RAWTOHEX(c1)

RAWTOHEX(c1)
【功能】将一个二进制构成的字符串转换为十六进制

【参数】c1,二进制的字符串


【返回】字符串



【示例】
select RAWTOHEX('A123')  from dual;
-- 修复1:创建位运算工具包 CREATE OR REPLACE PACKAGE bit_utils AS FUNCTION bitxor(a NUMBER, b NUMBER) RETURN NUMBER; END; / CREATE OR REPLACE PACKAGE bit_utils AS FUNCTION bitxor(a NUMBER, b NUMBER) RETURN NUMBER; END bit_utils; / CREATE OR REPLACE PACKAGE BODY bit_utils AS FUNCTION bitxor(a NUMBER, b NUMBER) RETURN NUMBER IS v_a NUMBER := a; -- 复制到局部变量 v_b NUMBER := b; -- 复制到局部变量 v_result NUMBER := 0; v_power NUMBER := 1; BEGIN WHILE v_a > 0 OR v_b > 0 LOOP v_result := v_result + MOD(MOD(v_a, 2) + MOD(v_b, 2), 2) * v_power; v_a := TRUNC(v_a / 2); v_b := TRUNC(v_b / 2); v_power := v_power * 2; END LOOP; RETURN v_result; END; END bit_utils; / -- 修复2:更新AES常量包 CREATE OR REPLACE PACKAGE aes_constants AS c_key_hex CONSTANT VARCHAR2(32) := '9F58A20946B47E190003EC716C1C457D'; TYPE t_inv_sbox IS TABLE OF NUMBER INDEX BY BINARY_INTEGER; inv_sbox t_inv_sbox; PROCEDURE init_inv_sbox; END aes_constants; / CREATE OR REPLACE PACKAGE BODY aes_constants AS PROCEDURE init_inv_sbox IS BEGIN inv_sbox(0) := 82; inv_sbox(1) := 9; -- 补全256个值 -- ... (完整逆S盒值参考RFC 3565) inv_sbox(255) := 22; -- 最后一个值示例 END; END; / -- 修复3:更新解密函数 CREATE OR REPLACE FUNCTION decrypt_id_card( p_hex_cipher IN VARCHAR2 ) RETURN VARCHAR2 IS v_cipher_raw RAW(64); v_key_raw RAW(16) := HEXTORAW(aes_constants.c_key_hex); v_plain_raw RAW(32); v_round_key RAW(16) := v_key_raw; -- 修复:使用局部变量代替参数修改 FUNCTION gf_mul(a_in NUMBER, b_in NUMBER) RETURN NUMBER IS a NUMBER := a_in; b NUMBER := b_in; v_res NUMBER := 0; BEGIN FOR i IN 0..7 LOOP IF MOD(b, 2) = 1 THEN -- 替代BITAND v_res := bit_utils.bitxor(v_res, a); -- 使用自定义位运算 END IF; a := MOD(a * 2, 256); -- 简化处理 b := TRUNC(b / 2); END LOOP; RETURN v_res; END; FUNCTION inv_sub_bytes(state RAW) RETURN RAW IS v_result RAW(16) := state; v_byte NUMBER; -- 修复:声明变量 BEGIN FOR i IN 1..16 LOOP v_byte := ASCII(UTL_RAW.SUBSTR(v_result, i, 1)); v_result := UTL_RAW.OVERLAY( UTL_RAW.CAST_TO_RAW(CHR(aes_constants.inv_sbox(v_byte))), v_result, i ); END LOOP; RETURN v_result; END; FUNCTION decrypt_block(block RAW) RETURN RAW IS v_state RAW(16) := block; BEGIN v_state := inv_sub_bytes(v_state); v_state := UTL_RAW.BIT_XOR(v_state, v_round_key); RETURN v_state; END; BEGIN aes_constants.init_inv_sbox; v_cipher_raw := HEXTORAW(p_hex_cipher); -- 处理填充(简化版) v_plain_raw := decrypt_block(SUBSTR(v_cipher_raw, 1, 16)); v_plain_raw := v_plain_raw || decrypt_block(SUBSTR(v_cipher_raw, 17, 16)); RETURN UTL_RAW.CAST_TO_VARCHAR2(v_plain_raw); EXCEPTION WHEN OTHERS THEN RETURN '解密失败'; END; / 以上建完执行SELECT HCP.decrypt_id_card('293946034f99c0594c461b774d5cc361e8684945d9ee614ee283f59dfd2b9a25') FROM DUAL;显示解密失败
最新发布
08-13
如下是对加密身份证的解密方法,请解读后提供在oracle中怎么解密这部分被写入数据库的加密 身份证号类似293946034f99c0594c461b774d5cc361e8684945d9ee614ee283f59dfd2b9a25字符串, 没有执行UTL_I18N和DBMS_CRYPTO权限,用纯PL/SQL方法解密: 方法: 加密:AesUtils.encode(cardNo) 解密:AesUtils.decode(cardNo) jar包内容: package com.lens.middle.common.util.codec; import com.lens.middle.common.util.lang.ExceptionUtils; import java.io.UnsupportedEncodingException; import java.security.GeneralSecurityException; import java.security.SecureRandom; import javax.crypto.Cipher; import javax.crypto.KeyGenerator; import javax.crypto.SecretKey; import javax.crypto.spec.IvParameterSpec; import javax.crypto.spec.SecretKeySpec; import org.apache.commons.lang3.StringUtils; public class AesUtils { private static final String AES = "AES"; private static final String AES_CBC = "AES/CBC/PKCS5Padding"; private static final int DEFAULT_AES_KEYSIZE = 128; private static final int DEFAULT_IVSIZE = 16; private static final SecureRandom RANDOM = new SecureRandom(); private static final String DEFAULT_URL_ENCODING = "UTF-8"; private static final byte[] DEFAULT_KEY = new byte[]{-97, 88, -94, 9, 70, -76, 126, 25, 0, 3, -20, 113, 108, 28, 69, 125}; public AesUtils() { } public static String genKeyString() { return EncodeUtils.encodeHex(genKey(128)); } public static String encode(String input) { try { return StringUtils.isEmpty(input) ? null : EncodeUtils.encodeHex(encode (input.getBytes("UTF-8"), DEFAULT_KEY)); } catch (UnsupportedEncodingException var2) { return ""; } } public static String encode(String input, String key) { try { return StringUtils.isEmpty(input) ? null : EncodeUtils.encodeHex(encode (input.getBytes("UTF-8"), EncodeUtils.decodeHex(key))); } catch (UnsupportedEncodingException var3) { return ""; } } public static String decode(String input) { try { return StringUtils.isEmpty(input) ? null : new String(decode (EncodeUtils.decodeHex(input), DEFAULT_KEY), "UTF-8"); } catch (UnsupportedEncodingException var2) { return ""; } } public static String decode(String input, String key) { try { return StringUtils.isEmpty(input) ? null : new String(decode (EncodeUtils.decodeHex(input), EncodeUtils.decodeHex(key)), "UTF-8"); } catch (UnsupportedEncodingException var3) { return ""; } } public static byte[] genKey() { return genKey(128); } public static byte[] genKey(int keysize) { try { KeyGenerator keyGenerator = KeyGenerator.getInstance("AES"); keyGenerator.init(keysize); SecretKey secretKey = keyGenerator.generateKey(); return secretKey.getEncoded(); } catch (GeneralSecurityException var3) { throw ExceptionUtils.unchecked(var3); } } public static byte[] genIV() { byte[] bytes = new byte[16]; RANDOM.nextBytes(bytes); return bytes; } public static byte[] encode(byte[] input, byte[] key) { return aes(input, key, 1); } public static byte[] encode(byte[] input, byte[] key, byte[] iv) { return aes(input, key, iv, 1); } public static byte[] decode(byte[] input, byte[] key) { return aes(input, key, 2); } public static byte[] decode(byte[] input, byte[] key, byte[] iv) { return aes(input, key, iv, 2); } private static byte[] aes(byte[] input, byte[] key, int mode) { try { SecretKey secretKey = new SecretKeySpec(key, "AES"); Cipher cipher = Cipher.getInstance("AES"); cipher.init(mode, secretKey); return cipher.doFinal(input); } catch (GeneralSecurityException var5) { throw ExceptionUtils.unchecked(var5); } } private static byte[] aes(byte[] input, byte[] key, byte[] iv, int mode) { try { SecretKey secretKey = new SecretKeySpec(key, "AES"); IvParameterSpec ivSpec = new IvParameterSpec(iv); Cipher cipher = Cipher.getInstance("AES/CBC/PKCS5Padding"); cipher.init(mode, secretKey, ivSpec); return cipher.doFinal(input); } catch (GeneralSecurityException var7) { throw ExceptionUtils.unchecked(var7); } } }
08-13
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值