Communication Processor: Difference between revisions
Jump to navigation
Jump to search
Line 16: | Line 16: | ||
| 0x1C || u32 || Extracted/decrypted CPUP size || | | 0x1C || u32 || Extracted/decrypted CPUP size || | ||
|- | |- | ||
| -0x100 || 0x100 || RSA Encrypted AES-KeyBlob || 0x00-0x10 = Iv, 0x20 | | -0x100 || 0x100 || RSA Encrypted AES-KeyBlob || 0x00-0x10 = Iv, 0x10-0x20 = Key, 0x20-0x34 = Sha1 | ||
|} | |} | ||
Revision as of 12:50, 1 August 2020
Update Structure
Offset | Size | Description | Notes |
---|---|---|---|
0x0 | u32 | MAGIC "CpUp" | |
0x4 | u32 | Version | |
0x10 | u32 | Unknown, always 0x01000000 | Probably Entrypoint or type |
0x14 | u32 | Full CPUP size | Always % 0x10 = 0 |
0x18 | u32 | Payload/data start address | Always 0x20 |
0x1C | u32 | Extracted/decrypted CPUP size | |
-0x100 | 0x100 | RSA Encrypted AES-KeyBlob | 0x00-0x10 = Iv, 0x10-0x20 = Key, 0x20-0x34 = Sha1 |
Pictures
<imgur>z0CZTEp.png</imgur>
<imgur>vbw6m9i.png</imgur>
<imgur>xX1d9zs.png</imgur>
<imgur>W3msHTh.png</imgur>
<imgur>TAkfyqy.png</imgur>
<imgur>0asQT0B.png</imgur>
Manuals/Info
eMMC: https://datasheet.iiic.cc/datasheets-0/samsung/KLM2G1DEHE-B101.pdf
CPU (extra): https://www.rockbox.org/wiki/EmmaMobile1