1$! TETSGEN.COM
2$
3$	__arch := VAX
4$	if f$getsyi("cpu") .ge. 128 then __arch := AXP
5$	exe_dir := sys$disk:[-.'__arch'.exe.apps]
6$
7$	T := testcert
8$	KEY = 512
9$	CA := [-.certs]testca.pem
10$
11$	set noon
12$	if f$search(T+".1;*") .nes. "" then delete 'T'.1;*
13$	if f$search(T+".2;*") .nes. "" then delete 'T'.2;*
14$	if f$search(T+".key;*") .nes. "" then delete 'T'.key;*
15$	set on
16$
17$	write sys$output "generating certificate request"
18$
19$	append/new nl: .rnd
20$	open/append random_file .rnd
21$	write random_file "string to make the random number generator think it has entropy"
22$	close random_file
23$
24$	set noon
25$	define/user sys$output nla0:
26$	mcr 'exe_dir'openssl no-rsa
27$	save_severity=$SEVERITY
28$	set on
29$	if save_severity
30$	then
31$	    req_new="-newkey dsa:[-.apps]dsa512.pem"
32$	else
33$	    req_new="-new"
34$	    write sys$output "There should be a 2 sequences of .'s and some +'s."
35$	    write sys$output "There should not be more that at most 80 per line"
36$	endif
37$
38$	write sys$output "This could take some time."
39$
40$	mcr 'exe_dir'openssl req -config test.cnf 'req_new' -out testreq.pem
41$	if $severity .ne. 1
42$	then
43$	    write sys$output "problems creating request"
44$	    exit 3
45$	endif
46$
47$	mcr 'exe_dir'openssl req -config test.cnf -verify -in testreq.pem -noout
48$	if $severity .ne. 1
49$	then
50$	    write sys$output "signature on req is wrong"
51$	    exit 3
52$	endif
53