For the Vista/XP users asking for a linux user to do something, grab a live CD and boot a distro
Hehe... Thanks, dunno why I forgot about that. Doing so now.
For the Vista/XP users asking for a linux user to do something, grab a live CD and boot a distro
I think the biggest goal here is exactly what you said, cracking the flash process so we can put our OWN android on it (not googles locked down version). I also think that even though it is open source, we havent gotten into it yet, right? That is where the fun is at, doing something that so far seems undoable. I know new phones come out all the time and ppl say "oooh, they put this super cool new uncrackable bootloader on it" and at the same time someone is uploading a method to crack it. When I finally get my g1 (or g2 lol) I want to be able to do whatever I want on it. I want root (not always, but when I want it, I should be able to get it) and I want to be able to run most of the linux commands that were included (busybox type crap, but better than nothing) if I want to. This is the fun of Android (and linux), more power and more use. Google has kept those from us and instead gave us merely the stability of linux.
I am playing with boot.img and radio.img. I am trying to extract them, but have had no luck so far. They are not like a normal initrd.img file. It isnt gzip'd and you cant flat out extract it with cpio.
the boot.img contains two gzip's and some small arm code to extract them.
the radio.img is just like any other qualcomm radio, same partitions. signed in the same way as other htc's
as for update.zip, the person who said we need private key was correct - either that or exploit somehow, which isn't easy. the public key is either in recovery image or in the rsa file, I didn't look yet.
oh, and third option is replace recovery image or the htc spl in flash with patched one, but you will want root access and a lot more to do that.
the boot.img contains two gzip's and some small arm code to extract them.
oh, and third option is replace recovery image or the htc spl in flash with patched one, but you will want root access and a lot more to do that.
How were you able to do this? Instructions or a link to instructions will apreciated.
This is true. However we still don't know how to activate that recovery funtion yet.
In the recovery console, the first thing it tries to do is load instructions (I'm assming) from sdcard:/cache/recovery/command. We need to know if it just needs instructions or what.
When you power on you phone holding the camera button, the bootloader looks for an image. Don't know where though.
Sorry for possible ignorance, I've just stumbled upon this thread and haven't read all fifteen pages of it. However -- what do you think you need the private key for? You should be able to resign the .zip using the Jar Signer (as that is what it is originally set up with).
Though your right we need to figure out exactly what the img files contain and find a way to patch them for root acces!
43 #if REQUIRE_SIGNATURE
44 unsigned key_engineering[2 + 64 + 64] = {
45 64,0x5b022317,-60769447,648742897,-13657530,585562035,591851935,
46 454860199,-1809625305,1868200692,-155297008,-1688439840,-1333607631,
47 -483027189,-2051438457,1030069735,819944365,2133377257,-1978924214,
48 2109678622,1974978919,-1811463608,765849268,1984092281,921245328,
49 -1055062768,1487475997,1209618652,871985152,-611178965,-2057018571,
50 335641539,-1196119550,1550548229,-356223887,1909799623,1281016007,
51 957001635,1005656532,-1027634024,-1576447610,-1917246637,589192795,
52 -1137386186,-1958135372,1933245070,64958951,-1820428322,-1577697840,
53 1824253519,555306239,-1588272058,-1925773018,1205934271,-836584444,
54 -1140961670,-185198349,1293769947,37045923,1516796974,-297288651,
55 651582073,-1337054592,-543971216,-1706823885,-1040652818,-594113104,
56 260093481,-1277656496,56493468,1577037283,773995876,244894933,
57 -2075797967,783894843,880611008,-1433369702,380946504,-2081431477,
58 1377832804,2089455451,-410001201,1245307237,-1228170341,-2062569137,
59 -1327614308,-1671042654,1242248660,-418803721,40890010,-1806767460,
60 -1468529145,-1058158532,1243817302,-527795003,175453645,-210650325,
61 -827053868,-571422860,886300657,2129677324,846504590,-1413102805,
62 -1287448511,-1991140134,56194155,1375685594,-129884114,1393568535,
63 -1098719620,-935279550,1717137954,-1782544741,272581921,-669183778,
64 584824755,1434974827,-1122387971,-810584927,-2147338547,-937541680,
65 -313561073,5506366,-1594059648,-1744451574,1896015834,1496367069,
66 1742853908,508461291,1905056764
67 };
68 #endif
Thats exactly what I am doing
Im going to try with another microsd card I have.
And yes, I have verified that the file is correct. It has the same md5 sum was posted earlier and I have redownloaded it twice.