5 [ "$1" == "" ] && echo "Usage: $0 <year>" && exit 1
12 crlDistributionPoints=URI:http://g2.crl.cacert.org/g2/$year/env.crl
13 authorityInfoAccess = OCSP;URI:http://g2.ocsp.cacert.org,caIssuers;URI:http://g2.crt.cacert.org/$year/env.crt"
15 cat <<TESTCA > req.cnf
16 basicConstraints = critical,CA:false
17 keyUsage = keyEncipherment, digitalSignature
18 extendedKeyUsage=serverAuth
19 subjectKeyIdentifier = hash
20 authorityKeyIdentifier = keyid:always,issuer:always
24 cat <<TESTCA > reqClient.cnf
25 basicConstraints = critical,CA:false
26 keyUsage = keyEncipherment, digitalSignature
27 extendedKeyUsage=clientAuth
28 subjectKeyIdentifier = hash
29 authorityKeyIdentifier = keyid:always,issuer:always
33 cat <<TESTCA > reqMail.cnf
34 basicConstraints = critical,CA:false
35 keyUsage = keyEncipherment, digitalSignature
36 extendedKeyUsage=emailProtection
37 subjectKeyIdentifier = hash
38 authorityKeyIdentifier = keyid:always,issuer:always
42 genserver(){ #key, subject, config
43 openssl genrsa -out $1.key ${KEYSIZE}
44 openssl req -new -key $1.key -out $1.csr -subj "$2"
45 caSign $1 $year/ca/env_${year}_1 "$3"
47 openssl pkcs12 -inkey $1.key -in $1.crt -CAfile env.chain.crt -chain -name $1 -export -passout pass:changeit -out $1.pkcs12
53 cat $year/ca/env_${year}_1.ca/key.crt env.ca/key.crt root.ca/key.crt > env.chain.crt
55 # generate environment-keys specific to gigi.
56 # first the server keys
57 genserver $year/keys/www "/CN=www.${DOMAIN}" req.cnf
58 genserver $year/keys/secure "/CN=secure.${DOMAIN}" req.cnf
59 genserver $year/keys/static "/CN=static.${DOMAIN}" req.cnf
60 genserver $year/keys/api "/CN=api.${DOMAIN}" req.cnf
62 # then the email signing key
63 genserver $year/keys/mail "/emailAddress=support@${DOMAIN}" reqMail.cnf
65 # then environment-keys for cassiopeia
66 genserver $year/keys/signer_client "/CN=CAcert signer handler 1" reqClient.cnf
67 genserver $year/keys/signer_server "/CN=CAcert signer 1" req.cnf
69 rm req.cnf reqMail.cnf reqClient.cnf