This is a step-by-step procedure to get pkg-config working on Windows, based on my experience, using the info from Oliver Zendel's comment. I assume here that MinGW was installed to C: MinGW. RestoreTools was developed using Matlab version 6.1, and has been tested on subsequent versions (most recently, version 7.14). The software for this may be obtained from: Version 2.0.beta Compressed unix tar file. Older versions: version 1.4 Compressed unix tar file.
This article discusses software internally used by Apple. Acquiring a copy without Apple's consent is illegal and may result in being scammed. |
PurpleRestore 3.0 (?) (17A400) | |
Original author(s) | Apple Inc. |
---|---|
Developer(s) | Apple Inc. |
Stable release | 3.0 (?) (17A400) (latest known version) |
Operating system | macOS |
Size | 20-40 MB |
Available in | English |
Type | Firmware flasher |
License | Closed source |
|
PurpleRestore is a tool made by Apple and is used for flashing iDevices. It provides far more customization than iTunes, and is known to be used to flash internal firmware to prototypes. Little is currently known about which versions it 'supports' for restoring as such. PurpleRestore is installed by RestoreTools.pkg or Home Diagnostics. A CLI version of PurpleRestore is included (mobile_restore). Please note that this tool will not enable any internal debugging capabilities, jailbreak your device, or bypass activation on iCloud locked devices.
This tool can (and is meant to) handle multiple restores. When performing restores, PurpleRestore color coordinates the device in the table and when the device is about to receive the AppleLogo it will turn the background color of the screen to the color assigned to the device. Like iTunes, PurpleRestore communicates with devices using a usbmux connection.
As of 2018, Home Diagnostics includes both PurpleRestore 3 and AirSwitch, an application appearing to serve the same purpose as PurpleRestore's. It can be speculated PurpleRestore was left for legacy support.
PurpleRestore 3
PurpleRestore 3 is the latest known version of PurpleRestore. It was initially leaked on Twitter in October 2016. The update sports a redesigned user interface and icon, support for IPSW files, and revealed the existence of an internal PurpleRestore wiki, which most likely requires access to Apple's internal VPN. A 'Restore Issues' wiki is additionally provided.
The boot screen on the device doesn't turn purple when restoring with the tool without a debug UART cable, unlike previous versions of the tool. PurpleRestore 3 also has full macOS Sierra support, which was broken in most of the previous builds.
The updated utility also allows you to flash a custom boot logo. This likely requires authorization with TSS to personalize the IMG3/IMG4 before flashing the image to the device.
Restore Bundles
PurpleRestore uses 'Restore Bundles' which can be obtained from a server specific to versions of iOS, such as afp://fieldgoal.apple.com/RestoreImages/
and afp://endzone.apple.com/OldRestoreImages/
(among many others) . Unfortunately, these afp
servers can only be accessed through Apple's internal VPN. PurpleRestore is essentially useless to the general public, because it can only install currently signed iOS versions without having Apple VPN access.
You can create your own bundles by extracting an IPSW into a folder, and restore them if they are being signed; or if you have SHSH blobs saved for an A4 device (and below) then you can either stitch or use TinyUmbrella to assist in a downgrade without the need for iTunes; you will still need to put your device into pwned DFU Mode.
As of PurpleRestore 3, an IPSW may be used in place of a restore bundle.
Restore Components
Restore Components has several options:
- Restore Bundle: Specify the bundle to use in restoring
- Firmware Directory: Specify the folder where the LLB, iBoot, etc. IMG3/IMG4 files are located.
- Ramdisk Image: Specify a ramdisk to be used (i.e. restore or update ramdisk)
- DFU: Specify what tools to upload based on a selection of 'Debug', 'Development', or 'Release'. A specific file can also be selected.
Restore Operations
Restore Operations contains the most options to configure. These may also be the most useful ones.
- Hardware Readiness
- Minimum Battery Charge (mV): This value controls the minimum charge level at which the restore will be allowed to continue. Below this threshold, we either wait to charge (if we're charging) or fail (if we're not charging). If this option is not specified, a default value is used (currently 3.8 V). Setting this option to 0 bypasses all battery level checks.
- Wait for Minimum Charge: If the current voltage is below the minimum level, then the default behavior is to let the device charge and then continue. This option overrides that behavior when false.
- Wait for Storage Device: Controls whether the restore waits for the storage device /dev/disk0 to be available before the restore is initiated.
- Allow Untethered Restore: Permit the restore to run untethered (not connected to a host). The result of specifying this option when the restore needs data from the host (for instance, when flashing NOR) is undefined (but probably bad). If this option is specified and the device remains tethered, things should proceed as usual.
- Storage Media
- Use LwVM: Controls whether the device is formatted for LwVM (if supported).
- Repartition: Controls whether a new partition map is created on the device.
- System Partition Size (MiB): Specifies the size (in mebibytes) that is desired for the system partition. Because the partition size can only be changed when creating a new partition map, this option is only relevant when used in conjunction with repartition. A size of 0 indicates that the restore library should choose a suitable size for you, based on the specific restore bundle and image being used if possible.
- Content Protection Type: Controls the type of data protection used on the device.
- Low-Level Erase: Do a low level erase (wipe with null or random data) of the entire storage device prior to restoring.
- Restore System Partition
- System Image: Determines which type of system image to restore, or which file to use for the system image.
- Kernel Cache Type: This option controls the kernel cache that gets installed on the device.
- Baseband
- Update Baseband: Controls whether the baseband and baseband bootloader are updated as part of the restore.
- Force Update: The baseband update is skipped when the existing firmware matches the available firmware. In some cases, it is desirable to force the firmware update to occur, regardless of what is currently on there. This option, when set to true, forces the update to be attempted.
Restore OS
Restore OS options allow you to specify the following:
- Restore Boot-Args: Boot-Args used when the Restore OS is loaded. By default those arguments are used: 'debug=0x14e serial=3 rd=md0 nand-enable-reformat=1 -progress'
- Firmware Type: Specify the firmware which should be flashed when restoring. This can either be 'Debug', 'Factory FA', 'Factory SA', 'Firmware Development' or 'Production'.
- Boot Image Type: Can be 'Internal', 'User or Internal', 'User' or 'Update'.
- Boot Kernel Cache: Specify whether the 'Production' or 'Development' kernel cache should be used.
Personalization Settings
As with iTunes, PurpleRestore can personalize builds for iOS devices (since recent Bootroms expect a valid APTicket). The tooltip for the 'Personalized Restore' checkbox reads 'Your ticket to the Orwellian cloud.' This may suggest that Apple developed TSS in part to control access to internal build variants (i.e. prevent leaks of 'interesting' builds of iOS), in addition to preventing production users from downgrading.
- Variants: 'A predefined combination of restore pieces.' The options are: 'Customer Install', 'Internal Debug', 'Internal Development', 'Internal Install', 'Internal Qualification', and 'Vendor install.'
- AppleConnect: Used to authenticate all restores for personalization. Interestingly, AppleConnect will allow members of the iOS Developer Program (including non-employees) to install public builds of iOS (latest current and beta). It's likely AppleConnect is also used to authenticate signing of internal builds using the public TSS server, should the device be on the whitelist.
Restore Settings
Restore Tools Pkg Files File
By default, PurpleRestore comes with three pre-made restore settings: 'Update Device', 'Erase Device', and 'Erase Device + Wipe NVRAM'. Those restore settings are property lists that define the options PurpleRestore will use when restoring a device.
- Update Device: Includes all internal development tools and updates flash and the baseband by default.
- Erase Device: Repartition the media and erase all data before restoring. Includes all internal development tools and updates flash and the baseband by default.
- Erase Device + Wipe NVRAM: Untested, however assumed to perform the same as 'Erase Device' while additionally clearing NVRAM variables. Only in more recent builds of PurpleRestore 3 is 'Erase Device + Wipe NVRAM' available.
Problems
There are some problems with the leaked versions, because they may not support current devices or iOS versions.
PurpleRestore
One problem on older versions of PurpleRestore (common) is getting stuck at 'Executing iBEC to bootstrap update'. This is likely a signing error; the device may have rejected the iBEC image due to an invalid or missing APTicket, trying to use AppleConnect, the TSS server is no longer accepting signatures for the version you are installing, or the nonce has been mismatched.
Another problem can be encountered when a device is in DFU Mode; the tool will send the DFU image, and the iDevice will repeatedly disconnect and reconnect.
If you check 'Allow baseband roll-backs', disable 'Allow AppleConnect', and uncheck using of LwVM under Editor, selecting Personalized IPSW will cause PurpleRestore to freeze on 'Waiting for device' and creates another session with 'IDLE' status. If you then try to select that new session and try the same settings, it starts the restore process and successfully restore the IPSW to device.
Versions older than PurpleRestore 3 do not support A7+ devices, due to many changes in newer architectures, BootROM, etc.
PurpleRestore 3
PurpleRestore 3 also is supposed to have icons for each device plugged in, but some devices (including iPhones) don't have icons; they are replaced with a grey question mark.
Older versions of PurpleRestore 3 can not usually restore newer software such as iOS 11 and up natively. However, this can be resolved by replacing MobileDevice.framework
in PurpleRestore 3.app
with the latest one (which you can grab from /System/Library/PrivateFrameworks/MobileDevice.framework
.
See Also
Restoretools Pkg Files Download
- ORIGINAL: aa006 Hi, I am trying to package any application. MSI works fine under ' Administrators Privilege ' but when i click on application under ' users' account it try to ' Gathering required information ' few times before it actually opens the application everything i logins.
- For information about how to determine the Windows Installer version, see Determining the Windows Installer Version. For a list of changes in each of the Windows Installer versions, see What's New in Windows Installer. For information about obtaining the latest Windows Installer redistributable, see Windows Installer Redistributables.
Dec 24, 2009 We get this same message if I try to remove it, install it again, or use Clean Wipe to remove it. I think it might have something to do with the Windows Installer but could us some advice before I go any further. Any help would be appreciated, Phil C.
The table in this topic identifies the released versions of the Windows Installer. For more information, see Operating System Property Values.
Release | Version | Description |
---|---|---|
Windows Installer 2.0 | 2.0.2600.0 | Released with Windows XP. |
Windows Installer 2.0 | 2.0.2600.1 | Released with Windows 2000 Server with Service Pack 3 (SP3). |
Windows Installer 2.0 | 2.0.2600.1183 | Released with Windows 2000 Server with Service Pack 4 (SP4). |
Windows Installer 2.0 | 2.0.2600.2 | Released as a redistributable. |
Windows Installer 2.0 | 2.0.2600.1106 | Released with Windows XP with Service Pack 1 (SP1). |
Windows Installer 2.0 | 2.0.3790.0 | Released with Windows Server 2003. |
Windows Installer 3.0 | 3.0.3790.2180 | Released with Windows XP with Service Pack 2 (SP2). Released as a redistributable. |
Windows Installer 3.1 | 3.1.4000.1823 | Released as a redistributable. This version is has the same functionality as version 3.1.4000.2435. |
Windows Installer 3.1 | 3.1.4000.1830 | Released with Windows Server 2003 with Service Pack 1 (SP1) and Windows XP Professional x64 Edition. Update this version to version 3.1.4000.2435 to address the issue discussed in KB898628. |
Windows Installer 3.1 | 3.1.4000.3959 | Released with Windows Server 2003 with Service Pack 2 (SP2). |
Windows Installer 3.1 | 3.1.4000.2435 | Released with a fix to address the issue discussed in KB898628. This is the latest version of Windows Installer 3.1. |
Windows Installer 3.1 | 3.1.4001.5512 | Released with Windows XP with Service Pack 3 (SP3). |
Windows Installer 4.0 | 4.0.6000.16386 | Released with Windows Vista. |
Windows Installer 4.0 | 4.0.6001.18000 | Released with Windows Vista with Service Pack 1 (SP1) and Windows Server 2008. |
Windows Installer 4.5 | 4.5.6002.18005 | Released with Windows Vista with Service Pack 2 (SP2) and Windows Server 2008 with Service Pack (SP2.) |
Windows Installer 4.5 | 4.5.6000.20817 | Released as a redistributable for Windows Vista. |
Windows Installer 4.5 | 4.5.6001.22162 | Released as a redistributable for Windows Server 2008 and Windows Vista with SP1. |
Windows Installer 4.5 | 4.5.6001.22159 | Released as a redistributable for Windows XP with Service Pack 2 (SP2) and later, and Windows Server 2003 with SP1 and later. |
Windows Installer 5.0 | 5.0.7600.16385 or greater | Released with Windows Server 2008 R2 and later and Windows 7 and later. |
Windows Server 2012 or Windows 8 comes with Windows Installer 5.0.
For information about how to determine the Windows Installer version, see Determining the Windows Installer Version.
For a list of changes in each of the Windows Installer versions, see What's New in Windows Installer.
For information about obtaining the latest Windows Installer redistributable, see Windows Installer Redistributables.
-->Original KB number: 2643974
Symptoms
Windows Installer Hangs Gathering Required Information Center
When you start Microsoft Outlook 2013, you receive the following message:
Please wait while Windows configures Microsoft Office 64-bit Components 2013
Note
The message disappears after a time, and Outlook starts. However, you continue to receive the message whenever you start Outlook.
Cause
This issue occurs when the following conditions are true:
- The 32-bit version of Office is installed on a 64-bit version of the operating system.
- The Windows Search Service isn't installed.
Resolution
To resolve this issue, install the Windows Search Service. To do this, following the steps that are appropriate for your version of Windows.
Windows 7 and Windows 8
- Close Outlook.
- Start Control Panel.
- Click Programs and Features > Turn Windows features on or off.
- Enable Windows Search, and then click OK.
- Restart the computer if you're prompted to do this.
Windows Server 2012
Windows Installer Hangs Gathering Required Information For Kids
- Start Server Manager.
- Click Manage > Add Roles and Features.
- On the Before You Begin page, click Next.
- On the Installation Type page, select Role-based or Feature-based Installation, and then click Next.
- On the Server Selection page, select the server or virtual hard disk on which you want to install the Windows Search Service.
- On the Features page, select Windows Search Service, and then click Next.
- On the Confirmation page, verify that Windows Search Service is listed, and then click Install.
Windows Server 2008
Windows Installer Hangs Gathering Required Information For Free
- Start Server Manager.
- Click Roles in the left navigation pane.
- Click Add Roles in the Roles Summary pane.
- On the Server Roles page, select the File Services role, and then click Next.
- On the Role Services page, select the Windows Search Service role service, and then click Next.
- On the Confirmation page, verify that Windows Search Service is listed, and then click Install.
More information
How To Open .pkg Files
Windows Installer Hangs Gathering Required Information System
Restore Tools Pkg Files Download
If you prefer not to use or install the Windows Search Service, you can disable indexing in Outlook. To do this, follow these steps:
Exit Outlook.
Start Registry Editor. To do this, use one of the following procedures, as appropriate for your version of Windows.
- Windows 8: Press Windows Key + R to open a Run dialog box. Type regedit.exe and then press OK.
- Windows 7, Windows Server 2008, or Windows Server 2012: Click Start, type regedit.exe in the search box, and then press Enter.
In Registry Editor, locate and then click the following registry subkey:
HKEY_LOCAL_MACHINESOFTWAREPoliciesMicrosoftWindowsWindows Search
Point to New on the Edit menu, and then click DWORD (32-bit) Value.
Type PreventIndexingOutlook, and then press Enter.
Right-click PreventIndexingOutlook, and then click Modify.
In the Value data box, type 1, and then click OK.
On the File menu, click Exit to exit Registry Editor.