my research and reverse engineering notes/utilities relating to the Xbox 360 (Mirrored from https://github.com/InvoxiPlayGames/x360-research)

key_derivation: clarify fetching the cpu value

+3
+3
official-software/hypervisor/key_derivation.md
··· 20 20 within XeLL and libxenon applications from the 32-bit address `0x200250B8`. The expected 21 21 value on a regular Xbox 360 has a CRC32 of `0x4B17A409`. (Begins `81300D...`) 22 22 23 + *(Note: If reading from HV or libxenon context, you must make sure this value is fetched 24 + with an "ld" instruction, otherwise the system could lock up.)* 25 + 23 26 *(TODO: It'd be nice to find out what this value means, and what affects it.)* 24 27 25 28 The derivation process consists of calls to XeCryptHmacSha, with the aforementioned key