From d0226747665355acecd5b4f2b5c0beb020586729 Mon Sep 17 00:00:00 2001
From: skyouc
Date: 星期五, 17 一月 2025 15:37:32 +0800
Subject: [PATCH] # 23. PDA拣货单据,勾选或点击确认按钮后,完成当前单据 (已完成) 24. PDA出库成功后,界面数据重置,避免重复操作  (已修复) 25. PDA接口请求,添加一个Loading遮档  (已修复) 27. 非平库单据,在平库可做入库操作  (已修复) 28. 平库已组拖数据,组拖完成后依然可组拖  (已修复) 29. 平库入库后,订单明细没有添加(已修复) 30. 平库入库后,单据类型没有修改(已修复) 31. 没有绑定播种位,不能进行播种,前后端都需加判定(已修复) 33. 平库入库未修改入库已完成数量(已修复) 34. cacheSite缓存站点逻辑需重新梳理,入库生成波次时(已完成) 35. PDA添加发货确认,默认全选 (已修复) 36. 大屏获取任务时,是由容器到达的拖盘码确认通知 (已修复) 37. 拣货单序号不显示 问题修复 (已修复) 42. pda发货确认,添加不同颜色区分是否全部完成拣货,绿色全部拣货完成,红色完成部分拣货(已修复) 43. CTU入库完成后,订单明细没有删除,执行中数量清空(已修复) 44. 平库入库完成后,历史档明细完成数量没有更新 (已修复) 45. PDA料号不显示  (已修复) 46. 发货完成后,波次管理数据未加入历史档 (已修复)

---
 zy-asrs-framework/src/main/java/com/zy/asrs/framework/common/AesUtils.java |  162 +++++++++++++++++++++++++++---------------------------
 1 files changed, 81 insertions(+), 81 deletions(-)

diff --git a/zy-asrs-framework/src/main/java/com/zy/asrs/framework/common/AesUtils.java b/zy-asrs-framework/src/main/java/com/zy/asrs/framework/common/AesUtils.java
index 3ff908a..f08a524 100644
--- a/zy-asrs-framework/src/main/java/com/zy/asrs/framework/common/AesUtils.java
+++ b/zy-asrs-framework/src/main/java/com/zy/asrs/framework/common/AesUtils.java
@@ -1,81 +1,81 @@
-package com.zy.asrs.framework.common;
-
-import javax.crypto.Cipher;
-import javax.crypto.spec.SecretKeySpec;
-
-
-/**
- * aes128-base64
- * @author Vincent
- */
-public class AesUtils {
-
-    private final static String DEFAULT_CHARSET = "utf-8";
-    private final static int DEFAULT_KEY_LENGTH = 16;
-
-    /**
-     * aes128 - base64 鍔犲瘑
-     * @param data  闇�瑕佸姞瀵嗙殑鏄庢枃
-     * @param key   鐩�
-     * @return   瀵嗘枃
-     */
-    public static String encrypt(String data, String key) {
-        try {
-            if (null == key || "".equals(key) || key.length() != DEFAULT_KEY_LENGTH) {
-                return null;
-            }
-            byte[] raw = key.getBytes(DEFAULT_CHARSET);
-            SecretKeySpec skeySpec = new SecretKeySpec(raw, "AES");
-            Cipher cipher = Cipher.getInstance("AES/ECB/PKCS5Padding");//"绠楁硶/妯″紡/琛ョ爜鏂瑰紡"
-            cipher.init(Cipher.ENCRYPT_MODE, skeySpec);
-            byte[] encrypted = cipher.doFinal(data.getBytes(DEFAULT_CHARSET));
-            return RadixTools.bytesToHexStr(encrypted);
-        } catch (Exception ex) {
-            return null;
-        }
-
-    }
-
-    /**
-     * aes128 - base64 瑙e瘑
-     * @param data  闇�瑕佽В瀵嗙殑瀵嗘枃
-     * @param key   鐩�
-     * @return   鏄庢枃
-     */
-    public static String decrypt(String data, String key) {
-        try {
-            if (null == key || "".equals(key) || key.length() != DEFAULT_KEY_LENGTH) {
-                return null;
-            }
-            byte[] raw = key.getBytes(DEFAULT_CHARSET);
-            SecretKeySpec skeySpec = new SecretKeySpec(raw, "AES");
-            Cipher cipher = Cipher.getInstance("AES/ECB/PKCS5Padding");
-            cipher.init(Cipher.DECRYPT_MODE, skeySpec);
-            byte[] original = cipher.doFinal(RadixTools.hexStringToBytes(data));
-            return new String(original,DEFAULT_CHARSET);
-        } catch (Exception ex) {
-            return null;
-        }
-    }
-
-    public static void main(String[] args) {
-        //test
-        String key = "123456";
-//        String jsonData = "json={\"status\":200,\"msg\":\"success\",\"data\":\"dsadsa\"}&timestamp=" + String.valueOf(System.currentTimeMillis()+5000000L);
-////        String jsonData = "status=200&msg=xltys1995==sadsadsad&timestamp=" + String.valueOf(System.currentTimeMillis()+5000000L);
-//        System.out.println(System.currentTimeMillis() + 5000000L);
-//        String encrypt = encrypt(key, jsonData);
-//        System.out.println(encrypt);
-//        String key = "QeCB1d74ab24482b";
-//        String s = decrypt("bd064484343cde2d325693c0611c157d04294ae2cea03854d10a2f0aa01377cfc69cf6c700ae665c8f4c539d030bb2af"
-//                , key);
-//        System.out.printf(s);
-
-
-        String data = "15988786205&timestamp=" + (System.currentTimeMillis() + 5000000L);
-//        String jsonData = "status=200&msg=xltys1995==sadsadsad&timestamp=" + String.valueOf(System.currentTimeMillis()+5000000L);
-        System.out.println(System.currentTimeMillis() + 5000000L);
-        String encrypt = encrypt(data,key);
-        System.out.println(encrypt);
-    }
-}
+package com.zy.asrs.framework.common;
+
+import javax.crypto.Cipher;
+import javax.crypto.spec.SecretKeySpec;
+
+
+/**
+ * aes128-base64
+ * @author Vincent
+ */
+public class AesUtils {
+
+    private final static String DEFAULT_CHARSET = "utf-8";
+    private final static int DEFAULT_KEY_LENGTH = 16;
+
+    /**
+     * aes128 - base64 鍔犲瘑
+     * @param data  闇�瑕佸姞瀵嗙殑鏄庢枃
+     * @param key   鐩�
+     * @return   瀵嗘枃
+     */
+    public static String encrypt(String data, String key) {
+        try {
+            if (null == key || "".equals(key) || key.length() != DEFAULT_KEY_LENGTH) {
+                return null;
+            }
+            byte[] raw = key.getBytes(DEFAULT_CHARSET);
+            SecretKeySpec skeySpec = new SecretKeySpec(raw, "AES");
+            Cipher cipher = Cipher.getInstance("AES/ECB/PKCS5Padding");//"绠楁硶/妯″紡/琛ョ爜鏂瑰紡"
+            cipher.init(Cipher.ENCRYPT_MODE, skeySpec);
+            byte[] encrypted = cipher.doFinal(data.getBytes(DEFAULT_CHARSET));
+            return RadixTools.bytesToHexStr(encrypted);
+        } catch (Exception ex) {
+            return null;
+        }
+
+    }
+
+    /**
+     * aes128 - base64 瑙e瘑
+     * @param data  闇�瑕佽В瀵嗙殑瀵嗘枃
+     * @param key   鐩�
+     * @return   鏄庢枃
+     */
+    public static String decrypt(String data, String key) {
+        try {
+            if (null == key || "".equals(key) || key.length() != DEFAULT_KEY_LENGTH) {
+                return null;
+            }
+            byte[] raw = key.getBytes(DEFAULT_CHARSET);
+            SecretKeySpec skeySpec = new SecretKeySpec(raw, "AES");
+            Cipher cipher = Cipher.getInstance("AES/ECB/PKCS5Padding");
+            cipher.init(Cipher.DECRYPT_MODE, skeySpec);
+            byte[] original = cipher.doFinal(RadixTools.hexStringToBytes(data));
+            return new String(original,DEFAULT_CHARSET);
+        } catch (Exception ex) {
+            return null;
+        }
+    }
+
+    public static void main(String[] args) {
+        //test
+        String key = "123456";
+//        String jsonData = "json={\"status\":200,\"msg\":\"success\",\"data\":\"dsadsa\"}&timestamp=" + String.valueOf(System.currentTimeMillis()+5000000L);
+////        String jsonData = "status=200&msg=xltys1995==sadsadsad&timestamp=" + String.valueOf(System.currentTimeMillis()+5000000L);
+//        System.out.println(System.currentTimeMillis() + 5000000L);
+//        String encrypt = encrypt(key, jsonData);
+//        System.out.println(encrypt);
+//        String key = "QeCB1d74ab24482b";
+//        String s = decrypt("bd064484343cde2d325693c0611c157d04294ae2cea03854d10a2f0aa01377cfc69cf6c700ae665c8f4c539d030bb2af"
+//                , key);
+//        System.out.printf(s);
+
+
+        String data = "15988786205&timestamp=" + (System.currentTimeMillis() + 5000000L);
+//        String jsonData = "status=200&msg=xltys1995==sadsadsad&timestamp=" + String.valueOf(System.currentTimeMillis()+5000000L);
+        System.out.println(System.currentTimeMillis() + 5000000L);
+        String encrypt = encrypt(data,key);
+        System.out.println(encrypt);
+    }
+}

--
Gitblit v1.9.1