WP7 MD5加密
WP7不支持MD5加密,在网上找了一个实现MD5加密的算法。
//Copyright (c) Microsoft Corporation. All rights reserved.
using System;
using System.Text;
// **************************************************************
//可惜Wp和Sl都不支持MD5了,网上找的
// * Raw implementation of the MD5 hash algorithm
// * from RFC 1321.
// *
// * Written By: Reid Borsuk and Jenny Zheng
// * Copyright (c) Microsoft Corporation. All rights reserved.
// **************************************************************
// Simple struct for the (a,b,c,d) which is used to compute the mesage digest.
struct ABCDStruct
{
public uint A;
public uint B;
public uint C;
public uint D;
}
public sealed class MD5Core
{
//Prevent CSC from adding a default public constructor
private MD5Core() { }
public static byte[] GetHash(string input, Encoding encoding)
{
if (null == input)
throw new System.ArgumentNullException("input", "Unable to calculate hash over null input data");
if (null == encoding)
throw new System.ArgumentNullException("encoding", "Unable to calculate hash over a string without a default encoding. Consider using the GetHash(string) overload to use UTF8 Encoding");
byte[] target = encoding.GetBytes(input);
return GetHash(target);
}
public static byte[] GetHash(string input)
{
return GetHash(input, new UTF8Encoding());
}
public static string GetHashString(byte[] input)
{
if (null == input)
throw new System.ArgumentNullException("input", "Unable to calculate hash over null input data");
string retval = BitConverter.ToString(GetHash(input));
retval = retval.Replace("-", "");
return retval;
}
public static string GetHashString(string input, Encoding encoding)
{
if (null == input)
throw new System.ArgumentNullException("input", "Unable to calculate hash over null input data");
if (null == encoding)
throw new System.ArgumentNullException("encoding", "Unable to calculate hash over a string without a default encoding. Consider using the GetHashString(string) overload to use UTF8 Encoding"); byte[] target = encoding.GetBytes(input);
return GetHashString(target);
}
public static string GetHashString(string input)
{
return GetHashString(input, new UTF8Encoding());
}
public static byte[] GetHash(byte[] input)
{
if (null == input)
throw new System.ArgumentNullException("input", "Unable to calculate hash over null input data");
//Intitial values defined in RFC 1321
ABCDStruct abcd = new ABCDStruct();
abcd.A = 0x67452301;
abcd.B = 0xefcdab89;
abcd.C = 0x98badcfe;
abcd.D = 0x10325476;
//We pass in the input array by block, the final block of data must be handled specialy for padding & length embeding
int startIndex = ;
while (startIndex <= input.Length - )
{
MD5Core.GetHashBlock(input, ref abcd, startIndex);
startIndex += ;
}
// The final data block.
return MD5Core.GetHashFinalBlock(input, startIndex, input.Length - startIndex, abcd, (Int64)input.Length * );
}
internal static byte[] GetHashFinalBlock(byte[] input, int ibStart, int cbSize, ABCDStruct ABCD, Int64 len)
{
byte[] working = new byte[];
byte[] length = BitConverter.GetBytes(len);
//Padding is a single bit 1, followed by the number of 0s required to make size congruent to 448 modulo 512. Step 1 of RFC 1321
//The CLR ensures that our buffer is 0-assigned, we don't need to explicitly set it. This is why it ends up being quicker to just
//use a temporary array rather then doing in-place assignment (5% for small inputs)
Array.Copy(input, ibStart, working, , cbSize);
working[cbSize] = 0x80;
//We have enough room to store the length in this chunk
if (cbSize <= )
{
Array.Copy(length, , working, , );
GetHashBlock(working, ref ABCD, );
}
else //We need an aditional chunk to store the length
{
GetHashBlock(working, ref ABCD, );
//Create an entirely new chunk due to the 0-assigned trick mentioned above, to avoid an extra function call clearing the array
working = new byte[];
Array.Copy(length, , working, , );
GetHashBlock(working, ref ABCD, );
}
byte[] output = new byte[];
Array.Copy(BitConverter.GetBytes(ABCD.A), , output, , );
Array.Copy(BitConverter.GetBytes(ABCD.B), , output, , );
Array.Copy(BitConverter.GetBytes(ABCD.C), , output, , );
Array.Copy(BitConverter.GetBytes(ABCD.D), , output, , );
return output;
}
// Performs a single block transform of MD5 for a given set of ABCD inputs
/* If implementing your own hashing framework, be sure to set the initial ABCD correctly according to RFC 1321:
// A = 0x67452301;
// B = 0xefcdab89;
// C = 0x98badcfe;
// D = 0x10325476;
*/
internal static void GetHashBlock(byte[] input, ref ABCDStruct ABCDValue, int ibStart)
{
uint[] temp = Converter(input, ibStart);
uint a = ABCDValue.A;
uint b = ABCDValue.B;
uint c = ABCDValue.C;
uint d = ABCDValue.D;
a = r1(a, b, c, d, temp[], , 0xd76aa478);
d = r1(d, a, b, c, temp[], , 0xe8c7b756);
c = r1(c, d, a, b, temp[], , 0x242070db);
b = r1(b, c, d, a, temp[], , 0xc1bdceee);
a = r1(a, b, c, d, temp[], , 0xf57c0faf);
d = r1(d, a, b, c, temp[], , 0x4787c62a);
c = r1(c, d, a, b, temp[], , 0xa8304613);
b = r1(b, c, d, a, temp[], , 0xfd469501);
a = r1(a, b, c, d, temp[], , 0x698098d8);
d = r1(d, a, b, c, temp[], , 0x8b44f7af);
c = r1(c, d, a, b, temp[], , 0xffff5bb1);
b = r1(b, c, d, a, temp[], , 0x895cd7be);
a = r1(a, b, c, d, temp[], , 0x6b901122);
d = r1(d, a, b, c, temp[], , 0xfd987193);
c = r1(c, d, a, b, temp[], , 0xa679438e);
b = r1(b, c, d, a, temp[], , 0x49b40821);
a = r2(a, b, c, d, temp[], , 0xf61e2562);
d = r2(d, a, b, c, temp[], , 0xc040b340);
c = r2(c, d, a, b, temp[], , 0x265e5a51);
b = r2(b, c, d, a, temp[], , 0xe9b6c7aa);
a = r2(a, b, c, d, temp[], , 0xd62f105d);
d = r2(d, a, b, c, temp[], , 0x02441453);
c = r2(c, d, a, b, temp[], , 0xd8a1e681);
b = r2(b, c, d, a, temp[], , 0xe7d3fbc8);
a = r2(a, b, c, d, temp[], , 0x21e1cde6);
d = r2(d, a, b, c, temp[], , 0xc33707d6);
c = r2(c, d, a, b, temp[], , 0xf4d50d87);
b = r2(b, c, d, a, temp[], , 0x455a14ed);
a = r2(a, b, c, d, temp[], , 0xa9e3e905);
d = r2(d, a, b, c, temp[], , 0xfcefa3f8);
c = r2(c, d, a, b, temp[], , 0x676f02d9);
b = r2(b, c, d, a, temp[], , 0x8d2a4c8a);
a = r3(a, b, c, d, temp[], , 0xfffa3942);
d = r3(d, a, b, c, temp[], , 0x8771f681);
c = r3(c, d, a, b, temp[], , 0x6d9d6122);
b = r3(b, c, d, a, temp[], , 0xfde5380c);
a = r3(a, b, c, d, temp[], , 0xa4beea44);
d = r3(d, a, b, c, temp[], , 0x4bdecfa9);
c = r3(c, d, a, b, temp[], , 0xf6bb4b60);
b = r3(b, c, d, a, temp[], , 0xbebfbc70);
a = r3(a, b, c, d, temp[], , 0x289b7ec6);
d = r3(d, a, b, c, temp[], , 0xeaa127fa);
c = r3(c, d, a, b, temp[], , 0xd4ef3085);
b = r3(b, c, d, a, temp[], , 0x04881d05);
a = r3(a, b, c, d, temp[], , 0xd9d4d039);
d = r3(d, a, b, c, temp[], , 0xe6db99e5);
c = r3(c, d, a, b, temp[], , 0x1fa27cf8);
b = r3(b, c, d, a, temp[], , 0xc4ac5665);
a = r4(a, b, c, d, temp[], , 0xf4292244);
d = r4(d, a, b, c, temp[], , 0x432aff97);
c = r4(c, d, a, b, temp[], , 0xab9423a7);
b = r4(b, c, d, a, temp[], , 0xfc93a039);
a = r4(a, b, c, d, temp[], , 0x655b59c3);
d = r4(d, a, b, c, temp[], , 0x8f0ccc92);
c = r4(c, d, a, b, temp[], , 0xffeff47d);
b = r4(b, c, d, a, temp[], , 0x85845dd1);
a = r4(a, b, c, d, temp[], , 0x6fa87e4f);
d = r4(d, a, b, c, temp[], , 0xfe2ce6e0);
c = r4(c, d, a, b, temp[], , 0xa3014314);
b = r4(b, c, d, a, temp[], , 0x4e0811a1);
a = r4(a, b, c, d, temp[], , 0xf7537e82);
d = r4(d, a, b, c, temp[], , 0xbd3af235);
c = r4(c, d, a, b, temp[], , 0x2ad7d2bb);
b = r4(b, c, d, a, temp[], , 0xeb86d391);
ABCDValue.A = unchecked(a + ABCDValue.A);
ABCDValue.B = unchecked(b + ABCDValue.B);
ABCDValue.C = unchecked(c + ABCDValue.C);
ABCDValue.D = unchecked(d + ABCDValue.D);
return;
}
//Manually unrolling these equations nets us a 20% performance improvement
private static uint r1(uint a, uint b, uint c, uint d, uint x, int s, uint t)
{
// (b + LSR((a + F(b, c, d) + x + t), s))
//F(x, y, z) ((x & y) | ((x ^ 0xFFFFFFFF) & z))
return unchecked(b + LSR((a + ((b & c) | ((b ^ 0xFFFFFFFF) & d)) + x + t), s));
}
private static uint r2(uint a, uint b, uint c, uint d, uint x, int s, uint t)
{
// (b + LSR((a + G(b, c, d) + x + t), s))
//G(x, y, z) ((x & z) | (y & (z ^ 0xFFFFFFFF)))
return unchecked(b + LSR((a + ((b & d) | (c & (d ^ 0xFFFFFFFF))) + x + t), s));
}
private static uint r3(uint a, uint b, uint c, uint d, uint x, int s, uint t)
{
// (b + LSR((a + H(b, c, d) + k + i), s))
//H(x, y, z) (x ^ y ^ z)
return unchecked(b + LSR((a + (b ^ c ^ d) + x + t), s));
}
private static uint r4(uint a, uint b, uint c, uint d, uint x, int s, uint t)
{
// (b + LSR((a + I(b, c, d) + k + i), s))
//I(x, y, z) (y ^ (x | (z ^ 0xFFFFFFFF)))
return unchecked(b + LSR((a + (c ^ (b | (d ^ 0xFFFFFFFF))) + x + t), s));
}
// Implementation of left rotate
// s is an int instead of a uint becuase the CLR requires the argument passed to >>/<< is of
// type int. Doing the demoting inside this function would add overhead.
private static uint LSR(uint i, int s)
{
return ((i << s) | (i >> ( - s)));
}
//Convert input array into array of UInts
private static uint[] Converter(byte[] input, int ibStart)
{
if (null == input)
throw new System.ArgumentNullException("input", "Unable convert null array to array of uInts"); uint[] result = new uint[]; for (int i = ; i < ; i++)
{
result[i] = (uint)input[ibStart + i * ];
result[i] += (uint)input[ibStart + i * + ] << ;
result[i] += (uint)input[ibStart + i * + ] << ;
result[i] += (uint)input[ibStart + i * + ] << ;
} return result;
}
}
WP7 MD5加密的更多相关文章
- 关于CryptoJS中md5加密以及aes加密的随笔
最近项目中用到了各种加密,其中就包括从没有接触过得aes加密,因此从网上各种查,官方的一种说法: 高级加密标准(英语:Advanced Encryption Standard,缩写:AES),在密码学 ...
- Android数据加密之MD5加密
前言: 项目中无论是密码的存储或者说判断文件是否是同一文件,都会用到MD5算法,今天来总结一下MD5加密算法. 什么是MD5加密? MD5英文全称“Message-Digest Algorithm 5 ...
- android MD5加密
public class MD5Uutils { //MD5加密,32位 public static String MD5(String str) { MessageDige ...
- IOS 杂笔-9 (MD5 加密)
首先是一段对MD5的简介 *出自一位大牛之手* Message Digest Algorithm MD5(中文名为消息摘要算法第五版)为计算机安全领域广泛使用的一种散列函数,用以提供消息的完整性保护 ...
- JS中使用MD5加密
下载 MD5 使用MD5加密的方法:下载md5.js文件,在网页中引用该文件: < script type="text/javascript" src="md5.j ...
- MD5工具类,提供字符串MD5加密、文件MD5值获取(校验)功能
MD5工具类,提供字符串MD5加密(校验).文件MD5值获取(校验)功能 : package com.yzu.utils; import java.io.File; import java.io.Fi ...
- MD5 加密
字符串加密 // 1. 准备好一个字符串 NSString *string = @"asdasfaf"; // 2. MD5加密是基于C语言的. 所以要把这个字符串转化成C的字符串 ...
- MD5加密的Java实现
在各种应用系统中,如果需要设置账户,那么就会涉及到储存用户账户信息的问题,为了保证所储存账户信息的安全,通常会采用MD5加密的方式来,进行储存.首先,简单得介绍一下,什么是MD5加密. MD5的全称是 ...
- 【ORACLE】MD5加密
今天乌干达充值卡入库时,发现有资源已经存在的异常, 异常原因经过核实是由于卡资源密码在库中已经存在, 为进一步查找存在的原因, 因此需要对导入文件密码的MD5 加密, 通过MD5加密后的字符串 ...
随机推荐
- 常量折叠 const folding
http://bbs.byr.cn/#!article/CPP/86336?p=1 下列代码给出输出结果: #include"stdafx.h" #include <iost ...
- Guid和Int还有Double、Date的ToString方法的常见格式
Guid的常见格式: 1.Guid.NewGuid().ToString("N") 结果为: 38bddf48f43c48588e0d78761eaa1ce6 2.Gu ...
- Codeforces Round #261 (Div. 2)
第一场难得DIV2简单+AK人数多: E:给出一张图,求最多的边数,满足:在这个边的集合中后面的边的权值大于前面的边; 思路:我们将图按权值排列,以为只可能边权值小的跟新权值大的所以对于一条边我们只跟 ...
- HDU 1316 How Many Fibs?(java,简单题,大数)
题目 /** * compareTo:根据该数值是小于.等于.或大于 val 返回 -1.0 或 1: public int compareTo(BigInteger val) 将此 BigInteg ...
- POJ 2186
Popular Cows Time Limit: 2000MS Memory Limit: 65536K Total Submissions: 22189 Accepted: 9076 Des ...
- POJ 1504
#include<iostream> using namespace std; int main() { int num; cin>>num; while(num--){ in ...
- Android的事件处理机制详解(二)-----基于监听的事件处理机制
基于监听的事件处理机制 前言: 我们开发的app更多的时候是需要与用户的交互----即对用户的操作进行响应 这就涉及到了android的事件处理机制; android给我们提供了两套功能强大的处理机制 ...
- Android activity属性
android:allowTaskReparenting 是否允许activity更换从属的任务,比如从短信息任务 切换到浏览器任务. android:alwaysRetainTaskState 是否 ...
- POJ 1300 Door Man(欧拉回路的判定)
题目链接 题意 : 庄园有很多房间,编号从0到n-1,能否找到一条路径经过所有开着的门,并且使得通过门之后就把门关上,关上的再也不打开,最后能回到编号为0的房间. 思路 : 这就是一个赤裸裸的判断欧拉 ...
- IEEE 802.3 Ethernet
Introduction Ethernet 是过去30年以来最为成功的局域网(local area networking)技术. 1. First widely used LAN technology ...