ICode9

精准搜索请尝试: 精确搜索
首页 > 编程语言> 文章详细

.Net Core关于SM4 加密算法 修正版

2022-04-06 15:34:05  阅读:156  来源: 互联网

标签:Core sm4 16 SM4 ctx long new byte 加密算法


最近涉及到了很多关于SM4加密解密的对接要求,说明国密这块有越来越多的人愿意使用了。(题外话)

所以我也网上看了看大家写的加密解密帮助类。也算是对前辈的代码做个实现,最终发现有些地方是有问题的。

这里引用一个博主的文章内容,

引用地址:https://www.cnblogs.com/LowKeyCXY/p/14207819.html  (侵删找我哦!)

 

SM4的介绍和逻辑规则我就不多说了,大家可以去引用的博主里看,代码有几点问题:

1.使用ecb模式时,确实没问题,但碰到CBC时就发现问题了,最总找到了逻辑错误点。

如下图:

 

 

 

这里的i,明显有问题,实际应该是 j * 16 如果使用博主的代码,则会报错(别问我怎么知道的,狗头)

2.博主给的加密后使用的是hex.encode 也就是哈希加密,其实现实中有的地方要求base64.encode也就是base64加密,所以不看代码不行啊。(一直和对接方的数据不一致,说多了都是泪)。

如下图:

 

 

 

好了,话不多说,赶紧上代码:

(本代码仅对CBC做了优化,小伙伴可以自由发挥哈!)

 

  1 using Org.BouncyCastle.Utilities.Encoders;
  2 using System;
  3 using System.Collections.Generic;
  4 using System.Text;
  5 
  6 namespace AirtuBus.Infrastructure.Encryp
  7 {
  8     public class SM4Helper
  9     {
 10         /// <summary>
 11         /// 加密ECB模式
 12         /// </summary>
 13         /// <param name="secretKey">密钥</param>
 14         /// <param name="hexString">明文是否是十六进制</param>
 15         /// <param name="plainText">明文</param>
 16         /// <returns>返回密文</returns>
 17         public static string Encrypt_ECB(string secretKey, bool hexString, string plainText)
 18         {
 19             SM4Context ctx = new SM4Context();
 20             ctx.isPadding = true;
 21             ctx.mode = Sm4.SM4_ENCRYPT;
 22             byte[] keyBytes;
 23             if (hexString)
 24             {
 25                 keyBytes = Hex.Decode(secretKey);
 26             }
 27             else
 28             {
 29                 keyBytes = Encoding.UTF8.GetBytes(secretKey);
 30             }
 31             Sm4 sm4 = new Sm4();
 32             sm4.sm4_setkey_enc(ctx, keyBytes);
 33             byte[] encrypted = sm4.sm4_crypt_ecb(ctx, Encoding.UTF8.GetBytes(plainText));
 34             string cipherText = Encoding.UTF8.GetString(Hex.Encode(encrypted));
 35             return cipherText;
 36         }
 37 
 38         /// <summary>
 39         /// 解密ECB模式
 40         /// </summary>
 41         /// <param name="secretKey">密钥</param>
 42         /// <param name="hexString">明文是否是十六进制</param>
 43         /// <param name="cipherText">密文</param>
 44         /// <returns>返回明文</returns>
 45         public static string Decrypt_ECB(string secretKey, bool hexString, string cipherText)
 46         {
 47             SM4Context ctx = new SM4Context();
 48             ctx.isPadding = true;
 49             ctx.mode = Sm4.SM4_DECRYPT;
 50 
 51             byte[] keyBytes;
 52             if (hexString)
 53             {
 54                 keyBytes = Hex.Decode(secretKey);
 55             }
 56             else
 57             {
 58                 keyBytes = Encoding.UTF8.GetBytes(secretKey);
 59             }
 60 
 61             Sm4 sm4 = new Sm4();
 62             sm4.sm4_setkey_dec(ctx, keyBytes);
 63             byte[] decrypted = sm4.sm4_crypt_ecb(ctx, Hex.Decode(cipherText));
 64             return Encoding.UTF8.GetString(decrypted);
 65         }
 66 
 67         /// <summary>
 68         /// 加密CBC模式
 69         /// </summary>
 70         /// <param name="secretKey">密钥</param>
 71         /// <param name="hexString">明文是否是十六进制</param>
 72         /// <param name="iv"></param>
 73         /// <param name="plainText">明文</param>
 74         /// <returns>返回密文</returns>
 75         public static string Encrypt_CBC(string secretKey, bool hexString, string iv, string plainText, string encoding = "utf-8", int needEnCode = 1)
 76         {
 77             if (encoding.IsNullOrEmpty())
 78             {
 79                 encoding = "utf-8";
 80             }
 81             if (encoding == "GBK" || encoding == "GB2312")
 82             {
 83                 Encoding.RegisterProvider(CodePagesEncodingProvider.Instance);
 84             }
 85             SM4Context ctx = new SM4Context();
 86             ctx.isPadding = true;
 87             ctx.mode = Sm4.SM4_ENCRYPT;
 88             byte[] keyBytes;
 89             byte[] ivBytes;
 90             if (hexString)
 91             {
 92                 keyBytes = Hex.Decode(secretKey);
 93                 ivBytes = Hex.Decode(iv);
 94             }
 95             else
 96             {
 97                 keyBytes = Encoding.UTF8.GetBytes(secretKey);
 98                 ivBytes = Encoding.UTF8.GetBytes(iv);
 99             }
100             Sm4 sm4 = new Sm4();
101             sm4.sm4_setkey_enc(ctx, keyBytes);
102             byte[] encrypted = sm4.sm4_crypt_cbc(ctx, ivBytes, Encoding.GetEncoding(encoding).GetBytes(plainText));
103             if (needEnCode == 1)
104             {
105                 encrypted = Hex.Encode(encrypted);
106             }else if(needEnCode == 2)
107             {
108                 encrypted = Base64.Encode(encrypted);
109             }
110             string cipherText = Encoding.UTF8.GetString(encrypted);
111             return cipherText;
112         }
113 
114         /// <summary>
115         /// 解密CBC模式
116         /// </summary>
117         /// <param name="secretKey">密钥</param>
118         /// <param name="hexString">明文是否是十六进制</param>
119         /// <param name="iv"></param>
120         /// <param name="cipherText">密文</param>
121         /// <returns>返回明文</returns>
122         public static string Decrypt_CBC(string secretKey, bool hexString, string iv, string cipherText)
123         {
124             SM4Context ctx = new SM4Context();
125             ctx.isPadding = true;
126             ctx.mode = Sm4.SM4_DECRYPT;
127             byte[] keyBytes;
128             byte[] ivBytes;
129             if (hexString)
130             {
131                 keyBytes = Hex.Decode(secretKey);
132                 ivBytes = Hex.Decode(iv);
133             }
134             else
135             {
136                 keyBytes = Encoding.UTF8.GetBytes(secretKey);
137                 ivBytes = Encoding.UTF8.GetBytes(iv);
138             }
139             Sm4 sm4 = new Sm4();
140             sm4.sm4_setkey_dec(ctx, keyBytes);
141             byte[] decrypted = sm4.sm4_crypt_cbc(ctx, ivBytes, Hex.Decode(cipherText));
142             return Encoding.UTF8.GetString(decrypted);
143         }
144 
145         /// <summary>
146         /// 加密ECB模式 BASE64
147         /// </summary>
148         /// <param name="secretKey"></param>
149         /// <param name="hexString"></param>
150         /// <param name="plainText"></param>
151         /// <returns></returns>
152         public static string Encrypt_ECB_Base64(string secretKey, bool hexString, string plainText)
153         {
154             SM4Context ctx = new SM4Context();
155             ctx.isPadding = true;
156             ctx.mode = Sm4.SM4_ENCRYPT;
157             byte[] keyBytes;
158             if (hexString)
159             {
160                 keyBytes = Hex.Decode(secretKey);
161             }
162             else
163             {
164                 keyBytes = Encoding.UTF8.GetBytes(secretKey);
165             }
166             Sm4 sm4 = new Sm4();
167             sm4.sm4_setkey_enc(ctx, keyBytes);
168             byte[] encrypted = sm4.sm4_crypt_ecb(ctx, Encoding.UTF8.GetBytes(plainText));
169             string cipherText = Encoding.UTF8.GetString(Base64.Encode(encrypted));
170             return cipherText;
171         }
172 
173         /// <summary>
174         /// 解密ECB模式 BASE64
175         /// </summary>
176         /// <param name="secretKey"></param>
177         /// <param name="hexString"></param>
178         /// <param name="plainText"></param>
179         /// <returns></returns>
180         public static string Decrypt_ECB_Base64(string secretKey, bool hexString, string cipherText)
181         {
182             if (cipherText.IsNullOrEmpty() || secretKey.IsNullOrEmpty()) return null;
183             SM4Context ctx = new SM4Context();
184             ctx.isPadding = true;
185             ctx.mode = Sm4.SM4_DECRYPT;
186 
187             byte[] keyBytes;
188             if (hexString)
189             {
190                 keyBytes = Hex.Decode(secretKey);
191             }
192             else
193             {
194                 keyBytes = Encoding.UTF8.GetBytes(secretKey);
195             }
196 
197             Sm4 sm4 = new Sm4();
198             sm4.sm4_setkey_dec(ctx, keyBytes);
199             byte[] decrypted = sm4.sm4_crypt_ecb(ctx, Base64.Decode(cipherText));
200             return Encoding.UTF8.GetString(decrypted);
201         }
202     }
203 
204     public class Sm4
205     {
206         public const int SM4_ENCRYPT = 1;
207         public const int SM4_DECRYPT = 0;
208 
209         private long GET_ULONG_BE(byte[] b, int i)
210         {
211             long n = (long)(b[i] & 0xff) << 24 | (long)((b[i + 1] & 0xff) << 16) | (long)((b[i + 2] & 0xff) << 8) | (long)(b[i + 3] & 0xff) & 0xffffffffL;
212             return n;
213         }
214         private void PUT_ULONG_BE(long n, byte[] b, int i)
215         {
216             b[i] = (byte)(int)(0xFF & n >> 24);
217             b[i + 1] = (byte)(int)(0xFF & n >> 16);
218             b[i + 2] = (byte)(int)(0xFF & n >> 8);
219             b[i + 3] = (byte)(int)(0xFF & n);
220         }
221         private long SHL(long x, int n)
222         {
223             return (x & 0xFFFFFFFF) << n;
224         }
225         private long ROTL(long x, int n)
226         {
227             return SHL(x, n) | x >> (32 - n);
228         }
229         private void SWAP(long[] sk, int i)
230         {
231             long t = sk[i];
232             sk[i] = sk[(31 - i)];
233             sk[(31 - i)] = t;
234         }
235         public byte[] SboxTable = new byte[] { (byte) 0xd6, (byte) 0x90, (byte) 0xe9, (byte) 0xfe,
236       (byte) 0xcc, (byte) 0xe1, 0x3d, (byte) 0xb7, 0x16, (byte) 0xb6,
237       0x14, (byte) 0xc2, 0x28, (byte) 0xfb, 0x2c, 0x05, 0x2b, 0x67,
238       (byte) 0x9a, 0x76, 0x2a, (byte) 0xbe, 0x04, (byte) 0xc3,
239       (byte) 0xaa, 0x44, 0x13, 0x26, 0x49, (byte) 0x86, 0x06,
240       (byte) 0x99, (byte) 0x9c, 0x42, 0x50, (byte) 0xf4, (byte) 0x91,
241       (byte) 0xef, (byte) 0x98, 0x7a, 0x33, 0x54, 0x0b, 0x43,
242       (byte) 0xed, (byte) 0xcf, (byte) 0xac, 0x62, (byte) 0xe4,
243       (byte) 0xb3, 0x1c, (byte) 0xa9, (byte) 0xc9, 0x08, (byte) 0xe8,
244       (byte) 0x95, (byte) 0x80, (byte) 0xdf, (byte) 0x94, (byte) 0xfa,
245       0x75, (byte) 0x8f, 0x3f, (byte) 0xa6, 0x47, 0x07, (byte) 0xa7,
246       (byte) 0xfc, (byte) 0xf3, 0x73, 0x17, (byte) 0xba, (byte) 0x83,
247       0x59, 0x3c, 0x19, (byte) 0xe6, (byte) 0x85, 0x4f, (byte) 0xa8,
248       0x68, 0x6b, (byte) 0x81, (byte) 0xb2, 0x71, 0x64, (byte) 0xda,
249       (byte) 0x8b, (byte) 0xf8, (byte) 0xeb, 0x0f, 0x4b, 0x70, 0x56,
250       (byte) 0x9d, 0x35, 0x1e, 0x24, 0x0e, 0x5e, 0x63, 0x58, (byte) 0xd1,
251       (byte) 0xa2, 0x25, 0x22, 0x7c, 0x3b, 0x01, 0x21, 0x78, (byte) 0x87,
252       (byte) 0xd4, 0x00, 0x46, 0x57, (byte) 0x9f, (byte) 0xd3, 0x27,
253       0x52, 0x4c, 0x36, 0x02, (byte) 0xe7, (byte) 0xa0, (byte) 0xc4,
254       (byte) 0xc8, (byte) 0x9e, (byte) 0xea, (byte) 0xbf, (byte) 0x8a,
255       (byte) 0xd2, 0x40, (byte) 0xc7, 0x38, (byte) 0xb5, (byte) 0xa3,
256       (byte) 0xf7, (byte) 0xf2, (byte) 0xce, (byte) 0xf9, 0x61, 0x15,
257       (byte) 0xa1, (byte) 0xe0, (byte) 0xae, 0x5d, (byte) 0xa4,
258       (byte) 0x9b, 0x34, 0x1a, 0x55, (byte) 0xad, (byte) 0x93, 0x32,
259       0x30, (byte) 0xf5, (byte) 0x8c, (byte) 0xb1, (byte) 0xe3, 0x1d,
260       (byte) 0xf6, (byte) 0xe2, 0x2e, (byte) 0x82, 0x66, (byte) 0xca,
261       0x60, (byte) 0xc0, 0x29, 0x23, (byte) 0xab, 0x0d, 0x53, 0x4e, 0x6f,
262       (byte) 0xd5, (byte) 0xdb, 0x37, 0x45, (byte) 0xde, (byte) 0xfd,
263       (byte) 0x8e, 0x2f, 0x03, (byte) 0xff, 0x6a, 0x72, 0x6d, 0x6c, 0x5b,
264       0x51, (byte) 0x8d, 0x1b, (byte) 0xaf, (byte) 0x92, (byte) 0xbb,
265       (byte) 0xdd, (byte) 0xbc, 0x7f, 0x11, (byte) 0xd9, 0x5c, 0x41,
266       0x1f, 0x10, 0x5a, (byte) 0xd8, 0x0a, (byte) 0xc1, 0x31,
267       (byte) 0x88, (byte) 0xa5, (byte) 0xcd, 0x7b, (byte) 0xbd, 0x2d,
268       0x74, (byte) 0xd0, 0x12, (byte) 0xb8, (byte) 0xe5, (byte) 0xb4,
269       (byte) 0xb0, (byte) 0x89, 0x69, (byte) 0x97, 0x4a, 0x0c,
270       (byte) 0x96, 0x77, 0x7e, 0x65, (byte) 0xb9, (byte) 0xf1, 0x09,
271       (byte) 0xc5, 0x6e, (byte) 0xc6, (byte) 0x84, 0x18, (byte) 0xf0,
272       0x7d, (byte) 0xec, 0x3a, (byte) 0xdc, 0x4d, 0x20, 0x79,
273       (byte) 0xee, 0x5f, 0x3e, (byte) 0xd7, (byte) 0xcb, 0x39, 0x48 };
274         public uint[] FK = { 0xa3b1bac6, 0x56aa3350, 0x677d9197, 0xb27022dc };
275         public uint[] CK = { 0x00070e15,0x1c232a31,0x383f464d,0x545b6269,
276                     0x70777e85,0x8c939aa1,0xa8afb6bd,0xc4cbd2d9,
277                     0xe0e7eef5,0xfc030a11,0x181f262d,0x343b4249,
278                     0x50575e65,0x6c737a81,0x888f969d,0xa4abb2b9,
279                     0xc0c7ced5,0xdce3eaf1,0xf8ff060d,0x141b2229,
280                     0x30373e45,0x4c535a61,0x686f767d,0x848b9299,
281                     0xa0a7aeb5,0xbcc3cad1,0xd8dfe6ed,0xf4fb0209,
282                     0x10171e25,0x2c333a41,0x484f565d,0x646b7279 };
283         private byte sm4Sbox(byte inch)
284         {
285             int i = inch & 0xFF;
286             byte retVal = SboxTable[i];
287             return retVal;
288         }
289         private long sm4Lt(long ka)
290         {
291             long bb = 0L;
292             long c = 0L;
293             byte[] a = new byte[4];
294             byte[] b = new byte[4];
295             PUT_ULONG_BE(ka, a, 0);
296             b[0] = sm4Sbox(a[0]);
297             b[1] = sm4Sbox(a[1]);
298             b[2] = sm4Sbox(a[2]);
299             b[3] = sm4Sbox(a[3]);
300             bb = GET_ULONG_BE(b, 0);
301             c = bb ^ ROTL(bb, 2) ^ ROTL(bb, 10) ^ ROTL(bb, 18) ^ ROTL(bb, 24);
302             return c;
303         }
304         private long sm4F(long x0, long x1, long x2, long x3, long rk)
305         {
306             return x0 ^ sm4Lt(x1 ^ x2 ^ x3 ^ rk);
307         }
308 
309         private long sm4CalciRK(long ka)
310         {
311             long bb = 0L;
312             long rk = 0L;
313             byte[] a = new byte[4];
314             byte[] b = new byte[4];
315             PUT_ULONG_BE(ka, a, 0);
316             b[0] = sm4Sbox(a[0]);
317             b[1] = sm4Sbox(a[1]);
318             b[2] = sm4Sbox(a[2]);
319             b[3] = sm4Sbox(a[3]);
320             bb = GET_ULONG_BE(b, 0);
321             rk = bb ^ ROTL(bb, 13) ^ ROTL(bb, 23);
322             return rk;
323         }
324 
325         private void sm4_setkey(long[] SK, byte[] key)
326         {
327             long[] MK = new long[4];
328             long[] k = new long[36];
329             int i = 0;
330             MK[0] = GET_ULONG_BE(key, 0);
331             MK[1] = GET_ULONG_BE(key, 4);
332             MK[2] = GET_ULONG_BE(key, 8);
333             MK[3] = GET_ULONG_BE(key, 12);
334             k[0] = MK[0] ^ (long)FK[0];
335             k[1] = MK[1] ^ (long)FK[1];
336             k[2] = MK[2] ^ (long)FK[2];
337             k[3] = MK[3] ^ (long)FK[3];
338             for (; i < 32; i++)
339             {
340                 k[(i + 4)] = (k[i] ^ sm4CalciRK(k[(i + 1)] ^ k[(i + 2)] ^ k[(i + 3)] ^ (long)CK[i]));
341                 SK[i] = k[(i + 4)];
342             }
343         }
344 
345         private void sm4_one_round(long[] sk, byte[] input, byte[] output)
346         {
347             int i = 0;
348             long[] ulbuf = new long[36];
349             ulbuf[0] = GET_ULONG_BE(input, 0);
350             ulbuf[1] = GET_ULONG_BE(input, 4);
351             ulbuf[2] = GET_ULONG_BE(input, 8);
352             ulbuf[3] = GET_ULONG_BE(input, 12);
353             while (i < 32)
354             {
355                 ulbuf[(i + 4)] = sm4F(ulbuf[i], ulbuf[(i + 1)], ulbuf[(i + 2)], ulbuf[(i + 3)], sk[i]);
356                 i++;
357             }
358             PUT_ULONG_BE(ulbuf[35], output, 0);
359             PUT_ULONG_BE(ulbuf[34], output, 4);
360             PUT_ULONG_BE(ulbuf[33], output, 8);
361             PUT_ULONG_BE(ulbuf[32], output, 12);
362         }
363 
364         private byte[] padding(byte[] input, int mode)
365         {
366             if (input == null)
367             {
368                 return null;
369             }
370 
371             byte[] ret = (byte[])null;
372             if (mode == SM4_ENCRYPT)
373             {
374                 int p = 16 - input.Length % 16;
375                 ret = new byte[input.Length + p];
376                 Array.Copy(input, 0, ret, 0, input.Length);
377                 for (int i = 0; i < p; i++)
378                 {
379                     ret[input.Length + i] = (byte)p;
380                 }
381             }
382             else
383             {
384                 int p = input[input.Length - 1];
385                 ret = new byte[input.Length - p];
386                 Array.Copy(input, 0, ret, 0, input.Length - p);
387             }
388             return ret;
389         }
390 
391         public void sm4_setkey_enc(SM4Context ctx, byte[] key)
392         {
393             ctx.mode = SM4_ENCRYPT;
394             sm4_setkey(ctx.sk, key);
395         }
396 
397         public void sm4_setkey_dec(SM4Context ctx, byte[] key)
398         {
399             int i = 0;
400             ctx.mode = SM4_DECRYPT;
401             sm4_setkey(ctx.sk, key);
402             for (i = 0; i < 16; i++)
403             {
404                 SWAP(ctx.sk, i);
405             }
406         }
407 
408         public byte[] sm4_crypt_ecb(SM4Context ctx, byte[] input)
409         {
410             if ((ctx.isPadding) && (ctx.mode == SM4_ENCRYPT))
411             {
412                 input = padding(input, SM4_ENCRYPT);
413             }
414 
415             int length = input.Length;
416             byte[] bins = new byte[length];
417             Array.Copy(input, 0, bins, 0, length);
418             byte[] bous = new byte[length];
419             for (int i = 0; length > 0; length -= 16, i++)
420             {
421                 byte[] inBytes = new byte[16];
422                 byte[] outBytes = new byte[16];
423                 Array.Copy(bins, i * 16, inBytes, 0, length > 16 ? 16 : length);
424                 sm4_one_round(ctx.sk, inBytes, outBytes);
425                 Array.Copy(outBytes, 0, bous, i * 16, length > 16 ? 16 : length);
426             }
427 
428             if (ctx.isPadding && ctx.mode == SM4_DECRYPT)
429             {
430                 bous = padding(bous, SM4_DECRYPT);
431             }
432             return bous;
433         }
434 
435         public byte[] sm4_crypt_cbc(SM4Context ctx, byte[] iv, byte[] input)
436         {
437             if (ctx.isPadding && ctx.mode == SM4_ENCRYPT)
438             {
439                 input = padding(input, SM4_ENCRYPT);
440             }
441 
442             int i = 0;
443             int length = input.Length;
444             byte[] bins = new byte[length];
445             Array.Copy(input, 0, bins, 0, length);
446             byte[] bous = null;
447             List<byte> bousList = new List<byte>();
448             if (ctx.mode == SM4_ENCRYPT)
449             {
450                 for (int j = 0; length > 0; length -= 16, j++)
451                 {
452                     byte[] inBytes = new byte[16];
453                     byte[] outBytes = new byte[16];
454                     byte[] out1 = new byte[16];
455                     Array.Copy(bins, j * 16, inBytes, 0, length > 16 ? 16 : length);
456                     for (i = 0; i < 16; i++)
457                     {
458                         outBytes[i] = ((byte)(inBytes[i] ^ iv[i]));
459                     }
460                     sm4_one_round(ctx.sk, outBytes, out1);
461                     Array.Copy(out1, 0, iv, 0, 16);
462                     for (int k = 0; k < 16; k++)
463                     {
464                         bousList.Add(out1[k]);
465                     }
466                 }
467             }
468             else
469             {
470                 byte[] temp = new byte[16];
471                 for (int j = 0; length > 0; length -= 16, j++)
472                 {
473                     byte[] inBytes = new byte[16];
474                     byte[] outBytes = new byte[16];
475                     byte[] out1 = new byte[16];
476 
477 
478                     Array.Copy(bins, i * 16, inBytes, 0, length > 16 ? 16 : length);
479                     Array.Copy(inBytes, 0, temp, 0, 16);
480                     sm4_one_round(ctx.sk, inBytes, outBytes);
481                     for (i = 0; i < 16; i++)
482                     {
483                         out1[i] = ((byte)(outBytes[i] ^ iv[i]));
484                     }
485                     Array.Copy(temp, 0, iv, 0, 16);
486                     for (int k = 0; k < 16; k++)
487                     {
488                         bousList.Add(out1[k]);
489                     }
490                 }
491             }
492             if (ctx.isPadding && ctx.mode == SM4_DECRYPT)
493             {
494                 bous = padding(bousList.ToArray(), SM4_DECRYPT);
495                 return bous;
496             }
497             else
498             {
499                 return bousList.ToArray();
500             }
501         }
502     }
503 
504     public class SM4Context
505     {
506         public int mode;
507         public long[] sk;
508         public bool isPadding;
509         public SM4Context()
510         {
511             this.mode = 1;
512             this.isPadding = true;
513             this.sk = new long[32];
514         }
515     }
516 }

 

标签:Core,sm4,16,SM4,ctx,long,new,byte,加密算法
来源: https://www.cnblogs.com/iainYang/p/16106581.html

本站声明: 1. iCode9 技术分享网(下文简称本站)提供的所有内容,仅供技术学习、探讨和分享;
2. 关于本站的所有留言、评论、转载及引用,纯属内容发起人的个人观点,与本站观点和立场无关;
3. 关于本站的所有言论和文字,纯属内容发起人的个人观点,与本站观点和立场无关;
4. 本站文章均是网友提供,不完全保证技术分享内容的完整性、准确性、时效性、风险性和版权归属;如您发现该文章侵犯了您的权益,可联系我们第一时间进行删除;
5. 本站为非盈利性的个人网站,所有内容不会用来进行牟利,也不会利用任何形式的广告来间接获益,纯粹是为了广大技术爱好者提供技术内容和技术思想的分享性交流网站。

专注分享技术,共同学习,共同进步。侵权联系[81616952@qq.com]

Copyright (C)ICode9.com, All Rights Reserved.

ICode9版权所有