Search results

Jump to navigation Jump to search

Page title matches

Page text matches

  • ...processor. By convention, a finalized SM filename ends with "_sm.self". A SM is usually unloadable and is only loaded when one of its exported functions ...a common handler for incoming commands (cmd_handler). Then it loops while sm is "active". Then it sets handler for commands = null pointer.
    3 KB (398 words) - 19:17, 20 September 2023
  • SceUInt32 self_type; // kernel = 0, user = 1, SM = 2, 0x10, 0x100, ?0x10001 main user process? Priority is binary: 1 = low, 0 = high. Running a high priority SM while a low priority one is currently running will [[CMeP#Protocol|suspend]
    9 KB (1,030 words) - 15:37, 27 August 2023
  • | 1.03-3.74 || [[update_service_sm]] || 0x2E00000000000004 || os0:sm/update_service_sm.self || Installed on release | 1.03-3.74 || [[qaf_sm]] || 0x2E00000000000005 || os0:sm/qaf_sm.self || Installed on release
    37 KB (4,005 words) - 15:48, 8 December 2023
  • ...sm.self, kernel PRX keys are located in kprx_auth_sm.self, Secure Modules (SM) as well as kernel_boot_loader.self, are located in secure_kernel.enp).
    15 KB (1,467 words) - 22:09, 1 May 2023
  • ...header and the AES256-CBC session key. This key is set through [[Kprx auth sm|kprx_auth_sm]] using [[Secure_Modules_Functions#0x50001_-_sceSblAuthMgrSetD
    3 KB (510 words) - 08:13, 17 July 2023
  • 4 = SM loading 5 = SM loaded
    34 KB (5,112 words) - 18:25, 17 September 2023
  • Sony can revoke most keys by updating slb2:prog_rvk.srvk, keys in SM SELFs, ENC files keys, etc... But SPKG key cannot be changed else older and
    6 KB (1,004 words) - 08:27, 4 August 2023
  • 0x102 = Sm can be loaded/resumed 0x103 = Sm resumed successfully
    18 KB (2,382 words) - 02:14, 27 October 2023
  • | 98 || level or self_type || SM || ...0x42 || For usermode self_type, requires QA flag 0xD mask 2. For kernel or SM self_type, requires QA flag 0xE mask 1.
    41 KB (4,460 words) - 18:17, 25 March 2024
  • #define SCE_CACHED_SECURE_MODULE_GCAUTHMGR 0 // os0:sm/gcauthmgr_sm.self #define SCE_CACHED_SECURE_MODULE_RMAUTH 1 // os0:sm/rmauth_sm.self
    68 KB (8,827 words) - 19:22, 13 February 2024
  • | Command return value is written here by the SM [[Kprx auth sm]] is a special SM stored in the [[SLB2]] partition. The raw (encrypted) SELF is stored in ARM
    53 KB (7,975 words) - 21:55, 10 January 2024
  • ...rotection). However, keyslot 0x8 allows encryption, leaving Update Manager SM add personalization layer during firmware update without having to derive t
    8 KB (1,251 words) - 23:45, 16 July 2023
  • | 0x19BC || 0x4 || SM communication ID (obtained with sceSblSmCommStartSm)
    11 KB (1,442 words) - 22:22, 8 June 2023
  • | Allow to bypass absent Media Type 7 (host0:) in SELF attribute for Kernel/SM SELF. | Allow Remote SM Loading (host0:), Allow Remote Spfso Auth (host0:), Allow Remote FwLoader p
    33 KB (4,849 words) - 19:57, 30 March 2024
  • The use of os0:sm/gcauthmgr_sm.self is to support the new generation of Kirk. It uses a simil
    27 KB (3,421 words) - 21:04, 21 January 2024
  • ...00A|encdec_w_portability_sm command 0x1000A]]. That is because anyway this SM command is not implemented in release System Software.
    51 KB (5,969 words) - 08:22, 15 August 2023
  • ..._type</code> to 1 if decrypting a usermode module else 0 for kernel (2 for SM but maybe not allowed).
    91 KB (11,099 words) - 06:25, 11 November 2023
  • ! Index !! SM SELF location | 0 || os0:sm/gcauthmgr_sm.self
    348 KB (38,144 words) - 05:11, 14 March 2024

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)