Http://velocity.apache.org/engine/releases/velocity-1.5/vtl-reference-guide.htmlAbout this Guide
This guide is the reference for the velocity template language (VTL). For more information, please also refer to the velocity user guide. Referencesvariables
Notation:
$[!] [{] [A. Z,A. Z] [A. Z,A. Z,0 .. 9,-,_] [}]
Examples:
Shorthand notation:
$ Mud-Slinger_9
Silent shorthand no
Certificate formats-X.509, der and PEMPart: 1 2 3Certificate standard and File encodings seem to be confusing. I wrote down some notes about:
What is X.509 certificate standard?
PEM (privacy enhanced mail) Encoding
Der (distinguished encoding rules) Encoding
"Keytool" exporting certificates in der and PEM
"OpenSSL" verifying "keytool" Certificates
"OpenSSL" generating cert
Http://www.rainsts.net/article.asp? Id = 179
Most security-related fields use X.509 certificates to ensure the security of data interaction.The followingCodeDemonstrate how to use the X.509 Certificate for encryption and decryption.
First, use markcert.exe to create a test certificate.
C: \> makecert-r-pe-n "cn = rainsoft"-SS my
Create a digital certificate titled "rainsoft" that contains the pri
Certificate Overview The X.509 standard specifies what information a certificate can contain and describes the method (data format) for recording information ). In addition to signatures, all X.509 certificates also contain the following data:
Version Identifies the X.509 standard version used for the certificate, which affects the information that can be specif
After the certificate with the X.509 structure is revoked, the serial number will appear in the Certificate Revocation List (CRL). We can save it as one. CRL file, you can view the information of the revoked certificate,. net Framework does not provide classes that can access the attributes of CRL (x509crl is provided in Java). To implement such a function, we need to use. net Framework: Bouncy castle crypto or mono SDK.
First, we will introduce how
In the previous article, we talked about common authentication methods: User Name/password authentication and Windows authentication. In the next article, we will introduce another important credential type: X.509 Certificate and the authentication method for X.509 Certificate. However, in order to allow readers to fully understand X.509 certificates, we need to
Fixed the X.509 digital certificate BUG in Linux 4.3.2 maintenance edition.
Just one day after the first linux 4.3 kernel maintenance version was updated, the famous kernel maintainer Greg Kroah-Harman published detailed information about the 4.3.2 maintenance version.
According to his announcement, Linux kernel 4.3.2 fixes the digital verification Bug of X.509 certificates. Therefore, it seems unnecess
Those related to certificates (SSL,X.509,PEM,DER,CRT,CER,KEY,CSR,P12, etc.) [ZZ]Reprinted From:http://www.cnblogs.com/guogangj/p/4118605.htmlThese concepts related to certificates are really tricky because they haven't been exposed to certificate encryption before, because there's a whole new term coming up that looks like something else in another field, not something that we're familiar with in the programming world, at least I personally feel, And
Error description: Use Jbuilderx to compile the project, run no problem, debug debug error. Remember the last few days are good ah. Strange. ~..
Tortured me for several days. The error is as follows.
Error behavior:
--Cannot start Java debug process VM--Com.sun.jdi.connect.VMStartException:VM initialization failed For:c:/jbuilderx/jdk1.4/bin/javaw-classpath "c:/ Jbuilderx/thirdparty/jakarta-tomcat-4.0.6-le-jdk14/bin/bootstrap.jar; C:/jbuilderx/jdk1.4/lib/tools.jar "-dcatalina.home=" c:/jbuild
Explanation of X.509 Certificate DN December 4 th, 2008
BySoloman || 823 views
X.509 uses the DN (distinct name) to uniquely identify an object. Its function is similar to the ID we usually use. However, the difference is that the DN is no longer a digital identifier similar to 123456, multiple fields are used to identify an object, such as "cn =, c = cn". The advantage of this is that it is convenient to
Self-Signed X.509 digital certificate generation and Verification
Self-Signed X.509 digital certificate generation and Verification
Digital Certificates are used to mark the identity of network users. In Web applications, digital certificates are widely used, such as secure email, secure website access, Secure Electronic Transaction Processing, and secure electronic transactions.
The format of digital cer
Prepare an X.509 Certificate
First, download openssl. my name is win32openssl-0_9_8d.exe. After installation, configure the environment variables, which is the same as the JDK configuration.Next, create x.509.Color identifier: this color indicates what you want to enterStep 1: create a private key (enter the command here)C: \ OpenSSL \ apps> OpenSSL genrsa-out root/root-key.pem 1024Loading 'screen' into ran
The certificate is reported by CurrentUser.
The X.509 certificate cannot be found using the following search criteria:StoreName "My", StoreLocation "CurrentUser", FindType "FindBySubjectName", FindValue "WCFServerCertificate ".
The reason is: IIS7's default account is Network Service and may not have access to the certificate private key in the Store.
Solution:
1. Add "Certificate-current user" and "Certificate (Local Computer)" to the "certificat
I recently configured a WCF X.509 Certificate for verification. I want to implement SSL encryption on the server. Then, when the client calls the service, I need to present my digital certificate to prove that I am a legal user.The configuration process is very troublesome, not as described in the book. I have summarized the following notes:In IIS, for a WCF Service site with a server certificate, you can require SSL connections and 128-bit encryption
The OpenSSL tool was planted on the OpenSSL, and after configuring the environment variable, execute the following command:
Create a root certificate and sign it with a self-signed signature
Create private key
OpenSSL genrsa-out Root/root-key.pem 102
inconsistent with the virtual tape library version? Uninstall the original version 4.5 and install the virtual tape library version 5.0. Everything is normal.
In summary, this virtual tape library requires the client software version to be consistent with its server version.
2. installation process of virtual tape library: 1. create virtul tape library.
Detailed procedure of virtual tape library configuration 1. standard VTL configuration in the sta
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.