一.RSA 私钥解密后置处理器截图:
二.RSA 私钥解密后置处理器使用说明:
私钥:RSA解密私钥;
填充算法:目前支持PKCS1 OAEP PADDING、PKCS1 PADDING、NO PADDING三种填充算法;
目标变量名:如上图RSA私钥解密结果存放到rsaPrivate1变量中,使用时,以${rsaPrivate1}这种形式引用即可。
三.示例
场景1:密文存储在JMeter变量rsaPublic1中,RSA私钥解密密钥为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,填充算法为:PKCS1 OAEP PADDING,将解密结果存放到JMeter变量rsaPrivate1中,如下图:
场景2:密文为Http返回值内容Json字符串中某一个值,Json Path为:$.data,RSA私钥解密密钥为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,填充算法为:PKCS1 OAEP PADDING,将解密结果存放到JMeter变量rsaPrivate1中,如下图:
场景3:密文为Http返回值内容,RSA私钥解密密钥为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,填充算法为:PKCS1 OAEP PADDING,将解密结果存放到JMeter变量rsaPrivate1中,如下图:
四、下载地址:
链接:https://pan.baidu.com/s/18Pi1g8CW5Xel1yqSh2pHRw 提取码:rvww