tlcpdemo.sh 2.2 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243
  1. #!/bin/bash -x
  2. #set -e # which sudo will cause failure on windows
  3. gmssl sm2keygen -pass 1234 -out rootcakey.pem
  4. gmssl certgen -C CN -ST Beijing -L Haidian -O PKU -OU CS -CN ROOTCA -days 3650 -key rootcakey.pem -pass 1234 -out rootcacert.pem -key_usage keyCertSign -key_usage cRLSign -ca
  5. gmssl certparse -in rootcacert.pem
  6. gmssl sm2keygen -pass 1234 -out cakey.pem
  7. gmssl reqgen -C CN -ST Beijing -L Haidian -O PKU -OU CS -CN "Sub CA" -key cakey.pem -pass 1234 -out careq.pem
  8. gmssl reqsign -in careq.pem -days 365 -key_usage keyCertSign -ca -path_len_constraint 0 -cacert rootcacert.pem -key rootcakey.pem -pass 1234 -out cacert.pem
  9. gmssl certparse -in cacert.pem
  10. gmssl sm2keygen -pass 1234 -out signkey.pem
  11. gmssl reqgen -C CN -ST Beijing -L Haidian -O PKU -OU CS -CN localhost -key signkey.pem -pass 1234 -out signreq.pem
  12. gmssl reqsign -in signreq.pem -days 365 -key_usage digitalSignature -cacert cacert.pem -key cakey.pem -pass 1234 -out signcert.pem
  13. gmssl certparse -in signcert.pem
  14. gmssl sm2keygen -pass 1234 -out enckey.pem
  15. gmssl reqgen -C CN -ST Beijing -L Haidian -O PKU -OU CS -CN localhost -key enckey.pem -pass 1234 -out encreq.pem
  16. gmssl reqsign -in encreq.pem -days 365 -key_usage keyEncipherment -cacert cacert.pem -key cakey.pem -pass 1234 -out enccert.pem
  17. gmssl certparse -in enccert.pem
  18. cat signcert.pem > double_certs.pem
  19. cat enccert.pem >> double_certs.pem
  20. cat cacert.pem >> double_certs.pem
  21. # If port is already in use, `gmssl` will fail, use `ps aux | grep gmssl` and `sudo kill -9` to kill existing proc
  22. # TODO: check if `gmssl` is failed
  23. which sudo
  24. if [ $? -eq 0 ]; then
  25. SUDO=sudo
  26. fi
  27. $SUDO gmssl tlcp_server -port 443 -cert double_certs.pem -key signkey.pem -pass 1234 -ex_key enckey.pem -ex_pass 1234 -cacert cacert.pem & 1>/dev/null 2>/dev/null &
  28. sleep 3
  29. gmssl sm2keygen -pass 1234 -out clientkey.pem
  30. gmssl reqgen -C CN -ST Beijing -L Haidian -O PKU -OU CS -CN Client -key clientkey.pem -pass 1234 -out clientreq.pem
  31. gmssl reqsign -in clientreq.pem -days 365 -key_usage digitalSignature -cacert cacert.pem -key cakey.pem -pass 1234 -out clientcert.pem
  32. gmssl certparse -in clientcert.pem
  33. gmssl tlcp_client -host 127.0.0.1 -cacert rootcacert.pem -cert clientcert.pem -key clientkey.pem -pass 1234