header Parameters
signature required | string rsa签名 |
Request Body schema: application/json
json format
pid required | string 系统分配固定pid,对应着私钥、公钥 |
client_ip required | string 实际接口使用者ip.厂商代理的请求,请填入用户ip |
timestamp required | integer unix时间戳,单位秒 |
nonce required | string <= 64 characters 随机字串,由ascii可见字符组成 |
userid required | string |
token required | string |
partner_no required | string <= 40 characters 厂商订单号(同sp内唯一) |
pay_no required | string <= 40 characters 用户支付订单号 |
month required | integer Enum: 0 1 3 6 12 购买月份数 |
day required | integer Enum: 0 1 7
|
返回提示
Response Schema: application/json
error_code required | integer 错误码,为0时表示调用成功 |
error_msg required | string 错误提示 |
data |
错误码提示
错误码 | 说明 |
---|---|
100000 | 未定义错误码 |
100001 | 参数错误 |
100002 | 系统繁忙,如幂等接口并发调用等,通常由于用户并发操作造成 |
100003 | 认证信息过期或错误,请重新登录 |
100004 | 设备未激活,请使用api激活 |
100005 | 当前sp暂未支持此接口 |
100006 | 系统错误,如内部调用超时等,由于服务内部异常导致 |
100007 | 无权调用此接口,原因可参考error_msg |
100401 | 验证码失效 |
100402 | 验证码无效 |
RSA签名密钥
- 密钥生成,rsa_public_key.pem 交由平台保管,用于验证rsa签名,私钥自行保存
- 使用rsa1024+pkcs1v1.5+sha256对http body(json序列化后)进行签名操作
- 将计算出的签名使用base64编码,并放置在头部signature字段
1、先生存rsa私钥、公钥
2、用私钥生成签名sign字符串,把signature放到请求头里,signature 对应着sign字符串。
3、请求参数是application/json utf-8
4、服务端接收请求时,先验证签名,然后处理接口逻辑。
5、MD5对参数加密,如
import java.security.MessageDigest; public class MD5Util { private static final String[] HEX_DIG_ITS = {"0", "1", "2", "3", "4", "5", "6", "7", "8", "9", "a", "b", "c", "d", "e", "f"}; /** * MD5加密 * * @param origin * 字符 * @return */ public static String MD5(String origin) { String resultString = null; try { MessageDigest md = MessageDigest.getInstance("MD5"); resultString = byteArrayToHexString(md.digest(origin.getBytes("utf-8"))).toUpperCase(); } catch (Exception e) { } return resultString; } public static String byteArrayToHexString(byte b[]) { StringBuffer resultSb = new StringBuffer(); for (int i = 0; i < b.length; i++) { resultSb.append(byteToHexString(b[i])); } return resultSb.toString(); } public static String byteToHexString(byte b) { int n = b; if (n < 0) { n += 256; } int d1 = n / 16; int d2 = n % 16; return HEX_DIG_ITS[d1] + HEX_DIG_ITS[d2]; } }
String device_id = MD5Util.MD5(req.getDevice_id());
6、签名代码类如下:
import java.nio.charset.Charset; import java.security.PrivateKey; import java.util.Base64; class RSASignature { /** * 签名算法 */ public static final String SIGN_ALGORITHMS = "SHA256withRSA"; public static String sign(String content, PrivateKey privateKey) { try { java.security.Signature signature = java.security.Signature.getInstance(SIGN_ALGORITHMS); signature.initSign(privateKey); signature.update(content.getBytes(Charset.forName("UTF-8"))); byte[] signed = signature.sign(); Base64.Encoder encoder = Base64.getEncoder(); return new String(encoder.encodeToString(signed)); } catch (Exception e) { e.printStackTrace(); } return null; } }
import java.security.KeyFactory; import java.security.NoSuchAlgorithmException; import java.security.interfaces.RSAPrivateKey; import java.security.spec.InvalidKeySpecException; import java.security.spec.PKCS8EncodedKeySpec; import java.util.Base64; import java.util.Base64.Decoder; public class RSAEncrypt { public static RSAPrivateKey loadPrivateKeyByStr(String privateKeyStr) throws Exception { try { Decoder decoder = Base64.getDecoder(); byte[] buffer = decoder.decode(privateKeyStr); PKCS8EncodedKeySpec keySpec = new PKCS8EncodedKeySpec(buffer); KeyFactory keyFactory = KeyFactory.getInstance("RSA"); return (RSAPrivateKey) keyFactory.generatePrivate(keySpec); } catch (NoSuchAlgorithmException e) { throw new Exception(e); } catch (InvalidKeySpecException e) { throw new Exception(e); } catch (NullPointerException e) { throw new Exception(e); } } }
public class MySign { public final static String TAG = "test"; public final static String privateKey = "laiwjdjMIICdQIBADANBgkqhkiG9w0BAQEFAASCAl8wggJbAgEAAoGBALk8Rr6Kwl53INdz" + "ccr/CZ3iMBIehxFyJy+7RAy0WGJ80WOM1qZZHLzWR+fps9MeEJiqV/GP9elJC7mLWB" + "jeljqqCJ99ieMudJf2HqSyqyGvhOeZCT1rY6EWcWIlfFvW+xPzubVJN/+bKj0/Jh0rOyb" ; public static void main(String[] args) { try { String body = "{\"client_ip\": \"127.0.0.1\", \"timestamp\": 1629971475, \"nonce\": \"Ex82CcNgFT4PzsMv44K\", \"userid\": \"80DF81E2A79EDEB1193135A2928D8AE9\", \"token\": \"69db532362d9e802169d8fde2855f8db37a38e8c9b4c9e3f53938d4ef8f6921ec41109246ef453d928176f3d26f12345\"}"; String sign = RSASignature.sign(body, RSAEncrypt.loadPrivateKeyByStr(privateKey)); System.out.println("privateKey===" + privateKey); }catch (Exception e) { e.printStackTrace(); } } public static String getSign(String body,String rsaKey) throws Exception { String sign = RSASignature.sign(body, RSAEncrypt.loadPrivateKeyByStr(rsaKey)); return sign; } }