summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorAmaury Pouly <amaury.pouly@gmail.com>2016-10-31 17:51:18 +0100
committerAmaury Pouly <amaury.pouly@gmail.com>2016-10-31 17:51:18 +0100
commitb045e4da34165a878c7acc9a82e76b447fe992a7 (patch)
tree5e1137dc86a4460dfb0f7677385a3afca41ffc85
parent0a2290653ba6c6361baed9d317e6bc8fee52d6c2 (diff)
downloadrockbox-b045e4da34165a878c7acc9a82e76b447fe992a7.tar.gz
rockbox-b045e4da34165a878c7acc9a82e76b447fe992a7.zip
nwztools/upgtools: sanitize series name and add keys
Unify series names: e46x -> e460 to be consistent with Sony' name. Add keys for various players that were cracked using upgtools. The real KAS would need to be extracted from a target but at least we can open/create firmware upgrades. Change-Id: Id23a10e10170d7f6330c6699bf205c4df5ddebfe
-rw-r--r--utils/nwztools/upgtools/upgtool.c13
1 files changed, 8 insertions, 5 deletions
diff --git a/utils/nwztools/upgtools/upgtool.c b/utils/nwztools/upgtools/upgtool.c
index 3a8cf6174b..d00f216201 100644
--- a/utils/nwztools/upgtools/upgtool.c
+++ b/utils/nwztools/upgtools/upgtool.c
@@ -173,13 +173,16 @@ struct upg_entry_t
173 173
174struct nwz_model_t g_model_list[] = 174struct nwz_model_t g_model_list[] =
175{ 175{
176 { "nwz-e45x", HAS_KAS | HAS_KEY | HAS_SIG | CONFIRMED, "8a01b624bfbfde4a1662a1772220e3c5", "6173819e", "30b82e5c"}, 176 { "nwz-e450", HAS_KAS | HAS_KEY | HAS_SIG | CONFIRMED, "8a01b624bfbfde4a1662a1772220e3c5", "6173819e", "30b82e5c"},
177 { "nwz-e46x", HAS_KAS | HAS_KEY | HAS_SIG | CONFIRMED, "89d813f8f966efdebd9c9e0ea98156d2", "eb4431eb", "4f1d9cac" }, 177 { "nwz-e460", HAS_KAS | HAS_KEY | HAS_SIG | CONFIRMED, "89d813f8f966efdebd9c9e0ea98156d2", "eb4431eb", "4f1d9cac" },
178 { "nwz-a86x", HAS_KAS | HAS_KEY | HAS_SIG | CONFIRMED, "a7c4af6c28b8900a783f307c1ba538c5", "c824e4e2", "7c262bb0" }, 178 { "nwz-a860", HAS_KAS | HAS_KEY | HAS_SIG | CONFIRMED, "a7c4af6c28b8900a783f307c1ba538c5", "c824e4e2", "7c262bb0" },
179 /* The following keys were obtained by brute forcing firmware upgrades, 179 /* The following keys were obtained by brute forcing firmware upgrades,
180 * someone with a device needs to confirm that they work */ 180 * someone with a device needs to confirm that they work */
181 { "nw-a82x", HAS_KEY | HAS_SIG, "", "4df06482", "07fa0b6e" }, 181 { "nw-a820", HAS_KEY | HAS_SIG, "", "4df06482", "07fa0b6e" },
182 { "nwz-a1x", HAS_KEY | HAS_SIG, "", "ec2888e2", "f62ced8a" }, 182 { "nwz-a10", HAS_KEY | HAS_SIG, "", "ec2888e2", "f62ced8a" },
183 { "nwz-a20", HAS_KEY | HAS_SIG, "", "e8e204ee", "577614df" },
184 { "nwz-zx100", HAS_KEY | HAS_SIG, "", "22e44606", "a9f95e90" },
185 { "nwz-e580", HAS_KEY | HAS_SIG, "", "a60806ea", "97e8ce46" },
183}; 186};
184 187
185static int digit_value(char c) 188static int digit_value(char c)