SBL: Difference between revisions
CelesteBlue (talk | contribs) No edit summary |
CelesteBlue (talk | contribs) m (CelesteBlue moved page SBL Kernel module to SBL) |
||
(One intermediate revision by the same user not shown) | |||
Line 1: | Line 1: | ||
The SBL (that might stand for Secure Block) is a kernel device that handles security and cryptography. | The SBL (that might stand for Secure Block, as in PS Vita) device is a PS5 kernel device that handles security and cryptography. It can provides services through [[IOCTL]]. It contains the [[Secure Modules]]. | ||
The SBL device verifies and decrypts [[PUP]] files, and associated formats like watermarks through the pup_mgr Secure Module. | |||
It verifies and loads [[SELF]] and [[PRX]] executables, [[NPDRM]] packages and Debug packages through the auth_mgr_sm Secure Module. | |||
It is used to obtain Individual Data (i.e. per-console, per-account, etc.) through the individual_data_mgr Secure Module. It may also be related to VTRM. | |||
It manages the Manufacturing Mode through the manu_mode_mgr Secure Module. | |||
It also has a system interface for [[PFS]] keys and an interface for the ZLIB hardware system (/dev/sce_zlib) through the key_mgr or auth_mgr_sm Secure Modules. | |||
It contains the sm_service Secure Module that probably controls the load of other Secure Modules. | |||
These Secure Modules are usually loaded from the [[Serial Flash]], and the data they manage is also often stored encrypted on the [[Serial Flash]]. Reading the raw Serial FLash can be done by the icc [[IOCTL]] commands but obtaining decrypted content relies on SBL [[IOCTL]] commands. | |||
{{Reverse Engineering}} | {{Reverse Engineering}} | ||
<noinclude>[[Category:Main]]</noinclude> | <noinclude>[[Category:Main]]</noinclude> |
Latest revision as of 23:15, 27 October 2024
The SBL (that might stand for Secure Block, as in PS Vita) device is a PS5 kernel device that handles security and cryptography. It can provides services through IOCTL. It contains the Secure Modules.
The SBL device verifies and decrypts PUP files, and associated formats like watermarks through the pup_mgr Secure Module.
It verifies and loads SELF and PRX executables, NPDRM packages and Debug packages through the auth_mgr_sm Secure Module.
It is used to obtain Individual Data (i.e. per-console, per-account, etc.) through the individual_data_mgr Secure Module. It may also be related to VTRM.
It manages the Manufacturing Mode through the manu_mode_mgr Secure Module.
It also has a system interface for PFS keys and an interface for the ZLIB hardware system (/dev/sce_zlib) through the key_mgr or auth_mgr_sm Secure Modules.
It contains the sm_service Secure Module that probably controls the load of other Secure Modules.
These Secure Modules are usually loaded from the Serial Flash, and the data they manage is also often stored encrypted on the Serial Flash. Reading the raw Serial FLash can be done by the icc IOCTL commands but obtaining decrypted content relies on SBL IOCTL commands.
|