-
Notifications
You must be signed in to change notification settings - Fork 22
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[device-report] BY Tech DELTACO GAMING WK95R #80
Comments
@jja2000 thanks for the report!
You can get this MD5, by not supplying any additional parameters ( |
Hi there!
I will update OP, thanks!
Will add those to OP aswell, this is how I got the keyboard out of the box. I did not update the firmware using their driver program. |
Just to add, I'm planning to contribute to SMK if you think that's feasible. But I'd love to make sure that everything is at it's supposed to be before I start porting (considering the brick risk you mention in your blog). |
Thanks for sharing those dumps. I checked the bootloader dump and it's contents were very different from the rest of the bootloaders encountered so far. I then checked the bootloader portion of the full dump and found that the contents are different from the bootloader dump and is actually another instance of I just noticed that you mentioned that the firmware size is
Yeah, those dumps you made should be enough to restore your device to your stock state through the ISP bootloader. If you don't have a sinolink, I would recommend not touching the usb code as it can lead to not being able to boot back into isp through usb. If you do have a sinolink, there's a small modification you should make to the payload before writing back (refered to as the 2nd point here). |
Could be! I didn't think that parameter always needed to be
Good to know! I don't have a sinolink programmer currently, but if shit hits the fan I'll try to buy one. Thanks for the tip on the firmware_size offset. Is there a specific way to modify that if I want to write back the backup? |
Yeah, here are the steps for modifying the full dump you provided:
You can do this by either modifying the ihex file directly (though you will have to recompute the checksums) or converting the ihex file to a binary, modifying the bytes in the binary as described, and converting it back to an ihex. Here's an example of the latter: objcopy --input-target=ihex --output-target=binary jja2000-deltaco-wk95r-full.hex jja2000-deltaco-wk95r-full.bin
# modify jja2000-deltaco-wk95r-full.bin as described
# I generally use HexFiend on macOS, but there are many other options out there
objcopy --input-target=binary --output-target=ihex jja2000-deltaco-wk95r-full.bin jja2000-deltaco-wk95r-full-jtag-ready.hex At the end, you will have an ihex file that represents how the firmware and bootloader are actually stored in device flash (bootloader modifications undone) and which is ready to be written through JTAG (via ProWriter). P.S. I think I should probably build this conversion function into this tool... |
Device Info
SH68F90A
BYK916
Part Info
Operations Tested
Platforms Tested
Dumps + Checksums
90a3db2d3547379bae8aa39dc36cade7
2d169670eae0d36eae8188562c1f66e8
3cb748c30570457f21517de425a4fba9
fw.zip
HID Dump
A dump from usbhid-dump, win-hid-dump or mac-hid-dump
HID Tool Output
PCB Photos
Will take a pic of the rest of the PCB if needed, but I'll have to disassemble it again hahaha.
The text was updated successfully, but these errors were encountered: