HarmonyOS 鸿蒙Next @ohos.security.cryptoFramework 生成秘密失败

发布于 1周前 作者 caililin 来自 鸿蒙OS

HarmonyOS 鸿蒙Next @ohos.security.cryptoFramework 生成秘密失败

async function genSymKeyByData(key: string) {
  let symKeyData = new Uint8Array(buffer.from(key, 'utf-8').buffer)
  let symKeyBlob: crypto.DataBlob = { data: symKeyData };
  let aesGenerator = crypto.createSymKeyGenerator('HMAC|SHA256');
  let symKey = await aesGenerator.convertKey(symKeyBlob);
  return symKey;
}

执行 convertKey 方法时,排除异常提示:convert sym key failed

测试用例 key = 'testtesttest'


更多关于HarmonyOS 鸿蒙Next @ohos.security.cryptoFramework 生成秘密失败的实战系列教程也可以访问 https://www.itying.com/category-93-b0.html

2 回复

这边有个完整的index.ets可参考:

import cryptoFramework from '@ohos.security.cryptoFramework';
import buffer from '@ohos.buffer';
import util from '@ohos.util';

@Entry
@Component
struct AES_InKey {
  @State message: string = 'Hello World'

  build() {
    Row() {
      Column() {
        Text(this.message)
          .fontSize(50)
          .fontWeight(FontWeight.Bold).onClick(() => {
          let aes = new AES_CBC();
          aes.do();
        })
      }
      .width('100%')
    }
    .height('100%')
  }
}

let key = 'bb28bf96-f8e4-42'
let iv = "6c5bd6e5371847769980ad0b04d22e7c"

let base = new util.Base64Helper();
export class AES_CBC {
  async do() {
    //加密
    let res = await this.aesEncrypt("华为鸿蒙千帆起", key);
    //解密
    this.aesDecrypt(res, key);
  }

  //加密
  async aesEncrypt(text: string, key: string): Promise<string> {
    let globalResult = ""
    try {
      let cipherAlgName = 'AES128|CBC|PKCS7';
      let globalCipher = cryptoFramework.createCipher(cipherAlgName);

      let symAlgName = 'AES128';
      let symKeyGenerator = cryptoFramework.createSymKeyGenerator(symAlgName);
      let dataUint8Array = stringToUint8Array(key)
      let keyBlob: cryptoFramework.DataBlob = { data: dataUint8Array }
      let promiseSymKey = await symKeyGenerator.convertKey(keyBlob)

      let globalCbcParams = this.genCBCParamsSpec()
      globalCbcParams.iv = { data: HexStrTouint8Array(iv) }
      await globalCipher.init(cryptoFramework.CryptoMode.ENCRYPT_MODE, promiseSymKey, globalCbcParams);
      let plainText: cryptoFramework.DataBlob = { data: stringToUint8Array(text) }
      let result = await globalCipher.doFinal(plainText)
      globalResult = base.encodeToStringSync(result.data);
      let s = uint8ArrayToString(result.data);
    } catch (err) {
      console.log(err.message)
    }
    return globalResult;
  }
}

// 解密
async aesDecrypt(text: string, key: string) {
  let globalResult = ""
  try {
    let cipherAlgName = 'AES128|CBC|PKCS7';
    let globalCipher = cryptoFramework.createCipher(cipherAlgName);

    let symAlgName = 'AES128';
    let symKeyGenerator = cryptoFramework.createSymKeyGenerator(symAlgName);

    let dataUint8Array = stringToUint8Array(key)
    let keyBlob: cryptoFramework.DataBlob = { data: dataUint8Array }
    let promiseSymKey = await symKeyGenerator.convertKey(keyBlob)

    let globalCbcParams = this.genCBCParamsSpec();
    globalCbcParams.iv = { data: HexStrTouint8Array(iv) }
    await globalCipher.init(cryptoFramework.CryptoMode.DECRYPT_MODE, promiseSymKey, globalCbcParams);
    let plainText: cryptoFramework.DataBlob = { data: base.decodeSync(text) }
    let result = await globalCipher.doFinal(plainText)
    globalResult = uint8ArrayToString(result.data);
    AlertDialog.show({ message: '解密==》' + globalResult })
    console.log("test---解密==》" + globalResult)
  } catch (err) {
    console.log(err.message)
  }
}

genCBCParamsSpec() {
  let arr = [0x36, 0x61, 0x38, 0x77, 0x30, 0x63, 0x39, 0x31, 0x6b, 0x63, 0x37, 0x45, 0x55, 0x44, 0x57, 0x46];
  let dataIv = new Uint8Array(arr);
  let ivBlob: cryptoFramework.DataBlob = {
    data: dataIv
  };

  let cbcParamsSpec: cryptoFramework.IvParamsSpec = {
    iv: ivBlob,
    algName: 'IvParamsSpec'
  };
  return cbcParamsSpec;
}

// 字符串转成字节流
function stringToUint8Array(str: string) {
  return new Uint8Array(buffer.from(str, 'utf-8').buffer);
}

// 字节流转成可理解的字符串
function uint8ArrayToString(array: Uint8Array) {
  let out: string = "";
  let index: number = 0;
  let len: number = array.length;
  while (index < len) {
    let character = array[index++];
    switch (character >> 4) {
      case 0:
      case 1:
      case 2:
      case 3:
      case 4:
      case 5:
      case 6:
      case 7:
        out += String.fromCharCode(character);
        break;
      case 12:
      case 13:
        out += String.fromCharCode(((character & 0x1F) << 6) | (array[index++] & 0x3F));
        break;
      case 14:
        out += String.fromCharCode(((character & 0x0F) << 12) | ((array[index++] & 0x3F) << 6) | ((array[index++] & 0x3F) << 0));
        break;
      default:
        break;
    }
  }
  return out;
}

//十六进制转Uint8Array
function HexStrTouint8Array(data: string): Uint8Array {
  return new Uint8Array(buffer.from(data, 'hex').buffer);
}

//Uint8Array转y十六进制
function uint8ArrayToHexStr(data: Uint8Array): string {
  let hexString = "";
  let i: number;
  for (i = 0; i < data.length; i++) {
    let char = ('00' + data[i].toString(16)).slice(-2);
    hexString += char;
  }
  return hexString;
}

更多关于HarmonyOS 鸿蒙Next @ohos.security.cryptoFramework 生成秘密失败的实战系列教程也可以访问 https://www.itying.com/category-93-b0.html


针对帖子标题“HarmonyOS 鸿蒙Next @ohos.security.cryptoFramework 生成秘密失败”的问题,以下是一些可能的解答方向:

在HarmonyOS的cryptoFramework中,生成秘密失败可能由多种原因引起。首先,确保你的应用已正确声明了必要的权限,因为访问加密框架通常需要特定的权限许可。检查config.json文件,确保你的应用已请求并获得了ohos.permission.SECURITY_CRYPTO等相关权限。

其次,验证你的代码是否正确使用了cryptoFramework的API。生成秘密通常涉及调用特定的方法并传递正确的参数。检查你的方法调用,确保传递的参数类型、值和顺序都符合API文档的要求。

此外,考虑系统或环境因素。如果你的设备或模拟器上的安全组件存在问题,也可能导致生成秘密失败。尝试在不同的设备或模拟器上运行你的代码,看是否能成功生成秘密。

最后,检查HarmonyOS的版本和更新情况。某些功能可能在新版本中进行了修改或增强,确保你的开发环境和目标设备都运行的是支持所需功能的版本。

如果问题依旧没法解决请联系官网客服,官网地址是:https://www.itying.com/category-93-b0.html

回到顶部