12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576 |
- #
- # OpenSSL example configuration file for automated certificate creation.
- #
- # Comment out the next line to ignore configuration errors
- config_diagnostics = 1
- # This definition stops the following lines choking if HOME or CN
- # is undefined.
- HOME = .
- CN = "Not Defined"
- default_ca = ca
- ####################################################################
- [ req ]
- default_bits = 2048
- default_keyfile = privkey.pem
- # Don't prompt for fields: use those in section directly
- prompt = no
- distinguished_name = req_distinguished_name
- x509_extensions = v3_ca # The extensions to add to the self signed cert
- string_mask = utf8only
- # req_extensions = v3_req # The extensions to add to a certificate request
- [ req_distinguished_name ]
- countryName = UK
- organizationName = OpenSSL Group
- # Take CN from environment so it can come from a script.
- commonName = $ENV::CN
- [ usr_rsa_cert ]
- # These extensions are added when 'ca' signs a request for a normal end-entity
- # certificate with key usage restrictions compatible with RSA keys
- basicConstraints = CA:FALSE
- keyUsage = critical, nonRepudiation, digitalSignature, keyEncipherment
- # Following SKID and AKID settings are meanwhile by default in all certificates.
- # See doc/man5/x509v3_config.pod for details.
- # subjectKeyIdentifier = hash
- # authorityKeyIdentifier = keyid, issuer
- [ signer_cert ]
- basicConstraints = CA:FALSE
- keyUsage = critical, digitalSignature
- [ dh_cert ]
- # These extensions are added when 'ca' signs a request for an end-entity
- # DH certificate, for which only key agreement makes sense
- basicConstraints = CA:FALSE
- keyUsage = critical, keyAgreement
- [ codesign_cert ]
- # These extensions are added when 'ca' signs a request for a code-signing
- # end-entity certificate compatible with RSA and ECC keys
- basicConstraints = CA:FALSE
- keyUsage = critical, digitalSignature
- extendedKeyUsage = codeSigning
- [ v3_ca ]
- # Extensions for a typical CA as required by RFC 5280 etc.
- # SKID and AKID are by default set according to PKIX recommendation.
- basicConstraints = critical, CA:true
- keyUsage = critical, cRLSign, keyCertSign
|