abh*_*bhi 5 python cryptography openssh python-cryptography
我正在以这种方式使用python加密模块生成EC密钥
from cryptography.hazmat.backends import default_backend
from cryptography.hazmat.primitives.asymmetric import ec
key=ec.generate_private_key(ec.SECP256R1(), default_backend())
Run Code Online (Sandbox Code Playgroud)
EC密钥的asn.1结构如下
ECPrivateKey ::= SEQUENCE {
version INTEGER { ecPrivkeyVer1(1) } (ecPrivkeyVer1),
privateKey OCTET STRING,
parameters [0] ECParameters {{ NamedCurve }} OPTIONAL,
publicKey [1] BIT STRING OPTIONAL
}
Run Code Online (Sandbox Code Playgroud)
来自https://tools.ietf.org/html/rfc5915 setion 3.
我的问题是如何从这个密钥中获取ASN.1组件.我想将密钥对象转换为OpenSSH私钥,类似于
-----BEGIN EC PRIVATE KEY-----
Proc-Type: 4,ENCRYPTED
DEK-Info: AES-128-CBC,9549ED842979FDAF5299BD7B0E25B384
Z+B7I6jfgC9C03Kcq9rbWKo88mA5+YqxSFpnfRG4wkm2eseWBny62ax9Y1izGPvb
J7gn2eBjEph9xobNewgPfW6/3ZDw9VGeaBAYRkSolNRadyN2Su6OaT9a2gKiVQi+
mqFeJmxsLyvew9XPkZqQIjML1d1M3T3oSA32zYX21UY=
-----END EC PRIVATE KEY-----
Run Code Online (Sandbox Code Playgroud)
处理DSA或RSA很容易,因为所有ASN.1参数都是整数.
先感谢您
使用pyasn1从 ASN.1 序列中提取公共点相对容易,但如果您想要 PEM 加密的 PKCS1(又名“传统 OpenSSL”),那么 pyca/cryptography 可以很容易地做到这一点:
from cryptography.hazmat.backends import default_backend
from cryptography.hazmat.primitives import serialization
from cryptography.hazmat.primitives.asymmetric import ec
backend = default_backend()
key = ec.generate_private_key(ec.SECP256R1(), backend)
serialized_key = key.private_bytes(
serialization.Encoding.PEM,
serialization.PrivateFormat.TraditionalOpenSSL,
serialization.BestAvailableEncryption(b"my_great_password")
)
Run Code Online (Sandbox Code Playgroud)
您可以在文档中找到有关private_bytes方法的更多信息。这时候BestAvailableEncryption
就会使用加密AES-256-CBC
。