【问题标题】:java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: invalid key formatjava.security.spec.InvalidKeySpecException:java.security.InvalidKeyException:无效的密钥格式
【发布时间】:2021-03-26 03:48:46
【问题描述】:

我正在尝试获取 RSA PublicKey 以在 Java 中进行 jwt 令牌验证,但我的尝试因以下异常而失败: java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: 无效的密钥格式.

我的代码:

    String publicKeyString = "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";
    PublicKey publicKey = getPublicKey(Base64.getDecoder().decode(publicKeyString), "RSA");

还有getPublicKey函数:

private static PublicKey getPublicKey(byte[] keyBytes, String algorithm) {
    PublicKey publicKey = null;
    try {
        KeyFactory kf = KeyFactory.getInstance(algorithm);
        EncodedKeySpec keySpec = new X509EncodedKeySpec(keyBytes);
        System.out.println(keySpec.getFormat());

        publicKey = kf.generatePublic(keySpec);
    } catch (NoSuchAlgorithmException e) {
        System.out.println("Could not reconstruct the public key, the given algorithm could not be found.");
    } catch (InvalidKeySpecException e) {
        e.printStackTrace();
        System.out.println("Could not reconstruct the public key");
    }

    return publicKey;
}

我知道有许多类似的问题处理相同的异常被抛出,我已经阅读了许多问题并尝试了解决方案,但没有任何效果。我将不胜感激。

【问题讨论】:

    标签: java rsa public-key


    【解决方案1】:

    您的数据不是实际 X.509 公钥块 (SubjectPublicKeyInfo) as required by Java crypto 的 base64 编码。它实际上是 PEM 文件的 base64 编码,它本身就是结构化和编码的。此外,这个 PEM 文件被标记为包含“RSA PUBLIC KEY”,这将是“原始”PKCS1 形式,对于 Java 来说是错误的,但幸运的是,创建这个 PEM 文件的任何东西都是有缺陷的,而且 PEM 文件的主体实际上是一个 X.509 SubjectPublicKeyInfo,它应该有 PEM 标签'PUBLIC KEY'per RFC7468 #13。 (RFC5280 是 X.509 的配置文件。)

    因此您需要将字符串解码为 PEM,然后解析 PEM 以获得 X.509:

            String orig = "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";
    
            String pem = new String(Base64.getDecoder().decode(orig)); // default cs okay for PEM
            String[] lines = pem.split("\n"); lines[0] = lines[lines.length-1] = ""; String body = String.join("", lines);
            // in general split on "\r?\n" (or delete "\r" and split on "\n")
            //or instead:
            //String body = pem.replaceAll("-----(BEGIN|END) RSA PUBLIC KEY-----\n","").replaceAll("\n", ""); // or "\r?\n"
            
            KeyFactory kf = KeyFactory.getInstance("RSA");
            PublicKey key = kf.generatePublic(new X509EncodedKeySpec(Base64.getDecoder().decode(body)));
            // for test only:
            System.out.println ( ((java.security.interfaces.RSAPublicKey)key).getModulus() );
    

    请注意,您的特定数据具有使用单字符(NL aka \n)换行符的 PEM,但 PEM 通常可以使用 NL 或 CRLF(\r\n);看我的cmets。

    【讨论】:

      猜你喜欢
      • 2023-03-20
      • 1970-01-01
      • 1970-01-01
      • 1970-01-01
      • 2019-04-12
      • 2021-04-24
      • 2010-11-06
      • 1970-01-01
      相关资源
      最近更新 更多