java微信转账到银行卡 psk#1 转psk#8遇到的各种坑!!

把RSA公钥格式PKCS#1转换成PKCS#8 的坑在于   pom.xml导入的jar

 

/**
 * rsa加密
 * @author zcx
 * @date 2019年10月18日
 * */
public class GetRSA {  
 /**
  * @param publicKeyPKCS8  为pkcs8格式的公钥
  * */
   public static String getRSA(String str,String publicKeyPKCS8) throws Exception {
       byte[] cipherData= RSAEncrypt.encrypt(RSAEncrypt.loadPublicKeyByStr(publicKeyPKCS8),str.getBytes());
       String cipher=Base64.encode(cipherData);  
       return cipher;
         
   }
}  
package com.dlc.modules.wxpaybank.util;

import java.security.InvalidKeyException;

import java.security.NoSuchAlgorithmException;

import java.security.interfaces.RSAPublicKey;
import java.security.spec.InvalidKeySpecException;


import javax.crypto.BadPaddingException;
import javax.crypto.Cipher;
import javax.crypto.IllegalBlockSizeException;
import javax.crypto.NoSuchPaddingException;


public class RSAEncrypt {

    private static final char[] HEX_CHAR = { '0', '1', '2', '3', '4', '5', '6',
            '7', '8', '9', 'a', 'b', 'c', 'd', 'e', 'f' };
    public static RSAPublicKey loadPublicKeyByStr(String publicKeyStr)
            throws Exception {
        try {
      /**网上大部分都是这种写法,但是这个写法出来,会报 公钥非法,我怀疑,压根就没有把 PKCS#1转换成PKCS#8*/
        /*    byte[] buffer = Base64.decode(publicKeyStr);
            KeyFactory keyFactory = KeyFactory.getInstance("RSA");
            X509EncodedKeySpec keySpec = new X509EncodedKeySpec(buffer);
            rsPublickey = (RSAPublicKey) keyFactory.generatePublic(keySpec);
            return (RSAPublicKey) publicKeyPKCS8;
             */
            //把RSA公钥格式PKCS#1转换成PKCS#8
            org.bouncycastle.asn1.pkcs.RSAPublicKey rsaPublicKey =  org.bouncycastle.asn1.pkcs.RSAPublicKey.getInstance(
                    org.bouncycastle.util.encoders.Base64.decode(publicKeyStr));

            java.security.spec.RSAPublicKeySpec publicKeySpec = new java.security.spec.RSAPublicKeySpec(rsaPublicKey.getModulus(), rsaPublicKey.getPublicExponent());

            java.security.KeyFactory keyFactory = java.security.KeyFactory.getInstance("RSA");

            java.security.PublicKey publicKeyPKCS8 = keyFactory.generatePublic(publicKeySpec);

            return (RSAPublicKey)publicKeyPKCS8;

        } catch (NoSuchAlgorithmException e) {
            e.printStackTrace();
            throw new Exception("无此算法");
        } catch (InvalidKeySpecException e) {
            e.printStackTrace();
            throw new Exception("公钥非法");
        } catch (NullPointerException e) {
            e.printStackTrace();
            throw new Exception("公钥数据为空");
        }

    }


    /**
     *
     *  公钥加密过程
     * @param publicKey
     *
     * @param plainTextData
     *          明文数据
     * @return
     * @throws Exception
     *           加密过程中的异常信息
     */
    public static byte[] encrypt(RSAPublicKey publicKey, byte[] plainTextData)
            throws Exception {
        if (publicKey == null) {
            throw new Exception("加密公钥为空, 请设置");
        }
        Cipher cipher = null;
        try {

            cipher = Cipher.getInstance("RSA/ECB/OAEPWithSHA1AndMGF1Padding");

            cipher.init(Cipher.ENCRYPT_MODE, publicKey);
            byte[] output = cipher.doFinal(plainTextData);
            return output;
        } catch (NoSuchAlgorithmException e) {
            throw new Exception("无此加密算法");
        } catch (NoSuchPaddingException e) {
            e.printStackTrace();
            return null;
        } catch (InvalidKeyException e) {
            throw new Exception("加密公钥非法,请检查");
        } catch (IllegalBlockSizeException e) {
            throw new Exception("明文长度非法");
        } catch (BadPaddingException e) {
            throw new Exception("明文数据已损坏");
        }
    }


}

 

 

 

  • 1
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 4
    评论
评论 4
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值