1 # Defaults in the event they're not set in the environment
12 # The default test root, used to generate certificates and CRLs.
15 key_size = $ENV::KEY_SIZE
17 cert_type = $ENV::CERT_TYPE
18 type = $key_size-$algo-$cert_type
19 database = $dir/$type-index.txt
21 serial = $dir/$type-serial
22 certificate = $dir/$type.pem
23 private_key = $dir/$type.key
28 policy = policy_anything
30 copy_extensions = copy
33 # Extensions to add when signing a request for an EE cert
34 basicConstraints = critical, CA:false
35 subjectKeyIdentifier = hash
36 authorityKeyIdentifier = keyid:always
37 extendedKeyUsage = serverAuth,clientAuth
40 # A leaf cert that will violate the root's imposed name constraints
41 basicConstraints = critical, CA:false
42 subjectKeyIdentifier = hash
43 authorityKeyIdentifier = keyid:always
44 extendedKeyUsage = serverAuth,clientAuth
45 subjectAltName = @san_name_constraint_bad
48 # Extensions to add when signing a request for an intermediate/CA cert
49 basicConstraints = critical, CA:true
50 subjectKeyIdentifier = hash
51 #authorityKeyIdentifier = keyid:always
52 keyUsage = critical, keyCertSign, cRLSign
53 nameConstraints = permitted;DNS:mail.example.com
54 nameConstraints = permitted;DNS:mail.example.org
55 nameConstraints = permitted;DNS:www.example.com
58 # Extensions to add when signing a CRL
59 authorityKeyIdentifier = keyid:always
62 # Default signing policy
63 countryName = optional
64 stateOrProvinceName = optional
65 localityName = optional
66 organizationName = optional
67 organizationalUnitName = optional
69 emailAddress = optional
72 # The request section used to generate the root CA certificate. This should
73 # not be used to generate end-entity certificates. For certificates other
74 # than the root CA, see README to find the appropriate configuration file
75 # (ie: openssl_cert.cnf).
76 default_bits = $ENV::KEY_SIZE
78 string_mask = utf8only
81 distinguished_name = $ENV::CA_NAME
82 x509_extensions = req_ca_exts
85 CN = QUIC Server Root CA
88 basicConstraints = critical, CA:true
89 keyUsage = critical, keyCertSign, cRLSign
90 subjectKeyIdentifier = hash