aboutsummaryrefslogtreecommitdiff
path: root/examples/io/system573/iso.xml
blob: d22665c9b558dbea39c4bdc7a69c68f36eea2067 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
<?xml version="1.0" encoding="utf-8"?>
<iso_project>
	<track type="data">
		<identifiers
			system			="PLAYSTATION"
			volume			="SYSTEM573"
			volume_set		="SYSTEM573"
			publisher		="MEIDOTEK"
			data_preparer	="PSN00BSDK ${PSN00BSDK_VERSION}"
			application		="PLAYSTATION"
			copyright		="README.TXT;1"
		/>

		<directory_tree>
			<!--
				The System 573 BIOS does not parse SYSTEM.CNF, it's instead
				hardcoded to look for an executable named PSX.EXE. Some modded
				or hacked BIOS variants may instead look for slightly altered
				file names (QSY.DXD, SSW.BXF, TSV.AXG, GSE.NXX, NSE.GXX) as an
				obfuscation measure, so it's recommended to have multiple
				copies of the executable on the disc.

				Note that this behavior can be abused to make multi-system CDs
				with different executables for PS1 and 573 (i.e. have both
				PSX.EXE as the 573 executable and SYSTEM.CNF pointing to the
				PS1 executable).
			-->
			<!--<file name="SYSTEM.CNF"	type="data" source="${PROJECT_SOURCE_DIR}/system.cnf" />-->
			<file name="PSX.EXE"	type="data" source="system573.exe" />
			<file name="QSY.DXD"	type="data" source="system573.exe" />
			<file name="SSW.BXF"	type="data" source="system573.exe" />
			<file name="TSV.AXG"	type="data" source="system573.exe" />
			<file name="GSE.NXX"	type="data" source="system573.exe" />
			<file name="NSE.GXX"	type="data" source="system573.exe" />

			<dummy sectors="1024"/>
		</directory_tree>
	</track>

	<!--<track type="audio" source="track2.wav" />-->
</iso_project>