吾爱汇编

 找回密码
 立即注册

QQ登录

绑定QQ避免忘记帐号

查看: 6849|回复: 8

rsa公私钥格式转换

[复制链接]
蒋阿君 发表于 2025-6-29 10:19 | 显示全部楼层 |阅读模式

本站严厉禁止求脱求破行为(包含无自我分析直接求思路),如发现此类求助主题请点击“举报”,让我们共同维护优质的学习环境!


30HB
本帖最后由 蒋阿君 于 2025-6-29 10:46 编辑

[Java] 纯文本查看 复制代码
#pragma once

unsigned char KeyPub[283] = 	{
	0x52, 0x53, 0x41, 0x31, 0x00, 0x08, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x01, 0xCE, 0x28, 0x38, 
	0x0C, 0x8E, 0x7D, 0x38, 0x13, 0x53, 0xF3, 0x3D, 0xC5, 0x52, 0x82, 0x52, 0x03, 0xD6, 0xEA, 0xE8, 0xDE, 0x8A, 0x97, 0x7C, 0x8C, 0xBD, 0x37, 0xA1, 0xB0, 0xC6, 0xDC, 0x5C, 0x22, 0x9D, 
	0x8E, 0x21, 0xD0, 0xA7, 0x2E, 0x2E, 0x15, 0xD9, 0x07, 0x6A, 0x0E, 0xB4, 0xC6, 0xC4, 0xA6, 0x61, 0x21, 0x92, 0x15, 0x32, 0xF7, 0xF0, 0x23, 0x6B, 0xDC, 0x13, 0x1C, 0x0B, 0x54, 0x22, 
	0x4E, 0x6C, 0x6D, 0x91, 0x66, 0xDA, 0x50, 0x05, 0xC2, 0xE2, 0x02, 0x5E, 0xEA, 0x32, 0xDD, 0x1D, 0x78, 0x21, 0x21, 0x26, 0x0F, 0x06, 0x7B, 0x9A, 0x8E, 0xAB, 0x3D, 0xFD, 0x4E, 0x01, 
	0xFF, 0x43, 0x71, 0x7D, 0x5E, 0xC8, 0x0B, 0xE5, 0x58, 0xC0, 0x97, 0xA0, 0x31, 0xE5, 0x73, 0xAE, 0x33, 0xB1, 0x24, 0xE5, 0x84, 0xBD, 0x08, 0x49, 0x07, 0x03, 0xAA, 0xD8, 0x05, 0xF4, 
	0x1A, 0x99, 0xD7, 0xA6, 0x03, 0x9D, 0x64, 0xBA, 0x7D, 0xA2, 0x2A, 0x78, 0xE0, 0xA4, 0x93, 0xAF, 0x65, 0x8C, 0xAF, 0x2F, 0xEF, 0xEF, 0xDB, 0x0F, 0x98, 0xFE, 0x17, 0x3B, 0x15, 0x7B, 
	0x37, 0x56, 0x0B, 0x1B, 0xC8, 0x06, 0x36, 0x73, 0x99, 0x8A, 0xF6, 0x13, 0xDA, 0xC5, 0xCC, 0x85, 0x69, 0x53, 0x10, 0x51, 0x76, 0xB6, 0x62, 0xD2, 0x01, 0xC6, 0xA1, 0xA0, 0x6E, 0x83, 
	0xDB, 0xB5, 0x0C, 0x37, 0x9B, 0x5D, 0x9A, 0xFB, 0x8A, 0xCD, 0x6D, 0x06, 0x4C, 0x41, 0x46, 0x6E, 0x4D, 0xC4, 0x1B, 0x7A, 0x09, 0x95, 0xE9, 0xD0, 0xB8, 0x7F, 0x63, 0x83, 0xB3, 0xA2, 
	0xF1, 0x6B, 0x24, 0xDB, 0x4F, 0x7B, 0xE5, 0xC0, 0x3B, 0x2C, 0x8B, 0xD1, 0x9A, 0xA4, 0xDE, 0xAC, 0x68, 0xC0, 0x37, 0x65, 0xE0, 0x38, 0x3D, 0x75, 0x7C, 0x08, 0x7D, 0x8F, 0xAB, 0x42, 
	0xD0, 0x69, 0xF0, 0xF4, 0xDA, 0x6F, 0xC9, 0xDF, 0xBF, 0xF9, 0xFC, 0xDC, 0x85, 
};

上面公钥pem为:
-----BEGIN PUBLIC KEY-----
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAzig4DI59OBNT8z3FUoJS
A9bq6N6Kl3yMvTehsMbcXCKdjiHQpy4uFdkHag60xsSmYSGSFTL38CNr3BMcC1Qi
TmxtkWbaUAXC4gJe6jLdHXghISYPBnuajqs9/U4B/0NxfV7IC+VYwJegMeVzrjOx
JOWEvQhJBwOq2AX0GpnXpgOdZLp9oip44KSTr2WMry/v79sPmP4XOxV7N1YLG8gG
NnOZivYT2sXMhWlTEFF2tmLSAcahoG6D27UMN5tdmvuKzW0GTEFGbk3EG3oJlenQ
uH9jg7Oi8Wsk20975cA7LIvRmqTerGjAN2XgOD11fAh9j6tC0Gnw9Npvyd+/+fzc
hQIDAQAB
-----END PUBLIC KEY-----


unsigned char KeyPri[539] = 	{
	0x52, 0x53, 0x41, 0x32, 0x00, 0x08, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x80, 0x00, 0x00, 0x00, 0x80, 0x00, 0x00, 0x00, 0x01, 0x00, 0x01, 0xCE, 0x28, 0x38, 
	0x0C, 0x8E, 0x7D, 0x38, 0x13, 0x53, 0xF3, 0x3D, 0xC5, 0x52, 0x82, 0x52, 0x03, 0xD6, 0xEA, 0xE8, 0xDE, 0x8A, 0x97, 0x7C, 0x8C, 0xBD, 0x37, 0xA1, 0xB0, 0xC6, 0xDC, 0x5C, 0x22, 0x9D, 
	0x8E, 0x21, 0xD0, 0xA7, 0x2E, 0x2E, 0x15, 0xD9, 0x07, 0x6A, 0x0E, 0xB4, 0xC6, 0xC4, 0xA6, 0x61, 0x21, 0x92, 0x15, 0x32, 0xF7, 0xF0, 0x23, 0x6B, 0xDC, 0x13, 0x1C, 0x0B, 0x54, 0x22, 
	0x4E, 0x6C, 0x6D, 0x91, 0x66, 0xDA, 0x50, 0x05, 0xC2, 0xE2, 0x02, 0x5E, 0xEA, 0x32, 0xDD, 0x1D, 0x78, 0x21, 0x21, 0x26, 0x0F, 0x06, 0x7B, 0x9A, 0x8E, 0xAB, 0x3D, 0xFD, 0x4E, 0x01, 
	0xFF, 0x43, 0x71, 0x7D, 0x5E, 0xC8, 0x0B, 0xE5, 0x58, 0xC0, 0x97, 0xA0, 0x31, 0xE5, 0x73, 0xAE, 0x33, 0xB1, 0x24, 0xE5, 0x84, 0xBD, 0x08, 0x49, 0x07, 0x03, 0xAA, 0xD8, 0x05, 0xF4, 
	0x1A, 0x99, 0xD7, 0xA6, 0x03, 0x9D, 0x64, 0xBA, 0x7D, 0xA2, 0x2A, 0x78, 0xE0, 0xA4, 0x93, 0xAF, 0x65, 0x8C, 0xAF, 0x2F, 0xEF, 0xEF, 0xDB, 0x0F, 0x98, 0xFE, 0x17, 0x3B, 0x15, 0x7B, 
	0x37, 0x56, 0x0B, 0x1B, 0xC8, 0x06, 0x36, 0x73, 0x99, 0x8A, 0xF6, 0x13, 0xDA, 0xC5, 0xCC, 0x85, 0x69, 0x53, 0x10, 0x51, 0x76, 0xB6, 0x62, 0xD2, 0x01, 0xC6, 0xA1, 0xA0, 0x6E, 0x83, 
	0xDB, 0xB5, 0x0C, 0x37, 0x9B, 0x5D, 0x9A, 0xFB, 0x8A, 0xCD, 0x6D, 0x06, 0x4C, 0x41, 0x46, 0x6E, 0x4D, 0xC4, 0x1B, 0x7A, 0x09, 0x95, 0xE9, 0xD0, 0xB8, 0x7F, 0x63, 0x83, 0xB3, 0xA2, 
	0xF1, 0x6B, 0x24, 0xDB, 0x4F, 0x7B, 0xE5, 0xC0, 0x3B, 0x2C, 0x8B, 0xD1, 0x9A, 0xA4, 0xDE, 0xAC, 0x68, 0xC0, 0x37, 0x65, 0xE0, 0x38, 0x3D, 0x75, 0x7C, 0x08, 0x7D, 0x8F, 0xAB, 0x42, 
	0xD0, 0x69, 0xF0, 0xF4, 0xDA, 0x6F, 0xC9, 0xDF, 0xBF, 0xF9, 0xFC, 0xDC, 0x85, 0xD7, 0x9A, 0x4B, 0x57, 0x10, 0x4B, 0x0A, 0xFD, 0xCD, 0x09, 0x82, 0xF7, 0x5E, 0x0C, 0x4F, 0x52, 0xB5, 
	0xA0, 0x7C, 0x5B, 0xE1, 0x23, 0x7E, 0xA9, 0x0D, 0xD1, 0x08, 0x0C, 0xDC, 0xA9, 0x9C, 0x0F, 0xA2, 0xA6, 0x08, 0xD2, 0x1C, 0x69, 0x52, 0x36, 0x3A, 0x42, 0x33, 0x60, 0x19, 0xCF, 0xF1, 
	0x76, 0xF4, 0x00, 0x1A, 0xF2, 0x57, 0xCC, 0x66, 0x77, 0x48, 0xCE, 0xC4, 0x4A, 0x1D, 0x40, 0x0D, 0x18, 0x4C, 0x38, 0x96, 0x2F, 0x40, 0x82, 0x21, 0x43, 0xE7, 0x05, 0xD2, 0x19, 0xB8, 
	0x73, 0x6B, 0xD6, 0x4C, 0xE6, 0xD5, 0x52, 0x98, 0x54, 0xA0, 0x6C, 0xA7, 0x25, 0x2E, 0xAC, 0x99, 0x68, 0xF9, 0xF7, 0xB5, 0xF2, 0x6F, 0x7A, 0x5B, 0xEF, 0x6F, 0x8A, 0x5C, 0x29, 0xA7, 
	0x35, 0x4F, 0x7D, 0x16, 0x23, 0xA4, 0x56, 0x58, 0xDC, 0x76, 0x0B, 0x6D, 0xBF, 0x88, 0xBF, 0xB4, 0x67, 0x5E, 0xE2, 0x26, 0x03, 0xF4, 0xC8, 0xDA, 0x1E, 0x11, 0x75, 0x40, 0x8F, 0xF3, 
	0xA3, 0xA9, 0x69, 0x8D, 0x07, 0x62, 0xD8, 0x40, 0x5A, 0xFF, 0xA6, 0xBD, 0x8D, 0xD7, 0x3B, 0xCC, 0x6B, 0x24, 0x2F, 0xAA, 0x09, 0xD9, 0xD4, 0x7C, 0xD2, 0x02, 0xDC, 0x92, 0xEF, 0x46, 
	0xE1, 0xF0, 0xAB, 0xCD, 0x31, 0x4C, 0x70, 0x1A, 0xA7, 0x82, 0x0E, 0x67, 0xBC, 0x5B, 0x71, 0x66, 0xFD, 0x49, 0x0F, 0x7C, 0x4A, 0x79, 0x41, 0x05, 0xDD, 0x1A, 0xB0, 0x3E, 0x71, 0xAA, 
	0xEC, 0xBE, 0x65, 0x25, 0xE6, 0xBF, 0xE9, 0x6C, 0x90, 0x65, 0x94, 0xA3, 0xED, 0x9C, 0xC6, 0x90, 0xEB, 0x1E, 0xFB, 0xCC, 0x63, 0xE8, 0xAC, 0x90, 0x63, 0x66, 0x14, 0x6B, 0x09, 0x96, 
	0x53, 0x55, 0x14, 0x4D, 0xF6, 0x52, 0xE2, 0x8C, 0x0E, 0x2C, 0xEE, 0x8F, 0xDA, 0xC8, 0x33, 0xC2, 0xA5, 0x8E, 0x96, 0xCA, 0x59, 0x4A, 0xA1, 0x44, 0x53, 0x00, 0xBA, 0x50, 0xD7, 
};

////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////

unsigned char KeyPub[283] = 	{
	0x52, 0x53, 0x41, 0x31, 0x00, 0x08, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x01, 0xC5, 0x14, 0xE5, 
	0x20, 0x2E, 0x4A, 0x1F, 0x9B, 0x22, 0xFE, 0x66, 0x01, 0xC3, 0x81, 0x6A, 0x38, 0x99, 0xD4, 0x87, 0x87, 0xE4, 0x73, 0x67, 0x83, 0x3B, 0x91, 0x10, 0x85, 0x9D, 0x73, 0xE8, 0xF6, 0x28, 
	0x95, 0x0D, 0xF2, 0xFC, 0x19, 0x6A, 0x00, 0x3B, 0xE0, 0x3C, 0x5B, 0xAE, 0xA6, 0xC4, 0x9C, 0x7A, 0x1A, 0xFB, 0x7D, 0xC5, 0xD5, 0xFE, 0xDD, 0x42, 0xD2, 0xA5, 0x7E, 0xBB, 0x37, 0x3D, 
	0x29, 0xD8, 0x87, 0x9D, 0x47, 0x89, 0x9D, 0xE6, 0x43, 0x14, 0x71, 0x6E, 0x2E, 0x55, 0x45, 0xAC, 0x22, 0xCB, 0x7C, 0xE8, 0x66, 0x6A, 0x04, 0x0A, 0x5A, 0x29, 0x42, 0x1F, 0x28, 0x4D, 
	0xD5, 0xB8, 0x81, 0x7E, 0x99, 0x07, 0x56, 0xA9, 0x62, 0xE5, 0xE9, 0x64, 0xF1, 0x67, 0x20, 0x3A, 0xAD, 0x2A, 0xFF, 0x9D, 0x8A, 0x70, 0x62, 0x94, 0x95, 0xBF, 0xDB, 0x4B, 0x19, 0x98, 
	0xD3, 0x6B, 0x18, 0x46, 0xA8, 0x23, 0x9C, 0x8D, 0x16, 0xB3, 0x36, 0xE7, 0xE5, 0xA5, 0x8F, 0xEF, 0x9B, 0x99, 0x24, 0xC2, 0x28, 0x7A, 0xD8, 0xC0, 0x87, 0xD7, 0x71, 0xBA, 0x13, 0x08, 
	0xE5, 0xE7, 0x8B, 0x34, 0x1A, 0xA4, 0x10, 0xA6, 0x60, 0x4E, 0xA9, 0x30, 0xEC, 0x83, 0x8D, 0x80, 0xF9, 0xEF, 0x1E, 0xCA, 0xC3, 0x4B, 0x63, 0xA4, 0x5E, 0x50, 0xB3, 0x29, 0x05, 0x00, 
	0x43, 0xDE, 0x41, 0x7E, 0x57, 0x11, 0x68, 0xA2, 0x88, 0xAA, 0xD8, 0xBA, 0xDF, 0x4B, 0x3E, 0xAF, 0x70, 0xEB, 0x8F, 0x0A, 0x0C, 0x9E, 0x23, 0xAD, 0x98, 0xB7, 0x2C, 0x99, 0x31, 0x16, 
	0x36, 0x32, 0x9B, 0x30, 0xAD, 0xFC, 0xB6, 0x83, 0xB2, 0x47, 0x36, 0xE9, 0xE8, 0x00, 0xA4, 0xD9, 0x1A, 0xCA, 0x57, 0x7F, 0xB0, 0x0D, 0x81, 0xED, 0x52, 0x64, 0xB1, 0xBD, 0x9D, 0x44, 
	0xAA, 0x3B, 0x17, 0xCA, 0x24, 0x74, 0x1D, 0x3A, 0xE5, 0x8D, 0x28, 0xB3, 0x89, 
};

上面公钥为:
-----BEGIN PUBLIC KEY-----
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAxRTlIC5KH5si/mYBw4Fq
OJnUh4fkc2eDO5EQhZ1z6PYolQ3y/BlqADvgPFuupsScehr7fcXV/t1C0qV+uzc9
KdiHnUeJneZDFHFuLlVFrCLLfOhmagQKWilCHyhN1biBfpkHVqli5elk8WcgOq0q
/52KcGKUlb/bSxmY02sYRqgjnI0Wszbn5aWP75uZJMIoetjAh9dxuhMI5eeLNBqk
EKZgTqkw7IONgPnvHsrDS2OkXlCzKQUAQ95BflcRaKKIqti630s+r3DrjwoMniOt
mLcsmTEWNjKbMK38toOyRzbp6ACk2RrKV3+wDYHtUmSxvZ1EqjsXyiR0HTrljSiz
iQIDAQAB
-----END PUBLIC KEY-----

unsigned char KeyPri[539] = 	{
	0x52, 0x53, 0x41, 0x32, 0x00, 0x08, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x80, 0x00, 0x00, 0x00, 0x80, 0x00, 0x00, 0x00, 0x01, 0x00, 0x01, 0xC5, 0x14, 0xE5, 
	0x20, 0x2E, 0x4A, 0x1F, 0x9B, 0x22, 0xFE, 0x66, 0x01, 0xC3, 0x81, 0x6A, 0x38, 0x99, 0xD4, 0x87, 0x87, 0xE4, 0x73, 0x67, 0x83, 0x3B, 0x91, 0x10, 0x85, 0x9D, 0x73, 0xE8, 0xF6, 0x28, 
	0x95, 0x0D, 0xF2, 0xFC, 0x19, 0x6A, 0x00, 0x3B, 0xE0, 0x3C, 0x5B, 0xAE, 0xA6, 0xC4, 0x9C, 0x7A, 0x1A, 0xFB, 0x7D, 0xC5, 0xD5, 0xFE, 0xDD, 0x42, 0xD2, 0xA5, 0x7E, 0xBB, 0x37, 0x3D, 
	0x29, 0xD8, 0x87, 0x9D, 0x47, 0x89, 0x9D, 0xE6, 0x43, 0x14, 0x71, 0x6E, 0x2E, 0x55, 0x45, 0xAC, 0x22, 0xCB, 0x7C, 0xE8, 0x66, 0x6A, 0x04, 0x0A, 0x5A, 0x29, 0x42, 0x1F, 0x28, 0x4D, 
	0xD5, 0xB8, 0x81, 0x7E, 0x99, 0x07, 0x56, 0xA9, 0x62, 0xE5, 0xE9, 0x64, 0xF1, 0x67, 0x20, 0x3A, 0xAD, 0x2A, 0xFF, 0x9D, 0x8A, 0x70, 0x62, 0x94, 0x95, 0xBF, 0xDB, 0x4B, 0x19, 0x98, 
	0xD3, 0x6B, 0x18, 0x46, 0xA8, 0x23, 0x9C, 0x8D, 0x16, 0xB3, 0x36, 0xE7, 0xE5, 0xA5, 0x8F, 0xEF, 0x9B, 0x99, 0x24, 0xC2, 0x28, 0x7A, 0xD8, 0xC0, 0x87, 0xD7, 0x71, 0xBA, 0x13, 0x08, 
	0xE5, 0xE7, 0x8B, 0x34, 0x1A, 0xA4, 0x10, 0xA6, 0x60, 0x4E, 0xA9, 0x30, 0xEC, 0x83, 0x8D, 0x80, 0xF9, 0xEF, 0x1E, 0xCA, 0xC3, 0x4B, 0x63, 0xA4, 0x5E, 0x50, 0xB3, 0x29, 0x05, 0x00, 
	0x43, 0xDE, 0x41, 0x7E, 0x57, 0x11, 0x68, 0xA2, 0x88, 0xAA, 0xD8, 0xBA, 0xDF, 0x4B, 0x3E, 0xAF, 0x70, 0xEB, 0x8F, 0x0A, 0x0C, 0x9E, 0x23, 0xAD, 0x98, 0xB7, 0x2C, 0x99, 0x31, 0x16, 
	0x36, 0x32, 0x9B, 0x30, 0xAD, 0xFC, 0xB6, 0x83, 0xB2, 0x47, 0x36, 0xE9, 0xE8, 0x00, 0xA4, 0xD9, 0x1A, 0xCA, 0x57, 0x7F, 0xB0, 0x0D, 0x81, 0xED, 0x52, 0x64, 0xB1, 0xBD, 0x9D, 0x44, 
	0xAA, 0x3B, 0x17, 0xCA, 0x24, 0x74, 0x1D, 0x3A, 0xE5, 0x8D, 0x28, 0xB3, 0x89, 0xFE, 0xC7, 0x6C, 0x21, 0x02, 0x0F, 0x1F, 0xD8, 0xD4, 0x9D, 0xC2, 0x46, 0x19, 0x5E, 0x16, 0x08, 0x55, 
	0xFA, 0x41, 0xAC, 0xB1, 0x8F, 0x91, 0xBB, 0x62, 0x98, 0x3B, 0xE5, 0x8A, 0xED, 0x65, 0x82, 0xBF, 0x02, 0x0A, 0x1E, 0xB7, 0x5C, 0x02, 0xB0, 0xAD, 0x48, 0x47, 0x92, 0xA2, 0xB9, 0x16, 
	0x62, 0xBB, 0xBE, 0x22, 0xAA, 0x8B, 0x79, 0x95, 0x78, 0xDD, 0x8A, 0x07, 0x49, 0x84, 0xF9, 0x67, 0x63, 0x0B, 0x83, 0xE1, 0x71, 0xBB, 0x13, 0x62, 0x0B, 0xB6, 0x0F, 0x51, 0x5A, 0x8B, 
	0x32, 0xA4, 0xDE, 0x86, 0x44, 0xB2, 0x7E, 0xA5, 0x2D, 0xA2, 0x03, 0x2C, 0xBA, 0xFE, 0x54, 0xD4, 0x10, 0xCB, 0x17, 0xB3, 0x4E, 0xC0, 0x98, 0xBA, 0xC3, 0x11, 0x00, 0x4D, 0x89, 0xC3, 
	0xD4, 0x11, 0xEF, 0x43, 0xE7, 0xF5, 0xED, 0x39, 0x01, 0x63, 0xFB, 0x5F, 0x9C, 0x0B, 0x74, 0xC9, 0xC2, 0x1E, 0x26, 0xED, 0xA3, 0xC6, 0x06, 0xAF, 0xA8, 0x98, 0xDD, 0x80, 0xCE, 0x52, 
	0xE9, 0x3D, 0x01, 0xAA, 0xF5, 0x1D, 0x32, 0x91, 0x1B, 0x1F, 0x79, 0xEA, 0xFE, 0xAB, 0x30, 0x25, 0x7B, 0xEA, 0x8F, 0x7B, 0x34, 0x14, 0x73, 0x8A, 0x3F, 0x21, 0xE5, 0xF7, 0x71, 0xB7, 
	0x86, 0xE7, 0xC2, 0xA5, 0xEF, 0x0E, 0x19, 0xCC, 0xE7, 0x1E, 0xDD, 0xA2, 0xEC, 0x1C, 0x87, 0xD5, 0xF0, 0xDF, 0x8F, 0x63, 0x2D, 0x2D, 0xA1, 0x97, 0xA3, 0xD5, 0xFE, 0x2B, 0xBE, 0x53, 
	0x1D, 0x2F, 0xFA, 0xDE, 0x8B, 0x28, 0x71, 0xFA, 0xCC, 0x1D, 0x73, 0xBF, 0xF4, 0x02, 0x70, 0x2F, 0xF8, 0x73, 0xB3, 0x73, 0xD7, 0x75, 0xAD, 0xD8, 0xA1, 0x97, 0xBB, 0xCC, 0x49, 0x1E, 
	0xB0, 0x78, 0x51, 0x82, 0x99, 0xCC, 0xD2, 0x14, 0xAE, 0x64, 0xB0, 0x4A, 0x77, 0xBC, 0xDA, 0x7D, 0xF1, 0x79, 0xF0, 0x22, 0x24, 0x4A, 0x8D, 0x60, 0x64, 0xD8, 0x53, 0xD4, 0xE3, 
};



被这玩意难为好几天了。请各位老师把私钥转成PEM格式

吾爱汇编论坛-学破解,防破解!知进攻,懂防守!逆向分析,软件安全!52HB.COM
Rooking 发表于 2025-6-30 16:55 | 显示全部楼层

你把pem格式的字符串用 base64解码对比一下 你就发现原来如此简单 仅仅是前面多了那么多0
吾爱汇编论坛-学破解,防破解!知进攻,懂防守!逆向分析,软件安全!52HB.COM
Rooking 发表于 2025-6-30 16:58 | 显示全部楼层

把要转换的数据前面  0x52, 0x53, 0x41, 0x31, 0x00, 0x08, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x01,  这一长串去掉 剩余部分做格式化处理(CE28380C8E7D381353F33DC552825203D6EAE8DE8A977C8CBD37A1B0C6DC5C229D8E21D0A72E2E15D9076A0EB4C6C4A66121921532F7F0236BDC131C0B54224E6C6D9166DA5005C2E2025EEA32DD1D782121260F067B9A8EAB3DFD4E01FF43717D5EC80BE558C097A031E573AE33B124E584BD08490703AAD805F41A99D7A6039D64BA7DA22A78E0A493AF658CAF2FEFEFDB0F98FE173B157B37560B1BC8063673998AF613DAC5CC856953105176B662D201C6A1A06E83DBB50C379B5D9AFB8ACD6D064C41466E4DC41B7A0995E9D0B87F6383B3A2F16B24DB4F7BE5C03B2C8BD19AA4DEAC68C03765E0383D757C087D8FAB42D069F0F4DA6FC9DFBFF9FCDC85)后base64编码 就是PEM格式
吾爱汇编论坛-学破解,防破解!知进攻,懂防守!逆向分析,软件安全!52HB.COM
 楼主| 蒋阿君 发表于 2025-7-1 10:32 | 显示全部楼层

Rooking 发表于 2025-6-30 16:58
把要转换的数据前面  0x52, 0x53, 0x41, 0x31, 0x00, 0x08, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, 0x00, 0x ...

公钥转换完了,要的是私钥
吾爱汇编论坛-学破解,防破解!知进攻,懂防守!逆向分析,软件安全!52HB.COM
Rooking 发表于 2025-7-1 11:15 | 显示全部楼层

卧槽 你不是吧 方法都给你了 你不会自己弄一下
吾爱汇编论坛-学破解,防破解!知进攻,懂防守!逆向分析,软件安全!52HB.COM
Crack_TTds 发表于 2025-7-3 22:03 | 显示全部楼层
吾爱汇编论坛-学破解,防破解!知进攻,懂防守!逆向分析,软件安全!52HB.COM
0×Ret 发表于 2025-7-6 23:20 | 显示全部楼层

Rooking 发表于 2025-7-1 11:15
卧槽 你不是吧 方法都给你了 你不会自己弄一下

我猜他的意思的 公解私吧
吾爱汇编论坛-学破解,防破解!知进攻,懂防守!逆向分析,软件安全!52HB.COM
Rooking 发表于 2025-7-7 13:32 | 显示全部楼层

0×Ret 发表于 2025-7-6 23:20
我猜他的意思的 公解私吧

不是,只有私可以解公,公咋能解私,他就是想把字节形式的私钥转换成PEM格式,但是给出的私钥内容并不完全 所以没法直接转换,需要先结算几个值
吾爱汇编论坛-学破解,防破解!知进攻,懂防守!逆向分析,软件安全!52HB.COM
lml0126 发表于 2025-7-10 20:49 | 显示全部楼层

正写了一个加密锁的转换工具,hex转xml的,有可能私钥hex中没有D值。需要计算,公钥倒是好转。 fakename.png
吾爱汇编论坛-学破解,防破解!知进攻,懂防守!逆向分析,软件安全!52HB.COM
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

警告:本站严惩灌水回复,尊重自己从尊重他人开始!

1层
2层
3层
4层
5层
6层
7层
8层
9层

免责声明

吾爱汇编(www.52hb.com)所讨论的技术及相关工具仅限用于研究学习,皆在提高软件产品的安全性,严禁用于不良动机。任何个人、团体、组织不得将其用于非法目的,否则,一切后果自行承担。吾爱汇编不承担任何因为技术滥用所产生的连带责任。吾爱汇编内容源于网络,版权争议与本站无关。您必须在下载后的24个小时之内,从您的电脑中彻底删除。如有侵权请邮件或微信与我们联系处理。

站长邮箱:SharkHeng@sina.com
站长QQ:1140549900


QQ|RSS|手机版|小黑屋|帮助|吾爱汇编 ( 京公网安备11011502005403号 , 京ICP备20003498号-6 )|网站地图

Powered by Discuz!

吾爱汇编 www.52hb.com

快速回复 返回顶部 返回列表