Using OpenSSL to convert private keys and certificates

Using OpenSSL to convert private keys and certificates

[[171102]]

Recently, I need to use APNs push in iOS in my project, but my iOS colleague (Chun Ge) only gave me two p12 files. Suddenly I found that the certificate conversion problem is quite common, such as payment development before. In the program, the certificate in pem format is actually needed, so the conversion between certificates is involved.

Since private keys and certificates can be stored in different formats, this means we need to convert them. The most commonly used formats are as follows, first the format of the certificate:

  • A binary DER certificate, containing the X.509 certificate in raw format, encoded using DER ASN.1.
  • An ASCII PEM certificate contains a base64-encoded DER certificate that starts with -----BEGIN CERTIFICATE----- and ends with -----END CERTIFICATE-----.
  • PKCS#7 certificate, a complex format designed for transmitting signed or encrypted data, defined in RFC 2315. Usually has .p7b and .p7c as suffixes and can contain the entire certificate chain. This format is supported by Java's keytool tool.
  • PKCS#12 (PFX) certificates and private keys, a complex format that can store and protect a server's private key and a complete certificate chain. It usually ends with .p12 and .pfx. This format is commonly used in Microsoft products, but can also be used for client certificates.

Then the corresponding private key format is:

  • A binary DER private key, containing a private key in raw form, encoded using DER ASN.1. OpenSSL creates private keys in its traditional SSLeay format, but can also use another, less widely used format called PKCS#8 (defined in RFC 5208). The pkcs8 command can be used in OpenSSL to perform operations in PKCS#8 format.
  • A private key in ASCII format, containing a base64-encoded DER private key, and sometimes with additional meta information, such as the algorithm used for password protection.

Having said so much, we can find that the conversion between private keys is much simpler, and can only be converted between DER and PEM formats. Compared with the conversion between certificates, it is slightly more complicated.

If you are interested, you can also check out my other article PKI format standard to see its concept.

Here, we need to extract the private key and certificate from the PKCS#12 format file. Let's start with the conversion between PEM and DER formats:

PEM and DER conversion

The conversion between PEM and DER format certificates can be done using the x509 tool provided by OpenSSL. Below we convert a DER format certificate to PEM:

  1. sky@sky-pc:~$ openssl x509 -inform DER - in private_key.der -outform PEM - out private_key.pem

Here, we use the -inform parameter to specify the input format as DER, the -in parameter to specify the input file name, and then the corresponding -outform and -out are used to specify the output format and file name.

Similarly, we can also convert an integer in PEM format to DER format:

  1. sky@sky-pc:~$ openssl x509 -inform PEM - in private_key.pem -outform DER - out private_key.der

Next, let's see how to extract the private key and certificate from the PKCS#12 format.

PKCS#12 Conversion

We can use the pkcs12 command provided by OpenSSL to implement the PKCS#12 format operation. First, we export the certificate and private key to PEM format:

  1. sky@sky-pc:~$ openssl pkcs12 - in   key .p12 - out   key .pem -nodes
  2. Enter Import Password :
  3. MAC verified OK

Here, we specify the name of the incoming file through the -in parameter, the -out file specifies the name of the output file, and the -nodes parameter indicates that the private key is not encrypted. In this process, we need to enter the password for signing.

If we do not add the -nodes parameter, the result will be as follows:

  1. sky@sky-pc:~$ openssl pkcs12 - in   key .p12 - out   key.pem
  2. Enter Import Password :
  3. MAC verified OK
  4. Enter PEM pass phrase:
  5. Verifying - Enter PEM pass phrase:

As you can see, after the signature is successfully verified, we need to re-enter the new encryption password. In the exported file, you can see that the content of the file is:

  1. ...
  2. -----BEGIN ENCRYPTED PRIVATE KEY-----  
  3. MIIFDjBABgkqhkiG9w0BBQ0wMzAbBgkqhkiG9w0BBQwwDgQIPdUUocbjDXUCAggA
  4. ...
  5. -----END ENCRYPTED PRIVATE KEY-----  

The result after adding -nodes is:

  1. ...
  2. -----BEGIN PRIVATE KEY-----  
  3. MIIEvwIBADANBgkqhkiG9w0BAQEFAAASCBKkwggSlAgEAAoIBAQC+QDKKakQ0fcvH
  4. ...
  5. -----END PRIVATE KEY-----  

After that, we can use an editor to open the output key.pem file and manually split them into independent private key, certificate and intermediate certificate files.

As programmers, most people are lazy. Can this tedious operation be simplified and let the machine do it itself?

In fact, it is possible to do so. Such operations are provided in OpenSSL. Let's first look at the operation of not exporting the certificate, so that we can get the private key:

  1. sky@sky-pc:~$ openssl pkcs12 - in   key .p12 -nocerts - out private_key.pem -nodes
  2. Enter Import Password :
  3. MAC verified OK

As you can see, we added an extra parameter -nocerts here to avoid exporting the certificate. Then the operation of not exporting the private key should be as follows:

  1. sky@sky-pc:~$ openssl pkcs12 - in   key .p12 -nokeys - out cert.pem -nodes
  2.  
  3. Enter Import Password :
  4.  
  5. MAC verified OK

Next, how do we export the PEM format certificate and private key to PKCS#12 format? We can do this:

  1. sky@sky-pc:~$ openssl pkcs12 - name   "My Certificate" -export - out fd.p12 -inkey key .pem - in cert.pem -certfile fd-chain.crt
  2.  
  3. Enter Export Password :
  4.  
  5. Verifying - Enter Export Password :

The -name option specifies the friendlyName in the certificate, and the -certfile specifies the file name of the trust chain.

Finally, we can also specify whether to export only the client and CA certificates through the -clcerts and -cacerts options.

PKCS#7 Conversion

To convert PEM to PKCS#7, we can use the crl2pkcs7 command.

  1. sky@sky-pc:~$ openssl crl2pkcs7 -nocrl - out   key .p7b -certfile cert.pem -certfile fd-chain.crt

Then, the generated file header will start with -----BEGIN PKCS7-----.

Finally, to convert PKCS#7 to PEM, we can use the pkcs7 command:

  1. sky@sky-pc:~$ openssl pkcs7 - in   key .p7b -print_certs - out key1.pem

Here, we use the -print_certs parameter to output the input certificates.

PKCS#8 and SSLeay conversion

If we want to convert a private key in PKCS#8 format to SSLeay format, we can do this:

  1. sky@sky-pc:~$ openssl rsa - in   key .pem - out ssleay.pem
  2.  
  3. writing RSA key  

At this point the file contents will look like this:

  1. -----BEGIN RSA PRIVATE KEY-----  
  2.  
  3. MIIEpQIBAAKCAQEAvkAyimpENH3Lx4d8VH96XCYfKfCZ7qVtNuVseAvkSTC0q5dw
  4.  
  5. ...
  6.  
  7. -----END RSA PRIVATE KEY-----  

You can see that the word RSA is added to the header and the tail.

If we want to convert the traditional SSLeay private key to PKCS# format, we need to use the pkcs8 command:

  1. sky@sky-pc:~$ openssl pkcs8 -topk8 - in ssleay.pem - out pkcs8_key.pem
  2.  
  3. Enter Encryption Password :
  4.  
  5. Verifying - Enter Encryption Password :

By default, an encryption process is performed for this format, but we can use the -nocrypt parameter to prevent it from being encrypted:

  1. sky@sky-pc:~$ openssl pkcs8 -topk8 -nocrypt - in ssleay.pem - out pkcs8_key.pem

So we can convert the traditional SSLeay format to PKCS#8 format.

Generating certificates in APNs

Next, we will generate the certificate required for APNs push.

  1. sky@sky-pc:~$ openssl pkcs12 - in cer.p12 -clcerts -nokeys - out cert.pem -nodes
  2. Enter Import Password :
  3. MAC verified OK
  4. sky@sky-pc:~$ openssl pkcs12 - in cer.p12 -nocerts - out   key .pem -nodes
  5. Enter Import Password :
  6. MAC verified OK
  7. sky@sky-pc:~$ cat cert.pem key .pem > certs.pem

We first export only the client's certificate, then the private key, and finally we merge the contents of the two files into one file.

<<:  Four challenges you must consider when developing IoT devices

>>:  The difference between theory and reality, what is the bottleneck in multi-core chip software development?

Recommend

Online marketing solutions for the real estate industry!

The real estate industry is a typical highly cycl...

You must know these 5 promotion and operation tools commonly used by experts!

In the eyes of most operators, operations are dir...

How to place KOLs on Weibo and WeChat to achieve the maximum effect?

Kol, Key Opinion Leader, is basically those peopl...

From novice to expert, teach you how to quickly play Sina Fuyi Advertising

When doing information flow advertising , after c...

Tik Tok promotion skills: 3 steps and 7 key points!

I don’t know since when, the paper advertisements...

5 marketing strategy ideas to build a brand with lasting competitiveness

Whether it is as small as a promotional activity ...

Baidu bidding promotion ranking rules!

Traffic is the blood that keeps online marketing ...

How to avoid invalid clicks in bidding advertising and SEM delivery?

In Internet advertising, paid-per-click advertisi...

Short video advertising operation monetization conversion method!

The main purpose of Kuaishou/Douyin promotion is ...

Xiaohongshu product analysis and optimization plan

1. Product Disassembly and Development History 1.1...

Analysis of practical cases of community operation

In 2021, private domain communities have become a...