bouncycastle读取SM2证书文件

当遇到Java默认不支持SM2算法,导致读取SM2证书报错时,可以使用BouncyCastle库。通过添加BouncyCastleProvider并指定 CertificateFactory 的实例化参数为 'BC',能成功读取SM2证书。
摘要由CSDN通过智能技术生成

证书文件,通常后缀名为crt或cer,文件内容通常如下图:
在这里插入图片描述
我们可以通过CertificateFactory的generateCertificate方法,来读取该文件并生成X509Certificate对象。通常的做法是:

CertificateFactory fact = CertificateFactory.getInstance("X.509");
 
X509Certificate certificate = (X509Certificate) fact.generateCertificate(new FileInputStream ("test.crt"));

这种做法对于RSA的证书,通常没有问题,但是对于SM2证书,就总是会返回“Unknown named curve:1.2.156.10197.1.301"这样的错误。主要的原因是java默认实现中,并不能识别SM2算法。因此,我们需要利用bouncycastle库来读取,代码如下:

public  X509Certificate fileToCertificate(String filepath) throws Exception{
        Security.addProvider(new BouncyCastleProvider()); //注册BouncyCastleProvider
		InputStream inputStream = new FileInputStream(new File(filepath));
        // BC 的意思,是指定用BouncyCastleProvider 。
        CertificateFactory certFactory = CertificateFactory.getInstance("X.509","BC");
//        CertificateFactory certFactory = CertificateFactory.getInstance("X.509");
        X509Certificate ca = (X509Certificate)certFactory.generateCertificate(inputStream);
        return ca;
    }

特别要注意:CertificateFactory.getInstance(“X.509”,“BC”); ,这里的"BC",是指定使用BouncyCastleProvider,必须要指定才能正确读取SM2证书。

需要说明的是:Security.addProvider(new BouncyCastleProvider()); 可以放到类的初始化部分,不用在函数调用中每次都执行,这里主要是为了说明代码,放在了函数中。
————————————————
版权声明:本文为CSDN博主「成都渔民」的原创文章,遵循CC 4.0 BY-SA版权协议,转载请附上原文出处链接及本声明。
原文链接:https://blog.csdn.net/weixin_53036603/article/details/123252571

读取SM2证书需要使用Bouncy Castle库,以下是Java代码示例: ```java import org.bouncycastle.asn1.ASN1ObjectIdentifier; import org.bouncycastle.asn1.x509.AlgorithmIdentifier; import org.bouncycastle.asn1.x509.SubjectPublicKeyInfo; import org.bouncycastle.cert.X509CertificateHolder; import org.bouncycastle.cert.jcajce.JcaX509CertificateConverter; import org.bouncycastle.jcajce.provider.asymmetric.ec.BCECPublicKey; import org.bouncycastle.jce.provider.BouncyCastleProvider; import org.bouncycastle.openssl.PEMParser; import org.bouncycastle.openssl.jcajce.JcaPEMKeyConverter; import org.bouncycastle.util.io.pem.PemObject; import org.bouncycastle.util.io.pem.PemReader; import java.io.FileReader; import java.security.KeyFactory; import java.security.Security; import java.security.cert.CertificateFactory; import java.security.cert.X509Certificate; import java.security.interfaces.ECPublicKey; import java.security.spec.ECNamedCurveParameterSpec; import java.security.spec.ECPublicKeySpec; public class SM2CertReader { public static void main(String[] args) throws Exception { Security.addProvider(new BouncyCastleProvider()); // 读取证书 CertificateFactory cf = CertificateFactory.getInstance("X.509", "BC"); X509Certificate cert = (X509Certificate) cf.generateCertificate(new FileReader("sm2_cert.pem")); // 读取公钥 SubjectPublicKeyInfo spki = SubjectPublicKeyInfo.getInstance(cert.getPublicKey().getEncoded()); AlgorithmIdentifier algId = spki.getAlgorithm(); ASN1ObjectIdentifier oid = algId.getAlgorithm(); if (!oid.getId().equals("1.2.840.10045.2.1")) { throw new IllegalArgumentException("Expecting SM2 public key"); } byte[] publicKeyBytes = spki.getPublicKeyData().getBytes(); PemObject pemObject = new PemObject("PUBLIC KEY", publicKeyBytes); PemReader pemReader = new PemReader(new FileReader("sm2_pub_key.pem")); pemObject = pemReader.readPemObject(); pemReader.close(); publicKeyBytes = pemObject.getContent(); JcaPEMKeyConverter converter = new JcaPEMKeyConverter().setProvider("BC"); ECPublicKey publicKey = (ECPublicKey) converter.getPublicKey(spki); // 打印公钥参数 ECNamedCurveParameterSpec spec = (ECNamedCurveParameterSpec) publicKey.getParams(); System.out.println("Curve: " + spec.getName()); System.out.println("X: " + publicKey.getW().getAffineX()); System.out.println("Y: " + publicKey.getW().getAffineY()); } } ``` 其中,`sm2_cert.pem`是SM2证书文件,`sm2_pub_key.pem`是SM2公钥文件。在读取公钥时,需要先解析SubjectPublicKeyInfo,再读取PEM格式的公钥文件,最后使用JcaPEMKeyConverter转换为ECPublicKey类型。打印公钥参数时,需要使用ECPublicKey的getParams()方法获取椭圆曲线参数。
评论 3
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值