web前端项目开发

      这是我第一次参与一个项目,由于本人技术非常的菜,然而我们项目组前端只有我一个人,我不知道的时候就没法前进。但我的这次项目是安卓端和网页段一起开发。在我实在写不出的时候,我老这样安慰自己说,就算我的这边没有成功,他们那边也能成功。所以自己又有一些松懈。但最后我才知道他们把参赛仅有的四个名额给了一个给我。我觉得受之有愧。所以项目是绝对不能有松懈的。

   这次其实主要的在远程连接,接下来把自己的代码po上,以后自己也能参考,毕竟也是自己参考了好多博客才写出的,因为找到的大多有错。。。

主要是实现密码,用户名不为空。用户名过滤,密码加密,用户名类型判断。

参考:http://blog.csdn.net/xuanyonghao/article/details/65936045

function login()
{
    var xmlhttp;
    var username=document.getElementById('nickname').value;
    uername=encodeURIComponent(username);
    var password=document.getElementById('pwd').value;
       var md32 = hex_md5(password);
       var md16 = md32.substr(8, 16);
       var password=md16.toUpperCase();
       if(username==""){
               alert("昵称不能为空");
               form1.nickname.focus();
               return false;
           }
   if(password==""){
      alert("密码不能为空");
              form1.pwd.focus();
               return false;
           }
          var type;
           var reg = /^\w+\@+[0-9a-zA-Z]+\.(com|com.cn|edu|hk|cn|net)$/;
           if(!isNaN(username)&&username.length==11)
           {
               type='2';
           }
           else if(reg.test(username)) {
               type='1';
           }
           else {
               type = '0';
           }
    if(window.XMLHttpRequest)
   {
       xmlhttp=new XMLHttpRequest();
   }
   else
   {
       xmlhttp=new ActiveXObject("Microsoft.XMLHTTP");
   }
   xmlhttp.onreadystatechange=function() {

           if (xmlhttp.readyState == 4 && xmlhttp.status == 200) {
              var text=xmlhttp.responseText;
              var resultJson=eval("("+text+")");
              var code=resultJson.code;
              console.log(code);
              console.log(text);
               if (code == '0')
                  alert("欢迎进入超级社团格子");
               window.close();
           }
       }
   var url="http://111.230.116.176:8080/user/login";
   var postData="username="+username;
    postData+="&password="+password;
    postData+="&usernameType="+type;
    postData+="&t="+Math.random();
       xmlhttp.open("POST", url, true);
       xmlhttp.setRequestHeader("Content-Type", "application/x-www-form-urlencoded");
       xmlhttp.send(postData);
   }

接下来,就是讲我的坑了,血泪史呀,错误提示已拦截跨源,弄了好久,结果是要在服务端加代码。。。

虽然自己之前也觉得是这样,但对方是大神,且安卓端已经用了这个也行了。于是弄了好久。

接下来po出自己的参考网址:

http://blog.csdn.net/xlxxcc/article/details/54588571


java参考:

http://blog.csdn.net/u010039979/article/details/53378079


接下来就是MD5()函数加密了:

首先在js文件中写实现MD5的函数:

接下来也是破出网址和自己改的一点点(原网址大小写错误):http://blog.csdn.net/boys1999/article/details/42753155

var hexcase=0;var b64pad="";var chrsz=8;function hex_md5(s){return binl2hex(core_md5(str2binl(s),s.length*chrsz));}
function b64_md5(s){return binl2b64(core_md5(str2binl(s),s.length*chrsz));}
function str_md5(s){return binl2str(core_md5(str2binl(s),s.length*chrsz));}
function hex_hmac_md5(key,data){return binl2hex(core_hmac_md5(key,data));}
function b64_hmac_md5(key,data){return binl2b64(core_hmac_md5(key,data));}
function str_hmac_md5(key,data){return binl2str(core_hmac_md5(key,data));}
function md5_vm_test()
{return hex_md5("abc")=="900150983cd24fb0d6963f7d28e17f72";}
function core_md5(x,len)
{x[len>>5]|=0x80<<((len)%32);x[(((len+64)>>>9)<<4)+14]=len;var a=1732584193;var b=-271733879;var c=-1732584194;var d=271733878;for(var i=0;i<x.length;i+=16)
{var olda=a;var oldb=b;var oldc=c;var oldd=d;a=md5_ff(a,b,c,d,x[i+0],7,-680876936);d=md5_ff(d,a,b,c,x[i+1],12,-389564586);c=md5_ff(c,d,a,b,x[i+2],17,606105819);b=md5_ff(b,c,d,a,x[i+3],22,-1044525330);a=md5_ff(a,b,c,d,x[i+4],7,-176418897);d=md5_ff(d,a,b,c,x[i+5],12,1200080426);c=md5_ff(c,d,a,b,x[i+6],17,-1473231341);b=md5_ff(b,c,d,a,x[i+7],22,-45705983);a=md5_ff(a,b,c,d,x[i+8],7,1770035416);d=md5_ff(d,a,b,c,x[i+9],12,-1958414417);c=md5_ff(c,d,a,b,x[i+10],17,-42063);b=md5_ff(b,c,d,a,x[i+11],22,-1990404162);a=md5_ff(a,b,c,d,x[i+12],7,1804603682);d=md5_ff(d,a,b,c,x[i+13],12,-40341101);c=md5_ff(c,d,a,b,x[i+14],17,-1502002290);b=md5_ff(b,c,d,a,x[i+15],22,1236535329);a=md5_gg(a,b,c,d,x[i+1],5,-165796510);d=md5_gg(d,a,b,c,x[i+6],9,-1069501632);c=md5_gg(c,d,a,b,x[i+11],14,643717713);b=md5_gg(b,c,d,a,x[i+0],20,-373897302);a=md5_gg(a,b,c,d,x[i+5],5,-701558691);d=md5_gg(d,a,b,c,x[i+10],9,38016083);c=md5_gg(c,d,a,b,x[i+15],14,-660478335);b=md5_gg(b,c,d,a,x[i+4],20,-405537848);a=md5_gg(a,b,c,d,x[i+9],5,568446438);d=md5_gg(d,a,b,c,x[i+14],9,-1019803690);c=md5_gg(c,d,a,b,x[i+3],14,-187363961);b=md5_gg(b,c,d,a,x[i+8],20,1163531501);a=md5_gg(a,b,c,d,x[i+13],5,-1444681467);d=md5_gg(d,a,b,c,x[i+2],9,-51403784);c=md5_gg(c,d,a,b,x[i+7],14,1735328473);b=md5_gg(b,c,d,a,x[i+12],20,-1926607734);a=md5_hh(a,b,c,d,x[i+5],4,-378558);d=md5_hh(d,a,b,c,x[i+8],11,-2022574463);c=md5_hh(c,d,a,b,x[i+11],16,1839030562);b=md5_hh(b,c,d,a,x[i+14],23,-35309556);a=md5_hh(a,b,c,d,x[i+1],4,-1530992060);d=md5_hh(d,a,b,c,x[i+4],11,1272893353);c=md5_hh(c,d,a,b,x[i+7],16,-155497632);b=md5_hh(b,c,d,a,x[i+10],23,-1094730640);a=md5_hh(a,b,c,d,x[i+13],4,681279174);d=md5_hh(d,a,b,c,x[i+0],11,-358537222);c=md5_hh(c,d,a,b,x[i+3],16,-722521979);b=md5_hh(b,c,d,a,x[i+6],23,76029189);a=md5_hh(a,b,c,d,x[i+9],4,-640364487);d=md5_hh(d,a,b,c,x[i+12],11,-421815835);c=md5_hh(c,d,a,b,x[i+15],16,530742520);b=md5_hh(b,c,d,a,x[i+2],23,-995338651);a=md5_ii(a,b,c,d,x[i+0],6,-198630844);d=md5_ii(d,a,b,c,x[i+7],10,1126891415);c=md5_ii(c,d,a,b,x[i+14],15,-1416354905);b=md5_ii(b,c,d,a,x[i+5],21,-57434055);a=md5_ii(a,b,c,d,x[i+12],6,1700485571);d=md5_ii(d,a,b,c,x[i+3],10,-1894986606);c=md5_ii(c,d,a,b,x[i+10],15,-1051523);b=md5_ii(b,c,d,a,x[i+1],21,-2054922799);a=md5_ii(a,b,c,d,x[i+8],6,1873313359);d=md5_ii(d,a,b,c,x[i+15],10,-30611744);c=md5_ii(c,d,a,b,x[i+6],15,-1560198380);b=md5_ii(b,c,d,a,x[i+13],21,1309151649);a=md5_ii(a,b,c,d,x[i+4],6,-145523070);d=md5_ii(d,a,b,c,x[i+11],10,-1120210379);c=md5_ii(c,d,a,b,x[i+2],15,718787259);b=md5_ii(b,c,d,a,x[i+9],21,-343485551);a=safe_add(a,olda);b=safe_add(b,oldb);c=safe_add(c,oldc);d=safe_add(d,oldd);}
    return Array(a,b,c,d);}
function md5_cmn(q,a,b,x,s,t)
{return safe_add(bit_rol(safe_add(safe_add(a,q),safe_add(x,t)),s),b);}
function md5_ff(a,b,c,d,x,s,t)
{return md5_cmn((b&c)|((~b)&d),a,b,x,s,t);}
function md5_gg(a,b,c,d,x,s,t)
{return md5_cmn((b&d)|(c&(~d)),a,b,x,s,t);}
function md5_hh(a,b,c,d,x,s,t)
{return md5_cmn(b^c^d,a,b,x,s,t);}
function md5_ii(a,b,c,d,x,s,t)
{return md5_cmn(c^(b|(~d)),a,b,x,s,t);}
function core_hmac_md5(key,data)
{var bkey=str2binl(key);if(bkey.length>16)bkey=core_md5(bkey,key.length*chrsz);var ipad=Array(16),opad=Array(16);for(var i=0;i<16;i++)
{ipad[i]=bkey[i]^0x36363636;opad[i]=bkey[i]^0x5C5C5C5C;}
    var hash=core_md5(ipad.concat(str2binl(data)),512+data.length*chrsz);return core_md5(opad.concat(hash),512+128);}
function safe_add(x,y)
{var lsw=(x&0xFFFF)+(y&0xFFFF);var msw=(x>>16)+(y>>16)+(lsw>>16);return(msw<<16)|(lsw&0xFFFF);}
function bit_rol(num,cnt)
{return(num<<cnt)|(num>>>(32-cnt));}
function str2binl(str)
{var bin=Array();var mask=(1<<chrsz)-1;for(var i=0;i<str.length*chrsz;i+=chrsz)
    bin[i>>5]|=(str.charCodeAt(i/chrsz)&mask)<<(i%32);return bin;}
function binl2str(bin)
{var str="";var mask=(1<<chrsz)-1;for(var i=0;i<bin.length*32;i+=chrsz)
    str+=String.fromCharCode((bin[i>>5]>>>(i%32))&mask);return str;}
function binl2hex(binarray)
{var hex_tab=hexcase?"0123456789ABCDEF":"0123456789abcdef";var str="";for(var i=0;i<binarray.length*4;i++)
{str+=hex_tab.charAt((binarray[i>>2]>>((i%4)*8+4))&0xF)+
    hex_tab.charAt((binarray[i>>2]>>((i%4)*8))&0xF);}
    return str;}
function binl2b64(binarray)
{var tab="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/";var str="";for(var i=0;i<binarray.length*4;i+=3)
{var triplet=(((binarray[i>>2]>>8*(i%4))&0xFF)<<16)|(((binarray[i+1>>2]>>8*((i+1)%4))&0xFF)<<8)|((binarray[i+2>>2]>>8*((i+2)%4))&0xFF);for(var j=0;j<4;j++)
{if(i*8+j*6>binarray.length*32)str+=b64pad;else str+=tab.charAt((triplet>>6*(3-j))&0x3F);}}
    return str;}
String.prototype.trim=function()
{return this.replace(/(^\s*)|(\s*$)/g,"");}
var lastInput;function md5(text){text=text.trim();var reg=/^[0-9a-f]{16}$|^[0-9a-f]{32}$/;reg.IgnoreCase=true;if(reg.test(text.toLowerCase()))
{ctl00_ContentPlaceHolder1_LabelResult.innerHTML='';}
else
{var ret=hex_md5(text);ctl00_ContentPlaceHolder1_LabelResult.innerHTML='MD5('+text+',32) = '+ret+'<br>';ctl00_ContentPlaceHolder1_LabelResult.innerHTML+='MD5('+text+',16) = '+ret.substr(8,16);lastInput=text;}}
function CheckInput()
{var text=document.all["ctl00_ContentPlaceHolder1_TextBoxq"].value;text=text.trim();var reg=/^[0-9a-f]{16}$|^[0-9a-f]{32}$/;if(reg.test(text.toLowerCase()))
{if(lastInput+""!="undefined")
{var result=hex_md5(lastInput);if(result.indexOf(text)>=0)
{ctl00_ContentPlaceHolder1_LabelResult.innerHTML=lastInput;return false;}}
else
{var lastResult=ctl00_ContentPlaceHolder1_LabelResult.innerHTML;var result=hex_md5(lastResult);if(result.indexOf(text)>=0)
{ctl00_ContentPlaceHolder1_LabelResult.innerHTML=lastResult;return false;}}
    ctl00_ContentPlaceHolder1_LabelResult.innerHTML="Wait.....";return true;}
else
{md5(text);return false;}}
好了,接下里就是使用了,例如我的是要MD5的16位大写:使用toUpperCase()函数转为大写。
var md32 = hex_md5(password);
var md16 = md32.substr(8, 16);
var password=md16.toUpperCase();

最后需要小小的提一下的就是要过滤:使用encodeURIComponent()函数。

本人还是菜鸟,这就当作记第一次参与项目的感想吧。






猜你喜欢

转载自blog.csdn.net/suiyingsuiyi/article/details/79598030