From c635d78b479510ebe2556a420948effcd30a0731 Mon Sep 17 00:00:00 2001 From: skyouc Date: 星期六, 21 十二月 2024 18:40:43 +0800 Subject: [PATCH] 新建德森项目分支 --- zy-asrs-framework/src/main/java/com/zy/asrs/framework/common/AesUtils.java | 162 +++++++++++++++++++++++++++--------------------------- 1 files changed, 81 insertions(+), 81 deletions(-) diff --git a/zy-asrs-framework/src/main/java/com/zy/asrs/framework/common/AesUtils.java b/zy-asrs-framework/src/main/java/com/zy/asrs/framework/common/AesUtils.java index 3ff908a..f08a524 100644 --- a/zy-asrs-framework/src/main/java/com/zy/asrs/framework/common/AesUtils.java +++ b/zy-asrs-framework/src/main/java/com/zy/asrs/framework/common/AesUtils.java @@ -1,81 +1,81 @@ -package com.zy.asrs.framework.common; - -import javax.crypto.Cipher; -import javax.crypto.spec.SecretKeySpec; - - -/** - * aes128-base64 - * @author Vincent - */ -public class AesUtils { - - private final static String DEFAULT_CHARSET = "utf-8"; - private final static int DEFAULT_KEY_LENGTH = 16; - - /** - * aes128 - base64 鍔犲瘑 - * @param data 闇�瑕佸姞瀵嗙殑鏄庢枃 - * @param key 鐩� - * @return 瀵嗘枃 - */ - public static String encrypt(String data, String key) { - try { - if (null == key || "".equals(key) || key.length() != DEFAULT_KEY_LENGTH) { - return null; - } - byte[] raw = key.getBytes(DEFAULT_CHARSET); - SecretKeySpec skeySpec = new SecretKeySpec(raw, "AES"); - Cipher cipher = Cipher.getInstance("AES/ECB/PKCS5Padding");//"绠楁硶/妯″紡/琛ョ爜鏂瑰紡" - cipher.init(Cipher.ENCRYPT_MODE, skeySpec); - byte[] encrypted = cipher.doFinal(data.getBytes(DEFAULT_CHARSET)); - return RadixTools.bytesToHexStr(encrypted); - } catch (Exception ex) { - return null; - } - - } - - /** - * aes128 - base64 瑙e瘑 - * @param data 闇�瑕佽В瀵嗙殑瀵嗘枃 - * @param key 鐩� - * @return 鏄庢枃 - */ - public static String decrypt(String data, String key) { - try { - if (null == key || "".equals(key) || key.length() != DEFAULT_KEY_LENGTH) { - return null; - } - byte[] raw = key.getBytes(DEFAULT_CHARSET); - SecretKeySpec skeySpec = new SecretKeySpec(raw, "AES"); - Cipher cipher = Cipher.getInstance("AES/ECB/PKCS5Padding"); - cipher.init(Cipher.DECRYPT_MODE, skeySpec); - byte[] original = cipher.doFinal(RadixTools.hexStringToBytes(data)); - return new String(original,DEFAULT_CHARSET); - } catch (Exception ex) { - return null; - } - } - - public static void main(String[] args) { - //test - String key = "123456"; -// String jsonData = "json={\"status\":200,\"msg\":\"success\",\"data\":\"dsadsa\"}×tamp=" + String.valueOf(System.currentTimeMillis()+5000000L); -//// String jsonData = "status=200&msg=xltys1995==sadsadsad×tamp=" + String.valueOf(System.currentTimeMillis()+5000000L); -// System.out.println(System.currentTimeMillis() + 5000000L); -// String encrypt = encrypt(key, jsonData); -// System.out.println(encrypt); -// String key = "QeCB1d74ab24482b"; -// String s = decrypt("bd064484343cde2d325693c0611c157d04294ae2cea03854d10a2f0aa01377cfc69cf6c700ae665c8f4c539d030bb2af" -// , key); -// System.out.printf(s); - - - String data = "15988786205×tamp=" + (System.currentTimeMillis() + 5000000L); -// String jsonData = "status=200&msg=xltys1995==sadsadsad×tamp=" + String.valueOf(System.currentTimeMillis()+5000000L); - System.out.println(System.currentTimeMillis() + 5000000L); - String encrypt = encrypt(data,key); - System.out.println(encrypt); - } -} +package com.zy.asrs.framework.common; + +import javax.crypto.Cipher; +import javax.crypto.spec.SecretKeySpec; + + +/** + * aes128-base64 + * @author Vincent + */ +public class AesUtils { + + private final static String DEFAULT_CHARSET = "utf-8"; + private final static int DEFAULT_KEY_LENGTH = 16; + + /** + * aes128 - base64 鍔犲瘑 + * @param data 闇�瑕佸姞瀵嗙殑鏄庢枃 + * @param key 鐩� + * @return 瀵嗘枃 + */ + public static String encrypt(String data, String key) { + try { + if (null == key || "".equals(key) || key.length() != DEFAULT_KEY_LENGTH) { + return null; + } + byte[] raw = key.getBytes(DEFAULT_CHARSET); + SecretKeySpec skeySpec = new SecretKeySpec(raw, "AES"); + Cipher cipher = Cipher.getInstance("AES/ECB/PKCS5Padding");//"绠楁硶/妯″紡/琛ョ爜鏂瑰紡" + cipher.init(Cipher.ENCRYPT_MODE, skeySpec); + byte[] encrypted = cipher.doFinal(data.getBytes(DEFAULT_CHARSET)); + return RadixTools.bytesToHexStr(encrypted); + } catch (Exception ex) { + return null; + } + + } + + /** + * aes128 - base64 瑙e瘑 + * @param data 闇�瑕佽В瀵嗙殑瀵嗘枃 + * @param key 鐩� + * @return 鏄庢枃 + */ + public static String decrypt(String data, String key) { + try { + if (null == key || "".equals(key) || key.length() != DEFAULT_KEY_LENGTH) { + return null; + } + byte[] raw = key.getBytes(DEFAULT_CHARSET); + SecretKeySpec skeySpec = new SecretKeySpec(raw, "AES"); + Cipher cipher = Cipher.getInstance("AES/ECB/PKCS5Padding"); + cipher.init(Cipher.DECRYPT_MODE, skeySpec); + byte[] original = cipher.doFinal(RadixTools.hexStringToBytes(data)); + return new String(original,DEFAULT_CHARSET); + } catch (Exception ex) { + return null; + } + } + + public static void main(String[] args) { + //test + String key = "123456"; +// String jsonData = "json={\"status\":200,\"msg\":\"success\",\"data\":\"dsadsa\"}×tamp=" + String.valueOf(System.currentTimeMillis()+5000000L); +//// String jsonData = "status=200&msg=xltys1995==sadsadsad×tamp=" + String.valueOf(System.currentTimeMillis()+5000000L); +// System.out.println(System.currentTimeMillis() + 5000000L); +// String encrypt = encrypt(key, jsonData); +// System.out.println(encrypt); +// String key = "QeCB1d74ab24482b"; +// String s = decrypt("bd064484343cde2d325693c0611c157d04294ae2cea03854d10a2f0aa01377cfc69cf6c700ae665c8f4c539d030bb2af" +// , key); +// System.out.printf(s); + + + String data = "15988786205×tamp=" + (System.currentTimeMillis() + 5000000L); +// String jsonData = "status=200&msg=xltys1995==sadsadsad×tamp=" + String.valueOf(System.currentTimeMillis()+5000000L); + System.out.println(System.currentTimeMillis() + 5000000L); + String encrypt = encrypt(data,key); + System.out.println(encrypt); + } +} -- Gitblit v1.9.1