MacOS更新10.14之后使用pkcs12生成推送证书秘钥时默认加密方法不是rsa的解决方法

#!/usr/bin/expect
set spath [lindex $argv 0]
spawn openssl pkcs12 -clcerts -nokeys -out [pem证书文件路径] -in [p12证书文件路径]
expect "Enter Import Password:"
send "123456\r"
interact
spawn openssl pkcs12 -nocerts -out [pem秘钥文件路径] -in [p12秘钥文件路径]
expect "Enter Import Password:"
send "你的密码\r"
expect "Enter PEM pass phrase:"
send "你的PEM pass phrase\r"
expect "Verifying - Enter PEM pass phrase:"
send "你的PEM pass phrase\r"

# echo "==== All Done ===="
interact
spawn openssl rsa -in [pem秘钥文件路径] -out [pem秘钥文件路径] #这一步用rsa加密重新加密一次pem文件
expect "Enter pass phrase"
send "你的pass phrase\r"
interact
spawn openssl s_client -connect gateway.push.apple.com:2195 -cert $spath/discer.pem -key $spath/diskey.pem 
expect "Enter pass phrase for diskey.pem:"
send "pass phrase for diskey.pem\r"
interact

猜你喜欢

转载自blog.csdn.net/qq_29094161/article/details/87997479
今日推荐