Is it possible to take the files out from the update package, then repackage it and sign it with our own certificate? That's unless something's linked to individual devices.
No, it would check to see who the CA of the cert is. Unless the cert is issued by a trusted CA, wouldn't work. It's like going to the bank and using a home made ID and Credit Card.Is it possible to take the files out from the update package, then repackage it and sign it with our own certificate? That's unless something's linked to individual devices.
What, that doesn't work for you?... It's like going to the bank and using a home made ID and Credit Card.
HahaWhat, that doesn't work for you?
Lol.What, that doesn't work for you?
Man, you posted you've been able to root the axon 7 did you?I wish I understood more than half of what you guys are saying.
Is the same as yours, i don't have my laptop with me so i can try side loading the update, I'll try when i get back home.@DrakenFX
can you verify if the zip file on the sdcard is same as the one you downloaded. The on i got has CRC32 f031d661 and MD5 hash bab1e10494a82d6f2c9f172439b3b8b3 size is 61391631.
More i read about this it ends up being a bad file. Nexus forums were littered with OTAs failing with that error. I had this in the past where file woul be corrupted if i transfered it from the PC to Phone
Also give the ADB sideload a try, it should work since this looks like a standard android recovery with Mi logo
Link for reference: http://www.androidcentral.com/how-manually-upgrade-your-nexus#slide5
Look for an RSA signature embedded in the .ZIP file comment given
// the path to the zip. Verify it matches one of the given public
// keys.
I did not. Maybe you're thinking about me posting in another thread in following up with @tenfar (who said he had root for the Chinese variant)?Man, you posted you've been able to root the axon 7 did you?
This is quite a different file. Did you notice that the first file (the zip one) had a system folder with build.prop the display for A2016U, which is Axon Pro. I just noticed that
It will not pass the signature check since the certificate is not already stored on the device. Only ZTE and maybe Qualcomm dev keys would work, otherwise Secure Boot would have no purposeDid anyone try the zip I uploaded earlier?
Just checked and this file has the proper footer, bytes 3 and 4 from the end should be FF, which they are and that's what the footer error checks
Did anyone try the zip I uploaded earlier?
I did not. Maybe you're thinking about me posting in another thread in following up with @tenfar (who said he had root for the Chinese variant)?
Found what throws out that error
https://github.com/CyanogenMod/android_bootable_recovery/blob/cm-13.0/verifier.cpp - start at line 108
My CPP is rusty, but let's see what is used in footer check
@Jose-MXL
HELLZ YEAH!!! I knew it when i saw the new file footer, I almost PMd you. Where did the first file come from @jkuczera?
Is this file modified from ones that people received as OTAs, or is it the same file that everyone is getting?
There was something odd about the OP file. It had a file which was not in the manifest and the footer on the zip was invalid. This one is proper (full sig file). This would not be possible to replicate without the private signing key. There might be a tweak in the fastboot code for device specific check, but everything has been so vanilla so far, I am positive it will workIs this file modified from ones that people received as OTAs, or is it the same file that everyone is getting?
@DrakenFX, did you try unlocking the bootloader then? Just flashing the update wouldn't necessarily do that part as well.