package com.example.seckill.utils;


import org.apache.commons.codec.digest.DigestUtils;
import org.springframework.stereotype.Component;

@Component
public class MD5Util {

    public static String md5(String src){
        return DigestUtils.md5Hex(src);
    }

    //为了和前端的salt进行统一
    private static final String salt = "1a2b3c4d";

    //前端一次加密
    public static String inputPassToFromPass(String inputPass){
        String str = ""+salt.charAt(0)+salt.charAt(2)+inputPass+salt.charAt(5)+ salt.charAt(4);
        return md5(str);
    }

    //便于一次加密后，后端二次加密
    public static String fromPassToDBPass(String fromPass,String salt){
        String str = ""+salt.charAt(0)+salt.charAt(2)+fromPass+salt.charAt(5)+ salt.charAt(4);
        return md5(str);
    }

    public static String inputPassToDBPass(String inputPass,String salt){
        String fromPass = inputPassToFromPass(inputPass);
        String dbPass = fromPassToDBPass(fromPass,salt);
        return dbPass;
    }
    public static void main(String[] args){
        //单次进行一次加密后的密码：d3b1294a61a07da9b49b6e22b2cbd7f9
        System.out.println(inputPassToFromPass("123456"));
        //单次进行二次加密后的密码：b7797cce01b4b131b433b6acf4add449
        System.out.println(fromPassToDBPass("d3b1294a61a07da9b49b6e22b2cbd7f9","1a2b3c4d"));
        //整合前两者后的二次Md5加密后的密码与上诉单个测试一致：b7797cce01b4b131b433b6acf4add449
        System.out.println(inputPassToDBPass("123456","1a2b3c4d"));
    }
}
