JWT-RS256非对称加密NET CORE(一)

JWT-RS256非对称加密NET CORE(一)

概要

对于JWT-对称加密和非对称加密,看了好多文章,基本上很少写到基于AspNetCore实现RS256非对称加密,在本人的GitHub上有代码示例,nuget上也可以安装。

示例下载

JWT相关基础知识,对称加密和非对称加密不太了解的朋友,网上自己去搜学习吧,在这里就不多赘述了。


 1. ** github ** ,https://github.com/Realjing/JwtBearerExtension
 2. ** nuget ** ,Install-Package AspNetCore.Authentication.JwtBearer.Extension -Version 1.0.1

调用说明

1.Startup.cs文件:


  public void ConfigureServices(IServiceCollection services)
        {          
	        //... 
            services.Configure<JwtPolicyConfiguration>(Configuration.GetSection(nameof(JwtPolicyConfiguration)));
            services.AddSingleton<IPolicyAuthorizationHandler, JwtPolicyAuthorizationHandler>();
             //...           
        }

2.ApiController.cs文件中:

         [Route("api/v1/auth")]
    public class TestsController : ControllerBase
    {
        private readonly IPolicyAuthorizationHandler _jwtHandler;
        public TestsController(IPolicyAuthorizationHandler jwtHandler)
        {
            _jwtHandler = jwtHandler;
        }

        [HttpPost]
        [Route("token")]
        //[ProducesResponseType(typeof(string), Status200OK)]
        public IActionResult GenerateJwt()
        {
            var claims = new JwtPolicyClaims
            {
                UserName = "jack",
                Roles = "administrator"
            };
            var jwt = _jwtHandler.BuildToken(claims);
            return Ok(jwt);
        }

        [HttpPost]
        [Route("token/valid")]
        //[ProducesResponseType(typeof(string), Status200OK)]
        public IActionResult ValidJwt([FromBody] Req req)
        {
            string msg;
            if (!_jwtHandler.ValidToken(req.Token, out msg))
                return BadRequest(msg);
            var handler = new JwtSecurityTokenHandler();
            var jwtToken = handler.ReadToken(req.Token) as JwtSecurityToken;
            var claims = new JwtPolicyClaims
            {
                UserName = jwtToken.Claims.First(claim => claim.Type == "UserName").Value,
                Roles = jwtToken.Claims.First(claim => claim.Type == "Roles").Value
            };
            return Ok(claims);
        }

    }

3.appsettings.json文件:

 "JwtPolicyConfiguration": {
    "Issuer": "system",
    "Audience": "everyone",
    "Expire_in": 1.0, //hour
    "PrivateKey": "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",
    "PublicKey": "MIIBCgKCAQEAxjuDg9PRCSMysOfg+E2wR9vBTuYIUrjVFNBvEKI1llD7fyyaKKvAa8+vrqSbmL9f0h1t90CCuP6MhZstfP7BsRRJK6QIIKL5uWYUhegLTttG+XCEMpRyqE7oSUh1xiLy6hkSoIScgVEItNdiQ2umDUv0HYp74nBN+gxdEQl/y+HdtdP5OrxcfLQNjggbahkrc/CgX52Ryt/u8qUJ5CRoMPulj+gKZi0pJZx/Qx+CKs5TMH0eXWiLHghFb1ckKBvtEWVWO6SRYHHsGvoWL3PVmRQCV8wd4Muzc/HjG1DT7ot4DSX8siIrKy8zWBoYOXlcSUPndhmlFX/FmdHX0cptsQIDAQAB"
  }

实现JWTRS256加密算法需要使用PHP的openssl扩展,以下是个简单的示例代码: ```php <?php // 生成JWT Token function generateToken($payload, $privateKey) { // JWT 头部 $header = array( "alg" => "RS256", "typ" => "JWT" ); // JWT 载荷 $payload = json_encode($payload); // JWT 签名 $headerEncoded = base64UrlEncode(json_encode($header)); $payloadEncoded = base64UrlEncode($payload); $data = $headerEncoded . '.' . $payloadEncoded; $signature = ''; openssl_sign($data, $signature, $privateKey, OPENSSL_ALGO_SHA256); $signatureEncoded = base64UrlEncode($signature); // JWT Token $jwtToken = $headerEncoded . '.' . $payloadEncoded . '.' . $signatureEncoded; return $jwtToken; } // 验证JWT Token function verifyToken($jwtToken, $publicKey) { $jwtParts = explode('.', $jwtToken); if (count($jwtParts) != 3) { return false; } $headerEncoded = $jwtParts[0]; $payloadEncoded = $jwtParts[1]; $signatureEncoded = $jwtParts[2]; $header = json_decode(base64UrlDecode($headerEncoded), true); if (!isset($header['alg']) || $header['alg'] !== 'RS256') { return false; } $payload = json_decode(base64UrlDecode($payloadEncoded), true); if (!$payload) { return false; } $data = $headerEncoded . '.' . $payloadEncoded; $signature = base64UrlDecode($signatureEncoded); // 验证签名 $verifyResult = openssl_verify($data, $signature, $publicKey, OPENSSL_ALGO_SHA256); if ($verifyResult === 1) { return true; } else { return false; } } // Base64 URL 编码 function base64UrlEncode($data) { $urlsafe = strtr(base64_encode($data), '+/', '-_'); return rtrim($urlsafe, '='); } // Base64 URL 解码 function base64UrlDecode($data) { $data = strtr($data, '-_', '+/'); $dataLen = strlen($data) % 4; if ($dataLen) { $data .= str_repeat('=', 4 - $dataLen); } return base64_decode($data); } // 读取私钥 $privateKey = openssl_pkey_get_private("file://path/to/private_key.pem"); // 读取公钥 $publicKey = openssl_pkey_get_public("file://path/to/public_key.pem"); // 生成Token $payload = array( "sub" => "1234567890", "name" => "John Doe", "iat" => 1516239022 ); $jwtToken = generateToken($payload, $privateKey); echo "JWT Token: " . $jwtToken . "\n"; // 验证Token $verifyResult = verifyToken($jwtToken, $publicKey); if ($verifyResult) { echo "Token 验证成功\n"; } else { echo "Token 验证失败\n"; } ``` 在以上示例代码中,`generateToken` 函数用于生成JWT Token,`verifyToken` 函数用于验证JWT Token。`base64UrlEncode` 和 `base64UrlDecode` 分别用于进行Base64 URL编码和解码。请注意,需要将私钥和公钥保存在文件中,并且需要指定正确的文件路径。
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值