HEXTORAW(c1)

HEXTORAW(c1)
【功能】将一个十六进制构成的字符串转换为二进制

【参数】c1,十六进制的字符串


【返回】字符串



【示例】
select HEXTORAW('A123')  from dual;
-- 修复1:创建位运算工具包 CREATE OR REPLACE PACKAGE bit_utils AS FUNCTION bitxor(a NUMBER, b NUMBER) RETURN NUMBER; END; / CREATE OR REPLACE PACKAGE bit_utils AS FUNCTION bitxor(a NUMBER, b NUMBER) RETURN NUMBER; END bit_utils; / CREATE OR REPLACE PACKAGE BODY bit_utils AS FUNCTION bitxor(a NUMBER, b NUMBER) RETURN NUMBER IS v_a NUMBER := a; -- 复制到局部变量 v_b NUMBER := b; -- 复制到局部变量 v_result NUMBER := 0; v_power NUMBER := 1; BEGIN WHILE v_a > 0 OR v_b > 0 LOOP v_result := v_result + MOD(MOD(v_a, 2) + MOD(v_b, 2), 2) * v_power; v_a := TRUNC(v_a / 2); v_b := TRUNC(v_b / 2); v_power := v_power * 2; END LOOP; RETURN v_result; END; END bit_utils; / -- 修复2:更新AES常量包 CREATE OR REPLACE PACKAGE aes_constants AS c_key_hex CONSTANT VARCHAR2(32) := '9F58A20946B47E190003EC716C1C457D'; TYPE t_inv_sbox IS TABLE OF NUMBER INDEX BY BINARY_INTEGER; inv_sbox t_inv_sbox; PROCEDURE init_inv_sbox; END aes_constants; / CREATE OR REPLACE PACKAGE BODY aes_constants AS PROCEDURE init_inv_sbox IS BEGIN inv_sbox(0) := 82; inv_sbox(1) := 9; -- 补全256个值 -- ... (完整逆S盒值参考RFC 3565) inv_sbox(255) := 22; -- 最后一个值示例 END; END; / -- 修复3:更新解密函数 CREATE OR REPLACE FUNCTION decrypt_id_card( p_hex_cipher IN VARCHAR2 ) RETURN VARCHAR2 IS v_cipher_raw RAW(64); v_key_raw RAW(16) := HEXTORAW(aes_constants.c_key_hex); v_plain_raw RAW(32); v_round_key RAW(16) := v_key_raw; -- 修复:使用局部变量代替参数修改 FUNCTION gf_mul(a_in NUMBER, b_in NUMBER) RETURN NUMBER IS a NUMBER := a_in; b NUMBER := b_in; v_res NUMBER := 0; BEGIN FOR i IN 0..7 LOOP IF MOD(b, 2) = 1 THEN -- 替代BITAND v_res := bit_utils.bitxor(v_res, a); -- 使用自定义位运算 END IF; a := MOD(a * 2, 256); -- 简化处理 b := TRUNC(b / 2); END LOOP; RETURN v_res; END; FUNCTION inv_sub_bytes(state RAW) RETURN RAW IS v_result RAW(16) := state; v_byte NUMBER; -- 修复:声明变量 BEGIN FOR i IN 1..16 LOOP v_byte := ASCII(UTL_RAW.SUBSTR(v_result, i, 1)); v_result := UTL_RAW.OVERLAY( UTL_RAW.CAST_TO_RAW(CHR(aes_constants.inv_sbox(v_byte))), v_result, i ); END LOOP; RETURN v_result; END; FUNCTION decrypt_block(block RAW) RETURN RAW IS v_state RAW(16) := block; BEGIN v_state := inv_sub_bytes(v_state); v_state := UTL_RAW.BIT_XOR(v_state, v_round_key); RETURN v_state; END; BEGIN aes_constants.init_inv_sbox; v_cipher_raw := HEXTORAW(p_hex_cipher); -- 处理填充(简化版) v_plain_raw := decrypt_block(SUBSTR(v_cipher_raw, 1, 16)); v_plain_raw := v_plain_raw || decrypt_block(SUBSTR(v_cipher_raw, 17, 16)); RETURN UTL_RAW.CAST_TO_VARCHAR2(v_plain_raw); EXCEPTION WHEN OTHERS THEN RETURN '解密失败'; END; / 以上建完执行SELECT HCP.decrypt_id_card('293946034f99c0594c461b774d5cc361e8684945d9ee614ee283f59dfd2b9a25') FROM DUAL;显示解密失败
08-13
CREATE OR REPLACE PACKAGE aes_constants AS -- 固定密钥(Java 字节数组转十六进制) c_key_hex CONSTANT VARCHAR2(32) := '9F58A20946B47E190003EC716C1C457D'; -- 逆 S 盒(仅示例前 16 个值,需补全 256 个) TYPE t_inv_sbox IS TABLE OF NUMBER INDEX BY BINARY_INTEGER; inv_sbox t_inv_sbox; -- 初始化逆 S 盒 PROCEDURE init_inv_sbox; END aes_constants; / CREATE OR REPLACE PACKAGE BODY aes_constants AS PROCEDURE init_inv_sbox IS BEGIN inv_sbox(0) := 82; inv_sbox(1) := 9; inv_sbox(2) := 106; inv_sbox(3) := 213; inv_sbox(4) := 48; inv_sbox(5) := 54; inv_sbox(6) := 165; inv_sbox(7) := 56; inv_sbox(8) := 191; inv_sbox(9) := 64; inv_sbox(10) := 163; inv_sbox(11) := 158; inv_sbox(12) := 129; inv_sbox(13) := 243; inv_sbox(14) := 215; inv_sbox(15) := 251; -- 此处需补全剩余 240 个值(完整逆 S 盒见 RFC 3565) END init_inv_sbox; END aes_constants; CREATE OR REPLACE FUNCTION decrypt_id_card( p_hex_cipher IN VARCHAR2 -- 加密后的十六进制字符串 ) RETURN VARCHAR2 IS v_cipher_raw RAW(64); v_key_raw RAW(16) := HEXTORAW(aes_constants.c_key_hex); v_plain_raw RAW(32); v_round_key RAW(16) := v_key_raw; -- 简化版:单轮密钥 -- GF(2^8) 乘法(用于列混合) FUNCTION gf_mul(a NUMBER, b NUMBER) RETURN NUMBER IS v_res NUMBER := 0; BEGIN FOR i IN 0..7 LOOP IF BITAND(b, 1) = 1 THEN v_res := BITXOR(v_res, a); END IF; a := a * 2; IF a >= 256 THEN a := BITXOR(a, 283); END IF; -- 0x11B 约简 b := FLOOR(b / 2); END LOOP; RETURN v_res; END; -- 逆字节替换 FUNCTION inv_sub_bytes(state RAW) RETURN RAW IS v_result RAW(16) := state; BEGIN FOR i IN 1..16 LOOP v_byte := ASCII(SUBSTR(v_result, i, 1)); v_result := UTL_RAW.OVERLAY( UTL_RAW.CAST_TO_RAW(CHR(aes_constants.inv_sbox(v_byte))), v_result, i, 1 ); END LOOP; RETURN v_result; END; -- 单块解密(16 字节) FUNCTION decrypt_block(block RAW) RETURN RAW IS v_state RAW(16) := block; BEGIN -- 简化版解密步骤(实际需 10 轮迭代) v_state := inv_sub_bytes(v_state); v_state := UTL_RAW.BIT_XOR(v_state, v_round_key); RETURN v_state; END; BEGIN aes_constants.init_inv_sbox; v_cipher_raw := HEXTORAW(p_hex_cipher); -- 身份证号固定 32 字节密文(2 个块) v_plain_raw := decrypt_block(SUBSTR(v_cipher_raw, 1, 16)); v_plain_raw := v_plain_raw || decrypt_block(SUBSTR(v_cipher_raw, 17, 16)); -- 移除 PKCS#7 填充 DECLARE v_pad_len NUMBER := ASCII(SUBSTR(v_plain_raw, -1)); BEGIN RETURN UTL_RAW.CAST_TO_VARCHAR2(SUBSTR(v_plain_raw, 1, 32 - v_pad_len)); END; EXCEPTION WHEN OTHERS THEN RETURN '解密失败: ' || SQLERRM; END; / 以上报错[Error] PLS-00201 (38: 41): PLS-00201: identifier 'BITXOR' must be declared [Error] PLS-00363 (39: 7): PLS-00363: expression 'A' cannot be used as an assignment target [Error] PLS-00363 (40: 24): PLS-00363: expression 'A' cannot be used as an assignment target [Error] PLS-00363 (41: 7): PLS-00363: expression 'B' cannot be used as an assignment target [Error] PLS-00201 (51: 7): PLS-00201: identifier 'V_BYTE' must be declared [Error] PLS-00201 (53: 56): PLS-00201: identifier 'V_BYTE' must be declared
08-13
如下是对加密身份证的解密方法,请解读后提供在oracle中怎么解密这部分被写入数据库的加密身份证号: 方法: 加密:AesUtils.encode(cardNo) 解密:AesUtils.decode(cardNo) jar包内容: package com.lens.middle.common.util.codec; import com.lens.middle.common.util.lang.ExceptionUtils; import java.io.UnsupportedEncodingException; import java.security.GeneralSecurityException; import java.security.SecureRandom; import javax.crypto.Cipher; import javax.crypto.KeyGenerator; import javax.crypto.SecretKey; import javax.crypto.spec.IvParameterSpec; import javax.crypto.spec.SecretKeySpec; import org.apache.commons.lang3.StringUtils; public class AesUtils { private static final String AES = "AES"; private static final String AES_CBC = "AES/CBC/PKCS5Padding"; private static final int DEFAULT_AES_KEYSIZE = 128; private static final int DEFAULT_IVSIZE = 16; private static final SecureRandom RANDOM = new SecureRandom(); private static final String DEFAULT_URL_ENCODING = "UTF-8"; private static final byte[] DEFAULT_KEY = new byte[]{-97, 88, -94, 9, 70, -76, 126, 25, 0, 3, -20, 113, 108, 28, 69, 125}; public AesUtils() { } public static String genKeyString() { return EncodeUtils.encodeHex(genKey(128)); } public static String encode(String input) { try { return StringUtils.isEmpty(input) ? null : EncodeUtils.encodeHex(encode(input.getBytes("UTF-8"), DEFAULT_KEY)); } catch (UnsupportedEncodingException var2) { return ""; } } public static String encode(String input, String key) { try { return StringUtils.isEmpty(input) ? null : EncodeUtils.encodeHex(encode(input.getBytes("UTF-8"), EncodeUtils.decodeHex(key))); } catch (UnsupportedEncodingException var3) { return ""; } } public static String decode(String input) { try { return StringUtils.isEmpty(input) ? null : new String(decode(EncodeUtils.decodeHex(input), DEFAULT_KEY), "UTF-8"); } catch (UnsupportedEncodingException var2) { return ""; } } public static String decode(String input, String key) { try { return StringUtils.isEmpty(input) ? null : new String(decode(EncodeUtils.decodeHex(input), EncodeUtils.decodeHex(key)), "UTF-8"); } catch (UnsupportedEncodingException var3) { return ""; } } public static byte[] genKey() { return genKey(128); } public static byte[] genKey(int keysize) { try { KeyGenerator keyGenerator = KeyGenerator.getInstance("AES"); keyGenerator.init(keysize); SecretKey secretKey = keyGenerator.generateKey(); return secretKey.getEncoded(); } catch (GeneralSecurityException var3) { throw ExceptionUtils.unchecked(var3); } } public static byte[] genIV() { byte[] bytes = new byte[16]; RANDOM.nextBytes(bytes); return bytes; } public static byte[] encode(byte[] input, byte[] key) { return aes(input, key, 1); } public static byte[] encode(byte[] input, byte[] key, byte[] iv) { return aes(input, key, iv, 1); } public static byte[] decode(byte[] input, byte[] key) { return aes(input, key, 2); } public static byte[] decode(byte[] input, byte[] key, byte[] iv) { return aes(input, key, iv, 2); } private static byte[] aes(byte[] input, byte[] key, int mode) { try { SecretKey secretKey = new SecretKeySpec(key, "AES"); Cipher cipher = Cipher.getInstance("AES"); cipher.init(mode, secretKey); return cipher.doFinal(input); } catch (GeneralSecurityException var5) { throw ExceptionUtils.unchecked(var5); } } private static byte[] aes(byte[] input, byte[] key, byte[] iv, int mode) { try { SecretKey secretKey = new SecretKeySpec(key, "AES"); IvParameterSpec ivSpec = new IvParameterSpec(iv); Cipher cipher = Cipher.getInstance("AES/CBC/PKCS5Padding"); cipher.init(mode, secretKey, ivSpec); return cipher.doFinal(input); } catch (GeneralSecurityException var7) { throw ExceptionUtils.unchecked(var7); } } }
08-13
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值