A new nano is used since the 6th. This nano is selecting the key (rolling key) in addition of the aes encryption. oscam should be updated today ...
V 030B00 T1 7F308A9B0B803C4B6BBFEFB041F03B58E3BCAFBEE583B415A5 3571952BAB
E9A17964A8BA8BE4E053DB6AD5511C063739D81786DD92871B D7B718E731
2DDC77F3DE1AD4FC60932909703D97B9688F2C5B6221F501D0 894F995028
A9FD4A3F9861F71F20AD030846CF546C44DF76C18D0078F607 A0F17A2E32
119FF4852F4913C2599E9623EB1924EDDA25FECAF894226533 579DC3A39C
0E56044882BD755AACFA26A6B3E80567ECB136E6FF4D107E8C B8AAE1EE8E
5FC42A9A525DC702CD72B20F88D9437D16D65ECB406D144CF9 745C127CC0
C9A7A49069BB0DEAC8C563AE664ED26FB57B271D6E3ECEC645 D3D142E238
A2B63A340AFB73911E84CC47F20C8155; TransformTable
V 030B00 08 D92A82E3111C9AFDED4626AD0B542E5B; Service key
V 030B00 09 CC72AAFE5265D6D04608E832CEB9EC4D ; TNTSat
V 030B00 D1 89CBB54EEB94E350; Des1_Key
V 030B00 X1 8B2908AE39B0101A; XORArray
V 030B00 P1 0704020305000601; PermArray
V 030B00 C1 FC3C5F15D7A0B437; ChainArray
V 030B00 0B 7C6A2428C020023B163E4FE024FF5D9D ; TNTSat
V 030B00 E1 A79AC0DBEC9C9251D1915F058862AF26 ; SurEncryption Key
V 030B00 E2 439726EBB6A939A456C05FF6AA606C43 ; HD SurEncryption Key
...................
N.B:AES key unchanged, but nano D2 02 0B -> AES step before Viaccess 3.x step
ok! this one...
it works fine with aes decryption befor via 3.x processing
[80_00] (0)
[D2_02] 0B 01 (0)
[40_07] 03 0B 00 09 05 67 00 (0)
[E2_03] 3D 86 00 (0)
[E2_03] 3D 86 FF (0)
[EA_10] F5 A1 1D B3 50 66 60 16 9B DB F4 6A CC 4E 38 52 (1)
===== VIA ECM on CaID 0x0500, pid 0x0000 ====
prov: 30B00, pkey: 09 = CC 72 AA FE 52 65 D6 D0
CW0: F5 A1 1D B3 50 66 60 16
CW1: 9B DB F4 6A CC 4E 38 52
Signature ok
-Original ECM----------------------------------
80 70 D5 01 80 33 D2 02 0B 01 40 07 03 0B 00 09
05 67 00 E2 03 3D 86 00 E2 03 3D 86 FF EA 10 B6
9E A7 CE 06 14 29 64 8A E1 FF 1C EF AE 52 0E F0
08 28 4F BE 9A 16 D6 99 90 80 33 D2 02 0B 01 40
07 03 0B 00 08 06 15 00 E2 03 3D 86 00 E2 03 3D
86 FF EA 10 28 A7 B6 91 0F 96 0D 15 12 7C C3 39
04 4A 24 B2 F0 08 1E 14 0D FB 76 34 0F AE 80 33
D2 02 0B 01 40 07 03 0B 00 09 05 67 01 E2 03 3D
86 00 E2 03 3D 86 FF EA 10 1A 30 8E 50 EB 67 FE
98 F7 D4 31 56 77 83 15 C9 F0 08 DD 47 5A 5D 5A
E2 6A BA 80 33 D2 02 0B 01 40 07 03 0B 00 08 06
15 01 E2 03 3D 86 00 E2 03 3D 86 FF EA 10 49 10
46 00 15 65 92 E8 A9 3B 19 9D 4C 99 0F 75 F0 08
C0 3F DE 35 DF 9C 30 40
-DES decrypt-----------------------------------
80 70 D5 01 80 33 D2 02 0B 01 40 07 03 0B 00 09
05 67 00 E2 03 3D 86 00 E2 03 3D 86 FF EA 10 F5
A1 1D B3 50 66 60 16 9B DB F4 6A CC 4E 38 52 F0
08 28 4F BE 9A 16 D6 99 90 80 33 D2 02 0B 01 40
07 03 0B 00 08 06 15 00 E2 03 3D 86 00 E2 03 3D
86 FF EA 10 28 A7 B6 91 0F 96 0D 15 12 7C C3 39
04 4A 24 B2 F0 08 1E 14 0D FB 76 34 0F AE 80 33
D2 02 0B 01 40 07 03 0B 00 09 05 67 01 E2 03 3D
86 00 E2 03 3D 86 FF EA 10 1A 30 8E 50 EB 67 FE
98 F7 D4 31 56 77 83 15 C9 F0 08 DD 47 5A 5D 5A
E2 6A BA 80 33 D2 02 0B 01 40 07 03 0B 00 08 06
15 01 E2 03 3D 86 00 E2 03 3D 86 FF EA 10 49 10
46 00 15 65 92 E8 A9 3B 19 9D 4C 99 0F 75 F0 08
C0 3F DE 35 DF 9C 30 40
E9A17964A8BA8BE4E053DB6AD5511C063739D81786DD92871B D7B718E731
2DDC77F3DE1AD4FC60932909703D97B9688F2C5B6221F501D0 894F995028
A9FD4A3F9861F71F20AD030846CF546C44DF76C18D0078F607 A0F17A2E32
119FF4852F4913C2599E9623EB1924EDDA25FECAF894226533 579DC3A39C
0E56044882BD755AACFA26A6B3E80567ECB136E6FF4D107E8C B8AAE1EE8E
5FC42A9A525DC702CD72B20F88D9437D16D65ECB406D144CF9 745C127CC0
C9A7A49069BB0DEAC8C563AE664ED26FB57B271D6E3ECEC645 D3D142E238
A2B63A340AFB73911E84CC47F20C8155; TransformTable
V 030B00 08 D92A82E3111C9AFDED4626AD0B542E5B; Service key
V 030B00 09 CC72AAFE5265D6D04608E832CEB9EC4D ; TNTSat
V 030B00 D1 89CBB54EEB94E350; Des1_Key
V 030B00 X1 8B2908AE39B0101A; XORArray
V 030B00 P1 0704020305000601; PermArray
V 030B00 C1 FC3C5F15D7A0B437; ChainArray
V 030B00 0B 7C6A2428C020023B163E4FE024FF5D9D ; TNTSat
V 030B00 E1 A79AC0DBEC9C9251D1915F058862AF26 ; SurEncryption Key
V 030B00 E2 439726EBB6A939A456C05FF6AA606C43 ; HD SurEncryption Key
...................
N.B:AES key unchanged, but nano D2 02 0B -> AES step before Viaccess 3.x step
ok! this one...
it works fine with aes decryption befor via 3.x processing
[80_00] (0)
[D2_02] 0B 01 (0)
[40_07] 03 0B 00 09 05 67 00 (0)
[E2_03] 3D 86 00 (0)
[E2_03] 3D 86 FF (0)
[EA_10] F5 A1 1D B3 50 66 60 16 9B DB F4 6A CC 4E 38 52 (1)
===== VIA ECM on CaID 0x0500, pid 0x0000 ====
prov: 30B00, pkey: 09 = CC 72 AA FE 52 65 D6 D0
CW0: F5 A1 1D B3 50 66 60 16
CW1: 9B DB F4 6A CC 4E 38 52
Signature ok
-Original ECM----------------------------------
80 70 D5 01 80 33 D2 02 0B 01 40 07 03 0B 00 09
05 67 00 E2 03 3D 86 00 E2 03 3D 86 FF EA 10 B6
9E A7 CE 06 14 29 64 8A E1 FF 1C EF AE 52 0E F0
08 28 4F BE 9A 16 D6 99 90 80 33 D2 02 0B 01 40
07 03 0B 00 08 06 15 00 E2 03 3D 86 00 E2 03 3D
86 FF EA 10 28 A7 B6 91 0F 96 0D 15 12 7C C3 39
04 4A 24 B2 F0 08 1E 14 0D FB 76 34 0F AE 80 33
D2 02 0B 01 40 07 03 0B 00 09 05 67 01 E2 03 3D
86 00 E2 03 3D 86 FF EA 10 1A 30 8E 50 EB 67 FE
98 F7 D4 31 56 77 83 15 C9 F0 08 DD 47 5A 5D 5A
E2 6A BA 80 33 D2 02 0B 01 40 07 03 0B 00 08 06
15 01 E2 03 3D 86 00 E2 03 3D 86 FF EA 10 49 10
46 00 15 65 92 E8 A9 3B 19 9D 4C 99 0F 75 F0 08
C0 3F DE 35 DF 9C 30 40
-DES decrypt-----------------------------------
80 70 D5 01 80 33 D2 02 0B 01 40 07 03 0B 00 09
05 67 00 E2 03 3D 86 00 E2 03 3D 86 FF EA 10 F5
A1 1D B3 50 66 60 16 9B DB F4 6A CC 4E 38 52 F0
08 28 4F BE 9A 16 D6 99 90 80 33 D2 02 0B 01 40
07 03 0B 00 08 06 15 00 E2 03 3D 86 00 E2 03 3D
86 FF EA 10 28 A7 B6 91 0F 96 0D 15 12 7C C3 39
04 4A 24 B2 F0 08 1E 14 0D FB 76 34 0F AE 80 33
D2 02 0B 01 40 07 03 0B 00 09 05 67 01 E2 03 3D
86 00 E2 03 3D 86 FF EA 10 1A 30 8E 50 EB 67 FE
98 F7 D4 31 56 77 83 15 C9 F0 08 DD 47 5A 5D 5A
E2 6A BA 80 33 D2 02 0B 01 40 07 03 0B 00 08 06
15 01 E2 03 3D 86 00 E2 03 3D 86 FF EA 10 49 10
46 00 15 65 92 E8 A9 3B 19 9D 4C 99 0F 75 F0 08
C0 3F DE 35 DF 9C 30 40
Comment