Actually i did try base 64 decoding , only to get nothin in the file..Sorry if i seem extremely ignorant(I am!)..i just started to work on these, cant find tutorials and the only source i have is some man page which doesnt help me much. Heres what i did. I pasted this to a file
AQO2SoMgtzHArqduMTayjjzXvciXeMh97BD5TioQAn4JJC4keaNhXYe0 MKSN/vlk6sAs59Pn/Uh1aHmYQdOKKSSX ran openssl and did base64 -d -in filename -out outfilename outfilename had 0 bytes Sorry if im bothering you guys too much, but im really in need of help Thanks, Sudharsan On 5/15/06, Marek Marcola <[EMAIL PROTECTED]> wrote:
Hello, > I dont really need to care about the private key. I need to know the > format of the public key of DNSSec, cause i am gonna use openSSL to > verify the SIG records signed using a KEY record. Second file generated with dnssec-keygen is dns file record for example: xyz. IN DNSKEY 256 3 1 AQO2SoMgtzHArqduMTayjjzXvciXeMh97BD5TioQAn4JJC4keaNhXYe0 MKSN/vlk6sAs59Pn/Uh1aHmYQdOKKSSX After decoding base64 you will have binary public key with format explained in RFC2537 (not DER). After some work you will have publicExponent (e) and modulus (n). Next you should read this to RSA structure and use for verify. But I'm sure that there should be some more simple way :-) Best regards, -- Marek Marcola <[EMAIL PROTECTED]> ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List openssl-users@openssl.org Automated List Manager [EMAIL PROTECTED]
______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List openssl-users@openssl.org Automated List Manager [EMAIL PROTECTED]