Tutorial Certificate Conversion and Certificate Testing for APNS

 PUSHTRY.COM reads the certificate and its key from PKCS12 fileCER to PEM

openssl x509 -in aps_development.cer -inform der -out pushtryCert.pem

Private Key’s PKCS12 to PEM

openssl pkcs12 -nocerts -out pushtryKey.pem -in pushtry.p12 MAC verified OK
Enter PEM pass phrase:
Verifying – Enter PEM pass phrase:
Combine CER+KEY to PEM

cat pushtryCert.pem pushtryKey.pem > ck.pem
Inspecting PKCS12

openssl pkcs12 -in pushtry.p12
output will be like:


MAC verified OK
Bag Attributes

—–BEGIN CERTIFICATE—–


—–BEGIN PRIVATE KEY—–

Select appropriate Development or Production, iOS or Mac, and its bundle identifier.
Inspecting PKCS12 structureopenssl pkcs12 -in pushtry.p12 -info -noout

Inspecting PEM

openssl rsa -in pushtry.pem -noout -check
openssl rsa -in pushtry.pem -pubout
openssl x509 -in pushtry.pem -noout -pubkey
PKCS12 to PEM

openssl pkcs12 -in pushtry.p12 -out pushtry.pem -clcerts -aes256
Not Recommended: Below command does not encrypt the private key ():

openssl pkcs12 -in pushtry.p12 -out pushtry.pem -nodes -clcerts
PEM to PKCS12

Click Here To Read Full Blog

Comments

Popular posts from this blog

Tutorial: Guide to setup Push Notifications on iOS and OSX

Tutorial: Guide to Setup up Google Cloud Messaging (GCM) on Android

Migrating from GCM to FCM 2020