Files
openssl/test/smime-certs/ca.cnf
Daniel Van Geest d0899abb1b Implement KEMRecipientInfo (RFC9629) in CMS
Also add support for ML-KEM in CMS (draft-ietf-lamps-cms-kyber).

Add the -recip_kdf and -recip_ukm parameters to `openssl cms -encrypt`
to allow the user to specify the KDF algorithm and optional user
keying material for each recipient.

A provider may indicate which RecipientInfo type is supported
for a key, otherwise CMS will try to figure it out itself. A
provider may also indicate which KDF to use in KEMRecipientInfo
if the user hasn't specified one.

Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27681)
2025-07-30 11:39:04 +02:00

85 lines
2.3 KiB
INI

#
# OpenSSL example configuration file for automated certificate creation.
#
# Comment out the next line to ignore configuration errors
config_diagnostics = 1
# This definition stops the following lines choking if HOME or CN
# is undefined.
HOME = .
CN = "Not Defined"
default_ca = ca
####################################################################
[ req ]
default_bits = 2048
default_keyfile = privkey.pem
# Don't prompt for fields: use those in section directly
prompt = no
distinguished_name = req_distinguished_name
x509_extensions = v3_ca # The extensions to add to the self signed cert
string_mask = utf8only
# req_extensions = v3_req # The extensions to add to a certificate request
[ req_distinguished_name ]
countryName = UK
organizationName = OpenSSL Group
# Take CN from environment so it can come from a script.
commonName = $ENV::CN
[ usr_rsa_cert ]
# These extensions are added when 'ca' signs a request for a normal end-entity
# certificate with key usage restrictions compatible with RSA keys
basicConstraints = CA:FALSE
keyUsage = critical, nonRepudiation, digitalSignature, keyEncipherment
# Following SKID and AKID settings are meanwhile by default in all certificates.
# See doc/man5/x509v3_config.pod for details.
# subjectKeyIdentifier = hash
# authorityKeyIdentifier = keyid, issuer
[ signer_cert ]
basicConstraints = CA:FALSE
keyUsage = critical, digitalSignature
[ dh_cert ]
# These extensions are added when 'ca' signs a request for an end-entity
# DH certificate, for which only key agreement makes sense
basicConstraints = CA:FALSE
keyUsage = critical, keyAgreement
[ kem_cert ]
# These extensions are added when 'ca' signs a request for an end-entity
# KEM certificate, for which only key encipherment makes sense
basicConstraints = CA:FALSE
keyUsage = critical, keyEncipherment
[ codesign_cert ]
# These extensions are added when 'ca' signs a request for a code-signing
# end-entity certificate compatible with RSA and ECC keys
basicConstraints = CA:FALSE
keyUsage = critical, digitalSignature
extendedKeyUsage = codeSigning
[ v3_ca ]
# Extensions for a typical CA as required by RFC 5280 etc.
# SKID and AKID are by default set according to PKIX recommendation.
basicConstraints = critical, CA:true
keyUsage = critical, cRLSign, keyCertSign