Advertisement
Guest User

Untitled

a guest
Oct 29th, 2011
143
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 12.52 KB | None | 0 0
  1. smite@rockbox:~/tmp/rockbox/utils/sbtools$ sudo ./sbtoelf -a "usbotp(066f:3780)" -o FIRMWARE. firmware.sb
  2. Basic info:
  3. SB version: 1.1
  4. Header SHA-1: 67 98 27 1B 47 52 3C E2 46 D6 42 8B 6C C4 F4 29 FA 77 B3 16 Ok
  5. Flags: 100
  6. Total file size : 44283024
  7. Sizes and offsets:
  8. # of encryption keys = 1
  9. # of sections = 16
  10. Versions
  11. Random 1: 29 F1 73 67 74 6C
  12. Random 2: 5D C7 5E 4F 32 69
  13. Creation date/time = Mon Apr 11 11:47:57 2011
  14. Product version = 0.3.23
  15. Component version = 0.3.23
  16. Drive tag = 50
  17. First boot tag offset = 18
  18. First boot section ID = 0x00000000
  19. Encryption data
  20. Key 0: USB-OTP(066f:3780)
  21. CBC-MAC of headers: 6A 2E F0 78 32 C5 8A EA 08 6D 7E 6B 91 4B 1A 20 Ok
  22. Encrypted key : 02 6C 78 58 B9 F5 39 23 47 1D 9E C4 B9 7F 4B 1C
  23. Decrypted key : 75 3C 70 EA AC 95 A0 B9 3E 4B DC 24 03 65 8D 24
  24. Summary:
  25. Real key: 75 3C 70 EA AC 95 A0 B9 3E 4B DC 24 03 65 8D 24
  26. IV : 67 98 27 1B 47 52 3C E2 46 D6 42 8B 6C C4 F4 29
  27. Sections
  28. Section '____'
  29. pos = 190 - 6e00
  30. len = 6c70
  31. flags = 1 Boot Section (Encrypted)
  32. LOAD | addr=0x00000000 | len=0x00001d44 | crc=0xe93b78b5 Ok
  33. LOAD | addr=0x00001d44 | len=0x00000064 | crc=0xd629ceef Ok
  34. LOAD | addr=0x00001da8 | len=0x00000009 | crc=0x84fd58a8 Ok
  35. FILL | addr=0x00001db4 | len=0x0000003b | pattern=0x00000000
  36. FILL | addr=0x00001df0 | len=0x00000800 | pattern=0x00000000
  37. CALL | addr=0x0000018c | arg=0x00000000
  38. write FIRMWARE.____.0.elf
  39. LOAD | addr=0x00000000 | len=0x00003044 | crc=0x7aef7c1f Ok
  40. LOAD | addr=0x00003044 | len=0x000000ac | crc=0x77c4eecc Ok
  41. LOAD | addr=0x000030f0 | len=0x0000002a | crc=0x8ad18f88 Ok
  42. FILL | addr=0x0000311c | len=0x000000c9 | pattern=0x00000000
  43. FILL | addr=0x000031e8 | len=0x00000800 | pattern=0x00000000
  44. FILL | addr=0x000039e8 | len=0x00000004 | pattern=0x00000000
  45. CALL | addr=0x0000019c | arg=0x00000000
  46. write FIRMWARE.____.1.elf
  47. LOAD | addr=0x00000000 | len=0x000019d8 | crc=0x0bc62e91 Ok
  48. LOAD | addr=0x000019d8 | len=0x0000021c | crc=0x8b59414d Ok
  49. LOAD | addr=0x00001bf4 | len=0x0000000e | crc=0x66bc53a4 Ok
  50. FILL | addr=0x00001c04 | len=0x000000cc | pattern=0x00000000
  51. FILL | addr=0x00001cd0 | len=0x00000800 | pattern=0x00000000
  52. FILL | addr=0x000024d0 | len=0x00000004 | pattern=0x00000000
  53. CALL | addr=0x0000009c | arg=0x00000000
  54. write FIRMWARE.____.2.elf
  55. CALL | addr=0x000000d0 | arg=0x6c62615f
  56. write FIRMWARE.____.3.elf
  57. CALL | addr=0x00000114 | arg=0x6d6c635f
  58. write FIRMWARE.____.4.elf
  59. Section 'mlc_'
  60. pos = 6e10 - 52630
  61. len = 4b820
  62. flags = 1 Boot Section (Encrypted)
  63. LOAD | addr=0x00000000 | len=0x00000bec | crc=0xa68c8ec1 Ok
  64. LOAD | addr=0x00000bec | len=0x000001d4 | crc=0x9c5eabfe Ok
  65. LOAD | addr=0x00000dc0 | len=0x00000004 | crc=0xf2bb7be1 Ok
  66. FILL | addr=0x00000dc4 | len=0x00000013 | pattern=0x00000000
  67. CALL | addr=0x00000134 | arg=0x00000001
  68. write FIRMWARE.mlc_.0.elf
  69. LOAD | addr=0x00000000 | len=0x00000400 | crc=0x0250bc79 Ok
  70. LOAD | addr=0x00000400 | len=0x00001970 | crc=0xfae96c0a Ok
  71. LOAD | addr=0x40034400 | len=0x00001890 | crc=0x55ed0d5d Ok
  72. LOAD | addr=0x40054908 | len=0x0001c614 | crc=0xd3510440 Ok
  73. LOAD | addr=0x40070f1c | len=0x00000004 | crc=0x25957235 Ok
  74. LOAD | addr=0x40070f20 | len=0x0000000a | crc=0xf48cd038 Ok
  75. LOAD | addr=0x40070f2c | len=0x00000054 | crc=0x960d1785 Ok
  76. LOAD | addr=0x40070f80 | len=0x0000010c | crc=0x3d09d76a Ok
  77. LOAD | addr=0x4007108c | len=0x00000043 | crc=0x6bbe6aa7 Ok
  78. LOAD | addr=0x400710d0 | len=0x0002ab34 | crc=0x626a36c4 Ok
  79. JUMP | addr=0x40072838 | arg=0x00000000
  80. write FIRMWARE.mlc_.1.elf
  81. Section 'host'
  82. pos = 52640 - 78630
  83. len = 25ff0
  84. flags = 1 Boot Section (Encrypted)
  85. LOAD | addr=0x00000000 | len=0x00000400 | crc=0x858ff8ad Ok
  86. LOAD | addr=0x00002400 | len=0x000001d8 | crc=0xb7589894 Ok
  87. LOAD | addr=0x00002c28 | len=0x00001924 | crc=0x27a976c9 Ok
  88. LOAD | addr=0x0000454c | len=0x00000004 | crc=0xa17f00aa Ok
  89. LOAD | addr=0x00004550 | len=0x0000000a | crc=0x75b83296 Ok
  90. LOAD | addr=0x0000455c | len=0x00000050 | crc=0xf4efeacc Ok
  91. LOAD | addr=0x000045ac | len=0x00000014 | crc=0x740b0ac1 Ok
  92. LOAD | addr=0x4001c000 | len=0x00002574 | crc=0x17b1ad6e Ok
  93. LOAD | addr=0x40185000 | len=0x0000ea40 | crc=0xc3fe13c1 Ok
  94. LOAD | addr=0x40194000 | len=0x00000610 | crc=0xa0c85d20 Ok
  95. LOAD | addr=0x40195000 | len=0x00000254 | crc=0x4e027e94 Ok
  96. LOAD | addr=0x401c0000 | len=0x0000063c | crc=0x69fd7898 Ok
  97. LOAD | addr=0x401c4000 | len=0x0001111e | crc=0x48e7a9bb Ok
  98. LOAD | addr=0x401d5120 | len=0x00000ef8 | crc=0x57a51938 Ok
  99. LOAD | addr=0x401d664c | len=0x000000b4 | crc=0x5774bf90 Ok
  100. JUMP | addr=0x401c4df0 | arg=0x00000000
  101. write FIRMWARE.host.0.elf
  102. Section 'play'
  103. pos = 78640 - 1055b0
  104. len = 8cf70
  105. flags = 1 Boot Section (Encrypted)
  106. LOAD | addr=0x40001000 | len=0x00000020 | crc=0x96a7f638 Ok
  107. LOAD | addr=0x40001020 | len=0x00000008 | crc=0x5dfd2cc5 Ok
  108. LOAD | addr=0x40001028 | len=0x0000000c | crc=0xe4dad6fc Ok
  109. LOAD | addr=0x40001034 | len=0x00000004 | crc=0xdcace36f Ok
  110. LOAD | addr=0x40001038 | len=0x00000004 | crc=0x1f9f93f5 Ok
  111. LOAD | addr=0x4000143c | len=0x00003b60 | crc=0x5aac19fc Ok
  112. LOAD | addr=0x40004f9c | len=0x0004b234 | crc=0xc0cbbebc Ok
  113. LOAD | addr=0x400501d0 | len=0x00000098 | crc=0x15191bd7 Ok
  114. FILL | addr=0x40050268 | len=0x00000170 | pattern=0x00000000
  115. CALL | addr=0x4000175c | arg=0x00000000
  116. write FIRMWARE.play.0.elf
  117. LOAD | addr=0x00000000 | len=0x00000400 | crc=0x1f30d9ab Ok
  118. LOAD | addr=0x0000285c | len=0x00001a94 | crc=0xab152fb9 Ok
  119. LOAD | addr=0x000042f0 | len=0x00000004 | crc=0x04c42e03 Ok
  120. LOAD | addr=0x000042f4 | len=0x0000000a | crc=0x1c77e649 Ok
  121. LOAD | addr=0x00004300 | len=0x00000050 | crc=0x84e94ab9 Ok
  122. LOAD | addr=0x00004350 | len=0x00000014 | crc=0xa2d0911c Ok
  123. LOAD | addr=0x4001c000 | len=0x0000280c | crc=0xb518b742 Ok
  124. LOAD | addr=0x401ca000 | len=0x000155f0 | crc=0x6299a731 Ok
  125. LOAD | addr=0x401e0000 | len=0x00000488 | crc=0xf7f07fa2 Ok
  126. LOAD | addr=0x401e0488 | len=0x0000ce04 | crc=0xb5d6283f Ok
  127. LOAD | addr=0x401ed28c | len=0x00002230 | crc=0x7153302f Ok
  128. LOAD | addr=0x401ef4bc | len=0x00001bcc | crc=0x68589ac3 Ok
  129. LOAD | addr=0x401f3000 | len=0x0000063c | crc=0x1db563ff Ok
  130. LOAD | addr=0x401f7000 | len=0x00011b4a | crc=0x69d672da Ok
  131. LOAD | addr=0x40208b4c | len=0x00000ef8 | crc=0xcfadfe53 Ok
  132. LOAD | addr=0x4020a078 | len=0x000000b4 | crc=0xb4758358 Ok
  133. JUMP | addr=0x401f7df0 | arg=0x00000000
  134. write FIRMWARE.play.1.elf
  135. Section 'lba_'
  136. pos = 1055c0 - 147330
  137. len = 41d70
  138. flags = 1 Boot Section (Encrypted)
  139. LOAD | addr=0x00000000 | len=0x00000bec | crc=0x29e6e529 Ok
  140. LOAD | addr=0x00000bec | len=0x000001d4 | crc=0x394c0a38 Ok
  141. LOAD | addr=0x00000dc0 | len=0x00000004 | crc=0x2514b607 Ok
  142. FILL | addr=0x00000dc4 | len=0x00000013 | pattern=0x00000000
  143. CALL | addr=0x00000134 | arg=0x00000001
  144. write FIRMWARE.lba_.0.elf
  145. LOAD | addr=0x00000000 | len=0x00000400 | crc=0x4670ca12 Ok
  146. LOAD | addr=0x00000400 | len=0x00001970 | crc=0x7007f247 Ok
  147. LOAD | addr=0x40034400 | len=0x00001380 | crc=0xc7dbe266 Ok
  148. LOAD | addr=0x40053a78 | len=0x0001b738 | crc=0xfa2dc766 Ok
  149. LOAD | addr=0x4006f1b0 | len=0x00000004 | crc=0x9f0d5570 Ok
  150. LOAD | addr=0x4006f1b4 | len=0x0000000a | crc=0x99ce2805 Ok
  151. LOAD | addr=0x4006f1c0 | len=0x00000054 | crc=0xa8198d45 Ok
  152. LOAD | addr=0x4006f214 | len=0x0000010c | crc=0xceefdbc3 Ok
  153. LOAD | addr=0x4006f320 | len=0x00000043 | crc=0x49437379 Ok
  154. LOAD | addr=0x4006f364 | len=0x0002247c | crc=0x5d5f506e Ok
  155. JUMP | addr=0x40070a34 | arg=0x00000000
  156. write FIRMWARE.lba_.1.elf
  157. Section 'hLst'
  158. pos = 147340 - 1693e0
  159. len = 220a0
  160. flags = 1 Boot Section (Encrypted)
  161. LOAD | addr=0x00000000 | len=0x00000400 | crc=0x858ff8ad Ok
  162. LOAD | addr=0x00001c00 | len=0x000001d8 | crc=0xfc4e36f6 Ok
  163. LOAD | addr=0x00002428 | len=0x00001924 | crc=0xadb9cc80 Ok
  164. LOAD | addr=0x00003d4c | len=0x00000004 | crc=0x1f795c70 Ok
  165. LOAD | addr=0x00003d50 | len=0x0000000a | crc=0x26c1b4f8 Ok
  166. LOAD | addr=0x00003d5c | len=0x00000050 | crc=0xd40df089 Ok
  167. LOAD | addr=0x00003dac | len=0x00000014 | crc=0x41959433 Ok
  168. LOAD | addr=0x4001c000 | len=0x000021c4 | crc=0x1604ddb3 Ok
  169. LOAD | addr=0x40184000 | len=0x0000f904 | crc=0x52080e91 Ok
  170. LOAD | addr=0x40194000 | len=0x00000654 | crc=0x4f9d530f Ok
  171. LOAD | addr=0x40195000 | len=0x000000f4 | crc=0x8b96e9c8 Ok
  172. LOAD | addr=0x401c0000 | len=0x0000063c | crc=0xe93767f4 Ok
  173. LOAD | addr=0x401c4000 | len=0x0000d4b6 | crc=0x57ced69f Ok
  174. LOAD | addr=0x401d14b8 | len=0x00000200 | crc=0x3411e893 Ok
  175. LOAD | addr=0x401d1cec | len=0x000000b4 | crc=0xc4a52e2a Ok
  176. JUMP | addr=0x401c4df0 | arg=0x00000000
  177. write FIRMWARE.hLst.0.elf
  178. Section 'pLay'
  179. pos = 1693f0 - 1f2400
  180. len = 89010
  181. flags = 1 Boot Section (Encrypted)
  182. LOAD | addr=0x40001000 | len=0x00000020 | crc=0x96a7f638 Ok
  183. LOAD | addr=0x40001020 | len=0x00000008 | crc=0x76994d89 Ok
  184. LOAD | addr=0x40001028 | len=0x0000000c | crc=0x653ead07 Ok
  185. LOAD | addr=0x40001034 | len=0x00000004 | crc=0x72598332 Ok
  186. LOAD | addr=0x40001038 | len=0x00000004 | crc=0x3fd23eda Ok
  187. LOAD | addr=0x4000143c | len=0x00003b60 | crc=0x5aac19fc Ok
  188. LOAD | addr=0x40004f9c | len=0x0004b234 | crc=0x13dd5300 Ok
  189. LOAD | addr=0x400501d0 | len=0x00000098 | crc=0xf8d95de2 Ok
  190. FILL | addr=0x40050268 | len=0x00000170 | pattern=0x00000000
  191. CALL | addr=0x4000175c | arg=0x00000000
  192. write FIRMWARE.pLay.0.elf
  193. LOAD | addr=0x00000000 | len=0x00000400 | crc=0x1f30d9ab Ok
  194. LOAD | addr=0x0000205c | len=0x00001a94 | crc=0x3fc95dbc Ok
  195. LOAD | addr=0x00003af0 | len=0x00000004 | crc=0xee890656 Ok
  196. LOAD | addr=0x00003af4 | len=0x0000000a | crc=0xe1e17618 Ok
  197. LOAD | addr=0x00003b00 | len=0x00000050 | crc=0x5f0c85d1 Ok
  198. LOAD | addr=0x00003b50 | len=0x00000014 | crc=0x6c2fda91 Ok
  199. LOAD | addr=0x4001c000 | len=0x000022fc | crc=0xc8af2d41 Ok
  200. LOAD | addr=0x401c9000 | len=0x000164b0 | crc=0x55fe7b17 Ok
  201. LOAD | addr=0x401e0000 | len=0x000004cc | crc=0xea877cb1 Ok
  202. LOAD | addr=0x401e04cc | len=0x0000ce04 | crc=0xf9a10faf Ok
  203. LOAD | addr=0x401ed2d0 | len=0x00002230 | crc=0x7153302f Ok
  204. LOAD | addr=0x401ef500 | len=0x00001bcc | crc=0x4f9ec02f Ok
  205. LOAD | addr=0x401f3000 | len=0x0000063c | crc=0x1a33014c Ok
  206. LOAD | addr=0x401f7000 | len=0x0000defa | crc=0x2d9f04fd Ok
  207. LOAD | addr=0x40204efc | len=0x00000200 | crc=0x63e63556 Ok
  208. LOAD | addr=0x40205730 | len=0x000000b4 | crc=0x2a0e38a3 Ok
  209. JUMP | addr=0x401f7df0 | arg=0x00000000
  210. write FIRMWARE.pLay.1.elf
  211. Section 'hvm2'
  212. pos = 1f3000 - 205020
  213. len = 12020
  214. flags = 2 Data Section
  215. Section 'hvmi'
  216. pos = 206000 - 40bbf0
  217. len = 205bf0
  218. flags = 2 Data Section
  219. Section 'pvm2'
  220. pos = 40c000 - 41ea50
  221. len = 12a50
  222. flags = 2 Data Section
  223. Section 'pvmi'
  224. pos = 41f000 - 646380
  225. len = 227380
  226. flags = 2 Data Section
  227. Section 'hLm2'
  228. pos = 647000 - 6546c0
  229. len = d6c0
  230. flags = 2 Data Section
  231. Section 'hLmi'
  232. pos = 655000 - 854a80
  233. len = 1ffa80
  234. flags = 2 Data Section
  235. Section 'pLm2'
  236. pos = 855000 - 863100
  237. len = e100
  238. flags = 2 Data Section
  239. Section 'pLmi'
  240. pos = 864000 - a85370
  241. len = 221370
  242. flags = 2 Data Section
  243. Section 'rsrc'
  244. pos = a86000 - 2a3b470
  245. len = 1fb5470
  246. flags = 2 Data Section
  247. Final signature:
  248. Encrypted SHA-1:
  249. 9E 08 F6 CF 22 1C CA B0 BC 64 64 AA F0 8D A2 33
  250. 31 2B 41 F9 F4 39 28 16 37 08 50 98 21 5A 0C 6A
  251. File SHA-1:
  252. 82 07 C6 5E C9 56 17 32 B6 82 30 18 1F C8 15 2F 55 0B 36 55 Ok
  253. smite@rockbox:~/tmp/rockbox/utils/sbtools$
  254.  
  255.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement