HmacMD5Util.java 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284
  1. package com.zsElectric.boot.common.util;
  2. import java.nio.charset.StandardCharsets;
  3. import java.security.MessageDigest;
  4. import java.security.NoSuchAlgorithmException;
  5. /**
  6. * HMAC-MD5参数签名工具类
  7. * 严格按照RFC 2104标准的7个步骤实现
  8. * @version 1.0
  9. */
  10. public class HmacMD5Util {
  11. private static final int BLOCK_SIZE = 64; // 块大小为64字节
  12. private static final byte IPAD = 0x36; // 内部填充常量
  13. private static final byte OPAD = 0x5C; // 外部填充常量
  14. /**
  15. * 根据入参顺序生成签名: OperatorID+Data+TimeStamp+Seq
  16. * @param operatorId 操作员ID
  17. * @param data 数据内容
  18. * @param timeStamp 时间戳
  19. * @param seq 序列号
  20. * @param sigSecret 签名密钥
  21. * @return 签名结果(大写)
  22. * @throws NoSuchAlgorithmException
  23. */
  24. public static String genSign(
  25. String operatorId,
  26. String data,
  27. String timeStamp,
  28. String seq,
  29. String sigSecret) throws NoSuchAlgorithmException {
  30. String content = (operatorId + data + timeStamp + seq);
  31. return hmacMD5Hex(content, sigSecret);
  32. }
  33. /**
  34. * HMAC-MD5签名生成
  35. * @param data 待签名的消息内容
  36. * @param key 签名密钥
  37. * @return 16字节的HMAC-MD5签名结果
  38. * @throws NoSuchAlgorithmException
  39. */
  40. public static byte[] hmacMD5(byte[] data, byte[] key) throws NoSuchAlgorithmException {
  41. // 步骤1:在签名密钥后面添加0创建长为64字节的字符串
  42. byte[] k = prepareKey(key);
  43. // 步骤2:将密钥与ipad(0x36)做异或运算
  44. byte[] iPadXor = xorWithPad(k, IPAD);
  45. // 步骤3:将消息内容附加到第二步的结果字符串的末尾
  46. byte[] firstInput = concatenate(iPadXor, data);
  47. // 步骤4:对第三步生成的数据流做MD5运算
  48. byte[] firstHash = md5(firstInput);
  49. // 步骤5:将第一步生成的字符串与opad(0x5c)做异或运算
  50. byte[] oPadXor = xorWithPad(k, OPAD);
  51. // 步骤6:将第四步的结果附加到第五步的结果字符串的末尾
  52. byte[] secondInput = concatenate(oPadXor, firstHash);
  53. // 步骤7:对第六步生成的数据流做MD5运算,输出最终结果
  54. return md5(secondInput);
  55. }
  56. /**
  57. * 步骤1:准备密钥 - 填充或哈希到64字节
  58. * @param key 原始密钥
  59. * @return 64字节的密钥
  60. * @throws NoSuchAlgorithmException
  61. */
  62. private static byte[] prepareKey(byte[] key) throws NoSuchAlgorithmException {
  63. byte[] result = new byte[BLOCK_SIZE];
  64. if (key.length > BLOCK_SIZE) {
  65. // 如果密钥长度超过64字节,先进行MD5哈希
  66. byte[] hashedKey = md5(key);
  67. System.arraycopy(hashedKey, 0, result, 0, hashedKey.length);
  68. // 剩余部分填充0
  69. for (int i = hashedKey.length; i < BLOCK_SIZE; i++) {
  70. result[i] = 0;
  71. }
  72. } else if (key.length < BLOCK_SIZE) {
  73. // 如果密钥长度不足64字节,后面补0
  74. System.arraycopy(key, 0, result, 0, key.length);
  75. for (int i = key.length; i < BLOCK_SIZE; i++) {
  76. result[i] = 0;
  77. }
  78. } else {
  79. // 密钥正好64字节
  80. result = key.clone();
  81. }
  82. return result;
  83. }
  84. /**
  85. * 步骤2/5:密钥与pad常量进行异或运算
  86. * @param key 64字节的密钥
  87. * @param pad 填充常量(IPAD或OPAD)
  88. * @return 异或结果
  89. */
  90. private static byte[] xorWithPad(byte[] key, byte pad) {
  91. byte[] result = new byte[BLOCK_SIZE];
  92. for (int i = 0; i < BLOCK_SIZE; i++) {
  93. result[i] = (byte) (key[i] ^ pad);
  94. }
  95. return result;
  96. }
  97. /**
  98. * 字节数组拼接
  99. * @param a 第一个字节数组
  100. * @param b 第二个字节数组
  101. * @return 拼接后的字节数组
  102. */
  103. private static byte[] concatenate(byte[] a, byte[] b) {
  104. byte[] result = new byte[a.length + b.length];
  105. System.arraycopy(a, 0, result, 0, a.length);
  106. System.arraycopy(b, 0, result, a.length, b.length);
  107. return result;
  108. }
  109. /**
  110. * MD5哈希计算
  111. * @param input 输入数据
  112. * @return MD5哈希结果(16字节)
  113. * @throws NoSuchAlgorithmException
  114. */
  115. private static byte[] md5(byte[] input) throws NoSuchAlgorithmException {
  116. MessageDigest md = MessageDigest.getInstance("MD5");
  117. return md.digest(input);
  118. }
  119. /**
  120. * 字节数组转换为十六进制字符串
  121. * @param bytes 字节数组
  122. * @return 十六进制字符串
  123. */
  124. public static String bytesToHex(byte[] bytes) {
  125. StringBuilder hexString = new StringBuilder();
  126. for (byte b : bytes) {
  127. String hex = Integer.toHexString(0xff & b);
  128. if (hex.length() == 1) {
  129. hexString.append('0');
  130. }
  131. hexString.append(hex);
  132. }
  133. return hexString.toString().toUpperCase();
  134. }
  135. /**
  136. * 生成HMAC-MD5签名(十六进制字符串形式)
  137. * @param data 消息内容
  138. * @param key 密钥
  139. * @return 32位十六进制签名字符串
  140. * @throws NoSuchAlgorithmException
  141. */
  142. public static String hmacMD5Hex(String data, String key) throws NoSuchAlgorithmException {
  143. byte[] signature = hmacMD5(data.getBytes(StandardCharsets.UTF_8),
  144. key.getBytes(StandardCharsets.UTF_8));
  145. return bytesToHex(signature);
  146. }
  147. /**
  148. * 生成HMAC-MD5签名(十六进制字符串形式)
  149. * @param data 消息内容字节数组
  150. * @param key 密钥字节数组
  151. * @return 32位十六进制签名字符串
  152. * @throws NoSuchAlgorithmException
  153. */
  154. public static String hmacMD5Hex(byte[] data, byte[] key) throws NoSuchAlgorithmException {
  155. byte[] signature = hmacMD5(data, key);
  156. return bytesToHex(signature);
  157. }
  158. /**
  159. * 验证HMAC-MD5签名
  160. * @param data 原始消息内容
  161. * @param key 密钥
  162. * @param signature 待验证的签名(十六进制字符串)
  163. * @return 验证结果
  164. * @throws NoSuchAlgorithmException
  165. */
  166. public static boolean verify(String data, String key, String signature) throws NoSuchAlgorithmException {
  167. String calculatedSignature = hmacMD5Hex(data, key);
  168. return calculatedSignature.equalsIgnoreCase(signature);
  169. }
  170. /**
  171. * 测试方法
  172. */
  173. public static void main(String[] args) {
  174. try {
  175. // 测试数据
  176. String data = "MAA9A6L75Gpw3qXJ39TZp2zcW4wtvpw4Fq9VM8TNmsxe2rGCy8VQ1ln4w4Dblvv3SuuyZkZOK5UmYxZ3UbXs4XSrSkU5gZA==202511190347570001";
  177. String key = "iIbnIjG6NzUtwzRA";
  178. System.out.println("=== HMAC-MD5签名测试 ===");
  179. System.out.println("原始数据: " + data);
  180. System.out.println("密钥: " + key);
  181. // 生成签名
  182. long startTime = System.nanoTime();
  183. String signature = hmacMD5Hex(data, key);
  184. long signTime = System.nanoTime() - startTime;
  185. System.out.println("HMAC-MD5签名: " + signature);
  186. System.out.println("签名长度: " + signature.length() + "字符(32字节)");
  187. System.out.println("签名耗时: " + signTime + "纳秒");
  188. // 验证签名
  189. startTime = System.nanoTime();
  190. boolean isValid = verify(data, key, signature);
  191. long verifyTime = System.nanoTime() - startTime;
  192. System.out.println("签名验证: " + (isValid ? "成功" : "失败"));
  193. System.out.println("验证耗时: " + verifyTime + "纳秒");
  194. // 测试不同长度密钥
  195. System.out.println("\n=== 不同长度密钥测试 ===");
  196. testWithDifferentKeyLengths();
  197. // 测试签名一致性
  198. System.out.println("\n=== 签名一致性测试 ===");
  199. testSignatureConsistency();
  200. } catch (Exception e) {
  201. e.printStackTrace();
  202. }
  203. }
  204. /**
  205. * 测试不同长度密钥的签名
  206. */
  207. private static void testWithDifferentKeyLengths() throws NoSuchAlgorithmException {
  208. String data = "测试数据";
  209. // 短密钥(小于64字节)
  210. String shortKey = "short";
  211. String signature1 = hmacMD5Hex(data, shortKey);
  212. System.out.println("短密钥签名: " + signature1);
  213. // 长密钥(等于64字节)
  214. String longKey = "thisIsAExactly64BytesLongKeyUsedForHMACMD5SignatureTest123";
  215. String signature2 = hmacMD5Hex(data, longKey);
  216. System.out.println("64字节密钥签名: " + signature2);
  217. // 超长密钥(大于64字节)
  218. String veryLongKey = "thisIsAVeryLongKeyThatExceedsThe64BytesBlockSizeUsedForHMACMD5SignatureTest123456789";
  219. String signature3 = hmacMD5Hex(data, veryLongKey);
  220. System.out.println("超长密钥签名: " + signature3);
  221. }
  222. /**
  223. * 测试签名一致性(相同输入应产生相同输出)
  224. */
  225. private static void testSignatureConsistency() throws NoSuchAlgorithmException {
  226. String data = "一致性测试数据";
  227. String key = "testKey";
  228. // 多次签名应该结果一致
  229. String signature1 = hmacMD5Hex(data, key);
  230. String signature2 = hmacMD5Hex(data, key);
  231. String signature3 = hmacMD5Hex(data, key);
  232. System.out.println("第一次签名: " + signature1);
  233. System.out.println("第二次签名: " + signature2);
  234. System.out.println("第三次签名: " + signature3);
  235. boolean consistent = signature1.equals(signature2) && signature2.equals(signature3);
  236. System.out.println("签名一致性: " + (consistent ? "通过" : "失败"));
  237. // 测试数据微小变化会导致签名完全不同
  238. String similarData = "一致性测试数据 "; // 多一个空格
  239. String differentSignature = hmacMD5Hex(similarData, key);
  240. System.out.println("微小变化后签名: " + differentSignature);
  241. System.out.println("敏感性测试: " + (!signature1.equals(differentSignature) ? "通过" : "失败"));
  242. }
  243. }