From f86503d28ae671f5e9d9b4d9cbfb439eeeb5eb3f Mon Sep 17 00:00:00 2001 From: Steveice10 <1269164+Steveice10@users.noreply.github.com> Date: Sun, 9 Apr 2023 12:50:08 -0700 Subject: [PATCH] Add new method using GodMode9 script. --- AES-Keys.md | 11 +++++++++-- 1 file changed, 9 insertions(+), 2 deletions(-) diff --git a/AES-Keys.md b/AES-Keys.md index 1010b6c..d098b00 100644 --- a/AES-Keys.md +++ b/AES-Keys.md @@ -2,7 +2,14 @@ Users can provide some additional crypto keys to enable some advanced features in Citra. These keys are not officially provided by Citra due to legal considerations. -### Method 1 +### Method 1 (Recommended) +In this method, you will use create an ```aes_keys.txt``` from your console using a GodMode9 script. This will dump all the keys and other secrets you need for game decryption, Miis, amiibo, etc. **This requires your 3DS to be on the latest firmware version (11.16.0).** + +1. Download the GodMode9 script [here](https://github.com/citra-emu/citra/raw/master/dist/dumpkeys/DumpKeys.gm9) and save it to the ```gm9/scripts``` directory on your SD card. +2. Launch GodMode9 on your 3DS and run the script by pressing HOME, selecting "Scripts", and selecting "DumpKeys". Wait for the script to finish and return you to the GodMode9 menu, then turn off your 3DS. +3. On your SD card you will find ```gm9/aes_keys.txt```. Copy this file to the ```sysdata``` folder in your Citra user directory. + +### Method 2 In this method, you will dump the ARM9 BootROM, `NATIVE_FIRM`, and `SAFE_MODE_FIRM` (and the secret section for the new revision models) from your console using GodMode9. **Note:** Extracting 0x25KeyX from `NATIVE_FIRM` is still not correctly implemented, so you will have to provide the key manually using the second method. `NATIVE_FIRM` extraction & installation is still included for completeness. @@ -36,7 +43,7 @@ In this method, you will dump the ARM9 BootROM, `NATIVE_FIRM`, and `SAFE_MODE_FI 8. Eject the SD card from your console and insert it into your computer/device. Copy/move the CIA file from `gm9/out` on the SD card to a location of your choosing, and install it to Citra's NAND (`File` > `Install CIA...`). 9. Copy/move `sector0x96.bin` from `gm9/out` on the SD card to the `sysdata` folder in the [[User Directory]]. -### Method 2 +### Method 3 As an alternative, instead of dumping the required files, you can provide all the AES keys manually. The keys are supplied by filling the file `sysdata/aes_keys.txt` (located in the [[User Directory]]) in the following format: ``` slot0x0DKeyX=0123456789ABCDEF0123456789ABCDEF