harmony 鸿蒙指定二进制数据转换非对称密钥对(ArkTS)

  • 2025-06-16
  • 浏览 (3)

指定二进制数据转换非对称密钥对(ArkTS)

以RSA、ECC、SM2为例,根据指定的非对称密钥二进制数据,生成非对称密钥对(KeyPair),即将外部或存储的二进制数据转换为算法库的密钥对象,该对象可用于后续的加解密等操作。

说明:

针对非对称密钥的convertKey操作:

  • 公钥需满足:ASN.1语法、X.509规范、DER编码格式。

  • 私钥需满足:ASN.1语法、PKCS#8规范、DER编码格式。

指定二进制数据转换RSA密钥对

对应的算法规格请查看非对称密钥生成和转换规格:RSA

  1. 获取RSA公钥或私钥二进制数据,封装成DataBlob对象。

公钥和私钥可单独传入,此处示例传入公钥。

  1. 调用cryptoFramework.createAsyKeyGenerator,指定字符串参数’RSA1024’,创建RSA密钥类型为RSA1024、素数个数为2的非对称密钥生成器(AsyKeyGenerator)。

生成RSA非对称密钥时,默认素数为2,此处省略了参数PRIMES_2。

  1. 调用AsyKeyGenerator.convertKey,传入二进制密钥数据,生成非对称密钥对象(KeyPair)。即将外部或存储的二进制数据转换为算法库的密钥对象,该对象可用于后续的加解密等操作。

  2. 以使用callback方式生成RSA密钥对为例: “`ts import { cryptoFramework } from ‘@kit.CryptoArchitectureKit’;

function convertAsyKey() { let rsaGenerator = cryptoFramework.createAsyKeyGenerator(‘RSA1024’); let pkVal = new Uint8Array([48, 129, 159, 48, 13, 6, 9, 42, 134, 72, 134, 247, 13, 1, 1, 1, 5, 0, 3, 129, 141, 0, 48, 129, 137, 2, 129, 129, 0, 174, 203, 113, 83, 113, 3, 143, 213, 194, 79, 91, 9, 51, 142, 87, 45, 97, 65, 136, 24, 166, 35, 5, 179, 42, 47, 212, 79, 111, 74, 134, 120, 73, 67, 21, 19, 235, 80, 46, 152, 209, 133, 232, 87, 192, 140, 18, 206, 27, 106, 106, 169, 106, 46, 135, 111, 118, 32, 129, 27, 89, 255, 183, 116, 247, 38, 12, 7, 238, 77, 151, 167, 6, 102, 153, 126, 66, 28, 253, 253, 216, 64, 20, 138, 117, 72, 15, 216, 178, 37, 208, 179, 63, 204, 39, 94, 244, 170, 48, 190, 21, 11, 73, 169, 156, 104, 193, 3, 17, 100, 28, 60, 50, 92, 235, 218, 57, 73, 119, 19, 101, 164, 192, 161, 197, 106, 105, 73, 2, 3, 1, 0, 1]); let pkBlob: cryptoFramework.DataBlob = { data: pkVal }; rsaGenerator.convertKey(pkBlob, null, (err, keyPair) => { if (err) { console.error(convertKey failed, ${err.code}, ${err.message}); return; } console.info(‘convertKey success’); }); }


- 同步返回结果(调用方法[convertKeySync](../../reference/apis-crypto-architecture-kit/js-apis-cryptoFramework.md#convertkeysync12)):
  ```ts
  import { cryptoFramework } from '@kit.CryptoArchitectureKit';

  function convertAsyKeySync() {
    let rsaGenerator = cryptoFramework.createAsyKeyGenerator('RSA1024');
    let pkVal = new Uint8Array([48, 129, 159, 48, 13, 6, 9, 42, 134, 72, 134, 247, 13, 1, 1, 1, 5, 0, 3, 129, 141, 0, 48, 129, 137, 2, 129, 129, 0, 174, 203, 113, 83, 113, 3, 143, 213, 194, 79, 91, 9, 51, 142, 87, 45, 97, 65, 136, 24, 166, 35, 5, 179, 42, 47, 212, 79, 111, 74, 134, 120, 73, 67, 21, 19, 235, 80, 46, 152, 209, 133, 232, 87, 192, 140, 18, 206, 27, 106, 106, 169, 106, 46, 135, 111, 118, 32, 129, 27, 89, 255, 183, 116, 247, 38, 12, 7, 238, 77, 151, 167, 6, 102, 153, 126, 66, 28, 253, 253, 216, 64, 20, 138, 117, 72, 15, 216, 178, 37, 208, 179, 63, 204, 39, 94, 244, 170, 48, 190, 21, 11, 73, 169, 156, 104, 193, 3, 17, 100, 28, 60, 50, 92, 235, 218, 57, 73, 119, 19, 101, 164, 192, 161, 197, 106, 105, 73, 2, 3, 1, 0, 1]);
    let pkBlob: cryptoFramework.DataBlob = { data: pkVal };
    try {
      let keyPair = rsaGenerator.convertKeySync(pkBlob, null);
      if (keyPair !== null) {
        console.info('convertKeySync success');
      }
    } catch (e) {
      console.error(`get key pair failed, ${e.code}, ${e.message}`);
    }
  }

指定二进制数据转换ECC密钥对

查看非对称密钥生成和转换规格:ECC

  1. 获取ECC公钥或私钥二进制数据,封装成DataBlob对象。

公钥和私钥可只传入其中一个,此处示例以传入公钥、私钥为例。

  1. 调用cryptoFramework.createAsyKeyGenerator,指定字符串参数’ECC256’,创建密钥算法为ECC、密钥长度为256位的非对称密钥生成器(AsyKeyGenerator)。

  2. 调用AsyKeyGenerator.convertKey,传入公钥二进制和私钥二进制,生成非对称密钥对象(KeyPair)。

  3. 使用callback方式生成ECC密钥对: “`ts import { cryptoFramework } from ‘@kit.CryptoArchitectureKit’;

function convertEccAsyKey() { let pubKeyArray = new Uint8Array([48, 89, 48, 19, 6, 7, 42, 134, 72, 206, 61, 2, 1, 6, 8, 42, 134, 72, 206, 61, 3, 1, 7, 3, 66, 0, 4, 83, 96, 142, 9, 86, 214, 126, 106, 247, 233, 92, 125, 4, 128, 138, 105, 246, 162, 215, 71, 81, 58, 202, 121, 26, 105, 211, 55, 130, 45, 236, 143, 55, 16, 248, 75, 167, 160, 167, 106, 2, 152, 243, 44, 68, 66, 0, 167, 99, 92, 235, 215, 159, 239, 28, 106, 124, 171, 34, 145, 124, 174, 57, 92]); let priKeyArray = new Uint8Array([48, 49, 2, 1, 1, 4, 32, 115, 56, 137, 35, 207, 0, 60, 191, 90, 61, 136, 105, 210, 16, 27, 4, 171, 57, 10, 61, 123, 40, 189, 28, 34, 207, 236, 22, 45, 223, 10, 189, 160, 10, 6, 8, 42, 134, 72, 206, 61, 3, 1, 7]); let pubKeyBlob: cryptoFramework.DataBlob = { data: pubKeyArray }; let priKeyBlob: cryptoFramework.DataBlob = { data: priKeyArray }; let generator = cryptoFramework.createAsyKeyGenerator(‘ECC256’); generator.convertKey(pubKeyBlob, priKeyBlob, (error, data) => { if (error) { console.error(convertKey failed, ${error.code}, ${error.message}); return; } console.info(‘convertKey success’); }); }


- 同步返回结果(调用[convertKeySync](../../reference/apis-crypto-architecture-kit/js-apis-cryptoFramework.md#convertkeysync12)):
  ```ts
  import { cryptoFramework } from '@kit.CryptoArchitectureKit';

  function convertECCAsyKeySync() {
    let pubKeyArray = new Uint8Array([48, 89, 48, 19, 6, 7, 42, 134, 72, 206, 61, 2, 1, 6, 8, 42, 134, 72, 206, 61, 3, 1, 7, 3, 66, 0, 4, 83, 96, 142, 9, 86, 214, 126, 106, 247, 233, 92, 125, 4, 128, 138, 105, 246, 162, 215, 71, 81, 58, 202, 121, 26, 105, 211, 55, 130, 45, 236, 143, 55, 16, 248, 75, 167, 160, 167, 106, 2, 152, 243, 44, 68, 66, 0, 167, 99, 92, 235, 215, 159, 239, 28, 106, 124, 171, 34, 145, 124, 174, 57, 92]);
    let priKeyArray = new Uint8Array([48, 49, 2, 1, 1, 4, 32, 115, 56, 137, 35, 207, 0, 60, 191, 90, 61, 136, 105, 210, 16, 27, 4, 171, 57, 10, 61, 123, 40, 189, 28, 34, 207, 236, 22, 45, 223, 10, 189, 160, 10, 6, 8, 42, 134, 72, 206, 61, 3, 1, 7]);
    let pubKeyBlob: cryptoFramework.DataBlob = { data: pubKeyArray };
    let priKeyBlob: cryptoFramework.DataBlob = { data: priKeyArray };
    let generator = cryptoFramework.createAsyKeyGenerator('ECC256');
    try {
      let keyPair = generator.convertKeySync(pubKeyBlob, priKeyBlob);
      if (keyPair !== null) {
        console.info('convertKeySync success');
      }
    } catch (e) {
      console.error(`get key pair failed, ${e.code}, ${e.message}`);
    }
  }

指定PKCS8二进制数据转换ECC私钥

查看非对称密钥生成和转换规格:ECC

获取ECC公钥或私钥二进制数据,封装成DataBlob对象再转为ECC密钥格式。示例如下:

  1. 调用cryptoFramework.createAsyKeyGenerator,指定字符串参数’ECC256’,创建密钥算法为ECC、密钥长度为256位的非对称密钥生成器(AsyKeyGenerator)。

  2. 调用PubKey.getEncoded获取公钥数据字节流,调用PriKey.getEncodeDer 并设置参数为’PKCS8’,获取私钥数据的字节流。由此分别获取密钥对象的二进制数据。

  3. 调用AsyKeyGenerator.convertKey,将生成的二进制密钥数据转为非对称密钥对象(KeyPair)。

  import { cryptoFramework } from '@kit.CryptoArchitectureKit';

  async function main() {
    // 创建一个AsyKeyGenerator实例。
    let eccGenerator = cryptoFramework.createAsyKeyGenerator('ECC256');
    // 使用密钥生成器随机生成非对称密钥对。
    let keyGenPromise = eccGenerator.generateKeyPair();
    keyGenPromise.then(keyPair => {
      let pubKey = keyPair.pubKey;
      let priKey = keyPair.priKey;
      // 获取非对称密钥对ECC的二进制数据。
      let pubBlob = pubKey.getEncoded();
      let skBlob = priKey.getEncodedDer('PKCS8');
      let generator = cryptoFramework.createAsyKeyGenerator('ECC256');
      generator.convertKey(pubBlob, skBlob, (error, data) => {
        if (error) {
          console.error(`convertKey failed, ${error.code}, ${error.message}`);
          return;
        }
        console.info('convertKey success');
      });
    });
  }

指定二进制数据转换SM2密钥对

查看非对称密钥生成和转换规格:SM2

  1. 获获取SM2公钥或私钥的二进制数据,封装成DataBlob对象。

公钥和私钥可只传入其中一个,示例以传入公钥、私钥为例。

  1. 调用cryptoFramework.createAsyKeyGenerator,指定字符串参数’SM2_256’,创建密钥算法为SM2、密钥长度为256位的非对称密钥生成器(AsyKeyGenerator)。

  2. 调用AsyKeyGenerator.convertKey,传入公钥和私钥的二进制数据,生成非对称密钥对象(KeyPair)。

  3. 以使用callback方式生成SM2密钥对为例: “`ts import { cryptoFramework } from ‘@kit.CryptoArchitectureKit’;

function convertSM2AsyKey() { let pubKeyArray = new Uint8Array([48, 89, 48, 19, 6, 7, 42, 134, 72, 206, 61, 2, 1, 6, 8, 42, 129, 28, 207, 85, 1, 130, 45, 3, 66, 0, 4, 90, 3, 58, 157, 190, 248, 76, 7, 132, 200, 151, 208, 112, 230, 96, 140, 90, 238, 211, 155, 128, 109, 248, 40, 83, 214, 78, 42, 104, 106, 55, 148, 249, 35, 61, 32, 221, 135, 143, 100, 45, 97, 194, 176, 52, 73, 136, 174, 40, 70, 70, 34, 103, 103, 161, 99, 27, 187, 13, 187, 109, 244, 13, 7]); let priKeyArray = new Uint8Array([48, 49, 2, 1, 1, 4, 32, 54, 41, 239, 240, 63, 188, 134, 113, 31, 102, 149, 203, 245, 89, 15, 15, 47, 202, 170, 60, 38, 154, 28, 169, 189, 100, 251, 76, 112, 223, 156, 159, 160, 10, 6, 8, 42, 129, 28, 207, 85, 1, 130, 45]); let pubKeyBlob: cryptoFramework.DataBlob = { data: pubKeyArray }; let priKeyBlob: cryptoFramework.DataBlob = { data: priKeyArray }; let generator = cryptoFramework.createAsyKeyGenerator(‘SM2_256’); generator.convertKey(pubKeyBlob, priKeyBlob, (error, data) => { if (error) { console.error(convertKey failed, ${error.code}, ${error.message}); return; } console.info(‘convertKey success’); }); }


- 同步返回结果(调用方法[convertKeySync](../../reference/apis-crypto-architecture-kit/js-apis-cryptoFramework.md#convertkeysync12)):
  ```ts
  import { cryptoFramework } from '@kit.CryptoArchitectureKit';

  function convertSM2AsyKeySync() {
    let pubKeyArray = new Uint8Array([48, 89, 48, 19, 6, 7, 42, 134, 72, 206, 61, 2, 1, 6, 8, 42, 129, 28, 207, 85, 1, 130, 45, 3, 66, 0, 4, 90, 3, 58, 157, 190, 248, 76, 7, 132, 200, 151, 208, 112, 230, 96, 140, 90, 238, 211, 155, 128, 109, 248, 40, 83, 214, 78, 42, 104, 106, 55, 148, 249, 35, 61, 32, 221, 135, 143, 100, 45, 97, 194, 176, 52, 73, 136, 174, 40, 70, 70, 34, 103, 103, 161, 99, 27, 187, 13, 187, 109, 244, 13, 7]);
    let priKeyArray = new Uint8Array([48, 49, 2, 1, 1, 4, 32, 54, 41, 239, 240, 63, 188, 134, 113, 31, 102, 149, 203, 245, 89, 15, 15, 47, 202, 170, 60, 38, 154, 28, 169, 189, 100, 251, 76, 112, 223, 156, 159, 160, 10, 6, 8, 42, 129, 28, 207, 85, 1, 130, 45]);
    let pubKeyBlob: cryptoFramework.DataBlob = { data: pubKeyArray };
    let priKeyBlob: cryptoFramework.DataBlob = { data: priKeyArray };
    let generator = cryptoFramework.createAsyKeyGenerator('SM2_256');
    try {
      let keyPair = generator.convertKeySync(pubKeyBlob, priKeyBlob);
      if (keyPair !== null) {
        console.info('convertKeySync success');
      }
    } catch (e) {
      console.error(`get key pair failed, ${e.code}, ${e.message}`);
    }
  }

你可能感兴趣的鸿蒙文章

harmony 鸿蒙Crypto Architecture Kit(加解密算法框架服务)

harmony 鸿蒙使用3DES对称密钥(ECB模式)加解密(C/C++)

harmony 鸿蒙使用3DES对称密钥(ECB模式)加解密(ArkTS)

harmony 鸿蒙使用AES对称密钥(CBC模式)加解密(C/C++)

harmony 鸿蒙使用AES对称密钥(CBC模式)加解密(ArkTS)

harmony 鸿蒙使用AES对称密钥(CCM模式)加解密(C/C++)

harmony 鸿蒙使用AES对称密钥(CCM模式)加解密(ArkTS)

harmony 鸿蒙使用AES对称密钥(ECB模式)加解密(C/C++)

harmony 鸿蒙使用AES对称密钥(ECB模式)加解密(ArkTS)

harmony 鸿蒙使用AES对称密钥(GCM模式)分段加解密(C/C++)

0  赞