server_certificate.ext.in
来自「Perl写的CA认证程序」· IN 代码 · 共 59 行
IN
59 行
# These extensions are added when 'ca' signs a request.# This goes against PKIX guidelines but some CAs do it and some software# requires this to avoid interpreting an end user certificate as a CA.basicConstraints=critical, CA:FALSE# Here are some examples of the usage of nsCertType. If it is omitted# the certificate can be used for anything *except* object signing.# For an object signing certificate this would be used.#nsCertType = objsign# For normal client use this is typicalnsCertType = server, objsign# This is typical alsokeyUsage = critical, digitalSignature, keyEncipherment, dataEncipherment, keyAgreementextendedKeyUsage= serverAuth, msCodeInd, msCodeCom, msSGC, msEFS, nsSGC# PKIX recommendationssubjectKeyIdentifier=hashauthorityKeyIdentifier=keyid,issuer:always# CommentnsComment = $ENV::COMMENT# Import the email address.subjectAltName=email:copy# Copy subject detailsissuerAltName=issuer:copy# Authority Info AccessauthorityInfoAccess = OCSP;URI:http://@baseurl@/ocspauthorityInfoAccess = caIssuers;URI:http://@baseurl@/ca/issuers.html# CRLscrlDistributionPoints=URI:http://@baseurl@/crl/cacrl.crl# Policy RelatedcertificatePolicies=1.3.6.1.4.1.5255.1.1.1,@polsec# Netscape (unused ?) extensionsnsCaRevocationUrl = http://@baseurl@/crl/cacrl.crlnsRevocationUrl = http://@baseurl@/crl/cacrl.crlnsRenewalUrl = http://@baseurl@/crl/cacrl.crlnsCaPolicyUrl="http://www.europki.org/ca/root/cps/1.1/"#nsBaseUrl#nsSslServerName[polsec]policyIdentifier=1.3.6.1.4.1.5255.1.1.1CPS.1="http://www.europki.org/ca/root/cps/1.1/"CPS.2="http://@baseorg@/cps/"
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?