Anonymous

Changes

From Rare Gaming Dump
Add debugger common key for decrypting TADs in NitroFS.
Line 30: Line 30:  
[[File:TWLCartNonWatermark.jpg|thumb|150px|left|Confirmed image of the cartridge. The same cartridge is used for TWL prototypes and other development applications.]]
 
[[File:TWLCartNonWatermark.jpg|thumb|150px|left|Confirmed image of the cartridge. The same cartridge is used for TWL prototypes and other development applications.]]
 
==Uniquely signed TADs==
 
==Uniquely signed TADs==
The TAD files in NitroFS are not development signed<ref>[https://randommeaninglesscharacters.com/dsidev/twlsystemupdater.html Twl SystemUpdater (rmc)]</ref>. Rather than being signed with "maketad.exe" like most TADs, these are signed with "maketad.updater.exe" from TwlIPL which uses an unknown key. Because of this the TAD files cannot currently be decrypted back into SRLs.  
+
The TAD files in NitroFS are not development signed<ref>[https://randommeaninglesscharacters.com/dsidev/twlsystemupdater.html Twl SystemUpdater (rmc)]</ref>. Rather than being signed with "[https://randommeaninglesscharacters.com/dsidev/man/maketad.html maketad.exe]" like most TADs, these are signed with "maketad.updater.exe" from TwlIPL. This tool uses the debugger common key, found in the ARM7 bootrom right after the dev/prod common key. TwlNmenu does not work with debugger key, so you'll need to decrypt the TADs with [https://gist.github.com/rvtr/f1069530129b7a57967e3fc4b30866b4/ this script].  
 +
 
 +
The debugger common key: <code>A2FDDDF2E423574AE7ED8657B5AB19D3</code>
    
The signing process for the updater TADs can be found in the gigaleaks at: '''TwlIPL/trunk/build/systemMenu_tools/SystemUpdater/data/Makefile'''  
 
The signing process for the updater TADs can be found in the gigaleaks at: '''TwlIPL/trunk/build/systemMenu_tools/SystemUpdater/data/Makefile'''