亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? enc.pod

?? mediastreamer2是開源的網絡傳輸媒體流的庫
?? POD
字號:
=pod=head1 NAMEenc - symmetric cipher routines=head1 SYNOPSISB<openssl enc -ciphername>[B<-in filename>][B<-out filename>][B<-pass arg>][B<-e>][B<-d>][B<-a>][B<-A>][B<-k password>][B<-kfile filename>][B<-K key>][B<-iv IV>][B<-p>][B<-P>][B<-bufsize number>][B<-nopad>][B<-debug>]=head1 DESCRIPTIONThe symmetric cipher commands allow data to be encrypted or decryptedusing various block and stream ciphers using keys based on passwordsor explicitly provided. Base64 encoding or decoding can also be performedeither by itself or in addition to the encryption or decryption.=head1 OPTIONS=over 4=item B<-in filename>the input filename, standard input by default.=item B<-out filename>the output filename, standard output by default.=item B<-pass arg>the password source. For more information about the format of B<arg>see the B<PASS PHRASE ARGUMENTS> section in L<openssl(1)|openssl(1)>.=item B<-salt>use a salt in the key derivation routines. This option should B<ALWAYS>be used unless compatibility with previous versions of OpenSSL or SSLeayis required. This option is only present on OpenSSL versions 0.9.5 orabove.=item B<-nosalt>don't use a salt in the key derivation routines. This is the default forcompatibility with previous versions of OpenSSL and SSLeay.=item B<-e>encrypt the input data: this is the default.=item B<-d>decrypt the input data.=item B<-a>base64 process the data. This means that if encryption is taking placethe data is base64 encoded after encryption. If decryption is set thenthe input data is base64 decoded before being decrypted.=item B<-A>if the B<-a> option is set then base64 process the data on one line.=item B<-k password>the password to derive the key from. This is for compatibility with previousversions of OpenSSL. Superseded by the B<-pass> argument.=item B<-kfile filename>read the password to derive the key from the first line of B<filename>.This is for compatibility with previous versions of OpenSSL. Superseded bythe B<-pass> argument.=item B<-S salt>the actual salt to use: this must be represented as a string comprised onlyof hex digits.=item B<-K key>the actual key to use: this must be represented as a string comprised onlyof hex digits. If only the key is specified, the IV must additionally specifiedusing the B<-iv> option. When both a key and a password are specified, thekey given with the B<-K> option will be used and the IV generated from thepassword will be taken. It probably does not make much sense to specifyboth key and password.=item B<-iv IV>the actual IV to use: this must be represented as a string comprised onlyof hex digits. When only the key is specified using the B<-K> option, theIV must explicitly be defined. When a password is being specified usingone of the other options, the IV is generated from this password.=item B<-p>print out the key and IV used.=item B<-P>print out the key and IV used then immediately exit: don't do any encryptionor decryption.=item B<-bufsize number>set the buffer size for I/O=item B<-nopad>disable standard block padding=item B<-debug>debug the BIOs used for I/O.=back=head1 NOTESThe program can be called either as B<openssl ciphername> orB<openssl enc -ciphername>.A password will be prompted for to derive the key and IV if necessary.The B<-salt> option should B<ALWAYS> be used if the key is being derivedfrom a password unless you want compatibility with previous versions ofOpenSSL and SSLeay.Without the B<-salt> option it is possible to perform efficient dictionaryattacks on the password and to attack stream cipher encrypted data. The reasonfor this is that without the salt the same password always generates the sameencryption key. When the salt is being used the first eight bytes of theencrypted data are reserved for the salt: it is generated at random whenencrypting a file and read from the encrypted file when it is decrypted.Some of the ciphers do not have large keys and others have securityimplications if not used correctly. A beginner is advised to just usea strong block cipher in CBC mode such as bf or des3.All the block ciphers normally use PKCS#5 padding also known as standard blockpadding: this allows a rudimentary integrity or password check to beperformed. However since the chance of random data passing the test isbetter than 1 in 256 it isn't a very good test.If padding is disabled then the input data must be a multiple of the cipherblock length.All RC2 ciphers have the same key and effective key length.Blowfish and RC5 algorithms use a 128 bit key.=head1 SUPPORTED CIPHERS base64             Base 64 bf-cbc             Blowfish in CBC mode bf                 Alias for bf-cbc bf-cfb             Blowfish in CFB mode bf-ecb             Blowfish in ECB mode bf-ofb             Blowfish in OFB mode cast-cbc           CAST in CBC mode cast               Alias for cast-cbc cast5-cbc          CAST5 in CBC mode cast5-cfb          CAST5 in CFB mode cast5-ecb          CAST5 in ECB mode cast5-ofb          CAST5 in OFB mode des-cbc            DES in CBC mode des                Alias for des-cbc des-cfb            DES in CBC mode des-ofb            DES in OFB mode des-ecb            DES in ECB mode des-ede-cbc        Two key triple DES EDE in CBC mode des-ede            Two key triple DES EDE in ECB mode des-ede-cfb        Two key triple DES EDE in CFB mode des-ede-ofb        Two key triple DES EDE in OFB mode des-ede3-cbc       Three key triple DES EDE in CBC mode des-ede3           Three key triple DES EDE in ECB mode des3               Alias for des-ede3-cbc des-ede3-cfb       Three key triple DES EDE CFB mode des-ede3-ofb       Three key triple DES EDE in OFB mode desx               DESX algorithm. idea-cbc           IDEA algorithm in CBC mode idea               same as idea-cbc idea-cfb           IDEA in CFB mode idea-ecb           IDEA in ECB mode idea-ofb           IDEA in OFB mode rc2-cbc            128 bit RC2 in CBC mode rc2                Alias for rc2-cbc rc2-cfb            128 bit RC2 in CFB mode rc2-ecb            128 bit RC2 in ECB mode rc2-ofb            128 bit RC2 in OFB mode rc2-64-cbc         64 bit RC2 in CBC mode rc2-40-cbc         40 bit RC2 in CBC mode rc4                128 bit RC4 rc4-64             64 bit RC4 rc4-40             40 bit RC4 rc5-cbc            RC5 cipher in CBC mode rc5                Alias for rc5-cbc rc5-cfb            RC5 cipher in CFB mode rc5-ecb            RC5 cipher in ECB mode rc5-ofb            RC5 cipher in OFB mode=head1 EXAMPLESJust base64 encode a binary file: openssl base64 -in file.bin -out file.b64Decode the same file openssl base64 -d -in file.b64 -out file.bin Encrypt a file using triple DES in CBC mode using a prompted password: openssl des3 -salt -in file.txt -out file.des3 Decrypt a file using a supplied password: openssl des3 -d -salt -in file.des3 -out file.txt -k mypasswordEncrypt a file then base64 encode it (so it can be sent via mail for example)using Blowfish in CBC mode: openssl bf -a -salt -in file.txt -out file.bfBase64 decode a file then decrypt it: openssl bf -d -salt -a -in file.bf -out file.txtDecrypt some data using a supplied 40 bit RC4 key: openssl rc4-40 -in file.rc4 -out file.txt -K 0102030405=head1 BUGSThe B<-A> option when used with large files doesn't work properly.There should be an option to allow an iteration count to be included.The B<enc> program only supports a fixed number of algorithms withcertain parameters. So if, for example, you want to use RC2 with a76 bit key or RC4 with an 84 bit key you can't use this program.=cut

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
精品一区二区三区免费观看| 91.麻豆视频| 欧美女孩性生活视频| 久久精品视频网| 日韩精彩视频在线观看| 波多野结衣在线一区| 日韩一区二区三| 亚洲一二三四久久| 成人av在线播放网址| 久久久久久久久久久久电影| 午夜电影网一区| 91国产丝袜在线播放| 国产精品白丝在线| 国产原创一区二区| 欧美大肚乱孕交hd孕妇| 亚洲成a人片综合在线| 91久久一区二区| 国产三级精品三级| 国产乱码精品1区2区3区| 日韩精品中文字幕一区二区三区| 亚洲一区二区3| 欧美亚洲国产bt| 亚洲欧美日韩国产综合在线| 成人午夜av电影| 久久综合色综合88| 精品一二三四在线| 日韩欧美色综合| 麻豆久久一区二区| 91精品国产麻豆国产自产在线| 亚洲综合丁香婷婷六月香| 色狠狠色噜噜噜综合网| 亚洲乱码一区二区三区在线观看| www..com久久爱| 中文字幕日韩一区| 91视频在线看| 一区二区三区91| 欧美日韩欧美一区二区| 亚洲6080在线| 精品日韩欧美在线| 精品一区二区三区在线播放| 精品国产一区久久| 国产精品综合在线视频| 日本一区二区动态图| 欧美日韩成人在线| 日韩在线卡一卡二| 精品捆绑美女sm三区| 国产精品一区二区不卡| 国产午夜久久久久| 色哟哟国产精品| 日韩国产精品91| 欧美精品一区二区蜜臀亚洲| 国产一区二区三区综合| 中文字幕av一区 二区| 色呦呦网站一区| 日韩精品一区第一页| 精品国产乱码久久久久久1区2区| 国产一区二区三区免费观看| 国产精品国产成人国产三级 | 奇米777欧美一区二区| 欧美一区二区三区四区五区 | 91在线免费播放| 一区二区三区国产精品| 日韩一级完整毛片| 成人av免费观看| 偷拍日韩校园综合在线| 五月激情六月综合| 26uuu亚洲综合色| 91视视频在线直接观看在线看网页在线看 | 国产一区二区调教| 樱花影视一区二区| 精品国产免费人成电影在线观看四季| 国产激情一区二区三区四区| 一片黄亚洲嫩模| 久久久精品免费观看| 欧美性受极品xxxx喷水| 紧缚奴在线一区二区三区| 亚洲图片你懂的| 精品国产91久久久久久久妲己| 国产69精品久久久久毛片 | 国产精品不卡一区| 日韩一区二区三区在线| caoporn国产一区二区| 天天av天天翘天天综合网色鬼国产| 亚洲精品在线观看视频| 欧美视频完全免费看| 国产成人午夜电影网| 丝袜美腿成人在线| 欧美国产日韩精品免费观看| 欧美日韩亚洲不卡| jizzjizzjizz欧美| 黄色小说综合网站| 午夜欧美视频在线观看| 国产亚洲欧美日韩日本| 欧美一区在线视频| 欧美综合在线视频| 一本大道久久精品懂色aⅴ| 九色综合狠狠综合久久| 亚洲aⅴ怡春院| 亚洲一二三四区| 亚洲摸摸操操av| 中文文精品字幕一区二区| 26uuu精品一区二区三区四区在线| 欧美日韩黄色一区二区| 91免费版在线| www.欧美亚洲| 丰满少妇在线播放bd日韩电影| 国产美女视频一区| 久久成人18免费观看| 婷婷综合在线观看| 亚洲动漫第一页| 亚洲大型综合色站| 午夜欧美电影在线观看| 亚洲超碰97人人做人人爱| 亚洲宅男天堂在线观看无病毒| 亚洲激情六月丁香| 亚洲欧美视频一区| 一区二区三区不卡视频在线观看| 亚洲视频一区二区在线| 亚洲精品中文在线| 亚洲自拍偷拍综合| 亚洲aaa精品| 久久精品久久久精品美女| 美女任你摸久久| 国产一区二区在线免费观看| 韩国一区二区在线观看| 国产精品白丝jk白祙喷水网站| 高清不卡一二三区| 97成人超碰视| 欧美日韩国产天堂| 精品欧美一区二区久久| 久久久电影一区二区三区| 国产精品伦理一区二区| 一区二区三区四区蜜桃| 亚洲gay无套男同| 久久电影网电视剧免费观看| 国产激情91久久精品导航 | 中文字幕中文字幕一区| 亚洲视频免费在线观看| 亚洲黄色av一区| 日本女人一区二区三区| 黑人精品欧美一区二区蜜桃 | 极品瑜伽女神91| www.欧美日韩| 4438成人网| 国产欧美一区二区精品性色超碰 | 欧美激情自拍偷拍| 亚洲色图欧洲色图| 蜜臀va亚洲va欧美va天堂 | 在线观看日韩电影| 精品免费一区二区三区| 国产精品国产三级国产三级人妇| 天天爽夜夜爽夜夜爽精品视频| 激情欧美一区二区| 91久久奴性调教| 久久综合久久综合九色| 一区二区三区电影在线播| 国产剧情一区二区三区| 国产欧美一区二区精品性| 一区二区三区中文字幕电影 | 精品久久久久久久人人人人传媒| 欧美精彩视频一区二区三区| 亚洲成在人线在线播放| 国产成人久久精品77777最新版本 国产成人鲁色资源国产91色综 | 久久久三级国产网站| 亚洲精品国产无套在线观| 国产中文字幕一区| 欧美老肥妇做.爰bbww| 国产欧美日本一区视频| 五月天久久比比资源色| 99精品欧美一区| 亚洲精品在线观看网站| 午夜精品福利在线| 91网站视频在线观看| 久久综合资源网| 日韩黄色片在线观看| 91啪亚洲精品| 国产欧美视频一区二区三区| 天堂一区二区在线| 在线视频综合导航| 日本一区二区成人| 国产精品一线二线三线精华| 3d动漫精品啪啪一区二区竹菊 | 日韩欧美激情一区| 亚洲一级二级三级在线免费观看| 成人免费毛片嘿嘿连载视频| 2021中文字幕一区亚洲| 免费观看一级特黄欧美大片| 欧美日韩国产高清一区二区三区| 国产精品视频九色porn| 国产福利一区二区三区在线视频| 精品欧美一区二区久久| 麻豆精品久久精品色综合| 欧美色图片你懂的| 亚洲自拍另类综合| 欧美私模裸体表演在线观看| 一区二区三区四区不卡在线 | 成人激情开心网| 国产午夜精品一区二区 | 麻豆免费看一区二区三区| 91精品国产欧美一区二区|