本文主要是介绍openssl3.2/test/certs - 055 - all DNS-like CNs allowed by CA1, no DNS SANs,希望对大家解决编程问题提供一定的参考价值,需要的开发者们随着小编来一起学习吧!
文章目录
- openssl3.2/test/certs - 055 - all DNS-like CNs allowed by CA1, no DNS SANs
- 概述
- 笔记
- END
openssl3.2/test/certs - 055 - all DNS-like CNs allowed by CA1, no DNS SANs
概述
openssl3.2 - 官方demo学习 - test - certs
笔记
/*!
* \file D:\my_dev\my_local_git_prj\study\openSSL\test_certs\055\my_openssl_linux_doc055.txt
* \note openssl3.2/test/certs - 055 - all DNS-like CNs allowed by CA1, no DNS SANs
*/// --------------------------------------------------------------------------------
// official bash script
// --------------------------------------------------------------------------------
#! /bin/bash# \file setup055.sh# openssl3.2/test/certs - 055 - all DNS-like CNs allowed by CA1, no DNS SANs../mkcert.sh req goodcn1-key "O = Good NC Test Certificate 1" \"1.CN=www.good.org" "2.CN=any.good.com" \"3.CN=not..dns" "4.CN=not@dns" "5.CN=not-.dns" "6.CN=not.dns." | \./mkcert.sh geneealt goodcn1-key goodcn1-cert ncca1-key ncca1-cert \"IP = 127.0.0.1" "IP = 192.168.0.1"// --------------------------------------------------------------------------------
// openssl cmd line parse
// --------------------------------------------------------------------------------
// cmd 1
openssl genpkey -algorithm rsa -pkeyopt rsa_keygen_bits:2048 -out goodcn1-key.pem// cmd 3
// cfg_exp055_cmd3.txt
string_mask=utf8only
[req]
prompt = no
distinguished_name = dn
[dn]
O = Good NC Test Certificate 1
1.CN=www.good.org
2.CN=any.good.com
3.CN=not..dns
4.CN=not@dns
5.CN=not-.dns
6.CN=not.dns.openssl req -new -sha256 -key goodcn1-key.pem -config cfg_exp055_cmd3.txt -out req_exp055_cmd3.pem // cmd 2
// cfg_exp055_cmd2.txt
subjectKeyIdentifier = hash
authorityKeyIdentifier = keyid
basicConstraints = CA:falsesubjectAltName = @alts
[alts]
IP = 127.0.0.1
IP = 192.168.0.1openssl x509 -req -sha256 -out goodcn1-cert.pem -extfile cfg_exp055_cmd2.txt -CA ncca1-cert.pem -CAkey ncca1-key.pem -set_serial 2 -days 36525 -in req_exp055_cmd3.pem// --------------------------------------------------------------------------------
// openssl log
// --------------------------------------------------------------------------------openssl genpkey -algorithm rsa -pkeyopt rsa_keygen_bits:2048 -out goodcn1-key.pem
openssl x509 -req -sha256 -out goodcn1-cert.pem -extfile /dev/fd/63 -CA ncca1-cert.pem -CAkey ncca1-key.pem -set_serial 2 -days 36525 -extfile /dev/fd/63 => /home/lostspeed/openssl/openssl-3.2.0_debian/test/certs/my_openssl_linux_log.txtsubjectKeyIdentifier = hash
authorityKeyIdentifier = keyid
basicConstraints = CA:falsesubjectAltName = @alts
[alts]
IP = 127.0.0.1
IP = 192.168.0.1
openssl req -new -sha256 -key goodcn1-key.pem -config /dev/fd/63 -config /dev/fd/63 => /home/lostspeed/openssl/openssl-3.2.0_debian/test/certs/my_openssl_linux_log.txtstring_mask=utf8only
[req]
prompt = no
distinguished_name = dn
[dn]
O = Good NC Test Certificate 1
1.CN=www.good.org
2.CN=any.good.com
3.CN=not..dns
4.CN=not@dns
5.CN=not-.dns
6.CN=not.dns.
END
这篇关于openssl3.2/test/certs - 055 - all DNS-like CNs allowed by CA1, no DNS SANs的文章就介绍到这儿,希望我们推荐的文章对编程师们有所帮助!