原文地址:
http://www.jackyinfo.com/post/2011/05/11/98436.aspx
经过一段时间的研究,发现Java和.NET各自有各自的一套签名算法,数据一致,密钥一致,其实现的结果完全不同,经过不断研究,终于在朋友帮助下,实现了.NET与Java之间签名、验签、加密、解密均一致。废话不说,需要的朋友自己看以下代码,通过调用public方法即可实现,无需修改本实例代码。
—————————————————————我是分割线———————————————————————
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
|
using
System;
using
System.Collections.Generic;
using
System.Linq;
using
System.Text;
using
System.IO;
using
System.Security.Cryptography;
namespace
Alipay.Class
{
public
sealed
class
RSAFromPkcs8
{
/// <summary>
/// 签名
/// </summary>
/// <param name="content">需要签名的内容</param>
/// <param name="privateKey">私钥</param>
/// <returns></returns>
public
static
string
sign(
string
content,
string
privateKey)
{
byte
[] Data = Encoding.UTF8.GetBytes(content);
RSACryptoServiceProvider rsa = DecodePemPrivateKey(privateKey);
SHA1 sh =
new
SHA1CryptoServiceProvider();
byte
[] signData = rsa.SignData(Data, sh);
return
Convert.ToBase64String(signData);
}
/// <summary>
/// 验证签名
/// </summary>
/// <param name="content">需要验证的内容</param>
/// <param name="signedString">签名结果</param>
/// <param name="publicKey">公钥</param>
/// <returns></returns>
public
static
bool
verify(
string
content,
string
signedString,
string
publicKey)
{
bool
result =
false
;
byte
[] Data = Encoding.UTF8.GetBytes(content);
byte
[] data = Convert.FromBase64String(signedString);
RSAParameters paraPub = ConvertFromPublicKey(publicKey);
RSACryptoServiceProvider rsaPub =
new
RSACryptoServiceProvider();
rsaPub.ImportParameters(paraPub);
SHA1 sh =
new
SHA1CryptoServiceProvider();
result = rsaPub.VerifyData(Data, sh, data);
return
result;
}
public
static
string
decrypt(
byte
[] data,
string
privateKey)
{
string
result =
""
;
RSACryptoServiceProvider rsa = DecodePemPrivateKey(privateKey);
SHA1 sh =
new
SHA1CryptoServiceProvider();
byte
[] source = rsa.Decrypt(data,
false
);
Encoding utf8 = Encoding.UTF8;
char
[] asciiChars =
new
char
[utf8.GetCharCount(source, 0, source.Length)];
utf8.GetChars(source, 0, source.Length, asciiChars, 0);
result =
new
string
(asciiChars);
//result = ASCIIEncoding.ASCII.GetString(source);
return
result;
}
public
static
string
decryptData(
string
resData,
string
privateKey)
{
byte
[] DataToDecrypt = Convert.FromBase64String(resData);
string
result =
""
;
for
(
int
j = 0; j < DataToDecrypt.Length / 128; j++)
{
byte
[] buf =
new
byte
[128];
for
(
int
i = 0; i < 128; i++)
{
buf[i] = DataToDecrypt[i + 128 * j];
}
result += decrypt(buf, privateKey);
}
return
result;
}
/// <summary>
/// 解析java生成的pem文件私钥
/// </summary>
/// <param name="pemstr"></param>
/// <returns></returns>
private
static
RSACryptoServiceProvider DecodePemPrivateKey(String pemstr)
{
byte
[] pkcs8privatekey;
pkcs8privatekey = Convert.FromBase64String(pemstr);
if
(pkcs8privatekey !=
null
)
{
RSACryptoServiceProvider rsa = DecodePrivateKeyInfo(pkcs8privatekey);
return
rsa;
}
else
return
null
;
}
private
static
RSACryptoServiceProvider DecodePrivateKeyInfo(
byte
[] pkcs8)
{
byte
[] SeqOID = { 0x30, 0x0D, 0x06, 0x09, 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x01, 0x05, 0x00 };
byte
[] seq =
new
byte
[15];
MemoryStream mem =
new
MemoryStream(pkcs8);
int
lenstream = (
int
)mem.Length;
BinaryReader binr =
new
BinaryReader(mem);
//wrap Memory Stream with BinaryReader for easy reading
byte
bt = 0;
ushort
twobytes = 0;
try
{
twobytes = binr.ReadUInt16();
if
(twobytes == 0x8130)
//data read as little endian order (actual data order for Sequence is 30 81)
binr.ReadByte();
//advance 1 byte
else
if
(twobytes == 0x8230)
binr.ReadInt16();
//advance 2 bytes
else
return
null
;
bt = binr.ReadByte();
if
(bt != 0x02)
return
null
;
twobytes = binr.ReadUInt16();
if
(twobytes != 0x0001)
return
null
;
seq = binr.ReadBytes(15);
//read the Sequence OID
if
(!CompareBytearrays(seq, SeqOID))
//make sure Sequence for OID is correct
return
null
;
bt = binr.ReadByte();
if
(bt != 0x04)
//expect an Octet string
return
null
;
bt = binr.ReadByte();
//read next byte, or next 2 bytes is 0x81 or 0x82; otherwise bt is the byte count
if
(bt == 0x81)
binr.ReadByte();
else
if
(bt == 0x82)
binr.ReadUInt16();
//------ at this stage, the remaining sequence should be the RSA private key
byte
[] rsaprivkey = binr.ReadBytes((
int
)(lenstream - mem.Position));
RSACryptoServiceProvider rsacsp = DecodeRSAPrivateKey(rsaprivkey);
return
rsacsp;
}
catch
(Exception)
{
return
null
;
}
finally
{ binr.Close(); }
}
private
static
bool
CompareBytearrays(
byte
[] a,
byte
[] b)
{
if
(a.Length != b.Length)
return
false
;
int
i = 0;
foreach
(
byte
c
in
a)
{
if
(c != b[i])
return
false
;
i++;
}
return
true
;
}
private
static
RSACryptoServiceProvider DecodeRSAPrivateKey(
byte
[] privkey)
{
byte
[] MODULUS, E, D, P, Q, DP, DQ, IQ;
// --------- Set up stream to decode the asn.1 encoded RSA private key ------
MemoryStream mem =
new
MemoryStream(privkey);
BinaryReader binr =
new
BinaryReader(mem);
//wrap Memory Stream with BinaryReader for easy reading
byte
bt = 0;
ushort
twobytes = 0;
int
elems = 0;
try
{
twobytes = binr.ReadUInt16();
if
(twobytes == 0x8130)
//data read as little endian order (actual data order for Sequence is 30 81)
binr.ReadByte();
//advance 1 byte
else
if
(twobytes == 0x8230)
binr.ReadInt16();
//advance 2 bytes
else
return
null
;
twobytes = binr.ReadUInt16();
if
(twobytes != 0x0102)
//version number
return
null
;
bt = binr.ReadByte();
if
(bt != 0x00)
return
null
;
//------ all private key components are Integer sequences ----
elems = GetIntegerSize(binr);
MODULUS = binr.ReadBytes(elems);
elems = GetIntegerSize(binr);
E = binr.ReadBytes(elems);
elems = GetIntegerSize(binr);
D = binr.ReadBytes(elems);
elems = GetIntegerSize(binr);
P = binr.ReadBytes(elems);
elems = GetIntegerSize(binr);
Q = binr.ReadBytes(elems);
elems = GetIntegerSize(binr);
DP = binr.ReadBytes(elems);
elems = GetIntegerSize(binr);
DQ = binr.ReadBytes(elems);
elems = GetIntegerSize(binr);
IQ = binr.ReadBytes(elems);
// ------- create RSACryptoServiceProvider instance and initialize with public key -----
RSACryptoServiceProvider RSA =
new
RSACryptoServiceProvider();
RSAParameters RSAparams =
new
RSAParameters();
RSAparams.Modulus = MODULUS;
RSAparams.Exponent = E;
RSAparams.D = D;
RSAparams.P = P;
RSAparams.Q = Q;
RSAparams.DP = DP;
RSAparams.DQ = DQ;
RSAparams.InverseQ = IQ;
RSA.ImportParameters(RSAparams);
return
RSA;
}
catch
(Exception)
{
return
null
;
}
finally
{ binr.Close(); }
}
private
static
int
GetIntegerSize(BinaryReader binr)
{
byte
bt = 0;
byte
lowbyte = 0x00;
byte
highbyte = 0x00;
int
count = 0;
bt = binr.ReadByte();
if
(bt != 0x02)
//expect integer
return
0;
bt = binr.ReadByte();
if
(bt == 0x81)
count = binr.ReadByte();
// data size in next byte
else
if
(bt == 0x82)
{
highbyte = binr.ReadByte();
// data size in next 2 bytes
lowbyte = binr.ReadByte();
byte
[] modint = { lowbyte, highbyte, 0x00, 0x00 };
count = BitConverter.ToInt32(modint, 0);
}
else
{
count = bt;
// we already have the data size
}
while
(binr.ReadByte() == 0x00)
{
//remove high order zeros in data
count -= 1;
}
binr.BaseStream.Seek(-1, SeekOrigin.Current);
//last ReadByte wasn't a removed zero, so back up a byte
return
count;
}
#region 解析.net 生成的Pem
private
static
RSAParameters ConvertFromPublicKey(
string
pemFileConent)
{
byte
[] keyData = Convert.FromBase64String(pemFileConent);
if
(keyData.Length < 162)
{
throw
new
ArgumentException(
"pem file content is incorrect."
);
}
byte
[] pemModulus =
new
byte
[128];
byte
[] pemPublicExponent =
new
byte
[3];
Array.Copy(keyData, 29, pemModulus, 0, 128);
Array.Copy(keyData, 159, pemPublicExponent, 0, 3);
RSAParameters para =
new
RSAParameters();
para.Modulus = pemModulus;
para.Exponent = pemPublicExponent;
return
para;
}
private
static
RSAParameters ConvertFromPrivateKey(
string
pemFileConent)
{
byte
[] keyData = Convert.FromBase64String(pemFileConent);
if
(keyData.Length < 609)
{
throw
new
ArgumentException(
"pem file content is incorrect."
);
}
int
index = 11;
byte
[] pemModulus =
new
byte
[128];
Array.Copy(keyData, index, pemModulus, 0, 128);
index += 128;
index += 2;
//141
byte
[] pemPublicExponent =
new
byte
[3];
Array.Copy(keyData, index, pemPublicExponent, 0, 3);
index += 3;
index += 4;
//148
byte
[] pemPrivateExponent =
new
byte
[128];
Array.Copy(keyData, index, pemPrivateExponent, 0, 128);
index += 128;
index += ((
int
)keyData[index + 1] == 64 ? 2 : 3);
//279
byte
[] pemPrime1 =
new
byte
[64];
Array.Copy(keyData, index, pemPrime1, 0, 64);
index += 64;
index += ((
int
)keyData[index + 1] == 64 ? 2 : 3);
//346
byte
[] pemPrime2 =
new
byte
[64];
Array.Copy(keyData, index, pemPrime2, 0, 64);
index += 64;
index += ((
int
)keyData[index + 1] == 64 ? 2 : 3);
//412/413
byte
[] pemExponent1 =
new
byte
[64];
Array.Copy(keyData, index, pemExponent1, 0, 64);
index += 64;
index += ((
int
)keyData[index + 1] == 64 ? 2 : 3);
//479/480
byte
[] pemExponent2 =
new
byte
[64];
Array.Copy(keyData, index, pemExponent2, 0, 64);
index += 64;
index += ((
int
)keyData[index + 1] == 64 ? 2 : 3);
//545/546
byte
[] pemCoefficient =
new
byte
[64];
Array.Copy(keyData, index, pemCoefficient, 0, 64);
RSAParameters para =
new
RSAParameters();
para.Modulus = pemModulus;
para.Exponent = pemPublicExponent;
para.D = pemPrivateExponent;
para.P = pemPrime1;
para.Q = pemPrime2;
para.DP = pemExponent1;
para.DQ = pemExponent2;
para.InverseQ = pemCoefficient;
return
para;
}
#endregion
}
}
|
说明:
public static string sign(string content, string privateKey) 此方法用于签名,第一个参数是需要签名的数据,第二个参数是匹配的私钥
public static bool verify(string content, string signedString, string publicKey) 此方法用于验签,第一次参数是需要签名的数据,第二个是需要匹配的签名,第三个是匹配的公钥
public static string decryptData(string resData, string privateKey) 此方法用于解密操作,第一个参数是需要解密的数据,第二个参数是匹配的私钥
—————————————————————我是分割线———————————————————————