当前位置:网站首页>How to test and decrypt the encryption interface
How to test and decrypt the encryption interface
2022-07-27 13:55:00 【Software testing old Joe】
First , We first need to know which interfaces have encryption requirements .
During business testing , Generally, there are many encryption situations involved in the login interface .
Interface test authentication test
How to test this kind of encrypted interface ?
We can analyze it like this :
First , When the front-end operates functions , Check whether the parameters transmitted from the front end to the interface have been encrypted by the front end .
If it is encrypted by the front end , We can ask front-end personnel , Encryption rules , Directly during interface testing , Pass in the parameters after encryption , Check whether the return result can be obtained correctly .
If it's not the front-end encryption , Then it may be the encryption after the back-end parameters are passed in .
This is the time , What we need to do is to pass in business parameters normally , After calling the interface , After checking the interface request , Whether the data stored in the database is encrypted by the interface , Compare the data encrypted in advance with the database .
Decrypt , In general , We don't test like this , We are more concerned about whether the incoming parameters are correct in the whole data flow .
For example, we will construct the passed in parameters , As long as the normal and abnormal conditions are tested in place in the whole process OK 了 .
边栏推荐
- NoSQL -- three theoretical cornerstones of NoSQL -- cap -- Base -- final consistency
- The most complete collection of strategies! Super AI painting tool midjourney open beta! Come and build your fantasy metauniverse
- Conditions and procedures of futures account opening
- 【2022-07-25】
- 软考 系统架构设计师 简明教程 | 软件系统建模
- Wechat campus laundry applet graduation design finished product of applet completion work (8) graduation design thesis template
- 【每日一题】1206. 设计跳表
- Swiftui map encyclopedia use mapkit to search
- JS module, closure application
- 我们要学会查看技术细节点的文档化说明
猜你喜欢

小程序毕设作品之微信校园洗衣小程序毕业设计成品(5)任务书

Wechat campus laundry applet graduation design finished product (7) Interim inspection report

Egg swagger doc graphic verification code solution

Dat.gui control custom placement and dragging

特征工程中的缩放和编码的方法总结

Figure 8 shows you how to configure SNMP

在灯塔工厂点亮5G,宁德时代抢先探路中国智造

Oppo self-developed large-scale knowledge map and its application in digital intelligence engineering

Common distributed theories (cap, base) and consistency protocols (gosssip, raft)

不需要标注数据的语义分割!ETH&鲁汶大学提出MaskDistill,用Transformer来进行无监督语义分割,SOTA!...
随机推荐
13、用户web层服务(一)
English grammar_ Personal pronoun
深度置信网络(DBN)【经典的DBN网络结构是由若干层 RBM(受限波尔兹曼机)和一层 BP 组成的一种深层神经网络】
Structural thinking
SwiftUI 地图大全之 使用 MapKit 进行搜索
【LeetCode】592. 分数加减运算
idea Gradle7.0+ :Could not find method compile()
软考 系统架构设计师 简明教程 | 软件系统建模
[internship experience] add your own implementation method to the date tool class
Tencent cloud and the China Federation of industry released the research results of industrial AI quality inspection standardization to accelerate the intelligent transformation of manufacturing indus
【实习经验】Date工具类中添加自己实现的方法
MFC FTP creates multi-level folders and uploads files to the specified directory of FTP
The salary level of programmers in various countries is a little miserable
SNMP (Simple Network Management Protocol)
Leetcode error reporting and its solution
期货手续费标准和保证金比例
In the "meta cosmic space", utonmos will open the digital world of the combination of virtual and real
Fifth, download the PC terminal of personality and solve the problem of being unable to open it
13. User web layer services (I)
leetcode——83,24; Machine learning - neural networks