summaryrefslogtreecommitdiff
path: root/src/lib/libssl/doc
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib/libssl/doc')
-rw-r--r--src/lib/libssl/doc/openssl.cnf8
-rw-r--r--src/lib/libssl/doc/openssl.txt27
-rw-r--r--src/lib/libssl/doc/standards.txt22
3 files changed, 48 insertions, 9 deletions
diff --git a/src/lib/libssl/doc/openssl.cnf b/src/lib/libssl/doc/openssl.cnf
index 4c1d595b0a..9e59020c17 100644
--- a/src/lib/libssl/doc/openssl.cnf
+++ b/src/lib/libssl/doc/openssl.cnf
@@ -44,8 +44,8 @@ new_certs_dir = $dir/newcerts # default place for new certs.
44 44
45certificate = $dir/cacert.pem # The CA certificate 45certificate = $dir/cacert.pem # The CA certificate
46serial = $dir/serial # The current serial number 46serial = $dir/serial # The current serial number
47#crlnumber = $dir/crlnumber # the current crl number must be 47crlnumber = $dir/crlnumber # the current crl number
48 # commented out to leave a V1 CRL 48 # must be commented out to leave a V1 CRL
49crl = $dir/crl.pem # The current CRL 49crl = $dir/crl.pem # The current CRL
50private_key = $dir/private/cakey.pem# The private key 50private_key = $dir/private/cakey.pem# The private key
51RANDFILE = $dir/private/.rand # private random number file 51RANDFILE = $dir/private/.rand # private random number file
@@ -67,7 +67,7 @@ cert_opt = ca_default # Certificate field options
67 67
68default_days = 365 # how long to certify for 68default_days = 365 # how long to certify for
69default_crl_days= 30 # how long before next CRL 69default_crl_days= 30 # how long before next CRL
70default_md = md5 # which md to use. 70default_md = sha1 # which md to use.
71preserve = no # keep passed DN ordering 71preserve = no # keep passed DN ordering
72 72
73# A few difference way of specifying how similar the request should look 73# A few difference way of specifying how similar the request should look
@@ -188,7 +188,7 @@ nsComment = "OpenSSL Generated Certificate"
188 188
189# PKIX recommendations harmless if included in all certificates. 189# PKIX recommendations harmless if included in all certificates.
190subjectKeyIdentifier=hash 190subjectKeyIdentifier=hash
191authorityKeyIdentifier=keyid,issuer:always 191authorityKeyIdentifier=keyid,issuer
192 192
193# This stuff is for subjectAltName and issuerAltname. 193# This stuff is for subjectAltName and issuerAltname.
194# Import the email address. 194# Import the email address.
diff --git a/src/lib/libssl/doc/openssl.txt b/src/lib/libssl/doc/openssl.txt
index 432a17b66c..f8817b0a71 100644
--- a/src/lib/libssl/doc/openssl.txt
+++ b/src/lib/libssl/doc/openssl.txt
@@ -154,8 +154,22 @@ for example contain data in multiple sections. The correct syntax to
154use is defined by the extension code itself: check out the certificate 154use is defined by the extension code itself: check out the certificate
155policies extension for an example. 155policies extension for an example.
156 156
157In addition it is also possible to use the word DER to include arbitrary 157There are two ways to encode arbitrary extensions.
158data in any extension. 158
159The first way is to use the word ASN1 followed by the extension content
160using the same syntax as ASN1_generate_nconf(). For example:
161
1621.2.3.4=critical,ASN1:UTF8String:Some random data
163
1641.2.3.4=ASN1:SEQUENCE:seq_sect
165
166[seq_sect]
167
168field1 = UTF8:field1
169field2 = UTF8:field2
170
171It is also possible to use the word DER to include arbitrary data in any
172extension.
159 173
1601.2.3.4=critical,DER:01:02:03:04 1741.2.3.4=critical,DER:01:02:03:04
1611.2.3.4=DER:01020304 1751.2.3.4=DER:01020304
@@ -336,16 +350,21 @@ Subject Alternative Name.
336The subject alternative name extension allows various literal values to be 350The subject alternative name extension allows various literal values to be
337included in the configuration file. These include "email" (an email address) 351included in the configuration file. These include "email" (an email address)
338"URI" a uniform resource indicator, "DNS" (a DNS domain name), RID (a 352"URI" a uniform resource indicator, "DNS" (a DNS domain name), RID (a
339registered ID: OBJECT IDENTIFIER) and IP (and IP address). 353registered ID: OBJECT IDENTIFIER), IP (and IP address) and otherName.
340 354
341Also the email option include a special 'copy' value. This will automatically 355Also the email option include a special 'copy' value. This will automatically
342include and email addresses contained in the certificate subject name in 356include and email addresses contained in the certificate subject name in
343the extension. 357the extension.
344 358
359otherName can include arbitrary data associated with an OID: the value
360should be the OID followed by a semicolon and the content in standard
361ASN1_generate_nconf() format.
362
345Examples: 363Examples:
346 364
347subjectAltName=email:copy,email:my@other.address,URI:http://my.url.here/ 365subjectAltName=email:copy,email:my@other.address,URI:http://my.url.here/
348subjectAltName=email:my@other.address,RID:1.2.3.4 366subjectAltName=email:my@other.address,RID:1.2.3.4
367subjectAltName=otherName:1.2.3.4;UTF8:some other identifier
349 368
350Issuer Alternative Name. 369Issuer Alternative Name.
351 370
@@ -759,7 +778,7 @@ called.
759 778
760The X509V3_EXT_METHOD structure is described below. 779The X509V3_EXT_METHOD structure is described below.
761 780
762strut { 781struct {
763int ext_nid; 782int ext_nid;
764int ext_flags; 783int ext_flags;
765X509V3_EXT_NEW ext_new; 784X509V3_EXT_NEW ext_new;
diff --git a/src/lib/libssl/doc/standards.txt b/src/lib/libssl/doc/standards.txt
index f6675b574b..a5ce778f8e 100644
--- a/src/lib/libssl/doc/standards.txt
+++ b/src/lib/libssl/doc/standards.txt
@@ -88,10 +88,26 @@ PKCS#12: Personal Information Exchange Syntax Standard, version 1.0.
88 (Format: TXT=143173 bytes) (Obsoletes RFC2437) (Status: 88 (Format: TXT=143173 bytes) (Obsoletes RFC2437) (Status:
89 INFORMATIONAL) 89 INFORMATIONAL)
90 90
913713 A Description of the Camellia Encryption Algorithm. M. Matsui,
92 J. Nakajima, S. Moriai. April 2004. (Format: TXT=25031 bytes)
93 (Status: INFORMATIONAL)
94
913820 Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate 953820 Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate
92 Profile. S. Tuecke, V. Welch, D. Engert, L. Pearlman, M. Thompson. 96 Profile. S. Tuecke, V. Welch, D. Engert, L. Pearlman, M. Thompson.
93 June 2004. (Format: TXT=86374 bytes) (Status: PROPOSED STANDARD) 97 June 2004. (Format: TXT=86374 bytes) (Status: PROPOSED STANDARD)
94 98
994132 Addition of Camellia Cipher Suites to Transport Layer Security
100 (TLS). S. Moriai, A. Kato, M. Kanda. July 2005. (Format: TXT=13590
101 bytes) (Status: PROPOSED STANDARD)
102
1034162 Addition of SEED Cipher Suites to Transport Layer Security (TLS).
104 H.J. Lee, J.H. Yoon, J.I. Lee. August 2005. (Format: TXT=10578 bytes)
105 (Status: PROPOSED STANDARD)
106
1074269 The SEED Encryption Algorithm. H.J. Lee, S.J. Lee, J.H. Yoon,
108 D.H. Cheon, J.I. Lee. December 2005. (Format: TXT=34390 bytes)
109 (Obsoletes RFC4009) (Status: INFORMATIONAL)
110
95 111
96Related: 112Related:
97-------- 113--------
@@ -250,7 +266,11 @@ STARTTLS documents.
250 Protocol. A. Jungmaier, E. Rescorla, M. Tuexen. December 2002. 266 Protocol. A. Jungmaier, E. Rescorla, M. Tuexen. December 2002.
251 (Format: TXT=16333 bytes) (Status: PROPOSED STANDARD) 267 (Format: TXT=16333 bytes) (Status: PROPOSED STANDARD)
252 268
253 "Securing FTP with TLS", 01/27/2000, <draft-murray-auth-ftp-ssl-05.txt> 2693657 Use of the Camellia Encryption Algorithm in Cryptographic
270 Message Syntax (CMS). S. Moriai, A. Kato. January 2004.
271 (Format: TXT=26282 bytes) (Status: PROPOSED STANDARD)
272
273"Securing FTP with TLS", 01/27/2000, <draft-murray-auth-ftp-ssl-05.txt>
254 274
255 275
256To be implemented: 276To be implemented: