Arcore / playground patcher flashing cause bootloop - Asus Zenfone Max M2 Questions & Answers

Hi there.
I'm facing issue with arcore patcher.
Every time I flash arcore module in magisk it succeed but on reboot the phone doesn't turn on and go to boot loop mode. Tried with every version
Nothing seems to help.
Please let me know if anyone used it and how.
Here is my installation log :
HTML:
- Copying zip to temp directory
- Installing ARCore_Playground_Patcher-v2.1(9).zip
- Device is system-as-root
Archive: /data/user/0/com.CLr.fVM0n1.F.yun/cache/flash/install.zip
inflating: module.prop
***************************
ARCore/Playground Patcher
***************************
*******************
Powered by Magisk
*******************
Archive: /data/user/0/com.CLr.fVM0n1.F.yun/cache/flash/install.zip
inflating: customize.sh
- Extracting module files
Archive: /data/user/0/com.CLr.fVM0n1.F.yun/cache/flash/install.zip
inflating: .gitattributes
inflating: .gitignore
inflating: LICENSE
inflating: README.md
creating: common/
inflating: common/post-fs-data.sh
inflating: common/sepolicy.rule
inflating: common/sepolicy.sh
inflating: common/service.sh
inflating: common/system.prop
inflating: common/unity_install.sh
inflating: common/unity_uninstall.sh
inflating: common/unity_upgrade.sh
inflating: customize.sh
inflating: module.prop
creating: system/
creating: system/vendor/
creating: system/vendor/etc/
creating: system/vendor/etc/permissions/
inflating: system/vendor/etc/permissions/android.hardware.camera.ar.xml
inflating: uninstall.sh
- MagiskSU detected
- Installing
Installing for arm64 SDK 28 device...
- Installing custom sepolicy patch
Segmentation fault
- Setting Permissions
*******************************************
* Unity by ahrion & zackptg5 @ XDA *
*******************************************

Related

[Tool] One Click Root for ZVA

UPDATE New tool for ZVA and ZVB located here
Now with less reboots and more reliable!!!
I have figured it out. Just needed to play with the old One Click Root from ZV8 I have updated it and am posting it below. Enjoy!
Note: This is the script version not the GUI version.
This is for the sprint LG G3 (ls990) only and might brick other devices you have been warned. However it can be easily adapted to any other model of LG G3.
First install the LG drivers if you haven't already. They can be found here
Enable USB debugging under developer options.
Then just extract the folder in the zip file to anywhere on your computer (probably your desktop) and run LG Root Script.bat
Follow the on screen instructions. There will be several reboots. More are needed for this method.
After a minute or two you will have root!
Original author's post is here here
Update: Forgot some commands and found some typos in the first couple of trys but it *should* work 100% now.
This is for the sprint LG G3 (ls990) only and might brick other devices you have been warned.
UPDATE for those having issues with DLL files download and install this
UPDATE New tool for ZVA and ZVB located here
COMMANDS if you want to do this without the script. Try the script first as these commands could brick things if you make a typo.
With phone on and adb usb debugging enabled do:
Code:
adb.exe push busybox /data/local/tmp/ && adb.exe push lg_root.sh /data/local/tmp/ && adb.exe push UPDATE-SuperSU-v2.46.zip /data/local/tmp/ && adb.exe push laf.bin /data/local/tmp/ && adb.exe push install_laf.sh /data/local/tmp/
Reboot to download mode and run:
Code:
Send_Command.exe \\.\COM41
When you see the # do:
Code:
dd if=/dev/block/platform/msm_sdcc.1/by-name/laf of=/data/local/tmp/lafBak.bin
dd if=/data/local/tmp/laf.bin of=/dev/block/platform/msm_sdcc.1/by-name/laf
chmod 755 /data/local/tmp/lafBak.bin
sh /data/local/tmp/install_laf.sh
LEAVE
It should say something about rebooting. Reboot your phone when you see this. When back in android do:
Code:
adb.exe pull /data/local/tmp/lafBak.bin
Reboot back into download mode then do:
Code:
Send_Command.exe \\.\COM41
When you see the # do:
Code:
sh /data/local/tmp/lg_root.sh dummy 1 /data/local/tmp/UPDATE-SuperSU-v2.46.zip /data/local/tmp/busybox
LEAVE
You should now have root.
If the script works correctly this is what you should see something similar to the following on your PC.
Code:
---------------------------------
LG Root - One click script
Written by avicohh
Updated by l33tlinuxh4x0r
For Sprint ZVA update Only
---------------------------------
Please make sure that USB debugging is enabled, and LG drivers are installed.
Starting adb server..
Waiting for device..
Device detected!
Pushing files..
2613 KB/s (1048328 bytes in 0.391s)
1228 KB/s (9393 bytes in 0.007s)
3810 KB/s (4017098 bytes in 1.029s)
3474 KB/s (17825792 bytes in 5.010s)
0 KB/s (253 bytes in 1.000s)
Rebooting..
Looking for LG serial port..
Phone found at COM41!
Rebooting into Download mode..
Waiting for device..
Phone found at COM41!
Installing LAF this might take a minute or two
Follow instructions carefully!
Author : blog.lvu.kr
SPECIAL COMMAND : ENTER, LEAVE
#Please press Ctrl+C, and then type N and ENTER to reboot.?
#^CTerminate batch job (Y/N)? n
Rebooting..
Looking for LG serial port..
Phone found at COM41!
Rebooting into Download mode..
Waiting for device..
Phone found at COM41!
Rooting phone..
If you don't see the SuperSu installer script runs within about a minute,
then the root failed.
Author : blog.lvu.kr
SPECIAL COMMAND : ENTER, LEAVE
#ui_print *****************
ui_print SuperSU installer
ui_print *****************
ui_print - Mounting /system, /data and rootfs
ui_print - Extracting files
Archive: /data/local/tmp/UPDATE-SuperSU-v2.46.zip
inflating: META-INF/MANIFEST.MF
inflating: META-INF/CERT.SF
inflating: META-INF/CERT.RSA
inflating: META-INF/com/google/android/update-binary
inflating: META-INF/com/google/android/updater-script
inflating: arm/chattr
inflating: arm/chattr.pie
inflating: arm/libsupol.so
inflating: arm/su
inflating: arm/supolicy
inflating: arm64/libsupol.so
inflating: arm64/su
inflating: arm64/supolicy
inflating: armv7/chattr.pie
inflating: armv7/libsupol.so
inflating: armv7/su
inflating: armv7/supolicy
inflating: common/99SuperSUDaemon
inflating: common/Superuser.apk
inflating: common/install-recovery.sh
inflating: mips/chattr.pie
inflating: mips/libsupol.so
inflating: mips/su
inflating: mips/supolicy
inflating: mips64/libsupol.so
inflating: mips64/su
inflating: mips64/supolicy
inflating: x64/libsupol.so
inflating: x64/su
inflating: x64/supolicy
inflating: x86/chattr
inflating: x86/chattr.pie
inflating: x86/libsupol.so
inflating: x86/su
inflating: x86/supolicy
ui_print - Disabling OTA survival
ui_print - Removing old files
ui_print - Placing files
ui_print - Post-installation script
ui_print - Unmounting /system and /data
ui_print - Done !
Please press Ctrl+C, and then type N and ENTER to reboot.
#^CTerminate batch job (Y/N)? n
Rebooting..
Done!
Press any key to exit..
---------------------------------
LG Root - One click script
Written by avicohh
Updated by l33tlinuxh4x0r
Now with support for ZVA
---------------------------------
Please make sure that USB debugging is enabled, and LG drivers are installed.
Starting adb server..
Waiting for device..
Device detected!
Pushing files..
5096 KB/s (1048328 bytes in 0.200s)
1789 KB/s (9393 bytes in 0.005s)
5230 KB/s (4017098 bytes in 0.749s)
Rebooting..
Looking for LG serial port..
Phone found at COM4!
Rebooting into Download mode..
Waiting for device..
Phone found at COM4!
Rooting phone..
If you don't see the SuperSu installer script runs within about a minute,
then the root failed.
Author : blog.lvu.kr
SPECIAL COMMAND : ENTER, LEAVE
######
Rebooting..
Done!
Press any key to exit..
Click to expand...
Click to collapse
And from 10 minutes standing in downloadmode
S3V3N said:
And from 10 minutes standing in downloadmode
Click to expand...
Click to collapse
Looks like it worked. Am I correct?
Should the phone be put into download mode first then connected to the computer through USB? I'm sorry i'm new to LG. I think what you have don so far is great and I just need a little help with the step by step. Absolutely positively will donate when after I figure out this process.
Stompy86 said:
Should the phone be put into download mode first then connected to the computer through USB? I'm sorry i'm new to LG. I think what you have don so far is great and I just need a little help with the step by step. Absolutely positively will donate when after I figure out this process.
Click to expand...
Click to collapse
No, you need to have the phone on with USB debugging enabled(adb) first. That is how it sends the files to your phone. Once the files are on your phone it will ask you to reboot to download mode and it will install them.
Settings > About Phone > Software Info > Tap Build number about 10-15 times. That will enable developer options. Go to settings > Developer options, press ok and check the box USB Debugging. Then plug your phone into your computer. Change MTP mode to charge only. You will get a message about a computer RSA key. Check always allow this computer and press ok. Now run the script in the zip file and it should walk you through the rest.
Stompy86 said:
Should the phone be put into download mode first then connected to the computer through USB? I'm sorry i'm new to LG. I think what you have don so far is great and I just need a little help with the step by step. Absolutely positively will donate when after I figure out this process.
Click to expand...
Click to collapse
Did you get it working?
l33tlinuxh4x0r said:
No, you need to have the phone on with USB debugging enabled(adb) first. That is how it sends the files to your phone. Once the files are on your phone it will ask you to reboot to download mode and it will install them.
Settings > About Phone > Software Info > Tap Build number about 10-15 times. That will enable developer options. Go to settings > Developer options, press ok and check the box USB Debugging. Then plug your phone into your computer. Change MTP mode to charge only. You will get a message about a computer RSA key. Check always allow this computer and press ok. Now run the script in the zip file and it should walk you through the rest.
Click to expand...
Click to collapse
I turned on the USB debugging I clicked always allow this computer and i switched it to charge only. I go to run the script and its stuck on waiting for device... I tried different USB ports, I restarted both the phone and the computer and it is still stuck on waiting for device.
Stompy86 said:
I turned on the USB debugging I clicked always allow this computer and i switched it to charge only. I go to run the script and its stuck on waiting for device... I tried different USB ports, I restarted both the phone and the computer and it is still stuck on waiting for device.
Click to expand...
Click to collapse
Did you install the LG USB drivers? Also once you do that you will need to check your phone and allow your computer to connect to it by checking always allow and pressing ok.
First install the LG drivers if you haven't already. They can be found here
Weird. So what exactly did you do? I take it that you installed the drivers extracted the zip and double clicked on the LG Root Script.bat. What has it said so far? It waits for the device several times. You might need to unplug the USB cable turn off the phone and hold volume up and plug in the USB cable while continuing to hold volume up. That will make the phone enter download mode. It should then continue.
@l33tlinuxh4x0r maybe you can shed some light
Ive been at this for about an hour and a half now, trying it different ways with both versions of the script, and the result is always the same; I get to this point in the command prompt:
"ui_print - Extracting files"
but it skips this part entirely :
"Archive: /data/local/tmp/UPDATE-SuperSU-v2.46.zip
inflating: META-INF/MANIFEST.MF
inflating: META-INF/CERT.SF
inflating: META-INF/CERT.RSA
inflating: META-INF/com/google/android/update-binary
inflating: META-INF/com/google/android/updater-script
inflating: arm/chattr
inflating: arm/chattr.pie
inflating: arm/libsupol.so
inflating: arm/su
inflating: arm/supolicy
inflating: arm64/libsupol.so
inflating: arm64/su
inflating: arm64/supolicy
inflating: armv7/chattr.pie
inflating: armv7/libsupol.so
inflating: armv7/su
inflating: armv7/supolicy
inflating: common/99SuperSUDaemon
inflating: common/Superuser.apk
inflating: common/install-recovery.sh
inflating: mips/chattr.pie
inflating: mips/libsupol.so
inflating: mips/su
inflating: mips/supolicy
inflating: mips64/libsupol.so
inflating: mips64/su
inflating: mips64/supolicy
inflating: x64/libsupol.so
inflating: x64/su
inflating: x64/supolicy
inflating: x86/chattr
inflating: x86/chattr.pie
inflating: x86/libsupol.so
inflating: x86/su
inflating: x86/supolicy"
and goes straight to this:
"ui_print - Disabling OTA survival
ui_print - Removing old files
ui_print - Placing files
ui_print - Post-installation script
ui_print - Unmounting /system and /data
ui_print - Done !
Please press Ctrl+C, and then type N and ENTER to reboot.
#^CTerminate batch job (Y/N)? n
Rebooting..
Done!
Press any key to exit.."
and when it reboots nothing is changed. I have no clue what I'm doing wrong but any help would be greatly appreciated
i tried the script, it works as said, rebooting detecting com, running the script and when it sais to press CTRL+C its doingit, and rebooting, all works as stated
but the phone is not rooted, and supersu is not installed
its same as the guy before me, it skips the proccess of installing the SUPERSU archive
optiplex2012 said:
i tried the script, it works as said, rebooting detecting com, running the script and when it sais to press CTRL+C its doingit, and rebooting, all works as stated
but the phone is not rooted, and supersu is not installed
its same as the guy before me, it skips the proccess of installing the SUPERSU archive
Click to expand...
Click to collapse
When it says "looking for lg serial port" in the script, does it say "serial port not found" and make you manually boot in to download mode?
same here..
tried 7 times with v1.2 v1. gd with GUI one but only below steps
"ui_print - Disabling OTA survival
ui_print - Removing old files
ui_print - Placing files
ui_print - Post-installation script
ui_print - Unmounting /system and /data
ui_print - Done !
than nothing tried on ZV4 and works perfectly
golpeen420 said:
When it says "looking for lg serial port" in the script, does it say "serial port not found" and make you manually boot in to download mode?
Click to expand...
Click to collapse
nope, it finds the com port 4 and cotinues, booting the g4 into download mode
but than in the script it just skips the part where it suppose to run the su.zip archive
Yeah went back to ZV8 and tried this and it worked, still no luck with ZVA
This only works on the LG G3 and other phones that were supported by the older method. I was hoping that it would work on the LG G4 but no dice.
tldr, This does NOT work on the LG G4
golpeen420 said:
Yeah went back to ZV8 and tried this and it worked, still no luck with ZVA
Click to expand...
Click to collapse
You are on a LG G3 ls990 and this didn't work with ZVA? That is weird. It worked on my phone. Is else with a G3 having issues? Maybe it is the version of windows that it is being run on. I remember that I used to have issues with the old script and had to run the following command manually. Note you might have to change the com port number.
Code:
Send_Command.exe \\.\COM4 < installRoot
l33tlinuxh4x0r said:
You are on a LG G3 ls990 and this didn't work with ZVA? That is weird. It worked on my phone. Is else with a G3 having issues? Maybe it is the version of windows that it is being run on. I remember that I used to have issues with the old script and had to run the following command manually. Note you might have to change the com port number.
Code:
Send_Command.exe \\.\COM4 < installRoot
Click to expand...
Click to collapse
I am on LS990 stock ZVA. I've changed the com port like 5 times, 5 different numbers, at what point should I enter that command?
golpeen420 said:
I am on LS990 stock ZVA. I've changed the com port like 5 times, 5 different numbers, at what point should I enter that command?
Click to expand...
Click to collapse
You enter the command when the phone is in download mode. You can find the com port number in Device Manager in windows. It is usually the higher of the ports. It is never COM1 and LPT1
is it possible to install a custom recovery on ZVA?

Kali NetHunter - Experimental flash at own risk

Hey guys, I've ported Kali NetHunter to the Note 5 (the unlockable variants that I know of) pretty much just to see if it's feasible for us to support it.
I don't own a Note 5. I only own a Note 3.
@ Note 5: Your lack of IR, removable battery, and microSD slot makes your existence rather insulting.
I have modified the kernel using a selective merge of the korean variant code on top of the other variants (it was most up to date on OSRC) and set up variant differential compiling for the kernel. ex. one maintained config is able to compile to 5 different zImages, 1 for each variant of the phone.
You can see my work on noblelte kernel here: https://github.com/jcadduono/nethunter_kernel_noblelte/commits/touchwiz-5.1
For the Kali NetHunter installer, see: https://github.com/jcadduono/kali-nethunter/tree/experimental
Binaries used in NetHunter tools, see: https://github.com/jcadduono/nethunter-installer-tools
I'll leave the Kali package sources up to you to find.
Now, before I go making a release, I need to know if this actually works!
It's based entirely on the experimental 3.0.1+ branch of NetHunter, which is nearing release status anyway. It comes with Kali Rolling rather than Sana. (the move to Rolling is inevitable!)
The kernel has the following changes:
SELinux forced permissive
Samsung unfriendly features disabled (root protection and trustzone)
F2FS updated to Jaeguek Kim's latest kernel.org f2fs-stable sources (not added to fstab at the moment, sorry)
UKSM Ultra Kernel Same-page Merging KSM support
Updated and enabled USB (OTG) Atheros, Ralink, and Realtek WiFi drivers
Simple IO (SIO) scheduler as default IO scheduler
USB HID gadget keyboard support
USB MIDI device gadget support
DriveDroid compatibility
mac80211 packet injection support
Additional drivers built in for the full Kali NetHunter experience
STEP 1 - PUTTING YOUR DEVICE IN THE HANDS OF A MADMAN
Back up your boot partition! Turn off encryption (I think? I'm not sure if encryption will break things or not)
You'll want to flash ONLY the NetHunter kernel for your Note 5 variant.
Kernel installer here: https://idlekernel.com/nethunter/noblelte/3.0.5-20160206-0254/kernel-only/
Be sure to grab a TWRP log using advanced -> copy log to sdcard after installing in case anything goes bad!
Having logs available is key to our success.
Did it boot? Move on to step 2!
Did it fail to boot? Post your TWRP log to a code block on this thread. Restore your boot backup.
STEP 2 - HOLY BOOTLOADERS, BATMAN, IT BOOTED!
Check settings -> about device -> kernel version
Does it have nethunter in it? If so, I might just be the coolest person in the world. Move on to step 3!
No nethunter in device version? Post your TWRP log!
STEP 3 - THE REST OF NETHUNTER
Back up your system and data partitions!
You can install the full version from here, including the chroot:
https://idlekernel.com/nethunter/noblelte/3.0.5-20160206-0254/
I can't imagine anything going wrong at this step.
Parsimonious reactions
Project still alive or fallen asleep?
I have found this accidentally searching for S7e kernel
Wow . anyone try this yet ?
siriom said:
Wow . anyone try this yet ?
Click to expand...
Click to collapse
I would if I knew exactly what it was?
I would love to give this a try. However, I'm not sure which kernel I need to flash as noted in step 1. I have a N920P.03 through Sprint. I'm guessing I need to use either the noblelte or nobleltespr (Sprint?).
I should note that I haven't rooted this phone yet but I absolutely would to acquire Nethunter for this device.
I've used other ROMs with older phones so I'm no stranger to the process involved. I was holding out for the Marshmallow to finally be pushed out OTA via Sprint but I'm not holding my breath. I'm curious if after successfully installing Nethunter if any of the native Android functionality is lost/broken.
Okay, so I went ahead and tried this. Unfortunately, my device has no joy with the kernel-nethunter-nobleltespr-lollipop-3.0.5-20160221-0251. I also tried the noblelet-lollipop kernel and it errored out specifying it's not a supported device.
Anyway, after successfully flashing the nobleltespr kernel my Note 5 just goes into a boot loop. Afterwards I have to flash a working kernel to get my device up again.
Here is the the relevant snippet from the TWRP log...
Code:
I:Set page: 'install'
I:Set page: 'flash_confirm'
I:Set page: 'flash_zip'
I:operation_start: 'Flashing'
Installing '/sdcard/Download/kernel-nethunter-nobleltespr-lollipop-3.0.5-20160221-0251.zip'...
Checking for MD5 file...
Skipping MD5 check: no MD5 file found
I:Zip does not contain SELinux file_contexts file in its root.
I:Legacy property environment initialized.
###################################################### NetHunter Kernel Installer
NetHunter kernel by jcadduono (version: 1.2)
/sbin/getprop
######################################################
Checking device compatibility...
Unpacking the installer, this may take a while...Archive: /sdcard/Download/kernel-nethunter-nobleltespr-lollipop-3.0.5-20160221-0251.zip
inflating: env.sh
inflating: Image
inflating: patch.d-env
inflating: boot-patcher.sh
inflating: patch.d/01-ramdisk-patch
inflating: patch.d/02-supersu
inflating: tools/lz4
inflating: tools/mkbootimg
inflating: tools/cleansystem.sh
inflating: tools/unpackbootimg
inflating: tools/busybox
inflating: system/lib/libsupol.so
inflating: system/etc/firmware/rt2561.bin
inflating: system/etc/firmware/rt2860.bin
inflating: system/etc/firmware/htc_9271.fw
inflating: system/etc/firmware/htc_7010.fw
inflating: system/etc/firmware/rt3070.bin
inflating: system/etc/firmware/ar9170-1.fw
inflating: system/etc/firmware/carl9170-1.fw
inflating: system/etc/firmware/rt73.bin
inflating: system/etc/firmware/ar9170-2.fw
inflating: system/etc/firmware/rt2870.bin
inflating: system/etc/firmware/rtlwifi/rtl8192cufw.bin
inflating: system/etc/firmware/rtlwifi/rtl8188efw.bin
inflating: system/etc/firmware/zd1211/zd1211_uph
inflating: system/etc/firmware/zd1211/zd1211b_uphm
inflating: system/etc/firmware/zd1211/zd1211b_uph
inflating: system/etc/firmware/zd1211/zd1211_ub
inflating: system/etc/firmware/zd1211/zd1211_uphr
inflating: system/etc/firmware/zd1211/zd1211b_ub
inflating: system/etc/firmware/zd1211/zd1211_uphm
inflating: system/etc/firmware/zd1211/zd1211b_uphr
inflating: system/etc/firmware/zd1211/zd1211b_ur
inflating: system/etc/firmware/zd1211/zd1211_ur
inflating: system/xbin/hid-keyboard
inflating: system/xbin/supolicy
inflating: ramdisk-patch/init.superuser.rc
inflating: ramdisk-patch/init.nethunter.rc
inflating: ramdisk-patch/sbin/media_profiles.xml
inflating: ramdisk-patch/sbin/busybox_nh
inflating: ramdisk-patch/sbin/hostapd
inflating: ramdisk-patch/sbin/dvbootscript.sh
inflating: ramdisk-patch/sbin/dvmediarevert
inflating: META-INF/com/google/android/update-binary
inflating: META-INF/com/google/android/updater-script
Installing busybox applets to /sbin
Freeing some space on /system
Copying firmware to /system/etc/firmware
Copying shared libraries and kernel modules to /system/lib
Installing /system/xbin binaries
Running boot image patcher...
- Found boot partition at: /dev/block/platform/15570000.ufs/by-name/BOOT- Dumping & unpacking original boot image...57344+0 records in
57344+0 records out
29360128 bytes (28.0MB) copied, 0.193961 seconds, 144.4MB/s
Android magic found at: 0
BOARD_KERNEL_CMDLINE
BOARD_KERNEL_BASE 10000000
BOARD_NAME SYSMAGIC000K
BOARD_PAGE_SIZE 2048
BOARD_KERNEL_OFFSET 00008000
BOARD_RAMDISK_OFFSET 01000000
BOARD_TAGS_OFFSET 00000100
BOARD_DT_SIZE 1658880
- Detected ramdisk compression format: gzip/sbin/gzip
13807 blocks
- Running ramdisk patching scripts...
- Executing: 01-ramdisk-patch
-- Patching the ramdisk for NetHunter & init.d...
- Executing: 02-supersu
-- Patching the sepolicy for SuperSU...supolicy v2.67 (ndk:armeabi-v7a) - Copyright (C) 2014-2016 - Chainfire
Patching policy [/tmp/nethunter/boot-patcher/ramdisk/sepolicy] --> [/tmp/nethunter/boot-patcher/ramdisk/sepolicy_new] ...
- Success
- Building new ramdisk...
- Found replacement kernel Image!- Found replacement ramdisk image!
- Backing up old boot image to /data/local/boot-backup.img...
- Writing new boot image to memory...54900+0 records in
54900+0 records out
28108800 bytes (26.8MB) copied, 0.130131 seconds, 206.0MB/s
Boot image patching completeI:Legacy property environment disabled.
Updating partition details...
I:mount -o bind '/data/media/0' '/sdcard' process ended with RC=0
I:Data backup size is 7331MB, free: 3090MB.
I:sending message to remove 65537
I:Message sent, remove storage ID: 65537
mtppipe remove storage 65537
I:Can't probe device /dev/block/sdd
I:Unable to mount '/usb-otg'
I:Actual block device: '/dev/block/sdd', current file system: 'vfat'
...done
I:mount -o bind '/data/media/0' '/sdcard' process ended with RC=0
I:Set page: 'flash_done'
I:operation_end - status=0
I:Set page: 'clear_vars'
I:Set page: 'install'
I:Set page: 'main'
I:Set page: 'clear_vars'
I:Set page: 'main2'
I:Set page: 'advanced'
I:Set page: 'confirm_action'
I:Set page: 'action_page'
I:operation_start: 'Copy Log'
I:Copying file /tmp/recovery.log to /data/media/0/recovery.log
Any information/help you could provide would be greatly appreciated.
So what is the nethunter ? I dig the github but dindt find spesific answer.
SM-N920C cihazımdan Tapatalk kullanılarak gönderildi
Ozgurce said:
So what is the nethunter ? I dig the github but dindt find spesific answer.
SM-N920C cihazımdan Tapatalk kullanılarak gönderildi
Click to expand...
Click to collapse
kali.org / kali-linux-nethunter
It's basically a Linux OS built around penetration testing that's been ported to Android. Only this isn't a full ROM. The Nethunter is applied over an existing ROM.
I tried. It errord, and I decided to reboot. It said kernel wasn't enforcing and wouldn't boot. Using sm-n920I.. Sorry I didn't get the log. Don't have much Internet left.
Hey guys, yeah a mod moved this over from somewhere else that I was looking for test people.
I have more builds available that probably at least boot, if anyone is willing to join #nethunter on freenode IRC and work with me to test them.
*** Marshmallow only
Try: https://idlekernel.com/nethunter/noblelte/3.0.5-20160317-1858/kernel-only/
If that succeeds, and you can boot, then flash:
https://idlekernel.com/nethunter/ni...f-kalifs-full-rolling-3.0.5-20160313-2342.zip
jcadduono said:
Hey guys, yeah a mod moved this over from somewhere else that I was looking for test people.
I have more builds available that probably at least boot, if anyone is willing to join #nethunter on freenode IRC and work with me to test them.
*** Marshmallow only
Try: https://idlekernel.com/nethunter/noblelte/3.0.5-20160317-1858/kernel-only/
If that succeeds, and you can boot, then flash:
https://idlekernel.com/nethunter/ni...f-kalifs-full-rolling-3.0.5-20160313-2342.zip
Click to expand...
Click to collapse
Downloading , i will report later
Thanks
-----------------------
I have reiver ROM ,
N920C
Flashing nobeltel gave me an error message that the device model is wrong at checking compatability!!
Andro Boy said:
Downloading , i will report later
Thanks
-----------------------
I have reiver ROM ,
N920C
Flashing nobeltel gave me an error message that the device model is wrong at checking compatability!!
Click to expand...
Click to collapse
Are you using noblelte marshmallow recovery?
https://idlekernel.com/twrp/noblelte/3.0.0-0-M/
Mine is failing as well.
I can't post links because my post count is too low but I'm using the Rom that can be found on this forum by searching for a thread "[ROM] Sprint Marshmallow N920PSPT2BPA2 Engineering Build" The ROM itself is pretty stable so far.
I'm using nobleltespr marshmallow recovery found under the directory you linked. I even tried the twrp-3.0.0-1-M recovery found elsewhere as well. The kernel flashing is failing but the reason isn't very obvious as the TWRP log doesn't really specify why it's failing. Here is a snippet from the log...
Code:
- Building new ramdisk...
-Found replacement kernel Image!
-Found replacement ramdisk Image!
-Found replacement device tree Image!
-Backing up old boot image to /data/local/boot-backup.img...
- Writing new boot image to memory...
[COLOR="Red"]Failed to patch boot image!
Updater process ended with ERROR: 1
Error installing zip '/sdcard/kernel-nethunter-nobleltespr-marshmallow-3.0.5-20160317-1858.zip[/COLOR]
Updating partition details...
...done
Formatting Cache using make_ext4fs...
Updating partition details...
...done
skubasteve said:
Mine is failing as well.
I can't post links because my post count is too low but I'm using the Rom that can be found on this forum by searching for a thread "[ROM] Sprint Marshmallow N920PSPT2BPA2 Engineering Build" The ROM itself is pretty stable so far.
I'm using nobleltespr marshmallow recovery found under the directory you linked. I even tried the twrp-3.0.0-1-M recovery found elsewhere as well. The kernel flashing is failing but the reason isn't very obvious as the TWRP log doesn't really specify why it's failing. Here is a snippet from the log...
Code:
- Building new ramdisk...
-Found replacement kernel Image!
-Found replacement ramdisk Image!
-Found replacement device tree Image!
-Backing up old boot image to /data/local/boot-backup.img...
- Writing new boot image to memory...
[COLOR="Red"]Failed to patch boot image!
Updater process ended with ERROR: 1
Error installing zip '/sdcard/kernel-nethunter-nobleltespr-marshmallow-3.0.5-20160317-1858.zip[/COLOR]
Updating partition details...
...done
Formatting Cache using make_ext4fs...
Updating partition details...
...done
Click to expand...
Click to collapse
That looks more like console output not recovery.log?
By the timing of the error, it looks like maybe your boot partition is too small to fit the new kernel?
Please get me /tmp/recovery.log
jcadduono said:
That looks more like console output not recovery.log?
By the timing of the error, it looks like maybe your boot partition is too small to fit the new kernel?
Please get me /tmp/recovery.log
Click to expand...
Click to collapse
My bad, that was the console output because for some reason I can't get MTP to work correctly in v3 of TWRP.
Code:
I:operation_start: 'Flashing'
Installing zip file '/sdcard/kernel-nethunter-nobleltespr-marshmallow-3.0.5-20160317-1858.zip'
Checking for MD5 file...
Skipping MD5 check: no MD5 file found
I:Zip does not contain SELinux file_contexts file in its root.
I:Legacy property environment initialized.
################################################## NetHunter Kernel Installer
Kernel: NetHunter kernel
Version: 1.2
Author: jcadduono
##################################################
/sbin/getprop
Checking device compatibility...
Unpacking the installer, this may take a while...Archive: /sdcard/kernel-nethunter-nobleltespr-marshmallow-3.0.5-20160317-1858.zip
inflating: env.sh
inflating: dtb.img
inflating: Image
inflating: patch.d-env
inflating: boot-patcher.sh
inflating: patch.d/01-ramdisk-patch
inflating: patch.d/04-no-force-encrypt
inflating: patch.d/06-set-props
inflating: patch.d/05-no-dm-verity
inflating: patch.d/03-f2fs-fstab
inflating: patch.d/02-supersu
inflating: tools/lz4
inflating: tools/mkbootimg
inflating: tools/cleansystem.sh
inflating: tools/unpackbootimg
inflating: tools/busybox
inflating: system/lib/libsupol.so
inflating: system/etc/firmware/rt2561.bin
inflating: system/etc/firmware/rt2860.bin
inflating: system/etc/firmware/htc_9271.fw
inflating: system/etc/firmware/htc_7010.fw
inflating: system/etc/firmware/rt3070.bin
inflating: system/etc/firmware/ar9170-1.fw
inflating: system/etc/firmware/carl9170-1.fw
inflating: system/etc/firmware/rt73.bin
inflating: system/etc/firmware/ar9170-2.fw
inflating: system/etc/firmware/rt2870.bin
inflating: system/etc/firmware/rtlwifi/rtl8192cufw.bin
inflating: system/etc/firmware/rtlwifi/rtl8188efw.bin
inflating: system/etc/firmware/zd1211/zd1211_uph
inflating: system/etc/firmware/zd1211/zd1211b_uphm
inflating: system/etc/firmware/zd1211/zd1211b_uph
inflating: system/etc/firmware/zd1211/zd1211_ub
inflating: system/etc/firmware/zd1211/zd1211_uphr
inflating: system/etc/firmware/zd1211/zd1211b_ub
inflating: system/etc/firmware/zd1211/zd1211_uphm
inflating: system/etc/firmware/zd1211/zd1211b_uphr
inflating: system/etc/firmware/zd1211/zd1211b_ur
inflating: system/etc/firmware/zd1211/zd1211_ur
inflating: system/xbin/hid-keyboard
inflating: system/xbin/supolicy
inflating: ramdisk-patch/init.superuser.rc
inflating: ramdisk-patch/init.nethunter.rc
inflating: ramdisk-patch/sbin/media_profiles.xml
inflating: ramdisk-patch/sbin/busybox_nh
inflating: ramdisk-patch/sbin/hostapd
inflating: ramdisk-patch/sbin/dvbootscript.sh
inflating: ramdisk-patch/sbin/dvmediarevert
inflating: META-INF/com/google/android/update-binary
inflating: META-INF/com/google/android/updater-script
Installing busybox applets to /sbin
Freeing some space on /system
Copying firmware to /system/etc/firmware
Copying shared libraries and kernel modules to /system/lib
Installing /system/xbin binaries
Running boot image patcher...
- Found boot partition at: /dev/block/platform/15570000.ufs/by-name/BOOT- Dumping & unpacking original boot image...
57344+0 records in
57344+0 records out
29360128 bytes (28.0MB) copied, 0.175635 seconds, 159.4MB/s
Android magic found at: 0
BOARD_KERNEL_CMDLINE
BOARD_KERNEL_BASE 10000000
BOARD_NAME SYSMAGIC000KE
BOARD_PAGE_SIZE 2048
BOARD_KERNEL_OFFSET 00008000
BOARD_RAMDISK_OFFSET 01000000
BOARD_TAGS_OFFSET 00000100
BOARD_DT_SIZE 1660928
/sbin/gzip
- Detected ramdisk compression format: gzip18873 blocks
- Running ramdisk patching scripts...- Executing: 01-ramdisk-patch
-- Patching the ramdisk for NetHunter & init.d...
- Executing: 02-supersu
-- Patching the sepolicy for SuperSU...supolicy v2.68 (ndk:armeabi-v7a) - Copyright (C) 2014-2016 - Chainfire
Patching policy [/tmp/nethunter/boot-patcher/ramdisk/sepolicy] --> [/tmp/nethunter/boot-patcher/ramdisk/sepolicy_new] ...
- Success
- Executing: 03-f2fs-fstab
-- Patching the fstab for f2fs support...-- Found fstab: fstab.goldfish
-- Added f2fs /system to fstab
-- Added f2fs /data to fstab
-- Added f2fs /cache to fstab-- Found fstab: fstab.ranchu
-- Added f2fs /system to fstab
-- Added f2fs /data to fstab
-- Added f2fs /cache to fstab-- Found fstab: fstab.samsungexynos7420
-- Added f2fs /system to fstab
-- Added f2fs /data to fstab
-- Added f2fs /cache to fstab-- Found fstab: fstab.samsungexynos7420.fwup
-- Added f2fs /system to fstab
-- Added f2fs /cache to fstab
- Executing: 04-no-force-encrypt
-- Disabling forced encryption in the fstab...-- Found fstab: fstab.goldfish
-- Found fstab: fstab.ranchu
-- Found fstab: fstab.samsungexynos7420
-- Found fstab: fstab.samsungexynos7420.fwup
- Executing: 05-no-dm-verity
-- Disabling dm-verity in the fstab...
-- Found fstab: fstab.goldfish
-- Found fstab: fstab.ranchu
-- Found fstab: fstab.samsungexynos7420
-- Found fstab: fstab.samsungexynos7420.fwup
- Executing: 06-set-props
-- Disabling TIMA...
-- Disabling KNOX secure storage...
-- Disabling HDCP enforcing...
- Building new ramdisk...
- Found replacement kernel Image!- Found replacement ramdisk image!
- Found replacement device tree image!
- Backing up old boot image to /data/local/boot-backup.img...
- Writing new boot image to memory...dd: writing '/dev/block/platform/15570000.ufs/by-name/BOOT': No space left on device
57345+0 records in
57344+0 records out
29360128 bytes (28.0MB) copied, 0.119978 seconds, 233.4MB/s
Failed to patch boot image!Updater process ended with ERROR: 1
I:Legacy property environment disabled.
Error installing zip file '/sdcard/kernel-nethunter-nobleltespr-marshmallow-3.0.5-20160317-1858.zip'
Updating partition details...
I:mount -o bind '/data/media/0' '/sdcard' process ended with RC=0
I:Data backup size is 5143MB, free: 10548MB.
I:sending message to remove 65537
I:Message sent, remove storage ID: 65537
mtppipe remove storage 65537
I:Unable to mount '/usbstorage'
I:Actual block device: '', current file system: 'vfat'
...done
I:mount -o bind '/data/media/0' '/sdcard' process ended with RC=0
I:Set page: 'flash_done'
I:operation_end - status=1
I:Set page: 'clear_vars'
I:Set page: 'install'
I:Set page: 'main'
I:Set page: 'clear_vars'
I:Set page: 'main2'
I:Set page: 'advanced'
I:Set page: 'confirm_action'
I:Set page: 'action_page'
I:operation_start: 'Copy Log'
I:Copying file /tmp/recovery.log to /data/media/0/recovery.log
skubasteve said:
My bad, that was the console output because for some reason I can't get MTP to work correctly in v3 of TWRP.
Click to expand...
Click to collapse
let me know if MTP works alright in https://idlekernel.com/twrp/noblelte/3.0.0-2-M/
also, looks like the ramdisk has too many things in it -- 28 MB?! are you sure that's stock boot image? can you upload your stock boot somewhere for me to take a look at?
looks like your ramdisk is 9 MB, combined that with 21.8 MB kernel and 1.6 MB dtb image...
yeah...
jcadduono said:
let me know if MTP works alright in https://idlekernel.com/twrp/noblelte/3.0.0-2-M/
also, looks like the ramdisk has too many things in it -- 28 MB?! are you sure that's stock boot image? can you upload your stock boot somewhere for me to take a look at?
looks like your ramdisk is 9 MB, combined that with 21.8 MB kernel and 1.6 MB dtb image...
yeah...
Click to expand...
Click to collapse
No luck with the updated version of TWRP with MTP. It's shows as enabled on the phone, but It doesn't register on my Windows PC at all. I've tried it with both USB debugging enabled and disabled (not really sure if that makes a difference or not since I'm not actually booting into the OS on the phone). It worked in the previous versions of TWRP, so I'm not sure.
Since I can't post links yet I'll obfuscate the filter...
Code:
https www androidfilehost com / ?fid=24438995911969590
That's where I got the rom. It's supposed to be stock according to the author of the thread. [ROM] Sprint Marshmallow N920PSPT2BPA2 Engineering Build
skubasteve said:
No luck with the updated version of TWRP with MTP. It's shows as enabled on the phone, but It doesn't register on my Windows PC at all. I've tried it with both USB debugging enabled and disabled (not really sure if that makes a difference or not since I'm not actually booting into the OS on the phone). It worked in the previous versions of TWRP, so I'm not sure.
Since I can't post links yet I'll obfuscate the filter...
Code:
https www androidfilehost com / ?fid=24438995911969590
That's where I got the rom. It's supposed to be stock according to the author of the thread. [ROM] Sprint Marshmallow N920PSPT2BPA2 Engineering Build
Click to expand...
Click to collapse
would have been much easier to just back up boot.img and upload for me lol, oh well, ill download the whole thing for now... i might have to make the installer remove some things from the ramdisk and hope the kernel works without it heh
ok can you try this instead: https://idlekernel.com/nethunter/noblelte/3.0.5-20160318-1649/
jcadduono said:
would have been much easier to just back up boot.img and upload for me lol, oh well, ill download the whole thing for now... i might have to make the installer remove some things from the ramdisk and hope the kernel works without it heh
Click to expand...
Click to collapse
My apologies. I've uploaded both the boot.img and a TWRP backup of my boot just in case you need that as well.
Boot.img from the ROM...
Code:
https goo gl / L6Wi42
and a TWRP backup of the boot on my device...
Code:
https goo gl / V6tOVG
skubasteve said:
My apologies. I've uploaded both the boot.img and a TWRP backup of my boot just in case you need that as well.
Boot.img from the ROM...
Code:
https goo gl / L6Wi42
and a TWRP backup of the boot on my device...
Code:
https goo gl / V6tOVG
Click to expand...
Click to collapse
thanks, any luck with the new one i linked above? recovery.log too please
( https://idlekernel.com/nethunter/noblelte/3.0.5-20160318-1649/ )
i dropped tmo so tmo users just use can
so...
N920T/N920W8: nobleltecan
N920C/N920CD/N920I: noblelte
N920P/N920R4: nobleltespr
N920K/N920L/N920S: nobleltekor

[TOOL][28-NOV-2017]Universal HTC RUU/ROM Decryption Tool 3.6.8

Welcome to the Universal HTC RUU Decryption and Extraction Tool
*** by nkk71 and Captain_Throwback ***
this thread is a continuation of Captain_Throwback's A9 decryption thread​
Disclaimer
You use this tool and the files produced by it at your own discretion and risk. Though the tool in itself is harmless as it only decrypts RUUs, the files produced by it, if wrongfully flashed on a device, could lead to damage.
We are not responsible for any wrongfully created or flashed packages produced by the output of this tool.
Foreword
First off, we want to thank the great work done by the fantastic devs here on XDA, which has allowed us to put this together.
The credit goes to them for bringing us the tools to make all this possible.
Introduction
HTC's RUUs (Rom Update Utility) whether as a .EXE or a .ZIP come in various formats, and are usually encrypted, so access to the files within is "restricted".​​The Decryption Tool will decrypt and extract these RUUs, and give you access to the files therein. It will also "assemble" a proper system.img from the various split system files.​​HTC often changes their RUU formats and decryption keys, and this tool is designed to account for the various formats we've come to see, so far. Please remember this is a Universal Tool (trying to take many variables into account) and as such is a tool under continued development, should we or you come across bugs or new RUU formats, please follow the proper instructions on how to report them.​​
Features
​The tool will decrypt and extract a RUU.EXE or ROM.ZIP, and create:​
a workable system.img + boot.img (in OUT/system)
system.img
boot.img
(needed by ROM developers)
.
.
as well as the remainder of the files (in OUT/firmware), such as
firmware
preinstalled apps
etc.
(needed to create firmware packages)
​​The tool will use the following sequence to try to find a suitable decryption key (rearranged as of version 3.1.0, since bruutveal is usually considerably slower than a keyfile test):​
User provided keyfile.bin
User provided --device flag
Known keys (stored in the keyfiles folder)
All ruuveal built-in keys
User provided hboot or hosd
Attempt force extraction of hboot or hosd
If no user provided file is supplied, and the above steps fail; then you will have to provide an hboot or hosd, which you can usually easily extract from a firmware.zip inside the appropriate OTA.zip (those are usually signed but not encrypted, so extraction of hboot/hosd should be easy)​​
Installation instructions
​Download the appropriate zip package for your operating system, and extract the files to the folder of your choice, but keep the folder structure intact, it should be:​​Linux​
Code:
-rwxrwxr-x 1 nkk71 nkk71 1702627 May 20 15:12 RUU_Decrypt_Tool[/INDENT]
[INDENT]drwxrwxr-x 4 nkk71 nkk71 4096 May 17 19:02 bin[/INDENT]
[INDENT]drwxrwxr-x 3 nkk71 nkk71 4096 May 11 13:44 keyfiles
​Windows​
Code:
20/05/2016 15:24 10,557,725 RUU_Decrypt_Tool.exe[/INDENT]
[INDENT]24/01/2016 13:27 3,406,908 cygwin1.dll[/INDENT]
[INDENT]17/05/2016 15:47 <DIR> bin[/INDENT]
[INDENT]18/05/2016 11:15 <DIR> keyfiles
The bin and keyfiles folders, have to be in the same folder as the main binary, as shown above.​​​​Android Magisk Module​Please refer to Captain_Throwback's post.​​
Using the tool
​Free disk space info​At least 5GB of available disk space (but 10GB is more realistic for an HTC One M8 or higher RUU.EXE) (ROMs are big)!​​The good news is that you can have the program and it's subfolders in one place, but the decryption and extraction, will take place where the actual RUU file is located.​For example, I have the tool and it's subfolders on my desktop, but the RUU.EXE is on an external drive:​
Code:
[/INDENT]
[INDENT]C:Usersnkk71DesktopHTC_RUU_Decrypt_Tool_v3.0.0>dir[/INDENT]
[INDENT]20/05/2016 17:10 <DIR> .[/INDENT]
[INDENT]20/05/2016 17:10 <DIR> ..[/INDENT]
[INDENT]17/05/2016 15:47 <DIR> bin[/INDENT]
[INDENT]24/01/2016 13:27 3,406,908 cygwin1.dll[/INDENT]
[INDENT]20/05/2016 17:01 <DIR> keyfiles[/INDENT]
[INDENT]20/05/2016 15:24 10,557,725 RUU_Decrypt_Tool_3.0.0.exe[/INDENT]
[INDENT] 2 File(s) 13,964,633 bytes[/INDENT]
[INDENT] 4 Dir(s) 3,699,408,896 bytes free[/INDENT]
[INDENT][/INDENT]
[INDENT] [/INDENT]
[INDENT]C:Usersnkk71DesktopHTC_RUU_Decrypt_Tool_v3.0.0>dir I:testhima[/INDENT]
[INDENT]20/05/2016 17:11 <DIR> .[/INDENT]
[INDENT]20/05/2016 17:11 <DIR> ..[/INDENT]
[INDENT]28/02/2016 03:23 2,418,411,600 RUU_HIMA_UL_M60_SENSE70_TMUS_MR_TMOUS_3.39.531.7.exe[/INDENT]
[INDENT] 1 File(s) 2,418,411,600 bytes[/INDENT]
[INDENT] 2 Dir(s) 100,648,206,336 bytes free[/INDENT]
[INDENT][/INDENT]
[INDENT] [/INDENT]
[INDENT]C:Usersnkk71DesktopHTC_RUU_Decrypt_Tool_v3.0.0>[/INDENT]
[INDENT]RUU_Decrypt_Tool_3.0.0.exe I:testhimaRUU_HIMA_UL_M60_SENSE70_TMUS_MR_TMOUS_3.39.531.7.exe[/INDENT]
[INDENT][/INDENT]
[INDENT][/INDENT]
[INDENT]+++ Welcome to the HTC RUU Decryption Tool 3.0.0 +++[/INDENT]
[INDENT] by nkk71 and Captain_Throwback[/INDENT]
[INDENT][/INDENT]
[INDENT]RUU identified as Executable file[/INDENT]
[INDENT]...[/INDENT]
[INDENT]...[/INDENT]
[INDENT]...[/INDENT]
[INDENT]Finished: Successfully extracted zip files to[/INDENT]
[INDENT] 'I:/test/hima/OUT'[/INDENT]
[INDENT]
​​RUU_Decrypt_Tool Usage​This is a terminal / command prompt program, there is no GUI, so don't try to "double click" it.​
Code:
[/INDENT]
[INDENT][B]RUU_Decrypt_Tool [options] <RUUName: RUU.exe or ROM.zip> [keyfile/hboot/hosd][/B][/INDENT]
[INDENT][/INDENT]
[INDENT] If none of the required arguments are supplied a simple Yes/No interface will be presented.[/INDENT]
[INDENT][/INDENT]
[INDENT] Required arguments (and/or):[/INDENT]
[INDENT] -s, --system extract the system.img and boot.img (for ROM)[/INDENT]
[INDENT] -f, --firmware extract the firmware files[/INDENT]
[INDENT] -z, --sdruuzip copy and rename rom.zip for SD-Card flashing[/INDENT]
[INDENT] Note: this will create a duplicate if the input is already a rom.zip[/INDENT]
[INDENT][/INDENT]
[INDENT] Keyfile Updater arguments:[/INDENT]
[INDENT] -o, --offline disable down/upload of keyfiles[/INDENT]
[INDENT] --no-upload do not upload if a new keyfile is generated[/INDENT]
[INDENT] --sync-keyfiles sync entire keyfile folder (download & upload)[/INDENT]
[INDENT] when used without a RUU the tool will only synchronize the[/INDENT]
[INDENT] keyfiles, otherwise it will download new keyfiles before decrypting[/INDENT]
[INDENT] and upload only if a new keyfile is generated[/INDENT]
[INDENT][/INDENT]
[INDENT] Logging:[/INDENT]
[INDENT] -L, --log log all output to a txt file named[/INDENT]
[INDENT] 'RUU_Decrypt_LOG-{MID}_{MAINVER}.txt' in the OUT folder[/INDENT]
[INDENT][/INDENT]
[INDENT] Debugging Options (not usually needed):[/INDENT]
[INDENT] -k, --keepall keep all intermediary files[/INDENT]
[INDENT] -c, --slowcleanup do a 'slow cleanup', ie dont delete files once partially processed[/INDENT]
[INDENT] -P, --debuginfo print debug info (paths and exec)[/INDENT]
[INDENT][/INDENT]
[INDENT] Direct ruuveal support (needed for older devices):[/INDENT]
[INDENT] -d, --device DEVICE specify device (this is only needed for old unruu supported devices)[/INDENT]
[INDENT] please run ruuveal to see the list of DEVICEs supported[/INDENT]
[INDENT]
where​
<RUUName: RUU.exe or ROM.zip> is the file that you wish to decrypt
.
keyfile/hboot/hosd is an optional keyfile or hboot / hosd (depends on device) if it is not specified, the tool will go through the known keys to try and find a proper one. if it does not, it will inform the user that (s)he needs to provide one.
​As of version 3.6.0 RC1, the tool when called from the command line has to:​
Either include at lease one of the required arguments:
-s : system.img and boot.img
-f : firmware files
-z : rom.zip for SD-Card flashing
You can also combine them in the form of -sf for example to create both system.img and extract firmware files.
Or be run for keyfile synchronization only:
RUU_Decrypt_Tool --sync-keyfiles
If neither (1) nor (2) are used, the Tool will present the Y/N interface and any other flags will be disregarded.​​​The other flags should be self-explanatory.​​NOTE: If using the tool on Windows, you can simply drag & drop the desired exe or zip you want to decrypt onto the RUU_Decrypt_Tool.exe, and a command prompt will open to begin the process.​​
Downloads
AndroidFileHost​​
User Submitted Keyfiles
The Tool will automatically download any new keyfiles available before decryption, and will upload a new keyfile if one is generated.​​The download and/or upload of keyfiles is at the user's discretion. You will be prompted when using the Y/N interface, otherwise from the command line, the following options are available:​
Code:
-o, --offline disable down/upload of keyfiles[/INDENT]
[INDENT] --no-upload do not upload if a new keyfile is generated[/INDENT]
[INDENT] --sync-keyfiles sync entire keyfiles folder (download & upload)[/INDENT]
[INDENT]
​The default is to both download and upload, and I would recommend those options be used. The keyfiles are only 96 bytes so the transfer of files will be of no significance.​​
Example output
​
Linux (64bit) (I'm using Ubuntu 14.04.3) in post #3
Windows 10 (64bit) in post #4
they're too big to fit into even one post ​
Changelog in post #2
Credits and Thanks
@Captain_Throwback for his support, motivation, and overall helpfullness
@topjohnwu for Mac OS X port and magiskboot
twogood for unshield
@kmdm for unruu & ruuveal
@Flemmard for bruutveal
@osm0sis for Android Image Kitchen
@joeykrim for his original Decrypt RUU Thread
XDA:DevDB Information
Universal HTC RUU/ROM Decryption Tool, Tool/Utility for the Chef Central
Contributors
nkk71, Captain_Throwback
Source Code: https://github.com/nkk71/HTC-RUU-Decrypt-Tool
Version Information
Status: Stable
Current Stable Version: 3.6.8
Stable Release Date: 2017-11-28
Created 2016-05-20
Last Updated 2018-09-03
How to report bugs, issues and/or problems
Please use short easily readable statements
Include the
RUU Name (full filename)
the version number
the link to the thread (where applicable)
and the download link
Add the terminal output, please either encapsulate it in a hidden code section (similar to the example output in the first post), like this:
Code:
this is hidden code section
or use pastebin, hastebin, etc.
Changelog
Code:
28 November 2017 (version 3.6.8)
---------------------------------
* New: Keyfile folder integrity check (duplicate, empty, and
incorrectly sized keyfiles)
* [3.6.8] Keyfile folder integrity check during --sync-keyfiles
* Fix: keyfile_updater upload (ftp protocol issue), also
integrate libcurl into keyfile_updater to avoid external linkage
(no more need for libcurl.so / cygcurl.dll)
* Fix: "Force extracted" hosd (when the first zip is not
encrypted) and subsequent keyfile generation (thx @santod040)
* Fix: Allow magiskboot to segfault, during an attempt
at force extraction (see posts [URL="https://forum.xda-developers.com/showpost.php?p=74524361&postcount=339"]339[/URL] and [URL="https://forum.xda-developers.com/showpost.php?p=74524655&postcount=340"]340[/URL])
06 September 2017 (version 3.6.5)
---------------------------------
* Fix single sparse system.img RUUs
* Fix multiple rom_nn.zip RUU.EXEs, also extract and use android-info
and hboot/hosd from the preupdate zip for automatic keyfile
generation
* Disallow keyfile upload if download is disabled or failed
* Fix up/download of keyfiles when run with command line switches
* Improve error handling in keyfile_updater
21 July 2017 (version 3.6.0 RC1)
---------------------------------
[B]* Updated command line usage!! (Please see notes)[/B]
* Add arm and arm64 builds
* Add Windows 32bit build
* Add date/timestamp to logfile
* Add "Process took ..." to output
* Use magiskboot for hosd unpacking
* Fix empty folder "error" logging
07 June 2017 (version 3.5.2) RC2
---------------------------------
* Simple Yes/No options interface
* Automatically create a logfile
* Download and upload new keyfiles (thanks to Captain_Throwback
for hosting!!)
* Only check for boot.img or boot_*.img
* Wait for enter key to exit on Windows when not called
from the command prompt
29 September 2016 (version 3.1.0)
---------------------------------
* Rename OUT folder to include MID and mainversion
(nice when you're decrypting multiple RUUs)
* Support RUUs with multiple "systemimg" files
* Improve keyfinder performance
31 May 2016 (version 3.0.7)
---------------------------
* Fix force extraction bug
* Fix/Improved path handling
you should now be able to use
the tool from anywhere (including PATH)
to anywhere (including lots of spaces)
[I] for Windows, the bin/AIK-Windows folder
need to be writeable (only temporarily)[/I]
* Added --debuginfo / -P option (see usage in post 1)
* Other code cleanup and changes
26 May 2016 (version 3.0.2)
---------------------------
* Check if new keyfile, if so copy to main OUT folder
and inform user to upload
* Added "attempt force extraction" of hboot/hosd,
though this will typically fail, some RUUs, have the
first zip signed, but not encrypted, in which case
the tool will be able to auto-generate a proper keyfile
* Minor code fixes and cleanup
22 May 2016 (version 3.0.1)
---------------------------
* Added android-info.txt parsing
* Added -z (SD-Card zip) option (to OUT)
* Fixed renaming of keyfile (to OUT)
* Added -d (--device) option
* Added auto checking of ruuveal's built in
decryption keys
* Updated simg2img to provide progress, and
[STRIKE]implement "immediate cleanup"[/STRIKE] (no point, since
it allocates the entire output file from the start)
* Updated linux binaries to static builds
* Bring AIK up to date, and fix pause (win) and
terminal clear (linux)
* Fixed unencrypted unzip bug
20 May 2016 (version 3.0.0)
---------------------------
* Completely recoded to c/c++
* Works on 64bit Linux and 64bit Windows
* Added several user flags, please see usage
* Autodetects if RUU is in .EXE or .ZIP format
* Added several new keyfiles
* Better cleanup to lessen disk space needed
* Many other code changes and optimizations
Notes
As of version 3.6.0 RC1, the command line usage has changed:
--system-only and --firmware-only have been replaced by --system and --firmware instead
These have become required arguments, please refer to Usage in post #1.
.
Information regarding the Android Magisk Module can be found in Captain_Throwback's post.
Example output: Linux (64bit) (I'm using Ubuntu 14.04.3)
RUU Decrypt Tool
Code:
[email protected]:/media/nkk71/RUU/testruns$ ./RUU_Decrypt_Tool rom.zip hosd_signed.img
+++ Welcome to the HTC RUU Decryption Tool 3.0.0 +++
by nkk71 and Captain_Throwback
RUU identified as Normal Zip file
Moving 'rom.zip' temporarily to working folder
Extracting ZIP files
Normal Zip format detected, using unzip
Archive: /media/nkk71/RUU/testruns/OUT/romzip/rom.zip
extracting: info.bin
extracting: zip_0.zip
extracting: zip_1.zip
extracting: zip_2.zip
extracting: zip_3.zip
extracting: zip_4.zip
extracting: zip_5.zip
extracting: zip_6.zip
extracting: zip_7.zip
extracting: zip_8.zip
extracting: zip_9.zip
extracting: zip_10.zip
extracting: zip_11.zip
extracting: zip_12.zip
extracting: zip_13.zip
extracting: zip_14.zip
extracting: zip_15.zip
extracting: zip_16.zip
extracting: zip_17.zip
extracting: zip_18.zip
extracting: zip_19.zip
extracting: zip_20.zip
extracting: zip_21.zip
extracting: zip_22.zip
extracting: zip_23.zip
extracting: zip_24.zip
Finished: Successfully extracted zip files to 'dumped_zips'
Attempting to find suitable keyfile
Find First Encrypted ZIP
Encrypted zip to be used for testing: 'zip_0.zip'
User supplied hosd...
Android Image Kitchen - UnpackImg Script
by osm0sis @ xda-developers
Supplied image: my_hosd_signed.img
Setting up work folders...
Splitting image to "split_img/"...
BOARD_KERNEL_CMDLINE console=ttyHSL0,115200,n8 androidboot.console=ttyHSL0 user_debug=31 ehci-hcd.park=3 lpm_levels.sleep_disabled=1 [email protected] androidboot.hardware=htc_pme
BOARD_KERNEL_BASE 80000000
BOARD_NAME hosd:0
BOARD_PAGE_SIZE 4096
BOARD_KERNEL_OFFSET 00008000
BOARD_RAMDISK_OFFSET 01000000
BOARD_TAGS_OFFSET 00000100
Unpacking ramdisk to "ramdisk/"...
Compression used: gzip
19567 blocks
Done!
Attempting to generate keyfile
bruutveal
---------
SUCCESS!rcing key[loop 1]: 575968/786208...
Successful bruutveal run, key written to: /media/nkk71/RUU/testruns/OUT/tmp/use_keyfile.bin
bruutveal keyfile has been successfully generated '/media/nkk71/RUU/testruns/OUT/tmp/use_keyfile.bin'
Working directory cleaned.
Finished: Successfully found decryption key, copied to 'tmp/use_keyfile.bin'
Decrypting ZIP files
Decrypting (1/25) 'zip_0.zip'
Encrypted zip detected, running ruuveal...
ruuveal
-------
Decrypted RUU (zip) written to: /media/nkk71/RUU/testruns/OUT/decrypted_zips/dec_zip_0.zip
... immediate cleanup specified, deleting 'zip_0.zip'
Decrypting (2/25) 'zip_1.zip'
Encrypted zip detected, running ruuveal...
ruuveal
-------
Decrypted RUU (zip) written to: /media/nkk71/RUU/testruns/OUT/decrypted_zips/dec_zip_1.zip
... immediate cleanup specified, deleting 'zip_1.zip'
Decrypting (3/25) 'zip_2.zip'
Encrypted zip detected, running ruuveal...
ruuveal
-------
Decrypted RUU (zip) written to: /media/nkk71/RUU/testruns/OUT/decrypted_zips/dec_zip_2.zip
... immediate cleanup specified, deleting 'zip_2.zip'
Decrypting (4/25) 'zip_3.zip'
Encrypted zip detected, running ruuveal...
ruuveal
-------
Decrypted RUU (zip) written to: /media/nkk71/RUU/testruns/OUT/decrypted_zips/dec_zip_3.zip
... immediate cleanup specified, deleting 'zip_3.zip'
Decrypting (5/25) 'zip_4.zip'
Encrypted zip detected, running ruuveal...
ruuveal
-------
Decrypted RUU (zip) written to: /media/nkk71/RUU/testruns/OUT/decrypted_zips/dec_zip_4.zip
... immediate cleanup specified, deleting 'zip_4.zip'
Decrypting (6/25) 'zip_5.zip'
Encrypted zip detected, running ruuveal...
ruuveal
-------
Decrypted RUU (zip) written to: /media/nkk71/RUU/testruns/OUT/decrypted_zips/dec_zip_5.zip
... immediate cleanup specified, deleting 'zip_5.zip'
Decrypting (7/25) 'zip_6.zip'
Encrypted zip detected, running ruuveal...
ruuveal
-------
Decrypted RUU (zip) written to: /media/nkk71/RUU/testruns/OUT/decrypted_zips/dec_zip_6.zip
... immediate cleanup specified, deleting 'zip_6.zip'
Decrypting (8/25) 'zip_7.zip'
Encrypted zip detected, running ruuveal...
ruuveal
-------
Decrypted RUU (zip) written to: /media/nkk71/RUU/testruns/OUT/decrypted_zips/dec_zip_7.zip
... immediate cleanup specified, deleting 'zip_7.zip'
Decrypting (9/25) 'zip_8.zip'
Encrypted zip detected, running ruuveal...
ruuveal
-------
Decrypted RUU (zip) written to: /media/nkk71/RUU/testruns/OUT/decrypted_zips/dec_zip_8.zip
... immediate cleanup specified, deleting 'zip_8.zip'
Decrypting (10/25) 'zip_9.zip'
Encrypted zip detected, running ruuveal...
ruuveal
-------
Decrypted RUU (zip) written to: /media/nkk71/RUU/testruns/OUT/decrypted_zips/dec_zip_9.zip
... immediate cleanup specified, deleting 'zip_9.zip'
Decrypting (11/25) 'zip_10.zip'
Encrypted zip detected, running ruuveal...
ruuveal
-------
Decrypted RUU (zip) written to: /media/nkk71/RUU/testruns/OUT/decrypted_zips/dec_zip_10.zip
... immediate cleanup specified, deleting 'zip_10.zip'
Decrypting (12/25) 'zip_11.zip'
Encrypted zip detected, running ruuveal...
ruuveal
-------
Decrypted RUU (zip) written to: /media/nkk71/RUU/testruns/OUT/decrypted_zips/dec_zip_11.zip
... immediate cleanup specified, deleting 'zip_11.zip'
Decrypting (13/25) 'zip_12.zip'
Encrypted zip detected, running ruuveal...
ruuveal
-------
Decrypted RUU (zip) written to: /media/nkk71/RUU/testruns/OUT/decrypted_zips/dec_zip_12.zip
... immediate cleanup specified, deleting 'zip_12.zip'
Decrypting (14/25) 'zip_13.zip'
Encrypted zip detected, running ruuveal...
ruuveal
-------
Decrypted RUU (zip) written to: /media/nkk71/RUU/testruns/OUT/decrypted_zips/dec_zip_13.zip
... immediate cleanup specified, deleting 'zip_13.zip'
Decrypting (15/25) 'zip_14.zip'
Encrypted zip detected, running ruuveal...
ruuveal
-------
Decrypted RUU (zip) written to: /media/nkk71/RUU/testruns/OUT/decrypted_zips/dec_zip_14.zip
... immediate cleanup specified, deleting 'zip_14.zip'
Decrypting (16/25) 'zip_15.zip'
Encrypted zip detected, running ruuveal...
ruuveal
-------
Decrypted RUU (zip) written to: /media/nkk71/RUU/testruns/OUT/decrypted_zips/dec_zip_15.zip
... immediate cleanup specified, deleting 'zip_15.zip'
Decrypting (17/25) 'zip_16.zip'
Encrypted zip detected, running ruuveal...
ruuveal
-------
Decrypted RUU (zip) written to: /media/nkk71/RUU/testruns/OUT/decrypted_zips/dec_zip_16.zip
... immediate cleanup specified, deleting 'zip_16.zip'
Decrypting (18/25) 'zip_17.zip'
Encrypted zip detected, running ruuveal...
ruuveal
-------
Decrypted RUU (zip) written to: /media/nkk71/RUU/testruns/OUT/decrypted_zips/dec_zip_17.zip
... immediate cleanup specified, deleting 'zip_17.zip'
Decrypting (19/25) 'zip_18.zip'
Encrypted zip detected, running ruuveal...
ruuveal
-------
Decrypted RUU (zip) written to: /media/nkk71/RUU/testruns/OUT/decrypted_zips/dec_zip_18.zip
... immediate cleanup specified, deleting 'zip_18.zip'
Decrypting (20/25) 'zip_19.zip'
Encrypted zip detected, running ruuveal...
ruuveal
-------
Decrypted RUU (zip) written to: /media/nkk71/RUU/testruns/OUT/decrypted_zips/dec_zip_19.zip
... immediate cleanup specified, deleting 'zip_19.zip'
Decrypting (21/25) 'zip_20.zip'
Encrypted zip detected, running ruuveal...
ruuveal
-------
Decrypted RUU (zip) written to: /media/nkk71/RUU/testruns/OUT/decrypted_zips/dec_zip_20.zip
... immediate cleanup specified, deleting 'zip_20.zip'
Decrypting (22/25) 'zip_21.zip'
Encrypted zip detected, running ruuveal...
ruuveal
-------
Decrypted RUU (zip) written to: /media/nkk71/RUU/testruns/OUT/decrypted_zips/dec_zip_21.zip
... immediate cleanup specified, deleting 'zip_21.zip'
Decrypting (23/25) 'zip_22.zip'
Encrypted zip detected, running ruuveal...
ruuveal
-------
Decrypted RUU (zip) written to: /media/nkk71/RUU/testruns/OUT/decrypted_zips/dec_zip_22.zip
... immediate cleanup specified, deleting 'zip_22.zip'
Decrypting (24/25) 'zip_23.zip'
Encrypted zip detected, running ruuveal...
ruuveal
-------
Decrypted RUU (zip) written to: /media/nkk71/RUU/testruns/OUT/decrypted_zips/dec_zip_23.zip
... immediate cleanup specified, deleting 'zip_23.zip'
Decrypting (25/25) 'zip_24.zip'
Encrypted zip detected, running ruuveal...
ruuveal
-------
Decrypted RUU (zip) written to: /media/nkk71/RUU/testruns/OUT/decrypted_zips/dec_zip_24.zip
... immediate cleanup specified, deleting 'zip_24.zip'
Finished: Successfully decrypted zips to 'decrypted_zips'
Unzipping decrypted ZIP files
Unzipping decrypted zip: (1/25) 'dec_zip_0.zip'
Archive: dec_zip_0.zip
inflating: /media/nkk71/RUU/testruns/OUT/firmware/android-info.txt
inflating: /media/nkk71/RUU/testruns/OUT/firmware/radio.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/rcdata.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/splash1.nb0
inflating: /media/nkk71/RUU/testruns/OUT/firmware/adsp.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/rfg_3.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/android-info2.txt
inflating: /media/nkk71/RUU/testruns/OUT/firmware/sensor_hub.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/tp_SYN3708.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/gpt_main_16g.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/gpt_main_64g.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/gpt_main_32g.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/pmic-8996-1.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/pg2fs_ship_signkey.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/apppreload.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/rpm-8996-1.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/tz-8996-1.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/hyp-8996-1.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/modemst2.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/modemst1.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/cota.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/partition_info
inflating: /media/nkk71/RUU/testruns/OUT/firmware/dsp.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/fsc.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/venus.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/aboot_signed.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/cs_CY8C.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/hosd_signed.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/keymaster.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/xbl-8996-1.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/slpi.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/recovery_signed.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/lksecapp.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/boot_signed.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/usb_typec.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/cmnlib64.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/usb_typec_otp.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/backup_android-info.txt
inflating: /media/nkk71/RUU/testruns/OUT/firmware/devcfg-8996-1.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/cmnlib32.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/apdp-8996-1.img
... immediate cleanup specified, deleting 'dec_zip_0.zip'
Unzipping decrypted zip: (2/25) 'dec_zip_1.zip'
Archive: dec_zip_1.zip
inflating: /media/nkk71/RUU/testruns/OUT/firmware/system.img_00
... immediate cleanup specified, deleting 'dec_zip_1.zip'
Unzipping decrypted zip: (3/25) 'dec_zip_2.zip'
Archive: dec_zip_2.zip
inflating: /media/nkk71/RUU/testruns/OUT/firmware/system.img_01
... immediate cleanup specified, deleting 'dec_zip_2.zip'
Unzipping decrypted zip: (4/25) 'dec_zip_3.zip'
Archive: dec_zip_3.zip
inflating: /media/nkk71/RUU/testruns/OUT/firmware/system.img_02
... immediate cleanup specified, deleting 'dec_zip_3.zip'
Unzipping decrypted zip: (5/25) 'dec_zip_4.zip'
Archive: dec_zip_4.zip
inflating: /media/nkk71/RUU/testruns/OUT/firmware/system.img_03
... immediate cleanup specified, deleting 'dec_zip_4.zip'
Unzipping decrypted zip: (6/25) 'dec_zip_5.zip'
Archive: dec_zip_5.zip
inflating: /media/nkk71/RUU/testruns/OUT/firmware/system.img_04
... immediate cleanup specified, deleting 'dec_zip_5.zip'
Unzipping decrypted zip: (7/25) 'dec_zip_6.zip'
Archive: dec_zip_6.zip
inflating: /media/nkk71/RUU/testruns/OUT/firmware/system.img_05
... immediate cleanup specified, deleting 'dec_zip_6.zip'
Unzipping decrypted zip: (8/25) 'dec_zip_7.zip'
Archive: dec_zip_7.zip
inflating: /media/nkk71/RUU/testruns/OUT/firmware/system.img_06
... immediate cleanup specified, deleting 'dec_zip_7.zip'
Unzipping decrypted zip: (9/25) 'dec_zip_8.zip'
Archive: dec_zip_8.zip
inflating: /media/nkk71/RUU/testruns/OUT/firmware/system.img_07
... immediate cleanup specified, deleting 'dec_zip_8.zip'
Unzipping decrypted zip: (10/25) 'dec_zip_9.zip'
Archive: dec_zip_9.zip
inflating: /media/nkk71/RUU/testruns/OUT/firmware/system.img_08
... immediate cleanup specified, deleting 'dec_zip_9.zip'
Unzipping decrypted zip: (11/25) 'dec_zip_10.zip'
Archive: dec_zip_10.zip
inflating: /media/nkk71/RUU/testruns/OUT/firmware/system.img_09
... immediate cleanup specified, deleting 'dec_zip_10.zip'
Unzipping decrypted zip: (12/25) 'dec_zip_11.zip'
Archive: dec_zip_11.zip
inflating: /media/nkk71/RUU/testruns/OUT/firmware/system.img_10
... immediate cleanup specified, deleting 'dec_zip_11.zip'
Unzipping decrypted zip: (13/25) 'dec_zip_12.zip'
Archive: dec_zip_12.zip
inflating: /media/nkk71/RUU/testruns/OUT/firmware/system.img_11
... immediate cleanup specified, deleting 'dec_zip_12.zip'
Unzipping decrypted zip: (14/25) 'dec_zip_13.zip'
Archive: dec_zip_13.zip
inflating: /media/nkk71/RUU/testruns/OUT/firmware/system.img_12
... immediate cleanup specified, deleting 'dec_zip_13.zip'
Unzipping decrypted zip: (15/25) 'dec_zip_14.zip'
Archive: dec_zip_14.zip
inflating: /media/nkk71/RUU/testruns/OUT/firmware/system.img_13
... immediate cleanup specified, deleting 'dec_zip_14.zip'
Unzipping decrypted zip: (16/25) 'dec_zip_15.zip'
Archive: dec_zip_15.zip
inflating: /media/nkk71/RUU/testruns/OUT/firmware/system.img_14
... immediate cleanup specified, deleting 'dec_zip_15.zip'
Unzipping decrypted zip: (17/25) 'dec_zip_16.zip'
Archive: dec_zip_16.zip
inflating: /media/nkk71/RUU/testruns/OUT/firmware/system.img_15
... immediate cleanup specified, deleting 'dec_zip_16.zip'
Unzipping decrypted zip: (18/25) 'dec_zip_17.zip'
Archive: dec_zip_17.zip
inflating: /media/nkk71/RUU/testruns/OUT/firmware/system.img_16
... immediate cleanup specified, deleting 'dec_zip_17.zip'
Unzipping decrypted zip: (19/25) 'dec_zip_18.zip'
Archive: dec_zip_18.zip
inflating: /media/nkk71/RUU/testruns/OUT/firmware/system.img_17
... immediate cleanup specified, deleting 'dec_zip_18.zip'
Unzipping decrypted zip: (20/25) 'dec_zip_19.zip'
Archive: dec_zip_19.zip
inflating: /media/nkk71/RUU/testruns/OUT/firmware/system.img_18
... immediate cleanup specified, deleting 'dec_zip_19.zip'
Unzipping decrypted zip: (21/25) 'dec_zip_20.zip'
Archive: dec_zip_20.zip
inflating: /media/nkk71/RUU/testruns/OUT/firmware/system.img_19
... immediate cleanup specified, deleting 'dec_zip_20.zip'
Unzipping decrypted zip: (22/25) 'dec_zip_21.zip'
Archive: dec_zip_21.zip
inflating: /media/nkk71/RUU/testruns/OUT/firmware/system.img_20
... immediate cleanup specified, deleting 'dec_zip_21.zip'
Unzipping decrypted zip: (23/25) 'dec_zip_22.zip'
Archive: dec_zip_22.zip
inflating: /media/nkk71/RUU/testruns/OUT/firmware/system.img_21
... immediate cleanup specified, deleting 'dec_zip_22.zip'
Unzipping decrypted zip: (24/25) 'dec_zip_23.zip'
Archive: dec_zip_23.zip
inflating: /media/nkk71/RUU/testruns/OUT/firmware/system.img_22
... immediate cleanup specified, deleting 'dec_zip_23.zip'
Unzipping decrypted zip: (25/25) 'dec_zip_24.zip'
Archive: dec_zip_24.zip
inflating: /media/nkk71/RUU/testruns/OUT/firmware/dzdata_16g.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/dzdata_32g.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/dzdata_16g.hdr
inflating: /media/nkk71/RUU/testruns/OUT/firmware/dzdata_64g.hdr
inflating: /media/nkk71/RUU/testruns/OUT/firmware/cache.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/dzdata_32g.hdr
inflating: /media/nkk71/RUU/testruns/OUT/firmware/dzdata_64g.img
... immediate cleanup specified, deleting 'dec_zip_24.zip'
Finished: Successfully unzipped files to 'firmware'
Moving system img files
(1/23) moving system.img_00
(2/23) moving system.img_01
(3/23) moving system.img_02
(4/23) moving system.img_03
(5/23) moving system.img_04
(6/23) moving system.img_05
(7/23) moving system.img_06
(8/23) moving system.img_07
(9/23) moving system.img_08
(10/23) moving system.img_09
(11/23) moving system.img_10
(12/23) moving system.img_11
(13/23) moving system.img_12
(14/23) moving system.img_13
(15/23) moving system.img_14
(16/23) moving system.img_15
(17/23) moving system.img_16
(18/23) moving system.img_17
(19/23) moving system.img_18
(20/23) moving system.img_19
(21/23) moving system.img_20
(22/23) moving system.img_21
(23/23) moving system.img_22
Finished: Successfully moved system img files to 'decrypted_system'
Attempting to create system.img
Multi-part system images (23 parts)
Sparse Image detected, using simg2img
Please be patient, this can take several minutes...
finished.
Finished: Successfully created system.img 'system/system.img'
Testing system.img...
e2fsck 1.42.9 (4-Feb-2014)
Pass 1: Checking inodes, blocks, and sizes
Pass 2: Checking directory structure
Pass 3: Checking directory connectivity
Pass 4: Checking reference counts
Pass 5: Checking group summary information
system: 4674/242880 files (0.0% non-contiguous), 848835/971227 blocks
Finished: system.img successfully passed filesystem check
Adding boot.img to the system folder
Copying firmware/boot_signed.img to system/boot.img
Restoring 'rom.zip' to normal folder
Removing unneeded work folders
Finished: Successfully extracted zip files to
'/media/nkk71/RUU/testruns/OUT'
Output Files
Code:
[email protected]:/media/nkk71/RUU/testruns$ ls -lR OUT/
OUT/:
total 12
drwxrwxr-x 2 nkk71 nkk71 4096 May 20 15:16 firmware
drwxrwxr-x 2 nkk71 nkk71 4096 May 20 15:17 system
drwxrwxr-x 2 nkk71 nkk71 4096 May 20 15:13 tmp
OUT/firmware:
total 368136
-rw-rw-r-- 1 nkk71 nkk71 933120 Apr 23 23:07 aboot_signed.img
-rwxrwxr-x 1 nkk71 nkk71 11527168 Apr 23 22:40 adsp.img
-rw-rw-rw- 1 nkk71 nkk71 177 Apr 23 23:50 android-info2.txt
-rw-rw-rw- 1 nkk71 nkk71 969 Apr 23 23:50 android-info.txt
-rw-rw-r-- 1 nkk71 nkk71 13248 Apr 23 22:40 apdp-8996-1.img
-rw-rw-r-- 1 nkk71 nkk71 62914560 Apr 23 22:56 apppreload.img
-rw-rw-r-- 1 nkk71 nkk71 969 Apr 23 23:54 backup_android-info.txt
-rw-rw-r-- 1 nkk71 nkk71 41371109 Apr 23 23:07 boot_signed.img
-rw-rw-r-- 1 nkk71 nkk71 6136028 Apr 23 22:52 cache.img
-rw-rw-r-- 1 nkk71 nkk71 193152 Apr 23 22:40 cmnlib32.img
-rw-rw-r-- 1 nkk71 nkk71 239642 Apr 23 22:40 cmnlib64.img
-rw-rw-r-- 1 nkk71 nkk71 62914560 Apr 23 22:56 cota.img
-rwxrwxr-x 1 nkk71 nkk71 18906 Apr 23 22:40 cs_CY8C.img
-rw-rw-r-- 1 nkk71 nkk71 39738 Apr 23 22:40 devcfg-8996-1.img
-rw-rw-r-- 1 nkk71 nkk71 16777216 Apr 23 22:40 dsp.img
-rw-rw-r-- 1 nkk71 nkk71 12512 Apr 23 22:55 dzdata_16g.hdr
-rw-rw-r-- 1 nkk71 nkk71 2229472 Apr 23 22:55 dzdata_16g.img
-rw-rw-r-- 1 nkk71 nkk71 20592 Apr 23 22:55 dzdata_32g.hdr
-rw-rw-r-- 1 nkk71 nkk71 2545264 Apr 23 22:55 dzdata_32g.img
-rw-rw-r-- 1 nkk71 nkk71 24384 Apr 23 22:56 dzdata_64g.hdr
-rw-rw-r-- 1 nkk71 nkk71 2776384 Apr 23 22:56 dzdata_64g.img
-rwxrwxr-x 1 nkk71 nkk71 1024 Apr 23 22:40 fsc.img
-rw-rw-r-- 1 nkk71 nkk71 17408 Apr 23 22:30 gpt_main_16g.img
-rw-rw-r-- 1 nkk71 nkk71 17408 Apr 23 22:30 gpt_main_32g.img
-rw-rw-r-- 1 nkk71 nkk71 17408 Apr 23 22:30 gpt_main_64g.img
-rw-rw-r-- 1 nkk71 nkk71 44893669 Apr 23 23:07 hosd_signed.img
-rw-rw-r-- 1 nkk71 nkk71 260050 Apr 23 22:40 hyp-8996-1.img
-rw-rw-r-- 1 nkk71 nkk71 226026 Apr 23 22:40 keymaster.img
-rw-rw-r-- 1 nkk71 nkk71 57370 Apr 23 22:40 lksecapp.img
-rwxrwxr-x 1 nkk71 nkk71 2097152 Apr 23 22:40 modemst1.img
-rwxrwxr-x 1 nkk71 nkk71 2097152 Apr 23 22:40 modemst2.img
-rw-rw-r-- 1 nkk71 nkk71 1499 Apr 23 22:30 partition_info
-rwxrwxr-x 1 nkk71 nkk71 3388 Apr 23 22:40 pg2fs_ship_signkey.img
-rw-rw-r-- 1 nkk71 nkk71 42763 Apr 23 22:40 pmic-8996-1.img
-rw-r--r-- 1 nkk71 nkk71 55010304 Apr 23 23:50 radio.img
-rw-rw-r-- 1 nkk71 nkk71 302 Apr 23 23:50 rcdata.img
-rw-rw-r-- 1 nkk71 nkk71 43177449 Apr 23 23:07 recovery_signed.img
-rw-rw-r-- 1 nkk71 nkk71 837120 Apr 23 23:50 rfg_3.img
-rw-rw-r-- 1 nkk71 nkk71 229440 Apr 23 22:40 rpm-8996-1.img
-rw-rw-r-- 1 nkk71 nkk71 466832 Apr 23 22:40 sensor_hub.img
-rwxrwxr-x 1 nkk71 nkk71 3597312 Apr 23 22:40 slpi.img
-rw-rw-r-- 1 nkk71 nkk71 7471104 Apr 23 23:50 splash1.nb0
-rwxrwxr-x 1 nkk71 nkk71 203069 Apr 23 22:40 tp_SYN3708.img
-rw-rw-r-- 1 nkk71 nkk71 1478674 Apr 23 22:40 tz-8996-1.img
-rw-rw-r-- 1 nkk71 nkk71 32768 Apr 23 22:40 usb_typec.img
-rw-rw-r-- 1 nkk71 nkk71 22248 Apr 23 22:40 usb_typec_otp.img
-rw-rw-r-- 1 nkk71 nkk71 2067968 Apr 23 22:40 venus.img
-rwxrwxr-x 1 nkk71 nkk71 1848492 Apr 23 22:40 xbl-8996-1.img
OUT/system:
total 3400988
-rw-rw-r-- 1 nkk71 nkk71 41371109 May 20 15:17 boot.img
-rw-rw-r-- 1 nkk71 nkk71 4009508864 May 20 15:17 system.img
OUT/tmp:
total 4
-rw-rw-r-- 1 nkk71 nkk71 96 May 20 15:13 use_keyfile.bin
[email protected]:/media/nkk71/RUU/testruns$
Example output: Windows 10 (64bit)
RUU Decrypt Tool
Code:
I:\test\test2>RUU_Decrypt_Tool.exe RUU_M8_WHL_M60_SENSE70_SPCS_MR_Sprint_WWE_6.20.651.3.exe
+++ Welcome to the HTC RUU Decryption Tool 3.0.0 +++
by nkk71 and Captain_Throwback
RUU identified as Executable file
Extracting rom.zip from RUU_M8_WHL_M60_SENSE70_SPCS_MR_Sprint_WWE_6.20.651.3.exe
Extracting temporary files...
Extracting rom zip files...
Extracting rom.zip...done.
Extracting android-info.txt...done.
Cleaning up...
Done!
Extracting ZIP files
LargeZip format detected, using ruuveal
ruuveal
-------
Large zip format detected containing 6 zipfile(s)
Dumped (copied) zip file to: 01_dmp.zip
Dumped (copied) zip file to: 02_dmp.zip
Dumped (copied) zip file to: 03_dmp.zip
Dumped (copied) zip file to: 04_dmp.zip
Dumped (copied) zip file to: 05_dmp.zip
Dumped (copied) zip file to: 06_dmp.zip
Finished: Successfully extracted zip files to 'dumped_zips'
Attempting to find suitable keyfile
Find First Encrypted ZIP
Encrypted zip to be used for testing: '01_dmp.zip'
No proper keyfile, trying known keys instead...
Testing keyfile '0P3P_keyfile_4.bin'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing keyfile '0P6B_keyfile_1.bin'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing keyfile '0P6B_keyfile_6.20.654.3.bin'...
ruuveal
-------
Decrypted RUU (zip) written to: tmpzip.zip
Archive: tmpzip.zip
testing: android-info.txt OK
testing: hboot_signedbyaa.img OK
testing: sbl1-8974AB-1.img OK
testing: sbl1-8974AB-2.img OK
testing: sbl1-8974AA-1.img OK
testing: sdi.img OK
testing: rpm.img OK
testing: boot_signed.img OK
testing: recovery_signed.img OK
testing: adsp.img OK
testing: wcnss.img OK
testing: radio.img OK
testing: rcdata.img OK
testing: rfg_1.img OK
testing: modem_st1.img OK
testing: modem_st2.img OK
testing: tz.img OK
testing: pg2fs_spcustom.img OK
testing: sensor_hub.img OK
testing: tp_SYN3508.img OK
testing: tp_SYN3528.img OK
testing: splash1.nb0 OK
testing: rconfig.img OK
testing: rfg_2.img OK
No errors detected in compressed data of tmpzip.zip.
INFO: keyfile passed all tests
Finished: Successfully found decryption key, copied to 'tmp/use_keyfile.bin'
Decrypting ZIP files
Decrypting (1/6) '01_dmp.zip'
Encrypted zip detected, running ruuveal...
ruuveal
-------
Decrypted RUU (zip) written to: I:/test/test2/OUT/decrypted_zips/dec_01_dmp.zip
... immediate cleanup specified, deleting '01_dmp.zip'
Decrypting (2/6) '02_dmp.zip'
Encrypted zip detected, running ruuveal...
ruuveal
-------
Decrypted RUU (zip) written to: I:/test/test2/OUT/decrypted_zips/dec_02_dmp.zip
... immediate cleanup specified, deleting '02_dmp.zip'
Decrypting (3/6) '03_dmp.zip'
Encrypted zip detected, running ruuveal...
ruuveal
-------
Decrypted RUU (zip) written to: I:/test/test2/OUT/decrypted_zips/dec_03_dmp.zip
... immediate cleanup specified, deleting '03_dmp.zip'
Decrypting (4/6) '04_dmp.zip'
Encrypted zip detected, running ruuveal...
ruuveal
-------
Decrypted RUU (zip) written to: I:/test/test2/OUT/decrypted_zips/dec_04_dmp.zip
... immediate cleanup specified, deleting '04_dmp.zip'
Decrypting (5/6) '05_dmp.zip'
Encrypted zip detected, running ruuveal...
ruuveal
-------
Decrypted RUU (zip) written to: I:/test/test2/OUT/decrypted_zips/dec_05_dmp.zip
... immediate cleanup specified, deleting '05_dmp.zip'
Decrypting (6/6) '06_dmp.zip'
Encrypted zip detected, running ruuveal...
ruuveal
-------
Decrypted RUU (zip) written to: I:/test/test2/OUT/decrypted_zips/dec_06_dmp.zip
... immediate cleanup specified, deleting '06_dmp.zip'
Finished: Successfully decrypted zips to 'decrypted_zips'
Unzipping decrypted ZIP files
Unzipping decrypted zip: (1/6) 'dec_01_dmp.zip'
Archive: dec_01_dmp.zip
inflating: I:/test/test2/OUT/firmware/android-info.txt
inflating: I:/test/test2/OUT/firmware/hboot_signedbyaa.img
inflating: I:/test/test2/OUT/firmware/sbl1-8974AB-1.img
inflating: I:/test/test2/OUT/firmware/sbl1-8974AB-2.img
inflating: I:/test/test2/OUT/firmware/sbl1-8974AA-1.img
inflating: I:/test/test2/OUT/firmware/sdi.img
inflating: I:/test/test2/OUT/firmware/rpm.img
inflating: I:/test/test2/OUT/firmware/boot_signed.img
inflating: I:/test/test2/OUT/firmware/recovery_signed.img
inflating: I:/test/test2/OUT/firmware/adsp.img
inflating: I:/test/test2/OUT/firmware/wcnss.img
inflating: I:/test/test2/OUT/firmware/radio.img
inflating: I:/test/test2/OUT/firmware/rcdata.img
inflating: I:/test/test2/OUT/firmware/rfg_1.img
inflating: I:/test/test2/OUT/firmware/modem_st1.img
inflating: I:/test/test2/OUT/firmware/modem_st2.img
inflating: I:/test/test2/OUT/firmware/tz.img
inflating: I:/test/test2/OUT/firmware/pg2fs_spcustom.img
inflating: I:/test/test2/OUT/firmware/sensor_hub.img
inflating: I:/test/test2/OUT/firmware/tp_SYN3508.img
inflating: I:/test/test2/OUT/firmware/tp_SYN3528.img
inflating: I:/test/test2/OUT/firmware/splash1.nb0
inflating: I:/test/test2/OUT/firmware/rconfig.img
inflating: I:/test/test2/OUT/firmware/rfg_2.img
... immediate cleanup specified, deleting 'dec_01_dmp.zip'
Unzipping decrypted zip: (2/6) 'dec_02_dmp.zip'
Archive: dec_02_dmp.zip
inflating: I:/test/test2/OUT/firmware/system_1.img
inflating: I:/test/test2/OUT/firmware/android-info-1.txt
... immediate cleanup specified, deleting 'dec_02_dmp.zip'
Unzipping decrypted zip: (3/6) 'dec_03_dmp.zip'
Archive: dec_03_dmp.zip
inflating: I:/test/test2/OUT/firmware/system_2.img
inflating: I:/test/test2/OUT/firmware/android-info-2.txt
... immediate cleanup specified, deleting 'dec_03_dmp.zip'
Unzipping decrypted zip: (4/6) 'dec_04_dmp.zip'
Archive: dec_04_dmp.zip
inflating: I:/test/test2/OUT/firmware/system_3.img
inflating: I:/test/test2/OUT/firmware/android-info-3.txt
... immediate cleanup specified, deleting 'dec_04_dmp.zip'
Unzipping decrypted zip: (5/6) 'dec_05_dmp.zip'
Archive: dec_05_dmp.zip
inflating: I:/test/test2/OUT/firmware/system_4.img
inflating: I:/test/test2/OUT/firmware/android-info-4.txt
... immediate cleanup specified, deleting 'dec_05_dmp.zip'
Unzipping decrypted zip: (6/6) 'dec_06_dmp.zip'
Archive: dec_06_dmp.zip
inflating: I:/test/test2/OUT/firmware/dzdata_16g.hdr
inflating: I:/test/test2/OUT/firmware/dzdata_16g.img
inflating: I:/test/test2/OUT/firmware/dzdata_32g.hdr
inflating: I:/test/test2/OUT/firmware/dzdata_32g.img
... immediate cleanup specified, deleting 'dec_06_dmp.zip'
Finished: Successfully unzipped files to 'firmware'
Moving system img files
(1/4) moving system_1.img
(2/4) moving system_2.img
(3/4) moving system_3.img
(4/4) moving system_4.img
Finished: Successfully moved system img files to 'decrypted_system'
Attempting to create system.img
Multi-part system images (4 parts)
Sparse Header not found, using simple concatenate
Please be patient, this can take several minutes...
(1/4) system_1.img -> system.img
... immediate cleanup specified, deleting 'system_1.img'
(2/4) system_2.img -> system.img
... immediate cleanup specified, deleting 'system_2.img'
(3/4) system_3.img -> system.img
... immediate cleanup specified, deleting 'system_3.img'
(4/4) system_4.img -> system.img
... immediate cleanup specified, deleting 'system_4.img'
finished.
Finished: Successfully created system.img 'system/system.img'
Testing system.img...
e2fsck 1.42.13 (17-May-2015)
Pass 1: Checking inodes, blocks, and sizes
Pass 2: Checking directory structure
Pass 3: Checking directory connectivity
Pass 4: Checking reference counts
Pass 5: Checking group summary information
system/system.img: 3347/172032 files (0.0% non-contiguous), 602666/688128 blocks
Finished: system.img successfully passed filesystem check
Adding boot.img to the system folder
Copying firmware/boot_signed.img to system/boot.img
Removing unneeded work folders
Finished: Successfully extracted zip files to
'I:/test/test2/OUT'
Output Files
Code:
I:\test\test2>dir /s OUT
Volume in drive I is Seagate Backup Plus Drive
Volume Serial Number is FC34-DB75
Directory of I:\test\test2\OUT
20/05/2016 15:34 <DIR> .
20/05/2016 15:34 <DIR> ..
20/05/2016 15:32 <DIR> firmware
20/05/2016 15:28 <DIR> romzip
20/05/2016 15:34 <DIR> system
20/05/2016 15:29 <DIR> tmp
0 File(s) 0 bytes
Directory of I:\test\test2\OUT\firmware
20/05/2016 15:32 <DIR> .
20/05/2016 15:32 <DIR> ..
07/01/2016 11:35 9,614,336 adsp.img
07/01/2016 11:56 169 android-info-1.txt
07/01/2016 11:57 169 android-info-2.txt
07/01/2016 11:58 169 android-info-3.txt
07/01/2016 11:58 169 android-info-4.txt
07/01/2016 11:30 113 android-info.txt
07/01/2016 11:54 12,996,864 boot_signed.img
07/01/2016 11:48 13,296 dzdata_16g.hdr
07/01/2016 11:48 2,439,152 dzdata_16g.img
07/01/2016 11:49 20,448 dzdata_32g.hdr
07/01/2016 11:49 2,718,688 dzdata_32g.img
07/01/2016 11:54 2,096,384 hboot_signedbyaa.img
28/03/2014 08:51 1,572,864 modem_st1.img
28/03/2014 08:51 1,572,864 modem_st2.img
07/01/2016 11:35 4,188,160 pg2fs_spcustom.img
07/01/2016 11:28 45,945,856 radio.img
01/07/2014 07:27 57,856 rcdata.img
28/03/2014 08:51 8,388,608 rconfig.img
07/01/2016 11:54 21,485,824 recovery_signed.img
28/03/2014 08:51 1,048,576 rfg_1.img
28/03/2014 08:51 1,048,576 rfg_2.img
07/01/2016 11:35 194,816 rpm.img
07/01/2016 11:35 316,538 sbl1-8974AA-1.img
07/01/2016 11:35 316,538 sbl1-8974AB-1.img
07/01/2016 11:35 316,538 sbl1-8974AB-2.img
07/01/2016 11:35 11,770 sdi.img
07/01/2016 11:35 209,760 sensor_hub.img
18/12/2015 10:03 4,194,304 splash1.nb0
07/01/2016 11:35 95,772 tp_SYN3508.img
07/01/2016 11:35 95,767 tp_SYN3528.img
07/01/2016 11:35 366,426 tz.img
07/01/2016 11:35 4,592,640 wcnss.img
32 File(s) 125,920,010 bytes
Directory of I:\test\test2\OUT\romzip
20/05/2016 15:28 <DIR> .
20/05/2016 15:28 <DIR> ..
20/05/2016 15:28 113 android-info.txt
20/05/2016 15:28 1,645,418,970 rom.zip
2 File(s) 1,645,419,083 bytes
Directory of I:\test\test2\OUT\system
20/05/2016 15:34 <DIR> .
20/05/2016 15:34 <DIR> ..
20/05/2016 15:34 12,996,864 boot.img
20/05/2016 15:34 2,818,572,288 system.img
2 File(s) 2,831,569,152 bytes
Directory of I:\test\test2\OUT\tmp
20/05/2016 15:29 <DIR> .
20/05/2016 15:29 <DIR> ..
20/05/2016 15:29 96 use_keyfile.bin
1 File(s) 96 bytes
Total Files Listed:
37 File(s) 4,602,908,341 bytes
14 Dir(s) 96,035,700,736 bytes free
I:\test\test2>
User submitted keyfiles
Thanks to the following users for submitting keyfiles to the repo:
@CSnowRules
@BigCountry907
@alray
@frank9184
@hohassan444
@ckpv5
@coolberry
@Golv
Hi Bro
We can I start this program on Win7?
Sorry,I'm a Boob
Please help me,thanks
Terraalpha said:
Hi Bro
We can I start this program on Win7?
Sorry,I'm a Boob
Please help me,thanks
Click to expand...
Click to collapse
yes, as long as it's a Win7 64bit version... open a command prompt and let it run it's course
Please tell me as
I'm a noob ,sorry
Thanks
Terraalpha said:
Please tell me as
I'm a noob ,sorry
Thanks
Click to expand...
Click to collapse
http://forum.xda-developers.com/showpost.php?p=66943941&postcount=4
same / similar output, whether Windows 7 or Windows 10... or any other Windows 64bit system
OK,thanks?
0PK7IMG_HIAU_ML_TUHL_L50_SENSE70_MR_hTC_Asia_TW_1.90.709.3_Radio_1.1506V24P22T34.2106.0727_HT[W.T]_release_464123_signed_2_4.zip
While processing unencrypt RUU file will get error
Code:
+++ Welcome to the HTC RUU Decryption Tool 3.0.0 +++
by nkk71 and Captain_Throwback
RUU identified as HTC LargeZip file
Moving 'D:\0PK7IMG_HIAU_ML_TUHL_L50_SENSE70_MR_hTC_Asia_TW_1.90.709.3_Radio_1.1506V24P22T34.2106.0727_HT[W.T]_release_464123_signed_2_4.zip' temporarily to working folder
Extracting ZIP files
LargeZip format detected, using ruuveal
ruuveal
-------
Large zip format detected containing 7 zipfile(s)
Dumped (copied) zip file to: 01_dmp.zip
Dumped (copied) zip file to: 02_dmp.zip
Dumped (copied) zip file to: 03_dmp.zip
Dumped (copied) zip file to: 04_dmp.zip
Dumped (copied) zip file to: 05_dmp.zip
Dumped (copied) zip file to: 06_dmp.zip
Dumped (copied) zip file to: 07_dmp.zip
Finished: Successfully extracted zip files to 'dumped_zips'
Attempting to find suitable keyfile
Find First Encrypted ZIP
Finished: No encrypted zip(s) found, keyfile not needed
Decrypting ZIP files
Decrypting (1/7) '01_dmp.zip'
Encryption not found, checking headers...
normal zip, testing...
ERROR: something went wrong with exec() (errno=14 'Bad address')!
ERROR: unencrypted zip failed test (err=-2)
Decrypting (2/7) '02_dmp.zip'
Encryption not found, checking headers...
normal zip, testing...
ERROR: something went wrong with exec() (errno=14 'Bad address')!
ERROR: unencrypted zip failed test (err=-2)
Decrypting (3/7) '03_dmp.zip'
Encryption not found, checking headers...
normal zip, testing...
ERROR: something went wrong with exec() (errno=14 'Bad address')!
ERROR: unencrypted zip failed test (err=-2)
Decrypting (4/7) '04_dmp.zip'
Encryption not found, checking headers...
normal zip, testing...
ERROR: something went wrong with exec() (errno=14 'Bad address')!
ERROR: unencrypted zip failed test (err=-2)
Decrypting (5/7) '05_dmp.zip'
Encryption not found, checking headers...
normal zip, testing...
ERROR: something went wrong with exec() (errno=14 'Bad address')!
ERROR: unencrypted zip failed test (err=-2)
Decrypting (6/7) '06_dmp.zip'
Encryption not found, checking headers...
normal zip, testing...
ERROR: something went wrong with exec() (errno=14 'Bad address')!
ERROR: unencrypted zip failed test (err=-2)
Decrypting (7/7) '07_dmp.zip'
Encryption not found, checking headers...
normal zip, testing...
ERROR: something went wrong with exec() (errno=14 'Bad address')!
ERROR: unencrypted zip failed test (err=-2)
Adding boot.img to the system folder
ERROR: Couldn't find a boot*.img to copy to system folder.
Restoring 'D:\0PK7IMG_HIAU_ML_TUHL_L50_SENSE70_MR_hTC_Asia_TW_1.90.709.3_Radio_1.1506V24P22T34.2106.0727_HT[W.T]_release_464123_signed_2_4.zip' to normal folder
Removing unneeded work folders
Finished: Tool has finished but there was an error, please
check the console output and your OUT folder
'D:/OUT'
ERROR: unencrypted zip failed test (err=4)
Adding boot.img to the system folder
ERROR: child exited abnormally (status=139, errno=14 'Bad address')
ERROR: unencrypted zip failed test (err=-3)
Decrypting (7/7) '07_dmp.zip'
Encryption not found, checking headers...
normal zip, testing...
ERROR: something went wrong with exec() (errno=14 'Bad address')!
ERROR: unencrypted zip failed test (err=-2)
Adding boot.img to the system folder
ERROR: child exited abnormally (status=139, errno=14 'Bad address')
ERROR: unencrypted zip failed test (err=-3)
Adding boot.img to the system folder
ERROR: child exited abnormally (status=139, errno=14 'Bad address')
ERROR: unencrypted zip failed test (err=-3)
Decrypting (6/7) '06_dmp.zip'
Encryption not found, checking headers...
normal zip, testing...
ERROR: something went wrong with exec() (errno=14 'Bad address')!
ERROR: unencrypted zip failed test (err=-2)
Decrypting (7/7) '07_dmp.zip'
Encryption not found, checking headers...
normal zip, testing...
ERROR: something went wrong with exec() (errno=14 'Bad address')!
ERROR: unencrypted zip failed test (err=-2)
Adding boot.img to the system folder
ERROR: child exited abnormally (status=139, errno=14 'Bad address')
ERROR: unencrypted zip failed test (err=-3)
Adding boot.img to the system folder
ERROR: child exited abnormally (status=139, errno=14 'Bad address')
ERROR: unencrypted zip failed test (err=-3)
Decrypting (7/7) '07_dmp.zip'
Encryption not found, checking headers...
normal zip, testing...
ERROR: something went wrong with exec() (errno=14 'Bad address')!
ERROR: unencrypted zip failed test (err=-2)
Adding boot.img to the system folder
ERROR: child exited abnormally (status=139, errno=14 'Bad address')
ERROR: unencrypted zip failed test (err=-3)
Adding boot.img to the system folder
ERROR: child exited abnormally (status=139, errno=14 'Bad address')
ERROR: unencrypted zip failed test (err=-3)
Decrypting (5/7) '05_dmp.zip'
Encryption not found, checking headers...
normal zip, testing...
ERROR: something went wrong with exec() (errno=14 'Bad address')!
ERROR: unencrypted zip failed test (err=-2)
Decrypting (6/7) '06_dmp.zip'
Encryption not found, checking headers...
normal zip, testing...
ERROR: something went wrong with exec() (errno=14 'Bad address')!
ERROR: unencrypted zip failed test (err=-2)
Decrypting (7/7) '07_dmp.zip'
Encryption not found, checking headers...
normal zip, testing...
ERROR: something went wrong with exec() (errno=14 'Bad address')!
ERROR: unencrypted zip failed test (err=-2)
Adding boot.img to the system folder
ERROR: child exited abnormally (status=139, errno=14 'Bad address')
ERROR: unencrypted zip failed test (err=-3)
Adding boot.img to the system folder
ERROR: child exited abnormally (status=139, errno=14 'Bad address')
ERROR: unencrypted zip failed test (err=-3)
E-SIGNAL received signal=2, try moving back rom.zip to origin and exitE-SIGNAL received signal=2, try moving back rom.ziE-SIGNAL received signal=2, try moving back rom.zip to origin and exit
http://i.imgur.com/zC5jdsj.png
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
but try to use old version "Universal_HTC_Decrypt_Tool-v2.0.0" it works
http://i.imgur.com/JdBlCLg.png
sabpprook said:
0PK7IMG_HIAU_ML_TUHL_L50_SENSE70_MR_hTC_Asia_TW_1.90.709.3_Radio_1.1506V24P22T34.2106.0727_HT[W.T]_release_464123_signed_2_4.zip
While processing unencrypt RUU file will get error
http://i.imgur.com/zC5jdsj.png
but try to use old version "Universal_HTC_Decrypt_Tool-v2.0.0" it works
http://i.imgur.com/JdBlCLg.png
Click to expand...
Click to collapse
oops, a blarf
thanks for the report, I'll fix it and upload 3.0.1 later today
also added How to report bugs / issues in post 2.... copy/paste of terminal output is easier to read
EDIT: fixed, sorry for the inconvenience .... was a silly little missing argument
will upload later today...
Code:
+++ Welcome to the HTC RUU Decryption Tool 3.0.1 +++
by nkk71 and Captain_Throwback
RUU identified as HTC LargeZip file
Moving '0PJAIMG_HIMA_UHL_L50_SENSE70_HTC_Europe_1.40.401.8_Radio_01.02_U11440261_60.03.50505G_F_release_435816_signed.zip' temporarily to working folder
Extracting ZIP files
LargeZip format detected, using ruuveal
ruuveal
-------
Large zip format detected containing 7 zipfile(s)
Dumped (copied) zip file to: 01_dmp.zip
Dumped (copied) zip file to: 02_dmp.zip
Dumped (copied) zip file to: 03_dmp.zip
Dumped (copied) zip file to: 04_dmp.zip
Dumped (copied) zip file to: 05_dmp.zip
Dumped (copied) zip file to: 06_dmp.zip
Dumped (copied) zip file to: 07_dmp.zip
Finished: Successfully extracted zip files to 'dumped_zips'
Attempting to find suitable keyfile
Find First Encrypted ZIP
Finished: No encrypted zip(s) found, keyfile not needed
Decrypting ZIP files
Decrypting (1/7) '01_dmp.zip'
Encryption not found, checking headers...
normal zip, testing...
No errors detected in compressed data of 01_dmp.zip.
unzip test OK, copying file...
... immediate cleanup specified, deleting '01_dmp.zip'
Decrypting (2/7) '02_dmp.zip'
Encryption not found, checking headers...
normal zip, testing...
No errors detected in compressed data of 02_dmp.zip.
unzip test OK, copying file...
... immediate cleanup specified, deleting '02_dmp.zip'
Decrypting (3/7) '03_dmp.zip'
Encryption not found, checking headers...
normal zip, testing...
No errors detected in compressed data of 03_dmp.zip.
unzip test OK, copying file...
... immediate cleanup specified, deleting '03_dmp.zip'
Decrypting (4/7) '04_dmp.zip'
Encryption not found, checking headers...
normal zip, testing...
No errors detected in compressed data of 04_dmp.zip.
unzip test OK, copying file...
... immediate cleanup specified, deleting '04_dmp.zip'
Decrypting (5/7) '05_dmp.zip'
Encryption not found, checking headers...
normal zip, testing...
No errors detected in compressed data of 05_dmp.zip.
unzip test OK, copying file...
... immediate cleanup specified, deleting '05_dmp.zip'
Decrypting (6/7) '06_dmp.zip'
Encryption not found, checking headers...
normal zip, testing...
No errors detected in compressed data of 06_dmp.zip.
unzip test OK, copying file...
... immediate cleanup specified, deleting '06_dmp.zip'
Decrypting (7/7) '07_dmp.zip'
Encryption not found, checking headers...
normal zip, testing...
No errors detected in compressed data of 07_dmp.zip.
unzip test OK, copying file...
... immediate cleanup specified, deleting '07_dmp.zip'
Finished: Successfully decrypted zips to 'decrypted_zips'
Unzipping decrypted ZIP files
Unzipping decrypted zip: (1/7) 'dec_01_dmp.zip'
Archive: dec_01_dmp.zip
inflating: /media/nkk71/RUU/testruns/OUT/firmware/android-info.txt
inflating: /media/nkk71/RUU/testruns/OUT/firmware/aboot_signed.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/radio.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/rcdata.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/splash1.nb0
inflating: /media/nkk71/RUU/testruns/OUT/firmware/adsp.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/ramdisk.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/modem_st1.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/modem_st2.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/sensor_hub.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/sdi.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/emmc_appsboot.mbn
inflating: /media/nkk71/RUU/testruns/OUT/firmware/persist.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/dt.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/bootloader
inflating: /media/nkk71/RUU/testruns/OUT/firmware/android-info2.txt
inflating: /media/nkk71/RUU/testruns/OUT/firmware/tp_MXM11876.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/cir.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/sbl1-8994-1.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/tp_SYN3351.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/gpt_main_32g.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/gpt_main_64g.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/pmic-8994-1.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/cpe.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/pg2fs_ship_signkey.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/apppreload.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/rpm-8994-1.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/tz-8994-1.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/hyp-8994-1.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/cota.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/recovery_signed.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/hosd_signed.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/boot_signed.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/backup_android-info.txt
... immediate cleanup specified, deleting 'dec_01_dmp.zip'
Unzipping decrypted zip: (2/7) 'dec_02_dmp.zip'
Archive: dec_02_dmp.zip
inflating: /media/nkk71/RUU/testruns/OUT/firmware/system.img_00
... immediate cleanup specified, deleting 'dec_02_dmp.zip'
Unzipping decrypted zip: (3/7) 'dec_03_dmp.zip'
Archive: dec_03_dmp.zip
inflating: /media/nkk71/RUU/testruns/OUT/firmware/system.img_01
... immediate cleanup specified, deleting 'dec_03_dmp.zip'
Unzipping decrypted zip: (4/7) 'dec_04_dmp.zip'
Archive: dec_04_dmp.zip
inflating: /media/nkk71/RUU/testruns/OUT/firmware/system.img_02
... immediate cleanup specified, deleting 'dec_04_dmp.zip'
Unzipping decrypted zip: (5/7) 'dec_05_dmp.zip'
Archive: dec_05_dmp.zip
inflating: /media/nkk71/RUU/testruns/OUT/firmware/system.img_03
... immediate cleanup specified, deleting 'dec_05_dmp.zip'
Unzipping decrypted zip: (6/7) 'dec_06_dmp.zip'
Archive: dec_06_dmp.zip
inflating: /media/nkk71/RUU/testruns/OUT/firmware/system.img_04
... immediate cleanup specified, deleting 'dec_06_dmp.zip'
Unzipping decrypted zip: (7/7) 'dec_07_dmp.zip'
Archive: dec_07_dmp.zip
inflating: /media/nkk71/RUU/testruns/OUT/firmware/dzdata_16g.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/dzdata_32g.img
inflating: /media/nkk71/RUU/testruns/OUT/firmware/dzdata_16g.hdr
inflating: /media/nkk71/RUU/testruns/OUT/firmware/dzdata_32g.hdr
inflating: /media/nkk71/RUU/testruns/OUT/firmware/dzdata_64g.hdr
inflating: /media/nkk71/RUU/testruns/OUT/firmware/dzdata_64g.img
... immediate cleanup specified, deleting 'dec_07_dmp.zip'
Finished: Successfully unzipped files to 'firmware'
Moving system img files
(1/5) moving system.img_00
(2/5) moving system.img_01
(3/5) moving system.img_02
(4/5) moving system.img_03
(5/5) moving system.img_04
Finished: Successfully moved system img files to 'decrypted_system'
Attempting to create system.img
Multi-part system images (5 parts)
Sparse Image detected, using simg2img
Please be patient, this can take several minutes...
Processing file 'system.img_00'...
Processing file 'system.img_01'...
Processing file 'system.img_02'...
Processing file 'system.img_03'...
Processing file 'system.img_04'...
finished.
Finished: Successfully created system.img 'system/system.img'
Testing system.img...
e2fsck 1.42.9 (4-Feb-2014)
Pass 1: Checking inodes, blocks, and sizes
Pass 2: Checking directory structure
Pass 3: Checking directory connectivity
Pass 4: Checking reference counts
Pass 5: Checking group summary information
system/system.img: 4814/286720 files (0.0% non-contiguous), 992045/1146880 blocks
Finished: system.img successfully passed filesystem check
Adding boot.img to the system folder
Copying firmware/boot_signed.img to system/boot.img
Restoring '0PJAIMG_HIMA_UHL_L50_SENSE70_HTC_Europe_1.40.401.8_Radio_01.02_U11440261_60.03.50505G_F_release_435816_signed.zip' to normal folder
Removing unneeded work folders
INFO: RUU modelid: 0PJA10000
INFO: RUU mainver: 1.40.401.8
Finished: Successfully extracted zip files to
'/media/nkk71/RUU/testruns/OUT'
sabpprook said:
0PK7IMG_HIAU_ML_TUHL_L50_SENSE70_MR_hTC_Asia_TW_1.90.709.3_Radio_1.1506V24P22T34.2106.0727_HT[W.T]_release_464123_signed_2_4.zip
Click to expand...
Click to collapse
Verison 3.0.1 is uploaded (windows version shortly...), bug fixed, and other improvements (changelog updated)
including the ability to use ruuveal's built in keys automatically,
eg:
I passed a "wrong" file on purpose, so bruutveal would fail, so it tries:
bruutveal
known keys from keyfile folder
all keys already built into ruuveal
Code:
Attempting to generate keyfile
bruutveal
---------
NOT FOUND!ing key[loop 3]: 589655/786208...
Failed to determine key - Correct HBOOT/RUU pairing?
ERROR: bruutveal was unable to generate keyfile (res=1)
Working directory cleaned.
Code:
[B]No proper keyfile, trying known keys instead...[/B]
Testing keyfile '0P3P_keyfile_4.bin'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing keyfile '0P6B_keyfile_1.bin'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing keyfile '0P6B_keyfile_6.20.654.3.bin'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing keyfile '0P6B_keyfile_6.bin'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing keyfile '0PAJ_keyfile_1.bin'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing keyfile '0PCV_keyfile_1.bin'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing keyfile '0PFH_keyfile_2.bin'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing keyfile '0PGZ_keyfile_1.bin'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing keyfile '0PJA_keyfile_2.bin'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing keyfile '0PKV_keyfile_1.bin'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing keyfile '0PM9_keyfile_1.bin'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing keyfile '0PN7_keyfile_1.bin'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing keyfile '0PN7_keyfile_4.bin'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing keyfile '0PN7_keyfile_5.bin'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing keyfile '2PQ9_keyfile_1.bin'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing keyfile '2PRG_keyfile_2.bin'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing keyfile '2PS6_keyfile_1.bin'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing keyfile 'PJ75_keyfile_4.bin'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing keyfile 'PO58_keyfile_4.bin'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Processing ZIP... 32768/43034787
Code:
[B]Still no proper keyfile, trying all ruuveal built-in keys...[/B]
Testing ruuveal device 'cp2dcg'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'cp2dtg'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'cp2dug'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'cp3dcg'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'cp3dtg'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'cp3dug'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'cp3edtg'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'cp5dtu'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'cp5dug'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'cp5dwg'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'csndug'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'deluxe_j'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'deluxe_u'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'deluxe_ub1'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'dlpdtu'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'dlpdug'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'dlpdwg'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'dlxp_u'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'dlxp_ul'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'endeavor_td'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'endeavor_u'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'enrc2_u'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'enrc2b_u'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'evita'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'evitare_ul'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'fireball'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'jel_dd'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'jewel'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'k2_plc_cl'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'k2_u'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'k2_ul'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'm4_u'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'm4_ul'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'm7_u'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'm7_ul'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'm7_wlj'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'm7_wls'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'm7_wlv'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'm7cdtu'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'm7cdug'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'm7cdwg'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'magnids'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'monarudo'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'mystul'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'proto'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'protodcg'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'protodug'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'prototd'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 't6dug'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 't6dwg'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 't6tl'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 't6u'...7
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 't6ul'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 't6ula'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 't6whl'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 't6wl'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'tc2'...7
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'ville'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'villec2'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'z4td'...
ruuveal
-------
Invalid zip file - aborting!
failed to decrypt zip file!
Testing ruuveal device 'zara_cl'...
ruuveal
-------
Decrypted RUU (zip) written to: tmpzip.zip
Archive: tmpzip.zip
testing: android-info.txt OK
testing: hboot_signedbyaa.img OK
testing: radio.img OK
testing: splash1.nb0 OK
testing: sbl2.img OK
testing: sbl3.img OK
testing: tz.img OK
testing: rpm.img OK
testing: adsp.img OK
testing: pg2fs_spcustom.img OK
testing: rfg_1.img OK
testing: rfg_2.img OK
testing: ramdisk.img OK
testing: tp_SYN3201.img OK
testing: sbl1-1.img OK
testing: sbl1-2.img OK
testing: sbl1-3.img OK
testing: modem_st1.img OK
testing: modem_st2.img OK
testing: rconfig.img OK
testing: rcdata_SPCS_5.17_003_PRL55009.img OK
testing: boot_signed.img OK
testing: recovery_signed.img OK
No errors detected in compressed data of tmpzip.zip.
INFO: keyfile passed all tests
Finished: Successfully found decryption key, ruuveal device 'zara_cl'
Code:
....
Checking keyfile state
No keyfile was generated because ruuveal's built in 'zara_cl' device-key was used.
Works like a charm!!!
unencrypted RUU:
Code:
[email protected]:~/Desktop/HTC_RUU_Decrypt_Tool_3.0.1$ ./RUU_Decrypt_Tool 0PK7IMG_HIAU_ML_TUHL_L50_SENSE70_MR_hTC_Asia_TW_1.90.709.3_Radio_1.1506V24P22T34.2106.0727_HT\[W.T\]_release_464123_signed_2_4.zip
+++ Welcome to the HTC RUU Decryption Tool 3.0.1 +++
by nkk71 and Captain_Throwback
RUU identified as HTC LargeZip file
Moving '0PK7IMG_HIAU_ML_TUHL_L50_SENSE70_MR_hTC_Asia_TW_1.90.709.3_Radio_1.1506V24P22T34.2106.0727_HT[W.T]_release_464123_signed_2_4.zip' temporarily to working folder
Extracting ZIP files
LargeZip format detected, using ruuveal
ruuveal
-------
Large zip format detected containing 7 zipfile(s)
Dumped (copied) zip file to: 01_dmp.zip
Dumped (copied) zip file to: 02_dmp.zip
Dumped (copied) zip file to: 03_dmp.zip
Dumped (copied) zip file to: 04_dmp.zip
Dumped (copied) zip file to: 05_dmp.zip
Dumped (copied) zip file to: 06_dmp.zip
Dumped (copied) zip file to: 07_dmp.zip
Finished: Successfully extracted zip files to 'dumped_zips'
Attempting to find suitable keyfile
Find First Encrypted ZIP
Finished: No encrypted zip(s) found, keyfile not needed
Decrypting ZIP files
Decrypting (1/7) '01_dmp.zip'
Encryption not found, checking headers...
normal zip, testing...
No errors detected in compressed data of 01_dmp.zip.
unzip test OK, copying file...
... immediate cleanup specified, deleting '01_dmp.zip'
Decrypting (2/7) '02_dmp.zip'
Encryption not found, checking headers...
normal zip, testing...
No errors detected in compressed data of 02_dmp.zip.
unzip test OK, copying file...
... immediate cleanup specified, deleting '02_dmp.zip'
Decrypting (3/7) '03_dmp.zip'
Encryption not found, checking headers...
normal zip, testing...
No errors detected in compressed data of 03_dmp.zip.
unzip test OK, copying file...
... immediate cleanup specified, deleting '03_dmp.zip'
Decrypting (4/7) '04_dmp.zip'
Encryption not found, checking headers...
normal zip, testing...
No errors detected in compressed data of 04_dmp.zip.
unzip test OK, copying file...
... immediate cleanup specified, deleting '04_dmp.zip'
Decrypting (5/7) '05_dmp.zip'
Encryption not found, checking headers...
normal zip, testing...
No errors detected in compressed data of 05_dmp.zip.
unzip test OK, copying file...
... immediate cleanup specified, deleting '05_dmp.zip'
Decrypting (6/7) '06_dmp.zip'
Encryption not found, checking headers...
normal zip, testing...
No errors detected in compressed data of 06_dmp.zip.
unzip test OK, copying file...
... immediate cleanup specified, deleting '06_dmp.zip'
Decrypting (7/7) '07_dmp.zip'
Encryption not found, checking headers...
normal zip, testing...
No errors detected in compressed data of 07_dmp.zip.
unzip test OK, copying file...
... immediate cleanup specified, deleting '07_dmp.zip'
Finished: Successfully decrypted zips to 'decrypted_zips'
Unzipping decrypted ZIP files
Unzipping decrypted zip: (1/7) 'dec_01_dmp.zip'
Archive: dec_01_dmp.zip
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/android-info.txt
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/ramdisk.img
extracting: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/android-info2.txt
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/sensor_hub.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/tp_MXM11876.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/cir.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/gpt_main_16g.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/gpt_main_64g.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/gpt_main_32g.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/tee1.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/tee2.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/preloader.bin
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/MT6795_Android_scatter.txt
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/CheckSum_Gen
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/libflashtool.so
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/pg2fs_ship_signkey.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/apppreload.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/secro_verified.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/cota.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/boot_verified.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/hosd_verified.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/recovery_verified.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/lk_verified.bin
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/logo_verified.bin
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/Checksum.ini
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/backup_android-info.txt
... immediate cleanup specified, deleting 'dec_01_dmp.zip'
Unzipping decrypted zip: (2/7) 'dec_02_dmp.zip'
Archive: dec_02_dmp.zip
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/system.img_00
... immediate cleanup specified, deleting 'dec_02_dmp.zip'
Unzipping decrypted zip: (3/7) 'dec_03_dmp.zip'
Archive: dec_03_dmp.zip
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/system.img_01
... immediate cleanup specified, deleting 'dec_03_dmp.zip'
Unzipping decrypted zip: (4/7) 'dec_04_dmp.zip'
Archive: dec_04_dmp.zip
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/system.img_02
... immediate cleanup specified, deleting 'dec_04_dmp.zip'
Unzipping decrypted zip: (5/7) 'dec_05_dmp.zip'
Archive: dec_05_dmp.zip
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/system.img_03
... immediate cleanup specified, deleting 'dec_05_dmp.zip'
Unzipping decrypted zip: (6/7) 'dec_06_dmp.zip'
Archive: dec_06_dmp.zip
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/system.img_04
... immediate cleanup specified, deleting 'dec_06_dmp.zip'
Unzipping decrypted zip: (7/7) 'dec_07_dmp.zip'
Archive: dec_07_dmp.zip
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/userdata.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/cache.img
... immediate cleanup specified, deleting 'dec_07_dmp.zip'
Finished: Successfully unzipped files to 'firmware'
Moving system img files
(1/5) moving system.img_00
(2/5) moving system.img_01
(3/5) moving system.img_02
(4/5) moving system.img_03
(5/5) moving system.img_04
Finished: Successfully moved system img files to 'decrypted_system'
Attempting to create system.img
Multi-part system images (5 parts)
Sparse Image detected, using simg2img
Please be patient, this can take several minutes...
Processing file 'system.img_00'...
Processing file 'system.img_01'...
Processing file 'system.img_02'...
Processing file 'system.img_03'...
Processing file 'system.img_04'...
finished.
Finished: Successfully created system.img 'system/system.img'
Testing system.img...
e2fsck 1.42.9 (4-Feb-2014)
Pass 1: Checking inodes, blocks, and sizes
Pass 2: Checking directory structure
Pass 3: Checking directory connectivity
Pass 4: Checking reference counts
Pass 5: Checking group summary information
system/system.img: 3919/302512 files (0.0% non-contiguous), 1028849/1208320 blocks
Finished: system.img successfully passed filesystem check
Adding boot.img to the system folder
Copying firmware/boot_verified.img to system/boot.img
Checking keyfile state
Unencrypted RUU, no keyfile was needed.
Restoring '0PK7IMG_HIAU_ML_TUHL_L50_SENSE70_MR_hTC_Asia_TW_1.90.709.3_Radio_1.1506V24P22T34.2106.0727_HT[W.T]_release_464123_signed_2_4.zip' to normal folder
Removing unneeded work folders
INFO: RUU modelid: 0PK711000
INFO: RUU mainver: 1.90.709.3
Finished: Successfully extracted zip files to
'/home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT'
NO key files, let it auto generate
Code:
[email protected]:~/Desktop/HTC_RUU_Decrypt_Tool_3.0.1$ ./RUU_Decrypt_Tool 2PS5IMG_E56_ML_DTUL_M60_SENSE7GP_hTC_Asia_TW_2.15.709.6_Radio_1.1550V70.2508.0121.ED\[W.T\]_release_471546_signed_2_4.zip hosd_verified.img
+++ Welcome to the HTC RUU Decryption Tool 3.0.1 +++
by nkk71 and Captain_Throwback
RUU identified as HTC LargeZip file
Moving '2PS5IMG_E56_ML_DTUL_M60_SENSE7GP_hTC_Asia_TW_2.15.709.6_Radio_1.1550V70.2508.0121.ED[W.T]_release_471546_signed_2_4.zip' temporarily to working folder
Extracting ZIP files
LargeZip format detected, using ruuveal
ruuveal
-------
Large zip format detected containing 8 zipfile(s)
Dumped (copied) zip file to: 01_dmp.zip
Dumped (copied) zip file to: 02_dmp.zip
Dumped (copied) zip file to: 03_dmp.zip
Dumped (copied) zip file to: 04_dmp.zip
Dumped (copied) zip file to: 05_dmp.zip
Dumped (copied) zip file to: 06_dmp.zip
Dumped (copied) zip file to: 07_dmp.zip
Dumped (copied) zip file to: 08_dmp.zip
Finished: Successfully extracted zip files to 'dumped_zips'
Attempting to find suitable keyfile
Find First Encrypted ZIP
Encrypted zip to be used for testing: '01_dmp.zip'
User supplied hosd...
Android Image Kitchen - UnpackImg Script
by osm0sis @ xda-developers
Supplied image: hosd_verified.img
Setting up work folders...
Splitting image to "split_img/"...
BOARD_KERNEL_CMDLINE bootopt=64S3,32N2,64N2
BOARD_KERNEL_BASE 40078000
BOARD_NAME hosd:0
BOARD_PAGE_SIZE 2048
BOARD_KERNEL_OFFSET 00008000
BOARD_RAMDISK_OFFSET 03f88000
BOARD_TAGS_OFFSET 0df88000
Unpacking ramdisk to "ramdisk/"...
Compression used: gzip
15460 blocks
Done!
Attempting to generate keyfile
bruutveal
---------
SUCCESS!rcing key[loop 1]: 513408/626112...
Successful bruutveal run, key written to: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/tmp/use_keyfile.bin
bruutveal keyfile has been successfully generated '/home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/tmp/use_keyfile.bin'
Working directory cleaned.
Finished: Successfully found decryption key, copied to 'tmp/use_keyfile.bin'
Decrypting ZIP files
Decrypting (1/8) '01_dmp.zip'
Encrypted zip detected, running ruuveal...
ruuveal
-------
Decrypted RUU (zip) written to: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/decrypted_zips/dec_01_dmp.zip
... immediate cleanup specified, deleting '01_dmp.zip'
Decrypting (2/8) '02_dmp.zip'
Encrypted zip detected, running ruuveal...
ruuveal
-------
Decrypted RUU (zip) written to: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/decrypted_zips/dec_02_dmp.zip
... immediate cleanup specified, deleting '02_dmp.zip'
Decrypting (3/8) '03_dmp.zip'
Encrypted zip detected, running ruuveal...
ruuveal
-------
Decrypted RUU (zip) written to: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/decrypted_zips/dec_03_dmp.zip
... immediate cleanup specified, deleting '03_dmp.zip'
Decrypting (4/8) '04_dmp.zip'
Encrypted zip detected, running ruuveal...
ruuveal
-------
Decrypted RUU (zip) written to: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/decrypted_zips/dec_04_dmp.zip
... immediate cleanup specified, deleting '04_dmp.zip'
Decrypting (5/8) '05_dmp.zip'
Encrypted zip detected, running ruuveal...
ruuveal
-------
Decrypted RUU (zip) written to: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/decrypted_zips/dec_05_dmp.zip
... immediate cleanup specified, deleting '05_dmp.zip'
Decrypting (6/8) '06_dmp.zip'
Encrypted zip detected, running ruuveal...
ruuveal
-------
Decrypted RUU (zip) written to: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/decrypted_zips/dec_06_dmp.zip
... immediate cleanup specified, deleting '06_dmp.zip'
Decrypting (7/8) '07_dmp.zip'
Encrypted zip detected, running ruuveal...
ruuveal
-------
Decrypted RUU (zip) written to: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/decrypted_zips/dec_07_dmp.zip
... immediate cleanup specified, deleting '07_dmp.zip'
Decrypting (8/8) '08_dmp.zip'
Encrypted zip detected, running ruuveal...
ruuveal
-------
Decrypted RUU (zip) written to: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/decrypted_zips/dec_08_dmp.zip
... immediate cleanup specified, deleting '08_dmp.zip'
Finished: Successfully decrypted zips to 'decrypted_zips'
Unzipping decrypted ZIP files
Unzipping decrypted zip: (1/8) 'dec_01_dmp.zip'
Archive: dec_01_dmp.zip
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/android-info.txt
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/apppreload.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/cota.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/gpt_main_16g.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/gpt_main_32g.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/gpt_main_64g.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/android-info2.txt
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/preloader.bin
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/lk_verified.bin
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/hosd_verified.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/MT6795_Android_scatter.txt
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/CheckSum_Gen
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/libflashtool.so
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/boot_verified.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/recovery_verified.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/tee1.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/tee2.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/secro_verified.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/logo_verified.bin
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/pg2fs_ship_signkey.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/sensor_hub.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/tp_HMX852XE_MAIN.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/tp_HMX852XE_SECOND.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/Checksum.ini
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/backup_android-info.txt
... immediate cleanup specified, deleting 'dec_01_dmp.zip'
Unzipping decrypted zip: (2/8) 'dec_02_dmp.zip'
Archive: dec_02_dmp.zip
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/system.img_00
... immediate cleanup specified, deleting 'dec_02_dmp.zip'
Unzipping decrypted zip: (3/8) 'dec_03_dmp.zip'
Archive: dec_03_dmp.zip
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/system.img_01
... immediate cleanup specified, deleting 'dec_03_dmp.zip'
Unzipping decrypted zip: (4/8) 'dec_04_dmp.zip'
Archive: dec_04_dmp.zip
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/system.img_02
... immediate cleanup specified, deleting 'dec_04_dmp.zip'
Unzipping decrypted zip: (5/8) 'dec_05_dmp.zip'
Archive: dec_05_dmp.zip
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/system.img_03
... immediate cleanup specified, deleting 'dec_05_dmp.zip'
Unzipping decrypted zip: (6/8) 'dec_06_dmp.zip'
Archive: dec_06_dmp.zip
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/system.img_04
... immediate cleanup specified, deleting 'dec_06_dmp.zip'
Unzipping decrypted zip: (7/8) 'dec_07_dmp.zip'
Archive: dec_07_dmp.zip
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/system.img_05
... immediate cleanup specified, deleting 'dec_07_dmp.zip'
Unzipping decrypted zip: (8/8) 'dec_08_dmp.zip'
Archive: dec_08_dmp.zip
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/cache.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/userdata.img
... immediate cleanup specified, deleting 'dec_08_dmp.zip'
Finished: Successfully unzipped files to 'firmware'
Moving system img files
(1/6) moving system.img_00
(2/6) moving system.img_01
(3/6) moving system.img_02
(4/6) moving system.img_03
(5/6) moving system.img_04
(6/6) moving system.img_05
Finished: Successfully moved system img files to 'decrypted_system'
Attempting to create system.img
Multi-part system images (6 parts)
Sparse Image detected, using simg2img
Please be patient, this can take several minutes...
Processing file 'system.img_00'...
Processing file 'system.img_01'...
Processing file 'system.img_02'...
Processing file 'system.img_03'...
Processing file 'system.img_04'...
Processing file 'system.img_05'...
finished.
Finished: Successfully created system.img 'system/system.img'
Testing system.img...
e2fsck 1.42.9 (4-Feb-2014)
Pass 1: Checking inodes, blocks, and sizes
Pass 2: Checking directory structure
Pass 3: Checking directory connectivity
Pass 4: Checking reference counts
Pass 5: Checking group summary information
system: 3932/243840 files (0.0% non-contiguous), 922072/975291 blocks
Finished: system.img successfully passed filesystem check
Adding boot.img to the system folder
Copying firmware/boot_verified.img to system/boot.img
Checking keyfile state
Moving keyfile to 2PS5_keyfile_2.15.709.6.bin
Restoring '2PS5IMG_E56_ML_DTUL_M60_SENSE7GP_hTC_Asia_TW_2.15.709.6_Radio_1.1550V70.2508.0121.ED[W.T]_release_471546_signed_2_4.zip' to normal folder
Removing unneeded work folders
INFO: RUU modelid: 2PS510000
INFO: RUU mainver: 2.15.709.6
Finished: Successfully extracted zip files to
'/home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT'
sabpprook said:
Works like a charm!!!
unencrypted RUU:
Code:
[email protected]:~/Desktop/HTC_RUU_Decrypt_Tool_3.0.1$ ./RUU_Decrypt_Tool 0PK7IMG_HIAU_ML_TUHL_L50_SENSE70_MR_hTC_Asia_TW_1.90.709.3_Radio_1.1506V24P22T34.2106.0727_HT\[W.T\]_release_464123_signed_2_4.zip
+++ Welcome to the HTC RUU Decryption Tool 3.0.1 +++
by nkk71 and Captain_Throwback
RUU identified as HTC LargeZip file
Moving '0PK7IMG_HIAU_ML_TUHL_L50_SENSE70_MR_hTC_Asia_TW_1.90.709.3_Radio_1.1506V24P22T34.2106.0727_HT[W.T]_release_464123_signed_2_4.zip' temporarily to working folder
Extracting ZIP files
LargeZip format detected, using ruuveal
ruuveal
-------
Large zip format detected containing 7 zipfile(s)
Dumped (copied) zip file to: 01_dmp.zip
Dumped (copied) zip file to: 02_dmp.zip
Dumped (copied) zip file to: 03_dmp.zip
Dumped (copied) zip file to: 04_dmp.zip
Dumped (copied) zip file to: 05_dmp.zip
Dumped (copied) zip file to: 06_dmp.zip
Dumped (copied) zip file to: 07_dmp.zip
Finished: Successfully extracted zip files to 'dumped_zips'
Attempting to find suitable keyfile
Find First Encrypted ZIP
Finished: No encrypted zip(s) found, keyfile not needed
Decrypting ZIP files
Decrypting (1/7) '01_dmp.zip'
Encryption not found, checking headers...
normal zip, testing...
No errors detected in compressed data of 01_dmp.zip.
unzip test OK, copying file...
... immediate cleanup specified, deleting '01_dmp.zip'
Decrypting (2/7) '02_dmp.zip'
Encryption not found, checking headers...
normal zip, testing...
No errors detected in compressed data of 02_dmp.zip.
unzip test OK, copying file...
... immediate cleanup specified, deleting '02_dmp.zip'
Decrypting (3/7) '03_dmp.zip'
Encryption not found, checking headers...
normal zip, testing...
No errors detected in compressed data of 03_dmp.zip.
unzip test OK, copying file...
... immediate cleanup specified, deleting '03_dmp.zip'
Decrypting (4/7) '04_dmp.zip'
Encryption not found, checking headers...
normal zip, testing...
No errors detected in compressed data of 04_dmp.zip.
unzip test OK, copying file...
... immediate cleanup specified, deleting '04_dmp.zip'
Decrypting (5/7) '05_dmp.zip'
Encryption not found, checking headers...
normal zip, testing...
No errors detected in compressed data of 05_dmp.zip.
unzip test OK, copying file...
... immediate cleanup specified, deleting '05_dmp.zip'
Decrypting (6/7) '06_dmp.zip'
Encryption not found, checking headers...
normal zip, testing...
No errors detected in compressed data of 06_dmp.zip.
unzip test OK, copying file...
... immediate cleanup specified, deleting '06_dmp.zip'
Decrypting (7/7) '07_dmp.zip'
Encryption not found, checking headers...
normal zip, testing...
No errors detected in compressed data of 07_dmp.zip.
unzip test OK, copying file...
... immediate cleanup specified, deleting '07_dmp.zip'
Finished: Successfully decrypted zips to 'decrypted_zips'
Unzipping decrypted ZIP files
Unzipping decrypted zip: (1/7) 'dec_01_dmp.zip'
Archive: dec_01_dmp.zip
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/android-info.txt
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/ramdisk.img
extracting: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/android-info2.txt
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/sensor_hub.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/tp_MXM11876.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/cir.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/gpt_main_16g.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/gpt_main_64g.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/gpt_main_32g.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/tee1.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/tee2.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/preloader.bin
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/MT6795_Android_scatter.txt
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/CheckSum_Gen
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/libflashtool.so
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/pg2fs_ship_signkey.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/apppreload.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/secro_verified.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/cota.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/boot_verified.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/hosd_verified.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/recovery_verified.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/lk_verified.bin
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/logo_verified.bin
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/Checksum.ini
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/backup_android-info.txt
... immediate cleanup specified, deleting 'dec_01_dmp.zip'
Unzipping decrypted zip: (2/7) 'dec_02_dmp.zip'
Archive: dec_02_dmp.zip
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/system.img_00
... immediate cleanup specified, deleting 'dec_02_dmp.zip'
Unzipping decrypted zip: (3/7) 'dec_03_dmp.zip'
Archive: dec_03_dmp.zip
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/system.img_01
... immediate cleanup specified, deleting 'dec_03_dmp.zip'
Unzipping decrypted zip: (4/7) 'dec_04_dmp.zip'
Archive: dec_04_dmp.zip
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/system.img_02
... immediate cleanup specified, deleting 'dec_04_dmp.zip'
Unzipping decrypted zip: (5/7) 'dec_05_dmp.zip'
Archive: dec_05_dmp.zip
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/system.img_03
... immediate cleanup specified, deleting 'dec_05_dmp.zip'
Unzipping decrypted zip: (6/7) 'dec_06_dmp.zip'
Archive: dec_06_dmp.zip
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/system.img_04
... immediate cleanup specified, deleting 'dec_06_dmp.zip'
Unzipping decrypted zip: (7/7) 'dec_07_dmp.zip'
Archive: dec_07_dmp.zip
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/userdata.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/cache.img
... immediate cleanup specified, deleting 'dec_07_dmp.zip'
Finished: Successfully unzipped files to 'firmware'
Moving system img files
(1/5) moving system.img_00
(2/5) moving system.img_01
(3/5) moving system.img_02
(4/5) moving system.img_03
(5/5) moving system.img_04
Finished: Successfully moved system img files to 'decrypted_system'
Attempting to create system.img
Multi-part system images (5 parts)
Sparse Image detected, using simg2img
Please be patient, this can take several minutes...
Processing file 'system.img_00'...
Processing file 'system.img_01'...
Processing file 'system.img_02'...
Processing file 'system.img_03'...
Processing file 'system.img_04'...
finished.
Finished: Successfully created system.img 'system/system.img'
Testing system.img...
e2fsck 1.42.9 (4-Feb-2014)
Pass 1: Checking inodes, blocks, and sizes
Pass 2: Checking directory structure
Pass 3: Checking directory connectivity
Pass 4: Checking reference counts
Pass 5: Checking group summary information
system/system.img: 3919/302512 files (0.0% non-contiguous), 1028849/1208320 blocks
Finished: system.img successfully passed filesystem check
Adding boot.img to the system folder
Copying firmware/boot_verified.img to system/boot.img
Checking keyfile state
Unencrypted RUU, no keyfile was needed.
Restoring '0PK7IMG_HIAU_ML_TUHL_L50_SENSE70_MR_hTC_Asia_TW_1.90.709.3_Radio_1.1506V24P22T34.2106.0727_HT[W.T]_release_464123_signed_2_4.zip' to normal folder
Removing unneeded work folders
INFO: RUU modelid: 0PK711000
INFO: RUU mainver: 1.90.709.3
Finished: Successfully extracted zip files to
'/home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT'
NO key files, let it auto generate
Code:
[email protected]:~/Desktop/HTC_RUU_Decrypt_Tool_3.0.1$ ./RUU_Decrypt_Tool 2PS5IMG_E56_ML_DTUL_M60_SENSE7GP_hTC_Asia_TW_2.15.709.6_Radio_1.1550V70.2508.0121.ED\[W.T\]_release_471546_signed_2_4.zip hosd_verified.img
+++ Welcome to the HTC RUU Decryption Tool 3.0.1 +++
by nkk71 and Captain_Throwback
RUU identified as HTC LargeZip file
Moving '2PS5IMG_E56_ML_DTUL_M60_SENSE7GP_hTC_Asia_TW_2.15.709.6_Radio_1.1550V70.2508.0121.ED[W.T]_release_471546_signed_2_4.zip' temporarily to working folder
Extracting ZIP files
LargeZip format detected, using ruuveal
ruuveal
-------
Large zip format detected containing 8 zipfile(s)
Dumped (copied) zip file to: 01_dmp.zip
Dumped (copied) zip file to: 02_dmp.zip
Dumped (copied) zip file to: 03_dmp.zip
Dumped (copied) zip file to: 04_dmp.zip
Dumped (copied) zip file to: 05_dmp.zip
Dumped (copied) zip file to: 06_dmp.zip
Dumped (copied) zip file to: 07_dmp.zip
Dumped (copied) zip file to: 08_dmp.zip
Finished: Successfully extracted zip files to 'dumped_zips'
Attempting to find suitable keyfile
Find First Encrypted ZIP
Encrypted zip to be used for testing: '01_dmp.zip'
User supplied hosd...
Android Image Kitchen - UnpackImg Script
by osm0sis @ xda-developers
Supplied image: hosd_verified.img
Setting up work folders...
Splitting image to "split_img/"...
BOARD_KERNEL_CMDLINE bootopt=64S3,32N2,64N2
BOARD_KERNEL_BASE 40078000
BOARD_NAME hosd:0
BOARD_PAGE_SIZE 2048
BOARD_KERNEL_OFFSET 00008000
BOARD_RAMDISK_OFFSET 03f88000
BOARD_TAGS_OFFSET 0df88000
Unpacking ramdisk to "ramdisk/"...
Compression used: gzip
15460 blocks
Done!
Attempting to generate keyfile
bruutveal
---------
SUCCESS!rcing key[loop 1]: 513408/626112...
Successful bruutveal run, key written to: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/tmp/use_keyfile.bin
bruutveal keyfile has been successfully generated '/home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/tmp/use_keyfile.bin'
Working directory cleaned.
Finished: Successfully found decryption key, copied to 'tmp/use_keyfile.bin'
Decrypting ZIP files
Decrypting (1/8) '01_dmp.zip'
Encrypted zip detected, running ruuveal...
ruuveal
-------
Decrypted RUU (zip) written to: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/decrypted_zips/dec_01_dmp.zip
... immediate cleanup specified, deleting '01_dmp.zip'
Decrypting (2/8) '02_dmp.zip'
Encrypted zip detected, running ruuveal...
ruuveal
-------
Decrypted RUU (zip) written to: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/decrypted_zips/dec_02_dmp.zip
... immediate cleanup specified, deleting '02_dmp.zip'
Decrypting (3/8) '03_dmp.zip'
Encrypted zip detected, running ruuveal...
ruuveal
-------
Decrypted RUU (zip) written to: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/decrypted_zips/dec_03_dmp.zip
... immediate cleanup specified, deleting '03_dmp.zip'
Decrypting (4/8) '04_dmp.zip'
Encrypted zip detected, running ruuveal...
ruuveal
-------
Decrypted RUU (zip) written to: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/decrypted_zips/dec_04_dmp.zip
... immediate cleanup specified, deleting '04_dmp.zip'
Decrypting (5/8) '05_dmp.zip'
Encrypted zip detected, running ruuveal...
ruuveal
-------
Decrypted RUU (zip) written to: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/decrypted_zips/dec_05_dmp.zip
... immediate cleanup specified, deleting '05_dmp.zip'
Decrypting (6/8) '06_dmp.zip'
Encrypted zip detected, running ruuveal...
ruuveal
-------
Decrypted RUU (zip) written to: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/decrypted_zips/dec_06_dmp.zip
... immediate cleanup specified, deleting '06_dmp.zip'
Decrypting (7/8) '07_dmp.zip'
Encrypted zip detected, running ruuveal...
ruuveal
-------
Decrypted RUU (zip) written to: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/decrypted_zips/dec_07_dmp.zip
... immediate cleanup specified, deleting '07_dmp.zip'
Decrypting (8/8) '08_dmp.zip'
Encrypted zip detected, running ruuveal...
ruuveal
-------
Decrypted RUU (zip) written to: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/decrypted_zips/dec_08_dmp.zip
... immediate cleanup specified, deleting '08_dmp.zip'
Finished: Successfully decrypted zips to 'decrypted_zips'
Unzipping decrypted ZIP files
Unzipping decrypted zip: (1/8) 'dec_01_dmp.zip'
Archive: dec_01_dmp.zip
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/android-info.txt
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/apppreload.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/cota.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/gpt_main_16g.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/gpt_main_32g.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/gpt_main_64g.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/android-info2.txt
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/preloader.bin
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/lk_verified.bin
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/hosd_verified.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/MT6795_Android_scatter.txt
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/CheckSum_Gen
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/libflashtool.so
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/boot_verified.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/recovery_verified.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/tee1.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/tee2.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/secro_verified.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/logo_verified.bin
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/pg2fs_ship_signkey.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/sensor_hub.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/tp_HMX852XE_MAIN.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/tp_HMX852XE_SECOND.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/Checksum.ini
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/backup_android-info.txt
... immediate cleanup specified, deleting 'dec_01_dmp.zip'
Unzipping decrypted zip: (2/8) 'dec_02_dmp.zip'
Archive: dec_02_dmp.zip
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/system.img_00
... immediate cleanup specified, deleting 'dec_02_dmp.zip'
Unzipping decrypted zip: (3/8) 'dec_03_dmp.zip'
Archive: dec_03_dmp.zip
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/system.img_01
... immediate cleanup specified, deleting 'dec_03_dmp.zip'
Unzipping decrypted zip: (4/8) 'dec_04_dmp.zip'
Archive: dec_04_dmp.zip
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/system.img_02
... immediate cleanup specified, deleting 'dec_04_dmp.zip'
Unzipping decrypted zip: (5/8) 'dec_05_dmp.zip'
Archive: dec_05_dmp.zip
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/system.img_03
... immediate cleanup specified, deleting 'dec_05_dmp.zip'
Unzipping decrypted zip: (6/8) 'dec_06_dmp.zip'
Archive: dec_06_dmp.zip
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/system.img_04
... immediate cleanup specified, deleting 'dec_06_dmp.zip'
Unzipping decrypted zip: (7/8) 'dec_07_dmp.zip'
Archive: dec_07_dmp.zip
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/system.img_05
... immediate cleanup specified, deleting 'dec_07_dmp.zip'
Unzipping decrypted zip: (8/8) 'dec_08_dmp.zip'
Archive: dec_08_dmp.zip
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/cache.img
inflating: /home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT/firmware/userdata.img
... immediate cleanup specified, deleting 'dec_08_dmp.zip'
Finished: Successfully unzipped files to 'firmware'
Moving system img files
(1/6) moving system.img_00
(2/6) moving system.img_01
(3/6) moving system.img_02
(4/6) moving system.img_03
(5/6) moving system.img_04
(6/6) moving system.img_05
Finished: Successfully moved system img files to 'decrypted_system'
Attempting to create system.img
Multi-part system images (6 parts)
Sparse Image detected, using simg2img
Please be patient, this can take several minutes...
Processing file 'system.img_00'...
Processing file 'system.img_01'...
Processing file 'system.img_02'...
Processing file 'system.img_03'...
Processing file 'system.img_04'...
Processing file 'system.img_05'...
finished.
Finished: Successfully created system.img 'system/system.img'
Testing system.img...
e2fsck 1.42.9 (4-Feb-2014)
Pass 1: Checking inodes, blocks, and sizes
Pass 2: Checking directory structure
Pass 3: Checking directory connectivity
Pass 4: Checking reference counts
Pass 5: Checking group summary information
system: 3932/243840 files (0.0% non-contiguous), 922072/975291 blocks
Finished: system.img successfully passed filesystem check
Adding boot.img to the system folder
Copying firmware/boot_verified.img to system/boot.img
Checking keyfile state
Moving keyfile to 2PS5_keyfile_2.15.709.6.bin
Restoring '2PS5IMG_E56_ML_DTUL_M60_SENSE7GP_hTC_Asia_TW_2.15.709.6_Radio_1.1550V70.2508.0121.ED[W.T]_release_471546_signed_2_4.zip' to normal folder
Removing unneeded work folders
INFO: RUU modelid: 2PS510000
INFO: RUU mainver: 2.15.709.6
Finished: Successfully extracted zip files to
'/home/mars3712/Desktop/HTC_RUU_Decrypt_Tool_3.0.1/OUT'
Click to expand...
Click to collapse
Nice
Have a few things to add, so guess 3.0.2 wont be far off
Captain was, right, upload and move along, things get way faster that way... thanks!
Windows should be ready too, just found something "interesting" though, so may need to check where that came from
sabpprook said:
Works like a charm!!!
Checking keyfile state
Moving keyfile to 2PS5_keyfile_2.15.709.6.bin
Click to expand...
Click to collapse
windows version uploaded as well, next one will be 3.0.2 i guess
.... which if you upload your new keyfile will be included in it as well
Version 3.0.1 works fine on Win7 64bit,thanks
---------- Post added at 08:49 PM ---------- Previous post was at 08:21 PM ----------
Can you make this program noob friendly?
On windows?
I mine ,double click on program.exe
Sorry for my bad English?
Terraalpha said:
Version 3.0.1 works fine on Win7 64bit,thanks
---------- Post added at 08:49 PM ---------- Previous post was at 08:21 PM ----------
Can you make this program noob friendly?
On windows?
I mine ,double click on program.exe
Sorry for my bad English?
Click to expand...
Click to collapse
No.
OK?
Anyone having issues with the tool?
@nkk71
@topjohnwu has volunteered to try to compile the tool for Mac users. I'm curious to see how that turns out....

Bootloop with Magisk 16.0, 16.1, 16.2

Dears,
just got a dual sim S9+ (SM-G965F/DS).
Magisk v16 correctly completes setup via TWRP, but it's then impossible to boot system, it goes bootloop on Galaxy logo.
Nothing to do with 16.1 and 16.2...
Here's installation output:
Code:
Installing zip file '/external_sd/Magisk-v16.2(1620).zip'
Checking for Digest file...
Skipping Digest check: no Digest file found
I:Update binary zip
Verifying package compatibility...
Package doesn't contain compatibility.zip entry
I:Zip does not contain SELinux file_contexts file in its root.
I:Legacy property environment not used in updater.
Archive: /external_sd/Magisk-v16.2(1620).zip
inflating: META-INF/com/google/android/update-binary
inflating: META-INF/com/google/android/updater-script
inflating: addon.d/99-magisk.sh
inflating: arm/magiskboot
inflating: arm/magiskinit
inflating: arm64/magiskboot
inflating: arm64/magiskinit
inflating: chromeos/futility
inflating: chromeos/kernel.keyblock
inflating: chromeos/kernel_data_key.vbprivk
inflating: common/boot_patch.sh
inflating: common/magisk.apk
inflating: common/util_functions.sh
inflating: x64/magiskboot
inflating: x64/magiskinit
inflating: x86/magiskboot
inflating: x86/magiskinit
inflating: META-INF/MANIFEST.MF
inflating: META-INF/CERT.SF
inflating: META-INF/CERT.RSA
************************
* Magisk v16.2 Installer
************************
- Mounting /system, /vendor
- Found boot/ramdisk image: /dev/block/sda10
- Found dtbo image: /dev/block/sda9
- Device platform: arm64
- Constructing environment
Unable to locate class 'com/topjohnwu/magisk/utils/BootSigner'
java.lang.ClassNotFoundException: Didn't find class "com.topjohnwu.magisk.utils.BootSigner" on path: DexPathList[[zip file "/dev/tmp/install/common/magisk.apk"],nativeLibraryDirectories=[/system/lib64, /system/vendor/lib64, /system/lib64, /system/vendor/lib64]]
at dalvik.system.BaseDexClassLoader.findClass(BaseDexClassLoader.java:93)
at java.lang.ClassLoader.loadClass(ClassLoader.java:379)
at java.lang.ClassLoader.loadClass(ClassLoader.java:312)
Exception in thread "main" java.lang.ClassNotFoundException: Didn't find class "com.topjohnwu.magisk.utils.BootSigner" on path: DexPathList[[zip file "/dev/tmp/install/common/magisk.apk"],nativeLibraryDirectories=[/system/lib64, /system/vendor/lib64, /system/lib64, /system/vendor/lib64]]
at dalvik.system.BaseDexClassLoader.findClass(BaseDexClassLoader.java:93)
at java.lang.ClassLoader.loadClass(ClassLoader.java:379)
at java.lang.ClassLoader.loadClass(ClassLoader.java:312)
- Unpacking boot image
MagiskBoot v16.2(1620) (by topjohnwu) - Boot Image Modification Tool
Parsing boot image: [/dev/block/sda10]
KERNEL [28839944]
RAMDISK [6544480]
SECOND [0]
EXTRA [1787904]
PAGESIZE [2048]
NAME [SRPQH16A001KU]
CMDLINE [androidboot.selinux=permissive androidboot.selinux=permissive]
CHECKSUM [1572fc1364f258d10345a47fb99510abd970baaf]
KERNEL_FMT [raw]
RAMDISK_FMT [gzip]
- Checking ramdisk status
MagiskBoot v16.2(1620) (by topjohnwu) - Boot Image Modification Tool
Loading cpio: [ramdisk.cpio]
- Magisk patched image detected
MagiskBoot v16.2(1620) (by topjohnwu) - Boot Image Modification Tool
Loading cpio: [ramdisk.cpio]
Cannot find the file entry [ramdisk.cpio.xz]
Restore [.backup/init] -> [init]
Remove [.backup]
Remove [.backup/.magisk]
Remove [.backup/.sha1]
Dump cpio: [ramdisk.cpio]
- Patching ramdisk
MagiskBoot v16.2(1620) (by topjohnwu) - Boot Image Modification Tool
Loading cpio: [ramdisk.cpio]
Add entry [init] (0750)
Patch with flag KEEPVERITY=[true] KEEPFORCEENCRYPT=[false]
Save SHA1: [026b8c6be08c46e2c8b5c6137f64c6ba8fa44d4a] -> [.backup/.sha1]
Loading cpio: [ramdisk.cpio.orig]
Backup mismatch entry: [init] -> [.backup/init]
Dump cpio: [ramdisk.cpio]
MagiskBoot v16.2(1620) (by topjohnwu) - Boot Image Modification Tool
MagiskBoot v16.2(1620) (by topjohnwu) - Boot Image Modification Tool
- Repacking boot image
MagiskBoot v16.2(1620) (by topjohnwu) - Boot Image Modification Tool
Parsing boot image: [/dev/block/sda10]
KERNEL [28839944]
RAMDISK [6544480]
SECOND [0]
EXTRA [1787904]
PAGESIZE [2048]
NAME [SRPQH16A001KU]
CMDLINE [androidboot.selinux=permissive androidboot.selinux=permissive]
CHECKSUM [1572fc1364f258d10345a47fb99510abd970baaf]
KERNEL_FMT [raw]
RAMDISK_FMT [gzip]
Repack to boot image: [new-boot.img]
KERNEL [28839944]
RAMDISK [6544480]
SECOND [0]
EXTRA [1787904]
PAGESIZE [2048]
NAME [SRPQH16A001KU]
CMDLINE [androidboot.selinux=permissive androidboot.selinux=permissive]
CHECKSUM [1572fc1364f258d10345a47fb99510abd970baaf]
MagiskBoot v16.2(1620) (by topjohnwu) - Boot Image Modification Tool
Cleaning up...
- Flashing new boot image
- Unmounting partitions
- Done
I:Updater process ended with RC=0
I:Install took 13 second(s).
I'm also attaching full TWRP log, I'm returning error
Code:
[COLOR="#FF0000"]Failed to mount '/cpefs' (Read-only file system)[/COLOR]
upon TWRP launch.
Any suggestions?
Tks.
same thing. Seems that there is no working variant with Magisk right now
https://forum.xda-developers.com/apps/magisk/official-magisk-v7-universal-systemless-t3473445/page5
"I'm aware of Magisk currently doesn't work on Samsung S9(+). It is most likely caused by yet another weird Treble implementation from OEMs. So the next goal is to of course add support for these new Sammys."
Suggestion is to use Super SU because even V.16.3 Magisk does NOT support the S9+
Check here I made a Tutorial for Magisk.
https://forum.xda-developers.com/galaxy-s9/how-to/root-galaxy-s9-s9-official-stock-nougat-t3780726
Same problem here with Magisk 16.4 - and Magisk uninstaller fails.

Magisk doesn't work

Flashed Magisk via TWRP, Magisk seems fine and root is working fine but whenever I try to install a module it says (!) /data/adb/magisk_merge.img mount failed... abort ! Installation failed
Copying zip to temp directory
- Installing Magisk_Manager_for_Recovery_Mode_(mm)-2018.8.1.zip
Archive: /data/user/0/com.topjohnwu.magisk/cache/install.zip
inflating: module.prop
update-binary: line 192: make_ext4fs: not found
losetup: /data/adb/magisk_merge.img: No such file or directory
losetup: /data/adb/magisk_merge.img: No such file or directory
losetup: /data/adb/magisk_merge.img: No such file or directory
Magisk Manager for Recovery Mode (mm) (mm) 2018.8.1
VR25 @ xda-developers
Powered by Magisk (@topjohnwu)
- Creating /data/adb/magisk_merge.img with size 64M
- Mounting /data/adb/magisk_merge.img to /dev/tmp/magisk_img
losetup: /data/adb/magisk_merge.img: No such file or directory
losetup: /data/adb/magisk_merge.img: No such file or directory
losetup: /data/adb/magisk_merge.img: No such file or directory
losetup: /data/adb/magisk_merge.img: No such file or directory
losetup: /data/adb/magisk_merge.img: No such file or directory
(!) /data/adb/magisk_merge.img mount failed... abort
! Installation failed
Couldn't hook log on mobile so I copied it
Thanks
Reflash magisk again
Nico1300 said:
Flashed Magisk via TWRP, Magisk seems fine and root is working fine but whenever I try to install a module it says (!) /data/adb/magisk_merge.img mount failed... abort ! Installation failed
Click to expand...
Click to collapse
It would be really useful if you added :
1. The rom you're on
2. Magisk version
3. Magisk manager version
4. The module you're trying to install
5. Have you tried any other modules

Categories

Resources