I have lately been trying to learn more about the inner workings of PEM
certificates. After reading to documentation from: X5**, RFC1421-4, RFC's
for X5**, and the PKCS I have a rough understanding of how the individual
portions of a certificate are constructed. I will be pulling down NIST
500-183 later today to get the algorithm ID to Number mappings. However
what I feel would help the most is if someone could send an example
certificate I could use to verify that what I have found in the other sources
is actually what is used in practice.
Thank you,
Chris Gorsuch
Texas Instruments
IS&S Information Security
chrisg(_at_)lobby(_dot_)ti(_dot_)com