Rockbox Development > New Ports

SAMSUNG YH-920

<< < (2/46) > >>

dan_a:
I have one of these on the desk in front of me.  Now, if I could only figure out how to get the main PCB out without breaking it...

pyro_maniac:
Hi folks,

I have a Samsung YH 920 and i am trying to port the iRiver H10 port for my device. Is that easily possible or completely the wrong way?

My current result is, that the bootloader stops and is warning for a corrupt firmware. I think my operations on the mi4 file were wrong.

Could anybody help me?

I hope this is the right way to ask.

Bagder:
Have you decrypted the yh920 mi4 successfully with mi4code?

Have you tried to re-encrypt such a decrypted mi4 with mi4code and verified that it then works on your target?

pyro_maniac:
I only decrypt the original file and tried to encrypt the new file with that key. I will try your way to verify my work.

Have the file to be as big as the original?


/EDIT: I decrypted the original file and tried to encrypt the decrypted file.
It doesn't really work:


--- Code: ---#mi4code decrypt -s pp5020-org.mi4 pp5020-decrypt.mi4
mi4code v1.1.2-DSA (c) by MrH 2008
Secondary label end offset 'default' (0xec)
Decrypted ok with key 'default' (20d36cc0 10e8c07d c0e7dcaa 107eb080)

#mi4code encrypt pp5020-decrypt.mi4 pp5020-encrypt.mi4 20d36cc0 10e8c07d c0e7dcaa 107eb080
mi4code v1.1.2-DSA (c) by MrH 2008
Invalid magic in mi4 header (maybe not mi4 file)!

--- End code ---

What made i wrong?

linuxstb:
The "-s" option you used with the mi4code decrypt command strips the mi4 header - you don't want to do that.

I can confirm that if I do:

./mi4code decrypt PP5020.mi4 decrypt.mi4

followed by:

./mi4code encrypt decrypt.mi4 encrypt.mi4 20d36cc0 10e8c07d c0e7dcaa 107eb080

then the original file (PP5020.mi4) and the final output file (encrypt.mi4) are identical.

Navigation

[0] Message Index

[#] Next page

[*] Previous page

Go to full version