openssl req -x509 -newkey rsa:4096 -sha256 -keyout example.key -out example.crt -subj "/CN=example.com" -days 3650 -passout pass:foobar
openssl x509 -x509toreq -in example.crt -out example.csr -signkey example.key -passin pass:foobar
| pipeline { | |
| agent { | |
| label 'agentId' //The id of the slave/agent where the build should be executed, if it doesn't matter use "agent any" instead. | |
| } | |
| triggers { | |
| cron('H */8 * * *') //regular builds | |
| pollSCM('* * * * *') //polling for changes, here once a minute | |
| } |
| 23.21.150.121:3478 | |
| iphone-stun.strato-iphone.de:3478 | |
| numb.viagenie.ca:3478 | |
| s1.taraba.net:3478 | |
| s2.taraba.net:3478 | |
| stun.12connect.com:3478 | |
| stun.12voip.com:3478 | |
| stun.1und1.de:3478 | |
| stun.2talk.co.nz:3478 | |
| stun.2talk.com:3478 |
openssl req -x509 -newkey rsa:4096 -sha256 -keyout example.key -out example.crt -subj "/CN=example.com" -days 3650 -passout pass:foobar
openssl x509 -x509toreq -in example.crt -out example.csr -signkey example.key -passin pass:foobar
| # Generate Private Key and Certificate using RSA 256 encryption (4096-bit key) | |
| openssl req -x509 -newkey rsa:4096 -keyout privatekey.pem -out certificate.pem -days 365 | |
| # Alternatively, setting the "-newkey" parameter to "rsa:2048" will generate a 2048-bit key. | |
| # Generate PKCS#12 (P12) file for cert; combines both key and certificate together | |
| openssl pkcs12 -export -inkey privatekey.pem -in certificate.pem -out cert.pfx | |
| # Generate SHA256 Fingerprint for Certificate and export to a file | |
| openssl x509 -noout -fingerprint -sha256 -inform pem -in certificate.pem >> fingerprint.txt |