diff options
Diffstat (limited to 'src/lib/libssl/doc')
| -rw-r--r-- | src/lib/libssl/doc/openssl.cnf | 8 | ||||
| -rw-r--r-- | src/lib/libssl/doc/openssl.txt | 27 | ||||
| -rw-r--r-- | src/lib/libssl/doc/standards.txt | 22 |
3 files changed, 9 insertions, 48 deletions
diff --git a/src/lib/libssl/doc/openssl.cnf b/src/lib/libssl/doc/openssl.cnf index 9e59020c17..4c1d595b0a 100644 --- a/src/lib/libssl/doc/openssl.cnf +++ b/src/lib/libssl/doc/openssl.cnf | |||
| @@ -44,8 +44,8 @@ new_certs_dir = $dir/newcerts # default place for new certs. | |||
| 44 | 44 | ||
| 45 | certificate = $dir/cacert.pem # The CA certificate | 45 | certificate = $dir/cacert.pem # The CA certificate |
| 46 | serial = $dir/serial # The current serial number | 46 | serial = $dir/serial # The current serial number |
| 47 | crlnumber = $dir/crlnumber # the current crl number | 47 | #crlnumber = $dir/crlnumber # the current crl number must be |
| 48 | # must be commented out to leave a V1 CRL | 48 | # commented out to leave a V1 CRL |
| 49 | crl = $dir/crl.pem # The current CRL | 49 | crl = $dir/crl.pem # The current CRL |
| 50 | private_key = $dir/private/cakey.pem# The private key | 50 | private_key = $dir/private/cakey.pem# The private key |
| 51 | RANDFILE = $dir/private/.rand # private random number file | 51 | RANDFILE = $dir/private/.rand # private random number file |
| @@ -67,7 +67,7 @@ cert_opt = ca_default # Certificate field options | |||
| 67 | 67 | ||
| 68 | default_days = 365 # how long to certify for | 68 | default_days = 365 # how long to certify for |
| 69 | default_crl_days= 30 # how long before next CRL | 69 | default_crl_days= 30 # how long before next CRL |
| 70 | default_md = sha1 # which md to use. | 70 | default_md = md5 # which md to use. |
| 71 | preserve = no # keep passed DN ordering | 71 | preserve = no # keep passed DN ordering |
| 72 | 72 | ||
| 73 | # A few difference way of specifying how similar the request should look | 73 | # A few difference way of specifying how similar the request should look |
| @@ -188,7 +188,7 @@ nsComment = "OpenSSL Generated Certificate" | |||
| 188 | 188 | ||
| 189 | # PKIX recommendations harmless if included in all certificates. | 189 | # PKIX recommendations harmless if included in all certificates. |
| 190 | subjectKeyIdentifier=hash | 190 | subjectKeyIdentifier=hash |
| 191 | authorityKeyIdentifier=keyid,issuer | 191 | authorityKeyIdentifier=keyid,issuer:always |
| 192 | 192 | ||
| 193 | # This stuff is for subjectAltName and issuerAltname. | 193 | # This stuff is for subjectAltName and issuerAltname. |
| 194 | # Import the email address. | 194 | # Import the email address. |
diff --git a/src/lib/libssl/doc/openssl.txt b/src/lib/libssl/doc/openssl.txt index f8817b0a71..432a17b66c 100644 --- a/src/lib/libssl/doc/openssl.txt +++ b/src/lib/libssl/doc/openssl.txt | |||
| @@ -154,22 +154,8 @@ for example contain data in multiple sections. The correct syntax to | |||
| 154 | use is defined by the extension code itself: check out the certificate | 154 | use is defined by the extension code itself: check out the certificate |
| 155 | policies extension for an example. | 155 | policies extension for an example. |
| 156 | 156 | ||
| 157 | There are two ways to encode arbitrary extensions. | 157 | In addition it is also possible to use the word DER to include arbitrary |
| 158 | 158 | data in any extension. | |
| 159 | The first way is to use the word ASN1 followed by the extension content | ||
| 160 | using the same syntax as ASN1_generate_nconf(). For example: | ||
| 161 | |||
| 162 | 1.2.3.4=critical,ASN1:UTF8String:Some random data | ||
| 163 | |||
| 164 | 1.2.3.4=ASN1:SEQUENCE:seq_sect | ||
| 165 | |||
| 166 | [seq_sect] | ||
| 167 | |||
| 168 | field1 = UTF8:field1 | ||
| 169 | field2 = UTF8:field2 | ||
| 170 | |||
| 171 | It is also possible to use the word DER to include arbitrary data in any | ||
| 172 | extension. | ||
| 173 | 159 | ||
| 174 | 1.2.3.4=critical,DER:01:02:03:04 | 160 | 1.2.3.4=critical,DER:01:02:03:04 |
| 175 | 1.2.3.4=DER:01020304 | 161 | 1.2.3.4=DER:01020304 |
| @@ -350,21 +336,16 @@ Subject Alternative Name. | |||
| 350 | The subject alternative name extension allows various literal values to be | 336 | The subject alternative name extension allows various literal values to be |
| 351 | included in the configuration file. These include "email" (an email address) | 337 | included in the configuration file. These include "email" (an email address) |
| 352 | "URI" a uniform resource indicator, "DNS" (a DNS domain name), RID (a | 338 | "URI" a uniform resource indicator, "DNS" (a DNS domain name), RID (a |
| 353 | registered ID: OBJECT IDENTIFIER), IP (and IP address) and otherName. | 339 | registered ID: OBJECT IDENTIFIER) and IP (and IP address). |
| 354 | 340 | ||
| 355 | Also the email option include a special 'copy' value. This will automatically | 341 | Also the email option include a special 'copy' value. This will automatically |
| 356 | include and email addresses contained in the certificate subject name in | 342 | include and email addresses contained in the certificate subject name in |
| 357 | the extension. | 343 | the extension. |
| 358 | 344 | ||
| 359 | otherName can include arbitrary data associated with an OID: the value | ||
| 360 | should be the OID followed by a semicolon and the content in standard | ||
| 361 | ASN1_generate_nconf() format. | ||
| 362 | |||
| 363 | Examples: | 345 | Examples: |
| 364 | 346 | ||
| 365 | subjectAltName=email:copy,email:my@other.address,URI:http://my.url.here/ | 347 | subjectAltName=email:copy,email:my@other.address,URI:http://my.url.here/ |
| 366 | subjectAltName=email:my@other.address,RID:1.2.3.4 | 348 | subjectAltName=email:my@other.address,RID:1.2.3.4 |
| 367 | subjectAltName=otherName:1.2.3.4;UTF8:some other identifier | ||
| 368 | 349 | ||
| 369 | Issuer Alternative Name. | 350 | Issuer Alternative Name. |
| 370 | 351 | ||
| @@ -778,7 +759,7 @@ called. | |||
| 778 | 759 | ||
| 779 | The X509V3_EXT_METHOD structure is described below. | 760 | The X509V3_EXT_METHOD structure is described below. |
| 780 | 761 | ||
| 781 | struct { | 762 | strut { |
| 782 | int ext_nid; | 763 | int ext_nid; |
| 783 | int ext_flags; | 764 | int ext_flags; |
| 784 | X509V3_EXT_NEW ext_new; | 765 | X509V3_EXT_NEW ext_new; |
diff --git a/src/lib/libssl/doc/standards.txt b/src/lib/libssl/doc/standards.txt index a5ce778f8e..f6675b574b 100644 --- a/src/lib/libssl/doc/standards.txt +++ b/src/lib/libssl/doc/standards.txt | |||
| @@ -88,26 +88,10 @@ PKCS#12: Personal Information Exchange Syntax Standard, version 1.0. | |||
| 88 | (Format: TXT=143173 bytes) (Obsoletes RFC2437) (Status: | 88 | (Format: TXT=143173 bytes) (Obsoletes RFC2437) (Status: |
| 89 | INFORMATIONAL) | 89 | INFORMATIONAL) |
| 90 | 90 | ||
| 91 | 3713 A Description of the Camellia Encryption Algorithm. M. Matsui, | ||
| 92 | J. Nakajima, S. Moriai. April 2004. (Format: TXT=25031 bytes) | ||
| 93 | (Status: INFORMATIONAL) | ||
| 94 | |||
| 95 | 3820 Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate | 91 | 3820 Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate |
| 96 | Profile. S. Tuecke, V. Welch, D. Engert, L. Pearlman, M. Thompson. | 92 | Profile. S. Tuecke, V. Welch, D. Engert, L. Pearlman, M. Thompson. |
| 97 | June 2004. (Format: TXT=86374 bytes) (Status: PROPOSED STANDARD) | 93 | June 2004. (Format: TXT=86374 bytes) (Status: PROPOSED STANDARD) |
| 98 | 94 | ||
| 99 | 4132 Addition of Camellia Cipher Suites to Transport Layer Security | ||
| 100 | (TLS). S. Moriai, A. Kato, M. Kanda. July 2005. (Format: TXT=13590 | ||
| 101 | bytes) (Status: PROPOSED STANDARD) | ||
| 102 | |||
| 103 | 4162 Addition of SEED Cipher Suites to Transport Layer Security (TLS). | ||
| 104 | H.J. Lee, J.H. Yoon, J.I. Lee. August 2005. (Format: TXT=10578 bytes) | ||
| 105 | (Status: PROPOSED STANDARD) | ||
| 106 | |||
| 107 | 4269 The SEED Encryption Algorithm. H.J. Lee, S.J. Lee, J.H. Yoon, | ||
| 108 | D.H. Cheon, J.I. Lee. December 2005. (Format: TXT=34390 bytes) | ||
| 109 | (Obsoletes RFC4009) (Status: INFORMATIONAL) | ||
| 110 | |||
| 111 | 95 | ||
| 112 | Related: | 96 | Related: |
| 113 | -------- | 97 | -------- |
| @@ -266,11 +250,7 @@ STARTTLS documents. | |||
| 266 | Protocol. A. Jungmaier, E. Rescorla, M. Tuexen. December 2002. | 250 | Protocol. A. Jungmaier, E. Rescorla, M. Tuexen. December 2002. |
| 267 | (Format: TXT=16333 bytes) (Status: PROPOSED STANDARD) | 251 | (Format: TXT=16333 bytes) (Status: PROPOSED STANDARD) |
| 268 | 252 | ||
| 269 | 3657 Use of the Camellia Encryption Algorithm in Cryptographic | 253 | "Securing FTP with TLS", 01/27/2000, <draft-murray-auth-ftp-ssl-05.txt> |
| 270 | Message Syntax (CMS). S. Moriai, A. Kato. January 2004. | ||
| 271 | (Format: TXT=26282 bytes) (Status: PROPOSED STANDARD) | ||
| 272 | |||
| 273 | "Securing FTP with TLS", 01/27/2000, <draft-murray-auth-ftp-ssl-05.txt> | ||
| 274 | 254 | ||
| 275 | 255 | ||
| 276 | To be implemented: | 256 | To be implemented: |
