LinuxSir.cn,穿越时空的Linuxsir!

 找回密码
 注册
搜索
热搜: shell linux mysql
查看: 661|回复: 0

php中crypt()函数如何用java重写

[复制链接]
发表于 2003-10-27 14:14:43 | 显示全部楼层 |阅读模式

  1. public class Crypt {
  2.   static int sub[] = new int[48];

  3. // TABLES
  4.   /* Expansion table (32 to 48) */
  5.   int E_p[] = {
  6.       32, 1, 2, 3, 4, 5, 4, 5, 6, 7, 8, 9,
  7.       8, 9, 10, 11, 12, 13, 12, 13, 14, 15, 16, 17,
  8.       16, 17, 18, 19, 20, 21, 20, 21, 22, 23, 24, 25,
  9.       24, 25, 26, 27, 28, 29, 28, 29, 30, 31, 32, 1
  10.   };

  11.   /* Permutation Choice 1 for subkey generation (64/56 to 56) */
  12.   int PC1_p[] = {
  13.       57, 49, 41, 33, 25, 17, 9, 1, 58, 50, 42, 34, 26, 18,
  14.       10, 2, 59, 51, 43, 35, 27, 19, 11, 3, 60, 52, 44, 36,
  15.       63, 55, 47, 39, 31, 23, 15, 7, 62, 54, 46, 38, 30, 22,
  16.       14, 6, 61, 53, 45, 37, 29, 21, 13, 5, 28, 20, 12, 4
  17.   };

  18.   /* Permutation Choice 2 for subkey generation (56 to 48) */
  19.   int PC2_p[] = {
  20.       14, 17, 11, 24, 1, 5, 3, 28, 15, 6, 21, 10,
  21.       23, 19, 12, 4, 26, 8, 16, 7, 27, 20, 13, 2,
  22.       41, 52, 31, 37, 47, 55, 30, 40, 51, 45, 33, 48,
  23.       44, 49, 39, 56, 34, 53, 46, 42, 50, 36, 29, 32
  24.   };

  25.   /* Number of rotations for the iteration of key scheduling */
  26.   /* The concept of a table here doesn't fit our behavioral model */
  27.   /* This will be logic in our final design */
  28.   int keyrots[] = {
  29.       1, 1, 2, 2, 2, 2, 2, 2, 1, 2, 2, 2, 2, 2, 2, 1};

  30.   /* Selection blocks
  31.    * There are 8 sblocks, each of which is referenced by a 2 bit value
  32.    * which picks the row, and a 4 bit value which picks the column
  33.    * This number is then the 4 bit output for that select block
  34.    */
  35.   int sblocks[][][] = {
  36.       {
  37.       {
  38.       14, 4, 13, 1, 2, 15, 11, 8, 3, 10, 6, 12, 5, 9, 0, 7}
  39.       , {
  40.       0, 15, 7, 4, 14, 2, 13, 1, 10, 6, 12, 11, 9, 5, 3, 8}
  41.       , {
  42.       4, 1, 14, 8, 13, 6, 2, 11, 15, 12, 9, 7, 3, 10, 5, 0}
  43.       , {
  44.       15, 12, 8, 2, 4, 9, 1, 7, 5, 11, 3, 14, 10, 0, 6, 13}
  45.   }
  46.       ,

  47.       {
  48.       {
  49.       15, 1, 8, 14, 6, 11, 3, 4, 9, 7, 2, 13, 12, 0, 5, 10}
  50.       , {
  51.       3, 13, 4, 7, 15, 2, 8, 14, 12, 0, 1, 10, 6, 9, 11, 5}
  52.       , {
  53.       0, 14, 7, 11, 10, 4, 13, 1, 5, 8, 12, 6, 9, 3, 2, 15}
  54.       , {
  55.       13, 8, 10, 1, 3, 15, 4, 2, 11, 6, 7, 12, 0, 5, 14, 9}
  56.   }
  57.       ,

  58.       {
  59.       {
  60.       10, 0, 9, 14, 6, 3, 15, 5, 1, 13, 12, 7, 11, 4, 2, 8}
  61.       , {
  62.       13, 7, 0, 9, 3, 4, 6, 10, 2, 8, 5, 14, 12, 11, 15, 1}
  63.       , {
  64.       13, 6, 4, 9, 8, 15, 3, 0, 11, 1, 2, 12, 5, 10, 14, 7}
  65.       , {
  66.       1, 10, 13, 0, 6, 9, 8, 7, 4, 15, 14, 3, 11, 5, 2, 12}
  67.   }
  68.       ,

  69.       {
  70.       {
  71.       7, 13, 14, 3, 0, 6, 9, 10, 1, 2, 8, 5, 11, 12, 4, 15}
  72.       , {
  73.       13, 8, 11, 5, 6, 15, 0, 3, 4, 7, 2, 12, 1, 10, 14, 9}
  74.       , {
  75.       10, 6, 9, 0, 12, 11, 7, 13, 15, 1, 3, 14, 5, 2, 8, 4}
  76.       , {
  77.       3, 15, 0, 6, 10, 1, 13, 8, 9, 4, 5, 11, 12, 7, 2, 14}
  78.   }
  79.       ,

  80.       {
  81.       {
  82.       2, 12, 4, 1, 7, 10, 11, 6, 8, 5, 3, 15, 13, 0, 14, 9}
  83.       , {
  84.       14, 11, 2, 12, 4, 7, 13, 1, 5, 0, 15, 10, 3, 9, 8, 6}
  85.       , {
  86.       4, 2, 1, 11, 10, 13, 7, 8, 15, 9, 12, 5, 6, 3, 0, 14}
  87.       , {
  88.       11, 8, 12, 7, 1, 14, 2, 13, 6, 15, 0, 9, 10, 4, 5, 3}
  89.   }
  90.       ,

  91.       {
  92.       {
  93.       12, 1, 10, 15, 9, 2, 6, 8, 0, 13, 3, 4, 14, 7, 5, 11}
  94.       , {
  95.       10, 15, 4, 2, 7, 12, 9, 5, 6, 1, 13, 14, 0, 11, 3, 8}
  96.       , {
  97.       9, 14, 15, 5, 2, 8, 12, 3, 7, 0, 4, 10, 1, 13, 11, 6}
  98.       , {
  99.       4, 3, 2, 12, 9, 5, 15, 10, 11, 14, 1, 7, 6, 0, 8, 13}
  100.   }
  101.       ,

  102.       {
  103.       {
  104.       4, 11, 2, 14, 15, 0, 8, 13, 3, 12, 9, 7, 5, 10, 6, 1}
  105.       , {
  106.       13, 0, 11, 7, 4, 9, 1, 10, 14, 3, 5, 12, 2, 15, 8, 6}
  107.       , {
  108.       1, 4, 11, 13, 12, 3, 7, 14, 10, 15, 6, 8, 0, 5, 9, 2}
  109.       , {
  110.       6, 11, 13, 8, 1, 4, 10, 7, 9, 5, 0, 15, 14, 2, 3, 12}
  111.   }
  112.       ,

  113.       {
  114.       {
  115.       13, 2, 8, 4, 6, 15, 11, 1, 10, 9, 3, 14, 5, 0, 12, 7}
  116.       , {
  117.       1, 15, 13, 8, 10, 3, 7, 4, 12, 5, 6, 11, 0, 14, 9, 2}
  118.       , {
  119.       7, 11, 4, 1, 9, 12, 14, 2, 0, 6, 10, 13, 15, 3, 5, 8}
  120.       , {
  121.       2, 1, 14, 7, 4, 10, 8, 13, 15, 12, 9, 0, 3, 5, 6, 11}
  122.   }
  123.   };

  124.   /* Permutation P for after sblocks */
  125.   int P_p[] = {
  126.       16, 7, 20, 21, 29, 12, 28, 17, 1, 15, 23, 26, 5, 18, 31, 10,
  127.       2, 8, 24, 14, 32, 27, 3, 9, 19, 13, 30, 6, 22, 11, 4, 25
  128.   };

  129.   /* Inverse permutation of IP for end
  130.    * Temporary - the true behavior will be implemented in a shift out register
  131.    * (Look at the pattern obvious in an 8x8 layout)
  132.    */
  133.   int IPinv_p[] = {
  134.       40, 8, 48, 16, 56, 24, 64, 32,
  135.       39, 7, 47, 15, 55, 23, 63, 31,
  136.       38, 6, 46, 14, 54, 22, 62, 30,
  137.       37, 5, 45, 13, 53, 21, 61, 29,
  138.       36, 4, 44, 12, 52, 20, 60, 28,
  139.       35, 3, 43, 11, 51, 19, 59, 27,
  140.       34, 2, 42, 10, 50, 18, 58, 26,
  141.       33, 1, 41, 9, 49, 17, 57, 25
  142.   };

  143. // CODE
  144.   private void pr_bits(int[] s, int amt) {
  145.     amt /= 8;
  146.     for (int i = 0; i < amt; i++) {
  147.       int x = 0;
  148.       for (int j = 0; j < 8; j++) {
  149.         x |= s[i * 8 + j] << (7 - j);
  150.       }
  151.       Integer integ = new Integer(x);
  152.       System.out.print(integ.toString(x, 16) + " ");
  153.     }
  154.     System.out.println();
  155.   };

  156.   private void permute(int[] by, int amt, int[] in, int[] out) {
  157.     for (; --amt >= 0; ) {
  158.       out[amt] = in[by[amt] - 1];
  159.     }
  160.   };

  161.   private void do_sblocks(int[] in, int[] out) {
  162.     for (int i = 0; i < 8; i++) {
  163.       int val = sblocks[i]
  164.           [in[i * 6] << 1 | in[i * 6 + 5]]
  165.           [in[i * 6 + 1] << 3 |
  166.           in[i * 6 + 2] << 2 |
  167.           in[i * 6 + 3] << 1 |
  168.           in[i * 6 + 4] << 0];
  169.       out[i * 4 + 0] = val >> 3 & 1;
  170.       out[i * 4 + 1] = val >> 2 & 1;
  171.       out[i * 4 + 2] = val >> 1 & 1;
  172.       out[i * 4 + 3] = val >> 0 & 1;
  173.     }
  174.   };

  175.   private int ascii_to_bin(char c) {
  176.     if (c >= 'a') {
  177.       return (c - 59);
  178.     }
  179.     if (c >= 'A') {
  180.       return (c - 53);
  181.     }
  182.     return (c - '.');
  183.   };

  184.   private char bin_to_ascii(int c) {
  185.     if (c >= 38) {
  186.       return (char) (c - 38 + 'a');
  187.     }
  188.     if (c >= 12) {
  189.       return (char) (c - 12 + 'A');
  190.     }
  191.     return (char) (c + '.');
  192.   };

  193.   private void load_salt(int[] saltmask, char[] salt) {
  194.     int tot = ascii_to_bin(salt[0]) | (ascii_to_bin(salt[1]) << 6);
  195.     for (int i = 0; i < 12; i++) {
  196.       saltmask[i] = tot >> i & 1;
  197.     }
  198.   };

  199.   private void do_salt(int[] bits, int[] saltmask) {
  200.     for (int i = 0; i < 12; i++) {
  201.       if (saltmask[i] != 0) {
  202.         int t = bits[i];
  203.         bits[i] = bits[24 + i];
  204.         bits[24 + i] = t;
  205.       }
  206.     }
  207.   };

  208.   private void load_key(int[] ikey, char[] password) {
  209.     int tmp[] = new int[64];

  210.     for (int i = 0; i < 8; i++) {
  211.       for (int j = 0; j < 8; j++) {
  212.         tmp[i * 8 + j] = (password[i] >> (6 - j)) & 1;
  213.       }
  214.     }
  215.     permute(PC1_p, 56, tmp, ikey);
  216.   };

  217.   private void subkey(int[] ikey, int iter) {
  218.     int rots = keyrots[iter];

  219.     int tmp0l = ikey[0];
  220.     int tmp1l = ikey[1];
  221.     int tmp0r = ikey[28];
  222.     int tmp1r = ikey[29];
  223.     for (int i = 0; i < 28 - rots; i++) {
  224.       ikey[i] = ikey[i + rots];
  225.       ikey[28 + i] = ikey[28 + i + rots];
  226.     }
  227.     if (rots == 2) {
  228.       ikey[26] = tmp0l;
  229.       ikey[27] = tmp1l;
  230.       ikey[54] = tmp0r;
  231.       ikey[55] = tmp1r;
  232.     }
  233.     else {
  234.       ikey[27] = tmp0l;
  235.       ikey[55] = tmp0r;
  236.     }

  237.     permute(PC2_p, 48, ikey, sub);
  238.   };

  239.   private void xor(int[] src1, int[] src2, int index, int num) {
  240.     for (int i = 0; i < num; i++) {
  241.       src1[i] = (src1[i] ^ src2[index + i]) & 1;
  242.     }
  243.   };

  244.   private void print_bits(int[] s, int amt) {
  245.     for (int i = 0; i < amt; i++) {
  246.       System.out.print("" + s[i]);
  247.     }
  248.     System.out.println("");
  249.   };

  250.   private void do_f(int[] in, int index, int[] out, int iter, int[] ikey,
  251.                     int[] saltmask) {
  252.     int tmp48[] = new int[48], tmp32[] = new int[32], skey[];

  253.     for (int i = 0; i < 32; i++) {
  254.       tmp32[i] = in[i + index];
  255.     }
  256.     permute(E_p, 48, tmp32, tmp48);
  257.     do_salt(tmp48, saltmask);

  258.     subkey(ikey, iter);
  259.     skey = sub;
  260.     xor(tmp48, skey, 0, 48); // Goed
  261.     do_sblocks(tmp48, tmp32);
  262.     permute(P_p, 32, tmp32, out);
  263.   };

  264.   private char[] mycrypt(char[] password, char[] salt) {
  265.     int bits[] = new int[64];
  266.     int outl[] = new int[32];
  267.     int outr[] = new int[32];
  268.     int done[] = new int[66]; // In c-code array-size was 64 !?!
  269.     int ikey[] = new int[56];
  270.     int saltmask[] = new int[12];
  271.     char[] answer = new char[14];

  272.     for (int i = 0; i < 64; i++) {
  273.       bits[i] = 0;
  274.     }
  275.     load_key(ikey, password);
  276.     load_salt(saltmask, salt);

  277.     for (int dess = 0; dess < 25; dess++) {
  278.       for (int iters = 0; iters < 16; iters += 2) {
  279.         do_f(bits, 32, outl, iters, ikey, saltmask);
  280.         xor(outl, bits, 0, 32);
  281.         do_f(outl, 0, outr, iters + 1, ikey, saltmask);
  282.         xor(outr, bits, 32, 32);

  283.         if (iters != 14) {
  284.           for (int i = 0; i < 32; i++) {
  285.             bits[i] = outl[i];
  286.             bits[i + 32] = outr[i];
  287.           }
  288.         }
  289.         else {
  290.           for (int i = 0; i < 32; i++) {
  291.             bits[i] = outr[i];
  292.             bits[i + 32] = outl[i];
  293.           }
  294.         }
  295.       }
  296.     }
  297.     permute(IPinv_p, 64, bits, done);

  298.     answer[0] = (char) salt[0];
  299.     answer[1] = (char) salt[1];
  300.     for (int i = 0; i < 11; i++) {
  301.       char c = 0;
  302.       for (int j = 0; j < 6; j++) {
  303.         c |= done[6 * i + j] << (5 - j);
  304.       }
  305.       answer[i + 2] = bin_to_ascii(c);
  306.     }
  307.     return answer;
  308.   };

  309.   /**
  310.    * This method decodes the given password
  311.    * Encryption is based on the one way DES encryption
  312.    * @return The encrypted password
  313.    * @param passwd is the password to encrypt
  314.    * @param s is salt
  315.    */
  316.   public String decode(String passwd, String s) {
  317.     char[] password = new char[9];
  318.     char[] salt = new char[3];
  319.     String uitkomst;

  320.     passwd.getChars(0, passwd.length() >= 8 ? 8 : passwd.length(), password, 0);
  321.     s.getChars(0, 2, salt, 0);

  322.     uitkomst = new String().valueOf(mycrypt(password, salt));
  323.     return uitkomst;//(uitkomst.substring(0, 13));
  324.   }

  325. };

复制代码

好像不对,哪位大侠帮帮我
您需要登录后才可以回帖 登录 | 注册

本版积分规则

快速回复 返回顶部 返回列表