spec/fixtures/config_test_ec.yaml in r509-0.9.2 vs spec/fixtures/config_test_ec.yaml in r509-0.10.0

- old
+ new

@@ -1,35 +1,29 @@ -test_ca_ec: { - ca_cert: { - cert: 'test_ca_ec.cer', - key: 'test_ca_ec.key' - }, - crl_list: "crl_list_file.txt", - crl_number: "crl_number_file.txt", - crl_validity_hours: 72, - ocsp_validity_hours: 96, - ocsp_start_skew_seconds: 1800, - message_digest: 'SHA384', #SHA1, SHA224, SHA256, SHA384, SHA512 supported. MD5 too, but you really shouldn't use that unless you have a good reason - profiles: { - server: { - basic_constraints: { "ca" : false }, - key_usage: [digitalSignature,keyEncipherment], - extended_key_usage: [serverAuth], - }, - client: { - basic_constraints: { "ca" : false }, - key_usage: [digitalSignature,keyEncipherment], - extended_key_usage: [clientAuth], - }, - server_with_subject_item_policy: { - basic_constraints: { "ca" : false }, - key_usage: [digitalSignature,keyEncipherment], - extended_key_usage: [serverAuth], - subject_item_policy: { - "CN" : "required", - "O" : "optional", - "ST" : "required", - "C" : "required", - "OU" : "optional" } - } - } -} +--- +test_ca_ec: + ca_cert: + cert: test_ca_ec.cer + key: test_ca_ec.key + crl_validity_hours: 72 + ocsp_validity_hours: 96 + ocsp_start_skew_seconds: 1800 + profiles: + server: + basic_constraints: + :ca: false + key_usage: + :value: + - digitalSignature + - keyEncipherment + extended_key_usage: + :value: + - serverAuth + client: + basic_constraints: + :ca: false + key_usage: + :value: + - digitalSignature + - keyEncipherment + extended_key_usage: + :value: + - clientAuth