removing assets in case unexperience user uses them
This commit is contained in:
parent
2cf24c8ac9
commit
fad00fd061
|
|
@ -1,28 +0,0 @@
|
||||||
-----BEGIN PRIVATE KEY-----
|
|
||||||
MIIEvgIBADANBgkqhkiG9w0BAQEFAASCBKgwggSkAgEAAoIBAQDaL6QiNwYYqb+Q
|
|
||||||
n7t/DUJ1fcwSaEh2e9KYUu4KTc0f+LpULfMCjrNqncIr/2fUcjMrPeziIQGc4/jy
|
|
||||||
MSwvQGTmG85umEXkDxI4Ma0o8oAzZTO+pluTKaJr4iOUkH6LIHolf3iFLkU+GID/
|
|
||||||
OHeU2tkBhyizMEpnwQxdoEAQw8nCEx0FWai+YyjERdNqo/ie9Cy3dbf1UtyjRL5K
|
|
||||||
d8I96JloBYa0voyLA9/79pjKHJQFI8JB/8AZchHiJmE2g/c4XvfrKykBpTZR4Miv
|
|
||||||
M8IGl+gqC/7qAr4yQet6EpQT72yLoPx51xzbrGrS9xhg5RgUWrU+2jXOsIzNYGtR
|
|
||||||
QPzIfv4tAgMBAAECggEANH3XuB+SyOY13z5+pl9zSL7+FMOgA1lg3iK9gB8dpX56
|
|
||||||
nXv8hfX89j6EE3+75CGha9rXHcQhFjTGlMX9wlR0seOos3TRA8AYewqAhWRqMXM8
|
|
||||||
kraFO499swTR2JE20JP8rv7O6QOrxvewOTbFljtckACLayjIDdQk/HVsVFw2Mwli
|
|
||||||
bkutBl049hq6UhCimd1tN4wksfeb6Fa8o3OO7+0/Op2LGKwxyZJTnYMVeqObv//4
|
|
||||||
yn1oOxfSmYAYLxF3sk5z+0wPlID0IEd8Zxk3Bx1RJPPCFfCzeO7BCmbEUfvVEGxJ
|
|
||||||
k7xQtEKW484bPDKvZS7Lthw4lkSsDGQjK4r/RrxZoQKBgQDt85u2rSOZvnROcDVK
|
|
||||||
E7RrDDbTHj2XVnXiPiJp2P5nu+cY588zX9JQwIzSBhhHclg2GLeBLsSTfZol7mpD
|
|
||||||
efmmHuIPc7g2LtcXUZ3wCDPgaN758nQvgdvvJ66ErevKZKs+mmpO0xKbRPta5b97
|
|
||||||
rXWmANxPVKBGRNWJbUINgakEeQKBgQDqvD03xRAYIlnVbuWm0tGflsxTXB6b0yue
|
|
||||||
ZTVekolGs2WAIMJNCz0JHyaCTRVbd/X14q7VB962HGoK8W+Ywy7fwdxuacIw6EjT
|
|
||||||
RiVhgJXOmRLMA7SHGKpGy77C7cwOJyIAklo0+sM6POYMMLyRWNjeIOGGHy8ad3Vw
|
|
||||||
8FlbvZASVQKBgQCr1MVXj4Qr3ArlMcZprf0VaIaWwjm79aW/MRts0FQ22MwzggJw
|
|
||||||
mPupcMLAT8JspbfpqMOrN/iggY01Ywu9mnGbcqXQfsJB7mVI45ln4qSDo3eRi3I3
|
|
||||||
dFE8TK2MBoRFbZjz5lJqhaXkFlZk94/lYgeZTvnJF9V9qOuDCDEwy7cgEQKBgDSe
|
|
||||||
e86boy71zFN2544M5iazJBxvowDlRnrcTyljCdjKcC9XqJaitUztKbG929LEQmOb
|
|
||||||
K/vfJsKF/hNz6cNBxaktCN/LX1edSm3p5IlFzM8iKz+GeRprogf6tkl2Cu8FQK8G
|
|
||||||
H6iOqeLNMfh7mFmwo/SvRD7PkLyLGM13Y2CYTsp9AoGBAOFLzvhYXIApel1X4Pdp
|
|
||||||
PwspYEqHW5JqktoQ38dh4nZ6ArPFreaJ4sKYpuhW0Iq1ZSaegZkPzI1cBfLfscAb
|
|
||||||
LOMb5aNSsZgutCCWRGLuzC5ecKjUP2YHC1pJk+08tOhUKKGnsRmu0N+IUnmlQqJH
|
|
||||||
ZERdfgjBenmNoXkj3lr5BMZY
|
|
||||||
-----END PRIVATE KEY-----
|
|
||||||
Binary file not shown.
|
|
@ -1 +0,0 @@
|
||||||
1867e8378c68753224677f8e00f81aad
|
|
||||||
Binary file not shown.
|
|
@ -1 +0,0 @@
|
||||||
6a83136b15ad2a55f3e0240a0fe9c1a7
|
|
||||||
|
|
@ -1,17 +0,0 @@
|
||||||
#!/system/bin/sh
|
|
||||||
|
|
||||||
# If you're implementing this in a custom kernel/firmware,
|
|
||||||
# I suggest you use a different script name, and add a service
|
|
||||||
# to launch it from init.rc
|
|
||||||
|
|
||||||
# Launches SuperSU in daemon mode only on Android 4.3+.
|
|
||||||
# Nothing will happen on 4.2.x or older, unless SELinux+Enforcing.
|
|
||||||
# If you want to force loading the daemon, use "--daemon" instead
|
|
||||||
|
|
||||||
/system/xbin/daemonsu --auto-daemon &
|
|
||||||
|
|
||||||
# Some apps like to run stuff from this script as well, that will
|
|
||||||
# obviously break root - in your code, just search this file
|
|
||||||
# for "install-recovery-2.sh", and if present, write there instead.
|
|
||||||
|
|
||||||
/system/etc/install-recovery-2.sh
|
|
||||||
Binary file not shown.
Binary file not shown.
Binary file not shown.
|
|
@ -1,128 +0,0 @@
|
||||||
#!/bin/sh
|
|
||||||
|
|
||||||
# $1 update package
|
|
||||||
# $2 output directory
|
|
||||||
# $3 pub key to verify sig
|
|
||||||
# $4 pri key to decrypt data key
|
|
||||||
|
|
||||||
SIG_FILE="$2/sig.dat"
|
|
||||||
AES256_KEY="$2/aes256.key"
|
|
||||||
IV="$2/iv"
|
|
||||||
|
|
||||||
ANIM_SIG_FILE="$2/anim_sig.dat"
|
|
||||||
ANIM_PID=0
|
|
||||||
|
|
||||||
|
|
||||||
epd_cmd()
|
|
||||||
{
|
|
||||||
epd_fb_test $@ >/dev/null 2>&1
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
########################################
|
|
||||||
# file header check
|
|
||||||
########################################
|
|
||||||
HEAD_MARK=`head -c 4 $1`
|
|
||||||
if [ $HEAD_MARK != "DPUP" ]
|
|
||||||
then
|
|
||||||
echo "Invalid file"
|
|
||||||
exit 0
|
|
||||||
fi
|
|
||||||
|
|
||||||
|
|
||||||
DATA_OFFSET=`dd if=$1 bs=4 skip=1 count=1 2>/dev/null | od -A n -t d4 -v`
|
|
||||||
BODY_SIZE=`dd if=$1 bs=4 skip=2 count=1 2>/dev/null | od -A n -t d4 -v`
|
|
||||||
########################################
|
|
||||||
# start animation for package check
|
|
||||||
########################################
|
|
||||||
ANIM_HEADER_OFFSET=$(( $DATA_OFFSET + $BODY_SIZE ))
|
|
||||||
if [ -z "$ANIM_HEADER_OFFSET" ]
|
|
||||||
then
|
|
||||||
ANIM_HEADER_OFFSET=0
|
|
||||||
fi
|
|
||||||
ANIM_HEADER_SIZE=`dd if=$1 bs=1 skip=$ANIM_HEADER_OFFSET count=4 2>/dev/null | od -A n -t d4 -v`
|
|
||||||
if [ -z "$ANIM_HEADER_SIZE" ]
|
|
||||||
then
|
|
||||||
ANIM_HEADER_SIZE=0
|
|
||||||
fi
|
|
||||||
ANIM_ARCH_SIZE=`dd if=$1 bs=1 skip=$(($ANIM_HEADER_OFFSET + 4)) count=4 2>/dev/null | od -A n -t d4 -v`
|
|
||||||
ANIM_SIG_SIZE=`dd if=$1 bs=1 skip=$(($ANIM_HEADER_OFFSET + 8)) count=4 2>/dev/null | od -A n -t d4 -v`
|
|
||||||
dd if=$1 of=$ANIM_SIG_FILE bs=1 skip=$(($ANIM_HEADER_OFFSET + 12)) count=$(($ANIM_SIG_SIZE)) 2>/dev/null
|
|
||||||
ANIM_ARCH_OFFSET=$(($ANIM_HEADER_OFFSET + $ANIM_HEADER_SIZE))
|
|
||||||
dd if=$1 bs=$ANIM_ARCH_OFFSET skip=1 2>/dev/null | head -c $(($ANIM_ARCH_SIZE)) | openssl dgst -sha256 -verify $3 -signature $ANIM_SIG_FILE 1>/dev/null
|
|
||||||
if [ $? -eq 0 ]
|
|
||||||
then
|
|
||||||
start_prepare_animation.sh $1 $2 $ANIM_ARCH_OFFSET $(($ANIM_ARCH_SIZE)) &
|
|
||||||
ANIM_PID=$!
|
|
||||||
fi
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
########################################
|
|
||||||
# extract sig
|
|
||||||
########################################
|
|
||||||
SIG_SIZE=`dd if=$1 bs=4 skip=4 count=1 2>/dev/null | od -A n -t d4 -v`
|
|
||||||
dd if=$1 of=$SIG_FILE bs=1 skip=20 count=$(($SIG_SIZE)) 2>/dev/null
|
|
||||||
|
|
||||||
|
|
||||||
########################################
|
|
||||||
# verify sig
|
|
||||||
########################################
|
|
||||||
# dd if=$1 bs=$(($DATA_OFFSET)) skip=1 2>/dev/null | head -c $(($BODY_SIZE)) | openssl dgst -sha256 -verify $3 -signature $SIG_FILE 1>/dev/null
|
|
||||||
#if [ $? -ne 0 ]
|
|
||||||
#then
|
|
||||||
# echo "Verify failed."
|
|
||||||
# exit 0
|
|
||||||
#fi
|
|
||||||
|
|
||||||
|
|
||||||
########################################
|
|
||||||
# decrypt data key
|
|
||||||
########################################
|
|
||||||
ENC_KEY_OFFSET=$((20 + $SIG_SIZE))
|
|
||||||
PAD_SIZE=$((16 - $SIG_SIZE % 16 ))
|
|
||||||
if [ $PAD_SIZE -ne 16 ]
|
|
||||||
then
|
|
||||||
ENC_KEY_OFFSET=$(( $ENC_KEY_OFFSET + $PAD_SIZE ))
|
|
||||||
fi
|
|
||||||
|
|
||||||
ENC_KEY_SIZE=`dd if=$1 bs=1 skip=${ENC_KEY_OFFSET} count=4 2>/dev/null | od -A n -t d4 -v`
|
|
||||||
ENC_KEY_OFFSET=$(( $ENC_KEY_OFFSET + 4 ))
|
|
||||||
dd if=$1 bs=1 skip=${ENC_KEY_OFFSET} count=$(($ENC_KEY_SIZE)) 2>/dev/null | openssl rsautl -decrypt -inkey $4 > ${AES256_KEY}
|
|
||||||
|
|
||||||
|
|
||||||
########################################
|
|
||||||
# extract iv
|
|
||||||
########################################
|
|
||||||
IV_OFFSET=$(($ENC_KEY_OFFSET + $ENC_KEY_SIZE))
|
|
||||||
dd if=$1 of=$IV bs=1 skip=${IV_OFFSET} count=32 2>/dev/null
|
|
||||||
|
|
||||||
|
|
||||||
########################################
|
|
||||||
# decrypt data and extract directory tree
|
|
||||||
########################################
|
|
||||||
dd if=$1 bs=$(($DATA_OFFSET)) skip=1 2>/dev/null | head -c $(($BODY_SIZE)) | openssl enc -d -aes-256-cbc -K `cat ${AES256_KEY}` -iv `cat ${IV}` | tar -xz -C $2
|
|
||||||
|
|
||||||
|
|
||||||
########################################
|
|
||||||
# stop animation for package check
|
|
||||||
########################################
|
|
||||||
if [ $ANIM_PID -ne 0 ]
|
|
||||||
then
|
|
||||||
kill $ANIM_PID
|
|
||||||
epd_cmd gray DU PART 0
|
|
||||||
epd_cmd wait 300000
|
|
||||||
fi
|
|
||||||
|
|
||||||
|
|
||||||
########################################
|
|
||||||
# start updater
|
|
||||||
########################################
|
|
||||||
if [ -f ${2}/FwUpdater/eufwupdater.sh ]
|
|
||||||
then
|
|
||||||
${2}/FwUpdater/eufwupdater.sh
|
|
||||||
exit $? # tentative
|
|
||||||
else
|
|
||||||
echo "Invalid archive (No updater script)."
|
|
||||||
exit 0
|
|
||||||
fi
|
|
||||||
Binary file not shown.
Binary file not shown.
|
|
@ -1,114 +0,0 @@
|
||||||
#!/bin/sh
|
|
||||||
|
|
||||||
|
|
||||||
DDAT_MOUNT_PATH=/tmp/ddat
|
|
||||||
END_USER_UPDATER_PKG=${DDAT_MOUNT_PATH}/FwUpdater.pkg
|
|
||||||
KEY_DETECTION_TMPF=/tmp/keyDetect.log
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
# $1 : reboot=1, shutdown 0
|
|
||||||
local_reboot()
|
|
||||||
{
|
|
||||||
umount $DDAT_MOUNT_PATH
|
|
||||||
sync
|
|
||||||
sync
|
|
||||||
mount -o remount,ro /
|
|
||||||
if [ $1 -eq 1 ]
|
|
||||||
then
|
|
||||||
/sbin/reboot
|
|
||||||
else
|
|
||||||
/sbin/poweroff
|
|
||||||
fi
|
|
||||||
|
|
||||||
while [ 1 ]
|
|
||||||
do
|
|
||||||
sleep 3
|
|
||||||
done
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
#########################
|
|
||||||
# mount tmp file system
|
|
||||||
#########################
|
|
||||||
mount -t tmpfs tmpfs /tmp
|
|
||||||
|
|
||||||
#########################
|
|
||||||
# Button check
|
|
||||||
#########################
|
|
||||||
|
|
||||||
# animation hint
|
|
||||||
epd_fb_test gray DU PART 0 && \
|
|
||||||
epd_fb_test gray GC16 PART 10 0 50 50 150 50 && \
|
|
||||||
sleep 1 && \
|
|
||||||
epd_fb_test gray GC16 PART 10 0 50 150 150 50 && \
|
|
||||||
sleep 1 && \
|
|
||||||
epd_fb_test gray GC16 PART 10 0 50 250 150 50 && \
|
|
||||||
sleep 1 &
|
|
||||||
|
|
||||||
# if HOME pressed, go into diagnosis mode directly
|
|
||||||
busybox script -c "timeout -t 3 keyscan" -f -q ${KEY_DETECTION_TMPF}
|
|
||||||
grep -Fq "HOME" ${KEY_DETECTION_TMPF}
|
|
||||||
if [ $? -eq 0 ]
|
|
||||||
then
|
|
||||||
rm ${KEY_DETECTION_TMPF}
|
|
||||||
epd_fb_test gray GC16 PART 10 0 50 50 150 250
|
|
||||||
initctl start diag
|
|
||||||
exit 0
|
|
||||||
fi
|
|
||||||
|
|
||||||
# if POWER pressed, cancel and remove update
|
|
||||||
grep -Fq "POWER" ${KEY_DETECTION_TMPF}
|
|
||||||
if [ $? -eq 0 ]
|
|
||||||
then
|
|
||||||
rm ${KEY_DETECTION_TMPF}
|
|
||||||
mkdir ${DDAT_MOUNT_PATH}
|
|
||||||
mount /dev/mmcblk0p16 ${DDAT_MOUNT_PATH}
|
|
||||||
change_boot_mode.sh normal
|
|
||||||
rm -rf ${END_USER_UPDATER_PKG}
|
|
||||||
local_reboot 1
|
|
||||||
umount ${DDAT_MOUNT_PATH}
|
|
||||||
fi
|
|
||||||
|
|
||||||
rm ${KEY_DETECTION_TMPF}
|
|
||||||
|
|
||||||
|
|
||||||
#########################
|
|
||||||
# End User Updater check
|
|
||||||
#########################
|
|
||||||
|
|
||||||
mkdir ${DDAT_MOUNT_PATH}
|
|
||||||
mount /dev/mmcblk0p16 ${DDAT_MOUNT_PATH}
|
|
||||||
if [ -f ${END_USER_UPDATER_PKG} ]
|
|
||||||
then
|
|
||||||
rawdata --get_dump=sig_key > /tmp/sig.key
|
|
||||||
rawdata --get_dump=dec_key > /tmp/dec.key
|
|
||||||
start_eufwupdater.sh ${END_USER_UPDATER_PKG} /tmp /tmp/sig.key /tmp/dec.key
|
|
||||||
ret=$?
|
|
||||||
if [ $ret -eq 0 ]
|
|
||||||
then
|
|
||||||
# remove pkg, change normal boot and reboot
|
|
||||||
change_boot_mode.sh normal
|
|
||||||
rm -rf ${END_USER_UPDATER_PKG}
|
|
||||||
local_reboot 1
|
|
||||||
# elif [ $ret -eq 1 ]
|
|
||||||
# then
|
|
||||||
# # remain pkg, keep boot mode and shutdown
|
|
||||||
# local_reboot 0
|
|
||||||
else
|
|
||||||
# remove pkg, change normal boot and shutdown
|
|
||||||
change_boot_mode.sh normal
|
|
||||||
rm -rf ${END_USER_UPDATER_PKG}
|
|
||||||
local_reboot 0
|
|
||||||
fi
|
|
||||||
fi
|
|
||||||
|
|
||||||
umount ${DDAT_MOUNT_PATH}
|
|
||||||
|
|
||||||
#########################
|
|
||||||
# Diag check
|
|
||||||
#########################
|
|
||||||
|
|
||||||
initctl start diag
|
|
||||||
exit 0
|
|
||||||
|
|
||||||
Loading…
Reference in New Issue