Okay, a little more research and info for those that might care or be interested:
- I already had 3 OTA.zip files downloaded on my desktop (4.1.2 JZO54K, 4.4.2 KOT49H, 4.4.3 KTU84l) and only the 4.1.2 OTA included a bootloader.raw file whose MD5 (b6c51cf13d9d38e62875d1aa4fbc248d) doesn't match any of the ones mentioned above.
So, I decided to download 13 other "nakasi" OTAs (from
here -- credit and thanks to XDA's oldblue910) that covered JWR66Y (4.3), KRT16S (4.4), KOT49H (4.4.2), KTU84L (4.4.3), and KTU84P (4.4.4) and only the JWR66Y (4.3) ones had any bootloaders included in them.
Interestingly enough, that bootloader's MD5 was
5bdb2e87370cdb1a7ea14bb0c3e21390 which indeed matches the 4.3.0, 4.4.3, and 4.4.4 factory image bootloaders that I documented previously:
So, I'm not sure what to make of all of this or if it really tells us anything...:dontknow:
Probably the only real way to know would be to flash the "old" and "new" bootloaders in different combinations to see if there are really any restrictions or if DC's bootloader flashing was simply case of a wonky, transient failed flash. I'm not anxious or in a hurry to do this myself, but if / when Android L is released, I might re-visit this and do these flashes prior to installing "L".
I've actually never used Wug's or MSkip's toolkits, so I don't know for sure if they include the sleep/pause and the reboot bootloader between each of the various steps--if they don't or if they allow the user to "press return" to continue without the possibly-requisite pause and bootloader reboot, then that might explain what happeded to DC (and others)?
That might also imply that the bootloader in question was not corrupt or mispackaged...
Thoughts?