Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
OpenHarmony
Third Party Openssl
提交
1675f6eb
T
Third Party Openssl
项目概览
OpenHarmony
/
Third Party Openssl
1 年多 前同步成功
通知
10
Star
18
Fork
1
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
T
Third Party Openssl
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
提交
1675f6eb
编写于
1月 24, 2000
作者:
R
Richard Levitte
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
Let's make all the example formated the same, shall we?
上级
8548d442
变更
4
显示空白变更内容
内联
并排
Showing
4 changed file
with
30 addition
and
27 deletion
+30
-27
doc/apps/ca.pod
doc/apps/ca.pod
+4
-4
doc/apps/dsa.pod
doc/apps/dsa.pod
+5
-5
doc/apps/rsa.pod
doc/apps/rsa.pod
+5
-5
doc/apps/smime.pod
doc/apps/smime.pod
+16
-13
未找到文件。
doc/apps/ca.pod
浏览文件 @
1675f6eb
...
...
@@ -334,19 +334,19 @@ demoCA/index.txt.
Sign a certificate request:
openssl ca -in req.pem -out newcert.pem
openssl ca -in req.pem -out newcert.pem
Generate a CRL
openssl ca -gencrl -out crl.pem
openssl ca -gencrl -out crl.pem
Sign several requests:
openssl ca -infiles req1.pem req2.pem req3.pem
openssl ca -infiles req1.pem req2.pem req3.pem
Certify a Netscape SPKAC:
openssl ca -spkac spkac.txt
openssl ca -spkac spkac.txt
A sample SPKAC file (the SPKAC line has been truncated for clarity):
...
...
doc/apps/dsa.pod
浏览文件 @
1675f6eb
...
...
@@ -129,23 +129,23 @@ The PEM private key format uses the header and footer lines:
To remove the pass phrase on a DSA private key:
C<openssl dsa -in key.pem -out keyout.pem>
openssl dsa -in key.pem -out keyout.pem
To encrypt a private key using triple DES:
C<openssl dsa -in key.pem -des3 -out keyout.pem>
openssl dsa -in key.pem -des3 -out keyout.pem
To convert a private key from PEM to DER format:
C<openssl dsa -in key.pem -outform DER -out keyout.der>
openssl dsa -in key.pem -outform DER -out keyout.der
To print out the components of a private key to standard output:
C<openssl dsa -in key.pem -text -noout>
openssl dsa -in key.pem -text -noout
To just output the public part of a private key:
C<openssl dsa -in key.pem -pubout -out pubkey.pem>
openssl dsa -in key.pem -pubout -out pubkey.pem
=head1 SEE ALSO
...
...
doc/apps/rsa.pod
浏览文件 @
1675f6eb
...
...
@@ -135,23 +135,23 @@ The PEM private key format uses the header and footer lines:
To remove the pass phrase on an RSA private key:
C<openssl rsa -in key.pem -out keyout.pem>
openssl rsa -in key.pem -out keyout.pem
To encrypt a private key using triple DES:
C<openssl rsa -in key.pem -des3 -out keyout.pem>
openssl rsa -in key.pem -des3 -out keyout.pem
To convert a private key from PEM to DER format:
C<openssl rsa -in key.pem -outform DER -out keyout.der>
openssl rsa -in key.pem -outform DER -out keyout.der
To print out the components of a private key to standard output:
C<openssl rsa -in key.pem -text -noout>
openssl rsa -in key.pem -text -noout
To just output the public part of a private key:
C<openssl rsa -in key.pem -pubout -out pubkey.pem>
openssl rsa -in key.pem -pubout -out pubkey.pem
=head1 SEE ALSO
...
...
doc/apps/smime.pod
浏览文件 @
1675f6eb
...
...
@@ -248,24 +248,25 @@ the signers certificates.
Create a cleartext signed message:
openssl smime -sign -in message.txt -text -out mail.msg
openssl smime -sign -in message.txt -text -out mail.msg
\
-signer mycert.pem
Create and opaque signed message
openssl smime -sign -in message.txt -text -out mail.msg -nodetach
openssl smime -sign -in message.txt -text -out mail.msg -nodetach
\
-signer mycert.pem
Create a signed message, include some additional certificates and
read the private key from another file:
openssl smime -sign -in in.txt -text -out mail.msg
openssl smime -sign -in in.txt -text -out mail.msg
\
-signer mycert.pem -inkey mykey.pem -certfile mycerts.pem
Send a signed message under Unix directly to sendmail, including headers:
openssl smime -sign -in in.txt -text -signer mycert.pem -from steve@openssl.org
-to someone@somewhere -subject "Signed message" | sendmail someone@somewhere
openssl smime -sign -in in.txt -text -signer mycert.pem \
-from steve@openssl.org -to someone@somewhere \
-subject "Signed message" | sendmail someone@somewhere
Verify a message and extract the signer's certificate if successful:
...
...
@@ -273,14 +274,16 @@ Verify a message and extract the signer's certificate if successful:
Send encrypted mail using triple DES:
openssl smime -encrypt -in in.txt -from steve@openssl.org -to someone@somewhere
-subject "Encrypted message" -des3 user.pem -out mail.msg
openssl smime -encrypt -in in.txt -from steve@openssl.org \
-to someone@somewhere -subject "Encrypted message" \
-des3 user.pem -out mail.msg
Sign and encrypt mail:
openssl smime -sign -in ml.txt -signer my.pem -text | openssl -encrypt -out mail.msg
-from steve@openssl.org -to someone@somewhere -subject "Signed and Encrypted message"
-des3 user.pem
openssl smime -sign -in ml.txt -signer my.pem -text \
| openssl -encrypt -out mail.msg \
-from steve@openssl.org -to someone@somewhere \
-subject "Signed and Encrypted message" -des3 user.pem
Note: the encryption command does not include the B<-text> option because the message
being encrypted already has MIME headers.
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录