2016-11-11 64 views
3

我正在尝试使用充气城堡来生成ECDSA密钥。该代码似乎从Java的角度来看工作正常;但是,当我转储文件并尝试验证数据时,OpenSSL不喜欢数据的格式。在充气城堡中生成ECDSA私钥会返回一个公共密钥

经过一番研究,我发现充气城堡将私钥编码为公钥。

这里是我的Java代码:

public class Test { 
    public static void main(String[] args) { 
     Security.addProvider(new BouncyCastleProvider()); 
     System.out.println("Starting..."); 
     String name = "prime256v1"; 
     try { 
      KeyPairGenerator kpg = KeyPairGenerator.getInstance("ECDSA", BouncyCastleProvider.PROVIDER_NAME); 
      kpg.initialize(new ECGenParameterSpec(name)); 
      KeyPair keyPair = kpg.generateKeyPair();  
      FileOutputStream writer = new FileOutputStream("private.key"); 
      writer.write(keyPair.getPrivate().getEncoded()); 
      writer.close(); 
     } catch(Exception e) { 
      e.printStackTrace(); 
     } 
    } 
} 

在有效DER格式生成private.key文件;然而,当我运行以下命令来查看关键的ASN.1结构:

$ openssl asn1parse -inform DER -in /my/path/private.key 
    0:d=0 hl=3 l= 147 cons: SEQUENCE   
    3:d=1 hl=2 l= 1 prim: INTEGER   :00 
    6:d=1 hl=2 l= 19 cons: SEQUENCE   
    8:d=2 hl=2 l= 7 prim: OBJECT   :id-ecPublicKey 
    17:d=2 hl=2 l= 8 prim: OBJECT   :prime256v1 
    27:d=1 hl=2 l= 121 prim: OCTET STRING  [HEX DUMP]: <hex data> 

为了进行比较,如果我运行下面的命令使用OpenSSL生成一个ECDSA键,我得到以下ASN.1结构:

$ openssl ecparam -name prime256v1 -genkey -noout -outform DER -out private.key 
$ openssl asn1parse -inform DER -in private.key 
    0:d=0 hl=2 l= 119 cons: SEQUENCE   
    2:d=1 hl=2 l= 1 prim: INTEGER   :01 
    5:d=1 hl=2 l= 32 prim: OCTET STRING  [HEX DUMP]: <hex data> 
    39:d=1 hl=2 l= 10 cons: cont [ 0 ]   
    41:d=2 hl=2 l= 8 prim: OBJECT   :prime256v1 
    51:d=1 hl=2 l= 68 cons: cont [ 1 ]   
    53:d=2 hl=2 l= 66 prim: BIT STRING   

所以,我想我的问题是

  • 有什么我失踪?
  • 或者这是一个已知的错误?
  • 有没有办法避开它?
+0

“OpenSSL不喜欢数据的格式。”你能详细说明一下吗?任何操作失败了吗? – jay

+0

@jay yes,'$ openssl ec -inform DER -in/my/path/private.key'失败 – Rodolfo

+2

没有错误,只是Java输出PKCS8格式,而openssl命令并不期望它。 –

回答

0

Java以编码格式输出密钥。您应该尝试:

private String getPrivateKeyAsHex(PrivateKey privateKey) { 

    ECPrivateKey ecPrivateKey = (ECPrivateKey) privateKey; 
    byte[] privateKeyBytes = new byte[PRIVATE_KEY_LENGTH]; 
    writeToStream(privateKeyBytes, 0, ecPrivateKey.getS(), PRIVATE_KEY_LENGTH); 

    String hex = Hex.toHexString(privateKeyBytes); 

    logger.debug("Private key bytes: " + Arrays.toString(privateKeyBytes)); 
    logger.debug("Private key hex: " + hex); 

    return hex; 
} 

private String getPublicKeyAsHex(PublicKey publicKey) { 

    ECPublicKey ecPublicKey = (ECPublicKey) publicKey; 
    ECPoint ecPoint = ecPublicKey.getW(); 

    byte[] publicKeyBytes = new byte[PUBLIC_KEY_LENGTH]; 
    writeToStream(publicKeyBytes, 0, ecPoint.getAffineX(), PRIVATE_KEY_LENGTH); 
    writeToStream(publicKeyBytes, PRIVATE_KEY_LENGTH, ecPoint.getAffineY(), PRIVATE_KEY_LENGTH); 

    String hex = Hex.toHexString(publicKeyBytes); 

    logger.debug("Public key bytes: " + Arrays.toString(publicKeyBytes)); 
    logger.debug("Public key hex: " + hex); 

    return hex; 
} 

private void writeToStream(byte[] stream, int start, BigInteger value, int size) { 
    byte[] data = value.toByteArray(); 
    int length = Math.min(size, data.length); 
    int writeStart = start + size - length; 
    int readStart = data.length - length; 
    System.arraycopy(data, readStart, stream, writeStart, length); 
} 
+0

我真的不知道该怎么做。我把它插入到我的代码中,它显示十六进制(如我所料),但它不能被openssl解析。 – Rodolfo