標籤:
一、簡介
訊息摘要可以對任意長度的訊息產生固定長度(16或20個位元組)的資訊摘要,理論基於單向HASH函數,根據訊息摘要無法恢複出原文,所以是安全的;訊息原文和訊息摘要是一一對應的,所以又被稱作指紋。
二、文法
openssl dgst[-md5|-md4|-md2|-sha1|-sha|-mdc2|-ripemd160|-dss1] [-c] [-d] [-hex] [-binary] [-out filename] [-sign filename] [-keyform arg] [-passin arg] [-verify filename] [-prverify filename] [-signature filename] [-hmac key] [file...]
選項
-c to output the digest with separating colons-r to output the digest in coreutils format-d to output debug info-hex output as hex dump-binary output in binary form-sign file sign digest using private key in file-verify file verify a signature using public key in file-prverify file verify a signature using private key in file-keyform arg key file format (PEM or ENGINE)-out filename output to filename rather than stdout-signature file signature to verify-sigopt nm:v signature parameter-hmac key create hashed MAC with key-mac algorithm create MAC (not neccessarily HMAC)-macopt nm:v MAC algorithm parameters or key-engine e use engine e, possibly a hardware device.-md4 to use the md4 message digest algorithm-md5 to use the md5 message digest algorithm-ripemd160 to use the ripemd160 message digest algorithm-sha to use the sha message digest algorithm-sha1 to use the sha1 message digest algorithm-sha224 to use the sha224 message digest algorithm-sha256 to use the sha256 message digest algorithm-sha384 to use the sha384 message digest algorithm-sha512 to use the sha512 message digest algorithm-whirlpool to use the whirlpool message digest algorithm
三、執行個體
1、對檔案進行訊息摘要
openssl dgst -md5 test.txt
2、用私密金鑰對訊息摘要進行簽名,並用公開金鑰進行驗簽
openssl dgst -md5 -sign prikey.pem -out sign.binary test.txt openssl dgst -md5 -verify pubkey.pem -signature sign.binary test.txt
3、訊息認證碼
openssl dgst -md5 -hmac "123456" test.txt
參考:http://blog.csdn.net/fym0121/article/details/7982620
Openssl dgst命令