guoxilin
作者guoxilin·2019-08-02 14:14
高级非功能测试专家·某科技公司

loadruner脚本实现非对称加解密

字数 11959阅读 3064评论 0赞 4

最近在接到一个公证平台和网贷平台接口性能压测,双方系统的交互对信息安全较高,交付过程使用到非对称密钥机制。 项目组加解密和签名是基于JDK1.8实现;我为了loadrunner 11版本能也能压测,因此改造成JDK1.6实现。针对移动端脚本我先是抓包后在lr12产生C模式脚本;在转化成JAVA模式脚本后;再调用加解密签名方法。最终的脚本如下
/ *

脚本编写信息描述:

项目名称:_非功能测试

交易名称:*

交易码:T101、T103

交易路径:

编码语言:JAVA

开发协议:HTTP

作 者:

时 间:

版 本 号:V1.00

备注:无

历史修改记录:

*/

import lrapi.lr;

import org.apache.http.client.HttpClient;

import org.apache.http.impl.client.HttpClients;

import org.apache.http.client.config.RequestConfig;

import java.nio.charset.Charset;

import org.apache.http.client.methods.HttpPost;

import org.apache.http.util.EntityUtils;

import org.apache.http.HttpEntity;

import org.apache.http.entity.StringEntity;

import org.apache.http.HttpResponse;

import java.util.Map;

import java.net.URLDecoder;

import java.net.URLEncoder;

import com.fasterxml.jackson.databind.ObjectMapper;

import java.security.cert.CertificateException;

import java.security.cert.X509Certificate;

import java.security.interfaces.RSAPrivateKey;

import java.security.interfaces.RSAPublicKey;

import java.security.spec.PKCS8EncodedKeySpec;

import java.security.spec.X509EncodedKeySpec;

import org.apache.commons.codec.binary.Base64;

import javax.crypto.Cipher;

import java.io.UnsupportedEncodingException;

import java.util.Map;

import javax.net.ssl.HttpsURLConnection;

import javax.net.ssl.SSLContext;

import javax.net.ssl.TrustManager;

import javax.net.ssl.X509TrustManager;

public class Actions

{

HttpClient httpClient;

//私钥

String notaPrivateKey = "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";//公证处私钥

//公钥

String compPublicKey = "MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDZ2YshqcNGnaiAOTjfDMpcitT8BDL3nVaKS/J/PaJTUMoSZFtfSj9VNuGM8iywpdQFEK1SMoRm37KtuzJxxMleHPIaM/WD5t+w6Kez/H3UxkQWNQy6OJaozEXzyGv8VMEWKCEvfC5NMcvPrWUpOUAoiD52H8/HbPg3juXITrgUiwIDAQAB";//公司公钥

public static final String KEY_ALGORTHM = "RSA";//加密算法

public static final String SIGNATURE_ALGORITHM = "SHA1WithRSA";//签名算法

String url="http://.168.0.122:8762/nota/liqui/";//访问网址

String compCode="7bym2a-01";//公司编号

private String Script_Name="公证代偿清收";//脚本事务名称

/ *//

  • RSA最大加密明文大小

*/

private static final int MAX_ENCRYPT_BLOCK = 117;

/ *//

  • RSA最大解密密文大小

*/

private static final int MAX_DECRYPT_BLOCK = 128;

private static char[] base64EncodeChars = new char[]

{'A', 'B', 'C', 'D', 'E', 'F', 'G', 'H', 'I', 'J', 'K', 'L', 'M', 'N', 'O', 'P', 'Q', 'R', 'S', 'T',

'U', 'V', 'W', 'X', 'Y', 'Z', 'a', 'b', 'c', 'd', 'e', 'f', 'g', 'h', 'i', 'j', 'k', 'l', 'm',

'n', 'o', 'p', 'q', 'r', 's', 't', 'u', 'v', 'w', 'x', 'y', 'z', '0', '1', '2', '3', '4', '5',

'6', '7', '8', '9', '+', '/'};

private static byte[] base64DecodeChars = new byte[]

{-1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1,

-1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, 62, -1, -1, -1, 63, 52, 53,

54, 55, 56, 57, 58, 59, 60, 61, -1, -1, -1, -1, -1, -1, -1, 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11,

12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, -1, -1, -1, -1, -1, -1, 26, 27, 28, 29,

30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, -1, -1,

-1, -1, -1};

public int init() throws Throwable {

return 0;

}//end of init

public int action() throws Throwable {

lr.start_transaction(Script_Name);

/start by 报文请求/

Charset encoding = Charset.forName("UTF-8");

httpClient = HttpClients.custom()

.setDefaultRequestConfig(RequestConfig.custom().setSocketTimeout(65000).build())

//.setDefaultConnectionConfig(ConnectionConfig.custom().setCharset(encoding).build()

.build();

//HttpPost post = new HttpPost("http://192.168.0.122:8762/nota/liqui/notaCompensLiquidate");

HttpPost post = new HttpPost(url);

final String reqJson =getJsonReport();

//post.setEntity(new StringEntity(reqJson, ContentType.APPLICATION_JSON));

//对报文进行URLEncoder编码。URL编码是将不符合地址传输规范的字符串转化为符合规范的字符串,

String encoderString = URLEncoder.encode(reqJson.toString(), "utf-8");

//用公钥进行加密

byte[] encrypt = encryptByPublicKey(encoderString.getBytes(),compPublicKey);

String inputStr = new String(encrypt);

System.out.println("加密报文: " + inputStr);

//Base64编码,

String encoded = encode(encrypt);

StringEntity strEntity = new StringEntity(encoded);

//StringEntity strEntity = new StringEntity(encoderString);

post.setEntity(strEntity);

post.setHeader("compCode", compCode);//公司编号

//生成签名字段

String reqSignature = sign(encoderString.getBytes(),notaPrivateKey);

//把签名字段放在报文头传输

post.setHeader("reqSignature",reqSignature );//签名

//忽略证书认证

trustAllHosts();

//报文请求

HttpResponse httpResponse = httpClient.execute(post);

/end by 报文请求/

/start by 报文接收/

//接收报文返回

HttpEntity entity = httpResponse.getEntity();

String result = EntityUtils.toString(entity, "UTF-8");

System.out.println("返回报文(密文):"+result);

//对接收到报文进行base64解码

byte[] resbytes = decode(result);

//用公证系统私钥解密

byte[] decryptByte = decryptByPrivateKey(resbytes,notaPrivateKey);

//转成String

String jsonObj = new String(decryptByte);

//对解密后的报文进行URLDecoder反编码

String decodedString = URLDecoder.decode(jsonObj, "UTF-8");

Map response = new ObjectMapper().readValue(decodedString, Map.class);

//int status = String.valueOf(response.get("statusCode"));

//根据status返回值,判断登录事物是否成功

if (String.valueOf(response.get("statusCode")).equals("0")){

System.out.println("成功");

lr.end_transaction(Script_Name,lr.PASS);

}

else

{

lr.save_string(response.get("statusMsg"),"messageStr");

lr.output_message("错误消息:" + lr.eval_string("{messageStr}"));

lr.end_transaction(Script_Name,lr.FAIL);

}

/end by 报文接收/

return 0;

}//end of action

//申请请求报文

public String getJsonReport(){

String jsonreport = "*";

return jsonreport;

}

public int end() throws Throwable {

return 0;

}//end of end

/**
  • 用公钥加密
  • @param data
  • 加密数据
  • @param key
  • 密钥
  • @return
  • @throws Exception

*/

public static byte[] encryptByPublicKey(byte[] data, String key) throws Exception {

// 对公钥解密

byte[] keyBytes = Base64.decodeBase64(key);

// 取公钥

X509EncodedKeySpec x509EncodedKeySpec = new X509EncodedKeySpec(keyBytes);

KeyFactory keyFactory = KeyFactory.getInstance(KEY_ALGORTHM);

Key publicKey = keyFactory.generatePublic(x509EncodedKeySpec);

// 对数据解密

Cipher cipher = Cipher.getInstance(keyFactory.getAlgorithm());

cipher.init(Cipher.ENCRYPT_MODE, publicKey);

int inputLen = data.length;

ByteArrayOutputStream out = new ByteArrayOutputStream();

int offSet = 0;

byte[] cache;

int i = 0;

// 对数据分段加密

while (inputLen - offSet > 0) {

if (inputLen - offSet > MAX_ENCRYPT_BLOCK) {

cache = cipher.doFinal(data, offSet, MAX_ENCRYPT_BLOCK);

} else {

cache = cipher.doFinal(data, offSet, inputLen - offSet);

}

out.write(cache, 0, cache.length);

i++;

offSet = i * MAX_ENCRYPT_BLOCK;

}

byte[] encryptedData = out.toByteArray();

out.close();

return encryptedData;

}

/**

  • 用私钥解密
  • @param data
  • 加密数据
  • @param key
  • 密钥
  • @return
  • @throws Exception

*/

public static byte[] decryptByPrivateKey(byte[] data, String key) throws Exception {

// 对私钥解密

byte[] keyBytes = Base64.decodeBase64(key);

PKCS8EncodedKeySpec pkcs8EncodedKeySpec = new PKCS8EncodedKeySpec(keyBytes);

KeyFactory keyFactory = KeyFactory.getInstance(KEY_ALGORTHM);

Key privateKey = keyFactory.generatePrivate(pkcs8EncodedKeySpec);

// 对数据解密

Cipher cipher = Cipher.getInstance(keyFactory.getAlgorithm());

cipher.init(Cipher.DECRYPT_MODE, privateKey);

int inputLen = data.length;

ByteArrayOutputStream out = new ByteArrayOutputStream();

int offSet = 0;

byte[] cache;

int i = 0;

// 对数据分段解密

while (inputLen - offSet > 0) {

if (inputLen - offSet > MAX_DECRYPT_BLOCK) {

cache = cipher.doFinal(data, offSet, MAX_DECRYPT_BLOCK);

} else {

cache = cipher.doFinal(data, offSet, inputLen - offSet);

}

out.write(cache, 0, cache.length);

i++;

offSet = i * MAX_DECRYPT_BLOCK;

}

byte[] decryptedData = out.toByteArray();

out.close();

return decryptedData;

}

/**

  • 用私钥对信息生成数字签名
  • @param data
  • //加密数据
  • @param privateSecret
  • //私钥
  • @return
  • @throws Exception

*/

public static String sign(byte[] data, String privateSecret) throws Exception {

// 解密私钥

byte[] keyBytes = Base64.decodeBase64(privateSecret);

// 构造PKCS8EncodedKeySpec对象

PKCS8EncodedKeySpec pkcs8EncodedKeySpec = new PKCS8EncodedKeySpec(keyBytes);

// 指定加密算法

KeyFactory keyFactory = KeyFactory.getInstance(KEY_ALGORTHM);

// 取私钥匙对象

PrivateKey privKey = keyFactory.generatePrivate(pkcs8EncodedKeySpec);

// 用私钥对信息生成数字签名

Signature signature = Signature.getInstance(SIGNATURE_ALGORITHM);

signature.initSign(privKey);

signature.update(data);

return Base64.encodeBase64String((signature.sign()));

}

//base64编码

public static String encode(byte[] data) {

StringBuffer sb = new StringBuffer();

int len = data.length;

int i = 0;

int b1, b2, b3;

while (i < len) {

b1 = data[i++] & 0xff;

if (i == len) {

sb.append(base64EncodeChars[b1 >>> 2]);

sb.append(base64EncodeChars[(b1 & 0x3) << 4]);

sb.append("==");

break;

}

b2 = data[i++] & 0xff;

if (i == len) {

sb.append(base64EncodeChars[b1 >>> 2]);

sb.append(base64EncodeChars[((b1 & 0x03) << 4) | ((b2 & 0xf0) >>> 4)]);

sb.append(base64EncodeChars[(b2 & 0x0f) << 2]);

sb.append("=");

break;

}

b3 = data[i++] & 0xff;

sb.append(base64EncodeChars[b1 >>> 2]);

sb.append(base64EncodeChars[((b1 & 0x03) << 4) | ((b2 & 0xf0) >>> 4)]);

sb.append(base64EncodeChars[((b2 & 0x0f) << 2) | ((b3 & 0xc0) >>> 6)]);

sb.append(base64EncodeChars[b3 & 0x3f]);

}

return sb.toString();

}

//base64解码

public static byte[] decode(String str) {

try {

return decodePrivate(str);

} catch (UnsupportedEncodingException e) {

e.printStackTrace();

}

return new byte[]

{};

}

private static byte[] decodePrivate(String str) throws UnsupportedEncodingException {

StringBuffer sb = new StringBuffer();

byte[] data = null;

data = str.getBytes("US-ASCII");

int len = data.length;

int i = 0;

int b1, b2, b3, b4;

while (i < len) {

do {

b1 = base64DecodeChars[data[i++]];

} while (i < len && b1 == -1);

if (b1 == -1) {

break;

}

do {

b2 = base64DecodeChars[data[i++]];

} while (i < len && b2 == -1);

if (b2 == -1) {

break;

}

sb.append((char) ((b1 << 2) | ((b2 & 0x30) >>> 4)));

do {

b3 = data[i++];

if (b3 == 61) {

return sb.toString().getBytes("iso8859-1");

}

b3 = base64DecodeChars[b3];

} while (i < len && b3 == -1);

if (b3 == -1) {

break;

}

sb.append((char) (((b2 & 0x0f) << 4) | ((b3 & 0x3c) >>> 2)));

do {

b4 = data[i++];

if (b4 == 61) {

return sb.toString().getBytes("iso8859-1");

}

b4 = base64DecodeChars[b4];

} while (i < len && b4 == -1);

if (b4 == -1) {

break;

}

sb.append((char) (((b3 & 0x03) << 6) | b4));

}

return sb.toString().getBytes("iso8859-1");

}

/**

  • Trust every server - dont check for any certificate

unable to find valid certification path to requested target 的简单解决办法

*/

public static void trustAllHosts() {

// Create a trust manager that does not validate certificate chains

TrustManager[] trustAllCerts = new TrustManager[] { new X509TrustManager() {

public X509Certificate[] getAcceptedIssuers() {

//return new java.security.cert.X509Certificate[] {};

return null;

}

public void checkClientTrusted(X509Certificate[] chain, String authType) throws CertificateException {

}

public void checkServerTrusted(X509Certificate[] chain, String authType) throws CertificateException {

}

} };

try {

SSLContext sc = SSLContext.getInstance("TLS");

//System.setProperty("https.protocols", "TLSv1,TLSv1.2,TLSv1.1,SSLv3");

//sc.init(null, trustAllCerts, null);

sc.init(null, trustAllCerts, new java.security.SecureRandom());

HttpsURLConnection.setDefaultSSLSocketFactory(sc.getSocketFactory());

} catch (Exception e) {

e.printStackTrace();

}

}

}

如果觉得我的文章对您有用,请点赞。您的支持将鼓励我继续创作!

4

添加新评论0 条评论

Ctrl+Enter 发表

作者其他文章

相关文章

相关问题

相关资料

X社区推广