Skip to content
Snippets Groups Projects
Commit 13531ae8 authored by ovari's avatar ovari Committed by Adrien Béraud
Browse files

extension/jami-extension-certificate.md: cleanup

Change-Id: Iab3a54941daf230e85daa06f4150ce343d3785a7
parent 05704273
No related branches found
No related tags found
No related merge requests found
# Jami extension certificates
**NOTE: This page describes the architecture of certificates on the Jami Extension Store.**
```{note}
This page describes the architecture of certificates on the Jami Extension Store.
```
The Jami team introduced extensions as a call/chat feature for GNU/Linux, Windows, macOS, and Android, providing users the ability to personalize the call/chat experience.
To learn more about Jami extensions, visit the [Extension manual](./extension.md).
To learn more about Jami extensions, visit the [Extension manual](index).
The Jami team implemented a Jami Extension Store to be able to distribute extensions from the Jami team and from third parties.
A certificate mechanism is required to ensure trust in the Jami team and third-party extensions.
Certificates play a crucial role in verifying the authenticity of extensions available on the Jami Extension Store.
......@@ -84,19 +86,19 @@ The certificate chain is the following: Store Root CA `→` Organization Certifi
The root certificate structure is:
```bash
Certificate:
tbsCertificate:
version: 2
serialNumber: <generate-by-design>
signature: AlgorithmIdentifier { algorithm: sha512WithRSAEncryption }
issuer: Name { commonName: "Store Root CA" }
validity:
notBefore: Time { utcTime: "20220101000000Z" }
notAfter: Time { utcTime: "20520101000000Z" }
subject: Name { commonName: "Store Root CA" }
subjectPublicKeyInfo:
algorithm: AlgorithmIdentifier { algorithm: id-ecdsa-with-shake256 }
subjectPublicKey: BIT STRING (ECDSA-256 public key)
Certificate:
tbsCertificate:
version: 2
serialNumber: <generate-by-design>
signature: AlgorithmIdentifier { algorithm: sha512WithRSAEncryption }
issuer: Name { commonName: "Store Root CA" }
validity:
notBefore: Time { utcTime: "20220101000000Z" }
notAfter: Time { utcTime: "20520101000000Z" }
subject: Name { commonName: "Store Root CA" }
subjectPublicKeyInfo:
algorithm: AlgorithmIdentifier { algorithm: id-ecdsa-with-shake256 }
subjectPublicKey: BIT STRING (ECDSA-256 public key)
```
This structure is based on [RFC standard certificate v3](https://www.ietf.org/rfc/rfc2459.txt).
......@@ -251,4 +253,4 @@ python3 ./certKey.py revoke --crl /tmp/bar --subject /tmp/foo --issuer /tmp/bar
```bash
python3 ./certKey.py --plugin verify --path /tmp/foo
```
```
\ No newline at end of file
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment