From a2772c4e768675eb4ba602ad20f6f1dfd20c7540 Mon Sep 17 00:00:00 2001 From: Steveice10 <1269164+Steveice10@users.noreply.github.com> Date: Fri, 12 May 2023 20:28:04 -0700 Subject: [PATCH] Add notes about fastboot3DS issue. --- AES-Keys.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/AES-Keys.md b/AES-Keys.md index 1c39c08..51996f1 100644 --- a/AES-Keys.md +++ b/AES-Keys.md @@ -2,6 +2,8 @@ Users can provide some additional crypto keys to enable some advanced features in Citra. These keys are not officially provided by Citra due to legal considerations. +**Note that if you are using fastboot3DS, methods 1 and 2 likely will not work. fastboot3DS has an issue that prevents accessing bootrom data; this was fixed in a source commit but has yet to be included in a release.** + ### Method 1 (Recommended) In this method, you will create an ```aes_keys.txt``` from your console using a GodMode9 script. This will dump all the keys and other secrets you need for game decryption, Miis, amiibo, etc. **This requires your 3DS to be on the latest firmware version (11.16.0).** @@ -9,6 +11,8 @@ In this method, you will create an ```aes_keys.txt``` from your console using a 2. Launch GodMode9 on your 3DS and run the script by pressing HOME, selecting "Scripts", and selecting "DumpKeys". Wait for the script to finish and return you to the GodMode9 menu, then turn off your 3DS. 3. On your SD card you will find ```gm9/aes_keys.txt```. Copy this file to the ```sysdata``` folder in your Citra user directory. +**If you see an error like ```line 7: read fail``` when dumping in GodMode9, your environment does not have access to the bootrom data. If you are using fastboot3DS, see the message about that at the top of this page.** + ### Method 2 In this method, you will dump the ARM9 BootROM, `NATIVE_FIRM`, and `SAFE_MODE_FIRM` (and the secret section for the new revision models) from your console using GodMode9.