常见的加解密算法

介绍

常见的加解密算法有:DES,3DES,AES,PBE,RSA,DSA,ECC,MD5,SHA,HMAC。

分类:

对称加密:DES,3DES,AES,PBE

非对称加密:RSA,DSA,ECC

不可逆加密(单向加密):MD5,SHA,HMAC

AES加解密:

java 复制代码
package com.sinosoft.tmnch.api.common.util;

import java.security.SecureRandom;
import javax.crypto.Cipher;
import javax.crypto.KeyGenerator;
import javax.crypto.SecretKey;
import javax.crypto.spec.SecretKeySpec;

import lombok.extern.slf4j.Slf4j;
import org.apache.axis.encoding.Base64;
import org.apache.commons.lang3.StringUtils;

@Slf4j
public class AESUtils {
    /**
     * AES加密
     *
     * @param content   信息
     * @param secureKey 密钥
     * @return 密文
     */
    public static String encrypt(String content, String secureKey) {
        try {
            if (!StringUtils.isEmpty(content) && !StringUtils.isEmpty(secureKey)) {
                KeyGenerator kgen = KeyGenerator.getInstance("AES");
                SecureRandom secureRandom = SecureRandom.getInstance("SHA1PRNG");
                secureRandom.setSeed(secureKey.getBytes());
                kgen.init(128, secureRandom);
                SecretKey secretKey = kgen.generateKey();
                byte[] enCodeFormat = secretKey.getEncoded();
                SecretKeySpec key = new SecretKeySpec(enCodeFormat, "AES");
                Cipher cipher = Cipher.getInstance("AES");
                byte[] byteContent = content.getBytes("utf-8");
                cipher.init(1, key);
                byte[] result = cipher.doFinal(byteContent);
                return encodeBASE64(result);
            } else {
                return null;
            }
        } catch (Exception var10) {
            log.error("加密错误.", var10);
            return null;
        }
    }

    /**
     * 解密
     *
     * @param content   消息
     * @param secureKey 密钥
     * @return 解密信息
     */
    public static String decrypt(String content, String secureKey) {
        try {
            if (!StringUtils.isEmpty(content) && !StringUtils.isEmpty(secureKey)) {
                content = content.replace(" ", "+");
                KeyGenerator kgen = KeyGenerator.getInstance("AES");
                SecureRandom secureRandom = SecureRandom.getInstance("SHA1PRNG");
                secureRandom.setSeed(secureKey.getBytes());
                kgen.init(128, secureRandom);
                SecretKey secretKey = kgen.generateKey();
                byte[] enCodeFormat = secretKey.getEncoded();
                SecretKeySpec key = new SecretKeySpec(enCodeFormat, "AES");
                Cipher cipher = Cipher.getInstance("AES");
                cipher.init(2, key);
                byte[] base64Dec = Base64.decode(content);
                byte[] result = cipher.doFinal(base64Dec);
                return new String(result, "UTF-8");
            } else {
                return null;
            }
        } catch (Exception var10) {
            log.warn("解密错误,错误信息是:{}", var10);
            return null;
        }
    }

    private static String encodeBASE64(byte[] content) throws Exception {
        if (content != null && content.length != 0) {
            try {
                return Base64.encode(content);
            } catch (Exception var2) {
                log.error("Base64 encode error.", var2);
                return null;
            }
        } else {
            return null;
        }
    }
}

RSA算法:

java 复制代码
package ins.common.util.rsa;

import java.io.UnsupportedEncodingException;
import java.security.Key;
import java.security.KeyFactory;
import java.security.KeyPair;
import java.security.KeyPairGenerator;
import java.security.NoSuchAlgorithmException;
import java.security.PrivateKey;
import java.security.PublicKey;
import java.security.spec.PKCS8EncodedKeySpec;
import java.security.spec.X509EncodedKeySpec;
import javax.crypto.Cipher;
import org.apache.commons.lang3.StringUtils;

/**
 * RSA算法,本系统主要用于登录的用户名和密码加密.
 *
 * RSA 很少用来做加密算法使用,一般多数用于数据签名算法中。
 * 这是由于 RSA 作为加密算法进行加密处理时,其所能处理的原文数据量不能超过 (RSA 长度 / 8 - 11),
 * 比如:RSA 1024 进行加密运算时,原文的长度不能超过 117 个字节。
 *
 * @author LuoGang
 *
 */
public class RSAHelper {
	/** 默认的密钥长度 */
	private static final int DEFAULT_KEY_SIZE = 1024;
	/** RSA加密算法 */
	private static final String ALGORITHOM = "RSA";
	/** 字符串默认使用的编码 */
	public static final String DEFAULT_CHARSET_NAME = "utf-8";

	/**
	 * 生成默认长度的密钥,默认为1024
	 *
	 * @return
	 * @see
	 */
	public static KeyPair generateKeyPair() {
		return generateKeyPair(DEFAULT_KEY_SIZE);
	}

	/**
	 * 生成一个密钥对
	 *
	 * @param keySize 密钥长度
	 * @return
	 */
	public static KeyPair generateKeyPair(int keySize) {
		try {
			KeyPairGenerator keyPairGen = KeyPairGenerator.getInstance(ALGORITHOM);
			keyPairGen.initialize(keySize);
			return keyPairGen.generateKeyPair();
		} catch (NoSuchAlgorithmException e) {
			// TODO Auto-generated catch block
			// e.printStackTrace();
			throw new RuntimeException(e);
		}
	}

	/**
	 * 根据字符串生成公钥
	 *
	 * @param publicKeyString 经过base64编码的公钥字符串
	 */
	public static PublicKey generatePublic(String publicKeyString) {
		try {
			KeyFactory kf = KeyFactory.getInstance(ALGORITHOM);
			return kf.generatePublic(new X509EncodedKeySpec(BASE64Helper.decode(publicKeyString)));
		} catch (Exception e) {
			throw new RuntimeException(e);
		}
	}

	/**
	 * 根据字符串生成私钥
	 *
	 * @param privateKeyString 经过base64编码的私钥字符串
	 */
	public static PrivateKey generatePrivate(String privateKeyString) {
		try {
			KeyFactory kf = KeyFactory.getInstance(ALGORITHOM);
			return kf.generatePrivate(new PKCS8EncodedKeySpec(BASE64Helper.decode(privateKeyString)));
		} catch (Exception e) {
			throw new RuntimeException(e);
		}
	}

	/**
	 * 使用key对数据input加密
	 *
	 * @param input 要加密的数据
	 * @param key 密钥
	 * @return
	 */
	public static byte[] encode(byte[] input, Key key) {
		try {
			Cipher cipher = Cipher.getInstance(ALGORITHOM);
			cipher.init(Cipher.ENCRYPT_MODE, key);
			byte[] bytes = cipher.doFinal(input);
			return bytes;
		} catch (Exception e) {
			throw new RuntimeException(e);
		}
	}

	/**
	 * 使用key对字符串inputString加密
	 *
	 * @param input 明文字符串
	 * @param key 密钥
	 * @param charsetName 字符串的编码方式
	 * @return 使用BASE64加密后的密文字符串
	 * @see BASE64Helper#encode(byte[])
	 */
	public static String encode(String input, Key key, String charsetName) {
		// byte[] input;
		// try {
		// input = StringUtil.isEmpty(charsetName) ? inputString.getBytes() : inputString.getBytes(charsetName);
		// } catch (Exception e) {
		// input = inputString.getBytes();
		// }
		byte[] bytes = encode(toBytes(input, charsetName), key);
		return BASE64Helper.encode(bytes);
	}

	/**
	 *
	 * 使用key对字符串inputString加密
	 *
	 * @param input 明文字符串
	 * @param key 密钥
	 * @return 使用BASE64加密后的密文字符串
	 * @see #encode(String, Key, String)
	 * @see BASE64Helper#encode(byte[])
	 */
	public static String encode(String input, Key key) {
		byte[] bytes = encode(toBytes(input, DEFAULT_CHARSET_NAME), key);
		return BASE64Helper.encode(bytes);
	}

	/**
	 * 使用key对数据input解密
	 *
	 * @param input 要解密的数据
	 * @param key 密钥
	 * @return
	 */
	public static byte[] decode(byte[] input, Key key) {
		try {
			Cipher cipher = Cipher.getInstance(ALGORITHOM);
			cipher.init(Cipher.DECRYPT_MODE, key);
			byte[] bytes = cipher.doFinal(input);
			return bytes;
		} catch (Exception e) {
			throw new RuntimeException(e);
		}
	}

	/**
	 * 将字符串input按照指定的编码转换为byte数组
	 *
	 * @param input 字符串
	 * @param charsetName 使用的编码
	 * @return
	 */
	public static byte[] toBytes(String input, String charsetName) {
		byte[] data;
		try {
			data = StringUtils.isEmpty(charsetName) ? input.getBytes() : input.getBytes(charsetName);
		} catch (UnsupportedEncodingException e) {
			// data = input.getBytes();
			throw new RuntimeException(e);
		}
		return data;
	}
}

MD5:

java 复制代码
package ins.common.util.md5;

public class MD5 {
	private long[] m_buf = new long[4]; /* state (ABCD) */
	private long[] m_bits = new long[2];

	/* number of bits, modulo 2^64 (lsb first) */
	private byte[] m_in = new byte[64]; /* input buffer */
	private char[] HEX = { '0', '1', '2', '3', '4', '5', '6', '7', '8', '9', 'a', 'b', 'c', 'd', 'e', 'f' };

	/**
	 * 获得一个哈西摘要
	 *
	 * @preserve 声明此方法不被JOC混淆
	 */
	public String toDigest(String src) {
		byte[] digest = toDigest(src.getBytes());
		StringBuffer sb = new StringBuffer();

		for (int i = 0; i < digest.length; i++) {
			sb.append(HEX[(int) (digest[i] & 0x0ff) / 16]);
			sb.append(HEX[(int) (digest[i] & 0x0ff) % 16]);
		}

		return sb.toString();
	}

	/**
	 * 获得一个哈西摘要
	 *
	 * @preserve 声明此方法不被JOC混淆
	 */
	public byte[] toDigest(byte[] src) {
		byte[] digest = new byte[16];
		int len = src.length;

		MD5Init();
		MD5Update(src, len);
		MD5Final(digest);

		return (digest);
	}

	private void memset(byte[] des, int des_offset, byte dat, int len) {
		int i;

		for (i = 0; i < len; i++) {
			des[des_offset + i] = dat;
		}
	}

	private void memset(long[] des, int des_offset, long dat, int len) {
		int i;

		for (i = 0; i < len; i++) {
			des[des_offset + i] = dat;
		}
	}

	private void memcpy(byte[] des, int des_offset, byte[] src, int src_offset, int len) {
		int i;

		for (i = 0; i < len; i++) {
			des[des_offset + i] = src[src_offset + i];
		}
	}

	private long bp2long(byte[] src, int offset_lng) {
		long ret = 0;
		ret = ((long) ((src[(offset_lng * 4) + 0]) & 0x0000000ffL))
				| ((long) ((src[(offset_lng * 4) + 1] << 8) & 0x00000ff00L))
				| ((long) ((src[(offset_lng * 4) + 2] << 16) & 0x000ff0000L))
				| ((long) ((src[(offset_lng * 4) + 3] << 24) & 0x0ff000000L));

		return (ret & 0x0ffffffffL);
	}

	/*
	 * Start MD5 accumulation. Set bit count to 0 and buffer to mysterious
	 * initialization constants.
	 */
	private void MD5Init() {
		m_buf[0] = 0x067452301L;
		m_buf[1] = 0x0efcdab89L;
		m_buf[2] = 0x098badcfeL;
		m_buf[3] = 0x010325476L;

		m_bits[0] = 0;
		m_bits[1] = 0;
	}

	/*
	 * Update context to reflect the concatenation of another buffer full of bytes.
	 */
	private void MD5Update(byte[] buf, int len) {
		long t;

		/* Update bitcount */
		t = m_bits[0];
		m_bits[0] = t + (len << 3);

		if ((m_bits[0]) < t) {
			m_bits[1]++; /* Carry from low to high */
		}

		m_bits[1] = m_bits[1] + (len >> 29);
		t = (t >> 3) & 0x3fL; /* Bytes already in shsInfo->data */

		/* Handle any leading odd-sized chunks */
		if (t != 0L) {
			long p = t;
			t = (64 - t) & 0x0ffffffffL;

			if (len < t) {
				memcpy(m_in, (int) t, buf, 0, len);

				return;
			}

			memcpy(m_in, (int) t, buf, 0, (int) t);
			MD5Transform();

			len -= t;
		}

		/* Process data in 64-byte chunks */
		while (len >= 64) {
			memcpy(m_in, 0, buf, (int) t, 64);
			MD5Transform();
			t += 64;
			len -= 64;
		}

		/* Handle any remaining bytes of data. */
		memcpy(m_in, 0, buf, (int) t, len);
	}

	/*
	 * Final wrapup - pad to 64-byte boundary with the bit pattern 1 0* (64-bit
	 * count of bits processed, MSB-first)
	 */
	private void MD5Final(byte[] digest) {
		long count;
		long p;

		/* Compute number of bytes mod 64 */
		count = (m_bits[0] >> 3) & 0x3fL;

		/*
		 * Set the first char of padding to 0x80. This is safe since there is always at
		 * least one byte free
		 */
		m_in[(int) count] = (byte) 0x080;
		p = count + 1;

		/* Bytes of padding needed to make 64 bytes */
		count = 64 - 1 - count;

		/* Pad out to 56 mod 64 */
		if (count < 8) {
			/* Two lots of padding: Pad the first block to 64 bytes */
			memset(m_in, (int) p, (byte) 0, (int) count);
			MD5Transform();

			/* Now fill the next block with 56 bytes */
			memset(m_in, 0, (byte) 0, 56);
		} else {
			/* Pad block to 56 bytes */
			memset(m_in, (int) p, (byte) 0, (int) (count - 8));
		}

		/* Append length in bits and transform */
		m_in[(14 * 4) + 0] = (byte) (m_bits[0] & 0x0ff);
		m_in[(14 * 4) + 1] = (byte) ((m_bits[0] >> 8) & 0x0ff);
		m_in[(14 * 4) + 2] = (byte) ((m_bits[0] >> 16) & 0x0ff);
		m_in[(14 * 4) + 3] = (byte) ((m_bits[0] >> 24) & 0x0ff);
		m_in[(15 * 4) + 0] = (byte) (m_bits[1] & 0x0ff);
		m_in[(15 * 4) + 1] = (byte) ((m_bits[1] >> 8) & 0x0ff);
		m_in[(15 * 4) + 2] = (byte) ((m_bits[1] >> 16) & 0x0ff);
		m_in[(15 * 4) + 3] = (byte) ((m_bits[1] >> 24) & 0x0ff);

		MD5Transform();

		for (int i = 0; i < 4; i++) {
			digest[(i * 4) + 0] = (byte) (m_buf[i] & 0x0ff);
			digest[(i * 4) + 1] = (byte) ((m_buf[i] >> 8) & 0x0ff);
			digest[(i * 4) + 2] = (byte) ((m_buf[i] >> 16) & 0x0ff);
			digest[(i * 4) + 3] = (byte) ((m_buf[i] >> 24) & 0x0ff);
		}

		MD5Init();
	}

	/* The four core functions - F1 is optimized somewhat */
	/* #define F1(x, y, z) (x & y | ~x & z) */
	private long F1(long x, long y, long z) {
		return ((z ^ (x & (y ^ z))) & 0x0ffffffffL);
	}

	private long F2(long x, long y, long z) {
		return (F1(z, x, y));
	}

	private long F3(long x, long y, long z) {
		return ((x ^ y ^ z) & 0x0ffffffffL);
	}

	private long F4(long x, long y, long z) {
		return ((y ^ (x | ~z)) & 0x0ffffffffL);
	}

	/* This is the central step in the MD5 algorithm. */
	private long MD5STEP(long w, long f, long x, long y, long z, long data, long s) {
		w = (w + f + data) & 0x0ffffffffL;
		w = ((w << s) | (w >> (32 - s))) & 0x0ffffffffL;
		w = (w + x) & 0x0ffffffffL;

		return (w);
	}

	/*
	 * The core of the MD5 algorithm, this alters an existing MD5 hash to reflect
	 * the addition of 16 longwords of new data. MD5Update blocks the data and
	 * converts bytes into longwords for this routine.
	 */
	private void MD5Transform() {
		long a;
		long b;
		long c;
		long d;

		a = m_buf[0];
		b = m_buf[1];
		c = m_buf[2];
		d = m_buf[3];

		a = MD5STEP(a, F1(b, c, d), b, c, d, bp2long(m_in, 0) + 0x0d76aa478L, 7);
		d = MD5STEP(d, F1(a, b, c), a, b, c, bp2long(m_in, 1) + 0x0e8c7b756L, 12);
		c = MD5STEP(c, F1(d, a, b), d, a, b, bp2long(m_in, 2) + 0x0242070dbL, 17);
		b = MD5STEP(b, F1(c, d, a), c, d, a, bp2long(m_in, 3) + 0x0c1bdceeeL, 22);
		a = MD5STEP(a, F1(b, c, d), b, c, d, bp2long(m_in, 4) + 0x0f57c0fafL, 7);
		d = MD5STEP(d, F1(a, b, c), a, b, c, bp2long(m_in, 5) + 0x04787c62aL, 12);
		c = MD5STEP(c, F1(d, a, b), d, a, b, bp2long(m_in, 6) + 0x0a8304613L, 17);
		b = MD5STEP(b, F1(c, d, a), c, d, a, bp2long(m_in, 7) + 0x0fd469501L, 22);
		a = MD5STEP(a, F1(b, c, d), b, c, d, bp2long(m_in, 8) + 0x0698098d8L, 7);
		d = MD5STEP(d, F1(a, b, c), a, b, c, bp2long(m_in, 9) + 0x08b44f7afL, 12);
		c = MD5STEP(c, F1(d, a, b), d, a, b, bp2long(m_in, 10) + 0x0ffff5bb1L, 17);
		b = MD5STEP(b, F1(c, d, a), c, d, a, bp2long(m_in, 11) + 0x0895cd7beL, 22);
		a = MD5STEP(a, F1(b, c, d), b, c, d, bp2long(m_in, 12) + 0x06b901122L, 7);
		d = MD5STEP(d, F1(a, b, c), a, b, c, bp2long(m_in, 13) + 0x0fd987193L, 12);
		c = MD5STEP(c, F1(d, a, b), d, a, b, bp2long(m_in, 14) + 0x0a679438eL, 17);
		b = MD5STEP(b, F1(c, d, a), c, d, a, bp2long(m_in, 15) + 0x049b40821L, 22);

		a = MD5STEP(a, F2(b, c, d), b, c, d, bp2long(m_in, 1) + 0x0f61e2562L, 5);
		d = MD5STEP(d, F2(a, b, c), a, b, c, bp2long(m_in, 6) + 0x0c040b340L, 9);
		c = MD5STEP(c, F2(d, a, b), d, a, b, bp2long(m_in, 11) + 0x0265e5a51L, 14);
		b = MD5STEP(b, F2(c, d, a), c, d, a, bp2long(m_in, 0) + 0x0e9b6c7aaL, 20);
		a = MD5STEP(a, F2(b, c, d), b, c, d, bp2long(m_in, 5) + 0x0d62f105dL, 5);
		d = MD5STEP(d, F2(a, b, c), a, b, c, bp2long(m_in, 10) + 0x002441453L, 9);
		c = MD5STEP(c, F2(d, a, b), d, a, b, bp2long(m_in, 15) + 0x0d8a1e681L, 14);
		b = MD5STEP(b, F2(c, d, a), c, d, a, bp2long(m_in, 4) + 0x0e7d3fbc8L, 20);
		a = MD5STEP(a, F2(b, c, d), b, c, d, bp2long(m_in, 9) + 0x021e1cde6L, 5);
		d = MD5STEP(d, F2(a, b, c), a, b, c, bp2long(m_in, 14) + 0x0c33707d6L, 9);
		c = MD5STEP(c, F2(d, a, b), d, a, b, bp2long(m_in, 3) + 0x0f4d50d87L, 14);
		b = MD5STEP(b, F2(c, d, a), c, d, a, bp2long(m_in, 8) + 0x0455a14edL, 20);
		a = MD5STEP(a, F2(b, c, d), b, c, d, bp2long(m_in, 13) + 0x0a9e3e905L, 5);
		d = MD5STEP(d, F2(a, b, c), a, b, c, bp2long(m_in, 2) + 0x0fcefa3f8L, 9);
		c = MD5STEP(c, F2(d, a, b), d, a, b, bp2long(m_in, 7) + 0x0676f02d9L, 14);
		b = MD5STEP(b, F2(c, d, a), c, d, a, bp2long(m_in, 12) + 0x08d2a4c8aL, 20);

		a = MD5STEP(a, F3(b, c, d), b, c, d, bp2long(m_in, 5) + 0x0fffa3942L, 4);
		d = MD5STEP(d, F3(a, b, c), a, b, c, bp2long(m_in, 8) + 0x08771f681L, 11);
		c = MD5STEP(c, F3(d, a, b), d, a, b, bp2long(m_in, 11) + 0x06d9d6122L, 16);
		b = MD5STEP(b, F3(c, d, a), c, d, a, bp2long(m_in, 14) + 0x0fde5380cL, 23);
		a = MD5STEP(a, F3(b, c, d), b, c, d, bp2long(m_in, 1) + 0x0a4beea44L, 4);
		d = MD5STEP(d, F3(a, b, c), a, b, c, bp2long(m_in, 4) + 0x04bdecfa9L, 11);
		c = MD5STEP(c, F3(d, a, b), d, a, b, bp2long(m_in, 7) + 0x0f6bb4b60L, 16);
		b = MD5STEP(b, F3(c, d, a), c, d, a, bp2long(m_in, 10) + 0x0bebfbc70L, 23);
		a = MD5STEP(a, F3(b, c, d), b, c, d, bp2long(m_in, 13) + 0x0289b7ec6L, 4);
		d = MD5STEP(d, F3(a, b, c), a, b, c, bp2long(m_in, 0) + 0x0eaa127faL, 11);
		c = MD5STEP(c, F3(d, a, b), d, a, b, bp2long(m_in, 3) + 0x0d4ef3085L, 16);
		b = MD5STEP(b, F3(c, d, a), c, d, a, bp2long(m_in, 6) + 0x004881d05L, 23);
		a = MD5STEP(a, F3(b, c, d), b, c, d, bp2long(m_in, 9) + 0x0d9d4d039L, 4);
		d = MD5STEP(d, F3(a, b, c), a, b, c, bp2long(m_in, 12) + 0x0e6db99e5L, 11);
		c = MD5STEP(c, F3(d, a, b), d, a, b, bp2long(m_in, 15) + 0x01fa27cf8L, 16);
		b = MD5STEP(b, F3(c, d, a), c, d, a, bp2long(m_in, 2) + 0x0c4ac5665L, 23);

		a = MD5STEP(a, F4(b, c, d), b, c, d, bp2long(m_in, 0) + 0x0f4292244L, 6);
		d = MD5STEP(d, F4(a, b, c), a, b, c, bp2long(m_in, 7) + 0x0432aff97L, 10);
		c = MD5STEP(c, F4(d, a, b), d, a, b, bp2long(m_in, 14) + 0x0ab9423a7L, 15);
		b = MD5STEP(b, F4(c, d, a), c, d, a, bp2long(m_in, 5) + 0x0fc93a039L, 21);
		a = MD5STEP(a, F4(b, c, d), b, c, d, bp2long(m_in, 12) + 0x0655b59c3L, 6);
		d = MD5STEP(d, F4(a, b, c), a, b, c, bp2long(m_in, 3) + 0x08f0ccc92L, 10);
		c = MD5STEP(c, F4(d, a, b), d, a, b, bp2long(m_in, 10) + 0x0ffeff47dL, 15);
		b = MD5STEP(b, F4(c, d, a), c, d, a, bp2long(m_in, 1) + 0x085845dd1L, 21);
		a = MD5STEP(a, F4(b, c, d), b, c, d, bp2long(m_in, 8) + 0x06fa87e4fL, 6);
		d = MD5STEP(d, F4(a, b, c), a, b, c, bp2long(m_in, 15) + 0x0fe2ce6e0L, 10);
		c = MD5STEP(c, F4(d, a, b), d, a, b, bp2long(m_in, 6) + 0x0a3014314L, 15);
		b = MD5STEP(b, F4(c, d, a), c, d, a, bp2long(m_in, 13) + 0x04e0811a1L, 21);
		a = MD5STEP(a, F4(b, c, d), b, c, d, bp2long(m_in, 4) + 0x0f7537e82L, 6);
		d = MD5STEP(d, F4(a, b, c), a, b, c, bp2long(m_in, 11) + 0x0bd3af235L, 10);
		c = MD5STEP(c, F4(d, a, b), d, a, b, bp2long(m_in, 2) + 0x02ad7d2bbL, 15);
		b = MD5STEP(b, F4(c, d, a), c, d, a, bp2long(m_in, 9) + 0x0eb86d391L, 21);

		m_buf[0] += a;
		m_buf[1] += b;
		m_buf[2] += c;
		m_buf[3] += d;
	}
	// public static void main(String[] args) {
	// MD5 md5 = new MD5();
	// String md5_str =
	// md5.toDigest(md5.toDigest("140423198908307218x".toUpperCase()).toUpperCase()+"BDYZ".toUpperCase()).toUpperCase();
	// System.out.println(md5_str);
	// }

}

使用:

java 复制代码
MD5 md5 = new MD5();
String encPassword = md5.toDigest(reqVo.getPassword()).toUpperCase();
if (user.getPassword() == null || !user.getPassword().equals(encPassword)) {
	resBean.setData("密码不正确");
	resBean.setStatus(0);
	resBean.setStatusText("fail");
	return resBean;
}
相关推荐
喵叔哟10 分钟前
重构代码中引入外部方法和引入本地扩展的区别
java·开发语言·重构
尘浮生16 分钟前
Java项目实战II基于微信小程序的电影院买票选座系统(开发文档+数据库+源码)
java·开发语言·数据库·微信小程序·小程序·maven·intellij-idea
不是二师兄的八戒39 分钟前
本地 PHP 和 Java 开发环境 Docker 化与配置开机自启
java·docker·php
爱编程的小生1 小时前
Easyexcel(2-文件读取)
java·excel
带多刺的玫瑰1 小时前
Leecode刷题C语言之统计不是特殊数字的数字数量
java·c语言·算法
爱敲代码的憨仔1 小时前
《线性代数的本质》
线性代数·算法·决策树
yigan_Eins1 小时前
【数论】莫比乌斯函数及其反演
c++·经验分享·算法
阿史大杯茶2 小时前
AtCoder Beginner Contest 381(ABCDEF 题)视频讲解
数据结构·c++·算法
计算机毕设指导62 小时前
基于 SpringBoot 的作业管理系统【附源码】
java·vue.js·spring boot·后端·mysql·spring·intellij-idea
Gu Gu Study2 小时前
枚举与lambda表达式,枚举实现单例模式为什么是安全的,lambda表达式与函数式接口的小九九~
java·开发语言