gooseye wrote:
... looks like you can pass different key as parameter.
Strange, it must use new key.
That`s what i did:
changed samygo.py file line 882-884 to:
Code: Select all
if len( secret )==0:
secret = "A435HX:********-****-****-****-************-********-****-****-****-************"
print 'secret key : ', secret
to use new T-VALDEUC key by default.
It seems, it works!!! T-VALDEUC-2002:
Code: Select all
C:\tmp>c:/python26/python.exe
Python 2.7.1 (r271:86832, Nov 27 2010, 18:30:46) [MSC v.1500 32 bit (Intel)] on
win32
Type "help", "copyright", "credits" or "license" for more information.
>>> import SamyGO
SamyGO Firmware Patcher v0.24 (c) 2010 Erdem U. Altinyurt
-=BIG FAT WARNING!=-
You can brick your TV with this tool!
Authors accept no responsibility about ANY DAMAGE on your devices!
project home: http://SamyGO.sourceforge.net
For use this script, you have to extract your firmware to a directory first!
usage: python <path to extracted directory from firmware>
example: python ./T-CHL7DEUC/
>>> SamyGO.AESdec("exe.img.sec")
secret key : A435HX:********-****-****-****-************-********-****-****-****-************
Decrypting AES...
'exe.img.enc'
>>> SamyGO.xor( 'exe.img.enc' , 'T-VALDEUC')
XOR Key : T-VALDEUC
Crypto package found, using fast XOR engine.
('exe.img', 'c09e4c8b8be16dce2acedab3d79451ab', 'T-VALDEUC')
>>>
Now i got exe.img file, which seems to be good, because i can read strings in winhex editor
cool !
After encrypting i got
identical exe.img.sec to original:
Code: Select all
>>> SamyGO.xor( 'exe.img' , 'T-VALDEUC')
XOR Key : T-VALDEUC
Crypto package found, using fast XOR engine.
('exe.img.enc', '2c544754169074608bbf879d23a97e83', 'T-VALDEUC')
>>> SamyGO.AESenc("exe.img.enc")
secret key : A435HX:********-****-****-****-************-********-****-****-****-************
Encrypting with AES...
done
'exe.img.sec'
>>>
After this i checked same key with T-MSX5DEUC and T-TDT5DEUC and it won`t work -
Denny, could you, please, check these firmwares?