ErikPshat,
эээ... Ну, забирай:
Сообщение от Proxima
Here's an overall process that worked for me:
1. Use PRXDecrypter or other like app to decrypt a demo game DATA.PSP. Just before it calls KIRK1, add a step to dump the KIRK1 message with header.
2. Zero out the data section of the KIRK1 message. Copy your homebrew ELF into it.
3. Look at the original PSP header and get the entry point and mod info offset it expects
4. Put a couple of lines of code at the expected entry point to jump to the real entrypoint of your own ELF
5. copy the modinfo section from your ELF to the address indicated by the original header.
6. Re-encrypt the new KIRK1 data section with the KIRK key (AES Key from Header)
7. Do a few xor of the last 16 bytes to make it result in the correct CMAC value (decode the CMAC data hash to see what the correct value needs to be)
8. Copy the data back to the original data.psp (at 0x150). pack-pbp the new data.psp along with your favorite param.sfo and icon files.
If the original game was compressed, you need to add step 5b. gzip the entire data section (0x110-EOF) and re-paste it into the file.
Enjoy!
|
Сообщение от ErikPshat
Yoti, можешь объяснить, как TN-C подписанный получился на 420 кб?
|
Сообщение от ErikPshat
Какой валидный заголовок, какие демки?
|
Сообщение от Libre
I saw that Total Noob did it with his last TN-C HEN, using the psp & kirk header from the everybodys sukkiri demo.
|
Последний раз редактировалось Yoti; 25.01.2011 в 23:40.
|