1e1051a39Sopenharmony_ci#!/bin/sh
2e1051a39Sopenharmony_ci# Copyright 2013-2022 The OpenSSL Project Authors. All Rights Reserved.
3e1051a39Sopenharmony_ci#
4e1051a39Sopenharmony_ci# Licensed under the Apache License 2.0 (the "License").  You may not use
5e1051a39Sopenharmony_ci# this file except in compliance with the License.  You can obtain a copy
6e1051a39Sopenharmony_ci# in the file LICENSE in the source distribution or at
7e1051a39Sopenharmony_ci# https://www.openssl.org/source/license.html
8e1051a39Sopenharmony_ci
9e1051a39Sopenharmony_ci
10e1051a39Sopenharmony_ci# Utility to recreate S/MIME certificates
11e1051a39Sopenharmony_ci
12e1051a39Sopenharmony_ciOPENSSL=../../apps/openssl
13e1051a39Sopenharmony_ciOPENSSL_CONF=./ca.cnf
14e1051a39Sopenharmony_ciexport OPENSSL_CONF
15e1051a39Sopenharmony_ci
16e1051a39Sopenharmony_ci# Root CA: create certificate directly
17e1051a39Sopenharmony_ciCN="Test S/MIME RSA Root" $OPENSSL req -config ca.cnf -x509 -noenc \
18e1051a39Sopenharmony_ci	-keyout smroot.pem -out smroot.pem -newkey rsa:2048 -days 36501
19e1051a39Sopenharmony_ci
20e1051a39Sopenharmony_ci# EE RSA certificates: create request first
21e1051a39Sopenharmony_ciCN="Test S/MIME EE RSA #1" $OPENSSL req -config ca.cnf -noenc \
22e1051a39Sopenharmony_ci	-keyout smrsa1.pem -out req.pem -newkey rsa:2048
23e1051a39Sopenharmony_ci# Sign request: end entity extensions
24e1051a39Sopenharmony_ci$OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \
25e1051a39Sopenharmony_ci	-extfile ca.cnf -extensions usr_cert -CAcreateserial >>smrsa1.pem
26e1051a39Sopenharmony_ci
27e1051a39Sopenharmony_ciCN="Test S/MIME EE RSA #2" $OPENSSL req -config ca.cnf -noenc \
28e1051a39Sopenharmony_ci	-keyout smrsa2.pem -out req.pem -newkey rsa:2048
29e1051a39Sopenharmony_ci$OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \
30e1051a39Sopenharmony_ci	-extfile ca.cnf -extensions usr_cert -CAcreateserial >>smrsa2.pem
31e1051a39Sopenharmony_ci
32e1051a39Sopenharmony_ciCN="Test S/MIME EE RSA #3" $OPENSSL req -config ca.cnf -noenc \
33e1051a39Sopenharmony_ci	-keyout smrsa3.pem -out req.pem -newkey rsa:2048
34e1051a39Sopenharmony_ci$OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \
35e1051a39Sopenharmony_ci	-extfile ca.cnf -extensions usr_cert -CAcreateserial >>smrsa3.pem
36e1051a39Sopenharmony_ci
37e1051a39Sopenharmony_ci# Create DSA parameters
38e1051a39Sopenharmony_ci
39e1051a39Sopenharmony_ci$OPENSSL dsaparam -out dsap.pem 2048
40e1051a39Sopenharmony_ci
41e1051a39Sopenharmony_ciCN="Test S/MIME EE DSA #1" $OPENSSL req -config ca.cnf -noenc \
42e1051a39Sopenharmony_ci	-keyout smdsa1.pem -out req.pem -newkey dsa:dsap.pem
43e1051a39Sopenharmony_ci$OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \
44e1051a39Sopenharmony_ci	-extfile ca.cnf -extensions usr_cert -CAcreateserial >>smdsa1.pem
45e1051a39Sopenharmony_ciCN="Test S/MIME EE DSA #2" $OPENSSL req -config ca.cnf -noenc \
46e1051a39Sopenharmony_ci	-keyout smdsa2.pem -out req.pem -newkey dsa:dsap.pem
47e1051a39Sopenharmony_ci$OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \
48e1051a39Sopenharmony_ci	-extfile ca.cnf -extensions usr_cert -CAcreateserial >>smdsa2.pem
49e1051a39Sopenharmony_ciCN="Test S/MIME EE DSA #3" $OPENSSL req -config ca.cnf -noenc \
50e1051a39Sopenharmony_ci	-keyout smdsa3.pem -out req.pem -newkey dsa:dsap.pem
51e1051a39Sopenharmony_ci$OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \
52e1051a39Sopenharmony_ci	-extfile ca.cnf -extensions usr_cert -CAcreateserial >>smdsa3.pem
53e1051a39Sopenharmony_ci
54e1051a39Sopenharmony_ci# Create EC parameters
55e1051a39Sopenharmony_ci
56e1051a39Sopenharmony_ci$OPENSSL ecparam -out ecp.pem -name P-256
57e1051a39Sopenharmony_ci$OPENSSL ecparam -out ecp2.pem -name K-283
58e1051a39Sopenharmony_ci
59e1051a39Sopenharmony_ciCN="Test S/MIME EE EC #1" $OPENSSL req -config ca.cnf -noenc \
60e1051a39Sopenharmony_ci	-keyout smec1.pem -out req.pem -newkey ec:ecp.pem
61e1051a39Sopenharmony_ci$OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \
62e1051a39Sopenharmony_ci	-extfile ca.cnf -extensions usr_cert -CAcreateserial >>smec1.pem
63e1051a39Sopenharmony_ciCN="Test S/MIME EE EC #2" $OPENSSL req -config ca.cnf -noenc \
64e1051a39Sopenharmony_ci	-keyout smec2.pem -out req.pem -newkey ec:ecp2.pem
65e1051a39Sopenharmony_ci$OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \
66e1051a39Sopenharmony_ci	-extfile ca.cnf -extensions usr_cert -CAcreateserial >>smec2.pem
67e1051a39Sopenharmony_ci# Do not renew this cert as it is used for legacy data decrypt test
68e1051a39Sopenharmony_ci#CN="Test S/MIME EE EC #3" $OPENSSL req -config ca.cnf -noenc \
69e1051a39Sopenharmony_ci#	-keyout smec3.pem -out req.pem -newkey ec:ecp.pem
70e1051a39Sopenharmony_ci#$OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \
71e1051a39Sopenharmony_ci#	-extfile ca.cnf -extensions usr_cert -CAcreateserial >>smec3.pem
72e1051a39Sopenharmony_ci# Create X9.42 DH parameters.
73e1051a39Sopenharmony_ci$OPENSSL genpkey -genparam -algorithm DHX -out dhp.pem
74e1051a39Sopenharmony_ci# Generate X9.42 DH key.
75e1051a39Sopenharmony_ci$OPENSSL genpkey -paramfile dhp.pem -out smdh.pem
76e1051a39Sopenharmony_ci$OPENSSL pkey -pubout -in smdh.pem -out dhpub.pem
77e1051a39Sopenharmony_ci# Generate dummy request.
78e1051a39Sopenharmony_ciCN="Test S/MIME EE DH #1" $OPENSSL req -config ca.cnf -noenc \
79e1051a39Sopenharmony_ci	-keyout smtmp.pem -out req.pem -newkey rsa:2048
80e1051a39Sopenharmony_ci# Sign request but force public key to DH
81e1051a39Sopenharmony_ci$OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \
82e1051a39Sopenharmony_ci	-force_pubkey dhpub.pem \
83e1051a39Sopenharmony_ci	-extfile ca.cnf -extensions usr_cert -CAcreateserial >>smdh.pem
84e1051a39Sopenharmony_ci# Remove temp files.
85e1051a39Sopenharmony_cirm -f req.pem ecp.pem ecp2.pem dsap.pem dhp.pem dhpub.pem smtmp.pem smroot.srl
86