clean-certs:
- rm -f ca.key ca.pem ca.srl server.csr server.key server.pem server.chain server.ocsp
+ rm -f ca.key ca.pem ca.srl server.csr server.key server.pem server.chain server.ocsp client csr clien.pem client.key client.p12
clean-configs:
rm -rf configs/*
certs:
# Generate a new CA
- openssl req -new -x509 -days 1 -extensions v3_ca -keyout ca.key -out ca.pem -nodes -config configCA.conf
+ openssl req -quiet -new -x509 -days 1 -extensions v3_ca -keyout ca.key -out ca.pem -nodes -config configCA.conf
# Generate a new server certificate request
- openssl req -new -newkey rsa:2048 -nodes -keyout server.key -out server.csr -config configServer.conf
+ openssl req -quiet -new -newkey rsa:2048 -nodes -keyout server.key -out server.csr -config configServer.conf
# Sign the server cert
openssl x509 -req -days 1 -CA ca.pem -CAkey ca.key -CAcreateserial -in server.csr -out server.pem -extfile configServer.conf -extensions v3_req
# Generate a chain
cat server.pem ca.pem > server.chain
# Generate a password-protected PKCS12 file
- openssl pkcs12 -export -passout pass:passw0rd -clcerts -in server.pem -CAfile ca.pem -inkey server.key -out server.p12
+ openssl pkcs12 -export -passout pass:passw0rd -in server.pem -CAfile ca.pem -inkey server.key -out server.p12
+
+ # Generate a new client certificate request
+ openssl req -quiet -new -newkey rsa:2048 -nodes -keyout client.key -out client.csr -config configClient.conf
+ # Sign the client cert
+ openssl x509 -req -days 1 -CA ca.pem -CAkey ca.key -CAcreateserial -in client.csr -out client.pem -extfile configClient.conf -extensions v3_req
+ # Generate a chain
+ cat client.pem ca.pem > client.chain
+ # Generate a password-protected PKCS12 file
+ openssl pkcs12 -export -passout pass:passw0rd -in client.pem -CAfile ca.pem -inkey client.key -out client.p12