From d0bf15f235951973836da586c05693c0563ed4f2 Mon Sep 17 00:00:00 2001 From: John Crispin Date: Wed, 29 Oct 2014 11:01:17 +0000 Subject: ramips: add support for A5-V11 board (resubmit) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit (Reposted due to an issue with the patchwork server during original submission) Unbranded. Silkscreen on PCB is “A5-V11”, believed to be made by Bococom (or at least uses Bococom image encryption - as used on poray devices - but different key) Signed-off-by: Gareth Bryan SVN-Revision: 43102 --- tools/firmware-utils/src/mkporayfw.c | 8 ++++++++ 1 file changed, 8 insertions(+) (limited to 'tools/firmware-utils/src/mkporayfw.c') diff --git a/tools/firmware-utils/src/mkporayfw.c b/tools/firmware-utils/src/mkporayfw.c index 8e0cf24efb..960c604a7e 100644 --- a/tools/firmware-utils/src/mkporayfw.c +++ b/tools/firmware-utils/src/mkporayfw.c @@ -60,6 +60,7 @@ #define HWID_PORAY_X1 0x38353335 #define HWID_NEXX_WT15XXX 0x30353332 #define HWID_NEXX_WT3020A 0x30323033 +#define HWID_A5_V11 0x32473352 /* Recognized XOR obfuscation keys */ #define KEY_HAME 0 @@ -69,6 +70,7 @@ #define KEY_PORAY_4 4 #define KEY_NEXX_1 5 #define KEY_NEXX_2 6 +#define KEY_A5_V11 7 /* XOR key length */ #define KEY_LEN 15 @@ -123,6 +125,7 @@ static uint8_t key[][KEY_LEN] = { {0x79, 0x7B, 0x7A, 0x93, 0x92, 0x95, 0xC3, 0x63, 0xD0, 0xA3, 0x9C, 0x92, 0x2E, 0xE6, 0xC7}, {0x19, 0x1C, 0x4A, 0x93, 0x96, 0x95, 0xC3, 0x63, 0xD0, 0xA3, 0x9C, 0x92, 0x2E, 0x16, 0xC6}, {0x39, 0x1C, 0x4A, 0x93, 0x96, 0x95, 0xC3, 0x63, 0xD0, 0xA3, 0x9C, 0x92, 0x2E, 0x16, 0xC6}, + {0xC8, 0x3C, 0x3A, 0x93, 0xA2, 0x95, 0xC3, 0x63, 0x48, 0x45, 0x58, 0x09, 0x20, 0x11, 0x08}, }; static struct flash_layout layouts[] = { @@ -139,6 +142,11 @@ static struct flash_layout layouts[] = { static struct board_info boards[] = { { + .id = "A5-V11", + .hw_id = HWID_A5_V11, + .layout_id = "4M", + .key = KEY_A5_V11, + }, { .id = "MPR-A1", .hw_id = HWID_HAME_MPR_A1_L8, .layout_id = "4M", -- cgit v1.2.3