github.com/letsencrypt/boulder@v0.20251208.0/ca/testdata/testcsr.go (about) 1 // Hack up the x509.CertificateRequest in here, run `go run testcsr.go`, and a 2 // DER-encoded CertificateRequest will be printed to stdout. 3 package main 4 5 import ( 6 "crypto/ecdsa" 7 "crypto/elliptic" 8 "crypto/rand" 9 "crypto/x509" 10 "crypto/x509/pkix" 11 "log" 12 "os" 13 ) 14 15 func main() { 16 priv, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader) 17 if err != nil { 18 log.Fatalf("Failed to parse private key: %s", err) 19 } 20 21 req := &x509.CertificateRequest{ 22 Subject: pkix.Name{ 23 CommonName: "CapiTalizedLetters.com", 24 }, 25 DNSNames: []string{ 26 "moreCAPs.com", 27 "morecaps.com", 28 "evenMOREcaps.com", 29 "Capitalizedletters.COM", 30 }, 31 } 32 csr, err := x509.CreateCertificateRequest(rand.Reader, req, priv) 33 if err != nil { 34 log.Fatalf("unable to create CSR: %s", err) 35 } 36 _, err = os.Stdout.Write(csr) 37 if err != nil { 38 log.Fatalf("unable to write to stdout: %s", err) 39 } 40 }