<script language="JavaScript">
/*****************************************************************************
 * md5.js
 *
 * A JavaScript implementation of the RSA Data Security, Inc. MD5
 * Message-Digest Algorithm.
 *
 * Copyright (C) Paul Johnston 1999. Distributed under the LGPL.
 *****************************************************************************/

/* to convert strings to a list of ascii values */
var sAscii = " !\"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ"
var sAscii = sAscii + "[\\]^_`abcdefghijklmnopqrstuvwxyz{|}~";

/* convert integer to hex string */
var sHex = "0123456789ABCDEF";
function hex(i) {
        h = "";
        for(j = 0; j <= 3; j++) {
                h += sHex.charAt((i >> (j * 8 + 4)) & 0x0F) +
                        sHex.charAt((i >> (j * 8)) & 0x0F);
        }
        return h;
}

/* add, handling overflows correctly */
function add(x, y) {
        return ((x&0x7FFFFFFF) + (y&0x7FFFFFFF)) ^ (x&0x80000000) ^ (y&0x80000000);
}

/* MD5 rounds functions */
function R1(A, B, C, D, X, S, T) {
        q = add(add(A, (B & C) | (~B & D)), add(X, T));
        return add((q << S) | ((q >> (32 - S)) & (Math.pow(2, S) - 1)), B);
}

function R2(A, B, C, D, X, S, T) {
        q = add(add(A, (B & D) | (C & ~D)), add(X, T));
        return add((q << S) | ((q >> (32 - S)) & (Math.pow(2, S) - 1)), B);
}

function R3(A, B, C, D, X, S, T) {
        q = add(add(A, B ^ C ^ D), add(X, T));
        return add((q << S) | ((q >> (32 - S)) & (Math.pow(2, S) - 1)), B);
}

function R4(A, B, C, D, X, S, T) {
        q = add(add(A, C ^ (B | ~D)), add(X, T));
        return add((q << S) | ((q >> (32 - S)) & (Math.pow(2, S) - 1)), B);
}

/* main entry point */
function calcMD5(sInp) {

/* Calculate length in machine words, including padding */
        wLen = (((sInp.length + 8) >> 6) + 1) << 4;
        var X = new Array(wLen);

/* Convert string to array of words */
        j = 4;
        for (i = 0; (i * 4) < sInp.length; i++) {
                X[i] = 0;
                for (j = 0; (j < 4) && ((j + i * 4) < sInp.length); j++) {
                        X[i] += (sAscii.indexOf(sInp.charAt((i * 4) + j)) + 32) << (j * 8);
                }
        }

/* Append padding bits and length */
        if (j == 4) {
                X[i++] = 0x80;
        }
        else {
                X[i - 1] += 0x80 << (j * 8);
        }
        for(; i < wLen; i++) {
                X[i] = 0;
        }
        X[wLen - 2] = sInp.length * 8;

/* hard-coded initial values */
        a = 0x67452301;
        b = 0xefcdab89;
        c = 0x98badcfe;
        d = 0x10325476;

/* Process each 16-word block in turn */
        for (i = 0; i < wLen; i += 16) {
                aO = a;
                bO = b;
                cO = c;
                dO = d;

a = R1(a, b, c, d, X[i+ 0], 7 , 0xd76aa478);
                d = R1(d, a, b, c, X[i+ 1], 12, 0xe8c7b756);
                c = R1(c, d, a, b, X[i+ 2], 17, 0x242070db);
                b = R1(b, c, d, a, X[i+ 3], 22, 0xc1bdceee);
                a = R1(a, b, c, d, X[i+ 4], 7 , 0xf57c0faf);
                d = R1(d, a, b, c, X[i+ 5], 12, 0x4787c62a);
                c = R1(c, d, a, b, X[i+ 6], 17, 0xa8304613);
                b = R1(b, c, d, a, X[i+ 7], 22, 0xfd469501);
                a = R1(a, b, c, d, X[i+ 8], 7 , 0x698098d8);
                d = R1(d, a, b, c, X[i+ 9], 12, 0x8b44f7af);
                c = R1(c, d, a, b, X[i+10], 17, 0xffff5bb1);
                b = R1(b, c, d, a, X[i+11], 22, 0x895cd7be);
                a = R1(a, b, c, d, X[i+12], 7 , 0x6b901122);
                d = R1(d, a, b, c, X[i+13], 12, 0xfd987193);
                c = R1(c, d, a, b, X[i+14], 17, 0xa679438e);
                b = R1(b, c, d, a, X[i+15], 22, 0x49b40821);

a = R2(a, b, c, d, X[i+ 1], 5 , 0xf61e2562);
                d = R2(d, a, b, c, X[i+ 6], 9 , 0xc040b340);
                c = R2(c, d, a, b, X[i+11], 14, 0x265e5a51);
                b = R2(b, c, d, a, X[i+ 0], 20, 0xe9b6c7aa);
                a = R2(a, b, c, d, X[i+ 5], 5 , 0xd62f105d);
                d = R2(d, a, b, c, X[i+10], 9 , 0x2441453);
                c = R2(c, d, a, b, X[i+15], 14, 0xd8a1e681);
                b = R2(b, c, d, a, X[i+ 4], 20, 0xe7d3fbc8);
                a = R2(a, b, c, d, X[i+ 9], 5 , 0x21e1cde6);
                d = R2(d, a, b, c, X[i+14], 9 , 0xc33707d6);
                c = R2(c, d, a, b, X[i+ 3], 14, 0xf4d50d87);
                b = R2(b, c, d, a, X[i+ 8], 20, 0x455a14ed);
                a = R2(a, b, c, d, X[i+13], 5 , 0xa9e3e905);
                d = R2(d, a, b, c, X[i+ 2], 9 , 0xfcefa3f8);
                c = R2(c, d, a, b, X[i+ 7], 14, 0x676f02d9);
                b = R2(b, c, d, a, X[i+12], 20, 0x8d2a4c8a);

a = R3(a, b, c, d, X[i+ 5], 4 , 0xfffa3942);
                d = R3(d, a, b, c, X[i+ 8], 11, 0x8771f681);
                c = R3(c, d, a, b, X[i+11], 16, 0x6d9d6122);
                b = R3(b, c, d, a, X[i+14], 23, 0xfde5380c);
                a = R3(a, b, c, d, X[i+ 1], 4 , 0xa4beea44);
                d = R3(d, a, b, c, X[i+ 4], 11, 0x4bdecfa9);
                c = R3(c, d, a, b, X[i+ 7], 16, 0xf6bb4b60);
                b = R3(b, c, d, a, X[i+10], 23, 0xbebfbc70);
                a = R3(a, b, c, d, X[i+13], 4 , 0x289b7ec6);
                d = R3(d, a, b, c, X[i+ 0], 11, 0xeaa127fa);
                c = R3(c, d, a, b, X[i+ 3], 16, 0xd4ef3085);
                b = R3(b, c, d, a, X[i+ 6], 23, 0x4881d05);
                a = R3(a, b, c, d, X[i+ 9], 4 , 0xd9d4d039);
                d = R3(d, a, b, c, X[i+12], 11, 0xe6db99e5);
                c = R3(c, d, a, b, X[i+15], 16, 0x1fa27cf8);
                b = R3(b, c, d, a, X[i+ 2], 23, 0xc4ac5665);

a = R4(a, b, c, d, X[i+ 0], 6 , 0xf4292244);
                d = R4(d, a, b, c, X[i+ 7], 10, 0x432aff97);
                c = R4(c, d, a, b, X[i+14], 15, 0xab9423a7);
                b = R4(b, c, d, a, X[i+ 5], 21, 0xfc93a039);
                a = R4(a, b, c, d, X[i+12], 6 , 0x655b59c3);
                d = R4(d, a, b, c, X[i+ 3], 10, 0x8f0ccc92);
                c = R4(c, d, a, b, X[i+10], 15, 0xffeff47d);
                b = R4(b, c, d, a, X[i+ 1], 21, 0x85845dd1);
                a = R4(a, b, c, d, X[i+ 8], 6 , 0x6fa87e4f);
                d = R4(d, a, b, c, X[i+15], 10, 0xfe2ce6e0);
                c = R4(c, d, a, b, X[i+ 6], 15, 0xa3014314);
                b = R4(b, c, d, a, X[i+13], 21, 0x4e0811a1);
                a = R4(a, b, c, d, X[i+ 4], 6 , 0xf7537e82);
                d = R4(d, a, b, c, X[i+11], 10, 0xbd3af235);
                c = R4(c, d, a, b, X[i+ 2], 15, 0x2ad7d2bb);
                b = R4(b, c, d, a, X[i+ 9], 21, 0xeb86d391);

a = add(a, aO);
                b = add(b, bO);
                c = add(c, cO);
                d = add(d, dO);
        }
       
        return hex(a) + hex(b) + hex(c) + hex(d);
}
</script>
<input type="text" id="m"><input type=button value="md5加密" onclick=alert(calcMD5(m.value))>

js MD5加密后的字符串的更多相关文章

  1. md5sum 生成 经md5加密后的字符串

    ➜ ~ echo -n 'admin' | md5sum 21232f297a57a5a743894a0e4a801fc3 - ➜ ~ md5sum -h md5sum: invalid option ...

  2. java 32位MD5加密的大写字符串

    package com.aok.test; import java.security.MessageDigest; public class MD5Test { public static void ...

  3. java字符串MD5加密后再转16进制

    话不多说上码 pom.xml <!-- MD5 --> <dependency> <groupId>org.apache.commons</groupId&g ...

  4. Java和JS MD5加密-附盐值加密demo

    JAVA和JS的MD5加密 经过测试:字母和数据好使,中文不好使. 源码如下: ** * 类MD5Util.java的实现描述: * */public class MD5Util { // 获得MD5 ...

  5. 使用JAVA进行MD5加密后所遇到的一些问题

    前言:这几天在研究apache shiro如何使用,这好用到了给密码加密的地方,就碰巧研究了下java的MD5加密是如何实现的,下面记录下我遇到的一些小问题. 使用java进行MD5加密非常的简单,代 ...

  6. js MD5加密处理

    关于MD5: MD5.js是通过前台js加密的方式对用户信息,密码等私密信息进行加密处理的工具,也可称为插件. 在本案例中 可以看到MD5共有6种加密方法: 1,  hex_md5(value) 2, ...

  7. js MD5加密与 java MD5加密不一致

    因为该项目会部署到多台机器,所以需要用字符生成唯一的MD5,但是js生成的MD5和java生成的MD5不一致.经过博主查阅资料发现java生成MD5用的是utf-8的编码,而且js用的是2进制.那我就 ...

  8. md5加密后不能解密

    MD5加密原理是散列算法,散列算法也称哈希算法.计算机专业学的数据结构就有哈希表这一知识点.比如10除以3余数为一,4除以3余数也为一,但余数为一的就不知道这个数是哪个了.所以md5不能解密.就算是设 ...

  9. ios 常用的正则表达式(手机号邮箱md5加密验证空字符串等)

    可以写一个nssring的category 给nsstring 增加一些方法,而这些方法就是一些正则表达式. 比如写一个叫做Helper的类  创建完了就是 NSString+Helper 然后在进行 ...

随机推荐

  1. IOS tableViewCell单元格重用中的label重叠的问题

    参考:http://zhidao.baidu.com/link?url=_oMUTo5SxUY6SBaxYLsIpN3i2sZ6SKG35MVlPJd2cNmUf9TGQFkKXX9EXwSwti0n ...

  2. Photoshop基础,前景背景,图层,选取

    1*前景色背景色 Alt+Delete 键 前景色填充 Ctrl+Delete 键 背景色填充 X 颜色转换 D 颜色互换 两个填充的原因: 2*图层(只要做东西就要建图层)透明的纸进行叠加,尽量多建 ...

  3. 使用固件库操作STM32F4时的必要配置(转)

    源:使用固件库操作STM32F4时的必要配置 使用STM32F4的固件库时,默认的晶振为25Mhz晶振,因此需要做一定的修改.之前因为一直没有注意这个问题,我捣腾了许久,发现工作时钟总是不对,查阅了一 ...

  4. Application的多种值判断测试程序

    Application.Contents.Remove("FriendLink") Response.Write("Application.Contents.Remove ...

  5. Simple But Useful Samples About 'grep' Command(简单实用的grep 命令)

    Do the following: grep -rnw '/path/to/somewhere/' -e "pattern" -r or -R is recursive, -n i ...

  6. JQuery中$.ajax()方法参数详解 (20

    url: 要求为String类型的参数,(默认为当前页地址)发送请求的地址. type: 要求为String类型的参数,请求方式(post或get)默认为get.注意其他http请求方法,例如put和 ...

  7. Spring Boot 系列教程15-页面国际化

    internationalization(i18n) 国际化(internationalization)是设计和制造容易适应不同区域要求的产品的一种方式. 它要求从产品中抽离所有地域语言,国家/地区和 ...

  8. java的两种异常runtimeException和checkedException

    java异常处理机制主要依赖于try,catch,finally,throw,throws五个关键字.   try 关键字后紧跟一个花括号括起来的代码块,简称try块.同理:下面的也被称为相应的块. ...

  9. [Eclispe] NDK内建include路径修改

    [Eclispe] NDK内建include路径修改 编辑 jni/android.mk 中 LOCAL_C_INCLUDES 变量后,该变量值将被列入项目属性的内建include头文件包含路径,无法 ...

  10. windows程序设计(三)

    MFC所有封装类一共200多个,但在MFC的内部技术不只是简单的封装 MFC的内部总共有六大关键技术,架构起了整个MFC的开发平台 一.MFC的六大关键技术包括: a).MFC程序的初始化过程 b). ...