oid_section = OIDS [ default ] ca = root-ca dir = ./crypto_data [ req ] encrypt_key = yes default_md = sha256 utf8 = yes string_mask = utf8only prompt = no distinguished_name = ca_dn req_extensions = ca_reqext [ OIDS ] fido_attestation = 1.3.6.1.4.1.45724.2.1.1 fido_aaguid = 1.3.6.1.4.1.45724.1.1.4 [ ca_dn ] countryName = "US" organizationName = "OpenSK" organizationalUnitName = "Authenticator Attestation" commonName = "OpenSK CA" [ ca_reqext ] keyUsage = critical,keyCertSign,cRLSign basicConstraints = critical,CA:true subjectKeyIdentifier = hash [ ca ] default_ca = root_ca [ root_ca ] certificate = $dir/ca/$ca.pem private_key = $dir/ca/$ca/private/$ca.key new_certs_dir = $dir/ca/$ca serial = $dir/ca/$ca/db/$ca.pem.srl crlnumber = $dir/ca/$ca/db/$ca.pem.srl database = $dir/ca/$ca/db/$ca.db unique_subject = no default_days = 36525 default_md = sha256 policy = match_pol email_in_dn = no preserve = no name_opt = ca_default cert_opt = ca_default copy_extensions = none x509_extensions = signing_ca_ext default_crl_days = 365 crl_extensions = crl_ext [ match_pol ] countryName = match organizationName = match organizationalUnitName = match commonName = supplied [ any_pol ] countryName = optional stateOrProvinceName = optional localityName = optional organizationName = optional organizationalUnitName = optional commonName = optional emailAddress = optional [ root_ca_ext ] keyUsage = critical,keyCertSign,cRLSign basicConstraints = critical,CA:true subjectKeyIdentifier = hash authorityKeyIdentifier = keyid:always fido_attestation = ASN1:FORMAT:HEX,BITSTRING:00 [ signing_ca_ext ] keyUsage = critical,keyCertSign,cRLSign basicConstraints = critical,CA:true,pathlen:0 subjectKeyIdentifier = hash authorityKeyIdentifier = keyid:always [ crl_ext ] authorityKeyIdentifier = keyid:always