我正在用 Java 编写一个开源的 iOS 移动设备管理模块。为此,我指的是 Apple 在 [1] 处提供的 Ruby 代码。我已经设置好了,它对我来说很好用。现在我需要将此代码转换为 Java。到目前为止,我已经完成了 PKIOperation 的工作。在 PKI 操作中,我得到“SCEP 服务器返回无效响应”,我认为这是由于我在 PKIOperation 时向设备发送的错误响应。
但是,当我在互联网上进行搜索时,我发现这与“maxHttpHeaderSize”有关,因为我将服务器用作 Apache Tomcat。虽然我增加了它,因为它仍然没有得到解决。
这是我需要转换的代码 - 取自 Apple 提供的 Ruby 脚本
if query['operation'] == "PKIOperation"
p7sign = OpenSSL::PKCS7::PKCS7.new(req.body)
store = OpenSSL::X509::Store.new
p7sign.verify(nil, store, nil, OpenSSL::PKCS7::NOVERIFY)
signers = p7sign.signers
p7enc = OpenSSL::PKCS7::PKCS7.new(p7sign.data)
csr = p7enc.decrypt(@@ra_key, @@ra_cert)
cert = issueCert(csr, 1)
degenerate_pkcs7 = OpenSSL::PKCS7::PKCS7.new()
degenerate_pkcs7.type="signed"
degenerate_pkcs7.certificates=[cert]
enc_cert = OpenSSL::PKCS7.encrypt(p7sign.certificates, degenerate_pkcs7.to_der,
OpenSSL::Cipher::Cipher::new("des-ede3-cbc"), OpenSSL::PKCS7::BINARY)
reply = OpenSSL::PKCS7.sign(@@ra_cert, @@ra_key, enc_cert.to_der, [], OpenSSL::PKCS7::BINARY)
res['Content-Type'] = "application/x-pki-message"
res.body = reply.to_der
end
这就是我使用 Bouncycastle 库在 Java 中编写它的方式。
X509Certificate generatedCertificate = generateCertificateFromCSR(
privateKeyCA, certRequest, certCA.getIssuerX500Principal()
.getName());
CMSTypedData msg = new CMSProcessableByteArray(
generatedCertificate.getEncoded());
CMSEnvelopedDataGenerator edGen = new CMSEnvelopedDataGenerator();
edGen.addRecipientInfoGenerator(new JceKeyTransRecipientInfoGenerator(
receivedCert).setProvider(AppConfigurations.PROVIDER));
CMSEnvelopedData envelopedData = edGen
.generate(
msg,
new JceCMSContentEncryptorBuilder(
CMSAlgorithm.DES_EDE3_CBC).setProvider(
AppConfigurations.PROVIDER).build());
CMSSignedDataGenerator gen = new CMSSignedDataGenerator();
ContentSigner sha1Signer = new JcaContentSignerBuilder(
AppConfigurations.SIGNATUREALGO).setProvider(
AppConfigurations.PROVIDER).build(privateKeyRA);
List<X509Certificate> certList = new ArrayList<X509Certificate>();
CMSTypedData cmsByteArray = new CMSProcessableByteArray(
envelopedData.getEncoded());
certList.add(certRA);
Store certs = new JcaCertStore(certList);
gen.addSignerInfoGenerator(new JcaSignerInfoGeneratorBuilder(
new JcaDigestCalculatorProviderBuilder().setProvider(
AppConfigurations.PROVIDER).build()).build(
sha1Signer, certRA));
gen.addCertificates(certs);
CMSSignedData sigData = gen.generate(cmsByteArray, true);
return sigData.getEncoded();
此处返回的结果将输出到内容类型为“application/x-pki-message”的servlet 输出流中。
看来我正确地获得了 CSR,并使用以下代码生成了 X509Certificate。
public static X509Certificate generateCertificateFromCSR(
PrivateKey privateKey, PKCS10CertificationRequest request,
String issueSubject) throws Exception {
Calendar targetDate1 = Calendar.getInstance();
targetDate1.setTime(new Date());
targetDate1.add(Calendar.DAY_OF_MONTH, -1);
Calendar targetDate2 = Calendar.getInstance();
targetDate2.setTime(new Date());
targetDate2.add(Calendar.YEAR, 2);
// yesterday
Date validityBeginDate = targetDate1.getTime();
// in 2 years
Date validityEndDate = targetDate2.getTime();
X509v3CertificateBuilder certGen = new X509v3CertificateBuilder(
new X500Name(issueSubject), BigInteger.valueOf(System
.currentTimeMillis()), validityBeginDate,
validityEndDate, request.getSubject(),
request.getSubjectPublicKeyInfo());
certGen.addExtension(X509Extension.keyUsage, true, new KeyUsage(
KeyUsage.digitalSignature | KeyUsage.keyEncipherment));
ContentSigner sigGen = new JcaContentSignerBuilder(
AppConfigurations.SHA256_RSA).setProvider(
AppConfigurations.PROVIDER).build(privateKey);
X509Certificate issuedCert = new JcaX509CertificateConverter()
.setProvider(AppConfigurations.PROVIDER).getCertificate(
certGen.build(sigGen));
return issuedCert;
}
生成的证书通用名称是,
通用名称:mdm(88094024-2372-4c9f-9c87-fa814011c525)
颁发者:mycompany 根 CA (93a7d1a0-130b-42b8-bbd6-728f7c1837cf),无