Jump to content


Photo

[Firmware][Unofficial][ODIN]S4 DevEd[boot/recovery/radio/modem][MDK-MJ7-MK2-NC5]


  • Please log in to reply
3 replies to this topic

#1 skeetch79

skeetch79

    F&F Chemist

  • Dedicated Supporter
  • PipPipPip
  • 353 posts
  • Twitter:OrgoChemMan
  • LocationWest Milford, NJ
  • Current Device(s):Nexus 6, Moto X DevEd, Nexus 7 WiFi (2013)

Posted 06 February 2014 - 06:02 AM


For Samsung Galaxy S4 Developer Edition Devices Only!

 
I have extracted the Boot.img, Recovery.img, NON-HLOS.bin (Radio) and Modem.bin files from the Samsung Galaxy S4 Developer Edition on builds I545OYUAMDK (original Factory Firmware), I545OYUEMJ7 and I545OYUEMK2. With those files, I have created various tar.md5 restore files which include the Boot, Recovery, Radio and Modem partitions. The tar.md5 files were created using 64-bit Cygwin in Windows 8 by running the following commands (for example):

 

 
filename=I545OYUAMDK
tar -H ustar -c boot.img recovery.img > $filename.tar
md5sum -t $filename.tar >> $filename.tar
mv $filename.tar $filename.tar.md5
 
I have also extracted the MD5 sums and SHA-1 values from each tar.md5 file below and have posted them for reference. Please use at your own risk. I am not responsible for damaged devices.
 

Again, for S4 Developer Edition Devices Only!!!

 
Odin 3.07 - Odin 3.07
Odin 3.09 - Odin 3.09
 
I545OYUAMDK
MD5 sum: 6b41bc15f669ef1c962626c011735790
SHA-1: 1cc5d06781ecb6fa4dea28b107cad8b6237902ce
 
MD5: b063d6a1496cf2076199782542ec9f08
SHA-1: b67a531b252d94a01b559b260a744d81610d9792
 
MD5: ee08455730004f0c4321bf98ca2a26d8
SHA-1: bce6dda7f5b6aab3abd965f734e4b772ec8a035e
 
MD5: 487aab147698d96eb254336e4192fc1e
SHA-1: 25273c28a5ea411cfdc113e8fceb30c5a7ff9097
 
I545OYUEMJ7
MD5 sum: a8c2954756ef9b82102d4c9cc999f810
SHA-1: f9fc296bff37682718b07a1de47f8250b1aaf52d
 
MD5: acf4d72e743469932a2aa9f54f4cafeb
SHA-1: 69271c6e610835dbfd320e4bafb5a759814e7e74
 
MD5: 9396924db03efd8fb1856813cf2419b6
SHA-1: f5210eee25281b68fb450893c02357e7a26d10ed
 
MD5: 3989422900fb177d4d36efa35e1869ae
SHA-1: 519111d252122776a6d2a7f33c888544da2f5a36
 
I545OYUEMK2
MD5 sum: b5017c04df3b73a363e012feef73c343
SHA-1: 13372816d6e774d84272f53b5285ed6a62c30a97
 
MD5: 63eec954e5d4290b8d7dfb96fcdae580
SHA-1: 2f3b4f6587ca3e233e0091db5742c9171053ca40
 
MD5: 7791393740b06a304b015ee1f28a0fa8
SHA-1: 9d5eb0b7f90ae8d4ee04486533eac30a30dbd279
 
MD5: 9252cbac68d52a62a8811e7cd4542940
SHA-1: cb20f968c0e1fff74d68613c56230da1b127cdef

 

 
I have flashed these files using Odin 3.07 and Odin 3.09. Load tar.md5's into "PDA" slot in Odin 3.07 or "AP" slot in Odin 3.09. For both Odin 3.07 and Odin 3.09, "F. Reset Time" and "Auto-Reboot" options are ok to be checked, but make sure "Re-partition" is NOT CHECKED.
 
If you have any questions or any requests for other partitions please do not hesitate to ask. This is the first thread I have ever created, please go easy on me! :)
 
______________________________

 

*Edited February 18th, 2014*

 

Individual Boot and Recovery Odin tar.md5's
 
I545OYUAMDK
MD5 sum: afba73816e13008afecf2499b3a5c3a3
SHA-1: a2ba6c75436b022fa40061aecea9716a795d527d
 
MD5 sum: 87ea570503f3114f45b89dc9991e0e2d
SHA-1: eb7f3a50bf7af6935eacd6e29a791d9d1e4e359e
 
I545OYUEMJ7
MD5 sum: cb183c42be45915f7ebb26a9342d72a8
SHA-1: f537fa025a7f139c2538629cb8cb90334a7205f4
 
MD5 sum: 2c3c1fdb9b4ca20f9985c20cd77faf54
SHA-1: 108f6e5b169bef047c9f2ce8551f91a1265c3236
 
I545OYUEMJ7
MD5 sum: beea9797febf1471ae75240a67379d3a
SHA-1: d40ca498559c38adec9a135fa81728ffcf1c7ea3
 
MD5 sum: 9faa83bed96ea652584bc56c54bd986b
SHA-1: 4b573f989b6b1b7a4fcfe96608f091ca47deeb1e
 
______________________________
 
*Edited July 17th, 2014*
 
Below you will find the Modem, Radio and and Boot images from the recent Verizon 4.4.2 I545OYUFNC5 KitKat build (Developer Device version) and Recovery image from the recent Verizon 4.4.2 I545VRUFNC5 build (Retail version). Since there isn't a root method yet for Verizon 4.4.2 KitKat on the Galaxy S4, in order to achieve root, the stock recovery partition had to be overwritten with Philz Touch Recovery and Chainfire's SuperSu was then flashed. Because of this there isn't a back up of the 4.4.2 Developer Recovery image. The Recovery Image that is included is the stock recovery from the Retail Galaxy S4 on 4.4.2 KitKat, this functions perfectly fine on the Developer Device. 
 
The Build for the Galaxy S4 Developer Edition device on 4.4.2 KitKat is KOT49H.I545OYUFNC5 and the Baseband is I545OYUFNC5. If you decide to flash the stock Recovery, it will say I545VRUFNC5 in the upper corner of the recovery screen. If you want a custom recovery, however, you can flash the latest Philz Touch Recovery for jflte devices (found here). At the time of this write-up 6.50.6 is the latest version.
 
I have not tested any of these files on the Developer S4 running builds earlier than 4.4.2 KitKat - i.e. I545OYUAMDK (4.2.2), I545OYUEMJ7 (4.3) and I545OYUEMK2 (4.3). I do not think the Radio and Modem would have any issue on a non-KitKat build, but I would recommend holding off on the Boot file unless you have a 4.4.2 KitKat build on your device. Both Modem (modem.bin) and Radio (NON-HLOS.bin) were edited to remove the padded zero's at the end of the file which allows ODIN flashing (allows the pass on the signature test)(thanks [MENTION=4939386]Surge1223[/MENTION] for your HexEdit guide). If you have any issues with the Modem and Radio, you can always flash back to a version which is stable for your device using the above posted files.
 
Below you will find the Boot, Recovery, Modem and Radio images as individual tar.md5's and also bundled as Modem/Radio, Boot/Recovery and Boot/Recovery/Modem/Radio.
 
 
I545OYUFNC5
 
MD5: 4653908b820535c4a953432a46558378
SHA-1: 6f67c3ad8e2ec38b3189b300e478d5e912055445
 
MD5: 7fb655f8b05b0e72edb5258705de992a
SHA-1: d07f72bd8f8279c5dff23c02589f76308a5b8ee5
 
MD5: bc61795e901c424f4735d63b88571c4c
SHA-1: 8e53ec92b82a64868a28dffbe7513fa662d45c48
 
MD5: b6dbfa97425ac88c710cb05743a99932
SHA-1: 733118569ec934d87b9e22fe903d17d3ea427601
 
Boot (OYU) and Recovery (VRU): I545OYUFNC5_Boot_Recovery_Restore.tar.md5
MD5: 3066f7578bf7d5a1aa982a8ab5b1bcf8
SHA-1: 606b3252ee826dc87577ed4397c24db34845ffca
 
Modem (OYU) and Radio (OYU): I545OYUFNC5_Modem_Radio_Restore.tar.md5
MD5: 3ae8fc408c542d4d99f0b2cf199e0776
SHA-1: e3dfb6634a802d19dcfe92abeaa028788a28ac8e
 
Boot (OYU), Recovery (VRU), Modem (OYU) and Radio (OYU): I545OYUFNC5_Boot_Recovery_Modem_Radio_Restore.tar.md5
MD5: 7c55aae7fdf93a6cacb076eaece03b77
SHA-1: 9960f092ee7fcd0321d99929f309b87caee8b7a6

 

 

 


  • SamuriHL, livinginkaos and JustAGuy like this

#2 livinginkaos

livinginkaos

    I don't know what I'm doing anymore.....

  • Administrator
  • 15,282 posts
  • Google+:Hangouts - livinginkaos@gmail.com
  • LocationOregon
  • Current Device(s):Samsung S8+ / Pixel XL 128gb / iPhone 7+ 256gb / iPad Pro 12.9" / Samsung Chromrbook Plus / Pixel C / Nexus 6p 128gb / Nexus 6 / Nexus 6 on Fi / Nexus 9 / Moto 360^2 / Nvidia Shield TV Pro / Nvidia Shield Tablet / HTC EVODesign on FreedomPop / Chromecast / Surface Pro 3 i7 / Samsung Tab Pro 12.2 / Lenovo Win8 Tab / Eee Slate / '13 Nexus 7

Posted 06 February 2014 - 06:06 AM

Nice Skeetch!

Sent From My DEV X
 


b2wvCBn.png

Sig by livinginkaos
Samsung S8+ / Pixel XL 128gb / iPhone 7+ 256gb / iPad Pro 12.9" / Samsung Chromrbook Plus / Pixel C / Nexus 6p 128gb / Nexus 6 / Nexus 6 on Fi / Nexus 9 / Moto 360^2 / Nvidia Shield TV Pro / Nvidia Shield Tablet / HTC EVODesign on FreedomPop / Chromecast / Surface Pro 3 i7 / Samsung Tab Pro 12.2 / Lenovo Win8 Tab / Eee Slate / '13 Nexus 7


#3 SamuriHL

SamuriHL

    Android Warrior

  • Smod
  • 44,202 posts
  • Current Device(s):S21 Ultra, Pixel 6

Posted 06 February 2014 - 06:18 AM

You've learned very well, my young padawan!  :D  Nice job, man.


Non potest esse nisi unus


#4 skeetch79

skeetch79

    F&F Chemist

  • Dedicated Supporter
  • PipPipPip
  • 353 posts
  • Twitter:OrgoChemMan
  • LocationWest Milford, NJ
  • Current Device(s):Nexus 6, Moto X DevEd, Nexus 7 WiFi (2013)

Posted 06 February 2014 - 07:23 AM

Thanks!! :-) I had some great teachers!


  • SamuriHL likes this




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users