PHP 生成公钥私钥,加密解密,签名验签
test_encry.php
<?php
//创建私钥,公钥
//create_key();
//要加密内容
$str = "test_str";
//加密
$encrypt_str = test_encrypt($str);
//解密
$decrypt_str = test_decrypt($encrypt_str);
//echo $decrypt_str;exit;
//签名
$sign_str = sign ( $decrypt_str );
// echo $sign_str;exit;
//验签
$res = verify ( $decrypt_str, $sign_str ); var_dump ( $res );
exit (); //创建秘钥对
function create_key(){
//配置信息
//配置需要用到环境配置文件 openssl.cnf,这里文件地址如下
$config_path = "D:\ApacheServer\Apache\conf\openssl.cnf";
$config = array(
"digest_alg" => "sha512",
"private_key_bits" => 4096, // 字节数 512 1024 2048 4096 等 ,不能加引号,此处长度与加密的字符串长度有关系
"private_key_type" => OPENSSL_KEYTYPE_RSA, // 加密类型
'config' => $config_path
);
$new_key = openssl_pkey_new($config);
if ( $new_key == false ){
return false;
}
//提取私钥
//$private_key 这里作为引用变量
openssl_pkey_export($new_key, $private_key, null, $config); //生成公钥
$public_key = openssl_pkey_get_details($new_key);
// var_dump($public_key);
$public_key = $public_key["key"]; //显示数据
//var_dump($public_key); //公钥
//var_dump($private_key); //私钥
file_put_contents("./testpublic.pem", $public_key);
file_put_contents("./testprivate.pem", $private_key); openssl_free_key($new_key);
} // 数据接收方创建一套密钥对,把公钥给发送方(一或多个发送方),发送方用公钥加密数据,发给接收方,接收方用私钥解密获取数据
// 接受方的密钥对
/**
公钥加密
@param $str 要加密的明文
*/
function test_encrypt($str) {
$cert_file = "./testpublic.pem";
// 读取公钥内容
$public_key = file_get_contents ( $cert_file );
// 转成openssl对象
$public_key = openssl_get_publickey ( $public_key );
// 进行加密,$encrypt_str 为引用变量
openssl_public_encrypt ( $str, $encrypt_str, $public_key );
// base64转码
$encrypt_str = base64_encode ( $encrypt_str );
return $encrypt_str;
} /**
私钥解密
@param $encrypt_str 要解密的密文
*/
function test_decrypt($encrypt_str) {
$cert_file = "./testprivate.pem";
// 读取私钥内容
$private_key = file_get_contents ( $cert_file );
// 转成openssl对象
$private_key = openssl_get_privatekey ( $private_key );
// base64解码
$encrypt_str = base64_decode ( $encrypt_str );
openssl_private_decrypt ( $encrypt_str, $decrypt_str, $private_key ); return $decrypt_str;
} // 数据发送方创建一套密钥对,把公钥给接收方,发送方用私钥签名数据,发给接收方。接收方将“解密后的明文、收到的签名、发送方生成的公钥”三个数据一起来验签,验证通过则表示发送方是真实有效的(签名就是为排除冒充发送方发信息的行为)
// 发送方的密钥对(这里为方便,用同一套密钥对)
/**
私钥签名
@param $plain 要签名的明文
*/
function sign($plain) {
// $log = new Logger();
try {
// 用户私钥证书
$cert_file = "./testprivate.pem";
$priv_key = file_get_contents ( $cert_file );
$pkeyid = openssl_get_privatekey ( $priv_key ); if (! is_resource ( $pkeyid )) {
return FALSE;
}
// compute signature
openssl_sign ( $plain, $signature, $pkeyid, OPENSSL_ALGO_SHA256 );
// free the key from memory
openssl_free_key ( $pkeyid );
// $log->logInfo("Signature string for:".$signature);
return base64_encode ( $signature );
} catch ( Exception $e ) {
// $log->logInfo("Signature attestation failure".$e->getMessage());
}
} /**
公钥验签
@param $plain 验签明文
@param $signature 验签密文
*/
function verify($plain, $signature) {
$cert_file = "./testpublic.pem";
$signature = base64_decode ( $signature );
$cert = file_get_contents ( $cert_file );
$pubkeyid = openssl_get_publickey ( $cert );
if (! is_resource ( $pubkeyid )) {
return FALSE;
}
$ok = openssl_verify ( $plain, $signature, $pubkeyid, OPENSSL_ALGO_SHA256 );
@openssl_free_key ( $pubkeyid );
if ($ok == 1) {
return TRUE;
} elseif ($ok == 0) {
return FALSE;
} else {
return FALSE;
}
return FALSE;
}
testprivate.pem
-----BEGIN PRIVATE KEY-----
MIIJQgIBADANBgkqhkiG9w0BAQEFAASCCSwwggkoAgEAAoICAQDI7ysitVvgmHod
BwccHcgbaKANaDyMXJ30wkJRcaygZohZJkMlExsz9lPtlPUMrkH+QkJSzzIP9Nr2
46LCKG5xDzRBzJbgcdsqjQk4sdSDGdiqOyIloHvYkQQvFRcStGjrIGswiU3NXvU3
kRG1ep1DvbsYTKYpkWkMxj9UJhgdkhoGgWgV6ijsbKiS2q6hcjfyh1A4fL9IT+Ge
5zewuzzY6HFCoWnJ40EsC6AbxqpK+JL78pmG6K8KFNF3mu98IgH8ziNn15qvGjRO
FLysyTynMf42uKJNzZVN/keo3kxesNZDn/W3D+QiWyZCigkZZ9TAVsfzYNFfcYRH
3GZgZ3LgzjwX7heQUUMnDy8lHaK9yhodW30d7fDt5veghojWYkkVlrag50PJyJqs
U6TihB/tqtFeFChIBhcHYSZ/Z5ISlCUJl3geB5uuUJRfusjRpdVsB4RzyaWziXXp
d4Gbl3LoRPBo7ehzvt+4pnqkRPZigYKuaXF5q7KQ0OtRhtuGj56VHizXqv8TAcsU
+xGMxeFoDR0mwpPkJ/G3bawuEPAlrBdDyzDWltE3wU6GeHsh6KCOBBv4XjkkZk/L
sm3q4QAFZm31gL7dJzC4UiPHf264GG35Xgdso9OJlIhlihNwo4yZCtP/yuykXwwj
yjSOT7s9JrFLwjn/j8rE0rmWp/p1nwIDAQABAoICAGaWVXufBI2iy5XOZL7iJax4
ul6d/WvcTXkNRTa3xt8N+kcp1dYz7wuUlD0UdBhJT8A0rBADYRfsd27dwddHNTvb
+14syktFVhRfdXnQsSNOKuSe1ExJp3FmeLBhICqYmYiSQKfDMknMVX5NPrFdLLXN
RJyfZaaLawrunJ6l5GIUmd0AbNfjeYlb4KU5qTccTZwxoa91YWPWBOdQPYqpzeMg
qdLO/mfo8vk95jzILWGhj8m6js/mNJf9EQTzwZmq80DTLhhyZ7NGubWzuLCu/ZyP
Va8yjQsUD0qGrKd2957QwlQ8cwNHxb4Us2/9ca/a5zBcHjIQGFWWa2cVC9/kcS2V
6YP7wg0mS4s1VHh3CM+i9p3DvsPCpTIu9Kvv7fPZGuLqeUwWVcGx39w7B7QOqS/j
+0sgcndwl0OO2hoLvprav75Pvk+aIQKccDc1P8c8auCTblp1dSZ0WRDCGH9JZaYp
mUMvNllWIkiZU+eye8mL824zC3XcqjTNJOT2+JEregy5aDYnxxABFWre7gXYbtXL
8KGfS+qJuD/Eqryg9b/IEuJpTUn432vjEmnfSEXRAf6W3Bn5VeSDp80VtYRUcg9j
MNCtf/Yap9wB0dMG4SJT66tVpd4h6cMVty9/IS9Klnewb6gEhLaK0utTfujOQ6kI
n5W1qoIImiLnlbK4Ac3BAoIBAQDqAGMbE1IV6G7P67hWYLz1nPAwjpG2dj+fXcRm
7qFzwYoXU3bXH9Fcf6EtxK6jZYX1J2hxVD2gv9Gqnv8zdM1v47if5xb3HMpYz6ah
LjW+6lu+D+dLBdmtKYGpAnvNqB8+1JviqbF/QDMH5RLZ9wFwqTErafEE4Cq/C1R3
kCaIY/5KC+pjJE7IIp7nYBpwH26tDVGUw873LysOzLLEu3Cyt1jn90nIVw6HzISL
ORIPIwiiTn3+Je9M0ucxb6gbJixsKQr2tjY1nlHD9DFPFQKbdgmB0NiDV325VAJE
bTZaeHyHyzgl1lzLHTD1V5NxCrtJvjw4640YAzNx08ltMZoJAoIBAQDb0vdJKXND
8t6tvsZUHe6ACT54qUPEVzw/xnU6rBS+bhzyVU/UsapTD1Y6MnjurIWpZedYmiOm
sIKicMk1uzn9096LMavkg3Hdu9HwY3UYU7h/cso5R4eGbZogIz3D8I24OgA1rkZE
66Sfvksx3UlRwKc2LqNtzoA12hiyJ9fXZrfaq6/7RlcXXvtqJEvgwSlPXT+HAsdx
zVcNS4C3g8/UibvZKJINyRzfTRYkkrmRY7HP5OoBsbhwVrlfJ/0akwgosYecPPT2
i5YR85D7GUdmB/LJv/2uRbeT4XFFVow2nG73dK9f8ppVdcWkVtdz0Vm1d0gNRJhU
3APSvSRv6JxnAoIBAGYOayr43zks2X+XWBtcL62Tl/IljAmfQxpXg/w8oW/h/j80
KMWkW+RSydIzUNN0yNrmKBgdXI+KeYBHvhgMHjlpgTFEUXDPPrVDQ3JSvCAbCI45
U3AWCh0K2EEFE0fbxlzZz28pAX/1WQxdbT5hC2C+efJsTzEIL7yIzXskBJpBujtD
PSOmRzHkX5ecA4vZOaUCBQ2z5MVL7iSTRHinI3zemEj7QlO9HFo/6aLq7iRp7C8V
ur+ofdjstuaJwzCsEn3N3LlDORtjhFfJXeQWzr9M2NKkannGI9A7go2jcCw/FlkH
WeKuvmPbxGmMm4KW4p5D+PH+UdgiNUK00snr8zkCggEBAIf50KM986H1as74sj+4
IB6tGSqUMWoTOB6PCVbYuSAuhtNT+ESt/ZjRZNos/GdO6oMlmNxSxHjIuJX4xE3r
WWzskL1zZUu+D0JEexGCxBzfNMIJZJPX7jo2M99rTTqV42Qw5I5QFgFt7fAuSt82
bbMXQ5edc9Rppx8ooJwbT0VbsaCfEQWSti6rv0Mh3pnRglcobDJ8gpiflxiPOrjJ
3VYwOLWUhfvnCmgKjAblh8oqbAQYKrQPlfJPgu0clFDK4IIjhqobfr+/Cn5iNq1M
LsEra4BmtWoGkA72phVo+uSREYcac50bOWJhrncAjNeEiURZ24TxiHT9f5PtEcvz
jEMCggEAHsyUceW0TEz5dHP/kTuxuGy7tn3mtvr+bAfQH7g3E7PYvN0P58iJHASi
VCCuzMApmHeKfErLt2Up2/1527HDonAJJ9X50M5pZvvrIzAKFZmk/s00XpzPSCwX
vcKN55kAgHrlj5P76xQ91EdZMqPoLNFRIuIT4wEPUqngFtvGNljuRHWjQkTa2So3
BlI0LJUxajbVANcRdyGcKy6KjsVj0lrYRiZXsH/FQqX4EfscnljqEtB43bKQTAQo
M4pBbJ17bq5B3hp4IIGlyKQDyXO68Y7KX5vlLkc2uunc9P/HeWUhMWXWnbccsA8U
0S0WEmpb0TnqG+rz/3OOS5J0DaHv9Q==
-----END PRIVATE KEY-----
testpublic.pem
-----BEGIN PUBLIC KEY-----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-----END PUBLIC KEY-----
openssl.cnf
#
# OpenSSL example configuration file.
# This is mostly being used for generation of certificate requests.
# # This definition stops the following lines choking if HOME isn't
# defined.
HOME = .
RANDFILE = $ENV::HOME/.rnd # Extra OBJECT IDENTIFIER info:
#oid_file = $ENV::HOME/.oid
oid_section = new_oids # To use this configuration file with the "-extfile" option of the
# "openssl x509" utility, name here the section containing the
# X.509v3 extensions to use:
# extensions =
# (Alternatively, use a configuration file that has only
# X.509v3 extensions in its main [= default] section.) [ new_oids ] # We can add new OIDs in here for use by 'ca', 'req' and 'ts'.
# Add a simple OID like this:
# testoid1=1.2.3.4
# Or use config file substitution like this:
# testoid2=${testoid1}.5.6 # Policies used by the TSA examples.
tsa_policy1 = 1.2.3.4.1
tsa_policy2 = 1.2.3.4.5.6
tsa_policy3 = 1.2.3.4.5.7 ####################################################################
[ ca ]
default_ca = CA_default # The default ca section ####################################################################
[ CA_default ] dir = ./demoCA # Where everything is kept
certs = $dir/certs # Where the issued certs are kept
crl_dir = $dir/crl # Where the issued crl are kept
database = $dir/index.txt # database index file.
#unique_subject = no # Set to 'no' to allow creation of
# several ctificates with same subject.
new_certs_dir = $dir/newcerts # default place for new certs. certificate = $dir/cacert.pem # The CA certificate
serial = $dir/serial # The current serial number
crlnumber = $dir/crlnumber # the current crl number
# must be commented out to leave a V1 CRL
crl = $dir/crl.pem # The current CRL
private_key = $dir/private/cakey.pem# The private key
RANDFILE = $dir/private/.rand # private random number file x509_extensions = usr_cert # The extentions to add to the cert # Comment out the following two lines for the "traditional"
# (and highly broken) format.
name_opt = ca_default # Subject Name options
cert_opt = ca_default # Certificate field options # Extension copying option: use with caution.
# copy_extensions = copy # Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs
# so this is commented out by default to leave a V1 CRL.
# crlnumber must also be commented out to leave a V1 CRL.
# crl_extensions = crl_ext default_days = 365 # how long to certify for
default_crl_days= 30 # how long before next CRL
default_md = default # use public key default MD
preserve = no # keep passed DN ordering # A few difference way of specifying how similar the request should look
# For type CA, the listed attributes must be the same, and the optional
# and supplied fields are just that :-)
policy = policy_match # For the CA policy
[ policy_match ]
countryName = match
stateOrProvinceName = match
organizationName = match
organizationalUnitName = optional
commonName = supplied
emailAddress = optional # For the 'anything' policy
# At this point in time, you must list all acceptable 'object'
# types.
[ policy_anything ]
countryName = optional
stateOrProvinceName = optional
localityName = optional
organizationName = optional
organizationalUnitName = optional
commonName = supplied
emailAddress = optional ####################################################################
[ req ]
default_bits = 1024
default_keyfile = privkey.pem
distinguished_name = req_distinguished_name
attributes = req_attributes
x509_extensions = v3_ca # The extentions to add to the self signed cert # Passwords for private keys if not present they will be prompted for
# input_password = secret
# output_password = secret # This sets a mask for permitted string types. There are several options.
# default: PrintableString, T61String, BMPString.
# pkix : PrintableString, BMPString (PKIX recommendation before 2004)
# utf8only: only UTF8Strings (PKIX recommendation after 2004).
# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
# MASK:XXXX a literal mask value.
# WARNING: ancient versions of Netscape crash on BMPStrings or UTF8Strings.
string_mask = utf8only # req_extensions = v3_req # The extensions to add to a certificate request [ req_distinguished_name ]
countryName = Country Name (2 letter code)
countryName_default = AU
countryName_min = 2
countryName_max = 2 stateOrProvinceName = State or Province Name (full name)
stateOrProvinceName_default = Some-State localityName = Locality Name (eg, city) 0.organizationName = Organization Name (eg, company)
0.organizationName_default = Internet Widgits Pty Ltd # we can do this but it is not needed normally :-)
#1.organizationName = Second Organization Name (eg, company)
#1.organizationName_default = World Wide Web Pty Ltd organizationalUnitName = Organizational Unit Name (eg, section)
#organizationalUnitName_default = commonName = Common Name (e.g. server FQDN or YOUR name)
commonName_max = 64 emailAddress = Email Address
emailAddress_max = 64 # SET-ex3 = SET extension number 3 [ req_attributes ]
challengePassword = A challenge password
challengePassword_min = 4
challengePassword_max = 20 unstructuredName = An optional company name [ usr_cert ] # These extensions are added when 'ca' signs a request. # This goes against PKIX guidelines but some CAs do it and some software
# requires this to avoid interpreting an end user certificate as a CA. basicConstraints=CA:FALSE # Here are some examples of the usage of nsCertType. If it is omitted
# the certificate can be used for anything *except* object signing. # This is OK for an SSL server.
# nsCertType = server # For an object signing certificate this would be used.
# nsCertType = objsign # For normal client use this is typical
# nsCertType = client, email # and for everything including object signing:
# nsCertType = client, email, objsign # This is typical in keyUsage for a client certificate.
# keyUsage = nonRepudiation, digitalSignature, keyEncipherment # This will be displayed in Netscape's comment listbox.
nsComment = "OpenSSL Generated Certificate" # PKIX recommendations harmless if included in all certificates.
subjectKeyIdentifier=hash
authorityKeyIdentifier=keyid,issuer # This stuff is for subjectAltName and issuerAltname.
# Import the email address.
# subjectAltName=email:copy
# An alternative to produce certificates that aren't
# deprecated according to PKIX.
# subjectAltName=email:move # Copy subject details
# issuerAltName=issuer:copy #nsCaRevocationUrl = http://www.domain.dom/ca-crl.pem
#nsBaseUrl
#nsRevocationUrl
#nsRenewalUrl
#nsCaPolicyUrl
#nsSslServerName # This is required for TSA certificates.
# extendedKeyUsage = critical,timeStamping [ v3_req ] # Extensions to add to a certificate request basicConstraints = CA:FALSE
keyUsage = nonRepudiation, digitalSignature, keyEncipherment [ v3_ca ] # Extensions for a typical CA # PKIX recommendation. subjectKeyIdentifier=hash authorityKeyIdentifier=keyid:always,issuer # This is what PKIX recommends but some broken software chokes on critical
# extensions.
#basicConstraints = critical,CA:true
# So we do this instead.
basicConstraints = CA:true # Key usage: this is typical for a CA certificate. However since it will
# prevent it being used as an test self-signed certificate it is best
# left out by default.
# keyUsage = cRLSign, keyCertSign # Some might want this also
# nsCertType = sslCA, emailCA # Include email address in subject alt name: another PKIX recommendation
# subjectAltName=email:copy
# Copy issuer details
# issuerAltName=issuer:copy # DER hex encoding of an extension: beware experts only!
# obj=DER:02:03
# Where 'obj' is a standard or added object
# You can even override a supported extension:
# basicConstraints= critical, DER:30:03:01:01:FF [ crl_ext ] # CRL extensions.
# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL. # issuerAltName=issuer:copy
authorityKeyIdentifier=keyid:always [ proxy_cert_ext ]
# These extensions should be added when creating a proxy certificate # This goes against PKIX guidelines but some CAs do it and some software
# requires this to avoid interpreting an end user certificate as a CA. basicConstraints=CA:FALSE # Here are some examples of the usage of nsCertType. If it is omitted
# the certificate can be used for anything *except* object signing. # This is OK for an SSL server.
# nsCertType = server # For an object signing certificate this would be used.
# nsCertType = objsign # For normal client use this is typical
# nsCertType = client, email # and for everything including object signing:
# nsCertType = client, email, objsign # This is typical in keyUsage for a client certificate.
# keyUsage = nonRepudiation, digitalSignature, keyEncipherment # This will be displayed in Netscape's comment listbox.
nsComment = "OpenSSL Generated Certificate" # PKIX recommendations harmless if included in all certificates.
subjectKeyIdentifier=hash
authorityKeyIdentifier=keyid,issuer # This stuff is for subjectAltName and issuerAltname.
# Import the email address.
# subjectAltName=email:copy
# An alternative to produce certificates that aren't
# deprecated according to PKIX.
# subjectAltName=email:move # Copy subject details
# issuerAltName=issuer:copy #nsCaRevocationUrl = http://www.domain.dom/ca-crl.pem
#nsBaseUrl
#nsRevocationUrl
#nsRenewalUrl
#nsCaPolicyUrl
#nsSslServerName # This really needs to be in place for it to be a proxy certificate.
proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo ####################################################################
[ tsa ] default_tsa = tsa_config1 # the default TSA section [ tsa_config1 ] # These are used by the TSA reply generation only.
dir = ./demoCA # TSA root directory
serial = $dir/tsaserial # The current serial number (mandatory)
crypto_device = builtin # OpenSSL engine to use for signing
signer_cert = $dir/tsacert.pem # The TSA signing certificate
# (optional)
certs = $dir/cacert.pem # Certificate chain to include in reply
# (optional)
signer_key = $dir/private/tsakey.pem # The TSA private key (optional) default_policy = tsa_policy1 # Policy if request did not specify it
# (optional)
other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional)
digests = md5, sha1 # Acceptable message digests (mandatory)
accuracy = secs:1, millisecs:500, microsecs:100 # (optional)
clock_precision_digits = 0 # number of digits after dot. (optional)
ordering = yes # Is ordering defined for timestamps?
# (optional, default: no)
tsa_name = yes # Must the TSA name be included in the reply?
# (optional, default: no)
ess_cert_id_chain = no # Must the ESS cert id chain be included?
# (optional, default: no)
PHP 生成公钥私钥,加密解密,签名验签的更多相关文章
- RSACryptoServiceProvider加密解密签名验签和DESCryptoServiceProvider加解密
原文:RSACryptoServiceProvider加密解密签名验签和DESCryptoServiceProvider加解密 C#在using System.Security.Cryptograph ...
- C# RSACryptoServiceProvider加密解密签名验签和DESCryptoServic
C#在using System.Security.Cryptography下有 DESCryptoServiceProvider RSACryptoServiceProvider DESCryptoS ...
- js rsa sign使用笔记(加密,解密,签名,验签)
你将会收获: js如何加密, 解密 js如何签名, 验签 js和Java交互如何相互解密, 验签(重点) 通过谷歌, 发现jsrsasign库使用者较多. 查看api发现这个库功能很健全. 本文使用方 ...
- Java RSA 加密 解密 签名 验签
原文:http://gaofulai1988.iteye.com/blog/2262802 import java.io.FileInputStream; import java.io.FileOut ...
- 支付接口中常用的加密解密以及验签rsa,md5,sha
一.常用加密类型分类 1.对称加密:采用单钥对信息进行加密和解密,即同一个秘钥既可以对信息进行加密,也可以进行解密.此类型称之为对称加密.特点速度快,常用于对大量数据信息或文件加密时使用.常用例子:D ...
- C# Pkcs8 1024位 加密 解密 签名 解签
部分代码来至 https://www.cnblogs.com/dj258/p/6049786.html using System; using System.Collections.Generic; ...
- [Python3] RSA的加解密和签名/验签实现 -- 使用pycrytodome
Crypto 包介绍: pycrypto,pycrytodome 和 crypto 是一个东西,crypto 在 python 上面的名字是 pycrypto 它是一个第三方库,但是已经停止更新,所以 ...
- RSA密钥生成、加密解密、签名验签
RSA 非对称加密公钥加密,私钥解密 私钥签名,公钥验签 下面是生成随机密钥对: //随机生成密钥对 KeyPairGenerator keyPairGen = null; try { keyPair ...
- Java使用RSA加密解密签名及校验
RSA加密解密类: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 ...
- iOS使用Security.framework进行RSA 加密解密签名和验证签名
iOS 上 Security.framework为我们提供了安全方面相关的api: Security框架提供的RSA在iOS上使用的一些小结 支持的RSA keySize 大小有:512,768,10 ...
随机推荐
- CF1187F Expected Square Beauty(期望)
题目 CF1187F Expected Square Beauty 做法 \(B(x)=\sum\limits_{i=1}^n I_i(x),I_i(x)=\begin{cases}1&x_i ...
- css+vue实现流程图
主要用css+flex布局实现样式部分,vue实现组件逻辑.首先看下效果吧: 当空间不够时还可以使用拖拽功能 接下来说明下实现思路 1.首先是实现单个节点样式,这个很简单不谈了,节点后都跟有一小段连接 ...
- mpvue开发坑点总结
最近一直在开发微信小程序,趁着空闲时间总结下使用情况. 现在项目目前使用的是 mpvue:^1.0.11 版本,后续看看更新情况. 文档在此: http://mpvue.com/mpvue/#_2 # ...
- SpringMVC返回结果值处理器之返回一个值
处理器一共分为两类: 一类是返回到一个页面,凡是返回页面的处理器,一定会刷新页面,对应的请求应该是同步请求. 一类是返回结果,凡是返回结果的处理器,一定是请求方需要得到这个结果值,此时就需要一个有回调 ...
- 怎么把分化成元,并且保留两位小数,用vue来做
<el-table-column prop="amount" label="申请提现金额" width="120" align=&qu ...
- bootstrap table插件动态加载表头
这篇文章主要为大家详细介绍了bootstrap table插件动态加载表头,具有一定的参考价值,感兴趣的小伙伴们可以参考一下 bootstrap的table属性已经很熟悉了,最近遇到一个问题,犹豫 ...
- Dockers安装nginx
方法一.通过 Dockerfile构建 创建Dockerfile 首先,创建目录nginx,用于存放后面的相关东西. runoob@runoob:~$ mkdir -p ~/nginx/www ~/n ...
- LeetCode 第 159 场周赛
一. 缀点成线(LeetCode-5230) 1.1 题目描述 1.2 解题思路 比较简单的一题,利用公式 y = kx + b,确定好k和b就好,并且要考虑一种情况,函数 x = h. 1.3 解题 ...
- [Android] 安卓手机不用root删除自带app
声明:本文档仅供测试,因删除引起的一切问题,本人概不负责 声明:本文档仅供测试,因删除引起的一切问题,本人概不负责 声明:本文档仅供测试,因删除引起的一切问题,本人概不负责 转载请注明出处:https ...
- 【软工实践】Alpha冲刺(3/6)
链接部分 队名:女生都队 组长博客: 博客链接 作业博客:博客链接 小组内容 恩泽(组长) 过去两天完成了哪些任务 描述 对推送模块进行详细划分 基于用户的协同过滤,寻找更感兴趣的话题 学习API文档 ...