SceSblPostSsMgr

sceSblPostSsMgrInitializeSpfsoCtxForDriver
derived from _vshSblAuthMgrVerifySpsfo

sceSblPostSsMgrVerifySpfsoCtxForDriver
derived from _vshSblAuthMgrVerifySpsfo

sceSblPostSsMgrReleaseSpfsoCtxForDriver
derived from _vshSblAuthMgrVerifySpsfo

sceSblPostSsMgrGetExpireDateForDriver
get activation data exp date

sceSblPostSsMgrExecutePmSmF00dCommandForDriver
executes pm_sm.self commands 2,3,4,5,6,7,8,9,A

sceSblPostSsMgrExecutePmSmF00dCommandForDriver
executes pm_sm.self commands 2,3,4,5,6,7,8,9,A

sceSblPostSsMgrExecutePmSmF00dCommand8ForDriver
executes pm_sm.self command 8

sceSblPostSsMgrExecutePmSmSdF00dCommandForDriver
executes pm_sm_sd.self commands 9, A

sceSblPostSsMgrExecuteUtokenSmF00dCommand1ForDriver
executes utoken_sm command 1

sceSblPostSsMgrDecryptSealedkeyForDriver
is 0x50 bytes of data from sealedkey

this function:

verifies pfsSKKey header

decrypts aes_key(pfsSKKey__EncKey) and hmac_key(pfsSKKey__Secret) using sceSblSsMgrEncryptWithPortabilityForDriver

verifies hmac256 value in

decrypts  into

sceSblPostSsMgrEncryptSealedkeyForDriver
is 0x50 bytes of data like in sealedkey

this function:

writes pfsSKKey header

decrypts aes_key(pfsSKKey__EncKey) and hmac_key(pfsSKKey__Secret) using sceSblSsMgrEncryptWithPortabilityForDriver

randomly generates 0x10 bytes of IV with sceSblSsMgrGetRandomNumberForDriver

randomly generates 0x10 bytes of secret with sceSblSsMgrGetRandomNumberForDriver

encrypts the secret into

calculates hmac256 value into

sceSblPostSsMgrVerifyKeystoneForDriver
This function verifies magic in the header and HMAC of the keystone file

sceSblPostSsMgrVerifyKeystoneWithPasscodeForDriver
This function calls sceSblPostSsMgrVerifyKeystoneForDriver. Then also verifies HMAC of passcode.

SceSblLicMgr
Functions related to afv file