spec/fixtures/config_test_ec.yaml in r509-0.9.2 vs spec/fixtures/config_test_ec.yaml in r509-0.10.0
- old
+ new
@@ -1,35 +1,29 @@
-test_ca_ec: {
- ca_cert: {
- cert: 'test_ca_ec.cer',
- key: 'test_ca_ec.key'
- },
- crl_list: "crl_list_file.txt",
- crl_number: "crl_number_file.txt",
- crl_validity_hours: 72,
- ocsp_validity_hours: 96,
- ocsp_start_skew_seconds: 1800,
- message_digest: 'SHA384', #SHA1, SHA224, SHA256, SHA384, SHA512 supported. MD5 too, but you really shouldn't use that unless you have a good reason
- profiles: {
- server: {
- basic_constraints: { "ca" : false },
- key_usage: [digitalSignature,keyEncipherment],
- extended_key_usage: [serverAuth],
- },
- client: {
- basic_constraints: { "ca" : false },
- key_usage: [digitalSignature,keyEncipherment],
- extended_key_usage: [clientAuth],
- },
- server_with_subject_item_policy: {
- basic_constraints: { "ca" : false },
- key_usage: [digitalSignature,keyEncipherment],
- extended_key_usage: [serverAuth],
- subject_item_policy: {
- "CN" : "required",
- "O" : "optional",
- "ST" : "required",
- "C" : "required",
- "OU" : "optional" }
- }
- }
-}
+---
+test_ca_ec:
+ ca_cert:
+ cert: test_ca_ec.cer
+ key: test_ca_ec.key
+ crl_validity_hours: 72
+ ocsp_validity_hours: 96
+ ocsp_start_skew_seconds: 1800
+ profiles:
+ server:
+ basic_constraints:
+ :ca: false
+ key_usage:
+ :value:
+ - digitalSignature
+ - keyEncipherment
+ extended_key_usage:
+ :value:
+ - serverAuth
+ client:
+ basic_constraints:
+ :ca: false
+ key_usage:
+ :value:
+ - digitalSignature
+ - keyEncipherment
+ extended_key_usage:
+ :value:
+ - clientAuth