You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Setting the PSK worked fine but when reading the actual image the script get's stuck in line 305 image = tlsserver.stdout.read(14788). I think there are some differences in the current firmware regarding the image size or something.
Logs:
device configs:
(<CONFIGURATION 1: 100 mA>,)
We only have one, print its interfaces
(<INTERFACE 0: Vendor Specific>,)
Again, only one. Lets view its endpoints
INTERFACE 0: Vendor Specific ===========================
bLength : 0x9 (9 bytes)
bDescriptorType : 0x4 Interface
bInterfaceNumber : 0x0
bAlternateSetting : 0x0
bNumEndpoints : 0x2
bInterfaceClass : 0xff Vendor Specific
bInterfaceSubClass : 0x0
bInterfaceProtocol : 0x0
iInterface : 0x0
ENDPOINT 0x1: Bulk OUT ===============================
bLength : 0x7 (7 bytes)
bDescriptorType : 0x5 Endpoint
bEndpointAddress : 0x1 OUT
bmAttributes : 0x2 Bulk
wMaxPacketSize : 0x200 (512 bytes)
bInterval : 0x0
ENDPOINT 0x82: Bulk IN ===============================
bLength : 0x7 (7 bytes)
bDescriptorType : 0x5 Endpoint
bEndpointAddress : 0x82 IN
bmAttributes : 0x2 Bulk
wMaxPacketSize : 0x200 (512 bytes)
bInterval : 0x0
Reset
sending command a00600a6a203000514ec
Received a00600a6b00300a20154
Received a00700a7a20400010004ff
read reg
sending command a00900a982060000000004001e
Received a00600a6b00300820174
Received a00800a882050008a4002255
send nop
sending command a00800a800050000000000a5
Received a00600a6b003000001f6
read otp
sending command a00600a6a60300000001
Received a00600a6b00300a60150
Received a02400c4a621000a46a6c6d2900224ea28098f0204f6cd8e00a0690b1df80700000000c0b3912545
pov image check
sending command a00600a6d603000000d1
Received a00600a6b00300d60120
Received a00500a5d60200ffd3
mcu download chip config
sending command a00401a5900101301160712c9d2cc91ce518fd00fd00fd03ba000080ca0006008400beb28600c5b98800b5ad8a009d958c0000be8e0000c5900000b59200009d940000af960000bf980000b69a0000a7d2000000d4000000d6000000d800000012000304d0000000700000007200785674003412200010402a0102002200012024003200800001045c000001560030485800020032000802660000027c000038820080152a0182032200012024001400800001045c00000156000c245800050032000802660000027c000038820080162a0108005c008000540000016200380464001000660000027c0001382a0108005c0000015200080054000001660000027c00013800e85870
Received a00600a6b00300900166
Received a00600a6900300010016
setDrvState
sending command a00600a6c403000100e2
Received a00600a6b00300c40132
mcuGetPovImage
sending command a00600a6d203000000d5
Received a00600a6b00300d20124
Received a00500a5d20200ffd7
mcuSwitchToFdtMode
sending command a01a00ba3617000d0180a08093809b80948090808f8094808b808a8083a2
Received a00600a6b003003601c0
Received a01c00bc361900800100005701570155015e015b0152015d01570153014f016c
send nop
sending command a00800a800050000000000a5
Received a00600a6b003000001f6
Getting FW Version
sending command a00600a6a803000000ff
Received a00600a6b00300a8014e
Received a01b00bba818004746333230365f52545345435f4150505f3130303630001c
Unexpected Firmware found! Trying anyways.. b'GF3206_RTSEC_APP_10060\x00'
PresetPskReadR
sending command a00c00ace40900070002bb00000000f9
Received a00600a6b00300e40112
Received a02d00cde42a0000070002bb2000000081b8ff490612022a121a9449ee3aad2792f32b9f3141182cd01019945ee50361b5
Chip already uses our PSK!
request TLS connect. FP will send client hello back.
sending command a00600a6d003000000d7
Received a00600a6b00300d00126
Received b03400e4160303002f0100002b0303b9906d0c27751c15b197b96caec70670387fa58192b79152b3aafe48f2a3d47500000400ae00ff0100
160303002f0100002b0303b9906d0c27751c15b197b96caec70670387fa58192b79152b3aafe48f2a3d47500000400ae00ff0100
connecting...
got server_hello + server_hello_done as 16030300510200004d030347294f775d6c73263bbfec978a6b9bfeb881b6b75145de78444f574e475244012085f35d7f49d848482dabfa20cfb46c5e64dc69ed8ba17ae67d0876943c1d73b800ae000005ff0100010016030300040e000000
sending tls b05f000f16030300510200004d030347294f775d6c73263bbfec978a6b9bfeb881b6b75145de78444f574e475244012085f35d7f49d848482dabfa20cfb46c5e64dc69ed8ba17ae67d0876943c1d73b800ae000005ff0100010016030300040e0000000000000000000000000000000000000000000000000000000000000000
Received b01a00ca160303001510000011000f436c69656e745f6964656e74697479
Received b00600b6140303000101
Received b055000516030300500ee161f26ded5ba5125e6ed73fb3b7e37648446cf8dbd1abf4ea71e248b4f66e846824013d560f37d454e2d8a205c503119f4aa002f081e3e18f6c508859f96692397e673e54a0b7e1af4d715aacec61
sending tls b05b000b14030300010116030300505acfb31871bcf5dc691007940c868e1513d2acd4a5971e93cf8d085fd1eb97bdd986c8fb569d62cc3f7f47f29dc2aa20718ef9db701f7ec19ae4a9ec773644258578c45c16ee6d48ee7df25ca2bb4409000000000000000000000000000000000000000000000000000000000000000000
Device initialization and TLS connection complete!
0
McuGetImage
sending command a00600a6200300010086
Received a00600a6b003002001d6
Received a00600a6d003000000d7
^CTraceback (most recent call last):
File "/home/dominic/Downloads/capture.py", line 387, in <module>
main()
File "/home/dominic/Downloads/capture.py", line 378, in main
readInLoop()
File "/home/dominic/Downloads/capture.py", line 329, in readInLoop
unpacked = getImage()
^^^^^^^^^^
File "/home/dominic/Downloads/capture.py", line 305, in getImage
image = tlsserver.stdout.read(14788)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^
KeyboardInterrupt
The text was updated successfully, but these errors were encountered:
Setting the PSK worked fine but when reading the actual image the script get's stuck in line 305
image = tlsserver.stdout.read(14788)
. I think there are some differences in the current firmware regarding the image size or something.Logs:
The text was updated successfully, but these errors were encountered: