ChanServ changed the topic of #asahi-re to: Asahi Linux: porting Linux to Apple Silicon macs | Hardware / boot process / firmware interface reverse engineering | WARNING: this channel (only) may contain binary reverse engineering discussion | RE policy: https://alx.sh/re (MANDATORY READ) | GitHub: https://alx.sh/g | Wiki: https://alx.sh/w | Logs: https://alx.sh/l/asahi-re
rohin2 has quit [Ping timeout: 480 seconds]
rohin2 has joined #asahi-re
rohin2 has quit [Ping timeout: 480 seconds]
PhilippvK has joined #asahi-re
phiologe has quit [Ping timeout: 480 seconds]
rohin has quit [Quit: Konversation terminated!]
rohin2 has joined #asahi-re
phire has quit [Ping timeout: 480 seconds]
rohin2 has quit [Ping timeout: 480 seconds]
DarkShadow44 has quit [Quit: ZNC - https://znc.in]
DarkShadow44 has joined #asahi-re
Misthios has quit [Ping timeout: 480 seconds]
Misthios has joined #asahi-re
Misthios has quit []
Misthios has joined #asahi-re
rohin has joined #asahi-re
yuyichao has quit [Ping timeout: 480 seconds]
yuyichao has joined #asahi-re
phire has joined #asahi-re
phire_ has joined #asahi-re
doggkruse has joined #asahi-re
phire_ has quit [Ping timeout: 480 seconds]
doggkruse has quit [Quit: My MacBook has gone to sleep. ZZZzzz…]
doggkruse has joined #asahi-re
doggkruse has quit []
<sven> alright, reversed this gigalocker xART format by staring at it and running strings on the SEP kext once :D
<sven> it's a dumb key value store with the contents "protected" by a crc32
<sven> each entry is 0x9000 bytes, first byte is always zero, then 0x11 bytes for the key, then a u32 for the size, a u32 for the crc of the content, then 8 bytes i don't know about and then comes the content
<sven> and during boot SEPOS asks for entries from the file by key
<sven> that's it.
jacoxon has joined #asahi-re
jacoxon has quit []
yuyichao has quit [Ping timeout: 480 seconds]
amw has joined #asahi-re
yuyichao has joined #asahi-re
yuyichao has quit [Quit: Konversation terminated!]
yuyichao has joined #asahi-re