From ecb962c19a4971f5141a03f1819951fd47849bcf Mon Sep 17 00:00:00 2001 From: forbiddentempura Date: Sun, 2 Jun 2024 11:11:21 +0000 Subject: [PATCH] Propose alternative way to test this in README --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index f58f6b4..91fa0c6 100644 --- a/README.md +++ b/README.md @@ -5,7 +5,7 @@ This tool decrypts the 3DS cart encryption example on [3dbrew](https://3dbrew.or The code is based on code found on [GBATEK](https://problemkaputt.de/gbatek.htm#3dscartridgeregisters) (**Warning:** big page). -It expects a file named `0004000000038c00.3ds` in the current directory. A known-good dump of this title (LEGO Star Wars III The Clone Wars, EUR) has SHA-256 8fcbd4b394f765cb09f81ee7c62802d490c86ed85bd5ab3923b48a4d0222de22. +It expects a file named `0004000000038c00.3ds` in the current directory. A known-good dump of this title (LEGO Star Wars III The Clone Wars, EUR) has SHA-256 8fcbd4b394f765cb09f81ee7c62802d490c86ed85bd5ab3923b48a4d0222de22. **Alternatively,** you can use the 0x200 bytes on the 3dbrew page linked above. Take the first 0x40 bytes of the initial data hex dump on that page, prepend it with 0x1000 of dummy data and name the result `0004000000038c00.3ds`. It assumes gamecart ID2 == 0, which should be the case for all retail carts.