PePLink Surf User
’
s Manual v2.6
Copyright
©
1999-2006 PePLink Ltd. All Rights Reserved
Page 29 of 30
openssl ca -policy policy_anything -passin pass:democa -in
~/myCert/server_req.pem -days 8000 -out ~/myCert/server_cert.pem
Then a series of questions will be asked (details will vary in your case):
Using configuration from /usr/share/ssl/openssl.cnf
Check that the request matches the signature
Signature ok
Certificate Details:
Serial Number: 1 (0x1)
Validity
Not Before: Aug 24 04:58:01 2005 GMT
Not After : Jul 20 04:58:01 2027 GMT
Subject:
countryName = US
stateOrProvinceName = US
localityName = US
organizationName = My Company Ltd
commonName = myserver.com
X509v3 extensions:
X509v3 Basic Constraints:
CA:FALSE
Netscape Comment:
OpenSSL Generated Certificate
X509v3 Subject Key Identifier:
0E:D5:E9:F6:A5:B6:88:51:EB:22:8C:ED:C3:AA:17:A1:A8:FC:EC:92
X509v3 Authority Key Identifier:
keyid:85:B5:08:F3:21:1B:99:5D:E1:4B:D1:57:2C:EC:9C:00:A2:F4:24:9B
DirName:/C=US/ST=US/L=US/O=My Company Ltd/CN=demoCA
serial:00
Certificate is to be certified until Jul 20 04:58:01 2027 GMT (8000 days)
Sign the certificate? [y/n]:y
1 out of 1 certificate requests certified, commit? [y/n]y
Write out database with 1 new entries
Data Base Updated
(The signed server certificate is now in "~
/myCert/server_cert.pem
")