有人知道windows 10 key7 KEY的CryptoID具体是什么意思么

后使用快捷导航没有帐号?
一步搞定
亲,你还没有登陆哦,无法享受到更多服务的,。如果还没有帐号,请!
查看: 28|回复: 0
最后登录在线时间0 小时威望34309 金钱582160 注册时间阅读权限200帖子精华0积分975429UID37752
OEM:SLP key的貌似CryptoID都是178:
MSDN来源的KEY,据说是RTL KEY了,CryptoID是172:
而MSDN AA来源的KEY,据说也是RTL KEY,但是CryptoID就是170了,这个我没有图片(下面图片来源于
有哪位晓得 170的RTL KEY和172的有什么不同么?请不吝赐教,谢谢!
附件: 你需要
才可以下载或查看附件。没有帐号?
苹果iphone批发,就上
Medal No.1Apache Camel: Crypto
&&&&&&&&&&&&
CryptoAvailable as of Camel 2.3 PGP Available as of Camel 2.9The Crypto
integrates the Java Cryptographic Extension into Camel, allowing simple and flexible encryption and decryption of messages using Camel's familiar marshall and unmarshal formatting mechanism. It assumes marshalling to mean encryption to cyphertext and unmarshalling to mean decryption back to the original plaintext. This data format implements only symmetric (shared-key) encryption and decyption.OptionsNameTypeDefaultDescriptionalgorithmStringDES/CBC/PKCS5PaddingThe JCE algorithm name indicating the cryptographic algorithm that will be used.algorithmParameterSpecjava.security.spec.AlgorithmParameterSpecnullA JCE AlgorithmParameterSpec used to initialize the Cipher.bufferSizeInteger4096the size of the buffer used in the signature process.cryptoProviderStringnullThe name of the JCE Security Provider that should be used.initializationVectorbyte[]nullA byte array containing the Initialization Vector that will be used to initialize the Cipher.inlinebooleanfalseFlag indicating that the configured IV should be inlined into the encrypted data stream.macAlgorithmStringnullThe JCE algorithm name indicating the Message Authentication algorithm.shouldAppendHMACbooleannullFlag indicating that a Message Authentication Code should be calculated and appended to the encrypted data.Basic UsageAt its most basic all that is required to encrypt/decrypt an exchange is a shared secret key. If one or more instances of the Crypto data format are configured with this key the format can be used to encrypt the payload in one route (or part of one) and decrypted in another. For example, using the Java DSL as follows:
In Spring the dataformat is configured first and then used in routes
Specifying the Encryption AlgorithmChanging the algorithm is a matter of supplying the JCE algorithm name. If you change the algorithm you will need to use a compatible key.
A list of the available algorithms in Java 7 is available via the .Specifying an Initialization VectorSome crypto algorithms, particularly block algorithms, require configuration with an initial block of data known as an Initialization Vector. In the JCE this is passed as an AlgorithmParameterSpec when the Cipher is initialized. To use such a vector with the CryptoDataFormat you can configure it with a byte[] containing the required data e.g.
or with spring, suppling a reference to a byte[]
The same vector is required in both the encryption and decryption phases. As it is not necessary to keep the IV a secret, the DataFormat allows for it to be inlined into the encrypted data and subsequently read out in the decryption phase to initialize the Cipher. To inline the IV set the /oinline flag.
or with spring.
For more information of the use of Initialization Vectors, consultHashed Message Authentication Codes (HMAC)To avoid attacks against the encrypted data while it is in transit the CryptoDataFormat can also calculate a Message Authentication Code for the encrypted exchange contents based on a configurable MAC algorithm. The calculated HMAC is appended to the stream after encryption. It is separated from the stream in the decryption phase. The MAC is recalculated and verified against the transmitted version to insure nothing was tampered with in transit.For more information on Message Authentication Codes see
or with spring.
By default the HMAC is calculated using the HmacSHA1 mac algorithm though this can be easily changed by supplying a different algorithm name. See
for how to check what algorithms are available through the configured security providers
or with spring.
Supplying Keys DynamicallyWhen using a Recipient list or similar EIP the recipient of an exchange can vary dynamically. Using the same key across all recipients may neither be feasible or desirable. It would be useful to be able to specify keys dynamically on a per exchange basis. The exchange could then be dynamically enriched with the key of its target recipient before being processed by the data format. To facilitate this the DataFormat allow for keys to be supplied dynamically via the message headers belowCryptoDataFormat.KEY "CamelCryptoKey"
or with spring.
PGP MessageThe PGP Data Formater can create and decrypt/verify PGP Messages of the following PGP packet structure (entries in brackets are optional and ellipses indicate repetition, comma represents  sequential composition, and vertical bar separates alternatives):    Public Key Encrypted Session Key ..., Symmetrically Encrypted Data | Sym. Encrypted and Integrity Protected Data, (Compressed Data,) (One Pass Signature ...,) Literal Data, (Signature ...,)Since Camel 2.16.0 the Compressed Data packet is optional, before it was mandatory. PGPDataFormat OptionsNameTypeDefaultDescriptionkeyUseridStringnullThe user ID of the key in the PGP keyring used during encryption. See also option keyUserids. Can also be only a part of a user ID. For example, if the user ID is "Test User &&" then you can use the part "Test User" or "&&" to address the user ID.keyUseridsList&String&nullSince camel 2.12.2: PGP allows to encrypt the symmetric key by several asymmetric public receiver keys. You can specify here the User IDs or parts of User IDs of several public keys contained in the PGP keyring. If you just have one User ID, then you can also use the option keyUserid. The User ID specified in keyUserid and the User IDs in keyUserids will be merged together and the corresponding public keys will be used for the encryption.passwordStringnullPassword used when opening the private key (not used for encryption).keyFileNameStringnullFil must be accessible as a classpath resource (but you can specify a location in the file system by using the "file:" prefix).encryptionKeyRingbyte[]nullSince camel 2.12.1: you can not set the keyFileName and encryptionKeyRing at the same time.signatureKeyUseridStringnullSince Camel 2.11.0; optional User ID of the key in the PGP keyring used for signing (during encryption) or signature verification (during decryption). During the signature verification process the specified User ID restricts the public keys from the public keyring which can be used for the verification. If no User ID is specified for the signature verficiation then any public key in the public keyring can be used for the verification. Can also be only a part of a user ID. For example, if the user ID is "Test User &&" then you can use the part "Test User" or "&&" to address the User ID.signatureKeyUseridsList&String&nullSince Camel 2.12.3: optional list of User IDs of the key in the PGP keyring used for signing (during encryption) or signature verification (during decryption). You can specify here the User IDs or parts of User IDs of several keys contained in the PGP keyring. If you just have one User ID, then you can also use the option keyUserid. The User ID specified in keyUserid and the User IDs in keyUserids will be merged together and the corresponding keys will be used for the signing or signature verification. If the specified User IDs reference several keys then for each key a signature is added to the PGP result during the encryption-signing process. In the decryption-verifying process the list of User IDs restricts the list of public keys which can be used for signature verification. If the list of User IDs is empty then any public key in the public keyring can be used for the signature verification.signaturePasswordStringnullSince Camel 2.11.0: optional password used when opening the private key used for signing (during encryption).signatureKeyFileNameStringnullSince Camel 2.11.0: optional filename of the keyring to use for signing (during encryption) or for signature verification (during decryption); must be accessible as a classpath resource (but you can specify a location in the file system by using the "file:" prefix).signatureKeyRingbyte[]nullSince camel 2.12.1: you can not set the signatureKeyFileName and signatureKeyRing at the same time.algorithmintSymmetricKeyAlgorithmTags.CAST5Since camel 2.12.2: symmetric key
possible values are defined in org.bouncycastle.bcpg.SymmetricKeyAlgorithmTags; for example 2 (= TRIPLE DES), 3 (= CAST5), 4 (= BLOWFISH), 6 (= DES), 7 (= AES_128). Only relevant for encrypting.compressionAlgorithmintCompressionAlgorithmTags.ZIPSince camel 2.12.2: c possible values are defined in org.pressionAlgorithmTags; for example 0 (= UNCOMPRESSED), 1 (= ZIP), 2 (= ZLIB), 3 (= BZIP2). Only relevant for encrypting.hashAlgorithmintHashAlgorithmTags.SHA1Since camel 2.12.2: sign possible values are defined in org.bouncycastle.bcpg.HashAlgorithmTags; for example 2 (= SHA1), 8 (= SHA256), 9 (= SHA384), 10 (= SHA512), 11 (=SHA224). Only relevant for signing.armoredbooleanfalseThis option will cause PGP to base64 encode the encrypted text, making it available for copy/paste, etc.integritybooleantrueAdds an integrity check/sign into the encryption file.passphraseAccessornullSince Camel 2.12.2: provides passphrases corresponding to user Ids. If no passpharase can be found from the option password or signaturePassword and from the headers CamelPGPDataFormatKeyPassword or CamelPGPDataFormatSignatureKeyPassword then the passphrase is fetched from the passphrase accessor. You provide a bean which implements the interface . A default implementation is given by . The passphrase accessor is especially useful see chapter 'PGP Decrypting/Verifying of Messages Encrypted/Signed by Different Private/Public Keys' below.signatureVerificationOptionString"optional"Since Camel 2.13.0: controls the behavior for verifying the signature during unmarshaling. There are three values possible:"optional": The PGP message may or may no if it does contain signatures, then a signature verification is executed. Use the constant PGPKeyAccessDataFormat.SIGNATURE_VERIFICATION_OPTION_OPTIONAL."required": The PGP message must contain at if this is not the case an exception (PGPException) is thrown. A signature verification is executed. Use the constant PGPKeyAccessDataFormat.SIGNATURE_VERIFICATION_OPTION_REQUIRED."ignore": Contained signatures in the PGP no signature verification is executed. Use the constant PGPKeyAccessDataFormat.SIGNATURE_VERIFICATION_OPTION_IGNORE."no_signature_allowed": The PGP message must not otherwise an exception (PGPException) is thrown. Use the constant PGPKeyAccessDataFormat.SIGNATURE_VERIFICATION_OPTION_NO_SIGNATURE_ALLOWED.FileNameString"_CONSOLE"Since camel 2.15.0: Sets the file name for the literal data packet. Can be overwritten by the  header {@link Exchange#FILE_NAME}."_CONSOLE" indicates that the message is considered to be "for your eyes only". This advises that the message data is unusually sensitive, and the receiving program should process it more carefully, perhaps avoiding storing the received data to disk, for example.Only used for marshaling.withCompressedDataPacketbooleantrueSince Camel 2.16.0: Indicator whether the PGP Message shall be created with or without a Compressed Data packet. If the value is set to false, then no Compressed Data packet is added and the compressionAlgorithm value is ignored. Only used for marshaling.You can override the PGPDataFormat options by applying below headers into message dynamically. NameTypeDescriptionCamelPGPDataFormatKeyFileNameStringSince Camel 2.11.0; fil will override existing setting directly on the PGPDataFormat.CamelPGPDataFormatEncryptionKeyRingbyte[]Since Camel 2.12.1; th will override existing setting directly on the PGPDataFormat.CamelPGPDataFormatKeyUseridStringSince Camel 2.11.0; the User ID of the key in the PGP will override existing setting directly on the PGPDataFormat.CamelPGPDataFormatKeyUseridsList&String&Since camel 2.12.2: the User IDs of the key in the PGP will override existing setting directly on the PGPDataFormat.CamelPGPDataFormatKeyPasswordStringSince Camel 2.11.0; password used when ope will override existing setting directly on the PGPDataFormat.CamelPGPDataFormatSignatureKeyFileNameStringSince Camel 2.11.0; filename of t will override existing setting directly on the PGPDataFormat.CamelPGPDataFormatSignatureKeyRingbyte[]Since Camel 2.12.1; t will override existing setting directly on the PGPDataFormat.CamelPGPDataFormatSignatureKeyUseridStringSince Camel 2.11.0; the User ID of the signature key in the PGP will override existing setting directly on the PGPDataFormat.CamelPGPDataFormatSignatureKeyUseridsList&String&Since Camel 2.12.3; the User IDs of the signature keys in the PGP will override existing setting directly on the PGPDataFormat.CamelPGPDataFormatSignatureKeyPasswordStringSince Camel 2.11.0; password used when opening the s will override existing setting directly on the PGPDataFormat.CamelPGPDataFormatEncryptionAlgorithmintSince Camel 2.12.2; symmetric key
will override existing setting directly on the PGPDataFormat.CamelPGPDataFormatSignatureHashAlgorithmintSince Camel 2.12.2; sign will override existing setting directly on the PGPDataFormat.CamelPGPDataFormatCompressionAlgorithmintSince Camel 2.12.2; c will override existing setting directly on the PGPDataFormat.CamelPGPDataFormatNumberOfEncryptionKeysIntegerSince Camel 2.12.3;  number of public keys used for encrypting the symmectric key, set by PGPDataFormat during encryptiion processCamelPGPDataFormatNumberOfSigningKeysIntegerSince Camel 2.12.3;  number of private keys used for creating signatures, set by PGPDataFormat during signing processEncrypting with PGPDataFormatThe following sample uses the popular PGP format for encrypting/decrypting files using the :
The following sample performs signing + encryption, and then signature verification + decryption. It uses the same keyring for both signing and encryption, but you can obviously use different keys:
Or using Spring:
To work with the previous example you need the followingA public keyring file which contains the public keys used to encrypt the dataA private keyring file which contains the keys used to decrypt the dataThe keyring passwordManaging your keyringTo manage the keyring, I use the command line tools, I find this to be the simplest approach in managing the keys. There are also Java libraries available from
if you would prefer to do it that way.Install the command line utilities on linux
Create your keyring, entering a secure password
If you need to import someone elses public key so that you can encrypt a file for them.
The following files should now exist and can be used to run the example
PGP Decrypting/Verifying of Messages Encrypted/Signed by Different Private/Public KeysSince Camel 2.12.2.A PGP Data Formater can decrypt/verify messages which have been encrypted by different public keys or signed by different private keys. Just, provide the corresponding private keys in the secret keyring, the corresponding public keys in the public keyring, and the passphrases in the passphrase accessor.
The functionality is especially useful to support the key exchange. If you want to exchange the private key for decrypting you can accept for a period of time messages which are either encrypted with the old or new corresponding public key. Or if the sender wants to exchange his signer private key, you can accept for a period of time, the old or new signer key.Technical background: The PGP encrypted data contains a Key ID of the public key which was used to encrypt the data. This Key ID can be used to locate the private key in the secret keyring to decrypt the data. The same mechanism is also used to locate the public key for verifying a signature. Therefore you no longer must specify User IDs for the unmarshaling.Restricting the Signer Identities during PGP Signature VerificationSince Camel 2.12.3.If you verify a signature you not only want to verify the correctness of the signature but you also want check that the signature comes from a certain identity or a specific set of identities. Therefore it is possible to restrict the number of public keys from the public keyring which can be used for the verification of a signature.  
If the PGP content has several signatures the verification is successful as soon as one signature can be verified.If you do not want to restrict the signer identities for verification then do not specify the signature key User IDs. In this case all public keys in the public keyring are taken into account.Several Signatures in One PGP Data FormatSince Camel 2.12.3.The PGP specification allows that one PGP data format can contain several signatures from different keys. Since Camel 2.13.3 it is possible to create such kind of PGP content via specifying signature User IDs which relate to several private keys in the secret keyring.
Support of Sub-Keys and Key Flags in PGP Data Format MarshalerSince Camel 2.12.3.An
can have a primary key and sub-keys. The usage of the keys is indicated by the so called . For example, you can have a primary key with two sub- the primary key shall only be used for certifying other keys (Key Flag 0x01), the first sub-key  shall only be used for signing (Key Flag 0x02), and the second sub-key shall only be used for encryption (Key Flag 0x04 or 0x08). The PGP Data Format marshaler takes into account these Key Flags of the primary key and sub-keys in order to determine the right key for signing and encryption. This is necessary because the primary key and its sub-keys have the same User IDs.Support of Custom Key AccessorsSince Camel 2.13.0.You can implement custom key accessors for encryption/signing. The above PGPDataFormat class selects in a certain predefined way the keys which should be used for signing/encryption or verifying/decryption. If you have special requirements how your keys should be selected you should use the
class instead and implement the interfaces
as beans. There are default implementations
which cache the keys, so that not every time the keyring is parsed when the processor is called.PGPKeyAccessDataFormat has the same options as PGPDataFormat except password, keyFileName, encryptionKeyRing, signaturePassword, signatureKeyFileName, and signatureKeyRing.DependenciesTo use the
dataformat in your camel routes you need to add the following dependency to your pom.
The Apache Software Foundation.
Apache Camel, Camel, Apache, the Apache feather logo, and the Apache Camel project logo are trademarks of The Apache Software Foundation.
All other marks mentioned may be trademarks or registered trademarks of their respective owners.

我要回帖

更多关于 crypto key 的文章

 

随机推荐