• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1# 使用RSA密钥对分段签名验签(PKCS1模式)
2
3
4对应的算法规格请查看[签名验签算法规格:RSA](crypto-sign-sig-verify-overview.md#rsa)。
5
6
7**签名**
8
9
101. 调用[cryptoFramework.createAsyKeyGenerator](../../reference/apis-crypto-architecture-kit/js-apis-cryptoFramework.md#cryptoframeworkcreateasykeygenerator)、[AsyKeyGenerator.generateKeyPair](../../reference/apis-crypto-architecture-kit/js-apis-cryptoFramework.md#generatekeypair-1),生成密钥算法为RSA、密钥长度为1024位、素数个数为2的非对称密钥对象(KeyPair),包括公钥(PubKey)和私钥(PriKey)。
11
12   如何生成RSA非对称密钥,开发者可参考下文示例,并结合[非对称密钥生成和转换规格:RSA](crypto-asym-key-generation-conversion-spec.md#rsa)和[随机生成非对称密钥对](crypto-generate-asym-key-pair-randomly.md)理解,参考文档与当前示例可能存在入参差异,请在阅读时注意区分。
13
142. 调用[cryptoFramework.createSign](../../reference/apis-crypto-architecture-kit/js-apis-cryptoFramework.md#cryptoframeworkcreatesign),指定字符串参数'RSA1024|PKCS1|SHA256',创建非对称密钥类型为RSA1024、填充模式为PKCS1、摘要算法为SHA256的Sign实例,用于完成签名操作。
15
163. 调用[Sign.init](../../reference/apis-crypto-architecture-kit/js-apis-cryptoFramework.md#init-3),使用私钥(PriKey)初始化Sign实例。
17
184. 将一次传入数据量设置为64字节,多次调用[Sign.update](../../reference/apis-crypto-architecture-kit/js-apis-cryptoFramework.md#update-3),传入待签名的数据。
19   当前单次update长度没有限制,开发者可以根据数据量判断如何调用update。
20
215. 调用[Sign.sign](../../reference/apis-crypto-architecture-kit/js-apis-cryptoFramework.md#sign-2),生成数据签名。
22
23
24**验签**
25
26
271. 调用[cryptoFramework.createVerify](../../reference/apis-crypto-architecture-kit/js-apis-cryptoFramework.md#cryptoframeworkcreateverify),指定字符串参数'RSA1024|PKCS1|SHA256',与签名的Sign实例保持一致。创建Verify实例,用于完成验签操作。
28
292. 调用[Verify.init](../../reference/apis-crypto-architecture-kit/js-apis-cryptoFramework.md#init-5),使用公钥(PubKey)初始化Verify实例。
30
313. 调用[Verify.update](../../reference/apis-crypto-architecture-kit/js-apis-cryptoFramework.md#update-5),传入待验证的数据。
32   当前单次update长度没有限制,开发者可以根据数据量判断如何调用update。
33
344. 调用[Verify.verify](../../reference/apis-crypto-architecture-kit/js-apis-cryptoFramework.md#verify-2),对数据进行验签。
35
36
37```ts
38import cryptoFramework from '@ohos.security.cryptoFramework';
39import buffer from '@ohos.buffer';
40
41async function signMessageBySegment(priKey: cryptoFramework.PriKey, plainText: Uint8Array) {
42  let signAlg = "RSA1024|PKCS1|SHA256";
43  let signer = cryptoFramework.createSign(signAlg);
44  await signer.init(priKey);
45  let textSplitLen = 64; // 自定义的数据拆分长度,此处取64
46  for (let i = 0; i < plainText.length; i += textSplitLen) {
47    let updateMessage = plainText.subarray(i, i + textSplitLen);
48    let updateMessageBlob: cryptoFramework.DataBlob = { data: updateMessage };
49    // 分段update
50    await signer.update(updateMessageBlob);
51  }
52  // 已通过分段传入所有明文,故此处sign传入null
53  let signData = await signer.sign(null);
54  return signData;
55}
56async function verifyMessagBySegment(pubKey: cryptoFramework.PubKey, plainText: Uint8Array, signMessageBlob: cryptoFramework.DataBlob) {
57  let verifyAlg = "RSA1024|PKCS1|SHA256";
58  let verifier = cryptoFramework.createVerify(verifyAlg);
59  await verifier.init(pubKey);
60  let textSplitLen = 64; // 自定义的数据拆分长度,此处取64
61  for (let i = 0; i < plainText.length; i += textSplitLen) {
62    let updateMessage = plainText.subarray(i, i + textSplitLen);
63    let updateMessageBlob: cryptoFramework.DataBlob = { data: updateMessage };
64    // 分段update
65    await verifier.update(updateMessageBlob);
66  }
67  // 已通过分段传入所有明文,故此处verify第一个参数传入null
68  let res = await verifier.verify(null, signMessageBlob);
69  console.info("verify result is " + res);
70  return res;
71}
72async function rsaSignatureBySegment() {
73  let message = "This is a long plainTest! This is a long plainTest! This is a long plainTest!" +
74    "This is a long plainTest! This is a long plainTest! This is a long plainTest! This is a long plainTest!" +
75    "This is a long plainTest! This is a long plainTest! This is a long plainTest! This is a long plainTest!" +
76    "This is a long plainTest! This is a long plainTest! This is a long plainTest! This is a long plainTest!" +
77    "This is a long plainTest! This is a long plainTest! This is a long plainTest! This is a long plainTest!" +
78    "This is a long plainTest! This is a long plainTest! This is a long plainTest! This is a long plainTest!" +
79    "This is a long plainTest! This is a long plainTest! This is a long plainTest! This is a long plainTest!" +
80    "This is a long plainTest! This is a long plainTest! This is a long plainTest! This is a long plainTest!";
81  let keyGenAlg = "RSA1024";
82  let generator = cryptoFramework.createAsyKeyGenerator(keyGenAlg);
83  let keyPair = await generator.generateKeyPair();
84  let messageData = new Uint8Array(buffer.from(message, 'utf-8').buffer);
85  let signData = await signMessageBySegment(keyPair.priKey, messageData);
86  let verifyResult = await verifyMessagBySegment(keyPair.pubKey, messageData, signData);
87  if (verifyResult == true) {
88    console.info('verify success');
89  } else {
90    console.error('verify failed');
91  }
92}
93```
94