Kaynağa Gözat

Drop legacy algorithms part 1 (#1442)

This drops some of the algorithms long-considered legacy/insecure.

The idea is both to improve the theoretical security of the library by not offering
these algorithms, and to improve the practical security of the library by not having
hand-written, barely tested crypto code.

The overarching goal is for the library to have minimal exposure to crypto
implementation, relying firstly on the .NET base libraries, and secondly on
third-party providers, such as BouncyCastle.

This change covers deleting the cipher algorithms arcfour, blowfish, twofish, cast.
It covers deleting the MD5-based and truncated HMAC algorithms.

These were all disabled in OpenSSH server (sshd) in 2014[^1]:

> sshd(8): The default set of ciphers and MACs has been altered to
> remove unsafe algorithms. In particular, CBC ciphers and arcfour*
> are disabled by default.
>
> The full set of algorithms remains available if configured
> explicitly via the Ciphers and MACs sshd_config options.

and in the client in 2016[^2]:

> This release disables a number of legacy cryptographic algorithms
> by default in ssh:
>
>  * Several ciphers blowfish-cbc, cast128-cbc, all arcfour variants
>    and the rijndael-cbc aliases for AES.
>
>  * MD5-based and truncated HMAC algorithms.
>
> These algorithms are already disabled by default in sshd.

This change also drops PKCS5Padding, which is a line-for-line copy of PKCS7Padding,
and StreamCipher, which is now unused (and useless anyway).

[^1]: https://www.openssh.com/txt/release-6.7
[^2]: https://www.openssh.com/txt/release-7.2

Co-authored-by: Wojciech Nagórski <wojtpl2@gmail.com>
Rob Hague 1 yıl önce
ebeveyn
işleme
8ea108af1c
21 değiştirilmiş dosya ile 9 ekleme ve 3781 silme
  1. 0 17
      README.md
  2. 0 52
      src/Renci.SshNet/Abstractions/CryptoAbstraction.cs
  3. 7 27
      src/Renci.SshNet/ConnectionInfo.cs
  4. 0 140
      src/Renci.SshNet/Security/Cryptography/Ciphers/Arc4Cipher.cs
  5. 0 526
      src/Renci.SshNet/Security/Cryptography/Ciphers/BlowfishCipher.cs
  6. 0 725
      src/Renci.SshNet/Security/Cryptography/Ciphers/CastCipher.cs
  7. 0 49
      src/Renci.SshNet/Security/Cryptography/Ciphers/Paddings/PKCS5Padding.cs
  8. 0 1119
      src/Renci.SshNet/Security/Cryptography/Ciphers/SerpentCipher.cs
  9. 0 519
      src/Renci.SshNet/Security/Cryptography/Ciphers/TwofishCipher.cs
  10. 0 61
      src/Renci.SshNet/Security/Cryptography/HMACMD5.cs
  11. 0 60
      src/Renci.SshNet/Security/Cryptography/HMACSHA1.cs
  12. 0 61
      src/Renci.SshNet/Security/Cryptography/HMACSHA256.cs
  13. 0 61
      src/Renci.SshNet/Security/Cryptography/HMACSHA384.cs
  14. 0 61
      src/Renci.SshNet/Security/Cryptography/HMACSHA512.cs
  15. 0 20
      src/Renci.SshNet/Security/Cryptography/StreamCipher.cs
  16. 0 35
      test/Renci.SshNet.IntegrationTests/HmacTests.cs
  17. 2 2
      test/Renci.SshNet.Tests/Classes/Security/Cryptography/BlockCipherTest.cs
  18. 0 107
      test/Renci.SshNet.Tests/Classes/Security/Cryptography/Ciphers/Arc4CipherTest.cs
  19. 0 33
      test/Renci.SshNet.Tests/Classes/Security/Cryptography/Ciphers/BlowfishCipherTest.cs
  20. 0 43
      test/Renci.SshNet.Tests/Classes/Security/Cryptography/Ciphers/CastCipherTest.cs
  21. 0 63
      test/Renci.SshNet.Tests/Classes/Security/Cryptography/Ciphers/Paddings/PKCS5PaddingTest.cs

+ 0 - 17
README.md

@@ -76,15 +76,6 @@ The main types provided by this library are:
 * aes192-cbc
 * aes256-cbc
 * 3des-cbc
-* blowfish-cbc
-* twofish-cbc
-* twofish192-cbc
-* twofish128-cbc
-* twofish256-cbc
-* arcfour
-* arcfour128
-* arcfour256
-* cast128-cbc
 
 ## Key Exchange Methods
 
@@ -134,18 +125,10 @@ Private keys can be encrypted using one of the following cipher methods:
 **SSH.NET** supports the following MAC algorithms:
 * hmac-sha2-256
 * hmac-sha2-512
-* hmac-sha2-512-96
-* hmac-sha2-256-96
 * hmac-sha1
-* hmac-sha1-96
-* hmac-md5
-* hmac-md5-96
 * hmac-sha2-256-etm<span></span>@openssh.com
 * hmac-sha2-512-etm<span></span>@openssh.com
 * hmac-sha1-etm<span></span>@openssh.com
-* hmac-sha1-96-etm<span></span>@openssh.com
-* hmac-md5-etm<span></span>@openssh.com
-* hmac-md5-96-etm<span></span>@openssh.com
 
 ## Compression
 

+ 0 - 52
src/Renci.SshNet/Abstractions/CryptoAbstraction.cs

@@ -1,7 +1,5 @@
 using System;
 
-using Renci.SshNet.Security.Cryptography;
-
 namespace Renci.SshNet.Abstractions
 {
     internal static class CryptoAbstraction
@@ -62,55 +60,5 @@ namespace Renci.SshNet.Abstractions
         {
             return System.Security.Cryptography.SHA512.Create();
         }
-
-        public static System.Security.Cryptography.HMACMD5 CreateHMACMD5(byte[] key)
-        {
-            return new System.Security.Cryptography.HMACMD5(key);
-        }
-
-        public static HMACMD5 CreateHMACMD5(byte[] key, int hashSize)
-        {
-            return new HMACMD5(key, hashSize);
-        }
-
-        public static System.Security.Cryptography.HMACSHA1 CreateHMACSHA1(byte[] key)
-        {
-            return new System.Security.Cryptography.HMACSHA1(key);
-        }
-
-        public static HMACSHA1 CreateHMACSHA1(byte[] key, int hashSize)
-        {
-            return new HMACSHA1(key, hashSize);
-        }
-
-        public static System.Security.Cryptography.HMACSHA256 CreateHMACSHA256(byte[] key)
-        {
-            return new System.Security.Cryptography.HMACSHA256(key);
-        }
-
-        public static HMACSHA256 CreateHMACSHA256(byte[] key, int hashSize)
-        {
-            return new HMACSHA256(key, hashSize);
-        }
-
-        public static System.Security.Cryptography.HMACSHA384 CreateHMACSHA384(byte[] key)
-        {
-            return new System.Security.Cryptography.HMACSHA384(key);
-        }
-
-        public static HMACSHA384 CreateHMACSHA384(byte[] key, int hashSize)
-        {
-            return new HMACSHA384(key, hashSize);
-        }
-
-        public static System.Security.Cryptography.HMACSHA512 CreateHMACSHA512(byte[] key)
-        {
-            return new System.Security.Cryptography.HMACSHA512(key);
-        }
-
-        public static HMACSHA512 CreateHMACSHA512(byte[] key, int hashSize)
-        {
-            return new HMACSHA512(key, hashSize);
-        }
     }
 }

+ 7 - 27
src/Renci.SshNet/ConnectionInfo.cs

@@ -5,7 +5,6 @@ using System.Net;
 using System.Security.Cryptography;
 using System.Text;
 
-using Renci.SshNet.Abstractions;
 using Renci.SshNet.Common;
 using Renci.SshNet.Compression;
 using Renci.SshNet.Messages.Authentication;
@@ -397,37 +396,18 @@ namespace Renci.SshNet
             Encryptions.Add("aes192-cbc", new CipherInfo(192, (key, iv) => new AesCipher(key, iv, AesCipherMode.CBC, pkcs7Padding: false)));
             Encryptions.Add("aes256-cbc", new CipherInfo(256, (key, iv) => new AesCipher(key, iv, AesCipherMode.CBC, pkcs7Padding: false)));
             Encryptions.Add("3des-cbc", new CipherInfo(192, (key, iv) => new TripleDesCipher(key, new CbcCipherMode(iv), padding: null)));
-            Encryptions.Add("blowfish-cbc", new CipherInfo(128, (key, iv) => new BlowfishCipher(key, new CbcCipherMode(iv), padding: null)));
-            Encryptions.Add("twofish-cbc", new CipherInfo(256, (key, iv) => new TwofishCipher(key, new CbcCipherMode(iv), padding: null)));
-            Encryptions.Add("twofish192-cbc", new CipherInfo(192, (key, iv) => new TwofishCipher(key, new CbcCipherMode(iv), padding: null)));
-            Encryptions.Add("twofish128-cbc", new CipherInfo(128, (key, iv) => new TwofishCipher(key, new CbcCipherMode(iv), padding: null)));
-            Encryptions.Add("twofish256-cbc", new CipherInfo(256, (key, iv) => new TwofishCipher(key, new CbcCipherMode(iv), padding: null)));
-            Encryptions.Add("arcfour", new CipherInfo(128, (key, iv) => new Arc4Cipher(key, dischargeFirstBytes: false)));
-            Encryptions.Add("arcfour128", new CipherInfo(128, (key, iv) => new Arc4Cipher(key, dischargeFirstBytes: true)));
-            Encryptions.Add("arcfour256", new CipherInfo(256, (key, iv) => new Arc4Cipher(key, dischargeFirstBytes: true)));
-            Encryptions.Add("cast128-cbc", new CipherInfo(128, (key, iv) => new CastCipher(key, new CbcCipherMode(iv), padding: null)));
-
-#pragma warning disable IDE0200 // Remove unnecessary lambda expression; We want to prevent instantiating the HashAlgorithm objects.
+
             HmacAlgorithms = new Dictionary<string, HashInfo>
                 {
                     /* Encrypt-and-MAC (encrypt-and-authenticate) variants */
-                    { "hmac-sha2-256", new HashInfo(32*8, key => CryptoAbstraction.CreateHMACSHA256(key), isEncryptThenMAC: false) },
-                    { "hmac-sha2-512", new HashInfo(64*8, key => CryptoAbstraction.CreateHMACSHA512(key), isEncryptThenMAC: false) },
-                    { "hmac-sha2-512-96", new HashInfo(64*8,  key => CryptoAbstraction.CreateHMACSHA512(key, 96), isEncryptThenMAC: false) },
-                    { "hmac-sha2-256-96", new HashInfo(32*8, key => CryptoAbstraction.CreateHMACSHA256(key, 96), isEncryptThenMAC: false) },
-                    { "hmac-sha1", new HashInfo(20*8, key => CryptoAbstraction.CreateHMACSHA1(key), isEncryptThenMAC: false) },
-                    { "hmac-sha1-96", new HashInfo(20*8, key => CryptoAbstraction.CreateHMACSHA1(key, 96), isEncryptThenMAC: false) },
-                    { "hmac-md5", new HashInfo(16*8, key => CryptoAbstraction.CreateHMACMD5(key), isEncryptThenMAC: false) },
-                    { "hmac-md5-96", new HashInfo(16*8, key => CryptoAbstraction.CreateHMACMD5(key, 96), isEncryptThenMAC: false) },
+                    { "hmac-sha2-256", new HashInfo(32*8, key => new HMACSHA256(key)) },
+                    { "hmac-sha2-512", new HashInfo(64*8, key => new HMACSHA512(key)) },
+                    { "hmac-sha1", new HashInfo(20*8, key => new HMACSHA1(key)) },
                     /* Encrypt-then-MAC variants */
-                    { "hmac-sha2-256-etm@openssh.com", new HashInfo(32*8, key => CryptoAbstraction.CreateHMACSHA256(key), isEncryptThenMAC: true) },
-                    { "hmac-sha2-512-etm@openssh.com", new HashInfo(64*8, key => CryptoAbstraction.CreateHMACSHA512(key), isEncryptThenMAC: true) },
-                    { "hmac-sha1-etm@openssh.com", new HashInfo(20*8, key => CryptoAbstraction.CreateHMACSHA1(key), isEncryptThenMAC: true) },
-                    { "hmac-sha1-96-etm@openssh.com", new HashInfo(20*8, key => CryptoAbstraction.CreateHMACSHA1(key, 96), isEncryptThenMAC: true) },
-                    { "hmac-md5-etm@openssh.com", new HashInfo(16*8, key => CryptoAbstraction.CreateHMACMD5(key), isEncryptThenMAC: true) },
-                    { "hmac-md5-96-etm@openssh.com", new HashInfo(16*8, key => CryptoAbstraction.CreateHMACMD5(key, 96), isEncryptThenMAC: true) },
+                    { "hmac-sha2-256-etm@openssh.com", new HashInfo(32*8, key => new HMACSHA256(key), isEncryptThenMAC: true) },
+                    { "hmac-sha2-512-etm@openssh.com", new HashInfo(64*8, key => new HMACSHA512(key), isEncryptThenMAC: true) },
+                    { "hmac-sha1-etm@openssh.com", new HashInfo(20*8, key => new HMACSHA1(key), isEncryptThenMAC: true) },
                 };
-#pragma warning restore IDE0200 // Remove unnecessary lambda expression
 
             HostKeyAlgorithms = new Dictionary<string, Func<byte[], KeyHostAlgorithm>>
                 {

+ 0 - 140
src/Renci.SshNet/Security/Cryptography/Ciphers/Arc4Cipher.cs

@@ -1,140 +0,0 @@
-using System;
-
-namespace Renci.SshNet.Security.Cryptography.Ciphers
-{
-    /// <summary>
-    /// Implements ARCH4 cipher algorithm.
-    /// </summary>
-    public sealed class Arc4Cipher : StreamCipher
-    {
-#pragma warning disable SA1310 // Field names should not contain underscore
-        private const int STATE_LENGTH = 256;
-#pragma warning restore SA1310 // Field names should not contain underscore
-
-        /// <summary>
-        /// Holds the state of the RC4 engine.
-        /// </summary>
-        private byte[] _engineState;
-
-        private int _x;
-
-        private int _y;
-
-        /// <summary>
-        /// Gets the minimum data size.
-        /// </summary>
-        /// <value>
-        /// The minimum data size.
-        /// </value>
-        public override byte MinimumSize
-        {
-            get { return 0; }
-        }
-
-        /// <summary>
-        /// Initializes a new instance of the <see cref="Arc4Cipher" /> class.
-        /// </summary>
-        /// <param name="key">The key.</param>
-        /// <param name="dischargeFirstBytes">if set to <see langword="true"/> will disharged first 1536 bytes.</param>
-        /// <exception cref="ArgumentNullException"><paramref name="key" /> is <see langword="null"/>.</exception>
-        public Arc4Cipher(byte[] key, bool dischargeFirstBytes)
-            : base(key)
-        {
-            SetKey(key);
-
-            // The first 1536 bytes of keystream generated by the cipher MUST be discarded, and the first byte of the
-            // first encrypted packet MUST be encrypted using the 1537th byte of keystream.
-            if (dischargeFirstBytes)
-            {
-                _ = Encrypt(new byte[1536]);
-            }
-        }
-
-        /// <summary>
-        /// Encrypts the specified input.
-        /// </summary>
-        /// <param name="input">The input.</param>
-        /// <param name="offset">The zero-based offset in <paramref name="input"/> at which to begin encrypting.</param>
-        /// <param name="length">The number of bytes to encrypt from <paramref name="input"/>.</param>
-        /// <returns>
-        /// Encrypted data.
-        /// </returns>
-        public override byte[] Encrypt(byte[] input, int offset, int length)
-        {
-            var output = new byte[length];
-            _ = ProcessBytes(input, offset, length, output, 0);
-            return output;
-        }
-
-        /// <summary>
-        /// Decrypts the specified input.
-        /// </summary>
-        /// <param name="input">The input.</param>
-        /// <param name="offset">The zero-based offset in <paramref name="input"/> at which to begin decrypting.</param>
-        /// <param name="length">The number of bytes to decrypt from <paramref name="input"/>.</param>
-        /// <returns>
-        /// The decrypted data.
-        /// </returns>
-        public override byte[] Decrypt(byte[] input, int offset, int length)
-        {
-            return Encrypt(input, offset, length);
-        }
-
-        private int ProcessBytes(byte[] inputBuffer, int inputOffset, int inputCount, byte[] outputBuffer, int outputOffset)
-        {
-            if ((inputOffset + inputCount) > inputBuffer.Length)
-            {
-                throw new ArgumentException("input buffer too short");
-            }
-
-            if ((outputOffset + inputCount) > outputBuffer.Length)
-            {
-                throw new ArgumentException("output buffer too short");
-            }
-
-            for (var i = 0; i < inputCount; i++)
-            {
-                _x = (_x + 1) & 0xff;
-                _y = (_engineState[_x] + _y) & 0xff;
-
-                // swap
-                var tmp = _engineState[_x];
-                _engineState[_x] = _engineState[_y];
-                _engineState[_y] = tmp;
-
-                // xor
-                outputBuffer[i + outputOffset] = (byte)(inputBuffer[i + inputOffset] ^ _engineState[(_engineState[_x] + _engineState[_y]) & 0xff]);
-            }
-
-            return inputCount;
-        }
-
-        private void SetKey(byte[] keyBytes)
-        {
-            _x = 0;
-            _y = 0;
-
-            _engineState ??= new byte[STATE_LENGTH];
-
-            // reset the state of the engine
-            for (var i = 0; i < STATE_LENGTH; i++)
-            {
-                _engineState[i] = (byte)i;
-            }
-
-            var i1 = 0;
-            var i2 = 0;
-
-            for (var i = 0; i < STATE_LENGTH; i++)
-            {
-                i2 = ((keyBytes[i1] & 0xff) + _engineState[i] + i2) & 0xff;
-
-                // do the byte-swap inline
-                var tmp = _engineState[i];
-                _engineState[i] = _engineState[i2];
-                _engineState[i2] = tmp;
-                i1 = (i1 + 1) % keyBytes.Length;
-            }
-        }
-    }
-}

+ 0 - 526
src/Renci.SshNet/Security/Cryptography/Ciphers/BlowfishCipher.cs

@@ -1,526 +0,0 @@
-using System;
-using System.Buffers.Binary;
-
-namespace Renci.SshNet.Security.Cryptography.Ciphers
-{
-    /// <summary>
-    /// Blowfish cipher implementation.
-    /// </summary>
-    public sealed class BlowfishCipher : BlockCipher
-    {
-        private const int Rounds = 16;
-
-        private const int SboxSk = 256;
-
-        private const int PSize = Rounds + 2;
-
-        #region Static reference tables
-
-        private static readonly uint[] KP =
-        {
-            0x243F6A88, 0x85A308D3, 0x13198A2E, 0x03707344,
-            0xA4093822, 0x299F31D0, 0x082EFA98, 0xEC4E6C89,
-            0x452821E6, 0x38D01377, 0xBE5466CF, 0x34E90C6C,
-            0xC0AC29B7, 0xC97C50DD, 0x3F84D5B5, 0xB5470917,
-            0x9216D5D9, 0x8979FB1B
-        };
-
-        private static readonly uint[] KS0 =
-        {
-            0xD1310BA6, 0x98DFB5AC, 0x2FFD72DB, 0xD01ADFB7,
-            0xB8E1AFED, 0x6A267E96, 0xBA7C9045, 0xF12C7F99,
-            0x24A19947, 0xB3916CF7, 0x0801F2E2, 0x858EFC16,
-            0x636920D8, 0x71574E69, 0xA458FEA3, 0xF4933D7E,
-            0x0D95748F, 0x728EB658, 0x718BCD58, 0x82154AEE,
-            0x7B54A41D, 0xC25A59B5, 0x9C30D539, 0x2AF26013,
-            0xC5D1B023, 0x286085F0, 0xCA417918, 0xB8DB38EF,
-            0x8E79DCB0, 0x603A180E, 0x6C9E0E8B, 0xB01E8A3E,
-            0xD71577C1, 0xBD314B27, 0x78AF2FDA, 0x55605C60,
-            0xE65525F3, 0xAA55AB94, 0x57489862, 0x63E81440,
-            0x55CA396A, 0x2AAB10B6, 0xB4CC5C34, 0x1141E8CE,
-            0xA15486AF, 0x7C72E993, 0xB3EE1411, 0x636FBC2A,
-            0x2BA9C55D, 0x741831F6, 0xCE5C3E16, 0x9B87931E,
-            0xAFD6BA33, 0x6C24CF5C, 0x7A325381, 0x28958677,
-            0x3B8F4898, 0x6B4BB9AF, 0xC4BFE81B, 0x66282193,
-            0x61D809CC, 0xFB21A991, 0x487CAC60, 0x5DEC8032,
-            0xEF845D5D, 0xE98575B1, 0xDC262302, 0xEB651B88,
-            0x23893E81, 0xD396ACC5, 0x0F6D6FF3, 0x83F44239,
-            0x2E0B4482, 0xA4842004, 0x69C8F04A, 0x9E1F9B5E,
-            0x21C66842, 0xF6E96C9A, 0x670C9C61, 0xABD388F0,
-            0x6A51A0D2, 0xD8542F68, 0x960FA728, 0xAB5133A3,
-            0x6EEF0B6C, 0x137A3BE4, 0xBA3BF050, 0x7EFB2A98,
-            0xA1F1651D, 0x39AF0176, 0x66CA593E, 0x82430E88,
-            0x8CEE8619, 0x456F9FB4, 0x7D84A5C3, 0x3B8B5EBE,
-            0xE06F75D8, 0x85C12073, 0x401A449F, 0x56C16AA6,
-            0x4ED3AA62, 0x363F7706, 0x1BFEDF72, 0x429B023D,
-            0x37D0D724, 0xD00A1248, 0xDB0FEAD3, 0x49F1C09B,
-            0x075372C9, 0x80991B7B, 0x25D479D8, 0xF6E8DEF7,
-            0xE3FE501A, 0xB6794C3B, 0x976CE0BD, 0x04C006BA,
-            0xC1A94FB6, 0x409F60C4, 0x5E5C9EC2, 0x196A2463,
-            0x68FB6FAF, 0x3E6C53B5, 0x1339B2EB, 0x3B52EC6F,
-            0x6DFC511F, 0x9B30952C, 0xCC814544, 0xAF5EBD09,
-            0xBEE3D004, 0xDE334AFD, 0x660F2807, 0x192E4BB3,
-            0xC0CBA857, 0x45C8740F, 0xD20B5F39, 0xB9D3FBDB,
-            0x5579C0BD, 0x1A60320A, 0xD6A100C6, 0x402C7279,
-            0x679F25FE, 0xFB1FA3CC, 0x8EA5E9F8, 0xDB3222F8,
-            0x3C7516DF, 0xFD616B15, 0x2F501EC8, 0xAD0552AB,
-            0x323DB5FA, 0xFD238760, 0x53317B48, 0x3E00DF82,
-            0x9E5C57BB, 0xCA6F8CA0, 0x1A87562E, 0xDF1769DB,
-            0xD542A8F6, 0x287EFFC3, 0xAC6732C6, 0x8C4F5573,
-            0x695B27B0, 0xBBCA58C8, 0xE1FFA35D, 0xB8F011A0,
-            0x10FA3D98, 0xFD2183B8, 0x4AFCB56C, 0x2DD1D35B,
-            0x9A53E479, 0xB6F84565, 0xD28E49BC, 0x4BFB9790,
-            0xE1DDF2DA, 0xA4CB7E33, 0x62FB1341, 0xCEE4C6E8,
-            0xEF20CADA, 0x36774C01, 0xD07E9EFE, 0x2BF11FB4,
-            0x95DBDA4D, 0xAE909198, 0xEAAD8E71, 0x6B93D5A0,
-            0xD08ED1D0, 0xAFC725E0, 0x8E3C5B2F, 0x8E7594B7,
-            0x8FF6E2FB, 0xF2122B64, 0x8888B812, 0x900DF01C,
-            0x4FAD5EA0, 0x688FC31C, 0xD1CFF191, 0xB3A8C1AD,
-            0x2F2F2218, 0xBE0E1777, 0xEA752DFE, 0x8B021FA1,
-            0xE5A0CC0F, 0xB56F74E8, 0x18ACF3D6, 0xCE89E299,
-            0xB4A84FE0, 0xFD13E0B7, 0x7CC43B81, 0xD2ADA8D9,
-            0x165FA266, 0x80957705, 0x93CC7314, 0x211A1477,
-            0xE6AD2065, 0x77B5FA86, 0xC75442F5, 0xFB9D35CF,
-            0xEBCDAF0C, 0x7B3E89A0, 0xD6411BD3, 0xAE1E7E49,
-            0x00250E2D, 0x2071B35E, 0x226800BB, 0x57B8E0AF,
-            0x2464369B, 0xF009B91E, 0x5563911D, 0x59DFA6AA,
-            0x78C14389, 0xD95A537F, 0x207D5BA2, 0x02E5B9C5,
-            0x83260376, 0x6295CFA9, 0x11C81968, 0x4E734A41,
-            0xB3472DCA, 0x7B14A94A, 0x1B510052, 0x9A532915,
-            0xD60F573F, 0xBC9BC6E4, 0x2B60A476, 0x81E67400,
-            0x08BA6FB5, 0x571BE91F, 0xF296EC6B, 0x2A0DD915,
-            0xB6636521, 0xE7B9F9B6, 0xFF34052E, 0xC5855664,
-            0x53B02D5D, 0xA99F8FA1, 0x08BA4799, 0x6E85076A
-        };
-
-        private static readonly uint[] KS1 =
-        {
-            0x4B7A70E9, 0xB5B32944, 0xDB75092E, 0xC4192623,
-            0xAD6EA6B0, 0x49A7DF7D, 0x9CEE60B8, 0x8FEDB266,
-            0xECAA8C71, 0x699A17FF, 0x5664526C, 0xC2B19EE1,
-            0x193602A5, 0x75094C29, 0xA0591340, 0xE4183A3E,
-            0x3F54989A, 0x5B429D65, 0x6B8FE4D6, 0x99F73FD6,
-            0xA1D29C07, 0xEFE830F5, 0x4D2D38E6, 0xF0255DC1,
-            0x4CDD2086, 0x8470EB26, 0x6382E9C6, 0x021ECC5E,
-            0x09686B3F, 0x3EBAEFC9, 0x3C971814, 0x6B6A70A1,
-            0x687F3584, 0x52A0E286, 0xB79C5305, 0xAA500737,
-            0x3E07841C, 0x7FDEAE5C, 0x8E7D44EC, 0x5716F2B8,
-            0xB03ADA37, 0xF0500C0D, 0xF01C1F04, 0x0200B3FF,
-            0xAE0CF51A, 0x3CB574B2, 0x25837A58, 0xDC0921BD,
-            0xD19113F9, 0x7CA92FF6, 0x94324773, 0x22F54701,
-            0x3AE5E581, 0x37C2DADC, 0xC8B57634, 0x9AF3DDA7,
-            0xA9446146, 0x0FD0030E, 0xECC8C73E, 0xA4751E41,
-            0xE238CD99, 0x3BEA0E2F, 0x3280BBA1, 0x183EB331,
-            0x4E548B38, 0x4F6DB908, 0x6F420D03, 0xF60A04BF,
-            0x2CB81290, 0x24977C79, 0x5679B072, 0xBCAF89AF,
-            0xDE9A771F, 0xD9930810, 0xB38BAE12, 0xDCCF3F2E,
-            0x5512721F, 0x2E6B7124, 0x501ADDE6, 0x9F84CD87,
-            0x7A584718, 0x7408DA17, 0xBC9F9ABC, 0xE94B7D8C,
-            0xEC7AEC3A, 0xDB851DFA, 0x63094366, 0xC464C3D2,
-            0xEF1C1847, 0x3215D908, 0xDD433B37, 0x24C2BA16,
-            0x12A14D43, 0x2A65C451, 0x50940002, 0x133AE4DD,
-            0x71DFF89E, 0x10314E55, 0x81AC77D6, 0x5F11199B,
-            0x043556F1, 0xD7A3C76B, 0x3C11183B, 0x5924A509,
-            0xF28FE6ED, 0x97F1FBFA, 0x9EBABF2C, 0x1E153C6E,
-            0x86E34570, 0xEAE96FB1, 0x860E5E0A, 0x5A3E2AB3,
-            0x771FE71C, 0x4E3D06FA, 0x2965DCB9, 0x99E71D0F,
-            0x803E89D6, 0x5266C825, 0x2E4CC978, 0x9C10B36A,
-            0xC6150EBA, 0x94E2EA78, 0xA5FC3C53, 0x1E0A2DF4,
-            0xF2F74EA7, 0x361D2B3D, 0x1939260F, 0x19C27960,
-            0x5223A708, 0xF71312B6, 0xEBADFE6E, 0xEAC31F66,
-            0xE3BC4595, 0xA67BC883, 0xB17F37D1, 0x018CFF28,
-            0xC332DDEF, 0xBE6C5AA5, 0x65582185, 0x68AB9802,
-            0xEECEA50F, 0xDB2F953B, 0x2AEF7DAD, 0x5B6E2F84,
-            0x1521B628, 0x29076170, 0xECDD4775, 0x619F1510,
-            0x13CCA830, 0xEB61BD96, 0x0334FE1E, 0xAA0363CF,
-            0xB5735C90, 0x4C70A239, 0xD59E9E0B, 0xCBAADE14,
-            0xEECC86BC, 0x60622CA7, 0x9CAB5CAB, 0xB2F3846E,
-            0x648B1EAF, 0x19BDF0CA, 0xA02369B9, 0x655ABB50,
-            0x40685A32, 0x3C2AB4B3, 0x319EE9D5, 0xC021B8F7,
-            0x9B540B19, 0x875FA099, 0x95F7997E, 0x623D7DA8,
-            0xF837889A, 0x97E32D77, 0x11ED935F, 0x16681281,
-            0x0E358829, 0xC7E61FD6, 0x96DEDFA1, 0x7858BA99,
-            0x57F584A5, 0x1B227263, 0x9B83C3FF, 0x1AC24696,
-            0xCDB30AEB, 0x532E3054, 0x8FD948E4, 0x6DBC3128,
-            0x58EBF2EF, 0x34C6FFEA, 0xFE28ED61, 0xEE7C3C73,
-            0x5D4A14D9, 0xE864B7E3, 0x42105D14, 0x203E13E0,
-            0x45EEE2B6, 0xA3AAABEA, 0xDB6C4F15, 0xFACB4FD0,
-            0xC742F442, 0xEF6ABBB5, 0x654F3B1D, 0x41CD2105,
-            0xD81E799E, 0x86854DC7, 0xE44B476A, 0x3D816250,
-            0xCF62A1F2, 0x5B8D2646, 0xFC8883A0, 0xC1C7B6A3,
-            0x7F1524C3, 0x69CB7492, 0x47848A0B, 0x5692B285,
-            0x095BBF00, 0xAD19489D, 0x1462B174, 0x23820E00,
-            0x58428D2A, 0x0C55F5EA, 0x1DADF43E, 0x233F7061,
-            0x3372F092, 0x8D937E41, 0xD65FECF1, 0x6C223BDB,
-            0x7CDE3759, 0xCBEE7460, 0x4085F2A7, 0xCE77326E,
-            0xA6078084, 0x19F8509E, 0xE8EFD855, 0x61D99735,
-            0xA969A7AA, 0xC50C06C2, 0x5A04ABFC, 0x800BCADC,
-            0x9E447A2E, 0xC3453484, 0xFDD56705, 0x0E1E9EC9,
-            0xDB73DBD3, 0x105588CD, 0x675FDA79, 0xE3674340,
-            0xC5C43465, 0x713E38D8, 0x3D28F89E, 0xF16DFF20,
-            0x153E21E7, 0x8FB03D4A, 0xE6E39F2B, 0xDB83ADF7
-        };
-
-        private static readonly uint[] KS2 =
-        {
-            0xE93D5A68, 0x948140F7, 0xF64C261C, 0x94692934,
-            0x411520F7, 0x7602D4F7, 0xBCF46B2E, 0xD4A20068,
-            0xD4082471, 0x3320F46A, 0x43B7D4B7, 0x500061AF,
-            0x1E39F62E, 0x97244546, 0x14214F74, 0xBF8B8840,
-            0x4D95FC1D, 0x96B591AF, 0x70F4DDD3, 0x66A02F45,
-            0xBFBC09EC, 0x03BD9785, 0x7FAC6DD0, 0x31CB8504,
-            0x96EB27B3, 0x55FD3941, 0xDA2547E6, 0xABCA0A9A,
-            0x28507825, 0x530429F4, 0x0A2C86DA, 0xE9B66DFB,
-            0x68DC1462, 0xD7486900, 0x680EC0A4, 0x27A18DEE,
-            0x4F3FFEA2, 0xE887AD8C, 0xB58CE006, 0x7AF4D6B6,
-            0xAACE1E7C, 0xD3375FEC, 0xCE78A399, 0x406B2A42,
-            0x20FE9E35, 0xD9F385B9, 0xEE39D7AB, 0x3B124E8B,
-            0x1DC9FAF7, 0x4B6D1856, 0x26A36631, 0xEAE397B2,
-            0x3A6EFA74, 0xDD5B4332, 0x6841E7F7, 0xCA7820FB,
-            0xFB0AF54E, 0xD8FEB397, 0x454056AC, 0xBA489527,
-            0x55533A3A, 0x20838D87, 0xFE6BA9B7, 0xD096954B,
-            0x55A867BC, 0xA1159A58, 0xCCA92963, 0x99E1DB33,
-            0xA62A4A56, 0x3F3125F9, 0x5EF47E1C, 0x9029317C,
-            0xFDF8E802, 0x04272F70, 0x80BB155C, 0x05282CE3,
-            0x95C11548, 0xE4C66D22, 0x48C1133F, 0xC70F86DC,
-            0x07F9C9EE, 0x41041F0F, 0x404779A4, 0x5D886E17,
-            0x325F51EB, 0xD59BC0D1, 0xF2BCC18F, 0x41113564,
-            0x257B7834, 0x602A9C60, 0xDFF8E8A3, 0x1F636C1B,
-            0x0E12B4C2, 0x02E1329E, 0xAF664FD1, 0xCAD18115,
-            0x6B2395E0, 0x333E92E1, 0x3B240B62, 0xEEBEB922,
-            0x85B2A20E, 0xE6BA0D99, 0xDE720C8C, 0x2DA2F728,
-            0xD0127845, 0x95B794FD, 0x647D0862, 0xE7CCF5F0,
-            0x5449A36F, 0x877D48FA, 0xC39DFD27, 0xF33E8D1E,
-            0x0A476341, 0x992EFF74, 0x3A6F6EAB, 0xF4F8FD37,
-            0xA812DC60, 0xA1EBDDF8, 0x991BE14C, 0xDB6E6B0D,
-            0xC67B5510, 0x6D672C37, 0x2765D43B, 0xDCD0E804,
-            0xF1290DC7, 0xCC00FFA3, 0xB5390F92, 0x690FED0B,
-            0x667B9FFB, 0xCEDB7D9C, 0xA091CF0B, 0xD9155EA3,
-            0xBB132F88, 0x515BAD24, 0x7B9479BF, 0x763BD6EB,
-            0x37392EB3, 0xCC115979, 0x8026E297, 0xF42E312D,
-            0x6842ADA7, 0xC66A2B3B, 0x12754CCC, 0x782EF11C,
-            0x6A124237, 0xB79251E7, 0x06A1BBE6, 0x4BFB6350,
-            0x1A6B1018, 0x11CAEDFA, 0x3D25BDD8, 0xE2E1C3C9,
-            0x44421659, 0x0A121386, 0xD90CEC6E, 0xD5ABEA2A,
-            0x64AF674E, 0xDA86A85F, 0xBEBFE988, 0x64E4C3FE,
-            0x9DBC8057, 0xF0F7C086, 0x60787BF8, 0x6003604D,
-            0xD1FD8346, 0xF6381FB0, 0x7745AE04, 0xD736FCCC,
-            0x83426B33, 0xF01EAB71, 0xB0804187, 0x3C005E5F,
-            0x77A057BE, 0xBDE8AE24, 0x55464299, 0xBF582E61,
-            0x4E58F48F, 0xF2DDFDA2, 0xF474EF38, 0x8789BDC2,
-            0x5366F9C3, 0xC8B38E74, 0xB475F255, 0x46FCD9B9,
-            0x7AEB2661, 0x8B1DDF84, 0x846A0E79, 0x915F95E2,
-            0x466E598E, 0x20B45770, 0x8CD55591, 0xC902DE4C,
-            0xB90BACE1, 0xBB8205D0, 0x11A86248, 0x7574A99E,
-            0xB77F19B6, 0xE0A9DC09, 0x662D09A1, 0xC4324633,
-            0xE85A1F02, 0x09F0BE8C, 0x4A99A025, 0x1D6EFE10,
-            0x1AB93D1D, 0x0BA5A4DF, 0xA186F20F, 0x2868F169,
-            0xDCB7DA83, 0x573906FE, 0xA1E2CE9B, 0x4FCD7F52,
-            0x50115E01, 0xA70683FA, 0xA002B5C4, 0x0DE6D027,
-            0x9AF88C27, 0x773F8641, 0xC3604C06, 0x61A806B5,
-            0xF0177A28, 0xC0F586E0, 0x006058AA, 0x30DC7D62,
-            0x11E69ED7, 0x2338EA63, 0x53C2DD94, 0xC2C21634,
-            0xBBCBEE56, 0x90BCB6DE, 0xEBFC7DA1, 0xCE591D76,
-            0x6F05E409, 0x4B7C0188, 0x39720A3D, 0x7C927C24,
-            0x86E3725F, 0x724D9DB9, 0x1AC15BB4, 0xD39EB8FC,
-            0xED545578, 0x08FCA5B5, 0xD83D7CD3, 0x4DAD0FC4,
-            0x1E50EF5E, 0xB161E6F8, 0xA28514D9, 0x6C51133C,
-            0x6FD5C7E7, 0x56E14EC4, 0x362ABFCE, 0xDDC6C837,
-            0xD79A3234, 0x92638212, 0x670EFA8E, 0x406000E0
-        };
-
-        private static readonly uint[] KS3 =
-        {
-            0x3A39CE37, 0xD3FAF5CF, 0xABC27737, 0x5AC52D1B,
-            0x5CB0679E, 0x4FA33742, 0xD3822740, 0x99BC9BBE,
-            0xD5118E9D, 0xBF0F7315, 0xD62D1C7E, 0xC700C47B,
-            0xB78C1B6B, 0x21A19045, 0xB26EB1BE, 0x6A366EB4,
-            0x5748AB2F, 0xBC946E79, 0xC6A376D2, 0x6549C2C8,
-            0x530FF8EE, 0x468DDE7D, 0xD5730A1D, 0x4CD04DC6,
-            0x2939BBDB, 0xA9BA4650, 0xAC9526E8, 0xBE5EE304,
-            0xA1FAD5F0, 0x6A2D519A, 0x63EF8CE2, 0x9A86EE22,
-            0xC089C2B8, 0x43242EF6, 0xA51E03AA, 0x9CF2D0A4,
-            0x83C061BA, 0x9BE96A4D, 0x8FE51550, 0xBA645BD6,
-            0x2826A2F9, 0xA73A3AE1, 0x4BA99586, 0xEF5562E9,
-            0xC72FEFD3, 0xF752F7DA, 0x3F046F69, 0x77FA0A59,
-            0x80E4A915, 0x87B08601, 0x9B09E6AD, 0x3B3EE593,
-            0xE990FD5A, 0x9E34D797, 0x2CF0B7D9, 0x022B8B51,
-            0x96D5AC3A, 0x017DA67D, 0xD1CF3ED6, 0x7C7D2D28,
-            0x1F9F25CF, 0xADF2B89B, 0x5AD6B472, 0x5A88F54C,
-            0xE029AC71, 0xE019A5E6, 0x47B0ACFD, 0xED93FA9B,
-            0xE8D3C48D, 0x283B57CC, 0xF8D56629, 0x79132E28,
-            0x785F0191, 0xED756055, 0xF7960E44, 0xE3D35E8C,
-            0x15056DD4, 0x88F46DBA, 0x03A16125, 0x0564F0BD,
-            0xC3EB9E15, 0x3C9057A2, 0x97271AEC, 0xA93A072A,
-            0x1B3F6D9B, 0x1E6321F5, 0xF59C66FB, 0x26DCF319,
-            0x7533D928, 0xB155FDF5, 0x03563482, 0x8ABA3CBB,
-            0x28517711, 0xC20AD9F8, 0xABCC5167, 0xCCAD925F,
-            0x4DE81751, 0x3830DC8E, 0x379D5862, 0x9320F991,
-            0xEA7A90C2, 0xFB3E7BCE, 0x5121CE64, 0x774FBE32,
-            0xA8B6E37E, 0xC3293D46, 0x48DE5369, 0x6413E680,
-            0xA2AE0810, 0xDD6DB224, 0x69852DFD, 0x09072166,
-            0xB39A460A, 0x6445C0DD, 0x586CDECF, 0x1C20C8AE,
-            0x5BBEF7DD, 0x1B588D40, 0xCCD2017F, 0x6BB4E3BB,
-            0xDDA26A7E, 0x3A59FF45, 0x3E350A44, 0xBCB4CDD5,
-            0x72EACEA8, 0xFA6484BB, 0x8D6612AE, 0xBF3C6F47,
-            0xD29BE463, 0x542F5D9E, 0xAEC2771B, 0xF64E6370,
-            0x740E0D8D, 0xE75B1357, 0xF8721671, 0xAF537D5D,
-            0x4040CB08, 0x4EB4E2CC, 0x34D2466A, 0x0115AF84,
-            0xE1B00428, 0x95983A1D, 0x06B89FB4, 0xCE6EA048,
-            0x6F3F3B82, 0x3520AB82, 0x011A1D4B, 0x277227F8,
-            0x611560B1, 0xE7933FDC, 0xBB3A792B, 0x344525BD,
-            0xA08839E1, 0x51CE794B, 0x2F32C9B7, 0xA01FBAC9,
-            0xE01CC87E, 0xBCC7D1F6, 0xCF0111C3, 0xA1E8AAC7,
-            0x1A908749, 0xD44FBD9A, 0xD0DADECB, 0xD50ADA38,
-            0x0339C32A, 0xC6913667, 0x8DF9317C, 0xE0B12B4F,
-            0xF79E59B7, 0x43F5BB3A, 0xF2D519FF, 0x27D9459C,
-            0xBF97222C, 0x15E6FC2A, 0x0F91FC71, 0x9B941525,
-            0xFAE59361, 0xCEB69CEB, 0xC2A86459, 0x12BAA8D1,
-            0xB6C1075E, 0xE3056A0C, 0x10D25065, 0xCB03A442,
-            0xE0EC6E0E, 0x1698DB3B, 0x4C98A0BE, 0x3278E964,
-            0x9F1F9532, 0xE0D392DF, 0xD3A0342B, 0x8971F21E,
-            0x1B0A7441, 0x4BA3348C, 0xC5BE7120, 0xC37632D8,
-            0xDF359F8D, 0x9B992F2E, 0xE60B6F47, 0x0FE3F11D,
-            0xE54CDA54, 0x1EDAD891, 0xCE6279CF, 0xCD3E7E6F,
-            0x1618B166, 0xFD2C1D05, 0x848FD2C5, 0xF6FB2299,
-            0xF523F357, 0xA6327623, 0x93A83531, 0x56CCCD02,
-            0xACF08162, 0x5A75EBB5, 0x6E163697, 0x88D273CC,
-            0xDE966292, 0x81B949D0, 0x4C50901B, 0x71C65614,
-            0xE6C6C7BD, 0x327A140A, 0x45E1D006, 0xC3F27B9A,
-            0xC9AA53FD, 0x62A80F00, 0xBB25BFE2, 0x35BDD2F6,
-            0x71126905, 0xB2040222, 0xB6CBCF7C, 0xCD769C2B,
-            0x53113EC0, 0x1640E3D3, 0x38ABBD60, 0x2547ADF0,
-            0xBA38209C, 0xF746CE76, 0x77AFA1C5, 0x20756060,
-            0x85CBFE4E, 0x8AE88DD8, 0x7AAAF9B0, 0x4CF9AA7E,
-            0x1948C25C, 0x02FB8A8C, 0x01C36AE4, 0xD6EBE1F9,
-            0x90D4F869, 0xA65CDEA0, 0x3F09252D, 0xC208E69F,
-            0xB74E6132, 0xCE77E25B, 0x578FDFE3, 0x3AC372E6
-        };
-
-        #endregion
-
-        /// <summary>
-        /// The s-boxes.
-        /// </summary>
-        private readonly uint[] _s0;
-        private readonly uint[] _s1;
-        private readonly uint[] _s2;
-        private readonly uint[] _s3;
-
-        /// <summary>
-        /// The p-array.
-        /// </summary>
-        private readonly uint[] _p;
-
-        /// <summary>
-        /// Initializes a new instance of the <see cref="BlowfishCipher"/> class.
-        /// </summary>
-        /// <param name="key">The key.</param>
-        /// <param name="mode">The mode.</param>
-        /// <param name="padding">The padding.</param>
-        /// <exception cref="ArgumentNullException"><paramref name="key"/> is <see langword="null"/>.</exception>
-        /// <exception cref="ArgumentException">Keysize is not valid for this algorithm.</exception>
-        public BlowfishCipher(byte[] key, CipherMode mode, CipherPadding padding)
-            : base(key, 8, mode, padding)
-        {
-            var keySize = key.Length * 8;
-
-            if (keySize is < 1 or > 448)
-            {
-                throw new ArgumentException(string.Format("KeySize '{0}' is not valid for this algorithm.", keySize));
-            }
-
-            _s0 = new uint[SboxSk];
-            _s1 = new uint[SboxSk];
-            _s2 = new uint[SboxSk];
-            _s3 = new uint[SboxSk];
-            _p = new uint[PSize];
-
-            SetKey(key);
-        }
-
-        /// <summary>
-        /// Encrypts the specified region of the input byte array and copies the encrypted data to the specified region of the output byte array.
-        /// </summary>
-        /// <param name="inputBuffer">The input data to encrypt.</param>
-        /// <param name="inputOffset">The offset into the input byte array from which to begin using data.</param>
-        /// <param name="inputCount">The number of bytes in the input byte array to use as data.</param>
-        /// <param name="outputBuffer">The output to which to write encrypted data.</param>
-        /// <param name="outputOffset">The offset into the output byte array from which to begin writing data.</param>
-        /// <returns>
-        /// The number of bytes encrypted.
-        /// </returns>
-        public override int EncryptBlock(byte[] inputBuffer, int inputOffset, int inputCount, byte[] outputBuffer, int outputOffset)
-        {
-            if (inputCount != BlockSize)
-            {
-                throw new ArgumentException("inputCount");
-            }
-
-            var xl = BinaryPrimitives.ReadUInt32BigEndian(inputBuffer.AsSpan(inputOffset));
-            var xr = BinaryPrimitives.ReadUInt32BigEndian(inputBuffer.AsSpan(inputOffset + 4));
-
-            xl ^= _p[0];
-
-            for (var i = 1; i < Rounds; i += 2)
-            {
-                xr ^= F(xl) ^ _p[i];
-                xl ^= F(xr) ^ _p[i + 1];
-            }
-
-            xr ^= _p[Rounds + 1];
-
-            BinaryPrimitives.WriteUInt32BigEndian(outputBuffer.AsSpan(outputOffset), xr);
-            BinaryPrimitives.WriteUInt32BigEndian(outputBuffer.AsSpan(outputOffset + 4), xl);
-
-            return BlockSize;
-        }
-
-        /// <summary>
-        /// Decrypts the specified region of the input byte array and copies the decrypted data to the specified region of the output byte array.
-        /// </summary>
-        /// <param name="inputBuffer">The input data to decrypt.</param>
-        /// <param name="inputOffset">The offset into the input byte array from which to begin using data.</param>
-        /// <param name="inputCount">The number of bytes in the input byte array to use as data.</param>
-        /// <param name="outputBuffer">The output to which to write decrypted data.</param>
-        /// <param name="outputOffset">The offset into the output byte array from which to begin writing data.</param>
-        /// <returns>
-        /// The number of bytes decrypted.
-        /// </returns>
-        public override int DecryptBlock(byte[] inputBuffer, int inputOffset, int inputCount, byte[] outputBuffer, int outputOffset)
-        {
-            if (inputCount != BlockSize)
-            {
-                throw new ArgumentException("inputCount");
-            }
-
-            var xl = BinaryPrimitives.ReadUInt32BigEndian(inputBuffer.AsSpan(inputOffset));
-            var xr = BinaryPrimitives.ReadUInt32BigEndian(inputBuffer.AsSpan(inputOffset + 4));
-
-            xl ^= _p[Rounds + 1];
-
-            for (var i = Rounds; i > 0; i -= 2)
-            {
-                xr ^= F(xl) ^ _p[i];
-                xl ^= F(xr) ^ _p[i - 1];
-            }
-
-            xr ^= _p[0];
-
-            BinaryPrimitives.WriteUInt32BigEndian(outputBuffer.AsSpan(outputOffset), xr);
-            BinaryPrimitives.WriteUInt32BigEndian(outputBuffer.AsSpan(outputOffset + 4), xl);
-
-            return BlockSize;
-        }
-
-        private uint F(uint x)
-        {
-            return ((_s0[x >> 24] + _s1[(x >> 16) & 0xff]) ^ _s2[(x >> 8) & 0xff]) + _s3[x & 0xff];
-        }
-
-        private void SetKey(byte[] key)
-        {
-            /*
-             * - comments are from _Applied Crypto_, Schneier, p338
-             * please be careful comparing the two, AC numbers the
-             * arrays from 1, the enclosed code from 0.
-             *
-             * (1)
-             * Initialise the S-boxes and the P-array, with a fixed string
-             * This string contains the hexadecimal digits of pi (3.141...)
-             */
-            Buffer.BlockCopy(KS0, 0, _s0, 0, SboxSk * sizeof(uint));
-            Buffer.BlockCopy(KS1, 0, _s1, 0, SboxSk * sizeof(uint));
-            Buffer.BlockCopy(KS2, 0, _s2, 0, SboxSk * sizeof(uint));
-            Buffer.BlockCopy(KS3, 0, _s3, 0, SboxSk * sizeof(uint));
-            Buffer.BlockCopy(KP, 0, _p, 0, PSize * sizeof(uint));
-
-            /*
-             * (2)
-             * Now, XOR P[0] with the first 32 bits of the key, XOR P[1] with the
-             * second 32-bits of the key, and so on for all bits of the key
-             * (up to P[17]).  Repeatedly cycle through the key bits until the
-             * entire P-array has been XOR-ed with the key bits
-             */
-            var keyLength = key.Length;
-            var keyIndex = 0;
-
-            for (var i = 0; i < PSize; i++)
-            {
-                // Get the 32 bits of the key, in 4 * 8 bit chunks
-                uint data = 0x0000000;
-                for (var j = 0; j < 4; j++)
-                {
-                    // create a 32 bit block
-                    data = (data << 8) | key[keyIndex++];
-
-                    // wrap when we get to the end of the key
-                    if (keyIndex >= keyLength)
-                    {
-                        keyIndex = 0;
-                    }
-                }
-
-                // XOR the newly created 32 bit chunk onto the P-array
-                _p[i] ^= data;
-            }
-
-            /*
-             * (3)
-             * Encrypt the all-zero string with the Blowfish algorithm, using
-             * the subkeys described in (1) and (2)
-             *
-             * (4)
-             * Replace P1 and P2 with the output of step (3)
-             *
-             * (5)
-             * Encrypt the output of step(3) using the Blowfish algorithm,
-             * with the modified subkeys.
-             *
-             * (6)
-             * Replace P3 and P4 with the output of step (5)
-             *
-             * (7)
-             * Continue the process, replacing all elements of the P-array
-             * and then all four S-boxes in order, with the output of the
-             * continuously changing Blowfish algorithm
-             */
-
-            ProcessTable(0, 0, _p);
-            ProcessTable(_p[PSize - 2], _p[PSize - 1], _s0);
-            ProcessTable(_s0[SboxSk - 2], _s0[SboxSk - 1], _s1);
-            ProcessTable(_s1[SboxSk - 2], _s1[SboxSk - 1], _s2);
-            ProcessTable(_s2[SboxSk - 2], _s2[SboxSk - 1], _s3);
-        }
-
-        /// <summary>
-        /// apply the encryption cycle to each value pair in the table.
-        /// </summary>
-        /// <param name="xl">The xl.</param>
-        /// <param name="xr">The xr.</param>
-        /// <param name="table">The table.</param>
-        private void ProcessTable(uint xl, uint xr, uint[] table)
-        {
-            var size = table.Length;
-
-            for (var s = 0; s < size; s += 2)
-            {
-                xl ^= _p[0];
-
-                for (var i = 1; i < Rounds; i += 2)
-                {
-                    xr ^= F(xl) ^ _p[i];
-                    xl ^= F(xr) ^ _p[i + 1];
-                }
-
-                xr ^= _p[Rounds + 1];
-
-                table[s] = xr;
-                table[s + 1] = xl;
-
-                xr = xl;            // end of cycle swap
-                xl = table[s];
-            }
-        }
-    }
-}

+ 0 - 725
src/Renci.SshNet/Security/Cryptography/Ciphers/CastCipher.cs

@@ -1,725 +0,0 @@
-using System;
-using System.Buffers.Binary;
-
-namespace Renci.SshNet.Security.Cryptography.Ciphers
-{
-    /// <summary>
-    /// Implements CAST cipher algorithm.
-    /// </summary>
-    public sealed class CastCipher : BlockCipher
-    {
-        private const int MaxRounds = 16;
-
-        private const int RedRounds = 12;
-
-        /// <summary>
-        /// The rotating round key.
-        /// </summary>
-        private readonly int[] _kr = new int[17];
-
-        /// <summary>
-        /// The masking round key.
-        /// </summary>
-        private readonly uint[] _km = new uint[17];
-
-        private int _rounds = MaxRounds;
-
-        /// <summary>
-        /// Initializes a new instance of the <see cref="CastCipher"/> class.
-        /// </summary>
-        /// <param name="key">The key.</param>
-        /// <param name="mode">The mode.</param>
-        /// <param name="padding">The padding.</param>
-        /// <exception cref="ArgumentNullException"><paramref name="key"/> is <see langword="null"/>.</exception>
-        /// <exception cref="ArgumentException">Keysize is not valid for this algorithm.</exception>
-        public CastCipher(byte[] key, CipherMode mode, CipherPadding padding)
-            : base(key, 8, mode, padding)
-        {
-            var keySize = key.Length * 8;
-
-            if (!(keySize >= 40 && keySize <= 128 && keySize % 8 == 0))
-            {
-                throw new ArgumentException(string.Format("KeySize '{0}' is not valid for this algorithm.", keySize));
-            }
-
-            SetKey(key);
-        }
-
-        /// <summary>
-        /// Encrypts the specified region of the input byte array and copies the encrypted data to the specified region of the output byte array.
-        /// </summary>
-        /// <param name="inputBuffer">The input data to encrypt.</param>
-        /// <param name="inputOffset">The offset into the input byte array from which to begin using data.</param>
-        /// <param name="inputCount">The number of bytes in the input byte array to use as data.</param>
-        /// <param name="outputBuffer">The output to which to write encrypted data.</param>
-        /// <param name="outputOffset">The offset into the output byte array from which to begin writing data.</param>
-        /// <returns>
-        /// The number of bytes encrypted.
-        /// </returns>
-        public override int EncryptBlock(byte[] inputBuffer, int inputOffset, int inputCount, byte[] outputBuffer, int outputOffset)
-        {
-            /*
-             * process the input block
-             * batch the units up into a 32 bit chunk and go for it
-             * the array is in bytes, the increment is 8x8 bits = 64
-             */
-
-            var l0 = BinaryPrimitives.ReadUInt32BigEndian(inputBuffer.AsSpan(inputOffset));
-            var r0 = BinaryPrimitives.ReadUInt32BigEndian(inputBuffer.AsSpan(inputOffset + 4));
-
-            var result = new uint[2];
-            CastEncipher(l0, r0, result);
-
-            // now stuff them into the destination block
-            BinaryPrimitives.WriteUInt32BigEndian(outputBuffer.AsSpan(outputOffset), result[0]);
-            BinaryPrimitives.WriteUInt32BigEndian(outputBuffer.AsSpan(outputOffset + 4), result[1]);
-
-            return BlockSize;
-        }
-
-        /// <summary>
-        /// Decrypts the specified region of the input byte array and copies the decrypted data to the specified region of the output byte array.
-        /// </summary>
-        /// <param name="inputBuffer">The input data to decrypt.</param>
-        /// <param name="inputOffset">The offset into the input byte array from which to begin using data.</param>
-        /// <param name="inputCount">The number of bytes in the input byte array to use as data.</param>
-        /// <param name="outputBuffer">The output to which to write decrypted data.</param>
-        /// <param name="outputOffset">The offset into the output byte array from which to begin writing data.</param>
-        /// <returns>
-        /// The number of bytes decrypted.
-        /// </returns>
-        public override int DecryptBlock(byte[] inputBuffer, int inputOffset, int inputCount, byte[] outputBuffer, int outputOffset)
-        {
-            // process the input block
-            // batch the units up into a 32 bit chunk and go for it
-            // the array is in bytes, the increment is 8x8 bits = 64
-            var l16 = BinaryPrimitives.ReadUInt32BigEndian(inputBuffer.AsSpan(inputOffset));
-            var r16 = BinaryPrimitives.ReadUInt32BigEndian(inputBuffer.AsSpan(inputOffset + 4));
-
-            var result = new uint[2];
-            CastDecipher(l16, r16, result);
-
-            // now stuff them into the destination block
-            BinaryPrimitives.WriteUInt32BigEndian(outputBuffer.AsSpan(outputOffset), result[0]);
-            BinaryPrimitives.WriteUInt32BigEndian(outputBuffer.AsSpan(outputOffset + 4), result[1]);
-
-            return BlockSize;
-        }
-
-        #region Static Definition Tables
-
-        internal static readonly uint[] S1 =
-            {
-                0x30fb40d4, 0x9fa0ff0b, 0x6beccd2f, 0x3f258c7a, 0x1e213f2f, 0x9c004dd3, 0x6003e540, 0xcf9fc949,
-                0xbfd4af27, 0x88bbbdb5, 0xe2034090, 0x98d09675, 0x6e63a0e0, 0x15c361d2, 0xc2e7661d, 0x22d4ff8e,
-                0x28683b6f, 0xc07fd059, 0xff2379c8, 0x775f50e2, 0x43c340d3, 0xdf2f8656, 0x887ca41a, 0xa2d2bd2d,
-                0xa1c9e0d6, 0x346c4819, 0x61b76d87, 0x22540f2f, 0x2abe32e1, 0xaa54166b, 0x22568e3a, 0xa2d341d0,
-                0x66db40c8, 0xa784392f, 0x004dff2f, 0x2db9d2de, 0x97943fac, 0x4a97c1d8, 0x527644b7, 0xb5f437a7,
-                0xb82cbaef, 0xd751d159, 0x6ff7f0ed, 0x5a097a1f, 0x827b68d0, 0x90ecf52e, 0x22b0c054, 0xbc8e5935,
-                0x4b6d2f7f, 0x50bb64a2, 0xd2664910, 0xbee5812d, 0xb7332290, 0xe93b159f, 0xb48ee411, 0x4bff345d,
-                0xfd45c240, 0xad31973f, 0xc4f6d02e, 0x55fc8165, 0xd5b1caad, 0xa1ac2dae, 0xa2d4b76d, 0xc19b0c50,
-                0x882240f2, 0x0c6e4f38, 0xa4e4bfd7, 0x4f5ba272, 0x564c1d2f, 0xc59c5319, 0xb949e354, 0xb04669fe,
-                0xb1b6ab8a, 0xc71358dd, 0x6385c545, 0x110f935d, 0x57538ad5, 0x6a390493, 0xe63d37e0, 0x2a54f6b3,
-                0x3a787d5f, 0x6276a0b5, 0x19a6fcdf, 0x7a42206a, 0x29f9d4d5, 0xf61b1891, 0xbb72275e, 0xaa508167,
-                0x38901091, 0xc6b505eb, 0x84c7cb8c, 0x2ad75a0f, 0x874a1427, 0xa2d1936b, 0x2ad286af, 0xaa56d291,
-                0xd7894360, 0x425c750d, 0x93b39e26, 0x187184c9, 0x6c00b32d, 0x73e2bb14, 0xa0bebc3c, 0x54623779,
-                0x64459eab, 0x3f328b82, 0x7718cf82, 0x59a2cea6, 0x04ee002e, 0x89fe78e6, 0x3fab0950, 0x325ff6c2,
-                0x81383f05, 0x6963c5c8, 0x76cb5ad6, 0xd49974c9, 0xca180dcf, 0x380782d5, 0xc7fa5cf6, 0x8ac31511,
-                0x35e79e13, 0x47da91d0, 0xf40f9086, 0xa7e2419e, 0x31366241, 0x051ef495, 0xaa573b04, 0x4a805d8d,
-                0x548300d0, 0x00322a3c, 0xbf64cddf, 0xba57a68e, 0x75c6372b, 0x50afd341, 0xa7c13275, 0x915a0bf5,
-                0x6b54bfab, 0x2b0b1426, 0xab4cc9d7, 0x449ccd82, 0xf7fbf265, 0xab85c5f3, 0x1b55db94, 0xaad4e324,
-                0xcfa4bd3f, 0x2deaa3e2, 0x9e204d02, 0xc8bd25ac, 0xeadf55b3, 0xd5bd9e98, 0xe31231b2, 0x2ad5ad6c,
-                0x954329de, 0xadbe4528, 0xd8710f69, 0xaa51c90f, 0xaa786bf6, 0x22513f1e, 0xaa51a79b, 0x2ad344cc,
-                0x7b5a41f0, 0xd37cfbad, 0x1b069505, 0x41ece491, 0xb4c332e6, 0x032268d4, 0xc9600acc, 0xce387e6d,
-                0xbf6bb16c, 0x6a70fb78, 0x0d03d9c9, 0xd4df39de, 0xe01063da, 0x4736f464, 0x5ad328d8, 0xb347cc96,
-                0x75bb0fc3, 0x98511bfb, 0x4ffbcc35, 0xb58bcf6a, 0xe11f0abc, 0xbfc5fe4a, 0xa70aec10, 0xac39570a,
-                0x3f04442f, 0x6188b153, 0xe0397a2e, 0x5727cb79, 0x9ceb418f, 0x1cacd68d, 0x2ad37c96, 0x0175cb9d,
-                0xc69dff09, 0xc75b65f0, 0xd9db40d8, 0xec0e7779, 0x4744ead4, 0xb11c3274, 0xdd24cb9e, 0x7e1c54bd,
-                0xf01144f9, 0xd2240eb1, 0x9675b3fd, 0xa3ac3755, 0xd47c27af, 0x51c85f4d, 0x56907596, 0xa5bb15e6,
-                0x580304f0, 0xca042cf1, 0x011a37ea, 0x8dbfaadb, 0x35ba3e4a, 0x3526ffa0, 0xc37b4d09, 0xbc306ed9,
-                0x98a52666, 0x5648f725, 0xff5e569d, 0x0ced63d0, 0x7c63b2cf, 0x700b45e1, 0xd5ea50f1, 0x85a92872,
-                0xaf1fbda7, 0xd4234870, 0xa7870bf3, 0x2d3b4d79, 0x42e04198, 0x0cd0ede7, 0x26470db8, 0xf881814c,
-                0x474d6ad7, 0x7c0c5e5c, 0xd1231959, 0x381b7298, 0xf5d2f4db, 0xab838653, 0x6e2f1e23, 0x83719c9e,
-                0xbd91e046, 0x9a56456e, 0xdc39200c, 0x20c8c571, 0x962bda1c, 0xe1e696ff, 0xb141ab08, 0x7cca89b9,
-                0x1a69e783, 0x02cc4843, 0xa2f7c579, 0x429ef47d, 0x427b169c, 0x5ac9f049, 0xdd8f0f00, 0x5c8165bf
-            };
-
-        internal static readonly uint[] S2 =
-            {
-                0x1f201094, 0xef0ba75b, 0x69e3cf7e, 0x393f4380, 0xfe61cf7a, 0xeec5207a, 0x55889c94, 0x72fc0651,
-                0xada7ef79, 0x4e1d7235, 0xd55a63ce, 0xde0436ba, 0x99c430ef, 0x5f0c0794, 0x18dcdb7d, 0xa1d6eff3,
-                0xa0b52f7b, 0x59e83605, 0xee15b094, 0xe9ffd909, 0xdc440086, 0xef944459, 0xba83ccb3, 0xe0c3cdfb,
-                0xd1da4181, 0x3b092ab1, 0xf997f1c1, 0xa5e6cf7b, 0x01420ddb, 0xe4e7ef5b, 0x25a1ff41, 0xe180f806,
-                0x1fc41080, 0x179bee7a, 0xd37ac6a9, 0xfe5830a4, 0x98de8b7f, 0x77e83f4e, 0x79929269, 0x24fa9f7b,
-                0xe113c85b, 0xacc40083, 0xd7503525, 0xf7ea615f, 0x62143154, 0x0d554b63, 0x5d681121, 0xc866c359,
-                0x3d63cf73, 0xcee234c0, 0xd4d87e87, 0x5c672b21, 0x071f6181, 0x39f7627f, 0x361e3084, 0xe4eb573b,
-                0x602f64a4, 0xd63acd9c, 0x1bbc4635, 0x9e81032d, 0x2701f50c, 0x99847ab4, 0xa0e3df79, 0xba6cf38c,
-                0x10843094, 0x2537a95e, 0xf46f6ffe, 0xa1ff3b1f, 0x208cfb6a, 0x8f458c74, 0xd9e0a227, 0x4ec73a34,
-                0xfc884f69, 0x3e4de8df, 0xef0e0088, 0x3559648d, 0x8a45388c, 0x1d804366, 0x721d9bfd, 0xa58684bb,
-                0xe8256333, 0x844e8212, 0x128d8098, 0xfed33fb4, 0xce280ae1, 0x27e19ba5, 0xd5a6c252, 0xe49754bd,
-                0xc5d655dd, 0xeb667064, 0x77840b4d, 0xa1b6a801, 0x84db26a9, 0xe0b56714, 0x21f043b7, 0xe5d05860,
-                0x54f03084, 0x066ff472, 0xa31aa153, 0xdadc4755, 0xb5625dbf, 0x68561be6, 0x83ca6b94, 0x2d6ed23b,
-                0xeccf01db, 0xa6d3d0ba, 0xb6803d5c, 0xaf77a709, 0x33b4a34c, 0x397bc8d6, 0x5ee22b95, 0x5f0e5304,
-                0x81ed6f61, 0x20e74364, 0xb45e1378, 0xde18639b, 0x881ca122, 0xb96726d1, 0x8049a7e8, 0x22b7da7b,
-                0x5e552d25, 0x5272d237, 0x79d2951c, 0xc60d894c, 0x488cb402, 0x1ba4fe5b, 0xa4b09f6b, 0x1ca815cf,
-                0xa20c3005, 0x8871df63, 0xb9de2fcb, 0x0cc6c9e9, 0x0beeff53, 0xe3214517, 0xb4542835, 0x9f63293c,
-                0xee41e729, 0x6e1d2d7c, 0x50045286, 0x1e6685f3, 0xf33401c6, 0x30a22c95, 0x31a70850, 0x60930f13,
-                0x73f98417, 0xa1269859, 0xec645c44, 0x52c877a9, 0xcdff33a6, 0xa02b1741, 0x7cbad9a2, 0x2180036f,
-                0x50d99c08, 0xcb3f4861, 0xc26bd765, 0x64a3f6ab, 0x80342676, 0x25a75e7b, 0xe4e6d1fc, 0x20c710e6,
-                0xcdf0b680, 0x17844d3b, 0x31eef84d, 0x7e0824e4, 0x2ccb49eb, 0x846a3bae, 0x8ff77888, 0xee5d60f6,
-                0x7af75673, 0x2fdd5cdb, 0xa11631c1, 0x30f66f43, 0xb3faec54, 0x157fd7fa, 0xef8579cc, 0xd152de58,
-                0xdb2ffd5e, 0x8f32ce19, 0x306af97a, 0x02f03ef8, 0x99319ad5, 0xc242fa0f, 0xa7e3ebb0, 0xc68e4906,
-                0xb8da230c, 0x80823028, 0xdcdef3c8, 0xd35fb171, 0x088a1bc8, 0xbec0c560, 0x61a3c9e8, 0xbca8f54d,
-                0xc72feffa, 0x22822e99, 0x82c570b4, 0xd8d94e89, 0x8b1c34bc, 0x301e16e6, 0x273be979, 0xb0ffeaa6,
-                0x61d9b8c6, 0x00b24869, 0xb7ffce3f, 0x08dc283b, 0x43daf65a, 0xf7e19798, 0x7619b72f, 0x8f1c9ba4,
-                0xdc8637a0, 0x16a7d3b1, 0x9fc393b7, 0xa7136eeb, 0xc6bcc63e, 0x1a513742, 0xef6828bc, 0x520365d6,
-                0x2d6a77ab, 0x3527ed4b, 0x821fd216, 0x095c6e2e, 0xdb92f2fb, 0x5eea29cb, 0x145892f5, 0x91584f7f,
-                0x5483697b, 0x2667a8cc, 0x85196048, 0x8c4bacea, 0x833860d4, 0x0d23e0f9, 0x6c387e8a, 0x0ae6d249,
-                0xb284600c, 0xd835731d, 0xdcb1c647, 0xac4c56ea, 0x3ebd81b3, 0x230eabb0, 0x6438bc87, 0xf0b5b1fa,
-                0x8f5ea2b3, 0xfc184642, 0x0a036b7a, 0x4fb089bd, 0x649da589, 0xa345415e, 0x5c038323, 0x3e5d3bb9,
-                0x43d79572, 0x7e6dd07c, 0x06dfdf1e, 0x6c6cc4ef, 0x7160a539, 0x73bfbe70, 0x83877605, 0x4523ecf1
-            };
-
-        internal static readonly uint[] S3 =
-            {
-                0x8defc240, 0x25fa5d9f, 0xeb903dbf, 0xe810c907, 0x47607fff, 0x369fe44b, 0x8c1fc644, 0xaececa90,
-                0xbeb1f9bf, 0xeefbcaea, 0xe8cf1950, 0x51df07ae, 0x920e8806, 0xf0ad0548, 0xe13c8d83, 0x927010d5,
-                0x11107d9f, 0x07647db9, 0xb2e3e4d4, 0x3d4f285e, 0xb9afa820, 0xfade82e0, 0xa067268b, 0x8272792e,
-                0x553fb2c0, 0x489ae22b, 0xd4ef9794, 0x125e3fbc, 0x21fffcee, 0x825b1bfd, 0x9255c5ed, 0x1257a240,
-                0x4e1a8302, 0xbae07fff, 0x528246e7, 0x8e57140e, 0x3373f7bf, 0x8c9f8188, 0xa6fc4ee8, 0xc982b5a5,
-                0xa8c01db7, 0x579fc264, 0x67094f31, 0xf2bd3f5f, 0x40fff7c1, 0x1fb78dfc, 0x8e6bd2c1, 0x437be59b,
-                0x99b03dbf, 0xb5dbc64b, 0x638dc0e6, 0x55819d99, 0xa197c81c, 0x4a012d6e, 0xc5884a28, 0xccc36f71,
-                0xb843c213, 0x6c0743f1, 0x8309893c, 0x0feddd5f, 0x2f7fe850, 0xd7c07f7e, 0x02507fbf, 0x5afb9a04,
-                0xa747d2d0, 0x1651192e, 0xaf70bf3e, 0x58c31380, 0x5f98302e, 0x727cc3c4, 0x0a0fb402, 0x0f7fef82,
-                0x8c96fdad, 0x5d2c2aae, 0x8ee99a49, 0x50da88b8, 0x8427f4a0, 0x1eac5790, 0x796fb449, 0x8252dc15,
-                0xefbd7d9b, 0xa672597d, 0xada840d8, 0x45f54504, 0xfa5d7403, 0xe83ec305, 0x4f91751a, 0x925669c2,
-                0x23efe941, 0xa903f12e, 0x60270df2, 0x0276e4b6, 0x94fd6574, 0x927985b2, 0x8276dbcb, 0x02778176,
-                0xf8af918d, 0x4e48f79e, 0x8f616ddf, 0xe29d840e, 0x842f7d83, 0x340ce5c8, 0x96bbb682, 0x93b4b148,
-                0xef303cab, 0x984faf28, 0x779faf9b, 0x92dc560d, 0x224d1e20, 0x8437aa88, 0x7d29dc96, 0x2756d3dc,
-                0x8b907cee, 0xb51fd240, 0xe7c07ce3, 0xe566b4a1, 0xc3e9615e, 0x3cf8209d, 0x6094d1e3, 0xcd9ca341,
-                0x5c76460e, 0x00ea983b, 0xd4d67881, 0xfd47572c, 0xf76cedd9, 0xbda8229c, 0x127dadaa, 0x438a074e,
-                0x1f97c090, 0x081bdb8a, 0x93a07ebe, 0xb938ca15, 0x97b03cff, 0x3dc2c0f8, 0x8d1ab2ec, 0x64380e51,
-                0x68cc7bfb, 0xd90f2788, 0x12490181, 0x5de5ffd4, 0xdd7ef86a, 0x76a2e214, 0xb9a40368, 0x925d958f,
-                0x4b39fffa, 0xba39aee9, 0xa4ffd30b, 0xfaf7933b, 0x6d498623, 0x193cbcfa, 0x27627545, 0x825cf47a,
-                0x61bd8ba0, 0xd11e42d1, 0xcead04f4, 0x127ea392, 0x10428db7, 0x8272a972, 0x9270c4a8, 0x127de50b,
-                0x285ba1c8, 0x3c62f44f, 0x35c0eaa5, 0xe805d231, 0x428929fb, 0xb4fcdf82, 0x4fb66a53, 0x0e7dc15b,
-                0x1f081fab, 0x108618ae, 0xfcfd086d, 0xf9ff2889, 0x694bcc11, 0x236a5cae, 0x12deca4d, 0x2c3f8cc5,
-                0xd2d02dfe, 0xf8ef5896, 0xe4cf52da, 0x95155b67, 0x494a488c, 0xb9b6a80c, 0x5c8f82bc, 0x89d36b45,
-                0x3a609437, 0xec00c9a9, 0x44715253, 0x0a874b49, 0xd773bc40, 0x7c34671c, 0x02717ef6, 0x4feb5536,
-                0xa2d02fff, 0xd2bf60c4, 0xd43f03c0, 0x50b4ef6d, 0x07478cd1, 0x006e1888, 0xa2e53f55, 0xb9e6d4bc,
-                0xa2048016, 0x97573833, 0xd7207d67, 0xde0f8f3d, 0x72f87b33, 0xabcc4f33, 0x7688c55d, 0x7b00a6b0,
-                0x947b0001, 0x570075d2, 0xf9bb88f8, 0x8942019e, 0x4264a5ff, 0x856302e0, 0x72dbd92b, 0xee971b69,
-                0x6ea22fde, 0x5f08ae2b, 0xaf7a616d, 0xe5c98767, 0xcf1febd2, 0x61efc8c2, 0xf1ac2571, 0xcc8239c2,
-                0x67214cb8, 0xb1e583d1, 0xb7dc3e62, 0x7f10bdce, 0xf90a5c38, 0x0ff0443d, 0x606e6dc6, 0x60543a49,
-                0x5727c148, 0x2be98a1d, 0x8ab41738, 0x20e1be24, 0xaf96da0f, 0x68458425, 0x99833be5, 0x600d457d,
-                0x282f9350, 0x8334b362, 0xd91d1120, 0x2b6d8da0, 0x642b1e31, 0x9c305a00, 0x52bce688, 0x1b03588a,
-                0xf7baefd5, 0x4142ed9c, 0xa4315c11, 0x83323ec5, 0xdfef4636, 0xa133c501, 0xe9d3531c, 0xee353783
-            };
-
-        internal static readonly uint[] S4 =
-            {
-                0x9db30420, 0x1fb6e9de, 0xa7be7bef, 0xd273a298, 0x4a4f7bdb, 0x64ad8c57, 0x85510443, 0xfa020ed1,
-                0x7e287aff, 0xe60fb663, 0x095f35a1, 0x79ebf120, 0xfd059d43, 0x6497b7b1, 0xf3641f63, 0x241e4adf,
-                0x28147f5f, 0x4fa2b8cd, 0xc9430040, 0x0cc32220, 0xfdd30b30, 0xc0a5374f, 0x1d2d00d9, 0x24147b15,
-                0xee4d111a, 0x0fca5167, 0x71ff904c, 0x2d195ffe, 0x1a05645f, 0x0c13fefe, 0x081b08ca, 0x05170121,
-                0x80530100, 0xe83e5efe, 0xac9af4f8, 0x7fe72701, 0xd2b8ee5f, 0x06df4261, 0xbb9e9b8a, 0x7293ea25,
-                0xce84ffdf, 0xf5718801, 0x3dd64b04, 0xa26f263b, 0x7ed48400, 0x547eebe6, 0x446d4ca0, 0x6cf3d6f5,
-                0x2649abdf, 0xaea0c7f5, 0x36338cc1, 0x503f7e93, 0xd3772061, 0x11b638e1, 0x72500e03, 0xf80eb2bb,
-                0xabe0502e, 0xec8d77de, 0x57971e81, 0xe14f6746, 0xc9335400, 0x6920318f, 0x081dbb99, 0xffc304a5,
-                0x4d351805, 0x7f3d5ce3, 0xa6c866c6, 0x5d5bcca9, 0xdaec6fea, 0x9f926f91, 0x9f46222f, 0x3991467d,
-                0xa5bf6d8e, 0x1143c44f, 0x43958302, 0xd0214eeb, 0x022083b8, 0x3fb6180c, 0x18f8931e, 0x281658e6,
-                0x26486e3e, 0x8bd78a70, 0x7477e4c1, 0xb506e07c, 0xf32d0a25, 0x79098b02, 0xe4eabb81, 0x28123b23,
-                0x69dead38, 0x1574ca16, 0xdf871b62, 0x211c40b7, 0xa51a9ef9, 0x0014377b, 0x041e8ac8, 0x09114003,
-                0xbd59e4d2, 0xe3d156d5, 0x4fe876d5, 0x2f91a340, 0x557be8de, 0x00eae4a7, 0x0ce5c2ec, 0x4db4bba6,
-                0xe756bdff, 0xdd3369ac, 0xec17b035, 0x06572327, 0x99afc8b0, 0x56c8c391, 0x6b65811c, 0x5e146119,
-                0x6e85cb75, 0xbe07c002, 0xc2325577, 0x893ff4ec, 0x5bbfc92d, 0xd0ec3b25, 0xb7801ab7, 0x8d6d3b24,
-                0x20c763ef, 0xc366a5fc, 0x9c382880, 0x0ace3205, 0xaac9548a, 0xeca1d7c7, 0x041afa32, 0x1d16625a,
-                0x6701902c, 0x9b757a54, 0x31d477f7, 0x9126b031, 0x36cc6fdb, 0xc70b8b46, 0xd9e66a48, 0x56e55a79,
-                0x026a4ceb, 0x52437eff, 0x2f8f76b4, 0x0df980a5, 0x8674cde3, 0xedda04eb, 0x17a9be04, 0x2c18f4df,
-                0xb7747f9d, 0xab2af7b4, 0xefc34d20, 0x2e096b7c, 0x1741a254, 0xe5b6a035, 0x213d42f6, 0x2c1c7c26,
-                0x61c2f50f, 0x6552daf9, 0xd2c231f8, 0x25130f69, 0xd8167fa2, 0x0418f2c8, 0x001a96a6, 0x0d1526ab,
-                0x63315c21, 0x5e0a72ec, 0x49bafefd, 0x187908d9, 0x8d0dbd86, 0x311170a7, 0x3e9b640c, 0xcc3e10d7,
-                0xd5cad3b6, 0x0caec388, 0xf73001e1, 0x6c728aff, 0x71eae2a1, 0x1f9af36e, 0xcfcbd12f, 0xc1de8417,
-                0xac07be6b, 0xcb44a1d8, 0x8b9b0f56, 0x013988c3, 0xb1c52fca, 0xb4be31cd, 0xd8782806, 0x12a3a4e2,
-                0x6f7de532, 0x58fd7eb6, 0xd01ee900, 0x24adffc2, 0xf4990fc5, 0x9711aac5, 0x001d7b95, 0x82e5e7d2,
-                0x109873f6, 0x00613096, 0xc32d9521, 0xada121ff, 0x29908415, 0x7fbb977f, 0xaf9eb3db, 0x29c9ed2a,
-                0x5ce2a465, 0xa730f32c, 0xd0aa3fe8, 0x8a5cc091, 0xd49e2ce7, 0x0ce454a9, 0xd60acd86, 0x015f1919,
-                0x77079103, 0xdea03af6, 0x78a8565e, 0xdee356df, 0x21f05cbe, 0x8b75e387, 0xb3c50651, 0xb8a5c3ef,
-                0xd8eeb6d2, 0xe523be77, 0xc2154529, 0x2f69efdf, 0xafe67afb, 0xf470c4b2, 0xf3e0eb5b, 0xd6cc9876,
-                0x39e4460c, 0x1fda8538, 0x1987832f, 0xca007367, 0xa99144f8, 0x296b299e, 0x492fc295, 0x9266beab,
-                0xb5676e69, 0x9bd3ddda, 0xdf7e052f, 0xdb25701c, 0x1b5e51ee, 0xf65324e6, 0x6afce36c, 0x0316cc04,
-                0x8644213e, 0xb7dc59d0, 0x7965291f, 0xccd6fd43, 0x41823979, 0x932bcdf6, 0xb657c34d, 0x4edfd282,
-                0x7ae5290c, 0x3cb9536b, 0x851e20fe, 0x9833557e, 0x13ecf0b0, 0xd3ffb372, 0x3f85c5c1, 0x0aef7ed2
-            };
-
-        internal static readonly uint[] S5 =
-            {
-                0x7ec90c04, 0x2c6e74b9, 0x9b0e66df, 0xa6337911, 0xb86a7fff, 0x1dd358f5, 0x44dd9d44, 0x1731167f,
-                0x08fbf1fa, 0xe7f511cc, 0xd2051b00, 0x735aba00, 0x2ab722d8, 0x386381cb, 0xacf6243a, 0x69befd7a,
-                0xe6a2e77f, 0xf0c720cd, 0xc4494816, 0xccf5c180, 0x38851640, 0x15b0a848, 0xe68b18cb, 0x4caadeff,
-                0x5f480a01, 0x0412b2aa, 0x259814fc, 0x41d0efe2, 0x4e40b48d, 0x248eb6fb, 0x8dba1cfe, 0x41a99b02,
-                0x1a550a04, 0xba8f65cb, 0x7251f4e7, 0x95a51725, 0xc106ecd7, 0x97a5980a, 0xc539b9aa, 0x4d79fe6a,
-                0xf2f3f763, 0x68af8040, 0xed0c9e56, 0x11b4958b, 0xe1eb5a88, 0x8709e6b0, 0xd7e07156, 0x4e29fea7,
-                0x6366e52d, 0x02d1c000, 0xc4ac8e05, 0x9377f571, 0x0c05372a, 0x578535f2, 0x2261be02, 0xd642a0c9,
-                0xdf13a280, 0x74b55bd2, 0x682199c0, 0xd421e5ec, 0x53fb3ce8, 0xc8adedb3, 0x28a87fc9, 0x3d959981,
-                0x5c1ff900, 0xfe38d399, 0x0c4eff0b, 0x062407ea, 0xaa2f4fb1, 0x4fb96976, 0x90c79505, 0xb0a8a774,
-                0xef55a1ff, 0xe59ca2c2, 0xa6b62d27, 0xe66a4263, 0xdf65001f, 0x0ec50966, 0xdfdd55bc, 0x29de0655,
-                0x911e739a, 0x17af8975, 0x32c7911c, 0x89f89468, 0x0d01e980, 0x524755f4, 0x03b63cc9, 0x0cc844b2,
-                0xbcf3f0aa, 0x87ac36e9, 0xe53a7426, 0x01b3d82b, 0x1a9e7449, 0x64ee2d7e, 0xcddbb1da, 0x01c94910,
-                0xb868bf80, 0x0d26f3fd, 0x9342ede7, 0x04a5c284, 0x636737b6, 0x50f5b616, 0xf24766e3, 0x8eca36c1,
-                0x136e05db, 0xfef18391, 0xfb887a37, 0xd6e7f7d4, 0xc7fb7dc9, 0x3063fcdf, 0xb6f589de, 0xec2941da,
-                0x26e46695, 0xb7566419, 0xf654efc5, 0xd08d58b7, 0x48925401, 0xc1bacb7f, 0xe5ff550f, 0xb6083049,
-                0x5bb5d0e8, 0x87d72e5a, 0xab6a6ee1, 0x223a66ce, 0xc62bf3cd, 0x9e0885f9, 0x68cb3e47, 0x086c010f,
-                0xa21de820, 0xd18b69de, 0xf3f65777, 0xfa02c3f6, 0x407edac3, 0xcbb3d550, 0x1793084d, 0xb0d70eba,
-                0x0ab378d5, 0xd951fb0c, 0xded7da56, 0x4124bbe4, 0x94ca0b56, 0x0f5755d1, 0xe0e1e56e, 0x6184b5be,
-                0x580a249f, 0x94f74bc0, 0xe327888e, 0x9f7b5561, 0xc3dc0280, 0x05687715, 0x646c6bd7, 0x44904db3,
-                0x66b4f0a3, 0xc0f1648a, 0x697ed5af, 0x49e92ff6, 0x309e374f, 0x2cb6356a, 0x85808573, 0x4991f840,
-                0x76f0ae02, 0x083be84d, 0x28421c9a, 0x44489406, 0x736e4cb8, 0xc1092910, 0x8bc95fc6, 0x7d869cf4,
-                0x134f616f, 0x2e77118d, 0xb31b2be1, 0xaa90b472, 0x3ca5d717, 0x7d161bba, 0x9cad9010, 0xaf462ba2,
-                0x9fe459d2, 0x45d34559, 0xd9f2da13, 0xdbc65487, 0xf3e4f94e, 0x176d486f, 0x097c13ea, 0x631da5c7,
-                0x445f7382, 0x175683f4, 0xcdc66a97, 0x70be0288, 0xb3cdcf72, 0x6e5dd2f3, 0x20936079, 0x459b80a5,
-                0xbe60e2db, 0xa9c23101, 0xeba5315c, 0x224e42f2, 0x1c5c1572, 0xf6721b2c, 0x1ad2fff3, 0x8c25404e,
-                0x324ed72f, 0x4067b7fd, 0x0523138e, 0x5ca3bc78, 0xdc0fd66e, 0x75922283, 0x784d6b17, 0x58ebb16e,
-                0x44094f85, 0x3f481d87, 0xfcfeae7b, 0x77b5ff76, 0x8c2302bf, 0xaaf47556, 0x5f46b02a, 0x2b092801,
-                0x3d38f5f7, 0x0ca81f36, 0x52af4a8a, 0x66d5e7c0, 0xdf3b0874, 0x95055110, 0x1b5ad7a8, 0xf61ed5ad,
-                0x6cf6e479, 0x20758184, 0xd0cefa65, 0x88f7be58, 0x4a046826, 0x0ff6f8f3, 0xa09c7f70, 0x5346aba0,
-                0x5ce96c28, 0xe176eda3, 0x6bac307f, 0x376829d2, 0x85360fa9, 0x17e3fe2a, 0x24b79767, 0xf5a96b20,
-                0xd6cd2595, 0x68ff1ebf, 0x7555442c, 0xf19f06be, 0xf9e0659a, 0xeeb9491d, 0x34010718, 0xbb30cab8,
-                0xe822fe15, 0x88570983, 0x750e6249, 0xda627e55, 0x5e76ffa8, 0xb1534546, 0x6d47de08, 0xefe9e7d4
-            };
-
-        internal static readonly uint[] S6 =
-            {
-                0xf6fa8f9d, 0x2cac6ce1, 0x4ca34867, 0xe2337f7c, 0x95db08e7, 0x016843b4, 0xeced5cbc, 0x325553ac,
-                0xbf9f0960, 0xdfa1e2ed, 0x83f0579d, 0x63ed86b9, 0x1ab6a6b8, 0xde5ebe39, 0xf38ff732, 0x8989b138,
-                0x33f14961, 0xc01937bd, 0xf506c6da, 0xe4625e7e, 0xa308ea99, 0x4e23e33c, 0x79cbd7cc, 0x48a14367,
-                0xa3149619, 0xfec94bd5, 0xa114174a, 0xeaa01866, 0xa084db2d, 0x09a8486f, 0xa888614a, 0x2900af98,
-                0x01665991, 0xe1992863, 0xc8f30c60, 0x2e78ef3c, 0xd0d51932, 0xcf0fec14, 0xf7ca07d2, 0xd0a82072,
-                0xfd41197e, 0x9305a6b0, 0xe86be3da, 0x74bed3cd, 0x372da53c, 0x4c7f4448, 0xdab5d440, 0x6dba0ec3,
-                0x083919a7, 0x9fbaeed9, 0x49dbcfb0, 0x4e670c53, 0x5c3d9c01, 0x64bdb941, 0x2c0e636a, 0xba7dd9cd,
-                0xea6f7388, 0xe70bc762, 0x35f29adb, 0x5c4cdd8d, 0xf0d48d8c, 0xb88153e2, 0x08a19866, 0x1ae2eac8,
-                0x284caf89, 0xaa928223, 0x9334be53, 0x3b3a21bf, 0x16434be3, 0x9aea3906, 0xefe8c36e, 0xf890cdd9,
-                0x80226dae, 0xc340a4a3, 0xdf7e9c09, 0xa694a807, 0x5b7c5ecc, 0x221db3a6, 0x9a69a02f, 0x68818a54,
-                0xceb2296f, 0x53c0843a, 0xfe893655, 0x25bfe68a, 0xb4628abc, 0xcf222ebf, 0x25ac6f48, 0xa9a99387,
-                0x53bddb65, 0xe76ffbe7, 0xe967fd78, 0x0ba93563, 0x8e342bc1, 0xe8a11be9, 0x4980740d, 0xc8087dfc,
-                0x8de4bf99, 0xa11101a0, 0x7fd37975, 0xda5a26c0, 0xe81f994f, 0x9528cd89, 0xfd339fed, 0xb87834bf,
-                0x5f04456d, 0x22258698, 0xc9c4c83b, 0x2dc156be, 0x4f628daa, 0x57f55ec5, 0xe2220abe, 0xd2916ebf,
-                0x4ec75b95, 0x24f2c3c0, 0x42d15d99, 0xcd0d7fa0, 0x7b6e27ff, 0xa8dc8af0, 0x7345c106, 0xf41e232f,
-                0x35162386, 0xe6ea8926, 0x3333b094, 0x157ec6f2, 0x372b74af, 0x692573e4, 0xe9a9d848, 0xf3160289,
-                0x3a62ef1d, 0xa787e238, 0xf3a5f676, 0x74364853, 0x20951063, 0x4576698d, 0xb6fad407, 0x592af950,
-                0x36f73523, 0x4cfb6e87, 0x7da4cec0, 0x6c152daa, 0xcb0396a8, 0xc50dfe5d, 0xfcd707ab, 0x0921c42f,
-                0x89dff0bb, 0x5fe2be78, 0x448f4f33, 0x754613c9, 0x2b05d08d, 0x48b9d585, 0xdc049441, 0xc8098f9b,
-                0x7dede786, 0xc39a3373, 0x42410005, 0x6a091751, 0x0ef3c8a6, 0x890072d6, 0x28207682, 0xa9a9f7be,
-                0xbf32679d, 0xd45b5b75, 0xb353fd00, 0xcbb0e358, 0x830f220a, 0x1f8fb214, 0xd372cf08, 0xcc3c4a13,
-                0x8cf63166, 0x061c87be, 0x88c98f88, 0x6062e397, 0x47cf8e7a, 0xb6c85283, 0x3cc2acfb, 0x3fc06976,
-                0x4e8f0252, 0x64d8314d, 0xda3870e3, 0x1e665459, 0xc10908f0, 0x513021a5, 0x6c5b68b7, 0x822f8aa0,
-                0x3007cd3e, 0x74719eef, 0xdc872681, 0x073340d4, 0x7e432fd9, 0x0c5ec241, 0x8809286c, 0xf592d891,
-                0x08a930f6, 0x957ef305, 0xb7fbffbd, 0xc266e96f, 0x6fe4ac98, 0xb173ecc0, 0xbc60b42a, 0x953498da,
-                0xfba1ae12, 0x2d4bd736, 0x0f25faab, 0xa4f3fceb, 0xe2969123, 0x257f0c3d, 0x9348af49, 0x361400bc,
-                0xe8816f4a, 0x3814f200, 0xa3f94043, 0x9c7a54c2, 0xbc704f57, 0xda41e7f9, 0xc25ad33a, 0x54f4a084,
-                0xb17f5505, 0x59357cbe, 0xedbd15c8, 0x7f97c5ab, 0xba5ac7b5, 0xb6f6deaf, 0x3a479c3a, 0x5302da25,
-                0x653d7e6a, 0x54268d49, 0x51a477ea, 0x5017d55b, 0xd7d25d88, 0x44136c76, 0x0404a8c8, 0xb8e5a121,
-                0xb81a928a, 0x60ed5869, 0x97c55b96, 0xeaec991b, 0x29935913, 0x01fdb7f1, 0x088e8dfa, 0x9ab6f6f5,
-                0x3b4cbf9f, 0x4a5de3ab, 0xe6051d35, 0xa0e1d855, 0xd36b4cf1, 0xf544edeb, 0xb0e93524, 0xbebb8fbd,
-                0xa2d762cf, 0x49c92f54, 0x38b5f331, 0x7128a454, 0x48392905, 0xa65b1db8, 0x851c97bd, 0xd675cf2f
-            };
-
-        internal static readonly uint[] S7 =
-            {
-                0x85e04019, 0x332bf567, 0x662dbfff, 0xcfc65693, 0x2a8d7f6f, 0xab9bc912, 0xde6008a1, 0x2028da1f,
-                0x0227bce7, 0x4d642916, 0x18fac300, 0x50f18b82, 0x2cb2cb11, 0xb232e75c, 0x4b3695f2, 0xb28707de,
-                0xa05fbcf6, 0xcd4181e9, 0xe150210c, 0xe24ef1bd, 0xb168c381, 0xfde4e789, 0x5c79b0d8, 0x1e8bfd43,
-                0x4d495001, 0x38be4341, 0x913cee1d, 0x92a79c3f, 0x089766be, 0xbaeeadf4, 0x1286becf, 0xb6eacb19,
-                0x2660c200, 0x7565bde4, 0x64241f7a, 0x8248dca9, 0xc3b3ad66, 0x28136086, 0x0bd8dfa8, 0x356d1cf2,
-                0x107789be, 0xb3b2e9ce, 0x0502aa8f, 0x0bc0351e, 0x166bf52a, 0xeb12ff82, 0xe3486911, 0xd34d7516,
-                0x4e7b3aff, 0x5f43671b, 0x9cf6e037, 0x4981ac83, 0x334266ce, 0x8c9341b7, 0xd0d854c0, 0xcb3a6c88,
-                0x47bc2829, 0x4725ba37, 0xa66ad22b, 0x7ad61f1e, 0x0c5cbafa, 0x4437f107, 0xb6e79962, 0x42d2d816,
-                0x0a961288, 0xe1a5c06e, 0x13749e67, 0x72fc081a, 0xb1d139f7, 0xf9583745, 0xcf19df58, 0xbec3f756,
-                0xc06eba30, 0x07211b24, 0x45c28829, 0xc95e317f, 0xbc8ec511, 0x38bc46e9, 0xc6e6fa14, 0xbae8584a,
-                0xad4ebc46, 0x468f508b, 0x7829435f, 0xf124183b, 0x821dba9f, 0xaff60ff4, 0xea2c4e6d, 0x16e39264,
-                0x92544a8b, 0x009b4fc3, 0xaba68ced, 0x9ac96f78, 0x06a5b79a, 0xb2856e6e, 0x1aec3ca9, 0xbe838688,
-                0x0e0804e9, 0x55f1be56, 0xe7e5363b, 0xb3a1f25d, 0xf7debb85, 0x61fe033c, 0x16746233, 0x3c034c28,
-                0xda6d0c74, 0x79aac56c, 0x3ce4e1ad, 0x51f0c802, 0x98f8f35a, 0x1626a49f, 0xeed82b29, 0x1d382fe3,
-                0x0c4fb99a, 0xbb325778, 0x3ec6d97b, 0x6e77a6a9, 0xcb658b5c, 0xd45230c7, 0x2bd1408b, 0x60c03eb7,
-                0xb9068d78, 0xa33754f4, 0xf430c87d, 0xc8a71302, 0xb96d8c32, 0xebd4e7be, 0xbe8b9d2d, 0x7979fb06,
-                0xe7225308, 0x8b75cf77, 0x11ef8da4, 0xe083c858, 0x8d6b786f, 0x5a6317a6, 0xfa5cf7a0, 0x5dda0033,
-                0xf28ebfb0, 0xf5b9c310, 0xa0eac280, 0x08b9767a, 0xa3d9d2b0, 0x79d34217, 0x021a718d, 0x9ac6336a,
-                0x2711fd60, 0x438050e3, 0x069908a8, 0x3d7fedc4, 0x826d2bef, 0x4eeb8476, 0x488dcf25, 0x36c9d566,
-                0x28e74e41, 0xc2610aca, 0x3d49a9cf, 0xbae3b9df, 0xb65f8de6, 0x92aeaf64, 0x3ac7d5e6, 0x9ea80509,
-                0xf22b017d, 0xa4173f70, 0xdd1e16c3, 0x15e0d7f9, 0x50b1b887, 0x2b9f4fd5, 0x625aba82, 0x6a017962,
-                0x2ec01b9c, 0x15488aa9, 0xd716e740, 0x40055a2c, 0x93d29a22, 0xe32dbf9a, 0x058745b9, 0x3453dc1e,
-                0xd699296e, 0x496cff6f, 0x1c9f4986, 0xdfe2ed07, 0xb87242d1, 0x19de7eae, 0x053e561a, 0x15ad6f8c,
-                0x66626c1c, 0x7154c24c, 0xea082b2a, 0x93eb2939, 0x17dcb0f0, 0x58d4f2ae, 0x9ea294fb, 0x52cf564c,
-                0x9883fe66, 0x2ec40581, 0x763953c3, 0x01d6692e, 0xd3a0c108, 0xa1e7160e, 0xe4f2dfa6, 0x693ed285,
-                0x74904698, 0x4c2b0edd, 0x4f757656, 0x5d393378, 0xa132234f, 0x3d321c5d, 0xc3f5e194, 0x4b269301,
-                0xc79f022f, 0x3c997e7e, 0x5e4f9504, 0x3ffafbbd, 0x76f7ad0e, 0x296693f4, 0x3d1fce6f, 0xc61e45be,
-                0xd3b5ab34, 0xf72bf9b7, 0x1b0434c0, 0x4e72b567, 0x5592a33d, 0xb5229301, 0xcfd2a87f, 0x60aeb767,
-                0x1814386b, 0x30bcc33d, 0x38a0c07d, 0xfd1606f2, 0xc363519b, 0x589dd390, 0x5479f8e6, 0x1cb8d647,
-                0x97fd61a9, 0xea7759f4, 0x2d57539d, 0x569a58cf, 0xe84e63ad, 0x462e1b78, 0x6580f87e, 0xf3817914,
-                0x91da55f4, 0x40a230f3, 0xd1988f35, 0xb6e318d2, 0x3ffa50bc, 0x3d40f021, 0xc3c0bdae, 0x4958c24c,
-                0x518f36b2, 0x84b1d370, 0x0fedce83, 0x878ddada, 0xf2a279c7, 0x94e01be8, 0x90716f4b, 0x954b8aa3
-            };
-
-        internal static readonly uint[] S8 =
-            {
-                0xe216300d, 0xbbddfffc, 0xa7ebdabd, 0x35648095, 0x7789f8b7, 0xe6c1121b, 0x0e241600, 0x052ce8b5,
-                0x11a9cfb0, 0xe5952f11, 0xece7990a, 0x9386d174, 0x2a42931c, 0x76e38111, 0xb12def3a, 0x37ddddfc,
-                0xde9adeb1, 0x0a0cc32c, 0xbe197029, 0x84a00940, 0xbb243a0f, 0xb4d137cf, 0xb44e79f0, 0x049eedfd,
-                0x0b15a15d, 0x480d3168, 0x8bbbde5a, 0x669ded42, 0xc7ece831, 0x3f8f95e7, 0x72df191b, 0x7580330d,
-                0x94074251, 0x5c7dcdfa, 0xabbe6d63, 0xaa402164, 0xb301d40a, 0x02e7d1ca, 0x53571dae, 0x7a3182a2,
-                0x12a8ddec, 0xfdaa335d, 0x176f43e8, 0x71fb46d4, 0x38129022, 0xce949ad4, 0xb84769ad, 0x965bd862,
-                0x82f3d055, 0x66fb9767, 0x15b80b4e, 0x1d5b47a0, 0x4cfde06f, 0xc28ec4b8, 0x57e8726e, 0x647a78fc,
-                0x99865d44, 0x608bd593, 0x6c200e03, 0x39dc5ff6, 0x5d0b00a3, 0xae63aff2, 0x7e8bd632, 0x70108c0c,
-                0xbbd35049, 0x2998df04, 0x980cf42a, 0x9b6df491, 0x9e7edd53, 0x06918548, 0x58cb7e07, 0x3b74ef2e,
-                0x522fffb1, 0xd24708cc, 0x1c7e27cd, 0xa4eb215b, 0x3cf1d2e2, 0x19b47a38, 0x424f7618, 0x35856039,
-                0x9d17dee7, 0x27eb35e6, 0xc9aff67b, 0x36baf5b8, 0x09c467cd, 0xc18910b1, 0xe11dbf7b, 0x06cd1af8,
-                0x7170c608, 0x2d5e3354, 0xd4de495a, 0x64c6d006, 0xbcc0c62c, 0x3dd00db3, 0x708f8f34, 0x77d51b42,
-                0x264f620f, 0x24b8d2bf, 0x15c1b79e, 0x46a52564, 0xf8d7e54e, 0x3e378160, 0x7895cda5, 0x859c15a5,
-                0xe6459788, 0xc37bc75f, 0xdb07ba0c, 0x0676a3ab, 0x7f229b1e, 0x31842e7b, 0x24259fd7, 0xf8bef472,
-                0x835ffcb8, 0x6df4c1f2, 0x96f5b195, 0xfd0af0fc, 0xb0fe134c, 0xe2506d3d, 0x4f9b12ea, 0xf215f225,
-                0xa223736f, 0x9fb4c428, 0x25d04979, 0x34c713f8, 0xc4618187, 0xea7a6e98, 0x7cd16efc, 0x1436876c,
-                0xf1544107, 0xbedeee14, 0x56e9af27, 0xa04aa441, 0x3cf7c899, 0x92ecbae6, 0xdd67016d, 0x151682eb,
-                0xa842eedf, 0xfdba60b4, 0xf1907b75, 0x20e3030f, 0x24d8c29e, 0xe139673b, 0xefa63fb8, 0x71873054,
-                0xb6f2cf3b, 0x9f326442, 0xcb15a4cc, 0xb01a4504, 0xf1e47d8d, 0x844a1be5, 0xbae7dfdc, 0x42cbda70,
-                0xcd7dae0a, 0x57e85b7a, 0xd53f5af6, 0x20cf4d8c, 0xcea4d428, 0x79d130a4, 0x3486ebfb, 0x33d3cddc,
-                0x77853b53, 0x37effcb5, 0xc5068778, 0xe580b3e6, 0x4e68b8f4, 0xc5c8b37e, 0x0d809ea2, 0x398feb7c,
-                0x132a4f94, 0x43b7950e, 0x2fee7d1c, 0x223613bd, 0xdd06caa2, 0x37df932b, 0xc4248289, 0xacf3ebc3,
-                0x5715f6b7, 0xef3478dd, 0xf267616f, 0xc148cbe4, 0x9052815e, 0x5e410fab, 0xb48a2465, 0x2eda7fa4,
-                0xe87b40e4, 0xe98ea084, 0x5889e9e1, 0xefd390fc, 0xdd07d35b, 0xdb485694, 0x38d7e5b2, 0x57720101,
-                0x730edebc, 0x5b643113, 0x94917e4f, 0x503c2fba, 0x646f1282, 0x7523d24a, 0xe0779695, 0xf9c17a8f,
-                0x7a5b2121, 0xd187b896, 0x29263a4d, 0xba510cdf, 0x81f47c9f, 0xad1163ed, 0xea7b5965, 0x1a00726e,
-                0x11403092, 0x00da6d77, 0x4a0cdd61, 0xad1f4603, 0x605bdfb0, 0x9eedc364, 0x22ebe6a8, 0xcee7d28a,
-                0xa0e736a0, 0x5564a6b9, 0x10853209, 0xc7eb8f37, 0x2de705ca, 0x8951570f, 0xdf09822b, 0xbd691a6c,
-                0xaa12e4f2, 0x87451c0f, 0xe0f6a27a, 0x3ada4819, 0x4cf1764f, 0x0d771c2b, 0x67cdb156, 0x350d8384,
-                0x5938fa0f, 0x42399ef3, 0x36997b07, 0x0e84093d, 0x4aa93e61, 0x8360d87b, 0x1fa98b0c, 0x1149382c,
-                0xe97625a5, 0x0614d1b7, 0x0e25244b, 0x0c768347, 0x589e8d82, 0x0d2059d1, 0xa466bb1e, 0xf8da0a82,
-                0x04f19130, 0xba6e4ec0, 0x99265164, 0x1ee7230d, 0x50b2ad80, 0xeaee6801, 0x8db2a283, 0xea8bf59e
-            };
-
-        #endregion
-
-        /// <summary>
-        /// Sets the subkeys using the same nomenclatureas described in RFC2144.
-        /// </summary>
-        /// <param name="key">The key.</param>
-        private void SetKey(byte[] key)
-        {
-            /*
-            * Determine the key size here, if required
-            *
-            * if keysize <= 80bits, use 12 rounds instead of 16
-            * if keysize < 128bits, pad with 0
-            *
-            * Typical key sizes => 40, 64, 80, 128
-            */
-
-            if (key.Length < 11)
-            {
-                _rounds = RedRounds;
-            }
-
-            var z = new int[16];
-            var x = new int[16];
-
-            /* copy the key into x */
-            for (var i = 0; i < key.Length; i++)
-            {
-                x[i] = key[i] & 0xff;
-            }
-
-            /*
-            * This will look different because the selection of
-            * bytes from the input key I've already chosen the
-            * correct int.
-            */
-            var x03 = IntsTo32Bits(x, 0x0);
-            var x47 = IntsTo32Bits(x, 0x4);
-            var x8B = IntsTo32Bits(x, 0x8);
-            var xCf = IntsTo32Bits(x, 0xC);
-
-            var z03 = x03 ^ S5[x[0xD]] ^ S6[x[0xF]] ^ S7[x[0xC]] ^ S8[x[0xE]] ^ S7[x[0x8]];
-
-            Bits32ToInts(z03, z, 0x0);
-            var z47 = x8B ^ S5[z[0x0]] ^ S6[z[0x2]] ^ S7[z[0x1]] ^ S8[z[0x3]] ^ S8[x[0xA]];
-            Bits32ToInts(z47, z, 0x4);
-            var z8B = xCf ^ S5[z[0x7]] ^ S6[z[0x6]] ^ S7[z[0x5]] ^ S8[z[0x4]] ^ S5[x[0x9]];
-            Bits32ToInts(z8B, z, 0x8);
-            var zCf = x47 ^ S5[z[0xA]] ^ S6[z[0x9]] ^ S7[z[0xB]] ^ S8[z[0x8]] ^ S6[x[0xB]];
-            Bits32ToInts(zCf, z, 0xC);
-            _km[1] = S5[z[0x8]] ^ S6[z[0x9]] ^ S7[z[0x7]] ^ S8[z[0x6]] ^ S5[z[0x2]];
-            _km[2] = S5[z[0xA]] ^ S6[z[0xB]] ^ S7[z[0x5]] ^ S8[z[0x4]] ^ S6[z[0x6]];
-            _km[3] = S5[z[0xC]] ^ S6[z[0xD]] ^ S7[z[0x3]] ^ S8[z[0x2]] ^ S7[z[0x9]];
-            _km[4] = S5[z[0xE]] ^ S6[z[0xF]] ^ S7[z[0x1]] ^ S8[z[0x0]] ^ S8[z[0xC]];
-
-            z03 = IntsTo32Bits(z, 0x0);
-            z47 = IntsTo32Bits(z, 0x4);
-            z8B = IntsTo32Bits(z, 0x8);
-            zCf = IntsTo32Bits(z, 0xC);
-            x03 = z8B ^ S5[z[0x5]] ^ S6[z[0x7]] ^ S7[z[0x4]] ^ S8[z[0x6]] ^ S7[z[0x0]];
-            Bits32ToInts(x03, x, 0x0);
-            x47 = z03 ^ S5[x[0x0]] ^ S6[x[0x2]] ^ S7[x[0x1]] ^ S8[x[0x3]] ^ S8[z[0x2]];
-            Bits32ToInts(x47, x, 0x4);
-            x8B = z47 ^ S5[x[0x7]] ^ S6[x[0x6]] ^ S7[x[0x5]] ^ S8[x[0x4]] ^ S5[z[0x1]];
-            Bits32ToInts(x8B, x, 0x8);
-            xCf = zCf ^ S5[x[0xA]] ^ S6[x[0x9]] ^ S7[x[0xB]] ^ S8[x[0x8]] ^ S6[z[0x3]];
-            Bits32ToInts(xCf, x, 0xC);
-            _km[5] = S5[x[0x3]] ^ S6[x[0x2]] ^ S7[x[0xC]] ^ S8[x[0xD]] ^ S5[x[0x8]];
-            _km[6] = S5[x[0x1]] ^ S6[x[0x0]] ^ S7[x[0xE]] ^ S8[x[0xF]] ^ S6[x[0xD]];
-            _km[7] = S5[x[0x7]] ^ S6[x[0x6]] ^ S7[x[0x8]] ^ S8[x[0x9]] ^ S7[x[0x3]];
-            _km[8] = S5[x[0x5]] ^ S6[x[0x4]] ^ S7[x[0xA]] ^ S8[x[0xB]] ^ S8[x[0x7]];
-
-            x03 = IntsTo32Bits(x, 0x0);
-            x47 = IntsTo32Bits(x, 0x4);
-            x8B = IntsTo32Bits(x, 0x8);
-            xCf = IntsTo32Bits(x, 0xC);
-            z03 = x03 ^ S5[x[0xD]] ^ S6[x[0xF]] ^ S7[x[0xC]] ^ S8[x[0xE]] ^ S7[x[0x8]];
-            Bits32ToInts(z03, z, 0x0);
-            z47 = x8B ^ S5[z[0x0]] ^ S6[z[0x2]] ^ S7[z[0x1]] ^ S8[z[0x3]] ^ S8[x[0xA]];
-            Bits32ToInts(z47, z, 0x4);
-            z8B = xCf ^ S5[z[0x7]] ^ S6[z[0x6]] ^ S7[z[0x5]] ^ S8[z[0x4]] ^ S5[x[0x9]];
-            Bits32ToInts(z8B, z, 0x8);
-            zCf = x47 ^ S5[z[0xA]] ^ S6[z[0x9]] ^ S7[z[0xB]] ^ S8[z[0x8]] ^ S6[x[0xB]];
-            Bits32ToInts(zCf, z, 0xC);
-            _km[9] = S5[z[0x3]] ^ S6[z[0x2]] ^ S7[z[0xC]] ^ S8[z[0xD]] ^ S5[z[0x9]];
-            _km[10] = S5[z[0x1]] ^ S6[z[0x0]] ^ S7[z[0xE]] ^ S8[z[0xF]] ^ S6[z[0xc]];
-            _km[11] = S5[z[0x7]] ^ S6[z[0x6]] ^ S7[z[0x8]] ^ S8[z[0x9]] ^ S7[z[0x2]];
-            _km[12] = S5[z[0x5]] ^ S6[z[0x4]] ^ S7[z[0xA]] ^ S8[z[0xB]] ^ S8[z[0x6]];
-
-            z03 = IntsTo32Bits(z, 0x0);
-            z47 = IntsTo32Bits(z, 0x4);
-            z8B = IntsTo32Bits(z, 0x8);
-            zCf = IntsTo32Bits(z, 0xC);
-            x03 = z8B ^ S5[z[0x5]] ^ S6[z[0x7]] ^ S7[z[0x4]] ^ S8[z[0x6]] ^ S7[z[0x0]];
-            Bits32ToInts(x03, x, 0x0);
-            x47 = z03 ^ S5[x[0x0]] ^ S6[x[0x2]] ^ S7[x[0x1]] ^ S8[x[0x3]] ^ S8[z[0x2]];
-            Bits32ToInts(x47, x, 0x4);
-            x8B = z47 ^ S5[x[0x7]] ^ S6[x[0x6]] ^ S7[x[0x5]] ^ S8[x[0x4]] ^ S5[z[0x1]];
-            Bits32ToInts(x8B, x, 0x8);
-            xCf = zCf ^ S5[x[0xA]] ^ S6[x[0x9]] ^ S7[x[0xB]] ^ S8[x[0x8]] ^ S6[z[0x3]];
-            Bits32ToInts(xCf, x, 0xC);
-            _km[13] = S5[x[0x8]] ^ S6[x[0x9]] ^ S7[x[0x7]] ^ S8[x[0x6]] ^ S5[x[0x3]];
-            _km[14] = S5[x[0xA]] ^ S6[x[0xB]] ^ S7[x[0x5]] ^ S8[x[0x4]] ^ S6[x[0x7]];
-            _km[15] = S5[x[0xC]] ^ S6[x[0xD]] ^ S7[x[0x3]] ^ S8[x[0x2]] ^ S7[x[0x8]];
-            _km[16] = S5[x[0xE]] ^ S6[x[0xF]] ^ S7[x[0x1]] ^ S8[x[0x0]] ^ S8[x[0xD]];
-
-            x03 = IntsTo32Bits(x, 0x0);
-            x47 = IntsTo32Bits(x, 0x4);
-            x8B = IntsTo32Bits(x, 0x8);
-            xCf = IntsTo32Bits(x, 0xC);
-            z03 = x03 ^ S5[x[0xD]] ^ S6[x[0xF]] ^ S7[x[0xC]] ^ S8[x[0xE]] ^ S7[x[0x8]];
-            Bits32ToInts(z03, z, 0x0);
-            z47 = x8B ^ S5[z[0x0]] ^ S6[z[0x2]] ^ S7[z[0x1]] ^ S8[z[0x3]] ^ S8[x[0xA]];
-            Bits32ToInts(z47, z, 0x4);
-            z8B = xCf ^ S5[z[0x7]] ^ S6[z[0x6]] ^ S7[z[0x5]] ^ S8[z[0x4]] ^ S5[x[0x9]];
-            Bits32ToInts(z8B, z, 0x8);
-            zCf = x47 ^ S5[z[0xA]] ^ S6[z[0x9]] ^ S7[z[0xB]] ^ S8[z[0x8]] ^ S6[x[0xB]];
-            Bits32ToInts(zCf, z, 0xC);
-            _kr[1] = (int)((S5[z[0x8]] ^ S6[z[0x9]] ^ S7[z[0x7]] ^ S8[z[0x6]] ^ S5[z[0x2]]) & 0x1f);
-            _kr[2] = (int)((S5[z[0xA]] ^ S6[z[0xB]] ^ S7[z[0x5]] ^ S8[z[0x4]] ^ S6[z[0x6]]) & 0x1f);
-            _kr[3] = (int)((S5[z[0xC]] ^ S6[z[0xD]] ^ S7[z[0x3]] ^ S8[z[0x2]] ^ S7[z[0x9]]) & 0x1f);
-            _kr[4] = (int)((S5[z[0xE]] ^ S6[z[0xF]] ^ S7[z[0x1]] ^ S8[z[0x0]] ^ S8[z[0xC]]) & 0x1f);
-
-            z03 = IntsTo32Bits(z, 0x0);
-            z47 = IntsTo32Bits(z, 0x4);
-            z8B = IntsTo32Bits(z, 0x8);
-            zCf = IntsTo32Bits(z, 0xC);
-            x03 = z8B ^ S5[z[0x5]] ^ S6[z[0x7]] ^ S7[z[0x4]] ^ S8[z[0x6]] ^ S7[z[0x0]];
-            Bits32ToInts(x03, x, 0x0);
-            x47 = z03 ^ S5[x[0x0]] ^ S6[x[0x2]] ^ S7[x[0x1]] ^ S8[x[0x3]] ^ S8[z[0x2]];
-            Bits32ToInts(x47, x, 0x4);
-            x8B = z47 ^ S5[x[0x7]] ^ S6[x[0x6]] ^ S7[x[0x5]] ^ S8[x[0x4]] ^ S5[z[0x1]];
-            Bits32ToInts(x8B, x, 0x8);
-            xCf = zCf ^ S5[x[0xA]] ^ S6[x[0x9]] ^ S7[x[0xB]] ^ S8[x[0x8]] ^ S6[z[0x3]];
-            Bits32ToInts(xCf, x, 0xC);
-            _kr[5] = (int)((S5[x[0x3]] ^ S6[x[0x2]] ^ S7[x[0xC]] ^ S8[x[0xD]] ^ S5[x[0x8]]) & 0x1f);
-            _kr[6] = (int)((S5[x[0x1]] ^ S6[x[0x0]] ^ S7[x[0xE]] ^ S8[x[0xF]] ^ S6[x[0xD]]) & 0x1f);
-            _kr[7] = (int)((S5[x[0x7]] ^ S6[x[0x6]] ^ S7[x[0x8]] ^ S8[x[0x9]] ^ S7[x[0x3]]) & 0x1f);
-            _kr[8] = (int)((S5[x[0x5]] ^ S6[x[0x4]] ^ S7[x[0xA]] ^ S8[x[0xB]] ^ S8[x[0x7]]) & 0x1f);
-
-            x03 = IntsTo32Bits(x, 0x0);
-            x47 = IntsTo32Bits(x, 0x4);
-            x8B = IntsTo32Bits(x, 0x8);
-            xCf = IntsTo32Bits(x, 0xC);
-            z03 = x03 ^ S5[x[0xD]] ^ S6[x[0xF]] ^ S7[x[0xC]] ^ S8[x[0xE]] ^ S7[x[0x8]];
-            Bits32ToInts(z03, z, 0x0);
-            z47 = x8B ^ S5[z[0x0]] ^ S6[z[0x2]] ^ S7[z[0x1]] ^ S8[z[0x3]] ^ S8[x[0xA]];
-            Bits32ToInts(z47, z, 0x4);
-            z8B = xCf ^ S5[z[0x7]] ^ S6[z[0x6]] ^ S7[z[0x5]] ^ S8[z[0x4]] ^ S5[x[0x9]];
-            Bits32ToInts(z8B, z, 0x8);
-            zCf = x47 ^ S5[z[0xA]] ^ S6[z[0x9]] ^ S7[z[0xB]] ^ S8[z[0x8]] ^ S6[x[0xB]];
-            Bits32ToInts(zCf, z, 0xC);
-            _kr[9] = (int)((S5[z[0x3]] ^ S6[z[0x2]] ^ S7[z[0xC]] ^ S8[z[0xD]] ^ S5[z[0x9]]) & 0x1f);
-            _kr[10] = (int)((S5[z[0x1]] ^ S6[z[0x0]] ^ S7[z[0xE]] ^ S8[z[0xF]] ^ S6[z[0xc]]) & 0x1f);
-            _kr[11] = (int)((S5[z[0x7]] ^ S6[z[0x6]] ^ S7[z[0x8]] ^ S8[z[0x9]] ^ S7[z[0x2]]) & 0x1f);
-            _kr[12] = (int)((S5[z[0x5]] ^ S6[z[0x4]] ^ S7[z[0xA]] ^ S8[z[0xB]] ^ S8[z[0x6]]) & 0x1f);
-
-            z03 = IntsTo32Bits(z, 0x0);
-            z47 = IntsTo32Bits(z, 0x4);
-            z8B = IntsTo32Bits(z, 0x8);
-            zCf = IntsTo32Bits(z, 0xC);
-            x03 = z8B ^ S5[z[0x5]] ^ S6[z[0x7]] ^ S7[z[0x4]] ^ S8[z[0x6]] ^ S7[z[0x0]];
-            Bits32ToInts(x03, x, 0x0);
-            x47 = z03 ^ S5[x[0x0]] ^ S6[x[0x2]] ^ S7[x[0x1]] ^ S8[x[0x3]] ^ S8[z[0x2]];
-            Bits32ToInts(x47, x, 0x4);
-            x8B = z47 ^ S5[x[0x7]] ^ S6[x[0x6]] ^ S7[x[0x5]] ^ S8[x[0x4]] ^ S5[z[0x1]];
-            Bits32ToInts(x8B, x, 0x8);
-            xCf = zCf ^ S5[x[0xA]] ^ S6[x[0x9]] ^ S7[x[0xB]] ^ S8[x[0x8]] ^ S6[z[0x3]];
-            Bits32ToInts(xCf, x, 0xC);
-            _kr[13] = (int)((S5[x[0x8]] ^ S6[x[0x9]] ^ S7[x[0x7]] ^ S8[x[0x6]] ^ S5[x[0x3]]) & 0x1f);
-            _kr[14] = (int)((S5[x[0xA]] ^ S6[x[0xB]] ^ S7[x[0x5]] ^ S8[x[0x4]] ^ S6[x[0x7]]) & 0x1f);
-            _kr[15] = (int)((S5[x[0xC]] ^ S6[x[0xD]] ^ S7[x[0x3]] ^ S8[x[0x2]] ^ S7[x[0x8]]) & 0x1f);
-            _kr[16] = (int)((S5[x[0xE]] ^ S6[x[0xF]] ^ S7[x[0x1]] ^ S8[x[0x0]] ^ S8[x[0xD]]) & 0x1f);
-        }
-
-        /// <summary>
-        /// The first of the three processing functions for the encryption and decryption.
-        /// </summary>
-        /// <param name="d">The input to be processed.</param>
-        /// <param name="kmi">The mask to be used from Km[n].</param>
-        /// <param name="kri">The rotation value to be used.</param>
-        private static uint F1(uint d, uint kmi, int kri)
-        {
-            var I = kmi + d;
-            I = I << kri | (I >> (32 - kri));
-            return ((S1[(I >> 24) & 0xff] ^ S2[(I >> 16) & 0xff]) - S3[(I >> 8) & 0xff]) + S4[I & 0xff];
-        }
-
-        /// <summary>
-        /// The second of the three processing functions for the encryption and decryption.
-        /// </summary>
-        /// <param name="d">The input to be processed.</param>
-        /// <param name="kmi">The mask to be used from Km[n].</param>
-        /// <param name="kri">The rotation value to be used.</param>
-        private static uint F2(uint d, uint kmi, int kri)
-        {
-            var I = kmi ^ d;
-            I = I << kri | (I >> (32 - kri));
-            return ((S1[(I >> 24) & 0xff] - S2[(I >> 16) & 0xff]) + S3[(I >> 8) & 0xff]) ^ S4[I & 0xff];
-        }
-
-        /// <summary>
-        /// The third of the three processing functions for the encryption and decryption.
-        /// </summary>
-        /// <param name="d">The input to be processed.</param>
-        /// <param name="kmi">The mask to be used from Km[n].</param>
-        /// <param name="kri">The rotation value to be used.</param>
-        private static uint F3(uint d, uint kmi, int kri)
-        {
-            var I = kmi - d;
-            I = I << kri | (I >> (32 - kri));
-            return ((S1[(I >> 24) & 0xff] + S2[(I >> 16) & 0xff]) ^ S3[(I >> 8) & 0xff]) - S4[I & 0xff];
-        }
-
-        /// <summary>
-        /// Does the 16 rounds to encrypt the block.
-        /// </summary>
-        /// <param name="l0">The LH-32bits of the plaintext block.</param>
-        /// <param name="r0">The RH-32bits of the plaintext block.</param>
-        /// <param name="result">The result.</param>
-        private void CastEncipher(uint l0, uint r0, uint[] result)
-        {
-            uint li = l0, ri = r0;
-
-            for (var i = 1; i <= _rounds; i++)
-            {
-                var lp = li;        // the previous value, equiv to L[i-1]
-                var rp = ri;        // equivalent to R[i-1]
-
-                li = rp;
-
-                switch (i)
-                {
-                    case 1:
-                    case 4:
-                    case 7:
-                    case 10:
-                    case 13:
-                    case 16:
-                        ri = lp ^ F1(rp, _km[i], _kr[i]);
-                        break;
-                    case 2:
-                    case 5:
-                    case 8:
-                    case 11:
-                    case 14:
-                        ri = lp ^ F2(rp, _km[i], _kr[i]);
-                        break;
-                    case 3:
-                    case 6:
-                    case 9:
-                    case 12:
-                    case 15:
-                        ri = lp ^ F3(rp, _km[i], _kr[i]);
-                        break;
-                    default:
-                        // We should never get here as max. rounds is 16
-                        break;
-                }
-            }
-
-            result[0] = ri;
-            result[1] = li;
-        }
-
-        private void CastDecipher(uint l16, uint r16, uint[] result)
-        {
-            uint li = l16, ri = r16;
-
-            for (var i = _rounds; i > 0; i--)
-            {
-                var lp = li;        // the previous value, equiv to L[i-1]
-                var rp = ri;        // equivalent to R[i-1]
-
-                li = rp;
-
-                switch (i)
-                {
-                    case 1:
-                    case 4:
-                    case 7:
-                    case 10:
-                    case 13:
-                    case 16:
-                        ri = lp ^ F1(rp, _km[i], _kr[i]);
-                        break;
-                    case 2:
-                    case 5:
-                    case 8:
-                    case 11:
-                    case 14:
-                        ri = lp ^ F2(rp, _km[i], _kr[i]);
-                        break;
-                    case 3:
-                    case 6:
-                    case 9:
-                    case 12:
-                    case 15:
-                        ri = lp ^ F3(rp, _km[i], _kr[i]);
-                        break;
-                    default:
-                        // We should never get here as max. rounds is 16
-                        break;
-                }
-            }
-
-            result[0] = ri;
-            result[1] = li;
-        }
-
-        private static void Bits32ToInts(uint inData, int[] b, int offset)
-        {
-            b[offset + 3] = (int)(inData & 0xff);
-            b[offset + 2] = (int)((inData >> 8) & 0xff);
-            b[offset + 1] = (int)((inData >> 16) & 0xff);
-            b[offset] = (int)((inData >> 24) & 0xff);
-        }
-
-        private static uint IntsTo32Bits(int[] b, int i)
-        {
-            return (uint)(((b[i] & 0xff) << 24) |
-                           ((b[i + 1] & 0xff) << 16) |
-                           ((b[i + 2] & 0xff) << 8) |
-                           (b[i + 3] & 0xff));
-        }
-    }
-}

+ 0 - 49
src/Renci.SshNet/Security/Cryptography/Ciphers/Paddings/PKCS5Padding.cs

@@ -1,49 +0,0 @@
-using System;
-
-namespace Renci.SshNet.Security.Cryptography.Ciphers.Paddings
-{
-    /// <summary>
-    /// Implements PKCS5 cipher padding.
-    /// </summary>
-    public class PKCS5Padding : CipherPadding
-    {
-        /// <summary>
-        /// Pads the specified input to match the block size.
-        /// </summary>
-        /// <param name="blockSize">The size of the block.</param>
-        /// <param name="input">The input.</param>
-        /// <param name="offset">The zero-based offset in <paramref name="input"/> at which the data to pad starts.</param>
-        /// <param name="length">The number of bytes in <paramref name="input"/> to take into account.</param>
-        /// <returns>
-        /// The padded data array.
-        /// </returns>
-        public override byte[] Pad(int blockSize, byte[] input, int offset, int length)
-        {
-            var numOfPaddedBytes = blockSize - (length % blockSize);
-            return Pad(input, offset, length, numOfPaddedBytes);
-        }
-
-        /// <summary>
-        /// Pads the specified input with a given number of bytes.
-        /// </summary>
-        /// <param name="input">The input.</param>
-        /// <param name="offset">The zero-based offset in <paramref name="input"/> at which the data to pad starts.</param>
-        /// <param name="length">The number of bytes in <paramref name="input"/> to take into account.</param>
-        /// <param name="paddinglength">The number of bytes to pad the input with.</param>
-        /// <returns>
-        /// The padded data array.
-        /// </returns>
-        public override byte[] Pad(byte[] input, int offset, int length, int paddinglength)
-        {
-            var output = new byte[length + paddinglength];
-            Buffer.BlockCopy(input, offset, output, 0, length);
-
-            for (var i = 0; i < paddinglength; i++)
-            {
-                output[length + i] = (byte)paddinglength;
-            }
-
-            return output;
-        }
-    }
-}

+ 0 - 1119
src/Renci.SshNet/Security/Cryptography/Ciphers/SerpentCipher.cs

@@ -1,1119 +0,0 @@
-using System;
-
-namespace Renci.SshNet.Security.Cryptography.Ciphers
-{
-    /// <summary>
-    /// Implements Serpent cipher algorithm.
-    /// </summary>
-    public sealed class SerpentCipher : BlockCipher
-    {
-        private const int Rounds = 32;
-        private const int Phi = unchecked((int)0x9E3779B9); // (Sqrt(5) - 1) * 2**31
-
-        private readonly int[] _workingKey;
-
-        // registers
-        private int _x0;
-        private int _x1;
-        private int _x2;
-        private int _x3;
-
-        /// <summary>
-        /// Initializes a new instance of the <see cref="SerpentCipher"/> class.
-        /// </summary>
-        /// <param name="key">The key.</param>
-        /// <param name="mode">The mode.</param>
-        /// <param name="padding">The padding.</param>
-        /// <exception cref="ArgumentNullException"><paramref name="key"/> is <see langword="null"/>.</exception>
-        /// <exception cref="ArgumentException">Keysize is not valid for this algorithm.</exception>
-        public SerpentCipher(byte[] key, CipherMode mode, CipherPadding padding)
-            : base(key, 16, mode, padding)
-        {
-            var keySize = key.Length * 8;
-
-            if (keySize is not (128 or 192 or 256))
-            {
-                throw new ArgumentException(string.Format("KeySize '{0}' is not valid for this algorithm.", keySize));
-            }
-
-            _workingKey = MakeWorkingKey(key);
-        }
-
-        /// <summary>
-        /// Encrypts the specified region of the input byte array and copies the encrypted data to the specified region of the output byte array.
-        /// </summary>
-        /// <param name="inputBuffer">The input data to encrypt.</param>
-        /// <param name="inputOffset">The offset into the input byte array from which to begin using data.</param>
-        /// <param name="inputCount">The number of bytes in the input byte array to use as data.</param>
-        /// <param name="outputBuffer">The output to which to write encrypted data.</param>
-        /// <param name="outputOffset">The offset into the output byte array from which to begin writing data.</param>
-        /// <returns>
-        /// The number of bytes encrypted.
-        /// </returns>
-        public override int EncryptBlock(byte[] inputBuffer, int inputOffset, int inputCount, byte[] outputBuffer, int outputOffset)
-        {
-            if (inputCount != BlockSize)
-            {
-                throw new ArgumentException("inputCount");
-            }
-
-            _x3 = BytesToWord(inputBuffer, inputOffset);
-            _x2 = BytesToWord(inputBuffer, inputOffset + 4);
-            _x1 = BytesToWord(inputBuffer, inputOffset + 8);
-            _x0 = BytesToWord(inputBuffer, inputOffset + 12);
-
-            Sb0(_workingKey[0] ^ _x0, _workingKey[1] ^ _x1, _workingKey[2] ^ _x2, _workingKey[3] ^ _x3);
-            LT();
-            Sb1(_workingKey[4] ^ _x0, _workingKey[5] ^ _x1, _workingKey[6] ^ _x2, _workingKey[7] ^ _x3);
-            LT();
-            Sb2(_workingKey[8] ^ _x0, _workingKey[9] ^ _x1, _workingKey[10] ^ _x2, _workingKey[11] ^ _x3);
-            LT();
-            Sb3(_workingKey[12] ^ _x0, _workingKey[13] ^ _x1, _workingKey[14] ^ _x2, _workingKey[15] ^ _x3);
-            LT();
-            Sb4(_workingKey[16] ^ _x0, _workingKey[17] ^ _x1, _workingKey[18] ^ _x2, _workingKey[19] ^ _x3);
-            LT();
-            Sb5(_workingKey[20] ^ _x0, _workingKey[21] ^ _x1, _workingKey[22] ^ _x2, _workingKey[23] ^ _x3);
-            LT();
-            Sb6(_workingKey[24] ^ _x0, _workingKey[25] ^ _x1, _workingKey[26] ^ _x2, _workingKey[27] ^ _x3);
-            LT();
-            Sb7(_workingKey[28] ^ _x0, _workingKey[29] ^ _x1, _workingKey[30] ^ _x2, _workingKey[31] ^ _x3);
-            LT();
-            Sb0(_workingKey[32] ^ _x0, _workingKey[33] ^ _x1, _workingKey[34] ^ _x2, _workingKey[35] ^ _x3);
-            LT();
-            Sb1(_workingKey[36] ^ _x0, _workingKey[37] ^ _x1, _workingKey[38] ^ _x2, _workingKey[39] ^ _x3);
-            LT();
-            Sb2(_workingKey[40] ^ _x0, _workingKey[41] ^ _x1, _workingKey[42] ^ _x2, _workingKey[43] ^ _x3);
-            LT();
-            Sb3(_workingKey[44] ^ _x0, _workingKey[45] ^ _x1, _workingKey[46] ^ _x2, _workingKey[47] ^ _x3);
-            LT();
-            Sb4(_workingKey[48] ^ _x0, _workingKey[49] ^ _x1, _workingKey[50] ^ _x2, _workingKey[51] ^ _x3);
-            LT();
-            Sb5(_workingKey[52] ^ _x0, _workingKey[53] ^ _x1, _workingKey[54] ^ _x2, _workingKey[55] ^ _x3);
-            LT();
-            Sb6(_workingKey[56] ^ _x0, _workingKey[57] ^ _x1, _workingKey[58] ^ _x2, _workingKey[59] ^ _x3);
-            LT();
-            Sb7(_workingKey[60] ^ _x0, _workingKey[61] ^ _x1, _workingKey[62] ^ _x2, _workingKey[63] ^ _x3);
-            LT();
-            Sb0(_workingKey[64] ^ _x0, _workingKey[65] ^ _x1, _workingKey[66] ^ _x2, _workingKey[67] ^ _x3);
-            LT();
-            Sb1(_workingKey[68] ^ _x0, _workingKey[69] ^ _x1, _workingKey[70] ^ _x2, _workingKey[71] ^ _x3);
-            LT();
-            Sb2(_workingKey[72] ^ _x0, _workingKey[73] ^ _x1, _workingKey[74] ^ _x2, _workingKey[75] ^ _x3);
-            LT();
-            Sb3(_workingKey[76] ^ _x0, _workingKey[77] ^ _x1, _workingKey[78] ^ _x2, _workingKey[79] ^ _x3);
-            LT();
-            Sb4(_workingKey[80] ^ _x0, _workingKey[81] ^ _x1, _workingKey[82] ^ _x2, _workingKey[83] ^ _x3);
-            LT();
-            Sb5(_workingKey[84] ^ _x0, _workingKey[85] ^ _x1, _workingKey[86] ^ _x2, _workingKey[87] ^ _x3);
-            LT();
-            Sb6(_workingKey[88] ^ _x0, _workingKey[89] ^ _x1, _workingKey[90] ^ _x2, _workingKey[91] ^ _x3);
-            LT();
-            Sb7(_workingKey[92] ^ _x0, _workingKey[93] ^ _x1, _workingKey[94] ^ _x2, _workingKey[95] ^ _x3);
-            LT();
-            Sb0(_workingKey[96] ^ _x0, _workingKey[97] ^ _x1, _workingKey[98] ^ _x2, _workingKey[99] ^ _x3);
-            LT();
-            Sb1(_workingKey[100] ^ _x0, _workingKey[101] ^ _x1, _workingKey[102] ^ _x2, _workingKey[103] ^ _x3);
-            LT();
-            Sb2(_workingKey[104] ^ _x0, _workingKey[105] ^ _x1, _workingKey[106] ^ _x2, _workingKey[107] ^ _x3);
-            LT();
-            Sb3(_workingKey[108] ^ _x0, _workingKey[109] ^ _x1, _workingKey[110] ^ _x2, _workingKey[111] ^ _x3);
-            LT();
-            Sb4(_workingKey[112] ^ _x0, _workingKey[113] ^ _x1, _workingKey[114] ^ _x2, _workingKey[115] ^ _x3);
-            LT();
-            Sb5(_workingKey[116] ^ _x0, _workingKey[117] ^ _x1, _workingKey[118] ^ _x2, _workingKey[119] ^ _x3);
-            LT();
-            Sb6(_workingKey[120] ^ _x0, _workingKey[121] ^ _x1, _workingKey[122] ^ _x2, _workingKey[123] ^ _x3);
-            LT();
-            Sb7(_workingKey[124] ^ _x0, _workingKey[125] ^ _x1, _workingKey[126] ^ _x2, _workingKey[127] ^ _x3);
-
-            WordToBytes(_workingKey[131] ^ _x3, outputBuffer, outputOffset);
-            WordToBytes(_workingKey[130] ^ _x2, outputBuffer, outputOffset + 4);
-            WordToBytes(_workingKey[129] ^ _x1, outputBuffer, outputOffset + 8);
-            WordToBytes(_workingKey[128] ^ _x0, outputBuffer, outputOffset + 12);
-
-            return BlockSize;
-        }
-
-        /// <summary>
-        /// Decrypts the specified region of the input byte array and copies the decrypted data to the specified region of the output byte array.
-        /// </summary>
-        /// <param name="inputBuffer">The input data to decrypt.</param>
-        /// <param name="inputOffset">The offset into the input byte array from which to begin using data.</param>
-        /// <param name="inputCount">The number of bytes in the input byte array to use as data.</param>
-        /// <param name="outputBuffer">The output to which to write decrypted data.</param>
-        /// <param name="outputOffset">The offset into the output byte array from which to begin writing data.</param>
-        /// <returns>
-        /// The number of bytes decrypted.
-        /// </returns>
-        public override int DecryptBlock(byte[] inputBuffer, int inputOffset, int inputCount, byte[] outputBuffer, int outputOffset)
-        {
-            if (inputCount != BlockSize)
-            {
-                throw new ArgumentException("inputCount");
-            }
-
-            _x3 = _workingKey[131] ^ BytesToWord(inputBuffer, inputOffset);
-            _x2 = _workingKey[130] ^ BytesToWord(inputBuffer, inputOffset + 4);
-            _x1 = _workingKey[129] ^ BytesToWord(inputBuffer, inputOffset + 8);
-            _x0 = _workingKey[128] ^ BytesToWord(inputBuffer, inputOffset + 12);
-
-            Ib7(_x0, _x1, _x2, _x3);
-
-            _x0 ^= _workingKey[124];
-            _x1 ^= _workingKey[125];
-            _x2 ^= _workingKey[126];
-            _x3 ^= _workingKey[127];
-
-            InverseLT();
-            Ib6(_x0, _x1, _x2, _x3);
-
-            _x0 ^= _workingKey[120];
-            _x1 ^= _workingKey[121];
-            _x2 ^= _workingKey[122];
-            _x3 ^= _workingKey[123];
-
-            InverseLT();
-            Ib5(_x0, _x1, _x2, _x3);
-
-            _x0 ^= _workingKey[116];
-            _x1 ^= _workingKey[117];
-            _x2 ^= _workingKey[118];
-            _x3 ^= _workingKey[119];
-
-            InverseLT();
-            Ib4(_x0, _x1, _x2, _x3);
-
-            _x0 ^= _workingKey[112];
-            _x1 ^= _workingKey[113];
-            _x2 ^= _workingKey[114];
-            _x3 ^= _workingKey[115];
-            InverseLT();
-            Ib3(_x0, _x1, _x2, _x3);
-
-            _x0 ^= _workingKey[108];
-            _x1 ^= _workingKey[109];
-            _x2 ^= _workingKey[110];
-            _x3 ^= _workingKey[111];
-
-            InverseLT();
-            Ib2(_x0, _x1, _x2, _x3);
-
-            _x0 ^= _workingKey[104];
-            _x1 ^= _workingKey[105];
-            _x2 ^= _workingKey[106];
-            _x3 ^= _workingKey[107];
-
-            InverseLT();
-            Ib1(_x0, _x1, _x2, _x3);
-
-            _x0 ^= _workingKey[100];
-            _x1 ^= _workingKey[101];
-            _x2 ^= _workingKey[102];
-            _x3 ^= _workingKey[103];
-
-            InverseLT();
-            Ib0(_x0, _x1, _x2, _x3);
-
-            _x0 ^= _workingKey[96];
-            _x1 ^= _workingKey[97];
-            _x2 ^= _workingKey[98];
-            _x3 ^= _workingKey[99];
-
-            InverseLT();
-            Ib7(_x0, _x1, _x2, _x3);
-
-            _x0 ^= _workingKey[92];
-            _x1 ^= _workingKey[93];
-            _x2 ^= _workingKey[94];
-            _x3 ^= _workingKey[95];
-
-            InverseLT();
-            Ib6(_x0, _x1, _x2, _x3);
-
-            _x0 ^= _workingKey[88];
-            _x1 ^= _workingKey[89];
-            _x2 ^= _workingKey[90];
-            _x3 ^= _workingKey[91];
-
-            InverseLT();
-            Ib5(_x0, _x1, _x2, _x3);
-
-            _x0 ^= _workingKey[84];
-            _x1 ^= _workingKey[85];
-            _x2 ^= _workingKey[86];
-            _x3 ^= _workingKey[87];
-
-            InverseLT();
-            Ib4(_x0, _x1, _x2, _x3);
-
-            _x0 ^= _workingKey[80];
-            _x1 ^= _workingKey[81];
-            _x2 ^= _workingKey[82];
-            _x3 ^= _workingKey[83];
-
-            InverseLT();
-            Ib3(_x0, _x1, _x2, _x3);
-
-            _x0 ^= _workingKey[76];
-            _x1 ^= _workingKey[77];
-            _x2 ^= _workingKey[78];
-            _x3 ^= _workingKey[79];
-
-            InverseLT();
-            Ib2(_x0, _x1, _x2, _x3);
-
-            _x0 ^= _workingKey[72];
-            _x1 ^= _workingKey[73];
-            _x2 ^= _workingKey[74];
-            _x3 ^= _workingKey[75];
-
-            InverseLT();
-            Ib1(_x0, _x1, _x2, _x3);
-
-            _x0 ^= _workingKey[68];
-            _x1 ^= _workingKey[69];
-            _x2 ^= _workingKey[70];
-            _x3 ^= _workingKey[71];
-
-            InverseLT();
-            Ib0(_x0, _x1, _x2, _x3);
-
-            _x0 ^= _workingKey[64];
-            _x1 ^= _workingKey[65];
-            _x2 ^= _workingKey[66];
-            _x3 ^= _workingKey[67];
-
-            InverseLT();
-            Ib7(_x0, _x1, _x2, _x3);
-
-            _x0 ^= _workingKey[60];
-            _x1 ^= _workingKey[61];
-            _x2 ^= _workingKey[62];
-            _x3 ^= _workingKey[63];
-
-            InverseLT();
-            Ib6(_x0, _x1, _x2, _x3);
-
-            _x0 ^= _workingKey[56];
-            _x1 ^= _workingKey[57];
-            _x2 ^= _workingKey[58];
-            _x3 ^= _workingKey[59];
-
-            InverseLT();
-            Ib5(_x0, _x1, _x2, _x3);
-
-            _x0 ^= _workingKey[52];
-            _x1 ^= _workingKey[53];
-            _x2 ^= _workingKey[54];
-            _x3 ^= _workingKey[55];
-
-            InverseLT();
-            Ib4(_x0, _x1, _x2, _x3);
-
-            _x0 ^= _workingKey[48];
-            _x1 ^= _workingKey[49];
-            _x2 ^= _workingKey[50];
-            _x3 ^= _workingKey[51];
-
-            InverseLT();
-            Ib3(_x0, _x1, _x2, _x3);
-
-            _x0 ^= _workingKey[44];
-            _x1 ^= _workingKey[45];
-            _x2 ^= _workingKey[46];
-            _x3 ^= _workingKey[47];
-
-            InverseLT();
-            Ib2(_x0, _x1, _x2, _x3);
-
-            _x0 ^= _workingKey[40];
-            _x1 ^= _workingKey[41];
-            _x2 ^= _workingKey[42];
-            _x3 ^= _workingKey[43];
-
-            InverseLT();
-            Ib1(_x0, _x1, _x2, _x3);
-
-            _x0 ^= _workingKey[36];
-            _x1 ^= _workingKey[37];
-            _x2 ^= _workingKey[38];
-            _x3 ^= _workingKey[39];
-
-            InverseLT();
-            Ib0(_x0, _x1, _x2, _x3);
-
-            _x0 ^= _workingKey[32];
-            _x1 ^= _workingKey[33];
-            _x2 ^= _workingKey[34];
-            _x3 ^= _workingKey[35];
-
-            InverseLT();
-            Ib7(_x0, _x1, _x2, _x3);
-
-            _x0 ^= _workingKey[28];
-            _x1 ^= _workingKey[29];
-            _x2 ^= _workingKey[30];
-            _x3 ^= _workingKey[31];
-
-            InverseLT();
-            Ib6(_x0, _x1, _x2, _x3);
-
-            _x0 ^= _workingKey[24];
-            _x1 ^= _workingKey[25];
-            _x2 ^= _workingKey[26];
-            _x3 ^= _workingKey[27];
-
-            InverseLT();
-            Ib5(_x0, _x1, _x2, _x3);
-
-            _x0 ^= _workingKey[20];
-            _x1 ^= _workingKey[21];
-            _x2 ^= _workingKey[22];
-            _x3 ^= _workingKey[23];
-
-            InverseLT();
-            Ib4(_x0, _x1, _x2, _x3);
-
-            _x0 ^= _workingKey[16];
-            _x1 ^= _workingKey[17];
-            _x2 ^= _workingKey[18];
-            _x3 ^= _workingKey[19];
-
-            InverseLT();
-            Ib3(_x0, _x1, _x2, _x3);
-
-            _x0 ^= _workingKey[12];
-            _x1 ^= _workingKey[13];
-            _x2 ^= _workingKey[14];
-            _x3 ^= _workingKey[15];
-
-            InverseLT();
-            Ib2(_x0, _x1, _x2, _x3);
-
-            _x0 ^= _workingKey[8];
-            _x1 ^= _workingKey[9];
-            _x2 ^= _workingKey[10];
-            _x3 ^= _workingKey[11];
-
-            InverseLT();
-            Ib1(_x0, _x1, _x2, _x3);
-
-            _x0 ^= _workingKey[4];
-            _x1 ^= _workingKey[5];
-            _x2 ^= _workingKey[6];
-            _x3 ^= _workingKey[7];
-
-            InverseLT();
-            Ib0(_x0, _x1, _x2, _x3);
-
-            WordToBytes(_x3 ^ _workingKey[3], outputBuffer, outputOffset);
-            WordToBytes(_x2 ^ _workingKey[2], outputBuffer, outputOffset + 4);
-            WordToBytes(_x1 ^ _workingKey[1], outputBuffer, outputOffset + 8);
-            WordToBytes(_x0 ^ _workingKey[0], outputBuffer, outputOffset + 12);
-
-            return BlockSize;
-        }
-
-        /// <summary>
-        /// Expand a user-supplied key material into a session key.
-        /// </summary>
-        /// <param name="key">The user-key bytes to use.</param>
-        /// <returns>
-        /// A session key.
-        /// </returns>
-        /// <exception cref="ArgumentException"><paramref name="key"/> is not multiple of 4 bytes.</exception>
-        private int[] MakeWorkingKey(byte[] key)
-        {
-            // pad key to 256 bits
-            var kPad = new int[16];
-            int off;
-            var length = 0;
-
-            for (off = key.Length - 4; off > 0; off -= 4)
-            {
-                kPad[length++] = BytesToWord(key, off);
-            }
-
-            if (off == 0)
-            {
-                kPad[length++] = BytesToWord(key, 0);
-                if (length < 8)
-                {
-                    kPad[length] = 1;
-                }
-            }
-            else
-            {
-                throw new ArgumentException("key must be a multiple of 4 bytes");
-            }
-
-            // expand the padded key up to 33 x 128 bits of key material
-            const int amount = (Rounds + 1) * 4;
-            var w = new int[amount];
-
-            // compute w0 to w7 from w-8 to w-1
-            for (var i = 8; i < 16; i++)
-            {
-                kPad[i] = RotateLeft(kPad[i - 8] ^ kPad[i - 5] ^ kPad[i - 3] ^ kPad[i - 1] ^ Phi ^ (i - 8), 11);
-            }
-
-            Buffer.BlockCopy(kPad, 8, w, 0, 8);
-
-            // compute w8 to w136
-            for (var i = 8; i < amount; i++)
-            {
-                w[i] = RotateLeft(w[i - 8] ^ w[i - 5] ^ w[i - 3] ^ w[i - 1] ^ Phi ^ i, 11);
-            }
-
-            // create the working keys by processing w with the Sbox and IP
-            Sb3(w[0], w[1], w[2], w[3]);
-            w[0] = _x0;
-            w[1] = _x1;
-            w[2] = _x2;
-            w[3] = _x3;
-
-            Sb2(w[4], w[5], w[6], w[7]);
-            w[4] = _x0;
-            w[5] = _x1;
-            w[6] = _x2;
-            w[7] = _x3;
-
-            Sb1(w[8], w[9], w[10], w[11]);
-            w[8] = _x0;
-            w[9] = _x1;
-            w[10] = _x2;
-            w[11] = _x3;
-
-            Sb0(w[12], w[13], w[14], w[15]);
-            w[12] = _x0;
-            w[13] = _x1;
-            w[14] = _x2;
-            w[15] = _x3;
-
-            Sb7(w[16], w[17], w[18], w[19]);
-            w[16] = _x0;
-            w[17] = _x1;
-            w[18] = _x2;
-            w[19] = _x3;
-
-            Sb6(w[20], w[21], w[22], w[23]);
-            w[20] = _x0;
-            w[21] = _x1;
-            w[22] = _x2;
-            w[23] = _x3;
-
-            Sb5(w[24], w[25], w[26], w[27]);
-            w[24] = _x0;
-            w[25] = _x1;
-            w[26] = _x2;
-            w[27] = _x3;
-
-            Sb4(w[28], w[29], w[30], w[31]);
-            w[28] = _x0;
-            w[29] = _x1;
-            w[30] = _x2;
-            w[31] = _x3;
-
-            Sb3(w[32], w[33], w[34], w[35]);
-            w[32] = _x0;
-            w[33] = _x1;
-            w[34] = _x2;
-            w[35] = _x3;
-
-            Sb2(w[36], w[37], w[38], w[39]);
-            w[36] = _x0;
-            w[37] = _x1;
-            w[38] = _x2;
-            w[39] = _x3;
-
-            Sb1(w[40], w[41], w[42], w[43]);
-            w[40] = _x0;
-            w[41] = _x1;
-            w[42] = _x2;
-            w[43] = _x3;
-
-            Sb0(w[44], w[45], w[46], w[47]);
-            w[44] = _x0;
-            w[45] = _x1;
-            w[46] = _x2;
-            w[47] = _x3;
-
-            Sb7(w[48], w[49], w[50], w[51]);
-            w[48] = _x0;
-            w[49] = _x1;
-            w[50] = _x2;
-            w[51] = _x3;
-
-            Sb6(w[52], w[53], w[54], w[55]);
-            w[52] = _x0;
-            w[53] = _x1;
-            w[54] = _x2;
-            w[55] = _x3;
-
-            Sb5(w[56], w[57], w[58], w[59]);
-            w[56] = _x0;
-            w[57] = _x1;
-            w[58] = _x2;
-            w[59] = _x3;
-
-            Sb4(w[60], w[61], w[62], w[63]);
-            w[60] = _x0;
-            w[61] = _x1;
-            w[62] = _x2;
-            w[63] = _x3;
-
-            Sb3(w[64], w[65], w[66], w[67]);
-            w[64] = _x0;
-            w[65] = _x1;
-            w[66] = _x2;
-            w[67] = _x3;
-
-            Sb2(w[68], w[69], w[70], w[71]);
-            w[68] = _x0;
-            w[69] = _x1;
-            w[70] = _x2;
-            w[71] = _x3;
-
-            Sb1(w[72], w[73], w[74], w[75]);
-            w[72] = _x0;
-            w[73] = _x1;
-            w[74] = _x2;
-            w[75] = _x3;
-
-            Sb0(w[76], w[77], w[78], w[79]);
-            w[76] = _x0;
-            w[77] = _x1;
-            w[78] = _x2;
-            w[79] = _x3;
-
-            Sb7(w[80], w[81], w[82], w[83]);
-            w[80] = _x0;
-            w[81] = _x1;
-            w[82] = _x2;
-            w[83] = _x3;
-
-            Sb6(w[84], w[85], w[86], w[87]);
-            w[84] = _x0;
-            w[85] = _x1;
-            w[86] = _x2;
-            w[87] = _x3;
-
-            Sb5(w[88], w[89], w[90], w[91]);
-            w[88] = _x0;
-            w[89] = _x1;
-            w[90] = _x2;
-            w[91] = _x3;
-
-            Sb4(w[92], w[93], w[94], w[95]);
-            w[92] = _x0;
-            w[93] = _x1;
-            w[94] = _x2;
-            w[95] = _x3;
-
-            Sb3(w[96], w[97], w[98], w[99]);
-            w[96] = _x0;
-            w[97] = _x1;
-            w[98] = _x2;
-            w[99] = _x3;
-
-            Sb2(w[100], w[101], w[102], w[103]);
-            w[100] = _x0;
-            w[101] = _x1;
-            w[102] = _x2;
-            w[103] = _x3;
-
-            Sb1(w[104], w[105], w[106], w[107]);
-            w[104] = _x0;
-            w[105] = _x1;
-            w[106] = _x2;
-            w[107] = _x3;
-
-            Sb0(w[108], w[109], w[110], w[111]);
-            w[108] = _x0;
-            w[109] = _x1;
-            w[110] = _x2;
-            w[111] = _x3;
-
-            Sb7(w[112], w[113], w[114], w[115]);
-            w[112] = _x0;
-            w[113] = _x1;
-            w[114] = _x2;
-            w[115] = _x3;
-
-            Sb6(w[116], w[117], w[118], w[119]);
-            w[116] = _x0;
-            w[117] = _x1;
-            w[118] = _x2;
-            w[119] = _x3;
-
-            Sb5(w[120], w[121], w[122], w[123]);
-            w[120] = _x0;
-            w[121] = _x1;
-            w[122] = _x2;
-            w[123] = _x3;
-
-            Sb4(w[124], w[125], w[126], w[127]);
-            w[124] = _x0;
-            w[125] = _x1;
-            w[126] = _x2;
-            w[127] = _x3;
-
-            Sb3(w[128], w[129], w[130], w[131]);
-            w[128] = _x0;
-            w[129] = _x1;
-            w[130] = _x2;
-            w[131] = _x3;
-
-            return w;
-        }
-
-        private static int RotateLeft(int x, int bits)
-        {
-            return (x << bits) | (int)((uint)x >> (32 - bits));
-        }
-
-        private static int RotateRight(int x, int bits)
-        {
-            return (int)((uint)x >> bits) | (x << (32 - bits));
-        }
-
-        private static int BytesToWord(byte[] src, int srcOff)
-        {
-            return ((src[srcOff] & 0xff) << 24) | ((src[srcOff + 1] & 0xff) << 16) |
-                   ((src[srcOff + 2] & 0xff) << 8) | (src[srcOff + 3] & 0xff);
-        }
-
-        private static void WordToBytes(int word, byte[] dst, int dstOff)
-        {
-            dst[dstOff + 3] = (byte)word;
-            dst[dstOff + 2] = (byte)((uint)word >> 8);
-            dst[dstOff + 1] = (byte)((uint)word >> 16);
-            dst[dstOff] = (byte)((uint)word >> 24);
-        }
-
-        /*
-         * The sboxes below are based on the work of Brian Gladman and
-         * Sam Simpson, whose original notice appears below.
-         *
-         * For further details see:
-         *      http://fp.gladman.plus.com/cryptography_technology/serpent/
-         *
-         */
-
-        /*
-         * Partially optimised Serpent S Box bool functions derived
-         * using a recursive descent analyser but without a full search
-         * of all subtrees. This set of S boxes is the result of work
-         * by Sam Simpson and Brian Gladman using the spare time on a
-         * cluster of high capacity servers to search for S boxes with
-         * this customised search engine. There are now an average of
-         * 15.375 terms per S box.
-         *
-         * Copyright:   Dr B. R Gladman (gladman@seven77.demon.co.uk)
-         *              and Sam Simpson (s.simpson@mia.co.uk)
-         *              17th December 1998
-         *
-         * We hereby give permission for information in this file to be
-         * used freely subject only to acknowledgement of its origin.
-         */
-
-        /// <summary>
-        /// S0 - { 3, 8,15, 1,10, 6, 5,11,14,13, 4, 2, 7, 0, 9,12 } - 15 terms.
-        /// </summary>
-        /// <param name="a">A.</param>
-        /// <param name="b">The b.</param>
-        /// <param name="c">The c.</param>
-        /// <param name="d">The d.</param>
-        private void Sb0(int a, int b, int c, int d)
-        {
-            var t1 = a ^ d;
-            var t3 = c ^ t1;
-            var t4 = b ^ t3;
-            _x3 = (a & d) ^ t4;
-            var t7 = a ^ (b & t1);
-            _x2 = t4 ^ (c | t7);
-            var t12 = _x3 & (t3 ^ t7);
-            _x1 = (~t3) ^ t12;
-            _x0 = t12 ^ (~t7);
-        }
-
-        /// <summary>
-        /// InvSO - {13, 3,11, 0,10, 6, 5,12, 1,14, 4, 7,15, 9, 8, 2 } - 15 terms.
-        /// </summary>
-        /// <param name="a">A.</param>
-        /// <param name="b">The b.</param>
-        /// <param name="c">The c.</param>
-        /// <param name="d">The d.</param>
-        private void Ib0(int a, int b, int c, int d)
-        {
-            var t1 = ~a;
-            var t2 = a ^ b;
-            var t4 = d ^ (t1 | t2);
-            var t5 = c ^ t4;
-            _x2 = t2 ^ t5;
-            var t8 = t1 ^ (d & t2);
-            _x1 = t4 ^ (_x2 & t8);
-            _x3 = (a & t4) ^ (t5 | _x1);
-            _x0 = _x3 ^ (t5 ^ t8);
-        }
-
-        /// <summary>
-        /// S1 - {15,12, 2, 7, 9, 0, 5,10, 1,11,14, 8, 6,13, 3, 4 } - 14 terms.
-        /// </summary>
-        /// <param name="a">A.</param>
-        /// <param name="b">The b.</param>
-        /// <param name="c">The c.</param>
-        /// <param name="d">The d.</param>
-        private void Sb1(int a, int b, int c, int d)
-        {
-            var t2 = b ^ (~a);
-            var t5 = c ^ (a | t2);
-            _x2 = d ^ t5;
-            var t7 = b ^ (d | t2);
-            var t8 = t2 ^ _x2;
-            _x3 = t8 ^ (t5 & t7);
-            var t11 = t5 ^ t7;
-            _x1 = _x3 ^ t11;
-            _x0 = t5 ^ (t8 & t11);
-        }
-
-        /// <summary>
-        /// InvS1 - { 5, 8, 2,14,15, 6,12, 3,11, 4, 7, 9, 1,13,10, 0 } - 14 steps.
-        /// </summary>
-        /// <param name="a">A.</param>
-        /// <param name="b">The b.</param>
-        /// <param name="c">The c.</param>
-        /// <param name="d">The d.</param>
-        private void Ib1(int a, int b, int c, int d)
-        {
-            var t1 = b ^ d;
-            var t3 = a ^ (b & t1);
-            var t4 = t1 ^ t3;
-            _x3 = c ^ t4;
-            var t7 = b ^ (t1 & t3);
-            var t8 = _x3 | t7;
-            _x1 = t3 ^ t8;
-            var t10 = ~_x1;
-            var t11 = _x3 ^ t7;
-            _x0 = t10 ^ t11;
-            _x2 = t4 ^ (t10 | t11);
-        }
-
-        /// <summary>
-        /// S2 - { 8, 6, 7, 9, 3,12,10,15,13, 1,14, 4, 0,11, 5, 2 } - 16 terms.
-        /// </summary>
-        /// <param name="a">A.</param>
-        /// <param name="b">The b.</param>
-        /// <param name="c">The c.</param>
-        /// <param name="d">The d.</param>
-        private void Sb2(int a, int b, int c, int d)
-        {
-            var t1 = ~a;
-            var t2 = b ^ d;
-            var t3 = c & t1;
-            _x0 = t2 ^ t3;
-            var t5 = c ^ t1;
-            var t6 = c ^ _x0;
-            var t7 = b & t6;
-            _x3 = t5 ^ t7;
-            _x2 = a ^ ((d | t7) & (_x0 | t5));
-            _x1 = (t2 ^ _x3) ^ (_x2 ^ (d | t1));
-        }
-
-        /// <summary>
-        /// InvS2 - {12, 9,15, 4,11,14, 1, 2, 0, 3, 6,13, 5, 8,10, 7 } - 16 steps.
-        /// </summary>
-        /// <param name="a">A.</param>
-        /// <param name="b">The b.</param>
-        /// <param name="c">The c.</param>
-        /// <param name="d">The d.</param>
-        private void Ib2(int a, int b, int c, int d)
-        {
-            var t1 = b ^ d;
-            var t2 = ~t1;
-            var t3 = a ^ c;
-            var t4 = c ^ t1;
-            var t5 = b & t4;
-            _x0 = t3 ^ t5;
-            var t7 = a | t2;
-            var t8 = d ^ t7;
-            var t9 = t3 | t8;
-            _x3 = t1 ^ t9;
-            var t11 = ~t4;
-            var t12 = _x0 | _x3;
-            _x1 = t11 ^ t12;
-            _x2 = (d & t11) ^ (t3 ^ t12);
-        }
-
-        /// <summary>
-        /// S3 - { 0,15,11, 8,12, 9, 6, 3,13, 1, 2, 4,10, 7, 5,14 } - 16 terms.
-        /// </summary>
-        /// <param name="a">A.</param>
-        /// <param name="b">The b.</param>
-        /// <param name="c">The c.</param>
-        /// <param name="d">The d.</param>
-        private void Sb3(int a, int b, int c, int d)
-        {
-            var t1 = a ^ b;
-            var t2 = a & c;
-            var t3 = a | d;
-            var t4 = c ^ d;
-            var t5 = t1 & t3;
-            var t6 = t2 | t5;
-            _x2 = t4 ^ t6;
-            var t8 = b ^ t3;
-            var t9 = t6 ^ t8;
-            var t10 = t4 & t9;
-            _x0 = t1 ^ t10;
-            var t12 = _x2 & _x0;
-            _x1 = t9 ^ t12;
-            _x3 = (b | d) ^ (t4 ^ t12);
-        }
-
-        /// <summary>
-        /// InvS3 - { 0, 9,10, 7,11,14, 6,13, 3, 5,12, 2, 4, 8,15, 1 } - 15 terms.
-        /// </summary>
-        /// <param name="a">A.</param>
-        /// <param name="b">The b.</param>
-        /// <param name="c">The c.</param>
-        /// <param name="d">The d.</param>
-        private void Ib3(int a, int b, int c, int d)
-        {
-            var t1 = a | b;
-            var t2 = b ^ c;
-            var t3 = b & t2;
-            var t4 = a ^ t3;
-            var t5 = c ^ t4;
-            var t6 = d | t4;
-            _x0 = t2 ^ t6;
-            var t8 = t2 | t6;
-            var t9 = d ^ t8;
-            _x2 = t5 ^ t9;
-            var t11 = t1 ^ t9;
-            var t12 = _x0 & t11;
-            _x3 = t4 ^ t12;
-            _x1 = _x3 ^ (_x0 ^ t11);
-        }
-
-        /// <summary>
-        /// S4 - { 1,15, 8, 3,12, 0,11, 6, 2, 5, 4,10, 9,14, 7,13 } - 15 terms.
-        /// </summary>
-        /// <param name="a">A.</param>
-        /// <param name="b">The b.</param>
-        /// <param name="c">The c.</param>
-        /// <param name="d">The d.</param>
-        private void Sb4(int a, int b, int c, int d)
-        {
-            var t1 = a ^ d;
-            var t2 = d & t1;
-            var t3 = c ^ t2;
-            var t4 = b | t3;
-            _x3 = t1 ^ t4;
-            var t6 = ~b;
-            var t7 = t1 | t6;
-            _x0 = t3 ^ t7;
-            var t9 = a & _x0;
-            var t10 = t1 ^ t6;
-            var t11 = t4 & t10;
-            _x2 = t9 ^ t11;
-            _x1 = (a ^ t3) ^ (t10 & _x2);
-        }
-
-        /// <summary>
-        /// InvS4 - { 5, 0, 8, 3,10, 9, 7,14, 2,12,11, 6, 4,15,13, 1 } - 15 terms.
-        /// </summary>
-        /// <param name="a">A.</param>
-        /// <param name="b">The b.</param>
-        /// <param name="c">The c.</param>
-        /// <param name="d">The d.</param>
-        private void Ib4(int a, int b, int c, int d)
-        {
-            var t1 = c | d;
-            var t2 = a & t1;
-            var t3 = b ^ t2;
-            var t4 = a & t3;
-            var t5 = c ^ t4;
-            _x1 = d ^ t5;
-            var t7 = ~a;
-            var t8 = t5 & _x1;
-            _x3 = t3 ^ t8;
-            var t10 = _x1 | t7;
-            var t11 = d ^ t10;
-            _x0 = _x3 ^ t11;
-            _x2 = (t3 & t11) ^ (_x1 ^ t7);
-        }
-
-        /// <summary>
-        /// S5 - {15, 5, 2,11, 4,10, 9,12, 0, 3,14, 8,13, 6, 7, 1 } - 16 terms.
-        /// </summary>
-        /// <param name="a">A.</param>
-        /// <param name="b">The b.</param>
-        /// <param name="c">The c.</param>
-        /// <param name="d">The d.</param>
-        private void Sb5(int a, int b, int c, int d)
-        {
-            var t1 = ~a;
-            var t2 = a ^ b;
-            var t3 = a ^ d;
-            var t4 = c ^ t1;
-            var t5 = t2 | t3;
-            _x0 = t4 ^ t5;
-            var t7 = d & _x0;
-            var t8 = t2 ^ _x0;
-            _x1 = t7 ^ t8;
-            var t10 = t1 | _x0;
-            var t11 = t2 | t7;
-            var t12 = t3 ^ t10;
-            _x2 = t11 ^ t12;
-            _x3 = (b ^ t7) ^ (_x1 & t12);
-        }
-
-        /// <summary>
-        /// InvS5 - { 8,15, 2, 9, 4, 1,13,14,11, 6, 5, 3, 7,12,10, 0 } - 16 terms.
-        /// </summary>
-        /// <param name="a">A.</param>
-        /// <param name="b">The b.</param>
-        /// <param name="c">The c.</param>
-        /// <param name="d">The d.</param>
-        private void Ib5(int a, int b, int c, int d)
-        {
-            var t1 = ~c;
-            var t2 = b & t1;
-            var t3 = d ^ t2;
-            var t4 = a & t3;
-            var t5 = b ^ t1;
-            _x3 = t4 ^ t5;
-            var t7 = b | _x3;
-            var t8 = a & t7;
-            _x1 = t3 ^ t8;
-            var t10 = a | d;
-            var t11 = t1 ^ t7;
-            _x0 = t10 ^ t11;
-            _x2 = (b & t10) ^ (t4 | (a ^ c));
-        }
-
-        /// <summary>
-        /// S6 - { 7, 2,12, 5, 8, 4, 6,11,14, 9, 1,15,13, 3,10, 0 } - 15 terms.
-        /// </summary>
-        /// <param name="a">A.</param>
-        /// <param name="b">The b.</param>
-        /// <param name="c">The c.</param>
-        /// <param name="d">The d.</param>
-        private void Sb6(int a, int b, int c, int d)
-        {
-            var t1 = ~a;
-            var t2 = a ^ d;
-            var t3 = b ^ t2;
-            var t4 = t1 | t2;
-            var t5 = c ^ t4;
-            _x1 = b ^ t5;
-            var t7 = t2 | _x1;
-            var t8 = d ^ t7;
-            var t9 = t5 & t8;
-            _x2 = t3 ^ t9;
-            var t11 = t5 ^ t8;
-            _x0 = _x2 ^ t11;
-            _x3 = (~t5) ^ (t3 & t11);
-        }
-
-        /// <summary>
-        /// InvS6 - {15,10, 1,13, 5, 3, 6, 0, 4, 9,14, 7, 2,12, 8,11 } - 15 terms.
-        /// </summary>
-        /// <param name="a">A.</param>
-        /// <param name="b">The b.</param>
-        /// <param name="c">The c.</param>
-        /// <param name="d">The d.</param>
-        private void Ib6(int a, int b, int c, int d)
-        {
-            var t1 = ~a;
-            var t2 = a ^ b;
-            var t3 = c ^ t2;
-            var t4 = c | t1;
-            var t5 = d ^ t4;
-            _x1 = t3 ^ t5;
-            var t7 = t3 & t5;
-            var t8 = t2 ^ t7;
-            var t9 = b | t8;
-            _x3 = t5 ^ t9;
-            var t11 = b | _x3;
-            _x0 = t8 ^ t11;
-            _x2 = (d & t1) ^ (t3 ^ t11);
-        }
-
-        /// <summary>
-        /// S7 - { 1,13,15, 0,14, 8, 2,11, 7, 4,12,10, 9, 3, 5, 6 } - 16 terms.
-        /// </summary>
-        /// <param name="a">A.</param>
-        /// <param name="b">The b.</param>
-        /// <param name="c">The c.</param>
-        /// <param name="d">The d.</param>
-        private void Sb7(int a, int b, int c, int d)
-        {
-            var t1 = b ^ c;
-            var t2 = c & t1;
-            var t3 = d ^ t2;
-            var t4 = a ^ t3;
-            var t5 = d | t1;
-            var t6 = t4 & t5;
-            _x1 = b ^ t6;
-            var t8 = t3 | _x1;
-            var t9 = a & t4;
-            _x3 = t1 ^ t9;
-            var t11 = t4 ^ t8;
-            var t12 = _x3 & t11;
-            _x2 = t3 ^ t12;
-            _x0 = (~t11) ^ (_x3 & _x2);
-        }
-
-        /// <summary>
-        /// InvS7 - { 3, 0, 6,13, 9,14,15, 8, 5,12,11, 7,10, 1, 4, 2 } - 17 terms.
-        /// </summary>
-        /// <param name="a">A.</param>
-        /// <param name="b">The b.</param>
-        /// <param name="c">The c.</param>
-        /// <param name="d">The d.</param>
-        private void Ib7(int a, int b, int c, int d)
-        {
-            var t3 = c | (a & b);
-            var t4 = d & (a | b);
-            _x3 = t3 ^ t4;
-            var t6 = ~d;
-            var t7 = b ^ t4;
-            var t9 = t7 | (_x3 ^ t6);
-            _x1 = a ^ t9;
-            _x0 = (c ^ t7) ^ (d | _x1);
-            _x2 = (t3 ^ _x1) ^ (_x0 ^ (a & _x3));
-        }
-
-        /// <summary>
-        /// Apply the linear transformation to the register set.
-        /// </summary>
-        private void LT()
-        {
-            var x0 = RotateLeft(_x0, 13);
-            var x2 = RotateLeft(_x2, 3);
-            var x1 = _x1 ^ x0 ^ x2;
-            var x3 = _x3 ^ x2 ^ x0 << 3;
-
-            _x1 = RotateLeft(x1, 1);
-            _x3 = RotateLeft(x3, 7);
-            _x0 = RotateLeft(x0 ^ _x1 ^ _x3, 5);
-            _x2 = RotateLeft(x2 ^ _x3 ^ (_x1 << 7), 22);
-        }
-
-        /// <summary>
-        /// Apply the inverse of the linear transformation to the register set.
-        /// </summary>
-        private void InverseLT()
-        {
-            var x2 = RotateRight(_x2, 22) ^ _x3 ^ (_x1 << 7);
-            var x0 = RotateRight(_x0, 5) ^ _x1 ^ _x3;
-            var x3 = RotateRight(_x3, 7);
-            var x1 = RotateRight(_x1, 1);
-            _x3 = x3 ^ x2 ^ x0 << 3;
-            _x1 = x1 ^ x0 ^ x2;
-            _x2 = RotateRight(x2, 3);
-            _x0 = RotateRight(x0, 13);
-        }
-    }
-}

+ 0 - 519
src/Renci.SshNet/Security/Cryptography/Ciphers/TwofishCipher.cs

@@ -1,519 +0,0 @@
-using System;
-
-namespace Renci.SshNet.Security.Cryptography.Ciphers
-{
-    /// <summary>
-    /// Implements Twofish cipher algorithm.
-    /// </summary>
-    public sealed class TwofishCipher : BlockCipher
-    {
-        /**
-         * Define the fixed p0/p1 permutations used in keyed S-box lookup.
-         * By changing the following constant definitions, the S-boxes will
-         * automatically Get changed in the Twofish engine.
-         */
-#pragma warning disable SA1310 // Field names should not contain underscore
-        private const int P_00 = 1;
-        private const int P_01 = 0;
-        private const int P_02 = 0;
-        private const int P_03 = P_01 ^ 1;
-        private const int P_04 = 1;
-
-        private const int P_10 = 0;
-        private const int P_11 = 0;
-        private const int P_12 = 1;
-        private const int P_13 = P_11 ^ 1;
-        private const int P_14 = 0;
-
-        private const int P_20 = 1;
-        private const int P_21 = 1;
-        private const int P_22 = 0;
-        private const int P_23 = P_21 ^ 1;
-        private const int P_24 = 0;
-
-        private const int P_30 = 0;
-        private const int P_31 = 1;
-        private const int P_32 = 1;
-        private const int P_33 = P_31 ^ 1;
-        private const int P_34 = 1;
-
-        /* Primitive polynomial for GF(256) */
-        private const int GF256_FDBK = 0x169;
-        private const int GF256_FDBK_2 = GF256_FDBK / 2;
-        private const int GF256_FDBK_4 = GF256_FDBK / 4;
-
-        private const int RS_GF_FDBK = 0x14D; // field generator
-
-        private const int ROUNDS = 16;
-        private const int MAX_ROUNDS = 16;  // bytes = 128 bits
-        private const int MAX_KEY_BITS = 256;
-
-        private const int INPUT_WHITEN = 0;
-        private const int OUTPUT_WHITEN = INPUT_WHITEN + (16 / 4); // 4
-        private const int ROUND_SUBKEYS = OUTPUT_WHITEN + (16 / 4); // 8
-
-        private const int TOTAL_SUBKEYS = ROUND_SUBKEYS + (2 * MAX_ROUNDS); // 40
-
-        private const int SK_STEP = 0x02020202;
-        private const int SK_BUMP = 0x01010101;
-        private const int SK_ROTL = 9;
-#pragma warning restore SA1310 // Field names should not contain underscore
-
-        private readonly int[] _gMDS0 = new int[MAX_KEY_BITS];
-        private readonly int[] _gMDS1 = new int[MAX_KEY_BITS];
-        private readonly int[] _gMDS2 = new int[MAX_KEY_BITS];
-        private readonly int[] _gMDS3 = new int[MAX_KEY_BITS];
-
-        private readonly int _k64Cnt;
-
-        /*
-         * _gSubKeys[] and _gSBox[] are eventually used in the
-         * encryption and decryption methods.
-         */
-        private int[] _gSubKeys;
-        private int[] _gSBox;
-
-        /// <summary>
-        /// Initializes a new instance of the <see cref="TwofishCipher"/> class.
-        /// </summary>
-        /// <param name="key">The key.</param>
-        /// <param name="mode">The mode.</param>
-        /// <param name="padding">The padding.</param>
-        /// <exception cref="ArgumentNullException"><paramref name="key"/> is <see langword="null"/>.</exception>
-        /// <exception cref="ArgumentException">Keysize is not valid for this algorithm.</exception>
-        public TwofishCipher(byte[] key, CipherMode mode, CipherPadding padding)
-            : base(key, 16, mode, padding)
-        {
-            var keySize = key.Length * 8;
-
-            if (keySize is not (128 or 192 or 256))
-            {
-                throw new ArgumentException(string.Format("KeySize '{0}' is not valid for this algorithm.", keySize));
-            }
-
-            // calculate the MDS matrix
-            var m1 = new int[2];
-            var mX = new int[2];
-            var mY = new int[2];
-
-            for (var i = 0; i < MAX_KEY_BITS; i++)
-            {
-                var j = P[0 + i] & 0xff;
-                m1[0] = j;
-                mX[0] = Mx_X(j) & 0xff;
-                mY[0] = Mx_Y(j) & 0xff;
-
-                j = P[(1 * 256) + i] & 0xff;
-                m1[1] = j;
-                mX[1] = Mx_X(j) & 0xff;
-                mY[1] = Mx_Y(j) & 0xff;
-
-                _gMDS0[i] = m1[P_00] | mX[P_00] << 8 | mY[P_00] << 16 | mY[P_00] << 24;
-
-                _gMDS1[i] = mY[P_10] | mY[P_10] << 8 | mX[P_10] << 16 | m1[P_10] << 24;
-
-                _gMDS2[i] = mX[P_20] | mY[P_20] << 8 | m1[P_20] << 16 | mY[P_20] << 24;
-
-                _gMDS3[i] = mX[P_30] | m1[P_30] << 8 | mY[P_30] << 16 | mX[P_30] << 24;
-            }
-
-            _k64Cnt = key.Length / 8; // pre-padded ?
-            SetKey(key);
-        }
-
-        /// <summary>
-        /// Encrypts the specified region of the input byte array and copies the encrypted data to the specified region of the output byte array.
-        /// </summary>
-        /// <param name="inputBuffer">The input data to encrypt.</param>
-        /// <param name="inputOffset">The offset into the input byte array from which to begin using data.</param>
-        /// <param name="inputCount">The number of bytes in the input byte array to use as data.</param>
-        /// <param name="outputBuffer">The output to which to write encrypted data.</param>
-        /// <param name="outputOffset">The offset into the output byte array from which to begin writing data.</param>
-        /// <returns>
-        /// The number of bytes encrypted.
-        /// </returns>
-        public override int EncryptBlock(byte[] inputBuffer, int inputOffset, int inputCount, byte[] outputBuffer, int outputOffset)
-        {
-            var x0 = BytesTo32Bits(inputBuffer, inputOffset) ^ _gSubKeys[INPUT_WHITEN];
-            var x1 = BytesTo32Bits(inputBuffer, inputOffset + 4) ^ _gSubKeys[INPUT_WHITEN + 1];
-            var x2 = BytesTo32Bits(inputBuffer, inputOffset + 8) ^ _gSubKeys[INPUT_WHITEN + 2];
-            var x3 = BytesTo32Bits(inputBuffer, inputOffset + 12) ^ _gSubKeys[INPUT_WHITEN + 3];
-
-            var k = ROUND_SUBKEYS;
-            for (var r = 0; r < ROUNDS; r += 2)
-            {
-                var t0 = Fe32_0(_gSBox, x0);
-                var t1 = Fe32_3(_gSBox, x1);
-                x2 ^= t0 + t1 + _gSubKeys[k++];
-                x2 = (int)((uint)x2 >> 1) | x2 << 31;
-                x3 = (x3 << 1 | (int)((uint)x3 >> 31)) ^ (t0 + (2 * t1) + _gSubKeys[k++]);
-
-                t0 = Fe32_0(_gSBox, x2);
-                t1 = Fe32_3(_gSBox, x3);
-                x0 ^= t0 + t1 + _gSubKeys[k++];
-                x0 = (int)((uint)x0 >> 1) | x0 << 31;
-                x1 = (x1 << 1 | (int)((uint)x1 >> 31)) ^ (t0 + (2 * t1) + _gSubKeys[k++]);
-            }
-
-            Bits32ToBytes(x2 ^ _gSubKeys[OUTPUT_WHITEN], outputBuffer, outputOffset);
-            Bits32ToBytes(x3 ^ _gSubKeys[OUTPUT_WHITEN + 1], outputBuffer, outputOffset + 4);
-            Bits32ToBytes(x0 ^ _gSubKeys[OUTPUT_WHITEN + 2], outputBuffer, outputOffset + 8);
-            Bits32ToBytes(x1 ^ _gSubKeys[OUTPUT_WHITEN + 3], outputBuffer, outputOffset + 12);
-
-            return BlockSize;
-        }
-
-        /// <summary>
-        /// Decrypts the specified region of the input byte array and copies the decrypted data to the specified region of the output byte array.
-        /// </summary>
-        /// <param name="inputBuffer">The input data to decrypt.</param>
-        /// <param name="inputOffset">The offset into the input byte array from which to begin using data.</param>
-        /// <param name="inputCount">The number of bytes in the input byte array to use as data.</param>
-        /// <param name="outputBuffer">The output to which to write decrypted data.</param>
-        /// <param name="outputOffset">The offset into the output byte array from which to begin writing data.</param>
-        /// <returns>
-        /// The number of bytes decrypted.
-        /// </returns>
-        public override int DecryptBlock(byte[] inputBuffer, int inputOffset, int inputCount, byte[] outputBuffer, int outputOffset)
-        {
-            var x2 = BytesTo32Bits(inputBuffer, inputOffset) ^ _gSubKeys[OUTPUT_WHITEN];
-            var x3 = BytesTo32Bits(inputBuffer, inputOffset + 4) ^ _gSubKeys[OUTPUT_WHITEN + 1];
-            var x0 = BytesTo32Bits(inputBuffer, inputOffset + 8) ^ _gSubKeys[OUTPUT_WHITEN + 2];
-            var x1 = BytesTo32Bits(inputBuffer, inputOffset + 12) ^ _gSubKeys[OUTPUT_WHITEN + 3];
-
-            var k = ROUND_SUBKEYS + (2 * ROUNDS) - 1;
-            for (var r = 0; r < ROUNDS; r += 2)
-            {
-                var t0 = Fe32_0(_gSBox, x2);
-                var t1 = Fe32_3(_gSBox, x3);
-                x1 ^= t0 + (2 * t1) + _gSubKeys[k--];
-                x0 = (x0 << 1 | (int)((uint)x0 >> 31)) ^ (t0 + t1 + _gSubKeys[k--]);
-                x1 = (int)((uint)x1 >> 1) | x1 << 31;
-
-                t0 = Fe32_0(_gSBox, x0);
-                t1 = Fe32_3(_gSBox, x1);
-                x3 ^= t0 + (2 * t1) + _gSubKeys[k--];
-                x2 = (x2 << 1 | (int)((uint)x2 >> 31)) ^ (t0 + t1 + _gSubKeys[k--]);
-                x3 = (int)((uint)x3 >> 1) | x3 << 31;
-            }
-
-            Bits32ToBytes(x0 ^ _gSubKeys[INPUT_WHITEN], outputBuffer, outputOffset);
-            Bits32ToBytes(x1 ^ _gSubKeys[INPUT_WHITEN + 1], outputBuffer, outputOffset + 4);
-            Bits32ToBytes(x2 ^ _gSubKeys[INPUT_WHITEN + 2], outputBuffer, outputOffset + 8);
-            Bits32ToBytes(x3 ^ _gSubKeys[INPUT_WHITEN + 3], outputBuffer, outputOffset + 12);
-
-            return BlockSize;
-        }
-
-        private static readonly byte[] P =
-            {
-                // p0
-                0xA9, 0x67, 0xB3, 0xE8, 0x04, 0xFD, 0xA3, 0x76, 0x9A, 0x92, 0x80, 0x78, 0xE4, 0xDD, 0xD1, 0x38,
-                0x0D, 0xC6, 0x35, 0x98, 0x18, 0xF7, 0xEC, 0x6C, 0x43, 0x75, 0x37, 0x26, 0xFA, 0x13, 0x94, 0x48,
-                0xF2, 0xD0, 0x8B, 0x30, 0x84, 0x54, 0xDF, 0x23, 0x19, 0x5B, 0x3D, 0x59, 0xF3, 0xAE, 0xA2, 0x82,
-                0x63, 0x01, 0x83, 0x2E, 0xD9, 0x51, 0x9B, 0x7C, 0xA6, 0xEB, 0xA5, 0xBE, 0x16, 0x0C, 0xE3, 0x61,
-                0xC0, 0x8C, 0x3A, 0xF5, 0x73, 0x2C, 0x25, 0x0B, 0xBB, 0x4E, 0x89, 0x6B, 0x53, 0x6A, 0xB4, 0xF1,
-                0xE1, 0xE6, 0xBD, 0x45, 0xE2, 0xF4, 0xB6, 0x66, 0xCC, 0x95, 0x03, 0x56, 0xD4, 0x1C, 0x1E, 0xD7,
-                0xFB, 0xC3, 0x8E, 0xB5, 0xE9, 0xCF, 0xBF, 0xBA, 0xEA, 0x77, 0x39, 0xAF, 0x33, 0xC9, 0x62, 0x71,
-                0x81, 0x79, 0x09, 0xAD, 0x24, 0xCD, 0xF9, 0xD8, 0xE5, 0xC5, 0xB9, 0x4D, 0x44, 0x08, 0x86, 0xE7,
-                0xA1, 0x1D, 0xAA, 0xED, 0x06, 0x70, 0xB2, 0xD2, 0x41, 0x7B, 0xA0, 0x11, 0x31, 0xC2, 0x27, 0x90,
-                0x20, 0xF6, 0x60, 0xFF, 0x96, 0x5C, 0xB1, 0xAB, 0x9E, 0x9C, 0x52, 0x1B, 0x5F, 0x93, 0x0A, 0xEF,
-                0x91, 0x85, 0x49, 0xEE, 0x2D, 0x4F, 0x8F, 0x3B, 0x47, 0x87, 0x6D, 0x46, 0xD6, 0x3E, 0x69, 0x64,
-                0x2A, 0xCE, 0xCB, 0x2F, 0xFC, 0x97, 0x05, 0x7A, 0xAC, 0x7F, 0xD5, 0x1A, 0x4B, 0x0E, 0xA7, 0x5A,
-                0x28, 0x14, 0x3F, 0x29, 0x88, 0x3C, 0x4C, 0x02, 0xB8, 0xDA, 0xB0, 0x17, 0x55, 0x1F, 0x8A, 0x7D,
-                0x57, 0xC7, 0x8D, 0x74, 0xB7, 0xC4, 0x9F, 0x72, 0x7E, 0x15, 0x22, 0x12, 0x58, 0x07, 0x99, 0x34,
-                0x6E, 0x50, 0xDE, 0x68, 0x65, 0xBC, 0xDB, 0xF8, 0xC8, 0xA8, 0x2B, 0x40, 0xDC, 0xFE, 0x32, 0xA4,
-                0xCA, 0x10, 0x21, 0xF0, 0xD3, 0x5D, 0x0F, 0x00, 0x6F, 0x9D, 0x36, 0x42, 0x4A, 0x5E, 0xC1, 0xE0,
-
-                // p1
-                0x75, 0xF3, 0xC6, 0xF4, 0xDB, 0x7B, 0xFB, 0xC8, 0x4A, 0xD3, 0xE6, 0x6B, 0x45, 0x7D, 0xE8, 0x4B,
-                0xD6, 0x32, 0xD8, 0xFD, 0x37, 0x71, 0xF1, 0xE1, 0x30, 0x0F, 0xF8, 0x1B, 0x87, 0xFA, 0x06, 0x3F,
-                0x5E, 0xBA, 0xAE, 0x5B, 0x8A, 0x00, 0xBC, 0x9D, 0x6D, 0xC1, 0xB1, 0x0E, 0x80, 0x5D, 0xD2, 0xD5,
-                0xA0, 0x84, 0x07, 0x14, 0xB5, 0x90, 0x2C, 0xA3, 0xB2, 0x73, 0x4C, 0x54, 0x92, 0x74, 0x36, 0x51,
-                0x38, 0xB0, 0xBD, 0x5A, 0xFC, 0x60, 0x62, 0x96, 0x6C, 0x42, 0xF7, 0x10, 0x7C, 0x28, 0x27, 0x8C,
-                0x13, 0x95, 0x9C, 0xC7, 0x24, 0x46, 0x3B, 0x70, 0xCA, 0xE3, 0x85, 0xCB, 0x11, 0xD0, 0x93, 0xB8,
-                0xA6, 0x83, 0x20, 0xFF, 0x9F, 0x77, 0xC3, 0xCC, 0x03, 0x6F, 0x08, 0xBF, 0x40, 0xE7, 0x2B, 0xE2,
-                0x79, 0x0C, 0xAA, 0x82, 0x41, 0x3A, 0xEA, 0xB9, 0xE4, 0x9A, 0xA4, 0x97, 0x7E, 0xDA, 0x7A, 0x17,
-                0x66, 0x94, 0xA1, 0x1D, 0x3D, 0xF0, 0xDE, 0xB3, 0x0B, 0x72, 0xA7, 0x1C, 0xEF, 0xD1, 0x53, 0x3E,
-                0x8F, 0x33, 0x26, 0x5F, 0xEC, 0x76, 0x2A, 0x49, 0x81, 0x88, 0xEE, 0x21, 0xC4, 0x1A, 0xEB, 0xD9,
-                0xC5, 0x39, 0x99, 0xCD, 0xAD, 0x31, 0x8B, 0x01, 0x18, 0x23, 0xDD, 0x1F, 0x4E, 0x2D, 0xF9, 0x48,
-                0x4F, 0xF2, 0x65, 0x8E, 0x78, 0x5C, 0x58, 0x19, 0x8D, 0xE5, 0x98, 0x57, 0x67, 0x7F, 0x05, 0x64,
-                0xAF, 0x63, 0xB6, 0xFE, 0xF5, 0xB7, 0x3C, 0xA5, 0xCE, 0xE9, 0x68, 0x44, 0xE0, 0x4D, 0x43, 0x69,
-                0x29, 0x2E, 0xAC, 0x15, 0x59, 0xA8, 0x0A, 0x9E, 0x6E, 0x47, 0xDF, 0x34, 0x35, 0x6A, 0xCF, 0xDC,
-                0x22, 0xC9, 0xC0, 0x9B, 0x89, 0xD4, 0xED, 0xAB, 0x12, 0xA2, 0x0D, 0x52, 0xBB, 0x02, 0x2F, 0xA9,
-                0xD7, 0x61, 0x1E, 0xB4, 0x50, 0x04, 0xF6, 0xC2, 0x16, 0x25, 0x86, 0x56, 0x55, 0x09, 0xBE, 0x91
-            };
-
-        private void SetKey(byte[] key)
-        {
-            var k32e = new int[MAX_KEY_BITS / 64]; // 4
-            var k32o = new int[MAX_KEY_BITS / 64]; // 4
-
-            var sBoxKeys = new int[MAX_KEY_BITS / 64]; // 4
-            _gSubKeys = new int[TOTAL_SUBKEYS];
-
-            if (_k64Cnt < 1)
-            {
-                throw new ArgumentException("Key size less than 64 bits");
-            }
-
-            if (_k64Cnt > 4)
-            {
-                throw new ArgumentException("Key size larger than 256 bits");
-            }
-
-            /*
-            * k64Cnt is the number of 8 byte blocks (64 chunks)
-            * that are in the input key.  The input key is a
-            * maximum of 32 bytes ( 256 bits ), so the range
-            * for k64Cnt is 1..4
-            */
-            for (var i = 0; i < _k64Cnt; i++)
-            {
-                var p = i * 8;
-
-                k32e[i] = BytesTo32Bits(key, p);
-                k32o[i] = BytesTo32Bits(key, p + 4);
-
-                sBoxKeys[_k64Cnt - 1 - i] = RS_MDS_Encode(k32e[i], k32o[i]);
-            }
-
-            for (var i = 0; i < TOTAL_SUBKEYS / 2; i++)
-            {
-                var q = i * SK_STEP;
-                var a = F32(q, k32e);
-                var b = F32(q + SK_BUMP, k32o);
-                b = b << 8 | (int)((uint)b >> 24);
-                a += b;
-                _gSubKeys[i * 2] = a;
-                a += b;
-                _gSubKeys[(i * 2) + 1] = a << SK_ROTL | (int)((uint)a >> (32 - SK_ROTL));
-            }
-
-            /*
-            * fully expand the table for speed
-            */
-            var k0 = sBoxKeys[0];
-            var k1 = sBoxKeys[1];
-            var k2 = sBoxKeys[2];
-            var k3 = sBoxKeys[3];
-            _gSBox = new int[4 * MAX_KEY_BITS];
-            for (var i = 0; i < MAX_KEY_BITS; i++)
-            {
-                int b1, b2, b3;
-                var b0 = b1 = b2 = b3 = i;
-
-#pragma warning disable IDE0010 // Add missing cases
-                switch (_k64Cnt & 3)
-                {
-                    case 1:
-                        _gSBox[i * 2] = _gMDS0[(P[(P_01 * 256) + b0] & 0xff) ^ M_b0(k0)];
-                        _gSBox[(i * 2) + 1] = _gMDS1[(P[(P_11 * 256) + b1] & 0xff) ^ M_b1(k0)];
-                        _gSBox[(i * 2) + 0x200] = _gMDS2[(P[(P_21 * 256) + b2] & 0xff) ^ M_b2(k0)];
-                        _gSBox[(i * 2) + 0x201] = _gMDS3[(P[(P_31 * 256) + b3] & 0xff) ^ M_b3(k0)];
-                        break;
-                    case 0: /* 256 bits of key */
-                        b0 = (P[(P_04 * 256) + b0] & 0xff) ^ M_b0(k3);
-                        b1 = (P[(P_14 * 256) + b1] & 0xff) ^ M_b1(k3);
-                        b2 = (P[(P_24 * 256) + b2] & 0xff) ^ M_b2(k3);
-                        b3 = (P[(P_34 * 256) + b3] & 0xff) ^ M_b3(k3);
-                        goto case 3;
-                    case 3:
-                        b0 = (P[(P_03 * 256) + b0] & 0xff) ^ M_b0(k2);
-                        b1 = (P[(P_13 * 256) + b1] & 0xff) ^ M_b1(k2);
-                        b2 = (P[(P_23 * 256) + b2] & 0xff) ^ M_b2(k2);
-                        b3 = (P[(P_33 * 256) + b3] & 0xff) ^ M_b3(k2);
-                        goto case 2;
-                    case 2:
-                        _gSBox[i * 2] = _gMDS0[(P[(P_01 * 256) + (P[(P_02 * 256) + b0] & 0xff) ^ M_b0(k1)] & 0xff) ^ M_b0(k0)];
-                        _gSBox[(i * 2) + 1] = _gMDS1[(P[(P_11 * 256) + (P[(P_12 * 256) + b1] & 0xff) ^ M_b1(k1)] & 0xff) ^ M_b1(k0)];
-                        _gSBox[(i * 2) + 0x200] = _gMDS2[(P[(P_21 * 256) + (P[(P_22 * 256) + b2] & 0xff) ^ M_b2(k1)] & 0xff) ^ M_b2(k0)];
-                        _gSBox[(i * 2) + 0x201] = _gMDS3[(P[(P_31 * 256) + (P[(P_32 * 256) + b3] & 0xff) ^ M_b3(k1)] & 0xff) ^ M_b3(k0)];
-                        break;
-                }
-#pragma warning restore IDE0010 // Add missing cases
-            }
-
-            /*
-            * the function exits having setup the gSBox with the
-            * input key material.
-            */
-        }
-
-        /*
-        * TODO:  This can be optimised and made cleaner by combining
-        * the functionality in this function and applying it appropriately
-        * to the creation of the subkeys during key setup.
-        */
-        private int F32(int x, int[] k32)
-        {
-            var b0 = M_b0(x);
-            var b1 = M_b1(x);
-            var b2 = M_b2(x);
-            var b3 = M_b3(x);
-            var k0 = k32[0];
-            var k1 = k32[1];
-            var k2 = k32[2];
-            var k3 = k32[3];
-
-            var result = 0;
-
-#pragma warning disable IDE0010 // Add missing cases
-            switch (_k64Cnt & 3)
-            {
-                case 1:
-                    result = _gMDS0[(P[(P_01 * 256) + b0] & 0xff) ^ M_b0(k0)] ^
-                             _gMDS1[(P[(P_11 * 256) + b1] & 0xff) ^ M_b1(k0)] ^
-                             _gMDS2[(P[(P_21 * 256) + b2] & 0xff) ^ M_b2(k0)] ^
-                             _gMDS3[(P[(P_31 * 256) + b3] & 0xff) ^ M_b3(k0)];
-                    break;
-                case 0: /* 256 bits of key */
-                    b0 = (P[(P_04 * 256) + b0] & 0xff) ^ M_b0(k3);
-                    b1 = (P[(P_14 * 256) + b1] & 0xff) ^ M_b1(k3);
-                    b2 = (P[(P_24 * 256) + b2] & 0xff) ^ M_b2(k3);
-                    b3 = (P[(P_34 * 256) + b3] & 0xff) ^ M_b3(k3);
-                    goto case 3;
-                case 3:
-                    b0 = (P[(P_03 * 256) + b0] & 0xff) ^ M_b0(k2);
-                    b1 = (P[(P_13 * 256) + b1] & 0xff) ^ M_b1(k2);
-                    b2 = (P[(P_23 * 256) + b2] & 0xff) ^ M_b2(k2);
-                    b3 = (P[(P_33 * 256) + b3] & 0xff) ^ M_b3(k2);
-                    goto case 2;
-                case 2:
-                    result =
-                    _gMDS0[(P[(P_01 * 256) + (P[(P_02 * 256) + b0] & 0xff) ^ M_b0(k1)] & 0xff) ^ M_b0(k0)] ^
-                    _gMDS1[(P[(P_11 * 256) + (P[(P_12 * 256) + b1] & 0xff) ^ M_b1(k1)] & 0xff) ^ M_b1(k0)] ^
-                    _gMDS2[(P[(P_21 * 256) + (P[(P_22 * 256) + b2] & 0xff) ^ M_b2(k1)] & 0xff) ^ M_b2(k0)] ^
-                    _gMDS3[(P[(P_31 * 256) + (P[(P_32 * 256) + b3] & 0xff) ^ M_b3(k1)] & 0xff) ^ M_b3(k0)];
-                    break;
-            }
-#pragma warning restore IDE0010 // Add missing cases
-
-            return result;
-        }
-
-        /**
-        * Use (12, 8) Reed-Solomon code over GF(256) to produce
-        * a key S-box 32-bit entity from 2 key material 32-bit
-        * entities.
-        *
-        * @param    k0 first 32-bit entity
-        * @param    k1 second 32-bit entity
-        * @return     Remainder polynomial Generated using RS code
-        */
-        private static int RS_MDS_Encode(int k0, int k1)
-        {
-            var r = k1;
-
-            // shift 1 byte at a time
-            r = RS_rem(r);
-            r = RS_rem(r);
-            r = RS_rem(r);
-            r = RS_rem(r);
-            r ^= k0;
-            r = RS_rem(r);
-            r = RS_rem(r);
-            r = RS_rem(r);
-            r = RS_rem(r);
-
-            return r;
-        }
-
-        /**
-        * Reed-Solomon code parameters: (12,8) reversible code:
-        * <p>
-        * <pre>
-        * G(x) = x^4 + (a+1/a)x^3 + ax^2 + (a+1/a)x + 1
-        * </pre>
-        * where a = primitive root of field generator 0x14D.
-        * </p>
-        */
-        private static int RS_rem(int x)
-        {
-            var b = (int)(((uint)x >> 24) & 0xff);
-            var g2 = ((b << 1) ^ ((b & 0x80) != 0 ? RS_GF_FDBK : 0)) & 0xff;
-            var g3 = ((int)((uint)b >> 1) ^ ((b & 0x01) != 0 ? (int)((uint)RS_GF_FDBK >> 1) : 0)) ^ g2;
-            return (x << 8) ^ (g3 << 24) ^ (g2 << 16) ^ (g3 << 8) ^ b;
-        }
-
-        private static int LFSR1(int x)
-        {
-            return (x >> 1) ^ (((x & 0x01) != 0) ? GF256_FDBK_2 : 0);
-        }
-
-        private static int LFSR2(int x)
-        {
-            return (x >> 2) ^ (((x & 0x02) != 0) ? GF256_FDBK_2 : 0) ^ (((x & 0x01) != 0) ? GF256_FDBK_4 : 0);
-        }
-
-        private static int Mx_X(int x)
-        {
-            return x ^ LFSR2(x);
-        } // 5B
-
-        private static int Mx_Y(int x)
-        {
-            return x ^ LFSR1(x) ^ LFSR2(x);
-        } // EF
-
-#pragma warning disable IDE1006 // Naming Styles
-        private static int M_b0(int x)
-#pragma warning restore IDE1006 // Naming Styles
-        {
-            return x & 0xff;
-        }
-
-#pragma warning disable IDE1006 // Naming Styles
-        private static int M_b1(int x)
-#pragma warning restore IDE1006 // Naming Styles
-        {
-            return (int)((uint)x >> 8) & 0xff;
-        }
-
-#pragma warning disable IDE1006 // Naming Styles
-        private static int M_b2(int x)
-#pragma warning restore IDE1006 // Naming Styles
-        {
-            return (int)((uint)x >> 16) & 0xff;
-        }
-
-#pragma warning disable IDE1006 // Naming Styles
-        private static int M_b3(int x)
-#pragma warning restore IDE1006 // Naming Styles
-        {
-            return (int)((uint)x >> 24) & 0xff;
-        }
-
-        private static int Fe32_0(int[] gSBox1, int x)
-        {
-            return gSBox1[0x000 + (2 * (x & 0xff))] ^
-                   gSBox1[0x001 + (2 * ((int)((uint)x >> 8) & 0xff))] ^
-                   gSBox1[0x200 + (2 * ((int)((uint)x >> 16) & 0xff))] ^
-                   gSBox1[0x201 + (2 * ((int)((uint)x >> 24) & 0xff))];
-        }
-
-        private static int Fe32_3(int[] gSBox1, int x)
-        {
-            return gSBox1[0x000 + (2 * ((int)((uint)x >> 24) & 0xff))] ^
-                   gSBox1[0x001 + (2 * (x & 0xff))] ^
-                   gSBox1[0x200 + (2 * ((int)((uint)x >> 8) & 0xff))] ^
-                   gSBox1[0x201 + (2 * ((int)((uint)x >> 16) & 0xff))];
-        }
-
-        private static int BytesTo32Bits(byte[] b, int p)
-        {
-            return (b[p] & 0xff) |
-                ((b[p + 1] & 0xff) << 8) |
-                ((b[p + 2] & 0xff) << 16) |
-                ((b[p + 3] & 0xff) << 24);
-        }
-
-        private static void Bits32ToBytes(int inData, byte[] b, int offset)
-        {
-            b[offset] = (byte)inData;
-            b[offset + 1] = (byte)(inData >> 8);
-            b[offset + 2] = (byte)(inData >> 16);
-            b[offset + 3] = (byte)(inData >> 24);
-        }
-    }
-}

+ 0 - 61
src/Renci.SshNet/Security/Cryptography/HMACMD5.cs

@@ -1,61 +0,0 @@
-using System.Security.Cryptography;
-
-using Renci.SshNet.Common;
-
-namespace Renci.SshNet.Security.Cryptography
-{
-    /// <summary>
-    /// Computes a Hash-based Message Authentication Code (HMAC) by using the <see cref="MD5"/> hash function.
-    /// </summary>
-    public class HMACMD5 : System.Security.Cryptography.HMACMD5
-    {
-        private readonly int _hashSize;
-
-        /// <summary>
-        /// Initializes a new instance of the <see cref="HMACMD5"/> class with the specified key.
-        /// </summary>
-        /// <param name="key">The key.</param>
-        public HMACMD5(byte[] key)
-            : base(key)
-        {
-#pragma warning disable MA0056 // Do not call overridable members in constructor
-            _hashSize = base.HashSize;
-#pragma warning restore MA0056 // Do not call overridable members in constructor
-        }
-
-        /// <summary>
-        /// Initializes a new instance of the <see cref="HMACMD5"/> class with the specified key
-        /// and size of the computed hash code.
-        /// </summary>
-        /// <param name="key">The key.</param>
-        /// <param name="hashSize">The size, in bits, of the computed hash code.</param>
-        public HMACMD5(byte[] key, int hashSize)
-            : base(key)
-        {
-            _hashSize = hashSize;
-        }
-
-        /// <summary>
-        /// Gets the size, in bits, of the computed hash code.
-        /// </summary>
-        /// <value>
-        /// The size, in bits, of the computed hash code.
-        /// </value>
-        public override int HashSize
-        {
-            get { return _hashSize; }
-        }
-
-        /// <summary>
-        /// Finalizes the hash computation after the last data is processed by the cryptographic stream object.
-        /// </summary>
-        /// <returns>
-        /// The computed hash code.
-        /// </returns>
-        protected override byte[] HashFinal()
-        {
-            var hash = base.HashFinal();
-            return hash.Take(HashSize / 8);
-        }
-    }
-}

+ 0 - 60
src/Renci.SshNet/Security/Cryptography/HMACSHA1.cs

@@ -1,60 +0,0 @@
-using System.Security.Cryptography;
-
-using Renci.SshNet.Common;
-
-namespace Renci.SshNet.Security.Cryptography
-{
-    /// <summary>
-    /// Computes a Hash-based Message Authentication Code (HMAC) by using the <see cref="SHA1"/> hash function.
-    /// </summary>
-    public class HMACSHA1 : System.Security.Cryptography.HMACSHA1
-    {
-        private readonly int _hashSize;
-
-        /// <summary>
-        /// Initializes a new instance of the <see cref="HMACSHA1"/> class with the specified key.
-        /// </summary>
-        /// <param name="key">The key.</param>
-        public HMACSHA1(byte[] key)
-            : base(key)
-        {
-#pragma warning disable MA0056 // Do not call overridable members in constructor
-            _hashSize = base.HashSize;
-#pragma warning restore MA0056 // Do not call overridable members in constructor
-        }
-
-        /// <summary>
-        /// Initializes a new instance of the <see cref="HMACSHA1"/> class with the specified key and size of the computed hash code.
-        /// </summary>
-        /// <param name="key">The key.</param>
-        /// <param name="hashSize">The size, in bits, of the computed hash code.</param>
-        public HMACSHA1(byte[] key, int hashSize)
-            : base(key)
-        {
-            _hashSize = hashSize;
-        }
-
-        /// <summary>
-        /// Gets the size, in bits, of the computed hash code.
-        /// </summary>
-        /// <value>
-        /// The size, in bits, of the computed hash code.
-        /// </value>
-        public override int HashSize
-        {
-            get { return _hashSize; }
-        }
-
-        /// <summary>
-        /// Finalizes the hash computation after the last data is processed by the cryptographic stream object.
-        /// </summary>
-        /// <returns>
-        /// The computed hash code.
-        /// </returns>
-        protected override byte[] HashFinal()
-        {
-            var hash = base.HashFinal();
-            return hash.Take(HashSize / 8);
-        }
-    }
-}

+ 0 - 61
src/Renci.SshNet/Security/Cryptography/HMACSHA256.cs

@@ -1,61 +0,0 @@
-using System.Security.Cryptography;
-
-using Renci.SshNet.Common;
-
-namespace Renci.SshNet.Security.Cryptography
-{
-    /// <summary>
-    /// Computes a Hash-based Message Authentication Code (HMAC) by using the <see cref="SHA256"/> hash function.
-    /// </summary>
-    public class HMACSHA256 : System.Security.Cryptography.HMACSHA256
-    {
-        private readonly int _hashSize;
-
-        /// <summary>
-        /// Initializes a new instance of the <see cref="HMACSHA256"/> class with the specified key.
-        /// </summary>
-        /// <param name="key">The key.</param>
-        public HMACSHA256(byte[] key)
-            : base(key)
-        {
-#pragma warning disable MA0056 // Do not call overridable members in constructor
-            _hashSize = base.HashSize;
-#pragma warning restore MA0056 // Do not call overridable members in constructor
-        }
-
-        /// <summary>
-        /// Initializes a new instance of the <see cref="HMACSHA256"/> class with the specified key
-        /// and size of the computed hash code.
-        /// </summary>
-        /// <param name="key">The key.</param>
-        /// <param name="hashSize">The size, in bits, of the computed hash code.</param>
-        public HMACSHA256(byte[] key, int hashSize)
-            : base(key)
-        {
-            _hashSize = hashSize;
-        }
-
-        /// <summary>
-        /// Gets the size, in bits, of the computed hash code.
-        /// </summary>
-        /// <value>
-        /// The size, in bits, of the computed hash code.
-        /// </value>
-        public override int HashSize
-        {
-            get { return _hashSize; }
-        }
-
-        /// <summary>
-        /// Finalizes the hash computation after the last data is processed by the cryptographic stream object.
-        /// </summary>
-        /// <returns>
-        /// The computed hash code.
-        /// </returns>
-        protected override byte[] HashFinal()
-        {
-            var hash = base.HashFinal();
-            return hash.Take(HashSize / 8);
-        }
-    }
-}

+ 0 - 61
src/Renci.SshNet/Security/Cryptography/HMACSHA384.cs

@@ -1,61 +0,0 @@
-using System.Security.Cryptography;
-
-using Renci.SshNet.Common;
-
-namespace Renci.SshNet.Security.Cryptography
-{
-    /// <summary>
-    /// Computes a Hash-based Message Authentication Code (HMAC) by using the <see cref="SHA384"/> hash function.
-    /// </summary>
-    public class HMACSHA384 : System.Security.Cryptography.HMACSHA384
-    {
-        private readonly int _hashSize;
-
-        /// <summary>
-        /// Initializes a new instance of the <see cref="HMACSHA384"/> class with the specified key.
-        /// </summary>
-        /// <param name="key">The key.</param>
-        public HMACSHA384(byte[] key)
-            : base(key)
-        {
-#pragma warning disable MA0056 // Do not call overridable members in constructor
-            _hashSize = base.HashSize;
-#pragma warning restore MA0056 // Do not call overridable members in constructor
-        }
-
-        /// <summary>
-        /// Initializes a new instance of the <see cref="HMACSHA384"/> class with the specified key
-        /// and size of the computed hash code.
-        /// </summary>
-        /// <param name="key">The key.</param>
-        /// <param name="hashSize">The size, in bits, of the computed hash code.</param>
-        public HMACSHA384(byte[] key, int hashSize)
-            : base(key)
-        {
-            _hashSize = hashSize;
-        }
-
-        /// <summary>
-        /// Gets the size, in bits, of the computed hash code.
-        /// </summary>
-        /// <value>
-        /// The size, in bits, of the computed hash code.
-        /// </value>
-        public override int HashSize
-        {
-            get { return _hashSize; }
-        }
-
-        /// <summary>
-        /// Finalizes the hash computation after the last data is processed by the cryptographic stream object.
-        /// </summary>
-        /// <returns>
-        /// The computed hash code.
-        /// </returns>
-        protected override byte[] HashFinal()
-        {
-            var hash = base.HashFinal();
-            return hash.Take(HashSize / 8);
-        }
-    }
-}

+ 0 - 61
src/Renci.SshNet/Security/Cryptography/HMACSHA512.cs

@@ -1,61 +0,0 @@
-using System.Security.Cryptography;
-
-using Renci.SshNet.Common;
-
-namespace Renci.SshNet.Security.Cryptography
-{
-    /// <summary>
-    /// Computes a Hash-based Message Authentication Code (HMAC) by using the <see cref="SHA512"/> hash function.
-    /// </summary>
-    public class HMACSHA512 : System.Security.Cryptography.HMACSHA512
-    {
-        private readonly int _hashSize;
-
-        /// <summary>
-        /// Initializes a new instance of the <see cref="HMACSHA512"/> class with the specified key.
-        /// </summary>
-        /// <param name="key">The key.</param>
-        public HMACSHA512(byte[] key)
-            : base(key)
-        {
-#pragma warning disable MA0056 // Do not call overridable members in constructor
-            _hashSize = base.HashSize;
-#pragma warning restore MA0056 // Do not call overridable members in constructor
-        }
-
-        /// <summary>
-        /// Initializes a new instance of the <see cref="HMACSHA512"/> class with the specified key
-        /// and size of the computed hash code.
-        /// </summary>
-        /// <param name="key">The key.</param>
-        /// <param name="hashSize">The size, in bits, of the computed hash code.</param>
-        public HMACSHA512(byte[] key, int hashSize)
-            : base(key)
-        {
-            _hashSize = hashSize;
-        }
-
-        /// <summary>
-        /// Gets the size, in bits, of the computed hash code.
-        /// </summary>
-        /// <value>
-        /// The size, in bits, of the computed hash code.
-        /// </value>
-        public override int HashSize
-        {
-            get { return _hashSize; }
-        }
-
-        /// <summary>
-        /// Finalizes the hash computation after the last data is processed by the cryptographic stream object.
-        /// </summary>
-        /// <returns>
-        /// The computed hash code.
-        /// </returns>
-        protected override byte[] HashFinal()
-        {
-            var hash = base.HashFinal();
-            return hash.Take(HashSize / 8);
-        }
-    }
-}

+ 0 - 20
src/Renci.SshNet/Security/Cryptography/StreamCipher.cs

@@ -1,20 +0,0 @@
-using System;
-
-namespace Renci.SshNet.Security.Cryptography
-{
-    /// <summary>
-    /// Base class of stream cipher algorithms.
-    /// </summary>
-    public abstract class StreamCipher : SymmetricCipher
-    {
-        /// <summary>
-        /// Initializes a new instance of the <see cref="StreamCipher"/> class.
-        /// </summary>
-        /// <param name="key">The key.</param>
-        /// <exception cref="ArgumentNullException"><paramref name="key"/> is <see langword="null"/>.</exception>
-        protected StreamCipher(byte[] key)
-            : base(key)
-        {
-        }
-    }
-}

+ 0 - 35
test/Renci.SshNet.IntegrationTests/HmacTests.cs

@@ -22,30 +22,12 @@ namespace Renci.SshNet.IntegrationTests
             _remoteSshdConfig?.Reset();
         }
 
-        [TestMethod]
-        public void HmacMd5()
-        {
-            DoTest(MessageAuthenticationCodeAlgorithm.HmacMd5);
-        }
-
-        [TestMethod]
-        public void HmacMd5_96()
-        {
-            DoTest(MessageAuthenticationCodeAlgorithm.HmacMd5_96);
-        }
-
         [TestMethod]
         public void HmacSha1()
         {
             DoTest(MessageAuthenticationCodeAlgorithm.HmacSha1);
         }
 
-        [TestMethod]
-        public void HmacSha1_96()
-        {
-            DoTest(MessageAuthenticationCodeAlgorithm.HmacSha1_96);
-        }
-
         [TestMethod]
         public void HmacSha2_256()
         {
@@ -58,17 +40,6 @@ namespace Renci.SshNet.IntegrationTests
             DoTest(MessageAuthenticationCodeAlgorithm.HmacSha2_512);
         }
 
-        [TestMethod]
-        public void HmacMd5_Etm()
-        {
-            DoTest(MessageAuthenticationCodeAlgorithm.HmacMd5Etm);
-        }
-
-        [TestMethod]
-        public void HmacMd5_96_Etm()
-        {
-            DoTest(MessageAuthenticationCodeAlgorithm.HmacMd5_96_Etm);
-        }
 
         [TestMethod]
         public void HmacSha1_Etm()
@@ -76,12 +47,6 @@ namespace Renci.SshNet.IntegrationTests
             DoTest(MessageAuthenticationCodeAlgorithm.HmacSha1Etm);
         }
 
-        [TestMethod]
-        public void HmacSha1_96_Etm()
-        {
-            DoTest(MessageAuthenticationCodeAlgorithm.HmacSha1_96_Etm);
-        }
-
         [TestMethod]
         public void HmacSha2_256_Etm()
         {

+ 2 - 2
test/Renci.SshNet.Tests/Classes/Security/Cryptography/BlockCipherTest.cs

@@ -19,7 +19,7 @@ namespace Renci.SshNet.Tests.Classes.Security.Cryptography
             var input = new byte[] { 0x2c, 0x1a, 0x05, 0x00, 0x68 };
             var output = new byte[] { 0x0a, 0x00, 0x03, 0x02, 0x06, 0x08, 0x07, 0x05 };
             var key = new byte[] { 0x17, 0x78, 0x56, 0xe1, 0x3e, 0xbd, 0x3e, 0x50, 0x1d, 0x79, 0x3f, 0x0f, 0x55, 0x37, 0x45, 0x54 };
-            var blockCipher = new BlockCipherStub(key, 8, null, new PKCS5Padding())
+            var blockCipher = new BlockCipherStub(key, 8, null, new PKCS7Padding())
             {
                 EncryptBlockDelegate = (inputBuffer, inputOffset, inputCount, outputBuffer, outputOffset) =>
                     {
@@ -40,7 +40,7 @@ namespace Renci.SshNet.Tests.Classes.Security.Cryptography
             var input = new byte[] { 0x2c, 0x1a, 0x05, 0x00, 0x68 };
             var output = new byte[] { 0x0a, 0x00, 0x03, 0x02, 0x06, 0x08, 0x07, 0x05 };
             var key = new byte[] { 0x17, 0x78, 0x56, 0xe1, 0x3e, 0xbd, 0x3e, 0x50, 0x1d, 0x79, 0x3f, 0x0f, 0x55, 0x37, 0x45, 0x54 };
-            var blockCipher = new BlockCipherStub(key, 8, null, new PKCS5Padding())
+            var blockCipher = new BlockCipherStub(key, 8, null, new PKCS7Padding())
             {
                 DecryptBlockDelegate = (inputBuffer, inputOffset, inputCount, outputBuffer, outputOffset) =>
                     {

+ 0 - 107
test/Renci.SshNet.Tests/Classes/Security/Cryptography/Ciphers/Arc4CipherTest.cs

@@ -1,107 +0,0 @@
-using System.Text;
-
-using Microsoft.VisualStudio.TestTools.UnitTesting;
-
-using Renci.SshNet.Common;
-using Renci.SshNet.Security.Cryptography.Ciphers;
-using Renci.SshNet.Tests.Common;
-
-namespace Renci.SshNet.Tests.Classes.Security.Cryptography.Ciphers
-{
-    /// <summary>
-    /// Implements ARCH4 cipher algorithm
-    /// </summary>
-    [TestClass]
-    public class Arc4CipherTest : TestBase
-    {
-        [TestMethod]
-        public void Decrypt_DischargeFirstBytes_False1()
-        {
-            const string key = "Key";
-            const string expectedPlainText = "Plaintext";
-            var encoding = Encoding.ASCII;
-            var cipher = new Arc4Cipher(encoding.GetBytes(key), false);
-            var cipherText = new byte[] { 0xBB, 0xF3, 0x16, 0xE8, 0xD9, 0x40, 0xAF, 0x0A, 0xD3 };
-
-            var actualPlainText = cipher.Decrypt(cipherText);
-
-            Assert.AreEqual(expectedPlainText, encoding.GetString(actualPlainText));
-        }
-
-        [TestMethod]
-        public void Decrypt_DischargeFirstBytes_False2()
-        {
-            const string key = "Wiki";
-            const string expectedPlainText = "pedia";
-            var encoding = Encoding.ASCII;
-            var cipher = new Arc4Cipher(encoding.GetBytes(key), false);
-            var cipherText = new byte[] { 0x10, 0X21, 0xBF, 0x04, 0x20 };
-
-            var actualPlainText = cipher.Decrypt(cipherText);
-
-            Assert.AreEqual(expectedPlainText, encoding.GetString(actualPlainText));
-        }
-
-        [TestMethod]
-        public void Decrypt_InputAndOffsetAndLength()
-        {
-            const string key = "Key";
-            const string expectedPlainText = "Plaintext";
-            var encoding = Encoding.ASCII;
-            var cipher = new Arc4Cipher(encoding.GetBytes(key), false);
-            var cipherText = new byte[] { 0x0A, 0x0f, 0xBB, 0xF3, 0x16, 0xE8, 0xD9, 0x40, 0xAF, 0x0A, 0xD3, 0x0d, 0x05 };
-
-            var actualPlainText = cipher.Decrypt(cipherText, 2, cipherText.Length - 4);
-
-            Assert.AreEqual(expectedPlainText, encoding.GetString(actualPlainText));
-        }
-
-        [TestMethod]
-        public void Encrypt_DischargeFirstBytes_False1()
-        {
-            const string key = "Key";
-            const string plainText = "Plaintext";
-            var encoding = Encoding.ASCII;
-            var cipher = new Arc4Cipher(encoding.GetBytes(key), false);
-            var expectedCipherText = new byte[] { 0xBB, 0xF3, 0x16, 0xE8, 0xD9, 0x40, 0xAF, 0x0A, 0xD3 };
-
-            var actualCipherText = cipher.Encrypt(encoding.GetBytes(plainText));
-
-            Assert.IsNotNull(actualCipherText);
-            Assert.IsTrue(expectedCipherText.IsEqualTo(actualCipherText));
-        }
-
-        [TestMethod]
-        public void Encrypt_DischargeFirstBytes_False2()
-        {
-            const string key = "Wiki";
-            const string plainText = "pedia";
-            var encoding = Encoding.ASCII;
-            var cipher = new Arc4Cipher(encoding.GetBytes(key), false);
-            var expectedCipherText = new byte[] { 0x10, 0X21, 0xBF, 0x04, 0x20 };
-
-            var actualCipherText = cipher.Encrypt(encoding.GetBytes(plainText));
-
-            Assert.IsNotNull(actualCipherText);
-            Assert.IsTrue(expectedCipherText.IsEqualTo(actualCipherText));
-        }
-
-        [TestMethod]
-        public void Encrypt_InputAndOffsetAndLength()
-        {
-            const string key = "Wiki";
-            const string plainText = "NOpediaNO";
-            var encoding = Encoding.ASCII;
-            var cipher = new Arc4Cipher(encoding.GetBytes(key), false);
-            var plainTextBytes = encoding.GetBytes(plainText);
-            var expectedCipherText = new byte[] { 0x10, 0X21, 0xBF, 0x04, 0x20 };
-
-            var actualCipherText = cipher.Encrypt(plainTextBytes, 2, plainTextBytes.Length - 4);
-
-            Assert.IsNotNull(actualCipherText);
-            Assert.IsTrue(expectedCipherText.IsEqualTo(actualCipherText));
-
-            Assert.IsTrue(plainTextBytes.IsEqualTo(encoding.GetBytes(plainText)));
-        }
-    }
-}

+ 0 - 33
test/Renci.SshNet.Tests/Classes/Security/Cryptography/Ciphers/BlowfishCipherTest.cs

@@ -1,33 +0,0 @@
-using System.Linq;
-
-using Microsoft.VisualStudio.TestTools.UnitTesting;
-
-using Renci.SshNet.Security.Cryptography.Ciphers;
-using Renci.SshNet.Security.Cryptography.Ciphers.Modes;
-using Renci.SshNet.Tests.Common;
-
-namespace Renci.SshNet.Tests.Classes.Security.Cryptography.Ciphers
-{
-    /// <summary>
-    ///
-    /// </summary>
-    [TestClass]
-    public class BlowfishCipherTest : TestBase
-    {
-        [TestMethod]
-        public void Test_Cipher_Blowfish_128_CBC()
-        {
-            var input = new byte[] { 0x00, 0x00, 0x00, 0x2c, 0x1a, 0x05, 0x00, 0x00, 0x00, 0x0c, 0x73, 0x73, 0x68, 0x2d, 0x75, 0x73, 0x65, 0x72, 0x61, 0x75, 0x74, 0x68, 0x30, 0x9e, 0xe0, 0x9c, 0x12, 0xee, 0x3a, 0x30, 0x03, 0x52, 0x1c, 0x1a, 0xe7, 0x3e, 0x0b, 0x9a, 0xcf, 0x9a, 0x57, 0x42, 0x0b, 0x4f, 0x4a, 0x15, 0xa0, 0xf5 };
-            var key = new byte[] { 0xe4, 0x94, 0xf9, 0xb1, 0x00, 0x4f, 0x16, 0x2a, 0x80, 0x11, 0xea, 0x73, 0x0d, 0xb9, 0xbf, 0x64 };
-            var iv = new byte[] { 0x74, 0x8b, 0x4f, 0xe6, 0xc1, 0x29, 0xb3, 0x54, 0xec, 0x77, 0x92, 0xf3, 0x15, 0xa0, 0x41, 0xa8 };
-            var output = new byte[] { 0x50, 0x49, 0xe0, 0xce, 0x98, 0x93, 0x8b, 0xec, 0x82, 0x7d, 0x14, 0x1b, 0x3e, 0xdc, 0xca, 0x63, 0xef, 0x36, 0x20, 0x67, 0x58, 0x63, 0x1f, 0x9c, 0xd2, 0x12, 0x6b, 0xca, 0xea, 0xd0, 0x78, 0x8b, 0x61, 0x50, 0x4f, 0xc4, 0x5b, 0x32, 0x91, 0xd6, 0x65, 0xcb, 0x74, 0xe5, 0x6e, 0xf5, 0xde, 0x14 };
-            var testCipher = new BlowfishCipher(key, new CbcCipherMode(iv), null);
-            var r = testCipher.Encrypt(input);
-
-            if (!r.SequenceEqual(output))
-            {
-                Assert.Fail("Invalid encryption");
-            }
-        }
-    }
-}

+ 0 - 43
test/Renci.SshNet.Tests/Classes/Security/Cryptography/Ciphers/CastCipherTest.cs

@@ -1,43 +0,0 @@
-using System.Linq;
-
-using Microsoft.VisualStudio.TestTools.UnitTesting;
-
-using Renci.SshNet.Security.Cryptography.Ciphers;
-using Renci.SshNet.Security.Cryptography.Ciphers.Modes;
-using Renci.SshNet.Tests.Common;
-
-namespace Renci.SshNet.Tests.Classes.Security.Cryptography.Ciphers
-{
-    /// <summary>
-    /// Implements CAST cipher algorithm
-    /// </summary>
-    [TestClass]
-    public class CastCipherTest : TestBase
-    {
-        [TestMethod]
-        public void Encrypt_128_CBC()
-        {
-            var input = new byte[] { 0x00, 0x00, 0x00, 0x2c, 0x1a, 0x05, 0x00, 0x00, 0x00, 0x0c, 0x73, 0x73, 0x68, 0x2d, 0x75, 0x73, 0x65, 0x72, 0x61, 0x75, 0x74, 0x68, 0x30, 0x9e, 0xe0, 0x9c, 0x12, 0xee, 0x3a, 0x30, 0x03, 0x52, 0x1c, 0x1a, 0xe7, 0x3e, 0x0b, 0x9a, 0xcf, 0x9a, 0x57, 0x42, 0x0b, 0x4f, 0x4a, 0x15, 0xa0, 0xf5 };
-            var key = new byte[] { 0xe4, 0x94, 0xf9, 0xb1, 0x00, 0x4f, 0x16, 0x2a, 0x80, 0x11, 0xea, 0x73, 0x0d, 0xb9, 0xbf, 0x64 };
-            var iv = new byte[] { 0x74, 0x8b, 0x4f, 0xe6, 0xc1, 0x29, 0xb3, 0x54, 0xec, 0x77, 0x92, 0xf3, 0x15, 0xa0, 0x41, 0xa8 };
-            var output = new byte[] { 0x32, 0xef, 0xbd, 0xac, 0xb6, 0xfd, 0x1f, 0xae, 0x1b, 0x13, 0x5f, 0x31, 0x6d, 0x38, 0xcd, 0xb0, 0xe3, 0xca, 0xe1, 0xbc, 0xf8, 0xa7, 0xc2, 0x31, 0x62, 0x14, 0x3a, 0x9a, 0xda, 0xe3, 0xf8, 0xc8, 0x70, 0x87, 0x53, 0x21, 0x5d, 0xb7, 0x94, 0xb7, 0xe8, 0xc6, 0x9d, 0x46, 0x0c, 0x6d, 0x64, 0x6d };
-            var testCipher = new CastCipher(key, new CbcCipherMode(iv), null);
-            var r = testCipher.Encrypt(input);
-
-            Assert.IsTrue(r.SequenceEqual(output));
-        }
-
-        [TestMethod]
-        public void Decrypt_128_CBC()
-        {
-            var input = new byte[] { 0x00, 0x00, 0x00, 0x2c, 0x1a, 0x05, 0x00, 0x00, 0x00, 0x0c, 0x73, 0x73, 0x68, 0x2d, 0x75, 0x73, 0x65, 0x72, 0x61, 0x75, 0x74, 0x68, 0x30, 0x9e, 0xe0, 0x9c, 0x12, 0xee, 0x3a, 0x30, 0x03, 0x52, 0x1c, 0x1a, 0xe7, 0x3e, 0x0b, 0x9a, 0xcf, 0x9a, 0x57, 0x42, 0x0b, 0x4f, 0x4a, 0x15, 0xa0, 0xf5 };
-            var key = new byte[] { 0xe4, 0x94, 0xf9, 0xb1, 0x00, 0x4f, 0x16, 0x2a, 0x80, 0x11, 0xea, 0x73, 0x0d, 0xb9, 0xbf, 0x64 };
-            var iv = new byte[] { 0x74, 0x8b, 0x4f, 0xe6, 0xc1, 0x29, 0xb3, 0x54, 0xec, 0x77, 0x92, 0xf3, 0x15, 0xa0, 0x41, 0xa8 };
-            var output = new byte[] { 0x32, 0xef, 0xbd, 0xac, 0xb6, 0xfd, 0x1f, 0xae, 0x1b, 0x13, 0x5f, 0x31, 0x6d, 0x38, 0xcd, 0xb0, 0xe3, 0xca, 0xe1, 0xbc, 0xf8, 0xa7, 0xc2, 0x31, 0x62, 0x14, 0x3a, 0x9a, 0xda, 0xe3, 0xf8, 0xc8, 0x70, 0x87, 0x53, 0x21, 0x5d, 0xb7, 0x94, 0xb7, 0xe8, 0xc6, 0x9d, 0x46, 0x0c, 0x6d, 0x64, 0x6d };
-            var testCipher = new CastCipher(key, new CbcCipherMode(iv), null);
-            var r = testCipher.Decrypt(output);
-
-            Assert.IsTrue(r.SequenceEqual(input));
-        }
-    }
-}

+ 0 - 63
test/Renci.SshNet.Tests/Classes/Security/Cryptography/Ciphers/Paddings/PKCS5PaddingTest.cs

@@ -1,63 +0,0 @@
-using Microsoft.VisualStudio.TestTools.UnitTesting;
-
-using Renci.SshNet.Common;
-using Renci.SshNet.Security.Cryptography.Ciphers.Paddings;
-
-namespace Renci.SshNet.Tests.Classes.Security.Cryptography.Ciphers.Paddings
-{
-    [TestClass]
-    public class PKCS5PaddingTest
-    {
-        private PKCS5Padding _padding;
-
-        [TestInitialize]
-        public void SetUp()
-        {
-            _padding = new PKCS5Padding();
-        }
-
-        [TestMethod]
-        public void Pad_BlockSizeAndInput_LessThanBlockSize()
-        {
-            var input = new byte[] { 0x01, 0x02, 0x03, 0x04, 0x05 };
-            var expected = new byte[] { 0x01, 0x02, 0x03, 0x04, 0x05, 0x03, 0x03, 0x03 };
-
-            var actual = _padding.Pad(8, input);
-
-            Assert.IsTrue(expected.IsEqualTo(actual));
-        }
-
-        [TestMethod]
-        public void Pad_BlockSizeAndInput_MoreThanBlockSizeButNoMultipleOfBlockSize()
-        {
-            var input = new byte[] { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09 };
-            var expected = new byte[] { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x07, 0x07, 0x07, 0x07, 0x07, 0x07, 0x07 };
-
-            var actual = _padding.Pad(8, input);
-
-            Assert.IsTrue(expected.IsEqualTo(actual));
-        }
-
-        [TestMethod]
-        public void Pad_BlockSizeAndInputAndOffsetAndLength_LessThanBlockSize()
-        {
-            var input = new byte[] { 0x0f, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06 };
-            var expected = new byte[] { 0x01, 0x02, 0x03, 0x04, 0x05, 0x03, 0x03, 0x03 };
-
-            var actual = _padding.Pad(8, input, 1, input.Length - 2);
-
-            Assert.IsTrue(expected.IsEqualTo(actual));
-        }
-
-        [TestMethod]
-        public void Pad_BlockSizeAndInputAndOffsetAndLength_MoreThanBlockSizeButNoMultipleOfBlockSize()
-        {
-            var input = new byte[] { 0x0f, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x10 };
-            var expected = new byte[] { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x07, 0x07, 0x07, 0x07, 0x07, 0x07, 0x07 };
-
-            var actual = _padding.Pad(8, input, 1, input.Length - 2);
-
-            Assert.IsTrue(expected.IsEqualTo(actual));
-        }
-    }
-}