Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

openssl_decrypt() function error #101

Open
zingrx opened this issue Apr 19, 2024 · 8 comments
Open

openssl_decrypt() function error #101

zingrx opened this issue Apr 19, 2024 · 8 comments

Comments

@zingrx
Copy link

zingrx commented Apr 19, 2024

I'm running the script on Ubuntu 23.10. PHP 8.2 is installed, and curl and openssl are enabled by default.

This is the result when I run php -m to check the installed/enabled modules
`[PHP Modules]
calendar
Core
ctype
curl
date
exif
FFI
fileinfo
filter
ftp
gettext
hash
iconv
json
libxml
openssl
pcntl
pcre
PDO
Phar
posix
random
readline
Reflection
session
shmop
sockets
sodium
SPL
standard
sysvmsg
sysvsem
sysvshm
tokenizer
Zend OPcache
zlib

[Zend Modules]
Zend OPcache
`

And this is the error when I run php bypass.php:

[2024-04-19] [21:29:43] [INFO] - ************************************ [2024-04-19] [21:29:43] [INFO] - * Xiaomi HyperOS BootLoader Bypass * [2024-04-19] [21:29:43] [INFO] - * By NekoYuzu Version 1.0 * [2024-04-19] [21:29:43] [INFO] - ************************************ [2024-04-19] [21:29:43] [INFO] - GitHub: https://github.com/MlgmXyysd [2024-04-19] [21:29:43] [INFO] - XDA: https://xdaforums.com/m/mlgmxyysd.8430637 [2024-04-19] [21:29:43] [INFO] - X (Twitter): https://x.com/realMlgmXyysd [2024-04-19] [21:29:43] [INFO] - PayPal: https://paypal.me/MlgmXyysd [2024-04-19] [21:29:43] [INFO] - My Blog: https://www.neko.ink/ [2024-04-19] [21:29:43] [INFO] - ************************************ [2024-04-19] [21:29:43] [INFO] - Starting ADB server... [2024-04-19] [21:29:43] [INFO] - Processing device a13a274a(device:manet)... [2024-04-19] [21:29:43] [INFO] - Finding BootLoader unlock bind request... [2024-04-19] [21:29:44] [INFO] * Now you can bind account in the developer options. adb: invalid transport id [2024-04-19] [21:29:44] [INFO] - Refactoring parameters... PHP Fatal error: Uncaught TypeError: decryptData(): Argument #1 ($data) must be of type string, null given, called in /media/mni/extssd/home/mni/git/Xiaomi-HyperOS-BootLoader-Bypass/bypass.php on line 330 and defined in /media/mni/extssd/home/mni/git/Xiaomi-HyperOS-BootLoader-Bypass/bypass.php:228 Stack trace: #0 /media/mni/extssd/home/mni/git/Xiaomi-HyperOS-BootLoader-Bypass/bypass.php(330): decryptData() #1 {main} thrown in /media/mni/extssd/home/mni/git/Xiaomi-HyperOS-BootLoader-Bypass/bypass.php on line 228

Any idea how to fix this?

@hanxiang-li
Copy link

The script root directory has a php.ini file, which modifies extension_dir to the root directory of the PHP program ext
image

@xbn2002
Copy link

xbn2002 commented May 5, 2024

Look #91 pls

@stablestud
Copy link

stablestud commented May 6, 2024

#91 does not help at all, as this is on linux. Also the script root directory does not have a php.ini file

@stablestud
Copy link

stablestud commented May 6, 2024

When running
adb shell "logact *:S CloudDeviceStatus:V"
the following output is important to note:

DeviceStatus: content: {"code":30001,"description
[..]
Couldn't add. Please go to Mi Community to apply for authorization and try again.

Code 30001, based on the repos FAQ means that the hack cannot be applied to the model, bad luck for me then...

@stablestud
Copy link

Anyone else desperate to unlock the bootloader of Xiaomi devices look here: https://xiaomi.eu/community/threads/unlock-by-xiaomi-community.71321/post-719423

You must do unlocking via Xiaomi Community App. Make sure you set the site location to Global not any other country like Germany (see screenshot of linked post)

@xbn2002
Copy link

xbn2002 commented May 7, 2024

When running adb shell "logact *:S CloudDeviceStatus:V" the following output is important to note:

DeviceStatus: content: {"code":30001,"description
[..]
Couldn't add. Please go to Mi Community to apply for authorization and try again.

Code 30001, based on the repos FAQ means that the hack cannot be applied to the model, bad luck for me then...

30001 means your device is not supported to bypass, just give up.

@mxwmnn
Copy link

mxwmnn commented May 9, 2024

When running adb shell "logact *:S CloudDeviceStatus:V" the following output is important to note:

DeviceStatus: content: {"code":30001,"description
[..]
Couldn't add. Please go to Mi Community to apply for authorization and try again.

Code 30001, based on the repos FAQ means that the hack cannot be applied to the model, bad luck for me then...

30001 means your device is not supported to bypass, just give up.

really or is it maybe the xiaomi account?

have the same code in logcat. have a pad 5 pro 5g (only CN) created the account with the tablet. will try creating a new one on xiaomi site and try again :(

@mxwmnn
Copy link

mxwmnn commented May 9, 2024

Don't know what was wrong here.
Have enuma and used HyperFuck. Worked. Had HyperOS 1.0.1.0

Solved for me

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

5 participants