Iv readup on some good documents.. namely:
http://webcache.googleusercontent.com/s ... clnk&gl=au
http://www.woodmann.com/fravia/crctut1.htm
http://stackoverflow.com/questions/4012 ... pplication
http://www.cosc.canterbury.ac.nz/greg.e ... ering.html
http://blog.affien.com/archives/2005/07 ... rsing-crc/
http://stigge.org/martin/pub/SAR-PR-2006-05.pdf
The fourth source is quite interesting, I was trying to follow his working to optain the polynomial but I just dont understand what operations he does to what to obtain it. Looks simply but Im lost where he says "shift-xor", to which I dont kow if I only shift one of the bytes, or both and which who xor's the other.
I made a simple CRC16 bruteforcer, iv tested it on live examples on the web and works a treat! Although these are typically 2-50bytes. Whereas Im dealing with something like 10000bytes thus its taking a LOT longer. Even so, there are a few alterations to the CRC that can be done.. that I am a little confused about such as reflecting in/out.. which I assume is just flip the bits before and after the CRC calc. Anyways, why sooo much interest? Im looking at the E38 bins and am interested in working out the CRC16 checksums.
Ill chuck up a couple bins with the relevant data in a sec if anyone wants to tinker with this as well? Note that any byte changed inside this data modifies the checksums. All other bytes outside of this range do not affect them. Im 100% sure on this.
