    var SM4_ENCRYPT = 1;

    var SM4_DECRYPT = 0;

    var SM4_DATA_BLOCK_SIZE = 16;

    var SM4_SBOX = [0xd6, 0x90, 0xe9, 0xfe, 0xcc, 0xe1, 0x3d, 0xb7, 0x16, 0xb6, 0x14, 0xc2, 0x28, 0xfb, 0x2c, 0x05,
    0x2b, 0x67, 0x9a, 0x76, 0x2a, 0xbe, 0x04, 0xc3, 0xaa, 0x44, 0x13, 0x26, 0x49, 0x86, 0x06, 0x99,
    0x9c, 0x42, 0x50, 0xf4, 0x91, 0xef, 0x98, 0x7a, 0x33, 0x54, 0x0b, 0x43, 0xed, 0xcf, 0xac, 0x62,
    0xe4, 0xb3, 0x1c, 0xa9, 0xc9, 0x08, 0xe8, 0x95, 0x80, 0xdf, 0x94, 0xfa, 0x75, 0x8f, 0x3f, 0xa6,
    0x47, 0x07, 0xa7, 0xfc, 0xf3, 0x73, 0x17, 0xba, 0x83, 0x59, 0x3c, 0x19, 0xe6, 0x85, 0x4f, 0xa8,
    0x68, 0x6b, 0x81, 0xb2, 0x71, 0x64, 0xda, 0x8b, 0xf8, 0xeb, 0x0f, 0x4b, 0x70, 0x56, 0x9d, 0x35,
    0x1e, 0x24, 0x0e, 0x5e, 0x63, 0x58, 0xd1, 0xa2, 0x25, 0x22, 0x7c, 0x3b, 0x01, 0x21, 0x78, 0x87,
    0xd4, 0x00, 0x46, 0x57, 0x9f, 0xd3, 0x27, 0x52, 0x4c, 0x36, 0x02, 0xe7, 0xa0, 0xc4, 0xc8, 0x9e,
    0xea, 0xbf, 0x8a, 0xd2, 0x40, 0xc7, 0x38, 0xb5, 0xa3, 0xf7, 0xf2, 0xce, 0xf9, 0x61, 0x15, 0xa1,
    0xe0, 0xae, 0x5d, 0xa4, 0x9b, 0x34, 0x1a, 0x55, 0xad, 0x93, 0x32, 0x30, 0xf5, 0x8c, 0xb1, 0xe3,
    0x1d, 0xf6, 0xe2, 0x2e, 0x82, 0x66, 0xca, 0x60, 0xc0, 0x29, 0x23, 0xab, 0x0d, 0x53, 0x4e, 0x6f,
    0xd5, 0xdb, 0x37, 0x45, 0xde, 0xfd, 0x8e, 0x2f, 0x03, 0xff, 0x6a, 0x72, 0x6d, 0x6c, 0x5b, 0x51,
    0x8d, 0x1b, 0xaf, 0x92, 0xbb, 0xdd, 0xbc, 0x7f, 0x11, 0xd9, 0x5c, 0x41, 0x1f, 0x10, 0x5a, 0xd8,
    0x0a, 0xc1, 0x31, 0x88, 0xa5, 0xcd, 0x7b, 0xbd, 0x2d, 0x74, 0xd0, 0x12, 0xb8, 0xe5, 0xb4, 0xb0,
    0x89, 0x69, 0x97, 0x4a, 0x0c, 0x96, 0x77, 0x7e, 0x65, 0xb9, 0xf1, 0x09, 0xc5, 0x6e, 0xc6, 0x84,
    0x18, 0xf0, 0x7d, 0xec, 0x3a, 0xdc, 0x4d, 0x20, 0x79, 0xee, 0x5f, 0x3e, 0xd7, 0xcb, 0x39, 0x48];

    var FK = [0xa3b1bac6, 0x56aa3350, 0x677d9197, 0xb27022dc];

    var CK = [0x00070e15, 0x1c232a31, 0x383f464d, 0x545b6269, 0x70777e85, 0x8c939aa1,
            0xa8afb6bd, 0xc4cbd2d9, 0xe0e7eef5, 0xfc030a11, 0x181f262d, 0x343b4249, 0x50575e65, 0x6c737a81, 0x888f969d,
            0xa4abb2b9, 0xc0c7ced5, 0xdce3eaf1, 0xf8ff060d, 0x141b2229, 0x30373e45, 0x4c535a61, 0x686f767d, 0x848b9299,
            0xa0a7aeb5, 0xbcc3cad1, 0xd8dfe6ed, 0xf4fb0209, 0x10171e25, 0x2c333a41, 0x484f565d, 0x646b7279];

    /**
     * ECB模式加解密
     * @param keybyte Array() 16字节密钥
     * @param src Array() 待加密或解密数据，长度为8字节整倍数
     * @param flag (SM4_ENCRYPT:加密)(SM4_DECRYPT:解密)
     * @return Array() 加密或解密后数据，长度跟src长度一样
     */
    function cryptEcb_SM4(keybyte, src, flag) {
        try {
            if (keybyte.length != SM4_DATA_BLOCK_SIZE || src.length % SM4_DATA_BLOCK_SIZE != 0) {
                return null;
            }
            var rk = new Array(32);
            var indataLength = src.length;
            var encryptSize = indataLength;
            var encryptBlockSize = indataLength / SM4_DATA_BLOCK_SIZE;
            var bytesIndata = new Array(encryptSize);
            var bytesBlockIn = new Array(SM4_DATA_BLOCK_SIZE);
            var bytesBlockOut = new Array(SM4_DATA_BLOCK_SIZE);

            sm4JsArrayCopy(src, 0, bytesIndata, 0, encryptSize);
            //
            sm4KeyExt(keybyte, rk, flag);
            // 分块计算
            var outdata = new Array(encryptSize);
            for (var i = 0; i < encryptBlockSize; i++) {
                sm4JsArrayCopy(bytesIndata, i * SM4_DATA_BLOCK_SIZE, bytesBlockIn, 0, SM4_DATA_BLOCK_SIZE);
                sm4EncryptBlock(bytesBlockIn, rk, bytesBlockOut);
                sm4JsArrayCopy(bytesBlockOut, 0, outdata, i * SM4_DATA_BLOCK_SIZE, SM4_DATA_BLOCK_SIZE);
            }
            return outdata;
        } catch (e) {
        }
        return null;
    }

    /**
     * CBC模式加解密
     * @param keybyte Array() 16字节密钥
     * @param src Array() 待加密或解密数据，长度为8字节整倍数
     * @param iv Array() 16字节向量
     * @param flag (SM4_ENCRYPT:加密)(SM4_DECRYPT:解密)
     * @return Array() 加密或解密后数据，长度跟src长度一样
     */
    function cryptCbc_SM4(keybyte, src, iv, flag) {
        try {
            if (keybyte.length != SM4_DATA_BLOCK_SIZE || src.length % SM4_DATA_BLOCK_SIZE != 0
                    || iv.length % SM4_DATA_BLOCK_SIZE != 0) {
                return null;
            }
            var rk = new Array(32);
            var indataLength = src.length;
            var encryptSize = indataLength;
            var encryptBlockSize = indataLength / SM4_DATA_BLOCK_SIZE;
            var bytesBlockIn = new Array(SM4_DATA_BLOCK_SIZE);
            var bytesBlockOut = new Array(SM4_DATA_BLOCK_SIZE);
            var bytesIV = new Array(SM4_DATA_BLOCK_SIZE);

            //
            sm4KeyExt(keybyte, rk, flag);
            // 分块计算
            var outdata = new Array(encryptSize);
            sm4JsArrayCopy(iv, 0, bytesIV, 0, SM4_DATA_BLOCK_SIZE);
            if (flag == SM4_ENCRYPT) {
                for (var i = 0; i < encryptBlockSize; i++) {
                    sm4JsArrayCopy(src, i * SM4_DATA_BLOCK_SIZE, bytesBlockIn, 0, SM4_DATA_BLOCK_SIZE);
                    for (var j = 0; j < SM4_DATA_BLOCK_SIZE; j++) {
                        bytesBlockIn[j] = ((bytesBlockIn[j] ^ bytesIV[j]) & 0xFF);
                    }
                    sm4EncryptBlock(bytesBlockIn, rk, bytesBlockOut);
                    sm4JsArrayCopy(bytesBlockOut, 0, bytesIV, 0, SM4_DATA_BLOCK_SIZE);
                    sm4JsArrayCopy(bytesBlockOut, 0, outdata, i * SM4_DATA_BLOCK_SIZE, SM4_DATA_BLOCK_SIZE);
                }
            } else {
                for (var i = 0; i < encryptBlockSize; i++) {
                    sm4JsArrayCopy(src, i * SM4_DATA_BLOCK_SIZE, bytesBlockIn, 0, SM4_DATA_BLOCK_SIZE);
                    sm4EncryptBlock(bytesBlockIn, rk, bytesBlockOut);
                    for (var j = 0; j < SM4_DATA_BLOCK_SIZE; j++) {
                        bytesBlockOut[j] = (bytesBlockOut[j] ^ bytesIV[j]);
                    }
                    sm4JsArrayCopy(bytesBlockOut, 0, outdata, i * SM4_DATA_BLOCK_SIZE, SM4_DATA_BLOCK_SIZE);
                    sm4JsArrayCopy(src, i * SM4_DATA_BLOCK_SIZE, bytesIV, 0, SM4_DATA_BLOCK_SIZE);
                }
            }
            return outdata;
        } catch (e) {
        }
        return null;
    }

    /**
     * 计算4字节mac
     * 
     * @param pvSubKeys
     * @param pvCbcBlock
     * @param pbInputData
     * @param eNBytes
     * @param macLen
     *            输出mac结果的字节长度 传4或8
     * @return
     */
    /*public static byte[] CalcPBOCMac(byte[] pvSubKeys, byte[] pvCbcBlock, byte[] pbInputData, int eNBytes, int macLen) {
        try {
            if (pvSubKeys.length != SM4_DATA_BLOCK_SIZE || pvCbcBlock.length % SM4_DATA_BLOCK_SIZE != 0
                    || pbInputData.length % SM4_DATA_BLOCK_SIZE != 0) {
                return null;
            }
            int[] rk = new int[32];
            int encryptSize = eNBytes;
            int encryptBlockSize = eNBytes / SM4_DATA_BLOCK_SIZE;
            byte[] bytesIndata = new byte[encryptSize];
            byte[] bytesBlockIn = new byte[SM4_DATA_BLOCK_SIZE];
            byte[] bytesBlockOut = new byte[SM4_DATA_BLOCK_SIZE];
            byte[] bytesIV = new byte[SM4_DATA_BLOCK_SIZE];
            byte[] bytesMac = new byte[macLen];

            System.arraycopy(pbInputData, 0, bytesIndata, 0, encryptSize);
            //
            sm4KeyExt(pvSubKeys, rk, SM4_ENCRYPT);
            // 分块计算
            System.arraycopy(pvCbcBlock, 0, bytesIV, 0, SM4_DATA_BLOCK_SIZE);
            for (int i = 0; i < encryptBlockSize; i++) {
                System.arraycopy(bytesIndata, i * SM4_DATA_BLOCK_SIZE, bytesBlockIn, 0, SM4_DATA_BLOCK_SIZE);
                for (int j = 0; j < SM4_DATA_BLOCK_SIZE; j++) {
                    bytesBlockIn[j] = (byte) (bytesBlockIn[j] ^ bytesIV[j]);
                }
                sm4EncryptBlock(bytesBlockIn, rk, bytesBlockOut);
                System.arraycopy(bytesBlockOut, 0, bytesIV, 0, SM4_DATA_BLOCK_SIZE);
            }
            System.arraycopy(bytesIV, 0, bytesMac, 0, macLen);

            return bytesMac;
        } catch (Exception e) {
            e.printStackTrace();
        }
        return null;
    }*/

    /**
     * 密钥分散 目前只支持1次分散
     * @param dvsData Array() 8字节分散因子
     * @param srcIndex 分散因子数据起始索引，固定传0
     * @param CKKey Array() 16字节密钥
     * @return Array() 16字节子秘钥
     */
    function getSubKey_SM4(dvsData, srcIndex, CKKey) {
        var rk = new Array(32);
        var data = new Array(16);
        var subKey = new Array(16);
        // 1.
        sm4KeyExt(CKKey, rk, SM4_ENCRYPT);
        // 2.
        sm4JsArrayCopy(dvsData, srcIndex, data, 0, 8);
        for (var i = 0; i < 8; i++) {
            data[i + 8] = (~dvsData[i + srcIndex]);
        }
        sm4EncryptBlock(data, rk, subKey);
        return subKey;
    }

    function sm4KeyExt(key, rk, cryptFlag) {
        try {
            var MK = new Array(4);

            MK[0] = loadU32Be(key, 0) ^ FK[0];
            MK[1] = loadU32Be(key, 1) ^ FK[1];
            MK[2] = loadU32Be(key, 2) ^ FK[2];
            MK[3] = loadU32Be(key, 3) ^ FK[3];

            for (var i = 0; i < 32; i += 4) {
                sm4KRNDS(rk, MK, i);
            }

            if (cryptFlag == SM4_DECRYPT) {
                for (var r = 0; r < 16; r++) {
                    MK[0] = rk[r];
                    rk[r] = rk[31 - r];
                    rk[31 - r] = MK[0];
                }
            }
        } catch (e) {
        }
    }

    function sm4EncryptBlock(indata, rk, outdata) {
        try {
            var B = new Array(4);
            B[0] = loadU32Be(indata, 0);
            B[1] = loadU32Be(indata, 1);
            B[2] = loadU32Be(indata, 2);
            B[3] = loadU32Be(indata, 3);

            for (var r = 0; r < 32; r += 4) {
                sm4RNDS(B, rk, r);
            }

            var bt = new Array(4);
            storeU32Be(B[3], bt);
            sm4JsArrayCopy(bt, 0, outdata, 0, 4);
            storeU32Be(B[2], bt);
            sm4JsArrayCopy(bt, 0, outdata, 4, 4);
            storeU32Be(B[1], bt);
            sm4JsArrayCopy(bt, 0, outdata, 8, 4);
            storeU32Be(B[0], bt);
            sm4JsArrayCopy(bt, 0, outdata, 12, 4);

        } catch (e) {
        }
    }

    function sm4KRNDS(rk, B, r) {
        var mid = B[1] ^ B[2] ^ B[3] ^ CK[r];
        mid = sm4F(mid);
        B[0] = B[0] ^ sm4L2(mid);
        rk[r] = B[0];

        mid = B[2] ^ B[3] ^ B[0] ^ CK[r + 1];
        mid = sm4F(mid);
        B[1] = B[1] ^ sm4L2(mid);
        rk[r + 1] = B[1];

        mid = B[3] ^ B[0] ^ B[1] ^ CK[r + 2];
        mid = sm4F(mid);
        B[2] = B[2] ^ sm4L2(mid);
        rk[r + 2] = B[2];

        mid = B[0] ^ B[1] ^ B[2] ^ CK[r + 3];
        mid = sm4F(mid);
        B[3] = B[3] ^ sm4L2(mid);
        rk[r + 3] = B[3];
    }

    function sm4RNDS(B, rk, r) {
        var mid = B[1] ^ B[2] ^ B[3] ^ rk[r];
        mid = sm4F(mid);
        B[0] = B[0] ^ sm4L1(mid);

        mid = B[2] ^ B[3] ^ B[0] ^ rk[r + 1];
        mid = sm4F(mid);
        B[1] = B[1] ^ sm4L1(mid);

        mid = B[3] ^ B[0] ^ B[1] ^ rk[r + 2];
        mid = sm4F(mid);
        B[2] = B[2] ^ sm4L1(mid);

        mid = B[0] ^ B[1] ^ B[2] ^ rk[r + 3];
        mid = sm4F(mid);
        B[3] = B[3] ^ sm4L1(mid);
    }

    function sm4F(m) {
        var b = new Array(4);
        storeU32Be(m, b);
        b[0] = SM4_SBOX[b[0] & 0xff];
        b[1] = SM4_SBOX[b[1] & 0xff];
        b[2] = SM4_SBOX[b[2] & 0xff];
        b[3] = SM4_SBOX[b[3] & 0xff];
        m = loadU32Be(b, 0);
        return m;
    }

    function sm4L1(m) {
        return m ^ rotl(m, 2) ^ rotl(m, 10) ^ rotl(m, 18) ^ rotl(m, 24);
    }

    function sm4L2(m) {
        return m ^ rotl(m, 13) ^ rotl(m, 23);
    }

    function loadU32Be(b, n) {
        var res = 0;
        res = (b[4 * n] & 0xff) << 24 | (b[4 * n + 1] & 0xff) << 16 | (b[4 * n + 2] & 0xff) << 8
                | (b[4 * n + 3] & 0xff);
        return res;
    }

    function storeU32Be(v, b) {
        b[0] = ((v >>> 24) & 0xff);
        b[1] = ((v >>> 16) & 0xff);
        b[2] = ((v >>> 8) & 0xff);
        b[3] = (v & 0xff);
    }

    function rotl(a, n) {
        n &= 0xff;
        return (a << n) | (a >>> (32 - n));
    }

    function sm4JsArrayCopy(src, srcPos, dest, destPos, length) {
        for(var i = 0; i < length; i++) {
            dest[destPos + i] = src[srcPos + i];
        }
    }


    export class SM4{
        static cryptEcb_SM4(keybyte, src, flag){
            return cryptEcb_SM4(keybyte, src, flag)
        }
    }