亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rc2.java

?? jpeg2000編解碼
?? JAVA
?? 第 1 頁 / 共 2 頁
字號:
// $Id: RC2.java,v 1.1.1.1 2002/08/27 12:32:10 grosbois Exp $//// $Log: RC2.java,v $// Revision 1.1.1.1  2002/08/27 12:32:10  grosbois// Add cryptix 3.2//// Revision 1.4  2000/08/17 11:40:51  edwin// java.* -> xjava.*//// Revision 1.3  1999/07/21 02:38:05  edwin// Fixed RC2//// Revision 1.2  1997/11/29 04:42:56  hopwood// + Changes to engineUpdate method.//// + Added native API.//// Revision 1.1  1997/11/08 14:39:19  raif// *** empty log message ***//// Revision 0.1.1  1997/10/27 22:19:26  raif// + Original version.//// $Endlog$/* * Ported to Java from C code by Peter Gutmann (pgut01@cs.auckland.ac.nz) * and Eric Young (eay@mincom.oz.au). * * Copyright (c) 1997 Systemics Ltd * on behalf of the Cryptix Development Team. All rights reserved. */package cryptix.provider.cipher;import java.io.PrintWriter;import xjava.security.Cipher;import java.security.Key;import java.security.KeyException;import xjava.security.SymmetricCipher;import cryptix.util.core.Debug;import cryptix.CryptixException;/**     * A subclass of Cipher to implement the RC2 (TM) block cipher algorithm in * Java. * <p> * The source code (C version) from which this port was done, and (most of) * the programming notes, are by P. Gutmann (pgut01@cs.auckland.ac.nz) -- as * obtained from Usenet. * <p> * Eric Young (eay@mincom.oz.au) implementation, also based on Gutmann's * work, and included in Eric's colossal SSL library ver 0.6.6 14 Jan 1997, * was also used for the initial key data and the computation of the session * key schedule. Code to tailor the session key for a specified length in * bits is included in this Java implementation but is crippled (commented * out). The current code behaves as if the session key is fixed at 1024-bit. * <p> * The RC2 algorithm is word (16-bit entity) oriented, operating on a block of * 64 bits (or 8 Java bytes) divided into four words, with a key table of 64 * words. * <p> * RC2 (TM) was designed by Ron Rivest, and was previously a trade secret of * RSA Data Security, Inc. The algorithm has since been published as an RFC * [reference?]. The name "RC2" is a trademark of RSA Data Security, Inc. * <p> * <b>Copyright</b> &copy; 1997 * <a href="http://www.systemics.com/">Systemics Ltd</a> on behalf of the * <a href="http://www.systemics.com/docs/cryptix/">Cryptix Development Team</a>. * <br>All rights reserved. * <p> * <b>$Revision: 1.1.1.1 $</b> * @author  Raif S. Naffah */public final class RC2extends Cipherimplements SymmetricCipher{// Debugging methods and vars.//...........................................................................    private static final boolean DEBUG = Debug.GLOBAL_DEBUG;    private static final boolean DEBUG_SLOW = Debug.GLOBAL_DEBUG_SLOW;    private static final int debuglevel = DEBUG ? Debug.getLevel("RC2") : 0;    private static final PrintWriter err = DEBUG ? Debug.getOutput() : null;    private static void debug(String s) { err.println("RC2: " + s); }// Native library linking methods and vars.//...........................................................................    private static NativeLink linkStatus = new NativeLink("RC2", 2, 3);    /**     * Gets an object representing the native linking status of this class.     */    public static cryptix.util.core.LinkStatus getLinkStatus() { return linkStatus; }    /**     * The native reference to the current native key schedule     * structure. Defaults to 0 but is set by native code after a     * successful call to native_init().     * <p>     * IMPORTANT: Do not change the name of this variable without     * duplicating the same in the native code.     */    private long native_cookie;    /**     * This object must be synchronized on while calling any native instance     * method. It is null if the native code is not being used (e.g. the     * library did not load successfully, or the user disabled its use in     * the properties file).     */    private Object native_lock; // defaults to null    private void link() {        synchronized(linkStatus) {            try {                if (linkStatus.attemptLoad()) {                    linkStatus.checkVersion(getLibMajorVersion(), getLibMinorVersion());                    linkStatus.check(native_clinit());                }                if (linkStatus.useNative()) {                    linkStatus.check(native_init());                    native_lock = new Object();                }            } catch (UnsatisfiedLinkError e) {                linkStatus.fail(e);if (DEBUG && debuglevel > 2) debug(e.getMessage());            }if (DEBUG && debuglevel > 2) debug("Using native library? " + (native_lock != null));        }    }// Native support API//...........................................................................    // The methods that get the library version.    private native static int getLibMajorVersion();    private native static int getLibMinorVersion();    /**     * Static initialization and self-test method for the native code.     *     * @return a string if an error occurred or null otherwise.     */    private native String native_clinit();    /**     * Initializes the native state for this cipher object and allocates     * needed native storage for the internal key schedule. A reference     * to the newly allocated space, if successful, is stored in the     * instance variable <code>native_cookie</code>.     *     * @return a string if an error occurred or null otherwise.     */    private native String native_init();    /**     * This function expands the user key to an internal form.     *     * @param  cookie   a valid reference to the native key structure. This     *                  value is set by the native library upon return from     *                  native_init() (see link() method at the top).     * @param  userKey  a byte array representing the user key     * @return an error String, or null if there was no error     */    private native String native_ks(long cookie, byte[] userKey);    /**     * Encrypts/decrypts a data block.     * <p>     * FUTURE: possibly change this to be able to process more than one block,     * to reduce native method call overhead.     * <p>     * SECURITY: the caller <strong>must</strong> ensure that:     * <ul>     *   <li> <code>in != null</code>     *   <li> <code>out != null</code>     *   <li> <code>inOffset >= 0</code>     *   <li> <code>(long)inOffset + BLOCK_LENGTH <= in.length</code>     *   <li> <code>outOffset >= 0</code>     *   <li> <code>(long)outOffset + BLOCK_LENGTH <= out.length</code>     * </ul>     *     * @param  cookie       a valid reference to the native key structure. This     *                      value is set by the native library upon return from     *                      native_init() (see link() method at the top).     * @param  in           input array containing data to encrypt or decrypt     *                      depending on the value of the encrypt boolean parameter.     * @param  inOffset     index of where we should start reading from input.     * @param  out          output array containing data decrypted or encrypted     *                      depending on the value of the encrypt boolean parameter.     * @param  outOffset    index of where we should start writing to output.     * @param  encrypt      if true then encrypt, otherwise decrypt.     * @return the number of bytes crypted (always BLOCK_LENGTH) or 0 if an error     *                      occurred.     */    private native int native_crypt (long cookie, byte[] in, int inOffset,                                     byte[] out, int outOffset, boolean encrypt);    /**     * Finalizes the native state for this object.     *     * @return a string if an error occurred or null otherwise.     */    private native String native_finalize();// Variables and constants//............................................................................    /**     * RC2 uses a single 256-byte S-box derived from the ciphertext contents     * of Beale Cipher No.1 XOR'd with a one-time pad. The Beale Ciphers     * predate modern cryptography by enough time that there should be no     * concerns about trapdoors hidden in the data. They have been published     * widely, and the S-box can be easily recreated from the one-time pad     * values and the Beale Cipher data taken from a standard source. To     * initialise the S-box:     * <pre>     *   for i = 0 to 255 do     *     sBox[ i ] = ( beale[ i ] mod 256 ) ^ pad[ i ];     * </pre>     * <p>     * The following table gives the computed values based on the above.     * Thanks Eric :))     */    private static final int[] S_BOX = {        0xD9, 0x78, 0xF9, 0xC4, 0x19, 0xDD, 0xB5, 0xED,        0x28, 0xE9, 0xFD, 0x79, 0x4A, 0xA0, 0xD8, 0x9D,        0xC6, 0x7E, 0x37, 0x83, 0x2B, 0x76, 0x53, 0x8E,        0x62, 0x4C, 0x64, 0x88, 0x44, 0x8B, 0xFB, 0xA2,        0x17, 0x9A, 0x59, 0xF5, 0x87, 0xB3, 0x4F, 0x13,        0x61, 0x45, 0x6D, 0x8D, 0x09, 0x81, 0x7D, 0x32,        0xBD, 0x8F, 0x40, 0xEB, 0x86, 0xB7, 0x7B, 0x0B,        0xF0, 0x95, 0x21, 0x22, 0x5C, 0x6B, 0x4E, 0x82,        0x54, 0xD6, 0x65, 0x93, 0xCE, 0x60, 0xB2, 0x1C,        0x73, 0x56, 0xC0, 0x14, 0xA7, 0x8C, 0xF1, 0xDC,        0x12, 0x75, 0xCA, 0x1F, 0x3B, 0xBE, 0xE4, 0xD1,        0x42, 0x3D, 0xD4, 0x30, 0xA3, 0x3C, 0xB6, 0x26,        0x6F, 0xBF, 0x0E, 0xDA, 0x46, 0x69, 0x07, 0x57,        0x27, 0xF2, 0x1D, 0x9B, 0xBC, 0x94, 0x43, 0x03,        0xF8, 0x11, 0xC7, 0xF6, 0x90, 0xEF, 0x3E, 0xE7,        0x06, 0xC3, 0xD5, 0x2F, 0xC8, 0x66, 0x1E, 0xD7,        0x08, 0xE8, 0xEA, 0xDE, 0x80, 0x52, 0xEE, 0xF7,        0x84, 0xAA, 0x72, 0xAC, 0x35, 0x4D, 0x6A, 0x2A,        0x96, 0x1A, 0xD2, 0x71, 0x5A, 0x15, 0x49, 0x74,        0x4B, 0x9F, 0xD0, 0x5E, 0x04, 0x18, 0xA4, 0xEC,        0xC2, 0xE0, 0x41, 0x6E, 0x0F, 0x51, 0xCB, 0xCC,        0x24, 0x91, 0xAF, 0x50, 0xA1, 0xF4, 0x70, 0x39,        0x99, 0x7C, 0x3A, 0x85, 0x23, 0xB8, 0xB4, 0x7A,        0xFC, 0x02, 0x36, 0x5B, 0x25, 0x55, 0x97, 0x31,        0x2D, 0x5D, 0xFA, 0x98, 0xE3, 0x8A, 0x92, 0xAE,        0x05, 0xDF, 0x29, 0x10, 0x67, 0x6C, 0xBA, 0xC9,        0xD3, 0x00, 0xE6, 0xCF, 0xE1, 0x9E, 0xA8, 0x2C,        0x63, 0x16, 0x01, 0x3F, 0x58, 0xE2, 0x89, 0xA9,        0x0D, 0x38, 0x34, 0x1B, 0xAB, 0x33, 0xFF, 0xB0,        0xBB, 0x48, 0x0C, 0x5F, 0xB9, 0xB1, 0xCD, 0x2E,        0xC5, 0xF3, 0xDB, 0x47, 0xE5, 0xA5, 0x9C, 0x77,        0x0A, 0xA6, 0x20, 0x68, 0xFE, 0x7F, 0xC1, 0xAD    };    /** The session key. We're using the lower 16 bits of each int only. */    private int[] sKey = new int[64];    /** The block size, in bytes, of this cipher. */    public static final int BLOCK_SIZE = 8;// Constructor, finalizer, and clone()//............................................................................    /**     * Constructs an RC2 cipher object, in the UNINITIALIZED state.

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲福利视频三区| 成人黄色片在线观看| 51午夜精品国产| 欧美电影一区二区三区| 日本va欧美va瓶| 性欧美疯狂xxxxbbbb| 日韩激情av在线| 欧美综合一区二区三区| 91麻豆精品国产91久久久资源速度 | 亚洲激情欧美激情| 精品久久人人做人人爽| 久久久久久亚洲综合影院红桃| 欧美综合一区二区三区| 成人av网在线| 精油按摩中文字幕久久| 欧美一级黄色片| 日韩亚洲欧美成人一区| 99精品欧美一区二区蜜桃免费| 91麻豆国产精品久久| 99精品国产热久久91蜜凸| 国产中文字幕精品| 日韩福利电影在线观看| 免费一级片91| av资源网一区| 日韩欧美在线网站| 久久久国产综合精品女国产盗摄| 日本一区二区不卡视频| 欧美在线观看一区二区| 免费成人你懂的| 日韩精品一区二区三区swag| 国产福利精品一区二区| 午夜精品久久久久久久久久久| 精品999久久久| 欧洲精品在线观看| av在线不卡免费看| 中文字幕一区二区三区在线观看 | 欧美成人bangbros| 蜜桃av一区二区三区| 国产精品久久久久影视| 亚洲综合偷拍欧美一区色| 在线播放一区二区三区| 精品亚洲欧美一区| 日韩欧美成人一区| 欧美精品自拍偷拍| 粉嫩高潮美女一区二区三区| 欧美精品乱码久久久久久| 欧美电影在哪看比较好| 久久99在线观看| 678五月天丁香亚洲综合网| 亚洲国产成人91porn| av午夜精品一区二区三区| 日韩高清在线一区| 午夜视频一区二区三区| av一二三不卡影片| 国产亚洲欧美在线| 欧美日韩一区二区三区在线| 国产福利一区二区三区视频在线 | 欧美精品在线观看一区二区| 色综合久久中文综合久久牛| 日韩精品一区二区三区三区免费| 国产综合久久久久久鬼色| 精品国产乱码久久久久久老虎 | 国产精品二三区| 成人免费视频网站在线观看| 成人黄色a**站在线观看| 亚洲黄色在线视频| 国产精品家庭影院| 国产精品久久久久久久浪潮网站| 日本一区中文字幕| 国产高清精品在线| 久久精品99国产精品日本| 7777精品伊人久久久大香线蕉 | 欧美丝袜丝nylons| 在线亚洲人成电影网站色www| 国产精品国产三级国产普通话99| 精品免费视频一区二区| 亚洲色图欧美在线| 中文字幕在线不卡视频| 国产精品免费av| 亚洲成a天堂v人片| 精品国产一区二区三区不卡| 成人免费视频一区二区| 久久国产日韩欧美精品| 国产一区二区三区最好精华液| 国产尤物一区二区在线| 欧美极品aⅴ影院| 一区二区三区不卡在线观看| 久久精品国产在热久久| 图片区日韩欧美亚洲| 国产精品久久三| 狠狠色丁香久久婷婷综| 精品免费一区二区三区| 国产日韩综合av| 国产精品日韩成人| 国产精品你懂的| 成人一区二区三区视频在线观看| 亚洲最大的成人av| 亚洲地区一二三色| 欧美一区二区女人| 日韩欧美的一区| 国产欧美精品国产国产专区| 在线中文字幕一区二区| 亚洲另类一区二区| 久久综合国产精品| 亚洲国产精品尤物yw在线观看| 欧美日韩国产a| av在线不卡免费看| 国产一区二区精品久久| 天堂精品中文字幕在线| 精品在线观看免费| 欧美吞精做爰啪啪高潮| 精品国产一区二区在线观看| 久久精品免视看| 国产午夜精品一区二区三区四区| 亚洲精品日日夜夜| 精品综合久久久久久8888| 色哟哟国产精品| 中文字幕不卡在线播放| 全国精品久久少妇| 欧美三级三级三级爽爽爽| 亚洲视频一区二区免费在线观看 | 久久精品国产第一区二区三区| 99久久99精品久久久久久 | 韩国中文字幕2020精品| 69成人精品免费视频| 日韩vs国产vs欧美| 91免费版在线| 欧美影视一区在线| 国产精品人成在线观看免费| 久久成人免费日本黄色| 欧美一区二区三区爱爱| 国产尤物一区二区在线| 久久精品综合网| 国产揄拍国内精品对白| 日本一区二区成人在线| 91小视频免费观看| 日韩中文字幕av电影| 欧美裸体bbwbbwbbw| 国产在线精品免费| 亚洲视频一区在线观看| 日韩写真欧美这视频| 国产精品一区二区不卡| 欧美激情一区二区三区四区| 老司机一区二区| 精品99999| 日本精品免费观看高清观看| 精品一区二区三区欧美| 亚洲另类春色国产| 6080日韩午夜伦伦午夜伦| 懂色av一区二区三区免费观看| 日韩美女啊v在线免费观看| 成人在线综合网| 欧美肥胖老妇做爰| 国产香蕉久久精品综合网| 一区二区三区中文字幕电影| 欧美体内she精视频| 91精彩视频在线观看| 天堂资源在线中文精品| 久久久99精品免费观看| 欧美性生活大片视频| 国产sm精品调教视频网站| 久久精品国内一区二区三区| 亚洲国产精品久久久久婷婷884 | 精品国产百合女同互慰| 在线亚洲人成电影网站色www| 成年人午夜久久久| 久久成人免费网| 美女网站色91| 激情文学综合网| 老司机精品视频一区二区三区| 亚洲美女少妇撒尿| 亚洲男女毛片无遮挡| 亚洲激情五月婷婷| 亚洲另类在线视频| 日韩福利电影在线观看| 麻豆精品一区二区av白丝在线| 日韩二区三区在线观看| 精油按摩中文字幕久久| 国产suv精品一区二区883| 狠狠色综合色综合网络| 成人a免费在线看| 一本久道久久综合中文字幕| 91婷婷韩国欧美一区二区| 欧美乱熟臀69xxxxxx| 日韩免费观看高清完整版| 国产欧美一区二区精品性| 国产精品国产三级国产aⅴ原创| 亚洲夂夂婷婷色拍ww47| 麻豆91在线观看| 在线观看日韩精品| 欧美一区二区三区视频在线| 亚洲视频免费在线| 美日韩一区二区三区| 91女人视频在线观看| 久久久久久免费| 夜夜亚洲天天久久| 国产99精品视频| 日韩精品一区二区三区视频在线观看| 中文字幕中文乱码欧美一区二区| 蜜臀av一级做a爰片久久|