mirror of
https://github.com/citra-emu/citra.git
synced 2024-11-23 03:00:10 +00:00
Use en dashes instead of hyphens for section typesetting.
parent
f4fd21550b
commit
94f73845df
@ -44,15 +44,15 @@ For now the procedure to dump the Config Savegame is Linux-only. It assumes you
|
|||||||
- A 3DS with a firmware of 9.2 or lower
|
- A 3DS with a firmware of 9.2 or lower
|
||||||
- A SD Card to contain the dumped NAND (> 1GB)
|
- A SD Card to contain the dumped NAND (> 1GB)
|
||||||
|
|
||||||
#### **Step 1 - Dumping NAND**
|
#### **Step 1 – Dumping NAND**
|
||||||
Boot the [gateway launcher](http://www.gateway-3ds.com/downloads) using the Launcher.dat file placed at the root of the SD Card and accessing 'http://dukesrg.no-ip.org/3ds/go'.
|
Boot the [gateway launcher](http://www.gateway-3ds.com/downloads) using the Launcher.dat file placed at the root of the SD Card and accessing 'http://dukesrg.no-ip.org/3ds/go'.
|
||||||
Select the option `Backup System NAND` and press `START` to dump your NAND to your SD card. The SD card should then contain a file `NAND.bin`.
|
Select the option `Backup System NAND` and press `START` to dump your NAND to your SD card. The SD card should then contain a file `NAND.bin`.
|
||||||
|
|
||||||
#### Step 2 - **Generating NAND Xorpad**
|
#### Step 2 – **Generating NAND Xorpad**
|
||||||
The NAND.bin file dumped in the previous step is encrypted. To decrypt it, we need to generate xorpads. Overwrite the Launcher.dat on your SD card with the one included in the [Decrypt9](https://github.com/archshift/Decrypt9) package. Boot the latter using the browser exploit as in Step 1.
|
The NAND.bin file dumped in the previous step is encrypted. To decrypt it, we need to generate xorpads. Overwrite the Launcher.dat on your SD card with the one included in the [Decrypt9](https://github.com/archshift/Decrypt9) package. Boot the latter using the browser exploit as in Step 1.
|
||||||
Select the `CTRNAND Padgen` option to generate the NAND xorpad. You will then have a `nand.fat16.xorpad` file.
|
Select the `CTRNAND Padgen` option to generate the NAND xorpad. You will then have a `nand.fat16.xorpad` file.
|
||||||
|
|
||||||
#### Step 3 - **Decrypt and mount NAND**
|
#### Step 3 – **Decrypt and mount NAND**
|
||||||
Having both `NAND.bin` and `nand.fat16.xorpad` on your computer, use [3DSFAT16tool](https://github.com/d0k3/3DSFAT16tool) to decrypt and mount your NAND.
|
Having both `NAND.bin` and `nand.fat16.xorpad` on your computer, use [3DSFAT16tool](https://github.com/d0k3/3DSFAT16tool) to decrypt and mount your NAND.
|
||||||
|
|
||||||
gcc -std=gnu99 3DSFAT16tool.c -o 3DSFAT16tool
|
gcc -std=gnu99 3DSFAT16tool.c -o 3DSFAT16tool
|
||||||
@ -61,7 +61,7 @@ Having both `NAND.bin` and `nand.fat16.xorpad` on your computer, use [3DSFAT16to
|
|||||||
|
|
||||||
You should now be able to browse the content of your NAND.
|
You should now be able to browse the content of your NAND.
|
||||||
|
|
||||||
#### Step 4 - **Extract the Config Savegame**
|
#### Step 4 – **Extract the Config Savegame**
|
||||||
The Config Savegame file is `<some-mount-point>/data/<unique-ID>/sysdata/00010017/00000000` but it's in IVFC format and Citra want the bare file content so we need to extract the latter using [3dsfuse](https://github.com/3dshax/3ds).
|
The Config Savegame file is `<some-mount-point>/data/<unique-ID>/sysdata/00010017/00000000` but it's in IVFC format and Citra want the bare file content so we need to extract the latter using [3dsfuse](https://github.com/3dshax/3ds).
|
||||||
|
|
||||||
./3dsfuse <some-mount-point>/data/<unique-id>/sysdata/00010017/00000000 --nowear <some-other-mount-point>
|
./3dsfuse <some-mount-point>/data/<unique-id>/sysdata/00010017/00000000 --nowear <some-other-mount-point>
|
||||||
|
Loading…
Reference in New Issue
Block a user