The hash algorithm is unique, that is, the certificate code is converted into fixed-length binary, which is irreversible, that is, the certificate code cannot be restored by hash value.
If not, you can consider changing it.
SHA stands for secure hash algorithm. SHA- 1 and SHA-2 are two different versions of this algorithm with different structures and signature lengths, but SHA-2 can be understood as the successor of SHA- 1.
Extended data:
Certificate file format:
1, csr, the request file format used to apply for signature from CA.
2, cer or crt, public key certificate, uncertain encoding method, mostly used in Windows.
3. The encoding method of key, public key or private key is uncertain.
4, pem, public key or private key or public key and private key, BASE64 encoding format, mostly used in Linux.
5, pfx, including public key and private key, DER encoding binary format, mostly used in Windows.