前端传值:encryptedData、iv、code
step1:将code发送给微信服务器,获取openid和session_key
step2:根据encryptedData、iv、session_key(会话密钥),通过AES解密获取到用户所有信息
import lombok.Data;
@Data
@AllArgsConstructor
@NoArgsConstructor
//前端传参字段定义
public class EncryBO {
private String code;
private String iv;
private String encryptedData;
}
public interface Constants {
String CODE_200 = "200"; //请求成功
String CODE_401 = "401"; // 权限不足
String CODE_400 = "400"; // 参数错误
String CODE_500 = "500"; // 请求失败
String DICT_TYPE_ICON = "icon";
String FILES_KEY = "FILES_FRONT_ALL";
}
import lombok.AllArgsConstructor;
import lombok.Data;
import lombok.NoArgsConstructor;
@Data
@AllArgsConstructor
@NoArgsConstructor
public class Back {
private String code;
private String msg;
private Object data;
public static Back success() {
return new Back(Constants.CODE_200, "请求成功", null);
}
public static Back success(Object data) {
return new Back(Constants.CODE_200, "请求成功", data);
}
public static Back error(String code, String msg) {
return new Back(code, msg, null);
}
public static Back error() {
return new Back(Constants.CODE_500, "请求失败", null);
}
}
import lombok.extern.slf4j.Slf4j;
import org.apache.commons.codec.binary.Base64;
import org.bouncycastle.jce.provider.BouncyCastleProvider;
import javax.crypto.BadPaddingException;
import javax.crypto.Cipher;
import javax.crypto.IllegalBlockSizeException;
import javax.crypto.NoSuchPaddingException;
import javax.crypto.spec.IvParameterSpec;
import javax.crypto.spec.SecretKeySpec;
import javax.validation.constraints.NotNull;
import java.io.UnsupportedEncodingException;
import java.security.*;
import java.security.spec.InvalidParameterSpecException;
import java.util.Arrays;
/**
* @ClassName AESUtils
* @Description TODO
* @Author 独狼Kiss
* @Date 2021/9/14 13:46
* @Version 1.0
**/
@Slf4j
public class AESUtils {
// 加密模式
private static final String ALGORITHM = "AES/CBC/PKCS7Padding";
private static final String CHARSET_NAME = "UTF-8";
private static final String AES_NAME = "AES";
//解决java.security.NoSuchAlgorithmException: Cannot find any provider supporting AES/CBC/PKCS7Padding
static {
Security.addProvider(new BouncyCastleProvider());
}
/**
* 解密
*
* @param content 目标密文
* @param key 秘钥
* @param iv 偏移量
* @return
*/
public static String decrypt(@NotNull String content, @NotNull String key, @NotNull String iv) {
String result = "";
// 被加密的数据
byte[] dataByte = Base64.decodeBase64(content);
// 加密秘钥
byte[] keyByte = Base64.decodeBase64(key);
// 偏移量
byte[] ivByte = Base64.decodeBase64(iv);
try {
// 如果密钥不足16位,那么就补足. 这个if 中的内容很重要
int base = 16;
if (keyByte.length % base != 0) {
int groups = keyByte.length / base
+ (keyByte.length % base != 0 ? 1 : 0);
byte[] temp = new byte[groups * base];
Arrays.fill(temp, (byte) 0);
System.arraycopy(keyByte, 0, temp, 0, keyByte.length);
keyByte = temp;
}
if (ivByte.length % base != 0) {
int groups = ivByte.length / base
+ (ivByte.length % base != 0 ? 1 : 0);
byte[] temp = new byte[groups * base];
Arrays.fill(temp, (byte) 0);
System.arraycopy(ivByte, 0, temp, 0, ivByte.length);
ivByte = temp;
}
// 初始化
Security.addProvider(new BouncyCastleProvider());
Cipher cipher = Cipher.getInstance("AES/CBC/PKCS7Padding", "BC");
SecretKeySpec spec = new SecretKeySpec(keyByte, "AES");
AlgorithmParameters parameters = AlgorithmParameters
.getInstance("AES");
parameters.init(new IvParameterSpec(ivByte));
cipher.init(Cipher.DECRYPT_MODE, spec, parameters);// 初始化
byte[] resultByte = cipher.doFinal(dataByte);
if (null != resultByte && resultByte.length > 0) {
result = new String(resultByte, "UTF-8");
}
} catch (NoSuchAlgorithmException e) {
e.printStackTrace();
} catch (NoSuchPaddingException e) {
e.printStackTrace();
} catch (InvalidParameterSpecException e) {
e.printStackTrace();
} catch (IllegalBlockSizeException e) {
e.printStackTrace();
} catch (BadPaddingException e) {
e.printStackTrace();
} catch (UnsupportedEncodingException e) {
e.printStackTrace();
} catch (InvalidKeyException e) {
e.printStackTrace();
} catch (InvalidAlgorithmParameterException e) {
e.printStackTrace();
} catch (NoSuchProviderException e) {
e.printStackTrace();
}
return result;
}
}
@RestController
@RequestMapping("/scancode")
public class ScanController {
@Autowired
private UserService userService;
JSONObject jsonObject;
/**
* 解密用户信息
*
* @param encrybo
* @return
* @throws IOException
*/
@PostMapping("/authority")
public Back detail1(@RequestBody EncryBO encrybo) throws IOException {
//将appid和secret填上
String url = "https://api.weixin.qq.com/sns/jscode2session?appid=appid&secret=secret&js_code=" + encrybo.getCode() + "&grant_type=authorization_code ";
OkHttpClient client = new OkHttpClient();
Request request = new Request.Builder().url(url).build();
Response response = client.newCall(request).execute();
if (response.isSuccessful()) {
//获取openid,session_key
String body = response.body().string();
JSONObject jsonObject = JSON.parseObject(body);
String openid = jsonObject.getString("openid");
String session_key = jsonObject.getString("session_key");
//获取encryptedData,iv(前端传值,根据get方法获取)
String encryptedData = encrybo.getEncryptedData();
String iv = encrybo.getIv();
//解密用户信息,decrypt是json格式
String decrypt = AESUtils.decrypt(encryptedData, session_key, iv);
//将json格式转换为字符串
JSONObject jsonObject2 = JSON.parseObject(decrypt);
String nickName = jsonObject2.getString("nickName");
String gender = jsonObject2.getString("gender");
String avatarUrl = jsonObject2.getString("avatarUrl");
}
return Back.error();
}