OK thanks a lot
 
> Subject: Re: Verify signed text
> From: w...@omnigroup.com
> Date: Wed, 30 Mar 2011 14:01:24 -0700
> To: openssl-users@openssl.org
> 
> 
> On 30 Mar 2011, at 12:02 PM, luis hernandez wrote:
> > Thanks Wim,
> > 
> > i know that cer pem files have the public key in it like:
> > 
> > -----BEGIN PUBLIC KEY-----
> > MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDD0ltQNthUNUfzq0t1GpIyapjz...
> > -----END PUBLIC KEY-----
> > -----BEGIN CERTIFICATE-----
> > MIIE/TCCA+WgAwIBAgIUMzAwMDEwMDAwMDAxMDAwMDA4MDAwDQYJKoZIhvcNAQEF...
> > -----END CERTIFICATE-----
> > 
> > but what i receive is:
> > signedstring:ki987jjhfw84hf7ewh9f497fe9hihfw87yr79g23hfd937f237fg327f2...
> > certificate:MIIE/TCCA+WgAwIBAgIUMzAwMDEwMDAwMDAxMDAwMDA4MDAwDQYJKoZIhvcNAQEF...
> > some other data...
> > 
> > so from that can i verify the signed string?
> 
> 
> You should be able to either base64-decode the "certificate" text to get a 
> certificate in DER format, or you could surround it by BEGIN/END CERTIFICATE 
> lines to get a certificate in PEM format.
> 
> 
> Even though your .cer files have both a PUBLIC KEY blob and a CERTIFICATE 
> blob, the certificate blob includes all the public-key information needed to 
> verify a message. In effect, a certificate is a copy of your public key 
> that's been signed by the certificate authority.
> 
> 
> ______________________________________________________________________
> OpenSSL Project http://www.openssl.org
> User Support Mailing List openssl-users@openssl.org
> Automated List Manager majord...@openssl.org
                                          

Reply via email to