⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 md5.c

📁 华硕无线网卡 167G linux 驱动
💻 C
📖 第 1 页 / 共 3 页
字号:
}/* =========================  SHA-1 implementation ========================== */// four base functions for SHA-1#define SHA1_F1(b, c, d)    (((b) & (c)) | ((~b) & (d)))         #define SHA1_F2(b, c, d)    ((b) ^ (c) ^ (d)) #define SHA1_F3(b, c, d)    (((b) & (c)) | ((b) & (d)) | ((c) & (d)))#define SHA1Step(f, a, b, c, d, e, w, k)    \    ( e	+= ( f(b, c, d) + w + k + CYCLIC_LEFT_SHIFT(a, 5)) & 0xffffffff, \      b = CYCLIC_LEFT_SHIFT(b, 30) )//Initiate SHA-1 Context satisfied in RFC 3174  VOID SHAInit(SHA_CTX *pCtx){    pCtx->Buf[0]=0x67452301;    pCtx->Buf[1]=0xefcdab89;    pCtx->Buf[2]=0x98badcfe;    pCtx->Buf[3]=0x10325476;    pCtx->Buf[4]=0xc3d2e1f0;        pCtx->LenInBitCount[0]=0;    pCtx->LenInBitCount[1]=0;}/* *  Function Description: *      Update SHA-1 Context, allow of an arrary of octets as the next *      portion of the message *       *  Arguments: *      pCtx		Pointer	to SHA-1 context * 	    pData       Pointer to input data *      LenInBytes  The length of input data (unit: byte) * *  Return Value: *      error       indicate more than pow(2,64) bits of data   * *  Note: *      Called after SHAInit or SHAUpdate(itself)    */UCHAR SHAUpdate(SHA_CTX *pCtx, UCHAR *pData, ULONG LenInBytes){    ULONG TfTimes;    ULONG temp1,temp2;	unsigned int i;	UCHAR err=1;        temp1 = pCtx->LenInBitCount[0];    temp2 = pCtx->LenInBitCount[1];    pCtx->LenInBitCount[0] = (ULONG) (pCtx->LenInBitCount[0] + (LenInBytes << 3));    if (pCtx->LenInBitCount[0] < temp1)        pCtx->LenInBitCount[1]++;   //carry in    pCtx->LenInBitCount[1] = (ULONG) (pCtx->LenInBitCount[1] +(LenInBytes >> 29));    if (pCtx->LenInBitCount[1] < temp2)        return (err);   //check total length of original data     // mod 64 bytes    temp1 = (temp1 >> 3) & 0x3f;          // process lacks of 64-byte data     if (temp1)     {        UCHAR *pAds = (UCHAR *) pCtx->Input + temp1;                if ((temp1+LenInBytes) < 64)        {            memcpy(pAds, (UCHAR *)pData, LenInBytes);            return (0);        }                memcpy(pAds, (UCHAR *)pData, 64-temp1);                memset((UCHAR *)pCtx->Input + 64, 0, 16);        SHATransform(pCtx->Buf, (ULONG *)pCtx->Input);        pData += 64-temp1;        LenInBytes -= 64-temp1;     } // end of if (temp1)             TfTimes = (LenInBytes >> 6);    for (i=TfTimes; i>0; i--)    {        memcpy(pCtx->Input, (UCHAR *)pData, 64);                memset((UCHAR *)pCtx->Input + 64, 0, 16);        SHATransform(pCtx->Buf, (ULONG *)pCtx->Input);        pData += 64;        LenInBytes -= 64;    } // end of for    // buffering lacks of 64-byte data    if(LenInBytes)        memcpy(pCtx->Input, (UCHAR *)pData, LenInBytes);	return (0);}// Append padding bits and length of original message in the tail // The message digest has to be completed in the end VOID SHAFinal(SHA_CTX *pCtx, UCHAR Digest[20]){    UCHAR Remainder;    UCHAR PadLenInBytes;    UCHAR *pAppend=0;    unsigned int i;    Remainder = (UCHAR)((pCtx->LenInBitCount[0] >> 3) & 0x3f);    pAppend = (UCHAR *)pCtx->Input + Remainder;    PadLenInBytes = (Remainder < 56) ? (56-Remainder) : (120-Remainder);        // padding bits without crossing block(64-byte based) boundary    if (Remainder < 56)    {               *pAppend = 0x80;        PadLenInBytes --;                memset((UCHAR *)pCtx->Input + Remainder+1, 0, PadLenInBytes);		 		// add data-length field, from high to low        for (i=0; i<4; i++)        {        	pCtx->Input[56+i] = (UCHAR)((pCtx->LenInBitCount[1] >> ((3-i) << 3)) & 0xff);        	pCtx->Input[60+i] = (UCHAR)((pCtx->LenInBitCount[0] >> ((3-i) << 3)) & 0xff);      	}      	        memset((UCHAR *)pCtx->Input + 64, 0, 14);        SHATransform(pCtx->Buf, (ULONG *)pCtx->Input);    } // end of if        // padding bits with crossing block(64-byte based) boundary    else    {        // the first block ===        *pAppend = 0x80;        PadLenInBytes --;                memset((UCHAR *)pCtx->Input + Remainder+1, 0, (64-Remainder-1));        PadLenInBytes -= (64 - Remainder - 1);                memset((UCHAR *)pCtx->Input + 64, 0, 16);        SHATransform(pCtx->Buf, (ULONG *)pCtx->Input);        // the second block ===        memset((UCHAR *)pCtx->Input, 0, PadLenInBytes);					// add data-length field		for (i=0; i<4; i++)        {        	pCtx->Input[56+i] = (UCHAR)((pCtx->LenInBitCount[1] >> ((3-i) << 3)) & 0xff);        	pCtx->Input[60+i] = (UCHAR)((pCtx->LenInBitCount[0] >> ((3-i) << 3)) & 0xff);      	}      	        memset((UCHAR *)pCtx->Input + 64, 0, 16);        SHATransform(pCtx->Buf, (ULONG *)pCtx->Input);    } // end of else			    //Output, bytereverse    for (i=0; i<20; i++)    {        Digest [i] = (UCHAR)(pCtx->Buf[i>>2] >> 8*(3-(i & 0x3)));    }        memset(pCtx, 0, sizeof(pCtx)); // memory free}// The central algorithm of SHA-1, consists of four rounds and // twenty steps per roundVOID SHATransform(ULONG Buf[5], ULONG Mes[20]){    ULONG Reg[5],Temp; 	unsigned int i;    ULONG W[80];        static ULONG SHA1Table[4] = { 0x5a827999, 0x6ed9eba1,                                   0x8f1bbcdc, 0xca62c1d6 };     Reg[0]=Buf[0];	Reg[1]=Buf[1];	Reg[2]=Buf[2];	Reg[3]=Buf[3];	Reg[4]=Buf[4];    //the first octet of a word is stored in the 0th element, bytereverse	for(i = 0; i < 16; i++)    {     	W[i]  = (Mes[i] >> 24) & 0xff;        W[i] |= (Mes[i] >> 8 ) & 0xff00;        W[i] |= (Mes[i] << 8 ) & 0xff0000;        W[i] |= (Mes[i] << 24) & 0xff000000;    }    		     for	(i = 0; i < 64; i++)	    W[16+i] = CYCLIC_LEFT_SHIFT(W[i] ^ W[2+i] ^ W[8+i] ^ W[13+i], 1);	            // 80 steps in SHA-1 algorithm    for (i=0; i<80; i++)                        {        if (i<20)            SHA1Step(SHA1_F1, Reg[0], Reg[1], Reg[2], Reg[3], Reg[4],                      W[i], SHA1Table[0]);                else if (i>=20 && i<40)            SHA1Step(SHA1_F2, Reg[0], Reg[1], Reg[2], Reg[3], Reg[4],                      W[i], SHA1Table[1]);					else if (i>=40 && i<60)            SHA1Step(SHA1_F3, Reg[0], Reg[1], Reg[2], Reg[3], Reg[4],                       W[i], SHA1Table[2]);			        else            SHA1Step(SHA1_F2, Reg[0], Reg[1], Reg[2], Reg[3], Reg[4],                      W[i], SHA1Table[3]);			       // one-word right shift		Temp   = Reg[4];        Reg[4] = Reg[3];        Reg[3] = Reg[2];        Reg[2] = Reg[1];        Reg[1] = Reg[0];        Reg[0] = Temp;             } // end of for-loop    // (temporary)output    for (i=0; i<5; i++)        Buf[i] += Reg[i];    }/* =========================  AES En/Decryption ========================== *//* forward S-box */static uint32 FSb[256] ={	0x63, 0x7C,	0x77, 0x7B,	0xF2, 0x6B,	0x6F, 0xC5,	0x30, 0x01,	0x67, 0x2B,	0xFE, 0xD7,	0xAB, 0x76,	0xCA, 0x82,	0xC9, 0x7D,	0xFA, 0x59,	0x47, 0xF0,	0xAD, 0xD4,	0xA2, 0xAF,	0x9C, 0xA4,	0x72, 0xC0,	0xB7, 0xFD,	0x93, 0x26,	0x36, 0x3F,	0xF7, 0xCC,	0x34, 0xA5,	0xE5, 0xF1,	0x71, 0xD8,	0x31, 0x15,	0x04, 0xC7,	0x23, 0xC3,	0x18, 0x96,	0x05, 0x9A,	0x07, 0x12,	0x80, 0xE2,	0xEB, 0x27,	0xB2, 0x75,	0x09, 0x83,	0x2C, 0x1A,	0x1B, 0x6E,	0x5A, 0xA0,	0x52, 0x3B,	0xD6, 0xB3,	0x29, 0xE3,	0x2F, 0x84,	0x53, 0xD1,	0x00, 0xED,	0x20, 0xFC,	0xB1, 0x5B,	0x6A, 0xCB,	0xBE, 0x39,	0x4A, 0x4C,	0x58, 0xCF,	0xD0, 0xEF,	0xAA, 0xFB,	0x43, 0x4D,	0x33, 0x85,	0x45, 0xF9,	0x02, 0x7F,	0x50, 0x3C,	0x9F, 0xA8,	0x51, 0xA3,	0x40, 0x8F,	0x92, 0x9D,	0x38, 0xF5,	0xBC, 0xB6,	0xDA, 0x21,	0x10, 0xFF,	0xF3, 0xD2,	0xCD, 0x0C,	0x13, 0xEC,	0x5F, 0x97,	0x44, 0x17,	0xC4, 0xA7,	0x7E, 0x3D,	0x64, 0x5D,	0x19, 0x73,	0x60, 0x81,	0x4F, 0xDC,	0x22, 0x2A,	0x90, 0x88,	0x46, 0xEE,	0xB8, 0x14,	0xDE, 0x5E,	0x0B, 0xDB,	0xE0, 0x32,	0x3A, 0x0A,	0x49, 0x06,	0x24, 0x5C,	0xC2, 0xD3,	0xAC, 0x62,	0x91, 0x95,	0xE4, 0x79,	0xE7, 0xC8,	0x37, 0x6D,	0x8D, 0xD5,	0x4E, 0xA9,	0x6C, 0x56,	0xF4, 0xEA,	0x65, 0x7A,	0xAE, 0x08,	0xBA, 0x78,	0x25, 0x2E,	0x1C, 0xA6,	0xB4, 0xC6,	0xE8, 0xDD,	0x74, 0x1F,	0x4B, 0xBD,	0x8B, 0x8A,	0x70, 0x3E,	0xB5, 0x66,	0x48, 0x03,	0xF6, 0x0E,	0x61, 0x35,	0x57, 0xB9,	0x86, 0xC1,	0x1D, 0x9E,	0xE1, 0xF8,	0x98, 0x11,	0x69, 0xD9,	0x8E, 0x94,	0x9B, 0x1E,	0x87, 0xE9,	0xCE, 0x55,	0x28, 0xDF,	0x8C, 0xA1,	0x89, 0x0D,	0xBF, 0xE6,	0x42, 0x68,	0x41, 0x99,	0x2D, 0x0F,	0xB0, 0x54,	0xBB, 0x16};/* forward table */#define	FT \\	V(C6,63,63,A5),	V(F8,7C,7C,84),	V(EE,77,77,99),	V(F6,7B,7B,8D),	\	V(FF,F2,F2,0D),	V(D6,6B,6B,BD),	V(DE,6F,6F,B1),	V(91,C5,C5,54),	\	V(60,30,30,50),	V(02,01,01,03),	V(CE,67,67,A9),	V(56,2B,2B,7D),	\	V(E7,FE,FE,19),	V(B5,D7,D7,62),	V(4D,AB,AB,E6),	V(EC,76,76,9A),	\	V(8F,CA,CA,45),	V(1F,82,82,9D),	V(89,C9,C9,40),	V(FA,7D,7D,87),	\	V(EF,FA,FA,15),	V(B2,59,59,EB),	V(8E,47,47,C9),	V(FB,F0,F0,0B),	\	V(41,AD,AD,EC),	V(B3,D4,D4,67),	V(5F,A2,A2,FD),	V(45,AF,AF,EA),	\	V(23,9C,9C,BF),	V(53,A4,A4,F7),	V(E4,72,72,96),	V(9B,C0,C0,5B),	\	V(75,B7,B7,C2),	V(E1,FD,FD,1C),	V(3D,93,93,AE),	V(4C,26,26,6A),	\	V(6C,36,36,5A),	V(7E,3F,3F,41),	V(F5,F7,F7,02),	V(83,CC,CC,4F),	\	V(68,34,34,5C),	V(51,A5,A5,F4),	V(D1,E5,E5,34),	V(F9,F1,F1,08),	\	V(E2,71,71,93),	V(AB,D8,D8,73),	V(62,31,31,53),	V(2A,15,15,3F),	\	V(08,04,04,0C),	V(95,C7,C7,52),	V(46,23,23,65),	V(9D,C3,C3,5E),	\	V(30,18,18,28),	V(37,96,96,A1),	V(0A,05,05,0F),	V(2F,9A,9A,B5),	\	V(0E,07,07,09),	V(24,12,12,36),	V(1B,80,80,9B),	V(DF,E2,E2,3D),	\	V(CD,EB,EB,26),	V(4E,27,27,69),	V(7F,B2,B2,CD),	V(EA,75,75,9F),	\	V(12,09,09,1B),	V(1D,83,83,9E),	V(58,2C,2C,74),	V(34,1A,1A,2E),	\	V(36,1B,1B,2D),	V(DC,6E,6E,B2),	V(B4,5A,5A,EE),	V(5B,A0,A0,FB),	\	V(A4,52,52,F6),	V(76,3B,3B,4D),	V(B7,D6,D6,61),	V(7D,B3,B3,CE),	\	V(52,29,29,7B),	V(DD,E3,E3,3E),	V(5E,2F,2F,71),	V(13,84,84,97),	\	V(A6,53,53,F5),	V(B9,D1,D1,68),	V(00,00,00,00),	V(C1,ED,ED,2C),	\	V(40,20,20,60),	V(E3,FC,FC,1F),	V(79,B1,B1,C8),	V(B6,5B,5B,ED),	\	V(D4,6A,6A,BE),	V(8D,CB,CB,46),	V(67,BE,BE,D9),	V(72,39,39,4B),	\	V(94,4A,4A,DE),	V(98,4C,4C,D4),	V(B0,58,58,E8),	V(85,CF,CF,4A),	\	V(BB,D0,D0,6B),	V(C5,EF,EF,2A),	V(4F,AA,AA,E5),	V(ED,FB,FB,16),	\	V(86,43,43,C5),	V(9A,4D,4D,D7),	V(66,33,33,55),	V(11,85,85,94),	\	V(8A,45,45,CF),	V(E9,F9,F9,10),	V(04,02,02,06),	V(FE,7F,7F,81),	\	V(A0,50,50,F0),	V(78,3C,3C,44),	V(25,9F,9F,BA),	V(4B,A8,A8,E3),	\	V(A2,51,51,F3),	V(5D,A3,A3,FE),	V(80,40,40,C0),	V(05,8F,8F,8A),	\	V(3F,92,92,AD),	V(21,9D,9D,BC),	V(70,38,38,48),	V(F1,F5,F5,04),	\	V(63,BC,BC,DF),	V(77,B6,B6,C1),	V(AF,DA,DA,75),	V(42,21,21,63),	\	V(20,10,10,30),	V(E5,FF,FF,1A),	V(FD,F3,F3,0E),	V(BF,D2,D2,6D),	\	V(81,CD,CD,4C),	V(18,0C,0C,14),	V(26,13,13,35),	V(C3,EC,EC,2F),	\	V(BE,5F,5F,E1),	V(35,97,97,A2),	V(88,44,44,CC),	V(2E,17,17,39),	\	V(93,C4,C4,57),	V(55,A7,A7,F2),	V(FC,7E,7E,82),	V(7A,3D,3D,47),	\	V(C8,64,64,AC),	V(BA,5D,5D,E7),	V(32,19,19,2B),	V(E6,73,73,95),	\	V(C0,60,60,A0),	V(19,81,81,98),	V(9E,4F,4F,D1),	V(A3,DC,DC,7F),	\	V(44,22,22,66),	V(54,2A,2A,7E),	V(3B,90,90,AB),	V(0B,88,88,83),	\	V(8C,46,46,CA),	V(C7,EE,EE,29),	V(6B,B8,B8,D3),	V(28,14,14,3C),	\	V(A7,DE,DE,79),	V(BC,5E,5E,E2),	V(16,0B,0B,1D),	V(AD,DB,DB,76),	\	V(DB,E0,E0,3B),	V(64,32,32,56),	V(74,3A,3A,4E),	V(14,0A,0A,1E),	\	V(92,49,49,DB),	V(0C,06,06,0A),	V(48,24,24,6C),	V(B8,5C,5C,E4),	\	V(9F,C2,C2,5D),	V(BD,D3,D3,6E),	V(43,AC,AC,EF),	V(C4,62,62,A6),	\	V(39,91,91,A8),	V(31,95,95,A4),	V(D3,E4,E4,37),	V(F2,79,79,8B),	\	V(D5,E7,E7,32),	V(8B,C8,C8,43),	V(6E,37,37,59),	V(DA,6D,6D,B7),	\	V(01,8D,8D,8C),	V(B1,D5,D5,64),	V(9C,4E,4E,D2),	V(49,A9,A9,E0),	\	V(D8,6C,6C,B4),	V(AC,56,56,FA),	V(F3,F4,F4,07),	V(CF,EA,EA,25),	\	V(CA,65,65,AF),	V(F4,7A,7A,8E),	V(47,AE,AE,E9),	V(10,08,08,18),	\	V(6F,BA,BA,D5),	V(F0,78,78,88),	V(4A,25,25,6F),	V(5C,2E,2E,72),	\	V(38,1C,1C,24),	V(57,A6,A6,F1),	V(73,B4,B4,C7),	V(97,C6,C6,51),	\	V(CB,E8,E8,23),	V(A1,DD,DD,7C),	V(E8,74,74,9C),	V(3E,1F,1F,21),	\	V(96,4B,4B,DD),	V(61,BD,BD,DC),	V(0D,8B,8B,86),	V(0F,8A,8A,85),	\	V(E0,70,70,90),	V(7C,3E,3E,42),	V(71,B5,B5,C4),	V(CC,66,66,AA),	\	V(90,48,48,D8),	V(06,03,03,05),	V(F7,F6,F6,01),	V(1C,0E,0E,12),	\	V(C2,61,61,A3),	V(6A,35,35,5F),	V(AE,57,57,F9),	V(69,B9,B9,D0),	\	V(17,86,86,91),	V(99,C1,C1,58),	V(3A,1D,1D,27),	V(27,9E,9E,B9),	\	V(D9,E1,E1,38),	V(EB,F8,F8,13),	V(2B,98,98,B3),	V(22,11,11,33),	\	V(D2,69,69,BB),	V(A9,D9,D9,70),	V(07,8E,8E,89),	V(33,94,94,A7),	\	V(2D,9B,9B,B6),	V(3C,1E,1E,22),	V(15,87,87,92),	V(C9,E9,E9,20),	\	V(87,CE,CE,49),	V(AA,55,55,FF),	V(50,28,28,78),	V(A5,DF,DF,7A),	\	V(03,8C,8C,8F),	V(59,A1,A1,F8),	V(09,89,89,80),	V(1A,0D,0D,17),	\	V(65,BF,BF,DA),	V(D7,E6,E6,31),	V(84,42,42,C6),	V(D0,68,68,B8),	\	V(82,41,41,C3),	V(29,99,99,B0),	V(5A,2D,2D,77),	V(1E,0F,0F,11),	\	V(7B,B0,B0,CB),	V(A8,54,54,FC),	V(6D,BB,BB,D6),	V(2C,16,16,3A)#define	V(a,b,c,d) 0x##a##b##c##dstatic uint32 FT0[256] = { FT };#undef V#define	V(a,b,c,d) 0x##d##a##b##cstatic uint32 FT1[256] = { FT };#undef V#define	V(a,b,c,d) 0x##c##d##a##bstatic uint32 FT2[256] = { FT };#undef V#define	V(a,b,c,d) 0x##b##c##d##astatic uint32 FT3[256] = { FT };#undef V#undef FT/* reverse S-box */static uint32 RSb[256] ={	0x52, 0x09,	0x6A, 0xD5,	0x30, 0x36,	0xA5, 0x38,	0xBF, 0x40,	0xA3, 0x9E,	0x81, 0xF3,	0xD7, 0xFB,	0x7C, 0xE3,	0x39, 0x82,	0x9B, 0x2F,	0xFF, 0x87,	0x34, 0x8E,	0x43, 0x44,	0xC4, 0xDE,	0xE9, 0xCB,	0x54, 0x7B,	0x94, 0x32,	0xA6, 0xC2,	0x23, 0x3D,	0xEE, 0x4C,	0x95, 0x0B,	0x42, 0xFA,	0xC3, 0x4E,	0x08, 0x2E,	0xA1, 0x66,	0x28, 0xD9,	0x24, 0xB2,	0x76, 0x5B,	0xA2, 0x49,	0x6D, 0x8B,	0xD1, 0x25,	0x72, 0xF8,	0xF6, 0x64,	0x86, 0x68,	0x98, 0x16,	0xD4, 0xA4,	0x5C, 0xCC,	0x5D, 0x65,	0xB6, 0x92,	0x6C, 0x70,	0x48, 0x50,	0xFD, 0xED,	0xB9, 0xDA,	0x5E, 0x15,	0x46, 0x57,	0xA7, 0x8D,	0x9D, 0x84,	0x90, 0xD8,	0xAB, 0x00,	0x8C, 0xBC,	0xD3, 0x0A,	0xF7, 0xE4,	0x58, 0x05,	0xB8, 0xB3,	0x45, 0x06,	0xD0, 0x2C,	0x1E, 0x8F,	0xCA, 0x3F,	0x0F, 0x02,	0xC1, 0xAF,	0xBD, 0x03,	0x01, 0x13,	0x8A, 0x6B,	0x3A, 0x91,	0x11, 0x41,	0x4F, 0x67,	0xDC, 0xEA,	0x97, 0xF2,	0xCF, 0xCE,	0xF0, 0xB4,	0xE6, 0x73,	0x96, 0xAC,	0x74, 0x22,	0xE7, 0xAD,	0x35, 0x85,	0xE2, 0xF9,	0x37, 0xE8,	0x1C, 0x75,	0xDF, 0x6E,	0x47, 0xF1,	0x1A, 0x71,	0x1D, 0x29,	0xC5, 0x89,	0x6F, 0xB7,	0x62, 0x0E,	0xAA, 0x18,	0xBE, 0x1B,	0xFC, 0x56,	0x3E, 0x4B,	0xC6, 0xD2,	0x79, 0x20,	0x9A, 0xDB,	0xC0, 0xFE,	0x78, 0xCD,	0x5A, 0xF4,	0x1F, 0xDD,	0xA8, 0x33,	0x88, 0x07,	0xC7, 0x31,	0xB1, 0x12,	0x10, 0x59,	0x27, 0x80,	0xEC, 0x5F,	0x60, 0x51,	0x7F, 0xA9,	0x19, 0xB5,	0x4A, 0x0D,	0x2D, 0xE5,	0x7A, 0x9F,	0x93, 0xC9,	0x9C, 0xEF,	0xA0, 0xE0,	0x3B, 0x4D,	0xAE, 0x2A,	0xF5, 0xB0,	0xC8, 0xEB,	0xBB, 0x3C,	0x83, 0x53,	0x99, 0x61,	0x17, 0x2B,	0x04, 0x7E,	0xBA, 0x77,	0xD6, 0x26,	0xE1, 0x69,	0x14, 0x63,	0x55, 0x21,	0x0C, 0x7D};/* reverse table */#define	RT \\	V(51,F4,A7,50),	V(7E,41,65,53),	V(1A,17,A4,C3),	V(3A,27,5E,96),	\	V(3B,AB,6B,CB),	V(1F,9D,45,F1),	V(AC,FA,58,AB),	V(4B,E3,03,93),	\	V(20,30,FA,55),	V(AD,76,6D,F6),	V(88,CC,76,91),	V(F5,02,4C,25),	\	V(4F,E5,D7,FC),	V(C5,2A,CB,D7),	V(26,35,44,80),	V(B5,62,A3,8F),	\	V(DE,B1,5A,49),	V(25,BA,1B,67),	V(45,EA,0E,98),	V(5D,FE,C0,E1),	\	V(C3,2F,75,02),	V(81,4C,F0,12),	V(8D,46,97,A3),	V(6B,D3,F9,C6),	\	V(03,8F,5F,E7),	V(15,92,9C,95),	V(BF,6D,7A,EB),	V(95,52,59,DA),	\	V(D4,BE,83,2D),	V(58,74,21,D3),	V(49,E0,69,29),	V(8E,C9,C8,44),	\	V(75,C2,89,6A),	V(F4,8E,79,78),	V(99,58,3E,6B),	V(27,B9,71,DD),	\	V(BE,E1,4F,B6),	V(F0,88,AD,17),	V(C9,20,AC,66),	V(7D,CE,3A,B4),	\	V(63,DF,4A,18),	V(E5,1A,31,82),	V(97,51,33,60),	V(62,53,7F,45),	\	V(B1,64,77,E0),	V(BB,6B,AE,84),	V(FE,81,A0,1C),	V(F9,08,2B,94),	\	V(70,48,68,58),	V(8F,45,FD,19),	V(94,DE,6C,87),	V(52,7B,F8,B7),	\	V(AB,73,D3,23),	V(72,4B,02,E2),	V(E3,1F,8F,57),	V(66,55,AB,2A),	\	V(B2,EB,28,07),	V(2F,B5,C2,03),	V(86,C5,7B,9A),	V(D3,37,08,A5),	\	V(30,28,87,F2),	V(23,BF,A5,B2),	V(02,03,6A,BA),	V(ED,16,82,5C),	\	V(8A,CF,1C,2B),	V(A7,79,B4,92),	V(F3,07,F2,F0),	V(4E,69,E2,A1),	\	V(65,DA,F4,CD),	V(06,05,BE,D5),	V(D1,34,62,1F),	V(C4,A6,FE,8A),	\	V(34,2E,53,9D),	V(A2,F3,55,A0),	V(05,8A,E1,32),	V(A4,F6,EB,75),	\	V(0B,83,EC,39),	V(40,60,EF,AA),	V(5E,71,9F,06),	V(BD,6E,10,51),	\	V(3E,21,8A,F9),	V(96,DD,06,3D),	V(DD,3E,05,AE),	V(4D,E6,BD,46),	\	V(91,54,8D,B5),	V(71,C4,5D,05),	V(04,06,D4,6F),	V(60,50,15,FF),	\	V(19,98,FB,24),	V(D6,BD,E9,97),	V(89,40,43,CC),	V(67,D9,9E,77),	\	V(B0,E8,42,BD),	V(07,89,8B,88),	V(E7,19,5B,38),	V(79,C8,EE,DB),	\	V(A1,7C,0A,47),	V(7C,42,0F,E9),	V(F8,84,1E,C9),	V(00,00,00,00),	\	V(09,80,86,83),	V(32,2B,ED,48),	V(1E,11,70,AC),	V(6C,5A,72,4E),	\	V(FD,0E,FF,FB),	V(0F,85,38,56),	V(3D,AE,D5,1E),	V(36,2D,39,27),	\	V(0A,0F,D9,64),	V(68,5C,A6,21),	V(9B,5B,54,D1),	V(24,36,2E,3A),	\	V(0C,0A,67,B1),	V(93,57,E7,0F),	V(B4,EE,96,D2),	V(1B,9B,91,9E),	\	V(80,C0,C5,4F),	V(61,DC,20,A2),	V(5A,77,4B,69),	V(1C,12,1A,16),	\	V(E2,93,BA,0A),	V(C0,A0,2A,E5),	V(3C,22,E0,43),	V(12,1B,17,1D),	\	V(0E,09,0D,0B),	V(F2,8B,C7,AD),	V(2D,B6,A8,B9),	V(14,1E,A9,C8),	\	V(57,F1,19,85),	V(AF,75,07,4C),	V(EE,99,DD,BB),	V(A3,7F,60,FD),	\	V(F7,01,26,9F),	V(5C,72,F5,BC),	V(44,66,3B,C5),	V(5B,FB,7E,34),	\	V(8B,43,29,76),	V(CB,23,C6,DC),	V(B6,ED,FC,68),	V(B8,E4,F1,63),	\	V(D7,31,DC,CA),	V(42,63,85,10),	V(13,97,22,40),	V(84,C6,11,20),	\	V(85,4A,24,7D),	V(D2,BB,3D,F8),	V(AE,F9,32,11),	V(C7,29,A1,6D),	\	V(1D,9E,2F,4B),	V(DC,B2,30,F3),	V(0D,86,52,EC),	V(77,C1,E3,D0),	\	V(2B,B3,16,6C),	V(A9,70,B9,99),	V(11,94,48,FA),	V(47,E9,64,22),	\

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -