diff --git a/README.md b/README.md index f58f6b4..91fa0c6 100644 --- a/README.md +++ b/README.md @@ -5,7 +5,7 @@ This tool decrypts the 3DS cart encryption example on [3dbrew](https://3dbrew.or The code is based on code found on [GBATEK](https://problemkaputt.de/gbatek.htm#3dscartridgeregisters) (**Warning:** big page). -It expects a file named `0004000000038c00.3ds` in the current directory. A known-good dump of this title (LEGO Star Wars III The Clone Wars, EUR) has SHA-256 8fcbd4b394f765cb09f81ee7c62802d490c86ed85bd5ab3923b48a4d0222de22. +It expects a file named `0004000000038c00.3ds` in the current directory. A known-good dump of this title (LEGO Star Wars III The Clone Wars, EUR) has SHA-256 8fcbd4b394f765cb09f81ee7c62802d490c86ed85bd5ab3923b48a4d0222de22. **Alternatively,** you can use the 0x200 bytes on the 3dbrew page linked above. Take the first 0x40 bytes of the initial data hex dump on that page, prepend it with 0x1000 of dummy data and name the result `0004000000038c00.3ds`. It assumes gamecart ID2 == 0, which should be the case for all retail carts.