Does anyone know if there is any loss of quality while converting BFSTM to BRSTM?
I have no idea if there is any B(x)STM editing tool. I've run into another dead end here. I need something that can silence certain channels, read any B(x)STM format (ANY, not every), and help me save the result.
Recommendations welcome.
too late mediafire trolled you
Oh, right. So in Mario Kart 8, the .szs isn't a Yaz0 compressed SARC, but in other games, it is. I get it now. That's why the GitHub page says that, because it acknowledges the majority... ahh, revelations.
How did you do that, could you please say it?Finally I've got Loadiine works in 5.5.1
LOL, no I didn't ...
Please look at the white text...How did you do that, could you please say it?
Finally I've got Loadiine works in 5.5.1
LOL, no I didn't ...
How did you do that, could you please say it?
White text??, I see nothing there, what are u talking about, what can you see there?Please look at the white text...
highlight all the post.White text??, I see nothing there, what are u talking about, what can you see there?
I was talking about how Nikki's GitHub page said that .szs = Yaz0 + SARC archive, but MK8's .szs's weren't SARC archives. She told me that in her reply to me before.Nintendo uses the .szs extension to mean "Yaz0-compressed data," in general. Usually the data is a SARC archive, but there are games other than MK8 that use SZS to compress files of other types. One game even uses SZS for Yaz0-compressed font files (BFFNT).
Do you have experience with it? If so, mind sharing the offsets for individual channels of a BFSTM?You mean silencing any channel of a BxSTM audio file?
If so, then you can use a hex editor, for example, HxD, to just fill that specified channel section with zeros, then you should be good.
You have to search them, not every song has the same length.If so, mind sharing the offsets for individual channels of a BFSTM?
Boot1 IV has been added to my talk page (before you get all excited, don't. the iv is only useful to decrypt the first 0x10 bytes, given the correct key. we're still missing the boot1 key)
Wut, was it possible to bruteforce the IV? Isn't the first 0x10 bytes encrypted with the key too, and not just XORed with the IV? (Assuming they use AES(or some other encryption) in CBC mode)
yep, and the bootrom contains the expresso iv, whilst IOSU contains the starbuck iv (while we are talking about hardcoded crap )Presumably, it was reverse-engineered out of boot0, which has been possible to dump for almost 2 years.
So sans, what could the great papyrus do with this?yep, and the bootrom contains the expresso iv, whilst IOSU contains the starbuck iv (while we are talking about hardcoded crap )
decrypt shit and use it to "time-travel"So sans, what could the great papyrus do with this?
Ohhhkay. Could papyrus test if need be? My Spaghetti will make you not Regretti.decrypt shit and use it to "time-travel"