|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source |
GSM Programming & Reverse Engineering Here you can post all Kind of GSM Programming and Reverse Engineering tools and Secrets. |
| LinkBack | Thread Tools | Display Modes |
12-15-2006, 18:35 | #1 (permalink) |
Major Poster Join Date: Sep 2006
Posts: 48
Member: 356018 Status: Offline Thanks Meter: 2 | Strange bytes in DCT4 PPM When I've decompress nokia PPM Text chunks I've found some order of strange (strange for me, 'couse i'm newbie in nokia reversing). Thise bytes like that: 140191C000AF004000BE 140192000072004000BA 1401924000F9004000F3 1401928000A300400009 I found some dependence: there are always such bytes: 14 01 x x x x 00 40 00 x. When I change them, i can't flash phone (using UFS: write error writing block) So what mean those bytes? Explain me please. Best regards... |
01-09-2007, 16:55 | #6 (permalink) |
Insane Poster Join Date: Apr 2004 Location: Spain
Posts: 82
Member: 63517 Status: Offline Thanks Meter: 5 | Check TriX source code http://www.g3gg0.de/index.html?&no_cache=1&tx_eeblog[pointer]=0&tx_eeblog[showUid]=6576 |
01-10-2007, 03:24 | #7 (permalink) |
Major Poster Join Date: Sep 2006
Posts: 48
Member: 356018 Status: Offline Thanks Meter: 2 | finally! :) Finally! I've solve my question. As indear sad, i look for Trix sourses and found simple algo: while ( length ) chk += data[--length]; return chk ^ 0xFF; I think that it must be simple and spin around this algo a long time. I forgot about XORing 0xFF So demonstrate with an example: If we have this header: 14 018E 0000 AE00 4000 82 Let's check our header (14 018E 0000 AE00 4000) checksum (0x82) 1. first byte (0x14) and fifth (0x00) must be deleted ('couse they are housekeeping data): 018E 0000 AE 4000 2. Sum : 01+8E+00+00+AE+40+00 == 17D (in HEX) 3. XOR: 1FF XOR FF == 182 -> 82 Oh, it's so nice Maybe, it'll be usefull for someone else. Thanks for all for you attention |
Bookmarks |
| |
Similar Threads | ||||
Thread | Thread Starter | Forum | Replies | Last Post |
Please help me DCT4 and DCT4+ PPM Editor software | LONGPHONE™ | Nokia Hardware & Hardware Repair | 0 | 02-01-2010 04:34 |
Last 6 bytes in PPM file | MAK_US1977 | GSM Programming & Reverse Engineering | 11 | 08-20-2002 16:47 |
Dct4 Ppm | fadi79 | Nokia Digital Core Technology 4 ( DCT-4 ) | 3 | 05-25-2002 15:35 |
DCT4 PPM MCU, Acer T191, Siemens, ALL new and HOT !!! | sixkiller666 | Main Sales Section | 1 | 05-14-2002 01:53 |
WinDLS PPM MCU box, now removes Security Code in DCT4 8310 and more !!!! | sixkiller666 | Main Sales Section | 8 | 01-11-2002 19:18 |
|