mirror of
https://github.com/mirror/wget.git
synced 2025-02-10 03:40:49 +08:00
Add script to generate test certs non-interactive
* Test-pinnedpubkey-hash-https.py: Read hashed pubkey from file * Test-pinnedpubkey-hash-no-check-fail-https.py: Use invalid hash * certs/make_ca.sh: New script to generate test certs non-interactive * certs/ca-template.cfg: New file (template for CA cert) * certs/server-template.cfg: New file (template for server cert) * certs/server-pubkey-sha256.base64: New file (pubkey sha256 hash)
This commit is contained in:
parent
cdc3e28d8e
commit
2318c309d4
@ -20,8 +20,12 @@ A_File = WgetFile ("File1", File1)
|
|||||||
B_File = WgetFile ("File2", File2)
|
B_File = WgetFile ("File2", File2)
|
||||||
C_File = WgetFile ("File3", File3)
|
C_File = WgetFile ("File3", File3)
|
||||||
|
|
||||||
CAFILE = os.path.abspath(os.path.join(os.getenv('srcdir', '.'), 'certs', 'ca-cert.pem'))
|
CERTDIR = os.path.abspath(os.path.join(os.getenv('srcdir', '.'), 'certs'))
|
||||||
WGET_OPTIONS = "--pinnedpubkey=sha256//mHiEhWHvusnzP7COZk+SzSJ+Gl7nZT+ADx0PUnDD7mM= --ca-certificate=" + CAFILE
|
CAFILE = CERTDIR + '/ca-cert.pem'
|
||||||
|
KEYFILE = CERTDIR + '/server-pubkey-sha256.base64'
|
||||||
|
with open(KEYFILE, 'r') as f:
|
||||||
|
KEY = f.read().replace('\n', '')
|
||||||
|
WGET_OPTIONS = "--pinnedpubkey=sha256//" + KEY + " --ca-certificate=" + CAFILE
|
||||||
WGET_URLS = [["File1", "File2"]]
|
WGET_URLS = [["File1", "File2"]]
|
||||||
|
|
||||||
Files = [[A_File, B_File]]
|
Files = [[A_File, B_File]]
|
||||||
|
@ -18,7 +18,7 @@ File2 = "With lemon or cream?"
|
|||||||
A_File = WgetFile ("File1", File1)
|
A_File = WgetFile ("File1", File1)
|
||||||
B_File = WgetFile ("File2", File2)
|
B_File = WgetFile ("File2", File2)
|
||||||
|
|
||||||
WGET_OPTIONS = "--no-check-certificate --pinnedpubkey=sha256//mHiEhWHvusnzP7COZk+SzSJ+Gl7ZZT+ADx0PUnDD7mM="
|
WGET_OPTIONS = "--no-check-certificate --pinnedpubkey=sha256//invalid"
|
||||||
WGET_URLS = [["File1", "File2"]]
|
WGET_URLS = [["File1", "File2"]]
|
||||||
|
|
||||||
Files = [[A_File, B_File]]
|
Files = [[A_File, B_File]]
|
||||||
|
247
testenv/certs/ca-template.cfg
Normal file
247
testenv/certs/ca-template.cfg
Normal file
@ -0,0 +1,247 @@
|
|||||||
|
# X.509 Certificate options
|
||||||
|
#
|
||||||
|
# DN options
|
||||||
|
|
||||||
|
# The organization of the subject.
|
||||||
|
organization = "GNU"
|
||||||
|
|
||||||
|
# The organizational unit of the subject.
|
||||||
|
unit = "Wget"
|
||||||
|
|
||||||
|
# The locality of the subject.
|
||||||
|
# locality =
|
||||||
|
|
||||||
|
# The state of the certificate owner.
|
||||||
|
# state = ""
|
||||||
|
|
||||||
|
# The country of the subject. Two letter code.
|
||||||
|
# country = GR
|
||||||
|
|
||||||
|
# The common name of the certificate owner.
|
||||||
|
cn = "GNU Wget"
|
||||||
|
|
||||||
|
# A user id of the certificate owner.
|
||||||
|
#uid = ""
|
||||||
|
|
||||||
|
# Set domain components
|
||||||
|
#dc = "name"
|
||||||
|
#dc = "domain"
|
||||||
|
|
||||||
|
# If the supported DN OIDs are not adequate you can set
|
||||||
|
# any OID here.
|
||||||
|
# For example set the X.520 Title and the X.520 Pseudonym
|
||||||
|
# by using OID and string pairs.
|
||||||
|
#dn_oid = 2.5.4.12 Dr.
|
||||||
|
#dn_oid = 2.5.4.65 jackal
|
||||||
|
|
||||||
|
# This is deprecated and should not be used in new
|
||||||
|
# certificates.
|
||||||
|
# pkcs9_email = "bug-wget@gnu.org"
|
||||||
|
|
||||||
|
# An alternative way to set the certificate's distinguished name directly
|
||||||
|
# is with the "dn" option. The attribute names allowed are:
|
||||||
|
# C (country), street, O (organization), OU (unit), title, CN (common name),
|
||||||
|
# L (locality), ST (state), placeOfBirth, gender, countryOfCitizenship,
|
||||||
|
# countryOfResidence, serialNumber, telephoneNumber, surName, initials,
|
||||||
|
# generationQualifier, givenName, pseudonym, dnQualifier, postalCode, name,
|
||||||
|
# businessCategory, DC, UID, jurisdictionOfIncorporationLocalityName,
|
||||||
|
# jurisdictionOfIncorporationStateOrProvinceName,
|
||||||
|
# jurisdictionOfIncorporationCountryName, XmppAddr, and numeric OIDs.
|
||||||
|
|
||||||
|
#dn = "cn = Nikos,st = New Something,C=GR,surName=Mavrogiannopoulos,2.5.4.9=Arkadias"
|
||||||
|
|
||||||
|
# The serial number of the certificate
|
||||||
|
# Comment the field for a time-based serial number.
|
||||||
|
# serial = 007
|
||||||
|
|
||||||
|
# In how many days, counting from today, this certificate will expire.
|
||||||
|
# Use -1 if there is no expiration date.
|
||||||
|
expiration_days = -1
|
||||||
|
|
||||||
|
# Alternatively you may set concrete dates and time. The GNU date string
|
||||||
|
# formats are accepted. See:
|
||||||
|
# http://www.gnu.org/software/tar/manual/html_node/Date-input-formats.html
|
||||||
|
|
||||||
|
#activation_date = "2004-02-29 16:21:42"
|
||||||
|
#expiration_date = "2025-02-29 16:24:41"
|
||||||
|
|
||||||
|
# X.509 v3 extensions
|
||||||
|
|
||||||
|
# A dnsname in case of a WWW server.
|
||||||
|
#dns_name = "www.none.org"
|
||||||
|
#dns_name = "www.morethanone.org"
|
||||||
|
|
||||||
|
# A subject alternative name URI
|
||||||
|
#uri = "http://www.example.com"
|
||||||
|
|
||||||
|
# An IP address in case of a server.
|
||||||
|
#ip_address = "192.168.1.1"
|
||||||
|
|
||||||
|
# An email in case of a person
|
||||||
|
# email = "none@none.org"
|
||||||
|
|
||||||
|
# Challenge password used in certificate requests
|
||||||
|
challenge_password = 123456
|
||||||
|
|
||||||
|
# Password when encrypting a private key
|
||||||
|
#password = secret
|
||||||
|
|
||||||
|
# An URL that has CRLs (certificate revocation lists)
|
||||||
|
# available. Needed in CA certificates.
|
||||||
|
#crl_dist_points = "http://www.getcrl.crl/getcrl/"
|
||||||
|
|
||||||
|
# Whether this is a CA certificate or not
|
||||||
|
ca
|
||||||
|
|
||||||
|
# Subject Unique ID (in hex)
|
||||||
|
#subject_unique_id = 00153224
|
||||||
|
|
||||||
|
# Issuer Unique ID (in hex)
|
||||||
|
#issuer_unique_id = 00153225
|
||||||
|
|
||||||
|
#### Key usage
|
||||||
|
|
||||||
|
# The following key usage flags are used by CAs and end certificates
|
||||||
|
|
||||||
|
# Whether this certificate will be used to sign data (needed
|
||||||
|
# in TLS DHE ciphersuites). This is the digitalSignature flag
|
||||||
|
# in RFC5280 terminology.
|
||||||
|
# signing_key
|
||||||
|
|
||||||
|
# Whether this certificate will be used to encrypt data (needed
|
||||||
|
# in TLS RSA ciphersuites). Note that it is preferred to use different
|
||||||
|
# keys for encryption and signing. This is the keyEncipherment flag
|
||||||
|
# in RFC5280 terminology.
|
||||||
|
# encryption_key
|
||||||
|
|
||||||
|
# Whether this key will be used to sign other certificates. The
|
||||||
|
# keyCertSign flag in RFC5280 terminology.
|
||||||
|
cert_signing_key
|
||||||
|
|
||||||
|
# Whether this key will be used to sign CRLs. The
|
||||||
|
# cRLSign flag in RFC5280 terminology.
|
||||||
|
crl_signing_key
|
||||||
|
|
||||||
|
# The keyAgreement flag of RFC5280. It's purpose is loosely
|
||||||
|
# defined. Not use it unless required by a protocol.
|
||||||
|
#key_agreement
|
||||||
|
|
||||||
|
# The dataEncipherment flag of RFC5280. It's purpose is loosely
|
||||||
|
# defined. Not use it unless required by a protocol.
|
||||||
|
#data_encipherment
|
||||||
|
|
||||||
|
# The nonRepudiation flag of RFC5280. It's purpose is loosely
|
||||||
|
# defined. Not use it unless required by a protocol.
|
||||||
|
#non_repudiation
|
||||||
|
|
||||||
|
#### Extended key usage (key purposes)
|
||||||
|
|
||||||
|
# The following extensions are used in an end certificate
|
||||||
|
# to clarify its purpose. Some CAs also use it to indicate
|
||||||
|
# the types of certificates they are purposed to sign.
|
||||||
|
|
||||||
|
# Whether this certificate will be used for a TLS client;
|
||||||
|
# this sets the id-kp-serverAuth (1.3.6.1.5.5.7.3.1) of
|
||||||
|
# extended key usage.
|
||||||
|
#tls_www_client
|
||||||
|
|
||||||
|
# Whether this certificate will be used for a TLS server;
|
||||||
|
# This sets the id-kp-clientAuth (1.3.6.1.5.5.7.3.2) of
|
||||||
|
# extended key usage.
|
||||||
|
#tls_www_server
|
||||||
|
|
||||||
|
# Whether this key will be used to sign code. This sets the
|
||||||
|
# id-kp-codeSigning (1.3.6.1.5.5.7.3.3) of extended key usage
|
||||||
|
# extension.
|
||||||
|
#code_signing_key
|
||||||
|
|
||||||
|
# Whether this key will be used to sign OCSP data. This sets the
|
||||||
|
# id-kp-OCSPSigning (1.3.6.1.5.5.7.3.9) of extended key usage extension.
|
||||||
|
#ocsp_signing_key
|
||||||
|
|
||||||
|
# Whether this key will be used for time stamping. This sets the
|
||||||
|
# id-kp-timeStamping (1.3.6.1.5.5.7.3.8) of extended key usage extension.
|
||||||
|
#time_stamping_key
|
||||||
|
|
||||||
|
# Whether this key will be used for email protection. This sets the
|
||||||
|
# id-kp-emailProtection (1.3.6.1.5.5.7.3.4) of extended key usage extension.
|
||||||
|
#email_protection_key
|
||||||
|
|
||||||
|
# Whether this key will be used for IPsec IKE operations (1.3.6.1.5.5.7.3.17).
|
||||||
|
#ipsec_ike_key
|
||||||
|
|
||||||
|
## adding custom key purpose OIDs
|
||||||
|
|
||||||
|
# for microsoft smart card logon
|
||||||
|
# key_purpose_oid = 1.3.6.1.4.1.311.20.2.2
|
||||||
|
|
||||||
|
# for email protection
|
||||||
|
# key_purpose_oid = 1.3.6.1.5.5.7.3.4
|
||||||
|
|
||||||
|
# for any purpose (must not be used in intermediate CA certificates)
|
||||||
|
# key_purpose_oid = 2.5.29.37.0
|
||||||
|
|
||||||
|
### end of key purpose OIDs
|
||||||
|
|
||||||
|
# When generating a certificate from a certificate
|
||||||
|
# request, then honor the extensions stored in the request
|
||||||
|
# and store them in the real certificate.
|
||||||
|
honor_crq_extensions
|
||||||
|
|
||||||
|
# Path length contraint. Sets the maximum number of
|
||||||
|
# certificates that can be used to certify this certificate.
|
||||||
|
# (i.e. the certificate chain length)
|
||||||
|
#path_len = -1
|
||||||
|
#path_len = 2
|
||||||
|
|
||||||
|
# OCSP URI
|
||||||
|
# ocsp_uri = http://my.ocsp.server/ocsp
|
||||||
|
|
||||||
|
# CA issuers URI
|
||||||
|
# ca_issuers_uri = http://my.ca.issuer
|
||||||
|
|
||||||
|
# Certificate policies
|
||||||
|
#policy1 = 1.3.6.1.4.1.5484.1.10.99.1.0
|
||||||
|
#policy1_txt = "This is a long policy to summarize"
|
||||||
|
#policy1_url = http://www.example.com/a-policy-to-read
|
||||||
|
|
||||||
|
#policy2 = 1.3.6.1.4.1.5484.1.10.99.1.1
|
||||||
|
#policy2_txt = "This is a short policy"
|
||||||
|
#policy2_url = http://www.example.com/another-policy-to-read
|
||||||
|
|
||||||
|
# Name constraints
|
||||||
|
|
||||||
|
# DNS
|
||||||
|
#nc_permit_dns = example.com
|
||||||
|
#nc_exclude_dns = test.example.com
|
||||||
|
|
||||||
|
# EMAIL
|
||||||
|
#nc_permit_email = "nmav@ex.net"
|
||||||
|
|
||||||
|
# Exclude subdomains of example.com
|
||||||
|
#nc_exclude_email = .example.com
|
||||||
|
|
||||||
|
# Exclude all e-mail addresses of example.com
|
||||||
|
#nc_exclude_email = example.com
|
||||||
|
|
||||||
|
# Options for proxy certificates
|
||||||
|
#proxy_policy_language = 1.3.6.1.5.5.7.21.1
|
||||||
|
|
||||||
|
# Options for generating a CRL
|
||||||
|
|
||||||
|
# The number of days the next CRL update will be due.
|
||||||
|
# next CRL update will be in 43 days
|
||||||
|
#crl_next_update = 43
|
||||||
|
|
||||||
|
# this is the 5th CRL by this CA
|
||||||
|
# Comment the field for a time-based number.
|
||||||
|
#crl_number = 5
|
||||||
|
|
||||||
|
# Specify the update dates more precisely.
|
||||||
|
#crl_this_update_date = "2004-02-29 16:21:42"
|
||||||
|
#crl_next_update_date = "2025-02-29 16:24:41"
|
||||||
|
|
||||||
|
# The date that the certificates will be made seen as
|
||||||
|
# being revoked.
|
||||||
|
#crl_revocation_date = "2025-02-29 16:24:41"
|
||||||
|
|
23
testenv/certs/make_ca.sh
Executable file
23
testenv/certs/make_ca.sh
Executable file
@ -0,0 +1,23 @@
|
|||||||
|
#!/bin/sh -e
|
||||||
|
|
||||||
|
# create a self signed CA certificate
|
||||||
|
certtool --generate-privkey --outfile ca-key.pem
|
||||||
|
certtool --generate-self-signed --load-privkey ca-key.pem --template=ca-template.cfg --outfile ca-cert.pem
|
||||||
|
|
||||||
|
# create the server RSA private key
|
||||||
|
certtool --generate-privkey --outfile server-key.pem --rsa
|
||||||
|
|
||||||
|
# generate a server certificate using the private key only
|
||||||
|
certtool --generate-certificate --load-privkey server-key.pem --template=server-template.cfg --outfile server-cert.pem --load-ca-certificate ca-cert.pem --load-ca-privkey ca-key.pem
|
||||||
|
|
||||||
|
# create a CRL for the server certificate
|
||||||
|
certtool --generate-crl --load-ca-privkey ca-key.pem --load-ca-certificate ca-cert.pem --load-certificate server-cert.pem --outfile server-crl.pem --template=server-template.cfg
|
||||||
|
|
||||||
|
# generate a public key in PEM format
|
||||||
|
openssl x509 -noout -pubkey < server-cert.pem > server-pubkey.pem
|
||||||
|
|
||||||
|
# generate a public key in DER format
|
||||||
|
openssl x509 -noout -pubkey < server-cert.pem | openssl asn1parse -noout -inform pem -out server-pubkey.der
|
||||||
|
|
||||||
|
# generate a sha256 hash of the public key
|
||||||
|
openssl x509 -noout -pubkey < server-cert.pem | openssl asn1parse -noout -inform pem -out /dev/stdout | openssl dgst -sha256 -binary | openssl base64 > server-pubkey-sha256.base64
|
1
testenv/certs/server-pubkey-sha256.base64
Normal file
1
testenv/certs/server-pubkey-sha256.base64
Normal file
@ -0,0 +1 @@
|
|||||||
|
mHiEhWHvusnzP7COZk+SzSJ+Gl7nZT+ADx0PUnDD7mM=
|
247
testenv/certs/server-template.cfg
Normal file
247
testenv/certs/server-template.cfg
Normal file
@ -0,0 +1,247 @@
|
|||||||
|
# X.509 Certificate options
|
||||||
|
#
|
||||||
|
# DN options
|
||||||
|
|
||||||
|
# The organization of the subject.
|
||||||
|
organization = "GNU"
|
||||||
|
|
||||||
|
# The organizational unit of the subject.
|
||||||
|
unit = "Wget"
|
||||||
|
|
||||||
|
# The locality of the subject.
|
||||||
|
# locality =
|
||||||
|
|
||||||
|
# The state of the certificate owner.
|
||||||
|
# state = ""
|
||||||
|
|
||||||
|
# The country of the subject. Two letter code.
|
||||||
|
# country = GR
|
||||||
|
|
||||||
|
# The common name of the certificate owner.
|
||||||
|
cn = "127.0.0.1"
|
||||||
|
|
||||||
|
# A user id of the certificate owner.
|
||||||
|
#uid = ""
|
||||||
|
|
||||||
|
# Set domain components
|
||||||
|
#dc = "name"
|
||||||
|
#dc = "domain"
|
||||||
|
|
||||||
|
# If the supported DN OIDs are not adequate you can set
|
||||||
|
# any OID here.
|
||||||
|
# For example set the X.520 Title and the X.520 Pseudonym
|
||||||
|
# by using OID and string pairs.
|
||||||
|
#dn_oid = 2.5.4.12 Dr.
|
||||||
|
#dn_oid = 2.5.4.65 jackal
|
||||||
|
|
||||||
|
# This is deprecated and should not be used in new
|
||||||
|
# certificates.
|
||||||
|
# pkcs9_email = "bug-wget@gnu.org"
|
||||||
|
|
||||||
|
# An alternative way to set the certificate's distinguished name directly
|
||||||
|
# is with the "dn" option. The attribute names allowed are:
|
||||||
|
# C (country), street, O (organization), OU (unit), title, CN (common name),
|
||||||
|
# L (locality), ST (state), placeOfBirth, gender, countryOfCitizenship,
|
||||||
|
# countryOfResidence, serialNumber, telephoneNumber, surName, initials,
|
||||||
|
# generationQualifier, givenName, pseudonym, dnQualifier, postalCode, name,
|
||||||
|
# businessCategory, DC, UID, jurisdictionOfIncorporationLocalityName,
|
||||||
|
# jurisdictionOfIncorporationStateOrProvinceName,
|
||||||
|
# jurisdictionOfIncorporationCountryName, XmppAddr, and numeric OIDs.
|
||||||
|
|
||||||
|
#dn = "cn = Nikos,st = New Something,C=GR,surName=Mavrogiannopoulos,2.5.4.9=Arkadias"
|
||||||
|
|
||||||
|
# The serial number of the certificate
|
||||||
|
# Comment the field for a time-based serial number.
|
||||||
|
# serial = 007
|
||||||
|
|
||||||
|
# In how many days, counting from today, this certificate will expire.
|
||||||
|
# Use -1 if there is no expiration date.
|
||||||
|
expiration_days = -1
|
||||||
|
|
||||||
|
# Alternatively you may set concrete dates and time. The GNU date string
|
||||||
|
# formats are accepted. See:
|
||||||
|
# http://www.gnu.org/software/tar/manual/html_node/Date-input-formats.html
|
||||||
|
|
||||||
|
#activation_date = "2004-02-29 16:21:42"
|
||||||
|
#expiration_date = "2025-02-29 16:24:41"
|
||||||
|
|
||||||
|
# X.509 v3 extensions
|
||||||
|
|
||||||
|
# A dnsname in case of a WWW server.
|
||||||
|
dns_name = "127.0.0.1"
|
||||||
|
dns_name = "localhost"
|
||||||
|
|
||||||
|
# A subject alternative name URI
|
||||||
|
#uri = "http://www.example.com"
|
||||||
|
|
||||||
|
# An IP address in case of a server.
|
||||||
|
# ip_address = "127.0.0.1"
|
||||||
|
|
||||||
|
# An email in case of a person
|
||||||
|
# email = "none@none.org"
|
||||||
|
|
||||||
|
# Challenge password used in certificate requests
|
||||||
|
challenge_password = 123456
|
||||||
|
|
||||||
|
# Password when encrypting a private key
|
||||||
|
#password = secret
|
||||||
|
|
||||||
|
# An URL that has CRLs (certificate revocation lists)
|
||||||
|
# available. Needed in CA certificates.
|
||||||
|
#crl_dist_points = "http://www.getcrl.crl/getcrl/"
|
||||||
|
|
||||||
|
# Whether this is a CA certificate or not
|
||||||
|
# ca
|
||||||
|
|
||||||
|
# Subject Unique ID (in hex)
|
||||||
|
#subject_unique_id = 00153224
|
||||||
|
|
||||||
|
# Issuer Unique ID (in hex)
|
||||||
|
#issuer_unique_id = 00153225
|
||||||
|
|
||||||
|
#### Key usage
|
||||||
|
|
||||||
|
# The following key usage flags are used by CAs and end certificates
|
||||||
|
|
||||||
|
# Whether this certificate will be used to sign data (needed
|
||||||
|
# in TLS DHE ciphersuites). This is the digitalSignature flag
|
||||||
|
# in RFC5280 terminology.
|
||||||
|
signing_key
|
||||||
|
|
||||||
|
# Whether this certificate will be used to encrypt data (needed
|
||||||
|
# in TLS RSA ciphersuites). Note that it is preferred to use different
|
||||||
|
# keys for encryption and signing. This is the keyEncipherment flag
|
||||||
|
# in RFC5280 terminology.
|
||||||
|
encryption_key
|
||||||
|
|
||||||
|
# Whether this key will be used to sign other certificates. The
|
||||||
|
# keyCertSign flag in RFC5280 terminology.
|
||||||
|
# cert_signing_key
|
||||||
|
|
||||||
|
# Whether this key will be used to sign CRLs. The
|
||||||
|
# cRLSign flag in RFC5280 terminology.
|
||||||
|
# crl_signing_key
|
||||||
|
|
||||||
|
# The keyAgreement flag of RFC5280. It's purpose is loosely
|
||||||
|
# defined. Not use it unless required by a protocol.
|
||||||
|
#key_agreement
|
||||||
|
|
||||||
|
# The dataEncipherment flag of RFC5280. It's purpose is loosely
|
||||||
|
# defined. Not use it unless required by a protocol.
|
||||||
|
#data_encipherment
|
||||||
|
|
||||||
|
# The nonRepudiation flag of RFC5280. It's purpose is loosely
|
||||||
|
# defined. Not use it unless required by a protocol.
|
||||||
|
#non_repudiation
|
||||||
|
|
||||||
|
#### Extended key usage (key purposes)
|
||||||
|
|
||||||
|
# The following extensions are used in an end certificate
|
||||||
|
# to clarify its purpose. Some CAs also use it to indicate
|
||||||
|
# the types of certificates they are purposed to sign.
|
||||||
|
|
||||||
|
# Whether this certificate will be used for a TLS client;
|
||||||
|
# this sets the id-kp-serverAuth (1.3.6.1.5.5.7.3.1) of
|
||||||
|
# extended key usage.
|
||||||
|
#tls_www_client
|
||||||
|
|
||||||
|
# Whether this certificate will be used for a TLS server;
|
||||||
|
# This sets the id-kp-clientAuth (1.3.6.1.5.5.7.3.2) of
|
||||||
|
# extended key usage.
|
||||||
|
tls_www_server
|
||||||
|
|
||||||
|
# Whether this key will be used to sign code. This sets the
|
||||||
|
# id-kp-codeSigning (1.3.6.1.5.5.7.3.3) of extended key usage
|
||||||
|
# extension.
|
||||||
|
#code_signing_key
|
||||||
|
|
||||||
|
# Whether this key will be used to sign OCSP data. This sets the
|
||||||
|
# id-kp-OCSPSigning (1.3.6.1.5.5.7.3.9) of extended key usage extension.
|
||||||
|
#ocsp_signing_key
|
||||||
|
|
||||||
|
# Whether this key will be used for time stamping. This sets the
|
||||||
|
# id-kp-timeStamping (1.3.6.1.5.5.7.3.8) of extended key usage extension.
|
||||||
|
#time_stamping_key
|
||||||
|
|
||||||
|
# Whether this key will be used for email protection. This sets the
|
||||||
|
# id-kp-emailProtection (1.3.6.1.5.5.7.3.4) of extended key usage extension.
|
||||||
|
#email_protection_key
|
||||||
|
|
||||||
|
# Whether this key will be used for IPsec IKE operations (1.3.6.1.5.5.7.3.17).
|
||||||
|
#ipsec_ike_key
|
||||||
|
|
||||||
|
## adding custom key purpose OIDs
|
||||||
|
|
||||||
|
# for microsoft smart card logon
|
||||||
|
# key_purpose_oid = 1.3.6.1.4.1.311.20.2.2
|
||||||
|
|
||||||
|
# for email protection
|
||||||
|
# key_purpose_oid = 1.3.6.1.5.5.7.3.4
|
||||||
|
|
||||||
|
# for any purpose (must not be used in intermediate CA certificates)
|
||||||
|
# key_purpose_oid = 2.5.29.37.0
|
||||||
|
|
||||||
|
### end of key purpose OIDs
|
||||||
|
|
||||||
|
# When generating a certificate from a certificate
|
||||||
|
# request, then honor the extensions stored in the request
|
||||||
|
# and store them in the real certificate.
|
||||||
|
honor_crq_extensions
|
||||||
|
|
||||||
|
# Path length contraint. Sets the maximum number of
|
||||||
|
# certificates that can be used to certify this certificate.
|
||||||
|
# (i.e. the certificate chain length)
|
||||||
|
#path_len = -1
|
||||||
|
#path_len = 2
|
||||||
|
|
||||||
|
# OCSP URI
|
||||||
|
# ocsp_uri = http://my.ocsp.server/ocsp
|
||||||
|
|
||||||
|
# CA issuers URI
|
||||||
|
# ca_issuers_uri = http://my.ca.issuer
|
||||||
|
|
||||||
|
# Certificate policies
|
||||||
|
#policy1 = 1.3.6.1.4.1.5484.1.10.99.1.0
|
||||||
|
#policy1_txt = "This is a long policy to summarize"
|
||||||
|
#policy1_url = http://www.example.com/a-policy-to-read
|
||||||
|
|
||||||
|
#policy2 = 1.3.6.1.4.1.5484.1.10.99.1.1
|
||||||
|
#policy2_txt = "This is a short policy"
|
||||||
|
#policy2_url = http://www.example.com/another-policy-to-read
|
||||||
|
|
||||||
|
# Name constraints
|
||||||
|
|
||||||
|
# DNS
|
||||||
|
#nc_permit_dns = example.com
|
||||||
|
#nc_exclude_dns = test.example.com
|
||||||
|
|
||||||
|
# EMAIL
|
||||||
|
#nc_permit_email = "nmav@ex.net"
|
||||||
|
|
||||||
|
# Exclude subdomains of example.com
|
||||||
|
#nc_exclude_email = .example.com
|
||||||
|
|
||||||
|
# Exclude all e-mail addresses of example.com
|
||||||
|
#nc_exclude_email = example.com
|
||||||
|
|
||||||
|
# Options for proxy certificates
|
||||||
|
#proxy_policy_language = 1.3.6.1.5.5.7.21.1
|
||||||
|
|
||||||
|
# Options for generating a CRL
|
||||||
|
|
||||||
|
# The number of days the next CRL update will be due.
|
||||||
|
# next CRL update will be in 43 days
|
||||||
|
#crl_next_update = 43
|
||||||
|
|
||||||
|
# this is the 5th CRL by this CA
|
||||||
|
# Comment the field for a time-based number.
|
||||||
|
#crl_number = 5
|
||||||
|
|
||||||
|
# Specify the update dates more precisely.
|
||||||
|
#crl_this_update_date = "2004-02-29 16:21:42"
|
||||||
|
#crl_next_update_date = "2025-02-29 16:24:41"
|
||||||
|
|
||||||
|
# The date that the certificates will be made seen as
|
||||||
|
# being revoked.
|
||||||
|
#crl_revocation_date = "2025-02-29 16:24:41"
|
||||||
|
|
Loading…
Reference in New Issue
Block a user