Fascinating read, learntofly- thanks for this input. I'll give these files a spin over the weekend on C9.25 and report back. Like I said above, running rom7 only, newcamd never wanted to play ball through many different images. But recently, hey presto! It clears... Strange thing is though, when you look at the keylist file, both pk's have 4 bytes shifted up or down by a factor of 1.
So a 3 becomes a 4, a C becomes a B etc etc. But it still decrypts...
Respects- AL
Update: Just tested, but same result as above, LTF. I'm not sure neutrino will automatically use your 2 new files in /var/lib/ unless nitr8 and tapper create a symlink specially for this? (I'm only a humble tester, not a very good one at that- not a modder / compiler, LOL!).
I made sure to have /var/keys/keylist at 0 bytes with evocamd running, then switched to newcamd, waited for it to clear, then rebooted. The data I see in keylist is still fake for 4 bytes in each row, but it works! (Gbox & camd2 gives similar results in it's nagra file, but 3 bytes in each row are shifted; that works fine, too). Cheers- AL