逆向mtklog


00005379    13.55434608    [6124] --sub_10127740 out--    
00005380    13.55440235    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_ImageInfo_Check(): Enter ...    
00005381    13.55445004    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_ImageInfo_Check(): Enter ... (FlashToolLib/source/security/src/secure_da_cmd.cpp:750)    
00005382    13.55452538    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_ImageInfo_Check(): V3 format    
00005383    13.55457306    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_ImageInfo_Check(): V3 format (FlashToolLib/source/security/src/secure_da_cmd.cpp:776)    
00005384    13.55464935    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_ImageInfo_Check(): 0. Send DA_SECURE_USB_IMG_INFO_CHECK_CMD (0xb9).     
00005385    13.55469894    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_ImageInfo_Check(): 0. Send DA_SECURE_USB_IMG_INFO_CHECK_CMD (0xb9).  (FlashToolLib/source/security/src/secure_da_cmd.cpp:803)    
00005386    13.55488110    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_ImageInfo_Check(): Wait for ACK.    
00005387    13.55493069    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_ImageInfo_Check(): Wait for ACK. (FlashToolLib/source/security/src/secure_da_cmd.cpp:812)    
00005388    13.55691910    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_ImageInfo_Check(): 1. Send Image Name          (EBR2)    
00005389    13.55698395    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_ImageInfo_Check(): 1. Send Image Name          (EBR2) (FlashToolLib/source/security/src/secure_da_cmd.cpp:863)    
00005390    13.56296635    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_ImageInfo_Check(): 2. Send Image Type          (0x1)    
00005391    13.56309032    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_ImageInfo_Check(): 2. Send Image Type          (0x1) (FlashToolLib/source/security/src/secure_da_cmd.cpp:896)    
00005392    13.56492615    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_ImageInfo_Check(): 3. Send Image Header Length (0x40)    
00005393    13.56504345    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_ImageInfo_Check(): 3. Send Image Header Length (0x40) (FlashToolLib/source/security/src/secure_da_cmd.cpp:914)    
00005394    13.64041805    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_ImageInfo_Check(): 4. Send Image Offset(0x0000000004160000)    
00005395    13.64047050    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_ImageInfo_Check(): 4. Send Image Offset(0x0000000004160000) (FlashToolLib/source/security/src/secure_da_cmd.cpp:942)    
00005396    13.64134121    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_ImageInfo_Check(): 5. Send Image hash and Signature    
00005397    13.64138985    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_ImageInfo_Check(): 5. Send Image hash and Signature (FlashToolLib/source/security/src/secure_da_cmd.cpp:954)    
00005398    13.95333958    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_ImageInfo_Check(): 6. Send extension header (TT)    
00005399    13.96265984    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_ImageInfo_Check(): 6. Send extension header (TT) (FlashToolLib/source/security/src/secure_da_cmd.cpp:989)    
00005400    14.03170776    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_ImageInfo_Check(): 7. Get Image Info Verification Result    
00005401    14.03178501    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_ImageInfo_Check(): 7. Get Image Info Verification Result (FlashToolLib/source/security/src/secure_da_cmd.cpp:1048)    
00005402    14.03417206    [6124] _vsnprintf ----------------------------------------------------------------- (FlashToolLib/source/security/src/secure_da_cmd.cpp:1062)    
00005403    14.03429508    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_ImageInfo_Check(): IMAGE INFO VERIFY PASS    
00005404    14.03435898    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_ImageInfo_Check(): IMAGE INFO VERIFY PASS (FlashToolLib/source/security/src/secure_da_cmd.cpp:1063)    
00005405    14.03444672    [6124] _vsnprintf ----------------------------------------------------------------- (FlashToolLib/source/security/src/secure_da_cmd.cpp:1064)    
00005406    14.03454208    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_Main(): Yield CPU for context switch    
00005407    14.03460598    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_Main(): Yield CPU for context switch (FlashToolLib/source/security/src/secure_da_cmd.cpp:682)    
00005408    14.03508472    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_Main(): ===============================================    
00005409    14.03516388    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_Main(): =============================================== (FlashToolLib/source/security/src/secure_da_cmd.cpp:620)    
00005410    14.03528404    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_Main(): VERIFY "ANDROID" ...    
00005411    14.03535748    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_Main(): VERIFY "ANDROID" ... (FlashToolLib/source/security/src/secure_da_cmd.cpp:621)    
00005412    14.03547287    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_Main(): ===============================================    
00005413    14.03553867    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_Main(): =============================================== (FlashToolLib/source/security/src/secure_da_cmd.cpp:622)    
00005414    14.03572845    [6124] _vsnprintf SECURE_DA_Cmd::CMD_Secure_CheckBypass(): image name = ANDROID    
00005415    14.03579140    [6124] _vsnprintf SECURE_DA_Cmd::CMD_Secure_CheckBypass(): image name = ANDROID (FlashToolLib/source/security/src/secure_da_cmd.cpp:117)    
00005416    14.05181408    [6124] _vsnprintf SECURE_DA_Cmd::CMD_Secure_CheckBypass(): [SEC_MARK]: image offset = 0x82e0000    
00005417    14.05186749    [6124] _vsnprintf SECURE_DA_Cmd::CMD_Secure_CheckBypass(): [SEC_MARK]: image offset = 0x82e0000 (FlashToolLib/source/security/src/secure_da_cmd.cpp:129)    
00005418    14.05282593    [6124] _vsnprintf SECURE_DA_Cmd::CMD_Secure_CheckBypass(): [SEC_MARK]: image length = 0x37a04257    
00005419    14.05288029    [6124] _vsnprintf SECURE_DA_Cmd::CMD_Secure_CheckBypass(): [SEC_MARK]: image length = 0x37a04257 (FlashToolLib/source/security/src/secure_da_cmd.cpp:138)    
00005420    14.05378819    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_Authenticate_Image(): Enter ...    
00005421    14.05383396    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_Authenticate_Image(): Enter ... (FlashToolLib/source/security/src/secure_da_cmd.cpp:2129)    
00005422    14.05391788    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_Authenticate_Image(): Reload binary header    
00005423    14.05397415    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_Authenticate_Image(): Reload binary header (FlashToolLib/source/security/src/secure_da_cmd.cpp:2154)    
00005424    14.05414772    [6124] _vsnprintf IO_FILE::IO_FILE(): fopen("F:\android\packet\maigoo1\K3_644_AT_HT_H04-3_MG_V1003_21032016_sign\system.img", "rb"): OK!, m_fp(0x61A42E58). (FlashToolLib/source/common/generic/src/virtual_io.?<    
00005425    14.05422878    [6124] _vsnprintf IO_FILE::IsEnd(): m_ReadMode: 1    
00005426    14.05426788    [6124] _vsnprintf IO_FILE::IsEnd(): m_ReadMode: 1 (FlashToolLib/source/common/generic/src/virtual_io.cpp:255)    
00005427    14.05433464    [6124] _vsnprintf IO_FILE::IsEnd(): feof(m_fp): 0    
00005428    14.05437469    [6124] _vsnprintf IO_FILE::IsEnd(): feof(m_fp): 0 (FlashToolLib/source/common/generic/src/virtual_io.cpp:256)    
00005429    14.05444050    [6124] _vsnprintf IO_FILE::IsEnd(): Telli64(m_fp): 0    
00005430    14.05448151    [6124] _vsnprintf IO_FILE::IsEnd(): Telli64(m_fp): 0 (FlashToolLib/source/common/generic/src/virtual_io.cpp:257)    
00005431    14.05454731    [6124] _vsnprintf IO_FILE::IsEnd(): (u64)Telli64(m_fp): 0    
00005432    14.05459309    [6124] _vsnprintf IO_FILE::IsEnd(): (u64)Telli64(m_fp): 0 (FlashToolLib/source/common/generic/src/virtual_io.cpp:258)    
00005433    14.05466175    [6124] _vsnprintf IO_FILE::IsEnd(): m_filelength: 933249624    
00005434    14.05470085    [6124] _vsnprintf IO_FILE::IsEnd(): m_filelength: 933249624 (FlashToolLib/source/common/generic/src/virtual_io.cpp:259)    
00005435    14.05480766    [6124] _vsnprintf IO_FILE::~IO_FILE(): fclose(m_fp(0x61A42E58)): OK! (FlashToolLib/source/common/generic/src/virtual_io.cpp:112)    
00005436    14.05486012    [6124] F:\android\packet\maigoo1\K3_644_AT_HT_H04-3_MG_V1003_21032016_sign\system.img    
00005437    14.05489540    [6124] readhead offsetlow=0(0x0) readlength=64    
00005438    14.05492783    [6124] ======Daddr=0x921f2dc Dlen=16=======    
00005439    14.05496216    [6124] [0]=0x46424642    
00005440    14.05500984    [6124] [1]=0x1    
00005441    14.05505085    [6124] [2]=0x36    
00005442    14.05508423    [6124] [3]=0x1000000    
00005443    14.05511665    [6124] [4]=0x74737973    
00005444    14.05514812    [6124] [5]=0x6d65    
00005445    14.05518055    [6124] [6]=0x0    
00005446    14.05521202    [6124] [7]=0x0    
00005447    14.05524349    [6124] [8]=0x0    
00005448    14.05527592    [6124] [9]=0x0    
00005449    14.05530739    [6124] [10]=0x0    
00005450    14.05534649    [6124] [11]=0x0    
00005451    14.05537987    [6124] [12]=0x352867c4    
00005452    14.05541039    [6124] [13]=0x0    
00005453    14.05544186    [6124] [14]=0x0    
00005454    14.05547333    [6124] [15]=0x0    
00005455    14.05550385    [6124] ====================================    
00005456    14.05555820    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_Authenticate_Image(): Reload binary header (by pass FB header)    
00005457    14.05561447    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_Authenticate_Image(): Reload binary header (by pass FB header) (FlashToolLib/source/security/src/secure_da_cmd.cpp:2163)    
00005458    14.05574226    [6124] _vsnprintf IO_FILE::IO_FILE(): fopen("F:\android\packet\maigoo1\K3_644_AT_HT_H04-3_MG_V1003_21032016_sign\system.img", "rb"): OK!, m_fp(0x61A42E58). (FlashToolLib/source/common/generic/src/virtual_io.?<    
00005459    14.05582428    [6124] _vsnprintf IO_FILE::IsEnd(): m_ReadMode: 1    
00005460    14.05586433    [6124] _vsnprintf IO_FILE::IsEnd(): m_ReadMode: 1 (FlashToolLib/source/common/generic/src/virtual_io.cpp:255)    
00005461    14.05592918    [6124] _vsnprintf IO_FILE::IsEnd(): feof(m_fp): 0    
00005462    14.05599880    [6124] _vsnprintf IO_FILE::IsEnd(): feof(m_fp): 0 (FlashToolLib/source/common/generic/src/virtual_io.cpp:256)    
00005463    14.05608749    [6124] _vsnprintf IO_FILE::IsEnd(): Telli64(m_fp): 16384    
00005464    14.05614948    [6124] _vsnprintf IO_FILE::IsEnd(): Telli64(m_fp): 16384 (FlashToolLib/source/common/generic/src/virtual_io.cpp:257)    
00005465    14.05622196    [6124] _vsnprintf IO_FILE::IsEnd(): (u64)Telli64(m_fp): 16384    
00005466    14.05626106    [6124] _vsnprintf IO_FILE::IsEnd(): (u64)Telli64(m_fp): 16384 (FlashToolLib/source/common/generic/src/virtual_io.cpp:258)    
00005467    14.05632877    [6124] _vsnprintf IO_FILE::IsEnd(): m_filelength: 933249624    
00005468    14.05637646    [6124] _vsnprintf IO_FILE::IsEnd(): m_filelength: 933249624 (FlashToolLib/source/common/generic/src/virtual_io.cpp:259)    
00005469    14.05647469    [6124] _vsnprintf IO_FILE::~IO_FILE(): fclose(m_fp(0x61A42E58)): OK! (FlashToolLib/source/common/generic/src/virtual_io.cpp:112)    
00005470    14.05652523    [6124] F:\android\packet\maigoo1\K3_644_AT_HT_H04-3_MG_V1003_21032016_sign\system.img    
00005471    14.05656052    [6124] readhead offsetlow=16384(0x4000) readlength=64    
00005472    14.05659103    [6124] ======Daddr=0x921f2dc Dlen=16=======    
00005473    14.05662441    [6124] [0]=0x53535353    
00005474    14.05665493    [6124] [1]=0x484e5558    
00005475    14.05668640    [6124] [2]=0x30325f55    
00005476    14.05671787    [6124] [3]=0x3231    
00005477    14.05675888    [6124] [4]=0x23232323    
00005478    14.05679035    [6124] [5]=0x23232323    
00005479    14.05682278    [6124] [6]=0x2064000a    
00005480    14.05685425    [6124] [7]=0x30207361    
00005481    14.05688667    [6124] [8]=0x6874202c    
00005482    14.05691814    [6124] [9]=0x1    
00005483    14.05694962    [6124] [10]=0x37a00000    
00005484    14.05699062    [6124] [11]=0x40    
00005485    14.05702972    [6124] [12]=0x7a797a79    
00005486    14.05706882    [6124] [13]=0x7a797a79    
00005487    14.05710220    [6124] [14]=0x35286804    
00005488    14.05713272    [6124] [15]=0x94    
00005489    14.05716419    [6124] ====================================    
00005490    14.05721569    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_Authenticate_Image(): V3 format    
00005491    14.05725670    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_Authenticate_Image(): V3 format (FlashToolLib/source/security/src/secure_da_cmd.cpp:2275)    
00005492    14.05730534    [6124] --sub_10127740 in----------------------------------------------------------------------------------------------    
00005493    14.05733871    [6124] [1085].1=0x0    
00005494    14.05737114    [6124] [1016].4=0x0    
00005495    14.05741405    [6124] [97].1=0x1    
00005496    14.05744648    [6124] [1060].4=0x0    
00005497    14.05747795    [6124] [1056].4=0x37a04258    
00005498    14.05751133    [6124] [1420].4=0x0    
00005499    14.05754185    [6124] [1424].4=0x0    
00005500    14.05757523    [6124] [72].4=0x3fce4257    
00005501    14.05760574    [6124] [76].4=0x0    
00005502    14.05763721    [6124] [1428].1=0x0    
00005503    14.05767059    [6124] [1068].4=0x0    
00005504    14.05770969    [6124] [1072].4=0x18f660    
00005505    14.05775928    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_Authenticate_v3(): Enter ...    
00005506    14.05780029    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_Authenticate_v3(): Enter ... (FlashToolLib/source/security/src/secure_da_cmd.cpp:1459)    
00005507    14.05792332    [6124] _vsnprintf IO_FILE::IO_FILE(): fopen("F:\android\packet\maigoo1\K3_644_AT_HT_H04-3_MG_V1003_21032016_sign\system.img", "rb"): OK!, m_fp(0x61A42E58). (FlashToolLib/source/common/generic/src/virtual_io.?<    
00005508    14.05800819    [6124] _vsnprintf IO_FILE::IsEnd(): m_ReadMode: 1    
00005509    14.05804825    [6124] _vsnprintf IO_FILE::IsEnd(): m_ReadMode: 1 (FlashToolLib/source/common/generic/src/virtual_io.cpp:255)    
00005510    14.05811691    [6124] _vsnprintf IO_FILE::IsEnd(): feof(m_fp): 0    
00005511    14.05815601    [6124] _vsnprintf IO_FILE::IsEnd(): feof(m_fp): 0 (FlashToolLib/source/common/generic/src/virtual_io.cpp:256)    
00005512    14.05821991    [6124] _vsnprintf IO_FILE::IsEnd(): Telli64(m_fp): 0    
00005513    14.05826759    [6124] _vsnprintf IO_FILE::IsEnd(): Telli64(m_fp): 0 (FlashToolLib/source/common/generic/src/virtual_io.cpp:257)    
00005514    14.05833340    [6124] _vsnprintf IO_FILE::IsEnd(): (u64)Telli64(m_fp): 0    
00005515    14.05837250    [6124] _vsnprintf IO_FILE::IsEnd(): (u64)Telli64(m_fp): 0 (FlashToolLib/source/common/generic/src/virtual_io.cpp:258)    
00005516    14.05843830    [6124] _vsnprintf IO_FILE::IsEnd(): m_filelength: 933249624    
00005517    14.05847836    [6124] _vsnprintf IO_FILE::IsEnd(): m_filelength: 933249624 (FlashToolLib/source/common/generic/src/virtual_io.cpp:259)    
00005518    14.05856705    [6124] _vsnprintf IO_FILE::~IO_FILE(): fclose(m_fp(0x61A42E58)): OK! (FlashToolLib/source/common/generic/src/virtual_io.cpp:112)    
00005519    14.05861950    [6124] F:\android\packet\maigoo1\K3_644_AT_HT_H04-3_MG_V1003_21032016_sign\system.img    
00005520    14.05865192    [6124] readhead offsetlow=0(0x0) readlength=64    
00005521    14.05868530    [6124] ======Daddr=0x921f244 Dlen=16=======    
00005522    14.05872440    [6124] [0]=0x46424642    
00005523    14.05875683    [6124] [1]=0x1    
00005524    14.05879021    [6124] [2]=0x36    
00005525    14.05882263    [6124] [3]=0x1000000    
00005526    14.05885410    [6124] [4]=0x74737973    
00005527    14.05888557    [6124] [5]=0x6d65    
00005528    14.05891609    [6124] [6]=0x0    
00005529    14.05894756    [6124] [7]=0x0    
00005530    14.05899525    [6124] [8]=0x0    
00005531    14.05904961    [6124] [9]=0x0    
00005532    14.05909920    [6124] [10]=0x0    
00005533    14.05914116    [6124] [11]=0x0    
00005534    14.05917549    [6124] [12]=0x352867c4    
00005535    14.05920696    [6124] [13]=0x0    
00005536    14.05923843    [6124] [14]=0x0    
00005537    14.05926991    [6124] [15]=0x0    
00005538    14.05929947    [6124] ====================================    
00005539    14.05935192    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_Authenticate_v3(): By pass FB header    
00005540    14.05941105    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_Authenticate_v3(): By pass FB header (FlashToolLib/source/security/src/secure_da_cmd.cpp:1487)    
00005541    14.05957127    [6124] _vsnprintf IO_FILE::IO_FILE(): fopen("F:\android\packet\maigoo1\K3_644_AT_HT_H04-3_MG_V1003_21032016_sign\system.img", "rb"): OK!, m_fp(0x61A42E58). (FlashToolLib/source/common/generic/src/virtual_io.?<    
00005542    14.05967140    [6124] _vsnprintf IO_FILE::IsEnd(): m_ReadMode: 1    
00005543    14.05972958    [6124] _vsnprintf IO_FILE::IsEnd(): m_ReadMode: 1 (FlashToolLib/source/common/generic/src/virtual_io.cpp:255)    
00005544    14.05981636    [6124] _vsnprintf IO_FILE::IsEnd(): feof(m_fp): 0    
00005545    14.05987358    [6124] _vsnprintf IO_FILE::IsEnd(): feof(m_fp): 0 (FlashToolLib/source/common/generic/src/virtual_io.cpp:256)    
00005546    14.05996609    [6124] _vsnprintf IO_FILE::IsEnd(): Telli64(m_fp): 16384    
00005547    14.06002331    [6124] _vsnprintf IO_FILE::IsEnd(): Telli64(m_fp): 16384 (FlashToolLib/source/common/generic/src/virtual_io.cpp:257)    
00005548    14.06011677    [6124] _vsnprintf IO_FILE::IsEnd(): (u64)Telli64(m_fp): 16384    
00005549    14.06017590    [6124] _vsnprintf IO_FILE::IsEnd(): (u64)Telli64(m_fp): 16384 (FlashToolLib/source/common/generic/src/virtual_io.cpp:258)    
00005550    14.06026649    [6124] _vsnprintf IO_FILE::IsEnd(): m_filelength: 933249624    
00005551    14.06032372    [6124] _vsnprintf IO_FILE::IsEnd(): m_filelength: 933249624 (FlashToolLib/source/common/generic/src/virtual_io.cpp:259)    
00005552    14.06045341    [6124] _vsnprintf IO_FILE::~IO_FILE(): fclose(m_fp(0x61A42E58)): OK! (FlashToolLib/source/common/generic/src/virtual_io.cpp:112)    
00005553    14.06052589    [6124] F:\android\packet\maigoo1\K3_644_AT_HT_H04-3_MG_V1003_21032016_sign\system.img    
00005554    14.06057453    [6124] readhead offsetlow=16384(0x4000) readlength=64    
00005555    14.06062222    [6124] ======Daddr=0x921f244 Dlen=16=======    
00005556    14.06067181    [6124] [0]=0x53535353    
00005557    14.06071758    [6124] [1]=0x484e5558    
00005558    14.06076336    [6124] [2]=0x30325f55    
00005559    14.06081104    [6124] [3]=0x3231    
00005560    14.06085873    [6124] [4]=0x23232323    
00005561    14.06090355    [6124] [5]=0x23232323    
00005562    14.06095219    [6124] [6]=0x2064000a    
00005563    14.06099701    [6124] [7]=0x30207361    
00005564    14.06104469    [6124] [8]=0x6874202c    
00005565    14.06109238    [6124] [9]=0x1    
00005566    14.06114006    [6124] [10]=0x37a00000    
00005567    14.06118584    [6124] [11]=0x40    
00005568    14.06123543    [6124] [12]=0x7a797a79    
00005569    14.06128311    [6124] [13]=0x7a797a79    
00005570    14.06132889    [6124] [14]=0x35286804    
00005571    14.06137657    [6124] [15]=0x94    
00005572    14.06142235    [6124] ====================================    
00005573    14.06150436    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_Authenticate_v3(): sign_header.magic        (0x53535353)    
00005574    14.06156349    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_Authenticate_v3(): sign_header.magic        (0x53535353) (FlashToolLib/source/security/src/secure_da_cmd.cpp:1503)    
00005575    14.06166363    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_Authenticate_v3(): sign_header.cust_name        (XUNHU_2012)    
00005576    14.06172466    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_Authenticate_v3(): sign_header.cust_name        (XUNHU_2012) (FlashToolLib/source/security/src/secure_da_cmd.cpp:1504)    
00005577    14.06181812    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_Authenticate_v3(): sign_header.image_version    (0x1)    
00005578    14.06187725    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_Authenticate_v3(): sign_header.image_version    (0x1) (FlashToolLib/source/security/src/secure_da_cmd.cpp:1505)    
00005579    14.06199551    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_Authenticate_v3(): sign_header.image_length     (0x37a00000)    
00005580    14.06203175    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_Authenticate_v3(): sign_header.image_length     (0x37a00000) (FlashToolLib/source/security/src/secure_da_cmd.cpp:1506)    
00005581    14.06212521    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_Authenticate_v3(): image len is 933232640 (0x37a00000)    
00005582    14.06218624    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_Authenticate_v3(): image len is 933232640 (0x37a00000) (FlashToolLib/source/security/src/secure_da_cmd.cpp:1523)    
00005583    14.06227779    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_Authenticate_v3(): total file len is 933249624 (0x37a04258)    
00005584    14.06233883    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_Authenticate_v3(): total file len is 933249624 (0x37a04258) (FlashToolLib/source/security/src/secure_da_cmd.cpp:1524)    
00005585    14.06243229    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_Authenticate_v3(): offset is 933249236 (0x37a040d4)    
00005586    14.06256199    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_Authenticate_v3(): offset is 933249236 (0x37a040d4) (FlashToolLib/source/security/src/secure_da_cmd.cpp:1531)    
00005587    14.06274700    [6124] _vsnprintf IO_FILE::IO_FILE(): fopen("F:\android\packet\maigoo1\K3_644_AT_HT_H04-3_MG_V1003_21032016_sign\system.img", "rb"): OK!, m_fp(0x61A42E58). (FlashToolLib/source/common/generic/src/virtual_io.?<    
00005588    14.06285954    [6124] _vsnprintf IO_FILE::IsEnd(): m_ReadMode: 1    
00005589    14.06291866    [6124] _vsnprintf IO_FILE::IsEnd(): m_ReadMode: 1 (FlashToolLib/source/common/generic/src/virtual_io.cpp:255)    
00005590    14.06301212    [6124] _vsnprintf IO_FILE::IsEnd(): feof(m_fp): 0    
00005591    14.06307220    [6124] _vsnprintf IO_FILE::IsEnd(): feof(m_fp): 0 (FlashToolLib/source/common/generic/src/virtual_io.cpp:256)    
00005592    14.06322002    [6124] _vsnprintf IO_FILE::IsEnd(): Telli64(m_fp): 933249236    
00005593    14.06328773    [6124] _vsnprintf IO_FILE::IsEnd(): Telli64(m_fp): 933249236 (FlashToolLib/source/common/generic/src/virtual_io.cpp:257)    
00005594    14.06338787    [6124] _vsnprintf IO_FILE::IsEnd(): (u64)Telli64(m_fp): 933249236    
00005595    14.06344700    [6124] _vsnprintf IO_FILE::IsEnd(): (u64)Telli64(m_fp): 933249236 (FlashToolLib/source/common/generic/src/virtual_io.cpp:258)    
00005596    14.06353855    [6124] _vsnprintf IO_FILE::IsEnd(): m_filelength: 933249624    
00005597    14.06359673    [6124] _vsnprintf IO_FILE::IsEnd(): m_filelength: 933249624 (FlashToolLib/source/common/generic/src/virtual_io.cpp:259)    
00005598    14.06374931    [6124] _vsnprintf IO_FILE::~IO_FILE(): fclose(m_fp(0x61A42E58)): OK! (FlashToolLib/source/common/generic/src/virtual_io.cpp:112)    
00005599    14.06382179    [6124] F:\android\packet\maigoo1\K3_644_AT_HT_H04-3_MG_V1003_21032016_sign\system.img    
00005600    14.06387234    [6124] readhead offsetlow=933249236(0x37a040d4) readlength=12    
00005601    14.06394482    [6124] ======Daddr=0x921f20c Dlen=3=======    
00005602    14.06396866    [6124] [0]=0x45454545    
00005603    14.06403351    [6124] [1]=0x1    
00005604    14.06405640    [6124] [2]=0x202    
00005605    14.06408691    [6124] ====================================    
00005606    14.06421661    [6124] _vsnprintf IO_FILE::IO_FILE(): fopen("F:\android\packet\maigoo1\K3_644_AT_HT_H04-3_MG_V1003_21032016_sign\system.img", "rb"): OK!, m_fp(0x61A42E58). (FlashToolLib/source/common/generic/src/virtual_io.?<    
00005607    14.06430912    [6124] _vsnprintf IO_FILE::IsEnd(): m_ReadMode: 1    
00005608    14.06437492    [6124] _vsnprintf IO_FILE::IsEnd(): m_ReadMode: 1 (FlashToolLib/source/common/generic/src/virtual_io.cpp:255)    
00005609    14.06446457    [6124] _vsnprintf IO_FILE::IsEnd(): feof(m_fp): 0    
00005610    14.06448936    [6124] _vsnprintf IO_FILE::IsEnd(): feof(m_fp): 0 (FlashToolLib/source/common/generic/src/virtual_io.cpp:256)    
00005611    14.06455898    [6124] _vsnprintf IO_FILE::IsEnd(): Telli64(m_fp): 933249248    
00005612    14.06460667    [6124] _vsnprintf IO_FILE::IsEnd(): Telli64(m_fp): 933249248 (FlashToolLib/source/common/generic/src/virtual_io.cpp:257)    
00005613    14.06468201    [6124] _vsnprintf IO_FILE::IsEnd(): (u64)Telli64(m_fp): 933249248    
00005614    14.06475258    [6124] _vsnprintf IO_FILE::IsEnd(): (u64)Telli64(m_fp): 933249248 (FlashToolLib/source/common/generic/src/virtual_io.cpp:258)    
00005615    14.06483650    [6124] _vsnprintf IO_FILE::IsEnd(): m_filelength: 933249624    
00005616    14.06489182    [6124] _vsnprintf IO_FILE::IsEnd(): m_filelength: 933249624 (FlashToolLib/source/common/generic/src/virtual_io.cpp:259)    
00005617    14.06499004    [6124] _vsnprintf IO_FILE::~IO_FILE(): fclose(m_fp(0x61A42E58)): OK! (FlashToolLib/source/common/generic/src/virtual_io.cpp:112)    
00005618    14.06508446    [6124] F:\android\packet\maigoo1\K3_644_AT_HT_H04-3_MG_V1003_21032016_sign\system.img    
00005619    14.06514168    [6124] readhead offsetlow=933249248(0x37a040e0) readlength=16    
00005620    14.06517124    [6124] ======Daddr=0x921f218 Dlen=4=======    
00005621    14.06522083    [6124] [0]=0x45454545    
00005622    14.06526756    [6124] [1]=0x2    
00005623    14.06532383    [6124] [2]=0x100000    
00005624    14.06537437    [6124] [3]=0x1    
00005625    14.06541538    [6124] ====================================    
00005626    14.06546974    [6124] REG esp=921f158 eax=5712201 ebx=0 ecx=2 edx=14 esi=37a040e0 edi=0 ebp=57428d8    
00005627    14.06561089    [6124] _vsnprintf IO_FILE::IO_FILE(): fopen("F:\android\packet\maigoo1\K3_644_AT_HT_H04-3_MG_V1003_21032016_sign\system.img", "rb"): OK!, m_fp(0x61A42E58). (FlashToolLib/source/common/generic/src/virtual_io.?<    
00005628    14.06572437    [6124] _vsnprintf IO_FILE::IsEnd(): m_ReadMode: 1    
00005629    14.06576252    [6124] _vsnprintf IO_FILE::IsEnd(): m_ReadMode: 1 (FlashToolLib/source/common/generic/src/virtual_io.cpp:255)    
00005630    14.06583118    [6124] _vsnprintf IO_FILE::IsEnd(): feof(m_fp): 0    
00005631    14.06589031    [6124] _vsnprintf IO_FILE::IsEnd(): feof(m_fp): 0 (FlashToolLib/source/common/generic/src/virtual_io.cpp:256)    
00005632    14.06598186    [6124] _vsnprintf IO_FILE::IsEnd(): Telli64(m_fp): 933249264    
00005633    14.06604290    [6124] _vsnprintf IO_FILE::IsEnd(): Telli64(m_fp): 933249264 (FlashToolLib/source/common/generic/src/virtual_io.cpp:257)    
00005634    14.06612968    [6124] _vsnprintf IO_FILE::IsEnd(): (u64)Telli64(m_fp): 933249264    
00005635    14.06618786    [6124] _vsnprintf IO_FILE::IsEnd(): (u64)Telli64(m_fp): 933249264 (FlashToolLib/source/common/generic/src/virtual_io.cpp:258)    
00005636    14.06627655    [6124] _vsnprintf IO_FILE::IsEnd(): m_filelength: 933249624    
00005637    14.06633568    [6124] _vsnprintf IO_FILE::IsEnd(): m_filelength: 933249624 (FlashToolLib/source/common/generic/src/virtual_io.cpp:259)    
00005638    14.06646156    [6124] _vsnprintf IO_FILE::~IO_FILE(): fclose(m_fp(0x61A42E58)): OK! (FlashToolLib/source/common/generic/src/virtual_io.cpp:112)    
00005639    14.06653690    [6124] F:\android\packet\maigoo1\K3_644_AT_HT_H04-3_MG_V1003_21032016_sign\system.img    
00005640    14.06658173    [6124] readhead offsetlow=933249264(0x37a040f0) readlength=40    
00005641    14.06661606    [6124] ======Daddr=0x5727800 Dlen=10=======    
00005642    14.06666183    [6124] [0]=0x45454545    
00005643    14.06670475    [6124] [1]=0x3    
00005644    14.06673717    [6124] [2]=0x2    
00005645    14.06676674    [6124] [3]=0x0    
00005646    14.06680012    [6124] [4]=0x19000    
00005647    14.06684399    [6124] [5]=0xee2c7cca    
00005648    14.06689072    [6124] [6]=0x7c18d35b    
00005649    14.06693268    [6124] [7]=0x1c59a3da    
00005650    14.06700706    [6124] [8]=0x3c9dfb2c    
00005651    14.06705475    [6124] [9]=0xfeaefe73    
00005652    14.06710052    [6124] ====================================    
00005653    14.06723499    [6124] _vsnprintf IO_FILE::IO_FILE(): fopen("F:\android\packet\maigoo1\K3_644_AT_HT_H04-3_MG_V1003_21032016_sign\system.img", "rb"): OK!, m_fp(0x61A42E58). (FlashToolLib/source/common/generic/src/virtual_io.?<    
00005654    14.06733990    [6124] _vsnprintf IO_FILE::IsEnd(): m_ReadMode: 1    
00005655    14.06740093    [6124] _vsnprintf IO_FILE::IsEnd(): m_ReadMode: 1 (FlashToolLib/source/common/generic/src/virtual_io.cpp:255)    
00005656    14.06749344    [6124] _vsnprintf IO_FILE::IsEnd(): feof(m_fp): 0    
00005657    14.06755352    [6124] _vsnprintf IO_FILE::IsEnd(): feof(m_fp): 0 (FlashToolLib/source/common/generic/src/virtual_io.cpp:256)    
00005658    14.06764603    [6124] _vsnprintf IO_FILE::IsEnd(): Telli64(m_fp): 933249304    
00005659    14.06770325    [6124] _vsnprintf IO_FILE::IsEnd(): Telli64(m_fp): 933249304 (FlashToolLib/source/common/generic/src/virtual_io.cpp:257)    
00005660    14.06779861    [6124] _vsnprintf IO_FILE::IsEnd(): (u64)Telli64(m_fp): 933249304    
00005661    14.06786060    [6124] _vsnprintf IO_FILE::IsEnd(): (u64)Telli64(m_fp): 933249304 (FlashToolLib/source/common/generic/src/virtual_io.cpp:258)    
00005662    14.06795788    [6124] _vsnprintf IO_FILE::IsEnd(): m_filelength: 933249624    
00005663    14.06801224    [6124] _vsnprintf IO_FILE::IsEnd(): m_filelength: 933249624 (FlashToolLib/source/common/generic/src/virtual_io.cpp:259)    
00005664    14.06811714    [6124] _vsnprintf IO_FILE::~IO_FILE(): fclose(m_fp(0x61A42E58)): OK! (FlashToolLib/source/common/generic/src/virtual_io.cpp:112)    
00005665    14.06817913    [6124] F:\android\packet\maigoo1\K3_644_AT_HT_H04-3_MG_V1003_21032016_sign\system.img    
00005666    14.06821251    [6124] readhead offsetlow=933249304(0x37a04118) readlength=8    
00005667    14.06826115    [6124] ======Daddr=0x921f1e8 Dlen=2=======    
00005668    14.06830788    [6124] [0]=0x45454545    
00005669    14.06834888    [6124] [1]=0x5    
00005670    14.06839085    [6124] ====================================    
00005671    14.06853199    [6124] _vsnprintf IO_FILE::IO_FILE(): fopen("F:\android\packet\maigoo1\K3_644_AT_HT_H04-3_MG_V1003_21032016_sign\system.img", "rb"): OK!, m_fp(0x61A42E58). (FlashToolLib/source/common/generic/src/virtual_io.?<    
00005672    14.06863117    [6124] _vsnprintf IO_FILE::IsEnd(): m_ReadMode: 1    
00005673    14.06869125    [6124] _vsnprintf IO_FILE::IsEnd(): m_ReadMode: 1 (FlashToolLib/source/common/generic/src/virtual_io.cpp:255)    
00005674    14.06878376    [6124] _vsnprintf IO_FILE::IsEnd(): feof(m_fp): 0    
00005675    14.06884480    [6124] _vsnprintf IO_FILE::IsEnd(): feof(m_fp): 0 (FlashToolLib/source/common/generic/src/virtual_io.cpp:256)    
00005676    14.06891823    [6124] _vsnprintf IO_FILE::IsEnd(): Telli64(m_fp): 933249304    
00005677    14.06899357    [6124] _vsnprintf IO_FILE::IsEnd(): Telli64(m_fp): 933249304 (FlashToolLib/source/common/generic/src/virtual_io.cpp:257)    
00005678    14.06909084    [6124] _vsnprintf IO_FILE::IsEnd(): (u64)Telli64(m_fp): 933249304    
00005679    14.06915283    [6124] _vsnprintf IO_FILE::IsEnd(): (u64)Telli64(m_fp): 933249304 (FlashToolLib/source/common/generic/src/virtual_io.cpp:258)    
00005680    14.06923008    [6124] _vsnprintf IO_FILE::IsEnd(): m_filelength: 933249624    
00005681    14.06927109    [6124] _vsnprintf IO_FILE::IsEnd(): m_filelength: 933249624 (FlashToolLib/source/common/generic/src/virtual_io.cpp:259)    
00005682    14.06936169    [6124] _vsnprintf IO_FILE::~IO_FILE(): fclose(m_fp(0x61A42E58)): OK! (FlashToolLib/source/common/generic/src/virtual_io.cpp:112)    
00005683    14.06941223    [6124] F:\android\packet\maigoo1\K3_644_AT_HT_H04-3_MG_V1003_21032016_sign\system.img    
00005684    14.06946468    [6124] readhead offsetlow=933249304(0x37a04118) readlength=24    
00005685    14.06951237    [6124] ======Daddr=0x921f22c Dlen=6=======    
00005686    14.06955910    [6124] [0]=0x45454545    
00005687    14.06960773    [6124] [1]=0x5    
00005688    14.06965733    [6124] [2]=0x40    
00005689    14.06969833    [6124] [3]=0x80    
00005690    14.06973076    [6124] [4]=0x14    
00005691    14.06977749    [6124] [5]=0x4c    
00005692    14.06982327    [6124] ====================================    
00005693    14.06989670    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_Authenticate_v3(): sparse data length is 288, sparse header size is 24    
00005694    14.06995296    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_Authenticate_v3(): sparse data length is 288, sparse header size is 24 (FlashToolLib/source/security/src/secure_da_cmd.cpp:1678)    
00005695    14.07009697    [6124] _vsnprintf IO_FILE::IO_FILE(): fopen("F:\android\packet\maigoo1\K3_644_AT_HT_H04-3_MG_V1003_21032016_sign\system.img", "rb"): OK!, m_fp(0x61A42E58). (FlashToolLib/source/common/generic/src/virtual_io.?<    
00005696    14.07018089    [6124] _vsnprintf IO_FILE::IsEnd(): m_ReadMode: 1    
00005697    14.07023716    [6124] _vsnprintf IO_FILE::IsEnd(): m_ReadMode: 1 (FlashToolLib/source/common/generic/src/virtual_io.cpp:255)    
00005698    14.07031727    [6124] _vsnprintf IO_FILE::IsEnd(): feof(m_fp): 0    
00005699    14.07037640    [6124] _vsnprintf IO_FILE::IsEnd(): feof(m_fp): 0 (FlashToolLib/source/common/generic/src/virtual_io.cpp:256)    
00005700    14.07045174    [6124] _vsnprintf IO_FILE::IsEnd(): Telli64(m_fp): 933249328    
00005701    14.07049179    [6124] _vsnprintf IO_FILE::IsEnd(): Telli64(m_fp): 933249328 (FlashToolLib/source/common/generic/src/virtual_io.cpp:257)    
00005702    14.07055664    [6124] _vsnprintf IO_FILE::IsEnd(): (u64)Telli64(m_fp): 933249328    
00005703    14.07059956    [6124] _vsnprintf IO_FILE::IsEnd(): (u64)Telli64(m_fp): 933249328 (FlashToolLib/source/common/generic/src/virtual_io.cpp:258)    
00005704    14.07067394    [6124] _vsnprintf IO_FILE::IsEnd(): m_filelength: 933249624    
00005705    14.07071304    [6124] _vsnprintf IO_FILE::IsEnd(): m_filelength: 933249624 (FlashToolLib/source/common/generic/src/virtual_io.cpp:259)    
00005706    14.07083607    [6124] _vsnprintf IO_FILE::~IO_FILE(): fclose(m_fp(0x61A42E58)): OK! (FlashToolLib/source/common/generic/src/virtual_io.cpp:112)    
00005707    14.07090473    [6124] F:\android\packet\maigoo1\K3_644_AT_HT_H04-3_MG_V1003_21032016_sign\system.img    
00005708    14.07095432    [6124] readhead offsetlow=933249328(0x37a04130) readlength=288    
00005709    14.07100582    [6124] ======Daddr=0x5715658 Dlen=72=======    
00005710    14.07104969    [6124] [0]=0x53535353    
00005711    14.07109356    [6124] [1]=0x484e5558    
00005712    14.07114029    [6124] [2]=0x30325f55    
00005713    14.07118416    [6124] [3]=0x3231    
00005714    14.07122993    [6124] [4]=0x23232323    
00005715    14.07127666    [6124] [5]=0x23232323    
00005716    14.07132053    [6124] [6]=0x2064000a    
00005717    14.07136631    [6124] [7]=0x30207361    
00005718    14.07141304    [6124] [8]=0x6874202c    
00005719    14.07145691    [6124] [9]=0x1    
00005720    14.07150269    [6124] [10]=0x44c00000    
00005721    14.07154751    [6124] [11]=0x40    
00005722    14.07159328    [6124] [12]=0x7a797a79    
00005723    14.07163906    [6124] [13]=0x7a797a79    
00005724    14.07168484    [6124] [14]=0x44c00040    
00005725    14.07172966    [6124] [15]=0x94    
00005726    14.07177544    [6124] [16]=0x7255bd27    
00005727    14.07182121    [6124] [17]=0xf1530ac3    
00005728    14.07186604    [6124] [18]=0xb740364a    
00005729    14.07191181    [6124] [19]=0x673f97a4    
00005730    14.07195759    [6124] [20]=0xedca3afd    
00005731    14.07200336    [6124] [21]=0x3a26b0bf    
00005732    14.07205009    [6124] [22]=0xdf1f4472    
00005733    14.07209587    [6124] [23]=0x780ad764    
00005734    14.07214165    [6124] [24]=0x54fc9d60    
00005735    14.07218647    [6124] [25]=0xf0ebcdd3    
00005736    14.07223225    [6124] [26]=0x66b8f1a8    
00005737    14.07227802    [6124] [27]=0xa86b1758    
00005738    14.07232380    [6124] [28]=0xe3680f72    
00005739    14.07236862    [6124] [29]=0x2962ef84    
00005740    14.07241440    [6124] [30]=0x4ad77316    
00005741    14.07245827    [6124] [31]=0xc0e25993    
00005742    14.07250595    [6124] [32]=0x549e0b7c    
00005743    14.07255077    [6124] [33]=0x588d78fd    
00005744    14.07259464    [6124] [34]=0x44a8310c    
00005745    14.07264042    [6124] [35]=0x57a1c485    
00005746    14.07268715    [6124] [36]=0xdab324cc    
00005747    14.07273293    [6124] [37]=0x73b2d3d8    
00005748    14.07277679    [6124] [38]=0xb31e3290    
00005749    14.07282352    [6124] [39]=0xd4ff66ef    
00005750    14.07286930    [6124] [40]=0xf6603a48    
00005751    14.07291508    [6124] [41]=0xe50b213c    
00005752    14.07296467    [6124] [42]=0xa79bc7f8    
00005753    14.07300663    [6124] [43]=0x4d259f6c    
00005754    14.07304955    [6124] [44]=0xf5d98f0    
00005755    14.07309437    [6124] [45]=0x89af707a    
00005756    14.07313824    [6124] [46]=0xa97b8f69    
00005757    14.07318306    [6124] [47]=0xa7e6f6dd    
00005758    14.07322693    [6124] [48]=0x8c0299ca    
00005759    14.07327271    [6124] [49]=0x7b234d76    
00005760    14.07331944    [6124] [50]=0xbd62ae50    
00005761    14.07336330    [6124] [51]=0x7618c5c0    
00005762    14.07340908    [6124] [52]=0x2d30ba84    
00005763    14.07345486    [6124] [53]=0x45454545    
00005764    14.07350159    [6124] [54]=0x1    
00005765    14.07354736    [6124] [55]=0x202    
00005766    14.07359314    [6124] [56]=0x45454545    
00005767    14.07363796    [6124] [57]=0x2    
00005768    14.07368374    [6124] [58]=0x100000    
00005769    14.07373142    [6124] [59]=0x1    
00005770    14.07377529    [6124] [60]=0x45454545    
00005771    14.07380867    [6124] [61]=0x3    
00005772    14.07383919    [6124] [62]=0x2    
00005773    14.07387066    [6124] [63]=0x0    
00005774    14.07390404    [6124] [64]=0x19000    
00005775    14.07393456    [6124] [65]=0x80572cb3    
00005776    14.07397556    [6124] [66]=0x3c4ab2a3    
00005777    14.07401562    [6124] [67]=0x65230bb    
00005778    14.07405663    [6124] [68]=0xa2e80db2    
00005779    14.07409573    [6124] [69]=0xf2229aad    
00005780    14.07413673    [6124] [70]=0x45454545    
00005781    14.07417583    [6124] [71]=0xffffffff    
00005782    14.07421589    [6124] ====================================    
00005783    14.07433510    [6124] _vsnprintf IO_FILE::IO_FILE(): fopen("F:\android\packet\maigoo1\K3_644_AT_HT_H04-3_MG_V1003_21032016_sign\system.img", "rb"): OK!, m_fp(0x61A42E58). (FlashToolLib/source/common/generic/src/virtual_io.?<    
00005784    14.07442379    [6124] _vsnprintf IO_FILE::IsEnd(): m_ReadMode: 1    
00005785    14.07447147    [6124] _vsnprintf IO_FILE::IsEnd(): m_ReadMode: 1 (FlashToolLib/source/common/generic/src/virtual_io.cpp:255)    
00005786    14.07454777    [6124] _vsnprintf IO_FILE::IsEnd(): feof(m_fp): 0    
00005787    14.07459450    [6124] _vsnprintf IO_FILE::IsEnd(): feof(m_fp): 0 (FlashToolLib/source/common/generic/src/virtual_io.cpp:256)    
00005788    14.07466888    [6124] _vsnprintf IO_FILE::IsEnd(): Telli64(m_fp): 933249616    
00005789    14.07471848    [6124] _vsnprintf IO_FILE::IsEnd(): Telli64(m_fp): 933249616 (FlashToolLib/source/common/generic/src/virtual_io.cpp:257)    
00005790    14.07479191    [6124] _vsnprintf IO_FILE::IsEnd(): (u64)Telli64(m_fp): 933249616    
00005791    14.07484150    [6124] _vsnprintf IO_FILE::IsEnd(): (u64)Telli64(m_fp): 933249616 (FlashToolLib/source/common/generic/src/virtual_io.cpp:258)    
00005792    14.07491493    [6124] _vsnprintf IO_FILE::IsEnd(): m_filelength: 933249624    
00005793    14.07496071    [6124] _vsnprintf IO_FILE::IsEnd(): m_filelength: 933249624 (FlashToolLib/source/common/generic/src/virtual_io.cpp:259)    
00005794    14.07512856    [6124] _vsnprintf IO_FILE::~IO_FILE(): fclose(m_fp(0x61A42E58)): OK! (FlashToolLib/source/common/generic/src/virtual_io.cpp:112)    
00005795    14.07522392    [6124] F:\android\packet\maigoo1\K3_644_AT_HT_H04-3_MG_V1003_21032016_sign\system.img    
00005796    14.07528591    [6124] readhead offsetlow=933249616(0x37a04250) readlength=8    
00005797    14.07535362    [6124] ======Daddr=0x921f1e8 Dlen=2=======    
00005798    14.07542133    [6124] [0]=0x45454545    
00005799    14.07549286    [6124] [1]=0xffffffff    
00005800    14.07552433    [6124] ====================================    
00005801    14.07563591    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_Authenticate_v3(): total ext hash count is 1    
00005802    14.07569981    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_Authenticate_v3(): total ext hash count is 1 (FlashToolLib/source/security/src/secure_da_cmd.cpp:1743)    
00005803    14.07577896    [6124] checkhash blockindex=0x2 filehandle=0x5742cd0 dataoff=0x4040 inputsize=0x19000 inputdataptr=0x5727844 blocksize=0x100000    
00005804    14.07594013    [6124] _vsnprintf IO_FILE::IO_FILE(): fopen("F:\android\packet\maigoo1\K3_644_AT_HT_H04-3_MG_V1003_21032016_sign\system.img", "rb"): OK!, m_fp(0x61A42E58). (FlashToolLib/source/common/generic/src/virtual_io.?<    
00005805    14.07607746    [6124] _vsnprintf IO_FILE::IsEnd(): m_ReadMode: 1    
00005806    14.07612705    [6124] _vsnprintf IO_FILE::IsEnd(): m_ReadMode: 1 (FlashToolLib/source/common/generic/src/virtual_io.cpp:255)    
00005807    14.07620049    [6124] _vsnprintf IO_FILE::IsEnd(): feof(m_fp): 0    
00005808    14.07624817    [6124] _vsnprintf IO_FILE::IsEnd(): feof(m_fp): 0 (FlashToolLib/source/common/generic/src/virtual_io.cpp:256)    
00005809    14.07632446    [6124] _vsnprintf IO_FILE::IsEnd(): Telli64(m_fp): 16448    
00005810    14.07637119    [6124] _vsnprintf IO_FILE::IsEnd(): Telli64(m_fp): 16448 (FlashToolLib/source/common/generic/src/virtual_io.cpp:257)    
00005811    14.07644558    [6124] _vsnprintf IO_FILE::IsEnd(): (u64)Telli64(m_fp): 16448    
00005812    14.07649517    [6124] _vsnprintf IO_FILE::IsEnd(): (u64)Telli64(m_fp): 16448 (FlashToolLib/source/common/generic/src/virtual_io.cpp:258)    
00005813    14.07656860    [6124] _vsnprintf IO_FILE::IsEnd(): m_filelength: 933249624    
00005814    14.07661629    [6124] _vsnprintf IO_FILE::IsEnd(): m_filelength: 933249624 (FlashToolLib/source/common/generic/src/virtual_io.cpp:259)    
00005815    14.07675743    [6124] _vsnprintf IO_FILE::~IO_FILE(): fclose(m_fp(0x61A42E58)): OK! (FlashToolLib/source/common/generic/src/virtual_io.cpp:112)    
00005816    14.07681656    [6124] F:\android\packet\maigoo1\K3_644_AT_HT_H04-3_MG_V1003_21032016_sign\system.img    
00005817    14.07685947    [6124] readhead offsetlow=16448(0x4040) readlength=102400    
00005818    14.08541584    [6124] 0x921ef8c=sha_new(0x14980020 0x19000 0x5714320)[0x90a12c4]    
00005819    14.08547401    [6124] 0=sec_hash( a1=0x14980020 a2=0x19000 a3=0x5714320 a4=0x14)[0x619374fc]    
00005820    14.08562660    [6124] 0x921efe4=sha_new(0x5722fe8 0x1d8 0x5714320)[0x90a12c4]    
00005821    14.08568096    [6124] 0=sec_hash( a1=0x5722fe8 a2=0x1d8 a3=0x5714320 a4=0x14)[0x619386cf]    
00005822    14.08587456    [6124] _vsnprintf IO_FILE::IO_FILE(): fopen("F:\android\packet\maigoo1\K3_644_AT_HT_H04-3_MG_V1003_21032016_sign\system.img", "rb"): OK!, m_fp(0x61A42E58). (FlashToolLib/source/common/generic/src/virtual_io.?<    
00005823    14.08598709    [6124] _vsnprintf IO_FILE::IsEnd(): m_ReadMode: 1    
00005824    14.08604813    [6124] _vsnprintf IO_FILE::IsEnd(): m_ReadMode: 1 (FlashToolLib/source/common/generic/src/virtual_io.cpp:255)    
00005825    14.08614063    [6124] _vsnprintf IO_FILE::IsEnd(): feof(m_fp): 0    
00005826    14.08619785    [6124] _vsnprintf IO_FILE::IsEnd(): feof(m_fp): 0 (FlashToolLib/source/common/generic/src/virtual_io.cpp:256)    
00005827    14.08628464    [6124] _vsnprintf IO_FILE::IsEnd(): Telli64(m_fp): 891856900    
00005828    14.08634090    [6124] _vsnprintf IO_FILE::IsEnd(): Telli64(m_fp): 891856900 (FlashToolLib/source/common/generic/src/virtual_io.cpp:257)    
00005829    14.08643055    [6124] _vsnprintf IO_FILE::IsEnd(): (u64)Telli64(m_fp): 891856900    
00005830    14.08649349    [6124] _vsnprintf IO_FILE::IsEnd(): (u64)Telli64(m_fp): 891856900 (FlashToolLib/source/common/generic/src/virtual_io.cpp:258)    
00005831    14.08658981    [6124] _vsnprintf IO_FILE::IsEnd(): m_filelength: 933249624    
00005832    14.08664799    [6124] _vsnprintf IO_FILE::IsEnd(): m_filelength: 933249624 (FlashToolLib/source/common/generic/src/virtual_io.cpp:259)    
00005833    14.08677292    [6124] _vsnprintf IO_FILE::~IO_FILE(): fclose(m_fp(0x61A42E58)): OK! (FlashToolLib/source/common/generic/src/virtual_io.cpp:112)    
00005834    14.08684158    [6124] F:\android\packet\maigoo1\K3_644_AT_HT_H04-3_MG_V1003_21032016_sign\system.img    
00005835    14.08688545    [6124] readhead offsetlow=891856900(0x3528a804) readlength=128    
00005836    14.08692837    [6124] ======Daddr=0x5715498 Dlen=32=======    
00005837    14.08698463    [6124] [0]=0x74736f6f    
00005838    14.08704376    [6124] [1]=0x74656436    
00005839    14.08709908    [6124] [2]=0x316c6961    
00005840    14.08714867    [6124] [3]=0x5f707337    
00005841    14.08719730    [6124] [4]=0x6e756f63    
00005842    14.08726692    [6124] [5]=0x5f646574    
00005843    14.08731556    [6124] [6]=0x6c706d69    
00005844    14.08736515    [6124] [7]=0x4e49705f    
00005845    14.08742142    [6124] [8]=0x69573631    
00005846    14.08746719    [6124] [9]=0x69766564    
00005847    14.08751488    [6124] [10]=0x654d656e    
00005848    14.08758163    [6124] [11]=0x4b616964    
00005849    14.08763599    [6124] [12]=0x33317469    
00005850    14.08766270    [6124] [13]=0x6f6d654d    
00005851    14.08771324    [6124] [14]=0x72547972    
00005852    14.08776474    [6124] [15]=0x656b6361    
00005853    14.08781528    [6124] [16]=0x45454572    
00005854    14.08785248    [6124] [17]=0x545a5f00    
00005855    14.08790207    [6124] [18]=0x62354e53    
00005856    14.08794308    [6124] [19]=0x74736f6f    
00005857    14.08800697    [6124] [20]=0x74656436    
00005858    14.08806133    [6124] [21]=0x316c6961    
00005859    14.08812046    [6124] [22]=0x5f707337    
00005860    14.08817673    [6124] [23]=0x6e756f63    
00005861    14.08821869    [6124] [24]=0x5f646574    
00005862    14.08827019    [6124] [25]=0x6c706d69    
00005863    14.08832264    [6124] [26]=0x4e49705f    
00005864    14.08836555    [6124] [27]=0x69573631    
00005865    14.08841610    [6124] [28]=0x69766564    
00005866    14.08846569    [6124] [29]=0x654d656e    
00005867    14.08851433    [6124] [30]=0x4b616964    
00005868    14.08860683    [6124] [31]=0x33317469    
00005869    14.08866882    [6124] ====================================    
00005870    14.08872700    [6124] ======addr=0x5722fe8 len=472=======    
00005871    14.08877373    [6124] 0x53 0x53 0x53 0x53 0x58 0x55 0x4e 0x48    
00005872    14.08881664    [6124] 0x55 0x5f 0x32 0x30 0x31 0x32 0x0 0x0    
00005873    14.08885956    [6124] 0x23 0x23 0x23 0x23 0x23 0x23 0x23 0x23    
00005874    14.08893490    [6124] 0xa 0x0 0x64 0x20 0x61 0x73 0x20 0x30    
00005875    14.08899117    [6124] 0x2c 0x20 0x74 0x68 0x1 0x0 0x0 0x0    
00005876    14.08904362    [6124] 0x0 0x0 0xa0 0x37 0x40 0x0 0x0 0x0    
00005877    14.08909893    [6124] 0x79 0x7a 0x79 0x7a 0x79 0x7a 0x79 0x7a    
00005878    14.08916187    [6124] 0x4 0x68 0x28 0x35 0x94 0x0 0x0 0x0    
00005879    14.08922100    [6124] 0x2e 0x74 0x65 0x17 0x61 0xdc 0x5f 0xc1    
00005880    14.08926678    [6124] 0xe 0x54 0xcc 0x1d 0x7c 0xde 0x97 0xc7    
00005881    14.08930111    [6124] 0xe0 0x96 0x73 0xba 0x45 0x45 0x45 0x45    
00005882    14.08937359    [6124] 0x1 0x0 0x0 0x0 0x2 0x2 0x0 0x0    
00005883    14.08941269    [6124] 0x45 0x45 0x45 0x45 0x2 0x0 0x0 0x0    
00005884    14.08946514    [6124] 0x0 0x0 0x10 0x0 0x1 0x0 0x0 0x0    
00005885    14.08953953    [6124] 0x45 0x45 0x45 0x45 0x3 0x0 0x0 0x0    
00005886    14.08956909    [6124] 0x2 0x0 0x0 0x0 0x0 0x0 0x0 0x0    
00005887    14.08961678    [6124] 0x0 0x90 0x1 0x0 0xca 0x7c 0x2c 0xee    
00005888    14.08964920    [6124] 0x5b 0xd3 0x18 0x7c 0xda 0xa3 0x59 0x1c    
00005889    14.08968353    [6124] 0x2c 0xfb 0x9d 0x3c 0x73 0xfe 0xae 0xfe    
00005890    14.08971786    [6124] 0x45 0x45 0x45 0x45 0x5 0x0 0x0 0x0    
00005891    14.08976078    [6124] 0x40 0x0 0x0 0x0 0x80 0x0 0x0 0x0    
00005892    14.08983040    [6124] 0x14 0x0 0x0 0x0 0x4c 0x0 0x0 0x0    
00005893    14.08984661    [6124] 0x53 0x53 0x53 0x53 0x58 0x55 0x4e 0x48    
00005894    14.08991528    [6124] 0x55 0x5f 0x32 0x30 0x31 0x32 0x0 0x0    
00005895    14.08993053    [6124] 0x23 0x23 0x23 0x23 0x23 0x23 0x23 0x23    
00005896    14.08997822    [6124] 0xa 0x0 0x64 0x20 0x61 0x73 0x20 0x30    
00005897    14.09002399    [6124] 0x2c 0x20 0x74 0x68 0x1 0x0 0x0 0x0    
00005898    14.09006977    [6124] 0x0 0x0 0xc0 0x44 0x40 0x0 0x0 0x0    
00005899    14.09012604    [6124] 0x79 0x7a 0x79 0x7a 0x79 0x7a 0x79 0x7a    
00005900    14.09015465    [6124] 0x40 0x0 0xc0 0x44 0x94 0x0 0x0 0x0    
00005901    14.09020901    [6124] 0x27 0xbd 0x55 0x72 0xc3 0xa 0x53 0xf1    
00005902    14.09023762    [6124] 0x4a 0x36 0x40 0xb7 0xa4 0x97 0x3f 0x67    
00005903    14.09028530    [6124] 0xfd 0x3a 0xca 0xed 0xbf 0xb0 0x26 0x3a    
00005904    14.09033775    [6124] 0x72 0x44 0x1f 0xdf 0x64 0xd7 0xa 0x78    
00005905    14.09039021    [6124] 0x60 0x9d 0xfc 0x54 0xd3 0xcd 0xeb 0xf0    
00005906    14.09041595    [6124] 0xa8 0xf1 0xb8 0x66 0x58 0x17 0x6b 0xa8    
00005907    14.09045029    [6124] 0x72 0xf 0x68 0xe3 0x84 0xef 0x62 0x29    
00005908    14.09048367    [6124] 0x16 0x73 0xd7 0x4a 0x93 0x59 0xe2 0xc0    
00005909    14.09053802    [6124] 0x7c 0xb 0x9e 0x54 0xfd 0x78 0x8d 0x58    
00005910    14.09057045    [6124] 0xc 0x31 0xa8 0x44 0x85 0xc4 0xa1 0x57    
00005911    14.09061813    [6124] 0xcc 0x24 0xb3 0xda 0xd8 0xd3 0xb2 0x73    
00005912    14.09067440    [6124] 0x90 0x32 0x1e 0xb3 0xef 0x66 0xff 0xd4    
00005913    14.09070206    [6124] 0x48 0x3a 0x60 0xf6 0x3c 0x21 0xb 0xe5    
00005914    14.09074593    [6124] 0xf8 0xc7 0x9b 0xa7 0x6c 0x9f 0x25 0x4d    
00005915    14.09080410    [6124] 0xf0 0x98 0x5d 0xf 0x7a 0x70 0xaf 0x89    
00005916    14.09083176    [6124] 0x69 0x8f 0x7b 0xa9 0xdd 0xf6 0xe6 0xa7    
00005917    14.09088230    [6124] 0xca 0x99 0x2 0x8c 0x76 0x4d 0x23 0x7b    
00005918    14.09093475    [6124] 0x50 0xae 0x62 0xbd 0xc0 0xc5 0x18 0x76    
00005919    14.09097099    [6124] 0x84 0xba 0x30 0x2d 0x45 0x45 0x45 0x45    
00005920    14.09102249    [6124] 0x1 0x0 0x0 0x0 0x2 0x2 0x0 0x0    
00005921    14.09106636    [6124] 0x45 0x45 0x45 0x45 0x2 0x0 0x0 0x0    
00005922    14.09111881    [6124] 0x0 0x0 0x10 0x0 0x1 0x0 0x0 0x0    
00005923    14.09116840    [6124] 0x45 0x45 0x45 0x45 0x3 0x0 0x0 0x0    
00005924    14.09121609    [6124] 0x2 0x0 0x0 0x0 0x0 0x0 0x0 0x0    
00005925    14.09126377    [6124] 0x0 0x90 0x1 0x0 0xb3 0x2c 0x57 0x80    
00005926    14.09130955    [6124] 0xa3 0xb2 0x4a 0x3c 0xbb 0x30 0x52 0x6    
00005927    14.09136009    [6124] 0xb2 0xd 0xe8 0xa2 0xad 0x9a 0x22 0xf2    
00005928    14.09140682    [6124] 0x45 0x45 0x45 0x45 0xff 0xff 0xff 0xff    
00005929    14.09145737    [6124] 0x45 0x45 0x45 0x45 0xff 0xff 0xff 0xff    
00005930    14.09149837    [6124] ====================================    
00005931    14.09153271    [6124] ======addr=0x5715498 len=128=======    
00005932    14.09158230    [6124] 0x6f 0x6f 0x73 0x74 0x36 0x64 0x65 0x74    
00005933    14.09163094    [6124] 0x61 0x69 0x6c 0x31 0x37 0x73 0x70 0x5f    
00005934    14.09167767    [6124] 0x63 0x6f 0x75 0x6e 0x74 0x65 0x64 0x5f    
00005935    14.09172630    [6124] 0x69 0x6d 0x70 0x6c 0x5f 0x70 0x49 0x4e    
00005936    14.09177589    [6124] 0x31 0x36 0x57 0x69 0x64 0x65 0x76 0x69    
00005937    14.09182549    [6124] 0x6e 0x65 0x4d 0x65 0x64 0x69 0x61 0x4b    
00005938    14.09187794    [6124] 0x69 0x74 0x31 0x33 0x4d 0x65 0x6d 0x6f    
00005939    14.09191990    [6124] 0x72 0x79 0x54 0x72 0x61 0x63 0x6b 0x65    
00005940    14.09196949    [6124] 0x72 0x45 0x45 0x45 0x0 0x5f 0x5a 0x54    
00005941    14.09201908    [6124] 0x53 0x4e 0x35 0x62 0x6f 0x6f 0x73 0x74    
00005942    14.09206772    [6124] 0x36 0x64 0x65 0x74 0x61 0x69 0x6c 0x31    
00005943    14.09211445    [6124] 0x37 0x73 0x70 0x5f 0x63 0x6f 0x75 0x6e    
00005944    14.09216690    [6124] 0x74 0x65 0x64 0x5f 0x69 0x6d 0x70 0x6c    
00005945    14.09221554    [6124] 0x5f 0x70 0x49 0x4e 0x31 0x36 0x57 0x69    
00005946    14.09226513    [6124] 0x64 0x65 0x76 0x69 0x6e 0x65 0x4d 0x65    
00005947    14.09231472    [6124] 0x64 0x69 0x61 0x4b 0x69 0x74 0x31 0x33    
00005948    14.09235382    [6124] ====================================    
00005949    14.09245777    [6124] 0x921efe8=sha_new(0x5722fe8 0x1d8 0x90caf18)[0x90a130f]    
00005950    14.09432888    [6124] 0x0=sub_10001A00_old(0x90cae38  0x5715498 0x921ec24  )[0x90a1d47]    
00005951    14.09437656    [6124] 73 1392978505    
00005952    14.09442616    [6124] 0x2=sub_10001CE0_old(0x90cae38(0x80) 0x5 0x14 0x90caf18 0x5715498)[0x90a1329]    
00005953    14.09628868    [6124] 0x0=sub_10001A00_old(0x90cae38  0x5715498 0x921ec24  )[0x90a1d47]    
00005954    14.09634399    [6124] 73 1392978505    
00005955    14.09640121    [6124] 0x2=sub_10001CE0_old(0x90cae38(0x80) 0x0 0x14 0x90caf18 0x5715498)[0x90a1347]    
00005956    14.09645557    [6124] sign a1=0x5722fe8 a2=0x1d8 a3=0x5715498 a4=0x80 ret = 0xffffffff    
00005957    14.09654427    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_Authenticate_v3(): -----------------------------------------------------------    
00005958    14.09661198    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_Authenticate_v3(): ----------------------------------------------------------- (FlashToolLib/source/security/src/secure_da_cmd.cpp:1925)    
00005959    14.09672832    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_Authenticate_v3(): IMAGE AUTH FAIL !!    
00005960    14.09678745    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_Authenticate_v3(): IMAGE AUTH FAIL !! (FlashToolLib/source/security/src/secure_da_cmd.cpp:1926)    
00005961    14.09688282    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_Authenticate_v3(): -----------------------------------------------------------    
00005962    14.09694481    [6124] _vsnprintf SECURE_DA_Cmd::Secure_USB_Authenticate_v3(): ----------------------------------------------------------- (FlashToolLib/source/security/src/secure_da_cmd.cpp:1927)    
00005963    14.09705639    [6124] dword_10234144=3 dword_10234114=0 10 14 20 40    
00005964    14.09710312    [6124] --sub_10127740 out--   
  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值