If this is your first visit, be sure to
check out the FAQ by clicking the
link above. You may have to register
before you can post: click the register link above to proceed. To start viewing messages,
select the forum that you want to visit from the selection below.
The keys that are used in the app to sign the seed and decrypt the signature, they are from the file SGIDC.as2 in the gdaten directory?
I'm trying to work out the format of the lines in that file - I'm assuming each line contains several keys combined and they are probably encrypted by another key??
I'm very familiar with the F/G series keys but never looked into the E series stuff. Happy to share F/G series knowledge.
Any help would be much appreciated, thanks.
P.
They’re triple des encrypted. I’ll dig up the keys later. You can find them if you disassemble WinKFP. The symmetric encryption keys I thinks are encrypted with something else.
For the rsa authenticated modules, each line contains the modulus and private exponent for level 3 security access (ECU Programming Mode). Public exponent is always 7 for security access.
The keys that are used in the app to sign the seed and decrypt the signature, they are from the file SGIDC.as2 in the gdaten directory?
I'm trying to work out the format of the lines in that file - I'm assuming each line contains several keys combined and they are probably encrypted by another key??
I'm very familiar with the F/G series keys but never looked into the E series stuff. Happy to share F/G series knowledge.
There are always multiple ways to achieve the same result - if this is the result of teaching yourself C# - I congratulate you - I'll start teaching myself to become a doctor - I bet I don't get as good a result as this!!
Possible for MSS60 and MSS65 also with options for Swap like also Limiter at 5500rpm with lost abs signal, with full power and no CAN-bus problems. No Emulator, in file.
You could make a full backup, flash to stock with WinKFP, and then flash your backup back.
Ended up using the binary modification tool to edit my DME file after backing up the DME using MSS6x flasher. Will be taking M5 to get smog tested this weekend...
[*]If successful, the key is displayed in the application and a file with the SK is saved (file will include the appropriate header to be pasted in directly at 0x7948 of the injection dump)
I don't understand why the SK would be at this position, I saw that you where able to dump the UC3FMCR which was 43 FF 00 FF, which means PROTECT = FF so the only protection would be through SBPROTECT + SBEN .
But in the datasheet the first two blocks layout is 16K (SB[0] + 48K ; 48K +16K SB[1] ), so 0x7948 would be inside the remainer of BLOCK[0] right ?
which should not protected
Leave a comment: