wow thats useful.....
Just showing what it does LOL... Nothing. Perhaps I could have just said it does nothing, eh? WTF does lk mean anyway?
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
wow thats useful.....
ROM:00030BAC aRead_modem_ima DCB "READ_MODEM_IMAGE_CERTIFICATE",0
ROM:00030BC9 DCB 0
ROM:00030BCA DCB 0
ROM:00030BCB DCB 0
ROM:00030BCC aRead_applicati DCB "READ_APPLICATION_CERTIFICATE",0
ROM:00030BE9 DCB 0
ROM:00030BEA DCB 0
ROM:00030BEB DCB 0
ROM:00030BEC aRead_boot_cert DCB "READ_BOOT_CERTIFICATE",0
ROM:00030C02 ; ---------------------------------------------------------------------------
ROM:00030C02 MOVS R0, R0
ROM:00030C02 ; ---------------------------------------------------------------------------
ROM:00030C04 aRead_oemboot1_ DCB "READ_OEMBOOT1_CERTIFICATE",0
ROM:00030C1E ; ---------------------------------------------------------------------------
ROM:00030C1E MOVS R0, R0
ROM:00030C1E ; ---------------------------------------------------------------------------
ROM:00030C20 aRead_unlock_de DCB "READ_UNLOCK_DEVICE_CERTIFICATE",0
ROM:00030C3F DCB 0
ROM:00030C40 aModme_image_au DCB "MODME_IMAGE_AUTHENTICATION",0
ROM:00030C5B DCB 0
ROM:00030C5C aApplication_im DCB "APPLICATION_IMAGE_AUTHENTICATION",0
ROM:00030C7D DCB 0
ROM:00030C7E DCB 0
ROM:00030C7F DCB 0
ROM:00030C80 aBoot_image_aut DCB "BOOT_IMAGE_AUTHENTICATION",0
ROM:00030C9A DCB 0
ROM:00030C9B DCB 0
ROM:00030C9C aOemboot1_image DCB "OEMBOOT1_IMAGE_AUTHENTICATION",0
ROM:00030CBA DCB 0
ROM:00030CBB DCB 0
ROM:00030CBC aUnlock_device_ DCB "UNLOCK_DEVICE_AUTHENTICATION",0
ROM:00030CD9 DCB 0
ROM:00030CDA DCB 0
ROM:00030CDB DCB 0
ROM:00030CDC aAnti_rollback DCB "ANTI_ROLLBACK",0
ROM:00030CEA ; ---------------------------------------------------------------------------
ROM:00030CEA MOVS R0, R0
ROM:00030CEA ; ---------------------------------------------------------------------------
ROM:00030CEC aBackdoor DCB "BACKDOOR",0
This is what I get:
Code:Microsoft Windows XP [Version 5.1.2600] (C) Copyright 1985-2001 Microsoft Corp. C:\Documents and Settings\Rich>adb devices List of devices attached M931-33975fb8 device C:\Documents and Settings\Rich>adb reboot bootloader C:\Documents and Settings\Rich>fastboot oem unlock ... OKAY [ 0.000s] finished. total time: 0.000s C:\Documents and Settings\Rich>fastboot getvar all all: finished. total time: 0.000s C:\Documents and Settings\Rich>fastboot getvar kernel kernel: lk finished. total time: 0.000s C:\Documents and Settings\Rich>
I was on d and reboot bootloader maintained fastboit. System/etc/security/cacerts is our certificates
This is what I get:
Code:Microsoft Windows XP [Version 5.1.2600] (C) Copyright 1985-2001 Microsoft Corp. C:\Documents and Settings\Rich>adb devices List of devices attached [COLOR=Red]M931[/COLOR]-33975fb8 device [COLOR=Red]<--------------------[/COLOR] C:\Documents and Settings\Rich>adb reboot bootloader C:\Documents and Settings\Rich>fastboot oem unlock ... OKAY [ 0.000s] finished. total time: 0.000s C:\Documents and Settings\Rich>fastboot getvar all all: finished. total time: 0.000s C:\Documents and Settings\Rich>fastboot getvar kernel kernel: lk finished. total time: 0.000s C:\Documents and Settings\Rich>
I was on d and reboot bootloader maintained fastboit. System/etc/security/cacerts is our certificates
Huawei Premia.
pssst wrong phone
Yeah yeah I know.... Keeping an eye on you misfits to try unlocking my phone LOL... We share the same chipset, so there must be something I can use here or vice versa.
Fine, I'll leave
Oh wait....
<----- I have a Motion I have yet to unlock, I'm still gonna stalk y'all
the PBL ("Primary Bootloader"), which resides in mask ROM, verifies the integrity of the SBL1 ("Secondary Bootloader") via a SHA1 hash. Each stage of the boot chain verifies the next stage using RSA signatures
Already reading it. Believe it has been linked at least twice today...
It has something to do with the kernel your phone uses. Our phone returns the same.
@zimlocks: Looking at the decompiled aboot, I think you may be right. I found the strings for oem unlock, oem device-lock, and oem device-info, and as far as I can tell, they simply return.
Now this is interesting, and I will be spending some time looking at this:
Code:ROM:00030BAC aRead_modem_ima DCB "READ_MODEM_IMAGE_CERTIFICATE",0 ROM:00030BC9 DCB 0 ROM:00030BCA DCB 0 ROM:00030BCB DCB 0 ROM:00030BCC aRead_applicati DCB "READ_APPLICATION_CERTIFICATE",0 ROM:00030BE9 DCB 0 ROM:00030BEA DCB 0 ROM:00030BEB DCB 0 ROM:00030BEC aRead_boot_cert DCB "READ_BOOT_CERTIFICATE",0 ROM:00030C02 ; --------------------------------------------------------------------------- ROM:00030C02 MOVS R0, R0 ROM:00030C02 ; --------------------------------------------------------------------------- ROM:00030C04 aRead_oemboot1_ DCB "READ_OEMBOOT1_CERTIFICATE",0 ROM:00030C1E ; --------------------------------------------------------------------------- ROM:00030C1E MOVS R0, R0 ROM:00030C1E ; --------------------------------------------------------------------------- ROM:00030C20 aRead_unlock_de DCB "READ_UNLOCK_DEVICE_CERTIFICATE",0 ROM:00030C3F DCB 0 ROM:00030C40 aModme_image_au DCB "MODME_IMAGE_AUTHENTICATION",0 ROM:00030C5B DCB 0 ROM:00030C5C aApplication_im DCB "APPLICATION_IMAGE_AUTHENTICATION",0 ROM:00030C7D DCB 0 ROM:00030C7E DCB 0 ROM:00030C7F DCB 0 ROM:00030C80 aBoot_image_aut DCB "BOOT_IMAGE_AUTHENTICATION",0 ROM:00030C9A DCB 0 ROM:00030C9B DCB 0 ROM:00030C9C aOemboot1_image DCB "OEMBOOT1_IMAGE_AUTHENTICATION",0 ROM:00030CBA DCB 0 ROM:00030CBB DCB 0 ROM:00030CBC aUnlock_device_ DCB "UNLOCK_DEVICE_AUTHENTICATION",0 ROM:00030CD9 DCB 0 ROM:00030CDA DCB 0 ROM:00030CDB DCB 0 ROM:00030CDC aAnti_rollback DCB "ANTI_ROLLBACK",0 ROM:00030CEA ; --------------------------------------------------------------------------- ROM:00030CEA MOVS R0, R0 ROM:00030CEA ; --------------------------------------------------------------------------- ROM:00030CEC aBackdoor DCB "BACKDOOR",0