您现在的位置是:首页 > 技术教程 正文

实现注册登录时数据的加密传输(含前后端具体代码)

admin 阅读: 2024-03-30
后台-插件-广告管理-内容页头部广告(手机)

前言

http/https协议提交在被抓包时请求内容是明文的, 直接传输账号密码的风险非常大,故这里我们要对数据加密处理,并生成校验码,防止数据篡改

目录

​编辑

前言

具体思路

代码实现

前端信息加密处理(Vue)

安装crypto-js库,用来AES加密

编写AES加密工具类

编写MD5加密类

后端处理(springboot)

自定义AES加密密钥以及盐值长度等配置

定义AES工具类

定义MD5工具类

随机盐值生成工具类(能生成随机字符串即可)

用户注册Controller层

用户注册Service层

用户登录Controller层

用户登录service层

总结

Http/https传输账户密码等数据时需要加密处理的原因主要有以下几点:

  • 数据保密性:账户密码等敏感信息是用户的私密数据,如果明文传输,可能会被中间人窃取或篡改,导致用户的账户被盗用或信息泄露。通过加密处理,可以保证数据在传输过程中的保密性,使得只有合法的接收方能够解密和使用这些数据。
  • 防止篡改:在传输过程中,数据可能会被恶意篡改,例如中间人攻击、数据包劫持等。通过加密处理,可以在接收方验证数据的完整性,确保数据在传输过程中没有被篡改。
  • 身份验证:加密处理可以用于身份验证,确保数据的发送方和接收方的身份是合法的。例如,使用公钥加密算法对数据进行加密,只有拥有私钥的接收方才能解密,从而验证发送方的身份。

实现思路

1.前端对账户信息进行AES加密(与后端使用同一密钥),密码进行MD5加密,再将加密后面的两个字符串拼接在一起,进行MD5加密作为我们的校验码(校验加密数据在请求过程中是否被更改)

2.后端收到加密后的账户和密码以及校验码,同第一步加密得校验码,比较校验码是否一致,如果一致,进行后续操作

  • 注册时,后端对接受到的MD5加密后的密码进行加盐加密操作,并将盐值一并存入库中,方便后续登录校验
  • 登录时,取得对应用户的盐值,对接收到的密码进行加盐加密,再与原先库中的密码相比较

以下是注册操作的大体流程

代码实现

前端信息加密处理(Vue)

安装crypto-js库,用来AES加密

npm install crypto-js --save-dev

编写AES加密工具类

这里AES加密算法可以自由选择,但是要与后端AES加密解密使用的算法一致,否则会出现验签不成功的问题

  1. import CryptoJS from 'crypto-js';
  2. //加密
  3. export const aesEncrypt = (word : string, keyStr : string) => {
  4. keyStr = keyStr ? keyStr : 'abcdsxyzhkj12345'; //判断是否存在ksy,不存在就用定义好的key
  5. const key = CryptoJS.enc.Utf8.parse(keyStr);
  6. const srcs = CryptoJS.enc.Utf8.parse(word);
  7. const encrypted = CryptoJS.AES.encrypt(srcs, key, { mode: CryptoJS.mode.ECB, padding: CryptoJS.pad.Pkcs7 });
  8. return encrypted.toString();
  9. }
  10. //解密
  11. export const aesDecrypt = (word : string, keyStr : string) => {
  12. keyStr = keyStr ? keyStr : 'abcdsxyzhkj12345';
  13. const key = CryptoJS.enc.Utf8.parse(keyStr);
  14. const decrypt = CryptoJS.AES.decrypt(word, key, { mode: CryptoJS.mode.ECB, padding: CryptoJS.pad.Pkcs7 });
  15. return CryptoJS.enc.Utf8.stringify(decrypt).toString();
  16. }
  17. //密钥(长度必须为16位,或者16位的倍数)
  18. export const encodeSecret = "1148+=--jkl;P,fj"

编写MD5加密类

  1. // md5加密
  2. export function md5(string : string,bit : Number) {
  3. function md5_RotateLeft(lValue, iShiftBits) {
  4. return (lValue << iShiftBits) | (lValue >>> (32 - iShiftBits));
  5. }
  6. function md5_AddUnsigned(lX, lY) {
  7. var lX4, lY4, lX8, lY8, lResult;
  8. lX8 = (lX & 0x80000000);
  9. lY8 = (lY & 0x80000000);
  10. lX4 = (lX & 0x40000000);
  11. lY4 = (lY & 0x40000000);
  12. lResult = (lX & 0x3FFFFFFF) + (lY & 0x3FFFFFFF);
  13. if (lX4 & lY4) {
  14. return (lResult ^ 0x80000000 ^ lX8 ^ lY8);
  15. }
  16. if (lX4 | lY4) {
  17. if (lResult & 0x40000000) {
  18. return (lResult ^ 0xC0000000 ^ lX8 ^ lY8);
  19. } else {
  20. return (lResult ^ 0x40000000 ^ lX8 ^ lY8);
  21. }
  22. } else {
  23. return (lResult ^ lX8 ^ lY8);
  24. }
  25. }
  26. function md5_F(x, y, z) {
  27. return (x & y) | ((~x) & z);
  28. }
  29. function md5_G(x, y, z) {
  30. return (x & z) | (y & (~z));
  31. }
  32. function md5_H(x, y, z) {
  33. return (x ^ y ^ z);
  34. }
  35. function md5_I(x, y, z) {
  36. return (y ^ (x | (~z)));
  37. }
  38. function md5_FF(a, b, c, d, x, s, ac) {
  39. a = md5_AddUnsigned(a, md5_AddUnsigned(md5_AddUnsigned(md5_F(b, c, d), x), ac));
  40. return md5_AddUnsigned(md5_RotateLeft(a, s), b);
  41. };
  42. function md5_GG(a, b, c, d, x, s, ac) {
  43. a = md5_AddUnsigned(a, md5_AddUnsigned(md5_AddUnsigned(md5_G(b, c, d), x), ac));
  44. return md5_AddUnsigned(md5_RotateLeft(a, s), b);
  45. };
  46. function md5_HH(a, b, c, d, x, s, ac) {
  47. a = md5_AddUnsigned(a, md5_AddUnsigned(md5_AddUnsigned(md5_H(b, c, d), x), ac));
  48. return md5_AddUnsigned(md5_RotateLeft(a, s), b);
  49. };
  50. function md5_II(a, b, c, d, x, s, ac) {
  51. a = md5_AddUnsigned(a, md5_AddUnsigned(md5_AddUnsigned(md5_I(b, c, d), x), ac));
  52. return md5_AddUnsigned(md5_RotateLeft(a, s), b);
  53. };
  54. function md5_ConvertToWordArray(string) {
  55. var lWordCount;
  56. var lMessageLength = string.length;
  57. var lNumberOfWords_temp1 = lMessageLength + 8;
  58. var lNumberOfWords_temp2 = (lNumberOfWords_temp1 - (lNumberOfWords_temp1 % 64)) / 64;
  59. var lNumberOfWords = (lNumberOfWords_temp2 + 1) * 16;
  60. var lWordArray = Array(lNumberOfWords - 1);
  61. var lBytePosition = 0;
  62. var lByteCount = 0;
  63. while (lByteCount < lMessageLength) {
  64. lWordCount = (lByteCount - (lByteCount % 4)) / 4;
  65. lBytePosition = (lByteCount % 4) * 8;
  66. lWordArray[lWordCount] = (lWordArray[lWordCount] | (string.charCodeAt(lByteCount) << lBytePosition));
  67. lByteCount++;
  68. }
  69. lWordCount = (lByteCount - (lByteCount % 4)) / 4;
  70. lBytePosition = (lByteCount % 4) * 8;
  71. lWordArray[lWordCount] = lWordArray[lWordCount] | (0x80 << lBytePosition);
  72. lWordArray[lNumberOfWords - 2] = lMessageLength << 3;
  73. lWordArray[lNumberOfWords - 1] = lMessageLength >>> 29;
  74. return lWordArray;
  75. };
  76. function md5_WordToHex(lValue) {
  77. var WordToHexValue = "", WordToHexValue_temp = "", lByte, lCount;
  78. for (lCount = 0; lCount <= 3; lCount++) {
  79. lByte = (lValue >>> (lCount * 8)) & 255;
  80. WordToHexValue_temp = "0" + lByte.toString(16);
  81. WordToHexValue = WordToHexValue + WordToHexValue_temp.substr(WordToHexValue_temp.length - 2, 2);
  82. }
  83. return WordToHexValue;
  84. };
  85. function md5_Utf8Encode(string) {
  86. string = string.replace(/\r\n/g, "\n");
  87. var utftext = "";
  88. for (var n = 0; n < string.length; n++) {
  89. var c = string.charCodeAt(n);
  90. if (c < 128) {
  91. utftext += String.fromCharCode(c);
  92. } else if ((c > 127) && (c < 2048)) {
  93. utftext += String.fromCharCode((c >> 6) | 192);
  94. utftext += String.fromCharCode((c & 63) | 128);
  95. } else {
  96. utftext += String.fromCharCode((c >> 12) | 224);
  97. utftext += String.fromCharCode(((c >> 6) & 63) | 128);
  98. utftext += String.fromCharCode((c & 63) | 128);
  99. }
  100. }
  101. return utftext;
  102. };
  103. var x = Array();
  104. var k, AA, BB, CC, DD, a, b, c, d;
  105. var S11 = 7, S12 = 12, S13 = 17, S14 = 22;
  106. var S21 = 5, S22 = 9, S23 = 14, S24 = 20;
  107. var S31 = 4, S32 = 11, S33 = 16, S34 = 23;
  108. var S41 = 6, S42 = 10, S43 = 15, S44 = 21;
  109. string = md5_Utf8Encode(string);
  110. x = md5_ConvertToWordArray(string);
  111. a = 0x67452301; b = 0xEFCDAB89; c = 0x98BADCFE; d = 0x10325476;
  112. for (k = 0; k < x.length; k += 16) {
  113. AA = a; BB = b; CC = c; DD = d;
  114. a = md5_FF(a, b, c, d, x[k + 0], S11, 0xD76AA478);
  115. d = md5_FF(d, a, b, c, x[k + 1], S12, 0xE8C7B756);
  116. c = md5_FF(c, d, a, b, x[k + 2], S13, 0x242070DB);
  117. b = md5_FF(b, c, d, a, x[k + 3], S14, 0xC1BDCEEE);
  118. a = md5_FF(a, b, c, d, x[k + 4], S11, 0xF57C0FAF);
  119. d = md5_FF(d, a, b, c, x[k + 5], S12, 0x4787C62A);
  120. c = md5_FF(c, d, a, b, x[k + 6], S13, 0xA8304613);
  121. b = md5_FF(b, c, d, a, x[k + 7], S14, 0xFD469501);
  122. a = md5_FF(a, b, c, d, x[k + 8], S11, 0x698098D8);
  123. d = md5_FF(d, a, b, c, x[k + 9], S12, 0x8B44F7AF);
  124. c = md5_FF(c, d, a, b, x[k + 10], S13, 0xFFFF5BB1);
  125. b = md5_FF(b, c, d, a, x[k + 11], S14, 0x895CD7BE);
  126. a = md5_FF(a, b, c, d, x[k + 12], S11, 0x6B901122);
  127. d = md5_FF(d, a, b, c, x[k + 13], S12, 0xFD987193);
  128. c = md5_FF(c, d, a, b, x[k + 14], S13, 0xA679438E);
  129. b = md5_FF(b, c, d, a, x[k + 15], S14, 0x49B40821);
  130. a = md5_GG(a, b, c, d, x[k + 1], S21, 0xF61E2562);
  131. d = md5_GG(d, a, b, c, x[k + 6], S22, 0xC040B340);
  132. c = md5_GG(c, d, a, b, x[k + 11], S23, 0x265E5A51);
  133. b = md5_GG(b, c, d, a, x[k + 0], S24, 0xE9B6C7AA);
  134. a = md5_GG(a, b, c, d, x[k + 5], S21, 0xD62F105D);
  135. d = md5_GG(d, a, b, c, x[k + 10], S22, 0x2441453);
  136. c = md5_GG(c, d, a, b, x[k + 15], S23, 0xD8A1E681);
  137. b = md5_GG(b, c, d, a, x[k + 4], S24, 0xE7D3FBC8);
  138. a = md5_GG(a, b, c, d, x[k + 9], S21, 0x21E1CDE6);
  139. d = md5_GG(d, a, b, c, x[k + 14], S22, 0xC33707D6);
  140. c = md5_GG(c, d, a, b, x[k + 3], S23, 0xF4D50D87);
  141. b = md5_GG(b, c, d, a, x[k + 8], S24, 0x455A14ED);
  142. a = md5_GG(a, b, c, d, x[k + 13], S21, 0xA9E3E905);
  143. d = md5_GG(d, a, b, c, x[k + 2], S22, 0xFCEFA3F8);
  144. c = md5_GG(c, d, a, b, x[k + 7], S23, 0x676F02D9);
  145. b = md5_GG(b, c, d, a, x[k + 12], S24, 0x8D2A4C8A);
  146. a = md5_HH(a, b, c, d, x[k + 5], S31, 0xFFFA3942);
  147. d = md5_HH(d, a, b, c, x[k + 8], S32, 0x8771F681);
  148. c = md5_HH(c, d, a, b, x[k + 11], S33, 0x6D9D6122);
  149. b = md5_HH(b, c, d, a, x[k + 14], S34, 0xFDE5380C);
  150. a = md5_HH(a, b, c, d, x[k + 1], S31, 0xA4BEEA44);
  151. d = md5_HH(d, a, b, c, x[k + 4], S32, 0x4BDECFA9);
  152. c = md5_HH(c, d, a, b, x[k + 7], S33, 0xF6BB4B60);
  153. b = md5_HH(b, c, d, a, x[k + 10], S34, 0xBEBFBC70);
  154. a = md5_HH(a, b, c, d, x[k + 13], S31, 0x289B7EC6);
  155. d = md5_HH(d, a, b, c, x[k + 0], S32, 0xEAA127FA);
  156. c = md5_HH(c, d, a, b, x[k + 3], S33, 0xD4EF3085);
  157. b = md5_HH(b, c, d, a, x[k + 6], S34, 0x4881D05);
  158. a = md5_HH(a, b, c, d, x[k + 9], S31, 0xD9D4D039);
  159. d = md5_HH(d, a, b, c, x[k + 12], S32, 0xE6DB99E5);
  160. c = md5_HH(c, d, a, b, x[k + 15], S33, 0x1FA27CF8);
  161. b = md5_HH(b, c, d, a, x[k + 2], S34, 0xC4AC5665);
  162. a = md5_II(a, b, c, d, x[k + 0], S41, 0xF4292244);
  163. d = md5_II(d, a, b, c, x[k + 7], S42, 0x432AFF97);
  164. c = md5_II(c, d, a, b, x[k + 14], S43, 0xAB9423A7);
  165. b = md5_II(b, c, d, a, x[k + 5], S44, 0xFC93A039);
  166. a = md5_II(a, b, c, d, x[k + 12], S41, 0x655B59C3);
  167. d = md5_II(d, a, b, c, x[k + 3], S42, 0x8F0CCC92);
  168. c = md5_II(c, d, a, b, x[k + 10], S43, 0xFFEFF47D);
  169. b = md5_II(b, c, d, a, x[k + 1], S44, 0x85845DD1);
  170. a = md5_II(a, b, c, d, x[k + 8], S41, 0x6FA87E4F);
  171. d = md5_II(d, a, b, c, x[k + 15], S42, 0xFE2CE6E0);
  172. c = md5_II(c, d, a, b, x[k + 6], S43, 0xA3014314);
  173. b = md5_II(b, c, d, a, x[k + 13], S44, 0x4E0811A1);
  174. a = md5_II(a, b, c, d, x[k + 4], S41, 0xF7537E82);
  175. d = md5_II(d, a, b, c, x[k + 11], S42, 0xBD3AF235);
  176. c = md5_II(c, d, a, b, x[k + 2], S43, 0x2AD7D2BB);
  177. b = md5_II(b, c, d, a, x[k + 9], S44, 0xEB86D391);
  178. a = md5_AddUnsigned(a, AA);
  179. b = md5_AddUnsigned(b, BB);
  180. c = md5_AddUnsigned(c, CC);
  181. d = md5_AddUnsigned(d, DD);
  182. }
  183. if(bit==32){
  184. return (md5_WordToHex(a) + md5_WordToHex(b) + md5_WordToHex(c) + md5_WordToHex(d)).toLowerCase();
  185. }
  186. return (md5_WordToHex(b) + md5_WordToHex(c)).toLowerCase();
  187. }

后端处理(springboot)

自定义AES加密密钥以及盐值长度等配置

  1. encoding:
  2. # key需要为16位的倍数
  3. aes-secret-key: "9948+=--jkl;P,fj"
  4. salt-length: 6

定义AES工具类

  1. /**
  2. * java使用AES加密解密 AES-128-ECB加密
  3. * 与mysql数据库aes加密算法通用
  4. * 数据库aes加密解密
  5. * -- 加密
  6. * SELECT to_base64(AES_ENCRYPT('www.gowhere.so','jkl;POIU1234++=='));
  7. * -- 解密
  8. * SELECT AES_DECRYPT(from_base64('Oa1NPBSarXrPH8wqSRhh3g=='),'jkl;POIU1234++==');
  9. * @author 836508
  10. *
  11. */
  12. public class AESUtil {
  13. // 加密
  14. public static String Encrypt(String sSrc, String sKey) throws Exception {
  15. if (sKey == null) {
  16. System.out.print("Key为空null");
  17. return null;
  18. }
  19. // 判断Key是否为16位
  20. if (sKey.length() != 16) {
  21. System.out.print("Key长度不是16位");
  22. return null;
  23. }
  24. byte[] raw = sKey.getBytes("utf-8");
  25. SecretKeySpec skeySpec = new SecretKeySpec(raw, "AES");
  26. Cipher cipher = Cipher.getInstance("AES/ECB/PKCS5Padding");//"算法/模式/补码方式"
  27. cipher.init(Cipher.ENCRYPT_MODE, skeySpec);
  28. byte[] encrypted = cipher.doFinal(sSrc.getBytes("utf-8"));
  29. return new BASE64Encoder().encode(encrypted);//此处使用BASE64做转码功能,同时能起到2次加密的作用。
  30. }
  31. // 解密
  32. public static String Decrypt(String sSrc, String sKey) throws Exception {
  33. try {
  34. // 判断Key是否正确
  35. if (sKey == null) {
  36. System.out.print("Key为空null");
  37. return null;
  38. }
  39. // 判断Key是否为16位
  40. if (sKey.length() != 16) {
  41. System.out.print("Key长度不是16位");
  42. return null;
  43. }
  44. byte[] raw = sKey.getBytes("utf-8");
  45. SecretKeySpec skeySpec = new SecretKeySpec(raw, "AES");
  46. Cipher cipher = Cipher.getInstance("AES/ECB/PKCS5Padding");
  47. cipher.init(Cipher.DECRYPT_MODE, skeySpec);
  48. byte[] encrypted1 = new BASE64Decoder().decodeBuffer(sSrc);//先用base64解密
  49. try {
  50. byte[] original = cipher.doFinal(encrypted1);
  51. String originalString = new String(original,"utf-8");
  52. return originalString;
  53. } catch (Exception e) {
  54. System.out.println(e.toString());
  55. return null;
  56. }
  57. } catch (Exception ex) {
  58. System.out.println(ex.toString());
  59. return null;
  60. }
  61. }
  62. public static void main(String[] args) throws Exception {
  63. /*
  64. * 此处使用AES-128-ECB加密模式,key需要为16位。
  65. */
  66. String cKey = "9948+=--jkl;P,fj";
  67. // 需要加密的字串
  68. String cSrc = "W2hXf6pAeuCP0u2Domsnfg==";
  69. System.out.println(cSrc);
  70. // // 加密
  71. // String enString = AESUtil.Encrypt(cSrc, cKey);
  72. // System.out.println("加密后的字串是:" + enString);
  73. // 解密
  74. String DeString = AESUtil.Decrypt(cSrc, cKey);
  75. System.out.println("解密后的字串是:" + DeString);
  76. }
  77. }

定义MD5工具类

  1. /**
  2. * @description MD5加密工具类,支持位数,加盐,无盐,大小写
  3. */
  4. public class MD5Util {
  5. /**
  6. * @Title: md5Lower
  7. * @Description:不加盐值32位小写
  8. */
  9. public static String md5Lower(String plainText) {
  10. String md5 = null;
  11. if (null != plainText && !"".equals(plainText)) {
  12. try {
  13. MessageDigest md = MessageDigest.getInstance("MD5");
  14. md.update(plainText.getBytes("UTF-8"));
  15. md5 = new BigInteger(1, md.digest()).toString(16);
  16. } catch (Exception e) {
  17. e.printStackTrace();
  18. }
  19. }
  20. return md5;
  21. }
  22. /**
  23. * @Title: md5Lower
  24. * @Description:加盐值32位小写
  25. */
  26. public static String md5Lower(String plainText, String saltValue) {
  27. String md5 = null;
  28. if (null != plainText && !"".equals(plainText) && null != saltValue && !"".equals(saltValue)) {
  29. try {
  30. MessageDigest md = MessageDigest.getInstance("MD5");
  31. md.update(plainText.getBytes("UTF-8"));
  32. md.update(saltValue.getBytes("UTF-8"));
  33. md5 = new BigInteger(1, md.digest()).toString(16);
  34. } catch (Exception e) {
  35. e.printStackTrace();
  36. }
  37. }
  38. return md5;
  39. }
  40. /**
  41. * @Title: md5_16Lower
  42. * @Description:不加盐值16位小写
  43. */
  44. public static String md5_16Lower(String plainText) {
  45. String md5 = md5Lower(plainText);
  46. return null==md5?md5:md5.substring(8, 24);
  47. }
  48. /**
  49. * @Title: md5_16Lower
  50. * @Description:加盐值16位小写
  51. */
  52. public static String md5_16Lower(String plainText, String saltValue) {
  53. String md5 = md5Lower(plainText, saltValue);
  54. return null==md5?md5:md5.substring(8, 24);
  55. }
  56. /**
  57. * @Title: md5_16Upper
  58. * @Description:不加盐值16位大写
  59. */
  60. public static String md5_16Upper(String plainText) {
  61. String md5 = md5_16Lower(plainText);
  62. return null==md5?md5:md5.toUpperCase();
  63. }
  64. /**
  65. * @Title: md5_16Upper
  66. * @Description:加盐值16位大写
  67. */
  68. public static String md5_16Upper(String plainText, String saltValue) {
  69. String md5 = md5_16Lower(plainText, saltValue);
  70. return null==md5?md5:md5.toUpperCase();
  71. }
  72. /**
  73. * @Title: md5Upper
  74. * @Description:不加盐值32位大写
  75. */
  76. public static String md5Upper(String plainText) {
  77. String md5 = md5Lower(plainText);
  78. return null==md5?md5:md5.toUpperCase();
  79. }
  80. /**
  81. * @Title: md5Upper
  82. * @Description:加盐值32位大写
  83. */
  84. public static String md5Upper(String plainText, String saltValue) {
  85. String md5 = md5Lower(plainText, saltValue);
  86. return null==md5?md5:md5.toUpperCase();
  87. }
  88. }

随机盐值生成工具类(能生成随机字符串即可)

  1. public class RandUtils {
  2. /**
  3. * 生成count长度的验证码
  4. * @param count
  5. * @return
  6. */
  7. public static String getRandomCode(Integer count){
  8. Random r = new Random();
  9. String includes = "qwertyuiopasdfghjklzxcvbnm1234567890";
  10. String code = "";
  11. for (int i = 0; i < count; i++) {
  12. Integer index = r.nextInt(36);
  13. code += includes.charAt(index);
  14. }
  15. return code;
  16. }
  17. }

用户注册Controller层

  1. @PostMapping("/register")
  2. public R register(@Valid @RequestBody UserRegisterDto registerQo) throws Exception {
  3. // 1.数据hash校验
  4. String username = registerQo.getUsername();
  5. String password = registerQo.getPassword();
  6. String hashCode = MD5Util.md5Lower(username + password); //重新生成校验码
  7. if(!hashCode.equals(registerQo.getHashCode())){
  8. return R.error("数据异常,请重试");
  9. }
  10. // 2.用户名AES解密还原
  11. registerQo.setUsername(AESUtil.Decrypt(username, AES_SECRET));
  12. // 3.校验通过,开始注册流程
  13. userService.userRegister(registerQo);
  14. return R.success("用户注册成功");
  15. }

用户注册Service层

  1. @Override
  2. public void userRegister(UserRegisterDto registerQo) {
  3. // 1.验证码校验
  4. String code = redisService.getString(registerQo.getUserEmail());
  5. if (!registerQo.getVericode().equals(code)) {
  6. throw new CustomException("验证码错误");
  7. }
  8. // 2.查询信息是否存在
  9. LambdaQueryWrapper queryWrapper1 = new LambdaQueryWrapper<>();
  10. queryWrapper1.eq(SystemUser::getUserEmail, registerQo.getUserEmail());
  11. SystemUser systemUserOld = getOne(queryWrapper1);
  12. if (systemUserOld != null) {
  13. throw new CustomException("该邮箱已经被注册");
  14. }
  15. LambdaQueryWrapper queryWrapper2 = new LambdaQueryWrapper<>();
  16. queryWrapper2.eq(SystemUser::getUsername, registerQo.getUsername());
  17. systemUserOld = getOne(queryWrapper2);
  18. if (systemUserOld != null) {
  19. throw new CustomException("该用户名已经被注册");
  20. }
  21. // 3.加盐加密操作
  22. String salt = RandUtils.getRandomCode(SALT_LENGTH); //生成盐值
  23. String passwordMd5WithSalt = MD5Util.md5Lower(registerQo.getPassword(), salt);//加盐MD5加密
  24. // 4.添加用户
  25. SystemUser systemUser = new SystemUser();
  26. systemUser.setUsername(registerQo.getUsername());
  27. systemUser.setPassword(passwordMd5WithSalt);
  28. systemUser.setUserEmail(registerQo.getUserEmail());
  29. systemUser.setHash(salt); //一并保存盐值
  30. save(systemUser);
  31. // 5.删除验证码缓存
  32. redisService.delete(registerQo.getUserEmail());
  33. }

用户登录Controller层

  1. @PostMapping("/login")
  2. public R login(@Valid @RequestBody UserLoginDto userLoginDto) throws Exception {
  3. // 1.数据hash校验
  4. String username = userLoginDto.getUsername();
  5. String password = userLoginDto.getPassword();
  6. String hashCode = MD5Util.md5Lower(username + password); //重新生成校验码
  7. if(!hashCode.equals(userLoginDto.getHashCode())){
  8. return R.error("数据异常,请重试");
  9. }
  10. // 2.用户名AES解密还原
  11. userLoginDto.setUsername(AESUtil.Decrypt(username, AES_SECRET));
  12. // 3.校验通过,开始登录验证
  13. LoginSuccessVo loginVo = userService.userLogin(userLoginDto);
  14. return R.success(loginVo);
  15. }

用户登录service层

  1. @Override
  2. public LoginSuccessVo userLogin(UserLoginDto userLoginDto) {
  3. // 1.验证码校验
  4. String code = redisService.getString(Constant.ImageCodePreKey + userLoginDto.getCodeUuid());
  5. if (code == null) {
  6. throw new CustomException("验证码已过期");
  7. }
  8. if (!code.toUpperCase().equals(userLoginDto.getVericode().toUpperCase())) {
  9. throw new CustomException("验证码错误");
  10. }
  11. // 2.查找用户
  12. SystemUser systemUser = seekUser(userLoginDto.getUsername());
  13. if (systemUser == null) {
  14. throw new CustomException("用户不存在");
  15. }
  16. // 3.密码校验
  17. // 密码盐值处理
  18. String password = MD5Util.md5Lower(userLoginDto.getPassword() + systemUser.getHash());
  19. if (!systemUser.getPassword().equals(password)) {
  20. throw new CustomException("用户密码错误");
  21. }
  22. // 4.封装token信息
  23. UUID token = UUID.randomUUID();
  24. /*将token存入缓存中,有效期为三天,这里我们把token当成key,用户id当成value*/
  25. redisService.setStringTime(token.toString(), systemUser.getId().toString(), new Long(3), TimeUnit.DAYS);
  26. /*删除本次登录验证码的缓存*/
  27. redisService.delete(Constant.ImageCodePreKey + userLoginDto.getCodeUuid());
  28. /*返回登录成功的信息*/
  29. LoginSuccessVo loginVo = new LoginSuccessVo();
  30. systemUser.setPassword("");
  31. loginVo.setSystemUser(systemUser);
  32. loginVo.setToken(token.toString());
  33. return loginVo;
  34. }

总结

感谢您的阅读~~

标签:
声明

1.本站遵循行业规范,任何转载的稿件都会明确标注作者和来源;2.本站的原创文章,请转载时务必注明文章作者和来源,不尊重原创的行为我们将追究责任;3.作者投稿可能会经我们编辑修改或补充。

在线投稿:投稿 站长QQ:1888636

后台-插件-广告管理-内容页尾部广告(手机)
关注我们

扫一扫关注我们,了解最新精彩内容

搜索
排行榜