The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "Firmware Keys"
(added missing 2.1b1) |
(removed link to deleted page) |
||
Line 19: | Line 19: | ||
| |
| |
||
! 1.x |
! 1.x |
||
− | ! 2.x |
||
|- |
|- |
||
! Beta |
! Beta |
||
| |
| |
||
− | | rowspan="2"| [[VFDecrypt Keys: 2.x|Keys]] |
||
|- |
|- |
||
! Final |
! Final |
Revision as of 23:41, 30 December 2010
This page is info on the keys VFDecrypt
Gaps
As you will notice, there may be a gap or two, or a key for a current build that is not there. Please feel free to add them, but please be sure that it is only the key for a User or Developer build, as if you gave the key for another type of build that might or may not be out there people could get in trouble, and we do not want that. Thanks for contributing!
Notes
The root filesystem is by far the largest (~500 MB in the case of iOS 4 (~800MB for Retina and iPad)), for which there is one key per device model, with no IV. Use VFDecrypt to decrypt this. You can mount/this once it has been decrypted using your program of choice. (For example, 7-zip on Windows (after extracting the DMG on Windows, extract the 5.hfx file with 7Z)
The Update and Restore ramdisks share the same IV and key per type of Application Processor (current choices are S5L8900 in the iPhone, iPhone 3G, and iPod touch, S5L8720 in the iPod touch 2G, S5L8920 in the iPhone 3GS, and S5L8922 in the iPod touch 3G). Use img3decrypt or xpwntool to decrypt these. Likewise, once this is decrypted, you can mount this as well, using the tool of your choice.
You may find Ramdisk Decryption to be helpful.
For those wanting to decrypt their own keys, you must use GenPass to get the keys for 3.x/4.x.
Firmware versions
Table of Links to Keys
1.x | |
---|---|
Beta | |
Final | Keys |
Final
Main Article: Firmware
Beta
Main Article: Beta Firmware