├── README.md
├── keyboxGenerator.py
├── keyboxGenerator_v1.0.py
└── keyboxGenerator_v2.0.py
/README.md:
--------------------------------------------------------------------------------
1 | # keyboxGenerator
2 |
3 | The Python scripts here are used for generating Android keybox.xml for Tricky Store (a Magisk Module) on the Ubuntu 24.04.1 LTS platform (WSL).
4 |
5 | ## Acknowledgement
6 |
7 | 1) [https://xdaforums.com/t/tee-hacking.4662185/page-21#post-89847987](https://xdaforums.com/t/tee-hacking.4662185/page-21#post-89847987)
8 | 2) [https://stackoverflow.com/questions/17733536/how-to-convert-a-private-key-to-an-rsa-private-key](https://stackoverflow.com/questions/17733536/how-to-convert-a-private-key-to-an-rsa-private-key)
9 |
10 | ## Cautions
11 |
12 | Remember to store the script with Unix (LF) as the line separator.
13 |
14 | ## Versions
15 |
16 | ### v1.0
17 |
18 | This is the original version.
19 |
20 | ### v2.0
21 |
22 | Briefly checking the content of the three child key files is supported.
23 |
24 | Using ``ssh-keygen`` to convert an OpenSSL private key to the required RSA private key is supported.
25 |
26 | The program will prompt the overwriting if files exist.
27 |
28 | The device ID is generated randomly.
29 |
--------------------------------------------------------------------------------
/keyboxGenerator.py:
--------------------------------------------------------------------------------
1 | import os
2 | from random import randint, choice
3 | from base64 import b64decode
4 | try:
5 | os.chdir(os.path.abspath(os.path.dirname(__file__)))
6 | except:
7 | pass
8 | EXIT_SUCCESS = 0
9 | EXIT_FAILURE = 1
10 | EOF = (-1)
11 | LB = 2 # the lower bound of the length of the device ID
12 | UB = 12 # the upper bound of the length of the device ID
13 | CHARSET = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz"
14 | keyboxFormatter = """
15 |
16 | 1
17 |
18 |
19 |
20 | {1}
21 |
22 | 1
23 |
24 | {2}
25 |
26 |
27 |
28 |
29 | {3}
30 |
31 |
32 |
33 | """
34 |
35 |
36 | def canOverwrite(flags:list, idx:int, prompts:str|tuple|list|set) -> bool:
37 | if isinstance(flags, list) and isinstance(idx, int) and -len(flags) <= idx < len(flags) and isinstance(prompts, (str, tuple, list, set)):
38 | try:
39 | if isinstance(prompts, str):
40 | print("\"{0}\"".format(prompts))
41 | choice = input("The file mentioned above exists. Overwrite or not [aYn]? ")
42 | else:
43 | print(prompts)
44 | choice = input("At least one of the files mentioned above exists. Overwrite or not [aYn]? ")
45 | if choice.upper() == "A":
46 | for i in range((idx if idx >= 0 else len(flags) + idx), len(flags)): # overwirte the current file and all the following necessary files no matter whether they exist
47 | flags[i] = True
48 | return True
49 | elif choice.upper() == "N":
50 | return False
51 | else:
52 | flags[idx] = True
53 | return True
54 | except BaseException as e:
55 | print(e)
56 | return False
57 | else:
58 | input("#")
59 | return False
60 |
61 | def execute(commandline:str) -> int|None:
62 | if isinstance(commandline, str):
63 | print("$ " + commandline)
64 | return os.system(commandline)
65 | else:
66 | return None
67 |
68 | def handleOpenSSL(flag:bool = True) -> bool|None:
69 | if isinstance(flag, bool):
70 | errorLevel = execute("openssl version")
71 | if EXIT_SUCCESS == errorLevel:
72 | return True
73 | elif flag: # can try again
74 | execute("sudo apt-get install openssl libssl-dev")
75 | return handleOpenSSL(False)
76 | else:
77 | return False
78 | else:
79 | return None
80 |
81 | def pressTheEnterKeyToExit(errorLevel:int|None = None):
82 | try:
83 | print("Please press the enter key to exit ({0}). ".format(errorLevel) if isinstance(errorLevel, int) else "Please press the enter key to exit. ")
84 | input()
85 | except:
86 | pass
87 |
88 | def main() -> int:
89 | # Parameters #
90 | failureCount = 0
91 | deviceID = "".join([choice(CHARSET) for _ in range(randint(LB, UB))]) # or specify the device ID manually like "YourDeviceID"
92 | ecPrivateKeyFilePath = "ecPrivateKey.pem"
93 | certificateFilePath = "certificate.pem"
94 | rsaPrivateKeyFilePath = "rsaPrivateKey.pem"
95 | keyboxFilePath = "keybox.xml" # None for no files written
96 | flags = [not (os.path.isfile(ecPrivateKeyFilePath) or os.path.isfile(certificateFilePath)), not os.path.isfile(rsaPrivateKeyFilePath), not os.path.isfile(keyboxFilePath)]
97 |
98 | # First-phase Generation #
99 | if flags[0] or canOverwrite(flags, 0, (ecPrivateKeyFilePath, certificateFilePath)):
100 | failureCount += execute("openssl ecparam -name prime256v1 -genkey -noout -out \"{0}\"".format(ecPrivateKeyFilePath)) != 0
101 | if flags[0] or not os.path.isfile(certificateFilePath):
102 | failureCount += execute("openssl req -new -x509 -key \"{0}\" -out {1} -days 3650 -subj \"/CN=Keybox\"".format(ecPrivateKeyFilePath, certificateFilePath)) != 0
103 | if flags[1] or canOverwrite(flags, 1, rsaPrivateKeyFilePath):
104 | failureCount += execute("openssl genrsa -out \"{0}\" 2048".format(rsaPrivateKeyFilePath)) != 0
105 | if failureCount > 0:
106 | print("Cannot generate a sample ``keybox.xml`` file since {0} PEM file{1} not generated successfully. ".format(failureCount, ("s were" if failureCount > 1 else " was")))
107 | pressTheEnterKeyToExit(11)
108 | return 11
109 |
110 | # First-phase Reading #
111 | try:
112 | with open(ecPrivateKeyFilePath, "r", encoding = "utf-8") as f:
113 | ecPrivateKey = f.read()
114 | with open(certificateFilePath, "r", encoding = "utf-8") as f:
115 | certificate = f.read()
116 | with open(rsaPrivateKeyFilePath, "r", encoding = "utf-8") as f:
117 | rsaPrivateKey = f.read()
118 | except BaseException as e:
119 | print("Failed to read one or more of the PEM files. Details are as follows. \n{0}".format(e))
120 | pressTheEnterKeyToExit(12)
121 | return 12
122 |
123 | # Second-phase Generation #
124 | if flags[1]: # only updates the key content when the original key is newly generated or updating is allowed
125 | if rsaPrivateKey.startswith("-----BEGIN PRIVATE KEY-----") and rsaPrivateKey.rstrip().endswith("-----END PRIVATE KEY-----"):
126 | print("A newer openssl version is used. The RSA private key in the PKCS8 format will be converted to that in the PKCS1 format soon. ")
127 | failureCount += execute("openssl rsa -in \"{0}\" -out \"{0}\" -traditional".format(rsaPrivateKeyFilePath))
128 | if failureCount > 0:
129 | print("Cannot convert the RSA private key in the PKCS8 format to that in the PKCS1 format. ")
130 | pressTheEnterKeyToExit(13)
131 | return 13
132 | else:
133 | print("Finished converting the RSA private key in the PKCS8 format to that in the PKCS1 format. ")
134 | try:
135 | with open(rsaPrivateKeyFilePath, "r", encoding = "utf-8") as f:
136 | rsaPrivateKey = f.read()
137 | except BaseException as e:
138 | print("Failed to update the RSA private key from \"{0}\". Details are as follows. \n{1}".format(rsaPrivateKeyFilePath, e))
139 | pressTheEnterKeyToExit(14)
140 | return 14
141 | elif rsaPrivateKey.startswith("-----BEGIN OPENSSH PRIVATE KEY-----") and rsaPrivateKey.rstrip().endswith("-----END OPENSSH PRIVATE KEY-----"):
142 | print("An OpenSSL private key is detected, which will be converted to the RSA private key soon. ")
143 | failureCount += execute("ssh-keygen -p -m PEM -f \"{0}\" -N \"\"".format(rsaPrivateKeyFilePath))
144 | if failureCount > 0:
145 | print("Cannot convert the OpenSSL private key to the RSA private key. ")
146 | pressTheEnterKeyToExit(15)
147 | return 15
148 | else:
149 | print("Finished converting the OpenSSL private key to the RSA private key. ")
150 | try:
151 | with open(rsaPrivateKeyFilePath, "r", encoding = "utf-8") as f: # the ``ssh-keygen`` overwrites the file though no obvious output filepaths specified
152 | rsaPrivateKey = f.read()
153 | except BaseException as e:
154 | print("Failed to update the RSA private key from \"{0}\". Details are as follows. \n{1}".format(rsaPrivateKeyFilePath, e))
155 | pressTheEnterKeyToExit(16)
156 | return 16
157 |
158 | # Brief Checks #
159 | if not (ecPrivateKey.startswith("-----BEGIN EC PRIVATE KEY-----") and ecPrivateKey.rstrip().endswith("-----END EC PRIVATE KEY-----")):
160 | print("An invalid EC private key is detected. Please try to use the latest key generation tools to solve this issue. ")
161 | pressTheEnterKeyToExit(17)
162 | return 17
163 | if not (certificate.startswith("-----BEGIN CERTIFICATE-----") and certificate.rstrip().endswith("-----END CERTIFICATE-----")):
164 | print("An invalid certificate is detected. Please try to use the latest key generation tools to solve this issue. ")
165 | pressTheEnterKeyToExit(18)
166 | return 18
167 | if not (rsaPrivateKey.startswith("-----BEGIN RSA PRIVATE KEY-----") and rsaPrivateKey.rstrip().endswith("-----END RSA PRIVATE KEY-----")):
168 | print("An invalid final RSA private key is detected. Please try to use the latest key generation tools to solve this issue. ")
169 | pressTheEnterKeyToExit(19)
170 | return 19
171 |
172 | # Keybox Generation #
173 | keybox = keyboxFormatter.format(deviceID, ecPrivateKey, certificate, rsaPrivateKey)
174 | print("Generated keybox with a length of {0}: ".format(len(keybox)))
175 | print(keybox)
176 | if keyboxFilePath is not None and (flags[2] or canOverwrite(flags, 2, keyboxFilePath)):
177 | try:
178 | with open(keyboxFilePath, "w", encoding = "utf-8") as f:
179 | f.write(keybox)
180 | print("Successfully wrote the keybox to \"{0}\". ".format(keyboxFilePath))
181 | pressTheEnterKeyToExit(EXIT_SUCCESS)
182 | return EXIT_SUCCESS
183 | except BaseException as e:
184 | print("Failed to write the keybox to \"{0}\". Details are as follows. \n{1}".format(keyboxFilePath, e))
185 | pressTheEnterKeyToExit(20)
186 | return 20
187 | else:
188 | print("The keybox has not been written to any files. Please refer to the text above. ")
189 | pressTheEnterKeyToExit(EXIT_FAILURE)
190 | return EXIT_FAILURE
191 |
192 |
193 |
194 | if "__main__" == __name__:
195 | exit(main())
--------------------------------------------------------------------------------
/keyboxGenerator_v1.0.py:
--------------------------------------------------------------------------------
1 | import os
2 | try:
3 | os.chdir(os.path.abspath(os.path.dirname(__file__)))
4 | except:
5 | pass
6 | EXIT_SUCCESS = 0
7 | EXIT_FAILURE = 1
8 | EOF = (-1)
9 | keyboxFormatter = """
10 |
11 | 1
12 |
13 |
14 |
15 | {0}
16 |
17 | 1
18 |
19 | {1}
20 |
21 |
22 |
23 |
24 | {2}
25 |
26 |
27 | """
28 |
29 |
30 | def execute(commandline:str) -> int|None:
31 | if isinstance(commandline, str):
32 | print("$ " + commandline)
33 | return os.system(commandline)
34 | else:
35 | return None
36 |
37 | def handleOpenSSL(flag:bool = True) -> bool|None:
38 | if isinstance(flag, bool):
39 | errorLevel = execute("openssl version")
40 | if EXIT_SUCCESS == errorLevel:
41 | return True
42 | elif flag: # can try again
43 | execute("sudo apt-get install openssl libssl-dev")
44 | return handleOpenSSL(False)
45 | else:
46 | return False
47 | else:
48 | return None
49 |
50 | def pressTheEnterKeyToExit(errorLevel:int|None = None):
51 | try:
52 | print("Please press the enter key to exit ({0}). ".format(errorLevel) if isinstance(errorLevel, int) else "Please press the enter key to exit. ")
53 | input()
54 | except:
55 | pass
56 |
57 | def main() -> int:
58 | # Parameters #
59 | failureCount = 0
60 | ecPrivateKeyFilePath = "ecPrivateKey.pem"
61 | certificateFilePath = "certificate.pem"
62 | rsaPrivateKeyFilePath = "rsaPrivateKey.pem"
63 | oldRsaPrivateKeyFilePath = "oldRsaPrivateKey.pem"
64 | keyboxFilePath = "keybox.xml"
65 |
66 | # First-phase Generation #
67 | failureCount += execute("openssl ecparam -name prime256v1 -genkey -noout -out \"{0}\"".format(ecPrivateKeyFilePath)) != 0
68 | failureCount += execute("openssl req -new -x509 -key \"{0}\" -out {1} -days 3650 -subj \"/CN=Keybox\"".format(ecPrivateKeyFilePath, certificateFilePath)) != 0
69 | failureCount += execute("openssl genrsa -out \"{0}\" 2048".format(rsaPrivateKeyFilePath)) != 0
70 | if failureCount > 0:
71 | print("Cannot generate a sample ``keybox.xml`` file since {0} PEM file{1} not generated successfully. ".format(failureCount, ("s were" if failureCount > 1 else " was")))
72 | pressTheEnterKeyToExit(EOF)
73 | return EOF
74 |
75 | # First-phase Reading #
76 | try:
77 | with open(ecPrivateKeyFilePath, "r", encoding = "utf-8") as f:
78 | ecPrivateKey = f.read()
79 | with open(certificateFilePath, "r", encoding = "utf-8") as f:
80 | certificate = f.read()
81 | with open(rsaPrivateKeyFilePath, "r", encoding = "utf-8") as f:
82 | rsaPrivateKey = f.read()
83 | except BaseException as e:
84 | print("Failed to read one or more of the PEM files. Details are as follows. \n{0}".format(e))
85 | pressTheEnterKeyToExit(EOF)
86 | return EOF
87 |
88 | # Second-phase Generation #
89 | if rsaPrivateKey.startswith("-----BEGIN PRIVATE KEY-----"):
90 | print("A newer openssl version is used. The RSA private key in the PKCS8 format will be converted to that in the PKCS1 format soon. ")
91 | failureCount += execute("openssl rsa -in \"{0}\" -out \"{1}\" -traditional".format(rsaPrivateKeyFilePath, oldRsaPrivateKeyFilePath))
92 | if failureCount > 0:
93 | print("Cannot convert the RSA private key in the PKCS8 format to that in the PKCS1 format. ")
94 | pressTheEnterKeyToExit(EOF)
95 | return EOF
96 | else:
97 | print("Finished converting the RSA private key in the PKCS8 format to that in the PKCS1 format. ")
98 | try:
99 | with open(oldRsaPrivateKeyFilePath, "r", encoding = "utf-8") as f:
100 | rsaPrivateKey = f.read()
101 | except BaseException as e:
102 | print("Failed to update the RSA private key from \"{0}\". Details are as follows. \n{1}".format(oldRsaPrivateKeyFilePath, e))
103 | pressTheEnterKeyToExit(EOF)
104 | return EOF
105 |
106 | # Keybox Generation #
107 | keybox = keyboxFormatter.format(ecPrivateKey, certificate, rsaPrivateKey)
108 | print(keybox)
109 | try:
110 | with open(keyboxFilePath, "w", encoding = "utf-8") as f:
111 | f.write(keybox)
112 | print("Successfully wrote the keybox to \"{0}\". ".format(keyboxFilePath))
113 | pressTheEnterKeyToExit(EXIT_SUCCESS)
114 | return EXIT_SUCCESS
115 | except BaseException as e:
116 | print("Failed to write the keybox to \"{0}\". Details are as follows. \n{1}".format(keyboxFilePath, e))
117 | pressTheEnterKeyToExit(EXIT_FAILURE)
118 | return EXIT_FAILURE
119 |
120 |
121 |
122 | if "__main__" == __name__:
123 | exit(main())
--------------------------------------------------------------------------------
/keyboxGenerator_v2.0.py:
--------------------------------------------------------------------------------
1 | import os
2 | from random import randint, choice
3 | from base64 import b64decode
4 | try:
5 | os.chdir(os.path.abspath(os.path.dirname(__file__)))
6 | except:
7 | pass
8 | EXIT_SUCCESS = 0
9 | EXIT_FAILURE = 1
10 | EOF = (-1)
11 | LB = 2 # the lower bound of the length of the device ID
12 | UB = 12 # the upper bound of the length of the device ID
13 | CHARSET = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz"
14 | keyboxFormatter = """
15 |
16 | 1
17 |
18 |
19 |
20 | {1}
21 |
22 | 1
23 |
24 | {2}
25 |
26 |
27 |
28 |
29 | {3}
30 |
31 |
32 |
33 | """
34 |
35 |
36 | def canOverwrite(flags:list, idx:int, prompts:str|tuple|list|set) -> bool:
37 | if isinstance(flags, list) and isinstance(idx, int) and -len(flags) <= idx < len(flags) and isinstance(prompts, (str, tuple, list, set)):
38 | try:
39 | if isinstance(prompts, str):
40 | print("\"{0}\"".format(prompts))
41 | choice = input("The file mentioned above exists. Overwrite or not [aYn]? ")
42 | else:
43 | print(prompts)
44 | choice = input("At least one of the files mentioned above exists. Overwrite or not [aYn]? ")
45 | if choice.upper() == "A":
46 | for i in range((idx if idx >= 0 else len(flags) + idx), len(flags)): # overwirte the current file and all the following necessary files no matter whether they exist
47 | flags[i] = True
48 | return True
49 | elif choice.upper() == "N":
50 | return False
51 | else:
52 | flags[idx] = True
53 | return True
54 | except BaseException as e:
55 | print(e)
56 | return False
57 | else:
58 | input("#")
59 | return False
60 |
61 | def execute(commandline:str) -> int|None:
62 | if isinstance(commandline, str):
63 | print("$ " + commandline)
64 | return os.system(commandline)
65 | else:
66 | return None
67 |
68 | def handleOpenSSL(flag:bool = True) -> bool|None:
69 | if isinstance(flag, bool):
70 | errorLevel = execute("openssl version")
71 | if EXIT_SUCCESS == errorLevel:
72 | return True
73 | elif flag: # can try again
74 | execute("sudo apt-get install openssl libssl-dev")
75 | return handleOpenSSL(False)
76 | else:
77 | return False
78 | else:
79 | return None
80 |
81 | def pressTheEnterKeyToExit(errorLevel:int|None = None):
82 | try:
83 | print("Please press the enter key to exit ({0}). ".format(errorLevel) if isinstance(errorLevel, int) else "Please press the enter key to exit. ")
84 | input()
85 | except:
86 | pass
87 |
88 | def main() -> int:
89 | # Parameters #
90 | failureCount = 0
91 | deviceID = "".join([choice(CHARSET) for _ in range(randint(LB, UB))]) # or specify the device ID manually like "YourDeviceID"
92 | ecPrivateKeyFilePath = "ecPrivateKey.pem"
93 | certificateFilePath = "certificate.pem"
94 | rsaPrivateKeyFilePath = "rsaPrivateKey.pem"
95 | keyboxFilePath = "keybox.xml" # None for no files written
96 | flags = [not (os.path.isfile(ecPrivateKeyFilePath) or os.path.isfile(certificateFilePath)), not os.path.isfile(rsaPrivateKeyFilePath), not os.path.isfile(keyboxFilePath)]
97 |
98 | # First-phase Generation #
99 | if flags[0] or canOverwrite(flags, 0, (ecPrivateKeyFilePath, certificateFilePath)):
100 | failureCount += execute("openssl ecparam -name prime256v1 -genkey -noout -out \"{0}\"".format(ecPrivateKeyFilePath)) != 0
101 | if flags[0] or not os.path.isfile(certificateFilePath):
102 | failureCount += execute("openssl req -new -x509 -key \"{0}\" -out {1} -days 3650 -subj \"/CN=Keybox\"".format(ecPrivateKeyFilePath, certificateFilePath)) != 0
103 | if flags[1] or canOverwrite(flags, 1, rsaPrivateKeyFilePath):
104 | failureCount += execute("openssl genrsa -out \"{0}\" 2048".format(rsaPrivateKeyFilePath)) != 0
105 | if failureCount > 0:
106 | print("Cannot generate a sample ``keybox.xml`` file since {0} PEM file{1} not generated successfully. ".format(failureCount, ("s were" if failureCount > 1 else " was")))
107 | pressTheEnterKeyToExit(11)
108 | return 11
109 |
110 | # First-phase Reading #
111 | try:
112 | with open(ecPrivateKeyFilePath, "r", encoding = "utf-8") as f:
113 | ecPrivateKey = f.read()
114 | with open(certificateFilePath, "r", encoding = "utf-8") as f:
115 | certificate = f.read()
116 | with open(rsaPrivateKeyFilePath, "r", encoding = "utf-8") as f:
117 | rsaPrivateKey = f.read()
118 | except BaseException as e:
119 | print("Failed to read one or more of the PEM files. Details are as follows. \n{0}".format(e))
120 | pressTheEnterKeyToExit(12)
121 | return 12
122 |
123 | # Second-phase Generation #
124 | if flags[1]: # only updates the key content when the original key is newly generated or updating is allowed
125 | if rsaPrivateKey.startswith("-----BEGIN PRIVATE KEY-----") and rsaPrivateKey.rstrip().endswith("-----END PRIVATE KEY-----"):
126 | print("A newer openssl version is used. The RSA private key in the PKCS8 format will be converted to that in the PKCS1 format soon. ")
127 | failureCount += execute("openssl rsa -in \"{0}\" -out \"{0}\" -traditional".format(rsaPrivateKeyFilePath))
128 | if failureCount > 0:
129 | print("Cannot convert the RSA private key in the PKCS8 format to that in the PKCS1 format. ")
130 | pressTheEnterKeyToExit(13)
131 | return 13
132 | else:
133 | print("Finished converting the RSA private key in the PKCS8 format to that in the PKCS1 format. ")
134 | try:
135 | with open(rsaPrivateKeyFilePath, "r", encoding = "utf-8") as f:
136 | rsaPrivateKey = f.read()
137 | except BaseException as e:
138 | print("Failed to update the RSA private key from \"{0}\". Details are as follows. \n{1}".format(rsaPrivateKeyFilePath, e))
139 | pressTheEnterKeyToExit(14)
140 | return 14
141 | elif rsaPrivateKey.startswith("-----BEGIN OPENSSH PRIVATE KEY-----") and rsaPrivateKey.rstrip().endswith("-----END OPENSSH PRIVATE KEY-----"):
142 | print("An OpenSSL private key is detected, which will be converted to the RSA private key soon. ")
143 | failureCount += execute("ssh-keygen -p -m PEM -f \"{0}\" -N \"\"".format(rsaPrivateKeyFilePath))
144 | if failureCount > 0:
145 | print("Cannot convert the OpenSSL private key to the RSA private key. ")
146 | pressTheEnterKeyToExit(15)
147 | return 15
148 | else:
149 | print("Finished converting the OpenSSL private key to the RSA private key. ")
150 | try:
151 | with open(rsaPrivateKeyFilePath, "r", encoding = "utf-8") as f: # the ``ssh-keygen`` overwrites the file though no obvious output filepaths specified
152 | rsaPrivateKey = f.read()
153 | except BaseException as e:
154 | print("Failed to update the RSA private key from \"{0}\". Details are as follows. \n{1}".format(rsaPrivateKeyFilePath, e))
155 | pressTheEnterKeyToExit(16)
156 | return 16
157 |
158 | # Brief Checks #
159 | if not (ecPrivateKey.startswith("-----BEGIN EC PRIVATE KEY-----") and ecPrivateKey.rstrip().endswith("-----END EC PRIVATE KEY-----")):
160 | print("An invalid EC private key is detected. Please try to use the latest key generation tools to solve this issue. ")
161 | pressTheEnterKeyToExit(17)
162 | return 17
163 | if not (certificate.startswith("-----BEGIN CERTIFICATE-----") and certificate.rstrip().endswith("-----END CERTIFICATE-----")):
164 | print("An invalid certificate is detected. Please try to use the latest key generation tools to solve this issue. ")
165 | pressTheEnterKeyToExit(18)
166 | return 18
167 | if not (rsaPrivateKey.startswith("-----BEGIN RSA PRIVATE KEY-----") and rsaPrivateKey.rstrip().endswith("-----END RSA PRIVATE KEY-----")):
168 | print("An invalid final RSA private key is detected. Please try to use the latest key generation tools to solve this issue. ")
169 | pressTheEnterKeyToExit(19)
170 | return 19
171 |
172 | # Keybox Generation #
173 | keybox = keyboxFormatter.format(deviceID, ecPrivateKey, certificate, rsaPrivateKey)
174 | print("Generated keybox with a length of {0}: ".format(len(keybox)))
175 | print(keybox)
176 | if keyboxFilePath is not None and (flags[2] or canOverwrite(flags, 2, keyboxFilePath)):
177 | try:
178 | with open(keyboxFilePath, "w", encoding = "utf-8") as f:
179 | f.write(keybox)
180 | print("Successfully wrote the keybox to \"{0}\". ".format(keyboxFilePath))
181 | pressTheEnterKeyToExit(EXIT_SUCCESS)
182 | return EXIT_SUCCESS
183 | except BaseException as e:
184 | print("Failed to write the keybox to \"{0}\". Details are as follows. \n{1}".format(keyboxFilePath, e))
185 | pressTheEnterKeyToExit(20)
186 | return 20
187 | else:
188 | print("The keybox has not been written to any files. Please refer to the text above. ")
189 | pressTheEnterKeyToExit(EXIT_FAILURE)
190 | return EXIT_FAILURE
191 |
192 |
193 |
194 | if "__main__" == __name__:
195 | exit(main())
--------------------------------------------------------------------------------