In relation to ROMs, what is a mirror? I see that on there a lot and don't know what they are and what purpose they serve.
Mirror is not a ROM term at all, but a web term. A mirror is a server that is hosting a file for download. The idea is that in order to either reduce load on the original server or expedite the download by allowing you to choose a server closer to you. The term mirror is derived from the idea that it is a remote server with an exact copy of the original file. Because of the mirror system being out of the original content provider's hands, a checksum of the download is usually provided to help ensure that the file has not been modified in any way.
lineman78 said:
Mirror is not a ROM term at all, but a web term. A mirror is a server that is hosting a file for download. The idea is that in order to either reduce load on the original server or expedite the download by allowing you to choose a server closer to you. The term mirror is derived from the idea that it is a remote server with an exact copy of the original file. Because of the mirror system being out of the original content provider's hands, a checksum of the download is usually provided to help ensure that the file has not been modified in any way.
Click to expand...
Click to collapse
Awesome. Thanks. Do you know how to check the 'checksum' or 'md5sum' as I've seen it? I'm working on the MacOS platform.
BTW - do you know how to get a term added to the glossary?
Not so sure about the "checksum" thingy, try searching the forums??
However, adding a word is as simple as going:
Settings > Language & Keyboard> Touch Input> User Dictionary> Add New OR you can just spell the word when you're texting (for example) and click the correct spelling instead of the suggested spelling, that adds it too.
Awesome. Thanks. Do you know how to check the 'checksum' or 'md5sum'
Click to expand...
Click to collapse
On linux and windows you go to file directory and type md5sum {file name}. Couldn't see it being different for mac, don't forget the .zip, .apk, etc. at the end of the file name.
Sent from my ADR6300 using Tapatalk
On mac the command is md5 (filepath)
HeroMeng said:
On mac the command is md5 (filepath)
Click to expand...
Click to collapse
I don't have my UNIX book in my office, but this sounds right. OSx is based on FreeBSD, so it has a md5 utility built in. Just open up the terminal and type the above command. On windows, you will need to download a project called unixutils, which can be found on sourceforge. The command is md5sum {filepath}. But in order to get this working you will either need to provide the location of md5sum.exe or add the wbin folder from unixutils to your path environment variable.
I have Mac and if I type for example this:
Code:
md5 /Users/kevinsimac/downloads/darchdroid-v265.zip
it returns
Code:
MD5 (/Users/kevinsimac/Downloads/darchdroid-v265.zip) = 9a7af785d5ba97bbbac1ea044c99b420
What's the whole purpose of the md5 in relation to our work here?
jerry43812 said:
What's the whole purpose of the md5 in relation to our work here?
Click to expand...
Click to collapse
As I explained above, the MD5 is usually included for files hosted on a server other than the content provider so that you can ensure that the file has not been modified. For example, I could volunteer to be a mirror for Fresh and if flipz didn't post the md5, I could add an apk into system that could do something like send me your location or a copy of all your e-mails or something else and you wouldn't know that I had modified the file since flipz handed it off to me.
With the extent you need to check hash numbers I have a solid tool I use for verifing files md5.
http://implbits.com/HashTab.aspx
Haxcid said:
With the extent you need to check hash numbers I have a solid tool I use for verifing files md5.
http://implbits.com/HashTab.aspx
Click to expand...
Click to collapse
That's convenient... I've been using this:
http://etree.org/md5com.html
Or maybe I'm a liar. I have no idea where my md5sum.exe comes from. It works the same as the linux one.
I can't remember the name of the one i used to verify the md5sum for cwm. It's just an exe that you drag the file over and it pops up w/ a window that says the md5sum and date created and some other stuff.
This mainly for anyone creating roms, themes, etc, etc
Is it possible for you to supply an MD5SUM check for your downloads so users know there downloads are not corrupted in any format.
regards
if they don't supply the md5 sums you can check with winrar, with test archive if there is no error then you can flash it. or if you like, you can check with md5sums program search with google. i use md5ums 1.2
LG BIN/TOT Extractor
This is a tool for extracting LG Bin/Tot Firmware files.
I update the git a lot more than what I update the thread so check there for latest news.
Features
Split Bin file into relevant partitions
Split Tot file into relevant blocks and merge blocks into partitions
Display AP Header
Display GPT Header
Extract Header from Bin/Tot File
Features I like to implement (and probably won't get around to)
Extracting boot img (The tools currently available don't work in all cases and it's very easy to read the header since it's open source.)
Extracting ext4 partitions. So that it's easy to access the file. Theres already other tools that can do this so this isn't essential.
Mergeing tot partitions based on data from partitions itself and not GPT
Inject Alternate Data into partitions. I'll block access to X-loader,U-boot and GPT so that You can't kill your phone.
Source
https://github.com/Xonar/LGBinExtractor
Confirmed to work with
Quite a few phones.
I lost track of which ones work.
To check just run with -daph. You'll get file information if it works and either garbled data or an error message if it doesn't.
If your phones not supported follow the steps on git readme.
Thanks
SnowLeopardJB - for lots and lots of testing
navossoc - his tool that extracts kdz and wdb files
vim1 - D821 support
scotty755 - LGL22 support
tkawajir - L-04E and LG G Flex F340K support
If you feel I forgot to thank you, msg me and I'll add you.
If it can extract BIN files then yes. We believe the nandroid V30* of KU5900 that was supplied was incomplete. So If KDZ is converted to BIN and FLS (which we can), then extract contents of BIN, then you can have complete files without looking for Koreans and Chinese to relay that the nandroid was incomplete and can have untampered files.
xonar_ said:
Question to other Devs
Will you use a tool like this or am I wasting my time?
Is a tool like this allowed or would it be considered reverse engineering? (If its not allowed I'm going to stop IMMEDIATELY)
Click to expand...
Click to collapse
Yes I will. If I myself can build a program to extract this EFI partition..
It is reverse engineering, but I don't know if it's legal or not (in this case), but for me it's legal as I'm considered this to educational purpose
Many others tool was created to have purpose like this, for example http://psas.revskills.de/?q=node/5
-CMIIW-
I've attached an image of the system partition of the V20E_00 for you guys to see.
I am going to download the v30H_00.kdz today. So I'll keep you posted about how the extracting goes. I probably won't have time to check it out until the weekend so please don't hold your breath.
I've only recently managed to find the necessary information about the ext4 file system to integrate the functionality into my tool. For now Ext2Read can extract the ext4 file system just fine. I'll add that somewhere over the weekend (Provided something doesn't come up).
Could you as soon, as you are able to unpack it fully maybe upload a complete backup of the system partition and also system2, cause we think, that in the nandroid there are some files missing and we need those, to probably be able to boot that system. Great job btw
Thanks for the positive feedback.
I am getting the v30h_00.kdz in a few hours (I got a friend to download it for me, I don't have that much cap ).
There is no way I will be able to upload the file since it will be big but if it works I'll post the tool and how to do it.
GitHub is giving me an error : "Page did not respond in a timely fashion". I am going to try again tonight to post the source.
I already tried to extract the bin files, but I didn't see any pattern to know where start or ends a partition.
Some partitions you can identify by it's header and try to extract the file size from there (i did that with recovery.exe).
If you know for sure the partition name and the address, I can improve the recovery.exe to patch always the right partition.
So, what is the trick?
[]'s
navossoc said:
I already tried to extract the bin files, but I didn't see any pattern to know where start or ends a partition.
Some partitions you can identify by it's header and try to extract the file size from there (i did that with recovery.exe).
If you know for sure the partition name and the address, I can improve the recovery.exe to patch always the right partition.
So, what is the trick?
[]'s
Click to expand...
Click to collapse
The first meg of the file contains the names of the data blocks size on file,size on disk and where they start on file. I'll post exactly how it is set out later.
The data blocks aren't only partitions though for example the first one is the GPT header with it's corresponding entries and also some blocks are empty.
I recognized the start the two partitions from your tool.
Sent from my LG Optimus Black
xonar_ said:
The first meg of the file contains the names of the data blocks size on file,size on disk and where they start on file. I'll post exactly how it is set out later.
The data blocks aren't only partitions though for example the first one is the GPT header with it's corresponding entries and also some blocks are empty.
I recognized the start the two partitions from your tool.
Sent from my LG Optimus Black
Click to expand...
Click to collapse
You are talking about the first 1MB from BIN? right?
They are using little endian or big endian to represent the numbers?
The name of the sections I already knew, but never found the initial offset.
I will try to take a look later.
[]'s
navossoc said:
You are talking about the first 1MB from BIN? right?
They are using little endian or big endian to represent the numbers?
The name of the sections I already knew, but never found the initial offset.
I will try to take a look later.
[]'s
Click to expand...
Click to collapse
Yes the BIN. They are using little endian. All the offsets and sizes are in LBA's (512 bytes in this case) with LBA 0 starting at 0x100000.
Sent from my LG Optimus Black
Source of Bin Fls Extractor (So far)
GitHub isn't working out as planned. The client stopped downloading in the middle and I don't want to waste more cap so here is the source as an attachment.
This is still a work in progress and is only confirmed to work with v20E_00 South Africa.
Linux users can just mount the *.img file of system to access it. Windows users have to use a tool like Ext2Read. Mac users I'm not sure : Google it.
EDIT : I wont be able to get the v30 kdz for another day unfortunately. Feel free to try and change my tool to work with it.
EDIT2: These sources are old. I'll upload my fixed ones later. Reads in chunks and works on P970 and KU5900 ( I don't have any other files to test it with but it should work with almost all BIN files extracted from kdz files )
xonar_ said:
GitHub isn't working out as planned. The client stopped downloading in the middle and I don't want to waste more cap so here is the source as an attachment.
This is still a work in progress and is only confirmed to work with v20E_00 South Africa.
Linux users can just mount the *.img file of system to access it. Windows users have to use a tool like Ext2Read. Mac users I'm not sure : Google it.
EDIT : I wont be able to get the v30 kdz for another day unfortunately. Feel free to try and change my tool to work with it.
Click to expand...
Click to collapse
Nah! The damn trick was the 512 bytes + 0x100000 base.
I never thinked about it...
I take a look at your code, I understand the whole concept now.
I have successfully extracted the system.img and system2.img from the V30H_00.kdz
Nice, maybe later I can do some modifications on recovery.exe, so they can find always the correct partition for recovery.img. (without the user choose one)
[]'s
navossoc said:
Nah! The damn trick was the 512 bytes + 0x100000 base.
I never thinked about it...
I take a look at your code, I understand the whole concept now.
I have successfully extracted the system.img and system2.img from the V30H_00.kdz
Nice, maybe later I can do some modifications on recovery.exe, so they can find always the correct partition for recovery.img. (without the user choose one)
[]'s
Click to expand...
Click to collapse
Nice! Great job you guys. :good:
navossoc said:
Nah! The damn trick was the 512 bytes + 0x100000 base.
I never thinked about it...
I take a look at your code, I understand the whole concept now.
I have successfully extracted the system.img and system2.img from the V30H_00.kdz
Nice, maybe later I can do some modifications on recovery.exe, so they can find always the correct partition for recovery.img. (without the user choose one)
[]'s
Click to expand...
Click to collapse
can you upload system files asap?
George Jetson said:
can you upload system files asap?
Click to expand...
Click to collapse
http://forum.xda-developers.com/showpost.php?p=31443301&postcount=270
Thanks to navossoc there
navossoc said:
Nah! The damn trick was the 512 bytes + 0x100000 base.
I never thinked about it...
I take a look at your code, I understand the whole concept now.
I have successfully extracted the system.img and system2.img from the V30H_00.kdz
Nice, maybe later I can do some modifications on recovery.exe, so they can find always the correct partition for recovery.img. (without the user choose one)
[]'s
Click to expand...
Click to collapse
That's good news.
I won't be able to work on the program during the rest of this week. With the system files extracted there's nothing that needs to be urgently done.
Next Step is to to try and build the BIN from other files. I think I can improve on your recovery.exe to add su binary and apk aswel (Might take a bit longer since I need to extract the ext4 partition, add su then put it back together )
Well, it's just a beta, because it use too much ram to write the files.
I need to read the file in chunks, but, for now it's a good prototype, we can using it.
extract.7z
Code:
CRC32: 2199d10f
MD5: 5b8d8031ff5d66ec2832d182e98505be
SHA-1: b6d729a20d4370e25ebc4eddfc27e25673b1d2f2
To use the tool is just run...
Code:
extract.exe filename_AP.bin
It should work on any bin file, tested on P920, P970 and KU5900.
Please report any error.
[]'s
Thanks navossoc its working well on ginger p970 bin file.
Great stuff thanks alot! You to make a great team.
Sent from my LG-P920 using xda app-developers app
Now how can we make a new bin file with that img files?
Figured out you can d/l the bin file (7.2.3, etc) from Amazon, change .bin to .apk. Then find your launcher's "view apk" function. Open wide, then extract the system file you (ahem) mislaid, and breathe. It's how I found the tts file I've been pestering everybody for.
It can be done on a PC, as Amazón lets you download the update on to any device and it is basicaly a zip file....only change .bin to .zip and.... voila!
-
Could it be posible to modify the updates to not unroot the target kindles?
Look at the file atatched. Is a text extracted from inside the classes.dex archive inside IvonaTTS.apk file.
-
It contains two list in alphabetical order of what seems commands of a script language inside Ivona and names of files or variables.
-
All the vox files inside the list are terminated with an "i", not a "v" as the Ivona voices downloaded from Google play.
-
"com.android.settings
com.android.settings.TTS_SETTINGS
com.android.settings.TextToSpeechSettings
com.android.settings.VOICE_INPUT_OUTPUT_SETTINGS
com.android.vending.INSTALL_REFERRER
com.google.intent.action.START_TTS_SERVICE_BETA
com.google.intent.category.TTS_BETA
com.google.tts #com.google.tts.ConfigurationManager
com.google.tts.ITTS
com.google.tts.ITTSCallback
com.google.tts.ITtsBeta
com.google.tts.ITtsCallbackBeta
com.ivona.tts "
-
You see what I see?
I'll have to study it; I'm no programmer for sure. There's something there that would allow a skilled operator to substitute a "v" voice (like Gwyneth) for one of the "i"?
gflorezarroyo said:
It can be done on a PC, as Amazón lets you download the update on to any device and it is basicaly a zip file....only change .bin to .zip and.... voila!
-
Could it be posible to modify the updates to not unroot the target kindles?
Click to expand...
Click to collapse
I think I could do it pretty easily. But without a recovery I'm too chicken.
Sent from my KFOT using Tapatalk 2
BELASCO said:
I'll have to study it; I'm no programmer for sure. There's something there that would allow a skilled operator to substitute a "v" voice (like Gwyneth) for one of the "i"?
Click to expand...
Click to collapse
"i" is the number of beta version, I presume, as the downloaded versons have a "v". The secuence could be "i", now "v", the next "o", then "n" and "a"... And at last the final versión.
-
That does'nt mean they are not compatible, but the program has to know what is looking for, and then is necesary to change the versión in that list and in every place that appeared so it could use newest voices.
It would be easier to change the TTS engine and language on some hidden settings.....
-
I've been vivisecting the various settings menus looking for ideas. Makes me wish I'd studied programming in school instead of redheads & rum.
Anyone reading this who knows how to enable the blocked TTS SETTINGS menu on the KFHD, feel free to speak up. We'll only resent your genius briefly. I managed to recover the Ivona/Salli voice, but I'd rather be hearing Gwyneth.