Updated See last post, it is tested and working!
So, I've posted this on modmyi.com forums, but I am also posting it here. Mostly I am bored, but since by profession I am a coder, I'm also the curious type when it comes to this stuff... anyway, here is what I posted:
Theres got to be a way to make use of the iBEC/iBSS files somehow...
When I open my 00.shsh file and look through it, it is essentially a list of every file that I have stored in the folders I saved from the iBEC/iBSS grabber:
Per88E7.tmp\Firmware\all_flash\all_flash.n88ap.pro duction
applelogo, batterycharging0, etc.
The file seems to store something it calls 'Blob' which is evidently a Base64-encoded binary blob of the suffix of the respective file. (In other words, if I open my applelogo.###.img3 file, and I seek to the string 'DICE@' and copy from there to EOF, it almost exactly matches the blob which is Base64'd inside the SHSH file [Note: I am comparing my 3.1 SHSH file to my 3.0 files so I expect there to be a small difference, the files should differ])
There is another very small Base64-encoded item which it terms a 'Partial Digest', which suggests it is a hash of the above blob. It is 28 bytes (224 bits) in length. I haven't been able to work out the hashing algorithm being used (maybe SHA-224?) or if it requires some kind of salt or something.
Does anyone have any insight as to any other details about these files? At first glance it seems like it should be possible to construct a SHSH file from these files and some kind of hashing algorithm.
(Note: I am only attempting this because the Dev-Team previously stated that the iBEC/iBSS files in question are already signed with your ECID, and so I am *crosses fingers* hoping that the steps to reconstruct a SHSH file from these is trivial, at least in terms of cryptography. [In other words, there is no missing information, it just needs to be transformed from one form to another])
So, I've posted this on modmyi.com forums, but I am also posting it here. Mostly I am bored, but since by profession I am a coder, I'm also the curious type when it comes to this stuff... anyway, here is what I posted:
Theres got to be a way to make use of the iBEC/iBSS files somehow...
When I open my 00.shsh file and look through it, it is essentially a list of every file that I have stored in the folders I saved from the iBEC/iBSS grabber:
Per88E7.tmp\Firmware\all_flash\all_flash.n88ap.pro duction
applelogo, batterycharging0, etc.
The file seems to store something it calls 'Blob' which is evidently a Base64-encoded binary blob of the suffix of the respective file. (In other words, if I open my applelogo.###.img3 file, and I seek to the string 'DICE@' and copy from there to EOF, it almost exactly matches the blob which is Base64'd inside the SHSH file [Note: I am comparing my 3.1 SHSH file to my 3.0 files so I expect there to be a small difference, the files should differ])
There is another very small Base64-encoded item which it terms a 'Partial Digest', which suggests it is a hash of the above blob. It is 28 bytes (224 bits) in length. I haven't been able to work out the hashing algorithm being used (maybe SHA-224?) or if it requires some kind of salt or something.
Does anyone have any insight as to any other details about these files? At first glance it seems like it should be possible to construct a SHSH file from these files and some kind of hashing algorithm.
(Note: I am only attempting this because the Dev-Team previously stated that the iBEC/iBSS files in question are already signed with your ECID, and so I am *crosses fingers* hoping that the steps to reconstruct a SHSH file from these is trivial, at least in terms of cryptography. [In other words, there is no missing information, it just needs to be transformed from one form to another])