Results 1 to 2 of 2

Thread: iredeto emm

  1. #1
    New Member satworld's Avatar
    Join Date
    Aug 2008
    Location
    india
    Age
    38
    Posts
    36
    Rep Power
    22

    iredeto emm

    EMM Decrypt OPKEY FAQ Irdeto2 BY Kasit Botonnou

    Let's see how to decrypt an EMM OPKEY ejemlo ****** 2 out of old ART EMM which had the key PMK known and published


    -------------------------------------------------- -------------------------------------------------- -----
    Before all we will see the keys needed for an EMM Desencrytar or to make an Auto Update: -
    -
    ART: 060 400 -
    PMK: AF38DA5E9E00AADB 39A1BCBCB060DEA3 Adrress: 08D7 -
    EMM-Seed: DA65344511C953D8 6EDAF329EF20376E -
    Common-IV: 5BC9E74A983AA5A7 903B000000000000 -
    -------------------------------------------------- -------------------------------------------------- -----


    -------------------------------------------------- -------------------------------------------------- -----
    and the EMM OPKEY Encrypatada (Encrypt) is as follows: - -
    -------------------------------------------------- ------ -
    EMM: 82403F0208D7000030384913FC3C61266ED85CD727D1E7A657 83F97DF52C7BD5996F330C884F922A06191338FB13E -
    68B6BD26AFCFE180C9340BA9A3152EB37327046 -
    -------------------------------------------------- -------------------------------------------------- -----


    -------------------------------------------------- -------------------------------------------------- -----
    Let's do an analysis to this OPKEY EMM which is encrypted (Encrypt): - -
    -------------------------------------------------- ----------------------------- -
    Haedo <<------ 3F 82403F (length = Hex: 0x3F Dec: 63) -
    Group Type <<------ 02 00 -
    <<------ 08D7 Address -
    Fill <<------ 0000 -
    30 <<------ Provider ID -
    38 <<------ Length Of Bytes (Hex: 0x39 = (Dec: 8 * 7 = 56 bytes)) -
    <<------ 4913FC3C61266ED8 Encrypt Data 1 -
    <<------ 5CD727D1E7A65783 Encrypt Data 2 -
    <<------ F97DF52C7BD5996F Encrypt Data 3 -
    <<------ 330C884F922A0619 Encrypt Data 4 -
    <<------ 1338FB13E68B6BD2 Encrypt Data 5 -
    <<------ 6AFCFE180C9340BA Encrypt Data 6 -
    <<------ 9A3152EB37327046 Encrypt Data 7 (Signature) -
    -------------------------------------------------- -------------------------------------------------- -----


    The algorithm used to decrypt an EMM or ECM deIrdeto 2 is the algorithm 3DES CBC
    not talking here sobe this algorithm is already known


    Now Let's start step by step and see the whole process to decrypt an EMM R2 to calculate the signature (Signature)

    The steps are:
    1 - Prepared EMM_SEED (Encrypt 3DESCBC)
    2 - EMM Decrypt (Decrypt 3DESCBC)
    3 - Nano Decrypt (Decrypt 3DESCBC)
    4 - CalculateMAC (Encrypt 3DESCBC)




    ****************************************
    1 - Prepared EMM_SEED (Encrypt 3DESCBC) ****************************************** ***************
    **************************************** *
    *
    First we make a preparation step of the algorithm EMM_Seed Key 3DES CBC (Encrypt) *
    we already have the PMK as the Key you'll use for the algorithm 3DES CBC *
    Data EMM_Seed or the message is that we give the algorithm 3DES CBC *
    and IV is the 3DES algorithm using the CBC to do the XOR *
    *
    *
    PMK = AF38DA5E9E00AADB 39A1BCBCB060DEA3 (16 bytes) Key 3DES CBC (K1 = K3) *
    Seed = DA65344511C953D8 6EDAF329EF20376E EMM (16 bytes) * Data 3DES CBC
    IV = 0000000000000000 (08 bytes) ****************** IV 3DES CBC
    *
    *
    Then started: *********************************************** ************************
    *
    0000000000000000) (DA65344511C953D8 Xor Encrypt = (3DES) DA65344511C953D8 AF38DA5E9E00AADB 39A1BCBCB060DEA3 = E046C69E8CB4A40D *
    Data 8 Bytes'ES 'IV 3DES 3DES CBC CBC Key Results Bloc1 PMK Emm_Seed Prepared ok *
    *
    6EDAF329EF20376E) (Xor Encrypt E046C69E8CB4A40D = (3DES) 8E9C35B763949363 AF38DA5E9E00AADB 39A1BCBCB060DEA3 = A16E52AF4CAE6A15 *
    Data 8 Bytes'ES 'Pre Result Emm_Seed Blo1 PMK Key 3DES CBC Bloc2 Emm_Seed Prepared ok *
    *
    *
    Prepared EMM_Seed = E046C69E8CB4A40D A16E52AF4CAE6A15 (After After preparing with the algorithm used 3DES CBC) **********************
    *
    *
    already completed the first step was to make a 3DES CBC Supplement of the EMM_SEED *
    Prepared EMM_SEED: E046C69E8CB4A40D A16E52AF4CAE6A15 *
    *
    ************************************************** ************************************************** ****************************



    **********************************
    2 - EMM Decrypt (Decrypt 3DESCBC) ****************************************** ******************************************
    ********************************** *
    *
    We are in the second step and always with the algotimo 3DESCBC but we must now Decrypt (Decrypt 3DES CBC) *
    and what we have to decrypt encrypted blocks are already in the EMM habamos seven blocks as seen above *
    *
    and what is needed here Data is Encrypted data and we Emm Decrypt * Bytes 8-8
    Key Prepared EMM_Seed as we will use for the algorithm 3DES CBC *****************
    EMM_IV key and IV as Key to use for the Xor of 3DESCBC *
    *
    Data = (Eight to eight bytes (emm are data which are encrypted)) *
    Prepared EMM_Seed = E046C69E8CB4A40D A16E52AF4CAE6A15 (Prepared will be the key 3des) *
    EMM_IV = 5BC9E74A983AA5A7 903B000000000000 (only first 8 bytes) *
    *
    The EMM data blocks that we are 7 blocks for Round 7 *
    -------------------------------------------------- ------------------- *
    - Encrypt Data 1 <<------ 4913FC3C61266ED8 Round 1 - *
    - 5CD727D1E7A65783 <<------ Encrypt Data 2 Round 2 - *
    - F97DF52C7BD5996F <<------ Encrypt Data 3 Round 3 - *
    - 330C884F922A0619 <<------ Encrypt Data 4 Round 4 - *
    - 1338FB13E68B6BD2 <<------ Encrypt Data 5 Round 5 - *
    - 6AFCFE180C9340BA <<------ Encrypt Data 6 Round 6 - *
    - 9A3152EB37327046 <<------ Encrypt Data 7 (Signature) Round 7 - *
    -------------------------------------------------- ------------------- *
    *
    Deciphering started eight to eight Bytes 3DES algorithm with the CBC: *
    *
    ************************************************** ******************************
    EMM Encrypted:
    82403F0208D7000030 [38] | | 4913FC3C61266ED8 | | 5CD727D1E7A65783 | | F97DF52C7BD5996F | | 330C884F922A0619 | | 1338FB13E68B6BD2 | | 6AFCFE180C9340BA | | 9A3152EB37327046
    | | Round 1 | | Round 2 | | Round 3 | | Round 4 | | Round 5 | | ROUND 6 | | ROUND 7
    Encrypted Data ................................................ .................................................. .........................


    ROUND 1: 3DES Decrypt) (4913FC3C61266ED8 E046C69E8CB4A40D A16E52AF4CAE6A15 = (Xor) 1BCAE45570C5F5B6 4003031FE8FF5011 5BC9E74A983AA5A7 = (Result Bloc 1)
    Prepared EMM_Seed Data 1 Key 3DES CBC = Result EMM_IV Decrypted Data 1

    ROUND 2: 3DES Decrypt) (5CD727D1E7A65783 E046C69E8CB4A40D A16E52AF4CAE6A15 = (Xor) 51273A5AEA69A0D4 1834C6668B4FCE0C 4913FC3C61266ED8 = (Result Bloc 2)
    Data 2 Key 3DES CBC Prepared EMM_Seed Result = Encrypt Data 1 Data 2 Decrypted

    ROUND 3: 3DES Decrypt) (F97DF52C7BD5996F E046C69E8CB4A40D A16E52AF4CAE6A15 = (Xor) 6FCDD4CF587C99E4 331AF31EBFDACE67 5CD727D1E7A65783 = (Result Bloc 3)
    Prepared EMM_Seed Key Data 3 = Result 3DES CBC Encrypt Data 2 Data 3 Decrypted

    ROUND 4: 3DES Decrypt) (330C884F922A0619 E046C69E8CB4A40D A16E52AF4CAE6A15 = (Xor) 0C2DE40CAC49DDA7 F5501120D79C44C8 F97DF52C7BD5996F = (Result Bloc 4)
    Key Data Prepared 4 EMM_Seed CBC = 3DES Encrypt Data 3 Data Results 4 Decrypted

    ROUND 5: 3DES Decrypt) (1338FB13E68B6BD2 E046C69E8CB4A40D A16E52AF4CAE6A15 = (Xor) 2C7359CB7AF8C78A 1F7FD184E8D2C193 330C884F922A0619 = (Result Bloc 5)
    Prepared EMM_Seed Key Data 5 = Result 3DES CBC Encrypt Data 4 Data 5 Decrypted

    ROUND 6: 3DES Decrypt) (6AFCFE180C9340BA E046C69E8CB4A40D A16E52AF4CAE6A15 = (Xor) 69AFD81AA6896233 7A972309400209E1 1338FB13E68B6BD2 = (Result Bloc 6)
    Key Data Prepared in June EMM_Seed CBC = 3DES Encrypt Data 5 Results 6 Decrypted Data

    ROUND 7: 3DES Decrypt) (9A3152EB37327046 E046C69E8CB4A40D A16E52AF4CAE6A15 = (Xor) 35FC7911E95FB504 5F008709E5CCF5BE 6AFCFE180C9340BA = (Result Bloc 7)
    Prepared EMM_Seed Key Data 7 = Result 3DES CBC Encrypt Data 6 Data 7 Decrypted



    Results All Round's Decrypted EMM = Data:
    -------------------------------------------------- -------------------
    - 4003031FE8FF5011 <<------ Decrypt Data 1 Round 1 -
    - 1834C6668B4FCE0C <<------ Decrypt Data 2 Round 2 -
    - 331AF31EBFDACE67 <<------ Decrypt Data 3 Round 3 -
    - F5501120D79C44C8 <<------ Decrypt Data 4 Round 4 -
    - 1F7FD184E8D2C193 <<------ Decrypt Data 5 Round 5 -
    - 7A972309400209E1 <<------ Decrypt Data 6 Round 6 -
    - Data 7 5F008709E5CCF5BE <<------ Decrypt (Signature) Round 7 -
    -------------------------------------------------- -------------------


    Decrypted EMM:
    82403F0208D7000030 [38] | | 4003031FE8FF5011 | | 1834C6668B4FCE0C | | 331AF31EBFDACE67 | | F5501120D79C44C8 | | 1F7FD184E8D2C193 | | 7A972309400209E1 | | 5F008709E5CCF5BE
    | | Round 1 | | Round 2 | | Round 3 | | Round 4 | | Round 5 | | ROUND 6 | | ROUND 7
    Data ................................................ Deciphered .................................................. ......................

    We now have the decrypted EMM but not OPKEYs, ****** 2 because both are encrypted EMM as OPKEYs
    EMM Desencritar desu step comes the OPKEYS desecnriptar found in the decrypted EMM


    First Let's do an analysis after the EMM has been decrypted

    -------------------------------------------------- -------------------------------------------------- -----
    Let's do an analysis of this which is decrypted EMM (Decrypted): - -
    -------------------------------------------------- ----------------------------- -
    Haedo <<------ 3F 82403F (length = Hex: 0x3F Dec: 63) -
    Group Type <<------ 02 00 -
    <<------ 08D7 Address -
    Rellenot <<------ 0000 -
    30 <<------ Provider ID -
    38 <<------ Length Of Bytes (Hex: 0x39 = (Dec: 8 * 7 = 56 bytes)) -
    40 March 1903 E8 1F FF -
    Nano <<------ 50 November 1918 50 ° ° ° ° Index Len 0x11 18 / 4 = 06 -
    Encrypt OPKEY <<------ 34C6668B4FCE0C331AF31EBFDACE67F5 -
    Nano <<------ 501 120 50 ° ° ° ° Index Len 0x11 20 / 4 = 08 -
    Encrypt OPKEY <<------ D79C44C81F7FD184E8D2C1937A972309 -
    40 February 2009 E1 -
    <<------ 5F008709E5CCF5BE Signature (Signature) -
    -------------------------------------------------- -------------------------------------------------- -----

    Where is the Nano 50 3 bytes later is The OPKEY
    and no other case can also find Nano in October 1911 while XX 50 11 XX
    and the index is divided over four and gives us the index that supports the EMU's from Our appliances Reciver
    whether the EMM is 08 because it is divided on 4 and 02 Index result
    whether the EMM is as divided on 10 April and 04 Index result
    whether the EMM is as divided on 18 April and 06 Index result
    whether the EMM is 20 since April and is divided over 08 Index result is ...


    We will see the EMM with another way

    Decrypted EMM (OPKEYS Encrypt):
    82403F0208D7000030 [38] | | 4003031FE8FF 501 118 | | 34C6668B4FCE0C33 1AF31EBFDACE67F5 | | 501 120 | | D79C44C81F7FD184 E8D2C1937A972309 | | 400209E1 5F008709E5CCF5BE
    | | OPKEY ENCRYPT | | | | OPKEY ENCRYPT | |

    ************************************************** *******************************************
    Well, we have the OPKEYS Encrypted within a decrypted emm *
    for these OPKEYS esencriptacion Let the third Step *
    *
    ************************************************** ***********************


    ____________________________________
    3 - Nano Decrypt (Decrypt 3DES CBC) __________________________________________________ __________________________________________________ ________________________________
    ____________________________________

    Well as always the algorithm used to decrypt these OPKEYS is always 3DES CBC


    What we need OPKEYs Data1 and Data2 are encrypted and the key PMK and EMM_iv:

    Data1 = 34C6668B4FCE0C33 1AF31EBFDACE67F5 (OPKEY ENCRYPT) <<- OPKEY 06 (18)
    Data2 = D79C44C81F7FD184 E8D2C1937A972309 (OPKEY ENCRYPT) <<- OPKEY 08 (20)
    = AF38DA5E9E00AADB 39A1BCBCB060DEA3 PMK (PMK pley MASTER KEY)
    5BC9E74A983AA5A7 903B000000000000 EMM_IV = ((IV 3DES CBC) We use only first 8 bytes)


    we will decrypt the First OPKEY and then second how desncriptar the first is the same as the second () Decrypt 3DESCBC)
    -----------------------------

    Data1 = 34C6668B4FCE0C33 1AF31EBFDACE67F5 (OPKEY ENCRYPT) <<- OPKEY 06 (18)
    Bloc 1 Bloc 2 Encrypt Encrypt


    ROUND 1: 3DES Decrypt) (34C6668B4FCE0C33 AF38DA5E9E00AADB 98143F086A0A05B0 39A1BCBCB060DEA3 = (Xor) 5BC9E74A983AA5A7 = C3DDD842F230A017
    Key Encrypt PMK Bloc 1 Result IV 3DES 3DES CBC CBC OPKEY Bloc1 Decrypted


    ROUND 2: 3DES Decrypt) (1AF31EBFDACE67F5 AF38DA5E9E00AADB 78DCF6648AB2F85E 39A1BCBCB060DEA3 = (Xor) 34C6668B4FCE0C33 = 4C1A90EFC57CF46D (OPKEY Decr)
    Key Encrypt PMK Bloc 2 Results Bloc1 3DES CBC Encrypt OPKEY Bloc2 Decrypted


    OPKEY 06 (18) Decrypted: C3DDD842F230A017 4C1A90EFC57CF46D <<<<----- and we finally decrypted OPKEY !!!!!!!!!!!!!!!
    Decrypted Bloc1 Bloc2 Decrypted
    -----------------------------
    Data2 = D79C44C81F7FD184 E8D2C1937A972309 (OPKEY ENCRYPT) <<- OPKEY 08 (20)
    Bloc 1 Bloc 2 Encrypt Encrypt


    ROUND 1: 3DES Decrypt) (D79C44C81F7FD184 AF38DA5E9E00AADB 29F3F9202EB28219 39A1BCBCB060DEA3 = (Xor) 5BC9E74A983AA5A7 = 723A1E6AB68827BE (OPKEY Decr)
    Key Encrypt PMK Bloc 1 Result IV 3DES 3DES CBC CBC OPKEY Bloc1 Decrypted


    ROUND 2: 3DES Decrypt) (E8D2C1937A972309 AF38DA5E9E00AADB 43D5635A1C483DAD 39A1BCBCB060DEA3 = (Xor) D79C44C81F7FD184 = 944927920337EC29 (OPKEY Decr)
    Key Encrypt PMK Bloc 2 Results Bloc1 3DES CBC Encrypt OPKEY Bloc2 Decrypted

    OPKEY 08 (20) Decrypted: 723A1E6AB68827BE 944927920337EC29 <<<<----- and we finally decrypted OPKEY !!!!!!!!!!!!!!!
    Decrypted Bloc1 Bloc2 Decrypted
    -----------------------------
    __________________________________________________ _________________________________
    ************************************************** _ ************
    OPKEY 06 (18) Decrypted: C3DDD842F230A017 4C1A90EFC57CF46D * _
    OPKEY 08 (20) Decrypted: 723A1E6AB68827BE 944927920337EC29 * _
    ************************************************** _ ************
    _
    _
    Now the MA and OPKEY tenemso's decrypted: _
    _
    82403F <<- _ Haedo
    02 <<- Type Group 00 _
    08D7 <<- Address _
    0000 _
    30 <<- _ Group Provider ID
    38 <<- Len (Hex: 0x39 = (Dec: 8 * 7 = 56 bytes)) _
    _ 4003031FE8FF
    50 November 1918 Nano 50 Len 11 Index 18 / 4 = 06 _
    C3DDD842F230A017 4C1A90EFC57CF46D <<- Decrypt _ KEY OP
    50 November 1920 Nano 50 Len 11 Index 20 / 4 = 06 _
    723A1E6AB68827BE 944927920337EC29 <<- Decrypt _ KEY OP
    _ 400209E1
    5F008709E5CCF5BE ->> Signature _
    __________________________________________________ ______________________________



    *************************************
    4 - CalculateMAC (3DES CBC Encrypt) ****************************************** *****************************
    ************************************* *
    *
    We are already in step four 4 and what we see here is how to calculate the signature (Calculate Signature) *************************
    *
    We took the EMM OPKEYS which is decrypted: *
    ************* 82403F0208D7000030384003031FE8FF501118C3DDD842F230 A0174C1A90EFC57CF46D501120723A1E6AB68827BE94492792 0337EC29400209E15F008709E5CCF5BE
    *
    *
    OPKKEY EMM Decrypt: | | Delete | | (let's eliminate haedo Signature 00 are placed between | | xx | |) *
    *
    | | 82403F | | 0208D700 | | 00 | | 30384003031FE8FF501118C3DDD842F230A0174C1A90EFC57C F46D501120723A1E6AB68827BE944927920337EC29400209E1 | | 5F008709E5CCF5BE | | *
    *
    and we have something like this:
    0208D70030384003031FE8FF501118C3DDD842F230A0174C1A 90EFC57CF46D501120723A1E6AB68827BE944927920337EC29 400209E1


    - The split in blocks:

    Block 1 0208D70030384003
    Block 2 031FE8FF501118C3
    DDD842F230A0174C Block 3
    1A90EFC57CF46D50 Block 4
    1120723A1E6AB688 Block 5
    27BE944927920337 Block 6
    EC29400209E1 Block 7

    - As you can see we have 7 blocks and each block is 8 bytes less than the last one that only takes 6 bytes, now we add two bytes to lock 7
    and these two bytes are those that are in the second octet of EMM-IV

    EMM_IV = 5BC9E74A983AA5A7 903B000000000000 (two bytes 903B need to calculate the signature)
    ---- ----
    - After adding these two bytes in the block in July we have something like this:

    Block 1 0208D70030384003
    Block 2 031FE8FF501118C3
    DDD842F230A0174C Block 3
    1A90EFC57CF46D50 Block 4
    1120723A1E6AB688 Block 5
    27BE944927920337 Block 6
    Block 7 EC29400209E1903B <<<--- EMM_IV Add two bytes of the second octet


    3DES key and we had Supplement of the first step:
    EMM_Seed Prepared: Key 3DES E046C69E8CB4A40DA16E52AF4CAE6A15



    Now we will calculate the signature on 7 Rounds are 7 blocks:


    | | 0208D70030384003 | | 031FE8FF501118C3 | | DDD842F230A0174C | | 1A90EFC57CF46D50 | | 1120723A1E6AB688 | | 27BE944927920337 | | EC29400209E1903B
    | | Round 1 | | Round 2 | | Round 3 | | Round 4 | | Round 5 | | ROUND 6 | | ROUND 7


    ROUND 1: (Xor) 0208D70030384003 0208D70030384003 0000000000000000 = () E046C69E8CB4A40D 3DES Encrypt A16E52AF4CAE6A15 = AA8B12A7467A145F
    Data 8 Bytes'ES 'IV 3DES CBC Key Results Prepared EMM_Seed 3DES CBC Block 1 Result

    ROUND 2: (Xor) AA8B12A7467A145F A994FA58166B0C9C 031FE8FF501118C3 = () E046C69E8CB4A40D 3DES Encrypt A16E52AF4CAE6A15 = CDA5BB939E3BD120
    Data 8 Bytes'ES 'Block 2 Results Key 3DES CBC Prepared EMM_Seed Block 2 Results

    ROUND 3: CDA5BB939E3BD120) (Xor Encrypt DDD842F230A0174C = (3DES) 107DF961AE9BC66C E046C69E8CB4A40D A16E52AF4CAE6A15 = 484B0E88CA120795
    Data 8 Bytes'ES 'Block 3 Key Result Prepared EMM_Seed 3DES CBC Block 3 Results

    ROUND 4: (Xor) 484B0E88CA120795 52DBE14DB6E66AC5 1A90EFC57CF46D50 = () E046C69E8CB4A40D 3DES Encrypt A16E52AF4CAE6A15 = 287467CA90373AB3
    Data 8 Bytes'ES 'Prepared EMM_Seed Block 4 Key Result Result 3DES CBC Block 4

    ROUND 5: 287467CA90373AB3) (Xor Encrypt 1120723A1E6AB688 = (3DES) 395415F08E5D8C3B E046C69E8CB4A40D A16E52AF4CAE6A15 = DB92F3C8E9730646
    Data 8 Bytes'ES 'Block 5 EMM_Seed Prepared Key Result Result 3DES CBC Block 5

    ROUND 6: (Xor) DB92F3C8E9730646 FC2C6781CEE10571 27BE944927920337 = () E046C69E8CB4A40D 3DES Encrypt A16E52AF4CAE6A15 = C815564DC98CDE6C
    Data 8 Bytes'ES 'Block 6 EMM_Seed Prepared Key Result Result 3DES CBC Block 6

    ROUND 7: (Xor) C815564DC98CDE6C 243C164FC06D4E57 EC29400209E1903B = () E046C69E8CB4A40D 3DES Encrypt A16E52AF4CAE6A15 = 5F008709E5CCF5BE *
    Data 8 Bytes'ES 'Block 7 EMM_Seed Prepared Key Result Result 3DES CBC Block 7 *
    *
    *
    Final Results of Round 7 is = 5F008709E5CCF5BE <<<--- Coindciden! == *
    Signature of <<<--- 5F008709E5CCF5BE EMMOPKEY Decrypt *
    *
    ************************************************** ************************************************** **********************************************

  2. #2
    New Member
    Join Date
    Jan 2008
    Age
    40
    Posts
    14
    Rep Power
    23

    Re: iredeto emm

    How does it work with nanos Am I missing something I 've tried to write code for this algo but it does not work with my Greek provider .

    The 02 line I use is
    82403F020664000010386AFF7CA10B1C0FE9B7C5BB848B9356 8646E66EEAF23AD5E2F050212E7722CEE647B169CD4CD26704 1955CF640272551873C6022E76EF22BB

    And the pmk for this line is 3E3B98E62342CC7389B58FDAC299B464
    Kasita Botonnou finds correct signature calulation.

    I cannot get the correct signature...

    The line after the first procedure becomes

    39AF40020ADDCB20FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF FFFFFFFFFFFFFFFFFFFFFFFFFFFFFF9106003D0ADD1E0031A9 4AFD9EAC2C5D

    And the line to be calculated for the signature is

    02066400103839AF40020ADDCB20FF7F85FF3308AB3E362FCA 4930B7D98CE5FFFFFF7F85FF3308AB3E36B34F25F21CF63335 0ADD1E0091B8


    Instead of getting nanos like 501118 i get CB20FF.
    Instead of getting nanos like 501120 i get FFFFFF.
    Instead of getting nanos like 4002 i get 0ADD.


    The original signature is 31A94AFD9EAC2C5D
    but after the calculation i get 9F8895AE04876C62


    Any help
    Last edited by miltossat; 24-01-2011 at 03:00 PM.

Similar Threads

  1. jsc+ iredeto 603 very fast
    By king007_anis in forum CCcam Exchange (Local in NewCS)
    Replies: 0
    Last Post: 08-12-2009, 11:04 PM

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •