2009-06-01 23 views
4

加密新手在這裏...我試圖用下面的代碼使用BouncyCastle進行128位加密。在BouncyCastle中使用「強大的」JRE策略文件

import java.io.BufferedOutputStream; 
import java.io.FileInputStream; 
import java.io.FileOutputStream; 
import java.io.InputStream; 
import java.io.OutputStream; 
import java.security.KeyStore; 
import java.security.Security; 
import java.security.cert.X509Certificate; 

import org.apache.commons.io.IOUtils; 
import org.bouncycastle.cms.CMSEnvelopedDataGenerator; 
import org.bouncycastle.cms.CMSEnvelopedDataStreamGenerator; 
import org.bouncycastle.jce.provider.BouncyCastleProvider; 

public class Test { 
     public static void main(String[] args) throws Throwable { 
       Security.addProvider(new BouncyCastleProvider()); 

       KeyStore keyStore = KeyStore.getInstance("PKCS12"); 

       FileInputStream keyStoreFile = new FileInputStream("test.p12"); 

       try { 
         keyStore.load(keyStoreFile, "test12".toCharArray()); 
       } finally { 
         keyStoreFile.close(); 
       } 

       X509Certificate certificate = (X509Certificate) keyStore 
           .getCertificate(keyStore.aliases().nextElement()); 

       OutputStream output = new BufferedOutputStream(new FileOutputStream(
           "test.out")); 

       try { 
         InputStream input = new FileInputStream("test.in"); 

         try { 
           CMSEnvelopedDataStreamGenerator generator = new CMSEnvelopedDataStreamGenerator(); 

           generator.addKeyTransRecipient(certificate); 

           OutputStream encryptedOutput = generator.open(output, 
               CMSEnvelopedDataGenerator.AES128_WRAP, 128, 
               BouncyCastleProvider.PROVIDER_NAME); 

           try { 
             IOUtils.copy(input, encryptedOutput); 
           } finally { 
             encryptedOutput.close(); 
           } 
         } finally { 
           input.close(); 
         } 
       } finally { 
         output.close(); 
       } 
     } 
} 

但我得到這個錯誤:

Exception in thread "main" org.bouncycastle.cms.CMSException: key inappropriate for algorithm. 
     at org.bouncycastle.cms.CMSEnvelopedDataStreamGenerator.open(Unknown Source) 
     at org.bouncycastle.cms.CMSEnvelopedDataStreamGenerator.open(Unknown Source) 
     at org.bouncycastle.cms.CMSEnvelopedDataStreamGenerator.open(Unknown Source) 
     at hk.gov.gld.etb.uploading.pkcs7.Test.main(Test.java:45) 
Caused by: java.security.InvalidKeyException: Illegal key size or default parameters 
     at javax.crypto.Cipher.a(DashoA13*..) 
     at javax.crypto.Cipher.init(DashoA13*..) 
     at org.bouncycastle.cms.CMSEnvelopedGenerator$RecipientInf.toRecipientInfo(Unknown Source) 
     ... 4 more 

我使用的證書是使用JDK的keytool程序產生如下:

keytool -genkeypair -dname "cn=test" -alias test -keystore test.p12 -storepass test12 -validity 180 -storetype pkcs12 -keyalg rsa 

我使用的JDK版本6,我用的BouncyCastle版本是141.

我是否正確的做法?我是否仍然需要安裝無限強度策略文件來執行128位加密?

幫助非常感謝。

謝謝!

回答

3

似乎BouncyCastle庫的141版有一個錯誤。當我升級到最新版本(143)時,完全相同的代碼工作。

2

我相信 - 你需要US_export_policy.jar和local_policy.jar。我們需要在我們的項目中做同樣的事情,並且解決了這個問題。

我認爲你的密鑰生成和使用應該沒問題,否則。將這兩個罐子添加到jre/lib/security中,這會讓你立即解決問題。

+0

是否有其他PKCS7提供程序不這樣做?如果我沒有弄錯,這是一個錯誤,對嗎? – 2009-06-01 06:05:37