Last attempt to fix touch 3 3.1.x (3.1.3 only)

This commit is contained in:
LukeZGD 2024-07-18 13:25:00 +08:00
parent 140371876e
commit a4354f4711

View File

@ -3785,14 +3785,17 @@ ipsw_prepare_multipatch() {
zip -r0 temp.ipsw $ramdisk_name zip -r0 temp.ipsw $ramdisk_name
# 3.2 fs workaround # 3.2 fs workaround
if [[ $device_target_vers == "3.2"* ]]; then if [[ $device_target_vers == "3.2"* || $device_target_vers == "3.1.3" ]]; then
local ipsw_name="iPad1,1_${device_target_vers}_${device_target_build}_FS" local ipsw_name="${device_type}_${device_target_vers}_${device_target_build}_FS"
ipsw_url="https://github.com/LukeZGD/Legacy-iOS-Kit-Keys/releases/download/jailbreak/iPad1.1_${device_target_vers}_${device_target_build}_FS.ipsw" ipsw_url="https://github.com/LukeZGD/Legacy-iOS-Kit-Keys/releases/download/jailbreak/iPad1.1_${device_target_vers}_${device_target_build}_FS.ipsw"
local sha1E="123d8717b1accbf43c03d2fbd6e82aa5ca3533c9" local sha1E="123d8717b1accbf43c03d2fbd6e82aa5ca3533c9"
if [[ $device_target_vers == "3.2.1" ]]; then if [[ $device_target_vers == "3.2.1" ]]; then
sha1E="e1b2652aee400115b0b83c97628f90c3953e7eaf" sha1E="e1b2652aee400115b0b83c97628f90c3953e7eaf"
elif [[ $device_target_vers == "3.2" ]]; then elif [[ $device_target_vers == "3.2" ]]; then
sha1E="5763a6f9d5ead3675535c6f7037192e8611206bc" sha1E="5763a6f9d5ead3675535c6f7037192e8611206bc"
elif [[ $device_target_vers == "3.1.3" ]]; then
ipsw_url="https://github.com/LukeZGD/Legacy-iOS-Kit-Keys/releases/download/jailbreak/iPod3.1_${device_target_vers}_${device_target_build}_FS.ipsw"
sha1E="86944ca72b78057799253a1387de4940145d1797"
fi fi
if [[ ! -s ../$ipsw_name.ipsw ]]; then if [[ ! -s ../$ipsw_name.ipsw ]]; then
log "Downloading FS IPSW..." log "Downloading FS IPSW..."
@ -3803,10 +3806,10 @@ ipsw_prepare_multipatch() {
error "Verifying IPSW failed. The IPSW may be corrupted or incomplete. Please run the script again" \ error "Verifying IPSW failed. The IPSW may be corrupted or incomplete. Please run the script again" \
"* SHA1sum mismatch. Expected $sha1E, got $sha1L" "* SHA1sum mismatch. Expected $sha1E, got $sha1L"
fi fi
mv temp2.ipsw ../iPad1,1_${device_target_vers}_${device_target_build}_FS.ipsw mv temp2.ipsw ../$ipsw_name.ipsw
fi fi
log "Extract RootFS from FS IPSW" log "Extract RootFS from FS IPSW"
unzip -o -j ../iPad1,1_${device_target_vers}_${device_target_build}_FS.ipsw $rootfs_name unzip -o -j ../$ipsw_name.ipsw $rootfs_name
log "Add RootFS to IPSW" log "Add RootFS to IPSW"
zip -r0 temp.ipsw $rootfs_name zip -r0 temp.ipsw $rootfs_name
fi fi
@ -4355,7 +4358,8 @@ restore_idevicerestore() {
ipsw_extract custom ipsw_extract custom
if [[ $1 == "norflash" ]]; then if [[ $1 == "norflash" ]]; then
cp "$shsh_path" shsh/$device_ecid-$device_type-5.1.1.shsh cp "$shsh_path" shsh/$device_ecid-$device_type-5.1.1.shsh
elif [[ $device_type == "iPad"* && $device_pwnrec != 1 && $device_target_vers == "4"* ]]; then elif [[ $device_type == "iPad"* && $device_pwnrec != 1 ]] &&
[[ $device_target_vers == "3"* || $device_target_vers == "4"* ]]; then
if [[ $device_type == "iPad1,1" ]]; then if [[ $device_type == "iPad1,1" ]]; then
patch_ibss patch_ibss
log "Sending iBSS..." log "Sending iBSS..."
@ -5329,7 +5333,7 @@ device_ramdisk() {
"$dir/iBoot32Patcher" iBSS.raw iBSS.patched --rsa -b "-v" "$dir/iBoot32Patcher" iBSS.raw iBSS.patched --rsa -b "-v"
fi fi
"$dir/xpwntool" iBSS.patched iBSS -t iBSS.dec "$dir/xpwntool" iBSS.patched iBSS -t iBSS.dec
if [[ $build_id == "8"* && $device_type != "iPad"* ]]; then if [[ $build_id == "7"* || $build_id == "8"* ]] && [[ $device_type != "iPad"* ]]; then
: :
else else
log "Patch iBEC" log "Patch iBEC"
@ -5363,7 +5367,7 @@ device_ramdisk() {
device_enter_mode kDFU device_enter_mode kDFU
fi fi
if [[ $device_type == "iPad1,1" && $build_id == "8"* ]]; then if [[ $device_type == "iPad1,1" && $build_id != "9"* ]]; then
patch_ibss patch_ibss
log "Sending iBSS..." log "Sending iBSS..."
$irecovery -f pwnediBSS.dfu $irecovery -f pwnediBSS.dfu
@ -5604,10 +5608,9 @@ device_ramdisk_ios3exploit() {
log "fstab" log "fstab"
$scp -P $ssh_port $jelbrek/fstab_new root@127.0.0.1:/mnt1/private/etc/fstab $scp -P $ssh_port $jelbrek/fstab_new root@127.0.0.1:/mnt1/private/etc/fstab
case $device_vers in case $device_vers in
3.1.3 | 3.2* ) read -p "$(input "Do you also want to jailbreak it now? (Y/n) ")" opt;; 3.1.3 | 3.2* ) opt='y';;
* ) opt='n';;
esac esac
if [[ $opt != 'N' && $opt != 'n' ]]; then if [[ $opt == 'y' ]]; then
untether="${device_type}_${device_build}.tar" untether="${device_type}_${device_build}.tar"
log "Sending $untether" log "Sending $untether"
$scp -P $ssh_port $jelbrek/greenpois0n/$untether root@127.0.0.1:/mnt1 $scp -P $ssh_port $jelbrek/greenpois0n/$untether root@127.0.0.1:/mnt1
@ -5617,13 +5620,13 @@ device_ramdisk_ios3exploit() {
$ssh -p $ssh_port root@127.0.0.1 "mount.sh pv" $ssh -p $ssh_port root@127.0.0.1 "mount.sh pv"
device_send_rdtar cydiasubstrate.tar device_send_rdtar cydiasubstrate.tar
device_send_rdtar cydiahttpatch.tar device_send_rdtar cydiahttpatch.tar
if [[ $device_vers == "3.1.3" || $device_vers == "3.2" ]]; then if [[ $device_vers == "3.2" ]]; then
device_send_rdtar freeze.tar data device_send_rdtar freeze.tar data
fi
if [[ $ipsw_openssh == 1 ]]; then if [[ $ipsw_openssh == 1 ]]; then
device_send_rdtar sshdeb.tar device_send_rdtar sshdeb.tar
fi fi
fi fi
fi
} }
device_ramdisk_iosvers() { device_ramdisk_iosvers() {