C:\etc>md server
C:\etc>move *.pem server
C:\etc\newcert.pem
C:\etc\newkey.pem
C:\etc\newreq.pemC:\etc>move *.crt server
C:\etc\server.crt
C:\etc>CA.pl -newreq
Loading 'screen' into random state - done
Generating a 1024 bit RSA private key
.........++++++
..............++++++
writing new private key to 'newkey.pem'
Enter PEM pass phrase:xxxxx[Enter]�@ �@�@�@�@ �@ �� ����CA�p�p�X�t���[�Y����(��ʏ㉽���ω��͂Ȃ�����������Ă���)
Verifying - Enter PEM pass phrase:xxxxx[Enter]�@�� ����CA�p�p�X�t���[�Y���
-----
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [AU]:JP[Enter] (���R�[�h)
State or Province Name (full name) Some-State]:Tokyo[Enter] (�s���{�� ��)
Locality Name (eg, city) []:Edogawa[Enter] (�s������)
Organization Name (eg, company) [Internet Widgits Pty Ltd]:Private_CA1[Enter] (�g�D��*)
Organizational Unit Name (eg, section) []:Admin[Enter] (�g�D���� �j�b�g��)
Common Name (eg, YOUR name) []:Private_CA1[Enter] (�g�D/�T�[�o��)
Email Address []:[email protected][Enter] (�Ǘ��҃��[ ���A�h���X)
Please enter the following 'extra' attributes
to be sent with your certificate request
A challenge password []:[Enter] �@�@�@�@ �@�@�� Enter�̂ݓ���
An optional company name []:[Enter]�@�@ �@ �@�� Enter�̂ݓ���
Request is in newreq.pem, private key is in newkey.pem
�@�@�@�@�@�@*�F�@�g�D��(ON)�̓��[�gCA�Ƃ͈قȂ閼�O�ɂ��邱�ƁB
C:\etc>CA.pl -signCA
Using configuration from C:\OpenSSL\bin\openssl.cnf
Loading 'screen' into random state - done
Enter pass phrase for ./demoCA/private/cakey.pem:xxxxx[Enter]�@ �@�� ���[�gCA�p�p�X�t���[�Y����
Check that the request matches the signature
Signature ok
Certificate Details:
Serial Number:
f1:d4:c6:f4:2a:9b:48:2e
Validity
Not Before: Mar 19 13:24:51 2008 GMT
Not After : Mar 19 13:24:51 2010 GMT
Subject:
countryName = JP
stateOrProvinceName = Tokyo
localityName = Edogawa
organizationName = Private_CA1
organizationalUnitName = Admin
commonName = Private_CA1
emailAddress = [email protected]
X509v3 extensions:
X509v3 Subject Key Identifier:
06:A1:06:3F:6E:69:20:2F:05:08:30:80:38:F8:1A:0A:8F:EA:A4:C6
X509v3 Authority Key Identifier:
keyid:66:7B:3B:19:89:E0:C1:04:99:C9:98:79:E5:60:C7:0B:D1:D8:E5:BB
DirName:/C=JP/ST=Tokyo/O=Private_CA1/OU=Admin/CN=Private_CA1/[email protected]
serial:F1:D4:C6:F4:2A:9B:48:2A
X509v3 Basic Constraints:
CA:TRUE
Netscape Cert Type:
SSL CA, S/MIME CA
Certificate is to be certified until Mar 19 13:24:51 2010 GMT (730 days)
Sign the certificate? [y/n]:y[Enter]
1 out of 1 certificate requests certified, commit? [y/n]y[Enter]
Write out database with 1 new entries
Data Base Updated
Signed CA certificate is in newcert.pem
C:\etc>openssl x509 -inform pem -in newcert.pem -outform der -out ca1.der
Apache�Œ���CA���g����SSL������ꍇ�́A��ō쐬����T�[�o�L�[�A�T�[�o�ؖ����ƂƂ��ɁA�����ō쐬�������ԏؖ���
(newcert.pem)�� SSLCertificateChainFile�@�f�B���N�e�B�u�Ŏw�肵�Ă��������B�@
|
C:\etc>md
..\etc1 |
|
C:\etc>cd
..\etc1 |