将这个php数字签名转换成Delphi [英] Convert this php digital signing to Delphi

查看:207
本文介绍了将这个php数字签名转换成Delphi的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

我想将这个php数字签名功能重写成Delphi代码。

  function SaySig(){

$ privKeyFilePath =c:\temp\myrsakey。 pem

$ data =sign this string;
$ fp = fopen($ privKeyFilePath,r);
$ priv_key = fread($ fp,8192);
fclose($ fp);
$ privatekeyid = openssl_get_privatekey($ priv_key);
openssl_sign($ data,$ signature,$ privatekeyid,OPENSSL_ALGO_SHA1);
openssl_free_key($ privatekeyid);
$ sig = base64_encode($ signature);
echo< br>;
echo签名:$ sig。< br>< br>;
}

我不在乎使用哪个组件(lockbox, DelphiOpenSSL ,Chilkat Crypt ActiveX等)。我已经尝试了所有这些没有成功;这让我觉得我做的事情从根本上错了。



我的密钥是这样生成的:


openssl req -x509 -nodes -days 365 -newkey rsa:1024 -sha1 -subj/ C = US / ST = CA / L = Mountain View / CN = www.mycompany.com-keyout myrsakey.pem -out c:\temp\myrsacert .pem


密钥的内容(不用担心 - 我会生成一个):




----- BEGIN RSA私钥-----
MIICXgIBAAKBgQCqsR7s4X74LfTiLv1PP6Yn0SBpGBtbzkBSQ95E2b9Haa3Qtf0a
KjDJpZLMwXC / IrSP7K2Gxbl2cZotT19GVgw6PcYPTBBWX2gJoVrnQZP8uPdlGAgS
plODP55R9f4F0KzIpE6d + dpTGfJ1wysFqYN8fxtlu8K7YO / Mh8tNzN5VOQIDAQAB
AoGBAIvCvRyeQlU5Y + JzMSvbZNQDUrNabsRL67SwJ2VemVUCvbQ / 3v62fv4M2VdY
KFYIN6oE08yfRw0pVWE2NT + lIxqSQx7 + qv84Y7duqT7155wpCFj + A / 6pYyNTFNFi
5wiTnN13eyHNgKxZm7QcMH67T / noTgz0LoT5p54ynmfNcjyBAkEA3DCEQ6Dm2xYH
NHK3 + 7sNEVklN20zNqyYvrCunNLAiLioF1jDApdfcT8YtVd29L7tH1ZdJYG5DXJ8
Bs7eKLGekQJBAMZzy0Q7LZHdWQxSRi7wy0eq6SqZMqi0pb9VPuXjW G1Y + rtRr1vV
vyMaGz4rcE7mkbq / NKN + AQXc30GOj3GE8CkCQQCMDVwDfBN6pL8 / fLjsJ + S + 9RnD
8HRTwWKCX / UgkLif / fwEpZOcUVYGvSBlL9XdBJfkh9VFZwaidABJgEk0Tw3RAkBd
6pjMnpDvUeh9e0Y5mr0pGookHcIqsuspxEby9od3rI1aLsslU9 + T1hwEbPxGarmW
vj0MAUgspR2G4deiqn4ZAkEAnWxV7NhtVPLs5Y2ZYeHz7ipdcSL4 / keLW4PwKerF
7LJj4s7 / 6ZqnHA6Z0yhCcziflYQArWt1ViLMIYZ8grr5Kg ==
----- END RSA PRIVATE KEY -----


输出如下所示: p>


jcIIsr145dTwDrT8g4jb2HZ5FP5UL6 / 9mK7hF6hC2lCZGlM0W4QqFqytghWaU0w3Z6JkMVUlxxWtQ2R +
vWQVB0F3htAtbVZkiA67x0zor + zmpClBIazmfVJlng4sG1R7CCUZ0gGhdm4JMc08VsWU25utudcG6inpl
whQiZgefW0 =




可能看起来我要求某人做我的工作。但是,我已经在这个时候一直在捣蛋了一段时间,没有成功。
谢谢。



有人要求我发布我的一些代码。以下是我尝试过的一些事情。

  function TMainWeb.sign(mstring:String):string; 
var
mPrivateKey:TLbRSAKey;
LbRSASSA1:TLbRSASSA;
begin
LbRSASSA1:= TLbRSASSA.create(nil);
LbRSASSA1.PrivateKey.LoadFromFile('C:\temp\myrsakey.der');
LbRSASSA1.HashMethod:= TRSAHashMethod(hmSHA1);
LbRSASSA1.SignString(mString);
result:= LbRSASSA1.Signature.IntStr;
结束

函数TMainWeb.sign1(mstring:String):string;
var
LbDSA1:TLbDSA;
mPrivateKey:TLbRSAKey;
begin
mPrivateKey:= TLbRSAKey.Create(aks1024);
mPrivateKey.LoadFromFile('C:\temp\myrsakey.der');
LbDSA1:= TLbDSA.create(application);
lbDSA1.PrivateKey.Assign(mPrivateKey);
LbDSA1.SignString(mString);
结束

函数TMainWeb.Sign2(mString:String):string;
var
签名者:TMessageSigner;
begin
signer:= TMessageSigner.Create;
signer.LoadPrivateKey('C:\temp\myrsakey.pem');
signer.PlainMessage:= mString;
signer.MIMESign;
result:= signer.SignedMessage;
结束


解决方案



我不声称它是完美的代码(!),但它编译:-) 并给出您引用的相同结果。使用您上面提到的M Ferrante的OpenSSL API。很多东西,你通常只会在启动时做一次 - 例如加载私钥,InitSSL等。我使用Jedi JCL for base64的东西 - 这更直接。

另外一些这看起来有点奇怪(使用PChard可以做的等待等等),因为我最初使用我修改过的Delphi 2010 API头文件写的,然后意识到你使用的是D2007,而TEncoding不是可用和几个mods需要。

(SignStringToBase64是主要的调用,在列表的底部)

 code>使用libeay32,jclmime; 

const
LIBEAY_DLL_NAME ='libeay32.dll';

//这些没有在原始的libeay32.pas文件中定义
procedure EVP_MD_CTX_init(ctx:PEVP_MD_CTX); cdecl;外部LIBEAY_DLL_NAME;
函数EVP_MD_CTX_cleanup(ctx:PEVP_MD_CTX):integer; cdecl;外部LIBEAY_DLL_NAME;

procedure InitSSL;
begin
OpenSSL_add_all_algorithms;
OpenSSL_add_all_ciphers;
OpenSSL_add_all_digests;
ERR_load_crypto_strings;
//种子伪随机数生成器
//这应该是一些更多的随机!
RAND_load_file('c:\windows\paint.exe',512);
结束

procedure FinalizeSSL;
begin
EVP_cleanup;
结束

函数GetSSLErrorMessage:string;
const
BUFF_SIZE = 128; // OpenSSL docs状态应该是> = 120字节
var
err:TBytes;
begin
SetLength(err,BUFF_SIZE);
ERR_error_string(ERR_get_error,@err [0]);
result:= string(err);
结束

函数RSALoadPrivateKey(const AFileName,APassPhrase:string):PRSA;
var
bp:pBIO;
fn,pp:PAnsiChar;
pk:PRSA;
begin
fn:= PAnsiChar(AnsiString(AFileName));
pp:= PAnsiChar(AnsiString(APassPhrase));
bp:= BIO_new(BIO_s_file());
BIO_read_filename(bp,fn);
pk:= nil;
result:= PEM_read_bio_RSAPrivateKey(bp,pk,nil,pp);
如果result = nil then
raise Exception.Create('Private key failed。'+ GetSSLErrorMessage);
结束

函数LoadPrivateKey(const AFileName,APass:string):PEVP_PKEY;
var
rkey:PRSA;
begin
rkey:= RSALoadPrivateKey(AFileName,APass);
result:= EVP_PKEY_new;
EVP_PKEY_assign(result,EVP_PKEY_RSA,rkey);
结束

过程CleanUpKey(AKey:PEVP_PKEY);
begin
if(AKey<> nil)then
begin
EVP_PKEY_free(AKey);
// OpenSSL文档说明,当父键被释放时,相关的rsa键也将$ b​​ $ b //释放
end;
结束

函数EVPSign(ASource:TBytes; const APrivateKey:PEVP_PKEY):TBytes;
var
keysize:integer;
ks:基数;
ctx:EVP_MD_CTX;
begin
keysize:= EVP_PKEY_size(APrivateKey);
SetLength(result,keysize);

EVP_MD_CTX_init(@ctx);
try
EVP_SignInit(@ctx,EVP_sha1);
EVP_SignUpdate(@ctx,@ASource [0],Length(ASource));
EVP_SignFinal(@ctx,@result [0],ks,APrivateKey);
SetLength(result,ks);
finally
EVP_MD_CTX_cleanup(@ctx);
结束
结束

函数Base64EncodeBytes(Input:TBytes):string;
var
b64:TBytes;
begin
SetLength(b64,jclMime.MimeEncodedSizeNoCRLF(Length(Input)));
jclMime.MimeEncodeNoCRLF(输入[0],长度(输入),b64 [0]);
result:= string(b64);
结束

函数SignStringToBase64(const AText:string):string;
var
key:PEVP_PKEY;
src,enc:TBytes;
begin
InitSSL;
try
key:= LoadPrivateKey('c:\temp\priv-key.pem','');
try
SetLength(src,Length(AText));
CopyMemory(@src [0],@AText,Length(AText));
enc:= EVPSign(src,key);
result:= Base64EncodeBytes(enc);
finally
CleanUpKey(key);
结束
finally
FinalizeSSL;
结束
结束


I would like to rewrite this php digital signing function into Delphi code.

  function SaySig() {

  $privKeyFilePath = "c:\temp\myrsakey.pem";

  $data = "sign this string";
  $fp = fopen($privKeyFilePath, "r");
  $priv_key = fread($fp, 8192);
  fclose($fp);
  $privatekeyid = openssl_get_privatekey($priv_key);
  openssl_sign($data, $signature, $privatekeyid, OPENSSL_ALGO_SHA1);
  openssl_free_key($privatekeyid);
  $sig = base64_encode($signature);
  echo "<br>";
  echo "Signature:".$sig."<br><br>";
  }

I don't care which component is used (lockbox, DelphiOpenSSL, Chilkat Crypt ActiveX, etc). I have tried all of these with no success; which makes me think I am doing something fundamentally wrong.

My key was generated as such:

openssl req -x509 -nodes -days 365 -newkey rsa:1024 -sha1 -subj "/C=US/ST=CA/L=Mountain View/CN=www.mycompany.com" -keyout myrsakey.pem -out c:\temp\myrsacert.pem

The contents of the key (don't worry - I will generate a new one):

-----BEGIN RSA PRIVATE KEY----- MIICXgIBAAKBgQCqsR7s4X74LfTiLv1PP6Yn0SBpGBtbzkBSQ95E2b9Haa3Qtf0a KjDJpZLMwXC/IrSP7K2Gxbl2cZotT19GVgw6PcYPTBBWX2gJoVrnQZP8uPdlGAgS plODP55R9f4F0KzIpE6d+dpTGfJ1wysFqYN8fxtlu8K7YO/Mh8tNzN5VOQIDAQAB AoGBAIvCvRyeQlU5Y+JzMSvbZNQDUrNabsRL67SwJ2VemVUCvbQ/3v62fv4M2VdY KFYIN6oE08yfRw0pVWE2NT+lIxqSQx7+qv84Y7duqT7155wpCFj+a/6pYyNTFNFi 5wiTnN13eyHNgKxZm7QcMH67T/noTgz0LoT5p54ynmfNcjyBAkEA3DCEQ6Dm2xYH Nhk3+7sNEVklN20zNqyYvrCunNLAiLioF1jDApdfcT8YtVd29L7tH1ZdJYG5DXJ8 Bs7eKLGekQJBAMZzy0Q7LZHdWQxSRi7wy0eq6SqZMqi0pb9VPuXjWG1y+rtRr1vV vyMaGz4rcE7mkbq/Nkn+AQXc30GOj3GE8CkCQQCMDVwDfBN6pL8/fLjsJ+S+9RnD 8HRTwWKCX/UgkLif/fwEpZOcUVYGvSBlL9XdBJfkh9VFZwaidABJgEk0Tw3RAkBd 6pjMnpDvUeh9e0Y5mr0pGookHcIqsuspxEby9od3rI1aLsslU9+T1hwEbPxGarmW vj0MAUgspR2G4deiqn4ZAkEAnWxV7NhtVPLs5Y2ZYeHz7ipdcSL4/keLW4PwKerF 7LJj4s7/6ZqnHA6Z0yhCcziflYQArWt1ViLMIYZ8grr5Kg== -----END RSA PRIVATE KEY-----

And the output looks as such:

jcIIsr145dTwDrT8g4jb2HZ5FP5UL6/9mK7hF6hC2lCZGlM0W4QqFqytghWaU0w3Z6JkMVUlxxWtQ2R+ vWQVB0F3htAtbVZkiA67x0zor+zmpClBIazmfVJlng4sG1R7CCUZ0gGhdm4JMc08VsWU25utudcG6inpl whQiZgefW0=

It might appear as if I am requesting someone to "do my work". But I have been pounding away at this for some time with no success. Thanks.

Someone requested I post some of my code. Below are some of the things I have tried..

function TMainWeb.sign(mstring: String): string;
var
  mPrivateKey: TLbRSAKey;
  LbRSASSA1: TLbRSASSA;
begin
  LbRSASSA1:= TLbRSASSA.create(nil);
  LbRSASSA1.PrivateKey.LoadFromFile('C:\temp\myrsakey.der');
  LbRSASSA1.HashMethod := TRSAHashMethod(hmSHA1);
  LbRSASSA1.SignString(mString);
  result := LbRSASSA1.Signature.IntStr;
end;

function TMainWeb.sign1(mstring: String): string;
var
  LbDSA1: TLbDSA;
  mPrivateKey: TLbRSAKey;
begin
  mPrivateKey := TLbRSAKey.Create(aks1024);
  mPrivateKey.LoadFromFile('C:\temp\myrsakey.der');
  LbDSA1 := TLbDSA.create(application);
  lbDSA1.PrivateKey.Assign(mPrivateKey);
  LbDSA1.SignString(mString);
end;

function TMainWeb.Sign2(mString: String): string;
var
  signer: TMessageSigner;
begin
  signer := TMessageSigner.Create;
  signer.LoadPrivateKey('C:\temp\myrsakey.pem');
  signer.PlainMessage := mString;
  signer.MIMESign;
  result := signer.SignedMessage;
end;

解决方案

Try this.
I don't claim it's perfect code(!) but it compiles :-)   and gives the same result you've quoted. Uses the OpenSSL API from M Ferrante that you mention above. A lot of the stuff it does you would normally only do once at startup - such as load private key, InitSSL etc. I use the Jedi JCL for base64 stuff - it's more straightforward.
Also some of this looks a bit odd (uses TBytes where PChar would do etc etc) as I originally wrote it using my modified Delphi 2010 API headers but then realised you were using D2007 and TEncoding wasn't available and a few mods were needed.
(SignStringToBase64 is the main call, right at the bottom of the listing)

uses libeay32, jclmime;

const
  LIBEAY_DLL_NAME = 'libeay32.dll';

// These aren't defined in the original libeay32.pas file
procedure EVP_MD_CTX_init(ctx: PEVP_MD_CTX); cdecl; external LIBEAY_DLL_NAME;
function EVP_MD_CTX_cleanup(ctx: PEVP_MD_CTX): integer; cdecl; external LIBEAY_DLL_NAME;

procedure InitSSL;
begin
  OpenSSL_add_all_algorithms;
  OpenSSL_add_all_ciphers;
  OpenSSL_add_all_digests;
  ERR_load_crypto_strings;
  // Seed the pseudo-random number generator
  // This should be something a little more "random"!
  RAND_load_file('c:\windows\paint.exe', 512);
end;

procedure FinalizeSSL;
begin
  EVP_cleanup;
end;

function GetSSLErrorMessage: string;
const
  BUFF_SIZE = 128; // OpenSSL docs state should be >= 120 bytes
var
  err: TBytes;
begin
  SetLength(err, BUFF_SIZE);
  ERR_error_string(ERR_get_error, @err[0]);
  result := string(err);
end;

function RSALoadPrivateKey(const AFileName, APassPhrase: string): PRSA;
var
  bp: pBIO;
  fn, pp: PAnsiChar;
  pk: PRSA;
begin
  fn := PAnsiChar(AnsiString(AFileName));
  pp := PAnsiChar(AnsiString(APassPhrase));
  bp := BIO_new(BIO_s_file());
  BIO_read_filename(bp, fn);
  pk := nil;
  result := PEM_read_bio_RSAPrivateKey(bp, pk, nil, pp);
  if result = nil then
    raise Exception.Create('Private key failure.' + GetSSLErrorMessage);
end;

function LoadPrivateKey(const AFileName, APass: string): PEVP_PKEY;
var
  rkey: PRSA;
begin
  rkey := RSALoadPrivateKey(AFileName, APass);
  result := EVP_PKEY_new;
  EVP_PKEY_assign(result, EVP_PKEY_RSA, rkey);
end;

procedure CleanUpKey(AKey: PEVP_PKEY);
begin
  if (AKey <> nil) then
  begin
    EVP_PKEY_free(AKey);
    // The OpenSSL docs state that the related rsa key will also
    // be freed when the parent key is freed
  end;
end;

function EVPSign(ASource: TBytes; const APrivateKey: PEVP_PKEY): TBytes;
var
  keysize: integer;
  ks: cardinal;
  ctx: EVP_MD_CTX;
begin
  keysize := EVP_PKEY_size(APrivateKey);
  SetLength(result, keysize);

  EVP_MD_CTX_init(@ctx);
  try
    EVP_SignInit(@ctx, EVP_sha1);
    EVP_SignUpdate(@ctx, @ASource[0], Length(ASource));
    EVP_SignFinal(@ctx, @result[0], ks, APrivateKey);
    SetLength(result, ks);
  finally
    EVP_MD_CTX_cleanup(@ctx);
  end;
end;

function Base64EncodeBytes(Input: TBytes): string;
var
  b64: TBytes;
begin
  SetLength(b64, jclMime.MimeEncodedSizeNoCRLF(Length(Input)));
  jclMime.MimeEncodeNoCRLF(Input[0], Length(Input), b64[0]);
  result := string(b64);
end;

function SignStringToBase64(const AText: string): string;
var
  key: PEVP_PKEY;
  src, enc: TBytes;
begin
  InitSSL;
  try
    key := LoadPrivateKey('c:\temp\priv-key.pem', '');
    try
      SetLength(src, Length(AText)); 
      CopyMemory(@src[0], @AText, Length(AText));           
      enc := EVPSign(src, key);
      result := Base64EncodeBytes(enc);
    finally
      CleanUpKey(key);
    end;
  finally
    FinalizeSSL;
  end;
end;

这篇关于将这个php数字签名转换成Delphi的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!

查看全文
登录 关闭
扫码关注1秒登录
发送“验证码”获取 | 15天全站免登陆