From 1ba97ebcab881e939ec6985eb9a6c6646fc73714 Mon Sep 17 00:00:00 2001 From: Didgeridoohan Date: Wed, 6 Feb 2019 17:02:18 +0100 Subject: [PATCH] Prints list v43 --- README.md | 22 ++++++++++++++-------- common/prints.sh | 32 ++++++++++++++++++-------------- module.prop | 2 +- 3 files changed, 33 insertions(+), 23 deletions(-) diff --git a/README.md b/README.md index 7b0865f..3720cc2 100644 --- a/README.md +++ b/README.md @@ -100,9 +100,11 @@ When using a Treble GSI ROM with a stock vendor partition, it is possible to use For some devices, if the fingerprint is for an Android build after March 16th 2018, it is necessary to use a security patch date that matches the fingerprint used. For the module provided fingerprints this is done automatically, but if you enter a fingerprint manually you will have to update the security patch date yourself (if they don't already match). Use the [Custom props](https://github.com/Magisk-Modules-Repo/MagiskHide-Props-Config/blob/master/README.md#changeset-custom-prop-values) function of this module to change `ro.build.version.security_patch` to the desired date. ### Can I use any fingerprint? -It's possible to use any fingerprint that's certified for your device. It doesn't have to match, either device or Android version. If you don't use a fingerprint for your device, the device might be percieved as the device that the fingerprint belongs to, in certain situations (Play Store, etc). The Android version doesn't matter much, and if you're using a ROM with an Android version much newer than what is officially available for your device, you are going to have to use an older fingerprint if you want to use the one for your device. But, like already stated, that doesn't really matter. +It's usually possible to use any fingerprint that's certified for your device. It doesn't have to match, either device or Android version. If you don't use a fingerprint for your device, the device might be percieved as the device that the fingerprint belongs to, in certain situations (Play Store, etc). The Android version doesn't matter much, and if you're using a ROM with an Android version much newer than what is officially available for your device, you are going to have to use an older fingerprint if you want to use the one for your device. But, like already stated, that doesn't really matter (most of the time, there might of course be exceptions). ### Finding a certified fingerprint +If you need a certain fingerprint from a device, here are a few tips on how to find it. Also remember that you might need to get the security patch date that corresponds to the fingerprint you find (see [Matching the Android security patch date](https://github.com/Magisk-Modules-Repo/MagiskHidePropsConf#matching-the-android-security-patch-date) above). + #### The getprop method If you don't want to use one of the provided fingerprints, you can get one for your device by running the getprop command below on a stock ROM/firmware/factory image that fully passes SafetyNet. ``` @@ -122,7 +124,7 @@ You can find the file to download in your device's forum on XDA Developers (eith Once you have the file downloaded, there are several different ways that the fingerprint can be found. In all cases you'll have to access the file somehow, and in most cases it's just a matter of unpackaging it. After that it depends on how the package is constructed. - Sometimes there'll be a build.prop file directly in the zip/package. You'll likely find the fingerprint in there. -- For some devices you'll have to unpackage the system.img to get to the build.prop or default.prop file, where you'll find the info you want. On Windows, you can use something like [this tool](https://forum.xda-developers.com/showpost.php?p=57742855&postcount=42). You'll also find more info in the [main thread for that post](https://forum.xda-developers.com/android/software-hacking/how-to-conver-lollipop-dat-files-to-t2978952). +- For some devices you'll have to unpack the system.img to get to the build.prop or default.prop file, where you'll find the info you want.This can sometimes be done with a simple archive app/program, but sometimes more advanced utilities are needed. On Windows, you can use something like [this tool](https://forum.xda-developers.com/showpost.php?p=57742855&postcount=42). You'll also find more info in the [main thread for that post](https://forum.xda-developers.com/android/software-hacking/how-to-conver-lollipop-dat-files-to-t2978952). - Other times you'll find the fingerprint in META-INF\com\google\android\updater-script. Look for "Target:" and you'll likely find the fingerprint there. - Etc... Experiment, the fingerprint will be in there somewhere. @@ -169,7 +171,7 @@ Just run the `props` command and the list will be updated automatically. Use the If you already have a device fingerprint set by the module, and it has been updated in the current fingerprints list, it will be automatically updated when the prints list gets an update. Just reboot to apply. This function can be turned of in the script settings (see ["Prop script settings"](https://github.com/Magisk-Modules-Repo/MagiskHide-Props-Config#prop-script-settings) below) -**_Current fingerprints list version - v42_** +**_Current fingerprints list version - v43_** ## Please add support for device X @@ -566,7 +568,7 @@ Releases from v2.4.1 are compatible with Magisk v17+. ## Current fingerprints list -### List v42 +### List v43 - Asus Zenfone 2 Laser (6.0.1) - Asus Zenfone 4 Max (7.1.1) - Asus ZenPad S 8.0 (6.0.1) @@ -580,7 +582,7 @@ Releases from v2.4.1 are compatible with Magisk v17+. - Google Nexus 7 2012 LTE (5.1.1) - Google Nexus 7 2013 WiFi (6.0.1) - Google Nexus 7 2013 LTE (6.0.1) -- Google Nexus 9 WiFi () +- Google Nexus 9 WiFi (7.1.1) - Google Nexus 9 LTE (7.1.1) - Google Nexus 10 (5.1.1) - Google Pixel (9) @@ -597,15 +599,18 @@ Releases from v2.4.1 are compatible with Magisk v17+. - Huawei Honor 9 (8.0.0) - Huawei Mate 10 (8.0.0) - Huawei Mate 10 Pro (8.0.0) +- Huawei Mate 20 Pro (9) - Huawei P8 Lite (8.0.0) - Huawei P9 (7.0) - Huawei P9 Lite (7.0) - Huawei P9 Plus (7.0) +- Huawei P20 (9) - Huawei P20 Pro (8.1.0) - LeEco Le Pro3 (6.0.1) - LG G2 BS980 (5.0.2) - LG G4 H812 (6.0) - LG G5 H850 (8.0.0) +- LG G6 H870 (7.0) - LG V30 H930 (8.0.0) - Motorola Moto C Plus (7.0) - Motorola Moto E4 (7.1.1) @@ -628,18 +633,19 @@ Releases from v2.4.1 are compatible with Magisk v17+. - OnePlus 3 (8.0.0) - OnePlus 3T (8.0.0) - OnePlus 5 (8.1.0) -- OnePlus 5T (8.1.0) +- OnePlus 5T (9) - OnePlus 6 (9) - OnePlus 6T (9) - Razer Phone (8.1.0) - Razer Phone 2 (8.1.0) +- Samsung Galaxy A5 2015 (6.0.1) - Samsung Galaxy A5 2017 (8.0.0) - Samsung Galaxy A8 Plus (7.1.1) - Samsung Galaxy Grand Prime (5.0.2) - Samsung Galaxy J2 (5.1.1) - Samsung Galaxy J3 (5.1.1) - Samsung Galaxy J5 2015 (6.0.1) -- Samsung Galaxy J5 (7.1.1) +- Samsung Galaxy J5 2016 (7.1.1) - Samsung Galaxy J5 Prime (7.0) - Samsung Galaxy J7 2017 (8.1.0) - Samsung Galaxy J7 Prime (6.0.1) @@ -695,7 +701,7 @@ Releases from v2.4.1 are compatible with Magisk v17+. - Xiaomi Mi 5S Plus (7.0) - Xiaomi Mi 6 (8.0.0) - Xiaomi Mi 8 (9) -- Xiaomi Mi A1 (8.0.0) +- Xiaomi Mi A1 (9) - Xiaomi Mi A2 (9) - Xiaomi Mi A2 Lite (9) - Xiaomi Mi Max 2 (7.1.1) diff --git a/common/prints.sh b/common/prints.sh index 9b5a27b..070a846 100644 --- a/common/prints.sh +++ b/common/prints.sh @@ -4,7 +4,7 @@ # Copyright (c) 2018-2019 Didgeridoohan @ XDA Developers # Licence: MIT -PRINTSV=42 +PRINTSV=43 PRINTSTRANSF=260 # Certified fingerprints @@ -12,7 +12,7 @@ PRINTSLIST=" Asus Zenfone 2 Laser (6.0.1)=asus/WW_Z00L/ASUS_Z00L_63:6.0.1/MMB29P/WW_user_21.40.1220.2196_20180308:user/release-keys Asus Zenfone 4 Max (7.1.1)=asus/WW_Phone/ASUS_X00HD_4:7.1.1/NMF26F/14.2016.1801.372-20180119:user/release-keys Asus ZenPad S 8.0 (6.0.1)=asus/WW_P01M/P01M_3:6.0.1/MMB29P/WW_P01M-V5.6.0-20170608:user/release-keys -Essential PH-1 (9)=essential/mata/mata:9/PPR1.181005.116/430:user/release-keys__2019-01-05 +Essential PH-1 (9)=essential/mata/mata:9/PQ1A.190105.014/451:user/release-keys__2019-02-05 Google Nexus 4 (5.1.1)=google/occam/mako:5.1.1/LMY48T/2237560:user/release-keys Google Nexus 5 (6.0.1)=google/hammerhead/hammerhead:6.0.1/M4B30Z/3437181:user/release-keys Google Nexus 5X (8.1.0)=google/bullhead/bullhead:8.1.0/OPM7.181205.001/5080180:user/release-keys__2018-12-05 @@ -25,13 +25,13 @@ Google Nexus 7 2013 LTE (6.0.1)=google/razorg/deb:6.0.1/MOB30X/3036618:user/rele Google Nexus 9 WiFi (7.1.1)=google/volantis/flounder:7.1.1/N9F27M/4333998:user/release-keys Google Nexus 9 LTE (7.1.1)=google/volantisg/flounder_lte:7.1.1/N4F27P/4333386:user/release-keys Google Nexus 10 (5.1.1)=google/mantaray/manta:5.1.1/LMY49J/2640980:user/release-keys -Google Pixel (9)=google/sailfish/sailfish:9/PQ1A.190105.004/5148680:user/release-keys__2019-01-05 -Google Pixel XL (9)=google/marlin/marlin:9/PQ1A.190105.004/5148680:user/release-keys__2019-01-05 -Google Pixel 2 (9)=google/walleye/walleye:9/PQ1A.190105.004/5148680:user/release-keys__2019-01-05 -Google Pixel 2 XL (9)=google/taimen/taimen:9/PQ1A.190105.004/5148680:user/release-keys__2019-01-05 -Google Pixel 3 (9)=google/blueline/blueline:9/PQ1A.190105.004/5148680:user/release-keys__2019-01-05 -Google Pixel 3 XL (9)=google/crosshatch/crosshatch:9/PQ1A.190105.004/5148680:user/release-keys__2019-01-05 -Google Pixel C (8.1.0)=google/ryu/dragon:8.1.0/OPM8.190105.002/5148684:user/release-keys__2019-01-05 +Google Pixel (9)=google/sailfish/sailfish:9/PQ2A.190205.003/5180536:user/release-keys__2019-02-05 +Google Pixel XL (9)=google/marlin/marlin:9/PQ2A.190205.003/5180536:user/release-keys__2019-02-05 +Google Pixel 2 (9)=google/walleye/walleye:9/PQ2A.190205.002/5164942:user/release-keys__2019-02-05 +Google Pixel 2 XL (9)=google/taimen/taimen:9/PQ2A.190205.002/5164942:user/release-keys__2019-02-05 +Google Pixel 3 (9)=google/blueline/blueline:9/PQ2A.190205.001/5163636:user/release-keys__2019-02-05 +Google Pixel 3 XL (9)=google/crosshatch/crosshatch:9/PQ2A.190205.001/5163636:user/release-keys__2019-02-05 +Google Pixel C (8.1.0)=google/ryu/dragon:8.1.0/OPM8.190205.001/5175807:user/release-keys__2019-02-05 HTC 10 (6.0.1)=htc/HTCOneM10vzw/htc_pmewl:6.0.1/MMB29M/774095.8:user/release-keys HTC U11 (8.0.0)=htc/ocndtwl_01405/htc_ocndtwl:8.0.0/OPR6.170623.013/1017190.2:user/release-keys HTC U12 Plus (8.0.0)=htc/imeuhl_00617/htc_imeuhl:8.0.0/OPR1.170623.032/1041457.3:user/release-keys__2018-06-01 @@ -39,15 +39,18 @@ Huawei Honor 6X (8.0.0)=HONOR/BLN-AL10/HWBLN-H:8.0.0/HONORBLN-AL10/528(C00):user Huawei Honor 9 (8.0.0)=HONOR/STF-L09/HWSTF:8.0.0/HUAWEISTF-L09/364(C432):user/release-keys Huawei Mate 10 (8.0.0)=HUAWEI/ALP-L29/HWALP:8.0.0/HUAWEIALP-L29S/143(C636):user/release-keys__2018-10-01 Huawei Mate 10 Pro (8.0.0)=HUAWEI/BLA-L29/HWBLA:8.0.0/HUAWEIBLA-L29S/137(C432):user/release-keys +Huawei Mate 20 Pro (9)=HUAWEI/LYA-L29/HWLYA:9/HUAWEILYA-L29/183AUSC636R1:user/release-keys Huawei P8 Lite (8.0.0)=HUAWEI/PRA-LX1/HWPRA-H:8.0.0/HUAWEIPRA-LX1/399(C432):user/release-keys__2019-01-01 Huawei P9 (7.0)=HUAWEI/EVA-L09/HWEVA:7.0/HUAWEIEVA-L09/C432B502:user/release-keys Huawei P9 Lite (7.0)=HUAWEI/VNS-L31/HWVNS-H:7.0/HUAWEIVNS-L31/C432B414:user/release-keys__2018-06-01 Huawei P9 Plus (7.0)=HUAWEI/VIE-L09/HWVIE:7.0/HUAWEIVIE-L09/C432B387:user/release-keys__2018-07-01 +Huawei P20 (9)=HUAWEI/EML-L29/HWEML:9/HUAWEIEML-L29/160C432R1:user/release-keys__2018-11-01 Huawei P20 Pro (8.1.0)=HUAWEI/CLT-L29/HWCLT:8.1.0/HUAWEICLT-L29/128(C432):user/release-keys LeEco Le Pro3 (6.0.1)=LeEco/ZL1_NA/le_zl1:6.0.1/WEXNAOP5802101261S/letv01261206:user/release-keys LG G2 BS980 (5.0.2)=lge/g2_vzw/g2:5.0.2/LRX22G/15046001715f9:user/release-keys LG G4 H812 (6.0)=lge/p1_rgs_ca/p1:6.0/MRA58K/1601215569825:user/release-keys LG G5 H850 (8.0.0)=lge/h1_global_com/h1:8.0.0/OPR1.170623.032/182532053d3a3:user/release-keys__2018-09-01 +LG G6 H870 (7.0)=lge/lucye_global_com/lucye:7.0/NRD90U/171732341982c:user/release-keys LG V30 H930 (8.0.0)=lge/joan_global_com/joan:8.0.0/OPR1.170623.026/181381736b4e9:user/release-keys__2018-11-05 Motorola Moto C Plus (7.0)=motorola/panell_21_d/panell_d:7.0/NRD90M.03.040/040:user/release-keys Motorola Moto E4 (7.1.1)=motorola/sperry_sprint/sperry:7.1.1/NCQ26.69-64/68:user/release-keys @@ -70,11 +73,12 @@ OnePlus X (6.0.1)=OnePlus/OnePlus/OnePlus:6.0.1/MMB29M/10281213:user/release-key OnePlus 3 (8.0.0)=OnePlus/OnePlus3/OnePlus3:8.0.0/OPR1.170623.032/1809142047:user/release-keys__2018-09-01 OnePlus 3T (8.0.0)=OnePlus/OnePlus3/OnePlus3T:8.0.0/OPR1.170623.032/1812060016:user/release-keys__2018-11-01 OnePlus 5 (8.1.0)=OnePlus/OnePlus5/OnePlus5:8.1.0/OPM1.171019.011/1809241512:user/release-keys__2018-09-01 -OnePlus 5T (9)=OnePlus/OnePlus5T/OnePlus5T:9/PKQ1.180716.001/1812290005:user/release-keys__2018-12-01 +OnePlus 5T (9)=OnePlus/OnePlus5T/OnePlus5T:9/PKQ1.180716.001/1901182129:user/release-keys__2018-12-01 OnePlus 6 (9)=OnePlus/OnePlus6/OnePlus6:9/PKQ1.180716.001/1809150000:user/release-keys__2018-09-05 OnePlus 6T (9)=OnePlus/OnePlus6T/OnePlus6T:9/PKQ1.180716.001/1811170214:user/release-keys__2018-11-01 Razer Phone (8.1.0)=razer/cheryl/cheryl:8.1.0/OPM1.171019.011-RZR-180803/6033:user/release-keys__2018-07-05 Razer Phone 2 (8.1.0)=razer/cheryl2/aura:8.1.0/O-MR2-RC009-RZR-181124/2009:user/release-keys__2018-10-05 +Samsung Galaxy A5 2015 (6.0.1)=samsung/a5ultexx/a5ulte:6.0.1/MMB29M/A500FUXXU1CPH3:user/release-keys Samsung Galaxy A5 2017 (8.0.0)=samsung/a5y17ltexx/a5y17lte:8.0.0/R16NW/A520FXXU4CRE8:user/release-keys__2018-05-01 Samsung Galaxy A8 Plus (7.1.1)=samsung/jackpot2ltexx/jackpot2lte:7.1.1/NMF26X/A730FXXU2ARD1:user/release-keys Samsung Galaxy Grand Prime (5.0.2)=samsung/fortuna3gdtvvj/fortuna3gdtv:5.0.2/LRX22G/G530BTVJU1BPH4:user/release-keys @@ -137,15 +141,15 @@ Xiaomi Mi 5S (7.0)=Xiaomi/capricorn/capricorn:7.0/NRD90M/V9.5.4.0.NAGMIFD:user/r Xiaomi Mi 5S Plus (7.0)=Xiaomi/natrium/natrium:7.0/NRD90M/V9.6.2.0.NBGMIFD:user/release-keys Xiaomi Mi 6 (8.0.0)=Xiaomi/sagit/sagit:8.0.0/OPR1.170623.027/V9.2.3.0.OCAMIEK:user/release-keys Xiaomi Mi 8 (9)=Xiaomi/dipper/dipper:9/PKQ1.180729.001/V10.1.2.0.PEAMIFI:user/release-keys__2018-11-01 -Xiaomi Mi A1 (8.0.0)=xiaomi/tissot/tissot_sprout:8.0.0/OPR1.170623.026/V.9.5.10.0.ODHMIFA:user/release-keys -Xiaomi Mi A2 (9)=xiaomi/jasmine/jasmine_sprout:9/PKQ1.180904.001/V10.0.2.0.PDIMIFJ:user/release-keys__2018-12-05 +Xiaomi Mi A1 (9)=xiaomi/tissot/tissot_sprout:9/PKQ1.180917.001/V10.0.4.0.PDHMIXM:user/release-keys_2019-01-05 +Xiaomi Mi A2 (9)=xiaomi/jasmine/jasmine_sprout:9/PKQ1.180904.001/V10.0.3.0.PDIMIXM:user/release-keys__2019-01-05 Xiaomi Mi A2 Lite (9)=xiaomi/daisy/daisy_sprout:9/PKQ1.180917.001/V10.0.1.0.PDLMIFJ:user/release-keys__2018-11-05 Xiaomi Mi Max 2 (7.1.1)=Xiaomi/oxygen/oxygen:7.1.1/NMF26F/V9.5.4.0.NDDMIFA:user/release-keys Xiaomi Mi Mix 2 (8.0.0)=Xiaomi/chiron/chiron:8.0.0/OPR1.170623.027/V9.6.1.0.ODEMIFD:user/release-keys -Xiaomi Mi Mix 2S (9)=Xiaomi/polaris/polaris:9/PKQ1.180729.001/V10.0.9.0.PDGMIFH:user/release-keys__2018-11-01 +Xiaomi Mi Mix 2S (9)=Xiaomi/polaris/polaris:9/PKQ1.180729.001/V10.2.1.0.PDGMIXM:user/release-keys__2018-11-01 Xiaomi Mi Note 2 (8.0.0)=Xiaomi/scorpio/scorpio:8.0.0/OPR1.170623.032/V9.6.1.0.OADCNFD:user/release-keys Xiaomi Mi Pad 4 (8.1.0)=ro.build.fingerprint=Xiaomi/clover/clover:8.1.0/OPM1.171019.019/V10.1.1.0.ODJCNFI:user/release-keys__2018-10-01 -Xiaomi Pocophone F1 (9)=Xiaomi/beryllium/beryllium:9/PKQ1.180729.001/V10.1.3.0.PEJMIFI:user/release-keys__2018-11-01 +Xiaomi Pocophone F1 (9)=Xiaomi/beryllium/beryllium:9/PKQ1.180729.001/V10.2.2.0.PEJMIXM:user/release-keys__2018-12-01 Xiaomi Redmi 3/3 Pro (5.1.1)=Xiaomi/ido/ido:5.1.1/LMY47V/V9.6.2.0.LAIMIFD:user/release-keys Xiaomi Redmi 3S/X Prime (6.0.1)=Xiaomi/land/land:6.0.1/MMB29M/V9.5.1.0.MALMIFA:user/release-keys Xiaomi Redmi 4 Prime (6.0.1)=Xiaomi/markw/markw:6.0.1/MMB29M/V9.5.3.0.MBEMIFA:user/release-keys diff --git a/module.prop b/module.prop index e2a85ad..9a86f8a 100644 --- a/module.prop +++ b/module.prop @@ -1,6 +1,6 @@ id=MagiskHidePropsConf name=MagiskHide Props Config -version=v3.0.2-v42 +version=v3.0.2-v43 versionCode=39 author=Didgeridoohan description=Change your device's fingerprint, to pass SafetyNet's CTS Profile check. Edit prop files for better root hiding. Set/reset prop values set by MagiskHide. Change any prop values easily, and set your own custom props.