@@ -85,53 +85,6 @@ generate_server_certs() {
85
85
fi
86
86
}
87
87
88
- # Use the openssl for key, CSR generation for sofware backed keys.
89
- # Generate the client key and certificate signed by CA
90
- # inputs:
91
- # client directory
92
- # certificate directory
93
- generate_client_certs () {
94
- CLIENT_DIRECTORY=$1
95
- CLIENT_CERTIFICATE=${CLIENT_DIRECTORY} /client_cert.pem
96
- CLIENT_CSR=${CLIENT_DIRECTORY} /client_cert.csr
97
- CLIENT_PRIV_KEY=${CLIENT_DIRECTORY} /client_priv_key.pem
98
-
99
- CA_DIRECTORY=$2
100
- CA_CERTIFICATE=${CA_DIRECTORY} /ca_cert.pem
101
- CA_PRIV_KEY=${CA_DIRECTORY} /ca_priv_key.pem
102
-
103
- if [ ! -f " ${CLIENT_CSR} " ]; then
104
- mkdir -p " ${CLIENT_DIRECTORY} " > /dev/null 2>&1
105
- chmod 700 " ${CLIENT_DIRECTORY} "
106
-
107
- # Generate private key
108
- openssl genrsa -out " ${CLIENT_PRIV_KEY} " 2048 > /dev/null 2>&1
109
- if [ $? -ne 0 ]; then
110
- echo " FAILED TO GENERATE KEY"
111
- exit 1
112
- fi
113
-
114
- # Generate certificate request via OpenSSL
115
- openssl req -new \
116
- -key " ${CLIENT_PRIV_KEY} " \
117
- -out " ${CLIENT_CSR} " \
118
- -subj " /C=UK/ST=Parsec /L=Parsec/O=Parsec/CN=parsec_client.com" > /dev/null 2>&1
119
- if [ $? -ne 0 ]; then
120
- echo " FAILED TO GENERATE CERTIFICATE REQUEST"
121
- exit 1
122
- fi
123
-
124
- # Generate certificate
125
- openssl x509 -req -days 1000 -in " ${CLIENT_CSR} " \
126
- -CA " ${CA_CERTIFICATE} " -CAkey " ${CA_PRIV_KEY} " \
127
- -CAcreateserial -out " ${CLIENT_CERTIFICATE} " > /dev/null 2>&1
128
-
129
- echo " SUCCESS"
130
- else
131
- echo " SKIPPED"
132
- fi
133
- }
134
-
135
88
# use the parsec-tool for key, CSR generation for hardware backed keys.
136
89
# Generate the client key and certificate signed by CA
137
90
# inputs:
@@ -143,7 +96,6 @@ generate_client_certs_parsec() {
143
96
CLIENT_DIRECTORY=$1
144
97
CLIENT_CERTIFICATE=${CLIENT_DIRECTORY} /$3 .pem
145
98
CLIENT_CSR=${CLIENT_DIRECTORY} /$3 .csr
146
- CLIENT_PRIV_KEY=${CLIENT_DIRECTORY} /client_priv_key.pem
147
99
148
100
CA_DIRECTORY=$2
149
101
CA_CERTIFICATE=${CA_DIRECTORY} /ca_cert.pem
@@ -153,23 +105,6 @@ generate_client_certs_parsec() {
153
105
mkdir -p " ${CLIENT_DIRECTORY} " > /dev/null 2>&1
154
106
chmod 700 " ${CLIENT_DIRECTORY} "
155
107
156
- # Generate private key
157
- openssl genrsa -out " ${CLIENT_PRIV_KEY} " 2048 > /dev/null 2>&1
158
- if [ $? -ne 0 ]; then
159
- echo " FAILED TO GENERATE KEY"
160
- exit 1
161
- fi
162
-
163
- # Generate certificate request
164
- openssl req -new \
165
- -key " ${CLIENT_PRIV_KEY} " \
166
- -out " ${CLIENT_CSR} " \
167
- -subj " /C=UK/ST=Parsec /L=Parsec/O=Parsec/CN=parsec_client.com" > /dev/null 2>&1
168
- if [ $? -ne 0 ]; then
169
- echo " FAILED TO GENERATE CERTIFICATE REQUEST"
170
- exit 1
171
- fi
172
-
173
108
# Generate certificate request via Parsec
174
109
parsec-tool create-csr --cn parsec_client.com --l Parsec --c UK --st Parsec --o Parsec --key-name $4 > ${CLIENT_CSR}
175
110
@@ -198,9 +133,6 @@ echo -n "Generating client certificate: "
198
133
generate_client_certs_parsec ./tls/client ./tls/ca parsec_rsa PARSEC_TEST_RSA_KEY
199
134
generate_client_certs_parsec ./tls/client ./tls/ca parsec_ecdsa PARSEC_TEST_ECDSA_KEY
200
135
201
- echo -n " Generating openssl client private key and certificate: "
202
- generate_client_certs ./tls/client ./tls/ca
203
-
204
136
echo -n " Generating fake certificate authority private key and certificate: "
205
137
generate_ca_certs ./tls/fake_ca
206
138
0 commit comments