Hi All... Ok - took a break from my other shiny to finally play with my PBL5.1 E3 yesterday.. So - the current state of play is this :
Sent Packet: 0x02 0x00 0x02 0x00 0x02 0x00 0x04 ( Version Query )
Rcvd Packet 0x02 0x00 0x0e 0x00 (STX header + length of packet ) 0x82 0x00 0x72 0x00 ( Response data ) 0x05 0x01 0x22 0x05 0x10 0x40 0xfe 0x7b 0x6e 0xb4 0x1a
Viable commands without SHA-256 hash match are : cmd_2 cmd_9 cmd_15 cmd_16
cmd_16 is used to upload a ( as far as I can tell ) 392 byte authentication key. the key is hashed via sha-256 and, for any of the other commands not mentioned above, compared to the hash on the box. If the generated hash matches the stored one, the command executes, if not, it doesn't.
For the interested, I believe the hash is : char SHAHASH[0x20]={ 0xAD,0xA2,0x8D,0x8B,0x4A,0xE7,0x12,0x15, 0x05,0x30,0x98,0x91,0xB1,0x01,0x09,0x24, 0x2B,0x32,0xDE,0xCE,0x67,0x88,0x94,0x81, 0x18,0xA5,0x0B,0x9C,0xB5,0xBD,0xDC,0x24 };
aka:
0x8B8DA2AD 0x1512E74A 0x91983005 0x240901B1 0xCEDE322B 0x81948867 0x9C0BA518 0x24DCBDB5
I'm currently going over the code to see if there are any sneaky bypasses, but it doesn't look good so far. I'll let y'all know if anything progresses. Happy sunday. Jake
One thought does strike, however.. 392 bytes is kind of a strange length for a plaintext source for the hash. Makes one wonder if its a (X)PGP ascii signature.
As always, reality may bear no resemblance to the statements above.