看到“生成 keybox.xml”,大概率都会联想到 PIF 和 Tricky Store。这里就不多解释它们的用途了。最近在网上看到生成非 AOSP keybox 的教程,在这里做一些补充,并将代码打包成一个 Python 脚本。
参考自:
- Idea 提供者:https://xdaforums.com/t/tee-hacking.4662185/page-21#post-89847987
(如果打不开或者被重定向去另一个网页可能要刷新几遍才能正确打开这个网页),该原始 Idea 需要借助一个密码学工具网站; - RSA 私钥转换:https://stackoverflow.com/questions/17733536/how-to-convert-a-private-key-to-an-rsa-private-key。
做出以下调整:
- 直接使用一站式脚本执行,自动利用 openssl 生成三个 PEM 文件,如果用于预检测的
openssl version
命令执行失败,自动尝试通过sudo apt-get install libssl-dev
进行安装; - 实现对新版 openssl 生成的 RSA 私钥进行识别,并从 PKCS8 转换为 PKCS1。
直接上 Python 代码,记得以 LF 形式保存换行符,并在 Ubuntu 24.04.1 LTS 中运行。
import os
try:
os.chdir(os.path.abspath(os.path.dirname(__file__)))
except:
pass
EXIT_SUCCESS = 0
EXIT_FAILURE = 1
EOF = (-1)
keyboxFormatter = """<?xml version="1.0"?>
<AndroidAttestation>
<NumberOfKeyboxes>1</NumberOfKeyboxes>
<Keybox DeviceID="YourDeviceID">
<Key algorithm="ecdsa">
<PrivateKey format="pem">
{0}</PrivateKey>
<CertificateChain>
<NumberOfCertificates>1</NumberOfCertificates>
<Certificate format="pem">
{1}</Certificate>
</CertificateChain>
</Key>
<Key algorithm="rsa">
<PrivateKey format="pem">
{2}</PrivateKey>
</Key>
</Keybox>
</AndroidAttestation>"""
def execute(commandline:str) -> int|None:
if isinstance(commandline, str):
print("$ " + commandline)
return os.system(commandline)
else:
return None
def handleOpenSSL(flag:bool = True) -> bool|None:
if isinstance(flag, bool):
errorLevel = execute("openssl version")
if EXIT_SUCCESS == errorLevel:
return True
elif flag: # can try again
execute("sudo apt-get install openssl libssl-dev")
return handleOpenSSL(False)
else:
return False
else:
return None
def pressTheEnterKeyToExit(errorLevel:int|None = None):
try:
print("Please press the enter key to exit ({0}). ".format(errorLevel) if isinstance(errorLevel, int) else "Please press the enter key to exit. ")
input()
except:
pass
def main() -> int:
# Parameters #
failureCount = 0
ecPrivateKeyFilePath = "ecPrivateKey.pem"
certificateFilePath = "certificate.pem"
rsaPrivateKeyFilePath = "rsaPrivateKey.pem"
oldRsaPrivateKeyFilePath = "oldRsaPrivateKey.pem"
keyboxFilePath = "keybox.xml"
# First-phase Generation #
failureCount += execute("openssl ecparam -name prime256v1 -genkey -noout -out \"{0}\"".format(ecPrivateKeyFilePath