Hi Steve,
Thanks for the clarification. Yes I finally got the matching SKID :)
Sorry for all the silly mistakes.
As I understand we need to create an ASN.1 sequence for both the modulus and
the public exponent and then calculate
the SHA-1 hash which matches the SKID in the certificate.

Dave,
Thanks for the explanation.

Regards,
Tushar

On Sat, Dec 19, 2009 at 7:09 AM, Dr. Stephen Henson <st...@openssl.org>wrote:

> On Fri, Dec 18, 2009, Dave Thompson wrote:
>
> >
> > >     2. openssl asn1parse -inform der -in my.key -strparse 22 -out
> > mypubkey.der
> > >     3. openssl sha1 -c mypubkey.der
> > >     SHA1(mypubkey.der)=
> > 8d:51:f3:a7:03:5a:79:ca:14:1c:5f:9d:92:39:32:28:a8:1e:e3:7f
> >
> > asn1parse -strparse will decode the structure embedded in a field, as
> here,
> > but its output is not DER, not even remotely; it's a human-readable dump.
> >
>
> NB: the -out command line switch writes the field in DER.
>
> Steve.
> --
> Dr Stephen N. Henson. OpenSSL project core developer.
> Commercial tech support now available see: http://www.openssl.org
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           majord...@openssl.org
>

Reply via email to