shuffle for openssl-1.0.0-beta1

git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@25144 ec53bebd-3082-4978-b11e-865c3cabbd6b
This commit is contained in:
Love Hörnquist Åstrand
2009-04-27 02:18:56 +00:00
parent b7064afbcf
commit 71ca2c0415

View File

@@ -1,6 +1,6 @@
oid_section = new_oids oid_section = new_oids
[ new_oids ] [new_oids]
pkkdcekuoid = 1.3.6.1.5.2.3.5 pkkdcekuoid = 1.3.6.1.5.2.3.5
[ca] [ca]
@@ -13,6 +13,7 @@ serial = serial
x509_extensions = usr_cert x509_extensions = usr_cert
default_md=sha1 default_md=sha1
policy = policy_match policy = policy_match
email_in_dn = no
certs = . certs = .
[ocsp] [ocsp]
@@ -21,6 +22,7 @@ serial = serial
x509_extensions = ocsp_cert x509_extensions = ocsp_cert
default_md=sha1 default_md=sha1
policy = policy_match policy = policy_match
email_in_dn = no
certs = . certs = .
[usr_ke] [usr_ke]
@@ -29,6 +31,7 @@ serial = serial
x509_extensions = usr_cert_ke x509_extensions = usr_cert_ke
default_md=sha1 default_md=sha1
policy = policy_match policy = policy_match
email_in_dn = no
certs = . certs = .
[usr_ds] [usr_ds]
@@ -37,6 +40,7 @@ serial = serial
x509_extensions = usr_cert_ds x509_extensions = usr_cert_ds
default_md=sha1 default_md=sha1
policy = policy_match policy = policy_match
email_in_dn = no
certs = . certs = .
[pkinit_client] [pkinit_client]
@@ -45,6 +49,7 @@ serial = serial
x509_extensions = pkinit_client_cert x509_extensions = pkinit_client_cert
default_md=sha1 default_md=sha1
policy = policy_match policy = policy_match
email_in_dn = no
certs = . certs = .
[pkinit_kdc] [pkinit_kdc]
@@ -53,6 +58,7 @@ serial = serial
x509_extensions = pkinit_kdc_cert x509_extensions = pkinit_kdc_cert
default_md=sha1 default_md=sha1
policy = policy_match policy = policy_match
email_in_dn = no
certs = . certs = .
[https] [https]
@@ -61,6 +67,7 @@ serial = serial
x509_extensions = https_cert x509_extensions = https_cert
default_md=sha1 default_md=sha1
policy = policy_match policy = policy_match
email_in_dn = no
certs = . certs = .
[subca] [subca]
@@ -69,62 +76,63 @@ serial = serial
x509_extensions = v3_ca x509_extensions = v3_ca
default_md=sha1 default_md=sha1
policy = policy_match policy = policy_match
email_in_dn = no
certs = . certs = .
[ req ] [req]
distinguished_name = req_distinguished_name distinguished_name = req_distinguished_name
x509_extensions = v3_ca # The extentions to add to the self signed cert x509_extensions = v3_ca # The extentions to add to the self signed cert
string_mask = utf8only string_mask = utf8only
[ v3_ca ] [v3_ca]
subjectKeyIdentifier=hash subjectKeyIdentifier=hash
authorityKeyIdentifier=keyid:always,issuer:always authorityKeyIdentifier=keyid:always,issuer:always
basicConstraints = CA:true basicConstraints = CA:true
keyUsage = cRLSign, keyCertSign, keyEncipherment, nonRepudiation, digitalSignature keyUsage = cRLSign, keyCertSign, keyEncipherment, nonRepudiation, digitalSignature
[ usr_cert ] [usr_cert]
basicConstraints=CA:FALSE basicConstraints=CA:FALSE
keyUsage = nonRepudiation, digitalSignature, keyEncipherment keyUsage = nonRepudiation, digitalSignature, keyEncipherment
subjectKeyIdentifier = hash subjectKeyIdentifier = hash
[ usr_cert_ke ] [usr_cert_ke]
basicConstraints=CA:FALSE basicConstraints=CA:FALSE
keyUsage = nonRepudiation, keyEncipherment keyUsage = nonRepudiation, keyEncipherment
subjectKeyIdentifier = hash subjectKeyIdentifier = hash
[ proxy_cert ] [proxy_cert]
basicConstraints=CA:FALSE basicConstraints=CA:FALSE
keyUsage = nonRepudiation, digitalSignature, keyEncipherment keyUsage = nonRepudiation, digitalSignature, keyEncipherment
subjectKeyIdentifier = hash subjectKeyIdentifier = hash
proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:0,policy:text:foo proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:0,policy:text:foo
[pkinitc_princ_name] [pkinitc_principals]
realm = EXP:0, GeneralString:TEST.H5L.SE princ1 = GeneralString:bar
principal_name = EXP:1, SEQUENCE:pkinitc_principal_seq
[ pkinit_client_cert ] [pkinitc_principal_seq]
name_type = EXP:0,INTEGER:1
name_string = EXP:1,SEQUENCE:pkinitc_principals
[pkinitc_princ_name]
realm = EXP:0,GeneralString:TEST.H5L.SE
principal_name = EXP:1,SEQUENCE:pkinitc_principal_seq
[pkinit_client_cert]
basicConstraints=CA:FALSE basicConstraints=CA:FALSE
keyUsage = nonRepudiation, digitalSignature, keyEncipherment keyUsage = nonRepudiation, digitalSignature, keyEncipherment
subjectKeyIdentifier = hash subjectKeyIdentifier = hash
subjectAltName=otherName:1.3.6.1.5.2.2;SEQUENCE:pkinitc_princ_name subjectAltName=otherName:1.3.6.1.5.2.2;SEQUENCE:pkinitc_princ_name
[pkinitc_principal_seq] [https_cert]
name_type = EXP:0, INTEGER:1
name_string = EXP:1, SEQUENCE:pkinitc_principals
[pkinitc_principals]
princ1 = GeneralString:bar
[ https_cert ]
basicConstraints=CA:FALSE basicConstraints=CA:FALSE
keyUsage = nonRepudiation, digitalSignature, keyEncipherment keyUsage = nonRepudiation, digitalSignature, keyEncipherment
#extendedKeyUsage = https-server XXX #extendedKeyUsage = https-server XXX
subjectKeyIdentifier = hash subjectKeyIdentifier = hash
[ pkinit_kdc_cert ] [pkinit_kdc_cert]
basicConstraints=CA:FALSE basicConstraints=CA:FALSE
keyUsage = nonRepudiation, digitalSignature, keyEncipherment keyUsage = nonRepudiation, digitalSignature, keyEncipherment
extendedKeyUsage = pkkdcekuoid extendedKeyUsage = pkkdcekuoid
@@ -132,36 +140,36 @@ subjectKeyIdentifier = hash
subjectAltName=otherName:1.3.6.1.5.2.2;SEQUENCE:pkinitkdc_princ_name subjectAltName=otherName:1.3.6.1.5.2.2;SEQUENCE:pkinitkdc_princ_name
[pkinitkdc_princ_name] [pkinitkdc_princ_name]
realm = EXP:0, GeneralString:TEST.H5L.SE realm = EXP:0,GeneralString:TEST.H5L.SE
principal_name = EXP:1, SEQUENCE:pkinitkdc_principal_seq principal_name = EXP:1,SEQUENCE:pkinitkdc_principal_seq
[pkinitkdc_principal_seq] [pkinitkdc_principal_seq]
name_type = EXP:0, INTEGER:1 name_type = EXP:0,INTEGER:1
name_string = EXP:1, SEQUENCE:pkinitkdc_principals name_string = EXP:1,SEQUENCE:pkinitkdc_principals
[pkinitkdc_principals] [pkinitkdc_principals]
princ1 = GeneralString:krbtgt princ1 = GeneralString:krbtgt
princ2 = GeneralString:TEST.H5L.SE princ2 = GeneralString:TEST.H5L.SE
[ proxy10_cert ] [proxy10_cert]
basicConstraints=CA:FALSE basicConstraints=CA:FALSE
keyUsage = nonRepudiation, digitalSignature, keyEncipherment keyUsage = nonRepudiation, digitalSignature, keyEncipherment
subjectKeyIdentifier = hash subjectKeyIdentifier = hash
proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:10,policy:text:foo proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:10,policy:text:foo
[ usr_cert_ds ] [usr_cert_ds]
basicConstraints=CA:FALSE basicConstraints=CA:FALSE
keyUsage = nonRepudiation, digitalSignature keyUsage = nonRepudiation, digitalSignature
subjectKeyIdentifier = hash subjectKeyIdentifier = hash
[ ocsp_cert ] [ocsp_cert]
basicConstraints=CA:FALSE basicConstraints=CA:FALSE
keyUsage = nonRepudiation, digitalSignature, keyEncipherment keyUsage = nonRepudiation, digitalSignature, keyEncipherment
# ocsp-nocheck and kp-OCSPSigning # ocsp-nocheck and kp-OCSPSigning
extendedKeyUsage = 1.3.6.1.5.5.7.48.1.5, 1.3.6.1.5.5.7.3.9 extendedKeyUsage = 1.3.6.1.5.5.7.48.1.5, 1.3.6.1.5.5.7.3.9
subjectKeyIdentifier = hash subjectKeyIdentifier = hash
[ req_distinguished_name ] [req_distinguished_name]
countryName = Country Name (2 letter code) countryName = Country Name (2 letter code)
countryName_default = SE countryName_default = SE
countryName_min = 2 countryName_min = 2
@@ -172,11 +180,11 @@ organizationalName = Organizational Unit Name (eg, section)
commonName = Common Name (eg, YOUR name) commonName = Common Name (eg, YOUR name)
commonName_max = 64 commonName_max = 64
#[ req_attributes ] #[req_attributes]
#challengePassword = A challenge password #challengePassword = A challenge password
#challengePassword_min = 4 #challengePassword_min = 4
#challengePassword_max = 20 #challengePassword_max = 20
[ policy_match ] [policy_match]
countryName = match countryName = match
commonName = supplied commonName = supplied