Propose alternative way to test this in README

This commit is contained in:
Forbidden Tempura 2024-06-02 11:11:21 +00:00
parent 885d48ca85
commit ecb962c19a

View file

@ -5,7 +5,7 @@ This tool decrypts the 3DS cart encryption example on [3dbrew](https://3dbrew.or
The code is based on code found on [GBATEK](https://problemkaputt.de/gbatek.htm#3dscartridgeregisters) (**Warning:** big page).
It expects a file named `0004000000038c00.3ds` in the current directory. A known-good dump of this title (LEGO Star Wars III The Clone Wars, EUR) has SHA-256 8fcbd4b394f765cb09f81ee7c62802d490c86ed85bd5ab3923b48a4d0222de22.
It expects a file named `0004000000038c00.3ds` in the current directory. A known-good dump of this title (LEGO Star Wars III The Clone Wars, EUR) has SHA-256 8fcbd4b394f765cb09f81ee7c62802d490c86ed85bd5ab3923b48a4d0222de22. **Alternatively,** you can use the 0x200 bytes on the 3dbrew page linked above. Take the first 0x40 bytes of the initial data hex dump on that page, prepend it with 0x1000 of dummy data and name the result `0004000000038c00.3ds`.
It assumes gamecart ID2 == 0, which should be the case for all retail carts.