summaryrefslogtreecommitdiff
path: root/src/lib/libssl/doc
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib/libssl/doc')
-rw-r--r--src/lib/libssl/doc/openssl.cnf8
-rw-r--r--src/lib/libssl/doc/openssl.txt27
-rw-r--r--src/lib/libssl/doc/standards.txt22
3 files changed, 9 insertions, 48 deletions
diff --git a/src/lib/libssl/doc/openssl.cnf b/src/lib/libssl/doc/openssl.cnf
index 9e59020c17..4c1d595b0a 100644
--- a/src/lib/libssl/doc/openssl.cnf
+++ b/src/lib/libssl/doc/openssl.cnf
@@ -44,8 +44,8 @@ new_certs_dir = $dir/newcerts # default place for new certs.
44 44
45certificate = $dir/cacert.pem # The CA certificate 45certificate = $dir/cacert.pem # The CA certificate
46serial = $dir/serial # The current serial number 46serial = $dir/serial # The current serial number
47crlnumber = $dir/crlnumber # the current crl number 47#crlnumber = $dir/crlnumber # the current crl number must be
48 # must be commented out to leave a V1 CRL 48 # commented out to leave a V1 CRL
49crl = $dir/crl.pem # The current CRL 49crl = $dir/crl.pem # The current CRL
50private_key = $dir/private/cakey.pem# The private key 50private_key = $dir/private/cakey.pem# The private key
51RANDFILE = $dir/private/.rand # private random number file 51RANDFILE = $dir/private/.rand # private random number file
@@ -67,7 +67,7 @@ cert_opt = ca_default # Certificate field options
67 67
68default_days = 365 # how long to certify for 68default_days = 365 # how long to certify for
69default_crl_days= 30 # how long before next CRL 69default_crl_days= 30 # how long before next CRL
70default_md = sha1 # which md to use. 70default_md = md5 # which md to use.
71preserve = no # keep passed DN ordering 71preserve = no # keep passed DN ordering
72 72
73# A few difference way of specifying how similar the request should look 73# A few difference way of specifying how similar the request should look
@@ -188,7 +188,7 @@ nsComment = "OpenSSL Generated Certificate"
188 188
189# PKIX recommendations harmless if included in all certificates. 189# PKIX recommendations harmless if included in all certificates.
190subjectKeyIdentifier=hash 190subjectKeyIdentifier=hash
191authorityKeyIdentifier=keyid,issuer 191authorityKeyIdentifier=keyid,issuer:always
192 192
193# This stuff is for subjectAltName and issuerAltname. 193# This stuff is for subjectAltName and issuerAltname.
194# Import the email address. 194# Import the email address.
diff --git a/src/lib/libssl/doc/openssl.txt b/src/lib/libssl/doc/openssl.txt
index f8817b0a71..432a17b66c 100644
--- a/src/lib/libssl/doc/openssl.txt
+++ b/src/lib/libssl/doc/openssl.txt
@@ -154,22 +154,8 @@ for example contain data in multiple sections. The correct syntax to
154use is defined by the extension code itself: check out the certificate 154use is defined by the extension code itself: check out the certificate
155policies extension for an example. 155policies extension for an example.
156 156
157There are two ways to encode arbitrary extensions. 157In addition it is also possible to use the word DER to include arbitrary
158 158data in any extension.
159The first way is to use the word ASN1 followed by the extension content
160using the same syntax as ASN1_generate_nconf(). For example:
161
1621.2.3.4=critical,ASN1:UTF8String:Some random data
163
1641.2.3.4=ASN1:SEQUENCE:seq_sect
165
166[seq_sect]
167
168field1 = UTF8:field1
169field2 = UTF8:field2
170
171It is also possible to use the word DER to include arbitrary data in any
172extension.
173 159
1741.2.3.4=critical,DER:01:02:03:04 1601.2.3.4=critical,DER:01:02:03:04
1751.2.3.4=DER:01020304 1611.2.3.4=DER:01020304
@@ -350,21 +336,16 @@ Subject Alternative Name.
350The subject alternative name extension allows various literal values to be 336The subject alternative name extension allows various literal values to be
351included in the configuration file. These include "email" (an email address) 337included in the configuration file. These include "email" (an email address)
352"URI" a uniform resource indicator, "DNS" (a DNS domain name), RID (a 338"URI" a uniform resource indicator, "DNS" (a DNS domain name), RID (a
353registered ID: OBJECT IDENTIFIER), IP (and IP address) and otherName. 339registered ID: OBJECT IDENTIFIER) and IP (and IP address).
354 340
355Also the email option include a special 'copy' value. This will automatically 341Also the email option include a special 'copy' value. This will automatically
356include and email addresses contained in the certificate subject name in 342include and email addresses contained in the certificate subject name in
357the extension. 343the extension.
358 344
359otherName can include arbitrary data associated with an OID: the value
360should be the OID followed by a semicolon and the content in standard
361ASN1_generate_nconf() format.
362
363Examples: 345Examples:
364 346
365subjectAltName=email:copy,email:my@other.address,URI:http://my.url.here/ 347subjectAltName=email:copy,email:my@other.address,URI:http://my.url.here/
366subjectAltName=email:my@other.address,RID:1.2.3.4 348subjectAltName=email:my@other.address,RID:1.2.3.4
367subjectAltName=otherName:1.2.3.4;UTF8:some other identifier
368 349
369Issuer Alternative Name. 350Issuer Alternative Name.
370 351
@@ -778,7 +759,7 @@ called.
778 759
779The X509V3_EXT_METHOD structure is described below. 760The X509V3_EXT_METHOD structure is described below.
780 761
781struct { 762strut {
782int ext_nid; 763int ext_nid;
783int ext_flags; 764int ext_flags;
784X509V3_EXT_NEW ext_new; 765X509V3_EXT_NEW ext_new;
diff --git a/src/lib/libssl/doc/standards.txt b/src/lib/libssl/doc/standards.txt
index a5ce778f8e..f6675b574b 100644
--- a/src/lib/libssl/doc/standards.txt
+++ b/src/lib/libssl/doc/standards.txt
@@ -88,26 +88,10 @@ PKCS#12: Personal Information Exchange Syntax Standard, version 1.0.
88 (Format: TXT=143173 bytes) (Obsoletes RFC2437) (Status: 88 (Format: TXT=143173 bytes) (Obsoletes RFC2437) (Status:
89 INFORMATIONAL) 89 INFORMATIONAL)
90 90
913713 A Description of the Camellia Encryption Algorithm. M. Matsui,
92 J. Nakajima, S. Moriai. April 2004. (Format: TXT=25031 bytes)
93 (Status: INFORMATIONAL)
94
953820 Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate 913820 Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate
96 Profile. S. Tuecke, V. Welch, D. Engert, L. Pearlman, M. Thompson. 92 Profile. S. Tuecke, V. Welch, D. Engert, L. Pearlman, M. Thompson.
97 June 2004. (Format: TXT=86374 bytes) (Status: PROPOSED STANDARD) 93 June 2004. (Format: TXT=86374 bytes) (Status: PROPOSED STANDARD)
98 94
994132 Addition of Camellia Cipher Suites to Transport Layer Security
100 (TLS). S. Moriai, A. Kato, M. Kanda. July 2005. (Format: TXT=13590
101 bytes) (Status: PROPOSED STANDARD)
102
1034162 Addition of SEED Cipher Suites to Transport Layer Security (TLS).
104 H.J. Lee, J.H. Yoon, J.I. Lee. August 2005. (Format: TXT=10578 bytes)
105 (Status: PROPOSED STANDARD)
106
1074269 The SEED Encryption Algorithm. H.J. Lee, S.J. Lee, J.H. Yoon,
108 D.H. Cheon, J.I. Lee. December 2005. (Format: TXT=34390 bytes)
109 (Obsoletes RFC4009) (Status: INFORMATIONAL)
110
111 95
112Related: 96Related:
113-------- 97--------
@@ -266,11 +250,7 @@ STARTTLS documents.
266 Protocol. A. Jungmaier, E. Rescorla, M. Tuexen. December 2002. 250 Protocol. A. Jungmaier, E. Rescorla, M. Tuexen. December 2002.
267 (Format: TXT=16333 bytes) (Status: PROPOSED STANDARD) 251 (Format: TXT=16333 bytes) (Status: PROPOSED STANDARD)
268 252
2693657 Use of the Camellia Encryption Algorithm in Cryptographic 253 "Securing FTP with TLS", 01/27/2000, <draft-murray-auth-ftp-ssl-05.txt>
270 Message Syntax (CMS). S. Moriai, A. Kato. January 2004.
271 (Format: TXT=26282 bytes) (Status: PROPOSED STANDARD)
272
273"Securing FTP with TLS", 01/27/2000, <draft-murray-auth-ftp-ssl-05.txt>
274 254
275 255
276To be implemented: 256To be implemented: