Memory layout: Difference between revisions
No edit summary |
Vague Rant (talk | contribs) Restore from Google cache. |
||
Line 471: | Line 471: | ||
| 0x4100 | | 0x4100 | ||
| 0x800 | | 0x800 | ||
| | | These are RSA-2048 keys: 4 slots, each slot is 0x200-bytes. Slot+0 is the modulo, slot+0x100 is the private-exponent. This can be confirmed by RSA-decrypting a message into a signature, then RSA-encrypting the signature back into a message, and comparing the original message with the output from the last operation. | ||
[[FIRM]] doesn't seem to ever use these. None of these are related to RSA-keyslot0 used for v6.0/v7.0 key generation. These modulus are separate from all other modulus used elsewhere. | |||
|- | |- | ||
| 0x01FFC900 | | 0x01FFC900 | ||
Line 517: | Line 519: | ||
* 0x01FFD398 is the keyX used for 'Tad' crypto, usually in keyslot 0x02 "Nintendo DS", .. | * 0x01FFD398 is the keyX used for 'Tad' crypto, usually in keyslot 0x02 "Nintendo DS", .. | ||
* 0x01FFD3A8 is set as the middle two words of keyslot 0x03's keyX, before being overwritten "NINTENDO" | * 0x01FFD3A8 is set as the middle two words of keyslot 0x03's keyX, before being overwritten "NINTENDO" | ||
* 0x01FFD3BC is the | * 0x01FFD3BC is the keyY for keyslot 0x01, see below | ||
* 0x01FFD3C8 is the fixed keyY used for eMMC partition crypto on retail DSi, see below (keyslot 0x03) | * 0x01FFD3C8 is the fixed keyY used for eMMC partition crypto on retail DSi, see below (keyslot 0x03) | ||
* 0x01FFD3E0 is the 0x1048-byte Blowfish data for DSi cart crypto | * 0x01FFD3E0 is the 0x1048-byte Blowfish data for DSi cart crypto | ||
* 0x01FFE428 is the 0x1048-byte Blowfish data for DS cart crypto | * 0x01FFE428 is the 0x1048-byte Blowfish data for DS cart crypto | ||
On the 3DS, keyslots | On the 3DS, keyslots 0x01 and 0x03 have the last word set as 0xE1A00005 instead of the next word in ITCM. This is consistent with retail DSis. | ||
|- | |- | ||
| 0x01FFF470 | | 0x01FFF470 |