: RSA pri key storage format

2000-09-11 Thread

no default format.
if you use openssl, pem is default.It is DER encode of you private key, then 
base64 it. with addtion  alogorithm information, it became .pem file.
PKCS is another format to store one' s certificate of private key or crl.  Not 
strange, often used by IE, Netscape. It can just store private key. 

The reason you lost your password in converting you private key file because you have 
not assign a aloghrithm and a psssword

-原始邮件-
发件人: [EMAIL PROTECTED] 
[mailto:[EMAIL PROTECTED]]代表 zhu qun-ying
发送时间: 2000年9月11日 15:15
收件人: openssl-users
主题: RSA pri key storage format


Hi,

What are the default key format use to store the RSA private key. It is written
in PEM format with password protection. Does it follow the PKCS#5? When I
convert the PEM format to DER, I lost the password protections. One of my friend
use a strange PKCS#12 format to store the private key which does not contain any
cert. Is that good or bad?

Regards
qun-ying
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]

 smime.p7s


Re: ??: RSA pri key storage format

2000-09-11 Thread zhu qun-ying



?? wrote:
 
 no default format.
 if you use openssl, pem is default.It is DER encode of you private key, then 
base64 it. with addtion  alogorithm information, it became .pem file.
 PKCS is another format to store one' s certificate of private key or crl.  Not 
strange, often used by IE, Netscape. It can just store private key.
 
 The reason you lost your password in converting you private key file because you 
have not assign a aloghrithm and a psssword
 
But the default behavior of the 'openssl rsa' only output PBE on PEM format, for
DER is only the plain DER of the key. What are the common format to store
private key? Is PKCS12 without cert a particle way? or use PKCS5?
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]