openssl3.2 - 官方demo学习 - test - certs
// \file my_openssl_linux_log_doc_013.txt
// \note openssl3.2/test/certs - 013 - primary server-EKU root: sroot-cert
// --------------------------------------------------------------------------------
// 官方脚本
// --------------------------------------------------------------------------------
// openssl3.2/test/certs - 013 - primary server-EKU root: sroot-cert
./mkcert.sh genroot “Root CA” root-key sroot-cert serverAuth
// --------------------------------------------------------------------------------
// openssl命令行整理/分析
// --------------------------------------------------------------------------------
// cmd1
openssl genpkey -algorithm rsa -pkeyopt rsa_keygen_bits:2048 -out root-key.pem
// cmd2
config file = config_cmd2.txt
string_mask=utf8only
[req]
prompt = no
distinguished_name = dn
[dn]
CN = Root CA
openssl req -new -sha256 -key root-key.pem -config config_cmd2.txt -out root-key-req.pem
// cmd3
config fle = extfile_cmd3.txt
basicConstraints = critical,CA:true
keyUsage = keyCertSign,cRLSign
subjectKeyIdentifier = hash
authorityKeyIdentifier = keyid
extendedKeyUsage = serverAuth
openssl x509 -req -sha256 -out sroot-cert.pem -extfile extfile_cmd3.txt -signkey root-key.pem -set_serial 1 -days 36525 -in root-key-req.pem
// --------------------------------------------------------------------------------
// 改版的openssl入口记录的日志
// --------------------------------------------------------------------------------
// cmd1
openssl genpkey -algorithm rsa -pkeyopt rsa_keygen_bits:2048 -out root-key.pem
// cmd2
openssl req -new -sha256 -key root-key.pem -config /dev/fd/63
-config /dev/fd/63 => /home/lostspeed/openssl/openssl-3.2.0_debian/test/certs/my_openssl_linux_log.txt
string_mask=utf8only
[req]
prompt = no
distinguished_name = dn
[dn]
CN = Root CA
// cmd3
openssl x509 -req -sha256 -out sroot-cert.pem -extfile /dev/fd/63 -signkey root-key.pem -set_serial 1 -days 36525
-extfile /dev/fd/63 => /home/lostspeed/openssl/openssl-3.2.0_debian/test/certs/my_openssl_linux_log.txt
basicConstraints = critical,CA:true
keyUsage = keyCertSign,cRLSign
subjectKeyIdentifier = hash
authorityKeyIdentifier = keyid
extendedKeyUsage = serverAuth