github.com/letsencrypt/boulder@v0.20251208.0/ca/testdata/testcsr.go (about)

     1  // Hack up the x509.CertificateRequest in here, run `go run testcsr.go`, and a
     2  // DER-encoded CertificateRequest will be printed to stdout.
     3  package main
     4  
     5  import (
     6  	"crypto/ecdsa"
     7  	"crypto/elliptic"
     8  	"crypto/rand"
     9  	"crypto/x509"
    10  	"crypto/x509/pkix"
    11  	"log"
    12  	"os"
    13  )
    14  
    15  func main() {
    16  	priv, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
    17  	if err != nil {
    18  		log.Fatalf("Failed to parse private key: %s", err)
    19  	}
    20  
    21  	req := &x509.CertificateRequest{
    22  		Subject: pkix.Name{
    23  			CommonName: "CapiTalizedLetters.com",
    24  		},
    25  		DNSNames: []string{
    26  			"moreCAPs.com",
    27  			"morecaps.com",
    28  			"evenMOREcaps.com",
    29  			"Capitalizedletters.COM",
    30  		},
    31  	}
    32  	csr, err := x509.CreateCertificateRequest(rand.Reader, req, priv)
    33  	if err != nil {
    34  		log.Fatalf("unable to create CSR: %s", err)
    35  	}
    36  	_, err = os.Stdout.Write(csr)
    37  	if err != nil {
    38  		log.Fatalf("unable to write to stdout: %s", err)
    39  	}
    40  }