2023-05-19 20:35:46 +00:00
|
|
|
#!/bin/bash
|
2023-05-12 19:07:28 +00:00
|
|
|
# Script to generate a PKI Stack (Root, Intermediate, and LEAF CAs) and a Base RIM Signer
|
|
|
|
# creates a folder based upon the actor name and places certs under an algoithm specific folder (e.g. rsa_certs)
|
|
|
|
# PARAMS:
|
|
|
|
# 1. Actor name string (e.g. "Server Manufacturer")
|
|
|
|
# 2. Algorithm string (e.g. rsa or ecc)
|
|
|
|
# 3. Key Bit Size string (e.g. 2048)
|
|
|
|
# 4. Hash Algorithm string (e.g. sha256)
|
2023-05-19 20:35:46 +00:00
|
|
|
# 5. PKI password used to protect PKI keys and certs
|
2023-05-12 19:07:28 +00:00
|
|
|
#
|
|
|
|
# Examples:
|
2023-05-19 20:35:46 +00:00
|
|
|
# pki_chain_gen.sh "PC Manufacturer" rsa 2048 sha256 "password"
|
|
|
|
# pki_chain_gen.sh "DISK Manufacturer" ecc 256 sha512 "password"
|
2023-05-12 19:07:28 +00:00
|
|
|
#
|
2023-05-19 20:35:46 +00:00
|
|
|
# A KeyStore and Trust Store are created for by Java Applications. Both will use the supplied password.
|
2023-05-12 19:07:28 +00:00
|
|
|
|
|
|
|
ACTOR=$1
|
|
|
|
ACTOR_ALT=${ACTOR// /_}
|
|
|
|
ASYM_ALG=$2
|
|
|
|
ASYM_SIZE=$3
|
|
|
|
HASH_ALG=$4
|
2023-05-19 20:35:46 +00:00
|
|
|
PASS=$5
|
2023-07-18 17:09:11 +00:00
|
|
|
LOG_FILE=$6
|
2023-05-19 20:35:46 +00:00
|
|
|
ROOT_DN="/C=US/ST=MD/L=Columbia/O="$ACTOR"/CN="$ACTOR" test root ca"
|
|
|
|
INT_DN="/C=US/ST=MD/L=Columbia/O="$ACTOR"/CN="$ACTOR" test intermediate ca"
|
|
|
|
LEAF_DN="/C=US/ST=MD/L=Columbia/O="$ACTOR"/CN="$ACTOR" test ca"
|
|
|
|
SIGNER_DN="/C=US/ST=MD/L=Columbia/O="$ACTOR"/CN="$ACTOR" test signer"
|
|
|
|
SERVER_DN="/C=US/ST=MD/L=Columbia/O="$ACTOR"/CN="$ACTOR" aca"
|
|
|
|
# Capture location of the script to allow from invocation from any location
|
|
|
|
SCRIPT_DIR=$( dirname -- "$( readlink -f -- "$0"; )"; )
|
|
|
|
TRUSTSTORE=TrustStore.jks
|
2023-08-18 16:38:41 +00:00
|
|
|
TRUSTSTORE_P12=TrustStore.p12
|
2023-05-19 20:35:46 +00:00
|
|
|
KEYSTORE=KeyStore.jks
|
2023-05-12 19:07:28 +00:00
|
|
|
|
|
|
|
# Parameter check
|
|
|
|
if [ -z "${ACTOR}" ] || [ -z "${ASYM_ALG}" ] || [ -z "${ASYM_SIZE}" ] || [ -z "${HASH_ALG}" ] || [ "${ACTOR}" == "-h" ] || [ "${ACTOR}" == "--help" ]; then
|
2023-07-18 17:09:11 +00:00
|
|
|
echo "parameter missing to pki_chain_gen.sh, exiting pki setup" | tee -a "$LOG_FILE"
|
2023-05-12 19:07:28 +00:00
|
|
|
exit 1;
|
|
|
|
fi
|
|
|
|
|
|
|
|
if ! { [ $ASYM_ALG == "rsa" ] || [ $ASYM_ALG == "ecc" ]; }; then
|
2023-07-18 17:09:11 +00:00
|
|
|
echo "$ASYM_ALG is an unsupported assymetric algorithm, exiting pki setup" | tee -a "$LOG_FILE"
|
|
|
|
exit 1;
|
|
|
|
fi
|
|
|
|
|
|
|
|
if [ -z ${LOG_FILE} ]; then
|
|
|
|
LOG_FILE="/dev/null"
|
2023-05-12 19:07:28 +00:00
|
|
|
fi
|
|
|
|
|
|
|
|
case $ASYM_SIZE in
|
|
|
|
256) KSIZE=256
|
|
|
|
ECC_NAME="secp256k1";;
|
|
|
|
384) KSIZE=384
|
|
|
|
ECC_NAME="secp384r1";;
|
|
|
|
512) KSIZE=512
|
|
|
|
ECC_NAME="secp521r1";;
|
|
|
|
2048) KSIZE=2k;;
|
|
|
|
3072) KSIZE=3k;;
|
|
|
|
4096) KSIZE=4k;;
|
|
|
|
*)
|
2023-07-18 17:09:11 +00:00
|
|
|
echo "$ASYM_SIZE is an unsupported key size, exiting pki setup" | tee -a "$LOG_FILE"
|
2023-05-12 19:07:28 +00:00
|
|
|
exit 1;;
|
|
|
|
esac
|
|
|
|
|
|
|
|
# Use algorithm and key size to create unique file paths and Distinguished names
|
|
|
|
NAME="$ACTOR $ASYM_ALG $KSIZE $HASH_ALG"
|
|
|
|
CERT_FOLDER="$ASYM_ALG"_"$KSIZE"_"$HASH_ALG"_certs
|
|
|
|
PKI_ROOT="$CERT_FOLDER"/"$ACTOR_ALT"_root_ca_"$ASYM_ALG"_"$KSIZE"_"$HASH_ALG"
|
|
|
|
PKI_INT="$CERT_FOLDER"/"$ACTOR_ALT"_intermediate_ca_"$ASYM_ALG"_"$KSIZE"_"$HASH_ALG"
|
|
|
|
PKI_CA1="$CERT_FOLDER"/"$ACTOR_ALT"_leaf_ca1_"$ASYM_ALG"_"$KSIZE"_"$HASH_ALG"
|
|
|
|
PKI_CA2="$CERT_FOLDER"/"$ACTOR_ALT"_leaf_ca2_"$ASYM_ALG"_"$KSIZE"_"$HASH_ALG"
|
|
|
|
PKI_CA3="$CERT_FOLDER"/"$ACTOR_ALT"_leaf_ca3_"$ASYM_ALG"_"$KSIZE"_"$HASH_ALG"
|
|
|
|
RIM_SIGNER="$CERT_FOLDER"/"$ACTOR_ALT"_rim_signer_"$ASYM_ALG"_"$KSIZE"_"$HASH_ALG"
|
|
|
|
TLS_SERVER="$CERT_FOLDER"/"$ACTOR_ALT"_aca_tls_"$ASYM_ALG"_"$KSIZE"_"$HASH_ALG"
|
2023-08-11 13:47:30 +00:00
|
|
|
DB_SERVER="$CERT_FOLDER"/"$ACTOR_ALT"_db_srv_"$ASYM_ALG"_"$KSIZE"_"$HASH_ALG"
|
|
|
|
DB_CLIENT="$CERT_FOLDER"/"$ACTOR_ALT"_db_client_"$ASYM_ALG"_"$KSIZE"_"$HASH_ALG"
|
2023-05-19 20:35:46 +00:00
|
|
|
TRUST_STORE_FILE="$CERT_FOLDER"/"$ACTOR_ALT"_"$ASYM_ALG"_"$KSIZE"_"$HASH_ALG"_Cert_Chain.pem
|
2023-05-12 19:07:28 +00:00
|
|
|
|
2023-05-19 20:35:46 +00:00
|
|
|
ROOT_DN="/C=US/ST=MD/L=Columbia/O="$ACTOR"/CN="$NAME" test root ca"
|
|
|
|
INT_DN="/C=US/ST=MD/L=Columbia/O="$ACTOR"/CN="$NAME" test intermediate ca"
|
|
|
|
LEAF_DN="/C=US/ST=MD/L=Columbia/O="$ACTOR"/CN="$NAME" test ca"
|
|
|
|
SIGNER_DN="/C=US/ST=MD/L=Columbia/O="$ACTOR"/CN="$NAME" test signer"
|
2023-07-18 17:09:11 +00:00
|
|
|
TLS_DN="/C=US/ST=MD/L=Columbia/O="$ACTOR"/CN="$NAME" portal"
|
2023-08-11 13:47:30 +00:00
|
|
|
DB_SRV_DN="/C=US/ST=MD/L=Columbia/O="$ACTOR"/CN="$NAME" DB Server"
|
|
|
|
DB_CLIENT_DN="/C=US/ST=MD/L=Columbia/O="$ACTOR"/CN="$NAME" DB Client"
|
2023-05-12 19:07:28 +00:00
|
|
|
|
|
|
|
# Add check for existing folder and halt if it exists
|
|
|
|
if [ -d "$ACTOR_ALT"/"$CERT_FOLDER" ]; then
|
2023-07-18 17:09:11 +00:00
|
|
|
echo "Folder for $CERT_FOLDER exists, exiting..." | tee -a "$LOG_FILE"
|
2023-05-12 19:07:28 +00:00
|
|
|
exit 1;
|
|
|
|
fi
|
|
|
|
|
|
|
|
# Intialize sub folders
|
2023-07-18 17:09:11 +00:00
|
|
|
echo "Creating PKI for $ACTOR_ALT using $KSIZE $ASYM_ALG and $HASH_ALG..." | tee -a "$LOG_FILE"
|
2023-05-12 19:07:28 +00:00
|
|
|
|
|
|
|
mkdir -p "$ACTOR_ALT" "$ACTOR_ALT"/"$CERT_FOLDER" "$ACTOR_ALT"/ca/certs
|
|
|
|
cp ca.conf "$ACTOR_ALT"/.
|
2023-06-02 19:23:55 +00:00
|
|
|
pushd "$ACTOR_ALT" &> /dev/null
|
2023-05-12 19:07:28 +00:00
|
|
|
touch ca/db
|
2023-07-18 17:09:11 +00:00
|
|
|
touch openssl-san.cnf
|
2023-05-12 19:07:28 +00:00
|
|
|
if [ ! -f "ca/serial.txt" ]; then
|
2023-07-18 17:09:11 +00:00
|
|
|
echo "01" > ca/serial.txt | tee -a "$LOG_FILE"
|
2023-05-12 19:07:28 +00:00
|
|
|
fi
|
|
|
|
|
2023-07-18 17:09:11 +00:00
|
|
|
# Function to add Cert to Truststore and key to Keystore
|
|
|
|
add_to_stores () {
|
|
|
|
CERT_PATH=$1
|
|
|
|
ALIAS=${CERT_PATH#*/} # Use filename without path as an alias
|
|
|
|
echo "Addding $ALIAS to the $TRUSTSTORE and $KEYSTORE" | tee -a "$LOG_FILE"
|
|
|
|
# Add the cert and key to the key store. make a p12 file to import into te keystore
|
|
|
|
openssl pkcs12 -export -in "$CERT_PATH".pem -inkey "$CERT_PATH".key -out tmpkey.p12 -passin pass:"$PASS" -aes256 -passout pass:$PASS >> "$LOG_FILE" 2>&1
|
|
|
|
# Use the p12 file to import into a java keystore via keytool
|
|
|
|
keytool -importkeystore -srckeystore tmpkey.p12 -destkeystore $KEYSTORE -srcstoretype pkcs12 -srcstorepass $PASS -deststoretype jks -deststorepass $PASS -noprompt -alias 1 -destalias -J-Dcom.redhat.fips=false "$ALIAS" >> "$LOG_FILE" 2>&1
|
|
|
|
# Import the cert into a java trust store via keytool
|
|
|
|
keytool -import -keystore $TRUSTSTORE -storepass $PASS -file "$CERT_PATH".pem -noprompt -alias "$ALIAS" -J-Dcom.redhat.fips=false >> "$LOG_FILE" 2>&1
|
|
|
|
# Remove the temp p1 file.
|
|
|
|
rm tmpkey.p12
|
|
|
|
}
|
|
|
|
|
2023-05-12 19:07:28 +00:00
|
|
|
# Function to create an Intermediate Key, CSR, and Certificate
|
|
|
|
# PARMS:
|
|
|
|
# 1. Cert Type String
|
|
|
|
# 2. Issuer Key File Name
|
|
|
|
# 3. Subject Distinguished Name String
|
|
|
|
|
|
|
|
create_cert () {
|
|
|
|
CERT_PATH="$1"
|
|
|
|
ISSUER="$2"
|
|
|
|
SUBJ_DN="$3"
|
2023-07-10 15:57:10 +00:00
|
|
|
EXTENSION="$4"
|
2023-05-12 19:07:28 +00:00
|
|
|
ISSUER_KEY="$ISSUER".key
|
|
|
|
ISSUER_CERT="$ISSUER".pem
|
2023-05-19 20:35:46 +00:00
|
|
|
ALIAS=${CERT_PATH#*/} # Use filename without path as an alias
|
2023-05-12 19:07:28 +00:00
|
|
|
|
2023-07-18 17:09:11 +00:00
|
|
|
echo "Creating cert using "$ISSUER_KEY" with a DN="$SUBJ_DN"..." | tee -a "$LOG_FILE"
|
2023-05-12 19:07:28 +00:00
|
|
|
|
2023-08-11 13:47:30 +00:00
|
|
|
# Database doesnt support encypted key so create DB without passwords
|
|
|
|
if [[ "$SUBJ_DN" = *"DB"* ]]; then
|
|
|
|
if [ "$ASYM_ALG" == "rsa" ]; then
|
|
|
|
openssl genrsa -out "$CERT_PATH".key "$ASYM_SIZE" >> "$LOG_FILE" 2>&1
|
|
|
|
openssl req -new -key "$CERT_PATH".key \
|
|
|
|
-out "$CERT_PATH".csr -subj "$SUBJ_DN" >> "$LOG_FILE" 2>&1
|
|
|
|
else
|
|
|
|
openssl ecparam -genkey -name "$ECC_NAME" -out "$CERT_PATH".key >> "$LOG_FILE" 2>&1
|
|
|
|
openssl req -new -key "$CERT_PATH".key -out "$CERT_PATH".csr -$HASH_ALG -subj "$SUBJ_DN" >> "$LOG_FILE" 2>&1
|
|
|
|
fi
|
2023-05-12 19:07:28 +00:00
|
|
|
else
|
2023-08-11 13:47:30 +00:00
|
|
|
if [ "$ASYM_ALG" == "rsa" ]; then
|
|
|
|
openssl req -newkey rsa:"$ASYM_SIZE" \
|
|
|
|
-keyout "$CERT_PATH".key \
|
|
|
|
-out "$CERT_PATH".csr -subj "$SUBJ_DN" \
|
|
|
|
-passout pass:"$PASS" >> "$LOG_FILE" 2>&1
|
|
|
|
else
|
|
|
|
openssl genpkey -algorithm "EC" -pkeyopt ec_paramgen_curve:P-521 -aes256 --pass "pass:$PASS" -out "$CERT_PATH".key
|
|
|
|
openssl req -new -key "$CERT_PATH".key -passin "pass:$PASS" -out "$CERT_PATH".csr -$HASH_ALG -subj "$SUBJ_DN"
|
|
|
|
fi
|
|
|
|
|
2023-05-12 19:07:28 +00:00
|
|
|
fi
|
2023-08-11 13:47:30 +00:00
|
|
|
openssl ca -config ca.conf \
|
2023-05-12 19:07:28 +00:00
|
|
|
-keyfile "$ISSUER_KEY" \
|
|
|
|
-md $HASH_ALG \
|
|
|
|
-cert "$ISSUER_CERT" \
|
|
|
|
-extensions "$EXTENSION" \
|
|
|
|
-out "$CERT_PATH".pem \
|
|
|
|
-in "$CERT_PATH".csr \
|
|
|
|
-passin pass:"$PASS" \
|
2023-05-19 20:35:46 +00:00
|
|
|
-batch \
|
2023-08-11 13:47:30 +00:00
|
|
|
-notext >> "$LOG_FILE" 2>&1
|
2023-05-19 20:35:46 +00:00
|
|
|
# Increment the cert serial number
|
2023-07-18 17:09:11 +00:00
|
|
|
SERIAL=$(awk -F',' '{printf("%s\t%d\n",$1,$2+1)}' ./ca/serial.txt)
|
|
|
|
echo "Cert Serial Number = $SERIAL" >> "$LOG_FILE";
|
2023-05-12 19:07:28 +00:00
|
|
|
# remove csr file
|
2023-05-19 20:35:46 +00:00
|
|
|
rm -f "$CERT_PATH".csr
|
|
|
|
# Add the cert and key to the key store. make a p12 file to import into te keystore
|
2023-08-23 20:30:06 +00:00
|
|
|
openssl pkcs12 -export -in "$CERT_PATH".pem -inkey "$CERT_PATH".key -out tmpkey.p12 -passin pass:$PASS -aes256 -passout pass:$PASS >> "$LOG_FILE" 2>&1
|
2023-05-19 20:35:46 +00:00
|
|
|
# Use the p12 file to import into a java keystore via keytool
|
2023-07-18 17:09:11 +00:00
|
|
|
keytool -importkeystore -srckeystore tmpkey.p12 -destkeystore $KEYSTORE -srcstoretype pkcs12 -srcstorepass $PASS -deststoretype jks -deststorepass $PASS -noprompt -alias 1 -destalias -J-Dcom.redhat.fips=false "$ALIAS" >> "$LOG_FILE" 2>&1
|
2023-05-19 20:35:46 +00:00
|
|
|
# Import the cert into a java trust store via keytool
|
2023-07-18 17:09:11 +00:00
|
|
|
keytool -import -keystore $TRUSTSTORE -storepass $PASS -file "$CERT_PATH".pem -noprompt -alias "$ALIAS" -J-Dcom.redhat.fips=false >> "$LOG_FILE" 2>&1
|
2023-05-19 20:35:46 +00:00
|
|
|
# Remove the temp p1 file.
|
2023-08-11 13:47:30 +00:00
|
|
|
rm -f tmpkey.p12 &>/dev/null
|
2023-05-12 19:07:28 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
create_cert_chain () {
|
|
|
|
|
|
|
|
# Create an intermediate CA, Sign with Root CA
|
2023-07-10 15:57:10 +00:00
|
|
|
create_cert "$PKI_INT" "$PKI_ROOT" "$INT_DN" "ca_extensions"
|
2023-05-12 19:07:28 +00:00
|
|
|
|
|
|
|
# Create a Leaf CA (CA1), Sign with intermediate CA
|
2023-07-10 15:57:10 +00:00
|
|
|
create_cert "$PKI_CA1" "$PKI_INT" "$LEAF_DN"1 "ca_extensions"
|
2023-05-12 19:07:28 +00:00
|
|
|
|
|
|
|
# Create a Leaf CA (CA2), Sign with intermediate CA
|
|
|
|
|
2023-07-10 15:57:10 +00:00
|
|
|
create_cert "$PKI_CA2" "$PKI_INT" "$LEAF_DN"2 "ca_extensions"
|
2023-05-12 19:07:28 +00:00
|
|
|
|
|
|
|
# Create a Leaf CA (CA3), Sign with intermediate CA
|
|
|
|
|
2023-07-10 15:57:10 +00:00
|
|
|
create_cert "$PKI_CA3" "$PKI_INT" "$LEAF_DN"3 "ca_extensions"
|
2023-05-12 19:07:28 +00:00
|
|
|
|
|
|
|
# Create a RIM Signer
|
2023-07-10 15:57:10 +00:00
|
|
|
create_cert "$RIM_SIGNER" "$PKI_CA2" "$SIGNER_DN" "signer_extensions"
|
2023-05-12 19:07:28 +00:00
|
|
|
|
|
|
|
# Create a ACA Sever Cert for TLS use
|
2023-07-10 15:57:10 +00:00
|
|
|
create_cert "$TLS_SERVER" "$PKI_CA3" "$TLS_DN" "server_extensions"
|
2023-05-12 19:07:28 +00:00
|
|
|
|
2023-08-11 13:47:30 +00:00
|
|
|
# Create a DB Sever Cert for TLS use
|
|
|
|
create_cert "$DB_SERVER" "$PKI_CA3" "$DB_SRV_DN" "server_extensions"
|
|
|
|
|
|
|
|
# Create a ACA Sever Cert for TLS use
|
|
|
|
create_cert "$DB_CLIENT" "$PKI_CA3" "$DB_CLIENT_DN" "server_extensions"
|
|
|
|
|
2023-05-12 19:07:28 +00:00
|
|
|
# Create Cert trust store by adding the Intermediate and root certs
|
2023-05-19 20:35:46 +00:00
|
|
|
cat "$PKI_CA1.pem" "$PKI_CA2.pem" "$PKI_CA3.pem" "$PKI_INT.pem" "$PKI_ROOT.pem" > "$TRUST_STORE_FILE"
|
2023-05-12 19:07:28 +00:00
|
|
|
|
2023-08-23 20:30:06 +00:00
|
|
|
# echo "Checking signer cert using tust store..."
|
2023-07-18 17:09:11 +00:00
|
|
|
openssl verify -CAfile "$TRUST_STORE_FILE" $RIM_SIGNER.pem | tee -a "$LOG_FILE"
|
2023-08-23 20:30:06 +00:00
|
|
|
|
2023-08-11 13:47:30 +00:00
|
|
|
# Make JKS files for the mysql DB connector. P12 first then JKS...
|
2023-08-31 13:27:58 +00:00
|
|
|
openssl pkcs12 -export -in $DB_CLIENT.pem -inkey $DB_CLIENT.key \
|
|
|
|
-aes256 -macalg SHA256 -keypbe AES-256-CBC -certpbe AES-256-CBC \
|
|
|
|
-passin pass:$PASS -passout pass:$PASS \
|
2023-08-23 20:30:06 +00:00
|
|
|
-name "mysqlclientkey" -out $DB_CLIENT.p12 >> "$LOG_FILE" 2>&1
|
2023-08-11 13:47:30 +00:00
|
|
|
|
2023-08-18 16:38:41 +00:00
|
|
|
keytool -importkeystore -srckeystore $DB_CLIENT.p12 -srcstoretype PKCS12 \
|
2023-08-23 20:30:06 +00:00
|
|
|
-srcstorepass $PASS -destkeystore $DB_CLIENT.jks -deststoretype JKS -deststorepass $PASS >> "$LOG_FILE" 2>&1
|
2023-05-12 19:07:28 +00:00
|
|
|
}
|
|
|
|
|
2023-07-18 17:09:11 +00:00
|
|
|
if [ "$ASYM_ALG" == "rsa" ]; then
|
2023-05-12 19:07:28 +00:00
|
|
|
# Create Root CA key pair and self signed cert
|
2023-07-18 17:09:11 +00:00
|
|
|
echo "Generating RSA Root CA ...." | tee -a "$LOG_FILE"
|
2023-08-31 13:27:58 +00:00
|
|
|
#openssl genrsa -out "$PKI_ROOT".key -aes256 -passout pass:"$PASS" "$ASYM_SIZE" >> "$LOG_FILE" 2>&1
|
|
|
|
openssl genpkey -algorithm RSA -pkeyopt rsa_keygen_bits:3072 -aes256 --pass "pass:$PASS" -out "$PKI_ROOT".key >> "$LOG_FILE" 2>&1
|
|
|
|
|
2023-05-12 19:07:28 +00:00
|
|
|
# Create a self signed CA certificate
|
|
|
|
openssl req -new -config ca.conf -x509 -days 3650 -key "$PKI_ROOT".key -subj "$ROOT_DN" \
|
|
|
|
-extensions ca_extensions -out "$PKI_ROOT".pem \
|
2023-08-11 13:47:30 +00:00
|
|
|
-passin pass:"$PASS" >> "$LOG_FILE" 2>&1
|
2023-07-18 17:09:11 +00:00
|
|
|
# Add the CA root cert to the Trust and Key stores
|
|
|
|
add_to_stores $PKI_ROOT
|
2023-05-12 19:07:28 +00:00
|
|
|
# Create an intermediate CA, 2 Leaf CAs, and Signer Certs
|
2023-07-18 17:09:11 +00:00
|
|
|
create_cert_chain
|
2023-05-12 19:07:28 +00:00
|
|
|
fi
|
|
|
|
|
|
|
|
if [ "$ASYM_ALG" == "ecc" ]; then
|
|
|
|
# Create Root CA key pair and self signed cert
|
2023-07-18 17:09:11 +00:00
|
|
|
echo "Generating Ecc Root CA ...." | tee -a "$LOG_FILE"
|
2023-08-11 13:47:30 +00:00
|
|
|
#openssl ecparam -genkey -name "$ECC_NAME" -out "$PKI_ROOT".key >> "$LOG_FILE" 2>&1
|
|
|
|
openssl genpkey -algorithm "EC" -pkeyopt ec_paramgen_curve:P-521 -aes256 --pass "pass:$PASS" -out "$PKI_ROOT".key
|
|
|
|
|
2023-05-12 19:07:28 +00:00
|
|
|
# Create a self signed CA certificate
|
|
|
|
openssl req -new -config ca.conf -x509 -days 3650 -key "$PKI_ROOT".key -subj "$ROOT_DN" \
|
|
|
|
-extensions ca_extensions -out "$PKI_ROOT".pem \
|
2023-08-11 13:47:30 +00:00
|
|
|
-passin pass:"$PASS" >> "$LOG_FILE" 2>&1
|
2023-07-18 17:09:11 +00:00
|
|
|
# Add the CA root cert to the Trust and Key stores
|
|
|
|
add_to_stores $PKI_ROOT
|
2023-05-12 19:07:28 +00:00
|
|
|
# Create an intermediate CA, 2 Leaf CAs, and Signer Certs
|
|
|
|
create_cert_chain
|
2023-07-18 17:09:11 +00:00
|
|
|
fi
|