I searched a bit in rom-files and found OEM_7x30_MODEM.cab. It contains a file "modem" which seems interesting in 2 ways.
First:
I'm a lazy man and enthusiast of analogism and think, that developers at microsoft are lazy too and reuse code : Is it possible, that the procedure to pack the data for modem into one file and encrypting it is the same then in backup procedure? Look at the file which starts with a xml part, describing the crypting algorithm for the payload.
Second (is a guess, inspired by the ver.ver file which has a 7.35.00 in it, exactly like the bootloader version ):
the packed and crypted parts of "modem" are unpacked to partition sdx3 on Lumia as adsp.mbn, amss.mbn and emmcboot.mbn, which could be the bootmodes called when a backup/restore runs.
So my question is: Could someone with a full unlocked lumia search through the files on the phone for a similar xml file, containing configuration for image encryption and what programs or processes call them?
First:
I'm a lazy man and enthusiast of analogism and think, that developers at microsoft are lazy too and reuse code : Is it possible, that the procedure to pack the data for modem into one file and encrypting it is the same then in backup procedure? Look at the file which starts with a xml part, describing the crypting algorithm for the payload.
Code:
<?xml version="1.0" encoding="UTF-8"?>
<SSD_METADATA>
<MD_SIGN>
<MD_VERSION>1.3</MD_VERSION>
<MFG_ID></MFG_ID>
<SW_VERSION></SW_VERSION>
<IEK_ENC_INFO>
<IEK_ENC_METHOD>RSA-1024</IEK_ENC_METHOD>
<IEK_ENC_PADDING_TYPE>PKCS#1-V1.5</IEK_ENC_PADDING_TYPE>
<IEK_ENC_PUB_KEY_ID>NFam5Ryq2eM2EQ04EqlMEm2sppaxqh2kbc68ggJmfdM=</IEK_ENC_PUB_KEY_ID>
[COLOR="Red"]<IEK_CIPHER_VALUE>Ci8igrQ69DQ/CqfRenEqrqrJHLU5dUgNMolOQS3irzQjuHY9CdybeWy+ThIafiok1ZD5qgsbb4n96lR13c3k+NkYAbnd7xi5sib1aIbqLOg2AKHH5rtclTp8GGzessaflPivkQH3AVoEL5fMfYpJYPULCFVOn1EwaKQBt/SFY4E=</IEK_CIPHER_VALUE>[/COLOR]
</IEK_ENC_INFO>
<IMG_ENC_INFO>
<IMG_ENC_METHOD>AES-128-ENCRYPT</IMG_ENC_METHOD>
<IMG_ENC_PADDING_TYPE>RFC_2630</IMG_ENC_PADDING_TYPE>
<IMG_ENC_OPERATION_MODE>CBC_MODE</IMG_ENC_OPERATION_MODE>
[COLOR="Red"]<IMG_ENC_IV>2ZQOB2U6lZ9ky84o7qOW0w==</IMG_ENC_IV>[/COLOR]
<IMG_ENC_IMG_SIZE>23112352</IMG_ENC_IMG_SIZE>
</IMG_ENC_INFO>
<IMG_HASH_INFO>
<IMG_HASH_METHOD>SHA-256</IMG_HASH_METHOD>
<IMG_HASH_VALUE>V8G3czcnj/2wd5ZejWtsgQto+4qX2zQ77iWFBKEja1A=</IMG_HASH_VALUE>
</IMG_HASH_INFO>
<MD_SIG_INFO>
<MD_SIG_DGST_METHOD>SHA-256</MD_SIG_DGST_METHOD>
<MD_SIG_METHOD>RSA-1024</MD_SIG_METHOD>
<MD_SIG_PADDING_TYPE>PKCS#1-V1.5</MD_SIG_PADDING_TYPE>
<MD_SIG_OEM_PUB_KEY_ID>XKCYyiLufvHyG1NqylHXl/rwfPecv57Q/8r4qvrfB60=</MD_SIG_OEM_PUB_KEY_ID>
</MD_SIG_INFO>
</MD_SIGN>
<MD_SIGNATURE>j0F3B6ERPOg8olsz9rhM2ypdRZYxwcWgtN+X4FSLZFB9Trhsq9irpuAxkXWignKMGC0T5iJ3dEnd1S02SHucUI6wCmOkbzecvvbWIubotptMC4Xi6llaS9odtkZyLPH7ujDxe3c/iURyiIyF0qg7ivUP4fD5qpsPfFCuQiHL7sc=</MD_SIGNATURE>
</SSD_METADATA>
Second (is a guess, inspired by the ver.ver file which has a 7.35.00 in it, exactly like the bootloader version ):
the packed and crypted parts of "modem" are unpacked to partition sdx3 on Lumia as adsp.mbn, amss.mbn and emmcboot.mbn, which could be the bootmodes called when a backup/restore runs.
So my question is: Could someone with a full unlocked lumia search through the files on the phone for a similar xml file, containing configuration for image encryption and what programs or processes call them?