[Tutorial] How to verify the contents of a vbmeta image
[Tutorial] How to verify the contents of a vbmeta image
Follow the steps below to verify the contents of a vbmeta image
python avbtool.py info_image --image vbmeta-sign.img
Note that the same contents has been confirmed on 3 different SPD / Unisoc phones, all from different non-related OEMs. Therefore, the chances are that your device will have the same vbmeta contents
Minimum libavb version: 1.0
Header Block: 256 bytes
Authentication Block: 576 bytes
Auxiliary Block: 13504 bytes
Algorithm: SHA256_RSA4096
Rollback Index: 0
Flags: 0
Release String: 'avbtool 1.1.0'
Descriptors:
Chain Partition descriptor:
Partition Name: boot
Rollback Index Location: 1
Public key (sha1): ea410c1b46cdb2e40e526880ff383f083bd615d5
Chain Partition descriptor:
Partition Name: system
Rollback Index Location: 3
Public key (sha1): e2c66ff8a1d787d7bf898711187bff150f691d27
Chain Partition descriptor:
Partition Name: vendor
Rollback Index Location: 4
Public key (sha1): 9885bf5bf909e5208dfd42abaf51ad9b104ee117
Chain Partition descriptor:
Partition Name: product
Rollback Index Location: 10
Public key (sha1): 766a95798206f6e980e42414e3cb658617c27daf
Chain Partition descriptor:
Partition Name: dtbo
Rollback Index Location: 9
Public key (sha1): ea410c1b46cdb2e40e526880ff383f083bd615d5
Chain Partition descriptor:
Partition Name: recovery
Rollback Index Location: 2
Public key (sha1): d9093b9a181bdb5731b44d60a9f850dc724e2874
Chain Partition descriptor:
Partition Name: l_modem
Rollback Index Location: 5
Public key (sha1): e93e7d91ba1a46b81a5f15129b4dc5769bf41f26
Chain Partition descriptor:
Partition Name: l_ldsp
Rollback Index Location: 6
Public key (sha1): e93e7d91ba1a46b81a5f15129b4dc5769bf41f26
Chain Partition descriptor:
Partition Name: l_gdsp
Rollback Index Location: 7
Public key (sha1): e93e7d91ba1a46b81a5f15129b4dc5769bf41f26
Chain Partition descriptor:
Partition Name: pm_sys
Rollback Index Location: 8
Public key (sha1): e93e7d91ba1a46b81a5f15129b4dc5769bf41f26
Chain Partition descriptor:
Partition Name: dtb
Rollback Index Location: 11
Public key (sha1): ea410c1b46cdb2e40e526880ff383f083bd615d5
(10-06-2020, 07:51 AM)kvas Yours "avbtool.py" not working, not on windows not on linux
update it https://android.googlesource.com/platfor...avbtool.py
(10-06-2020, 05:38 PM)Mufor I can't verify the contents of a vbmeta image
I got this message ''Given image does not look like a vbmeta image" (same on Windows)
1- I have use a vbmeta-sign.img extracted from a pac file of my moder (and is sp7731e)
2- I've already extract public signing keys form a vbmeta image file from my firmware
(10-06-2020, 05:38 PM)Mufor ...
(11-07-2020, 11:02 PM)zav31254 Hello! There is a problem. I can not see the contents of vbmeta-sign.img for doogee n10. In Windows 7, I get an error: File "avbtool", line 411
b = 2L ** 32
Syntax error: invalid syntax.
In Umbuntu , I get an error:avbtool: Given image does not look like a vbmeta image.
I ask for help.