START lib/libcrypto/CA 2024-04-25T08:59:07Z ==== clean ==== rm -f a.out [Ee]rrs mklog *.core y.tab.h *.pem *.serial *.txt *.attr *.old stamp-clean stamp-root.serial stamp-intermediate.serial stamp-root.txt stamp-intermediate.txt ==== root.serial ==== echo 1000 >root.serial ==== intermediate.serial ==== echo 1000 >intermediate.serial ==== root.txt ==== true >root.txt ==== intermediate.txt ==== true >intermediate.txt ==== run-verify-intermediate ==== # generate root rsa 4096 key openssl genrsa -out root.key.pem 4096 Generating RSA private key, 4096 bit long modulus ........................................................................... .......... e is 65537 (0x010001) # generate root cert openssl req -batch -config /usr/src/regress/lib/libcrypto/CA/root.cnf -key root.key.pem -new -x509 -days 365 -sha256 -extensions v3_ca -out root.cert.pem # generate intermediate rsa 2048 key openssl genrsa -out intermediate.key.pem 2048 Generating RSA private key, 2048 bit long modulus ........................................................................................... ....... e is 65537 (0x010001) # generate intermediate req openssl req -batch -config /usr/src/regress/lib/libcrypto/CA/intermediate.cnf -new -sha256 -key intermediate.key.pem -out intermediate.csr.pem # sign intermediate openssl ca -batch -config /usr/src/regress/lib/libcrypto/CA/root.cnf -extensions v3_intermediate_ca -days 10 -notext -md sha256 -in intermediate.csr.pem -out intermediate.cert.pem Using configuration from /usr/src/regress/lib/libcrypto/CA/root.cnf Check that the request matches the signature Signature ok Certificate Details: Serial Number: 4096 (0x1000) Validity Not Before: Apr 25 08:59:11 2024 GMT Not After : May 5 08:59:11 2024 GMT Subject: countryName = CA stateOrProvinceName = Alberta organizationName = OpenBSD organizationalUnitName = So and Sos commonName = Regress Intermediate CA emailAddress = evilsoandsos@openbsd.org X509v3 extensions: X509v3 Subject Key Identifier: C3:74:D2:7D:09:7F:D4:23:0D:62:20:19:EE:8D:E0:12:9B:6B:0C:45 X509v3 Authority Key Identifier: keyid:76:1A:6A:2B:9D:52:D3:B8:D6:69:5C:8B:8E:3E:49:FE:CE:8C:7F:21 X509v3 Basic Constraints: critical CA:TRUE, pathlen:0 X509v3 Key Usage: critical Digital Signature, Certificate Sign, CRL Sign X509v3 Name Constraints: critical Permitted: DNS:.openbsd.org DNS:client email:openbsd.org email:@test.openbsd.org URI:.openbsd.org DirName: C = CA, O = OpenBSD othername: Excluded: IP:0.0.0.0/0.0.0.0 IP:0:0:0:0:0:0:0:0/0:0:0:0:0:0:0:0 Certificate is to be certified until May 5 08:59:11 2024 GMT (10 days) Write out database with 1 new entries Data Base Updated # validate intermediate CA openssl verify -CAfile root.cert.pem intermediate.cert.pem intermediate.cert.pem: OK ==== run-verify-server ==== cat intermediate.cert.pem root.cert.pem > chain.pem # genrsa server openssl genrsa -out server.key.pem 2048 Generating RSA private key, 2048 bit long modulus ............................................ ............................................................ e is 65537 (0x010001) # server req openssl req -batch -config /usr/src/regress/lib/libcrypto/CA/intermediate.cnf -new -sha256 -subj '/CN=server.openbsd.org/OU=So and Sos/O=OpenBSD/C=CA' -key server.key.pem -out server.csr.pem # server sign openssl ca -batch -config /usr/src/regress/lib/libcrypto/CA/intermediate.cnf -extensions server_cert -days 5 -notext -md sha256 -in server.csr.pem -out server.cert.pem Using configuration from /usr/src/regress/lib/libcrypto/CA/intermediate.cnf Check that the request matches the signature Signature ok Certificate Details: Serial Number: 4096 (0x1000) Validity Not Before: Apr 25 08:59:12 2024 GMT Not After : Apr 30 08:59:12 2024 GMT Subject: countryName = CA organizationName = OpenBSD organizationalUnitName = So and Sos commonName = server.openbsd.org X509v3 extensions: X509v3 Basic Constraints: CA:FALSE Netscape Cert Type: SSL Server Netscape Comment: OpenSSL Generated Server Certificate X509v3 Subject Key Identifier: 01:A6:83:0E:2A:65:9A:B6:DA:84:A1:BB:2C:A3:22:CE:57:83:A0:32 X509v3 Authority Key Identifier: keyid:C3:74:D2:7D:09:7F:D4:23:0D:62:20:19:EE:8D:E0:12:9B:6B:0C:45 DirName:/C=CA/ST=Alberta/L=Edmonton/O=OpenBSD/OU=So and Sos/CN=Regress Root CA/emailAddress=evilsoandsos@openbsd.org serial:10:00 X509v3 Key Usage: critical Digital Signature, Key Encipherment X509v3 Extended Key Usage: TLS Web Server Authentication Certificate is to be certified until Apr 30 08:59:12 2024 GMT (5 days) Write out database with 1 new entries Data Base Updated # validate server cert openssl verify -purpose sslserver -CAfile chain.pem server.cert.pem server.cert.pem: OK ==== run-verify-client ==== # genrsa client openssl genrsa -out client.key.pem 2048 Generating RSA private key, 2048 bit long modulus ................................................................................... ............. e is 65537 (0x010001) # client req openssl req -batch -config /usr/src/regress/lib/libcrypto/CA/intermediate.cnf -new -sha256 -subj '/CN=client/OU=So and Sos/O=OpenBSD/C=CA' -key client.key.pem -out client.csr.pem # client sign openssl ca -batch -config /usr/src/regress/lib/libcrypto/CA/intermediate.cnf -extensions usr_cert -days 5 -notext -md sha256 -in client.csr.pem -out client.cert.pem Using configuration from /usr/src/regress/lib/libcrypto/CA/intermediate.cnf Check that the request matches the signature Signature ok Certificate Details: Serial Number: 4097 (0x1001) Validity Not Before: Apr 25 08:59:13 2024 GMT Not After : Apr 30 08:59:13 2024 GMT Subject: countryName = CA organizationName = OpenBSD organizationalUnitName = So and Sos commonName = client X509v3 extensions: X509v3 Basic Constraints: CA:FALSE Netscape Cert Type: SSL Client, S/MIME Netscape Comment: OpenSSL Generated Client Certificate X509v3 Subject Key Identifier: D4:C2:AD:90:59:19:99:58:54:97:3A:00:3E:3D:96:C3:C1:36:5A:91 X509v3 Authority Key Identifier: keyid:C3:74:D2:7D:09:7F:D4:23:0D:62:20:19:EE:8D:E0:12:9B:6B:0C:45 X509v3 Key Usage: critical Digital Signature, Non Repudiation, Key Encipherment X509v3 Extended Key Usage: TLS Web Client Authentication, E-mail Protection X509v3 Subject Alternative Name: critical email:evilsoandsos@test.openbsd.org Certificate is to be certified until Apr 30 08:59:13 2024 GMT (5 days) Write out database with 1 new entries Data Base Updated # validate client cert openssl verify -purpose sslclient -CAfile chain.pem client.cert.pem client.cert.pem: OK PASS lib/libcrypto/CA Duration 0m05.74s