Directory
• Introduction
• Compile
• Run openssl.exe
• Algorithm Programming API
•Introduction
OpenSSL is a widely used open-source SSL implementation. Because various encryption algorithms are implemented for SSL, OpenSSL is also a widely used
OpenSSLUser Guide
Directory
• Introduction
• Compile
• Run openssl.exe
• Algorithm Programming API
4.1 symmetric algorithms
4.1.1 des
4.1.2 A es
4.1.3 RC4
4.1.4 EVP _
4.2 Public Key Algorithm
4.3 Hash Algorithm
4.4 random number Algorithm
• SSL
Let's introduce the next three encryption methods:
Symmetric encryption
Public Key Cryptography
One-way encryption
Symmetric encryptionImplementation Tool OpenSSL ENC introduction[[email protected] sh]# man encenc -
Introduction to OpenSSL
OpenSSL is a rich and self-contained open-source security toolbox. It provides the following main functions: SSL protocol implementation (including SSLv2, SSLv3 and tlsv1), a large number of soft algorithms
Background
Due to the heart of openssl recently, I changed the ssl library 1.0.1g. I need to use this library to connect to the server. However, after I find that the Library is replaced, for some domain names, the ssl handshake will fail. In order
OpenSSL source code mainly consists of the eay library, SSL library, tool source code, sample source code, and test source code.The eay library is a basic library function and provides many functions. The source code is stored in the crypto
I. Overview SSLSSL (Secure Socket Layer) Secure Socket Layer. In the early days, netscape wanted various protocols working at the application Layer to implement data security during data transmission, the half-layer structure introduced between the
Note:Through the author's blog "working principle of the FTP server and how to log on to a virtual user through PAM Authentication", we learned that FTP is a file sharing protocol and uses a plaintext transmission mechanism, therefore, users and
First, overview SSL
SSL (Secure Socket Layer) Secure Sockets Layer, early Netscape wanted to make the various protocols in the application layer to the purpose of data security for data transmission, a half layer structure was introduced between
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.