These files contain data relating to install/usage/management of installed 3DS titles. The database files are located at:
- sdmc/Nintendo 3DS/<ID0>/<ID1>/dbs
ID0 is the first 0x10-bytes from a SHA256 hash. The installation of SD Card titles was introduced in the 2.0.0-2 update and the SD dbs files are encrypted by the general SD filesystem encryption rule. These files are DIFF containers. These DIFF files do not use external IVFC level 4, so all database data is duplicated in the container. In this page only the inner content of the container is described.
These files are stored under this directory:
|Stored on SD card||Stored in CTR-NAND||Filename||CTR-9DB0 ID||Description|
|No||Yes||ticket.db||0x0||This contains the installed tickets (NAND and SD).|
|No||Yes||certs.db||0x1||This contains the certificate chain used to verify TMDs and other certificates.|
|Yes||Yes||title.db||0x2||Title database, this contains entries for all installed titles (TWL & CTR) on the 3DS (Each database is responsible for titles installed on its medium).|
|Yes||Yes||import.db||0x3||This is an Import Database, it contains entries for titles (or versions of titles) not yet installed, ready for transferring to the title.db. (Automatic Update uses this, so completing the update takes seconds.)|
|No||Yes||tmp_t.db||0x4||This is the temporary Title database containing one entry for the currently installed Download Play Child.|
|No||Yes||tmp_i.db||0x5||Similar to import.db, except it's used in conjunction with tmp_t.db, for installing Download Play Children.|
The inner content of the container consists of a pre-header with size of 0x80 identifying the Database Type, followed by a BDRI container. The offsets in the BDRI header are usually relative to the offset to the start of the BDRI header (0x80 in the file)
|0x00||8||Database Type "Magic" (see below)|
For ticket.db different pre header is used:
|0x00||4||Database Type "Magic" (see below)|
|0x04||0x04||Unknown (always 0x00000001 ?)|
|0x0C||0x04||Unknown (0x30 smaller than previous one)|
|SD Card import.db||TEMPTDB|
|SD Card title.db||TEMPTDB|
This is a variant of FAT filesystem. It consists one "root" directory and multiple "files". Each "file" is one title info entry described below.
Title Info Entry
An entry contains information taken from both the application NCCH file(s) and TMD.
|0x8||4||Title Type(usually 0x40)|
|0x14||4||TMD Content ID|
|0x18||4||CMD Content ID|
|0x20||4||ExtdataID low (zero if title doesn't use Extdata)|
For ticket.db title info contains a small header and actual ticket data:
|0x0||4||Unknown (always 0x00000001?)|
|0x4||4||Ticket data size X (=0x350)|
|0||SD Save Data|
|0||DSiWare Related (Visibility on Home Menu/Export Flag?)|
|4||Found with DSiWare Titles and titles with an 'Application' Title ID|
|5||DSiWare Related (Visibility on Home Menu/Export Flag?)|
It is important to note the database doesn't contain a hash of the .cmd. So if a user has more than one valid set of application data for a given .cmd Content ID they can be manually interchanged without issue. Though renaming a .cmd file to match the Content ID which the title.db is expecting will result in an error, as the CTR for the per-console encryption layer changes depending on the file path, and the MAC of the .cmd is probably generated with the .cmd Content ID in mind.
These NAND/SD /dbs images seem to be loaded by the ARM9 while NATIVE_FIRM is booting.
Removing ticket.db from a New-3DS with signature checks disabled will not result in an unbootable system, however all icons except Slot-1 will disappear from Home. Applets can however still be used. Recovery can be accomplished via hardmod or arm9loaderhax plus a known good backup of the file (or the whole partition or disk); Gamecard exploits were not tested, and Browserhax did not work.