test.cnf 2.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142
  1. [default]
  2. batch = 1 # do not use stdin
  3. total_timeout = 8 # prevent, e.g., infinite polling due to error
  4. trusted = trusted.crt
  5. newkey = new.key
  6. newkeypass =
  7. cmd = ir
  8. out_trusted = root.crt
  9. #certout = test.cert.pem
  10. policies = certificatePolicies
  11. #policy_oids = 1.2.3.4
  12. #policy_oids_critical = 1
  13. #verbosity = 7
  14. ############################# server configurations
  15. [Mock] # the built-in OpenSSL CMP mock server
  16. no_check_time = 1
  17. server_host = 127.0.0.1 # localhost
  18. # server_port = 0 means that the port is determined by the server
  19. server_port = 0
  20. server_tls = $server_port
  21. server_cert = server.crt
  22. server = $server_host:$server_port
  23. server_path = pkix/
  24. path = $server_path
  25. ca_dn = /O=openssl_cmp
  26. recipient = $ca_dn
  27. server_dn = /O=openssl_cmp
  28. expect_sender = $server_dn
  29. subject = "/C=AU/ST=Some-State/O=Internet Widgits Pty Ltd/CN=leaf"
  30. newkey = signer.key
  31. out_trusted = signer_root.crt
  32. kur_port = $server_port
  33. pbm_port = $server_port
  34. pbm_ref =
  35. pbm_secret = pass:test
  36. cert = signer.crt
  37. key = signer.p12
  38. keypass = pass:12345
  39. ignore_keyusage = 0
  40. column = 0
  41. sleep = 0
  42. ############################# aspects
  43. [connection]
  44. msg_timeout = 5
  45. total_timeout =
  46. # reset any TLS options to default:
  47. tls_used =
  48. tls_cert =
  49. tls_key =
  50. tls_keypass =
  51. tls_trusted =
  52. tls_host =
  53. [tls]
  54. server =
  55. tls_used =
  56. tls_cert =
  57. tls_key =
  58. tls_keypass =
  59. tls_trusted =
  60. tls_host =
  61. [credentials]
  62. ref =
  63. secret =
  64. cert =
  65. key =
  66. keypass =
  67. extracerts =
  68. digest =
  69. unprotected_requests =
  70. [verification]
  71. #expect_sender =
  72. srvcert =
  73. trusted =
  74. untrusted =
  75. #unprotected_errors =
  76. extracertsout =
  77. [commands]
  78. cmd =
  79. certout =
  80. cacertsout =
  81. infotype =
  82. oldcert =
  83. revreason =
  84. geninfo =
  85. [enrollment]
  86. cmd =
  87. newkey =
  88. newkeypass =
  89. #subject =
  90. issuer =
  91. days =
  92. reqexts =
  93. sans =
  94. san_nodefault = 0
  95. #popo =
  96. implicit_confirm = 0
  97. disable_confirm = 0
  98. certout =
  99. out_trusted =
  100. oldcert =
  101. csr =
  102. ############################# extra cert template contents
  103. [certificatePolicies]
  104. certificatePolicies = "critical, @pkiPolicy"
  105. [pkiPolicy]
  106. policyIdentifier = 1.2.3.4
  107. [reqexts]
  108. basicConstraints = CA:FALSE
  109. #basicConstraints = critical, CA:TRUE
  110. keyUsage = critical, digitalSignature # keyAgreement, keyEncipherment, nonRepudiation
  111. extendedKeyUsage = critical, clientAuth # serverAuth, codeSigning
  112. #crlDistributionPoints = URI:http:
  113. #authorityInfoAccess = URI:http:
  114. subjectAltName = @alt_names
  115. [alt_names]
  116. DNS.0 = localhost
  117. IP.0 = 127.0.0.1
  118. IP.1 = 192.168.1.1
  119. URI.0 = http://192.168.0.2
  120. [reqexts_invalidkey]
  121. subjectAltName = @alt_names_3
  122. [alt_names_3]
  123. DNS.0 = localhost
  124. DNS.1 = xn--rksmrgs-5wao1o.example.com
  125. DNS.2 = xn--rkmacka-5wa.example.com
  126. DNS__3 = xn--rksallad-0za.example.com