Custom Fabric 1.0 Crypto tool to generate CA files
Source: Internet
Author: User
Certificate requirements: 1. The format of the digital certificate follows the X.509 standard
2. Version V3
3. Signature Algorithm SHA256ECDSA
CA used in FABRIC-JAVA-SDK: ./e2e-2orgs/channel/crypto-config/peerorganizations/org1.example.com/users/admin@org1.example.com/msp/signcerts
./e2e-2orgs/channel/crypto-config/peerorganizations/org1.example.com/users/admin@org1.example.com/msp/keystore
Docker-compose.yaml the CA used in the configuration file: 1, orderer node
./e2e-2orgs/channel/crypto-config/ordererorganizations/example.com/orderers/orderer.example.com/msp (all under folder)
./E2E-2ORGS/CHANNEL/CRYPTO-CONFIG/ORDERERORGANIZATIONS/EXAMPLE.COM/ORDERERS/ORDERER.EXAMPLE.COM/TLS (all under folder)
2. CA node
./e2e-2orgs/channel/crypto-config/peerorganizations/org1.example.com/ca/(all under folder)
3, Peer node
./e2e-2orgs/channel/crypto-config/peerorganizations/org1.example.com/peers/peer0.org1.example.com/msp (all under folder)
./E2E-2ORGS/CHANNEL/CRYPTO-CONFIG/PEERORGANIZATIONS/ORG1.EXAMPLE.COM/PEERS/PEER0.ORG1.EXAMPLE.COM/TLS (all under folder)
Peer configuration file requires a replacement certificate: Peer CA Root Certificate
. Pem Format Replacement Crypto-config/peerorganizations/org1.example.com/ca/ca.org1.example.com-cert.pem
Crypto-config/peerorganizations/org1.example.com/peers/peer0.org1.example.com/msp/tlscacerts/ca.org1.example.com-cert.pem
Crypto-config/peerorganizations/org1.example.com/peers/peer0.org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem
Crypto-config/peerorganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt
The private key of the CA root certificate
. Pem Format Replacement crypto-config/peerorganizations/org1.example.com/ca/ Fcf776b02a05600408d0be9d9752afc59f64950b721cacb363b5b95a0fea6216_sk
Peer CA Root certificate generates 3 certificate
The first set of certificates is used to replace crypto-config/peerorganizations/org1.example.com/peers/peer0.org1.example.com/msp/signcerts/ Peer.org1.example.com-cert.pem
The first set of private keys is used to replace crypto-config/peerorganizations/org1.example.com/peers/peer0.org1.example.com/msp/keystore/ 46c70c47d10e70d2a8a4711eb3b766d3621927ad045691dcd258fa9e93bc2c2c_sk
The second set of certificates is used to replace crypto-config/peerorganizations/org1.example.com/peers/peer0.org1.example.com/msp/admincerts/ Admin@org1.example.com-cert.pem
crypto-config/peerorganizations/org1.example.com/users/admin@org1.example.com/msp/signcerts/ Admin@org1.example.com-cert.pem
The second set of private keys is used to replace crypto-config/peerorganizations/org1.example.com/users/admin@org1.example.com/msp/keystore/ 6b32e59640c594cf633ad8c64b5958ef7e5ba2a205cfeefd44a9e982ce624d93_sk
The third set of certificates is used to replace CRYPTO-CONFIG/PEERORGANIZATIONS/ORG1.EXAMPLE.COM/PEERS/PEER0.ORG1.EXAMPLE.COM/TLS/SERVER.CRT
The third set of private keys is used to replace Crypto-config/peerorganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.key
orderer configuration file requires a replacement certificate: Orderer CA Root certificate (note that Orderer Root certificate is peer to peer root certificate)
. Pem Format Replacement Crypto-config/ordererorganizations/example.com/orderers/orderer.example.com/msp/tlscacerts/ca.example.com-cert.pem
Crypto-config/ordererorganizations/example.com/orderers/orderer.example.com/tls/ca.crt
Orderer CA Root certificate generates 3 certificate
The first set of certificates is used to replace crypto-config/ordererorganizations/example.com/orderers/orderer.example.com/msp/signcerts/ Orderer.example.com-cert.pem
The first set of private keys is used to replace crypto-config/ordererorganizations/example.com/orderers/orderer.example.com/msp/keystore/ 30652478a0678558e8573fa33246175b33997226b63fa40503290187e0f99144_sk
The second set of certificates is used to replace crypto-config/ordererorganizations/example.com/orderers/orderer.example.com/msp/admincerts/ Admin@example.com-cert.pem
The third set of certificates is used to replace CRYPTO-CONFIG/ORDERERORGANIZATIONS/EXAMPLE.COM/ORDERERS/ORDERER.EXAMPLE.COM/TLS/SERVER.CRT
The third set of private keys is used to replace Crypto-config/ordererorganizations/example.com/orderers/orderer.example.com/tls/server.key
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.