123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143 |
- #!/bin/sh
- digest='-sha1'
- reqcmd="../util/shlib_wrap.sh ../apps/openssl req"
- x509cmd="../util/shlib_wrap.sh ../apps/openssl x509 $digest"
- verifycmd="../util/shlib_wrap.sh ../apps/openssl verify"
- dummycnf="../apps/openssl.cnf"
- CAkey="keyCA.ss"
- CAcert="certCA.ss"
- CAserial="certCA.srl"
- CAreq="reqCA.ss"
- CAconf="CAss.cnf"
- CAreq2="req2CA.ss" # temp
- Uconf="Uss.cnf"
- Ukey="keyU.ss"
- Ureq="reqU.ss"
- Ucert="certU.ss"
- Dkey="keyD.ss"
- Dreq="reqD.ss"
- Dcert="certD.ss"
- Ekey="keyE.ss"
- Ereq="reqE.ss"
- Ecert="certE.ss"
- P1conf="P1ss.cnf"
- P1key="keyP1.ss"
- P1req="reqP1.ss"
- P1cert="certP1.ss"
- P1intermediate="tmp_intP1.ss"
- P2conf="P2ss.cnf"
- P2key="keyP2.ss"
- P2req="reqP2.ss"
- P2cert="certP2.ss"
- P2intermediate="tmp_intP2.ss"
- echo string to make the random number generator think it has entropy >> ./.rnd
- req_dsa='-newkey dsa:../apps/dsa1024.pem'
- if ../util/shlib_wrap.sh ../apps/openssl no-rsa >/dev/null; then
- req_new=$req_dsa
- else
- req_new='-new'
- fi
- echo make cert request
- $reqcmd -config $CAconf -out $CAreq -keyout $CAkey $req_new || exit 1
- echo convert request into self-signed cert
- $x509cmd -CAcreateserial -in $CAreq -days 30 -req -out $CAcert -signkey $CAkey -extfile $CAconf -extensions v3_ca >err.ss || exit 1
- echo convert cert into a cert request
- $x509cmd -in $CAcert -x509toreq -signkey $CAkey -out $CAreq2 >err.ss || exit 1
- echo verify request 1
- $reqcmd -config $dummycnf -verify -in $CAreq -noout || exit 1
- echo verify request 1
- $reqcmd -config $dummycnf -verify -in $CAreq2 -noout || exit 1
- echo verify signature
- $verifycmd -CAfile $CAcert $CAcert || exit 1
- echo make a user cert request
- $reqcmd -config $Uconf -out $Ureq -keyout $Ukey $req_new >err.ss || exit 1
- echo sign user cert request
- $x509cmd -CAcreateserial -in $Ureq -days 30 -req -out $Ucert -CA $CAcert -CAkey $CAkey -CAserial $CAserial -extfile $Uconf -extensions v3_ee >err.ss || exit 1
- $verifycmd -CAfile $CAcert $Ucert || exit 1
- echo Certificate details
- $x509cmd -subject -issuer -startdate -enddate -noout -in $Ucert || exit 1
- if ../util/shlib_wrap.sh ../apps/openssl no-dsa >/dev/null; then
- echo skipping DSA certificate creation
- else
- echo make a DSA user cert request
- CN2="DSA Certificate" $reqcmd -config $Uconf -out $Dreq -keyout $Dkey $req_dsa >err.ss || exit 1
- echo sign DSA user cert request
- $x509cmd -CAcreateserial -in $Dreq -days 30 -req -out $Dcert -CA $CAcert -CAkey $CAkey -CAserial $CAserial -extfile $Uconf -extensions v3_ee_dsa >err.ss || exit 1
- $verifycmd -CAfile $CAcert $Dcert || exit 1
- echo DSA Certificate details
- $x509cmd -subject -issuer -startdate -enddate -noout -in $Dcert || exit 1
- fi
- if ../util/shlib_wrap.sh ../apps/openssl no-ec >/dev/null; then
- echo skipping ECDSA/ECDH certificate creation
- else
- echo make an ECDSA/ECDH user cert request
- ../util/shlib_wrap.sh ../apps/openssl ecparam -name P-256 -out ecp.ss || exit 1
- CN2="ECDSA Certificate" $reqcmd -config $Uconf -out $Ereq -keyout $Ekey -newkey ec:ecp.ss >err.ss || exit 1
- echo sign ECDSA/ECDH user cert request
- $x509cmd -CAcreateserial -in $Ereq -days 30 -req -out $Ecert -CA $CAcert -CAkey $CAkey -CAserial $CAserial -extfile $Uconf -extensions v3_ee_ec >err.ss || exit 1
- $verifycmd -CAfile $CAcert $Ecert || exit 1
- echo ECDSA Certificate details
- $x509cmd -subject -issuer -startdate -enddate -noout -in $Ecert || exit 1
- fi
- echo make a proxy cert request
- $reqcmd -config $P1conf -out $P1req -keyout $P1key $req_new >err.ss || exit 1
- echo sign proxy with user cert
- $x509cmd -CAcreateserial -in $P1req -days 30 -req -out $P1cert -CA $Ucert -CAkey $Ukey -extfile $P1conf -extensions v3_proxy >err.ss || exit 1
- cat $Ucert > $P1intermediate
- $verifycmd -CAfile $CAcert -untrusted $P1intermediate $P1cert
- echo Certificate details
- $x509cmd -subject -issuer -startdate -enddate -noout -in $P1cert
- echo make another proxy cert request
- $reqcmd -config $P2conf -out $P2req -keyout $P2key $req_new >err.ss || exit 1
- echo sign second proxy cert request with the first proxy cert
- $x509cmd -CAcreateserial -in $P2req -days 30 -req -out $P2cert -CA $P1cert -CAkey $P1key -extfile $P2conf -extensions v3_proxy >err.ss || exit 1
- echo Certificate details
- cat $Ucert $P1cert > $P2intermediate
- $verifycmd -CAfile $CAcert -untrusted $P2intermediate $P2cert
- $x509cmd -subject -issuer -startdate -enddate -noout -in $P2cert
- echo The generated CA certificate is $CAcert
- echo The generated CA private key is $CAkey
- echo The generated user certificate is $Ucert
- echo The generated user private key is $Ukey
- echo The first generated proxy certificate is $P1cert
- echo The first generated proxy private key is $P1key
- echo The second generated proxy certificate is $P2cert
- echo The second generated proxy private key is $P2key
- /bin/rm err.ss
- exit 0
|