Changes

2 bytes removed ,  02:18, 18 April 2015
unmasked "hidden" filename of hyperlink
Line 7: Line 7:  
This file contains the unique per-console ECC private-public key pair, along with a certificate issued by Nintendo.
 
This file contains the unique per-console ECC private-public key pair, along with a certificate issued by Nintendo.
   −
This file is created by the DSi Shop, with data from a SOAP reply. The SOAP request data includes the hw console id, and the 0x100-byte RSA signature stored in a NAND [[Nand/sys/HWID.sgn|file]]. Trying to send that request would require a NAND dump, but when you have a NAND dump already sending that request is pointless since you can grab dev.kp from NAND.
+
This file is created by the DSi Shop, with data from a SOAP reply. The SOAP request data includes the hw console id, and the 0x100-byte RSA signature stored in NAND file [[Nand/sys/HWID.sgn]]. Trying to send that request would require a NAND dump, but when you have a NAND dump already sending that request is pointless since you can grab dev.kp from NAND.
    
Sending that request is pointless anyway since the dev.kp data from the server is random. The returned dev.kp data from the server for the EC private/public keys are random, the ticket consoleID immediately following TW before - in the twcert keyid is random as well.
 
Sending that request is pointless anyway since the dev.kp data from the server is random. The returned dev.kp data from the server for the EC private/public keys are random, the ticket consoleID immediately following TW before - in the twcert keyid is random as well.
108

edits