1
0
Fork 0
mirror of https://github.com/ruby/ruby.git synced 2022-11-09 12:17:21 -05:00

* ext/openssl/ossl.c (class OpenSSL): Use only inner parenthesis in

create_extension examples.


git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@39310 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
This commit is contained in:
drbrain 2013-02-19 01:36:30 +00:00
parent b043b0592b
commit 2163738ffb
2 changed files with 30 additions and 18 deletions
ChangeLog
ext/openssl

View file

@ -1,3 +1,8 @@
Tue Feb 19 10:35:52 2013 Eric Hodel <drbrain@segment7.net>
* ext/openssl/ossl.c (class OpenSSL): Use only inner parenthesis in
create_extension examples.
Tue Feb 19 10:27:12 2013 Eric Hodel <drbrain@segment7.net> Tue Feb 19 10:27:12 2013 Eric Hodel <drbrain@segment7.net>
* ext/openssl/ossl.c (class OpenSSL): Fixed ExtensionFactory example. * ext/openssl/ossl.c (class OpenSSL): Fixed ExtensionFactory example.

View file

@ -701,12 +701,15 @@ ossl_fips_mode_set(VALUE self, VALUE enabled)
* *
* extension_factory = OpenSSL::X509::ExtensionFactory.new nil, cert * extension_factory = OpenSSL::X509::ExtensionFactory.new nil, cert
* *
* cert.add_extension(extension_factory.create_extension * cert.add_extension \
* 'basicConstraints', 'CA:FALSE') * extension_factory.create_extension('basicConstraints', 'CA:FALSE', true)
* cert.add_extension(extension_factory.create_extension *
* 'keyUsage', 'keyEncipherment,dataEncipherment,digitalSignature') * cert.add_extension \
* cert.add_extension(extension_factory.create_extension * extension_factory.create_extension(
* 'subjectKeyIdentifier', 'hash') * 'keyUsage', 'keyEncipherment,dataEncipherment,digitalSignature')
*
* cert.add_extension \
* extension_factory.create_extension('subjectKeyIdentifier', 'hash')
* *
* The list of supported extensions (and in some cases their possible values) * The list of supported extensions (and in some cases their possible values)
* can be derived from the "objects.h" file in the OpenSSL source code. * can be derived from the "objects.h" file in the OpenSSL source code.
@ -777,19 +780,20 @@ ossl_fips_mode_set(VALUE self, VALUE enabled)
* extension_factory.subject_certificate = ca_cert * extension_factory.subject_certificate = ca_cert
* extension_factory.issuer_certificate = ca_cert * extension_factory.issuer_certificate = ca_cert
* *
* ca_cert.add_extension(extension_factory.create_extension * ca_cert.add_extension \
* 'subjectKeyIdentifier', 'hash') * extension_factory.create_extension('subjectKeyIdentifier', 'hash')
* *
* This extension indicates the CA's key may be used as a CA. * This extension indicates the CA's key may be used as a CA.
* *
* ca_cert.add_extension(extension_factory.create_extension * ca_cert.add_extension \
* 'basicConstraints', 'CA:TRUE', true) * extension_factory.create_extension('basicConstraints', 'CA:TRUE', true)
* *
* This extension indicates the CA's key may be used to verify signatures on * This extension indicates the CA's key may be used to verify signatures on
* both certificates and certificate revocations. * both certificates and certificate revocations.
* *
* ca_cert.add_extension(extension_factory.create_extension * ca_cert.add_extension \
* 'keyUsage', 'cRLSign,keyCertSign', true) * extension_factory.create_extension(
* 'keyUsage', 'cRLSign,keyCertSign', true)
* *
* Root CA certificates are self-signed. * Root CA certificates are self-signed.
* *
@ -845,12 +849,15 @@ ossl_fips_mode_set(VALUE self, VALUE enabled)
* extension_factory.subject_certificate = csr_cert * extension_factory.subject_certificate = csr_cert
* extension_factory.issuer_certificate = ca_cert * extension_factory.issuer_certificate = ca_cert
* *
* csr_cert.add_extension(extension_factory.create_extension * csr_cert.add_extension \
* 'basicConstraints', 'CA:FALSE') * extension_factory.create_extension('basicConstraints', 'CA:FALSE')
* csr_cert.add_extension(extension_factory.create_extension *
* 'keyUsage', 'keyEncipherment,dataEncipherment,digitalSignature') * csr_cert.add_extension \
* csr_cert.add_extension(extension_factory.create_extension * extension_factory.create_extension(
* 'subjectKeyIdentifier', 'hash') * 'keyUsage', 'keyEncipherment,dataEncipherment,digitalSignature')
*
* csr_cert.add_extension \
* extension_factory.create_extension('subjectKeyIdentifier', 'hash')
* *
* csr_cert.sign ca_key, OpenSSL::Digest::SHA1.new * csr_cert.sign ca_key, OpenSSL::Digest::SHA1.new
* *