PlayStation Portable Test Disc Dumping
From Redump Wiki
(Difference between revisions)
(Created page with "Most PSP test discs should dump fine with the standard dumping guide. However many silver UMD Test discs titled UMDT-99813 exist which requ...") |
|||
(One intermediate revision not shown) | |||
Line 3: | Line 3: | ||
You should be able to read those UMDs by re-encrypting your idstorage to include these keys or passing them directly to Spock: | You should be able to read those UMDs by re-encrypting your idstorage to include these keys or passing them directly to Spock: | ||
- | int __sceFactoryGetUMDKey(unsigned int part1, unsigned int part2, u8* out) | + | int __sceFactoryGetUMDKey(unsigned int part1, unsigned int part2, u8* out) |
- | { | + | { |
- | u8* key = NULL; | + | u8* key = NULL; |
- | int ret = 0, x, i; | + | int ret = 0, x, i; |
- | u8 key_00001708[16] = { 0x05, 0x8F, 0xE5, 0x35, 0xA0, 0x4C, 0x89, 0xB1, 0xC0, 0x12, 0xAD, 0xE7, 0xDA, 0x06, 0xD9, 0x22 }; | + | u8 key_00001708[16] = { 0x05, 0x8F, 0xE5, 0x35, 0xA0, 0x4C, 0x89, 0xB1, 0xC0, 0x12, 0xAD, 0xE7, 0xDA, 0x06, 0xD9, 0x22 }; |
- | u8 key_000016D0[16] = { 0x80, 0x8C, 0x8D, 0xA8, 0x66, 0x65, 0x5C, 0x11, 0x35, 0x12, 0xA6, 0xBF, 0x96, 0x6D, 0x3C, 0x46 }; | + | u8 key_000016D0[16] = { 0x80, 0x8C, 0x8D, 0xA8, 0x66, 0x65, 0x5C, 0x11, 0x35, 0x12, 0xA6, 0xBF, 0x96, 0x6D, 0x3C, 0x46 }; |
- | u8 key_00001698[16] = { 0x77, 0xA5, 0x97, 0xDE, 0x0A, 0xF3, 0xEF, 0x40, 0x06, 0x96, 0x00, 0x9C, 0x03, 0x3C, 0xE3, 0xAE }; | + | u8 key_00001698[16] = { 0x77, 0xA5, 0x97, 0xDE, 0x0A, 0xF3, 0xEF, 0x40, 0x06, 0x96, 0x00, 0x9C, 0x03, 0x3C, 0xE3, 0xAE }; |
- | u8 key_00001664[16] = { 0x9F, 0x26, 0xB3, 0x3D, 0x66, 0xAF, 0xFC, 0xF7, 0xC6, 0xC0, 0x1A, 0x35, 0xAB, 0x32, 0x24, 0x22 }; | + | u8 key_00001664[16] = { 0x9F, 0x26, 0xB3, 0x3D, 0x66, 0xAF, 0xFC, 0xF7, 0xC6, 0xC0, 0x1A, 0x35, 0xAB, 0x32, 0x24, 0x22 }; |
- | u8 key_00001614[16] = { 0xAA, 0x62, 0x42, 0x04, 0x9E, 0x40, 0xFB, 0xBF, 0x91, 0x16, 0xC3, 0x23, 0x6F, 0xEA, 0x17, 0xEF }; | + | u8 key_00001614[16] = { 0xAA, 0x62, 0x42, 0x04, 0x9E, 0x40, 0xFB, 0xBF, 0x91, 0x16, 0xC3, 0x23, 0x6F, 0xEA, 0x17, 0xEF }; |
- | u8 key_00001598[16] = { 0x1A, 0x4A, 0xA0, 0x55, 0x30, 0x8D, 0x2B, 0xBC, 0x63, 0x2B, 0x54, 0x68, 0xBB, 0x3A, 0x9D, 0x5B }; | + | u8 key_00001598[16] = { 0x1A, 0x4A, 0xA0, 0x55, 0x30, 0x8D, 0x2B, 0xBC, 0x63, 0x2B, 0x54, 0x68, 0xBB, 0x3A, 0x9D, 0x5B }; |
- | u8 key_00001564[16] = { 0xF2, 0x2C, 0x77, 0xAA, 0x4B, 0x1C, 0x14, 0x01, 0x9D, 0xE5, 0x53, 0x23, 0xE3, 0x41, 0x3D, 0x21 }; | + | u8 key_00001564[16] = { 0xF2, 0x2C, 0x77, 0xAA, 0x4B, 0x1C, 0x14, 0x01, 0x9D, 0xE5, 0x53, 0x23, 0xE3, 0x41, 0x3D, 0x21 }; |
- | u8 key_000014D0[16] = { 0x42, 0x01, 0x82, 0x19, 0x24, 0xFF, 0x0C, 0x34, 0xEB, 0xB4, 0x3F, 0x5D, 0xCA, 0x80, 0x7E, 0x8D }; | + | u8 key_000014D0[16] = { 0x42, 0x01, 0x82, 0x19, 0x24, 0xFF, 0x0C, 0x34, 0xEB, 0xB4, 0x3F, 0x5D, 0xCA, 0x80, 0x7E, 0x8D }; |
- | u8 key_00001498[16] = { 0x40, 0x78, 0x66, 0xEB, 0x9B, 0xA5, 0xE9, 0x29, 0x0B, 0x2F, 0x8E, 0x4D, 0x30, 0x11, 0x67, 0x54 }; | + | u8 key_00001498[16] = { 0x40, 0x78, 0x66, 0xEB, 0x9B, 0xA5, 0xE9, 0x29, 0x0B, 0x2F, 0x8E, 0x4D, 0x30, 0x11, 0x67, 0x54 }; |
- | u8 key_00001460[16] = { 0x27, 0xC7, 0x59, 0xF1, 0x48, 0xD8, 0x7E, 0xA8, 0xC0, 0xC2, 0x7F, 0x01, 0x3A, 0xE6, 0xEC, 0xD6 }; | + | u8 key_00001460[16] = { 0x27, 0xC7, 0x59, 0xF1, 0x48, 0xD8, 0x7E, 0xA8, 0xC0, 0xC2, 0x7F, 0x01, 0x3A, 0xE6, 0xEC, 0xD6 }; |
- | u8 key_000013F0[16] = { 0x3A, 0xBA, 0x2E, 0x14, 0xC1, 0x07, 0x37, 0x9F, 0x5F, 0x03, 0x3F, 0x79, 0x4D, 0xE0, 0xCE, 0x7E }; | + | u8 key_000013F0[16] = { 0x3A, 0xBA, 0x2E, 0x14, 0xC1, 0x07, 0x37, 0x9F, 0x5F, 0x03, 0x3F, 0x79, 0x4D, 0xE0, 0xCE, 0x7E }; |
- | u8 key_000013BC[16] = { 0x71, 0x16, 0x41, 0x21, 0xC3, 0xE0, 0x6A, 0xB5, 0x76, 0x57, 0x35, 0x90, 0xAB, 0x22, 0x3E, 0xFD }; | + | u8 key_000013BC[16] = { 0x71, 0x16, 0x41, 0x21, 0xC3, 0xE0, 0x6A, 0xB5, 0x76, 0x57, 0x35, 0x90, 0xAB, 0x22, 0x3E, 0xFD }; |
- | }; | + | }; |
You could also enable the UMD drive TEST mode and dump the discs' raw sectors and decrypting those with the above keys. | You could also enable the UMD drive TEST mode and dump the discs' raw sectors and decrypting those with the above keys. | ||
Line 25: | Line 25: | ||
Note: This method has not yet been tested by any members of redump as far as we know. | Note: This method has not yet been tested by any members of redump as far as we know. | ||
- | [[ | + | [[Category:Dumping Guides]] |
Latest revision as of 20:52, 25 April 2019
Most PSP test discs should dump fine with the standard dumping guide. However many silver UMD Test discs titled UMDT-99813 exist which require a special dumping method. It is unknown if other test discs require a similar method.
You should be able to read those UMDs by re-encrypting your idstorage to include these keys or passing them directly to Spock:
int __sceFactoryGetUMDKey(unsigned int part1, unsigned int part2, u8* out) { u8* key = NULL; int ret = 0, x, i; u8 key_00001708[16] = { 0x05, 0x8F, 0xE5, 0x35, 0xA0, 0x4C, 0x89, 0xB1, 0xC0, 0x12, 0xAD, 0xE7, 0xDA, 0x06, 0xD9, 0x22 }; u8 key_000016D0[16] = { 0x80, 0x8C, 0x8D, 0xA8, 0x66, 0x65, 0x5C, 0x11, 0x35, 0x12, 0xA6, 0xBF, 0x96, 0x6D, 0x3C, 0x46 }; u8 key_00001698[16] = { 0x77, 0xA5, 0x97, 0xDE, 0x0A, 0xF3, 0xEF, 0x40, 0x06, 0x96, 0x00, 0x9C, 0x03, 0x3C, 0xE3, 0xAE }; u8 key_00001664[16] = { 0x9F, 0x26, 0xB3, 0x3D, 0x66, 0xAF, 0xFC, 0xF7, 0xC6, 0xC0, 0x1A, 0x35, 0xAB, 0x32, 0x24, 0x22 }; u8 key_00001614[16] = { 0xAA, 0x62, 0x42, 0x04, 0x9E, 0x40, 0xFB, 0xBF, 0x91, 0x16, 0xC3, 0x23, 0x6F, 0xEA, 0x17, 0xEF }; u8 key_00001598[16] = { 0x1A, 0x4A, 0xA0, 0x55, 0x30, 0x8D, 0x2B, 0xBC, 0x63, 0x2B, 0x54, 0x68, 0xBB, 0x3A, 0x9D, 0x5B }; u8 key_00001564[16] = { 0xF2, 0x2C, 0x77, 0xAA, 0x4B, 0x1C, 0x14, 0x01, 0x9D, 0xE5, 0x53, 0x23, 0xE3, 0x41, 0x3D, 0x21 }; u8 key_000014D0[16] = { 0x42, 0x01, 0x82, 0x19, 0x24, 0xFF, 0x0C, 0x34, 0xEB, 0xB4, 0x3F, 0x5D, 0xCA, 0x80, 0x7E, 0x8D }; u8 key_00001498[16] = { 0x40, 0x78, 0x66, 0xEB, 0x9B, 0xA5, 0xE9, 0x29, 0x0B, 0x2F, 0x8E, 0x4D, 0x30, 0x11, 0x67, 0x54 }; u8 key_00001460[16] = { 0x27, 0xC7, 0x59, 0xF1, 0x48, 0xD8, 0x7E, 0xA8, 0xC0, 0xC2, 0x7F, 0x01, 0x3A, 0xE6, 0xEC, 0xD6 }; u8 key_000013F0[16] = { 0x3A, 0xBA, 0x2E, 0x14, 0xC1, 0x07, 0x37, 0x9F, 0x5F, 0x03, 0x3F, 0x79, 0x4D, 0xE0, 0xCE, 0x7E }; u8 key_000013BC[16] = { 0x71, 0x16, 0x41, 0x21, 0xC3, 0xE0, 0x6A, 0xB5, 0x76, 0x57, 0x35, 0x90, 0xAB, 0x22, 0x3E, 0xFD }; };
You could also enable the UMD drive TEST mode and dump the discs' raw sectors and decrypting those with the above keys.
Note: This method has not yet been tested by any members of redump as far as we know.