func encryptPassword() {
	token, _ := uuid.NewV4()
	// token := "af09eb2b-b970-4587-8d2b-b9ed42d54c50"
	// eHPT4DXBpSr5N08DNKKsWDrrXT8bxvh62oiZDzqwI8bo3rlmNjcwIL5lYZjPFhZ7oggDXSFtS9cs7a09F5yYIcDBhKPtcOgzNBkHRdchzbXrbpDlMP5ocnPL+ysxxQAA7LbZslhoPRqZ9JrI+AhwB16WmMVKK/GkDbQovUlPEjD80tA19FxKNHSaHR0k1nCpXTXLKnaYM/JT4K+2a7bchLuM8/bCwNo0mIT+2eSUsOKODS09cDEslDdU7/n9YjM3iudKEzElkE/WLO4FUPQxwktqaqEtX6n6SNscITz9tuVlWE9Ei3dvtzAYeAhZl8bN5cF02pJzVr2KECc3Qy4yzg==
	// X8aozSz7BD+GIash5pgnlAiE4v3FnMX+aPE1uRxW4JSMNdWy0EDozBjS1Ul+EMhbyLH0Q6XUHXcugjx1xp6gyywPX9I+PhA2GCqRF1XiF+RrdYySO6sVc2frUQvbEJemosDEbIFrtrsviKKv4eARLrWsSljcrawx+Yk/c2/rnvOWPFCqVm2dbG3Af1xxTqJRDKUEyYwwpSLOmylJbes22sW1pNVa6L6VywUZumv44FbSh6AEDPu56ivsZKq2x1T7zNDsxVHpvtPtZ4GqC+HBfQmMJ1D7fknru7Uv/+AUi/e3pxF7Nx79gh5adeD0WeRqpHZF3CevB2IcL1MunkFvgA==
	// TIGGAxq6E53zOv/nRvyaE7iZ/uBcQCPB15iPomNiROuFauAbONjZrSmJhEqkdSPvo5KNOLscJes1r6KKgDezU2Z/RCtztblWglaxsceC32LHFd5hU3YDiMcYP0MXRuEyZoqwiQevuMa0ukYT9KoeTywKJNgOJDx2Jd94B56niIMzzxpksmWRteN3ff6POj14vWeH1CU9QfZ1eqmW4Vqq29Q3dKLwEU3PnZZyc+N4xeN8eOPWJsng+ZrY7qdqpM5sOu21dhMw4fvPPXsuek8c4/bN/zIDIJro/Tu5ml8qIQTO04E2s9lL+VcDvJiPEBcCfHJNu0VrIgv9GUPxYLQrwQ==
	//pub_key := `MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAh44SJsFGcr1bUXXAH8wL11+Ga8outl7fTERfVvdXIO1H4l6neJU3/Mw9yEiaeo+Fl0EwTepfRHPDy1iYygsYtAvOtwb4Ohcu8yznzyWGwdxIxjoQp6r9zQVHwU3Wu9y4HiLMhEtLlDGyNvaeuYY6fYGKIx3uyEFKmDsx+I0qNig5ZVhOkdewrJTvEXnCQAyAtpIgOUGkQnTqbctfKnXblM8L2AgxfW+9G0X61rFQ/yTwS1O8RIbHLzTP1xfh8l8/XfosPffo1f2djAA30luICM3CO5xyi3+g0McxtYxlvEEPAJpsAq8Omdt4Uw0ResdzfGw9NGXGI65XkYSkaoi80wIDAQAB`
	plainPassword := "administrator" + "---###---" + token.String()
	//plainPassword = `administrator---###---969e9d39-2dde-4aee-853c-077871fabc0d`
	//
	fmt.Println("plainPassword  ", plainPassword)
	pub_pem := `
-----BEGIN PUBLIC KEY-----
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAh44SJsFGcr1bUXXAH8wL
11+Ga8outl7fTERfVvdXIO1H4l6neJU3/Mw9yEiaeo+Fl0EwTepfRHPDy1iYygsY
tAvOtwb4Ohcu8yznzyWGwdxIxjoQp6r9zQVHwU3Wu9y4HiLMhEtLlDGyNvaeuYY6
fYGKIx3uyEFKmDsx+I0qNig5ZVhOkdewrJTvEXnCQAyAtpIgOUGkQnTqbctfKnXb
lM8L2AgxfW+9G0X61rFQ/yTwS1O8RIbHLzTP1xfh8l8/XfosPffo1f2djAA30luI
CM3CO5xyi3+g0McxtYxlvEEPAJpsAq8Omdt4Uw0ResdzfGw9NGXGI65XkYSkaoi8
0wIDAQAB
-----END PUBLIC KEY-----`
	//pub_pem = `-----BEGIN PUBLIC KEY-----MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAh44SJsFGcr1bUXXAH8wL11+Ga8outl7fTERfVvdXIO1H4l6neJU3/Mw9yEiaeo+Fl0EwTepfRHPDy1iYygsYtAvOtwb4Ohcu8yznzyWGwdxIxjoQp6r9zQVHwU3Wu9y4HiLMhEtLlDGyNvaeuYY6fYGKIx3uyEFKmDsx+I0qNig5ZVhOkdewrJTvEXnCQAyAtpIgOUGkQnTqbctfKnXblM8L2AgxfW+9G0X61rFQ/yTwS1O8RIbHLzTP1xfh8l8/XfosPffo1f2djAA30luICM3CO5xyi3+g0McxtYxlvEEPAJpsAq8Omdt4Uw0ResdzfGw9NGXGI65XkYSkaoi80wIDAQAB-----END PUBLIC KEY-----`
	block, _ := pem.Decode([]byte(pub_pem))
	if block == nil {
		panic("failed to parse PEM block containing the public key")
	}
	// privateKey, err := rsa.GenerateKey(bytes.NewReader([]byte(pub_key)), 2048)
	pubKey, err := x509.ParsePKIXPublicKey(block.Bytes)
	if err != nil {
		fmt.Println(" privateKey err:  ", pubKey, err)
		panic(err)
	}
	//public_Key := *rsa.PublicKey{PublicKey}
	public_Key := pubKey.(*rsa.PublicKey)
	//fmt.Println("public_Key ", public_Key )

	// public_Key := cert_body.PublicKey.(*rsa.PublicKey)
	encryptedBytes, err := rsa.EncryptPKCS1v15(rand.Reader, public_Key, []byte(plainPassword))
	if err != nil {
		fmt.Println(" encryptedBytes err:  ", public_Key, base64.StdEncoding.EncodeToString(encryptedBytes))
		panic(err)
	}

	req, _ := http.NewRequest("GET", "http://localhost:8080/domainServlet/AJaxDomainServlet?action=searchLocalAuthDomain&timestamp=1676979527989&search=administrator", nil)

	req.Header.Set("User-Agent", "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36 Edg/110.0.1587.50")
	req.AddCookie(&http.Cookie{
		Name:  "sdplogincsrfcookie",
		Value: token.String(),
	})
	res, err := http.DefaultClient.Do(req)
	if err != nil {
		fmt.Println("requset error :", err)
		// return Response, err
	}
	defer res.Body.Close()
	// body, _ := ioutil.ReadAll(res.Body)
	set_cookie := strings.Split(res.Header["Set-Cookie"][1], ";")
	sdp_cookie := strings.Split(set_cookie[0], "=")
	fmt.Println("plainPassword-------------  ", strings.Split(set_cookie[0], "="))
	plainPassword2 := "administrator" + "---###---" + sdp_cookie[1]
	post_data2 := url.Values{}
	post_data2.Add("AUTHRULE_NAME", "RememberMeLoginModule")
	post_data2.Add("sdplogincsrfparam", sdp_cookie[1])
	post_data2.Add("sdplogincsrfcookie", sdp_cookie[1])
	post_data2.Add("dname", "0")
	post_data2.Add("sdpcsrfcookie", "sasdasdadas")
	post_data2.Add("j_username", "administrator")
	post_data2.Add("j_password", plainPassword2)
	post_data2.Add("sdplogincsrfparam", sdp_cookie[1])
	post_data2.Add("DOMAIN_NAME", "-")
	post_data2.Add("LDAPEnable", "false")
	post_data2.Add("AdEnable", "false")
	post_data2.Add("enableDomainDropdown", "true")
	post_data2.Add("DomainCount", "2")
	post_data2.Add("LocalAuth", "No")
	post_data2.Add("LocalAuthWithDomain", "Not in Domain")
	post_data2.Add("dynamicUserAddition_status", "true")
	post_data2.Add("localAuthEnable", "true")
	post_data2.Add("logonDomainName", "-1")
	post_data2.Add("loginButton", "")
	req2, _ := http.NewRequest("POST", "http://localhost:8080/j_security_check", bytes.NewBuffer([]byte(post_data2.Encode())))
	// auth_token := user.GetUserToken(user_name)
	req2.Header.Add("Accept", "text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7")
	req2.Header.Add("Accept-Encoding", "gzip, deflate, br")
	req2.Header.Set("Accept-Language", "zh-CN,zh;q=0.9")
	req2.Header.Add("Cache-Control", "no-cache")
	req2.Header.Add("Pragma", "no-cache")
	req2.Header.Add("Connection", "keep-alive")
	req2.Header.Add("disable_login_page_csrf", "true")
	req2.Header.Add("Content-Length", "702")
	req2.Header.Add("Content-Type", "application/x-www-form-urlencoded")
	req2.Header.Add("Host", "localhost:8080")
	req2.Header.Add("Origin", "http://localhost:8080")
	req2.Header.Add("sec-ch-ua-platform", `"Windows"`)
	req2.Header.Add("Sec-Fetch-Dest", "document")
	req2.Header.Add("Sec-Fetch-Mode", "navigate")
	req2.Header.Add("Referer", "http://localhost:8080/j_security_check")

	req2.AddCookie(&http.Cookie{
		Name:  "sdpcsrfcookie",
		Value: "11ab2f675583969c43652f2bfc6bd36ba6abd9c0c251e8d3699d93ac347624a12743abc3884d96454ebcdf030fb35e6ec2ffb5e005cd3a96a7f23ff8c619f681",
	})
	req2.AddCookie(&http.Cookie{
		Name:  "_zcsr_tmp",
		Value: "11ab2f675583969c43652f2bfc6bd36ba6abd9c0c251e8d3699d93ac347624a12743abc3884d96454ebcdf030fb35e6ec2ffb5e005cd3a96a7f23ff8c619f681",
	})
	req2.AddCookie(&http.Cookie{
		Name:  "sdplogincsrfparam",
		Value: sdp_cookie[1],
	})
	req2.AddCookie(&http.Cookie{
		Name:  "sdplogincsrfcookie",
		Value: sdp_cookie[1],
	})

	req2.Header.Add("Cookie", res.Header["Set-Cookie"][0]+res.Header["Set-Cookie"][1])
	req2.Header.Add("Cookie", "sdplogincsrfcookie="+sdp_cookie[1])
	res2, err1 := http.DefaultClient.Do(req2)

	fmt.Println("encrypted bytes: ", token, res.Header, "\n")

	fmt.Println("res1 ", res2, err1)

}