java der格式_用Java读取OpenSSL生成的,PEM / DER格式的S / MIME消息

以下是使用BouncyCastle 1.57(受this article启发)解密的方法:

import org.bouncycastle.cms.CMSEnvelopedData;

import org.bouncycastle.cms.CMSException;

import org.bouncycastle.cms.KeyTransRecipientInformation;

import org.bouncycastle.cms.RecipientInformation;

import org.bouncycastle.cms.jcajce.JceKeyTransEnvelopedRecipient;

import org.bouncycastle.cms.jcajce.JceKeyTransRecipient;

import org.bouncycastle.util.encoders.Base64;

import java.security.KeyFactory;

import java.security.NoSuchAlgorithmException;

import java.security.PrivateKey;

import java.security.spec.InvalidKeySpecException;

import java.security.spec.PKCS8EncodedKeySpec;

import java.util.Collection;

public class PKCS7Decryptor {

private PrivateKey privateKey;

public PKCS7Decryptor(String privateKeyStr) {

try {

byte[] privateKeyData = extractRawData(privateKeyStr, "PRIVATE KEY");

PKCS8EncodedKeySpec kspec = new PKCS8EncodedKeySpec(privateKeyData);

KeyFactory kf = KeyFactory.getInstance("RSA");

privateKey = kf.generatePrivate(kspec);

} catch (NoSuchAlgorithmException | InvalidKeySpecException e) {

throw new RuntimeException("Unable to parse private key");

}

}

public String decrypt(String encryptedText) throws CMSException {

byte[] data = extractRawData(encryptedText, "PKCS7");

CMSEnvelopedData envelopedData = new CMSEnvelopedData(data);

Collection recipients = envelopedData.getRecipientInfos().getRecipients();

KeyTransRecipientInformation recipientInfo = (KeyTransRecipientInformation) recipients.iterator().next();

JceKeyTransRecipient recipient = new JceKeyTransEnvelopedRecipient(privateKey);

return new String(recipientInfo.getContent(recipient));

}

private byte[] extractRawData(String text, String dataType) {

return Base64.decode(text

.replace(String.format("-----BEGIN %s-----", dataType), "")

.replace(String.format("-----END %s-----", dataType), ""));

}

}

一些解释:

在类构造函数中,私钥被转换为适当的格式

页眉和页脚(如"-----BEGIN PKCS7-----")将被删除,内容将进行base64解码

TR34ObjectIdentifers DEFINITIONS EXPLICIT TAGS ::= BEGIN -- Content types, from PKCS #7 -- pkcs7 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs7(7) } id-data OBJECT IDENTIFIER ::= { pkcs7 data(1) } id-signedData OBJECT IDENTIFIER ::= { pkcs7 signedData(2) } id-envelopedData OBJECT IDENTIFIER ::= { pkcs7 envelopedData (3) } id-digestedData OBJECT IDENTIFIER ::= { pkcs7 digestedData(5) } id-encryptedData OBJECT IDENTIFIER ::= { pkcs7 encryptedData (6) } pkcs9 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs9(9) } smime OBJECT IDENTIFIER ::= { pkcs9 smime(16) } -- Signed attributes, from PKCS #9, S/MIME, and ANS X9.73 -- id-contentType OBJECT IDENTIFIER ::= { pkcs9 contentType(3) } id-messageDigest OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs9(9) 4 } id-signingTime OBJECT IDENTIFIER ::= { pkcs9 signingTime(5) } id-contentIdentifier OBJECT IDENTIFIER ::= { smime id-aa(2) contentIdentifier(7) } id-msgSequenceNo OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) x973(10060) attribute(1) msgSequenceNo(1) } id-signingCertificate OBJECT IDENTIFIER ::= { smime id-aa(2) signingCertificate(12) } id-otherSigningCert OBJECT IDENTIFIER ::= { itu-t(0) identified-organization(4) etsi(0) electronic-signature-standard(1733) part1(1) attributes(1) 12 } id-biometricSyntax OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) x973(10060) attribute(1) biometricSyntax(2) } END 请理解这段代码,并使用openssl的接口,采用linux c编程完成对数据的编码和解码
06-02
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值