Blame SOURCES/Fix-make-certs.sh-for-OpenSSL-1.1.patch

963210
From 7221a9f695016d3e4873bb799f06665ec74387f8 Mon Sep 17 00:00:00 2001
963210
From: Greg Hudson <ghudson@mit.edu>
963210
Date: Wed, 6 Sep 2017 12:56:37 -0400
963210
Subject: [PATCH] Fix make-certs.sh for OpenSSL 1.1
963210
963210
The openssl req commands in make-certs.sh contain -subj options which
963210
were ignored in favor of the config file prior to OpenSSL 1.1.  When
963210
they are used, they remove elements of the subject which are now
963210
required by t_pkinit.py.
963210
963210
(cherry picked from commit b0473da67d72e43b9f03b703869069348e872efc)
963210
[rharwood@redhat.com: remove newer sections in make-certs.sh]
963210
Signed-off-by: Robbie Harwood <rharwood@redhat.com>
963210
---
963210
 src/tests/dejagnu/pkinit-certs/make-certs.sh | 19 +++++++++----------
963210
 1 file changed, 9 insertions(+), 10 deletions(-)
963210
963210
diff --git a/src/tests/dejagnu/pkinit-certs/make-certs.sh b/src/tests/dejagnu/pkinit-certs/make-certs.sh
963210
index 0f07709b0..0d8c2019a 100755
963210
--- a/src/tests/dejagnu/pkinit-certs/make-certs.sh
963210
+++ b/src/tests/dejagnu/pkinit-certs/make-certs.sh
963210
@@ -122,15 +122,14 @@ SUBJECT=ca openssl req -config openssl.cnf -new -x509 -extensions exts_ca \
963210
     -set_serial 1 -days $DAYS -key privkey.pem -out ca.pem
963210
 
963210
 # Generate a KDC certificate.
963210
-SUBJECT=kdc openssl req -config openssl.cnf -new -subj /CN=kdc \
963210
-    -key privkey.pem -out kdc.csr
963210
+SUBJECT=kdc openssl req -config openssl.cnf -new -key privkey.pem -out kdc.csr
963210
 SUBJECT=kdc openssl x509 -extfile openssl.cnf -extensions exts_kdc \
963210
     -set_serial 2 -days $DAYS -req -CA ca.pem -CAkey privkey.pem \
963210
     -out kdc.pem -in kdc.csr
963210
 
963210
 # Generate a client certificate and PKCS#12 bundles.
963210
-SUBJECT=user openssl req -config openssl.cnf -new -subj /CN=user \
963210
-    -key privkey.pem -out user.csr
963210
+SUBJECT=user openssl req -config openssl.cnf -new -key privkey.pem \
963210
+    -out user.csr
963210
 SUBJECT=user openssl x509 -extfile openssl.cnf -extensions exts_client \
963210
     -set_serial 3 -days $DAYS -req -CA ca.pem -CAkey privkey.pem \
963210
     -out user.pem -in user.csr
963210
@@ -140,24 +139,24 @@ openssl pkcs12 -export -in user.pem -inkey privkey.pem -out user-enc.p12 \
963210
     -passout pass:encrypted
963210
 
963210
 # Generate a client certificate and PKCS#12 bundles with a UPN SAN.
963210
-SUBJECT=user openssl req -config openssl.cnf -new -subj /CN=user \
963210
-    -key privkey.pem -out user-upn.csr
963210
+SUBJECT=user openssl req -config openssl.cnf -new -key privkey.pem \
963210
+    -out user-upn.csr
963210
 SUBJECT=user openssl x509 -extfile openssl.cnf -extensions exts_upn_client \
963210
     -set_serial 4 -days $DAYS -req -CA ca.pem -CAkey privkey.pem \
963210
     -out user-upn.pem -in user-upn.csr
963210
 openssl pkcs12 -export -in user-upn.pem -inkey privkey.pem -out user-upn.p12 \
963210
     -passout pass:
963210
 
963210
-SUBJECT=user openssl req -config openssl.cnf -new -subj /CN=user \
963210
-    -key privkey.pem -out user-upn2.csr
963210
+SUBJECT=user openssl req -config openssl.cnf -new -key privkey.pem \
963210
+    -out user-upn2.csr
963210
 SUBJECT=user openssl x509 -extfile openssl.cnf -extensions exts_upn2_client \
963210
     -set_serial 5 -days $DAYS -req -CA ca.pem -CAkey privkey.pem \
963210
     -out user-upn2.pem -in user-upn2.csr
963210
 openssl pkcs12 -export -in user-upn2.pem -inkey privkey.pem \
963210
      -out user-upn2.p12 -passout pass:
963210
 
963210
-SUBJECT=user openssl req -config openssl.cnf -new -subj /CN=user \
963210
-    -key privkey.pem -out user-upn3.csr
963210
+SUBJECT=user openssl req -config openssl.cnf -new -key privkey.pem \
963210
+    -out user-upn3.csr
963210
 SUBJECT=user openssl x509 -extfile openssl.cnf -extensions exts_upn3_client \
963210
     -set_serial 6 -days $DAYS -req -CA ca.pem -CAkey privkey.pem \
963210
     -out user-upn3.pem -in user-upn3.csr