Fix typos and re-arrange content
parent
b718fcc80d
commit
64980d8345
1 changed files with 29 additions and 33 deletions
60
AES-Keys.md
60
AES-Keys.md
|
@ -1,6 +1,33 @@
|
||||||
Users can provide some additional crypto keys to enable some advanced features in citra. These keys are not officially provided by citra due to legal considerations.
|
Users can provide some additional crypto keys to enable some advanced features in citra. These keys are not officially provided by citra due to legal considerations.
|
||||||
|
# Instructions to obtain AES Keys
|
||||||
|
|
||||||
The keys are supplied by filling the file `sysdata/aes_keys.txt` (located in the [[User Directory]]) in the following format:
|
### Method 1
|
||||||
|
In this method, you will need to dump your bootrom, native_firm & secret section(for n3ds) from your console.
|
||||||
|
|
||||||
|
**Note:** You will still need to provide the `0x25 KeyX` using Method 2.
|
||||||
|
|
||||||
|
**Step 1** - bootrom
|
||||||
|
|
||||||
|
The bootrom boot9.bin can be dumped with Godmode9:
|
||||||
|
|
||||||
|
```
|
||||||
|
go to drive M: Memory Virtual
|
||||||
|
navigate to boot9.bin, press A
|
||||||
|
Select Copy to O:/gm9out
|
||||||
|
=> This will give you boot9.bin in gm9out on your SD card
|
||||||
|
The boot9.bin needs to be placed in sysdata in the user directory.
|
||||||
|
```
|
||||||
|
**Step 2** - native_firm & secret section
|
||||||
|
|
||||||
|
**For o3DS / o2DS**
|
||||||
|
* In GodMode9, navigate to `sysnand ctrnand` -> `title` -> and then dump `00040138/00000003` as cia and install it in Citra.
|
||||||
|
|
||||||
|
**For n3DS/n2DS**
|
||||||
|
* In GodMode9, naviagte to `sysnand ctrnand` -> `title` -> and then dump `00040138/20000003` as cia and install it in Citra.
|
||||||
|
* Dump the secret section with godmode9 and copy the file (sector0x96.bin) to sys_data in the user folder.
|
||||||
|
|
||||||
|
### Method 2
|
||||||
|
As an alternative, instead of dumping the required files, you can provide all the AES keys manually. The keys are supplied by filling the file `sysdata/aes_keys.txt` (located in the [[User Directory]]) in the following format:
|
||||||
```
|
```
|
||||||
generator=0123456789ABCDEF0123456789ABCDEF
|
generator=0123456789ABCDEF0123456789ABCDEF
|
||||||
slot0x0DKeyX=0123456789ABCDEF0123456789ABCDEF
|
slot0x0DKeyX=0123456789ABCDEF0123456789ABCDEF
|
||||||
|
@ -39,34 +66,3 @@ The strings `0123456789ABCDEF0123456789ABCDEF` in the example above are all plac
|
||||||
|
|
||||||
Required keys: `generator`, `slot0x3DKeyX` and `common0`. `common1`~`5`are probably also required for some
|
Required keys: `generator`, `slot0x3DKeyX` and `common0`. `common1`~`5`are probably also required for some
|
||||||
unusual CIA.
|
unusual CIA.
|
||||||
|
|
||||||
|
|
||||||
# Instructions to obtain AES Keys
|
|
||||||
|
|
||||||
### Method 1
|
|
||||||
In this method, you will need to dump your bootrom, native_firm & secret section(for n3ds) from your console.
|
|
||||||
|
|
||||||
**Step 1** - bootrom
|
|
||||||
|
|
||||||
The bootrom boot9.bin can be dumped with Godmode9:
|
|
||||||
|
|
||||||
```
|
|
||||||
go to drive M: Memory Virtual
|
|
||||||
navigate to boot9.bin, press A
|
|
||||||
Select Copy to O:/gm9out
|
|
||||||
=> This will give you boot9.bin in gm9out on your SD card
|
|
||||||
The boot9.bin needs to be placed in sysdata in the user directory.
|
|
||||||
```
|
|
||||||
**Step 2** - native_firm & secret section
|
|
||||||
|
|
||||||
**For o3DS / o2DS**
|
|
||||||
* In GodMode9, navigate to `sysnand ctrnand` -> `title` -> and then dump `00040138/00000003` as cia and install it in Citra.
|
|
||||||
|
|
||||||
**For n3DS/n2DS**
|
|
||||||
* In GodMode9, naviagte to `sysnand ctrnand` -> `title` -> and then dump `00040138/20000003` as cia and install it in Citra.
|
|
||||||
* Dump the secret section with godmode9 and copy the file (sector0x96.bin) to sys_data in the user folder.
|
|
||||||
|
|
||||||
**Note:** You will still need to provide the `0x25` KeyX using Method 2.
|
|
||||||
|
|
||||||
### Method 2
|
|
||||||
As an alternative, instead of dumping the required files, you can provide all the AES keys by adding them to `sysdata/aes_keys.txt`. This file is located in the [[User Directory]].
|
|
||||||
|
|
Loading…
Reference in a new issue