我正在尝试向服务器发送2048位(256字节)的RSA公钥。我需要将数据作为字节流读取。 我似乎找不到办法。
BIO *memBio = BIO_new(BIO_s_mem());
ASN1_PCTX *asn1=ASN1_PCTX_new();//useless unless I know how to use it
BIO_set_flags(memBio, BIO_FLAGS_WRITE);
int ret=EVP_PKEY_print_private(memBio,rsaAppKeys,0, asn1 );
BUF_MEM *bptr;
BIO_get_mem_ptr(memBio, &bptr);
BIO_set_close(memBio, BIO_NOCLOSE); /* So BIO_free() leaves BUF_MEM alone */
BIO_free(memBio);
它在内存中打印DER格式的密钥,十六进制字节格式化为字符串,每个字节之间有“:”和标题。我可以解析它,但我认为必须有一个更好的方法。 在文档中写道,通过使用ASN1_PCTX我可以微调输出,但我找不到它的任何文档。
有什么想法将密钥作为原始字节获取的简单方法吗? 感谢
答案 0 :(得分:2)
好的..我等不及,所以我设计了一个肮脏的黑客:
我还使用了优秀的http://lapo.it/asn1js/来探索ASN.1结构。 并且https://shanetully.com/2012/04/simple-public-key-encryption-with-rsa-and-openssl/可以将键打印到base64格式的字符串。
//generic method to extract data from an EVP_PKEY
//it's very UGLY. I'm ashamed especially of the ASN.1 parsing (!!)
-(NSData *)getPublicKeyBytes:(EVP_PKEY *)rsaKey{
///try to write bytes
BIO *pub = BIO_new(BIO_s_mem());
//write pub key as this format:
//-----BEGIN RSA PUBLIC KEY-----
//MIIBCgKCAQEA3J7MfnosapxZH9ibxm9Gz88X+ryEEk616BtXGFx3SH1T7ssjdTvv
//pL8FRAvnmHegtNm0JsCFbEWdGzFr1F7BFYu1lj6h7JFPIhlalMMSlGsRP5dzzj8q
//....
//-----END RSA PUBLIC KEY-----
//
PEM_write_bio_RSAPublicKey(pub, rsaKey->pkey.rsa);
size_t pub_len = BIO_pending(pub);
char *pub_key = malloc(pub_len + 1);
BIO_read(pub, pub_key, pub_len);
//zero terminated string
pub_key[pub_len] = '\0';
//transform to nsstring
NSString *plainKey=[[NSString alloc]initWithCString:pub_key encoding:NSASCIIStringEncoding];
//search for header
NSRange range=[plainKey rangeOfString:@"-----BEGIN RSA PUBLIC KEY-----"];
if(range.location==NSNotFound){
DLog(@"Error, RSA pub key in wrong format: %@",plainKey);
return nil;
}
//strip header
plainKey=[plainKey substringFromIndex:range.location+range.length];
//search footer
range=[plainKey rangeOfString:@"-----END RSA PUBLIC KEY-----"];
if(range.location==NSNotFound){
DLog(@"Error, RSA pub key in wrong format: %@",plainKey);
return nil;
}
//strip footer
plainKey=[plainKey substringToIndex:range.location];
//now remove \n
plainKey=[plainKey stringByReplacingOccurrencesOfString:@"\n" withString:@""];
plainKey=[plainKey stringByReplacingOccurrencesOfString:@"\r" withString:@""];
//DLog(@"Plain key stripped %@",plainKey);
//now read as byte
NSData *rsaBytes=[NSData dataWithBase64EncodedString:plainKey];
//DLog(@"Data is %d len %@",rsaBytes.length,rsaBytes);
//unfortunately data is in a ASN1 rame;;
//it's a sequence of 2 element, integer and exponent (65537).
//the key starts from byte 9, or 10.. (byte 9 is a zero).
NSData *pubKeyBytes=[rsaBytes subdataWithRange:NSMakeRange(9, 256)];
DLog(@"pubKeyBytes is %d len %@",pubKeyBytes.length,pubKeyBytes);
return pubKeyBytes;
}
答案 1 :(得分:2)
使用d2i_RSA_PUBKEY()
然后使用BN_bn2bin()
函数将RSA公钥模数转换为大端字节流。
例如
RSA * pubKey = d2i_RSA_PUBKEY(NULL, <der encoded byte stream pointer>, <num bytes>);
BN_bn2bin(pubKey->n, <where to put the result>);