Remove outdated RC4 files
Reviewed-by: Richard Levitte <levitte@openssl.org>
This commit is contained in:
parent
25aaa98aa2
commit
6c26d0df83
179
crypto/rc4/rc4.c
179
crypto/rc4/rc4.c
@ -1,179 +0,0 @@
|
||||
/* crypto/rc4/rc4.c */
|
||||
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
|
||||
* All rights reserved.
|
||||
*
|
||||
* This package is an SSL implementation written
|
||||
* by Eric Young (eay@cryptsoft.com).
|
||||
* The implementation was written so as to conform with Netscapes SSL.
|
||||
*
|
||||
* This library is free for commercial and non-commercial use as long as
|
||||
* the following conditions are aheared to. The following conditions
|
||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||
* included with this distribution is covered by the same copyright terms
|
||||
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
||||
*
|
||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||
* the code are not to be removed.
|
||||
* If this package is used in a product, Eric Young should be given attribution
|
||||
* as the author of the parts of the library used.
|
||||
* This can be in the form of a textual message at program startup or
|
||||
* in documentation (online or textual) provided with the package.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* "This product includes cryptographic software written by
|
||||
* Eric Young (eay@cryptsoft.com)"
|
||||
* The word 'cryptographic' can be left out if the rouines from the library
|
||||
* being used are not cryptographic related :-).
|
||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||
* the apps directory (application code) you must include an acknowledgement:
|
||||
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* The licence and distribution terms for any publically available version or
|
||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
#include <openssl/rc4.h>
|
||||
#include <openssl/evp.h>
|
||||
|
||||
char *usage[] = {
|
||||
"usage: rc4 args\n",
|
||||
"\n",
|
||||
" -in arg - input file - default stdin\n",
|
||||
" -out arg - output file - default stdout\n",
|
||||
" -key key - password\n",
|
||||
NULL
|
||||
};
|
||||
|
||||
int main(int argc, char *argv[])
|
||||
{
|
||||
FILE *in = NULL, *out = NULL;
|
||||
char *infile = NULL, *outfile = NULL, *keystr = NULL;
|
||||
RC4_KEY key;
|
||||
char buf[BUFSIZ];
|
||||
int badops = 0, i;
|
||||
char **pp;
|
||||
unsigned char md[MD5_DIGEST_LENGTH];
|
||||
|
||||
argc--;
|
||||
argv++;
|
||||
while (argc >= 1) {
|
||||
if (strcmp(*argv, "-in") == 0) {
|
||||
if (--argc < 1)
|
||||
goto bad;
|
||||
infile = *(++argv);
|
||||
} else if (strcmp(*argv, "-out") == 0) {
|
||||
if (--argc < 1)
|
||||
goto bad;
|
||||
outfile = *(++argv);
|
||||
} else if (strcmp(*argv, "-key") == 0) {
|
||||
if (--argc < 1)
|
||||
goto bad;
|
||||
keystr = *(++argv);
|
||||
} else {
|
||||
fprintf(stderr, "unknown option %s\n", *argv);
|
||||
badops = 1;
|
||||
break;
|
||||
}
|
||||
argc--;
|
||||
argv++;
|
||||
}
|
||||
|
||||
if (badops) {
|
||||
bad:
|
||||
for (pp = usage; (*pp != NULL); pp++)
|
||||
fprintf(stderr, "%s", *pp);
|
||||
exit(1);
|
||||
}
|
||||
|
||||
if (infile == NULL)
|
||||
in = stdin;
|
||||
else {
|
||||
in = fopen(infile, "r");
|
||||
if (in == NULL) {
|
||||
perror("open");
|
||||
exit(1);
|
||||
}
|
||||
|
||||
}
|
||||
if (outfile == NULL)
|
||||
out = stdout;
|
||||
else {
|
||||
out = fopen(outfile, "w");
|
||||
if (out == NULL) {
|
||||
perror("open");
|
||||
exit(1);
|
||||
}
|
||||
}
|
||||
|
||||
#ifdef OPENSSL_SYS_MSDOS
|
||||
/* This should set the file to binary mode. */
|
||||
{
|
||||
# include <fcntl.h>
|
||||
setmode(fileno(in), O_BINARY);
|
||||
setmode(fileno(out), O_BINARY);
|
||||
}
|
||||
#endif
|
||||
|
||||
if (keystr == NULL) { /* get key */
|
||||
i = EVP_read_pw_string(buf, BUFSIZ, "Enter RC4 password:", 0);
|
||||
if (i != 0) {
|
||||
OPENSSL_cleanse(buf, BUFSIZ);
|
||||
fprintf(stderr, "bad password read\n");
|
||||
exit(1);
|
||||
}
|
||||
keystr = buf;
|
||||
}
|
||||
|
||||
EVP_Digest((unsigned char *)keystr, strlen(keystr), md, NULL, EVP_md5(),
|
||||
NULL);
|
||||
OPENSSL_cleanse(keystr, strlen(keystr));
|
||||
RC4_set_key(&key, MD5_DIGEST_LENGTH, md);
|
||||
|
||||
for (;;) {
|
||||
i = fread(buf, 1, BUFSIZ, in);
|
||||
if (i == 0)
|
||||
break;
|
||||
if (i < 0) {
|
||||
perror("read");
|
||||
exit(1);
|
||||
}
|
||||
RC4(&key, (unsigned int)i, (unsigned char *)buf,
|
||||
(unsigned char *)buf);
|
||||
i = fwrite(buf, (unsigned int)i, 1, out);
|
||||
if (i != 1) {
|
||||
perror("write");
|
||||
exit(1);
|
||||
}
|
||||
}
|
||||
fclose(out);
|
||||
fclose(in);
|
||||
exit(0);
|
||||
return (1);
|
||||
}
|
@ -1,73 +0,0 @@
|
||||
//
|
||||
// gettsc.inl
|
||||
//
|
||||
// gives access to the Pentium's (secret) cycle counter
|
||||
//
|
||||
// This software was written by Leonard Janke (janke@unixg.ubc.ca)
|
||||
// in 1996-7 and is entered, by him, into the public domain.
|
||||
|
||||
#if defined(__WATCOMC__)
|
||||
void GetTSC(unsigned long&);
|
||||
#pragma aux GetTSC = 0x0f 0x31 "mov [edi], eax" parm [edi] modify [edx eax];
|
||||
#elif defined(__GNUC__)
|
||||
inline
|
||||
void GetTSC(unsigned long& tsc)
|
||||
{
|
||||
asm volatile(".byte 15, 49\n\t"
|
||||
: "=eax" (tsc)
|
||||
:
|
||||
: "%edx", "%eax");
|
||||
}
|
||||
#elif defined(_MSC_VER)
|
||||
inline
|
||||
void GetTSC(unsigned long& tsc)
|
||||
{
|
||||
unsigned long a;
|
||||
__asm _emit 0fh
|
||||
__asm _emit 31h
|
||||
__asm mov a, eax;
|
||||
tsc=a;
|
||||
}
|
||||
#endif
|
||||
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <openssl/rc4.h>
|
||||
|
||||
void main(int argc,char *argv[])
|
||||
{
|
||||
unsigned char buffer[1024];
|
||||
RC4_KEY ctx;
|
||||
unsigned long s1,s2,e1,e2;
|
||||
unsigned char k[16];
|
||||
unsigned long data[2];
|
||||
unsigned char iv[8];
|
||||
int i,num=64,numm;
|
||||
int j=0;
|
||||
|
||||
if (argc >= 2)
|
||||
num=atoi(argv[1]);
|
||||
|
||||
if (num == 0) num=256;
|
||||
if (num > 1024-16) num=1024-16;
|
||||
numm=num+8;
|
||||
|
||||
for (j=0; j<6; j++)
|
||||
{
|
||||
for (i=0; i<10; i++) /**/
|
||||
{
|
||||
RC4(&ctx,numm,buffer,buffer);
|
||||
GetTSC(s1);
|
||||
RC4(&ctx,numm,buffer,buffer);
|
||||
GetTSC(e1);
|
||||
GetTSC(s2);
|
||||
RC4(&ctx,num,buffer,buffer);
|
||||
GetTSC(e2);
|
||||
RC4(&ctx,num,buffer,buffer);
|
||||
}
|
||||
|
||||
printf("RC4 (%d bytes) %d %d (%d) - 8 bytes\n",num,
|
||||
e1-s1,e2-s2,(e1-s1)-(e2-s2));
|
||||
}
|
||||
}
|
||||
|
@ -1,278 +0,0 @@
|
||||
Newsgroups: sci.crypt,alt.security,comp.security.misc,alt.privacy
|
||||
Path: ghost.dsi.unimi.it!univ-lyon1.fr!jussieu.fr!zaphod.crihan.fr!warwick!clyde.open.ac.uk!strath-cs!bnr.co.uk!bt!pipex!howland.reston.ans.net!europa.eng.gtefsd.com!MathWorks.Com!yeshua.marcam.com!charnel.ecst.csuchico.edu!csusac!csus.edu!netcom.com!sterndark
|
||||
From: sterndark@netcom.com (David Sterndark)
|
||||
Subject: RC4 Algorithm revealed.
|
||||
Message-ID: <sternCvKL4B.Hyy@netcom.com>
|
||||
Sender: sterndark@netcom.com
|
||||
Organization: NETCOM On-line Communication Services (408 261-4700 guest)
|
||||
X-Newsreader: TIN [version 1.2 PL1]
|
||||
Date: Wed, 14 Sep 1994 06:35:31 GMT
|
||||
Lines: 263
|
||||
Xref: ghost.dsi.unimi.it sci.crypt:27332 alt.security:14732 comp.security.misc:11701 alt.privacy:16026
|
||||
|
||||
I am shocked, shocked, I tell you, shocked, to discover
|
||||
that the cypherpunks have illegaly and criminally revealed
|
||||
a crucial RSA trade secret and harmed the security of
|
||||
America by reverse engineering the RC4 algorithm and
|
||||
publishing it to the world.
|
||||
|
||||
On Saturday morning an anonymous cypherpunk wrote:
|
||||
|
||||
|
||||
SUBJECT: RC4 Source Code
|
||||
|
||||
|
||||
I've tested this. It is compatible with the RC4 object module
|
||||
that comes in the various RSA toolkits.
|
||||
|
||||
/* rc4.h */
|
||||
typedef struct rc4_key
|
||||
{
|
||||
unsigned char state[256];
|
||||
unsigned char x;
|
||||
unsigned char y;
|
||||
} rc4_key;
|
||||
void prepare_key(unsigned char *key_data_ptr,int key_data_len,
|
||||
rc4_key *key);
|
||||
void rc4(unsigned char *buffer_ptr,int buffer_len,rc4_key * key);
|
||||
|
||||
|
||||
/*rc4.c */
|
||||
#include "rc4.h"
|
||||
static void swap_byte(unsigned char *a, unsigned char *b);
|
||||
void prepare_key(unsigned char *key_data_ptr, int key_data_len,
|
||||
rc4_key *key)
|
||||
{
|
||||
unsigned char swapByte;
|
||||
unsigned char index1;
|
||||
unsigned char index2;
|
||||
unsigned char* state;
|
||||
short counter;
|
||||
|
||||
state = &key->state[0];
|
||||
for(counter = 0; counter < 256; counter++)
|
||||
state[counter] = counter;
|
||||
key->x = 0;
|
||||
key->y = 0;
|
||||
index1 = 0;
|
||||
index2 = 0;
|
||||
for(counter = 0; counter < 256; counter++)
|
||||
{
|
||||
index2 = (key_data_ptr[index1] + state[counter] +
|
||||
index2) % 256;
|
||||
swap_byte(&state[counter], &state[index2]);
|
||||
|
||||
index1 = (index1 + 1) % key_data_len;
|
||||
}
|
||||
}
|
||||
|
||||
void rc4(unsigned char *buffer_ptr, int buffer_len, rc4_key *key)
|
||||
{
|
||||
unsigned char x;
|
||||
unsigned char y;
|
||||
unsigned char* state;
|
||||
unsigned char xorIndex;
|
||||
short counter;
|
||||
|
||||
x = key->x;
|
||||
y = key->y;
|
||||
|
||||
state = &key->state[0];
|
||||
for(counter = 0; counter < buffer_len; counter ++)
|
||||
{
|
||||
x = (x + 1) % 256;
|
||||
y = (state[x] + y) % 256;
|
||||
swap_byte(&state[x], &state[y]);
|
||||
|
||||
xorIndex = (state[x] + state[y]) % 256;
|
||||
|
||||
buffer_ptr[counter] ^= state[xorIndex];
|
||||
}
|
||||
key->x = x;
|
||||
key->y = y;
|
||||
}
|
||||
|
||||
static void swap_byte(unsigned char *a, unsigned char *b)
|
||||
{
|
||||
unsigned char swapByte;
|
||||
|
||||
swapByte = *a;
|
||||
*a = *b;
|
||||
*b = swapByte;
|
||||
}
|
||||
|
||||
|
||||
|
||||
Another cypherpunk, this one not anonymous, tested the
|
||||
output from this algorithm against the output from
|
||||
official RC4 object code
|
||||
|
||||
|
||||
Date: Tue, 13 Sep 94 18:37:56 PDT
|
||||
From: ekr@eit.COM (Eric Rescorla)
|
||||
Message-Id: <9409140137.AA17743@eitech.eit.com>
|
||||
Subject: RC4 compatibility testing
|
||||
Cc: cypherpunks@toad.com
|
||||
|
||||
One data point:
|
||||
|
||||
I can't say anything about the internals of RC4 versus the
|
||||
algorithm that Bill Sommerfeld is rightly calling 'Alleged RC4',
|
||||
since I don't know anything about RC4's internals.
|
||||
|
||||
However, I do have a (legitimately acquired) copy of BSAFE2 and
|
||||
so I'm able to compare the output of this algorithm to the output
|
||||
of genuine RC4 as found in BSAFE. I chose a set of test vectors
|
||||
and ran them through both algorithms. The algorithms appear to
|
||||
give identical results, at least with these key/plaintext pairs.
|
||||
|
||||
I note that this is the algorithm _without_ Hal Finney's
|
||||
proposed modification
|
||||
|
||||
(see <199409130605.XAA24133@jobe.shell.portal.com>).
|
||||
|
||||
The vectors I used (together with the ciphertext they produce)
|
||||
follow at the end of this message.
|
||||
|
||||
-Ekr
|
||||
|
||||
Disclaimer: This posting does not reflect the opinions of EIT.
|
||||
|
||||
--------------------results follow--------------
|
||||
Test vector 0
|
||||
Key: 0x01 0x23 0x45 0x67 0x89 0xab 0xcd 0xef
|
||||
Input: 0x01 0x23 0x45 0x67 0x89 0xab 0xcd 0xef
|
||||
0 Output: 0x75 0xb7 0x87 0x80 0x99 0xe0 0xc5 0x96
|
||||
|
||||
Test vector 1
|
||||
Key: 0x01 0x23 0x45 0x67 0x89 0xab 0xcd 0xef
|
||||
Input: 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00
|
||||
0 Output: 0x74 0x94 0xc2 0xe7 0x10 0x4b 0x08 0x79
|
||||
|
||||
Test vector 2
|
||||
Key: 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00
|
||||
Input: 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00
|
||||
0 Output: 0xde 0x18 0x89 0x41 0xa3 0x37 0x5d 0x3a
|
||||
|
||||
Test vector 3
|
||||
Key: 0xef 0x01 0x23 0x45
|
||||
Input: 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00
|
||||
0 Output: 0xd6 0xa1 0x41 0xa7 0xec 0x3c 0x38 0xdf 0xbd 0x61
|
||||
|
||||
Test vector 4
|
||||
Key: 0x01 0x23 0x45 0x67 0x89 0xab 0xcd 0xef
|
||||
Input: 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01 0x01
|
||||
0x01
|
||||
0 Output: 0x75 0x95 0xc3 0xe6 0x11 0x4a 0x09 0x78 0x0c 0x4a 0xd4
|
||||
0x52 0x33 0x8e 0x1f 0xfd 0x9a 0x1b 0xe9 0x49 0x8f
|
||||
0x81 0x3d 0x76 0x53 0x34 0x49 0xb6 0x77 0x8d 0xca
|
||||
0xd8 0xc7 0x8a 0x8d 0x2b 0xa9 0xac 0x66 0x08 0x5d
|
||||
0x0e 0x53 0xd5 0x9c 0x26 0xc2 0xd1 0xc4 0x90 0xc1
|
||||
0xeb 0xbe 0x0c 0xe6 0x6d 0x1b 0x6b 0x1b 0x13 0xb6
|
||||
0xb9 0x19 0xb8 0x47 0xc2 0x5a 0x91 0x44 0x7a 0x95
|
||||
0xe7 0x5e 0x4e 0xf1 0x67 0x79 0xcd 0xe8 0xbf 0x0a
|
||||
0x95 0x85 0x0e 0x32 0xaf 0x96 0x89 0x44 0x4f 0xd3
|
||||
0x77 0x10 0x8f 0x98 0xfd 0xcb 0xd4 0xe7 0x26 0x56
|
||||
0x75 0x00 0x99 0x0b 0xcc 0x7e 0x0c 0xa3 0xc4 0xaa
|
||||
0xa3 0x04 0xa3 0x87 0xd2 0x0f 0x3b 0x8f 0xbb 0xcd
|
||||
0x42 0xa1 0xbd 0x31 0x1d 0x7a 0x43 0x03 0xdd 0xa5
|
||||
0xab 0x07 0x88 0x96 0xae 0x80 0xc1 0x8b 0x0a 0xf6
|
||||
0x6d 0xff 0x31 0x96 0x16 0xeb 0x78 0x4e 0x49 0x5a
|
||||
0xd2 0xce 0x90 0xd7 0xf7 0x72 0xa8 0x17 0x47 0xb6
|
||||
0x5f 0x62 0x09 0x3b 0x1e 0x0d 0xb9 0xe5 0xba 0x53
|
||||
0x2f 0xaf 0xec 0x47 0x50 0x83 0x23 0xe6 0x71 0x32
|
||||
0x7d 0xf9 0x44 0x44 0x32 0xcb 0x73 0x67 0xce 0xc8
|
||||
0x2f 0x5d 0x44 0xc0 0xd0 0x0b 0x67 0xd6 0x50 0xa0
|
||||
0x75 0xcd 0x4b 0x70 0xde 0xdd 0x77 0xeb 0x9b 0x10
|
||||
0x23 0x1b 0x6b 0x5b 0x74 0x13 0x47 0x39 0x6d 0x62
|
||||
0x89 0x74 0x21 0xd4 0x3d 0xf9 0xb4 0x2e 0x44 0x6e
|
||||
0x35 0x8e 0x9c 0x11 0xa9 0xb2 0x18 0x4e 0xcb 0xef
|
||||
0x0c 0xd8 0xe7 0xa8 0x77 0xef 0x96 0x8f 0x13 0x90
|
||||
0xec 0x9b 0x3d 0x35 0xa5 0x58 0x5c 0xb0 0x09 0x29
|
||||
0x0e 0x2f 0xcd 0xe7 0xb5 0xec 0x66 0xd9 0x08 0x4b
|
||||
0xe4 0x40 0x55 0xa6 0x19 0xd9 0xdd 0x7f 0xc3 0x16
|
||||
0x6f 0x94 0x87 0xf7 0xcb 0x27 0x29 0x12 0x42 0x64
|
||||
0x45 0x99 0x85 0x14 0xc1 0x5d 0x53 0xa1 0x8c 0x86
|
||||
0x4c 0xe3 0xa2 0xb7 0x55 0x57 0x93 0x98 0x81 0x26
|
||||
0x52 0x0e 0xac 0xf2 0xe3 0x06 0x6e 0x23 0x0c 0x91
|
||||
0xbe 0xe4 0xdd 0x53 0x04 0xf5 0xfd 0x04 0x05 0xb3
|
||||
0x5b 0xd9 0x9c 0x73 0x13 0x5d 0x3d 0x9b 0xc3 0x35
|
||||
0xee 0x04 0x9e 0xf6 0x9b 0x38 0x67 0xbf 0x2d 0x7b
|
||||
0xd1 0xea 0xa5 0x95 0xd8 0xbf 0xc0 0x06 0x6f 0xf8
|
||||
0xd3 0x15 0x09 0xeb 0x0c 0x6c 0xaa 0x00 0x6c 0x80
|
||||
0x7a 0x62 0x3e 0xf8 0x4c 0x3d 0x33 0xc1 0x95 0xd2
|
||||
0x3e 0xe3 0x20 0xc4 0x0d 0xe0 0x55 0x81 0x57 0xc8
|
||||
0x22 0xd4 0xb8 0xc5 0x69 0xd8 0x49 0xae 0xd5 0x9d
|
||||
0x4e 0x0f 0xd7 0xf3 0x79 0x58 0x6b 0x4b 0x7f 0xf6
|
||||
0x84 0xed 0x6a 0x18 0x9f 0x74 0x86 0xd4 0x9b 0x9c
|
||||
0x4b 0xad 0x9b 0xa2 0x4b 0x96 0xab 0xf9 0x24 0x37
|
||||
0x2c 0x8a 0x8f 0xff 0xb1 0x0d 0x55 0x35 0x49 0x00
|
||||
0xa7 0x7a 0x3d 0xb5 0xf2 0x05 0xe1 0xb9 0x9f 0xcd
|
||||
0x86 0x60 0x86 0x3a 0x15 0x9a 0xd4 0xab 0xe4 0x0f
|
||||
0xa4 0x89 0x34 0x16 0x3d 0xdd 0xe5 0x42 0xa6 0x58
|
||||
0x55 0x40 0xfd 0x68 0x3c 0xbf 0xd8 0xc0 0x0f 0x12
|
||||
0x12 0x9a 0x28 0x4d 0xea 0xcc 0x4c 0xde 0xfe 0x58
|
||||
0xbe 0x71 0x37 0x54 0x1c 0x04 0x71 0x26 0xc8 0xd4
|
||||
0x9e 0x27 0x55 0xab 0x18 0x1a 0xb7 0xe9 0x40 0xb0
|
||||
0xc0
|
||||
|
||||
|
||||
|
||||
--
|
||||
---------------------------------------------------------------------
|
||||
We have the right to defend ourselves and our
|
||||
property, because of the kind of animals that we James A. Donald
|
||||
are. True law derives from this right, not from
|
||||
the arbitrary power of the omnipotent state. jamesd@netcom.com
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user