diff options
Diffstat (limited to 'src/lib/libssl/doc')
-rw-r--r-- | src/lib/libssl/doc/openssl.cnf | 8 | ||||
-rw-r--r-- | src/lib/libssl/doc/openssl.txt | 27 | ||||
-rw-r--r-- | src/lib/libssl/doc/standards.txt | 22 |
3 files changed, 48 insertions, 9 deletions
diff --git a/src/lib/libssl/doc/openssl.cnf b/src/lib/libssl/doc/openssl.cnf index 4c1d595b0a..9e59020c17 100644 --- a/src/lib/libssl/doc/openssl.cnf +++ b/src/lib/libssl/doc/openssl.cnf | |||
@@ -44,8 +44,8 @@ new_certs_dir = $dir/newcerts # default place for new certs. | |||
44 | 44 | ||
45 | certificate = $dir/cacert.pem # The CA certificate | 45 | certificate = $dir/cacert.pem # The CA certificate |
46 | serial = $dir/serial # The current serial number | 46 | serial = $dir/serial # The current serial number |
47 | #crlnumber = $dir/crlnumber # the current crl number must be | 47 | crlnumber = $dir/crlnumber # the current crl number |
48 | # commented out to leave a V1 CRL | 48 | # must be commented out to leave a V1 CRL |
49 | crl = $dir/crl.pem # The current CRL | 49 | crl = $dir/crl.pem # The current CRL |
50 | private_key = $dir/private/cakey.pem# The private key | 50 | private_key = $dir/private/cakey.pem# The private key |
51 | RANDFILE = $dir/private/.rand # private random number file | 51 | RANDFILE = $dir/private/.rand # private random number file |
@@ -67,7 +67,7 @@ cert_opt = ca_default # Certificate field options | |||
67 | 67 | ||
68 | default_days = 365 # how long to certify for | 68 | default_days = 365 # how long to certify for |
69 | default_crl_days= 30 # how long before next CRL | 69 | default_crl_days= 30 # how long before next CRL |
70 | default_md = md5 # which md to use. | 70 | default_md = sha1 # which md to use. |
71 | preserve = no # keep passed DN ordering | 71 | preserve = no # keep passed DN ordering |
72 | 72 | ||
73 | # A few difference way of specifying how similar the request should look | 73 | # A few difference way of specifying how similar the request should look |
@@ -188,7 +188,7 @@ nsComment = "OpenSSL Generated Certificate" | |||
188 | 188 | ||
189 | # PKIX recommendations harmless if included in all certificates. | 189 | # PKIX recommendations harmless if included in all certificates. |
190 | subjectKeyIdentifier=hash | 190 | subjectKeyIdentifier=hash |
191 | authorityKeyIdentifier=keyid,issuer:always | 191 | authorityKeyIdentifier=keyid,issuer |
192 | 192 | ||
193 | # This stuff is for subjectAltName and issuerAltname. | 193 | # This stuff is for subjectAltName and issuerAltname. |
194 | # Import the email address. | 194 | # Import the email address. |
diff --git a/src/lib/libssl/doc/openssl.txt b/src/lib/libssl/doc/openssl.txt index 432a17b66c..f8817b0a71 100644 --- a/src/lib/libssl/doc/openssl.txt +++ b/src/lib/libssl/doc/openssl.txt | |||
@@ -154,8 +154,22 @@ for example contain data in multiple sections. The correct syntax to | |||
154 | use is defined by the extension code itself: check out the certificate | 154 | use is defined by the extension code itself: check out the certificate |
155 | policies extension for an example. | 155 | policies extension for an example. |
156 | 156 | ||
157 | In addition it is also possible to use the word DER to include arbitrary | 157 | There are two ways to encode arbitrary extensions. |
158 | data in any extension. | 158 | |
159 | The first way is to use the word ASN1 followed by the extension content | ||
160 | using the same syntax as ASN1_generate_nconf(). For example: | ||
161 | |||
162 | 1.2.3.4=critical,ASN1:UTF8String:Some random data | ||
163 | |||
164 | 1.2.3.4=ASN1:SEQUENCE:seq_sect | ||
165 | |||
166 | [seq_sect] | ||
167 | |||
168 | field1 = UTF8:field1 | ||
169 | field2 = UTF8:field2 | ||
170 | |||
171 | It is also possible to use the word DER to include arbitrary data in any | ||
172 | extension. | ||
159 | 173 | ||
160 | 1.2.3.4=critical,DER:01:02:03:04 | 174 | 1.2.3.4=critical,DER:01:02:03:04 |
161 | 1.2.3.4=DER:01020304 | 175 | 1.2.3.4=DER:01020304 |
@@ -336,16 +350,21 @@ Subject Alternative Name. | |||
336 | The subject alternative name extension allows various literal values to be | 350 | The subject alternative name extension allows various literal values to be |
337 | included in the configuration file. These include "email" (an email address) | 351 | included in the configuration file. These include "email" (an email address) |
338 | "URI" a uniform resource indicator, "DNS" (a DNS domain name), RID (a | 352 | "URI" a uniform resource indicator, "DNS" (a DNS domain name), RID (a |
339 | registered ID: OBJECT IDENTIFIER) and IP (and IP address). | 353 | registered ID: OBJECT IDENTIFIER), IP (and IP address) and otherName. |
340 | 354 | ||
341 | Also the email option include a special 'copy' value. This will automatically | 355 | Also the email option include a special 'copy' value. This will automatically |
342 | include and email addresses contained in the certificate subject name in | 356 | include and email addresses contained in the certificate subject name in |
343 | the extension. | 357 | the extension. |
344 | 358 | ||
359 | otherName can include arbitrary data associated with an OID: the value | ||
360 | should be the OID followed by a semicolon and the content in standard | ||
361 | ASN1_generate_nconf() format. | ||
362 | |||
345 | Examples: | 363 | Examples: |
346 | 364 | ||
347 | subjectAltName=email:copy,email:my@other.address,URI:http://my.url.here/ | 365 | subjectAltName=email:copy,email:my@other.address,URI:http://my.url.here/ |
348 | subjectAltName=email:my@other.address,RID:1.2.3.4 | 366 | subjectAltName=email:my@other.address,RID:1.2.3.4 |
367 | subjectAltName=otherName:1.2.3.4;UTF8:some other identifier | ||
349 | 368 | ||
350 | Issuer Alternative Name. | 369 | Issuer Alternative Name. |
351 | 370 | ||
@@ -759,7 +778,7 @@ called. | |||
759 | 778 | ||
760 | The X509V3_EXT_METHOD structure is described below. | 779 | The X509V3_EXT_METHOD structure is described below. |
761 | 780 | ||
762 | strut { | 781 | struct { |
763 | int ext_nid; | 782 | int ext_nid; |
764 | int ext_flags; | 783 | int ext_flags; |
765 | X509V3_EXT_NEW ext_new; | 784 | X509V3_EXT_NEW ext_new; |
diff --git a/src/lib/libssl/doc/standards.txt b/src/lib/libssl/doc/standards.txt index f6675b574b..a5ce778f8e 100644 --- a/src/lib/libssl/doc/standards.txt +++ b/src/lib/libssl/doc/standards.txt | |||
@@ -88,10 +88,26 @@ PKCS#12: Personal Information Exchange Syntax Standard, version 1.0. | |||
88 | (Format: TXT=143173 bytes) (Obsoletes RFC2437) (Status: | 88 | (Format: TXT=143173 bytes) (Obsoletes RFC2437) (Status: |
89 | INFORMATIONAL) | 89 | INFORMATIONAL) |
90 | 90 | ||
91 | 3713 A Description of the Camellia Encryption Algorithm. M. Matsui, | ||
92 | J. Nakajima, S. Moriai. April 2004. (Format: TXT=25031 bytes) | ||
93 | (Status: INFORMATIONAL) | ||
94 | |||
91 | 3820 Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate | 95 | 3820 Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate |
92 | Profile. S. Tuecke, V. Welch, D. Engert, L. Pearlman, M. Thompson. | 96 | Profile. S. Tuecke, V. Welch, D. Engert, L. Pearlman, M. Thompson. |
93 | June 2004. (Format: TXT=86374 bytes) (Status: PROPOSED STANDARD) | 97 | June 2004. (Format: TXT=86374 bytes) (Status: PROPOSED STANDARD) |
94 | 98 | ||
99 | 4132 Addition of Camellia Cipher Suites to Transport Layer Security | ||
100 | (TLS). S. Moriai, A. Kato, M. Kanda. July 2005. (Format: TXT=13590 | ||
101 | bytes) (Status: PROPOSED STANDARD) | ||
102 | |||
103 | 4162 Addition of SEED Cipher Suites to Transport Layer Security (TLS). | ||
104 | H.J. Lee, J.H. Yoon, J.I. Lee. August 2005. (Format: TXT=10578 bytes) | ||
105 | (Status: PROPOSED STANDARD) | ||
106 | |||
107 | 4269 The SEED Encryption Algorithm. H.J. Lee, S.J. Lee, J.H. Yoon, | ||
108 | D.H. Cheon, J.I. Lee. December 2005. (Format: TXT=34390 bytes) | ||
109 | (Obsoletes RFC4009) (Status: INFORMATIONAL) | ||
110 | |||
95 | 111 | ||
96 | Related: | 112 | Related: |
97 | -------- | 113 | -------- |
@@ -250,7 +266,11 @@ STARTTLS documents. | |||
250 | Protocol. A. Jungmaier, E. Rescorla, M. Tuexen. December 2002. | 266 | Protocol. A. Jungmaier, E. Rescorla, M. Tuexen. December 2002. |
251 | (Format: TXT=16333 bytes) (Status: PROPOSED STANDARD) | 267 | (Format: TXT=16333 bytes) (Status: PROPOSED STANDARD) |
252 | 268 | ||
253 | "Securing FTP with TLS", 01/27/2000, <draft-murray-auth-ftp-ssl-05.txt> | 269 | 3657 Use of the Camellia Encryption Algorithm in Cryptographic |
270 | Message Syntax (CMS). S. Moriai, A. Kato. January 2004. | ||
271 | (Format: TXT=26282 bytes) (Status: PROPOSED STANDARD) | ||
272 | |||
273 | "Securing FTP with TLS", 01/27/2000, <draft-murray-auth-ftp-ssl-05.txt> | ||
254 | 274 | ||
255 | 275 | ||
256 | To be implemented: | 276 | To be implemented: |