summaryrefslogtreecommitdiff
path: root/testenv/certs/bak/ca-template.cfg
diff options
context:
space:
mode:
Diffstat (limited to 'testenv/certs/bak/ca-template.cfg')
-rw-r--r--testenv/certs/bak/ca-template.cfg247
1 files changed, 0 insertions, 247 deletions
diff --git a/testenv/certs/bak/ca-template.cfg b/testenv/certs/bak/ca-template.cfg
deleted file mode 100644
index 14643a6..0000000
--- a/testenv/certs/bak/ca-template.cfg
+++ /dev/null
@@ -1,247 +0,0 @@
-# X.509 Certificate options
-#
-# DN options
-
-# The organization of the subject.
-organization = "GNU"
-
-# The organizational unit of the subject.
-unit = "Wget"
-
-# The locality of the subject.
-# locality =
-
-# The state of the certificate owner.
-# state = ""
-
-# The country of the subject. Two letter code.
-# country = GR
-
-# The common name of the certificate owner.
-cn = "GNU Wget"
-
-# A user id of the certificate owner.
-#uid = ""
-
-# Set domain components
-#dc = "name"
-#dc = "domain"
-
-# If the supported DN OIDs are not adequate you can set
-# any OID here.
-# For example set the X.520 Title and the X.520 Pseudonym
-# by using OID and string pairs.
-#dn_oid = 2.5.4.12 Dr.
-#dn_oid = 2.5.4.65 jackal
-
-# This is deprecated and should not be used in new
-# certificates.
-# pkcs9_email = "bug-wget@gnu.org"
-
-# An alternative way to set the certificate's distinguished name directly
-# is with the "dn" option. The attribute names allowed are:
-# C (country), street, O (organization), OU (unit), title, CN (common name),
-# L (locality), ST (state), placeOfBirth, gender, countryOfCitizenship,
-# countryOfResidence, serialNumber, telephoneNumber, surName, initials,
-# generationQualifier, givenName, pseudonym, dnQualifier, postalCode, name,
-# businessCategory, DC, UID, jurisdictionOfIncorporationLocalityName,
-# jurisdictionOfIncorporationStateOrProvinceName,
-# jurisdictionOfIncorporationCountryName, XmppAddr, and numeric OIDs.
-
-#dn = "cn = Nikos,st = New Something,C=GR,surName=Mavrogiannopoulos,2.5.4.9=Arkadias"
-
-# The serial number of the certificate
-# Comment the field for a time-based serial number.
-# serial = 007
-
-# In how many days, counting from today, this certificate will expire.
-# Use -1 if there is no expiration date.
-expiration_days = -1
-
-# Alternatively you may set concrete dates and time. The GNU date string
-# formats are accepted. See:
-# http://www.gnu.org/software/tar/manual/html_node/Date-input-formats.html
-
-#activation_date = "2004-02-29 16:21:42"
-#expiration_date = "2025-02-29 16:24:41"
-
-# X.509 v3 extensions
-
-# A dnsname in case of a WWW server.
-#dns_name = "www.none.org"
-#dns_name = "www.morethanone.org"
-
-# A subject alternative name URI
-#uri = "http://www.example.com"
-
-# An IP address in case of a server.
-#ip_address = "192.168.1.1"
-
-# An email in case of a person
-# email = "none@none.org"
-
-# Challenge password used in certificate requests
-challenge_password = 123456
-
-# Password when encrypting a private key
-#password = secret
-
-# An URL that has CRLs (certificate revocation lists)
-# available. Needed in CA certificates.
-#crl_dist_points = "http://www.getcrl.crl/getcrl/"
-
-# Whether this is a CA certificate or not
-ca
-
-# Subject Unique ID (in hex)
-#subject_unique_id = 00153224
-
-# Issuer Unique ID (in hex)
-#issuer_unique_id = 00153225
-
-#### Key usage
-
-# The following key usage flags are used by CAs and end certificates
-
-# Whether this certificate will be used to sign data (needed
-# in TLS DHE ciphersuites). This is the digitalSignature flag
-# in RFC5280 terminology.
-# signing_key
-
-# Whether this certificate will be used to encrypt data (needed
-# in TLS RSA ciphersuites). Note that it is preferred to use different
-# keys for encryption and signing. This is the keyEncipherment flag
-# in RFC5280 terminology.
-# encryption_key
-
-# Whether this key will be used to sign other certificates. The
-# keyCertSign flag in RFC5280 terminology.
-cert_signing_key
-
-# Whether this key will be used to sign CRLs. The
-# cRLSign flag in RFC5280 terminology.
-crl_signing_key
-
-# The keyAgreement flag of RFC5280. It's purpose is loosely
-# defined. Not use it unless required by a protocol.
-#key_agreement
-
-# The dataEncipherment flag of RFC5280. It's purpose is loosely
-# defined. Not use it unless required by a protocol.
-#data_encipherment
-
-# The nonRepudiation flag of RFC5280. It's purpose is loosely
-# defined. Not use it unless required by a protocol.
-#non_repudiation
-
-#### Extended key usage (key purposes)
-
-# The following extensions are used in an end certificate
-# to clarify its purpose. Some CAs also use it to indicate
-# the types of certificates they are purposed to sign.
-
-# Whether this certificate will be used for a TLS client;
-# this sets the id-kp-serverAuth (1.3.6.1.5.5.7.3.1) of
-# extended key usage.
-#tls_www_client
-
-# Whether this certificate will be used for a TLS server;
-# This sets the id-kp-clientAuth (1.3.6.1.5.5.7.3.2) of
-# extended key usage.
-#tls_www_server
-
-# Whether this key will be used to sign code. This sets the
-# id-kp-codeSigning (1.3.6.1.5.5.7.3.3) of extended key usage
-# extension.
-#code_signing_key
-
-# Whether this key will be used to sign OCSP data. This sets the
-# id-kp-OCSPSigning (1.3.6.1.5.5.7.3.9) of extended key usage extension.
-#ocsp_signing_key
-
-# Whether this key will be used for time stamping. This sets the
-# id-kp-timeStamping (1.3.6.1.5.5.7.3.8) of extended key usage extension.
-#time_stamping_key
-
-# Whether this key will be used for email protection. This sets the
-# id-kp-emailProtection (1.3.6.1.5.5.7.3.4) of extended key usage extension.
-#email_protection_key
-
-# Whether this key will be used for IPsec IKE operations (1.3.6.1.5.5.7.3.17).
-#ipsec_ike_key
-
-## adding custom key purpose OIDs
-
-# for microsoft smart card logon
-# key_purpose_oid = 1.3.6.1.4.1.311.20.2.2
-
-# for email protection
-# key_purpose_oid = 1.3.6.1.5.5.7.3.4
-
-# for any purpose (must not be used in intermediate CA certificates)
-# key_purpose_oid = 2.5.29.37.0
-
-### end of key purpose OIDs
-
-# When generating a certificate from a certificate
-# request, then honor the extensions stored in the request
-# and store them in the real certificate.
-honor_crq_extensions
-
-# Path length contraint. Sets the maximum number of
-# certificates that can be used to certify this certificate.
-# (i.e. the certificate chain length)
-#path_len = -1
-#path_len = 2
-
-# OCSP URI
-# ocsp_uri = http://my.ocsp.server/ocsp
-
-# CA issuers URI
-# ca_issuers_uri = http://my.ca.issuer
-
-# Certificate policies
-#policy1 = 1.3.6.1.4.1.5484.1.10.99.1.0
-#policy1_txt = "This is a long policy to summarize"
-#policy1_url = http://www.example.com/a-policy-to-read
-
-#policy2 = 1.3.6.1.4.1.5484.1.10.99.1.1
-#policy2_txt = "This is a short policy"
-#policy2_url = http://www.example.com/another-policy-to-read
-
-# Name constraints
-
-# DNS
-#nc_permit_dns = example.com
-#nc_exclude_dns = test.example.com
-
-# EMAIL
-#nc_permit_email = "nmav@ex.net"
-
-# Exclude subdomains of example.com
-#nc_exclude_email = .example.com
-
-# Exclude all e-mail addresses of example.com
-#nc_exclude_email = example.com
-
-# Options for proxy certificates
-#proxy_policy_language = 1.3.6.1.5.5.7.21.1
-
-# Options for generating a CRL
-
-# The number of days the next CRL update will be due.
-# next CRL update will be in 43 days
-#crl_next_update = 43
-
-# this is the 5th CRL by this CA
-# Comment the field for a time-based number.
-#crl_number = 5
-
-# Specify the update dates more precisely.
-#crl_this_update_date = "2004-02-29 16:21:42"
-#crl_next_update_date = "2025-02-29 16:24:41"
-
-# The date that the certificates will be made seen as
-# being revoked.
-#crl_revocation_date = "2025-02-29 16:24:41"
-