mirror of
				https://github.com/espressif/esp-idf.git
				synced 2025-11-04 09:01:40 +01:00 
			
		
		
		
	
		
			
				
	
	
		
			153 lines
		
	
	
		
			5.8 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
			
		
		
	
	
			153 lines
		
	
	
		
			5.8 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
# SPDX-FileCopyrightText: 2023 Espressif Systems (Shanghai) CO LTD
 | 
						|
# SPDX-License-Identifier: Unlicense OR CC0-1.0
 | 
						|
 | 
						|
import argparse
 | 
						|
import datetime
 | 
						|
import os
 | 
						|
 | 
						|
from cryptography import x509
 | 
						|
from cryptography.hazmat.backends import default_backend
 | 
						|
from cryptography.hazmat.primitives import hashes, serialization
 | 
						|
from cryptography.hazmat.primitives.asymmetric import ec, rsa
 | 
						|
from cryptography.hazmat.primitives.serialization import Encoding, NoEncryption, PrivateFormat
 | 
						|
from cryptography.x509.oid import ExtendedKeyUsageOID
 | 
						|
 | 
						|
CERT_KEYS = ['2048', '4096', '3072', 'p384']
 | 
						|
CERT_EXPIRY_DAYS = 3650
 | 
						|
 | 
						|
 | 
						|
class GenCerts:
 | 
						|
    def __init__(self, cert_type: str, message_digest: str, file_path: str) -> None:
 | 
						|
        self.cert_type = cert_type
 | 
						|
        self.message_digest = message_digest
 | 
						|
        self.file_path = file_path
 | 
						|
        self.digest = hashes.SHA256()
 | 
						|
        self.init_param()
 | 
						|
 | 
						|
    def init_param(self) -> None:
 | 
						|
 | 
						|
        if self.message_digest == 'sha256':
 | 
						|
            self.digest = hashes.SHA256()
 | 
						|
        else:
 | 
						|
            self.digest = hashes.SHA384()
 | 
						|
 | 
						|
    def generate_ca_certificate(self) -> None:
 | 
						|
 | 
						|
        if self.cert_type == 'p384':
 | 
						|
            private_key = ec.generate_private_key(
 | 
						|
                ec.SECP384R1(),
 | 
						|
                default_backend()
 | 
						|
            )
 | 
						|
        else:
 | 
						|
            private_key = rsa.generate_private_key(
 | 
						|
                public_exponent=65537,
 | 
						|
                key_size=int(self.cert_type)
 | 
						|
            )
 | 
						|
 | 
						|
        public_key = private_key.public_key()
 | 
						|
        subject = issuer = x509.Name([
 | 
						|
            x509.NameAttribute(x509.NameOID.COMMON_NAME, 'example root CA')
 | 
						|
        ])
 | 
						|
 | 
						|
        ca_crt_builder = (
 | 
						|
            x509.CertificateBuilder()
 | 
						|
            .subject_name(subject)
 | 
						|
            .issuer_name(issuer).public_key(public_key)
 | 
						|
            .serial_number(x509.random_serial_number())
 | 
						|
            .not_valid_before(datetime.datetime.utcnow())
 | 
						|
            .not_valid_after(datetime.datetime.utcnow() + datetime.timedelta(days=CERT_EXPIRY_DAYS))
 | 
						|
            .add_extension(x509.BasicConstraints(ca=True, path_length=None), critical=True)
 | 
						|
            .add_extension(x509.SubjectKeyIdentifier.from_public_key(public_key), critical=False)
 | 
						|
        )
 | 
						|
 | 
						|
        self.certificate = ca_crt_builder.sign(private_key, self.digest)
 | 
						|
 | 
						|
        self.ca_pem = os.path.join(self.file_path, 'ca.pem')
 | 
						|
        self.ca_key = os.path.join(self.file_path, 'ca.key')
 | 
						|
        with open(self.ca_pem, 'wb') as f:
 | 
						|
            f.write(self.certificate.public_bytes(Encoding.PEM))
 | 
						|
        with open(self.ca_key, 'wb') as f:
 | 
						|
            f.write(private_key.private_bytes(
 | 
						|
                encoding=Encoding.PEM,
 | 
						|
                format=PrivateFormat.TraditionalOpenSSL,
 | 
						|
                encryption_algorithm=NoEncryption()
 | 
						|
            ))
 | 
						|
 | 
						|
    def generate_user_certificate(self, role: str) -> None:
 | 
						|
 | 
						|
        if role == 'server':
 | 
						|
            key_usage = [ExtendedKeyUsageOID.SERVER_AUTH]
 | 
						|
        elif role == 'client':
 | 
						|
            key_usage = [ExtendedKeyUsageOID.CLIENT_AUTH]
 | 
						|
 | 
						|
        with open(self.ca_key, 'rb') as f:
 | 
						|
            ca_key = serialization.load_pem_private_key(f.read(), password=None)
 | 
						|
        with open(self.ca_pem, 'rb') as f:
 | 
						|
            ca_cert = x509.load_pem_x509_certificate(f.read())
 | 
						|
 | 
						|
        if self.cert_type == 'p384':
 | 
						|
            user_private_key = ec.generate_private_key(
 | 
						|
                ec.SECP384R1(),
 | 
						|
                default_backend()
 | 
						|
            )
 | 
						|
        else:
 | 
						|
            user_private_key = rsa.generate_private_key(
 | 
						|
                public_exponent=65537,
 | 
						|
                key_size=int(self.cert_type)
 | 
						|
            )
 | 
						|
 | 
						|
        user_key = os.path.join(self.file_path, f'{role}.key')
 | 
						|
        with open(user_key, 'wb') as f:
 | 
						|
            f.write(user_private_key.private_bytes(
 | 
						|
                encoding=Encoding.PEM,
 | 
						|
                format=PrivateFormat.TraditionalOpenSSL,
 | 
						|
                encryption_algorithm=NoEncryption()
 | 
						|
            ))
 | 
						|
 | 
						|
        subject = x509.Name([
 | 
						|
            x509.NameAttribute(x509.NameOID.COMMON_NAME, role)
 | 
						|
        ])
 | 
						|
 | 
						|
        user_csr = x509.CertificateSigningRequestBuilder().subject_name(
 | 
						|
            subject
 | 
						|
        ).sign(user_private_key, self.digest)
 | 
						|
 | 
						|
        user_crt_builder = (
 | 
						|
            x509.CertificateBuilder()
 | 
						|
            .subject_name(user_csr.subject)
 | 
						|
            .issuer_name(ca_cert.subject)
 | 
						|
            .public_key(user_csr.public_key())
 | 
						|
            .serial_number(x509.random_serial_number())
 | 
						|
            .not_valid_before(datetime.datetime.utcnow())
 | 
						|
            .not_valid_after(datetime.datetime.utcnow() + datetime.timedelta(days=CERT_EXPIRY_DAYS))
 | 
						|
            .add_extension(x509.BasicConstraints(ca=False, path_length=None), critical=False)
 | 
						|
            .add_extension(x509.ExtendedKeyUsage(key_usage), critical=False)
 | 
						|
            .add_extension(x509.SubjectKeyIdentifier.from_public_key(user_csr.public_key()), critical=False)
 | 
						|
        )
 | 
						|
        user_crt = user_crt_builder.sign(ca_key, self.digest)
 | 
						|
 | 
						|
        user_pem = os.path.join(self.file_path, f'{role}.pem')
 | 
						|
        user_cert = os.path.join(self.file_path, f'{role}.crt')
 | 
						|
        with open(user_pem, 'wb') as f:
 | 
						|
            f.write(user_crt.public_bytes(Encoding.PEM))
 | 
						|
        with open(user_cert, 'wb') as f:
 | 
						|
            f.write(user_crt.public_bytes(Encoding.PEM))
 | 
						|
 | 
						|
 | 
						|
def main() -> None:
 | 
						|
 | 
						|
    parser = argparse.ArgumentParser()
 | 
						|
    parser.add_argument('cert_type', choices=['2048', '3072', '4096', 'p384'], help='select cert type')
 | 
						|
    parser.add_argument('message_digest', choices=['sha256', 'sha384'], help='select message digest, suiteB should be sha384')
 | 
						|
    file_path = os.path.dirname(__file__)
 | 
						|
    parser.add_argument('--output', '-o', default=file_path, help='path to store certificates')
 | 
						|
    args = parser.parse_args()
 | 
						|
    gencerts = GenCerts(args.cert_type, args.message_digest, args.output)
 | 
						|
    gencerts.generate_ca_certificate()
 | 
						|
    gencerts.generate_user_certificate('server')
 | 
						|
    gencerts.generate_user_certificate('client')
 | 
						|
 | 
						|
 | 
						|
if __name__ == '__main__':
 | 
						|
    main()
 |