FAQ and ms/applink.c update from HEAD.
This commit is contained in:
parent
a084185d76
commit
4952ed0fa4
2 changed files with 63 additions and 5 deletions
49
FAQ
49
FAQ
|
@ -31,6 +31,7 @@ OpenSSL - Frequently Asked Questions
|
||||||
* Why does my browser give a warning about a mismatched hostname?
|
* Why does my browser give a warning about a mismatched hostname?
|
||||||
* How do I install a CA certificate into a browser?
|
* How do I install a CA certificate into a browser?
|
||||||
* Why is OpenSSL x509 DN output not conformant to RFC2253?
|
* Why is OpenSSL x509 DN output not conformant to RFC2253?
|
||||||
|
* What is a "128 bit certificate"? Can I create one with OpenSSL?
|
||||||
|
|
||||||
[BUILD] Questions about building and testing OpenSSL
|
[BUILD] Questions about building and testing OpenSSL
|
||||||
|
|
||||||
|
@ -386,6 +387,43 @@ interface, the "-nameopt" option could be introduded. See the manual
|
||||||
page of the "openssl x509" commandline tool for details. The old behaviour
|
page of the "openssl x509" commandline tool for details. The old behaviour
|
||||||
has however been left as default for the sake of compatibility.
|
has however been left as default for the sake of compatibility.
|
||||||
|
|
||||||
|
* What is a "128 bit certificate"? Can I create one with OpenSSL?
|
||||||
|
|
||||||
|
The term "128 bit certificate" is a highly misleading marketing term. It does
|
||||||
|
*not* refer to the size of the public key in the certificate! A certificate
|
||||||
|
containing a 128 bit RSA key would have negligible security.
|
||||||
|
|
||||||
|
There were various other names such as "magic certificates", "SGC
|
||||||
|
certificates", "step up certificates" etc.
|
||||||
|
|
||||||
|
You can't generally create such a certificate using OpenSSL but there is no
|
||||||
|
need to any more. Nowadays web browsers using unrestricted strong encryption
|
||||||
|
are generally available.
|
||||||
|
|
||||||
|
When there were tight export restrictions on the export of strong encryption
|
||||||
|
software from the US only weak encryption algorithms could be freely exported
|
||||||
|
(initially 40 bit and then 56 bit). It was widely recognised that this was
|
||||||
|
inadequate. A relaxation the rules allowed the use of strong encryption but
|
||||||
|
only to an authorised server.
|
||||||
|
|
||||||
|
Two slighly different techniques were developed to support this, one used by
|
||||||
|
Netscape was called "step up", the other used by MSIE was called "Server Gated
|
||||||
|
Cryptography" (SGC). When a browser initially connected to a server it would
|
||||||
|
check to see if the certificate contained certain extensions and was issued by
|
||||||
|
an authorised authority. If these test succeeded it would reconnect using
|
||||||
|
strong encryption.
|
||||||
|
|
||||||
|
Only certain (initially one) certificate authorities could issue the
|
||||||
|
certificates and they generally cost more than ordinary certificates.
|
||||||
|
|
||||||
|
Although OpenSSL can create certificates containing the appropriate extensions
|
||||||
|
the certificate would not come from a permitted authority and so would not
|
||||||
|
be recognized.
|
||||||
|
|
||||||
|
The export laws were later changed to allow almost unrestricted use of strong
|
||||||
|
encryption so these certificates are now obsolete.
|
||||||
|
|
||||||
|
|
||||||
[BUILD] =======================================================================
|
[BUILD] =======================================================================
|
||||||
|
|
||||||
* Why does the linker complain about undefined symbols?
|
* Why does the linker complain about undefined symbols?
|
||||||
|
@ -672,16 +710,19 @@ Note that debug and release libraries are NOT interchangeable. If you
|
||||||
built OpenSSL with /MD your application must use /MD and cannot use /MDd.
|
built OpenSSL with /MD your application must use /MD and cannot use /MDd.
|
||||||
|
|
||||||
As per 0.9.8 the above limitation is eliminated for .DLLs. OpenSSL
|
As per 0.9.8 the above limitation is eliminated for .DLLs. OpenSSL
|
||||||
.DLLs compiled with some specific run-time option [we recommend the
|
.DLLs compiled with some specific run-time option [we insist on the
|
||||||
default /MD] can be deployed with application compiled with different
|
default /MD] can be deployed with application compiled with different
|
||||||
option or even different compiler. But there is a catch! Instead of
|
option or even different compiler. But there is a catch! Instead of
|
||||||
re-compiling OpenSSL toolkit, as you would have to with prior versions,
|
re-compiling OpenSSL toolkit, as you would have to with prior versions,
|
||||||
you have to compile small C snippet with compiler and/or options of
|
you have to compile small C snippet with compiler and/or options of
|
||||||
your choice. The snippet gets installed as
|
your choice. The snippet gets installed as
|
||||||
<install-root>/include/openssl/applink.c and should be either added to
|
<install-root>/include/openssl/applink.c and should be either added to
|
||||||
your project or simply #include-d in one [and only one] of your source
|
your application project or simply #include-d in one [and only one]
|
||||||
files. Failure to do either manifests itself as fatal "no
|
of your application source files. Failure to link this shim module
|
||||||
OPENSSL_Applink" error.
|
into your application manifests itself as fatal "no OPENSSL_Applink"
|
||||||
|
run-time error. An explicit reminder is due that in this situation
|
||||||
|
[mixing compiler options] it is as important to add CRYPTO_malloc_init
|
||||||
|
prior first call to OpenSSL.
|
||||||
|
|
||||||
* How do I read or write a DER encoded buffer using the ASN1 functions?
|
* How do I read or write a DER encoded buffer using the ASN1 functions?
|
||||||
|
|
||||||
|
|
19
ms/applink.c
19
ms/applink.c
|
@ -39,7 +39,20 @@ static int app_fileno(FILE *fp) { return _fileno(fp); }
|
||||||
static int app_fsetmod(FILE *fp,char mod)
|
static int app_fsetmod(FILE *fp,char mod)
|
||||||
{ return _setmode (_fileno(fp),mod=='b'?_O_BINARY:_O_TEXT); }
|
{ return _setmode (_fileno(fp),mod=='b'?_O_BINARY:_O_TEXT); }
|
||||||
|
|
||||||
__declspec(dllexport) void **OPENSSL_Applink(void)
|
#ifdef __cplusplus
|
||||||
|
extern "C" {
|
||||||
|
#endif
|
||||||
|
|
||||||
|
__declspec(dllexport)
|
||||||
|
void **
|
||||||
|
#if defined(__BORLANDC__)
|
||||||
|
__stdcall /* __stdcall appears to be the only way to get the name
|
||||||
|
* decoration right with Borland C. Otherwise it works
|
||||||
|
* purely incidentally, as we pass no parameters. */
|
||||||
|
#else
|
||||||
|
__cdecl
|
||||||
|
#endif
|
||||||
|
OPENSSL_Applink(void)
|
||||||
{ static int once=1;
|
{ static int once=1;
|
||||||
static void *OPENSSL_ApplinkTable[APPLINK_MAX+1]={(void *)APPLINK_MAX};
|
static void *OPENSSL_ApplinkTable[APPLINK_MAX+1]={(void *)APPLINK_MAX};
|
||||||
|
|
||||||
|
@ -74,4 +87,8 @@ __declspec(dllexport) void **OPENSSL_Applink(void)
|
||||||
|
|
||||||
return OPENSSL_ApplinkTable;
|
return OPENSSL_ApplinkTable;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#ifdef __cplusplus
|
||||||
|
}
|
||||||
|
#endif
|
||||||
#endif
|
#endif
|
||||||
|
|
Loading…
Reference in a new issue