You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Removes the need for people to manually enter a xorpad.bin for tools like wwiser. Bank headers (BKHD chunks) are "encrypted" from 0x8-0x10 with this key: ACBC1192387010A3 that is xor'd with the data in the bank to get the proper info for tools to work on them.
Example: Init.bnk (9ba626afa44a3aa3: content/audio/Init.bnk) Before: 20BC11921B4AD6F3 After: 8C000000233AC650
The text was updated successfully, but these errors were encountered:
Hrm, this might be difficult with the way it's implemented right now. I map the used files directly into memory, so it's effectively using the most optimal I/O possible. Converting a section might require an in-memory copy of the are that is encrypted.
Not to mention that this might be outside of the scope of reverse engineering for scientific purposes, which is the only legal way for me to publicly develop this.
Describe the Feature
Removes the need for people to manually enter a xorpad.bin for tools like wwiser. Bank headers (BKHD chunks) are "encrypted" from 0x8-0x10 with this key:
ACBC1192387010A3
that is xor'd with the data in the bank to get the proper info for tools to work on them.Example: Init.bnk (9ba626afa44a3aa3: content/audio/Init.bnk) Before:
20BC11921B4AD6F3
After:8C000000233AC650
The text was updated successfully, but these errors were encountered: