Search results for query: *

  1. W

    Nagra Hex block Decryption

    he try to said, you know nothing about this ca system and the basics
  2. W

    Nagra Hex block Decryption

    you did not understand the secret of dh...
  3. W

    Nagra Hex block Decryption

    Before asking any further questions, please study Diffie-Hellman and RSA.
  4. W

    Nagra Hex block Decryption

    yes, your team is right you can verify the result by using it on rsa example. result of the expand function is p and q. with p and q and 65537 as public exponent, you can calculate private exponent and modulo. look, that's simple math
  5. W

    Nagra Hex block Decryption

    I think you have not really understood the synchronous merlin protocol.. I can init my HD02 with this example authentication data for cmd 0E, in generic mode: [10D63AF1] [00] [6B4CA736] [3411] [9D7E..114C] [A0A1A2A3] [00080000] If DT05 requenst not include record 20_74, the card not support...
  6. W

    Nagra Hex block Decryption

    and you have realy replace the mod block with [9D7E..114C] generic mod
  7. W

    Nagra Hex block Decryption

    i can find cmd 0e unique pairing example.
  8. W

    Nagra Hex block Decryption

    try this cmd 0E example
  9. W

    Nagra Hex block Decryption

    great, first fix this step an your init will work up to cmd 0E
  10. W

    Nagra Hex block Decryption

    can you init up to cmd 0E?
  11. W

    Nagra Hex block Decryption

    you can set A0A1A2A3 for nuid an 00800000 for optctrl
  12. W

    Nagra Hex block Decryption

    no, you have the right syntax. try to decrypt season log offline up to authentication process and you will unterstand the transport layer protocol.
  13. W

    Nagra Hex block Decryption

    why? cmd 0E allow generic and unique
  14. W

    Nagra Hex block Decryption

    if (1222EDB8 right crc32) and (00000B02 right sequence id) then yes BBBBUUUUTTTTT, this rom version not accept cmd 02 ;), only cmd 0E
  15. W

    Nagra Hex block Decryption

    CMD LEN 7B indicate for cmd 02 not cmd 0E Same authentication init with cmd 02 <rand32> + [00] + <camid> + [3411] + [9D7E..114C]
  16. W

    Nagra Hex block Decryption

    Try this cmd0E payload <rand32> + [00] + <camid> + [3411] + [9D7E..114C] + <nuid> + <otpctrl>
  17. W

    Nagra Hex block Decryption

    Now need cwpk-nuid-keyset for real life testing ;)
  18. W

    Nagra Hex block Decryption

    and describe the dump a valid ubi image, then a compression is inside
  19. W

    Nagra Hex block Decryption

    you have not done wrong, but please note the endian format of the soc
  20. W

    Nagra Hex block Decryption

    first swap your nand dump (32bit). context start with ubi magic
Back
Top