Solved

how to convert hash file(dgst format) from Sign file which is in formate of PKCS#7 formate?

Posted on 2016-10-24
6
18 Views
Last Modified: 2016-11-28
i have .Sign file which contain the private key and hash of Image file. how to extract this hash file form .Sign file ???
0
Comment
Question by:kelvin desai
  • 3
  • 2
6 Comments
 
LVL 18

Expert Comment

by:Peter Hutchison
ID: 41856898
If you download OpenSSL, you can use the OpenSSL tool to convert between PEM (Base64), PKCS7 and PKCS12 formats:
E.g.
Convert pkcs7 to PEM:
openssl pkcs7 -in file.p7 -out file.pem -nodes
0
 

Author Comment

by:kelvin desai
ID: 41858025
it showing:

unable to load PKCS7 object
0
 
LVL 18

Expert Comment

by:Peter Hutchison
ID: 41858124
The file might not be pkcs7 format, so try this command:
openssl dgst -in file.p7 -out file.pem -nodes

See this article:
https://www.openssl.org/docs/manmaster/apps/dgst.html
0
Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

 

Author Comment

by:kelvin desai
ID: 41858147
the above case is for encryption, i need decryption of .p7b file, and from that .p7b file i want sign.
0
 
LVL 18

Accepted Solution

by:
Peter Hutchison earned 500 total points
ID: 41858276
By the looks of it, it is not possible to decode such a file back to text. A signature is just  digital signature, not the actual text.

e.g. openssl dgst file.sign

will display a hex printable version of the digital signature
0
 
LVL 13

Expert Comment

by:frankhelk
ID: 41903902
No comment has been added to this question in more than 21 days, so it is now classified as abandoned.

I have recommended this question be closed as follows:

Accept: Peter Hutchison (https:#a41858276)

If you feel this question should be closed differently, post an objection and the moderators will review all objections and close it as they feel fit. If no one objects, this question will be closed automatically the way described above.

frankhelk
Experts-Exchange Cleanup Volunteer
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Exception Handling is in the core of any application that is able to dignify its name. In this article, I'll guide you through the process of writing a DRY (Don't Repeat Yourself) Exception Handling mechanism, using Aspect Oriented Programming.
It was really hard time for me to get the understanding of Delegates in C#. I went through many websites and articles but I found them very clumsy. After going through those sites, I noted down the points in a easy way so here I am sharing that unde…
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now