SceSblSsMgr

sceSblSsMgrGetSysconDataForKernel
for example gets 0x20 bytes of data for act_sm.self command 0x4 call.

this is done by passing offset 0x520 as first argument.

sceSblSsMgrGetBootTypeIndicatorBit2ForKernel
directly calls scePmGetBootTypeIndicatorBit2

SceSblSsMgrForDriver
Cryptographic functions in this module typically have 3 variations Note that in this case your select a key from F00D by key_id. It will be encrypted by F00D and placed into slot selected by slot_id. In this case key from F00D is selected by key_id and encrypted by F00D. It is then placed into one of the slots. Default range is 0xC-0x17.
 * Use  - meaning that the key that you provide is used directly for encryption/decryption
 * Use  - meaning that you have to use sceSblAuthMgrSetDmac5Key function to set the key in specific slot.
 * Use  - meaning that call to sceSblAuthMgrSetDmac5Key will happen internally.

sceSblSsMgrGetRandomDataForDriver
Generates random data of length 0x40 by executing Dmac5 command 0x04

used in SceKrm, SceSblGcAuthMgr

sceSblSsMgrGetRandomDataCropForDriver
Generates random data of length 0x40 by executing Dmac5 command 0x04

Data is then cropped to fit the size in outputBuffer.

used by SceMsif

sceSblSsMgrAESECBEncryptForDriver
Executes Dmac5 command 0x1

used in ScePfsMgr

sceSblSsMgrAESECBDecryptForDriver
Executes Dmac5 command 0x02

used ScePfsMgr

sceSblSsMgrAESECBEncryptForDriver
Executes Dmac5 command 0x01

used in SceSblMgKeyMgr

sceSblSsMgrAESECBDecryptForDriver
Executes Dmac5 command 0x02

used by SceSblMgKeyMgr

sceSblSsMgrAESECBEncryptWithKeygenForDriver
Executes Dmac5 command 0x01

used in ScePfsMgr

sceSblSsMgrAESECBDecryptWithKeygenForDriver
Executes Dmac5 command 0x02

no usages found

sceSblSsMgrDES64ECBEncryptForDriver
Executes Dmac5 command 0x41

used in SceMsif, SceSblMgKeyMgr

sceSblSsMgrDES64ECBDecryptForDriver
Executes Dmac5 command 0x42

used in SceSblMgKeyMgr

sceSblSsMgrDES64CBCEncryptForDriver
Executes Dmac5 command 0x49

no usages found

sceSblSsMgrDES64CBCDecryptForDriver
Executes Dmac5 command 0x4A

no usages found

sceSblSsMgrAESCBCEncryptForDriver
Executes Dmac5 command 0x09

used by ScePfsMgr

sceSblSsMgrAESCBCDecryptForDriver
Executes Dmac5 command 0x0A

used by ScePfsMgr

sceSblSsMgrAESCBCEncryptWithKeygenForDriver
Executes Dmac5 command 0x09

used by ScePfsMgr

sceSblSsMgrAESCBCDecryptWithKeygenForDriver
Executes Dmac5 command 0x0A

used by ScePfsMgr

sceSblSsMgrAESCTREncryptForDriver
Executes Dmac5 command 0x21

used by SceNpDrm

this function can also be used for decryption since CTR is symmetric function

sceSblSsMgrAESCTRDecryptForDriver
Executes Dmac5 command 0x22

no usages found

this function can also be used for encryption since CTR is symmetric function

sceSblSsMgrSHA1ForDriver
Executes Dmac5 command 0x03

used by ScePfsMgr

key_size is always 0x100 bits

sceSblSsMgrHMACSHA1ForDriver
Executes Dmac5 command 0x23

used by ScePfsMgr

key_size is always 0x100 bits

sceSblSsMgrHMACSHA1WithKeygenForDriver
Executes Dmac5 command 0x23

no usages found

key_size is always 0x100 bits

sceSblSsMgrHMACSHA256ForDriver
Executes Dmac5 command 0x33

no usages found

sceSblSsMgrAESCMACForDriver
Executes Dmac5 command 0x3B

used in ScePfsMgr

sceSblSsMgrAESCMACWithKeygenForDriver
Executes Dmac5 command 0x3B

used in ScePfsMgr

sceSblSsMgrAESCMACForDriver
Executes Dmac5 command 0x3B

no usages found

sceSblSsMgrExecuteDmac5HashCommandForDriver
Executes Dmac5 commands related to hashe functions

used by SceNpDrm

sceSblSsMgrGetConsoleIdForDriver
This function obtains ConsoleId by executing aimgr_sm.self F00D command 0x1

sceSblSsMgrGetOpenPsIdForDriver
This function returns information from a static buffer that is initialized on module_start.

Data is obtained from sysroot buffer at offset 0x70.

Sysroot buffer pointer is obtained by calling ksceKernelGetSysrootBuffer

sceSblSsMgrEncryptWithPortabilityForDriver
derived from

strangely enough does not use communication with F00D through command 0x1000A from encdec_w_portability_sm.self

sceSblSsMgrDecryptWithPortabilityForDriver
derived from

decrypts or derives aes key that is used in msif to decrypt static sha224 table

communication with F00D is done with command 0x2000A from encdec_w_portability_sm.self

sceSblSsMgrGetVisibleId
executes F00D aimgr_sm.self command 0x3

derived from

previously was named

sceSblSsMgrGetNvsDataForDriver
derived from

uses syscon function to get the data

sceSblSsMgrSetNvsDataForDriver
derived from

uses syscon function to set the data

sceSblSsMgrGetPscodeForDriver
derived from

sceSblSsMgrGetPscode2ForDriver
executes F00D aimgr_sm.self command 0x4

derived from

sceSblSsMgrCreatePassPhraseForDriver
executes F00D aimgr_sm.self command 0x5

derived from

unk_e0b13ba7
Used by SceSblUpdateMgr - does some initialization

unk_c38d0cea
Used by SceSblUpdateMgr - does some cleanup

unk_cd98cc92
Used by SceSblPostSsMgr - looks like some wait/sync function

sceSblDmac5HashTransform
This function can execute the following dmac5 commands:
 * 0x3B: CMAC-AES (length 0x10)
 * 0x3: SHA1 (length 0x14)
 * 0x23: HMAC-SHA1 (length 0x14)
 * 0x13: SHA256 (length 0x20)
 * 0x33: HMAC-SHA256 (length 0x20)

sceSblDmac5EncDecKeyGen
This function is also called  or   in

sceSblDmac5HmacKeyGen
This function is also called  in