Twofish.php 68 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665
  1. <?php
  2. /* vim: set expandtab tabstop=4 shiftwidth=4 softtabstop=4: */
  3. /**
  4. * Pure-PHP implementation of Twofish.
  5. *
  6. * Uses mcrypt, if available, and an internal implementation, otherwise.
  7. *
  8. * PHP versions 4 and 5
  9. *
  10. * Useful resources are as follows:
  11. *
  12. * - {@link http://en.wikipedia.org/wiki/Twofish Wikipedia description of Twofish}
  13. *
  14. * Here's a short example of how to use this library:
  15. * <code>
  16. * <?php
  17. * include('Crypt/Twofish.php');
  18. *
  19. * $Twofish = new Crypt_Twofish();
  20. *
  21. * $Twofish->setKey('12345678901234567890123456789012');
  22. *
  23. * $plaintext = str_repeat('a', 1024);
  24. *
  25. * echo $Twofish->decrypt($Twofish->encrypt($plaintext));
  26. * ?>
  27. * </code>
  28. *
  29. * LICENSE: Permission is hereby granted, free of charge, to any person obtaining a copy
  30. * of this software and associated documentation files (the "Software"), to deal
  31. * in the Software without restriction, including without limitation the rights
  32. * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
  33. * copies of the Software, and to permit persons to whom the Software is
  34. * furnished to do so, subject to the following conditions:
  35. *
  36. * The above copyright notice and this permission notice shall be included in
  37. * all copies or substantial portions of the Software.
  38. *
  39. * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
  40. * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
  41. * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
  42. * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
  43. * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
  44. * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
  45. * THE SOFTWARE.
  46. *
  47. * @category Crypt
  48. * @package Crypt_Twofish
  49. * @author Jim Wigginton <terrafrost@php.net>
  50. * @author Hans-Juergen Petrich <petrich@tronic-media.com>
  51. * @copyright MMVII Jim Wigginton
  52. * @license http://www.opensource.org/licenses/mit-license.html MIT License
  53. * @version 1.0
  54. * @link http://phpseclib.sourceforge.net
  55. */
  56. /**#@+
  57. * @access public
  58. * @see Crypt_Twofish::encrypt()
  59. * @see Crypt_Twofish::decrypt()
  60. */
  61. /**
  62. * Encrypt / decrypt using the Counter mode.
  63. *
  64. * Set to -1 since that's what Crypt/Random.php uses to index the CTR mode.
  65. *
  66. * @link http://en.wikipedia.org/wiki/Block_cipher_modes_of_operation#Counter_.28CTR.29
  67. */
  68. define('CRYPT_TWOFISH_MODE_CTR', -1);
  69. /**
  70. * Encrypt / decrypt using the Electronic Code Book mode.
  71. *
  72. * @link http://en.wikipedia.org/wiki/Block_cipher_modes_of_operation#Electronic_codebook_.28ECB.29
  73. */
  74. define('CRYPT_TWOFISH_MODE_ECB', 1);
  75. /**
  76. * Encrypt / decrypt using the Code Book Chaining mode.
  77. *
  78. * @link http://en.wikipedia.org/wiki/Block_cipher_modes_of_operation#Cipher-block_chaining_.28CBC.29
  79. */
  80. define('CRYPT_TWOFISH_MODE_CBC', 2);
  81. /**
  82. * Encrypt / decrypt using the Cipher Feedback mode.
  83. *
  84. * @link http://en.wikipedia.org/wiki/Block_cipher_modes_of_operation#Cipher_feedback_.28CFB.29
  85. */
  86. define('CRYPT_TWOFISH_MODE_CFB', 3);
  87. /**
  88. * Encrypt / decrypt using the Cipher Feedback mode.
  89. *
  90. * @link http://en.wikipedia.org/wiki/Block_cipher_modes_of_operation#Output_feedback_.28OFB.29
  91. */
  92. define('CRYPT_TWOFISH_MODE_OFB', 4);
  93. /**#@-*/
  94. /**#@+
  95. * @access private
  96. * @see Crypt_Twofish::Crypt_Twofish()
  97. */
  98. /**
  99. * Toggles the internal implementation
  100. */
  101. define('CRYPT_TWOFISH_MODE_INTERNAL', 1);
  102. /**
  103. * Toggles the mcrypt implementation
  104. */
  105. define('CRYPT_TWOFISH_MODE_MCRYPT', 2);
  106. /**#@-*/
  107. /**
  108. * Pure-PHP implementation of Twofish.
  109. *
  110. * @author Jim Wigginton <terrafrost@php.net>
  111. * @author Hans-Juergen Petrich <petrich@tronic-media.com>
  112. * @version 1.0
  113. * @access public
  114. * @package Crypt_Twofish
  115. */
  116. class Crypt_Twofish {
  117. /**
  118. * The Key as String
  119. *
  120. * @see Crypt_Twofish::setKey()
  121. * @var Array
  122. * @access private
  123. */
  124. var $key = "\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0";
  125. /**
  126. * The Encryption Mode
  127. *
  128. * @see Crypt_Twofish::Crypt_Twofish()
  129. * @var Integer
  130. * @access private
  131. */
  132. var $mode;
  133. /**
  134. * Continuous Buffer status
  135. *
  136. * @see Crypt_Twofish::enableContinuousBuffer()
  137. * @var Boolean
  138. * @access private
  139. */
  140. var $continuousBuffer = false;
  141. /**
  142. * Padding status
  143. *
  144. * @see Crypt_Twofish::enablePadding()
  145. * @var Boolean
  146. * @access private
  147. */
  148. var $padding = true;
  149. /**
  150. * The Initialization Vector
  151. *
  152. * @see Crypt_Twofish::setIV()
  153. * @var String
  154. * @access private
  155. */
  156. var $iv = "\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0";
  157. /**
  158. * A "sliding" Initialization Vector
  159. *
  160. * @see Crypt_Twofish::enableContinuousBuffer()
  161. * @var String
  162. * @access private
  163. */
  164. var $encryptIV = "\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0";
  165. /**
  166. * A "sliding" Initialization Vector
  167. *
  168. * @see Crypt_Twofish::enableContinuousBuffer()
  169. * @var String
  170. * @access private
  171. */
  172. var $decryptIV = "\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0";
  173. /**
  174. * mcrypt resource for encryption
  175. *
  176. * The mcrypt resource can be recreated every time something needs to be created or it can be created just once.
  177. * Since mcrypt operates in continuous mode, by default, it'll need to be recreated when in non-continuous mode.
  178. *
  179. * @see Crypt_Twofish::encrypt()
  180. * @var String
  181. * @access private
  182. */
  183. var $enmcrypt;
  184. /**
  185. * mcrypt resource for decryption
  186. *
  187. * The mcrypt resource can be recreated every time something needs to be created or it can be created just once.
  188. * Since mcrypt operates in continuous mode, by default, it'll need to be recreated when in non-continuous mode.
  189. *
  190. * @see Crypt_Twofish::decrypt()
  191. * @var String
  192. * @access private
  193. */
  194. var $demcrypt;
  195. /**
  196. * Does the enmcrypt resource need to be (re)initialized?
  197. *
  198. * @see Crypt_Twofish::setKey()
  199. * @see Crypt_Twofish::setIV()
  200. * @var Boolean
  201. * @access private
  202. */
  203. var $enchanged = true;
  204. /**
  205. * Does the demcrypt resource need to be (re)initialized?
  206. *
  207. * @see Crypt_Twofish::setKey()
  208. * @see Crypt_Twofish::setIV()
  209. * @var Boolean
  210. * @access private
  211. */
  212. var $dechanged = true;
  213. /**
  214. * Is the mode one that is paddable?
  215. *
  216. * @see Crypt_Twofish::Crypt_Twofish()
  217. * @var Boolean
  218. * @access private
  219. */
  220. var $paddable = false;
  221. /**
  222. * Encryption buffer for CTR, OFB and CFB modes
  223. *
  224. * @see Crypt_Twofish::encrypt()
  225. * @var Array
  226. * @access private
  227. */
  228. var $enbuffer = array('encrypted' => '', 'xor' => '', 'pos' => 0, 'enmcrypt_init' => true);
  229. /**
  230. * Decryption buffer for CTR, OFB and CFB modes
  231. *
  232. * @see Crypt_Twofish::decrypt()
  233. * @var Array
  234. * @access private
  235. */
  236. var $debuffer = array('ciphertext' => '', 'xor' => '', 'pos' => 0, 'demcrypt_init' => true);
  237. /**
  238. * mcrypt resource for CFB mode
  239. *
  240. * @see Crypt_Twofish::encrypt()
  241. * @see Crypt_Twofish::decrypt()
  242. * @var String
  243. * @access private
  244. */
  245. var $ecb;
  246. /**
  247. * Performance-optimized callback function for en/decrypt()
  248. *
  249. * @var Callback
  250. * @access private
  251. */
  252. var $inline_crypt;
  253. /**
  254. * Q-Table
  255. *
  256. * @var Array
  257. * @access private
  258. */
  259. var $q0 = array (
  260. 0xA9, 0x67, 0xB3, 0xE8, 0x04, 0xFD, 0xA3, 0x76,
  261. 0x9A, 0x92, 0x80, 0x78, 0xE4, 0xDD, 0xD1, 0x38,
  262. 0x0D, 0xC6, 0x35, 0x98, 0x18, 0xF7, 0xEC, 0x6C,
  263. 0x43, 0x75, 0x37, 0x26, 0xFA, 0x13, 0x94, 0x48,
  264. 0xF2, 0xD0, 0x8B, 0x30, 0x84, 0x54, 0xDF, 0x23,
  265. 0x19, 0x5B, 0x3D, 0x59, 0xF3, 0xAE, 0xA2, 0x82,
  266. 0x63, 0x01, 0x83, 0x2E, 0xD9, 0x51, 0x9B, 0x7C,
  267. 0xA6, 0xEB, 0xA5, 0xBE, 0x16, 0x0C, 0xE3, 0x61,
  268. 0xC0, 0x8C, 0x3A, 0xF5, 0x73, 0x2C, 0x25, 0x0B,
  269. 0xBB, 0x4E, 0x89, 0x6B, 0x53, 0x6A, 0xB4, 0xF1,
  270. 0xE1, 0xE6, 0xBD, 0x45, 0xE2, 0xF4, 0xB6, 0x66,
  271. 0xCC, 0x95, 0x03, 0x56, 0xD4, 0x1C, 0x1E, 0xD7,
  272. 0xFB, 0xC3, 0x8E, 0xB5, 0xE9, 0xCF, 0xBF, 0xBA,
  273. 0xEA, 0x77, 0x39, 0xAF, 0x33, 0xC9, 0x62, 0x71,
  274. 0x81, 0x79, 0x09, 0xAD, 0x24, 0xCD, 0xF9, 0xD8,
  275. 0xE5, 0xC5, 0xB9, 0x4D, 0x44, 0x08, 0x86, 0xE7,
  276. 0xA1, 0x1D, 0xAA, 0xED, 0x06, 0x70, 0xB2, 0xD2,
  277. 0x41, 0x7B, 0xA0, 0x11, 0x31, 0xC2, 0x27, 0x90,
  278. 0x20, 0xF6, 0x60, 0xFF, 0x96, 0x5C, 0xB1, 0xAB,
  279. 0x9E, 0x9C, 0x52, 0x1B, 0x5F, 0x93, 0x0A, 0xEF,
  280. 0x91, 0x85, 0x49, 0xEE, 0x2D, 0x4F, 0x8F, 0x3B,
  281. 0x47, 0x87, 0x6D, 0x46, 0xD6, 0x3E, 0x69, 0x64,
  282. 0x2A, 0xCE, 0xCB, 0x2F, 0xFC, 0x97, 0x05, 0x7A,
  283. 0xAC, 0x7F, 0xD5, 0x1A, 0x4B, 0x0E, 0xA7, 0x5A,
  284. 0x28, 0x14, 0x3F, 0x29, 0x88, 0x3C, 0x4C, 0x02,
  285. 0xB8, 0xDA, 0xB0, 0x17, 0x55, 0x1F, 0x8A, 0x7D,
  286. 0x57, 0xC7, 0x8D, 0x74, 0xB7, 0xC4, 0x9F, 0x72,
  287. 0x7E, 0x15, 0x22, 0x12, 0x58, 0x07, 0x99, 0x34,
  288. 0x6E, 0x50, 0xDE, 0x68, 0x65, 0xBC, 0xDB, 0xF8,
  289. 0xC8, 0xA8, 0x2B, 0x40, 0xDC, 0xFE, 0x32, 0xA4,
  290. 0xCA, 0x10, 0x21, 0xF0, 0xD3, 0x5D, 0x0F, 0x00,
  291. 0x6F, 0x9D, 0x36, 0x42, 0x4A, 0x5E, 0xC1, 0xE0
  292. );
  293. /**
  294. * Q-Table
  295. *
  296. * @var Array
  297. * @access private
  298. */
  299. var $q1 = array (
  300. 0x75, 0xF3, 0xC6, 0xF4, 0xDB, 0x7B, 0xFB, 0xC8,
  301. 0x4A, 0xD3, 0xE6, 0x6B, 0x45, 0x7D, 0xE8, 0x4B,
  302. 0xD6, 0x32, 0xD8, 0xFD, 0x37, 0x71, 0xF1, 0xE1,
  303. 0x30, 0x0F, 0xF8, 0x1B, 0x87, 0xFA, 0x06, 0x3F,
  304. 0x5E, 0xBA, 0xAE, 0x5B, 0x8A, 0x00, 0xBC, 0x9D,
  305. 0x6D, 0xC1, 0xB1, 0x0E, 0x80, 0x5D, 0xD2, 0xD5,
  306. 0xA0, 0x84, 0x07, 0x14, 0xB5, 0x90, 0x2C, 0xA3,
  307. 0xB2, 0x73, 0x4C, 0x54, 0x92, 0x74, 0x36, 0x51,
  308. 0x38, 0xB0, 0xBD, 0x5A, 0xFC, 0x60, 0x62, 0x96,
  309. 0x6C, 0x42, 0xF7, 0x10, 0x7C, 0x28, 0x27, 0x8C,
  310. 0x13, 0x95, 0x9C, 0xC7, 0x24, 0x46, 0x3B, 0x70,
  311. 0xCA, 0xE3, 0x85, 0xCB, 0x11, 0xD0, 0x93, 0xB8,
  312. 0xA6, 0x83, 0x20, 0xFF, 0x9F, 0x77, 0xC3, 0xCC,
  313. 0x03, 0x6F, 0x08, 0xBF, 0x40, 0xE7, 0x2B, 0xE2,
  314. 0x79, 0x0C, 0xAA, 0x82, 0x41, 0x3A, 0xEA, 0xB9,
  315. 0xE4, 0x9A, 0xA4, 0x97, 0x7E, 0xDA, 0x7A, 0x17,
  316. 0x66, 0x94, 0xA1, 0x1D, 0x3D, 0xF0, 0xDE, 0xB3,
  317. 0x0B, 0x72, 0xA7, 0x1C, 0xEF, 0xD1, 0x53, 0x3E,
  318. 0x8F, 0x33, 0x26, 0x5F, 0xEC, 0x76, 0x2A, 0x49,
  319. 0x81, 0x88, 0xEE, 0x21, 0xC4, 0x1A, 0xEB, 0xD9,
  320. 0xC5, 0x39, 0x99, 0xCD, 0xAD, 0x31, 0x8B, 0x01,
  321. 0x18, 0x23, 0xDD, 0x1F, 0x4E, 0x2D, 0xF9, 0x48,
  322. 0x4F, 0xF2, 0x65, 0x8E, 0x78, 0x5C, 0x58, 0x19,
  323. 0x8D, 0xE5, 0x98, 0x57, 0x67, 0x7F, 0x05, 0x64,
  324. 0xAF, 0x63, 0xB6, 0xFE, 0xF5, 0xB7, 0x3C, 0xA5,
  325. 0xCE, 0xE9, 0x68, 0x44, 0xE0, 0x4D, 0x43, 0x69,
  326. 0x29, 0x2E, 0xAC, 0x15, 0x59, 0xA8, 0x0A, 0x9E,
  327. 0x6E, 0x47, 0xDF, 0x34, 0x35, 0x6A, 0xCF, 0xDC,
  328. 0x22, 0xC9, 0xC0, 0x9B, 0x89, 0xD4, 0xED, 0xAB,
  329. 0x12, 0xA2, 0x0D, 0x52, 0xBB, 0x02, 0x2F, 0xA9,
  330. 0xD7, 0x61, 0x1E, 0xB4, 0x50, 0x04, 0xF6, 0xC2,
  331. 0x16, 0x25, 0x86, 0x56, 0x55, 0x09, 0xBE, 0x91
  332. );
  333. /**
  334. * M-Table
  335. *
  336. * @var Array
  337. * @access private
  338. */
  339. var $m0 = array (
  340. 0xBCBC3275, 0xECEC21F3, 0x202043C6, 0xB3B3C9F4, 0xDADA03DB, 0x02028B7B, 0xE2E22BFB, 0x9E9EFAC8,
  341. 0xC9C9EC4A, 0xD4D409D3, 0x18186BE6, 0x1E1E9F6B, 0x98980E45, 0xB2B2387D, 0xA6A6D2E8, 0x2626B74B,
  342. 0x3C3C57D6, 0x93938A32, 0x8282EED8, 0x525298FD, 0x7B7BD437, 0xBBBB3771, 0x5B5B97F1, 0x474783E1,
  343. 0x24243C30, 0x5151E20F, 0xBABAC6F8, 0x4A4AF31B, 0xBFBF4887, 0x0D0D70FA, 0xB0B0B306, 0x7575DE3F,
  344. 0xD2D2FD5E, 0x7D7D20BA, 0x666631AE, 0x3A3AA35B, 0x59591C8A, 0x00000000, 0xCDCD93BC, 0x1A1AE09D,
  345. 0xAEAE2C6D, 0x7F7FABC1, 0x2B2BC7B1, 0xBEBEB90E, 0xE0E0A080, 0x8A8A105D, 0x3B3B52D2, 0x6464BAD5,
  346. 0xD8D888A0, 0xE7E7A584, 0x5F5FE807, 0x1B1B1114, 0x2C2CC2B5, 0xFCFCB490, 0x3131272C, 0x808065A3,
  347. 0x73732AB2, 0x0C0C8173, 0x79795F4C, 0x6B6B4154, 0x4B4B0292, 0x53536974, 0x94948F36, 0x83831F51,
  348. 0x2A2A3638, 0xC4C49CB0, 0x2222C8BD, 0xD5D5F85A, 0xBDBDC3FC, 0x48487860, 0xFFFFCE62, 0x4C4C0796,
  349. 0x4141776C, 0xC7C7E642, 0xEBEB24F7, 0x1C1C1410, 0x5D5D637C, 0x36362228, 0x6767C027, 0xE9E9AF8C,
  350. 0x4444F913, 0x1414EA95, 0xF5F5BB9C, 0xCFCF18C7, 0x3F3F2D24, 0xC0C0E346, 0x7272DB3B, 0x54546C70,
  351. 0x29294CCA, 0xF0F035E3, 0x0808FE85, 0xC6C617CB, 0xF3F34F11, 0x8C8CE4D0, 0xA4A45993, 0xCACA96B8,
  352. 0x68683BA6, 0xB8B84D83, 0x38382820, 0xE5E52EFF, 0xADAD569F, 0x0B0B8477, 0xC8C81DC3, 0x9999FFCC,
  353. 0x5858ED03, 0x19199A6F, 0x0E0E0A08, 0x95957EBF, 0x70705040, 0xF7F730E7, 0x6E6ECF2B, 0x1F1F6EE2,
  354. 0xB5B53D79, 0x09090F0C, 0x616134AA, 0x57571682, 0x9F9F0B41, 0x9D9D803A, 0x111164EA, 0x2525CDB9,
  355. 0xAFAFDDE4, 0x4545089A, 0xDFDF8DA4, 0xA3A35C97, 0xEAEAD57E, 0x353558DA, 0xEDEDD07A, 0x4343FC17,
  356. 0xF8F8CB66, 0xFBFBB194, 0x3737D3A1, 0xFAFA401D, 0xC2C2683D, 0xB4B4CCF0, 0x32325DDE, 0x9C9C71B3,
  357. 0x5656E70B, 0xE3E3DA72, 0x878760A7, 0x15151B1C, 0xF9F93AEF, 0x6363BFD1, 0x3434A953, 0x9A9A853E,
  358. 0xB1B1428F, 0x7C7CD133, 0x88889B26, 0x3D3DA65F, 0xA1A1D7EC, 0xE4E4DF76, 0x8181942A, 0x91910149,
  359. 0x0F0FFB81, 0xEEEEAA88, 0x161661EE, 0xD7D77321, 0x9797F5C4, 0xA5A5A81A, 0xFEFE3FEB, 0x6D6DB5D9,
  360. 0x7878AEC5, 0xC5C56D39, 0x1D1DE599, 0x7676A4CD, 0x3E3EDCAD, 0xCBCB6731, 0xB6B6478B, 0xEFEF5B01,
  361. 0x12121E18, 0x6060C523, 0x6A6AB0DD, 0x4D4DF61F, 0xCECEE94E, 0xDEDE7C2D, 0x55559DF9, 0x7E7E5A48,
  362. 0x2121B24F, 0x03037AF2, 0xA0A02665, 0x5E5E198E, 0x5A5A6678, 0x65654B5C, 0x62624E58, 0xFDFD4519,
  363. 0x0606F48D, 0x404086E5, 0xF2F2BE98, 0x3333AC57, 0x17179067, 0x05058E7F, 0xE8E85E05, 0x4F4F7D64,
  364. 0x89896AAF, 0x10109563, 0x74742FB6, 0x0A0A75FE, 0x5C5C92F5, 0x9B9B74B7, 0x2D2D333C, 0x3030D6A5,
  365. 0x2E2E49CE, 0x494989E9, 0x46467268, 0x77775544, 0xA8A8D8E0, 0x9696044D, 0x2828BD43, 0xA9A92969,
  366. 0xD9D97929, 0x8686912E, 0xD1D187AC, 0xF4F44A15, 0x8D8D1559, 0xD6D682A8, 0xB9B9BC0A, 0x42420D9E,
  367. 0xF6F6C16E, 0x2F2FB847, 0xDDDD06DF, 0x23233934, 0xCCCC6235, 0xF1F1C46A, 0xC1C112CF, 0x8585EBDC,
  368. 0x8F8F9E22, 0x7171A1C9, 0x9090F0C0, 0xAAAA539B, 0x0101F189, 0x8B8BE1D4, 0x4E4E8CED, 0x8E8E6FAB,
  369. 0xABABA212, 0x6F6F3EA2, 0xE6E6540D, 0xDBDBF252, 0x92927BBB, 0xB7B7B602, 0x6969CA2F, 0x3939D9A9,
  370. 0xD3D30CD7, 0xA7A72361, 0xA2A2AD1E, 0xC3C399B4, 0x6C6C4450, 0x07070504, 0x04047FF6, 0x272746C2,
  371. 0xACACA716, 0xD0D07625, 0x50501386, 0xDCDCF756, 0x84841A55, 0xE1E15109, 0x7A7A25BE, 0x1313EF91
  372. );
  373. /**
  374. * M-Table
  375. *
  376. * @var Array
  377. * @access private
  378. */
  379. var $m1 = array (
  380. 0xA9D93939, 0x67901717, 0xB3719C9C, 0xE8D2A6A6, 0x04050707, 0xFD985252, 0xA3658080, 0x76DFE4E4,
  381. 0x9A084545, 0x92024B4B, 0x80A0E0E0, 0x78665A5A, 0xE4DDAFAF, 0xDDB06A6A, 0xD1BF6363, 0x38362A2A,
  382. 0x0D54E6E6, 0xC6432020, 0x3562CCCC, 0x98BEF2F2, 0x181E1212, 0xF724EBEB, 0xECD7A1A1, 0x6C774141,
  383. 0x43BD2828, 0x7532BCBC, 0x37D47B7B, 0x269B8888, 0xFA700D0D, 0x13F94444, 0x94B1FBFB, 0x485A7E7E,
  384. 0xF27A0303, 0xD0E48C8C, 0x8B47B6B6, 0x303C2424, 0x84A5E7E7, 0x54416B6B, 0xDF06DDDD, 0x23C56060,
  385. 0x1945FDFD, 0x5BA33A3A, 0x3D68C2C2, 0x59158D8D, 0xF321ECEC, 0xAE316666, 0xA23E6F6F, 0x82165757,
  386. 0x63951010, 0x015BEFEF, 0x834DB8B8, 0x2E918686, 0xD9B56D6D, 0x511F8383, 0x9B53AAAA, 0x7C635D5D,
  387. 0xA63B6868, 0xEB3FFEFE, 0xA5D63030, 0xBE257A7A, 0x16A7ACAC, 0x0C0F0909, 0xE335F0F0, 0x6123A7A7,
  388. 0xC0F09090, 0x8CAFE9E9, 0x3A809D9D, 0xF5925C5C, 0x73810C0C, 0x2C273131, 0x2576D0D0, 0x0BE75656,
  389. 0xBB7B9292, 0x4EE9CECE, 0x89F10101, 0x6B9F1E1E, 0x53A93434, 0x6AC4F1F1, 0xB499C3C3, 0xF1975B5B,
  390. 0xE1834747, 0xE66B1818, 0xBDC82222, 0x450E9898, 0xE26E1F1F, 0xF4C9B3B3, 0xB62F7474, 0x66CBF8F8,
  391. 0xCCFF9999, 0x95EA1414, 0x03ED5858, 0x56F7DCDC, 0xD4E18B8B, 0x1C1B1515, 0x1EADA2A2, 0xD70CD3D3,
  392. 0xFB2BE2E2, 0xC31DC8C8, 0x8E195E5E, 0xB5C22C2C, 0xE9894949, 0xCF12C1C1, 0xBF7E9595, 0xBA207D7D,
  393. 0xEA641111, 0x77840B0B, 0x396DC5C5, 0xAF6A8989, 0x33D17C7C, 0xC9A17171, 0x62CEFFFF, 0x7137BBBB,
  394. 0x81FB0F0F, 0x793DB5B5, 0x0951E1E1, 0xADDC3E3E, 0x242D3F3F, 0xCDA47676, 0xF99D5555, 0xD8EE8282,
  395. 0xE5864040, 0xC5AE7878, 0xB9CD2525, 0x4D049696, 0x44557777, 0x080A0E0E, 0x86135050, 0xE730F7F7,
  396. 0xA1D33737, 0x1D40FAFA, 0xAA346161, 0xED8C4E4E, 0x06B3B0B0, 0x706C5454, 0xB22A7373, 0xD2523B3B,
  397. 0x410B9F9F, 0x7B8B0202, 0xA088D8D8, 0x114FF3F3, 0x3167CBCB, 0xC2462727, 0x27C06767, 0x90B4FCFC,
  398. 0x20283838, 0xF67F0404, 0x60784848, 0xFF2EE5E5, 0x96074C4C, 0x5C4B6565, 0xB1C72B2B, 0xAB6F8E8E,
  399. 0x9E0D4242, 0x9CBBF5F5, 0x52F2DBDB, 0x1BF34A4A, 0x5FA63D3D, 0x9359A4A4, 0x0ABCB9B9, 0xEF3AF9F9,
  400. 0x91EF1313, 0x85FE0808, 0x49019191, 0xEE611616, 0x2D7CDEDE, 0x4FB22121, 0x8F42B1B1, 0x3BDB7272,
  401. 0x47B82F2F, 0x8748BFBF, 0x6D2CAEAE, 0x46E3C0C0, 0xD6573C3C, 0x3E859A9A, 0x6929A9A9, 0x647D4F4F,
  402. 0x2A948181, 0xCE492E2E, 0xCB17C6C6, 0x2FCA6969, 0xFCC3BDBD, 0x975CA3A3, 0x055EE8E8, 0x7AD0EDED,
  403. 0xAC87D1D1, 0x7F8E0505, 0xD5BA6464, 0x1AA8A5A5, 0x4BB72626, 0x0EB9BEBE, 0xA7608787, 0x5AF8D5D5,
  404. 0x28223636, 0x14111B1B, 0x3FDE7575, 0x2979D9D9, 0x88AAEEEE, 0x3C332D2D, 0x4C5F7979, 0x02B6B7B7,
  405. 0xB896CACA, 0xDA583535, 0xB09CC4C4, 0x17FC4343, 0x551A8484, 0x1FF64D4D, 0x8A1C5959, 0x7D38B2B2,
  406. 0x57AC3333, 0xC718CFCF, 0x8DF40606, 0x74695353, 0xB7749B9B, 0xC4F59797, 0x9F56ADAD, 0x72DAE3E3,
  407. 0x7ED5EAEA, 0x154AF4F4, 0x229E8F8F, 0x12A2ABAB, 0x584E6262, 0x07E85F5F, 0x99E51D1D, 0x34392323,
  408. 0x6EC1F6F6, 0x50446C6C, 0xDE5D3232, 0x68724646, 0x6526A0A0, 0xBC93CDCD, 0xDB03DADA, 0xF8C6BABA,
  409. 0xC8FA9E9E, 0xA882D6D6, 0x2BCF6E6E, 0x40507070, 0xDCEB8585, 0xFE750A0A, 0x328A9393, 0xA48DDFDF,
  410. 0xCA4C2929, 0x10141C1C, 0x2173D7D7, 0xF0CCB4B4, 0xD309D4D4, 0x5D108A8A, 0x0FE25151, 0x00000000,
  411. 0x6F9A1919, 0x9DE01A1A, 0x368F9494, 0x42E6C7C7, 0x4AECC9C9, 0x5EFDD2D2, 0xC1AB7F7F, 0xE0D8A8A8
  412. );
  413. /**
  414. * M-Table
  415. *
  416. * @var Array
  417. * @access private
  418. */
  419. var $m2 = array (
  420. 0xBC75BC32, 0xECF3EC21, 0x20C62043, 0xB3F4B3C9, 0xDADBDA03, 0x027B028B, 0xE2FBE22B, 0x9EC89EFA,
  421. 0xC94AC9EC, 0xD4D3D409, 0x18E6186B, 0x1E6B1E9F, 0x9845980E, 0xB27DB238, 0xA6E8A6D2, 0x264B26B7,
  422. 0x3CD63C57, 0x9332938A, 0x82D882EE, 0x52FD5298, 0x7B377BD4, 0xBB71BB37, 0x5BF15B97, 0x47E14783,
  423. 0x2430243C, 0x510F51E2, 0xBAF8BAC6, 0x4A1B4AF3, 0xBF87BF48, 0x0DFA0D70, 0xB006B0B3, 0x753F75DE,
  424. 0xD25ED2FD, 0x7DBA7D20, 0x66AE6631, 0x3A5B3AA3, 0x598A591C, 0x00000000, 0xCDBCCD93, 0x1A9D1AE0,
  425. 0xAE6DAE2C, 0x7FC17FAB, 0x2BB12BC7, 0xBE0EBEB9, 0xE080E0A0, 0x8A5D8A10, 0x3BD23B52, 0x64D564BA,
  426. 0xD8A0D888, 0xE784E7A5, 0x5F075FE8, 0x1B141B11, 0x2CB52CC2, 0xFC90FCB4, 0x312C3127, 0x80A38065,
  427. 0x73B2732A, 0x0C730C81, 0x794C795F, 0x6B546B41, 0x4B924B02, 0x53745369, 0x9436948F, 0x8351831F,
  428. 0x2A382A36, 0xC4B0C49C, 0x22BD22C8, 0xD55AD5F8, 0xBDFCBDC3, 0x48604878, 0xFF62FFCE, 0x4C964C07,
  429. 0x416C4177, 0xC742C7E6, 0xEBF7EB24, 0x1C101C14, 0x5D7C5D63, 0x36283622, 0x672767C0, 0xE98CE9AF,
  430. 0x441344F9, 0x149514EA, 0xF59CF5BB, 0xCFC7CF18, 0x3F243F2D, 0xC046C0E3, 0x723B72DB, 0x5470546C,
  431. 0x29CA294C, 0xF0E3F035, 0x088508FE, 0xC6CBC617, 0xF311F34F, 0x8CD08CE4, 0xA493A459, 0xCAB8CA96,
  432. 0x68A6683B, 0xB883B84D, 0x38203828, 0xE5FFE52E, 0xAD9FAD56, 0x0B770B84, 0xC8C3C81D, 0x99CC99FF,
  433. 0x580358ED, 0x196F199A, 0x0E080E0A, 0x95BF957E, 0x70407050, 0xF7E7F730, 0x6E2B6ECF, 0x1FE21F6E,
  434. 0xB579B53D, 0x090C090F, 0x61AA6134, 0x57825716, 0x9F419F0B, 0x9D3A9D80, 0x11EA1164, 0x25B925CD,
  435. 0xAFE4AFDD, 0x459A4508, 0xDFA4DF8D, 0xA397A35C, 0xEA7EEAD5, 0x35DA3558, 0xED7AEDD0, 0x431743FC,
  436. 0xF866F8CB, 0xFB94FBB1, 0x37A137D3, 0xFA1DFA40, 0xC23DC268, 0xB4F0B4CC, 0x32DE325D, 0x9CB39C71,
  437. 0x560B56E7, 0xE372E3DA, 0x87A78760, 0x151C151B, 0xF9EFF93A, 0x63D163BF, 0x345334A9, 0x9A3E9A85,
  438. 0xB18FB142, 0x7C337CD1, 0x8826889B, 0x3D5F3DA6, 0xA1ECA1D7, 0xE476E4DF, 0x812A8194, 0x91499101,
  439. 0x0F810FFB, 0xEE88EEAA, 0x16EE1661, 0xD721D773, 0x97C497F5, 0xA51AA5A8, 0xFEEBFE3F, 0x6DD96DB5,
  440. 0x78C578AE, 0xC539C56D, 0x1D991DE5, 0x76CD76A4, 0x3EAD3EDC, 0xCB31CB67, 0xB68BB647, 0xEF01EF5B,
  441. 0x1218121E, 0x602360C5, 0x6ADD6AB0, 0x4D1F4DF6, 0xCE4ECEE9, 0xDE2DDE7C, 0x55F9559D, 0x7E487E5A,
  442. 0x214F21B2, 0x03F2037A, 0xA065A026, 0x5E8E5E19, 0x5A785A66, 0x655C654B, 0x6258624E, 0xFD19FD45,
  443. 0x068D06F4, 0x40E54086, 0xF298F2BE, 0x335733AC, 0x17671790, 0x057F058E, 0xE805E85E, 0x4F644F7D,
  444. 0x89AF896A, 0x10631095, 0x74B6742F, 0x0AFE0A75, 0x5CF55C92, 0x9BB79B74, 0x2D3C2D33, 0x30A530D6,
  445. 0x2ECE2E49, 0x49E94989, 0x46684672, 0x77447755, 0xA8E0A8D8, 0x964D9604, 0x284328BD, 0xA969A929,
  446. 0xD929D979, 0x862E8691, 0xD1ACD187, 0xF415F44A, 0x8D598D15, 0xD6A8D682, 0xB90AB9BC, 0x429E420D,
  447. 0xF66EF6C1, 0x2F472FB8, 0xDDDFDD06, 0x23342339, 0xCC35CC62, 0xF16AF1C4, 0xC1CFC112, 0x85DC85EB,
  448. 0x8F228F9E, 0x71C971A1, 0x90C090F0, 0xAA9BAA53, 0x018901F1, 0x8BD48BE1, 0x4EED4E8C, 0x8EAB8E6F,
  449. 0xAB12ABA2, 0x6FA26F3E, 0xE60DE654, 0xDB52DBF2, 0x92BB927B, 0xB702B7B6, 0x692F69CA, 0x39A939D9,
  450. 0xD3D7D30C, 0xA761A723, 0xA21EA2AD, 0xC3B4C399, 0x6C506C44, 0x07040705, 0x04F6047F, 0x27C22746,
  451. 0xAC16ACA7, 0xD025D076, 0x50865013, 0xDC56DCF7, 0x8455841A, 0xE109E151, 0x7ABE7A25, 0x139113EF
  452. );
  453. /**
  454. * M-Table
  455. *
  456. * @var Array
  457. * @access private
  458. */
  459. var $m3 = array (
  460. 0xD939A9D9, 0x90176790, 0x719CB371, 0xD2A6E8D2, 0x05070405, 0x9852FD98, 0x6580A365, 0xDFE476DF,
  461. 0x08459A08, 0x024B9202, 0xA0E080A0, 0x665A7866, 0xDDAFE4DD, 0xB06ADDB0, 0xBF63D1BF, 0x362A3836,
  462. 0x54E60D54, 0x4320C643, 0x62CC3562, 0xBEF298BE, 0x1E12181E, 0x24EBF724, 0xD7A1ECD7, 0x77416C77,
  463. 0xBD2843BD, 0x32BC7532, 0xD47B37D4, 0x9B88269B, 0x700DFA70, 0xF94413F9, 0xB1FB94B1, 0x5A7E485A,
  464. 0x7A03F27A, 0xE48CD0E4, 0x47B68B47, 0x3C24303C, 0xA5E784A5, 0x416B5441, 0x06DDDF06, 0xC56023C5,
  465. 0x45FD1945, 0xA33A5BA3, 0x68C23D68, 0x158D5915, 0x21ECF321, 0x3166AE31, 0x3E6FA23E, 0x16578216,
  466. 0x95106395, 0x5BEF015B, 0x4DB8834D, 0x91862E91, 0xB56DD9B5, 0x1F83511F, 0x53AA9B53, 0x635D7C63,
  467. 0x3B68A63B, 0x3FFEEB3F, 0xD630A5D6, 0x257ABE25, 0xA7AC16A7, 0x0F090C0F, 0x35F0E335, 0x23A76123,
  468. 0xF090C0F0, 0xAFE98CAF, 0x809D3A80, 0x925CF592, 0x810C7381, 0x27312C27, 0x76D02576, 0xE7560BE7,
  469. 0x7B92BB7B, 0xE9CE4EE9, 0xF10189F1, 0x9F1E6B9F, 0xA93453A9, 0xC4F16AC4, 0x99C3B499, 0x975BF197,
  470. 0x8347E183, 0x6B18E66B, 0xC822BDC8, 0x0E98450E, 0x6E1FE26E, 0xC9B3F4C9, 0x2F74B62F, 0xCBF866CB,
  471. 0xFF99CCFF, 0xEA1495EA, 0xED5803ED, 0xF7DC56F7, 0xE18BD4E1, 0x1B151C1B, 0xADA21EAD, 0x0CD3D70C,
  472. 0x2BE2FB2B, 0x1DC8C31D, 0x195E8E19, 0xC22CB5C2, 0x8949E989, 0x12C1CF12, 0x7E95BF7E, 0x207DBA20,
  473. 0x6411EA64, 0x840B7784, 0x6DC5396D, 0x6A89AF6A, 0xD17C33D1, 0xA171C9A1, 0xCEFF62CE, 0x37BB7137,
  474. 0xFB0F81FB, 0x3DB5793D, 0x51E10951, 0xDC3EADDC, 0x2D3F242D, 0xA476CDA4, 0x9D55F99D, 0xEE82D8EE,
  475. 0x8640E586, 0xAE78C5AE, 0xCD25B9CD, 0x04964D04, 0x55774455, 0x0A0E080A, 0x13508613, 0x30F7E730,
  476. 0xD337A1D3, 0x40FA1D40, 0x3461AA34, 0x8C4EED8C, 0xB3B006B3, 0x6C54706C, 0x2A73B22A, 0x523BD252,
  477. 0x0B9F410B, 0x8B027B8B, 0x88D8A088, 0x4FF3114F, 0x67CB3167, 0x4627C246, 0xC06727C0, 0xB4FC90B4,
  478. 0x28382028, 0x7F04F67F, 0x78486078, 0x2EE5FF2E, 0x074C9607, 0x4B655C4B, 0xC72BB1C7, 0x6F8EAB6F,
  479. 0x0D429E0D, 0xBBF59CBB, 0xF2DB52F2, 0xF34A1BF3, 0xA63D5FA6, 0x59A49359, 0xBCB90ABC, 0x3AF9EF3A,
  480. 0xEF1391EF, 0xFE0885FE, 0x01914901, 0x6116EE61, 0x7CDE2D7C, 0xB2214FB2, 0x42B18F42, 0xDB723BDB,
  481. 0xB82F47B8, 0x48BF8748, 0x2CAE6D2C, 0xE3C046E3, 0x573CD657, 0x859A3E85, 0x29A96929, 0x7D4F647D,
  482. 0x94812A94, 0x492ECE49, 0x17C6CB17, 0xCA692FCA, 0xC3BDFCC3, 0x5CA3975C, 0x5EE8055E, 0xD0ED7AD0,
  483. 0x87D1AC87, 0x8E057F8E, 0xBA64D5BA, 0xA8A51AA8, 0xB7264BB7, 0xB9BE0EB9, 0x6087A760, 0xF8D55AF8,
  484. 0x22362822, 0x111B1411, 0xDE753FDE, 0x79D92979, 0xAAEE88AA, 0x332D3C33, 0x5F794C5F, 0xB6B702B6,
  485. 0x96CAB896, 0x5835DA58, 0x9CC4B09C, 0xFC4317FC, 0x1A84551A, 0xF64D1FF6, 0x1C598A1C, 0x38B27D38,
  486. 0xAC3357AC, 0x18CFC718, 0xF4068DF4, 0x69537469, 0x749BB774, 0xF597C4F5, 0x56AD9F56, 0xDAE372DA,
  487. 0xD5EA7ED5, 0x4AF4154A, 0x9E8F229E, 0xA2AB12A2, 0x4E62584E, 0xE85F07E8, 0xE51D99E5, 0x39233439,
  488. 0xC1F66EC1, 0x446C5044, 0x5D32DE5D, 0x72466872, 0x26A06526, 0x93CDBC93, 0x03DADB03, 0xC6BAF8C6,
  489. 0xFA9EC8FA, 0x82D6A882, 0xCF6E2BCF, 0x50704050, 0xEB85DCEB, 0x750AFE75, 0x8A93328A, 0x8DDFA48D,
  490. 0x4C29CA4C, 0x141C1014, 0x73D72173, 0xCCB4F0CC, 0x09D4D309, 0x108A5D10, 0xE2510FE2, 0x00000000,
  491. 0x9A196F9A, 0xE01A9DE0, 0x8F94368F, 0xE6C742E6, 0xECC94AEC, 0xFDD25EFD, 0xAB7FC1AB, 0xD8A8E0D8
  492. );
  493. /**
  494. * The Key Schedule Array
  495. *
  496. * @var Array
  497. * @access private
  498. */
  499. var $K = array();
  500. /**
  501. * The Key depended S-Table 0
  502. *
  503. * @var Array
  504. * @access private
  505. */
  506. var $S0 = array();
  507. /**
  508. * The Key depended S-Table 1
  509. *
  510. * @var Array
  511. * @access private
  512. */
  513. var $S1 = array();
  514. /**
  515. * The Key depended S-Table 2
  516. *
  517. * @var Array
  518. * @access private
  519. */
  520. var $S2 = array();
  521. /**
  522. * The Key depended S-Table 3
  523. *
  524. * @var Array
  525. * @access private
  526. */
  527. var $S3 = array();
  528. /**
  529. * Default Constructor.
  530. *
  531. * Determines whether or not the mcrypt extension should be used.
  532. * If not explictly set, CRYPT_TWOFISH_MODE_CBC will be used.
  533. *
  534. * @param optional Integer $mode
  535. * @access public
  536. */
  537. function Crypt_Twofish($mode = CRYPT_TWOFISH_MODE_CBC)
  538. {
  539. if ( !defined('CRYPT_TWOFISH_MODE') ) {
  540. switch (true) {
  541. case extension_loaded('mcrypt') && in_array('twofish', mcrypt_list_algorithms()):
  542. define('CRYPT_TWOFISH_MODE', CRYPT_TWOFISH_MODE_MCRYPT);
  543. break;
  544. default:
  545. define('CRYPT_TWOFISH_MODE', CRYPT_TWOFISH_MODE_INTERNAL);
  546. }
  547. }
  548. switch ( CRYPT_TWOFISH_MODE ) {
  549. case CRYPT_TWOFISH_MODE_MCRYPT:
  550. switch ($mode) {
  551. case CRYPT_TWOFISH_MODE_ECB:
  552. $this->paddable = true;
  553. $this->mode = MCRYPT_MODE_ECB;
  554. break;
  555. case CRYPT_TWOFISH_MODE_CTR:
  556. $this->mode = 'ctr';
  557. break;
  558. case CRYPT_TWOFISH_MODE_CFB:
  559. $this->mode = 'ncfb';
  560. $this->ecb = mcrypt_module_open(MCRYPT_TWOFISH, '', MCRYPT_MODE_ECB, '');
  561. break;
  562. case CRYPT_TWOFISH_MODE_OFB:
  563. $this->mode = MCRYPT_MODE_NOFB;
  564. break;
  565. case CRYPT_TWOFISH_MODE_CBC:
  566. default:
  567. $this->paddable = true;
  568. $this->mode = MCRYPT_MODE_CBC;
  569. }
  570. $this->enmcrypt = mcrypt_module_open(MCRYPT_TWOFISH, '', $this->mode, '');
  571. $this->demcrypt = mcrypt_module_open(MCRYPT_TWOFISH, '', $this->mode, '');
  572. break;
  573. default:
  574. switch ($mode) {
  575. case CRYPT_TWOFISH_MODE_ECB:
  576. case CRYPT_TWOFISH_MODE_CBC:
  577. $this->paddable = true;
  578. $this->mode = $mode;
  579. break;
  580. case CRYPT_TWOFISH_MODE_CTR:
  581. case CRYPT_TWOFISH_MODE_CFB:
  582. case CRYPT_TWOFISH_MODE_OFB:
  583. $this->mode = $mode;
  584. break;
  585. default:
  586. $this->paddable = true;
  587. $this->mode = CRYPT_TWOFISH_MODE_CBC;
  588. }
  589. $this->inline_crypt_setup();
  590. }
  591. }
  592. /**
  593. * Sets the key.
  594. *
  595. * Keys can be of any length. Twofish, itself, requires the use of a key that's 128, 192 or 256-bits long.
  596. * If the key is less than 256-bits we round the length up to the closest valid key length,
  597. * padding $key with null bytes. If the key is more than 256-bits, we trim the excess bits.
  598. *
  599. * If the key is not explicitly set, it'll be assumed a 128 bits key to be all null bytes.
  600. *
  601. * @access public
  602. * @param String $key
  603. */
  604. function setKey($key)
  605. {
  606. $keylength = strlen($key);
  607. switch (true) {
  608. case $keylength <= 16:
  609. $key.= str_repeat("\0", 16 - $keylength);
  610. break;
  611. case $keylength <= 24:
  612. $key.= str_repeat("\0", 24 - $keylength);
  613. break;
  614. case $keylength <= 32:
  615. $key.= str_repeat("\0", 32 - $keylength);
  616. break;
  617. default:
  618. $key = substr($key, 0, 32);
  619. }
  620. $this->key = $key;
  621. $this->enchanged = true;
  622. $this->dechanged = true;
  623. if (CRYPT_TWOFISH_MODE == CRYPT_TWOFISH_MODE_MCRYPT) {
  624. return;
  625. }
  626. /* Key expanding and generating the key-depended s-boxes */
  627. $le_longs = unpack('V*', $key);
  628. $key = unpack('C*', $key);
  629. $m0 = $this->m0;
  630. $m1 = $this->m1;
  631. $m2 = $this->m2;
  632. $m3 = $this->m3;
  633. $q0 = $this->q0;
  634. $q1 = $this->q1;
  635. $K = $S0 = $S1 = $S2 = $S3 = array();
  636. switch (strlen($this->key)) {
  637. case 16:
  638. list ($s7, $s6, $s5, $s4) = $this->mds_rem($le_longs[1], $le_longs[2]);
  639. list ($s3, $s2, $s1, $s0) = $this->mds_rem($le_longs[3], $le_longs[4]);
  640. for ($i = 0, $j = 1; $i < 40; $i+= 2,$j+= 2) {
  641. $A = $m0[$q0[$q0[$i] ^ $key[ 9]] ^ $key[1]] ^
  642. $m1[$q0[$q1[$i] ^ $key[10]] ^ $key[2]] ^
  643. $m2[$q1[$q0[$i] ^ $key[11]] ^ $key[3]] ^
  644. $m3[$q1[$q1[$i] ^ $key[12]] ^ $key[4]];
  645. $B = $m0[$q0[$q0[$j] ^ $key[13]] ^ $key[5]] ^
  646. $m1[$q0[$q1[$j] ^ $key[14]] ^ $key[6]] ^
  647. $m2[$q1[$q0[$j] ^ $key[15]] ^ $key[7]] ^
  648. $m3[$q1[$q1[$j] ^ $key[16]] ^ $key[8]];
  649. $B = ($B << 8) | ($B >> 24 & 0xff);
  650. $K[] = $A+= $B;
  651. $K[] = (($A+= $B) << 9 | $A >> 23 & 0x1ff);
  652. }
  653. for ($i = 0; $i < 256; ++$i) {
  654. $S0[$i] = $m0[$q0[$q0[$i] ^ $s4] ^ $s0];
  655. $S1[$i] = $m1[$q0[$q1[$i] ^ $s5] ^ $s1];
  656. $S2[$i] = $m2[$q1[$q0[$i] ^ $s6] ^ $s2];
  657. $S3[$i] = $m3[$q1[$q1[$i] ^ $s7] ^ $s3];
  658. }
  659. break;
  660. case 24:
  661. list ($sb, $sa, $s9, $s8) = $this->mds_rem($le_longs[1], $le_longs[2]);
  662. list ($s7, $s6, $s5, $s4) = $this->mds_rem($le_longs[3], $le_longs[4]);
  663. list ($s3, $s2, $s1, $s0) = $this->mds_rem($le_longs[5], $le_longs[6]);
  664. for ($i = 0, $j = 1; $i < 40; $i+= 2, $j+= 2) {
  665. $A = $m0[$q0[$q0[$q1[$i] ^ $key[17]] ^ $key[ 9]] ^ $key[1]] ^
  666. $m1[$q0[$q1[$q1[$i] ^ $key[18]] ^ $key[10]] ^ $key[2]] ^
  667. $m2[$q1[$q0[$q0[$i] ^ $key[19]] ^ $key[11]] ^ $key[3]] ^
  668. $m3[$q1[$q1[$q0[$i] ^ $key[20]] ^ $key[12]] ^ $key[4]];
  669. $B = $m0[$q0[$q0[$q1[$j] ^ $key[21]] ^ $key[13]] ^ $key[5]] ^
  670. $m1[$q0[$q1[$q1[$j] ^ $key[22]] ^ $key[14]] ^ $key[6]] ^
  671. $m2[$q1[$q0[$q0[$j] ^ $key[23]] ^ $key[15]] ^ $key[7]] ^
  672. $m3[$q1[$q1[$q0[$j] ^ $key[24]] ^ $key[16]] ^ $key[8]];
  673. $B = ($B << 8) | ($B >> 24 & 0xff);
  674. $K[] = $A+= $B;
  675. $K[] = (($A+= $B) << 9 | $A >> 23 & 0x1ff);
  676. }
  677. for ($i = 0; $i < 256; ++$i) {
  678. $S0[$i] = $m0[$q0[$q0[$q1[$i] ^ $s8] ^ $s4] ^ $s0];
  679. $S1[$i] = $m1[$q0[$q1[$q1[$i] ^ $s9] ^ $s5] ^ $s1];
  680. $S2[$i] = $m2[$q1[$q0[$q0[$i] ^ $sa] ^ $s6] ^ $s2];
  681. $S3[$i] = $m3[$q1[$q1[$q0[$i] ^ $sb] ^ $s7] ^ $s3];
  682. }
  683. break;
  684. default: // 32
  685. list ($sf, $se, $sd, $sc) = $this->mds_rem($le_longs[1], $le_longs[2]);
  686. list ($sb, $sa, $s9, $s8) = $this->mds_rem($le_longs[3], $le_longs[4]);
  687. list ($s7, $s6, $s5, $s4) = $this->mds_rem($le_longs[5], $le_longs[6]);
  688. list ($s3, $s2, $s1, $s0) = $this->mds_rem($le_longs[7], $le_longs[8]);
  689. for ($i = 0, $j = 1; $i < 40; $i+= 2, $j+= 2) {
  690. $A = $m0[$q0[$q0[$q1[$q1[$i] ^ $key[25]] ^ $key[17]] ^ $key[ 9]] ^ $key[1]] ^
  691. $m1[$q0[$q1[$q1[$q0[$i] ^ $key[26]] ^ $key[18]] ^ $key[10]] ^ $key[2]] ^
  692. $m2[$q1[$q0[$q0[$q0[$i] ^ $key[27]] ^ $key[19]] ^ $key[11]] ^ $key[3]] ^
  693. $m3[$q1[$q1[$q0[$q1[$i] ^ $key[28]] ^ $key[20]] ^ $key[12]] ^ $key[4]];
  694. $B = $m0[$q0[$q0[$q1[$q1[$j] ^ $key[29]] ^ $key[21]] ^ $key[13]] ^ $key[5]] ^
  695. $m1[$q0[$q1[$q1[$q0[$j] ^ $key[30]] ^ $key[22]] ^ $key[14]] ^ $key[6]] ^
  696. $m2[$q1[$q0[$q0[$q0[$j] ^ $key[31]] ^ $key[23]] ^ $key[15]] ^ $key[7]] ^
  697. $m3[$q1[$q1[$q0[$q1[$j] ^ $key[32]] ^ $key[24]] ^ $key[16]] ^ $key[8]];
  698. $B = ($B << 8) | ($B >> 24 & 0xff);
  699. $K[] = $A+= $B;
  700. $K[] = (($A+= $B) << 9 | $A >> 23 & 0x1ff);
  701. }
  702. for ($i = 0; $i < 256; ++$i) {
  703. $S0[$i] = $m0[$q0[$q0[$q1[$q1[$i] ^ $sc] ^ $s8] ^ $s4] ^ $s0];
  704. $S1[$i] = $m1[$q0[$q1[$q1[$q0[$i] ^ $sd] ^ $s9] ^ $s5] ^ $s1];
  705. $S2[$i] = $m2[$q1[$q0[$q0[$q0[$i] ^ $se] ^ $sa] ^ $s6] ^ $s2];
  706. $S3[$i] = $m3[$q1[$q1[$q0[$q1[$i] ^ $sf] ^ $sb] ^ $s7] ^ $s3];
  707. }
  708. }
  709. $this->K = $K;
  710. $this->S0 = $S0;
  711. $this->S1 = $S1;
  712. $this->S2 = $S2;
  713. $this->S3 = $S3;
  714. }
  715. /**
  716. * Sets the password.
  717. *
  718. * Depending on what $method is set to, setPassword()'s (optional) parameters are as follows:
  719. * {@link http://en.wikipedia.org/wiki/PBKDF2 pbkdf2}:
  720. * $hash, $salt, $count
  721. *
  722. * @param String $password
  723. * @param optional String $method
  724. * @access public
  725. */
  726. function setPassword($password, $method = 'pbkdf2')
  727. {
  728. $key = '';
  729. switch ($method) {
  730. default: // 'pbkdf2'
  731. list(, , $hash, $salt, $count) = func_get_args();
  732. if (!isset($hash)) {
  733. $hash = 'sha1';
  734. }
  735. // WPA and WPA2 use the SSID as the salt
  736. if (!isset($salt)) {
  737. $salt = 'phpseclib/salt';
  738. }
  739. // RFC2898#section-4.2 uses 1,000 iterations by default
  740. // WPA and WPA2 use 4,096.
  741. if (!isset($count)) {
  742. $count = 1000;
  743. }
  744. if (!class_exists('Crypt_Hash')) {
  745. require_once('Crypt/Hash.php');
  746. }
  747. $i = 1;
  748. while (strlen($key) < 32) {
  749. $hmac = new Crypt_Hash();
  750. $hmac->setHash($hash);
  751. $hmac->setKey($password);
  752. $f = $u = $hmac->hash($salt . pack('N', $i++));
  753. for ($j = 2; $j <= $count; ++$j) {
  754. $u = $hmac->hash($u);
  755. $f^= $u;
  756. }
  757. $key.= $f;
  758. }
  759. }
  760. $this->setKey($key);
  761. }
  762. /**
  763. * Sets the initialization vector. (optional)
  764. *
  765. * SetIV is not required when CRYPT_TWOFISH_MODE_ECB is being used. If not explictly set, it'll be assumed
  766. * to be all null bytes.
  767. *
  768. * @access public
  769. * @param String $iv
  770. */
  771. function setIV($iv)
  772. {
  773. $this->encryptIV = $this->decryptIV = $this->iv = str_pad(substr($iv, 0, 16), 16, chr(0));
  774. $this->enchanged = true;
  775. $this->dechanged = true;
  776. }
  777. /**
  778. * Encrypts a message.
  779. *
  780. * $plaintext will be padded with up to 16 additional bytes. Other Twofish implementations may or may not pad in the
  781. * same manner. Other common approaches to padding and the reasons why it's necessary are discussed in the following
  782. * URL:
  783. *
  784. * {@link http://www.di-mgt.com.au/cryptopad.html http://www.di-mgt.com.au/cryptopad.html}
  785. *
  786. * An alternative to padding is to, separately, send the length of the file. This is what SSH, in fact, does.
  787. * strlen($plaintext) will still need to be a multiple of 16, however, arbitrary values can be added to make it that
  788. * length.
  789. *
  790. * @see Crypt_Twofish::decrypt()
  791. * @access public
  792. * @param String $plaintext
  793. */
  794. function encrypt($plaintext)
  795. {
  796. if ( CRYPT_TWOFISH_MODE == CRYPT_TWOFISH_MODE_MCRYPT ) {
  797. if ($this->paddable) {
  798. $plaintext = $this->_pad($plaintext);
  799. }
  800. if ($this->enchanged) {
  801. mcrypt_generic_init($this->enmcrypt, $this->key, $this->encryptIV);
  802. if ($this->mode == 'ncfb') {
  803. mcrypt_generic_init($this->ecb, $this->key, "\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0");
  804. }
  805. $this->enchanged = false;
  806. }
  807. if ($this->mode != 'ncfb' || !$this->continuousBuffer) {
  808. $ciphertext = mcrypt_generic($this->enmcrypt, $plaintext);
  809. } else {
  810. $iv = &$this->encryptIV;
  811. $pos = &$this->enbuffer['pos'];
  812. $len = strlen($plaintext);
  813. $ciphertext = '';
  814. $i = 0;
  815. if ($pos) {
  816. $orig_pos = $pos;
  817. $max = 16 - $pos;
  818. if ($len >= $max) {
  819. $i = $max;
  820. $len-= $max;
  821. $pos = 0;
  822. } else {
  823. $i = $len;
  824. $pos+= $len;
  825. $len = 0;
  826. }
  827. $ciphertext = substr($iv, $orig_pos) ^ $plaintext;
  828. $iv = substr_replace($iv, $ciphertext, $orig_pos, $i);
  829. $this->enbuffer['enmcrypt_init'] = true;
  830. }
  831. if ($len >= 16) {
  832. if ($this->enbuffer['enmcrypt_init'] === false || $len > 600) {
  833. if ($this->enbuffer['enmcrypt_init'] === true) {
  834. mcrypt_generic_init($this->enmcrypt, $this->key, $iv);
  835. $this->enbuffer['enmcrypt_init'] = false;
  836. }
  837. $ciphertext.= mcrypt_generic($this->enmcrypt, substr($plaintext, $i, $len - $len % 16));
  838. $iv = substr($ciphertext, -16);
  839. $len%= 16;
  840. } else {
  841. while ($len >= 16) {
  842. $iv = mcrypt_generic($this->ecb, $iv) ^ substr($plaintext, $i, 16);
  843. $ciphertext.= $iv;
  844. $len-= 16;
  845. $i+= 16;
  846. }
  847. }
  848. }
  849. if ($len) {
  850. $iv = mcrypt_generic($this->ecb, $iv);
  851. $block = $iv ^ substr($plaintext, -$len);
  852. $iv = substr_replace($iv, $block, 0, $len);
  853. $ciphertext.= $block;
  854. $pos = $len;
  855. }
  856. return $ciphertext;
  857. }
  858. if (!$this->continuousBuffer) {
  859. mcrypt_generic_init($this->enmcrypt, $this->key, $this->encryptIV);
  860. }
  861. return $ciphertext;
  862. }
  863. if (empty($this->K)) {
  864. $this->setKey($this->key);
  865. }
  866. $inline = $this->inline_crypt;
  867. return $inline('encrypt', $this, $plaintext);
  868. }
  869. /**
  870. * Decrypts a message.
  871. *
  872. * If strlen($ciphertext) is not a multiple of 16, null bytes will be added to the end of the string until it is.
  873. *
  874. * @see Crypt_Twofish::encrypt()
  875. * @access public
  876. * @param String $ciphertext
  877. */
  878. function decrypt($ciphertext)
  879. {
  880. if ( CRYPT_TWOFISH_MODE == CRYPT_TWOFISH_MODE_MCRYPT ) {
  881. if ($this->paddable) {
  882. // we pad with chr(0) since that's what mcrypt_generic does. to quote from http://php.net/function.mcrypt-generic :
  883. // "The data is padded with "\0" to make sure the length of the data is n * blocksize."
  884. $ciphertext = str_pad($ciphertext, strlen($ciphertext) + (16 - strlen($ciphertext) % 16) % 16, chr(0));
  885. }
  886. if ($this->dechanged) {
  887. mcrypt_generic_init($this->demcrypt, $this->key, $this->decryptIV);
  888. if ($this->mode == 'ncfb') {
  889. mcrypt_generic_init($this->ecb, $this->key, "\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0");
  890. }
  891. $this->dechanged = false;
  892. }
  893. if ($this->mode != 'ncfb' || !$this->continuousBuffer) {
  894. $plaintext = mdecrypt_generic($this->demcrypt, $ciphertext);
  895. } else {
  896. $iv = &$this->decryptIV;
  897. $pos = &$this->debuffer['pos'];
  898. $len = strlen($ciphertext);
  899. $plaintext = '';
  900. $i = 0;
  901. if ($pos) {
  902. $orig_pos = $pos;
  903. $max = 16 - $pos;
  904. if ($len >= $max) {
  905. $i = $max;
  906. $len-= $max;
  907. $pos = 0;
  908. } else {
  909. $i = $len;
  910. $pos+= $len;
  911. $len = 0;
  912. }
  913. $plaintext = substr($iv, $orig_pos) ^ $ciphertext;
  914. $iv = substr_replace($iv, substr($ciphertext, 0, $i), $orig_pos, $i);
  915. }
  916. if ($len >= 16) {
  917. $cb = substr($ciphertext, $i, $len - $len % 16);
  918. $plaintext.= mcrypt_generic($this->ecb, $iv . $cb) ^ $cb;
  919. $iv = substr($cb, -16);
  920. $len%= 16;
  921. }
  922. if ($len) {
  923. $iv = mcrypt_generic($this->ecb, $iv);
  924. $plaintext.= $iv ^ substr($ciphertext, -$len);
  925. $iv = substr_replace($iv, substr($ciphertext, -$len), 0, $len);
  926. $pos = $len;
  927. }
  928. return $plaintext;
  929. }
  930. if (!$this->continuousBuffer) {
  931. mcrypt_generic_init($this->demcrypt, $this->key, $this->decryptIV);
  932. }
  933. return $this->paddable ? $this->_unpad($plaintext) : $plaintext;
  934. }
  935. if (empty($this->K)) {
  936. $this->setKey($this->key);
  937. }
  938. $inline = $this->inline_crypt;
  939. return $inline('decrypt', $this, $ciphertext);
  940. }
  941. /**
  942. * Treat consecutive "packets" as if they are a continuous buffer.
  943. *
  944. * @see Crypt_Twofish::disableContinuousBuffer()
  945. * @access public
  946. */
  947. function enableContinuousBuffer()
  948. {
  949. $this->continuousBuffer = true;
  950. }
  951. /**
  952. * Treat consecutive packets as if they are a discontinuous buffer.
  953. *
  954. * The default behavior.
  955. *
  956. * @see Crypt_Twofish::enableContinuousBuffer()
  957. * @access public
  958. */
  959. function disableContinuousBuffer()
  960. {
  961. $this->continuousBuffer = false;
  962. $this->encryptIV = $this->iv;
  963. $this->decryptIV = $this->iv;
  964. $this->enbuffer = array('encrypted' => '', 'xor' => '', 'pos' => 0, 'enmcrypt_init' => true);
  965. $this->debuffer = array('ciphertext' => '', 'xor' => '', 'pos' => 0, 'demcrypt_init' => true);
  966. if (CRYPT_TWOFISH_MODE == CRYPT_TWOFISH_MODE_MCRYPT) {
  967. mcrypt_generic_init($this->enmcrypt, $this->key, $this->iv);
  968. mcrypt_generic_init($this->demcrypt, $this->key, $this->iv);
  969. }
  970. }
  971. /**
  972. * Pad "packets".
  973. *
  974. * Twofish works by encrypting 16 bytes at a time. If you ever need to encrypt or decrypt something that's not
  975. * a multiple of 16, it becomes necessary to pad the input so that it's length is a multiple of eight.
  976. *
  977. * Padding is enabled by default. Sometimes, however, it is undesirable to pad strings. Such is the case in SSH1,
  978. * where "packets" are padded with random bytes before being encrypted. Unpad these packets and you risk stripping
  979. * away characters that shouldn't be stripped away. (SSH knows how many bytes are added because the length is
  980. * transmitted separately)
  981. *
  982. * @see Crypt_Twofish::disablePadding()
  983. * @access public
  984. */
  985. function enablePadding()
  986. {
  987. $this->padding = true;
  988. }
  989. /**
  990. * Do not pad packets.
  991. *
  992. * @see Crypt_Twofish::enablePadding()
  993. * @access public
  994. */
  995. function disablePadding()
  996. {
  997. $this->padding = false;
  998. }
  999. /**
  1000. * Pads a string
  1001. *
  1002. * Pads a string using the RSA PKCS padding standards so that its length is a multiple of the blocksize (16).
  1003. *
  1004. * If padding is disabled and $text is not a multiple of the blocksize, the string will be padded regardless
  1005. * and padding will, hence forth, be enabled.
  1006. *
  1007. * @see Crypt_Twofish::_unpad()
  1008. * @access private
  1009. */
  1010. function _pad($text)
  1011. {
  1012. $length = strlen($text);
  1013. if (!$this->padding) {
  1014. if ($length % 16 == 0) {
  1015. return $text;
  1016. } else {
  1017. user_error("The plaintext's length ($length) is not a multiple of the block size (16)");
  1018. $this->padding = true;
  1019. }
  1020. }
  1021. $pad = 16 - ($length % 16);
  1022. return str_pad($text, $length + $pad, chr($pad));
  1023. }
  1024. /**
  1025. * Unpads a string
  1026. *
  1027. * If padding is enabled and the reported padding length is invalid the encryption key will be assumed to be wrong
  1028. * and false will be returned.
  1029. *
  1030. * @see Crypt_Twofish::_pad()
  1031. * @access private
  1032. */
  1033. function _unpad($text)
  1034. {
  1035. if (!$this->padding) {
  1036. return $text;
  1037. }
  1038. $length = ord($text[strlen($text) - 1]);
  1039. if (!$length || $length > 16) {
  1040. return false;
  1041. }
  1042. return substr($text, 0, -$length);
  1043. }
  1044. /**
  1045. * String Shift
  1046. *
  1047. * Inspired by array_shift
  1048. *
  1049. * @param String $string
  1050. * @return String
  1051. * @access private
  1052. */
  1053. function _string_shift(&$string)
  1054. {
  1055. $substr = substr($string, 0, 16);
  1056. $string = substr($string, 16);
  1057. return $substr;
  1058. }
  1059. /**
  1060. * Generate CTR XOR encryption key
  1061. *
  1062. * Encrypt the output of this and XOR it against the ciphertext / plaintext to get the
  1063. * plaintext / ciphertext in CTR mode.
  1064. *
  1065. * @see Crypt_Twofish::decrypt()
  1066. * @see Crypt_Twofish::encrypt()
  1067. * @access public
  1068. * @param String $iv
  1069. */
  1070. function _generate_xor(&$iv)
  1071. {
  1072. $xor = $iv;
  1073. for ($j = 4; $j <= 16; $j+=4) {
  1074. $temp = substr($iv, -$j, 4);
  1075. switch ($temp) {
  1076. case "\xFF\xFF\xFF\xFF":
  1077. $iv = substr_replace($iv, "\x00\x00\x00\x00", -$j, 4);
  1078. break;
  1079. case "\x7F\xFF\xFF\xFF":
  1080. $iv = substr_replace($iv, "\x80\x00\x00\x00", -$j, 4);
  1081. break 2;
  1082. default:
  1083. extract(unpack('Ncount', $temp));
  1084. $iv = substr_replace($iv, pack('N', $count + 1), -$j, 4);
  1085. break 2;
  1086. }
  1087. }
  1088. return $xor;
  1089. }
  1090. /**
  1091. * mds_rem function using by the twofish cipher algorithm
  1092. *
  1093. * @access private
  1094. * @param String $A
  1095. * @param String $B
  1096. * @return Array
  1097. */
  1098. function mds_rem($A, $B)
  1099. {
  1100. // No gain by unrolling this loop.
  1101. for ($i = 0; $i < 8; ++$i) {
  1102. // Get most significant coefficient.
  1103. $t = 0xff & ($B >> 24);
  1104. // Shift the others up.
  1105. $B = ($B << 8) | (0xff & ($A >> 24));
  1106. $A<<= 8;
  1107. $u = $t << 1;
  1108. // Subtract the modular polynomial on overflow.
  1109. if ($t & 0x80) {
  1110. $u^= 0x14d;
  1111. }
  1112. // Remove t * (a * x^2 + 1).
  1113. $B ^= $t ^ ($u << 16);
  1114. // Form u = a*t + t/a = t*(a + 1/a).
  1115. $u^= 0x7fffffff & ($t >> 1);
  1116. // Add the modular polynomial on underflow.
  1117. if ($t & 0x01) $u^= 0xa6 ;
  1118. // Remove t * (a + 1/a) * (x^3 + x).
  1119. $B^= ($u << 24) | ($u << 8);
  1120. }
  1121. return array(
  1122. 0xff & $B >> 24,
  1123. 0xff & $B >> 16,
  1124. 0xff & $B >> 8,
  1125. 0xff & $B);
  1126. }
  1127. /**
  1128. * Creates performance-optimized function for de/encrypt(), storing it in $this->inline_crypt
  1129. *
  1130. * @access private
  1131. */
  1132. function inline_crypt_setup()
  1133. {
  1134. $lambda_functions =& Crypt_Twofish::get_lambda_functions();
  1135. $block_size = 16;
  1136. $mode = $this->mode;
  1137. $code_hash = "$mode";
  1138. if (!isset($lambda_functions[$code_hash])) {
  1139. $init_cryptBlock = '
  1140. $S0 = $self->S0;
  1141. $S1 = $self->S1;
  1142. $S2 = $self->S2;
  1143. $S3 = $self->S3;
  1144. extract($self->K, EXTR_PREFIX_ALL, "K");
  1145. ';
  1146. // Generating encrypt code:
  1147. $_encryptBlock = '
  1148. $in = unpack("V4", $in);
  1149. $R0 = $K_0 ^ $in[1];
  1150. $R1 = $K_1 ^ $in[2];
  1151. $R2 = $K_2 ^ $in[3];
  1152. $R3 = $K_3 ^ $in[4];
  1153. ';
  1154. for ($ki = 7, $i = 0; $i < 8; ++$i) {
  1155. $_encryptBlock.= '
  1156. $t0 = $S0[ $R0 & 0xff] ^
  1157. $S1[($R0 >> 8) & 0xff] ^
  1158. $S2[($R0 >> 16) & 0xff] ^
  1159. $S3[($R0 >> 24) & 0xff];
  1160. $t1 = $S0[($R1 >> 24) & 0xff] ^
  1161. $S1[ $R1 & 0xff] ^
  1162. $S2[($R1 >> 8) & 0xff] ^
  1163. $S3[($R1 >> 16) & 0xff];
  1164. $R2^= ($t0 + $t1 + $K_'.(++$ki).');
  1165. $R2 = ($R2 >> 1 & 0x7fffffff) | ($R2 << 31);
  1166. $R3 = ((($R3 >> 31) & 1) | ($R3 << 1)) ^ ($t0 + ($t1 << 1) + $K_'.(++$ki).');
  1167. $t0 = $S0[ $R2 & 0xff] ^
  1168. $S1[($R2 >> 8) & 0xff] ^
  1169. $S2[($R2 >> 16) & 0xff] ^
  1170. $S3[($R2 >> 24) & 0xff];
  1171. $t1 = $S0[($R3 >> 24) & 0xff] ^
  1172. $S1[ $R3 & 0xff] ^
  1173. $S2[($R3 >> 8) & 0xff] ^
  1174. $S3[($R3 >> 16) & 0xff];
  1175. $R0^= ($t0 + $t1 + $K_'.(++$ki).');
  1176. $R0 = ($R0 >> 1 & 0x7fffffff) | ($R0 << 31);
  1177. $R1 = ((($R1 >> 31) & 1) | ($R1 << 1)) ^ ($t0 + ($t1 << 1) + $K_'.(++$ki).');
  1178. ';
  1179. }
  1180. $_encryptBlock.= '
  1181. $in = pack("V4", $K_4 ^ $R2,
  1182. $K_5 ^ $R3,
  1183. $K_6 ^ $R0,
  1184. $K_7 ^ $R1);
  1185. ';
  1186. // Generating decrypt code:
  1187. $_decryptBlock = '
  1188. $in = unpack("V4", $in);
  1189. $R0 = $K_4 ^ $in[1];
  1190. $R1 = $K_5 ^ $in[2];
  1191. $R2 = $K_6 ^ $in[3];
  1192. $R3 = $K_7 ^ $in[4];
  1193. ';
  1194. for ($ki = 40, $i = 0; $i < 8; ++$i) {
  1195. $_decryptBlock.= '
  1196. $t0 = $S0[$R0 & 0xff] ^
  1197. $S1[$R0 >> 8 & 0xff] ^
  1198. $S2[$R0 >> 16 & 0xff] ^
  1199. $S3[$R0 >> 24 & 0xff];
  1200. $t1 = $S0[$R1 >> 24 & 0xff] ^
  1201. $S1[$R1 & 0xff] ^
  1202. $S2[$R1 >> 8 & 0xff] ^
  1203. $S3[$R1 >> 16 & 0xff];
  1204. $R3^= $t0 + ($t1 << 1) + $K_'.(--$ki).';
  1205. $R3 = $R3 >> 1 & 0x7fffffff | $R3 << 31;
  1206. $R2 = ($R2 >> 31 & 0x1 | $R2 << 1) ^ ($t0 + $t1 + $K_'.(--$ki).');
  1207. $t0 = $S0[$R2 & 0xff] ^
  1208. $S1[$R2 >> 8 & 0xff] ^
  1209. $S2[$R2 >> 16 & 0xff] ^
  1210. $S3[$R2 >> 24 & 0xff];
  1211. $t1 = $S0[$R3 >> 24 & 0xff] ^
  1212. $S1[$R3 & 0xff] ^
  1213. $S2[$R3 >> 8 & 0xff] ^
  1214. $S3[$R3 >> 16 & 0xff];
  1215. $R1^= $t0 + ($t1 << 1) + $K_'.(--$ki).';
  1216. $R1 = $R1 >> 1 & 0x7fffffff | $R1 << 31;
  1217. $R0 = ($R0 >> 31 & 0x1 | $R0 << 1) ^ ($t0 + $t1 + $K_'.(--$ki).');
  1218. ';
  1219. }
  1220. $_decryptBlock.= '
  1221. $in = pack("V4", $K_0 ^ $R2,
  1222. $K_1 ^ $R3,
  1223. $K_2 ^ $R0,
  1224. $K_3 ^ $R1);
  1225. ';
  1226. // Generating mode of operation code:
  1227. switch ($mode) {
  1228. case CRYPT_TWOFISH_MODE_ECB:
  1229. $encrypt = '
  1230. $ciphertext = "";
  1231. $text = $self->_pad($text);
  1232. $plaintext_len = strlen($text);
  1233. for ($i = 0; $i < $plaintext_len; $i+= '.$block_size.') {
  1234. $in = substr($text, $i, '.$block_size.');
  1235. '.$_encryptBlock.'
  1236. $ciphertext.= $in;
  1237. }
  1238. return $ciphertext;
  1239. ';
  1240. $decrypt = '
  1241. $plaintext = "";
  1242. $text = str_pad($text, strlen($text) + ('.$block_size.' - strlen($text) % '.$block_size.') % '.$block_size.', chr(0));
  1243. $ciphertext_len = strlen($text);
  1244. for ($i = 0; $i < $ciphertext_len; $i+= '.$block_size.') {
  1245. $in = substr($text, $i, '.$block_size.');
  1246. '.$_decryptBlock.'
  1247. $plaintext.= $in;
  1248. }
  1249. return $self->_unpad($plaintext);
  1250. ';
  1251. break;
  1252. case CRYPT_TWOFISH_MODE_CBC:
  1253. $encrypt = '
  1254. $ciphertext = "";
  1255. $text = $self->_pad($text);
  1256. $plaintext_len = strlen($text);
  1257. $in = $self->encryptIV;
  1258. for ($i = 0; $i < $plaintext_len; $i+= '.$block_size.') {
  1259. $in = substr($text, $i, '.$block_size.') ^ $in;
  1260. '.$_encryptBlock.'
  1261. $ciphertext.= $in;
  1262. }
  1263. if ($self->continuousBuffer) {
  1264. $self->encryptIV = $in;
  1265. }
  1266. return $ciphertext;
  1267. ';
  1268. $decrypt = '
  1269. $plaintext = "";
  1270. $text = str_pad($text, strlen($text) + ('.$block_size.' - strlen($text) % '.$block_size.') % '.$block_size.', chr(0));
  1271. $ciphertext_len = strlen($text);
  1272. $iv = $self->decryptIV;
  1273. for ($i = 0; $i < $ciphertext_len; $i+= '.$block_size.') {
  1274. $in = $block = substr($text, $i, '.$block_size.');
  1275. '.$_decryptBlock.'
  1276. $plaintext.= $in ^ $iv;
  1277. $iv = $block;
  1278. }
  1279. if ($self->continuousBuffer) {
  1280. $self->decryptIV = $iv;
  1281. }
  1282. return $self->_unpad($plaintext);
  1283. ';
  1284. break;
  1285. case CRYPT_TWOFISH_MODE_CTR:
  1286. $encrypt = '
  1287. $ciphertext = "";
  1288. $plaintext_len = strlen($text);
  1289. $xor = $self->encryptIV;
  1290. $buffer = &$self->enbuffer;
  1291. if (strlen($buffer["encrypted"])) {
  1292. for ($i = 0; $i < $plaintext_len; $i+= '.$block_size.') {
  1293. $block = substr($text, $i, '.$block_size.');
  1294. if (strlen($block) > strlen($buffer["encrypted"])) {
  1295. $in = $self->_generate_xor($xor);
  1296. '.$_encryptBlock.'
  1297. $buffer["encrypted"].= $in;
  1298. }
  1299. $key = $self->_string_shift($buffer["encrypted"]);
  1300. $ciphertext.= $block ^ $key;
  1301. }
  1302. } else {
  1303. for ($i = 0; $i < $plaintext_len; $i+= '.$block_size.') {
  1304. $block = substr($text, $i, '.$block_size.');
  1305. $in = $self->_generate_xor($xor);
  1306. '.$_encryptBlock.'
  1307. $key = $in;
  1308. $ciphertext.= $block ^ $key;
  1309. }
  1310. }
  1311. if ($self->continuousBuffer) {
  1312. $self->encryptIV = $xor;
  1313. if ($start = $plaintext_len % '.$block_size.') {
  1314. $buffer["encrypted"] = substr($key, $start) . $buffer["encrypted"];
  1315. }
  1316. }
  1317. return $ciphertext;
  1318. ';
  1319. $decrypt = '
  1320. $plaintext = "";
  1321. $ciphertext_len = strlen($text);
  1322. $xor = $self->decryptIV;
  1323. $buffer = &$self->debuffer;
  1324. if (strlen($buffer["ciphertext"])) {
  1325. for ($i = 0; $i < $ciphertext_len; $i+= '.$block_size.') {
  1326. $block = substr($text, $i, '.$block_size.');
  1327. if (strlen($block) > strlen($buffer["ciphertext"])) {
  1328. $in = $self->_generate_xor($xor);
  1329. '.$_encryptBlock.'
  1330. $buffer["ciphertext"].= $in;
  1331. }
  1332. $key = $self->_string_shift($buffer["ciphertext"]);
  1333. $plaintext.= $block ^ $key;
  1334. }
  1335. } else {
  1336. for ($i = 0; $i < $ciphertext_len; $i+= '.$block_size.') {
  1337. $block = substr($text, $i, '.$block_size.');
  1338. $in = $self->_generate_xor($xor);
  1339. '.$_encryptBlock.'
  1340. $key = $in;
  1341. $plaintext.= $block ^ $key;
  1342. }
  1343. }
  1344. if ($self->continuousBuffer) {
  1345. $self->decryptIV = $xor;
  1346. if ($start = $ciphertext_len % '.$block_size.') {
  1347. $buffer["ciphertext"] = substr($key, $start) . $buffer["ciphertext"];
  1348. }
  1349. }
  1350. return $plaintext;
  1351. ';
  1352. break;
  1353. case CRYPT_TWOFISH_MODE_CFB:
  1354. $encrypt = '
  1355. $ciphertext = "";
  1356. $buffer = &$self->enbuffer;
  1357. if ($self->continuousBuffer) {
  1358. $iv = &$self->encryptIV;
  1359. $pos = &$buffer["pos"];
  1360. } else {
  1361. $iv = $self->encryptIV;
  1362. $pos = 0;
  1363. }
  1364. $len = strlen($text);
  1365. $i = 0;
  1366. if ($pos) {
  1367. $orig_pos = $pos;
  1368. $max = '.$block_size.' - $pos;
  1369. if ($len >= $max) {
  1370. $i = $max;
  1371. $len-= $max;
  1372. $pos = 0;
  1373. } else {
  1374. $i = $len;
  1375. $pos+= $len;
  1376. $len = 0;
  1377. }
  1378. $ciphertext = substr($iv, $orig_pos) ^ $text;
  1379. $iv = substr_replace($iv, $ciphertext, $orig_pos, $i);
  1380. }
  1381. while ($len >= '.$block_size.') {
  1382. $in = $iv;
  1383. '.$_encryptBlock.';
  1384. $iv = $in ^ substr($text, $i, '.$block_size.');
  1385. $ciphertext.= $iv;
  1386. $len-= '.$block_size.';
  1387. $i+= '.$block_size.';
  1388. }
  1389. if ($len) {
  1390. $in = $iv;
  1391. '.$_encryptBlock.'
  1392. $iv = $in;
  1393. $block = $iv ^ substr($text, $i);
  1394. $iv = substr_replace($iv, $block, 0, $len);
  1395. $ciphertext.= $block;
  1396. $pos = $len;
  1397. }
  1398. return $ciphertext;
  1399. ';
  1400. $decrypt = '
  1401. $plaintext = "";
  1402. $buffer = &$self->debuffer;
  1403. if ($self->continuousBuffer) {
  1404. $iv = &$self->decryptIV;
  1405. $pos = &$buffer["pos"];
  1406. } else {
  1407. $iv = $self->decryptIV;
  1408. $pos = 0;
  1409. }
  1410. $len = strlen($text);
  1411. $i = 0;
  1412. if ($pos) {
  1413. $orig_pos = $pos;
  1414. $max = '.$block_size.' - $pos;
  1415. if ($len >= $max) {
  1416. $i = $max;
  1417. $len-= $max;
  1418. $pos = 0;
  1419. } else {
  1420. $i = $len;
  1421. $pos+= $len;
  1422. $len = 0;
  1423. }
  1424. $plaintext = substr($iv, $orig_pos) ^ $text;
  1425. $iv = substr_replace($iv, substr($text, 0, $i), $orig_pos, $i);
  1426. }
  1427. while ($len >= '.$block_size.') {
  1428. $in = $iv;
  1429. '.$_encryptBlock.'
  1430. $iv = $in;
  1431. $cb = substr($text, $i, '.$block_size.');
  1432. $plaintext.= $iv ^ $cb;
  1433. $iv = $cb;
  1434. $len-= '.$block_size.';
  1435. $i+= '.$block_size.';
  1436. }
  1437. if ($len) {
  1438. $in = $iv;
  1439. '.$_encryptBlock.'
  1440. $iv = $in;
  1441. $plaintext.= $iv ^ substr($text, $i);
  1442. $iv = substr_replace($iv, substr($text, $i), 0, $len);
  1443. $pos = $len;
  1444. }
  1445. return $plaintext;
  1446. ';
  1447. break;
  1448. case CRYPT_TWOFISH_MODE_OFB:
  1449. $encrypt = '
  1450. $ciphertext = "";
  1451. $plaintext_len = strlen($text);
  1452. $xor = $self->encryptIV;
  1453. $buffer = &$self->enbuffer;
  1454. if (strlen($buffer["xor"])) {
  1455. for ($i = 0; $i < $plaintext_len; $i+= '.$block_size.') {
  1456. $block = substr($text, $i, '.$block_size.');
  1457. if (strlen($block) > strlen($buffer["xor"])) {
  1458. $in = $xor;
  1459. '.$_encryptBlock.'
  1460. $xor = $in;
  1461. $buffer["xor"].= $xor;
  1462. }
  1463. $key = $self->_string_shift($buffer["xor"]);
  1464. $ciphertext.= $block ^ $key;
  1465. }
  1466. } else {
  1467. for ($i = 0; $i < $plaintext_len; $i+= '.$block_size.') {
  1468. $in = $xor;
  1469. '.$_encryptBlock.'
  1470. $xor = $in;
  1471. $ciphertext.= substr($text, $i, '.$block_size.') ^ $xor;
  1472. }
  1473. $key = $xor;
  1474. }
  1475. if ($self->continuousBuffer) {
  1476. $self->encryptIV = $xor;
  1477. if ($start = $plaintext_len % '.$block_size.') {
  1478. $buffer["xor"] = substr($key, $start) . $buffer["xor"];
  1479. }
  1480. }
  1481. return $ciphertext;
  1482. ';
  1483. $decrypt = '
  1484. $plaintext = "";
  1485. $ciphertext_len = strlen($text);
  1486. $xor = $self->decryptIV;
  1487. $buffer = &$self->debuffer;
  1488. if (strlen($buffer["xor"])) {
  1489. for ($i = 0; $i < $ciphertext_len; $i+= '.$block_size.') {
  1490. $block = substr($text, $i, '.$block_size.');
  1491. if (strlen($block) > strlen($buffer["xor"])) {
  1492. $in = $xor;
  1493. '.$_encryptBlock.'
  1494. $xor = $in;
  1495. $buffer["xor"].= $xor;
  1496. }
  1497. $key = $self->_string_shift($buffer["xor"]);
  1498. $plaintext.= $block ^ $key;
  1499. }
  1500. } else {
  1501. for ($i = 0; $i < $ciphertext_len; $i+= '.$block_size.') {
  1502. $in = $xor;
  1503. '.$_encryptBlock.'
  1504. $xor = $in;
  1505. $plaintext.= substr($text, $i, '.$block_size.') ^ $xor;
  1506. }
  1507. $key = $xor;
  1508. }
  1509. if ($self->continuousBuffer) {
  1510. $self->decryptIV = $xor;
  1511. if ($start = $ciphertext_len % '.$block_size.') {
  1512. $buffer["xor"] = substr($key, $start) . $buffer["xor"];
  1513. }
  1514. }
  1515. return $plaintext;
  1516. ';
  1517. break;
  1518. }
  1519. $fnc_head = '$action, &$self, $text';
  1520. $fnc_body = $init_cryptBlock . 'if ($action == "encrypt") { ' . $encrypt . ' } else { ' . $decrypt . ' }';
  1521. if (function_exists('create_function') && is_callable('create_function')) {
  1522. $lambda_functions[$code_hash] = create_function($fnc_head, $fnc_body);
  1523. } else {
  1524. eval('function ' . ($lambda_functions[$code_hash] = 'f' . md5(microtime())) . '(' . $fnc_head . ') { ' . $fnc_body . ' }');
  1525. }
  1526. }
  1527. $this->inline_crypt = $lambda_functions[$code_hash];
  1528. }
  1529. /**
  1530. * Holds the lambda_functions table (classwide)
  1531. *
  1532. * @see inline_crypt_setup()
  1533. * @return Array
  1534. * @access private
  1535. */
  1536. function &get_lambda_functions()
  1537. {
  1538. static $functions = array();
  1539. return $functions;
  1540. }
  1541. }
  1542. // vim: ts=4:sw=4:et:
  1543. // vim6: fdl=1: