Thank you very much
Regards,
Shariful Alam
On Fri, Sep 3, 2021 at 10:29 AM Matt Caswell wrote:
>
>
> On 03/09/2021 17:24, Shariful Alam wrote:
> > Thank you very much.
> > So the output of "*openssl rsa -in mykey.pem -text -noout*" is a base64
> > hex format?
>
> It's a hex format. "base64 hex"
>
>
>
>
On 03/09/2021 17:24, Shariful Alam wrote:
Thank you very much.
So the output of "*openssl rsa -in mykey.pem -text -noout*" is a base64
hex format?
It's a hex format. "base64 hex" makes no sense. base64 is not hex, and
vice versa.
Matt
Regards,
Shariful
On Fri, Sep 3, 2021 at 7:55 AM
Thank you very much.
So the output of "*openssl rsa -in mykey.pem -text -noout*" is a base64 hex
format?
Regards,
Shariful
On Fri, Sep 3, 2021 at 7:55 AM Matt Caswell wrote:
>
>
> On 03/09/2021 14:49, Billy Brumley wrote:
> >>> Hello,
> >>> Is there any command-line tool to get the plain text r
On 03/09/2021 14:49, Billy Brumley wrote:
Hello,
Is there any command-line tool to get the plain text rsa private key
like the following format from .pem file?
openssl rsa -in mykey.pem -noout -text
It would in fact be much more educational to advocate pkey, which is
cryptosystem agnostic
> > Hello,
> > Is there any command-line tool to get the plain text rsa private key
> > like the following format from .pem file?
>
> openssl rsa -in mykey.pem -noout -text
It would in fact be much more educational to advocate pkey, which is
cryptosystem agnostic
openssl pkey -in mykey.pem -noout
On 03/09/2021 05:58, Shivakumar Poojari wrote:
Hi All,
We are upgrading our code to openssl 3.0. the below function we trying
to replace, searched in the openssl man pages not found proper information.
CRYPTO_thread_id()
The deprecated implementation of this is a no-op (always returns 0)
On 03/09/2021 00:21, Shariful Alam wrote:
Hello,
Is there any command-line tool to get the plain text rsa private key
like the following format from .pem file?
openssl rsa -in mykey.pem -noout -text
Matt
On 02/09/2021 22:47, William Roberts wrote:
I have code that applies PCKS1.5 padding via
RSA_padding_add_PKCS1_type_1 and strips it with
RSA_padding_check_PKCS1_type_2 before sending it to the HSM for raw
RSA operation to support a legacy PKCS11 interface. Is there any way
to perform these tas