OpenSSL promises to inform developers of sandbags in advance when a problem occurs.
In view of the recent hetbleed vulnerability, the OpenSSL Project decided that the Linux and Unix operating system publishers who use the popular OpenSSL encryption
Using OpenSSL utilities
An OpenSSL command line takes the following form:
openssl utility arguments
For example:
openssl x509 -in OrbixCA -text
Each Command is individually described in this Appendix. To get a list of the arguments
Original
introduction of OpenSSL
OpenSSL is currently the most popular SSL password library tool, it provides a universal, robust, full-featured tool suite to support the implementation of the SSL/TLS protocol.Official website: https://www.openssl.
I. Introduction of OpenSSL
OpenSSL is currently the most popular SSL cipher library tool that provides a common, robust, and fully functional suite of tools to support the implementation of the SSL/TLS protocol.Official website:
The OpenSSL Certificate Action command generates a self signed certificate# Generate a key, your private key, OpenSSL will prompt you to enter a password, you can enter, you can not lose,# Enter the words, each time you use this key to enter the
OpenSSL genrsa-out server.key 1024 (no password required)OpenSSL Req-new-key server.key-out SERVER.CSRCat SERVER.CSRPaste the above text into http://dc2.sankuai.info/certsrv/request Advanced Certificate request---->web Server certificate, OK,
Document directory
Apply for Certificate
View certificates
Test Certificate
Calculate MD5 and SHA1
Apply for Certificate
SSL is often used in authentication, data encryption, and other applications. To use SSL, we have our own password
1. Overview of Asymmetric encryption algorithmsAsymmetric encryption algorithm is also called Public key algorithm, which solves the problem of symmetric encryption algorithm key distribution, the basic features of asymmetric encryption algorithm
OpenSSL req is used to generate a certificate request for a third party authority CA to issue and generate the certificate we need. The Req command can also invoke the X509 command for format conversion and display information such as Text,modulus
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.