File:  [ELWIX - Embedded LightWeight unIX -] / elwix / config / etc / default / ssl / openssl.cnf
Revision 1.1.1.1 (vendor branch): download - view: text, annotated - select for diffs - revision graph
Tue Jul 5 23:43:00 2011 UTC (13 years ago) by misho
Branches: misho, MAIN
CVS tags: start, elwix2_8, elwix2_7, elwix2_6, elwix2_3, elwix2_2, elwix2_1, elwix2_0, elwix1_9_mips, elwix1_9, elwix1_8, elwix1_7, elwix1_6, elwix1_5, elwix1_4, Patch1, HEAD, ELWIX2_7, ELWIX2_6, ELWIX2_5, ELWIX2_2p0, ELWIX2_1, ELWIX2_0, ELWIX1_9, ELWIX1_8, ELWIX1_7, ELWIX1_6, ELWIX1_5
ELWIX project

    1: # $FreeBSD: src/crypto/openssl/apps/openssl.cnf,v 1.8 2006/07/29 19:14:46 simon Exp $
    2: #
    3: # OpenSSL example configuration file.
    4: # This is mostly being used for generation of certificate requests.
    5: #
    6: 
    7: # This definition stops the following lines choking if HOME isn't
    8: # defined.
    9: HOME			= .
   10: RANDFILE		= $ENV::HOME/.rnd
   11: 
   12: # Extra OBJECT IDENTIFIER info:
   13: #oid_file		= $ENV::HOME/.oid
   14: oid_section		= new_oids
   15: 
   16: # To use this configuration file with the "-extfile" option of the
   17: # "openssl x509" utility, name here the section containing the
   18: # X.509v3 extensions to use:
   19: # extensions		= 
   20: # (Alternatively, use a configuration file that has only
   21: # X.509v3 extensions in its main [= default] section.)
   22: 
   23: [ new_oids ]
   24: 
   25: # We can add new OIDs in here for use by 'ca' and 'req'.
   26: # Add a simple OID like this:
   27: # testoid1=1.2.3.4
   28: # Or use config file substitution like this:
   29: # testoid2=${testoid1}.5.6
   30: 
   31: ####################################################################
   32: [ ca ]
   33: default_ca	= CA_default		# The default ca section
   34: 
   35: ####################################################################
   36: [ CA_default ]
   37: 
   38: dir		= ./demoCA		# Where everything is kept
   39: certs		= $dir/certs		# Where the issued certs are kept
   40: crl_dir		= $dir/crl		# Where the issued crl are kept
   41: database	= $dir/index.txt	# database index file.
   42: #unique_subject	= no			# Set to 'no' to allow creation of
   43: 					# several ctificates with same subject.
   44: new_certs_dir	= $dir/newcerts		# default place for new certs.
   45: 
   46: certificate	= $dir/cacert.pem 	# The CA certificate
   47: serial		= $dir/serial 		# The current serial number
   48: crlnumber	= $dir/crlnumber	# the current crl number
   49: 					# must be commented out to leave a V1 CRL
   50: crl		= $dir/crl.pem 		# The current CRL
   51: private_key	= $dir/private/cakey.pem# The private key
   52: RANDFILE	= $dir/private/.rand	# private random number file
   53: 
   54: x509_extensions	= usr_cert		# The extentions to add to the cert
   55: 
   56: # Comment out the following two lines for the "traditional"
   57: # (and highly broken) format.
   58: name_opt 	= ca_default		# Subject Name options
   59: cert_opt 	= ca_default		# Certificate field options
   60: 
   61: # Extension copying option: use with caution.
   62: # copy_extensions = copy
   63: 
   64: # Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs
   65: # so this is commented out by default to leave a V1 CRL.
   66: # crlnumber must also be commented out to leave a V1 CRL.
   67: # crl_extensions	= crl_ext
   68: 
   69: default_days	= 365			# how long to certify for
   70: default_crl_days= 30			# how long before next CRL
   71: default_md	= sha1			# which md to use.
   72: preserve	= no			# keep passed DN ordering
   73: 
   74: # A few difference way of specifying how similar the request should look
   75: # For type CA, the listed attributes must be the same, and the optional
   76: # and supplied fields are just that :-)
   77: policy		= policy_match
   78: 
   79: # For the CA policy
   80: [ policy_match ]
   81: countryName		= match
   82: stateOrProvinceName	= match
   83: organizationName	= match
   84: organizationalUnitName	= optional
   85: commonName		= supplied
   86: emailAddress		= optional
   87: 
   88: # For the 'anything' policy
   89: # At this point in time, you must list all acceptable 'object'
   90: # types.
   91: [ policy_anything ]
   92: countryName		= optional
   93: stateOrProvinceName	= optional
   94: localityName		= optional
   95: organizationName	= optional
   96: organizationalUnitName	= optional
   97: commonName		= supplied
   98: emailAddress		= optional
   99: 
  100: ####################################################################
  101: [ req ]
  102: default_bits		= 1024
  103: default_keyfile 	= privkey.pem
  104: distinguished_name	= req_distinguished_name
  105: attributes		= req_attributes
  106: x509_extensions	= v3_ca	# The extentions to add to the self signed cert
  107: 
  108: # Passwords for private keys if not present they will be prompted for
  109: # input_password = secret
  110: # output_password = secret
  111: 
  112: # This sets a mask for permitted string types. There are several options. 
  113: # default: PrintableString, T61String, BMPString.
  114: # pkix	 : PrintableString, BMPString.
  115: # utf8only: only UTF8Strings.
  116: # nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
  117: # MASK:XXXX a literal mask value.
  118: # WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings
  119: # so use this option with caution!
  120: string_mask = nombstr
  121: 
  122: # req_extensions = v3_req # The extensions to add to a certificate request
  123: 
  124: [ req_distinguished_name ]
  125: countryName			= Country Name (2 letter code)
  126: countryName_default		= AU
  127: countryName_min			= 2
  128: countryName_max			= 2
  129: 
  130: stateOrProvinceName		= State or Province Name (full name)
  131: stateOrProvinceName_default	= Some-State
  132: 
  133: localityName			= Locality Name (eg, city)
  134: 
  135: 0.organizationName		= Organization Name (eg, company)
  136: 0.organizationName_default	= Internet Widgits Pty Ltd
  137: 
  138: # we can do this but it is not needed normally :-)
  139: #1.organizationName		= Second Organization Name (eg, company)
  140: #1.organizationName_default	= World Wide Web Pty Ltd
  141: 
  142: organizationalUnitName		= Organizational Unit Name (eg, section)
  143: #organizationalUnitName_default	=
  144: 
  145: commonName			= Common Name (eg, YOUR name)
  146: commonName_max			= 64
  147: 
  148: emailAddress			= Email Address
  149: emailAddress_max		= 64
  150: 
  151: # SET-ex3			= SET extension number 3
  152: 
  153: [ req_attributes ]
  154: challengePassword		= A challenge password
  155: challengePassword_min		= 4
  156: challengePassword_max		= 20
  157: 
  158: unstructuredName		= An optional company name
  159: 
  160: [ usr_cert ]
  161: 
  162: # These extensions are added when 'ca' signs a request.
  163: 
  164: # This goes against PKIX guidelines but some CAs do it and some software
  165: # requires this to avoid interpreting an end user certificate as a CA.
  166: 
  167: basicConstraints=CA:FALSE
  168: 
  169: # Here are some examples of the usage of nsCertType. If it is omitted
  170: # the certificate can be used for anything *except* object signing.
  171: 
  172: # This is OK for an SSL server.
  173: # nsCertType			= server
  174: 
  175: # For an object signing certificate this would be used.
  176: # nsCertType = objsign
  177: 
  178: # For normal client use this is typical
  179: # nsCertType = client, email
  180: 
  181: # and for everything including object signing:
  182: # nsCertType = client, email, objsign
  183: 
  184: # This is typical in keyUsage for a client certificate.
  185: # keyUsage = nonRepudiation, digitalSignature, keyEncipherment
  186: 
  187: # This will be displayed in Netscape's comment listbox.
  188: nsComment			= "OpenSSL Generated Certificate"
  189: 
  190: # PKIX recommendations harmless if included in all certificates.
  191: subjectKeyIdentifier=hash
  192: authorityKeyIdentifier=keyid,issuer
  193: 
  194: # This stuff is for subjectAltName and issuerAltname.
  195: # Import the email address.
  196: # subjectAltName=email:copy
  197: # An alternative to produce certificates that aren't
  198: # deprecated according to PKIX.
  199: # subjectAltName=email:move
  200: 
  201: # Copy subject details
  202: # issuerAltName=issuer:copy
  203: 
  204: #nsCaRevocationUrl		= http://www.domain.dom/ca-crl.pem
  205: #nsBaseUrl
  206: #nsRevocationUrl
  207: #nsRenewalUrl
  208: #nsCaPolicyUrl
  209: #nsSslServerName
  210: 
  211: [ v3_req ]
  212: 
  213: # Extensions to add to a certificate request
  214: 
  215: basicConstraints = CA:FALSE
  216: keyUsage = nonRepudiation, digitalSignature, keyEncipherment
  217: 
  218: [ v3_ca ]
  219: 
  220: 
  221: # Extensions for a typical CA
  222: 
  223: 
  224: # PKIX recommendation.
  225: 
  226: subjectKeyIdentifier=hash
  227: 
  228: authorityKeyIdentifier=keyid:always,issuer:always
  229: 
  230: # This is what PKIX recommends but some broken software chokes on critical
  231: # extensions.
  232: #basicConstraints = critical,CA:true
  233: # So we do this instead.
  234: basicConstraints = CA:true
  235: 
  236: # Key usage: this is typical for a CA certificate. However since it will
  237: # prevent it being used as an test self-signed certificate it is best
  238: # left out by default.
  239: # keyUsage = cRLSign, keyCertSign
  240: 
  241: # Some might want this also
  242: # nsCertType = sslCA, emailCA
  243: 
  244: # Include email address in subject alt name: another PKIX recommendation
  245: # subjectAltName=email:copy
  246: # Copy issuer details
  247: # issuerAltName=issuer:copy
  248: 
  249: # DER hex encoding of an extension: beware experts only!
  250: # obj=DER:02:03
  251: # Where 'obj' is a standard or added object
  252: # You can even override a supported extension:
  253: # basicConstraints= critical, DER:30:03:01:01:FF
  254: 
  255: [ crl_ext ]
  256: 
  257: # CRL extensions.
  258: # Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
  259: 
  260: # issuerAltName=issuer:copy
  261: authorityKeyIdentifier=keyid:always,issuer:always
  262: 
  263: [ proxy_cert_ext ]
  264: # These extensions should be added when creating a proxy certificate
  265: 
  266: # This goes against PKIX guidelines but some CAs do it and some software
  267: # requires this to avoid interpreting an end user certificate as a CA.
  268: 
  269: basicConstraints=CA:FALSE
  270: 
  271: # Here are some examples of the usage of nsCertType. If it is omitted
  272: # the certificate can be used for anything *except* object signing.
  273: 
  274: # This is OK for an SSL server.
  275: # nsCertType			= server
  276: 
  277: # For an object signing certificate this would be used.
  278: # nsCertType = objsign
  279: 
  280: # For normal client use this is typical
  281: # nsCertType = client, email
  282: 
  283: # and for everything including object signing:
  284: # nsCertType = client, email, objsign
  285: 
  286: # This is typical in keyUsage for a client certificate.
  287: # keyUsage = nonRepudiation, digitalSignature, keyEncipherment
  288: 
  289: # This will be displayed in Netscape's comment listbox.
  290: nsComment			= "OpenSSL Generated Certificate"
  291: 
  292: # PKIX recommendations harmless if included in all certificates.
  293: subjectKeyIdentifier=hash
  294: authorityKeyIdentifier=keyid,issuer:always
  295: 
  296: # This stuff is for subjectAltName and issuerAltname.
  297: # Import the email address.
  298: # subjectAltName=email:copy
  299: # An alternative to produce certificates that aren't
  300: # deprecated according to PKIX.
  301: # subjectAltName=email:move
  302: 
  303: # Copy subject details
  304: # issuerAltName=issuer:copy
  305: 
  306: #nsCaRevocationUrl		= http://www.domain.dom/ca-crl.pem
  307: #nsBaseUrl
  308: #nsRevocationUrl
  309: #nsRenewalUrl
  310: #nsCaPolicyUrl
  311: #nsSslServerName
  312: 
  313: # This really needs to be in place for it to be a proxy certificate.
  314: proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>