package com.pheox.jcapi.test;
import com.pheox.jcapi.CoreSignatureJNI;
import com.pheox.jcapi.CoreUtilJNI;
import com.pheox.jcapi.JCAPIJNIException;
public class getcsp {
public static void main(String[] args) {
// String g = "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";
try {
System.loadLibrary("JCAPI");
System.out.println("Load Library Successfully!");
} catch(UnsatisfiedLinkError e) {
e.printStackTrace();
}
CoreUtilJNI core=new CoreUtilJNI();
String[] mscsp=core.getMSCSP();
for(int i=0;i<mscsp.length;i++)
System.out.println(mscsp[i]);
System.out.println("done");
String content="1234567890abcdefghij+sssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss";
byte[] data = {1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20};
data=content.getBytes();
try
{
int[] d= CoreSignatureJNI.hashInit("SHA1");
CoreSignatureJNI.hashUpdate(d, data);
byte abyte1[] = CoreSignatureJNI.hashFinal(d);
System.out.println(""+new String(abyte1));
return;
}
catch(JCAPIJNIException jcapijniexception)
{
jcapijniexception.printStackTrace();
}
}
}
分享到:
相关推荐
Hacking Point of Sale is a compelling book that tackles this enormous problem head-on. Exploring all aspects of the problem in detail – from how attacks are structured to the structure of magnetic ...
The goal of this book is to share the art of hacking with everyone. Understanding hacking techniques is often difficult, since it requires both breadth and depth of knowledge. Many hacking texts seem ...
Hacking is the art of creating problem solving, whether used to find an unconventional solution to a difficult problem or to exploit holes in sloppy programming. Many people call themselves hackers, ...
在《Hacking: The Art of Exploitation, 第二版》这本书中,作者Jon Erickson深入探讨了黑客这一概念的本质,即解决问题的艺术。通常情况下,“黑客”这个词往往被误解为非法入侵计算机系统的犯罪分子,但实际上,...
Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts ...
Hacking The Art Of Exploitation 2nd Edition
With a Foreword written by HackerOne Co-Founders Michiel Prins and Jobert Abma, Web Hacking 101 is about the ethical exploration of software for security issues but learning to hack isn’t always easy...
This text introduces the spirit and theory of hacking as well as the science behind it all; it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own ...
《黑客:利用的艺术》(第二版)是一本深入探讨黑客技术与计算机安全的书籍,英文原版名为"Hacking: The Art of Exploitation, 2nd Edition",由作者Erickson撰写。这本书旨在帮助读者理解黑客攻击的本质,并提供了...
Hacking The Art of Exploitation 2nd Edition from No Starch Press
Syngress - The Basics of Web Hacking - Tools and Techniques to Attack the Web 这份文档是应该算是入门节安全性测试
- **书名**:《Hacking: The Art of Exploitation》第二版 - **作者**:Jon Erickson - **出版社**:No Starch Press - **出版日期**:2008年1月15日 - **ISBN-13**:978-1-59-327144-2 - **页数**:480页 ### 二、...
Hacking_ A 101 Hacking Guide,hack参考书,值的一看。
history and impact of hacking
文字版Hacking: The Art of Exploitation。包含书签,非常完美
《黑客:漏洞利用的艺术》第二版是一本深入探讨网络安全与黑客技术的经典著作。作者通过详细的讲解和实践案例,引领读者走进黑客的世界,了解其背后的原理和技术。这本书是为那些对网络安全有浓厚兴趣,并希望深入...