这是一个家庭作业!我使用get_peer_certificate()和调用dump_certificate将证书转储到一个变量中,从而获得服务器的证书。格式是PEM,在我看来是正确的。
-----BEGIN CERTIFICATE-----
GIBBERISH................
......................
........................
-----END CERTIFICATE-----如何从这个文件('server.pubkey')中提取服务器的公钥,并使用RSA算法和任何python库对plaintext进行加密。在撰写本文时,我使用的是pyOpenSSL
发布于 2011-04-26 22:25:58
我建议使用更广泛的crypto library such as M2Crypto,它具有X509证书功能和RSA:
from M2Crypto import RSA, X509
data = ssl_sock.getpeercert(1)
# load the certificate into M2Crypto to manipulate it
cert = X509.load_cert_string(data, X509.FORMAT_DER)
pub_key = cert.get_pubkey()
rsa_key = pub_key.get_rsa()
cipher = rsa_key.public_encrypt('plaintext', RSA.pkcs1_padding)发布于 2018-04-06 21:20:04
from OpenSSL import crypto
crtObj = crypto.load_certificate(crypto.FILETYPE_ASN1, config.x509_certificate)
pubKeyObject = crtObj.get_pubkey()
pubKeyString = crypto.dump_publickey(crypto.FILETYPE_PEM, pubKeyObject)https://stackoverflow.com/questions/5789193
复制相似问题