Skip to main content
  • Home
  • login
  • Browse the archive

    swh mirror partner logo
swh logo
SoftwareHeritage
Software
Heritage
Mirror
Features
  • Search

  • Downloads

  • Save code now

  • Add forge now

  • Help

  • 93e7082
  • /
  • smime-certs
  • /
  • ca.cnf
Raw File
Permalinks

To reference or cite the objects present in the Software Heritage archive, permalinks based on SoftWare Hash IDentifiers (SWHIDs) must be used.
Select below a type of object currently browsed in order to display its associated SWHID and permalink.

  • content
  • directory
content badge Iframe embedding
swh:1:cnt:1bdffadf672dadc0d4b3b915c89df2c1d9d7224b
directory badge Iframe embedding
swh:1:dir:1b13ba71828028b45867a9529c2c4e9116e36d60
ca.cnf
#
# OpenSSL example configuration file for automated certificate creation.
#

# Comment out the next line to ignore configuration errors
config_diagnostics = 1

# This definition stops the following lines choking if HOME or CN
# is undefined.
HOME			= .
CN			= "Not Defined"
default_ca		= ca

####################################################################

[ req ]
default_bits		= 2048
default_keyfile 	= privkey.pem
# Don't prompt for fields: use those in section directly
prompt			= no
distinguished_name	= req_distinguished_name
x509_extensions         = v3_ca # The extensions to add to the self signed cert
string_mask             = utf8only

# req_extensions = v3_req # The extensions to add to a certificate request

[ req_distinguished_name ]
countryName			= UK

organizationName		= OpenSSL Group
# Take CN from environment so it can come from a script.
commonName			= $ENV::CN

[ usr_rsa_cert ]

# These extensions are added when 'ca' signs a request for a normal end-entity
# certificate with key usage restrictions compatible with RSA keys

basicConstraints = CA:FALSE
keyUsage = critical, nonRepudiation, digitalSignature, keyEncipherment

# Following SKID and AKID settings are meanwhile by default in all certificates.
# See doc/man5/x509v3_config.pod for details.

# subjectKeyIdentifier   = hash
# authorityKeyIdentifier = keyid, issuer

[ signer_cert ]

basicConstraints = CA:FALSE
keyUsage = critical, digitalSignature

[ dh_cert ]

# These extensions are added when 'ca' signs a request for an end-entity
# DH certificate, for which only key agreement makes sense

basicConstraints = CA:FALSE
keyUsage = critical, keyAgreement

[ codesign_cert ]

# These extensions are added when 'ca' signs a request for a code-signing
# end-entity certificate compatible with RSA and ECC keys

basicConstraints = CA:FALSE
keyUsage = critical, digitalSignature
extendedKeyUsage = codeSigning

[ v3_ca ]

# Extensions for a typical CA as required by RFC 5280 etc.
# SKID and AKID are by default set according to PKIX recommendation.

basicConstraints = critical, CA:true
keyUsage = critical, cRLSign, keyCertSign

ENEA — Copyright (C), ENEA. License: GNU AGPLv3+.
Legal notes  ::  JavaScript license information ::  Web API

back to top