Changes

Jump to navigation Jump to search

Nintendo 3DS emulators

1 byte removed, 5 February
m
Game images
Due to one format being so far restricted to overpriced flashcarts and the very slow Citra development (meaning playing on an actual 3DS is still the preferred way to go), the CIA format is preferred in many sharing websites, downloader tools and even tools to dump your own games.
However, converting a CIA image to 3DS format (and vice-versa) is still possible with no loss of content. Read the Encryption section below for a guide.
Some outdated dumping utilities intended for use with Citra (like braindump) produce damaged decrypted 3DS images that can't be easily converted back. No known solution exists so far to fix those dumps.
The game changer was the sighax exploit, which allowed for the dumping of the 3DS bootrom, which includes these encryption keys. This file can be downloaded from the [[Emulator Files#Nintendo 3DS|Emulator Files]] page. You can then use a program like '''[https://gbatemp.net/threads/tutorial-extract-decrypt-games-nand-backups-and-sd-contents-with-fuse-3ds.499994/ fuse-3ds]''' to decrypt games using this file. Simply place boot9.bin in the same folder, run the program, mount the encrypted CIA or 3DS, and find the '''decrypted.cxi''' file inside (usually in the first folder). Citra should be able to load this file without issues.
Due to these keys being available, Citra can now play encrypted games (3DS or CIA) without decrypting them. Read [https://citra-emu.org/wiki/aes-keys this page]. Then, go to this Reddit page and copy the code from the [https://www.reddit.com/r/CemuPiracy/comments/gpo2ey/aes_key_nintendo_3ds_title_keys_for_citra second comment] (credit floppydoppy2). Copy it and make a new TXT file named '''aes_keys.txt'''. Place this TXT file in the sysdata folder of Citra's user directory. This key file is already included in the 3DS Shared Data download in the [[Emulator files#Nintendo_3DS|Emulator Files]] page.
==Emulation issues==
399
edits

Navigation menu