资源简介
VMware黑苹果破解补丁,用于安装黑苹果!
代码片段和文件信息
“““
The MIT License (MIT)
Copyright (c) 2014-2015 Dave Parsons
Permission is hereby granted free of charge to any person obtaining a copy
of this software and associated documentation files (the ‘Software‘) to deal
in the Software without restriction including without limitation the rights
to use copy modify merge publish distribute sublicense and/or sell
copies of the Software and to permit persons to whom the Software is
furnished to do so subject to the following conditions:
The above copyright notice and this permission notice shall be included in
all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED ‘AS IS‘ WITHOUT WARRANTY OF ANY KIND EXPRESS OR
IMPLIED INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM DAMAGES OR OTHER
LIABILITY WHETHER IN AN ACTION OF CONTRACT TORT OR OTHERWISE ARISING FROM
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
THE SOFTWARE.
vSMC Header Structure
Offset Length struct Type Description
----------------------------------------
0x00/00 0x08/08 Q ptr Offset to key table
0x08/08 0x04/4 I int Number of private keys
0x0C/12 0x04/4 I int Number of public keys
vSMC Key Data Structure
Offset Length struct Type Description
----------------------------------------
0x00/00 0x04/04 4s int Key name (byte reversed e.g. #KEY is YEK#)
0x04/04 0x01/01 B byte Length of returned data
0x05/05 0x04/04 4s int Data type (byte reversed e.g. ui32 is 23iu)
0x09/09 0x01/01 B byte Flag R/W
0x0A/10 0x06/06 6x byte Padding
0x10/16 0x08/08 Q ptr Internal VMware routine
0x18/24 0x30/48 48B byte Data
“““
import struct
import sys
if sys.version_info < (2 7):
sys.stderr.write(‘You need Python 2.7 or later\n‘)
sys.exit(1)
def bytetohex(bytestr):
return ‘‘.join([‘%02X ‘ % ord(x) for x in bytestr]).strip()
def printkey(i smc_key smc_data):
print str(i+1).zfill(3) \
+ ‘ ‘ + smc_key[0][::-1] \
+ ‘ ‘ + str(smc_key[1]).zfill(2) \
+ ‘ ‘ + smc_key[2][::-1].replace(‘\x00‘ ‘ ‘) \
+ ‘ ‘ + ‘{0:#0{1}x}‘.format(smc_key[3] 4) \
+ ‘ ‘ + hex(smc_key[4]) \
+ ‘ ‘ + bytetohex(smc_data)
def dumpkeys(f key):
# Setup struct pack string
key_pack = ‘=4sB4sB6xQ‘
# Do Until OSK1 read
i = 0
while True:
# Read key into struct str and data byte str
offset = key + (i * 72)
f.seek(offset)
smc_key = struct.unpack(key_pack f.read(24))
smc_data = f.read(smc_key[1])
# Dump entry
printkey(i smc_key smc_data)
# Exit when OSK1 has been read
if smc_key[0] == ‘1KSO‘:
break
else:
i += 1
def dumpsmc(name):
with open(name ‘r
属性 大小 日期 时间 名称
----------- --------- ---------- ----- ----
目录 0 2015-06-19 13:38 unlocker206\
文件 3546411 2015-06-16 10:41 unlocker206\dumpsmc.exe
文件 5432 2015-06-19 13:18 unlocker206\dumpsmc.py
文件 478 2015-06-19 13:18 unlocker206\esxi-install.sh
文件 333 2015-06-19 13:18 unlocker206\esxi-uninstall.sh
目录 0 2015-06-19 13:38 unlocker206\firmware\
文件 2097152 2015-01-31 14:30 unlocker206\firmware\efi32-srvr.rom
文件 2097152 2015-01-31 14:30 unlocker206\firmware\efi64-srvr.rom
文件 734 2015-06-19 13:18 unlocker206\lnx-install.sh
文件 691 2015-06-19 13:18 unlocker206\lnx-uninstall.sh
文件 1111 2015-06-19 13:18 unlocker206\local-template.sh
文件 789 2015-06-19 13:18 unlocker206\osx-install.sh
文件 751 2015-06-19 13:18 unlocker206\osx-uninstall.sh
文件 6206 2015-06-19 13:25 unlocker206\readme.txt
目录 0 2015-06-19 13:38 unlocker206\tools\
文件 3057664 2015-05-31 04:19 unlocker206\tools\darwin.iso
文件 256 2015-05-31 04:19 unlocker206\tools\darwin.iso.sig
文件 3548686 2015-06-16 10:41 unlocker206\unlocker.exe
文件 13448 2015-06-19 13:20 unlocker206\unlocker.py
文件 1365 2015-06-15 10:37 unlocker206\win-install.cmd
文件 1280 2015-06-15 10:37 unlocker206\win-uninstall.cmd
- 上一篇:超高频射频识别_RFID_阅读器的设计与实现
- 下一篇:CMMI项目管理全套资料
评论
共有 条评论