SSLproxy/extra/pki/GNUmakefile

109 lines
2.7 KiB
Makefile
Raw Normal View History

2012-04-13 12:47:30 +00:00
# inherited
VERSION?= unknown
OPENSSL?= openssl
MKDIR?= mkdir
# OpenSSL settings
CA_SUBJECT?= '/C=CH/O=SSLsplit Root CA/CN=SSLsplit Root CA/'
2012-04-13 12:47:30 +00:00
CA_DAYS?= 3650
CA_EXT:= v3_ca
CRT_SUBJECT?= '/C=CH/O=SSLsplit Test Certificate/CN=daniel.roe.ch/'
CRT_DAYS?= 365
CRT_EXT:= v3_crt
2012-04-13 12:47:30 +00:00
CONFIG:= x509v3ca.cnf
all: rsa dsa ec targets server
2012-04-13 12:47:30 +00:00
session: session.pem
dh: dh512.param dh1024.param dh2048.param
rsa: rsa.pem
dsa: dsa.pem
ec: ec.pem
server: server.pem
2012-04-13 12:47:30 +00:00
dh512.param:
$(OPENSSL) dhparam -out $@ -2 512
dh1024.param:
$(OPENSSL) dhparam -out $@ -2 1024
dh2048.param:
$(OPENSSL) dhparam -out $@ -2 2048
dsa.param:
$(OPENSSL) dsaparam -out $@ 1024
dsa.key: dsa.param
$(OPENSSL) gendsa -out $@ $<
rsa.key:
$(OPENSSL) genrsa -out $@ 1024
ec.key:
$(OPENSSL) ecparam -out $@ -name prime192v1 -genkey
2012-04-17 22:04:10 +00:00
%.crt: %.key $(CONFIG)
2012-04-13 12:47:30 +00:00
$(OPENSSL) req -new -nodes -x509 -sha1 -out $@ -key $< \
-config $(CONFIG) -extensions $(CA_EXT) \
2012-04-13 12:47:30 +00:00
-subj $(CA_SUBJECT) \
-set_serial 0 -days $(CA_DAYS)
server.key:
$(OPENSSL) genrsa -out $@ 1024
2012-04-17 22:04:10 +00:00
server.crt: server.key $(CONFIG)
$(OPENSSL) req -new -nodes -x509 -sha1 -out $@ -key $< \
-config $(CONFIG) -extensions $(CRT_EXT) \
-subj $(CRT_SUBJECT) \
-set_serial 42 -days $(CRT_DAYS)
2012-04-13 12:47:30 +00:00
%.pem: %.crt %.key
cat $^ >$@
targets: rsa.crt
2012-04-17 22:04:10 +00:00
$(MKDIR) -p targets
2012-04-13 12:47:30 +00:00
$(OPENSSL) genrsa -out targets/daniel.roe.ch.key 1024
$(OPENSSL) req -new -sha1 -subj '/C=CH/CN=daniel.roe.ch/' \
-key targets/daniel.roe.ch.key \
-out targets/daniel.roe.ch.csr
$(OPENSSL) x509 -req -sha1 -CAcreateserial -days 365 \
-CA rsa.crt -CAkey rsa.key \
-in targets/daniel.roe.ch.csr \
-out targets/daniel.roe.ch.crt
cat targets/daniel.roe.ch.crt targets/daniel.roe.ch.key rsa.crt \
>targets/daniel.roe.ch.pem
$(RM) targets/daniel.roe.ch.{key,csr,crt}
$(OPENSSL) genrsa -out targets/wildcard.roe.ch.key 1024
$(OPENSSL) req -new -sha1 -subj '/C=CH/CN=*.roe.ch/' \
-key targets/wildcard.roe.ch.key \
-out targets/wildcard.roe.ch.csr
$(OPENSSL) x509 -req -sha1 -CAcreateserial -days 365 \
-CA rsa.crt -CAkey rsa.key \
-in targets/wildcard.roe.ch.csr \
-out targets/wildcard.roe.ch.crt
cat targets/wildcard.roe.ch.crt targets/wildcard.roe.ch.key rsa.crt \
>targets/wildcard.roe.ch.pem
$(RM) targets/wildcard.roe.ch.{key,csr,crt} rsa.srl
# openssl s_server cannot be easily controlled from scripts; it is
# more robust to just connect to a real server to create a session
session.pem:
2012-04-13 20:22:57 +00:00
( \
echo 'GET /test/SSLsplit-$(VERSION) HTTP/1.1'; \
echo 'Host: daniel.roe.ch'; \
echo 'Connection: close'; \
echo ) | $(OPENSSL) s_client -connect daniel.roe.ch:443 \
-quiet -crlf -no_ign_eof -sess_out $@ >/dev/null 2>&1
2012-04-13 12:47:30 +00:00
test -r $@
clean:
rm -rf rsa.* dsa.* ec.* dh*.param targets *.srl session.pem server.*
2012-04-13 12:47:30 +00:00
.PHONY: all clean rsa dsa ec dh dhall session