Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- smite@rockbox:~/tmp/rockbox/utils/sbtools$ sudo ./sbtoelf -a "usbotp(066f:3780)" -o FIRMWARE. firmware.sb
- Basic info:
- SB version: 1.1
- Header SHA-1: 67 98 27 1B 47 52 3C E2 46 D6 42 8B 6C C4 F4 29 FA 77 B3 16 Ok
- Flags: 100
- Total file size : 44283024
- Sizes and offsets:
- # of encryption keys = 1
- # of sections = 16
- Versions
- Random 1: 29 F1 73 67 74 6C
- Random 2: 5D C7 5E 4F 32 69
- Creation date/time = Mon Apr 11 11:47:57 2011
- Product version = 0.3.23
- Component version = 0.3.23
- Drive tag = 50
- First boot tag offset = 18
- First boot section ID = 0x00000000
- Encryption data
- Key 0: USB-OTP(066f:3780)
- CBC-MAC of headers: 6A 2E F0 78 32 C5 8A EA 08 6D 7E 6B 91 4B 1A 20 Ok
- Encrypted key : 02 6C 78 58 B9 F5 39 23 47 1D 9E C4 B9 7F 4B 1C
- Decrypted key : 75 3C 70 EA AC 95 A0 B9 3E 4B DC 24 03 65 8D 24
- Summary:
- Real key: 75 3C 70 EA AC 95 A0 B9 3E 4B DC 24 03 65 8D 24
- IV : 67 98 27 1B 47 52 3C E2 46 D6 42 8B 6C C4 F4 29
- Sections
- Section '____'
- pos = 190 - 6e00
- len = 6c70
- flags = 1 Boot Section (Encrypted)
- LOAD | addr=0x00000000 | len=0x00001d44 | crc=0xe93b78b5 Ok
- LOAD | addr=0x00001d44 | len=0x00000064 | crc=0xd629ceef Ok
- LOAD | addr=0x00001da8 | len=0x00000009 | crc=0x84fd58a8 Ok
- FILL | addr=0x00001db4 | len=0x0000003b | pattern=0x00000000
- FILL | addr=0x00001df0 | len=0x00000800 | pattern=0x00000000
- CALL | addr=0x0000018c | arg=0x00000000
- write FIRMWARE.____.0.elf
- LOAD | addr=0x00000000 | len=0x00003044 | crc=0x7aef7c1f Ok
- LOAD | addr=0x00003044 | len=0x000000ac | crc=0x77c4eecc Ok
- LOAD | addr=0x000030f0 | len=0x0000002a | crc=0x8ad18f88 Ok
- FILL | addr=0x0000311c | len=0x000000c9 | pattern=0x00000000
- FILL | addr=0x000031e8 | len=0x00000800 | pattern=0x00000000
- FILL | addr=0x000039e8 | len=0x00000004 | pattern=0x00000000
- CALL | addr=0x0000019c | arg=0x00000000
- write FIRMWARE.____.1.elf
- LOAD | addr=0x00000000 | len=0x000019d8 | crc=0x0bc62e91 Ok
- LOAD | addr=0x000019d8 | len=0x0000021c | crc=0x8b59414d Ok
- LOAD | addr=0x00001bf4 | len=0x0000000e | crc=0x66bc53a4 Ok
- FILL | addr=0x00001c04 | len=0x000000cc | pattern=0x00000000
- FILL | addr=0x00001cd0 | len=0x00000800 | pattern=0x00000000
- FILL | addr=0x000024d0 | len=0x00000004 | pattern=0x00000000
- CALL | addr=0x0000009c | arg=0x00000000
- write FIRMWARE.____.2.elf
- CALL | addr=0x000000d0 | arg=0x6c62615f
- write FIRMWARE.____.3.elf
- CALL | addr=0x00000114 | arg=0x6d6c635f
- write FIRMWARE.____.4.elf
- Section 'mlc_'
- pos = 6e10 - 52630
- len = 4b820
- flags = 1 Boot Section (Encrypted)
- LOAD | addr=0x00000000 | len=0x00000bec | crc=0xa68c8ec1 Ok
- LOAD | addr=0x00000bec | len=0x000001d4 | crc=0x9c5eabfe Ok
- LOAD | addr=0x00000dc0 | len=0x00000004 | crc=0xf2bb7be1 Ok
- FILL | addr=0x00000dc4 | len=0x00000013 | pattern=0x00000000
- CALL | addr=0x00000134 | arg=0x00000001
- write FIRMWARE.mlc_.0.elf
- LOAD | addr=0x00000000 | len=0x00000400 | crc=0x0250bc79 Ok
- LOAD | addr=0x00000400 | len=0x00001970 | crc=0xfae96c0a Ok
- LOAD | addr=0x40034400 | len=0x00001890 | crc=0x55ed0d5d Ok
- LOAD | addr=0x40054908 | len=0x0001c614 | crc=0xd3510440 Ok
- LOAD | addr=0x40070f1c | len=0x00000004 | crc=0x25957235 Ok
- LOAD | addr=0x40070f20 | len=0x0000000a | crc=0xf48cd038 Ok
- LOAD | addr=0x40070f2c | len=0x00000054 | crc=0x960d1785 Ok
- LOAD | addr=0x40070f80 | len=0x0000010c | crc=0x3d09d76a Ok
- LOAD | addr=0x4007108c | len=0x00000043 | crc=0x6bbe6aa7 Ok
- LOAD | addr=0x400710d0 | len=0x0002ab34 | crc=0x626a36c4 Ok
- JUMP | addr=0x40072838 | arg=0x00000000
- write FIRMWARE.mlc_.1.elf
- Section 'host'
- pos = 52640 - 78630
- len = 25ff0
- flags = 1 Boot Section (Encrypted)
- LOAD | addr=0x00000000 | len=0x00000400 | crc=0x858ff8ad Ok
- LOAD | addr=0x00002400 | len=0x000001d8 | crc=0xb7589894 Ok
- LOAD | addr=0x00002c28 | len=0x00001924 | crc=0x27a976c9 Ok
- LOAD | addr=0x0000454c | len=0x00000004 | crc=0xa17f00aa Ok
- LOAD | addr=0x00004550 | len=0x0000000a | crc=0x75b83296 Ok
- LOAD | addr=0x0000455c | len=0x00000050 | crc=0xf4efeacc Ok
- LOAD | addr=0x000045ac | len=0x00000014 | crc=0x740b0ac1 Ok
- LOAD | addr=0x4001c000 | len=0x00002574 | crc=0x17b1ad6e Ok
- LOAD | addr=0x40185000 | len=0x0000ea40 | crc=0xc3fe13c1 Ok
- LOAD | addr=0x40194000 | len=0x00000610 | crc=0xa0c85d20 Ok
- LOAD | addr=0x40195000 | len=0x00000254 | crc=0x4e027e94 Ok
- LOAD | addr=0x401c0000 | len=0x0000063c | crc=0x69fd7898 Ok
- LOAD | addr=0x401c4000 | len=0x0001111e | crc=0x48e7a9bb Ok
- LOAD | addr=0x401d5120 | len=0x00000ef8 | crc=0x57a51938 Ok
- LOAD | addr=0x401d664c | len=0x000000b4 | crc=0x5774bf90 Ok
- JUMP | addr=0x401c4df0 | arg=0x00000000
- write FIRMWARE.host.0.elf
- Section 'play'
- pos = 78640 - 1055b0
- len = 8cf70
- flags = 1 Boot Section (Encrypted)
- LOAD | addr=0x40001000 | len=0x00000020 | crc=0x96a7f638 Ok
- LOAD | addr=0x40001020 | len=0x00000008 | crc=0x5dfd2cc5 Ok
- LOAD | addr=0x40001028 | len=0x0000000c | crc=0xe4dad6fc Ok
- LOAD | addr=0x40001034 | len=0x00000004 | crc=0xdcace36f Ok
- LOAD | addr=0x40001038 | len=0x00000004 | crc=0x1f9f93f5 Ok
- LOAD | addr=0x4000143c | len=0x00003b60 | crc=0x5aac19fc Ok
- LOAD | addr=0x40004f9c | len=0x0004b234 | crc=0xc0cbbebc Ok
- LOAD | addr=0x400501d0 | len=0x00000098 | crc=0x15191bd7 Ok
- FILL | addr=0x40050268 | len=0x00000170 | pattern=0x00000000
- CALL | addr=0x4000175c | arg=0x00000000
- write FIRMWARE.play.0.elf
- LOAD | addr=0x00000000 | len=0x00000400 | crc=0x1f30d9ab Ok
- LOAD | addr=0x0000285c | len=0x00001a94 | crc=0xab152fb9 Ok
- LOAD | addr=0x000042f0 | len=0x00000004 | crc=0x04c42e03 Ok
- LOAD | addr=0x000042f4 | len=0x0000000a | crc=0x1c77e649 Ok
- LOAD | addr=0x00004300 | len=0x00000050 | crc=0x84e94ab9 Ok
- LOAD | addr=0x00004350 | len=0x00000014 | crc=0xa2d0911c Ok
- LOAD | addr=0x4001c000 | len=0x0000280c | crc=0xb518b742 Ok
- LOAD | addr=0x401ca000 | len=0x000155f0 | crc=0x6299a731 Ok
- LOAD | addr=0x401e0000 | len=0x00000488 | crc=0xf7f07fa2 Ok
- LOAD | addr=0x401e0488 | len=0x0000ce04 | crc=0xb5d6283f Ok
- LOAD | addr=0x401ed28c | len=0x00002230 | crc=0x7153302f Ok
- LOAD | addr=0x401ef4bc | len=0x00001bcc | crc=0x68589ac3 Ok
- LOAD | addr=0x401f3000 | len=0x0000063c | crc=0x1db563ff Ok
- LOAD | addr=0x401f7000 | len=0x00011b4a | crc=0x69d672da Ok
- LOAD | addr=0x40208b4c | len=0x00000ef8 | crc=0xcfadfe53 Ok
- LOAD | addr=0x4020a078 | len=0x000000b4 | crc=0xb4758358 Ok
- JUMP | addr=0x401f7df0 | arg=0x00000000
- write FIRMWARE.play.1.elf
- Section 'lba_'
- pos = 1055c0 - 147330
- len = 41d70
- flags = 1 Boot Section (Encrypted)
- LOAD | addr=0x00000000 | len=0x00000bec | crc=0x29e6e529 Ok
- LOAD | addr=0x00000bec | len=0x000001d4 | crc=0x394c0a38 Ok
- LOAD | addr=0x00000dc0 | len=0x00000004 | crc=0x2514b607 Ok
- FILL | addr=0x00000dc4 | len=0x00000013 | pattern=0x00000000
- CALL | addr=0x00000134 | arg=0x00000001
- write FIRMWARE.lba_.0.elf
- LOAD | addr=0x00000000 | len=0x00000400 | crc=0x4670ca12 Ok
- LOAD | addr=0x00000400 | len=0x00001970 | crc=0x7007f247 Ok
- LOAD | addr=0x40034400 | len=0x00001380 | crc=0xc7dbe266 Ok
- LOAD | addr=0x40053a78 | len=0x0001b738 | crc=0xfa2dc766 Ok
- LOAD | addr=0x4006f1b0 | len=0x00000004 | crc=0x9f0d5570 Ok
- LOAD | addr=0x4006f1b4 | len=0x0000000a | crc=0x99ce2805 Ok
- LOAD | addr=0x4006f1c0 | len=0x00000054 | crc=0xa8198d45 Ok
- LOAD | addr=0x4006f214 | len=0x0000010c | crc=0xceefdbc3 Ok
- LOAD | addr=0x4006f320 | len=0x00000043 | crc=0x49437379 Ok
- LOAD | addr=0x4006f364 | len=0x0002247c | crc=0x5d5f506e Ok
- JUMP | addr=0x40070a34 | arg=0x00000000
- write FIRMWARE.lba_.1.elf
- Section 'hLst'
- pos = 147340 - 1693e0
- len = 220a0
- flags = 1 Boot Section (Encrypted)
- LOAD | addr=0x00000000 | len=0x00000400 | crc=0x858ff8ad Ok
- LOAD | addr=0x00001c00 | len=0x000001d8 | crc=0xfc4e36f6 Ok
- LOAD | addr=0x00002428 | len=0x00001924 | crc=0xadb9cc80 Ok
- LOAD | addr=0x00003d4c | len=0x00000004 | crc=0x1f795c70 Ok
- LOAD | addr=0x00003d50 | len=0x0000000a | crc=0x26c1b4f8 Ok
- LOAD | addr=0x00003d5c | len=0x00000050 | crc=0xd40df089 Ok
- LOAD | addr=0x00003dac | len=0x00000014 | crc=0x41959433 Ok
- LOAD | addr=0x4001c000 | len=0x000021c4 | crc=0x1604ddb3 Ok
- LOAD | addr=0x40184000 | len=0x0000f904 | crc=0x52080e91 Ok
- LOAD | addr=0x40194000 | len=0x00000654 | crc=0x4f9d530f Ok
- LOAD | addr=0x40195000 | len=0x000000f4 | crc=0x8b96e9c8 Ok
- LOAD | addr=0x401c0000 | len=0x0000063c | crc=0xe93767f4 Ok
- LOAD | addr=0x401c4000 | len=0x0000d4b6 | crc=0x57ced69f Ok
- LOAD | addr=0x401d14b8 | len=0x00000200 | crc=0x3411e893 Ok
- LOAD | addr=0x401d1cec | len=0x000000b4 | crc=0xc4a52e2a Ok
- JUMP | addr=0x401c4df0 | arg=0x00000000
- write FIRMWARE.hLst.0.elf
- Section 'pLay'
- pos = 1693f0 - 1f2400
- len = 89010
- flags = 1 Boot Section (Encrypted)
- LOAD | addr=0x40001000 | len=0x00000020 | crc=0x96a7f638 Ok
- LOAD | addr=0x40001020 | len=0x00000008 | crc=0x76994d89 Ok
- LOAD | addr=0x40001028 | len=0x0000000c | crc=0x653ead07 Ok
- LOAD | addr=0x40001034 | len=0x00000004 | crc=0x72598332 Ok
- LOAD | addr=0x40001038 | len=0x00000004 | crc=0x3fd23eda Ok
- LOAD | addr=0x4000143c | len=0x00003b60 | crc=0x5aac19fc Ok
- LOAD | addr=0x40004f9c | len=0x0004b234 | crc=0x13dd5300 Ok
- LOAD | addr=0x400501d0 | len=0x00000098 | crc=0xf8d95de2 Ok
- FILL | addr=0x40050268 | len=0x00000170 | pattern=0x00000000
- CALL | addr=0x4000175c | arg=0x00000000
- write FIRMWARE.pLay.0.elf
- LOAD | addr=0x00000000 | len=0x00000400 | crc=0x1f30d9ab Ok
- LOAD | addr=0x0000205c | len=0x00001a94 | crc=0x3fc95dbc Ok
- LOAD | addr=0x00003af0 | len=0x00000004 | crc=0xee890656 Ok
- LOAD | addr=0x00003af4 | len=0x0000000a | crc=0xe1e17618 Ok
- LOAD | addr=0x00003b00 | len=0x00000050 | crc=0x5f0c85d1 Ok
- LOAD | addr=0x00003b50 | len=0x00000014 | crc=0x6c2fda91 Ok
- LOAD | addr=0x4001c000 | len=0x000022fc | crc=0xc8af2d41 Ok
- LOAD | addr=0x401c9000 | len=0x000164b0 | crc=0x55fe7b17 Ok
- LOAD | addr=0x401e0000 | len=0x000004cc | crc=0xea877cb1 Ok
- LOAD | addr=0x401e04cc | len=0x0000ce04 | crc=0xf9a10faf Ok
- LOAD | addr=0x401ed2d0 | len=0x00002230 | crc=0x7153302f Ok
- LOAD | addr=0x401ef500 | len=0x00001bcc | crc=0x4f9ec02f Ok
- LOAD | addr=0x401f3000 | len=0x0000063c | crc=0x1a33014c Ok
- LOAD | addr=0x401f7000 | len=0x0000defa | crc=0x2d9f04fd Ok
- LOAD | addr=0x40204efc | len=0x00000200 | crc=0x63e63556 Ok
- LOAD | addr=0x40205730 | len=0x000000b4 | crc=0x2a0e38a3 Ok
- JUMP | addr=0x401f7df0 | arg=0x00000000
- write FIRMWARE.pLay.1.elf
- Section 'hvm2'
- pos = 1f3000 - 205020
- len = 12020
- flags = 2 Data Section
- Section 'hvmi'
- pos = 206000 - 40bbf0
- len = 205bf0
- flags = 2 Data Section
- Section 'pvm2'
- pos = 40c000 - 41ea50
- len = 12a50
- flags = 2 Data Section
- Section 'pvmi'
- pos = 41f000 - 646380
- len = 227380
- flags = 2 Data Section
- Section 'hLm2'
- pos = 647000 - 6546c0
- len = d6c0
- flags = 2 Data Section
- Section 'hLmi'
- pos = 655000 - 854a80
- len = 1ffa80
- flags = 2 Data Section
- Section 'pLm2'
- pos = 855000 - 863100
- len = e100
- flags = 2 Data Section
- Section 'pLmi'
- pos = 864000 - a85370
- len = 221370
- flags = 2 Data Section
- Section 'rsrc'
- pos = a86000 - 2a3b470
- len = 1fb5470
- flags = 2 Data Section
- Final signature:
- Encrypted SHA-1:
- 9E 08 F6 CF 22 1C CA B0 BC 64 64 AA F0 8D A2 33
- 31 2B 41 F9 F4 39 28 16 37 08 50 98 21 5A 0C 6A
- File SHA-1:
- 82 07 C6 5E C9 56 17 32 B6 82 30 18 1F C8 15 2F 55 0B 36 55 Ok
- smite@rockbox:~/tmp/rockbox/utils/sbtools$
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement