PHP生成公钥私钥,加密解密,签名验签

coding

test_encry.php

<?php

//创建私钥,公钥

//create_key();

//要加密内容

$str = "test_str";

//加密

$encrypt_str = test_encrypt($str);

//解密

$decrypt_str = test_decrypt($encrypt_str);

//echo $decrypt_str;exit;

//签名

$sign_str = sign ( $decrypt_str );

// echo $sign_str;exit;

//验签

$res = verify ( $decrypt_str, $sign_str );

var_dump ( $res );

exit ();

//创建秘钥对

function create_key(){

//配置信息

//配置需要用到环境配置文件 openssl.cnf,这里文件地址如下

$config_path = "D:\ApacheServer\Apache\conf\openssl.cnf";

$config = array(

"digest_alg" => "sha512",

"private_key_bits" => 4096, // 字节数 512 1024 2048 4096 等 ,不能加引号,此处长度与加密的字符串长度有关系

"private_key_type" => OPENSSL_KEYTYPE_RSA, // 加密类型

'config' => $config_path

);

$new_key = openssl_pkey_new($config);

if ( $new_key == false ){

returnfalse;

}

//提取私钥

//$private_key 这里作为引用变量

openssl_pkey_export($new_key, $private_key, null, $config);

//生成公钥

$public_key = openssl_pkey_get_details($new_key);

// var_dump($public_key);

$public_key = $public_key["key"];

//显示数据

//var_dump($public_key); //公钥

//var_dump($private_key); //私钥

file_put_contents("./testpublic.pem", $public_key);

file_put_contents("./testprivate.pem", $private_key);

openssl_free_key($new_key);

}

// 数据接收方创建一套密钥对,把公钥给发送方(一或多个发送方),发送方用公钥加密数据,发给接收方,接收方用私钥解密获取数据

// 接受方的密钥对

/**

公钥加密

@param $str 要加密的明文

*/

function test_encrypt($str) {

$cert_file = "./testpublic.pem";

// 读取公钥内容

$public_key = file_get_contents ( $cert_file );

// 转成openssl对象

$public_key = openssl_get_publickey ( $public_key );

// 进行加密,$encrypt_str 为引用变量

openssl_public_encrypt ( $str, $encrypt_str, $public_key );

// base64转码

$encrypt_str = base64_encode ( $encrypt_str );

return$encrypt_str;

}

/**

私钥解密

@param $encrypt_str 要解密的密文

*/

function test_decrypt($encrypt_str) {

$cert_file = "./testprivate.pem";

// 读取私钥内容

$private_key = file_get_contents ( $cert_file );

// 转成openssl对象

$private_key = openssl_get_privatekey ( $private_key );

// base64解码

$encrypt_str = base64_decode ( $encrypt_str );

openssl_private_decrypt ( $encrypt_str, $decrypt_str, $private_key );

return$decrypt_str;

}

// 数据发送方创建一套密钥对,把公钥给接收方,发送方用私钥签名数据,发给接收方。接收方将“解密后的明文、收到的签名、发送方生成的公钥”三个数据一起来验签,验证通过则表示发送方是真实有效的(签名就是为排除冒充发送方发信息的行为)

// 发送方的密钥对(这里为方便,用同一套密钥对)

/**

私钥签名

@param $plain 要签名的明文

*/

function sign($plain) {

// $log = new Logger();

try {

// 用户私钥证书

$cert_file = "./testprivate.pem";

$priv_key = file_get_contents ( $cert_file );

$pkeyid = openssl_get_privatekey ( $priv_key );

if (! is_resource ( $pkeyid )) {

returnFALSE;

}

// compute signature

openssl_sign ( $plain, $signature, $pkeyid, OPENSSL_ALGO_SHA256 );

// free the key from memory

openssl_free_key ( $pkeyid );

// $log->logInfo("Signature string for:".$signature);

returnbase64_encode ( $signature );

} catch ( Exception$e ) {

// $log->logInfo("Signature attestation failure".$e->getMessage());

}

}

/**

公钥验签

@param $plain 验签明文

@param $signature 验签密文

*/

function verify($plain, $signature) {

$cert_file = "./testpublic.pem";

$signature = base64_decode ( $signature );

$cert = file_get_contents ( $cert_file );

$pubkeyid = openssl_get_publickey ( $cert );

if (! is_resource ( $pubkeyid )) {

returnFALSE;

}

$ok = openssl_verify ( $plain, $signature, $pubkeyid, OPENSSL_ALGO_SHA256 );

@openssl_free_key ( $pubkeyid );

if ($ok == 1) {

returnTRUE;

} elseif ($ok == 0) {

returnFALSE;

} else {

returnFALSE;

}

returnFALSE;

}

testprivate.pem

-----BEGIN PRIVATEKEY-----

MIIJQgIBADANBgkqhkiG9w0BAQEFAASCCSwwggkoAgEAAoICAQDI7ysitVvgmHod

BwccHcgbaKANaDyMXJ30wkJRcaygZohZJkMlExsz9lPtlPUMrkH+QkJSzzIP9Nr2

46LCKG5xDzRBzJbgcdsqjQk4sdSDGdiqOyIloHvYkQQvFRcStGjrIGswiU3NXvU3

kRG1ep1DvbsYTKYpkWkMxj9UJhgdkhoGgWgV6ijsbKiS2q6hcjfyh1A4fL9IT+Ge

5zewuzzY6HFCoWnJ40EsC6AbxqpK+JL78pmG6K8KFNF3mu98IgH8ziNn15qvGjRO

FLysyTynMf42uKJNzZVN/keo3kxesNZDn/W3D+QiWyZCigkZZ9TAVsfzYNFfcYRH

3GZgZ3LgzjwX7heQUUMnDy8lHaK9yhodW30d7fDt5veghojWYkkVlrag50PJyJqs

U6TihB/tqtFeFChIBhcHYSZ/Z5ISlCUJl3geB5uuUJRfusjRpdVsB4RzyaWziXXp

d4Gbl3LoRPBo7ehzvt+4pnqkRPZigYKuaXF5q7KQ0OtRhtuGj56VHizXqv8TAcsU

+xGMxeFoDR0mwpPkJ/G3bawuEPAlrBdDyzDWltE3wU6GeHsh6KCOBBv4XjkkZk/L

sm3q4QAFZm31gL7dJzC4UiPHf264GG35Xgdso9OJlIhlihNwo4yZCtP/yuykXwwj

yjSOT7s9JrFLwjn/j8rE0rmWp/p1nwIDAQABAoICAGaWVXufBI2iy5XOZL7iJax4

ul6d/WvcTXkNRTa3xt8N+kcp1dYz7wuUlD0UdBhJT8A0rBADYRfsd27dwddHNTvb

+14syktFVhRfdXnQsSNOKuSe1ExJp3FmeLBhICqYmYiSQKfDMknMVX5NPrFdLLXN

RJyfZaaLawrunJ6l5GIUmd0AbNfjeYlb4KU5qTccTZwxoa91YWPWBOdQPYqpzeMg

qdLO/mfo8vk95jzILWGhj8m6js/mNJf9EQTzwZmq80DTLhhyZ7NGubWzuLCu/ZyP

Va8yjQsUD0qGrKd2957QwlQ8cwNHxb4Us2/9ca/a5zBcHjIQGFWWa2cVC9/kcS2V

6YP7wg0mS4s1VHh3CM+i9p3DvsPCpTIu9Kvv7fPZGuLqeUwWVcGx39w7B7QOqS/j

+0sgcndwl0OO2hoLvprav75Pvk+aIQKccDc1P8c8auCTblp1dSZ0WRDCGH9JZaYp

mUMvNllWIkiZU+eye8mL824zC3XcqjTNJOT2+JEregy5aDYnxxABFWre7gXYbtXL

8KGfS+qJuD/Eqryg9b/IEuJpTUn432vjEmnfSEXRAf6W3Bn5VeSDp80VtYRUcg9j

MNCtf/Yap9wB0dMG4SJT66tVpd4h6cMVty9/IS9Klnewb6gEhLaK0utTfujOQ6kI

n5W1qoIImiLnlbK4Ac3BAoIBAQDqAGMbE1IV6G7P67hWYLz1nPAwjpG2dj+fXcRm

7qFzwYoXU3bXH9Fcf6EtxK6jZYX1J2hxVD2gv9Gqnv8zdM1v47if5xb3HMpYz6ah

LjW+6lu+D+dLBdmtKYGpAnvNqB8+1JviqbF/QDMH5RLZ9wFwqTErafEE4Cq/C1R3

kCaIY/5KC+pjJE7IIp7nYBpwH26tDVGUw873LysOzLLEu3Cyt1jn90nIVw6HzISL

ORIPIwiiTn3+Je9M0ucxb6gbJixsKQr2tjY1nlHD9DFPFQKbdgmB0NiDV325VAJE

bTZaeHyHyzgl1lzLHTD1V5NxCrtJvjw4640YAzNx08ltMZoJAoIBAQDb0vdJKXND

8t6tvsZUHe6ACT54qUPEVzw/xnU6rBS+bhzyVU/UsapTD1Y6MnjurIWpZedYmiOm

sIKicMk1uzn9096LMavkg3Hdu9HwY3UYU7h/cso5R4eGbZogIz3D8I24OgA1rkZE

66Sfvksx3UlRwKc2LqNtzoA12hiyJ9fXZrfaq6/7RlcXXvtqJEvgwSlPXT+HAsdx

zVcNS4C3g8/UibvZKJINyRzfTRYkkrmRY7HP5OoBsbhwVrlfJ/0akwgosYecPPT2

i5YR85D7GUdmB/LJv/2uRbeT4XFFVow2nG73dK9f8ppVdcWkVtdz0Vm1d0gNRJhU

3APSvSRv6JxnAoIBAGYOayr43zks2X+XWBtcL62Tl/IljAmfQxpXg/w8oW/h/j80

KMWkW+RSydIzUNN0yNrmKBgdXI+KeYBHvhgMHjlpgTFEUXDPPrVDQ3JSvCAbCI45

U3AWCh0K2EEFE0fbxlzZz28pAX/1WQxdbT5hC2C+efJsTzEIL7yIzXskBJpBujtD

PSOmRzHkX5ecA4vZOaUCBQ2z5MVL7iSTRHinI3zemEj7QlO9HFo/6aLq7iRp7C8V

ur+ofdjstuaJwzCsEn3N3LlDORtjhFfJXeQWzr9M2NKkannGI9A7go2jcCw/FlkH

WeKuvmPbxGmMm4KW4p5D+PH+UdgiNUK00snr8zkCggEBAIf50KM986H1as74sj+4

IB6tGSqUMWoTOB6PCVbYuSAuhtNT+ESt/ZjRZNos/GdO6oMlmNxSxHjIuJX4xE3r

WWzskL1zZUu+D0JEexGCxBzfNMIJZJPX7jo2M99rTTqV42Qw5I5QFgFt7fAuSt82

bbMXQ5edc9Rppx8ooJwbT0VbsaCfEQWSti6rv0Mh3pnRglcobDJ8gpiflxiPOrjJ

3VYwOLWUhfvnCmgKjAblh8oqbAQYKrQPlfJPgu0clFDK4IIjhqobfr+/Cn5iNq1M

LsEra4BmtWoGkA72phVo+uSREYcac50bOWJhrncAjNeEiURZ24TxiHT9f5PtEcvz

jEMCggEAHsyUceW0TEz5dHP/kTuxuGy7tn3mtvr+bAfQH7g3E7PYvN0P58iJHASi

VCCuzMApmHeKfErLt2Up2/1527HDonAJJ9X50M5pZvvrIzAKFZmk/s00XpzPSCwX

vcKN55kAgHrlj5P76xQ91EdZMqPoLNFRIuIT4wEPUqngFtvGNljuRHWjQkTa2So3

BlI0LJUxajbVANcRdyGcKy6KjsVj0lrYRiZXsH/FQqX4EfscnljqEtB43bKQTAQo

M4pBbJ17bq5B3hp4IIGlyKQDyXO68Y7KX5vlLkc2uunc9P/HeWUhMWXWnbccsA8U

0S0WEmpb0TnqG+rz/3OOS5J0DaHv9Q==

-----ENDPRIVATEKEY-----

testpublic.pem

-----BEGIN PUBLICKEY-----

MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAyO8rIrVb4Jh6HQcHHB3I

G2igDWg8jFyd9MJCUXGsoGaIWSZDJRMbM/ZT7ZT1DK5B/kJCUs8yD/Ta9uOiwihu

cQ80QcyW4HHbKo0JOLHUgxnYqjsiJaB72JEELxUXErRo6yBrMIlNzV71N5ERtXqd

Q727GEymKZFpDMY/VCYYHZIaBoFoFeoo7GyoktquoXI38odQOHy/SE/hnuc3sLs8

2OhxQqFpyeNBLAugG8aqSviS+/KZhuivChTRd5rvfCIB/M4jZ9earxo0ThS8rMk8

pzH+NriiTc2VTf5HqN5MXrDWQ5/1tw/kIlsmQooJGWfUwFbH82DRX3GER9xmYGdy

4M48F+4XkFFDJw8vJR2ivcoaHVt9He3w7eb3oIaI1mJJFZa2oOdDyciarFOk4oQf

7arRXhQoSAYXB2Emf2eSEpQlCZd4HgebrlCUX7rI0aXVbAeEc8mls4l16XeBm5dy

6ETwaO3oc77fuKZ6pET2YoGCrmlxeauykNDrUYbbho+elR4s16r/EwHLFPsRjMXh

aA0dJsKT5Cfxt22sLhDwJawXQ8sw1pbRN8FOhnh7IeigjgQb+F45JGZPy7Jt6uEA

BWZt9YC+3ScwuFIjx39uuBht+V4HbKPTiZSIZYoTcKOMmQrT/8rspF8MI8o0jk+7

PSaxS8I5/4/KxNK5lqf6dZ8CAwEAAQ==

-----ENDPUBLICKEY-----

openssl.cnf

#

# OpenSSL example configuration file.

# This is mostly being used for generation of certificate requests.

#

# This definition stops the following lines choking if HOME isn't

# defined.

HOME = .

RANDFILE = $ENV::HOME/.rnd

# Extra OBJECT IDENTIFIER info:

#oid_file = $ENV::HOME/.oid

oid_section = new_oids

# To use this configuration file with the "-extfile" option of the

# "openssl x509" utility, name here the section containing the

# X.509v3 extensions to use:

# extensions =

# (Alternatively, use a configuration file that has only

# X.509v3 extensions in its main [= default] section.)

[ new_oids ]

# We can add new OIDs in here for use by 'ca', 'req' and 'ts'.

# Add a simple OID like this:

# testoid1=1.2.3.4

# Or use config file substitution like this:

# testoid2=${testoid1}.5.6

# Policies used by the TSA examples.

tsa_policy1 = 1.2.3.4.1

tsa_policy2 = 1.2.3.4.5.6

tsa_policy3 = 1.2.3.4.5.7

####################################################################

[ ca ]

default_ca = CA_default # The default ca section

####################################################################

[ CA_default ]

dir = ./demoCA # Where everything is kept

certs = $dir/certs # Where the issued certs are kept

crl_dir = $dir/crl # Where the issued crl are kept

database = $dir/index.txt # database index file.

#unique_subject = no # Set to 'no' to allow creation of

# several ctificates with same subject.

new_certs_dir = $dir/newcerts # default place for new certs.

certificate = $dir/cacert.pem # The CA certificate

serial = $dir/serial # The current serial number

crlnumber = $dir/crlnumber # the current crl number

# must be commented out to leave a V1 CRL

crl = $dir/crl.pem # The current CRL

private_key = $dir/private/cakey.pem# The private key

RANDFILE = $dir/private/.rand# private random number file

x509_extensions = usr_cert # The extentions to add to the cert

# Comment out the following two lines for the "traditional"

# (and highly broken) format.

name_opt = ca_default # Subject Name options

cert_opt = ca_default # Certificate field options

# Extension copying option: use with caution.

# copy_extensions = copy

# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs

# so this is commented out by default to leave a V1 CRL.

# crlnumber must also be commented out to leave a V1 CRL.

# crl_extensions = crl_ext

default_days = 365 # how long to certify for

default_crl_days= 30 # how long before next CRL

default_md = default# use public key default MD

preserve = no # keep passed DN ordering

# A few difference way of specifying how similar the request should look

# For type CA, the listed attributes must be the same, and the optional

# and supplied fields are just that :-)

policy = policy_match

# For the CA policy

[ policy_match ]

countryName = match

stateOrProvinceName = match

organizationName = match

organizationalUnitName = optional

commonName = supplied

emailAddress = optional

# For the 'anything' policy

# At this point in time, you must list all acceptable 'object'

# types.

[ policy_anything ]

countryName = optional

stateOrProvinceName = optional

localityName = optional

organizationName = optional

organizationalUnitName = optional

commonName = supplied

emailAddress = optional

####################################################################

[ req ]

default_bits = 1024

default_keyfile = privkey.pem

distinguished_name = req_distinguished_name

attributes = req_attributes

x509_extensions = v3_ca # The extentions to add to the self signed cert

# Passwords for private keys if not present they will be prompted for

# input_password = secret

# output_password = secret

# This sets a mask for permitted string types. There are several options.

# default: PrintableString, T61String, BMPString.

# pkix : PrintableString, BMPString (PKIX recommendation before 2004)

# utf8only: only UTF8Strings (PKIX recommendation after 2004).

# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).

# MASK:XXXX a literal mask value.

# WARNING: ancient versions of Netscape crash on BMPStrings or UTF8Strings.

string_mask = utf8only

# req_extensions = v3_req # The extensions to add to a certificate request

[ req_distinguished_name ]

countryName = Country Name (2 letter code)

countryName_default = AU

countryName_min = 2

countryName_max = 2

stateOrProvinceName = State or Province Name (full name)

stateOrProvinceName_default = Some-State

localityName = Locality Name (eg, city)

0.organizationName = Organization Name (eg, company)

0.organizationName_default = Internet Widgits Pty Ltd

# we can do this but it is not needed normally :-)

#1.organizationName = Second Organization Name (eg, company)

#1.organizationName_default = World Wide Web Pty Ltd

organizationalUnitName = Organizational Unit Name (eg, section)

#organizationalUnitName_default =

commonName = Common Name (e.g. server FQDN or YOUR name)

commonName_max = 64

emailAddress = Email Address

emailAddress_max = 64

# SET-ex3 = SET extension number 3

[ req_attributes ]

challengePassword = A challenge password

challengePassword_min = 4

challengePassword_max = 20

unstructuredName = An optional company name

[ usr_cert ]

# These extensions are added when 'ca' signs a request.

# This goes against PKIX guidelines but some CAs do it and some software

# requires this to avoid interpreting an end user certificate as a CA.

basicConstraints=CA:FALSE

# Here are some examples of the usage of nsCertType. If it is omitted

# the certificate can be used for anything *except* object signing.

# This is OK for an SSL server.

# nsCertType = server

# For an object signing certificate this would be used.

# nsCertType = objsign

# For normal client use this is typical

# nsCertType = client, email

# and for everything including object signing:

# nsCertType = client, email, objsign

# This is typical in keyUsage for a client certificate.

# keyUsage = nonRepudiation, digitalSignature, keyEncipherment

# This will be displayed in Netscape's comment listbox.

nsComment = "OpenSSL Generated Certificate"

# PKIX recommendations harmless if included in all certificates.

subjectKeyIdentifier=hash

authorityKeyIdentifier=keyid,issuer

# This stuff is for subjectAltName and issuerAltname.

# Import the email address.

# subjectAltName=email:copy

# An alternative to produce certificates that aren't

# deprecated according to PKIX.

# subjectAltName=email:move

# Copy subject details

# issuerAltName=issuer:copy

#nsCaRevocationUrl = http://www.domain.dom/ca-crl.pem

#nsBaseUrl

#nsRevocationUrl

#nsRenewalUrl

#nsCaPolicyUrl

#nsSslServerName

# This is required for TSA certificates.

# extendedKeyUsage = critical,timeStamping

[ v3_req ]

# Extensions to add to a certificate request

basicConstraints = CA:FALSE

keyUsage = nonRepudiation, digitalSignature, keyEncipherment

[ v3_ca ]

# Extensions for a typical CA

# PKIX recommendation.

subjectKeyIdentifier=hash

authorityKeyIdentifier=keyid:always,issuer

# This is what PKIX recommends but some broken software chokes on critical

# extensions.

#basicConstraints = critical,CA:true

# So we do this instead.

basicConstraints = CA:true

# Key usage: this is typical for a CA certificate. However since it will

# prevent it being used as an test self-signed certificate it is best

# left out by default.

# keyUsage = cRLSign, keyCertSign

# Some might want this also

# nsCertType = sslCA, emailCA

# Include email address in subject alt name: another PKIX recommendation

# subjectAltName=email:copy

# Copy issuer details

# issuerAltName=issuer:copy

# DER hex encoding of an extension: beware experts only!

# obj=DER:02:03

# Where 'obj' is a standard or added object

# You can even override a supported extension:

# basicConstraints= critical, DER:30:03:01:01:FF

[ crl_ext ]

# CRL extensions.

# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.

# issuerAltName=issuer:copy

authorityKeyIdentifier=keyid:always

[ proxy_cert_ext ]

# These extensions should be added when creating a proxy certificate

# This goes against PKIX guidelines but some CAs do it and some software

# requires this to avoid interpreting an end user certificate as a CA.

basicConstraints=CA:FALSE

# Here are some examples of the usage of nsCertType. If it is omitted

# the certificate can be used for anything *except* object signing.

# This is OK for an SSL server.

# nsCertType = server

# For an object signing certificate this would be used.

# nsCertType = objsign

# For normal client use this is typical

# nsCertType = client, email

# and for everything including object signing:

# nsCertType = client, email, objsign

# This is typical in keyUsage for a client certificate.

# keyUsage = nonRepudiation, digitalSignature, keyEncipherment

# This will be displayed in Netscape's comment listbox.

nsComment = "OpenSSL Generated Certificate"

# PKIX recommendations harmless if included in all certificates.

subjectKeyIdentifier=hash

authorityKeyIdentifier=keyid,issuer

# This stuff is for subjectAltName and issuerAltname.

# Import the email address.

# subjectAltName=email:copy

# An alternative to produce certificates that aren't

# deprecated according to PKIX.

# subjectAltName=email:move

# Copy subject details

# issuerAltName=issuer:copy

#nsCaRevocationUrl = http://www.domain.dom/ca-crl.pem

#nsBaseUrl

#nsRevocationUrl

#nsRenewalUrl

#nsCaPolicyUrl

#nsSslServerName

# This really needs to be in place for it to be a proxy certificate.

proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo

####################################################################

[ tsa ]

default_tsa = tsa_config1 # the default TSA section

[ tsa_config1 ]

# These are used by the TSA reply generation only.

dir = ./demoCA # TSA root directory

serial = $dir/tsaserial # The current serial number (mandatory)

crypto_device = builtin # OpenSSL engine to use for signing

signer_cert = $dir/tsacert.pem # The TSA signing certificate

# (optional)

certs = $dir/cacert.pem # Certificate chain to include in reply

# (optional)

signer_key = $dir/private/tsakey.pem # The TSA private key (optional)

default_policy = tsa_policy1 # Policy if request did not specify it

# (optional)

other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional)

digests = md5, sha1# Acceptable message digests (mandatory)

accuracy = secs:1, millisecs:500, microsecs:100 # (optional)

clock_precision_digits = 0 # number of digits after dot. (optional)

ordering = yes # Is ordering defined for timestamps?

# (optional, default: no)

tsa_name = yes # Must the TSA name be included in the reply?

# (optional, default: no)

ess_cert_id_chain = no # Must the ESS cert id chain be included?

# (optional, default: no)

以上是 PHP生成公钥私钥,加密解密,签名验签 的全部内容, 来源链接: utcz.com/z/510135.html

回到顶部