| lh | 9ed821d | 2023-04-07 01:36:19 -0700 | [diff] [blame] | 1 | # | 
 | 2 | # OpenSSL example configuration file for automated certificate creation. | 
 | 3 | # | 
 | 4 |  | 
 | 5 | # This definition stops the following lines choking if HOME or CN | 
 | 6 | # is undefined. | 
 | 7 | HOME			= . | 
 | 8 | RANDFILE		= $ENV::HOME/.rnd | 
 | 9 | CN			= "Not Defined" | 
 | 10 | default_ca		= ca | 
 | 11 |  | 
 | 12 | #################################################################### | 
 | 13 | [ req ] | 
 | 14 | default_bits		= 1024 | 
 | 15 | default_keyfile 	= privkey.pem | 
 | 16 | # Don't prompt for fields: use those in section directly | 
 | 17 | prompt			= no | 
 | 18 | distinguished_name	= req_distinguished_name | 
 | 19 | x509_extensions	= v3_ca	# The extensions to add to the self signed cert | 
 | 20 | string_mask = utf8only | 
 | 21 |  | 
 | 22 | # req_extensions = v3_req # The extensions to add to a certificate request | 
 | 23 |  | 
 | 24 | [ req_distinguished_name ] | 
 | 25 | countryName			= UK | 
 | 26 |  | 
 | 27 | organizationName		= OpenSSL Group | 
 | 28 | # Take CN from environment so it can come from a script. | 
 | 29 | commonName			= $ENV::CN | 
 | 30 |  | 
 | 31 | [ usr_cert ] | 
 | 32 |  | 
 | 33 | # These extensions are added when 'ca' signs a request for an end entity | 
 | 34 | # certificate | 
 | 35 |  | 
 | 36 | basicConstraints=critical, CA:FALSE | 
 | 37 | keyUsage=critical, nonRepudiation, digitalSignature, keyEncipherment | 
 | 38 |  | 
 | 39 | # This will be displayed in Netscape's comment listbox. | 
 | 40 | nsComment			= "OpenSSL Generated Certificate" | 
 | 41 |  | 
 | 42 | # PKIX recommendations harmless if included in all certificates. | 
 | 43 | subjectKeyIdentifier=hash | 
 | 44 | authorityKeyIdentifier=keyid | 
 | 45 | # OCSP responder certificate | 
 | 46 | [ ocsp_cert ] | 
 | 47 |  | 
 | 48 | basicConstraints=critical, CA:FALSE | 
 | 49 | keyUsage=critical, nonRepudiation, digitalSignature, keyEncipherment | 
 | 50 |  | 
 | 51 | # This will be displayed in Netscape's comment listbox. | 
 | 52 | nsComment			= "OpenSSL Generated Certificate" | 
 | 53 |  | 
 | 54 | # PKIX recommendations harmless if included in all certificates. | 
 | 55 | subjectKeyIdentifier=hash | 
 | 56 | authorityKeyIdentifier=keyid | 
 | 57 | extendedKeyUsage=OCSPSigning | 
 | 58 |  | 
 | 59 | [ dh_cert ] | 
 | 60 |  | 
 | 61 | # These extensions are added when 'ca' signs a request for an end entity | 
 | 62 | # DH certificate | 
 | 63 |  | 
 | 64 | basicConstraints=critical, CA:FALSE | 
 | 65 | keyUsage=critical, keyAgreement | 
 | 66 |  | 
 | 67 | # PKIX recommendations harmless if included in all certificates. | 
 | 68 | subjectKeyIdentifier=hash | 
 | 69 | authorityKeyIdentifier=keyid | 
 | 70 |  | 
 | 71 | [ v3_ca ] | 
 | 72 |  | 
 | 73 |  | 
 | 74 | # Extensions for a typical CA | 
 | 75 |  | 
 | 76 | # PKIX recommendation. | 
 | 77 |  | 
 | 78 | subjectKeyIdentifier=hash | 
 | 79 | authorityKeyIdentifier=keyid:always | 
 | 80 | basicConstraints = critical,CA:true | 
 | 81 | keyUsage = critical, cRLSign, keyCertSign | 
 | 82 |  | 
 | 83 | # Minimal CA entry to allow generation of CRLs. | 
 | 84 | [ca] | 
 | 85 | database=index.txt | 
 | 86 | crlnumber=crlnum.txt |