My guess is that the Jinke software engineers are mostly busy working on the firmware for the new A5 and A9 machines. However, those firmwares may share a partial "build tree" with the V3 and V5 machines.
In doing a quick scan through the new firmware (March 2010) I found a few things. The most interesting is at hex offset 0x07D00000, where there is a block of code which contains some strings. They are, spread out in the code, but they are:
cdma-connect
cdma-disconnect
cdma-options
chap-secrets
# Secrets for authentication using CHAP
# Username Server Password IP addresses
"any" * "any"
chap-secrets-gprs
# Secrets for authentication using CHAP
# Username Server Password IP addresses
"any" * "any"
gprs-connect
gprs-disconnect
gprs-options
profile
version1.00
The following quotes are from Wikipedia:
Quote:
Code division multiple access (CDMA) is a channel access method utilized by various radio communication technologies. It should not be confused with the mobile phone standards called cdmaOne and CDMA2000 (which are often referred to as simply "CDMA"), which use CDMA as an underlying channel access method.
|
Quote:
In computing, the Challenge-Handshake Authentication Protocol (CHAP) authenticates a user or network host to an authenticating entity. That entity may be, for example, an Internet access provider.
CHAP is an authentication scheme used by Point to Point Protocol (PPP) servers to validate the identity of remote clients. CHAP periodically verifies the identity of the client by using a three-way handshake. This happens at the time of establishing the initial link, and may happen again at any time afterwards. The verification is based on a shared secret (such as the client user's password).
1. After the completion of the link establishment phase, the authenticator sends a "challenge" message to the peer.
2. The peer responds with a value calculated using a one-way hash function, such as an MD5 checksum hash.
3. The authenticator checks the response against its own calculation of the expected hash value. If the values match, the authenticator acknowledges the authentication; otherwise it should terminate the connection.
4. At random intervals the authenticator sends a new challenge to the peer and repeats steps 1 through 3.
|
Quote:
General packet radio service (GPRS) is a packet oriented mobile data service available to users of the 2G cellular communication systems global system for mobile communications (GSM), as well as in the 3G systems. In 2G systems, GPRS provides data rates of 56-114 kbit/s.
|
So, it looks like there are pieces included in the firmware for doing Wi-Fi and cell data communications.
Other items of minor interest:
At hex offset 0x00300000 is a block that starts off with "Compressed ROMFS" (ie, "Compressed ROM File System"), and which is followed by a list of files that goes on FOREVER... A few interesting ones are:
dev
etc
ext2fs
home
jffs2f
lib
linuxrc
opt
proc
root
bin
share
tmp
usr
var
followed by a whole BUNCH of unix utilities and files.
At hex offset 0x00900000 is a block that starts off with "Compressed ROMFS" (ie, "Compressed ROM File System"), and which is followed by a list of files that goes on FOREVER... A few interesting ones are:
root
usr
muttrc
System.ttf
abook
adobe
adobe.1123
appdata
crengine
cr3-manual-ru.fb2
cr3-manual-uk.fb2
mail_icon.png
mainframe_ukraine.png
openmsgicon.png
rss_title.png
title_gprsnet.png
title_mailset.png
title_wifinet.png (as in Wi-Fi network graphic)
But most of the data and programs in the ROM are now compressed and get uncompressed at run-time, so there are not a whole lot of strings that can be discovered.