Difference between revisions of "Talk:Baker 8B117 (iPhone2,1)"

From The iPhone Wiki
Jump to: navigation, search
m (IAdam1n moved page Talk:Baker 8B117 (iPhone 3GS) to Talk:Baker 8B117 (iPhone2,1): New format.)
 
(4 intermediate revisions by 2 users not shown)
Line 1: Line 1:
 
== FS key is wrong ==
 
== FS key is wrong ==
  +
genpass gives the key in the article when run with the update ramdisk, and <tt>59ebcd47de964e5479ce2e2dc583284c863b85fefc0a58d68871a941a76c125367bffd2e</tt> when run with the restore ramdisk. Neither one produces a valid image when using vfdecrypt to decrypt the filesystem DMG. I haven't figured out how to get the correct one; there's talk that genpass fails on ramdisk images that use compression, could that be it? I'm doing all of this on x86-64 Linux. --[[User:Tavianator|Tavianator]] 05:38, 6 January 2011 (UTC)
 
  +
:Did you decrypt the ramdisk first? The hash is calculated by hashing a decrypted ramdisk dmg. The key on here is valid. --[[User:Ih8sn0w|iH8sn0w]] 17:58, 6 January 2011 (UTC)
genpass gives the key in the article when run with the update ramdisk, and "59ebcd47de964e5479ce2e2dc583284c863b85fefc0a58d68871a941a76c125367bffd2e" when run with the restore ramdisk. Neither one produces a valid image when using vfdecrypt to decrypt the filesystem DMG. I haven't figured out how to get the correct one; there's talk that genpass fails on ramdisk images that use compression, could that be it? I'm doing all of this on x86-64 Linux. --[[User:Tavianator|Tavianator]] 05:38, 6 January 2011 (UTC)
 
  +
::Oops, figured it out. Linux doesn't handle compressed DMG images, and the FS image is compressed. dmg2img can be used to decompress it. Sorry for the noise! [[User:Tavianator|Tavianator]] 22:25, 6 January 2011 (UTC)
 
Did you decrypt the ramdisk first? The hash is calculated by hashing a decrypted ramdisk dmg. The key on here is valid.
 
--[[User:Ih8sn0w|iH8sn0w]] 17:58, 6 January 2011 (UTC)
 

Latest revision as of 08:39, 6 February 2014

FS key is wrong

genpass gives the key in the article when run with the update ramdisk, and 59ebcd47de964e5479ce2e2dc583284c863b85fefc0a58d68871a941a76c125367bffd2e when run with the restore ramdisk. Neither one produces a valid image when using vfdecrypt to decrypt the filesystem DMG. I haven't figured out how to get the correct one; there's talk that genpass fails on ramdisk images that use compression, could that be it? I'm doing all of this on x86-64 Linux. --Tavianator 05:38, 6 January 2011 (UTC)

Did you decrypt the ramdisk first? The hash is calculated by hashing a decrypted ramdisk dmg. The key on here is valid. --iH8sn0w 17:58, 6 January 2011 (UTC)
Oops, figured it out. Linux doesn't handle compressed DMG images, and the FS image is compressed. dmg2img can be used to decompress it. Sorry for the noise! Tavianator 22:25, 6 January 2011 (UTC)