Thanks for your help. I prefer to err on the side of caution. Before I delete my plaintext ca.key; I want to be absolutely sure that I get back the exact key when I decrypt it. I'm a noob with this so I don't want to take any chances. Thanks again. > Date: Tue, 6 Jan 2015 23:39:04 +0000 > From: openssl-users at dukhovni.org > To: openssl-users at openssl.org > Subject: Re: [openssl-users] Need help encrypting my ca.key > > On Tue, Jan 06, 2015 at 05:25:21PM -0600, jack seth wrote: > > > Well I ran the command > > openssl asn1parse -in ca.key > > > > I got a bunch of numbers, a hex dump, and something that says 'rsaEncryption' > > In that case, this is a PKCS#8 file encoded in PEM. The first > line was probably: > > -----BEGIN PRIVATE KEY----- > > > It does have MII at the start but it also has ----Begin Private Key---- at the beginning. > > Now that I've read this far, good to see everything still makes > sense. > > > Any more steps to follow to find out what type of key this is? > > It is an RSA key, in PKCS#8 format, encoded as PEM. The "openssl > pkey" command outputs PKCS#8. The "openssl rsa" command outputs > the legacy RSA format. Use "openssl pkey" not "openssl rsa". > > But to be blunt this is all a big waste of time. Both formats work > just fine, and contain identical data, if you bother to check it > with "-text". > > -- > Viktor. > _______________________________________________ > openssl-users mailing list > openssl-users at openssl.org > https://mta.opensslfoundation.net/mailman/listinfo/openssl-users -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://mta.opensslfoundation.net/pipermail/openssl-users/attachments/20150106/f97a9273/attachment.html>