Why not? (Not that I'm promoting it)This wouldn't work as a CIA, due to it being an app for emuNAND creation.
Why not? (Not that I'm promoting it)This wouldn't work as a CIA, due to it being an app for emuNAND creation.
What ? That's not even true.Because hardly anyone would use a CFW in sysNAND.
Because you can't do it when you're already on sysNAND with signpatched 9.3+ firm? And why would it have issues ? I don't understand why would seeddb.bin be an issue.Fine: why would you install a CIA to make an emuNAND for CFW in sysNAND, when you can just use the CTRBootManager or other loader method. Plus, sysNAND CFW would have issues, such as seeddb.bin (9.6+)
NAND XORpads are identical between SysNAND and EmuNAND - that's why there's only one option .CTRNAND padgen... also make sure it's the one for emuNAND
I just detailed the reasons why there is no CIA in the Decrypt9 thread... quoting myself:Because you can't do it when you're already on sysNAND with signpatched 9.3+ firm? And why would it have issues ? I don't understand why would seeddb.bin be an issue.
Also, in fact, if I did a CIA, we'd have even more noobs in here asking why it doesn't work from their 10.x EmuNAND.A CIA would be possible, but not in a form that you would be using. You'd need to (a) install and run it from SysNAND, (b) have signatures patched (in SysNAND) to run this) and (c) you would still be forced to reboot after using Decrypt9. Sounds great still? Doubt so.
We're still going to have them unless we all vanish from gbatemp lolNAND XORpads are identical between SysNAND and EmuNAND - that's why there's only one option .
I just detailed the reasons why there is no CIA in the Decrypt9 thread... quoting myself:
Also, in fact, if I did a CIA, we'd have even more noobs in here asking why it doesn't work from their 10.x EmuNAND.
For the noobs, you're right, indeed. But I still think it would be great, as I boot from signpatched sysNAND right after pressing the power button. I'll try to do it myself, tho, but thanksI just detailed the reasons why there is no CIA in the Decrypt9 thread... quoting myself:
Also, in fact, if I did a CIA, we'd have even more noobs in here asking why it doesn't work from their 10.x EmuNAND.
If you want to do it yourself, the FTP-GMX sourcecode (more specifically, the Makefile) is a godsend. You can convert the .elf via a few simple commands into a .cia, or put the neccessary steps into the Makefile.For the noobs, you're right, indeed. But I still think it would be great, as I boot from signpatched sysNAND right after pressing the power button. I'll try to do it myself, tho, but thanks
Thanks a lot I guess I'll edit this post when it'll be done!If you want to do it yourself, the FTP-GMX sourcecode (more specifically, the Makefile) is a godsend. You can convert the .elf via a few simple commands into a .cia, or put the neccessary steps into the Makefile.
I think we'll get that solved... @piratesephiroth, any idea what may be going wrong there? And one idea of my own: You know that you need to use the .ELF from /brahmaloader/output/ (not just /output/)? To get it, basically just run 'make brahma'.So, I'm encountering some issues. I took the BrahmaLoader ELF and converted it to a CIA, but it doesn't work. When I run it, it comes back to the Home Menu. But I can run Decrypt9/EmuNAND9Tool from HBL_CIA using the 3DSX without any problem.
Yup, as I said, I used the BrahmaLoader ELF. I tried to edit the BrahmaLoader AppInfo to load a payload from SD (//Decrypt9WIP.bin), and same issue.I think we'll get that solved... @piratesephiroth, any idea what may be going wrong there? And one idea of my own: You know that you need to use the .ELF from /brahmaloader/output/ (not just /output/)? To get it, basically just run 'make brahma'.
I don't really know what you did differently in Decrypt9/Emunand9 that make them work fine from a CIA in pasta mode. I tried other brahma apps and they always just exit back to the home menu.I think we'll get that solved... @piratesephiroth, any idea what may be going wrong there? And one idea of my own: You know that you need to use the .ELF from /brahmaloader/output/ (not just /output/)? To get it, basically just run 'make brahma'.
I can get brahma2 as a cia to load which can load decrypt9Yup, as I said, I used the BrahmaLoader ELF. I tried to edit the BrahmaLoader AppInfo to load a payload from SD (//Decrypt9WIP.bin), and same issue.
Nope, brahma2 as CIA fails to exploit ARM9 properly when unmodified.I can get brahma2 as a cia to load which can load decrypt9
nvm :-(Nope, brahma2 as CIA fails to exploit ARM9 properly when unmodified.
I removed the libkhax init and it works. I guess it should be the same for BrahmaLoader. (and I'm on 9.2 FIRM)
Would it be possible to edit CakeBrah to load Decrypt9 instead?I tried to apply the same modification to BrahmaLoader, and it fails to run. I also tried to edit the AppInfo with that modification, no success.
Seems like a BrahmaLoader issue to me.