SceSblAuthMgr

From Vita Development Wiki
Jump to: navigation, search

Module

Known NIDs

Version Name World Privilege NID
1.69 SceSblAuthMgr Non-secure Kernel 0xEA5DFC93

Libraries

Known NIDs

Version Name World Visibility NID
1.69 SceSblAuthMgrForKernel Non-secure Kernel 0x7ABF5135
3.60 SceSblAuthMgrForKernel Non-secure Kernel 0x7ABF5135
1.69 SceSblAuthMgrForDriver Non-secure Kernel 0x4EB2B1BB
3.60 SceSblAuthMgrForDriver Non-secure Kernel 0x4EB2B1BB

SceSblAuthMgrForKernel

These functions are used for SELF decryption.

sceSblAuthMgrSmStartForKernel

Version NID
3.60 0xA9CD2A09
// if initialization is successful - ctx will be initialized to 1
int sceSblAuthMgrSmStartForKernel(int* ctx);

sceSblAuthMgrSmFinalizeForKernel

Version NID
3.60 0x026ACBAD

Issued F00D command -1

// ctx - obtained with sceSblAuthMgrSmStartForKernel. Should equal 1 for successful deinit.
int sceSblAuthMgrSmFinalizeForKernel(int ctx);

sceSblAuthMgrAuthHeaderForKernel

Version NID
3.60 0xF3411881

Issues F00D command 0x10001

SceSblSmCommContext130 type is defined in SceKernelModulemgr.

Read header and get program_authority_id at offset 0x80. Then writes program_authority_id to (context_130->self_auth_info).program_authority_id.

Get capability and attribute (from where ????) and writes them to context_130->self_auth_info.

//ctx - obtained with sceSblAuthMgrSmStartForKernel
int sceSblAuthMgrAuthHeaderForKernel(int ctx, char *header, int header_size, SceSblSmCommContext130 *context_130);

sceSblAuthMgrLoadSelfSegmentForKernel

Version NID
3.60 0x89CCDA2C

Issues F00D command 0x20001

// ctx - obtained with sceSblAuthMgrSmStartForKernel
int sceSblAuthMgrLoadSelfSegmentForKernel(int ctx, int segment_number, int segment_size, void output_buffer, int program_size);

sceSblAuthMgrLoadSelfBlockForKernel

Version NID
3.60 0xBC422443

Issues F00D command 0x30001

// ctx - obtained with sceSblAuthMgrSmStartForKernel
int sceSblAuthMgrLoadSelfBlockForKernel(int ctx, char *buffer, int offset);

sceSblAuthMgrSetDmac5KeyForKernel

Version NID
1.05 0x122acdea
3.60 0x122acdea

Issues F00D command 0x50001

// key_size - in bytes
int sceSblAuthMgrSetDmac5KeyForKernel(char *key, int key_size, int slot_id, short key_id);

sceSblAuthMgrClearDmac5KeyForKernel

Version NID
1.05 0xf2bb723e
3.60 0xf2bb723e

Issues F00D command 0x60001

int sceSblAuthMgrClearDmac5KeyForKernel(int unk0, int unk1);

sceSblAuthMgrReturnZeroForKernel

Version NID
3.60 0x2A83A012

Returns 0.

sceSblAuthMgrCompareSwVersionForKernel

Version NID
3.60 0xABAB8466

Aligns version on 12 bits then compares to the hardcoded current firmware version (example: 0x03600000 or 0x03650000).

int sceSblAuthMgrCompareSwVersionForKernel(int version);

SceSblAuthMgrForDriver

sceSblAuthMgrGetEKcForDriver

Version NID
1.05 0x868b9e9a
3.60 0x868b9e9a

EKc = Encrypted Key License (also called klicensee)

Issues F00D command 0x40001

int sceSblAuthMgrGetEKcForDriver(void* data, int size, short key_id);

sceSblAuthMgrDecBindDataForDriver

Version NID
1.05 0x41daea12
3.60 0x41daea12

Issues F00D command 0x70001

// request should contain pair of keys and rif data

int sceSblAuthMgrDecBindDataForDriver(char* klicensee, int klicensee_len, char* request, int request_len, int zero);

sceSblAuthMgrVerifySpfsoCtxForDriver

Version NID
3.60 0x24C4CE64

Used by sceSblPostSsMgrVerifySpfsoCtxForDriver

Issues F00D command 0x80001

int sceSblAuthMgrVerifySpfsoCtxForDriver(spsfo_ctx *ctx);