removing assets in case unexperience user uses them

This commit is contained in:
HappyZ 2019-03-22 17:40:37 -05:00
parent 2cf24c8ac9
commit fad00fd061
13 changed files with 0 additions and 289 deletions

View File

@ -1,28 +0,0 @@
-----BEGIN PRIVATE KEY-----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-----END PRIVATE KEY-----

View File

@ -1 +0,0 @@
1867e8378c68753224677f8e00f81aad

View File

@ -1 +0,0 @@
6a83136b15ad2a55f3e0240a0fe9c1a7

View File

@ -1,17 +0,0 @@
#!/system/bin/sh
# If you're implementing this in a custom kernel/firmware,
# I suggest you use a different script name, and add a service
# to launch it from init.rc
# Launches SuperSU in daemon mode only on Android 4.3+.
# Nothing will happen on 4.2.x or older, unless SELinux+Enforcing.
# If you want to force loading the daemon, use "--daemon" instead
/system/xbin/daemonsu --auto-daemon &
# Some apps like to run stuff from this script as well, that will
# obviously break root - in your code, just search this file
# for "install-recovery-2.sh", and if present, write there instead.
/system/etc/install-recovery-2.sh

Binary file not shown.

View File

@ -1,128 +0,0 @@
#!/bin/sh
# $1 update package
# $2 output directory
# $3 pub key to verify sig
# $4 pri key to decrypt data key
SIG_FILE="$2/sig.dat"
AES256_KEY="$2/aes256.key"
IV="$2/iv"
ANIM_SIG_FILE="$2/anim_sig.dat"
ANIM_PID=0
epd_cmd()
{
epd_fb_test $@ >/dev/null 2>&1
}
########################################
# file header check
########################################
HEAD_MARK=`head -c 4 $1`
if [ $HEAD_MARK != "DPUP" ]
then
echo "Invalid file"
exit 0
fi
DATA_OFFSET=`dd if=$1 bs=4 skip=1 count=1 2>/dev/null | od -A n -t d4 -v`
BODY_SIZE=`dd if=$1 bs=4 skip=2 count=1 2>/dev/null | od -A n -t d4 -v`
########################################
# start animation for package check
########################################
ANIM_HEADER_OFFSET=$(( $DATA_OFFSET + $BODY_SIZE ))
if [ -z "$ANIM_HEADER_OFFSET" ]
then
ANIM_HEADER_OFFSET=0
fi
ANIM_HEADER_SIZE=`dd if=$1 bs=1 skip=$ANIM_HEADER_OFFSET count=4 2>/dev/null | od -A n -t d4 -v`
if [ -z "$ANIM_HEADER_SIZE" ]
then
ANIM_HEADER_SIZE=0
fi
ANIM_ARCH_SIZE=`dd if=$1 bs=1 skip=$(($ANIM_HEADER_OFFSET + 4)) count=4 2>/dev/null | od -A n -t d4 -v`
ANIM_SIG_SIZE=`dd if=$1 bs=1 skip=$(($ANIM_HEADER_OFFSET + 8)) count=4 2>/dev/null | od -A n -t d4 -v`
dd if=$1 of=$ANIM_SIG_FILE bs=1 skip=$(($ANIM_HEADER_OFFSET + 12)) count=$(($ANIM_SIG_SIZE)) 2>/dev/null
ANIM_ARCH_OFFSET=$(($ANIM_HEADER_OFFSET + $ANIM_HEADER_SIZE))
dd if=$1 bs=$ANIM_ARCH_OFFSET skip=1 2>/dev/null | head -c $(($ANIM_ARCH_SIZE)) | openssl dgst -sha256 -verify $3 -signature $ANIM_SIG_FILE 1>/dev/null
if [ $? -eq 0 ]
then
start_prepare_animation.sh $1 $2 $ANIM_ARCH_OFFSET $(($ANIM_ARCH_SIZE)) &
ANIM_PID=$!
fi
########################################
# extract sig
########################################
SIG_SIZE=`dd if=$1 bs=4 skip=4 count=1 2>/dev/null | od -A n -t d4 -v`
dd if=$1 of=$SIG_FILE bs=1 skip=20 count=$(($SIG_SIZE)) 2>/dev/null
########################################
# verify sig
########################################
# dd if=$1 bs=$(($DATA_OFFSET)) skip=1 2>/dev/null | head -c $(($BODY_SIZE)) | openssl dgst -sha256 -verify $3 -signature $SIG_FILE 1>/dev/null
#if [ $? -ne 0 ]
#then
# echo "Verify failed."
# exit 0
#fi
########################################
# decrypt data key
########################################
ENC_KEY_OFFSET=$((20 + $SIG_SIZE))
PAD_SIZE=$((16 - $SIG_SIZE % 16 ))
if [ $PAD_SIZE -ne 16 ]
then
ENC_KEY_OFFSET=$(( $ENC_KEY_OFFSET + $PAD_SIZE ))
fi
ENC_KEY_SIZE=`dd if=$1 bs=1 skip=${ENC_KEY_OFFSET} count=4 2>/dev/null | od -A n -t d4 -v`
ENC_KEY_OFFSET=$(( $ENC_KEY_OFFSET + 4 ))
dd if=$1 bs=1 skip=${ENC_KEY_OFFSET} count=$(($ENC_KEY_SIZE)) 2>/dev/null | openssl rsautl -decrypt -inkey $4 > ${AES256_KEY}
########################################
# extract iv
########################################
IV_OFFSET=$(($ENC_KEY_OFFSET + $ENC_KEY_SIZE))
dd if=$1 of=$IV bs=1 skip=${IV_OFFSET} count=32 2>/dev/null
########################################
# decrypt data and extract directory tree
########################################
dd if=$1 bs=$(($DATA_OFFSET)) skip=1 2>/dev/null | head -c $(($BODY_SIZE)) | openssl enc -d -aes-256-cbc -K `cat ${AES256_KEY}` -iv `cat ${IV}` | tar -xz -C $2
########################################
# stop animation for package check
########################################
if [ $ANIM_PID -ne 0 ]
then
kill $ANIM_PID
epd_cmd gray DU PART 0
epd_cmd wait 300000
fi
########################################
# start updater
########################################
if [ -f ${2}/FwUpdater/eufwupdater.sh ]
then
${2}/FwUpdater/eufwupdater.sh
exit $? # tentative
else
echo "Invalid archive (No updater script)."
exit 0
fi

Binary file not shown.

Binary file not shown.

View File

@ -1,114 +0,0 @@
#!/bin/sh
DDAT_MOUNT_PATH=/tmp/ddat
END_USER_UPDATER_PKG=${DDAT_MOUNT_PATH}/FwUpdater.pkg
KEY_DETECTION_TMPF=/tmp/keyDetect.log
# $1 : reboot=1, shutdown 0
local_reboot()
{
umount $DDAT_MOUNT_PATH
sync
sync
mount -o remount,ro /
if [ $1 -eq 1 ]
then
/sbin/reboot
else
/sbin/poweroff
fi
while [ 1 ]
do
sleep 3
done
}
#########################
# mount tmp file system
#########################
mount -t tmpfs tmpfs /tmp
#########################
# Button check
#########################
# animation hint
epd_fb_test gray DU PART 0 && \
epd_fb_test gray GC16 PART 10 0 50 50 150 50 && \
sleep 1 && \
epd_fb_test gray GC16 PART 10 0 50 150 150 50 && \
sleep 1 && \
epd_fb_test gray GC16 PART 10 0 50 250 150 50 && \
sleep 1 &
# if HOME pressed, go into diagnosis mode directly
busybox script -c "timeout -t 3 keyscan" -f -q ${KEY_DETECTION_TMPF}
grep -Fq "HOME" ${KEY_DETECTION_TMPF}
if [ $? -eq 0 ]
then
rm ${KEY_DETECTION_TMPF}
epd_fb_test gray GC16 PART 10 0 50 50 150 250
initctl start diag
exit 0
fi
# if POWER pressed, cancel and remove update
grep -Fq "POWER" ${KEY_DETECTION_TMPF}
if [ $? -eq 0 ]
then
rm ${KEY_DETECTION_TMPF}
mkdir ${DDAT_MOUNT_PATH}
mount /dev/mmcblk0p16 ${DDAT_MOUNT_PATH}
change_boot_mode.sh normal
rm -rf ${END_USER_UPDATER_PKG}
local_reboot 1
umount ${DDAT_MOUNT_PATH}
fi
rm ${KEY_DETECTION_TMPF}
#########################
# End User Updater check
#########################
mkdir ${DDAT_MOUNT_PATH}
mount /dev/mmcblk0p16 ${DDAT_MOUNT_PATH}
if [ -f ${END_USER_UPDATER_PKG} ]
then
rawdata --get_dump=sig_key > /tmp/sig.key
rawdata --get_dump=dec_key > /tmp/dec.key
start_eufwupdater.sh ${END_USER_UPDATER_PKG} /tmp /tmp/sig.key /tmp/dec.key
ret=$?
if [ $ret -eq 0 ]
then
# remove pkg, change normal boot and reboot
change_boot_mode.sh normal
rm -rf ${END_USER_UPDATER_PKG}
local_reboot 1
# elif [ $ret -eq 1 ]
# then
# # remain pkg, keep boot mode and shutdown
# local_reboot 0
else
# remove pkg, change normal boot and shutdown
change_boot_mode.sh normal
rm -rf ${END_USER_UPDATER_PKG}
local_reboot 0
fi
fi
umount ${DDAT_MOUNT_PATH}
#########################
# Diag check
#########################
initctl start diag
exit 0