@ECHO OFF
setlocal
SET odscode =""
SET mailboxid =""
SET mailboxtype =""
SET meshclient =""
SET meshdomain =""
SET kpyesno=""
SET yesno =""
SET finyesno =""
SET fqdn =""
SET temppass =""
SET tempods =""
SET _Pass =""
SET chcp =""
SET quit =""

rem echo Current directory is: %CD%
rem pause

rem cd /D "%~dp0"


rem echo Current directory is: %CD%
rem pause
rem cd /d c:\


:find_keytool
ECHO looking for Java keytool command
@echo off
setlocal ENABLEDELAYEDEXPANSION
set filename=keytool.exe
set searchPath=\
set foundFilePath= 
FOR /R "%searchPath%" %%a  in (%filename%) DO (
    IF EXIST "%%~fa" (
rem         echo "%%~fa" 
        SET foundFilePath=%%~fa
      call :Endloop
     )

)

:Endloop
cd /D "%~dp0"
set keystr=%foundFilepath%
set str=%keystr:keystool.exe =% 
rem echo %str%
ECHO %str%> tempfile.txt
FOR %%? IN (tempfile.txt) DO ( SET /A strlength=%%~z? - 2 )
SET /A strlength1=(%strlength%-12)
rem echo %strlength%
rem echo %strlength1%
rem set keystr=%foundFilepath%
CALL SET "keystr1=%%keystr:~0,%strlength1%%%"
rem set str=%str:~0,33%
rem echo %str%
rem echo %keystr1%

set "PATH=%PATH%;%keystr1%"
ECHO:
ECHO Added keytool to path statement for this session, just in case one not available
Echo:
setlocal DISABLEDELAYEDEXPANSION
pause

rem goto Start



:Start
call CLS
SET/P mailboxid= Please enter the MESH mailbox ID or local Identifier if this keystore is for multiple Mailboxes:- 
ECHO:
IF "%mailboxid%"=="" GOTO Mailboxerror

:Setodscode
ECHO:
SET/P odscode= Please enter the ODS code for this mailbox 
ECHO:
IF "%odscode%"=="" GOTO Odserror

:Setmailboxtype
ECHO:
SET/P mailboxtype= Please type c (lowercase) if using the NHS MESH client or a if using your own API:- 
ECHO:
IF "%mailboxtype%"=="" GOTO Mailboxtypeerror
IF "%mailboxtype%"=="c" SET "meshdomain=mesh-client.nhs.uk"
IF "%mailboxtype%"=="a" SET "meshdomain=api.mesh-client.nhs.uk"
IF NOT "%mailboxtype%"=="a" IF NOT "%mailboxtype%"=="c" GOTO Setmailboxtype

:Kpass
ECHO:
SET /P temppass=Please enter the password for the Keystore: 
ECHO:
IF "%temppass%"=="" GOTO Kpass
ECHO Please confirm the password - %temppass% is correct? 
SET /P kpyesno=y or n :- 
IF NOT "%kpyesno%" == "y" GOTO :Kpass
SET _Pass=%temppass%
ECHO:
SET "fqdn=%mailboxid%.%odscode%.%meshdomain%"
ECHO Certificate will have a Common or Subject name of %fqdn% is this ok?
SET /P finyesno=y or n :- 
IF "%finyesno%" == "n" GOTO :Start
IF NOT "%finyesno%"=="y" IF NOT "%finyesno%"=="n" GOTO Temp4

:Kstart
rem PAUSE
rem create keystore
CALL CLS
keytool -genkey -alias meshclient -keyalg RSA -keysize 2048 -storetype JKS -keypass "%_Pass%" -storepass "%_Pass%" -keystore MESH.keystore -dname "CN=%fqdn%"
ECHO:
ECHO  New keystore Created
ECHO:

rem PAUSE

rem create csr file
keytool -certreq -alias meshclient -storepass "%_Pass%" -keystore MESH.keystore -file mesh.csr
ECHO:
ECHO  New Certificate Signing Request (CSR) Created
ECHO:

ECHO Please send the mesh.csr file in the keystore directory 
ECHO to the DIR team for them to create a certicate to send back to you
ECHO:
ECHO When you get the certificate back, please create a file called mesh.crt in the same location as the mesh.csr file
ECHO and place the whole text of the certificate into that file and save it
ECHO:

ECHO Only continue once you have received the certificate - please dont close the command prompt window
ECHO:


:Certcheck
PAUSE
rem checks to see whether mesh.crt exists
IF EXIST "mesh.crt" (
  GOTO Createcerts
) ELSE (
  GOTO Certerror
)


:Createcerts
CALL CLS
rem create certificate files
rem create old rootca certificate file
FOR /F "tokens=*" %%I in ('chcp') do set "chcp=%%I"
> rootca.der (
ECHO -----BEGIN CERTIFICATE-----
ECHO MIID9zCCAt+gAwIBAgIEQKIPtjANBgkqhkiG9w0BAQUFADA4MQwwCgYDVQQKEwNO
ECHO SFMxCzAJBgNVBAsTAkNBMRswGQYDVQQDExJOSFMgUm9vdCBBdXRob3JpdHkwHhcN
ECHO MDQwNjA0MTA1ODMxWhcNMjQwNjA0MTEyODMxWjA4MQwwCgYDVQQKEwNOSFMxCzAJ
ECHO BgNVBAsTAkNBMRswGQYDVQQDExJOSFMgUm9vdCBBdXRob3JpdHkwggEiMA0GCSqG
ECHO SIb3DQEBAQUAA4IBDwAwggEKAoIBAQCvIzZXhKyitE4BTeiay48TioOBds/PbC1h
ECHO zE36faAdwLuU33BVQNWNi/lA/sTi6kvJs4vCgDrEOeY2TuS+tZhqOmdQHcJIQZYW
ECHO fjPjtT3Q5IdR0NI0sUyTo7qcD+1Uutiv7Mr290NfFky6z4Ibj19QvfF10iC2jLd2
ECHO p7dJ3MQq2jdJWiVyI8NkgavyLj7N8CpF2Trb7g/K4J57+oxzRShtCJNLVseK3InV
ECHO TIejOJ6FaH5dqbVA63dtu9YwK9J1IP2O0IL1InSZIulNkCXFlGI38PDnNdFgPwYx
ECHO dhFZ1FD9X+zkVmwvI1CGzn+OiVH/l/ANRBxhh/yhUDwBFoNz6IxXAgMBAAGjggEH
ECHO MIIBAzBaBgNVHR8EUzBRME+gTaBLpEkwRzEMMAoGA1UEChMDTkhTMQswCQYDVQQL
ECHO EwJDQTEbMBkGA1UEAxMSTkhTIFJvb3QgQXV0aG9yaXR5MQ0wCwYDVQQDEwRDUkwx
ECHO MCsGA1UdEAQkMCKADzIwMDQwNjA0MTA1ODMxWoEPMjAyNDA2MDQxMTI4MzFaMAsG
ECHO A1UdDwQEAwIBBjAfBgNVHSMEGDAWgBTjJxeTzCue37VWdXJzwtcLoJ3wWzAdBgNV
ECHO HQ4EFgQU4ycXk8wrnt+1VnVyc8LXC6Cd8FswDAYDVR0TBAUwAwEB/zAdBgkqhkiG
ECHO 9n0HQQAEEDAOGwhWNy4wOjQuMAMCBJAwDQYJKoZIhvcNAQEFBQADggEBAIHWfvzc
ECHO bYSyFcMWQnUzplM0u0559K+KEMzlM5+TDgqzC3K94Y09mWYUMyS+qoYV88VzaKyb
ECHO 38FSs2/uNhPTXMduhqQTIoPiR2DFMjgjCMoAfvh9R2pFnbpncXLa9I1aN9RgYryC
ECHO k/6d7UP+gBurwfxmyObiCmozMIvIpoRXNKRqhqh/zKUKI7/tc2t/ris2bOw2j5X1
ECHO aqflzrrBh/DEFkvK9InQg6cYdMOqWT/iQ+WOc/UIisNXGfYFsAnD7XUlHf7+Z8FN
ECHO EtUptUqiBkmMvXfy9Bgv/pqqZe8HedZjQAc6SgE+DfBuU8CZt6h1WCZu4YlAaFPF
ECHO g1qeO4bUm+/96oA=
ECHO -----END CERTIFICATE-----
)
Echo old Rootca Certificate Created
ECHO:

rem create 1csubca certificate file
FOR /F "tokens=*" %%I in ('chcp') do set "chcp=%%I"
> subca.der (
ECHO -----BEGIN CERTIFICATE-----
ECHO MIIECjCCAvKgAwIBAgIET4alRTANBgkqhkiG9w0BAQsFADA4MQwwCgYDVQQKEwNO
ECHO SFMxCzAJBgNVBAsTAkNBMRswGQYDVQQDExJOSFMgUm9vdCBBdXRob3JpdHkwHhcN
ECHO MTcwNDEyMDkyOTI5WhcNMjQwNjA0MTEyODMxWjAyMQwwCgYDVQQKDANuaHMxCzAJ
ECHO BgNVBAsMAkNBMRUwEwYDVQQDDAxOSFMgTGV2ZWwgMUMwggEiMA0GCSqGSIb3DQEB
ECHO AQUAA4IBDwAwggEKAoIBAQCWfw77SnzZcor5ygbv4Y5/OsPXgvmUUI8qNK5PdMUO
ECHO 0jvwVYX+mdsLA6ZJLbj/QslbFjIecYunr7f/lA/3AO3Y37uBn7jHB6hwtu2r2JNj
ECHO z38efNHBkwczI5S7cpLa+Wm9Z/7PKzEC1yRCBFQdY8bTPbngm81LEK0fl2DOEZop
ECHO XSSy1hqtGVQB7LNpBAxLF3uHdyQGdXV5gFb3YBpbAh+XUw8LyQhQ/BnzJGtSVczB
ECHO rsFo0DNlHdMRsynxHMuyVbebUOojU1uFIgsktc0yAhsq2Wak6DaBvEnuZvA9+PhM
ECHO 6PrtjU715n+G4s2mo5R8WMqTm4sOuFIPr3g/FU8nQVWnAgMBAAGjggEgMIIBHDCB
ECHO hgYDVR0fBH8wfTBPoE2gS6RJMEcxDDAKBgNVBAoTA05IUzELMAkGA1UECxMCQ0Ex
ECHO GzAZBgNVBAMTEk5IUyBSb290IEF1dGhvcml0eTENMAsGA1UEAxMEQ1JMMTAqoCig
ECHO JoYkaHR0cDovL2NybC5uaHMudWsvbGl2ZS9yb290L0NSTDEuY3JsMBgGA1UdIAQR
ECHO MA8wDQYLKoY6AIl7ZQADAgAwDwYDVR0TAQH/BAUwAwEB/zALBgNVHQ8EBAMCAQYw
ECHO HwYDVR0jBBgwFoAU4ycXk8wrnt+1VnVyc8LXC6Cd8FswHQYDVR0OBBYEFLppo+N6
ECHO 4nw9N1dSb+nzE2RM4cC1MBkGCSqGSIb2fQdBAAQMMAobBFY4LjEDAgCBMA0GCSqG
ECHO SIb3DQEBCwUAA4IBAQAFvGEGRdjD0A6L+/x3sI86BkaRlbM3rvUQa8dqpmxeOtsO
ECHO A24ou5VWj9DoDttCG16DFpwHk2cYEq2h4OJTgUPodb/iKgIXbCW7Z8UZziowYwGF
ECHO H1Bos72iB175bfX2idniEnp/3+9mS3xoEffSv8exa/QAf0ehQlv3+ZiaQog87nxc
ECHO CdTyEUpF7En5YKFGgmBRrWJskaQKmQuW2k+voy3TKKHc47M+SD3URgT09UOGjnCj
ECHO KhVwSsvq6AKyJbJPMB/d0BWFmgaABosOIyYO9sCi3WHKZKHTMM5gV8Hgl45YY2Z6
ECHO DAMMGmYK5/C3KiSM98GBeA3/m02S8nupSMgUYaf+
ECHO -----END CERTIFICATE-----
)
Echo old 1CSubca Created
ECHO:

rem create G2rootca certificate file
FOR /F "tokens=*" %%I in ('chcp') do set "chcp=%%I"
> G2rootca.der (
ECHO -----BEGIN CERTIFICATE-----
ECHO MIIFrDCCA5SgAwIBAgIQApYpAQp6EMvJ1TAXp7j0nDANBgkqhkiG9w0BAQwFADBI
ECHO MQswCQYDVQQGEwJHQjEMMAoGA1UEChMDTkhTMQswCQYDVQQLEwJDQTEeMBwGA1UE
ECHO AxMVTkhTIFJvb3QgQXV0aG9yaXR5IEcyMB4XDTIyMDQwNzExMTEyMVoXDTQyMDQw
ECHO NzExNDEyMVowSDELMAkGA1UEBhMCR0IxDDAKBgNVBAoTA05IUzELMAkGA1UECxMC
ECHO Q0ExHjAcBgNVBAMTFU5IUyBSb290IEF1dGhvcml0eSBHMjCCAiIwDQYJKoZIhvcN
ECHO AQEBBQADggIPADCCAgoCggIBANs4IQFxCsbIs1+EeWEAVSk/u2oTH4+bZEcswAE6
ECHO 7kvM76pKgPHMDHD++GNZT2srEOArAqkMi47GqYZzwPhEd6lZqY3J5HDNT/VXzFuh
ECHO gw9IfajEK0yD0tJ05nnaEzbzd+LvaVB9XgbaNmkL5JEgAFyGZaLCbe7+6rKfpL40
ECHO 14siRhD7zCBNkHU6dPGMcewptiD976EP6hQyhCD3hnHxk8rLDwJR28g3/cjU4NFM
ECHO qtm4y2XQAWu+Yq3PboTvLFDTcIDgYtAcLPaPIiHE2bccZyfB284T1zNog0iuYZJw
ECHO rD2d99myuUXvDxx3Ii8sgvMkv5qToKAysxl9HYbBw4DI8O4kvVXTbfB1EG6Hhfo2
ECHO smgFkwVcJZNyu57NnhRI2c1cxWPz5jw/qAysoBpfIcjVj3bCYGSVY9DbhcL+1Uk6
ECHO ulmZgi6Rq9qNSlqVkB6oU/MRhB7vTAxaH5ZD6JRwToHjewpXB0ZbZBvK1pinzLez
ECHO c/Oy8aW5SKrpzUPL2BM8NBf6rh9Hz+gjsnwtrOki0ahekLYeDfp4WAM6/8uqfeKb
ECHO JnteGIldzY1x5xLUhm4oCyXH5ZCnCnjuyq9tSJzGGg8DmSbl1N5DQT58984yDszm
ECHO 1hh/cOYImQaepG9z1v3gf5rdt4RXoWFoL0RRhLQHur0Yg7gXd6umy92QHRw5e1g+
ECHO PK6NAgMBAAGjgZEwgY4wDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8w
ECHO KwYDVR0QBCQwIoAPMjAyMjA0MDcxMTExMjFagQ8yMDQyMDQwNzExNDEyMVowHwYD
ECHO VR0jBBgwFoAUj5ywA6E1kIYd1ht4UgXJxLVAMTQwHQYDVR0OBBYEFI+csAOhNZCG
ECHO HdYbeFIFycS1QDE0MA0GCSqGSIb3DQEBDAUAA4ICAQDAvoimEzUZauqljyVYiyKG
ECHO jeoIgSp0AW8Adq1xsXZfIc3/Ht/R1wsur/Y0Nu84r67O6HUzNGy0qzW5rytOQJHh
ECHO BrUtTIk7j8tX27PpNkgzadn8fZM1kFojkaogbkHcqORur/DVtDyuVHe04HxeP6QR
ECHO xnSjaKAjwTbjHlJ0n6ADrLzxVKpEdPKIs+twy7mtnrh9uK3gCOS1ODLVPaf1RDM9
ECHO 6WgCro8496n3ucmCuMmHSmtlPy7yIDT6daDkQY9ETqDBozmtAGF6FECH5gBK36qE
ECHO ySFjjX4BNbeW3CWiVcavwtV1ozANbxp8g6gBYl4NLJ0fTg8Zu2VNjqQ250Iew9vr
ECHO /dBtDDlBzKgJ/D9hWkWJy85sCpIXTiMaY6uqa69f05kiW3qPw+fq+k3HfkW5N8aY
ECHO dZm+c+wvlK6tD9+Wfovff2jaQA5j76Gu5hxlySNTKsW1f3ToCE36789WjbpOcSfz
ECHO /wqQiBkTxpaOXHFncF+em5mW3q+o7Aac/KNouw8E9DM/v16h1O15m+yIW6JgZdXu
ECHO 9sNiFX8hG6t3SggWAuUINX2pmvh90Ani89TG0+fSO+M4a5xWdrFGvAXSQi6dbdhs
ECHO yE1F3YceHBPFtxmIeqcRS9ko86lMgU0MguJ7n9ngRurzWOS/ZHRPL2Xt/OyA+YZF
ECHO DMjLvT0kgQN+z+1lHOMUxA==
ECHO -----END CERTIFICATE-----
)

ECHO G2 Rootca Certificate created
ECHO:

rem create G2 Auth certificate file
FOR /F "tokens=*" %%I in ('chcp') do set "chcp=%%I"
> G2subca.der (
ECHO -----BEGIN CERTIFICATE-----
ECHO MIIFezCCA2OgAwIBAgIQX8RxMSsLeIP0CvV+/QsfBzANBgkqhkiG9w0BAQsFADBI
ECHO MQswCQYDVQQGEwJHQjEMMAoGA1UEChMDTkhTMQswCQYDVQQLEwJDQTEeMBwGA1UE
ECHO AxMVTkhTIFJvb3QgQXV0aG9yaXR5IEcyMB4XDTIyMDkxNTEwMzg1NVoXDTMyMDkx
ECHO NTExMDg1NVowSDELMAkGA1UEBhMCR0IxDDAKBgNVBAoTA25oczELMAkGA1UECxMC
ECHO Q0ExHjAcBgNVBAMTFU5IUyBBdXRoZW50aWNhdGlvbiBHMjCCASIwDQYJKoZIhvcN
ECHO AQEBBQADggEPADCCAQoCggEBAMIFhMdiEQ3PVRGO+X57I073NR99MK8l2RAmLBYy
ECHO x/1oqT8F5Mr+TXOiwfzRWCMUR/nJoWzio56yUhlj7QAgj+q/77SKVamCAK6JbI+V
ECHO SGKKUgwAc8Q4sttFOATz3FWPTacjnJbkTQItKeOhbsWQXrnS0kHOM/FwIYJTxY+K
ECHO t9tXBkiBzQ05uoPhlsv2fScZ8tw7ySX675yf1/hjeNWnI1PgdslbnZaO9+WKqGly
ECHO fu3hl+GfAFNl7gPKURFFhm84Iyg3cfFB8IqWEMDQzo+ILITH7BQNh2K30eaaix9S
ECHO vxLmctdAZeMB+9Nw+G5guRDMxEhp606MbvKZAMT/8v4KwIsCAwEAAaOCAV8wggFb
ECHO MA4GA1UdDwEB/wQEAwIBBjASBgNVHRMBAf8ECDAGAQH/AgEBMD4GA1UdIAQ3MDUw
ECHO MwYLKoY6AIl7ZQADAgAwJDAiBggrBgEFBQcCARYWaHR0cHM6Ly9wa2kubmhzLnVr
ECHO L0NQUzB2BggrBgEFBQcBAQRqMGgwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLm5o
ECHO cy51ay9vY3NwMEEGCCsGAQUFBzAChjVodHRwOi8vcGtpLm5ocy51ay9saXZlL0cy
ECHO L3Jvb3QvTkhTUm9vdEF1dGhvcml0eUcyLmNydDA9BgNVHR8ENjA0MDKgMKAuhixo
ECHO dHRwOi8vY3JsLm5ocy51ay9saXZlL0cyL3Jvb3QvTkhTcm9vdEcyLmNybDAfBgNV
ECHO HSMEGDAWgBSPnLADoTWQhh3WG3hSBcnEtUAxNDAdBgNVHQ4EFgQUlKJQfffI6m3V
ECHO pQ3BabPPZfiYuqIwDQYJKoZIhvcNAQELBQADggIBALBxCnTrOZcoqbxFqaclqzzU
ECHO oaipK58fuozGAKM3yE3XNu7uwe6ve9igGGZ1bx0WrxpUt9IfkR73lbD7v/5IkcCP
ECHO 7RGlDCyMVIiOEkEGYyWsd1iBjr3py5WsRMwIHB/Tk7Su+fibQF70eTBg4jVE/xQX
ECHO lvkbU1mjfvd22T1OgmaZMzfmCQqiHCuUaPuPzGbh1nRKV3+oqFE78ypzuPd1fvso
ECHO mgEzc9GMAX5IXtV2m9TXm4y1CI1mY2HNIZaF7KA6v6QI/tF9v42Q1TdaZKwDeEjT
ECHO Zcx+DMgHlstFru9sQBF7M1AtVufqmcP4aP3mg6D4hiwHJZmW/tF2VLb2tQe0+G3k
ECHO ArnuS/TnUnWTmab53xnF8gFQoIvEc0Yh6ETTaeFeBiTXSmHUyi8lNROIvmmihsZx
ECHO zmYVoGB9G0HrZHhuinj+ZLiJrHuvVVNOvfyiXy81PF0pXos3faLrwDqn638B/UKR
ECHO 2Obpxi81ByK3oREgZuyjoJUWSd1g5QK5QJryN+A3RJwgJQELsFkbyu354BfjPfJe
ECHO xwrjUNSmqeE3JfBf6oWNdU/nJK1HRoppHF7J6/RqF995u0L90Z86FvHz3F+sFNO7
ECHO U12dIZmsSj94V8gwrECy3Qm5yZubqyW7wOuuBJf3KvfyK43l/2FqRumh+pV/TAVq
ECHO rsl4YOGTbdiJkZjFGbw/
ECHO -----END CERTIFICATE-----
)

ECHO G2 Auth Certificate created
ECHO:
ECHO:
rem ECHO Please ensure that you have the Following files in your keystore directory:-
rem ECHO:
rem ECHO G2rootca.der - this is the new G2 root certificate
rem ECHO G2subca.der - this is the new G2 auth certificate
rem ECHO rootca.der - this is the old root CA certificate that we have now replaced as it expires next year
rem ECHO subca.der - this is the old sub CA certificate that we have now replaced as it expires next year
rem ECHO mesh.crt - this is the client certificate the DIR team send back to you

rem PAUSE

rem import G2 Root Cert
keytool -importcert -file G2rootca.der -noprompt -alias G2rootca -storepass "%_Pass%" -keystore MESH.keystore
Rem import G2 Auth Cert
keytool -importcert -file G2subca.der -alias G2subca -storepass "%_Pass%" -keystore MESH.keystore
rem import Old Root cert
keytool -importcert -file rootca.der -noprompt -alias rootca -storepass "%_Pass%" -keystore MESH.keystore
Rem import old 1C subca
keytool -importcert -file subca.der -alias subca -storepass "%_Pass%" -keystore MESH.keystore
rem import G2 Client cert
keytool -importcert -trustcacerts -alias meshclient -file mesh.crt -storepass "%_Pass%" -keystore MESH.keystore

ECHO:
ECHO  all certificates imported
ECHO:


PAUSE
del tempfile.txt
del G2rootca.der
del G2subca.der
del rootca.der
del subca.der

EXIT
GOTO End

:Mailboxerror
ECHO You did not enter a MESH mailbox ID or local identifier ie server name
ECHO Do you wish to start again ? 
SET /P yesno=y or n :- 
IF "%yesno%" == "y" GOTO Start
GOTO END

:Odserror
ECHO You did not enter an ODS Code This is usually the characters before the mailbox type in the mailbox name
set tempods=%mailboxid:~0,-5%
ECHO:
ECHO Do you wish to use %tempods%
SET /P yesno=y or n :- 
IF "%yesno%" == "y" GOTO Temp1
ECHO Do you wish to start again ? 
SET /P yesno=y or n :- 
IF "%yesno%" == "y" GOTO Start
GOTO End

:Mailboxtypeerror
ECHO Are you using your own software to access the MESH mailbox rather than the NHS MESH Client
SET /P yesno=y or n :- 
IF "%yesno%" == "y" GOTO Temp2
GOTO Temp3

:Temp1
SET odscode=%tempods%
GOTO Setmailboxtype

:Temp2
SET "meshdomain=api.mesh-client.nhs.uk"
GOTO Kpass

:Temp3
SET "meshdomain=mesh-client.nhs.uk"
GOTO Kpass

:Temp4
ECHO Please confirm, the certificate will have a Common or Subject name of %fqdn% is this ok? or q to quit
SET finyesno=""
SET /P finyesno=y or n :- 
IF "%finyesno%" == "n" GOTO :Start
IF "%finyesno%" == "y" GOTO :Kstart
IF "%finyesno%" == "q" GOTO :End
GOTO Temp4

:Certerror
ECHO MESH client certificate not found!!!
ECHO Please create a file called mesh.crt and place it in the same location as the new mesh.csr and mesh.keystore files
GOTO Certcheck

:Error
ECHO Do you wish to start again ? 
SET /P quit=y or n :- 
IF "%quit%" == "y" GOTO Start

:End