The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "Firmware Keys"
(my mistake - 8C148 for 3GS was the GM beta!) |
(4.3b1) |
||
Line 325: | Line 325: | ||
|- |
|- |
||
! style="text-align:left;" | 4.0b1 |
! style="text-align:left;" | 4.0b1 |
||
− | | rowspan=" |
+ | | rowspan="13" | Unavailable |
| [[ApexVail 8A230m (iPhone 3G)|8A230m]] |
| [[ApexVail 8A230m (iPhone 3G)|8A230m]] |
||
| [[ApexVail 8A230m (iPhone 3GS)|8A230m]] |
| [[ApexVail 8A230m (iPhone 3GS)|8A230m]] |
||
− | | rowspan=" |
+ | | rowspan="13" | Unavailable |
| [[ApexVail 8A230m (iPod touch 2G)|8A230m]] |
| [[ApexVail 8A230m (iPod touch 2G)|8A230m]] |
||
| [[ApexVail 8A230m (iPod touch 3G)|8A230m]] |
| [[ApexVail 8A230m (iPod touch 3G)|8A230m]] |
||
Line 414: | Line 414: | ||
| [[JasperVail 8C148 (iPod touch 4G)|8C148]] |
| [[JasperVail 8C148 (iPod touch 4G)|8C148]] |
||
| [[JasperVail 8C148 (iPad)|8C148]] |
| [[JasperVail 8C148 (iPad)|8C148]] |
||
+ | |- |
||
+ | ! style="text-align:left;" | 4.3b1 |
||
+ | | Unavailable |
||
+ | | [[DurangoVail 8F5148b (iPhone 3GS)|8F5148b]] |
||
+ | | [[DurangoVail 8F5148b (iPhone 4)|8F5148b]] |
||
+ | | Unavailable |
||
+ | | [[DurangoVail 8F5148b (iPod touch 3G)|8F5148b]] |
||
+ | | [[DurangoVail 8F5148b (iPod touch 4G)|8F5148b]] |
||
+ | | [[DurangoVail 8F5148b (iPad)|8F5148b]] |
||
+ | | [[DurangoVail 8F5148b (Apple TV 2G)|8F5148b]] |
||
|- |
|- |
||
|} |
|} |
Revision as of 21:46, 12 January 2011
This page is info on the keys VFDecrypt
Contents
Gaps
As you will notice, there may be a gap or two, or a key for a current build that is not there. Please feel free to add them, but please be sure that it is only the key for a User or Developer build, as if you gave the key for another type of build that might or may not be out there people could get in trouble, and we do not want that. Thanks for contributing!
Notes
The root filesystem is by far the largest (~500 MB in the case of iOS 4 (~800MB for Retina and iPad)), for which there is one key per device model, with no IV. Use VFDecrypt to decrypt this. You can mount/this once it has been decrypted using your program of choice. (For example, 7-zip on Windows (after extracting the DMG on Windows, extract the 5.hfx file with 7Z)
The Update and Restore ramdisks share the same IV and key per type of Application Processor (current choices are S5L8900 in the iPhone, iPhone 3G, and iPod touch, S5L8720 in the iPod touch 2G, S5L8920 in the iPhone 3GS, and S5L8922 in the iPod touch 3G). Use img3decrypt or xpwntool to decrypt these. Likewise, once this is decrypted, you can mount this as well, using the tool of your choice.
You may find Ramdisk Decryption to be helpful.
For those wanting to decrypt their own keys, you must use GenPass to get the keys for 3.x/4.x.
Firmware versions
Final
Main Article: Firmware
Beta
Main Article: Beta Firmware