gen-certs.sh 1.2 KB

123456789101112131415161718
  1. #!/usr/bin/env bash
  2. if [[ $(openssl version) =~ 3\.[2-9]\.[0-9]+ ]]; then
  3. OPENSSL_X509_FLAG='-x509v1'
  4. else
  5. OPENSSL_X509_FLAG='-x509'
  6. fi
  7. openssl genrsa 2048 > key.pem
  8. openssl req -new -batch -config test.conf -key key.pem | openssl x509 -days 3650 -req -signkey key.pem > cert.pem
  9. openssl req -x509 -config test.conf -key key.pem -sha256 -days 3650 -nodes -out cert2.pem -extensions SAN
  10. openssl genrsa 2048 > rootCA.key.pem
  11. openssl req $OPENSSL_X509_FLAG -new -batch -config test.rootCA.conf -key rootCA.key.pem -days 1024 > rootCA.cert.pem
  12. openssl genrsa 2048 > client.key.pem
  13. openssl req -new -batch -config test.conf -key client.key.pem | openssl x509 -days 370 -req -CA rootCA.cert.pem -CAkey rootCA.key.pem -CAcreateserial > client.cert.pem
  14. openssl genrsa -passout pass:test123! 2048 > key_encrypted.pem
  15. openssl req -new -batch -config test.conf -key key_encrypted.pem | openssl x509 -days 3650 -req -signkey key_encrypted.pem > cert_encrypted.pem
  16. openssl genrsa -aes256 -passout pass:test012! 2048 > client_encrypted.key.pem
  17. openssl req -new -batch -config test.conf -key client_encrypted.key.pem -passin pass:test012! | openssl x509 -days 370 -req -CA rootCA.cert.pem -CAkey rootCA.key.pem -CAcreateserial > client_encrypted.cert.pem