One of the uses of the recently acquired ARM9 bootrom of the 3ds is to perform all 3ds crypto operations without needing a 3ds at all, when before most of these operations needed @d0k3's tools and a modded 3ds. I don't think they have all been implemented however, because I've been looking for a way to decrypt a .cia without a 3DS but I haven't found any tools that can do so yet. @ihaveamac wrote here that ctrtool would be getting an update that could decrypt a .cia using boot9 keys, but that was back in July and I haven't seen any commits in the repo that are related to the boot9 keys. Does anyone know of any tool that uses boot9 so that we don't need a 3ds?
Also, in case anyone was wondering why I want to do this, its for the DSi scene. The DSi shop has been shut down so we need to install our DSiWare's using another method. The easiest way is to extract the .app from a .cia. Hacking9Toolkit3DS is, as far as I know, the only tool for .cias that has the boot9 keys implemented, but it doesn't extract DSiWares, so the way I currently do it is to use ctrtool and call
but that currently requires the .cia to be decrypted. That's fine for me because I have a 3ds to decrypt the .cia with, but I wanted to write a tutorial for it and a lot of DSi users don't have a 3ds. I understand it seems like a niche use, but if anyone can take the time to explain how to use boot9 to decrypt the DSiWares, I'd be very grateful.
Also, in case anyone was wondering why I want to do this, its for the DSi scene. The DSi shop has been shut down so we need to install our DSiWare's using another method. The easiest way is to extract the .app from a .cia. Hacking9Toolkit3DS is, as far as I know, the only tool for .cias that has the boot9 keys implemented, but it doesn't extract DSiWares, so the way I currently do it is to use ctrtool and call
Code:
ctrtool -x -t cia dsiware.cia --contents=000000.app --meta=000000.app
but that currently requires the .cia to be decrypted. That's fine for me because I have a 3ds to decrypt the .cia with, but I wanted to write a tutorial for it and a lot of DSi users don't have a 3ds. I understand it seems like a niche use, but if anyone can take the time to explain how to use boot9 to decrypt the DSiWares, I'd be very grateful.