1 Description
This instruction describes how to generate a fingerprint for a file.
Fingerprints, also known as digests, are calculated on the entire provided Certificate Management file.
2 Procedure
2.1 Generate Fingerprint for A File
Prerequisites
- No documents are required.
- No tools are required.
- The following conditions must apply:
- The user has the System Security Administrator role.
- An Ericsson Command-Line Interface (ECLI) session in Exec mode is in progress.
Steps
- Navigate to the CertMCapabilities managed object:
>dn ManagedElement=NODE06ST,SystemFunctions=1,SecM=1,CertM=1,CertMCapabilities=1
- Show attribute fingerprintSupport:
(CertMCapabilities=1)>show fingerprintSupport
The output shows the algorithm used for calculating the fingerprint, for example:
fingerprintSupport=SHA_224
Here, SHA_224 denotes the algorithm in use.
- Note:
- SHA_224 corresponds to the openssl command-line option -sha224 in the next step.
- Using a command shell, manually generate the fingerprint
for a file using the command openssl with the algorithm
specified in attribute fingerprintSupport as an input option. For example:
shell$ openssl dgst -c -hex -sha224 node06stNodeCredential1.p12
Here, the algorithm used is -sha224.
The output reflects the algorithm used, for example:
SHA224(node06stNodeCredential1.p12)= ba:41:ac:4f:b3:00:10:98:28:47:36:b1:eb:d9:66:33:69:05:7d:c2
- Note:
- The extra space character between = and fingerprint ba:41:ac:4f:b3:00:10:98:28:47:36:b1:eb:d9:66:33:69:05:7d:c2 does not belong to the fingerprint itself.

Contents