Changes

Jump to navigation Jump to search
1,045 bytes added ,  05:07, 28 March 2013
About shbin in RomFS
Line 66: Line 66:  
Sure? In the content folder there is a file named [''id''?].app it's encrypted I cant find anything, arm opcodes, text plain --[[User:Jocopoco|Jocopoco]] 19:09, 18 November 2011 (CET)
 
Sure? In the content folder there is a file named [''id''?].app it's encrypted I cant find anything, arm opcodes, text plain --[[User:Jocopoco|Jocopoco]] 19:09, 18 November 2011 (CET)
 
:That .app CXI is encrypted the same way as titles downloaded via eShop stored on SD card for retail 3DS,(besides different keys) the sample.cia is cleartext. --[[User:Yellows8|Yellows8]] 20:37, 18 November 2011 (CET)
 
:That .app CXI is encrypted the same way as titles downloaded via eShop stored on SD card for retail 3DS,(besides different keys) the sample.cia is cleartext. --[[User:Yellows8|Yellows8]] 20:37, 18 November 2011 (CET)
 +
 +
@[[User:3dsguy|3dsguy]]: About the [[SHBIN]] in [[RomFS|romfs.bin]]. Have you ever found there is .shbin inside it? Look at which you uploaded to dropbox (''today or yesterday, named "CIA"'') and find that one in folder "CIA\Extracted CIA Content\CXI extract" and check offset 0x10C0. There is [[SHBIN]] name "font_RectDrawerShader.shbin" just above the offset (with 00 padding, also with the length of name 0x3a). There is also some other clear text. you can extract the file in hex to check the shbin (maybe 0x3A0+0x8/0x18, of that file). if you think there is chance to check those shbin, you may have to fetch some different CIA that generated and decrypt and then extract its Romfs. i will be eager to see the ''extracted decrypted romfs''. If there is the proper source code of those files that may be even easier to check the function's ASM. (well best way is ''use dev unit to generate a series of versions of the title and extract all CIAs and decrypt to check those shbins'') --[[User:Syphurith|Syphurith]] 05:07, 28 March 2013 (CET)
174

edits

Navigation menu