| 12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455 | 
							- @echo off
 
- REM We need admin rights, otherwise the random state cannot be written
 
- REM Thanks to http://stackoverflow.com/a/10052222/1531708
 
- :: BatchGotAdmin
 
- :-------------------------------------
 
- REM  --> Check for permissions
 
-     IF "%PROCESSOR_ARCHITECTURE%" EQU "amd64" (
 
- >nul 2>&1 "%SYSTEMROOT%\SysWOW64\cacls.exe" "%SYSTEMROOT%\SysWOW64\config\system"
 
- ) ELSE (
 
- >nul 2>&1 "%SYSTEMROOT%\system32\cacls.exe" "%SYSTEMROOT%\system32\config\system"
 
- )
 
- REM --> If error flag set, we do not have admin.
 
- if '%errorlevel%' NEQ '0' (
 
-     echo Requesting administrative privileges...
 
-     goto UACPrompt
 
- ) else ( goto gotAdmin )
 
- :UACPrompt
 
-     echo Set UAC = CreateObject^("Shell.Application"^) > "%temp%\getadmin.vbs"
 
-     set params = %*:"=""
 
-     echo UAC.ShellExecute "cmd.exe", "/c ""%~s0"" %params%", "", "runas", 1 >> "%temp%\getadmin.vbs"
 
-     "%temp%\getadmin.vbs"
 
-     del "%temp%\getadmin.vbs"
 
-     exit /B
 
- :gotAdmin
 
-     pushd "%CD%"
 
-     CD /D "%~dp0"
 
- :-------------------------------------- 
 
- del server.*
 
- c:\OpenSSL-Win32\bin\openssl.exe genrsa -des3 -out server.key 4096
 
- c:\OpenSSL-Win32\bin\openssl.exe req -sha256 -new -key server.key -out server.csr -utf8
 
- copy server.key server.key.orig
 
- c:\OpenSSL-Win32\bin\openssl.exe rsa -in server.key.orig -out server.key
 
- echo [ v3_ca ] > server.ext.txt
 
- echo [ req ] >> server.ext.txt
 
- echo req_extensions = my_extensions >> server.ext.txt
 
- echo [ my_extensions ] >> server.ext.txt
 
- echo extendedKeyUsage=serverAuth >> server.ext.txt
 
- echo crlDistributionPoints=URI:http://localhost/crl.pem >> server.ext.txt
 
- c:\OpenSSL-Win32\bin\openssl.exe x509 -req -days 365 -extensions v3_ca -extfile server.ext.txt -in server.csr -signkey server.key -out server.crt
 
- copy server.crt server.pem
 
- type server.key >> server.pem
 
 
  |