forked from datatheorem/TrustKit
-
Notifications
You must be signed in to change notification settings - Fork 0
/
get_pin_from_certificate.py
97 lines (81 loc) · 3.86 KB
/
get_pin_from_certificate.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
#!/usr/bin/env python
"""Helper script to generate a TrustKit or HPKP pin from a PEM/DER certificate file.
"""
from __future__ import print_function
from subprocess import Popen, PIPE
from sys import stdin
import os.path
import argparse
import hashlib
import base64
import platform
import io
class SupportedKeyAlgorithmsEnum(object):
RSA_2048 = 1
RSA_4096 = 2
ECDSA_SECP256R1 = 3
ECDSA_SECP384R1 = 4
if __name__ == '__main__':
# Parse the command line
parser = argparse.ArgumentParser(description='Generate HPKP / TrustKit SSL Pins.')
parser.add_argument('certificate', metavar='FILE', nargs='?', help='certificate file to read, if empty, stdin is used')
parser.add_argument('--type', dest='type', action='store', default='PEM',
help='Certificate file type; "PEM" (default) or "DER".')
args = parser.parse_args()
if not args.certificate:
certificate = stdin.read()
elif os.path.isfile(args.certificate):
with io.open(args.certificate, 'rb') as certFile:
certificate = certFile.read()
else:
raise ValueError('Could not open certificate file {}'.format(args.certificate))
if args.type not in ['DER', 'PEM']:
raise ValueError('Invalid certificate type {}; expected DER or PEM'.format(args.type))
# Parse the certificate and print its information
p1 = Popen('openssl x509 -inform {} -text -noout'.format(args.type), shell=True, stdin=PIPE, stdout=PIPE)
certificate_txt = p1.communicate(input=certificate)[0].decode('utf-8')
print('\nCERTIFICATE INFO\n----------------')
p1 = Popen('openssl x509 -subject -issuer -fingerprint -sha1 -noout -inform {}'.format(
args.type), shell=True, stdin=PIPE, stdout=PIPE)
print(p1.communicate(input=certificate)[0])
# Extract the certificate key's algorithm
# Tested on the output of OpenSSL 0.9.8zh and OpenSSL 1.0.2i
alg_txt = certificate_txt.split('Public Key Algorithm:')[1].split('\n')[0].strip()
key_algorithm = None
if alg_txt == 'id-ecPublicKey':
if 'prime256v1' in certificate_txt:
key_algorithm = SupportedKeyAlgorithmsEnum.ECDSA_SECP256R1
if 'secp384r1' in certificate_txt:
key_algorithm = SupportedKeyAlgorithmsEnum.ECDSA_SECP384R1
elif alg_txt == 'rsaEncryption':
if 'Key: (2048 bit)' in certificate_txt:
key_algorithm = SupportedKeyAlgorithmsEnum.RSA_2048
elif 'Key: (4096 bit)' in certificate_txt:
key_algorithm = SupportedKeyAlgorithmsEnum.RSA_4096
if key_algorithm is None:
raise ValueError('Error: Certificate key algorithm not supported: {}.'.format(alg_txt))
# Generate the Subject Public Key Info hash
if key_algorithm == SupportedKeyAlgorithmsEnum.ECDSA_SECP256R1:
# The OpenSSL command is different for ECDSA secp256
openssl_alg = 'ec'
elif key_algorithm == SupportedKeyAlgorithmsEnum.ECDSA_SECP384R1:
# The OpenSSL command is different for ECDSA secp384
openssl_alg = 'ec'
elif key_algorithm == SupportedKeyAlgorithmsEnum.RSA_2048:
openssl_alg = 'rsa'
elif key_algorithm == SupportedKeyAlgorithmsEnum.RSA_4096:
openssl_alg = 'rsa'
else:
raise ValueError('Unexpected key algorithm')
if platform.system() == 'Windows':
cmd_redirects = '2>nul'
else:
cmd_redirects = '-in /dev/stdin 2>/dev/null'
p1 = Popen('openssl x509 -pubkey -noout -inform {} '
'| openssl {} -outform DER -pubin {}'.format(args.type, openssl_alg, cmd_redirects),
shell=True, stdin=PIPE, stdout=PIPE)
spki = p1.communicate(input=certificate)[0]
spki_hash = hashlib.sha256(spki).digest()
hpkp_pin = base64.b64encode(spki_hash)
print('\nTRUSTKIT CONFIGURATION\n----------------------')
print('kTSKPublicKeyHashes: @[@"{}"] // You will also need to configure a backup pin'.format(hpkp_pin))