xref: /freebsd/crypto/openssl/apps/openssl-vms.cnf (revision e0c4386e7e71d93b0edc0c8fa156263fc4a8b0b6)
1*e0c4386eSCy Schubert#
2*e0c4386eSCy Schubert# OpenSSL example configuration file.
3*e0c4386eSCy Schubert# See doc/man5/config.pod for more info.
4*e0c4386eSCy Schubert#
5*e0c4386eSCy Schubert# This is mostly being used for generation of certificate requests,
6*e0c4386eSCy Schubert# but may be used for auto loading of providers
7*e0c4386eSCy Schubert
8*e0c4386eSCy Schubert# Note that you can include other files from the main configuration
9*e0c4386eSCy Schubert# file using the .include directive.
10*e0c4386eSCy Schubert#.include filename
11*e0c4386eSCy Schubert
12*e0c4386eSCy Schubert# This definition stops the following lines choking if HOME isn't
13*e0c4386eSCy Schubert# defined.
14*e0c4386eSCy SchubertHOME			= .
15*e0c4386eSCy Schubert
16*e0c4386eSCy Schubert # Use this in order to automatically load providers.
17*e0c4386eSCy Schubertopenssl_conf = openssl_init
18*e0c4386eSCy Schubert
19*e0c4386eSCy Schubert# Comment out the next line to ignore configuration errors
20*e0c4386eSCy Schubertconfig_diagnostics = 1
21*e0c4386eSCy Schubert
22*e0c4386eSCy Schubert# Extra OBJECT IDENTIFIER info:
23*e0c4386eSCy Schubert# oid_file       = $ENV::HOME/.oid
24*e0c4386eSCy Schubertoid_section = new_oids
25*e0c4386eSCy Schubert
26*e0c4386eSCy Schubert# To use this configuration file with the "-extfile" option of the
27*e0c4386eSCy Schubert# "openssl x509" utility, name here the section containing the
28*e0c4386eSCy Schubert# X.509v3 extensions to use:
29*e0c4386eSCy Schubert# extensions		=
30*e0c4386eSCy Schubert# (Alternatively, use a configuration file that has only
31*e0c4386eSCy Schubert# X.509v3 extensions in its main [= default] section.)
32*e0c4386eSCy Schubert
33*e0c4386eSCy Schubert[ new_oids ]
34*e0c4386eSCy Schubert# We can add new OIDs in here for use by 'ca', 'req' and 'ts'.
35*e0c4386eSCy Schubert# Add a simple OID like this:
36*e0c4386eSCy Schubert# testoid1=1.2.3.4
37*e0c4386eSCy Schubert# Or use config file substitution like this:
38*e0c4386eSCy Schubert# testoid2=${testoid1}.5.6
39*e0c4386eSCy Schubert
40*e0c4386eSCy Schubert# Policies used by the TSA examples.
41*e0c4386eSCy Schuberttsa_policy1 = 1.2.3.4.1
42*e0c4386eSCy Schuberttsa_policy2 = 1.2.3.4.5.6
43*e0c4386eSCy Schuberttsa_policy3 = 1.2.3.4.5.7
44*e0c4386eSCy Schubert
45*e0c4386eSCy Schubert# For FIPS
46*e0c4386eSCy Schubert# Optionally include a file that is generated by the OpenSSL fipsinstall
47*e0c4386eSCy Schubert# application. This file contains configuration data required by the OpenSSL
48*e0c4386eSCy Schubert# fips provider. It contains a named section e.g. [fips_sect] which is
49*e0c4386eSCy Schubert# referenced from the [provider_sect] below.
50*e0c4386eSCy Schubert# Refer to the OpenSSL security policy for more information.
51*e0c4386eSCy Schubert# .include fipsmodule.cnf
52*e0c4386eSCy Schubert
53*e0c4386eSCy Schubert[openssl_init]
54*e0c4386eSCy Schubertproviders = provider_sect
55*e0c4386eSCy Schubert
56*e0c4386eSCy Schubert# List of providers to load
57*e0c4386eSCy Schubert[provider_sect]
58*e0c4386eSCy Schubertdefault = default_sect
59*e0c4386eSCy Schubert# The fips section name should match the section name inside the
60*e0c4386eSCy Schubert# included fipsmodule.cnf.
61*e0c4386eSCy Schubert# fips = fips_sect
62*e0c4386eSCy Schubert
63*e0c4386eSCy Schubert# If no providers are activated explicitly, the default one is activated implicitly.
64*e0c4386eSCy Schubert# See man 7 OSSL_PROVIDER-default for more details.
65*e0c4386eSCy Schubert#
66*e0c4386eSCy Schubert# If you add a section explicitly activating any other provider(s), you most
67*e0c4386eSCy Schubert# probably need to explicitly activate the default provider, otherwise it
68*e0c4386eSCy Schubert# becomes unavailable in openssl.  As a consequence applications depending on
69*e0c4386eSCy Schubert# OpenSSL may not work correctly which could lead to significant system
70*e0c4386eSCy Schubert# problems including inability to remotely access the system.
71*e0c4386eSCy Schubert[default_sect]
72*e0c4386eSCy Schubert# activate = 1
73*e0c4386eSCy Schubert
74*e0c4386eSCy Schubert
75*e0c4386eSCy Schubert####################################################################
76*e0c4386eSCy Schubert[ ca ]
77*e0c4386eSCy Schubertdefault_ca	= CA_default		# The default ca section
78*e0c4386eSCy Schubert
79*e0c4386eSCy Schubert####################################################################
80*e0c4386eSCy Schubert[ CA_default ]
81*e0c4386eSCy Schubert
82*e0c4386eSCy Schubertdir		= sys\$disk:[.demoCA		# Where everything is kept
83*e0c4386eSCy Schubertcerts		= $dir.certs]		# Where the issued certs are kept
84*e0c4386eSCy Schubertcrl_dir		= $dir.crl]		# Where the issued crl are kept
85*e0c4386eSCy Schubertdatabase	= $dir]index.txt	# database index file.
86*e0c4386eSCy Schubert#unique_subject	= no			# Set to 'no' to allow creation of
87*e0c4386eSCy Schubert					# several certs with same subject.
88*e0c4386eSCy Schubertnew_certs_dir	= $dir.newcerts]		# default place for new certs.
89*e0c4386eSCy Schubert
90*e0c4386eSCy Schubertcertificate	= $dir]cacert.pem 	# The CA certificate
91*e0c4386eSCy Schubertserial		= $dir]serial. 		# The current serial number
92*e0c4386eSCy Schubertcrlnumber	= $dir]crlnumber.	# the current crl number
93*e0c4386eSCy Schubert					# must be commented out to leave a V1 CRL
94*e0c4386eSCy Schubertcrl		= $dir]crl.pem 		# The current CRL
95*e0c4386eSCy Schubertprivate_key	= $dir.private]cakey.pem# The private key
96*e0c4386eSCy Schubert
97*e0c4386eSCy Schubertx509_extensions	= usr_cert		# The extensions to add to the cert
98*e0c4386eSCy Schubert
99*e0c4386eSCy Schubert# Comment out the following two lines for the "traditional"
100*e0c4386eSCy Schubert# (and highly broken) format.
101*e0c4386eSCy Schubertname_opt 	= ca_default		# Subject Name options
102*e0c4386eSCy Schubertcert_opt 	= ca_default		# Certificate field options
103*e0c4386eSCy Schubert
104*e0c4386eSCy Schubert# Extension copying option: use with caution.
105*e0c4386eSCy Schubert# copy_extensions = copy
106*e0c4386eSCy Schubert
107*e0c4386eSCy Schubert# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs
108*e0c4386eSCy Schubert# so this is commented out by default to leave a V1 CRL.
109*e0c4386eSCy Schubert# crlnumber must also be commented out to leave a V1 CRL.
110*e0c4386eSCy Schubert# crl_extensions	= crl_ext
111*e0c4386eSCy Schubert
112*e0c4386eSCy Schubertdefault_days	= 365			# how long to certify for
113*e0c4386eSCy Schubertdefault_crl_days= 30			# how long before next CRL
114*e0c4386eSCy Schubertdefault_md	= default		# use public key default MD
115*e0c4386eSCy Schubertpreserve	= no			# keep passed DN ordering
116*e0c4386eSCy Schubert
117*e0c4386eSCy Schubert# A few difference way of specifying how similar the request should look
118*e0c4386eSCy Schubert# For type CA, the listed attributes must be the same, and the optional
119*e0c4386eSCy Schubert# and supplied fields are just that :-)
120*e0c4386eSCy Schubertpolicy		= policy_match
121*e0c4386eSCy Schubert
122*e0c4386eSCy Schubert# For the CA policy
123*e0c4386eSCy Schubert[ policy_match ]
124*e0c4386eSCy SchubertcountryName		= match
125*e0c4386eSCy SchubertstateOrProvinceName	= match
126*e0c4386eSCy SchubertorganizationName	= match
127*e0c4386eSCy SchubertorganizationalUnitName	= optional
128*e0c4386eSCy SchubertcommonName		= supplied
129*e0c4386eSCy SchubertemailAddress		= optional
130*e0c4386eSCy Schubert
131*e0c4386eSCy Schubert# For the 'anything' policy
132*e0c4386eSCy Schubert# At this point in time, you must list all acceptable 'object'
133*e0c4386eSCy Schubert# types.
134*e0c4386eSCy Schubert[ policy_anything ]
135*e0c4386eSCy SchubertcountryName		= optional
136*e0c4386eSCy SchubertstateOrProvinceName	= optional
137*e0c4386eSCy SchubertlocalityName		= optional
138*e0c4386eSCy SchubertorganizationName	= optional
139*e0c4386eSCy SchubertorganizationalUnitName	= optional
140*e0c4386eSCy SchubertcommonName		= supplied
141*e0c4386eSCy SchubertemailAddress		= optional
142*e0c4386eSCy Schubert
143*e0c4386eSCy Schubert####################################################################
144*e0c4386eSCy Schubert[ req ]
145*e0c4386eSCy Schubertdefault_bits		= 2048
146*e0c4386eSCy Schubertdefault_keyfile 	= privkey.pem
147*e0c4386eSCy Schubertdistinguished_name	= req_distinguished_name
148*e0c4386eSCy Schubertattributes		= req_attributes
149*e0c4386eSCy Schubertx509_extensions	= v3_ca	# The extensions to add to the self signed cert
150*e0c4386eSCy Schubert
151*e0c4386eSCy Schubert# Passwords for private keys if not present they will be prompted for
152*e0c4386eSCy Schubert# input_password = secret
153*e0c4386eSCy Schubert# output_password = secret
154*e0c4386eSCy Schubert
155*e0c4386eSCy Schubert# This sets a mask for permitted string types. There are several options.
156*e0c4386eSCy Schubert# default: PrintableString, T61String, BMPString.
157*e0c4386eSCy Schubert# pkix	 : PrintableString, BMPString (PKIX recommendation before 2004)
158*e0c4386eSCy Schubert# utf8only: only UTF8Strings (PKIX recommendation after 2004).
159*e0c4386eSCy Schubert# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
160*e0c4386eSCy Schubert# MASK:XXXX a literal mask value.
161*e0c4386eSCy Schubert# WARNING: ancient versions of Netscape crash on BMPStrings or UTF8Strings.
162*e0c4386eSCy Schubertstring_mask = utf8only
163*e0c4386eSCy Schubert
164*e0c4386eSCy Schubert# req_extensions = v3_req # The extensions to add to a certificate request
165*e0c4386eSCy Schubert
166*e0c4386eSCy Schubert[ req_distinguished_name ]
167*e0c4386eSCy SchubertcountryName			= Country Name (2 letter code)
168*e0c4386eSCy SchubertcountryName_default		= AU
169*e0c4386eSCy SchubertcountryName_min			= 2
170*e0c4386eSCy SchubertcountryName_max			= 2
171*e0c4386eSCy Schubert
172*e0c4386eSCy SchubertstateOrProvinceName		= State or Province Name (full name)
173*e0c4386eSCy SchubertstateOrProvinceName_default	= Some-State
174*e0c4386eSCy Schubert
175*e0c4386eSCy SchubertlocalityName			= Locality Name (eg, city)
176*e0c4386eSCy Schubert
177*e0c4386eSCy Schubert0.organizationName		= Organization Name (eg, company)
178*e0c4386eSCy Schubert0.organizationName_default	= Internet Widgits Pty Ltd
179*e0c4386eSCy Schubert
180*e0c4386eSCy Schubert# we can do this but it is not needed normally :-)
181*e0c4386eSCy Schubert#1.organizationName		= Second Organization Name (eg, company)
182*e0c4386eSCy Schubert#1.organizationName_default	= World Wide Web Pty Ltd
183*e0c4386eSCy Schubert
184*e0c4386eSCy SchubertorganizationalUnitName		= Organizational Unit Name (eg, section)
185*e0c4386eSCy Schubert#organizationalUnitName_default	=
186*e0c4386eSCy Schubert
187*e0c4386eSCy SchubertcommonName			= Common Name (e.g. server FQDN or YOUR name)
188*e0c4386eSCy SchubertcommonName_max			= 64
189*e0c4386eSCy Schubert
190*e0c4386eSCy SchubertemailAddress			= Email Address
191*e0c4386eSCy SchubertemailAddress_max		= 64
192*e0c4386eSCy Schubert
193*e0c4386eSCy Schubert# SET-ex3			= SET extension number 3
194*e0c4386eSCy Schubert
195*e0c4386eSCy Schubert[ req_attributes ]
196*e0c4386eSCy SchubertchallengePassword		= A challenge password
197*e0c4386eSCy SchubertchallengePassword_min		= 4
198*e0c4386eSCy SchubertchallengePassword_max		= 20
199*e0c4386eSCy Schubert
200*e0c4386eSCy SchubertunstructuredName		= An optional company name
201*e0c4386eSCy Schubert
202*e0c4386eSCy Schubert[ usr_cert ]
203*e0c4386eSCy Schubert
204*e0c4386eSCy Schubert# These extensions are added when 'ca' signs a request.
205*e0c4386eSCy Schubert
206*e0c4386eSCy Schubert# This goes against PKIX guidelines but some CAs do it and some software
207*e0c4386eSCy Schubert# requires this to avoid interpreting an end user certificate as a CA.
208*e0c4386eSCy Schubert
209*e0c4386eSCy SchubertbasicConstraints=CA:FALSE
210*e0c4386eSCy Schubert
211*e0c4386eSCy Schubert# This is typical in keyUsage for a client certificate.
212*e0c4386eSCy Schubert# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
213*e0c4386eSCy Schubert
214*e0c4386eSCy Schubert# PKIX recommendations harmless if included in all certificates.
215*e0c4386eSCy SchubertsubjectKeyIdentifier=hash
216*e0c4386eSCy SchubertauthorityKeyIdentifier=keyid,issuer
217*e0c4386eSCy Schubert
218*e0c4386eSCy Schubert# This stuff is for subjectAltName and issuerAltname.
219*e0c4386eSCy Schubert# Import the email address.
220*e0c4386eSCy Schubert# subjectAltName=email:copy
221*e0c4386eSCy Schubert# An alternative to produce certificates that aren't
222*e0c4386eSCy Schubert# deprecated according to PKIX.
223*e0c4386eSCy Schubert# subjectAltName=email:move
224*e0c4386eSCy Schubert
225*e0c4386eSCy Schubert# Copy subject details
226*e0c4386eSCy Schubert# issuerAltName=issuer:copy
227*e0c4386eSCy Schubert
228*e0c4386eSCy Schubert# This is required for TSA certificates.
229*e0c4386eSCy Schubert# extendedKeyUsage = critical,timeStamping
230*e0c4386eSCy Schubert
231*e0c4386eSCy Schubert[ v3_req ]
232*e0c4386eSCy Schubert
233*e0c4386eSCy Schubert# Extensions to add to a certificate request
234*e0c4386eSCy Schubert
235*e0c4386eSCy SchubertbasicConstraints = CA:FALSE
236*e0c4386eSCy SchubertkeyUsage = nonRepudiation, digitalSignature, keyEncipherment
237*e0c4386eSCy Schubert
238*e0c4386eSCy Schubert[ v3_ca ]
239*e0c4386eSCy Schubert
240*e0c4386eSCy Schubert
241*e0c4386eSCy Schubert# Extensions for a typical CA
242*e0c4386eSCy Schubert
243*e0c4386eSCy Schubert
244*e0c4386eSCy Schubert# PKIX recommendation.
245*e0c4386eSCy Schubert
246*e0c4386eSCy SchubertsubjectKeyIdentifier=hash
247*e0c4386eSCy Schubert
248*e0c4386eSCy SchubertauthorityKeyIdentifier=keyid:always,issuer
249*e0c4386eSCy Schubert
250*e0c4386eSCy SchubertbasicConstraints = critical,CA:true
251*e0c4386eSCy Schubert
252*e0c4386eSCy Schubert# Key usage: this is typical for a CA certificate. However since it will
253*e0c4386eSCy Schubert# prevent it being used as an test self-signed certificate it is best
254*e0c4386eSCy Schubert# left out by default.
255*e0c4386eSCy Schubert# keyUsage = cRLSign, keyCertSign
256*e0c4386eSCy Schubert
257*e0c4386eSCy Schubert# Include email address in subject alt name: another PKIX recommendation
258*e0c4386eSCy Schubert# subjectAltName=email:copy
259*e0c4386eSCy Schubert# Copy issuer details
260*e0c4386eSCy Schubert# issuerAltName=issuer:copy
261*e0c4386eSCy Schubert
262*e0c4386eSCy Schubert# DER hex encoding of an extension: beware experts only!
263*e0c4386eSCy Schubert# obj=DER:02:03
264*e0c4386eSCy Schubert# Where 'obj' is a standard or added object
265*e0c4386eSCy Schubert# You can even override a supported extension:
266*e0c4386eSCy Schubert# basicConstraints= critical, DER:30:03:01:01:FF
267*e0c4386eSCy Schubert
268*e0c4386eSCy Schubert[ crl_ext ]
269*e0c4386eSCy Schubert
270*e0c4386eSCy Schubert# CRL extensions.
271*e0c4386eSCy Schubert# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
272*e0c4386eSCy Schubert
273*e0c4386eSCy Schubert# issuerAltName=issuer:copy
274*e0c4386eSCy SchubertauthorityKeyIdentifier=keyid:always
275*e0c4386eSCy Schubert
276*e0c4386eSCy Schubert[ proxy_cert_ext ]
277*e0c4386eSCy Schubert# These extensions should be added when creating a proxy certificate
278*e0c4386eSCy Schubert
279*e0c4386eSCy Schubert# This goes against PKIX guidelines but some CAs do it and some software
280*e0c4386eSCy Schubert# requires this to avoid interpreting an end user certificate as a CA.
281*e0c4386eSCy Schubert
282*e0c4386eSCy SchubertbasicConstraints=CA:FALSE
283*e0c4386eSCy Schubert
284*e0c4386eSCy Schubert# This is typical in keyUsage for a client certificate.
285*e0c4386eSCy Schubert# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
286*e0c4386eSCy Schubert
287*e0c4386eSCy Schubert# PKIX recommendations harmless if included in all certificates.
288*e0c4386eSCy SchubertsubjectKeyIdentifier=hash
289*e0c4386eSCy SchubertauthorityKeyIdentifier=keyid,issuer
290*e0c4386eSCy Schubert
291*e0c4386eSCy Schubert# This stuff is for subjectAltName and issuerAltname.
292*e0c4386eSCy Schubert# Import the email address.
293*e0c4386eSCy Schubert# subjectAltName=email:copy
294*e0c4386eSCy Schubert# An alternative to produce certificates that aren't
295*e0c4386eSCy Schubert# deprecated according to PKIX.
296*e0c4386eSCy Schubert# subjectAltName=email:move
297*e0c4386eSCy Schubert
298*e0c4386eSCy Schubert# Copy subject details
299*e0c4386eSCy Schubert# issuerAltName=issuer:copy
300*e0c4386eSCy Schubert
301*e0c4386eSCy Schubert# This really needs to be in place for it to be a proxy certificate.
302*e0c4386eSCy SchubertproxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo
303*e0c4386eSCy Schubert
304*e0c4386eSCy Schubert####################################################################
305*e0c4386eSCy Schubert[ tsa ]
306*e0c4386eSCy Schubert
307*e0c4386eSCy Schubertdefault_tsa = tsa_config1	# the default TSA section
308*e0c4386eSCy Schubert
309*e0c4386eSCy Schubert[ tsa_config1 ]
310*e0c4386eSCy Schubert
311*e0c4386eSCy Schubert# These are used by the TSA reply generation only.
312*e0c4386eSCy Schubertdir		= sys\$disk:[.demoCA		# TSA root directory
313*e0c4386eSCy Schubertserial		= $dir]tsaserial.	# The current serial number (mandatory)
314*e0c4386eSCy Schubertcrypto_device	= builtin		# OpenSSL engine to use for signing
315*e0c4386eSCy Schubertsigner_cert	= $dir/tsacert.pem 	# The TSA signing certificate
316*e0c4386eSCy Schubert					# (optional)
317*e0c4386eSCy Schubertcerts		= $dir.cacert.pem]	# Certificate chain to include in reply
318*e0c4386eSCy Schubert					# (optional)
319*e0c4386eSCy Schubertsigner_key	= $dir/private/tsakey.pem # The TSA private key (optional)
320*e0c4386eSCy Schubertsigner_digest  = sha256			# Signing digest to use. (Optional)
321*e0c4386eSCy Schubertdefault_policy	= tsa_policy1		# Policy if request did not specify it
322*e0c4386eSCy Schubert					# (optional)
323*e0c4386eSCy Schubertother_policies	= tsa_policy2, tsa_policy3	# acceptable policies (optional)
324*e0c4386eSCy Schubertdigests     = sha1, sha256, sha384, sha512  # Acceptable message digests (mandatory)
325*e0c4386eSCy Schubertaccuracy	= secs:1, millisecs:500, microsecs:100	# (optional)
326*e0c4386eSCy Schubertclock_precision_digits  = 0	# number of digits after dot. (optional)
327*e0c4386eSCy Schubertordering		= yes	# Is ordering defined for timestamps?
328*e0c4386eSCy Schubert				# (optional, default: no)
329*e0c4386eSCy Schuberttsa_name		= yes	# Must the TSA name be included in the reply?
330*e0c4386eSCy Schubert				# (optional, default: no)
331*e0c4386eSCy Schubertess_cert_id_chain	= no	# Must the ESS cert id chain be included?
332*e0c4386eSCy Schubert				# (optional, default: no)
333*e0c4386eSCy Schubertess_cert_id_alg		= sha1	# algorithm to compute certificate
334*e0c4386eSCy Schubert				# identifier (optional, default: sha1)
335*e0c4386eSCy Schubert
336*e0c4386eSCy Schubert[insta] # CMP using Insta Demo CA
337*e0c4386eSCy Schubert# Message transfer
338*e0c4386eSCy Schubertserver = pki.certificate.fi:8700
339*e0c4386eSCy Schubert# proxy = # set this as far as needed, e.g., http://192.168.1.1:8080
340*e0c4386eSCy Schubert# tls_use = 0
341*e0c4386eSCy Schubertpath = pkix/
342*e0c4386eSCy Schubert
343*e0c4386eSCy Schubert# Server authentication
344*e0c4386eSCy Schubertrecipient = "/C=FI/O=Insta Demo/CN=Insta Demo CA" # or set srvcert or issuer
345*e0c4386eSCy Schubertignore_keyusage = 1 # potentially needed quirk
346*e0c4386eSCy Schubertunprotected_errors = 1 # potentially needed quirk
347*e0c4386eSCy Schubertextracertsout = insta.extracerts.pem
348*e0c4386eSCy Schubert
349*e0c4386eSCy Schubert# Client authentication
350*e0c4386eSCy Schubertref = 3078 # user identification
351*e0c4386eSCy Schubertsecret = pass:insta # can be used for both client and server side
352*e0c4386eSCy Schubert
353*e0c4386eSCy Schubert# Generic message options
354*e0c4386eSCy Schubertcmd = ir # default operation, can be overridden on cmd line with, e.g., kur
355*e0c4386eSCy Schubert
356*e0c4386eSCy Schubert# Certificate enrollment
357*e0c4386eSCy Schubertsubject = "/CN=openssl-cmp-test"
358*e0c4386eSCy Schubertnewkey = insta.priv.pem
359*e0c4386eSCy Schubertout_trusted = apps/insta.ca.crt # does not include keyUsage digitalSignature
360*e0c4386eSCy Schubertcertout = insta.cert.pem
361*e0c4386eSCy Schubert
362*e0c4386eSCy Schubert[pbm] # Password-based protection for Insta CA
363*e0c4386eSCy Schubert# Server and client authentication
364*e0c4386eSCy Schubertref = $insta::ref # 3078
365*e0c4386eSCy Schubertsecret = $insta::secret # pass:insta
366*e0c4386eSCy Schubert
367*e0c4386eSCy Schubert[signature] # Signature-based protection for Insta CA
368*e0c4386eSCy Schubert# Server authentication
369*e0c4386eSCy Schuberttrusted = $insta::out_trusted # apps/insta.ca.crt
370*e0c4386eSCy Schubert
371*e0c4386eSCy Schubert# Client authentication
372*e0c4386eSCy Schubertsecret = # disable PBM
373*e0c4386eSCy Schubertkey = $insta::newkey # insta.priv.pem
374*e0c4386eSCy Schubertcert = $insta::certout # insta.cert.pem
375*e0c4386eSCy Schubert
376*e0c4386eSCy Schubert[ir]
377*e0c4386eSCy Schubertcmd = ir
378*e0c4386eSCy Schubert
379*e0c4386eSCy Schubert[cr]
380*e0c4386eSCy Schubertcmd = cr
381*e0c4386eSCy Schubert
382*e0c4386eSCy Schubert[kur]
383*e0c4386eSCy Schubert# Certificate update
384*e0c4386eSCy Schubertcmd = kur
385*e0c4386eSCy Schubertoldcert = $insta::certout # insta.cert.pem
386*e0c4386eSCy Schubert
387*e0c4386eSCy Schubert[rr]
388*e0c4386eSCy Schubert# Certificate revocation
389*e0c4386eSCy Schubertcmd = rr
390*e0c4386eSCy Schubertoldcert = $insta::certout # insta.cert.pem
391