This note is about the problems that I met while implementing secure applications.
Certificate Authority
Generate private key and certificate request
Generate a private key private.key
and a certificate request cert_req.pem
. It is very important to keep the private key secret to avoid impersonation.
Check
Check that your certificate signing request is correct
Create a .p12 file
竟然无法拒绝你的打赏