Attention: this is the key used to sign the certificate requests, anyone holding this can sign certificates on your behalf. So keep it in a safe place!
openssl genrsa -des3 -out rootCA.key 4096
package main | |
import ( | |
"bytes" | |
"context" | |
"crypto/tls" | |
"encoding/json" | |
"fmt" | |
"golang.org/x/oauth2" | |
"golang.org/x/oauth2/microsoft" |
// | |
// AKNativeAnisetteService.m | |
// akd | |
// | |
// Created by Scott Knight on 5/10/19. | |
// Copyright © 2019 Scott Knight. All rights reserved. | |
// | |
#import <AuthKit/AuthKit.h> | |
#import "AKNativeAnisetteService.h" |
import os, hashlib, urllib2, optparse | |
def get_remote_md5_sum(url,algorithm): | |
remote = urllib2.urlopen(url) | |
return hash(remote, algorithm) | |
def hash(remote, algorithm="md5"): | |
max_file_size=100*1024*1024 | |
if algorithm=="md5": | |
hash = hashlib.md5() |
For symmetic encryption, you can use the following: | |
To encrypt: | |
openssl aes-256-cbc -salt -a -e -in plaintext.txt -out encrypted.txt | |
To decrypt: | |
openssl aes-256-cbc -salt -a -d -in encrypted.txt -out plaintext.txt | |
For Asymmetric encryption you must first generate your private key and extract the public key. |