c语言 java php 加密_php RSA 加密 与java加密互交,java解密

php

class encrypt{

var $pub_key;

function redPukey()

{

$pubKey = "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";

$pem = chunk_split($pubKey,64,"\n");//转换为pem格式的公钥

$pem = "-----BEGIN CERTIFICATE-----\n".$pem."-----END CERTIFICATE-----\n";

$publicKey = openssl_pkey_get_public($pem);

//$certificateCAcerContent = file_get_contents("../cer/cert_usercenter/TLCert4Sign_test.cer");

//$pub_key = openssl_get_publickey($certificateCAcerContent);

//return $pub_key;

return $publicKey;

}

/*

签名数据:

data:utf-8编码的订单原文,

privatekeyFile:私钥路径

passphrase:私钥password

返回:base64转码的签名数据

*/

function sign($data)

{

//证书路径

$privatekeyFile="../cer/testMemberKey.pfx";

//证书私钥

$passphrase="testMemberKey";

$signature = '';

$privateKey;

$signedMsg;

$pkcs12 = file_get_contents($privatekeyFile);

if (openssl_pkcs12_read($pkcs12, $certs, "testMemberKey")) {

$privateKey = $certs['pkey'];

}

if (openssl_sign($data, $signedMsg, $privateKey,OPENSSL_ALGO_SHA1)) {

$signedMsg= strtoupper(bin2hex($signedMsg));//这个看情况。有些不须要转换成16进制,有些须要base64编码。

看各个接口

return $signedMsg;

}

// $privatekey = openssl_pkey_get_private(file_get_contents($privatekeyFile),$passphrase);

// $res=openssl_get_privatekey($privatekey);

//openssl_sign($data, $signature, $res);

// openssl_free_key($res);

// return base64_encode($signature);

return $privateKey;

}

function pubkeyEncrypt($data,$panText,$pubkey){

openssl_public_encrypt($data,$panText,$pubkey,OPENSSL_PKCS1_PADDING);

return strtoupper(bin2hex($panText));

}

function getBytes($string) {

$bytes = array();

for($i = 0; $i < strlen($string); $i++){

$bytes[] = ord($string[$i]);

}

return $bytes;

}

}

?>

php

require_once("encrypt.php");

$dateEncrypt=new encrypt();

$pukey=$dateEncrypt->redPukey();

//公钥加密

$userName= $dateEncrypt->pubkeyEncrypt("測试数据",$userName,$pukey);

echo $userName;

//私钥加密

$signBytes=$dateEncrypt->sign($signSrc);

echo $signBytes;

?>

參考php 手冊—>函数拓展—>加密拓展

php  RSA  加密  加密结果每次都会不一样,这是正确的。 跟java 有差别。java  结果不会变。可是java  能解出来。

证书都须要转换下  pem 格式才干使用。

java   部分

package com.allinpay.common.util;

import java.io.FileInputStream;

import java.io.FileNotFoundException;

import java.io.IOException;

import java.security.InvalidKeyException;

import java.security.Key;

import java.security.KeyPair;

import java.security.KeyStore;

import java.security.KeyStoreException;

import java.security.NoSuchAlgorithmException;

import java.security.PrivateKey;

import java.security.PublicKey;

import java.security.Signature;

import java.security.SignatureException;

import java.security.UnrecoverableKeyException;

import java.security.cert.Certificate;

import java.security.cert.CertificateException;

import java.security.cert.CertificateFactory;

import java.security.cert.X509Certificate;

import javax.crypto.BadPaddingException;

import javax.crypto.Cipher;

import javax.crypto.IllegalBlockSizeException;

import javax.crypto.NoSuchPaddingException;

import org.bouncycastle.jce.provider.BouncyCastleProvider;

public class CertSignUtil {

/**

* 測试方法 从keystore中获得公私钥对

*

* @param filePath

* keystore文件路径

* @param keyStorePassword

* keystore password

* @param masterPassword

* 私钥主password。能够和keystorepassword同样也可不同

* @param alias

* 密钥对别名

*/

public static KeyPair getKeyFromKeyStore(String filePath,

String keyStorePassword, String masterPassword, String alias) {

KeyPair keyPair = null;

try {

KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType());

keyStore.load(new FileInputStream(filePath),

keyStorePassword.toCharArray());

Key key = keyStore.getKey(alias, masterPassword.toCharArray());

// 也能够从keyStore中直接读公钥证书,无须通过私钥转换

// Certificate cert = keyStore.getCertificate(alias);

// PublicKey pubKey = cert.getPublicKey();

if (key instanceof PrivateKey) {

Certificate cert = keyStore.getCertificate(alias);

keyPair = new KeyPair(cert.getPublicKey(), (PrivateKey) key);

}

PrivateKey privateKey = keyPair.getPrivate();

PublicKey publicKey = keyPair.getPublic();

} catch (KeyStoreException e) {

e.printStackTrace();

} catch (CertificateException e) {

e.printStackTrace();

} catch (NoSuchAlgorithmException e) {

e.printStackTrace();

} catch (IOException e) {

e.printStackTrace();

} catch (UnrecoverableKeyException e) {

e.printStackTrace();

}

return keyPair;

}

/**

* 使用私钥证书签名

*

* @param priKey

* 私钥对象

* @param plainText

* 明文文本的字节数组

* @param encAlg

* 加密算法

* @param signAlg

* 签名算法

* @return 加密后的密文串

*

* @see verifyByPubKey

*/

public static byte[] signByPriKey(Key priKey, byte[] srcBytes,

String signAlg) {

// 签名

byte[] signBytes = null;

try {

Signature sign = Signature.getInstance(signAlg,

new BouncyCastleProvider());

sign.initSign((PrivateKey) priKey);

sign.update(srcBytes);

signBytes = sign.sign();

} catch (NoSuchAlgorithmException e) {

// LoggerUtil.error("私钥签名 - 无效算法:");

} catch (InvalidKeyException e) {

// LoggerUtil.error("私钥签名 - 无效的密钥:");

} catch (SignatureException e) {

// LoggerUtil.error("私钥签名 - 签名异常:");

}

return signBytes;

}

/**

* Byte数组转十六进制字符串,字节间不用空格分隔

*

* @param b

* @return

*/

public static String bytes2HexString(byte[] b) {

String ret = "";

for (int i = 0; i < b.length; i++) {

String hex = Integer.toHexString(b[i] & 0xFF);

if (hex.length() == 1) {

hex = '0' + hex;

}

ret += hex.toUpperCase();

}

return ret;

}

/**

* 将指定字符串src,以每两个字符切割转换为16进制形式 如:"2B44EFD9" --> byte[]{0x2B, 0x44, 0xEF,

* 0xD9}

*

* @param src

* String格式字符串

* @return byte[]

*/

public static byte[] hexString2Bytes(String src) {

if (src.length() % 2 != 0) {

src = src + "0";

}

byte[] ret = new byte[src.length() / 2];

byte[] tmp = src.getBytes();

for (int i = 0; i < (src.length() / 2); i++) {

ret[i] = uniteBytes(tmp[i * 2], tmp[i * 2 + 1]);

}

return ret;

}

/**

* 将两个ASCII字符合成一个字节。 如:"EF"--> 0xEF

*

* @param src0

* byte

* @param src1

* byte

* @return byte

*/

public static byte uniteBytes(byte src0, byte src1) {

byte _b0 = Byte.decode("0x" + new String(new byte[] { src0 }))

.byteValue();

_b0 = (byte) (_b0 << 4);// 左移4bit。变成8位里的高4位

byte _b1 = Byte.decode("0x" + new String(new byte[] { src1 }))

.byteValue();// 不左移。保持在低4位

byte ret = (byte) (_b0 ^ _b1);// 按位异或就可以

return ret;

}

/**

* 使用公钥验证签名

*

* @param pubKey

* 公钥

* @param srcBytes

* 签名原串字节数组

* @param signBytes

* 签名串字节数组

* @param signAlg

* 签名算法

* @return 验签结果 true = 成功 false = 不成功

*

* @see signByPriKey

*/

public static boolean verifyByPubKey(Key pubKey, byte[] srcBytes,

byte[] signBytes, String signAlg) {

boolean result = false;

try {

Signature sign = Signature.getInstance(signAlg,

new BouncyCastleProvider());

sign.initVerify((PublicKey) pubKey);

sign.update(srcBytes);

result = sign.verify(signBytes);

} catch (NoSuchAlgorithmException e) {

// LoggerUtil.error("公钥验签 - 无效算法:");

} catch (InvalidKeyException e) {

// LoggerUtil.error("公钥验签 - 无效的密钥:");

} catch (SignatureException e) {

// LoggerUtil.error("公钥验签 - 签名异常:");

}

return result;

}

/**

* 从证书文件读取公钥

*

* @param certFilePath

* 公钥证书路径

* @return 公钥

*/

public static Key getPubKeyFromCertFile(String certFilePath) {

PublicKey key = null;

try {

CertificateFactory factory = CertificateFactory

.getInstance("X.509");

FileInputStream fis = new FileInputStream(certFilePath);

X509Certificate cert = (X509Certificate) factory

.generateCertificate(fis);

key = cert.getPublicKey();

} catch (FileNotFoundException e) {

// LoggerUtil.error("从证书文件读取公钥 - 证书文件不存在:");

// LoggerUtil.error(e);

} catch (CertificateException e) {

// LoggerUtil.error("从证书文件读取公钥 - 密钥读取异常:");

// LoggerUtil.error(e);

}

return key;

}

// /**

// * 通过商户公钥证书验签

// * @param certStr 证书信息,如certStyle = 1 则certStr即为证书base64内容,如certStyle=0

// 则certStr即为证书保存路径

// * @param certStyle 证书获取格式 1为从DB获取base64编码的证书文本。 2为从指定路径取证书文件

// * @param srcMsg 签名源串

// * @param signMsg 签名串

// * @return

// */

// public static boolean verifyByCert(String certStr, int certStyle, String

// srcMsg, String signMsg){

//

//

// if(certStyle == 0){

// try{

// return verifyByPubKey(

// getPubKeyFromStr(certStr),

// srcMsg.getBytes("UTF-8"),

// hexString2Bytes(signMsg),

// SecurityUtil.MCHT_SIGN_ALG);

// }catch(Exception e){

// LoggerUtil.error(e);

// return false;

// }

//

// }else{

// LoggerUtil.error("參数中指定了非法的证书存储格式");

// return false;

// }

//

// }

/**

* 使用公钥加密

*

* @param pubKey

* 公钥对象

* @param plainText

* 明文文本的字节数组

* @param encAlg

* 加密算法

* @return 加密后的密文串

*

* @see decByPriKey

*/

public static byte[] encByPubKey(Key pubKey, byte[] plainText, String encAlg) {

// 加密

byte[] encBytes = null;

try {

Cipher cipher = Cipher.getInstance(encAlg,

new BouncyCastleProvider());

cipher.init(Cipher.ENCRYPT_MODE, pubKey);

encBytes = cipher.doFinal(plainText);

} catch (NoSuchAlgorithmException e) {

// LoggerUtil.error("公钥加密 - 无效算法:");

} catch (InvalidKeyException e) {

// LoggerUtil.error("公钥加密 - 无效密钥:");

} catch (IllegalBlockSizeException e) {

// LoggerUtil.error("公钥加密 - 非法的分块大小:");

} catch (NoSuchPaddingException e) {

// LoggerUtil.error("公钥加密 - 错误的填充格式:");

} catch (BadPaddingException e) {

// LoggerUtil.error("公钥加密 - 填充异常:");

}

return encBytes;

}

}

package com.allinpay.user;

import java.security.Key;

import java.security.KeyPair;

import com.allinpay.common.util.CertSignUtil;

import com.allinpay.common.util.Constants;

public class test {

public static void main(String[] args) {

KeyPair kp = CertSignUtil

.getKeyFromKeyStore("testMemberKey.keystore", "testMemberKey", "testMemberKey", "testMemberKey");

Key pubKey = CertSignUtil.getPubKeyFromCertFile("TLCert4Sign_test.cer");

System.out.println(pubKey);

byte[] encBytes = CertSignUtil.encByPubKey(pubKey, "測试数据".getBytes(), "RSA");

// System.out.println("aaaaaa" + new String(encBytes));

byte[] aaa = CertSignUtil.signByPriKey(kp.getPrivate(), "測试数据".getBytes(), Constants.SHA1_WITH_RSA);

System.out.println(aaa);

String signMsg = CertSignUtil.bytes2HexString(aaa);

System.out.println(signMsg);

byte[] encByte = CertSignUtil.encByPubKey(pubKey, "測试数据".getBytes(), "RSA");

String signMsg1 = CertSignUtil.bytes2HexString(encByte);

System.out.println(signMsg1);

}

}

java   RSA  默认的补码方式是  OPENSSL_PKCS1_PADDING  所以须要跟上面 php 代码部分一致。

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值