20
FLASH MEMORY STRUCTURE (FLASH0)
122
20
Flash Memory Structure (flash0)
/DATA
/CERT
/DIC
/FONT
/KD
/RESOURCE
/VSH
/ETC
/MODULE
/RESOURCE
20.1
DATA Subdirectory
20.1.1
CERT Subdirectory
Contains lots of certificates. They are ordinal base64 encoded certificate, not encrypted.
Class1_PCA_G2_v2.cer
1122
SHA1/RSA1024
VeriSign
*1
Class1_PCA_G3v2.cer
1508
SHA1/RSA2048
VeriSign
*1
Class1_PCA_ss_v4.cer
854
MD2 /RSA1024
VeriSign
*1
Class2_PCA_G2_v2.cer
1126
SHA1/RSA1024
VeriSign
*1
Class2_PCA_G3v2.cer
1504
SHA1/RSA2048
VeriSign
*1
Class2_PCA_ss_v4.cer
848
MD2 /RSA1024
VeriSign
*1
Class3_PCA_G2_v2.cer
1122
SHA1/RSA1024
VeriSign
*1
Class3_PCA_G3v2.cer
1508
SHA1/RSA2048
VeriSign
*1
Class3_PCA_ss_v4.cer
848
MD2 /RSA1024
VeriSign
*1
Class4_PCA_G2_v2.cer
1122
SHA1/RSA1024
VeriSign
*1
Class4_PCA_G3v2.cer
1508
SHA1/RSA2048
VeriSign
*1
RSA1024_v1.cer
1066
SHA1/RSA1024
ValiCert
*2
RSA2048_v3.cer
1233
SHA1/RSA2048
RSA Security
*2
RSA_SecureServer.cer
840
MD2 /RSA1024
RSA Data Security
*2
SCE_CA01.cer
1387
SHA1/RSA2048
SCEI
*3
SCE_CA02.cer
1387
SHA1/RSA2048
SCEI
*3
SCE_CA03.cer
1387
SHA1/RSA2048
SCEI
*3
SCE_CA04.cer
1387
SHA1/RSA2048
SCEI
*3
SCE_CA05.cer
1387
SHA1/RSA2048
SCEI
*3
VeriSign_TSA_CA.cer
1402
SHA1/RSA1024
VeriSign, Time Stamping Authority
*4
1) These are relating to ’Primary Certificate Authority’ certificates from VeriSign. They have specific groups that monitor and cer-
tify Certificate Authorities, providing direct trust to CA certificates. These form the root of the trust network for signed code. Pretty
much every Windows machine has these for use in Internet Explorer and the like.
2) These are related to the BSAFE technology RSA Security provides. They are likely used for the wireless communications, as BSAFE
has wireless security software packages aimed at systems like ARM for things like SSL over WiFi (sound familiar?). I don’t know if
they are linked through Verisign’s PCAs or form their own root. It would make more sense if they were signed by either Verisign’s
PCAs or by one of Sony’s CAs.
3) A series of certificates in Sony’s control, very likely signed by the PCA certificates mentioned above. These are probably used to
sign code certificates for developers, and those certificates are included with the games themselves. So code signatures are done by the
developer, while encryption is done by Sony. The trust can still be verified by checking the signed game certificate, seeing that it belongs
to SCE_CA0x, and then seeing /that/ belongs to Verisign, which is the root trust node.
4)Says exactly what it is on the tin, used to time-stamp things in such a way that it cannot be spoofed. (i.e, Verisign encrypts the time
stamp of a signing with their private key, allowing everyone to verify the time stamp, but nobody can make a different time stamp that
can be verified correctly without VeriSign’s key)
Summary of Contents for PlayStationPortable
Page 114: ...12 AUDIO PROCESSING 114 12 Audio Processing 12 1 Overview 44100 Hz Sample Frequency ...
Page 116: ...14 WLAN 116 14 WLAN ...
Page 117: ...15 USB PORT 117 15 USB Port ...
Page 118: ...16 UMD 118 16 UMD ...
Page 119: ...17 MEMORY STICK 119 17 Memory Stick ...
Page 128: ...21 FLASH MEMORY STRUCTURE FLASH1 128 21 Flash Memory Structure flash1 DIC REGISTRY VSH THEME ...
Page 141: ...28 IPL 141 28 IPL ...