@Philpem
Just trying to dot the Is and cross the Ts while this is still fresh...
I have read out all of the SecurityPALs as TMS2764 EPROMs and attached them, would you be able to run these through your decoder and reveal the contents?
It might give us a clue to the use of the other 'spare' bytes after the description you mentioned before
Here you go!
Some new description strings in this one:
* 10311 Picturebox identifies as "GV SERIES"; the entire "spare" area is set to zero
Harriet:
* 12360 Harriet - "00 00 00 08" in both copies
HAL:
* 12875 & 11907: ID string is "HAL". First serial number in the ROM is 11907, second is 12875 (I'm curious which is the group one). Mystery bytes "00 04 00 00"
* 14201: "HAL", mystery bytes "00 04 00 00"
Editbox:
* 13784_1, 13822_1, 15719_1, 16109_1, 16134_1, 16138_1, 16161_1, 17624_1dup1, 17624_1dup2: "EDITBOX". Mystery bytes "10 00 01 00"
* 13784_2, 13822_1, 15719_2, 16109_2, 16134_2, 16138_1, 16161_1, 17624_2dup1, 17624_2dup2: "EDITBOX". Mystery bytes "00 42 01 00"
Editbox Platinum (only the description text has changed though, possibly just different software keys):
* 16450_1, 16879_1, 16980_1: "EDITBOX (PLATINUM)". Mystery bytes "10 00 01 00"
* 16450_2, 16584_2, 16879_2, 16880_2: "EDITBOX (PLATINUM)". Mystery bytes "00 42 01 00"
Edit Seat? -- possibly some special kind of Editbox:
* 14340_1, 14491_1, 14691_1: "EDIT SEAT", Mystery bytes "10 00 00 00, 00 10 00 00"
* 14340_2, 14491_2, 14691_2: "EDIT SEAT", Mystery bytes "00 42 00 00, 00 10 00 00"
Domino?:
* 13923 Dup 1: "DOMINO", Mystery bytes "00 00 20 00"
* 13923 Dup 2: "DOMINO", Mystery bytes "00 00 04 00"
Snetcom / Remote Mag Opt:
* 14768, 17811: "REMOTE MAG OPT", Mystery bytes "00 00 00 00 10 00 00 00"
PFrame Paintbox:
* 15462 E dup1, 15462 E dup2: "PFRAME PAINTBOX", Mystery bytes "00 00 10 00 04 00 00 00"
Paintbox:
* 15546: "OPTIONS", Mystery bytes "00 00 00 08"
Picturebox:
* 70579: "PICTUREBOX", Mystery bytes "80 00 00 00"
Henry:
* 15671_1: "HENRY", Mystery bytes "10 00 00 10"
* 15671_2: "HENRY", Mystery bytes "00 42 00 10"
Network cards:
* 13464 (HAL): ID string is "NETCOM". Mystery bytes "00 60 00 00" which is a network card
* 15671_N, 15719_N_EB, 16879_N_ED, 16880_N_ED: "NETWORK". Mystery bytes "00 60 00 00"
PMAN / GRID:
* 15929 GRID: "PMAN". Mystery bytes "00 00 08 00"
Bridge Processor:
* 70579 BP: "BRIDGEPROC". Mystery bytes "00 60 00 00" -- yep, same as a network card. Maybe 00:60 just means "expansion card".
At a guess, I'd say the mystery bytes encode the machine/card type. Dual-CPU machines at least have a PROM with encoding "10 00" for CPU1, and "00 42" for CPU2.
There doesn't seem to be any other pattern to it, other than "specific machine types have specific values". A bit like the Gestalt values on old Macs, maybe?
Cheers,
Phil.