Line 4: |
Line 4: |
| | | |
| ==Contents of the archive== | | ==Contents of the archive== |
− | The archive contained dumps of the "bb" and "ng" development trees from [[Acer Cloud Technology|BroadOn]]'s servers, likely sent from [[Acer Cloud Technology|BroadOn]] to Nintendo. The "ng" tree, inside a TAR file named "depotrvl", contained a CVS repository with the source code for the Wii's [[IOS|input output system]], source code for Wii factory software, the source code for [[boot0]], [[boot1]], and [[boot2]], internal documents and PowerPoint presentations related to [[Acer Cloud Technology|BroadOn]] and Nintendo and the development of the Wii, and much more. | + | The archive contained dumps of the "bb" and "ng" development trees from [[Acer Cloud Technology|BroadOn]]'s servers, likely sent from [[Acer Cloud Technology|BroadOn]] to Nintendo. Here is a list of things that have been found in this data: |
| + | |
| + | * Source code for [[boot0]], [[boot1]] and [[boot2]] |
| + | * Source code for [[IOS]] |
| + | * Source code for the [[DVD]] and [[EXI]] libraries from the [[Wii SDK]] |
| + | * Block diagram/datasheets for every Wii system component & Verilog for AES/SHA |
| + | * Documents from BroadOn describing feature planning and implementation, APIs, and documents relating to internal software |
| + | * Documents from 2004-2006 describing plans for the implementation of the Wii |
| + | * Miscellaneous Nintendo data, including an internal WPAD SDK from 2005 and a Wii Overview from RVL_SDK 1.0 |
| + | * Internal GameCube documents, including a physical disc layout |
| + | * iQue related data, located in the "bb" tree, including various documents, tools, and huge CVS code repositories |
| + | |
| + | People have claimed to have found partial Super Mario 64 source code inside the contents of the "bb" tree. |
| | | |
| ==sd_boot== | | ==sd_boot== |
− | These leaked files led to the discovery of a software tool used in the [[Wii Factory Process]] called sd_boot. This contained a vulnerability, which was found by Fullmetal5 and could be used to install BootMii as boot2 on [[Bollywood]] Wii consoles with a patched boot1. | + | These leaked files also led to the discovery of a software tool used in the [[Wii Factory Process]] called sd_boot. This contained a vulnerability, which was found by Fullmetal5 and could be used to install BootMii as boot2 on [[Bollywood]] Wii consoles with a patched boot1. |
| | | |
| {{DEFAULTSORT:unsorted.7z}} | | {{DEFAULTSORT:unsorted.7z}} |