• C#使用SHA1加密类(RSAFromPkcs8)支持1024位和2048位私钥


    using System;
    using System.Collections.Generic;
    using System.Linq;
    using System.Text;
    using System.IO;
    using System.Security.Cryptography;
     
    namespace HelloWord.RSA
    {
        /// <summary>    
        /// 类名:RSAFromPkcs8    
        /// 功能:RSA加密、解密、签名、验签 (支持1024位和2048位私钥)    
        /// 详细:该类对Java生成的密钥进行解密和签名以及验签专用类,不需要修改    
        /// 版本:3.0    
        /// 日期:2013-07-08    
        /// 说明:    
        /// 以下代码只是为了方便商户测试而提供的样例代码,商户可以根据自己网站的需要,按照技术文档编写,并非一定要使用该代码。    
        /// </summary>
        public sealed class RSAFromPkcs8
        {
            /**
             * RSA最大解密密文大小
             *     注意:这个和密钥长度有关系, 公式= 密钥长度 / 8
             */
            private const int MAX_DECRYPT_BLOCK = 128;
    
            /// <summary>    
            /// 签名    
            /// </summary>    
            /// <param name="content">待签名字符串</param>    
            /// <param name="privateKey">私钥</param>    
            /// <param name="input_charset">编码格式</param>    
            /// <returns>签名后字符串</returns>    
            public static string sign(string content, string privateKey, string input_charset)  
            {  
                byte[] Data = Encoding.GetEncoding(input_charset).GetBytes(content);  
                RSACryptoServiceProvider rsa = DecodePemPrivateKey(privateKey);  
                SHA1 sh = new SHA1CryptoServiceProvider();  
                byte[] signData = rsa.SignData(Data, sh);  
                return Convert.ToBase64String(signData);  
            }  
      
            /// <summary>    
            /// 验签    
            /// </summary>    
            /// <param name="content">待验签字符串</param>    
            /// <param name="signedString">签名</param>    
            /// <param name="publicKey">公钥</param>    
            /// <param name="input_charset">编码格式</param>    
            /// <returns>true(通过),false(不通过)</returns>    
            public static bool verify(string content, string signedString, string publicKey, string input_charset)  
            {  
                bool result = false;  
                byte[] Data = Encoding.GetEncoding(input_charset).GetBytes(content);  
                byte[] data = Convert.FromBase64String(signedString);  
                RSAParameters paraPub = ConvertFromPublicKey(publicKey);  
                RSACryptoServiceProvider rsaPub = new RSACryptoServiceProvider();  
                rsaPub.ImportParameters(paraPub);  
                SHA1 sh = new SHA1CryptoServiceProvider();  
                result = rsaPub.VerifyData(Data, sh, data);  
                return result;  
            }  
      
            /// <summary>    
            /// 加密    
            /// </summary>    
            /// <param name="resData">需要加密的字符串</param>    
            /// <param name="publicKey">公钥</param>    
            /// <param name="input_charset">编码格式</param>    
            /// <returns>明文</returns>    
            public static string encryptData(string resData, string publicKey, string input_charset)  
            {  
                byte[] DataToEncrypt = Encoding.ASCII.GetBytes(resData);  
                string result = encrypt(DataToEncrypt, publicKey, input_charset);  
                return result;  
            }  
      
      
            /// <summary>    
            /// 解密    
            /// </summary>    
            /// <param name="resData">加密字符串</param>    
            /// <param name="privateKey">私钥</param>    
            /// <param name="input_charset">编码格式</param>    
            /// <returns>明文</returns>    
            public static string decryptData(string resData, string privateKey, string input_charset)  
            {  
                byte[] DataToDecrypt = Convert.FromBase64String(resData);  
                string result = "";
                for (int j = 0; j < DataToDecrypt.Length / MAX_DECRYPT_BLOCK; j++)  
                {
                    byte[] buf = new byte[MAX_DECRYPT_BLOCK];
                    for (int i = 0; i < MAX_DECRYPT_BLOCK; i++)  
                    {
    
                        buf[i] = DataToDecrypt[i + MAX_DECRYPT_BLOCK * j];  
                    }  
                    result += decrypt(buf, privateKey, input_charset);  
                }  
                return result;  
            }  
     
            #region 内部方法    
      
            private static string encrypt(byte[] data, string publicKey, string input_charset)  
            {  
                RSACryptoServiceProvider rsa = DecodePemPublicKey(publicKey);  
                SHA1 sh = new SHA1CryptoServiceProvider();  
                byte[] result = rsa.Encrypt(data, false);  
      
                return Convert.ToBase64String(result);  
            }  
      
            private static string decrypt(byte[] data, string privateKey, string input_charset)  
            {  
                string result = "";
    
                RSACryptoServiceProvider rsa = DecodePemPrivateKey(privateKey);
                //--- Edit for testing by lzyan ---
                //RSACryptoServiceProvider rsa = new RSACryptoServiceProvider();
                //RSAParameters paraPri = ConvertFromPrivateKey(privateKey);
                //rsa.ImportParameters(paraPri);
                //--- Edit End ---
    
                SHA1 sh = new SHA1CryptoServiceProvider();  
                byte[] source = rsa.Decrypt(data, false);  
                char[] asciiChars = new char[Encoding.GetEncoding(input_charset).GetCharCount(source, 0, source.Length)];  
                Encoding.GetEncoding(input_charset).GetChars(source, 0, source.Length, asciiChars, 0);  
                result = new string(asciiChars);
                //result = ASCIIEncoding.ASCII.GetString(source);    
                return result;  
            }  
      
            private static RSACryptoServiceProvider DecodePemPublicKey(String pemstr)  
            {  
                byte[] pkcs8publickkey;  
                pkcs8publickkey = Convert.FromBase64String(pemstr);  
                if (pkcs8publickkey != null)  
                {  
                    RSACryptoServiceProvider rsa = DecodeRSAPublicKey(pkcs8publickkey);  
                    return rsa;  
                }  
                else  
                    return null;  
            }  
      
            private static RSACryptoServiceProvider DecodePemPrivateKey(String pemstr)  
            {  
                byte[] pkcs8privatekey;  
                pkcs8privatekey = Convert.FromBase64String(pemstr);  
                if (pkcs8privatekey != null)  
                {  
                    RSACryptoServiceProvider rsa = DecodePrivateKeyInfo(pkcs8privatekey);  
                    return rsa;  
                }  
                else  
                    return null;  
            }  
      
            private static RSACryptoServiceProvider DecodePrivateKeyInfo(byte[] pkcs8)  
            {  
                byte[] SeqOID = { 0x30, 0x0D, 0x06, 0x09, 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x01, 0x05, 0x00 };  
                byte[] seq = new byte[15];  
      
                MemoryStream mem = new MemoryStream(pkcs8);  
                int lenstream = (int)mem.Length;  
                BinaryReader binr = new BinaryReader(mem);    //wrap Memory Stream with BinaryReader for easy reading    
                byte bt = 0;  
                ushort twobytes = 0;  
      
                try  
                {  
                    twobytes = binr.ReadUInt16();  
                    if (twobytes == 0x8130)    //data read as little endian order (actual data order for Sequence is 30 81)    
                        binr.ReadByte();    //advance 1 byte    
                    else if (twobytes == 0x8230)  
                        binr.ReadInt16();    //advance 2 bytes    
                    else  
                        return null;  
      
                    bt = binr.ReadByte();  
                    if (bt != 0x02)  
                        return null;  
      
                    twobytes = binr.ReadUInt16();  
      
                    if (twobytes != 0x0001)  
                        return null;  
      
                    seq = binr.ReadBytes(15);        //read the Sequence OID    
                    if (!CompareBytearrays(seq, SeqOID))    //make sure Sequence for OID is correct    
                        return null;  
      
                    bt = binr.ReadByte();  
                    if (bt != 0x04)    //expect an Octet string    
                        return null;  
      
                    bt = binr.ReadByte();        //read next byte, or next 2 bytes is  0x81 or 0x82; otherwise bt is the byte count    
                    if (bt == 0x81)  
                        binr.ReadByte();  
                    else  
                        if (bt == 0x82)  
                        binr.ReadUInt16();  
                    //------ at this stage, the remaining sequence should be the RSA private key    
      
                    byte[] rsaprivkey = binr.ReadBytes((int)(lenstream - mem.Position));  
                    RSACryptoServiceProvider rsacsp = DecodeRSAPrivateKey(rsaprivkey);  
                    return rsacsp;  
                }  
      
                catch (Exception)  
                {  
                    return null;  
                }  
      
                finally { binr.Close(); }  
      
            }  
      
            private static bool CompareBytearrays(byte[] a, byte[] b)  
            {  
                if (a.Length != b.Length)  
                    return false;  
                int i = 0;  
                foreach (byte c in a)  
                {  
                    if (c != b[i])  
                        return false;  
                    i++;  
                }  
                return true;  
            }  
      
            private static RSACryptoServiceProvider DecodeRSAPublicKey(byte[] publickey)  
            {  
                // encoded OID sequence for  PKCS #1 rsaEncryption szOID_RSA_RSA = "1.2.840.113549.1.1.1"    
                byte[] SeqOID = { 0x30, 0x0D, 0x06, 0x09, 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x01, 0x05, 0x00 };  
                byte[] seq = new byte[15];  
                // ---------  Set up stream to read the asn.1 encoded SubjectPublicKeyInfo blob  ------    
                MemoryStream mem = new MemoryStream(publickey);  
                BinaryReader binr = new BinaryReader(mem);    //wrap Memory Stream with BinaryReader for easy reading    
                byte bt = 0;  
                ushort twobytes = 0;  
      
                try  
                {  
      
                    twobytes = binr.ReadUInt16();  
                    if (twobytes == 0x8130) //data read as little endian order (actual data order for Sequence is 30 81)    
                        binr.ReadByte();    //advance 1 byte    
                    else if (twobytes == 0x8230)  
                        binr.ReadInt16();   //advance 2 bytes    
                    else  
                        return null;  
      
                    seq = binr.ReadBytes(15);       //read the Sequence OID    
                    if (!CompareBytearrays(seq, SeqOID))    //make sure Sequence for OID is correct    
                        return null;  
      
                    twobytes = binr.ReadUInt16();  
                    if (twobytes == 0x8103) //data read as little endian order (actual data order for Bit String is 03 81)    
                        binr.ReadByte();    //advance 1 byte    
                    else if (twobytes == 0x8203)  
                        binr.ReadInt16();   //advance 2 bytes    
                    else  
                        return null;  
      
                    bt = binr.ReadByte();  
                    if (bt != 0x00)     //expect null byte next    
                        return null;  
      
                    twobytes = binr.ReadUInt16();  
                    if (twobytes == 0x8130) //data read as little endian order (actual data order for Sequence is 30 81)    
                        binr.ReadByte();    //advance 1 byte    
                    else if (twobytes == 0x8230)  
                        binr.ReadInt16();   //advance 2 bytes    
                    else  
                        return null;  
      
                    twobytes = binr.ReadUInt16();  
                    byte lowbyte = 0x00;  
                    byte highbyte = 0x00;  
      
                    if (twobytes == 0x8102) //data read as little endian order (actual data order for Integer is 02 81)    
                        lowbyte = binr.ReadByte();  // read next bytes which is bytes in modulus    
                    else if (twobytes == 0x8202)  
                    {  
                        highbyte = binr.ReadByte(); //advance 2 bytes    
                        lowbyte = binr.ReadByte();  
                    }  
                    else  
                        return null;  
                    byte[] modint = { lowbyte, highbyte, 0x00, 0x00 };   //reverse byte order since asn.1 key uses big endian order    
                    int modsize = BitConverter.ToInt32(modint, 0);  
      
                    byte firstbyte = binr.ReadByte();  
                    binr.BaseStream.Seek(-1, SeekOrigin.Current);  
      
                    if (firstbyte == 0x00)  
                    {   //if first byte (highest order) of modulus is zero, don't include it    
                        binr.ReadByte();    //skip this null byte    
                        modsize -= 1;   //reduce modulus buffer size by 1    
                    }  
      
                    byte[] modulus = binr.ReadBytes(modsize);   //read the modulus bytes    
      
                    if (binr.ReadByte() != 0x02)            //expect an Integer for the exponent data    
                        return null;  
                    int expbytes = (int)binr.ReadByte();        // should only need one byte for actual exponent data (for all useful values)    
                    byte[] exponent = binr.ReadBytes(expbytes);  
      
                    // ------- create RSACryptoServiceProvider instance and initialize with public key -----    
                    RSACryptoServiceProvider RSA = new RSACryptoServiceProvider();  
                    RSAParameters RSAKeyInfo = new RSAParameters();  
                    RSAKeyInfo.Modulus = modulus;  
                    RSAKeyInfo.Exponent = exponent;  
                    RSA.ImportParameters(RSAKeyInfo);  
                    return RSA;  
                }  
                catch (Exception)  
                {  
                    return null;  
                }  
      
                finally { binr.Close(); }  
      
            }  
      
            private static RSACryptoServiceProvider DecodeRSAPrivateKey(byte[] privkey)  
            {  
                byte[] MODULUS, E, D, P, Q, DP, DQ, IQ;  
      
                // ---------  Set up stream to decode the asn.1 encoded RSA private key  ------    
                MemoryStream mem = new MemoryStream(privkey);  
                BinaryReader binr = new BinaryReader(mem);    //wrap Memory Stream with BinaryReader for easy reading    
                byte bt = 0;  
                ushort twobytes = 0;  
                int elems = 0;  
                try  
                {  
                    twobytes = binr.ReadUInt16();  
                    if (twobytes == 0x8130)    //data read as little endian order (actual data order for Sequence is 30 81)    
                        binr.ReadByte();    //advance 1 byte    
                    else if (twobytes == 0x8230)  
                        binr.ReadInt16();    //advance 2 bytes    
                    else  
                        return null;  
      
                    twobytes = binr.ReadUInt16();  
                    if (twobytes != 0x0102)    //version number    
                        return null;  
                    bt = binr.ReadByte();  
                    if (bt != 0x00)  
                        return null;  
      
      
                    //------  all private key components are Integer sequences ----    
                    elems = GetIntegerSize(binr);  
                    MODULUS = binr.ReadBytes(elems);  
      
                    elems = GetIntegerSize(binr);  
                    E = binr.ReadBytes(elems);  
      
                    elems = GetIntegerSize(binr);  
                    D = binr.ReadBytes(elems);  
      
                    elems = GetIntegerSize(binr);  
                    P = binr.ReadBytes(elems);  
      
                    elems = GetIntegerSize(binr);  
                    Q = binr.ReadBytes(elems);  
      
                    elems = GetIntegerSize(binr);  
                    DP = binr.ReadBytes(elems);  
      
                    elems = GetIntegerSize(binr);  
                    DQ = binr.ReadBytes(elems);  
      
                    elems = GetIntegerSize(binr);  
                    IQ = binr.ReadBytes(elems);  
      
                    // ------- create RSACryptoServiceProvider instance and initialize with public key -----    
                    RSACryptoServiceProvider RSA = new RSACryptoServiceProvider();  
                    RSAParameters RSAparams = new RSAParameters();  
                    RSAparams.Modulus = MODULUS;  
                    RSAparams.Exponent = E;  
                    RSAparams.D = D;  
                    RSAparams.P = P;  
                    RSAparams.Q = Q;  
                    RSAparams.DP = DP;  
                    RSAparams.DQ = DQ;  
                    RSAparams.InverseQ = IQ;  
                    RSA.ImportParameters(RSAparams);  
                    return RSA;  
                }  
                catch (Exception)  
                {  
                    return null;  
                }  
                finally { binr.Close(); }  
            }  
      
            private static int GetIntegerSize(BinaryReader binr)  
            {  
                byte bt = 0;  
                byte lowbyte = 0x00;  
                byte highbyte = 0x00;  
                int count = 0;  
                bt = binr.ReadByte();  
                if (bt != 0x02)        //expect integer    
                    return 0;  
                bt = binr.ReadByte();  
      
                if (bt == 0x81)  
                    count = binr.ReadByte();    // data size in next byte    
                else  
                    if (bt == 0x82)  
                {  
                    highbyte = binr.ReadByte();    // data size in next 2 bytes    
                    lowbyte = binr.ReadByte();  
                    byte[] modint = { lowbyte, highbyte, 0x00, 0x00 };  
                    count = BitConverter.ToInt32(modint, 0);  
                }  
                else  
                {  
                    count = bt;        // we already have the data size    
                }  
      
      
      
                while (binr.ReadByte() == 0x00)  
                {    //remove high order zeros in data    
                    count -= 1;  
                }  
                binr.BaseStream.Seek(-1, SeekOrigin.Current);        //last ReadByte wasn't a removed zero, so back up a byte    
                return count;  
            }  
     
            #endregion  
     
            #region 解析.net 生成的Pem    
            private static RSAParameters ConvertFromPublicKey(string pemFileConent)  
            {  
      
                if (string.IsNullOrEmpty(pemFileConent))  
                {  
                    throw new ArgumentNullException("pemFileConent", "This arg cann't be empty.");  
                }  
                pemFileConent = pemFileConent.Replace("-----BEGIN PUBLIC KEY-----", "").Replace("-----END PUBLIC KEY-----", "").Replace("
    ", "").Replace("
    ", "");  
                byte[] keyData = Convert.FromBase64String(pemFileConent);  
                bool keySize1024 = (keyData.Length == 162);  
                bool keySize2048 = (keyData.Length == 294);  
                if (!(keySize1024 || keySize2048))  
                {  
                    throw new ArgumentException("pem file content is incorrect, Only support the key size is 1024 or 2048");  
                }  
                byte[] pemModulus = (keySize1024 ? new byte[128] : new byte[256]);  
                byte[] pemPublicExponent = new byte[3];  
                Array.Copy(keyData, (keySize1024 ? 29 : 33), pemModulus, 0, (keySize1024 ? 128 : 256));  
                Array.Copy(keyData, (keySize1024 ? 159 : 291), pemPublicExponent, 0, 3);  
                RSAParameters para = new RSAParameters();  
                para.Modulus = pemModulus;  
                para.Exponent = pemPublicExponent;  
                return para;  
            }  
            
            /// <summary>  
            /// 将pem格式私钥(1024 or 2048)转换为RSAParameters  
            /// </summary>  
            /// <param name="pemFileConent">pem私钥内容</param>  
            /// <returns>转换得到的RSAParamenters</returns>  
            private static RSAParameters ConvertFromPrivateKey(string pemFileConent)  
            {  
                if (string.IsNullOrEmpty(pemFileConent))  
                {  
                    throw new ArgumentNullException("pemFileConent", "This arg cann't be empty.");  
                }  
                pemFileConent = pemFileConent.Replace("-----BEGIN RSA PRIVATE KEY-----", "").Replace("-----END RSA PRIVATE KEY-----", "").Replace("
    ", "").Replace("
    ", "");  
                byte[] keyData = Convert.FromBase64String(pemFileConent);  
      
                bool keySize1024 = (keyData.Length == 609 || keyData.Length == 610);  
                bool keySize2048 = (keyData.Length == 1190 || keyData.Length == 1192);  
      
                if (!(keySize1024 || keySize2048))  
                {  
                    throw new ArgumentException("pem file content is incorrect, Only support the key size is 1024 or 2048");  
                }  
      
                int index = (keySize1024 ? 11 : 12);  
                byte[] pemModulus = (keySize1024 ? new byte[128] : new byte[256]);  
                Array.Copy(keyData, index, pemModulus, 0, pemModulus.Length);  
      
                index += pemModulus.Length;  
                index += 2;  
                byte[] pemPublicExponent = new byte[3];  
                Array.Copy(keyData, index, pemPublicExponent, 0, 3);  
      
                index += 3;  
                index += 4;  
                if ((int)keyData[index] == 0)  
                {  
                    index++;  
                }  
                byte[] pemPrivateExponent = (keySize1024 ? new byte[128] : new byte[256]);  
                Array.Copy(keyData, index, pemPrivateExponent, 0, pemPrivateExponent.Length);  
      
                index += pemPrivateExponent.Length;  
                index += (keySize1024 ? ((int)keyData[index + 1] == 64 ? 2 : 3) : ((int)keyData[index + 2] == 128 ? 3 : 4));  
                byte[] pemPrime1 = (keySize1024 ? new byte[64] : new byte[128]);  
                Array.Copy(keyData, index, pemPrime1, 0, pemPrime1.Length);  
      
                index += pemPrime1.Length;  
                index += (keySize1024 ? ((int)keyData[index + 1] == 64 ? 2 : 3) : ((int)keyData[index + 2] == 128 ? 3 : 4));  
                byte[] pemPrime2 = (keySize1024 ? new byte[64] : new byte[128]);  
                Array.Copy(keyData, index, pemPrime2, 0, pemPrime2.Length);  
      
                index += pemPrime2.Length;  
                index += (keySize1024 ? ((int)keyData[index + 1] == 64 ? 2 : 3) : ((int)keyData[index + 2] == 128 ? 3 : 4));  
                byte[] pemExponent1 = (keySize1024 ? new byte[64] : new byte[128]);  
                Array.Copy(keyData, index, pemExponent1, 0, pemExponent1.Length);  
      
                index += pemExponent1.Length;  
                index += (keySize1024 ? ((int)keyData[index + 1] == 64 ? 2 : 3) : ((int)keyData[index + 2] == 128 ? 3 : 4));  
                byte[] pemExponent2 = (keySize1024 ? new byte[64] : new byte[128]);  
                Array.Copy(keyData, index, pemExponent2, 0, pemExponent2.Length);  
      
                index += pemExponent2.Length;  
                index += (keySize1024 ? ((int)keyData[index + 1] == 64 ? 2 : 3) : ((int)keyData[index + 2] == 128 ? 3 : 4));  
                byte[] pemCoefficient = (keySize1024 ? new byte[64] : new byte[128]);  
                Array.Copy(keyData, index, pemCoefficient, 0, pemCoefficient.Length);  
      
                RSAParameters para = new RSAParameters();  
                para.Modulus = pemModulus;  
                para.Exponent = pemPublicExponent;  
                para.D = pemPrivateExponent;  
                para.P = pemPrime1;  
                para.Q = pemPrime2;  
                para.DP = pemExponent1;  
                para.DQ = pemExponent2;  
                para.InverseQ = pemCoefficient;  
                return para;  
            }  
            #endregion  
     
    
    
            //extract valid content from PEM file
            public static string extractFromPemFile(string filePath)
            {
                string result = "";
                string COMMENT_BEGIN_FLAG = "-----";
                //=============
                //从头到尾以流的方式读出文本文件, 该方法会一行一行读出文本
                using (System.IO.StreamReader sr = new System.IO.StreamReader(filePath, Encoding.UTF8))
                {
                    string str;
                    StringBuilder sb = new StringBuilder();
                    while ((str = sr.ReadLine()) != null)
                    {
                        if (!str.StartsWith(COMMENT_BEGIN_FLAG))
                        {
                            sb.Append(str);
                        }
                    }
                    result = sb.ToString();
                }
                return result;
            }
    
            //extract valid content from PEM format string
            public static string extractFromPemFormat(string input)
            {
                string result = "";
                string COMMENT_BEGIN_FLAG = "-----";
                string[] splitFlagArray = { "
    ", "
    " };
                string[] itemArray = input.Split(splitFlagArray, StringSplitOptions.RemoveEmptyEntries);
                StringBuilder sb = new StringBuilder();
                foreach (string item in itemArray)
                {
                    if (!item.StartsWith(COMMENT_BEGIN_FLAG))
                    {
                        sb.Append(item);
                    }
                }
                result = sb.ToString();
                return result;
            }
    
    
        }
    }
    复制代码
    复制代码
    using System;
    using System.Collections.Generic;
    using System.Linq;
    using System.Text;
    using CSCMDemo;
    using CSCMDemo2;
    using HelloWord.RSA;
    using Ctrip.Cryptography;
    using com.ctrip.sec.crypto;
    
    
    
    namespace HelloWord
    {
        class Program
        {
            static string UTF8 = "utf-8";
    
            static void Main(string[] args)
            {
    
                //-- custom use ---
                //testRSAFromPkcs1();
                //testRSAFromPkcs8();
                //testRSAFromPkcs8_file();
                testRSAFromPkcs8_SOA();
    
                //--- use provided dll ---
                //testRsaWithSslcode();
    
            }
    
    
    
            //test RSA sign
            static void testRSAFromPkcs1()
            {
                string data = "abc";
                string privateKeyPem = "../../RSA/private.key";
                string sign = RSAFromPkcs1.RSASign(data, privateKeyPem);
                Console.WriteLine("sign=" + sign);
    
                // 窗口暂停,等待按键
                Console.ReadKey();
            }
    
            //test RSA(pkcs#8)
            static void testRSAFromPkcs8()
            {
                string data = "abc";
                string privateKey = "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";
                string sign = RSAFromPkcs8.sign(data, privateKey, UTF8);
                Console.WriteLine("data=" + data); 
                Console.WriteLine("====================");
                Console.WriteLine("sign=" + sign); 
                Console.WriteLine("====================");
    
                string publicKey = "MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCnOi3RwVTiB0LTCV0nPfigVqyROPbBA/Qkz21DExN3rnlziQ7vjwc1EJ9n+xH/o/BNc/j6yslYMdVPDLBOZqBUiaHH2w0+DWStAZVN51ZsYdceLYh1xc9WwNgwFk7Y1ME0uVjgOiKq1nhnPOPe3GvDvsS3E+2SqNN8+NfcaCeY8QIDAQAB";
                bool verifyResult = RSAFromPkcs8.verify(data, sign, publicKey, UTF8);
                Console.WriteLine("verifyResult=" + verifyResult);
    
                // 窗口暂停,等待按键
                Console.ReadKey();
            }
    
            //test RSA(pkcs#8) from file
            static void testRSAFromPkcs8_file()
            {
                string data = "abc";
    
                string privateKeyPem = "../../RSA/private_pkcs8.key";            
                string privateKey = RSAFromPkcs8.extractFromPemFile(privateKeyPem);
                string sign = RSAFromPkcs8.sign(data, privateKey, UTF8);
                Console.WriteLine("data=" + data);
                Console.WriteLine("====================");
                Console.WriteLine("sign=" + sign);
                Console.WriteLine("====================");
    
                string publicKeyPem = "../../RSA/public.key";
                string publicKey = RSAFromPkcs8.extractFromPemFile(publicKeyPem);
                bool verifyResult = RSAFromPkcs8.verify(data, sign, publicKey, UTF8);
                Console.WriteLine("verifyResult=" + verifyResult);
    
                // 窗口暂停,等待按键
                Console.ReadKey();
            }
    
    
            //test RSA(pkcs#8) via SOA
            static void testRSAFromPkcs8_SOA()
            {
                // 准备测试sslcode                                                                                      1024            2048   
                string publicSslCode = "KI00000000001530";  //==> 返回的公钥是java格式的     //OH00000000000119, KI00000000001530, UE00000000001532  //AX00000000001436  [bad]
                string privateSslCode = "UL00000000001531"; //==> 返回的私钥是java格式的     //JY00000000000120, UL00000000001531, ZT00000000001533  //SO00000000001437
    
                // 准备测试字符串
                string data = "abc";
    
                Demo2 demo = new Demo2();
                string privateKey = demo.GetSign(privateSslCode);
                privateKey = RSAFromPkcs8.extractFromPemFormat(privateKey);
                string sign = RSAFromPkcs8.sign(data, privateKey, UTF8);
                Console.WriteLine("data=" + data);
                Console.WriteLine("====================");
                Console.WriteLine("sign=" + sign);
                Console.WriteLine("====================");
    
                string publicKey = demo.GetSign(publicSslCode);
                publicKey = RSAFromPkcs8.extractFromPemFormat(publicKey);
                bool verifyResult = RSAFromPkcs8.verify(data, sign, publicKey, UTF8);
                Console.WriteLine("verifyResult=" + verifyResult);
                Console.WriteLine("====================");
    
                //--------------
                string encData = RSAFromPkcs8.encryptData(data, publicKey, UTF8);
                Console.WriteLine("encData=" + encData);
                string decData = RSAFromPkcs8.decryptData(encData, privateKey, UTF8);
                Console.WriteLine("decData=" + decData);
                Console.WriteLine("====================");
    
                // 窗口暂停,等待按键
                Console.ReadKey();
            }
    
    
        }
    }
    复制代码

    转自:

    http://blog.csdn.net/zzzili/article/details/73739797

  • 相关阅读:
    头文件<stdarg.h>
    头文件<signal.h>
    头文件<setjmp.h>
    头文件<math.h>
    头文件<locale.h>
    头文件<limits.h>
    头文件<ctype.h>
    头文件<assert.h>
    PHP error_reporting
    八大排序算法
  • 原文地址:https://www.cnblogs.com/Alex80/p/11530547.html
Copyright © 2020-2023  润新知