Line 4:
Line 4:
==Contents of the archive==
==Contents of the archive==
−
The archive contained dumps of the "bb" and "ng" development trees from [[Acer Cloud Technology|BroadOn]]'s servers, likely sent from [[Acer Cloud Technology|BroadOn]] to Nintendo. The "ng" tree, inside a TAR file named "depotrvl", contained a CVS repository with the source code for the Wii's [[IOS|input output system]], source code for Wii factory software, the source code for [[boot0]], [[boot1]], and [[boot2]], internal documents and PowerPoint presentations related to [[Acer Cloud Technology|BroadOn]] and Nintendo and the development of the Wii, and much more.
+
The archive contained dumps of the "bb" and "ng" development trees from [[Acer Cloud Technology|BroadOn]]'s servers, likely sent from [[Acer Cloud Technology|BroadOn]] to Nintendo. Here is a list of things that have been found in this data:
+
+
* Source code for [[boot0]], [[boot1]] and [[boot2]]
+
* Source code for [[IOS]]
+
* Source code for the [[DVD]] and [[EXI]] libraries from the [[Wii SDK]]
+
* Block diagram/datasheets for every Wii system component & Verilog for AES/SHA
+
* Documents from BroadOn describing feature planning and implementation, APIs, and documents relating to internal software
+
* Documents from 2004-2006 describing plans for the implementation of the Wii
+
* Miscellaneous Nintendo data, including an internal WPAD SDK from 2005 and a Wii Overview from RVL_SDK 1.0
+
* Internal GameCube documents, including a physical disc layout
+
* iQue related data, located in the "bb" tree, including various documents, tools, and huge CVS code repositories
+
+
People have claimed to have found partial Super Mario 64 source code inside the contents of the "bb" tree.
==sd_boot==
==sd_boot==
−
These leaked files led to the discovery of a software tool used in the [[Wii Factory Process]] called sd_boot. This contained a vulnerability, which was found by Fullmetal5 and could be used to install BootMii as boot2 on [[Bollywood]] Wii consoles with a patched boot1.
+
These leaked files also led to the discovery of a software tool used in the [[Wii Factory Process]] called sd_boot. This contained a vulnerability, which was found by Fullmetal5 and could be used to install BootMii as boot2 on [[Bollywood]] Wii consoles with a patched boot1.
{{DEFAULTSORT:unsorted.7z}}
{{DEFAULTSORT:unsorted.7z}}