# This is Microsoft's use of the "othername" type to embed the UPN which is
an arbitrary field with no meaning in the x509 standard and therefore not
parsed by the openssl command x509. You can dump it by discovering the byte
offset of the SAN with an ASN1 browser like this:





--
View this message in context: 
http://openssl.6102.n7.nabble.com/How-to-read-the-Principal-Name-tp45083p45739.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to