draft-ietf-lamps-cms-sphincs-plus-19 specifies SHAKE as the message digest algorithm for SLH-DSA-SHAKE-* in CMS. SHAKE doesn't have a default digest length, so this adds a SHAKE-specific kludge in CMS. Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/27087)
82 lines
3.4 KiB
Bash
Executable file
82 lines
3.4 KiB
Bash
Executable file
#!/bin/sh
|
|
# Copyright 2013-2025 The OpenSSL Project Authors. All Rights Reserved.
|
|
#
|
|
# Licensed under the Apache License 2.0 (the "License"). You may not use
|
|
# this file except in compliance with the License. You can obtain a copy
|
|
# in the file LICENSE in the source distribution or at
|
|
# https://www.openssl.org/source/license.html
|
|
|
|
# Utility to recreate S/MIME certificates in this directory.
|
|
# Invoke when changes are need from within this directory.
|
|
|
|
OPENSSL=../../apps/openssl
|
|
CONF=ca.cnf
|
|
export OPENSSL_CONF=./$CONF
|
|
|
|
gen() {
|
|
$OPENSSL x509 -CA smroot.pem -new -days 36524 -force_pubkey $1 -subj "$2" \
|
|
-extfile $CONF -extensions $3
|
|
}
|
|
|
|
# Root CA: create certificate directly
|
|
CN="Test S/MIME RSA Root" $OPENSSL req -config ca.cnf -x509 -noenc \
|
|
-keyout smroot.pem -out smroot.pem -key ../certs/ca-key.pem -days 36524
|
|
|
|
# EE RSA certificates with respective extensions
|
|
cp ../certs/ee-key.pem smrsa1.pem
|
|
gen smrsa1.pem "/CN=Test SMIME EE RSA #1" usr_rsa_cert >>smrsa1.pem
|
|
cp ../certs/ee-key-3072.pem smrsa2.pem
|
|
gen smrsa2.pem "/CN=Test SMIME EE RSA #2" usr_rsa_cert >>smrsa2.pem
|
|
cp ../certs/ee-key-4096.pem smrsa3.pem
|
|
gen smrsa3.pem "/CN=Test SMIME EE RSA #3" usr_rsa_cert >>smrsa3.pem
|
|
|
|
$OPENSSL x509 -in smrsa3.pem > smrsa3-cert.pem
|
|
$OPENSSL pkey -in smrsa3.pem > smrsa3-key.pem
|
|
|
|
# Create DSA certificates with respective extensions
|
|
|
|
cp ../certs/server-dsa-key.pem smdsa1.pem
|
|
gen smdsa1.pem "/CN=Test SMIME EE DSA #1" signer_cert >>smdsa1.pem
|
|
cp ../certs/server-dsa-key.pem smdsa2.pem
|
|
gen smdsa2.pem "/CN=Test SMIME EE DSA #1" signer_cert >>smdsa2.pem
|
|
cp ../certs/server-dsa-key.pem smdsa3.pem
|
|
gen smdsa3.pem "/CN=Test SMIME EE DSA #1" signer_cert >>smdsa3.pem
|
|
|
|
# Create EC certificates with respective extensions
|
|
|
|
cp ../certs/ee-ecdsa-key.pem smec1.pem
|
|
gen smec1.pem "/CN=Test SMIME EE EC #1" signer_cert >>smec1.pem
|
|
cp ../certs/server-ecdsa-key.pem smec2.pem
|
|
gen smec2.pem "/CN=Test SMIME EE EC #2" signer_cert >>smec2.pem
|
|
|
|
# Do not renew this cert as it is used for legacy data decrypt test
|
|
#$OPENSSL ecparam -out ecp.pem -name P-256
|
|
#CN="Test S/MIME EE EC #3" $OPENSSL req -config ca.cnf -noenc \
|
|
# -keyout smec3.pem -out req.pem -newkey ec:ecp.pem
|
|
#$OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36524 \
|
|
# -extfile ca.cnf -extensions signer_cert -CAcreateserial >>smec3.pem
|
|
#rm ecp.pem req.pem
|
|
|
|
# Create X9.42 DH parameters and key.
|
|
$OPENSSL genpkey -genparam -algorithm DHX -out dhp.pem
|
|
$OPENSSL genpkey -paramfile dhp.pem -out smdh.pem
|
|
rm dhp.pem
|
|
# Create X9.42 DH certificate with respective extensions
|
|
gen smdh.pem "/CN=Test SMIME EE DH" dh_cert >>smdh.pem
|
|
|
|
# EE RSA code signing end entity certificate with respective extensions
|
|
cp ../certs/ee-key.pem csrsa1.pem
|
|
gen csrsa1.pem "/CN=Test CodeSign EE RSA" codesign_cert >>csrsa1.pem
|
|
|
|
# Create PQ certificates with respective extensions
|
|
$OPENSSL genpkey -algorithm ML-DSA-44 -out sm_mldsa44.pem
|
|
gen sm_mldsa44.pem "/CN=Test SMIME EE ML-DSA-44" signer_cert >>sm_mldsa44.pem
|
|
$OPENSSL genpkey -algorithm SLH-DSA-SHA2-128s -out sm_slhdsa_sha2_128s.pem
|
|
gen sm_slhdsa_sha2_128s.pem "/CN=Test SMIME EE SLH-DSA-SHA2-128s" \
|
|
signer_cert >>sm_slhdsa_sha2_128s.pem
|
|
$OPENSSL genpkey -algorithm SLH-DSA-SHAKE-128s -out sm_slhdsa_shake_128s.pem
|
|
gen sm_slhdsa_shake_128s.pem "/CN=Test SMIME EE SLH-DSA-SHAKE-128s" \
|
|
signer_cert >>sm_slhdsa_shake_128s.pem
|
|
$OPENSSL genpkey -algorithm SLH-DSA-SHAKE-256s -out sm_slhdsa_shake_256s.pem
|
|
gen sm_slhdsa_shake_256s.pem "/CN=Test SMIME EE SLH-DSA-SHAKE-256s" \
|
|
signer_cert >>sm_slhdsa_shake_256s.pem
|