Difference between revisions of "9.0.0-20"
Line 23: | Line 23: | ||
If (u8*)0x10000000 bit 1 is clear, it hashes data from the region 0x10012000-0x10012090 using SHA2, and then sets AES keyslot 0x11 to the lower portion of that hash. It then initialises KeyX for keyslots 0x15, 0x18-0x20 with the output of encrypting a certain binary sequence using keyslot 0x11. | If (u8*)0x10000000 bit 1 is clear, it hashes data from the region 0x10012000-0x10012090 using SHA2, and then sets AES keyslot 0x11 to the lower portion of that hash. It then initialises KeyX for keyslots 0x15, 0x18-0x20 with the output of encrypting a certain binary sequence using keyslot 0x11. | ||
− | It sets KeyY for keyslot 0x15 to arm9_bin_buf+ | + | It sets KeyY for keyslot 0x15 to arm9_bin_buf+16, the IV to arm9_bin_buf+32. It then proceeds to decrypt the binary. When done, the keys for keyslot 0x15 is cleared and it jumps to the decrypted addr. |
=See Also= | =See Also= |
Revision as of 03:37, 7 October 2014
The 9.0.0-20 system update was released on October 6, 2014.
Change-log
Official change-log:
- Users can now use themes to customize the design and sounds of the HOME Menu
- Five themes are pre-installed and additional themes can be purchased from the Theme Shop
- Themes can be changed by using settings located within the HOME Menu settings
- A feature has been added that allows users to capture screenshots of their HOME Menu
- The Nintendo eShop Title Information page has been updated to provide easier access to any available videos, demos, user reviews, and other information
- Further improvements to overall system stability and other minor adjustments have been made to enhance the user experience
System Titles
New3DS versions of most sysmodules were added with this upgrade.
This upgrade included 3 new sysmodules:
- NFC -- talking to NFC hardware (over I2C).
- DVM
- QTM -- camera headtracking? (over I2C).
NATIVE_FIRM
For New3DS firmwares (NATIVE_FIRM, TWL_FIRM, ..), the ARM9 binary has an additional layer of crypto. At the end of each ARM9 binary, there's a plaintext loader.
If (u8*)0x10000000 bit 1 is clear, it hashes data from the region 0x10012000-0x10012090 using SHA2, and then sets AES keyslot 0x11 to the lower portion of that hash. It then initialises KeyX for keyslots 0x15, 0x18-0x20 with the output of encrypting a certain binary sequence using keyslot 0x11.
It sets KeyY for keyslot 0x15 to arm9_bin_buf+16, the IV to arm9_bin_buf+32. It then proceeds to decrypt the binary. When done, the keys for keyslot 0x15 is cleared and it jumps to the decrypted addr.
See Also
System update reports: