BusyBox v1.18.5 arm binary - Android Software/Hacking General [Developers Only]
compiled it for myself, maybe someone find it usefull
BusyBox v1.18.5 (2011-07-18 07:43:28 PDT) multi-call binary.
Copyright (C) 1998-2009 Erik Andersen, Rob Landley, Denys Vlasenko
and others. Licensed under GPLv2.
See source distribution for full notice.
Usage: busybox [function] [arguments]...
or: busybox --list[-full]
or: function [arguments]...
BusyBox is a multi-call binary that combines many common Unix
utilities into a single executable. Most people will create a
link to busybox for each function they wish to use and BusyBox
will act like whatever it was invoked as.
Currently defined functions:
[, [[, acpid, add-shell, addgroup, adduser, adjtimex, ar, arp, arping,
ash, awk, base64, basename, beep, blkid, blockdev, bootchartd, brctl,
bunzip2, bzcat, bzip2, cal, cat, catv, chat, chattr, chgrp, chmod,
chown, chpasswd, chpst, chroot, chrt, chvt, cksum, clear, cmp, comm,
cp, cpio, crond, crontab, cryptpw, cttyhack, cut, date, dc, dd,
deallocvt, delgroup, deluser, depmod, devmem, df, dhcprelay, diff,
dirname, dmesg, dnsd, dnsdomainname, dos2unix, du, dumpkmap,
dumpleases, echo, ed, egrep, eject, env, envdir, envuidgid, ether-wake,
expand, expr, fakeidentd, false, fbset, fbsplash, fdflush, fdformat,
fdisk, fgconsole, fgrep, find, findfs, flock, fold, free, freeramdisk,
fsck, fsck.minix, fsync, ftpd, ftpget, ftpput, fuser, getopt, getty,
grep, gunzip, gzip, halt, hd, hdparm, head, hexdump, hostid, hostname,
httpd, hush, hwclock, id, ifconfig, ifdown, ifenslave, ifplugd, ifup,
inetd, init, insmod, install, ionice, iostat, ip, ipaddr, ipcalc,
ipcrm, ipcs, iplink, iproute, iprule, iptunnel, kbd_mode, kill,
killall, killall5, klogd, last, length, less, linux32, linux64,
linuxrc, ln, loadfont, loadkmap, logger, login, logname, logread,
losetup, lpd, lpq, lpr, ls, lsattr, lsmod, lspci, lsusb, lzcat, lzma,
lzop, lzopcat, makedevs, makemime, man, md5sum, mdev, mesg, microcom,
mkdir, mkdosfs, mke2fs, mkfifo, mkfs.ext2, mkfs.minix, mkfs.vfat,
mknod, mkpasswd, mkswap, mktemp, modinfo, modprobe, more, mount,
mountpoint, mpstat, mt, mv, nameif, nbd-client, nc, netstat, nice,
nmeter, nohup, nslookup, ntpd, od, openvt, passwd, patch, pgrep, pidof,
ping, ping6, pipe_progress, pivot_root, pkill, pmap, popmaildir,
poweroff, powertop, printenv, printf, ps, pscan, pwd, raidautorun,
rdate, rdev, readahead, readlink, readprofile, realpath, reboot,
reformime, remove-shell, renice, reset, resize, rev, rm, rmdir, rmmod,
route, rpm, rpm2cpio, rtcwake, run-parts, runlevel, runsv, runsvdir,
rx, script, scriptreplay, sed, sendmail, seq, setarch, setconsole,
setfont, setkeycodes, setlogcons, setsid, setuidgid, sh, sha1sum,
sha256sum, sha512sum, showkey, slattach, sleep, smemcap, softlimit,
sort, split, start-stop-daemon, stat, strings, stty, su, sulogin, sum,
sv, svlogd, swapoff, swapon, switch_root, sync, sysctl, syslogd, tac,
tail, tar, tcpsvd, tee, telnet, telnetd, test, tftp, tftpd, time,
timeout, top, touch, tr, traceroute, traceroute6, true, tty, ttysize,
tunctl, udhcpc, udhcpd, udpsvd, umount, uname, uncompress, unexpand,
uniq, unix2dos, unlzma, unlzop, unxz, unzip, uptime, usleep, uudecode,
uuencode, vconfig, vi, vlock, volname, wall, watch, watchdog, wc, wget,
which, who, whoami, xargs, xz, xzcat, yes, zcat, zcip
Click to expand...
Click to collapse
ls coloring is enabled but didn't default
http://www.neroon.com/BusyBox_v1.18.5_android/busybox
PS: Compiled according to:
http://www.arm9board.net/wiki/index.php?title=Filesystem_using_Busybox
http://afewe.wordpress.com/android-arm-development/cross-compile-busybox-for-arm-android/
good work, thx!
one question:
can ntpd act as an ntp time server ?
I ran "ntpd -l" and looked at "netstat" output, found that the ntpd daemon has started at port 123, but the state showed CLOSED, not LISTEN.
Any suggestions to run an NTP time server on an android phone?
psfan said:
can ntpd act as an ntp time server ?
Click to expand...
Click to collapse
AFAIK no
http://linux.die.net/man/1/ntpd
I have been looking for a way to use terminal shell to push a file using ftpput, does this work on yours?
Whats the best way to add this to my Evo 4G CM7?
Thanks for your work on this
Related
VPNC to FritzBox works!!!!
YES with this patched vpnc you can connect from a rooted desire (or any other android device) to your AVM fritzbox with the original firmware. The included vpnc-script will help to fix the routing problems. You need a rooted Android device with an tun.ko module First setup your fritzbox like the iphone setup which is described at the avm portal (google-> "avm iphone vpn") Install signed-FritzBox.apk to your phone. Setup now your vpnc-gui and be happy. -------------------------------------------------------------------------- Some detailed infos how to connect the Fritzbox with IPSEC via VPNC: 1.) you must use a IKE_ATTRIB_LIFE_DURATION = 3600 (seconds) 2.) you must use draft-ietf-ipsec-nat-t-ike-03 the original vpnc uses a IKE_ATTRIB_LIFE_DURATION with 2147483 (seconds) and only uses draft-ietf-ipsec-nat-t-ike-00 -> 02. I change the timing to 3600 (seconds) and change the transformset 02 to 03. Timing -> find in vpnc 000020C49B and change it to 0000000E10 (2x) Transformset -> find in vpnc CD60464335DF21F87CFDB2FC68B6A448 and change it to 7D9419A65310CA6F2C179D9215529D56 (1x) By the way these patch will help any vpnc user on every linux (i tested this with ubuntu and it works perfect) ---------------------------------------------------------------------------- update 20.12.2010 ---------------------------------------------------------------------------- New APK to install on a rooted Android device. After installing you can connet via IPSEC VPN to a cisco device and to the FritzBox with the latest Firmware without modifying the FritzBox For all who wants to use the FritzPhone App to make phonecalls via vpnc this will not work because the app did not use the 3G interface (only wlan). Download the app "3cx" from the market and in the setup menu "integration" you will find "Enable 3G", thats all.
Hi there! Really nice one but I'm getting a forced closed when I push the connect button. I'm using a SE X10 with android 2.1......... Sometimes I hate my phone.......
Merry Christmas. Is your Device rooted and had the vpnc the exec permissions ? Please install "Quick System Info" and check the loginfos via the Logcat. Maybe in your Kernel the tun.ko is missing.
Hello @mp1405 Thanks for the signed-FritzBox.apk. I finally got it running on my Samsung I9000 Froyo XXJPU and Fritzbox 7390 First I had also the FC because the tun.ko was missing. Now it works but but I have to load the kernel module every reboot in the konsole with insmod /system/lib/modules/tun.ko I edited the file /init.rc with the line insmod /system/lib/modules/tun.ko but every reboot a "recovery" init.rc is loaded without my insmod line. There was also the tip to copy the tun.ko into /lib/modules/tun.ko but the tun.ko gets deleted after every reboot. Kind regards
@mp1405 Thanks for your work and time for this patched Version. For my understanding: IPSec ID is what ? My e-Mailadress from the FritzboxConfig ? IPSec Secret is the Passphrase ? Is this correct ? Thanks!
Hello IPSec ID: Yes, your e-Mailadress from the FritzboxConfig (it is the entry "user_fqdn" which you have to replace with "key_id" in the config. IPSec Secret: Is the Passphrase (also named Pre-Shared Key or just "key") in the Fritzbox Configs.
Perfect! It works with the correct tun.ko Thanks @all and mp1405 for this patched Version.
my fritzbox said The import of the VPN-Settings faild. And I did it twice exactly with the iphone settings. anyone else with that kind of problem? I'm using Fritzbox 7270 fon with the latest firmware. stephen
@stephen21 have the same problem with 7270, every cfg that is "toucht" with any editor. dosnt work. Im kontakted the avm support and wait to the answer. greatings meinbier PS. Sorry for my bad english
Thanks for the apk and the howto, I've done everything as described, but I get always following (log) message : Code: D/VPN_Connections( 5436): process stderr: no response from target
@sky01x Hi Sky, where You have found the right tun.ko? Thanks for a hint. To.
@lier99 I got the tun.ko from: http://forum.xda-developers.com/showthread.php?t=793712 Best regards
I9000XXJPY Kernel 2.6.32.9 hardcore k12h-500hz #2 XXJPY_Doc_v7_Kitchen Fritzbox 7270 Thanks for the apk and the howto, but still a little trouble. The Fritzbox cfg is changed according to ipfone config from AVM. The VPN Connections says connected. The Fritzbox says Status green, I have an internet IP, I see my asigned IP, but for the local net I get 0.0.0.0. From there I do not get into my local network. When ever I try to change the Fritzbox cfg to phase2localid { ipnet { ipaddr = 192.168.1.0; mask = 255.255.255.0; } } phase2remoteid { ipaddr = 192.168.1.203; } phase2ss = "esp-all-all/ah-none/comp-all/no-pfs"; accesslist = "permit ip 192.168.1.0 255.255.255.0 192.168.1.203 255.255.255.255"; like my Notebook runs fine on the tunel, the connection failed. Any idea?
VPN dont work via GSM/UMTS connection Hello, need help my VPN dont work via GSM/UMTS connection. My configuration: FritzBox 7170 with Firmware-Version 29.04.86-18946 (Laborversion) and VPN configuerd as IPhone. Dynamic DNS is aktiv and ready. Handy HTC Desire with LeeDriod v2.03c VPNC from mp1405 singned-myVPNC.apk now if I'm connected via WLAN to my FritzBox I have a VPN connection, but via GSM or UMTS I get no connection - why? Thanks
Thanks for your great work! My 7270 shows connection established. However there seems to be a problem with your vpnc-script. I'm getting a Device "default via <UMTS-IP> dev rmnet0 " does not exist. Error: either "to" is duplicate, or "hoplimit" is a garbage. backing up dns settings vpnc-script ran to completion on the console. Maybe I can further look into it tonight. #Running Leedroid2.3a
mp1405 said: ---------------------------------------------------------------------------- update 20.12.2010 ---------------------------------------------------------------------------- New APK to install on a rooted Android device. After installing you can connet via IPSEC VPN to a cisco device and to the FritzBox with the latest Firmware without modifying the FritzBox Click to expand... Click to collapse So, do you mean that i need only to install the attached signed-myVPNC.apk and i can connect to my fritz without doing the iphone patching procedure on the fritz side? or i need to do it anyway? does this apk work with gingerbread too? update: i imported the modified vpn config to my fritz, installed the signed VPN Connect.apk and set up the account, and tried to connect, it says connected on both Android and my fritz, but i cannot connect to addresses inside my fritz. the build of android i use (NexusHD2 - Gingerbread 2.2) seems to have a tun.so file, so i don't need to import it, right? what else can i do ??
mp1405 said: ... For all who wants to use the FritzPhone App to make phonecalls via vpnc this will not work because the app did not use the 3G interface (only wlan). Download the app "3cx" from the market and in the setup menu "integration" you will find "Enable 3G", thats all. Click to expand... Click to collapse Hi, Thank you for this. The last thing that I will not get to work is to connect with Firtz!box fon to the box accross 3g I have downloaded the 3cx an enabled "Enable 3g" without any other settings in the profile. But in fritz!box fon there the "not connected" is remaining. Any other hints? Android "DHD Leedroid 2.2.2" FritzBox "7270 Firmware 54.04.88" Thx
I am running a HD2 with the latest CM7 ROM and I have a FritzBox 3270 with the latest firmware. Thanks to this I can finally establish a VPN connection with my phone.
not work for me Fritzbox config: vpncfg { connections { enabled = yes; conn_type = conntype_user; name = "my mail"; always_renew = no; reject_not_encrypted = no; dont_filter_netbios = yes; localip = 0.0.0.0; local_virtualip = 0.0.0.0; remoteip = 0.0.0.0; remote_virtualip = 192.168.178.201; remoteid { key_id = "my mail"; } mode = phase1_mode_aggressive; phase1ss = "all/all/all"; keytype = connkeytype_pre_shared; key = "my key"; cert_do_server_auth = no; use_nat_t = yes; use_xauth = yes; use_cfgmode = no; xauth { valid = yes; username = "my login"; passwd = "mypass"; } phase2localid { ipnet { ipaddr = 192.168.178.0; mask = 255.255.255.0; } } phase2remoteid { ipaddr = 192.168.178.201; } phase2ss = "esp-all-all/ah-none/comp-all/pfs"; accesslist = "permit ip 192.168.178.0 255.255.255.0 192.168.178.201 255.255.255.255"; } ike_forward_rules = "udp 0.0.0.0:500 0.0.0.0:500", "udp 0.0.0.0:4500 0.0.0.0:4500"; } // EOF Click to expand... Click to collapse And log from android (MIUI): pre-init phase... connect phase... vpnc-script ran to completion quick mode response rejected: (ISAKMP_N_INVALID_MESSAGE_ID)(9) this means the concentrator did not like what we had to offer. Possible reasons are: * concentrator configured to require a firewall this locks out even Cisco clients on any platform expect windows which is an obvious security improvment. There is no workaround (yet). * concentrator configured to require IP compression this is not yet supported by vpnc. Note: the Cisco Concentrator Documentation recommends against using compression, expect on low-bandwith (read: ISDN) links, because it uses much CPU-resources on the concentrator vpnc version 0.5.3-mjm1-140M S1 init_sockaddr [2011-07-29 21:05:48] S2 make_socket [2011-07-29 21:05:48] S3 setup_tunnel [2011-07-29 21:05:48] using interface tun0 S4 do_phase1_am [2011-07-29 21:05:48] S4.1 create_nonce [2011-07-29 21:05:48] S4.2 dh setup [2011-07-29 21:05:48] S4.3 AM packet_1 [2011-07-29 21:05:48] S4.4 AM_packet2 [2011-07-29 21:05:49] (Xauth) (DPD) (Nat-T 03) (unknown) got ike lifetime attributes: 3600 seconds IKE SA selected psk+xauth-aes256-sha1 ignoring that peer is DPD capable (RFC3706) peer is NAT-T capable (draft-03) peer is using type 130 (ISAKMP_PAYLOAD_NAT_D_OLD) for NAT-Discovery payloads peer is using type 130 (ISAKMP_PAYLOAD_NAT_D_OLD) for NAT-Discovery payloads peer is using type 130 (ISAKMP_PAYLOAD_NAT_D_OLD) for NAT-Discovery payloads peer is using type 130 (ISAKMP_PAYLOAD_NAT_D_OLD) for NAT-Discovery payloads S4.5 AM_packet3 [2011-07-29 21:05:49] NAT status: this end behind NAT? YES -- remote end behind NAT? YES NAT-T mode, adding non-esp marker S4.6 cleanup [2011-07-29 21:05:49] S5 do_phase2_xauth [2011-07-29 21:05:49] S5.1 xauth_start [2011-07-29 21:05:49] S5.2 notice_check [2011-07-29 21:05:49] S5.3 type-is-xauth check [2011-07-29 21:05:49] S5.4 xauth type check [2011-07-29 21:05:49] S5.5 do xauth authentication [2011-07-29 21:05:49] NAT-T mode, adding non-esp marker S5.2 notice_check [2011-07-29 21:05:49] S5.3 type-is-xauth check [2011-07-29 21:05:49] S5.6 process xauth response [2011-07-29 21:05:49] NAT-T mode, adding non-esp marker S5.7 xauth done [2011-07-29 21:05:49] S6 do_phase2_config [2011-07-29 21:05:49] S6.1 phase2_config send modecfg [2011-07-29 21:05:49] NAT-T mode, adding non-esp marker S6.2 phase2_config receive modecfg [2011-07-29 21:05:50] got save password setting: 0 got address 192.168.178.201 S7 setup_link (phase 2 + main_loop) [2011-07-29 21:05:50] S7.0 run interface setup script [2011-07-29 21:05:50] S7.1 QM_packet1 [2011-07-29 21:05:50] S7.2 QM_packet2 send_receive [2011-07-29 21:05:50] NAT-T mode, adding non-esp marker S7.3 QM_packet2 validate type [2011-07-29 21:05:50] S7.4 process and skip lifetime notice [2011-07-29 21:05:50] S7.5 QM_packet2 check reject offer [2011-07-29 21:05:50] ---!!!!!!!!! entering phase2_fatal !!!!!!!!!--- NAT-T mode, adding non-esp marker NAT-T mode, adding non-esp marker disconnect phase... ip: can't find device 'tun0' ip: an inet prefix is expected rather than "" ip: RTNETLINK answers: No such process DNS not restored (no active default gateway) Click to expand... Click to collapse Please help me. What I should do ?
If this helps the developers to keep the stuff up to date, here's the Handshake from a fritzbox 7240 v. Firmware-Version 73.05.05 with default vpn config: Code: ~$ ike-scan -v -s 0 --aggressive --id=xxxxxxxxxxxxx fritz.box DEBUG: pkt len=380 bytes, bandwidth=56000 bps, int=58285 us Starting ike-scan 1.9 with 1 hosts (http://www.nta-monitor.com/tools/ike-scan/) x.x.x.x Aggressive Mode Handshake returned HDR=(CKY-R=a79e96b1e2acf788) SA=(Enc=3DES Hash=SHA1 Auth=PSK Group=2:modp1024 LifeType=Seconds LifeDuration=28800) KeyExchange(128 bytes) Nonce(16 bytes) ID(Type=ID_IPV4_ADDR, Value=xxxxxxxx) Hash(20 bytes) Notification=(Type=RESPONDER-LIFETIME, SPI=741b17c61bce146aa79e96b1e2acf788, Data=800b0001800c0e10) VID=09002689dfd6b712 (XAUTH) VID=afcad71368a1f1c96b8696fc77570100 (Dead Peer Detection v1.0) Ending ike-scan 1.9: 1 hosts scanned in 0.269 seconds (3.72 hosts/sec). 1 returned handshake; 0 returned notify The fritzbox only answers aggressive mode, this may be the reason for faulting android vpn client, see android system logs... Code: Get osmonitor app exported logcat log (no permissions over sshfs): $ scp htc:/mnt/sdcard/log1 . grep it for ipsec vpn racoon: 08/03/2011 17:03:50 [INFORMATION] racoon(7090) ipsec-tools 0.7.3 (http://ipsec-tools.sf.net) 08/03/2011 17:01:44 [INFORMATION] ActivityManager(118) Displayed com.android.settings/.vpn.VpnSettings: +312ms 08/03/2011 17:01:57 [DEBUG] com.android.settings.vpn.AuthenticationActor(3067) ~~~~~~ connect() succeeded! at com.android.server.vpn.VpnService.getIp(VpnService.java:108) at com.android.server.vpn.VpnService.onConnect(VpnService.java:135) at com.android.server.vpn.VpnServiceBinder$2.run(VpnServiceBinder.java:117) 08/03/2011 17:01:58 [INFORMATION] ipd(77) IP CMD: /system/bin/ip ru del from all to all table vpn prio 2500 08/03/2011 17:02:06 [INFORMATION] ActivityManager(118) Displayed com.android.settings/.vpn.VpnEditor: +479ms 08/03/2011 17:03:39 [INFORMATION] ActivityManager(118) Displayed com.android.settings/.vpn.VpnSettings: +328ms 08/03/2011 17:03:49 [DEBUG] com.android.settings.vpn.AuthenticationActor(3067) ~~~~~~ connect() succeeded! at com.android.server.vpn.VpnService.waitUntilConnectedOrTimedout(VpnService.java:210) at com.android.server.vpn.VpnService.onConnect(VpnService.java:139) at com.android.server.vpn.VpnServiceBinder$2.run(VpnServiceBinder.java:117) 08/03/2011 17:04:35 [INFORMATION] ipd(77) IP CMD: /system/bin/ip ru del from all to all table vpn prio 2500 08/03/2011 17:01:57 [INFORMATION] SProxy_racoon(6207) Stop VPN daemon: racoon 08/03/2011 17:01:57 [DEBUG] SProxy_racoon(6207) racoon is stopped after 0 msec 08/03/2011 17:01:57 [DEBUG] SProxy_racoon(6207) stopping racoon, success? true 08/03/2011 17:01:58 [INFORMATION] SProxy_racoon(6207) Stop VPN daemon: racoon 08/03/2011 17:01:58 [DEBUG] SProxy_racoon(6207) racoon is stopped after 0 msec 08/03/2011 17:01:58 [DEBUG] SProxy_racoon(6207) stopping racoon, success? true 08/03/2011 17:03:49 [INFORMATION] SProxy_racoon(6207) Stop VPN daemon: racoon 08/03/2011 17:03:49 [DEBUG] SProxy_racoon(6207) racoon is stopped after 0 msec 08/03/2011 17:03:49 [DEBUG] SProxy_racoon(6207) stopping racoon, success? true 08/03/2011 17:03:49 [INFORMATION] SProxy_racoon(6207) Start VPN daemon: racoon 08/03/2011 17:03:49 [DEBUG] SProxy_racoon(6207) racoon is running after 0 msec 08/03/2011 17:03:49 [DEBUG] racoon(7090) Waiting for control socket 08/03/2011 17:03:49 [DEBUG] SProxy_racoon(6207) service not yet listen()ing; try again 08/03/2011 17:03:50 [DEBUG] racoon(7090) Received 3 arguments 08/03/2011 17:03:50 [INFORMATION] racoon(7090) ipsec-tools 0.7.3 (http://ipsec-tools.sf.net) 08/03/2011 17:03:50 [INFORMATION] racoon(7090) 192.168.0.106[500] used as isakmp port (fd=10) 08/03/2011 17:03:50 [INFORMATION] racoon(7090) 192.168.0.106[500] used for NAT-T 08/03/2011 17:03:50 [INFORMATION] racoon(7090) 192.168.0.106[4500] used as isakmp port (fd=11) 08/03/2011 17:03:50 [INFORMATION] racoon(7090) 192.168.0.106[4500] used for NAT-T 08/03/2011 17:03:50 [INFORMATION] SProxy_racoon(6207) got data from control socket: 3 08/03/2011 17:03:52 [INFORMATION] racoon(7090) no in-bound policy found: 192.168.0.3/32[1701] 192.168.0.106/32[0] proto=udp dir=in 08/03/2011 17:03:52 [INFORMATION] racoon(7090) IPsec-SA request for 192.168.0.3 queued due to no phase1 found. 08/03/2011 17:03:52 [INFORMATION] racoon(7090) initiate new phase 1 negotiation: 192.168.0.106[500]<=>192.168.0.3[500] 08/03/2011 17:03:52 [INFORMATION] racoon(7090) begin Identity Protection mode. 08/03/2011 17:04:23 [ERROR] racoon(7090) phase2 negotiation failed due to time up waiting for phase1. ESP 192.168.0.3[0]->192.168.0.106[0] 08/03/2011 17:04:23 [INFORMATION] racoon(7090) delete phase 2 handler. 08/03/2011 17:04:23 [INFORMATION] racoon(7090) Bye 08/03/2011 17:04:35 [INFORMATION] SProxy_racoon(6207) Stop VPN daemon: racoon 08/03/2011 17:04:35 [DEBUG] SProxy_racoon(6207) racoon is stopped after 0 msec 08/03/2011 17:04:35 [DEBUG] SProxy_racoon(6207) stopping racoon, success? true I'm trying to adapt the fritzbox vpn config to match the faulting android 2.3.3 built-in vpn-client's requirements, further logs from other vpn-clients will follow. The android vpn asks for xauth credentials, trying to configure fritzbox for xauth... no success, android racoon still phase 1 waiting timeout, changing fritzbox from agressive to main mode... no success, still phase1 time out, taking and analyzing wireshark dump from http://fritz.box//html/capture.html (if ath0 or guest1 etc) Ok, here's what the android racoon sends to the fritz.box: Code: $ /usr/sbin/tcpdump -vvv -r fritz-ath0.eth src or dst port 500 or src or dst port l2f reading from file fritz-ath0.eth, link-type EN10MB (Ethernet) 00:29:57.082587 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 380) htc.fritz.box.isakmp > fritz.box.isakmp: [udp sum ok] isakmp 1.0 msgid 00000000 cookie 3958b87fd7c4e0a9->0000000000000000: phase 1 I ident: (sa: doi=ipsec situation=identity (p: #1 protoid=isakmp transform=6 (t: #1 id=ike (type=lifetype value=sec)(type=lifeduration value=7080)(type=enc value=3des)(type=auth value=preshared)(type=hash value=sha1)(type=group desc value=modp1024)) (t: #2 id=ike (type=lifetype value=sec)(type=lifeduration value=7080)(type=enc value=3des)(type=auth value=preshared)(type=hash value=md5)(type=group desc value=modp1024)) (t: #3 id=ike (type=lifetype value=sec)(type=lifeduration value=7080)(type=enc value=1des)(type=auth value=preshared)(type=hash value=sha1)(type=group desc value=modp1024)) (t: #4 id=ike (type=lifetype value=sec)(type=lifeduration value=7080)(type=enc value=1des)(type=auth value=preshared)(type=hash value=md5)(type=group desc value=modp1024)) (t: #5 id=ike (type=lifetype value=sec)(type=lifeduration value=7080)(type=enc value=aes)(type=keylen value=0080)(type=auth value=preshared)(type=hash value=sha1)(type=group desc value=modp1024)) (t: #6 id=ike (type=lifetype value=sec)(type=lifeduration value=7080)(type=enc value=aes)(type=keylen value=0080)(type=auth value=preshared)(type=hash value=md5)(type=group desc value=modp1024)))) (vid: len=16 4a131c81070358455c5728f20e95452f) (vid: len=16 cd60464335df21f87cfdb2fc68b6a448) (vid: len=16 90cb80913ebb696e086381b5ec427b1f) (vid: len=16 4485152d18b6bbcd0be8a8469579ddcc) (vid: len=20 4048b7d56ebce88525e7de7f00d6c2d380000000) 00:30:07.104380 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 380) htc.fritz.box.isakmp > fritz.box.isakmp: [udp sum ok] isakmp 1.0 msgid 00000000 cookie 3958b87fd7c4e0a9->0000000000000000: phase 1 I ident: (sa: doi=ipsec situation=identity (p: #1 protoid=isakmp transform=6 (t: #1 id=ike (type=lifetype value=sec)(type=lifeduration value=7080)(type=enc value=3des)(type=auth value=preshared)(type=hash value=sha1)(type=group desc value=modp1024)) (t: #2 id=ike (type=lifetype value=sec)(type=lifeduration value=7080)(type=enc value=3des)(type=auth value=preshared)(type=hash value=md5)(type=group desc value=modp1024)) (t: #3 id=ike (type=lifetype value=sec)(type=lifeduration value=7080)(type=enc value=1des)(type=auth value=preshared)(type=hash value=sha1)(type=group desc value=modp1024)) (t: #4 id=ike (type=lifetype value=sec)(type=lifeduration value=7080)(type=enc value=1des)(type=auth value=preshared)(type=hash value=md5)(type=group desc value=modp1024)) (t: #5 id=ike (type=lifetype value=sec)(type=lifeduration value=7080)(type=enc value=aes)(type=keylen value=0080)(type=auth value=preshared)(type=hash value=sha1)(type=group desc value=modp1024)) (t: #6 id=ike (type=lifetype value=sec)(type=lifeduration value=7080)(type=enc value=aes)(type=keylen value=0080)(type=auth value=preshared)(type=hash value=md5)(type=group desc value=modp1024)))) (vid: len=16 4a131c81070358455c5728f20e95452f) (vid: len=16 cd60464335df21f87cfdb2fc68b6a448) (vid: len=16 90cb80913ebb696e086381b5ec427b1f) (vid: len=16 4485152d18b6bbcd0be8a8469579ddcc) (vid: len=20 4048b7d56ebce88525e7de7f00d6c2d380000000) 00:30:17.123829 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 380) htc.fritz.box.isakmp > fritz.box.isakmp: [udp sum ok] isakmp 1.0 msgid 00000000 cookie 3958b87fd7c4e0a9->0000000000000000: phase 1 I ident: (sa: doi=ipsec situation=identity (p: #1 protoid=isakmp transform=6 (t: #1 id=ike (type=lifetype value=sec)(type=lifeduration value=7080)(type=enc value=3des)(type=auth value=preshared)(type=hash value=sha1)(type=group desc value=modp1024)) (t: #2 id=ike (type=lifetype value=sec)(type=lifeduration value=7080)(type=enc value=3des)(type=auth value=preshared)(type=hash value=md5)(type=group desc value=modp1024)) (t: #3 id=ike (type=lifetype value=sec)(type=lifeduration value=7080)(type=enc value=1des)(type=auth value=preshared)(type=hash value=sha1)(type=group desc value=modp1024)) (t: #4 id=ike (type=lifetype value=sec)(type=lifeduration value=7080)(type=enc value=1des)(type=auth value=preshared)(type=hash value=md5)(type=group desc value=modp1024)) (t: #5 id=ike (type=lifetype value=sec)(type=lifeduration value=7080)(type=enc value=aes)(type=keylen value=0080)(type=auth value=preshared)(type=hash value=sha1)(type=group desc value=modp1024)) (t: #6 id=ike (type=lifetype value=sec)(type=lifeduration value=7080)(type=enc value=aes)(type=keylen value=0080)(type=auth value=preshared)(type=hash value=md5)(type=group desc value=modp1024)))) (vid: len=16 4a131c81070358455c5728f20e95452f) (vid: len=16 cd60464335df21f87cfdb2fc68b6a448) (vid: len=16 90cb80913ebb696e086381b5ec427b1f) (vid: len=16 4485152d18b6bbcd0be8a8469579ddcc) (vid: len=20 4048b7d56ebce88525e7de7f00d6c2d380000000) 00:30:27.145065 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 380) htc.fritz.box.isakmp > fritz.box.isakmp: [udp sum ok] isakmp 1.0 msgid 00000000 cookie 3958b87fd7c4e0a9->0000000000000000: phase 1 I ident: (sa: doi=ipsec situation=identity (p: #1 protoid=isakmp transform=6 (t: #1 id=ike (type=lifetype value=sec)(type=lifeduration value=7080)(type=enc value=3des)(type=auth value=preshared)(type=hash value=sha1)(type=group desc value=modp1024)) (t: #2 id=ike (type=lifetype value=sec)(type=lifeduration value=7080)(type=enc value=3des)(type=auth value=preshared)(type=hash value=md5)(type=group desc value=modp1024)) (t: #3 id=ike (type=lifetype value=sec)(type=lifeduration value=7080)(type=enc value=1des)(type=auth value=preshared)(type=hash value=sha1)(type=group desc value=modp1024)) (t: #4 id=ike (type=lifetype value=sec)(type=lifeduration value=7080)(type=enc value=1des)(type=auth value=preshared)(type=hash value=md5)(type=group desc value=modp1024)) (t: #5 id=ike (type=lifetype value=sec)(type=lifeduration value=7080)(type=enc value=aes)(type=keylen value=0080)(type=auth value=preshared)(type=hash value=sha1)(type=group desc value=modp1024)) (t: #6 id=ike (type=lifetype value=sec)(type=lifeduration value=7080)(type=enc value=aes)(type=keylen value=0080)(type=auth value=preshared)(type=hash value=md5)(type=group desc value=modp1024)))) (vid: len=16 4a131c81070358455c5728f20e95452f) (vid: len=16 cd60464335df21f87cfdb2fc68b6a448) (vid: len=16 90cb80913ebb696e086381b5ec427b1f) (vid: len=16 4485152d18b6bbcd0be8a8469579ddcc) (vid: len=20 4048b7d56ebce88525e7de7f00d6c2d380000000) 00:30:29.149902 IP (tos 0x0, ttl 64, id 51970, offset 0, flags [DF], proto UDP (17), length 97) htc.fritz.box.51610 > fritz.box.l2f: [udp sum ok] l2tp:[TLS](0/0)Ns=0,Nr=0 *MSGTYPE(SCCRQ) *PROTO_VER(1.0) *HOST_NAME(anonymous) *FRAMING_CAP(AS) *ASSND_TUN_ID(798) *RECV_WIN_SIZE(1) Code: $ ike-scan -v -s 0 fritz.box DEBUG: pkt len=336 bytes, bandwidth=56000 bps, int=52000 us Starting ike-scan 1.9 with 1 hosts (http://www.nta-monitor.com/tools/ike-scan/) --- Pass 1 of 3 completed --- Pass 2 of 3 completed --- Pass 3 of 3 completed Ending ike-scan 1.9: 1 hosts scanned in 2.445 seconds (0.41 hosts/sec). 0 returned handshake; 0 returned notify wireshark compatible file is attached. I've found the allowed ipsec strategies for /bin/avmike in Code: # find / -name *ipsec* /etc/default.Fritz_Box_7240/1und1/ipsec.cfg /etc/default.Fritz_Box_7240/avm/ipsec.cfg # # # find / -name *ike* /bin/avmike /lib/libikeapi.so /lib/libikeapi.so.2 /lib/libikeapi.so.2.0.0 /lib/libikecrypto.so /lib/libikecrypto.so.1 /lib/libikecrypto.so.1.0.0 /lib/libikeossl.so /lib/libikeossl.so.1 /lib/libikeossl.so.1.0.0 /var/run/avmike.pid /var/tmp/csem/M-ikeapi-reply-dsld-W /var/tmp/csem/M-ikeapi-reply-dsld-R /var/tmp/csem/M-ikeapi-request-dsld-W /var/tmp/csem/M-ikeapi-request-dsld-R # # find / -name *vpn* /etc/default.Fritz_Box_7240/1und1/vpn.cfg /etc/default.Fritz_Box_7240/avm/vpn.cfg /usr/share/ctlmgr/libvpnstat.so /usr/www/1und1/html/de/internet/vpn.frm /usr/www/1und1/html/de/internet/vpn.html /usr/www/1und1/html/de/internet/vpn.js /usr/www/1und1/html/de/menus/menu2_vpn.html /usr/www/1und1/html/de/vpn /usr/www/1und1/html/vpn_import_nok_reboot.html /usr/www/1und1/html/vpn_import_ok_reboot.html /usr/www/1und1/html/vpn_import_pwd_nok_reboot.html /usr/www/avm/html/de/internet/vpn.frm /usr/www/avm/html/de/internet/vpn.html /usr/www/avm/html/de/internet/vpn.js /usr/www/avm/html/de/menus/menu2_vpn.html /usr/www/avm/html/de/vpn /usr/www/avm/html/vpn_import_nok_reboot.html /usr/www/avm/html/vpn_import_ok_reboot.html /usr/www/avm/html/vpn_import_pwd_nok_reboot.html /var/vpnroutes /var/flash/vpn.cfg /var/tmp/vpncfgimport.eff # # avmike -h illegal option 'h' usage: avmike avm_ike [options] options: -? - print this help -D STRING - switch debug logs on. (NULL) -d - debug service. (NOTSET) -f - run in forground. (NOTSET) -s - stop daemon. (NOTSET) -v - verbose. (NOTSET) -p STRING - Pidfile. ("/var/run/avmike.pid") -w - [Hit return to continue]. (NOTSET) -p INTEGER - port to use. (0) ISAKMP/IPSec negoiation server Trying to enable debug logs... debug options silently disabled in release build. Matching fritzbox factory ike config for Android 2.3.3 racoon is phase1ss = "racoon-dh2-aes-sha", but --lifetime=3600 or datatype length or formatting, or wrong other config file settings: Code: # ike-scan fritz.box -M --retry=1 --trans=7/128,2,1,2 --lifetime=3600 Starting ike-scan 1.9 with 1 hosts (http://www.nta-monitor.com/tools/ike-scan/) Ending ike-scan 1.9: 1 hosts scanned in 0.532 seconds (1.88 hosts/sec). 0 returned handshake; 0 returned notify 19:37:36.599736 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 116) tom1.isakmp > fritz.box.isakmp: [udp sum ok] isakmp 1.0 msgid 00000000 cookie 84cdf79f56296b8b->0000000000000000: phase 1 I ident: (sa: doi=ipsec situation=identity (p: #1 protoid=isakmp transform=1 (t: #1 id=ike (type=enc value=aes)(type=hash value=sha1)(type=auth value=preshared)(type=group desc value=modp1024)(type=keylen value=0080)(type=lifetype value=sec)(type=lifeduration [B]len=4 value=00007080[/B])))) No answer from avmike, trying Android... no success. Surely config file mismatch, see http://www.ip-phone-forum.de/showthread.php?t=161793&p=1672919&viewfull=1#post1672919 and search there under avm for posts containing phase1_mode_idp. No. Tried to override the /etc/default/ipsec.cfg inline in vpn.cfg and > /var/flash/vpn.cfg but the box does all to prevent any tricks to change the ipsec.cfg, even removing the ipsec part from vpn.cfg when in comments. Giving up and will remove the proprietary crap avm vpn daemon from the box, install something like freetz with racoon. For those not able/not want to root their phone here's the solution for fritzbox: http://www.ip-phone-forum.de/showthread.php?t=197637&pagenumber= http://freetz.org/ticket/854 (Mostly german, use google translator)
[Q] problem with network apps from busybox on prime 1.6
Hello xda, I have the problem with all networks apps from busybox like ping, wget etc. BTW, the same apps from android work fine: Code: bash-4.1# which ping /system/xbin/ping bash-4.1# ls -la /system/xbin/ping lrwxrwxrwx 1 root 2000 20 Jul 26 07:49 /system/xbin/ping -> /system/xbin/busybox bash-4.1# ping google.com ping: bad address 'google.com' bash-4.1# /system/xbin/busybox ping google.com ping: bad address 'google.com' bash-4.1# /system/xbin/busybox wget google.com wget: bad address 'google.com' bash-4.1# /system/bin/ping -c1 google.com PING google.com (209.85.148.99) 56(84) bytes of data. 64 bytes from google.com (209.85.148.99): icmp_seq=1 ttl=53 time=44.2 ms --- google.com ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 44.271/44.271/44.271/0.000 ms bash-4.1# Any solutions? Thanks
using jping I have terminal IDE, which includes jping, so I can use: jping google.com | sed 's/.*: \(.*\)/\1/' | xargs ping And I get the name resolved for me.
[DroidWall][Custom Scripts][Collection] DroidWall 1.5.3
Hello All, Starting 1.5.3 , DroidWall introduced a experimental feature called "CustomScripts" where scripts can be defined by user will be executed by DroidWall . More details on http://code.google.com/p/droidwall/wiki/CustomScripts This thread is to collect all custom scripts by users. Iptables -> http://www.thegeekstuff.com/2011/06/iptables-rules-examples/ http://linuxconfig.org/collection-of-basic-linux-firewall-iptables-rules
Script for allowing selected IP's for selected program Hello, Could somebody please post a Droidwall script for allowing a specific program to communicate only with selected IP's? I want to allow B-Folders to talk only to my two desktops machines and reject anything else. Thank you. Robert.
This two are very useful to block/allow packs sending from browsers... # Always allow connections to 192.168.0.1, no matter the interface $IPTABLES -A "droidwall" --destination "192.168.0.1" -j RETURN # Block connections to 119.161.212.151, no matter the interface $IPTABLES -A "droidwall" --destination "119.161.212.151" -j "droidwall-reject"
Interesting program.. was just thinking about something along this line earlier in the week. Will keep an eye on it and play a little.. when time permits.. it would be nice to block permissions on programs that extend the normal wants and needs a program should have..
Is it possible to block websites without using ip, adresses? Im having some trouble blackslisting some websites. Help much appreciated. Stitch!
Use only Droidwall and not LBE Privacy Guard as firewall Code: iptables -D OUTPUT -j droidwall iptables -I OUTPUT 1 -g droidwall To revert back to old settings ( both Droidwall and LBE Privacy guard as firewall) Code: iptables -D OUTPUT -g droidwall iptables -I OUTPUT 2 -j droidwall
lets make a custom-script collection for Apps Hey Guys, lets make a collection for apps, there are make connetions,there are unneeded for the normaly daily use(there are only for advertising). I Start with Shazam Code: $IPTABLES -A "droidwall" --destination "5.44.16.214" -j "droidwall-reject" $IPTABLES -A "droidwall" --destination "5.44.16.223" -j "droidwall-reject" $IPTABLES -A "droidwall" --destination "5.44.16.228" -j "droidwall-reject" $IPTABLES -A "droidwall" --destination "185.31.0.0/16" -j "droidwall-reject"
Code: # Allow SSH (port 22) access to the phone $IPTABLES -A afwall -p tcp --sport 22 -m owner --uid-owner 0 -j RETURN
S4 screen mirroring on rooted devices SOLVED - BYPASSED all check fails
so here's the deal. trying to start screen mirroring on a rooted device in most cases HDCP will fail to initialize, when this happens screen mirroring will connect then disconnect with an error. after a lot of research, logging and testing on my device I have found a way to bypass HDCP and also bypass Samsung restriction on allowing screen mirroring without HDCP. HDCP is not a requirement for screen mirroring but Samsung has programmed the s4 to fail if the HDCP connection is not initialized. I have found that when the phone speaks to the miracast dongle the phone is programmed to force the setting of "Display service Type = HDMI" instead of allowing it to connect as Type = Wifi. when the phone forces type = HDMI it makes screen mirroring fail if HDCP fails, this is a basic and enforced protocol of HDMI, this results in screen mirroring shutting off if HDCP fails, I believe this is Samsung's attempt to stop people from rooting their phones and also to stop people from using non Samsung dongles. some people have found ways around this by hacking the HDCP lib files, but in my case this was not possible because I own a Sgh-i337 on mf3 with a locked bootloader. unfortunately I can't post pictures so I can post my screen mirroring logs, but heres an explanation as to how this was accomplished. First was to quarantine all Samsung Apps & services that were related to screen mirroring, this was an attempt to get the system to fall back to the native screen mirroring services and not use samsung's implementation. I locked up: Com.sec.allsharecastplayer Com.samsung.shareshot Samsung watch on Samsung briefing Allshare.controlShareService Allshare.fileShareService Samsung context provider All Knox Samsung MDM app Allshare.service.mediaShare Samsung apps Samsung apps UNA2 Samsung apps widget Samsung link Samsung push next I tried to find out a way to edit the DisplayManagerService's forced type of HDMI to change it to Type = Wifi, unfortunately because I was on Mf3, this couldn't be done. but I was able to force this option with a build prop edit and surprisingly after all this was done screen mirroring now works. below I will post copies of my build prop and also the WFDConfig files from /system/ect ---- Build prop : # # system.prop for surf # rild.libpath=/system/lib/libril-qc-qmi-1.so ro.sf.lcd_density=480 rild.libargs=-d /dev/smd0 persist.rild.nitz_plmn= persist.rild.nitz_long_ons_0= persist.rild.nitz_long_ons_1= persist.rild.nitz_long_ons_2= persist.rild.nitz_long_ons_3= persist.rild.nitz_short_ons_0= persist.rild.nitz_short_ons_1= persist.rild.nitz_short_ons_2= persist.rild.nitz_short_ons_3= ril.subscription.types=NV,RUIM DEVICE_PROVISIONED=1 debug.sf.hw=0 debug.composition.7x27A.type=mdp debug.composition.7x25A.type=mdp dalvik.vm.heapsize=24m debug.composition.type=dyn persist.hwc.mdpcomp.enable=false service.camera.gpu.enable=0 Debug.Disable.HWC=1 debug.sf.disablehwc=1 ro.display.switch=0 #dyn # system props for the cne module # persist.cne.feature=0 # # system props for the MM modules # media.stagefright.enable-player=true media.stagefright.enable-meta=true media.stagefright.enable-scan=true media.stagefright.enable-http=false media.stagefright.enable-fma2dp=true media.stagefright.enable-aac=true media.stagefright.enable-qcp=true media.enable-commonsource=true media.stagefright.enable-rtsp=true # # system props for the LPA/TUNNEL # lpa.decode=true tunnel.decode=true lpa.use-stagefright=true tunnel.audiovideo.decode=true # # system prop for opengles version # ro.opengles.version=131072 # # system props for the data modules # ro.use_data_netmgrd=true persist.data.ds_fmc_app.mode=0 # # system props for IMS module # persist.ims.regmanager.mode=0 # # system prop for requesting Master role in incoming Bluetooth connection. # ro.bluetooth.request.master=true # # system prop for Bluetooth FTP profile # ro.qualcomm.bluetooth.ftp=true # # system prop for Bluetooth SAP profile # ro.qualcomm.bluetooth.sap=true # # system prop for Bluetooth Auto connect for remote initated connections # ro.bluetooth.remote.autoconnect=true # #system property for Bluetooth discoverability timeout in seconds #0: Always discoverable #debug.bt.discoverable_time=0 # # System prop to disable strict mode flash on display # persist.sys.strictmode.visual=false # # System prop to enable/disable OMH. Enabled by default # persist.omh.enabled=1 #System prop to enable ehrpd capability ro.config.ehrpd=true # System property for cabl ro.qualcomm.cabl=0 # #System prop to determine availability of #analog fm path # ro.fm.analogpath.supported=true # #System property for FM transmitter # ro.fm.transmitter=false # #System property for single instance recording # ro.fm.mulinst.recording.support=false # #System property for msm # ro.hw_plat=7x27a # # system props for SD card emulation of emmc partition # ro.emmc.sdcard.partition=18 # # system property to enforce Phone Mode view # ro.screen.layout=normal # # Turn off tiled rendering # debug.enabletr=false # #System prop for setting the pixel format # ro.staticwallpaper.pixelformat=RGB_565 # #System prop for disabling the meta data mode for encoder # debug.camcorder.disablemeta=1 # # Simulate sdcard on /data/media # persist.fuse_sdcard=true # # System prop for using landscape preview layout in camera # debug.camera.landscape=true # # System prop for capping scroll velocity # ro.max.fling_velocity=8000 # #system prop for Bluetooth hci transport # ro.qualcomm.bt.hci_transport=smd # #property to enable user to access Google WFD settings. # persist.debug.wfd.enable=1 debug.wfd.enable=1 ext_only.debug=1 persist.sys.ext_only.debug=1 persist.sys.hwc.ext_only.debug=1 persist.sys.hwc.disable=1 #property to choose between virtual/external wfd display # persist.sys.wfd.virtual=0 # # System prop for Tvout/HDMI # persist.sys.camera.transform=0 persist.sys.camera.connect=0 persist.sys.videomode=1 ro.hdmi.enable=false # System proverty for sys info indication persist.radio.add_power_save=1 # System property for Default Brightness ro.lcd_min_brightness=10 ro.lcd_brightness=143 # Keep SIM state on LPM mode persist.radio.apm_sim_not_pwdn=1 # use se table when search list persist.radio.use_se_table_only=1 # System prop for PLMN persist.radio.fill_eons=1 # # ADDITIONAL_BUILD_PROPERTIES # dalvik.vm.heapstartsize=8m dalvik.vm.heapgrowthlimit=128m dalvik.vm.heapsize=512m dalvik.vm.heaputilization=0.25 dalvik.vm.heapidealfree=8388608 dalvik.vm.heapconcurrentstart=2097152 ro.vendor.extension_library=/system/lib/libqc-opt.so dalvik.vm.heaptargetutilization=0.75 dalvik.vm.heapminfree=512k dalvik.vm.heapmaxfree=8m ro.hwui.texture_cache_size=48 ro.hwui.layer_cache_size=32 ro.hwui.path_cache_size=8 ro.hwui.shape_cache_size=2 ro.hwui.gradient_cache_size=1 ro.hwui.drop_shadow_cache_size=4 ro.hwui.texture_cache_flush_rate=0.5 ro.hwui.text_small_cache_width=1024 ro.hwui.text_small_cache_height=512 ro.hwui.text_large_cache_width=2048 ro.hwui.text_large_cache_height=1024 ro.sec.fle.encryption=true ro.hdcp2.rx=tz ro.secwvk=144 ro.crypto.support=recovery_mount|others ro.config.alarm_alert=Alarm_Morning_flower.ogg ro.config.ringtone=ATT_Firefly_Default.ogg ro.config.notification_sound=Whisper.ogg ro.monkey=0 ro.error.receiver.default=com.samsung.receiver.error keyguard.no_require_sim=true ro.com.android.dateformat=MM-dd-yyyy ro.carrier=unknown ro.ril.hsxpa=1 ro.ril.gprsclass=10 ro.adb.qemud=1 ro.setupwizard.mode=DISABLED ro.com.google.apphider=off ro.com.google.clientidbase=android-samsung ro.com.google.clientidbase.ms=android-att-us ro.com.google.clientidbase.am=android-att-us ro.com.google.clientidbase.yt=android-samsung ro.com.google.clientidbase.gmm=android-samsung ro.com.google.gmsversion=4.2_r2 ro.kernel.qemu=0 ro.build.selinux=1 ro.config.tima=1 net.bt.name=Android dalvik.vm.stack-trace-file=/data/anr/traces.txt ro.qc.sdk.izat.premium_enabled=0 persist.gps.qc_nlp_in_use=0 --- WFDConfig. Xml <WFDConfig> <Capability> <AudioLPCM> <Name>LPCM</Name> <Valid>1</Valid> <Channels>2</Channels> <SamplingFreq>48000</SamplingFreq> <Latency>33</Latency> </AudioLPCM> <AudioAAC> <Name>AAC</Name> <Valid>1</Valid> <Channels>2</Channels> <SamplingFreq>48000</SamplingFreq> <Latency>0</Latency> </AudioAAC> <AudioAC3> <Name>AC3</Name> <Valid>0</Valid> <Channels>0</Channels> <SamplingFreq>0</SamplingFreq> <Latency>0</Latency> </AudioAC3> <VideoHeader> <VideoMethod>1</VideoMethod> <PreferredDisplaySupport>0</PreferredDisplaySupport> <H264Profiles>1</H264Profiles> <Valid>1</Valid> </VideoHeader> <CBP> <VideoCodec> <Profile>1</Profile> <Level>1</Level> <HorizontalResolution>1280</HorizontalResolution> <VerticalResolution>720</VerticalResolution> <Latency>0</Latency> <MinimumSliceSize>0</MinimumSliceSize> <SliceEncodingParams>0</SliceEncodingParams> <FrameRateControlSupp>1</FrameRateControlSupp> <VideoFps>30</VideoFps> </VideoCodec> </CBP> <StandbyResumeCapability> <Valid>1</Valid> </StandbyResumeCapability> <!-- IDR interval is to trigger an IDR request from sink. This can be applcable only to sink. IDRInterval is in msec --> <IDRRequest> <Valid>0</Valid> <IDRInterval>0</IDRInterval> </IDRRequest> <AVFormatChange> <Valid>0</Valid> <AVInterval>0</AVInterval> </AVFormatChange> <!-- Frame skipping interval is in the scale of 500 msec/half second. FrameInterval can be between 1 to 7, according to the WFD spec. --> <FrameSkipping> <Valid>0</Valid> <FrameInterval>0</FrameInterval> </FrameSkipping> <ContentProtection> <HDCPValid>0</HDCPValid> <Version>WFD_HDCP_2_1</Version> <!-- Valid values WFD_HDCP_2_0 and WFD_HDCP_2_1 --> <CPPort>6789</CPPort> <EncryptAudio>0</EncryptAudio> <!-- Valid values 0 / 1 to indicate Audio encryption or not --> </ContentProtection> <RTPDumpEnable> <Valid>0</Valid> </RTPDumpEnable> <BufferCtrlEnable> <Valid>1</Valid> </BufferCtrlEnable> <UIBC> <UIBCValid>1</UIBCValid> <!-- 0/1 UIBC supported or not --> <InputCategory> <Generic>1</Generic> <!-- 0/1 - support generic or not --> </InputCategory> <InputEvents> <GenericInputEvents> <Mouse>1</Mouse> <!-- 0/1 for all Input Event Types --> <Keyboard>1</Keyboard> <SingleTouch>1</SingleTouch> <MultiTouch>1</MultiTouch> <JoyStick>0</JoyStick> <Camera>0</Camera> <Gesture>0</Gesture> <RemoteControl>1</RemoteControl> </GenericInputEvents> </InputEvents> <TcpPort>4321</TcpPort> </UIBC> </Capability> ---- Compatibility. Xml <Capability> <AudioLPCM> <Name>LPCM</Name> <Valid>1</Valid> <Channels>2</Channels> <SamplingFreq>48000</SamplingFreq> <Latency>33</Latency> </AudioLPCM> <AudioAAC> <Name>AAC</Name> <Valid>1</Valid> <Channels>2</Channels> <SamplingFreq>48000</SamplingFreq> <Latency>0</Latency> </AudioAAC> <AudioAC3> <Name>AC3</Name> <Valid>0</Valid> <Channels>0</Channels> <SamplingFreq>0</SamplingFreq> <Latency>0</Latency> </AudioAC3> <VideoHeader> <VideoMethod>1</VideoMethod> <PreferredDisplaySupport>0</PreferredDisplaySupport> <H264Profiles>1</H264Profiles> <Valid>1</Valid> </VideoHeader> <CBP> <VideoCodec> <Profile>1</Profile> <Level>1</Level> <HorizontalResolution>1280</HorizontalResolution> <VerticalResolution>720</VerticalResolution> <Latency>0</Latency> <MinimumSliceSize>0</MinimumSliceSize> <SliceEncodingParams>0</SliceEncodingParams> <FrameRateControlSupp>1</FrameRateControlSupp> <VideoFps>30</VideoFps> </VideoCodec> </CBP> <CHP> <VideoCodec> <Profile>2</Profile> <Level>1</Level> <HorizontalResolution>800</HorizontalResolution> <VerticalResolution>480</VerticalResolution> <Latency>0</Latency> <MinimumSliceSize>0</MinimumSliceSize> <SliceEncodingParams>0</SliceEncodingParams> <FrameRateControlSupp>1</FrameRateControlSupp> <VideoFps>30</VideoFps> </VideoCodec> </CHP> <StandbyResumeCapability> <Valid>1</Valid> </StandbyResumeCapability> <!-- IDR interval is to trigger an IDR request from sink. This can be applcable only to sink. IDRInterval is in msec --> <IDRRequest> <Valid>0</Valid> <IDRInterval>0</IDRInterval> </IDRRequest> <AVFormatChange> <Valid>0</Valid> <AVInterval>0</AVInterval> </AVFormatChange> <!-- Frame skipping interval is in the scale of 500 msec/half second. FrameInterval can be between 1 to 7, according to the WFD spec. --> <FrameSkipping> <Valid>0</Valid> <FrameInterval>0</FrameInterval> </FrameSkipping> <ContentProtection> <HDCPValid>0</HDCPValid> <Version>WFD_HDCP_2_1</Version> <!-- Valid values WFD_HDCP_2_0 and WFD_HDCP_2_1 --> <CPPort>6789</CPPort> </ContentProtection> <RTPPortType> <ConnectionType>0</ConnectionType> <!-- 0 - UDP ,1 - TCP --> </RTPPortType> <RTPDumpEnable> <Valid>0</Valid> <!-- Enable RTP Dump Valid = 1 or Valid = 0--> </RTPDumpEnable> <UIBC> <UIBCValid>0</UIBCValid> <!-- 0/1 UIBC supported or not --> <InputCategory> <Generic>1</Generic> <!-- 0/1 - support generic or not --> </InputCategory> <InputEvents> <GenericInputEvents> <Mouse>1</Mouse> <!-- 0/1 for all Input Event Types --> <Keyboard>1</Keyboard> <SingleTouch>1</SingleTouch> <MultiTouch>1</MultiTouch> <JoyStick>1</JoyStick> <Camera>0</Camera> <Gesture>0</Gesture> <RemoteControl>1</RemoteControl> </GenericInputEvents> </InputEvents> <TcpPort>4321</TcpPort> </UIBC> </Capability> I claim no responsibility for you changing files on your own phone, this fixed took me about a month of constant work and if you change the wrong files it may brick your phone. If ive helped you fix screen mirroring And you would like to thank me.... buy me a coffee PayPal: [email protected]
How about posting just the changes? Sent from my GT-I9505 using Tapatalk
Thanks bro but ... Sorry but works is already done by the master Sorg ^^ http://forum.xda-developers.com/showthread.php?t=2621550 look at that : (by mrmrmrmr not by me ^^) Here is a short description of steps to follow if you want to do the same for other devices: 1. download and install IDA Pro 2. download and install WinHEx 3. download and install any text compare util 4. Open patched and unpatched version lib file of the same device (any device) with IDA 5. get text output of both files to the text compare utility 6. find the 3 differences. analyze where they are in the file (look for seacrhable text patterns) 7. open YOUR device's unpacthed lib file with IDA pro 8. find the correspondances found on step 6 in your own file. 9. note the line number (hex address) of each 3 correspondances 10. now open all 3 files on Winhex 11. jump to the noted hex addresses and change the bytes according to the difference of 2 files of the same device. 12. make the change on your own file and save. So to do it you have to install 4.4.2 and look libWFD into and change it ^^, i got i9500 MBC, when 4.4.2 MBC will be in the place, i will try to do it, but thats look a little hard for a noob like me ^^ So if you want to do it on the 4.4.2 I9500XXUFNB3 russian, you are welcome ---------- Post added at 01:51 PM ---------- Previous post was at 01:46 PM ---------- androidrouen said: Sorry but works is already done by the master Sorg ^^ http://forum.xda-developers.com/showthread.php?t=2621550 look at that : (by mrmrmrmr not by me ^^) Here is a short description of steps to follow if you want to do the same for other devices: 1. download and install IDA Pro 2. download and install WinHEx 3. download and install any text compare util 4. Open patched and unpatched version lib file of the same device (any device) with IDA 5. get text output of both files to the text compare utility 6. find the 3 differences. analyze where they are in the file (look for seacrhable text patterns) 7. open YOUR device's unpacthed lib file with IDA pro 8. find the correspondances found on step 6 in your own file. 9. note the line number (hex address) of each 3 correspondances 10. now open all 3 files on Winhex 11. jump to the noted hex addresses and change the bytes according to the difference of 2 files of the same device. 12. make the change on your own file and save. So to do it you have to install 4.4.2 and look libWFD into and change it ^^, i got i9500 MBC, when 4.4.2 MBC will be in the place, i will try to do it, but thats look a little hard for a noob like me ^^ So if you want to do it on the 4.4.2 I9500XXUFNB3 russian, you are welcome Click to expand... Click to collapse I didn t see you got a locked bootloader !!!!!!!!!!!!! SORRY :crying:
I was just about to say that I said its already been done by hacking libs... but yea, that wont work for those of us with locked bootloaders
Any fix available for i9500 on 4.4.2 ? Sent from my GT-I9500 using XDA Premium 4 mobile app
thx 4 that!
Screen Mirroring restored on rooted S4 (19500) 4.4.2 rkadve said: Any fix available for i9500 on 4.4.2 ? Sent from my GT-I9500 using XDA Premium 4 mobile app Click to expand... Click to collapse DjeMBey has a working method. See this thread: http://forum.xda-developers.com/showthread.php?t=2255190 I flashed the provided OFFICIAL STATUS MOD file via Odin & then used Wanam Xposed to 'fake system status'. This changed my Binary status to official & screen mirroring is now working. On my rooted S4 (I9500) on 4.4.2 (19500XXUFNA6). Try it & let us know if it works for you ?
Sound mirrors, yet screen wont mirror Hello, I recently stumbled onto your post and am having a little trouble getting the screen mirroring to work on my rooted SGH-I337 to Miracast. I have followed your instructions and have gotten the pesky little hdcp message on the screen to go away, yet I only get audio on my tv and no picture, just a black screen. I really do not want to unroot my phone to get this working, due to me being on a custom SGH-M919 rom on my SGH-I337. I followed the instructions on this post to flash the custom rom using Safestrap. http://forum.xda-developers.com/galaxy-s4-att/general/convert-i337-to-m919-wifi-caling-t2896719 I can reply with copies of my build prop, wfd config, and capability files if necessary. I also read the replies on this post and added the wlan.wfd.hcdp=disable yet have no screen mirror, just audio mirror. Have you heard of this before? I feel that some line of code may be missing in one of these files. Im using Tomi buid.prop editor to edit my build prop and es file explorer to edit the wfd and capability xml files. Plz Help!
xxjomamaxx said: so here's the deal. trying to start screen mirroring on a rooted device in most cases HDCP will fail to initialize, when this happens screen mirroring will connect then disconnect with an error. after a lot of research, logging and testing on my device I have found a way to bypass HDCP and also bypass Samsung restriction on allowing screen mirroring without HDCP. HDCP is not a requirement for screen mirroring but Samsung has programmed the s4 to fail if the HDCP connection is not initialized. I have found that when the phone speaks to the miracast dongle the phone is programmed to force the setting of "Display service Type = HDMI" instead of allowing it to connect as Type = Wifi. when the phone forces type = HDMI it makes screen mirroring fail if HDCP fails, this is a basic and enforced protocol of HDMI, this results in screen mirroring shutting off if HDCP fails, I believe this is Samsung's attempt to stop people from rooting their phones and also to stop people from using non Samsung dongles. some people have found ways around this by hacking the HDCP lib files, but in my case this was not possible because I own a Sgh-i337 on mf3 with a locked bootloader. unfortunately I can't post pictures so I can post my screen mirroring logs, but heres an explanation as to how this was accomplished. First was to quarantine all Samsung Apps & services that were related to screen mirroring, this was an attempt to get the system to fall back to the native screen mirroring services and not use samsung's implementation. I locked up: Com.sec.allsharecastplayer Com.samsung.shareshot Samsung watch on Samsung briefing Allshare.controlShareService Allshare.fileShareService Samsung context provider All Knox Samsung MDM app Allshare.service.mediaShare Samsung apps Samsung apps UNA2 Samsung apps widget Samsung link Samsung push next I tried to find out a way to edit the DisplayManagerService's forced type of HDMI to change it to Type = Wifi, unfortunately because I was on Mf3, this couldn't be done. but I was able to force this option with a build prop edit and surprisingly after all this was done screen mirroring now works. below I will post copies of my build prop and also the WFDConfig files from /system/ect ---- Build prop : # # system.prop for surf # rild.libpath=/system/lib/libril-qc-qmi-1.so ro.sf.lcd_density=480 rild.libargs=-d /dev/smd0 persist.rild.nitz_plmn= persist.rild.nitz_long_ons_0= persist.rild.nitz_long_ons_1= persist.rild.nitz_long_ons_2= persist.rild.nitz_long_ons_3= persist.rild.nitz_short_ons_0= persist.rild.nitz_short_ons_1= persist.rild.nitz_short_ons_2= persist.rild.nitz_short_ons_3= ril.subscription.types=NV,RUIM DEVICE_PROVISIONED=1 debug.sf.hw=0 debug.composition.7x27A.type=mdp debug.composition.7x25A.type=mdp dalvik.vm.heapsize=24m debug.composition.type=dyn persist.hwc.mdpcomp.enable=false service.camera.gpu.enable=0 Debug.Disable.HWC=1 debug.sf.disablehwc=1 ro.display.switch=0 #dyn # system props for the cne module # persist.cne.feature=0 # # system props for the MM modules # media.stagefright.enable-player=true media.stagefright.enable-meta=true media.stagefright.enable-scan=true media.stagefright.enable-http=false media.stagefright.enable-fma2dp=true media.stagefright.enable-aac=true media.stagefright.enable-qcp=true media.enable-commonsource=true media.stagefright.enable-rtsp=true # # system props for the LPA/TUNNEL # lpa.decode=true tunnel.decode=true lpa.use-stagefright=true tunnel.audiovideo.decode=true # # system prop for opengles version # ro.opengles.version=131072 # # system props for the data modules # ro.use_data_netmgrd=true persist.data.ds_fmc_app.mode=0 # # system props for IMS module # persist.ims.regmanager.mode=0 # # system prop for requesting Master role in incoming Bluetooth connection. # ro.bluetooth.request.master=true # # system prop for Bluetooth FTP profile # ro.qualcomm.bluetooth.ftp=true # # system prop for Bluetooth SAP profile # ro.qualcomm.bluetooth.sap=true # # system prop for Bluetooth Auto connect for remote initated connections # ro.bluetooth.remote.autoconnect=true # #system property for Bluetooth discoverability timeout in seconds #0: Always discoverable #debug.bt.discoverable_time=0 # # System prop to disable strict mode flash on display # persist.sys.strictmode.visual=false # # System prop to enable/disable OMH. Enabled by default # persist.omh.enabled=1 #System prop to enable ehrpd capability ro.config.ehrpd=true # System property for cabl ro.qualcomm.cabl=0 # #System prop to determine availability of #analog fm path # ro.fm.analogpath.supported=true # #System property for FM transmitter # ro.fm.transmitter=false # #System property for single instance recording # ro.fm.mulinst.recording.support=false # #System property for msm # ro.hw_plat=7x27a # # system props for SD card emulation of emmc partition # ro.emmc.sdcard.partition=18 # # system property to enforce Phone Mode view # ro.screen.layout=normal # # Turn off tiled rendering # debug.enabletr=false # #System prop for setting the pixel format # ro.staticwallpaper.pixelformat=RGB_565 # #System prop for disabling the meta data mode for encoder # debug.camcorder.disablemeta=1 # # Simulate sdcard on /data/media # persist.fuse_sdcard=true # # System prop for using landscape preview layout in camera # debug.camera.landscape=true # # System prop for capping scroll velocity # ro.max.fling_velocity=8000 # #system prop for Bluetooth hci transport # ro.qualcomm.bt.hci_transport=smd # #property to enable user to access Google WFD settings. # persist.debug.wfd.enable=1 debug.wfd.enable=1 ext_only.debug=1 persist.sys.ext_only.debug=1 persist.sys.hwc.ext_only.debug=1 persist.sys.hwc.disable=1 #property to choose between virtual/external wfd display # persist.sys.wfd.virtual=0 # # System prop for Tvout/HDMI # persist.sys.camera.transform=0 persist.sys.camera.connect=0 persist.sys.videomode=1 ro.hdmi.enable=false # System proverty for sys info indication persist.radio.add_power_save=1 # System property for Default Brightness ro.lcd_min_brightness=10 ro.lcd_brightness=143 # Keep SIM state on LPM mode persist.radio.apm_sim_not_pwdn=1 # use se table when search list persist.radio.use_se_table_only=1 # System prop for PLMN persist.radio.fill_eons=1 # # ADDITIONAL_BUILD_PROPERTIES # dalvik.vm.heapstartsize=8m dalvik.vm.heapgrowthlimit=128m dalvik.vm.heapsize=512m dalvik.vm.heaputilization=0.25 dalvik.vm.heapidealfree=8388608 dalvik.vm.heapconcurrentstart=2097152 ro.vendor.extension_library=/system/lib/libqc-opt.so dalvik.vm.heaptargetutilization=0.75 dalvik.vm.heapminfree=512k dalvik.vm.heapmaxfree=8m ro.hwui.texture_cache_size=48 ro.hwui.layer_cache_size=32 ro.hwui.path_cache_size=8 ro.hwui.shape_cache_size=2 ro.hwui.gradient_cache_size=1 ro.hwui.drop_shadow_cache_size=4 ro.hwui.texture_cache_flush_rate=0.5 ro.hwui.text_small_cache_width=1024 ro.hwui.text_small_cache_height=512 ro.hwui.text_large_cache_width=2048 ro.hwui.text_large_cache_height=1024 ro.sec.fle.encryption=true ro.hdcp2.rx=tz ro.secwvk=144 ro.crypto.support=recovery_mount|others ro.config.alarm_alert=Alarm_Morning_flower.ogg ro.config.ringtone=ATT_Firefly_Default.ogg ro.config.notification_sound=Whisper.ogg ro.monkey=0 ro.error.receiver.default=com.samsung.receiver.error keyguard.no_require_sim=true ro.com.android.dateformat=MM-dd-yyyy ro.carrier=unknown ro.ril.hsxpa=1 ro.ril.gprsclass=10 ro.adb.qemud=1 ro.setupwizard.mode=DISABLED ro.com.google.apphider=off ro.com.google.clientidbase=android-samsung ro.com.google.clientidbase.ms=android-att-us ro.com.google.clientidbase.am=android-att-us ro.com.google.clientidbase.yt=android-samsung ro.com.google.clientidbase.gmm=android-samsung ro.com.google.gmsversion=4.2_r2 ro.kernel.qemu=0 ro.build.selinux=1 ro.config.tima=1 net.bt.name=Android dalvik.vm.stack-trace-file=/data/anr/traces.txt ro.qc.sdk.izat.premium_enabled=0 persist.gps.qc_nlp_in_use=0 --- WFDConfig. Xml <WFDConfig> <Capability> <AudioLPCM> <Name>LPCM</Name> <Valid>1</Valid> <Channels>2</Channels> <SamplingFreq>48000</SamplingFreq> <Latency>33</Latency> </AudioLPCM> <AudioAAC> <Name>AAC</Name> <Valid>1</Valid> <Channels>2</Channels> <SamplingFreq>48000</SamplingFreq> <Latency>0</Latency> </AudioAAC> <AudioAC3> <Name>AC3</Name> <Valid>0</Valid> <Channels>0</Channels> <SamplingFreq>0</SamplingFreq> <Latency>0</Latency> </AudioAC3> <VideoHeader> <VideoMethod>1</VideoMethod> <PreferredDisplaySupport>0</PreferredDisplaySupport> <H264Profiles>1</H264Profiles> <Valid>1</Valid> </VideoHeader> <CBP> <VideoCodec> <Profile>1</Profile> <Level>1</Level> <HorizontalResolution>1280</HorizontalResolution> <VerticalResolution>720</VerticalResolution> <Latency>0</Latency> <MinimumSliceSize>0</MinimumSliceSize> <SliceEncodingParams>0</SliceEncodingParams> <FrameRateControlSupp>1</FrameRateControlSupp> <VideoFps>30</VideoFps> </VideoCodec> </CBP> <StandbyResumeCapability> <Valid>1</Valid> </StandbyResumeCapability> <!-- IDR interval is to trigger an IDR request from sink. This can be applcable only to sink. IDRInterval is in msec --> <IDRRequest> <Valid>0</Valid> <IDRInterval>0</IDRInterval> </IDRRequest> <AVFormatChange> <Valid>0</Valid> <AVInterval>0</AVInterval> </AVFormatChange> <!-- Frame skipping interval is in the scale of 500 msec/half second. FrameInterval can be between 1 to 7, according to the WFD spec. --> <FrameSkipping> <Valid>0</Valid> <FrameInterval>0</FrameInterval> </FrameSkipping> <ContentProtection> <HDCPValid>0</HDCPValid> <Version>WFD_HDCP_2_1</Version> <!-- Valid values WFD_HDCP_2_0 and WFD_HDCP_2_1 --> <CPPort>6789</CPPort> <EncryptAudio>0</EncryptAudio> <!-- Valid values 0 / 1 to indicate Audio encryption or not --> </ContentProtection> <RTPDumpEnable> <Valid>0</Valid> </RTPDumpEnable> <BufferCtrlEnable> <Valid>1</Valid> </BufferCtrlEnable> <UIBC> <UIBCValid>1</UIBCValid> <!-- 0/1 UIBC supported or not --> <InputCategory> <Generic>1</Generic> <!-- 0/1 - support generic or not --> </InputCategory> <InputEvents> <GenericInputEvents> <Mouse>1</Mouse> <!-- 0/1 for all Input Event Types --> <Keyboard>1</Keyboard> <SingleTouch>1</SingleTouch> <MultiTouch>1</MultiTouch> <JoyStick>0</JoyStick> <Camera>0</Camera> <Gesture>0</Gesture> <RemoteControl>1</RemoteControl> </GenericInputEvents> </InputEvents> <TcpPort>4321</TcpPort> </UIBC> </Capability> ---- Compatibility. Xml <Capability> <AudioLPCM> <Name>LPCM</Name> <Valid>1</Valid> <Channels>2</Channels> <SamplingFreq>48000</SamplingFreq> <Latency>33</Latency> </AudioLPCM> <AudioAAC> <Name>AAC</Name> <Valid>1</Valid> <Channels>2</Channels> <SamplingFreq>48000</SamplingFreq> <Latency>0</Latency> </AudioAAC> <AudioAC3> <Name>AC3</Name> <Valid>0</Valid> <Channels>0</Channels> <SamplingFreq>0</SamplingFreq> <Latency>0</Latency> </AudioAC3> <VideoHeader> <VideoMethod>1</VideoMethod> <PreferredDisplaySupport>0</PreferredDisplaySupport> <H264Profiles>1</H264Profiles> <Valid>1</Valid> </VideoHeader> <CBP> <VideoCodec> <Profile>1</Profile> <Level>1</Level> <HorizontalResolution>1280</HorizontalResolution> <VerticalResolution>720</VerticalResolution> <Latency>0</Latency> <MinimumSliceSize>0</MinimumSliceSize> <SliceEncodingParams>0</SliceEncodingParams> <FrameRateControlSupp>1</FrameRateControlSupp> <VideoFps>30</VideoFps> </VideoCodec> </CBP> <CHP> <VideoCodec> <Profile>2</Profile> <Level>1</Level> <HorizontalResolution>800</HorizontalResolution> <VerticalResolution>480</VerticalResolution> <Latency>0</Latency> <MinimumSliceSize>0</MinimumSliceSize> <SliceEncodingParams>0</SliceEncodingParams> <FrameRateControlSupp>1</FrameRateControlSupp> <VideoFps>30</VideoFps> </VideoCodec> </CHP> <StandbyResumeCapability> <Valid>1</Valid> </StandbyResumeCapability> <!-- IDR interval is to trigger an IDR request from sink. This can be applcable only to sink. IDRInterval is in msec --> <IDRRequest> <Valid>0</Valid> <IDRInterval>0</IDRInterval> </IDRRequest> <AVFormatChange> <Valid>0</Valid> <AVInterval>0</AVInterval> </AVFormatChange> <!-- Frame skipping interval is in the scale of 500 msec/half second. FrameInterval can be between 1 to 7, according to the WFD spec. --> <FrameSkipping> <Valid>0</Valid> <FrameInterval>0</FrameInterval> </FrameSkipping> <ContentProtection> <HDCPValid>0</HDCPValid> <Version>WFD_HDCP_2_1</Version> <!-- Valid values WFD_HDCP_2_0 and WFD_HDCP_2_1 --> <CPPort>6789</CPPort> </ContentProtection> <RTPPortType> <ConnectionType>0</ConnectionType> <!-- 0 - UDP ,1 - TCP --> </RTPPortType> <RTPDumpEnable> <Valid>0</Valid> <!-- Enable RTP Dump Valid = 1 or Valid = 0--> </RTPDumpEnable> <UIBC> <UIBCValid>0</UIBCValid> <!-- 0/1 UIBC supported or not --> <InputCategory> <Generic>1</Generic> <!-- 0/1 - support generic or not --> </InputCategory> <InputEvents> <GenericInputEvents> <Mouse>1</Mouse> <!-- 0/1 for all Input Event Types --> <Keyboard>1</Keyboard> <SingleTouch>1</SingleTouch> <MultiTouch>1</MultiTouch> <JoyStick>1</JoyStick> <Camera>0</Camera> <Gesture>0</Gesture> <RemoteControl>1</RemoteControl> </GenericInputEvents> </InputEvents> <TcpPort>4321</TcpPort> </UIBC> </Capability> I claim no responsibility for you changing files on your own phone, this fixed took me about a month of constant work and if you change the wrong files it may brick your phone. If ive helped you fix screen mirroring And you would like to thank me.... buy me a coffee PayPal: [email protected] Click to expand... Click to collapse what are the changes exactly?
[BUSYBOX] [INSTALLER] BonBon's busybox [25/11/2015]
BUSYBOX { "lightbox_close": "Close", "lightbox_next": "Next", "lightbox_previous": "Previous", "lightbox_error": "The requested content cannot be loaded. Please try again later.", "lightbox_start_slideshow": "Start slideshow", "lightbox_stop_slideshow": "Stop slideshow", "lightbox_full_screen": "Full screen", "lightbox_thumbnails": "Thumbnails", "lightbox_download": "Download", "lightbox_share": "Share", "lightbox_zoom": "Zoom", "lightbox_new_window": "New window", "lightbox_toggle_sidebar": "Toggle sidebar" } Next part is copied from the official busybox website: BusyBox: The Swiss Army Knife of Embedded Linux BusyBox combines tiny versions of many common UNIX utilities into a single small executable. It provides replacements for most of the utilities you usually find in GNU fileutils, shellutils, etc. The utilities in BusyBox generally have fewer options than their full-featured GNU cousins; however, the options that are included provide the expected functionality and behave very much like their GNU counterparts. BusyBox provides a fairly complete environment for any small or embedded system. Click to expand... Click to collapse These are my builds of busybox for ARM, x86 and MIPS devices. They'll always be up-to date and compiled with speed and recourses in-mind. Why use these builds? Compared to other busybox builds, I have few additional applets and other obsolete ones removed. There's also some speed and size tweaks in place. But the main improvement, is the three busybox versions: A full one, that has all the applets an android user could ever dream of. A modular build, that is suited for everyday users A minimalistic build, that only has core applets often needed for scripting. [If you want your own custom build of busybox with just specific applets, PM me and we'll talk about it :highfive:] In which situations to use what builds? Minimalistic It's ideal for mod makers or other script creators to include the minimalistic build inside their work, for ensured compatibility and speed / size optimizations! > Download < Applets: [, [[, ash, awk, base64, basename, bash, beep, bootchartd, cal, cat, chattr, chgrp, chmod, chown, chroot, cksum, clear, cmp, comm, cp, cpio, cttyhack, cut, date, dc, dd, depmod, df, diff, dirname, dmesg, dos2unix, du, echo, egrep, env, expand, expr, false, fdisk, fgrep, find, fold, free, fsck, fsck.minix, fstrim, fsync, fuser, getopt, grep, groups, gunzip, gzip, halt, head, id, insmod, install, ip, ipaddr, iplink, iprule, iptunnel, kill, killall, killall5, last, less, ln, logger, logread, ls, lsattr, lsmod, md5sum, mesg, mkdir, mkdosfs, mke2fs, mkfifo, mkfs.ext2, mkfs.minix, mkfs.vfat, mknod, mkswap, mktemp, modinfo, modprobe, more, mount, mountpoint, mv, nanddump, nandwrite, nice, nohup, od, openvt, patch, pgrep, pidof, ping, pipe_progress, pkill, pmap, poweroff, powertop, printenv, printf, ps, pscan, pstree, pwd, pwdx, readahead, readlink, realpath, reboot, renice, reset, resize, rm, rmdir, rmmod, rpm, rpm2cpio, run-parts, sed, seq, sh, sha1sum, sha256sum, sha3sum, sha512sum, showkey, shuf, sleep, sort, split, start-stop-daemon, stat, stty, sum, swapoff, swapon, switch_root, sync, sysctl, syslogd, tac, tail, tar, tee, test, time, timeout, top, touch, tr, true, truncate, tty, tune2fs, umount, uname, unexpand, uniq, unix2dos, unxz, unzip, uptime, users, usleep, uudecode, uuencode, watch, wc, wget, which, who, xargs, xz, xzcat, yes, zcat Modular The modular build is just what you need if someone or something needs busybox installed. It has everything needed for regular android use > Download < Applets: [, [[, acpid, adjtimex, arp, arping, ash, awk, base64, basename, bash, bbconfig, beep, blkid, blockdev, cal, cat, chattr, chgrp, chmod, chown, chroot, chvt, cksum, clear, cmp, comm, cp, cpio, crond, crontab, cttyhack, cut, date, dc, dd, deallocvt, depmod, devmem, df, diff, dirname, dmesg, dnsd, dnsdomainname, dos2unix, du, dumpkmap, echo, egrep, env, envdir, envuidgid, expand, expr, fakeidentd, false, fatattr, fbset, fbsplash, fdflush, fdformat, fdisk, fgconsole, fgrep, find, findfs, flash_lock, flash_unlock, flashcp, flock, fold, free, freeramdisk, fsck, fsck.minix, fstrim, fsync, ftpd, ftpget, ftpput, fuser, getopt, grep, groups, gunzip, gzip, halt, hd, head, hexdump, hostname, hwclock, i2cdetect, i2cdump, i2cget, i2cset, id, inotifyd, insmod, install, ionice, iostat, ip, ipaddr, ipcalc, iplink, iproute, iprule, iptunnel, kbd_mode, kill, killall, killall5, less, ln, loadkmap, logger, logread, losetup, ls, lsattr, lsmod, lsof, lspci, lsusb, makedevs, md5sum, mdev, mesg, microcom, mkdir, mkdosfs, mke2fs, mkfs.ext2, mkfs.minix, mkfs.vfat, mknod, mkswap, mktemp, modinfo, modprobe, more, mount, mountpoint, mpstat, mv, nameif, nanddump, nandwrite, nbd-client, nc, netstat, nice, nmeter, nohup, nslookup, od, openvt, patch, pgrep, pidof, ping, ping6, pipe_progress, pivot_root, pkill, pmap, poweroff, printenv, printf, ps, pscan, pstree, pwd, pwdx, raidautorun, rdate, rdev, readlink, readprofile, realpath, reboot, renice, reset, resize, rm, rmdir, rmmod, route, rpm, rpm2cpio, rtcwake, run-parts, rx, script, scriptreplay, sed, seq, setconsole, setkeycodes, setlogcons, setserial, setsid, setuidgid, sh, sha1sum, sha256sum, sha3sum, sha512sum, showkey, shuf, slattach, sleep, smemcap, softlimit, sort, split, start-stop-daemon, stat, strings, stty, sum, svlogd, swapoff, swapon, switch_root, sync, sysctl, syslogd, tac, tail, tar, tcpsvd, tee, test, tftp, tftpd, time, timeout, top, touch, tr, traceroute, traceroute6, true, truncate, tty, ttysize, tune2fs, ubiattach, ubidetach, ubimkvol, ubirmvol, ubirsvol, ubiupdatevol, umount, uname, unexpand, uniq, unix2dos, unlink, unxz, unzip, uptime, usleep, uudecode, uuencode, vconfig, volname, watch, watchdog, wc, wget, which, whois, xargs, xz, xzcat, yes, zcat, zcip Full And ROM and OS creators could benefit from including the full build to their packages as it has every single applet an android system might need. > Download < Applets: [, [[, acpid, adjtimex, arp, arping, ash, awk, base64, basename, bash, bbconfig, beep, blkid, blockdev, bootchartd, bunzip2, bzcat, bzip2, cal, cat, catv, chattr, chgrp, chmod, chown, chpst, chroot, chrt, chvt, cksum, clear, cmp, comm, conspy, cp, cpio, crond, crontab, cryptpw, cttyhack, cut, date, dc, dd, deallocvt, depmod, devmem, df, diff, dirname, dmesg, dnsd, dnsdomainname, dos2unix, du, dumpkmap, echo, ed, egrep, env, envdir, envuidgid, expand, expr, fakeidentd, false, fatattr, fbset, fbsplash, fdflush, fdformat, fdisk, fgconsole, fgrep, find, findfs, flash_lock, flash_unlock, flashcp, flock, fold, free, freeramdisk, fsck, fsck.minix, fstrim, fsync, ftpd, ftpget, ftpput, fuser, getopt, grep, groups, gunzip, gzip, halt, hd, head, hexdump, hostname, httpd, hush, hwclock, i2cdetect, i2cdump, i2cget, i2cset, id, ifconfig, ifenslave, ifplugd, inetd, init, inotifyd, insmod, install, ionice, iostat, ip, ipaddr, ipcalc, ipcrm, ipcs, iplink, iproute, iprule, iptunnel, kbd_mode, kill, killall, killall5, less, linuxrc, ln, loadkmap, logger, login, logread, losetup, lpd, lpq, lpr, ls, lsattr, lsmod, lsof, lspci, lsusb, lzcat, lzma, lzop, lzopcat, makedevs, md5sum, mdev, mesg, microcom, mkdir, mkdosfs, mke2fs, mkfifo, mkfs.ext2, mkfs.minix, mkfs.vfat, mknod, mkpasswd, mkswap, mktemp, modinfo, modprobe, more, mount, mountpoint, mpstat, msh, mv, nameif, nanddump, nandwrite, nbd-client, nc, netstat, nice, nmeter, nohup, nslookup, od, openvt, patch, pgrep, pidof, ping, ping6, pipe_progress, pivot_root, pkill, pmap, poweroff, printenv, printf, ps, pscan, pstree, pwd, pwdx, raidautorun, rdate, rdev, readahead, readlink, readprofile, realpath, reboot, renice, reset, resize, rev, rfkill, rm, rmdir, rmmod, route, rpm, rpm2cpio, rtcwake, run-parts, runsv, runsvdir, rx, script, scriptreplay, sed, seq, setconsole, setkeycodes, setlogcons, setserial, setsid, setuidgid, sh, sha1sum, sha256sum, sha3sum, sha512sum, showkey, shuf, slattach, sleep, smemcap, softlimit, sort, split, start-stop-daemon, stat, strings, stty, sulogin, sum, svlogd, swapoff, swapon, switch_root, sync, sysctl, syslogd, tac, tail, tar, taskset, tcpsvd, tee, telnet, test, tftp, tftpd, time, timeout, top, touch, tr, traceroute, traceroute6, true, truncate, tty, ttysize, tune2fs, ubiattach, ubidetach, ubimkvol, ubirmvol, ubirsvol, ubiupdatevol, udhcpc6, udpsvd, uevent, umount, uname, unexpand, uniq, unix2dos, unlink, unlzma, unlzop, unxz, unzip, uptime, users, usleep, uudecode, uuencode, vconfig, vi, vlock, volname, watch, watchdog, wc, wget, which, who, whois, xargs, xz, xzcat, yes, zcat, zcip I can only test the ARM and x86 binary, so remember, I can't be held responsible for any damage that's been done to your device! Seriously talking, the installer can't really break anything, so if you encounter problems or don't like my version of busybox, just install your previous one. :good: If you have an applet you want included or removed, please let me know trough the feature request tab! Thanks to: - The guys working on busybox, they're making excellent work! [ See the full list of busyboxes developers, here ] - Google I need a tester for the x86 and MIPS binaries! If you want to help, PM me! Ask before using my work in yours, so I can link it here! And add proper credits Donations aren't expected, but are appreciated XDA:DevDB Information BonBon's busybox build, Tool/Utility for all devices (see above for details) Contributors _Bon_Bon Source Code: https://github.com/DevBonBon/BonBons-Busybox Version Information Status: Stable Current Stable Version: 1.24.1-BonBon Stable Release Date: 2015-11-25 Created 2015-11-20 Last Updated 2015-12-13
Changelog: 13/12/2015 - Removed applet: Wall, as it soen't work on android - Modified build to fix few bugs on older devices - Modified build to add speed and to reduce size - Modified build to better suit the different busybox builds - Moved back to previous way of removing old busybox symlinks, using find, to more completely delete them Know issues: The installer, when symlinking applets, will always say: symlinked xbin. This is merely a cosmetic bug and will be fixed in the next release Previous versions: Code: [SIZE="3"][B]25/11/2015[/B] - Some minor fixes to installer - Some tweaks to text appearance - Made previous busybox version shown during installation [B]23/11/2015[/B] - Some minor fixes to the installer [B]22/11/2015[/B] - Added full build - Added Minimal build - Removed few applets from modular build as they were obsolete / breaking things - Added few applets and features to modular build [B]20/11/2015[/B] - Initial build[/SIZE]
where or better is there any difference to other one?????
-CALIBAN666- said: where or better is there any difference to other one????? Click to expand... Click to collapse Well, compared to Stericsons busybox, I have few applets removed and others added. There's also some speed and size tweaks in place. But that's not why I made this thread. I'll be posting two more busybox builds: A full one, that has all the applets an android user could ever dream of and a minimalistic build, that only has core applets often needed for scripting. It's ideal for mod makers or other script creators to include the minimalistic build inside their work, for ensured compatibility and speed / size optimizations! And ROM and OS creators could benefit from including the full build to their packages. Also, my builds are more easily accessed. I'll be here, building these version as long as I'll have an android phone. All you'll have to do to influence how and when I build them, is to ask! But none of this is to say that Stericsons busybox is somehow worse than mine. No, it's a great build that has everything you normally need AND he even build a custom installer app for it!
nice,big thanx to you,keep it up.
Nice job @_Bon_Bon. Any chance you could make a full build SELinux enabled? Also I am not sure what's going on with nslookup (it works but reports an error): Code: bash-3.2# nslookup foo.com [B]nslookup: can't resolve '(null)'[/B] Name: foo.com Address 1: 23.21.224.150 ec2-23-21-224-150.compute-1.amazonaws.com Address 2: 23.21.179.138 ec2-23-21-179-138.compute-1.amazonaws.com
Miche1asso said: Nice job @_Bon_Bon. Any chance you could make a full build SELinux enabled? Also I am not sure what's going on with nslookup (it works but reports an error): Code: bash-3.2# nslookup foo.com [B]nslookup: can't resolve '(null)'[/B] Name: foo.com Address 1: 23.21.224.150 ec2-23-21-224-150.compute-1.amazonaws.com Address 2: 23.21.179.138 ec2-23-21-179-138.compute-1.amazonaws.com Click to expand... Click to collapse Thanks I've tried to build with Selinux enabled a few times, but it always fails. And I really can't say what's going on with your nslookup. I'll look into that and Selinux once the next version's out, as it fixes many bugs :good:
_Bon_Bon said: Thanks I've tried to build with Selinux enabled a few times, but it always fails. And I really can't say what's going on with your nslookup. I'll look into that and Selinux once the next version's out, as it fixes many bugs :good: Click to expand... Click to collapse Don't get me wrong, have you tried the instructions from this post: http://forum.xda-developers.com/and...de-busybox-snapshot-building-android-t2857650 ? In that onethe SELinux extension is working. Too bad that the resulting busybox has address translation not working (that's why I checked nslookup on yours). Commands like "ping google.com" return unknown host. Still, for that reason I am using your one now.
Miche1asso said: Don't get me wrong, have you tried the instructions from this post: http://forum.xda-developers.com/and...de-busybox-snapshot-building-android-t2857650 ? In that onethe SELinux extension is working. Too bad that the resulting busybox has address translation not working (that's why I checked nslookup on yours). Commands like "ping google.com" return unknown host. Still, for that reason I am using your one now. Click to expand... Click to collapse I haven't really looked into Selinux at all yet, but I see that I must have few libaries missing. I might include a selinux build in the version already, but if anything, it'll come in the one after that
Downloading...
A new version is currently in testing...
_Bon_Bon said: A new version is currently in testing... Click to expand... Click to collapse Hi please am currently on kushan Rom v9 lite and anytime I update my busy box from v40 to the latest version I get "no kernel support for steaks." Can you please answer on why? @HiSyb
HIS YB said: Hi please am currently on kushan Rom v9 lite and anytime I update my busy box from v40 to the latest version I get "no kernel support for steaks." Can you please answer on why? @HiSyb Click to expand... Click to collapse I don't know the rom, but my guess is that the busybox build you're updating to lacks some binaries that stweaks needs. If you can find out which, you can try and get those applets