23 lines
1.9 KiB
Bash
Raw Normal View History

#!/bin/bash
# This command genereates ekyfiles with OpenSSL
#for key_type in PK KEK db dbx; do openssl req -new -x509 -newkey rsa:2048 -subj "/CN=Ganome's ${key_type}" -keyout ${key_type}.key -out ${key_type}.crt -days 9999 -sha256; done
for key_type in PK KEK db dbx; do openssl req -new -x509 -newkey rsa:2048 -subj "/CN=Ganome's ${key_type}" -keyout ${key_type}.key -out ${key_type}.crt -days 9999 -nodes -sha256; done
# This command will generate a Platform Key "PK"
# mkfifo key_pipe & sleep 1; openssl req -new -x509 -newkey rsa:2048 -subj "/CN=Ganome's Platform Key" -keyout key_pipe -out PK.crt -days 9999 -noenc -sha256 & gpg --output PK.key.gpg --recipient ganome@gmail.com --encrypt < key_pipe && rm key_pipe
#This creates the keyfiles encrypting with GPG
#mkfifo key_pipe & sleep 1 && for key_type in PK KEK db dbx; do openssl req -new -x509 -newkey rsa:2048 -subj "/CN=Ganome's ${key_type}" -keyout key_pipe -out ${key_type}.crt -days 9999 -noenc -sha256 & gpg --output ${key_type}.key.gpg --recipient ganome@gmail.com --encrypt < key_pipe ; done ; rm key_pipe
#mkfifo key_pipe &
#openssl req -new -x509 -newkey rsa:2048 -subj "/CN=Ganome's PK" -keyout key_pipe -out PK.crt -days 9999 -noenc -sha256
#gpg --output PK.key.gpg --recipient ganome@gmail.com --encrypt < key_pipe
#openssl req -new -x509 -newkey rsa:2048 -subj "/CN=Ganome's KEK" -keyout key_pipe -out KEK.crt -days 9999 -noenc -sha256
#gpg --output KEK.key.gpg --recipient ganome@gmail.com --encrypt < key_pipe
#openssl req -new -x509 -newkey rsa:2048 -subj "/CN=Ganome's db" -keyout key_pipe -out db.crt -days 9999 -noenc -sha256
#gpg --output db.key.gpg --recipient ganome@gmail.com --encrypt < key_pipe
#openssl req -new -x509 -newkey rsa:2048 -subj "/CN=Ganome's dbx" -keyout key_pipe -out dbx.crt -days 9999 -noenc -sha256
#gpg --output dbx.key.gpg --recipient ganome@gmail.com --encrypt < key_pipe
#rm key_pipe