From 828641ce9d4178bbff9030ad19ce93d0267f185c Mon Sep 17 00:00:00 2001
From: skyouc
Date: 星期三, 17 九月 2025 08:36:42 +0800
Subject: [PATCH] no message
---
zy-asrs-framework/src/main/java/com/zy/asrs/framework/common/AesUtils.java | 162 +++++++++++++++++++++++++++---------------------------
1 files changed, 81 insertions(+), 81 deletions(-)
diff --git a/zy-asrs-framework/src/main/java/com/zy/asrs/framework/common/AesUtils.java b/zy-asrs-framework/src/main/java/com/zy/asrs/framework/common/AesUtils.java
index 3ff908a..f08a524 100644
--- a/zy-asrs-framework/src/main/java/com/zy/asrs/framework/common/AesUtils.java
+++ b/zy-asrs-framework/src/main/java/com/zy/asrs/framework/common/AesUtils.java
@@ -1,81 +1,81 @@
-package com.zy.asrs.framework.common;
-
-import javax.crypto.Cipher;
-import javax.crypto.spec.SecretKeySpec;
-
-
-/**
- * aes128-base64
- * @author Vincent
- */
-public class AesUtils {
-
- private final static String DEFAULT_CHARSET = "utf-8";
- private final static int DEFAULT_KEY_LENGTH = 16;
-
- /**
- * aes128 - base64 鍔犲瘑
- * @param data 闇�瑕佸姞瀵嗙殑鏄庢枃
- * @param key 鐩�
- * @return 瀵嗘枃
- */
- public static String encrypt(String data, String key) {
- try {
- if (null == key || "".equals(key) || key.length() != DEFAULT_KEY_LENGTH) {
- return null;
- }
- byte[] raw = key.getBytes(DEFAULT_CHARSET);
- SecretKeySpec skeySpec = new SecretKeySpec(raw, "AES");
- Cipher cipher = Cipher.getInstance("AES/ECB/PKCS5Padding");//"绠楁硶/妯″紡/琛ョ爜鏂瑰紡"
- cipher.init(Cipher.ENCRYPT_MODE, skeySpec);
- byte[] encrypted = cipher.doFinal(data.getBytes(DEFAULT_CHARSET));
- return RadixTools.bytesToHexStr(encrypted);
- } catch (Exception ex) {
- return null;
- }
-
- }
-
- /**
- * aes128 - base64 瑙e瘑
- * @param data 闇�瑕佽В瀵嗙殑瀵嗘枃
- * @param key 鐩�
- * @return 鏄庢枃
- */
- public static String decrypt(String data, String key) {
- try {
- if (null == key || "".equals(key) || key.length() != DEFAULT_KEY_LENGTH) {
- return null;
- }
- byte[] raw = key.getBytes(DEFAULT_CHARSET);
- SecretKeySpec skeySpec = new SecretKeySpec(raw, "AES");
- Cipher cipher = Cipher.getInstance("AES/ECB/PKCS5Padding");
- cipher.init(Cipher.DECRYPT_MODE, skeySpec);
- byte[] original = cipher.doFinal(RadixTools.hexStringToBytes(data));
- return new String(original,DEFAULT_CHARSET);
- } catch (Exception ex) {
- return null;
- }
- }
-
- public static void main(String[] args) {
- //test
- String key = "123456";
-// String jsonData = "json={\"status\":200,\"msg\":\"success\",\"data\":\"dsadsa\"}×tamp=" + String.valueOf(System.currentTimeMillis()+5000000L);
-//// String jsonData = "status=200&msg=xltys1995==sadsadsad×tamp=" + String.valueOf(System.currentTimeMillis()+5000000L);
-// System.out.println(System.currentTimeMillis() + 5000000L);
-// String encrypt = encrypt(key, jsonData);
-// System.out.println(encrypt);
-// String key = "QeCB1d74ab24482b";
-// String s = decrypt("bd064484343cde2d325693c0611c157d04294ae2cea03854d10a2f0aa01377cfc69cf6c700ae665c8f4c539d030bb2af"
-// , key);
-// System.out.printf(s);
-
-
- String data = "15988786205×tamp=" + (System.currentTimeMillis() + 5000000L);
-// String jsonData = "status=200&msg=xltys1995==sadsadsad×tamp=" + String.valueOf(System.currentTimeMillis()+5000000L);
- System.out.println(System.currentTimeMillis() + 5000000L);
- String encrypt = encrypt(data,key);
- System.out.println(encrypt);
- }
-}
+package com.zy.asrs.framework.common;
+
+import javax.crypto.Cipher;
+import javax.crypto.spec.SecretKeySpec;
+
+
+/**
+ * aes128-base64
+ * @author Vincent
+ */
+public class AesUtils {
+
+ private final static String DEFAULT_CHARSET = "utf-8";
+ private final static int DEFAULT_KEY_LENGTH = 16;
+
+ /**
+ * aes128 - base64 鍔犲瘑
+ * @param data 闇�瑕佸姞瀵嗙殑鏄庢枃
+ * @param key 鐩�
+ * @return 瀵嗘枃
+ */
+ public static String encrypt(String data, String key) {
+ try {
+ if (null == key || "".equals(key) || key.length() != DEFAULT_KEY_LENGTH) {
+ return null;
+ }
+ byte[] raw = key.getBytes(DEFAULT_CHARSET);
+ SecretKeySpec skeySpec = new SecretKeySpec(raw, "AES");
+ Cipher cipher = Cipher.getInstance("AES/ECB/PKCS5Padding");//"绠楁硶/妯″紡/琛ョ爜鏂瑰紡"
+ cipher.init(Cipher.ENCRYPT_MODE, skeySpec);
+ byte[] encrypted = cipher.doFinal(data.getBytes(DEFAULT_CHARSET));
+ return RadixTools.bytesToHexStr(encrypted);
+ } catch (Exception ex) {
+ return null;
+ }
+
+ }
+
+ /**
+ * aes128 - base64 瑙e瘑
+ * @param data 闇�瑕佽В瀵嗙殑瀵嗘枃
+ * @param key 鐩�
+ * @return 鏄庢枃
+ */
+ public static String decrypt(String data, String key) {
+ try {
+ if (null == key || "".equals(key) || key.length() != DEFAULT_KEY_LENGTH) {
+ return null;
+ }
+ byte[] raw = key.getBytes(DEFAULT_CHARSET);
+ SecretKeySpec skeySpec = new SecretKeySpec(raw, "AES");
+ Cipher cipher = Cipher.getInstance("AES/ECB/PKCS5Padding");
+ cipher.init(Cipher.DECRYPT_MODE, skeySpec);
+ byte[] original = cipher.doFinal(RadixTools.hexStringToBytes(data));
+ return new String(original,DEFAULT_CHARSET);
+ } catch (Exception ex) {
+ return null;
+ }
+ }
+
+ public static void main(String[] args) {
+ //test
+ String key = "123456";
+// String jsonData = "json={\"status\":200,\"msg\":\"success\",\"data\":\"dsadsa\"}×tamp=" + String.valueOf(System.currentTimeMillis()+5000000L);
+//// String jsonData = "status=200&msg=xltys1995==sadsadsad×tamp=" + String.valueOf(System.currentTimeMillis()+5000000L);
+// System.out.println(System.currentTimeMillis() + 5000000L);
+// String encrypt = encrypt(key, jsonData);
+// System.out.println(encrypt);
+// String key = "QeCB1d74ab24482b";
+// String s = decrypt("bd064484343cde2d325693c0611c157d04294ae2cea03854d10a2f0aa01377cfc69cf6c700ae665c8f4c539d030bb2af"
+// , key);
+// System.out.printf(s);
+
+
+ String data = "15988786205×tamp=" + (System.currentTimeMillis() + 5000000L);
+// String jsonData = "status=200&msg=xltys1995==sadsadsad×tamp=" + String.valueOf(System.currentTimeMillis()+5000000L);
+ System.out.println(System.currentTimeMillis() + 5000000L);
+ String encrypt = encrypt(data,key);
+ System.out.println(encrypt);
+ }
+}
--
Gitblit v1.9.1