]> git.saurik.com Git - apple/security.git/blobdiff - SecurityTests/clxutils/sslScripts/openssl/opensslTest
Security-57031.1.35.tar.gz
[apple/security.git] / SecurityTests / clxutils / sslScripts / openssl / opensslTest
diff --git a/SecurityTests/clxutils/sslScripts/openssl/opensslTest b/SecurityTests/clxutils/sslScripts/openssl/opensslTest
new file mode 100755 (executable)
index 0000000..9ac9f5f
--- /dev/null
@@ -0,0 +1,49 @@
+#!/bin/csh
+# openssl/certtool compatibility
+#
+# openssl file arguments
+set CSR_FILE=new.cert.csr
+set PRIV_KEY_ENCR=privkey.pem
+set PRIV_RAW_KEY_PEM=new.key.pem
+set CERT_FILE_PEM=new.cert.pem
+set CERT_FILE_DER=new.cert.der
+#
+echo Preparing to delete $CSR_FILE $PRIV_KEY_ENCR $PRIV_RAW_KEY_PEM $CERT_FILE_PEM $CERT_FILE_DER
+echo Ctl-c to abort, or....
+doprompt
+rm -f $CSR_FILE $PRIV_KEY_ENCR $PRIV_RAW_KEY_PEM $CERT_FILE_PEM $CERT_FILE_DER
+#
+# 1. Create the key and request. This will require
+#    some user interaction.
+#
+set cmd="openssl req -new"
+echo $cmd \> $CSR_FILE
+$cmd > $CSR_FILE || exit(1)
+echo ...$PRIV_KEY_ENCR contains encrypted signing key in PEM format.
+#
+# 2. Remove the passphrase from the key.
+#
+set cmd="openssl rsa -in $PRIV_KEY_ENCR -out $PRIV_RAW_KEY_PEM"
+echo $cmd
+$cmd || exit(1)
+echo ...$PRIV_RAW_KEY_PEM contains raw signing key in PEM format. 
+#
+# 3. Convert request into signed cert.
+#
+set cmd="openssl x509 -in $CSR_FILE -out $CERT_FILE_PEM -req -signkey $PRIV_RAW_KEY_PEM -days 365"
+echo $cmd
+$cmd || exit(1)
+echo ...$CERT_FILE_PEM contains signing cert in PEM format. 
+#
+# 4. convert cert to DER form for use by sslViewer
+#
+set cmd="openssl x509 -inform PEM -outform DER -in $CERT_FILE_PEM -out $CERT_FILE_DER"
+echo $cmd
+$cmd || exit(1)
+echo ...$CERT_FILE_DER contains cert in DER format. 
+#
+echo preparing to run runServeView script. Ctl-c to abort, or....
+doprompt
+./runServeView || exit(1)
+#
+echo === COMPLETE ===