Skip to content

EXTENDROM_SIGNATURE_SPOOFING

steadfasterX edited this page Jul 23, 2023 · 7 revisions

EXTENDROM_SIGNATURE_SPOOFING

State

State Branch Supported Android version(s) Tested on Description
BETA sp5 A13 A13 see here

In theory this can all be backported to any other version as well - likely A10 support will come soon.

Flags

flag values meaning where to configure
EXTENDROM_SIGNATURE_SPOOFING unset or true must be true to activate patching your sources to add signature spoofing support vendorsetup.sh
EXTENDROM_SIGSPOOF_RESET unset, true or false extendrom will by default do a hard reset of each path it will patch. You can prevent this when setting this to false but patching might fail then vendorsetup.sh
EXTENDROM_SIGSPOOF_FORCE_PDIR unset or a <patch-path> extendrom will detect your TARGET_PRODUCT (i.e. usually what you specify when doing a breakfast or lunch command) and the android version you build for. Depending on that the patch path will be auto detected (e.g. building a LineageOS 20 (based) ROM results in vendor/extendrom.../lineage/A13 or axp/A13 etc) vendorsetup.sh

Technical background (how does it work)

TBD

Required flags (device/<vendor>/<model>/vendorsetup.sh)

  • EXTENDROM_SIGNATURE_SPOOFING = true -> add signature spoofing support

Optional flags (device/<vendor>/<model>/vendorsetup.sh)

  • EXTENDROM_SIGSPOOF_RESET -> git reset --hard any path extendrom will patch before
  • EXTENDROM_SIGSPOOF_FORCE_PDIR -> directory for patches which overwrites any auto detected ones

Examples:

  • export EXTENDROM_SIGSPOOF_RESET=false
  • export EXTENDROM_SIGSPOOF_FORCE_PDIR=vendor/extendrom/config/sigspoof/axp/A13
Clone this wiki locally