This commit is contained in:
yumoqing 2025-06-17 15:21:01 +08:00
parent b2495e1b58
commit 904e2b2bdf
5 changed files with 163 additions and 304 deletions

View File

@ -1,155 +0,0 @@
class Base64:
BASELENGTH = 128
LOOKUPLENGTH = 64
TWENTYFOURBITGROUP = 24
EIGHTBIT = 8
SIXTEENBIT = 16
FOURBYTE = 4
SIGN = -128
PAD = '='
def __init__(self):
self.base64Alphabet = [-1] * self.BASELENGTH
self.lookUpBase64Alphabet = [''] * self.LOOKUPLENGTH
self._init_alphabets()
def _init_alphabets(self):
for i in range(65, 91): # A-Z
self.base64Alphabet[i] = i - 65
for i in range(97, 123): # a-z
self.base64Alphabet[i] = i - 97 + 26
for i in range(48, 58): # 0-9
self.base64Alphabet[i] = i - 48 + 52
self.base64Alphabet[43] = 62 # '+'
self.base64Alphabet[47] = 63 # '/'
for i in range(0, 26):
self.lookUpBase64Alphabet[i] = chr(65 + i)
for i in range(26, 52):
self.lookUpBase64Alphabet[i] = chr(97 + i - 26)
for i in range(52, 62):
self.lookUpBase64Alphabet[i] = chr(48 + i - 52)
self.lookUpBase64Alphabet[62] = '+'
self.lookUpBase64Alphabet[63] = '/'
@staticmethod
def isWhiteSpace(char):
return char in (' ', '\n', '\r', '\t')
@staticmethod
def isPad(char):
return char == '='
def isData(self, char):
return ord(char) < self.BASELENGTH and self.base64Alphabet[ord(char)] != -1
def encode(self, binaryData: bytes) -> str:
if binaryData is None:
return None
lengthDataBits = len(binaryData) * self.EIGHTBIT
fewerThan24bits = len(binaryData) % 3
numberTriplets = len(binaryData) // 3
encodedData = []
dataIndex = 0
for _ in range(numberTriplets):
byte1 = binaryData[dataIndex]
byte2 = binaryData[dataIndex + 1]
byte3 = binaryData[dataIndex + 2]
dataIndex += 3
val1 = byte1 >> 2
val2 = ((byte1 & 0x3) << 4) | (byte2 >> 4)
val3 = ((byte2 & 0xf) << 2) | (byte3 >> 6)
val4 = byte3 & 0x3f
encodedData.extend([
self.lookUpBase64Alphabet[val1],
self.lookUpBase64Alphabet[val2],
self.lookUpBase64Alphabet[val3],
self.lookUpBase64Alphabet[val4],
])
if fewerThan24bits == 1:
byte1 = binaryData[dataIndex]
val1 = byte1 >> 2
val2 = (byte1 & 0x3) << 4
encodedData.extend([
self.lookUpBase64Alphabet[val1],
self.lookUpBase64Alphabet[val2],
self.PAD,
self.PAD
])
elif fewerThan24bits == 2:
byte1 = binaryData[dataIndex]
byte2 = binaryData[dataIndex + 1]
val1 = byte1 >> 2
val2 = ((byte1 & 0x3) << 4) | (byte2 >> 4)
val3 = (byte2 & 0xf) << 2
encodedData.extend([
self.lookUpBase64Alphabet[val1],
self.lookUpBase64Alphabet[val2],
self.lookUpBase64Alphabet[val3],
self.PAD
])
return ''.join(encodedData)
def removeWhiteSpace(self, data: str) -> str:
return ''.join([c for c in data if not self.isWhiteSpace(c)])
def decode(self, encoded: str) -> bytes:
if encoded is None:
return None
encoded = self.removeWhiteSpace(encoded)
if len(encoded) % 4 != 0:
return None
numberQuadruple = len(encoded) // 4
decodedBytes = bytearray()
i = 0
for _ in range(numberQuadruple):
c1 = encoded[i]
c2 = encoded[i + 1]
c3 = encoded[i + 2]
c4 = encoded[i + 3]
i += 4
if not (self.isData(c1) and self.isData(c2)):
return None
b1 = self.base64Alphabet[ord(c1)]
b2 = self.base64Alphabet[ord(c2)]
b3 = self.base64Alphabet[ord(c3)] if c3 != self.PAD else 0
b4 = self.base64Alphabet[ord(c4)] if c4 != self.PAD else 0
byte1 = (b1 << 2) | (b2 >> 4)
decodedBytes.append(byte1)
if c3 != self.PAD:
byte2 = ((b2 & 0xf) << 4) | (b3 >> 2)
decodedBytes.append(byte2)
if c4 != self.PAD:
byte3 = ((b3 & 0x3) << 6) | b4
decodedBytes.append(byte3)
return bytes(decodedBytes)
class Base64Utils:
@staticmethod
def encode(data: bytes) -> str:
return Base64().encode(data).decode("utf-8")
@staticmethod
def decode(data: str) -> bytes:
return Base64().decode(data.encode("utf-8"))

163
weishijiajie/jj_utils.py Normal file
View File

@ -0,0 +1,163 @@
import base64
import json
from appPublic.rsawrap import RSA
from os import urandom
from cryptography.hazmat.primitives import padding
from cryptography.hazmat.primitives.asymmetric import padding as asym_padding
from cryptography.hazmat.primitives import hashes
from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes
from cryptography.hazmat.backends import default_backend
from cryptography.hazmat.primitives import serialization
from cryptography.hazmat.backends import default_backend
def get_rsa_pubkey_from_b64keystring(b64ks):
der_data = base64.b64decode(b64ks)
# 加载公钥
public_key = serialization.load_der_public_key(der_data, backend=default_backend())
return public_key
def pubkey_encode(pubkey, bin):
ciphertext = pubkey.encrypt(
bin,
asym_padding.OAEP(
mgf=asym_padding.MGF1(algorithm=hashes.SHA256()),
algorithm=hashes.SHA256(),
label=None
)
)
# 输出 base64 编码后的密文
ciphertext_b64 = base64.b64encode(ciphertext).decode()
return ciphertext_b64
def get_rsa_prikey_from_b64keystring(b64ks):
der_data = base64.b64decode(b64ks)
private_key = serialization.load_der_private_key(der_data, password=None, backend=default_backend())
return private_key
def prikey_decode(prikey, text):
ciphertext = base64.b64decode(text)
plaintext = prikey.decrypt(
ciphertext,
asym_padding.OAEP(
mgf=asym_padding.MGF1(algorithm=hashes.SHA256()),
algorithm=hashes.SHA256(),
label=None
)
)
return plaintext
def generate_key(key_size=32):
return urandom(key_size) # 32 字节 = 256 位
def pad(data: bytes) -> bytes:
padder = padding.PKCS7(128).padder() # AES 块大小是 128 bits
return padder.update(data) + padder.finalize()
def unpad(data: bytes) -> bytes:
unpadder = padding.PKCS7(128).unpadder()
return unpadder.update(data) + unpadder.finalize()
def aes_encrypt_ecb(key: bytes, plaintext: str) -> bytes:
cipher = Cipher(algorithms.AES(key), modes.ECB(), backend=default_backend())
encryptor = cipher.encryptor()
padded_data = pad(plaintext.encode())
return encryptor.update(padded_data) + encryptor.finalize()
def aes_decrypt_ecb(key: bytes, ciphertext: bytes) -> str:
cipher = Cipher(algorithms.AES(key), modes.ECB(), backend=default_backend())
decryptor = cipher.decryptor()
padded_plain = decryptor.update(ciphertext) + decryptor.finalize()
return unpad(padded_plain).decode()
def data_jj_encode(data, pubkey_b64str):
""" return a dict with:
AESKey:aes key encrypted by public key
data: data encrypted by aes key
"""
pubkey = get_rsa_pubkey_from_b64keystring(pubkey_b64str)
aes_key = generate_key()
print(f'{aes_key=}')
aes_key_cyber = pubkey_encode(pubkey, aes_key)
jd = json.dumps(data)
data_cyber = aes_encrypt_ecb(aes_key, jd)
data_cyber_b64 = base64.b64encode(data_cyber).decode('utf-8')
return {
'AESKey': aes_key_cyber,
'data': data_cyber_b64
}
def data_jj_decode(cdata, prikey_b64str):
prikey = get_rsa_prikey_from_b64keystring(prikey_str)
aes_key = prikey_decode(prikey, cdata['AESKey'])
print(f'{aes_key=}')
js_cyber = base64.b64decode(cdata['data'])
js = aes_decrypt_ecb(aes_key, js_cyber)
d = json.loads(js)
return d
if __name__ == '__main__':
# 示例
import sys
key = generate_key()
if len(sys.argv) > 1:
key = base64.b64decode(sys.argv[1])
key_b64 = base64.b64encode(key)
plaintext = "互信是合作与发展的基础"
ciphertext = aes_encrypt_ecb(key, plaintext)
cb64 = base64.b64encode(ciphertext)
print("原文:", plaintext, "密文base64ed", cb64, "KEY:", base64.b64encode(key))
decrypted = aes_decrypt_ecb(key, ciphertext)
print("解密结果:", decrypted)
d = {
"field1":"19ygf23",
"filed2": 2,
"field3": "r32g"
}
pubkey_str="MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA3LWvOQCufDQpf9PsOrBF" + \
"SsjPqIg/x1YZpQ4MksZs4BwHWjHT9PHoJ88OZl2cXmyaY6Hde2KXG1v873lI70/2" + \
"oUizX8Fyl0TTliAQ/p/kSsmgHfzhY+KOZUQ5HwXwnjFKv1q+Y0PpseNPFFHGiB1H" + \
"/6p8kJeV61GN00etwvAvDdfZKm9W6t1ByD9Bsr3/VSHJtv1DqVdgmVMxnI7W4mx6" + \
"UmseGmywngLvBHXI0+MWRK1RszCMISA6SsKTlT9IdT/r64vLht+NImEY6KPwODpu" + \
"6vBUSyRqbGVitZ6PPIPwzLkB8LZ69eTjK5SMXP6RD7kHio+vb4ljHWXzDfRH9HXq" + \
"FQIDAQAB"
prikey_str = (
"MIIEvwIBADANBgkqhkiG9w0BAQEFAASCBKkwggSlAgEAAoIBAQDcta85AK58NCl/"
"0+w6sEVKyM+oiD/HVhmlDgySxmzgHAdaMdP08egnzw5mXZxebJpjod17YpcbW/zv"
"eUjvT/ahSLNfwXKXRNOWIBD+n+RKyaAd/OFj4o5lRDkfBfCeMUq/Wr5jQ+mx408U"
"UcaIHUf/qnyQl5XrUY3TR63C8C8N19kqb1bq3UHIP0Gyvf9VIcm2/UOpV2CZUzGc"
"jtbibHpSax4abLCeAu8EdcjT4xZErVGzMIwhIDpKwpOVP0h1P+vri8uG340iYRjo"
"o/A4Om7q8FRLJGpsZWK1no88g/DMuQHwtnr15OMrlIxc/pEPuQeKj69viWMdZfMN"
"9Ef0deoVAgMBAAECggEAAWQPt58+ej/l5w1R1sjXlvIPBPPe2wW64aRmBeLEOuFS"
"Voor2MZRfTa7039RhfLPQkN53tYvN5frzyKHiCKL3lZT8w2ICFYBs1d+Y+xkBuig"
"XrACR5vc49x7M6vY6VZML0qGGqAJ7/oLvIgLZT4x/vV3FX4vDq2T5Dn2aV0UHtUz"
"ZSwJHJLTqIyHSSzAJetW8cEoEE1u3g7Wu3K2+7Z7nRqQzXnpC3+4wNGV+C7/NYWr"
"8VEf8ygRT0Znom0DIWHnAS4PCJFYefkQfxaDqAA3JSUj3BrbnFJzC4+sSPSmPueL"
"6HWubeZyIiUud7h5mGZS/VNylCp/92gvumJ8YeKA4QKBgQDvbXa0TFXgLNaunf6T"
"PK7dFSZE2gIGyDhRNsAWvDXQITmfQDe5cwI1++tMnsULDPhgEmfORHep00L8JIv4"
"uUArKQ9miI3rfrD2NAY5SbqUqtZA9Q5FtfyouTkKWaEvOt2jAYLTX1m+EYtk4GYE"
"X36VrigU7NhuVQlQM+6M2c5BbQKBgQDr/Iyaza0MdD3oL2EBELVVVEukBs/6Dghp"
"NS6PiRny+KznlPYJgowIqN+JXgxxyq+yaPSWBFF+5gJv39+YofHgUkDBlVQVWtRq"
"g6QSWdBX24I1RsPhCW6yioSbbmTNAPCP5iiQ6a50slMoKs+FU+t7YCmtWH4LxmhU"
"ZVtqSxMKSQKBgQDFFAxmooL5cM8RkrlvBr9E+dizSePrIznAF9oLnMaK2B5vKFP2"
"EWXbe86WFgZJb1au9dd+YLtDDcOQeqDAjfP00up7UqHHG1Scg/wvgbHUF78eXtht"
"pzwewb/i9h4IG2M+fsrqJA1ht11PHqq6pMQ0ftM9TitkvhhZbTXJuKrfDQKBgQCQ"
"W0s/nzWOesUr9V+noSrr6cbjre8njdIDWa8DyuB+yzQp7eub4an72iH0C/4c1doo"
"jx+fbUDVGaq/+Pj0i4xEpsxKHyjybz+lcKW7PAnA1NyP7pwAWx7GRQndcuhip4KA"
"5FBIZUp8xGEuHxIXA0D3ldmo2oswdMx5ZA9JtGcPUQKBgQDtlyIeU8p9wTgCLYn8"
"PVrVMJNiLv4zvJdmQNkBQmNIC67mLUGcZRZRfskk4hYB8sglAGkHZIUBDMFk785+"
"grB5Y0Rn7RAuzVs6uoibwAx4u3rEjENR0gOdyzMATzqjgWL8GnrG5QU6VHRIVwr6"
"ni/+cSjJYn6PolxPdurAZXYhqQ=="
)
pubkey = get_rsa_pubkey_from_b64keystring(pubkey_str)
prikey = get_rsa_prikey_from_b64keystring(prikey_str)
key_crypt = pubkey_encode(pubkey, key_b64)
key_b64T = prikey_decode(prikey, key_crypt)
print(f"RSA加密{key_b64=}==>{key_crypt=}, \n解密==>{key_b64T=}")
x = data_jj_encode(d, pubkey_str)
d1 = data_jj_decode(x, prikey_str)
print(f'{d=}, {d1=}')

View File

@ -1,34 +0,0 @@
from typing import Dict, Optional
class ParamEntity:
def __init__(self, method: str, status: str, format: str, query_map: Optional[Dict[str, str]] = None):
self.method = method
self.status = status
self.format = format
self.query_map = query_map or {}
def get_method(self) -> str:
return self.method
def set_method(self, method: str):
self.method = method
def get_status(self) -> str:
return self.status
def set_status(self, status: str):
self.status = status
def get_format(self) -> str:
return self.format
def set_format(self, format: str):
self.format = format
def get_query_map(self) -> Dict[str, str]:
return self.query_map
def set_query_map(self, query_map: Dict[str, str]):
self.query_map = query_map

View File

@ -1,63 +0,0 @@
from weishijiajie.base64_custom import Base64
import urllib.parse
from Crypto.PublicKey import RSA
from Crypto.Cipher import PKCS1_v1_5
from Crypto.Signature import pkcs1_15
from Crypto.Hash import MD5
from Crypto import Random
import collections
from typing import Dict
from base64_custom import Base64Utils
class RSAUtil:
@staticmethod
def sign(public_map: Dict[str, object], private_key: str) -> str:
keys = sorted(k for k in public_map if k.lower() != "sign")
values = [f"{k}={public_map[k]}" for k in keys]
public_req_str = "&".join(values)
key_bytes = Base64Utils.decode(private_key)
private_key_obj = RSA.import_key(key_bytes)
signer = pkcs1_15.new(private_key_obj)
digest = MD5.new(public_req_str.encode())
signature = signer.sign(digest)
return Base64Utils.encode(signature)
@staticmethod
def verify(public_map: Dict[str, object], public_key: str) -> bool:
keys = sorted(k for k in public_map if k.lower() != "sign")
values = [f"{k}={public_map[k]}" for k in keys]
public_req_str = "&".join(values)
sign = urllib.parse.unquote(public_map["sign"])
key_bytes = Base64Utils.decode(public_key)
public_key_obj = RSA.import_key(key_bytes)
verifier = pkcs1_15.new(public_key_obj)
digest = MD5.new(public_req_str.encode())
try:
verifier.verify(digest, Base64Utils.decode(sign))
return True
except (ValueError, TypeError):
return False
@staticmethod
def decrypt_by_public_key(encrypted: str, public_key: str) -> str:
encrypted_data = Base64Utils.decode(encrypted)
key_bytes = Base64Utils.decode(public_key)
public_key_obj = RSA.import_key(key_bytes)
cipher = PKCS1_v1_5.new(public_key_obj)
sentinel = Random.new().read(15)
decrypted_data = cipher.decrypt(encrypted_data, sentinel)
return decrypted_data.decode()
@staticmethod
def encrypt_by_private_key(source: str, private_key: str) -> str:
data = source.encode()
key_bytes = Base64Utils.decode(private_key)
private_key_obj = RSA.import_key(key_bytes)
cipher = PKCS1_v1_5.new(private_key_obj)
encrypted_data = cipher.encrypt(data)
return Base64Utils.encode(encrypted_data)

View File

@ -1,52 +0,0 @@
import uuid
from urllib.parse import urlencode, quote, urlparse, parse_qs
from weishijiajie.rsa_util import RSAUtil # 假设你之前已转换好的
from weishijiajie.param_entity import ParamEntity # 假设你之前已转换好的
class SignUtilsMOP:
@staticmethod
def do_sign(servlet_path: str, private_key: str, param_entity: ParamEntity) -> str:
if not servlet_path.strip():
raise Exception("url path is empty!")
if not private_key.strip():
raise Exception("privateKey is empty!")
public_map = {
"method": param_entity.method,
"status": param_entity.status,
"format": param_entity.format,
"flowdId": str(uuid.uuid4()).replace("-", "")
}
if param_entity.query_map:
public_map.update(param_entity.query_map)
try:
sign = RSAUtil.sign(public_map, private_key)
public_map["sign"] = quote(sign, encoding="utf-8")
query_string = "&".join(f"{k}={v}" for k, v in public_map.items())
return f"{servlet_path}?{query_string}"
except Exception as e:
print("sign failed!")
raise e
@staticmethod
def verify(sign_url: str, public_key: str) -> bool:
if "?" not in sign_url:
return False
param_str = sign_url.split("?", 1)[1]
param_map = {}
for pair in param_str.split("&"):
if pair.strip():
k, v = pair.split("=", 1)
param_map[k] = v
try:
return RSAUtil.verify(param_map, public_key)
except Exception:
return False