Okay, so I'm stuck in a place. I'm trying to extract OSDSYS resources from PS2 ROM, for future purposes like a open-source and MIT-licenced PS2 UI library and OSDSYS, and to create free alternatives for these same resources I'm trying to extract. I have a few questions: 1. Is there compression or encryption used on OSDSYS resources or modules (anything besides TOOLs, PS3, PSX, PSBBN)? I know that the older OSDSYS used in SCPH-10000 had most of the resources embedded in the main OSDSYS elf and was not packed, but there is also additional resources/modules that seem to be encrypted. I also know that I can use ADPCM tools to find sound resources in the older OSDSYS ELF, but I can't find any ADPCM resources in the newer OSDSYS ELF or SNDIMAGE. 2. For HDDOSD, the HDD-installable OSDSYS update, FNTOSD, ICOIMAGE, JISUCS, SKBIMAGE, SNDIMAGE, and TEXIMAGE seem to be encrypted. Does this encryption involve the mechanics controller or is it a different type of encryption?
I have not attempted to access the resources, but I think it is more likely that they were simply compressed to save space. There should be no involvement of MagicGate because there is no API within the HDD Browser for involving SECRMAN's functions directly (there needs to be a SIFRPC server and client, like secrsif). When these browsers load a protected program (i.e. DVD Player), SECRMAN is involved by MODLOAD instead, for the loading of protected programs.
Using PCSX2 or a PS2 with Kermit / RDB Startup Card should enable reading the raw data from EE RAM. For example, the PS1DRV of DECKARD models is compressed and simply extracting the compressed image from the binary and then opening it with 7zip is enough to extract it, but I don't know if the case with the resources of OSDSYS is the same. OSDSYS seems to be different, though.