Hi Steve, Thanks for the clarification. Yes I finally got the matching SKID :) Sorry for all the silly mistakes. As I understand we need to create an ASN.1 sequence for both the modulus and the public exponent and then calculate the SHA-1 hash which matches the SKID in the certificate.
Dave, Thanks for the explanation. Regards, Tushar On Sat, Dec 19, 2009 at 7:09 AM, Dr. Stephen Henson <st...@openssl.org>wrote: > On Fri, Dec 18, 2009, Dave Thompson wrote: > > > > > > 2. openssl asn1parse -inform der -in my.key -strparse 22 -out > > mypubkey.der > > > 3. openssl sha1 -c mypubkey.der > > > SHA1(mypubkey.der)= > > 8d:51:f3:a7:03:5a:79:ca:14:1c:5f:9d:92:39:32:28:a8:1e:e3:7f > > > > asn1parse -strparse will decode the structure embedded in a field, as > here, > > but its output is not DER, not even remotely; it's a human-readable dump. > > > > NB: the -out command line switch writes the field in DER. > > Steve. > -- > Dr Stephen N. Henson. OpenSSL project core developer. > Commercial tech support now available see: http://www.openssl.org > ______________________________________________________________________ > OpenSSL Project http://www.openssl.org > User Support Mailing List openssl-users@openssl.org > Automated List Manager majord...@openssl.org >