.版本 2
.子程序 Xor加解密
.参数 data, 字节集, , 只能传变量,不能传常量!!!
.参数 XorKey, 字节集, , 支持和data相同长度 或者其他4字节对齐长度
置入代码 ({ 139, 69, 8, 139, 85, 12, 139, 0, 133, 192, 116, 94, 139, 72, 4, 139, 18, 131, 192, 8, 133, 201, 116, 82, 137, 203, 133, 210, 116, 76, 139, 106, 4, 1, 193, 133, 237, 116, 67, 131, 225, 252, 131, 194, 8, 57, 200, 116, 18, 57, 221, 117, 57, 139, 42, 131, 194, 4, 49, 40, 131, 192, 4, 57, 200, 117, 242, 137, 217, 131, 225, 3, 116, 32, 247, 193, 2, 0, 0, 0, 116, 12, 102, 139, 42, 131, 194, 2, 102, 49, 40, 131, 192, 2, 247, 193, 1, 0, 0, 0, 116, 4, 138, 18, 48, 16, 93, 194, 8, 0, 1, 213, 137, 214, 139, 58, 131, 194, 4, 49, 56, 131, 192, 4, 57, 234, 15, 68, 214, 57, 200, 117, 237, 235, 188 })
.版本 2
.子程序 取随机字节集, 字节集
.参数 len, 整数型
.局部变量 bin, 字节集
bin = 取空白字节集 (len)
置入代码 ({ 80, 133, 192, 116, 64, 139, 120, 4, 131, 192, 8, 133, 255, 116, 54, 137, 195, 141, 12, 7, 15, 49, 1, 208, 131, 225, 252, 116, 13, 137, 3, 15, 49, 131, 195, 4, 1, 208, 57, 203, 117, 243, 247, 199, 2, 0, 0, 0, 116, 9, 102, 137, 3, 193, 232, 16, 131, 195, 2, 247, 199, 1, 0, 0, 0, 116, 2, 136, 3, 88, 201, 194, 4, 0 })
返回 (bin)
0就是加密后的
你再解密一次
到文本就是123456了
因为你密钥和数据是一样
所以是0
(来自易大师QQ群)
key没对齐到4字节也不会出错:
.版本 2
.子程序 Xor加解密
.参数 data, 字节集, , 只能传变量,不能传常量!!!
.参数 XorKey, 字节集, , 支持和data相同长度 或者其他4字节对齐长度
置入代码 ({ 139, 69, 8, 139, 85, 12, 139, 0, 133, 192, 116, 94, 139, 72, 4, 139, 18, 131, 192, 8, 133, 201, 116, 82, 137, 203, 133, 210, 116, 76, 139, 106, 4, 1, 193, 133, 237, 116, 67, 131, 225, 252, 131, 194, 8, 57, 200, 116, 18, 57, 221, 117, 57, 139, 42, 131, 194, 4, 49, 40, 131, 192, 4, 57, 200, 117, 242, 137, 217, 131, 225, 3, 116, 32, 247, 193, 2, 0, 0, 0, 116, 12, 102, 139, 42, 131, 194, 2, 102, 49, 40, 131, 192, 2, 247, 193, 1, 0, 0, 0, 116, 4, 138, 18, 48, 16, 93, 194, 8, 0, 1, 213, 137, 214, 139, 58, 131, 194, 4, 49, 56, 131, 192, 4, 57, 234, 15, 67, 214, 57, 200, 117, 237, 235, 188 })