2527
2545
*Returns:* On success, `GNUTLS_E_SUCCESS' is returned, otherwise a
2528
2546
negative error value.
2548
gnutls_x509_crt_set_crl_dist_points2
2549
------------------------------------
2551
-- Function: int gnutls_x509_crt_set_crl_dist_points2
2552
(gnutls_x509_crt_t CRT, gnutls_x509_subject_alt_name_t TYPE,
2553
const void * DATA, unsigned int DATA_SIZE, unsigned int
2555
CRT: a certificate of type `gnutls_x509_crt_t'
2557
TYPE: is one of the gnutls_x509_subject_alt_name_t enumerations
2559
DATA: The data to be set
2561
DATA_SIZE: The data size
2563
REASON_FLAGS: revocation reasons
2565
This function will set the CRL distribution points certificate
2568
*Returns:* On success, `GNUTLS_E_SUCCESS' is returned, otherwise a
2569
negative error value.
2530
2573
gnutls_x509_crt_set_crl_dist_points
2531
2574
-----------------------------------
2533
2576
-- Function: int gnutls_x509_crt_set_crl_dist_points
2534
2577
(gnutls_x509_crt_t CRT, gnutls_x509_subject_alt_name_t TYPE,
2535
2578
const void * DATA_STRING, unsigned int REASON_FLAGS)
2536
CRT: should contain a gnutls_x509_crt_t structure
2579
CRT: a certificate of type `gnutls_x509_crt_t'
2538
2581
TYPE: is one of the gnutls_x509_subject_alt_name_t enumerations
2781
2824
*Returns:* On success, `GNUTLS_E_SUCCESS' is returned, otherwise a
2782
2825
negative error value.
2827
gnutls_x509_crt_set_subject_alt_name
2828
------------------------------------
2830
-- Function: int gnutls_x509_crt_set_subject_alt_name
2831
(gnutls_x509_crt_t CRT, gnutls_x509_subject_alt_name_t TYPE,
2832
const void * DATA, unsigned int DATA_SIZE, unsigned int FLAGS)
2833
CRT: a certificate of type `gnutls_x509_crt_t'
2835
TYPE: is one of the gnutls_x509_subject_alt_name_t enumerations
2837
DATA: The data to be set
2839
DATA_SIZE: The size of data to be set
2841
FLAGS: GNUTLS_FSAN_SET to clear previous data or
2842
GNUTLS_FSAN_APPEND to append.
2844
This function will set the subject alternative name certificate
2845
extension. It can set the following types:
2847
&GNUTLS_SAN_DNSNAME: as a text string
2849
&GNUTLS_SAN_RFC822NAME: as a text string
2851
&GNUTLS_SAN_URI: as a text string
2853
&GNUTLS_SAN_IPADDRESS: as a binary IP address (4 or 16 bytes)
2855
Other values can be set as binary values with the proper DER
2858
*Returns:* On success, `GNUTLS_E_SUCCESS' is returned, otherwise a
2859
negative error value.
2784
2863
gnutls_x509_crt_set_subject_alternative_name
2785
2864
--------------------------------------------
2787
2866
-- Function: int gnutls_x509_crt_set_subject_alternative_name
2788
2867
(gnutls_x509_crt_t CRT, gnutls_x509_subject_alt_name_t TYPE,
2789
2868
const char * DATA_STRING)
2790
CRT: should contain a gnutls_x509_crt_t structure
2869
CRT: a certificate of type `gnutls_x509_crt_t'
2792
2871
TYPE: is one of the gnutls_x509_subject_alt_name_t enumerations
2794
2873
DATA_STRING: The data to be set, a zero terminated string
2796
2875
This function will set the subject alternative name certificate
2876
extension. This function assumes that data can be expressed as a
2877
null terminated string.
2879
The name of the function is unfortunate since it is incosistent
2880
with `gnutls_x509_crt_get_subject_alt_name()'.
2799
2882
*Returns:* On success, `GNUTLS_E_SUCCESS' is returned, otherwise a
2800
2883
negative error value.
5591
5675
10 All the Supported Ciphersuites in GnuTLS
5592
5676
*******************************************
5594
`TLS_RSA_NULL_MD5' 0x00 0x01 RFC 2246
5595
`TLS_ANON_DH_3DES_EDE_CBC_SHA' 0x00 0x1B RFC 2246
5596
`TLS_ANON_DH_ARCFOUR_MD5' 0x00 0x18 RFC 2246
5597
`TLS_ANON_DH_AES_128_CBC_SHA' 0x00 0x34 RFC 2246
5598
`TLS_ANON_DH_AES_256_CBC_SHA' 0x00 0x3A RFC 2246
5599
`TLS_RSA_ARCFOUR_SHA' 0x00 0x05 RFC 2246
5600
`TLS_RSA_ARCFOUR_MD5' 0x00 0x04 RFC 2246
5601
`TLS_RSA_3DES_EDE_CBC_SHA' 0x00 0x0A RFC 2246
5602
`TLS_RSA_EXPORT_ARCFOUR_40_MD5' 0x00 0x03 RFC 2246
5603
`TLS_DHE_DSS_3DES_EDE_CBC_SHA' 0x00 0x13 RFC 2246
5604
`TLS_DHE_RSA_3DES_EDE_CBC_SHA' 0x00 0x16 RFC 2246
5605
`TLS_RSA_AES_128_CBC_SHA' 0x00 0x2F RFC 3268
5606
`TLS_RSA_AES_256_CBC_SHA' 0x00 0x35 RFC 3268
5607
`TLS_DHE_DSS_AES_256_CBC_SHA' 0x00 0x38 RFC 3268
5608
`TLS_DHE_DSS_AES_128_CBC_SHA' 0x00 0x32 RFC 3268
5609
`TLS_DHE_RSA_AES_256_CBC_SHA' 0x00 0x39 RFC 3268
5610
`TLS_DHE_RSA_AES_128_CBC_SHA' 0x00 0x33 RFC 3268
5611
`TLS_SRP_SHA_3DES_EDE_CBC_SHA' 0x00 0x50 RFC 5054
5612
`TLS_SRP_SHA_AES_128_CBC_SHA' 0x00 0x53 RFC 5054
5613
`TLS_SRP_SHA_AES_256_CBC_SHA' 0x00 0x56 RFC 5054
5614
`TLS_SRP_SHA_RSA_3DES_EDE_CBC_SHA'0x00 0x51 RFC 5054
5615
`TLS_SRP_SHA_DSS_3DES_EDE_CBC_SHA'0x00 0x52 RFC 5054
5616
`TLS_SRP_SHA_RSA_AES_128_CBC_SHA'0x00 0x54 RFC 5054
5617
`TLS_SRP_SHA_DSS_AES_128_CBC_SHA'0x00 0x55 RFC 5054
5618
`TLS_SRP_SHA_RSA_AES_256_CBC_SHA'0x00 0x57 RFC 5054
5619
`TLS_SRP_SHA_DSS_AES_256_CBC_SHA'0x00 0x58 RFC 5054
5620
`TLS_DHE_DSS_ARCFOUR_SHA' 0x00 0x66 draft-ietf-tls-56-bit-ciphersuites
5621
`TLS_PSK_ARCFOUR_SHA' 0x00 0x8A draft-ietf-tls-psk
5622
`TLS_PSK_3DES_EDE_CBC_SHA' 0x00 0x8B draft-ietf-tls-psk
5623
`TLS_PSK_AES_128_CBC_SHA' 0x00 0x8C draft-ietf-tls-psk
5624
`TLS_PSK_AES_256_CBC_SHA' 0x00 0x8D draft-ietf-tls-psk
5678
Available cipher suites:
5679
TLS_ANON_DH_ARCFOUR_MD5 0x00 0x18 SSL3.0
5680
TLS_ANON_DH_3DES_EDE_CBC_SHA1 0x00 0x1b SSL3.0
5681
TLS_ANON_DH_AES_128_CBC_SHA1 0x00 0x34 SSL3.0
5682
TLS_ANON_DH_AES_256_CBC_SHA1 0x00 0x3a SSL3.0
5683
TLS_ANON_DH_CAMELLIA_128_CBC_SHA1 0x00 0x46 TLS1.0
5684
TLS_ANON_DH_CAMELLIA_256_CBC_SHA1 0x00 0x89 TLS1.0
5685
TLS_PSK_SHA_ARCFOUR_SHA1 0x00 0x8a TLS1.0
5686
TLS_PSK_SHA_3DES_EDE_CBC_SHA1 0x00 0x8b TLS1.0
5687
TLS_PSK_SHA_AES_128_CBC_SHA1 0x00 0x8c TLS1.0
5688
TLS_PSK_SHA_AES_256_CBC_SHA1 0x00 0x8d TLS1.0
5689
TLS_DHE_PSK_SHA_ARCFOUR_SHA1 0x00 0x8e TLS1.0
5690
TLS_DHE_PSK_SHA_3DES_EDE_CBC_SHA1 0x00 0x8f TLS1.0
5691
TLS_DHE_PSK_SHA_AES_128_CBC_SHA1 0x00 0x90 TLS1.0
5692
TLS_DHE_PSK_SHA_AES_256_CBC_SHA1 0x00 0x91 TLS1.0
5693
TLS_SRP_SHA_3DES_EDE_CBC_SHA1 0xc0 0x1a TLS1.0
5694
TLS_SRP_SHA_AES_128_CBC_SHA1 0xc0 0x1d TLS1.0
5695
TLS_SRP_SHA_AES_256_CBC_SHA1 0xc0 0x20 TLS1.0
5696
TLS_SRP_SHA_DSS_3DES_EDE_CBC_SHA1 0xc0 0x1c TLS1.0
5697
TLS_SRP_SHA_RSA_3DES_EDE_CBC_SHA1 0xc0 0x1b TLS1.0
5698
TLS_SRP_SHA_DSS_AES_128_CBC_SHA1 0xc0 0x1f TLS1.0
5699
TLS_SRP_SHA_RSA_AES_128_CBC_SHA1 0xc0 0x1e TLS1.0
5700
TLS_SRP_SHA_DSS_AES_256_CBC_SHA1 0xc0 0x22 TLS1.0
5701
TLS_SRP_SHA_RSA_AES_256_CBC_SHA1 0xc0 0x21 TLS1.0
5702
TLS_DHE_DSS_ARCFOUR_SHA1 0x00 0x66 TLS1.0
5703
TLS_DHE_DSS_3DES_EDE_CBC_SHA1 0x00 0x13 SSL3.0
5704
TLS_DHE_DSS_AES_128_CBC_SHA1 0x00 0x32 SSL3.0
5705
TLS_DHE_DSS_AES_256_CBC_SHA1 0x00 0x38 SSL3.0
5706
TLS_DHE_DSS_CAMELLIA_128_CBC_SHA1 0x00 0x44 TLS1.0
5707
TLS_DHE_DSS_CAMELLIA_256_CBC_SHA1 0x00 0x87 TLS1.0
5708
TLS_DHE_RSA_3DES_EDE_CBC_SHA1 0x00 0x16 SSL3.0
5709
TLS_DHE_RSA_AES_128_CBC_SHA1 0x00 0x33 SSL3.0
5710
TLS_DHE_RSA_AES_256_CBC_SHA1 0x00 0x39 SSL3.0
5711
TLS_DHE_RSA_CAMELLIA_128_CBC_SHA1 0x00 0x45 TLS1.0
5712
TLS_DHE_RSA_CAMELLIA_256_CBC_SHA1 0x00 0x88 TLS1.0
5713
TLS_RSA_NULL_MD5 0x00 0x01 SSL3.0
5714
TLS_RSA_EXPORT_ARCFOUR_40_MD5 0x00 0x03 SSL3.0
5715
TLS_RSA_ARCFOUR_SHA1 0x00 0x05 SSL3.0
5716
TLS_RSA_ARCFOUR_MD5 0x00 0x04 SSL3.0
5717
TLS_RSA_3DES_EDE_CBC_SHA1 0x00 0x0a SSL3.0
5718
TLS_RSA_AES_128_CBC_SHA1 0x00 0x2f SSL3.0
5719
TLS_RSA_AES_256_CBC_SHA1 0x00 0x35 SSL3.0
5720
TLS_RSA_CAMELLIA_128_CBC_SHA1 0x00 0x41 TLS1.0
5721
TLS_RSA_CAMELLIA_256_CBC_SHA1 0x00 0x84 TLS1.0
5723
Available certificate types:
5728
Available protocols:
5758
Available MAC algorithms:
5775
Available key exchange methods:
5796
Available public key algorithms:
5801
Available public key signature algorithms:
5818
Available compression methods:
5823
Some additional information regarding some of the algorithms:
5826
RSA is public key cryptosystem designed by Ronald Rivest, Adi
5827
Shamir and Leonard Adleman. It can be used with any hash
5831
DSA is the USA's Digital Signature Standard. It uses only the
5832
SHA-1 hash algorithm.
5835
MD2 is a cryptographic hash algorithm designed by Ron Rivest. It
5836
is optimized for 8-bit processors. Outputs 128 bits of data.
5837
There are no known weaknesses of this algorithm but since this
5838
algorithm is rarely used and not really studied it should not be
5842
MD5 is a cryptographic hash algorithm designed by Ron Rivest.
5843
Outputs 128 bits of data. It is considered to be broken.
5846
SHA is a cryptographic hash algorithm designed by NSA. Outputs 160
5847
bits of data. It is also considered to be broken, though no
5848
practical attacks have been found.
5851
RIPEMD is a cryptographic hash algorithm developed in the
5852
framework of the EU project RIPE. Outputs 160 bits of data.
5627
5856
File: gnutls.info, Node: Guile Bindings, Next: Internal architecture of GnuTLS, Prev: All the supported ciphersuites in GnuTLS, Up: Top