php java go RSA加密解密,加签验签

来源:互联网 发布:网络视频营销成功案例 编辑:程序博客网 时间:2024/05/23 20:40

详见:https://github.com/williamylian/x-rsa


PHP:

if (! function_exists('url_safe_base64_encode')) {    function url_safe_base64_encode ($data) {        return str_replace(array('+','/', '='),array('-','_', ''), base64_encode($data));    }}if (! function_exists('url_safe_base64_decode')) {    function url_safe_base64_decode ($data) {        $base_64 = str_replace(array('-','_'),array('+','/'), $data);        return base64_decode($base_64);    }}if (! function_exists('base64_to_url_safe_base64')) {    function base64_to_url_safe_base64 ($data) {        return str_replace(array('+', '/', '='),array('-', '_', ''), $data);    }}if (! function_exists('url_safe_base64_to_base64')) {    function url_safe_base64_to_base64 ($data) {        return str_replace(array('-','_'),array('+','/'), $data);    }}class XRsa{    const CHAR_SET = "UTF-8";    const BASE_64_FORMAT = "UrlSafeNoPadding";    const RSA_ALGORITHM_KEY_TYPE = OPENSSL_KEYTYPE_RSA;    const RSA_ALGORITHM_SIGN = OPENSSL_ALGO_SHA256;    protected $public_key;    protected $private_key;    protected $key_len;    public function __construct($pub_key, $pri_key = null)    {        $this->public_key = $pub_key;        $this->private_key = $pri_key;        $pub_id = openssl_get_publickey($this->public_key);        $this->key_len = openssl_pkey_get_details($pub_id)['bits'];    }    //生成密钥对    public static function createKeys($key_size = 2048)    {        $config = array(            "private_key_bits" => $key_size,            "private_key_type" => self::RSA_ALGORITHM_KEY_TYPE,        );        $res = openssl_pkey_new($config);        openssl_pkey_export($res, $private_key);        $public_key_detail = openssl_pkey_get_details($res);        $public_key = $public_key_detail["key"];        return [            "public_key" => $public_key,            "private_key" => $private_key,        ];    }    //公钥加密    public function publicEncrypt($data)    {        $encrypted = '';        $part_len = $this->key_len / 8 - 11;        $parts = str_split($data, $part_len);        foreach ($parts as $part) {            $encrypted_temp = '';            openssl_public_encrypt($part, $encrypted_temp, $this->public_key);            $encrypted .= $encrypted_temp;        }        return url_safe_base64_encode($encrypted);    }    //私钥解密    public function privateDecrypt($encrypted)    {        $decrypted = "";        $part_len = $this->key_len / 8;        $base64_decoded = url_safe_base64_decode($encrypted);        $parts = str_split($base64_decoded, $part_len);        foreach ($parts as $part) {            $decrypted_temp = '';            openssl_private_decrypt($part, $decrypted_temp,$this->private_key);            $decrypted .= $decrypted_temp;        }        return $decrypted;    }    //私钥加密    public function privateEncrypt($data)    {        $encrypted = '';        $part_len = $this->key_len / 8 - 11;        $parts = str_split($data, $part_len);        foreach ($parts as $part) {            $encrypted_temp = '';            openssl_private_encrypt($part, $encrypted_temp, $this->private_key);            $encrypted .= $encrypted_temp;        }        return url_safe_base64_encode($encrypted);    }    //公钥解密    public function publicDecrypt($encrypted)    {        $decrypted = "";        $part_len = $this->key_len / 8;        $base64_decoded = url_safe_base64_decode($encrypted);        $parts = str_split($base64_decoded, $part_len);        foreach ($parts as $part) {            $decrypted_temp = '';            openssl_public_decrypt($part, $decrypted_temp,$this->public_key);            $decrypted .= $decrypted_temp;        }        return $decrypted;    }    //签名    public function sign($data)    {        openssl_sign($data, $sign, $this->private_key, self::RSA_ALGORITHM_SIGN);        return url_safe_base64_encode($sign);    }    //验签    public function verify($data, $sign)    {        $pub_id = openssl_get_publickey($this->public_key);        $res = openssl_verify($data, url_safe_base64_decode($sign), $pub_id, self::RSA_ALGORITHM_SIGN);        return $res;    }}


GoLang:

package xrsaimport ("encoding/pem""encoding/base64""crypto/x509""crypto/rsa""crypto/rand""errors""crypto""io""bytes""encoding/asn1")const (CHAR_SET = "UTF-8"BASE_64_FORMAT = "UrlSafeNoPadding"RSA_ALGORITHM_KEY_TYPE = "PKCS8"RSA_ALGORITHM_SIGN = crypto.SHA256)type XRsa struct {publicKey *rsa.PublicKeyprivateKey *rsa.PrivateKey}func CreateKeys(publicKeyWriter, privateKeyWriter io.Writer, keyLength int) error {// 生成私钥文件privateKey, err := rsa.GenerateKey(rand.Reader, keyLength)if err != nil {return err}derStream := MarshalPKCS8PrivateKey(privateKey)block := &pem.Block{Type:  "PRIVATE KEY",Bytes: derStream,}err = pem.Encode(privateKeyWriter, block)if err != nil {return err}// 生成公钥文件publicKey := &privateKey.PublicKeyderPkix, err := x509.MarshalPKIXPublicKey(publicKey)if err != nil {return err}block = &pem.Block{Type:  "PUBLIC KEY",Bytes: derPkix,}err = pem.Encode(publicKeyWriter, block)if err != nil {return err}return nil}func NewXRsa(publicKey []byte, privateKey []byte) (*XRsa, error) {block, _ := pem.Decode(publicKey)if block == nil {return nil, errors.New("public key error")}pubInterface, err := x509.ParsePKIXPublicKey(block.Bytes)if err != nil {return nil, err}pub := pubInterface.(*rsa.PublicKey)block, _ = pem.Decode(privateKey)if block == nil {return nil, errors.New("private key error!")}priv, err := x509.ParsePKCS8PrivateKey(block.Bytes)if err != nil {return nil, err}pri, ok := priv.(*rsa.PrivateKey)if ok {return &XRsa {publicKey: pub,privateKey: pri,}, nil} else {return nil, errors.New("private key not supported")}}func (r *XRsa) PublicEncrypt(data string) (string, error) {partLen := r.publicKey.N.BitLen() / 8 - 11chunks := split([]byte(data), partLen)buffer := bytes.NewBufferString("")for _, chunk := range chunks {bytes, err := rsa.EncryptPKCS1v15(rand.Reader, r.publicKey, chunk)if err != nil {return "", err}buffer.Write(bytes)}return base64.RawURLEncoding.EncodeToString(buffer.Bytes()), nil}func (r *XRsa) PrivateDecrypt(encrypted string) (string, error) {partLen := r.publicKey.N.BitLen() / 8raw, err := base64.RawURLEncoding.DecodeString(encrypted)chunks := split([]byte(raw), partLen)buffer := bytes.NewBufferString("")for _, chunk := range chunks {decrypted, err := rsa.DecryptPKCS1v15(rand.Reader, r.privateKey, chunk)if err != nil {return "", err}buffer.Write(decrypted)}return buffer.String(), err}func (r *XRsa) Sign(data string) (string, error) {h := RSA_ALGORITHM_SIGN.New()h.Write([]byte(data))hashed := h.Sum(nil)sign, err := rsa.SignPKCS1v15(rand.Reader, r.privateKey, RSA_ALGORITHM_SIGN, hashed)if err != nil {return "", err}return base64.RawURLEncoding.EncodeToString(sign), err}func (r *XRsa) Verify(data string, sign string) error {h := RSA_ALGORITHM_SIGN.New()h.Write([]byte(data))hashed := h.Sum(nil)decodedSign, err := base64.RawURLEncoding.DecodeString(sign)if err != nil {return err}return rsa.VerifyPKCS1v15(r.publicKey, RSA_ALGORITHM_SIGN, hashed, decodedSign)}func MarshalPKCS8PrivateKey(key *rsa.PrivateKey) []byte {info := struct {Version             intPrivateKeyAlgorithm []asn1.ObjectIdentifierPrivateKey          []byte}{}info.Version = 0info.PrivateKeyAlgorithm = make([]asn1.ObjectIdentifier, 1)info.PrivateKeyAlgorithm[0] = asn1.ObjectIdentifier{1, 2, 840, 113549, 1, 1, 1}info.PrivateKey = x509.MarshalPKCS1PrivateKey(key)k, _ := asn1.Marshal(info)return k}func split(buf []byte, lim int) [][]byte {var chunk []bytechunks := make([][]byte, 0, len(buf)/lim+1)for len(buf) >= lim {chunk, buf = buf[:lim], buf[lim:]chunks = append(chunks, chunk)}if len(buf) > 0 {chunks = append(chunks, buf[:len(buf)])}return chunks}

Java:

package com.inspii;import org.apache.commons.codec.binary.Base64;import org.apache.commons.io.IOUtils;import javax.crypto.Cipher;import java.io.ByteArrayOutputStream;import java.security.*;import java.security.interfaces.RSAPublicKey;import java.security.interfaces.RSAPrivateKey;import java.security.spec.PKCS8EncodedKeySpec;import java.security.spec.X509EncodedKeySpec;import java.util.HashMap;import java.util.Map;public class XRsa {    public static final String CHARSET = "UTF-8";    public static final String RSA_ALGORITHM = "RSA";    public static final String RSA_ALGORITHM_SIGN = "SHA256WithRSA";    private RSAPublicKey publicKey;    private RSAPrivateKey privateKey;    public XRsa(String publicKey, String privateKey)    {        try {            KeyFactory keyFactory = KeyFactory.getInstance(RSA_ALGORITHM);            //通过X509编码的Key指令获得公钥对象            X509EncodedKeySpec x509KeySpec = new X509EncodedKeySpec(Base64.decodeBase64(publicKey));            this.publicKey = (RSAPublicKey) keyFactory.generatePublic(x509KeySpec);            //通过PKCS#8编码的Key指令获得私钥对象            PKCS8EncodedKeySpec pkcs8KeySpec = new PKCS8EncodedKeySpec(Base64.decodeBase64(privateKey));            this.privateKey = (RSAPrivateKey) keyFactory.generatePrivate(pkcs8KeySpec);        } catch (Exception e) {            throw new RuntimeException("不支持的密钥", e);        }    }    public static Map<String, String> createKeys(int keySize){        //为RSA算法创建一个KeyPairGenerator对象        KeyPairGenerator kpg;        try{            kpg = KeyPairGenerator.getInstance(RSA_ALGORITHM);        }catch(NoSuchAlgorithmException e){            throw new IllegalArgumentException("No such algorithm-->[" + RSA_ALGORITHM + "]");        }        //初始化KeyPairGenerator对象,不要被initialize()源码表面上欺骗,其实这里声明的size是生效的        kpg.initialize(keySize);        //生成密匙对        KeyPair keyPair = kpg.generateKeyPair();        //得到公钥        Key publicKey = keyPair.getPublic();        String publicKeyStr = Base64.encodeBase64URLSafeString(publicKey.getEncoded());        //得到私钥        Key privateKey = keyPair.getPrivate();        String privateKeyStr = Base64.encodeBase64URLSafeString(privateKey.getEncoded());        Map<String, String> keyPairMap = new HashMap<String, String>();        keyPairMap.put("publicKey", publicKeyStr);        keyPairMap.put("privateKey", privateKeyStr);        return keyPairMap;    }    public String publicEncrypt(String data){        try{            Cipher cipher = Cipher.getInstance(RSA_ALGORITHM);            cipher.init(Cipher.ENCRYPT_MODE, publicKey);            return Base64.encodeBase64URLSafeString(rsaSplitCodec(cipher, Cipher.ENCRYPT_MODE, data.getBytes(CHARSET), publicKey.getModulus().bitLength()));        }catch(Exception e){            throw new RuntimeException("加密字符串[" + data + "]时遇到异常", e);        }    }    public String privateDecrypt(String data){        try{            Cipher cipher = Cipher.getInstance(RSA_ALGORITHM);            cipher.init(Cipher.DECRYPT_MODE, privateKey);            return new String(rsaSplitCodec(cipher, Cipher.DECRYPT_MODE, Base64.decodeBase64(data), publicKey.getModulus().bitLength()), CHARSET);        }catch(Exception e){            throw new RuntimeException("解密字符串[" + data + "]时遇到异常", e);        }    }    public String privateEncrypt(String data){        try{            Cipher cipher = Cipher.getInstance(RSA_ALGORITHM);            cipher.init(Cipher.ENCRYPT_MODE, privateKey);            return Base64.encodeBase64URLSafeString(rsaSplitCodec(cipher, Cipher.ENCRYPT_MODE, data.getBytes(CHARSET), publicKey.getModulus().bitLength()));        }catch(Exception e){            throw new RuntimeException("加密字符串[" + data + "]时遇到异常", e);        }    }    public String publicDecrypt(String data){        try{            Cipher cipher = Cipher.getInstance(RSA_ALGORITHM);            cipher.init(Cipher.DECRYPT_MODE, publicKey);            return new String(rsaSplitCodec(cipher, Cipher.DECRYPT_MODE, Base64.decodeBase64(data), publicKey.getModulus().bitLength()), CHARSET);        }catch(Exception e){            throw new RuntimeException("解密字符串[" + data + "]时遇到异常", e);        }    }    public String sign(String data){        try{            //sign            Signature signature = Signature.getInstance(RSA_ALGORITHM_SIGN);            signature.initSign(privateKey);            signature.update(data.getBytes(CHARSET));            return Base64.encodeBase64URLSafeString(signature.sign());        }catch(Exception e){            throw new RuntimeException("签名字符串[" + data + "]时遇到异常", e);        }    }    public boolean verify(String data, String sign){        try{            Signature signature = Signature.getInstance(RSA_ALGORITHM_SIGN);            signature.initVerify(publicKey);            signature.update(data.getBytes(CHARSET));            return signature.verify(Base64.decodeBase64(sign));        }catch(Exception e){            throw new RuntimeException("验签字符串[" + data + "]时遇到异常", e);        }    }    private static byte[] rsaSplitCodec(Cipher cipher, int opmode, byte[] datas, int keySize){        int maxBlock = 0;        if(opmode == Cipher.DECRYPT_MODE){            maxBlock = keySize / 8;        }else{            maxBlock = keySize / 8 - 11;        }        ByteArrayOutputStream out = new ByteArrayOutputStream();        int offSet = 0;        byte[] buff;        int i = 0;        try{            while(datas.length > offSet){                if(datas.length-offSet > maxBlock){                    buff = cipher.doFinal(datas, offSet, maxBlock);                }else{                    buff = cipher.doFinal(datas, offSet, datas.length-offSet);                }                out.write(buff, 0, buff.length);                i++;                offSet = i * maxBlock;            }        }catch(Exception e){            throw new RuntimeException("加解密阀值为["+maxBlock+"]的数据时发生异常", e);        }        byte[] resultDatas = out.toByteArray();        IOUtils.closeQuietly(out);        return resultDatas;    }}