still consider it secure).
Bruteforcing (in this context) just does not make sense. What does make 
sense is looking at the umd controller itself, looking through the 
driver and its interface to gain a better understanding of what its 
doing.
Myself, I have pretty much given up on the umd. But there is a few things people can still try.
So, here is how things should work (emphasize heavily on the word 'should'):
- Two secret keys, a master key and a device key.
- Data is encrypted with the master key and stored onto the umd.
- Master key is encrypted with the device key and then also stored on the umd.
- Device key is encrypted with each psps unique id and then stored in idstorage.
So to decrypt:
- the encrypted master key is read off the umd
- decrypt the idstorage to a decrypted device key
- decrypted device key decrypts the encrypted master key
- decrypted master key decrypts the data on the umd
All of this is done internally where no software can access. There maybe
 also be multiple master keys on the umd (for different sectors of the 
umd?), and hence multiple device keys.
Now for things for people to try, dump the umd controller firmware 
(though I havent been successful in doing so). I did manage to dump 
something that I thought was the firmware, but turned out it was just 
the internal umd read buffer (a 480KB buffer - a pretty standard size in
 DVD readonly drives). So what was dumped was the raw encrypted stream 
directly from the umd disc (all of it was encrypted except a small bit 
of plaintext - a bunch of sony copyright strings in pretty much every 
language as well as the umd game id UCAS-xxxxx or whatever).
To gain access to this part of the controller you need to enter the 
drives debug mode. Fortunately, the updaters do this for you since (for 
reasons unknown) it updates the drives debug code. You'll need the 
testmode.prx from an updater.
In debug mode, only debug commands can be executed, all other atapi 
commands fail. So I am hopeful for a way to dump the umd fw this way and
 gain a little more insight. But for now I have stopped.
Jachra
03-26-2008, 05:29 AM
SilverSpring,
Indeed, maybe my calculation is a bit off. That is okay. Writing the 
code is important for me. The rest is just second. Like I wrote several 
times before. It is a study object for me. I am not going to run this 
code forever.
Btw, good luck in try to dump that firmware. I really hope you succeed.
Mathieulh
03-26-2008, 08:35 AM
may
 I remind everyone that idstorage keys do not only allow the decryption 
of UMD data but also features such as openpsid or magicgate.
SilverSpring
03-26-2008, 11:17 AM
2048 bytes to the power of 255 
Ok, now I see how you were trying to calculate but it is the wrong way.
It's actually 256^2048, though that still equals the same as what I 
wrote earlier, 2^(2048 x 8). They both equal to 1.2 x 10^4932.
Each byte has 256 values, there are 2048 bytes so 256^2048 = 1.2 x 10^4932
OR
Each bit has 2 values, there are 2048 bytes which are 8 bits each so 2^(2048 x 8) = 1.2 x 10^4932
Either way,
maybe my calculation is a bit off
is a huge understatement. A few years to bruteforce? Yes, it'll take a 
few years (+/- a few trillion trillion trillion trillion trillion 
trillion).
Just to appreciate how incredibly ridiculously large this number is here is some more perspective:
The total number of atoms in the universe is generally accepted to be somewhere between 1 x 10^78 to 1 x 10^80.
Saben
03-26-2008, 05:34 PM
I
 think Jachra has conceded the point that he wont be able to brute force
 the master key (if not please delete your account and never come back).
  What he is interested in doing is going through the excercise of 
writing the code (maybe someday he will figure out how to massively 
overclock his PSP and complete the brute force in record time).  Jachra,
 thats great and I hope you have a great time coding, but your posts no 
longer have anything to do with ID-Storage, so please move them 
someplace else as I hate checking the boards and finding drama instead 
of information.
Jachra
03-26-2008, 07:26 PM
Saben, thank you for your kind words.
I know it has little to with the ID Storage Discussion, but the way that
 people commented on me, I had no choice than to explain myself what I 
am trying to do.
Jachra
03-26-2008, 07:36 PM
is
 a huge understatement. A few years to bruteforce? Yes, it'll take a few
 years (+/- a few trillion trillion trillion trillion trillion 
trillion).
Just to appreciate how incredibly ridiculously large this number is here is some more perspective:
The total number of atoms in the universe is generally accepted to be somewhere between 1 x 10^78 to 1 x 10^80.
SilverSpring, my program IS NOT about doing a brute force attack at all.
It can do that, but that is not the main reason I am creating it. Sigh.
I like to create reusable code. I have been doing that for a very long 
time now. This program is teaching me how to hook on to firmware, how to
 create and load  as a prx, learn how I can talk specific hardware in 
the PSP and some graphic stuff. That is all.
You can help me with that if you know if there is something like a programmers command code reference manual for the PSP sdk.
Added:
I will no longer comment on what I am trying to do and explaining it in several post in this thread.
Tsukasa
03-26-2008, 10:54 PM
To
 gain access to this part of the controller you need to enter the drives
 debug mode. Fortunately, the updaters do this for you since (for 
reasons unknown) it updates the drives debug code. You'll need the 
testmode.prx from an updater.
So the sce updaters do update the UMD drive firmware? Is this related to why 1.XX can't read/dump 2.80+ UMD Video/Music discs?
i have read all the threads is it possible to restore your id storage from a flash 0 back up.
i have been without a umd for a few days im only able to play homebrew 
through IR Shell with the autobooting plugin on, yet the adhoc mode dont
 work. (sorry for the noob question)
Jachra
03-27-2008, 06:53 AM
i have read all the threads is it possible to restore your id storage from a flash 0 back up.
i have been without a umd for a few days im only able to play homebrew 
through IR Shell with the autobooting plugin on, yet the adhoc mode dont
 work. (sorry for the noob question)
If you have a backup of your own flash (NAND-chip), then yes, it is possible.
SilverSpring
03-27-2008, 07:16 AM
SilverSpring, my program IS NOT about doing a brute force attack at all.
It can do that, but that is not the main reason I am creating it. Sigh.
You only say this now after you've been told multiple times that 
bruteforcing is not a viable option, but that was not what you've been 
originally stating.
You want to learn how to hook the firmware? How to create a prx? How to create graphics?
None of which has anything to do with bruteforcing let alone idstorage let alone regeneration of idstorage.
If you wanted to learn about certain programming methods, make a new 
thread asking for help, ask how to hook a function, how to create a prx,
 how to create graphics etc.
Instead, you've posted in the idstorage regeneration thread talking 
about bruteforcing. None of the above is needed to bruteforce something.
 So of course people will tell you the reality of what it means to try 
to bruteforce that amount of bytes.
You can help me with that if you know if there is something like a programmers command code reference manual for the PSP sdk.
http://psp.jim.sh/pspsdk-doc/
Documentation of the pspsdk.
So the sce updaters do update the UMD drive firmware? Is this related to why 1.XX can't read/dump 2.80+ UMD Video/Music discs?
I've never heard anything like that before. What do you mean by 2.80+ UMD's? UMD's that have 2.80+ updaters in them?
i have read all the threads is it possible to restore your id storage from a flash 0 back up.
i have been without a umd for a few days im only able to play homebrew 
through IR Shell with the autobooting plugin on, yet the adhoc mode dont
 work. (sorry for the noob question)
No a flash0 backup wont help you at all. You will need a backup of the full nand dump. The idstorage is not stored in flash0.
Tsukasa
03-27-2008, 01:17 PM
[quote=Jachra;10538]
I've never heard anything like that before. What do you mean by 2.80+ UMD's? UMD's that have 2.80+ updaters in them?
I don't know if it was 2.50 or 2.80, but in fact UMD Video/Music discs, 
which require that firmware are unable to fully dump/browse with 1.XX 
firmware. Maybe there are just some prx's which got updated by sce, 
which allow to handle such UMDs.
cory1492
03-27-2008, 11:49 PM
Same
 here, never heard of anything even remotely like that before. What I 
have known all along is that games do require certain kernels to be able
 to run because the crypto for the system modules on the disk is not 
compatible with older keys.
Pirata Nervo
03-28-2008, 12:19 AM
hey
 guys, I don't know if the problem is the IdStorage but I always get the
 "unsupported prx type" when loading UMD's from XMB, however if I run 
UMD's from NervOS, it runs well.
Is it the IdStorage?
cory1492
03-28-2008, 12:27 AM
I'd
 try going to official firmware (downgrade with pandora/des.cem, then 
update with an updater eboot) and see if the problem persists.
Mathieulh
03-28-2008, 04:46 AM
maybe someday he will figure out how to massively overclock his PSP and complete the brute force in record time
Even if you (by some miracle) manage to overclock the Alegrex R4000 cpu 
to 3 Ghz or more (which is very unlikely to be doable) It'd still take a
 few trillion years to brute force.
Jachra
03-28-2008, 06:45 AM
hey
 guys, I don't know if the problem is the IdStorage but I always get the
 "unsupported prx type" when loading UMD's from XMB, however if I run 
UMD's from NervOS, it runs well.
Is it the IdStorage?
Are your settings in the Recovery menu setup properly?
SilverSpring
03-28-2008, 09:44 AM
I
 don't know if it was 2.50 or 2.80, but in fact UMD Video/Music discs, 
which require that firmware are unable to fully dump/browse with 1.XX 
firmware. Maybe there are just some prx's which got updated by sce, 
which allow to handle such UMDs.
Well MUSIC UMD's were only added in (IIRC) 1.52 so maybe any MUSIC UMD 
won't work in 1.50 (or 1.00). VIDEO UMD's have (IIRC) always been 
supported but codecs had been added in later firmware so that might have
 something to do with it. I don't have any MUSIC UMD's to test but I'll 
try a VIDEO UMD on 1.00.
What happens exactly, it gives errors? Sounds very strange though.
brin_vg
03-28-2008, 09:47 AM
maybe someday he will figure out how to massively overclock his PSP and complete the brute force in record time
Even if you (by some miracle) manage to overclock the Alegrex R4000 cpu 
to 3 Ghz or more (which is very unlikely to be doable) It'd still take a
 few trillion years to brute force.
Besides which, if the AC Adapter were to lose power, the battery would last for about 3 seconds :D
Pirata Nervo
03-28-2008, 12:12 PM
Thanks
 coy but this PSP is weird lol, it hasn't been working since the 
beginning of this month, I tried it again today and  it worked, WTF?
Yesterday wasn't.
Saben
03-28-2008, 12:16 PM
maybe someday he will figure out how to massively overclock his PSP and complete the brute force in record time
Even if you (by some miracle) manage to overclock the Alegrex R4000 cpu 
to 3 Ghz or more (which is very unlikely to be doable) It'd still take a
 few trillion years to brute force.
Besides which, if the AC Adapter were to lose power, the battery would last for about 3 seconds :D
1st, I wasnt serious but you can never fully discount hardware advances.
  But I could see someone implementing a flux capacitor along with a  
portable fusion power generator to develop a temporal disturbance that 
would allow the CPU to travel back in time so that it appears to finish 
instantaneously. :D
Tsukasa
03-28-2008, 12:45 PM
Well
 MUSIC UMD's were only added in (IIRC) 1.52 so maybe any MUSIC UMD won't
 work in 1.50 (or 1.00). VIDEO UMD's have (IIRC) always been supported 
but codecs had been added in later firmware so that might have something
 to do with it. I don't have any MUSIC UMD's to test but I'll try a 
VIDEO UMD on 1.00.
What happens exactly, it gives errors? Sounds very strange though.
If you browse the UMD in 1.XX you won't find any CLIPINFs STREAMs or 
RESOURCEs. Just the common UMD_DATA.BIN, updater and icons. In 2.XX 
however you will find them.
EDIT:
I don't think sce is updating the UMD drive, since the 1.50 firmware in 
time machine isn't able to browse the umd either (PSP was updated to 
2.71 [which the UMD Video requires] before).
cory1492
03-28-2008, 04:47 PM
Thanks
 coy but this PSP is weird lol, it hasn't been working since the 
beginning of this month, I tried it again today and  it worked, WTF?
Yesterday wasn't.
Yeah, you might want to consider what was mentioned above, recovery menu
 settings - if I remember right the plain modules and boot.bin settings 
can do some weird things, and using isofs driver on umd may also 
contribute. Either which way I doubt it is idstore that is the issue 
(which brought the suggestion to go to clean offical firmware and see if
 the problem persists, to test whether idstore or something else is 
causing the problem.)
Pirata Nervo
03-28-2008, 06:33 PM
The Isofs was not the problem, I tried Normal, Isofs, Sony NP9660 and M33 Driver, always the same error.
Mathieulh
03-31-2008, 06:38 PM
maybe someday he will figure out how to massively overclock his PSP and complete the brute force in record time
Even if you (by some miracle) manage to overclock the Alegrex R4000 cpu 
to 3 Ghz or more (which is very unlikely to be doable) It'd still take a
 few trillion years to brute force.
Besides which, if the AC Adapter were to lose power, the battery would last for about 3 seconds :D
3 ? xD You are pretty generous :P I'd say less than one xD
brin_vg
03-31-2008, 08:20 PM
3 ? xD You are pretty generous :P I'd say less than one xD
I would pay to see an Allegrex overclocked to 3ghz... Rather, the smouldering remains, of an Allegrex overclocked to 3ghz. :D
Jachra
03-31-2008, 09:57 PM
Well, the proper way is to do it with extreme cooling. I bet we could gather around it and sing: "Ice, Ice, Baby". ;)
Squirrel61
04-01-2008, 04:43 AM
Yesterday,
 I had some strange experience. I had to install CF on a brand new Slim.
 I took it out of the box, inserted the Magic Memorystick (which 
contained Jas0nuk's menu and DC4, amongst some other tools) and popped 
in the battery.
The lights turned on, the PSP booted the menu and then I wasn't able to 
do anything because all keys where dead. Tried some more things, some 
other memorysticks but still the keys where dead.
Then I popped in a TM stick and tried to boot it. It didn't boot to 
internal fw but instead locked up. After rebooting to 1.50+3.40HW, the 
PSP did boot to the time/date entry part, but then again refused to do 
anything becaue the keys where still dead.
I decided to insert an unmodded battery. The PSP booted fine, although 
it took pretty long before anything showed up on the screen. Noticeably 
longer than after a "restore default". Entered time/date/timezone and so
 (the keys where working this time) and the XMB showed up.
After that, I was perfectly able to use the Magic Memorystick with the Pandora battery to install CF on the PSP.
All this makes me think that indeed the final initialization of the PSP 
is done at the first boot (as discussed before) and not in the factory!
It would be interesting to have a dump of the full memory of a PSP that 
has never been powered on. But to do so, we need a special dump tool 
which doesn't wait for any key to be pressed (since the keys aren't 
working at that time). And probably doesn't rely too much on information
 present in the PSP because that could still be uninitialized.
BTW. the PSP was a brand new Dutch piano black model and after booting 
with the unmodded battery, showed firmware version 3.80. So probably it 
is one of the latest series, although I didn't test battery creation on 
it.
SilverSpring
04-01-2008, 09:09 AM
All
 this makes me think that indeed the final initialization of the PSP is 
done at the first boot (as discussed before) and not in the factory!
It would be interesting to have a dump of the full memory of a PSP that has never been powered on.
Ah! I said the same exact thing a few weeks back when I got a new slim. 
Was annoyed I didnt do a nand dump before first turning it on (I did one
 straight after though).
Yea I noticed too that on first power on things took a lot longer to 
boot, thought it was bricked at first because it was just a blank screen
 (yes longer than the time it takes on restoring default settings). But 
all subsequent boots were at normal speed again.
So something's definitely happening on first boot. But I do think it's 
only on newer psp's (or newer fw rather), I dont remember this happening
 on any of the older psp's I had.
Mine was a 3.72 Felicia Blue JP model.
EDIT:
Yea a nand dump before any code on the nand gets run would be good. 
Lately, they have liked doing things like self-deleting code and stuff 
like that.
Ghostman
04-01-2008, 02:04 PM
Could it be that Nand comes empty from factory and first run writes all the values that it needs to work properly?
If so maybe adding a function to nandtool to fully erase nand and 
installing OFW afterwords would maybe do the same as first run?
Just a thought.
cory1492
04-01-2008, 04:39 PM
It would be interesting to have a dump of the full memory of a PSP that has never been powered on.
You know, someone contacted me with this very problem last week or so 
(regarding a fat PSP IIRC), so I whipped up a program that does no 
prompt dumping - in that PSP's case though it had been working fine 
before, but apparently messing around with keycleaner or flash1 cleaner 
or some such thing caused the buttons to stop working. May suggest 
syscon is open to writes long after manufacture, or that one of the 
idstore keys is boot-time critical to digital keys working (the guy 
hasn't gotten back to me since I forwarded the app, go figure.)
Nevertheless, the elf is attached, it is open nanddumper sans 
keypressing. All it uses are NAND functions which shouldn't rely too 
heavily on any per PSP info.
edit:/ going back to what was said about a strange ipl fragment, is it 
possible an initial IPL does all this type of work to write keys that 
would make syscon function to provide key input, which then overwrites 
itself with the true IPL? If not I'd gladly flash back my original NAND 
dumps and start digging for file fragments. Then again, maybe I'm just 
being gullible on that one day of the year I shouldn't be xD
edit2:/ added source code to the app zip
Jachra
04-01-2008, 07:10 PM
If needed I can buy a brand new psp in the Netherlands and try to get such dump.
Mathieulh
04-01-2008, 08:50 PM
If needed I can buy a brand new psp in the Netherlands and try to get such dump.
That would be very helpful :)
Jachra
04-01-2008, 11:31 PM
Thank you, Mathieulh, consider it done.
All I need is Dark_AleX's Despertar del Cementerio, Jasonuk's Elfmenu 
and Cory1942's dumper, memstick and a Pandora battery, right?
/edit
Cory1942,
I will change your source so that it makes a logfile of anything that is
 written to the screen also. The changed code will be posted here.
Mathieulh
04-01-2008, 11:44 PM
Hum...
 as far as I know of, the DCv5 (and DCv4) does not need any idstorage 
keys to run but I may be wrong, and it does feature a nand dumper 
function.
SilverSpring
04-02-2008, 01:39 AM
Well
 MUSIC UMD's were only added in (IIRC) 1.52 so maybe any MUSIC UMD won't
 work in 1.50 (or 1.00). VIDEO UMD's have (IIRC) always been supported 
but codecs had been added in later firmware so that might have something
 to do with it. I don't have any MUSIC UMD's to test but I'll try a 
VIDEO UMD on 1.00.
What happens exactly, it gives errors? Sounds very strange though.
If you browse the UMD in 1.XX you won't find any CLIPINFs STREAMs or 
RESOURCEs. Just the common UMD_DATA.BIN, updater and icons. In 2.XX 
however you will find them.
EDIT:
I don't think sce is updating the UMD drive, since the 1.50 firmware in 
time machine isn't able to browse the umd either (PSP was updated to 
2.71 [which the UMD Video requires] before).
Ok in that case it's definitely an issue with the psp fw and nothing to 
do with the umd drive. The updaters definitely update the umd drive but 
(it seems) only for those very early 1.00 JP models. But since all 
updaters need to work on even 1.00, it's been included with every 
updater since. Also downgrading your psp fw doesnt do anything to the 
umd drive.
Anyway, if anyone's interested here's an app to check your UMD FW version (3.xx app + source):
http://silverspring.lan.st/umd_ver_check.rar
and link to blog entry http://my.malloc.us/silverspring/2008/04/02/umd-firmware-version-checker/
Mathieulh
04-02-2008, 02:22 AM
Well
 MUSIC UMD's were only added in (IIRC) 1.52 so maybe any MUSIC UMD won't
 work in 1.50 (or 1.00). VIDEO UMD's have (IIRC) always been supported 
but codecs had been added in later firmware so that might have something
 to do with it. I don't have any MUSIC UMD's to test but I'll try a 
VIDEO UMD on 1.00.
What happens exactly, it gives errors? Sounds very strange though.
If you browse the UMD in 1.XX you won't find any CLIPINFs STREAMs or 
RESOURCEs. Just the common UMD_DATA.BIN, updater and icons. In 2.XX 
however you will find them.
EDIT:
I don't think sce is updating the UMD drive, since the 1.50 firmware in 
time machine isn't able to browse the umd either (PSP was updated to 
2.71 [which the UMD Video requires] before).
Ok in that case it's definitely an issue with the psp fw and nothing to 
do with the umd drive. The updaters definitely update the umd drive but 
(it seems) only for those very early 1.00 JP models. But since all 
updaters need to work on even 1.00, it's been included with every 
updater since. Also downgrading your psp fw doesnt do anything to the 
umd drive.
Anyway, if anyone's interested here's an app to check your UMD FW version (3.xx app + source):
http://silverspring.lan.st/umd_ver_check.rar
and link to blog entry http://my.malloc.us/silverspring/2008/04/02/umd-firmware-version-checker/
Is it done by leptonupdater103 ? Does it update the whole firmware or only the debug codes ?
cory1492
04-02-2008, 02:57 AM
Thank you, Mathieulh, consider it done.
All I need is Dark_AleX's Despertar del Cementerio, Jasonuk's Elfmenu 
and Cory1942's dumper, memstick and a Pandora battery, right?
/edit
Cory1942,
I will change your source so that it makes a logfile of anything that is
 written to the screen also. The changed code will be posted here.
Apparently the keys (you know, the buttons you would press to make 
things happen in programs like elf menu or des.cem) don't work until you
 boot official firmware once - so what you'll have to do is with 
des.cem, replace resurrection.elf with the dumper so it runs and dumps 
right off the get-go without pressing any keys at all. If you boot it 
even only once before dumping to get keys working, the experiment would 
have useless results.
Feel free to change the source however you like, the only thing put to 
the screen is status messages and info like "bad block @", so I don't 
see how a log of that would even be useful. Then again, maybe to be 
thorough also change the source to dump the contents of bad blocks as 
well, instead of skipping them (and just writing 0xFF filled buffer to 
disk) like it currently does.
SilverSpring
04-02-2008, 04:52 AM
Is it done by leptonupdater103 ? Does it update the whole firmware or only the debug codes ?
Yea the leptonupdater.
Yes it doesnt update the whole firmware only the debug codes, but it uses the firmware version to determine what to update.
It will only update if fw version is 1.020 or 1.090 (with different 
debug codes depending if you have 1.020 or 1.090). So only the very 
early model umd drives get updated.
I have a 1.00 JP model which was v1.090, a ceramic white TA-082 which 
was v1.150, and a new slim bought a few weeks back which was v1.240.
Havent figured out much about the debug codes mainly because the format 
looks encrypted and is only 640 Bytes in total. But it seems to control 
what debug commands are available to use when in debug mode.
EDIT:
Apparently the keys (you know, the buttons you would press to make things happen in programs like elf menu or des.cem)
LOL, yea you have to be careful by what you mean by "keys" especially in this thread :p.
Tsukasa
04-02-2008, 05:00 PM
It
 will only update if fw version is 1.020 or 1.090 (with different debug 
codes depending if you have 1.020 or 1.090). So only the very early 
model umd drives get updated.
Will the leptonupdater increase the version number?
My early JP PSP unit (first batch of 1.50 units) comes with 1.090 and 
still appears to have version 1.090 after updating to 3.93.
EDIT: EU Ceramic White PSP which came with 2.60_2 shows the same phenomenon (1.090).
EDIT2: Well... seems like I just have 1.090 UMD drives.. (CW JP 2.00 release PSP has got it too)
gusto5
04-02-2008, 08:13 PM
Yesterday,
 I had some strange experience. I had to install CF on a brand new Slim.
 I took it out of the box, inserted the Magic Memorystick (which 
contained Jas0nuk's menu and DC4, amongst some other tools) and popped 
in the battery.
The lights turned on, the PSP booted the menu and then I wasn't able to 
do anything because all keys where dead. Tried some more things, some 
other memorysticks but still the keys where dead.
Then I popped in a TM stick and tried to boot it. It didn't boot to 
internal fw but instead locked up. After rebooting to 1.50+3.40HW, the 
PSP did boot to the time/date entry part, but then again refused to do 
anything becaue the keys where still dead.
I decided to insert an unmodded battery. The PSP booted fine, although 
it took pretty long before anything showed up on the screen. Noticeably 
longer than after a "restore default". Entered time/date/timezone and so
 (the keys where working this time) and the XMB showed up.
After that, I was perfectly able to use the Magic Memorystick with the Pandora battery to install CF on the PSP.
All this makes me think that indeed the final initialization of the PSP 
is done at the first boot (as discussed before) and not in the factory!
It would be interesting to have a dump of the full memory of a PSP that 
has never been powered on. But to do so, we need a special dump tool 
which doesn't wait for any key to be pressed (since the keys aren't 
working at that time). And probably doesn't rely too much on information
 present in the PSP because that could still be uninitialized.
BTW. the PSP was a brand new Dutch piano black model and after booting 
with the unmodded battery, showed firmware version 3.80. So probably it 
is one of the latest series, although I didn't test battery creation on 
it.
That is unusual.
A week or two ago, I downgraded a Piano black PSP-2000 in North America 
right out of the box, and I remember being able to dump the psp with 
DCv4 without having booted the psp prior to taking it out of the box (I 
remember this cause we had to use a swiss army knife to get it out, 
stupid guy forgot to bring exacto knife)
Is that the sort of dump we're discussing? PSP before a first boot into the XMB?
Jachra
04-02-2008, 08:24 PM
gusto05, the answer is yes.
jas0nuk
04-03-2008, 05:39 PM
SilverSpring,
 nice to see you still involved with the PSP, we've been noticing your 
absence on IRC lately, I assume you've had a lot of work on :)
This is starting to get interesting. I wonder why the keys don't work 
until the first time official firmware is run... doesn't syscon manage 
those? To me, that suggests that syscon isn't fully activated until the 
IPL runs for the first time, so the factory IPL is a special one, which 
does whatever it does, then overwrites itself with the official firmware
 IPL. Hopefully when we get a NAND dump of a brand new PSP, we'll know 
for sure. :p
Ghostman
04-03-2008, 06:42 PM
If I get a nand dump from a never bootup psp can i post it here or is it illegal?
Mathieulh
04-03-2008, 06:53 PM
It's Illegal you can always send me a PM though :P
Jachra
04-03-2008, 11:59 PM
It will be yours tomorrow through a pm to me.
/edit
added the changed source from cory1942
/re-edit
For the source, see page 42 (http://lan.st/showpost.php?p=10672&postcount=412)
Ghostman
04-04-2008, 12:04 PM
It will be yours tomorrow through a pm to me.
/edit
added the changed source from cory1942
I won't be able to get until next week so if you could send me a pm with your, much apreciated :P
l_oliveira
04-04-2008, 09:10 PM
Ran Silverspring's UMD version checker on my pair of PSP-100x units
US one (TA-081) got:
00000000   05 80 00 32 5C 00 00 00  53 43 45 49 20 20 20 20   .€.2...SCEI    
00000010   55 4D 44 20 52 4F 4D 20  44 52 49 56 45 20 20 20   UMD ROM DRIVE   
00000020   20 20 20 20 31 2E 30 39  30 20 4F 63 74 31 38 20       1.090 Oct18 
00000030   2C 32 30 30 34 20 20 20  00 00 00 00 00 00 00 00   ,2004   ........
00000040   00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00   ................
00000050   00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00   ................
JP one (TA-086) got :
Offset      0  1  2  3  4  5  6  7   8  9  A  B  C  D  E  F
00000000   47 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00   G...............
(all zeroes to the end)
Am I doing anything wrong ? (lol) 
I was expecting the TA-086 to have the same firmware as TA-082 since 
TA-086 uses the same media engine/alegrex chip pair.  But I got an empty
 file... Anything new here ?
Jachra
04-04-2008, 09:36 PM
Dump is done.
Jachra
04-04-2008, 11:12 PM
From where to where is the ipl located in the dump?
Jachra
04-04-2008, 11:34 PM
I have spoken with Mathieulh on irc and he told me that it contains a 3.80 IPL.
Mathieulh
04-04-2008, 11:36 PM
The IPL is located at 0x40000.
By the way I just inspected a nand dump from a psp that has never been 
turned on and the IPL is just the retail 3.80 IPL, so unless the 
initialisation is done from some place else than the nand (perhaps code 
running inside syscon) I don't believe there can be anything done on the
 psp outside factory at first boot.
jas0nuk
04-04-2008, 11:43 PM
As
 I said to Math before, this still doesn't explain why buttons dont work
 until the first official firmware boot. Something in Syscon needs to be
 activated outside the factory, methinks. :/
Jachra
04-04-2008, 11:49 PM
Maybe it is the power up that is enough or a special prx.
Mathieulh
04-04-2008, 11:53 PM
Maybe it is the power up that is enough or a special prx.
 
A prx needs to be loaded by a kernel, considering the 3.80IPL is in 
there I don't see how any special kernel could start to perform any 
initialisations.
Jachra
04-04-2008, 11:55 PM
Well, I was thinking of a prx that just gives the syscon a wake up call and then is removed.
Mathieulh
04-04-2008, 11:56 PM
I
 don't recall any unknown prx being in the 3.80's pspbtcnf.bin although 
who knows it could be overwritten although I highly doubt it
Jachra
04-05-2008, 12:03 AM
Well, maybe I am going to look if something is left in the empty spaces in that dump.
Maybe they first flash a special firmware to do something, wipe it and then install this firmware.
I remember reading a post that some found something in a NAND. Some trace of a file. But I am not sure where or who it was.
Mathieulh
04-05-2008, 12:16 AM
lflash is encrypted, beside I expect them to format it once it's done, so I doubt you will find anything.
Saben
04-05-2008, 01:13 AM
Jachra,
It might be illuminating to have the unit do its first boot and then we 
could delta the two dumps.  I would be interested in the state of the 
keys pre-1st boot and then post 1st boot.  If we think we captured a 
dump prior to the keys being created then this would be real obvious in 
the delta between the pre/post 1st boot.
dim33
04-05-2008, 08:15 AM
Jachra,
It might be illuminating to have the unit do its first boot and then we 
could delta the two dumps.  I would be interested in the state of the 
keys pre-1st boot and then post 1st boot.  If we think we captured a 
dump prior to the keys being created then this would be real obvious in 
the delta between the pre/post 1st boot.
Perhaps a no button press version (as with the no button press nand dump
 tool used here) of Nandtool's 0.3b dump idStorage keys could retrieve 
the keys from the unbooted unit. This way an unencrypted view of the 
keys could be more easily compared with the subsequent post bootup key 
dump?
Jachra
04-05-2008, 09:59 AM
That PSP is now running 3.80 M33 firmware. I could ask if to my friend, who owns it now, to make a new dump.
I can flash this dump in my PSP Slim and extract the keys unencrypted.
brin_vg
04-05-2008, 10:27 AM
My
 first observation: Flashed all but IDStorage, then tried to boot - 
Screen doesn't turn on, power light comes on for a little less than a 
second, then shuts down.
Tsukasa
04-05-2008, 11:18 AM
My
 first observation: Flashed all but IDStorage, then tried to boot - 
Screen doesn't turn on, power light comes on for a little less than a 
second, then shuts down.
PRX files are signchecked. Since lflash is encrypted, you won't have any luck to run that dump on your PSP.
EDIT: Well.. since your power light doesn't last more than a second, could be something with IPL.. dunno.
brin_vg
04-05-2008, 11:20 AM
My
 first observation: Flashed all but IDStorage, then tried to boot - 
Screen doesn't turn on, power light comes on for a little less than a 
second, then shuts down.
PRX files are signchecked. Since lflash is decrypted, you won't have any luck to run that dump on your PSP.
Signchecking cannot stop me!!
*looks at black screen*
...
*shuffles uncomfortably*
Jachra
04-05-2008, 11:42 AM
My
 first observation: Flashed all but IDStorage, then tried to boot - 
Screen doesn't turn on, power light comes on for a little less than a 
second, then shuts down.
Did you have your ID Storage in that flash?
brin_vg
04-05-2008, 12:43 PM
Yeah, I was buzzed on caffeine. Anyway...
I dumped the keys - they're all full of crap, but are logical numbers, 
not like when you dump them when they're behind NAND encryption (0xEBC8 
wut).
A whole bunch are missing - 5,6,10,100,101 at a glance.
Mathieulh
04-05-2008, 01:03 PM
Yeah, I was buzzed on caffeine. Anyway...
I dumped the keys - they're all full of crap, but are logical numbers, 
not like when you dump them when they're behind NAND encryption (0xEBC8 
wut).
A whole bunch are missing - 5,6,10,100,101 at a glance.
Did you dump them in their decrypted form ?
jas0nuk
04-05-2008, 01:06 PM
Looks
 to me like they haven't decrypted properly, the magic number for your 
PSP returned by the function cory uses will not decrypt that NAND dump, 
as its from another PSP.
dim33
04-05-2008, 01:18 PM
Looks
 to me like they haven't decrypted properly, the magic number for your 
PSP returned by the function cory uses will not decrypt that NAND dump, 
as its from another PSP.Could this dump not be flashed  to the PSP in 
question and then the keys extracted using Nandtool 0.3b via key dump? 
(or is it too late for that).
Jachra
04-05-2008, 02:55 PM
It could be done tonight. Anyone how to setup it up?
jas0nuk
04-05-2008, 03:12 PM
OK...
 the only way I can think of doing this, is asking cory1492 to do a 
special version of nandTool which automatically dumps the keys on boot, 
so you flash the NAND dump to that PSP, then replace DC5's 
resurrection.elf with that new nandTool and let it dump the keys.
SilverSpring
04-05-2008, 03:40 PM
Well
 I could write a PC app that will decrypt the slim idstorage area from a
 nand dump, might be easier to do rather than doing flashing & 
reflashing etc on that specific PSP. This way also everyone can decrypt 
it too. The only thing that's needed is a specific id from the psp, so 
you'll need to run an app and dump the seed first.
dim33
04-05-2008, 03:43 PM
OK...
 the only way I can think of doing this, is asking cory1492 to do a 
special version of nandTool which automatically dumps the keys on boot, 
so you flash the NAND dump to that PSP, then replace DC5's 
resurrection.elf with that new nandTool and let it dump the keys.That is
 what had crossed my mind, if Cory1492 is up for it naturally. This way 
the original keys could be decrypted. It would also be worth dumping the
 keys now that cfw has been applied using nandtool 0.3b before flashing 
back the original nand dump (for the sake of comparisson).
Could it be that the buttons will now work even if the original dump is 
flashed back? Perhaps whatever happens on first bootup that activates 
the buttons is permanent? It would be worth a try before Cory1492 goes 
to the trouble of producing a special version of nandtool.
edit: my post is superceeded by Silverspring's post above
SilverSpring
04-05-2008, 04:20 PM
Ok
 here's the app (it's 3.xx) you'll need to run on the psp that the dump 
came from. It'll print 2 numbers, this is the seed used to decrypt the 
nand. That is all that is needed, the actual encryption algorithm is 
pretty simple and can be done trivially on a PC.
Tsukasa
04-05-2008, 05:29 PM
Ok
 here's the app (it's 3.xx) you'll need to run on the psp that the dump 
came from. It'll print 2 numbers, this is the seed used to decrypt the 
nand. That is all that is needed, the actual encryption algorithm is 
pretty simple and can be done trivially on a PC.
Awesome! Thanks. This will save me a lot of time in future :)
SilverSpring
04-05-2008, 05:42 PM
Will the leptonupdater increase the version number?
My early JP PSP unit (first batch of 1.50 units) comes with 1.090 and 
still appears to have version 1.090 after updating to 3.93.
No, only updates debug code not the whole firmware, so version numbers stay the same (until you update whole umd firmware).
SilverSpring, nice to see you still involved with the PSP, we've been 
noticing your absence on IRC lately, I assume you've had a lot of work 
on :)
Indeed, to quote from blog comments:
Mr305: "No more tech stuff since past few weeks... :("
Me: "full-time study + part-time work + social life + family commitments
 + other hobbies + few other (non-psp) projects + illness these past few
 weeks = very little time indeed for pspdev"
Unfortunately, projects that matter in the real world take precedence 
over anything done for fun (ie. stuff that will get marked and go 
towards credits). But atm I have a bit of spare time so...here I am :).
Ran Silverspring's UMD version checker on my pair of PSP-100x units
US one (TA-081) got:
00000000   05 80 00 32 5C 00 00 00  53 43 45 49 20 20 20 20   .€.2...SCEI    
00000010   55 4D 44 20 52 4F 4D 20  44 52 49 56 45 20 20 20   UMD ROM DRIVE   
00000020   20 20 20 20 31 2E 30 39  30 20 4F 63 74 31 38 20       1.090 Oct18 
00000030   2C 32 30 30 34 20 20 20  00 00 00 00 00 00 00 00   ,2004   ........
00000040   00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00   ................
00000050   00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00   ................
JP one (TA-086) got :
Offset      0  1  2  3  4  5  6  7   8  9  A  B  C  D  E  F
00000000   47 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00   G...............
(all zeroes to the end)
Am I doing anything wrong ? (lol) 
I was expecting the TA-086 to have the same firmware as TA-082 since 
TA-086 uses the same media engine/alegrex chip pair.  But I got an empty
 file... Anything new here ?
OoOo that is strange. Dont think Ive seen that happen before. Have you 
done anything unusual with that psp (like reflowed it or something like 
that lol)? That's quite interesting, it always dumps like that even 
running multiple times?
Well, maybe I am going to look if something is left in the empty spaces in that dump.
Maybe they first flash a special firmware to do something, wipe it and then install this firmware.
I remember reading a post that some found something in a NAND. Some trace of a file. But I am not sure where or who it was.
Yes it was actually in this very thread a few pages back :p: http://lan.st/showthread.php?p=9899
brin_vg
04-05-2008, 10:10 PM
SilverSpring/Jachra: NandTool 03 Beta1 tells you the seed (under PSP Info) also.
Another thing for Cory to consider would be letting you enter your own seed for decrypting/dumping.
Jachra
04-06-2008, 01:22 AM
Cory1942 gave me a program to extract the decrypted keys from the PSP under Cem.
I am going to do that in the morning.
Jachra
04-06-2008, 03:12 PM
The ID of that PSP is:
0x14AD1488
0x00007930
The keys have been dumped with cory1942 key extractor tool. Also the keys of that PSP with CFW 3.90M33-3 have been dumped.
brin_vg
04-06-2008, 08:38 PM
The ID of that PSP is:
0x14AD1488
0x00007930
The keys have been dumped with cory1942 key extractor tool. Also the keys of that PSP with CFW 3.90M33-3 have been dumped.
Okay... care to share anything about them? Some of us are very curious :D
Jachra
04-06-2008, 08:46 PM
I know brin_vg. I will package them and those who wants them, well, pm me.
brin_vg
04-06-2008, 08:47 PM
I know brin_vg. I will package them and those who wants them, well, pm me.
Awesome :D
Jachra
04-06-2008, 11:39 PM
One
 thing makes me curious. The keys dumped from the virgin nand-dump 
contains a 1024 bytes index.bin-file. I have never seen that one before.
Mathieulh
04-07-2008, 01:00 AM
I
 just analysed the keys from the psp before and after it was turned on. 
They are all identical, we can conclude that whatever generates the 
idstorage keys has been run before first boot (probably at factory)
brin_vg
04-07-2008, 05:05 AM
I
 just analysed the keys from the psp before and after it was turned on. 
They are all identical, we can conclude that whatever generates the 
idstorage keys has been run before first boot (probably at factory)
Dang about that thing I was thinking about :D
At least we know, now. Cheers Jachra :)
Jachra
04-07-2008, 05:24 AM
You are welcome, brin_vg.
dim33
04-07-2008, 07:07 AM
I
 just analysed the keys from the psp before and after it was turned on. 
They are all identical, we can conclude that whatever generates the 
idstorage keys has been run before first boot (probably at factory)In 
that case it seems that we can exclude idStorage as having anything to 
do with why a new/unbooted unit takes longer to boot when first turned 
on (plus the fact that the buttons do not work initially). 
Could the virgin ipl/flash0 throw any light on this issue?
brin_vg
04-07-2008, 07:18 AM
I
 just analysed the keys from the psp before and after it was turned on. 
They are all identical, we can conclude that whatever generates the 
idstorage keys has been run before first boot (probably at factory)In 
that case it seems that we can exclude idStorage as having anything to 
do with why a new/unbooted unit takes longer to boot when first turned 
on (plus the fact that the buttons do not work initially). 
Could the virgin ipl/flash0 throw any light on this issue?
The IPL and firmware are stock 3.80.
Saben
04-07-2008, 03:55 PM
Darn,  I had hopes that this could be something big.  Let me see if I've got the facts correct.  The problem was reported on:
Stock Slim, Dutch, 3.8, Piano Black by squirrel61
Stock Slim, JP, 3.72, Felicia Blue by Silverspring
Symptoms were that prior to factory 1st boot, button presses didn't 
register on pandora booted FWs.  1st boot took longer than usuall and 
then buttons worked.
Jachra bought a Stock Slim, Netherlands?, 3.8, ?color?
Dumped nand and examined keys and keys were identical between pre-first boot and post-first boot.  
---
Jachra, do you remember if your unit exhibited the same button issue as the originally reported problem?
l_oliveira
04-07-2008, 05:49 PM
JP one (TA-086) got :
00000000   47 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00   G...............
(all zeroes to the end)
Am I doing anything wrong ? (lol)
OoOo that is strange. Dont think Ive seen that happen before. Have you 
done anything unusual with that psp (like reflowed it or something like 
that lol)? That's quite interesting, it always dumps like that even 
running multiple times?
Actually no. It's a late 2006/early 2007 japanese CW TA-086. Hardware wise it's virgin. 
Ok ... 
But, then earlier today  I tried the software on an customer's PSP (TA-079) and got this:
00000000   48 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00   H...............
Pretty suspicious. Took the Ceramic White PSP, fired up my DC stick, 
dumped my FW (for restoring later as I have a ton of customizations) and
 reinstalled 3.71M33.
Result:
00000000 05 80 00 32 5C 00 00 00 53 43 45 49 20 20 20 20 ...2...SCEI    
00000010 55 4D 44 20 52 4F 4D 20 44 52 49 56 45 20 20 20 UMD ROM DRIVE   
00000020 20 20 20 20 31 2E 31 35 30 41 41 75 67 33 30 20     1.150AAug30 
00000030 2C 32 30 30 35 20 20 20 00 00 00 00 00 00 00 00 ,2005   ........
00000040 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00000050 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................   As expected.
Now, I believe it's the PSP firmware (3.90) what caused the weird 
results. Might it be that the firmware is stored in one of the PRXs, 
just like the wireless lan hardware ?
Jachra
04-07-2008, 07:17 PM
Jachra bought a Stock Slim, Netherlands?, 3.8, ?color?
Jachra, do you remember if your unit exhibited the same button issue as the originally reported problem?
A1. Silver version
A2. No, it did not.
/edit
The dumping was done with a DCEM4 memstick. I only modified to enable the tools supplied by cory1942.
Ghostman
04-07-2008, 08:45 PM
One
 thing makes me curious. The keys dumped from the virgin nand-dump 
contains a 1024 bytes index.bin-file. I have never seen that one before.
Did you compare the bigger index.bin with the smaller index.bin to see 
what is diferent and what was added? There could be some thing that 
could make the diference. :eek:
Jachra
04-07-2008, 09:19 PM
One
 thing makes me curious. The keys dumped from the virgin nand-dump 
contains a 1024 bytes index.bin-file. I have never seen that one before.
Did you compare the bigger index.bin with the smaller index.bin to see 
what is diferent and what was added? There could be some thing that 
could make the diference. :eek:
Erm, I am lost. I wrote that I haven't seen it before. This is the first time I ever saw it.
/re-edit
Added the update source from cory1942.
Still one bug to fix. scePowerRequestStandby doesn't seem to shutdown 
the PSP  in Pandora. If you have a solution, please let me know.
cory1492
04-08-2008, 07:43 AM
index.bin
 is the same dumped by nandTool or Dark_Alex's nandflasher, it is just 
the 2 pages of index data which is basically like LBA data, maps where 
keys are physically in the NAND.
Use sceSysconPowerStandby() instead, demanding power off instead of 
asking nicely for it seems to work fine for me (scePowerRequestStandby 
sounds like it may rely on a callback or something.)
Jachra
04-08-2008, 07:30 PM
cory1942, thank you for that information.
SilverSpring
04-21-2008, 12:03 PM
SilverSpring/Jachra: NandTool 03 Beta1 tells you the seed (under PSP Info) also.
Oh ok, guess I should've known since that part would be my code :p. Nvm that app I posted then ;).
Ok ... 
But, then earlier today  I tried the software on an customer's PSP (TA-079) and got this:
00000000   48 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00   H...............
Pretty suspicious. Took the Ceramic White PSP, fired up my DC stick, 
dumped my FW (for restoring later as I have a ton of customizations) and
 reinstalled 3.71M33.
Result:
00000000 05 80 00 32 5C 00 00 00 53 43 45 49 20 20 20 20 ...2...SCEI    
00000010 55 4D 44 20 52 4F 4D 20 44 52 49 56 45 20 20 20 UMD ROM DRIVE   
00000020 20 20 20 20 31 2E 31 35 30 41 41 75 67 33 30 20     1.150AAug30 
00000030 2C 32 30 30 35 20 20 20 00 00 00 00 00 00 00 00 ,2005   ........
00000040 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00000050 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................   As expected.
Now, I believe it's the PSP firmware (3.90) what caused the weird 
results. Might it be that the firmware is stored in one of the PRXs, 
just like the wireless lan hardware ?
Ah well I only tested that app on 3.52M33 & 3.71M33 so I guess maybe
 not compatible with 3.90M33. Yea its probably not a PSP problem but 
problem with the app.
Well, maybe I am going to look if something is left in the empty spaces in that dump.
Maybe they first flash a special firmware to do something, wipe it and then install this firmware.
I remember reading a post that some found something in a NAND. Some trace of a file. But I am not sure where or who it was.
Well actually turned out to be the same as on the original 3.60 dumps 
but this time many more blocks got leftover, though still not enough to 
have a fully decrypted payload. On the 3.60 dump only 6 blocks of the 
factory IPL were leftover, in the 3.80 dump there are 22 blocks 
altogether leftover:
Last 22 blocks of Factory IPL
loadaddr	blocksize	entry		checksum
0x04116480	0xF50		0		0xDF6CEDF5
0x041173D0	0xF50		0		0x4457DE64
0x04118320	0xF50		0		0xE4D5F74C
0x04119270	0xF50		0		0xCF0D84BE
0x0411A1C0	0xF50		0		0xF77FD68B
0x0411B110	0xF50		0		0xE33931E5
0x0411C060	0xF50		0		0xD9183486
0x0411CFB0	0xF50		0		0x66094E77
0x0411DF00	0xF50		0		0xEE3C931B
0x0411EE50	0xF50		0		0xBF0DA9E8
0x0411FDA0	0xF50		0		0x63F76F01
0x04120CF0	0xF50		0		0x64251D97
0x04121C40	0xF50		0		0x1D64B821
0x04122B90	0xF50		0		0x50BBBE38
0x04123AE0	0xF50		0		0x2C4C33A3
0x04124A30	0xF50		0		0x51FAF2BE
0x04125980	0xF50		0		0x729D1DC0
0x041268D0	0xF50		0		0x39C3A1D7
0x04127820	0xF50		0		0x572B030C
0x04128770	0xF50		0		0x7B8E52F8
0x041296C0	0xF50		0		0x0462AFB0
0x0412A610	0x210		0x040F0000	0x331B9575
All 22 blocks decrypted ok but that still wasnt enough to get the 
complete encrypted payload. Judging from the massive size of the factory
 IPL we would need at least double that to get the full payload. Also 
this factory IPL hasnt changed either since the last 6 blocks here 
matches the 6 of the 3.60 Factory IPL blocks. So it's probably a 
standard factory firmware that flashes the actual retail firmware over 
it and probably similar to the service center jigkick firmware.
But even if we got the full factory IPL I doubt it has the code to 
regenerate the idstorage, if you look at the leaked jigkick firmware, 
there is an "id" folder which has individual idstorage keys in there. So
 the jigkick would probably just flash the individual keys it finds in 
that folder rather than generating the keys itself. But that must also 
mean that the individual keys are being generated somewhere and then 
copied to the "id" folder for the jigkick to flash. So the jigkick just 
looks like a generic flasher and nothing else, flashing whatever psar 
& idstorage keys it finds on the memstick. I guess there could be 
another app that will generate the keys seperately for jigkick flasher 
usage.
brin_vg
04-21-2008, 12:10 PM
But
 that must also mean that the individual keys are being generated 
somewhere and then copied to the "id" folder for the jigkick to flash. 
So the jigkick just looks like a generic flasher and nothing else, 
flashing whatever psar & idstorage keys it finds on the memstick. I 
guess there could be another app that will generate the keys seperately 
for jigkick flasher usage.
Sounds like an awfully unautomated/unproductive way of doing it. Doing 
that for every single PSP made... just doesn't sound very efficient.
SilverSpring
04-21-2008, 12:25 PM
But
 that must also mean that the individual keys are being generated 
somewhere and then copied to the "id" folder for the jigkick to flash. 
So the jigkick just looks like a generic flasher and nothing else, 
flashing whatever psar & idstorage keys it finds on the memstick. I 
guess there could be another app that will generate the keys seperately 
for jigkick flasher usage.
Sounds like an awfully unautomated/unproductive way of doing it. Doing 
that for every single PSP made... just doesn't sound very efficient.
Indeed, but only because it was never designed for this. The retail 
updaters do not touch the idstorage area at all, only the IPL and 
lflash. So their service centers would be designed to only fix 
IPL+lflash corruption from power being cut during an ofw update.
The heavily encrypted jigkick firmware suggests that not even service 
centers could be trusted. Only headquaters would have the encryption 
keys and have the ability to create those prx's, psar's, & idstorage
 keys that it supplies to the service centers on these heavily encrypted
 memsticks. So if they needed to fix something like idstorage corruption
 I would suspect it would have to get new idstorage keys generated back 
from headquaters since only they would have the encryption keys (and 
only they could be trusted). Since normal service center usage would 
only ever need to deal with IPL & flash updates (before homebrew - 
and noobs - came along and started destroying their entire nands with no
 nand backups).
Squirrel
04-21-2008, 08:16 PM
Jachra bought a Stock Slim, Netherlands?, 3.8, ?color?
Jachra, do you remember if your unit exhibited the same button issue as the originally reported problem?
A1. Silver version
A2. No, it did not.
/edit
The dumping was done with a DCEM4 memstick. I only modified to enable the tools supplied by cory1942.
If with your A2 you meant that you didn't notice the button 
malfunctioning (meaning that you where able to press buttons and the PSP
 was reacting on that), that would mean there are two kinds of "virgin" 
states for the PSP.
One of that states would be "full virgin" with the behaviour 
Silverspring and I noticed and the other state would probably be 
"factory pre-powered-on", in which case the first initialization has 
been done by first time powering-on the PSP in the factory already 
(probably part of a checkup or burn in test).
Whenever I can lay my hands on another brand-new PSP, I'll create all 
possible dumps (straight from the box, after first power-on and after 
CFW installation).
brin_vg
04-21-2008, 08:23 PM
Perhaps add a small delay and simple button test to the start of the dumper program :D
Jachra
04-21-2008, 10:26 PM
Jachra bought a Stock Slim, Netherlands?, 3.8, ?color?
Jachra, do you remember if your unit exhibited the same button issue as the originally reported problem?
A1. Silver version
A2. No, it did not.
/edit
The dumping was done with a DCEM4 memstick. I only modified to enable the tools supplied by cory1942.
If with your A2 you meant that you didn't notice the button 
malfunctioning (meaning that you where able to press buttons and the PSP
 was reacting on that), that would mean there are two kinds of "virgin" 
states for the PSP.
One of that states would be "full virgin" with the behaviour 
Silverspring and I noticed and the other state would probably be 
"factory pre-powered-on", in which case the first initialization has 
been done by first time powering-on the PSP in the factory already 
(probably part of a checkup or burn in test).
Whenever I can lay my hands on another brand-new PSP, I'll create all 
possible dumps (straight from the box, after first power-on and after 
CFW installation).
Correct, I was able to press the buttons easily and the PSP reacted well on it.
Jachra
04-21-2008, 10:43 PM
Well
 actually turned out to be the same as on the original 3.60 dumps but 
this time many more blocks got leftover, though still not enough to have
 a fully decrypted payload. On the 3.60 dump only 6 blocks of the 
factory IPL were leftover, in the 3.80 dump there are 22 blocks 
altogether leftover:
Last 22 blocks of Factory IPL
loadaddr	blocksize	entry		checksum
0x04116480	0xF50		0		0xDF6CEDF5
0x041173D0	0xF50		0		0x4457DE64
0x04118320	0xF50		0		0xE4D5F74C
0x04119270	0xF50		0		0xCF0D84BE
0x0411A1C0	0xF50		0		0xF77FD68B
0x0411B110	0xF50		0		0xE33931E5
0x0411C060	0xF50		0		0xD9183486
0x0411CFB0	0xF50		0		0x66094E77
0x0411DF00	0xF50		0		0xEE3C931B
0x0411EE50	0xF50		0		0xBF0DA9E8
0x0411FDA0	0xF50		0		0x63F76F01
0x04120CF0	0xF50		0		0x64251D97
0x04121C40	0xF50		0		0x1D64B821
0x04122B90	0xF50		0		0x50BBBE38
0x04123AE0	0xF50		0		0x2C4C33A3
0x04124A30	0xF50		0		0x51FAF2BE
0x04125980	0xF50		0		0x729D1DC0
0x041268D0	0xF50		0		0x39C3A1D7
0x04127820	0xF50		0		0x572B030C
0x04128770	0xF50		0		0x7B8E52F8
0x041296C0	0xF50		0		0x0462AFB0
0x0412A610	0x210		0x040F0000	0x331B9575
All 22 blocks decrypted ok but that still wasnt enough to get the 
complete encrypted payload. Judging from the massive size of the factory
 IPL we would need at least double that to get the full payload. Also 
this factory IPL hasnt changed either since the last 6 blocks here 
matches the 6 of the 3.60 Factory IPL blocks. So it's probably a 
standard factory firmware that flashes the actual retail firmware over 
it and probably similar to the service center jigkick firmware.
But even if we got the full factory IPL I doubt it has the code to 
regenerate the idstorage, if you look at the leaked jigkick firmware, 
there is an "id" folder which has individual idstorage keys in there. So
 the jigkick would probably just flash the individual keys it finds in 
that folder rather than generating the keys itself. But that must also 
mean that the individual keys are being generated somewhere and then 
copied to the "id" folder for the jigkick to flash. So the jigkick just 
looks like a generic flasher and nothing else, flashing whatever psar 
& idstorage keys it finds on the memstick. I guess there could be 
another app that will generate the keys seperately for jigkick flasher 
usage.
First, a very nice find. :D
Perhaps with a lot of virgin dumps we might pierce together that IPL. However, it would take long time to do so.
In the leaked jigkicks that I found, only a empty parental_lock.bin was 
there, but you could be very right in your assumption. I guess they have
 a internal application or email for requesting those keys from HQ. 
After that they could be send through internal email or placed on a 
share.
The other way a service center could request those keys if they replaced
 the motherboard with a new one. That new one should then have a empty 
NAND. It would be most likely that just a few persons on such service 
center is able to request those keys at all.
/edit
Just a thought. As far as I know, most of us think that the PSP Unique 
ID is only somewhere inside the syscon-chip. Has anyone checked if it is
 also something on his PSP motherboard?
SilverSpring
04-22-2008, 12:43 PM
In the leaked jigkicks that I found, only a empty parental_lock.bin was there, but you could be very right in your assumption.
Well it's not empty (has a byte 0x09 in it). If you look, you'll see 
that it's the same as the key 0x47 in idstorage, which does happen to be
 the default parental lock param key.
Erland
04-25-2008, 02:57 AM
I have access to roughly 52 nand-dumps mostly from ofw before modding them. 1 or 3 of them are from already modded psp's...
all dumps are from both slim and phat's from all different firmwares.
Let me know if you want them....I don't know how much use they will be but...your more then welcome to them..
send me a pm or hit me on max console I'm not always on here.
Jachra
04-25-2008, 10:51 PM
That is a very nice offer, Erland. I hope that SilverSpring will contact you.
SilverSpring
04-29-2008, 03:50 AM
I have access to roughly 52 nand-dumps mostly from ofw before modding them. 1 or 3 of them are from already modded psp's...
all dumps are from both slim and phat's from all different firmwares.
Let me know if you want them....I don't know how much use they will be but...your more then welcome to them..
send me a pm or hit me on max console I'm not always on here.
Thats at least 1.7GB (3.4GB for slim dumps)!! How are you going to share them :confused:????
Erland
04-29-2008, 05:38 PM
Thats at least 1.7GB (3.4GB for slim dumps)!! How are you going to share them :confused:????
I will share them magically over the internet....how else....snail mail?
 I have a dedicated server at my job just for webhosting.....I also have
 1TB on my ftp...
Trust me sharing them will not be a problem..
PM Sent..or will be..
PS....oh by the way...on the "customers" page...you will notice that 
some of the "entries" are yellow...those are the slims...the white ones 
are classics. I'm sure your smart enough to go directly to the folder 
they are located in rather than clicking each persons name.
Also I have a friends "sykowizard" who also has a customers page up there and he stores his in a different directory. 
Your more than welcome to both sets of them.
Jachra
05-03-2008, 12:54 PM
Lately
 I have been looking at the data in ID Storage keys 0x100 and 0x101. I 
stumbled upon something that looks like a marker in the data.
In key 0x100 bytes 0x38 through 0x3F always seems to contain the value 
0x00 0x00 0x00 0x01 0x00 0x05 0x00 0x03 (0000000100050003). The same 
value seems to be repeated at 0xF0 through 0xF7 and at 0x1A8 through 
0x1AF.
The eight bytes that follow this value also seems to be same, but varies throughout different dumps of these keys.
It seems that ID Storage key 0x100 is split up in four sections. On page
 1 it is described that ID Storage key 0x100 has the following 
functions:
* 0x100 - DNAS, VSH & Internet browser region, ad-hoc region (if missing, official updaters cannot run - error CTA80000025)
It could that each section has it own function as described above. I do 
not know if the whole key needs to be intact when used or that it uses 
only parts for various functions within the firmware. I am going to try 
to delete data within that key to see if something stops working.
It could show us which section in that key 0x100 has which function. maybe something like:
0x000 - 0x037 = DNAS
0x048 - 0x0EF = VSH
0x100 - 0x1A7 = Internet Browser Region
0x1B8 - 0x1FF = Ad-Hoc Region
Mathieulh
05-04-2008, 12:06 AM
Lately
 I have been looking at the data in ID Storage keys 0x100 and 0x101. I 
stumbled upon something that looks like a marker in the data.
In key 0x100 bytes 0x38 through 0x3F always seems to contain the value 
0x00 0x00 0x00 0x01 0x00 0x05 0x00 0x03 (0000000100050003). The same 
value seems to be repeated at 0xF0 through 0xF7 and at 0x1A8 through 
0x1AF.
The eight bytes that follow this value also seems to be same, but varies throughout different dumps of these keys.
It seems that ID Storage key 0x100 is split up in four sections. On page
 1 it is described that ID Storage key 0x100 has the following 
functions:
* 0x100 - DNAS, VSH & Internet browser region, ad-hoc region (if missing, official updaters cannot run - error CTA80000025)
It could that each section has it own function as described above. I do 
not know if the whole key needs to be intact when used or that it uses 
only parts for various functions within the firmware. I am going to try 
to delete data within that key to see if something stops working.
It could show us which section in that key 0x100 has which function. maybe something like:
0x000 - 0x037 = DNAS
0x048 - 0x0EF = VSH
0x100 - 0x1A7 = Internet Browser Region
0x1B8 - 0x1FF = Ad-Hoc Region
The key is signed, if you edit it it will apear as corrupted data when checked by the kernel (through kirk)
SilverSpring
05-04-2008, 09:45 AM
Lately
 I have been looking at the data in ID Storage keys 0x100 and 0x101. I 
stumbled upon something that looks like a marker in the data.
In key 0x100 bytes 0x38 through 0x3F always seems to contain the value 
0x00 0x00 0x00 0x01 0x00 0x05 0x00 0x03 (0000000100050003). The same 
value seems to be repeated at 0xF0 through 0xF7 and at 0x1A8 through 
0x1AF.
The eight bytes that follow this value also seems to be same, but varies throughout different dumps of these keys.
It seems that ID Storage key 0x100 is split up in four sections. On page
 1 it is described that ID Storage key 0x100 has the following 
functions:
* 0x100 - DNAS, VSH & Internet browser region, ad-hoc region (if missing, official updaters cannot run - error CTA80000025)
It could that each section has it own function as described above. I do 
not know if the whole key needs to be intact when used or that it uses 
only parts for various functions within the firmware. I am going to try 
to delete data within that key to see if something stops working.
It could show us which section in that key 0x100 has which function. maybe something like:
0x000 - 0x037 = DNAS
0x048 - 0x0EF = VSH
0x100 - 0x1A7 = Internet Browser Region
0x1B8 - 0x1FF = Ad-Hoc Region
This has always been known, the info on the first page is just a very 
brief summary of things (most of the info on there is from me). Keys 
0x100/0x101 (and beginning of 0x102) together form 6 seperate 
independant sections. A section starts with the 00000001 bytes and is 
0xB8 in length each (except for the last section which doesnt start with
 those bytes). These sections are signed/encrypted and can each be 
verified/decrypted with KIRK cmd 0x12, editing any part even a single 
byte of a section will then fail the KIRK cmd 0x12 verification.
All 6 are unique identifiers which can verify & authenticate the psp
 (for things like DNAS etc). There is one more 0xB8-Byte section at the 
end of key 0x101 and continues onto key 0x102 which doesnt start with 
the 00000001 string (last 0x30 Bytes of key 0x101 and the first 0x88 
Bytes of key 0x102 together). This last section is what's called the 
'Open PSID' and can be used to authenticate adhoc communications (the 
data after that in key 0x102 is the start of the umd keys).
IIRC the first section is what's called the 'PS Code', some sort of 
region verification. Dont remember what the other sections were.
In short, it's all signed so you cant edit anything and since that 
particular KIRK cmd just does the verification/decryption internally 
without passing back any data, we have no idea what the decrypted data 
looks like.
Jachra
05-04-2008, 11:22 AM
Oke, thanks for the information MathieulH and SilverSpring.
bluewetball
05-06-2008, 12:48 AM
just
 wanted to say keep up the good work to the geniuses dedicated to 
getting all this to work! corrupted most of my flash an couldnt do 
anything but homebrew until i magically found my nand-dump on my 
computer!:eek: keep up the good work guys
brin_vg
05-11-2008, 02:10 AM
...editing any part even a single byte of a section will then fail the KIRK cmd 0x12 verification.
Not entirely true.
Being myself, I randomely changed a few (threeish) bytes to nothing in 
particular in key 0x100, and all functions attributed to that key still 
worked.
Perhaps something just went wrong in saving my muntified key, however. :)
SilverSpring
05-11-2008, 04:20 AM
...editing any part even a single byte of a section will then fail the KIRK cmd 0x12 verification.
Not entirely true.
Being myself, I randomely changed a few (threeish) bytes to nothing in 
particular in key 0x100, and all functions attributed to that key still 
worked.
Perhaps something just went wrong in saving my muntified key, however. :)
No it is true, I wrote "...editing any part even a single byte of a 
section will then fail the KIRK cmd 0x12 verification". So any of these 
sections verified  using KIRK cmd 0x12 will fail if any byte of that 
section is modified. However, not all sections are actually checked in 
the firmware (ie. not all are KIRK-verified). The first section is (the 
PS code - region verification), so try changing any of the bytes in that
 first section (offset 0x38-0xEF of key 0x100).
brin_vg
05-11-2008, 04:22 AM
...editing any part even a single byte of a section will then fail the KIRK cmd 0x12 verification.
Not entirely true.
Being myself, I randomely changed a few (threeish) bytes to nothing in 
particular in key 0x100, and all functions attributed to that key still 
worked.
Perhaps something just went wrong in saving my muntified key, however. :)
No it is true, I wrote "...editing any part even a single byte of a 
section will then fail the KIRK cmd 0x12 verification". So any of these 
sections verified  using KIRK cmd 0x12 will fail if any byte of that 
section is modified. However, not all sections are actually checked in 
the firmware (ie. not all are KIRK-verified). The first section is (the 
PS code - region verification), so try changing any of the bytes in that
 first section (offset 0x38-0xEF of key 0x100).
I was just speaking from my small experience, that explains it.
SilverSpring
05-11-2008, 04:33 AM
If
 I remember correctly (need to check) only two sections are actually 
checked in the firmware, the first section and the last section:
- PS Code: 0xB8 Bytes at offset 0x38-0xEF of Key 0x100.
- Open PSID: 0xB8 Bytes at offset 0x1D0-0x1FF of Key 0x101 and continued on to offset 0x00-0x87 of Key 0x102.
So if any part of those two sections are modified, then their 
corresponding functionality in the firmware will be broken. Editing 
other sections shouldnt cause any loss of functionality of the psp since
 they are not actually checked in the firmware (but will fail if you try
 to verify it with KIRK cmd 0x12).
Jachra
05-11-2008, 12:08 PM
SilverSpring,
If I am reading your explanation right, then in theory the ID Storage 
key 0x100 could be partially repaired to allow Ad Hoc. But the key will 
then still fail the KIRK cmd 0x12 for other functions, namely PS Code 
and Open PSID.
Correct?
Squirrel
05-11-2008, 04:14 PM
SilverSpring,
If I am reading your explanation right, then in theory the ID Storage 
key 0x100 could be partially repaired to allow Ad Hoc. But the key will 
then still fail the KIRK cmd 0x12 for other functions, namely PS Code 
and Open PSID.
Correct?
Still a hell of a job, but as I see it, theoretically correct. At least,
 as long as Sony doesn't decide to do a full Kirk check on the keys :D
SilverSpring
05-12-2008, 01:02 PM
SilverSpring,
If I am reading your explanation right, then in theory the ID Storage 
key 0x100 could be partially repaired to allow Ad Hoc. But the key will 
then still fail the KIRK cmd 0x12 for other functions, namely PS Code 
and Open PSID.
Correct?
I don't quite understand, what do you mean by partially repair? If your 
key 0x100 is gone and you don't have a backup (and your key 0x120 is 
gone too) there is no way to repair.
I should be more clear, all the functions listed associated with key 
0x100/0x101, dnas, adhoc, region, etc. uses PSCode/OpenPSID. So if these
 are broken, then your adhoc, dnas, etc. will be broken because they 
rely on PSCode/OpenPSID to do the verification & authentication of 
the psp. Key 0x100/0x101 are like signature keys, it has nothing to do 
with adhoc per se, adhoc communications uses these keys to do the 
authentication and thats why adhoc breaks if you lose these keys (same 
goes for all other psp functionality that need to do authentication 
too).
Other sections in key 0x100/0x101 are not used at all in the firmware 
(but possibly in future updates), so doesnt matter at the moment if they
 are broken. But if PSCode/OpenPSID are broken then everything that uses
 that will also be broken.
Jachra
05-12-2008, 02:38 PM
I
 don't quite understand, what do you mean by partially repair? If your 
key 0x100 is gone and you don't have a backup (and your key 0x120 is 
gone too) there is no way to repair.
I should be more clear, all the functions listed associated with key 
0x100/0x101, dnas, adhoc, region, etc. uses PSCode/OpenPSID. So if these
 are broken, then your adhoc, dnas, etc. will be broken because they 
rely on PSCode/OpenPSID to do the verification & authentication of 
the psp. Key 0x100/0x101 are like signature keys, it has nothing to do 
with adhoc per se, adhoc communications uses these keys to do the 
authentication and thats why adhoc breaks if you lose these keys (same 
goes for all other psp functionality that need to do authentication 
too).
Other sections in key 0x100/0x101 are not used at all in the firmware 
(but possibly in future updates), so doesnt matter at the moment if they
 are broken. But if PSCode/OpenPSID are broken then everything that uses
 that will also be broken.
I meant with partially repair, to restore a segment in the ID Storage 
key 0x100. I already thought that ID Storage key 0x100 was being used in
 Ad Hoc communications, but I did not know that the PSCode/OpenSID was 
needed too.
So I am back at square one with thinking about this issue.
Mathieulh
05-15-2008, 07:46 PM
You cannot partially restore a key, the whole key is signed.
Jachra
05-15-2008, 07:50 PM
Mathieulh,
I understood that from what SilverSpring wrote. Btw, it is hard catching
 up with a few information available. I am guessing that the things I 
was thinking of already passed most devs minds. So now I have to try to 
think out side the box.
SilverSpring
05-26-2008, 03:56 AM
Here is a quick test that will verify each of those 6 sections in key 0x100-0x102 (using KIRK cmd 0x12):
http://silverspring.lan.st/certcheck.rar
It's a 3.xx app (src included), should work on all psps (tested on 3.52 fat and 3.90 slim).
If you modify any part of those keys, you'll see the app fail the check 
for that section. But you can modify any section apart from section0 
& section5 (pscode & openPSID) and all features of the psp will 
still work fine, even though the app will fail the verify. Modify 
section0 (pscode) and you'll get region errors, modify section5 
(openPSID) and you'll get adhoc/dnas errors. 
Here are the offsets of each section in the idstorage key:
section0: 0xB8 Bytes from offset 0x038 of key 0x100 (this is the pscode)
section1: 0xB8 Bytes from offset 0x0F0 of key 0x100
section2: 0xB8 Bytes from offset 0x1A8 of key 0x100 (continues onto key 0x101)
section3: 0xB8 Bytes from offset 0x060 of key 0x101
section4: 0xB8 Bytes from offset 0x118 of key 0x101
section5: 0xB8 Bytes from offset 0x1D0 of key 0x101 (continues onto key 0x102) (this is the openPSID)
Only section 0 & 5 are used in the fw so that's why modifying any other section doesnt affect the psp's functionality.
Little is known about the format of these 0xB8 Byte sections and how 
they are generated, though it's constantly being researched. It doesnt 
seem to be one single stream of data but composed of seperate parts.
jas0nuk
05-26-2008, 01:13 PM
Nice app SilverSpring. As expected, my fat with broken 0x100 fails section0, 1 and 2 as these are the ones contained in 0x100 :)
I wonder why though, my section5 is fine, yet adhoc doesn't work?
Jachra
05-26-2008, 09:44 PM
I counted four sections in ID Storage key 0x100, so what does section 0x000 - 0x037?
/offtopic
I guess page 1 must updated if the ID Storage keys 0x100, 0x101 and 
0x102 flow over into each other. Maybe the information about the 
sections from Silverspring can be added?
jas0nuk
05-27-2008, 12:22 AM
Well,
 100 and 101 could be called one complete stream of 5 sections, and 
102-106 could be called another. SilverSpring, how is the UMD decryption
 data split up? Is it similar to 100/101?
Jachra
05-27-2008, 12:30 AM
jas0nuk,
With key 0x101 I see 6 sections. Four sections in key 0x0100, two 
sections in key 0x101. The first section starts at 0x0000 and ends at 
0x0037. Is that important data or something else?
SilverSpring
05-27-2008, 02:32 AM
Nice app SilverSpring. As expected, my fat with broken 0x100 fails section0, 1 and 2 as these are the ones contained in 0x100 :)
I wonder why though, my section5 is fine, yet adhoc doesn't work?
Hm really? I guess adhoc needs both pscode AND openPSID to work then. 
Btw, what does your key 0x100 look like now? Is it just empty? And what 
happened to your key 0x120, you broke that one too O.o ???? If it's 
still intact you can just replace your 0x100 with your 0x120.
Well, 100 and 101 could be called one complete stream of 5 sections, and
 102-106 could be called another. SilverSpring, how is the UMD 
decryption data split up? Is it similar to 100/101?
Well, a stream of 6 sections (section 0-5) and it includes part of 0x102
 as well (upto offset 0x88). Offset 0x88+ of 0x102 is the start of the 
umd data. The umd data is split up into 16-Byte "keys", so as you can 
see there are lots of them. The first part is like an index (the lots of
 0's part), each entry is 8-Bytes and they map onto a 16-Byte "key" 
following the index upto the beginning of 0x106.
I counted four sections in ID Storage key 0x100, so what does section 0x000 - 0x037?
With key 0x101 I see 6 sections. Four sections in key 0x0100, two 
sections in key 0x101. The first section starts at 0x0000 and ends at 
0x0037. Is that important data or something else?
I listed the offsets of each section above, these "certs" are 0xB8-Bytes
 in length, so there are 3 in 0x100 (the 3rd one is cutoff, it continues
 on in 0x101), and there are 3 in 0x101 (again the 3rd one is cutoff and
 continues on in 0x102). The first 0x38-Bytes in 0x100 isnt a cert, 
seems to be some kind of sig header maybe. It's not too important (for 
the sake of the psp's functionality that is). You can modify this part 
and it wont affect anything.
The 0xB8-Byte cert's seem formatted into something like this:
0x00: int (same for all sections for each psp)
0x04: int (same for all sections for each psp)
0x08: int (same for all sections for each psp)
0x0C: int (same for all sections for each psp)
0x10: buf[0x28] possibly siggen output?
0x38: buf[0x28] possibly siggen output?
0x60: buf[0x28] possibly siggen output? (constant, same in ALL psps)
0x88: buf[0x20] some type of sig?
0xA8: buf[0x10] some type of hash?
The only difference is the last cert (section5 - the openPSID) where the
 first 4 ints are instead just a 16-Byte id (rather than the 0's you 
see), which is the actual openPSID. Printing your openPSID, it should 
match the first 16-Bytes of section5. However the whole 0xB8-Bytes of 
that section is used to verify that the 16-Byte psid is actually valid.
jas0nuk
05-27-2008, 12:57 PM
Ah yeah 0-5 is 6 xD Just my dumbness.
And about my 0x100 and 0x120: when harleyg was trying to find out how to
 change the region, he came to the conclusion that it will only "change"
 if both keys are edited, if only one is edited, he said it read the 
region from 0x120. I'm not sure how he came to that conclusion, because 
looking at the code which scechkreg uses, it only reads 0x120 if 0x100 
does not exist or fails to read.
Anyway, his tool therefore replaced both my 0x100 and 0x120 with the 
ones from his PSP, which obviously doesn't work. And I stupidly had no 
backup since he insisted it would work xD Anyway it's all in the past 
and I don't exactly miss using adhoc, but it's an interesting thing to 
look into. So yeah, I have no chance of restoring it from a backup or 
anything like that.
jas0nuk
06-14-2008, 02:25 PM
TA-088 key dump analysed, no changes to the non-unique keys except for 0x7 and 0x8.
Changed the descriptions to make them clearer (Slim v1/v2 instead of TA-085/088)
hi
 everyone. Sorry for posting here, i know is a forum for devs but im 
having a weird problem with a psp slim. The only firmware i can use is 
3.71. Every time i update to a higher firmware it bricks. Even with 
pandora, the only firmware i can get working is 3.71 M33. I upgrade it 
to 3.80 (brick), 390 (brick), 4.01 (brick). While on 4.01 M33 i manage 
to toggle flash 0 and i notice all files were corrupt but i dont 
understand why only this happens after upgrading from 3.71 to any other 
firmware. I then flash anothers psp slim nand dump (of course after 
backing up my id storage keys and nanddump), but no luck still a brick. 
Can anyone give me feedback toward this issue. once again sorry for 
posting here.
jas0nuk
07-11-2008, 01:48 PM
That
 isn't really on topic, but anyway, it sounds like a hardware problem 
that only manifests itself on 3.80+ (unlikely but possible) - to see if 
the RAM is ok, check the last post in this topic: 
http://forums.maxconsole.net/showthread.php?t=117116
cory1492
07-12-2008, 09:01 AM
Firmwares
 after 3.71 went nuts if flash2/3 (4 possibly on slim, as well, but I've
 never seen it happen) weren't formatted to the correct version/cypher -
 it basically corrupts memory (resulting in a crash/black screen) 
somehow when it tries to load the lflash/lfat drivers and one of the 
partitions doesn't match the version. If the mem test works out with a 
bunch of OKs (and I'm not entirely sure it will test slim extended 
memory, but I think it won't), then try using nandTool and/or flash23 
format to repartition and format the partitions to the firmware you want
 to install (basically means making sure the right _updater prx's are in
 place.)
This could easily happen if you are using a badly made des.cem stick 
with mismatched prxs or a corrupted partition record (tool to check that
 from pandora here (http://nds.cmamod.com/2008/06/22/lflash-check/)) - 
if the partition records are corrupted when it goes to format a 
partition it doesn't fail with an error sometimes (from pandora at any 
rate), it just acts like it worked.
Good luck, at any rate (and here's hoping you aren't caleebra with the failing DRAM.)
Pirata Nervo
07-12-2008, 01:07 PM
@jas0nuk
"Looks like your PSP is broken, you can sell some parts like jas0nuk told you before.
Good luck!"
(that's the last post)
 lol xD
jas0nuk
07-12-2008, 04:36 PM
That wasn't the last post when I posted the reply xD
Here is the post I was referring to: http://forums.maxconsole.net/showpost.php?p=980672&postcount=11
But as cory1492 has given an alternative explanation, maybe the RAM test isn't needed.
Pirata Nervo
07-12-2008, 06:30 PM
oh ok lol
10 chars min
dim33
08-04-2008, 09:02 PM
Today I bought a slim. It is (I believe) a TA-88 - the one that can have cfw applied but cannot create a pandora battery.
Edit: PSPident 0.3 states it is a TA-088 - it came with 3.90 ofw.
A couple of months ago there was interest in obtaining a virgin (pre 1st boot) nand dump.
I recall that it was concluded that nothing happened to the keys 
pre/post 1st boot - but in any case I did take a pre 1st boot nand dump.
If there is still any interest/value in taking a look at this, let me know and I will forward it on.
mudgutts
07-15-2009, 06:29 AM
hi all.
I must be one of the lucky ones cos i believe i just fixed my slim to 
100% working again. with no backup of my keys after bricking my slim 
when first learning about CFW.
now, this thread hasn't been used for a while, so maybe a cure has already been found. forgive me for waking the dead. :-)
Luck my wife and i have identical PSP-2002PB 's.
i flashed her nand onto my psp. got it running again with the usual 
probs. wifi, umd, SCE updater.  (before learning that was a very bad 
thing to do)
using keycleaner and IDSM, i got wifi back
I've had the CTA80000025 error for a while
but with her nand, IDSM, keycleaner, DC8 and most importantly your 
posts, it's now fully fuctional.  adhoc, UMD, wifi, SCE updater all 
work.
have i stumbled onto a cure using ur tools, or did you guys plan it that way.....
cory1492
07-15-2009, 08:07 PM
You are behind the times...
Despertar Cementario includes in the last 2 or 3 versions an idstore 
rebuilding function which gets correct keys for most of the per-psp 
crypted keys, probably since shortly after this thread was last used.
Mathieulh
07-16-2009, 06:20 PM
actually
 the idsregeneration code is in there since DCv7 and err... yeah it is 
there on purpose :p It has the ability to restore every keys but the 
magicgate ones, it is also the result of over 2 years of intense 
research so indeed it was purposefully added :)
cryostasis
08-27-2009, 06:10 PM
I
 have a PSP Fat TA-79 V2, the psp was bricked for two months and today i
 accidentally flash a full (Including IDStorage keys) *.bin file of the 
TA-81 motherboard all games and functions are working but the only 
problem is that the game sharing would not work. I have already used the
 MAC Address Fixer and Key cleaner and they all said that it was fixed 
but the game sharing does not work.
cory1492
08-27-2009, 08:06 PM
Congratulations? :confused:
cryostasis
08-28-2009, 01:01 AM
Thanks
 :confused: but with the Adhoc or Gamesharing feature does not work, but
 i can still browse the internet if i use the Wifi feature. Is there a 
possible way to fix this? As i have not have any backup copies of the 
original ID Storage of the psp. ***** I think i posted on the wrong 
thread ******
cory1492
08-28-2009, 09:47 AM
Despertar Cementario 8 (DC8) can regen idstore, not sure if it will fix adhoc stuff though.
MaxMouseDLL
08-28-2009, 12:11 PM
Despertar Cementario 8 (DC8) can regen idstore, not sure if it will fix adhoc stuff though.
STUB_START "idsRegeneration",0x40090000,0x00130005
	STUB_FUNC  0xBDE13E76,idsRegenerationSetup
	STUB_FUNC  0xFEE3C55B,idsRegenerationGetIndex
	STUB_FUNC  0x0B33639A,idsRegenerationGetHwConfigKeys
	STUB_FUNC  0xFEA979A6,idsRegenerationGetMGKeys
	STUB_FUNC  0xEE1AD992,idsRegenerationGetFactoryBadBlocksKey
	STUB_FUNC  0x87A30D3A,idsRegenerationGetSerialKey
	STUB_FUNC  0xE37CC2E6,idsRegenerationGetWlanKey
	STUB_FUNC  0xC44FE956,idsRegenerationGetAudioVolumeSetupKey
	STUB_FUNC  0xBC42FEED,idsRegenerationGetUsbKeys
	STUB_FUNC  0x3F014928,idsRegenerationGetUnkKey140
	STUB_FUNC  0x8F7EE9C0,idsRegenerationGetMGKey40
	STUB_FUNC  0xB9156F27,idsRegenerationGetUnkKeys3X
	STUB_FUNC  0xB417BCF0,idsRegenerationGetParentalLockKey
	STUB_FUNC  0xFA2368E8,idsRegenerationGenerateFactoryFirmwareK ey
	STUB_FUNC  0x0EF8731D,idsRegenerationGetLCDKey
	STUB_FUNC  0x4E95D36F,idsRegenerationGenerateCallibrationKey
	STUB_FUNC  0xD7603D82,idsRegenerationGetUnkKeys5253
	STUB_FUNC  0x6015A7CD,idsRegenerationGetDefaultXMBColorKey
	STUB_FUNC  0xB79A6C46,idsRegenerationCreateCertificatesAndUMD Keys
	STUB_END
Just WLAN... I always thought the only thing that could not be done with
 DC7/8 was regeneration of the MagicGate keys, however 
idsRegenerationGetMGKeys seems to suggest otherwise...
cory1492
08-28-2009, 04:50 PM
Well,
 then I'd suggest when browsing internet check with the AP for the PSP's
 actual mac address and make sure it is the same one xmb reports to you 
in system settings. Provided you actually have regenerated your idstore 
with DC8 instead of just relying on "what seems to be working" from the 
misflash.
xero1
08-30-2009, 03:27 AM
Just
 WLAN... I always thought the only thing that could not be done with 
DC7/8 was regeneration of the MagicGate keys, however 
idsRegenerationGetMGKeys seems to suggest otherwise...
You can get the Magic Gate keys, but correctly signing them is a different story.
I knew someone would ask this sooner or later. I just thought it would be some place else.
MaxMouseDLL
08-30-2009, 10:32 AM
Just
 WLAN... I always thought the only thing that could not be done with 
DC7/8 was regeneration of the MagicGate keys, however 
idsRegenerationGetMGKeys seems to suggest otherwise...
You can get the Magic Gate keys, but correctly signing them is a different story.
I knew someone would ask this sooner or later. I just thought it would be some place else.
I see... are the MagicGate keys the only ones which are signed?
lol, where did you think it'd be asked?
<Off topic>Recently I've heard much about PSARDumper and 
decryption keys, mostly in topics entitled with "5.55 Firmware oh noes!"
 Mathieulh has commented on this:
Update the custom firmware's kernel to 5.55 or decrypt the games EBOOT.BIN (after getting the new keys)
Great, but is there any documentation anywhere as to how these keys are 
obtained? I'd like to mess around with it.</Off topic>
Mathieulh
08-30-2009, 11:24 PM
Just
 WLAN... I always thought the only thing that could not be done with 
DC7/8 was regeneration of the MagicGate keys, however 
idsRegenerationGetMGKeys seems to suggest otherwise...
You can get the Magic Gate keys, but correctly signing them is a different story.
I knew someone would ask this sooner or later. I just thought it would be some place else.
I see... are the MagicGate keys the only ones which are signed?
lol, where did you think it'd be asked?
<Off topic>Recently I've heard much about PSARDumper and 
decryption keys, mostly in topics entitled with "5.55 Firmware oh noes!"
 Mathieulh has commented on this:
Update the custom firmware's kernel to 5.55 or decrypt the games EBOOT.BIN (after getting the new keys)
Great, but is there any documentation anywhere as to how these keys are 
obtained? I'd like to mess around with it.</Off topic>
Those keys are obviously obtained through the reverse of various kernel 
components (if it is game keys you are looking for, you might want to 
take a closer look at mesg_leg.prx (at least if things haven't changed 
too much since last time I looked into it ))
I am unaware of any kind of specific documentation to help you through 
the process. Also I do hope that you have a legit excuse for getting 
those keys as we are (at lan.st at least) against piracy and the 5.55 
firmware on its own does not bring anything new next to the 5.50 (which 
already exists as a custom firmware) 
Of course not being able to play new games on custom firmwares greatly 
handicap people that actually purchased those but they are a minority 
next to people who only want new games support for piracy (sad but true 
:/ )
Anyway if you are skilled enough to extract the new keys and use them, I
 believe you should be smart enough to decide whatever should be done of
 this work (providing it is yours).
MaxMouseDLL
08-30-2009, 11:41 PM
Those
 keys are obviously obtained through the reverse of various kernel 
components (if it is game keys you are looking for, you might want to 
take a closer look at mesg_leg.prx (at least if things haven't changed 
too much since last time I looked into it ))
I am unaware of any kind of specific documentation to help you through 
the process. Also I do hope that you have a legit excuse for getting 
those keys as we are (at lan.st at least) against piracy and the 5.55 
firmware on its own does not bring anything new next to the 5.50 (which 
already exists as a custom firmware) 
Of course not being able to play new games on custom firmwares greatly 
handicap people that actually purchased those but they are a minority 
next to people who only want new games support for piracy (sad but true 
:/ )
Anyway if you are skilled enough to extract the new keys and use them, I
 believe you should be smart enough to decide whatever should be done of
 this work (providing it is yours).
Mathieulh, the reason i ask is not for piracy, merely because i have 
seen (as you have, Ref: your post on MaxConsole 
(http://forums.maxconsole.net/showthread.php?p=1168373#post1168373) 
(Side note: do you know how many people idolise you there?!)) many 
threads on 5.55 (As is the scene, moaning, ridicule etc...), i simply 
wondered what the inner workings of it where, how the decryption 
happens, what cipher is used, how/why it is scrambled, how the keys are 
obtained etc, clearly i am not at the skill level required (I have read 
the 5.50 PSARDumper source, and can see the existing keys for various 
firmware versions, and descrambling techniques, but nothing on actually 
obtaining the keys). I asked purely out of curiosity, rather than the 
need to play games that require 5.55, currently that issue doesn't 
effect me.
Mathieulh
08-31-2009, 01:57 PM
Those
 keys are obviously obtained through the reverse of various kernel 
components (if it is game keys you are looking for, you might want to 
take a closer look at mesg_leg.prx (at least if things haven't changed 
too much since last time I looked into it ))
I am unaware of any kind of specific documentation to help you through 
the process. Also I do hope that you have a legit excuse for getting 
those keys as we are (at lan.st at least) against piracy and the 5.55 
firmware on its own does not bring anything new next to the 5.50 (which 
already exists as a custom firmware) 
Of course not being able to play new games on custom firmwares greatly 
handicap people that actually purchased those but they are a minority 
next to people who only want new games support for piracy (sad but true 
:/ )
Anyway if you are skilled enough to extract the new keys and use them, I
 believe you should be smart enough to decide whatever should be done of
 this work (providing it is yours).
Mathieulh, the reason i ask is not for piracy, merely because i have 
seen (as you have, Ref: your post on MaxConsole 
(http://forums.maxconsole.net/showthread.php?p=1168373#post1168373) 
(Side note: do you know how many people idolise you there?!)) many 
threads on 5.55 (As is the scene, moaning, ridicule etc...), i simply 
wondered what the inner workings of it where, how the decryption 
happens, what cipher is used, how/why it is scrambled, how the keys are 
obtained etc, clearly i am not at the skill level required (I have read 
the 5.50 PSARDumper source, and can see the existing keys for various 
firmware versions, and descrambling techniques, but nothing on actually 
obtaining the keys). I asked purely out of curiosity, rather than the 
need to play games that require 5.55, currently that issue doesn't 
effect me.
Well most of the keys are obtained from the IPL itself, they are located
 inside main.bin and used to bootstrap the kernel modules. You can 
decrypt the IPL directly using the forged IPL block and the pre-ipl code
 (this has to be done at IPL time)
vBulletin® v3.7.2, Copyright ©2000-2012, Jelsoft Enterprises Ltd.