亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? openssl.cnf

?? Perl寫的CA認證程序
?? CNF
字號:
## OpenSSL example configuration file.# This is mostly being used for generation of certificate requests.## This definition stops the following lines choking if HOME isn't# defined.HOME                    = .RANDFILE                = $ENV::HOME/.rnd# Extra OBJECT IDENTIFIER info:#oid_file               = $ENV::HOME/.oidoid_section             = new_oids# To use this configuration file with the "-extfile" option of the# "openssl x509" utility, name here the section containing the# X.509v3 extensions to use:# extensions            =# (Alternatively, use a configuration file that has only# X.509v3 extensions in its main [= default] section.)[ new_oids ]# We can add new OIDs in here for use by 'ca' and 'req'.# Add a simple OID like this:# testoid1=1.2.3.4# Or use config file substitution like this:# testoid2=${testoid1}.5.6####################################################################[ ca ]default_ca	= CA_default		# The default ca section####################################################################[ CA_default ]dir		= /usr/local/OpenCA	# Where everything is keptcerts		= $dir/certs/issued	# Where the issued certs are keptcrl_dir		= $dir/crl		# Where the issued crl are keptdatabase	= $dir/stuff/index.txt	# database index file.new_certs_dir	= $dir/outbound/certs	# default place for new certs.certificate	= $dir/stuff/cacert.pem	# The CA certificateserial		= $dir/stuff/serial	# The current serial numbercrl		= $dir/stuff/crl.pem	# The current CRLprivate_key	= $dir/private/cakey.pem# The private keyRANDFILE	= $dir/private/.rand	# private random number fileoid_file	= $dir/private/.oidx509_extensions	= user_cert		# The extentions to add to the cert#crl_extensions	= crl_ext		# Extensions to add to CRL                                        # As Netscape only accepts CLRs V1,					# DON't use CRL's extensions					# at least if you are uning Netscape					# 4.5(-).default_days	= 365			# how long to certify fordefault_crl_days= 7			# how long before next CRLdefault_md	= md5			# which md to use.preserve	= yes			# keep passed DN ordering# A few difference way of specifying how similar the request should look# For type CA, the listed attributes must be the same, and the optional# and supplied fields are just that :-)policy		= policy_match# For the CA policy[ policy_match ]countryName		= suppliedorganizationName	= suppliedorganizationalUnitName	= optionalcommonName		= optionalemailAddress		= optional# For the 'anything' policy# At this point in time, you must list all acceptable 'object'# types.[ policy_anything ]countryName		= supplied## stateOrProvinceName	= optional## localityName		= optionalorganizationName	= suppliedorganizationalUnitName	= optionalcommonName		= suppliedemailAddress		= optional####################################################################[ req ]default_bits		= 1024default_keyfile 	= privkey.pemdistinguished_name	= req_distinguished_nameattributes		= req_attributesx509_extensions		= v3_ca	                  # The extentions to						  # add to the self signed						  # cert[ req_distinguished_name ]emailAddress			= Email AddressemailAddress_max		= 40commonName			= Common Name (eg, YOUR name)commonName_max			= 64organizationalUnitName		= Organizational Unit Name (eg, section)#organizationalUnitName_default	= OpenCA User0.organizationName		= Organization Name (eg, company)0.organizationName_default	= OpenCAcountryName			= Country Name (2 letter code)countryName_default		= ITcountryName_min			= 2countryName_max			= 2## stateOrProvinceName		= State or Province Name (full name)## stateOrProvinceName_default	= Some-State## localityName			= Locality Name (eg, city)# we can do this but it is not needed normally :-)#1.organizationName		= Second Organization Name (eg, company)#1.organizationName_default	= World Wide Web Pty LtdSET-ex3				= SET extension number 3[ req_attributes ]## challengePassword		= A challenge password## challengePassword_min	= 4## challengePassword_max	= 20## unstructuredName		= An optional company name#################################################################[ user_cert ]# These extensions are added when 'ca' signs a request.# This goes against PKIX guidelines but some CAs do it and some software# requires this to avoid interpreting an end user certificate as a CA.basicConstraints=CA:FALSE# Here are some examples of the usage of nsCertType. If it is omitted# the certificate can be used for anything *except* object signing.# For an object signing certificate this would be used.#nsCertType = objsign# For normal client use this is typicalnsCertType = client, email# This is typical alsokeyUsage = nonRepudiation, digitalSignature, keyEnciphermentnsComment		= "OpenCA User Certificate"# PKIX recommendationssubjectKeyIdentifier=hashauthorityKeyIdentifier=keyid,issuer:always# Import the email address.subjectAltName=email:copy# Copy subject detailsissuerAltName=issuer:copynsCaRevocationUrl	= https://www.openca.org/cgi-bin/getcrl#nsBaseUrlnsRevocationUrl		= https://www.openca.org/cgi-bin/getcrlnsRenewalUrl		= https://www.openca.org:4443/renewal#nsCaPolicyUrl#nsSslServerName#################################################################[ v3_ca]# Extensions for a typical CA# It's a CA certificatebasicConstraints = CA:true# PKIX recommendation.subjectKeyIdentifier=hashauthorityKeyIdentifier=keyid:always,issuer:always# This is what PKIX recommends but some broken software chokes on critical# extensions.#basicConstraints = critical,CA:true# Key usage: again this should really be critical.keyUsage = cRLSign, keyCertSign# Some might want this also#nsCertType = sslCA, emailCA# Include email address in subject alt name: another PKIX recommendationsubjectAltName=email:copy# Copy issuer detailsissuerAltName=issuer:copy# RAW DER hex encoding of an extension: beware experts only!# 1.2.3.5=RAW:02:03# You can even override a supported extension:# basicConstraints= critical, RAW:30:03:01:01:FF#################################################################[ server_cert ]# These extensions are added when 'ca' signs a request.# This goes against PKIX guidelines but some CAs do it and some software# requires this to avoid interpreting an end user certificate as a CA.basicConstraints=CA:FALSE# Here are some examples of the usage of nsCertType. If it is omitted# the certificate can be used for anything *except* object signing.# This is OK for an SSL server.nsCertType			= server# This is typical alsokeyUsage = nonRepudiation, digitalSignature, keyEnciphermentnsComment			= "OpenCA Server Certificate"# PKIX recommendationssubjectKeyIdentifier=hashauthorityKeyIdentifier=keyid,issuer:always# Import the email address.subjectAltName=email:copy# Copy subject detailsissuerAltName=issuer:copynsCaRevocationUrl	= https://www.openca.org/cgi-bin/getcrl#nsBaseUrlnsRevocationUrl		= https://www.openca.org/cgi-bin/getcrlnsRenewalUrl		= https://www.openca.org:4443/renewal#nsCaPolicyUrl#nsSslServerName		= $ENV::SERVER_NAME#################################################################[ user_objsign_cert ]# These extensions are added when 'ca' signs a request.# This goes against PKIX guidelines but some CAs do it and some software# requires this to avoid interpreting an end user certificate as a CA.basicConstraints=CA:FALSE# Here are some examples of the usage of nsCertType. If it is omitted# the certificate can be used for anything *except* object signing.# This is OK for an SSL server.#nsCertType			= server# For an object signing certificate this would be used.nsCertType = objsign# For normal client use this is typicalnsCertType = client, email, objsign# This is typical alsokeyUsage = nonRepudiation, digitalSignature, keyEnciphermentnsComment			= "OpenCA User ObjSign Certificate"# PKIX recommendationssubjectKeyIdentifier=hashauthorityKeyIdentifier=keyid,issuer:always# Import the email address.subjectAltName=email:copy# Copy subject detailsissuerAltName=issuer:copynsCaRevocationUrl	= https://www.openca.org/cgi-bin/getcrl#nsBaseUrlnsRevocationUrl		= https://www.openca.org/cgi-bin/getcrlnsRenewalUrl		= https://www.openca.org:4443/renewal#nsCaPolicyUrl#nsSslServerName#################################################################[ server_objsign_cert ]# These extensions are added when 'ca' signs a request.# This goes against PKIX guidelines but some CAs do it and some software# requires this to avoid interpreting an end user certificate as a CA.basicConstraints=CA:FALSE# Here are some examples of the usage of nsCertType. If it is omitted# the certificate can be used for anything *except* object signing.# This is OK for an SSL server.nsCertType			= server, objsign# This is typical alsokeyUsage = nonRepudiation, digitalSignature, keyEnciphermentnsComment			= "OpenCA Server ObjSign Certificate"# PKIX recommendationssubjectKeyIdentifier=hashauthorityKeyIdentifier=keyid,issuer:always# Import the email address.subjectAltName=email:copy# Copy subject detailsissuerAltName=issuer:copynsCaRevocationUrl	= https://www.openca.org/cgi-bin/getcrl#nsBaseUrlnsRevocationUrl		= https://www.openca.org/cgi-bin/getcrlnsRenewalUrl		= https://www.openca.org:4443/renewal#nsCaPolicyUrl#nsSslServerName		= $ENV::SERVER_NAME#################################################################[ crl_ext ]# CRL extensions.# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.# As Netscape only accepts CLRs Version1, DON't use CRL's extensions# at least if you are uning Netscape 4.5(-).# issuerAltName=issuer:copy# authorityKeyIdentifier=keyid:always,issuer:always

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
制服丝袜中文字幕亚洲| 欧美大黄免费观看| 日韩一区二区精品在线观看| 久久人人超碰精品| 亚洲国产aⅴ成人精品无吗| 国产一区二区三区四区在线观看| 色域天天综合网| 久久久www成人免费毛片麻豆 | 91久久精品网| 久久精品在这里| 免费人成在线不卡| 一本色道久久综合亚洲aⅴ蜜桃 | 免费人成黄页网站在线一区二区| 色综合久久88色综合天天免费| 欧美刺激午夜性久久久久久久| 亚洲精选视频在线| 懂色av一区二区三区蜜臀 | 久久久久综合网| 日韩av成人高清| 欧美无砖专区一中文字| 亚洲欧洲无码一区二区三区| 国产成人av电影在线| 精品国产乱码久久久久久牛牛| 性感美女久久精品| 精品视频资源站| 一区2区3区在线看| 色婷婷av一区| 亚洲精品高清在线观看| 91婷婷韩国欧美一区二区| 国产欧美一区二区精品久导航| 久草在线在线精品观看| 欧美一区二区三区啪啪| 三级一区在线视频先锋| 69成人精品免费视频| 亚洲va中文字幕| 欧美剧在线免费观看网站| 五月天激情综合网| 91麻豆精品国产综合久久久久久| 亚洲第一成年网| 91精品综合久久久久久| 秋霞成人午夜伦在线观看| 7777精品久久久大香线蕉| 蜜臀av在线播放一区二区三区| 日韩欧美一区电影| 国产精品1区2区| 中文字幕乱码亚洲精品一区| av中文一区二区三区| 亚洲精选视频在线| 67194成人在线观看| 麻豆视频一区二区| 久久毛片高清国产| 99热这里都是精品| 亚洲第一成人在线| 久久婷婷综合激情| av资源网一区| 三级成人在线视频| 久久精品亚洲一区二区三区浴池| 不卡区在线中文字幕| 一个色在线综合| 日韩一区二区在线观看| 国产v日产∨综合v精品视频| 日本亚洲三级在线| 久久综合久久综合久久| 成人精品鲁一区一区二区| 亚洲综合激情小说| 精品日韩欧美在线| 99re6这里只有精品视频在线观看 99re8在线精品视频免费播放 | 日韩欧美专区在线| 成人动漫视频在线| 日韩av电影免费观看高清完整版 | 69堂国产成人免费视频| 国产成人在线视频网站| 亚洲成在线观看| 国产欧美日韩中文久久| 欧美日韩在线播| 国产suv精品一区二区883| 亚洲一级在线观看| 国产亚洲欧美在线| 欧美日韩高清一区| 国产69精品久久777的优势| 亚洲国产成人av好男人在线观看| 久久九九久精品国产免费直播| 欧美三级欧美一级| 成人精品电影在线观看| 日本不卡中文字幕| 亚洲精品菠萝久久久久久久| 精品国产乱码久久久久久夜甘婷婷| 精品1区2区3区| 蜜桃久久久久久| 国产欧美日韩精品a在线观看| 99久久er热在这里只有精品15| 亚洲午夜精品在线| 欧美日韩视频在线观看一区二区三区| 一本大道综合伊人精品热热| 一区av在线播放| 日本一区二区视频在线观看| 欧美肥大bbwbbw高潮| 99免费精品视频| 国产精品99久久久久久似苏梦涵 | 国产一区啦啦啦在线观看| 一区二区三区免费网站| 国产精品毛片大码女人| 精品久久99ma| 欧美一区二区视频在线观看| 一本久久精品一区二区| 成人理论电影网| 国产成人免费在线视频| 欧美日韩在线电影| 欧美日韩精品系列| 色欧美日韩亚洲| 在线观看区一区二| 99国产一区二区三精品乱码| 国产成人免费av在线| 精品一区二区三区在线视频| 日韩精品电影一区亚洲| 日韩精品成人一区二区三区| 亚洲高清不卡在线| 天天影视网天天综合色在线播放| 亚洲尤物视频在线| 亚洲成人在线免费| 日日夜夜一区二区| 麻豆一区二区三区| 国产一区二三区好的| 国产精品一区二区三区乱码| 国产精品综合av一区二区国产馆| 韩国视频一区二区| 国产成都精品91一区二区三| 成人av午夜电影| 99视频超级精品| 欧美三级电影精品| 欧美成人性战久久| 欧美国产欧美亚州国产日韩mv天天看完整| 久久久久九九视频| 日韩理论片一区二区| 一区二区高清免费观看影视大全 | 欧美大胆一级视频| 久久九九99视频| 亚洲欧美日韩一区| 亚洲第一福利一区| 国产在线精品视频| 成人激情综合网站| 欧美日韩国产乱码电影| 欧美大片顶级少妇| 日韩久久一区二区| 日韩精品一二三四| 在线观看日韩国产| 欧美一区二区性放荡片| 久久久一区二区三区| 欧美国产精品v| 亚洲福利视频导航| 国产精品一区二区91| 在线观看不卡一区| 26uuu精品一区二区三区四区在线| 国产欧美精品区一区二区三区| 亚洲欧美另类久久久精品| 男男gaygay亚洲| 99re视频精品| 精品人在线二区三区| 亚洲欧美国产77777| 免费观看久久久4p| 色综合久久九月婷婷色综合| 日韩免费在线观看| 亚洲主播在线播放| 国产99精品在线观看| 8v天堂国产在线一区二区| 亚洲国产岛国毛片在线| 七七婷婷婷婷精品国产| 99国产精品国产精品久久| 精品久久久久一区| 夜夜嗨av一区二区三区四季av| 国产一区二区三区四区五区入口| 欧美视频精品在线| 国产精品久久久久国产精品日日 | 欧美精品丝袜久久久中文字幕| 中文字幕不卡在线播放| 久草中文综合在线| 欧美日韩国产高清一区二区三区| 欧美国产精品劲爆| 久久99精品视频| 在线不卡一区二区| 亚洲欧美另类久久久精品2019| 国产成人aaaa| 久久久久久久综合| 毛片av一区二区| 欧美一区二区精品久久911| 亚洲一区在线播放| 91国偷自产一区二区三区成为亚洲经典 | 国产高清在线精品| 欧美电影免费观看高清完整版在线| 亚洲国产日韩精品| 91国内精品野花午夜精品| 最好看的中文字幕久久| 成人免费视频播放| 日本一区二区三区在线不卡| 国产美女一区二区| 久久久久久久综合日本| 国产精品一区三区| 中文字幕欧美一| 欧美一区二区三区喷汁尤物| 欧美一区二区三区男人的天堂|