Safety changes:
- Added sanity checks for loaded files.
- Tunes
- Check that SW reference is compatible with installed program
- Check that injection and ignition tunes are of the same version
- Check that injection and ignition tunes are in the correct order
- Full writes:
- Check that Program Reference is compatible with DME hardware
- Check that injection and ignition programs are of the same version
- Check that a tune is loaded in the binary and passes above tune checks
- Added a warning if you attempt to close the application in the middle of a flash process
- This SHOULD allow the application to keep running while the warning shows, but I did have one instance where the flash got interrupted anyway. Maybe I knocked my cable or something. YMMV
- Disabled all buttons (ident/read/write) during active flash process
New Features:
- Ram dumping - hold shift while you click Read DME, and the software will dump the RAM and save each side as two different files
- EWS4 SK Reading (MSS60 Only) - Reads the injection RAM, searches for the EWS4 SK using a pattern search.
- If successful, the key is displayed in the application and a file with the SK is saved (file will include the appropriate header to be pasted in directly at 0x7948 of the injection dump)
- When doing a full read on the MSS60, the DME will search for the SK at the end and add it to the dump before saving the file (I did not thoroughly test this due to the nature of how long full reads take, but I expect it will work fine).
The previous link I shared with everyone should point to the latest version of the app
Now I want to pose a question for everyone about how I should handle the safety of the RSA flashing:
The trick I currently use to defeat RSA has the potential to permanently / unrecoverably brick non-BDMable MSS60s if flashed with a non-EdiabasLib cable
I can change the method slightly so that the bricks will at least be recoverable via WinKFP when using an appropriate interface -- however this method will roughly double the time it takes to do the RSA bypass
So what do you guys prefer I do? As much as it pains me to lose the speed, I'm sorta thinking it would be more responsible to do it the slower way.
Even with the above change, if someone flashes the DME Program (or repeats the RSA bypass) with a non-EdiabasLib cable after an RSA bypass has already been installed, the DME will unrecoverably brick - I cannot get around that.

Leave a comment: