PlayStation Portable Test Disc Dumping
From Redump Wiki
(Difference between revisions)
Line 25: | Line 25: | ||
Note: This method has not yet been tested by any members of redump as far as we know. | Note: This method has not yet been tested by any members of redump as far as we know. | ||
- | [[ | + | [[Category:Dumping Guides]] |
Latest revision as of 20:52, 25 April 2019
Most PSP test discs should dump fine with the standard dumping guide. However many silver UMD Test discs titled UMDT-99813 exist which require a special dumping method. It is unknown if other test discs require a similar method.
You should be able to read those UMDs by re-encrypting your idstorage to include these keys or passing them directly to Spock:
int __sceFactoryGetUMDKey(unsigned int part1, unsigned int part2, u8* out) { u8* key = NULL; int ret = 0, x, i; u8 key_00001708[16] = { 0x05, 0x8F, 0xE5, 0x35, 0xA0, 0x4C, 0x89, 0xB1, 0xC0, 0x12, 0xAD, 0xE7, 0xDA, 0x06, 0xD9, 0x22 }; u8 key_000016D0[16] = { 0x80, 0x8C, 0x8D, 0xA8, 0x66, 0x65, 0x5C, 0x11, 0x35, 0x12, 0xA6, 0xBF, 0x96, 0x6D, 0x3C, 0x46 }; u8 key_00001698[16] = { 0x77, 0xA5, 0x97, 0xDE, 0x0A, 0xF3, 0xEF, 0x40, 0x06, 0x96, 0x00, 0x9C, 0x03, 0x3C, 0xE3, 0xAE }; u8 key_00001664[16] = { 0x9F, 0x26, 0xB3, 0x3D, 0x66, 0xAF, 0xFC, 0xF7, 0xC6, 0xC0, 0x1A, 0x35, 0xAB, 0x32, 0x24, 0x22 }; u8 key_00001614[16] = { 0xAA, 0x62, 0x42, 0x04, 0x9E, 0x40, 0xFB, 0xBF, 0x91, 0x16, 0xC3, 0x23, 0x6F, 0xEA, 0x17, 0xEF }; u8 key_00001598[16] = { 0x1A, 0x4A, 0xA0, 0x55, 0x30, 0x8D, 0x2B, 0xBC, 0x63, 0x2B, 0x54, 0x68, 0xBB, 0x3A, 0x9D, 0x5B }; u8 key_00001564[16] = { 0xF2, 0x2C, 0x77, 0xAA, 0x4B, 0x1C, 0x14, 0x01, 0x9D, 0xE5, 0x53, 0x23, 0xE3, 0x41, 0x3D, 0x21 }; u8 key_000014D0[16] = { 0x42, 0x01, 0x82, 0x19, 0x24, 0xFF, 0x0C, 0x34, 0xEB, 0xB4, 0x3F, 0x5D, 0xCA, 0x80, 0x7E, 0x8D }; u8 key_00001498[16] = { 0x40, 0x78, 0x66, 0xEB, 0x9B, 0xA5, 0xE9, 0x29, 0x0B, 0x2F, 0x8E, 0x4D, 0x30, 0x11, 0x67, 0x54 }; u8 key_00001460[16] = { 0x27, 0xC7, 0x59, 0xF1, 0x48, 0xD8, 0x7E, 0xA8, 0xC0, 0xC2, 0x7F, 0x01, 0x3A, 0xE6, 0xEC, 0xD6 }; u8 key_000013F0[16] = { 0x3A, 0xBA, 0x2E, 0x14, 0xC1, 0x07, 0x37, 0x9F, 0x5F, 0x03, 0x3F, 0x79, 0x4D, 0xE0, 0xCE, 0x7E }; u8 key_000013BC[16] = { 0x71, 0x16, 0x41, 0x21, 0xC3, 0xE0, 0x6A, 0xB5, 0x76, 0x57, 0x35, 0x90, 0xAB, 0x22, 0x3E, 0xFD }; };
You could also enable the UMD drive TEST mode and dump the discs' raw sectors and decrypting those with the above keys.
Note: This method has not yet been tested by any members of redump as far as we know.