美文网首页辅助资料dotNETcsharp
C#RSA算法实现+如何将公钥为XML格式转为PEM格式,给ob

C#RSA算法实现+如何将公钥为XML格式转为PEM格式,给ob

作者: faith3729 | 来源:发表于2016-04-08 15:49 被阅读4611次

    .net中,处于安全的考虑,RSACryptoServiceProvider类,解密时只有同时拥有公钥和私钥才可以。原因是公钥是公开的,会被多人持有。这样的数据传输是不安全的。C#RSA私钥加密,公钥解密出错的原因!

    C#中用RSA算法生成公钥和私钥

    方法一:

    公钥密钥生成后,保存在同名文件夹下面,如下图:

    公钥密钥生成,所在路径【RSA\RSA\bin\Debug】
    using System;
    using System.IO;
    using System.Security.Cryptography;//必须引用
    
    namespace RSA
    {
        class Program
        {
            static void Main(string[] args)
            {
                RSACryptoServiceProvider rsa = new RSACryptoServiceProvider();
                using (StreamWriter writer = new StreamWriter("PrivateKey.xml"))  //这个文件要保密...
                {
    
                    writer.WriteLine(rsa.ToXmlString(true));
    
    
                }
                using (StreamWriter writer = new StreamWriter("PublicKey.xml"))
               {
    
                    writer.WriteLine(rsa.ToXmlString(false));
               }
            }
        }
    }
    
    方法二:
        public static void GKEY()//(计算机)生成密钥 GKEY(generate key),generate the RSA public and private keys
        {
            using (RSACryptoServiceProvider rsa = new RSACryptoServiceProvider())
            {
                string publicKey = rsa.ToXmlString(false); // 公钥
                string privateKey = rsa.ToXmlString(true); // 私钥
            }
        }
    

    直接断点调式复制公钥密钥出来用

    RSA加密解密类

        #region RSA
        /// <summary>
        /// RSA加密
        /// </summary>
        /// <param name="publickey"></param>
        /// <param name="content"></param>
        /// <returns></returns>
        public static string RSAEncrypt(string publickey, string content)
        {
            publickey = @"<RSAKeyValue><Modulus>0wE26IHp4U9OLtPhJ+fT8ej6aWORFP8pd++MjUuhkQQm/zhcImbxQbjxtSAftz+kkDwGDFJpSldQPyigOGcUx7PofTc6VhiFik9E9SsxV9n0iEEtqUndDfmBJfPAWt+4UDMwKakgZqFoapDuwjKlTErFvKCyKCs+qN9OZvZwKWk=</Modulus><Exponent>AQAB</Exponent></RSAKeyValue>";
            RSACryptoServiceProvider rsa = new RSACryptoServiceProvider();
            byte[] cipherbytes;
            rsa.FromXmlString(publickey);
            cipherbytes = rsa.Encrypt(Encoding.UTF8.GetBytes(content), false);
    
            return Convert.ToBase64String(cipherbytes);
    
        }
    
        /// <summary>
        /// RSA解密
        /// </summary>
        /// <param name="privatekey"></param>
        /// <param name="content"></param>
        /// <returns></returns>
        public static string RSADecrypt(string privatekey, string content)
        {
            privatekey = @"<RSAKeyValue><Modulus>0wE26IHp4U9OLtPhJ+fT8ej6aWORFP8pd++MjUuhkQQm/zhcImbxQbjxtSAftz+kkDwGDFJpSldQPyigOGcUx7PofTc6VhiFik9E9SsxV9n0iEEtqUndDfmBJfPAWt+4UDMwKakgZqFoapDuwjKlTErFvKCyKCs+qN9OZvZwKWk=</Modulus><Exponent>AQAB</Exponent><P>8Ei6NIsZtgV3DQjuGHfGLS6o1O+IUXxzjqLxdMm77yhEPUxR9YPIxODJ2VVTddXSAHxViJJt30yJ7JhVz6cpQw==</P><Q>4M49NrmalgVQFMsea2RMB1qN8fAPfIw5G9q9hzsLcWSCmkeRRIQlvPYflVEKAYKiDVVzENETbnnduFXWBABx4w==</Q><DP>t+JQbemN0Zi5FQaif6MZzHYKynpNTl75aE0Wj5Pa+RlNr8N6bXNe8Bw/HM2Jw4HQ5oJASvYUk3DVlHS4JuP8VQ==</DP><DQ>lT62iv9brp9mU/epgVh71SH8PJPIZEJfo6tryjyb0zMMNcqvmZI1z6aCv0mm3+vPFBUXqCF1yhFj7n4l8FAvSw==</DQ><InverseQ>flrvgxHvf4l+fdymEVDgKjsfGqshOpppoNgZj9kpeWBto3o8z++Ki6eSLQT3nVnpx2QCZeTWkxTED4nhSLKscw==</InverseQ><D>cQTCg1Eqk7sltmFYxUYgOP/AOPjSufteG9acYwYymPkvZh6rAuY+rSRBmvGE62NUYskzuB/gM6iG2/2HrA5SixfNgCvZ+nsK+kX5pzQRsYdD71ViQW0hOanXwj45I2zHRgBiuTtCUP0fs5pISmQkaeJkDL5pO2l+wvlgl+wunj0=</D></RSAKeyValue>";
            RSACryptoServiceProvider rsa = new RSACryptoServiceProvider();
            byte[] cipherbytes;
            rsa.FromXmlString(privatekey);
            cipherbytes = rsa.Decrypt(Convert.FromBase64String(content), false);
    
            return Encoding.UTF8.GetString(cipherbytes);
        }
        #endregion 
    

    如何将公钥为XML格式转为PEM格式?

    需要依赖一个第三方库,叫BouncyCastle
    在线获取安装包的代码如下:

    PM > Install-Package BouncyCastle

    如果不知道怎么打开vs2013 控制台的请看下面
    tips:打开VS2013控制台方法

    打开VS2013控制台方法.png
    安装第三方库成功图示.png
    方法一:在线转换

    请点击这里跳转>>在线转换

    如何将密钥XML格式和PEM格式互转?【tips:这里说的是密钥,公钥使用其他方法】

    一、将XML格式密钥转PEM
        public static void XMLConvertToPEM()//XML格式密钥转PEM
        {
            var rsa2 = new RSACryptoServiceProvider();
            using (var sr = new StreamReader("e:\\PrivateKey.xml"))
            {
                rsa2.FromXmlString(sr.ReadToEnd());
            }
            var p = rsa2.ExportParameters(true);
    
            var key = new RsaPrivateCrtKeyParameters(
                new BigInteger(1, p.Modulus), new BigInteger(1, p.Exponent), new BigInteger(1, p.D),
                new BigInteger(1, p.P), new BigInteger(1, p.Q), new BigInteger(1, p.DP), new BigInteger(1, p.DQ),
                new BigInteger(1, p.InverseQ));
    
            using (var sw = new StreamWriter("e:\\PrivateKey.pem"))
            {
                var pemWriter = new Org.BouncyCastle.OpenSsl.PemWriter(sw);
                pemWriter.WriteObject(key);
            }
        }
    
    一、将PEM格式密钥转XML
        public static void PEMConvertToXML()//PEM格式密钥转XML
        {
            AsymmetricCipherKeyPair keyPair;
            using (var sr = new StreamReader("e:\\PrivateKey.pem"))
            {
                var pemReader = new Org.BouncyCastle.OpenSsl.PemReader(sr);
                keyPair = (AsymmetricCipherKeyPair)pemReader.ReadObject();
            }
            var key = (RsaPrivateCrtKeyParameters)keyPair.Private;
            var p = new RSAParameters
            {
                Modulus = key.Modulus.ToByteArrayUnsigned(),
                Exponent = key.PublicExponent.ToByteArrayUnsigned(),
                D = key.Exponent.ToByteArrayUnsigned(),
                P = key.P.ToByteArrayUnsigned(),
                Q = key.Q.ToByteArrayUnsigned(),
                DP = key.DP.ToByteArrayUnsigned(),
                DQ = key.DQ.ToByteArrayUnsigned(),
                InverseQ = key.QInv.ToByteArrayUnsigned(),
            };
            var rsa = new RSACryptoServiceProvider();
            rsa.ImportParameters(p);
            using (var sw = new StreamWriter("e:\\PrivateKey.xml"))
            {
                sw.Write(rsa.ToXmlString(true));
            }
        }
    

    请点击:参考

    其他【tips:待测试】

    CER和pfx证书的生成和使用

    CER和pfx证书.png 生成公钥.png

    ----------------------------------------------分割线-----------------------------------

    下面的代码为object-C(来源于网络)

    文件1:rsa.m(object-c)

    /*
     @author: ideawu
     @link: https://github.com/ideawu/Objective-C-RSA
    */
    
    #import "RSA.h"
    #import <Security/Security.h>
    
    @implementation RSA
    
    /*
    static NSString *base64_encode(NSString *str){
        NSData* data = [str dataUsingEncoding:NSUTF8StringEncoding];
        if(!data){
            return nil;
        }
        return base64_encode_data(data);
    }
    */
    
    static NSString *base64_encode_data(NSData *data){
        data = [data base64EncodedDataWithOptions:0];
        NSString *ret = [[NSString alloc] initWithData:data encoding:NSUTF8StringEncoding];
        return ret;
    }
    
    static NSData *base64_decode(NSString *str){
        NSData *data = [[NSData alloc] initWithBase64EncodedString:str options:NSDataBase64DecodingIgnoreUnknownCharacters];
        return data;
    }
    
    + (NSData *)stripPublicKeyHeader:(NSData *)d_key{
        // Skip ASN.1 public key header
        if (d_key == nil) return(nil);
        
        unsigned long len = [d_key length];
        if (!len) return(nil);
        
        unsigned char *c_key = (unsigned char *)[d_key bytes];
        unsigned int  idx    = 0;
        
        if (c_key[idx++] != 0x30) return(nil);
        
        if (c_key[idx] > 0x80) idx += c_key[idx] - 0x80 + 1;
        else idx++;
        
        // PKCS #1 rsaEncryption szOID_RSA_RSA
        static unsigned char seqiod[] =
        { 0x30,   0x0d, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01,
            0x01, 0x05, 0x00 };
        if (memcmp(&c_key[idx], seqiod, 15)) return(nil);
        
        idx += 15;
        
        if (c_key[idx++] != 0x03) return(nil);
        
        if (c_key[idx] > 0x80) idx += c_key[idx] - 0x80 + 1;
        else idx++;
        
        if (c_key[idx++] != '\0') return(nil);
        
        // Now make a new NSData from this buffer
        return([NSData dataWithBytes:&c_key[idx] length:len - idx]);
    }
    
    //credit: http://hg.mozilla.org/services/fx-home/file/tip/Sources/NetworkAndStorage/CryptoUtils.m#l1036
    + (NSData *)stripPrivateKeyHeader:(NSData *)d_key{
        // Skip ASN.1 private key header
        if (d_key == nil) return(nil);
    
        unsigned long len = [d_key length];
        if (!len) return(nil);
    
        unsigned char *c_key = (unsigned char *)[d_key bytes];
        unsigned int  idx    = 22; //magic byte at offset 22
    
        if (0x04 != c_key[idx++]) return nil;
    
        //calculate length of the key
        unsigned int c_len = c_key[idx++];
        int det = c_len & 0x80;
        if (!det) {
            c_len = c_len & 0x7f;
        } else {
            int byteCount = c_len & 0x7f;
            if (byteCount + idx > len) {
                //rsa length field longer than buffer
                return nil;
            }
            unsigned int accum = 0;
            unsigned char *ptr = &c_key[idx];
            idx += byteCount;
            while (byteCount) {
                accum = (accum << 8) + *ptr;
                ptr++;
                byteCount--;
            }
            c_len = accum;
        }
    
        // Now make a new NSData from this buffer
        return [d_key subdataWithRange:NSMakeRange(idx, c_len)];
    }
    
    + (SecKeyRef)addPublicKey:(NSString *)key{
        NSRange spos = [key rangeOfString:@"-----BEGIN PUBLIC KEY-----"];
        NSRange epos = [key rangeOfString:@"-----END PUBLIC KEY-----"];
        if(spos.location != NSNotFound && epos.location != NSNotFound){
            NSUInteger s = spos.location + spos.length;
            NSUInteger e = epos.location;
            NSRange range = NSMakeRange(s, e-s);
            key = [key substringWithRange:range];
        }
        key = [key stringByReplacingOccurrencesOfString:@"\r" withString:@""];
        key = [key stringByReplacingOccurrencesOfString:@"\n" withString:@""];
        key = [key stringByReplacingOccurrencesOfString:@"\t" withString:@""];
        key = [key stringByReplacingOccurrencesOfString:@" "  withString:@""];
        
        // This will be base64 encoded, decode it.
        NSData *data = base64_decode(key);
        data = [RSA stripPublicKeyHeader:data];
        if(!data){
            return nil;
        }
    
        //a tag to read/write keychain storage
        NSString *tag = @"RSAUtil_PubKey";
        NSData *d_tag = [NSData dataWithBytes:[tag UTF8String] length:[tag length]];
        
        // Delete any old lingering key with the same tag
        NSMutableDictionary *publicKey = [[NSMutableDictionary alloc] init];
        [publicKey setObject:(__bridge id) kSecClassKey forKey:(__bridge id)kSecClass];
        [publicKey setObject:(__bridge id) kSecAttrKeyTypeRSA forKey:(__bridge id)kSecAttrKeyType];
        [publicKey setObject:d_tag forKey:(__bridge id)kSecAttrApplicationTag];
        SecItemDelete((__bridge CFDictionaryRef)publicKey);
        
        // Add persistent version of the key to system keychain
        [publicKey setObject:data forKey:(__bridge id)kSecValueData];
        [publicKey setObject:(__bridge id) kSecAttrKeyClassPublic forKey:(__bridge id)
         kSecAttrKeyClass];
        [publicKey setObject:[NSNumber numberWithBool:YES] forKey:(__bridge id)
         kSecReturnPersistentRef];
        
        CFTypeRef persistKey = nil;
        OSStatus status = SecItemAdd((__bridge CFDictionaryRef)publicKey, &persistKey);
        if (persistKey != nil){
            CFRelease(persistKey);
        }
        if ((status != noErr) && (status != errSecDuplicateItem)) {
            return nil;
        }
    
        [publicKey removeObjectForKey:(__bridge id)kSecValueData];
        [publicKey removeObjectForKey:(__bridge id)kSecReturnPersistentRef];
        [publicKey setObject:[NSNumber numberWithBool:YES] forKey:(__bridge id)kSecReturnRef];
        [publicKey setObject:(__bridge id) kSecAttrKeyTypeRSA forKey:(__bridge id)kSecAttrKeyType];
        
        // Now fetch the SecKeyRef version of the key
        SecKeyRef keyRef = nil;
        status = SecItemCopyMatching((__bridge CFDictionaryRef)publicKey, (CFTypeRef *)&keyRef);
        if(status != noErr){
            return nil;
        }
        return keyRef;
    }
    
    + (SecKeyRef)addPrivateKey:(NSString *)key{
        NSRange spos;
        NSRange epos;
        spos = [key rangeOfString:@"-----BEGIN RSA PRIVATE KEY-----"];
        if(spos.length > 0){
            epos = [key rangeOfString:@"-----END RSA PRIVATE KEY-----"];
        }else{
            spos = [key rangeOfString:@"-----BEGIN PRIVATE KEY-----"];
            epos = [key rangeOfString:@"-----END PRIVATE KEY-----"];
        }
        if(spos.location != NSNotFound && epos.location != NSNotFound){
            NSUInteger s = spos.location + spos.length;
            NSUInteger e = epos.location;
            NSRange range = NSMakeRange(s, e-s);
            key = [key substringWithRange:range];
        }
        key = [key stringByReplacingOccurrencesOfString:@"\r" withString:@""];
        key = [key stringByReplacingOccurrencesOfString:@"\n" withString:@""];
        key = [key stringByReplacingOccurrencesOfString:@"\t" withString:@""];
        key = [key stringByReplacingOccurrencesOfString:@" "  withString:@""];
    
        // This will be base64 encoded, decode it.
        NSData *data = base64_decode(key);
        data = [RSA stripPrivateKeyHeader:data];
        if(!data){
            return nil;
        }
    
        //a tag to read/write keychain storage
        NSString *tag = @"RSAUtil_PrivKey";
        NSData *d_tag = [NSData dataWithBytes:[tag UTF8String] length:[tag length]];
    
        // Delete any old lingering key with the same tag
        NSMutableDictionary *privateKey = [[NSMutableDictionary alloc] init];
        [privateKey setObject:(__bridge id) kSecClassKey forKey:(__bridge id)kSecClass];
        [privateKey setObject:(__bridge id) kSecAttrKeyTypeRSA forKey:(__bridge id)kSecAttrKeyType];
        [privateKey setObject:d_tag forKey:(__bridge id)kSecAttrApplicationTag];
        SecItemDelete((__bridge CFDictionaryRef)privateKey);
    
        // Add persistent version of the key to system keychain
        [privateKey setObject:data forKey:(__bridge id)kSecValueData];
        [privateKey setObject:(__bridge id) kSecAttrKeyClassPrivate forKey:(__bridge id)
         kSecAttrKeyClass];
        [privateKey setObject:[NSNumber numberWithBool:YES] forKey:(__bridge id)
         kSecReturnPersistentRef];
    
        CFTypeRef persistKey = nil;
        OSStatus status = SecItemAdd((__bridge CFDictionaryRef)privateKey, &persistKey);
        if (persistKey != nil){
            CFRelease(persistKey);
        }
        if ((status != noErr) && (status != errSecDuplicateItem)) {
            return nil;
        }
    
        [privateKey removeObjectForKey:(__bridge id)kSecValueData];
        [privateKey removeObjectForKey:(__bridge id)kSecReturnPersistentRef];
        [privateKey setObject:[NSNumber numberWithBool:YES] forKey:(__bridge id)kSecReturnRef];
        [privateKey setObject:(__bridge id) kSecAttrKeyTypeRSA forKey:(__bridge id)kSecAttrKeyType];
    
        // Now fetch the SecKeyRef version of the key
        SecKeyRef keyRef = nil;
        status = SecItemCopyMatching((__bridge CFDictionaryRef)privateKey, (CFTypeRef *)&keyRef);
        if(status != noErr){
            return nil;
        }
        return keyRef;
    }
    
    /* START: Encryption & Decryption with RSA private key */
    
    + (NSData *)encryptData:(NSData *)data withKeyRef:(SecKeyRef) keyRef{
        const uint8_t *srcbuf = (const uint8_t *)[data bytes];
        size_t srclen = (size_t)data.length;
        
        size_t block_size = SecKeyGetBlockSize(keyRef) * sizeof(uint8_t);
        void *outbuf = malloc(block_size);
        size_t src_block_size = block_size - 11;
        
        NSMutableData *ret = [[NSMutableData alloc] init];
        for(int idx=0; idx<srclen; idx+=src_block_size){
            //NSLog(@"%d/%d block_size: %d", idx, (int)srclen, (int)block_size);
            size_t data_len = srclen - idx;
            if(data_len > src_block_size){
                data_len = src_block_size;
            }
            
            size_t outlen = block_size;
            OSStatus status = noErr;
            status = SecKeyEncrypt(keyRef,
                                   kSecPaddingPKCS1,
                                   srcbuf + idx,
                                   data_len,
                                   outbuf,
                                   &outlen
                                   );
            if (status != 0) {
    //          NSLog(@"SecKeyEncrypt fail. Error Code: %d", status);
                ret = nil;
                break;
            }else{
                [ret appendBytes:outbuf length:outlen];
            }
        }
        
        free(outbuf);
        CFRelease(keyRef);
        return ret;
    }
    
    + (NSString *)encryptString:(NSString *)str privateKey:(NSString *)privKey{
        NSData *data = [RSA encryptData:[str dataUsingEncoding:NSUTF8StringEncoding] privateKey:privKey];
        NSString *ret = base64_encode_data(data);
        return ret;
    }
    
    + (NSData *)encryptData:(NSData *)data privateKey:(NSString *)privKey{
        if(!data || !privKey){
            return nil;
        }
        SecKeyRef keyRef = [RSA addPrivateKey:privKey];
        if(!keyRef){
            return nil;
        }
        return [RSA encryptData:data withKeyRef:keyRef];
    }
    
    + (NSData *)decryptData:(NSData *)data withKeyRef:(SecKeyRef) keyRef{
        const uint8_t *srcbuf = (const uint8_t *)[data bytes];
        size_t srclen = (size_t)data.length;
        
        size_t block_size = SecKeyGetBlockSize(keyRef) * sizeof(uint8_t);
        UInt8 *outbuf = malloc(block_size);
        size_t src_block_size = block_size;
        
        NSMutableData *ret = [[NSMutableData alloc] init];
        for(int idx=0; idx<srclen; idx+=src_block_size){
            //NSLog(@"%d/%d block_size: %d", idx, (int)srclen, (int)block_size);
            size_t data_len = srclen - idx;
            if(data_len > src_block_size){
                data_len = src_block_size;
            }
            
            size_t outlen = block_size;
            OSStatus status = noErr;
            status = SecKeyDecrypt(keyRef,
                                   kSecPaddingNone,
                                   srcbuf + idx,
                                   data_len,
                                   outbuf,
                                   &outlen
                                   );
            if (status != 0) {
    //          NSLog(@"SecKeyEncrypt fail. Error Code: %d", status);
                ret = nil;
                break;
            }else{
                //the actual decrypted data is in the middle, locate it!
                int idxFirstZero = -1;
                int idxNextZero = (int)outlen;
                for ( int i = 0; i < outlen; i++ ) {
                    if ( outbuf[i] == 0 ) {
                        if ( idxFirstZero < 0 ) {
                            idxFirstZero = i;
                        } else {
                            idxNextZero = i;
                            break;
                        }
                    }
                }
                
                [ret appendBytes:&outbuf[idxFirstZero+1] length:idxNextZero-idxFirstZero-1];
            }
        }
        
        free(outbuf);
        CFRelease(keyRef);
        return ret;
    }
    
    
    + (NSString *)decryptString:(NSString *)str privateKey:(NSString *)privKey{
        NSData *data = [[NSData alloc] initWithBase64EncodedString:str options:NSDataBase64DecodingIgnoreUnknownCharacters];
        data = [RSA decryptData:data privateKey:privKey];
        NSString *ret = [[NSString alloc] initWithData:data encoding:NSUTF8StringEncoding];
        return ret;
    }
    
    + (NSData *)decryptData:(NSData *)data privateKey:(NSString *)privKey{
        if(!data || !privKey){
            return nil;
        }
        SecKeyRef keyRef = [RSA addPrivateKey:privKey];
        if(!keyRef){
            return nil;
        }
        return [RSA decryptData:data withKeyRef:keyRef];
    }
    
    /* END: Encryption & Decryption with RSA private key */
    
    /* START: Encryption & Decryption with RSA public key */
    
    + (NSString *)encryptString:(NSString *)str publicKey:(NSString *)pubKey{
        NSData *data = [RSA encryptData:[str dataUsingEncoding:NSUTF8StringEncoding] publicKey:pubKey];
        NSString *ret = base64_encode_data(data);
        return ret;
    }
    
    + (NSData *)encryptData:(NSData *)data publicKey:(NSString *)pubKey{
        if(!data || !pubKey){
            return nil;
        }
        SecKeyRef keyRef = [RSA addPublicKey:pubKey];
        if(!keyRef){
            return nil;
        }
        return [RSA encryptData:data withKeyRef:keyRef];
    }
    
    + (NSString *)decryptString:(NSString *)str publicKey:(NSString *)pubKey{
        NSData *data = [[NSData alloc] initWithBase64EncodedString:str options:NSDataBase64DecodingIgnoreUnknownCharacters];
        data = [RSA decryptData:data publicKey:pubKey];
        NSString *ret = [[NSString alloc] initWithData:data encoding:NSUTF8StringEncoding];
        return ret;
    }
    
    + (NSData *)decryptData:(NSData *)data publicKey:(NSString *)pubKey{
        if(!data || !pubKey){
            return nil;
        }
        SecKeyRef keyRef = [RSA addPublicKey:pubKey];
        if(!keyRef){
            return nil;
        }
        return [RSA decryptData:data withKeyRef:keyRef];
    }
    
    /* END: Encryption & Decryption with RSA public key */
    
    @end
    

    文件2:rsa.h(object-c)

    /*
     @author: ideawu
     @link: https://github.com/ideawu/Objective-C-RSA
    */
    
    #import <Foundation/Foundation.h>
    
    @interface RSA : NSObject
    
    // return base64 encoded string
    + (NSString *)encryptString:(NSString *)str publicKey:(NSString *)pubKey;
    // return raw data
    + (NSData *)encryptData:(NSData *)data publicKey:(NSString *)pubKey;
    // return base64 encoded string
    // enc with private key NOT working YET!
    //+ (NSString *)encryptString:(NSString *)str privateKey:(NSString *)privKey;
    // return raw data
    //+ (NSData *)encryptData:(NSData *)data privateKey:(NSString *)privKey;
    
    // decrypt base64 encoded string, convert result to string(not base64 encoded)
    + (NSString *)decryptString:(NSString *)str publicKey:(NSString *)pubKey;
    + (NSData *)decryptData:(NSData *)data publicKey:(NSString *)pubKey;
    + (NSString *)decryptString:(NSString *)str privateKey:(NSString *)privKey;
    + (NSData *)decryptData:(NSData *)data privateKey:(NSString *)privKey;
    
    @end
    

    相关文章

      网友评论

      • 雨落随风:排版可以更好的哦
        ```
        左上角的波浪号在英文字符下输入6个,代码写在中间
        ```
        faith3729:谢谢啦,学习了
      • 阿尔法代码狗:楼主,目前后台就给了我个xml的公钥,,是我自己把它转成pem文件么,还是后台那边转,还有我看了其他的帖子需要der证书,有点晕
        faith3729:@阿尔法代码狗 可以将公钥XML转成公钥PEM
        阿尔法代码狗:我是iOS
        端的,需要转化成证书,这个链接也能转么
        faith3729:@阿尔法代码狗 自己转PEM咯,这个链接https://superdry.apphb.com/tools/online-rsa-key-converter。。。
        另外,C#开发人员应该给IOS开发人员PEM格式的公钥才好点,不给就只能自己写代码或者在线转了
      • 有一只很可爱的狗:我也快疯了,求帮助
        faith3729:@有一只很可爱的狗 怎么帮你?
      • 馒头灿:你的标题和内容有矛盾啊、你的内容是C#的,标题怎么是写给OC的呢?
        前辈、有没有思路帮助我一下,我要XML(公钥)转pem格式的,我找了好几天了,希望楼主帮助下,感激不尽
        faith3729:@馒头灿qq 3086039781
        faith3729:@馒头灿 联系我,我给你出解决方案,分分钟解决
        faith3729:@馒头灿 咱们联系一下?我可以解决
      • 馒头灿: :sob: :sob: :sob: 难道真的没有iOS的吗。
        faith3729:@馒头灿 这个都是互通的呀
      • 馒头灿:爱死你了。内容还没看,看到标题我就疯狂了。这个东西我找了好几天了。哈哈哈,看看内容 :relaxed:

      本文标题:C#RSA算法实现+如何将公钥为XML格式转为PEM格式,给ob

      本文链接:https://www.haomeiwen.com/subject/edpvlttx.html