]> git.proxmox.com Git - mirror_edk2.git/blame - BaseTools/Source/Python/Rsa2048Sha256Sign/Rsa2048Sha256GenerateKeys.py
BaseTools: Update argparse arguments since it not have version now
[mirror_edk2.git] / BaseTools / Source / Python / Rsa2048Sha256Sign / Rsa2048Sha256GenerateKeys.py
CommitLineData
65ce860e 1## @file\r
f7496d71
LG
2# This tool can be used to generate new RSA 2048 bit private/public key pairs\r
3# in a PEM file format using OpenSSL command line utilities that are installed\r
65ce860e 4# on the path specified by the system environment variable OPENSSL_PATH.\r
f7496d71
LG
5# This tool can also optionally write one or more SHA 256 hashes of 2048 bit\r
6# public keys to a binary file, write one or more SHA 256 hashes of 2048 bit\r
7# public keys to a file in a C structure format, and in verbose mode display\r
8# one or more SHA 256 hashes of 2048 bit public keys in a C structure format\r
65ce860e
MK
9# on STDOUT.\r
10# This tool has been tested with OpenSSL 1.0.1e 11 Feb 2013\r
11#\r
128d435f 12# Copyright (c) 2013 - 2018, Intel Corporation. All rights reserved.<BR>\r
65ce860e
MK
13# This program and the accompanying materials\r
14# are licensed and made available under the terms and conditions of the BSD License\r
15# which accompanies this distribution. The full text of the license may be found at\r
16# http://opensource.org/licenses/bsd-license.php\r
17#\r
18# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,\r
19# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.\r
20#\r
21\r
22'''\r
23Rsa2048Sha256GenerateKeys\r
24'''\r
25\r
26import os\r
27import sys\r
f7496d71 28import argparse\r
65ce860e 29import subprocess\r
c9df168f
MK
30from Common.BuildVersion import gBUILD_VERSION\r
31\r
32#\r
33# Globals for help information\r
34#\r
35__prog__ = 'Rsa2048Sha256GenerateKeys'\r
36__version__ = '%s Version %s' % (__prog__, '0.9 ' + gBUILD_VERSION)\r
f7496d71 37__copyright__ = 'Copyright (c) 2013 - 2018, Intel Corporation. All rights reserved.'\r
c9df168f
MK
38__usage__ = '%s [options]' % (__prog__)\r
39\r
65ce860e
MK
40\r
41if __name__ == '__main__':\r
65ce860e
MK
42 #\r
43 # Create command line argument parser object\r
f7496d71 44 #\r
60dc40db 45 parser = argparse.ArgumentParser(prog=__prog__, usage=__usage__, description=__copyright__, conflict_handler='resolve')\r
65ce860e 46 group = parser.add_mutually_exclusive_group(required=True)\r
60dc40db 47 group.add_argument("--version", action='version', version=__version__)\r
65ce860e
MK
48 group.add_argument("-o", "--output", dest='OutputFile', type=argparse.FileType('wb'), metavar='filename', nargs='*', help="specify the output private key filename in PEM format")\r
49 group.add_argument("-i", "--input", dest='InputFile', type=argparse.FileType('rb'), metavar='filename', nargs='*', help="specify the input private key filename in PEM format")\r
50 parser.add_argument("--public-key-hash", dest='PublicKeyHashFile', type=argparse.FileType('wb'), help="specify the public key hash filename that is SHA 256 hash of 2048 bit RSA public key in binary format")\r
51 parser.add_argument("--public-key-hash-c", dest='PublicKeyHashCFile', type=argparse.FileType('wb'), help="specify the public key hash filename that is SHA 256 hash of 2048 bit RSA public key in C structure format")\r
52 parser.add_argument("-v", "--verbose", dest='Verbose', action="store_true", help="increase output messages")\r
53 parser.add_argument("-q", "--quiet", dest='Quiet', action="store_true", help="reduce output messages")\r
ccaa7754 54 parser.add_argument("--debug", dest='Debug', type=int, metavar='[0-9]', choices=range(0, 10), default=0, help="set debug level")\r
65ce860e
MK
55\r
56 #\r
57 # Parse command line arguments\r
f7496d71 58 #\r
65ce860e
MK
59 args = parser.parse_args()\r
60\r
61 #\r
62 # Generate file path to Open SSL command\r
63 #\r
64 OpenSslCommand = 'openssl'\r
65 try:\r
66 OpenSslPath = os.environ['OPENSSL_PATH']\r
67 OpenSslCommand = os.path.join(OpenSslPath, OpenSslCommand)\r
fcdb928a
YZ
68 if ' ' in OpenSslCommand:\r
69 OpenSslCommand = '"' + OpenSslCommand + '"'\r
65ce860e
MK
70 except:\r
71 pass\r
72\r
73 #\r
74 # Verify that Open SSL command is available\r
75 #\r
76 try:\r
8a0933f4 77 Process = subprocess.Popen('%s version' % (OpenSslCommand), stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True)\r
f7496d71 78 except:\r
72443dd2 79 print('ERROR: Open SSL command not available. Please verify PATH or set OPENSSL_PATH')\r
65ce860e 80 sys.exit(1)\r
f7496d71 81\r
65ce860e 82 Version = Process.communicate()\r
87d2afd0 83 if Process.returncode != 0:\r
72443dd2 84 print('ERROR: Open SSL command not available. Please verify PATH or set OPENSSL_PATH')\r
65ce860e 85 sys.exit(Process.returncode)\r
86e6cf98 86 print(Version[0].decode())\r
f7496d71 87\r
65ce860e 88 args.PemFileName = []\r
f7496d71 89\r
65ce860e
MK
90 #\r
91 # Check for output file argument\r
92 #\r
128d435f 93 if args.OutputFile is not None:\r
65ce860e
MK
94 for Item in args.OutputFile:\r
95 #\r
96 # Save PEM filename and close output file\r
97 #\r
98 args.PemFileName.append(Item.name)\r
99 Item.close()\r
100\r
101 #\r
102 # Generate private key and save it to output file in a PEM file format\r
103 #\r
a5f26fef 104 Process = subprocess.Popen('%s genrsa -out %s 2048' % (OpenSslCommand, Item.name), stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True)\r
65ce860e 105 Process.communicate()\r
87d2afd0 106 if Process.returncode != 0:\r
72443dd2 107 print('ERROR: RSA 2048 key generation failed')\r
65ce860e 108 sys.exit(Process.returncode)\r
f7496d71 109\r
65ce860e
MK
110 #\r
111 # Check for input file argument\r
112 #\r
128d435f 113 if args.InputFile is not None:\r
65ce860e
MK
114 for Item in args.InputFile:\r
115 #\r
116 # Save PEM filename and close input file\r
117 #\r
118 args.PemFileName.append(Item.name)\r
119 Item.close()\r
120\r
86e6cf98 121 PublicKeyHash = bytearray()\r
65ce860e
MK
122 for Item in args.PemFileName:\r
123 #\r
124 # Extract public key from private key into STDOUT\r
125 #\r
a5f26fef 126 Process = subprocess.Popen('%s rsa -in %s -modulus -noout' % (OpenSslCommand, Item), stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True)\r
86e6cf98 127 PublicKeyHexString = Process.communicate()[0].split(b'=')[1].strip()\r
87d2afd0 128 if Process.returncode != 0:\r
72443dd2 129 print('ERROR: Unable to extract public key from private key')\r
65ce860e 130 sys.exit(Process.returncode)\r
86e6cf98 131 PublicKey = bytearray()\r
65ce860e 132 for Index in range (0, len(PublicKeyHexString), 2):\r
86e6cf98 133 PublicKey = PublicKey + PublicKeyHexString[Index:Index + 2]\r
65ce860e
MK
134\r
135 #\r
136 # Generate SHA 256 hash of RSA 2048 bit public key into STDOUT\r
137 #\r
a5f26fef 138 Process = subprocess.Popen('%s dgst -sha256 -binary' % (OpenSslCommand), stdin=subprocess.PIPE, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True)\r
65ce860e
MK
139 Process.stdin.write (PublicKey)\r
140 PublicKeyHash = PublicKeyHash + Process.communicate()[0]\r
87d2afd0 141 if Process.returncode != 0:\r
72443dd2 142 print('ERROR: Unable to extract SHA 256 hash of public key')\r
65ce860e
MK
143 sys.exit(Process.returncode)\r
144\r
145 #\r
146 # Write SHA 256 hash of 2048 bit binary public key to public key hash file\r
147 #\r
148 try:\r
149 args.PublicKeyHashFile.write (PublicKeyHash)\r
150 args.PublicKeyHashFile.close ()\r
151 except:\r
152 pass\r
153\r
154 #\r
155 # Convert public key hash to a C structure string\r
156 #\r
157 PublicKeyHashC = '{'\r
158 for Item in PublicKeyHash:\r
86e6cf98 159 PublicKeyHashC = PublicKeyHashC + '0x%02x, ' % (Item)\r
65ce860e 160 PublicKeyHashC = PublicKeyHashC[:-2] + '}'\r
f7496d71 161\r
65ce860e
MK
162 #\r
163 # Write SHA 256 of 2048 bit binary public key to public key hash C structure file\r
164 #\r
165 try:\r
86e6cf98 166 args.PublicKeyHashCFile.write (bytes(PublicKeyHashC))\r
65ce860e
MK
167 args.PublicKeyHashCFile.close ()\r
168 except:\r
169 pass\r
f7496d71 170\r
65ce860e
MK
171 #\r
172 # If verbose is enabled display the public key in C structure format\r
173 #\r
174 if args.Verbose:\r
72443dd2 175 print('PublicKeySha256 = ' + PublicKeyHashC)\r