Method 1 overhaul to reflect the new key derivation methods in Citra. Also a fair bit of grammar correction and layout changes.
parent
e3c91c6d52
commit
9cc33ebee3
1 changed files with 28 additions and 16 deletions
44
AES-Keys.md
44
AES-Keys.md
|
@ -1,28 +1,40 @@
|
||||||
|
# How to obtain AES Keys
|
||||||
|
|
||||||
Users can provide some additional crypto keys to enable some advanced features in Citra. These keys are not officially provided by Citra due to legal considerations.
|
Users can provide some additional crypto keys to enable some advanced features in Citra. These keys are not officially provided by Citra due to legal considerations.
|
||||||
# Instructions to obtain AES Keys
|
|
||||||
|
|
||||||
### Method 1
|
### Method 1
|
||||||
In this method, you will need to dump your bootrom, native_firm & secret section(for n3ds) from your console.
|
In this method, you will dump the ARM9 BootROM, `NATIVE_FIRM`, and `SAFE_MODE_FIRM` (and the secret section for "New" models) from your console using GodMode9.
|
||||||
|
|
||||||
**Note:** You will still need to provide the `0x25 KeyX` using Method 2.
|
**Note:** If you only have access to a "New" model console, you will still need to provide `0x25KeyX` using Method 2.
|
||||||
|
|
||||||
**Step 1** - bootrom
|
**Step 1** - ARM9 BootROM
|
||||||
|
|
||||||
The bootrom boot9.bin can be dumped with Godmode9:
|
* After launching GodMode9, enter the `[M:] MEMORY VIRTUAL` drive.
|
||||||
|
* Navigate to `boot9.bin`; press `A`.
|
||||||
|
* Select `Copy to 0:/gm9/out`. `boot9.bin` will be dumped to `gm9/out` on your SD card.
|
||||||
|
* Power off the console by pressing `HOME`, and then `Poweroff system`.
|
||||||
|
* Eject the SD card from your console and insert it into your computer/device. Copy/move `boot9.bin` from `gm9/out` on the SD card to the `sysdata` folder in the [[User Directory]].
|
||||||
|
|
||||||
* Go to drive `M: Memory Virtual`
|
**Step 2** - `NATIVE_FIRM`, `SAFE_MODE_FIRM`, and the secret section.
|
||||||
* Navigate to `boot9.bin`, press A
|
|
||||||
* Select `Copy to O:/gm9out`. This will give you boot9.bin in gm9out on your SD card
|
|
||||||
* The `boot9.bin` needs to be placed in the `sysdata` folder in the [[User Directory]].
|
|
||||||
|
|
||||||
**Step 2** - native_firm & secret section
|
**For "Old" models**
|
||||||
|
1. Reinsert the SD card into the console and launch GodMode9
|
||||||
|
2. Press `HOME`, select `Title manager`, and then select `[1:] NAND / TWL` as a source.
|
||||||
|
3. After the title scan is complete, navigate to the titles named `0004013800000002 (CTR-P-CTAP)` and `0004013800000003 (CTR-P-CTAP)`.
|
||||||
|
4. Open `0004013800000002 (CTR-P-CTAP)`, select `Manage Title...`, and then select `Build CIA (standard)`.
|
||||||
|
5. Repeat the process above with `0004013800000003 (CTR-P-CTAP)`
|
||||||
|
6. Power off the system by pressing `HOME`, and then `Poweroff system`.
|
||||||
|
7. Eject the SD card from your console and insert it into your computer/device. Copy/move both CIA files from `gm9/out` on the SD card to a location of your choosing, and install both to Citra's NAND (`File` > `Install CIA...`).
|
||||||
|
|
||||||
**For o3DS / o2DS**
|
**For "New" models**
|
||||||
* In GodMode9, navigate to `sysnand ctrnand` -> `title` -> and then dump `00040138/00000003` as cia and install it in Citra.
|
1. Reinsert the SD card into the console and launch GodMode9
|
||||||
|
2. Press `HOME`, select `Title manager`, and then select `[1:] NAND / TWL` as a source.
|
||||||
**For n3DS/n2DS**
|
3. After the title scan is complete, navigate to the title named `0004013820000003 (CTR-P-CTAP)`.
|
||||||
* In GodMode9, navigate to `sysnand ctrnand` -> `title` -> and then dump `00040138/20000003` as cia and install it in Citra.
|
4. Open `0004013820000003 (CTR-P-CTAP)`, select `Manage Title...`, and then select `Build CIA (standard)`.
|
||||||
* Dump the secret section with godmode9 and copy the file (sector0x96.bin) to sysdata in the user folder.
|
6. Exit the Title manager by pressing `B`, then enter the `[S:] SYSNAND VIRTUAL` drive. Open `sector0x96.bin` (the secret section), and select `Copy to 0:/gm9/out`.
|
||||||
|
7. Power off the system by pressing `HOME`, and then `Poweroff system`.
|
||||||
|
8. Eject the SD card from your console and insert it into your computer/device. Copy/move the CIA file from `gm9/out` on the SD card to a location of your choosing, and install it to Citra's NAND (`File` > `Install CIA...`).
|
||||||
|
9. Copy/move `sector0x96.bin` from `gm9/out` on the SD card to the `sysdata` folder in the [[User Directory]].
|
||||||
|
|
||||||
### Method 2
|
### Method 2
|
||||||
As an alternative, instead of dumping the required files, you can provide all the AES keys manually. The keys are supplied by filling the file `sysdata/aes_keys.txt` (located in the [[User Directory]]) in the following format:
|
As an alternative, instead of dumping the required files, you can provide all the AES keys manually. The keys are supplied by filling the file `sysdata/aes_keys.txt` (located in the [[User Directory]]) in the following format:
|
||||||
|
|
Loading…
Reference in a new issue