AesUtil.genAesKey()
生成对应的密钥串:O2BEeIv399qHQNhD6aGW8R8DEj4bqHXm
// 使用DesUtil.genDesKey()生成,需和后端配置保持一致
static desKey = "jMVCBsFGDQr1USHo";
.............................................
}
~~~
~~~javascript
const encrypt = crypto.encryptAES('{"id":1, "title":"测试标题", "category":1, "releaseTime":"2018-12-31 20:08:08"}', crypto.aesKey);
const decrypt = crypto.decryptAES(encrypt, crypto.aesKey);
const notice = JSON.parse(decrypt);
console.log(encrypt);
console.log(decrypt);
console.log(notice);
~~~
5. 查看前端运行结果,准确无误(时间戳虽然较久远,但这是BladeX正式发布前夕的数据,具有纪念意义)

6. 后端进行如下测试
~~~java
public static void main(String[] args) {
String aesKey = "O2BEeIv399qHQNhD6aGW8R8DEj4bqHXm";
String encrypt = AesUtil.encryptToBase64("{"id":1, "title":"测试标题", "category":1, "releaseTime":"2018-12-31 20:08:08"}", aesKey);
String decrypt = AesUtil.decryptFormBase64ToString(encrypt, aesKey);
Notice notice = JsonUtil.parse(decrypt, Notice.class);
System.out.println(encrypt);
System.out.println(decrypt);
System.out.println(notice);
}
~~~
7. 查看后端运行结果,准确无误

8. 前后端验证无误后,说明我们的加密工具类已经调试完毕,下一步就可以开始做对接配置了