7870pwd_extract is utility to extract password from vendor specific portion(file AllAppUpdateA13.bin) of FYT UIS 7870 firmware.
Also includes ed25519 implementation from https://github.com/orlp/ed25519/tree/master
cd 7870pwd_extract
make
7870pwd_extract -z <path_to_AllAppUpdateA13.bin> -l <path_to_lsec6318update> [-v]
Where -v is optional parameter which enables verbose mode
Example:
./7870pwd_extract -z /mnt/d/tmp/7870_2000x1200_20240111_LiJun/AllAppUpdateA13.bin -l /mnt/d/tmp/7870_2000x1200_20240111_LiJun/lsec6318update
password: b8eb271f597885f48b8d237259aa72d0
Example:
7z t /mnt/d/tmp/7870_2000x1200_20240111_LiJun/AllAppUpdateA13.bin -p b8eb271f597885f48b8d237259aa72d0
Scanning the drive for archives:
1 file, 641257863 bytes (612 MiB)
Testing archive: /mnt/d/tmp/7870_2000x1200_20240111_LiJun/AllAppUpdateA13.bin
--
Path = /mnt/d/tmp/7870_2000x1200_20240111_LiJun/AllAppUpdateA13.bin
Type = zip
Physical Size = 641257863
Comment = |c\'Ë+¹EÞxÌÅò´òÀ?»wØ+´=wÐ'
No files to process
Everything is Ok
Files: 0
Size: 0
Compressed: 641257863