Guest glossywhite Posted April 6, 2013 Report Share Posted April 6, 2013 Hi all. I just downloaded these: http://www.mediafire.com/?67cezkql2z4j4jc and installed the "1 mfld-pos-installer-v1.5-a.exe" in a virtual machine, and when you look in the installation folder, there are two certificates: "cdc.cer" and "adb.cer" and a few tools. Does anyone know: 1/ What these two certificates are? 2/ What the tools are, and how they are used? When I double-click the *.cer (certificate) files - NOT installing them, up pops something about keys etc, and seems to show HEX values. I know virtually nothing about cryptography etc, but would someone else download these and have a play **DISCONNECT** your OSD **FIRST*** :P and tell me what's going on? Are these proprietary tools, and are those two certificates the ones that are needed to sign our OWN ROMS? Very lost, but kinda, sorta know what this all is, as I was once an iOS dev, and I had to sign apps :) Thanks - laymans terms if you please :D Link to comment Share on other sites More sharing options...
Guest shootomanUK Posted April 6, 2013 Report Share Posted April 6, 2013 if i remember also there was a way to get into MEDFIELD mode on the osd running gingerbread, maybe the tool was to be used in that mode ? Link to comment Share on other sites More sharing options...
Guest Ribs85 Posted April 11, 2013 Report Share Posted April 11, 2013 Are these proprietary tools, and are those two certificates the ones that are needed to sign our OWN ROMS? These are probably public certificates. We'll need the private ones to sign firmware and fool the OSD into running custom roms. These work in a "private/public" pair combination. The signer has the private key, and the receiver the public key to check the signer's private key is legitimate. This is how secure websites load on the Internet; You have the public keys in your browser to check authenticity, and the CA (Certificate Authority) has the private keys to sign certificates with, which are sent to your browser by the website. I'll be honest, the math they use utterly baffles me, but it's damned impressive. And no, you can't derive the private keys from the public keys :) Link to comment Share on other sites More sharing options...
Recommended Posts
Please sign in to comment
You will be able to leave a comment after signing in
Sign In Now