Nginx windows compilation add module
1. Installation environment
1.1 installation of MSYS2+MinGW64
1. Download msys2, official address: http://www.msys2.org/ , select the 64 bit installer here
2. After the installation is completed, do not start msys2 first and install it in the root directory / etc / Pacman D / find mirrorlist mingw32,mirrorlist.mingw64 and mirrorlist Msys and ...
Added by Honor on Thu, 03 Mar 2022 10:11:10 +0200
Express security verification -- password encryption and authentication
bcrypt password encryption
In practical applications, it is not safe to store user passwords directly in plaintext. Here is how to use password parsing and parsing
Installing the bcrypt module
yarn add bcrypt
Encryption and parsing function You need to encapsulate promise to avoid errors caused by asynchrony
exports.hash = (myPlaintex ...
Added by wellmoon on Fri, 11 Feb 2022 10:10:44 +0200
OpenSSL3.0 learning 3 encryption library provider CSDN creation punch in
๐ Blog home page: Actor's blog ๐ Welcome to pay attention ๐ give the thumbs-up ๐ Collection โญ Leave a message ๐ โค๏ธ Look forward to communicating together! ๐ The author's level is very limited. If you find an error, please let me know. Thank you! ๐บ If you have any questions, you can communicate by private letter!!!
๐ฅฆ OpenSSL pro ...
Added by guilhenfsu on Fri, 28 Jan 2022 03:39:52 +0200
RSA encryption and decryption using C language based on openssl Library under MacOS
RSA encryption and decryption using C language based on openssl Library under MacOS
1 install openssl and generate the key
First of all, of course, you should install OpenSSL (remember to look at the installation path here, which should be / usr / local / cell)/ openssl@3 Like):
brew install openssl
After installation:
cd /usr/local/inclu ...
Added by shapiro125 on Sun, 09 Jan 2022 10:45:43 +0200
PKI/CA (based on Openssl)
Experiment 7 PKI/CA
1, Experimental purpose
Understand CA certification processMaster the use of openssl command, including public-private key generation, random number generation, certificate application and certificate issuance
2, Experimental content
Use openssl to generate ca certificate and issue certificateUse PKI in the website to co ...
Added by M. Abdel-Ghani on Mon, 29 Nov 2021 19:41:00 +0200
android turns on Https two-way authentication
Last article was written How to turn on https one-way authentication on Android The method of one-way authentication is that the client authenticates the identity of the server.Let's discuss how the server side authenticates the client.
Many people on the Internet say that Android only knows about certificates in BKS f ...
Added by hessian on Wed, 15 Jul 2020 18:28:14 +0300
Linux (programming): 37 -- OpenSSL Library (memory allocation)
1, OpenSSL memory allocation
When users use memory, the error they are prone to make is memory leak. When users call memory allocation and release functions, it is more difficult to find memory leaks. OpenSSL provides built-in memory allocation / release functions. If the user calls OpenSSL's memor ...
Added by wafflestomper on Tue, 16 Jun 2020 06:52:37 +0300
Simple and detailed harbor build
preparation in advance
Offline package download: https://github.com/goharbor/h...
Select 572MB tgz
Hearing that 1.7.6 seems to have a bug, for insurance reasons, I choose 1.8.5
Note minimum installation requirements
Installation steps
Install docker, configure the source below, and install a specific version of docker (reference documentati ...
Added by rodin on Sun, 07 Jun 2020 04:23:22 +0300
K8S Deployment Rancher 2.X Version
Introduction to Rancher
Rancher is a container management platform that helps organizations deploy and manage containers quickly and easily in a production environment.Rancher can easily manage Kubernetes in a variety of environments, meet IT needs, and support the DevOps team.Kubernetes has not only become a container organization standard, ...
Added by dkphp2 on Tue, 12 May 2020 07:11:26 +0300
Asymmetric encryption algorithm in PHP
PHP uses asymmetric encryption algorithm (RSA)
In the daily design and development, in order to ensure the security of data transmission and data storage, the clear data can be encrypted into complex ciphertext by specific algorithm. At present, the mainstream encryption methods can be roughly divided into one-way encryption and two-way encryp ...
Added by czukoman20 on Tue, 21 Apr 2020 06:17:09 +0300