-
-
Notifications
You must be signed in to change notification settings - Fork 214
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unknown image - CPH2001PUEX_11_OTA_1510_all_oc4ujgmvipyP.ozip #70
Comments
Probably no point doing this now as Oppo has restricted access to the bootloader. But if you're feeling like a challenge you might be able to reverse engineer the "Oppo Deep Test APK" and unlock the bootloader somehow :) https://community.coloros.com/thread-50668-1-1.html |
Is there any possibility of being able to encrypt a zip back into ozip so it can be flashed with recovery? This would allow us to bypass the need to unlock fastboot. |
To put it simply, no, this won't work. |
i have also tested above CPH2021 i am also getting unknown image format .pl solve |
OPPOENCRYPT!^@^@^@^@26656^@^@^@^@^@^@^@^@^@^@^@5b5205f28725ec790f98c8309a37833930f4ce12^@^@^@^@^@^@^@^@android_version=10 ^G Help ^O Write Out ^W Where Is ^K Cut ^T Execute ^C Location M-U Undo M-A Set Mark M-] To Bracket M-Q Previous ^B Back ^◀ Prev Word pl decrypt system.transfer.list extracted from above ozip file.boot.img is also like that |
OPPOENCRYPT!^@^@^@^@26656^@^@^@^@^@^@^@^@^@^@^@5b5205f28725ec790f98c8309a37833930f4ce12^@^@^@^@^@^@^@^@android_version=10 ^G Help ^O Write Out ^W Where Is ^K Cut ^T Execute ^C Location M-U Undo M-A Set Mark M-] To Bracket M-Q Previous ^B Back ^◀ Prev Word |
@c0bnut btw you can unlock the bootloader of an oppo mtk device with MTKClient |
Device: Oppo A91
Model: CPH2021
Image name: CPH2001PUEX_11_OTA_1510_all_oc4ujgmvipyP.ozip
Firmware download location: https://support.oppo.com/au/software-update/software-download/?m=A91
The text was updated successfully, but these errors were encountered: