Method 1 overhaul to reflect the new key derivation methods in Citra. Also a fair bit of grammar correction and layout changes.

Kookies 2021-10-25 21:41:18 -06:00
parent e3c91c6d52
commit 9cc33ebee3

@ -1,28 +1,40 @@
# How to obtain AES Keys
Users can provide some additional crypto keys to enable some advanced features in Citra. These keys are not officially provided by Citra due to legal considerations. Users can provide some additional crypto keys to enable some advanced features in Citra. These keys are not officially provided by Citra due to legal considerations.
# Instructions to obtain AES Keys
### Method 1 ### Method 1
In this method, you will need to dump your bootrom, native_firm & secret section(for n3ds) from your console. In this method, you will dump the ARM9 BootROM, `NATIVE_FIRM`, and `SAFE_MODE_FIRM` (and the secret section for "New" models) from your console using GodMode9.
**Note:** You will still need to provide the `0x25 KeyX` using Method 2. **Note:** If you only have access to a "New" model console, you will still need to provide `0x25KeyX` using Method 2.
**Step 1** - bootrom **Step 1** - ARM9 BootROM
The bootrom boot9.bin can be dumped with Godmode9: * After launching GodMode9, enter the `[M:] MEMORY VIRTUAL` drive.
* Navigate to `boot9.bin`; press `A`.
* Select `Copy to 0:/gm9/out`. `boot9.bin` will be dumped to `gm9/out` on your SD card.
* Power off the console by pressing `HOME`, and then `Poweroff system`.
* Eject the SD card from your console and insert it into your computer/device. Copy/move `boot9.bin` from `gm9/out` on the SD card to the `sysdata` folder in the [[User Directory]].
* Go to drive `M: Memory Virtual` **Step 2** - `NATIVE_FIRM`, `SAFE_MODE_FIRM`, and the secret section.
* Navigate to `boot9.bin`, press A
* Select `Copy to O:/gm9out`. This will give you boot9.bin in gm9out on your SD card
* The `boot9.bin` needs to be placed in the `sysdata` folder in the [[User Directory]].
**Step 2** - native_firm & secret section **For "Old" models**
1. Reinsert the SD card into the console and launch GodMode9
2. Press `HOME`, select `Title manager`, and then select `[1:] NAND / TWL` as a source.
3. After the title scan is complete, navigate to the titles named `0004013800000002 (CTR-P-CTAP)` and `0004013800000003 (CTR-P-CTAP)`.
4. Open `0004013800000002 (CTR-P-CTAP)`, select `Manage Title...`, and then select `Build CIA (standard)`.
5. Repeat the process above with `0004013800000003 (CTR-P-CTAP)`
6. Power off the system by pressing `HOME`, and then `Poweroff system`.
7. Eject the SD card from your console and insert it into your computer/device. Copy/move both CIA files from `gm9/out` on the SD card to a location of your choosing, and install both to Citra's NAND (`File` > `Install CIA...`).
**For o3DS / o2DS** **For "New" models**
* In GodMode9, navigate to `sysnand ctrnand` -> `title` -> and then dump `00040138/00000003` as cia and install it in Citra. 1. Reinsert the SD card into the console and launch GodMode9
2. Press `HOME`, select `Title manager`, and then select `[1:] NAND / TWL` as a source.
**For n3DS/n2DS** 3. After the title scan is complete, navigate to the title named `0004013820000003 (CTR-P-CTAP)`.
* In GodMode9, navigate to `sysnand ctrnand` -> `title` -> and then dump `00040138/20000003` as cia and install it in Citra. 4. Open `0004013820000003 (CTR-P-CTAP)`, select `Manage Title...`, and then select `Build CIA (standard)`.
* Dump the secret section with godmode9 and copy the file (sector0x96.bin) to sysdata in the user folder. 6. Exit the Title manager by pressing `B`, then enter the `[S:] SYSNAND VIRTUAL` drive. Open `sector0x96.bin` (the secret section), and select `Copy to 0:/gm9/out`.
7. Power off the system by pressing `HOME`, and then `Poweroff system`.
8. Eject the SD card from your console and insert it into your computer/device. Copy/move the CIA file from `gm9/out` on the SD card to a location of your choosing, and install it to Citra's NAND (`File` > `Install CIA...`).
9. Copy/move `sector0x96.bin` from `gm9/out` on the SD card to the `sysdata` folder in the [[User Directory]].
### Method 2 ### Method 2
As an alternative, instead of dumping the required files, you can provide all the AES keys manually. The keys are supplied by filling the file `sysdata/aes_keys.txt` (located in the [[User Directory]]) in the following format: As an alternative, instead of dumping the required files, you can provide all the AES keys manually. The keys are supplied by filling the file `sysdata/aes_keys.txt` (located in the [[User Directory]]) in the following format: