我有Windows 7上的OpenSSL x64,我从谷歌代码上的OpenSSL -for- Windows下载的。我试着跑:

openssl pkcs12 -export -in "path.p12" -out "newfile.pem" 

但是我得到了一个错误。

unable to load private key

如何使用OpenSSL从pkcs# 12存储中提取PEM格式的证书?


当前回答

#!/usr/bin/env python3
from optparse import Option
from OpenSSL import crypto
import os
import warnings
from getpass import getpass
warnings.filterwarnings("ignore", category=DeprecationWarning) 

def sanitize_path(path):
    return os.path.expandvars(os.path.expanduser(path))

def main(in_file, out_file, passphrase=None):
    if not passphrase:
        passphrase = getpass(prompt=("SSL Private Key Passphrase: "))
   
    in_file = sanitize_path(in_file)
    out_file = sanitize_path(out_file)
    
    with open(in_file, "rb") as input_file:
        p12 = crypto.load_pkcs12(input_file.read(), passphrase)
        pem = crypto.dump_privatekey(crypto.FILETYPE_PEM, p12.get_privatekey())
    with open(out_file, "w") as output_file:
        output_file.write(pem.decode('utf-8'))

if __name__ == '__main__':
    from optparse import OptionParser
    usage = "usage: %prog  input_file output_file [passphrase]"
    p = OptionParser(usage=usage)
    opt, args = p.parse_args()
    main(*args)

其他回答

#!/usr/bin/env python3
from optparse import Option
from OpenSSL import crypto
import os
import warnings
from getpass import getpass
warnings.filterwarnings("ignore", category=DeprecationWarning) 

def sanitize_path(path):
    return os.path.expandvars(os.path.expanduser(path))

def main(in_file, out_file, passphrase=None):
    if not passphrase:
        passphrase = getpass(prompt=("SSL Private Key Passphrase: "))
   
    in_file = sanitize_path(in_file)
    out_file = sanitize_path(out_file)
    
    with open(in_file, "rb") as input_file:
        p12 = crypto.load_pkcs12(input_file.read(), passphrase)
        pem = crypto.dump_privatekey(crypto.FILETYPE_PEM, p12.get_privatekey())
    with open(out_file, "w") as output_file:
        output_file.write(pem.decode('utf-8'))

if __name__ == '__main__':
    from optparse import OptionParser
    usage = "usage: %prog  input_file output_file [passphrase]"
    p = OptionParser(usage=usage)
    opt, args = p.parse_args()
    main(*args)

如果可以使用Python,那么使用pyopenssl模块就更容易了。下面就是:

from OpenSSL import crypto

# May require "" for empty password depending on version

with open("push.p12", "rb") as file:
    p12 = crypto.load_pkcs12(file.read(), "my_passphrase")

# PEM formatted private key
print crypto.dump_privatekey(crypto.FILETYPE_PEM, p12.get_privatekey())

# PEM formatted certificate
print crypto.dump_certificate(crypto.FILETYPE_PEM, p12.get_certificate())

Try:

openssl pkcs12 -in path.p12 -out newfile.crt.pem -clcerts -nokeys
openssl pkcs12 -in path.p12 -out newfile.key.pem -nocerts -nodes

在那之后,你有:

newfile.crt.pem中的证书 newfile.key.pem中的私钥

如果要将证书和密钥放在同一个文件中,且没有密码,请使用以下方法,因为空密码将导致密钥无法导出:

openssl pkcs12 -in path.p12 -out newfile.pem -nodes

或者,如果你想为私钥提供一个密码,忽略-nodes并输入一个密码:

openssl pkcs12 -in path.p12 -out newfile.pem

如果您需要直接从命令行(例如脚本)输入PKCS#12密码,只需添加-passin pass:${password}:

openssl pkcs12 -in path.p12 -out newfile.crt.pem -clcerts -nokeys -passin 'pass:P@s5w0rD'

有一个免费的开源GUI工具KeyStore Explorer可以使用加密密钥容器。使用它,您可以将证书或私钥导出到单独的文件中,或将容器转换为其他格式(jks, pem, p12, pkcs12等)

你只需要提供一个密码。你可以在相同的命令行中使用以下语法完成:

openssl pkcs12 -export -in "path.p12" -out "newfile.pem" -passin pass:[password]

然后系统会提示您输入密码,以加密输出文件中的私钥。如果你想导出未加密的私钥(明文),在上面的行中包含“nodes”选项:

openssl pkcs12 -export -in "path.p12" -out "newfile.pem" -passin pass:[password] -nodes

更多信息:http://www.openssl.org/docs/apps/pkcs12.html