diff options
author | cfu <cfu@c9f7a03b-bd48-0410-a16d-cbbf54688b0b> | 2011-01-18 20:49:07 +0000 |
---|---|---|
committer | cfu <cfu@c9f7a03b-bd48-0410-a16d-cbbf54688b0b> | 2011-01-18 20:49:07 +0000 |
commit | eaaa5d3be6f88068a80a99740e196d26d05bae45 (patch) | |
tree | 380dca268d53725da2abd9e52111c5a43ae41b65 /pki/base/ca/shared/profiles/ca/caTransportCert.cfg | |
parent | 18a0f8521446706ac0bba00fc0369a1499547fd9 (diff) | |
download | pki-eaaa5d3be6f88068a80a99740e196d26d05bae45.tar.gz pki-eaaa5d3be6f88068a80a99740e196d26d05bae45.tar.xz pki-eaaa5d3be6f88068a80a99740e196d26d05bae45.zip |
Bug 668100 - DRM storage cert has OCSP signing extended key usage
git-svn-id: svn+ssh://svn.fedorahosted.org/svn/pki/trunk@1742 c9f7a03b-bd48-0410-a16d-cbbf54688b0b
Diffstat (limited to 'pki/base/ca/shared/profiles/ca/caTransportCert.cfg')
-rw-r--r-- | pki/base/ca/shared/profiles/ca/caTransportCert.cfg | 8 |
1 files changed, 7 insertions, 1 deletions
diff --git a/pki/base/ca/shared/profiles/ca/caTransportCert.cfg b/pki/base/ca/shared/profiles/ca/caTransportCert.cfg index 44968e391..466e2b313 100644 --- a/pki/base/ca/shared/profiles/ca/caTransportCert.cfg +++ b/pki/base/ca/shared/profiles/ca/caTransportCert.cfg @@ -10,7 +10,7 @@ input.i2.class_id=submitterInfoInputImpl output.list=o1 output.o1.class_id=certOutputImpl policyset.list=transportCertSet -policyset.transportCertSet.list=1,2,3,4,5,6,8 +policyset.transportCertSet.list=1,2,3,4,5,6,7,8 policyset.transportCertSet.1.constraint.class_id=subjectNameConstraintImpl policyset.transportCertSet.1.constraint.name=Subject Name Constraint policyset.transportCertSet.1.constraint.params.pattern=CN=.* @@ -71,6 +71,12 @@ policyset.transportCertSet.6.default.params.keyUsageKeyCertSign=false policyset.transportCertSet.6.default.params.keyUsageCrlSign=false policyset.transportCertSet.6.default.params.keyUsageEncipherOnly=false policyset.transportCertSet.6.default.params.keyUsageDecipherOnly=false +policyset.transportCertSet.7.constraint.class_id=noConstraintImpl +policyset.transportCertSet.7.constraint.name=No Constraint +policyset.transportCertSet.7.default.class_id=extendedKeyUsageExtDefaultImpl +policyset.transportCertSet.7.default.name=Extended Key Usage Extension Default +policyset.transportCertSet.7.default.params.exKeyUsageCritical=false +policyset.transportCertSet.7.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.2 policyset.transportCertSet.8.constraint.class_id=signingAlgConstraintImpl policyset.transportCertSet.8.constraint.name=No Constraint policyset.transportCertSet.8.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withEC,SHA512withEC |