* commit 23e859dfd2e095bd71be0290b7c99f0016c6bf4e (HEAD, tag: android-o-mr1-iot-preview-8, m/master, aosp/o-mr1-iot-preview-8, aosp/master) |\ Merge: 70d9b6a 9432381 | | Author: Treehugger Robot <treehugger-gerrit@google.com> | | Date: Wed Mar 28 13:02:01 2018 +0000 | | | | Merge "Throw ShortBufferException in RSA CipherSpi." | | | * commit 943238191685c85367fb0c51fb0a5f124b361876 |/ Author: Adam Vartanian <flooey@google.com> | Date: Tue Mar 27 14:16:53 2018 +0100 | | Throw ShortBufferException in RSA CipherSpi. | | The Javadoc for javax.crypto.Cipher.doFinal() and friends states that | Ciphers should throw ShortBufferException when given an output buffer | that's too small to hold the output. BC does this in its other | classes, but the RSA implementation doesn't check the output buffer | size and just throws ArrayIndexOutOfBoundsException when it tries to | fill the output buffer. | | This is bad not only because it's the wrong exception, but because it | modifies the Cipher object's internal buffers when it does it, which | means that passing a too-short buffer and then calling doFinal() again | with a properly-sized buffer will result in incorrect output. | | This fixes tests that have been added for this case in Conscrypt | upstream. | | Test: cts -m CtsLibcoreTestCases -t com.android.org.conscrypt.javax.crypto | Change-Id: Ieac98be5b9574006f1409911103487b8b55bb94e |
7 years ago | |
---|---|---|
abootimg | 8 years ago | |
avb | 7 years ago | |
boot_signer | 9 years ago | |
bouncycastle | 7 years ago | |
gradle/wrapper | 8 years ago | |
mkbootfs | 8 years ago | |
security | 9 years ago | |
src | 8 years ago | |
.gitattributes | 8 years ago | |
.travis.yml | 9 years ago | |
LICENSE.md | 9 years ago | |
README.expert.md | 9 years ago | |
README.md | 7 years ago | |
build.gradle | 8 years ago | |
debug.kts | 8 years ago | |
gradlew | 8 years ago | |
gradlew.bat | 8 years ago | |
settings.gradle | 8 years ago |
README.md
Android_boot_image_editor
This tool focuses on editing Android boot.img(also recovery.img and recovery-two-step.img).
Prerequisite
Host OS requirement:
Linux or Mac.
Target Android requirement:
(1) Targeted boot.img(or recovery.img / recovery-two-step.img) MUST follows AOSP verified boot flow, which means it packs linux kernel, rootfs , and a optional second state bootloader, then sign it with OEM/USER keys.
(2) These utilities are known to work for Nexus (or Nexus compatible) boot.img(or recovery.img/recovery-two-step.img) for the following Android releases:
- AOSP master
- Lollipop (API Level 21,22) - Oreo (API Level 26,27)
You can get a full Android version list here.
Usage
Get tools via git:
git clone https://github.com/cfig/Android_boot_image_editor.git
cd Android_boot_image_editor
Then put your boot.img at $(CURDIR)/boot.img, then start gradle 'unpack' task:
cp <original_boot_image> boot.img
./gradlew unpack
Your get the flattened kernel and /root filesystem under $(CURDIR)/build/unzip_boot:
build/unzip_boot/
├── bootimg.json
├── kernel
├── second
└── root
Then you can edit the actual file contents, like rootfs or kernel. Now, pack the boot.img again
./gradlew pack
You get the repacked boot.img at $(CURDIR):
boot.img.signed
If you are working with recovery.img
If you are working with recovery.img, the steps are similar:
cp <original_recovery_image> recovery.img
./gradlew unpack
./gradlew pack
And you get recovery.img.signed
example & test
An example boot.img has been placed at src/test/resources/boot.img, which is extracted from Nexus 5x(code: bullhead) factory images from Google, you can take it as a quick start.
boot.img layout
Read layout of Android boot.img. We now support os_version and os_patch_level.
References
boot_signer https://android.googlesource.com/platform/system/extras
bouncycastle https://android.googlesource.com/platform/external/bouncycastle
cpio / fs_config https://android.googlesource.com/platform/system/core