test.cnf 2.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140
  1. [default]
  2. batch = 1 # do not use stdin
  3. total_timeout = 8 # prevent, e.g., infinite polling due to error
  4. trusted = trusted.crt
  5. newkey = new.key
  6. newkeypass =
  7. cmd = ir
  8. out_trusted = root.crt
  9. certout = test.cert.pem
  10. policies = certificatePolicies
  11. #policy_oids = 1.2.3.4
  12. #policy_oids_critical = 1
  13. #verbosity = 7
  14. ############################# server configurations
  15. [Mock] # the built-in OpenSSL CMP mock server
  16. no_check_time = 1
  17. server_host = 127.0.0.1 # localhost
  18. server_port = 1700
  19. server_tls = 0
  20. server_cert = server.crt
  21. server = $server_host:$server_port
  22. server_path = pkix/
  23. path = $server_path
  24. ca_dn = /O=openssl_cmp
  25. recipient = $ca_dn
  26. server_dn = /O=openssl_cmp
  27. expect_sender = $server_dn
  28. subject = "/C=AU/ST=Some-State/O=Internet Widgits Pty Ltd/CN=leaf"
  29. newkey = signer.key
  30. out_trusted = signer_root.crt
  31. kur_port = 1700
  32. pbm_port = 1700
  33. pbm_ref =
  34. pbm_secret = pass:test
  35. cert = signer.crt
  36. key = signer.p12
  37. keypass = pass:12345
  38. ignore_keyusage = 0
  39. column = 0
  40. sleep = 0
  41. ############################# aspects
  42. [connection]
  43. msg_timeout = 5
  44. total_timeout =
  45. # reset any TLS options to default:
  46. tls_used =
  47. tls_cert =
  48. tls_key =
  49. tls_keypass =
  50. tls_trusted =
  51. tls_host =
  52. [tls]
  53. server =
  54. tls_used =
  55. tls_cert =
  56. tls_key =
  57. tls_keypass =
  58. tls_trusted =
  59. tls_host =
  60. [credentials]
  61. ref =
  62. secret =
  63. cert =
  64. key =
  65. keypass =
  66. extracerts =
  67. digest =
  68. unprotected_requests =
  69. [verification]
  70. #expect_sender =
  71. srvcert =
  72. trusted =
  73. untrusted =
  74. #unprotected_errors =
  75. extracertsout =
  76. [commands]
  77. cmd =
  78. cacertsout =
  79. infotype =
  80. oldcert =
  81. revreason =
  82. geninfo =
  83. [enrollment]
  84. cmd =
  85. newkey =
  86. newkeypass =
  87. #subject =
  88. issuer =
  89. days =
  90. reqexts =
  91. sans =
  92. san_nodefault = 0
  93. #popo =
  94. implicit_confirm = 0
  95. disable_confirm = 0
  96. certout =
  97. out_trusted =
  98. oldcert =
  99. csr =
  100. ############################# extra cert template contents
  101. [certificatePolicies]
  102. certificatePolicies = "critical, @pkiPolicy"
  103. [pkiPolicy]
  104. policyIdentifier = 1.2.3.4
  105. [reqexts]
  106. basicConstraints = CA:FALSE
  107. #basicConstraints = critical, CA:TRUE
  108. keyUsage = critical, digitalSignature # keyAgreement, keyEncipherment, nonRepudiation
  109. extendedKeyUsage = critical, clientAuth # serverAuth, codeSigning
  110. #crlDistributionPoints = URI:http:
  111. #authorityInfoAccess = URI:http:
  112. subjectAltName = @alt_names
  113. [alt_names]
  114. DNS.0 = localhost
  115. IP.0 = 127.0.0.1
  116. IP.1 = 192.168.1.1
  117. URI.0 = http://192.168.0.2
  118. [reqexts_invalidkey]
  119. subjectAltName = @alt_names_3
  120. [alt_names_3]
  121. DNS.0 = localhost
  122. DNS.1 = example.com
  123. DNS.2 = example2.com
  124. DNS__3 = example3.com