summaryrefslogtreecommitdiffstats
path: root/scripts/ca-existing-pkcs12-create.sh
blob: c7519e843363ceac1dff63dbacd7c693c70c56e2 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
#!/bin/sh -x

mkdir -p tmp

cat > tmp/ca-existing.cfg << EOF
[DEFAULT]
pki_pin=Secret.123

[CA]
pki_admin_email=caadmin@example.com
pki_admin_name=caadmin
pki_admin_nickname=caadmin
pki_admin_password=Secret.123
pki_admin_uid=caadmin

pki_client_database_password=Secret.123
pki_client_database_purge=False
pki_client_pkcs12_password=Secret.123

pki_ds_base_dn=dc=ca,dc=pki,dc=example,dc=com
pki_ds_password=Secret.123
pki_ds_database=ca

pki_security_domain_name=EXAMPLE

pki_token_password=Secret.123

pki_existing=True

pki_pkcs12_path=tmp/ca-certs.p12
pki_pkcs12_password=Secret.123

pki_ca_signing_nickname=ca_signing
pki_ca_signing_csr_path=tmp/ca_signing.csr

pki_ocsp_signing_nickname=ca_ocsp_signing
pki_ocsp_signing_csr_path=tmp/ca_ocsp_signing.csr

pki_sslserver_nickname=sslserver
pki_sslserver_csr_path=tmp/sslserver.csr

pki_subsystem_nickname=subsystem
pki_subsystem_csr_path=tmp/subsystem.csr

pki_audit_signing_nickname=ca_audit_signing
pki_audit_signing_csr_path=tmp/ca_audit_signing.csr

#pki_serial_number_range_start=6
#pki_request_number_range_start=1
EOF

pkispawn -v -f tmp/ca-existing.cfg -s CA