mirror of
https://github.com/platomav/BIOSUtilities.git
synced 2025-05-27 13:34:32 -04:00
Fix main pattern detections, when found at offset 0x0
AMI UCP Update Extractor v2.0_a15 Phoenix TDK Packer Extractor v2.0_a7 Portwell EFI Update Extractor v2.0_a9 Fixes issue #13, thanks @PCRider for the report!
This commit is contained in:
parent
fddd33aafd
commit
f5905ec662
4 changed files with 14 additions and 19 deletions
|
@ -7,7 +7,7 @@ Portwell EFI Update Extractor
|
|||
Copyright (C) 2021-2022 Plato Mavropoulos
|
||||
"""
|
||||
|
||||
TITLE = 'Portwell EFI Update Extractor v2.0_a8'
|
||||
TITLE = 'Portwell EFI Update Extractor v2.0_a9'
|
||||
|
||||
import os
|
||||
import sys
|
||||
|
@ -40,7 +40,7 @@ def is_portwell_efi(in_file):
|
|||
is_mz = PAT_MICROSOFT_MZ.search(in_buffer[:0x2]) # EFI images start with PE Header MZ
|
||||
is_uu = PAT_PORTWELL_EFI.search(pe_buffer[:0x4]) # Portwell EFI files start with <UU>
|
||||
|
||||
return is_mz and is_uu
|
||||
return bool(is_mz and is_uu)
|
||||
|
||||
# Get PE of Portwell EFI executable
|
||||
def get_portwell_pe(in_buffer):
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue