Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
OpenHarmony
Third Party Openssl
提交
1675f6eb
T
Third Party Openssl
项目概览
OpenHarmony
/
Third Party Openssl
1 年多 前同步成功
通知
10
Star
18
Fork
1
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
T
Third Party Openssl
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
提交
1675f6eb
编写于
1月 24, 2000
作者:
R
Richard Levitte
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
Let's make all the example formated the same, shall we?
上级
8548d442
变更
5
隐藏空白更改
内联
并排
Showing
5 changed file
with
42 addition
and
39 deletion
+42
-39
doc/apps/ca.pod
doc/apps/ca.pod
+4
-4
doc/apps/dsa.pod
doc/apps/dsa.pod
+5
-5
doc/apps/rsa.pod
doc/apps/rsa.pod
+5
-5
doc/apps/smime.pod
doc/apps/smime.pod
+16
-13
doc/apps/x509.pod
doc/apps/x509.pod
+12
-12
未找到文件。
doc/apps/ca.pod
浏览文件 @
1675f6eb
...
...
@@ -334,19 +334,19 @@ demoCA/index.txt.
Sign a certificate request:
openssl ca -in req.pem -out newcert.pem
openssl ca -in req.pem -out newcert.pem
Generate a CRL
openssl ca -gencrl -out crl.pem
openssl ca -gencrl -out crl.pem
Sign several requests:
openssl ca -infiles req1.pem req2.pem req3.pem
openssl ca -infiles req1.pem req2.pem req3.pem
Certify a Netscape SPKAC:
openssl ca -spkac spkac.txt
openssl ca -spkac spkac.txt
A sample SPKAC file (the SPKAC line has been truncated for clarity):
...
...
doc/apps/dsa.pod
浏览文件 @
1675f6eb
...
...
@@ -129,23 +129,23 @@ The PEM private key format uses the header and footer lines:
To remove the pass phrase on a DSA private key:
C<openssl dsa -in key.pem -out keyout.pem>
openssl dsa -in key.pem -out keyout.pem
To encrypt a private key using triple DES:
C<openssl dsa -in key.pem -des3 -out keyout.pem>
openssl dsa -in key.pem -des3 -out keyout.pem
To convert a private key from PEM to DER format:
C<openssl dsa -in key.pem -outform DER -out keyout.der>
openssl dsa -in key.pem -outform DER -out keyout.der
To print out the components of a private key to standard output:
C<openssl dsa -in key.pem -text -noout>
openssl dsa -in key.pem -text -noout
To just output the public part of a private key:
C<openssl dsa -in key.pem -pubout -out pubkey.pem>
openssl dsa -in key.pem -pubout -out pubkey.pem
=head1 SEE ALSO
...
...
doc/apps/rsa.pod
浏览文件 @
1675f6eb
...
...
@@ -135,23 +135,23 @@ The PEM private key format uses the header and footer lines:
To remove the pass phrase on an RSA private key:
C<openssl rsa -in key.pem -out keyout.pem>
openssl rsa -in key.pem -out keyout.pem
To encrypt a private key using triple DES:
C<openssl rsa -in key.pem -des3 -out keyout.pem>
openssl rsa -in key.pem -des3 -out keyout.pem
To convert a private key from PEM to DER format:
C<openssl rsa -in key.pem -outform DER -out keyout.der>
openssl rsa -in key.pem -outform DER -out keyout.der
To print out the components of a private key to standard output:
C<openssl rsa -in key.pem -text -noout>
openssl rsa -in key.pem -text -noout
To just output the public part of a private key:
C<openssl rsa -in key.pem -pubout -out pubkey.pem>
openssl rsa -in key.pem -pubout -out pubkey.pem
=head1 SEE ALSO
...
...
doc/apps/smime.pod
浏览文件 @
1675f6eb
...
...
@@ -248,24 +248,25 @@ the signers certificates.
Create a cleartext signed message:
openssl smime -sign -in message.txt -text -out mail.msg
-signer mycert.pem
openssl smime -sign -in message.txt -text -out mail.msg
\
-signer mycert.pem
Create and opaque signed message
openssl smime -sign -in message.txt -text -out mail.msg -nodetach
-signer mycert.pem
openssl smime -sign -in message.txt -text -out mail.msg -nodetach
\
-signer mycert.pem
Create a signed message, include some additional certificates and
read the private key from another file:
openssl smime -sign -in in.txt -text -out mail.msg
-signer mycert.pem -inkey mykey.pem -certfile mycerts.pem
openssl smime -sign -in in.txt -text -out mail.msg
\
-signer mycert.pem -inkey mykey.pem -certfile mycerts.pem
Send a signed message under Unix directly to sendmail, including headers:
openssl smime -sign -in in.txt -text -signer mycert.pem -from steve@openssl.org
-to someone@somewhere -subject "Signed message" | sendmail someone@somewhere
openssl smime -sign -in in.txt -text -signer mycert.pem \
-from steve@openssl.org -to someone@somewhere \
-subject "Signed message" | sendmail someone@somewhere
Verify a message and extract the signer's certificate if successful:
...
...
@@ -273,14 +274,16 @@ Verify a message and extract the signer's certificate if successful:
Send encrypted mail using triple DES:
openssl smime -encrypt -in in.txt -from steve@openssl.org -to someone@somewhere
-subject "Encrypted message" -des3 user.pem -out mail.msg
openssl smime -encrypt -in in.txt -from steve@openssl.org \
-to someone@somewhere -subject "Encrypted message" \
-des3 user.pem -out mail.msg
Sign and encrypt mail:
openssl smime -sign -in ml.txt -signer my.pem -text | openssl -encrypt -out mail.msg
-from steve@openssl.org -to someone@somewhere -subject "Signed and Encrypted message"
-des3 user.pem
openssl smime -sign -in ml.txt -signer my.pem -text \
| openssl -encrypt -out mail.msg \
-from steve@openssl.org -to someone@somewhere \
-subject "Signed and Encrypted message" -des3 user.pem
Note: the encryption command does not include the B<-text> option because the message
being encrypted already has MIME headers.
...
...
doc/apps/x509.pod
浏览文件 @
1675f6eb
...
...
@@ -336,46 +336,46 @@ line.
Display the contents of a certificate:
openssl x509 -in cert.pem -noout -text
openssl x509 -in cert.pem -noout -text
Display the certificate serial number:
openssl x509 -in cert.pem -noout -serial
openssl x509 -in cert.pem -noout -serial
Display the certificate MD5 fingerprint:
openssl x509 -in cert.pem -noout -fingerprint
openssl x509 -in cert.pem -noout -fingerprint
Display the certificate SHA1 fingerprint:
openssl x509 -sha1 -in cert.pem -noout -fingerprint
openssl x509 -sha1 -in cert.pem -noout -fingerprint
Convert a certificate from PEM to DER format:
openssl x509 -in cert.pem -inform PEM -out cert.der -outform DER
openssl x509 -in cert.pem -inform PEM -out cert.der -outform DER
Convert a certificate to a certificate request:
openssl x509 -x509toreq -in cert.pem -out req.pem -signkey key.pem
openssl x509 -x509toreq -in cert.pem -out req.pem -signkey key.pem
Convert a certificate request into a self signed certificate using
extensions for a CA:
openssl x509 -req -in careq.pem -config openssl.cnf -extensions v3_ca \
-signkey key.pem -out cacert.pem
openssl x509 -req -in careq.pem -config openssl.cnf -extensions v3_ca \
-signkey key.pem -out cacert.pem
Sign a certificate request using the CA certificate above and add user
certificate extensions:
openssl x509 -req -in req.pem -config openssl.cnf -extensions v3_usr \
-CA cacert.pem -CAkey key.pem -CAcreateserial
openssl x509 -req -in req.pem -config openssl.cnf -extensions v3_usr \
-CA cacert.pem -CAkey key.pem -CAcreateserial
Set a certificate to be trusted for SSL client use and change set its alias to
"Steve's Class 1 CA"
openssl x509 -in cert.pem -addtrust sslclient \
-alias "Steve's Class 1 CA" -out trust.pem
openssl x509 -in cert.pem -addtrust sslclient \
-alias "Steve's Class 1 CA" -out trust.pem
=head1 NOTES
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录