Actually i did try base 64 decoding , only to get nothin in the
file..Sorry if i seem extremely ignorant(I am!)..i just started to
work on these, cant find tutorials and the only source i have is some
man page which doesnt help me much.
Heres what i did. I pasted this to a file

AQO2SoMgtzHArqduMTayjjzXvciXeMh97BD5TioQAn4JJC4keaNhXYe0
MKSN/vlk6sAs59Pn/Uh1aHmYQdOKKSSX

ran openssl and did base64 -d -in filename -out outfilename

outfilename had 0 bytes
Sorry if im bothering you guys too much, but im really in need of help

Thanks,
Sudharsan



On 5/15/06, Marek Marcola <[EMAIL PROTECTED]> wrote:
Hello,

> I dont really need to care about the private key. I need to know the
> format of the public key of DNSSec, cause i am gonna use openSSL to
> verify the SIG records signed using a KEY record.

Second file generated with dnssec-keygen is dns file record
for example:
       xyz. IN DNSKEY 256 3 1
AQO2SoMgtzHArqduMTayjjzXvciXeMh97BD5TioQAn4JJC4keaNhXYe0
MKSN/vlk6sAs59Pn/Uh1aHmYQdOKKSSX

After decoding base64 you will have binary public key
with format explained in RFC2537 (not DER). After some work you will
have publicExponent (e) and modulus (n).
Next you should read this to RSA structure and use for verify.

But I'm sure that there should be some more simple way :-)

Best regards,
--
Marek Marcola <[EMAIL PROTECTED]>

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to