Difference between revisions of "9.0.0-20"

From 3dbrew
Jump to navigation Jump to search
Line 15: Line 15:
  
 
An applet with TID-low 00008B02 was [[Title_list|added]], "solv3". The description from the ExeFS icon is "Post to Miiverse".
 
An applet with TID-low 00008B02 was [[Title_list|added]], "solv3". The description from the ExeFS icon is "Post to Miiverse".
 +
 +
The following applications were updated: System Settings, Download Play, Nintendo 3DS Camera, eShop, System Transfer, and NNID settings.
  
 
=== New3DS ===
 
=== New3DS ===

Revision as of 04:13, 7 October 2014

The 9.0.0-20 system update was released on October 6, 2014.

Change-log

Official change-log:

  • Users can now use themes to customize the design and sounds of the HOME Menu
  • Five themes are pre-installed and additional themes can be purchased from the Theme Shop
  • Themes can be changed by using settings located within the HOME Menu settings
  • A feature has been added that allows users to capture screenshots of their HOME Menu
  • The Nintendo eShop Title Information page has been updated to provide easier access to any available videos, demos, user reviews, and other information
  • Further improvements to overall system stability and other minor adjustments have been made to enhance the user experience

System Titles

3DS

The following system-modules were updated: AM, camera, cfg, codec, gsp, hid, ac, cecd, CSND, dlp, http, ndm, NIM, NWM, SOC, SSL, PS, friends, IR, BOSS, news(notifications), RO, NS, and act.

An applet with TID-low 00008B02 was added, "solv3". The description from the ExeFS icon is "Post to Miiverse".

The following applications were updated: System Settings, Download Play, Nintendo 3DS Camera, eShop, System Transfer, and NNID settings.

New3DS

New3DS versions of most sysmodules were added with this upgrade.

This upgrade included 3 new sysmodules:

  • NFC -- talking to NFC hardware (over I2C).
  • DVM
  • QTM -- camera headtracking? (over I2C).

FIRM

For New3DS firmwares (NATIVE_FIRM, TWL_FIRM, ..), the ARM9 binary has an additional layer of crypto. At the end of each ARM9 binary, there's a plaintext loader.

If (u8*)0x10000000 bit 1 is clear, it hashes data from the region 0x10012000-0x10012090 using SHA2, and then sets AES keyslot 0x11 to the lower portion of that hash. It then initialises KeyX for keyslots 0x15, 0x18-0x20 with the output of encrypting a certain binary sequence using keyslot 0x11.

It sets KeyY for keyslot 0x15 to arm9_bin_buf+16, the IV to arm9_bin_buf+32. It then proceeds to decrypt the binary. When done, the keys for keyslot 0x15 is cleared and it jumps to the decrypted addr.

See Also

System update reports: