亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? brokenpbe.java

?? 內容:基于jdk1.4的加密算法的具體實現
?? JAVA
字號:
package org.bouncycastle.jce.provider;import java.security.spec.AlgorithmParameterSpec;import javax.crypto.spec.PBEParameterSpec;import org.bouncycastle.crypto.CipherParameters;import org.bouncycastle.crypto.Digest;import org.bouncycastle.crypto.PBEParametersGenerator;import org.bouncycastle.crypto.digests.MD5Digest;import org.bouncycastle.crypto.digests.RIPEMD160Digest;import org.bouncycastle.crypto.digests.SHA1Digest;import org.bouncycastle.crypto.generators.PKCS12ParametersGenerator;import org.bouncycastle.crypto.generators.PKCS5S1ParametersGenerator;import org.bouncycastle.crypto.generators.PKCS5S2ParametersGenerator;import org.bouncycastle.crypto.params.KeyParameter;import org.bouncycastle.crypto.params.ParametersWithIV;/** * Generator for PBE derived keys and ivs as defined by PKCS 12 V1.0, * with a bug affecting 180 bit plus keys - this class is only here to * allow smooth migration of the version 0 keystore to version 1. Don't * use it (it won't be staying around). * <p> * The document this implementation is based on can be found at * <a href=http://www.rsasecurity.com/rsalabs/pkcs/pkcs-12/index.html> * RSA's PKCS12 Page</a> */class OldPKCS12ParametersGenerator    extends PBEParametersGenerator{    public static final int KEY_MATERIAL = 1;    public static final int IV_MATERIAL  = 2;    public static final int MAC_MATERIAL = 3;    private Digest digest;    private int     u;    private int     v;    /**     * Construct a PKCS 12 Parameters generator. This constructor will     * accept MD5, SHA1, and RIPEMD160.     *     * @param digest the digest to be used as the source of derived keys.     * @exception IllegalArgumentException if an unknown digest is passed in.     */    public OldPKCS12ParametersGenerator(        Digest  digest)    {        this.digest = digest;        if (digest instanceof MD5Digest)        {            u = 128 / 8;            v = 512 / 8;        }        else if (digest instanceof SHA1Digest)        {            u = 160 / 8;            v = 512 / 8;        }        else if (digest instanceof RIPEMD160Digest)        {            u = 160 / 8;            v = 512 / 8;        }        else        {            throw new IllegalArgumentException("Digest " + digest.getAlgorithmName() + " unsupported");        }    }    /**     * add a + b + 1, returning the result in a. The a value is treated     * as a BigInteger of length (b.length * 8) bits. The result is      * modulo 2^b.length in case of overflow.     */    private void adjust(        byte[]  a,        int     aOff,        byte[]  b)    {        int  x = (b[b.length - 1] & 0xff) + (a[aOff + b.length - 1] & 0xff) + 1;        a[aOff + b.length - 1] = (byte)x;        x >>>= 8;        for (int i = b.length - 2; i >= 0; i--)        {            x += (b[i] & 0xff) + (a[aOff + i] & 0xff);            a[aOff + i] = (byte)x;            x >>>= 8;        }    }    /**     * generation of a derived key ala PKCS12 V1.0.     */    private byte[] generateDerivedKey(        int idByte,        int n)    {        byte[]  D = new byte[v];        byte[]  dKey = new byte[n];        for (int i = 0; i != D.length; i++)        {            D[i] = (byte)idByte;        }        byte[]  S;        if ((salt != null) && (salt.length != 0))        {            S = new byte[v * ((salt.length + v - 1) / v)];            for (int i = 0; i != S.length; i++)            {                S[i] = salt[i % salt.length];            }        }        else        {            S = new byte[0];        }        byte[]  P;        if ((password != null) && (password.length != 0))        {            P = new byte[v * ((password.length + v - 1) / v)];            for (int i = 0; i != P.length; i++)            {                P[i] = password[i % password.length];            }        }        else        {            P = new byte[0];        }        byte[]  I = new byte[S.length + P.length];        System.arraycopy(S, 0, I, 0, S.length);        System.arraycopy(P, 0, I, S.length, P.length);        byte[]  B = new byte[v];        int     c = (n + u - 1) / u;        for (int i = 1; i <= c; i++)        {            byte[]  A = new byte[u];            digest.update(D, 0, D.length);            digest.update(I, 0, I.length);            digest.doFinal(A, 0);            for (int j = 1; j != iterationCount; j++)            {                digest.update(A, 0, A.length);                digest.doFinal(A, 0);            }            for (int j = 0; j != B.length; j++)            {                B[i] = A[j % A.length];            }            for (int j = 0; j != I.length / v; j++)            {                adjust(I, j * v, B);            }            if (i == c)            {                System.arraycopy(A, 0, dKey, (i - 1) * u, dKey.length - ((i - 1) * u));            }            else            {                System.arraycopy(A, 0, dKey, (i - 1) * u, A.length);            }        }        return dKey;    }    /**     * Generate a key parameter derived from the password, salt, and iteration     * count we are currently initialised with.     *     * @param keySize the size of the key we want (in bits)     * @return a KeyParameter object.     */    public CipherParameters generateDerivedParameters(        int keySize)    {        keySize = keySize / 8;        byte[]  dKey = generateDerivedKey(KEY_MATERIAL, keySize);        return new KeyParameter(dKey, 0, keySize);    }    /**     * Generate a key with initialisation vector parameter derived from     * the password, salt, and iteration count we are currently initialised     * with.     *     * @param keySize the size of the key we want (in bits)     * @param ivSize the size of the iv we want (in bits)     * @return a ParametersWithIV object.     */    public CipherParameters generateDerivedParameters(        int     keySize,        int     ivSize)    {        keySize = keySize / 8;        ivSize = ivSize / 8;        byte[]  dKey = generateDerivedKey(KEY_MATERIAL, keySize);        byte[]  iv = generateDerivedKey(IV_MATERIAL, ivSize);        return new ParametersWithIV(new KeyParameter(dKey, 0, keySize), iv, 0, ivSize);    }    /**     * Generate a key parameter for use with a MAC derived from the password,     * salt, and iteration count we are currently initialised with.     *     * @param keySize the size of the key we want (in bits)     * @return a KeyParameter object.     */    public CipherParameters generateDerivedMacParameters(        int keySize)    {        keySize = keySize / 8;        byte[]  dKey = generateDerivedKey(MAC_MATERIAL, keySize);        return new KeyParameter(dKey, 0, keySize);    }}public interface BrokenPBE{    //    // PBE Based encryption constants - by default we do PKCS12 with SHA-1    //    static final int        MD5         = 0;    static final int        SHA1        = 1;    static final int        RIPEMD160   = 2;    static final int        PKCS5S1     = 0;    static final int        PKCS5S2     = 1;    static final int        PKCS12      = 2;    static final int        OLD_PKCS12  = 3;    /**     * uses the appropriate mixer to generate the key and IV if neccessary.     */    static class Util    {        /**         * a faulty parity routine...         *         * @param bytes the byte array to set the parity on.         */        static private void setOddParity(            byte[] bytes)        {            for (int i = 0; i < bytes.length; i++)            {                int b = bytes[i];                bytes[i] = (byte)((b & 0xfe) |                                (((b >> 1) ^                                (b >> 2) ^                                (b >> 3) ^                                (b >> 4) ^                                (b >> 5) ^                                (b >> 6) ^                                (b >> 7)) ^ 0x01));            }        }        static private PBEParametersGenerator makePBEGenerator(            int                     type,            int                     hash)        {            PBEParametersGenerator  generator;                if (type == PKCS5S1)            {                switch (hash)                {                case MD5:                    generator = new PKCS5S1ParametersGenerator(new MD5Digest());                    break;                case SHA1:                    generator = new PKCS5S1ParametersGenerator(new SHA1Digest());                    break;                default:                    throw new IllegalStateException("PKCS5 scheme 1 only supports only MD5 and SHA1.");                }            }            else if (type == PKCS5S2)            {                generator = new PKCS5S2ParametersGenerator();            }            else if (type == OLD_PKCS12)            {                switch (hash)                {                case MD5:                    generator = new OldPKCS12ParametersGenerator(new MD5Digest());                    break;                case SHA1:                    generator = new OldPKCS12ParametersGenerator(new SHA1Digest());                    break;                case RIPEMD160:                    generator = new OldPKCS12ParametersGenerator(new RIPEMD160Digest());                    break;                default:                    throw new IllegalStateException("unknown digest scheme for PBE encryption.");                }            }            else            {                switch (hash)                {                case MD5:                    generator = new PKCS12ParametersGenerator(new MD5Digest());                    break;                case SHA1:                    generator = new PKCS12ParametersGenerator(new SHA1Digest());                    break;                case RIPEMD160:                    generator = new PKCS12ParametersGenerator(new RIPEMD160Digest());                    break;                default:                    throw new IllegalStateException("unknown digest scheme for PBE encryption.");                }            }                return generator;        }        /**         * construct a key and iv (if neccessary) suitable for use with a          * Cipher.         */        static CipherParameters makePBEParameters(            JCEPBEKey               pbeKey,            AlgorithmParameterSpec  spec,            int                     type,            int                     hash,            String                  targetAlgorithm,            int                     keySize,            int                     ivSize)        {            if ((spec == null) || !(spec instanceof PBEParameterSpec))            {                throw new IllegalArgumentException("Need a PBEParameter spec with a PBE key.");            }                PBEParameterSpec        pbeParam = (PBEParameterSpec)spec;            PBEParametersGenerator  generator = makePBEGenerator(type, hash);            byte[]                  key = pbeKey.getEncoded();            CipherParameters        param;                generator.init(key, pbeParam.getSalt(), pbeParam.getIterationCount());            if (ivSize != 0)            {                param = generator.generateDerivedParameters(keySize, ivSize);            }            else            {                param = generator.generateDerivedParameters(keySize);            }            if (targetAlgorithm.startsWith("DES"))            {                if (param instanceof ParametersWithIV)                {                    KeyParameter    kParam = (KeyParameter)((ParametersWithIV)param).getParameters();                    setOddParity(kParam.getKey());                }                else                {                    KeyParameter    kParam = (KeyParameter)param;                    setOddParity(kParam.getKey());                }            }            for (int i = 0; i != key.length; i++)            {                key[i] = 0;            }            return param;        }        /**         * generate a PBE based key suitable for a MAC algorithm, the         * key size is chosen according the MAC size, or the hashing algorithm,         * whichever is greater.         */        static CipherParameters makePBEMacParameters(            JCEPBEKey               pbeKey,            AlgorithmParameterSpec  spec,            int                     type,            int                     hash,            int                     keySize)        {            if ((spec == null) || !(spec instanceof PBEParameterSpec))            {                throw new IllegalArgumentException("Need a PBEParameter spec with a PBE key.");            }                PBEParameterSpec        pbeParam = (PBEParameterSpec)spec;            PBEParametersGenerator  generator = makePBEGenerator(type, hash);            byte[]                  key = pbeKey.getEncoded();            CipherParameters        param;                generator.init(key, pbeParam.getSalt(), pbeParam.getIterationCount());            param = generator.generateDerivedMacParameters(keySize);                for (int i = 0; i != key.length; i++)            {                key[i] = 0;            }            return param;        }    }}

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲国产欧美在线人成| 韩国三级中文字幕hd久久精品| 香蕉成人啪国产精品视频综合网| 久久99国产精品久久| 91高清视频免费看| 日本一区二区电影| 六月婷婷色综合| 欧美日韩在线三区| 中文字幕一区二| 国产精品影音先锋| 91麻豆精品国产自产在线| 亚洲欧美日韩国产综合在线| 国产在线播放一区| 欧美一区在线视频| 亚瑟在线精品视频| 欧美三级电影一区| 亚洲免费视频成人| 99re这里都是精品| 久久精品免视看| 国产高清不卡二三区| 欧美刺激午夜性久久久久久久 | 久久久午夜精品| 日韩国产精品久久久| 91久久精品国产91性色tv| 亚洲精品一二三| 国产不卡在线播放| 欧美国产禁国产网站cc| 国产一区久久久| 久久免费视频色| 国产精品一区二区三区网站| 日韩精品一区二区三区蜜臀| 美女免费视频一区| 精品av综合导航| 国产一区二区三区黄视频| 精品成a人在线观看| 国产伦精品一区二区三区视频青涩| 日韩一本二本av| 久久精品国产亚洲5555| 欧美va在线播放| 国产在线国偷精品产拍免费yy| 日韩欧美国产综合| 国产老女人精品毛片久久| 国产欧美一区二区精品仙草咪 | 久久久亚洲午夜电影| 国产一区二区三区香蕉| 国产女同互慰高潮91漫画| 国产99精品视频| 亚洲免费视频中文字幕| 欧美久久一区二区| 精品一区免费av| 国产精品乱码久久久久久| 99久久国产免费看| 视频一区二区不卡| 久久久精品2019中文字幕之3| 成年人网站91| 日日摸夜夜添夜夜添国产精品| 欧美成人激情免费网| 成人午夜碰碰视频| 午夜精品视频一区| 国产亚洲婷婷免费| 欧美在线观看18| 精品亚洲成av人在线观看| 国产精品免费av| 欧美日韩一区二区在线视频| 麻豆精品新av中文字幕| 国产精品麻豆久久久| 欧美日韩国产123区| 精品中文字幕一区二区| 欧美国产日韩一二三区| 欧美系列日韩一区| 国产乱码精品一区二区三区av| 亚洲欧美韩国综合色| 欧美成人r级一区二区三区| www.亚洲免费av| 精品制服美女丁香| 亚洲成人激情社区| 中文字幕精品一区二区三区精品| 欧美性感一区二区三区| 床上的激情91.| 国产成人在线视频网站| 亚洲综合免费观看高清完整版在线| 日韩视频一区二区| 色婷婷综合久久| 国产精品白丝jk黑袜喷水| 亚洲成a人片在线不卡一二三区 | 日韩欧美一级在线播放| 一本色道a无线码一区v| 国产成人在线电影| 蜜桃视频一区二区| 亚洲va国产天堂va久久en| 亚洲欧美怡红院| 国产三级久久久| 日韩美女视频一区二区在线观看| 欧美丝袜第三区| 91福利社在线观看| 成人黄色综合网站| 成人综合在线网站| 久久成人av少妇免费| 午夜不卡av在线| 亚洲成人精品一区二区| 亚洲自拍与偷拍| 亚洲一区自拍偷拍| 亚洲人妖av一区二区| 国产精品国产三级国产普通话蜜臀 | 成人毛片老司机大片| 精品一区二区三区的国产在线播放| 一级中文字幕一区二区| 亚洲精品欧美激情| 亚洲理论在线观看| 亚洲码国产岛国毛片在线| 亚洲人成精品久久久久| 国产精品无遮挡| 中文一区一区三区高中清不卡| 久久精品一区二区三区四区| 久久久91精品国产一区二区精品 | 欧美日韩一区不卡| 欧美日韩在线一区二区| 欧美日韩精品免费| 欧美疯狂做受xxxx富婆| 4438x成人网最大色成网站| 在线成人av影院| 91精品国产欧美一区二区18| 宅男噜噜噜66一区二区66| 日韩欧美一区在线观看| 亚洲精品一区二区三区蜜桃下载| 日韩精品中文字幕一区二区三区 | 国产真实乱子伦精品视频| 国产精品一区二区久激情瑜伽| 99精品视频中文字幕| 91在线精品一区二区| 91国内精品野花午夜精品| 欧美日韩精品系列| 日韩一区二区在线看| www日韩大片| 中文字幕一区二区三区视频| 一区二区三区精品在线| 日本成人超碰在线观看| 国产精品乡下勾搭老头1| 99久久久国产精品免费蜜臀| 在线免费精品视频| 精品国产一区二区三区久久影院| 久久精品视频免费| 亚洲激情校园春色| 日本不卡1234视频| 岛国精品在线观看| 欧美日韩dvd在线观看| 欧美精品一区二| 亚洲一区二区在线观看视频| 日本欧美韩国一区三区| 国产精品一二三区在线| 色婷婷综合在线| 精品国产一区二区在线观看| 中文字幕在线不卡一区 | ...xxx性欧美| 日本特黄久久久高潮| 成人午夜av影视| 欧美日韩视频一区二区| 久久久久久久久久美女| 一区二区三区不卡在线观看| 久久黄色级2电影| 日本精品一级二级| 国产视频亚洲色图| 日韩和的一区二区| 99视频精品免费视频| 欧美大片一区二区三区| 亚洲国产日日夜夜| 成人中文字幕在线| 欧美v国产在线一区二区三区| 一区二区三区在线不卡| 国产成人精品三级麻豆| 欧美一区二区三区视频免费播放| 国产精品传媒入口麻豆| 国精品**一区二区三区在线蜜桃| 91国产精品成人| 18成人在线观看| 成人精品一区二区三区四区| 日韩欧美高清一区| 日韩精品1区2区3区| 在线观看日韩国产| 欧美高清一级片在线观看| 精品一区二区三区av| 666欧美在线视频| 亚洲国产精品久久艾草纯爱 | 日韩精品一区二区三区中文不卡 | 精品一区二区三区在线观看国产| 色综合视频一区二区三区高清| 久久久久久久精| 麻豆精品一区二区三区| 欧美一级日韩不卡播放免费| 亚洲午夜免费视频| 在线亚洲一区二区| 亚洲视频一区二区免费在线观看| 国产精品亚洲专一区二区三区| 欧美精品一区二区三区在线| 日产国产欧美视频一区精品| 在线播放中文字幕一区| 日本最新不卡在线| 国产精品成人午夜| 成人一二三区视频| 国产精品久久久久久久岛一牛影视 |