WP7不支持MD5加密,在网上找了一个实现MD5加密的算法。

//Copyright (c) Microsoft Corporation.  All rights reserved.
using System;
using System.Text;
// **************************************************************
//可惜Wp和Sl都不支持MD5了,网上找的
// * Raw implementation of the MD5 hash algorithm
// * from RFC 1321.
// *
// * Written By: Reid Borsuk and Jenny Zheng
// * Copyright (c) Microsoft Corporation. All rights reserved.
// **************************************************************
// Simple struct for the (a,b,c,d) which is used to compute the mesage digest.
struct ABCDStruct
{
public uint A;
public uint B;
public uint C;
public uint D;
}
public sealed class MD5Core
{
//Prevent CSC from adding a default public constructor
private MD5Core() { }
public static byte[] GetHash(string input, Encoding encoding)
{
if (null == input)
throw new System.ArgumentNullException("input", "Unable to calculate hash over null input data");
if (null == encoding)
throw new System.ArgumentNullException("encoding", "Unable to calculate hash over a string without a default encoding. Consider using the GetHash(string) overload to use UTF8 Encoding");
byte[] target = encoding.GetBytes(input);
return GetHash(target);
}
public static byte[] GetHash(string input)
{
return GetHash(input, new UTF8Encoding());
}
public static string GetHashString(byte[] input)
{
if (null == input)
throw new System.ArgumentNullException("input", "Unable to calculate hash over null input data");
string retval = BitConverter.ToString(GetHash(input));
retval = retval.Replace("-", "");
return retval;
}
public static string GetHashString(string input, Encoding encoding)
{
if (null == input)
throw new System.ArgumentNullException("input", "Unable to calculate hash over null input data");
if (null == encoding)
throw new System.ArgumentNullException("encoding", "Unable to calculate hash over a string without a default encoding. Consider using the GetHashString(string) overload to use UTF8 Encoding"); byte[] target = encoding.GetBytes(input);
return GetHashString(target);
}
public static string GetHashString(string input)
{
return GetHashString(input, new UTF8Encoding());
}
public static byte[] GetHash(byte[] input)
{
if (null == input)
throw new System.ArgumentNullException("input", "Unable to calculate hash over null input data");
//Intitial values defined in RFC 1321
ABCDStruct abcd = new ABCDStruct();
abcd.A = 0x67452301;
abcd.B = 0xefcdab89;
abcd.C = 0x98badcfe;
abcd.D = 0x10325476;
//We pass in the input array by block, the final block of data must be handled specialy for padding & length embeding
int startIndex = ;
while (startIndex <= input.Length - )
{
MD5Core.GetHashBlock(input, ref abcd, startIndex);
startIndex += ;
}
// The final data block.
return MD5Core.GetHashFinalBlock(input, startIndex, input.Length - startIndex, abcd, (Int64)input.Length * );
}
internal static byte[] GetHashFinalBlock(byte[] input, int ibStart, int cbSize, ABCDStruct ABCD, Int64 len)
{
byte[] working = new byte[];
byte[] length = BitConverter.GetBytes(len);
//Padding is a single bit 1, followed by the number of 0s required to make size congruent to 448 modulo 512. Step 1 of RFC 1321
//The CLR ensures that our buffer is 0-assigned, we don't need to explicitly set it. This is why it ends up being quicker to just
//use a temporary array rather then doing in-place assignment (5% for small inputs)
Array.Copy(input, ibStart, working, , cbSize);
working[cbSize] = 0x80;
//We have enough room to store the length in this chunk
if (cbSize <= )
{
Array.Copy(length, , working, , );
GetHashBlock(working, ref ABCD, );
}
else //We need an aditional chunk to store the length
{
GetHashBlock(working, ref ABCD, );
//Create an entirely new chunk due to the 0-assigned trick mentioned above, to avoid an extra function call clearing the array
working = new byte[];
Array.Copy(length, , working, , );
GetHashBlock(working, ref ABCD, );
}
byte[] output = new byte[];
Array.Copy(BitConverter.GetBytes(ABCD.A), , output, , );
Array.Copy(BitConverter.GetBytes(ABCD.B), , output, , );
Array.Copy(BitConverter.GetBytes(ABCD.C), , output, , );
Array.Copy(BitConverter.GetBytes(ABCD.D), , output, , );
return output;
}
// Performs a single block transform of MD5 for a given set of ABCD inputs
/* If implementing your own hashing framework, be sure to set the initial ABCD correctly according to RFC 1321:
// A = 0x67452301;
// B = 0xefcdab89;
// C = 0x98badcfe;
// D = 0x10325476;
*/
internal static void GetHashBlock(byte[] input, ref ABCDStruct ABCDValue, int ibStart)
{
uint[] temp = Converter(input, ibStart);
uint a = ABCDValue.A;
uint b = ABCDValue.B;
uint c = ABCDValue.C;
uint d = ABCDValue.D;
a = r1(a, b, c, d, temp[], , 0xd76aa478);
d = r1(d, a, b, c, temp[], , 0xe8c7b756);
c = r1(c, d, a, b, temp[], , 0x242070db);
b = r1(b, c, d, a, temp[], , 0xc1bdceee);
a = r1(a, b, c, d, temp[], , 0xf57c0faf);
d = r1(d, a, b, c, temp[], , 0x4787c62a);
c = r1(c, d, a, b, temp[], , 0xa8304613);
b = r1(b, c, d, a, temp[], , 0xfd469501);
a = r1(a, b, c, d, temp[], , 0x698098d8);
d = r1(d, a, b, c, temp[], , 0x8b44f7af);
c = r1(c, d, a, b, temp[], , 0xffff5bb1);
b = r1(b, c, d, a, temp[], , 0x895cd7be);
a = r1(a, b, c, d, temp[], , 0x6b901122);
d = r1(d, a, b, c, temp[], , 0xfd987193);
c = r1(c, d, a, b, temp[], , 0xa679438e);
b = r1(b, c, d, a, temp[], , 0x49b40821);
a = r2(a, b, c, d, temp[], , 0xf61e2562);
d = r2(d, a, b, c, temp[], , 0xc040b340);
c = r2(c, d, a, b, temp[], , 0x265e5a51);
b = r2(b, c, d, a, temp[], , 0xe9b6c7aa);
a = r2(a, b, c, d, temp[], , 0xd62f105d);
d = r2(d, a, b, c, temp[], , 0x02441453);
c = r2(c, d, a, b, temp[], , 0xd8a1e681);
b = r2(b, c, d, a, temp[], , 0xe7d3fbc8);
a = r2(a, b, c, d, temp[], , 0x21e1cde6);
d = r2(d, a, b, c, temp[], , 0xc33707d6);
c = r2(c, d, a, b, temp[], , 0xf4d50d87);
b = r2(b, c, d, a, temp[], , 0x455a14ed);
a = r2(a, b, c, d, temp[], , 0xa9e3e905);
d = r2(d, a, b, c, temp[], , 0xfcefa3f8);
c = r2(c, d, a, b, temp[], , 0x676f02d9);
b = r2(b, c, d, a, temp[], , 0x8d2a4c8a);
a = r3(a, b, c, d, temp[], , 0xfffa3942);
d = r3(d, a, b, c, temp[], , 0x8771f681);
c = r3(c, d, a, b, temp[], , 0x6d9d6122);
b = r3(b, c, d, a, temp[], , 0xfde5380c);
a = r3(a, b, c, d, temp[], , 0xa4beea44);
d = r3(d, a, b, c, temp[], , 0x4bdecfa9);
c = r3(c, d, a, b, temp[], , 0xf6bb4b60);
b = r3(b, c, d, a, temp[], , 0xbebfbc70);
a = r3(a, b, c, d, temp[], , 0x289b7ec6);
d = r3(d, a, b, c, temp[], , 0xeaa127fa);
c = r3(c, d, a, b, temp[], , 0xd4ef3085);
b = r3(b, c, d, a, temp[], , 0x04881d05);
a = r3(a, b, c, d, temp[], , 0xd9d4d039);
d = r3(d, a, b, c, temp[], , 0xe6db99e5);
c = r3(c, d, a, b, temp[], , 0x1fa27cf8);
b = r3(b, c, d, a, temp[], , 0xc4ac5665);
a = r4(a, b, c, d, temp[], , 0xf4292244);
d = r4(d, a, b, c, temp[], , 0x432aff97);
c = r4(c, d, a, b, temp[], , 0xab9423a7);
b = r4(b, c, d, a, temp[], , 0xfc93a039);
a = r4(a, b, c, d, temp[], , 0x655b59c3);
d = r4(d, a, b, c, temp[], , 0x8f0ccc92);
c = r4(c, d, a, b, temp[], , 0xffeff47d);
b = r4(b, c, d, a, temp[], , 0x85845dd1);
a = r4(a, b, c, d, temp[], , 0x6fa87e4f);
d = r4(d, a, b, c, temp[], , 0xfe2ce6e0);
c = r4(c, d, a, b, temp[], , 0xa3014314);
b = r4(b, c, d, a, temp[], , 0x4e0811a1);
a = r4(a, b, c, d, temp[], , 0xf7537e82);
d = r4(d, a, b, c, temp[], , 0xbd3af235);
c = r4(c, d, a, b, temp[], , 0x2ad7d2bb);
b = r4(b, c, d, a, temp[], , 0xeb86d391);
ABCDValue.A = unchecked(a + ABCDValue.A);
ABCDValue.B = unchecked(b + ABCDValue.B);
ABCDValue.C = unchecked(c + ABCDValue.C);
ABCDValue.D = unchecked(d + ABCDValue.D);
return;
}
//Manually unrolling these equations nets us a 20% performance improvement
private static uint r1(uint a, uint b, uint c, uint d, uint x, int s, uint t)
{
// (b + LSR((a + F(b, c, d) + x + t), s))
//F(x, y, z) ((x & y) | ((x ^ 0xFFFFFFFF) & z))
return unchecked(b + LSR((a + ((b & c) | ((b ^ 0xFFFFFFFF) & d)) + x + t), s));
}
private static uint r2(uint a, uint b, uint c, uint d, uint x, int s, uint t)
{
// (b + LSR((a + G(b, c, d) + x + t), s))
//G(x, y, z) ((x & z) | (y & (z ^ 0xFFFFFFFF)))
return unchecked(b + LSR((a + ((b & d) | (c & (d ^ 0xFFFFFFFF))) + x + t), s));
}
private static uint r3(uint a, uint b, uint c, uint d, uint x, int s, uint t)
{
// (b + LSR((a + H(b, c, d) + k + i), s))
//H(x, y, z) (x ^ y ^ z)
return unchecked(b + LSR((a + (b ^ c ^ d) + x + t), s));
}
private static uint r4(uint a, uint b, uint c, uint d, uint x, int s, uint t)
{
// (b + LSR((a + I(b, c, d) + k + i), s))
//I(x, y, z) (y ^ (x | (z ^ 0xFFFFFFFF)))
return unchecked(b + LSR((a + (c ^ (b | (d ^ 0xFFFFFFFF))) + x + t), s));
}
// Implementation of left rotate
// s is an int instead of a uint becuase the CLR requires the argument passed to >>/<< is of
// type int. Doing the demoting inside this function would add overhead.
private static uint LSR(uint i, int s)
{
return ((i << s) | (i >> ( - s)));
}
//Convert input array into array of UInts
private static uint[] Converter(byte[] input, int ibStart)
{
if (null == input)
throw new System.ArgumentNullException("input", "Unable convert null array to array of uInts"); uint[] result = new uint[]; for (int i = ; i < ; i++)
{
result[i] = (uint)input[ibStart + i * ];
result[i] += (uint)input[ibStart + i * + ] << ;
result[i] += (uint)input[ibStart + i * + ] << ;
result[i] += (uint)input[ibStart + i * + ] << ;
} return result;
}
}

WP7 MD5加密的更多相关文章

  1. 关于CryptoJS中md5加密以及aes加密的随笔

    最近项目中用到了各种加密,其中就包括从没有接触过得aes加密,因此从网上各种查,官方的一种说法: 高级加密标准(英语:Advanced Encryption Standard,缩写:AES),在密码学 ...

  2. Android数据加密之MD5加密

    前言: 项目中无论是密码的存储或者说判断文件是否是同一文件,都会用到MD5算法,今天来总结一下MD5加密算法. 什么是MD5加密? MD5英文全称“Message-Digest Algorithm 5 ...

  3. android MD5加密

    public class MD5Uutils {    //MD5加密,32位    public static String MD5(String str) {        MessageDige ...

  4. IOS 杂笔-9 (MD5 加密)

    首先是一段对MD5的简介 *出自一位大牛之手* Message Digest Algorithm MD5(中文名为消息摘要算法第五版)为计算机安全领域广泛使用的一种散列函数,用以提供消息的完整性保护 ...

  5. JS中使用MD5加密

    下载 MD5 使用MD5加密的方法:下载md5.js文件,在网页中引用该文件: < script type="text/javascript" src="md5.j ...

  6. MD5工具类,提供字符串MD5加密、文件MD5值获取(校验)功能

    MD5工具类,提供字符串MD5加密(校验).文件MD5值获取(校验)功能 : package com.yzu.utils; import java.io.File; import java.io.Fi ...

  7. MD5 加密

    字符串加密 // 1. 准备好一个字符串 NSString *string = @"asdasfaf"; // 2. MD5加密是基于C语言的. 所以要把这个字符串转化成C的字符串 ...

  8. MD5加密的Java实现

    在各种应用系统中,如果需要设置账户,那么就会涉及到储存用户账户信息的问题,为了保证所储存账户信息的安全,通常会采用MD5加密的方式来,进行储存.首先,简单得介绍一下,什么是MD5加密. MD5的全称是 ...

  9. 【ORACLE】MD5加密

        今天乌干达充值卡入库时,发现有资源已经存在的异常, 异常原因经过核实是由于卡资源密码在库中已经存在, 为进一步查找存在的原因, 因此需要对导入文件密码的MD5 加密, 通过MD5加密后的字符串 ...

随机推荐

  1. Using Hooks

    The following code examples demonstrate how to perform the following tasks associated with hooks: In ...

  2. Codeforces Round #271 (Div. 2) F ,E, D, C, B, A

    前言:最近被线段树+简单递推DP虐的体无完肤!真是弱! A:简单题,照着模拟就可以,题目还特意说不用处理边界 B:二分查找即可,用lower_lound()函数很好用 #include<stri ...

  3. 离散-ACM一道强有力的工具

    最近几天散搞哭了,都怪以前看到没好好学... 就拿一道题来说事PKU:1151,以前Matrix67写过这道题的BLOG,引用一下: VOJ1056(http://www.vijos.cn/Probl ...

  4. 疯狂java讲义——多态

    父类 f = new 子类(); 引用变量f,在编译时类型是父类,在运行时类型是子类类型.当这个引用变量调用子类重写父类的那个方法的时候,实际执行的是子类中重写后的那个方法.当运行的时候调用该变量的方 ...

  5. logback日志文件需要注意点

    1.支持的jar包 logback-access-1.1.1.jarlogback-classic-1.1.1.jarlogback-core-1.1.1.jar 2.logback.xml文件,we ...

  6. POJ 3253 Fence Repair(优先队列,哈夫曼树,模拟)

    题目 //做哈夫曼树时,可以用优先队列(误?) //这道题教我们优先队列的一个用法:取前n个数(最大的或者最小的) //哈夫曼树 //64位 //超时->优先队列,,,, //这道题的优先队列用 ...

  7. ZOJ 1610 Count the Colors (线段树区间更新)

    题目链接 题意 : 一根木棍,长8000,然后分别在不同的区间涂上不同的颜色,问你最后能够看到多少颜色,然后每个颜色有多少段,颜色大小从头到尾输出. 思路 :线段树区间更新一下,然后标记一下,最后从头 ...

  8. java for循环的几种写法

    J2SE 1.5提供了另一种形式的for循环.借助这种形式的for循环,可以用更简单地方式来遍历数组和Collection等类型的对象.本文介绍使用这种循环的具体方式,说明如何自行定义能被这样遍历的类 ...

  9. struts2实现选择i18n语言选择切换

    [新手学习记录,仅供参考!] 1.项目准备 首先当然是我们得创建一个struts2的web项目,并且已经实现了一个简单的功能. 以下通过登录功能来举例说明. 2.指定全局国际化资源文件 在struts ...

  10. ubuntu系统使用minicom终端操作说明

    http://blog.chinaunix.net/uid-22030783-id-3350834.html 在linux下,使用minicom作为串口终端工具,默认的串口设备是/dev/ttyS0, ...