The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "Firmware Keys"
m (→Beta: Add 8C134b) |
|||
Line 244: | Line 244: | ||
| rowspan="15" | Unavailable |
| rowspan="15" | Unavailable |
||
| colspan="2" rowspan="21" | Unavailable |
| colspan="2" rowspan="21" | Unavailable |
||
− | | rowspan=" |
+ | | rowspan="24" | Unavailable |
|- |
|- |
||
! style="text-align:left;" | 2.0b2 |
! style="text-align:left;" | 2.0b2 |
Revision as of 03:17, 13 November 2010
Gaps
As you will notice, there may be a gap or two, or a key for a current build that is not there. Please feel free to add them, but please be sure that it is only the key for a User or Developer build, as if you gave the key for another type of build that might or may not be out there people could get in trouble, and we do not want that. Thanks for contributing!
Notes
The root filesystem is by far the largest (300+ MB in the case of iOS 4), for which there is one key per device model, with no IV. Use VFDecrypt to decrypt this. You can mount/this once it has been decrypted using your program of choice. (For example, 7-zip on Windows.)
The Update and Restore ramdisks share the same IV and key per type of Application Processor (current choices are S5L8900 in the iPhone 3G, S5L8720 in the iPod touch 2G, S5L8920 in the iPhone 3GS, and S5L8922 in the iPod touch 3G). Use img3decrypt or xpwntool to decrypt these. Likewise, once this is decrypted, you can mount this as well, using the tool of your choice.
You may find Ramdisk Decryption to be helpful.
For those wanting to decrypt their own keys, you must use GenPass to get the keys for 4.x.
Firmware versions
Table of Links to Keys
1.x | 2.x | 3.x | 4.x | |
---|---|---|---|---|
Beta | Keys | Keys | Keys | |
Final | Keys | Keys |
Final
Main Article: Firmware
Beta
Main Article: Beta Firmware