diff options
Diffstat (limited to 'doc/src')
-rw-r--r-- | doc/src/sgml/config.sgml | 16 | ||||
-rw-r--r-- | doc/src/sgml/installation.sgml | 2 | ||||
-rw-r--r-- | doc/src/sgml/libpq.sgml | 51 | ||||
-rw-r--r-- | doc/src/sgml/pgcrypto.sgml | 14 | ||||
-rw-r--r-- | doc/src/sgml/sslinfo.sgml | 4 |
5 files changed, 49 insertions, 38 deletions
diff --git a/doc/src/sgml/config.sgml b/doc/src/sgml/config.sgml index c4ba49ffaf5..2c75876e322 100644 --- a/doc/src/sgml/config.sgml +++ b/doc/src/sgml/config.sgml @@ -1261,10 +1261,11 @@ include_dir 'conf.d' <term><literal>+3DES</literal></term> <listitem> <para> - The OpenSSL default order for <literal>HIGH</literal> is problematic - because it orders 3DES higher than AES128. This is wrong because - 3DES offers less security than AES128, and it is also much - slower. <literal>+3DES</literal> reorders it after all other + The <productname>OpenSSL</productname> default order for + <literal>HIGH</literal> is problematic because it orders 3DES + higher than AES128. This is wrong because 3DES offers less + security than AES128, and it is also much slower. + <literal>+3DES</literal> reorders it after all other <literal>HIGH</literal> and <literal>MEDIUM</literal> ciphers. </para> </listitem> @@ -1284,8 +1285,8 @@ include_dir 'conf.d' </para> <para> - Available cipher suite details will vary across OpenSSL versions. Use - the command + Available cipher suite details will vary across + <productname>OpenSSL</productname> versions. Use the command <literal>openssl ciphers -v 'HIGH:MEDIUM:+3DES:!aNULL'</literal> to see actual details for the currently installed <application>OpenSSL</application> version. Note that this list is filtered at run time based on the @@ -1337,7 +1338,8 @@ include_dir 'conf.d' </para> <para> - OpenSSL names for the most common curves are: + <productname>OpenSSL</productname> names for the most common curves + are: <literal>prime256v1</literal> (NIST P-256), <literal>secp384r1</literal> (NIST P-384), <literal>secp521r1</literal> (NIST P-521). diff --git a/doc/src/sgml/installation.sgml b/doc/src/sgml/installation.sgml index 552303e2114..b585f224085 100644 --- a/doc/src/sgml/installation.sgml +++ b/doc/src/sgml/installation.sgml @@ -2293,7 +2293,7 @@ ERROR: could not load library "/opt/dbs/pgsql/lib/plperl.so": Bad address <listitem> <para> - OpenSSL is not supported. + <productname>OpenSSL</productname> is not supported. </para> </listitem> diff --git a/doc/src/sgml/libpq.sgml b/doc/src/sgml/libpq.sgml index a397073526f..b50391caee0 100644 --- a/doc/src/sgml/libpq.sgml +++ b/doc/src/sgml/libpq.sgml @@ -812,7 +812,8 @@ int callback_fn(char *buf, int size, PGconn *conn); its path will be in <literal>conn->sslkey</literal> when the callback is invoked. This will be empty if the default key path is being used. For keys that are engine specifiers, it is up to engine implementations - whether they use the OpenSSL password callback or define their own handling. + whether they use the <productname>OpenSSL</productname> password + callback or define their own handling. </para> <para> @@ -1672,13 +1673,15 @@ postgresql://%2Fvar%2Flib%2Fpostgresql/dbname <para> Specifying this parameter with any non-empty value suppresses the <literal>Enter PEM pass phrase:</literal> - prompt that OpenSSL will emit by default when an encrypted client - certificate key is provided to <literal>libpq</literal>. + prompt that <productname>OpenSSL</productname> will emit by default + when an encrypted client certificate key is provided to + <literal>libpq</literal>. </para> <para> - If the key is not encrypted this parameter is ignored. The parameter has no - effect on keys specified by OpenSSL engines unless the engine uses the - OpenSSL password callback mechanism for prompts. + If the key is not encrypted this parameter is ignored. The parameter + has no effect on keys specified by <productname>OpenSSL</productname> + engines unless the engine uses the <productname>OpenSSL</productname> + password callback mechanism for prompts. </para> <para> There is no environment variable equivalent to this option, and no @@ -2471,8 +2474,9 @@ void *PQsslStruct(const PGconn *conn, const char *struct_name); </para> <para> The struct(s) available depend on the SSL implementation in use. - For OpenSSL, there is one struct, available under the name "OpenSSL", - and it returns a pointer to the OpenSSL <literal>SSL</literal> struct. + For <productname>OpenSSL</productname>, there is one struct, + available under the name "OpenSSL", and it returns a pointer to the + <productname>OpenSSL</productname> <literal>SSL</literal> struct. To use this function, code along the following lines could be used: <programlisting><![CDATA[ #include <libpq-fe.h> @@ -2516,8 +2520,9 @@ void *PQgetssl(const PGconn *conn); <para> This function is equivalent to <literal>PQsslStruct(conn, "OpenSSL")</literal>. It should not be used in new applications, because the returned struct is - specific to OpenSSL and will not be available if another SSL - implementation is used. To check if a connection uses SSL, call + specific to <productname>OpenSSL</productname> and will not be + available if another <acronym>SSL</acronym> implementation is used. + To check if a connection uses SSL, call <xref linkend="libpq-PQsslInUse"/> instead, and for more details about the connection, use <xref linkend="libpq-PQsslAttribute"/>. </para> @@ -7665,15 +7670,17 @@ ldap://ldap.acme.com/cn=dbserver,cn=hosts?pgconnectinfo?base?(objectclass=*) <para> The key may be - stored in cleartext or encrypted with a passphrase using any algorithm supported - by OpenSSL, like AES-128. If the key is stored encrypted, then the passphrase - may be provided in the <xref linkend="libpq-connect-sslpassword"/> connection - option. If an encrypted key is supplied and the <literal>sslpassword</literal> - option is absent or blank, a password will be prompted for interactively by - OpenSSL with a <literal>Enter PEM pass phrase:</literal> - prompt if a TTY is available. Applications can override the client certificate - prompt and the handling of the <literal>sslpassword</literal> parameter by supplying - their own key password callback; see + stored in cleartext or encrypted with a passphrase using any algorithm + supported by <productname>OpenSSL</productname>, like AES-128. If the key + is stored encrypted, then the passphrase may be provided in the + <xref linkend="libpq-connect-sslpassword"/> connection option. If an + encrypted key is supplied and the <literal>sslpassword</literal> option + is absent or blank, a password will be prompted for interactively by + <productname>OpenSSL</productname> with a + <literal>Enter PEM pass phrase:</literal> prompt if a TTY is available. + Applications can override the client certificate prompt and the handling + of the <literal>sslpassword</literal> parameter by supplying their own + key password callback; see <xref linkend="libpq-pqsetsslkeypasshook-openssl"/>. </para> @@ -7936,7 +7943,7 @@ void PQinitOpenSSL(int do_ssl, int do_crypto); <para> When <parameter>do_ssl</parameter> is non-zero, <application>libpq</application> - will initialize the <application>OpenSSL</application> library before first + will initialize the <productname>OpenSSL</productname> library before first opening a database connection. When <parameter>do_crypto</parameter> is non-zero, the <literal>libcrypto</literal> library will be initialized. By default (if <xref linkend="libpq-PQinitOpenSSL"/> is not called), both libraries @@ -7945,7 +7952,7 @@ void PQinitOpenSSL(int do_ssl, int do_crypto); </para> <para> - If your application uses and initializes either <application>OpenSSL</application> + If your application uses and initializes either <productname>OpenSSL</productname> or its underlying <literal>libcrypto</literal> library, you <emphasis>must</emphasis> call this function with zeroes for the appropriate parameter(s) before first opening a database connection. Also be sure that you @@ -7967,7 +7974,7 @@ void PQinitSSL(int do_ssl); This function is equivalent to <literal>PQinitOpenSSL(do_ssl, do_ssl)</literal>. It is sufficient for applications that initialize both or neither - of <application>OpenSSL</application> and <literal>libcrypto</literal>. + of <productname>OpenSSL</productname> and <literal>libcrypto</literal>. </para> <para> diff --git a/doc/src/sgml/pgcrypto.sgml b/doc/src/sgml/pgcrypto.sgml index 6fd645aa70a..8748c64e2da 100644 --- a/doc/src/sgml/pgcrypto.sgml +++ b/doc/src/sgml/pgcrypto.sgml @@ -45,8 +45,8 @@ digest(data bytea, type text) returns bytea <literal>sha224</literal>, <literal>sha256</literal>, <literal>sha384</literal> and <literal>sha512</literal>. If <filename>pgcrypto</filename> was built with - OpenSSL, more algorithms are available, as detailed in - <xref linkend="pgcrypto-with-without-openssl"/>. + <productname>OpenSSL</productname>, more algorithms are available, as + detailed in <xref linkend="pgcrypto-with-without-openssl"/>. </para> <para> @@ -1162,9 +1162,10 @@ gen_random_uuid() returns uuid </para> <para> - When compiled with OpenSSL, there will be more algorithms available. - Also public-key encryption functions will be faster as OpenSSL - has more optimized BIGNUM functions. + When compiled with <productname>OpenSSL</productname>, there will be + more algorithms available. Also public-key encryption functions will + be faster as <productname>OpenSSL</productname> has more optimized + BIGNUM functions. </para> <table id="pgcrypto-with-without-openssl"> @@ -1239,7 +1240,8 @@ gen_random_uuid() returns uuid <orderedlist> <listitem> <para> - Any digest algorithm OpenSSL supports is automatically picked up. + Any digest algorithm <productname>OpenSSL</productname> supports + is automatically picked up. This is not possible with ciphers, which need to be supported explicitly. </para> diff --git a/doc/src/sgml/sslinfo.sgml b/doc/src/sgml/sslinfo.sgml index 7d3fcb71670..e16f61b41d7 100644 --- a/doc/src/sgml/sslinfo.sgml +++ b/doc/src/sgml/sslinfo.sgml @@ -173,8 +173,8 @@ <para> This function returns the value of the specified field in the certificate subject, or NULL if the field is not present. - Field names are string constants that are - converted into ASN1 object identifiers using the OpenSSL object + Field names are string constants that are converted into ASN1 object + identifiers using the <productname>OpenSSL</productname> object database. The following values are acceptable: </para> <literallayout class="monospaced"> |