~ openssl version -a
OpenSSL 1.0.1 20 Mar 2013
built on: Tue Mar 4 07:26:06 UTC 2014
platform: debian-amd64
options: bn(64,64) rc4(16x,int) des(idx,cisc,16,int) blowfish(idx)
compiler: cc -fPIC -DOPENSSL_PIC -DZLIB -DOPENSSL_THREADS -D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -m64 -DL_ENDIAN -DTERMIO -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Wformat-security -Werror=format-security -D_FORTIFY_SOURCE=2 -Wl,-Bsymbolic-functions -Wl,-z,relro -Wa,--noexecstack -Wall -DOPENSSL_NO_TLS1_2_CLIENT -DOPENSSL_MAX_TLS1_2_CIPHER_LENGTH=50 -DMD32_REG_T=int -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DMD5_ASM -DAES_ASM -DVPAES_ASM -DBSAES_ASM -DWHIRLPOOL_ASM -DGHASH_ASM
OPENSSLDIR: "/usr/lib/ssl"
~ openssl genrsa -out privatekey.pem 1024
~ openssl req -new -key privatekey.pem -out certrequest.csr
~ openssl x509 -req -in certrequest.csr -signkey privatekey.pem -out certificate.pem
分享到:
相关推荐
Considering the complex of the data required by Ministry of Transport of P.R.C every period of ten days, I design the following algorithm to generate the data required.
AN12554 Demo Application to Generate Red/Black Blobs Using CAAM and Encrypt/Decrypt Data
Generate Certificate Signing Reuqest SHA 256 2048 bit,then using this csr ,generate a Enterprise CA Cert
You should ensure that the server's public keys are loaded by the client as described in How to use SFTP (with server validation - known hosts), or you may want to switch off server validation to get ...
介绍如何在VanetMobiSim中产生NS2能够使用的trace file
Use Conversions To Generate More Conversions 234 The Ultimate Guide To A/B Testing 239 Multivariate Testing: 5 Simple Steps to Increase Conversion Rates 246 The Authors 259 Smashing eBook Series ...
perl programming code to generate the minimum spanning tree using kruskal
You will discover how to build an engaging Unreal iOS game, how to generate revenue, and how to optimize game performance using the tools and functionalities the Engine provides. To begin, you will ...
SAP专业教材资料06_howto_generate_bw_author_profile.pdf
This book describes how to ...This book concludes with showing the reader how to generate a smart application from unstructured knowledge using the NLP framework Stanford POS (part of speech) tagger.
You can generate plots, add dimensions to the plots, and also make the plots interactive with just a few lines of code with matplotlib. Also, matplotlib integrates well with all common GUI modules. ...
This is the first book to describe the recent significant changes to the .NET compilation process and demonstrate how .NET developers can use the new Compiler API to create compelling applications....
This is the first book to describe the recent significant changes to the .NET compilation process and demonstrate how .NET developers can use the new Compiler API to create compelling applications....
data from multiple tables, how to organize the data, and how to generate the summary data by grouping or pivoting it. Finally, this chapter covers the purpose of the CTE and SQL Server 2014 ...
Chapter 5, Creating Shellcode, explains how to build a shellcode using the assembly language and Metasploit. Chapter 6, Buffer Overflow Attacks, provides a detailed understanding of buffer overflow ...
This application note describes how to generate a Pulse Width Modulation (PWM) signal, tunable in frequency and duty cycles, by using the AT91 Timer/Counter (TC).
Using the Eclipse IDE to streamline developing native applications How to use Java Native Interface (JNI) to connect native code to Java world. Auto-generate JNI code using Simplified Wrapper and ...
The book will help you understand how to build recommender systems using R. It starts off by explaining the basics of data mining and machine learning. Next, you will be familiarized with how to build...