How to convert a public key from a JWK into PEM for OpenSSL?

后端 未结 6 1342
感情败类
感情败类 2021-01-02 05:35

There is an RSA key from an RFC:

https://tools.ietf.org/html/rfc7516#appendix-A.1

 {\"kty\":\"RSA\",
  \"n\":\"oahUIoWw0K0usKNuOR6H4wkf4oBUXHTxRvgb48         


        
相关标签:
6条回答
  • 2021-01-02 06:06

    I wrote a command line tool called lokey to help with key conversions like this one.

    Using curl, grep, and tr to grab the key from question, we can convert the JWK formatted private key into a PEM formatted private key with this command:

    $ curl -s https://tools.ietf.org/rfc/rfc7516.txt | grep '"n":"oahUI' -B1 -A28 | tr -d '[:space:]' | lokey to pem
    
    -----BEGIN RSA PRIVATE KEY-----
    MIIEowIBAAKCAQEAoahUIoWw0K0usKNuOR6H4wkf4oBUXHTxRvgb48E+BVvxkeDN
    jbC4he8rUWcJoZmds2h7M70imEVhRU5djINXtqllXI4DFqcI1DgjT9LewND8MW2K
    rf3Spsk/ZkoFnilakGygTwpZ3uesH+PFABNIUYpOiN15dsQRkgr0vEhxN92i2asb
    OenSZeyaxziK72UwxrrKoExv6kc5twXTq4h+QChLOln0/mtUZwfsRaMStPs6mS6X
    rgxnxbWhojf663tuEQueGC+FCMfra36C9knDFGzKsNa7LZK2djYgyD3JR/MB/4NU
    JW/TqOQtwHYbxevoJArm+L5StowjzGy+/bq6GwIDAQABAoIBAQCQt20iPoZsOSz8
    CkJJNhC16Vw222UqI7I/Mytcd4j7KTUXv6SkPFjj5Zjk1ZXkqe1oR5dLWPzYTfvn
    HGFYwdfK+Nh5w9P1+nBH8z2BXyf0euHZqdOlMP3cO3rbKlbfIOwnMGdOeti7WLBZ
    GAEqsRhjjqoBkisDbEDCebZfu4ZHWGCGSoOnRWqPeRtILPVfJ8Kzr8t6EHC3EcjK
    HxGKnLjSnbiag4BuDFXDevFP++W3dRV7hY7cmQk7OWlR/4pNUjY+2Cb50BHFMS0T
    6J37g4mvSH4r5UWzdVKd1VMjOdLF/KuPwgsvowb9S/xgC7tUgtIHeU5bTzn7ioTc
    POCtOODJAoGBANa+dl5OOnPi7HweT+ONqe2rXT1K8UEsuJrYv7WSNzIH9hLhVW1K
    Awb2kUPklsZG5JqBMy+yV66EgY0qyt2CEIGHTIMgBD0z417/4SNv9Xk0j1WX8y9J
    X3zZ9NyF6lheTAxbqFGBNIc29r4a5Tf6yq23wyMFG06444InkW8AugpdAoGBAMC2
    9+ce4ZkFmbFiZgf75XvO4oYGdfUvJQRETiyLGRuGsmVXvR4vYA1QjgZlA3Wg2FU0
    jcf/BcsNWGGvVxqxpw3sNNCdvHEVKHgQf4yiNaJmtDq79U/WlyFsSsHeIL8RSJjl
    q90ES/ShAUc5NkWrVAZ5g2SUyAH8E7NIOvFGR77XAoGAZK+YwE7diUh0qR1tR7w8
    WHtolDx3MZ/OTowiFvgfeQ3SiresXjm9gZ5KLhMXvo+uz+KUJWDxS5pFQ/M0evdo
    1dKiRTjVw/x4NyqyXPM5nULPkcpU827rnpZzAJKpdhWAgqrXGKAECQH0Xt4taznj
    nd/zVpAmZZq60WPMBMfKcuECgYAOrSB+AnUN0UZeIu9ARme4oQ3RRSawkHGSPJ1z
    ePhlh0GIxEDLzrHS8cKPLBwyVhiDjKgLhhlr2E1VyyOoDcV6IvX2uTyDpCfb1O3R
    yPyqrIWnP280MFR8ICIlV4RI6MkNk9gd0djy/Vv6j5nZfm28vH5MJ6R/ujHJ4oNS
    opaOKwKBgFSDKTGGz3+O3U9cP8w1F3z4prEnoJzDgNc02l+2hpP/Lq2OkfPmVtRc
    VOwJVgMi1sm6qurdelRXe4UHdMun5VCuEpTsnQetYMGpzrFxjgDr/NnB6tBN3i+B
    67WZFLir5z6zJ7FFBZX1Hcm1c8co8/SRf18mmNeGq3S0o3+C/xTW
    -----END RSA PRIVATE KEY-----
    

    lokey also has a fetch command that can be used to fetch JWK keys from OpenID endpoints:

    $ lokey fetch jwk example.okta.com
    $ lokey fetch jwk login.salesforce.com
    $ lokey fetch jwk accounts.google.com
    

    You can then pipe this output into lokey again to get a PEM:

    $ lokey fetch jwk example.okta.com | lokey to pem
    
    0 讨论(0)
  • 2021-01-02 06:09

    I wrote a Swift library that is able to convert public/private keys from JWK to PEM PKCS#8 encoding.

    You can use it by:

    import JWKTransform
    
    let key = try RSAKey(jwk: token)
    let publicPem = try key.getPublicKey()
    let privatePem = try key.getPrivateKey()
    

    Regarding the actual JWK, the RSA fields you included mean the following:

    • parameter n: Base64 URL encoded string representing the modulus of the RSA Key.
    • parameter e: Base64 URL encoded string representing the public exponent of the RSA Key.
    • parameter d: Base64 URL encoded string representing the private exponent of the RSA Key.
    • parameter p: Base64 URL encoded string representing the secret prime factor of the RSA Key.
    • parameter q: Base64 URL encoded string representing the secret prime factor of the RSA Key.
    • parameter dp: Base64 URL encoded string representing the first factor CRT exponent of the RSA Key. d mod (p-1)
    • parameter dq: Base64 URL encoded string representing the second factor CRT exponent of the RSA Key. d mod (q-1)
    • parameter qi: Base64 URL encoded string representing the first CRT coefficient of the RSA Key. q^-1 mod p

    I have included next to each parameter, it's corresponding field in OpenSSL's RSA structure. This is only in case you want to deal with OpenSSL directly :-)

    Also note that if you compare the keys that are produced using the referenced library with OpenSSL-generated RSA keys:

    • public key: This library should produce the public key that OpenSSL generates.

    • private key: RSA private key only requires q but RSA operations are generally much faster when the rest of the values above are provided. The OpenSSL generated RSA private key files includes these values. Therefore if not all private paramters are provided, then the produced private key might not be an exact match to the original OpenSSL generated.

    0 讨论(0)
  • 2021-01-02 06:15

    Some python code to convert a JWK to PEM

    
    import jwt
    from cryptography.hazmat.primitives import serialization
    
    def GetClaim(webtoken):
        webkey = 'insert jwk here'
        public_key = jwt.algorithms.RSAAlgorithm.from_jwk(webkey)
        pubk_bytes = public_key.public_bytes(encoding=serialization.Encoding.PEM,format=serialization.PublicFormat.SubjectPublicKeyInfo)
        claim = jwt.decode(webtoken, pubk_bytes, algorithms=['RS256'])
        return claim
    
    0 讨论(0)
  • 2021-01-02 06:23

    So the key that you posted is a simple asn sequence of a a public key and the public exponent. It looks something like this:

    SEQUENCE ::= {
        n Integer,
        e Integer
    }
    

    OpenSSL doesn't like that as-is because it's missing a few other things, like an ObjectIdenifier so that openssl knows what algorithm the key is for.

    The quick way to fix this is to also put in the -RSAPublicKey_in option, so the full command will look something like this:

    openssl rsa -inform pem -in FILEPATH.pem -pubin -pubout -RSAPublicKey_in
    

    and change the header of the file back to include "RSA":

    -----BEGIN RSA PUBLIC KEY-----
    

    as well as the footer:

    -----END RSA PUBLIC KEY-----
    

    This will also output it in to a "normal" public key format that includes the missing ObjectIdentifier.

    Note: I'm not sure what the version requirement for -RSAPublicKey_in are, but I was using OpenSSL 1.1.0.

    0 讨论(0)
  • 2021-01-02 06:23

    Online tool for doing the conversion: https://keytool.online/

    0 讨论(0)
  • 2021-01-02 06:27

    I developed a a PHP class that is able to convert public/private keys from JWK to PEM (and vice versa).

    You will find that class here.

    Basically, you have to decode each component from Base64UrlSafe to a binary string and assemble all of them according to the ASN.1 Structure described in the RFC3447.

    Nevertheless, I recommend you to use a dedicated library/tool for that to ease your work. With my PHP library, your code will looks like:

    use  Jose\KeyConverter\RSAKey;
    $key = new RSAKey([
        "kty" => "RSA",
        "n"   => "oahUIoWw0K0usKNuOR6H4wkf4oBUXHTxRvgb48E-BVvxkeDNjbC4he8rUWcJoZmds2h7M70imEVhRU5djINXtqllXI4DFqcI1DgjT9LewND8MW2Krf3Spsk_ZkoFnilakGygTwpZ3uesH-PFABNIUYpOiN15dsQRkgr0vEhxN92i2asbOenSZeyaxziK72UwxrrKoExv6kc5twXTq4h-QChLOln0_mtUZwfsRaMStPs6mS6XrgxnxbWhojf663tuEQueGC-FCMfra36C9knDFGzKsNa7LZK2djYgyD3JR_MB_4NUJW_TqOQtwHYbxevoJArm-L5StowjzGy-_bq6Gw",
        "e"   => "AQAB",
        "d"   => "kLdtIj6GbDks_ApCSTYQtelcNttlKiOyPzMrXHeI-yk1F7-kpDxY4-WY5NWV5KntaEeXS1j82E375xxhWMHXyvjYecPT9fpwR_M9gV8n9Hrh2anTpTD93Dt62ypW3yDsJzBnTnrYu1iwWRgBKrEYY46qAZIrA2xAwnm2X7uGR1hghkqDp0Vqj3kbSCz1XyfCs6_LehBwtxHIyh8Ripy40p24moOAbgxVw3rxT_vlt3UVe4WO3JkJOzlpUf-KTVI2Ptgm-dARxTEtE-id-4OJr0h-K-VFs3VSndVTIznSxfyrj8ILL6MG_Uv8YAu7VILSB3lOW085-4qE3DzgrTjgyQ",
        "p"   => "1r52Xk46c-LsfB5P442p7atdPUrxQSy4mti_tZI3Mgf2EuFVbUoDBvaRQ-SWxkbkmoEzL7JXroSBjSrK3YIQgYdMgyAEPTPjXv_hI2_1eTSPVZfzL0lffNn03IXqWF5MDFuoUYE0hzb2vhrlN_rKrbfDIwUbTrjjgieRbwC6Cl0",
        "q"   => "wLb35x7hmQWZsWJmB_vle87ihgZ19S8lBEROLIsZG4ayZVe9Hi9gDVCOBmUDdaDYVTSNx_8Fyw1YYa9XGrGnDew00J28cRUoeBB_jKI1oma0Orv1T9aXIWxKwd4gvxFImOWr3QRL9KEBRzk2RatUBnmDZJTIAfwTs0g68UZHvtc",
        "dp"  => "ZK-YwE7diUh0qR1tR7w8WHtolDx3MZ_OTowiFvgfeQ3SiresXjm9gZ5KLhMXvo-uz-KUJWDxS5pFQ_M0evdo1dKiRTjVw_x4NyqyXPM5nULPkcpU827rnpZzAJKpdhWAgqrXGKAECQH0Xt4taznjnd_zVpAmZZq60WPMBMfKcuE",
        "dq"  => "Dq0gfgJ1DdFGXiLvQEZnuKEN0UUmsJBxkjydc3j4ZYdBiMRAy86x0vHCjywcMlYYg4yoC4YZa9hNVcsjqA3FeiL19rk8g6Qn29Tt0cj8qqyFpz9vNDBUfCAiJVeESOjJDZPYHdHY8v1b-o-Z2X5tvLx-TCekf7oxyeKDUqKWjis",
        "qi"  => "VIMpMYbPf47dT1w_zDUXfPimsSegnMOA1zTaX7aGk_8urY6R8-ZW1FxU7AlWAyLWybqq6t16VFd7hQd0y6flUK4SlOydB61gwanOsXGOAOv82cHq0E3eL4HrtZkUuKvnPrMnsUUFlfUdybVzxyjz9JF_XyaY14ardLSjf4L_FNY",
    ]);
    $pem = $key->toPEM();
    
    0 讨论(0)
提交回复
热议问题