Add new method using GodMode9 script.
parent
207271f924
commit
f86503d28a
1 changed files with 9 additions and 2 deletions
11
AES-Keys.md
11
AES-Keys.md
|
@ -2,7 +2,14 @@
|
||||||
|
|
||||||
Users can provide some additional crypto keys to enable some advanced features in Citra. These keys are not officially provided by Citra due to legal considerations.
|
Users can provide some additional crypto keys to enable some advanced features in Citra. These keys are not officially provided by Citra due to legal considerations.
|
||||||
|
|
||||||
### Method 1
|
### Method 1 (Recommended)
|
||||||
|
In this method, you will use create an ```aes_keys.txt``` from your console using a GodMode9 script. This will dump all the keys and other secrets you need for game decryption, Miis, amiibo, etc. **This requires your 3DS to be on the latest firmware version (11.16.0).**
|
||||||
|
|
||||||
|
1. Download the GodMode9 script [here](https://github.com/citra-emu/citra/raw/master/dist/dumpkeys/DumpKeys.gm9) and save it to the ```gm9/scripts``` directory on your SD card.
|
||||||
|
2. Launch GodMode9 on your 3DS and run the script by pressing HOME, selecting "Scripts", and selecting "DumpKeys". Wait for the script to finish and return you to the GodMode9 menu, then turn off your 3DS.
|
||||||
|
3. On your SD card you will find ```gm9/aes_keys.txt```. Copy this file to the ```sysdata``` folder in your Citra user directory.
|
||||||
|
|
||||||
|
### Method 2
|
||||||
In this method, you will dump the ARM9 BootROM, `NATIVE_FIRM`, and `SAFE_MODE_FIRM` (and the secret section for the new revision models) from your console using GodMode9.
|
In this method, you will dump the ARM9 BootROM, `NATIVE_FIRM`, and `SAFE_MODE_FIRM` (and the secret section for the new revision models) from your console using GodMode9.
|
||||||
|
|
||||||
**Note:** Extracting 0x25KeyX from `NATIVE_FIRM` is still not correctly implemented, so you will have to provide the key manually using the second method. `NATIVE_FIRM` extraction & installation is still included for completeness.
|
**Note:** Extracting 0x25KeyX from `NATIVE_FIRM` is still not correctly implemented, so you will have to provide the key manually using the second method. `NATIVE_FIRM` extraction & installation is still included for completeness.
|
||||||
|
@ -36,7 +43,7 @@ In this method, you will dump the ARM9 BootROM, `NATIVE_FIRM`, and `SAFE_MODE_FI
|
||||||
8. Eject the SD card from your console and insert it into your computer/device. Copy/move the CIA file from `gm9/out` on the SD card to a location of your choosing, and install it to Citra's NAND (`File` > `Install CIA...`).
|
8. Eject the SD card from your console and insert it into your computer/device. Copy/move the CIA file from `gm9/out` on the SD card to a location of your choosing, and install it to Citra's NAND (`File` > `Install CIA...`).
|
||||||
9. Copy/move `sector0x96.bin` from `gm9/out` on the SD card to the `sysdata` folder in the [[User Directory]].
|
9. Copy/move `sector0x96.bin` from `gm9/out` on the SD card to the `sysdata` folder in the [[User Directory]].
|
||||||
|
|
||||||
### Method 2
|
### Method 3
|
||||||
As an alternative, instead of dumping the required files, you can provide all the AES keys manually. The keys are supplied by filling the file `sysdata/aes_keys.txt` (located in the [[User Directory]]) in the following format:
|
As an alternative, instead of dumping the required files, you can provide all the AES keys manually. The keys are supplied by filling the file `sysdata/aes_keys.txt` (located in the [[User Directory]]) in the following format:
|
||||||
```
|
```
|
||||||
slot0x0DKeyX=0123456789ABCDEF0123456789ABCDEF
|
slot0x0DKeyX=0123456789ABCDEF0123456789ABCDEF
|
||||||
|
|
Loading…
Reference in a new issue