critor wrote:Yeah, if the OS is flashed though UOSRECV, the validation shouldn't be a problem.
But I still need to disable the 512 bit validation because the 82A certificate doesn't even contain the 0A key, only 0B.
critor wrote:Yeah, if the OS is flashed though UOSRECV, the validation shouldn't be a problem.
grosged wrote:Oui, sauf que je ne cherche pas à faire de dumpEn fait j'ose espérer que la TI82A finisse par tenter d'executer un endroit de la memoire... utopique, je sais
RAM FREE 0K
ARC FREE 9080K
27
Scatter 27
..............................
..............................
..............................
..............................
(etc)
parrotgeek1 wrote:critor wrote:It's a good idea.
There is a problem. (But it's solvable, I hope!)
UOSRECV does not disable the validation of the 512 bit RSA key.
But the 82 Advanced uses a "0B" key instead of "0A", which has never been factored.
I either need to patch the boot code to never validate the key, or to replace 0B key with 0A.
But the exploit program can only be 1000 bytes and it is 998 bytes.
So I need to shrink the program or factor 0B.key
Return to Langages alternatifs
Users browsing this forum: ClaudeBot [spider] and 2 guests