6,576
edits
Release 2407 and 2409
Continuous releases have started! Read more on our blog: Dolphin Progress Report: Release 2407 and 2409. |
The Dolphin Emulator Wiki needs your help! Dolphin can play thousands of games, and changes are happening all the time. Help us keep up! Join in and help us make this the best resource for Dolphin. |
mNo edit summary |
mNo edit summary |
||
Line 8: | Line 8: | ||
Access BootMii through the '''Homebrew Channel'''. Use a GameCube Controller or the Power and Reset buttons to navigate through the BootMii menus, as detailed [https://bootmii.org/faq/ here]. Select '''Options''' (gears icon) on the far right. Select '''Backup NAND''' (Green arrow from chip to the SD card), and wait until it completes. Once completed, remove the SD card and put it into your system. You should see a file named '''nand.bin''' on the SD Card. If you do, your NAND has been backed up. | Access BootMii through the '''Homebrew Channel'''. Use a GameCube Controller or the Power and Reset buttons to navigate through the BootMii menus, as detailed [https://bootmii.org/faq/ here]. Select '''Options''' (gears icon) on the far right. Select '''Backup NAND''' (Green arrow from chip to the SD card), and wait until it completes. Once completed, remove the SD card and put it into your system. You should see a file named '''nand.bin''' on the SD Card. If you do, your NAND has been backed up. | ||
== | == Automatic Import with Dolphin 5.0-3416 or newer == | ||
Select Tools > Import BootMii NAND Backup. Dolphin will decrypt and unpack the NAND. Device credentials and system files required for network services emulation will also be extracted automatically. | Select Tools > Import BootMii NAND Backup. Dolphin will decrypt and unpack the NAND. Device credentials and system files required for network services emulation will also be extracted automatically. | ||
=== | == Manual Import == | ||
=== Extracting NAND files on Linux === | |||
# '''Extract''' the AES IV from keys.bin: <code>dd if=keys.bin of=aes-iv bs=1 skip=360 count=16</code> | |||
# '''Extract''' the per-console NAND key from keys.bin. | |||
# '''Decrypt''' the NAND image: <code>openssl enc -d -aes-128-cbc -in nand.bin -out nand-decrypted.bin -K $(hexdump -v -e '/1 "%02X"' < nand-key) -iv $(hexdump -v -e '/1 "%02X"' < aes-iv) -nopad</code> | |||
# '''Unpack''' the decrypted NAND image using zestig. | |||
=== Extracting NAND files on Windows === | |||
=== | |||
Use [http://forums.dolphin-emu.org/attachment.php?aid=1383 NAND Tools] consisting of the followings to extract the files from '''nand.bin''': | Use [http://forums.dolphin-emu.org/attachment.php?aid=1383 NAND Tools] consisting of the followings to extract the files from '''nand.bin''': | ||
*cmd.lnk | *cmd.lnk | ||
Line 54: | Line 51: | ||
| It will close command prompt. | | It will close command prompt. | ||
|} | |} | ||
The new folder <var>\nand\</var> will be created in the working directory | The new folder <var>\nand\</var> will be created in the working directory. | ||
=== | === Placing the NAND files into Dolphin === | ||
'''SYSCONF''' files from real consoles can lack some sections that Dolphin versions earlier than {{revision|5.0-4416}} can't handle correctly. Dolphin has its own, unique '''SYSCONF''' file from <var>\Wii\shared2\sys\</var>. Use it to overwrite on top of your console's '''SYSCONF''' file in <var>\nand\shared2\sys\</var> (under NAND tools' working directory), | # Unless you're using {{revision|5.0-4416}} or newer, '''SYSCONF''' files from real consoles can lack some sections that Dolphin versions earlier than {{revision|5.0-4416}} can't handle correctly. Dolphin has its own, unique '''SYSCONF''' file from <var>\Wii\shared2\sys\</var>. Use it to overwrite on top of your console's '''SYSCONF''' file in <var>\nand\shared2\sys\</var> (under NAND tools' working directory). | ||
# Finally, place everything from <var>\nand\</var> into the <var>\Wii\</var> subdirectory. | |||
== Help == | == Help == |
edits