aboutsummaryrefslogtreecommitdiff
path: root/examples/io/system573/iso.xml
blob: 22260893281551a74bec6a81509a523047a434ae (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
<?xml version="1.0" encoding="utf-8"?>
<iso_project
	image_name="${CD_IMAGE_NAME}.bin"
	cue_sheet="${CD_IMAGE_NAME}.cue"
>
	<track type="data">
		<identifiers
			system			="PLAYSTATION"
			volume			="SYSTEM573"
			volume_set		="SYSTEM573"
			publisher		="MEIDOTEK"
			data_preparer	="PSN00BSDK ${PSN00BSDK_VERSION}"
			application		="PLAYSTATION"
			copyright		="README.TXT;1"
		/>

		<directory_tree>
			<!--
				The System 573 BIOS does not parse SYSTEM.CNF, it's instead
				hardcoded to look for an executable named PSX.EXE. Some modded
				or hacked BIOS variants may instead look for slightly altered
				file names (QSY.DXD, SSW.BXF, TSV.AXG) as an obfuscation
				measure, so it's recommended to have multiple copies of the
				executable on the disc.

				Note that this behavior can be abused to make multi-system CDs
				with different executables for PS1 and 573 (i.e. have both
				PSX.EXE as the 573 executable and SYSTEM.CNF pointing to the
				PS1 executable).
			-->
			<!--<file name="SYSTEM.CNF"	type="data" source="${PROJECT_SOURCE_DIR}/system.cnf" />-->
			<file name="PSX.EXE"	type="data" source="system573.exe" />
			<file name="QSY.DXD"	type="data" source="system573.exe" />
			<file name="SSW.BXF"	type="data" source="system573.exe" />
			<file name="TSV.AXG"	type="data" source="system573.exe" />

			<dummy sectors="1024"/>
		</directory_tree>
	</track>

	<!--<track type="audio" source="track2.wav" />-->
</iso_project>