blob: fb0a02fdd3b6684a943625d30c781cf5519a5113 [file] [log] [blame]
#!/usr/bin/env python
# Copyright 2017 The Chromium Authors
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
"""Generates a variety of chains where the target certificate varies in its key
type and key usages."""
import sys
sys.path += ['../..']
import gencerts
# Self-signed root certificate (used as trust anchor).
root = gencerts.create_self_signed_root_certificate('Root')
# Intermediate certificate.
intermediate = gencerts.create_intermediate_certificate('Intermediate', root)
# Use either an RSA key, or an EC key for the target certificate. Generate the
# possible keys ahead of time so as not to duplicate the work.
KEYS = {
'rsa': gencerts.get_or_generate_rsa_key(
2048, gencerts.create_key_path('Target-rsa')),
'ec': gencerts.get_or_generate_ec_key(
'secp384r1', gencerts.create_key_path('Target-ec'))
};
KEY_USAGES = [ 'decipherOnly',
'digitalSignature',
'keyAgreement',
'keyEncipherment' ]
# The proper key usage depends on the key purpose (serverAuth in this case),
# and the key type. Generate a variety of combinations.
for key_type in sorted(KEYS.keys()):
for key_usage in KEY_USAGES:
# Target certificate.
target = gencerts.create_end_entity_certificate('Target', intermediate)
target.get_extensions().set_property('extendedKeyUsage', 'serverAuth')
target.get_extensions().set_property('keyUsage',
'critical,%s' % (key_usage))
# Set the key.
target.set_key(KEYS[key_type])
# Write the chain.
chain = [target, intermediate, root]
description = ('Certificate chain where the target certificate uses a %s '
'key and has the single key usage %s') % (key_type.upper(),
key_usage)
gencerts.write_chain(description, chain,
'%s-%s.pem' % (key_type, key_usage))