New Keyroll Method - 17/11/05

Satch

DW Member ++
Joined
Mar 6, 2005
Messages
1,914
Reaction score
24
Hi All,

This was posted on Endcrypt by Boxter1


New Keyroll Method - 17/11/05

--------------------------------------------------------------------------------

TeleWest, and believe the other cable providers as well, have today started transmitting a new key roll method that will effectively kill all the present AU cards (except MOSC).

THis keyroll method, is as follows -

[CODE[
FA -> RUN CODE FOR ROM10:
4FC70120C70121C7 0122A629CD90E3C6 0120CA0121CA0122 27B43CA93CB3A624
CC6B01835B014205 2B74945F99926958 42858990DD46CE6C FBBC0000

DISASSEMBLY OF CODE:
------------------------------

0081: 4F clra ; a <-- 0
0082: C7 01 20 sta $0120 ; Store A in...
0085: C7 01 21 sta $0121 ; Store A in...
0088: C7 01 22 sta $0122 ; Store A in...
008B: A6 29 lda #$29 ; Load MAP Function
008D: CD 90 E3 jsr $90E3 ; Go to subroutine CALL_MAP
0090: C6 01 20 lda $0120 ; Load in A
0093: CA 01 21 ora $0121 ; A= A or ...
0096: CA 01 22 ora $0122 ; A= A or ...
0099: 27 B4 beq RC3L ; Branch if =
009B: 3C A9 inc $A9 ; +=1
009D: 3C B3 inc $B3 ; +=1
009F: A6 24 lda #$24 ; Load in A
00A1: CC 6B 01 jmp $6B01 ; Jump FilterOK

BYTES DUMP:
---------------------
00A4: 83 5B 01 42 05 2B 74 94
00AC: 5F 99 92 69 58 42 85 89
00B4: 90 DD 46 CE 6C FB BC 00
00BC: 00
[/CODE]

This appears to use an undocumented call to the maths co-processor on a real card to implement some, as yet, unknown function.
 
TEST
Top