Aha.. Link to firmware is here.
Probably it is hackable like other D series arm devices...
Edit: Decrypted using samygo patcher 0.30
Code: Select all
C:\tmp>C:\tmp\SamyGO.py decrypt_all ./T-GASMDEUC
SamyGO Firmware Patcher v0.30 Alpha (c) 2010-2011 Erdem U. Altinyurt
-=BIG FAT WARNING!=-
You can brick your TV with this tool!
Authors accept no responsibility about ANY DAMAGE on your devices!
project home: http://www.SamyGO.tv
Firmware: T-GASMDEUC v1006.1
AES Encrytped CI+ firmware detected.
Processing file appext.img.sec
secret key : SHWJUH:xxxx
Decrypting AES...
Decrypting with XOR Key : T-GASMDEUC
Crypto package found, using fast XOR engine.
Calculated CRC : 0x74E5195B
CRC Validation passed
Processing file exe.img.sec
secret key : SHWJUH:xxxx
Decrypting AES...
Decrypting with XOR Key : T-GASMDEUC
Crypto package found, using fast XOR engine.
Calculated CRC : 0x38283C3B
CRC Validation passed
Processing file Image.sec
secret key : SHWJUH:xxxx
Decrypting AES...
Decrypting with XOR Key : T-GASMDEUC
Crypto package found, using fast XOR engine.
Calculated CRC : 0xFF2F577
CRC Validation passed
Processing file rootfs.img.sec
secret key : SHWJUH:xxxx
Decrypting AES...
Decrypting with XOR Key : T-GASMDEUC
Crypto package found, using fast XOR engine.
Calculated CRC : 0x72723E59
CRC Validation passed
Processing file T-GENMDEUS1.bin.sec
secret key : SHWJUH:xxxx
Decrypting AES...
Decrypting with XOR Key : T-GASMDEUC
Crypto package found, using fast XOR engine.
Calculated CRC : 0x2CA075D0
Traceback (most recent call last):
File "C:\tmp\SamyGO.py", line 1207, in <module>
DecryptAll( sys.argv[2] )
File "C:\tmp\SamyGO.py", line 1020, in DecryptAll
ValidCRC = int(ValidCRC[CRCstart:CRCstart+8], 16)
ValueError: invalid literal for int() with base 16: '283c3b*0'
C:\tmp>
Code: Select all
Offset 0 1 2 3 4 5 6 7 8 9 A B C D E F
00000020 4C 69 6E 75 78 2D 32 2E 36 2E 33 30 2E 39 00 00 Linux-2.6.30.9