@@ -61,9 +61,9 @@ SERVER_CRT_DSA = $(CERTGEN_BUILD_DIR)/server-dsa.crt
6161SERVER_CNF_DSA = $(CERTGEN_CONFS_DIR ) /server.cnf
6262
6363CA_CHAIN_CRT = $(CERTGEN_BUILD_DIR ) /cachain.crt
64- KEYSORE_P12_RSA = $(CERTGEN_BUILD_DIR ) /keystore-rsa.p12
65- KEYSORE_P12_EC = $(CERTGEN_BUILD_DIR ) /keystore-ec.p12
66- KEYSORE_P12_DSA = $(CERTGEN_BUILD_DIR ) /keystore-dsa.p12
64+ KEYSTORE_P12_RSA = $(CERTGEN_BUILD_DIR ) /keystore-rsa.p12
65+ KEYSTORE_P12_EC = $(CERTGEN_BUILD_DIR ) /keystore-ec.p12
66+ KEYSTORE_P12_DSA = $(CERTGEN_BUILD_DIR ) /keystore-dsa.p12
6767KEYSTORE_P12 = $(CERTGEN_BUILD_DIR ) /keystore.p12
6868KEYSTORE_JKS = $(CERTGEN_BUILD_DIR ) /keystore.jks
6969KEYSTORE_PASSWORD = changeit
@@ -191,41 +191,41 @@ $(CA_CHAIN_CRT): $(ROOT_CRT) $(INTERMEDIATE_CRT)
191191OPENSSL_NOFIPS := $(shell if [ 1 = "$(TEST_PKCS11_FIPS ) " ] || [ 1 = "$(FIPS_MODE_ENABLED ) " ] ; then printf 'OPENSSL_CONF=% s % s' "$(CERTGEN_CONFS_DIR ) /empty.cfg" "$(OPENSSL ) " ; else printf '% s' "$(OPENSSL ) " ; fi )
192192
193193# create keystore in PKCS12 format, which can then be imported to jks
194- $(KEYSORE_P12_RSA ) : $(SERVER_CRT_RSA ) $(SERVER_KEY_RSA ) $(CA_CHAIN_CRT )
194+ $(KEYSTORE_P12_RSA ) : $(SERVER_CRT_RSA ) $(SERVER_KEY_RSA ) $(CA_CHAIN_CRT )
195195 $(OPENSSL_NOFIPS ) pkcs12 -export -chain -in $(SERVER_CRT_RSA ) -inkey $(SERVER_KEY_RSA ) \
196- -name server-rsa -CAfile $(CA_CHAIN_CRT ) -out $(KEYSORE_P12_RSA ) \
196+ -name server-rsa -CAfile $(CA_CHAIN_CRT ) -out $(KEYSTORE_P12_RSA ) \
197197 -passout pass:$(KEYSTORE_PASSWORD )
198198
199199# create EC keystore in PKCS12 format, which can then be imported to jks
200- $(KEYSORE_P12_EC ) : $(SERVER_CRT_EC ) $(SERVER_KEY_EC ) $(CA_CHAIN_CRT )
200+ $(KEYSTORE_P12_EC ) : $(SERVER_CRT_EC ) $(SERVER_KEY_EC ) $(CA_CHAIN_CRT )
201201 $(OPENSSL_NOFIPS ) pkcs12 -export -chain -in $(SERVER_CRT_EC ) -inkey $(SERVER_KEY_EC ) \
202- -name server-ec -CAfile $(CA_CHAIN_CRT ) -out $(KEYSORE_P12_EC ) \
202+ -name server-ec -CAfile $(CA_CHAIN_CRT ) -out $(KEYSTORE_P12_EC ) \
203203 -passout pass:$(KEYSTORE_PASSWORD )
204204
205205# create DSA keystore in PKCS12 format, which can then be imported to jks
206- $(KEYSORE_P12_DSA ) : $(SERVER_CRT_DSA ) $(SERVER_KEY_DSA ) $(CA_CHAIN_CRT )
206+ $(KEYSTORE_P12_DSA ) : $(SERVER_CRT_DSA ) $(SERVER_KEY_DSA ) $(CA_CHAIN_CRT )
207207 $(OPENSSL_NOFIPS ) pkcs12 -export -chain -in $(SERVER_CRT_DSA ) -inkey $(SERVER_KEY_DSA ) \
208- -name server-dsa -CAfile $(CA_CHAIN_CRT ) -out $(KEYSORE_P12_DSA ) \
208+ -name server-dsa -CAfile $(CA_CHAIN_CRT ) -out $(KEYSTORE_P12_DSA ) \
209209 -passout pass:$(KEYSTORE_PASSWORD )
210210
211211# create p12 keystore
212- KEYSTORE_P12_DSA_DEP := $(shell if ! [ 1 = "$(TEST_PKCS11_FIPS ) " ] ; then printf '% s' "$(KEYSORE_P12_DSA ) " ; fi )
213- $(KEYSTORE_P12 ) : $(KEYSORE_P12_RSA ) $(KEYSORE_P12_EC ) $(KEYSTORE_P12_DSA_DEP )
212+ KEYSTORE_P12_DSA_DEP := $(shell if ! [ 1 = "$(TEST_PKCS11_FIPS ) " ] ; then printf '% s' "$(KEYSTORE_P12_DSA ) " ; fi )
213+ $(KEYSTORE_P12 ) : $(KEYSTORE_P12_RSA ) $(KEYSTORE_P12_EC ) $(KEYSTORE_P12_DSA_DEP )
214214 $(KEYTOOL ) $(KEYTOOL_PARAMS ) -importkeystore \
215- -srckeystore $(KEYSORE_P12_RSA ) -srcstoretype PKCS12 \
215+ -srckeystore $(KEYSTORE_P12_RSA ) -srcstoretype PKCS12 \
216216 -srcstorepass $(KEYSTORE_PASSWORD ) \
217217 -destkeystore $(KEYSTORE_P12 ) -deststoretype PKCS12 \
218218 -deststorepass $(KEYSTORE_PASSWORD ) \
219219 -noprompt -v
220220 $(KEYTOOL ) $(KEYTOOL_PARAMS ) -importkeystore \
221- -srckeystore $(KEYSORE_P12_EC ) -srcstoretype PKCS12 \
221+ -srckeystore $(KEYSTORE_P12_EC ) -srcstoretype PKCS12 \
222222 -srcstorepass $(KEYSTORE_PASSWORD ) \
223223 -destkeystore $(KEYSTORE_P12 ) -deststoretype PKCS12 \
224224 -deststorepass $(KEYSTORE_PASSWORD ) \
225225 -noprompt -v
226226 if ! [ 1 = " $( TEST_PKCS11_FIPS) " ] ; then \
227227 $(KEYTOOL ) $(KEYTOOL_PARAMS ) -importkeystore \
228- -srckeystore $(KEYSORE_P12_DSA ) -srcstoretype PKCS12 \
228+ -srckeystore $(KEYSTORE_P12_DSA ) -srcstoretype PKCS12 \
229229 -srcstorepass $(KEYSTORE_PASSWORD ) \
230230 -destkeystore $(KEYSTORE_P12 ) -deststoretype PKCS12 \
231231 -deststorepass $(KEYSTORE_PASSWORD ) \
@@ -252,15 +252,15 @@ $(TRUSTSTORE_JKS): $(ROOT_CRT)
252252 -keystore $(TRUSTSTORE_JKS ) -storepass $(TRUSTSTORE_PASSWORD ) -noprompt
253253
254254# create nss db with keys and certs
255- $(NSSDB_DIR ) : $(ROOT_CRT ) $(KEYSORE_P12_RSA ) $(KEYSORE_P12_EC ) # $(KEYSORE_P12_DSA )
255+ $(NSSDB_DIR ) : $(ROOT_CRT ) $(KEYSTORE_P12_RSA ) $(KEYSTORE_P12_EC ) # $(KEYSTORE_P12_DSA )
256256 mkdir $(NSSDB_DIR )
257257 echo " $( NSSDB_PASSWORD) " > $(NSSDB_DIR ) /password.txt
258258 certutil -N -d $(NSSDB_DIR ) -f $(NSSDB_DIR ) /password.txt
259259 touch $(NSSDB_DIR ) /secmod.db
260260 certutil -A -n rootca -i $(ROOT_CRT ) -t C,, -d $(NSSDB_DIR ) -f $(NSSDB_DIR ) /password.txt
261- pk12util -i $(KEYSORE_P12_RSA ) -W $(KEYSTORE_PASSWORD ) -d $(NSSDB_DIR ) -k $(NSSDB_DIR ) /password.txt
262- pk12util -i $(KEYSORE_P12_EC ) -W $(KEYSTORE_PASSWORD ) -d $(NSSDB_DIR ) -k $(NSSDB_DIR ) /password.txt
263- # pk12util -i $(KEYSORE_P12_DSA ) -W $(KEYSTORE_PASSWORD) -d $(NSSDB_DIR) -k $(NSSDB_DIR)/password.txt
261+ pk12util -i $(KEYSTORE_P12_RSA ) -W $(KEYSTORE_PASSWORD ) -d $(NSSDB_DIR ) -k $(NSSDB_DIR ) /password.txt
262+ pk12util -i $(KEYSTORE_P12_EC ) -W $(KEYSTORE_PASSWORD ) -d $(NSSDB_DIR ) -k $(NSSDB_DIR ) /password.txt
263+ # pk12util -i $(KEYSTORE_P12_DSA ) -W $(KEYSTORE_PASSWORD) -d $(NSSDB_DIR) -k $(NSSDB_DIR)/password.txt
264264 if [ 1 = $( NSSDB_FIPS) ] ; then \
265265 printf ' \n' | modutil -fips true -dbdir $(NSSDB_DIR ) ; \
266266 fi
0 commit comments