Author: toad
Date: 2007-02-03 17:00:40 +0000 (Sat, 03 Feb 2007)
New Revision: 11663

Added:
   trunk/freenet/src/freenet/crypt/RijndaelPCFBMode.java
Removed:
   trunk/freenet/src/freenet/crypt/ciphers/Twofish.java
   trunk/freenet/src/freenet/crypt/ciphers/Twofish_Algorithm.java
   trunk/freenet/src/freenet/crypt/ciphers/Twofish_Properties.java
Modified:
   trunk/freenet/src/freenet/crypt/PCFBMode.java
   trunk/freenet/src/freenet/crypt/Util.java
   trunk/freenet/src/freenet/crypt/ciphers/Rijndael.java
   trunk/freenet/src/freenet/crypt/ciphers/Rijndael_Algorithm.java
   trunk/freenet/src/freenet/keys/ClientCHKBlock.java
   trunk/freenet/src/freenet/keys/ClientSSKBlock.java
   trunk/freenet/src/freenet/keys/InsertableClientSSK.java
   trunk/freenet/src/freenet/node/FNPPacketMangler.java
   trunk/freenet/src/freenet/support/io/PaddedEphemerallyEncryptedBucket.java
Log:
Prevent two int[] allocations per block encryption.
PEER REVIEW WOULD BE ESPECIALLY WELCOME FOR THIS PATCH AS IT AFFECTS CRYPTO !!!

Modified: trunk/freenet/src/freenet/crypt/PCFBMode.java
===================================================================
--- trunk/freenet/src/freenet/crypt/PCFBMode.java       2007-02-03 16:31:58 UTC 
(rev 11662)
+++ trunk/freenet/src/freenet/crypt/PCFBMode.java       2007-02-03 17:00:40 UTC 
(rev 11663)
@@ -5,6 +5,8 @@

 import java.io.*;

+import freenet.crypt.ciphers.Rijndael;
+
 /**
  * Control mechanism for the Periodic Cipher Feed Back mode.  This is
  * a CFB variant used apparently by a number of programs, including PGP. 
@@ -14,17 +16,29 @@
  */
 public class PCFBMode {

-    private BlockCipher c;
-    private byte[] feedback_register;
-    private int registerPointer;
+    protected BlockCipher c;
+    protected byte[] feedback_register;
+    protected int registerPointer;

-    public PCFBMode(BlockCipher c) {
+    public static PCFBMode create(BlockCipher c) {
+       if(c instanceof Rijndael)
+               return new RijndaelPCFBMode((Rijndael)c);
+       return new PCFBMode(c);
+    }
+    
+    public static PCFBMode create(BlockCipher c, byte[] iv) {
+       if(c instanceof Rijndael)
+               return new RijndaelPCFBMode((Rijndael)c, iv);
+       return new PCFBMode(c, iv);
+    }
+    
+    PCFBMode(BlockCipher c) {
         this.c = c;
         feedback_register = new byte[c.getBlockSize() >> 3];
         registerPointer = feedback_register.length;
     }

-    public PCFBMode(BlockCipher c, byte[] iv) {
+    PCFBMode(BlockCipher c, byte[] iv) {
         this(c);
         System.arraycopy(iv, 0, feedback_register, 0, 
feedback_register.length);
     }
@@ -149,6 +163,3 @@
         registerPointer=0;
     }
 }
-
-
-

Added: trunk/freenet/src/freenet/crypt/RijndaelPCFBMode.java
===================================================================
--- trunk/freenet/src/freenet/crypt/RijndaelPCFBMode.java                       
        (rev 0)
+++ trunk/freenet/src/freenet/crypt/RijndaelPCFBMode.java       2007-02-03 
17:00:40 UTC (rev 11663)
@@ -0,0 +1,38 @@
+package freenet.crypt;
+
+import freenet.crypt.ciphers.Rijndael;
+
+/**
+ * Optimised PCFBMode for Rijndael.
+ * All this actually does is avoid two new int[4]'s per cycle.
+ */
+public final class RijndaelPCFBMode extends PCFBMode {
+
+    /** Temporary variables to remove allocations from inner crypto loop. 
These are wiped
+     * by the encrypt function. */
+    private final int[] a, t;
+
+    // Refills the encrypted buffer with data.
+    //private synchronized void refillBuffer() {
+    protected void refillBuffer() {
+        // Encrypt feedback into result
+        ((Rijndael)c).encipher(feedback_register, feedback_register, a, t);
+
+        registerPointer=0;
+    }
+       
+    public RijndaelPCFBMode(Rijndael c) {
+       super(c);
+       int tempSize = c.getTempArraySize();
+       a = new int[tempSize];
+       t = new int[tempSize];
+    }
+
+    public RijndaelPCFBMode(Rijndael c, byte[] iv) {
+       super(c);
+       int tempSize = c.getTempArraySize();
+       a = new int[tempSize];
+       t = new int[tempSize];
+    }
+    
+}

Modified: trunk/freenet/src/freenet/crypt/Util.java
===================================================================
--- trunk/freenet/src/freenet/crypt/Util.java   2007-02-03 16:31:58 UTC (rev 
11662)
+++ trunk/freenet/src/freenet/crypt/Util.java   2007-02-03 17:00:40 UTC (rev 
11663)
@@ -12,7 +12,6 @@
 import java.util.Random;

 import freenet.crypt.ciphers.Rijndael;
-import freenet.crypt.ciphers.Twofish;
 import freenet.support.HexUtil;
 import freenet.support.Loader;
 import net.i2p.util.NativeBigInteger;
@@ -24,7 +23,6 @@
        static {
                SHA1.class.toString();
                JavaSHA1.class.toString();
-               Twofish.class.toString();
                Rijndael.class.toString();
        }


Modified: trunk/freenet/src/freenet/crypt/ciphers/Rijndael.java
===================================================================
--- trunk/freenet/src/freenet/crypt/ciphers/Rijndael.java       2007-02-03 
16:31:58 UTC (rev 11662)
+++ trunk/freenet/src/freenet/crypt/ciphers/Rijndael.java       2007-02-03 
17:00:40 UTC (rev 11663)
@@ -92,6 +92,22 @@
        Rijndael_Algorithm.blockEncrypt(block, result, 0, sessionKey, 
cryptBlockSize/8);
     }

+    /**
+     * @return Size of temporary int[] a, t. If these are passed in, this can 
speed
+     * things up by avoiding unnecessary allocations between rounds.
+     */
+    public synchronized final int getTempArraySize() {
+       return cryptBlockSize/(8*4);
+    }
+    
+    public synchronized final void encipher(byte[] block, byte[] result, int[] 
a, int[] t) {
+        if(block.length != blocksize/8)
+            throw new IllegalArgumentException();
+        if(a.length != t.length || t.length != cryptBlockSize/(8*4))
+               throw new IllegalArgumentException();
+       Rijndael_Algorithm.blockEncrypt(block, result, 0, sessionKey, 
cryptBlockSize/8, a, t);
+    }
+    
     public synchronized final void decipher(byte[] block, byte[] result) {
         if(block.length != blocksize/8)
             throw new IllegalArgumentException();

Modified: trunk/freenet/src/freenet/crypt/ciphers/Rijndael_Algorithm.java
===================================================================
--- trunk/freenet/src/freenet/crypt/ciphers/Rijndael_Algorithm.java     
2007-02-03 16:31:58 UTC (rev 11662)
+++ trunk/freenet/src/freenet/crypt/ciphers/Rijndael_Algorithm.java     
2007-02-03 17:00:40 UTC (rev 11663)
@@ -611,6 +611,30 @@
             blockEncrypt(in, result, inOffset, sessionKey);
             return;
         }
+
+        int BC = blockSize / 4;
+    
+        int[] a = new int[BC];
+        int[] t = new int[BC]; // temporary work array
+
+        blockEncrypt(in, result, inOffset, sessionKey, blockSize, a, t);
+    }
+    
+    /**
+     * Encrypt exactly one block of plaintext.
+     *
+     * @param  in         The plaintext.
+     * @param  result     The buffer into which to write the resulting 
ciphertext.
+     * @param  inOffset   Index of in from which to start considering data.
+     * @param  sessionKey The session key to use for encryption.
+     * @param  blockSize  The block size in bytes of this Rijndael.
+     */
+    public static final void
+    blockEncrypt (byte[] in, byte[] result, int inOffset, Object sessionKey, 
int blockSize, int[] a, int[] t) {
+        if (blockSize == BLOCK_SIZE) {
+            blockEncrypt(in, result, inOffset, sessionKey);
+            return;
+        }
 if (RDEBUG) trace(IN, "blockEncrypt("+in+", "+inOffset+", "+sessionKey+", 
"+blockSize+ ')');
         Object[] sKey = (Object[]) sessionKey; // extract encryption round keys
         int[][] Ke = (int[][]) sKey[0];
@@ -621,8 +645,6 @@
         int s1 = shifts[SC][1][0];
         int s2 = shifts[SC][2][0];
         int s3 = shifts[SC][3][0];
-        int[] a = new int[BC];
-        int[] t = new int[BC]; // temporary work array
         int i;
         int j = 0, tt;


Deleted: trunk/freenet/src/freenet/crypt/ciphers/Twofish.java
===================================================================
--- trunk/freenet/src/freenet/crypt/ciphers/Twofish.java        2007-02-03 
16:31:58 UTC (rev 11662)
+++ trunk/freenet/src/freenet/crypt/ciphers/Twofish.java        2007-02-03 
17:00:40 UTC (rev 11663)
@@ -1,66 +0,0 @@
-package freenet.crypt.ciphers;
-
-import freenet.crypt.BlockCipher;
-import freenet.crypt.UnsupportedCipherException;
-import freenet.support.Logger;
-import java.security.InvalidKeyException;
-
-/*
-  This code is part of the Java Adaptive Network Client by Ian Clarke. 
-  It is distributed under the GNU Public Licence (GPL) version 2.  See
-  http://www.gnu.org/ for further details of the GPL.
-*/
-
-/**
- * Interfaces with the Twofish AES candidate to implement the Twofish
- * algorithm
- */
-public final class Twofish implements BlockCipher {
-    private Object sessionKey;
-    private int keysize;
-
-    // for Util.getCipherByName..  and yes, screw you too, java
-    public Twofish(Integer keysize) throws UnsupportedCipherException {
-        this(keysize.intValue());
-    }
-
-    public Twofish(int keysize) throws UnsupportedCipherException {
-       if (! ((keysize == 64) ||
-              (keysize == 128) ||
-              (keysize == 192) ||
-              (keysize == 256)))
-           throw new UnsupportedCipherException("Invalid keysize");
-       this.keysize=keysize;
-    }
-
-    public Twofish() {
-        this.keysize = 128;
-    }
-
-    public final int getBlockSize() {
-       return 128;
-    }
-
-    public final int getKeySize() {
-       return keysize;
-    }
-
-    public final void initialize(byte[] key) {
-       try {
-           byte[] nkey=new byte[keysize>>3];
-           System.arraycopy(key, 0, nkey, 0, nkey.length);
-           sessionKey=Twofish_Algorithm.makeKey(nkey);
-       } catch (InvalidKeyException e) {
-           e.printStackTrace();
-           Logger.error(this,"Invalid key");
-       }
-    }
-
-    public final void encipher(byte[] block, byte[] result) {
-       Twofish_Algorithm.blockEncrypt(block, result, 0, sessionKey);
-    }
-
-    public final void decipher(byte[] block, byte[] result) {
-       Twofish_Algorithm.blockDecrypt(block, result, 0, sessionKey);
-    }
-}

Deleted: trunk/freenet/src/freenet/crypt/ciphers/Twofish_Algorithm.java
===================================================================
--- trunk/freenet/src/freenet/crypt/ciphers/Twofish_Algorithm.java      
2007-02-03 16:31:58 UTC (rev 11662)
+++ trunk/freenet/src/freenet/crypt/ciphers/Twofish_Algorithm.java      
2007-02-03 17:00:40 UTC (rev 11663)
@@ -1,839 +0,0 @@
-/*
- * Copyright (c) 1997, 1998 Systemics Ltd on behalf of
- * the Cryptix Development Team. All rights reserved.
- */
-package freenet.crypt.ciphers;
-
-import java.io.PrintWriter;
-import java.security.InvalidKeyException;
-
-//...........................................................................
-/**
- * Twofish is an AES candidate algorithm. It is a balanced 128-bit Feistel
- * cipher, consisting of 16 rounds. In each round, a 64-bit S-box value is
- * computed from 64 bits of the block, and this value is xored into the other
- * half of the block. The two half-blocks are then exchanged, and the next
- * round begins. Before the first round, all input bits are xored with key-
- * dependent "whitening" subkeys, and after the final round the output bits
- * are xored with other key-dependent whitening subkeys; these subkeys are
- * not used anywhere else in the algorithm.<p>
- *
- * Twofish was submitted by Bruce Schneier, Doug Whiting, John Kelsey, Chris
- * Hall and David Wagner.<p>
- *
- * Reference:<ol>
- *  <li>TWOFISH2.C -- Optimized C API calls for TWOFISH AES submission,
- *  Version 1.00, April 1998, by Doug Whiting.</ol><p>
- *
- * <b>Copyright</b> &copy; 1998
- * <a href="http://www.systemics.com/";>Systemics Ltd</a> on behalf of the
- * <a href="http://www.systemics.com/docs/cryptix/";>Cryptix Development 
Team</a>.
- * <br>All rights reserved.<p>
- *
- * @author  Raif S. Naffah
- */
-public final class Twofish_Algorithm // implicit no-argument constructor
-{
-// Debugging methods and variables
-//...........................................................................
-
-   static final String NAME = "Twofish_Algorithm";
-   static final boolean IN = true, OUT = false;
-
-   static final boolean TDEBUG = Twofish_Properties.GLOBAL_DEBUG;
-   static final int debuglevel = TDEBUG ? Twofish_Properties.getLevel(NAME) : 
0;
-//   static final PrintWriter err = TDEBUG ? Twofish_Properties.getOutput() : 
null;
-   static final PrintWriter err = null;
-
-   static final boolean TRACE = Twofish_Properties.isTraceable(NAME);
-
-   static void debug (String s) { err.println(">>> "+NAME+": "+s); }
-   static void trace (boolean in, String s) {
-      if (TRACE) err.println((in?"==> ":"<== ")+NAME+ '.' +s);
-   }
-   static void trace (String s) { if (TRACE) err.println("<=> "+NAME+ '.' +s); 
}
-
-
-// Constants and variables
-//...........................................................................
-
-   static final int BLOCK_SIZE = 16; // bytes in a data-block
-   private static final int ROUNDS = 16;
-   
-   /* Subkey array indices */
-   private static final int INPUT_WHITEN = 0;
-   private static final int OUTPUT_WHITEN = INPUT_WHITEN +  BLOCK_SIZE/4;
-   private static final int ROUND_SUBKEYS = OUTPUT_WHITEN + BLOCK_SIZE/4; // 
2*(# rounds)
-
-   private static final int SK_STEP = 0x02020202;
-   private static final int SK_BUMP = 0x01010101;
-   private static final int SK_ROTL = 9;
-
-   /** Fixed 8x8 permutation S-boxes */
-   private static final byte[][] P = new byte[][] {
-      {  // p0
-         (byte) 0xA9, (byte) 0x67, (byte) 0xB3, (byte) 0xE8,
-         (byte) 0x04, (byte) 0xFD, (byte) 0xA3, (byte) 0x76,
-         (byte) 0x9A, (byte) 0x92, (byte) 0x80, (byte) 0x78,
-         (byte) 0xE4, (byte) 0xDD, (byte) 0xD1, (byte) 0x38,
-         (byte) 0x0D, (byte) 0xC6, (byte) 0x35, (byte) 0x98,
-         (byte) 0x18, (byte) 0xF7, (byte) 0xEC, (byte) 0x6C,
-         (byte) 0x43, (byte) 0x75, (byte) 0x37, (byte) 0x26,
-         (byte) 0xFA, (byte) 0x13, (byte) 0x94, (byte) 0x48,
-         (byte) 0xF2, (byte) 0xD0, (byte) 0x8B, (byte) 0x30,
-         (byte) 0x84, (byte) 0x54, (byte) 0xDF, (byte) 0x23,
-         (byte) 0x19, (byte) 0x5B, (byte) 0x3D, (byte) 0x59,
-         (byte) 0xF3, (byte) 0xAE, (byte) 0xA2, (byte) 0x82,
-         (byte) 0x63, (byte) 0x01, (byte) 0x83, (byte) 0x2E,
-         (byte) 0xD9, (byte) 0x51, (byte) 0x9B, (byte) 0x7C,
-         (byte) 0xA6, (byte) 0xEB, (byte) 0xA5, (byte) 0xBE,
-         (byte) 0x16, (byte) 0x0C, (byte) 0xE3, (byte) 0x61,
-         (byte) 0xC0, (byte) 0x8C, (byte) 0x3A, (byte) 0xF5,
-         (byte) 0x73, (byte) 0x2C, (byte) 0x25, (byte) 0x0B,
-         (byte) 0xBB, (byte) 0x4E, (byte) 0x89, (byte) 0x6B,
-         (byte) 0x53, (byte) 0x6A, (byte) 0xB4, (byte) 0xF1,
-         (byte) 0xE1, (byte) 0xE6, (byte) 0xBD, (byte) 0x45,
-         (byte) 0xE2, (byte) 0xF4, (byte) 0xB6, (byte) 0x66,
-         (byte) 0xCC, (byte) 0x95, (byte) 0x03, (byte) 0x56,
-         (byte) 0xD4, (byte) 0x1C, (byte) 0x1E, (byte) 0xD7,
-         (byte) 0xFB, (byte) 0xC3, (byte) 0x8E, (byte) 0xB5,
-         (byte) 0xE9, (byte) 0xCF, (byte) 0xBF, (byte) 0xBA,
-         (byte) 0xEA, (byte) 0x77, (byte) 0x39, (byte) 0xAF,
-         (byte) 0x33, (byte) 0xC9, (byte) 0x62, (byte) 0x71,
-         (byte) 0x81, (byte) 0x79, (byte) 0x09, (byte) 0xAD,
-         (byte) 0x24, (byte) 0xCD, (byte) 0xF9, (byte) 0xD8,
-         (byte) 0xE5, (byte) 0xC5, (byte) 0xB9, (byte) 0x4D,
-         (byte) 0x44, (byte) 0x08, (byte) 0x86, (byte) 0xE7,
-         (byte) 0xA1, (byte) 0x1D, (byte) 0xAA, (byte) 0xED,
-         (byte) 0x06, (byte) 0x70, (byte) 0xB2, (byte) 0xD2,
-         (byte) 0x41, (byte) 0x7B, (byte) 0xA0, (byte) 0x11,
-         (byte) 0x31, (byte) 0xC2, (byte) 0x27, (byte) 0x90,
-         (byte) 0x20, (byte) 0xF6, (byte) 0x60, (byte) 0xFF,
-         (byte) 0x96, (byte) 0x5C, (byte) 0xB1, (byte) 0xAB,
-         (byte) 0x9E, (byte) 0x9C, (byte) 0x52, (byte) 0x1B,
-         (byte) 0x5F, (byte) 0x93, (byte) 0x0A, (byte) 0xEF,
-         (byte) 0x91, (byte) 0x85, (byte) 0x49, (byte) 0xEE,
-         (byte) 0x2D, (byte) 0x4F, (byte) 0x8F, (byte) 0x3B,
-         (byte) 0x47, (byte) 0x87, (byte) 0x6D, (byte) 0x46,
-         (byte) 0xD6, (byte) 0x3E, (byte) 0x69, (byte) 0x64,
-         (byte) 0x2A, (byte) 0xCE, (byte) 0xCB, (byte) 0x2F,
-         (byte) 0xFC, (byte) 0x97, (byte) 0x05, (byte) 0x7A,
-         (byte) 0xAC, (byte) 0x7F, (byte) 0xD5, (byte) 0x1A,
-         (byte) 0x4B, (byte) 0x0E, (byte) 0xA7, (byte) 0x5A,
-         (byte) 0x28, (byte) 0x14, (byte) 0x3F, (byte) 0x29,
-         (byte) 0x88, (byte) 0x3C, (byte) 0x4C, (byte) 0x02,
-         (byte) 0xB8, (byte) 0xDA, (byte) 0xB0, (byte) 0x17,
-         (byte) 0x55, (byte) 0x1F, (byte) 0x8A, (byte) 0x7D,
-         (byte) 0x57, (byte) 0xC7, (byte) 0x8D, (byte) 0x74,
-         (byte) 0xB7, (byte) 0xC4, (byte) 0x9F, (byte) 0x72,
-         (byte) 0x7E, (byte) 0x15, (byte) 0x22, (byte) 0x12,
-         (byte) 0x58, (byte) 0x07, (byte) 0x99, (byte) 0x34,
-         (byte) 0x6E, (byte) 0x50, (byte) 0xDE, (byte) 0x68,
-         (byte) 0x65, (byte) 0xBC, (byte) 0xDB, (byte) 0xF8,
-         (byte) 0xC8, (byte) 0xA8, (byte) 0x2B, (byte) 0x40,
-         (byte) 0xDC, (byte) 0xFE, (byte) 0x32, (byte) 0xA4,
-         (byte) 0xCA, (byte) 0x10, (byte) 0x21, (byte) 0xF0,
-         (byte) 0xD3, (byte) 0x5D, (byte) 0x0F, (byte) 0x00,
-         (byte) 0x6F, (byte) 0x9D, (byte) 0x36, (byte) 0x42,
-         (byte) 0x4A, (byte) 0x5E, (byte) 0xC1, (byte) 0xE0
-      },
-      {  // p1
-         (byte) 0x75, (byte) 0xF3, (byte) 0xC6, (byte) 0xF4,
-         (byte) 0xDB, (byte) 0x7B, (byte) 0xFB, (byte) 0xC8,
-         (byte) 0x4A, (byte) 0xD3, (byte) 0xE6, (byte) 0x6B,
-         (byte) 0x45, (byte) 0x7D, (byte) 0xE8, (byte) 0x4B,
-         (byte) 0xD6, (byte) 0x32, (byte) 0xD8, (byte) 0xFD,
-         (byte) 0x37, (byte) 0x71, (byte) 0xF1, (byte) 0xE1,
-         (byte) 0x30, (byte) 0x0F, (byte) 0xF8, (byte) 0x1B,
-         (byte) 0x87, (byte) 0xFA, (byte) 0x06, (byte) 0x3F,
-         (byte) 0x5E, (byte) 0xBA, (byte) 0xAE, (byte) 0x5B,
-         (byte) 0x8A, (byte) 0x00, (byte) 0xBC, (byte) 0x9D,
-         (byte) 0x6D, (byte) 0xC1, (byte) 0xB1, (byte) 0x0E,
-         (byte) 0x80, (byte) 0x5D, (byte) 0xD2, (byte) 0xD5,
-         (byte) 0xA0, (byte) 0x84, (byte) 0x07, (byte) 0x14,
-         (byte) 0xB5, (byte) 0x90, (byte) 0x2C, (byte) 0xA3,
-         (byte) 0xB2, (byte) 0x73, (byte) 0x4C, (byte) 0x54,
-         (byte) 0x92, (byte) 0x74, (byte) 0x36, (byte) 0x51,
-         (byte) 0x38, (byte) 0xB0, (byte) 0xBD, (byte) 0x5A,
-         (byte) 0xFC, (byte) 0x60, (byte) 0x62, (byte) 0x96,
-         (byte) 0x6C, (byte) 0x42, (byte) 0xF7, (byte) 0x10,
-         (byte) 0x7C, (byte) 0x28, (byte) 0x27, (byte) 0x8C,
-         (byte) 0x13, (byte) 0x95, (byte) 0x9C, (byte) 0xC7,
-         (byte) 0x24, (byte) 0x46, (byte) 0x3B, (byte) 0x70,
-         (byte) 0xCA, (byte) 0xE3, (byte) 0x85, (byte) 0xCB,
-         (byte) 0x11, (byte) 0xD0, (byte) 0x93, (byte) 0xB8,
-         (byte) 0xA6, (byte) 0x83, (byte) 0x20, (byte) 0xFF,
-         (byte) 0x9F, (byte) 0x77, (byte) 0xC3, (byte) 0xCC,
-         (byte) 0x03, (byte) 0x6F, (byte) 0x08, (byte) 0xBF,
-         (byte) 0x40, (byte) 0xE7, (byte) 0x2B, (byte) 0xE2,
-         (byte) 0x79, (byte) 0x0C, (byte) 0xAA, (byte) 0x82,
-         (byte) 0x41, (byte) 0x3A, (byte) 0xEA, (byte) 0xB9,
-         (byte) 0xE4, (byte) 0x9A, (byte) 0xA4, (byte) 0x97,
-         (byte) 0x7E, (byte) 0xDA, (byte) 0x7A, (byte) 0x17,
-         (byte) 0x66, (byte) 0x94, (byte) 0xA1, (byte) 0x1D,
-         (byte) 0x3D, (byte) 0xF0, (byte) 0xDE, (byte) 0xB3,
-         (byte) 0x0B, (byte) 0x72, (byte) 0xA7, (byte) 0x1C,
-         (byte) 0xEF, (byte) 0xD1, (byte) 0x53, (byte) 0x3E,
-         (byte) 0x8F, (byte) 0x33, (byte) 0x26, (byte) 0x5F,
-         (byte) 0xEC, (byte) 0x76, (byte) 0x2A, (byte) 0x49,
-         (byte) 0x81, (byte) 0x88, (byte) 0xEE, (byte) 0x21,
-         (byte) 0xC4, (byte) 0x1A, (byte) 0xEB, (byte) 0xD9,
-         (byte) 0xC5, (byte) 0x39, (byte) 0x99, (byte) 0xCD,
-         (byte) 0xAD, (byte) 0x31, (byte) 0x8B, (byte) 0x01,
-         (byte) 0x18, (byte) 0x23, (byte) 0xDD, (byte) 0x1F,
-         (byte) 0x4E, (byte) 0x2D, (byte) 0xF9, (byte) 0x48,
-         (byte) 0x4F, (byte) 0xF2, (byte) 0x65, (byte) 0x8E,
-         (byte) 0x78, (byte) 0x5C, (byte) 0x58, (byte) 0x19,
-         (byte) 0x8D, (byte) 0xE5, (byte) 0x98, (byte) 0x57,
-         (byte) 0x67, (byte) 0x7F, (byte) 0x05, (byte) 0x64,
-         (byte) 0xAF, (byte) 0x63, (byte) 0xB6, (byte) 0xFE,
-         (byte) 0xF5, (byte) 0xB7, (byte) 0x3C, (byte) 0xA5,
-         (byte) 0xCE, (byte) 0xE9, (byte) 0x68, (byte) 0x44,
-         (byte) 0xE0, (byte) 0x4D, (byte) 0x43, (byte) 0x69,
-         (byte) 0x29, (byte) 0x2E, (byte) 0xAC, (byte) 0x15,
-         (byte) 0x59, (byte) 0xA8, (byte) 0x0A, (byte) 0x9E,
-         (byte) 0x6E, (byte) 0x47, (byte) 0xDF, (byte) 0x34,
-         (byte) 0x35, (byte) 0x6A, (byte) 0xCF, (byte) 0xDC,
-         (byte) 0x22, (byte) 0xC9, (byte) 0xC0, (byte) 0x9B,
-         (byte) 0x89, (byte) 0xD4, (byte) 0xED, (byte) 0xAB,
-         (byte) 0x12, (byte) 0xA2, (byte) 0x0D, (byte) 0x52,
-         (byte) 0xBB, (byte) 0x02, (byte) 0x2F, (byte) 0xA9,
-         (byte) 0xD7, (byte) 0x61, (byte) 0x1E, (byte) 0xB4,
-         (byte) 0x50, (byte) 0x04, (byte) 0xF6, (byte) 0xC2,
-         (byte) 0x16, (byte) 0x25, (byte) 0x86, (byte) 0x56,
-         (byte) 0x55, (byte) 0x09, (byte) 0xBE, (byte) 0x91
-      }
-   };
-
-   /**
-    * Define the fixed p0/p1 permutations used in keyed S-box lookup.
-    * By changing the following constant definitions, the S-boxes will
-    * automatically get changed in the Twofish engine.
-    */
-   private static final int P_00 = 1;
-   private static final int P_01 = 0;
-   private static final int P_02 = 0;
-   private static final int P_03 = P_01 ^ 1;
-   private static final int P_04 = 1;
-
-   private static final int P_10 = 0;
-   private static final int P_11 = 0;
-   private static final int P_12 = 1;
-   private static final int P_13 = P_11 ^ 1;
-   private static final int P_14 = 0;
-
-   private static final int P_20 = 1;
-   private static final int P_21 = 1;
-   private static final int P_22 = 0;
-   private static final int P_23 = P_21 ^ 1;
-   private static final int P_24 = 0;
-
-   private static final int P_30 = 0;
-   private static final int P_31 = 1;
-   private static final int P_32 = 1;
-   private static final int P_33 = P_31 ^ 1;
-   private static final int P_34 = 1;
-
-   /** Primitive polynomial for GF(256) */
-   private static final int GF256_FDBK_2 = 0x169 / 2;
-   private static final int GF256_FDBK_4 = 0x169 / 4;
-
-   /** MDS matrix */
-   private static final int[][] MDS = new int[4][256]; // blank final
-
-   private static final int RS_GF_FDBK = 0x14D; // field generator
-
-   /** data for hexadecimal visualisation. */
-   private static final char[] HEX_DIGITS = {
-      '0','1','2','3','4','5','6','7','8','9','A','B','C','D','E','F'
-   };
-
-
-// Static code - to intialise the MDS matrix
-//...........................................................................
-
-   static {
-      long time = System.currentTimeMillis();
-
-if (TDEBUG && (debuglevel > 6)) {
-System.out.println("Algorithm Name: "+Twofish_Properties.FULL_NAME);
-System.out.println("Electronic Codebook (ECB) Mode");
-System.out.println();
-}
-      //
-      // precompute the MDS matrix
-      //
-      int[] m1 = new int[2];
-      int[] mX = new int[2];
-      int[] mY = new int[2];
-      int i, j;
-      for (i = 0; i < 256; i++) {
-         j = P[0][i]       & 0xFF; // compute all the matrix elements
-         m1[0] = j;
-         mX[0] = Mx_X( j ) & 0xFF;
-         mY[0] = Mx_Y( j ) & 0xFF;
-
-         j = P[1][i]       & 0xFF;
-         m1[1] = j;
-         mX[1] = Mx_X( j ) & 0xFF;
-         mY[1] = Mx_Y( j ) & 0xFF;
-
-         MDS[0][i] = m1[P_00] <<  0 | // fill matrix w/ above elements
-                     mX[P_00] <<  8 |
-                     mY[P_00] << 16 |
-                     mY[P_00] << 24;
-         MDS[1][i] = mY[P_10] <<  0 |
-                     mY[P_10] <<  8 |
-                     mX[P_10] << 16 |
-                     m1[P_10] << 24;
-         MDS[2][i] = mX[P_20] <<  0 |
-                     mY[P_20] <<  8 |
-                     m1[P_20] << 16 |
-                     mY[P_20] << 24;
-         MDS[3][i] = mX[P_30] <<  0 |
-                     m1[P_30] <<  8 |
-                     mY[P_30] << 16 |
-                     mX[P_30] << 24;
-      }
-      
-      time = System.currentTimeMillis() - time;
-
-if (TDEBUG && (debuglevel > 8)) {
-System.out.println("==========");
-System.out.println();
-System.out.println("Static Data");
-System.out.println();
-System.out.println("MDS[0][]:"); for(i=0;i<64;i++) { for(j=0;j<4;j++) 
System.out.print("0x"+intToString(MDS[0][i*4+j])+", "); System.out.println();}
-System.out.println();
-System.out.println("MDS[1][]:"); for(i=0;i<64;i++) { for(j=0;j<4;j++) 
System.out.print("0x"+intToString(MDS[1][i*4+j])+", "); System.out.println();}
-System.out.println();
-System.out.println("MDS[2][]:"); for(i=0;i<64;i++) { for(j=0;j<4;j++) 
System.out.print("0x"+intToString(MDS[2][i*4+j])+", "); System.out.println();}
-System.out.println();
-System.out.println("MDS[3][]:"); for(i=0;i<64;i++) { for(j=0;j<4;j++) 
System.out.print("0x"+intToString(MDS[3][i*4+j])+", "); System.out.println();}
-System.out.println();
-System.out.println("Total initialization time: "+time+" ms.");
-System.out.println();
-}
-   }
-
-   private static final int LFSR1( int x ) {
-      return (x >> 1) ^
-            ((x & 0x01) != 0 ? GF256_FDBK_2 : 0);
-   }
-
-   private static final int LFSR2( int x ) {
-      return (x >> 2) ^
-            ((x & 0x02) != 0 ? GF256_FDBK_2 : 0) ^
-            ((x & 0x01) != 0 ? GF256_FDBK_4 : 0);
-   }
-
-   private static final int Mx_X( int x ) { return x ^ LFSR2(x); }            
// 5B
-   private static final int Mx_Y( int x ) { return x ^ LFSR1(x) ^ LFSR2(x); } 
// EF
-
-
-// Basic API methods
-//...........................................................................
-
-   /**
-    * Expand a user-supplied key material into a session key.
-    *
-    * @param k  The 64/128/192/256-bit user-key to use.
-    * @return  This cipher's round keys.
-    * @exception  InvalidKeyException  If the key is invalid.
-    */
-   public static final synchronized Object makeKey (byte[] k)
-   throws InvalidKeyException {
-if (TDEBUG) trace(IN, "makeKey("+k+ ')');
-      if (k == null)
-         throw new InvalidKeyException("Empty key");
-      int length = k.length;
-      if (!((length == 8) || (length == 16) || (length == 24) || (length == 
32)))
-          throw new InvalidKeyException("Incorrect key length");
-
-if (TDEBUG && (debuglevel > 7)) {
-System.out.println("Intermediate Session Key Values");
-System.out.println();
-System.out.println("Raw="+toString(k));
-System.out.println();
-}
-      int k64Cnt = length / 8;
-      int subkeyCnt = ROUND_SUBKEYS + 2*ROUNDS;
-      int[] k32e = new int[4]; // even 32-bit entities
-      int[] k32o = new int[4]; // odd 32-bit entities
-      int[] sBoxKey = new int[4];
-      //
-      // split user key material into even and odd 32-bit entities and
-      // compute S-box keys using (12, 8) Reed-Solomon code over GF(256)
-      //
-      int i, j, offset = 0;
-      for (i = 0, j = k64Cnt-1; (i < 4) && (offset < length); i++, j--) {
-         k32e[i] = (k[offset++] & 0xFF)       |
-                   (k[offset++] & 0xFF) <<  8 |
-                   (k[offset++] & 0xFF) << 16 |
-                   (k[offset++] & 0xFF) << 24;
-         k32o[i] = (k[offset++] & 0xFF)       |
-                   (k[offset++] & 0xFF) <<  8 |
-                   (k[offset++] & 0xFF) << 16 |
-                   (k[offset++] & 0xFF) << 24;
-         sBoxKey[j] = RS_MDS_Encode( k32e[i], k32o[i] ); // reverse order
-      }
-      // compute the round decryption subkeys for PHT. these same subkeys
-      // will be used in encryption but will be applied in reverse order.
-      int q, A, B;
-      int[] subKeys = new int[subkeyCnt];
-      for (i = q = 0; i < subkeyCnt/2; i++, q += SK_STEP) {
-         A = F32( k64Cnt, q        , k32e ); // A uses even key entities
-         B = F32( k64Cnt, q+SK_BUMP, k32o ); // B uses odd  key entities
-         B = B << 8 | B >>> 24;
-         A += B;
-         subKeys[2*i    ] = A;               // combine with a PHT
-         A += B;
-         subKeys[2*i + 1] = A << SK_ROTL | A >>> (32-SK_ROTL);
-      }
-      //
-      // fully expand the table for speed
-      //
-      int k0 = sBoxKey[0];
-      int k1 = sBoxKey[1];
-      int k2 = sBoxKey[2];
-      int k3 = sBoxKey[3];
-      int b0, b1, b2, b3;
-      int[] sBox = new int[4 * 256];
-      for (i = 0; i < 256; i++) {
-         b0 = b1 = b2 = b3 = i;
-         switch (k64Cnt & 3) {
-         case 1:
-            sBox[      2*i  ] = MDS[0][(P[P_01][b0] & 0xFF) ^ b0(k0)];
-            sBox[      2*i+1] = MDS[1][(P[P_11][b1] & 0xFF) ^ b1(k0)];
-            sBox[0x200+2*i  ] = MDS[2][(P[P_21][b2] & 0xFF) ^ b2(k0)];
-            sBox[0x200+2*i+1] = MDS[3][(P[P_31][b3] & 0xFF) ^ b3(k0)];
-            break;
-         case 0: // same as 4
-            b0 = (P[P_04][b0] & 0xFF) ^ b0(k3);
-            b1 = (P[P_14][b1] & 0xFF) ^ b1(k3);
-            b2 = (P[P_24][b2] & 0xFF) ^ b2(k3);
-            b3 = (P[P_34][b3] & 0xFF) ^ b3(k3);
-         case 3:
-            b0 = (P[P_03][b0] & 0xFF) ^ b0(k2);
-            b1 = (P[P_13][b1] & 0xFF) ^ b1(k2);
-            b2 = (P[P_23][b2] & 0xFF) ^ b2(k2);
-            b3 = (P[P_33][b3] & 0xFF) ^ b3(k2);
-         case 2: // 128-bit keys
-            sBox[      2*i  ] = MDS[0][(P[P_01][(P[P_02][b0] & 0xFF) ^ b0(k1)] 
& 0xFF) ^ b0(k0)];
-            sBox[      2*i+1] = MDS[1][(P[P_11][(P[P_12][b1] & 0xFF) ^ b1(k1)] 
& 0xFF) ^ b1(k0)];
-            sBox[0x200+2*i  ] = MDS[2][(P[P_21][(P[P_22][b2] & 0xFF) ^ b2(k1)] 
& 0xFF) ^ b2(k0)];
-            sBox[0x200+2*i+1] = MDS[3][(P[P_31][(P[P_32][b3] & 0xFF) ^ b3(k1)] 
& 0xFF) ^ b3(k0)];
-         }
-      }
-
-      Object sessionKey = new Object[] { sBox, subKeys };
-
-if (TDEBUG && (debuglevel > 7)) {
-System.out.println("S-box[]:");
-for(i=0;i<64;i++) { for(j=0;j<4;j++) 
System.out.print("0x"+intToString(sBox[i*4+j])+", "); System.out.println();}
-System.out.println();
-for(i=0;i<64;i++) { for(j=0;j<4;j++) 
System.out.print("0x"+intToString(sBox[256+i*4+j])+", "); System.out.println();}
-System.out.println();
-for(i=0;i<64;i++) { for(j=0;j<4;j++) 
System.out.print("0x"+intToString(sBox[512+i*4+j])+", "); System.out.println();}
-System.out.println();
-for(i=0;i<64;i++) { for(j=0;j<4;j++) 
System.out.print("0x"+intToString(sBox[768+i*4+j])+", "); System.out.println();}
-System.out.println();
-System.out.println("User (odd, even) keys  --> S-Box keys:");
-for(i=0;i<k64Cnt;i++) { System.out.println("0x"+intToString(k32o[i])+"  
0x"+intToString(k32e[i])+" --> 0x"+intToString(sBoxKey[k64Cnt-1-i])); }
-System.out.println();
-System.out.println("Round keys:");
-for(i=0;i<ROUND_SUBKEYS + 2*ROUNDS;i+=2) { 
System.out.println("0x"+intToString(subKeys[i])+"  
0x"+intToString(subKeys[i+1])); }
-System.out.println();
-
-}
-if (TDEBUG) trace(OUT, "makeKey()");
-      return sessionKey;
-   }
-
-   /**
-    * Encrypt exactly one block of plaintext.
-    *
-    * @param in        The plaintext.
-    * @param inOffset   Index of in from which to start considering data.
-    * @param sessionKey  The session key to use for encryption.
-    */
-   public static final void
-   blockEncrypt (byte[] in, byte[] result, int inOffset, Object sessionKey) {
-if (TDEBUG) trace(IN, "blockEncrypt("+in+", "+inOffset+", "+sessionKey+ ')');
-      Object[] sk = (Object[]) sessionKey; // extract S-box and session key
-      int[] sBox = (int[]) sk[0];
-      int[] sKey = (int[]) sk[1];
-
-if (TDEBUG && (debuglevel > 6)) System.out.println("PT="+toString(in, 
inOffset, BLOCK_SIZE));
-
-      int x0 = (in[inOffset++] & 0xFF)       |
-               (in[inOffset++] & 0xFF) <<  8 |
-               (in[inOffset++] & 0xFF) << 16 |
-               (in[inOffset++] & 0xFF) << 24;
-      int x1 = (in[inOffset++] & 0xFF)       |
-               (in[inOffset++] & 0xFF) <<  8 |
-               (in[inOffset++] & 0xFF) << 16 |
-               (in[inOffset++] & 0xFF) << 24;
-      int x2 = (in[inOffset++] & 0xFF)       |
-               (in[inOffset++] & 0xFF) <<  8 |
-               (in[inOffset++] & 0xFF) << 16 |
-               (in[inOffset++] & 0xFF) << 24;
-      int x3 = (in[inOffset++] & 0xFF)       |
-               (in[inOffset++] & 0xFF) <<  8 |
-               (in[inOffset++] & 0xFF) << 16 |
-               (in[inOffset++] & 0xFF) << 24;
-
-      x0 ^= sKey[INPUT_WHITEN    ];
-      x1 ^= sKey[INPUT_WHITEN + 1];
-      x2 ^= sKey[INPUT_WHITEN + 2];
-      x3 ^= sKey[INPUT_WHITEN + 3];
-if (TDEBUG && (debuglevel > 6)) 
System.out.println("PTw="+intToString(x0)+intToString(x1)+intToString(x2)+intToString(x3));
-
-      int t0, t1;
-      int k = ROUND_SUBKEYS;
-      for (int R = 0; R < ROUNDS; R += 2) {
-         t0 = Fe32_0( sBox, x0 );
-         t1 = Fe32_3( sBox, x1 );
-         x2 ^= t0 + t1 + sKey[k++];
-         x2  = x2 >>> 1 | x2 << 31;
-         x3  = x3 << 1 | x3 >>> 31;
-         x3 ^= t0 + 2*t1 + sKey[k++];
-if (TDEBUG && (debuglevel > 6)) System.out.println("CT"+(R)+ '=' 
+intToString(x0)+intToString(x1)+intToString(x2)+intToString(x3));
-
-         t0 = Fe32_0( sBox, x2 );
-         t1 = Fe32_3( sBox, x3 );
-         x0 ^= t0 + t1 + sKey[k++];
-         x0  = x0 >>> 1 | x0 << 31;
-         x1  = x1 << 1 | x1 >>> 31;
-         x1 ^= t0 + 2*t1 + sKey[k++];
-if (TDEBUG && (debuglevel > 6)) System.out.println("CT"+(R+1)+ '=' 
+intToString(x0)+intToString(x1)+intToString(x2)+intToString(x3));
-      }
-      x2 ^= sKey[OUTPUT_WHITEN    ];
-      x3 ^= sKey[OUTPUT_WHITEN + 1];
-      x0 ^= sKey[OUTPUT_WHITEN + 2];
-      x1 ^= sKey[OUTPUT_WHITEN + 3];
-if (TDEBUG && (debuglevel > 6)) 
System.out.println("CTw="+intToString(x0)+intToString(x1)+intToString(x2)+intToString(x3));
-
-     result[0] = (byte) x2;
-     result[1] = (byte)(x2 >>> 8);
-     result[2] = (byte)(x2 >>> 16);
-     result[3] = (byte)(x2 >>> 24);
-     result[4] = (byte) x3;
-     result[5] = (byte)(x3 >>> 8);
-     result[6] = (byte)(x3 >>> 16);
-     result[7] = (byte)(x3 >>> 24);
-     result[8] = (byte) x0;
-     result[9] = (byte)(x0 >>> 8);
-     result[10] = (byte)(x0 >>> 16);
-     result[11] = (byte)(x0 >>> 24);
-     result[12] = (byte) x1;
-     result[13] = (byte)(x1 >>> 8);
-     result[14] = (byte)(x1 >>> 16);
-     result[15] = (byte)(x1 >>> 24);
-
-if (TDEBUG && (debuglevel > 6)) {
-System.out.println("CT="+toString(result));
-System.out.println();
-}
-if (TDEBUG) trace(OUT, "blockEncrypt()");
-   }
-
-   /**
-    * Decrypt exactly one block of ciphertext.
-    *
-    * @param in        The ciphertext.
-    * @param inOffset   Index of in from which to start considering data.
-    * @param sessionKey  The session key to use for decryption.
-    */
-   public static final void
-   blockDecrypt (byte[] in, byte[] result, int inOffset, Object sessionKey) {
-if (TDEBUG) trace(IN, "blockDecrypt("+in+", "+inOffset+", "+sessionKey+ ')');
-      Object[] sk = (Object[]) sessionKey; // extract S-box and session key
-      int[] sBox = (int[]) sk[0];
-      int[] sKey = (int[]) sk[1];
-
-if (TDEBUG && (debuglevel > 6)) System.out.println("CT="+toString(in, 
inOffset, BLOCK_SIZE));
-
-      int x2 = (in[inOffset++] & 0xFF)       |
-               (in[inOffset++] & 0xFF) <<  8 |
-               (in[inOffset++] & 0xFF) << 16 |
-               (in[inOffset++] & 0xFF) << 24;
-      int x3 = (in[inOffset++] & 0xFF)       |
-               (in[inOffset++] & 0xFF) <<  8 |
-               (in[inOffset++] & 0xFF) << 16 |
-               (in[inOffset++] & 0xFF) << 24;
-      int x0 = (in[inOffset++] & 0xFF)       |
-               (in[inOffset++] & 0xFF) <<  8 |
-               (in[inOffset++] & 0xFF) << 16 |
-               (in[inOffset++] & 0xFF) << 24;
-      int x1 = (in[inOffset++] & 0xFF)       |
-               (in[inOffset++] & 0xFF) <<  8 |
-               (in[inOffset++] & 0xFF) << 16 |
-               (in[inOffset++] & 0xFF) << 24;
-
-      x2 ^= sKey[OUTPUT_WHITEN    ];
-      x3 ^= sKey[OUTPUT_WHITEN + 1];
-      x0 ^= sKey[OUTPUT_WHITEN + 2];
-      x1 ^= sKey[OUTPUT_WHITEN + 3];
-if (TDEBUG && (debuglevel > 6)) 
System.out.println("CTw="+intToString(x2)+intToString(x3)+intToString(x0)+intToString(x1));
-
-      int k = ROUND_SUBKEYS + 2*ROUNDS - 1;
-      int t0, t1;
-      for (int R = 0; R < ROUNDS; R += 2) {
-         t0 = Fe32_0( sBox, x2 );
-         t1 = Fe32_3( sBox, x3 );
-         x1 ^= t0 + 2*t1 + sKey[k--];
-         x1  = x1 >>> 1 | x1 << 31;
-         x0  = x0 << 1 | x0 >>> 31;
-         x0 ^= t0 + t1 + sKey[k--];
-if (TDEBUG && (debuglevel > 6)) System.out.println("PT"+(ROUNDS-R)+ '=' 
+intToString(x2)+intToString(x3)+intToString(x0)+intToString(x1));
-
-         t0 = Fe32_0( sBox, x0 );
-         t1 = Fe32_3( sBox, x1 );
-         x3 ^= t0 + 2*t1 + sKey[k--];
-         x3  = x3 >>> 1 | x3 << 31;
-         x2  = x2 << 1 | x2 >>> 31;
-         x2 ^= t0 + t1 + sKey[k--];
-if (TDEBUG && (debuglevel > 6)) System.out.println("PT"+(ROUNDS-R-1)+ '=' 
+intToString(x2)+intToString(x3)+intToString(x0)+intToString(x1));
-      }
-      x0 ^= sKey[INPUT_WHITEN    ];
-      x1 ^= sKey[INPUT_WHITEN + 1];
-      x2 ^= sKey[INPUT_WHITEN + 2];
-      x3 ^= sKey[INPUT_WHITEN + 3];
-if (TDEBUG && (debuglevel > 6)) 
System.out.println("PTw="+intToString(x2)+intToString(x3)+intToString(x0)+intToString(x1));
-
-
-     result[0] = (byte) x0;
-     result[1] = (byte)(x0 >>> 8);
-     result[2] = (byte)(x0 >>> 16);
-     result[3] = (byte)(x0 >>> 24);
-     result[4] = (byte) x1;
-     result[5] = (byte)(x1 >>> 8);
-     result[6] = (byte)(x1 >>> 16);
-     result[7] = (byte)(x1 >>> 24);
-     result[8] = (byte) x2;
-     result[9] = (byte)(x2 >>> 8);
-     result[10] = (byte)(x2 >>> 16);
-     result[11] = (byte)(x2 >>> 24);
-     result[12] = (byte) x3;
-     result[13] = (byte)(x3 >>> 8);
-     result[14] = (byte)(x3 >>> 16);
-     result[15] = (byte)(x3 >>> 24);
-
-if (TDEBUG && (debuglevel > 6)) {
-System.out.println("PT="+toString(result));
-System.out.println();
-}
-if (TDEBUG) trace(OUT, "blockDecrypt()");
-   }
-
-   /** A basic symmetric encryption/decryption test. */ 
-   public static boolean self_test() { return self_test(BLOCK_SIZE); }
-
-
-// own methods
-//...........................................................................
-
-   private static final int b0( int x ) { return  x         & 0xFF; }
-   private static final int b1( int x ) { return (x >>>  8) & 0xFF; }
-   private static final int b2( int x ) { return (x >>> 16) & 0xFF; }
-   private static final int b3( int x ) { return (x >>> 24) & 0xFF; }
-
-   /**
-    * Use (12, 8) Reed-Solomon code over GF(256) to produce a key S-box
-    * 32-bit entity from two key material 32-bit entities.
-    *
-    * @param  k0  1st 32-bit entity.
-    * @param  k1  2nd 32-bit entity.
-    * @return  Remainder polynomial generated using RS code
-    */
-   private static final int RS_MDS_Encode( int k0, int k1) {
-      int r = k1;
-      for (int i = 0; i < 4; i++) // shift 1 byte at a time
-         r = RS_rem( r );
-      r ^= k0;
-      for (int i = 0; i < 4; i++)
-         r = RS_rem( r );
-      return r;
-   }
-
-   /*
-    * Reed-Solomon code parameters: (12, 8) reversible code:<p>
-    * <pre>
-    *   g(x) = x**4 + (a + 1/a) x**3 + a x**2 + (a + 1/a) x + 1
-    * </pre>
-    * where a = primitive root of field generator 0x14D
-    */
-   private static final int RS_rem( int x ) {
-      int b  =  (x >>> 24) & 0xFF;
-      int g2 = ((b  <<  1) ^ ( (b & 0x80) != 0 ? RS_GF_FDBK : 0 )) & 0xFF;
-      int g3 =  (b >>>  1) ^ ( (b & 0x01) != 0 ? (RS_GF_FDBK >>> 1) : 0 ) ^ g2 
;
-      int result = (x << 8) ^ (g3 << 24) ^ (g2 << 16) ^ (g3 << 8) ^ b;
-      return result;
-   }
-
-   private static final int F32( int k64Cnt, int x, int[] k32 ) {
-      int b0 = b0(x);
-      int b1 = b1(x);
-      int b2 = b2(x);
-      int b3 = b3(x);
-      int k0 = k32[0];
-      int k1 = k32[1];
-      int k2 = k32[2];
-      int k3 = k32[3];
-
-      int result = 0;
-      switch (k64Cnt & 3) {
-      case 1:
-         result =
-            MDS[0][(P[P_01][b0] & 0xFF) ^ b0(k0)] ^
-            MDS[1][(P[P_11][b1] & 0xFF) ^ b1(k0)] ^
-            MDS[2][(P[P_21][b2] & 0xFF) ^ b2(k0)] ^
-            MDS[3][(P[P_31][b3] & 0xFF) ^ b3(k0)];
-         break;
-      case 0:  // same as 4
-         b0 = (P[P_04][b0] & 0xFF) ^ b0(k3);
-         b1 = (P[P_14][b1] & 0xFF) ^ b1(k3);
-         b2 = (P[P_24][b2] & 0xFF) ^ b2(k3);
-         b3 = (P[P_34][b3] & 0xFF) ^ b3(k3);
-      case 3:
-         b0 = (P[P_03][b0] & 0xFF) ^ b0(k2);
-         b1 = (P[P_13][b1] & 0xFF) ^ b1(k2);
-         b2 = (P[P_23][b2] & 0xFF) ^ b2(k2);
-         b3 = (P[P_33][b3] & 0xFF) ^ b3(k2);
-      case 2:                             // 128-bit keys (optimize for this 
case)
-         result =
-            MDS[0][(P[P_01][(P[P_02][b0] & 0xFF) ^ b0(k1)] & 0xFF) ^ b0(k0)] ^
-            MDS[1][(P[P_11][(P[P_12][b1] & 0xFF) ^ b1(k1)] & 0xFF) ^ b1(k0)] ^
-            MDS[2][(P[P_21][(P[P_22][b2] & 0xFF) ^ b2(k1)] & 0xFF) ^ b2(k0)] ^
-            MDS[3][(P[P_31][(P[P_32][b3] & 0xFF) ^ b3(k1)] & 0xFF) ^ b3(k0)];
-         break;
-      }
-      return result;
-   }
-
-   private static final int Fe32_0( int[] sBox, int x) {
-      return sBox[         (x  << 1)  & 0x1FE     ] ^
-             sBox[        ((x >>> 7)  & 0x1FE) + 1] ^
-             sBox[0x200 + ((x >>> 15) & 0x1FE)    ] ^
-             sBox[0x200 + ((x >>> 23) & 0x1FE) + 1];
-   }
-
-
-   private static final int Fe32_3( int[] sBox, int x) {
-      return sBox[         (x >>> 23) & 0x1FE     ] ^
-             sBox[        ((x  << 1) & 0x1FE) + 1] ^
-             sBox[0x200 + ((x >>> 7) & 0x1FE)    ] ^
-             sBox[0x200 + ((x >>> 15) & 0x1FE) + 1];
-   }
-
-   /** @return The length in bytes of the Algorithm input block. */
-   public static final int blockSize() { return BLOCK_SIZE; }
-
-   /** A basic symmetric encryption/decryption test for a given key size. */
-   private static boolean self_test (int keysize) {
-if (TDEBUG) trace(IN, "self_test("+keysize+ ')');
-      boolean ok = false;
-      try {
-         byte[] kb = new byte[keysize];
-         byte[] pt = new byte[BLOCK_SIZE];
-         int i;
-
-         for (i = 0; i < keysize; i++)
-            kb[i] = (byte) i;
-         for (i = 0; i < BLOCK_SIZE; i++)
-            pt[i] = (byte) i;
-
-if (TDEBUG && (debuglevel > 6)) {
-System.out.println("==========");
-System.out.println();
-System.out.println("KEYSIZE="+(8*keysize));
-System.out.println("KEY="+toString(kb));
-System.out.println();
-}
-         Object key = makeKey(kb);
-
-if (TDEBUG && (debuglevel > 6)) {
-System.out.println("Intermediate Ciphertext Values (Encryption)");
-System.out.println();
-}
-         byte[] ct = new byte[BLOCK_SIZE];
-         blockEncrypt(pt, ct, 0, key);
-
-if (TDEBUG && (debuglevel > 6)) {
-System.out.println("Intermediate Plaintext Values (Decryption)");
-System.out.println();
-}
-         byte[] cpt = new byte[BLOCK_SIZE];
-         blockDecrypt(ct, cpt, 0, key);
-
-         ok = areEqual(pt, cpt);
-         if (!ok)
-            throw new RuntimeException("Symmetric operation failed");
-      } catch (Exception x) {
-if (TDEBUG && (debuglevel > 0)) {
-   debug("Exception encountered during self-test: " + x.getMessage());
-   x.printStackTrace();
-}
-      }
-if (TDEBUG && (debuglevel > 0)) debug("Self-test OK? " + ok);
-if (TDEBUG) trace(OUT, "self_test()");
-      return ok;
-   }
-
-
-// utility static methods (from cryptix.util.core ArrayUtil and Hex classes)
-//...........................................................................
-   
-   /** @return True iff the arrays have identical contents. */
-   private static boolean areEqual (byte[] a, byte[] b) {
-      int aLength = a.length;
-      if (aLength != b.length)
-         return false;
-      for (int i = 0; i < aLength; i++)
-         if (a[i] != b[i])
-            return false;
-      return true;
-   }
-
-   /**
-    * Returns a string of 8 hexadecimal digits (most significant
-    * digit first) corresponding to the integer <i>n</i>, which is
-    * treated as unsigned.
-    */
-   private static String intToString (int n) {
-      char[] buf = new char[8];
-      for (int i = 7; i >= 0; i--) {
-         buf[i] = HEX_DIGITS[n & 0x0F];
-         n >>>= 4;
-      }
-      return new String(buf);
-   }
-
-   /**
-    * Returns a string of hexadecimal digits from a byte array. Each
-    * byte is converted to 2 hex symbols.
-    */
-   private static String toString (byte[] ba) {
-      return toString(ba, 0, ba.length);
-   }
-   private static String toString (byte[] ba, int offset, int length) {
-      char[] buf = new char[length * 2];
-      for (int i = offset, j = 0, k; i < offset+length; ) {
-         k = ba[i++];
-         buf[j++] = HEX_DIGITS[(k >>> 4) & 0x0F];
-         buf[j++] = HEX_DIGITS[ k      & 0x0F];
-      }
-      return new String(buf);
-   }
-
-
-// main(): use to generate the Intermediate Values KAT
-//...........................................................................
-
-   public static void main (String[] args) {
-      self_test(16);
-      self_test(24);
-      self_test(32);
-   }
-}

Deleted: trunk/freenet/src/freenet/crypt/ciphers/Twofish_Properties.java
===================================================================
--- trunk/freenet/src/freenet/crypt/ciphers/Twofish_Properties.java     
2007-02-03 16:31:58 UTC (rev 11662)
+++ trunk/freenet/src/freenet/crypt/ciphers/Twofish_Properties.java     
2007-02-03 17:00:40 UTC (rev 11663)
@@ -1,189 +0,0 @@
-/*
- * Copyright (c) 1997, 1998 Systemics Ltd on behalf of
- * the Cryptix Development Team. All rights reserved.
- */
-package freenet.crypt.ciphers;
-
-import java.io.InputStream;
-import java.io.PrintStream;
-import java.io.PrintWriter;
-import java.util.Enumeration;
-import java.util.Properties;
-
-/**
- * This class acts as a central repository for an algorithm specific
- * properties. It reads an (algorithm).properties file containing algorithm-
- * specific properties. When using the AES-Kit, this (algorithm).properties
- * file is located in the (algorithm).jar file produced by the "jarit" batch/
- * script command.<p>
- *
- * <b>Copyright</b> &copy; 1997, 1998
- * <a href="http://www.systemics.com/";>Systemics Ltd</a> on behalf of the
- * <a href="http://www.systemics.com/docs/cryptix/";>Cryptix Development 
Team</a>.
- * <br>All rights reserved.<p>
- *
- * @author  David Hopwood
- * @author  Jill Baker
- * @author  Raif S. Naffah
- */
-public class Twofish_Properties // implicit no-argument constructor
-{
-// Constants and variables with relevant static code
-//...........................................................................
-
-    static final boolean GLOBAL_DEBUG = false;
-
-    static final String ALGORITHM = "Twofish";
-    static final double VERSION = 0.2;
-    static final String FULL_NAME = ALGORITHM + " ver. " + VERSION;
-    static final String NAME = "Twofish_Properties";
-
-    static final Properties properties = new Properties();
-
-    /** Default properties in case .properties file was not found. */
-    private static final String[][] DEFAULT_PROPERTIES = {
-        {"Trace.Twofish_Algorithm",       "true"},
-        {"Debug.Level.*",             "1"},
-        {"Debug.Level.Twofish_Algorithm", "9"},
-    };
-
-    static {
-if (GLOBAL_DEBUG) System.err.println(">>> " + NAME + ": Looking for " + 
ALGORITHM + " properties");
-        String it = ALGORITHM + ".properties";
-        InputStream is = Twofish_Properties.class.getResourceAsStream(it);
-        boolean ok = is != null;
-        if (ok)
-            try {
-                properties.load(is);
-                is.close();
-if (GLOBAL_DEBUG) System.err.println(">>> " + NAME + ": Properties file loaded 
OK...");
-            } catch (Exception x) {
-                ok = false;
-            }
-        if (!ok) {
-if (GLOBAL_DEBUG) System.err.println(">>> " + NAME + ": WARNING: Unable to 
load \"" + it + "\" from CLASSPATH.");
-if (GLOBAL_DEBUG) System.err.println(">>> " + NAME + ":          Will use 
default values instead...");
-            int n = DEFAULT_PROPERTIES.length;
-            for (int i = 0; i < n; i++)
-                properties.put(
-                    DEFAULT_PROPERTIES[i][0], DEFAULT_PROPERTIES[i][1]);
-if (GLOBAL_DEBUG) System.err.println(">>> " + NAME + ": Default properties now 
set...");
-        }
-    }
-
-
-// Properties methods (excluding load and save, which are deliberately not
-// supported).
-//...........................................................................
-
-    /** Get the value of a property for this algorithm. */
-    public static String getProperty (String key) {
-        return properties.getProperty(key);
-    }
-
-    /**
-     * Get the value of a property for this algorithm, or return
-     * <i>value</i> if the property was not set.
-     */
-    public static String getProperty (String key, String value) {
-        return properties.getProperty(key, value);
-    }
-
-    /** List algorithm properties to the PrintStream <i>out</i>. */
-    public static void list (PrintStream out) {
-        list(new PrintWriter(out, true));
-    }
-
-    /** List algorithm properties to the PrintWriter <i>out</i>. */
-    public static void list (PrintWriter out) {
-        out.println("#");
-        out.println("# ----- Begin "+ALGORITHM+" properties -----");
-        out.println("#");
-        String key, value;
-        Enumeration enu = properties.propertyNames();
-        while (enu.hasMoreElements()) {
-            key = (String) enu.nextElement();
-            value = getProperty(key);
-            out.println(key + " = " + value);
-        }
-        out.println("#");
-        out.println("# ----- End "+ALGORITHM+" properties -----");
-    }
-
-//    public synchronized void load(InputStream in) throws IOException {}
-
-    public static Enumeration propertyNames() {
-        return properties.propertyNames();
-    }
-
-//    public void save (OutputStream os, String comment) {}
-
-
-// Developer support: Tracing and debugging enquiry methods (package-private)
-//...........................................................................
-    
-    /**
-     * Return true if tracing is requested for a given class.<p>
-     *
-     * User indicates this by setting the tracing <code>boolean</code>
-     * property for <i>label</i> in the <code>(algorithm).properties</code>
-     * file. The property's key is "<code>Trace.<i>label</i></code>".<p>
-     *
-     * @param label  The name of a class.
-     * @return True iff a boolean true value is set for a property with
-     *      the key <code>Trace.<i>label</i></code>.
-     */
-    static boolean isTraceable (String label) {
-        String s = getProperty("Trace." + label);
-        if (s == null)
-            return false;
-        return Boolean.valueOf(s).booleanValue();
-    }
-
-    /**
-     * Return the debug level for a given class.<p>
-     *
-     * User indicates this by setting the numeric property with key
-     * "<code>Debug.Level.<i>label</i></code>".<p>
-     *
-     * If this property is not set, "<code>Debug.Level.*</code>" is looked up
-     * next. If neither property is set, or if the first property found is
-     * not a valid decimal integer, then this method returns 0.
-     *
-     * @param label  The name of a class.
-     * @return  The required debugging level for the designated class.
-     */
-    static int getLevel (String label) {
-        String s = getProperty("Debug.Level." + label);
-        if (s == null) {
-            s = getProperty("Debug.Level.*");
-            if (s == null)
-                return 0;
-        }
-        try {
-            return Integer.parseInt(s);
-        } catch (NumberFormatException e) {
-            return 0;
-        }
-    }
-
-    /**
-     * Return the PrintWriter to which tracing and debugging output is to
-     * be sent.<p>
-     *
-     * User indicates this by setting the property with key <code>Output</code>
-     * to the literal <code>out</code> or <code>err</code>.<p>
-     *
-     * By default or if the set value is not allowed, <code>System.err</code>
-     * will be used.
-     */
-    static PrintWriter getOutput() {
-        PrintWriter pw;
-        String name = getProperty("Output");
-        if ((name != null) && name.equals("out"))
-            pw = new PrintWriter(System.out, true);
-        else
-            pw = new PrintWriter(System.err, true);
-        return pw;
-    }
-}

Modified: trunk/freenet/src/freenet/keys/ClientCHKBlock.java
===================================================================
--- trunk/freenet/src/freenet/keys/ClientCHKBlock.java  2007-02-03 16:31:58 UTC 
(rev 11662)
+++ trunk/freenet/src/freenet/keys/ClientCHKBlock.java  2007-02-03 17:00:40 UTC 
(rev 11663)
@@ -89,7 +89,7 @@
         if(cryptoKey.length < Node.SYMMETRIC_KEY_LENGTH)
             throw new CHKDecodeException("Crypto key too short");
         cipher.initialize(key.cryptoKey);
-        PCFBMode pcfb = new PCFBMode(cipher);
+        PCFBMode pcfb = PCFBMode.create(cipher);
         byte[] hbuf = new byte[headers.length-2];
         System.arraycopy(headers, 2, hbuf, 0, headers.length-2);
         byte[] dbuf = new byte[data.length];
@@ -182,7 +182,7 @@
             throw new Error(e);
         }
         cipher.initialize(encKey);
-        PCFBMode pcfb = new PCFBMode(cipher);
+        PCFBMode pcfb = PCFBMode.create(cipher);
         pcfb.blockEncipher(header, 2, header.length-2);
         pcfb.blockEncipher(data, 0, data.length);


Modified: trunk/freenet/src/freenet/keys/ClientSSKBlock.java
===================================================================
--- trunk/freenet/src/freenet/keys/ClientSSKBlock.java  2007-02-03 16:31:58 UTC 
(rev 11662)
+++ trunk/freenet/src/freenet/keys/ClientSSKBlock.java  2007-02-03 17:00:40 UTC 
(rev 11663)
@@ -54,7 +54,7 @@
                        throw new Error(e);
                }
                aes.initialize(key.cryptoKey);
-               PCFBMode pcfb = new PCFBMode(aes);
+               PCFBMode pcfb = PCFBMode.create(aes);
                // ECB-encrypted E(H(docname)) serves as IV.
                pcfb.reset(key.ehDocname);
                pcfb.blockDecipher(decryptedHeaders, 0, 
decryptedHeaders.length);

Modified: trunk/freenet/src/freenet/keys/InsertableClientSSK.java
===================================================================
--- trunk/freenet/src/freenet/keys/InsertableClientSSK.java     2007-02-03 
16:31:58 UTC (rev 11662)
+++ trunk/freenet/src/freenet/keys/InsertableClientSSK.java     2007-02-03 
17:00:40 UTC (rev 11663)
@@ -117,7 +117,7 @@
                // Encrypt data. Data encryption key = H(plaintext data).

                aes.initialize(origDataHash);
-               PCFBMode pcfb = new PCFBMode(aes);
+               PCFBMode pcfb = PCFBMode.create(aes);
                pcfb.reset(origDataHash);

                pcfb.blockEncipher(data, 0, data.length);

Modified: trunk/freenet/src/freenet/node/FNPPacketMangler.java
===================================================================
--- trunk/freenet/src/freenet/node/FNPPacketMangler.java        2007-02-03 
16:31:58 UTC (rev 11662)
+++ trunk/freenet/src/freenet/node/FNPPacketMangler.java        2007-02-03 
17:00:40 UTC (rev 11663)
@@ -167,7 +167,7 @@
         BlockCipher authKey = opn.incomingSetupCipher;
         if(logMINOR) Logger.minor(this, "Decrypt key: 
"+HexUtil.bytesToHex(opn.incomingSetupKey)+" for "+peer+" : "+opn);
         // Does the packet match IV E( H(data) data ) ?
-        PCFBMode pcfb = new PCFBMode(authKey);
+        PCFBMode pcfb = PCFBMode.create(authKey);
         int ivLength = pcfb.lengthIV();
         MessageDigest md = SHA256.getMessageDigest();
         int digestLength = md.getDigestLength();
@@ -385,7 +385,7 @@
          * Where Data = our bootID
          * Very similar to the surrounding wrapper in fact.
          */
-        PCFBMode pcfb = new PCFBMode(cipher);
+        PCFBMode pcfb = PCFBMode.create(cipher);
         byte[] iv = new byte[pcfb.lengthIV()];

         byte[] myRef = node.myCompressedSetupRef();
@@ -471,7 +471,7 @@
         }
         BlockCipher cipher = pn.outgoingSetupCipher;
         if(logMINOR) Logger.minor(this, "Outgoing cipher: 
"+HexUtil.bytesToHex(pn.outgoingSetupKey));
-        PCFBMode pcfb = new PCFBMode(cipher);
+        PCFBMode pcfb = PCFBMode.create(cipher);
         int paddingLength = node.random.nextInt(100);
         byte[] iv = new byte[pcfb.lengthIV()];
         node.random.nextBytes(iv);
@@ -527,7 +527,7 @@
         }
         byte[] encKey = ctx.getKey();
         BlockCipher cipher = ctx.getCipher();
-        PCFBMode pcfb = new PCFBMode(cipher);
+        PCFBMode pcfb = PCFBMode.create(cipher);
         int ivLength = pcfb.lengthIV();
         if(payload.length-3 < HASH_LENGTH + ivLength + 8) {
             Logger.error(this, "Too short phase "+i+" packet from "+replyTo+" 
probably from "+pn);
@@ -659,7 +659,7 @@
         // Verify the hash later

         PCFBMode pcfb;
-        pcfb = new PCFBMode(sessionCipher);
+        pcfb = PCFBMode.create(sessionCipher);
         // Set IV to the hash, after it is encrypted
         pcfb.reset(packetHash);
         //Logger.minor(this,"IV:\n"+HexUtil.bytesToHex(packetHash));
@@ -1440,7 +1440,7 @@

         if(logMINOR) Logger.minor(this, "\nEncrypted: 
"+HexUtil.bytesToHex(digestTemp)+" ("+plaintext.length+" bytes plaintext)");

-        PCFBMode pcfb = new PCFBMode(sessionCipher, digestTemp);
+        PCFBMode pcfb = PCFBMode.create(sessionCipher, digestTemp);
         pcfb.blockEncipher(output, digestLength, plaintext.length);

         //Logger.minor(this, "Ciphertext:\n"+HexUtil.bytesToHex(output, 
digestLength, plaintext.length));

Modified: 
trunk/freenet/src/freenet/support/io/PaddedEphemerallyEncryptedBucket.java
===================================================================
--- trunk/freenet/src/freenet/support/io/PaddedEphemerallyEncryptedBucket.java  
2007-02-03 16:31:58 UTC (rev 11662)
+++ trunk/freenet/src/freenet/support/io/PaddedEphemerallyEncryptedBucket.java  
2007-02-03 17:00:40 UTC (rev 11663)
@@ -159,7 +159,7 @@
                        this.out = out;
                        dataLength = 0;
                        this.streamNumber = streamNumber;
-                       pcfb = new PCFBMode(aes);
+                       pcfb = PCFBMode.create(aes);
                }

                public void write(int b) throws IOException {
@@ -235,7 +235,7 @@

                public PaddedEphemerallyEncryptedInputStream(InputStream in) {
                        this.in = in;
-                       pcfb = new PCFBMode(aes);
+                       pcfb = PCFBMode.create(aes);
                        ptr = 0;
                }



Reply via email to