You are acting here as a CA. You have to certify that the information contained in certification_request.csr
is valid.
Note: As a CA dedicated to code signing, you know that the certificate will be used to sign code because when you run
openssl req -in certification_request.csr -text -verify -noout
you see:
Requested Extensions:
X509v3 Key Usage: critical
Digital Signature
X509v3 Extended Key Usage: critical
Code Signing
If, as a CA, the information in the request is valid, run this command to generate the certificate:
openssl x509 -req -CA myRootCA.crt -CAkey myRootCA.key -days 4000 -in certification_request.csr -out code_signing.crt
4000 is the period (in days) during which the certificate can be used to sign code. With a public CA the period does not exceed 3 years.
๐ฎ Manual for openssl x509
The resulting certificate code_signing.crt
can be inspected with this command:
openssl x509 -in code_signing.crt -text -noout