Bladeren bron

修改解密

jk-GitHub-coder 4 jaren geleden
bovenliggende
commit
b7097219ea

+ 14 - 1
YijiaRestful/src/main/java/com/platform/yijia/controller/PosMachineController.java

@@ -6,10 +6,12 @@ import com.platform.yijia.param.request.LoginBody;
 import com.platform.yijia.pojo.*;
 import com.platform.yijia.service.*;
 import com.platform.yijia.utils.CodeMsg;
+import com.platform.yijia.utils.CryptUtil;
 import com.platform.yijia.utils.ResultData;
 import org.apache.commons.lang3.StringUtils;
 import org.apache.ibatis.annotations.Param;
 import org.omg.CORBA.ObjectHelper;
+import org.springframework.beans.factory.annotation.Value;
 import org.springframework.security.crypto.bcrypt.BCryptPasswordEncoder;
 import org.springframework.stereotype.Controller;
 import org.springframework.transaction.annotation.Transactional;
@@ -47,6 +49,9 @@ public class PosMachineController {
     @Resource
     private PayOrderService payOrderService;
 
+    @Value("${3des.pwd}")
+    private String pwd;
+
     //POS机端用户登录
     @RequestMapping(value = "/loginPosMachine", method = RequestMethod.POST)
     @ResponseBody
@@ -61,9 +66,17 @@ public class PosMachineController {
             if(sysUser !=null){
                 if(sysUser.getStatus().equals("0")){
                     String password = sysUser.getPassword();
+                    String webPassword = loginBody.getPassword();   //前端传来加密码
+                    System.out.println(webPassword);
+                    System.out.println(pwd);
+                    //解密
+                    byte[] bytes = CryptUtil.desedeDecrypt(Base64.getDecoder().decode(password), Base64.getDecoder().decode(pwd));
+                    //转换为字符串
+                    webPassword = Base64.getEncoder().encodeToString(bytes);
+                    System.out.println(webPassword);
                     BCryptPasswordEncoder bCryptPasswordEncoder = new BCryptPasswordEncoder();
                     //密码加密判断已加密密码是否与真实密码相同
-                    boolean matches = bCryptPasswordEncoder.matches(loginBody.getPassword(), password);
+                    boolean matches = bCryptPasswordEncoder.matches(webPassword, password);
                     if(matches){
                         SysUser s = new SysUser();
                         s.setNickName(sysUser.getNickName());

+ 542 - 0
YijiaRestful/src/main/java/com/platform/yijia/utils/CryptUtil.java

@@ -0,0 +1,542 @@
+package com.platform.yijia.utils;
+
+import javax.crypto.*;
+import javax.crypto.spec.DESKeySpec;
+import javax.crypto.spec.DESedeKeySpec;
+import javax.crypto.spec.IvParameterSpec;
+import javax.crypto.spec.SecretKeySpec;
+import java.security.*;
+import java.security.spec.InvalidKeySpecException;
+
+public class CryptUtil {
+    private CryptUtil() {
+    }
+    /**
+     * 字符串进行加密
+     */
+    public static String useMD5(String passWord) {
+        try {
+            MessageDigest digest = MessageDigest.getInstance("MD5");
+            digest.update(passWord.getBytes());
+            return getHashString(digest);
+
+        } catch (NoSuchAlgorithmException e) {
+            // TODO Auto-generated catch block
+            e.printStackTrace();
+        }
+        return null;
+
+    }
+
+    private static String getHashString(MessageDigest digest) {
+        StringBuilder builder = new StringBuilder();
+        for (byte b : digest.digest()) {
+            builder.append(Integer.toHexString((b >> 4) & 0xf));
+            builder.append(Integer.toHexString(b & 0xf));
+        }
+        return builder.toString().toLowerCase();
+    }
+
+    /**
+     * MD5 消息摘要,对输入的内容,进行唯一表示的计算
+     *
+     * @param data 原数据
+     * @return byte[] 计算后的 MD5 值
+     */
+
+    public static byte[] md5(byte[] data) {
+        byte[] ret = null;
+        if (data != null) {
+            try {
+                // 创建 消息摘要对象
+                MessageDigest messageDigest = MessageDigest.getInstance("MD5");
+                ret = messageDigest.digest(data);
+            } catch (NoSuchAlgorithmException e) {
+                e.printStackTrace();
+            }
+        }
+        return ret;
+    }
+
+    /**
+     * SHA1 消息摘要,对输入的内容,进行唯一表示的计算
+     *
+     * @param data 原数据
+     * @return byte[] 计算后的 SHA1 值
+     */
+
+    public static byte[] sha1(byte[] data) {
+        byte[] ret = null;
+        if (data != null) {
+            try {
+                // 创建 消息摘要对象
+                MessageDigest messageDigest = MessageDigest.getInstance("SHA-1");
+                ret = messageDigest.digest(data);
+            } catch (NoSuchAlgorithmException e) {
+                e.printStackTrace();
+            }
+        }
+        return ret;
+    }
+
+    /**
+     * RC4对称加密
+     */
+
+    public static byte[] HloveyRC4(byte[] aInput, byte[] aKey) {
+        int[] iS = new int[256];
+        byte[] iK = new byte[256];
+        for (int i = 0; i < 256; i++) {
+            iS[i] = i;
+        }
+        int j = 1;
+        for (short i = 0; i < 256; i++) {
+            iK[i] = aKey[(i % aKey.length)];
+        }
+        j = 0;
+        for (int i = 0; i < 256; i++) {
+            j = (j + iS[i] & 0xff + iK[i] & 0xff) % 256;
+            int temp = iS[i];
+            iS[i] = iS[j];
+            iS[j] = temp;
+        }
+        int i = 0;
+        j = 0;
+        byte[] iOutputChar = new byte[aInput.length];
+        for (int x = 0; x < iOutputChar.length; x++) {
+            i = (i + 1) % 256;
+            j = (j + iS[i] & 0xff) % 256;
+            int temp = iS[i] & 0xff;
+            iS[i] = iS[j];
+            iS[j] = temp;
+            int t = (iS[i] + (iS[j] & 0xff % 256)) % 256;
+            int iY = iS[t] & 0xff;
+            byte iCY = (byte) iY;
+            iOutputChar[x] = (byte) (aInput[x] ^ iCY);
+        }
+        return iOutputChar;
+    }
+
+
+    /**
+     * DES 的加密方法
+     *
+     * @param data 原始的数据
+     * @param pwd  密码 8 个字节
+     * @return byte[] 加密后的数据
+     */
+    public static byte[] desEncrypt(byte[] data, byte[] pwd) {
+        byte[] ret = null;
+        if (data != null && pwd != null && pwd.length == 8) {
+            try {
+                Cipher cipher = Cipher.getInstance("DES");
+                SecretKeyFactory secretKeyFactory = SecretKeyFactory.getInstance("DES");
+                SecretKey secretKey = secretKeyFactory.generateSecret(new DESKeySpec(pwd));
+                // 代表当前是解密状态
+                cipher.init(Cipher.DECRYPT_MODE, secretKey);
+                ret = cipher.doFinal(data);
+            } catch (NoSuchAlgorithmException e) {
+                e.printStackTrace();
+            } catch (NoSuchPaddingException e) {
+                e.printStackTrace();
+            } catch (InvalidKeySpecException e) {
+                e.printStackTrace();
+            } catch (InvalidKeyException e) {
+                e.printStackTrace();
+            } catch (BadPaddingException e) {
+                e.printStackTrace();
+            } catch (IllegalBlockSizeException e) {
+                e.printStackTrace();
+            }
+        }
+        return ret;
+    }
+
+    /**
+     * DES 的解密方法
+     *
+     * @param enData 经过加密之后的数据
+     * @param pwd    密码 8 个字节
+     * @return byte[] 解密后的原数据
+     */
+    public static byte[] desDecrypt(byte[] enData, byte[] pwd) {
+        byte[] ret = null;
+        if (enData != null && pwd != null && pwd.length == 8) {
+            try {
+                Cipher cipher = Cipher.getInstance("DES");
+                SecretKeyFactory secretKeyFactory = SecretKeyFactory.getInstance("DES");
+                SecretKey secretKey = secretKeyFactory.generateSecret(new DESKeySpec(pwd));
+                // 代表当前是解密状态
+                cipher.init(Cipher.DECRYPT_MODE, secretKey);
+
+                ret = cipher.doFinal(enData);
+            } catch (NoSuchAlgorithmException e) {
+                e.printStackTrace();
+            } catch (NoSuchPaddingException e) {
+                e.printStackTrace();
+            } catch (InvalidKeySpecException e) {
+                e.printStackTrace();
+            } catch (InvalidKeyException e) {
+                e.printStackTrace();
+            } catch (BadPaddingException e) {
+                e.printStackTrace();
+            } catch (IllegalBlockSizeException e) {
+                e.printStackTrace();
+            }
+        }
+        return ret;
+    }
+
+
+
+    /**
+     * DESede (3DES)加密方法
+     *
+     * @param data 原始数据
+     * @param pwd  密码,长度 <= 24 个字节
+     * @return byte[] 加密后的数据
+     */
+    public static byte[] desedeEncrypt(byte[] data, byte[] pwd) {
+        byte[] ret = null;
+        if (data != null && pwd != null) {
+            int plen = pwd.length;
+            // 确保密码是24 个字节
+            if (plen < 24) {
+                byte[] fully = new byte[24];
+                System.arraycopy(pwd, 0, fully, 0, plen);
+                pwd = fully;
+            }
+            try {
+                Cipher cipher = Cipher.getInstance("DESede");
+                SecretKeyFactory secretKeyFactory = SecretKeyFactory.getInstance("DESede");
+                SecretKey secretKey = secretKeyFactory.generateSecret(new DESedeKeySpec(pwd));
+                // 代表当前是解密状态
+                cipher.init(Cipher.ENCRYPT_MODE, secretKey);
+
+                ret = cipher.doFinal(data);
+            } catch (NoSuchAlgorithmException e) {
+                e.printStackTrace();
+            } catch (NoSuchPaddingException e) {
+                e.printStackTrace();
+            } catch (InvalidKeySpecException e) {
+                e.printStackTrace();
+            } catch (InvalidKeyException e) {
+                e.printStackTrace();
+            } catch (BadPaddingException e) {
+                e.printStackTrace();
+            } catch (IllegalBlockSizeException e) {
+                e.printStackTrace();
+            }
+        }
+        return ret;
+    }
+
+    /**
+     * DESede (3DES)解密方法
+     *
+     * @param data 加密后数据
+     * @param pwd  密码,长度 <= 24 个字节
+     * @return byte[] 解密后的数据
+     */
+    public static byte[] desedeDecrypt(byte[] data, byte[] pwd) {
+        byte[] ret = null;
+        if (data != null && pwd != null) {
+            int plen = pwd.length;
+            // 确保密码是24 个字节
+            if (plen < 24) {
+                byte[] fully = new byte[24];
+                System.arraycopy(pwd, 0, fully, 0, plen);
+                pwd = fully;
+            }
+            try {
+                Cipher cipher = Cipher.getInstance("DESede");
+                SecretKeyFactory secretKeyFactory = SecretKeyFactory.getInstance("DESede");
+                SecretKey secretKey = secretKeyFactory.generateSecret(new DESedeKeySpec(pwd));
+                // 代表当前是解密状态
+                cipher.init(Cipher.DECRYPT_MODE, secretKey);
+
+                ret = cipher.doFinal(data);
+            } catch (NoSuchAlgorithmException e) {
+                e.printStackTrace();
+            } catch (NoSuchPaddingException e) {
+                e.printStackTrace();
+            } catch (InvalidKeySpecException e) {
+                e.printStackTrace();
+            } catch (InvalidKeyException e) {
+                e.printStackTrace();
+            } catch (BadPaddingException e) {
+                e.printStackTrace();
+            } catch (IllegalBlockSizeException e) {
+                e.printStackTrace();
+            }
+        }
+        return ret;
+    }
+
+
+    /**
+     * 非对称加密
+     * RSA 加密部分,加密的部分支持 PrivateKey 加密,同时也支持 Publickey 加密
+     * 因为 Privatekey 实现 Key 接口,同时 Publickey 也实现了 Key 接口
+     *
+     * @param data 要加密的数据
+     * @param key  秘钥
+     * @return byte[] 加密后的字节数组
+     */
+    public static byte[] rsaEncrypt(byte[] data, Key key) {
+        byte[] ret = null;
+        if (data != null && key != null) {
+            if (key instanceof PublicKey || key instanceof PrivateKey) {
+                try {
+                    Cipher cipher = Cipher.getInstance("RSA");
+                    // 初始化操作
+                    cipher.init(Cipher.ENCRYPT_MODE, key);
+                    ret = cipher.doFinal(data);
+                } catch (NoSuchAlgorithmException e) {
+                    e.printStackTrace();
+                } catch (NoSuchPaddingException e) {
+                    e.printStackTrace();
+                } catch (InvalidKeyException e) {
+                    e.printStackTrace();
+                } catch (BadPaddingException e) {
+                    e.printStackTrace();
+                } catch (IllegalBlockSizeException e) {
+                    e.printStackTrace();
+                }
+            }
+        }
+        return ret;
+    }
+
+    /**
+     * 非对称加密
+     * RSA 解密部分,解密的部分支持 PrivateKey 解密,同时也支持 Publickey 解密
+     * 因为 Privatekey 实现 Key 接口,同时 Publickey 也实现了 Key 接口
+     *
+     * @param data RSA 加密后的数据
+     * @param key  秘钥
+     * @return byte[] 解密后的原数据
+     */
+    public static byte[] rsaDecrypt(byte[] data, Key key) {
+        byte[] ret = null;
+        if (data != null && key != null) {
+            if (key instanceof PublicKey || key instanceof PrivateKey) {
+                try {
+                    Cipher cipher = Cipher.getInstance("RSA");
+// 初始化操作
+                    cipher.init(Cipher.DECRYPT_MODE, key);
+                    ret = cipher.doFinal(data);
+                } catch (NoSuchAlgorithmException e) {
+                    e.printStackTrace();
+                } catch (NoSuchPaddingException e) {
+                    e.printStackTrace();
+                } catch (InvalidKeyException e) {
+                    e.printStackTrace();
+                } catch (BadPaddingException e) {
+                    e.printStackTrace();
+                } catch (IllegalBlockSizeException e) {
+                    e.printStackTrace();
+                }
+            }
+        }
+        return ret;
+    }
+
+    /**
+     * AES 加密
+     * 采用 Cipher.getInstance("AES") 方式,并且直接指定密码的加密
+     *
+     * @param data 数据
+     * @param pwd  密码,密码长度建议 16 个字节
+     * @return byte[] 加密后的数据
+     */
+    public static byte[] aesEncrypt(byte[] data, byte[] pwd) {
+        byte[] ret = null;
+        if (data != null && pwd != null) {
+            // 检测密码长度,进行补充操作
+            int plen = pwd.length;
+            if (plen < 16) { // 128 bit
+                byte[] fully = new byte[16];
+                System.arraycopy(pwd, 0, fully, 0, plen);
+                pwd = fully;
+            }
+            try {
+                // !!! AES 的加密,算法部分是支持多种形式的
+                // 如果写的是 AES,那么对应的解密方法,使用的算法必须是 AES
+                // !!! AES 的加密,还可以使用 AES/CBC/PKCS5Padding 这个算法
+                // 对应的解密算法 必须使用 "AES/CBC/PKCS5Padding" 才可以解密
+                Cipher cipher = Cipher.getInstance("AES");
+                SecretKeySpec key = new SecretKeySpec(pwd, "AES");
+                cipher.init(Cipher.ENCRYPT_MODE, key);
+                ret = cipher.doFinal(data);
+            } catch (NoSuchAlgorithmException e) {
+                e.printStackTrace();
+            } catch (NoSuchPaddingException e) {
+                e.printStackTrace();
+            } catch (InvalidKeyException e) {
+                e.printStackTrace();
+            } catch (BadPaddingException e) {
+                e.printStackTrace();
+            } catch (IllegalBlockSizeException e) {
+                e.printStackTrace();
+            }
+        }
+        return ret;
+    }
+
+    /**
+     * AES 解密
+     * 采用 Cipher.getInstance("AES") 方式,并且直接指定密码的加密
+     *
+     * @param data 需要解密的数据
+     * @param pwd  密码,长度建议 16 个字节
+     * @return byte[] 解密后的数据
+     */
+    public static byte[] aesDecrypt(byte[] data, byte[] pwd) {
+        byte[] ret = null;
+        if (data != null && pwd != null) {
+            // 检测密码长度,进行补充操作
+            int plen = pwd.length;
+            if (plen < 16) { // 128 bit
+                byte[] fully = new byte[16];
+                System.arraycopy(pwd, 0, fully, 0, plen);
+                pwd = fully;
+            }
+            try {
+                // !!! AES 的加密,算法部分是支持多种形式的
+                // 如果写的是 AES,那么对应的解密方法,使用的算法必须是 AES
+                // !!! AES 的加密,还可以使用 AES/CBC/PKCS5Padding 这个算法
+                // 对应的解密算法 必须使用 "AES/CBC/PKCS5Padding" 才可以解密
+                Cipher cipher = Cipher.getInstance("AES");
+                SecretKeySpec key = new SecretKeySpec(pwd, "AES");
+                cipher.init(Cipher.DECRYPT_MODE, key);
+                ret = cipher.doFinal(data);
+            } catch (NoSuchAlgorithmException e) {
+                e.printStackTrace();
+            } catch (NoSuchPaddingException e) {
+                e.printStackTrace();
+            } catch (InvalidKeyException e) {
+                e.printStackTrace();
+            } catch (BadPaddingException e) {
+                e.printStackTrace();
+            } catch (IllegalBlockSizeException e) {
+                e.printStackTrace();
+            }
+        }
+        return ret;
+    }
+
+
+
+    /**
+     * 使用密码和Iv两个参数来进行加密,可以理解为用两个密码进行加密
+     * Iv 可以看做另外一个密码,对于解密而言,密码和Iv 同样要一致
+     * 自定义填充方式的 AES 加密
+     * 使加密的内容,强度更高
+     *
+     * @param data   要加密的数据
+     * @param pwd    密码,长度 <= 16 个字节
+     * @param ivData IvParameter
+     * @return byte[] 加密后的数据
+     */
+    public static byte[] aesIvEncrypt(byte[] data, byte[] pwd, byte[] ivData) {
+        byte[] ret = null;
+        if (data != null && pwd != null && ivData != null) {
+            int plen = pwd.length;
+            if (plen < 16) { // 128 bit
+                byte[] fully = new byte[16];
+                System.arraycopy(pwd, 0, fully, 0, plen);
+                pwd = fully;
+            }
+            plen = ivData.length;
+            if (plen < 16) { // 128 bit
+                byte[] fully = new byte[16];
+                System.arraycopy(ivData, 0, fully, 0, plen);
+                ivData = fully;
+            }
+            try {
+                // 支持的算法
+                // AES/CBC/PKCS5Padding
+                // AES/ECB/PKCS5Padding
+                // AES/CBC/NoPadding
+                // AES/ECB/NoPadding
+                Cipher cipher = Cipher.getInstance("AES/CBC/PKCS5Padding");
+                SecretKeySpec keySpec = new SecretKeySpec(pwd, "AES");
+                // 使用 Iv 增加 AES 的加密强度,参数必须是 16 个字节
+                IvParameterSpec ivParameterSpec = new IvParameterSpec(ivData);
+                // Iv 就是AES 中,另一套密码
+                cipher.init(Cipher.ENCRYPT_MODE, keySpec, ivParameterSpec);
+                ret = cipher.doFinal(data);
+            } catch (NoSuchAlgorithmException e) {
+                e.printStackTrace();
+            } catch (NoSuchPaddingException e) {
+                e.printStackTrace();
+            } catch (InvalidAlgorithmParameterException e) {
+                e.printStackTrace();
+            } catch (InvalidKeyException e) {
+                e.printStackTrace();
+            } catch (BadPaddingException e) {
+                e.printStackTrace();
+            } catch (IllegalBlockSizeException e) {
+                e.printStackTrace();
+            }
+        }
+        return ret;
+    }
+
+    /**
+     * 使用密码和Iv两个参数来进行解密,可以理解为用两个密码进行加密
+     * Iv 可以看做另外一个密码,对于解密而言,密码和Iv 同样要一致
+     * 自定义填充方式的 AES 加密
+     * 使加密的内容,强度更高
+     *
+     * @param data   需要进行解密的数据
+     * @param pwd    密码,长度 <= 16 个字节
+     * @param ivData IvParameter
+     * @return byte[] 解密后的原数据
+     */
+    public static byte[] aesIvDecrypt(byte[] data, byte[] pwd, byte[] ivData) {
+        byte[] ret = null;
+        if (data != null && pwd != null && ivData != null) {
+            int plen = pwd.length;
+            if (plen < 16) { // 128 bit
+                byte[] fully = new byte[16];
+                System.arraycopy(pwd, 0, fully, 0, plen);
+                pwd = fully;
+            }
+            plen = ivData.length;
+            if (plen < 16) { // 128 bit
+                byte[] fully = new byte[16];
+                System.arraycopy(ivData, 0, fully, 0, plen);
+                ivData = fully;
+            }
+            try {
+                // 支持的算法
+                // AES/CBC/PKCS5Padding
+                // AES/ECB/PKCS5Padding
+                // AES/CBC/NoPadding
+                // AES/ECB/NoPadding
+                Cipher cipher = Cipher.getInstance("AES/CBC/PKCS5Padding");
+                SecretKeySpec keySpec = new SecretKeySpec(pwd, "AES");
+                // 使用 Iv 增加 AES 的加密强度,参数必须是 16 个字节
+                IvParameterSpec ivParameterSpec = new IvParameterSpec(ivData);
+                // Iv 就是AES 中,另一套密码
+                cipher.init(Cipher.DECRYPT_MODE, keySpec, ivParameterSpec);
+                ret = cipher.doFinal(data);
+            } catch (NoSuchAlgorithmException e) {
+                e.printStackTrace();
+            } catch (NoSuchPaddingException e) {
+                e.printStackTrace();
+            } catch (InvalidAlgorithmParameterException e) {
+                e.printStackTrace();
+            } catch (InvalidKeyException e) {
+                e.printStackTrace();
+            } catch (BadPaddingException e) {
+                e.printStackTrace();
+            } catch (IllegalBlockSizeException e) {
+                e.printStackTrace();
+            }
+        }
+        return ret;
+    }
+}

+ 2 - 1
YijiaRestful/src/main/resources/application.yml

@@ -11,7 +11,8 @@ server:
 
 pagehelper:
     helper-dialect=mysql:
-
+3des:
+    pwd: zhihuiyijia
 # Spring配置
 spring:
     datasource:

+ 22 - 17
YijiaRestful/src/test/java/com/palatform/yijia/test.java

@@ -1,11 +1,15 @@
 package com.palatform.yijia;
 
+import com.platform.yijia.utils.CryptUtil;
+import lombok.SneakyThrows;
 import org.apache.commons.codec.digest.DigestUtils;
 
+import java.io.UnsupportedEncodingException;
 import java.math.BigDecimal;
 import java.math.BigInteger;
 import java.text.Bidi;
 import java.text.SimpleDateFormat;
+import java.util.Base64;
 import java.util.Calendar;
 import java.util.Date;
 
@@ -13,23 +17,24 @@ public class test {
 
     public static void main(String[] args) {
 
-//        BigDecimal discountAmt_b = new BigDecimal(5.79);
-//        BigDecimal receivableAmt_b = new BigDecimal(100);
-//        BigDecimal oilLiters =null;
-//        oilLiters = receivableAmt_b.divide(discountAmt_b, 2, BigDecimal.ROUND_HALF_UP);
-//        System.out.println(oilLiters);
-//        String s = oilLiters.toString();
-//        String substring = s.substring(s.indexOf(".") + 1);
-//        System.out.println(substring);
-//        if(!substring.equals("00")){
-//            oilLiters = receivableAmt_b.divide(discountAmt_b, 2, BigDecimal.ROUND_UP);
-//        }
-//        System.out.println(oilLiters);
-
-        String ss = "20210508171257";
-        SimpleDateFormat sdf=new SimpleDateFormat("yyyy-MM-dd HH:mm:ss");
-        //sdf.
-        System.out.println(sdf.format(ss));
+
+        String data ="123456";
+        String pwd = "zhihuiyijia";
+
+        byte[] bytes = null;
+        try {
+            byte[] bytes2 = data.getBytes();
+            byte[] bytes3 = pwd.getBytes();
+            bytes = CryptUtil.desedeEncrypt(bytes2, bytes3);
+            String sss = Base64.getEncoder().encodeToString(bytes);
+            System.out.println(sss);
+
+            byte[] bytes1 = CryptUtil.desedeDecrypt(sss.getBytes("utf-8"), pwd.getBytes("utf-8"));
+            String ssss = Base64.getEncoder().encodeToString(bytes1);
+            System.out.println(ssss);
+        } catch (Exception e) {
+            e.printStackTrace();
+        }
 
 
     }