skam wrote:
> I need only the PublicKey inside the certificate
> in order to veryfy the user PrivateKey
> Can u help me?

Use a toolkit like openssl to parse the userCertificate; tell openssl
that the certificate is in binary format (or, if you use the commandline
tool and not the library, use the option "-inform der").

Probably there are some Python bindings for openssl somewhere.

How to use openssl is not in the scope of this list, please visit
www.openssl.org and the mailing list there or your local openssl python
binding vendor... .

Regards,
 j.


> 
> 
> Martin Bartosch ha scritto:
> 
>> Hi,
>>
>>> I'm getting mad...
>>> do you know how to read the userCertificate?
>>> when I query the LDAP server with my python application I got 
>>> something like...
>>>
>>> 'userCertificate;binary': ['0\x82\x05$0\x82\x04\x0c\xa0\x03\x02\x01
>>> \x02\x02\x01\x080\r\x06\t*\x86H\x86\xf7\r\x01\x01\x05\x05\x000-
>>
>>
>>
>> where's the problem? Looks pretty much like a DER encoded certificate.


-------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc. Do you grep through log files
for problems?  Stop!  Download the new AJAX search engine that makes
searching your log files as easy as surfing the  web.  DOWNLOAD SPLUNK!
http://sel.as-us.falkag.net/sel?cmd=lnk&kid=103432&bid=230486&dat=121642
_______________________________________________
Openca-Users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/openca-users

Reply via email to