Laurent Baudrillard wrote:
> 
> Using OpenSSL command line tools, how can I see (text) the information that is in 
>text blocks like
> 
>         -----BEGIN RSA PRIVATE KEY-----
>         Proc-Type: 4,ENCRYPTED
>         DEK-Info: DES-EDE3-CBC,5D1393D1563CDE2D
> 
>         x5UVAIlcG36HcvCGLCIrdBJgDcISUPx2t6PTLW+oASPXwh7DoBtclREUCH9VVeS8
>         ...
>         jYWcxRkK0zz262BePQoXZWk86mZB34pAarZh4HJ2/cY3j/odDfxmRQ==
>         -----END RSA PRIVATE KEY-----
> 
> 
>           -----BEGIN CERTIFICATE-----
>         MIIB/zCCAamgAwIBAgIBATANBgkqhkiG9w0BAQQFADBUMRMwEQYDVQQKEwpTZW1h
>         ...
>         7yCtFFzYACtTNlcPtpq7z0wXmAOa/2Se5Zub+UbPyuCnAyQ=
>         -----END CERTIFICATE-----
> 
> This comes from a RSA key pair exported from Communicator 4.7. I used "openssl 
>pkcs12 -in Key_Pair.p12" to have the
> content of the PKCS#12 file. What's next ? Do I need to cut the Base64 encoded 
>lines, then Base64 decode them... Then
> decrypt the private key with -des-ede3-cbc with "5D1393D1563CDE2D" as password ? If 
>yes, how exactly ?
> 

You can either use the -nodes option from the pkcs12 utility or use the
rsa utility:

openssl rsa -in file.pem

This will give you an unencrypted base64 output.

If you want a human readable version then:

openssl rsa -in file.pem -text -noout

Lots of this stuff is now documented in the latest snapshots so for more
info RTFM :-)

Steve.
-- 
Dr Stephen N. Henson.   http://www.drh-consultancy.demon.co.uk/
Personal Email: [EMAIL PROTECTED] 
Senior crypto engineer, Celo Communications: http://www.celocom.com/
Core developer of the   OpenSSL project: http://www.openssl.org/
Business Email: [EMAIL PROTECTED] PGP key: via homepage.


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to