The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "Firmware Keys"
(removed link to deleted page) |
(merged Notes from deleted pag VFDecrypt Keys: 3.x) |
||
Line 7: | Line 7: | ||
The root filesystem is by far the largest (~500 MB in the case of iOS 4 (~800MB for Retina and iPad)), for which there is one key per device model, with no IV. Use [[VFDecrypt]] to decrypt this. You can mount/this once it has been decrypted using your program of choice. (For example, 7-zip on Windows.) |
The root filesystem is by far the largest (~500 MB in the case of iOS 4 (~800MB for Retina and iPad)), for which there is one key per device model, with no IV. Use [[VFDecrypt]] to decrypt this. You can mount/this once it has been decrypted using your program of choice. (For example, 7-zip on Windows.) |
||
− | The Update and Restore ramdisks share the same IV and key per type of Application Processor (current choices are [[S5L8900]] in the [[N82ap|iPhone 3G]], [[S5L8720]] in the [[N72ap|iPod touch 2G]], [[S5L8920]] in the [[N88ap|iPhone 3GS]], and [[S5L8922]] in the [[N18ap|iPod touch 3G]]). Use [http://code.google.com/p/img3decrypt/ img3decrypt] or [http://github.com/planetbeing/xpwn/tree/master xpwntool] to decrypt these. Likewise, once this is decrypted, you can mount this as well, using the tool of your choice. |
+ | The Update and Restore ramdisks share the same IV and key per type of Application Processor (current choices are [[S5L8900]] in the [[M68AP|iPhone]], [[N82ap|iPhone 3G]], and [[N45ap|iPod touch]], [[S5L8720]] in the [[N72ap|iPod touch 2G]], [[S5L8920]] in the [[N88ap|iPhone 3GS]], and [[S5L8922]] in the [[N18ap|iPod touch 3G]]). Use [http://code.google.com/p/img3decrypt/ img3decrypt] or [http://github.com/planetbeing/xpwn/tree/master xpwntool] to decrypt these. Likewise, once this is decrypted, you can mount this as well, using the tool of your choice. |
You may find [[Ramdisk Decryption]] to be helpful. |
You may find [[Ramdisk Decryption]] to be helpful. |
||
− | For those wanting to decrypt their own keys, you must use [[GenPass]] to get the keys for 4.x. |
+ | For those wanting to decrypt their own keys, you must use [[GenPass]] to get the keys for 3.x/4.x. |
==Firmware versions== |
==Firmware versions== |
Revision as of 21:16, 30 December 2010
This page is info on the keys VFDecrypt
Gaps
As you will notice, there may be a gap or two, or a key for a current build that is not there. Please feel free to add them, but please be sure that it is only the key for a User or Developer build, as if you gave the key for another type of build that might or may not be out there people could get in trouble, and we do not want that. Thanks for contributing!
Notes
The root filesystem is by far the largest (~500 MB in the case of iOS 4 (~800MB for Retina and iPad)), for which there is one key per device model, with no IV. Use VFDecrypt to decrypt this. You can mount/this once it has been decrypted using your program of choice. (For example, 7-zip on Windows.)
The Update and Restore ramdisks share the same IV and key per type of Application Processor (current choices are S5L8900 in the iPhone, iPhone 3G, and iPod touch, S5L8720 in the iPod touch 2G, S5L8920 in the iPhone 3GS, and S5L8922 in the iPod touch 3G). Use img3decrypt or xpwntool to decrypt these. Likewise, once this is decrypted, you can mount this as well, using the tool of your choice.
You may find Ramdisk Decryption to be helpful.
For those wanting to decrypt their own keys, you must use GenPass to get the keys for 3.x/4.x.
Firmware versions
Table of Links to Keys
1.x | 2.x | 3.x | |
---|---|---|---|
Beta | Keys | Keys | |
Final | Keys | Keys |
Final
Main Article: Firmware
Beta
Main Article: Beta Firmware