package com.fzzy.gateway.hx2023.util;
|
|
import java.security.*;
|
import java.security.interfaces.RSAPrivateKey;
|
import java.security.interfaces.RSAPublicKey;
|
import java.security.spec.InvalidKeySpecException;
|
import java.security.spec.PKCS8EncodedKeySpec;
|
import java.security.spec.X509EncodedKeySpec;
|
import java.util.HashMap;
|
import java.util.Map;
|
|
import javax.crypto.BadPaddingException;
|
import javax.crypto.Cipher;
|
import javax.crypto.IllegalBlockSizeException;
|
import javax.crypto.NoSuchPaddingException;
|
|
import lombok.extern.slf4j.Slf4j;
|
import org.slf4j.Logger;
|
import org.slf4j.LoggerFactory;
|
|
import lombok.Data;
|
|
/**
|
* RSA签名验签类
|
*
|
*/
|
@Slf4j
|
@Data
|
public class OpenApiRsaSigner {
|
|
/**
|
* 后续用于缓存公钥和私钥
|
*/
|
private static Map<String, OpenApiRsaSigner> signerMap = new HashMap<>();
|
|
private PublicKey publicKey;
|
private PrivateKey privateKey;
|
|
/**
|
* 字节数据转字符串专用集合
|
*/
|
private static final char[] HEX_CHAR = {'0', '1', '2', '3', '4', '5', '6', '7', '8', '9', 'a', 'b', 'c', 'd', 'e', 'f'};
|
|
private OpenApiRsaSigner(PublicKey publicKey, PrivateKey privateKey) {
|
this.publicKey = publicKey;
|
this.privateKey = privateKey;
|
}
|
|
public static OpenApiRsaSigner initSigner(String publicKey, String privateKey) {
|
try {
|
PublicKey publicKeyObj = loadPublicKeyByStr(publicKey);
|
PrivateKey privateKeyObj = loadPrivateKeyByStr(privateKey);
|
return new OpenApiRsaSigner(publicKeyObj, privateKeyObj);
|
}catch (Exception e) {
|
log.error("initSigner(),exception happens.", e);
|
}
|
return null;
|
}
|
|
/**
|
* 从字符串中加载公钥
|
*
|
* @param publicKeyStr 公钥数据字符串
|
* @throws Exception 加载公钥时产生的异常
|
*/
|
public static RSAPublicKey loadPublicKeyByStr(String publicKeyStr) throws Exception {
|
try {
|
byte[] buffer = Base64Utils.decode(publicKeyStr);
|
KeyFactory keyFactory = KeyFactory.getInstance("RSA");
|
X509EncodedKeySpec keySpec = new X509EncodedKeySpec(buffer);
|
return (RSAPublicKey) keyFactory.generatePublic(keySpec);
|
} catch (NoSuchAlgorithmException e) {
|
throw new Exception("无此算法");
|
} catch (InvalidKeySpecException e) {
|
throw new Exception("公钥非法");
|
} catch (NullPointerException e) {
|
throw new Exception("公钥数据为空");
|
}
|
}
|
|
/**
|
* @param privateKeyStr
|
* @return
|
* @throws Exception
|
*/
|
public static RSAPrivateKey loadPrivateKeyByStr(String privateKeyStr) throws Exception {
|
try {
|
byte[] buffer = Base64Utils.decode(privateKeyStr);
|
PKCS8EncodedKeySpec keySpec = new PKCS8EncodedKeySpec(buffer);
|
KeyFactory keyFactory = KeyFactory.getInstance("RSA");
|
return (RSAPrivateKey) keyFactory.generatePrivate(keySpec);
|
} catch (NoSuchAlgorithmException e) {
|
throw new Exception("无此算法");
|
} catch (InvalidKeySpecException e) {
|
throw new Exception("私钥非法");
|
} catch (NullPointerException e) {
|
throw new Exception("私钥数据为空");
|
}
|
}
|
|
/**
|
* 公钥加密过程
|
*
|
* @param publicKey 公钥
|
* @param plainTextData 明文数据
|
* @return
|
* @throws Exception 加密过程中的异常信息
|
*/
|
public static byte[] encrypt(RSAPublicKey publicKey, byte[] plainTextData) throws Exception {
|
if (publicKey == null) {
|
throw new Exception("加密公钥为空, 请设置");
|
}
|
Cipher cipher = null;
|
try {
|
// 使用默认RSA
|
cipher = Cipher.getInstance("RSA");
|
// cipher= Cipher.getInstance("RSA", new BouncyCastleProvider());
|
cipher.init(Cipher.ENCRYPT_MODE, publicKey);
|
byte[] output = cipher.doFinal(plainTextData);
|
return output;
|
} catch (NoSuchAlgorithmException e) {
|
throw new Exception("无此加密算法");
|
} catch (NoSuchPaddingException e) {
|
log.error("exception happens.", e);
|
return null;
|
} catch (InvalidKeyException e) {
|
throw new Exception("加密公钥非法,请检查");
|
} catch (IllegalBlockSizeException e) {
|
throw new Exception("明文长度非法");
|
} catch (BadPaddingException e) {
|
throw new Exception("明文数据已损坏");
|
}
|
}
|
|
/**
|
* 私钥加密过程
|
*
|
* @param privateKey 私钥
|
* @param plainTextData 明文数据
|
* @return
|
* @throws Exception 加密过程中的异常信息
|
*/
|
public static byte[] encrypt(RSAPrivateKey privateKey, byte[] plainTextData) throws Exception {
|
if (privateKey == null) {
|
throw new Exception("加密私钥为空, 请设置");
|
}
|
Cipher cipher = null;
|
try {
|
// 使用默认RSA
|
cipher = Cipher.getInstance("RSA");
|
cipher.init(Cipher.ENCRYPT_MODE, privateKey);
|
byte[] output = cipher.doFinal(plainTextData);
|
return output;
|
} catch (NoSuchAlgorithmException e) {
|
throw new Exception("无此加密算法");
|
} catch (NoSuchPaddingException e) {
|
log.error("exception happens.", e);
|
return null;
|
} catch (InvalidKeyException e) {
|
throw new Exception("加密私钥非法,请检查");
|
} catch (IllegalBlockSizeException e) {
|
throw new Exception("明文长度非法");
|
} catch (BadPaddingException e) {
|
throw new Exception("明文数据已损坏");
|
}
|
}
|
|
/**
|
* 私钥解密过程
|
*
|
* @param privateKey 私钥
|
* @param cipherData 密文数据
|
* @return 明文
|
* @throws Exception 解密过程中的异常信息
|
*/
|
public static byte[] decrypt(RSAPrivateKey privateKey, byte[] cipherData) throws Exception {
|
if (privateKey == null) {
|
throw new Exception("解密私钥为空, 请设置");
|
}
|
|
if (cipherData == null) {
|
return null;
|
}
|
|
Cipher cipher = null;
|
try {
|
// 使用默认RSA
|
cipher = Cipher.getInstance("RSA");
|
// cipher= Cipher.getInstance("RSA", new BouncyCastleProvider());
|
cipher.init(Cipher.DECRYPT_MODE, privateKey);
|
byte[] output = cipher.doFinal(cipherData);
|
return output;
|
} catch (NoSuchAlgorithmException e) {
|
throw new Exception("无此解密算法");
|
} catch (NoSuchPaddingException e) {
|
log.error("exception happens.", e);
|
return null;
|
} catch (InvalidKeyException e) {
|
throw new Exception("解密私钥非法,请检查");
|
} catch (IllegalBlockSizeException e) {
|
throw new Exception("密文长度非法");
|
} catch (BadPaddingException e) {
|
throw new Exception("密文数据已损坏");
|
}
|
}
|
|
/**
|
* 公钥解密过程
|
*
|
* @param publicKey 公钥
|
* @param cipherData 密文数据
|
* @return 明文
|
* @throws Exception 解密过程中的异常信息
|
*/
|
public static byte[] decrypt(RSAPublicKey publicKey, byte[] cipherData) throws Exception {
|
if (publicKey == null) {
|
throw new Exception("解密公钥为空, 请设置");
|
}
|
Cipher cipher = null;
|
try {
|
// 使用默认RSA
|
cipher = Cipher.getInstance("RSA");
|
// cipher= Cipher.getInstance("RSA", new BouncyCastleProvider());
|
cipher.init(Cipher.DECRYPT_MODE, publicKey);
|
byte[] output = cipher.doFinal(cipherData);
|
return output;
|
} catch (NoSuchAlgorithmException e) {
|
throw new Exception("无此解密算法");
|
} catch (NoSuchPaddingException e) {
|
log.error("exception happens.", e);
|
return null;
|
} catch (InvalidKeyException e) {
|
throw new Exception("解密公钥非法,请检查");
|
} catch (IllegalBlockSizeException e) {
|
throw new Exception("密文长度非法");
|
} catch (BadPaddingException e) {
|
throw new Exception("密文数据已损坏");
|
}
|
}
|
|
public static boolean verify(String content, String sign, RSAPrivateKey privateKey) throws Exception {
|
byte[] singBytes = encrypt(privateKey, content.getBytes());
|
|
return sign.equals(new String(singBytes));
|
}
|
|
/**
|
* 字节数据转十六进制字符串
|
*
|
* @param data 输入数据
|
* @return 十六进制内容
|
*/
|
public static String byteArrayToString(byte[] data) {
|
StringBuilder stringBuilder = new StringBuilder();
|
for (int i = 0; i < data.length; i++) {
|
// 取出字节的高四位 作为索引得到相应的十六进制标识符 注意无符号右移
|
stringBuilder.append(HEX_CHAR[(data[i] & 0xf0) >>> 4]);
|
// 取出字节的低四位 作为索引得到相应的十六进制标识符
|
stringBuilder.append(HEX_CHAR[(data[i] & 0x0f)]);
|
if (i < data.length - 1) {
|
stringBuilder.append(' ');
|
}
|
}
|
return stringBuilder.toString();
|
}
|
|
public static OpenApiRsaSigner getInstance(String appId, String publicKey, String privateKey) {
|
OpenApiRsaSigner signer = signerMap.get(appId);
|
if (signer != null) {
|
return signer;
|
}
|
try {
|
signer = initSigner(publicKey, privateKey);
|
if(signer != null){
|
signerMap.put(appId, signer);
|
}
|
} catch (Exception e) {
|
log.error("exception happens.", e);
|
}
|
return signerMap.get(appId);
|
}
|
|
}
|