Talk:Pokémon data substructures (Generation III): Difference between revisions

no edit summary
No edit summary
No edit summary
Line 24: Line 24:
Using little endian. This means for every word (two bytes), you reverse the order of the bytes. The encryption and decryption will work as long as you keep the order the same for the key and the data.
Using little endian. This means for every word (two bytes), you reverse the order of the bytes. The encryption and decryption will work as long as you keep the order the same for the key and the data.
[[User:Twigpi|Twigpi]] 14:01, 29 October 2007 (UTC)
[[User:Twigpi|Twigpi]] 14:01, 29 October 2007 (UTC)
== Decryption Steps ==
I think this article needs to be more specific about the decryption. I wanted to verify some of the game mechanics so I learned all about the data structures and how to decrypt them. But I'm having problems because I don't know exactly how to do this. I've tried tons of combinations and nothing is turning out right. My personality is ef 4c 3c 98. My OT ID is 8d ea e7 bf. My checksum is b1 4b. (All are in normal order, not little endian.) Can anyone point out what I'm doing wrong? I've read all the information in the article and the talk page but can't figure it out. Here's the steps I take to decrypt:
*Open Game And Memory Viewer
*Jump To Pokemon Data Location
*Record Personality, OT ID, and Checksum In 16 Bit Little Endian
*Record Substructures In Order They Appear In Memory
*Break Substructures Into Groups Of 4
*Arrange Groups In 16 Bit Little Endian
*XOR Personality And OT ID
*XOR Result And Each Group In Order
*Repeat Until All Are Decrypted
*Add All Results Up
*Mod Sum By 10000
*Result Should Match Checksum (Right?)
*Convert Personality To Decimal
*Mod Personality By 24
*Result Determines Data Locations
--[[User:EV Love|EV Love]] 16:41, 11 July 2008 (UTC)
174

edits