3
# ***** BEGIN LICENSE BLOCK *****
4
# Version: MPL 1.1/GPL 2.0/LGPL 2.1
6
# The contents of this file are subject to the Mozilla Public License Version
7
# 1.1 (the "License"); you may not use this file except in compliance with
8
# the License. You may obtain a copy of the License at
9
# http://www.mozilla.org/MPL/
11
# Software distributed under the License is distributed on an "AS IS" basis,
12
# WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
13
# for the specific language governing rights and limitations under the
16
# The Original Code is the Netscape security libraries.
18
# The Initial Developer of the Original Code is
19
# Netscape Communications Corporation.
20
# Portions created by the Initial Developer are Copyright (C) 1994-2000
21
# the Initial Developer. All Rights Reserved.
25
# Alternatively, the contents of this file may be used under the terms of
26
# either the GNU General Public License Version 2 or later (the "GPL"), or
27
# the GNU Lesser General Public License Version 2.1 or later (the "LGPL"),
28
# in which case the provisions of the GPL or the LGPL are applicable instead
29
# of those above. If you wish to allow use of your version of this file only
30
# under the terms of either the GPL or the LGPL, and not to allow others to
31
# use your version of this file under the terms of the MPL, indicate your
32
# decision by deleting the provisions above and replace them with the notice
33
# and other provisions required by the GPL or the LGPL. If you do not delete
34
# the provisions above, a recipient may use your version of this file under
35
# the terms of any one of the MPL, the GPL or the LGPL.
37
# ***** END LICENSE BLOCK *****
39
# Directory for db's, use in all subsequent -d flags.
44
echo sample > passfile
46
# Generate the db files, using the above password.
47
certutil -N -d SampleCertDBs -f passfile
49
# Generate the CA cert. This cert is self-signed and only useful for
50
# test purposes. Set the trust bits to allow it to sign SSL client/server
52
certutil -S -n SampleRootCA -x -t "CTu,CTu,CTu" \
53
-s "CN=My Sample Root CA, O=My Organization" \
54
-m 25000 -o ./SampleCertDBs/SampleRootCA.crt \
55
-d SampleCertDBs -f passfile
57
# Generate the server cert. This cert is signed by the CA cert generated
58
# above. The CN must be hostname.domain.[com|org|net|...].
59
certutil -S -n SampleSSLServerCert -c SampleRootCA -t "u,u,u" \
60
-s "CN=$HOSTNAME.$MYDOMAIN, O=$HOSTNAME Corp." \
61
-m 25001 -o ./SampleCertDBs/SampleSSLServer.crt \
62
-d SampleCertDBs -f passfile
64
# Generate the client cert. This cert is signed by the CA cert generated
66
certutil -S -n SampleSSLClientCert -c SampleRootCA -t "u,u,u" \
67
-s "CN=My Client Cert, O=Client Organization" \
68
-m 25002 -o ./SampleCertDBs/SampleSSLClient.crt \
69
-d SampleCertDBs -f passfile
71
# Verify the certificates.
72
certutil -V -u V -n SampleSSLServerCert -d SampleCertDBs
73
certutil -V -u C -n SampleSSLClientCert -d SampleCertDBs
75
# Remove unneccessary files.
79
# You are now ready to run your client/server! Example command lines:
80
# server -n SampleSSLServerCert -p 8080 -d SampleCertDBs -w sample -c e -R
81
# client -n SampleSSLClientCert -p 8080 -d SampleCertDBs -w sample -c 2 trane.mcom.com