亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rc2.java

?? jpeg2000編解碼
?? JAVA
?? 第 1 頁 / 共 2 頁
字號:
// $Id: RC2.java,v 1.1.1.1 2002/08/27 12:32:10 grosbois Exp $//// $Log: RC2.java,v $// Revision 1.1.1.1  2002/08/27 12:32:10  grosbois// Add cryptix 3.2//// Revision 1.4  2000/08/17 11:40:51  edwin// java.* -> xjava.*//// Revision 1.3  1999/07/21 02:38:05  edwin// Fixed RC2//// Revision 1.2  1997/11/29 04:42:56  hopwood// + Changes to engineUpdate method.//// + Added native API.//// Revision 1.1  1997/11/08 14:39:19  raif// *** empty log message ***//// Revision 0.1.1  1997/10/27 22:19:26  raif// + Original version.//// $Endlog$/* * Ported to Java from C code by Peter Gutmann (pgut01@cs.auckland.ac.nz) * and Eric Young (eay@mincom.oz.au). * * Copyright (c) 1997 Systemics Ltd * on behalf of the Cryptix Development Team. All rights reserved. */package cryptix.provider.cipher;import java.io.PrintWriter;import xjava.security.Cipher;import java.security.Key;import java.security.KeyException;import xjava.security.SymmetricCipher;import cryptix.util.core.Debug;import cryptix.CryptixException;/**     * A subclass of Cipher to implement the RC2 (TM) block cipher algorithm in * Java. * <p> * The source code (C version) from which this port was done, and (most of) * the programming notes, are by P. Gutmann (pgut01@cs.auckland.ac.nz) -- as * obtained from Usenet. * <p> * Eric Young (eay@mincom.oz.au) implementation, also based on Gutmann's * work, and included in Eric's colossal SSL library ver 0.6.6 14 Jan 1997, * was also used for the initial key data and the computation of the session * key schedule. Code to tailor the session key for a specified length in * bits is included in this Java implementation but is crippled (commented * out). The current code behaves as if the session key is fixed at 1024-bit. * <p> * The RC2 algorithm is word (16-bit entity) oriented, operating on a block of * 64 bits (or 8 Java bytes) divided into four words, with a key table of 64 * words. * <p> * RC2 (TM) was designed by Ron Rivest, and was previously a trade secret of * RSA Data Security, Inc. The algorithm has since been published as an RFC * [reference?]. The name "RC2" is a trademark of RSA Data Security, Inc. * <p> * <b>Copyright</b> &copy; 1997 * <a href="http://www.systemics.com/">Systemics Ltd</a> on behalf of the * <a href="http://www.systemics.com/docs/cryptix/">Cryptix Development Team</a>. * <br>All rights reserved. * <p> * <b>$Revision: 1.1.1.1 $</b> * @author  Raif S. Naffah */public final class RC2extends Cipherimplements SymmetricCipher{// Debugging methods and vars.//...........................................................................    private static final boolean DEBUG = Debug.GLOBAL_DEBUG;    private static final boolean DEBUG_SLOW = Debug.GLOBAL_DEBUG_SLOW;    private static final int debuglevel = DEBUG ? Debug.getLevel("RC2") : 0;    private static final PrintWriter err = DEBUG ? Debug.getOutput() : null;    private static void debug(String s) { err.println("RC2: " + s); }// Native library linking methods and vars.//...........................................................................    private static NativeLink linkStatus = new NativeLink("RC2", 2, 3);    /**     * Gets an object representing the native linking status of this class.     */    public static cryptix.util.core.LinkStatus getLinkStatus() { return linkStatus; }    /**     * The native reference to the current native key schedule     * structure. Defaults to 0 but is set by native code after a     * successful call to native_init().     * <p>     * IMPORTANT: Do not change the name of this variable without     * duplicating the same in the native code.     */    private long native_cookie;    /**     * This object must be synchronized on while calling any native instance     * method. It is null if the native code is not being used (e.g. the     * library did not load successfully, or the user disabled its use in     * the properties file).     */    private Object native_lock; // defaults to null    private void link() {        synchronized(linkStatus) {            try {                if (linkStatus.attemptLoad()) {                    linkStatus.checkVersion(getLibMajorVersion(), getLibMinorVersion());                    linkStatus.check(native_clinit());                }                if (linkStatus.useNative()) {                    linkStatus.check(native_init());                    native_lock = new Object();                }            } catch (UnsatisfiedLinkError e) {                linkStatus.fail(e);if (DEBUG && debuglevel > 2) debug(e.getMessage());            }if (DEBUG && debuglevel > 2) debug("Using native library? " + (native_lock != null));        }    }// Native support API//...........................................................................    // The methods that get the library version.    private native static int getLibMajorVersion();    private native static int getLibMinorVersion();    /**     * Static initialization and self-test method for the native code.     *     * @return a string if an error occurred or null otherwise.     */    private native String native_clinit();    /**     * Initializes the native state for this cipher object and allocates     * needed native storage for the internal key schedule. A reference     * to the newly allocated space, if successful, is stored in the     * instance variable <code>native_cookie</code>.     *     * @return a string if an error occurred or null otherwise.     */    private native String native_init();    /**     * This function expands the user key to an internal form.     *     * @param  cookie   a valid reference to the native key structure. This     *                  value is set by the native library upon return from     *                  native_init() (see link() method at the top).     * @param  userKey  a byte array representing the user key     * @return an error String, or null if there was no error     */    private native String native_ks(long cookie, byte[] userKey);    /**     * Encrypts/decrypts a data block.     * <p>     * FUTURE: possibly change this to be able to process more than one block,     * to reduce native method call overhead.     * <p>     * SECURITY: the caller <strong>must</strong> ensure that:     * <ul>     *   <li> <code>in != null</code>     *   <li> <code>out != null</code>     *   <li> <code>inOffset >= 0</code>     *   <li> <code>(long)inOffset + BLOCK_LENGTH <= in.length</code>     *   <li> <code>outOffset >= 0</code>     *   <li> <code>(long)outOffset + BLOCK_LENGTH <= out.length</code>     * </ul>     *     * @param  cookie       a valid reference to the native key structure. This     *                      value is set by the native library upon return from     *                      native_init() (see link() method at the top).     * @param  in           input array containing data to encrypt or decrypt     *                      depending on the value of the encrypt boolean parameter.     * @param  inOffset     index of where we should start reading from input.     * @param  out          output array containing data decrypted or encrypted     *                      depending on the value of the encrypt boolean parameter.     * @param  outOffset    index of where we should start writing to output.     * @param  encrypt      if true then encrypt, otherwise decrypt.     * @return the number of bytes crypted (always BLOCK_LENGTH) or 0 if an error     *                      occurred.     */    private native int native_crypt (long cookie, byte[] in, int inOffset,                                     byte[] out, int outOffset, boolean encrypt);    /**     * Finalizes the native state for this object.     *     * @return a string if an error occurred or null otherwise.     */    private native String native_finalize();// Variables and constants//............................................................................    /**     * RC2 uses a single 256-byte S-box derived from the ciphertext contents     * of Beale Cipher No.1 XOR'd with a one-time pad. The Beale Ciphers     * predate modern cryptography by enough time that there should be no     * concerns about trapdoors hidden in the data. They have been published     * widely, and the S-box can be easily recreated from the one-time pad     * values and the Beale Cipher data taken from a standard source. To     * initialise the S-box:     * <pre>     *   for i = 0 to 255 do     *     sBox[ i ] = ( beale[ i ] mod 256 ) ^ pad[ i ];     * </pre>     * <p>     * The following table gives the computed values based on the above.     * Thanks Eric :))     */    private static final int[] S_BOX = {        0xD9, 0x78, 0xF9, 0xC4, 0x19, 0xDD, 0xB5, 0xED,        0x28, 0xE9, 0xFD, 0x79, 0x4A, 0xA0, 0xD8, 0x9D,        0xC6, 0x7E, 0x37, 0x83, 0x2B, 0x76, 0x53, 0x8E,        0x62, 0x4C, 0x64, 0x88, 0x44, 0x8B, 0xFB, 0xA2,        0x17, 0x9A, 0x59, 0xF5, 0x87, 0xB3, 0x4F, 0x13,        0x61, 0x45, 0x6D, 0x8D, 0x09, 0x81, 0x7D, 0x32,        0xBD, 0x8F, 0x40, 0xEB, 0x86, 0xB7, 0x7B, 0x0B,        0xF0, 0x95, 0x21, 0x22, 0x5C, 0x6B, 0x4E, 0x82,        0x54, 0xD6, 0x65, 0x93, 0xCE, 0x60, 0xB2, 0x1C,        0x73, 0x56, 0xC0, 0x14, 0xA7, 0x8C, 0xF1, 0xDC,        0x12, 0x75, 0xCA, 0x1F, 0x3B, 0xBE, 0xE4, 0xD1,        0x42, 0x3D, 0xD4, 0x30, 0xA3, 0x3C, 0xB6, 0x26,        0x6F, 0xBF, 0x0E, 0xDA, 0x46, 0x69, 0x07, 0x57,        0x27, 0xF2, 0x1D, 0x9B, 0xBC, 0x94, 0x43, 0x03,        0xF8, 0x11, 0xC7, 0xF6, 0x90, 0xEF, 0x3E, 0xE7,        0x06, 0xC3, 0xD5, 0x2F, 0xC8, 0x66, 0x1E, 0xD7,        0x08, 0xE8, 0xEA, 0xDE, 0x80, 0x52, 0xEE, 0xF7,        0x84, 0xAA, 0x72, 0xAC, 0x35, 0x4D, 0x6A, 0x2A,        0x96, 0x1A, 0xD2, 0x71, 0x5A, 0x15, 0x49, 0x74,        0x4B, 0x9F, 0xD0, 0x5E, 0x04, 0x18, 0xA4, 0xEC,        0xC2, 0xE0, 0x41, 0x6E, 0x0F, 0x51, 0xCB, 0xCC,        0x24, 0x91, 0xAF, 0x50, 0xA1, 0xF4, 0x70, 0x39,        0x99, 0x7C, 0x3A, 0x85, 0x23, 0xB8, 0xB4, 0x7A,        0xFC, 0x02, 0x36, 0x5B, 0x25, 0x55, 0x97, 0x31,        0x2D, 0x5D, 0xFA, 0x98, 0xE3, 0x8A, 0x92, 0xAE,        0x05, 0xDF, 0x29, 0x10, 0x67, 0x6C, 0xBA, 0xC9,        0xD3, 0x00, 0xE6, 0xCF, 0xE1, 0x9E, 0xA8, 0x2C,        0x63, 0x16, 0x01, 0x3F, 0x58, 0xE2, 0x89, 0xA9,        0x0D, 0x38, 0x34, 0x1B, 0xAB, 0x33, 0xFF, 0xB0,        0xBB, 0x48, 0x0C, 0x5F, 0xB9, 0xB1, 0xCD, 0x2E,        0xC5, 0xF3, 0xDB, 0x47, 0xE5, 0xA5, 0x9C, 0x77,        0x0A, 0xA6, 0x20, 0x68, 0xFE, 0x7F, 0xC1, 0xAD    };    /** The session key. We're using the lower 16 bits of each int only. */    private int[] sKey = new int[64];    /** The block size, in bytes, of this cipher. */    public static final int BLOCK_SIZE = 8;// Constructor, finalizer, and clone()//............................................................................    /**     * Constructs an RC2 cipher object, in the UNINITIALIZED state.

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
老司机精品视频一区二区三区| 国产自产v一区二区三区c| 日韩免费高清电影| 91网页版在线| 九九九久久久精品| 五月婷婷久久丁香| 国产精品免费久久| 精品久久久久久亚洲综合网| 国产精品视频yy9299一区| 欧美日韩免费一区二区三区| 成人三级在线视频| 久久97超碰色| 性做久久久久久久免费看| 日韩理论片一区二区| 国产欧美精品在线观看| 精品欧美乱码久久久久久| 欧美日免费三级在线| 色婷婷久久综合| 成人午夜免费av| 国内精品视频666| 蜜桃久久精品一区二区| 亚洲资源在线观看| 一区二区三区在线视频免费| 日韩一区中文字幕| 18欧美乱大交hd1984| 久久欧美一区二区| 精品免费日韩av| 精品国产一区二区三区四区四| 欧美久久婷婷综合色| 欧美日韩卡一卡二| 欧美视频中文字幕| 在线亚洲精品福利网址导航| eeuss国产一区二区三区| 成人av片在线观看| 高清在线观看日韩| 成人激情动漫在线观看| 成人精品视频一区二区三区 | 裸体一区二区三区| 日韩和的一区二区| 天天av天天翘天天综合网色鬼国产 | 午夜欧美在线一二页| 亚洲一二三四在线观看| 亚洲一区二区三区中文字幕在线| 一区二区三区高清在线| 亚洲综合区在线| 丝袜国产日韩另类美女| 蜜桃视频在线一区| 国模少妇一区二区三区| 国产成人高清在线| av激情综合网| 91国偷自产一区二区使用方法| 91视频观看免费| 欧美日韩一区二区三区不卡 | 欧美片网站yy| 欧美α欧美αv大片| 久久久午夜精品| 国产精品久久久久婷婷| 亚洲乱码国产乱码精品精小说 | 亚洲黄一区二区三区| 一区二区三区**美女毛片| 午夜成人在线视频| 国内精品视频一区二区三区八戒| 国产v日产∨综合v精品视频| 中文字幕精品一区二区三区精品| 国产精品每日更新在线播放网址| 亚洲黄一区二区三区| 日本不卡的三区四区五区| 国产乱色国产精品免费视频| 成人国产精品免费观看动漫| 欧美性xxxxx极品少妇| 日韩亚洲欧美成人一区| 日本一区二区免费在线观看视频 | 国产欧美日韩亚州综合| 一区在线观看免费| 午夜不卡av在线| 国产高清亚洲一区| 欧美亚洲国产一区二区三区va| 91精品国产欧美一区二区18| 国产午夜精品久久| 亚洲成人高清在线| 国产成人99久久亚洲综合精品| 色狠狠桃花综合| 久久这里只有精品首页| 一区二区三区在线观看国产 | 在线视频一区二区三区| 精品久久国产字幕高潮| 亚洲精品免费电影| 国产精品一线二线三线精华| 欧美亚洲国产bt| 国产欧美日韩三级| 日本不卡视频在线| 在线亚洲人成电影网站色www| 日韩欧美国产精品一区| 亚洲综合一二三区| 国产精品影视网| 69av一区二区三区| 亚洲欧美日韩系列| 国产传媒欧美日韩成人| 51精品秘密在线观看| 亚洲三级小视频| 国产老肥熟一区二区三区| 69久久99精品久久久久婷婷| 亚洲欧美aⅴ...| 国产精品一区专区| 欧美一级二级三级蜜桃| 亚洲国产精品人人做人人爽| 国产成人午夜高潮毛片| 欧美一区二区免费视频| 一区二区三区免费在线观看| 成人av网址在线观看| 久久综合成人精品亚洲另类欧美 | 丁香桃色午夜亚洲一区二区三区 | 亚洲欧美日韩在线| 国产成人自拍在线| 精品捆绑美女sm三区| 亚洲一级电影视频| 国产精品嫩草影院av蜜臀| 国产在线精品免费av| 91精品国产一区二区三区| 亚洲永久免费视频| 在线观看成人小视频| 最近日韩中文字幕| 成人h版在线观看| 国产精品视频第一区| 盗摄精品av一区二区三区| 国产欧美一区二区三区沐欲| 国产另类ts人妖一区二区| 久久嫩草精品久久久精品一| 裸体在线国模精品偷拍| 日韩精品一区二区三区在线| 欧美a一区二区| 日韩一卡二卡三卡| 麻豆精品一区二区三区| 日韩女优制服丝袜电影| 九九久久精品视频| 久久综合国产精品| 国产成人小视频| 国产精品久久久一本精品| 成人av午夜电影| 亚洲蜜臀av乱码久久精品| 91久久精品一区二区二区| 一区二区三区四区五区视频在线观看| 一本久道中文字幕精品亚洲嫩| 亚洲免费毛片网站| 欧美福利电影网| 美脚の诱脚舐め脚责91| 精品国产乱码久久久久久蜜臀| 精品一区二区三区视频在线观看| 2022国产精品视频| 不卡一区二区三区四区| 亚洲美女视频在线观看| 在线电影一区二区三区| 精品一区二区三区欧美| 日本一区二区三区国色天香| 91麻豆视频网站| 五月婷婷综合激情| www亚洲一区| 99综合影院在线| 亚洲va欧美va国产va天堂影院| 欧美一区二区黄色| 国产成人亚洲综合a∨猫咪| 亚洲天堂av老司机| 欧美日韩精品一区二区| 九九国产精品视频| 国产精品网友自拍| 欧美性猛片aaaaaaa做受| 久久国产精品99久久久久久老狼 | 2021久久国产精品不只是精品| 国产suv一区二区三区88区| 亚洲精品国产无套在线观| 9191精品国产综合久久久久久| 精品一区二区综合| 亚洲色欲色欲www| 91精品免费观看| 成人app软件下载大全免费| 亚洲一区二区在线视频| 精品区一区二区| 91在线播放网址| 精品无人区卡一卡二卡三乱码免费卡| 自拍偷拍亚洲激情| 精品蜜桃在线看| 精品视频一区二区三区免费| 国产一区二区91| 亚洲动漫第一页| 中日韩av电影| 日韩欧美国产一区二区在线播放| 9人人澡人人爽人人精品| 七七婷婷婷婷精品国产| 亚洲码国产岛国毛片在线| 精品不卡在线视频| 精品视频1区2区3区| 国产成人在线看| 蜜桃精品视频在线| 亚洲黄色小视频| 国产精品欧美一区二区三区| 日韩一区二区三区视频在线| 在线视频一区二区三区| 国产成人精品免费一区二区| 免费成人av在线播放| 亚洲图片欧美综合|