OpenSSL Cheat Sheet - 快速参考指南,收录常用语法、命令与实践。
openssl rsa -check -text -in privateKey.key
openssl rsa -noout -modulus -in privateKey.key | openssl md5
openssl rsa -noout -modulus -in privateKey.key | openssl sha1
openssl rsa -noout -modulus -in privateKey.key | openssl sha256
openssl rsa -noout -modulus -in privateKey.key | openssl sha512
openssl rsa -aes256 -in privateKey.key -out newPrivateKey.key
openssl ecparam -list_curves
openssl ecparam -name secp521r1 -genkey -noout -out privateKey.key
openssl x509 -noout -modulus -in certificate.crt | openssl md5
openssl x509 -noout -modulus -in certificate.crt | openssl sha1
openssl x509 -noout -modulus -in certificate.crt | openssl sha256
openssl x509 -noout -modulus -in certificate.crt | openssl sha512
Or, alternatively:
openssl x509 -noout -fingerprint -in certificate.crt
openssl x509 -noout -fingerprint -sha256 -in certificate.crt
openssl x509 -in certificate.crt -noout -text|more
openssl x509 -noout -subject certificate.crt
openssl x509 -noout -issuer certificate.crt
openssl x509 -noout -dates certificate.crt
echo | openssl s_client -servername www.openssl.org -connect \
www.openssl.org:443 2>/dev/null | openssl x509 -noout -text|more
echo | openssl s_client -servername imap.arcor.de -connect \
imap.arcor.de:993 2>/dev/null | openssl x509 -noout -text|more
OK
openssl verify -verbose -x509_strict -CAfile \
issuer.crt Test\ Haeschen\ 1.crt
Result:
Test Haeschen 1.crt: OK
Corrupted (for example)
openssl verify -verbose -x509_strict -CAfile \
issuer.crt Test\ Haeschen\ 1_corrupted.crt
Result:
C = DE, ST = Thueringen, L = Rudolstadt, O = Damaschkestr. 11, OU = Arbeitszimmer, CN = Test Haeschen 1
error 7 at 0 depth lookup: certificate signature failure
error Test Haeschen 1_corrupted.crt: verification failed
40270500477F0000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:../crypto/rsa/rsa_pk1.c:75:
40270500477F0000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:../crypto/rsa/rsa_ossl.c:598:
40270500477F0000:error:1C880004:Provider routines:rsa_verify:RSA lib:../providers/implementations/signature/rsa_sig.c:774:
40270500477F0000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:../crypto/asn1/a_verify.c:217:
openssl smime -sign -in msg.txt -text -out msg.p7s \
-signer certificate.crt -inkey privateKey.key
openssl smime -verify -in msg.p7s -CAfile chain.pem
openssl crl -inform DER -noout -text -in crl/cacrl.der
openssl crl -inform PEM -noout -text -in crl/cacrl.pem
openssl pkcs12 -info -in digitalIdentity.p12
openssl pkcs12 -export -in certificate.cert \
-inkey privateKey.key -out digitalIdentity.p12
openssl pkcs12 -in digitalIdentity.p12 -out privateKey.key
openssl pkcs12 -in digitalIdentity.p12 -out digitalIdentity.pem
openssl ts -query -in query.tsq -text
openssl ts -reply -in reply.tsr -text
openssl ts -verify -in reply.tsr -data data.dat -CAfile chain.pem
openssl ts -reply -in reply.tsr -token_out -out token.tk
openssl pkcs7 -inform DER -in token.tk -print_certs -noout -text
openssl req -new -key privateKey.key -out my.csr
This can of course be a RSA key or one based on an elliptic curve. Available curves can be listed using
openssl ecparam -list_curves
Afterwards you chose one of the curves and create a private key like so:
openssl ecparam -name secp521r1 -genkey -noout \
-out privateKey.key
openssl req -in my.csr -noout -text
openssl s_client -showcerts -connect www.example.com:443
openssl s_client -showcerts -starttls imap \
-connect mail.domain.com:139
Message was tampered with (return code 4):
Verification failure
140485684135232:error:2E09A09E:CMS routines:CMS_SignerInfo_verify_content:verification failure:../crypto/cms/cms_sd.c:847:
140485684135232:error:2E09D06D:CMS routines:CMS_verify:content verify error:../crypto/cms/cms_smime.c:393:
Message signature not trusted (return code 4):
Verification failure
140146111432000:error:2E099064:CMS routines:cms_signerinfo_verify_cert:certificate verify error:../crypto/cms/cms_smime.c:252:Verify error:unable to get local issuer certificate
Message not signed (return code 2):
Error reading S/MIME message
140701208487232:error:0D0D40CD:asn1 encoding routines:SMIME_read_ASN1:invalid mime type:../crypto/asn1/asn_mime.c:469:type: multipart/alternative
Validation successful (return code 0):
Verification successful
openssl cms -verify -in some_email_message.eml
openssl cms -verify -in some_email_message \
-CAfile trust_anchor-crt
Note: the P12 file holding the digital identity must be pem-encoded! (see above)
openssl cms -decrypt -out decrypted_email_message \
-inkey p12.pem -in some_encrypted_email_message
openssl asn1parse -in mysterious_file.pem
openssl asn1parse -dump -strictpem -in mysterious_file.pem
地址
Level 10b, 144 Edward Street, Brisbane CBD(Headquarter)Level 2, 171 La Trobe St, Melbourne VIC 3000四川省成都市武侯区桂溪街道天府大道中段500号D5东方希望天祥广场B座45A13号Business Hub, 155 Waymouth St, Adelaide SA 5000Disclaimer
JR Academy acknowledges Traditional Owners of Country throughout Australia and recognises the continuing connection to lands, waters and communities. We pay our respect to Aboriginal and Torres Strait Islander cultures; and to Elders past and present. Aboriginal and Torres Strait Islander peoples should be aware that this website may contain images or names of people who have since passed away.
匠人学院网站上的所有内容,包括课程材料、徽标和匠人学院网站上提供的信息,均受澳大利亚政府知识产权法的保护。严禁未经授权使用、销售、分发、复制或修改。违规行为可能会导致法律诉讼。通过访问我们的网站,您同意尊重我们的知识产权。 JR Academy Pty Ltd 保留所有权利,包括专利、商标和版权。任何侵权行为都将受到法律追究。查看用户协议
© 2017-2025 JR Academy Pty Ltd. All rights reserved.
ABN 26621887572