As of r1993 PRX decryption has been restricted to boot modules, to avoid the crashes BlackDaemon was referring to.
Also, the TMP folder handling has been improved, as requested by Darth1701. It can now be changed to any other folder, plus, it also supports decrypted EBOOT.BIN extraction.
The EBOOT.BIN extraction has to be turned on under Options>Configuration>Crypto>"Extract decrypted EBOOT.BIN to TMP folder". Also, only one file at a time is extracted, because it's not possible to keep trace of the game's DISC ID during the Loader stages without some tough code changes. Fortunately, this also works as a great anti-piracy measure.
If you haven't figure out yet, JPCSP allows reading of unpacked boot modules, which means you can place your decrypted boot module in the working directory and it will be loaded instead of the ISO/CSO's original EBOOT.BIN/BOOT.BIN.
All you have to do is name it as [DISC ID].BIN and place it were you have your start batch file.
So, if you load a game with this option turned on, it's decrypted EBOOT.BIN will be stored in the current TMP folder in a EBOOT folder. All you have to do next is manually rename it to [DISC ID].BIN and copy it to the working directory to save the emulator a call to the CryptoEngine.
Also, the TMP folder handling has been improved, as requested by Darth1701. It can now be changed to any other folder, plus, it also supports decrypted EBOOT.BIN extraction.
The EBOOT.BIN extraction has to be turned on under Options>Configuration>Crypto>"Extract decrypted EBOOT.BIN to TMP folder". Also, only one file at a time is extracted, because it's not possible to keep trace of the game's DISC ID during the Loader stages without some tough code changes. Fortunately, this also works as a great anti-piracy measure.
If you haven't figure out yet, JPCSP allows reading of unpacked boot modules, which means you can place your decrypted boot module in the working directory and it will be loaded instead of the ISO/CSO's original EBOOT.BIN/BOOT.BIN.
All you have to do is name it as [DISC ID].BIN and place it were you have your start batch file.
So, if you load a game with this option turned on, it's decrypted EBOOT.BIN will be stored in the current TMP folder in a EBOOT folder. All you have to do next is manually rename it to [DISC ID].BIN and copy it to the working directory to save the emulator a call to the CryptoEngine.