亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? tv_gen.c

?? 最新版本的加密解密算法庫
?? C
字號:
#include <mycrypt.h>void reg_algs(void){#ifdef RIJNDAEL  register_cipher (&aes_desc);#endif#ifdef BLOWFISH  register_cipher (&blowfish_desc);#endif#ifdef XTEA  register_cipher (&xtea_desc);#endif#ifdef RC5  register_cipher (&rc5_desc);#endif#ifdef RC6  register_cipher (&rc6_desc);#endif#ifdef SAFERP  register_cipher (&saferp_desc);#endif#ifdef TWOFISH  register_cipher (&twofish_desc);#endif#ifdef SAFER  register_cipher (&safer_k64_desc);  register_cipher (&safer_sk64_desc);  register_cipher (&safer_k128_desc);  register_cipher (&safer_sk128_desc);#endif#ifdef RC2  register_cipher (&rc2_desc);#endif#ifdef DES  register_cipher (&des_desc);  register_cipher (&des3_desc);#endif#ifdef CAST5  register_cipher (&cast5_desc);#endif#ifdef NOEKEON  register_cipher (&noekeon_desc);#endif#ifdef SKIPJACK  register_cipher (&skipjack_desc);#endif#ifdef TIGER  register_hash (&tiger_desc);#endif#ifdef MD2  register_hash (&md2_desc);#endif#ifdef MD4  register_hash (&md4_desc);#endif#ifdef MD5  register_hash (&md5_desc);#endif#ifdef SHA1  register_hash (&sha1_desc);#endif#ifdef SHA224  register_hash (&sha224_desc);#endif#ifdef SHA256  register_hash (&sha256_desc);#endif#ifdef SHA384  register_hash (&sha384_desc);#endif#ifdef SHA512  register_hash (&sha512_desc);#endif#ifdef RIPEMD128  register_hash (&rmd128_desc);#endif#ifdef RIPEMD160  register_hash (&rmd160_desc);#endif#ifdef WHIRLPOOL  register_hash (&whirlpool_desc);#endif}void hash_gen(void){   unsigned char md[MAXBLOCKSIZE], buf[MAXBLOCKSIZE*2+2];   unsigned long outlen, x, y, z;   FILE *out;      out = fopen("hash_tv.txt", "w");      fprintf(out, "Hash Test Vectors:\n\nThese are the hashes of nn bytes '00 01 02 03 .. (nn-1)'\n\n");   for (x = 0; hash_descriptor[x].name != NULL; x++) {      fprintf(out, "Hash: %s\n", hash_descriptor[x].name);            for (y = 0; y <= (hash_descriptor[x].blocksize * 2); y++) {         for (z = 0; z < y; z++) {            buf[z] = (unsigned char)(z & 255);         }         outlen = sizeof(md);         hash_memory(x, buf, y, md, &outlen);         fprintf(out, "%3lu: ", y);         for (z = 0; z < outlen; z++) {            fprintf(out, "%02X", md[z]);         }         fprintf(out, "\n");      }      fprintf(out, "\n");   }   fclose(out);}void cipher_gen(void){   unsigned char key[MAXBLOCKSIZE], pt[MAXBLOCKSIZE];   unsigned long x, y, z, w;   int kl, lastkl;   FILE *out;   symmetric_key skey;      out = fopen("cipher_tv.txt", "w");      fprintf(out, "Cipher Test Vectors\n\nThese are test encryptions with key of nn bytes '00 01 02 03 .. (nn-1)' and original PT of the same style.\n""The output of step N is used as the key and plaintext for step N+1 (key bytes repeated as required to fill the key)\n\n");                      for (x = 0; cipher_descriptor[x].name != NULL; x++) {      fprintf(out, "Cipher: %s\n", cipher_descriptor[x].name);            /* three modes, smallest, medium, large keys */      lastkl = 10000;      for (y = 0; y < 3; y++) {         switch (y) {            case 0: kl = cipher_descriptor[x].min_key_length; break;            case 1: kl = (cipher_descriptor[x].min_key_length + cipher_descriptor[x].max_key_length)/2; break;            case 2: kl = cipher_descriptor[x].max_key_length; break;         }         cipher_descriptor[x].keysize(&kl);         if (kl == lastkl) break;         lastkl = kl;         fprintf(out, "Key Size: %d bytes\n", kl);         for (z = 0; (int)z < kl; z++) {             key[z] = (unsigned char)z;         }         cipher_descriptor[x].setup(key, kl, 0, &skey);                  for (z = 0; (int)z < cipher_descriptor[x].block_length; z++) {            pt[z] = (unsigned char)z;         }         for (w = 0; w < 50; w++) {             cipher_descriptor[x].ecb_encrypt(pt, pt, &skey);             fprintf(out, "%2lu: ", w);             for (z = 0; (int)z < cipher_descriptor[x].block_length; z++) {                fprintf(out, "%02X", pt[z]);             }             fprintf(out, "\n");             /* reschedule a new key */             for (z = 0; z < (unsigned long)kl; z++) {                 key[z] = pt[z % cipher_descriptor[x].block_length];             }             cipher_descriptor[x].setup(key, kl, 0, &skey);         }         fprintf(out, "\n");     }     fprintf(out, "\n");  }  fclose(out);}  void hmac_gen(void){   unsigned char key[MAXBLOCKSIZE], output[MAXBLOCKSIZE], input[MAXBLOCKSIZE*2+2];   int x, y, z, kl, err;   FILE *out;   unsigned long len;     out = fopen("hmac_tv.txt", "w");   fprintf(out, "HMAC Tests.  In these tests messages of N bytes long (00,01,02,...,NN-1) are HMACed.  The initial key is\n""of the same format (the same length as the HASH output size).  The HMAC key in step N+1 is the HMAC output of\n""step N.\n\n");   for (x = 0; hash_descriptor[x].name != NULL; x++) {      fprintf(out, "HMAC-%s\n", hash_descriptor[x].name);            /* initial key */      for (y = 0; y < (int)hash_descriptor[x].hashsize; y++) {          key[y] = (y&255);      }            for (y = 0; y <= (int)(hash_descriptor[x].blocksize * 2); y++) {         for (z = 0; z < y; z++) {            input[z] = (unsigned char)(z & 255);         }         len = sizeof(output);         if ((err = hmac_memory(x, key, hash_descriptor[x].hashsize, input, y, output, &len)) != CRYPT_OK) {            printf("Error hmacing: %s\n", error_to_string(err));            exit(EXIT_FAILURE);         }         fprintf(out, "%3d: ", y);         for (z = 0; z <(int) len; z++) {            fprintf(out, "%02X", output[z]);         }         fprintf(out, "\n");         /* forward the key */         memcpy(key, output, hash_descriptor[x].hashsize);      }      fprintf(out, "\n");   }   fclose(out);}   void omac_gen(void){   unsigned char key[MAXBLOCKSIZE], output[MAXBLOCKSIZE], input[MAXBLOCKSIZE*2+2];   int err, x, y, z, kl;   FILE *out;   unsigned long len;     out = fopen("omac_tv.txt", "w");   fprintf(out, "OMAC Tests.  In these tests messages of N bytes long (00,01,02,...,NN-1) are OMAC'ed.  The initial key is\n""of the same format (length specified per cipher).  The OMAC key in step N+1 is the OMAC output of\n""step N (repeated as required to fill the array).\n\n");   for (x = 0; cipher_descriptor[x].name != NULL; x++) {      kl = cipher_descriptor[x].block_length;      /* skip ciphers which do not have 64 or 128 bit block sizes */      if (kl != 8 && kl != 16) continue;      if (cipher_descriptor[x].keysize(&kl) != CRYPT_OK) {         kl = cipher_descriptor[x].max_key_length;      }      fprintf(out, "OMAC-%s (%d byte key)\n", cipher_descriptor[x].name, kl);            /* initial key/block */      for (y = 0; y < kl; y++) {          key[y] = (y & 255);      }            for (y = 0; y <= (int)(cipher_descriptor[x].block_length*2); y++) {         for (z = 0; z < y; z++) {            input[z] = (unsigned char)(z & 255);         }         len = sizeof(output);         if ((err = omac_memory(x, key, kl, input, y, output, &len)) != CRYPT_OK) {            printf("Error omacing: %s\n", error_to_string(err));            exit(EXIT_FAILURE);         }         fprintf(out, "%3d: ", y);         for (z = 0; z <(int)len; z++) {            fprintf(out, "%02X", output[z]);         }         fprintf(out, "\n");         /* forward the key */         for (z = 0; z < kl; z++) {             key[z] = output[z % len];         }      }      fprintf(out, "\n");   }   fclose(out);}void pmac_gen(void){   unsigned char key[MAXBLOCKSIZE], output[MAXBLOCKSIZE], input[MAXBLOCKSIZE*2+2];   int err, x, y, z, kl;   FILE *out;   unsigned long len;     out = fopen("pmac_tv.txt", "w");   fprintf(out, "PMAC Tests.  In these tests messages of N bytes long (00,01,02,...,NN-1) are OMAC'ed.  The initial key is\n""of the same format (length specified per cipher).  The OMAC key in step N+1 is the OMAC output of\n""step N (repeated as required to fill the array).\n\n");   for (x = 0; cipher_descriptor[x].name != NULL; x++) {      kl = cipher_descriptor[x].block_length;      /* skip ciphers which do not have 64 or 128 bit block sizes */      if (kl != 8 && kl != 16) continue;      if (cipher_descriptor[x].keysize(&kl) != CRYPT_OK) {         kl = cipher_descriptor[x].max_key_length;      }      fprintf(out, "PMAC-%s (%d byte key)\n", cipher_descriptor[x].name, kl);            /* initial key/block */      for (y = 0; y < kl; y++) {          key[y] = (y & 255);      }            for (y = 0; y <= (int)(cipher_descriptor[x].block_length*2); y++) {         for (z = 0; z < y; z++) {            input[z] = (unsigned char)(z & 255);         }         len = sizeof(output);         if ((err = pmac_memory(x, key, kl, input, y, output, &len)) != CRYPT_OK) {            printf("Error omacing: %s\n", error_to_string(err));            exit(EXIT_FAILURE);         }         fprintf(out, "%3d: ", y);         for (z = 0; z <(int)len; z++) {            fprintf(out, "%02X", output[z]);         }         fprintf(out, "\n");         /* forward the key */         for (z = 0; z < kl; z++) {             key[z] = output[z % len];         }      }      fprintf(out, "\n");   }   fclose(out);}void eax_gen(void){   int err, kl, x, y1, z;   FILE *out;   unsigned char key[MAXBLOCKSIZE], nonce[MAXBLOCKSIZE*2], header[MAXBLOCKSIZE*2],                  plaintext[MAXBLOCKSIZE*2], tag[MAXBLOCKSIZE];   unsigned long len;   out = fopen("eax_tv.txt", "w");   fprintf(out, "EAX Test Vectors.  Uses the 00010203...NN-1 pattern for header/nonce/plaintext/key.  The outputs\n"                "are of the form ciphertext,tag for a given NN.  The key for step N>1 is the tag of the previous\n"                "step repeated sufficiently.\n\n");   for (x = 0; cipher_descriptor[x].name != NULL; x++) {      kl = cipher_descriptor[x].block_length;      /* skip ciphers which do not have 64 or 128 bit block sizes */      if (kl != 8 && kl != 16) continue;      if (cipher_descriptor[x].keysize(&kl) != CRYPT_OK) {         kl = cipher_descriptor[x].max_key_length;      }      fprintf(out, "EAX-%s (%d byte key)\n", cipher_descriptor[x].name, kl);      /* the key */      for (z = 0; z < kl; z++) {          key[z] = (z & 255);      }            for (y1 = 0; y1 <= (int)(cipher_descriptor[x].block_length*2); y1++){         for (z = 0; z < y1; z++) {            plaintext[z] = (unsigned char)(z & 255);            nonce[z]     = (unsigned char)(z & 255);            header[z]    = (unsigned char)(z & 255);         }         len = sizeof(tag);         if ((err = eax_encrypt_authenticate_memory(x, key, kl, nonce, y1, header, y1, plaintext, y1, plaintext, tag, &len)) != CRYPT_OK) {            printf("Error EAX'ing: %s\n", error_to_string(err));            exit(EXIT_FAILURE);         }         fprintf(out, "%3d: ", y1);         for (z = 0; z < y1; z++) {            fprintf(out, "%02X", plaintext[z]);         }         fprintf(out, ", ");         for (z = 0; z <(int)len; z++) {            fprintf(out, "%02X", tag[z]);         }         fprintf(out, "\n");         /* forward the key */         for (z = 0; z < kl; z++) {             key[z] = tag[z % len];         }      }      fprintf(out, "\n");   }   fclose(out);}void ocb_gen(void){   int err, kl, x, y1, z;   FILE *out;   unsigned char key[MAXBLOCKSIZE], nonce[MAXBLOCKSIZE*2],                  plaintext[MAXBLOCKSIZE*2], tag[MAXBLOCKSIZE];   unsigned long len;   out = fopen("ocb_tv.txt", "w");   fprintf(out, "OCB Test Vectors.  Uses the 00010203...NN-1 pattern for nonce/plaintext/key.  The outputs\n"                "are of the form ciphertext,tag for a given NN.  The key for step N>1 is the tag of the previous\n"                "step repeated sufficiently.  The nonce is fixed throughout.\n\n");   for (x = 0; cipher_descriptor[x].name != NULL; x++) {      kl = cipher_descriptor[x].block_length;      /* skip ciphers which do not have 64 or 128 bit block sizes */      if (kl != 8 && kl != 16) continue;      if (cipher_descriptor[x].keysize(&kl) != CRYPT_OK) {         kl = cipher_descriptor[x].max_key_length;      }      fprintf(out, "OCB-%s (%d byte key)\n", cipher_descriptor[x].name, kl);      /* the key */      for (z = 0; z < kl; z++) {          key[z] = (z & 255);      }      /* fixed nonce */      for (z = 0; z < cipher_descriptor[x].block_length; z++) {          nonce[z] = z;      }            for (y1 = 0; y1 <= (int)(cipher_descriptor[x].block_length*2); y1++){         for (z = 0; z < y1; z++) {            plaintext[z] = (unsigned char)(z & 255);         }         len = sizeof(tag);         if ((err = ocb_encrypt_authenticate_memory(x, key, kl, nonce, plaintext, y1, plaintext, tag, &len)) != CRYPT_OK) {            printf("Error OCB'ing: %s\n", error_to_string(err));            exit(EXIT_FAILURE);         }         fprintf(out, "%3d: ", y1);         for (z = 0; z < y1; z++) {            fprintf(out, "%02X", plaintext[z]);         }         fprintf(out, ", ");         for (z = 0; z <(int)len; z++) {            fprintf(out, "%02X", tag[z]);         }         fprintf(out, "\n");         /* forward the key */         for (z = 0; z < kl; z++) {             key[z] = tag[z % len];         }      }      fprintf(out, "\n");   }   fclose(out);}void base64_gen(void){   FILE *out;   unsigned char dst[256], src[32];   unsigned long x, y, len;      out = fopen("base64_tv.txt", "w");   fprintf(out, "Base64 vectors.  These are the base64 encodings of the strings 00,01,02...NN-1\n\n");   for (x = 0; x <= 32; x++) {       for (y = 0; y < x; y++) {           src[y] = y;       }       len = sizeof(dst);       base64_encode(src, x, dst, &len);       fprintf(out, "%2lu: %s\n", x, dst);   }   fclose(out);}int main(void){   reg_algs();   printf("Generating hash   vectors..."); fflush(stdout); hash_gen(); printf("done\n");   printf("Generating cipher vectors..."); fflush(stdout); cipher_gen(); printf("done\n");   printf("Generating HMAC   vectors..."); fflush(stdout); hmac_gen(); printf("done\n");   printf("Generating OMAC   vectors..."); fflush(stdout); omac_gen(); printf("done\n");   printf("Generating PMAC   vectors..."); fflush(stdout); pmac_gen(); printf("done\n");   printf("Generating EAX    vectors..."); fflush(stdout); eax_gen(); printf("done\n");   printf("Generating OCB    vectors..."); fflush(stdout); ocb_gen(); printf("done\n");   printf("Generating BASE64 vectors..."); fflush(stdout); base64_gen(); printf("done\n");   return 0;}                                  

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲另类春色校园小说| 色噜噜狠狠色综合中国| jiyouzz国产精品久久| 91一区二区三区在线观看| 欧美色国产精品| 精品国产乱码久久久久久蜜臀 | 一区二区三区四区视频精品免费 | 91视频在线看| 欧美一区二区三区思思人| 国产三级一区二区三区| 亚洲狠狠丁香婷婷综合久久久| 日韩精品国产欧美| 国产成人午夜99999| 91免费观看在线| 日韩精品一区二区三区在线播放 | 一本色道a无线码一区v| 日韩欧美的一区二区| 国产精品久久久久9999吃药| 亚洲chinese男男1069| 国产精品2024| 欧美日韩卡一卡二| 欧美国产日韩精品免费观看| 丝袜诱惑制服诱惑色一区在线观看| 国内久久精品视频| 欧美天堂一区二区三区| 久久亚洲影视婷婷| 亚洲国产精品久久久久秋霞影院 | 久久综合色8888| 夜夜嗨av一区二区三区网页| 国产一区二区主播在线| 欧美视频一区二| 国产精品国产三级国产a | 国产亚洲午夜高清国产拍精品| 一区二区三区四区五区视频在线观看| 国产一区日韩二区欧美三区| 欧美三级日韩三级| 亚洲国产精品99久久久久久久久 | 日韩免费看网站| 亚洲一区二区视频在线观看| 国产91对白在线观看九色| 777色狠狠一区二区三区| 日韩伦理电影网| 国产精品一二三在| 日韩一区二区三区观看| 一二三四区精品视频| 成人午夜看片网址| 精品国产91乱码一区二区三区| 香蕉加勒比综合久久| 一本色道久久综合亚洲91| 日本一区二区三区免费乱视频| 青娱乐精品视频在线| 精品婷婷伊人一区三区三| ...中文天堂在线一区| 国产精品一二二区| 欧美精品一区二区不卡 | 日韩一区二区免费视频| 亚洲第一狼人社区| 在线一区二区三区四区五区 | 日韩一级片网址| 亚洲大片精品永久免费| 91久久国产最好的精华液| 综合久久给合久久狠狠狠97色| 成人黄色国产精品网站大全在线免费观看| 精品蜜桃在线看| 精品亚洲国产成人av制服丝袜| 欧美一区日韩一区| 日本成人中文字幕在线视频| 777久久久精品| 青青草国产成人99久久| 日韩视频一区二区三区| 青青草精品视频| 91精品午夜视频| 麻豆91在线观看| 精品国产sm最大网站免费看| 国产一区二区三区免费观看| 精品成人在线观看| 日韩精品成人一区二区在线| 欧美日免费三级在线| 久久蜜桃av一区精品变态类天堂 | 国产成人亚洲综合色影视| 欧美一级欧美三级| 午夜精品成人在线视频| 欧美性一级生活| 夜夜嗨av一区二区三区网页| 国产乱码字幕精品高清av| 国产日产欧美一区| 国产乱对白刺激视频不卡 | 亚洲chinese男男1069| 日本精品视频一区二区三区| 亚洲日韩欧美一区二区在线| 99视频在线观看一区三区| 国产精品久久久久影视| a在线欧美一区| 国产视频911| 色噜噜久久综合| 亚洲一级不卡视频| 欧美日韩国产乱码电影| 青青草国产成人av片免费| 欧美日韩一区不卡| 国内精品伊人久久久久av一坑 | 久久久久久久久蜜桃| 捆绑紧缚一区二区三区视频| 欧美精品日韩综合在线| 美女性感视频久久| 久久综合九色综合久久久精品综合| 韩国毛片一区二区三区| 久久久久久久久久久久电影| 国产mv日韩mv欧美| 国产精品免费aⅴ片在线观看| 99精品视频免费在线观看| 一区二区三区资源| 欧美日韩电影一区| 激情小说亚洲一区| 国产清纯白嫩初高生在线观看91| 成人性生交大合| 91在线观看免费视频| 亚洲黄一区二区三区| 欧美日韩一二区| 捆绑调教一区二区三区| 精品福利一二区| 在线亚洲精品福利网址导航| 视频一区中文字幕| 久久婷婷色综合| 99久久综合国产精品| 亚洲一区在线看| 日韩精品一区二区三区中文不卡| 99久久婷婷国产综合精品电影| 亚洲一区二区三区视频在线| 欧美一级高清片| 成人看片黄a免费看在线| 亚洲永久免费av| 亚洲精品一区二区在线观看| 国产成a人亚洲| 日韩精品亚洲专区| 欧美国产精品久久| 欧美亚洲高清一区二区三区不卡| 秋霞影院一区二区| 国产精品短视频| 91精品国产综合久久精品app| 99re这里只有精品6| 美洲天堂一区二卡三卡四卡视频| 国产精品午夜在线观看| 337p亚洲精品色噜噜| 成人做爰69片免费看网站| 亚洲精品国产一区二区三区四区在线| 欧美性猛片xxxx免费看久爱| 成人激情校园春色| 日本欧美肥老太交大片| 国产精品国产成人国产三级| 欧美一区二区成人| 91啪亚洲精品| 国模大尺度一区二区三区| 日本少妇一区二区| 一色桃子久久精品亚洲| 日韩丝袜情趣美女图片| 99精品欧美一区二区三区小说| 男人的天堂亚洲一区| 国产精品亲子伦对白| 欧美一区二区三区电影| 91原创在线视频| 高清不卡在线观看av| 免费成人小视频| 亚洲一区在线免费观看| 中文字幕免费在线观看视频一区| 日韩一区二区三区四区五区六区| 91在线免费播放| 国产精品一区二区视频| 天堂久久久久va久久久久| 亚洲欧美国产三级| 中文字幕乱码一区二区免费| 日韩一本二本av| 欧美日韩中文一区| 91视频xxxx| 色乱码一区二区三区88| 丰满少妇在线播放bd日韩电影| 日韩av不卡一区二区| 一区二区三区av电影| 国产精品免费网站在线观看| 日韩欧美在线网站| 日韩三级在线观看| 欧美日韩在线三级| 91免费观看视频在线| 成人精品国产免费网站| 国产精品一区二区视频| 国产成人精品三级| 激情成人综合网| 久久av资源网| 美腿丝袜亚洲一区| 午夜国产不卡在线观看视频| 国产欧美日韩精品a在线观看| 在线不卡的av| 欧美老年两性高潮| 欧美日韩久久一区| 在线观看视频一区二区| 欧美日韩国产高清一区| 欧美伊人久久大香线蕉综合69| 91丨porny丨首页| 色婷婷国产精品综合在线观看| 一本一道久久a久久精品| 亚洲私人影院在线观看|