| Index: net/data/ssl/scripts/generate-test-certs.sh
|
| diff --git a/net/data/ssl/scripts/generate-test-certs.sh b/net/data/ssl/scripts/generate-test-certs.sh
|
| deleted file mode 100755
|
| index 24eadf108552a1bde2e64fc6ecd8cc22a5d1d269..0000000000000000000000000000000000000000
|
| --- a/net/data/ssl/scripts/generate-test-certs.sh
|
| +++ /dev/null
|
| @@ -1,291 +0,0 @@
|
| -#!/bin/sh
|
| -
|
| -# Copyright 2013 The Chromium Authors. All rights reserved.
|
| -# Use of this source code is governed by a BSD-style license that can be
|
| -# found in the LICENSE file.
|
| -
|
| -# This script generates a set of test (end-entity, intermediate, root)
|
| -# certificates that can be used to test fetching of an intermediate via AIA.
|
| -
|
| -try() {
|
| - echo "$@"
|
| - "$@" || exit 1
|
| -}
|
| -
|
| -try rm -rf out
|
| -try mkdir out
|
| -
|
| -try /bin/sh -c "echo 01 > out/2048-sha256-root-serial"
|
| -touch out/2048-sha256-root-index.txt
|
| -
|
| -# Generate the key
|
| -try openssl genrsa -out out/2048-sha256-root.key 2048
|
| -
|
| -# Generate the root certificate
|
| -CA_COMMON_NAME="Test Root CA" \
|
| - try openssl req \
|
| - -new \
|
| - -key out/2048-sha256-root.key \
|
| - -out out/2048-sha256-root.req \
|
| - -config ca.cnf
|
| -
|
| -CA_COMMON_NAME="Test Root CA" \
|
| - try openssl x509 \
|
| - -req -days 3650 \
|
| - -in out/2048-sha256-root.req \
|
| - -out out/2048-sha256-root.pem \
|
| - -signkey out/2048-sha256-root.key \
|
| - -extfile ca.cnf \
|
| - -extensions ca_cert \
|
| - -text
|
| -
|
| -# Generate the leaf certificate requests
|
| -try openssl req \
|
| - -new \
|
| - -keyout out/expired_cert.key \
|
| - -out out/expired_cert.req \
|
| - -config ee.cnf
|
| -
|
| -try openssl req \
|
| - -new \
|
| - -keyout out/ok_cert.key \
|
| - -out out/ok_cert.req \
|
| - -config ee.cnf
|
| -
|
| -# Generate the leaf certificates
|
| -CA_COMMON_NAME="Test Root CA" \
|
| - try openssl ca \
|
| - -batch \
|
| - -extensions user_cert \
|
| - -startdate 060101000000Z \
|
| - -enddate 070101000000Z \
|
| - -in out/expired_cert.req \
|
| - -out out/expired_cert.pem \
|
| - -config ca.cnf
|
| -
|
| -CA_COMMON_NAME="Test Root CA" \
|
| - try openssl ca \
|
| - -batch \
|
| - -extensions user_cert \
|
| - -days 3650 \
|
| - -in out/ok_cert.req \
|
| - -out out/ok_cert.pem \
|
| - -config ca.cnf
|
| -
|
| -CA_COMMON_NAME="Test Root CA" \
|
| - try openssl ca \
|
| - -batch \
|
| - -extensions name_constraint_bad \
|
| - -subj "/CN=Leaf certificate/" \
|
| - -days 3650 \
|
| - -in out/ok_cert.req \
|
| - -out out/name_constraint_bad.pem \
|
| - -config ca.cnf
|
| -
|
| -CA_COMMON_NAME="Test Root CA" \
|
| - try openssl ca \
|
| - -batch \
|
| - -extensions name_constraint_good \
|
| - -subj "/CN=Leaf Certificate/" \
|
| - -days 3650 \
|
| - -in out/ok_cert.req \
|
| - -out out/name_constraint_good.pem \
|
| - -config ca.cnf
|
| -
|
| -try /bin/sh -c "cat out/ok_cert.key out/ok_cert.pem \
|
| - > ../certificates/ok_cert.pem"
|
| -try /bin/sh -c "cat out/expired_cert.key out/expired_cert.pem \
|
| - > ../certificates/expired_cert.pem"
|
| -try /bin/sh -c "cat out/2048-sha256-root.key out/2048-sha256-root.pem \
|
| - > ../certificates/root_ca_cert.pem"
|
| -try /bin/sh -c "cat out/ok_cert.key out/name_constraint_bad.pem \
|
| - > ../certificates/name_constraint_bad.pem"
|
| -try /bin/sh -c "cat out/ok_cert.key out/name_constraint_good.pem \
|
| - > ../certificates/name_constraint_good.pem"
|
| -
|
| -# Now generate the one-off certs
|
| -## SHA-256 general test cert
|
| -try openssl req -x509 -days 3650 \
|
| - -config ../scripts/ee.cnf -newkey rsa:2048 -text \
|
| - -sha256 \
|
| - -out sha256.pem
|
| -
|
| -## Self-signed cert for SPDY/QUIC/HTTP2 pooling testing
|
| -try openssl req -x509 -days 3650 -extensions req_spdy_pooling \
|
| - -config ../scripts/ee.cnf -newkey rsa:2048 -text \
|
| - -out ../certificates/spdy_pooling.pem
|
| -
|
| -## SubjectAltName parsing
|
| -try openssl req -x509 -days 3650 -extensions req_san_sanity \
|
| - -config ../scripts/ee.cnf -newkey rsa:2048 -text \
|
| - -out ../certificates/subjectAltName_sanity_check.pem
|
| -
|
| -## Punycode handling
|
| -SUBJECT_NAME="req_punycode_dn" \
|
| - try openssl req -x509 -days 3650 -extensions req_punycode \
|
| - -config ../scripts/ee.cnf -newkey rsa:2048 -text \
|
| - -out ../certificates/punycodetest.pem
|
| -
|
| -## Reject intranet hostnames in "publicly" trusted certs
|
| -# 365 * 3 = 1095
|
| -SUBJECT_NAME="req_dn" \
|
| - try openssl req -x509 -days 1095 \
|
| - -config ../scripts/ee.cnf -newkey rsa:2048 -text \
|
| - -out ../certificates/reject_intranet_hosts.pem
|
| -
|
| -## Validity too long unit test support.
|
| -try openssl req -config ../scripts/ee.cnf \
|
| - -newkey rsa:2048 -text -out ../certificates/10_year_validity.req
|
| -CA_COMMON_NAME="Test Root CA" \
|
| - try openssl ca \
|
| - -batch \
|
| - -extensions user_cert \
|
| - -startdate 081030000000Z \
|
| - -enddate 181029000000Z \
|
| - -in ../certificates/10_year_validity.req \
|
| - -out ../certificates/10_year_validity.pem \
|
| - -config ca.cnf
|
| -# 365 * 11 = 4015
|
| -try openssl req -config ../scripts/ee.cnf \
|
| - -newkey rsa:2048 -text -out ../certificates/11_year_validity.req
|
| -CA_COMMON_NAME="Test Root CA" \
|
| - try openssl ca \
|
| - -batch \
|
| - -extensions user_cert \
|
| - -startdate 141030000000Z \
|
| - -days 4015 \
|
| - -in ../certificates/11_year_validity.req \
|
| - -out ../certificates/11_year_validity.pem \
|
| - -config ca.cnf
|
| -try openssl req -config ../scripts/ee.cnf \
|
| - -newkey rsa:2048 -text -out ../certificates/39_months_after_2015_04.req
|
| -CA_COMMON_NAME="Test Root CA" \
|
| - try openssl ca \
|
| - -batch \
|
| - -extensions user_cert \
|
| - -startdate 150402000000Z \
|
| - -enddate 180702000000Z \
|
| - -in ../certificates/39_months_after_2015_04.req \
|
| - -out ../certificates/39_months_after_2015_04.pem \
|
| - -config ca.cnf
|
| -try openssl req -config ../scripts/ee.cnf \
|
| - -newkey rsa:2048 -text -out ../certificates/40_months_after_2015_04.req
|
| -CA_COMMON_NAME="Test Root CA" \
|
| - try openssl ca \
|
| - -batch \
|
| - -extensions user_cert \
|
| - -startdate 150402000000Z \
|
| - -enddate 180801000000Z \
|
| - -in ../certificates/40_months_after_2015_04.req \
|
| - -out ../certificates/40_months_after_2015_04.pem \
|
| - -config ca.cnf
|
| -try openssl req -config ../scripts/ee.cnf \
|
| - -newkey rsa:2048 -text -out ../certificates/60_months_after_2012_07.req
|
| -CA_COMMON_NAME="Test Root CA" \
|
| - try openssl ca \
|
| - -batch \
|
| - -extensions user_cert \
|
| - -startdate 141030000000Z \
|
| - -enddate 190930000000Z \
|
| - -in ../certificates/60_months_after_2012_07.req \
|
| - -out ../certificates/60_months_after_2012_07.pem \
|
| - -config ca.cnf
|
| -try openssl req -config ../scripts/ee.cnf \
|
| - -newkey rsa:2048 -text -out ../certificates/61_months_after_2012_07.req
|
| -# 30 * 61 = 1830
|
| -CA_COMMON_NAME="Test Root CA" \
|
| - try openssl ca \
|
| - -batch \
|
| - -extensions user_cert \
|
| - -startdate 141030000000Z \
|
| - -days 1830 \
|
| - -in ../certificates/61_months_after_2012_07.req \
|
| - -out ../certificates/61_months_after_2012_07.pem \
|
| - -config ca.cnf
|
| -# start date after expiry date
|
| -try openssl req -config ../scripts/ee.cnf \
|
| - -newkey rsa:2048 -text -out ../certificates/start_after_expiry.req
|
| -CA_COMMON_NAME="Test Root CA" \
|
| - try openssl ca \
|
| - -batch \
|
| - -extensions user_cert \
|
| - -startdate 180901000000Z \
|
| - -enddate 150402000000Z \
|
| - -in ../certificates/start_after_expiry.req \
|
| - -out ../certificates/start_after_expiry.pem \
|
| - -config ca.cnf
|
| -try openssl req -config ../scripts/ee.cnf \
|
| - -newkey rsa:2048 -text -out ../certificates/start_after_expiry.req
|
| -# Issued pre-BRs, lifetime < 120 months, expires before 2019-07-01
|
| -try openssl req -config ../scripts/ee.cnf \
|
| - -newkey rsa:2048 -text -out ../certificates/pre_br_validity_ok.req
|
| -CA_COMMON_NAME="Test Root CA" \
|
| - try openssl ca \
|
| - -batch \
|
| - -extensions user_cert \
|
| - -startdate 080101000000Z \
|
| - -enddate 150101000000Z \
|
| - -in ../certificates/pre_br_validity_ok.req \
|
| - -out ../certificates/pre_br_validity_ok.pem \
|
| - -config ca.cnf
|
| -try openssl req -config ../scripts/ee.cnf \
|
| - -newkey rsa:2048 -text -out ../certificates/pre_br_validity_ok.req
|
| -# Issued pre-BRs, lifetime > 120 months, expires before 2019-07-01
|
| -try openssl req -config ../scripts/ee.cnf \
|
| - -newkey rsa:2048 -text -out ../certificates/pre_br_validity_bad_121.req
|
| -CA_COMMON_NAME="Test Root CA" \
|
| - try openssl ca \
|
| - -batch \
|
| - -extensions user_cert \
|
| - -startdate 080101000000Z \
|
| - -enddate 180501000000Z \
|
| - -in ../certificates/pre_br_validity_bad_121.req \
|
| - -out ../certificates/pre_br_validity_bad_121.pem \
|
| - -config ca.cnf
|
| -try openssl req -config ../scripts/ee.cnf \
|
| - -newkey rsa:2048 -text -out ../certificates/pre_br_validity_bad_121.req
|
| -# Issued pre-BRs, lifetime < 120 months, expires after 2019-07-01
|
| -try openssl req -config ../scripts/ee.cnf \
|
| - -newkey rsa:2048 -text -out ../certificates/pre_br_validity_bad_2020.req
|
| -CA_COMMON_NAME="Test Root CA" \
|
| - try openssl ca \
|
| - -batch \
|
| - -extensions user_cert \
|
| - -startdate 120501000000Z \
|
| - -enddate 190703000000Z \
|
| - -in ../certificates/pre_br_validity_bad_2020.req \
|
| - -out ../certificates/pre_br_validity_bad_2020.pem \
|
| - -config ca.cnf
|
| -try openssl req -config ../scripts/ee.cnf \
|
| - -newkey rsa:2048 -text -out ../certificates/pre_br_validity_bad_2020.req
|
| -
|
| -# Regenerate CRLSets
|
| -## Block a leaf cert directly by SPKI
|
| -try python crlsetutil.py -o ../certificates/crlset_by_leaf_spki.raw \
|
| -<<CRLBYLEAFSPKI
|
| -{
|
| - "BlockedBySPKI": ["../certificates/ok_cert.pem"]
|
| -}
|
| -CRLBYLEAFSPKI
|
| -
|
| -## Block a leaf cert by issuer-hash-and-serial (ok_cert.pem == serial 2, by
|
| -## virtue of the serial file and ordering above.
|
| -try python crlsetutil.py -o ../certificates/crlset_by_root_serial.raw \
|
| -<<CRLBYROOTSERIAL
|
| -{
|
| - "BlockedByHash": {
|
| - "../certificates/root_ca_cert.pem": [2]
|
| - }
|
| -}
|
| -CRLBYROOTSERIAL
|
| -
|
| -## Block a leaf cert by issuer-hash-and-serial. However, this will be issued
|
| -## from an intermediate CA issued underneath a root.
|
| -try python crlsetutil.py -o ../certificates/crlset_by_intermediate_serial.raw \
|
| -<<CRLSETBYINTERMEDIATESERIAL
|
| -{
|
| - "BlockedByHash": {
|
| - "../certificates/quic_intermediate.crt": [3]
|
| - }
|
| -}
|
| -CRLSETBYINTERMEDIATESERIAL
|
|
|