In memory of Ben “bushing” Byer, who passed away on Monday, February 8th, 2016.

Changes

Jump to navigation Jump to search
7 bytes added ,  00:17, 16 May 2023
no edit summary
Line 260: Line 260:     
==Key object handles==
 
==Key object handles==
The above crypto commands use key/crypto object handles. These handles can be either from IOSC_CreateObject(which can then be initialized with IOSC_ImportSecretKey in the case of AES), or a built-in handle. The available built-in handles/ids are listed below.
+
The above crypto commands use key/crypto object handles. These handles can be either from IOSC_CreateObject (which can then be initialized with IOSC_ImportSecretKey in the case of AES), or a built-in handle. The available built-in handles/ids are listed below.
    
The maximum number of keyobject-handles is 0x80, hence the highest valid keyobject-handle is 0x7F. Keyobject-handles <=0x40 are reserved for built-in handles, the rest are available for user-processes. Commands which write keyobjects' keydata are only allowed to use handles with value >0x40 (user-process handles).
 
The maximum number of keyobject-handles is 0x80, hence the highest valid keyobject-handle is 0x7F. Keyobject-handles <=0x40 are reserved for built-in handles, the rest are available for user-processes. Commands which write keyobjects' keydata are only allowed to use handles with value >0x40 (user-process handles).
Line 291: Line 291:  
| 0x05
 
| 0x05
 
| AES-128
 
| AES-128
| IOSC_BACKUP_ENC_HANDLE (Backup key)
+
| IOSC_BACKUP_ENC_HANDLE (Wii U backup key)
 
  Used by commands 0x15, 0x16, 0x17 and 0x18.
 
  Used by commands 0x15, 0x16, 0x17 and 0x18.
 
|-
 
|-

Navigation menu