openssl 查看和指定rsa密钥E值

部署运行你感兴趣的模型镜像

查看:

#模数和公共指数位于最后一个BIT STRING中,偏移量为19,因此请使用-strparse
xiaojun.zhang@102-ADP:~/tmp$ openssl asn1parse -inform PEM -in ./old_pub.pem -i
    0:d=0  hl=4 l= 290 cons: SEQUENCE
    4:d=1  hl=2 l=  13 cons:  SEQUENCE
    6:d=2  hl=2 l=   9 prim:   OBJECT            :rsaEncryption
   17:d=2  hl=2 l=   0 prim:   NULL
   19:d=1  hl=4 l= 271 prim:  BIT STRING
xiaojun.zhang@102-ADP:~/tmp$ openssl asn1parse -inform PEM -in ./old_pub.pem -i -strparse 19
    0:d=0  hl=4 l= 266 cons: SEQUENCE
    4:d=1  hl=4 l= 257 prim:  INTEGER           :A65A18ADC0B3CEE30C902B7D409BACBB5A4988420AB1E092C08691E69EEFA0E1F12F90F666DDEA155AC028B49DDF520C6EA5C61943AC69A8F25FFE6000A5D23ACC1201F35BBA0C511C2CF4B077B9D672351C0F73CD2F16F9BA8984A09BBF8B5B7FE88B8B9FC871EA1C6C1F00A0EECA3EBF188E579B4866EB8BD44051AE86A186F8D00BFAB62E252E05FF760146D73DEB1F7CFCDF1E828B5EB0CAA3EA16BE2D6E54509CB841EF17C77F6054AAF970A0F8982E82F98C5FFB9C888E77B03272991AE0045EBF1DAAF7F0053CB495DD4DBA3A71A1F8728E1D98E313BACAB027BF87595427F8E8ECC68537D23A95E4A5099AD01FA386B092D8021E3375DB26BF27FC35
  265:d=1  hl=2 l=   3 prim:  INTEGER           :010001
xiaojun.zhang@102-ADP:~/tmp$

指定:
-des 使用des cbc模式对私钥文件进行加密。
-des3 使用des3 cbc模式对私钥文件进行加密。
-idea 使用idea cbc模式对私钥文件进行加密。
-aes128, -aes192, -aes256 使用aes cbc模式对私钥文件进行加密。
-out file 指定输出私钥文件名。
-f4 指定F4做为E值,默认。
-3 指定3做为E值。
-seed arg 指定cbc的随机种子。
-rand file:file 指定随机数种子文件。

xiaojun.zhang@102-ADP:~/tmp$
xiaojun.zhang@102-ADP:~/tmp$ openssl asn1parse -inform PEM -in ./xxk/xx_public_key.pem -i -strparse 19
    0:d=0  hl=4 l= 264 cons: SEQUENCE
    4:d=1  hl=4 l= 257 prim:  INTEGER           :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
  265:d=1  hl=2 l=   1 prim:  INTEGER           :03
xiaojun.zhang@102-ADP:~/tmp$
xiaojun.zhang@102-ADP:~/tmp$
xiaojun.zhang@102-ADP:~/tmp$
xiaojun.zhang@102-ADP:~/tmp$
xiaojun.zhang@102-ADP:~/tmp$ cd xxk/
xiaojun.zhang@102-ADP:~/tmp/xxk$
xiaojun.zhang@102-ADP:~/tmp/xxk$
xiaojun.zhang@102-ADP:~/tmp/xxk$ cat gen.sh
#!/bin/bash
origin=private_key
priname=xx_private_key
pubname=xx_public_key
openssl genrsa -3 -out $origin.pem 2048
openssl rsa -in $origin.pem -out $priname.pem -outform PEM
openssl rsa -in $priname.pem -pubout -out $pubname.pem -outform PEM
openssl rsa -in $priname.pem -out $priname.der -outform der
openssl rsa -in $pubname.pem -out $pubname.der -pubin -outform der



xiaojun.zhang@102-ADP:~/tmp/xxk$
xiaojun.zhang@102-ADP:~/tmp/xxk$ ./gen.sh
Generating RSA private key, 2048 bit long modulus (2 primes)
................................................+++++
......................................+++++
e is 3 (0x03)
writing RSA key
writing RSA key
writing RSA key
writing RSA key
xiaojun.zhang@102-ADP:~/tmp/xxk$
xiaojun.zhang@102-ADP:~/tmp/xxk$
xiaojun.zhang@102-ADP:~/tmp/xxk$ cd ../
xiaojun.zhang@102-ADP:~/tmp$
xiaojun.zhang@102-ADP:~/tmp$ openssl asn1parse -inform PEM -in ./xxk/xx_public_key.pem -i -strparse 19
    0:d=0  hl=4 l= 264 cons: SEQUENCE
    4:d=1  hl=4 l= 257 prim:  INTEGER           :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
  265:d=1  hl=2 l=   1 prim:  INTEGER           :03
xiaojun.zhang@102-ADP:~/tmp$
xiaojun.zhang@102-ADP:~/tmp$

您可能感兴趣的与本文相关的镜像

Seed-Coder-8B-Base

Seed-Coder-8B-Base

文本生成
Seed-Coder

Seed-Coder是一个功能强大、透明、参数高效的 8B 级开源代码模型系列,包括基础变体、指导变体和推理变体,由字节团队开源

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值