I've extended the
The utility can be downloaded from:
You need to extract the decryption key from your box which (for now with underlying 1.03.12) can be done via:
In this example, the encryption key is
Then, to decrypt -
That test recording is 5 minutes from BBC ONE today.
I discovered a few anomalies (bugs!) in the Humax DLNA decryption implementation along the way but this utility replicates those so should produce a file which is identical to one decrypted in the current way.
stripts
utility with the ability to decrypt Humax recordings directly and would appreciate some wider testing.The utility can be downloaded from:
- https://hpkg.tv/misc/stripts-linux (for Linux systems);
- https://hpkg.tv/misc/stripts-omnios (for OmniOS/OpenIndiana/SmartOS/Solaris x86 systems);
- https://hpkg.tv/misc/stripts-macosx (for MacOSX systems);
- The on-box
stripts
will also be updated with this feature but is much slower than the DLNA method we already have, taking around 30s for each minute of recording.You need to extract the decryption key from your box which (for now with underlying 1.03.12) can be done via:
Code:
humax# nugget dump 0x0dadd58 0x10
00dadd58: 00 03 78 bd 11 f3 36 33 37 31 30 34 34 39 36 30 ..x...6371044960
000378bd11f336333731303434393630
- the eagle eyed amongst you will spot that it's the box MAC address + the first 10 digits of the serial number, although not all bits are actually used.Then, to decrypt -
stripts -@ <key> <input recording> <output recording>
Code:
omniosce# chmod +x stripts-omnios
omniosce# ./stripts-omnios -@ 000378bd11f336333731303434393630 "800 Words_20180418_1434" "800 Words_20180418_1434_dec"
Processed in: 6.98s
I discovered a few anomalies (bugs!) in the Humax DLNA decryption implementation along the way but this utility replicates those so should produce a file which is identical to one decrypted in the current way.
Last edited: