Skip to content

Commit 2f78f6c

Browse files
committed
Fixed typo in keystore variables
1 parent cff45b5 commit 2f78f6c

1 file changed

Lines changed: 18 additions & 18 deletions

File tree

certgen/certgen.mk

Lines changed: 18 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -61,9 +61,9 @@ SERVER_CRT_DSA = $(CERTGEN_BUILD_DIR)/server-dsa.crt
6161
SERVER_CNF_DSA = $(CERTGEN_CONFS_DIR)/server.cnf
6262

6363
CA_CHAIN_CRT = $(CERTGEN_BUILD_DIR)/cachain.crt
64-
KEYSORE_P12_RSA = $(CERTGEN_BUILD_DIR)/keystore-rsa.p12
65-
KEYSORE_P12_EC = $(CERTGEN_BUILD_DIR)/keystore-ec.p12
66-
KEYSORE_P12_DSA = $(CERTGEN_BUILD_DIR)/keystore-dsa.p12
64+
KEYSTORE_P12_RSA = $(CERTGEN_BUILD_DIR)/keystore-rsa.p12
65+
KEYSTORE_P12_EC = $(CERTGEN_BUILD_DIR)/keystore-ec.p12
66+
KEYSTORE_P12_DSA = $(CERTGEN_BUILD_DIR)/keystore-dsa.p12
6767
KEYSTORE_P12 = $(CERTGEN_BUILD_DIR)/keystore.p12
6868
KEYSTORE_JKS = $(CERTGEN_BUILD_DIR)/keystore.jks
6969
KEYSTORE_PASSWORD = changeit
@@ -191,41 +191,41 @@ $(CA_CHAIN_CRT): $(ROOT_CRT) $(INTERMEDIATE_CRT)
191191
OPENSSL_NOFIPS := $(shell if [ 1 = "$(TEST_PKCS11_FIPS)" ] || [ 1 = "$(FIPS_MODE_ENABLED)" ] ; then printf 'OPENSSL_CONF=%s %s' "$(CERTGEN_CONFS_DIR)/empty.cfg" "$(OPENSSL)" ; else printf '%s' "$(OPENSSL)" ; fi )
192192

193193
# create keystore in PKCS12 format, which can then be imported to jks
194-
$(KEYSORE_P12_RSA): $(SERVER_CRT_RSA) $(SERVER_KEY_RSA) $(CA_CHAIN_CRT)
194+
$(KEYSTORE_P12_RSA): $(SERVER_CRT_RSA) $(SERVER_KEY_RSA) $(CA_CHAIN_CRT)
195195
$(OPENSSL_NOFIPS) pkcs12 -export -chain -in $(SERVER_CRT_RSA) -inkey $(SERVER_KEY_RSA) \
196-
-name server-rsa -CAfile $(CA_CHAIN_CRT) -out $(KEYSORE_P12_RSA) \
196+
-name server-rsa -CAfile $(CA_CHAIN_CRT) -out $(KEYSTORE_P12_RSA) \
197197
-passout pass:$(KEYSTORE_PASSWORD)
198198

199199
# create EC keystore in PKCS12 format, which can then be imported to jks
200-
$(KEYSORE_P12_EC): $(SERVER_CRT_EC) $(SERVER_KEY_EC) $(CA_CHAIN_CRT)
200+
$(KEYSTORE_P12_EC): $(SERVER_CRT_EC) $(SERVER_KEY_EC) $(CA_CHAIN_CRT)
201201
$(OPENSSL_NOFIPS) pkcs12 -export -chain -in $(SERVER_CRT_EC) -inkey $(SERVER_KEY_EC) \
202-
-name server-ec -CAfile $(CA_CHAIN_CRT) -out $(KEYSORE_P12_EC) \
202+
-name server-ec -CAfile $(CA_CHAIN_CRT) -out $(KEYSTORE_P12_EC) \
203203
-passout pass:$(KEYSTORE_PASSWORD)
204204

205205
# create DSA keystore in PKCS12 format, which can then be imported to jks
206-
$(KEYSORE_P12_DSA): $(SERVER_CRT_DSA) $(SERVER_KEY_DSA) $(CA_CHAIN_CRT)
206+
$(KEYSTORE_P12_DSA): $(SERVER_CRT_DSA) $(SERVER_KEY_DSA) $(CA_CHAIN_CRT)
207207
$(OPENSSL_NOFIPS) pkcs12 -export -chain -in $(SERVER_CRT_DSA) -inkey $(SERVER_KEY_DSA) \
208-
-name server-dsa -CAfile $(CA_CHAIN_CRT) -out $(KEYSORE_P12_DSA) \
208+
-name server-dsa -CAfile $(CA_CHAIN_CRT) -out $(KEYSTORE_P12_DSA) \
209209
-passout pass:$(KEYSTORE_PASSWORD)
210210

211211
# create p12 keystore
212-
KEYSTORE_P12_DSA_DEP := $(shell if ! [ 1 = "$(TEST_PKCS11_FIPS)" ] ; then printf '%s' "$(KEYSORE_P12_DSA)" ; fi )
213-
$(KEYSTORE_P12): $(KEYSORE_P12_RSA) $(KEYSORE_P12_EC) $(KEYSTORE_P12_DSA_DEP)
212+
KEYSTORE_P12_DSA_DEP := $(shell if ! [ 1 = "$(TEST_PKCS11_FIPS)" ] ; then printf '%s' "$(KEYSTORE_P12_DSA)" ; fi )
213+
$(KEYSTORE_P12): $(KEYSTORE_P12_RSA) $(KEYSTORE_P12_EC) $(KEYSTORE_P12_DSA_DEP)
214214
$(KEYTOOL) $(KEYTOOL_PARAMS) -importkeystore \
215-
-srckeystore $(KEYSORE_P12_RSA) -srcstoretype PKCS12 \
215+
-srckeystore $(KEYSTORE_P12_RSA) -srcstoretype PKCS12 \
216216
-srcstorepass $(KEYSTORE_PASSWORD) \
217217
-destkeystore $(KEYSTORE_P12) -deststoretype PKCS12 \
218218
-deststorepass $(KEYSTORE_PASSWORD) \
219219
-noprompt -v
220220
$(KEYTOOL) $(KEYTOOL_PARAMS) -importkeystore \
221-
-srckeystore $(KEYSORE_P12_EC) -srcstoretype PKCS12 \
221+
-srckeystore $(KEYSTORE_P12_EC) -srcstoretype PKCS12 \
222222
-srcstorepass $(KEYSTORE_PASSWORD) \
223223
-destkeystore $(KEYSTORE_P12) -deststoretype PKCS12 \
224224
-deststorepass $(KEYSTORE_PASSWORD) \
225225
-noprompt -v
226226
if ! [ 1 = "$(TEST_PKCS11_FIPS)" ] ; then \
227227
$(KEYTOOL) $(KEYTOOL_PARAMS) -importkeystore \
228-
-srckeystore $(KEYSORE_P12_DSA) -srcstoretype PKCS12 \
228+
-srckeystore $(KEYSTORE_P12_DSA) -srcstoretype PKCS12 \
229229
-srcstorepass $(KEYSTORE_PASSWORD) \
230230
-destkeystore $(KEYSTORE_P12) -deststoretype PKCS12 \
231231
-deststorepass $(KEYSTORE_PASSWORD) \
@@ -252,15 +252,15 @@ $(TRUSTSTORE_JKS): $(ROOT_CRT)
252252
-keystore $(TRUSTSTORE_JKS) -storepass $(TRUSTSTORE_PASSWORD) -noprompt
253253

254254
# create nss db with keys and certs
255-
$(NSSDB_DIR): $(ROOT_CRT) $(KEYSORE_P12_RSA) $(KEYSORE_P12_EC) # $(KEYSORE_P12_DSA)
255+
$(NSSDB_DIR): $(ROOT_CRT) $(KEYSTORE_P12_RSA) $(KEYSTORE_P12_EC) # $(KEYSTORE_P12_DSA)
256256
mkdir $(NSSDB_DIR)
257257
echo "$(NSSDB_PASSWORD)" > $(NSSDB_DIR)/password.txt
258258
certutil -N -d $(NSSDB_DIR) -f $(NSSDB_DIR)/password.txt
259259
touch $(NSSDB_DIR)/secmod.db
260260
certutil -A -n rootca -i $(ROOT_CRT) -t C,, -d $(NSSDB_DIR) -f $(NSSDB_DIR)/password.txt
261-
pk12util -i $(KEYSORE_P12_RSA) -W $(KEYSTORE_PASSWORD) -d $(NSSDB_DIR) -k $(NSSDB_DIR)/password.txt
262-
pk12util -i $(KEYSORE_P12_EC) -W $(KEYSTORE_PASSWORD) -d $(NSSDB_DIR) -k $(NSSDB_DIR)/password.txt
263-
# pk12util -i $(KEYSORE_P12_DSA) -W $(KEYSTORE_PASSWORD) -d $(NSSDB_DIR) -k $(NSSDB_DIR)/password.txt
261+
pk12util -i $(KEYSTORE_P12_RSA) -W $(KEYSTORE_PASSWORD) -d $(NSSDB_DIR) -k $(NSSDB_DIR)/password.txt
262+
pk12util -i $(KEYSTORE_P12_EC) -W $(KEYSTORE_PASSWORD) -d $(NSSDB_DIR) -k $(NSSDB_DIR)/password.txt
263+
# pk12util -i $(KEYSTORE_P12_DSA) -W $(KEYSTORE_PASSWORD) -d $(NSSDB_DIR) -k $(NSSDB_DIR)/password.txt
264264
if [ 1 = $(NSSDB_FIPS) ] ; then \
265265
printf '\n' | modutil -fips true -dbdir $(NSSDB_DIR) ; \
266266
fi

0 commit comments

Comments
 (0)