using System; using System.Collections.Generic; using System.IO; using System.Linq; using System.Security.Cryptography; using System.Text; namespace POSV.Utils { /// /// 类名:RSAFromPkcs8 /// 功能:RSA加密、解密、签名、验签 /// 详细:该类对Java生成的密钥进行解密和签名以及验签专用类,不需要修改 /// 说明: /// 以下代码只是为了方便商户测试而提供的样例代码,商户可以根据自己网站的需要,按照技术文档编写,并非一定要使用该代码。 /// public sealed class RSAFromPkcs8 { /// /// 签名 /// /// 待签名字符串 /// 私钥 /// 编码格式 /// 签名后字符串 public static string sign(string content , string privateKey , string input_charset,string sign_type = "RSA") { byte[] Data = Encoding.GetEncoding(input_charset).GetBytes(content); RSACryptoServiceProvider rsa = DecodePemPrivateKey(privateKey); if ("RSA".Equals(sign_type)) { using (var sha1 = new SHA1CryptoServiceProvider()) { byte[] signData = rsa.SignData(Data, sha1); return Convert.ToBase64String(signData); } } else { using (var sha256 = new SHA256CryptoServiceProvider()) { byte[] signData = rsa.SignData(Data, sha256); return Convert.ToBase64String(signData); } } } /// /// 验签 /// /// 待验签字符串 /// 签名 /// 公钥 /// 编码格式 /// true(通过),false(不通过) public static bool verify(string content , string signedString , string publicKey , string input_charset, string sign_type = "RSA") { bool result = false; byte[] Data = Encoding.GetEncoding(input_charset).GetBytes(content); byte[] data = Convert.FromBase64String(signedString); RSAParameters paraPub = ConvertFromPublicKey(publicKey); RSACryptoServiceProvider rsaPub = new RSACryptoServiceProvider(); rsaPub.ImportParameters(paraPub); if ("RSA".Equals(sign_type)) { using (var sha1 = new SHA1CryptoServiceProvider()) { result = rsaPub.VerifyData(Data, sha1, data); return result; } } else { using (var sha256 = new SHA256CryptoServiceProvider()) { result = rsaPub.VerifyData(Data, sha256, data); return result; } } } /// /// 加密 /// /// 需要加密的字符串 /// 公钥 /// 编码格式 /// 明文 public static string encryptData(string resData , string publicKey , string input_charset) { byte[] DataToEncrypt = Encoding.ASCII.GetBytes(resData); string result = encrypt(DataToEncrypt , publicKey , input_charset); return result; } /// /// 解密 /// /// 加密字符串 /// 私钥 /// 编码格式 /// 明文 public static string decryptData(string resData , string privateKey , string input_charset) { byte[] DataToDecrypt = Convert.FromBase64String(resData); string result = ""; for (int j = 0; j < DataToDecrypt.Length / 128; j++) { byte[] buf = new byte[128]; for (int i = 0; i < 128; i++) { buf[i] = DataToDecrypt[i + 128 * j]; } result += decrypt(buf , privateKey , input_charset); } return result; } #region 内部方法 private static string encrypt(byte[] data , string publicKey , string input_charset) { RSACryptoServiceProvider rsa = DecodePemPublicKey(publicKey); SHA1 sh = new SHA1CryptoServiceProvider(); byte[] result = rsa.Encrypt(data , false); return Convert.ToBase64String(result); } private static string decrypt(byte[] data , string privateKey , string input_charset) { string result = ""; RSACryptoServiceProvider rsa = DecodePemPrivateKey(privateKey); SHA1 sh = new SHA1CryptoServiceProvider(); byte[] source = rsa.Decrypt(data , false); char[] asciiChars = new char[Encoding.GetEncoding(input_charset).GetCharCount(source , 0 , source.Length)]; Encoding.GetEncoding(input_charset).GetChars(source , 0 , source.Length , asciiChars , 0); result = new string(asciiChars); //result = ASCIIEncoding.ASCII.GetString(source); return result; } private static RSACryptoServiceProvider DecodePemPublicKey(String pemstr) { byte[] pkcs8publickkey; pkcs8publickkey = Convert.FromBase64String(pemstr); if (pkcs8publickkey != null) { RSACryptoServiceProvider rsa = DecodeRSAPublicKey(pkcs8publickkey); return rsa; } else return null; } private static RSACryptoServiceProvider DecodePemPrivateKey(String pemstr) { byte[] pkcs8privatekey; pkcs8privatekey = Convert.FromBase64String(pemstr); if (pkcs8privatekey != null) { RSACryptoServiceProvider rsa = DecodePrivateKeyInfo(pkcs8privatekey); return rsa; } else return null; } private static RSACryptoServiceProvider DecodePrivateKeyInfo(byte[] pkcs8) { byte[] SeqOID = { 0x30 , 0x0D , 0x06 , 0x09 , 0x2A , 0x86 , 0x48 , 0x86 , 0xF7 , 0x0D , 0x01 , 0x01 , 0x01 , 0x05 , 0x00 }; byte[] seq = new byte[15]; MemoryStream mem = new MemoryStream(pkcs8); int lenstream = (int)mem.Length; BinaryReader binr = new BinaryReader(mem); //wrap Memory Stream with BinaryReader for easy reading byte bt = 0; ushort twobytes = 0; try { twobytes = binr.ReadUInt16(); if (twobytes == 0x8130) //data read as little endian order (actual data order for Sequence is 30 81) binr.ReadByte(); //advance 1 byte else if (twobytes == 0x8230) binr.ReadInt16(); //advance 2 bytes else return null; bt = binr.ReadByte(); if (bt != 0x02) return null; twobytes = binr.ReadUInt16(); if (twobytes != 0x0001) return null; seq = binr.ReadBytes(15); //read the Sequence OID if (!CompareBytearrays(seq , SeqOID)) //make sure Sequence for OID is correct return null; bt = binr.ReadByte(); if (bt != 0x04) //expect an Octet string return null; bt = binr.ReadByte(); //read next byte, or next 2 bytes is 0x81 or 0x82; otherwise bt is the byte count if (bt == 0x81) binr.ReadByte(); else if (bt == 0x82) binr.ReadUInt16(); //------ at this stage, the remaining sequence should be the RSA private key byte[] rsaprivkey = binr.ReadBytes((int)(lenstream - mem.Position)); RSACryptoServiceProvider rsacsp = DecodeRSAPrivateKey(rsaprivkey); return rsacsp; } catch (Exception) { return null; } finally { binr.Close(); } } private static bool CompareBytearrays(byte[] a , byte[] b) { if (a.Length != b.Length) return false; int i = 0; foreach (byte c in a) { if (c != b[i]) return false; i++; } return true; } private static RSACryptoServiceProvider DecodeRSAPublicKey(byte[] publickey) { // encoded OID sequence for PKCS #1 rsaEncryption szOID_RSA_RSA = "1.2.840.113549.1.1.1" byte[] SeqOID = { 0x30 , 0x0D , 0x06 , 0x09 , 0x2A , 0x86 , 0x48 , 0x86 , 0xF7 , 0x0D , 0x01 , 0x01 , 0x01 , 0x05 , 0x00 }; byte[] seq = new byte[15]; // --------- Set up stream to read the asn.1 encoded SubjectPublicKeyInfo blob ------ MemoryStream mem = new MemoryStream(publickey); BinaryReader binr = new BinaryReader(mem); //wrap Memory Stream with BinaryReader for easy reading byte bt = 0; ushort twobytes = 0; try { twobytes = binr.ReadUInt16(); if (twobytes == 0x8130) //data read as little endian order (actual data order for Sequence is 30 81) binr.ReadByte(); //advance 1 byte else if (twobytes == 0x8230) binr.ReadInt16(); //advance 2 bytes else return null; seq = binr.ReadBytes(15); //read the Sequence OID if (!CompareBytearrays(seq , SeqOID)) //make sure Sequence for OID is correct return null; twobytes = binr.ReadUInt16(); if (twobytes == 0x8103) //data read as little endian order (actual data order for Bit String is 03 81) binr.ReadByte(); //advance 1 byte else if (twobytes == 0x8203) binr.ReadInt16(); //advance 2 bytes else return null; bt = binr.ReadByte(); if (bt != 0x00) //expect null byte next return null; twobytes = binr.ReadUInt16(); if (twobytes == 0x8130) //data read as little endian order (actual data order for Sequence is 30 81) binr.ReadByte(); //advance 1 byte else if (twobytes == 0x8230) binr.ReadInt16(); //advance 2 bytes else return null; twobytes = binr.ReadUInt16(); byte lowbyte = 0x00; byte highbyte = 0x00; if (twobytes == 0x8102) //data read as little endian order (actual data order for Integer is 02 81) lowbyte = binr.ReadByte(); // read next bytes which is bytes in modulus else if (twobytes == 0x8202) { highbyte = binr.ReadByte(); //advance 2 bytes lowbyte = binr.ReadByte(); } else return null; byte[] modint = { lowbyte , highbyte , 0x00 , 0x00 }; //reverse byte order since asn.1 key uses big endian order int modsize = BitConverter.ToInt32(modint , 0); byte firstbyte = binr.ReadByte(); binr.BaseStream.Seek(-1 , SeekOrigin.Current); if (firstbyte == 0x00) { //if first byte (highest order) of modulus is zero, don't include it binr.ReadByte(); //skip this null byte modsize -= 1; //reduce modulus buffer size by 1 } byte[] modulus = binr.ReadBytes(modsize); //read the modulus bytes if (binr.ReadByte() != 0x02) //expect an Integer for the exponent data return null; int expbytes = (int)binr.ReadByte(); // should only need one byte for actual exponent data (for all useful values) byte[] exponent = binr.ReadBytes(expbytes); // ------- create RSACryptoServiceProvider instance and initialize with public key ----- RSACryptoServiceProvider RSA = new RSACryptoServiceProvider(); RSAParameters RSAKeyInfo = new RSAParameters(); RSAKeyInfo.Modulus = modulus; RSAKeyInfo.Exponent = exponent; RSA.ImportParameters(RSAKeyInfo); return RSA; } catch (Exception) { return null; } finally { binr.Close(); } } private static RSACryptoServiceProvider DecodeRSAPrivateKey(byte[] privkey) { byte[] MODULUS, E, D, P, Q, DP, DQ, IQ; // --------- Set up stream to decode the asn.1 encoded RSA private key ------ MemoryStream mem = new MemoryStream(privkey); BinaryReader binr = new BinaryReader(mem); //wrap Memory Stream with BinaryReader for easy reading byte bt = 0; ushort twobytes = 0; int elems = 0; try { twobytes = binr.ReadUInt16(); if (twobytes == 0x8130) //data read as little endian order (actual data order for Sequence is 30 81) binr.ReadByte(); //advance 1 byte else if (twobytes == 0x8230) binr.ReadInt16(); //advance 2 bytes else return null; twobytes = binr.ReadUInt16(); if (twobytes != 0x0102) //version number return null; bt = binr.ReadByte(); if (bt != 0x00) return null; //------ all private key components are Integer sequences ---- elems = GetIntegerSize(binr); MODULUS = binr.ReadBytes(elems); elems = GetIntegerSize(binr); E = binr.ReadBytes(elems); elems = GetIntegerSize(binr); D = binr.ReadBytes(elems); elems = GetIntegerSize(binr); P = binr.ReadBytes(elems); elems = GetIntegerSize(binr); Q = binr.ReadBytes(elems); elems = GetIntegerSize(binr); DP = binr.ReadBytes(elems); elems = GetIntegerSize(binr); DQ = binr.ReadBytes(elems); elems = GetIntegerSize(binr); IQ = binr.ReadBytes(elems); // ------- create RSACryptoServiceProvider instance and initialize with public key ----- RSACryptoServiceProvider RSA = new RSACryptoServiceProvider(); RSAParameters RSAparams = new RSAParameters(); RSAparams.Modulus = MODULUS; RSAparams.Exponent = E; RSAparams.D = D; RSAparams.P = P; RSAparams.Q = Q; RSAparams.DP = DP; RSAparams.DQ = DQ; RSAparams.InverseQ = IQ; RSA.ImportParameters(RSAparams); return RSA; } catch (Exception) { return null; } finally { binr.Close(); } } private static int GetIntegerSize(BinaryReader binr) { byte bt = 0; byte lowbyte = 0x00; byte highbyte = 0x00; int count = 0; bt = binr.ReadByte(); if (bt != 0x02) //expect integer return 0; bt = binr.ReadByte(); if (bt == 0x81) count = binr.ReadByte(); // data size in next byte else if (bt == 0x82) { highbyte = binr.ReadByte(); // data size in next 2 bytes lowbyte = binr.ReadByte(); byte[] modint = { lowbyte , highbyte , 0x00 , 0x00 }; count = BitConverter.ToInt32(modint , 0); } else { count = bt; // we already have the data size } while (binr.ReadByte() == 0x00) { //remove high order zeros in data count -= 1; } binr.BaseStream.Seek(-1 , SeekOrigin.Current); //last ReadByte wasn't a removed zero, so back up a byte return count; } #endregion #region 解析.net 生成的Pem private static RSAParameters ConvertFromPublicKey(string pemFileConent) { byte[] keyData = Convert.FromBase64String(pemFileConent); if (keyData.Length < 162) { throw new ArgumentException("pem file content is incorrect."); } byte[] pemModulus = new byte[128]; byte[] pemPublicExponent = new byte[3]; Array.Copy(keyData , 29 , pemModulus , 0 , 128); Array.Copy(keyData , 159 , pemPublicExponent , 0 , 3); RSAParameters para = new RSAParameters(); para.Modulus = pemModulus; para.Exponent = pemPublicExponent; return para; } private static RSAParameters ConvertFromPrivateKey(string pemFileConent) { byte[] keyData = Convert.FromBase64String(pemFileConent); if (keyData.Length < 609) { throw new ArgumentException("pem file content is incorrect."); } int index = 11; byte[] pemModulus = new byte[128]; Array.Copy(keyData , index , pemModulus , 0 , 128); index += 128; index += 2;//141 byte[] pemPublicExponent = new byte[3]; Array.Copy(keyData , index , pemPublicExponent , 0 , 3); index += 3; index += 4;//148 byte[] pemPrivateExponent = new byte[128]; Array.Copy(keyData , index , pemPrivateExponent , 0 , 128); index += 128; index += ((int)keyData[index + 1] == 64 ? 2 : 3);//279 byte[] pemPrime1 = new byte[64]; Array.Copy(keyData , index , pemPrime1 , 0 , 64); index += 64; index += ((int)keyData[index + 1] == 64 ? 2 : 3);//346 byte[] pemPrime2 = new byte[64]; Array.Copy(keyData , index , pemPrime2 , 0 , 64); index += 64; index += ((int)keyData[index + 1] == 64 ? 2 : 3);//412/413 byte[] pemExponent1 = new byte[64]; Array.Copy(keyData , index , pemExponent1 , 0 , 64); index += 64; index += ((int)keyData[index + 1] == 64 ? 2 : 3);//479/480 byte[] pemExponent2 = new byte[64]; Array.Copy(keyData , index , pemExponent2 , 0 , 64); index += 64; index += ((int)keyData[index + 1] == 64 ? 2 : 3);//545/546 byte[] pemCoefficient = new byte[64]; Array.Copy(keyData , index , pemCoefficient , 0 , 64); RSAParameters para = new RSAParameters(); para.Modulus = pemModulus; para.Exponent = pemPublicExponent; para.D = pemPrivateExponent; para.P = pemPrime1; para.Q = pemPrime2; para.DP = pemExponent1; para.DQ = pemExponent2; para.InverseQ = pemCoefficient; return para; } #endregion } } //static void Main(string[] arg) //{ // /**RSA加密测试,RSA中的密钥对通过SSL工具生成,生成命令如下: // * 1 生成RSA私钥: // * openssl genrsa -out rsa_private_key.pem 1024 // *2 生成RSA公钥 // * openssl rsa -in rsa_private_key.pem -pubout -out rsa_public_key.pem // * // * 3 将RSA私钥转换成PKCS8格式 // * openssl pkcs8 -topk8 -inform PEM -in rsa_private_key.pem -outform PEM -nocrypt -out rsa_pub_pk8.pem // * // * 直接打开rsa_private_key.pem和rsa_pub_pk8.pem文件就可以获取密钥对内容,获取密钥对内容组成字符串时,注意将换行符删除 // * */ // string publickey = "MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDzOqfNunFxFtCZPlq7fO/jWwjqmTvAooVBB4y87BizSZ9dl/F7FpAxYc6MmX2TqivCvvORXgdlYdFWAhzXOnIUv9OGG///WPLe9TMs9kIwAZ/APUXauvC01oFLnYkzwPlAh0tQ1Au9arTE/OG1V1dKgf8BXHLPhKL4BmGBEUZBtQIDAQAB"; // string privatekey = "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"; // //加密字符串 // string data = "yibao"; // Console.WriteLine("加密前字符串内容:" + data); // //加密 // string encrypteddata = RSAFromPkcs8.encryptData(data, publickey, "UTF-8"); // Console.WriteLine("加密后的字符串为:" + encrypteddata); // Console.WriteLine("解密后的字符串内容:" + RSAFromPkcs8.decryptData(encrypteddata, privatekey, "UTF-8")); // Console.WriteLine("***********"); // //解密 // string endata = "LpnnvnfA72VnyjboX/OsCPO6FOFXeEnnsKkI7aAEQyVAPfCTfQ43ZYVZVqnADDPMW7VhBXJWyQMAGw2Fh9sS/XLHmO5XW94Yehci6JrJMynePgtIiDysjNA+UlgSTC/MlResNrBm/4MMSPvq0qLwScgpZDynhLsVZk+EQ6G8wgA="; // string datamw = RSAFromPkcs8.decryptData(endata, privatekey, "UTF-8"); // Console.WriteLine("静态加密后的字符串为:" + endata); // Console.WriteLine("解密后的字符串内容:" + datamw); // //签名 // string signdata = "YB010000001441234567286038508081299"; // Console.WriteLine("签名前的字符串内容:" + signdata); // string sign = RSAFromPkcs8.sign(signdata, privatekey, "UTF-8"); // Console.WriteLine("签名后的字符串:" + sign); // Console.ReadLine(); //}