微信小程序后台 iv encryptedData 解密

"本文详细介绍了如何在微信小程序后台使用AESUtils工具类解密encryptedData,包括配置pom文件,编写AESUtils类以及进行解密操作的测试。解密后的数据为JSON格式,包含用户信息如openId、nickName等。注意解密时encryptedData中的空格需替换为"+"。"
摘要由CSDN通过智能技术生成

微信小程序后台 iv encryptedData  解密准备工作

首先

第一步配置 pom

<dependency>
    <groupId>org.bouncycastle</groupId>
    <artifactId>bcprov-jdk16</artifactId>
    <version>1.46</version>
</dependency>
 
 <dependency>
    <groupId>commons-codec</groupId>
    <artifactId>commons-codec</artifactId>
    <version>1.4</version>
</dependency>
 
<dependency> 
    <groupId>net.sf.json-lib</groupId> 
    <artifactId>json-lib</artifactId> 
    <version>2.2.3</version> 
    <classifier>jdk15</classifier> 
</dependency>

 第二步 准备AESUtils 工具类 代码如下


import lombok.extern.slf4j.Slf4j;
import org.apache.commons.codec.binary.Base64;
import org.apache.commons.lang.StringUtils;
import org.bouncycastle.jce.provider.BouncyCastleProvider;
import javax.crypto.BadPaddingException;
import javax.crypto.Cipher;
import javax.crypto.IllegalBlockSizeException;
import javax.crypto.NoSuchPaddingException;
import javax.crypto.spec.IvParameterSpec;
import javax.crypto.spec.SecretKeySpec;
import javax.validation.constraints.NotNull;
import java.io.UnsupportedEncodingException;
import java.security.*;
import java.security.spec.InvalidParameterSpecException;
import java.util.Arrays;

/**
 * @ClassName AESUtils
 * @Description TODO
 * @Author 独狼Kiss
 * @Date 2021/9/14 13:46
 * @Version 1.0
 **/

@Slf4j
public class AESUtils {
	// 加密模式
	private static final String ALGORITHM = "AES/CBC/PKCS7Padding";
	private static final String CHARSET_NAME = "UTF-8";
	private static final String AES_NAME = "AES";

	//解决java.security.NoSuchAlgorithmException: Cannot find any provider supporting AES/CBC/PKCS7Padding
	static {
		Security.addProvider(new BouncyCastleProvider());
	}

	/**
	 * 解密
	 *
	 * @param content 目标密文
	 * @param key     秘钥
	 * @param iv      偏移量
	 * @return
	 */
	public static String decrypt(@NotNull String content, @NotNull String key, @NotNull String iv) {
		String result = "";
		// 被加密的数据
		byte[] dataByte = Base64.decodeBase64(content);
		// 加密秘钥
		byte[] keyByte = Base64.decodeBase64(key);
		// 偏移量
		byte[] ivByte = Base64.decodeBase64(iv);
		try {
			// 如果密钥不足16位,那么就补足. 这个if 中的内容很重要
			int base = 16;
			if (keyByte.length % base != 0) {
				int groups = keyByte.length / base
						+ (keyByte.length % base != 0 ? 1 : 0);
				byte[] temp = new byte[groups * base];
				Arrays.fill(temp, (byte) 0);
				System.arraycopy(keyByte, 0, temp, 0, keyByte.length);
				keyByte = temp;
			}
			if (ivByte.length % base != 0) {
				int groups = ivByte.length / base
						+ (ivByte.length % base != 0 ? 1 : 0);
				byte[] temp = new byte[groups * base];
				Arrays.fill(temp, (byte) 0);
				System.arraycopy(ivByte, 0, temp, 0, ivByte.length);
				ivByte = temp;
			}
			// 初始化
			Security.addProvider(new BouncyCastleProvider());
			Cipher cipher = Cipher.getInstance("AES/CBC/PKCS7Padding", "BC");
			SecretKeySpec spec = new SecretKeySpec(keyByte, "AES");
			AlgorithmParameters parameters = AlgorithmParameters
					.getInstance("AES");
			parameters.init(new IvParameterSpec(ivByte));
			cipher.init(Cipher.DECRYPT_MODE, spec, parameters);// 初始化
			byte[] resultByte = cipher.doFinal(dataByte);
			if (null != resultByte && resultByte.length > 0) {
				result = new String(resultByte, "UTF-8");
			}
		} catch (NoSuchAlgorithmException e) {
			e.printStackTrace();
		} catch (NoSuchPaddingException e) {
			e.printStackTrace();
		} catch (InvalidParameterSpecException e) {
			e.printStackTrace();
		} catch (IllegalBlockSizeException e) {
			e.printStackTrace();
		} catch (BadPaddingException e) {
			e.printStackTrace();
		} catch (UnsupportedEncodingException e) {
			e.printStackTrace();
		} catch (InvalidKeyException e) {
			e.printStackTrace();
		} catch (InvalidAlgorithmParameterException e) {
			e.printStackTrace();
		} catch (NoSuchProviderException e) {
			e.printStackTrace();
		}
		return result;
	}

}

 第三步 调用方法测试(本人为展示而写的 变量参数请自行更换)

public static void main(String[] args) throws Exception{
	   String encryptedData = "";// 注意encryptedData 需要替换空格为“ + ”
	   String sessionKey = "tiihtNczf5v6AKRyjwEUhQ==";
	   String iv = "r7BXXKkLb8qrSNn05n0qiA==";
       System.out.println(AESUtils.decrypt( encryptedData, sessionKey, iv));
    }

 注意事项:

  • encryptedData: 前端所带来的encryptedData需要将字符串里的空格替换为“+”
    String encryptedData = encryptedData.replace(" ", "+")
  • AESUtils.decrypt 方法返回的用户数据为JSON格式
    {"openId":"o1OPm5644NeGMltCwX_DyxwOLH9E","nickName":"微信用户","gender":0,"language":"","city":"","province":"","country":"","avatarUrl":"https://thirdwx.qlogo.cn/mmopen/vi_32/POgEwh4mIHO4nibH0KlMECNjjGxQUq24ZEaGT4poC6icRiccVGKSyXwibcPq4BWmiaIGuG1icwxaQX6grC9VemZoJ8rg/132","watermark":{"timestamp":1631606001,"appid":"wxa00038c72b93c223"}}
    
                                                                                                                                 
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值