Openssl 是否可以从密钥获取数据?
是否可以从下面这样的密钥中获取任何用户可读的数据Openssl 是否可以从密钥获取数据?,openssl,rsa,m2crypto,Openssl,Rsa,M2crypto,是否可以从下面这样的密钥中获取任何用户可读的数据 uchar DELTA_PUB_KEY[] = { 0x7c, 0x5b, 0x31, 0x88, 0x25, 0x64, 0x43, 0xaa, 0x34, 0x97, 0x6b, 0x7d, 0x22, 0x9a, 0x56, 0xdd, 0x5e, 0xab, 0x2f, 0xd6, 0x10, 0x34, 0x12, 0x6b, 0x12, 0xfa, 0x34, 0x54, 0x33, 0xee, 0x32, 0xde, 0x13,
uchar DELTA_PUB_KEY[] = {
0x7c, 0x5b, 0x31, 0x88, 0x25, 0x64, 0x43, 0xaa,
0x34, 0x97, 0x6b, 0x7d, 0x22, 0x9a, 0x56, 0xdd,
0x5e, 0xab, 0x2f, 0xd6, 0x10, 0x34, 0x12, 0x6b,
0x12, 0xfa, 0x34, 0x54, 0x33, 0xee, 0x32, 0xde,
0x13, 0x54, 0x12, 0x23, 0x98, 0x7e, 0xe6, 0xee
0x34, 0x72, 0x91, 0xfb, 0x67, 0x98, 0x56, 0x34
};
我有一个要求,看看在一个类似于上面的钥匙里面有什么
还有,我应该通过下面的命令获得什么信息
To print out the components of a private key to standard output:
openssl rsa -in key.pem -text -noout
该命令是否用于获取所需的数据?我认为从钥匙上看不到任何信息,但我需要你的意见。请帮我从密钥中获取数据 如果您有结构化格式的密钥,如PEM编码的RSAPrivateKey ASN.1对象,则可以使用OpenSSL等工具打印一些信息。通常,这将只是键的标记部分 例如,运行
openssl rsa-in key.pem-text-noout将产生如下结果:
Private-Key: (512 bit)
modulus:
00:bd:50:d9:87:f5:67:0f:61:f2:4d:f9:0b:5c:c5:
0b:4d:c2:c9:7b:b4:fc:b0:d5:65:0e:ea:b8:36:33:
3a:18:2d:1a:41:76:e5:46:b3:d3:35:34:29:85:ac:
d2:2b:c5:d8:0b:30:80:9f:d5:dd:64:c3:d3:61:32:
f9:67:8c:e9:4b
publicExponent: 65537 (0x10001)
privateExponent:
38:ad:0f:b2:a8:41:26:55:c8:58:97:8a:53:47:9a:
4e:b9:55:e0:77:1a:7f:46:23:6f:07:ce:06:4b:e7:
c4:7c:97:bd:e7:02:f6:0b:28:14:24:d5:b9:48:23:
a1:2c:01:bf:cd:60:40:a9:42:82:7e:1e:73:71:87:
4b:58:d5:61
prime1:
00:f3:0a:f4:7f:48:84:f3:d2:3c:f0:5b:25:d2:f5:
46:76:b5:cf:7d:d3:39:37:03:ba:56:08:2e:ec:01:
3b:0c:35
prime2:
00:c7:68:a1:2e:22:53:03:83:27:f2:28:6a:54:f2:
57:0c:d6:75:d5:ad:d9:ef:08:75:ab:ac:6b:18:59:
37:cf:7f
exponent1:
4a:52:5a:4c:26:18:0a:1b:8b:69:10:e6:73:29:70:
3f:d2:ff:3d:81:ff:28:14:aa:c1:ae:44:f3:04:b9:
52:d5
exponent2:
70:39:37:34:b2:86:8b:9c:7d:97:b0:1d:1f:8f:7f:
64:2f:32:03:be:a2:be:fe:c0:d2:8b:e7:7d:bd:80:
46:5b
coefficient:
00:81:44:0f:d2:71:a7:40:d1:31:43:4e:04:ce:c3:
e4:67:fb:aa:8a:bc:dc:86:7a:74:7f:65:94:b5:b3:
b4:f1:23
私钥:(512位)
模数:
00:bd:50:d9:87:f5:67:0f:61:f2:4d:f9:0b:5c:c5:
0b:4d:c2:c9:7b:b4:fc:b0:d5:65:0e:ea:b8:36:33:
3a:18:2d:1a:41:76:e5:46:b3:d3:35:34:29:85:ac:
d2:2b:c5:d8:0b:30:80:9f:d5:dd:64:c3:d3:61:32:
f9:67:8c:e9:4b
公共指数:65537(0x10001)
私人指数:
38:ad:0f:b2:a8:41:26:55:c8:58:97:8a:53:47:9a:
4e:b9:55:e0:77:1a:7f:46:23:6f:07:ce:06:4b:e7:
c4:7c:97:bd:e7:02:f6:0b:28:14:24:d5:b9:48:23:
a1:2c:01:bf:cd:60:40:a9:42:82:7e:1e:73:71:87:
4b:58:d5:61
prime1:
00:f3:0a:f4:7f:48:84:f3:d2:3c:f0:5b:25:d2:f5:
46:76:b5:cf:7d:d3:39:37:03:ba:56:08:2e:ec:01:
3b:0c:35
prime2:
00:c7:68:a1:2e:22:53:03:83:27:f2:28:6a:54:f2:
57:0c:d6:75:d5:ad:d9:ef:08:75:ab:ac:6b:18:59:
37:cf:7f
指数1:
4a:52:5a:4c:26:18:0a:1b:8b:69:10:e6:73:29:70:
3f:d2:ff:3d:81:ff:28:14:aa:c1:ae:44:f3:04:b9:
52:d5
指数2:
70:39:37:34:b2:86:8b:9c:7d:97:b0:1d:1f:8f:7f:
64:2f:32:03:be:a2:be:fe:c0:d2:8b:e7:7d:bd:80:
46:5b
系数:
00:81:44:0f:d2:71:a7:40:d1:31:43:4e:04:ce:c3:
e4:67:fb:aa:8a:bc:dc:86:7a:74:7f:65:94:b5:b3:
b4:f1:23
您提供的示例数据似乎不是ASN.1,因此我不确定您可以从中获得哪些信息。它只有40个字节,所以可能是320位RSA公钥的模数?如果是这样的话,那就太弱了,不值得使用。为什么这个标签是m2crypto
?您的代码示例似乎不是Python。我是Python开发人员,在应用程序中使用了M2Crypto。我想知道是否有M2Crypto用户成功地从keySorry读取数据,这只是一个示例密钥,因为我没有发布实际密钥的权限。这只是为了表明我的钥匙是相似的。我又更新了8个字节,总共48个字节。@RajeshKumar这是一个有效的示例密钥吗?或者只是你发明的一堆随机字节?如果给你带来不便,很抱歉,但这是一堆随机字节bytes@RajeshKumar好吧,那我就不可能再提建议了。我不知道您的数据是什么格式的。谢谢您,您的信息在任何方面都帮助了我,除了标签零件之外,无法从密钥获取任何信息