Editing BD Drive Reverse Engineering
Jump to navigation
Jump to search
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 1: | Line 1: | ||
[[Category:Software]] | |||
=Introduction= | =Introduction= | ||
Line 22: | Line 23: | ||
My program to dump EID4 AES-CBC-256 IV and key to PPU memory: | My program to dump EID4 AES-CBC-256 IV and key to PPU memory: | ||
< | <pre> | ||
/* | /* | ||
* Dump EID4 IV and key to EA with MFC | * Dump EID4 IV and key to EA with MFC | ||
Line 127: | Line 128: | ||
bi $lr | bi $lr | ||
</ | </pre> | ||
==Result== | ==Result== | ||
Line 170: | Line 171: | ||
==Program== | ==Program== | ||
< | <pre> | ||
/*- | /*- | ||
* Copyright (C) 2012 glevand <[email protected]> | * Copyright (C) 2012 glevand <[email protected]> | ||
Line 1,083: | Line 1,084: | ||
exit(0); | exit(0); | ||
} | } | ||
</ | </pre> | ||
==Result== | ==Result== | ||
Line 1,111: | Line 1,112: | ||
TODO | TODO | ||
=Inquiry GameOS= | =Inquiry GameOS= | ||
Line 1,249: | Line 1,231: | ||
| 0x20 || 0x4 || "4154" || Product revision level || | | 0x20 || 0x4 || "4154" || Product revision level || | ||
|} | |} | ||