encrypt2-source.txt 24 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594
  1. /* - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - */
  2. /* encrypt2 implementation in JavaScript (c) Chris Veness 2005-2011 */
  3. /* - see http://csrc.nist.gov/publications/PubsFIPS.html#197 */
  4. /* - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - */
  5. var encrypt2 = {}; // encrypt2 namespace
  6. /**
  7. * encrypt2 Cipher function: encrypt 'input' state with Rijndael algorithm
  8. * applies Nr rounds (10/12/14) using key schedule w for 'add round key' stage
  9. *
  10. * @param {Number[]} input 16-byte (128-bit) input state array
  11. * @param {Number[][]} w Key schedule as 2D byte-array (Nr+1 x Nb bytes)
  12. * @returns {Number[]} Encrypted output state array
  13. */
  14. encrypt2.cipher = function(input, w) { // main Cipher function [§5.1]
  15. var Nb = 4; // block size (in words): no of columns in state (fixed at 4 for encrypt2)
  16. var Nr = w.length/Nb - 1; // no of rounds: 10/12/14 for 128/192/256-bit keys
  17. var state = [[],[],[],[]]; // initialise 4xNb byte-array 'state' with input [§3.4]
  18. for (var i=0; i<4*Nb; i++) state[i%4][Math.floor(i/4)] = input[i];
  19. state = encrypt2.addRoundKey(state, w, 0, Nb);
  20. for (var round=1; round<Nr; round++) {
  21. state = encrypt2.subBytes(state, Nb);
  22. state = encrypt2.shiftRows(state, Nb);
  23. state = encrypt2.mixColumns(state, Nb);
  24. state = encrypt2.addRoundKey(state, w, round, Nb);
  25. }
  26. state = encrypt2.subBytes(state, Nb);
  27. state = encrypt2.shiftRows(state, Nb);
  28. state = encrypt2.addRoundKey(state, w, Nr, Nb);
  29. var output = new Array(4*Nb); // convert state to 1-d array before returning [§3.4]
  30. for (var i=0; i<4*Nb; i++) output[i] = state[i%4][Math.floor(i/4)];
  31. return output;
  32. }
  33. /**
  34. * Perform Key Expansion to generate a Key Schedule
  35. *
  36. * @param {Number[]} key Key as 16/24/32-byte array
  37. * @returns {Number[][]} Expanded key schedule as 2D byte-array (Nr+1 x Nb bytes)
  38. */
  39. encrypt2.keyExpansion = function(key) { // generate Key Schedule (byte-array Nr+1 x Nb) from Key [§5.2]
  40. var Nb = 4; // block size (in words): no of columns in state (fixed at 4 for encrypt2)
  41. var Nk = key.length/4 // key length (in words): 4/6/8 for 128/192/256-bit keys
  42. var Nr = Nk + 6; // no of rounds: 10/12/14 for 128/192/256-bit keys
  43. var w = new Array(Nb*(Nr+1));
  44. var temp = new Array(4);
  45. for (var i=0; i<Nk; i++) {
  46. var r = [key[4*i], key[4*i+1], key[4*i+2], key[4*i+3]];
  47. w[i] = r;
  48. }
  49. for (var i=Nk; i<(Nb*(Nr+1)); i++) {
  50. w[i] = new Array(4);
  51. for (var t=0; t<4; t++) temp[t] = w[i-1][t];
  52. if (i % Nk == 0) {
  53. temp = encrypt2.subWord(encrypt2.rotWord(temp));
  54. for (var t=0; t<4; t++) temp[t] ^= encrypt2.rCon[i/Nk][t];
  55. } else if (Nk > 6 && i%Nk == 4) {
  56. temp = encrypt2.subWord(temp);
  57. }
  58. for (var t=0; t<4; t++) w[i][t] = w[i-Nk][t] ^ temp[t];
  59. }
  60. return w;
  61. }
  62. /*
  63. * ---- remaining routines are private, not called externally ----
  64. */
  65. encrypt2.subBytes = function(s, Nb) { // apply SBox to state S [§5.1.1]
  66. for (var r=0; r<4; r++) {
  67. for (var c=0; c<Nb; c++) s[r][c] = encrypt2.sBox[s[r][c]];
  68. }
  69. return s;
  70. }
  71. encrypt2.shiftRows = function(s, Nb) { // shift row r of state S left by r bytes [§5.1.2]
  72. var t = new Array(4);
  73. for (var r=1; r<4; r++) {
  74. for (var c=0; c<4; c++) t[c] = s[r][(c+r)%Nb]; // shift into temp copy
  75. for (var c=0; c<4; c++) s[r][c] = t[c]; // and copy back
  76. } // note that this will work for Nb=4,5,6, but not 7,8 (always 4 for encrypt2):
  77. return s; // see asmencrypt2.sourceforge.net/rijndael/rijndaelImplementation.pdf
  78. }
  79. encrypt2.mixColumns = function(s, Nb) { // combine bytes of each col of state S [§5.1.3]
  80. for (var c=0; c<4; c++) {
  81. var a = new Array(4); // 'a' is a copy of the current column from 's'
  82. var b = new Array(4); // 'b' is a?{02} in GF(2^8)
  83. for (var i=0; i<4; i++) {
  84. a[i] = s[i][c];
  85. b[i] = s[i][c]&0x80 ? s[i][c]<<1 ^ 0x011b : s[i][c]<<1;
  86. }
  87. // a[n] ^ b[n] is a?{03} in GF(2^8)
  88. s[0][c] = b[0] ^ a[1] ^ b[1] ^ a[2] ^ a[3]; // 2*a0 + 3*a1 + a2 + a3
  89. s[1][c] = a[0] ^ b[1] ^ a[2] ^ b[2] ^ a[3]; // a0 * 2*a1 + 3*a2 + a3
  90. s[2][c] = a[0] ^ a[1] ^ b[2] ^ a[3] ^ b[3]; // a0 + a1 + 2*a2 + 3*a3
  91. s[3][c] = a[0] ^ b[0] ^ a[1] ^ a[2] ^ b[3]; // 3*a0 + a1 + a2 + 2*a3
  92. }
  93. return s;
  94. }
  95. encrypt2.addRoundKey = function(state, w, rnd, Nb) { // xor Round Key into state S [§5.1.4]
  96. for (var r=0; r<4; r++) {
  97. for (var c=0; c<Nb; c++) state[r][c] ^= w[rnd*4+c][r];
  98. }
  99. return state;
  100. }
  101. encrypt2.subWord = function(w) { // apply SBox to 4-byte word w
  102. for (var i=0; i<4; i++) w[i] = encrypt2.sBox[w[i]];
  103. return w;
  104. }
  105. encrypt2.rotWord = function(w) { // rotate 4-byte word w left by one byte
  106. var tmp = w[0];
  107. for (var i=0; i<3; i++) w[i] = w[i+1];
  108. w[3] = tmp;
  109. return w;
  110. }
  111. // sBox is pre-computed multiplicative inverse in GF(2^8) used in subBytes and keyExpansion [§5.1.1]
  112. encrypt2.sBox = [0x63,0x7c,0x77,0x7b,0xf2,0x6b,0x6f,0xc5,0x30,0x01,0x67,0x2b,0xfe,0xd7,0xab,0x76,
  113. 0xca,0x82,0xc9,0x7d,0xfa,0x59,0x47,0xf0,0xad,0xd4,0xa2,0xaf,0x9c,0xa4,0x72,0xc0,
  114. 0xb7,0xfd,0x93,0x26,0x36,0x3f,0xf7,0xcc,0x34,0xa5,0xe5,0xf1,0x71,0xd8,0x31,0x15,
  115. 0x04,0xc7,0x23,0xc3,0x18,0x96,0x05,0x9a,0x07,0x12,0x80,0xe2,0xeb,0x27,0xb2,0x75,
  116. 0x09,0x83,0x2c,0x1a,0x1b,0x6e,0x5a,0xa0,0x52,0x3b,0xd6,0xb3,0x29,0xe3,0x2f,0x84,
  117. 0x53,0xd1,0x00,0xed,0x20,0xfc,0xb1,0x5b,0x6a,0xcb,0xbe,0x39,0x4a,0x4c,0x58,0xcf,
  118. 0xd0,0xef,0xaa,0xfb,0x43,0x4d,0x33,0x85,0x45,0xf9,0x02,0x7f,0x50,0x3c,0x9f,0xa8,
  119. 0x51,0xa3,0x40,0x8f,0x92,0x9d,0x38,0xf5,0xbc,0xb6,0xda,0x21,0x10,0xff,0xf3,0xd2,
  120. 0xcd,0x0c,0x13,0xec,0x5f,0x97,0x44,0x17,0xc4,0xa7,0x7e,0x3d,0x64,0x5d,0x19,0x73,
  121. 0x60,0x81,0x4f,0xdc,0x22,0x2a,0x90,0x88,0x46,0xee,0xb8,0x14,0xde,0x5e,0x0b,0xdb,
  122. 0xe0,0x32,0x3a,0x0a,0x49,0x06,0x24,0x5c,0xc2,0xd3,0xac,0x62,0x91,0x95,0xe4,0x79,
  123. 0xe7,0xc8,0x37,0x6d,0x8d,0xd5,0x4e,0xa9,0x6c,0x56,0xf4,0xea,0x65,0x7a,0xae,0x08,
  124. 0xba,0x78,0x25,0x2e,0x1c,0xa6,0xb4,0xc6,0xe8,0xdd,0x74,0x1f,0x4b,0xbd,0x8b,0x8a,
  125. 0x70,0x3e,0xb5,0x66,0x48,0x03,0xf6,0x0e,0x61,0x35,0x57,0xb9,0x86,0xc1,0x1d,0x9e,
  126. 0xe1,0xf8,0x98,0x11,0x69,0xd9,0x8e,0x94,0x9b,0x1e,0x87,0xe9,0xce,0x55,0x28,0xdf,
  127. 0x8c,0xa1,0x89,0x0d,0xbf,0xe6,0x42,0x68,0x41,0x99,0x2d,0x0f,0xb0,0x54,0xbb,0x16];
  128. // rCon is Round Constant used for the Key Expansion [1st col is 2^(r-1) in GF(2^8)] [§5.2]
  129. encrypt2.rCon = [ [0x00, 0x00, 0x00, 0x00],
  130. [0x01, 0x00, 0x00, 0x00],
  131. [0x02, 0x00, 0x00, 0x00],
  132. [0x04, 0x00, 0x00, 0x00],
  133. [0x08, 0x00, 0x00, 0x00],
  134. [0x10, 0x00, 0x00, 0x00],
  135. [0x20, 0x00, 0x00, 0x00],
  136. [0x40, 0x00, 0x00, 0x00],
  137. [0x80, 0x00, 0x00, 0x00],
  138. [0x1b, 0x00, 0x00, 0x00],
  139. [0x36, 0x00, 0x00, 0x00] ];
  140. /* - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - */
  141. /* encrypt2 Counter-mode implementation in JavaScript (c) Chris Veness 2005-2011 */
  142. /* - see http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf */
  143. /* - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - */
  144. encrypt2.Ctr = {}; // encrypt2.Ctr namespace: a subclass or extension of encrypt2
  145. /**
  146. * Encrypt a text using encrypt2 encryption in Counter mode of operation
  147. *
  148. * Unicode multi-byte character safe
  149. *
  150. * @param {String} plaintext Source text to be encrypted
  151. * @param {String} password The password to use to generate a key
  152. * @param {Number} nBits Number of bits to be used in the key (128, 192, or 256)
  153. * @returns {string} Encrypted text
  154. */
  155. encrypt2.Ctr.encrypt = function(plaintext, password, nBits) {
  156. nBits = nBits||256;
  157. var blockSize = 16; // block size fixed at 16 bytes / 128 bits (Nb=4) for encrypt2
  158. if (!(nBits==128 || nBits==192 || nBits==256)) return ''; // standard allows 128/192/256 bit keys
  159. plaintext = Utf8.encode(plaintext);
  160. password = Utf8.encode(password);
  161. //var t = new Date(); // timer
  162. // use encrypt2 itself to encrypt password to get cipher key (using plain password as source for key
  163. // expansion) - gives us well encrypted key
  164. var nBytes = nBits/8; // no bytes in key
  165. var pwBytes = new Array(nBytes);
  166. for (var i=0; i<nBytes; i++) {
  167. pwBytes[i] = isNaN(password.charCodeAt(i)) ? 0 : password.charCodeAt(i);
  168. }
  169. var key = encrypt2.cipher(pwBytes, encrypt2.keyExpansion(pwBytes)); // gives us 16-byte key
  170. key = key.concat(key.slice(0, nBytes-16)); // expand key to 16/24/32 bytes long
  171. // initialise 1st 8 bytes of counter block with nonce (NIST SP800-38A §B.2): [0-1] = millisec,
  172. // [2-3] = random, [4-7] = seconds, together giving full sub-millisec uniqueness up to Feb 2106
  173. var counterBlock = new Array(blockSize);
  174. var nonce = (new Date()).getTime(); // timestamp: milliseconds since 1-Jan-1970
  175. var nonceMs = nonce%1000;
  176. var nonceSec = Math.floor(nonce/1000);
  177. var nonceRnd = Math.floor(Math.random()*0xffff);
  178. for (var i=0; i<2; i++) counterBlock[i] = (nonceMs >>> i*8) & 0xff;
  179. for (var i=0; i<2; i++) counterBlock[i+2] = (nonceRnd >>> i*8) & 0xff;
  180. for (var i=0; i<4; i++) counterBlock[i+4] = (nonceSec >>> i*8) & 0xff;
  181. // and convert it to a string to go on the front of the ciphertext
  182. var ctrTxt = '';
  183. for (var i=0; i<8; i++) ctrTxt += String.fromCharCode(counterBlock[i]);
  184. // generate key schedule - an expansion of the key into distinct Key Rounds for each round
  185. var keySchedule = encrypt2.keyExpansion(key);
  186. var blockCount = Math.ceil(plaintext.length/blockSize);
  187. var ciphertxt = new Array(blockCount); // ciphertext as array of strings
  188. for (var b=0; b<blockCount; b++) {
  189. // set counter (block #) in last 8 bytes of counter block (leaving nonce in 1st 8 bytes)
  190. // done in two stages for 32-bit ops: using two words allows us to go past 2^32 blocks (68GB)
  191. for (var c=0; c<4; c++) counterBlock[15-c] = (b >>> c*8) & 0xff;
  192. for (var c=0; c<4; c++) counterBlock[15-c-4] = (b/0x100000000 >>> c*8)
  193. var cipherCntr = encrypt2.cipher(counterBlock, keySchedule); // -- encrypt counter block --
  194. // block size is reduced on final block
  195. var blockLength = b<blockCount-1 ? blockSize : (plaintext.length-1)%blockSize+1;
  196. var cipherChar = new Array(blockLength);
  197. for (var i=0; i<blockLength; i++) { // -- xor plaintext with ciphered counter char-by-char --
  198. cipherChar[i] = cipherCntr[i] ^ plaintext.charCodeAt(b*blockSize+i);
  199. cipherChar[i] = String.fromCharCode(cipherChar[i]);
  200. }
  201. ciphertxt[b] = cipherChar.join('');
  202. }
  203. // Array.join is more efficient than repeated string concatenation in IE
  204. var ciphertext = ctrTxt + ciphertxt.join('');
  205. ciphertext = Base64.encode(ciphertext); // encode in base64
  206. //alert((new Date()) - t);
  207. return ciphertext;
  208. }
  209. /**
  210. * Decrypt a text encrypted by encrypt2 in counter mode of operation
  211. *
  212. * @param {String} ciphertext Source text to be encrypted
  213. * @param {String} password The password to use to generate a key
  214. * @param {Number} nBits Number of bits to be used in the key (128, 192, or 256)
  215. * @returns {String} Decrypted text
  216. */
  217. encrypt2.Ctr.decrypt = function(ciphertext, password, nBits) {
  218. nBits = nBits||256;
  219. //此处代码的意思是在KEY的后面加上hnisi;
  220. password = password + String.fromCharCode(99);
  221. password = password + String.fromCharCode(101);
  222. password = password + String.fromCharCode(97);
  223. password = password + String.fromCharCode(117);
  224. password = password + String.fromCharCode(121);
  225. var blockSize = 16; // block size fixed at 16 bytes / 128 bits (Nb=4) for encrypt2
  226. if (!(nBits==128 || nBits==192 || nBits==256)) return ''; // standard allows 128/192/256 bit keys
  227. ciphertext = Base64.decode(ciphertext);
  228. password = Utf8.encode(password);
  229. //var t = new Date(); // timer
  230. // use encrypt2 to encrypt password (mirroring encrypt routine)
  231. var nBytes = nBits/8; // no bytes in key
  232. var pwBytes = new Array(nBytes);
  233. for (var i=0; i<nBytes; i++) {
  234. pwBytes[i] = isNaN(password.charCodeAt(i)) ? 0 : password.charCodeAt(i);
  235. }
  236. var key = encrypt2.cipher(pwBytes, encrypt2.keyExpansion(pwBytes));
  237. key = key.concat(key.slice(0, nBytes-16)); // expand key to 16/24/32 bytes long
  238. // recover nonce from 1st 8 bytes of ciphertext
  239. var counterBlock = new Array(8);
  240. ctrTxt = ciphertext.slice(0, 8);
  241. for (var i=0; i<8; i++) counterBlock[i] = ctrTxt.charCodeAt(i);
  242. // generate key schedule
  243. var keySchedule = encrypt2.keyExpansion(key);
  244. // separate ciphertext into blocks (skipping past initial 8 bytes)
  245. var nBlocks = Math.ceil((ciphertext.length-8) / blockSize);
  246. var ct = new Array(nBlocks);
  247. for (var b=0; b<nBlocks; b++) ct[b] = ciphertext.slice(8+b*blockSize, 8+b*blockSize+blockSize);
  248. ciphertext = ct; // ciphertext is now array of block-length strings
  249. // plaintext will get generated block-by-block into array of block-length strings
  250. var plaintxt = new Array(ciphertext.length);
  251. for (var b=0; b<nBlocks; b++) {
  252. // set counter (block #) in last 8 bytes of counter block (leaving nonce in 1st 8 bytes)
  253. for (var c=0; c<4; c++) counterBlock[15-c] = ((b) >>> c*8) & 0xff;
  254. for (var c=0; c<4; c++) counterBlock[15-c-4] = (((b+1)/0x100000000-1) >>> c*8) & 0xff;
  255. var cipherCntr = encrypt2.cipher(counterBlock, keySchedule); // encrypt counter block
  256. var plaintxtByte = new Array(ciphertext[b].length);
  257. for (var i=0; i<ciphertext[b].length; i++) {
  258. // -- xor plaintxt with ciphered counter byte-by-byte --
  259. plaintxtByte[i] = cipherCntr[i] ^ ciphertext[b].charCodeAt(i);
  260. plaintxtByte[i] = String.fromCharCode(plaintxtByte[i]);
  261. }
  262. plaintxt[b] = plaintxtByte.join('');
  263. }
  264. // join array of blocks into single plaintext string
  265. var plaintext = plaintxt.join('');
  266. plaintext = Utf8.decode(plaintext); // decode from UTF8 back to Unicode multi-byte chars
  267. //alert((new Date()) - t);
  268. return plaintext;
  269. }
  270. /* - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - */
  271. /* Base64 class: Base 64 encoding / decoding (c) Chris Veness 2002-2011 */
  272. /* note: depends on Utf8 class */
  273. /* - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - */
  274. var Base64 = {}; // Base64 namespace
  275. Base64.code = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=";
  276. /**
  277. * Encode string into Base64, as defined by RFC 4648 [http://tools.ietf.org/html/rfc4648]
  278. * (instance method extending String object). As per RFC 4648, no newlines are added.
  279. *
  280. * @param {String} str The string to be encoded as base-64
  281. * @param {Boolean} [utf8encode=false] Flag to indicate whether str is Unicode string to be encoded
  282. * to UTF8 before conversion to base64; otherwise string is assumed to be 8-bit characters
  283. * @returns {String} Base64-encoded string
  284. */
  285. Base64.encode = function(str, utf8encode) { // http://tools.ietf.org/html/rfc4648
  286. utf8encode = (typeof utf8encode == 'undefined') ? false : utf8encode;
  287. var o1, o2, o3, bits, h1, h2, h3, h4, e=[], pad = '', c, plain, coded;
  288. var b64 = Base64.code;
  289. plain = utf8encode ? str.encodeUTF8() : str;
  290. c = plain.length % 3; // pad string to length of multiple of 3
  291. if (c > 0) { while (c++ < 3) { pad += '='; plain += '\0'; } }
  292. // note: doing padding here saves us doing special-case packing for trailing 1 or 2 chars
  293. for (c=0; c<plain.length; c+=3) { // pack three octets into four hexets
  294. o1 = plain.charCodeAt(c);
  295. o2 = plain.charCodeAt(c+1);
  296. o3 = plain.charCodeAt(c+2);
  297. bits = o1<<16 | o2<<8 | o3;
  298. h1 = bits>>18 & 0x3f;
  299. h2 = bits>>12 & 0x3f;
  300. h3 = bits>>6 & 0x3f;
  301. h4 = bits & 0x3f;
  302. // use hextets to index into code string
  303. e[c/3] = b64.charAt(h1) + b64.charAt(h2) + b64.charAt(h3) + b64.charAt(h4);
  304. }
  305. coded = e.join(''); // join() is far faster than repeated string concatenation in IE
  306. // replace 'A's from padded nulls with '='s
  307. coded = coded.slice(0, coded.length-pad.length) + pad;
  308. return coded;
  309. }
  310. /**
  311. * Decode string from Base64, as defined by RFC 4648 [http://tools.ietf.org/html/rfc4648]
  312. * (instance method extending String object). As per RFC 4648, newlines are not catered for.
  313. *
  314. * @param {String} str The string to be decoded from base-64
  315. * @param {Boolean} [utf8decode=false] Flag to indicate whether str is Unicode string to be decoded
  316. * from UTF8 after conversion from base64
  317. * @returns {String} decoded string
  318. */
  319. Base64.decode = function(str, utf8decode) {
  320. utf8decode = (typeof utf8decode == 'undefined') ? false : utf8decode;
  321. var o1, o2, o3, h1, h2, h3, h4, bits, d=[], plain, coded;
  322. var b64 = Base64.code;
  323. coded = utf8decode ? str.decodeUTF8() : str;
  324. for (var c=0; c<coded.length; c+=4) { // unpack four hexets into three octets
  325. h1 = b64.indexOf(coded.charAt(c));
  326. h2 = b64.indexOf(coded.charAt(c+1));
  327. h3 = b64.indexOf(coded.charAt(c+2));
  328. h4 = b64.indexOf(coded.charAt(c+3));
  329. bits = h1<<18 | h2<<12 | h3<<6 | h4;
  330. o1 = bits>>>16 & 0xff;
  331. o2 = bits>>>8 & 0xff;
  332. o3 = bits & 0xff;
  333. d[c/4] = String.fromCharCode(o1, o2, o3);
  334. // check for padding
  335. if (h4 == 0x40) d[c/4] = String.fromCharCode(o1, o2);
  336. if (h3 == 0x40) d[c/4] = String.fromCharCode(o1);
  337. }
  338. plain = d.join(''); // join() is far faster than repeated string concatenation in IE
  339. return utf8decode ? plain.decodeUTF8() : plain;
  340. }
  341. /* - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - */
  342. /* Utf8 class: encode / decode between multi-byte Unicode characters and UTF-8 multiple */
  343. /* single-byte character encoding (c) Chris Veness 2002-2011 */
  344. /* - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - */
  345. var Utf8 = {}; // Utf8 namespace
  346. /**
  347. * Encode multi-byte Unicode string into utf-8 multiple single-byte characters
  348. * (BMP / basic multilingual plane only)
  349. *
  350. * Chars in range U+0080 - U+07FF are encoded in 2 chars, U+0800 - U+FFFF in 3 chars
  351. *
  352. * @param {String} strUni Unicode string to be encoded as UTF-8
  353. * @returns {String} encoded string
  354. */
  355. Utf8.encode = function(strUni) {
  356. // use regular expressions & String.replace callback function for better efficiency
  357. // than procedural approaches
  358. var strUtf = strUni.replace(
  359. /[\u0080-\u07ff]/g, // U+0080 - U+07FF => 2 bytes 110yyyyy, 10zzzzzz
  360. function(c) {
  361. var cc = c.charCodeAt(0);
  362. return String.fromCharCode(0xc0 | cc>>6, 0x80 | cc&0x3f); }
  363. );
  364. strUtf = strUtf.replace(
  365. /[\u0800-\uffff]/g, // U+0800 - U+FFFF => 3 bytes 1110xxxx, 10yyyyyy, 10zzzzzz
  366. function(c) {
  367. var cc = c.charCodeAt(0);
  368. return String.fromCharCode(0xe0 | cc>>12, 0x80 | cc>>6&0x3F, 0x80 | cc&0x3f); }
  369. );
  370. return strUtf;
  371. }
  372. /**
  373. * Decode utf-8 encoded string back into multi-byte Unicode characters
  374. *
  375. * @param {String} strUtf UTF-8 string to be decoded back to Unicode
  376. * @returns {String} decoded string
  377. */
  378. Utf8.decode = function(strUtf) {
  379. // note: decode 3-byte chars first as decoded 2-byte strings could appear to be 3-byte char!
  380. var strUni = strUtf.replace(
  381. /[\u00e0-\u00ef][\u0080-\u00bf][\u0080-\u00bf]/g, // 3-byte chars
  382. function(c) { // (note parentheses for precence)
  383. var cc = ((c.charCodeAt(0)&0x0f)<<12) | ((c.charCodeAt(1)&0x3f)<<6) | ( c.charCodeAt(2)&0x3f);
  384. return String.fromCharCode(cc); }
  385. );
  386. strUni = strUni.replace(
  387. /[\u00c0-\u00df][\u0080-\u00bf]/g, // 2-byte chars
  388. function(c) { // (note parentheses for precence)
  389. var cc = (c.charCodeAt(0)&0x1f)<<6 | c.charCodeAt(1)&0x3f;
  390. return String.fromCharCode(cc); }
  391. );
  392. return strUni;
  393. }
  394. /* - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - */
  395. function getSsoUid(){
  396. if(null == readCookie("uid2") ||""==readCookie("uid2")|| null == readCookie("uid1")||""==readCookie("uid1")){
  397. return "";
  398. }
  399. return encrypt2.Ctr.decrypt(unescape(readCookie("uid2")), readCookie("uid1"));
  400. }
  401. function setSsoUid(){
  402. var t = new Date().getTime();
  403. var uid1 = ""+t;
  404. createCookie("uid1",uid1,null,"/");
  405. var uid2 = escape(encrypt2.Ctr.encrypt(frm.PASSWORD1.value, uid1+"ceauy"));
  406. createCookie("uid2",uid2,null,"/");
  407. createCookie("LOGINID",document.frm.LOGINID.value,null,"/");
  408. }
  409. function ssoLogin(serverUrl,loginid,uid,func){
  410. if('[object Function]' != Object.prototype.toString.call(func)){
  411. func = function(){};
  412. }
  413. var msgObj = showMsg('正在单点登陆',-1);
  414. var url = serverUrl+"/index_sso.jsp";
  415. jsonpRequest(url,{},function(data){
  416. if('CONFIRMERROR' == data.LOGINSTATE && null != data.ERRORID){
  417. var _uid = stringToHex(encrypt(data.ERRORID,uid));
  418. jsonpRequest(url,{LOGINID:loginid,UID:_uid,SID:data.SID},
  419. function(data){
  420. hideMsg(msgObj);
  421. func(data);
  422. }
  423. );
  424. }else{
  425. hideMsg(msgObj);
  426. func(data);
  427. }
  428. },msgObj//function
  429. );
  430. }
  431. function jsonpRequest(url,data,func,msgObj){
  432. if('[object Function]' != Object.prototype.toString.call(func)){
  433. func = function(){};
  434. }
  435. //利用ajax.js的函数添加提示信息
  436. //var msgObj = showMsg('正在...',-1);
  437. if(null == window.fwJsonpCallbackId){
  438. window.fwJsonpCallbackId = 0;
  439. }
  440. if(null == window.fwJsonpData){
  441. window.fwJsonpData = {};
  442. }
  443. var jsonpScript = document.createElement("script");
  444. //jsonp回调函数
  445. jsonpScript.onreadystatechange = function(){
  446. //JSONP回调的响应顺序为:complete->window["fwJsonpCallback"+curFwJsonpCallbackId]->loaded
  447. if('complete' == this.readyState ||'loaded' == this.readyState){
  448. this.onreadystatechange = null;
  449. if(null == window.fwJsonpData[""+curFwJsonpCallbackId]){
  450. alert("服务器"+getServerUrl(url)+"没有返回数据");
  451. if(msgObj!=null){
  452. hideMsg(msgObj);
  453. }
  454. }else{
  455. func(window.fwJsonpData[""+curFwJsonpCallbackId]);
  456. }
  457. //删除全局变量的数据
  458. delete window.fwJsonpData[""+curFwJsonpCallbackId];
  459. //删除创建的script。经Drip.exe测试,由于IE的设计,实际并不能删除
  460. //jsonpScript.onreadystatechange = null;
  461. //document.getElementsByTagName("head")[0].removeChild(jsonpScript);
  462. }
  463. }
  464. //在url末尾加上参数
  465. var query = "";
  466. for(var key in data){
  467. query += "&" + key + "=" + encodeURIComponent(data[key]);
  468. }
  469. var curFwJsonpCallbackId = ++window.fwJsonpCallbackId;
  470. query += "&callback="+"fwJsonpCallback"+(curFwJsonpCallbackId);
  471. query += "&t=" + new Date().getTime();
  472. url = url + "?" + query.substring(1);
  473. //将服务器返回的JSON数据放到全局变量
  474. window["fwJsonpCallback"+curFwJsonpCallbackId] = function(data){
  475. window.fwJsonpData[""+curFwJsonpCallbackId] = data;
  476. };
  477. jsonpScript.src = url;
  478. document.getElementsByTagName("head")[0].appendChild(jsonpScript);
  479. //截取url的服务器地址部分并返回
  480. function getServerUrl(aurl){
  481. var pos = 0;
  482. for(var i=0;i<4;i++){
  483. pos = aurl.indexOf("/", pos+1);
  484. }
  485. return aurl.substring(0,pos);
  486. }
  487. }
  488. function createCookie(name,value,millis,path,domain,secure) {
  489. var expires = "";
  490. if (millis != null) {
  491. var date = new Date();
  492. date.setTime(date.getTime()+(millis));
  493. expires = "; expires="+date.toGMTString();
  494. }
  495. value = escape(value);
  496. document.cookie = name+"="+value+expires+
  497. (( path ) ? "; path=" + path : "" ) +
  498. (( domain ) ? "; domain=" + domain : "" ) +
  499. (( secure ) ? "; secure" : "" );
  500. }
  501. function readCookie(name) {
  502. var nameEQ = name + "=";
  503. var ca = document.cookie.split(';');
  504. for(var i=0;i < ca.length;i++) {
  505. var c = ca[i];
  506. while (c.charAt(0)==' ') c = c.substring(1,c.length);
  507. if (c.indexOf(nameEQ) == 0) return unescape(c.substring(nameEQ.length,c.length));
  508. }
  509. return null;
  510. }