OpenSSL is an open source SSL implementation. The simplest and most important application based on the OpenSSL directive is to use Req, CAs, and X509 to issue a certificate.OpenSSL provides command-line options and interactive two ways to perform
Please be sure to install the openssl-0.9.8a. openssl-1.0.0 I did not compile successfully.How to compile OpenSSL under Windows (Vs2005 using Vc8 's CL compiler)1, when installing activeperl//initialization, need to use the Perl interpreter2. Use
Using OpenSSL utilities
An OpenSSL command line takes the following form:
openssl utility arguments
For example:
openssl x509 -in OrbixCA -text
Each Command is individually described in this Appendix. To get a list of the arguments
Original
introduction of OpenSSL
OpenSSL is currently the most popular SSL password library tool, it provides a universal, robust, full-featured tool suite to support the implementation of the SSL/TLS protocol.Official website: https://www.openssl.
OpenSSL symmetric encryption algorithm commands
1. symmetric encryption algorithm Overview
The openssl Encryption Algorithm Library provides a wide range of symmetric encryption algorithms. We can use the symmetric encryption algorithm commands
I. Introduction of OpenSSL
OpenSSL is currently the most popular SSL cipher library tool that provides a common, robust, and fully functional suite of tools to support the implementation of the SSL/TLS protocol.Official website:
To generate a certificate in OpenSSL, follow these steps:1. generate an RSA private key file and generate a certificate application for this private key file.First, you must enter a password to encrypt the RSA private key file and ask the user to
1. Overview of symmetric encryption algorithmsOpenSSL's cryptographic algorithm library provides a rich symmetric encryption algorithm that can be used in the form of symmetric cryptographic algorithm directives provided by OpenSSL, or by invoking
1. Overview of Asymmetric encryption algorithmsAsymmetric encryption algorithm is also called Public key algorithm, which solves the problem of symmetric encryption algorithm key distribution, the basic features of asymmetric encryption algorithm
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.