Module
Known NIDs
Version |
Name |
World |
Privilege |
NID
|
1.69 |
SceSblGcAuthMgr |
Non-secure |
Kernel |
0x4B777EBC
|
Libraries
Known NIDs
SceSblGcAuthMgrDrmBBForDriver
SceSblGcAuthMgrPcactForDriver
SceSblGcAuthMgrMlnpsnlForDriver
SceSblGcAuthMgrAdhocBBForDriver
SceSblGcAuthMgrPkgForDriver
SceSblGcAuthMgrSclkForDriver
SceSblGcAuthMgrGcAuthForDriver
initialize_sd_device
Version |
NID
|
3.60 |
0x68781760
|
This is a wrapper function that starts initialization subroutine through run_execlusive
int initialize_sd_device(int sd_ctx_index);
SceSblGcAuthMgr
_sceSblGcAuthMgrPcactActivation
Version |
NID
|
1.69 |
0x32E7CEA
|
_sceSblGcAuthMgrGetMediaIdType01
Version |
NID
|
1.69 |
0xAC64154
|
_sceSblGcAuthMgrAdhocBB224Auth1
Version |
NID
|
1.69 |
0x307FD67C
|
_sceSblGcAuthMgrPkgVry
Version |
NID
|
1.69 |
0x3E168BC4
|
_sceSblGcAuthMgrAdhocBB224Auth5
Version |
NID
|
1.69 |
0x459F5503
|
_sceSblGcAuthMgrAdhocBB224Init
Version |
NID
|
1.69 |
0x5AB126A7
|
_sceSblGcAuthMgrAdhocBB224Auth4
Version |
NID
|
1.69 |
0x5CCC216C
|
_sceSblGcAuthMgrAdhocBB224Auth2
Version |
NID
|
1.69 |
0x788C0517
|
_sceSblGcAuthMgrSclkSetData2
Version |
NID
|
1.69 |
0x837D0FB6
|
_sceSblGcAuthMgrSclkGetData1
Version |
NID
|
1.69 |
0x8A3AF1E8
|
_sceSblGcAuthMgrAdhocBB224Shutdown
Version |
NID
|
1.69 |
0x8ECEACF9
|
_sceSblGcAuthMgrPcactGetChallenge
Version |
NID
|
1.69 |
0x98153286
|
_sceSblGcAuthMgrAdhocBB224GetKeys
Version |
NID
|
1.69 |
0xC236FB28
|
_sceSblGcAuthMgrAdhocBB224Auth3
Version |
NID
|
1.69 |
0xD3F95259
|
gcauth_sm "KIRK" calls to F00D
The use of os0:sm/gcauthmgr_sm.self is to support the next generation of KIRK. It uses a similar input structure to the original KIRK on the PSP.
PSP support
4,7,0xC,0xD,0xE, 0x10, 0x11, 0x12 are the classic PSP KIRK Services supported by gcauth_sm.
New PSVita Codes
0x14-0x19, 0x1b-0x23 are the new KIRK Services supported by gcauth_sm.
0x14 is the 224bit ecdsa keypair gen. The only input is an empty buffer size (3*0x1C) it returns 3 values. Private key, Public X point, Public Y point. Each value is 0x1C bytes long.
0x16 is random 224bit generator. It will return 0x1C bytes of random data into the buffer.
0x17 -0x19 are the 224bit ecdsa versions of psp's 160bit 0x10-0x12