文件名称:TCExplorer_src
介绍说明--下载内容均来自于网络,请自行研究使用
开源的目录加密软件,可以生成加密的虚拟磁盘,virtual disk,很不错。-Open-source encryption software directory, you can generate an encrypted virtual disk, virtual disk, is pretty good.
(系统自动生成,下载前可以参看下载内容)
下载文件列表
TCExplorer
..........\crypto.cpp
..........\crypto.h
..........\filesys
..........\.......\fat
..........\.......\...\bit_ops.h
..........\.......\...\cache.cpp
..........\.......\...\cache.h
..........\.......\...\common.cpp
..........\.......\...\common.h
..........\.......\...\directory.cpp
..........\.......\...\directory.h
..........\.......\...\disc.cpp
..........\.......\...\disc.h
..........\.......\...\fatdir.cpp
..........\.......\...\fatdir.h
..........\.......\...\fatfile.cpp
..........\.......\...\fatfile.h
..........\.......\...\filetime.cpp
..........\.......\...\filetime.h
..........\.......\...\file_allocation_table.cpp
..........\.......\...\file_allocation_table.h
..........\.......\...\license_libfat.txt
..........\.......\...\mem_allocate.h
..........\.......\...\partition.cpp
..........\.......\...\partition.h
..........\.......\filesys.h
..........\icon.xpm
..........\LibTomCrypt
..........\...........\headers
..........\...........\.......\tomcrypt.h
..........\...........\.......\tomcrypt_argchk.h
..........\...........\.......\tomcrypt_cfg.h
..........\...........\.......\tomcrypt_cipher.h
..........\...........\.......\tomcrypt_custom.h
..........\...........\.......\tomcrypt_hash.h
..........\...........\.......\tomcrypt_mac.h
..........\...........\.......\tomcrypt_macros.h
..........\...........\.......\tomcrypt_math.h
..........\...........\.......\tomcrypt_misc.h
..........\...........\.......\tomcrypt_pk.h
..........\...........\.......\tomcrypt_pkcs.h
..........\...........\.......\tomcrypt_prng.h
..........\...........\LibTomCrypt.cbp
..........\...........\LibTomCrypt.depend
..........\...........\LibTomCrypt.layout
..........\...........\LICENSE
..........\...........\license_LibTomCrypt.txt
..........\...........\ReadMe.txt
..........\...........\src
..........\...........\...\ciphers
..........\...........\...\.......\aes
..........\...........\...\.......\...\aes.c
..........\...........\...\.......\...\aes_tab.c
..........\...........\...\.......\anubis.c
..........\...........\...\.......\blowfish.c
..........\...........\...\.......\cast5.c
..........\...........\...\.......\des.c
..........\...........\...\.......\khazad.c
..........\...........\...\.......\noekeon.c
..........\...........\...\.......\rc2.c
..........\...........\...\.......\rc5.c
..........\...........\...\.......\rc6.c
..........\...........\...\.......\safer
..........\...........\...\.......\.....\safer.c
..........\...........\...\.......\.....\saferp.c
..........\...........\...\.......\.....\safer_tab.c
..........\...........\...\.......\serpent.c
..........\...........\...\.......\skipjack.c
..........\...........\...\.......\twofish
..........\...........\...\.......\.......\twofish.c
..........\...........\...\.......\.......\twofish_tab.c
..........\...........\...\.......\xtea.c
..........\...........\...\encauth
..........\...........\...\.......\ccm
..........\...........\...\.......\...\ccm_memory.c
..........\...........\...\.......\...\ccm_test.c
..........\...........\...\.......\eax
..........\...........\...\.......\...\eax_addheader.c
..........\...........\...\.......\...\eax_decrypt.c
..........\...........\...\.......\...\eax_decrypt_verify_memory.c
..........\...........\...\.......\...\eax_done.c
..........\...........\...\.......\...\eax_encrypt.c
..........\...........\...\.......\...\eax_encrypt_authenticate_memory.c
..........\...........\...\.......\...\eax_init.c
..........\...........\...\.......\...\eax_test.c
..........\...........\...\.......\gcm
..........\...........\...\.......\...\gcm_add_aad.c
..........\...........\...\.......\...\gcm_add_iv.c
..........\...........\...\.......\...\gcm_done.c
..........\...........\...\.......\...\gcm_gf_mult.c
..........\...........\...\.......\...\gcm_init.c
..........\...........\...\.......\...\gcm_memory.c
..........\...........\...\.......\...\gcm_mult_h.c
..........\...........\...\.......\...\gcm_process.c
..........\...........\...\.......\...\gcm_reset.c
..........\...........\...\.......\...\gcm_test.c
..........\...........
..........\crypto.cpp
..........\crypto.h
..........\filesys
..........\.......\fat
..........\.......\...\bit_ops.h
..........\.......\...\cache.cpp
..........\.......\...\cache.h
..........\.......\...\common.cpp
..........\.......\...\common.h
..........\.......\...\directory.cpp
..........\.......\...\directory.h
..........\.......\...\disc.cpp
..........\.......\...\disc.h
..........\.......\...\fatdir.cpp
..........\.......\...\fatdir.h
..........\.......\...\fatfile.cpp
..........\.......\...\fatfile.h
..........\.......\...\filetime.cpp
..........\.......\...\filetime.h
..........\.......\...\file_allocation_table.cpp
..........\.......\...\file_allocation_table.h
..........\.......\...\license_libfat.txt
..........\.......\...\mem_allocate.h
..........\.......\...\partition.cpp
..........\.......\...\partition.h
..........\.......\filesys.h
..........\icon.xpm
..........\LibTomCrypt
..........\...........\headers
..........\...........\.......\tomcrypt.h
..........\...........\.......\tomcrypt_argchk.h
..........\...........\.......\tomcrypt_cfg.h
..........\...........\.......\tomcrypt_cipher.h
..........\...........\.......\tomcrypt_custom.h
..........\...........\.......\tomcrypt_hash.h
..........\...........\.......\tomcrypt_mac.h
..........\...........\.......\tomcrypt_macros.h
..........\...........\.......\tomcrypt_math.h
..........\...........\.......\tomcrypt_misc.h
..........\...........\.......\tomcrypt_pk.h
..........\...........\.......\tomcrypt_pkcs.h
..........\...........\.......\tomcrypt_prng.h
..........\...........\LibTomCrypt.cbp
..........\...........\LibTomCrypt.depend
..........\...........\LibTomCrypt.layout
..........\...........\LICENSE
..........\...........\license_LibTomCrypt.txt
..........\...........\ReadMe.txt
..........\...........\src
..........\...........\...\ciphers
..........\...........\...\.......\aes
..........\...........\...\.......\...\aes.c
..........\...........\...\.......\...\aes_tab.c
..........\...........\...\.......\anubis.c
..........\...........\...\.......\blowfish.c
..........\...........\...\.......\cast5.c
..........\...........\...\.......\des.c
..........\...........\...\.......\khazad.c
..........\...........\...\.......\noekeon.c
..........\...........\...\.......\rc2.c
..........\...........\...\.......\rc5.c
..........\...........\...\.......\rc6.c
..........\...........\...\.......\safer
..........\...........\...\.......\.....\safer.c
..........\...........\...\.......\.....\saferp.c
..........\...........\...\.......\.....\safer_tab.c
..........\...........\...\.......\serpent.c
..........\...........\...\.......\skipjack.c
..........\...........\...\.......\twofish
..........\...........\...\.......\.......\twofish.c
..........\...........\...\.......\.......\twofish_tab.c
..........\...........\...\.......\xtea.c
..........\...........\...\encauth
..........\...........\...\.......\ccm
..........\...........\...\.......\...\ccm_memory.c
..........\...........\...\.......\...\ccm_test.c
..........\...........\...\.......\eax
..........\...........\...\.......\...\eax_addheader.c
..........\...........\...\.......\...\eax_decrypt.c
..........\...........\...\.......\...\eax_decrypt_verify_memory.c
..........\...........\...\.......\...\eax_done.c
..........\...........\...\.......\...\eax_encrypt.c
..........\...........\...\.......\...\eax_encrypt_authenticate_memory.c
..........\...........\...\.......\...\eax_init.c
..........\...........\...\.......\...\eax_test.c
..........\...........\...\.......\gcm
..........\...........\...\.......\...\gcm_add_aad.c
..........\...........\...\.......\...\gcm_add_iv.c
..........\...........\...\.......\...\gcm_done.c
..........\...........\...\.......\...\gcm_gf_mult.c
..........\...........\...\.......\...\gcm_init.c
..........\...........\...\.......\...\gcm_memory.c
..........\...........\...\.......\...\gcm_mult_h.c
..........\...........\...\.......\...\gcm_process.c
..........\...........\...\.......\...\gcm_reset.c
..........\...........\...\.......\...\gcm_test.c
..........\...........