When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. X.509 - Wikipedia

    en.wikipedia.org/wiki/X.509

    In cryptography, X.509 is an International Telecommunication Union (ITU) standard defining the format of public key certificates. [1] X.509 certificates are used in many Internet protocols, including TLS/SSL, which is the basis for HTTPS, [2] the secure protocol for browsing the web.

  3. PKCS 7 - Wikipedia

    en.wikipedia.org/wiki/PKCS_7

    $ echo '' | openssl s_client-connect example.org:443-host example.org 2 >/dev/null | openssl x509 > example.org.cer 2 >/dev/null $ openssl crl2pkcs7-nocrl-certfile example.org.cer-out example.org.cer.pem.p7b $ openssl pkcs7-in example.org.cer.pem.p7b-noout-print_certs subject=C = US, ST = California, L = Los Angeles, O = Internet Corporation ...

  4. OpenSSL - Wikipedia

    en.wikipedia.org/wiki/OpenSSL

    OpenSSL is a software library for applications that provide secure communications over computer networks against eavesdropping, and identify the party at the other end. It is widely used by Internet servers, including the majority of HTTPS websites. OpenSSL contains an open-source implementation of the SSL and TLS protocols.

  5. Certificate signing request - Wikipedia

    en.wikipedia.org/wiki/Certificate_signing_request

    Here is an example of how you can examine its ASN.1 structure using OpenSSL: openssl asn1parse -i -in your_request.p10. A CSR may be represented as a Base64 encoded PKCS#10; an example of which is given below:

  6. Time stamp protocol - Wikipedia

    en.wikipedia.org/wiki/Time_stamp_protocol

    The Time-Stamp Protocol, or TSP is a cryptographic protocol for certifying timestamps using X.509 certificates and public key infrastructure.The timestamp is the signer's assertion that a piece of electronic data existed at or before a particular time.

  7. Public-key cryptography - Wikipedia

    en.wikipedia.org/wiki/Public-key_cryptography

    Examples include TLS and its predecessor SSL, which are commonly used to provide security for web browser transactions (for example, most websites utilize TLS for HTTPS). Aside from the resistance to attack of a particular key pair, the security of the certification hierarchy must be considered when deploying public key systems.

  8. Certificate Management Protocol - Wikipedia

    en.wikipedia.org/wiki/Certificate_Management...

    Self-contained messages with protection independent of transfer mechanism – as opposed to related protocols EST and SCEP, this supports end-to-end security.; Full certificate life-cycle support: an end entity can utilize CMP to obtain certificates from a CA, request updates for them, and also get them revoked.

  9. Stunnel - Wikipedia

    en.wikipedia.org/wiki/Stunnel

    Stunnel relies on the OpenSSL library to implement the underlying TLS or SSL protocol. Stunnel uses public-key cryptography with X.509 digital certificates to secure the SSL connection, and clients can optionally be authenticated via a certificate. [6] If linked against libwrap, it can be configured to act as a proxy–firewall service as well.