| Commit message (Collapse) | Author | Age |
| |
|
|
|
|
| |
Factor all printf method with a unique one defined in misc.h
Change-Id: I58fbf8916b76e873a2e6678506d2c8aece7834ec
|
| |
|
|
|
|
|
| |
The code used printf instead of the provided printf functions,
resulting in strange output.
Change-Id: I2c7c2531d8d54ecdea97e8c189d18d351320ca7d
|
| |
|
|
| |
Change-Id: I82c4642aea325cf22d66e9b49fc2d47319cd70eb
|
| |
|
|
|
|
|
| |
Factor common elf/sb read/write/printf routines. Factor sb zero
key, move sb version guess.
Change-Id: I5ae1885587456736e782e623610281bbee545039
|
| |
|
|
|
|
|
|
|
|
| |
After some reverse engineering, it appears that the keys of the
sb1 format are very weak: the 128 bytes are generated from the
laserfuse words 4,5 and 6 but in a weird manner: 4 and 5 are
simply ORed and 6 is only half used (somehow), making it "only" a
48 bit word to find.
Change-Id: I40702e19d0924ef51c01894efce3cb65bd664456
|
| |
|
|
| |
Change-Id: I6c8e5f3faf04741e4a13c1e705e9e869ccf8cfec
|
| |
|
|
|
|
|
| |
Implement actual loading of a sb1 file to a structure in full
generality. Also implement dumping for debug purpose
Change-Id: I320035ea628719480a79aaccb05dce9a83256927
|
| |
|
|
|
|
|
|
|
| |
In the case of encrypted SB files without any key match, it is
still possible to dump the section headers. The force option
allows one to do so. It also allows to dump unencrypted sections
of encrypted files if there are some.
Change-Id: I36280230679ac5903f9c451c68c276f5c6959536
|
|
|
Change-Id: I0d8d6831b35037725486f61fc363de87bc8ba92e
|