Difference between revisions of "Kirkwood 7A341 (iPhone1,2)"

From The iPhone Wiki
Jump to: navigation, search
(New page: == Decryption Keys == === Root Filesystem === * '''VFDecrypt''': 8d5d1fea02d627c9e9b0d994c3cfdeaab9780c86ac908db15461efe44eddd19f8924b6b2 === Update Ramdisk - 018-5303-002.dmg=== * '''Key...)
 
Line 30: Line 30:
 
* '''Key''': 02418105dfb3be2af2a76248e026f702
 
* '''Key''': 02418105dfb3be2af2a76248e026f702
 
* '''IV ''': a4db9183cd79722b4146c9de09ab29c5
 
* '''IV ''': a4db9183cd79722b4146c9de09ab29c5
  +
  +
==Patches==
  +
Putting this here for developers that would like to to utilize "extras" like /dev/kmem access, tfp0, etc.
  +
  +
===Kernel===
  +
<pre>
  +
// thumb patches
  +
0x08DE72: 8D 43 => 00 00 // w^x patch #1
  +
0x090B6E: A2 43 => 00 00 // w^x patch #2
  +
0x19B8BC: 0C D1 => 0C E0 // allow tfp0
  +
0x381E22: FA 23 DB 00 => 01 23 5B 42 // allow aes uid key usage
  +
0x381E34: FA 23 9B 00 => 01 23 5B 42 // allow aes gid key usage
  +
0x3DEF8E: 40 42 => 00 20 // img3 signature check
  +
  +
// flag patches
  +
0x213638: 00 00 00 00 => 01 00 00 00 // setup_kmem flag
  +
  +
// arm patches
  +
0x3F908C: 00 40 A0 E3 => 01 40 A0 E3 // codesign check actual code patch
  +
0x3FCB40: FF 40 A0 E3 => 00 40 A0 E3
  +
</pre>

Revision as of 20:41, 17 June 2009

Decryption Keys

Root Filesystem

  • VFDecrypt: 8d5d1fea02d627c9e9b0d994c3cfdeaab9780c86ac908db15461efe44eddd19f8924b6b2

Update Ramdisk - 018-5303-002.dmg

  • Key: 5a0f82979f336baa58ed37926bd89dfe
  • IV: 0dc67d4f50ac62ee142b99baa569d0f4

Restore Ramdisk - 018-5305-002.dmg

  • Key: 9962589aabb4d5ec56b7a867ab5b11b0
  • IV: caca33f1aca029320d60873a4deed68d

DeviceTree

  • Key: 1852158326954e1379ee3aebe1d5c50c
  • IV: 5e6bca89f06c8dc4f3868fa4caba9d40

iBoot

  • Key: 4a8d6657297ca45cf6bec0854ee0a2e8
  • IV: 674a95015a8d33cd2f1f259ebe01aca7

  • Key: f9841fa3197f0bd9fd162ce170c5f6f9
  • IV: 30c0cb05ae49d0484392261b2c8b21a8

  • Key: 5a56972f4750335c448f3219269ed202
  • IV: 848d4cef8e4d8182c3f10062cf5347fe

Kernel

  • Key: 02418105dfb3be2af2a76248e026f702
  • IV : a4db9183cd79722b4146c9de09ab29c5

Patches

Putting this here for developers that would like to to utilize "extras" like /dev/kmem access, tfp0, etc.

Kernel

// thumb patches
0x08DE72: 8D 43 => 00 00               // w^x patch #1
0x090B6E: A2 43 => 00 00               // w^x patch #2
0x19B8BC: 0C D1 => 0C E0               // allow tfp0
0x381E22: FA 23 DB 00 => 01 23 5B 42   // allow aes uid key usage
0x381E34: FA 23 9B 00 => 01 23 5B 42   // allow aes gid key usage
0x3DEF8E: 40 42 => 00 20               // img3 signature check

// flag patches
0x213638: 00 00 00 00 => 01 00 00 00   // setup_kmem flag

// arm patches
0x3F908C: 00 40 A0 E3 => 01 40 A0 E3   // codesign check actual code patch
0x3FCB40: FF 40 A0 E3 => 00 40 A0 E3