证书类似身份证,里面记录了某人的姓名、年龄、地址等个人信息,还包括这个人的公钥(身份证号码),并由认证机构(类似派出所)进行数字签名后发放,只要我们看到该证书就可以知道认证机构认定了该公钥(身份证号码)的确属于此人,解决了数字签名中无法确认是谁的公钥的问题,该证书也叫公钥证书,简称证书。

go语言生成自签证书文件(RSA)

package mainimport ("crypto/rand""crypto/rsa""crypto/x509""crypto/x509/pkix""encoding/pem""fmt""math/big""net""os""time"
)func GenerateSelfSignedCertKey(keySize int, host string, alternateIPs []net.IP, alternateDNS []string) {//1.生成密钥对priv, err := rsa.GenerateKey(rand.Reader, keySize)if err != nil {panic(err)}//2.创建证书模板template := x509.Certificate{SerialNumber: big.NewInt(1), //该号码表示CA颁发的唯一序列号,在此使用一个数来代表Issuer:       pkix.Name{},Subject:      pkix.Name{CommonName: fmt.Sprintf("%s@%d", host, time.Now().Unix())},NotBefore:    time.Now(),NotAfter:     time.Now().Add(time.Hour * 24 * 365),KeyUsage:     x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature | x509.KeyUsageCertSign, //表示该证书是用来做服务端认证的ExtKeyUsage:  []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth},}if ip := net.ParseIP(host); ip != nil {template.IPAddresses = append(template.IPAddresses, ip)}else {template.DNSNames = append(template.DNSNames, host)}template.IPAddresses = append(template.IPAddresses, alternateIPs...)template.DNSNames = append(template.DNSNames, alternateDNS...)//3.创建证书,这里第二个参数和第三个参数相同则表示该证书为自签证书,返回值为DER编码的证书certificate, err := x509.CreateCertificate(rand.Reader, &template, &template, &priv.PublicKey, priv)if err != nil {panic(err)}//4.将得到的证书放入pem.Block结构体中block := pem.Block{Type:    "CERTIFICATE",Headers: nil,Bytes:   certificate,}//5.通过pem编码并写入磁盘文件file, err := os.Create("ca.crt")if err != nil {panic(err)}defer file.Close()pem.Encode(file, &block)//6.将私钥中的密钥对放入pem.Block结构体中block = pem.Block{Type:    "RSA PRIVATE KEY",Headers: nil,Bytes:   x509.MarshalPKCS1PrivateKey(priv),}//7.通过pem编码并写入磁盘文件file, err = os.Create("ca.key")if err != nil {panic(err)}pem.Encode(file, &block)
}func main(){ip := []byte("127.0.0.1")alternateDNS := []string{"localhost"}GenerateSelfSignedCertKey(2048, "192.168.0.1", []net.IP{net.ParseIP(string(ip))}, alternateDNS)
}

查看证书内容

$ openssl x509 -in ca.crt -noout -text
Certificate:Data:Version: 3 (0x2)Serial Number: 1 (0x1)Signature Algorithm: sha256WithRSAEncryptionIssuer: CN = 192.168.0.1@1622130200ValidityNot Before: May 27 15:43:20 2021 GMTNot After : May 27 15:43:20 2022 GMTSubject: CN = 192.168.0.1@1622130200Subject Public Key Info:Public Key Algorithm: rsaEncryptionRSA Public-Key: (2048 bit)Modulus:00:b7:24:45:1e:1f:92:a4:19:2e:3b:76:5a:2a:39:b6:e9:b4:a7:6f:fe:a6:a9:dd:e3:da:dd:69:46:16:b8:d9:42:07:11:17:e8:61:b9:a8:54:07:bd:75:a1:b5:78:82:78:48:66:ca:b6:d3:74:27:c4:06:2e:2c:ec:69:bd:c4:2b:b3:79:6a:67:67:80:52:fc:5f:d9:4e:32:fe:66:f7:d3:e1:8a:71:c3:0b:4b:ab:3c:e9:e1:11:4c:7a:5a:b0:ff:87:4b:78:64:e1:ce:60:91:71:aa:c7:d5:4e:4c:13:23:5c:25:f4:7a:aa:57:63:77:ca:67:98:2e:5a:55:03:0d:7d:03:4b:1f:4a:31:7a:fe:a0:16:71:d6:da:06:4e:0b:a8:b2:dd:3e:ee:cc:08:ee:19:de:c3:a7:3b:71:2e:76:c2:40:1c:ba:7c:b8:ed:d3:5e:b6:16:eb:88:56:a3:45:9c:a4:a4:f5:2c:bb:d7:b6:38:34:2e:3d:48:25:ee:4e:ce:6c:9c:ea:7f:fd:32:4f:7a:17:68:06:01:b5:bb:82:08:bd:af:9e:39:fc:ca:4e:8e:15:48:ce:db:f7:72:c8:4a:d9:71:97:27:f8:e7:2d:3a:af:00:0e:26:61:2f:1c:13:27:f1:49:bf:80:b1:b9:41:14:2a:70:9e:32:26:8bExponent: 65537 (0x10001)X509v3 extensions:X509v3 Key Usage: criticalDigital Signature, Key Encipherment, Certificate SignX509v3 Extended Key Usage:TLS Web Server AuthenticationX509v3 Subject Alternative Name:DNS:localhost, IP Address:192.168.0.1, IP Address:127.0.0.1Signature Algorithm: sha256WithRSAEncryptiona6:27:5a:75:9c:b4:b8:1b:9a:f9:fa:96:3e:3d:16:73:93:6d:0a:d8:c1:ed:01:0c:09:0a:66:d8:f9:4d:e7:f4:93:ee:5c:c5:e2:3c:f5:5d:06:49:50:97:86:4f:fd:c5:f5:da:aa:bd:56:b7:0f:84:c3:18:c1:bb:4c:cb:78:14:90:13:2b:58:ae:fa:a9:2e:2d:2d:83:f3:24:83:4a:09:54:65:a4:f3:9f:a3:65:ce:43:a0:c4:43:f2:aa:7b:f3:f4:92:b0:6b:9b:75:ef:a3:43:cc:3d:51:25:ec:ac:ad:b8:65:61:70:5f:c8:b6:4b:57:05:2f:95:71:9c:e1:77:92:e1:e9:53:30:67:02:0b:c7:5c:f1:77:57:a7:09:37:07:e4:60:0d:f5:62:c3:9d:b6:4f:fc:36:4a:c3:d4:34:9a:60:da:9a:fd:dd:c0:3c:fd:cc:1f:06:59:a3:75:97:ad:e0:96:5e:39:a0:e9:a2:7b:d5:54:72:e0:54:f5:a3:57:9b:89:0b:0d:a0:fc:7c:6b:82:31:77:70:d3:a9:79:ed:db:2e:de:e7:16:a6:93:5c:9b:b8:cc:80:5b:d8:21:4a:62:a1:8a:ce:ce:19:86:d0:b3:fb:37:d2:74:75:3a:5d:9d:f7:0e:ff:79:0b:ae:9e:c7:df:88:f5:6b:b2:ae

go语言生成自签证书文件(ECDSA)

package mainimport ("crypto/ecdsa""crypto/elliptic""crypto/rand"//"crypto/rsa""crypto/x509""crypto/x509/pkix""encoding/pem""fmt""math/big""net""os""time"
)func GenerateSelfSignedCertKey(keySize int, host string, alternateIPs []net.IP, alternateDNS []string) {//1.生成密钥对//priv, err := rsa.GenerateKey(rand.Reader, keySize)priv, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)if err != nil {panic(err)}//2.创建证书模板template := x509.Certificate{SerialNumber: big.NewInt(1), //该号码表示CA颁发的唯一序列号,在此使用一个数来代表Issuer:       pkix.Name{},Subject:      pkix.Name{CommonName: fmt.Sprintf("%s@%d", host, time.Now().Unix())},NotBefore:    time.Now(),NotAfter:     time.Now().Add(time.Hour * 24 * 365),KeyUsage:     x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature | x509.KeyUsageCertSign, //表示该证书是用来做服务端认证的ExtKeyUsage:  []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth},}if ip := net.ParseIP(host); ip != nil {template.IPAddresses = append(template.IPAddresses, ip)}else {template.DNSNames = append(template.DNSNames, host)}template.IPAddresses = append(template.IPAddresses, alternateIPs...)template.DNSNames = append(template.DNSNames, alternateDNS...)//3.创建证书,这里第二个参数和第三个参数相同则表示该证书为自签证书,返回值为DER编码的证书certificate, err := x509.CreateCertificate(rand.Reader, &template, &template, &priv.PublicKey, priv)if err != nil {panic(err)}//4.将得到的证书放入pem.Block结构体中block := pem.Block{Type:    "CERTIFICATE",Headers: nil,Bytes:   certificate,}//5.通过pem编码并写入磁盘文件file, err := os.Create("ca.crt")if err != nil {panic(err)}defer file.Close()pem.Encode(file, &block)ecpriv, err := x509.MarshalECPrivateKey(priv)if err != nil {panic(err)}//6.将私钥中的密钥对放入pem.Block结构体中block = pem.Block{Type:    "ECDSA PRIVATE KEY",Headers: nil,//Bytes:   x509.MarshalPKCS1PrivateKey(priv),Bytes:      ecpriv,}//7.通过pem编码并写入磁盘文件file, err = os.Create("ca.key")if err != nil {panic(err)}pem.Encode(file, &block)
}func main(){ip := []byte("127.0.0.1")alternateDNS := []string{"localhost"}GenerateSelfSignedCertKey(2048, "192.168.0.1", []net.IP{net.ParseIP(string(ip))}, alternateDNS)
}

查看证书内容

$ openssl x509 -in ca.crt -noout -text
Certificate:Data:Version: 3 (0x2)Serial Number: 1 (0x1)Signature Algorithm: ecdsa-with-SHA256Issuer: CN = 192.168.0.1@1622131917ValidityNot Before: May 27 16:11:57 2021 GMTNot After : May 27 16:11:57 2022 GMTSubject: CN = 192.168.0.1@1622131917Subject Public Key Info:Public Key Algorithm: id-ecPublicKeyPublic-Key: (256 bit)pub:04:7a:09:2f:ec:6b:5b:ed:c7:cd:c0:09:81:ba:d9:e0:0d:7b:06:95:7d:34:7f:16:8b:57:32:e0:9a:49:2c:fc:27:fe:a6:d2:1d:61:d5:aa:77:bf:77:9d:17:dd:7a:22:9f:72:3a:d7:4d:19:f7:f7:1c:50:dd:e1:2b:4c:7f:df:5eASN1 OID: prime256v1NIST CURVE: P-256X509v3 extensions:X509v3 Key Usage: criticalDigital Signature, Key Encipherment, Certificate SignX509v3 Extended Key Usage:TLS Web Server AuthenticationX509v3 Subject Alternative Name:DNS:localhost, IP Address:192.168.0.1, IP Address:127.0.0.1Signature Algorithm: ecdsa-with-SHA25630:45:02:20:34:8b:44:79:04:cf:15:bb:33:34:07:61:cc:74:b7:27:c5:a6:e9:01:9c:b1:bd:ee:29:52:b5:17:a2:7d:63:e0:02:21:00:da:f7:7c:1a:4f:25:d1:c3:b5:19:5d:93:06:fb:8b:41:5b:06:c8:6d:93:a0:b8:14:08:6a:90:1f:0b:84:39:d6

密码技术--证书及go语言生成自签证书相关推荐

  1. 密码技术应用--SM2文件签名验签

    记录一下对一些稍大文件进行SM2签名验签的实现,这里只列出了核心代码,其他不涉及的代码或者有任何疑问可以查看我之前写的密码技术专题博客 /* 函数名: sm2Signsm2 签名算法实现对文件的签名 ...

  2. 密码技术应用--RSA文件签名验签

    记录一下对一些稍大文件进行RSA签名验签的实现,这里只列出了核心代码,其他不涉及的代码或者有任何疑问可以查看我之前写的密码技术专题博客 /* 函数名: rsaSignrsa 签名算法实现对文件的签名 ...

  3. 密码技术--国密证书及go语言生成自签国密证书

    go语言生成自签证书文件(SM2) package mainimport ("crypto/rand""crypto/x509/pkix""encod ...

  4. 精读《图解密码技术》——第十章 证书

    一.证书 1.什么是证书   公钥证书里面包含姓名.组织.邮箱.地址等个人信息,以及属于此人的公钥,并由认证机构施加数字签名,只要看到公钥证书,就可以知道认证机构认定该公钥属于此人,公钥证书也简称为证 ...

  5. 商用密码技术与应用创新的方向是什么?安全牛发布《商密报告》全面揭晓

    编辑 | 宋慧 出品 | CSDN云计算 头图 | 付费下载于东方IC 2021年4月22日,由安全牛举办的2021商用密码技术创新研讨会暨<2021商用密码创新应用指南>(以下简称< ...

  6. 图解密码技术学习笔记

    主题:图解密码技术 简介:密码技术入门学习 参考:译者分享 作者:ybb 时间:2021年12月15日 周自恒直播课学习笔记 4.分组密码的模式 4.1 DES和AES作为对称加密时使用的分组密码只能 ...

  7. 密码应用安全性评估实施要点之二密码技术应用要求与实现要点(4)

    应用和数据安全要求与实现要点 总则 实现要点概述 1) 身份鉴别 2) 访问控制信息和敏感标记完整性 3) 数据传输保密性 4) 数据存储保密性 5) 数据传输完整性 6) 数据存储完整性 7) 日志 ...

  8. 车联网中密码技术的探究

    目录 一.发展 二.面临的威胁 三.密码技术在车联网中的应用 四.国密算法比较 五.总结 一.发展 物联网的实践最早可追溯到1990年施乐公司的网络可乐贩售机--Networked Coke Mach ...

  9. 基于密码技术的应急广播安全解决方案

    当发生重大自然灾害.事故灾难等公共危机时,应急广播能够通过迅速的信息传输通道,在第一时间把灾害消息或灾害可能造成的危害传递到民众手中,让民众在第一时间知道发生了什么事情,应该怎么撤离.避险,从而将生命 ...

最新文章

  1. Deepfake让罗伯特·德尼罗用流利的德语表演台词!差点忘了他是美国人
  2. scrapy proxy and user_agent
  3. python2与python3性能对比_对Python2与Python3中__bool__方法的差异详解
  4. java 时间工具类 大于_Java 时间工具类
  5. maven 对于java的要求_如何在Maven中表达对Java EE功能的依赖以过渡到Java 9?
  6. java xy,java – 某个z深度的xy位置
  7. cloc统计想项目行数
  8. 快去换电池!苹果召回6.3万台MacBook Pro 有你的吗?
  9. C语言和设计模式(适配器模式)
  10. java中bin和src文件夹_编译src中的所有文件?
  11. word2vec的理解
  12. 王建宙称乔布斯故意展开TD-LTE版iPhone
  13. JDK1.8下载、安装和环境配置教程
  14. matlab GUI学习笔记4 如何添加并设置下拉菜单以及GUI解决不用直接用load的问题
  15. IMRAM: Iterative Matching with Recurrent Attention Memory for Cross-Modal Image-Text Retrieval
  16. 1个字节占多少个16进制位
  17. 一文梳理人脸识别,看完全都懂了!
  18. HTML全部标签简介
  19. 怎么实现边下载边播放
  20. jQuery添加元素的方法

热门文章

  1. cvid matlab,WAKE-WIN10-SOFT-软件-Matlab配置及工具箱
  2. oracle standby同步,ORACLE 利用rman增量备份同步standby库
  3. java 中美时间_求教用java编写一个程序要求给定一个日期值,计算若干天后的日期值,和给定两个日期计算它们之间相距的天...
  4. flutter可视化_Flutter 对Dart情有独钟的那些事儿
  5. 成功解决schedule.ScheduleValueError: Invalid time format
  6. 成功解决采用ax.bar进行三维绘图绘制柱状图的时候,横坐标只显示三列而不是数据中的四列
  7. Ubuntu:Ubuntu系统下在pycharm软件内配置anaconda环境(一张图轻松搞定!)
  8. 成功解决The scripts freeze_graph.exe, saved_model_cli.exe, tensorboard.exe, tflite_convert.exe, toco.exe
  9. DL之FasterR-CNN:Faster R-CNN算法的简介(论文介绍)、架构详解、案例应用等配图集合之详细攻略
  10. NPM:nodejs官方包管理工具的简介、安装、使用方法之详细攻略