Custom Fabric 1.0 Crypto tool to generate CA files

Source: Internet
Author: User
Certificate requirements:
1. The format of the digital certificate follows the X.509 standard
2. Version V3
3. Signature Algorithm SHA256ECDSA




CA used in FABRIC-JAVA-SDK:
./e2e-2orgs/channel/crypto-config/peerorganizations/org1.example.com/users/admin@org1.example.com/msp/signcerts
./e2e-2orgs/channel/crypto-config/peerorganizations/org1.example.com/users/admin@org1.example.com/msp/keystore


Docker-compose.yaml the CA used in the configuration file:
1, orderer node
./e2e-2orgs/channel/crypto-config/ordererorganizations/example.com/orderers/orderer.example.com/msp (all under folder)
./E2E-2ORGS/CHANNEL/CRYPTO-CONFIG/ORDERERORGANIZATIONS/EXAMPLE.COM/ORDERERS/ORDERER.EXAMPLE.COM/TLS (all under folder)
2. CA node
./e2e-2orgs/channel/crypto-config/peerorganizations/org1.example.com/ca/(all under folder)
3, Peer node
./e2e-2orgs/channel/crypto-config/peerorganizations/org1.example.com/peers/peer0.org1.example.com/msp (all under folder)
./E2E-2ORGS/CHANNEL/CRYPTO-CONFIG/PEERORGANIZATIONS/ORG1.EXAMPLE.COM/PEERS/PEER0.ORG1.EXAMPLE.COM/TLS (all under folder)




Peer configuration file requires a replacement certificate:
Peer CA Root Certificate
. Pem Format Replacement Crypto-config/peerorganizations/org1.example.com/ca/ca.org1.example.com-cert.pem
Crypto-config/peerorganizations/org1.example.com/peers/peer0.org1.example.com/msp/tlscacerts/ca.org1.example.com-cert.pem
Crypto-config/peerorganizations/org1.example.com/peers/peer0.org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem
Crypto-config/peerorganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt
The private key of the CA root certificate
. Pem Format Replacement crypto-config/peerorganizations/org1.example.com/ca/ Fcf776b02a05600408d0be9d9752afc59f64950b721cacb363b5b95a0fea6216_sk


Peer CA Root certificate generates 3 certificate
The first set of certificates is used to replace crypto-config/peerorganizations/org1.example.com/peers/peer0.org1.example.com/msp/signcerts/ Peer.org1.example.com-cert.pem
The first set of private keys is used to replace crypto-config/peerorganizations/org1.example.com/peers/peer0.org1.example.com/msp/keystore/ 46c70c47d10e70d2a8a4711eb3b766d3621927ad045691dcd258fa9e93bc2c2c_sk


The second set of certificates is used to replace crypto-config/peerorganizations/org1.example.com/peers/peer0.org1.example.com/msp/admincerts/ Admin@org1.example.com-cert.pem
crypto-config/peerorganizations/org1.example.com/users/admin@org1.example.com/msp/signcerts/ Admin@org1.example.com-cert.pem
The second set of private keys is used to replace crypto-config/peerorganizations/org1.example.com/users/admin@org1.example.com/msp/keystore/ 6b32e59640c594cf633ad8c64b5958ef7e5ba2a205cfeefd44a9e982ce624d93_sk

The third set of certificates is used to replace CRYPTO-CONFIG/PEERORGANIZATIONS/ORG1.EXAMPLE.COM/PEERS/PEER0.ORG1.EXAMPLE.COM/TLS/SERVER.CRT
The third set of private keys is used to replace Crypto-config/peerorganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.key




orderer configuration file requires a replacement certificate:
Orderer CA Root certificate (note that Orderer Root certificate is peer to peer root certificate)
. Pem Format Replacement Crypto-config/ordererorganizations/example.com/orderers/orderer.example.com/msp/tlscacerts/ca.example.com-cert.pem
Crypto-config/ordererorganizations/example.com/orderers/orderer.example.com/tls/ca.crt

Orderer CA Root certificate generates 3 certificate
The first set of certificates is used to replace crypto-config/ordererorganizations/example.com/orderers/orderer.example.com/msp/signcerts/ Orderer.example.com-cert.pem
The first set of private keys is used to replace crypto-config/ordererorganizations/example.com/orderers/orderer.example.com/msp/keystore/ 30652478a0678558e8573fa33246175b33997226b63fa40503290187e0f99144_sk


The second set of certificates is used to replace crypto-config/ordererorganizations/example.com/orderers/orderer.example.com/msp/admincerts/ Admin@example.com-cert.pem

The third set of certificates is used to replace CRYPTO-CONFIG/ORDERERORGANIZATIONS/EXAMPLE.COM/ORDERERS/ORDERER.EXAMPLE.COM/TLS/SERVER.CRT
The third set of private keys is used to replace Crypto-config/ordererorganizations/example.com/orderers/orderer.example.com/tls/server.key

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.