Wish I knew. Maybe switch to running on process9? (don't know how to do that lol)Good idea! Especially before injecting anything. You don't happen to know how to enable ITCM access in the Decrypt9 launcher.dat exploit method?
Wish I knew. Maybe switch to running on process9? (don't know how to do that lol)Good idea! Especially before injecting anything. You don't happen to know how to enable ITCM access in the Decrypt9 launcher.dat exploit method?
I'd say, for ncchinfo.bin files that should not matter. Just try it. BTW, you noticed there's a much more convenient title decryptor (meaning: direct decryption of 3DS files) in there now, right?Can i get the xorpads generated with the ncchinfo.bin from the emunand? or nand only?
I shall give it a try tomorrow. I'm aiming on decrypting something what in the firmware. it did work on FW 9.2 which my ds is running on but the file has changed in FW 9.6. That's the reason why i asked as the 9.6 firmware is running on the emunand . The direct encryption sounds cool too, i'll check it out for my next project!I'd say, for ncchinfo.bin files that should not matter. Just try it. BTW, you noticed there's a much more convenient title decryptor (meaning: direct decryption of 3DS files) in there now, right?
Okay, I'm not entirely sure what you want to do . On 9.6 EmuNAND you should have no way of launching Decrypt9. If you mean the seed crypto, well, then you need the seeddb.bin. You can describe the thing you want to do in more detail, and I'll try to help, but for now I suggest just try it.I shall give it a try tomorrow. I'm aiming on decrypting something what in the firmware. it did work on FW 9.2 which my ds is running on but the file has changed in FW 9.6. That's the reason why i asked as the 9.6 firmware is running on the emunand . The direct encryption sounds cool too, i'll check it out for my next project!
I already have the seeddb.bin , was able to dump the emuNand in the nand dump menu. What i want to do is extract a romfs located in the newer firmware (located on my emuNand) and for decrypting it i need to generate a xorpad from the ncchinfo.bin. I've done it with my 9.2 firmware on my systemNand which went great but now i want to repeat it for the 9.6 firmware located on my emuNand. If i do a nand dump i can select either the systemNand or emuNand but for generating the xorpad i don't get that selection so i'm assuming the xorpad is only generated from the systemNand. I'll try things out tomorrow, heading off to bed nowOkay, I'm not entirely sure what you want to do . On 9.6 EmuNAND you should have no way of launching Decrypt9. If you mean the seed crypto, well, then you need the seeddb.bin. You can describe the thing you want to do in more detail, and I'll try to help, bus for now I suggest just try it.
In fact, SysNand or EmuNAND shouldn't matter for ncchinfo.bin files, as all the info is inside the files and the NAND is not even peeked at. Tell me how it goes!I already have the seeddb.bin , was able to dump the emuNand in the nand dump menu. What i want to do is extract a romfs located in the newer firmware (located on my emuNand) and for decrypting it i need to generate a xorpad from the ncchinfo.bin. I've done it with my 9.2 firmware on my systemNand which went great but now i want to repeat it for the 9.6 firmware located on my emuNand. If i do a nand dump i can select either the systemNand or emuNand but for generating the xorpad i don't get that selection so i'm assuming the xorpad is only generated from the systemNand. I'll try things out tomorrow, heading off to bed now
That was a hard one... New release available that should fix the remaining problems.
I've tested Pony Pets 3D failed with the New release.By the way, has anyone tested Pony Pets 3D (Japan) with the new title decryptor yet? @mixups maybe? Pony Pets 3D is the title that failed with the NCCH xorpad generator, because it seems to use seed crypto but no 7x crypto.
Okay, thank you! The fix that was pulled into Archshifts repo, I assume that is one hundred percent tested? Meaning, decryption is okay, converted .CIA works, etc? I'm asking because your fix directly contradicts something written on 3Dbrew:I've tested Pony Pets 3D failed with the New release.
Check your PM
BTW. We can switch the options push R button,
However, it switched next options when I pull R button.
As 3Dbrew.org is a work in progress, that must not mean you're wrong - it can also mean the author is.3Dbrew.org said:
Keyslots has been managed in ncchflag[3].3Dbrew.org said:Keyslots
0x25 v7.0 NCCH key, when ncchflag[3] is 0x01.
0x2C Original NCCH key, when ncchflag[3] is 0x00 and always for certain NCCH sections.
From http://3dbrew.org/wiki/AES_Registers
Alright, thank you! I'll do some testing of my own and then write about it. By the way, the title decryptor (in the newest release version) should work for Pony Pets 3D. It does everything exactly the same as you do.Keyslots has been managed in ncchflag[3].
If you set ncchflag[3] to 0x00, Keyslots 0x2C is used.
It should be same as SeedCrypto.
I make a cryptofix .3ds rom worked in GW n3ds 9.5.
also decrypted rom worked in citra.
Edit: I tested converted .CIA worked in GW n3ds 9.5. so, more accurate that written on 3Dbrew.
So, are there any features you still wish to have in Decrypt9? Any bugs, or anything you wish worked differently? Let me hear it! Feedback is highly welcome.
To be honest, I wouldn't be too happy to add funtionality for a proprietal EmuNAND solution in there. Plus, that would require a ton of changes and further O3DS / N3DS customizations. So, unlikely for now. What would be possible pretty easily is a specialed Decrypt9 version that uses the Gateway EmuNAND instead of the SystemNAND. Problem here is: I can't test this, I don't have the Gateway, and I would need further information.Ticket.db dumper from (Gateway) Emunand
To be honest, I wouldn't be too happy to add funtionality for a proprietal EmuNAND solution in there. Plus, that would require a ton of changes and further O3DS / N3DS customizations. So, unlikely for now. What would be possible pretty easily is a specialed Decrypt9 version that uses the Gateway EmuNAND instead of the SystemNAND. Problem here is: I can't test this, I don't have the Gateway, and I would need further information.
ROM dumping from gamecartSo, are there any features you still wish to have in Decrypt9? Any bugs, or anything you wish worked differently? Let me hear it! Feedback is highly welcome.
There's already uncart. There's already gateway. Let's ask for something that doesn't exist instead of wasting devs time reinventing the wheel.ROM dumping from gamecart
*tying up loose ends.The title decryptor was the last planned feature, so what I'll do now is tightening up the loose ends.
What's so proprietary about Gateway's emuNAND?To be honest, I wouldn't be too happy to add funtionality for a proprietal EmuNAND solution in there. Plus, that would require a ton of changes and further O3DS / N3DS customizations. So, unlikely for now. What would be possible pretty easily is a specialed Decrypt9 version that uses the Gateway EmuNAND instead of the SystemNAND. Problem here is: I can't test this, I don't have the Gateway, and I would need further information.
To be honest, I wouldn't be too happy to add funtionality for a proprietal EmuNAND solution in there. Plus, that would require a ton of changes and further O3DS / N3DS customizations. So, unlikely for now. What would be possible pretty easily is a specialed Decrypt9 version that uses the Gateway EmuNAND instead of the SystemNAND. Problem here is: I can't test this, I don't have the Gateway, and I would need further information.
What's so proprietary about Gateway's emuNAND?
Isn't it the same format that reiNAND and SALT (will) use, or are they simply "compatible" with Gateway's emuNAND format?
I'm sure many here would be happy to help test a Gateway/reiNAND compatible version of decrypt9.
As for new features; the ability to import/export/delete individual tickets from Title.db would be amazing! But that might be a bigger task than you're willing to tackle.
I know, all-in-one solutions are convenient, but as zoogie said, you can just use uncart or the GW launcher (GW card not needed). Shadowtrance tried at one point to just copy the uncart code into Decrypt9, but that didn't work for one reason or the other. I might take a short look at merging the uncart code into Decrypt9 at a later point, but don't get your hopes too high up.ROM dumping from gamecart
That's a feature I'd like to have, too. It might be a too complicated process, though, as all 3DS -> CIA conversion guides I've seen so far seem to indicate. I'm looking into the possibility, more about that later.The thing most people would appreciate is a one-step cci to cia tool. Would be well received I think.
As for new features; the ability to import/export/delete individual tickets from Title.db would be amazing! But that might be a bigger task than you're willing to tackle.
I'm sure many here would be happy to help test a Gateway/reiNAND compatible version of decrypt9.
So, can rxTools dump stuff from Gateways EmuNAND and does EmuNAND work the same on O3DS and N3DS? Is the raw NAND image always in the same place and has the same name for each solution (and where is it)? If so, I'll make a specialized Decrypt9 version that uses EmuNAND instead of SysNAND. Including that functionality (via some switch functionality) into main Decrypt9 is not a good idea right now, as it would require some critical changes that could backfire at a later point.It's just a RAW partition mirror image of the nand on the sd card but basically every cfw there is atm that has emunand uses that setup (besides the old 4.x only cfw with its REDNAND, which i doubt anyone uses anymore anyway).
That being said, i know rxTools had (has?) the ability to dump files from emunand as well as sysnand (i haven't looked in a while), so not sure how hard it would be to implement ticket.db dumping from emunand.
And of course, as you know @d0k3 i have 3 3ds's at my disposal to test anything thrown at me (as well as gateway and sky3ds).
I shall give it a try tomorrow. I'm aiming on decrypting something what in the firmware. it did work on FW 9.2 which my ds is running on but the file has changed in FW 9.6. That's the reason why i asked as the 9.6 firmware is running on the emunand . The direct encryption sounds cool too, i'll check it out for my next project!
In fact, SysNand or EmuNAND shouldn't matter for ncchinfo.bin files, as all the info is inside the files and the NAND is not even peeked at. Tell me how it goes!