Changes

Jump to navigation Jump to search
49 bytes removed ,  05:16, 7 June 2019
→‎Data Structure: cmacs for twlnand have been figured out
Line 281: Line 281:  
For SD contents, each AES-CMAC is generated by combining the NCCH header without the signature (0x100-0x1FF), the Content Index and Content ID at the end, both as u32. Then calculate the SHA256 of the data and generate the AES-CMAC using the [[AES Registers#Keyslots|SD/NAND AES-CMAC key]].
 
For SD contents, each AES-CMAC is generated by combining the NCCH header without the signature (0x100-0x1FF), the Content Index and Content ID at the end, both as u32. Then calculate the SHA256 of the data and generate the AES-CMAC using the [[AES Registers#Keyslots|SD/NAND AES-CMAC key]].
   −
For TWLNAND contents, the process is currently unknown, but it appears to use a different keyslot(cmd file was identical even after a system format).
+
For TWLNAND contents, the same process is used(even for SRL contents) with the keyslot for NAND dbs.
     
46

edits

Navigation menu