Laurent Baudrillard wrote:
>
> Using OpenSSL command line tools, how can I see (text) the information that is in
>text blocks like
>
> -----BEGIN RSA PRIVATE KEY-----
> Proc-Type: 4,ENCRYPTED
> DEK-Info: DES-EDE3-CBC,5D1393D1563CDE2D
>
> x5UVAIlcG36HcvCGLCIrdBJgDcISUPx2t6PTLW+oASPXwh7DoBtclREUCH9VVeS8
> ...
> jYWcxRkK0zz262BePQoXZWk86mZB34pAarZh4HJ2/cY3j/odDfxmRQ==
> -----END RSA PRIVATE KEY-----
>
>
> -----BEGIN CERTIFICATE-----
> MIIB/zCCAamgAwIBAgIBATANBgkqhkiG9w0BAQQFADBUMRMwEQYDVQQKEwpTZW1h
> ...
> 7yCtFFzYACtTNlcPtpq7z0wXmAOa/2Se5Zub+UbPyuCnAyQ=
> -----END CERTIFICATE-----
>
> This comes from a RSA key pair exported from Communicator 4.7. I used "openssl
>pkcs12 -in Key_Pair.p12" to have the
> content of the PKCS#12 file. What's next ? Do I need to cut the Base64 encoded
>lines, then Base64 decode them... Then
> decrypt the private key with -des-ede3-cbc with "5D1393D1563CDE2D" as password ? If
>yes, how exactly ?
>
You can either use the -nodes option from the pkcs12 utility or use the
rsa utility:
openssl rsa -in file.pem
This will give you an unencrypted base64 output.
If you want a human readable version then:
openssl rsa -in file.pem -text -noout
Lots of this stuff is now documented in the latest snapshots so for more
info RTFM :-)
Steve.
--
Dr Stephen N. Henson. http://www.drh-consultancy.demon.co.uk/
Personal Email: [EMAIL PROTECTED]
Senior crypto engineer, Celo Communications: http://www.celocom.com/
Core developer of the OpenSSL project: http://www.openssl.org/
Business Email: [EMAIL PROTECTED] PGP key: via homepage.
______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]