Pastebin launched a little side project called VERYVIRAL.com, check it out ;-) Want more features on Pastebin? Sign Up, it's FREE!
Guest

Untitled

By: a guest on Oct 29th, 2011  |  syntax: None  |  size: 12.52 KB  |  views: 60  |  expires: Never
download  |  raw  |  embed  |  report abuse  |  print
Text below is selected. Please press Ctrl+C to copy to your clipboard. (⌘+C on Mac)
  1. smite@rockbox:~/tmp/rockbox/utils/sbtools$ sudo ./sbtoelf -a "usbotp(066f:3780)" -o FIRMWARE. firmware.sb
  2. Basic info:
  3.   SB version: 1.1
  4.   Header SHA-1: 67 98 27 1B 47 52 3C E2 46 D6 42 8B 6C C4 F4 29 FA 77 B3 16  Ok
  5.   Flags: 100
  6.   Total file size : 44283024
  7. Sizes and offsets:
  8.   # of encryption keys = 1
  9.   # of sections = 16
  10. Versions
  11.   Random 1: 29 F1 73 67 74 6C
  12.   Random 2: 5D C7 5E 4F 32 69
  13.   Creation date/time = Mon Apr 11 11:47:57 2011
  14.   Product version   = 0.3.23
  15.   Component version = 0.3.23
  16.   Drive tag = 50
  17.   First boot tag offset = 18
  18.   First boot section ID = 0x00000000
  19. Encryption data
  20.   Key 0: USB-OTP(066f:3780)
  21.     CBC-MAC of headers: 6A 2E F0 78 32 C5 8A EA 08 6D 7E 6B 91 4B 1A 20  Ok
  22.     Encrypted key     : 02 6C 78 58 B9 F5 39 23 47 1D 9E C4 B9 7F 4B 1C
  23.     Decrypted key     : 75 3C 70 EA AC 95 A0 B9 3E 4B DC 24 03 65 8D 24
  24.   Summary:
  25.     Real key: 75 3C 70 EA AC 95 A0 B9 3E 4B DC 24 03 65 8D 24
  26.     IV      : 67 98 27 1B 47 52 3C E2 46 D6 42 8B 6C C4 F4 29
  27. Sections
  28.   Section '____'
  29.     pos   =      190 -     6e00
  30.     len   =     6c70
  31.     flags =        1  Boot Section (Encrypted)
  32.       LOAD | addr=0x00000000 | len=0x00001d44 | crc=0xe93b78b5  Ok
  33.       LOAD | addr=0x00001d44 | len=0x00000064 | crc=0xd629ceef  Ok
  34.       LOAD | addr=0x00001da8 | len=0x00000009 | crc=0x84fd58a8  Ok
  35.       FILL | addr=0x00001db4 | len=0x0000003b | pattern=0x00000000
  36.       FILL | addr=0x00001df0 | len=0x00000800 | pattern=0x00000000
  37.       CALL | addr=0x0000018c | arg=0x00000000
  38.       write FIRMWARE.____.0.elf
  39.       LOAD | addr=0x00000000 | len=0x00003044 | crc=0x7aef7c1f  Ok
  40.       LOAD | addr=0x00003044 | len=0x000000ac | crc=0x77c4eecc  Ok
  41.       LOAD | addr=0x000030f0 | len=0x0000002a | crc=0x8ad18f88  Ok
  42.       FILL | addr=0x0000311c | len=0x000000c9 | pattern=0x00000000
  43.       FILL | addr=0x000031e8 | len=0x00000800 | pattern=0x00000000
  44.       FILL | addr=0x000039e8 | len=0x00000004 | pattern=0x00000000
  45.       CALL | addr=0x0000019c | arg=0x00000000
  46.       write FIRMWARE.____.1.elf
  47.       LOAD | addr=0x00000000 | len=0x000019d8 | crc=0x0bc62e91  Ok
  48.       LOAD | addr=0x000019d8 | len=0x0000021c | crc=0x8b59414d  Ok
  49.       LOAD | addr=0x00001bf4 | len=0x0000000e | crc=0x66bc53a4  Ok
  50.       FILL | addr=0x00001c04 | len=0x000000cc | pattern=0x00000000
  51.       FILL | addr=0x00001cd0 | len=0x00000800 | pattern=0x00000000
  52.       FILL | addr=0x000024d0 | len=0x00000004 | pattern=0x00000000
  53.       CALL | addr=0x0000009c | arg=0x00000000
  54.       write FIRMWARE.____.2.elf
  55.       CALL | addr=0x000000d0 | arg=0x6c62615f
  56.       write FIRMWARE.____.3.elf
  57.       CALL | addr=0x00000114 | arg=0x6d6c635f
  58.       write FIRMWARE.____.4.elf
  59.   Section 'mlc_'
  60.     pos   =     6e10 -    52630
  61.     len   =    4b820
  62.     flags =        1  Boot Section (Encrypted)
  63.       LOAD | addr=0x00000000 | len=0x00000bec | crc=0xa68c8ec1  Ok
  64.       LOAD | addr=0x00000bec | len=0x000001d4 | crc=0x9c5eabfe  Ok
  65.       LOAD | addr=0x00000dc0 | len=0x00000004 | crc=0xf2bb7be1  Ok
  66.       FILL | addr=0x00000dc4 | len=0x00000013 | pattern=0x00000000
  67.       CALL | addr=0x00000134 | arg=0x00000001
  68.       write FIRMWARE.mlc_.0.elf
  69.       LOAD | addr=0x00000000 | len=0x00000400 | crc=0x0250bc79  Ok
  70.       LOAD | addr=0x00000400 | len=0x00001970 | crc=0xfae96c0a  Ok
  71.       LOAD | addr=0x40034400 | len=0x00001890 | crc=0x55ed0d5d  Ok
  72.       LOAD | addr=0x40054908 | len=0x0001c614 | crc=0xd3510440  Ok
  73.       LOAD | addr=0x40070f1c | len=0x00000004 | crc=0x25957235  Ok
  74.       LOAD | addr=0x40070f20 | len=0x0000000a | crc=0xf48cd038  Ok
  75.       LOAD | addr=0x40070f2c | len=0x00000054 | crc=0x960d1785  Ok
  76.       LOAD | addr=0x40070f80 | len=0x0000010c | crc=0x3d09d76a  Ok
  77.       LOAD | addr=0x4007108c | len=0x00000043 | crc=0x6bbe6aa7  Ok
  78.       LOAD | addr=0x400710d0 | len=0x0002ab34 | crc=0x626a36c4  Ok
  79.       JUMP | addr=0x40072838 | arg=0x00000000
  80.       write FIRMWARE.mlc_.1.elf
  81.   Section 'host'
  82.     pos   =    52640 -    78630
  83.     len   =    25ff0
  84.     flags =        1  Boot Section (Encrypted)
  85.       LOAD | addr=0x00000000 | len=0x00000400 | crc=0x858ff8ad  Ok
  86.       LOAD | addr=0x00002400 | len=0x000001d8 | crc=0xb7589894  Ok
  87.       LOAD | addr=0x00002c28 | len=0x00001924 | crc=0x27a976c9  Ok
  88.       LOAD | addr=0x0000454c | len=0x00000004 | crc=0xa17f00aa  Ok
  89.       LOAD | addr=0x00004550 | len=0x0000000a | crc=0x75b83296  Ok
  90.       LOAD | addr=0x0000455c | len=0x00000050 | crc=0xf4efeacc  Ok
  91.       LOAD | addr=0x000045ac | len=0x00000014 | crc=0x740b0ac1  Ok
  92.       LOAD | addr=0x4001c000 | len=0x00002574 | crc=0x17b1ad6e  Ok
  93.       LOAD | addr=0x40185000 | len=0x0000ea40 | crc=0xc3fe13c1  Ok
  94.       LOAD | addr=0x40194000 | len=0x00000610 | crc=0xa0c85d20  Ok
  95.       LOAD | addr=0x40195000 | len=0x00000254 | crc=0x4e027e94  Ok
  96.       LOAD | addr=0x401c0000 | len=0x0000063c | crc=0x69fd7898  Ok
  97.       LOAD | addr=0x401c4000 | len=0x0001111e | crc=0x48e7a9bb  Ok
  98.       LOAD | addr=0x401d5120 | len=0x00000ef8 | crc=0x57a51938  Ok
  99.       LOAD | addr=0x401d664c | len=0x000000b4 | crc=0x5774bf90  Ok
  100.       JUMP | addr=0x401c4df0 | arg=0x00000000
  101.       write FIRMWARE.host.0.elf
  102.   Section 'play'
  103.     pos   =    78640 -   1055b0
  104.     len   =    8cf70
  105.     flags =        1  Boot Section (Encrypted)
  106.       LOAD | addr=0x40001000 | len=0x00000020 | crc=0x96a7f638  Ok
  107.       LOAD | addr=0x40001020 | len=0x00000008 | crc=0x5dfd2cc5  Ok
  108.       LOAD | addr=0x40001028 | len=0x0000000c | crc=0xe4dad6fc  Ok
  109.       LOAD | addr=0x40001034 | len=0x00000004 | crc=0xdcace36f  Ok
  110.       LOAD | addr=0x40001038 | len=0x00000004 | crc=0x1f9f93f5  Ok
  111.       LOAD | addr=0x4000143c | len=0x00003b60 | crc=0x5aac19fc  Ok
  112.       LOAD | addr=0x40004f9c | len=0x0004b234 | crc=0xc0cbbebc  Ok
  113.       LOAD | addr=0x400501d0 | len=0x00000098 | crc=0x15191bd7  Ok
  114.       FILL | addr=0x40050268 | len=0x00000170 | pattern=0x00000000
  115.       CALL | addr=0x4000175c | arg=0x00000000
  116.       write FIRMWARE.play.0.elf
  117.       LOAD | addr=0x00000000 | len=0x00000400 | crc=0x1f30d9ab  Ok
  118.       LOAD | addr=0x0000285c | len=0x00001a94 | crc=0xab152fb9  Ok
  119.       LOAD | addr=0x000042f0 | len=0x00000004 | crc=0x04c42e03  Ok
  120.       LOAD | addr=0x000042f4 | len=0x0000000a | crc=0x1c77e649  Ok
  121.       LOAD | addr=0x00004300 | len=0x00000050 | crc=0x84e94ab9  Ok
  122.       LOAD | addr=0x00004350 | len=0x00000014 | crc=0xa2d0911c  Ok
  123.       LOAD | addr=0x4001c000 | len=0x0000280c | crc=0xb518b742  Ok
  124.       LOAD | addr=0x401ca000 | len=0x000155f0 | crc=0x6299a731  Ok
  125.       LOAD | addr=0x401e0000 | len=0x00000488 | crc=0xf7f07fa2  Ok
  126.       LOAD | addr=0x401e0488 | len=0x0000ce04 | crc=0xb5d6283f  Ok
  127.       LOAD | addr=0x401ed28c | len=0x00002230 | crc=0x7153302f  Ok
  128.       LOAD | addr=0x401ef4bc | len=0x00001bcc | crc=0x68589ac3  Ok
  129.       LOAD | addr=0x401f3000 | len=0x0000063c | crc=0x1db563ff  Ok
  130.       LOAD | addr=0x401f7000 | len=0x00011b4a | crc=0x69d672da  Ok
  131.       LOAD | addr=0x40208b4c | len=0x00000ef8 | crc=0xcfadfe53  Ok
  132.       LOAD | addr=0x4020a078 | len=0x000000b4 | crc=0xb4758358  Ok
  133.       JUMP | addr=0x401f7df0 | arg=0x00000000
  134.       write FIRMWARE.play.1.elf
  135.   Section 'lba_'
  136.     pos   =   1055c0 -   147330
  137.     len   =    41d70
  138.     flags =        1  Boot Section (Encrypted)
  139.       LOAD | addr=0x00000000 | len=0x00000bec | crc=0x29e6e529  Ok
  140.       LOAD | addr=0x00000bec | len=0x000001d4 | crc=0x394c0a38  Ok
  141.       LOAD | addr=0x00000dc0 | len=0x00000004 | crc=0x2514b607  Ok
  142.       FILL | addr=0x00000dc4 | len=0x00000013 | pattern=0x00000000
  143.       CALL | addr=0x00000134 | arg=0x00000001
  144.       write FIRMWARE.lba_.0.elf
  145.       LOAD | addr=0x00000000 | len=0x00000400 | crc=0x4670ca12  Ok
  146.       LOAD | addr=0x00000400 | len=0x00001970 | crc=0x7007f247  Ok
  147.       LOAD | addr=0x40034400 | len=0x00001380 | crc=0xc7dbe266  Ok
  148.       LOAD | addr=0x40053a78 | len=0x0001b738 | crc=0xfa2dc766  Ok
  149.       LOAD | addr=0x4006f1b0 | len=0x00000004 | crc=0x9f0d5570  Ok
  150.       LOAD | addr=0x4006f1b4 | len=0x0000000a | crc=0x99ce2805  Ok
  151.       LOAD | addr=0x4006f1c0 | len=0x00000054 | crc=0xa8198d45  Ok
  152.       LOAD | addr=0x4006f214 | len=0x0000010c | crc=0xceefdbc3  Ok
  153.       LOAD | addr=0x4006f320 | len=0x00000043 | crc=0x49437379  Ok
  154.       LOAD | addr=0x4006f364 | len=0x0002247c | crc=0x5d5f506e  Ok
  155.       JUMP | addr=0x40070a34 | arg=0x00000000
  156.       write FIRMWARE.lba_.1.elf
  157.   Section 'hLst'
  158.     pos   =   147340 -   1693e0
  159.     len   =    220a0
  160.     flags =        1  Boot Section (Encrypted)
  161.       LOAD | addr=0x00000000 | len=0x00000400 | crc=0x858ff8ad  Ok
  162.       LOAD | addr=0x00001c00 | len=0x000001d8 | crc=0xfc4e36f6  Ok
  163.       LOAD | addr=0x00002428 | len=0x00001924 | crc=0xadb9cc80  Ok
  164.       LOAD | addr=0x00003d4c | len=0x00000004 | crc=0x1f795c70  Ok
  165.       LOAD | addr=0x00003d50 | len=0x0000000a | crc=0x26c1b4f8  Ok
  166.       LOAD | addr=0x00003d5c | len=0x00000050 | crc=0xd40df089  Ok
  167.       LOAD | addr=0x00003dac | len=0x00000014 | crc=0x41959433  Ok
  168.       LOAD | addr=0x4001c000 | len=0x000021c4 | crc=0x1604ddb3  Ok
  169.       LOAD | addr=0x40184000 | len=0x0000f904 | crc=0x52080e91  Ok
  170.       LOAD | addr=0x40194000 | len=0x00000654 | crc=0x4f9d530f  Ok
  171.       LOAD | addr=0x40195000 | len=0x000000f4 | crc=0x8b96e9c8  Ok
  172.       LOAD | addr=0x401c0000 | len=0x0000063c | crc=0xe93767f4  Ok
  173.       LOAD | addr=0x401c4000 | len=0x0000d4b6 | crc=0x57ced69f  Ok
  174.       LOAD | addr=0x401d14b8 | len=0x00000200 | crc=0x3411e893  Ok
  175.       LOAD | addr=0x401d1cec | len=0x000000b4 | crc=0xc4a52e2a  Ok
  176.       JUMP | addr=0x401c4df0 | arg=0x00000000
  177.       write FIRMWARE.hLst.0.elf
  178.   Section 'pLay'
  179.     pos   =   1693f0 -   1f2400
  180.     len   =    89010
  181.     flags =        1  Boot Section (Encrypted)
  182.       LOAD | addr=0x40001000 | len=0x00000020 | crc=0x96a7f638  Ok
  183.       LOAD | addr=0x40001020 | len=0x00000008 | crc=0x76994d89  Ok
  184.       LOAD | addr=0x40001028 | len=0x0000000c | crc=0x653ead07  Ok
  185.       LOAD | addr=0x40001034 | len=0x00000004 | crc=0x72598332  Ok
  186.       LOAD | addr=0x40001038 | len=0x00000004 | crc=0x3fd23eda  Ok
  187.       LOAD | addr=0x4000143c | len=0x00003b60 | crc=0x5aac19fc  Ok
  188.       LOAD | addr=0x40004f9c | len=0x0004b234 | crc=0x13dd5300  Ok
  189.       LOAD | addr=0x400501d0 | len=0x00000098 | crc=0xf8d95de2  Ok
  190.       FILL | addr=0x40050268 | len=0x00000170 | pattern=0x00000000
  191.       CALL | addr=0x4000175c | arg=0x00000000
  192.       write FIRMWARE.pLay.0.elf
  193.       LOAD | addr=0x00000000 | len=0x00000400 | crc=0x1f30d9ab  Ok
  194.       LOAD | addr=0x0000205c | len=0x00001a94 | crc=0x3fc95dbc  Ok
  195.       LOAD | addr=0x00003af0 | len=0x00000004 | crc=0xee890656  Ok
  196.       LOAD | addr=0x00003af4 | len=0x0000000a | crc=0xe1e17618  Ok
  197.       LOAD | addr=0x00003b00 | len=0x00000050 | crc=0x5f0c85d1  Ok
  198.       LOAD | addr=0x00003b50 | len=0x00000014 | crc=0x6c2fda91  Ok
  199.       LOAD | addr=0x4001c000 | len=0x000022fc | crc=0xc8af2d41  Ok
  200.       LOAD | addr=0x401c9000 | len=0x000164b0 | crc=0x55fe7b17  Ok
  201.       LOAD | addr=0x401e0000 | len=0x000004cc | crc=0xea877cb1  Ok
  202.       LOAD | addr=0x401e04cc | len=0x0000ce04 | crc=0xf9a10faf  Ok
  203.       LOAD | addr=0x401ed2d0 | len=0x00002230 | crc=0x7153302f  Ok
  204.       LOAD | addr=0x401ef500 | len=0x00001bcc | crc=0x4f9ec02f  Ok
  205.       LOAD | addr=0x401f3000 | len=0x0000063c | crc=0x1a33014c  Ok
  206.       LOAD | addr=0x401f7000 | len=0x0000defa | crc=0x2d9f04fd  Ok
  207.       LOAD | addr=0x40204efc | len=0x00000200 | crc=0x63e63556  Ok
  208.       LOAD | addr=0x40205730 | len=0x000000b4 | crc=0x2a0e38a3  Ok
  209.       JUMP | addr=0x401f7df0 | arg=0x00000000
  210.       write FIRMWARE.pLay.1.elf
  211.   Section 'hvm2'
  212.     pos   =   1f3000 -   205020
  213.     len   =    12020
  214.     flags =        2  Data Section
  215.   Section 'hvmi'
  216.     pos   =   206000 -   40bbf0
  217.     len   =   205bf0
  218.     flags =        2  Data Section
  219.   Section 'pvm2'
  220.     pos   =   40c000 -   41ea50
  221.     len   =    12a50
  222.     flags =        2  Data Section
  223.   Section 'pvmi'
  224.     pos   =   41f000 -   646380
  225.     len   =   227380
  226.     flags =        2  Data Section
  227.   Section 'hLm2'
  228.     pos   =   647000 -   6546c0
  229.     len   =     d6c0
  230.     flags =        2  Data Section
  231.   Section 'hLmi'
  232.     pos   =   655000 -   854a80
  233.     len   =   1ffa80
  234.     flags =        2  Data Section
  235.   Section 'pLm2'
  236.     pos   =   855000 -   863100
  237.     len   =     e100
  238.     flags =        2  Data Section
  239.   Section 'pLmi'
  240.     pos   =   864000 -   a85370
  241.     len   =   221370
  242.     flags =        2  Data Section
  243.   Section 'rsrc'
  244.     pos   =   a86000 -  2a3b470
  245.     len   =  1fb5470
  246.     flags =        2  Data Section
  247. Final signature:
  248.   Encrypted SHA-1:
  249.     9E 08 F6 CF 22 1C CA B0 BC 64 64 AA F0 8D A2 33
  250.     31 2B 41 F9 F4 39 28 16 37 08 50 98 21 5A 0C 6A
  251.   File SHA-1:
  252.     82 07 C6 5E C9 56 17 32 B6 82 30 18 1F C8 15 2F 55 0B 36 55  Ok
  253. smite@rockbox:~/tmp/rockbox/utils/sbtools$
  254.  
  255.  
clone this paste RAW Paste Data