亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來(lái)到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? openssl.cnf

?? This a good VPN source
?? CNF
字號(hào):
## OpenSSL example configuration file.# This is mostly being used for generation of certificate requests.## This definition stops the following lines choking if HOME isn't# defined.HOME			= .RANDFILE		= $ENV::HOME/.rnd# Extra OBJECT IDENTIFIER info:#oid_file		= $ENV::HOME/.oidoid_section		= new_oids# To use this configuration file with the "-extfile" option of the# "openssl x509" utility, name here the section containing the# X.509v3 extensions to use:# extensions		= # (Alternatively, use a configuration file that has only# X.509v3 extensions in its main [= default] section.)[ new_oids ]# We can add new OIDs in here for use by 'ca' and 'req'.# Add a simple OID like this:# testoid1=1.2.3.4# Or use config file substitution like this:# testoid2=${testoid1}.5.6####################################################################[ ca ]default_ca	= CA_default		# The default ca section####################################################################[ CA_default ]dir		= ./		# Where everything is keptcerts		= $dir/certs		# Where the issued certs are keptcrl_dir		= $dir/crl		# Where the issued crl are keptdatabase	= $dir/index.txt	# database index file.new_certs_dir	= $dir/newcerts		# default place for new certs.certificate	= $dir/cacert.pem 	# The CA certificateserial		= $dir/serial 		# The current serial numbercrl		= $dir/crl.pem 		# The current CRLprivate_key	= $dir/cakey.pem	# The private keyRANDFILE	= $dir/.rand		# private random number filex509_extensions	= usr_cert		# The extentions to add to the cert# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs# so this is commented out by default to leave a V1 CRL.# crl_extensions	= crl_extdefault_days	= 365			# how long to certify fordefault_crl_days= 30			# how long before next CRLdefault_md	= md5			# which md to use.preserve	= no			# keep passed DN ordering# A few difference way of specifying how similar the request should look# For type CA, the listed attributes must be the same, and the optional# and supplied fields are just that :-)policy		= policy_match# For the CA policy[ policy_match ]countryName		= matchstateOrProvinceName	= matchorganizationName	= matchlocalityName		= optionalorganizationalUnitName	= optionalcommonName		= suppliedemailAddress		= optional# For the 'anything' policy# At this point in time, you must list all acceptable 'object'# types.[ policy_anything ]countryName		= optionalstateOrProvinceName	= optionallocalityName		= optionalorganizationName	= optionalorganizationalUnitName	= optionalcommonName		= suppliedemailAddress		= optional####################################################################[ req ]default_bits		= 1024default_keyfile 	= privkey.pemdistinguished_name	= req_distinguished_nameattributes		= req_attributesx509_extensions	= v3_ca	# The extentions to add to the self signed cert# Passwords for private keys if not present they will be prompted for# input_password = secret# output_password = secret# This sets a mask for permitted string types. There are several options. # default: PrintableString, T61String, BMPString.# pkix	 : PrintableString, BMPString.# utf8only: only UTF8Strings.# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).# MASK:XXXX a literal mask value.# WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings# so use this option with caution!string_mask = nombstr# req_extensions = v3_req # The extensions to add to a certificate request[ req_distinguished_name ]countryName			= Country Name (2 letter code)countryName_default		= CAcountryName_min			= 2countryName_max			= 2stateOrProvinceName		= State or Province Name (full name)stateOrProvinceName_default	= OntariolocalityName			= Locality Name (eg, city)localityName_default		= Toronto0.organizationName		= Organization Name (eg, company)0.organizationName_default	= Openswan# we can do this but it is not needed normally :-)#1.organizationName		= Second Organization Name (eg, company)#1.organizationName_default	= World Wide Web Pty LtdorganizationalUnitName		= Organizational Unit Name (eg, section)#organizationalUnitName_default	=commonName			= Common Name (eg, your name or your server\'s hostname)commonName_max			= 64emailAddress			= Email AddressemailAddress_max		= 40# SET-ex3			= SET extension number 3[ req_attributes ]challengePassword		= A challenge passwordchallengePassword_min		= 4challengePassword_max		= 20unstructuredName		= An optional company name[ usr_cert ]# These extensions are added when 'ca' signs a request.# This goes against PKIX guidelines but some CAs do it and some software# requires this to avoid interpreting an end user certificate as a CA.basicConstraints=CA:FALSE# Here are some examples of the usage of nsCertType. If it is omitted# the certificate can be used for anything *except* object signing.# This is OK for an SSL server.# nsCertType			= server# For an object signing certificate this would be used.# nsCertType = objsign# For normal client use this is typical# nsCertType = client, email# and for everything including object signing:# nsCertType = client, email, objsign# This is typical in keyUsage for a client certificate.# keyUsage = nonRepudiation, digitalSignature, keyEncipherment# This will be displayed in Netscape's comment listbox.nsComment			= "OpenSSL Generated Certificate"# PKIX recommendations harmless if included in all certificates.subjectKeyIdentifier=hashauthorityKeyIdentifier=keyid,issuer:always# This stuff is for subjectAltName and issuerAltname.# Import the email address.# subjectAltName=email:copy# Copy subject details# issuerAltName=issuer:copy#nsCaRevocationUrl		= http://www.domain.dom/ca-crl.pem#nsBaseUrl#nsRevocationUrl#nsRenewalUrl#nsCaPolicyUrl#nsSslServerName[ v3_req ]# Extensions to add to a certificate requestbasicConstraints = CA:FALSEkeyUsage = nonRepudiation, digitalSignature, keyEncipherment[ v3_ca ]# Extensions for a typical CA# PKIX recommendation.subjectKeyIdentifier=hashauthorityKeyIdentifier=keyid:always,issuer:always# This is what PKIX recommends but some broken software chokes on critical# extensions.#basicConstraints = critical,CA:true# So we do this instead.basicConstraints = CA:true# Key usage: this is typical for a CA certificate. However since it will# prevent it being used as an test self-signed certificate it is best# left out by default.# keyUsage = cRLSign, keyCertSign# Some might want this also# nsCertType = sslCA, emailCA# Include email address in subject alt name: another PKIX recommendation# subjectAltName=email:copy# Copy issuer details# issuerAltName=issuer:copy# DER hex encoding of an extension: beware experts only!# obj=DER:02:03# Where 'obj' is a standard or added object# You can even override a supported extension:# basicConstraints= critical, DER:30:03:01:01:FF[ crl_ext ]# CRL extensions.# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.# issuerAltName=issuer:copyauthorityKeyIdentifier=keyid:always,issuer:always[ engine ]default = openssl# rsa = openssl# dsa = openssl# dh = openssl# rand = openssl# bn_mod_exp = openssl# bn_mod_exp_crt = openssl

?? 快捷鍵說(shuō)明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产亚洲婷婷免费| 成人黄页在线观看| 蜜臀av亚洲一区中文字幕| 丝袜美腿一区二区三区| 日韩福利电影在线观看| 欧美乱妇15p| 日韩欧美成人一区二区| 久久免费国产精品 | 日韩美女视频一区| 亚洲精品成人天堂一二三| 一区二区三区色| 婷婷丁香激情综合| 国精产品一区一区三区mba桃花| 欧美亚洲动漫另类| 在线视频一区二区三| 欧美日韩一本到| 日韩欧美的一区| 欧美激情一区二区三区蜜桃视频 | 91久久国产最好的精华液| 欧美日精品一区视频| 欧美电影免费观看高清完整版在线| 精品剧情v国产在线观看在线| 国产日韩欧美一区二区三区乱码| 国产综合色视频| 99久久免费精品高清特色大片| 日本高清视频一区二区| 日韩三级视频在线看| 国产日韩欧美精品在线| 一区二区三区日韩欧美精品| 日本午夜一本久久久综合| 国产麻豆精品久久一二三| 91在线播放网址| 欧美卡1卡2卡| 国产亚洲精品福利| 亚洲线精品一区二区三区八戒| 麻豆精品视频在线| 狠狠色狠狠色综合系列| 色综合一区二区| 精品久久久三级丝袜| 一区二区在线免费| 国内不卡的二区三区中文字幕| 99精品久久免费看蜜臀剧情介绍| 欧美电影一区二区| 中文字幕日韩精品一区| 一区二区三区不卡视频| 欧美精品一区二区三区蜜桃视频| 国产精品成人网| 天堂一区二区在线免费观看| 国产宾馆实践打屁股91| 在线播放中文一区| 国产精品久久久久桃色tv| 青青青伊人色综合久久| 99国内精品久久| 久久精品在线观看| 亚洲bt欧美bt精品777| 不卡的av网站| 久久精品人人做| 五月激情丁香一区二区三区| 成人黄页毛片网站| 26uuu国产日韩综合| 亚洲无人区一区| eeuss国产一区二区三区| 日韩精品在线一区二区| 香蕉乱码成人久久天堂爱免费| 粉嫩av一区二区三区粉嫩| 日韩一级免费观看| 天天影视网天天综合色在线播放| 波多野结衣欧美| 精品久久久久久久久久久久久久久久久| a在线播放不卡| 精品国产制服丝袜高跟| 午夜精品在线看| 色视频一区二区| 久久久av毛片精品| 麻豆高清免费国产一区| 欧美日韩国产免费| 亚洲成人资源在线| 在线一区二区三区做爰视频网站| 国产精品系列在线| 国产精品66部| 国产亚洲污的网站| 国产一区二区福利视频| 亚洲精品在线观| 经典一区二区三区| 日韩精品一区二区三区中文不卡| 天堂va蜜桃一区二区三区漫画版| 欧美唯美清纯偷拍| 亚洲一二三专区| 欧美中文字幕不卡| 亚洲综合一二区| 精品视频一区三区九区| 亚洲一区二区在线免费观看视频| 91免费看片在线观看| 国产精品传媒入口麻豆| 99麻豆久久久国产精品免费| 亚洲欧洲av在线| 99re在线视频这里只有精品| 中文字幕一区二区三区av| 91丝袜美腿高跟国产极品老师| 国产精品的网站| 91麻豆高清视频| 亚洲一区二区三区中文字幕在线| 在线观看亚洲一区| 亚洲mv在线观看| 婷婷综合另类小说色区| 欧美一区二区视频观看视频| 蜜臀av一区二区| 久久久亚洲精华液精华液精华液| 国产成人免费视频网站高清观看视频| 日韩精品一区二区三区swag| 日本成人中文字幕在线视频| 日韩一区二区影院| 免费在线观看不卡| 日韩欧美二区三区| 国产精品小仙女| 亚洲欧洲av另类| 精品视频在线免费| 麻豆国产一区二区| 中文字幕欧美国产| 在线视频亚洲一区| 日本不卡123| 久久久精品蜜桃| 91麻豆精品秘密| 日韩国产一二三区| 国产三区在线成人av| 99re视频精品| 日韩va亚洲va欧美va久久| 久久久久久9999| 欧洲亚洲国产日韩| 激情六月婷婷久久| |精品福利一区二区三区| 亚洲乱码精品一二三四区日韩在线| 欧美日韩激情一区二区| 国产综合久久久久久鬼色| 国产精品久久久久三级| 欧美日韩日日夜夜| 国产真实乱子伦精品视频| 亚洲视频一区在线| 日韩一级片网址| 国产91精品一区二区| 亚洲高清视频在线| 欧美经典一区二区| 欧美日韩电影在线播放| 国产成人h网站| 亚洲成人免费视频| 欧美国产丝袜视频| 91精品视频网| www.欧美色图| 免费看精品久久片| 亚洲人成在线观看一区二区| 欧美一二三四区在线| 99re成人在线| 国内外精品视频| 一区二区三区四区高清精品免费观看 | 欧美va在线播放| 91玉足脚交白嫩脚丫在线播放| 日韩国产精品久久久久久亚洲| 精品国产91久久久久久久妲己| 成人精品一区二区三区四区| 亚洲人成在线观看一区二区| 精品国产乱码91久久久久久网站| 日本韩国精品在线| 国产精品88888| 免费观看91视频大全| 亚洲欧美视频在线观看视频| 久久影院午夜片一区| 欧美日韩一区二区三区四区 | 欧美日韩国产三级| eeuss影院一区二区三区| 韩日av一区二区| 天天综合色天天综合色h| 中文字幕在线观看一区二区| 精品成a人在线观看| 欧美另类一区二区三区| 一本到一区二区三区| 成人夜色视频网站在线观看| 理论电影国产精品| 香蕉成人伊视频在线观看| 亚洲日本在线天堂| 欧美国产激情一区二区三区蜜月| 午夜欧美一区二区三区在线播放| 亚洲日本在线a| 国产精品色在线| 国产亚洲自拍一区| 欧美电影免费观看高清完整版在| 欧美日韩国产小视频在线观看| 91看片淫黄大片一级在线观看| 国产福利一区二区三区视频在线 | 欧美不卡一区二区三区| 欧美日韩精品专区| 欧美探花视频资源| 色丁香久综合在线久综合在线观看| av在线不卡电影| 成人av第一页| 成人黄色小视频| 成人看片黄a免费看在线| 国产成人在线色| 国产.欧美.日韩| 精品影视av免费| 午夜精品福利久久久|