可能你正在使用openfire.jar里面的Blowfish进行加密,但一个openfire.jar包有7M多,有时候还出现项目可以正常部署,但运行不起来,老是报编译jsp文件出错,没有办法,只好下载openfire源代码,把Blowfish.java这个类代码拷出来,不使用openfire.jar,项目可以正常运行,也不用openfire.jar这个7M多的包,感觉很好




Blowfish blowfish = new Blowfish(getPasswordKey());
String encryptedPassword = blowfish.encryptString(openFireUserPO.getEncryptedPassword());


可以参考

Openfire3.6.4用户密码的保存及加密、解密


下面是Blowfish.java的源代码


/*** $RCSfile$* $Revision: 3657 $* $Date: 2002-09-09 08:31:31 -0700 (Mon, 09 Sep 2002) $** Adapted from Markus Hahn's Blowfish package so that all functionality is* in a single source file. Please visit the following URL for his excellent* package: http://www.hotpixel.net/software.html** Copyright (c) 1997-2002 Markus Hahn <markus_hahn@gmx.net>** Released under the Apache 2.0 license.*/package com.catic.mobilehos.utils;import java.security.MessageDigest;
import java.util.Random;import org.apache.commons.logging.Log;
import org.apache.commons.logging.LogFactory;/*** A class that provides easy Blowfish encryption.<p>** @author Markus Hahn <markus_hahn@gmx.net>* @author Gaston Dombiak*/
public class Blowfish {private Log Log = LogFactory.getLog(this.getClass());private BlowfishCBC m_bfish;private static Random m_rndGen = new Random();/*** Creates a new Blowfish object using the specified key (oversized* password will be cut).** @param password the password (treated as a real unicode array)*/public Blowfish(String password) {// hash down the password to a 160bit keyMessageDigest digest = null;try {digest = MessageDigest.getInstance("SHA1");digest.update(password.getBytes());}catch (Exception e) {Log.error(e.getMessage(), e);}// setup the encryptor (use a dummy IV)m_bfish = new BlowfishCBC(digest.digest(), 0);digest.reset();}/*** Encrypts a string (treated in UNICODE) using the* standard Java random generator, which isn't that* great for creating IVs** @param sPlainText string to encrypt* @return encrypted string in binhex format*/public String encryptString(String sPlainText) {// get the IVlong lCBCIV;synchronized (m_rndGen){lCBCIV = m_rndGen.nextLong();}// map the call;return encStr(sPlainText, lCBCIV);}// Internal routine for string encryptionprivate String encStr(String sPlainText,long lNewCBCIV){// allocate the buffer (align to the next 8 byte border plus padding)int nStrLen = sPlainText.length();byte[] buf = new byte [((nStrLen << 1) & 0xfffffff8) + 8];// copy all bytes of the string into the buffer (use network byte order)int nI;int nPos = 0;for (nI = 0; nI < nStrLen; nI++){char cActChar = sPlainText.charAt(nI);buf[nPos++] = (byte) ((cActChar >> 8) & 0x0ff);buf[nPos++] = (byte) (cActChar & 0x0ff) ;}// pad the rest with the PKCS5 schemebyte bPadVal = (byte)(buf.length - (nStrLen << 1));while (nPos < buf.length){buf[nPos++] = bPadVal;}synchronized (m_bfish) {// create the encryptorm_bfish.setCBCIV(lNewCBCIV);// encrypt the bufferm_bfish.encrypt(buf);}// return the binhex stringbyte[] newCBCIV = new byte[BlowfishCBC.BLOCKSIZE];longToByteArray(lNewCBCIV,newCBCIV,0);return bytesToBinHex(newCBCIV, 0, BlowfishCBC.BLOCKSIZE) +bytesToBinHex(buf, 0, buf.length);}/*** decrypts a hexbin string (handling is case sensitive)* @param sCipherText hexbin string to decrypt* @return decrypted string (null equals an error)*/public String decryptString(String sCipherText){// get the number of estimated bytes in the string (cut off broken blocks)int nLen = (sCipherText.length() >> 1) & ~7;// does the given stuff make sense (at least the CBC IV)?if (nLen < BlowfishECB.BLOCKSIZE)return null;// get the CBC IVbyte[] cbciv = new byte[BlowfishCBC.BLOCKSIZE];int nNumOfBytes = binHexToBytes(sCipherText,cbciv,0,0,BlowfishCBC.BLOCKSIZE);if (nNumOfBytes < BlowfishCBC.BLOCKSIZE)return null;// something left to decrypt?nLen -= BlowfishCBC.BLOCKSIZE;if (nLen == 0){return "";}// get all data bytes nowbyte[] buf = new byte[nLen];nNumOfBytes = binHexToBytes(sCipherText,buf,BlowfishCBC.BLOCKSIZE * 2,0,nLen);// we cannot accept broken binhex sequences due to padding// and decryptionif (nNumOfBytes < nLen){return null;}synchronized (m_bfish) {// (got it)m_bfish.setCBCIV(cbciv);// decrypt the bufferm_bfish.decrypt(buf);}// get the last padding byteint nPadByte = (int)buf[buf.length - 1] & 0x0ff;// ( try to get all information if the padding doesn't seem to be correct)if ((nPadByte > 8) || (nPadByte < 0)){nPadByte = 0;}// calculate the real size of this messagenNumOfBytes -= nPadByte;if (nNumOfBytes < 0){return "";}// successreturn byteArrayToUNCString(buf, 0, nNumOfBytes);}/*** destroys (clears) the encryption engine,* after that the instance is not valid anymore*/public void destroy(){m_bfish.cleanUp();}/*** implementation of the Blowfish encryption algorithm in ECB mode* @author Markus Hahn <markus_hahn@gmx.net>* @version Feburary 14, 2001*/private static class BlowfishECB{/** maximum possible key length */public final static int MAXKEYLENGTH = 56;/** block size of this cipher (in bytes) */public final static int BLOCKSIZE = 8;// size of the single boxesfinal static int PBOX_ENTRIES = 18;final static int SBOX_ENTRIES = 256;// the boxesint[] m_pbox;int[] m_sbox1;int[] m_sbox2;int[] m_sbox3;int[] m_sbox4;/*** default constructor* @param bfkey key material, up to MAXKEYLENGTH bytes*/public BlowfishECB(byte[] bfkey){// create the boxesint nI;m_pbox = new int[PBOX_ENTRIES];for (nI = 0; nI < PBOX_ENTRIES; nI++){m_pbox[nI] = pbox_init[nI];}m_sbox1 = new int[SBOX_ENTRIES];m_sbox2 = new int[SBOX_ENTRIES];m_sbox3 = new int[SBOX_ENTRIES];m_sbox4 = new int[SBOX_ENTRIES];for (nI = 0; nI < SBOX_ENTRIES; nI++){m_sbox1[nI] = sbox_init_1[nI];m_sbox2[nI] = sbox_init_2[nI];m_sbox3[nI] = sbox_init_3[nI];m_sbox4[nI] = sbox_init_4[nI];}// xor the key over the p-boxesint nLen = bfkey.length;if (nLen == 0) return; // such a setup is also valid (zero key "encryption" is possible)int nKeyPos = 0;int nBuild = 0;int nJ;for (nI = 0; nI < PBOX_ENTRIES; nI++){for (nJ = 0; nJ < 4; nJ++){nBuild = (nBuild << 8) | (((int) bfkey[nKeyPos]) & 0x0ff);if (++nKeyPos == nLen){nKeyPos = 0;}}m_pbox[nI] ^= nBuild;}// encrypt all boxes with the all zero stringlong lZero = 0;// (same as above)for (nI = 0; nI < PBOX_ENTRIES; nI += 2){lZero = encryptBlock(lZero);m_pbox[nI] = (int) (lZero >>> 32);m_pbox[nI+1] = (int) (lZero & 0x0ffffffffL);}for (nI = 0; nI < SBOX_ENTRIES; nI += 2){lZero = encryptBlock(lZero);m_sbox1[nI] = (int) (lZero >>> 32);m_sbox1[nI+1] = (int) (lZero & 0x0ffffffffL);}for (nI = 0; nI < SBOX_ENTRIES; nI += 2){lZero = encryptBlock(lZero);m_sbox2[nI] = (int) (lZero >>> 32);m_sbox2[nI+1] = (int) (lZero & 0x0ffffffffL);}for (nI = 0; nI < SBOX_ENTRIES; nI += 2){lZero = encryptBlock(lZero);m_sbox3[nI] = (int) (lZero >>> 32);m_sbox3[nI+1] = (int) (lZero & 0x0ffffffffL);}for (nI = 0; nI < SBOX_ENTRIES; nI += 2){lZero = encryptBlock(lZero);m_sbox4[nI] = (int) (lZero >>> 32);m_sbox4[nI+1] = (int) (lZero & 0x0ffffffffL);}}/*** to clear data in the boxes before an instance is freed*/public void cleanUp(){int nI;for (nI = 0; nI < PBOX_ENTRIES; nI++){m_pbox[nI] = 0;}for (nI = 0; nI < SBOX_ENTRIES; nI++){m_sbox1[nI] = m_sbox2[nI] = m_sbox3[nI] = m_sbox4[nI] = 0;}}/*** selftest routine, to check e.g. for a valid class file transmission* @return true: selftest passed / false: selftest failed*/public static boolean selfTest(){// test vector #1 (checking for the "signed bug")byte[] testKey1 = { (byte) 0x1c, (byte) 0x58, (byte) 0x7f, (byte) 0x1c,(byte) 0x13, (byte) 0x92, (byte) 0x4f, (byte) 0xef };int[] tv_p1 = { 0x30553228, 0x6d6f295a };int[] tv_c1 = { 0x55cb3774, 0xd13ef201 };int[] tv_t1 = new int[2];// test vector #2 (offical vector by Bruce Schneier)String sTestKey2 = "Who is John Galt?";byte[] testKey2 = sTestKey2.getBytes();int[] tv_p2 = { 0xfedcba98, 0x76543210 };int[] tv_c2 = { 0xcc91732b, 0x8022f684 };int[] tv_t2 = new int[2];// start the tests, check for a proper decryption, tooBlowfishECB testbf1 = new BlowfishECB(testKey1);testbf1.encrypt(tv_p1, tv_t1);if ((tv_t1[0] != tv_c1[0]) ||(tv_t1[1] != tv_c1[1])){return false;}testbf1.decrypt(tv_t1);if ((tv_t1[0] != tv_p1[0]) ||(tv_t1[1] != tv_p1[1])){return false;}BlowfishECB testbf2 = new BlowfishECB(testKey2);testbf2.encrypt(tv_p2, tv_t2);if ((tv_t2[0] != tv_c2[0]) ||(tv_t2[1] != tv_c2[1])){return false;}testbf2.decrypt(tv_t2);if ((tv_t2[0] != tv_p2[0]) ||(tv_t2[1] != tv_p2[1])){return false;}// all tests passedreturn true;}// internal routine to encrypt a 64bit blockprotected long encryptBlock(long lPlainBlock){// split the block in two 32 bit halvesint nHi = longHi32(lPlainBlock);int nLo = longLo32(lPlainBlock);// encrypt the block, gain more speed by unrooling the loop// (we avoid swapping by using nHi and nLo alternating at// odd an even loop nubers) and using local referencesint[] sbox1 = m_sbox1;int[] sbox2 = m_sbox2;int[] sbox3 = m_sbox3;int[] sbox4 = m_sbox4;int[] pbox = m_pbox;nHi ^= pbox[0];nLo ^= (((sbox1[nHi >>> 24] + sbox2[(nHi >>> 16) & 0x0ff]) ^ sbox3[(nHi >>> 8) & 0x0ff]) + sbox4[nHi & 0x0ff]) ^ pbox[1];nHi ^= (((sbox1[nLo >>> 24] + sbox2[(nLo >>> 16) & 0x0ff]) ^ sbox3[(nLo >>> 8) & 0x0ff]) + sbox4[nLo & 0x0ff]) ^ pbox[2];nLo ^= (((sbox1[nHi >>> 24] + sbox2[(nHi >>> 16) & 0x0ff]) ^ sbox3[(nHi >>> 8) & 0x0ff]) + sbox4[nHi & 0x0ff]) ^ pbox[3];nHi ^= (((sbox1[nLo >>> 24] + sbox2[(nLo >>> 16) & 0x0ff]) ^ sbox3[(nLo >>> 8) & 0x0ff]) + sbox4[nLo & 0x0ff]) ^ pbox[4];nLo ^= (((sbox1[nHi >>> 24] + sbox2[(nHi >>> 16) & 0x0ff]) ^ sbox3[(nHi >>> 8) & 0x0ff]) + sbox4[nHi & 0x0ff]) ^ pbox[5];nHi ^= (((sbox1[nLo >>> 24] + sbox2[(nLo >>> 16) & 0x0ff]) ^ sbox3[(nLo >>> 8) & 0x0ff]) + sbox4[nLo & 0x0ff]) ^ pbox[6];nLo ^= (((sbox1[nHi >>> 24] + sbox2[(nHi >>> 16) & 0x0ff]) ^ sbox3[(nHi >>> 8) & 0x0ff]) + sbox4[nHi & 0x0ff]) ^ pbox[7];nHi ^= (((sbox1[nLo >>> 24] + sbox2[(nLo >>> 16) & 0x0ff]) ^ sbox3[(nLo >>> 8) & 0x0ff]) + sbox4[nLo & 0x0ff]) ^ pbox[8];nLo ^= (((sbox1[nHi >>> 24] + sbox2[(nHi >>> 16) & 0x0ff]) ^ sbox3[(nHi >>> 8) & 0x0ff]) + sbox4[nHi & 0x0ff]) ^ pbox[9];nHi ^= (((sbox1[nLo >>> 24] + sbox2[(nLo >>> 16) & 0x0ff]) ^ sbox3[(nLo >>> 8) & 0x0ff]) + sbox4[nLo & 0x0ff]) ^ pbox[10];nLo ^= (((sbox1[nHi >>> 24] + sbox2[(nHi >>> 16) & 0x0ff]) ^ sbox3[(nHi >>> 8) & 0x0ff]) + sbox4[nHi & 0x0ff]) ^ pbox[11];nHi ^= (((sbox1[nLo >>> 24] + sbox2[(nLo >>> 16) & 0x0ff]) ^ sbox3[(nLo >>> 8) & 0x0ff]) + sbox4[nLo & 0x0ff]) ^ pbox[12];nLo ^= (((sbox1[nHi >>> 24] + sbox2[(nHi >>> 16) & 0x0ff]) ^ sbox3[(nHi >>> 8) & 0x0ff]) + sbox4[nHi & 0x0ff]) ^ pbox[13];nHi ^= (((sbox1[nLo >>> 24] + sbox2[(nLo >>> 16) & 0x0ff]) ^ sbox3[(nLo >>> 8) & 0x0ff]) + sbox4[nLo & 0x0ff]) ^ pbox[14];nLo ^= (((sbox1[nHi >>> 24] + sbox2[(nHi >>> 16) & 0x0ff]) ^ sbox3[(nHi >>> 8) & 0x0ff]) + sbox4[nHi & 0x0ff]) ^ pbox[15];nHi ^= (((sbox1[nLo >>> 24] + sbox2[(nLo >>> 16) & 0x0ff]) ^ sbox3[(nLo >>> 8) & 0x0ff]) + sbox4[nLo & 0x0ff]) ^ pbox[16];// finalize, cross and return the reassembled blockreturn makeLong(nHi, nLo ^ pbox[17]);}// internal routine to decrypt a 64bit blockprotected long decryptBlock(long lCipherBlock) {// (same as above)int nHi = longHi32(lCipherBlock);int nLo = longLo32(lCipherBlock);nHi ^= m_pbox[17];nLo ^= (((m_sbox1[nHi >>> 24] + m_sbox2[(nHi >>> 16) & 0x0ff]) ^ m_sbox3[(nHi >>> 8) & 0x0ff]) + m_sbox4[nHi & 0x0ff]) ^ m_pbox[16];nHi ^= (((m_sbox1[nLo >>> 24] + m_sbox2[(nLo >>> 16) & 0x0ff]) ^ m_sbox3[(nLo >>> 8) & 0x0ff]) + m_sbox4[nLo & 0x0ff]) ^ m_pbox[15];nLo ^= (((m_sbox1[nHi >>> 24] + m_sbox2[(nHi >>> 16) & 0x0ff]) ^ m_sbox3[(nHi >>> 8) & 0x0ff]) + m_sbox4[nHi & 0x0ff]) ^ m_pbox[14];nHi ^= (((m_sbox1[nLo >>> 24] + m_sbox2[(nLo >>> 16) & 0x0ff]) ^ m_sbox3[(nLo >>> 8) & 0x0ff]) + m_sbox4[nLo & 0x0ff]) ^ m_pbox[13];nLo ^= (((m_sbox1[nHi >>> 24] + m_sbox2[(nHi >>> 16) & 0x0ff]) ^ m_sbox3[(nHi >>> 8) & 0x0ff]) + m_sbox4[nHi & 0x0ff]) ^ m_pbox[12];nHi ^= (((m_sbox1[nLo >>> 24] + m_sbox2[(nLo >>> 16) & 0x0ff]) ^ m_sbox3[(nLo >>> 8) & 0x0ff]) + m_sbox4[nLo & 0x0ff]) ^ m_pbox[11];nLo ^= (((m_sbox1[nHi >>> 24] + m_sbox2[(nHi >>> 16) & 0x0ff]) ^ m_sbox3[(nHi >>> 8) & 0x0ff]) + m_sbox4[nHi & 0x0ff]) ^ m_pbox[10];nHi ^= (((m_sbox1[nLo >>> 24] + m_sbox2[(nLo >>> 16) & 0x0ff]) ^ m_sbox3[(nLo >>> 8) & 0x0ff]) + m_sbox4[nLo & 0x0ff]) ^ m_pbox[9];nLo ^= (((m_sbox1[nHi >>> 24] + m_sbox2[(nHi >>> 16) & 0x0ff]) ^ m_sbox3[(nHi >>> 8) & 0x0ff]) + m_sbox4[nHi & 0x0ff]) ^ m_pbox[8];nHi ^= (((m_sbox1[nLo >>> 24] + m_sbox2[(nLo >>> 16) & 0x0ff]) ^ m_sbox3[(nLo >>> 8) & 0x0ff]) + m_sbox4[nLo & 0x0ff]) ^ m_pbox[7];nLo ^= (((m_sbox1[nHi >>> 24] + m_sbox2[(nHi >>> 16) & 0x0ff]) ^ m_sbox3[(nHi >>> 8) & 0x0ff]) + m_sbox4[nHi & 0x0ff]) ^ m_pbox[6];nHi ^= (((m_sbox1[nLo >>> 24] + m_sbox2[(nLo >>> 16) & 0x0ff]) ^ m_sbox3[(nLo >>> 8) & 0x0ff]) + m_sbox4[nLo & 0x0ff]) ^ m_pbox[5];nLo ^= (((m_sbox1[nHi >>> 24] + m_sbox2[(nHi >>> 16) & 0x0ff]) ^ m_sbox3[(nHi >>> 8) & 0x0ff]) + m_sbox4[nHi & 0x0ff]) ^ m_pbox[4];nHi ^= (((m_sbox1[nLo >>> 24] + m_sbox2[(nLo >>> 16) & 0x0ff]) ^ m_sbox3[(nLo >>> 8) & 0x0ff]) + m_sbox4[nLo & 0x0ff]) ^ m_pbox[3];nLo ^= (((m_sbox1[nHi >>> 24] + m_sbox2[(nHi >>> 16) & 0x0ff]) ^ m_sbox3[(nHi >>> 8) & 0x0ff]) + m_sbox4[nHi & 0x0ff]) ^ m_pbox[2];nHi ^= (((m_sbox1[nLo >>> 24] + m_sbox2[(nLo >>> 16) & 0x0ff]) ^ m_sbox3[(nLo >>> 8) & 0x0ff]) + m_sbox4[nLo & 0x0ff]) ^ m_pbox[1];return makeLong(nHi, nLo ^ m_pbox[0]);}/*** Encrypts a byte buffer (should be aligned to an 8 byte border) to another* buffer (of the same size or bigger)** @param inbuffer buffer with plaintext data* @param outbuffer buffer to get the ciphertext data*/public void encrypt(byte[] inbuffer, byte[] outbuffer) {int nLen = inbuffer.length;long lTemp;for (int nI = 0; nI < nLen; nI +=8){// encrypt a temporary 64bit blocklTemp = byteArrayToLong(inbuffer, nI);lTemp = encryptBlock(lTemp);longToByteArray(lTemp, outbuffer, nI);}}/*** encrypts a byte buffer (should be aligned to an 8 byte border) to itself* @param buffer buffer to encrypt*/public void encrypt(byte[] buffer){int nLen = buffer.length;long lTemp;for (int nI = 0; nI < nLen; nI +=8){// encrypt a temporary 64bit blocklTemp = byteArrayToLong(buffer, nI);lTemp = encryptBlock(lTemp);longToByteArray(lTemp, buffer, nI);}}/*** encrypts an integer buffer (should be aligned to an* two integer border) to another int buffer (of the* same size or bigger)* @param inbuffer buffer with plaintext data* @param outbuffer buffer to get the ciphertext data*/public void encrypt(int[] inbuffer, int[] outbuffer) {int nLen = inbuffer.length;long lTemp;for (int nI = 0; nI < nLen; nI +=2){// encrypt a temporary 64bit blocklTemp = intArrayToLong(inbuffer, nI);lTemp = encryptBlock(lTemp);longToIntArray(lTemp, outbuffer, nI);}}/*** encrypts an int buffer (should be aligned to a* two integer border)* @param buffer buffer to encrypt*/public void encrypt(int[] buffer) {int nLen = buffer.length;long lTemp;for (int nI = 0; nI < nLen; nI +=2){// encrypt a temporary 64bit blocklTemp = intArrayToLong(buffer, nI);lTemp = encryptBlock(lTemp);longToIntArray(lTemp, buffer, nI);}}/*** encrypts a long buffer to another long buffer (of the same size or bigger)* @param inbuffer buffer with plaintext data* @param outbuffer buffer to get the ciphertext data*/public void encrypt(long[] inbuffer, long[] outbuffer) {int nLen = inbuffer.length;for (int nI = 0; nI < nLen; nI++){outbuffer[nI] = encryptBlock(inbuffer[nI]);}}/*** encrypts a long buffer to itself* @param buffer buffer to encrypt*/public void encrypt(long[] buffer) {int nLen = buffer.length;for (int nI = 0; nI < nLen; nI++){buffer[nI] = encryptBlock(buffer[nI]);}}/*** decrypts a byte buffer (should be aligned to an 8 byte border)* to another byte buffer (of the same size or bigger)* @param inbuffer buffer with ciphertext data* @param outbuffer buffer to get the plaintext data*/public void decrypt(byte[] inbuffer,byte[] outbuffer){int nLen = inbuffer.length;long lTemp;for (int nI = 0; nI < nLen; nI +=8){// decrypt a temporary 64bit blocklTemp = byteArrayToLong(inbuffer, nI);lTemp = decryptBlock(lTemp);longToByteArray(lTemp, outbuffer, nI);}}/*** decrypts a byte buffer (should be aligned to an 8 byte border) to itself* @param buffer buffer to decrypt*/public void decrypt(byte[] buffer){int nLen = buffer.length;long lTemp;for (int nI = 0; nI < nLen; nI +=8){// decrypt over a temporary 64bit blocklTemp = byteArrayToLong(buffer, nI);lTemp = decryptBlock(lTemp);longToByteArray(lTemp, buffer, nI);}}/*** decrypts an integer buffer (should be aligned to an* two integer border) to another int buffer (of the same size or bigger)* @param inbuffer buffer with ciphertext data* @param outbuffer buffer to get the plaintext data*/public void decrypt(int[] inbuffer,int[] outbuffer){int nLen = inbuffer.length;long lTemp;for (int nI = 0; nI < nLen; nI +=2){// decrypt a temporary 64bit blocklTemp = intArrayToLong(inbuffer, nI);lTemp = decryptBlock(lTemp);longToIntArray(lTemp, outbuffer, nI);}}/*** decrypts an int buffer (should be aligned to an* two integer border)* @param buffer buffer to decrypt*/public void decrypt(int[] buffer){int nLen = buffer.length;long lTemp;for (int nI = 0; nI < nLen; nI +=2){// decrypt a temporary 64bit blocklTemp = intArrayToLong(buffer, nI);lTemp = decryptBlock(lTemp);longToIntArray(lTemp, buffer, nI);}}/*** decrypts a long buffer to another long buffer (of the same size or bigger)* @param inbuffer buffer with ciphertext data* @param outbuffer buffer to get the plaintext data*/public void decrypt(long[] inbuffer,long[] outbuffer){int nLen = inbuffer.length;for (int nI = 0; nI < nLen; nI++){outbuffer[nI] = decryptBlock(inbuffer[nI]);}}/*** decrypts a long buffer to itself* @param buffer buffer to decrypt*/public void decrypt(long[] buffer) {int nLen = buffer.length;for (int nI = 0; nI < nLen; nI++){buffer[nI] = decryptBlock(buffer[nI]);}}// the boxes init. data,// FIXME: it might be better to create them at runtime to make the class//        file smaller, e.g. by calculating the hexdigits of pi (default)//        or just a fixed random sequence (out of the standard)final static int pbox_init[] = {0x243f6a88, 0x85a308d3, 0x13198a2e, 0x03707344, 0xa4093822, 0x299f31d0,0x082efa98, 0xec4e6c89, 0x452821e6, 0x38d01377, 0xbe5466cf, 0x34e90c6c,0xc0ac29b7, 0xc97c50dd, 0x3f84d5b5, 0xb5470917, 0x9216d5d9, 0x8979fb1b  };final static int sbox_init_1[] = {0xd1310ba6,   0x98dfb5ac,   0x2ffd72db,   0xd01adfb7,   0xb8e1afed,   0x6a267e96,0xba7c9045,   0xf12c7f99,   0x24a19947,   0xb3916cf7,   0x0801f2e2,   0x858efc16,0x636920d8,   0x71574e69,   0xa458fea3,   0xf4933d7e,   0x0d95748f,   0x728eb658,0x718bcd58,   0x82154aee,   0x7b54a41d,   0xc25a59b5,   0x9c30d539,   0x2af26013,0xc5d1b023,   0x286085f0,   0xca417918,   0xb8db38ef,   0x8e79dcb0,   0x603a180e,0x6c9e0e8b,   0xb01e8a3e,   0xd71577c1,   0xbd314b27,   0x78af2fda,   0x55605c60,0xe65525f3,   0xaa55ab94,   0x57489862,   0x63e81440,   0x55ca396a,   0x2aab10b6,0xb4cc5c34,   0x1141e8ce,   0xa15486af,   0x7c72e993,   0xb3ee1411,   0x636fbc2a,0x2ba9c55d,   0x741831f6,   0xce5c3e16,   0x9b87931e,   0xafd6ba33,   0x6c24cf5c,0x7a325381,   0x28958677,   0x3b8f4898,   0x6b4bb9af,   0xc4bfe81b,   0x66282193,0x61d809cc,   0xfb21a991,   0x487cac60,   0x5dec8032,   0xef845d5d,   0xe98575b1,0xdc262302,   0xeb651b88,   0x23893e81,   0xd396acc5,   0x0f6d6ff3,   0x83f44239,0x2e0b4482,   0xa4842004,   0x69c8f04a,   0x9e1f9b5e,   0x21c66842,   0xf6e96c9a,0x670c9c61,   0xabd388f0,   0x6a51a0d2,   0xd8542f68,   0x960fa728,   0xab5133a3,0x6eef0b6c,   0x137a3be4,   0xba3bf050,   0x7efb2a98,   0xa1f1651d,   0x39af0176,0x66ca593e,   0x82430e88,   0x8cee8619,   0x456f9fb4,   0x7d84a5c3,   0x3b8b5ebe,0xe06f75d8,   0x85c12073,   0x401a449f,   0x56c16aa6,   0x4ed3aa62,   0x363f7706,0x1bfedf72,   0x429b023d,   0x37d0d724,   0xd00a1248,   0xdb0fead3,   0x49f1c09b,0x075372c9,   0x80991b7b,   0x25d479d8,   0xf6e8def7,   0xe3fe501a,   0xb6794c3b,0x976ce0bd,   0x04c006ba,   0xc1a94fb6,   0x409f60c4,   0x5e5c9ec2,   0x196a2463,0x68fb6faf,   0x3e6c53b5,   0x1339b2eb,   0x3b52ec6f,   0x6dfc511f,   0x9b30952c,0xcc814544,   0xaf5ebd09,   0xbee3d004,   0xde334afd,   0x660f2807,   0x192e4bb3,0xc0cba857,   0x45c8740f,   0xd20b5f39,   0xb9d3fbdb,   0x5579c0bd,   0x1a60320a,0xd6a100c6,   0x402c7279,   0x679f25fe,   0xfb1fa3cc,   0x8ea5e9f8,   0xdb3222f8,0x3c7516df,   0xfd616b15,   0x2f501ec8,   0xad0552ab,   0x323db5fa,   0xfd238760,0x53317b48,   0x3e00df82,   0x9e5c57bb,   0xca6f8ca0,   0x1a87562e,   0xdf1769db,0xd542a8f6,   0x287effc3,   0xac6732c6,   0x8c4f5573,   0x695b27b0,   0xbbca58c8,0xe1ffa35d,   0xb8f011a0,   0x10fa3d98,   0xfd2183b8,   0x4afcb56c,   0x2dd1d35b,0x9a53e479,   0xb6f84565,   0xd28e49bc,   0x4bfb9790,   0xe1ddf2da,   0xa4cb7e33,0x62fb1341,   0xcee4c6e8,   0xef20cada,   0x36774c01,   0xd07e9efe,   0x2bf11fb4,0x95dbda4d,   0xae909198,   0xeaad8e71,   0x6b93d5a0,   0xd08ed1d0,   0xafc725e0,0x8e3c5b2f,   0x8e7594b7,   0x8ff6e2fb,   0xf2122b64,   0x8888b812,   0x900df01c,0x4fad5ea0,   0x688fc31c,   0xd1cff191,   0xb3a8c1ad,   0x2f2f2218,   0xbe0e1777,0xea752dfe,   0x8b021fa1,   0xe5a0cc0f,   0xb56f74e8,   0x18acf3d6,   0xce89e299,0xb4a84fe0,   0xfd13e0b7,   0x7cc43b81,   0xd2ada8d9,   0x165fa266,   0x80957705,0x93cc7314,   0x211a1477,   0xe6ad2065,   0x77b5fa86,   0xc75442f5,   0xfb9d35cf,0xebcdaf0c,   0x7b3e89a0,   0xd6411bd3,   0xae1e7e49,   0x00250e2d,   0x2071b35e,0x226800bb,   0x57b8e0af,   0x2464369b,   0xf009b91e,   0x5563911d,   0x59dfa6aa,0x78c14389,   0xd95a537f,   0x207d5ba2,   0x02e5b9c5,   0x83260376,   0x6295cfa9,0x11c81968,   0x4e734a41,   0xb3472dca,   0x7b14a94a,   0x1b510052,   0x9a532915,0xd60f573f,   0xbc9bc6e4,   0x2b60a476,   0x81e67400,   0x08ba6fb5,   0x571be91f,0xf296ec6b,   0x2a0dd915,   0xb6636521,   0xe7b9f9b6,   0xff34052e,   0xc5855664,0x53b02d5d,   0xa99f8fa1,   0x08ba4799,   0x6e85076a };final static int sbox_init_2[] = {0x4b7a70e9,   0xb5b32944,0xdb75092e,   0xc4192623,   0xad6ea6b0,   0x49a7df7d,   0x9cee60b8,   0x8fedb266,0xecaa8c71,   0x699a17ff,   0x5664526c,   0xc2b19ee1,   0x193602a5,   0x75094c29,0xa0591340,   0xe4183a3e,   0x3f54989a,   0x5b429d65,   0x6b8fe4d6,   0x99f73fd6,0xa1d29c07,   0xefe830f5,   0x4d2d38e6,   0xf0255dc1,   0x4cdd2086,   0x8470eb26,0x6382e9c6,   0x021ecc5e,   0x09686b3f,   0x3ebaefc9,   0x3c971814,   0x6b6a70a1,0x687f3584,   0x52a0e286,   0xb79c5305,   0xaa500737,   0x3e07841c,   0x7fdeae5c,0x8e7d44ec,   0x5716f2b8,   0xb03ada37,   0xf0500c0d,   0xf01c1f04,   0x0200b3ff,0xae0cf51a,   0x3cb574b2,   0x25837a58,   0xdc0921bd,   0xd19113f9,   0x7ca92ff6,0x94324773,   0x22f54701,   0x3ae5e581,   0x37c2dadc,   0xc8b57634,   0x9af3dda7,0xa9446146,   0x0fd0030e,   0xecc8c73e,   0xa4751e41,   0xe238cd99,   0x3bea0e2f,0x3280bba1,   0x183eb331,   0x4e548b38,   0x4f6db908,   0x6f420d03,   0xf60a04bf,0x2cb81290,   0x24977c79,   0x5679b072,   0xbcaf89af,   0xde9a771f,   0xd9930810,0xb38bae12,   0xdccf3f2e,   0x5512721f,   0x2e6b7124,   0x501adde6,   0x9f84cd87,0x7a584718,   0x7408da17,   0xbc9f9abc,   0xe94b7d8c,   0xec7aec3a,   0xdb851dfa,0x63094366,   0xc464c3d2,   0xef1c1847,   0x3215d908,   0xdd433b37,   0x24c2ba16,0x12a14d43,   0x2a65c451,   0x50940002,   0x133ae4dd,   0x71dff89e,   0x10314e55,0x81ac77d6,   0x5f11199b,   0x043556f1,   0xd7a3c76b,   0x3c11183b,   0x5924a509,0xf28fe6ed,   0x97f1fbfa,   0x9ebabf2c,   0x1e153c6e,   0x86e34570,   0xeae96fb1,0x860e5e0a,   0x5a3e2ab3,   0x771fe71c,   0x4e3d06fa,   0x2965dcb9,   0x99e71d0f,0x803e89d6,   0x5266c825,   0x2e4cc978,   0x9c10b36a,   0xc6150eba,   0x94e2ea78,0xa5fc3c53,   0x1e0a2df4,   0xf2f74ea7,   0x361d2b3d,   0x1939260f,   0x19c27960,0x5223a708,   0xf71312b6,   0xebadfe6e,   0xeac31f66,   0xe3bc4595,   0xa67bc883,0xb17f37d1,   0x018cff28,   0xc332ddef,   0xbe6c5aa5,   0x65582185,   0x68ab9802,0xeecea50f,   0xdb2f953b,   0x2aef7dad,   0x5b6e2f84,   0x1521b628,   0x29076170,0xecdd4775,   0x619f1510,   0x13cca830,   0xeb61bd96,   0x0334fe1e,   0xaa0363cf,0xb5735c90,   0x4c70a239,   0xd59e9e0b,   0xcbaade14,   0xeecc86bc,   0x60622ca7,0x9cab5cab,   0xb2f3846e,   0x648b1eaf,   0x19bdf0ca,   0xa02369b9,   0x655abb50,0x40685a32,   0x3c2ab4b3,   0x319ee9d5,   0xc021b8f7,   0x9b540b19,   0x875fa099,0x95f7997e,   0x623d7da8,   0xf837889a,   0x97e32d77,   0x11ed935f,   0x16681281,0x0e358829,   0xc7e61fd6,   0x96dedfa1,   0x7858ba99,   0x57f584a5,   0x1b227263,0x9b83c3ff,   0x1ac24696,   0xcdb30aeb,   0x532e3054,   0x8fd948e4,   0x6dbc3128,0x58ebf2ef,   0x34c6ffea,   0xfe28ed61,   0xee7c3c73,   0x5d4a14d9,   0xe864b7e3,0x42105d14,   0x203e13e0,   0x45eee2b6,   0xa3aaabea,   0xdb6c4f15,   0xfacb4fd0,0xc742f442,   0xef6abbb5,   0x654f3b1d,   0x41cd2105,   0xd81e799e,   0x86854dc7,0xe44b476a,   0x3d816250,   0xcf62a1f2,   0x5b8d2646,   0xfc8883a0,   0xc1c7b6a3,0x7f1524c3,   0x69cb7492,   0x47848a0b,   0x5692b285,   0x095bbf00,   0xad19489d,0x1462b174,   0x23820e00,   0x58428d2a,   0x0c55f5ea,   0x1dadf43e,   0x233f7061,0x3372f092,   0x8d937e41,   0xd65fecf1,   0x6c223bdb,   0x7cde3759,   0xcbee7460,0x4085f2a7,   0xce77326e,   0xa6078084,   0x19f8509e,   0xe8efd855,   0x61d99735,0xa969a7aa,   0xc50c06c2,   0x5a04abfc,   0x800bcadc,   0x9e447a2e,   0xc3453484,0xfdd56705,   0x0e1e9ec9,   0xdb73dbd3,   0x105588cd,   0x675fda79,   0xe3674340,0xc5c43465,   0x713e38d8,   0x3d28f89e,   0xf16dff20,   0x153e21e7,   0x8fb03d4a,0xe6e39f2b,   0xdb83adf7 };final static int sbox_init_3[] = {0xe93d5a68,   0x948140f7,   0xf64c261c,   0x94692934,0x411520f7,   0x7602d4f7,   0xbcf46b2e,   0xd4a20068,   0xd4082471,   0x3320f46a,0x43b7d4b7,   0x500061af,   0x1e39f62e,   0x97244546,   0x14214f74,   0xbf8b8840,0x4d95fc1d,   0x96b591af,   0x70f4ddd3,   0x66a02f45,   0xbfbc09ec,   0x03bd9785,0x7fac6dd0,   0x31cb8504,   0x96eb27b3,   0x55fd3941,   0xda2547e6,   0xabca0a9a,0x28507825,   0x530429f4,   0x0a2c86da,   0xe9b66dfb,   0x68dc1462,   0xd7486900,0x680ec0a4,   0x27a18dee,   0x4f3ffea2,   0xe887ad8c,   0xb58ce006,   0x7af4d6b6,0xaace1e7c,   0xd3375fec,   0xce78a399,   0x406b2a42,   0x20fe9e35,   0xd9f385b9,0xee39d7ab,   0x3b124e8b,   0x1dc9faf7,   0x4b6d1856,   0x26a36631,   0xeae397b2,0x3a6efa74,   0xdd5b4332,   0x6841e7f7,   0xca7820fb,   0xfb0af54e,   0xd8feb397,0x454056ac,   0xba489527,   0x55533a3a,   0x20838d87,   0xfe6ba9b7,   0xd096954b,0x55a867bc,   0xa1159a58,   0xcca92963,   0x99e1db33,   0xa62a4a56,   0x3f3125f9,0x5ef47e1c,   0x9029317c,   0xfdf8e802,   0x04272f70,   0x80bb155c,   0x05282ce3,0x95c11548,   0xe4c66d22,   0x48c1133f,   0xc70f86dc,   0x07f9c9ee,   0x41041f0f,0x404779a4,   0x5d886e17,   0x325f51eb,   0xd59bc0d1,   0xf2bcc18f,   0x41113564,0x257b7834,   0x602a9c60,   0xdff8e8a3,   0x1f636c1b,   0x0e12b4c2,   0x02e1329e,0xaf664fd1,   0xcad18115,   0x6b2395e0,   0x333e92e1,   0x3b240b62,   0xeebeb922,0x85b2a20e,   0xe6ba0d99,   0xde720c8c,   0x2da2f728,   0xd0127845,   0x95b794fd,0x647d0862,   0xe7ccf5f0,   0x5449a36f,   0x877d48fa,   0xc39dfd27,   0xf33e8d1e,0x0a476341,   0x992eff74,   0x3a6f6eab,   0xf4f8fd37,   0xa812dc60,   0xa1ebddf8,0x991be14c,   0xdb6e6b0d,   0xc67b5510,   0x6d672c37,   0x2765d43b,   0xdcd0e804,0xf1290dc7,   0xcc00ffa3,   0xb5390f92,   0x690fed0b,   0x667b9ffb,   0xcedb7d9c,0xa091cf0b,   0xd9155ea3,   0xbb132f88,   0x515bad24,   0x7b9479bf,   0x763bd6eb,0x37392eb3,   0xcc115979,   0x8026e297,   0xf42e312d,   0x6842ada7,   0xc66a2b3b,0x12754ccc,   0x782ef11c,   0x6a124237,   0xb79251e7,   0x06a1bbe6,   0x4bfb6350,0x1a6b1018,   0x11caedfa,   0x3d25bdd8,   0xe2e1c3c9,   0x44421659,   0x0a121386,0xd90cec6e,   0xd5abea2a,   0x64af674e,   0xda86a85f,   0xbebfe988,   0x64e4c3fe,0x9dbc8057,   0xf0f7c086,   0x60787bf8,   0x6003604d,   0xd1fd8346,   0xf6381fb0,0x7745ae04,   0xd736fccc,   0x83426b33,   0xf01eab71,   0xb0804187,   0x3c005e5f,0x77a057be,   0xbde8ae24,   0x55464299,   0xbf582e61,   0x4e58f48f,   0xf2ddfda2,0xf474ef38,   0x8789bdc2,   0x5366f9c3,   0xc8b38e74,   0xb475f255,   0x46fcd9b9,0x7aeb2661,   0x8b1ddf84,   0x846a0e79,   0x915f95e2,   0x466e598e,   0x20b45770,0x8cd55591,   0xc902de4c,   0xb90bace1,   0xbb8205d0,   0x11a86248,   0x7574a99e,0xb77f19b6,   0xe0a9dc09,   0x662d09a1,   0xc4324633,   0xe85a1f02,   0x09f0be8c,0x4a99a025,   0x1d6efe10,   0x1ab93d1d,   0x0ba5a4df,   0xa186f20f,   0x2868f169,0xdcb7da83,   0x573906fe,   0xa1e2ce9b,   0x4fcd7f52,   0x50115e01,   0xa70683fa,0xa002b5c4,   0x0de6d027,   0x9af88c27,   0x773f8641,   0xc3604c06,   0x61a806b5,0xf0177a28,   0xc0f586e0,   0x006058aa,   0x30dc7d62,   0x11e69ed7,   0x2338ea63,0x53c2dd94,   0xc2c21634,   0xbbcbee56,   0x90bcb6de,   0xebfc7da1,   0xce591d76,0x6f05e409,   0x4b7c0188,   0x39720a3d,   0x7c927c24,   0x86e3725f,   0x724d9db9,0x1ac15bb4,   0xd39eb8fc,   0xed545578,   0x08fca5b5,   0xd83d7cd3,   0x4dad0fc4,0x1e50ef5e,   0xb161e6f8,   0xa28514d9,   0x6c51133c,   0x6fd5c7e7,   0x56e14ec4,0x362abfce,   0xddc6c837,   0xd79a3234,   0x92638212,   0x670efa8e,   0x406000e0 };final static int sbox_init_4[] = {0x3a39ce37,   0xd3faf5cf,   0xabc27737,   0x5ac52d1b,   0x5cb0679e,   0x4fa33742,0xd3822740,   0x99bc9bbe,   0xd5118e9d,   0xbf0f7315,   0xd62d1c7e,   0xc700c47b,0xb78c1b6b,   0x21a19045,   0xb26eb1be,   0x6a366eb4,   0x5748ab2f,   0xbc946e79,0xc6a376d2,   0x6549c2c8,   0x530ff8ee,   0x468dde7d,   0xd5730a1d,   0x4cd04dc6,0x2939bbdb,   0xa9ba4650,   0xac9526e8,   0xbe5ee304,   0xa1fad5f0,   0x6a2d519a,0x63ef8ce2,   0x9a86ee22,   0xc089c2b8,   0x43242ef6,   0xa51e03aa,   0x9cf2d0a4,0x83c061ba,   0x9be96a4d,   0x8fe51550,   0xba645bd6,   0x2826a2f9,   0xa73a3ae1,0x4ba99586,   0xef5562e9,   0xc72fefd3,   0xf752f7da,   0x3f046f69,   0x77fa0a59,0x80e4a915,   0x87b08601,   0x9b09e6ad,   0x3b3ee593,   0xe990fd5a,   0x9e34d797,0x2cf0b7d9,   0x022b8b51,   0x96d5ac3a,   0x017da67d,   0xd1cf3ed6,   0x7c7d2d28,0x1f9f25cf,   0xadf2b89b,   0x5ad6b472,   0x5a88f54c,   0xe029ac71,   0xe019a5e6,0x47b0acfd,   0xed93fa9b,   0xe8d3c48d,   0x283b57cc,   0xf8d56629,   0x79132e28,0x785f0191,   0xed756055,   0xf7960e44,   0xe3d35e8c,   0x15056dd4,   0x88f46dba,0x03a16125,   0x0564f0bd,   0xc3eb9e15,   0x3c9057a2,   0x97271aec,   0xa93a072a,0x1b3f6d9b,   0x1e6321f5,   0xf59c66fb,   0x26dcf319,   0x7533d928,   0xb155fdf5,0x03563482,   0x8aba3cbb,   0x28517711,   0xc20ad9f8,   0xabcc5167,   0xccad925f,0x4de81751,   0x3830dc8e,   0x379d5862,   0x9320f991,   0xea7a90c2,   0xfb3e7bce,0x5121ce64,   0x774fbe32,   0xa8b6e37e,   0xc3293d46,   0x48de5369,   0x6413e680,0xa2ae0810,   0xdd6db224,   0x69852dfd,   0x09072166,   0xb39a460a,   0x6445c0dd,0x586cdecf,   0x1c20c8ae,   0x5bbef7dd,   0x1b588d40,   0xccd2017f,   0x6bb4e3bb,0xdda26a7e,   0x3a59ff45,   0x3e350a44,   0xbcb4cdd5,   0x72eacea8,   0xfa6484bb,0x8d6612ae,   0xbf3c6f47,   0xd29be463,   0x542f5d9e,   0xaec2771b,   0xf64e6370,0x740e0d8d,   0xe75b1357,   0xf8721671,   0xaf537d5d,   0x4040cb08,   0x4eb4e2cc,0x34d2466a,   0x0115af84,   0xe1b00428,   0x95983a1d,   0x06b89fb4,   0xce6ea048,0x6f3f3b82,   0x3520ab82,   0x011a1d4b,   0x277227f8,   0x611560b1,   0xe7933fdc,0xbb3a792b,   0x344525bd,   0xa08839e1,   0x51ce794b,   0x2f32c9b7,   0xa01fbac9,0xe01cc87e,   0xbcc7d1f6,   0xcf0111c3,   0xa1e8aac7,   0x1a908749,   0xd44fbd9a,0xd0dadecb,   0xd50ada38,   0x0339c32a,   0xc6913667,   0x8df9317c,   0xe0b12b4f,0xf79e59b7,   0x43f5bb3a,   0xf2d519ff,   0x27d9459c,   0xbf97222c,   0x15e6fc2a,0x0f91fc71,   0x9b941525,   0xfae59361,   0xceb69ceb,   0xc2a86459,   0x12baa8d1,0xb6c1075e,   0xe3056a0c,   0x10d25065,   0xcb03a442,   0xe0ec6e0e,   0x1698db3b,0x4c98a0be,   0x3278e964,   0x9f1f9532,   0xe0d392df,   0xd3a0342b,   0x8971f21e,0x1b0a7441,   0x4ba3348c,   0xc5be7120,   0xc37632d8,   0xdf359f8d,   0x9b992f2e,0xe60b6f47,   0x0fe3f11d,   0xe54cda54,   0x1edad891,   0xce6279cf,   0xcd3e7e6f,0x1618b166,   0xfd2c1d05,   0x848fd2c5,   0xf6fb2299,   0xf523f357,   0xa6327623,0x93a83531,   0x56cccd02,   0xacf08162,   0x5a75ebb5,   0x6e163697,   0x88d273cc,0xde966292,   0x81b949d0,   0x4c50901b,   0x71c65614,   0xe6c6c7bd,   0x327a140a,0x45e1d006,   0xc3f27b9a,   0xc9aa53fd,   0x62a80f00,   0xbb25bfe2,   0x35bdd2f6,0x71126905,   0xb2040222,   0xb6cbcf7c,   0xcd769c2b,   0x53113ec0,   0x1640e3d3,0x38abbd60,   0x2547adf0,   0xba38209c,   0xf746ce76,   0x77afa1c5,   0x20756060,0x85cbfe4e,   0x8ae88dd8,   0x7aaaf9b0,   0x4cf9aa7e,   0x1948c25c,   0x02fb8a8c,0x01c36ae4,   0xd6ebe1f9,   0x90d4f869,   0xa65cdea0,   0x3f09252d,   0xc208e69f,0xb74e6132,   0xce77e25b,   0x578fdfe3,   0x3ac372e6 };}private static class BlowfishCBC extends BlowfishECB {// here we hold the CBC IVlong m_lCBCIV;/*** get the current CBC IV (for cipher resets)* @return current CBC IV*/public long getCBCIV(){return m_lCBCIV;}/*** get the current CBC IV (for cipher resets)* @param dest wher eto put current CBC IV in network byte ordered array*/public void getCBCIV(byte[] dest){longToByteArray(m_lCBCIV, dest, 0);}/*** set the current CBC IV (for cipher resets)* @param lNewCBCIV the new CBC IV*/public void setCBCIV(long lNewCBCIV){m_lCBCIV = lNewCBCIV;}/*** set the current CBC IV (for cipher resets)* @param newCBCIV the new CBC IV  in network byte ordered array*/public void setCBCIV(byte[] newCBCIV){m_lCBCIV = byteArrayToLong(newCBCIV, 0);}/*** constructor, stores a zero CBC IV* @param bfkey key material, up to MAXKEYLENGTH bytes*/public BlowfishCBC(byte[] bfkey){super(bfkey);// store zero CBCB IVsetCBCIV(0);}/*** constructor* @param bfkey key material, up to MAXKEYLENGTH bytes* @param lInitCBCIV the CBC IV*/public BlowfishCBC(byte[] bfkey,long lInitCBCIV){super(bfkey);// store the CBCB IVsetCBCIV(lInitCBCIV);}/*** constructor* @param bfkey key material, up to MAXKEYLENGTH bytes* @param initCBCIV the CBC IV (array with min. BLOCKSIZE bytes)*/public BlowfishCBC(byte[] bfkey,byte[] initCBCIV){super(bfkey);// store the CBCB IVsetCBCIV(initCBCIV);}/*** cleans up all critical internals,* call this if you don't need an instance anymore*/@Overridepublic void cleanUp(){m_lCBCIV = 0;super.cleanUp();}// internal routine to encrypt a block in CBC modeprivate long encryptBlockCBC(long lPlainblock){// chain with the CBC IVlPlainblock ^= m_lCBCIV;// encrypt the blocklPlainblock = super.encryptBlock(lPlainblock);// the encrypted block is the new CBC IVreturn (m_lCBCIV = lPlainblock);}// internal routine to decrypt a block in CBC modeprivate long decryptBlockCBC(long lCipherblock){// save the current blocklong lTemp = lCipherblock;// decrypt the blocklCipherblock = super.decryptBlock(lCipherblock);// dechain the blocklCipherblock ^= m_lCBCIV;// set the new CBC IVm_lCBCIV = lTemp;// return the decrypted blockreturn lCipherblock;}/*** encrypts a byte buffer (should be aligned to an 8 byte border)* to another buffer (of the same size or bigger)* @param inbuffer buffer with plaintext data* @param outbuffer buffer to get the ciphertext data*/@Overridepublic void encrypt(byte[] inbuffer,byte[] outbuffer){int nLen = inbuffer.length;long lTemp;for (int nI = 0; nI < nLen; nI +=8){// encrypt a temporary 64bit blocklTemp = byteArrayToLong(inbuffer, nI);lTemp = encryptBlockCBC(lTemp);longToByteArray(lTemp, outbuffer, nI);}}/*** encrypts a byte buffer (should be aligned to an 8 byte border) to itself* @param buffer buffer to encrypt*/@Overridepublic void encrypt(byte[] buffer){int nLen = buffer.length;long lTemp;for (int nI = 0; nI < nLen; nI +=8){// encrypt a temporary 64bit blocklTemp = byteArrayToLong(buffer, nI);lTemp = encryptBlockCBC(lTemp);longToByteArray(lTemp, buffer, nI);}}/*** encrypts an int buffer (should be aligned to an* two integer border) to another int buffer (of the same* size or bigger)* @param inbuffer buffer with plaintext data* @param outbuffer buffer to get the ciphertext data*/@Overridepublic void encrypt(int[] inbuffer,int[] outbuffer){int nLen = inbuffer.length;long lTemp;for (int nI = 0; nI < nLen; nI +=2){// encrypt a temporary 64bit blocklTemp = intArrayToLong(inbuffer, nI);lTemp = encryptBlockCBC(lTemp);longToIntArray(lTemp, outbuffer, nI);}}/*** encrypts an integer buffer (should be aligned to an* @param buffer buffer to encrypt*/@Overridepublic void encrypt(int[] buffer){int nLen = buffer.length;long lTemp;for (int nI = 0; nI < nLen; nI +=2){// encrypt a temporary 64bit blocklTemp = intArrayToLong(buffer, nI);lTemp = encryptBlockCBC(lTemp);longToIntArray(lTemp, buffer, nI);}}/*** encrypts a long buffer to another long buffer (of the same size or bigger)* @param inbuffer buffer with plaintext data* @param outbuffer buffer to get the ciphertext data*/@Overridepublic void encrypt(long[] inbuffer,long[] outbuffer){int nLen = inbuffer.length;for (int nI = 0; nI < nLen; nI++){outbuffer[nI] = encryptBlockCBC(inbuffer[nI]);}}/*** encrypts a long buffer to itself* @param buffer buffer to encrypt*/@Overridepublic void encrypt(long[] buffer){int nLen = buffer.length;for (int nI = 0; nI < nLen; nI++){buffer[nI] = encryptBlockCBC(buffer[nI]);}}/*** decrypts a byte buffer (should be aligned to an 8 byte border)* to another buffer (of the same size or bigger)* @param inbuffer buffer with ciphertext data* @param outbuffer buffer to get the plaintext data*/@Overridepublic void decrypt(byte[] inbuffer,byte[] outbuffer){int nLen = inbuffer.length;long lTemp;for (int nI = 0; nI < nLen; nI +=8){// decrypt a temporary 64bit blocklTemp = byteArrayToLong(inbuffer, nI);lTemp = decryptBlockCBC(lTemp);longToByteArray(lTemp, outbuffer, nI);}}/*** decrypts a byte buffer (should be aligned to an 8 byte border) to itself* @param buffer buffer to decrypt*/@Overridepublic void  decrypt(byte[] buffer){int nLen = buffer.length;long lTemp;for (int nI = 0; nI < nLen; nI +=8){// decrypt over a temporary 64bit blocklTemp = byteArrayToLong(buffer, nI);lTemp = decryptBlockCBC(lTemp);longToByteArray(lTemp, buffer, nI);}}/*** decrypts an integer buffer (should be aligned to an* two integer border) to another int buffer (of the same size or bigger)* @param inbuffer buffer with ciphertext data* @param outbuffer buffer to get the plaintext data*/@Overridepublic void decrypt(int[] inbuffer,int[] outbuffer){int nLen = inbuffer.length;long lTemp;for (int nI = 0; nI < nLen; nI +=2){// decrypt a temporary 64bit blocklTemp = intArrayToLong(inbuffer, nI);lTemp = decryptBlockCBC(lTemp);longToIntArray(lTemp, outbuffer, nI);}}/*** decrypts an int buffer (should be aligned to a* two integer border)* @param buffer buffer to decrypt*/@Overridepublic void decrypt(int[] buffer){int nLen = buffer.length;long lTemp;for (int nI = 0; nI < nLen; nI +=2){// decrypt a temporary 64bit blocklTemp = intArrayToLong(buffer, nI);lTemp = decryptBlockCBC(lTemp);longToIntArray(lTemp, buffer, nI);}}/*** decrypts a long buffer to another long buffer (of the same size or bigger)* @param inbuffer buffer with ciphertext data* @param outbuffer buffer to get the plaintext data*/@Overridepublic void decrypt(long[] inbuffer,long[] outbuffer){int nLen = inbuffer.length;for (int nI = 0; nI < nLen; nI++){outbuffer[nI] = decryptBlockCBC(inbuffer[nI]);}}/*** decrypts a long buffer to itself* @param buffer buffer to decrypt*/@Overridepublic void decrypt(long[] buffer){int nLen = buffer.length;for (int nI = 0; nI < nLen; nI++){buffer[nI] = decryptBlockCBC(buffer[nI]);}}}/*** gets bytes from an array into a long* @param buffer where to get the bytes* @param nStartIndex index from where to read the data* @return the 64bit integer*/private static long byteArrayToLong(byte[] buffer,int nStartIndex){return (((long)buffer[nStartIndex]) << 56) |(((long)buffer[nStartIndex + 1] & 0x0ffL) << 48) |(((long)buffer[nStartIndex + 2] & 0x0ffL) << 40) |(((long)buffer[nStartIndex + 3] & 0x0ffL) << 32) |(((long)buffer[nStartIndex + 4] & 0x0ffL) << 24) |(((long)buffer[nStartIndex + 5] & 0x0ffL) << 16) |(((long)buffer[nStartIndex + 6] & 0x0ffL) << 8) |((long)buffer[nStartIndex + 7] & 0x0ff);}/*** converts a long o bytes which are put into a given array* @param lValue the 64bit integer to convert* @param buffer the target buffer* @param nStartIndex where to place the bytes in the buffer*/private static void longToByteArray(long lValue,byte[] buffer,int nStartIndex){buffer[nStartIndex] = (byte) (lValue >>> 56);buffer[nStartIndex + 1] = (byte) ((lValue >>> 48) & 0x0ff);buffer[nStartIndex + 2] = (byte) ((lValue >>> 40) & 0x0ff);buffer[nStartIndex + 3] = (byte) ((lValue >>> 32) & 0x0ff);buffer[nStartIndex + 4] = (byte) ((lValue >>> 24) & 0x0ff);buffer[nStartIndex + 5] = (byte) ((lValue >>> 16) & 0x0ff);buffer[nStartIndex + 6] = (byte) ((lValue >>> 8) & 0x0ff);buffer[nStartIndex + 7] = (byte) lValue;}/*** converts values from an integer array to a long* @param buffer where to get the bytes* @param nStartIndex index from where to read the data* @return the 64bit integer*/private static long intArrayToLong(int[] buffer,int nStartIndex){return (((long) buffer[nStartIndex]) << 32) |(((long) buffer[nStartIndex + 1]) & 0x0ffffffffL);}/*** converts a long to integers which are put into a given array* @param lValue the 64bit integer to convert* @param buffer the target buffer* @param nStartIndex where to place the bytes in the buffer*/private static void longToIntArray(long lValue,int[] buffer,int nStartIndex){buffer[nStartIndex]     = (int) (lValue >>> 32);buffer[nStartIndex + 1] = (int) lValue;}/*** makes a long from two integers (treated unsigned)* @param nLo lower 32bits* @param nHi higher 32bits* @return the built long*/private static long makeLong(int nLo,int nHi){return (((long)nHi << 32) |((long)nLo & 0x00000000ffffffffL));}/*** gets the lower 32 bits of a long* @param lVal the long integer* @return lower 32 bits*/private static int longLo32(long lVal){return (int)lVal;}/*** gets the higher 32 bits of a long* @param lVal the long integer* @return higher 32 bits*/private static int longHi32(long lVal){return (int)((lVal >>> 32));}// our table for binhex conversionfinal static char[] HEXTAB = { '0', '1', '2', '3', '4', '5', '6', '7','8', '9', 'a', 'b', 'c', 'd', 'e', 'f' };/*** converts a byte array to a binhex string* @param data the byte array* @param nStartPos start index where to get the bytes* @param nNumOfBytes number of bytes to convert* @return the binhex string*/private static String bytesToBinHex(byte[] data,int nStartPos,int nNumOfBytes){StringBuilder sbuf = new StringBuilder();sbuf.setLength(nNumOfBytes << 1);int nPos = 0;for (int nI = 0; nI < nNumOfBytes; nI++){sbuf.setCharAt(nPos++, HEXTAB[(data[nI + nStartPos] >> 4) & 0x0f]);sbuf.setCharAt(nPos++, HEXTAB[data[nI + nStartPos] & 0x0f]);}return sbuf.toString();}/*** converts a binhex string back into a byte array (invalid codes will be skipped)* @param sBinHex binhex string* @param data the target array* @param nSrcPos from which character in the string the conversion should begin,*                remember that (nSrcPos modulo 2) should equals 0 normally* @param nDstPos to store the bytes from which position in the array* @param nNumOfBytes number of bytes to extract* @return number of extracted bytes*/private static int binHexToBytes(String sBinHex,byte[] data,int nSrcPos,int nDstPos,int nNumOfBytes){// check for correct rangesint nStrLen = sBinHex.length();int nAvailBytes = (nStrLen - nSrcPos) >> 1;if (nAvailBytes < nNumOfBytes){nNumOfBytes = nAvailBytes;}int nOutputCapacity = data.length - nDstPos;if (nNumOfBytes > nOutputCapacity){nNumOfBytes = nOutputCapacity;}// convert nowint nResult = 0;for (int nI = 0; nI < nNumOfBytes; nI++){byte bActByte = 0;boolean blConvertOK = true;for (int nJ = 0; nJ < 2; nJ++){bActByte <<= 4;char cActChar = sBinHex.charAt(nSrcPos++);if ((cActChar >= 'a') && (cActChar <= 'f')){bActByte |= (byte)(cActChar - 'a') + 10;}else{if ((cActChar >= '0') && (cActChar <= '9')){bActByte |= (byte)(cActChar - '0');}else{blConvertOK = false;}}}if (blConvertOK){data[nDstPos++] = bActByte;nResult++;}}return nResult;}/*** converts a byte array into an UNICODE string* @param data the byte array* @param nStartPos where to begin the conversion* @param nNumOfBytes number of bytes to handle* @return the string*/private static String byteArrayToUNCString(byte[] data,int nStartPos,int nNumOfBytes){// we need two bytes for every characternNumOfBytes &= ~1;// enough bytes in the buffer?int nAvailCapacity = data.length - nStartPos;if (nAvailCapacity < nNumOfBytes){nNumOfBytes = nAvailCapacity;}StringBuilder sbuf = new StringBuilder();sbuf.setLength(nNumOfBytes >> 1);int nSBufPos = 0;while (nNumOfBytes > 0){sbuf.setCharAt(nSBufPos++,(char)(((int)data[nStartPos] << 8) | ((int)data[nStartPos + 1] & 0x0ff)));nStartPos += 2;nNumOfBytes -= 2;}return sbuf.toString();}
}


以后也可以在自己的项目中使用Blowfish进行加密和解密,Blowfish是一个对称加密算法,真的不错。


查看全文
如若内容造成侵权/违法违规/事实不符,请联系编程学习网邮箱:809451989@qq.com进行投诉反馈,一经查实,立即删除!

相关文章

  1. JavaWeb——JavaScript精讲之ECMAScript标准(基本语法、JavaScript对象)

    目录1、JavaScript概述2、ECMAScript客户端脚本语言标准2.1、基本语法2.2、JavaScript对象1、JavaScript概述JavaScript不同于HTML、CSS,其是一种客户端脚本语言,运行在客户端浏览器中,每一个浏览器都有JavaScript的解析引擎。其是脚本语言,不需要编译,直接可以被浏览器解…...

    2024/4/21 11:33:06
  2. 关于女生的程序员之路 肖舸老师

    这是发到邮箱里面的一封信,感觉近期讨论女性程序员居多,有一定代表性,这里尝试作答。一家之言哈,欢迎拍砖。原文如下:肖老师:您好!我是在大本营上认识的您,首先感谢您在大本营中给予我的帮助和指导,我真的从中获得不少收获。说实话,我之所以加入大本营是因为在大学中课…...

    2024/4/21 11:33:05
  3. 计算机语言的标准与实现是什么?

    标准(specification,)是什么? 确切的含义我也不知道,不过我找到了一份ECMAScript语言的标准文档,大概看了一些明白了,标准就是详细规定了一门语言的语法是什么样子的。标准会不断发展以提高生产力,比如ECMAScript最开始的版本并不支持正则表达式,在1999年才把正则表达式加…...

    2024/4/21 11:33:04
  4. ubuntu16.04下编译android-goldfish-3.4内核源码(android6.0.1系统源代码)

    配置笔者环境系统: ubuntu 16.04 LTS 硬盘: 固态硬盘笔者刚开始直接克隆的时候出现如下错误:error: RPC failed; curl 56 GnuTLS recv error (-9): A TLS packet with unexpected所以将buffer配置增大 git config --global http.postBuffer 520000000开始克隆这里使用的是国内…...

    2024/4/20 16:22:56
  5. 2019网名最新版的

    有时候,某段路,只能你一个人走,孤独难免,但它也能帮你涤清内心的浑浊。孤独,也是无法和躲避的命运历程。因此,别刻意躲避,更别让冷世的尘埃,冰封自己笑容,迟滞了自己的步履。 ̶颓̶废̶少̶女 马云颜粉 北川良子 温柔泛滥. 兜售布丁 爱的卑微. 夏日绵绵冰. 等待日落.…...

    2024/4/20 17:02:56
  6. CyanogenMod 11.0模拟器goldfish的编译方法及下载地址

    1、首先下载CM的源码,方法网上有很多,不再赘述。2、android模拟器的产品名为goldfish,cm的产品配置文件和linux内核,利用他脚本breakfast、brunch的方式,在我们天朝经常出错,还是GW的问题。所以如果有问题,可以手动在 .repo/local_manifests/roomservice.xml 中天下如下…...

    2024/4/25 10:00:16
  7. 计算机专业的女生适合干什么工作?

    证书、考研、考博都不如能力来得实惠,如果有一技之长还是先就业好。研究生、博士生没有工作背景恐怕也不好找工作!学计算机选择面很宽,以下拙见供参考: *你能熟练使用办公软件,如office,excel等等,会一点编程,你最起码可以做一个办公白领,如果气质好可以当高级秘书之类…...

    2024/4/20 17:02:53
  8. ECMAScript中的Number Type与 IEEE 754-2008

    introduction 稍微深入了解一下JavaScript浮点数的开发者都会知道浮点数的误差问题,也就是说IEEE754-2008的浮点数误差。 常见的案例为: 0.1 + 0.2 = 0.30000000000000004 无论是google一下或者baidu一下,这类文章层出不穷,但是很多都是浅尝即止,无法让我能够逻辑通顺的理解…...

    2024/4/21 11:33:05
  9. 最经典的QQ网名

    1.我qq上有个哥们叫:大力水脚。这sb另一个号叫:蜡笔小旧。没办法,这样反着来的兄弟现实中也不知道能不能大学毕业。        2.高中有一同学,男,带高度近视瓶底,走路低头,驼背,腼腆指数100,一般和女生说话脸上都掉红油漆那种孩子。现在qq上叫:女澡堂的男搓背工。…...

    2024/4/21 11:33:02
  10. Fishshell 助力前端开发

    什么是 Fish shell ? 很多做前端开发的朋友都很钟爱使用Mac电脑,同大多数Linux系统一样Mac自带的命令行是Bash提供的,是一种很基本的Shell。今天我们来了解一款高级的shell工具 -- Fish shell 和Bash相同,Fish shell 也是一种可以在Mac和Linux等系统使用的Shell。 和Bash不…...

    2024/4/21 11:33:01
  11. 阿里闲鱼技术Fish Redux直播回放

    昨晚阿里直播了Fish Redux,非常精彩。 有错过的小伙伴可以戳下面看回话: https://alivideolive.taobao.com/h5/liveDetail/ff36146a-b106-48f0-8cff-246fa0b62d50 相关PD下载: 链接:https://pan.baidu.com/s/1Giu9YPC431Mwmcvk3EnmXg 提取码:8esb 顺便给大家推荐个免费的实…...

    2024/4/21 11:33:01
  12. 史上最全计算机类编程资料大集合

    你想要的干货,都在这里哟!免费的计算机编程类中文书籍摘自:github上由justjavac整理的free-programming-books-zh_CN(免费的计算机编程类中文书籍)觉得不错的可以去star和fork一下哟! 写在最前面的话 首先声明,本篇博文并非本人原创,而是摘自github上大神justjavac发起并整理…...

    2024/4/21 11:32:59
  13. 游戏中的女性:被忽视被侮辱与被损害的

    游戏中的女性:被忽视被侮辱与被损害的<?xml:namespace prefix = o ns = "urn:schemas-microsoft-com:office:office" />在不到半个世纪的短暂历史之中,作为第9艺术的游戏已经发展到一个不容任何人忽视的庞大产业。它的加速度成长历史证明了现任《财富》杂志…...

    2024/4/21 11:32:58
  14. BlowFish算法应用

    哈哈,这篇不是讲BlowFish算法的,这个俺不懂!!! 这个是讲Java中使用BlowFish算法进行加密和解密的,只是介绍一个BlowFish算法的java实现版本,Markus Hahn写的,这个整理版,所有实现都放到一个package里了,比较方便。如果想了解BlowFish算法的话,还是另外google吧!pac…...

    2024/4/21 11:32:57
  15. JS异步之Thunk函数

    本文是《深入掌握 ECMAScript 6 异步编程》系列文章的第二篇。Generator函数的含义与用法 Thunk函数的含义与用法 co函数库的含义与用法 async函数的含义与用法一、参数的求值策略Thunk函数早在上个世纪60年代就诞生了。 那时,编程语言刚刚起步,计算机学家还在研究,编译器怎…...

    2024/4/21 11:32:56
  16. Ubuntu12.04: 下载,编译Android2.6.29内核goldfish,将新编译的内核和镜像安装至模拟器

    接上篇 (Ubuntu12.04编译Android4.0.1源码全过程),编译好后在目录/media/娱乐/androidSource/out/target/product/generic 下有三个镜像文件:ramdisk.img, userdata.img, system.img,模拟器运行除了这三个镜像文件外,还需要/media/娱乐/androidSource/prebuilt/android-a…...

    2024/4/21 11:32:56
  17. 一个字的伤感网名又是一个伤感的故事

    一个字的伤感网名又是一个伤感的故事 — 一个字的伤感网名又是一个伤感的故事男孩爱上了一个女孩,女孩也很喜欢他,渐渐的两个人走到了一起,同居了,当男孩的嘴第一次吻到女孩的唇时,女孩就决定这一辈子都跟定他了,于是女孩调皮的问:你会爱我多久?男孩捏着女孩的鼻子温柔的…...

    2024/4/21 11:32:54
  18. 【ECMAScript系列 1.0】 : JavaScript基本介绍

    1.什么是Javascript?Javascript简称JS,是前端开发的一门脚本语言(解释性语言) 解释型语言:程序执行之前,不需要对代码进行编译,在运行时边解析边执行的语言。 浏览器工作原理:浏览器的主要组件为 (1.1):用户界面(User Interface) - 包括地址栏、前进/后退按钮、书签菜…...

    2024/4/27 21:10:27
  19. web工作流管理系统开发之十四 流程设计器属性页面之实现篇

    在工作流管理系统中,可视化流程设计器是必须要实现的。流程引擎可以是默默的运行,但流程设计器就必须要展现出来。所以界面的美观,操作简便易用,是必须要考虑的问题。流程设计器,主要完成流程定义文件的建立和编辑,可视化的完成流程中各节点信息的增删改,并图形化的方式…...

    2024/4/27 4:16:11
  20. 玩Android(flutter + fish_redux)

    github:https://github.com/CNAD666/flutter_wan 注:该项目为Flutter + fish_redux,页面基本均是fish_redux搭建第一版首页banner展示,首页文章分页加载,完成下拉刷新,上拉加载完成知识体系和体系详情模块完成导航模块完成项目模块侧栏布局完成,功能留坑,方便添加预计第…...

    2024/4/20 16:44:20

最新文章

  1. excel怎么删除条件格式规则但保留格式?

    这个问题的意思就是要将设置的条件格式&#xff0c;转换成单元格格式。除了使用VBA代码将格式转换外&#xff0c;还可以用excel自己的功能来完成这个任务。 一、将条件格式“留下来” 1.设置条件格式 选中数据&#xff0c;点击开始选项卡&#xff0c;设置条件格式&#xff0…...

    2024/5/3 8:18:28
  2. 梯度消失和梯度爆炸的一些处理方法

    在这里是记录一下梯度消失或梯度爆炸的一些处理技巧。全当学习总结了如有错误还请留言&#xff0c;在此感激不尽。 权重和梯度的更新公式如下&#xff1a; w w − η ⋅ ∇ w w w - \eta \cdot \nabla w ww−η⋅∇w 个人通俗的理解梯度消失就是网络模型在反向求导的时候出…...

    2024/3/20 10:50:27
  3. Stable Diffusion的界面参数详解

    Stable Diffusion作为一款强大的文本到图像生成模型,其界面参数是用户与模型进行交互的重要桥梁。这些参数不仅影响着模型的生成效果,还能够帮助用户更加精准地控制生成图像的风格、内容等。本文将详细介绍Stable Diffusion的界面参数,帮助用户更好地理解和应用这一工具。 …...

    2024/5/2 5:15:07
  4. 关于Ansible的模块②

    转载说明&#xff1a;如果您喜欢这篇文章并打算转载它&#xff0c;请私信作者取得授权。感谢您喜爱本文&#xff0c;请文明转载&#xff0c;谢谢。 接《关于Ansible的模块 ①-CSDN博客》&#xff0c;继续学习和梳理Ansible的常用文件类模块 1. copy模块 从当前机器上复制文件到…...

    2024/5/3 1:11:34
  5. 【外汇早评】美通胀数据走低,美元调整

    原标题:【外汇早评】美通胀数据走低,美元调整昨日美国方面公布了新一期的核心PCE物价指数数据,同比增长1.6%,低于前值和预期值的1.7%,距离美联储的通胀目标2%继续走低,通胀压力较低,且此前美国一季度GDP初值中的消费部分下滑明显,因此市场对美联储后续更可能降息的政策…...

    2024/5/1 17:30:59
  6. 【原油贵金属周评】原油多头拥挤,价格调整

    原标题:【原油贵金属周评】原油多头拥挤,价格调整本周国际劳动节,我们喜迎四天假期,但是整个金融市场确实流动性充沛,大事频发,各个商品波动剧烈。美国方面,在本周四凌晨公布5月份的利率决议和新闻发布会,维持联邦基金利率在2.25%-2.50%不变,符合市场预期。同时美联储…...

    2024/5/2 16:16:39
  7. 【外汇周评】靓丽非农不及疲软通胀影响

    原标题:【外汇周评】靓丽非农不及疲软通胀影响在刚结束的周五,美国方面公布了新一期的非农就业数据,大幅好于前值和预期,新增就业重新回到20万以上。具体数据: 美国4月非农就业人口变动 26.3万人,预期 19万人,前值 19.6万人。 美国4月失业率 3.6%,预期 3.8%,前值 3…...

    2024/4/29 2:29:43
  8. 【原油贵金属早评】库存继续增加,油价收跌

    原标题:【原油贵金属早评】库存继续增加,油价收跌周三清晨公布美国当周API原油库存数据,上周原油库存增加281万桶至4.692亿桶,增幅超过预期的74.4万桶。且有消息人士称,沙特阿美据悉将于6月向亚洲炼油厂额外出售更多原油,印度炼油商预计将每日获得至多20万桶的额外原油供…...

    2024/5/2 9:28:15
  9. 【外汇早评】日本央行会议纪要不改日元强势

    原标题:【外汇早评】日本央行会议纪要不改日元强势近两日日元大幅走强与近期市场风险情绪上升,避险资金回流日元有关,也与前一段时间的美日贸易谈判给日本缓冲期,日本方面对汇率问题也避免继续贬值有关。虽然今日早间日本央行公布的利率会议纪要仍然是支持宽松政策,但这符…...

    2024/4/27 17:58:04
  10. 【原油贵金属早评】欧佩克稳定市场,填补伊朗问题的影响

    原标题:【原油贵金属早评】欧佩克稳定市场,填补伊朗问题的影响近日伊朗局势升温,导致市场担忧影响原油供给,油价试图反弹。此时OPEC表态稳定市场。据消息人士透露,沙特6月石油出口料将低于700万桶/日,沙特已经收到石油消费国提出的6月份扩大出口的“适度要求”,沙特将满…...

    2024/4/27 14:22:49
  11. 【外汇早评】美欲与伊朗重谈协议

    原标题:【外汇早评】美欲与伊朗重谈协议美国对伊朗的制裁遭到伊朗的抗议,昨日伊朗方面提出将部分退出伊核协议。而此行为又遭到欧洲方面对伊朗的谴责和警告,伊朗外长昨日回应称,欧洲国家履行它们的义务,伊核协议就能保证存续。据传闻伊朗的导弹已经对准了以色列和美国的航…...

    2024/4/28 1:28:33
  12. 【原油贵金属早评】波动率飙升,市场情绪动荡

    原标题:【原油贵金属早评】波动率飙升,市场情绪动荡因中美贸易谈判不安情绪影响,金融市场各资产品种出现明显的波动。随着美国与中方开启第十一轮谈判之际,美国按照既定计划向中国2000亿商品征收25%的关税,市场情绪有所平复,已经开始接受这一事实。虽然波动率-恐慌指数VI…...

    2024/4/30 9:43:09
  13. 【原油贵金属周评】伊朗局势升温,黄金多头跃跃欲试

    原标题:【原油贵金属周评】伊朗局势升温,黄金多头跃跃欲试美国和伊朗的局势继续升温,市场风险情绪上升,避险黄金有向上突破阻力的迹象。原油方面稍显平稳,近期美国和OPEC加大供给及市场需求回落的影响,伊朗局势并未推升油价走强。近期中美贸易谈判摩擦再度升级,美国对中…...

    2024/4/27 17:59:30
  14. 【原油贵金属早评】市场情绪继续恶化,黄金上破

    原标题:【原油贵金属早评】市场情绪继续恶化,黄金上破周初中国针对于美国加征关税的进行的反制措施引发市场情绪的大幅波动,人民币汇率出现大幅的贬值动能,金融市场受到非常明显的冲击。尤其是波动率起来之后,对于股市的表现尤其不安。隔夜美国股市出现明显的下行走势,这…...

    2024/5/2 15:04:34
  15. 【外汇早评】美伊僵持,风险情绪继续升温

    原标题:【外汇早评】美伊僵持,风险情绪继续升温昨日沙特两艘油轮再次发生爆炸事件,导致波斯湾局势进一步恶化,市场担忧美伊可能会出现摩擦生火,避险品种获得支撑,黄金和日元大幅走强。美指受中美贸易问题影响而在低位震荡。继5月12日,四艘商船在阿联酋领海附近的阿曼湾、…...

    2024/4/28 1:34:08
  16. 【原油贵金属早评】贸易冲突导致需求低迷,油价弱势

    原标题:【原油贵金属早评】贸易冲突导致需求低迷,油价弱势近日虽然伊朗局势升温,中东地区几起油船被袭击事件影响,但油价并未走高,而是出于调整结构中。由于市场预期局势失控的可能性较低,而中美贸易问题导致的全球经济衰退风险更大,需求会持续低迷,因此油价调整压力较…...

    2024/4/26 19:03:37
  17. 氧生福地 玩美北湖(上)——为时光守候两千年

    原标题:氧生福地 玩美北湖(上)——为时光守候两千年一次说走就走的旅行,只有一张高铁票的距离~ 所以,湖南郴州,我来了~ 从广州南站出发,一个半小时就到达郴州西站了。在动车上,同时改票的南风兄和我居然被分到了一个车厢,所以一路非常愉快地聊了过来。 挺好,最起…...

    2024/4/29 20:46:55
  18. 氧生福地 玩美北湖(中)——永春梯田里的美与鲜

    原标题:氧生福地 玩美北湖(中)——永春梯田里的美与鲜一觉醒来,因为大家太爱“美”照,在柳毅山庄去寻找龙女而错过了早餐时间。近十点,向导坏坏还是带着饥肠辘辘的我们去吃郴州最富有盛名的“鱼头粉”。说这是“十二分推荐”,到郴州必吃的美食之一。 哇塞!那个味美香甜…...

    2024/4/30 22:21:04
  19. 氧生福地 玩美北湖(下)——奔跑吧骚年!

    原标题:氧生福地 玩美北湖(下)——奔跑吧骚年!让我们红尘做伴 活得潇潇洒洒 策马奔腾共享人世繁华 对酒当歌唱出心中喜悦 轰轰烈烈把握青春年华 让我们红尘做伴 活得潇潇洒洒 策马奔腾共享人世繁华 对酒当歌唱出心中喜悦 轰轰烈烈把握青春年华 啊……啊……啊 两…...

    2024/5/1 4:32:01
  20. 扒开伪装医用面膜,翻六倍价格宰客,小姐姐注意了!

    原标题:扒开伪装医用面膜,翻六倍价格宰客,小姐姐注意了!扒开伪装医用面膜,翻六倍价格宰客!当行业里的某一品项火爆了,就会有很多商家蹭热度,装逼忽悠,最近火爆朋友圈的医用面膜,被沾上了污点,到底怎么回事呢? “比普通面膜安全、效果好!痘痘、痘印、敏感肌都能用…...

    2024/4/27 23:24:42
  21. 「发现」铁皮石斛仙草之神奇功效用于医用面膜

    原标题:「发现」铁皮石斛仙草之神奇功效用于医用面膜丽彦妆铁皮石斛医用面膜|石斛多糖无菌修护补水贴19大优势: 1、铁皮石斛:自唐宋以来,一直被列为皇室贡品,铁皮石斛生于海拔1600米的悬崖峭壁之上,繁殖力差,产量极低,所以古代仅供皇室、贵族享用 2、铁皮石斛自古民间…...

    2024/4/28 5:48:52
  22. 丽彦妆\医用面膜\冷敷贴轻奢医学护肤引导者

    原标题:丽彦妆\医用面膜\冷敷贴轻奢医学护肤引导者【公司简介】 广州华彬企业隶属香港华彬集团有限公司,专注美业21年,其旗下品牌: 「圣茵美」私密荷尔蒙抗衰,产后修复 「圣仪轩」私密荷尔蒙抗衰,产后修复 「花茵莳」私密荷尔蒙抗衰,产后修复 「丽彦妆」专注医学护…...

    2024/4/30 9:42:22
  23. 广州械字号面膜生产厂家OEM/ODM4项须知!

    原标题:广州械字号面膜生产厂家OEM/ODM4项须知!广州械字号面膜生产厂家OEM/ODM流程及注意事项解读: 械字号医用面膜,其实在我国并没有严格的定义,通常我们说的医美面膜指的应该是一种「医用敷料」,也就是说,医用面膜其实算作「医疗器械」的一种,又称「医用冷敷贴」。 …...

    2024/5/2 9:07:46
  24. 械字号医用眼膜缓解用眼过度到底有无作用?

    原标题:械字号医用眼膜缓解用眼过度到底有无作用?医用眼膜/械字号眼膜/医用冷敷眼贴 凝胶层为亲水高分子材料,含70%以上的水分。体表皮肤温度传导到本产品的凝胶层,热量被凝胶内水分子吸收,通过水分的蒸发带走大量的热量,可迅速地降低体表皮肤局部温度,减轻局部皮肤的灼…...

    2024/4/30 9:42:49
  25. 配置失败还原请勿关闭计算机,电脑开机屏幕上面显示,配置失败还原更改 请勿关闭计算机 开不了机 这个问题怎么办...

    解析如下&#xff1a;1、长按电脑电源键直至关机&#xff0c;然后再按一次电源健重启电脑&#xff0c;按F8健进入安全模式2、安全模式下进入Windows系统桌面后&#xff0c;按住“winR”打开运行窗口&#xff0c;输入“services.msc”打开服务设置3、在服务界面&#xff0c;选中…...

    2022/11/19 21:17:18
  26. 错误使用 reshape要执行 RESHAPE,请勿更改元素数目。

    %读入6幅图像&#xff08;每一幅图像的大小是564*564&#xff09; f1 imread(WashingtonDC_Band1_564.tif); subplot(3,2,1),imshow(f1); f2 imread(WashingtonDC_Band2_564.tif); subplot(3,2,2),imshow(f2); f3 imread(WashingtonDC_Band3_564.tif); subplot(3,2,3),imsho…...

    2022/11/19 21:17:16
  27. 配置 已完成 请勿关闭计算机,win7系统关机提示“配置Windows Update已完成30%请勿关闭计算机...

    win7系统关机提示“配置Windows Update已完成30%请勿关闭计算机”问题的解决方法在win7系统关机时如果有升级系统的或者其他需要会直接进入一个 等待界面&#xff0c;在等待界面中我们需要等待操作结束才能关机&#xff0c;虽然这比较麻烦&#xff0c;但是对系统进行配置和升级…...

    2022/11/19 21:17:15
  28. 台式电脑显示配置100%请勿关闭计算机,“准备配置windows 请勿关闭计算机”的解决方法...

    有不少用户在重装Win7系统或更新系统后会遇到“准备配置windows&#xff0c;请勿关闭计算机”的提示&#xff0c;要过很久才能进入系统&#xff0c;有的用户甚至几个小时也无法进入&#xff0c;下面就教大家这个问题的解决方法。第一种方法&#xff1a;我们首先在左下角的“开始…...

    2022/11/19 21:17:14
  29. win7 正在配置 请勿关闭计算机,怎么办Win7开机显示正在配置Windows Update请勿关机...

    置信有很多用户都跟小编一样遇到过这样的问题&#xff0c;电脑时发现开机屏幕显现“正在配置Windows Update&#xff0c;请勿关机”(如下图所示)&#xff0c;而且还需求等大约5分钟才干进入系统。这是怎样回事呢&#xff1f;一切都是正常操作的&#xff0c;为什么开时机呈现“正…...

    2022/11/19 21:17:13
  30. 准备配置windows 请勿关闭计算机 蓝屏,Win7开机总是出现提示“配置Windows请勿关机”...

    Win7系统开机启动时总是出现“配置Windows请勿关机”的提示&#xff0c;没过几秒后电脑自动重启&#xff0c;每次开机都这样无法进入系统&#xff0c;此时碰到这种现象的用户就可以使用以下5种方法解决问题。方法一&#xff1a;开机按下F8&#xff0c;在出现的Windows高级启动选…...

    2022/11/19 21:17:12
  31. 准备windows请勿关闭计算机要多久,windows10系统提示正在准备windows请勿关闭计算机怎么办...

    有不少windows10系统用户反映说碰到这样一个情况&#xff0c;就是电脑提示正在准备windows请勿关闭计算机&#xff0c;碰到这样的问题该怎么解决呢&#xff0c;现在小编就给大家分享一下windows10系统提示正在准备windows请勿关闭计算机的具体第一种方法&#xff1a;1、2、依次…...

    2022/11/19 21:17:11
  32. 配置 已完成 请勿关闭计算机,win7系统关机提示“配置Windows Update已完成30%请勿关闭计算机”的解决方法...

    今天和大家分享一下win7系统重装了Win7旗舰版系统后&#xff0c;每次关机的时候桌面上都会显示一个“配置Windows Update的界面&#xff0c;提示请勿关闭计算机”&#xff0c;每次停留好几分钟才能正常关机&#xff0c;导致什么情况引起的呢&#xff1f;出现配置Windows Update…...

    2022/11/19 21:17:10
  33. 电脑桌面一直是清理请关闭计算机,windows7一直卡在清理 请勿关闭计算机-win7清理请勿关机,win7配置更新35%不动...

    只能是等着&#xff0c;别无他法。说是卡着如果你看硬盘灯应该在读写。如果从 Win 10 无法正常回滚&#xff0c;只能是考虑备份数据后重装系统了。解决来方案一&#xff1a;管理员运行cmd&#xff1a;net stop WuAuServcd %windir%ren SoftwareDistribution SDoldnet start WuA…...

    2022/11/19 21:17:09
  34. 计算机配置更新不起,电脑提示“配置Windows Update请勿关闭计算机”怎么办?

    原标题&#xff1a;电脑提示“配置Windows Update请勿关闭计算机”怎么办&#xff1f;win7系统中在开机与关闭的时候总是显示“配置windows update请勿关闭计算机”相信有不少朋友都曾遇到过一次两次还能忍但经常遇到就叫人感到心烦了遇到这种问题怎么办呢&#xff1f;一般的方…...

    2022/11/19 21:17:08
  35. 计算机正在配置无法关机,关机提示 windows7 正在配置windows 请勿关闭计算机 ,然后等了一晚上也没有关掉。现在电脑无法正常关机...

    关机提示 windows7 正在配置windows 请勿关闭计算机 &#xff0c;然后等了一晚上也没有关掉。现在电脑无法正常关机以下文字资料是由(历史新知网www.lishixinzhi.com)小编为大家搜集整理后发布的内容&#xff0c;让我们赶快一起来看一下吧&#xff01;关机提示 windows7 正在配…...

    2022/11/19 21:17:05
  36. 钉钉提示请勿通过开发者调试模式_钉钉请勿通过开发者调试模式是真的吗好不好用...

    钉钉请勿通过开发者调试模式是真的吗好不好用 更新时间:2020-04-20 22:24:19 浏览次数:729次 区域: 南阳 > 卧龙 列举网提醒您:为保障您的权益,请不要提前支付任何费用! 虚拟位置外设器!!轨迹模拟&虚拟位置外设神器 专业用于:钉钉,外勤365,红圈通,企业微信和…...

    2022/11/19 21:17:05
  37. 配置失败还原请勿关闭计算机怎么办,win7系统出现“配置windows update失败 还原更改 请勿关闭计算机”,长时间没反应,无法进入系统的解决方案...

    前几天班里有位学生电脑(windows 7系统)出问题了&#xff0c;具体表现是开机时一直停留在“配置windows update失败 还原更改 请勿关闭计算机”这个界面&#xff0c;长时间没反应&#xff0c;无法进入系统。这个问题原来帮其他同学也解决过&#xff0c;网上搜了不少资料&#x…...

    2022/11/19 21:17:04
  38. 一个电脑无法关闭计算机你应该怎么办,电脑显示“清理请勿关闭计算机”怎么办?...

    本文为你提供了3个有效解决电脑显示“清理请勿关闭计算机”问题的方法&#xff0c;并在最后教给你1种保护系统安全的好方法&#xff0c;一起来看看&#xff01;电脑出现“清理请勿关闭计算机”在Windows 7(SP1)和Windows Server 2008 R2 SP1中&#xff0c;添加了1个新功能在“磁…...

    2022/11/19 21:17:03
  39. 请勿关闭计算机还原更改要多久,电脑显示:配置windows更新失败,正在还原更改,请勿关闭计算机怎么办...

    许多用户在长期不使用电脑的时候&#xff0c;开启电脑发现电脑显示&#xff1a;配置windows更新失败&#xff0c;正在还原更改&#xff0c;请勿关闭计算机。。.这要怎么办呢&#xff1f;下面小编就带着大家一起看看吧&#xff01;如果能够正常进入系统&#xff0c;建议您暂时移…...

    2022/11/19 21:17:02
  40. 还原更改请勿关闭计算机 要多久,配置windows update失败 还原更改 请勿关闭计算机,电脑开机后一直显示以...

    配置windows update失败 还原更改 请勿关闭计算机&#xff0c;电脑开机后一直显示以以下文字资料是由(历史新知网www.lishixinzhi.com)小编为大家搜集整理后发布的内容&#xff0c;让我们赶快一起来看一下吧&#xff01;配置windows update失败 还原更改 请勿关闭计算机&#x…...

    2022/11/19 21:17:01
  41. 电脑配置中请勿关闭计算机怎么办,准备配置windows请勿关闭计算机一直显示怎么办【图解】...

    不知道大家有没有遇到过这样的一个问题&#xff0c;就是我们的win7系统在关机的时候&#xff0c;总是喜欢显示“准备配置windows&#xff0c;请勿关机”这样的一个页面&#xff0c;没有什么大碍&#xff0c;但是如果一直等着的话就要两个小时甚至更久都关不了机&#xff0c;非常…...

    2022/11/19 21:17:00
  42. 正在准备配置请勿关闭计算机,正在准备配置windows请勿关闭计算机时间长了解决教程...

    当电脑出现正在准备配置windows请勿关闭计算机时&#xff0c;一般是您正对windows进行升级&#xff0c;但是这个要是长时间没有反应&#xff0c;我们不能再傻等下去了。可能是电脑出了别的问题了&#xff0c;来看看教程的说法。正在准备配置windows请勿关闭计算机时间长了方法一…...

    2022/11/19 21:16:59
  43. 配置失败还原请勿关闭计算机,配置Windows Update失败,还原更改请勿关闭计算机...

    我们使用电脑的过程中有时会遇到这种情况&#xff0c;当我们打开电脑之后&#xff0c;发现一直停留在一个界面&#xff1a;“配置Windows Update失败&#xff0c;还原更改请勿关闭计算机”&#xff0c;等了许久还是无法进入系统。如果我们遇到此类问题应该如何解决呢&#xff0…...

    2022/11/19 21:16:58
  44. 如何在iPhone上关闭“请勿打扰”

    Apple’s “Do Not Disturb While Driving” is a potentially lifesaving iPhone feature, but it doesn’t always turn on automatically at the appropriate time. For example, you might be a passenger in a moving car, but your iPhone may think you’re the one dri…...

    2022/11/19 21:16:57