记录问题:class “org.bouncycastle.asn1.ASN1Object“‘s signer information does not match signer information

class “org.bouncycastle.asn1.ASN1Object”'s signer information does not match signer information of other classes in the same package 出现该问题的原因:就是jar包冲突

解决方法:

1.查看报错信息

C:\Users\whl151885\.jdks\corretto-1.8.0_342\bin\java.exe "-javaagent:D:\whl151885\IdEA\IntelliJ IDEA 
Exception in thread "main" java.lang.ExceptionInInitializerError
	at org.bouncycastle.asn1.gm.GMNamedCurves.<clinit>(Unknown Source)
	at cn.hutool.crypto.SmUtil.<clinit>(SmUtil.java:54)
	at com.szhz.healthcode.crypto.util.SzhzSm4Util.encrypt(SzhzSm4Util.java:26)
	at com.iswhl.city.service.HealthCode.main(HealthCode.java:7)
Caused by: java.lang.SecurityException: class "org.bouncycastle.asn1.ASN1Object"'s signer information does not match signer information of other classes in the same package
	at java.lang.ClassLoader.checkCerts(ClassLoader.java:891)
	at java.lang.ClassLoader.preDefineClass(ClassLoader.java:661)


Process finished with exit code 1

2.双击 Shift键搜索 问题项

在这里插入图片描述

3.定位错误

因为是jar包的冲突问题,所以我们需要寻找到所造成冲突的jar包,这里我们可以使用idea插件中的依赖分析插件,来帮助我们寻找冲突的jar包

在这里插入图片描述

4. 到pom文件中来寻找冲突jar包

在这里插入图片描述
在这里插入图片描述

5.解决办法

将步骤4中查询出来的两个bcprov-jdk jar包删除一个即可,具体删除哪个,看你项目中的jar包依赖关系。
在这里插入图片描述

在本次我的项目中,本次测试没有使用到ebaize-workflow这个jar包,所以在pom文件中将该jar包删除即可

如下:
在这里插入图片描述
重新加载maven后测试类正常运行:
在这里插入图片描述

  • 1
    点赞
  • 2
    收藏
    觉得还不错? 一键收藏
  • 打赏
    打赏
  • 0
    评论
以下是一个使用Java语言解析SM2 ASN1格式数字信封的示例代码: ```java import org.bouncycastle.asn1.ASN1InputStream; import org.bouncycastle.asn1.ASN1Integer; import org.bouncycastle.asn1.ASN1ObjectIdentifier; import org.bouncycastle.asn1.ASN1Primitive; import org.bouncycastle.asn1.DERBitString; import org.bouncycastle.asn1.DERSequence; import org.bouncycastle.asn1.DERTaggedObject; import org.bouncycastle.asn1.pkcs.PrivateKeyInfo; import org.bouncycastle.asn1.x509.AlgorithmIdentifier; import org.bouncycastle.crypto.engines.SM2Engine; import org.bouncycastle.crypto.params.AsymmetricKeyParameter; import org.bouncycastle.crypto.params.ECPrivateKeyParameters; import org.bouncycastle.crypto.params.ECPublicKeyParameters; import org.bouncycastle.crypto.signers.SM2Signer; import org.bouncycastle.jce.provider.BouncyCastleProvider; import org.bouncycastle.util.encoders.Hex; import java.io.ByteArrayInputStream; import java.security.KeyFactory; import java.security.PrivateKey; import java.security.PublicKey; import java.security.Security; import java.security.cert.CertificateFactory; import java.security.cert.X509Certificate; import java.security.spec.ECPrivateKeySpec; import java.security.spec.ECPublicKeySpec; import java.security.spec.PKCS8EncodedKeySpec; public class SM2ASN1Decoder { static { Security.addProvider(new BouncyCastleProvider()); } public static void main(String[] args) throws Exception { // SM2 ASN1格式数字信封 String sm2Envelope = "30819E300D06092A864886F70D010101050003818B003081870201013082" + "820206092A864886F70D010706A082820F3082820B020101310B30090607" + "2A8648CE3D020106082A811CCF5501822D0479304402206E7A107FBEE4D" + "7E6D5D49CB2A2562D60A3220E3B9C2B0D9BF5B2B7B8FAC9F9022042B00" + "C7F8E1B2898D4C6E68F2F04A1B8E7D86CD3ECB5A79A5D0034B3C9C5F10" + "A081806C30818006072A8648CE3D020106052B8104000A03420004B7E0" + "B2A6BB1C6E6D4D4A3C1F5B5B6172C80280C3E5A23E4A2B5F58CDB259B0" + "FBB8323F4D12A4E8686D4FAC53B5F267F3A5C64BCD0E8F1A3D00EA0EED" + "A1E2F9A1A281E43081E1020103302C301306072A8648CE3D020106082A" + "811CCF5501822D0479304402206E7A107FBEE4D7E6D5D49CB2A2562D60" + "A3220E3B9C2B0D9BF5B2B7B8FAC9F9022042B00C7F8E1B2898D4C6E68" + "F2F04A1B8E7D86CD3ECB5A79A5D0034B3C9C5F1"; // 解码ASN1结构体 ASN1InputStream input = new ASN1InputStream(new ByteArrayInputStream(Hex.decode(sm2Envelope))); ASN1Primitive asn1 = input.readObject(); // 获取加密算法标识 ASN1Sequence envelope = (ASN1Sequence) asn1; ASN1Sequence header = (ASN1Sequence) envelope.getObjectAt(0); ASN1ObjectIdentifier oid = (ASN1ObjectIdentifier) header.getObjectAt(0); String algorithm = oid.getId(); // 获取摘要算法标识 ASN1Sequence contentInfo = (ASN1Sequence) envelope.getObjectAt(1); ASN1Sequence digestAlg = (ASN1Sequence) contentInfo.getObjectAt(1); ASN1ObjectIdentifier digestOid = (ASN1ObjectIdentifier) digestAlg.getObjectAt(0); String digestAlgorithm = digestOid.getId(); // 获取加密数据 ASN1Sequence encapContentInfo = (ASN1Sequence) contentInfo.getObjectAt(2); ASN1ObjectIdentifier encapOid = (ASN1ObjectIdentifier) encapContentInfo.getObjectAt(0); String encapAlgorithm = encapOid.getId(); DERBitString encryptedData = (DERBitString) encapContentInfo.getObjectAt(1); byte[] encrypted = encryptedData.getOctets(); // 获取数字签名 DERTaggedObject signerInfos = (DERTaggedObject) envelope.getObjectAt(2); ASN1Sequence signedData = (ASN1Sequence) signerInfos.getObject().toASN1Primitive(); ASN1Sequence signerInfo = (ASN1Sequence) signedData.getObjectAt(0); ASN1Sequence digestAlgId = (ASN1Sequence) signerInfo.getObjectAt(1); ASN1ObjectIdentifier digestAlgOid = (ASN1ObjectIdentifier) digestAlgId.getObjectAt(0); String signerDigestAlgorithm = digestAlgOid.getId(); DERBitString signature = (DERBitString) signerInfo.getObjectAt(3); byte[] sign = signature.getOctets(); // 获取签名证书 ASN1Sequence certificateSet = (ASN1Sequence) signedData.getObjectAt(1); ASN1Sequence certificateSeq = (ASN1Sequence) certificateSet.getObjectAt(0); byte[] certificateBytes = certificateSeq.getEncoded(); CertificateFactory cf = CertificateFactory.getInstance("X.509"); X509Certificate certificate = (X509Certificate) cf.generateCertificate(new ByteArrayInputStream(certificateBytes)); PublicKey publicKey = certificate.getPublicKey(); // 对加密数据进行解密 KeyFactory keyFactory = KeyFactory.getInstance("EC", "BC"); byte[] priKeyBytes = // TODO: 获取私钥字节数组 PKCS8EncodedKeySpec priKeySpec = new PKCS8EncodedKeySpec(priKeyBytes); PrivateKey privateKey = keyFactory.generatePrivate(priKeySpec); AsymmetricKeyParameter privateKeyParameter = new ECPrivateKeyParameters(((ECPrivateKey) privateKey).getS(), ((ECPrivateKey) privateKey).getParams()); AsymmetricKeyParameter publicKeyParameter = new ECPublicKeyParameters(((ECPublicKey) publicKey).getQ(), ((ECPublicKey) publicKey).getParams()); SM2Engine engine = new SM2Engine(); engine.init(false, privateKeyParameter); byte[] decrypted = engine.processBlock(encrypted, 0, encrypted.length); // 对解密后的明文数据进行摘要 AlgorithmIdentifier algorithmIdentifier = new AlgorithmIdentifier(new ASN1ObjectIdentifier(digestAlgorithm)); byte[] digest = MessageDigest.getInstance(digestAlgorithm).digest(decrypted); // 使用公钥对数字签名进行验证 SM2Signer signer = new SM2Signer(); signer.init(false, publicKeyParameter); signer.update(digest, 0, digest.length); boolean verifyResult = signer.verifySignature(sign); if (verifyResult) { System.out.println("数字签名验证成功"); System.out.println("解密后的明文数据:" + Hex.toHexString(decrypted)); } else { System.out.println("数字签名验证失败"); } } } ``` 需要注意的是,上述代码中的私钥字节数组、摘要算法和加密算法等信息需要根据具体情况进行修改和替换。同时,在实际应用中,还需要考虑异常处理、安全性等方面的问题

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包

打赏作者

三横同学

你的鼓励将是我创作的最大动力

¥1 ¥2 ¥4 ¥6 ¥10 ¥20
扫码支付:¥1
获取中
扫码支付

您的余额不足,请更换扫码支付或充值

打赏作者

实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值