quickjs-tart

quickjs-based runtime for wallet-core logic
Log | Files | Refs | README | LICENSE

test-ca.opensslconf (2795B)


      1 [req]
      2 x509_extensions = v3_ca
      3 distinguished_name = req_dn
      4 
      5 [req_dn]
      6 countryName = NL
      7 organizationalUnitName = PolarSSL
      8 commonName = PolarSSL Test CA
      9 
     10 [v3_ca]
     11 subjectKeyIdentifier=hash
     12 authorityKeyIdentifier=keyid:always,issuer:always
     13 basicConstraints = CA:true
     14 
     15 [no_subj_auth_id]
     16 subjectKeyIdentifier=none
     17 authorityKeyIdentifier=none
     18 basicConstraints = CA:true
     19 
     20 [othername_san]
     21 subjectAltName=otherName:1.3.6.1.5.5.7.8.4;SEQ:hw_module_name
     22 
     23 [nonprintable_othername_san]
     24 subjectAltName=otherName:1.3.6.1.5.5.7.8.4;SEQ:nonprintable_hw_module_name
     25 
     26 [unsupported_othername_san]
     27 subjectAltName=otherName:1.2.3.4;UTF8:some other identifier
     28 
     29 [dns_alt_names]
     30 subjectAltName=DNS:example.com, DNS:example.net, DNS:*.example.org
     31 
     32 [rfc822name_names]
     33 subjectAltName=email:my@other.address,email:second@other.address
     34 
     35 [alt_names]
     36 DNS.1=example.com
     37 otherName.1=1.3.6.1.5.5.7.8.4;SEQ:hw_module_name
     38 DNS.2=example.net
     39 DNS.3=*.example.org
     40 
     41 [multiple_san]
     42 subjectAltName=@alt_names
     43 
     44 [ext_multi_nocn]
     45 basicConstraints = CA:false
     46 keyUsage = digitalSignature, nonRepudiation, keyEncipherment
     47 subjectAltName = DNS:www.shotokan-braunschweig.de,DNS:www.massimo-abate.eu,IP:192.168.1.1,IP:192.168.69.144
     48 
     49 [hw_module_name]
     50 hwtype = OID:1.3.6.1.4.1.17.3
     51 hwserial = OCT:123456
     52 
     53 [nonprintable_hw_module_name]
     54 hwtype = OID:1.3.6.1.4.1.17.3
     55 hwserial = FORMAT:HEX, OCT:3132338081008180333231
     56 
     57 [v3_any_policy_ca]
     58 basicConstraints = CA:true
     59 certificatePolicies = 2.5.29.32.0
     60 
     61 [v3_any_policy_qualifier_ca]
     62 basicConstraints = CA:true
     63 certificatePolicies = @policy_info
     64 
     65 [v3_multi_policy_ca]
     66 basicConstraints = CA:true
     67 certificatePolicies = 1.2.3.4,2.5.29.32.0
     68 
     69 [v3_unsupported_policy_ca]
     70 basicConstraints = CA:true
     71 certificatePolicies = 1.2.3.4
     72 
     73 [policy_info]
     74 policyIdentifier = 2.5.29.32.0
     75 CPS.1 ="CPS uri string"
     76 
     77 [fan_cert]
     78 extendedKeyUsage = 1.3.6.1.4.1.45605.1
     79 
     80 [noext_ca]
     81 basicConstraints = CA:true
     82 
     83 [test_ca]
     84 database = /dev/null
     85 
     86 [crl_ext_idp]
     87 issuingDistributionPoint=critical, @idpdata
     88 
     89 [crl_ext_idp_nc]
     90 issuingDistributionPoint=@idpdata
     91 
     92 [idpdata]
     93 fullname=URI:http://pki.example.com/
     94 
     95 # these IPs are the ascii values for 'abcd' and 'abcd.example.com'
     96 [tricky_ip_san]
     97 subjectAltName=IP:97.98.99.100,IP:6162:6364:2e65:7861:6d70:6c65:2e63:6f6d
     98 
     99 [csr_ext_v3_keyUsage]
    100 keyUsage = digitalSignature, keyEncipherment
    101 
    102 [csr_ext_v3_subjectAltName]
    103 subjectAltName=DNS:example.com, DNS:example.net, DNS:*.example.org
    104 
    105 [csr_ext_v3_nsCertType]
    106 nsCertType=server
    107 
    108 [csr_ext_v3_all]
    109 keyUsage = cRLSign
    110 subjectAltName=otherName:1.3.6.1.5.5.7.8.4;SEQ:nonprintable_hw_module_name
    111 nsCertType=client
    112 
    113 [directory_name_san]
    114 subjectAltName=dirName:dirname_sect
    115 
    116 [two_directorynames]
    117 subjectAltName=dirName:dirname_sect, dirName:dirname_to_malform
    118 
    119 [dirname_sect]
    120 C=UK
    121 O=Mbed TLS
    122 CN=Mbed TLS directoryName SAN
    123 
    124 [dirname_to_malform]
    125 O=MALFORM_ME