/=============================================
欢迎转载,但请保留以下声名
说明:文件上传类
创建时间:2005-7-23
作者:刀尖客 QQ:51978456 MSN:[email protected]
===============================================/
在.net中,由于.net framework 封装了常见的加密算法,因此实现标准的MD5算法只需要短短几行代码即可实现:
public string Md5(string strPassword)
{
MD5CryptoServiceProvider hashmd5;
hashmd5 = new MD5CryptoServiceProvider();
return BitConverter.ToString(hashmd5.ComputeHash(Encoding.Default.GetBytes(strPassword))).Replace("-","").ToLower();
}
,但是当加密字符串含有中文或者其它双字节字符时,这种算法的结果与目前网上流行的ASP写的MD5算法的结果却不一致,这主要是由于目前网上流行的ASP写的MD5加密算法,存在一个缺陷,它使用了mid函数,取出的是“字符”,而正确的做法应该是取出字节,因此当加密字符串有双字节字符时,结果会与标准的MD5算法不一致.。但是由于在ASP向ASP.net的系统进行升级的过程中,已经向数据库内写入了大量以前ASP算法加密的密码,为了使新系统能够与原来的系统完全兼容,因此只有在.net 环境下实现与原来ASP算法完全一致的MD5算法。我的实现思路如下:
1、先用正则表达式对要加密的字符串进行判断,是否含有双字节字符。
2、如果含有双字节字符,调用实现与ASP算法一致的非托管COM组件进行处理。(这个组件只需要将原ASP加密算法代码进行适当修改,然后加入VB6中进行编译即可得到)。
3、否则直接调用.net的标准MD5加密算法。
可能有的朋友会问到,为什么不都直接调用COM组件来加密呢?这主要是从性能角度考虑的,由于调用非托管COM组件,.net需要生成一个代理类与之交互,所以在性能方面要远远低于.net内置的函数。
下面给出所有代码:
原ASP加密代码:
1
2
3
4Private Const BITS_TO_A_BYTE = 8
5Private Const BYTES_TO_A_WORD = 4
6Private Const BITS_TO_A_WORD = 32
7
8Private m_lOnBits(30)
9Private m_l2Power(30)
10
11m_lOnBits(0) = CLng(1)
12m_lOnBits(1) = CLng(3)
13m_lOnBits(2) = CLng(7)
14m_lOnBits(3) = CLng(15)
15m_lOnBits(4) = CLng(31)
16m_lOnBits(5) = CLng(63)
17m_lOnBits(6) = CLng(127)
18m_lOnBits(7) = CLng(255)
19m_lOnBits(8) = CLng(511)
20m_lOnBits(9) = CLng(1023)
21m_lOnBits(10) = CLng(2047)
22m_lOnBits(11) = CLng(4095)
23m_lOnBits(12) = CLng(8191)
24m_lOnBits(13) = CLng(16383)
25m_lOnBits(14) = CLng(32767)
26m_lOnBits(15) = CLng(65535)
27m_lOnBits(16) = CLng(131071)
28m_lOnBits(17) = CLng(262143)
29m_lOnBits(18) = CLng(524287)
30m_lOnBits(19) = CLng(1048575)
31m_lOnBits(20) = CLng(2097151)
32m_lOnBits(21) = CLng(4194303)
33m_lOnBits(22) = CLng(8388607)
34m_lOnBits(23) = CLng(16777215)
35m_lOnBits(24) = CLng(33554431)
36m_lOnBits(25) = CLng(67108863)
37m_lOnBits(26) = CLng(134217727)
38m_lOnBits(27) = CLng(268435455)
39m_lOnBits(28) = CLng(536870911)
40m_lOnBits(29) = CLng(1073741823)
41m_lOnBits(30) = CLng(2147483647)
42
43m_l2Power(0) = CLng(1)
44m_l2Power(1) = CLng(2)
45m_l2Power(2) = CLng(4)
46m_l2Power(3) = CLng(8)
47m_l2Power(4) = CLng(16)
48m_l2Power(5) = CLng(32)
49m_l2Power(6) = CLng(64)
50m_l2Power(7) = CLng(128)
51m_l2Power(8) = CLng(256)
52m_l2Power(9) = CLng(512)
53m_l2Power(10) = CLng(1024)
54m_l2Power(11) = CLng(2048)
55m_l2Power(12) = CLng(4096)
56m_l2Power(13) = CLng(8192)
57m_l2Power(14) = CLng(16384)
58m_l2Power(15) = CLng(32768)
59m_l2Power(16) = CLng(65536)
60m_l2Power(17) = CLng(131072)
61m_l2Power(18) = CLng(262144)
62m_l2Power(19) = CLng(524288)
63m_l2Power(20) = CLng(1048576)
64m_l2Power(21) = CLng(2097152)
65m_l2Power(22) = CLng(4194304)
66m_l2Power(23) = CLng(8388608)
67m_l2Power(24) = CLng(16777216)
68m_l2Power(25) = CLng(33554432)
69m_l2Power(26) = CLng(67108864)
70m_l2Power(27) = CLng(134217728)
71m_l2Power(28) = CLng(268435456)
72m_l2Power(29) = CLng(536870912)
73m_l2Power(30) = CLng(1073741824)
74
75Private Function LShift(lValue, iShiftBits)
76If iShiftBits = 0 Then
77LShift = lValue
78Exit Function
79ElseIf iShiftBits = 31 Then
80If lValue And 1 Then
81LShift = &H80000000
82Else
83LShift = 0
84End If
85Exit Function
86ElseIf iShiftBits < 0 Or iShiftBits > 31 Then
87Err.Raise 6
88End If
89
90If (lValue And m_l2Power(31 - iShiftBits)) Then
91LShift = ((lValue And m_lOnBits(31 - (iShiftBits + 1))) * m_l2Power(iShiftBits)) Or &H80000000
92Else
93LShift = ((lValue And m_lOnBits(31 - iShiftBits)) * m_l2Power(iShiftBits))
94End If
95End Function
96
97Private Function RShift(lValue, iShiftBits)
98If iShiftBits = 0 Then
99RShift = lValue
100Exit Function
101ElseIf iShiftBits = 31 Then
102If lValue And &H80000000 Then
103RShift = 1
104Else
105RShift = 0
106End If
107Exit Function
108ElseIf iShiftBits < 0 Or iShiftBits > 31 Then
109Err.Raise 6
110End If
111
112RShift = (lValue And &H7FFFFFFE) \ m_l2Power(iShiftBits)
113
114If (lValue And &H80000000) Then
115RShift = (RShift Or (&H40000000 \ m_l2Power(iShiftBits - 1)))
116End If
117End Function
118
119Private Function RotateLeft(lValue, iShiftBits)
120RotateLeft = LShift(lValue, iShiftBits) Or RShift(lValue, (32 - iShiftBits))
121End Function
122
123Private Function AddUnsigned(lX, lY)
124Dim lX4
125Dim lY4
126Dim lX8
127Dim lY8
128Dim lResult
129
130lX8 = lX And &H80000000
131lY8 = lY And &H80000000
132lX4 = lX And &H40000000
133lY4 = lY And &H40000000
134
135lResult = (lX And &H3FFFFFFF) + (lY And &H3FFFFFFF)
136
137If lX4 And lY4 Then
138lResult = lResult Xor &H80000000 Xor lX8 Xor lY8
139ElseIf lX4 Or lY4 Then
140If lResult And &H40000000 Then
141lResult = lResult Xor &HC0000000 Xor lX8 Xor lY8
142Else
143lResult = lResult Xor &H40000000 Xor lX8 Xor lY8
144End If
145Else
146lResult = lResult Xor lX8 Xor lY8
147End If
148
149AddUnsigned = lResult
150End Function
151
152Private Function F(x, y, z)
153F = (x And y) Or ((Not x) And z)
154End Function
155
156Private Function G(x, y, z)
157G = (x And z) Or (y And (Not z))
158End Function
159
160Private Function H(x, y, z)
161H = (x Xor y Xor z)
162End Function
163
164Private Function I(x, y, z)
165I = (y Xor (x Or (Not z)))
166End Function
167
168Private Sub FF(a, b, c, d, x, s, ac)
169a = AddUnsigned(a, AddUnsigned(AddUnsigned(F(b, c, d), x), ac))
170a = RotateLeft(a, s)
171a = AddUnsigned(a, b)
172End Sub
173
174Private Sub GG(a, b, c, d, x, s, ac)
175a = AddUnsigned(a, AddUnsigned(AddUnsigned(G(b, c, d), x), ac))
176a = RotateLeft(a, s)
177a = AddUnsigned(a, b)
178End Sub
179
180Private Sub HH(a, b, c, d, x, s, ac)
181a = AddUnsigned(a, AddUnsigned(AddUnsigned(H(b, c, d), x), ac))
182a = RotateLeft(a, s)
183a = AddUnsigned(a, b)
184End Sub
185
186Private Sub II(a, b, c, d, x, s, ac)
187a = AddUnsigned(a, AddUnsigned(AddUnsigned(I(b, c, d), x), ac))
188a = RotateLeft(a, s)
189a = AddUnsigned(a, b)
190End Sub
191
192Private Function ConvertToWordArray(sMessage)
193Dim lMessageLength
194Dim lNumberOfWords
195Dim lWordArray()
196Dim lBytePosition
197Dim lByteCount
198Dim lWordCount
199
200Const MODULUS_BITS = 512
201Const CONGRUENT_BITS = 448
202
203lMessageLength = Len(sMessage)
204
205lNumberOfWords = (((lMessageLength + ((MODULUS_BITS - CONGRUENT_BITS) \ BITS_TO_A_BYTE)) \ (MODULUS_BITS \ BITS_TO_A_BYTE)) + 1) * (MODULUS_BITS \ BITS_TO_A_WORD)
206ReDim lWordArray(lNumberOfWords - 1)
207
208lBytePosition = 0
209lByteCount = 0
210Do Until lByteCount >= lMessageLength
211lWordCount = lByteCount \ BYTES_TO_A_WORD
212lBytePosition = (lByteCount Mod BYTES_TO_A_WORD) * BITS_TO_A_BYTE
213lWordArray(lWordCount) = lWordArray(lWordCount) Or LShift(Asc(Mid(sMessage, lByteCount + 1, 1)), lBytePosition)
214lByteCount = lByteCount + 1
215Loop
216
217lWordCount = lByteCount \ BYTES_TO_A_WORD
218lBytePosition = (lByteCount Mod BYTES_TO_A_WORD) * BITS_TO_A_BYTE
219
220lWordArray(lWordCount) = lWordArray(lWordCount) Or LShift(&H80, lBytePosition)
221
222lWordArray(lNumberOfWords - 2) = LShift(lMessageLength, 3)
223lWordArray(lNumberOfWords - 1) = RShift(lMessageLength, 29)
224
225ConvertToWordArray = lWordArray
226End Function
227
228Private Function WordToHex(lValue)
229Dim lByte
230Dim lCount
231
232For lCount = 0 To 3
233lByte = RShift(lValue, lCount * BITS_TO_A_BYTE) And m_lOnBits(BITS_TO_A_BYTE - 1)
234WordToHex = WordToHex & Right("0" & Hex(lByte), 2)
235Next
236End Function
237
238Public Function calcMD5(sMessage)
239Dim x
240Dim k
241Dim AA
242Dim BB
243Dim CC
244Dim DD
245Dim a
246Dim b
247Dim c
248Dim d
249
250Const S11 = 7
251Const S12 = 12
252Const S13 = 17
253Const S14 = 22
254Const S21 = 5
255Const S22 = 9
256Const S23 = 14
257Const S24 = 20
258Const S31 = 4
259Const S32 = 11
260Const S33 = 16
261Const S34 = 23
262Const S41 = 6
263Const S42 = 10
264Const S43 = 15
265Const S44 = 21
266
267x = ConvertToWordArray(sMessage)
268
269a = &H67452301
270b = &HEFCDAB89
271c = &H98BADCFE
272d = &H10325476
273
274For k = 0 To UBound(x) Step 16
275AA = a
276BB = b
277CC = c
278DD = d
279
280FF a, b, c, d, x(k + 0), S11, &HD76AA478
281FF d, a, b, c, x(k + 1), S12, &HE8C7B756
282FF c, d, a, b, x(k + 2), S13, &H242070DB
283FF b, c, d, a, x(k + 3), S14, &HC1BDCEEE
284FF a, b, c, d, x(k + 4), S11, &HF57C0FAF
285FF d, a, b, c, x(k + 5), S12, &H4787C62A
286FF c, d, a, b, x(k + 6), S13, &HA8304613
287FF b, c, d, a, x(k + 7), S14, &HFD469501
288FF a, b, c, d, x(k + 8), S11, &H698098D8
289FF d, a, b, c, x(k + 9), S12, &H8B44F7AF
290FF c, d, a, b, x(k + 10), S13, &HFFFF5BB1
291FF b, c, d, a, x(k + 11), S14, &H895CD7BE
292FF a, b, c, d, x(k + 12), S11, &H6B901122
293FF d, a, b, c, x(k + 13), S12, &HFD987193
294FF c, d, a, b, x(k + 14), S13, &HA679438E
295FF b, c, d, a, x(k + 15), S14, &H49B40821
296
297GG a, b, c, d, x(k + 1), S21, &HF61E2562
298GG d, a, b, c, x(k + 6), S22, &HC040B340
299GG c, d, a, b, x(k + 11), S23, &H265E5A51
300GG b, c, d, a, x(k + 0), S24, &HE9B6C7AA
301GG a, b, c, d, x(k + 5), S21, &HD62F105D
302GG d, a, b, c, x(k + 10), S22, &H2441453
303GG c, d, a, b, x(k + 15), S23, &HD8A1E681
304GG b, c, d, a, x(k + 4), S24, &HE7D3FBC8
305GG a, b, c, d, x(k + 9), S21, &H21E1CDE6
306GG d, a, b, c, x(k + 14), S22, &HC33707D6
307GG c, d, a, b, x(k + 3), S23, &HF4D50D87
308GG b, c, d, a, x(k + 8), S24, &H455A14ED
309GG a, b, c, d, x(k + 13), S21, &HA9E3E905
310GG d, a, b, c, x(k + 2), S22, &HFCEFA3F8
311GG c, d, a, b, x(k + 7), S23, &H676F02D9
312GG b, c, d, a, x(k + 12), S24, &H8D2A4C8A
313
314HH a, b, c, d, x(k + 5), S31, &HFFFA3942
315HH d, a, b, c, x(k + 8), S32, &H8771F681
316HH c, d, a, b, x(k + 11), S33, &H6D9D6122
317HH b, c, d, a, x(k + 14), S34, &HFDE5380C
318HH a, b, c, d, x(k + 1), S31, &HA4BEEA44
319HH d, a, b, c, x(k + 4), S32, &H4BDECFA9
320HH c, d, a, b, x(k + 7), S33, &HF6BB4B60
321HH b, c, d, a, x(k + 10), S34, &HBEBFBC70
322HH a, b, c, d, x(k + 13), S31, &H289B7EC6
323HH d, a, b, c, x(k + 0), S32, &HEAA127FA
324HH c, d, a, b, x(k + 3), S33, &HD4EF3085
325HH b, c, d, a, x(k + 6), S34, &H4881D05
326HH a, b, c, d, x(k + 9), S31, &HD9D4D039
327HH d, a, b, c, x(k + 12), S32, &HE6DB99E5
328HH c, d, a, b, x(k + 15), S33, &H1FA27CF8
329HH b, c, d, a, x(k + 2), S34, &HC4AC5665
330
331II a, b, c, d, x(k + 0), S41, &HF4292244
332II d, a, b, c, x(k + 7), S42, &H432AFF97
333II c, d, a, b, x(k + 14), S43, &HAB9423A7
334II b, c, d, a, x(k + 5), S44, &HFC93A039
335II a, b, c, d, x(k + 12), S41, &H655B59C3
336II d, a, b, c, x(k + 3), S42, &H8F0CCC92
337II c, d, a, b, x(k + 10), S43, &HFFEFF47D
338II b, c, d, a, x(k + 1), S44, &H85845DD1
339II a, b, c, d, x(k + 8), S41, &H6FA87E4F
340II d, a, b, c, x(k + 15), S42, &HFE2CE6E0
341II c, d, a, b, x(k + 6), S43, &HA3014314
342II b, c, d, a, x(k + 13), S44, &H4E0811A1
343II a, b, c, d, x(k + 4), S41, &HF7537E82
344II d, a, b, c, x(k + 11), S42, &HBD3AF235
345II c, d, a, b, x(k + 2), S43, &H2AD7D2BB
346II b, c, d, a, x(k + 9), S44, &HEB86D391
347
348a = AddUnsigned(a, AA)
349b = AddUnsigned(b, BB)
350c = AddUnsigned(c, CC)
351d = AddUnsigned(d, DD)
352Next
353
354calcMD5 = LCase(WordToHex(a) & WordToHex(b) & WordToHex(c) & WordToHex(d))
355End Function
这段代码,只需要复制到VB ActiveX DLL项目中,将变量初始化的代码移到类初始化的位置编译即可生成同样算法的非托管COM组件。
在.net中,引用COM组件,并使用如下方法进行调用:
using System;
using System.Text;
using System.Text.RegularExpressions;
using System.Security.Cryptography;
using MD5;
namespace YourNameSpace
{
public class ASPMD5
{
///
1<summary>
2/// 与ASP兼容的MD5加密算法
3/// </summary>
///
1<param name="strPassword"/>
///
1<returns></returns>
public string Md5(string strPassword)
{
System.Text.RegularExpressions.Regex RegExp = new Regex(@"[^x00-xff]"); //匹配汉字
if(RegExp.IsMatch(strPassword))
{
//引用COM组件,实现与ASP兼容的MD5算法
MD5.SecurityMD5Class obj = new SecurityMD5Class(); //注意:在VB类模块里,这里的类名为SecurityMD5Class
return obj. calcMD5(strPassword).ToLower();
}
else
{
//标准MD5算法
MD5CryptoServiceProvider hashmd5;
hashmd5 = new MD5CryptoServiceProvider();
return BitConverter.ToString(hashmd5.ComputeHash(Encoding.Default.GetBytes(strPassword))).Replace("-","").ToLower();
}
}
}
}
由于时间仓促,可能文章中有写得不够准确的地方,欢迎批评指正,同时如果其它朋友有更好的实现方法,欢迎来信交流。
由于时间仓促,可能文章中有写得不够准确的地方,欢迎批评指正,同时如果其它朋友有更好的实现方法,欢迎来信交流。