java rsa 解密报:javax.crypto.BadPaddingException: Decryption error
at sun.security.rsa.RSAPadding.unpadV15(RSAPadding.java:380)
at sun.security.rsa.RSAPadding.unpad(RSAPadding.java:291)
at com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:356)
at com.sun.crypto.provider.RSACipher.engineDoFinal(RSACipher.java:389)
at javax.crypto.Cipher.doFinal(Cipher.java:2223)
at com.asymmetric.rsa.TestRSA.testDecrypt(TestRSA.java:115)
at com.asymmetric.rsa.TestRSA.main(TestRSA.java:34)
简单解释:
字面意思就是解密的时候填充错误,rsa 加解密都是把数据必须满足一定的长度,如果 不满足就要进行填充(一般是补0)直到满足特定的长度
测试代码
-
package com.asymmetric.rsa;
-
-
import java.io.ByteArrayOutputStream;
-
import java.io.IOException;
-
import java.security.InvalidKeyException;
-
import java.security.KeyFactory;
-
import java.security.NoSuchAlgorithmException;
-
import java.security.PrivateKey;
-
import java.security.PublicKey;
-
import java.security.spec.InvalidKeySpecException;
-
import java.security.spec.PKCS8EncodedKeySpec;
-
import java.security.spec.X509EncodedKeySpec;
-
import java.util.Base64;
-
-
import javax.crypto.BadPaddingException;
-
import javax.crypto.Cipher;
-
import javax.crypto.IllegalBlockSizeException;
-
import javax.crypto.NoSuchPaddingException;
-
-
-
-
public class TestRSA {
-
-
public static String publicKey = "MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDQgEoj3z9JrdPNI23DbMQkl3gkGuDke7iBr5yrYyqolkTyxuBLWFwHNuGv4VKOj9fXg61QxpaJ/fxDBvMvmkBSRowHBloGFceVTx8wV/8u0DcjvTCu0IZ1zp6wjG6xBn5j66Sg/q+9hvaY2p7fkKmsvcW6VoNPgQHU1Cf01DLZmQIDAQAB+oXcINOiE3AsuZ4VJmwNZg9Y/7fY+OFRS2JAh5YMsrv2qyoGP+Z9ksre26NYR+Lt91B2lhdwJHLpQpziaANZm/ONb31fj/lwIDAQAB";
-
public static String privateKey = "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";
-
-
private static String algorithm = "RSA"; //$NON-NLS-1$
-
private static final int MAX_ENCRYPT_BLOCK = 117;
-
private static final int MAX_DECRYPT_BLOCK = 128;
-
private static String data = "test jiojiogeiojigouihgtest jiojiogeiojigouihgtest jiojiogeiojigouihgtest jiojiogeiojigouihgtest jiojiogeiojigouihgtest jiojiogeiojigouihgtest jiojiogeiojigouihgtest jiojiogeiojigouihgtest jiojiogeiojigouihgtest jiojiogeiojigouihgtest jiojiogeiojigouihgtest jiojiogeiojigouihgtest jiojiogeiojigouihgtest jiojiogeiojigouihgtest jiojiogeiojigouihgtest jiojiogeiojigouihgtest jiojiogeiojigouihg"; //$NON-NLS-1$
-
-
public static void main(String[] args) throws NoSuchAlgorithmException, InvalidKeySpecException, NoSuchPaddingException, IllegalBlockSizeException, BadPaddingException, InvalidKeyException, IOException {
-
String test = testEncrypt(privateKey,data);
-
String testDecrypt = testDecrypt(publicKey, test);
-
System.out.println(testDecrypt);
-
-
}
-
-
-
/**
-
* 加密
-
* @param key
-
* @param data
-
* @return
-
* @throws NoSuchAlgorithmException
-
* @throws InvalidKeySpecException
-
* @throws NoSuchPaddingException
-
* @throws IllegalBlockSizeException
-
* @throws BadPaddingException
-
* @throws InvalidKeyException
-
* @throws IOException
-
*/
-
public static String testEncrypt(String key,String data) throws NoSuchAlgorithmException, InvalidKeySpecException, NoSuchPaddingException, IllegalBlockSizeException, BadPaddingException, InvalidKeyException, IOException{
-
byte[] decode = Base64.getDecoder().decode(key);
-
PKCS8EncodedKeySpec pkcs8EncodedKeySpec = new PKCS8EncodedKeySpec(decode);
-
KeyFactory kf = KeyFactory.getInstance(algorithm);
-
PrivateKey generatePrivate = kf.generatePrivate(pkcs8EncodedKeySpec);
-
Cipher ci = Cipher.getInstance(algorithm);
-
ci.init(Cipher.ENCRYPT_MODE, generatePrivate);
-
-
byte[] bytes = data.getBytes();
-
int inputLen = bytes.length;
-
int offLen = 0;//偏移量
-
int i = 0;
-
ByteArrayOutputStream bops = new ByteArrayOutputStream();
-
while(inputLen - offLen > 0){
-
byte [] cache;
-
if(inputLen - offLen > 117){
-
cache = ci.doFinal(bytes, offLen,117);
-
}else{
-
cache = ci.doFinal(bytes, offLen,inputLen - offLen);
-
}
-
bops.write(cache);
-
i++;
-
offLen = 117 * i;
-
}
-
bops.close();
-
byte[] encryptedData = bops.toByteArray();
-
String encodeToString = Base64.getEncoder().encodeToString(encryptedData);
-
return encodeToString;
-
}
-
-
-
-
-
/**
-
* 解密
-
* @param key
-
* @param data
-
* @return
-
* @throws NoSuchAlgorithmException
-
* @throws InvalidKeyException
-
* @throws NoSuchPaddingException
-
* @throws InvalidKeySpecException
-
* @throws BadPaddingException
-
* @throws IllegalBlockSizeException
-
* @throws IOException
-
*/
-
public static String testDecrypt(String key,String data) throws NoSuchAlgorithmException, InvalidKeyException, NoSuchPaddingException, InvalidKeySpecException, IllegalBlockSizeException, BadPaddingException, IOException{
-
byte[] decode = Base64.getDecoder().decode(key);
-
// PKCS8EncodedKeySpec pkcs8EncodedKeySpec = new PKCS8EncodedKeySpec(decode); //java底层 RSA公钥只支持X509EncodedKeySpec这种格式
-
X509EncodedKeySpec x509EncodedKeySpec = new X509EncodedKeySpec(decode);
-
KeyFactory kf = KeyFactory.getInstance(algorithm);
-
PublicKey generatePublic = kf.generatePublic(x509EncodedKeySpec);
-
Cipher ci = Cipher.getInstance(algorithm);
-
ci.init(Cipher.DECRYPT_MODE,generatePublic);
-
-
int inputLen = data.getBytes().length;
-
byte[] bytes = data.getBytes();
-
int offLen = 0;
-
int i = 0;
-
ByteArrayOutputStream byteArrayOutputStream = new ByteArrayOutputStream();
-
while(inputLen - offLen > 0){
-
byte[] cache;
-
if(inputLen - offLen > 128){
-
cache = ci.doFinal(bytes,offLen,128);
-
}else{
-
cache = ci.doFinal(bytes,offLen,inputLen - offLen);
-
}
-
byteArrayOutputStream.write(cache);
-
i++;
-
offLen = 128 * i;
-
-
}
-
byteArrayOutputStream.close();
-
byte[] byteArray = byteArrayOutputStream.toByteArray();
-
return new String(byteArray);
-
}
-
-
-
-
}
问题点:
后来发现确实是我自己的错误,rsa 加密后返回的字符串使用Base64编码的,忘了解密直接getBytes()就出错了
api 指出:BadPaddingException
- 如果此 Cipher 为解密模式,并且未请求填充(或不填充),但解密的数据没有用适当的填充字节进行限制
只要是cipher.doFinal()解密时报 BadPaddingException
肯定是传入的字节数组有问题,传的不是加密时生成的数组
修正后的代码:
-
package com.asymmetric.rsa;
-
-
import java.io.ByteArrayOutputStream;
-
import java.io.IOException;
-
import java.security.InvalidKeyException;
-
import java.security.KeyFactory;
-
import java.security.NoSuchAlgorithmException;
-
import java.security.PrivateKey;
-
import java.security.PublicKey;
-
import java.security.spec.InvalidKeySpecException;
-
import java.security.spec.PKCS8EncodedKeySpec;
-
import java.security.spec.X509EncodedKeySpec;
-
import java.util.Base64;
-
-
import javax.crypto.BadPaddingException;
-
import javax.crypto.Cipher;
-
import javax.crypto.IllegalBlockSizeException;
-
import javax.crypto.NoSuchPaddingException;
-
-
-
-
public class TestRSA {
-
-
public static String publicKey = "MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDQgEoj3z9JrdPNI23DbMQkl3gkGuDke7iBr5yrYyqolkTyxuBLWFwHNuGv4VKOj9fXg61QxpaJ/fxDBvMvmkBSRowHBloGFceVTx8wV/8u0DcjvTCu0IZ1zp6wjG6xBn5j66Sg/q+9hvaY2p7fkKmsvcW6VoNPgQHU1Cf01DLZmQIDAQAB+oXcINOiE3AsuZ4VJmwNZg9Y/7fY+OFRS2JAh5YMsrv2qyoGP+Z9ksre26NYR+Lt91B2lhdwJHLpQpziaANZm/ONb31fj/lwIDAQAB";
-
public static String privateKey = "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";
-
-
private static String algorithm = "RSA"; //$NON-NLS-1$
-
private static final int MAX_ENCRYPT_BLOCK = 117;
-
private static final int MAX_DECRYPT_BLOCK = 128;
-
private static String data = "test jiojiogeiojigouihgtest jiojiogeiojigouihgtest jiojiogeiojigouihgtest jiojiogeiojigouihgtest jiojiogeiojigouihgtest jiojiogeiojigouihgtest jiojiogeiojigouihgtest jiojiogeiojigouihgtest jiojiogeiojigouihgtest jiojiogeiojigouihgtest jiojiogeiojigouihgtest jiojiogeiojigouihgtest jiojiogeiojigouihgtest jiojiogeiojigouihgtest jiojiogeiojigouihgtest jiojiogeiojigouihgtest jiojiogeiojigouihg"; //$NON-NLS-1$
-
-
public static void main(String[] args) throws NoSuchAlgorithmException, InvalidKeySpecException, NoSuchPaddingException, IllegalBlockSizeException, BadPaddingException, InvalidKeyException, IOException {
-
String test = testEncrypt(privateKey,data);
-
String testDecrypt = testDecrypt(publicKey, test);
-
System.out.println(testDecrypt);
-
-
}
-
-
-
/**
-
* 加密
-
* @param key
-
* @param data
-
* @return
-
* @throws NoSuchAlgorithmException
-
* @throws InvalidKeySpecException
-
* @throws NoSuchPaddingException
-
* @throws IllegalBlockSizeException
-
* @throws BadPaddingException
-
* @throws InvalidKeyException
-
* @throws IOException
-
*/
-
public static String testEncrypt(String key,String data) throws NoSuchAlgorithmException, InvalidKeySpecException, NoSuchPaddingException, IllegalBlockSizeException, BadPaddingException, InvalidKeyException, IOException{
-
byte[] decode = Base64.getDecoder().decode(key);
-
PKCS8EncodedKeySpec pkcs8EncodedKeySpec = new PKCS8EncodedKeySpec(decode);
-
KeyFactory kf = KeyFactory.getInstance(algorithm);
-
PrivateKey generatePrivate = kf.generatePrivate(pkcs8EncodedKeySpec);
-
Cipher ci = Cipher.getInstance(algorithm);
-
ci.init(Cipher.ENCRYPT_MODE, generatePrivate);
-
-
byte[] bytes = data.getBytes();
-
int inputLen = bytes.length;
-
int offLen = 0;//偏移量
-
int i = 0;
-
ByteArrayOutputStream bops = new ByteArrayOutputStream();
-
while(inputLen - offLen > 0){
-
byte [] cache;
-
if(inputLen - offLen > 117){
-
cache = ci.doFinal(bytes, offLen,117);
-
}else{
-
cache = ci.doFinal(bytes, offLen,inputLen - offLen);
-
}
-
bops.write(cache);
-
i++;
-
offLen = 117 * i;
-
}
-
bops.close();
-
byte[] encryptedData = bops.toByteArray();
-
String encodeToString = Base64.getEncoder().encodeToString(encryptedData);
-
return encodeToString;
-
}
-
-
-
-
-
/**
-
* 解密
-
* @param key
-
* @param data
-
* @return
-
* @throws NoSuchAlgorithmException
-
* @throws InvalidKeyException
-
* @throws NoSuchPaddingException
-
* @throws InvalidKeySpecException
-
* @throws BadPaddingException
-
* @throws IllegalBlockSizeException
-
* @throws IOException
-
*/
-
public static String testDecrypt(String key,String data) throws NoSuchAlgorithmException, InvalidKeyException, NoSuchPaddingException, InvalidKeySpecException, IllegalBlockSizeException, BadPaddingException, IOException{
-
byte[] decode = Base64.getDecoder().decode(key);
-
// PKCS8EncodedKeySpec pkcs8EncodedKeySpec = new PKCS8EncodedKeySpec(decode); //java底层 RSA公钥只支持X509EncodedKeySpec这种格式
-
X509EncodedKeySpec x509EncodedKeySpec = new X509EncodedKeySpec(decode);
-
KeyFactory kf = KeyFactory.getInstance(algorithm);
-
PublicKey generatePublic = kf.generatePublic(x509EncodedKeySpec);
-
Cipher ci = Cipher.getInstance(algorithm);
-
ci.init(Cipher.DECRYPT_MODE,generatePublic);
-
-
byte[] bytes = Base64.getDecoder().decode(data);
-
int inputLen = bytes.length;
-
int offLen = 0;
-
int i = 0;
-
ByteArrayOutputStream byteArrayOutputStream = new ByteArrayOutputStream();
-
while(inputLen - offLen > 0){
-
byte[] cache;
-
if(inputLen - offLen > 128){
-
cache = ci.doFinal(bytes,offLen,128);
-
}else{
-
cache = ci.doFinal(bytes,offLen,inputLen - offLen);
-
}
-
byteArrayOutputStream.write(cache);
-
i++;
-
offLen = 128 * i;
-
-
}
-
byteArrayOutputStream.close();
-
byte[] byteArray = byteArrayOutputStream.toByteArray();
-
return new String(byteArray);
-
}
-
-
-
-
}
java rsa 解密报:javax.crypto.BadPaddingException: Decryption error的更多相关文章
- RSA解密时javax.crypto.BadPaddingException: Data must start with zero
解决方法:要在加密后产生的byte数组转成string时要在各byte之间加个标识符,我加了个空格,然后再根据空格分隔转换回byte数组.如果不加标识符,由于byte值可能是一位到三位,无法知道某一个 ...
- 关于javax.crypto.BadPaddingException: Blocktype错误的几种解决方法
此文章转载自:http://www.myexception.cn/mobile/1259076.html 关于javax.crypto.BadPaddingException: Blocktype异常 ...
- exception javax.crypto.BadPaddingException: Given final block not properly padded
exception javax.crypto.BadPaddingException: Given final block not properly padded CreationTime--20 ...
- javax.crypto.BadPaddingException: Given final block not properly padded 解决方法
下面的 Des 加密解密代码,在加密时正常,但是在解密是抛出错误: javax.crypto.BadPaddingException: Given final block not properly p ...
- javax.crypto.BadPaddingException: Given final block not properly padded
一.报错 写了一个加密方法,在Windows上运行没有问题,在Linux上运行时提示如下错误: javax.crypto.BadPaddingException: Given final block ...
- android AES 部分机器javax.crypto.BadPaddingException: pad block corrupted
package com.bbguoxue.poetry.util; import java.security.SecureRandom; import javax.crypto.Cipher; imp ...
- 左右 android AES 所述机器的一部分 javax.crypto.BadPaddingException: pad block corrupted
好多人 android 使用上述 AES 显现 javax.crypto.BadPaddingException: pad block corrupted 下面的代码发布没问题,比较自己.不解释! p ...
- javax.crypto.BadPaddingException: Given final block not properly padded解决方案
解密的时候报错: javax.crypto.BadPaddingException: Given final block not properly padded 该异常是在解密 ...
- RSA解密报错java.security.spec.InvalidKeySpecException的解决办法
java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: IOException : algid p ...
随机推荐
- 用 js 写一个获取随机颜色的程序
function getColor(){ var color="#"; for(var i=0;i<6;i++){ color+=(Math.random()*16 | 0) ...
- Ado访问sqlserver 端口号非1433时 连接串的写法
Provider=SQLOLEDB.;Persist Security Info=False;Data Source=hostName,Port //注意用 逗号分隔主机名与端口号
- Android面试收集录14 Android进程间通信方式
一.使用 Intent Activity,Service,Receiver 都支持在 Intent 中传递 Bundle 数据,而 Bundle 实现了 Parcelable 接口,可以在不同的进程间 ...
- html---Web Storage存储
在HTML5中,除了Canvas元素之外,另一个新增的非常重要的功能是可以在客户端本地保存数据的Web Storage功能,之前可以使用Cookies在客户端保存如用户名等简单用户信息,但通过长期使用 ...
- RSA 加解密算法详解
RSA 为"非对称加密算法".也就是加密和解密用的密钥不同. (1)乙方生成两把密钥(公钥和私钥).公钥是公开的,任何人都可以获得,私钥则是保密的. (2)甲方获取乙方的公钥,然后 ...
- Android快速发布项目到jcenter详解
不管别人的教程多详细,都有他们忽略的坑,所以,都要自己动手.我也是参考了许多许多的博客,弄了一上午加下午十分钟,才搞定. 参考: 下面这个是大部分的步骤 http://blog.csdn.net/zh ...
- bootstrap设计横线上加字
1.给横线上加字 . 2.思路:通过z-index实现,可以将父元素的z-index设置成2,而横线的z-index设置成-1,这样有字的地方就可以覆盖横线,再设置字的padding达到合理的宽度 ( ...
- 以最省内存的方式把大图片加载到内存及获取Exif信息和获取屏幕高度和宽度的新方法
我们在加载图片时经常会遇到内存溢出的问题,图片太大,我们加载图片时,一般都是用的如下一般方法(加载本地图片): /** * 不作处理,去加载图片的方法,碰到比较大的图片会内存溢出 */ private ...
- Docker私有仓库Harbor部署与使用
一.harbor介绍 Harbor是一个用于存储和分发Docker镜像的企业级Registry服务器. 由下面几个组件组成: proxy:nginx前端代理,主要是分发前端页面ui访问和镜像上传和下载 ...
- 1090 Highest Price in Supply Chain (25 分)(树的遍历)
求所有叶节点中的最高价以及这个价格的叶节点个数 #include<bits/stdc++.h> using namespace std; ; vector<int>mp[N]; ...