HarmonyOS鸿蒙Next中解密文件流

HarmonyOS鸿蒙Next中解密文件流 文件是aes算法加密的文件(对称加密),帮忙写一个解析加密文件流,并且写入到一个双向流的demo,使用cryptoFramework 框架

3 回复
import { cryptoFramework } from '@kit.CryptoArchitectureKit';
import { buffer, util } from '@kit.ArkTS';

@Entry
@Component
struct AESCBCCrypto {
  @State message: string = '点击开始';

  build() {
    Row() {
      Column() {
        Text(this.message)
          .fontSize(50)
          .fontWeight(FontWeight.Bold)
          .onClick(() => {
            aesCBC()
          })
      }
      .width('100%')
    }
    .height('100%')
  }
}

function genIvParamsSpec() {
  let iv = new Uint8Array(buffer.from('AAAAAAAAAAAAAAAA', 'utf-8').buffer);

  let ivBlob: cryptoFramework.DataBlob = { data: iv };
  let ivParamsSpec: cryptoFramework.IvParamsSpec = {
    algName: "IvParamsSpec",
    iv: ivBlob
  };
  return ivParamsSpec;
}
// 加密消息
function encryptMessage(symKey: cryptoFramework.SymKey, plainText: cryptoFramework.DataBlob) {
  let cipher = cryptoFramework.createCipher('AES128|CBC|PKCS7');
  let iv = genIvParamsSpec();
  cipher.initSync(cryptoFramework.CryptoMode.ENCRYPT_MODE, symKey, iv);
  let cipherData = cipher.doFinalSync(plainText);
  return cipherData;
}
// 解密消息
function decryptMessage(symKey: cryptoFramework.SymKey, cipherText: cryptoFramework.DataBlob) {
  let decoder = cryptoFramework.createCipher('AES128|CBC|PKCS7');
  let iv = genIvParamsSpec();
  decoder.initSync(cryptoFramework.CryptoMode.DECRYPT_MODE, symKey, iv);
  let decryptData = decoder.doFinalSync(cipherText);
  return decryptData;
}

function genSymKeyByData(symKeyData: Uint8Array) {
  let symKeyBlob: cryptoFramework.DataBlob = { data: symKeyData };
  let aesGenerator = cryptoFramework.createSymKeyGenerator('AES128');
  let symKey = aesGenerator.convertKeySync(symKeyBlob);
  console.info('convertKey success');
  return symKey;
}

function aesCBC() {
  try {
    let base64 = new util.Base64Helper();

    let pk = "BBBBBBBBBBBBBBBB"; //16位密钥
    let key = new Uint8Array (buffer.from(pk, 'utf-8').buffer)
    console.error("aaaa  "+ key)
    let symKey = genSymKeyByData(key);

    let text = "您需要加密的文件的base64 string 字符串";
    let newBuf = buffer.from(buffer.from(text, 'utf-8').buffer);

    let plainText: cryptoFramework.DataBlob = { data: new Uint8Array(newBuf.buffer) };

    let encryptText = encryptMessage(symKey, plainText);
    console.error('encrypt 16进制 plainText: '+ buffer.from(encryptText.data).toString('hex'));
    console.error('encrypt base64 plainText: '+ base64.encodeToStringSync(encryptText.data));
    console.error('encrypt plainText: '+ buffer.from(encryptText.data).toString('hex'));

    let decryptText = decryptMessage(symKey, encryptText);
    console.error('decrypt plainText: '+ buffer.from(decryptText.data).toString('utf-8'));
    console.error('decrypt ok'+ decryptText.data.toString());
  } catch (error){
    console.error(JSON.stringify(error));
  }
}

更多关于HarmonyOS鸿蒙Next中解密文件流的实战系列教程也可以访问 https://www.itying.com/category-93-b0.html


在HarmonyOS鸿蒙Next中解密文件流,可以通过使用@ohos.cryptoFramework模块提供的加密解密API来实现。首先,需要创建一个对称密钥生成器或非对称密钥生成器,然后使用该密钥进行解密操作。以下是一个简单的示例流程:

  1. 创建密钥生成器: 使用cryptoFramework.createSymKeyGeneratorcryptoFramework.createAsymKeyGenerator创建密钥生成器。

  2. 生成密钥: 通过密钥生成器的generateKeyPairgenerateSymKey方法生成密钥。

  3. 创建解密器: 使用cryptoFramework.createCipher创建解密器,并指定解密算法(如AESRSA等)。

  4. 初始化解密器: 调用解密器的init方法,传入生成的密钥和解密模式。

  5. 解密文件流: 使用解密器的update方法逐步解密文件流,最后调用doFinal完成解密。

示例代码片段:

import cryptoFramework from '@ohos.cryptoFramework';

// 创建对称密钥生成器
let symKeyGenerator = cryptoFramework.createSymKeyGenerator('AES128');

// 生成对称密钥
let symKey = symKeyGenerator.generateSymKey();

// 创建解密器
let cipher = cryptoFramework.createCipher('AES128|ECB|PKCS7');

// 初始化解密器
cipher.init(cryptoFramework.CryptoMode.DECRYPT_MODE, symKey, null);

// 解密文件流
let decryptData = cipher.update(encryptedData);
decryptData = decryptData.concat(cipher.doFinal());

在HarmonyOS鸿蒙Next中解密文件流,通常涉及使用系统提供的加密解密API。首先,确保已配置正确的解密密钥和算法。然后,通过FileInputStream读取加密文件流,使用Cipher类进行解密操作。解密后的数据可以通过FileOutputStream写入目标文件。以下是一个简单的示例代码:

import ohos.security.Cipher;
import java.io.FileInputStream;
import java.io.FileOutputStream;

public class FileDecryption {
    public static void decryptFile(String encryptedFilePath, String decryptedFilePath, byte[] key) {
        try (FileInputStream fis = new FileInputStream(encryptedFilePath);
             FileOutputStream fos = new FileOutputStream(decryptedFilePath)) {
            Cipher cipher = Cipher.getInstance("AES");
            cipher.init(Cipher.DECRYPT_MODE, key);
            byte[] buffer = new byte[1024];
            int bytesRead;
            while ((bytesRead = fis.read(buffer)) != -1) {
                byte[] decryptedBytes = cipher.update(buffer, 0, bytesRead);
                fos.write(decryptedBytes);
            }
            byte[] finalBytes = cipher.doFinal();
            fos.write(finalBytes);
        } catch (Exception e) {
            e.printStackTrace();
        }
    }
}

确保在config.json中声明必要的权限,并处理可能的异常。

回到顶部