jvvh5897
04-07-2017, 07:20 PM
I was interested in how the Az Link software differed from the Jynxbox. I downloaded both the Jynx 251 file and the Az link v3-243 file that folks say is clone safe. Disassembled both files after extracting main sw with lzma. Found both boxes use RAM address base of 0x80000200. Found both use At88SC3216 type of chips as security chips (have a data sheet on the chip). Both call similar routines around the same time as they setup for HDMI. Both seem to have the same byte arrays to send to the chip and test against returned byte sequences.
I'm posting the routines I found in both--some utilities like memset and memcmp are of use to find similar routines in either. String use is really the easy way to find routines.
In Jx 251 file:
800C28A8 # debug message (crypto)
800C34B8 # verify crypto chip
(uses 4394D0 CB 14 38 45 EE 0B E6 03 --and 60 57 34, 20 58 E5, )
800C30D8 # verify password 7 (8A 58 51 45 and 8A 58 51 62-9D 2B AE 47 88 44 18 0E 8B 72 E6 03)
800C3410 # calls to password 7 test
800BA3C4 # key size, password 7 test....
800C5CE0 # crypt test
800CF898 # string copy?
800CF8D8 # mem compare?
800CF91C # find str length
800CF684 # memset?
800CF394 # memcopy?
800CF3CC # memcpy?
800CF370 # long memset
800BA4D4 # fuse test and KSV test
800C2B00 # ATMEL chip detect
800C2C54 # test ATMEL fuse
800C2F6C # user zone test
800C2DC0 # verify test and config erase
800C2CC4 # "Blow Fuse Verify Password"
800C2A50 # INIT (crypto?)
800BA87C # call init(crypto) and verify crypto chip
800BA934 # start crypto chip and find "S3602 HD STB" string
800C36A8 # cm_ReadConfigZone
800BEE48 # HDMI setup, sys watch dog and crypto chip detect
800D0670 # Front LED display message pan_display
8026E674 # CreateServerTask (SRV RCV)
800283A8 # AppInit (can Show "Er01 ")
8001A08C # dog_init
8026FD30 # osal_dual_get_see_run_address
80028374 # see_boot
800274E0 # "MC: APP init system_hw_init
8003C460 # Factory test
8003C884 # Fact test LNB1 and 2
8003C9C4 # fact test: usb test
8003D568 # RS232 Test part of fact test
8004526C # "HDMI Factory Test menu"
8003C1F0 # fact test callback number
8003C248 # fact test callback
8000D42C # ap_hk_to_vk
8000D3C0 # scan_code_to_msg_code
800CC8F0 # dev_get_by_id
802A83DC # ge_open
8000075C # sys_watchdog_reboot
800F10F8 # OSD_SurfaceInit
8000D2C8 # osd_ge_init
8000E54C # ap_get_key_msg
8001DB84 # power_switch
80019D78 # key_pan_display
800CF234 # printf
8012B800 # get_sdk_ver
802A84BC # get_core_ver
I'm posting the routines I found in both--some utilities like memset and memcmp are of use to find similar routines in either. String use is really the easy way to find routines.
In Jx 251 file:
800C28A8 # debug message (crypto)
800C34B8 # verify crypto chip
(uses 4394D0 CB 14 38 45 EE 0B E6 03 --and 60 57 34, 20 58 E5, )
800C30D8 # verify password 7 (8A 58 51 45 and 8A 58 51 62-9D 2B AE 47 88 44 18 0E 8B 72 E6 03)
800C3410 # calls to password 7 test
800BA3C4 # key size, password 7 test....
800C5CE0 # crypt test
800CF898 # string copy?
800CF8D8 # mem compare?
800CF91C # find str length
800CF684 # memset?
800CF394 # memcopy?
800CF3CC # memcpy?
800CF370 # long memset
800BA4D4 # fuse test and KSV test
800C2B00 # ATMEL chip detect
800C2C54 # test ATMEL fuse
800C2F6C # user zone test
800C2DC0 # verify test and config erase
800C2CC4 # "Blow Fuse Verify Password"
800C2A50 # INIT (crypto?)
800BA87C # call init(crypto) and verify crypto chip
800BA934 # start crypto chip and find "S3602 HD STB" string
800C36A8 # cm_ReadConfigZone
800BEE48 # HDMI setup, sys watch dog and crypto chip detect
800D0670 # Front LED display message pan_display
8026E674 # CreateServerTask (SRV RCV)
800283A8 # AppInit (can Show "Er01 ")
8001A08C # dog_init
8026FD30 # osal_dual_get_see_run_address
80028374 # see_boot
800274E0 # "MC: APP init system_hw_init
8003C460 # Factory test
8003C884 # Fact test LNB1 and 2
8003C9C4 # fact test: usb test
8003D568 # RS232 Test part of fact test
8004526C # "HDMI Factory Test menu"
8003C1F0 # fact test callback number
8003C248 # fact test callback
8000D42C # ap_hk_to_vk
8000D3C0 # scan_code_to_msg_code
800CC8F0 # dev_get_by_id
802A83DC # ge_open
8000075C # sys_watchdog_reboot
800F10F8 # OSD_SurfaceInit
8000D2C8 # osd_ge_init
8000E54C # ap_get_key_msg
8001DB84 # power_switch
80019D78 # key_pan_display
800CF234 # printf
8012B800 # get_sdk_ver
802A84BC # get_core_ver