-
Notifications
You must be signed in to change notification settings - Fork 10
EXTENDROM_SIGNATURE_SPOOFING
steadfasterX edited this page Jul 23, 2023
·
7 revisions
| State | Branch | Supported Android version(s) | Tested on | Description |
|---|---|---|---|---|
BETA |
sp5 |
A13 |
A13 |
see here |
In theory this can all be backported to any other version as well - likely A10 support will come soon.
| flag | values | meaning | where to configure |
|---|---|---|---|
| EXTENDROM_SIGNATURE_SPOOFING | unset or true
|
must be true to activate patching your sources to add signature spoofing support |
vendorsetup.sh |
| EXTENDROM_SIGSPOOF_RESET | unset, true or false
|
extendrom will by default do a hard reset of each path it will patch. You can prevent this when setting this to false but patching might fail then |
vendorsetup.sh |
| EXTENDROM_SIGSPOOF_FORCE_PDIR | unset or a <patch-path>
|
extendrom will detect your TARGET_PRODUCT (i.e. usually what you specify when doing a breakfast or lunch command) and the android version you build for. Depending on that the patch path will be auto detected (e.g. building a LineageOS 20 (based) ROM results in vendor/extendrom.../lineage/A13 or axp/A13 etc) |
vendorsetup.sh |
TBD
-
EXTENDROM_SIGNATURE_SPOOFING = true-> add signature spoofing support
-
EXTENDROM_SIGSPOOF_RESET->git reset --hardany path extendrom will patch before -
EXTENDROM_SIGSPOOF_FORCE_PDIR-> directory for patches which overwrites any auto detected ones
Examples:
export EXTENDROM_SIGSPOOF_RESET=falseexport EXTENDROM_SIGSPOOF_FORCE_PDIR=vendor/extendrom/config/sigspoof/axp/A13