ssl证书相关

SSL_connect:SSLv2/v3 write client hello A
SSL_connect:SSLv3 read server hello A
depth=0 /ST=\x00B\x00e\x00i\x00j\x00i\x00n\x00g/CN=\x00a\x00p\x00p\x00t\x00e\x00
s\x00t\x00n\x00s\x00f\x00o\x00c\x00u\x00s\x00.\x00c\x00n\x00p\x00c/serialNumber=
\x00S\x000\x000\x000\x000\x000\x000\x007\x006\x002
verify error:num=20:unable to get local issuer certificate
verify return:1
depth=0 /ST=\x00B\x00e\x00i\x00j\x00i\x00n\x00g/CN=\x00a\x00p\x00p\x00t\x00e\x00
s\x00t\x00n\x00s\x00f\x00o\x00c\x00u\x00s\x00.\x00c\x00n\x00p\x00c/serialNumber=
\x00S\x000\x000\x000\x000\x000\x000\x007\x006\x002
verify error:num=27:certificate not trusted
verify return:1
depth=0 /ST=\x00B\x00e\x00i\x00j\x00i\x00n\x00g/CN=\x00a\x00p\x00p\x00t\x00e\x00
s\x00t\x00n\x00s\x00f\x00o\x00c\x00u\x00s\x00.\x00c\x00n\x00p\x00c/serialNumber=
\x00S\x000\x000\x000\x000\x000\x000\x007\x006\x002
verify error:num=21:unable to verify the first certificate
verify return:1
SSL_connect:SSLv3 read server certificate A
SSL_connect:SSLv3 read server key exchange A
SSL_connect:SSLv3 read server certificate request A
SSL_connect:SSLv3 read server done A
SSL_connect:SSLv3 write client certificate A
SSL_connect:SSLv3 write client key exchange A
SSL_connect:SSLv3 write change cipher spec A
SSL_connect:SSLv3 write finished A
SSL_connect:SSLv3 flush data
SSL_connect:SSLv3 read finished A
---
Certificate chain
 0 s:/ST=\x00B\x00e\x00i\x00j\x00i\x00n\x00g/CN=\x00a\x00p\x00p\x00t\x00e\x00s\x
00t\x00n\x00s\x00f\x00o\x00c\x00u\x00s\x00.\x00c\x00n\x00p\x00c/serialNumber=\x0
0S\x000\x000\x000\x000\x000\x000\x007\x006\x002
   i:/CN=N-V\xFDw\xF3l\xB9\x8B\xA4\x8B\xC1N-_\xC3\x00(\x00T\x00E\x00S\x00T\x00)/
serialNumber=\x00S\x001\x000\x001
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
 1 s:/C=CN/ST=sc/O=nsfocus/OU=nsfocus/CN=apache
   i:/C=CN/ST=sc/L=cd/O=nsfocus/OU=nsfocus/CN=nsfocus
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
 2 s:/C=CN/ST=sc/L=cd/O=nsfocus/OU=nsfocus/CN=nsfocus
   i:/C=CN/ST=sc/L=cd/O=nsfocus/OU=nsfocus/CN=nsfocus
-----BEGIN CERTIFICATE-----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=
-----END CERTIFICATE-----
---
Server certificate
subject=/ST=\x00B\x00e\x00i\x00j\x00i\x00n\x00g/CN=\x00a\x00p\x00p\x00t\x00e\x00
s\x00t\x00n\x00s\x00f\x00o\x00c\x00u\x00s\x00.\x00c\x00n\x00p\x00c/serialNumber=
\x00S\x000\x000\x000\x000\x000\x000\x007\x006\x002
issuer=/CN=N-V\xFDw\xF3l\xB9\x8B\xA4\x8B\xC1N-_\xC3\x00(\x00T\x00E\x00S\x00T\x00
)/serialNumber=\x00S\x001\x000\x001
---
Acceptable client certificate CA names
/C=CN/ST=Beijing/L=Beijing/O=NSFOCUS Ltd./OU=CA/CN=NSFOCUS/emailAddress=support@
nsfocus.com
---
SSL handshake has read 3111 bytes and written 334 bytes
---
New, TLSv1/SSLv3, Cipher is DHE-RSA-AES256-SHA
Server public key is 1024 bit
Compression: NONE
Expansion: NONE
SSL-Session:
    Protocol  : TLSv1
    Cipher    : DHE-RSA-AES256-SHA
    Session-ID: A225FE98F029F290F5E9412F257689812CB2979ED4908551DEE451CEDA8212D0

    Session-ID-ctx:
    Master-Key: 796DC7B16199E8E316F5C4AB9E15EE3C47F911A0FF345A95FAC0ABA80BDA8761
77BE4A1310921C04CA5E85B963EF2BDE
    Key-Arg   : None
    Start Time: 1396445187
    Timeout   : 300 (sec)
    Verify return code: 21 (unable to verify the first certificate)
---
SSL3 alert read:warning:close notify
closed
SSL3 alert write:warning:close notify

D:\wamp\bin\apache\apache2.2.8\bin>openssl s_client -connect 10.245.34.73:443 -s
howcerts -state -CAfile chain2.pem
Loading 'screen' into random state - done
CONNECTED(000000D8)
SSL_connect:before/connect initialization
SSL_connect:SSLv2/v3 write client hello A
SSL_connect:SSLv3 read server hello A
depth=2 /C=CN/ST=sc/L=cd/O=nsfocus/OU=nsfocus/CN=nsfocus
verify return:1
depth=1 /C=CN/ST=sc/O=nsfocus/OU=nsfocus/CN=apache
verify return:1
depth=0 /C=CN/ST=sc/O=nsfocus/OU=nsfocus/CN=client
verify return:1
SSL_connect:SSLv3 read server certificate A
SSL_connect:SSLv3 read server key exchange A
SSL_connect:SSLv3 read server certificate request A
SSL_connect:SSLv3 read server done A
SSL_connect:SSLv3 write client certificate A
SSL_connect:SSLv3 write client key exchange A
SSL_connect:SSLv3 write change cipher spec A
SSL_connect:SSLv3 write finished A
SSL_connect:SSLv3 flush data
SSL_connect:SSLv3 read finished A
---
Certificate chain
 0 s:/C=CN/ST=sc/O=nsfocus/OU=nsfocus/CN=client
   i:/C=CN/ST=sc/O=nsfocus/OU=nsfocus/CN=apache
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
 1 s:/C=CN/ST=sc/O=nsfocus/OU=nsfocus/CN=apache
   i:/C=CN/ST=sc/L=cd/O=nsfocus/OU=nsfocus/CN=nsfocus
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
 2 s:/C=CN/ST=sc/L=cd/O=nsfocus/OU=nsfocus/CN=nsfocus
   i:/C=CN/ST=sc/L=cd/O=nsfocus/OU=nsfocus/CN=nsfocus
-----BEGIN CERTIFICATE-----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=
-----END CERTIFICATE-----
---
Server certificate
subject=/C=CN/ST=sc/O=nsfocus/OU=nsfocus/CN=client
issuer=/C=CN/ST=sc/O=nsfocus/OU=nsfocus/CN=apache
---
Acceptable client certificate CA names
/C=CN/ST=Beijing/L=Beijing/O=NSFOCUS Ltd./OU=CA/CN=NSFOCUS/emailAddress=support@
nsfocus.com
---
SSL handshake has read 2765 bytes and written 334 bytes
---
New, TLSv1/SSLv3, Cipher is DHE-RSA-AES256-SHA
Server public key is 512 bit
Compression: NONE
Expansion: NONE
SSL-Session:
    Protocol  : TLSv1
    Cipher    : DHE-RSA-AES256-SHA
    Session-ID: ACDA0FF7E269B595484FC83AE31F5E8D65A2D9AE1C36A9CB863EF4602A0975F7

    Session-ID-ctx:
    Master-Key: 7A0AF50C2EB9EADC1A492C9865A699775D8AEB9727FAF911BC1F911632D234A8
6A301F34B668E0EC9EAFC31BC1E1D756
    Key-Arg   : None
    Start Time: 1396445531
    Timeout   : 300 (sec)
    Verify return code: 0 (ok)
---
SSL3 alert read:warning:close notify
closed
SSL3 alert write:warning:close notify

D:\wamp\bin\apache\apache2.2.8\bin>openssl pkcs12 -export clcerts -in client.crt
 -inkey client.key -out client.pfx
Usage: pkcs12 [options]
where options are
-export       output PKCS12 file
-chain        add certificate chain
-inkey file   private key if not infile
-certfile f   add all certs in f
-CApath arg   - PEM format directory of CA's
-CAfile arg   - PEM format file of CA's
-name "name"  use name as friendly name
-caname "nm"  use nm as CA friendly name (can be used more than once).
-in  infile   input filename
-out outfile  output filename
-noout        don't output anything, just verify.
-nomacver     don't verify MAC.
-nocerts      don't output certificates.
-clcerts      only output client certificates.
-cacerts      only output CA certificates.
-nokeys       don't output private keys.
-info         give info about PKCS#12 structure.
-des          encrypt private keys with DES
-des3         encrypt private keys with triple DES (default)
-aes128, -aes192, -aes256
              encrypt PEM output with cbc aes
-nodes        don't encrypt private keys
-noiter       don't use encryption iteration
-maciter      use MAC iteration
-twopass      separate MAC, encryption passwords
-descert      encrypt PKCS#12 certificates with triple DES (default RC2-40)
-certpbe alg  specify certificate PBE algorithm (default RC2-40)
-keypbe alg   specify private key PBE algorithm (default 3DES)
-keyex        set MS key exchange type
-keysig       set MS key signature type
-password p   set import/export password source
-passin p     input file pass phrase source
-passout p    output file pass phrase source
-engine e     use engine e, possibly a hardware device.
-rand file;file;...
              load the file (or the files in the directory) into
              the random number generator

D:\wamp\bin\apache\apache2.2.8\bin>openssl pkcs12 -export -clcerts -in client.cr
t -inkey client.key -out client.pfx
Loading 'screen' into random state - done
Enter pass phrase for client.key:
Enter Export Password:
Verifying - Enter Export Password:

D:\wamp\bin\apache\apache2.2.8\bin>openssl x509 -in root.cer -out root.pem
unable to load certificate
131732:error:0906D06C:PEM routines:PEM_read_bio:no start line:.\crypto\pem\pem_l
ib.c:647:Expecting: TRUSTED CERTIFICATE

D:\wamp\bin\apache\apache2.2.8\bin>openssl pkcs12 -export -clcerts -in client.cr
t -inkey client.key -out client.pfx

转载于:https://my.oschina.net/u/853533/blog/215613

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值