search
HomeBackend DevelopmentPHP ProblemHow to encrypt the php interface

How to encrypt the php interface

Sep 26, 2019 pm 05:39 PM
phpencryptioninterface

How to encrypt the php interface

Analysis interface
Client interface transmission rules:
1. Use cmd parameter (base64) to dynamically call different interface, the interface address is unified as http://a.lovexpp.com.

2. Form the parameters to be passed into an array, add the timestamp element (current timestamp, accurate to seconds) to the array, and sort the key values ​​​​of the array from large to small in natural order

3. Form the array into a string in the form of key=val&key=val, connect the string with XPP_KEY, encrypt it once with md5 (32-bit lowercase), and get sign

4. Add sign to the parameter In the array

5. Convert the parameter array into json and use post request to request the interface address. The key value is param

Server interface parsing rules:

1. Receive the parameter param, parse the result into json to get the parameter array

2. Take out the sign, and remove the sign

#3 in the parameter array. Sort the key values ​​of the parameter array in natural order from large to small Small sort

4. Combine the sorted parameter array into a string in the form of key=val&key=val, connect the string with XPP_KEY, encrypt it once with md5 (32-bit lowercase), and get sign

5. Compare the sign with the sign passed by the client. If they are different, the parameters may have been tampered with during the process, and the server rejects the request.

6. Compare the sign with the sign in the session. , if the same, it is a repeated submission and the server rejects the request

7. This time the sign is stored in the session

8. Execute the routing cmd (after base64 parsing) and bring the parameters to In this method

<?php

$xpp_key = "xxx";

//接收参数param,将结果解析json得到参数数组
$param = json_decode($_POST[&#39;param&#39;] , true);

//取出sign,去掉参数数组中的sign
$client_sign = $param[&#39;sign&#39;];
unset($param[&#39;sign&#39;]);

//将参数数组key值按照自然排序从大到小排序
krsort($param);

//将排序后的参数数组按照key=val&key=val的形式组成字符串,将字符串与XPP_KEY连接,用md5加密一次(32位小写),得到sign
$sb = &#39;&#39;;
foreach($param as $key=>$val){
$sb .= $key . &#39;=&#39; . $val . &#39;&&#39;;
}
$sb .= $xpp_key;
$server_sign = md5($sb);

//将sign与客户端传过来的sign进行比对,如不一样则可能是中途被篡改参数,服务器拒绝此次请求
if($server_sign !== $client_sign){
echo json_encode(array(&#39;code&#39;=>&#39;invalid request&#39;));
exit;
}

//将sign与session中的sign对比,如果一样,则为重复提交,服务器拒绝此次请求
if($server_sign == $_SESSION[&#39;last_sign&#39;]){
echo json_encode(array(&#39;code&#39;=>&#39;Repeated requests&#39;));
exit();
}

//此次的sign存入session
$_SESSION[&#39;last_sign&#39;] = $server_sign;

//执行路由cmd(base64解析后),将参数带到该方法中
$cmd = base64_decode($param[&#39;cmd&#39;]);
list($__controller,$__action) = explode(&#39;-&#39; , $cmd);

// 设置请求参数
unset($param[&#39;cmd&#39;]);
unset($param[&#39;timestamp&#39;]);
foreach($param as $key => $val){
$_REQUEST[$key] = $val;
}

recommended tutorial: PHP video tutorial

The above is the detailed content of How to encrypt the php interface. For more information, please follow other related articles on the PHP Chinese website!

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
ACID vs BASE Database: Differences and when to use each.ACID vs BASE Database: Differences and when to use each.Mar 26, 2025 pm 04:19 PM

The article compares ACID and BASE database models, detailing their characteristics and appropriate use cases. ACID prioritizes data integrity and consistency, suitable for financial and e-commerce applications, while BASE focuses on availability and

PHP Secure File Uploads: Preventing file-related vulnerabilities.PHP Secure File Uploads: Preventing file-related vulnerabilities.Mar 26, 2025 pm 04:18 PM

The article discusses securing PHP file uploads to prevent vulnerabilities like code injection. It focuses on file type validation, secure storage, and error handling to enhance application security.

PHP Input Validation: Best practices.PHP Input Validation: Best practices.Mar 26, 2025 pm 04:17 PM

Article discusses best practices for PHP input validation to enhance security, focusing on techniques like using built-in functions, whitelist approach, and server-side validation.

PHP API Rate Limiting: Implementation strategies.PHP API Rate Limiting: Implementation strategies.Mar 26, 2025 pm 04:16 PM

The article discusses strategies for implementing API rate limiting in PHP, including algorithms like Token Bucket and Leaky Bucket, and using libraries like symfony/rate-limiter. It also covers monitoring, dynamically adjusting rate limits, and hand

PHP Password Hashing: password_hash and password_verify.PHP Password Hashing: password_hash and password_verify.Mar 26, 2025 pm 04:15 PM

The article discusses the benefits of using password_hash and password_verify in PHP for securing passwords. The main argument is that these functions enhance password protection through automatic salt generation, strong hashing algorithms, and secur

OWASP Top 10 PHP: Describe and mitigate common vulnerabilities.OWASP Top 10 PHP: Describe and mitigate common vulnerabilities.Mar 26, 2025 pm 04:13 PM

The article discusses OWASP Top 10 vulnerabilities in PHP and mitigation strategies. Key issues include injection, broken authentication, and XSS, with recommended tools for monitoring and securing PHP applications.

PHP XSS Prevention: How to protect against XSS.PHP XSS Prevention: How to protect against XSS.Mar 26, 2025 pm 04:12 PM

The article discusses strategies to prevent XSS attacks in PHP, focusing on input sanitization, output encoding, and using security-enhancing libraries and frameworks.

PHP Interface vs Abstract Class: When to use each.PHP Interface vs Abstract Class: When to use each.Mar 26, 2025 pm 04:11 PM

The article discusses the use of interfaces and abstract classes in PHP, focusing on when to use each. Interfaces define a contract without implementation, suitable for unrelated classes and multiple inheritance. Abstract classes provide common funct

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Atom editor mac version download

Atom editor mac version download

The most popular open source editor

SublimeText3 Linux new version

SublimeText3 Linux new version

SublimeText3 Linux latest version

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

SublimeText3 English version

SublimeText3 English version

Recommended: Win version, supports code prompts!

SAP NetWeaver Server Adapter for Eclipse

SAP NetWeaver Server Adapter for Eclipse

Integrate Eclipse with SAP NetWeaver application server.