Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

Mega OSTool 2 for WeTeK Theater ( 16.03.2016 updated to Android r11213 oscam emu r728)

Mega OSCam EMU ARMv7 Cortex A9 для Android с поддержкой Drecrypt

Mega OSCam EMU ARMv7 Cortex A9 for Android with Drecrypt enabled

Mega OSTool This emulator Oscam 1.20 EMU r728 for PowerVu emulation, DRE c ICG algorithm, BiSS and other encodings in a convenient package APK under Android 4. x. x.OSCam for AndroidThis version is compiled under processors Cortex a9 Armv7 to be used on receivers WeTek Play in conjunction with the Android satellite tv viewer WeTeK Theater.

Mega OSTool  Android oscam emu ARMv7 Cortex A9 Amlogic MX

Mega OSTool Android oscam emu ARMv7 Cortex A9 Amlogic MX

 

[spoiler effect=”blind” show=”Показать Видео Демо Mega OStool”]

[/spoiler]

"Crisis suggestion toll-free rendered virtually all satellite television packages»

[spoiler show=”Показать ALL INCLUSIVE”]

ALL INCLUSIVE

Бесплатные тестовые ключи. Халява, сэр!

HTB + Russia, Ukraine, Kinodrom and HD, Ntv + East(56(e)), TRK Ukraina, Xtra TV Football, ICTV (4.8(e)), Akta, Private Spice (13(E)), Red Hot Sex (13(E))+All, Tricolor TV(36(e)), Continent Tv (85.2(E)), Viasat Baltic (5(e)), CYFRA + (13(e)), Tricolor TV(56(e)), Cyfrowy Polsat HD(13(e)), Upc Direct, Hello HD (9(E)), RIKOR (60(E)), Digitalb (16.0(E)), KabelKiosk (9.0(E)), HD plus (19(e)), Max TV (16(E)), DigiTurk (7(E)), Sky UK (28.2(E)), Digital+ (19.2(E)), Yes HD (4W) …

[/spoiler]

Version: oscam-1.20-unstable_svn-11213 Patch: oscam-emu r728 arh: Cortex A9 ARMv7 Compiler: arm-linux-androideabi-ssl-libusb WebifPort: 8888
BinName: /data/data/ostool/oscam/ TempDir:   /tmp/.oscam ConfigDir: /sdcard/config/ KeysFile: /SDCard/config/SoftCam Key OPKeysFile center: /sdcard/config/ee36.bin OPKeysFile sibir: /sdcard/config/ee56.bin Emulator [supported crypto systems]: CryptoWorks, SoftNDS, Viaccess 1/2/3, Nagra 2, Irdeto 2, BiSS, Powervu, Drecrypt

oscam для AndroidDownload Mega OSTool

Mega OSTool2_11213.zip 1.1 MB

mirror

in the archive there are additional configuration files

[spoiler effect=”phase” show=”Показать прошлые версии”]

[/spoiler]

Mega OSTool 2.11213
- Oscam r11213 feeds in PowerVU (c) Russian audio track
- ALL INCLUSIVE free test keys. Халява, сэр! 
Mega OSTool 2.11209
- Fixed bugs
- Oscam emu r11209 r728
- [NEWCAMD] support long ECM for 040610
- [EMU] updated to r728
- [READER DRE] Processing of ECM and EMM for DRE4 (245 ,255 ,265) (MPEG2)
- [READER DRE] Read ee.bin from the circuit for two-chips zielonki
- [READER DRE] Added support for scripts "zielonki" (86 24 B1 ......)
- [READER EMU] BISS onid option is added.
- [READER EMU] in config settings have been added dre36_force_group and dre56_force_group ,Specifies the server for the AU over the network (for example dre36_force_group = 05)
- [DVBAPI] the filter (I):0 now works for IRDETO
- [EMM] Fixed bug caused it to crash when sending emulator EMM on server VIACCESS: 
- Fix for broken Nano 0E support regression introduced r11199 (Tnx Pr2 for patch!)
- [READER DRE] Исправил подписки на DRE2. Пофиксил падение эмулятора при работе с картой.
- Добавил поддержку скриптов с шифрованными командами DRE     формат скрипта для шифрованных команд
(dre_shifr_script.xpl)
CR 01 59 ................ ID KS
- формат записи BISS ключей
(SoftCam Key)
(F) [<onid>]<service id><ecm pid> <key number> <key>
(F) [<onid>]<service id><video pid> <key number> <key>
(F) [<onid>]<service id><1FFF> <key number> <key>
- скрипт для чтения ee.bin из двухчиповой зелёнки
(read_green2_ee.xpl)
REG2 /var/keys/ee.bin  OSTool2 svn11198
- Обновлено до r11198
- [WEBIF] Добавлены параметры: extee36, extee56, sid, class, exec_cmd_file
- [READER DRE] DRE3 card support (23,24 etc.) (only three channels), DRE4 (245 ,255 ,265) (only initialize card)
- [READER DRE] Added custom scripts. Script format as the vikarda ,in one line, script must always begin with "59", the checksum is recalculated. If you provid in script does not match the card, the string of the script is ignored.
- [READER EMU] If the extee36 and/or extee56 specified the file name only, the file is searched for in the directory configs
- [READER EMU] Not processed DRE ECM, If the master key was not SoftCam.key. Fixed OSTool2 svn11142
- fixed AU for new EMM
- If the query is not decoded, then ee.bin is loaded from a file
- Added extee36 and extee56 (for example extee36 =/var/keys/ee.bin)
- Sid option is added. (for example, sid = 792C this reader will open only Films or sid = !792(C) , Kinopokaz open data reader will not)
"Crisis suggestion toll-free rendered virtually all satellite television packages»

"Crisis suggestion toll-free rendered virtually all satellite television packages»

Information on configuring OSSam !

Unix starttime: 1458146069
Starttime:      16.03.2016 18:34:29
Version:        oscam-1.20-unstable_svn-r11213 Compiler:       arm-linux-androideabi-ssl-libusb Box type:       generic (generic)
PID:            5630
TempDir:        /tmp/.oscam ConfigDir:      /SDCard/config/WebifPort:      8888
Web interface support:                   yes LiveLog support:                         yes jQuery support intern:                   yes Touch interface support:                 yes SSL support:                             yes DVB API support:                         yes DVB API with AZBOX support:              no DVB API with MCA support:                no DVB API with COOLAPI support:            no DVB API with COOLAPI2 support:           no DVB API with STAPI support:              no DVB API with STAPI5 support:             no DVB API read-sdt charsets:               yes Irdeto guessing:                         yes Anti-cascading support:                  yes Debug mode:                              yes Monitor:                                 yes Loadbalancing support:                   yes Cache exchange support:                  yes CW Cycle Check support:                  yes LCD support:                             no LED support:                             no Emulator support:                        yes Clockfix with realtime clock:            yes IPv6 support:                            no  camd 3.3x:                               no camd 3.5 UDP:                            yes camd 3.5 TCP:                            yes newcamd:                                 yes CCcam:                                   yes CCcam share:                             yes gbox:                                    yes radegast:                                yes scam:                                    yes serial:                                  yes constant CW:                             yes Pandora:                                 Yes ghttp:                                   yes  Reader support:                          yes  Nagra:                                   yes Irdeto:                                  yes Conax:                                   yes Cryptoworks:                             yes Seca:                                    yes Viaccess:                                yes NDS Videoguard:                          yes DRE Crypt:                               yes TONGFANG:                                yes Bulcrypt:                                yes Griffin:                                 yes DGCrypt:                                 yes  cardreader_phoenix:                      yes cardreader_internal_azbox:               no cardreader_internal_coolapi:             No cardreader_internal_coolapi2:            no cardreader_internal_sci:                 Yes cardreader_sc8in1:                       Yes cardreader_mp35:                         Yes cardreader_smargo:                       yes cardreader_pcsc:                         no cardreader_smartreader:                  yes cardreader_db2com:                       yes cardreader_stapi:                        no cardreader_stapi5:                       no cardreader_stinger:                      Yes

Android OSCam

Лог запуска Mega OSTool

2016/01/27 19:48:59 00000000 s (main) Host name = localhost
2016/01/27 19:48:59 00000000 s (main) Release = 3.0.50-wetek
2016/01/27 19:48:59 00000000 s (main) Version = #24 SMP PREEMPT Wed Nov 25 18:49:01 CET 2015
2016/01/27 19:48:59 00000000 s (main) Machine = armv7l
2016/01/27 19:48:59 00000000 s (main) creating pidfile /tmp/.oscam/oscam.pid with pid 12085
2016/01/27 19:48:59 00000000 s [EMU] oscam-emu version 728
2016/01/27 19:48:59 00000000 s (config) userdb reloaded: 1 accounts loaded, 0 expired, 0 disabled
2016/01/27 19:48:59 00000000 s (main) signal handling initialized
2016/01/27 19:48:59 00000000 s (config) 4 provid's loaded
2016/01/27 19:48:59 00000000 s (config) 9 service-id's loaded in 0 ms
2016/01/27 19:48:59 00000000 s (reader) emulator [EMU] creating thread for device emulator
2016/01/27 19:48:59 00000000 s (reader) satq [cccam] creating thread for device ua6.satq.tv
2016/01/27 19:48:59 00000000 s (stat) loadbalancer: could not open /tmp/.oscam/stat for reading (errno=2 No such file or directory)
2016/01/27 19:48:59 00000000 s (main) waiting for local card init
2016/01/27 19:48:59 5187786F r cannot open key file path: /sdcard/config/ee56.bin
2016/01/27 19:48:59 5187786F r reading key file: /SDCard/config/SoftCam Key
2016/01/27 19:48:59 00000000 [EMU] info: FFDecsa parallel mode = 32
2016/01/27 19:48:59 3A879BB8 h (webif) webif: decompressed 166243 bytes back into 395960 bytes
2016/01/27 19:48:59 3A879BB8 h (webif) HTTP Server running. ip=0.0.0.0 port=8888
2016/01/27 19:48:59 5187786F r (reader) emulator [EMU] Reader initialized (device=emulator, detect=cd, mhz=357, cardmhz=357)
2016/01/27 19:49:00 1A4E627A p (reader) ua6.satq.tv: resolved ip=213.155.22.175
2016/01/27 19:49:00 1A4E627A p (reader) satq [cccam] connecting to ua6.satq.tv:9999
2016/01/27 19:49:00 1A4E627A p (reader) satq [cccam] proxy initialized, server ua6.satq.tv:9999
2016/01/27 19:49:00 5187786F r (reader) emulator [EMU] card detected
2016/01/27 19:49:01 5187786F r (reader) emulator [EMU] found card system emu
2016/01/27 19:49:01 5187786F r (reader) emulator [EMU] THIS WAS A SUCCESSFUL START ATTEMPT No 1 out of max alloted of 1
2016/01/27 19:49:01 5187786F r cannot open key file path: /sdcard/config/ee56.bin
2016/01/27 19:49:01 5187786F r reading key file: /SDCard/config/SoftCam Key
2016/01/27 19:49:02 00000000 s (main) init for all local cards done
2016/01/27 19:49:02 00000000 s (emmcache) loaded 12 emmcache records from /tmp/.oscam/oscam.emmcache in 2 ms
2016/01/27 19:49:02 00000000 s (emmcache) loaded 0 emmstat records from /tmp/.oscam/oscam.emmstat in 0 ms
2016/01/27 19:49:02 00000000 s (anticasc) anti cascading disabled
2016/01/27 19:49:02 7BA9410B c (client) plain dvbapi-client granted (wetekplay, au=auto (2 reader))
2016/01/27 19:49:02 7BA9410B c (dvbapi) dvbapi channelcache loaded from /sdcard/config/oscam.ccache
2016/01/27 19:49:02 7BA9410B c (dvbapi) Detected /dev/dvb0.demux0 Api: 0, userconfig boxtype: 1 maximum amount of possible filters is 22 (oscam limit is 32)
2016/01/27 19:49:02 7BA9410B c (dvbapi) Demuxer 0 ecmpid 0 CAID: 4AE1 ECM_PID: 0029 PROVID: 000002 PRIVATE DATA: 10000003
2016/01/27 19:49:02 7BA9410B c (dvbapi) Demuxer 0 ecmpid 1 CAID: 2710 ECM_PID: 00E3 PROVID: 000019
2016/01/27 19:49:02 7BA9410B c (dvbapi) Demuxer 0 ecmpid 2 CAID: 2710 ECM_PID: 0037 PROVID: 000018
2016/01/27 19:49:02 7BA9410B c (dvbapi) Demuxer 0 ecmpid 3 CAID: 4AE1 ECM_PID: 002E PROVID: 000011 PRIVATE DATA: 10000102
2016/01/27 19:49:02 7BA9410B c (dvbapi) Demuxer 0 ecmpid 4 CAID: 4AE1 ECM_PID: 0026 PROVID: 000011
2016/01/27 19:49:02 7BA9410B c (dvbapi) Demuxer 0 ecmpid 5 CAID: 4AE0 ECM_PID: 0027 PROVID: 000011
2016/01/27 19:49:02 7BA9410B c (dvbapi) Demuxer 0 ecmpid 6 CAID: 4AE0 ECM_PID: 0024 PROVID: 000015
2016/01/27 19:49:02 7BA9410B c (dvbapi) Demuxer 0 stream Videostream (MPEG-2)(type: 02 pid: 00fb length: 0)
2016/01/27 19:49:02 7BA9410B c (dvbapi) Demuxer 0 stream Audiostream (MPEG-2)(type: 04 pid: 00fc length: 6)
2016/01/27 19:49:02 7BA9410B c (dvbapi) Demuxer 0 found 7 ECMpids and 2 STREAMpids in caPMT
2016/01/27 19:49:02 7BA9410B c (dvbapi) Demuxer 0 serving srvid 0389 (ТНТ4) on adapter 0000 camask 0001 index 0000 pmtpid 0000
2016/01/27 19:49:02 7BA9410B c (dvbapi) Demuxer 0 trying to descramble PID 3 CAID 4AE1 PROVID 000011 ECMPID 002E CHID 0000 PMTPID 0000 VPID 00FB
2016/01/27 19:49:02 7BA9410B c (dvbapi) Demuxer 0 trying to descramble PID 3 CAID 4AE1 PROVID 000011 ECMPID 002E ANY CHID PMTPID 0000 VPID 00FB
2016/01/27 19:49:02 7BA9410B c (dvbapi) Demuxer 0 stream Videostream (MPEG-2)(type: 02 pid: 00fb length: 0)
2016/01/27 19:49:02 7BA9410B c (dvbapi) Demuxer 0 stream Audiostream (MPEG-2)(type: 04 pid: 00fc length: 6)
2016/01/27 19:49:02 7BA9410B c (dvbapi) Demuxer 0 found 7 ECMpids and 2 STREAMpids in PMT
2016/01/27 19:49:02 7BA9410B c (dvbapi) Demuxer 0 serving srvid 0389 (ТНТ4) on adapter 0000 camask 0001 index 0000 pmtpid 0000
2016/01/27 19:49:02 5187786F r [icg] ICG algo 8200 not found
2016/01/27 19:49:02 5187786F r cannot open key file path: /sdcard/config/ee56.bin
2016/01/27 19:49:02 5187786F r [EMU] ECM failed: ICG error
2016/01/27 19:49:02 7BA9410B c (ecm) wetekplay (4AE1@000011/3B40/0389/32:5D77BFF27C2FA6F53A7973B8F1E49719): not found (5 ms) by emulator - ТНТ4
2016/01/27 19:49:02 7BA9410B c (dvbapi) sdt-info (provider: TricolorTV - channel: ТНТ4)
2016/01/27 19:49:02 7BA9410B c (dvbapi) Demuxer 0 restarting decodingrequests after 0 ms with 1 enabled and 6 disabled ecmpids!
2016/01/27 19:49:02 7BA9410B c (dvbapi) Demuxer 0 trying to descramble PID 3 CAID 4AE1 PROVID 000011 ECMPID 002E CHID 0000 PMTPID 0000 VPID 00FB
2016/01/27 19:49:02 7BA9410B c (dvbapi) Demuxer 0 stop descrambling program number 0389 (ТНТ4)
2016/01/27 19:49:05 7BA9410B c (dvbapi) Demuxer 0 ecmpid 0 CAID: 4AE1 ECM_PID: 0029 PROVID: 000002 PRIVATE DATA: 10000003
2016/01/27 19:49:05 7BA9410B c (dvbapi) Demuxer 0 ecmpid 1 CAID: 2710 ECM_PID: 00E3 PROVID: 000019
2016/01/27 19:49:05 7BA9410B c (dvbapi) Demuxer 0 ecmpid 2 CAID: 2710 ECM_PID: 0037 PROVID: 000018
2016/01/27 19:49:05 7BA9410B c (dvbapi) Demuxer 0 ecmpid 3 CAID: 4AE1 ECM_PID: 002E PROVID: 000011 PRIVATE DATA: 10000102
2016/01/27 19:49:05 7BA9410B c (dvbapi) Demuxer 0 ecmpid 4 CAID: 4AE1 ECM_PID: 0026 PROVID: 000011
2016/01/27 19:49:05 7BA9410B c (dvbapi) Demuxer 0 ecmpid 5 CAID: 4AE0 ECM_PID: 0027 PROVID: 000011
2016/01/27 19:49:05 7BA9410B c (dvbapi) Demuxer 0 ecmpid 6 CAID: 4AE0 ECM_PID: 0024 PROVID: 000015
2016/01/27 19:49:05 7BA9410B c (dvbapi) Demuxer 0 stream Videostream (MPEG-2)(type: 02 pid: 00fb length: 0)
2016/01/27 19:49:05 7BA9410B c (dvbapi) Demuxer 0 stream Audiostream (MPEG-2)(type: 04 pid: 00fc length: 6)
2016/01/27 19:49:05 7BA9410B c (dvbapi) Demuxer 0 found 7 ECMpids and 2 STREAMpids in caPMT
2016/01/27 19:49:05 7BA9410B c (dvbapi) Demuxer 0 serving srvid 0389 (ТНТ4) on adapter 0000 camask 0001 index 0000 pmtpid 0000
2016/01/27 19:49:05 7BA9410B c (dvbapi) Demuxer 0 trying to descramble PID 3 CAID 4AE1 PROVID 000011 ECMPID 002E CHID 0000 PMTPID 0000 VPID 00FB
2016/01/27 19:49:05 7BA9410B c (dvbapi) Demuxer 0 trying to descramble PID 3 CAID 4AE1 PROVID 000011 ECMPID 002E ANY CHID PMTPID 0000 VPID 00FB
2016/01/27 19:49:05 7BA9410B c (ecm) wetekplay (4AE1@000011/3B40/0389/32:5D77BFF27C2FA6F53A7973B8F1E49719): not found (0 ms) by emulator - ТНТ4
2016/01/27 19:49:05 7BA9410B c (dvbapi) Demuxer 0 stream Videostream (MPEG-2)(type: 02 pid: 00fb length: 0)
2016/01/27 19:49:05 7BA9410B c (dvbapi) Demuxer 0 stream Audiostream (MPEG-2)(type: 04 pid: 00fc length: 6)
2016/01/27 19:49:05 7BA9410B c (dvbapi) Demuxer 0 found 7 ECMpids and 2 STREAMpids in PMT
2016/01/27 19:49:05 7BA9410B c (dvbapi) Demuxer 0 serving srvid 0389 (ТНТ4) on adapter 0000 camask 0001 index 0000 pmtpid 0000
2016/01/27 19:49:05 7BA9410B c (dvbapi) Demuxer 0 restarting decodingrequests after 0 ms with 1 enabled and 6 disabled ecmpids!
2016/01/27 19:49:05 7BA9410B c (dvbapi) Demuxer 0 trying to descramble PID 3 CAID 4AE1 PROVID 000011 ECMPID 002E CHID 0000 PMTPID 0000 VPID 00FB
2016/01/27 19:49:05 7BA9410B c (dvbapi) sdt-info (provider: TricolorTV - channel: ТНТ4)
2016/01/27 19:49:05 7BA9410B c (dvbapi) Demuxer 0 trying to descramble PID 3 CAID 4AE1 PROVID 000011 ECMPID 002E ANY CHID PMTPID 0000 VPID 00FB
2016/01/27 19:49:06 5187786F r [icg] snippet patch created. ICG algo 8200
2016/01/27 19:49:06 5187786F r (reader) emulator [EMU] wetekplay emmtype=global, len=743 (hex: 0x2E7), cnt=1: written (1 ms)
2016/01/27 19:49:06 7BA9410B c (ecm) wetekplay (4AE1@000011/3B40/0389/32:5D77BFF27C2FA6F53A7973B8F1E49719): not found (0 ms) by emulator - ТНТ4
2016/01/27 19:49:06 5187786F r (reader) emulator [EMU] wetekplay emmtype=global, len=743 (hex: 0x2E7), cnt=2: written (0 ms)
2016/01/27 19:49:06 7BA9410B c (dvbapi) Demuxer 0 restarting decodingrequests after 1 ms with 1 enabled and 6 disabled ecmpids!
2016/01/27 19:49:06 7BA9410B c (dvbapi) Demuxer 0 trying to descramble PID 3 CAID 4AE1 PROVID 000011 ECMPID 002E CHID 0000 PMTPID 0000 VPID 00FB
2016/01/27 19:49:06 5187786F r (reader) emulator [EMU] wetekplay emmtype=global, len=743 (hex: 0x2E7), cnt=3: written (0 ms)
2016/01/27 19:49:06 7BA9410B c (dvbapi) Demuxer 0 trying to descramble PID 3 CAID 4AE1 PROVID 000011 ECMPID 002E ANY CHID PMTPID 0000 VPID 00FB
2016/01/27 19:49:06 7BA9410B c (ecm) wetekplay (4AE1@000011/3B40/0389/32:5D77BFF27C2FA6F53A7973B8F1E49719): not found (0 ms) by emulator - ТНТ4
2016/01/27 19:49:06 7BA9410B c (dvbapi) Demuxer 0 restarting decodingrequests after 0 ms with 1 enabled and 6 disabled ecmpids!
2016/01/27 19:49:06 7BA9410B c (dvbapi) Demuxer 0 trying to descramble PID 3 CAID 4AE1 PROVID 000011 ECMPID 002E CHID 0000 PMTPID 0000 VPID 00FB
2016/01/27 19:49:06 7BA9410B c (dvbapi) Demuxer 0 trying to descramble PID 3 CAID 4AE1 PROVID 000011 ECMPID 002E ANY CHID PMTPID 0000 VPID 00FB
2016/01/27 19:49:07 7BA9410B c (ecm) wetekplay (4AE1@000011/3B40/0389/32:5D77BFF27C2FA6F53A7973B8F1E49719): not found (0 ms) by emulator - ТНТ4
2016/01/27 19:49:07 7BA9410B c (dvbapi) Demuxer 0 stop descrambling program number 0389 (ТНТ4)
2016/01/27 19:49:09 7BA9410B c (dvbapi) Demuxer 0 ecmpid 0 CAID: 4AE1 ECM_PID: 0029 PROVID: 000002 PRIVATE DATA: 10000003
2016/01/27 19:49:09 7BA9410B c (dvbapi) Demuxer 0 ecmpid 1 CAID: 2710 ECM_PID: 00E3 PROVID: 000019
2016/01/27 19:49:09 7BA9410B c (dvbapi) Demuxer 0 ecmpid 2 CAID: 2710 ECM_PID: 0037 PROVID: 000018
2016/01/27 19:49:09 7BA9410B c (dvbapi) Demuxer 0 ecmpid 3 CAID: 4AE1 ECM_PID: 002E PROVID: 000011 PRIVATE DATA: 10000102
2016/01/27 19:49:09 7BA9410B c (dvbapi) Demuxer 0 ecmpid 4 CAID: 4AE1 ECM_PID: 0026 PROVID: 000011
2016/01/27 19:49:09 7BA9410B c (dvbapi) Demuxer 0 ecmpid 5 CAID: 4AE0 ECM_PID: 0027 PROVID: 000011
2016/01/27 19:49:09 7BA9410B c (dvbapi) Demuxer 0 ecmpid 6 CAID: 4AE0 ECM_PID: 0024 PROVID: 000015
2016/01/27 19:49:09 7BA9410B c (dvbapi) Demuxer 0 stream Videostream (MPEG-2)(type: 02 pid: 00fb length: 0)
2016/01/27 19:49:09 7BA9410B c (dvbapi) Demuxer 0 stream Audiostream (MPEG-2)(type: 04 pid: 00fc length: 6)
2016/01/27 19:49:09 7BA9410B c (dvbapi) Demuxer 0 found 7 ECMpids and 2 STREAMpids in caPMT
2016/01/27 19:49:09 7BA9410B c (dvbapi) Demuxer 0 serving srvid 0389 (ТНТ4) on adapter 0000 camask 0001 index 0000 pmtpid 0000
2016/01/27 19:49:09 7BA9410B c (dvbapi) Demuxer 0 trying to descramble PID 3 CAID 4AE1 PROVID 000011 ECMPID 002E CHID 0000 PMTPID 0000 VPID 00FB
2016/01/27 19:49:09 7BA9410B c (dvbapi) Demuxer 0 trying to descramble PID 3 CAID 4AE1 PROVID 000011 ECMPID 002E ANY CHID PMTPID 0000 VPID 00FB
2016/01/27 19:49:09 7BA9410B c (dvbapi) Demuxer 0 stream Videostream (MPEG-2)(type: 02 pid: 00fb length: 0)
2016/01/27 19:49:09 7BA9410B c (dvbapi) Demuxer 0 stream Audiostream (MPEG-2)(type: 04 pid: 00fc length: 6)
2016/01/27 19:49:09 7BA9410B c (dvbapi) Demuxer 0 found 7 ECMpids and 2 STREAMpids in PMT
2016/01/27 19:49:09 7BA9410B c (dvbapi) Demuxer 0 serving srvid 0389 (ТНТ4) on adapter 0000 camask 0001 index 0000 pmtpid 0000
2016/01/27 19:49:09 5187786F r [icg] decrypt address = 0xE, id = 8200
2016/01/27 19:49:09 5187786F r [icg] CW: A7 11 CE 85 A9 A9 49 E3 7F 9A E5 3C 7C 1E 15 7(A)
2016/01/27 19:49:09 5187786F r [icg] cw1 ret = 0, AREG = 0
2016/01/27 19:49:09 5187786F r [icg] cw2 ret = 0, AREG = 0
2016/01/27 19:49:09 5187786F r [icg] DW: DA 86 C9 29 B4 C9 B2 2F 48 B7 5B 5A 0C 08 7B 8F
2016/01/27 19:49:09 7BA9410B c (dvbapi) sdt-info (provider: TricolorTV - channel: ТНТ4)
2016/01/27 19:49:10 7BA9410B c (ecm) wetekplay (4AE1@000011/3B40/0389/32:BF9E26F31FD69F5CDF42F1FB8088B36A): found (1 ms) by emulator - ТНТ4
2016/01/27 19:49:16 5187786F r [EMU] Key 4AE111 3B00 alredy exist
2016/01/27 19:49:16 5187786F r [EMU] Key 4AE111 5600 alredy exist
2016/01/27 19:49:16 5187786F r (reader) emulator [EMU] wetekplay emmtype=shared, len=180 (hex: 0x0B4), cnt=1: written (0 ms)
2016/01/27 19:49:19 5187786F r [EMU] Key not found: D 4AE111 MK6605
2016/01/27 19:49:19 5187786F r [EMU] EMM failed: Key not found

 

Процесс установки Mega OSTool OSCam Android

Mega OSTool устанавливается как обычное Android переложение, любым удобным способом. Собственно данного переложения достаточно для выполнения основных задач, но кому нужно запустить его на полную have to manually add the configuration folder Mega OSTool:

/MNT/shell/emulated/0/config/ or just /SDCard/config/

multiple files, This can be done by means of FTP connections to WeTeK Play. The files are in the archive Mega OSTool folder config

biss_and_dre_to_mega-ostool

biss_and_dre_to_mega-ostool

After copying the files from configuration files OSCAM, folder /SDCard/config/ will look something like this

biss and dre to mega ostool

BiSS and dre to mega ostool

These settings in the field be enough, who should kardservera of your favorite settings adds(about plačenogo) šarovoda(the cart).


AU not working, Therefore,:

Fresh DV .key SoftCam and keys should be loaded using

Key generator TriColor and SoftCam Key

automatically or manually.

Take a fresh op SoftCam keys or Key here:

56°(E) 36°(E)

SoftCam Key

ПРОСМОТР ВСЕГО ПАКЕТА ТРИКОЛОР MPEG-2 DVB-S(52 канала) НА РЕСИВЕРЕ WeTek Play

VIEW the ENTIRE TRICOLOR MPEG-2 DVB-S(52 channel) On The RECEIVER WeTek Play


Правила при использовании карт доступа

для любой карты oscam. server

[reader]
enable          = 1
label           = CardReader
protocol        = internal
detect          = cd
device          = /dev/sci0
mhz             = 357
cardmhz; 357
Emnkache = 2,3,2,0
group           = 1

для 13-ой oscam. dvbapi

(P):4Ae1:11::::10000102
(P):4Ae1:11::::102
(P):4Ae1:FE I:0

для 23-ей 24-ой (только 2 channel) oscam. dvbapi

(P):4Ae1:2
(I):0

для 245-ой oscam. dvbapi

(P):2710:18
(I):0

для 255-ой oscam. dvbapi

(P):2710:19
(I):0

More about Mega OSTool Oscam under Android:

If you start having problems with pay-per-view satellite tv channels, recommend change PMT Mode with the fact that there are at 2 – Disable camd. socket in the Web interface Mega OSTool. Get into the Web interface at http://ajpi_resivera:8888 The user name and password to login: Admin

Disable camd. socket

Disable camd. socket

Recommended!