学习加密(四)spring boot 使用RSA+AES混合加密,前后端传递参数加解密

技术标签: RSA  AES  RSA AES  混合加密  整合

 

前言:
   为了提高安全性采用了RSA,但是为了解决RSA加解密性能问题,所以采用了RSA(非对称)+AES(对称加密)方式,如果只考虑其中一种的,可以去看我前面两篇文章,专门单独写的demo,可以自行整合在项目中

大致思路:

  1. 客户端启动,发送请求到服务端,服务端用RSA算法生成一对公钥和私钥,我们简称为pubkey1,prikey1,将公钥pubkey1返回给客户端。
  2. 客户端拿到服务端返回的公钥pubkey1后,自己用RSA算法生成一对公钥和私钥,我们简称为pubkey2,prikey2,并将公钥pubkey2通过公钥pubkey1加密,加密之后传输给服务端。
  3. 此时服务端收到客户端传输的密文,用私钥prikey1进行解密,因为数据是用公钥pubkey1加密的,通过解密就可以得到客户端生成的公钥pubkey2
  4. 然后自己在生成对称加密,也就是我们的AES,其实也就是相对于我们配置中的那个16的长度的加密key,生成了这个key之后我们就用公钥pubkey2进行加密,返回给客户端,因为只有客户端有pubkey2对应的私钥prikey2,只有客户端才能解密,客户端得到数据之后,用prikey2进行解密操作,得到AES的加密key,最后就用加密key进行数据传输的加密,至此整个流程结束。

具体实践(前端请求加密,服务端解密,服务端响应加密,前端解密):

1.创建spring boot项目,导入相关依赖,
2.编写RSA加解密工具类,AES加解密工具类
3.编写自定义注解(让加解密细粒度)
4.编写自定义DecodeRequestAdvice和EncodeResponseAdvice
5.创建controller
6.创建jsp或者html,引入js(加密和解密的通用js),还有配置,配置文件
ps:因为这里没https证书,所有使用http, 考虑到前后端分离,使用json来传递数据,

第一步:创建spring boot项目过程省略,相关依赖:

  1.  
    <!-- WEB依赖 -->
  2.  
    <dependency>
  3.  
    <groupId>org.springframework.boot</groupId>
  4.  
    <artifactId>spring-boot-starter-web</artifactId>
  5.  
    </dependency>
  6.  
    <dependency>
  7.  
    <groupId>org.springframework.boot</groupId>
  8.  
    <artifactId>spring-boot-starter-test</artifactId>
  9.  
    <scope>test</scope>
  10.  
    </dependency>
  11.  
    <!-- 热部署依赖 -->
  12.  
    <dependency>
  13.  
    <groupId>org.springframework.boot</groupId>
  14.  
    <artifactId>spring-boot-devtools</artifactId>
  15.  
    <optional>true</optional>
  16.  
    </dependency>
  17.  
    <!-- mysql的依赖-->
  18.  
    <dependency>
  19.  
    <groupId>mysql</groupId>
  20.  
    <artifactId>mysql-connector-java</artifactId>
  21.  
    <scope>runtime</scope>
  22.  
    </dependency>
  23.  
    <!-- get/set依赖 -->
  24.  
    <dependency>
  25.  
    <groupId>org.projectlombok</groupId>
  26.  
    <artifactId>lombok</artifactId>
  27.  
    <version>1.16.20</version>
  28.  
    </dependency>
  29.  
    <!-- 日志依赖 -->
  30.  
    <dependency>
  31.  
    <groupId>org.slf4j</groupId>
  32.  
    <artifactId>log4j-over-slf4j</artifactId>
  33.  
    </dependency>
  34.  
    <!-- 阿里巴巴druid数据源依赖 -->
  35.  
    <dependency>
  36.  
    <groupId>com.alibaba</groupId>
  37.  
    <artifactId>druid</artifactId>
  38.  
    <version>1.1.12</version>
  39.  
    </dependency>
  40.  
    <!-- Base64编码需要 -->
  41.  
    <dependency>
  42.  
    <groupId>org.apache.directory.studio</groupId>
  43.  
    <artifactId>org.apache.commons.codec</artifactId>
  44.  
    <version>1.8</version>
  45.  
    </dependency>
  46.  
    <!-- 阿里巴巴fastjson依赖 -->
  47.  
    <dependency>
  48.  
    <groupId>com.alibaba</groupId>
  49.  
    <artifactId>fastjson</artifactId>
  50.  
    <version>1.2.47</version>
  51.  
    </dependency>
  52.  
    <!-- 谷歌gson依赖 -->
  53.  
    <dependency>
  54.  
    <groupId>com.google.code.gson</groupId>
  55.  
    <artifactId>gson</artifactId>
  56.  
    <version>2.8.2</version>
  57.  
    </dependency>
  58.  
    <!-- 工具包依赖 -->
  59.  
    <dependency>
  60.  
    <groupId>org.apache.commons</groupId>
  61.  
    <artifactId>commons-lang3</artifactId>
  62.  
    <version>3.4</version>
  63.  
    </dependency>
  64.  
    <dependency>
  65.  
    <groupId>commons-io</groupId>
  66.  
    <artifactId>commons-io</artifactId>
  67.  
    <version>2.4</version>
  68.  
    </dependency>
  69.  
    <!-- 使用jasper引擎解析jsp -->
  70.  
    <dependency>
  71.  
    <groupId>org.apache.tomcat.embed</groupId>
  72.  
    <artifactId>tomcat-embed-jasper</artifactId>
  73.  
    <scope>provided</scope>
  74.  
    </dependency>
  75.  
    <!-- jsp标签库 -->
  76.  
    <dependency>
  77.  
    <groupId>javax.servlet</groupId>
  78.  
    <artifactId>jstl</artifactId>
  79.  
    </dependency>
  80.  
    <!-- servlet 依赖 -->
  81.  
    <dependency>
  82.  
    <groupId>javax.servlet</groupId>
  83.  
    <artifactId>javax.servlet-api</artifactId>
  84.  
    <scope>provided</scope>
  85.  
    </dependency>
  86.  
    <!-- 模板引擎依赖 -->
  87.  
    <dependency>
  88.  
    <groupId>org.springframework.boot</groupId>
  89.  
    <artifactId>spring-boot-starter-thymeleaf</artifactId>
  90.  
    </dependency>

第二步:

  1.  
    import javax.crypto.Cipher;
  2.  
    import javax.crypto.KeyGenerator;
  3.  
    import javax.crypto.spec.SecretKeySpec;
  4.  
     
  5.  
    import org.apache.commons.codec.binary.Base64;
  6.  
     
  7.  
     
  8.  
    /**
  9.  
    * 前后端数据传输加密工具类
  10.  
    * @author monkey
  11.  
    *
  12.  
    */
  13.  
    public class AesEncryptUtils {
  14.  
     
  15.  
    //参数分别代表 算法名称/加密模式/数据填充方式
  16.  
    private static final String ALGORITHMSTR = "AES/ECB/PKCS5Padding";
  17.  
     
  18.  
    /**
  19.  
    * 加密
  20.  
    * @param content 加密的字符串
  21.  
    * @param encryptKey key值
  22.  
    * @return
  23.  
    * @throws Exception
  24.  
    */
  25.  
    public static String encrypt(String content, String encryptKey) throws Exception {
  26.  
    KeyGenerator kgen = KeyGenerator.getInstance("AES");
  27.  
    kgen.init(128);
  28.  
    Cipher cipher = Cipher.getInstance(ALGORITHMSTR);
  29.  
    cipher.init(Cipher.ENCRYPT_MODE, new SecretKeySpec(encryptKey.getBytes(), "AES"));
  30.  
    byte[] b = cipher.doFinal(content.getBytes("utf-8"));
  31.  
    // 采用base64算法进行转码,避免出现中文乱码
  32.  
    return Base64.encodeBase64String(b);
  33.  
     
  34.  
    }
  35.  
     
  36.  
    /**
  37.  
    * 解密
  38.  
    * @param encryptStr 解密的字符串
  39.  
    * @param decryptKey 解密的key值
  40.  
    * @return
  41.  
    * @throws Exception
  42.  
    */
  43.  
    public static String decrypt(String encryptStr, String decryptKey) throws Exception {
  44.  
    KeyGenerator kgen = KeyGenerator.getInstance("AES");
  45.  
    kgen.init(128);
  46.  
    Cipher cipher = Cipher.getInstance(ALGORITHMSTR);
  47.  
    cipher.init(Cipher.DECRYPT_MODE, new SecretKeySpec(decryptKey.getBytes(), "AES"));
  48.  
    // 采用base64算法进行转码,避免出现中文乱码
  49.  
    byte[] encryptBytes = Base64.decodeBase64(encryptStr);
  50.  
    byte[] decryptBytes = cipher.doFinal(encryptBytes);
  51.  
    return new String(decryptBytes);
  52.  
    }
  53.  
    }
  1.  
    import org.apache.commons.codec.binary.Base64;
  2.  
     
  3.  
    import java.io.ByteArrayOutputStream;
  4.  
    import java.security.Key;
  5.  
    import java.security.KeyFactory;
  6.  
    import java.security.KeyPair;
  7.  
    import java.security.KeyPairGenerator;
  8.  
    import java.security.PrivateKey;
  9.  
    import java.security.PublicKey;
  10.  
    import java.security.Signature;
  11.  
    import java.security.interfaces.RSAPrivateKey;
  12.  
    import java.security.interfaces.RSAPublicKey;
  13.  
    import java.security.spec.PKCS8EncodedKeySpec;
  14.  
    import java.security.spec.X509EncodedKeySpec;
  15.  
    import java.util.HashMap;
  16.  
    import java.util.Map;
  17.  
     
  18.  
    import javax.crypto.Cipher;
  19.  
     
  20.  
    /** */
  21.  
    /**
  22.  
    * <p>
  23.  
    * RSA公钥/私钥/签名工具包
  24.  
    * </p>
  25.  
    * <p>
  26.  
    * 罗纳德·李维斯特(Ron [R]ivest)、阿迪·萨莫尔(Adi [S]hamir)和伦纳德·阿德曼(Leonard [A]dleman)
  27.  
    * </p>
  28.  
    * <p>
  29.  
    * 字符串格式的密钥在未在特殊说明情况下都为BASE64编码格式<br/>
  30.  
    * 由于非对称加密速度极其缓慢,一般文件不使用它来加密而是使用对称加密,<br/>
  31.  
    * 非对称加密算法可以用来对对称加密的密钥加密,这样保证密钥的安全也就保证了数据的安全
  32.  
    * </p>
  33.  
    *
  34.  
    * @author monkey
  35.  
    * @date 2018-10-29
  36.  
    */
  37.  
    public class RSAUtils {
  38.  
     
  39.  
    /** */
  40.  
    /**
  41.  
    * 加密算法RSA
  42.  
    */
  43.  
    public static final String KEY_ALGORITHM = "RSA";
  44.  
     
  45.  
    /** */
  46.  
    /**
  47.  
    * 签名算法
  48.  
    */
  49.  
    public static final String SIGNATURE_ALGORITHM = "MD5withRSA";
  50.  
     
  51.  
    /** */
  52.  
    /**
  53.  
    * 获取公钥的key
  54.  
    */
  55.  
    private static final String PUBLIC_KEY = "RSAPublicKey";
  56.  
     
  57.  
    /** */
  58.  
    /**
  59.  
    * 获取私钥的key
  60.  
    */
  61.  
    private static final String PRIVATE_KEY = "RSAPrivateKey";
  62.  
     
  63.  
    /** */
  64.  
    /**
  65.  
    * RSA最大加密明文大小
  66.  
    */
  67.  
    private static final int MAX_ENCRYPT_BLOCK = 117;
  68.  
     
  69.  
    /** */
  70.  
    /**
  71.  
    * RSA最大解密密文大小
  72.  
    */
  73.  
    private static final int MAX_DECRYPT_BLOCK = 128;
  74.  
     
  75.  
    /** */
  76.  
    /**
  77.  
    * RSA 位数 如果采用2048 上面最大加密和最大解密则须填写: 245 256
  78.  
    */
  79.  
    private static final int INITIALIZE_LENGTH = 1024;
  80.  
     
  81.  
    /** */
  82.  
    /**
  83.  
    * <p>
  84.  
    * 生成密钥对(公钥和私钥)
  85.  
    * </p>
  86.  
    *
  87.  
    * @return
  88.  
    * @throws Exception
  89.  
    */
  90.  
    public static Map<String, Object> genKeyPair() throws Exception {
  91.  
    KeyPairGenerator keyPairGen = KeyPairGenerator.getInstance(KEY_ALGORITHM);
  92.  
    keyPairGen.initialize(INITIALIZE_LENGTH);
  93.  
    KeyPair keyPair = keyPairGen.generateKeyPair();
  94.  
    RSAPublicKey publicKey = (RSAPublicKey) keyPair.getPublic();
  95.  
    RSAPrivateKey privateKey = (RSAPrivateKey) keyPair.getPrivate();
  96.  
    Map<String, Object> keyMap = new HashMap<String, Object>(2);
  97.  
    keyMap.put(PUBLIC_KEY, publicKey);
  98.  
    keyMap.put(PRIVATE_KEY, privateKey);
  99.  
    return keyMap;
  100.  
    }
  101.  
     
  102.  
    /** */
  103.  
    /**
  104.  
    * <p>
  105.  
    * 用私钥对信息生成数字签名
  106.  
    * </p>
  107.  
    *
  108.  
    * @param data
  109.  
    * 已加密数据
  110.  
    * @param privateKey
  111.  
    * 私钥(BASE64编码)
  112.  
    *
  113.  
    * @return
  114.  
    * @throws Exception
  115.  
    */
  116.  
    public static String sign(byte[] data, String privateKey) throws Exception {
  117.  
    byte[] keyBytes = Base64.decodeBase64(privateKey);
  118.  
    PKCS8EncodedKeySpec pkcs8KeySpec = new PKCS8EncodedKeySpec(keyBytes);
  119.  
    KeyFactory keyFactory = KeyFactory.getInstance(KEY_ALGORITHM);
  120.  
    PrivateKey privateK = keyFactory.generatePrivate(pkcs8KeySpec);
  121.  
    Signature signature = Signature.getInstance(SIGNATURE_ALGORITHM);
  122.  
    signature.initSign(privateK);
  123.  
    signature.update(data);
  124.  
    return Base64.encodeBase64String(signature.sign());
  125.  
    }
  126.  
     
  127.  
    /** */
  128.  
    /**
  129.  
    * <p>
  130.  
    * 校验数字签名
  131.  
    * </p>
  132.  
    *
  133.  
    * @param data
  134.  
    * 已加密数据
  135.  
    * @param publicKey
  136.  
    * 公钥(BASE64编码)
  137.  
    * @param sign
  138.  
    * 数字签名
  139.  
    *
  140.  
    * @return
  141.  
    * @throws Exception
  142.  
    *
  143.  
    */
  144.  
    public static boolean verify(byte[] data, String publicKey, String sign) throws Exception {
  145.  
    byte[] keyBytes = Base64.decodeBase64(publicKey);
  146.  
    X509EncodedKeySpec keySpec = new X509EncodedKeySpec(keyBytes);
  147.  
    KeyFactory keyFactory = KeyFactory.getInstance(KEY_ALGORITHM);
  148.  
    PublicKey publicK = keyFactory.generatePublic(keySpec);
  149.  
    Signature signature = Signature.getInstance(SIGNATURE_ALGORITHM);
  150.  
    signature.initVerify(publicK);
  151.  
    signature.update(data);
  152.  
    return signature.verify(Base64.decodeBase64(sign));
  153.  
    }
  154.  
     
  155.  
    /** */
  156.  
    /**
  157.  
    * <P>
  158.  
    * 私钥解密
  159.  
    * </p>
  160.  
    *
  161.  
    * @param encryptedData
  162.  
    * 已加密数据
  163.  
    * @param privateKey
  164.  
    * 私钥(BASE64编码)
  165.  
    * @return
  166.  
    * @throws Exception
  167.  
    */
  168.  
    public static byte[] decryptByPrivateKey(byte[] encryptedData, String privateKey) throws Exception {
  169.  
    byte[] keyBytes = Base64.decodeBase64(privateKey);
  170.  
    PKCS8EncodedKeySpec pkcs8KeySpec = new PKCS8EncodedKeySpec(keyBytes);
  171.  
    KeyFactory keyFactory = KeyFactory.getInstance(KEY_ALGORITHM);
  172.  
    Key privateK = keyFactory.generatePrivate(pkcs8KeySpec);
  173.  
    Cipher cipher = Cipher.getInstance(keyFactory.getAlgorithm());
  174.  
    cipher.init(Cipher.DECRYPT_MODE, privateK);
  175.  
    int inputLen = encryptedData.length;
  176.  
    ByteArrayOutputStream out = new ByteArrayOutputStream();
  177.  
    int offSet = 0;
  178.  
    byte[] cache;
  179.  
    int i = 0;
  180.  
    // 对数据分段解密
  181.  
    while (inputLen - offSet > 0) {
  182.  
    if (inputLen - offSet > MAX_DECRYPT_BLOCK) {
  183.  
    cache = cipher.doFinal(encryptedData, offSet, MAX_DECRYPT_BLOCK);
  184.  
    } else {
  185.  
    cache = cipher.doFinal(encryptedData, offSet, inputLen - offSet);
  186.  
    }
  187.  
    out.write(cache, 0, cache.length);
  188.  
    i++;
  189.  
    offSet = i * MAX_DECRYPT_BLOCK;
  190.  
    }
  191.  
    byte[] decryptedData = out.toByteArray();
  192.  
    out.close();
  193.  
    return decryptedData;
  194.  
    }
  195.  
     
  196.  
    /** */
  197.  
    /**
  198.  
    * <p>
  199.  
    * 公钥解密
  200.  
    * </p>
  201.  
    *
  202.  
    * @param encryptedData
  203.  
    * 已加密数据
  204.  
    * @param publicKey
  205.  
    * 公钥(BASE64编码)
  206.  
    * @return
  207.  
    * @throws Exception
  208.  
    */
  209.  
    public static byte[] decryptByPublicKey(byte[] encryptedData, String publicKey) throws Exception {
  210.  
    byte[] keyBytes = Base64.decodeBase64(publicKey);
  211.  
    X509EncodedKeySpec x509KeySpec = new X509EncodedKeySpec(keyBytes);
  212.  
    KeyFactory keyFactory = KeyFactory.getInstance(KEY_ALGORITHM);
  213.  
    Key publicK = keyFactory.generatePublic(x509KeySpec);
  214.  
    Cipher cipher = Cipher.getInstance(keyFactory.getAlgorithm());
  215.  
    cipher.init(Cipher.DECRYPT_MODE, publicK);
  216.  
    int inputLen = encryptedData.length;
  217.  
    ByteArrayOutputStream out = new ByteArrayOutputStream();
  218.  
    int offSet = 0;
  219.  
    byte[] cache;
  220.  
    int i = 0;
  221.  
    // 对数据分段解密
  222.  
    while (inputLen - offSet > 0) {
  223.  
    if (inputLen - offSet > MAX_DECRYPT_BLOCK) {
  224.  
    cache = cipher.doFinal(encryptedData, offSet, MAX_DECRYPT_BLOCK);
  225.  
    } else {
  226.  
    cache = cipher.doFinal(encryptedData, offSet, inputLen - offSet);
  227.  
    }
  228.  
    out.write(cache, 0, cache.length);
  229.  
    i++;
  230.  
    offSet = i * MAX_DECRYPT_BLOCK;
  231.  
    }
  232.  
    byte[] decryptedData = out.toByteArray();
  233.  
    out.close();
  234.  
    return decryptedData;
  235.  
    }
  236.  
     
  237.  
    /** */
  238.  
    /**
  239.  
    * <p>
  240.  
    * 公钥加密
  241.  
    * </p>
  242.  
    *
  243.  
    * @param data
  244.  
    * 源数据
  245.  
    * @param publicKey
  246.  
    * 公钥(BASE64编码)
  247.  
    * @return
  248.  
    * @throws Exception
  249.  
    */
  250.  
    public static byte[] encryptByPublicKey(byte[] data, String publicKey) throws Exception {
  251.  
    byte[] keyBytes = Base64.decodeBase64(publicKey);
  252.  
    X509EncodedKeySpec x509KeySpec = new X509EncodedKeySpec(keyBytes);
  253.  
    KeyFactory keyFactory = KeyFactory.getInstance(KEY_ALGORITHM);
  254.  
    Key publicK = keyFactory.generatePublic(x509KeySpec);
  255.  
    // 对数据加密
  256.  
    Cipher cipher = Cipher.getInstance(keyFactory.getAlgorithm());
  257.  
    cipher.init(Cipher.ENCRYPT_MODE, publicK);
  258.  
    int inputLen = data.length;
  259.  
    ByteArrayOutputStream out = new ByteArrayOutputStream();
  260.  
    int offSet = 0;
  261.  
    byte[] cache;
  262.  
    int i = 0;
  263.  
    // 对数据分段加密
  264.  
    while (inputLen - offSet > 0) {
  265.  
    if (inputLen - offSet > MAX_ENCRYPT_BLOCK) {
  266.  
    cache = cipher.doFinal(data, offSet, MAX_ENCRYPT_BLOCK);
  267.  
    } else {
  268.  
    cache = cipher.doFinal(data, offSet, inputLen - offSet);
  269.  
    }
  270.  
    out.write(cache, 0, cache.length);
  271.  
    i++;
  272.  
    offSet = i * MAX_ENCRYPT_BLOCK;
  273.  
    }
  274.  
    byte[] encryptedData = out.toByteArray();
  275.  
    out.close();
  276.  
    return encryptedData;
  277.  
    }
  278.  
     
  279.  
    /** */
  280.  
    /**
  281.  
    * <p>
  282.  
    * 私钥加密
  283.  
    * </p>
  284.  
    *
  285.  
    * @param data
  286.  
    * 源数据
  287.  
    * @param privateKey
  288.  
    * 私钥(BASE64编码)
  289.  
    * @return
  290.  
    * @throws Exception
  291.  
    */
  292.  
    public static byte[] encryptByPrivateKey(byte[] data, String privateKey) throws Exception {
  293.  
    byte[] keyBytes = Base64.decodeBase64(privateKey);
  294.  
    PKCS8EncodedKeySpec pkcs8KeySpec = new PKCS8EncodedKeySpec(keyBytes);
  295.  
    KeyFactory keyFactory = KeyFactory.getInstance(KEY_ALGORITHM);
  296.  
    Key privateK = keyFactory.generatePrivate(pkcs8KeySpec);
  297.  
    Cipher cipher = Cipher.getInstance(keyFactory.getAlgorithm());
  298.  
    cipher.init(Cipher.ENCRYPT_MODE, privateK);
  299.  
    int inputLen = data.length;
  300.  
    ByteArrayOutputStream out = new ByteArrayOutputStream();
  301.  
    int offSet = 0;
  302.  
    byte[] cache;
  303.  
    int i = 0;
  304.  
    // 对数据分段加密
  305.  
    while (inputLen - offSet > 0) {
  306.  
    if (inputLen - offSet > MAX_ENCRYPT_BLOCK) {
  307.  
    cache = cipher.doFinal(data, offSet, MAX_ENCRYPT_BLOCK);
  308.  
    } else {
  309.  
    cache = cipher.doFinal(data, offSet, inputLen - offSet);
  310.  
    }
  311.  
    out.write(cache, 0, cache.length);
  312.  
    i++;
  313.  
    offSet = i * MAX_ENCRYPT_BLOCK;
  314.  
    }
  315.  
    byte[] encryptedData = out.toByteArray();
  316.  
    out.close();
  317.  
    return encryptedData;
  318.  
    }
  319.  
     
  320.  
    /** */
  321.  
    /**
  322.  
    * <p>
  323.  
    * 获取私钥
  324.  
    * </p>
  325.  
    *
  326.  
    * @param keyMap
  327.  
    * 密钥对
  328.  
    * @return
  329.  
    * @throws Exception
  330.  
    */
  331.  
    public static String getPrivateKey(Map<String, Object> keyMap) throws Exception {
  332.  
    Key key = (Key) keyMap.get(PRIVATE_KEY);
  333.  
    return Base64.encodeBase64String(key.getEncoded());
  334.  
    }
  335.  
     
  336.  
    /** */
  337.  
    /**
  338.  
    * <p>
  339.  
    * 获取公钥
  340.  
    * </p>
  341.  
    *
  342.  
    * @param keyMap
  343.  
    * 密钥对
  344.  
    * @return
  345.  
    * @throws Exception
  346.  
    */
  347.  
    public static String getPublicKey(Map<String, Object> keyMap) throws Exception {
  348.  
    Key key = (Key) keyMap.get(PUBLIC_KEY);
  349.  
    return Base64.encodeBase64String(key.getEncoded());
  350.  
    }
  351.  
     
  352.  
    /**
  353.  
    * java端公钥加密
  354.  
    */
  355.  
    public static String encryptedDataOnJava(String data, String PUBLICKEY) {
  356.  
    try {
  357.  
    data = Base64.encodeBase64String(encryptByPublicKey(data.getBytes(), PUBLICKEY));
  358.  
    } catch (Exception e) {
  359.  
    // TODO Auto-generated catch block
  360.  
    e.printStackTrace();
  361.  
    }
  362.  
    return data;
  363.  
    }
  364.  
     
  365.  
    /**
  366.  
    * java端私钥解密
  367.  
    */
  368.  
    public static String decryptDataOnJava(String data, String PRIVATEKEY) {
  369.  
    String temp = "";
  370.  
    try {
  371.  
    byte[] rs = Base64.decodeBase64(data);
  372.  
    temp = new String(RSAUtils.decryptByPrivateKey(rs, PRIVATEKEY),"UTF-8");
  373.  
    } catch (Exception e) {
  374.  
    e.printStackTrace();
  375.  
    }
  376.  
    return temp;
  377.  
    }

第三步:

  1.  
    import org.springframework.web.bind.annotation.Mapping;
  2.  
     
  3.  
    import java.lang.annotation.*;
  4.  
     
  5.  
     
  6.  
    /**
  7.  
    * @author monkey
  8.  
    * @desc 请求数据解密
  9.  
    * @date 2018/10/25 20:17
  10.  
    */
  11.  
    @Target({ElementType.METHOD,ElementType.TYPE})
  12.  
    @Retention(RetentionPolicy.RUNTIME)
  13.  
    @Mapping
  14.  
    @Documented
  15.  
    public @interface SecurityParameter {
  16.  
     
  17.  
    /**
  18.  
    * 入参是否解密,默认解密
  19.  
    */
  20.  
    boolean inDecode() default true;
  21.  
     
  22.  
    /**
  23.  
    * 出参是否加密,默认加密
  24.  
    */
  25.  
    boolean outEncode() default true;
  26.  
    }

第四步:

  1.  
    import com.google.gson.Gson;
  2.  
    import com.google.gson.reflect.TypeToken;
  3.  
    import com.monkey.springboot.demo.annotation.SecurityParameter;
  4.  
    import com.monkey.springboot.demo.utils.AesEncryptUtils;
  5.  
    import com.monkey.springboot.demo.utils.RSAUtils;
  6.  
    import org.apache.commons.io.IOUtils;
  7.  
    import org.apache.commons.lang3.StringUtils;
  8.  
    import org.slf4j.Logger;
  9.  
    import org.slf4j.LoggerFactory;
  10.  
    import org.springframework.beans.factory.annotation.Value;
  11.  
    import org.springframework.core.MethodParameter;
  12.  
    import org.springframework.http.HttpHeaders;
  13.  
    import org.springframework.http.HttpInputMessage;
  14.  
    import org.springframework.http.converter.HttpMessageConverter;
  15.  
    import org.springframework.web.bind.annotation.ControllerAdvice;
  16.  
    import org.springframework.web.servlet.mvc.method.annotation.RequestBodyAdvice;
  17.  
     
  18.  
    import java.io.IOException;
  19.  
    import java.io.InputStream;
  20.  
    import java.lang.reflect.Type;
  21.  
    import java.util.Map;
  22.  
     
  23.  
    /**
  24.  
    * @author monkey
  25.  
    * @desc 请求数据解密
  26.  
    * @date 2018/10/29 20:17
  27.  
    */
  28.  
    @ControllerAdvice(basePackages = "com.monkey.springboot.demo.controller")
  29.  
    public class DecodeRequestBodyAdvice implements RequestBodyAdvice {
  30.  
     
  31.  
    private static final Logger logger = LoggerFactory.getLogger(DecodeRequestBodyAdvice.class);
  32.  
     
  33.  
    @Value("${server.private.key}")
  34.  
    private String SERVER_PRIVATE_KEY;
  35.  
    //private static final String SERVER_PRIVATE_KEY="MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBAIn2zWqU7K/2qm5pOpq5bp9R+3MTnStWTfJU9nC/Vo7UKH9dITPvrELCTK+qlqpx5Fes+l0GY7n6u4n4jyiw4ejsvkZYQ5ww477yLOn2FcoEGuZEwPgSCmfTST0OFUgQqn+/J11k9L92jEHyieE3qmhMkMt0UsVUSJwx/nZxo30ZAgMBAAECgYBD3YHigeuEC4R+14iaf8jo2j0kuGtB3Cxvnlez0otTqw1YyYkBsU49cLKkXvfKVEgM0Ow/QltgKvSBxCE31PrrDka5TygVMqqA/IM7NrDvjUcGLjyoeNmLA8660fWcDxUTlAGN5kxIvUATayVwKVflpWPWu0FPKsWrZustnEo+4QJBAMCmYsWqAKWYMVRXFP3/XGRfio8DV793TOckyBSN9eh8UhgoZyT3u7oeHmDJEwm4aNMHlg1Pcdc6tNsvi1FRCiUCQQC3VNzfF4xOtUgX7vWPL8YVljLuXmy12iVYmg6ofu9l31nwM9FLQ1TRFglvF5LWrIXTQb07PgGd5DJMAQWGsqLlAkAPE7Z9M73TN+L8b8hDzJ1leZi1cpSGdoa9PEKwYR/SrxAZtefEm+LEQSEtf+8OfrEtetWCeyo0pvKKiOEFXytFAkEAgynL/DC0yXsZYUYtmYvshHU5ayFTVagFICbYZeSrEo+BoUDxdI9vl0fU6A5NmBlGhaZ65G+waG5jLc1tTrlvoQJAXBEoPcBNAosiZHQfYBwHqU6mJ9/ZacJh3MtJzGGebfEwJgtln5b154iANqNWXpySBLvkK+Boq7FYRiD83pqmUg==";
  36.  
     
  37.  
    @Override
  38.  
    public boolean supports(MethodParameter methodParameter, Type type, Class<? extends HttpMessageConverter<?>> aClass) {
  39.  
    return true;
  40.  
    }
  41.  
     
  42.  
    @Override
  43.  
    public Object handleEmptyBody(Object body, HttpInputMessage httpInputMessage, MethodParameter methodParameter, Type type, Class<? extends HttpMessageConverter<?>> aClass) {
  44.  
    return body;
  45.  
    }
  46.  
     
  47.  
    @Override
  48.  
    public HttpInputMessage beforeBodyRead(HttpInputMessage inputMessage, MethodParameter methodParameter, Type type, Class<? extends HttpMessageConverter<?>> aClass) throws IOException {
  49.  
    try {
  50.  
    boolean encode = false;
  51.  
    if (methodParameter.getMethod().isAnnotationPresent(SecurityParameter.class)) {
  52.  
    //获取注解配置的包含和去除字段
  53.  
    SecurityParameter serializedField = methodParameter.getMethodAnnotation(SecurityParameter.class);
  54.  
    //入参是否需要解密
  55.  
    encode = serializedField.inDecode();
  56.  
    }
  57.  
    if (encode) {
  58.  
    logger.info("对方法method :【" + methodParameter.getMethod().getName() + "】返回数据进行解密");
  59.  
    return new MyHttpInputMessage(inputMessage);
  60.  
    }else{
  61.  
    return inputMessage;
  62.  
    }
  63.  
    } catch (Exception e) {
  64.  
    e.printStackTrace();
  65.  
    logger.error("对方法method :【" + methodParameter.getMethod().getName() + "】返回数据进行解密出现异常:"+e.getMessage());
  66.  
    return inputMessage;
  67.  
    }
  68.  
    }
  69.  
     
  70.  
    @Override
  71.  
    public Object afterBodyRead(Object body, HttpInputMessage httpInputMessage, MethodParameter methodParameter, Type type, Class<? extends HttpMessageConverter<?>> aClass) {
  72.  
    return body;
  73.  
    }
  74.  
     
  75.  
    class MyHttpInputMessage implements HttpInputMessage {
  76.  
    private HttpHeaders headers;
  77.  
     
  78.  
    private InputStream body;
  79.  
     
  80.  
    public MyHttpInputMessage(HttpInputMessage inputMessage) throws Exception {
  81.  
    this.headers = inputMessage.getHeaders();
  82.  
    this.body = IOUtils.toInputStream(easpString(IOUtils.toString(inputMessage.getBody(),"utf-8")));
  83.  
    }
  84.  
     
  85.  
    @Override
  86.  
    public InputStream getBody() throws IOException {
  87.  
    return body;
  88.  
    }
  89.  
     
  90.  
    @Override
  91.  
    public HttpHeaders getHeaders() {
  92.  
    return headers;
  93.  
    }
  94.  
     
  95.  
    /**
  96.  
    *
  97.  
    * @param requestData
  98.  
    * @return
  99.  
    */
  100.  
    public String easpString(String requestData) {
  101.  
    if(requestData != null && !requestData.equals("")){
  102.  
    Map<String,String> map = new Gson().fromJson(requestData,new TypeToken<Map<String,String>>() {
  103.  
    }.getType());
  104.  
    // 密文
  105.  
    String data = map.get("requestData");
  106.  
    // 加密的ase秘钥
  107.  
    String encrypted = map.get("encrypted");
  108.  
    if(StringUtils.isEmpty(data) || StringUtils.isEmpty(encrypted)){
  109.  
    throw new RuntimeException("参数【requestData】缺失异常!");
  110.  
    }else{
  111.  
    String content = null ;
  112.  
    String aseKey = null;
  113.  
    try {
  114.  
    aseKey = RSAUtils.decryptDataOnJava(encrypted,SERVER_PRIVATE_KEY);
  115.  
    }catch (Exception e){
  116.  
    throw new RuntimeException("参数【aseKey】解析异常!");
  117.  
    }
  118.  
    try {
  119.  
    content = AesEncryptUtils.decrypt(data, aseKey);
  120.  
    }catch (Exception e){
  121.  
    throw new RuntimeException("参数【content】解析异常!");
  122.  
    }
  123.  
    if (StringUtils.isEmpty(content) || StringUtils.isEmpty(aseKey)){
  124.  
    throw new RuntimeException("参数【requestData】解析参数空指针异常!");
  125.  
    }
  126.  
    return content;
  127.  
    }
  128.  
    }
  129.  
    throw new RuntimeException("参数【requestData】不合法异常!");
  130.  
    }
  131.  
    }
  132.  
    }
  1.  
    import com.fasterxml.jackson.databind.ObjectMapper;
  2.  
    import com.monkey.springboot.demo.annotation.SecurityParameter;
  3.  
    import com.monkey.springboot.demo.utils.AesEncryptUtils;
  4.  
    import com.monkey.springboot.demo.utils.RSAUtils;
  5.  
    import org.slf4j.Logger;
  6.  
    import org.slf4j.LoggerFactory;
  7.  
    import org.springframework.beans.factory.annotation.Value;
  8.  
    import org.springframework.core.MethodParameter;
  9.  
    import org.springframework.http.MediaType;
  10.  
    import org.springframework.http.server.ServerHttpRequest;
  11.  
    import org.springframework.http.server.ServerHttpResponse;
  12.  
    import org.springframework.web.bind.annotation.ControllerAdvice;
  13.  
    import org.springframework.web.servlet.mvc.method.annotation.ResponseBodyAdvice;
  14.  
     
  15.  
    import java.util.HashMap;
  16.  
    import java.util.Map;
  17.  
    import java.util.Random;
  18.  
     
  19.  
    /**
  20.  
    * @author monkey
  21.  
    * @desc 返回数据加密
  22.  
    * @date 2018/10/25 20:17
  23.  
    */
  24.  
    @ControllerAdvice(basePackages = "com.monkey.springboot.demo.controller")
  25.  
    public class EncodeResponseBodyAdvice implements ResponseBodyAdvice {
  26.  
     
  27.  
    private final static Logger logger = LoggerFactory.getLogger(EncodeResponseBodyAdvice.class);
  28.  
     
  29.  
    @Value("${client.public.key}")
  30.  
    private String CLIENT_PUBLIC_KEY;
  31.  
    //private static final String CLIENT_PUBLIC_KEY = "MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC9ikrLxa/cgLZXQugBQFhdxCPQmEZ9j9hadra81MqAxmRkc3eFwROAHk/+39fhmDwgtjE/w4cO6XDabL/mi5V37ioByS1QpovF8ZlJgz/RjvV3TEanvxluridXlNTfOd45uC9+TmR2DzRk5p25U1F74wF7K2KSGv2gyqZvttxrfwIDAQAB";
  32.  
     
  33.  
    @Override
  34.  
    public boolean supports(MethodParameter methodParameter, Class aClass) {
  35.  
    return true;
  36.  
    }
  37.  
     
  38.  
    @Override
  39.  
    public Object beforeBodyWrite(Object body, MethodParameter methodParameter, MediaType mediaType, Class aClass, ServerHttpRequest serverHttpRequest, ServerHttpResponse serverHttpResponse) {
  40.  
    boolean encode = false;
  41.  
    if (methodParameter.getMethod().isAnnotationPresent(SecurityParameter.class)) {
  42.  
    //获取注解配置的包含和去除字段
  43.  
    SecurityParameter serializedField = methodParameter.getMethodAnnotation(SecurityParameter.class);
  44.  
    //出参是否需要加密
  45.  
    encode = serializedField.outEncode();
  46.  
    }
  47.  
    if (encode) {
  48.  
    logger.info("对方法method :【" + methodParameter.getMethod().getName() + "】返回数据进行加密");
  49.  
    ObjectMapper objectMapper = new ObjectMapper();
  50.  
    try {
  51.  
    String result = objectMapper.writerWithDefaultPrettyPrinter().writeValueAsString(body);
  52.  
    // 生成aes秘钥
  53.  
    String aseKey = getRandomString(16);
  54.  
    // rsa加密
  55.  
    String encrypted = RSAUtils.encryptedDataOnJava(aseKey, CLIENT_PUBLIC_KEY);
  56.  
    // aes加密
  57.  
    String requestData = AesEncryptUtils.encrypt(result, aseKey);
  58.  
    Map<String, String> map = new HashMap<>();
  59.  
    map.put("encrypted", encrypted);
  60.  
    map.put("requestData", requestData);
  61.  
    return map;
  62.  
    } catch (Exception e) {
  63.  
    e.printStackTrace();
  64.  
    logger.error("对方法method :【" + methodParameter.getMethod().getName() + "】返回数据进行解密出现异常:" + e.getMessage());
  65.  
    }
  66.  
    }
  67.  
    return body;
  68.  
    }
  69.  
     
  70.  
    /**
  71.  
    * 创建指定位数的随机字符串
  72.  
    * @param length 表示生成字符串的长度
  73.  
    * @return 字符串
  74.  
    */
  75.  
    public static String getRandomString(int length) {
  76.  
    String base = "abcdefghijklmnopqrstuvwxyz0123456789";
  77.  
    Random random = new Random();
  78.  
    StringBuffer sb = new StringBuffer();
  79.  
    for (int i = 0; i < length; i++) {
  80.  
    int number = random.nextInt(base.length());
  81.  
    sb.append(base.charAt(number));
  82.  
    }
  83.  
    return sb.toString();
  84.  
    }
  85.  
     
  86.  
    }

第五步:

  1.  
    /**
  2.  
    * 跳转RSA+AES双重加密页面
  3.  
    *
  4.  
    * @return
  5.  
    */
  6.  
     
  7.  
    @RequestMapping("/test")
  8.  
    public String goTest() {
  9.  
    return "test";
  10.  
    }
  11.  
     
  12.  
    /**
  13.  
    * RSA+AES双重加密测试
  14.  
    *
  15.  
    * @return object
  16.  
    */
  17.  
    @RequestMapping("/testEncrypt")
  18.  
    @ResponseBody
  19.  
    @SecurityParameter
  20.  
    public Persion testEncrypt(@RequestBody Persion info) {
  21.  
    System.out.println(info.getName());
  22.  
    String content = "内容";
  23.  
    info.setName(content);
  24.  
    return info;
  25.  
    }

第六步: 其中random,js(生成一个16位数的随机字符串),是我自己定义的,其余的都可以去官方下载

  1.  
    <!DOCTYPE html>
  2.  
    <html lang="en" xmlns:th="http://www.thymeleaf.org">
  3.  
    <head>
  4.  
    <meta charset="UTF-8">
  5.  
    <title>RSA+AES 加解密</title>
  6.  
    <script type="text/javascript" th:src="@{~/js/jquery-2.2.3.min.js}"></script>
  7.  
    <script type="text/javascript" th:src="@{~/js/jsencrypt.min.js}"></script>
  8.  
    <script type="text/javascript" th:src="@{~/js/aes.js}"></script>
  9.  
    <script type="text/javascript" th:src="@{~/js/pad-zeropadding.js}"></script>
  10.  
    <script type="text/javascript" th:src="@{~/js/security.js}"></script>
  11.  
    <script type="text/javascript" th:src="@{~/js/random.js}"></script>
  12.  
    </head>
  13.  
    <body>
  14.  
     
  15.  
    <script type="text/javascript">
  16.  
    $(function() {
  17.  
    $("#bt").click(
  18.  
    function() {
  19.  
    // 获取16位随机数,当做aes秘钥key
  20.  
    var randomStr = randomString(16);
  21.  
    // aes加密
  22.  
    var data = Encrypt(JSON.stringify({name:"好看"}),randomStr);
  23.  
    // rsa加密
  24.  
    var encrypt = new JSEncrypt();
  25.  
    encrypt.setPublicKey($("#servicePublicKey").val());
  26.  
    var encrypted = encrypt.encrypt(randomStr);
  27.  
    // 创建json对象
  28.  
    var json = {
  29.  
    "requestData": data,
  30.  
    "encrypted": encrypted
  31.  
    };
  32.  
    $.ajax({
  33.  
    type: "POST",
  34.  
    url:"/testEncrypt",
  35.  
    data: JSON.stringify(json),
  36.  
    dataType:'json',
  37.  
    contentType: "application/json",
  38.  
    success: function(result) {
  39.  
    alert("返回的数据对象:"+result);
  40.  
    // rsa解密,获取到aes秘钥
  41.  
    var decrypt = new JSEncrypt();
  42.  
    decrypt.setPrivateKey($('#clientPrivateKey').val());
  43.  
    var aesKey = decrypt.decrypt(result.encrypted);
  44.  
    // 用aes秘钥进行解密
  45.  
    var resultData = Decrypt(result.requestData,aesKey);
  46.  
    alert("解密的数据:" + resultData);
  47.  
    }
  48.  
    });
  49.  
    });
  50.  
    });
  51.  
    </script>
  52.  
    <h2>服务端公钥:</h2>
  53.  
    <textarea id="servicePublicKey" rows="5" cols="45">MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCJ9s1qlOyv9qpuaTqauW6fUftzE50rVk3yVPZwv1aO1Ch/XSEz76xCwkyvqpaqceRXrPpdBmO5+ruJ+I8osOHo7L5GWEOcMOO+8izp9hXKBBrmRMD4Egpn00k9DhVIEKp/vyddZPS/doxB8onhN6poTJDLdFLFVEicMf52caN9GQIDAQAB
  54.  
    </textarea>
  55.  
    <h2>客户端私钥:</h2>
  56.  
    <textarea id="clientPrivateKey" rows="5" cols="45">MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBAL2KSsvFr9yAtldC6AFAWF3EI9CYRn2P2Fp2trzUyoDGZGRzd4XBE4AeT/7f1+GYPCC2MT/Dhw7pcNpsv+aLlXfuKgHJLVCmi8XxmUmDP9GO9XdMRqe/GW6uJ1eU1N853jm4L35OZHYPNGTmnblTUXvjAXsrYpIa/aDKpm+23Gt/AgMBAAECgYBqtFMdWsKBkZiVkZ4JLk9RIl3DTibJA1UawKBpuCX0zzuvbW3JSAQRaX9BjoT7hPe8trUNH6eGFpeo7/Ys9UIEU61c33Q49NBPEVXH2+PhefIE74b8/H9cu1iYQyn9NSGKt0clo5/CU2G3OA7h+xqD9b7ifd4+DtdrS3KDpTPa0QJBAPhBkdpomvIWmUfI69WerwZHrzMZEFYHThG9SbWw0UgIjdKmSiQmrXawPZLe/o3BxPSIIXDzxiVAimdjVJcfC4kCQQDDc9nUvbLt4TryCfnR7x2KECh3BDEv/cuw/e67m0HYOdooV4KQ4aVous/TbbpcyPGcC180XCHjF11gqVa6hdTHAkBpEJcBsDOjMR093DKy/a1lIwFqxri7L+xCZbHES0jHC5e6BtZp5lSTXpMwjV997vvD4bkFbKX3LhFlIAy0yFbBAkAgvjC43gqypS+9yoQKcldtgKV2wsIGuyq7fN7YmPrf4Vk1tutNoC+YqusUDWbSEmu/a3xIhkK7C3f+MIAyASeTAkEA6CalrJUYBeDcaSHKhmJIceQ7baf8Q7uMYY5gRYuQ4rGudcXXaLi+o2I9f9in5qxE/SM/y9LuBmkzrCuy0tlNXA==
  57.  
    </textarea>
  58.  
    <input type="button" id="bt" value="提交" />
  59.  
    </body>
  60.  
    </html>

application.properties :

  1.  
    server.private.key=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
  2.  
    client.public.key=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC9ikrLxa/cgLZXQugBQFhdxCPQmEZ9j9hadra81MqAxmRkc3eFwROAHk/+39fhmDwgtjE/w4cO6XDabL/mi5V37ioByS1QpovF8ZlJgz/RjvV3TEanvxluridXlNTfOd45uC9+TmR2DzRk5p25U1F74wF7K2KSGv2gyqZvttxrfwIDAQAB

后记:
     现在我要把这种混合加密方式,要整合进行到我的项目当中,到时候如果出现一些别的问题,我在更新帖,
                                                                                                                               ---没有绝对安全,只有相对安全!!!!

 
 
Copyright © 2018-2019 - All Rights Reserved - www.pianshen.com

学习加密(四)spring boot 使用RSA+AES混合加密,前后端传递参数加解密的更多相关文章

  1. Android接口安全 - RSA+AES混合加密方案

    转载请注明出处: http://blog.csdn.net/aa464971/article/details/51034462 本文以Androidclient加密提交数据到Java服务端后进行解密为 ...

  2. Spring Boot 项目学习 (四) Spring Boot整合Swagger2自动生成API文档

    0 引言 在做服务端开发的时候,难免会涉及到API 接口文档的编写,可以经历过手写API 文档的过程,就会发现,一个自动生成API文档可以提高多少的效率. 以下列举几个手写API 文档的痛点: 文档需 ...

  3. Spring Boot 学习1-创建Spring Boot应用

    如果使用Maven, 确保先安装好Maven再继续. 创建POM文件 在这里有两种方式: 继承Spring Boot parent的pom. 不继承. 继承Spring Boot pom 1 2 3 ...

  4. spring boot 之如何在两个页面之间传递值(转)

    原文地址:spring boot 之如何在两个页面之间传递值 问题:页面之间的跳转,通常带有值的传输,但是,在现在比较流行的SPRING MVC WEB 开发模型中,设计机制导致页面之间的直接接跳转和 ...

  5. spring boot 登录注册 demo (三) -- 前后端传递

    前端页面通过thymeleaf渲染 <dependency> <groupId>org.springframework.boot</groupId> <art ...

  6. PHP 服务端 和 APP 客户端 实现 RSA+AES 双向加密解密

    目的:服务端和移动端双向加密解密 共有七个文件 其中包括三个类文件 lib_aes.php aes对称加密解密类 server_rsa_crypt.php 服务端RSA公钥私钥非对称加密解密类 cli ...

  7. spring boot基于DRUID数据源密码加密及数据源监控实现

    前言 随着需求和技术的日益革新,spring boot框架是越来越流行,她也越来越多地出现在我们的项目中,当然最主要的原因还是因为spring boot构建项目实在是太爽了,构建方便,开发简单,而且效 ...

  8. Spring Boot2 系列教程(二十四)Spring Boot 整合 Jpa

    Spring Boot 中的数据持久化方案前面给大伙介绍了两种了,一个是 JdbcTemplate,还有一个 MyBatis,JdbcTemplate 配置简单,使用也简单,但是功能也非常有限,MyB ...

  9. 【Spring Boot学习之六】Spring Boot整合定时任务&异步调用

    环境 eclipse 4.7 jdk 1.8 Spring Boot 1.5.2一.定时任务1.启动类添加注解@EnableScheduling 用于开启定时任务 package com.wjy; i ...

随机推荐

  1. [CF1182F]Maximum Sine

    题意:\(f(x) = \text{abs}(\text{sin}(\frac{p}{q} \pi x))\),给定\(a,b,p,q\),求\(x\in[a,b]\)最大的\(f(x)\). 题解: ...

  2. 用flask写一个简单的接口

    用falsk写一个简单的接口,这个接口的数据本来是爬虫爬取的数据,但是今天只写一个flask接口,数据就用测试数据好了. import random import re import time imp ...

  3. TP5内部异常API数据输出的自定义方法编写

    需求:利用postman进行请求api接口过程中 关于一些数据输出异常的情况下 我们希望通过自己编写一些类和方法 实现便于后端人员进行根据提示进行调试处理! 以下测试的时候 请设置 app_debug ...

  4. day11—前端学习之我不想看书

    转行学开发,代码100天——2018-03-27 今天是前端学习,博客记录见证的第11天,按理说还要继续写一写代码相关的内容. 但由于今天的代码实践都是一些基础知识,还是想谈一谈关于编程方面看书的事情 ...

  5. linux RZ 命令

    root 账号登陆后,依次执行以下命令: 1 cd /tmp 2 wget http://www.ohse.de/uwe/releases/lrzsz-0.12.20.tar.gz 3 tar zxv ...

  6. delphi 牛逼 了 app (已在软件界掀起波澜)10分钟10行代码做出让人惊叹的程序

    (已在软件界掀起波澜)10分钟10行代码做出让人惊叹的程序 http://v.qq.com/x/page/m0328h73bs7.html?ptag=bbs_csdn_net

  7. ag-grid 表格中添加图片

    ag-grid是一种非常好用的表格,网上搜索会有各种各样的基本用法,不过对于在ag-grid 表格中添加图片我没有找到方法,看了官方的文档,当然英文的自己也是靠网页翻译,最后发现有这么一个例子,我知道 ...

  8. tp 框架目录结构

    ThinkPHP是为了简化企业级应用开发和敏捷WEB应用开发而诞生的.最早诞生于2006年初,2007年元旦正式更名为ThinkPHP,并且遵循Apache2开源协议发布.ThinkPHP从诞生以来一 ...

  9. upc 组队赛18 STRENGTH【贪心模拟】

    STRENGTH 题目链接 题目描述 Strength gives you the confidence within yourself to overcome any fears, challeng ...

  10. Jenkins设置默用户为root

    https://www.jianshu.com/p/181dfb259dc7 最近在需要在jenkins执行shell脚本,由于Jenkins之前是默认在线安装的,这样jenkins设置了默认用户je ...