mirror of
https://github.com/bkerler/mtkclient.git
synced 2024-11-14 11:14:56 -05:00
MT8163 legacy fix, MT8168 fix, sla fix
Some checks failed
Python application / Test (push) Has been cancelled
Some checks failed
Python application / Test (push) Has been cancelled
This commit is contained in:
parent
8d36ea4ef8
commit
279e364838
7 changed files with 10 additions and 6 deletions
|
@ -521,6 +521,8 @@ class DALegacy(metaclass=LogBase):
|
|||
self.emmc = EmmcInfo(self.config, self.usbread(0x5C))
|
||||
self.sdc = SdcInfo(self.config, self.usbread(0x1C))
|
||||
self.flashconfig = ConfigInfo(self.usbread(0x26))
|
||||
if self.config.hwcode == 0x8163:
|
||||
status=self.usbread(4)
|
||||
pi = PassInfo(self.usbread(0xA))
|
||||
if pi.ack == 0x5A:
|
||||
return True
|
||||
|
|
|
@ -351,7 +351,7 @@ class LegacyExt(metaclass=LogBase):
|
|||
else:
|
||||
self.info("SEJ Mode: No meid found. Are you in brom mode ?")
|
||||
if self.config.chipconfig.gcpu_base is not None:
|
||||
if self.config.hwcode in [0x335, 0x8167, 0x8163, 0x8176]:
|
||||
if self.config.hwcode in [0x335, 0x8167, 0x8168, 0x8163, 0x8176]:
|
||||
self.info("Generating gcpu mtee2 key...")
|
||||
mtee2 = hwc.aes_hwcrypt(btype="gcpu", mode="mtee")
|
||||
if mtee2 is not None:
|
||||
|
|
|
@ -8,7 +8,7 @@ import sys
|
|||
from binascii import hexlify
|
||||
from struct import pack, unpack
|
||||
|
||||
from Cryptodome.Util.number import long_to_bytes
|
||||
from Cryptodome.Util.number import bytes_to_long, long_to_bytes
|
||||
|
||||
from mtkclient.Library.Auth.sla import generate_da_sla_signature
|
||||
from mtkclient.Library.DA.xflash.xflash_flash_param import NandExtension
|
||||
|
|
|
@ -905,7 +905,7 @@ class XmlFlashExt(metaclass=LogBase):
|
|||
else:
|
||||
self.info("SEJ Mode: No meid found. Are you in brom mode ?")
|
||||
if self.config.chipconfig.gcpu_base is not None:
|
||||
if self.config.hwcode in [0x335, 0x8167, 0x8163, 0x8176]:
|
||||
if self.config.hwcode in [0x335, 0x8167, 0x8168, 0x8163, 0x8176]:
|
||||
self.info("Generating gcpu mtee2 key...")
|
||||
mtee2 = hwc.aes_hwcrypt(btype="gcpu", mode="mtee")
|
||||
if mtee2 is not None:
|
||||
|
|
|
@ -798,7 +798,9 @@ class DAXML(metaclass=LogBase):
|
|||
return None
|
||||
|
||||
def change_usb_speed(self):
|
||||
return self.send_command(self.Cmd.cmd_can_higher_usb_speed())
|
||||
resp = self.send_command(self.Cmd.cmd_can_higher_usb_speed())
|
||||
if "Unsupported" in resp:
|
||||
return False
|
||||
|
||||
def read_partition_table(self) -> tuple:
|
||||
self.send_command(self.Cmd.cmd_read_partition_table(), noack=True)
|
||||
|
|
|
@ -91,7 +91,7 @@ class HwCrypto(metaclass=LogBase):
|
|||
elif mode == "mtee":
|
||||
if self.hwcode in [0x321]:
|
||||
return self.gcpu.mtk_gcpu_mtee_6735()
|
||||
elif self.hwcode in [0x8167, 0x8163, 0x8176]:
|
||||
elif self.hwcode in [0x8168, 0x8167, 0x8163, 0x8176]:
|
||||
return self.gcpu.mtk_gcpu_mtee_8167()
|
||||
elif btype == "dxcc":
|
||||
if mode == "fde":
|
||||
|
|
|
@ -266,7 +266,7 @@ class GCpu(metaclass=LogBase):
|
|||
self.reg.GCPU_REG_MSC = 0x80FF1800
|
||||
self.reg.GCPU_AXI = 0x887F
|
||||
self.reg.GCPU_UNK2 = 0
|
||||
elif self.hwcode == [0x8163, 0x8176]:
|
||||
elif self.hwcode == [0x8163, 0x8176, 0x8168]:
|
||||
self.write32(CLR_CLK_GATING_CTRL2, self.read32(CLR_CLK_GATING_CTRL2) | 0x8000000)
|
||||
self.reg.GCPU_REG_CTL &= 0xFFFFFFF0
|
||||
self.reg.GCPU_REG_CTL |= 0xF
|
||||
|
|
Loading…
Reference in a new issue