yuezonghe | 824eb0c | 2024-06-27 02:32:26 -0700 | [diff] [blame] | 1 | #!/bin/sh |
| 2 | |
| 3 | OPENSSL=../../apps/openssl |
| 4 | OPENSSL_CONF=../../apps/openssl.cnf |
| 5 | export OPENSSL_CONF |
| 6 | |
| 7 | # Root CA: create certificate directly |
| 8 | CN="Test Root CA" $OPENSSL req -config ca.cnf -x509 -nodes \ |
| 9 | -keyout root.pem -out root.pem -newkey rsa:2048 -days 3650 |
| 10 | # Intermediate CA: request first |
| 11 | CN="Test Intermediate CA" $OPENSSL req -config ca.cnf -nodes \ |
| 12 | -keyout intkey.pem -out intreq.pem -newkey rsa:2048 |
| 13 | # Sign request: CA extensions |
| 14 | $OPENSSL x509 -req -in intreq.pem -CA root.pem -days 3600 \ |
| 15 | -extfile ca.cnf -extensions v3_ca -CAcreateserial -out intca.pem |
| 16 | |
| 17 | # Server certificate: create request first |
| 18 | CN="Test Server Cert" $OPENSSL req -config ca.cnf -nodes \ |
| 19 | -keyout skey.pem -out req.pem -newkey rsa:1024 |
| 20 | # Sign request: end entity extensions |
| 21 | $OPENSSL x509 -req -in req.pem -CA intca.pem -CAkey intkey.pem -days 3600 \ |
| 22 | -extfile ca.cnf -extensions usr_cert -CAcreateserial -out server.pem |
| 23 | |
| 24 | # Client certificate: request first |
| 25 | CN="Test Client Cert" $OPENSSL req -config ca.cnf -nodes \ |
| 26 | -keyout ckey.pem -out creq.pem -newkey rsa:1024 |
| 27 | # Sign using intermediate CA |
| 28 | $OPENSSL x509 -req -in creq.pem -CA intca.pem -CAkey intkey.pem -days 3600 \ |
| 29 | -extfile ca.cnf -extensions usr_cert -CAcreateserial -out client.pem |
| 30 | |
| 31 | # Revoked certificate: request first |
| 32 | CN="Test Revoked Cert" $OPENSSL req -config ca.cnf -nodes \ |
| 33 | -keyout revkey.pem -out rreq.pem -newkey rsa:1024 |
| 34 | # Sign using intermediate CA |
| 35 | $OPENSSL x509 -req -in rreq.pem -CA intca.pem -CAkey intkey.pem -days 3600 \ |
| 36 | -extfile ca.cnf -extensions usr_cert -CAcreateserial -out rev.pem |
| 37 | |
| 38 | # OCSP responder certificate: request first |
| 39 | CN="Test OCSP Responder Cert" $OPENSSL req -config ca.cnf -nodes \ |
| 40 | -keyout respkey.pem -out respreq.pem -newkey rsa:1024 |
| 41 | # Sign using intermediate CA and responder extensions |
| 42 | $OPENSSL x509 -req -in respreq.pem -CA intca.pem -CAkey intkey.pem -days 3600 \ |
| 43 | -extfile ca.cnf -extensions ocsp_cert -CAcreateserial -out resp.pem |
| 44 | |
| 45 | # Example creating a PKCS#3 DH certificate. |
| 46 | |
| 47 | # First DH parameters |
| 48 | |
| 49 | [ -f dhp.pem ] || $OPENSSL genpkey -genparam -algorithm DH -pkeyopt dh_paramgen_prime_len:1024 -out dhp.pem |
| 50 | |
| 51 | # Now a DH private key |
| 52 | $OPENSSL genpkey -paramfile dhp.pem -out dhskey.pem |
| 53 | # Create DH public key file |
| 54 | $OPENSSL pkey -in dhskey.pem -pubout -out dhspub.pem |
| 55 | # Certificate request, key just reuses old one as it is ignored when the |
| 56 | # request is signed. |
| 57 | CN="Test Server DH Cert" $OPENSSL req -config ca.cnf -new \ |
| 58 | -key skey.pem -out dhsreq.pem |
| 59 | # Sign request: end entity DH extensions |
| 60 | $OPENSSL x509 -req -in dhsreq.pem -CA root.pem -days 3600 \ |
| 61 | -force_pubkey dhspub.pem \ |
| 62 | -extfile ca.cnf -extensions dh_cert -CAcreateserial -out dhserver.pem |
| 63 | |
| 64 | # DH client certificate |
| 65 | |
| 66 | $OPENSSL genpkey -paramfile dhp.pem -out dhckey.pem |
| 67 | $OPENSSL pkey -in dhckey.pem -pubout -out dhcpub.pem |
| 68 | CN="Test Client DH Cert" $OPENSSL req -config ca.cnf -new \ |
| 69 | -key skey.pem -out dhcreq.pem |
| 70 | $OPENSSL x509 -req -in dhcreq.pem -CA root.pem -days 3600 \ |
| 71 | -force_pubkey dhcpub.pem \ |
| 72 | -extfile ca.cnf -extensions dh_cert -CAcreateserial -out dhclient.pem |
| 73 | |
| 74 | # Examples of CRL generation without the need to use 'ca' to issue |
| 75 | # certificates. |
| 76 | # Create zero length index file |
| 77 | >index.txt |
| 78 | # Create initial crl number file |
| 79 | echo 01 >crlnum.txt |
| 80 | # Add entries for server and client certs |
| 81 | $OPENSSL ca -valid server.pem -keyfile root.pem -cert root.pem \ |
| 82 | -config ca.cnf -md sha1 |
| 83 | $OPENSSL ca -valid client.pem -keyfile root.pem -cert root.pem \ |
| 84 | -config ca.cnf -md sha1 |
| 85 | $OPENSSL ca -valid rev.pem -keyfile root.pem -cert root.pem \ |
| 86 | -config ca.cnf -md sha1 |
| 87 | # Generate a CRL. |
| 88 | $OPENSSL ca -gencrl -keyfile root.pem -cert root.pem -config ca.cnf \ |
| 89 | -md sha1 -crldays 1 -out crl1.pem |
| 90 | # Revoke a certificate |
| 91 | openssl ca -revoke rev.pem -crl_reason superseded \ |
| 92 | -keyfile root.pem -cert root.pem -config ca.cnf -md sha1 |
| 93 | # Generate another CRL |
| 94 | $OPENSSL ca -gencrl -keyfile root.pem -cert root.pem -config ca.cnf \ |
| 95 | -md sha1 -crldays 1 -out crl2.pem |
| 96 | |