Line 281:
Line 281:
! Handle
! Handle
! Type
! Type
+
! Owner
! Description
! Description
|-
|-
| 0x00
| 0x00
| ECC-B233
| ECC-B233
+
| IOS-MCP
| IOSC_DEV_SIGNING_KEY_HANDLE
| IOSC_DEV_SIGNING_KEY_HANDLE
Wii U device private key.
Wii U device private key.
Line 290:
Line 292:
| 0x01
| 0x01
| NONE
| NONE
+
| ALL
| IOSC_DEV_ID_HANDLE
| IOSC_DEV_ID_HANDLE
Wii U device ID.
Wii U device ID.
Line 295:
Line 298:
| 0x02
| 0x02
| AES-128
| AES-128
+
| IOS-FS
| IOSC_FS_ENC_HANDLE
| IOSC_FS_ENC_HANDLE
SLC NAND key.
SLC NAND key.
Line 300:
Line 304:
| 0x03
| 0x03
| HMAC-SHA-1
| HMAC-SHA-1
+
| IOS-FS
| IOSC_FS_MAC_HANDLE
| IOSC_FS_MAC_HANDLE
SLC NAND HMAC key.
SLC NAND HMAC key.
Line 305:
Line 310:
| 0x04
| 0x04
| AES-128
| AES-128
+
| IOS-MCP
| IOSC_COMMON_ENC_HANDLE
| IOSC_COMMON_ENC_HANDLE
Wii common key.
Wii common key.
Line 310:
Line 316:
| 0x05
| 0x05
| AES-128
| AES-128
+
| IOS-MCP
| IOSC_BACKUP_ENC_HANDLE
| IOSC_BACKUP_ENC_HANDLE
Wii U backup key.
Wii U backup key.
Line 316:
Line 323:
| 0x06
| 0x06
| AES-128
| AES-128
+
| ALL
| IOSC_APP_ENC_HANDLE
| IOSC_APP_ENC_HANDLE
Wii SD key.
Wii SD key.
Line 321:
Line 329:
| 0x07
| 0x07
| AES-128
| AES-128
+
| IOS-MCP
| IOSC_BOOTOSVER_ENC_HANDLE
| IOSC_BOOTOSVER_ENC_HANDLE
SEEPROM key.
SEEPROM key.
|-
|-
| 0x08
| 0x08
+
| NONE
| NONE
| NONE
| IOSC_CACRLVER_HANDLE
| IOSC_CACRLVER_HANDLE
Line 330:
Line 340:
|-
|-
| 0x09
| 0x09
+
| NONE
| NONE
| NONE
| IOSC_SIGNERCRLVER_HANDLE
| IOSC_SIGNERCRLVER_HANDLE
Line 335:
Line 346:
|-
|-
| 0x0A
| 0x0A
+
| NONE
| NONE
| NONE
| IOSC_FSVER_HANDLE
| IOSC_FSVER_HANDLE
Line 341:
Line 353:
| 0x0B
| 0x0B
| AES-128
| AES-128
+
| IOS-MCP
| IOSC_COMMON2_ENC_HANDLE
| IOSC_COMMON2_ENC_HANDLE
Wii common2 key.
Wii common2 key.
Line 346:
Line 359:
| 0x0C
| 0x0C
| AES-128
| AES-128
+
| IOS-FS
| Drive key
| Drive key
|-
|-
| 0x0D
| 0x0D
| AES-128
| AES-128
+
| IOS-MCP
| Starbuck [[Ancast_Image|ancast]] key
| Starbuck [[Ancast_Image|ancast]] key
|-
|-
| 0x0E
| 0x0E
| RSA-2048
| RSA-2048
+
| IOS-MCP
| Starbuck [[Ancast_Image|ancast]] modulus
| Starbuck [[Ancast_Image|ancast]] modulus
|-
|-
| 0x0F
| 0x0F
| RSA-2048
| RSA-2048
+
| IOS-MCP
| Boot1 [[Ancast_Image|ancast]] modulus
| Boot1 [[Ancast_Image|ancast]] modulus
|-
|-
| 0x10
| 0x10
| AES-128
| AES-128
+
| IOS-MCP
| Wii U common key
| Wii U common key
|-
|-
| 0x11
| 0x11
| AES-128
| AES-128
+
| IOS-FS
| MLC NAND key
| MLC NAND key
|-
|-
| 0x12
| 0x12
| AES-128
| AES-128
+
| IOS-MCP
+
IOS-FS
| STRM key
| STRM key
Generated by ECB-encrypting the IVS seed from SEEPROM with the IVS key from the OTP.
Generated by ECB-encrypting the IVS seed from SEEPROM with the IVS key from the OTP.
Line 376:
Line 397:
| 0x13
| 0x13
| AES-128
| AES-128
+
| IOS-FS
| SLCCMPT NAND key
| SLCCMPT NAND key
|-
|-
| 0x14
| 0x14
| HMAC-SHA-1
| HMAC-SHA-1
+
| IOS-FS
| SLCCMPT NAND HMAC key
| SLCCMPT NAND HMAC key
|-
|-
| 0x15
| 0x15
| AES-128
| AES-128
+
| IOS-MCP
| vWii common key
| vWii common key
|-
|-
| 0x16
| 0x16
| AES-128
| AES-128
+
| IOS-PAD
| DRH WLAN data key
| DRH WLAN data key
|-
|-
| 0x17
| 0x17
| AES-128
| AES-128
+
| IOS-NET
| UDS local-WLAN CCMP key
| UDS local-WLAN CCMP key
Generated by XORing the XOR key with static data inside IOS-CRYPTO.
Generated by XORing the XOR key with static data inside IOS-CRYPTO.
−
Used by IOS-NET and shared with the 3DS.
+
Shared with the 3DS.
|-
|-
| 0x18
| 0x18
| AES-128
| AES-128
+
| IOS-NET
| DLP key
| DLP key
Generated by XORing the XOR key with static data inside IOS-CRYPTO.
Generated by XORing the XOR key with static data inside IOS-CRYPTO.
−
Used by IOS-NET and shared with the 3DS.
+
Shared with the 3DS.
|-
|-
| 0x19
| 0x19
| AES-128
| AES-128
+
| ALL
| APT wrap key
| APT wrap key
Generated by XORing the XOR key with static data inside IOS-CRYPTO.
Generated by XORing the XOR key with static data inside IOS-CRYPTO.
−
Used by IOS-ACP and shared with the 3DS.
+
Shared with the 3DS.
|-
|-
| 0x1A
| 0x1A
| AES-128
| AES-128
−
| Unknown
+
| IOS-FS
+
| Wii media title key
|-
|-
| 0x1B
| 0x1B
| AES-128
| AES-128
+
| IOS-NSEC
| SSL RSA key encryption key
| SSL RSA key encryption key
|-
|-
| 0x1C
| 0x1C
| ECC-B233
| ECC-B233
−
| Wii U NSS device certificate private key
+
| IOS-NSEC
+
| Wii U device unique certificate private key
|-
|-
| 0x1D
| 0x1D
| ECC-B233
| ECC-B233
−
| Wii NSS device certificate private key
+
| IOS-NSEC
+
| Wii U device authentication common certificate private key
|-
|-
| 0x1E
| 0x1E
| AES-128
| AES-128
+
| IOS-NSEC
| APPSTORE objinfo/objdata key
| APPSTORE objinfo/objdata key
−
Generated by copying the first 0x10 bytes of the Wii U NSS device certificate private key.
+
Generated by copying the first 0x10 bytes of the Wii U device unique certificate private key.
−
Used by IOS-NSEC.
|-
|-
| 0x1F
| 0x1F
| AES-128
| AES-128
+
| IOS-NIM-BOSS
| SpotPass data file key
| SpotPass data file key
Generated by XORing the XOR key with static data inside IOS-CRYPTO.
Generated by XORing the XOR key with static data inside IOS-CRYPTO.
−
Used by IOS-NIM-BOSS.
|-
|-
| 0x20
| 0x20
| HMAC-SHA-256
| HMAC-SHA-256
+
| IOS-NIM-BOSS
| SpotPass data file HMAC key
| SpotPass data file HMAC key
Generated by XORing the XOR key with static data inside IOS-CRYPTO.
Generated by XORing the XOR key with static data inside IOS-CRYPTO.
−
Used by IOS-NIM-BOSS.
|-
|-
| 0x21
| 0x21
| HMAC-SHA-256
| HMAC-SHA-256
+
| IOS-NIM-BOSS
| VersionList HMAC key
| VersionList HMAC key
Generated by XORing the XOR key with static data inside IOS-CRYPTO.
Generated by XORing the XOR key with static data inside IOS-CRYPTO.
−
Used by IOS-NIM-BOSS.
|-
|-
| 0x22
| 0x22
| HMAC-SHA-256
| HMAC-SHA-256
+
| IOS-PAD
| Amiibo HMAC key 1
| Amiibo HMAC key 1
Generated by XORing the XOR key with static data inside IOS-CRYPTO.
Generated by XORing the XOR key with static data inside IOS-CRYPTO.
−
Used by IOS-PAD.
|-
|-
| 0x23
| 0x23
| HMAC-SHA-256
| HMAC-SHA-256
+
| IOS-PAD
| Amiibo HMAC key 2
| Amiibo HMAC key 2
Generated by XORing the XOR key with static data inside IOS-CRYPTO.
Generated by XORing the XOR key with static data inside IOS-CRYPTO.
−
Used by IOS-PAD.
|-
|-
| 0x24
| 0x24
| AES-128
| AES-128
+
| IOS-PAD
| NFC key
| NFC key
Generated by XORing the XOR key with static data inside IOS-CRYPTO.
Generated by XORing the XOR key with static data inside IOS-CRYPTO.
−
Used by IOS-PAD and shared with the 3DS.
|-
|-
| 0x25
| 0x25
| AES-128
| AES-128
+
| IOS-PAD
| Wii U NFC key block key
| Wii U NFC key block key
Generated by XORing the XOR key with static data inside IOS-CRYPTO.
Generated by XORing the XOR key with static data inside IOS-CRYPTO.
−
Used by IOS-PAD to decrypt the Wii U specific "unfixed infos" and "locked secret" keys.
+
Used for decrypting the Wii U specific "unfixed infos" and "locked secret" keys.
|-
|-
| 0x26
| 0x26
| AES-128
| AES-128
+
| IOS-FS
| Unknown
| Unknown
Generated by XORing the XOR key with static data inside IOS-CRYPTO.
Generated by XORing the XOR key with static data inside IOS-CRYPTO.
Line 479:
Line 513:
| 0x27
| 0x27
| AES-128
| AES-128
+
| IOS-NIM-BOSS
| Pushmore link key
| Pushmore link key
Generated by XORing the XOR key with static data inside IOS-CRYPTO
Generated by XORing the XOR key with static data inside IOS-CRYPTO
−
Used by IOS-NIM-BOSS.
|-
|-
| 0x28
| 0x28
| AES-128
| AES-128
+
| IOS-FS
| SHDD key
| SHDD key
This key is only set for board types IH or ID.
This key is only set for board types IH or ID.
If the ShddConfig flag in SEEPROM is 0x0000 and the system is a development unit, it is the same as the MLC NAND key.
If the ShddConfig flag in SEEPROM is 0x0000 and the system is a development unit, it is the same as the MLC NAND key.
If the ShddConfig flag in SEEPROM is 0xFFFF, it is generated by decrypting the SHDD seed from SEEPROM with the SHDD key from eFuses.
If the ShddConfig flag in SEEPROM is 0xFFFF, it is generated by decrypting the SHDD seed from SEEPROM with the SHDD key from eFuses.
−
Used by IOS-FS.
|-
|-
| 0x29-0x40
| 0x29-0x40
+
| NONE
| NONE
| NONE
| Unused
| Unused
|}
|}