
 (*                                                                        *)
 (*  Actually, at the current state of technology, its accepted that the   *)
 (*  very best method to break a good, and well implemented, crypto prog.  *)
 (*  is getting the key from the user or trying to guess it with a brute   *)
 (*  force attack...   And Blowfish carries all the caracteristics on an   *)
 (*  excellent algorithm.  It may fail, both, on the implementation side   *)
 (*  or on the user side...                                                *)
 (*                                                                        *)
 (*  A correct use, and maintenance of passwords and files, is needed!.    *)
 (*  And major care has been taken, in this implementation, to avoid any   *)
 (*  hidden weaknesses.                                                    *)
 (*                                                                        *)
 (*  Though the author is confident in is own work, it is up to the user   *)
 (*  to decide the adequacy of this program to its own needs...            *)
 (*  ... and you have this code to check the correctness of it.            *)
 (*  Its all up to you... No magic exists, so you also have an important   *)
 (*  role in your own security!                                            *)
 (*                                                                        *)

