Changes

4 bytes added ,  11:40, 25 January 2010
no edit summary
Line 91: Line 91:  
|}
 
|}
   −
Note that the KEY1 and KEY2 commands shown here are already decrypted.
+
Note that the blowfish and lfsr commands shown here are already decrypted.
      Line 146: Line 146:     
So far, this matches up with a normal DS bootup - with minor differences such as CARDID (90) coming before HEADER (00), the header being queried for 0x1000 bytes, and the size of responses changed for some commands from 0x910 to 0x9F8.
 
So far, this matches up with a normal DS bootup - with minor differences such as CARDID (90) coming before HEADER (00), the header being queried for 0x1000 bytes, and the size of responses changed for some commands from 0x910 to 0x9F8.
After these commands, the card is reset and a new sequence starts. A raw read header command (00) is sent, followed by a raw command that always starts with 0x3D. The following commands are all shown in raw format, as I've been unable to decrypt them yet. However, some obvious similarities exist by simply looking at the response size of the commands.
+
After these commands, the card is reset and a new sequence starts. A raw read header command (00) is sent, followed by a raw command that always starts with 0x3D. The following commands are all shown in raw format, as it is impossible to decrypt them yet. However, some obvious similarities exist by simply looking at the response size of the commands.
    
{| class="wikitable" border="1"
 
{| class="wikitable" border="1"
143

edits