Rockbox Development > New Ports
iriver E10
dimon-e10:
ok, understand...
alleinsora:
Okey, first off all, I'm new to this so all the help I can get is most welcome.
Now, I thought that one approach would be to reverse engineer the .hex-file I can download from Iriver's homepage and then try to get something usefull from this. Though, never done reverse engineering before. Any tips of decompilers to use?
Bagder:
--- Quote ---Now, I thought that one approach would be to reverse engineer the .hex-file I can download from Iriver's homepage and then try to get something usefull from this. Though, never done reverse engineering before. Any tips of decompilers to use?
--- End quote ---
The firmware files used for upgrading are typically scrambled or encrypted with checksums etc in a header or trailer. The first approach normally requires that you collect an as wide range as possible with different such firmware files and then try to figure out the format of them.
It may sound hard. And it can be hard. Very very hard.
As a comparison, I fell over parts of the solution with the v2 sansas like I described in my blog: http://daniel.haxx.se/blog/2007/12/05/i-solved-the-ams-sansas-firmware-checksum-puzzle/
alleinsora:
ok. So far I have 3 different firmwares of the same version. Though, I havn't found a clear header or trailer. (at least not clear to me). But I'll keep on looking whenever I have time to spare.
markun:
The encryption is the same as many other irivers (ifp and T series for example) and can be decoded with ifp_decode which you can find here:
http://www.rockbox.org/twiki/bin/view/Main/IfpCryptanalysis
Here are some strings found in the firmware:
http://130.89.160.166/rockbox/e10strings.txt
I recognize the [FTL:ERR] and [VFL:ERR] strings from the Meizu firmwares (the Meizus also use the same CPU as the E10). Google tells me they are in the iphone firmware as well:
http://www.modmyifone.com/forums/showthread.php?t=484
Navigation
[0] Message Index
[#] Next page
[*] Previous page
Go to full version