mirror of
https://github.com/chiteroman/PlayIntegrityFix.git
synced 2025-01-19 03:22:39 +02:00
v15.9.2
This commit is contained in:
parent
8c3b3d1b74
commit
c0d0e424b4
@ -12,8 +12,8 @@ android {
|
||||
applicationId = "es.chiteroman.playintegrityfix"
|
||||
minSdk = 26
|
||||
targetSdk = 34
|
||||
versionCode = 15910
|
||||
versionName = "v15.9.1"
|
||||
versionCode = 15920
|
||||
versionName = "v15.9.2"
|
||||
multiDexEnabled = false
|
||||
|
||||
buildFeatures {
|
||||
|
@ -30,11 +30,11 @@ public final class CustomKeyStoreSpi extends KeyStoreSpi {
|
||||
Certificate[] certificates;
|
||||
|
||||
// Check for broken TEE devices... It shouldn't happen because exception is in generateKeyPair
|
||||
// Just to be sure...
|
||||
// Also, for custom roms which implement a bypass :D
|
||||
try {
|
||||
certificates = keyStoreSpi.engineGetCertificateChain(alias);
|
||||
} catch (Throwable t) {
|
||||
EntryPoint.LOG(t.toString());
|
||||
EntryPoint.LOG("engineGetCertificateChain: " + t);
|
||||
throw new UnsupportedOperationException();
|
||||
}
|
||||
|
||||
@ -48,7 +48,7 @@ public final class CustomKeyStoreSpi extends KeyStoreSpi {
|
||||
// If leaf certificate has attestation extensions, throw exception!
|
||||
if (certificates[0] instanceof X509Certificate x509Certificate) {
|
||||
if (x509Certificate.getExtensionValue(EAT_OID) != null || x509Certificate.getExtensionValue(ASN1_OID) != null || x509Certificate.getExtensionValue(KNOX_OID) != null) {
|
||||
EntryPoint.LOG("Certificate leaf with attestation extensions. Throw exception!");
|
||||
EntryPoint.LOG("Leaf certificate with attestation extensions. Throw exception!");
|
||||
throw new UnsupportedOperationException();
|
||||
}
|
||||
}
|
||||
|
@ -5,7 +5,6 @@ https://t.me/playintegrityfix
|
||||
Device verdict should pass by default.
|
||||
If not, try removing /data/adb/pif.json file.
|
||||
|
||||
# v15.9.1
|
||||
# v15.9.2
|
||||
|
||||
- Correctly remove conflict apps.
|
||||
- Fix attestation issues in few devices.
|
||||
- Fix bootloop issue on few devices.
|
@ -18,12 +18,12 @@ fi
|
||||
# Check custom fingerprint
|
||||
if [ -f "/data/adb/pif.json" ]; then
|
||||
ui_print "- You are using custom fingerprint!"
|
||||
ui_print "- If you are failing DEVICE verdict, remove /data/adb/pif.json file"
|
||||
ui_print "- If you fail DEVICE verdict, remove /data/adb/pif.json file"
|
||||
ui_print "- If pif.json file doesn't exist, module will use default one"
|
||||
fi
|
||||
|
||||
# Remove conflict apps
|
||||
REPLACE="
|
||||
REMOVE="
|
||||
/system/app/EliteDevelopmentModule
|
||||
/system/app/XInjectModule
|
||||
/system/product/app/XiaomiEUInject
|
||||
|
@ -1,7 +1,7 @@
|
||||
id=playintegrityfix
|
||||
name=Play Integrity Fix
|
||||
version=v15.9.1
|
||||
versionCode=15910
|
||||
version=v15.9.2
|
||||
versionCode=15920
|
||||
author=chiteroman
|
||||
description=Universal modular fix for Play Integrity (and SafetyNet) on devices running Android 8-14.
|
||||
updateJson=https://raw.githubusercontent.com/chiteroman/PlayIntegrityFix/main/update.json
|
||||
|
0
module/system/app/EliteDevelopmentModule/.replace
Normal file
0
module/system/app/EliteDevelopmentModule/.replace
Normal file
0
module/system/app/XInjectModule/.replace
Normal file
0
module/system/app/XInjectModule/.replace
Normal file
0
module/system/product/app/XiaomiEUInject/.replace
Normal file
0
module/system/product/app/XiaomiEUInject/.replace
Normal file
0
module/system/system_ext/app/PifPrebuilt/.replace
Normal file
0
module/system/system_ext/app/PifPrebuilt/.replace
Normal file
@ -1,6 +1,6 @@
|
||||
{
|
||||
"version": "v15.9.1",
|
||||
"versionCode": 15910,
|
||||
"zipUrl": "https://github.com/chiteroman/PlayIntegrityFix/releases/download/v15.9.1/PlayIntegrityFix_v15.9.1.zip",
|
||||
"version": "v15.9.2",
|
||||
"versionCode": 15920,
|
||||
"zipUrl": "https://github.com/chiteroman/PlayIntegrityFix/releases/download/v15.9.2/PlayIntegrityFix_v15.9.2.zip",
|
||||
"changelog": "https://raw.githubusercontent.com/chiteroman/PlayIntegrityFix/main/changelog.md"
|
||||
}
|
||||
|
Loading…
Reference in New Issue
Block a user