Changes

Jump to navigation Jump to search
427 bytes added ,  02:22, 3 January 2020
Added more information about unencrypted disc images
Line 119: Line 119:  
|  
 
|  
 
|  
 
|  
| Disable hash verification and make all disc reads fail even before they reach the DVD drive.
+
| Disable hash verification. On retail consoles, this makes all disc reads fail even before they reach the DVD drive.
 
|-
 
|-
 
| 0x061
 
| 0x061
Line 125: Line 125:  
|  
 
|  
 
|  
 
|  
| Disable disc encryption and h3 hash table loading and verification (which effectively also makes all disc reads fail because the h2 hashes won't be able to verify against "something" that will be in the memory of the h3 hash table. none of these two bytes will allow unsigned code)
+
| Disable disc encryption and h3 hash table loading and verification. On retail consoles, this effectively also makes all disc reads fail because the h2 hashes won't be able to verify against "something" that will be in the memory of the h3 hash table. None of these two bytes will allow unsigned code on retail consoles.
 
|-
 
|-
 
| 0x080
 
| 0x080
Line 264: Line 264:  
   
 
   
 
Offset 0x00000000 is considered as the start of the partition.
 
Offset 0x00000000 is considered as the start of the partition.
 +
 +
The offset of the actual partition data is 0x00020000 for normal discs and 0x00008000 for unencrypted discs (discs where 0x61 in the header is non-zero).
    
{| class="wikitable"
 
{| class="wikitable"
Line 306: Line 308:  
| [[TMD]]
 
| [[TMD]]
 
|-
 
|-
| 0x00020000
+
| <tt>varies</tt>
 
| <tt>varies</tt>
 
| <tt>varies</tt>
 
| Partition Data
 
| Partition Data
Line 315: Line 317:  
===== Encrypted =====
 
===== Encrypted =====
   −
Partition data is encrypted using a key, which can be obtained from the partition header and the master key. The actual partition data starts at offset 0x20000 in the partition, and it is formatted in "clusters" of size 0x8000 (32k). Each one of these blocks consists of 0x400 bytes of encrypted SHA-1 hash data, followed by 0x7C00 bytes of encrypted user data. The 0x400 bytes SHA-1 data is encrypted using AES-128-CBC, with the partition key and a null (all zeroes) IV. Clusters are aggregated into subgroups of 8 clusters, and 8 subgroups are aggregated into one group of 64 clusters. The plaintext format is as follows:
+
For discs where 0x61 in the disc header is non-zero, skip this section and go to [[#Decrypted]]. (Such discs don't work on retail consoles.)
 +
 
 +
Partition data is encrypted using a key, which can be obtained from the partition header and the master key. The actual partition data starts at an offset into the partition (normally 0x20000), and it is formatted in "clusters" of size 0x8000 (32k). Each one of these blocks consists of 0x400 bytes of encrypted SHA-1 hash data, followed by 0x7C00 bytes of encrypted user data. The 0x400 bytes SHA-1 data is encrypted using AES-128-CBC, with the partition key and a null (all zeroes) IV. Clusters are aggregated into subgroups of 8 clusters, and 8 subgroups are aggregated into one group of 64 clusters. The plaintext format is as follows:
    
{| class="wikitable"
 
{| class="wikitable"
Line 370: Line 374:  
===== Decrypted =====
 
===== Decrypted =====
   −
Once the Partition Data is decrypted, it follows the same formatting as a Gamecube disc for the most part.
+
Once the Partition Data is decrypted (or if it was stored unencrypted to begin with), it follows the same formatting as a Gamecube disc for the most part.
    
{| class="wikitable"
 
{| class="wikitable"
9

edits

Navigation menu