doc/file.r509.html in r509-0.9.2 vs doc/file.r509.html in r509-0.10.0

- old
+ new

@@ -1,20 +1,20 @@ <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> <head> - <meta http-equiv="Content-Type" content="text/html; charset=US-ASCII" /> + <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /> <title> File: r509 - &mdash; Documentation by YARD 0.8.5 + &mdash; Documentation by YARD 0.8.6.1 </title> - <link rel="stylesheet" href="css/style.css" type="text/css" media="screen" charset="utf-8" /> + <link rel="stylesheet" href="css/style.css" type="text/css" charset="utf-8" /> - <link rel="stylesheet" href="css/common.css" type="text/css" media="screen" charset="utf-8" /> + <link rel="stylesheet" href="css/common.css" type="text/css" charset="utf-8" /> <script type="text/javascript" charset="utf-8"> hasFrames = window.top.frames.main ? true : false; relpath = ''; framesUrl = "frames.html#!" + escape(window.location.href); @@ -59,114 +59,307 @@ <div class="clear"></div> </div> <iframe id="search_frame"></iframe> - <div id="content"><div id='filecontents'> -<p>certificate_authorities: {</p> + <div id="content"><div id='filecontents'><hr style="height: 1px"> -<pre class="code ruby"><code class="ruby">test_ca: { - ca_cert: { - cert: 'spec/fixtures/test_ca.cer', - key: 'spec/fixtures/test_ca.key' - }, - ocsp_cert: { - pkcs12: 'spec/fixtures/test_ca_ocsp.p12', - password: 'r509' - }, - ocsp_location: ['http://ocsp.domain.com'], - ca_issuers_location: ['http://domain.com/ca.html'], - ocsp_chain: 'spec/fixtures/test_ca_ocsp_chain.txt', - ocsp_start_skew_seconds: 3600, - ocsp_validity_hours: 168, - cdp_location: ['http://crl.domain.com/test_ca.crl'], - crl_list: 'spec/fixtures/test_ca_crl_list.txt', - crl_number: 'spec/fixtures/test_ca_crl_number.txt', - crl_validity_hours: 168, #7 days - message_digest: 'SHA1', #SHA1, SHA256, SHA512 supported. MD5 too, but you really shouldn't use that unless you have a good reason - profiles: { - server: { - basic_constraints: {&quot;ca&quot; : false}, - key_usage: [digitalSignature,keyEncipherment], - extended_key_usage: [serverAuth], - subject_item_policy: { - CN: &quot;required&quot;, - O: &quot;required&quot;, - OU: &quot;optional&quot;, - ST: &quot;required&quot;, - C: &quot;required&quot;, - L: &quot;required&quot; - } - }, - client: { - basic_constraints: {&quot;ca&quot; : false}, - key_usage: [digitalSignature,keyEncipherment], - extended_key_usage: [clientAuth], - }, - email: { - basic_constraints: {&quot;ca&quot; : false}, - key_usage: [digitalSignature,keyEncipherment], - extended_key_usage: [emailProtection], - }, - clientserver: { - basic_constraints: {&quot;ca&quot; : false}, - key_usage: [digitalSignature,keyEncipherment], - extended_key_usage: [serverAuth,clientAuth], - }, - codesigning: { - basic_constraints: {&quot;ca&quot; : false}, - key_usage: [digitalSignature], - extended_key_usage: [codeSigning], - }, - timestamping: { - basic_constraints: {&quot;ca&quot; : false}, - key_usage: [digitalSignature], - extended_key_usage: [timeStamping], - }, - subroot: { - basic_constraints: {&quot;ca&quot; : true, &quot;path_length&quot; : 0}, - key_usage: [keyCertSign,cRLSign], - extended_key_usage: [], - certificate_policies: [ - { policy_identifier: &quot;2.16.840.1.99999.21.234&quot;, - cps_uris: [&quot;http://example.com/cps&quot;,&quot;http://haha.com&quot;], - user_notices: [ { explicit_text: &quot;this is a great thing&quot;, organization: &quot;my org&quot;, notice_numbers: &quot;1,2,3&quot; } ] - }, - { policy_identifier: &quot;2.16.840.1.99999.21.235&quot;, - cps_uris: [&quot;http://example.com/cps2&quot;], - user_notices: [ { explicit_text: &quot;this is a bad thing&quot;, organization: &quot;another org&quot;, notice_numbers: &quot;3,2,1&quot; },{ explicit_text: &quot;another user notice&quot;} ] - } - ], - inhibit_any_policy: 0, - policy_constraints: { require_explicit_policy: 0, inhibit_policy_mapping: 0}, - name_constraints: { - permitted: [ - {type: &quot;IP&quot;, value: &quot;192.168.0.0/255.255.0.0&quot;}, - {type: &quot;dirName&quot;, value: [['CN','myCN'],['O','Org']]} - ], - excluded: [ - {type: &quot;email&quot;, value: &quot;domain.com&quot;}, - {type: &quot;URI&quot;, value: &quot;.net&quot;}, - {type: &quot;DNS&quot;, value: &quot;test.us&quot;} - ] - } - }, - ocsp_delegate: { - basic_constraints: {&quot;ca&quot; : false}, - key_usage: [digitalSignature], - extended_key_usage: [OCSPSigning], - ocsp_no_check: true - } - } -}</code></pre> +<p>custom_oids:</p> +<ul><li> +<p>:oid: 2.5.4.15 :short_name: businessCategory :long_name: Business Category</p> +</li><li> +<p>:oid: 1.3.6.1.4.1.311.60.2.1.2 :short_name: +jurisdictionOfIncorporationStateOrProvinceName</p> +</li></ul> -<p>}</p> +<p>certificate_authorities:</p> + +<pre class="code ruby"><code class="ruby">test_ca: + ca_cert: + cert: spec/fixtures/test_ca.cer + key: spec/fixtures/test_ca.key + ocsp_cert: + pkcs12: spec/fixtures/test_ca_ocsp.p12 + password: r509 + crl_cert: + pkcs12: spec/fixtures/test_ca_crl.p12 + password: r509 + ocsp_chain: spec/fixtures/test_ca_ocsp_chain.txt + ocsp_start_skew_seconds: 3600 + ocsp_validity_hours: 168 + crl_list_file: spec/fixtures/test_ca_crl_list.txt + crl_number_file: spec/fixtures/test_ca_crl_number.txt + crl_validity_hours: 168 + crl_md: SHA1 + profiles: + server: + basic_constraints: + :ca: false + :critical: true + key_usage: + :critical: false + :value: + - digitalSignature + - keyEncipherment + extended_key_usage: + :critical: false + :value: + - serverAuth + subject_item_policy: + CN: + :policy: required + O: + :policy: required + OU: + :policy: optional + ST: + :policy: required + C: + :policy: required + L: + :policy: match + :value: My Locality Requirement + authority_info_access: + :critical: true + :ocsp_location: + - :type: URI + :value: http://ocsp.domain.com + :ca_issuers_location: + - :type: URI + :value: http://domain.com/ca.html + crl_distribution_points: + :value: + - :type: URI + :value: http://crl.domain.com/test_ca.crl + default_md: SHA1 + allowed_mds: + - SHA256 + - SHA512 + - SHA1 + client: + basic_constraints: + :ca: false + key_usage: + :value: + - digitalSignature + - keyEncipherment + extended_key_usage: + :value: + - clientAuth + authority_info_access: + :critical: true + :ocsp_location: + - :type: URI + :value: http://ocsp.domain.com + :ca_issuers_location: + - :type: URI + :value: http://domain.com/ca.html + crl_distribution_points: + :value: + - :type: URI + :value: http://crl.domain.com/test_ca.crl + default_md: SHA1 + allowed_mds: + - SHA256 + - SHA512 + - SHA1 + email: + basic_constraints: + :ca: false + key_usage: + :value: + - digitalSignature + - keyEncipherment + extended_key_usage: + :value: + - emailProtection + authority_info_access: + :critical: true + :ocsp_location: + - :type: URI + :value: http://ocsp.domain.com + :ca_issuers_location: + - :type: URI + :value: http://domain.com/ca.html + crl_distribution_points: + :value: + - :type: URI + :value: http://crl.domain.com/test_ca.crl + default_md: SHA1 + allowed_mds: + - SHA256 + - SHA512 + - SHA1 + clientserver: + basic_constraints: + :ca: false + key_usage: + :value: + - digitalSignature + - keyEncipherment + extended_key_usage: + :value: + - serverAuth + - clientAuth + authority_info_access: + :critical: true + :ocsp_location: + - :type: URI + :value: http://ocsp.domain.com + :ca_issuers_location: + - :type: URI + :value: http://domain.com/ca.html + crl_distribution_points: + :value: + - :type: URI + :value: http://crl.domain.com/test_ca.crl + default_md: SHA1 + allowed_mds: + - SHA256 + - SHA512 + - SHA1 + codesigning: + basic_constraints: + :ca: false + key_usage: + :value: + - digitalSignature + extended_key_usage: + :value: + - codeSigning + authority_info_access: + :critical: true + :ocsp_location: + - :type: URI + :value: http://ocsp.domain.com + :ca_issuers_location: + - :type: URI + :value: http://domain.com/ca.html + crl_distribution_points: + :value: + - :type: URI + :value: http://crl.domain.com/test_ca.crl + default_md: SHA1 + allowed_mds: + - SHA256 + - SHA512 + - SHA1 + timestamping: + basic_constraints: + :ca: false + key_usage: + :value: + - digitalSignature + extended_key_usage: + :value: + - timeStamping + authority_info_access: + :critical: true + :ocsp_location: + - :type: URI + :value: http://ocsp.domain.com + :ca_issuers_location: + - :type: URI + :value: http://domain.com/ca.html + crl_distribution_points: + :value: + - :type: URI + :value: http://crl.domain.com/test_ca.crl + default_md: SHA1 + allowed_mds: + - SHA256 + - SHA512 + - SHA1 + subroot: + basic_constraints: + :ca: true + :path_length: 0 + key_usage: + :value: + - keyCertSign + - cRLSign + certificate_policies: + - :policy_identifier: 2.16.840.1.99999.21.234 + :cps_uris: + - http://example.com/cps + - http://haha.com + :user_notices: + - :explicit_text: this is a great thing + :organization: my org + :notice_numbers: &#39;1,2,3&#39; + - :policy_identifier: 2.16.840.1.99999.21.235 + :cps_uris: + - http://example.com/cps2 + :user_notices: + - :explicit_text: this is a bad thing + :organization: another org + :notice_numbers: &#39;3,2,1&#39; + - :explicit_text: another user notice + inhibit_any_policy: + :value: 0 + policy_constraints: + :require_explicit_policy: 0 + :inhibit_policy_mapping: 0 + name_constraints: + :critical: true + :permitted: + - :type: IP + :value: 192.168.0.0/255.255.0.0 + - :type: dirName + :value: + :CN: myCN + :O: Org + :excluded: + - :type: email + :value: domain.com + - :type: URI + :value: .net + - :type: DNS + :value: test.us + authority_info_access: + :critical: true + :ocsp_location: + - :type: URI + :value: http://ocsp.domain.com + :ca_issuers_location: + - :type: URI + :value: http://domain.com/ca.html + crl_distribution_points: + :value: + - :type: URI + :value: http://crl.domain.com/test_ca.crl + default_md: SHA1 + allowed_mds: + - SHA256 + - SHA512 + - SHA1 + ocsp_delegate: + basic_constraints: + :ca: false + key_usage: + :value: + - digitalSignature + extended_key_usage: + :value: + - OCSPSigning + crl_distribution_points: + :value: + - :type: URI + :value: http://crl.domain.com/test_ca.crl + ocsp_no_check: + :critical: false + :value: true + default_md: SHA1 + allowed_mds: + - SHA256 + - SHA512 + - SHA1</code></pre> </div></div> <div id="footer"> - Generated on Tue Apr 23 10:46:04 2013 by + Generated on Sun Jan 26 13:37:25 2014 by <a href="http://yardoc.org" title="Yay! A Ruby Documentation Tool" target="_parent">yard</a> - 0.8.5 (ruby-1.9.3). + 0.8.6.1 (ruby-2.0.0). </div> </body> </html> \ No newline at end of file