1# 指定PEM格式字符串数据转换非对称密钥对(C/C++) 2 3<!--Kit: Crypto Architecture Kit--> 4<!--Subsystem: Security--> 5<!--Owner: @zxz--3--> 6<!--Designer: @lanming--> 7<!--Tester: @PAFT--> 8<!--Adviser: @zengyawen--> 9 10以RSA为例,根据指定的非对称密钥字符串数据,生成非对称密钥对(OH_CryptoKeyPair)。 11 12> **说明:** 13> 14> 针对非对称密钥的convertPemKey操作: 15> 16> - 公钥需满足X.509规范、PKCS\#1规范、PEM编码格式。 17> 18> - 私钥需满足PKCS\#8规范、PKCS\#1规范、PEM编码格式。 19 20## 在CMake脚本中链接相关动态库 21```txt 22target_link_libraries(entry PUBLIC libohcrypto.so) 23``` 24 25## 指定PEM格式字符串数据转换RSA密钥对 26 27对应的算法规格请查看[非对称密钥生成和转换规格:RSA](crypto-asym-key-generation-conversion-spec.md#rsa)。 28 291. 调用[OH_CryptoAsymKeyGenerator_Create](../../reference/apis-crypto-architecture-kit/capi-crypto-asym-key-h.md#oh_cryptoasymkeygenerator_create),指定字符串参数'RSA1024',创建RSA密钥类型为RSA1024、素数个数为2的非对称密钥生成器(OH_CryptoAsymKeyGenerator)。 30 31 生成RSA非对称密钥时,默认素数为2,此处省略了参数PRIMES_2。 32 332. 调用[OH_CryptoAsymKeyGenerator_Convert](../../reference/apis-crypto-architecture-kit/capi-crypto-asym-key-h.md#oh_cryptoasymkeygenerator_convert),传入二进制密钥数据,生成非对称密钥对象(OH_CryptoKeyPair)。 343. 调用[OH_CryptoPubKey_Encode](../../reference/apis-crypto-architecture-kit/capi-crypto-asym-key-h.md#oh_cryptopubkey_encode),将非对称密钥对象中的公钥转换成pkcs1或x509格式。 35 36- 以下以生成RSA密钥对为例: 37 38```c++ 39#include "CryptoArchitectureKit/crypto_common.h" 40#include "CryptoArchitectureKit/crypto_asym_key.h" 41 42static OH_Crypto_ErrCode doTestPemDataCovertAsymKey() 43{ 44 OH_CryptoAsymKeyGenerator *ctx = nullptr; 45 OH_Crypto_ErrCode ret; 46 47 ret = OH_CryptoAsymKeyGenerator_Create("RSA1024", &ctx); 48 if (ret != CRYPTO_SUCCESS) { 49 return ret; 50 } 51 52 uint8_t pubKeyBlobData[] = { 48,129,159,48,13,6,9,42,134,72,134,247,13,1,1,1,5,0,3,129, 53 141,0,48,129,137,2,129,129,0,235,184,151,247,130,216,140,187,64,124,219,137,140,184,53, 54 137,216,105,156,141,137,165,30,80,232,55,96,46,23,237,197,123,121,27,240,190,14,111,237, 55 172,67,42,47,164,226,248,211,157,213,194,131,109,181,41,173,217,127,252,121,126,26,130, 56 55,4,134,104,73,5,132,91,214,146,232,64,99,87,33,222,155,159,9,59,212,144,46,183,83,89, 57 220,189,148,13,176,5,139,156,230,143,16,152,79,36,8,112,40,174,35,83,82,57,137,87,123, 58 215,99,199,66,131,150,31,143,56,252,2,73,41,70,159,2,3,1,0,1 }; 59 60 OH_CryptoKeyPair *dupKeyPair = nullptr; 61 Crypto_DataBlob pubBlob = { .data = pubKeyBlobData, .len = sizeof(pubKeyBlobData) }; 62 ret = OH_CryptoAsymKeyGenerator_Convert(ctx, CRYPTO_DER, &pubBlob, nullptr, &dupKeyPair); 63 if (ret != CRYPTO_SUCCESS) { 64 OH_CryptoAsymKeyGenerator_Destroy(ctx); 65 return ret; 66 } 67 68 OH_CryptoPubKey *pubKey1 = OH_CryptoKeyPair_GetPubKey(dupKeyPair); 69 Crypto_DataBlob retBlob = { .data = nullptr, .len = 0 }; 70 ret = OH_CryptoPubKey_Encode(pubKey1, CRYPTO_PEM, "PKCS1", &retBlob); 71 if (ret != CRYPTO_SUCCESS) { 72 OH_CryptoAsymKeyGenerator_Destroy(ctx); 73 OH_CryptoKeyPair_Destroy(dupKeyPair); 74 return ret; 75 } 76 OH_Crypto_FreeDataBlob(&retBlob); 77 OH_CryptoAsymKeyGenerator_Destroy(ctx); 78 OH_CryptoKeyPair_Destroy(dupKeyPair); 79 return ret; 80} 81``` 82 83 84