RSA私钥参数无效


RSA private key parameter not a valid private key

我的私钥字符串示例(在file - private.key中):
"被标为0005 7372 0014 6a61 7661 2e73 65637572 6974 792e 4b65 7952 6570 bdf9 4fb3889a a543 0200 044c 0009 616c 676f 72697468 6d74 0012 4c6a 6176 612f 6c61 6e672f53 7472 696e 673b 5b00 0765 6e63 6f646564 7400 025b 424c 0006 666f 726d 61747100 7e00 014c 0004 7479 7065 7400 1b4c6a61 7661 2f73 6563 7572 6974 792f4b657952 6570 2454 7970 653b 7870 7400 03525341 7572 0002 5b42 acf3 17f8 0608 54e00200 0078 7000 0001 5830 8201 5402 0100300d 0609 2a86 4886 f70d 0101 0105 00048201 3e30 8201 3a02 0100 0241 008d 442f2df6 7e5d 6e48 16a9 70a1 9006 c932 1c4771de 6cb7 81eb 8483 e5e4 73ee b06f 5e73Ed1e 851d 54f1 2d86 6491 479a d314 8897F7e6 85dc 65ca f1f9 318e cc41 4702 03010001 0240 2306 f713 d47c bcb9 ed92 00ed7681 f9cc c56a 11a5 005b c09c ac43 2d59416e 258e a6a3 c4bb cc6d bcf1 7b5b 24d6Ff95 a146 2040 4d27 a92d cb9e ccaa 3519Fc85 50d1 0221 00db b9b2 a4c4 3ef6 4780303c 6798 819f 1a9a 04ca dced 0f9e 0cfdB4a5 75f5 bdf0 f502 2100 a496 8e0e d5315e0b b427 6966 2b55 546b 2a8a a5d0 dcf4BBFD 7ce9 1c56 d79c 13cb 0220 2736 8cdb3 . a: a: a: a: a: a: a: a: c: a: a: c: a: c: a4229 775b 7a2b b31b ca2f 8bc1 0220 28e3E6a3 34c0 3117 4348 cf5c bcc3 5457 d397e29e4366 e215 9624 ec0f 7f3d 9d85 022100b4 fdab 7ff3 9804 f6f5 00bf 32a1 3c5c7517 b0ab 90e1 f20a c9df 8d30 f778 c729E074 0006 504b 4353 2338 77e72 0019 6a617661 2e73 6563 7572 6974 792e 4b65 79526570 2454 7970 6500 0000 0000 0000 00120000 7872 000e 6a61 7661 2e6c 616e 672e456e 756d 0000 0000 0000 1200 00787074 0007 5052 4956 4154 45"

php示例代码:

echo $crypttext="PzTy-l1AWHHJ3CrynbmAfv-YWi1hpPSfv-gZbU3HeguShy_NbjytMVDKbSfkfw7afWrhH4_Weq5Lwu_jsJKM4w";
$fp=fopen("private.key","r");
$priv_key=fread($fp,8192);
fclose($fp);
openssl_private_decrypt(base64_decode($crypttext ), $newsource, $priv_key ) ;
echo "String decrypt : $newsource";

我得到的错误是"openssl_private_decrypt():密钥参数不是有效的私钥"。

生成和加密的源代码

package ia;
import java.io.File;
import java.io.FileInputStream;
import java.io.FileNotFoundException;
import java.io.FileOutputStream;
import java.io.IOException;
import java.io.ObjectInputStream;
import java.io.ObjectOutputStream;
import java.security.KeyPair;
import java.security.KeyPairGenerator;
import java.security.NoSuchAlgorithmException;
import java.security.PrivateKey;
import java.security.PublicKey;
import java.util.Date;
import javax.crypto.Cipher;
import org.apache.commons.codec.binary.Base64;

public class EncryptionUntil {
/**
 * String to hold name of the encryption algorithm.
 */
public static final String ALGORITHM = "RSA";
/**
 * String to hold the name of the private key file.
 */
public static final String PRIVATE_KEY_FILE = "C:/keys/private/private.key";
/**
 * String to hold name of the public key file.
 */
public static final String PUBLIC_KEY_FILE = "C:/keys/public/public.key";
/**
 * Generate key which contains a pair of private and public key using 1024
 * bytes. Store the set of keys in Prvate.key and Public.key files.
 * 
 * @throws NoSuchAlgorithmException
 * @throws IOException
 * @throws FileNotFoundException
 */
public static void generateKey() {
    try {
        final KeyPairGenerator keyGen = KeyPairGenerator
                .getInstance(ALGORITHM);
        keyGen.initialize(512);
        final KeyPair key = keyGen.generateKeyPair();
        File privateKeyFile = new File(PRIVATE_KEY_FILE);
        File publicKeyFile = new File(PUBLIC_KEY_FILE);
        // Create files to store public and private key
        if (privateKeyFile.getParentFile() != null) {
            privateKeyFile.getParentFile().mkdirs();
        }
        privateKeyFile.createNewFile();
        if (publicKeyFile.getParentFile() != null) {
            publicKeyFile.getParentFile().mkdirs();
        }
        publicKeyFile.createNewFile();
        // Saving the Public key in a file
        ObjectOutputStream publicKeyOS = new ObjectOutputStream(
                new FileOutputStream(publicKeyFile));
        publicKeyOS.writeObject(key.getPublic());
        publicKeyOS.close();
        // Saving the Private key in a file
        ObjectOutputStream privateKeyOS = new ObjectOutputStream(
                new FileOutputStream(privateKeyFile));
        privateKeyOS.writeObject(key.getPrivate());
        privateKeyOS.close();
    } catch (Exception e) {
        e.printStackTrace();
    }
}
/**
 * The method checks if the pair of public and private key has been
 * generated.
 * 
 * @return flag indicating if the pair of keys were generated.
 */
public static boolean areKeysPresent() {
    File privateKey = new File(PRIVATE_KEY_FILE);
    File publicKey = new File(PUBLIC_KEY_FILE);
    if (privateKey.exists() && publicKey.exists()) {
        return true;
    }
    return false;
}
/**
 * Encrypt the plain text using public key.
 * 
 * @param text
 *            : original plain text
 * @param key
 *            :The public key
 * @return Encrypted text
 * @throws java.lang.Exception
 */
public static byte[] encrypt(String text, PublicKey key) {
    byte[] cipherText = null;
    try {
        // get an RSA cipher object and print the provider
        final Cipher cipher = Cipher.getInstance(ALGORITHM);
        // encrypt the plain text using the public key
        cipher.init(Cipher.ENCRYPT_MODE, key);
        cipherText = cipher.doFinal(text.getBytes());
    } catch (Exception e) {
        e.printStackTrace();
    }
    return cipherText;
}
/**
 * Decrypt text using private key.
 * 
 * @param text
 *            :encrypted text
 * @param key
 *            :The private key
 * @return plain text
 * @throws java.lang.Exception
 */
public static String decrypt(byte[] text, PrivateKey key) {
    byte[] dectyptedText = null;
    try {
        // get an RSA cipher object and print the provider
        final Cipher cipher = Cipher.getInstance(ALGORITHM);
        // decrypt the text using the private key
        cipher.init(Cipher.DECRYPT_MODE, key);
        dectyptedText = cipher.doFinal(text);
    } catch (Exception ex) {
        ex.printStackTrace();
    }
    return new String(dectyptedText);
}
    public static void encDecrypt (String originalText) throws FileNotFoundException, IOException, ClassNotFoundException{
        ObjectInputStream inputStream = null;
        // Encrypt the string using the public key
        inputStream = new ObjectInputStream(new FileInputStream(
                PUBLIC_KEY_FILE));
        final PublicKey publicKey = (PublicKey) inputStream.readObject();
        final byte[] cipherText = encrypt(originalText, publicKey);
        final String cipherText64 = Base64.encodeBase64URLSafeString(cipherText);

        // Decrypt the cipher text using the private key.
        inputStream = new ObjectInputStream(new FileInputStream(
                PRIVATE_KEY_FILE));
        final PrivateKey privateKey = (PrivateKey) inputStream.readObject();
        final String plainText = decrypt(Base64.decodeBase64(cipherText64), privateKey);
        // Printing the Original, Encrypted and Decrypted Text
        System.out.println("Original Text: " + originalText);
        //System.out.println("Encrypted Text: " + new String(cipherText));
        System.out.println("Base 64 Text: " +cipherText64);
        System.out.println("Decrypted Text: " + plainText);

    }
/**
 * Test the EncryptionUntil
 */
public static void main(String[] args) {
    try {
        // Check if the pair of keys are present else generate those.
        if (!areKeysPresent()) {
            // Method generates a pair of keys using the RSA algorithm and
            // stores it
            // in their respective files
            generateKey();
        }
        final String originalText = "004477";
        Date dd = new Date();
        System.out.println(dd);
        final String currentTime = String.valueOf(dd.getTime());
        encDecrypt(originalText);
        encDecrypt(currentTime);
    } catch (Exception e) {
        e.printStackTrace();
    }
}
}

您尝试解码的数据不是RSA密钥的预期格式。对其进行十六进制转储显示:

0000000: aced 0005 7372 0014 6a61 7661 2e73 6563  ....sr..java.sec
0000010: 7572 6974 792e 4b65 7952 6570 bdf9 4fb3  urity.KeyRep..O.
0000020: 889a a543 0200 044c 0009 616c 676f 7269  ...C...L..algori
0000030: 7468 6d74 0012 4c6a 6176 612f 6c61 6e67  thmt..Ljava/lang
0000040: 2f53 7472 696e 673b 5b00 0765 6e63 6f64  /String;[..encod
0000050: 6564 7400 025b 424c 0006 666f 726d 6174  edt..[BL..format
0000060: 7100 7e00 014c 0004 7479 7065 7400 1b4c  q.~..L..typet..L
0000070: 6a61 7661 2f73 6563 7572 6974 792f 4b65  java/security/Ke
0000080: 7952 6570 2454 7970 653b 7870 7400 0352  yRep$Type;xpt..R
0000090: 5341 7572 0002 5b42 acf3 17f8 0608 54e0  SAur..[B......T.
00000a0: 0200 0078 7000 0001 5830 8201 5402 0100  ...xp...X0..T...
00000b0: 300d 0609 2a86 4886 f70d 0101 0105 0004  0...*.H.........
00000c0: 8201 3e30 8201 3a02 0100 0241 008d 442f  ..>0..:....A..D/
00000d0: 2df6 7e5d 6e48 16a9 70a1 9006 c932 1c47  -.~]nH..p....2.G
00000e0: 71de 6cb7 81eb 8483 e5e4 73ee b06f 5e73  q.l.......s..o^s
00000f0: ed1e 851d 54f1 2d86 6491 479a d314 8897  ....T.-.d.G.....
0000100: f7e6 85dc 65ca f1f9 318e cc41 4702 0301  ....e...1..AG...
0000110: 0001 0240 2306 f713 d47c bcb9 ed92 00ed  ...@#....|......
0000120: 7681 f9cc c56a 11a5 005b c09c ac43 2d59  v....j...[...C-Y
0000130: 416e 258e a6a3 c4bb cc6d bcf1 7b5b 24d6  An%......m..{[$.

这看起来像是某种Java序列化格式。您需要将其转换为OpenSSL支持的格式(例如DER),然后使用openssl_pkey_get_private()加载。

您正在序列化Java对象,然后将它们作为PHP中的字节数组读取,并尝试直接将它们用作键。这行不通。

首先,需要以可互换的格式输出密钥对。其次,您不能只是将这些字节读入内存并将它们视为密钥对。您需要在PHP中解码格式以重新构建密钥对。您可以使用openssl来完成此操作。

在Java中,您可以以DER格式写出密钥对。像这样修改代码,例如:

// Saving the Public key in a file
FileOutputStream publicKeyOS = new FileOutputStream(publicKeyFile);
publicKeyOS.write(key.getPublic().getEncoded());
publicKeyOS.close();
// Saving the Private key in a file
FileOutputStream privateKeyOS = new FileOutputStream(privateKeyFile);
privateKeyOS.write(key.getPrivate().getEncoded());
privateKeyOS.close();
您可以在shell提示符下使用openssl验证这些文件,如下所示:
$ openssl rsa -inform DER -in private.key
$ openssl rsa -inform DER -pubin -in public.key

在PHP中,你可以读取这些二进制文件,并让openssl解码DER…好吧,看来你不能在openssl的PHP实现中直接使用DER,所以你必须首先将DER转换为PEM

最后,您可以使用openssl 将PEM解码为公钥和私钥。

例如,在PHP中:

// (You could also convert the DER to PEM elsewhere, before PHP reads the files.)
function der2pem($der_data, $kind)
{
  $pem = chunk_split(base64_encode($der_data), 64, "'n");
  $pem = "-----BEGIN ".$kind."-----'n".$pem."-----END ".$kind."-----'n";
  return $pem;
}
function to_pem($filename, $kind)
{
  // TODO: handle errors
  $f = fopen($filename, "r");
  $der = fread($f, filesize($filename));
  $pem = der2pem($der, $kind);
  fclose($f);
  return $pem;
}
function load_private_key($filename)
{
  $pem = to_pem($filename, "PRIVATE KEY");
  return openssl_pkey_get_private($pem);
}
function load_public_key($filename)
{
  $pem = to_pem($filename, "PUBLIC KEY");
  return openssl_pkey_get_public($pem);
}
$private_key = load_private_key("private.key");
$public_key = load_public_key("public.key");
if (openssl_public_encrypt("Hello", $ciphertext, $public_key))
{
  if (openssl_private_decrypt($ciphertext, $recovered_plaintext, $private_key))
  {
    echo $recovered_plaintext;
  }
}