Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(405)

Unified Diff: tests/standalone/io/create_sample_certificates.sh

Issue 1399243004: Add script that generates X509 certificates for testing dart:io SecureSocket (Closed) Base URL: git@github.com:dart-lang/sdk.git@master
Patch Set: Address comments Created 5 years, 2 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: tests/standalone/io/create_sample_certificates.sh
diff --git a/tests/standalone/io/create_sample_certificates.sh b/tests/standalone/io/create_sample_certificates.sh
new file mode 100755
index 0000000000000000000000000000000000000000..c9baee74c5e03e7375f3dc398d67f4e2ea64ad5f
--- /dev/null
+++ b/tests/standalone/io/create_sample_certificates.sh
@@ -0,0 +1,61 @@
+#!/bin/bash
+# Copyright (c) 2015, the Dart project authors. Please see the AUTHORS file
+# for details. All rights reserved. Use of this source code is governed by a
+# BSD-style license that can be found in the LICENSE file.
+
+# Script to create sample certificates for the dart:io SecureSocket tests.
+# Creates a root certificate authority, an intermediate authority,
+# and a server certificate,
+
+password=pass:dartdart
+
+# We need a server certificate chain where we don't trust the root. Take the
+# server certificate from the previous run of this script, for that purpose.
+if [ -d "certificates" ]; then
+ mv certificates/server_key.pem certificates/untrusted_server_key.pem
+ mv certificates/server_chain.pem certificates/untrusted_server_chain.pem
+else
+ mkdir certificates
+fi
+
+mkdir -p certificate_authority
+cd certificate_authority
+
+# Create a self-signed certificate authority.
+openssl req -subj /CN=rootauthority -set_serial 1 -batch -verbose \
+ -passout $password -new -x509 -keyout root_authority_key.pem \
+ -out root_authority.pem -days 3650
+
+# Create a certificate request for the intermediate authority.
+openssl req -subj /CN=intermediateauthority -batch -verbose \
+ -passout $password -new -keyout intermediate_authority_key.pem \
+ -out intermediate_authority_request.pem
+
+# Sign the certificate of the intermediate authority with the root authority.
+# Add the certificate extensions marking it as a certificate authority.
+openssl x509 -req -in intermediate_authority_request.pem \
+ -out intermediate_authority.pem -set_serial 1 \
+ -CA root_authority.pem -CAkey root_authority_key.pem \
+ -passin $password -extfile ../intermediate_authority_v3_extensions \
+ -days 3650
+
+# Create a certificate request for the server certificate
+openssl req -subj /CN=localhost -batch -verbose -passout $password -new \
+ -keyout localhost_key.pem -out localhost_request.pem
+
+# Sign the server certificate with the intermediate authority. Add the
+# certificate extensions for SubjectAltName and that it is not a CA itself.
+openssl x509 -req -in localhost_request.pem -out localhost.pem -set_serial 1 \
+ -CA intermediate_authority.pem -CAkey intermediate_authority_key.pem \
+ -passin $password -extfile ../localhost_v3_extensions -days 3650
+
+cat localhost.pem intermediate_authority.pem root_authority.pem \
+ > ../certificates/server_chain.pem
+
+# BoringSSL only accepts private keys signed with the PBE-SHA1-RC4-128 cipher.
+openssl pkcs8 -in localhost_key.pem -out ../certificates/server_key.pem \
+ -topk8 -v1 PBE-SHA1-RC4-128 -passin $password -passout $password
+
+cp root_authority.pem ../certificates/trusted_certs.pem
+
+cd ..
« no previous file with comments | « tests/standalone/io/certificates/untrusted_server_key.pem ('k') | tests/standalone/io/intermediate_authority_v3_extensions » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698